Auto Update 2021/11/27 18:12:52

This commit is contained in:
motikan2010-bot 2021-11-28 03:12:52 +09:00
parent f98d650c06
commit 2090e54c3d
11 changed files with 56 additions and 56 deletions

View file

@ -1647,17 +1647,17 @@
"description": "A python script intended to automate cgi-bin based exploitation of the ShellSchock vulnerability (CVE-2014-6271)",
"fork": false,
"created_at": "2021-10-25T16:13:48Z",
"updated_at": "2021-11-18T12:52:23Z",
"updated_at": "2021-11-27T17:59:13Z",
"pushed_at": "2021-10-28T14:09:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -283,17 +283,17 @@
"description": "WebLogic wls-wsat RCE CVE-2017-10271",
"fork": false,
"created_at": "2018-01-19T15:50:08Z",
"updated_at": "2020-09-24T10:47:12Z",
"updated_at": "2021-11-27T15:58:13Z",
"pushed_at": "2018-01-19T11:29:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 59,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 60,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 59,
"watchers": 0,
"forks": 60,
"watchers": 1,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2018-2893",
"fork": false,
"created_at": "2018-07-19T06:06:10Z",
"updated_at": "2020-12-10T06:55:01Z",
"updated_at": "2021-11-27T14:13:06Z",
"pushed_at": "2018-07-19T05:59:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 42,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 0,
"forks": 43,
"watchers": 1,
"score": 0
},
{

View file

@ -1430,17 +1430,17 @@
"description": "Working proof of concept for CVE-2019-0708, spawns remote shell.",
"fork": false,
"created_at": "2019-05-23T17:02:00Z",
"updated_at": "2019-08-17T15:27:52Z",
"updated_at": "2021-11-27T14:34:25Z",
"pushed_at": "2019-05-23T17:02:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 21,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 0,
"forks": 22,
"watchers": 1,
"score": 0
},
{

View file

@ -45,17 +45,17 @@
"description": "CVE-2019-17570 details and proof of concept",
"fork": false,
"created_at": "2020-01-25T15:39:48Z",
"updated_at": "2021-11-02T07:45:41Z",
"updated_at": "2021-11-27T14:34:01Z",
"pushed_at": "2020-01-24T11:52:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 8,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 0,
"forks": 9,
"watchers": 1,
"score": 0
}
]

View file

@ -42,10 +42,10 @@
"description": "CVE-2020-8958: Authenticated RCE exploit for NetLink HG323",
"fork": false,
"created_at": "2021-04-27T15:51:08Z",
"updated_at": "2021-06-26T11:35:45Z",
"updated_at": "2021-11-27T14:14:38Z",
"pushed_at": "2021-04-28T16:27:01Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -57,7 +57,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"description": null,
"fork": false,
"created_at": "2021-11-26T21:31:18Z",
"updated_at": "2021-11-26T21:38:08Z",
"pushed_at": "2021-11-26T21:38:06Z",
"updated_at": "2021-11-27T15:09:05Z",
"pushed_at": "2021-11-27T15:09:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -299,10 +299,10 @@
"description": "A fast tool to mass scan for a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin (CVE-2021-26855).",
"fork": false,
"created_at": "2021-03-08T11:54:32Z",
"updated_at": "2021-11-26T11:56:58Z",
"updated_at": "2021-11-27T13:33:08Z",
"pushed_at": "2021-03-17T11:21:52Z",
"stargazers_count": 131,
"watchers_count": 131,
"stargazers_count": 132,
"watchers_count": 132,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
@ -317,7 +317,7 @@
],
"visibility": "public",
"forks": 22,
"watchers": 131,
"watchers": 132,
"score": 0
},
{
@ -765,17 +765,17 @@
"description": "ProxyLogon is the formally generic name for CVE-2021-26855, a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin. We have also chained this bug with another post-auth arbitrary-file-write vulnerability, CVE-2021-27065, to get code execution.",
"fork": false,
"created_at": "2021-03-16T07:31:25Z",
"updated_at": "2021-11-16T11:02:51Z",
"updated_at": "2021-11-27T13:35:46Z",
"pushed_at": "2021-05-01T17:20:15Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 20,
"watchers": 21,
"score": 0
},
{
@ -1023,17 +1023,17 @@
"description": "Proof-of-concept exploit for CVE-2021-26855 and CVE-2021-27065. Unauthenticated RCE in Exchange.",
"fork": false,
"created_at": "2021-03-24T01:12:48Z",
"updated_at": "2021-11-17T15:55:47Z",
"updated_at": "2021-11-27T13:32:26Z",
"pushed_at": "2021-03-24T01:25:05Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 32,
"watchers": 33,
"score": 0
},
{

View file

@ -44,12 +44,12 @@
"pushed_at": "2021-10-28T06:37:37Z",
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 26,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 26,
"forks": 27,
"watchers": 61,
"score": 0
},

View file

@ -1296,17 +1296,17 @@
"description": "CVE-2021-41773 CVE-2021-42013漏洞批量检测工具",
"fork": false,
"created_at": "2021-10-09T03:32:18Z",
"updated_at": "2021-11-25T07:28:25Z",
"updated_at": "2021-11-27T14:47:24Z",
"pushed_at": "2021-10-09T03:49:21Z",
"stargazers_count": 105,
"watchers_count": 105,
"stargazers_count": 106,
"watchers_count": 106,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 105,
"watchers": 106,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "PoC for CVE-2021-43557",
"fork": false,
"created_at": "2021-11-22T20:23:05Z",
"updated_at": "2021-11-25T03:38:47Z",
"updated_at": "2021-11-27T16:18:27Z",
"pushed_at": "2021-11-22T20:24:32Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 11,
"watchers": 12,
"score": 0
}
]