Auto Update 2022/11/19 06:17:43

This commit is contained in:
motikan2010-bot 2022-11-19 15:17:43 +09:00
parent 942e78d9a9
commit 396d67a1a7
10 changed files with 44 additions and 44 deletions

View file

@ -192,10 +192,10 @@
"description": "iis6 exploit 2017 CVE-2017-7269",
"fork": false,
"created_at": "2017-04-05T23:21:12Z",
"updated_at": "2022-11-16T16:35:53Z",
"updated_at": "2022-11-19T02:13:19Z",
"pushed_at": "2017-04-05T23:29:03Z",
"stargazers_count": 55,
"watchers_count": 55,
"stargazers_count": 56,
"watchers_count": 56,
"has_discussions": false,
"forks_count": 54,
"allow_forking": true,
@ -204,7 +204,7 @@
"topics": [],
"visibility": "public",
"forks": 54,
"watchers": 55,
"watchers": 56,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-11-18T11:50:28Z",
"updated_at": "2022-11-19T04:29:36Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3604,
"watchers_count": 3604,
"stargazers_count": 3605,
"watchers_count": 3605,
"has_discussions": false,
"forks_count": 1042,
"allow_forking": true,
@ -74,7 +74,7 @@
],
"visibility": "public",
"forks": 1042,
"watchers": 3604,
"watchers": 3605,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "A login bypass(CVE-2019-18371) and a command injection vulnerability(CVE-2019-18370) in Xiaomi Router R3G up to version 2.28.23.",
"fork": false,
"created_at": "2019-08-30T16:32:13Z",
"updated_at": "2022-11-18T05:38:21Z",
"updated_at": "2022-11-19T02:56:22Z",
"pushed_at": "2020-01-12T02:34:45Z",
"stargazers_count": 168,
"watchers_count": 168,
"stargazers_count": 169,
"watchers_count": 169,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 168,
"watchers": 169,
"score": 0
},
{

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2019-11-06T07:26:43Z",
"updated_at": "2019-11-06T07:27:36Z",
"pushed_at": "2022-09-08T10:56:45Z",
"pushed_at": "2022-11-19T00:43:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-11-18T11:50:28Z",
"updated_at": "2022-11-19T04:29:36Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3604,
"watchers_count": 3604,
"stargazers_count": 3605,
"watchers_count": 3605,
"has_discussions": false,
"forks_count": 1042,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1042,
"watchers": 3604,
"watchers": 3605,
"score": 0
},
{

View file

@ -88,10 +88,10 @@
"description": "CVE-2021-21972 Exploit",
"fork": false,
"created_at": "2021-02-24T11:14:58Z",
"updated_at": "2022-11-15T17:34:31Z",
"updated_at": "2022-11-19T03:30:11Z",
"pushed_at": "2021-12-30T12:26:11Z",
"stargazers_count": 412,
"watchers_count": 412,
"stargazers_count": 413,
"watchers_count": 413,
"has_discussions": false,
"forks_count": 141,
"allow_forking": true,
@ -102,7 +102,7 @@
],
"visibility": "public",
"forks": 141,
"watchers": 412,
"watchers": 413,
"score": 0
},
{
@ -235,10 +235,10 @@
"description": "CVE-2021-21972",
"fork": false,
"created_at": "2021-02-25T05:16:38Z",
"updated_at": "2022-09-13T09:52:16Z",
"updated_at": "2022-11-19T04:45:15Z",
"pushed_at": "2021-03-01T03:38:00Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -247,7 +247,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 29,
"watchers": 30,
"score": 0
},
{
@ -795,10 +795,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2022-11-18T12:41:14Z",
"updated_at": "2022-11-19T01:51:04Z",
"pushed_at": "2022-10-28T14:26:56Z",
"stargazers_count": 617,
"watchers_count": 617,
"stargazers_count": 618,
"watchers_count": 618,
"has_discussions": false,
"forks_count": 67,
"allow_forking": true,
@ -814,7 +814,7 @@
],
"visibility": "public",
"forks": 67,
"watchers": 617,
"watchers": 618,
"score": 0
},
{

View file

@ -291,7 +291,7 @@
"fork": false,
"created_at": "2022-11-17T15:38:22Z",
"updated_at": "2022-11-18T01:18:53Z",
"pushed_at": "2022-11-18T23:53:59Z",
"pushed_at": "2022-11-19T03:00:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -712,10 +712,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2022-11-18T12:41:14Z",
"updated_at": "2022-11-19T01:51:04Z",
"pushed_at": "2022-10-28T14:26:56Z",
"stargazers_count": 617,
"watchers_count": 617,
"stargazers_count": 618,
"watchers_count": 618,
"has_discussions": false,
"forks_count": 67,
"allow_forking": true,
@ -731,7 +731,7 @@
],
"visibility": "public",
"forks": 67,
"watchers": 617,
"watchers": 618,
"score": 0
},
{

View file

@ -1688,10 +1688,10 @@
"description": "在受影响的Confluence Server 和Data Center 版本中存在一个OGNL 注入漏洞该漏洞允许未经身份验证的攻击者在Confluence Server 或Data Center 服务器上执行任意代码。",
"fork": false,
"created_at": "2022-10-15T15:56:41Z",
"updated_at": "2022-10-15T16:07:15Z",
"updated_at": "2022-11-19T03:07:42Z",
"pushed_at": "2022-10-15T16:07:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -1700,7 +1700,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0
},
{

View file

@ -13,12 +13,12 @@
"description": "Apache Airflow < 2.4.0 DAG example_bash_operator RCE POC",
"fork": false,
"created_at": "2022-11-18T13:19:23Z",
"updated_at": "2022-11-18T15:25:45Z",
"updated_at": "2022-11-19T04:23:03Z",
"pushed_at": "2022-11-18T13:26:18Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -29,8 +29,8 @@
"rce"
],
"visibility": "public",
"forks": 1,
"watchers": 2,
"forks": 2,
"watchers": 4,
"score": 0
}
]