Auto Update 2021/11/26 06:12:58

This commit is contained in:
motikan2010-bot 2021-11-26 15:12:58 +09:00
parent 7ae1592aec
commit 20798dd123
35 changed files with 295 additions and 127 deletions

View file

@ -13,17 +13,17 @@
"description": "CVE-2014-4210+Redis未授权访问", "description": "CVE-2014-4210+Redis未授权访问",
"fork": false, "fork": false,
"created_at": "2017-03-10T02:09:48Z", "created_at": "2017-03-10T02:09:48Z",
"updated_at": "2021-09-09T14:07:47Z", "updated_at": "2021-11-26T05:45:37Z",
"pushed_at": "2017-03-10T08:35:42Z", "pushed_at": "2017-03-10T08:35:42Z",
"stargazers_count": 89, "stargazers_count": 90,
"watchers_count": 89, "watchers_count": 90,
"forks_count": 35, "forks_count": 36,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 35, "forks": 36,
"watchers": 89, "watchers": 90,
"score": 0 "score": 0
}, },
{ {

View file

@ -429,17 +429,17 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。", "description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false, "fork": false,
"created_at": "2018-09-13T09:44:18Z", "created_at": "2018-09-13T09:44:18Z",
"updated_at": "2021-11-22T07:49:01Z", "updated_at": "2021-11-26T02:54:18Z",
"pushed_at": "2020-10-01T20:20:41Z", "pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 303, "stargazers_count": 304,
"watchers_count": 303, "watchers_count": 304,
"forks_count": 105, "forks_count": 105,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 105, "forks": 105,
"watchers": 303, "watchers": 304,
"score": 0 "score": 0
}, },
{ {

View file

@ -17,12 +17,12 @@
"pushed_at": "2017-10-11T07:43:50Z", "pushed_at": "2017-10-11T07:43:50Z",
"stargazers_count": 364, "stargazers_count": 364,
"watchers_count": 364, "watchers_count": 364,
"forks_count": 137, "forks_count": 136,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 137, "forks": 136,
"watchers": 364, "watchers": 364,
"score": 0 "score": 0
}, },

View file

@ -98,12 +98,12 @@
"pushed_at": "2021-08-18T08:18:42Z", "pushed_at": "2021-08-18T08:18:42Z",
"stargazers_count": 25, "stargazers_count": 25,
"watchers_count": 25, "watchers_count": 25,
"forks_count": 20, "forks_count": 21,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 20, "forks": 21,
"watchers": 25, "watchers": 25,
"score": 0 "score": 0
}, },

View file

@ -17,7 +17,7 @@
"pushed_at": "2018-01-09T22:27:25Z", "pushed_at": "2018-01-09T22:27:25Z",
"stargazers_count": 53, "stargazers_count": 53,
"watchers_count": 53, "watchers_count": 53,
"forks_count": 20, "forks_count": 19,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [ "topics": [
@ -27,7 +27,7 @@
"spectre" "spectre"
], ],
"visibility": "public", "visibility": "public",
"forks": 20, "forks": 19,
"watchers": 53, "watchers": 53,
"score": 0 "score": 0
}, },

View file

@ -154,17 +154,17 @@
"description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability", "description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability",
"fork": false, "fork": false,
"created_at": "2017-06-05T16:25:57Z", "created_at": "2017-06-05T16:25:57Z",
"updated_at": "2021-11-24T08:36:37Z", "updated_at": "2021-11-26T01:47:25Z",
"pushed_at": "2021-03-09T09:12:55Z", "pushed_at": "2021-03-09T09:12:55Z",
"stargazers_count": 243, "stargazers_count": 244,
"watchers_count": 243, "watchers_count": 244,
"forks_count": 81, "forks_count": 82,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 81, "forks": 82,
"watchers": 243, "watchers": 244,
"score": 0 "score": 0
}, },
{ {

