Auto Update 2021/10/13 06:12:56

This commit is contained in:
motikan2010-bot 2021-10-13 06:12:56 +09:00
parent c53632fae5
commit 282e649e0a
35 changed files with 183 additions and 142 deletions

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-10-12T13:23:43Z",
"updated_at": "2021-10-12T15:25:14Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1195,
"watchers_count": 1195,
"stargazers_count": 1194,
"watchers_count": 1194,
"forks_count": 265,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 265,
"watchers": 1195,
"watchers": 1194,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-10-12T13:23:43Z",
"updated_at": "2021-10-12T15:25:14Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1195,
"watchers_count": 1195,
"stargazers_count": 1194,
"watchers_count": 1194,
"forks_count": 265,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 265,
"watchers": 1195,
"watchers": 1194,
"score": 0
},
{

View file

@ -133,32 +133,5 @@
"forks": 39,
"watchers": 63,
"score": 0
},
{
"id": 160678045,
"name": "CVE-2016-3714",
"full_name": "HRSkraps\/CVE-2016-3714",
"owner": {
"login": "HRSkraps",
"id": 45661385,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45661385?v=4",
"html_url": "https:\/\/github.com\/HRSkraps"
},
"html_url": "https:\/\/github.com\/HRSkraps\/CVE-2016-3714",
"description": "A reproducible environment with flag challenges for CVE-2016-3714 ",
"fork": false,
"created_at": "2018-12-06T13:23:05Z",
"updated_at": "2018-12-06T13:23:05Z",
"pushed_at": "2018-12-06T13:23:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-10-12T13:23:43Z",
"updated_at": "2021-10-12T15:25:14Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1195,
"watchers_count": 1195,
"stargazers_count": 1194,
"watchers_count": 1194,
"forks_count": 265,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 265,
"watchers": 1195,
"watchers": 1194,
"score": 0
},
{

View file

@ -188,7 +188,7 @@
"pushed_at": "2017-03-13T15:03:32Z",
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 37,
"forks_count": 38,
"allow_forking": true,
"is_template": false,
"topics": [
@ -196,7 +196,7 @@
"cve-2017-5638"
],
"visibility": "public",
"forks": 37,
"forks": 38,
"watchers": 37,
"score": 0
},

View file

@ -530,10 +530,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-10-12T13:23:43Z",
"updated_at": "2021-10-12T15:25:14Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1195,
"watchers_count": 1195,
"stargazers_count": 1194,
"watchers_count": 1194,
"forks_count": 265,
"allow_forking": true,
"is_template": false,
@ -561,7 +561,7 @@
],
"visibility": "public",
"forks": 265,
"watchers": 1195,
"watchers": 1194,
"score": 0
},
{

View file

@ -44,12 +44,12 @@
"pushed_at": "2021-09-22T02:19:32Z",
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 27,
"score": 0
},

View file

@ -40,17 +40,17 @@
"description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
"fork": false,
"created_at": "2019-12-12T07:58:11Z",
"updated_at": "2021-10-08T08:19:14Z",
"updated_at": "2021-10-12T17:08:22Z",
"pushed_at": "2021-09-27T14:26:16Z",
"stargazers_count": 211,
"watchers_count": 211,
"stargazers_count": 212,
"watchers_count": 212,
"forks_count": 60,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 60,
"watchers": 211,
"watchers": 212,
"score": 0
},
{

View file

@ -175,10 +175,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-10-12T13:23:43Z",
"updated_at": "2021-10-12T15:25:14Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1195,
"watchers_count": 1195,
"stargazers_count": 1194,
"watchers_count": 1194,
"forks_count": 265,
"allow_forking": true,
"is_template": false,
@ -206,7 +206,7 @@
],
"visibility": "public",
"forks": 265,
"watchers": 1195,
"watchers": 1194,
"score": 0
}
]

View file

@ -101,7 +101,7 @@
"fork": false,
"created_at": "2019-03-23T02:52:31Z",
"updated_at": "2021-08-14T00:42:01Z",
"pushed_at": "2021-09-27T21:53:19Z",
"pushed_at": "2021-10-12T19:01:21Z",
"stargazers_count": 114,
"watchers_count": 114,
"forks_count": 28,

