Auto Update 2021/02/26 00:09:00

This commit is contained in:
motikan2010-bot 2021-02-26 00:09:00 +09:00
parent 1e4ca8a94a
commit 24d539b8ae
26 changed files with 277 additions and 205 deletions

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-02-24T09:09:53Z",
"updated_at": "2021-02-25T12:50:34Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 924,
"watchers_count": 924,
"forks_count": 217,
"forks": 217,
"watchers": 924,
"stargazers_count": 926,
"watchers_count": 926,
"forks_count": 218,
"forks": 218,
"watchers": 926,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)",
"fork": false,
"created_at": "2016-06-22T23:03:30Z",
"updated_at": "2021-02-24T05:29:30Z",
"updated_at": "2021-02-25T12:01:42Z",
"pushed_at": "2016-06-23T00:47:50Z",
"stargazers_count": 109,
"watchers_count": 109,
"stargazers_count": 108,
"watchers_count": 108,
"forks_count": 59,
"forks": 59,
"watchers": 109,
"watchers": 108,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-02-24T09:09:53Z",
"updated_at": "2021-02-25T12:50:34Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 924,
"watchers_count": 924,
"forks_count": 217,
"forks": 217,
"watchers": 924,
"stargazers_count": 926,
"watchers_count": 926,
"forks_count": 218,
"forks": 218,
"watchers": 926,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-02-24T09:09:53Z",
"updated_at": "2021-02-25T12:50:34Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 924,
"watchers_count": 924,
"forks_count": 217,
"forks": 217,
"watchers": 924,
"stargazers_count": 926,
"watchers_count": 926,
"forks_count": 218,
"forks": 218,
"watchers": 926,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-07-17T08:13:34Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 4,
"score": 0
}

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-02-24T09:09:53Z",
"updated_at": "2021-02-25T12:50:34Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 924,
"watchers_count": 924,
"forks_count": 217,
"forks": 217,
"watchers": 924,
"stargazers_count": 926,
"watchers_count": 926,
"forks_count": 218,
"forks": 218,
"watchers": 926,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2021-02-25T01:40:37Z",
"updated_at": "2021-02-25T09:23:41Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 371,
"watchers_count": 371,
"stargazers_count": 372,
"watchers_count": 372,
"forks_count": 85,
"forks": 85,
"watchers": 371,
"watchers": 372,
"score": 0
}
]

View file

@ -2244,13 +2244,13 @@
"description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )",
"fork": false,
"created_at": "2019-09-30T19:46:21Z",
"updated_at": "2021-02-24T12:03:22Z",
"updated_at": "2021-02-25T12:42:32Z",
"pushed_at": "2021-02-06T00:24:21Z",
"stargazers_count": 178,
"watchers_count": 178,
"stargazers_count": 179,
"watchers_count": 179,
"forks_count": 69,
"forks": 69,
"watchers": 178,
"watchers": 179,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC materials to exploit CVE-2019-15846",
"fork": false,
"created_at": "2019-10-09T15:19:58Z",
"updated_at": "2021-02-17T01:29:27Z",
"updated_at": "2021-02-25T12:07:17Z",
"pushed_at": "2019-10-10T09:55:59Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 9,
"forks": 9,
"watchers": 26,
"watchers": 27,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-02-24T08:30:09Z",
"updated_at": "2021-02-25T11:33:30Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2352,
"watchers_count": 2352,
"forks_count": 665,
"forks": 665,
"watchers": 2352,
"stargazers_count": 2353,
"watchers_count": 2353,
"forks_count": 666,
"forks": 666,
"watchers": 2353,
"score": 0
},
{

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-02-24T09:09:53Z",
"updated_at": "2021-02-25T12:50:34Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 924,
"watchers_count": 924,
"forks_count": 217,
"forks": 217,
"watchers": 924,
"stargazers_count": 926,
"watchers_count": 926,
"forks_count": 218,
"forks": 218,
"watchers": 926,
"score": 0
}
]