View file

@ -210,17 +210,17 @@
"description": "FUEL CMS 1.4.1 allows PHP Code Evaluation via the pages\/select\/ filter parameter or the preview\/ data parameter. This can lead to Pre-Auth Remote Code Execution.", "description": "FUEL CMS 1.4.1 allows PHP Code Evaluation via the pages\/select\/ filter parameter or the preview\/ data parameter. This can lead to Pre-Auth Remote Code Execution.",
"fork": false, "fork": false,
"created_at": "2021-09-27T05:15:38Z", "created_at": "2021-09-27T05:15:38Z",
"updated_at": "2021-10-01T04:19:33Z", "updated_at": "2021-11-26T01:45:35Z",
"pushed_at": "2021-10-01T04:19:30Z", "pushed_at": "2021-10-01T04:19:30Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"forks_count": 3, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 3,
"watchers": 0, "watchers": 1,
"score": 0 "score": 0
}, },
{ {

View file

@ -77,7 +77,7 @@
"pushed_at": "2021-10-22T16:05:33Z", "pushed_at": "2021-10-22T16:05:33Z",
"stargazers_count": 4, "stargazers_count": 4,
"watchers_count": 4, "watchers_count": 4,
"forks_count": 2, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [ "topics": [
@ -86,7 +86,7 @@
"spectreexploit-poc" "spectreexploit-poc"
], ],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 1,
"watchers": 4, "watchers": 4,
"score": 0 "score": 0
}, },
@ -108,12 +108,12 @@
"pushed_at": "2019-06-26T14:34:46Z", "pushed_at": "2019-06-26T14:34:46Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"forks_count": 2, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 1,
"watchers": 0, "watchers": 0,
"score": 0 "score": 0
} }

View file

@ -861,5 +861,32 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0 "score": 0
},
{
"id": 432042415,
"name": "ANM_CVE-2018-7600",
"full_name": "vphnguyen\/ANM_CVE-2018-7600",
"owner": {
"login": "vphnguyen",
"id": 48557263,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48557263?v=4",
"html_url": "https:\/\/github.com\/vphnguyen"
},
"html_url": "https:\/\/github.com\/vphnguyen\/ANM_CVE-2018-7600",
"description": "Detect with python and tracking IP",
"fork": false,
"created_at": "2021-11-26T03:25:50Z",
"updated_at": "2021-11-26T03:27:00Z",
"pushed_at": "2021-11-26T03:26:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
} }
] ]

View file

@ -40,11 +40,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false, "fork": false,
"created_at": "2020-04-01T09:33:35Z", "created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-11-25T10:48:20Z", "updated_at": "2021-11-26T03:48:57Z",
"pushed_at": "2021-04-04T09:13:57Z", "pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2998, "stargazers_count": 2999,
"watchers_count": 2998, "watchers_count": 2999,
"forks_count": 887, "forks_count": 888,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [ "topics": [
@ -69,8 +69,8 @@
"webshell" "webshell"
], ],
"visibility": "public", "visibility": "public",
"forks": 887, "forks": 888,
"watchers": 2998, "watchers": 2999,
"score": 0 "score": 0
}, },
{ {

View file

@ -40,17 +40,17 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2020-12-31T15:40:28Z", "created_at": "2020-12-31T15:40:28Z",
"updated_at": "2021-07-23T07:02:27Z", "updated_at": "2021-11-26T04:25:25Z",
"pushed_at": "2021-01-22T09:38:16Z", "pushed_at": "2021-01-22T09:38:16Z",
"stargazers_count": 1, "stargazers_count": 2,
"watchers_count": 1, "watchers_count": 2,
"forks_count": 0, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 2,
"watchers": 1, "watchers": 2,
"score": 0 "score": 0
} }
] ]

View file

@ -44,12 +44,12 @@
"pushed_at": "2020-01-18T07:01:29Z", "pushed_at": "2020-01-18T07:01:29Z",
"stargazers_count": 369, "stargazers_count": 369,
"watchers_count": 369, "watchers_count": 369,
"forks_count": 124, "forks_count": 125,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 124, "forks": 125,
"watchers": 369, "watchers": 369,
"score": 0 "score": 0
}, },
@ -130,7 +130,7 @@
"pushed_at": "2020-01-11T14:03:52Z", "pushed_at": "2020-01-11T14:03:52Z",
"stargazers_count": 80, "stargazers_count": 80,
"watchers_count": 80, "watchers_count": 80,
"forks_count": 20, "forks_count": 21,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [ "topics": [
@ -138,7 +138,7 @@
"cve-2019-19781" "cve-2019-19781"
], ],
"visibility": "public", "visibility": "public",
"forks": 20, "forks": 21,
"watchers": 80, "watchers": 80,
"score": 0 "score": 0
}, },

