Auto Update 2022/01/20 06:14:17

This commit is contained in:
motikan2010-bot 2022-01-20 15:14:17 +09:00
parent ffa1b8bfb3
commit 03dd4735cd
29 changed files with 166 additions and 166 deletions

View file

@ -13,17 +13,17 @@
"description": "A checker (site and tool) for CVE-2014-0160", "description": "A checker (site and tool) for CVE-2014-0160",
"fork": false, "fork": false,
"created_at": "2014-04-07T23:03:09Z", "created_at": "2014-04-07T23:03:09Z",
"updated_at": "2022-01-18T06:29:46Z", "updated_at": "2022-01-20T05:09:19Z",
"pushed_at": "2021-02-24T09:17:24Z", "pushed_at": "2021-02-24T09:17:24Z",
"stargazers_count": 2266, "stargazers_count": 2267,
"watchers_count": 2266, "watchers_count": 2267,
"forks_count": 480, "forks_count": 480,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 480, "forks": 480,
"watchers": 2266, "watchers": 2267,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,10 +13,10 @@
"description": "Blueborne CVE-2017-0781 Android heap overflow vulnerability", "description": "Blueborne CVE-2017-0781 Android heap overflow vulnerability",
"fork": false, "fork": false,
"created_at": "2017-10-09T15:13:25Z", "created_at": "2017-10-09T15:13:25Z",
"updated_at": "2022-01-11T08:37:03Z", "updated_at": "2022-01-20T03:02:29Z",
"pushed_at": "2021-07-29T12:00:48Z", "pushed_at": "2021-07-29T12:00:48Z",
"stargazers_count": 82, "stargazers_count": 81,
"watchers_count": 82, "watchers_count": 81,
"forks_count": 42, "forks_count": 42,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -29,7 +29,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 42, "forks": 42,
"watchers": 82, "watchers": 81,
"score": 0 "score": 0
}, },
{ {

View file

@ -429,17 +429,17 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。", "description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false, "fork": false,
"created_at": "2018-09-13T09:44:18Z", "created_at": "2018-09-13T09:44:18Z",
"updated_at": "2022-01-15T05:56:34Z", "updated_at": "2022-01-20T00:55:35Z",
"pushed_at": "2020-10-01T20:20:41Z", "pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 313, "stargazers_count": 314,
"watchers_count": 313, "watchers_count": 314,
"forks_count": 109, "forks_count": 109,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 109, "forks": 109,
"watchers": 313, "watchers": 314,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,17 +13,17 @@
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)", "description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)",
"fork": false, "fork": false,
"created_at": "2018-06-24T05:34:05Z", "created_at": "2018-06-24T05:34:05Z",
"updated_at": "2022-01-18T14:54:00Z", "updated_at": "2022-01-20T06:03:42Z",
"pushed_at": "2020-10-16T12:09:45Z", "pushed_at": "2020-10-16T12:09:45Z",
"stargazers_count": 457, "stargazers_count": 458,
"watchers_count": 457, "watchers_count": 458,
"forks_count": 443, "forks_count": 442,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 443, "forks": 442,
"watchers": 457, "watchers": 458,
"score": 0 "score": 0
}, },
{ {

View file

@ -74,10 +74,10 @@
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)", "description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
"fork": false, "fork": false,
"created_at": "2018-04-12T22:53:14Z", "created_at": "2018-04-12T22:53:14Z",
"updated_at": "2022-01-18T20:45:50Z", "updated_at": "2022-01-20T03:07:21Z",
"pushed_at": "2021-01-08T10:31:22Z", "pushed_at": "2021-01-08T10:31:22Z",
"stargazers_count": 513, "stargazers_count": 514,
"watchers_count": 513, "watchers_count": 514,
"forks_count": 167, "forks_count": 167,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -94,7 +94,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 167, "forks": 167,
"watchers": 513, "watchers": 514,
"score": 0 "score": 0
}, },
{ {

