Auto Update 2024/05/06 06:27:33

This commit is contained in:
motikan2010-bot 2024-05-06 15:27:33 +09:00
parent e774ff4924
commit f7d4f33b90
37 changed files with 107 additions and 107 deletions

View file

@ -13,10 +13,10 @@
"description": "Jackson Rce For CVE-2019-12384 ",
"fork": false,
"created_at": "2019-07-24T07:12:14Z",
"updated_at": "2024-03-19T10:00:06Z",
"updated_at": "2024-05-06T04:38:02Z",
"pushed_at": "2019-07-24T07:31:42Z",
"stargazers_count": 98,
"watchers_count": 98,
"stargazers_count": 99,
"watchers_count": 99,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 98,
"watchers": 99,
"score": 0,
"subscribers_count": 3
},

View file

@ -48,7 +48,7 @@
"stargazers_count": 4028,
"watchers_count": 4028,
"has_discussions": false,
"forks_count": 1081,
"forks_count": 1082,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -74,7 +74,7 @@
"webshell"
],
"visibility": "public",
"forks": 1081,
"forks": 1082,
"watchers": 4028,
"score": 0,
"subscribers_count": 151

View file

@ -48,13 +48,13 @@
"stargazers_count": 198,
"watchers_count": 198,
"has_discussions": false,
"forks_count": 44,
"forks_count": 45,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 44,
"forks": 45,
"watchers": 198,
"score": 0,
"subscribers_count": 3

View file

@ -18,7 +18,7 @@
"stargazers_count": 4028,
"watchers_count": 4028,
"has_discussions": false,
"forks_count": 1081,
"forks_count": 1082,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -44,7 +44,7 @@
"webshell"
],
"visibility": "public",
"forks": 1081,
"forks": 1082,
"watchers": 4028,
"score": 0,
"subscribers_count": 151

View file

@ -43,10 +43,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2024-05-01T13:37:37Z",
"updated_at": "2024-05-06T06:06:56Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1790,
"watchers_count": 1790,
"stargazers_count": 1791,
"watchers_count": 1791,
"has_discussions": false,
"forks_count": 580,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 580,
"watchers": 1790,
"watchers": 1791,
"score": 0,
"subscribers_count": 44
},

View file

@ -851,10 +851,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-04-30T08:50:41Z",
"updated_at": "2024-05-06T02:41:21Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1253,
"watchers_count": 1253,
"stargazers_count": 1254,
"watchers_count": 1254,
"has_discussions": false,
"forks_count": 159,
"allow_forking": true,
@ -870,7 +870,7 @@
],
"visibility": "public",
"forks": 159,
"watchers": 1253,
"watchers": 1254,
"score": 0,
"subscribers_count": 14
}

View file

@ -343,7 +343,7 @@
"forks": 3,
"watchers": 32,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 640427326,

View file

@ -13,10 +13,10 @@
"description": "Argument Injection in Dragonfly Ruby Gem",
"fork": false,
"created_at": "2021-05-25T02:48:08Z",
"updated_at": "2023-04-13T06:48:00Z",
"updated_at": "2024-05-06T05:09:25Z",
"pushed_at": "2021-05-26T21:30:29Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 15,
"watchers": 16,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Exploit for command injection vulnerability found in uhttpd binary from TP-Link Tapo c200 IP camera",
"fork": false,
"created_at": "2021-11-15T14:48:14Z",
"updated_at": "2024-05-02T00:58:29Z",
"updated_at": "2024-05-06T01:34:16Z",
"pushed_at": "2023-01-01T21:12:20Z",
"stargazers_count": 59,
"watchers_count": 59,
"stargazers_count": 60,
"watchers_count": 60,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 59,
"watchers": 60,
"score": 0,
"subscribers_count": 2
},

