Auto Update 2021/12/16 12:13:47

This commit is contained in:
motikan2010-bot 2021-12-16 21:13:47 +09:00
parent 7e022d4879
commit 26aa894fa1
57 changed files with 887 additions and 543 deletions

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-12-15T14:38:06Z",
"updated_at": "2021-12-16T12:01:28Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1239,
"watchers_count": 1239,
"stargazers_count": 1240,
"watchers_count": 1240,
"forks_count": 276,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 276,
"watchers": 1239,
"watchers": 1240,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-12-15T14:38:06Z",
"updated_at": "2021-12-16T12:01:28Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1239,
"watchers_count": 1239,
"stargazers_count": 1240,
"watchers_count": 1240,
"forks_count": 276,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 276,
"watchers": 1239,
"watchers": 1240,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "CVE-2017-12636|exploit Couchdb ",
"fork": false,
"created_at": "2020-03-23T10:11:04Z",
"updated_at": "2021-11-01T08:49:37Z",
"updated_at": "2021-12-16T10:13:27Z",
"pushed_at": "2020-03-23T10:15:21Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-12-15T14:38:06Z",
"updated_at": "2021-12-16T12:01:28Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1239,
"watchers_count": 1239,
"stargazers_count": 1240,
"watchers_count": 1240,
"forks_count": 276,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 276,
"watchers": 1239,
"watchers": 1240,
"score": 0
},
{

View file

@ -40,7 +40,7 @@
"description": "A simple and harmless example implementation of CVE-2017-5645. ",
"fork": false,
"created_at": "2021-12-11T10:35:02Z",
"updated_at": "2021-12-15T14:48:52Z",
"updated_at": "2021-12-16T10:58:33Z",
"pushed_at": "2021-12-15T14:45:48Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -44,12 +44,12 @@
"pushed_at": "2019-05-09T07:07:25Z",
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 13,
"forks": 14,
"watchers": 31,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "CVE-2018-13379",
"fork": false,
"created_at": "2019-08-11T09:44:37Z",
"updated_at": "2021-12-05T05:40:24Z",
"updated_at": "2021-12-16T07:20:44Z",
"pushed_at": "2019-08-14T08:40:25Z",
"stargazers_count": 239,
"watchers_count": 239,
"stargazers_count": 240,
"watchers_count": 240,
"forks_count": 83,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 83,
"watchers": 239,
"watchers": 240,
"score": 0
},
{

View file

@ -116,14 +116,14 @@
{
"id": 413221283,
"name": "CVE-2018-15961",
"full_name": "oxctdev\/CVE-2018-15961",
"full_name": "onsecuredev\/CVE-2018-15961",
"owner": {
"login": "oxctdev",
"login": "onsecuredev",
"id": 91846073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
"html_url": "https:\/\/github.com\/oxctdev"
"html_url": "https:\/\/github.com\/onsecuredev"
},
"html_url": "https:\/\/github.com\/oxctdev\/CVE-2018-15961",
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2018-15961",
"description": "CVE-2018-15961 — ᴀᴅᴏʙᴇ ʟᴅғsɪɴ (ʀᴄᴇ) ",
"fork": false,
"created_at": "2021-10-03T23:31:47Z",

View file

@ -530,10 +530,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-12-15T14:38:06Z",
"updated_at": "2021-12-16T12:01:28Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1239,
"watchers_count": 1239,
"stargazers_count": 1240,
"watchers_count": 1240,
"forks_count": 276,
"allow_forking": true,
"is_template": false,
@ -561,7 +561,7 @@
],
"visibility": "public",
"forks": 276,
"watchers": 1239,
"watchers": 1240,
"score": 0
},
{

View file

@ -1223,12 +1223,12 @@
"pushed_at": "2020-12-06T04:48:38Z",
"stargazers_count": 1162,
"watchers_count": 1162,
"forks_count": 411,
"forks_count": 412,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 411,
"forks": 412,
"watchers": 1162,
"score": 0
},
@ -2888,17 +2888,17 @@
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
"fork": false,
"created_at": "2020-01-21T02:22:29Z",
"updated_at": "2021-12-15T14:38:09Z",
"updated_at": "2021-12-16T09:51:36Z",
"pushed_at": "2020-01-21T03:15:41Z",
"stargazers_count": 243,
"watchers_count": 243,
"stargazers_count": 244,
"watchers_count": 244,
"forks_count": 64,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 64,
"watchers": 243,
"watchers": 244,
"score": 0
},
{

View file

@ -410,6 +410,33 @@
"watchers": 0,
"score": 0
},
{
"id": 349491080,
"name": "WhatsAppHACK-RCE",
"full_name": "kal1gh0st\/WhatsAppHACK-RCE",
"owner": {
"login": "kal1gh0st",
"id": 56889513,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56889513?v=4",
"html_url": "https:\/\/github.com\/kal1gh0st"
},
"html_url": "https:\/\/github.com\/kal1gh0st\/WhatsAppHACK-RCE",
"description": "Whatsapp remote code execution CVE-2019-11932 https:\/\/awakened1712.github.io\/hacking\/hacking-whatsapp-gif-rce\/",
"fork": false,
"created_at": "2021-03-19T16:41:31Z",
"updated_at": "2021-12-15T00:43:34Z",
"pushed_at": "2021-11-17T14:40:14Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 382906478,
"name": "CVE-2019-11932",

View file

@ -40,7 +40,7 @@
"description": "漏洞POC、EXP合集持续更新。Apache Druid-任意文件读取CVE-2021-36749、ConfluenceRCECVE-2021-26084、ZeroShell防火墙RCECVE-2019-12725、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露",
"fork": false,
"created_at": "2021-05-22T05:06:33Z",
"updated_at": "2021-12-07T02:34:30Z",
"updated_at": "2021-12-16T07:46:32Z",
"pushed_at": "2021-11-21T10:34:06Z",
"stargazers_count": 41,
"watchers_count": 41,

View file

@ -29,14 +29,14 @@
{
"id": 416094403,
"name": "CVE-2019-15858",
"full_name": "oxctdev\/CVE-2019-15858",
"full_name": "onsecuredev\/CVE-2019-15858",
"owner": {
"login": "oxctdev",
"login": "onsecuredev",
"id": 91846073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
"html_url": "https:\/\/github.com\/oxctdev"
"html_url": "https:\/\/github.com\/onsecuredev"
},
"html_url": "https:\/\/github.com\/oxctdev\/CVE-2019-15858",
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2019-15858",
"description": "Unauthenticated Remote Code Execution at Woody Ad Snippets (PoC)",
"fork": false,
"created_at": "2021-10-11T21:37:06Z",