View file

@ -21,28 +21,5 @@
"forks": 11,
"watchers": 14,
"score": 0
},
{
"id": 242502226,
"name": "CVE-2020-0753-and-CVE-2020-0754",
"full_name": "VikasVarshney\/CVE-2020-0753-and-CVE-2020-0754",
"owner": {
"login": "VikasVarshney",
"id": 3353731,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3353731?v=4",
"html_url": "https:\/\/github.com\/VikasVarshney"
},
"html_url": "https:\/\/github.com\/VikasVarshney\/CVE-2020-0753-and-CVE-2020-0754",
"description": "Writeup and POC for CVE-2020-0753, CVE-2020-0754 and six unfixed Window DOS Vulnerabilities.",
"fork": false,
"created_at": "2020-02-23T11:10:49Z",
"updated_at": "2020-03-11T13:36:15Z",
"pushed_at": "2020-02-22T13:57:48Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 13,
"forks": 13,
"watchers": 3,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-09-11T07:38:22Z",
"stargazers_count": 503,
"watchers_count": 503,
"forks_count": 124,
"forks": 124,
"forks_count": 125,
"forks": 125,
"watchers": 503,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2021-02-23T18:28:09Z",
"updated_at": "2021-02-25T11:07:20Z",
"pushed_at": "2020-10-21T12:10:28Z",
"stargazers_count": 1245,
"watchers_count": 1245,
"stargazers_count": 1246,
"watchers_count": 1246,
"forks_count": 289,
"forks": 289,
"watchers": 1245,
"watchers": 1246,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-02-24T08:30:09Z",
"updated_at": "2021-02-25T11:33:30Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2352,
"watchers_count": 2352,
"forks_count": 665,
"forks": 665,
"watchers": 2352,
"stargazers_count": 2353,
"watchers_count": 2353,
"forks_count": 666,
"forks": 666,
"watchers": 2353,
"score": 0
},
{
@ -573,5 +573,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 342244938,
"name": "CVE-2020-14882",
"full_name": "milo2012\/CVE-2020-14882",
"owner": {
"login": "milo2012",
"id": 905335,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/905335?v=4",
"html_url": "https:\/\/github.com\/milo2012"
},
"html_url": "https:\/\/github.com\/milo2012\/CVE-2020-14882",
"description": "CVE-2020-14882",
"fork": false,
"created_at": "2021-02-25T12:57:08Z",
"updated_at": "2021-02-25T12:58:49Z",
"pushed_at": "2021-02-25T12:58:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -67,5 +67,28 @@
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 342220518,
"name": "westone-CVE-2020-14883-scanner",
"full_name": "Osyanina\/westone-CVE-2020-14883-scanner",
"owner": {
"login": "Osyanina",
"id": 78467376,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78467376?v=4",
"html_url": "https:\/\/github.com\/Osyanina"
},
"html_url": "https:\/\/github.com\/Osyanina\/westone-CVE-2020-14883-scanner",
"description": "A vulnerability scanner that detects CVE-2020-14883 vulnerabilities.",
"fork": false,
"created_at": "2021-02-25T11:21:56Z",
"updated_at": "2021-02-25T11:28:40Z",
"pushed_at": "2021-02-25T11:28:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -159,5 +159,28 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 342216598,
"name": "westone-CVE-2020-17519-scanner",
"full_name": "Osyanina\/westone-CVE-2020-17519-scanner",
"owner": {
"login": "Osyanina",
"id": 78467376,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78467376?v=4",
"html_url": "https:\/\/github.com\/Osyanina"
},
"html_url": "https:\/\/github.com\/Osyanina\/westone-CVE-2020-17519-scanner",
"description": "A vulnerability scanner that detects CVE-2020-17519 vulnerabilities.",
"fork": false,
"created_at": "2021-02-25T11:06:05Z",
"updated_at": "2021-02-25T11:27:31Z",
"pushed_at": "2021-02-25T11:27:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -114,29 +114,6 @@
"watchers": 3,
"score": 0
},
{
"id": 242163769,
"name": "CVE-2020-1938TomcatAjpScanner",
"full_name": "woaiqiukui\/CVE-2020-1938TomcatAjpScanner",
"owner": {
"login": "woaiqiukui",
"id": 49117752,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49117752?v=4",
"html_url": "https:\/\/github.com\/woaiqiukui"
},
"html_url": "https:\/\/github.com\/woaiqiukui\/CVE-2020-1938TomcatAjpScanner",
"description": "批量扫描TomcatAJP漏洞",
"fork": false,
"created_at": "2020-02-21T14:55:40Z",
"updated_at": "2021-01-26T08:06:51Z",
"pushed_at": "2020-02-22T01:58:22Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 2,
"forks": 2,
"watchers": 10,
"score": 0
},
{
"id": 242193832,
"name": "tomcat-cve-2020-1938-check",
@ -160,29 +137,6 @@
"watchers": 3,
"score": 0
},
{
"id": 242284250,
"name": "GhostCat-LFI-exp",
"full_name": "ze0r\/GhostCat-LFI-exp",
"owner": {
"login": "ze0r",
"id": 43227253,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43227253?v=4",
"html_url": "https:\/\/github.com\/ze0r"
},
"html_url": "https:\/\/github.com\/ze0r\/GhostCat-LFI-exp",
"description": "CVE-2020-1938",
"fork": false,
"created_at": "2020-02-22T05:17:09Z",
"updated_at": "2020-12-23T12:17:04Z",
"pushed_at": "2020-02-22T05:23:53Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 7,
"forks": 7,
"watchers": 10,
"score": 0
},
{
"id": 242345920,
"name": "CNVD-2020-10487-Bulk-verification",