View file

@ -40,10 +40,10 @@
"description": "CVE-2018-8120 Windows LPE exploit", "description": "CVE-2018-8120 Windows LPE exploit",
"fork": false, "fork": false,
"created_at": "2018-05-19T02:43:15Z", "created_at": "2018-05-19T02:43:15Z",
"updated_at": "2022-01-06T01:20:49Z", "updated_at": "2022-01-20T04:03:57Z",
"pushed_at": "2018-05-30T13:09:54Z", "pushed_at": "2018-05-30T13:09:54Z",
"stargazers_count": 471, "stargazers_count": 472,
"watchers_count": 471, "watchers_count": 472,
"forks_count": 205, "forks_count": 205,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -54,7 +54,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 205, "forks": 205,
"watchers": 471, "watchers": 472,
"score": 0 "score": 0
}, },
{ {

View file

@ -369,10 +369,10 @@
"description": "3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)", "description": "3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)",
"fork": false, "fork": false,
"created_at": "2019-05-15T15:01:38Z", "created_at": "2019-05-15T15:01:38Z",
"updated_at": "2022-01-06T03:05:47Z", "updated_at": "2022-01-20T01:34:41Z",
"pushed_at": "2019-06-13T13:07:03Z", "pushed_at": "2019-06-13T13:07:03Z",
"stargazers_count": 362, "stargazers_count": 363,
"watchers_count": 362, "watchers_count": 363,
"forks_count": 194, "forks_count": 194,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -390,7 +390,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 194, "forks": 194,
"watchers": 362, "watchers": 363,
"score": 0 "score": 0
}, },
{ {
@ -1705,17 +1705,17 @@
"description": "Proof of concept for CVE-2019-0708", "description": "Proof of concept for CVE-2019-0708",
"fork": false, "fork": false,
"created_at": "2019-05-29T16:53:54Z", "created_at": "2019-05-29T16:53:54Z",
"updated_at": "2022-01-19T13:17:47Z", "updated_at": "2022-01-20T01:35:01Z",
"pushed_at": "2021-12-02T12:00:46Z", "pushed_at": "2021-12-02T12:00:46Z",
"stargazers_count": 1093, "stargazers_count": 1094,
"watchers_count": 1093, "watchers_count": 1094,
"forks_count": 353, "forks_count": 353,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 353, "forks": 353,
"watchers": 1093, "watchers": 1094,
"score": 0 "score": 0
}, },
{ {

View file

@ -17,12 +17,12 @@
"pushed_at": "2019-07-25T07:24:11Z", "pushed_at": "2019-07-25T07:24:11Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"forks_count": 0, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 1,
"watchers": 0, "watchers": 0,
"score": 0 "score": 0
} }

View file

@ -40,10 +40,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false, "fork": false,
"created_at": "2020-04-01T09:33:35Z", "created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-01-19T17:46:21Z", "updated_at": "2022-01-20T03:17:56Z",
"pushed_at": "2021-04-04T09:13:57Z", "pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3104, "stargazers_count": 3105,
"watchers_count": 3104, "watchers_count": 3105,
"forks_count": 920, "forks_count": 920,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -70,7 +70,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 920, "forks": 920,
"watchers": 3104, "watchers": 3105,
"score": 0 "score": 0
}, },
{ {

View file

@ -179,12 +179,12 @@
"pushed_at": "2021-08-14T02:33:32Z", "pushed_at": "2021-08-14T02:33:32Z",
"stargazers_count": 5, "stargazers_count": 5,
"watchers_count": 5, "watchers_count": 5,
"forks_count": 1, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 2,
"watchers": 5, "watchers": 5,
"score": 0 "score": 0
} }

View file

@ -71,12 +71,12 @@
"pushed_at": "2019-10-15T01:04:08Z", "pushed_at": "2019-10-15T01:04:08Z",
"stargazers_count": 87, "stargazers_count": 87,
"watchers_count": 87, "watchers_count": 87,
"forks_count": 45, "forks_count": 46,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 45, "forks": 46,
"watchers": 87, "watchers": 87,
"score": 0 "score": 0
}, },