View file

@ -40,10 +40,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-12-16T03:13:56Z",
"updated_at": "2021-12-16T08:01:44Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3046,
"watchers_count": 3046,
"stargazers_count": 3048,
"watchers_count": 3048,
"forks_count": 903,
"allow_forking": true,
"is_template": false,
@ -70,7 +70,7 @@
],
"visibility": "public",
"forks": 903,
"watchers": 3046,
"watchers": 3048,
"score": 0
},
{

View file

@ -175,10 +175,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-12-15T14:38:06Z",
"updated_at": "2021-12-16T12:01:28Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1239,
"watchers_count": 1239,
"stargazers_count": 1240,
"watchers_count": 1240,
"forks_count": 276,
"allow_forking": true,
"is_template": false,
@ -206,7 +206,7 @@
],
"visibility": "public",
"forks": 276,
"watchers": 1239,
"watchers": 1240,
"score": 0
}
]

View file

@ -209,17 +209,17 @@
"description": "This project is used for scanning cve-2020-0796 SMB vulnerability",
"fork": false,
"created_at": "2020-03-12T02:20:07Z",
"updated_at": "2021-12-05T20:38:36Z",
"updated_at": "2021-12-16T08:58:19Z",
"pushed_at": "2020-03-12T02:49:10Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 11,
"watchers": 12,
"score": 0
},
{
@ -1018,10 +1018,10 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2021-12-15T14:38:45Z",
"updated_at": "2021-12-16T07:59:13Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1169,
"watchers_count": 1169,
"stargazers_count": 1170,
"watchers_count": 1170,
"forks_count": 367,
"allow_forking": true,
"is_template": false,
@ -1034,7 +1034,7 @@
],
"visibility": "public",
"forks": 367,
"watchers": 1169,
"watchers": 1170,
"score": 0
},
{
@ -1337,7 +1337,7 @@
"pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 434,
"watchers_count": 434,
"forks_count": 141,
"forks_count": 142,
"allow_forking": true,
"is_template": false,
"topics": [
@ -1348,7 +1348,7 @@
"smbghost"
],
"visibility": "public",
"forks": 141,
"forks": 142,
"watchers": 434,
"score": 0
},
@ -1986,14 +1986,14 @@
{
"id": 415205467,
"name": "CVE-2020-0796",
"full_name": "oxctdev\/CVE-2020-0796",
"full_name": "onsecuredev\/CVE-2020-0796",
"owner": {
"login": "oxctdev",
"login": "onsecuredev",
"id": 91846073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
"html_url": "https:\/\/github.com\/oxctdev"
"html_url": "https:\/\/github.com\/onsecuredev"
},
"html_url": "https:\/\/github.com\/oxctdev\/CVE-2020-0796",
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2020-0796",
"description": "Remote Code Execution POC for CVE-2020-0796",
"fork": false,
"created_at": "2021-10-09T04:52:55Z",

View file

@ -13,17 +13,17 @@
"description": "Exploit for WebSocket Vulnerability in Apache Tomcat",
"fork": false,
"created_at": "2020-11-02T14:48:55Z",
"updated_at": "2021-12-15T14:40:44Z",
"updated_at": "2021-12-16T09:58:57Z",
"pushed_at": "2020-11-02T14:51:48Z",
"stargazers_count": 141,
"watchers_count": 141,
"stargazers_count": 142,
"watchers_count": 142,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 141,
"watchers": 142,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-12-16T03:13:56Z",
"updated_at": "2021-12-16T08:01:44Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3046,
"watchers_count": 3046,
"stargazers_count": 3048,
"watchers_count": 3048,
"forks_count": 903,
"allow_forking": true,
"is_template": false,
@ -43,7 +43,7 @@
],
"visibility": "public",
"forks": 903,
"watchers": 3046,
"watchers": 3048,
"score": 0
},
{
@ -141,17 +141,17 @@
"description": "CVE-2020-14882 Weblogic-Exp",
"fork": false,
"created_at": "2020-10-29T06:30:30Z",
"updated_at": "2021-03-14T05:03:17Z",
"updated_at": "2021-12-16T10:13:26Z",
"pushed_at": "2020-10-29T06:36:01Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 13,
"watchers": 14,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "[CVE-2020-14882] Oracle WebLogic Server Authenticated Remote Code Execution (RCE)",
"fork": false,
"created_at": "2020-11-09T15:26:28Z",
"updated_at": "2021-12-06T03:09:25Z",
"updated_at": "2021-12-16T07:46:11Z",
"pushed_at": "2020-11-09T17:21:45Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"watchers": 8,
"score": 0
},
{

View file

@ -364,10 +364,10 @@
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
"fork": false,
"created_at": "2020-02-22T16:16:20Z",
"updated_at": "2021-12-15T14:38:24Z",
"updated_at": "2021-12-16T08:07:58Z",
"pushed_at": "2020-03-09T14:51:43Z",
"stargazers_count": 221,
"watchers_count": 221,
"stargazers_count": 222,
"watchers_count": 222,
"forks_count": 85,
"allow_forking": true,
"is_template": false,
@ -380,7 +380,7 @@
],
"visibility": "public",
"forks": 85,
"watchers": 221,
"watchers": 222,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-12-15T14:38:06Z",
"updated_at": "2021-12-16T12:01:28Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1239,
"watchers_count": 1239,
"stargazers_count": 1240,
"watchers_count": 1240,
"forks_count": 276,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 276,
"watchers": 1239,
"watchers": 1240,
"score": 0
},
{
@ -173,17 +173,17 @@
"description": "Weblogic Vuln POC EXP cve-2020-2551 cve-2020-2555 cve-2020-2883 ,。。。",
"fork": false,
"created_at": "2020-05-16T03:01:32Z",
"updated_at": "2021-12-15T14:39:19Z",
"updated_at": "2021-12-16T09:23:09Z",
"pushed_at": "2020-05-17T12:07:01Z",
"stargazers_count": 63,
"watchers_count": 63,
"stargazers_count": 64,
"watchers_count": 64,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 63,
"watchers": 64,
"score": 0
},
{