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-02-24T09:09:53Z",
"updated_at": "2021-02-25T12:50:34Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 924,
"watchers_count": 924,
"forks_count": 217,
"forks": 217,
"watchers": 924,
"stargazers_count": 926,
"watchers_count": 926,
"forks_count": 218,
"forks": 218,
"watchers": 926,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-03-10T19:01:21Z",
"stargazers_count": 63,
"watchers_count": 63,
"forks_count": 24,
"forks": 24,
"forks_count": 25,
"forks": 25,
"watchers": 63,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-9992 - A design flaw in MobileDevice.framework\/Xcode and iOS\/iPadOS\/tvOS Development Tools allows an attacker in the same network to gain remote code execution on a target device",
"fork": false,
"created_at": "2020-09-16T23:35:22Z",
"updated_at": "2021-02-21T15:40:41Z",
"updated_at": "2021-02-25T12:43:06Z",
"pushed_at": "2020-09-23T14:52:06Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 9,
"forks": 9,
"watchers": 48,
"watchers": 49,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2021-02-10T14:38:05Z",
"updated_at": "2021-02-24T08:36:35Z",
"updated_at": "2021-02-25T12:54:58Z",
"pushed_at": "2021-02-10T14:39:04Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 1,
"forks": 1,
"watchers": 13,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 2,
"forks": 2,
"watchers": 14,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2021-02-24T09:56:21Z",
"updated_at": "2021-02-25T08:29:59Z",
"updated_at": "2021-02-25T11:05:47Z",
"pushed_at": "2021-02-25T01:19:09Z",
"stargazers_count": 50,
"watchers_count": 50,
"forks_count": 35,
"forks": 35,
"watchers": 50,
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 36,
"forks": 36,
"watchers": 53,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "CVE-2021-21972 Exploit",
"fork": false,
"created_at": "2021-02-24T11:14:58Z",
"updated_at": "2021-02-25T09:03:30Z",
"updated_at": "2021-02-25T14:19:05Z",
"pushed_at": "2021-02-25T05:45:59Z",
"stargazers_count": 104,
"watchers_count": 104,
"forks_count": 47,
"forks": 47,
"watchers": 104,
"stargazers_count": 126,
"watchers_count": 126,
"forks_count": 54,
"forks": 54,
"watchers": 126,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "Proof of Concept Exploit for vCenter CVE-2021-21972",
"fork": false,
"created_at": "2021-02-24T16:31:34Z",
"updated_at": "2021-02-25T09:04:53Z",
"updated_at": "2021-02-25T14:36:33Z",
"pushed_at": "2021-02-24T18:51:10Z",
"stargazers_count": 36,
"watchers_count": 36,
"forks_count": 12,
"forks": 12,
"watchers": 36,
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 16,
"forks": 16,
"watchers": 45,
"score": 0
},
{
@ -105,8 +105,8 @@
"description": "A vulnerability scanner that detects CVE-2021-21972 vulnerabilities.",
"fork": false,
"created_at": "2021-02-25T03:19:25Z",
"updated_at": "2021-02-25T05:38:43Z",
"pushed_at": "2021-02-25T05:36:57Z",