View file

@ -13,17 +13,17 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。", "description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false, "fork": false,
"created_at": "2018-09-13T09:44:18Z", "created_at": "2018-09-13T09:44:18Z",
"updated_at": "2022-01-15T05:56:34Z", "updated_at": "2022-01-20T00:55:35Z",
"pushed_at": "2020-10-01T20:20:41Z", "pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 313, "stargazers_count": 314,
"watchers_count": 313, "watchers_count": 314,
"forks_count": 109, "forks_count": 109,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 109, "forks": 109,
"watchers": 313, "watchers": 314,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-1206 Uninitialized Kernel Memory Read POC", "description": "CVE-2020-1206 Uninitialized Kernel Memory Read POC",
"fork": false, "fork": false,
"created_at": "2020-04-05T15:52:43Z", "created_at": "2020-04-05T15:52:43Z",
"updated_at": "2022-01-17T19:11:49Z", "updated_at": "2022-01-20T03:11:08Z",
"pushed_at": "2020-06-09T20:41:32Z", "pushed_at": "2020-06-09T20:41:32Z",
"stargazers_count": 141, "stargazers_count": 142,
"watchers_count": 141, "watchers_count": 142,
"forks_count": 46, "forks_count": 46,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -27,7 +27,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 46, "forks": 46,
"watchers": 141, "watchers": 142,
"score": 0 "score": 0
}, },
{ {

View file

@ -98,12 +98,12 @@
"pushed_at": "2020-11-03T09:45:24Z", "pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 894, "stargazers_count": 894,
"watchers_count": 894, "watchers_count": 894,
"forks_count": 243, "forks_count": 244,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 243, "forks": 244,
"watchers": 894, "watchers": 894,
"score": 0 "score": 0
}, },

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false, "fork": false,
"created_at": "2020-04-01T09:33:35Z", "created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-01-19T17:46:21Z", "updated_at": "2022-01-20T03:17:56Z",
"pushed_at": "2021-04-04T09:13:57Z", "pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3104, "stargazers_count": 3105,
"watchers_count": 3104, "watchers_count": 3105,
"forks_count": 920, "forks_count": 920,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -43,7 +43,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 920, "forks": 920,
"watchers": 3104, "watchers": 3105,
"score": 0 "score": 0
}, },
{ {

View file

@ -205,17 +205,17 @@
"description": "C# PrintNightmare (CVE-2021-1675)", "description": "C# PrintNightmare (CVE-2021-1675)",
"fork": false, "fork": false,
"created_at": "2021-09-26T20:46:23Z", "created_at": "2021-09-26T20:46:23Z",
"updated_at": "2022-01-19T21:04:37Z", "updated_at": "2022-01-20T03:18:23Z",
"pushed_at": "2021-09-26T22:35:07Z", "pushed_at": "2021-09-26T22:35:07Z",
"stargazers_count": 4, "stargazers_count": 6,
"watchers_count": 4, "watchers_count": 6,
"forks_count": 3, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 4,
"watchers": 4, "watchers": 6,
"score": 0 "score": 0
}, },
{ {

View file

@ -969,17 +969,17 @@
"description": "Sudo Baron Samedit Exploit", "description": "Sudo Baron Samedit Exploit",
"fork": false, "fork": false,
"created_at": "2021-03-15T17:37:02Z", "created_at": "2021-03-15T17:37:02Z",
"updated_at": "2022-01-18T01:53:41Z", "updated_at": "2022-01-20T01:06:35Z",
"pushed_at": "2022-01-13T05:48:01Z", "pushed_at": "2022-01-13T05:48:01Z",
"stargazers_count": 426, "stargazers_count": 427,
"watchers_count": 426, "watchers_count": 427,
"forks_count": 111, "forks_count": 111,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 111, "forks": 111,
"watchers": 426, "watchers": 427,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,17 +13,17 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2022-01-11T16:03:38Z", "created_at": "2022-01-11T16:03:38Z",
"updated_at": "2022-01-19T08:13:48Z", "updated_at": "2022-01-20T05:38:19Z",
"pushed_at": "2022-01-11T16:52:16Z", "pushed_at": "2022-01-11T16:52:16Z",
"stargazers_count": 22, "stargazers_count": 24,
"watchers_count": 22, "watchers_count": 24,
"forks_count": 13, "forks_count": 14,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 13, "forks": 14,
"watchers": 22, "watchers": 24,
"score": 0 "score": 0
} }
] ]