View file

@ -435,17 +435,17 @@
"description": "simple bash script of CVE-2020-3452 Cisco ASA \/ Firepower Read-Only Path Traversal Vulnerability checker ",
"fork": false,
"created_at": "2021-02-04T16:50:27Z",
"updated_at": "2021-02-11T04:34:46Z",
"updated_at": "2021-12-16T09:46:15Z",
"pushed_at": "2021-02-04T17:38:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-36179~82 Jackson-databind SSRF&RCE",
"fork": false,
"created_at": "2021-01-10T06:47:49Z",
"updated_at": "2021-12-14T06:13:22Z",
"updated_at": "2021-12-16T09:47:42Z",
"pushed_at": "2021-01-10T06:48:53Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 71,
"watchers_count": 71,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 70,
"watchers": 71,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2020-8554: Man in the middle using LoadBalancer or ExternalIPs",
"fork": false,
"created_at": "2020-12-01T16:58:39Z",
"updated_at": "2021-11-19T20:50:02Z",
"updated_at": "2021-12-16T10:30:25Z",
"pushed_at": "2021-11-19T20:50:40Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 3,
"watchers": 4,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-1732 Exploit",
"fork": false,
"created_at": "2021-03-05T02:11:10Z",
"updated_at": "2021-12-15T14:41:35Z",
"updated_at": "2021-12-16T09:50:16Z",
"pushed_at": "2021-03-05T03:10:26Z",
"stargazers_count": 348,
"watchers_count": 348,
"stargazers_count": 349,
"watchers_count": 349,
"forks_count": 93,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 93,
"watchers": 348,
"watchers": 349,
"score": 0
},
{
@ -40,17 +40,17 @@
"description": "CVE-­2021­-1732 Microsoft Windows 10 本地提权漏 研究及Poc\/Exploit开发",
"fork": false,
"created_at": "2021-03-08T05:07:15Z",
"updated_at": "2021-12-16T01:35:42Z",
"updated_at": "2021-12-16T09:50:21Z",
"pushed_at": "2021-03-08T11:41:19Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 46,
"watchers": 47,
"score": 0
},
{

View file

@ -29,14 +29,14 @@
{
"id": 422835153,
"name": "CVE-2021-20837",
"full_name": "oxctdev\/CVE-2021-20837",
"full_name": "onsecuredev\/CVE-2021-20837",
"owner": {
"login": "oxctdev",
"login": "onsecuredev",
"id": 91846073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
"html_url": "https:\/\/github.com\/oxctdev"
"html_url": "https:\/\/github.com\/onsecuredev"
},
"html_url": "https:\/\/github.com\/oxctdev\/CVE-2021-20837",
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-20837",
"description": "XMLRPC - RCE in MovableTypePoC",
"fork": false,
"created_at": "2021-10-30T09:15:56Z",

View file

@ -13,17 +13,17 @@
"description": "Exploit to SYSTEM for CVE-2021-21551",
"fork": false,
"created_at": "2021-05-13T13:23:38Z",
"updated_at": "2021-12-15T14:42:08Z",
"updated_at": "2021-12-16T10:11:55Z",
"pushed_at": "2021-05-20T20:33:09Z",
"stargazers_count": 231,
"watchers_count": 231,
"stargazers_count": 232,
"watchers_count": 232,
"forks_count": 40,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 40,
"watchers": 231,
"watchers": 232,
"score": 0
},
{

View file

@ -84,18 +84,18 @@
"description": "CVE-2021-21972 Exploit",
"fork": false,
"created_at": "2021-02-24T11:14:58Z",
"updated_at": "2021-12-15T14:41:32Z",
"pushed_at": "2021-12-12T10:17:47Z",
"updated_at": "2021-12-16T07:35:11Z",
"pushed_at": "2021-12-16T07:35:08Z",
"stargazers_count": 330,
"watchers_count": 330,
"forks_count": 126,
"forks_count": 127,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-21972"
],
"visibility": "public",
"forks": 126,
"forks": 127,
"watchers": 330,
"score": 0
},
@ -700,14 +700,14 @@
{
"id": 413216838,
"name": "CVE-2021-21972",
"full_name": "oxctdev\/CVE-2021-21972",
"full_name": "onsecuredev\/CVE-2021-21972",
"owner": {
"login": "oxctdev",
"login": "onsecuredev",
"id": 91846073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
"html_url": "https:\/\/github.com\/oxctdev"
"html_url": "https:\/\/github.com\/onsecuredev"
},
"html_url": "https:\/\/github.com\/oxctdev\/CVE-2021-21972",
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-21972",
"description": "CVE-2021-21972 ᴠᴍᴡᴀʀᴇ ᴄʟɪᴇɴᴛ ᴜɴᴀᴜᴛʜᴏʀɪᴢᴇᴅ ᴄᴏᴅᴇ ɪɴᴊᴇᴄᴛɪᴏɴ (ʀᴄᴇ)",
"fork": false,
"created_at": "2021-10-03T23:03:11Z",

View file

@ -155,17 +155,17 @@
"description": "cve-2021-21985 exploit",
"fork": false,
"created_at": "2021-06-03T12:17:06Z",
"updated_at": "2021-12-15T14:42:17Z",
"pushed_at": "2021-06-07T01:44:03Z",
"stargazers_count": 76,
"watchers_count": 76,
"forks_count": 23,
"updated_at": "2021-12-16T08:36:57Z",
"pushed_at": "2021-12-16T08:25:02Z",
"stargazers_count": 80,
"watchers_count": 80,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 76,
"forks": 25,
"watchers": 80,
"score": 0
},
{

View file

@ -422,17 +422,17 @@
"description": null,
"fork": false,
"created_at": "2021-11-09T18:19:43Z",
"updated_at": "2021-12-06T14:45:29Z",
"updated_at": "2021-12-16T09:46:07Z",
"pushed_at": "2021-11-12T07:40:09Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0
},
{

View file

@ -56,14 +56,14 @@
{
"id": 413204436,
"name": "CVE-2021-22893",
"full_name": "oxctdev\/CVE-2021-22893",
"full_name": "onsecuredev\/CVE-2021-22893",
"owner": {
"login": "oxctdev",
"login": "onsecuredev",
"id": 91846073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
"html_url": "https:\/\/github.com\/oxctdev"
"html_url": "https:\/\/github.com\/onsecuredev"
},
"html_url": "https:\/\/github.com\/oxctdev\/CVE-2021-22893",
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-22893",
"description": "Proof On Concept — Pulse Secure CVE-2021-22893",
"fork": false,
"created_at": "2021-10-03T21:46:58Z",

