Auto Update 2021/11/29 12:13:28

This commit is contained in:
motikan2010-bot 2021-11-29 21:13:28 +09:00
parent 43cca42316
commit 4e88de0586
40 changed files with 281 additions and 198 deletions

View file

@ -121,17 +121,17 @@
"description": "A Python replicated exploit for Webmin 1.580 \/file\/show.cgi Remote Code Execution",
"fork": false,
"created_at": "2021-09-04T04:01:56Z",
"updated_at": "2021-10-31T01:22:55Z",
"updated_at": "2021-11-29T10:21:51Z",
"pushed_at": "2021-09-28T16:14:13Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 19,
"watchers": 18,
"score": 0
}
]

View file

@ -1,29 +0,0 @@
[
{
"id": 36888918,
"name": "CVE-2013-1965",
"full_name": "cinno\/CVE-2013-1965",
"owner": {
"login": "cinno",
"id": 11706497,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11706497?v=4",
"html_url": "https:\/\/github.com\/cinno"
},
"html_url": "https:\/\/github.com\/cinno\/CVE-2013-1965",
"description": "A proof of concept exploit for the CVE-2013-1965 vulnerability affecting Apache Struts 2",
"fork": false,
"created_at": "2015-06-04T18:47:35Z",
"updated_at": "2016-09-22T09:01:38Z",
"pushed_at": "2015-06-02T22:28:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -429,17 +429,17 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2021-11-29T02:55:38Z",
"updated_at": "2021-11-29T06:49:17Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 307,
"watchers_count": 307,
"stargazers_count": 308,
"watchers_count": 308,
"forks_count": 105,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 105,
"watchers": 307,
"watchers": 308,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Hikvision camera CVE-2017-7921-EXP",
"fork": false,
"created_at": "2020-04-27T11:49:40Z",
"updated_at": "2021-11-25T19:17:21Z",
"updated_at": "2021-11-29T07:01:28Z",
"pushed_at": "2020-08-09T15:35:16Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 40,
"watchers": 41,
"score": 0
},
{

View file

@ -94,17 +94,17 @@
"description": "php-fpm+Nginx RCE",
"fork": false,
"created_at": "2019-10-23T23:26:57Z",
"updated_at": "2021-11-24T06:41:00Z",
"updated_at": "2021-11-29T10:56:53Z",
"pushed_at": "2020-08-20T04:43:25Z",
"stargazers_count": 88,
"watchers_count": 88,
"forks_count": 39,
"stargazers_count": 89,
"watchers_count": 89,
"forks_count": 40,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 88,
"forks": 40,
"watchers": 89,
"score": 0
},
{

View file

@ -40,10 +40,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-11-29T02:16:53Z",
"updated_at": "2021-11-29T06:35:54Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3011,
"watchers_count": 3011,
"stargazers_count": 3012,
"watchers_count": 3012,
"forks_count": 891,
"allow_forking": true,
"is_template": false,
@ -70,7 +70,7 @@
],
"visibility": "public",
"forks": 891,
"watchers": 3011,
"watchers": 3012,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2021-11-29T02:55:38Z",
"updated_at": "2021-11-29T06:49:17Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 307,
"watchers_count": 307,
"stargazers_count": 308,
"watchers_count": 308,
"forks_count": 105,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 105,
"watchers": 307,
"watchers": 308,
"score": 0
},
{
@ -202,17 +202,17 @@
"description": "CVE-2019-2725 命令回显",
"fork": false,
"created_at": "2019-05-29T01:57:05Z",
"updated_at": "2021-11-26T01:12:08Z",
"updated_at": "2021-11-29T10:02:04Z",
"pushed_at": "2019-08-08T09:48:20Z",
"stargazers_count": 410,
"watchers_count": 410,
"stargazers_count": 411,
"watchers_count": 411,
"forks_count": 162,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 162,
"watchers": 410,
"watchers": 411,
"score": 0
},
{

View file

@ -46,17 +46,17 @@
"description": "CVE-2020-3992 & CVE-2019-5544",
"fork": false,
"created_at": "2021-02-04T15:15:22Z",
"updated_at": "2021-08-31T11:17:23Z",
"updated_at": "2021-11-29T10:33:40Z",
"pushed_at": "2021-02-05T06:40:50Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 23,
"watchers": 26,
"score": 0
}
]