"updated_at": "2021-02-25T11:27:10Z",
"pushed_at": "2021-02-25T11:27:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
@ -128,13 +128,13 @@
"description": null,
"fork": false,
"created_at": "2021-02-25T05:10:06Z",
"updated_at": "2021-02-25T06:40:55Z",
"updated_at": "2021-02-25T14:09:45Z",
"pushed_at": "2021-02-25T05:49:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 1,
"forks": 1,
"watchers": 9,
"score": 0
},
{
@ -151,13 +151,13 @@
"description": "CVE-2021-21972",
"fork": false,
"created_at": "2021-02-25T05:16:38Z",
"updated_at": "2021-02-25T06:35:11Z",
"updated_at": "2021-02-25T15:03:09Z",
"pushed_at": "2021-02-25T05:21:50Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 2,
"forks": 2,
"watchers": 8,
"score": 0
},
{
@ -197,13 +197,82 @@
"description": "VMware vCenter 未授权RCECVE-2021-21972",
"fork": false,
"created_at": "2021-02-25T07:17:21Z",
"updated_at": "2021-02-25T08:31:54Z",
"pushed_at": "2021-02-25T07:32:59Z",
"stargazers_count": 2,
"watchers_count": 2,
"updated_at": "2021-02-25T13:38:18Z",
"pushed_at": "2021-02-25T09:54:53Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"watchers": 7,
"score": 0
},
{
"id": 342190619,
"name": "CVE-2021-21972",
"full_name": "L-pin\/CVE-2021-21972",
"owner": {
"login": "L-pin",
"id": 23657203,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23657203?v=4",
"html_url": "https:\/\/github.com\/L-pin"
},
"html_url": "https:\/\/github.com\/L-pin\/CVE-2021-21972",
"description": null,
"fork": false,
"created_at": "2021-02-25T09:28:17Z",
"updated_at": "2021-02-25T09:54:49Z",
"pushed_at": "2021-02-25T09:54:48Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 342203695,
"name": "CVE-2021-21972",
"full_name": "B1anda0\/CVE-2021-21972",
"owner": {
"login": "B1anda0",
"id": 74232513,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74232513?v=4",
"html_url": "https:\/\/github.com\/B1anda0"
},
"html_url": "https:\/\/github.com\/B1anda0\/CVE-2021-21972",
"description": "VMware vCenter Server远程代码执行漏洞 (CVE-2021-21972)批量检测脚本",
"fork": false,
"created_at": "2021-02-25T10:16:20Z",
"updated_at": "2021-02-25T11:35:04Z",
"pushed_at": "2021-02-25T10:26:53Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 342246923,
"name": "CVE-2021-21972",
"full_name": "renini\/CVE-2021-21972",
"owner": {
"login": "renini",
"id": 1587083,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1587083?v=4",
"html_url": "https:\/\/github.com\/renini"
},
"html_url": "https:\/\/github.com\/renini\/CVE-2021-21972",
"description": "CVE-2021-21972",
"fork": false,
"created_at": "2021-02-25T13:04:37Z",
"updated_at": "2021-02-25T13:15:22Z",
"pushed_at": "2021-02-25T13:11:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2021-02-15T14:41:25Z",
"updated_at": "2021-02-24T22:20:06Z",
"updated_at": "2021-02-25T10:16:36Z",
"pushed_at": "2021-02-15T15:11:00Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 4,
"forks": 4,
"watchers": 14,
"watchers": 15,
"score": 0
}
]