View file

@ -103,10 +103,10 @@
"description": "Remote Code Injection In Log4j",
"fork": false,
"created_at": "2021-12-10T05:23:44Z",
"updated_at": "2024-04-15T17:18:33Z",
"updated_at": "2024-05-06T06:05:35Z",
"pushed_at": "2022-01-18T12:01:52Z",
"stargazers_count": 450,
"watchers_count": 450,
"stargazers_count": 451,
"watchers_count": 451,
"has_discussions": false,
"forks_count": 127,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 127,
"watchers": 450,
"watchers": 451,
"score": 0,
"subscribers_count": 8
},
@ -1966,10 +1966,10 @@
"description": "A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC",
"fork": false,
"created_at": "2021-12-12T00:29:03Z",
"updated_at": "2024-04-27T16:15:50Z",
"updated_at": "2024-05-06T06:06:03Z",
"pushed_at": "2022-03-10T18:44:50Z",
"stargazers_count": 630,
"watchers_count": 630,
"stargazers_count": 629,
"watchers_count": 629,
"has_discussions": false,
"forks_count": 98,
"allow_forking": true,
@ -1990,7 +1990,7 @@
],
"visibility": "public",
"forks": 98,
"watchers": 630,
"watchers": 629,
"score": 0,
"subscribers_count": 28
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-0918",
"fork": false,
"created_at": "2022-05-10T03:50:18Z",
"updated_at": "2023-07-06T22:03:34Z",
"updated_at": "2024-05-06T03:37:35Z",
"pushed_at": "2022-05-13T17:28:20Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 2
}

View file

@ -1284,10 +1284,10 @@
"description": "CVE-2022-22947 注入Godzilla内存马",
"fork": false,
"created_at": "2022-04-26T05:48:27Z",
"updated_at": "2024-04-29T03:31:49Z",
"updated_at": "2024-05-06T05:34:12Z",
"pushed_at": "2022-04-26T05:55:58Z",
"stargazers_count": 197,
"watchers_count": 197,
"stargazers_count": 198,
"watchers_count": 198,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -1296,7 +1296,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 197,
"watchers": 198,
"score": 0,
"subscribers_count": 5
},

View file

@ -766,10 +766,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-04-30T08:50:41Z",
"updated_at": "2024-05-06T02:41:21Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1253,
"watchers_count": 1253,
"stargazers_count": 1254,
"watchers_count": 1254,
"has_discussions": false,
"forks_count": 159,
"allow_forking": true,
@ -785,7 +785,7 @@
],
"visibility": "public",
"forks": 159,
"watchers": 1253,
"watchers": 1254,
"score": 0,
"subscribers_count": 14
},

View file

@ -133,13 +133,13 @@
"stargazers_count": 307,
"watchers_count": 307,
"has_discussions": false,
"forks_count": 234,
"forks_count": 235,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 234,
"forks": 235,
"watchers": 307,
"score": 0,
"subscribers_count": 10

View file

@ -103,10 +103,10 @@
"description": "检测域内常见一把梭漏洞包括NoPac、ZeroLogon、CVE-2022-26923、PrintNightMare",
"fork": false,
"created_at": "2023-10-17T06:29:44Z",
"updated_at": "2024-04-22T15:14:50Z",
"updated_at": "2024-05-06T02:32:57Z",
"pushed_at": "2023-10-23T04:47:11Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 19,
"watchers": 20,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Zimbra RCE simple poc",
"fork": false,
"created_at": "2022-08-12T18:35:52Z",
"updated_at": "2024-01-04T17:11:05Z",
"updated_at": "2024-05-06T02:21:50Z",
"pushed_at": "2022-08-13T18:54:58Z",
"stargazers_count": 63,
"watchers_count": 63,
"stargazers_count": 64,
"watchers_count": 64,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 63,
"watchers": 64,
"score": 0,
"subscribers_count": 3
},

View file

@ -1501,6 +1501,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -87,6 +87,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -48,13 +48,13 @@
"stargazers_count": 205,
"watchers_count": 205,
"has_discussions": false,
"forks_count": 26,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 26,
"forks": 27,
"watchers": 205,
"score": 0,
"subscribers_count": 4

