Auto Update 2021/04/27 18:11:33

This commit is contained in:
motikan2010-bot 2021-04-27 18:11:33 +09:00
parent d782f4e13e
commit 1079593e58
37 changed files with 217 additions and 156 deletions

View file

@ -13,13 +13,13 @@
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
"fork": false,
"created_at": "2013-09-22T21:20:31Z",
"updated_at": "2021-04-25T13:06:08Z",
"updated_at": "2021-04-27T08:47:41Z",
"pushed_at": "2017-04-24T14:16:56Z",
"stargazers_count": 301,
"watchers_count": 301,
"stargazers_count": 302,
"watchers_count": 302,
"forks_count": 92,
"forks": 92,
"watchers": 301,
"watchers": 302,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-04-26T15:04:21Z",
"updated_at": "2021-04-27T06:58:00Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1007,
"watchers_count": 1007,
"stargazers_count": 1008,
"watchers_count": 1008,
"forks_count": 229,
"forks": 229,
"watchers": 1007,
"watchers": 1008,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-04-26T15:04:21Z",
"updated_at": "2021-04-27T06:58:00Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1007,
"watchers_count": 1007,
"stargazers_count": 1008,
"watchers_count": 1008,
"forks_count": 229,
"forks": 229,
"watchers": 1007,
"watchers": 1008,
"score": 0
},
{

View file

@ -59,7 +59,7 @@
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
"fork": false,
"created_at": "2017-11-21T05:55:53Z",
"updated_at": "2021-04-20T08:13:24Z",
"updated_at": "2021-04-27T05:09:39Z",
"pushed_at": "2017-11-29T03:33:53Z",
"stargazers_count": 489,
"watchers_count": 489,

View file

@ -13,13 +13,13 @@
"description": "Case study and POC of CVE-2017-12635: Apache CouchDB 1.7.0 \/ 2.x < 2.1.1 - Remote Privilege Escalation",
"fork": false,
"created_at": "2019-11-07T20:02:31Z",
"updated_at": "2020-12-22T00:04:57Z",
"updated_at": "2021-04-27T04:39:00Z",
"pushed_at": "2019-12-15T15:19:00Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-08-25T12:01:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 4,
"forks": 4,
"forks_count": 5,
"forks": 5,
"watchers": 0,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-04-26T15:04:21Z",
"updated_at": "2021-04-27T06:58:00Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1007,
"watchers_count": 1007,
"stargazers_count": 1008,
"watchers_count": 1008,
"forks_count": 229,
"forks": 229,
"watchers": 1007,
"watchers": 1008,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "海康威视未授权访问检测poc及口令爆破",
"fork": false,
"created_at": "2020-11-12T09:02:10Z",
"updated_at": "2021-04-24T18:18:01Z",
"updated_at": "2021-04-27T08:25:45Z",
"pushed_at": "2020-11-19T08:58:04Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 2,
"forks": 2,
"watchers": 22,
"watchers": 23,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "Exploit written in Python for CVE-2018-15473 with threading and export formats",
"fork": false,
"created_at": "2018-08-21T00:09:56Z",
"updated_at": "2021-04-21T08:54:06Z",
"updated_at": "2021-04-27T07:31:47Z",
"pushed_at": "2020-08-18T00:00:15Z",
"stargazers_count": 437,
"watchers_count": 437,
"stargazers_count": 438,
"watchers_count": 438,
"forks_count": 150,
"forks": 150,
"watchers": 437,
"watchers": 438,
"score": 0
},
{

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-04-26T15:04:21Z",
"updated_at": "2021-04-27T06:58:00Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1007,
"watchers_count": 1007,
"stargazers_count": 1008,
"watchers_count": 1008,
"forks_count": 229,
"forks": 229,
"watchers": 1007,
"watchers": 1008,
"score": 0
},
{

View file

@ -473,8 +473,8 @@
"description": null,
"fork": false,
"created_at": "2020-10-18T14:01:59Z",
"updated_at": "2021-04-26T03:15:53Z",
"pushed_at": "2021-04-26T03:15:16Z",
"updated_at": "2021-04-27T05:19:53Z",
"pushed_at": "2021-04-27T05:19:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -270,8 +270,8 @@
"pushed_at": "2018-04-26T15:40:28Z",
"stargazers_count": 85,
"watchers_count": 85,
"forks_count": 43,
"forks": 43,
"forks_count": 42,
"forks": 42,
"watchers": 85,
"score": 0
},