View file

@ -381,13 +381,13 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2021-02-24T19:41:25Z",
"updated_at": "2021-02-25T11:35:49Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 612,
"watchers_count": 612,
"stargazers_count": 613,
"watchers_count": 613,
"forks_count": 173,
"forks": 173,
"watchers": 612,
"watchers": 613,
"score": 0
},
{
@ -726,13 +726,13 @@
"description": "CVE-2021-3156漏洞复现",
"fork": false,
"created_at": "2021-02-07T11:09:51Z",
"updated_at": "2021-02-24T04:59:21Z",
"updated_at": "2021-02-25T11:05:51Z",
"pushed_at": "2021-02-07T11:10:01Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
},
{

View file

@ -211,6 +211,9 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability in a v
- [milo2012/CVE-2021-21972](https://github.com/milo2012/CVE-2021-21972)
- [Udyz/CVE-2021-21972](https://github.com/Udyz/CVE-2021-21972)
- [conjojo/VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972](https://github.com/conjojo/VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972)
- [L-pin/CVE-2021-21972](https://github.com/L-pin/CVE-2021-21972)
- [B1anda0/CVE-2021-21972](https://github.com/B1anda0/CVE-2021-21972)
- [renini/CVE-2021-21972](https://github.com/renini/CVE-2021-21972)
### CVE-2021-24085
- [sourceincite/CVE-2021-24085](https://github.com/sourceincite/CVE-2021-24085)
@ -527,7 +530,6 @@ An elevation of privilege vulnerability exists in Windows Error Reporting (WER)
</code>
- [afang5472/CVE-2020-0753-and-CVE-2020-0754](https://github.com/afang5472/CVE-2020-0753-and-CVE-2020-0754)
- [VikasVarshney/CVE-2020-0753-and-CVE-2020-0754](https://github.com/VikasVarshney/CVE-2020-0753-and-CVE-2020-0754)
### CVE-2020-0787 (2020-03-12)
@ -898,9 +900,7 @@ When using the Apache JServ Protocol (AJP), care must be taken when trusting inc
- [nibiwodong/CNVD-2020-10487-Tomcat-ajp-POC](https://github.com/nibiwodong/CNVD-2020-10487-Tomcat-ajp-POC)
- [bkfish/CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner](https://github.com/bkfish/CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner)
- [dacade/CVE-2020-1938](https://github.com/dacade/CVE-2020-1938)
- [woaiqiukui/CVE-2020-1938TomcatAjpScanner](https://github.com/woaiqiukui/CVE-2020-1938TomcatAjpScanner)
- [fatal0/tomcat-cve-2020-1938-check](https://github.com/fatal0/tomcat-cve-2020-1938-check)
- [ze0r/GhostCat-LFI-exp](https://github.com/ze0r/GhostCat-LFI-exp)
- [delsadan/CNVD-2020-10487-Bulk-verification](https://github.com/delsadan/CNVD-2020-10487-Bulk-verification)
- [00theway/Ghostcat-CNVD-2020-10487](https://github.com/00theway/Ghostcat-CNVD-2020-10487)
- [shaunmclernon/ghostcat-verification](https://github.com/shaunmclernon/ghostcat-verification)
@ -2863,6 +2863,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
- [securitysqs/poc](https://github.com/securitysqs/poc)
- [ShmilySec/CVE-2020-14882](https://github.com/ShmilySec/CVE-2020-14882)
- [pwn3z/CVE-2020-14882-WebLogic](https://github.com/pwn3z/CVE-2020-14882-WebLogic)
- [milo2012/CVE-2020-14882](https://github.com/milo2012/CVE-2020-14882)
### CVE-2020-14883 (2020-10-21)
@ -2873,6 +2874,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
- [murataydemir/CVE-2020-14883](https://github.com/murataydemir/CVE-2020-14883)
- [B1anda0/CVE-2020-14883](https://github.com/B1anda0/CVE-2020-14883)
- [fan1029/CVE-2020-14883EXP](https://github.com/fan1029/CVE-2020-14883EXP)
- [Osyanina/westone-CVE-2020-14883-scanner](https://github.com/Osyanina/westone-CVE-2020-14883-scanner)
### CVE-2020-14947 (2020-06-30)
@ -3236,6 +3238,7 @@ A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as
- [murataydemir/CVE-2020-17519](https://github.com/murataydemir/CVE-2020-17519)
- [radbsie/CVE-2020-17519-Exp](https://github.com/radbsie/CVE-2020-17519-Exp)
- [yaunsky/CVE-2020-17519-Apache-Flink](https://github.com/yaunsky/CVE-2020-17519-Apache-Flink)
- [Osyanina/westone-CVE-2020-17519-scanner](https://github.com/Osyanina/westone-CVE-2020-17519-scanner)
### CVE-2020-17523 (2021-02-03)