View file

@ -28,6 +28,33 @@
},
{
"id": 431907402,
"name": "CVE-2020-0074-frameworks_base_old1",
"full_name": "Nivaskumark\/CVE-2020-0074-frameworks_base_old1",
"owner": {
"login": "Nivaskumark",
"id": 90234286,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90234286?v=4",
"html_url": "https:\/\/github.com\/Nivaskumark"
},
"html_url": "https:\/\/github.com\/Nivaskumark\/CVE-2020-0074-frameworks_base_old1",
"description": null,
"fork": false,
"created_at": "2021-11-25T16:17:23Z",
"updated_at": "2021-11-29T06:17:46Z",
"pushed_at": "2021-11-25T16:21:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 432927026,
"name": "CVE-2020-0074-frameworks_base",
"full_name": "Nivaskumark\/CVE-2020-0074-frameworks_base",
"owner": {
@ -39,9 +66,36 @@
"html_url": "https:\/\/github.com\/Nivaskumark\/CVE-2020-0074-frameworks_base",
"description": null,
"fork": false,
"created_at": "2021-11-25T16:17:23Z",
"updated_at": "2021-11-25T16:26:54Z",
"pushed_at": "2021-11-25T16:21:11Z",
"created_at": "2021-11-29T06:18:01Z",
"updated_at": "2021-11-29T08:09:36Z",
"pushed_at": "2021-11-29T06:51:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 432940123,
"name": "CVE-2020-0074-frameworks_base_after",
"full_name": "Nivaskumark\/CVE-2020-0074-frameworks_base_after",
"owner": {
"login": "Nivaskumark",
"id": 90234286,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90234286?v=4",
"html_url": "https:\/\/github.com\/Nivaskumark"
},
"html_url": "https:\/\/github.com\/Nivaskumark\/CVE-2020-0074-frameworks_base_after",
"description": null,
"fork": false,
"created_at": "2021-11-29T07:13:33Z",
"updated_at": "2021-11-29T08:09:08Z",
"pushed_at": "2021-11-29T07:53:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -82,19 +82,19 @@
},
{
"id": 432889770,
"name": "CVE-2020-0097-frameworks_base_beforefix",
"full_name": "Nivaskumark\/CVE-2020-0097-frameworks_base_beforefix",
"name": "CVE-2020-0097-frameworks_base",
"full_name": "Nivaskumark\/CVE-2020-0097-frameworks_base",
"owner": {
"login": "Nivaskumark",
"id": 90234286,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90234286?v=4",
"html_url": "https:\/\/github.com\/Nivaskumark"
},
"html_url": "https:\/\/github.com\/Nivaskumark\/CVE-2020-0097-frameworks_base_beforefix",
"html_url": "https:\/\/github.com\/Nivaskumark\/CVE-2020-0097-frameworks_base",
"description": null,
"fork": false,
"created_at": "2021-11-29T03:12:16Z",
"updated_at": "2021-11-29T03:59:58Z",
"updated_at": "2021-11-29T08:17:23Z",
"pushed_at": "2021-11-29T03:46:02Z",
"stargazers_count": 0,
"watchers_count": 0,
@ -109,19 +109,19 @@
},
{
"id": 432899300,
"name": "CVE-2020-0097-frameworks_base",
"full_name": "Nivaskumark\/CVE-2020-0097-frameworks_base",
"name": "CVE-2020-0097-frameworks_base_afterfix",
"full_name": "Nivaskumark\/CVE-2020-0097-frameworks_base_afterfix",
"owner": {
"login": "Nivaskumark",
"id": 90234286,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90234286?v=4",
"html_url": "https:\/\/github.com\/Nivaskumark"
},
"html_url": "https:\/\/github.com\/Nivaskumark\/CVE-2020-0097-frameworks_base",
"html_url": "https:\/\/github.com\/Nivaskumark\/CVE-2020-0097-frameworks_base_afterfix",
"description": null,
"fork": false,
"created_at": "2021-11-29T04:00:19Z",
"updated_at": "2021-11-29T04:38:04Z",
"updated_at": "2021-11-29T08:16:57Z",
"pushed_at": "2021-11-29T04:38:01Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -163,19 +163,19 @@
},
{
"id": 432870892,
"name": "CVE-2020-0114-frameworks_base_before",
"full_name": "Nivaskumark\/CVE-2020-0114-frameworks_base_before",
"name": "CVE-2020-0114-frameworks_base",
"full_name": "Nivaskumark\/CVE-2020-0114-frameworks_base",
"owner": {
"login": "Nivaskumark",
"id": 90234286,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90234286?v=4",
"html_url": "https:\/\/github.com\/Nivaskumark"
},
"html_url": "https:\/\/github.com\/Nivaskumark\/CVE-2020-0114-frameworks_base_before",
"html_url": "https:\/\/github.com\/Nivaskumark\/CVE-2020-0114-frameworks_base",
"description": null,
"fork": false,
"created_at": "2021-11-29T01:37:12Z",
"updated_at": "2021-11-29T02:24:08Z",
"updated_at": "2021-11-29T08:23:47Z",
"pushed_at": "2021-11-29T02:07:53Z",
"stargazers_count": 0,
"watchers_count": 0,
@ -190,19 +190,19 @@
},
{
"id": 432880702,
"name": "CVE-2020-0114-frameworks_base",
"full_name": "Nivaskumark\/CVE-2020-0114-frameworks_base",
"name": "CVE-2020-0114-frameworks_base_afterfix",
"full_name": "Nivaskumark\/CVE-2020-0114-frameworks_base_afterfix",
"owner": {
"login": "Nivaskumark",
"id": 90234286,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90234286?v=4",
"html_url": "https:\/\/github.com\/Nivaskumark"
},
"html_url": "https:\/\/github.com\/Nivaskumark\/CVE-2020-0114-frameworks_base",
"html_url": "https:\/\/github.com\/Nivaskumark\/CVE-2020-0114-frameworks_base_afterfix",
"description": null,
"fork": false,
"created_at": "2021-11-29T02:27:53Z",
"updated_at": "2021-11-29T02:58:19Z",
"updated_at": "2021-11-29T08:20:51Z",
"pushed_at": "2021-11-29T02:57:50Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -1045,10 +1045,10 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2021-11-29T06:03:14Z",
"updated_at": "2021-11-29T08:43:35Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1162,
"watchers_count": 1162,
"stargazers_count": 1163,
"watchers_count": 1163,
"forks_count": 366,
"allow_forking": true,
"is_template": false,
@ -1061,7 +1061,7 @@
],
"visibility": "public",
"forks": 366,
"watchers": 1162,
"watchers": 1163,
"score": 0
},
{