25
2019/CVE-2019-12725.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 361970258,
"name": "CVE-2019-12725",
"full_name": "givemefivw\/CVE-2019-12725",
"owner": {
"login": "givemefivw",
"id": 65514141,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65514141?v=4",
"html_url": "https:\/\/github.com\/givemefivw"
},
"html_url": "https:\/\/github.com\/givemefivw\/CVE-2019-12725",
"description": "CVE-2019-12725 ZeroShell 远程命令执行漏洞",
"fork": false,
"created_at": "2021-04-27T03:36:33Z",
"updated_at": "2021-04-27T03:41:35Z",
"pushed_at": "2021-04-27T03:41:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Connect Box CH7465LG (CVE-2019-13025)",
"fork": false,
"created_at": "2019-10-01T20:53:47Z",
"updated_at": "2021-04-22T19:30:47Z",
"updated_at": "2021-04-27T03:21:23Z",
"pushed_at": "2019-10-04T18:40:51Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 6,
"forks": 6,
"watchers": 31,
"watchers": 32,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-04-26T09:34:44Z",
"updated_at": "2021-04-27T09:10:34Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2533,
"watchers_count": 2533,
"forks_count": 735,
"forks": 735,
"watchers": 2533,
"stargazers_count": 2535,
"watchers_count": 2535,
"forks_count": 737,
"forks": 737,
"watchers": 2535,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
"fork": false,
"created_at": "2020-01-11T00:08:27Z",
"updated_at": "2021-04-19T10:41:54Z",
"updated_at": "2021-04-27T04:00:07Z",
"pushed_at": "2020-01-22T20:23:51Z",
"stargazers_count": 527,
"watchers_count": 527,
"stargazers_count": 528,
"watchers_count": 528,
"forks_count": 122,
"forks": 122,
"watchers": 527,
"watchers": 528,
"score": 0
},
{

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-04-26T15:04:21Z",
"updated_at": "2021-04-27T06:58:00Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1007,
"watchers_count": 1007,
"stargazers_count": 1008,
"watchers_count": 1008,
"forks_count": 229,
"forks": 229,
"watchers": 1007,
"watchers": 1008,
"score": 0
}
]

View file

@ -224,8 +224,8 @@
"pushed_at": "2019-06-21T03:33:05Z",
"stargazers_count": 146,
"watchers_count": 146,
"forks_count": 63,
"forks": 63,
"forks_count": 62,
"forks": 62,
"watchers": 146,
"score": 0
},

View file

@ -13,8 +13,8 @@
"description": "A Test and Debug Tool for ASPEED BMC AHB Interfaces",
"fork": false,
"created_at": "2019-02-21T22:49:53Z",
"updated_at": "2021-04-27T02:28:56Z",
"pushed_at": "2021-04-27T02:28:52Z",
"updated_at": "2021-04-27T03:35:46Z",
"pushed_at": "2021-04-27T03:35:44Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 8,

View file

@ -13,13 +13,13 @@
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
"fork": false,
"created_at": "2020-06-08T07:37:49Z",
"updated_at": "2021-04-22T19:20:28Z",
"updated_at": "2021-04-27T09:11:05Z",
"pushed_at": "2020-06-17T13:41:23Z",
"stargazers_count": 360,
"watchers_count": 360,
"stargazers_count": 361,
"watchers_count": 361,
"forks_count": 64,
"forks": 64,
"watchers": 360,
"watchers": 361,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-04-26T09:34:44Z",
"updated_at": "2021-04-27T09:10:34Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2533,
"watchers_count": 2533,
"forks_count": 735,
"forks": 735,
"watchers": 2533,
"stargazers_count": 2535,
"watchers_count": 2535,
"forks_count": 737,
"forks": 737,
"watchers": 2535,
"score": 0
},
{