View file

@ -40,17 +40,17 @@
"description": "CVE-2021-32099", "description": "CVE-2021-32099",
"fork": false, "fork": false,
"created_at": "2022-01-12T11:48:34Z", "created_at": "2022-01-12T11:48:34Z",
"updated_at": "2022-01-16T14:41:44Z", "updated_at": "2022-01-20T02:40:51Z",
"pushed_at": "2022-01-12T11:49:20Z", "pushed_at": "2022-01-12T11:49:20Z",
"stargazers_count": 6, "stargazers_count": 7,
"watchers_count": 6, "watchers_count": 7,
"forks_count": 4, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 4,
"watchers": 6, "watchers": 7,
"score": 0 "score": 0
} }
] ]

View file

@ -13,17 +13,17 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2022-01-17T16:08:17Z", "created_at": "2022-01-17T16:08:17Z",
"updated_at": "2022-01-18T11:22:05Z", "updated_at": "2022-01-20T05:31:14Z",
"pushed_at": "2022-01-17T16:09:05Z", "pushed_at": "2022-01-17T16:09:05Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 1,
"score": 0 "score": 0
} }
] ]

View file

@ -13,17 +13,17 @@
"description": "PoC for CVE-2021-3492 used at Pwn2Own 2021", "description": "PoC for CVE-2021-3492 used at Pwn2Own 2021",
"fork": false, "fork": false,
"created_at": "2021-06-28T09:43:31Z", "created_at": "2021-06-28T09:43:31Z",
"updated_at": "2022-01-12T10:36:26Z", "updated_at": "2022-01-20T02:13:58Z",
"pushed_at": "2021-08-03T14:48:27Z", "pushed_at": "2021-08-03T14:48:27Z",
"stargazers_count": 36, "stargazers_count": 37,
"watchers_count": 36, "watchers_count": 37,
"forks_count": 6, "forks_count": 6,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 6, "forks": 6,
"watchers": 36, "watchers": 37,
"score": 0 "score": 0
} }
] ]

View file

@ -40,17 +40,17 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2022-01-14T05:52:17Z", "created_at": "2022-01-14T05:52:17Z",
"updated_at": "2022-01-19T20:43:14Z", "updated_at": "2022-01-20T01:50:55Z",
"pushed_at": "2022-01-14T05:56:09Z", "pushed_at": "2022-01-14T05:56:09Z",
"stargazers_count": 8, "stargazers_count": 9,
"watchers_count": 8, "watchers_count": 9,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 8, "watchers": 9,
"score": 0 "score": 0
} }
] ]

View file

@ -1236,17 +1236,17 @@
"description": "CVE-2021-41773 CVE-2021-42013漏洞批量检测工具", "description": "CVE-2021-41773 CVE-2021-42013漏洞批量检测工具",
"fork": false, "fork": false,
"created_at": "2021-10-09T03:32:18Z", "created_at": "2021-10-09T03:32:18Z",
"updated_at": "2022-01-13T11:58:37Z", "updated_at": "2022-01-20T01:11:49Z",
"pushed_at": "2021-10-09T03:49:21Z", "pushed_at": "2021-10-09T03:49:21Z",
"stargazers_count": 118, "stargazers_count": 119,
"watchers_count": 118, "watchers_count": 119,
"forks_count": 39, "forks_count": 40,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 39, "forks": 40,
"watchers": 118, "watchers": 119,
"score": 0 "score": 0
}, },
{ {