View file

@ -150,11 +150,11 @@
"description": "CVE-2021-22986 & F5 BIG-IP RCE",
"fork": false,
"created_at": "2021-03-22T07:13:50Z",
"updated_at": "2021-12-15T14:41:43Z",
"updated_at": "2021-12-16T06:27:44Z",
"pushed_at": "2021-04-03T12:56:37Z",
"stargazers_count": 65,
"watchers_count": 65,
"forks_count": 23,
"stargazers_count": 66,
"watchers_count": 66,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"topics": [
@ -162,8 +162,8 @@
"f5-bigip"
],
"visibility": "public",
"forks": 23,
"watchers": 65,
"forks": 24,
"watchers": 66,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-12-15T15:40:45Z",
"updated_at": "2021-12-16T06:08:32Z",
"updated_at": "2021-12-16T08:14:55Z",
"pushed_at": "2021-12-15T16:37:09Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -202,17 +202,17 @@
"description": "CVE-2021-26084 Remote Code Execution on Confluence Servers",
"fork": false,
"created_at": "2021-09-01T09:50:26Z",
"updated_at": "2021-12-15T14:42:53Z",
"updated_at": "2021-12-16T08:55:37Z",
"pushed_at": "2021-09-02T07:36:51Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 42,
"watchers": 43,
"score": 0
},
{
@ -634,8 +634,8 @@
"description": "asjhdsajdlksavksapfoka",
"fork": false,
"created_at": "2021-09-06T06:55:15Z",
"updated_at": "2021-09-06T06:58:34Z",
"pushed_at": "2021-09-06T06:58:31Z",
"updated_at": "2021-12-16T07:12:52Z",
"pushed_at": "2021-12-16T07:12:50Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
@ -866,14 +866,14 @@
{
"id": 414400971,
"name": "CVE-2021-26084",
"full_name": "oxctdev\/CVE-2021-26084",
"full_name": "onsecuredev\/CVE-2021-26084",
"owner": {
"login": "oxctdev",
"login": "onsecuredev",
"id": 91846073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
"html_url": "https:\/\/github.com\/oxctdev"
"html_url": "https:\/\/github.com\/onsecuredev"
},
"html_url": "https:\/\/github.com\/oxctdev\/CVE-2021-26084",
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-26084",
"description": "CVE-2021-26084 - Confluence Server Webwork OGNL injection ",
"fork": false,
"created_at": "2021-10-06T23:24:24Z",

View file

@ -56,14 +56,14 @@
{
"id": 414009465,
"name": "CVE-2021-27651",
"full_name": "oxctdev\/CVE-2021-27651",
"full_name": "onsecuredev\/CVE-2021-27651",
"owner": {
"login": "oxctdev",
"login": "onsecuredev",
"id": 91846073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
"html_url": "https:\/\/github.com\/oxctdev"
"html_url": "https:\/\/github.com\/onsecuredev"
},
"html_url": "https:\/\/github.com\/oxctdev\/CVE-2021-27651",
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-27651",
"description": "bypass all stages of the password reset flow",
"fork": false,
"created_at": "2021-10-05T23:33:50Z",

View file

@ -29,14 +29,14 @@
{
"id": 421034424,
"name": "CVE-2021-30573",
"full_name": "oxctdev\/CVE-2021-30573",
"full_name": "onsecuredev\/CVE-2021-30573",
"owner": {
"login": "oxctdev",
"login": "onsecuredev",
"id": 91846073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
"html_url": "https:\/\/github.com\/oxctdev"
"html_url": "https:\/\/github.com\/onsecuredev"
},
"html_url": "https:\/\/github.com\/oxctdev\/CVE-2021-30573",
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-30573",
"description": "Google Chrome Vulnerabilities CVE-2021-30573",
"fork": false,
"created_at": "2021-10-25T13:25:23Z",

View file

@ -179,17 +179,17 @@
"description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)",
"fork": false,
"created_at": "2021-02-18T05:42:13Z",
"updated_at": "2021-12-15T14:41:29Z",
"updated_at": "2021-12-16T09:44:24Z",
"pushed_at": "2021-12-14T05:12:17Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 60,
"watchers": 62,
"score": 0
},
{

View file

@ -519,6 +519,33 @@
"watchers": 3,
"score": 0
},
{
"id": 334697314,
"name": "CVE-2021-3156",
"full_name": "kal1gh0st\/CVE-2021-3156",
"owner": {
"login": "kal1gh0st",
"id": 56889513,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56889513?v=4",
"html_url": "https:\/\/github.com\/kal1gh0st"
},
"html_url": "https:\/\/github.com\/kal1gh0st\/CVE-2021-3156",
"description": "Description Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalation to root via \"sudoedit -s\" and a command-line argument that ends with a single backslash character. ",
"fork": false,
"created_at": "2021-01-31T16:10:11Z",
"updated_at": "2021-12-15T00:43:34Z",
"pushed_at": "2021-05-04T14:41:30Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 334775019,
"name": "docker-CVE-2021-3156",
@ -1131,17 +1158,17 @@
"description": "CVE-2021-3156 - Sudo Baron Samedit",
"fork": false,
"created_at": "2021-04-29T06:29:26Z",
"updated_at": "2021-12-15T02:41:22Z",
"updated_at": "2021-12-16T11:58:24Z",
"pushed_at": "2021-08-11T15:52:19Z",
"stargazers_count": 112,
"watchers_count": 112,
"stargazers_count": 113,
"watchers_count": 113,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 112,
"watchers": 113,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
"fork": false,
"created_at": "2021-10-27T15:51:12Z",
"updated_at": "2021-12-15T14:43:17Z",
"updated_at": "2021-12-16T09:58:26Z",
"pushed_at": "2021-10-28T06:37:37Z",
"stargazers_count": 71,
"watchers_count": 71,
"stargazers_count": 72,
"watchers_count": 72,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 71,
"watchers": 72,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": "漏洞POC、EXP合集持续更新。Apache Druid-任意文件读取CVE-2021-36749、ConfluenceRCECVE-2021-26084、ZeroShell防火墙RCECVE-2019-12725、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露",
"fork": false,
"created_at": "2021-05-22T05:06:33Z",
"updated_at": "2021-12-07T02:34:30Z",
"updated_at": "2021-12-16T07:46:32Z",
"pushed_at": "2021-11-21T10:34:06Z",
"stargazers_count": 41,
"watchers_count": 41,

View file

@ -40,17 +40,17 @@
"description": null,
"fork": false,
"created_at": "2021-11-05T03:18:46Z",
"updated_at": "2021-12-15T14:43:20Z",
"updated_at": "2021-12-16T07:00:09Z",
"pushed_at": "2021-11-05T03:17:58Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 22,
"watchers": 23,
"score": 0
}
]

