Auto Update 2021/11/23 12:13:15

This commit is contained in:
motikan2010-bot 2021-11-23 21:13:15 +09:00
parent c53fb5ee40
commit 3be2b9e088
44 changed files with 210 additions and 210 deletions

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-11-22T01:44:59Z",
"updated_at": "2021-11-23T09:06:46Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1219,
"watchers_count": 1219,
"stargazers_count": 1220,
"watchers_count": 1220,
"forks_count": 272,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 272,
"watchers": 1219,
"watchers": 1220,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-11-22T01:44:59Z",
"updated_at": "2021-11-23T09:06:46Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1219,
"watchers_count": 1219,
"stargazers_count": 1220,
"watchers_count": 1220,
"forks_count": 272,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 272,
"watchers": 1219,
"watchers": 1220,
"score": 0
},
{

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-11-22T01:44:59Z",
"updated_at": "2021-11-23T09:06:46Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1219,
"watchers_count": 1219,
"stargazers_count": 1220,
"watchers_count": 1220,
"forks_count": 272,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 272,
"watchers": 1219,
"watchers": 1220,
"score": 0
},
{

View file

@ -83,17 +83,17 @@
"description": "Exploit written in Python for CVE-2018-15473 with threading and export formats",
"fork": false,
"created_at": "2018-08-21T00:09:56Z",
"updated_at": "2021-11-18T09:27:06Z",
"updated_at": "2021-11-23T11:05:36Z",
"pushed_at": "2021-11-08T02:19:03Z",
"stargazers_count": 472,
"watchers_count": 472,
"stargazers_count": 473,
"watchers_count": 473,
"forks_count": 173,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 173,
"watchers": 472,
"watchers": 473,
"score": 0
},
{

View file

@ -530,10 +530,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-11-22T01:44:59Z",
"updated_at": "2021-11-23T09:06:46Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1219,
"watchers_count": 1219,
"stargazers_count": 1220,
"watchers_count": 1220,
"forks_count": 272,
"allow_forking": true,
"is_template": false,
@ -561,7 +561,7 @@
],
"visibility": "public",
"forks": 272,
"watchers": 1219,
"watchers": 1220,
"score": 0
},
{

View file

@ -98,7 +98,7 @@
"pushed_at": "2020-10-22T18:31:02Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
@ -107,7 +107,7 @@
"security-vulnerability"
],
"visibility": "public",
"forks": 1,
"forks": 0,
"watchers": 1,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2020-01-06T22:34:16Z",
"updated_at": "2021-09-23T19:41:18Z",
"updated_at": "2021-11-23T09:26:57Z",
"pushed_at": "2020-01-07T14:29:45Z",
"stargazers_count": 140,
"watchers_count": 140,
"stargazers_count": 139,
"watchers_count": 139,
"forks_count": 45,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 45,
"watchers": 140,
"watchers": 139,
"score": 0
}
]

View file

@ -40,10 +40,10 @@
"description": "漏洞POC、EXP合集持续更新。Apache Druid-任意文件读取CVE-2021-36749、ConfluenceRCECVE-2021-26084、ZeroShell防火墙RCECVE-2019-12725、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露",
"fork": false,
"created_at": "2021-05-22T05:06:33Z",
"updated_at": "2021-11-22T08:57:06Z",
"updated_at": "2021-11-23T07:14:28Z",
"pushed_at": "2021-11-21T10:34:06Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
@ -54,7 +54,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 37,
"watchers": 38,
"score": 0
},
{

View file

@ -40,11 +40,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-11-23T03:50:41Z",
"updated_at": "2021-11-23T08:40:01Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2989,
"watchers_count": 2989,
"forks_count": 884,
"stargazers_count": 2992,
"watchers_count": 2992,
"forks_count": 885,
"allow_forking": true,
"is_template": false,
"topics": [
@ -69,8 +69,8 @@
"webshell"
],
"visibility": "public",
"forks": 884,
"watchers": 2989,
"forks": 885,
"watchers": 2992,
"score": 0
},
{