View file

@ -45,17 +45,17 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false, "fork": false,
"created_at": "2021-12-13T10:28:12Z", "created_at": "2021-12-13T10:28:12Z",
"updated_at": "2022-01-19T05:21:46Z", "updated_at": "2022-01-20T05:43:41Z",
"pushed_at": "2021-12-20T04:51:01Z", "pushed_at": "2021-12-20T04:51:01Z",
"stargazers_count": 216, "stargazers_count": 218,
"watchers_count": 216, "watchers_count": 218,
"forks_count": 41, "forks_count": 41,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 41, "forks": 41,
"watchers": 216, "watchers": 218,
"score": 0 "score": 0
}, },
{ {

View file

@ -40,17 +40,17 @@
"description": "Apache Dubbo Hessian2 CVE-2021-43297 demo", "description": "Apache Dubbo Hessian2 CVE-2021-43297 demo",
"fork": false, "fork": false,
"created_at": "2022-01-17T17:52:34Z", "created_at": "2022-01-17T17:52:34Z",
"updated_at": "2022-01-19T10:55:20Z", "updated_at": "2022-01-20T06:04:45Z",
"pushed_at": "2022-01-18T03:43:51Z", "pushed_at": "2022-01-18T03:43:51Z",
"stargazers_count": 13, "stargazers_count": 15,
"watchers_count": 13, "watchers_count": 15,
"forks_count": 4, "forks_count": 5,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 5,
"watchers": 13, "watchers": 15,
"score": 0 "score": 0
} }
] ]

View file

@ -67,17 +67,17 @@
"description": "Grafana Unauthorized arbitrary file reading vulnerability", "description": "Grafana Unauthorized arbitrary file reading vulnerability",
"fork": false, "fork": false,
"created_at": "2021-12-07T09:02:16Z", "created_at": "2021-12-07T09:02:16Z",
"updated_at": "2022-01-11T18:53:32Z", "updated_at": "2022-01-20T03:19:18Z",
"pushed_at": "2021-12-09T03:16:21Z", "pushed_at": "2021-12-09T03:16:21Z",
"stargazers_count": 246, "stargazers_count": 247,
"watchers_count": 246, "watchers_count": 247,
"forks_count": 66, "forks_count": 66,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 66, "forks": 66,
"watchers": 246, "watchers": 247,
"score": 0 "score": 0
}, },
{ {