View file

@ -136,12 +136,12 @@
"pushed_at": "2020-07-10T09:30:47Z",
"stargazers_count": 100,
"watchers_count": 100,
"forks_count": 40,
"forks_count": 41,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 40,
"forks": 41,
"watchers": 100,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-11-29T02:16:53Z",
"updated_at": "2021-11-29T06:35:54Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3011,
"watchers_count": 3011,
"stargazers_count": 3012,
"watchers_count": 3012,
"forks_count": 891,
"allow_forking": true,
"is_template": false,
@ -43,7 +43,7 @@
],
"visibility": "public",
"forks": 891,
"watchers": 3011,
"watchers": 3012,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "shiro-cve-2020-17523 漏洞的两种绕过姿势分析 以及配套的漏洞环境",
"fork": false,
"created_at": "2021-02-03T08:14:03Z",
"updated_at": "2021-11-17T09:54:51Z",
"updated_at": "2021-11-29T08:59:09Z",
"pushed_at": "2021-02-07T09:42:36Z",
"stargazers_count": 81,
"watchers_count": 81,
"stargazers_count": 82,
"watchers_count": 82,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 81,
"watchers": 82,
"score": 0
}
]

View file

@ -202,17 +202,17 @@
"description": "在一定条件下可执行命令",
"fork": false,
"created_at": "2020-02-21T08:42:50Z",
"updated_at": "2021-06-14T07:38:36Z",
"updated_at": "2021-11-29T06:42:22Z",
"pushed_at": "2020-02-21T08:45:51Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 6,
"watchers": 7,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Disclosure of Accfly camera vulnerabilities: CVE-2020-25782, CVE-2020-25783, CVE-2020-25784, CVE-2020-25785.",
"fork": false,
"created_at": "2021-01-26T15:48:27Z",
"updated_at": "2021-02-05T08:28:01Z",
"updated_at": "2021-11-29T06:21:50Z",
"pushed_at": "2021-01-26T17:03:01Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

29
2020/CVE-2020-28148.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 432963715,
"name": "CVE-2020-28148",
"full_name": "fengchenzxc\/CVE-2020-28148",
"owner": {
"login": "fengchenzxc",
"id": 41096522,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41096522?v=4",
"html_url": "https:\/\/github.com\/fengchenzxc"
},
"html_url": "https:\/\/github.com\/fengchenzxc\/CVE-2020-28148",
"description": "攻击WIFI的常用方式",
"fork": false,
"created_at": "2021-11-29T08:38:27Z",
"updated_at": "2021-11-29T08:57:41Z",
"pushed_at": "2021-11-29T08:57:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -46,17 +46,17 @@
"description": "CVE-2020-3992 & CVE-2019-5544",
"fork": false,
"created_at": "2021-02-04T15:15:22Z",
"updated_at": "2021-08-31T11:17:23Z",
"updated_at": "2021-11-29T10:33:40Z",
"pushed_at": "2021-02-05T06:40:50Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 23,
"watchers": 26,
"score": 0
}
]