View file

@ -94,17 +94,17 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2021-11-21T18:15:07Z",
"updated_at": "2021-11-23T09:07:05Z",
"pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 788,
"watchers_count": 788,
"stargazers_count": 789,
"watchers_count": 789,
"forks_count": 167,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 167,
"watchers": 788,
"watchers": 789,
"score": 0
},
{
@ -175,10 +175,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-11-22T01:44:59Z",
"updated_at": "2021-11-23T09:06:46Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1219,
"watchers_count": 1219,
"stargazers_count": 1220,
"watchers_count": 1220,
"forks_count": 272,
"allow_forking": true,
"is_template": false,
@ -206,7 +206,7 @@
],
"visibility": "public",
"forks": 272,
"watchers": 1219,
"watchers": 1220,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2021-11-20T03:52:20Z",
"updated_at": "2021-11-23T06:45:22Z",
"pushed_at": "2020-09-11T07:38:22Z",
"stargazers_count": 583,
"watchers_count": 583,
"stargazers_count": 584,
"watchers_count": 584,
"forks_count": 151,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 151,
"watchers": 583,
"watchers": 584,
"score": 0
},
{
@ -94,8 +94,8 @@
"description": "CVE-2020-0787的简单回显",
"fork": false,
"created_at": "2021-11-16T11:04:42Z",
"updated_at": "2021-11-21T11:14:49Z",
"pushed_at": "2021-11-16T11:16:25Z",
"updated_at": "2021-11-23T07:52:31Z",
"pushed_at": "2021-11-23T07:52:28Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,

View file

@ -544,10 +544,10 @@
"description": "Multithread SMB scanner to check CVE-2020-0796 for SMB v3.11",
"fork": false,
"created_at": "2020-03-12T20:07:44Z",
"updated_at": "2021-04-22T22:14:24Z",
"updated_at": "2021-11-23T11:13:30Z",
"pushed_at": "2020-08-20T15:59:58Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
@ -562,7 +562,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 14,
"watchers": 15,
"score": 0
},
{
@ -1609,17 +1609,17 @@
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
"fork": false,
"created_at": "2020-06-10T16:44:39Z",
"updated_at": "2021-11-16T11:33:52Z",
"updated_at": "2021-11-23T10:20:05Z",
"pushed_at": "2021-01-15T19:21:25Z",
"stargazers_count": 150,
"watchers_count": 150,
"forks_count": 40,
"stargazers_count": 151,
"watchers_count": 151,
"forks_count": 41,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 40,
"watchers": 150,
"forks": 41,
"watchers": 151,
"score": 0
},
{

View file

@ -57,10 +57,10 @@
"description": "HoneyPoC: Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2000 up to Windows Server 2019.",
"fork": false,
"created_at": "2020-07-14T19:02:25Z",
"updated_at": "2021-10-24T17:01:27Z",
"updated_at": "2021-11-23T09:26:53Z",
"pushed_at": "2021-06-10T02:46:52Z",
"stargazers_count": 270,
"watchers_count": 270,
"stargazers_count": 269,
"watchers_count": 269,
"forks_count": 78,
"allow_forking": true,
"is_template": false,
@ -70,7 +70,7 @@
],
"visibility": "public",
"forks": 78,
"watchers": 270,
"watchers": 269,
"score": 0
},
{

View file

@ -94,17 +94,17 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2021-11-23T02:23:37Z",
"updated_at": "2021-11-23T07:14:35Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 880,
"watchers_count": 880,
"stargazers_count": 881,
"watchers_count": 881,
"forks_count": 239,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 239,
"watchers": 880,
"watchers": 881,
"score": 0
},
{

View file

@ -13,11 +13,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-11-23T03:50:41Z",
"updated_at": "2021-11-23T08:40:01Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2989,
"watchers_count": 2989,
"forks_count": 884,
"stargazers_count": 2992,
"watchers_count": 2992,
"forks_count": 885,
"allow_forking": true,
"is_template": false,
"topics": [
@ -42,8 +42,8 @@
"webshell"
],
"visibility": "public",
"forks": 884,
"watchers": 2989,
"forks": 885,
"watchers": 2992,
"score": 0
},
{

View file

@ -121,10 +121,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-11-22T08:56:48Z",
"updated_at": "2021-11-23T09:05:05Z",
"pushed_at": "2021-07-30T03:28:00Z",
"stargazers_count": 890,
"watchers_count": 890,
"stargazers_count": 892,
"watchers_count": 892,
"forks_count": 279,
"allow_forking": true,
"is_template": false,
@ -135,7 +135,7 @@
],
"visibility": "public",
"forks": 279,
"watchers": 890,
"watchers": 892,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule",
"fork": false,
"created_at": "2020-10-07T19:56:09Z",
"updated_at": "2021-11-18T09:34:27Z",
"updated_at": "2021-11-23T09:26:56Z",
"pushed_at": "2020-10-26T10:15:32Z",
"stargazers_count": 205,
"watchers_count": 205,
"stargazers_count": 204,
"watchers_count": 204,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
@ -42,7 +42,7 @@
],
"visibility": "public",
"forks": 28,
"watchers": 205,
"watchers": 204,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "weaponized tool for CVE-2020-17144",
"fork": false,
"created_at": "2020-12-09T20:57:16Z",
"updated_at": "2021-11-22T07:56:45Z",
"updated_at": "2021-11-23T06:27:02Z",
"pushed_at": "2020-12-09T20:57:32Z",
"stargazers_count": 129,
"watchers_count": 129,
"stargazers_count": 130,
"watchers_count": 130,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 129,
"watchers": 130,
"score": 0
}
]