View file

@ -2022,10 +2022,10 @@
"description": "Remote Code Execution POC for CVE-2020-0796",
"fork": false,
"created_at": "2021-10-09T04:52:55Z",
"updated_at": "2021-10-09T05:04:42Z",
"updated_at": "2021-10-12T18:23:02Z",
"pushed_at": "2021-10-09T05:03:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -2036,7 +2036,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{

View file

@ -67,17 +67,17 @@
"description": "CNVD-2020-10487(CVE-2020-1938), tomcat ajp 文件读取漏洞poc",
"fork": false,
"created_at": "2020-02-20T17:57:54Z",
"updated_at": "2021-08-24T11:15:46Z",
"updated_at": "2021-10-12T18:42:21Z",
"pushed_at": "2020-02-23T17:06:06Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 81,
"watchers_count": 81,
"forks_count": 59,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 59,
"watchers": 80,
"watchers": 81,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-10-12T13:23:43Z",
"updated_at": "2021-10-12T15:25:14Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1195,
"watchers_count": 1195,
"stargazers_count": 1194,
"watchers_count": 1194,
"forks_count": 265,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 265,
"watchers": 1195,
"watchers": 1194,
"score": 0
},
{

View file

@ -17,7 +17,7 @@
"pushed_at": "2021-04-09T08:00:19Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [
@ -26,7 +26,7 @@
"klogserver"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 3,
"score": 0
}

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-05-25T11:14:56Z",
"stargazers_count": 113,
"watchers_count": 113,
"forks_count": 27,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 27,
"forks": 28,
"watchers": 113,
"score": 0
}

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2020-05-20T04:27:52Z",
"updated_at": "2021-07-15T13:04:55Z",
"pushed_at": "2021-09-28T02:50:07Z",
"pushed_at": "2021-10-12T21:13:09Z",
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 15,

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2020-12-01T16:58:39Z",
"updated_at": "2021-10-11T17:20:02Z",
"pushed_at": "2021-10-11T17:19:59Z",
"pushed_at": "2021-10-12T19:23:44Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,

View file

@ -40,17 +40,17 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2021-10-11T20:43:52Z",
"updated_at": "2021-10-12T17:48:42Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1409,
"watchers_count": 1409,
"stargazers_count": 1411,
"watchers_count": 1411,
"forks_count": 522,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 522,
"watchers": 1409,
"watchers": 1411,
"score": 0
},
{

View file

@ -140,17 +140,17 @@
"description": "Proof of Concept Exploit for vCenter CVE-2021-21972",
"fork": false,
"created_at": "2021-02-24T16:31:34Z",
"updated_at": "2021-10-05T07:46:50Z",
"updated_at": "2021-10-12T19:43:29Z",
"pushed_at": "2021-02-25T16:05:02Z",
"stargazers_count": 146,
"watchers_count": 146,
"stargazers_count": 147,
"watchers_count": 147,
"forks_count": 58,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 58,
"watchers": 146,
"watchers": 147,
"score": 0
},
{

29
2021/CVE-2021-22941.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 416379571,
"name": "CVE-2021-22941",
"full_name": "hoavt184\/CVE-2021-22941",
"owner": {
"login": "hoavt184",
"id": 68089551,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68089551?v=4",
"html_url": "https:\/\/github.com\/hoavt184"
},
"html_url": "https:\/\/github.com\/hoavt184\/CVE-2021-22941",
"description": null,
"fork": false,
"created_at": "2021-10-12T14:52:38Z",
"updated_at": "2021-10-12T16:07:13Z",
"pushed_at": "2021-10-12T16:05:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "POC of CVE-2021-2394",
"fork": false,
"created_at": "2021-08-02T02:22:04Z",
"updated_at": "2021-09-19T05:44:27Z",
"updated_at": "2021-10-12T16:37:23Z",
"pushed_at": "2021-08-16T08:02:40Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 11,
"watchers": 12,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-05-25T11:14:56Z",
"stargazers_count": 113,
"watchers_count": 113,
"forks_count": 27,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 27,
"forks": 28,
"watchers": 113,
"score": 0
}