View file

@ -13,10 +13,10 @@
"description": "Asana Desktop 2.1.0 on macOS allows code injection because of specific Electron Fuses. There is inadequate protection against code injection through settings such as RunAsNode and enableNodeCliInspectArguments, and thus r3ggi\/electroniz3r can be used to perform an attack.",
"fork": false,
"created_at": "2023-11-28T10:39:19Z",
"updated_at": "2024-02-06T22:48:52Z",
"updated_at": "2024-05-06T04:13:03Z",
"pushed_at": "2023-11-28T11:48:48Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 36,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 36,
"forks": 35,
"watchers": 45,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "Postfix SMTP Smuggling - Expect Script POC",
"fork": false,
"created_at": "2023-12-26T17:02:20Z",
"updated_at": "2024-03-20T18:17:06Z",
"updated_at": "2024-05-06T01:23:15Z",
"pushed_at": "2023-12-26T20:16:45Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 26,
"watchers": 27,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-05-05T21:42:35Z",
"updated_at": "2024-05-06T01:38:25Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 1909,
"watchers_count": 1909,
"stargazers_count": 1910,
"watchers_count": 1910,
"has_discussions": false,
"forks_count": 238,
"allow_forking": true,
@ -31,9 +31,9 @@
],
"visibility": "public",
"forks": 238,
"watchers": 1909,
"watchers": 1910,
"score": 0,
"subscribers_count": 20
"subscribers_count": 21
},
{
"id": 781477717,

View file

@ -43,10 +43,10 @@
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"fork": false,
"created_at": "2024-02-16T15:17:59Z",
"updated_at": "2024-05-05T17:11:41Z",
"updated_at": "2024-05-06T00:50:17Z",
"pushed_at": "2024-02-19T20:00:35Z",
"stargazers_count": 582,
"watchers_count": 582,
"stargazers_count": 583,
"watchers_count": 583,
"has_discussions": false,
"forks_count": 128,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 128,
"watchers": 582,
"watchers": 583,
"score": 0,
"subscribers_count": 9
},

View file

@ -255,6 +255,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "Proof of Concept for Authentication Bypass in JetBrains TeamCity Pre-2023.11.4",
"fork": false,
"created_at": "2024-03-04T22:44:36Z",
"updated_at": "2024-04-23T11:46:34Z",
"updated_at": "2024-05-06T05:12:49Z",
"pushed_at": "2024-03-05T20:53:11Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 27,
"watchers": 28,
"score": 0,
"subscribers_count": 2
},

View file

@ -43,10 +43,10 @@
"description": "PoC for SQL Injection in CVE-2024-27956",
"fork": false,
"created_at": "2024-05-01T01:58:28Z",
"updated_at": "2024-05-05T19:23:07Z",
"updated_at": "2024-05-06T04:14:11Z",
"pushed_at": "2024-05-03T11:28:21Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 29,
"watchers": 31,
"score": 0,
"subscribers_count": 1
},
@ -117,6 +117,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "OpenMetadata_RCE (CVE-2024-28255) Batch scan\/exploit",
"fork": false,
"created_at": "2024-04-12T04:29:58Z",
"updated_at": "2024-04-19T10:48:35Z",
"updated_at": "2024-05-06T05:45:30Z",
"pushed_at": "2024-04-12T04:41:18Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -1026,7 +1026,7 @@
"forks": 232,
"watchers": 3454,
"score": 0,
"subscribers_count": 37
"subscribers_count": 38
},
{
"id": 780480213,

View file

@ -13,10 +13,10 @@
"description": "Making a lab and testing the CVE-2024-3116, a Remote Code Execution in pgadmin <=8.4",
"fork": false,
"created_at": "2024-04-07T23:03:55Z",
"updated_at": "2024-05-02T16:18:41Z",
"updated_at": "2024-05-06T01:39:14Z",
"pushed_at": "2024-04-11T01:38:55Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
}

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -288,13 +288,13 @@
"stargazers_count": 128,
"watchers_count": 128,
"has_discussions": false,
"forks_count": 19,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 19,
"forks": 20,
"watchers": 128,
"score": 0,
"subscribers_count": 1

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]