View file

@ -94,17 +94,17 @@
"description": "Remote Code Injection In Log4j", "description": "Remote Code Injection In Log4j",
"fork": false, "fork": false,
"created_at": "2021-12-10T05:23:44Z", "created_at": "2021-12-10T05:23:44Z",
"updated_at": "2022-01-19T23:29:39Z", "updated_at": "2022-01-20T05:56:59Z",
"pushed_at": "2022-01-18T12:01:52Z", "pushed_at": "2022-01-18T12:01:52Z",
"stargazers_count": 321, "stargazers_count": 327,
"watchers_count": 321, "watchers_count": 327,
"forks_count": 90, "forks_count": 93,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 90, "forks": 93,
"watchers": 321, "watchers": 327,
"score": 0 "score": 0
}, },
{ {
@ -858,11 +858,11 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks", "description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"fork": false, "fork": false,
"created_at": "2021-12-10T22:35:00Z", "created_at": "2021-12-10T22:35:00Z",
"updated_at": "2022-01-19T19:52:05Z", "updated_at": "2022-01-20T06:01:40Z",
"pushed_at": "2022-01-15T16:18:44Z", "pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 638, "stargazers_count": 643,
"watchers_count": 638, "watchers_count": 643,
"forks_count": 98, "forks_count": 100,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [ "topics": [
@ -887,8 +887,8 @@
"writeups" "writeups"
], ],
"visibility": "public", "visibility": "public",
"forks": 98, "forks": 100,
"watchers": 638, "watchers": 643,
"score": 0 "score": 0
}, },
{ {
@ -905,11 +905,11 @@
"description": "A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability. ", "description": "A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability. ",
"fork": false, "fork": false,
"created_at": "2021-12-10T23:19:28Z", "created_at": "2021-12-10T23:19:28Z",
"updated_at": "2022-01-19T12:09:00Z", "updated_at": "2022-01-20T03:01:43Z",
"pushed_at": "2022-01-02T07:12:10Z", "pushed_at": "2022-01-02T07:12:10Z",
"stargazers_count": 1179, "stargazers_count": 1181,
"watchers_count": 1179, "watchers_count": 1181,
"forks_count": 306, "forks_count": 307,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [ "topics": [
@ -919,8 +919,8 @@
"security" "security"
], ],
"visibility": "public", "visibility": "public",
"forks": 306, "forks": 307,
"watchers": 1179, "watchers": 1181,
"score": 0 "score": 0
}, },
{ {
@ -1233,10 +1233,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks", "description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false, "fork": false,
"created_at": "2021-12-11T07:19:11Z", "created_at": "2021-12-11T07:19:11Z",
"updated_at": "2022-01-19T10:39:45Z", "updated_at": "2022-01-20T03:05:06Z",
"pushed_at": "2022-01-11T05:46:22Z", "pushed_at": "2022-01-11T05:46:22Z",
"stargazers_count": 191, "stargazers_count": 194,
"watchers_count": 191, "watchers_count": 194,
"forks_count": 55, "forks_count": 55,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -1248,7 +1248,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 55, "forks": 55,
"watchers": 191, "watchers": 194,
"score": 0 "score": 0
}, },
{ {
@ -1885,10 +1885,10 @@
"description": "Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!", "description": "Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!",
"fork": false, "fork": false,
"created_at": "2021-12-12T00:29:03Z", "created_at": "2021-12-12T00:29:03Z",
"updated_at": "2022-01-19T10:25:03Z", "updated_at": "2022-01-20T04:30:24Z",
"pushed_at": "2022-01-17T19:47:41Z", "pushed_at": "2022-01-17T19:47:41Z",
"stargazers_count": 586, "stargazers_count": 587,
"watchers_count": 586, "watchers_count": 587,
"forks_count": 94, "forks_count": 94,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -1907,7 +1907,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 94, "forks": 94,
"watchers": 586, "watchers": 587,
"score": 0 "score": 0
}, },
{ {
@ -2900,7 +2900,7 @@
"fork": false, "fork": false,
"created_at": "2021-12-12T15:44:49Z", "created_at": "2021-12-12T15:44:49Z",
"updated_at": "2021-12-29T15:10:45Z", "updated_at": "2021-12-29T15:10:45Z",
"pushed_at": "2022-01-19T16:49:31Z", "pushed_at": "2022-01-20T04:30:27Z",
"stargazers_count": 1, "stargazers_count": 1,
"watchers_count": 1, "watchers_count": 1,
"forks_count": 1, "forks_count": 1,
@ -3539,17 +3539,17 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ", "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false, "fork": false,
"created_at": "2021-12-13T03:57:50Z", "created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-01-19T12:28:20Z", "updated_at": "2022-01-20T02:04:22Z",
"pushed_at": "2022-01-02T20:21:42Z", "pushed_at": "2022-01-02T20:21:42Z",
"stargazers_count": 2631, "stargazers_count": 2633,
"watchers_count": 2631, "watchers_count": 2633,
"forks_count": 629, "forks_count": 630,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 629, "forks": 630,
"watchers": 2631, "watchers": 2633,
"score": 0 "score": 0
}, },
{ {
@ -3570,12 +3570,12 @@
"pushed_at": "2022-01-16T11:35:37Z", "pushed_at": "2022-01-16T11:35:37Z",
"stargazers_count": 254, "stargazers_count": 254,
"watchers_count": 254, "watchers_count": 254,
"forks_count": 90, "forks_count": 89,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 90, "forks": 89,
"watchers": 254, "watchers": 254,
"score": 0 "score": 0
}, },
@ -5152,17 +5152,17 @@
"description": "Log4j2 CVE-2021-44228 revshell, ofc it suck!!", "description": "Log4j2 CVE-2021-44228 revshell, ofc it suck!!",
"fork": false, "fork": false,
"created_at": "2021-12-14T05:24:52Z", "created_at": "2021-12-14T05:24:52Z",
"updated_at": "2021-12-21T19:48:59Z", "updated_at": "2022-01-20T04:21:09Z",
"pushed_at": "2021-12-21T19:48:57Z", "pushed_at": "2021-12-21T19:48:57Z",
"stargazers_count": 10, "stargazers_count": 11,
"watchers_count": 10, "watchers_count": 11,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 10, "watchers": 11,
"score": 0 "score": 0
}, },
{ {
@ -5938,7 +5938,7 @@
"fork": false, "fork": false,
"created_at": "2021-12-14T22:27:14Z", "created_at": "2021-12-14T22:27:14Z",
"updated_at": "2022-01-18T06:51:44Z", "updated_at": "2022-01-18T06:51:44Z",
"pushed_at": "2022-01-19T00:27:48Z", "pushed_at": "2022-01-20T01:23:43Z",
"stargazers_count": 12, "stargazers_count": 12,
"watchers_count": 12, "watchers_count": 12,
"forks_count": 7, "forks_count": 7,
@ -6999,12 +6999,12 @@
"pushed_at": "2021-12-16T10:36:13Z", "pushed_at": "2021-12-16T10:36:13Z",
"stargazers_count": 3, "stargazers_count": 3,
"watchers_count": 3, "watchers_count": 3,
"forks_count": 0, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 1,
"watchers": 3, "watchers": 3,
"score": 0 "score": 0
}, },