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-09-22T02:19:32Z",
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 27,
"score": 0
},

View file

@ -40,17 +40,17 @@
"description": null,
"fork": false,
"created_at": "2021-09-28T03:47:36Z",
"updated_at": "2021-10-12T14:54:12Z",
"updated_at": "2021-10-12T19:38:06Z",
"pushed_at": "2021-09-29T02:20:40Z",
"stargazers_count": 109,
"watchers_count": 109,
"stargazers_count": 110,
"watchers_count": 110,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 109,
"watchers": 110,
"score": 0
}
]

View file

@ -452,17 +452,17 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2021-10-10T02:03:00Z",
"updated_at": "2021-10-12T15:38:03Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 764,
"watchers_count": 764,
"stargazers_count": 763,
"watchers_count": 763,
"forks_count": 224,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 224,
"watchers": 764,
"watchers": 763,
"score": 0
},
{
@ -699,17 +699,17 @@
"description": null,
"fork": false,
"created_at": "2021-02-03T09:04:14Z",
"updated_at": "2021-08-28T18:19:05Z",
"updated_at": "2021-10-12T18:17:20Z",
"pushed_at": "2021-02-03T09:04:15Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 0,
"score": 0
},
{
@ -1321,7 +1321,7 @@
"fork": false,
"created_at": "2021-08-13T14:23:09Z",
"updated_at": "2021-08-17T15:22:10Z",
"pushed_at": "2021-08-17T15:22:08Z",
"pushed_at": "2021-10-12T20:51:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,10 +13,10 @@
"description": "vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.",
"fork": false,
"created_at": "2021-05-04T17:15:58Z",
"updated_at": "2021-10-11T05:16:20Z",
"updated_at": "2021-10-12T15:25:37Z",
"pushed_at": "2021-05-10T20:42:33Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 48,
"watchers": 49,
"score": 0
}
]

View file

@ -13,16 +13,16 @@
"description": "Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication.",
"fork": false,
"created_at": "2021-10-11T22:08:47Z",
"updated_at": "2021-10-12T14:50:43Z",
"pushed_at": "2021-10-11T22:24:47Z",
"updated_at": "2021-10-12T19:01:05Z",
"pushed_at": "2021-10-12T19:03:19Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 10,
"score": 0
}

View file

@ -17,7 +17,7 @@
"pushed_at": "2021-04-09T07:37:29Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [
@ -26,7 +26,7 @@
"klogserver"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 3,
"score": 0
}

View file

@ -94,17 +94,17 @@
"description": "Proof of Concept for CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207",
"fork": false,
"created_at": "2021-09-04T15:34:03Z",
"updated_at": "2021-09-27T18:02:16Z",
"updated_at": "2021-10-12T19:43:33Z",
"pushed_at": "2021-09-07T15:18:45Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 8,
"watchers": 9,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Windows Etw LPE",
"fork": false,
"created_at": "2021-10-12T03:50:44Z",
"updated_at": "2021-10-12T12:37:10Z",
"updated_at": "2021-10-12T19:31:05Z",
"pushed_at": "2021-10-12T05:52:00Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 11,
"watchers": 15,
"score": 0
}
]

29
2021/CVE-2021-37980.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 416466988,
"name": "CVE-2021-37980",
"full_name": "ZeusBox\/CVE-2021-37980",
"owner": {
"login": "ZeusBox",
"id": 78951067,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78951067?v=4",
"html_url": "https:\/\/github.com\/ZeusBox"
},
"html_url": "https:\/\/github.com\/ZeusBox\/CVE-2021-37980",
"description": "PoC CVE-2021-37980 : Inappropriate implementation in Sandbox (windows only)",
"fork": false,
"created_at": "2021-10-12T19:14:29Z",
"updated_at": "2021-10-12T19:27:29Z",
"pushed_at": "2021-10-12T19:27:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -67,17 +67,17 @@
"description": "Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)",
"fork": false,
"created_at": "2021-09-16T02:11:36Z",
"updated_at": "2021-10-11T18:33:19Z",
"updated_at": "2021-10-12T19:43:31Z",
"pushed_at": "2021-09-16T10:39:04Z",
"stargazers_count": 173,
"watchers_count": 173,
"stargazers_count": 174,
"watchers_count": 174,
"forks_count": 50,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 50,
"watchers": 173,
"watchers": 174,
"score": 0
},
{

