Auto Update 2022/01/25 06:15:56

This commit is contained in:
motikan2010-bot 2022-01-25 15:15:56 +09:00
parent 49a5831e9c
commit 025ea3886e
30 changed files with 143 additions and 138 deletions

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-01-23T17:44:33Z",
"updated_at": "2022-01-25T03:31:59Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1270,
"watchers_count": 1270,
"stargazers_count": 1272,
"watchers_count": 1272,
"forks_count": 277,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 277,
"watchers": 1270,
"watchers": 1272,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-01-23T17:44:33Z",
"updated_at": "2022-01-25T03:31:59Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1270,
"watchers_count": 1270,
"stargazers_count": 1272,
"watchers_count": 1272,
"forks_count": 277,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 277,
"watchers": 1270,
"watchers": 1272,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-09-12T10:03:55Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 3,
"watchers": 6,
"score": 0
}

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-01-23T17:44:33Z",
"updated_at": "2022-01-25T03:31:59Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1270,
"watchers_count": 1270,
"stargazers_count": 1272,
"watchers_count": 1272,
"forks_count": 277,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 277,
"watchers": 1270,
"watchers": 1272,
"score": 0
},
{

View file

@ -41,7 +41,7 @@
"fork": false,
"created_at": "2021-12-14T22:27:14Z",
"updated_at": "2022-01-24T14:12:09Z",
"pushed_at": "2022-01-24T14:05:41Z",
"pushed_at": "2022-01-25T00:05:54Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 7,

View file

@ -13,10 +13,10 @@
"description": "CVE-2018-16341 - Nuxeo Remote Code Execution without authentication using Server Side Template Injection",
"fork": false,
"created_at": "2019-06-05T18:24:45Z",
"updated_at": "2021-12-15T14:36:29Z",
"updated_at": "2022-01-25T03:44:18Z",
"pushed_at": "2019-06-05T18:43:28Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
@ -26,7 +26,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 21,
"watchers": 22,
"score": 0
},
{

View file

@ -530,10 +530,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-01-23T17:44:33Z",
"updated_at": "2022-01-25T03:31:59Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1270,
"watchers_count": 1270,
"stargazers_count": 1272,
"watchers_count": 1272,
"forks_count": 277,
"allow_forking": true,
"is_template": false,
@ -561,7 +561,7 @@
],
"visibility": "public",
"forks": 277,
"watchers": 1270,
"watchers": 1272,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2020-04-15T14:27:49Z",
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 24,
"score": 0
}

View file

@ -13,17 +13,17 @@
"description": "Strapi Framework Vulnerable to Remote Code Execution ",
"fork": false,
"created_at": "2021-08-29T16:18:27Z",
"updated_at": "2022-01-23T04:11:37Z",
"updated_at": "2022-01-25T04:09:02Z",
"pushed_at": "2021-08-29T16:34:16Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 6,
"watchers": 7,
"score": 0
},
{
@ -148,14 +148,19 @@
"description": "Strapi CMS 3.0.0-beta.17.4 - Unauthenticated Remote Code Execution (CVE-2019-18818, CVE-2019-19609)",
"fork": false,
"created_at": "2022-01-23T05:28:51Z",
"updated_at": "2022-01-23T05:32:56Z",
"pushed_at": "2022-01-23T05:34:51Z",
"updated_at": "2022-01-25T00:51:41Z",
"pushed_at": "2022-01-25T00:41:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"topics": [
"cve-2019-18818",
"cve-2019-19609",
"rce",
"strapi"
],
"visibility": "public",
"forks": 0,
"watchers": 0,

View file

@ -175,10 +175,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-01-23T17:44:33Z",
"updated_at": "2022-01-25T03:31:59Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1270,
"watchers_count": 1270,
"stargazers_count": 1272,
"watchers_count": 1272,
"forks_count": 277,
"allow_forking": true,
"is_template": false,
@ -206,7 +206,7 @@
],
"visibility": "public",
"forks": 277,
"watchers": 1270,
"watchers": 1272,
"score": 0
}
]