View file

@ -2,14 +2,14 @@
{
"id": 434961092,
"name": "CVE-2021-38314",
"full_name": "oxctdev\/CVE-2021-38314",
"full_name": "onsecuredev\/CVE-2021-38314",
"owner": {
"login": "oxctdev",
"login": "onsecuredev",
"id": 91846073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
"html_url": "https:\/\/github.com\/oxctdev"
"html_url": "https:\/\/github.com\/onsecuredev"
},
"html_url": "https:\/\/github.com\/oxctdev\/CVE-2021-38314",
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-38314",
"description": " Unauthenticated Sensitive Information Disclosure (CVE-202138314).",
"fork": false,
"created_at": "2021-12-04T17:08:05Z",

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-09-09T03:58:32Z",
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 13,
"forks": 14,
"watchers": 45,
"score": 0
}

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-39685 Description and sample exploit for Linux USB Gadget overflow vulnerability",
"fork": false,
"created_at": "2021-12-15T14:28:00Z",
"updated_at": "2021-12-16T02:53:12Z",
"updated_at": "2021-12-16T09:21:26Z",
"pushed_at": "2021-12-15T20:23:59Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 4,
"score": 0
}
]

View file

@ -557,7 +557,7 @@
"pushed_at": "2021-10-12T23:05:07Z",
"stargazers_count": 519,
"watchers_count": 519,
"forks_count": 116,
"forks_count": 117,
"allow_forking": true,
"is_template": false,
"topics": [
@ -569,7 +569,7 @@
"remote-code-execution"
],
"visibility": "public",
"forks": 116,
"forks": 117,
"watchers": 519,
"score": 0
},
@ -644,17 +644,44 @@
"description": "Modified code so that we don´t need to rely on CAB archives",
"fork": false,
"created_at": "2021-09-19T19:46:28Z",
"updated_at": "2021-12-15T00:43:05Z",
"updated_at": "2021-12-16T10:11:56Z",
"pushed_at": "2021-09-22T20:07:51Z",
"stargazers_count": 71,
"watchers_count": 71,
"stargazers_count": 72,
"watchers_count": 72,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 71,
"watchers": 72,
"score": 0
},
{
"id": 409931314,
"name": "CVE-2021-40444_CAB_archives",
"full_name": "kal1gh0st\/CVE-2021-40444_CAB_archives",
"owner": {
"login": "kal1gh0st",
"id": 56889513,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56889513?v=4",
"html_url": "https:\/\/github.com\/kal1gh0st"
},
"html_url": "https:\/\/github.com\/kal1gh0st\/CVE-2021-40444_CAB_archives",
"description": "CVE 2021 40444 Windows Exploit services.dll",
"fork": false,
"created_at": "2021-09-24T10:59:34Z",
"updated_at": "2021-12-15T00:43:34Z",
"pushed_at": "2021-10-21T09:46:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{

View file

@ -32,14 +32,14 @@
{
"id": 414763941,
"name": "CVE-2021-40870",
"full_name": "oxctdev\/CVE-2021-40870",
"full_name": "onsecuredev\/CVE-2021-40870",
"owner": {
"login": "oxctdev",
"login": "onsecuredev",
"id": 91846073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
"html_url": "https:\/\/github.com\/oxctdev"
"html_url": "https:\/\/github.com\/onsecuredev"
},
"html_url": "https:\/\/github.com\/oxctdev\/CVE-2021-40870",
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-40870",
"description": "Aviatrix allows an authenticated user to execute arbitrary code",
"fork": false,
"created_at": "2021-10-07T21:34:00Z",

View file

@ -13,17 +13,17 @@
"description": "TP-Link TL-WR840N EU v5 Remote Code Execution",
"fork": false,
"created_at": "2021-11-28T01:15:36Z",
"updated_at": "2021-12-14T03:53:44Z",
"updated_at": "2021-12-16T09:00:42Z",
"pushed_at": "2021-12-12T09:02:28Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -744,14 +744,14 @@
{
"id": 414410579,
"name": "CVE-2021-41773",
"full_name": "oxctdev\/CVE-2021-41773",
"full_name": "onsecuredev\/CVE-2021-41773",
"owner": {
"login": "oxctdev",
"login": "onsecuredev",
"id": 91846073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
"html_url": "https:\/\/github.com\/oxctdev"
"html_url": "https:\/\/github.com\/onsecuredev"
},
"html_url": "https:\/\/github.com\/oxctdev\/CVE-2021-41773",
"html_url": "https:\/\/github.com\/onsecuredev\/CVE-2021-41773",
"description": "Apache HTTPd (2.4.49) Local File Disclosure (LFI)",
"fork": false,
"created_at": "2021-10-07T00:14:40Z",
@ -1263,17 +1263,17 @@
"description": "CVE-2021-41773 CVE-2021-42013漏洞批量检测工具",
"fork": false,
"created_at": "2021-10-09T03:32:18Z",
"updated_at": "2021-12-15T14:43:09Z",
"updated_at": "2021-12-16T06:21:05Z",
"pushed_at": "2021-10-09T03:49:21Z",
"stargazers_count": 117,
"watchers_count": 117,
"stargazers_count": 118,
"watchers_count": 118,
"forks_count": 39,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 117,
"watchers": 118,
"score": 0
},
{

29
2021/CVE-2021-41962.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 438955513,
"name": "-CVE-2021-41962",
"full_name": "lohyt\/-CVE-2021-41962",
"owner": {
"login": "lohyt",
"id": 11375930,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11375930?v=4",
"html_url": "https:\/\/github.com\/lohyt"
},
"html_url": "https:\/\/github.com\/lohyt\/-CVE-2021-41962",
"description": "Stored XSS found in Vehicle Service Management System 1.0 application in Sourcecodester.",
"fork": false,
"created_at": "2021-12-16T10:52:13Z",
"updated_at": "2021-12-16T10:59:21Z",
"pushed_at": "2021-12-16T10:59:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,11 +13,11 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-11T15:10:30Z",
"updated_at": "2021-12-16T06:10:56Z",
"updated_at": "2021-12-16T09:59:00Z",
"pushed_at": "2021-12-11T15:43:11Z",
"stargazers_count": 528,
"watchers_count": 528,
"forks_count": 102,
"stargazers_count": 535,
"watchers_count": 535,
"forks_count": 105,
"allow_forking": true,
"is_template": false,
"topics": [
@ -27,8 +27,8 @@
"s4u2self"
],
"visibility": "public",
"forks": 102,
"watchers": 528,
"forks": 105,
"watchers": 535,
"score": 0
},
{
@ -45,17 +45,17 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2021-12-16T05:11:36Z",
"updated_at": "2021-12-16T09:38:42Z",
"pushed_at": "2021-12-15T11:17:41Z",
"stargazers_count": 93,
"watchers_count": 93,
"forks_count": 14,
"stargazers_count": 96,
"watchers_count": 96,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 93,
"forks": 15,
"watchers": 96,
"score": 0
},
{
@ -99,17 +99,17 @@
"description": "Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)",
"fork": false,
"created_at": "2021-12-13T23:15:05Z",
"updated_at": "2021-12-16T05:41:11Z",
"updated_at": "2021-12-16T10:57:23Z",
"pushed_at": "2021-12-13T23:15:47Z",
"stargazers_count": 117,
"watchers_count": 117,
"forks_count": 15,
"stargazers_count": 124,
"watchers_count": 124,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 117,
"forks": 16,
"watchers": 124,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
"updated_at": "2021-12-16T03:59:58Z",
"pushed_at": "2021-12-12T10:50:54Z",
"stargazers_count": 871,
"watchers_count": 871,
"forks_count": 223,
"updated_at": "2021-12-16T11:02:46Z",
"pushed_at": "2021-12-16T09:50:15Z",
"stargazers_count": 873,
"watchers_count": 873,
"forks_count": 224,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 223,
"watchers": 871,
"forks": 224,
"watchers": 873,
"score": 0
}
]