View file

@ -368,7 +368,7 @@
"pushed_at": "2020-03-09T14:51:43Z",
"stargazers_count": 219,
"watchers_count": 219,
"forks_count": 83,
"forks_count": 84,
"allow_forking": true,
"is_template": false,
"topics": [
@ -379,7 +379,7 @@
"ghostcat"
],
"visibility": "public",
"forks": 83,
"forks": 84,
"watchers": 219,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-11-22T01:44:59Z",
"updated_at": "2021-11-23T09:06:46Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1219,
"watchers_count": 1219,
"stargazers_count": 1220,
"watchers_count": 1220,
"forks_count": 272,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 272,
"watchers": 1219,
"watchers": 1220,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-01-12T10:11:42Z",
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 21,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 21,
"forks": 22,
"watchers": 28,
"score": 0
},

View file

@ -67,17 +67,17 @@
"description": "Exploit for CVE-2020-3952 in vCenter 6.7",
"fork": false,
"created_at": "2020-04-16T07:40:51Z",
"updated_at": "2021-11-17T19:06:31Z",
"updated_at": "2021-11-23T07:55:54Z",
"pushed_at": "2020-04-16T08:38:42Z",
"stargazers_count": 251,
"watchers_count": 251,
"stargazers_count": 252,
"watchers_count": 252,
"forks_count": 59,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 59,
"watchers": 251,
"watchers": 252,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-7200: HPE Systems Insight Manager (SIM) RCE PoC",
"fork": false,
"created_at": "2021-01-14T21:05:29Z",
"updated_at": "2021-10-10T21:21:29Z",
"updated_at": "2021-11-23T07:17:49Z",
"pushed_at": "2021-01-17T20:30:38Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Information about Kubernetes CVE-2020-8558, including proof of concept exploit.",
"fork": false,
"created_at": "2020-07-09T06:56:07Z",
"updated_at": "2021-11-15T10:28:12Z",
"updated_at": "2021-11-23T07:30:05Z",
"pushed_at": "2020-07-22T12:34:47Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 37,
"watchers": 38,
"score": 0
},
{

View file

@ -157,10 +157,10 @@
"description": "Local Privilege Escalation Edition for CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-07-01T09:47:13Z",
"updated_at": "2021-11-18T09:35:16Z",
"updated_at": "2021-11-23T10:19:31Z",
"pushed_at": "2021-07-05T06:46:12Z",
"stargazers_count": 307,
"watchers_count": 307,
"stargazers_count": 308,
"watchers_count": 308,
"forks_count": 75,
"allow_forking": true,
"is_template": false,
@ -176,7 +176,7 @@
],
"visibility": "public",
"forks": 75,
"watchers": 307,
"watchers": 308,
"score": 0
},
{
@ -943,12 +943,12 @@
"pushed_at": "2021-10-06T21:04:44Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 2,
"score": 0
}

View file

@ -179,12 +179,12 @@
"pushed_at": "2021-09-28T21:08:21Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 15,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 15,
"forks": 16,
"watchers": 16,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "Spring Cloud Netflix Hystrix Dashboard template resolution vulnerability CVE-2021-22053",
"fork": false,
"created_at": "2021-11-21T08:47:56Z",
"updated_at": "2021-11-23T05:37:00Z",
"updated_at": "2021-11-23T08:05:29Z",
"pushed_at": "2021-11-21T08:52:47Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 24,
"watchers": 26,
"score": 0
},
{

View file

@ -121,10 +121,10 @@
"description": "CVE-2021-22205& GitLab CE\/EE RCE",
"fork": false,
"created_at": "2021-10-29T04:30:45Z",
"updated_at": "2021-11-23T03:35:16Z",
"updated_at": "2021-11-23T11:43:19Z",
"pushed_at": "2021-11-06T05:20:30Z",
"stargazers_count": 97,
"watchers_count": 97,
"stargazers_count": 98,
"watchers_count": 98,
"forks_count": 42,
"allow_forking": true,
"is_template": false,
@ -133,34 +133,7 @@
],
"visibility": "public",
"forks": 42,
"watchers": 97,
"score": 0
},
{
"id": 422511272,
"name": "CVE-2021-22205",
"full_name": "b3tterm4n\/CVE-2021-22205",
"owner": {
"login": "b3tterm4n",
"id": 59466113,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59466113?v=4",
"html_url": "https:\/\/github.com\/b3tterm4n"
},
"html_url": "https:\/\/github.com\/b3tterm4n\/CVE-2021-22205",
"description": "personal",
"fork": false,
"created_at": "2021-10-29T09:09:45Z",
"updated_at": "2021-11-01T03:37:58Z",
"pushed_at": "2021-11-01T03:37:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 98,
"score": 0
},
{