View file

@ -13,17 +13,17 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。", "description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false, "fork": false,
"created_at": "2018-09-13T09:44:18Z", "created_at": "2018-09-13T09:44:18Z",
"updated_at": "2021-11-22T07:49:01Z", "updated_at": "2021-11-26T02:54:18Z",
"pushed_at": "2020-10-01T20:20:41Z", "pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 303, "stargazers_count": 304,
"watchers_count": 303, "watchers_count": 304,
"forks_count": 105, "forks_count": 105,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 105, "forks": 105,
"watchers": 303, "watchers": 304,
"score": 0 "score": 0
}, },
{ {
@ -202,17 +202,17 @@
"description": "CVE-2019-2725 命令回显", "description": "CVE-2019-2725 命令回显",
"fork": false, "fork": false,
"created_at": "2019-05-29T01:57:05Z", "created_at": "2019-05-29T01:57:05Z",
"updated_at": "2021-11-24T13:48:22Z", "updated_at": "2021-11-26T01:12:08Z",
"pushed_at": "2019-08-08T09:48:20Z", "pushed_at": "2019-08-08T09:48:20Z",
"stargazers_count": 409, "stargazers_count": 410,
"watchers_count": 409, "watchers_count": 410,
"forks_count": 162, "forks_count": 162,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 162, "forks": 162,
"watchers": 409, "watchers": 410,
"score": 0 "score": 0
}, },
{ {

View file

@ -126,17 +126,17 @@
"description": "Confluence 未授权 RCE (CVE-2019-3396) 漏洞", "description": "Confluence 未授权 RCE (CVE-2019-3396) 漏洞",
"fork": false, "fork": false,
"created_at": "2019-04-10T02:22:24Z", "created_at": "2019-04-10T02:22:24Z",
"updated_at": "2021-11-16T12:12:01Z", "updated_at": "2021-11-26T01:53:42Z",
"pushed_at": "2019-11-01T14:33:21Z", "pushed_at": "2019-11-01T14:33:21Z",
"stargazers_count": 132, "stargazers_count": 131,
"watchers_count": 132, "watchers_count": 131,
"forks_count": 59, "forks_count": 59,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 59, "forks": 59,
"watchers": 132, "watchers": 131,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,8 +13,8 @@
"description": "CVE-2019-6249 Hucart cms 复现环境", "description": "CVE-2019-6249 Hucart cms 复现环境",
"fork": false, "fork": false,
"created_at": "2019-02-21T08:03:43Z", "created_at": "2019-02-21T08:03:43Z",
"updated_at": "2020-03-25T03:29:55Z", "updated_at": "2021-11-26T03:17:33Z",
"pushed_at": "2019-02-21T08:22:34Z", "pushed_at": "2021-11-26T03:17:30Z",
"stargazers_count": 2, "stargazers_count": 2,
"watchers_count": 2, "watchers_count": 2,
"forks_count": 2, "forks_count": 2,