View file

@ -67,17 +67,17 @@
"description": "Grafana Unauthorized arbitrary file reading vulnerability",
"fork": false,
"created_at": "2021-12-07T09:02:16Z",
"updated_at": "2021-12-15T14:43:29Z",
"updated_at": "2021-12-16T10:23:39Z",
"pushed_at": "2021-12-09T03:16:21Z",
"stargazers_count": 220,
"watchers_count": 220,
"forks_count": 56,
"stargazers_count": 221,
"watchers_count": 221,
"forks_count": 57,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 56,
"watchers": 220,
"forks": 57,
"watchers": 221,
"score": 0
},
{
@ -214,17 +214,17 @@
"description": "grafana CVE-2021-43798任意文件读取漏洞POC采用多插件轮训检测的方法允许指定单URL和从文件中读取URL",
"fork": false,
"created_at": "2021-12-08T03:43:31Z",
"updated_at": "2021-12-11T11:31:22Z",
"updated_at": "2021-12-16T09:24:16Z",
"pushed_at": "2021-12-08T07:04:13Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0
},
{

File diff suppressed because it is too large Load diff

View file

@ -13,17 +13,17 @@
"description": "A PoC for CVE-2021-44827 - authenticated remote code execution in Tp-link Archer C20i",
"fork": false,
"created_at": "2021-12-13T11:17:12Z",
"updated_at": "2021-12-13T11:18:55Z",
"updated_at": "2021-12-16T10:23:11Z",
"pushed_at": "2021-12-13T11:18:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "HD-Network Real-time Monitoring System 2.0 allows ..\/ directory traversal to read \/etc\/shadow via the \/language\/lang s_Language parameter.",
"fork": false,
"created_at": "2021-12-15T15:01:31Z",
"updated_at": "2021-12-15T15:07:04Z",
"updated_at": "2021-12-16T10:22:56Z",
"pushed_at": "2021-12-15T15:07:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Log4j 2.15.0 Privilege Escalation -- CVE-2021-45046",
"fork": false,
"created_at": "2021-12-15T05:48:53Z",
"updated_at": "2021-12-15T15:09:04Z",
"updated_at": "2021-12-16T10:21:41Z",
"pushed_at": "2021-12-15T05:50:22Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 3,
"watchers": 5,
"score": 0
},
{
@ -40,17 +40,17 @@
"description": "Oh no another one",
"fork": false,
"created_at": "2021-12-15T09:01:37Z",
"updated_at": "2021-12-15T09:18:03Z",
"updated_at": "2021-12-16T10:21:16Z",
"pushed_at": "2021-12-15T09:18:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{
@ -67,14 +67,17 @@
"description": "Replicating CVE-2021-45046",
"fork": false,
"created_at": "2021-12-15T16:28:11Z",
"updated_at": "2021-12-15T16:51:38Z",
"pushed_at": "2021-12-15T16:51:35Z",
"updated_at": "2021-12-16T07:17:16Z",
"pushed_at": "2021-12-16T07:13:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"topics": [
"cve-2021-45046",
"log4j2"
],
"visibility": "public",
"forks": 0,
"watchers": 0,