View file

@ -17,7 +17,7 @@
"pushed_at": "2021-04-15T12:46:54Z",
"stargazers_count": 191,
"watchers_count": 191,
"forks_count": 45,
"forks_count": 46,
"allow_forking": true,
"is_template": false,
"topics": [
@ -28,7 +28,7 @@
"tcpip"
],
"visibility": "public",
"forks": 45,
"forks": 46,
"watchers": 191,
"score": 0
}

View file

@ -44,12 +44,12 @@
"pushed_at": "2021-10-23T02:06:40Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 3,
"score": 0
},

View file

@ -121,10 +121,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-11-22T08:56:48Z",
"updated_at": "2021-11-23T09:05:05Z",
"pushed_at": "2021-07-30T03:28:00Z",
"stargazers_count": 890,
"watchers_count": 890,
"stargazers_count": 892,
"watchers_count": 892,
"forks_count": 279,
"allow_forking": true,
"is_template": false,
@ -135,7 +135,7 @@
],
"visibility": "public",
"forks": 279,
"watchers": 890,
"watchers": 892,
"score": 0
},
{

View file

@ -796,17 +796,17 @@
"description": "Confluence OGNL injection",
"fork": false,
"created_at": "2021-09-09T06:19:13Z",
"updated_at": "2021-09-10T01:50:01Z",
"updated_at": "2021-11-23T06:39:37Z",
"pushed_at": "2021-09-09T13:26:43Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 10,
"watchers": 11,
"score": 0
},
{

View file

@ -67,17 +67,17 @@
"description": null,
"fork": false,
"created_at": "2021-01-25T08:42:28Z",
"updated_at": "2021-11-05T02:23:02Z",
"updated_at": "2021-11-23T11:35:12Z",
"pushed_at": "2021-01-25T08:49:59Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 23,
"watchers": 24,
"score": 0
},
{
@ -206,16 +206,16 @@
"description": "CVE-2021-3129-Laravel Debug mode 远程代码执行漏洞",
"fork": false,
"created_at": "2021-02-21T06:27:18Z",
"updated_at": "2021-10-24T10:27:36Z",
"pushed_at": "2021-10-31T06:01:27Z",
"updated_at": "2021-11-23T07:22:21Z",
"pushed_at": "2021-11-23T07:22:19Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 2,
"score": 0
},

View file

@ -14,15 +14,15 @@
"fork": false,
"created_at": "2021-11-14T14:06:18Z",
"updated_at": "2021-11-14T14:23:25Z",
"pushed_at": "2021-11-14T14:48:31Z",
"pushed_at": "2021-11-23T11:28:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
}

View file

@ -67,17 +67,17 @@
"description": "CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability",
"fork": false,
"created_at": "2021-08-16T11:27:13Z",
"updated_at": "2021-11-21T05:27:25Z",
"updated_at": "2021-11-23T08:34:55Z",
"pushed_at": "2021-08-16T09:00:06Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 15,
"watchers": 16,
"score": 0
},
{
@ -121,17 +121,17 @@
"description": "对Exchange Proxyshell 做了二次修改,精确的拆分、实现辅助性安全测试。",
"fork": false,
"created_at": "2021-11-22T07:47:09Z",
"updated_at": "2021-11-22T08:31:17Z",
"pushed_at": "2021-11-22T08:27:26Z",
"stargazers_count": 1,
"watchers_count": 1,
"updated_at": "2021-11-23T11:53:21Z",
"pushed_at": "2021-11-23T09:56:37Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-09-28T04:08:43Z",
"stargazers_count": 256,
"watchers_count": 256,
"forks_count": 89,
"forks_count": 90,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 89,
"forks": 90,
"watchers": 256,
"score": 0
},

View file

@ -13,8 +13,8 @@
"description": "CVE-2021-36260",
"fork": false,
"created_at": "2021-10-18T06:40:48Z",
"updated_at": "2021-11-23T06:03:25Z",
"pushed_at": "2021-11-23T05:54:04Z",
"updated_at": "2021-11-23T07:26:05Z",
"pushed_at": "2021-11-23T07:26:03Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 2,