View file

@ -241,17 +241,17 @@
"description": "Exploit and detect tools for CVE-2020-0688",
"fork": false,
"created_at": "2020-03-01T12:57:32Z",
"updated_at": "2022-01-14T03:46:07Z",
"updated_at": "2022-01-25T01:09:33Z",
"pushed_at": "2020-03-21T05:44:48Z",
"stargazers_count": 311,
"watchers_count": 311,
"stargazers_count": 310,
"watchers_count": 310,
"forks_count": 75,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 75,
"watchers": 311,
"watchers": 310,
"score": 0
},
{

View file

@ -1636,17 +1636,17 @@
"description": "This is an implementation of the CVE-2020-0796 aka SMBGhost vulnerability, compatible with the Metasploit Framework",
"fork": false,
"created_at": "2020-06-19T20:38:11Z",
"updated_at": "2021-07-29T03:07:49Z",
"updated_at": "2022-01-25T04:16:01Z",
"pushed_at": "2020-06-19T20:58:36Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 21,
"watchers": 22,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-01-23T17:44:33Z",
"updated_at": "2022-01-25T03:31:59Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1270,
"watchers_count": 1270,
"stargazers_count": 1272,
"watchers_count": 1272,
"forks_count": 277,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 277,
"watchers": 1270,
"watchers": 1272,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-1732 Exploit",
"fork": false,
"created_at": "2021-03-05T02:11:10Z",
"updated_at": "2022-01-24T15:32:32Z",
"updated_at": "2022-01-25T01:09:33Z",
"pushed_at": "2021-03-05T03:10:26Z",
"stargazers_count": 356,
"watchers_count": 356,
"stargazers_count": 355,
"watchers_count": 355,
"forks_count": 100,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 100,
"watchers": 356,
"watchers": 355,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "SonicWall SMA-100 Unauth RCE Exploit (CVE-2021-20038)",
"fork": false,
"created_at": "2022-01-11T02:25:25Z",
"updated_at": "2022-01-25T00:05:29Z",
"updated_at": "2022-01-25T02:20:18Z",
"pushed_at": "2022-01-11T11:22:06Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 46,
"watchers": 48,
"score": 0
}
]

View file

@ -97,17 +97,17 @@
"description": null,
"fork": false,
"created_at": "2021-08-02T18:56:16Z",
"updated_at": "2021-10-26T16:51:50Z",
"updated_at": "2022-01-25T02:09:24Z",
"pushed_at": "2021-10-26T16:51:48Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 4,
"score": 0
},
{

View file

@ -98,12 +98,12 @@
"pushed_at": "2021-11-04T02:17:54Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 4,
"score": 0
},

View file

@ -71,12 +71,12 @@
"pushed_at": "2021-11-04T02:21:28Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 5,
"score": 0
},

View file

@ -17,12 +17,12 @@
"pushed_at": "2022-01-19T19:15:36Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 9,
"score": 0
}

View file

@ -449,12 +449,12 @@
"pushed_at": "2022-01-14T04:21:27Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 4,
"score": 0
}

View file

@ -215,12 +215,12 @@
"pushed_at": "2021-11-04T02:23:11Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 12,
"score": 0
},

View file

@ -13,7 +13,7 @@
"description": "Template Injection in Email Templates leads to code execution on Jira Service Management Server",
"fork": false,
"created_at": "2021-09-07T09:03:35Z",
"updated_at": "2022-01-07T10:25:12Z",
"updated_at": "2022-01-25T01:51:49Z",
"pushed_at": "2021-09-09T03:58:32Z",
"stargazers_count": 46,
"watchers_count": 46,

View file

@ -923,17 +923,17 @@
"description": "CVE-2021-40444",
"fork": false,
"created_at": "2021-12-19T08:16:07Z",
"updated_at": "2022-01-24T01:40:40Z",
"updated_at": "2022-01-25T03:10:51Z",
"pushed_at": "2021-12-19T08:27:33Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 52,
"watchers_count": 52,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 51,
"watchers": 52,
"score": 0
},
{