View file

@ -300,6 +300,7 @@ Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based
- [blasty/CVE-2021-3156](https://github.com/blasty/CVE-2021-3156)
- [teamtopkarl/CVE-2021-3156](https://github.com/teamtopkarl/CVE-2021-3156)
- [Q4n/CVE-2021-3156](https://github.com/Q4n/CVE-2021-3156)
- [kal1gh0st/CVE-2021-3156](https://github.com/kal1gh0st/CVE-2021-3156)
- [apogiatzis/docker-CVE-2021-3156](https://github.com/apogiatzis/docker-CVE-2021-3156)
- [voidlsd/CVE-2021-3156](https://github.com/voidlsd/CVE-2021-3156)
- [Ashish-dawani/CVE-2021-3156-Patch](https://github.com/Ashish-dawani/CVE-2021-3156-Patch)
@ -558,7 +559,7 @@ Movable Type 7 r.5002 and earlier (Movable Type 7 Series), Movable Type 6.8.2 an
</code>
- [ghost-nemesis/cve-2021-20837-poc](https://github.com/ghost-nemesis/cve-2021-20837-poc)
- [oxctdev/CVE-2021-20837](https://github.com/oxctdev/CVE-2021-20837)
- [onsecuredev/CVE-2021-20837](https://github.com/onsecuredev/CVE-2021-20837)
- [ohnonoyesyes/CVE-2021-20837](https://github.com/ohnonoyesyes/CVE-2021-20837)
- [Cosemz/CVE-2021-20837](https://github.com/Cosemz/CVE-2021-20837)
@ -763,7 +764,7 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability in a v
- [murataydemir/CVE-2021-21972](https://github.com/murataydemir/CVE-2021-21972)
- [pettyhacks/vSphereyeeter](https://github.com/pettyhacks/vSphereyeeter)
- [haiclover/CVE-2021-21972](https://github.com/haiclover/CVE-2021-21972)
- [oxctdev/CVE-2021-21972](https://github.com/oxctdev/CVE-2021-21972)
- [onsecuredev/CVE-2021-21972](https://github.com/onsecuredev/CVE-2021-21972)
### CVE-2021-21973 (2021-02-24)
@ -976,7 +977,7 @@ Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication b
- [ZephrFish/CVE-2021-22893_HoneyPoC2](https://github.com/ZephrFish/CVE-2021-22893_HoneyPoC2)
- [Mad-robot/CVE-2021-22893](https://github.com/Mad-robot/CVE-2021-22893)
- [oxctdev/CVE-2021-22893](https://github.com/oxctdev/CVE-2021-22893)
- [onsecuredev/CVE-2021-22893](https://github.com/onsecuredev/CVE-2021-22893)
### CVE-2021-22911 (2021-05-27)
@ -1281,7 +1282,7 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
- [dorkerdevil/CVE-2021-26084](https://github.com/dorkerdevil/CVE-2021-26084)
- [ludy-dev/CVE-2021-26084_PoC](https://github.com/ludy-dev/CVE-2021-26084_PoC)
- [wdjcy/CVE-2021-26084](https://github.com/wdjcy/CVE-2021-26084)
- [oxctdev/CVE-2021-26084](https://github.com/oxctdev/CVE-2021-26084)
- [onsecuredev/CVE-2021-26084](https://github.com/onsecuredev/CVE-2021-26084)
- [Jun-5heng/CVE-2021-26084](https://github.com/Jun-5heng/CVE-2021-26084)
- [lleavesl/CVE-2021-26084](https://github.com/lleavesl/CVE-2021-26084)
- [quesodipesto/conflucheck](https://github.com/quesodipesto/conflucheck)
@ -1630,7 +1631,7 @@ In versions 8.2.1 through 8.5.2 of Pega Infinity, the password reset functionali
- [samwcyo/CVE-2021-27651-PoC](https://github.com/samwcyo/CVE-2021-27651-PoC)
- [Vulnmachines/CVE-2021-27651](https://github.com/Vulnmachines/CVE-2021-27651)
- [oxctdev/CVE-2021-27651](https://github.com/oxctdev/CVE-2021-27651)
- [onsecuredev/CVE-2021-27651](https://github.com/onsecuredev/CVE-2021-27651)
### CVE-2021-27850 (2021-04-15)
@ -1939,7 +1940,7 @@ Use after free in GPU in Google Chrome prior to 92.0.4515.107 allowed a remote a
</code>
- [s4e-lab/CVE-2021-30573-PoC-Google-Chrome](https://github.com/s4e-lab/CVE-2021-30573-PoC-Google-Chrome)
- [oxctdev/CVE-2021-30573](https://github.com/oxctdev/CVE-2021-30573)
- [onsecuredev/CVE-2021-30573](https://github.com/onsecuredev/CVE-2021-30573)
- [kh4sh3i/CVE-2021-30573](https://github.com/kh4sh3i/CVE-2021-30573)
### CVE-2021-30632 (2021-10-08)
@ -2738,7 +2739,7 @@ In Apache CouchDB, a malicious user with permission to create documents in a dat
The Gutenberg Template Library &amp; Redux Framework plugin &lt;= 4.2.11 for WordPress registered several AJAX actions available to unauthenticated users in the `includes` function in `redux-core/class-redux-core.php` that were unique to a given site but deterministic and predictable given that they were based on an md5 hash of the site URL with a known salt value of '-redux' and an md5 hash of the previous hash with a known salt value of '-support'. These AJAX actions could be used to retrieve a list of active plugins and their versions, the site's PHP version, and an unsalted md5 hash of sites `AUTH_KEY` concatenated with the `SECURE_AUTH_KEY`.
</code>
- [oxctdev/CVE-2021-38314](https://github.com/oxctdev/CVE-2021-38314)
- [onsecuredev/CVE-2021-38314](https://github.com/onsecuredev/CVE-2021-38314)
- [phrantom/cve-2021-38314](https://github.com/phrantom/cve-2021-38314)
### CVE-2021-38583 (2021-08-13)
@ -3059,6 +3060,7 @@ Microsoft MSHTML Remote Code Execution Vulnerability
- [Udyz/CVE-2021-40444-CAB](https://github.com/Udyz/CVE-2021-40444-CAB)
- [gh0stxplt/CVE-2021-40444-URL-Extractor](https://github.com/gh0stxplt/CVE-2021-40444-URL-Extractor)
- [Edubr2020/CVE-2021-40444--CABless](https://github.com/Edubr2020/CVE-2021-40444--CABless)
- [kal1gh0st/CVE-2021-40444_CAB_archives](https://github.com/kal1gh0st/CVE-2021-40444_CAB_archives)
- [LazarusReborn/Docx-Exploit-2021](https://github.com/LazarusReborn/Docx-Exploit-2021)
- [H0j3n/CVE-2021-40444](https://github.com/H0j3n/CVE-2021-40444)
- [factionsypho/TIC4301_Project](https://github.com/factionsypho/TIC4301_Project)
@ -3145,7 +3147,7 @@ An issue was discovered in Aviatrix Controller 6.x before 6.5-1804.1922. Unrestr
</code>
- [0xAgun/CVE-2021-40870](https://github.com/0xAgun/CVE-2021-40870)
- [oxctdev/CVE-2021-40870](https://github.com/oxctdev/CVE-2021-40870)
- [onsecuredev/CVE-2021-40870](https://github.com/onsecuredev/CVE-2021-40870)
- [JoyGhoshs/CVE-2021-40870](https://github.com/JoyGhoshs/CVE-2021-40870)
### CVE-2021-40875 (2021-09-22)
@ -3331,7 +3333,7 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
- [fnatalucci/CVE-2021-41773-RCE](https://github.com/fnatalucci/CVE-2021-41773-RCE)