View file

@ -28,6 +28,60 @@
}, },
{ {
"id": 431880951, "id": 431880951,
"name": "CVE-2020-0133-packages_apps_Sett",
"full_name": "Nivaskumark\/CVE-2020-0133-packages_apps_Sett",
"owner": {
"login": "Nivaskumark",
"id": 90234286,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90234286?v=4",
"html_url": "https:\/\/github.com\/Nivaskumark"
},
"html_url": "https:\/\/github.com\/Nivaskumark\/CVE-2020-0133-packages_apps_Sett",
"description": null,
"fork": false,
"created_at": "2021-11-25T14:49:20Z",
"updated_at": "2021-11-26T01:29:39Z",
"pushed_at": "2021-11-25T14:56:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 432020855,
"name": "CVE-2020-0133-packages_apps_Setting",
"full_name": "Nivaskumark\/CVE-2020-0133-packages_apps_Setting",
"owner": {
"login": "Nivaskumark",
"id": 90234286,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90234286?v=4",
"html_url": "https:\/\/github.com\/Nivaskumark"
},
"html_url": "https:\/\/github.com\/Nivaskumark\/CVE-2020-0133-packages_apps_Setting",
"description": null,
"fork": false,
"created_at": "2021-11-26T01:29:58Z",
"updated_at": "2021-11-26T03:08:26Z",
"pushed_at": "2021-11-26T01:32:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 432039172,
"name": "CVE-2020-0133-packages_apps_Settings", "name": "CVE-2020-0133-packages_apps_Settings",
"full_name": "Nivaskumark\/CVE-2020-0133-packages_apps_Settings", "full_name": "Nivaskumark\/CVE-2020-0133-packages_apps_Settings",
"owner": { "owner": {
@ -39,9 +93,36 @@
"html_url": "https:\/\/github.com\/Nivaskumark\/CVE-2020-0133-packages_apps_Settings", "html_url": "https:\/\/github.com\/Nivaskumark\/CVE-2020-0133-packages_apps_Settings",
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2021-11-25T14:49:20Z", "created_at": "2021-11-26T03:08:47Z",
"updated_at": "2021-11-25T15:00:12Z", "updated_at": "2021-11-26T03:36:35Z",
"pushed_at": "2021-11-25T14:56:55Z", "pushed_at": "2021-11-26T03:12:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 432040747,
"name": "CVE-2020-0133-packages_apps_Settings_fix",
"full_name": "Nivaskumark\/CVE-2020-0133-packages_apps_Settings_fix",
"owner": {
"login": "Nivaskumark",
"id": 90234286,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90234286?v=4",
"html_url": "https:\/\/github.com\/Nivaskumark"
},
"html_url": "https:\/\/github.com\/Nivaskumark\/CVE-2020-0133-packages_apps_Settings_fix",
"description": null,
"fork": false,
"created_at": "2021-11-26T03:17:14Z",
"updated_at": "2021-11-26T03:36:14Z",
"pushed_at": "2021-11-26T03:21:22Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"forks_count": 0, "forks_count": 0,

View file

@ -186,12 +186,12 @@
"pushed_at": "2020-09-16T14:05:27Z", "pushed_at": "2020-09-16T14:05:27Z",
"stargazers_count": 150, "stargazers_count": 150,
"watchers_count": 150, "watchers_count": 150,
"forks_count": 39, "forks_count": 38,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 39, "forks": 38,
"watchers": 150, "watchers": 150,
"score": 0 "score": 0
}, },

View file

@ -13,11 +13,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false, "fork": false,
"created_at": "2020-04-01T09:33:35Z", "created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-11-25T10:48:20Z", "updated_at": "2021-11-26T03:48:57Z",
"pushed_at": "2021-04-04T09:13:57Z", "pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2998, "stargazers_count": 2999,
"watchers_count": 2998, "watchers_count": 2999,
"forks_count": 887, "forks_count": 888,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [ "topics": [
@ -42,8 +42,8 @@
"webshell" "webshell"
], ],
"visibility": "public", "visibility": "public",
"forks": 887, "forks": 888,
"watchers": 2998, "watchers": 2999,
"score": 0 "score": 0
}, },
{ {