View file

@ -40,7 +40,7 @@
"description": "CVE-2021-42008: Exploiting A 16-Year-Old Vulnerability In The Linux 6pack Driver",
"fork": false,
"created_at": "2021-12-03T14:08:26Z",
"updated_at": "2022-01-24T20:49:53Z",
"updated_at": "2022-01-25T05:51:54Z",
"pushed_at": "2021-12-03T15:46:30Z",
"stargazers_count": 23,
"watchers_count": 23,

View file

@ -17,7 +17,7 @@
"pushed_at": "2021-12-21T10:11:05Z",
"stargazers_count": 715,
"watchers_count": 715,
"forks_count": 154,
"forks_count": 155,
"allow_forking": true,
"is_template": false,
"topics": [
@ -27,7 +27,7 @@
"s4u2self"
],
"visibility": "public",
"forks": 154,
"forks": 155,
"watchers": 715,
"score": 0
},
@ -45,17 +45,17 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2022-01-24T18:35:51Z",
"updated_at": "2022-01-25T02:08:25Z",
"pushed_at": "2021-12-20T04:51:01Z",
"stargazers_count": 230,
"watchers_count": 230,
"forks_count": 45,
"stargazers_count": 233,
"watchers_count": 233,
"forks_count": 46,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 45,
"watchers": 230,
"forks": 46,
"watchers": 233,
"score": 0
},
{

View file

@ -187,7 +187,7 @@
"pushed_at": "2021-12-09T07:22:26Z",
"stargazers_count": 182,
"watchers_count": 182,
"forks_count": 25,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"topics": [
@ -196,7 +196,7 @@
"grafana"
],
"visibility": "public",
"forks": 25,
"forks": 26,
"watchers": 182,
"score": 0
},