- [AssassinUKG/CVE-2021-41773](https://github.com/AssassinUKG/CVE-2021-41773)
- [jheeree/Simple-CVE-2021-41773-checker](https://github.com/jheeree/Simple-CVE-2021-41773-checker)
- [oxctdev/CVE-2021-41773](https://github.com/oxctdev/CVE-2021-41773)
- [onsecuredev/CVE-2021-41773](https://github.com/onsecuredev/CVE-2021-41773)
- [HightechSec/scarce-apache2](https://github.com/HightechSec/scarce-apache2)
- [vinhjaxt/CVE-2021-41773-exploit](https://github.com/vinhjaxt/CVE-2021-41773-exploit)
- [twseptian/CVE-2021-41773](https://github.com/twseptian/CVE-2021-41773)
@ -3384,6 +3386,9 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
### CVE-2021-41822
- [badboycxcc/CVE-2021-41822](https://github.com/badboycxcc/CVE-2021-41822)
### CVE-2021-41962
- [lohyt/-CVE-2021-41962](https://github.com/lohyt/-CVE-2021-41962)
### CVE-2021-42008 (2021-10-04)
<code>
@ -3828,6 +3833,7 @@ Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features u
- [myyxl/cve-2021-44228-minecraft-poc](https://github.com/myyxl/cve-2021-44228-minecraft-poc)
- [RrUZi/Awesome-CVE-2021-44228](https://github.com/RrUZi/Awesome-CVE-2021-44228)
- [0-x-2-2/CVE-2021-44228](https://github.com/0-x-2-2/CVE-2021-44228)
- [CodeShield-Security/Log4JShell-Bytecode-Detector](https://github.com/CodeShield-Security/Log4JShell-Bytecode-Detector)
- [Crane-Mocker/log4j-poc](https://github.com/Crane-Mocker/log4j-poc)
- [kali-dass/CVE-2021-44228-log4Shell](https://github.com/kali-dass/CVE-2021-44228-log4Shell)
- [pravin-pp/log4j2-CVE-2021-44228](https://github.com/pravin-pp/log4j2-CVE-2021-44228)
@ -3939,6 +3945,7 @@ Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features u
- [ReynerGonzalez/Security-Log4J-Tester](https://github.com/ReynerGonzalez/Security-Log4J-Tester)
- [ShaneKingBlog/org.shaneking.demo.cve.y2021.s44228](https://github.com/ShaneKingBlog/org.shaneking.demo.cve.y2021.s44228)
- [wortell/log4j](https://github.com/wortell/log4j)
- [roswellit/CVE-2021-44228](https://github.com/roswellit/CVE-2021-44228)
- [yanicksenn/CVE-2021-44228](https://github.com/yanicksenn/CVE-2021-44228)
- [municipalparkingservices/CVE-2021-44228-Scanner](https://github.com/municipalparkingservices/CVE-2021-44228-Scanner)
- [BinaryDefense/log4j-honeypot-flask](https://github.com/BinaryDefense/log4j-honeypot-flask)
@ -3971,6 +3978,7 @@ Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features u
- [honeynet/log4shell-data](https://github.com/honeynet/log4shell-data)
- [inettgmbh/checkmk-log4j-scanner](https://github.com/inettgmbh/checkmk-log4j-scanner)
- [wortell/log4j-honeypot](https://github.com/wortell/log4j-honeypot)
- [MkTech-0-8YT3/CVE-2021-44228](https://github.com/MkTech-0-8YT3/CVE-2021-44228)
- [alenazi90/log4j](https://github.com/alenazi90/log4j)
- [pmontesd/log4j-cve-2021-44228](https://github.com/pmontesd/log4j-cve-2021-44228)
- [aws-samples/kubernetes-log4j-cve-2021-44228-node-agent](https://github.com/aws-samples/kubernetes-log4j-cve-2021-44228-node-agent)
@ -3978,6 +3986,10 @@ Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features u
- [ubitech/cve-2021-44228-rce-poc](https://github.com/ubitech/cve-2021-44228-rce-poc)
- [rv4l3r3/log4v-vuln-check](https://github.com/rv4l3r3/log4v-vuln-check)
- [dpomnean/log4j_scanner_wrapper](https://github.com/dpomnean/log4j_scanner_wrapper)
- [roxas-tan/CVE-2021-44228](https://github.com/roxas-tan/CVE-2021-44228)
- [shamo0/CVE-2021-44228](https://github.com/shamo0/CVE-2021-44228)
- [snow0715/log4j-Scan-Burpsuite](https://github.com/snow0715/log4j-Scan-Burpsuite)
- [Joefreedy/Log4j-Windows-Scanner](https://github.com/Joefreedy/Log4j-Windows-Scanner)
### CVE-2021-44827
- [full-disclosure/CVE-2021-44827](https://github.com/full-disclosure/CVE-2021-44827)
@ -4369,7 +4381,7 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
- [1stPeak/CVE-2020-0796-Scanner](https://github.com/1stPeak/CVE-2020-0796-Scanner)
- [Anonimo501/SMBGhost_CVE-2020-0796_checker](https://github.com/Anonimo501/SMBGhost_CVE-2020-0796_checker)
- [Opensitoo/cve-2020-0796](https://github.com/Opensitoo/cve-2020-0796)
- [oxctdev/CVE-2020-0796](https://github.com/oxctdev/CVE-2020-0796)
- [onsecuredev/CVE-2020-0796](https://github.com/onsecuredev/CVE-2020-0796)
- [Murasame-nc/CVE-2020-0796-LPE-POC](https://github.com/Murasame-nc/CVE-2020-0796-LPE-POC)
- [F6JO/CVE-2020-0796-Batch-scanning](https://github.com/F6JO/CVE-2020-0796-Batch-scanning)
- [lisinan988/CVE-2020-0796-exp](https://github.com/lisinan988/CVE-2020-0796-exp)
@ -10778,6 +10790,7 @@ A double free vulnerability in the DDGifSlurp function in decoding.c in the andr
- [starling021/CVE-2019-11932-SupportApp](https://github.com/starling021/CVE-2019-11932-SupportApp)
- [Hacker-Yadav/CVE-2019-11932](https://github.com/Hacker-Yadav/CVE-2019-11932)
- [BadAssAiras/hello](https://github.com/BadAssAiras/hello)
- [kal1gh0st/WhatsAppHACK-RCE](https://github.com/kal1gh0st/WhatsAppHACK-RCE)
- [zxn1/CVE-2019-11932](https://github.com/zxn1/CVE-2019-11932)
- [Tabni/https-github.com-awakened1712-CVE-2019-11932](https://github.com/Tabni/https-github.com-awakened1712-CVE-2019-11932)
@ -11665,7 +11678,7 @@ admin/includes/class.import.snippet.php in the &quot;Woody ad snippets&quot; plu
</code>
- [GeneralEG/CVE-2019-15858](https://github.com/GeneralEG/CVE-2019-15858)
- [oxctdev/CVE-2019-15858](https://github.com/oxctdev/CVE-2019-15858)
- [onsecuredev/CVE-2019-15858](https://github.com/onsecuredev/CVE-2019-15858)
### CVE-2019-15972 (2019-11-25)
@ -14993,7 +15006,7 @@ Adobe ColdFusion versions July 12 release (2018.0.0.310739), Update 6 and earlie
- [cved-sources/cve-2018-15961](https://github.com/cved-sources/cve-2018-15961)
- [0xAJ2K/CVE-2018-15961](https://github.com/0xAJ2K/CVE-2018-15961)
- [xbufu/CVE-2018-15961](https://github.com/xbufu/CVE-2018-15961)
- [oxctdev/CVE-2018-15961](https://github.com/oxctdev/CVE-2018-15961)
- [onsecuredev/CVE-2018-15961](https://github.com/onsecuredev/CVE-2018-15961)
### CVE-2018-15968 (2018-10-12)