View file

@ -13,10 +13,10 @@
"description": "漏洞POC、EXP合集持续更新。Apache Druid-任意文件读取CVE-2021-36749、ConfluenceRCECVE-2021-26084、ZeroShell防火墙RCECVE-2019-12725、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露",
"fork": false,
"created_at": "2021-05-22T05:06:33Z",
"updated_at": "2021-11-22T08:57:06Z",
"updated_at": "2021-11-23T07:14:28Z",
"pushed_at": "2021-11-21T10:34:06Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 37,
"watchers": 38,
"score": 0
},
{

View file

@ -96,17 +96,17 @@
"description": "Exploit for CVE-2021-40449",
"fork": false,
"created_at": "2021-11-07T16:15:19Z",
"updated_at": "2021-11-15T04:28:19Z",
"updated_at": "2021-11-23T07:42:13Z",
"pushed_at": "2021-11-07T16:21:20Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 44,
"watchers_count": 44,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 43,
"watchers": 44,
"score": 0
},
{

View file

@ -135,5 +135,32 @@
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 430985632,
"name": "CVE-2021-41277",
"full_name": "kaizensecurity\/CVE-2021-41277",
"owner": {
"login": "kaizensecurity",
"id": 50189722,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50189722?v=4",
"html_url": "https:\/\/github.com\/kaizensecurity"
},
"html_url": "https:\/\/github.com\/kaizensecurity\/CVE-2021-41277",
"description": "plugin made for LeakiX",
"fork": false,
"created_at": "2021-11-23T06:24:16Z",
"updated_at": "2021-11-23T06:24:57Z",
"pushed_at": "2021-11-23T06:24:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -125,12 +125,12 @@
"pushed_at": "2021-11-03T10:02:26Z",
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 31,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 31,
"forks": 32,
"watchers": 35,
"score": 0
},
@ -1290,17 +1290,17 @@
"description": "CVE-2021-41773 CVE-2021-42013漏洞批量检测工具",
"fork": false,
"created_at": "2021-10-09T03:32:18Z",
"updated_at": "2021-11-23T05:14:05Z",
"updated_at": "2021-11-23T10:49:18Z",
"pushed_at": "2021-10-09T03:49:21Z",
"stargazers_count": 96,
"watchers_count": 96,
"stargazers_count": 101,
"watchers_count": 101,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 96,
"watchers": 101,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Microsoft Exchange Server Poc",
"fork": false,
"created_at": "2021-11-23T02:26:26Z",
"updated_at": "2021-11-23T05:59:50Z",
"updated_at": "2021-11-23T11:56:53Z",
"pushed_at": "2021-11-23T02:33:47Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 4,
"forks": 7,
"watchers": 9,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "PoC for CVE-2021-43557",
"fork": false,
"created_at": "2021-11-22T20:23:05Z",
"updated_at": "2021-11-23T03:52:55Z",
"updated_at": "2021-11-23T09:46:10Z",
"pushed_at": "2021-11-22T20:24:32Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 4,
"score": 0
}
]

View file

@ -896,7 +896,6 @@ An issue has been discovered in GitLab CE/EE affecting all versions starting fro
- [r0eXpeR/CVE-2021-22205](https://github.com/r0eXpeR/CVE-2021-22205)
- [antx-code/CVE-2021-22205](https://github.com/antx-code/CVE-2021-22205)
- [Al1ex/CVE-2021-22205](https://github.com/Al1ex/CVE-2021-22205)
- [b3tterm4n/CVE-2021-22205](https://github.com/b3tterm4n/CVE-2021-22205)
- [whwlsfb/CVE-2021-22205](https://github.com/whwlsfb/CVE-2021-22205)
- [findneo/GitLab-preauth-RCE_CVE-2021-22205](https://github.com/findneo/GitLab-preauth-RCE_CVE-2021-22205)
- [Seals6/CVE-2021-22205](https://github.com/Seals6/CVE-2021-22205)
@ -3046,6 +3045,7 @@ Metabase is an open source data analytics platform. In affected versions a secur
- [Henry4E36/Metabase-cve-2021-41277](https://github.com/Henry4E36/Metabase-cve-2021-41277)
- [kap1ush0n/CVE-2021-41277](https://github.com/kap1ush0n/CVE-2021-41277)
- [z3n70/CVE-2021-41277](https://github.com/z3n70/CVE-2021-41277)
- [kaizensecurity/CVE-2021-41277](https://github.com/kaizensecurity/CVE-2021-41277)
### CVE-2021-41351 (2021-11-09)