View file

@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-04-27T02:51:22Z",
"updated_at": "2021-04-27T08:07:39Z",
"pushed_at": "2021-04-26T02:30:11Z",
"stargazers_count": 678,
"watchers_count": 678,
"forks_count": 188,
"forks": 188,
"watchers": 678,
"stargazers_count": 682,
"watchers_count": 682,
"forks_count": 191,
"forks": 191,
"watchers": 682,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-12-18T00:57:50Z",
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 20,
"forks": 20,
"forks_count": 19,
"forks": 19,
"watchers": 40,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-04-26T15:04:21Z",
"updated_at": "2021-04-27T06:58:00Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1007,
"watchers_count": 1007,
"stargazers_count": 1008,
"watchers_count": 1008,
"forks_count": 229,
"forks": 229,
"watchers": 1007,
"watchers": 1008,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "CVE-2020-8840FasterXML\/jackson-databind 远程代码执行漏洞",
"fork": false,
"created_at": "2020-02-24T07:43:12Z",
"updated_at": "2021-04-04T20:18:12Z",
"updated_at": "2021-04-27T07:19:06Z",
"pushed_at": "2020-02-24T07:45:37Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 8,
"forks": 8,
"watchers": 24,
"watchers": 25,
"score": 0
},
{

25
2021/CVE-2021-11123.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 361967513,
"name": "cve-2021-11123",
"full_name": "chenanu123\/cve-2021-11123",
"owner": {
"login": "chenanu123",
"id": 59187344,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59187344?v=4",
"html_url": "https:\/\/github.com\/chenanu123"
},
"html_url": "https:\/\/github.com\/chenanu123\/cve-2021-11123",
"description": "测试用的",
"fork": false,
"created_at": "2021-04-27T03:23:24Z",
"updated_at": "2021-04-27T03:23:26Z",
"pushed_at": "2021-04-27T03:23:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2021-1732 Exploit",
"fork": false,
"created_at": "2021-03-05T02:11:10Z",
"updated_at": "2021-04-25T06:53:32Z",
"updated_at": "2021-04-27T07:48:44Z",
"pushed_at": "2021-03-05T03:10:26Z",
"stargazers_count": 281,
"watchers_count": 281,
"stargazers_count": 282,
"watchers_count": 282,
"forks_count": 66,
"forks": 66,
"watchers": 281,
"watchers": 282,
"score": 0
},
{
@ -105,13 +105,13 @@
"description": "CVE-2021-1732 poc & exp; tested on 20H2",
"fork": false,
"created_at": "2021-04-23T08:21:54Z",
"updated_at": "2021-04-26T19:19:33Z",
"updated_at": "2021-04-27T08:27:04Z",
"pushed_at": "2021-04-23T08:28:53Z",
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 8,
"forks": 8,
"watchers": 37,
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 9,
"forks": 9,
"watchers": 39,
"score": 0
},
{
@ -128,13 +128,13 @@
"description": "Read my blog for more info - ",
"fork": false,
"created_at": "2021-04-25T12:55:15Z",
"updated_at": "2021-04-25T15:12:48Z",
"updated_at": "2021-04-27T08:09:49Z",
"pushed_at": "2021-04-25T14:16:30Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2021-02-10T14:38:05Z",
"updated_at": "2021-04-22T13:41:30Z",
"updated_at": "2021-04-27T07:29:37Z",
"pushed_at": "2021-02-10T14:39:04Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 4,
"forks": 4,
"watchers": 20,
"watchers": 22,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "🐱‍💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...",
"fork": false,
"created_at": "2021-03-22T11:53:57Z",
"updated_at": "2021-04-23T00:46:54Z",
"updated_at": "2021-04-27T06:27:27Z",
"pushed_at": "2021-03-22T18:24:20Z",
"stargazers_count": 104,
"watchers_count": 104,
"forks_count": 14,
"forks": 14,
"watchers": 104,
"stargazers_count": 105,
"watchers_count": 105,
"forks_count": 15,
"forks": 15,
"watchers": 105,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2021-22192 靶场: 未授权用户 RCE 漏洞",
"fork": false,
"created_at": "2021-03-27T07:09:46Z",
"updated_at": "2021-04-26T10:43:20Z",
"pushed_at": "2021-04-26T10:43:18Z",
"stargazers_count": 19,
"watchers_count": 19,
"updated_at": "2021-04-27T09:10:33Z",
"pushed_at": "2021-04-27T07:08:19Z",
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 3,
"forks": 3,
"watchers": 19,
"watchers": 20,
"score": 0
},
{