View file

@ -2,14 +2,14 @@
{ {
"id": 327564361, "id": 327564361,
"name": "get-pixels-updated", "name": "get-pixels-updated",
"full_name": "sysollie\/get-pixels-updated", "full_name": "knokbak\/get-pixels-updated",
"owner": { "owner": {
"login": "sysollie", "login": "knokbak",
"id": 65198941, "id": 65198941,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65198941?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65198941?v=4",
"html_url": "https:\/\/github.com\/sysollie" "html_url": "https:\/\/github.com\/knokbak"
}, },
"html_url": "https:\/\/github.com\/sysollie\/get-pixels-updated", "html_url": "https:\/\/github.com\/knokbak\/get-pixels-updated",
"description": "An updated version of get-pixels that patches the CVE-2020-8175 security issue.", "description": "An updated version of get-pixels that patches the CVE-2020-8175 security issue.",
"fork": false, "fork": false,
"created_at": "2021-01-07T09:31:26Z", "created_at": "2021-01-07T09:31:26Z",
@ -29,14 +29,14 @@
{ {
"id": 327580889, "id": 327580889,
"name": "save-pixels-updated", "name": "save-pixels-updated",
"full_name": "sysollie\/save-pixels-updated", "full_name": "knokbak\/save-pixels-updated",
"owner": { "owner": {
"login": "sysollie", "login": "knokbak",
"id": 65198941, "id": 65198941,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65198941?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65198941?v=4",
"html_url": "https:\/\/github.com\/sysollie" "html_url": "https:\/\/github.com\/knokbak"
}, },
"html_url": "https:\/\/github.com\/sysollie\/save-pixels-updated", "html_url": "https:\/\/github.com\/knokbak\/save-pixels-updated",
"description": "An updated version of save-pixels that patches the CVE-2020-8175 security issue.", "description": "An updated version of save-pixels that patches the CVE-2020-8175 security issue.",
"fork": false, "fork": false,
"created_at": "2021-01-07T10:41:09Z", "created_at": "2021-01-07T10:41:09Z",

View file

@ -40,17 +40,17 @@
"description": "来源于jackson-CVE-2020-8840需要开autotype", "description": "来源于jackson-CVE-2020-8840需要开autotype",
"fork": false, "fork": false,
"created_at": "2020-02-23T03:51:40Z", "created_at": "2020-02-23T03:51:40Z",
"updated_at": "2021-11-16T12:11:48Z", "updated_at": "2021-11-26T01:54:07Z",
"pushed_at": "2020-06-15T22:01:49Z", "pushed_at": "2020-06-15T22:01:49Z",
"stargazers_count": 15, "stargazers_count": 14,
"watchers_count": 15, "watchers_count": 14,
"forks_count": 5, "forks_count": 5,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 5, "forks": 5,
"watchers": 15, "watchers": 14,
"score": 0 "score": 0
}, },
{ {

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-08-05T06:47:48Z", "pushed_at": "2021-08-05T06:47:48Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"forks_count": 0, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 2,
"watchers": 0, "watchers": 0,
"score": 0 "score": 0
} }

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-08-02T16:14:44Z", "pushed_at": "2021-08-02T16:14:44Z",
"stargazers_count": 4, "stargazers_count": 4,
"watchers_count": 4, "watchers_count": 4,
"forks_count": 4, "forks_count": 5,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 5,
"watchers": 4, "watchers": 4,
"score": 0 "score": 0
} }

View file

@ -274,17 +274,17 @@
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)", "description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
"fork": false, "fork": false,
"created_at": "2021-07-01T23:45:58Z", "created_at": "2021-07-01T23:45:58Z",
"updated_at": "2021-11-25T19:38:55Z", "updated_at": "2021-11-26T03:42:14Z",
"pushed_at": "2021-07-05T08:54:06Z", "pushed_at": "2021-07-05T08:54:06Z",
"stargazers_count": 683, "stargazers_count": 684,
"watchers_count": 683, "watchers_count": 684,
"forks_count": 187, "forks_count": 188,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 187, "forks": 188,
"watchers": 683, "watchers": 684,
"score": 0 "score": 0
}, },
{ {

View file

@ -71,12 +71,12 @@
"pushed_at": "2021-03-05T11:09:06Z", "pushed_at": "2021-03-05T11:09:06Z",
"stargazers_count": 22, "stargazers_count": 22,
"watchers_count": 22, "watchers_count": 22,
"forks_count": 4, "forks_count": 5,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 5,
"watchers": 22, "watchers": 22,
"score": 0 "score": 0
} }