View file

@ -94,17 +94,17 @@
"description": "Remote Code Injection In Log4j",
"fork": false,
"created_at": "2021-12-10T05:23:44Z",
"updated_at": "2022-01-24T07:47:34Z",
"updated_at": "2022-01-25T01:47:09Z",
"pushed_at": "2022-01-18T12:01:52Z",
"stargazers_count": 331,
"watchers_count": 331,
"stargazers_count": 332,
"watchers_count": 332,
"forks_count": 96,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 96,
"watchers": 331,
"watchers": 332,
"score": 0
},
{
@ -862,7 +862,7 @@
"pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 673,
"watchers_count": 673,
"forks_count": 102,
"forks_count": 103,
"allow_forking": true,
"is_template": false,
"topics": [
@ -887,7 +887,7 @@
"writeups"
],
"visibility": "public",
"forks": 102,
"forks": 103,
"watchers": 673,
"score": 0
},
@ -905,10 +905,10 @@
"description": "A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2022-01-24T20:52:21Z",
"updated_at": "2022-01-25T04:09:54Z",
"pushed_at": "2022-01-22T14:55:02Z",
"stargazers_count": 1190,
"watchers_count": 1190,
"stargazers_count": 1191,
"watchers_count": 1191,
"forks_count": 309,
"allow_forking": true,
"is_template": false,
@ -920,7 +920,7 @@
],
"visibility": "public",
"forks": 309,
"watchers": 1190,
"watchers": 1191,
"score": 0
},
{
@ -1233,10 +1233,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2022-01-24T02:25:56Z",
"updated_at": "2022-01-25T04:42:58Z",
"pushed_at": "2022-01-11T05:46:22Z",
"stargazers_count": 199,
"watchers_count": 199,
"stargazers_count": 200,
"watchers_count": 200,
"forks_count": 57,
"allow_forking": true,
"is_template": false,
@ -1248,7 +1248,7 @@
],
"visibility": "public",
"forks": 57,
"watchers": 199,
"watchers": 200,
"score": 0
},
{
@ -2961,7 +2961,7 @@
"pushed_at": "2021-12-17T13:59:44Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [
@ -2970,7 +2970,7 @@
"spring-boot-log4j"
],
"visibility": "public",
"forks": 9,
"forks": 10,
"watchers": 11,
"score": 0
},
@ -3539,17 +3539,17 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-01-24T17:06:35Z",
"updated_at": "2022-01-25T02:30:17Z",
"pushed_at": "2022-01-02T20:21:42Z",
"stargazers_count": 2650,
"watchers_count": 2650,
"forks_count": 635,
"stargazers_count": 2651,
"watchers_count": 2651,
"forks_count": 636,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 635,
"watchers": 2650,
"forks": 636,
"watchers": 2651,
"score": 0
},
{
@ -5239,10 +5239,10 @@
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
"fork": false,
"created_at": "2021-12-14T06:37:59Z",
"updated_at": "2022-01-16T07:01:55Z",
"updated_at": "2022-01-25T05:18:34Z",
"pushed_at": "2021-12-27T15:12:20Z",
"stargazers_count": 254,
"watchers_count": 254,
"stargazers_count": 255,
"watchers_count": 255,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
@ -5255,7 +5255,7 @@
],
"visibility": "public",
"forks": 35,
"watchers": 254,
"watchers": 255,
"score": 0
},
{
@ -5413,10 +5413,10 @@
"description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)",
"fork": false,
"created_at": "2021-12-14T10:04:42Z",
"updated_at": "2022-01-24T09:59:44Z",
"updated_at": "2022-01-25T04:58:06Z",
"pushed_at": "2022-01-12T03:31:50Z",
"stargazers_count": 400,
"watchers_count": 400,
"stargazers_count": 401,
"watchers_count": 401,
"forks_count": 86,
"allow_forking": true,
"is_template": false,
@ -5432,7 +5432,7 @@
],
"visibility": "public",
"forks": 86,
"watchers": 400,
"watchers": 401,
"score": 0
},
{
@ -9752,10 +9752,10 @@
"description": "A tool for detect&exploit vmware product log4j(cve-2021-44228) vulnerability.Support VMware HCX\/vCenter\/NSX\/Horizon\/vRealize Operations Manager",
"fork": false,
"created_at": "2021-12-28T01:37:20Z",
"updated_at": "2022-01-24T15:56:33Z",
"updated_at": "2022-01-25T03:40:42Z",
"pushed_at": "2022-01-24T05:37:34Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 63,
"watchers_count": 63,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
@ -9767,7 +9767,7 @@
],
"visibility": "public",
"forks": 19,
"watchers": 61,
"watchers": 63,
"score": 0
},
{
@ -10092,17 +10092,17 @@
"description": "Exploiting CVE-2021-44228 in VMWare Horizon for remote code execution and more.",
"fork": false,
"created_at": "2022-01-05T22:25:42Z",
"updated_at": "2022-01-24T03:58:25Z",
"updated_at": "2022-01-25T03:39:59Z",
"pushed_at": "2022-01-10T19:26:59Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 46,
"watchers": 47,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2022-0185",
"fork": false,
"created_at": "2022-01-19T06:19:38Z",
"updated_at": "2022-01-24T23:08:31Z",
"updated_at": "2022-01-25T01:39:20Z",
"pushed_at": "2022-01-19T06:23:58Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 58,
"watchers_count": 58,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 57,
"watchers": 58,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "WordPress Core 5.8.2 - 'WP_Query' SQL Injection",
"fork": false,
"created_at": "2022-01-18T01:05:04Z",
"updated_at": "2022-01-19T04:00:40Z",
"updated_at": "2022-01-25T03:18:24Z",
"pushed_at": "2022-01-18T01:19:45Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907",
"fork": false,
"created_at": "2022-01-17T02:28:50Z",
"updated_at": "2022-01-24T21:17:20Z",
"updated_at": "2022-01-25T01:28:17Z",
"pushed_at": "2022-01-20T02:07:59Z",
"stargazers_count": 302,
"watchers_count": 302,
"forks_count": 85,
"stargazers_count": 303,
"watchers_count": 303,
"forks_count": 86,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 85,
"watchers": 302,
"forks": 86,
"watchers": 303,
"score": 0
},
{