View file

@ -179,12 +179,12 @@
"pushed_at": "2021-09-11T10:35:20Z",
"stargazers_count": 73,
"watchers_count": 73,
"forks_count": 54,
"forks_count": 55,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 54,
"forks": 55,
"watchers": 73,
"score": 0
},
@ -229,17 +229,17 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2021-10-12T14:19:03Z",
"updated_at": "2021-10-12T17:18:19Z",
"pushed_at": "2021-09-11T09:50:26Z",
"stargazers_count": 1272,
"watchers_count": 1272,
"stargazers_count": 1274,
"watchers_count": 1274,
"forks_count": 402,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 402,
"watchers": 1272,
"watchers": 1274,
"score": 0
},
{
@ -256,17 +256,17 @@
"description": null,
"fork": false,
"created_at": "2021-09-11T02:49:37Z",
"updated_at": "2021-09-11T02:55:42Z",
"updated_at": "2021-10-12T16:17:48Z",
"pushed_at": "2021-09-11T02:49:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"forks": 2,
"watchers": 1,
"score": 0
},
{

View file

@ -229,17 +229,17 @@
"description": null,
"fork": false,
"created_at": "2021-10-05T23:53:48Z",
"updated_at": "2021-10-12T02:54:17Z",
"updated_at": "2021-10-12T20:06:37Z",
"pushed_at": "2021-10-06T15:37:23Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 30,
"watchers": 31,
"score": 0
},
{

View file

@ -887,6 +887,14 @@ A improper input sanitization vulnerability exists in Rocket.Chat server 3.11, 3
- [optionalCTF/Rocket.Chat-Automated-Account-Takeover-RCE-CVE-2021-22911](https://github.com/optionalCTF/Rocket.Chat-Automated-Account-Takeover-RCE-CVE-2021-22911)
- [jayngng/CVE-2021-22911](https://github.com/jayngng/CVE-2021-22911)
### CVE-2021-22941 (2021-09-23)
<code>
Improper Access Control in Citrix ShareFile storage zones controller before 5.11.20 may allow an unauthenticated attacker to remotely compromise the storage zones controller.
</code>
- [hoavt184/CVE-2021-22941](https://github.com/hoavt184/CVE-2021-22941)
### CVE-2021-22986 (2021-03-31)
<code>
@ -2350,6 +2358,9 @@ A reflected cross-site scripting (XSS) vulnerability exists in multiple pages in
- [dievus/CVE-2021-37833](https://github.com/dievus/CVE-2021-37833)
### CVE-2021-37980
- [ZeusBox/CVE-2021-37980](https://github.com/ZeusBox/CVE-2021-37980)
### CVE-2021-38149 (2021-08-06)
<code>
@ -17225,7 +17236,6 @@ The (1) EPHEMERAL, (2) HTTPS, (3) MVG, (4) MSL, (5) TEXT, (6) SHOW, (7) WIN, and
- [chusiang/CVE-2016-3714.ansible.role](https://github.com/chusiang/CVE-2016-3714.ansible.role)
- [jpeanut/ImageTragick-CVE-2016-3714-RShell](https://github.com/jpeanut/ImageTragick-CVE-2016-3714-RShell)
- [Hood3dRob1n/CVE-2016-3714](https://github.com/Hood3dRob1n/CVE-2016-3714)
- [HRSkraps/CVE-2016-3714](https://github.com/HRSkraps/CVE-2016-3714)
### CVE-2016-3749 (2016-07-10)