View file

@ -121,7 +121,7 @@
"description": "CVE-2021-22005 - VMWare vCenter Server File Upload to RCE", "description": "CVE-2021-22005 - VMWare vCenter Server File Upload to RCE",
"fork": false, "fork": false,
"created_at": "2021-09-25T16:21:56Z", "created_at": "2021-09-25T16:21:56Z",
"updated_at": "2021-11-09T09:20:15Z", "updated_at": "2021-11-26T06:08:33Z",
"pushed_at": "2021-10-02T03:17:45Z", "pushed_at": "2021-10-02T03:17:45Z",
"stargazers_count": 173, "stargazers_count": 173,
"watchers_count": 173, "watchers_count": 173,
@ -179,12 +179,12 @@
"pushed_at": "2021-09-28T21:08:21Z", "pushed_at": "2021-09-28T21:08:21Z",
"stargazers_count": 16, "stargazers_count": 16,
"watchers_count": 16, "watchers_count": 16,
"forks_count": 16, "forks_count": 15,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 16, "forks": 15,
"watchers": 16, "watchers": 16,
"score": 0 "score": 0
}, },

View file

@ -13,11 +13,11 @@
"description": "Atlassian Jira Server\/Data Center 8.4.0 - Arbitrary File read (CVE-2021-26086)", "description": "Atlassian Jira Server\/Data Center 8.4.0 - Arbitrary File read (CVE-2021-26086)",
"fork": false, "fork": false,
"created_at": "2021-10-05T14:09:52Z", "created_at": "2021-10-05T14:09:52Z",
"updated_at": "2021-11-05T07:00:15Z", "updated_at": "2021-11-26T05:52:56Z",
"pushed_at": "2021-10-12T05:16:48Z", "pushed_at": "2021-10-12T05:16:48Z",
"stargazers_count": 5, "stargazers_count": 6,
"watchers_count": 5, "watchers_count": 6,
"forks_count": 2, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [ "topics": [
@ -26,8 +26,8 @@
"jira" "jira"
], ],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 3,
"watchers": 5, "watchers": 6,
"score": 0 "score": 0
} }
] ]

View file

@ -456,12 +456,12 @@
"pushed_at": "2021-02-02T17:07:09Z", "pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 775, "stargazers_count": 775,
"watchers_count": 775, "watchers_count": 775,
"forks_count": 228, "forks_count": 229,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 228, "forks": 229,
"watchers": 775, "watchers": 775,
"score": 0 "score": 0
}, },
@ -1023,7 +1023,7 @@
"description": "Sudo Baron Samedit Exploit", "description": "Sudo Baron Samedit Exploit",
"fork": false, "fork": false,
"created_at": "2021-03-15T17:37:02Z", "created_at": "2021-03-15T17:37:02Z",
"updated_at": "2021-11-25T07:06:41Z", "updated_at": "2021-11-26T02:10:15Z",
"pushed_at": "2021-11-04T23:56:50Z", "pushed_at": "2021-11-04T23:56:50Z",
"stargazers_count": 396, "stargazers_count": 396,
"watchers_count": 396, "watchers_count": 396,

View file

@ -71,12 +71,12 @@
"pushed_at": "2021-11-03T08:26:24Z", "pushed_at": "2021-11-03T08:26:24Z",
"stargazers_count": 6, "stargazers_count": 6,
"watchers_count": 6, "watchers_count": 6,
"forks_count": 3, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 4,
"watchers": 6, "watchers": 6,
"score": 0 "score": 0
} }

View file

@ -553,11 +553,11 @@
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit", "description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
"fork": false, "fork": false,
"created_at": "2021-09-15T22:34:35Z", "created_at": "2021-09-15T22:34:35Z",
"updated_at": "2021-11-24T06:27:37Z", "updated_at": "2021-11-26T02:16:59Z",
"pushed_at": "2021-10-12T23:05:07Z", "pushed_at": "2021-10-12T23:05:07Z",
"stargazers_count": 505, "stargazers_count": 506,
"watchers_count": 505, "watchers_count": 506,
"forks_count": 110, "forks_count": 111,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [ "topics": [
@ -569,8 +569,8 @@
"remote-code-execution" "remote-code-execution"
], ],
"visibility": "public", "visibility": "public",
"forks": 110, "forks": 111,
"watchers": 505, "watchers": 506,
"score": 0 "score": 0
}, },
{ {