View file

@ -17,12 +17,12 @@
"pushed_at": "2022-01-13T02:24:32Z", "pushed_at": "2022-01-13T02:24:32Z",
"stargazers_count": 17, "stargazers_count": 17,
"watchers_count": 17, "watchers_count": 17,
"forks_count": 0, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 1,
"watchers": 17, "watchers": 17,
"score": 0 "score": 0
} }

View file

@ -37,20 +37,20 @@
"html_url": "https:\/\/github.com\/antx-code" "html_url": "https:\/\/github.com\/antx-code"
}, },
"html_url": "https:\/\/github.com\/antx-code\/CVE-2022-21907", "html_url": "https:\/\/github.com\/antx-code\/CVE-2022-21907",
"description": "Windows HTTP协议栈远程代码执行漏洞 CVE-2022-21907", "description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907",
"fork": false, "fork": false,
"created_at": "2022-01-17T02:28:50Z", "created_at": "2022-01-17T02:28:50Z",
"updated_at": "2022-01-20T00:13:19Z", "updated_at": "2022-01-20T06:06:23Z",
"pushed_at": "2022-01-19T13:06:17Z", "pushed_at": "2022-01-20T02:07:59Z",
"stargazers_count": 262, "stargazers_count": 271,
"watchers_count": 262, "watchers_count": 271,
"forks_count": 77, "forks_count": 82,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 77, "forks": 82,
"watchers": 262, "watchers": 271,
"score": 0 "score": 0
}, },
{ {
@ -94,10 +94,10 @@
"description": "Proof of concept of CVE-2022-21907 Double Free in http.sys driver, triggering a kernel crash on IIS servers", "description": "Proof of concept of CVE-2022-21907 Double Free in http.sys driver, triggering a kernel crash on IIS servers",
"fork": false, "fork": false,
"created_at": "2022-01-17T15:42:37Z", "created_at": "2022-01-17T15:42:37Z",
"updated_at": "2022-01-19T15:47:47Z", "updated_at": "2022-01-20T05:02:53Z",
"pushed_at": "2022-01-18T14:58:44Z", "pushed_at": "2022-01-18T14:58:44Z",
"stargazers_count": 29, "stargazers_count": 34,
"watchers_count": 29, "watchers_count": 34,
"forks_count": 6, "forks_count": 6,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -111,7 +111,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 6, "forks": 6,
"watchers": 29, "watchers": 34,
"score": 0 "score": 0
} }
] ]