View file

@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-04-27T02:51:22Z",
"updated_at": "2021-04-27T08:07:39Z",
"pushed_at": "2021-04-26T02:30:11Z",
"stargazers_count": 678,
"watchers_count": 678,
"forks_count": 188,
"forks": 188,
"watchers": 678,
"stargazers_count": 682,
"watchers_count": 682,
"forks_count": 191,
"forks": 191,
"watchers": 682,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2021-04-26T14:21:30Z",
"updated_at": "2021-04-27T02:07:52Z",
"updated_at": "2021-04-27T04:29:35Z",
"pushed_at": "2021-04-26T14:23:48Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks": 0,
"watchers": 5,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"forks": 1,
"watchers": 7,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-30481",
"fork": false,
"created_at": "2021-04-17T01:29:31Z",
"updated_at": "2021-04-25T06:42:29Z",
"updated_at": "2021-04-27T08:58:39Z",
"pushed_at": "2021-04-20T16:00:46Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 4,
"forks": 4,
"watchers": 32,
"watchers": 33,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exploit for CVE-2021-3129",
"fork": false,
"created_at": "2021-01-13T12:52:20Z",
"updated_at": "2021-04-24T16:03:04Z",
"updated_at": "2021-04-27T06:19:08Z",
"pushed_at": "2021-01-29T13:59:07Z",
"stargazers_count": 106,
"watchers_count": 106,
"stargazers_count": 107,
"watchers_count": 107,
"forks_count": 21,
"forks": 21,
"watchers": 106,
"watchers": 107,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": null,
"fork": false,
"created_at": "2021-01-25T08:42:28Z",
"updated_at": "2021-04-25T14:13:29Z",
"updated_at": "2021-04-27T06:53:20Z",
"pushed_at": "2021-01-25T08:49:59Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 1,
"forks": 1,
"watchers": 8,
"watchers": 9,
"score": 0
},
{

View file

@ -404,13 +404,13 @@
"description": null,
"fork": false,
"created_at": "2021-01-31T03:38:37Z",
"updated_at": "2021-02-01T05:02:49Z",
"updated_at": "2021-04-27T07:32:37Z",
"pushed_at": "2021-01-31T04:02:08Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 6,
"forks": 6,
"watchers": 4,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 8,
"forks": 8,
"watchers": 6,
"score": 0
},
{
@ -661,8 +661,8 @@
"pushed_at": "2021-02-03T22:28:14Z",
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 17,
"forks": 17,
"forks_count": 18,
"forks": 18,
"watchers": 38,
"score": 0
},
@ -891,8 +891,8 @@
"pushed_at": "2021-03-30T14:44:38Z",
"stargazers_count": 284,
"watchers_count": 284,
"forks_count": 46,
"forks": 46,
"forks_count": 47,
"forks": 47,
"watchers": 284,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻‍💻",
"fork": false,
"created_at": "2021-03-26T01:09:25Z",
"updated_at": "2021-04-26T18:21:45Z",
"updated_at": "2021-04-27T03:31:23Z",
"pushed_at": "2021-04-26T18:21:42Z",
"stargazers_count": 189,
"watchers_count": 189,
"stargazers_count": 190,
"watchers_count": 190,
"forks_count": 33,
"forks": 33,
"watchers": 189,
"watchers": 190,
"score": 0
}
]

View file

@ -291,6 +291,9 @@ The overlayfs implementation in the linux kernel did not properly validate with
### CVE-2021-9999
- [Reach-Z/CVE-2021-9999](https://github.com/Reach-Z/CVE-2021-9999)
### CVE-2021-11123
- [chenanu123/cve-2021-11123](https://github.com/chenanu123/cve-2021-11123)
### CVE-2021-21014 (2021-02-11)
<code>
@ -7345,6 +7348,14 @@ DOSBox 0.74-2 has Incorrect Access Control.
- [Alexandre-Bartel/CVE-2019-12594](https://github.com/Alexandre-Bartel/CVE-2019-12594)
### CVE-2019-12725 (2019-07-19)
<code>
Zeroshell 3.9.0 is prone to a remote command execution vulnerability. Specifically, this issue occurs because the web application mishandles a few HTTP parameters. An unauthenticated attacker can exploit this issue by injecting OS commands inside the vulnerable parameters.
</code>
- [givemefivw/CVE-2019-12725](https://github.com/givemefivw/CVE-2019-12725)
### CVE-2019-12735 (2019-06-05)
<code>