View file

@ -46,7 +46,7 @@
"pushed_at": "2021-11-25T21:10:41Z", "pushed_at": "2021-11-25T21:10:41Z",
"stargazers_count": 4, "stargazers_count": 4,
"watchers_count": 4, "watchers_count": 4,
"forks_count": 3, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [ "topics": [
@ -54,7 +54,7 @@
"poc" "poc"
], ],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 4,
"watchers": 4, "watchers": 4,
"score": 0 "score": 0
}, },

View file

@ -2070,5 +2070,32 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0 "score": 0
},
{
"id": 432057910,
"name": "CVE-2021-41773",
"full_name": "jhye0n\/CVE-2021-41773",
"owner": {
"login": "jhye0n",
"id": 50125695,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50125695?v=4",
"html_url": "https:\/\/github.com\/jhye0n"
},
"html_url": "https:\/\/github.com\/jhye0n\/CVE-2021-41773",
"description": "CVE-2021-41773 Test Page & Exploit Code",
"fork": false,
"created_at": "2021-11-26T04:54:16Z",
"updated_at": "2021-11-26T05:18:05Z",
"pushed_at": "2021-11-26T05:18:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
} }
] ]

View file

@ -13,17 +13,17 @@
"description": "Microsoft Exchange Server Poc", "description": "Microsoft Exchange Server Poc",
"fork": false, "fork": false,
"created_at": "2021-11-23T02:26:26Z", "created_at": "2021-11-23T02:26:26Z",
"updated_at": "2021-11-25T12:25:50Z", "updated_at": "2021-11-26T04:46:43Z",
"pushed_at": "2021-11-23T02:33:47Z", "pushed_at": "2021-11-23T02:33:47Z",
"stargazers_count": 27, "stargazers_count": 29,
"watchers_count": 27, "watchers_count": 29,
"forks_count": 10, "forks_count": 11,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 10, "forks": 11,
"watchers": 27, "watchers": 29,
"score": 0 "score": 0
} }
] ]

View file

@ -132,12 +132,12 @@
"pushed_at": "2021-11-25T11:22:37Z", "pushed_at": "2021-11-25T11:22:37Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"forks_count": 0, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 1,
"watchers": 0, "watchers": 0,
"score": 0 "score": 0
} }

View file

@ -25,5 +25,32 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0 "score": 0
},
{
"id": 432024827,
"name": "CVE-2021-43267",
"full_name": "ohnonoyesyes\/CVE-2021-43267",
"owner": {
"login": "ohnonoyesyes",
"id": 93457304,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93457304?v=4",
"html_url": "https:\/\/github.com\/ohnonoyesyes"
},
"html_url": "https:\/\/github.com\/ohnonoyesyes\/CVE-2021-43267",
"description": "Local PoC exploit for CVE-2021-43267 (Linux TIPC)",
"fork": false,
"created_at": "2021-11-26T01:51:57Z",
"updated_at": "2021-11-26T04:01:24Z",
"pushed_at": "2021-11-26T01:54:47Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
} }
] ]

View file

@ -3239,6 +3239,7 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
- [ahmad4fifz/CVE-2021-41773](https://github.com/ahmad4fifz/CVE-2021-41773) - [ahmad4fifz/CVE-2021-41773](https://github.com/ahmad4fifz/CVE-2021-41773)
- [kubota/POC-CVE-2021-41773](https://github.com/kubota/POC-CVE-2021-41773) - [kubota/POC-CVE-2021-41773](https://github.com/kubota/POC-CVE-2021-41773)
- [xMohamed0/CVE-2021-41773](https://github.com/xMohamed0/CVE-2021-41773) - [xMohamed0/CVE-2021-41773](https://github.com/xMohamed0/CVE-2021-41773)
- [jhye0n/CVE-2021-41773](https://github.com/jhye0n/CVE-2021-41773)
### CVE-2021-41822 ### CVE-2021-41822
- [badboycxcc/CVE-2021-41822](https://github.com/badboycxcc/CVE-2021-41822) - [badboycxcc/CVE-2021-41822](https://github.com/badboycxcc/CVE-2021-41822)
@ -3439,6 +3440,7 @@ An issue was discovered in net/tipc/crypto.c in the Linux kernel before 5.14.16.
</code> </code>
- [DarkSprings/CVE-2021-43267-POC](https://github.com/DarkSprings/CVE-2021-43267-POC) - [DarkSprings/CVE-2021-43267-POC](https://github.com/DarkSprings/CVE-2021-43267-POC)
- [ohnonoyesyes/CVE-2021-43267](https://github.com/ohnonoyesyes/CVE-2021-43267)
### CVE-2021-43361 (-) ### CVE-2021-43361 (-)
@ -3608,7 +3610,10 @@ In MockLocationAppPreferenceController.java, it is possible to mock the GPS loca
</code> </code>
- [Nivaskumark/CVE-2020-0133-packages_apps_Settings_nopatch](https://github.com/Nivaskumark/CVE-2020-0133-packages_apps_Settings_nopatch) - [Nivaskumark/CVE-2020-0133-packages_apps_Settings_nopatch](https://github.com/Nivaskumark/CVE-2020-0133-packages_apps_Settings_nopatch)
- [Nivaskumark/CVE-2020-0133-packages_apps_Sett](https://github.com/Nivaskumark/CVE-2020-0133-packages_apps_Sett)
- [Nivaskumark/CVE-2020-0133-packages_apps_Setting](https://github.com/Nivaskumark/CVE-2020-0133-packages_apps_Setting)
- [Nivaskumark/CVE-2020-0133-packages_apps_Settings](https://github.com/Nivaskumark/CVE-2020-0133-packages_apps_Settings) - [Nivaskumark/CVE-2020-0133-packages_apps_Settings](https://github.com/Nivaskumark/CVE-2020-0133-packages_apps_Settings)
- [Nivaskumark/CVE-2020-0133-packages_apps_Settings_fix](https://github.com/Nivaskumark/CVE-2020-0133-packages_apps_Settings_fix)
### CVE-2020-0551 (2020-03-12) ### CVE-2020-0551 (2020-03-12)
@ -5034,8 +5039,8 @@ A deserialization of untrusted data vulnernerability exists in rails &lt; 5.2.4.
Uncontrolled resource consumption in `jpeg-js` before 0.4.0 may allow attacker to launch denial of service attacks using specially a crafted JPEG image. Uncontrolled resource consumption in `jpeg-js` before 0.4.0 may allow attacker to launch denial of service attacks using specially a crafted JPEG image.
</code> </code>
- [sysollie/get-pixels-updated](https://github.com/sysollie/get-pixels-updated) - [knokbak/get-pixels-updated](https://github.com/knokbak/get-pixels-updated)
- [sysollie/save-pixels-updated](https://github.com/sysollie/save-pixels-updated) - [knokbak/save-pixels-updated](https://github.com/knokbak/save-pixels-updated)
### CVE-2020-8193 (2020-07-10) ### CVE-2020-8193 (2020-07-10)
@ -13157,6 +13162,7 @@ Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1
- [ludy-dev/drupal8-REST-RCE](https://github.com/ludy-dev/drupal8-REST-RCE) - [ludy-dev/drupal8-REST-RCE](https://github.com/ludy-dev/drupal8-REST-RCE)
- [0xAJ2K/CVE-2018-7600](https://github.com/0xAJ2K/CVE-2018-7600) - [0xAJ2K/CVE-2018-7600](https://github.com/0xAJ2K/CVE-2018-7600)
- [rafaelcaria/drupalgeddon2-CVE-2018-7600](https://github.com/rafaelcaria/drupalgeddon2-CVE-2018-7600) - [rafaelcaria/drupalgeddon2-CVE-2018-7600](https://github.com/rafaelcaria/drupalgeddon2-CVE-2018-7600)
- [vphnguyen/ANM_CVE-2018-7600](https://github.com/vphnguyen/ANM_CVE-2018-7600)
### CVE-2018-7602 (2018-07-19) ### CVE-2018-7602 (2018-07-19)