View file

@ -207,8 +207,8 @@
"description": "Proof of concept for CVE-2020-7247 for educational purposes.",
"fork": false,
"created_at": "2021-11-26T17:28:56Z",
"updated_at": "2021-11-26T18:12:45Z",
"pushed_at": "2021-11-26T18:12:41Z",
"updated_at": "2021-11-29T10:08:58Z",
"pushed_at": "2021-11-29T10:08:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -40,8 +40,8 @@
"description": "XMLRPC - RCE in MovableTypePoC",
"fork": false,
"created_at": "2021-10-30T09:15:56Z",
"updated_at": "2021-11-19T16:16:58Z",
"pushed_at": "2021-11-19T16:16:55Z",
"updated_at": "2021-11-29T11:40:02Z",
"pushed_at": "2021-11-29T11:40:00Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 8,

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-06-05T15:42:16Z",
"updated_at": "2021-11-22T19:24:18Z",
"updated_at": "2021-11-29T10:40:21Z",
"pushed_at": "2021-11-02T14:45:24Z",
"stargazers_count": 165,
"watchers_count": 165,
"stargazers_count": 166,
"watchers_count": 166,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 165,
"watchers": 166,
"score": 0
},
{

View file

@ -67,17 +67,17 @@
"description": null,
"fork": false,
"created_at": "2021-08-08T16:12:17Z",
"updated_at": "2021-11-02T13:51:36Z",
"updated_at": "2021-11-29T09:27:35Z",
"pushed_at": "2021-08-08T16:41:28Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 7,
"watchers": 8,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Windows MDM LPE",
"fork": false,
"created_at": "2021-11-27T00:37:07Z",
"updated_at": "2021-11-27T01:27:12Z",
"updated_at": "2021-11-29T11:40:47Z",
"pushed_at": "2021-11-27T00:38:33Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 3,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 1,
"forks": 5,
"watchers": 3,
"score": 0
},
{
@ -40,17 +40,17 @@
"description": "CVE-2021-24084 Windows Local Privilege Escalation Left officially unpatched since 2020. Hence, its still a zero day",
"fork": false,
"created_at": "2021-11-28T09:48:36Z",
"updated_at": "2021-11-29T01:51:30Z",
"updated_at": "2021-11-29T09:54:59Z",
"pushed_at": "2021-11-28T13:10:48Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in Workreap theme.",
"fork": false,
"created_at": "2021-09-12T12:43:24Z",
"updated_at": "2021-11-21T01:10:57Z",
"updated_at": "2021-11-29T06:50:08Z",
"pushed_at": "2021-09-20T09:58:17Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 15,
"watchers": 16,
"score": 0
},
{

View file

@ -206,12 +206,12 @@
"pushed_at": "2021-09-02T07:36:51Z",
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 24,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 24,
"forks": 25,
"watchers": 39,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.",
"fork": false,
"created_at": "2021-05-31T18:02:39Z",
"updated_at": "2021-11-24T04:32:07Z",
"updated_at": "2021-11-29T07:20:28Z",
"pushed_at": "2021-06-01T15:08:23Z",
"stargazers_count": 202,
"watchers_count": 202,
"stargazers_count": 203,
"watchers_count": 203,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 33,
"watchers": 202,
"watchers": 203,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Exploit for CVE-2021-30807",
"fork": false,
"created_at": "2021-10-09T20:11:42Z",
"updated_at": "2021-11-29T04:59:55Z",
"updated_at": "2021-11-29T12:11:41Z",
"pushed_at": "2021-11-28T22:25:13Z",
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 6,
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 18,
"forks": 8,
"watchers": 37,
"score": 0
}
]

29
2021/CVE-2021-32849.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 432931846,
"name": "CVE-2021-32849",
"full_name": "ohnonoyesyes\/CVE-2021-32849",
"owner": {
"login": "ohnonoyesyes",
"id": 93457304,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93457304?v=4",
"html_url": "https:\/\/github.com\/ohnonoyesyes"
},
"html_url": "https:\/\/github.com\/ohnonoyesyes\/CVE-2021-32849",
"description": "Gerapy clone background remote command execution",
"fork": false,
"created_at": "2021-11-29T06:39:27Z",
"updated_at": "2021-11-29T06:41:11Z",
"pushed_at": "2021-11-29T06:41:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -121,17 +121,17 @@
"description": "对Exchange Proxyshell 做了二次修改,精确的拆分、实现辅助性安全测试。",
"fork": false,
"created_at": "2021-11-22T07:47:09Z",
"updated_at": "2021-11-24T09:19:43Z",
"updated_at": "2021-11-29T07:24:25Z",
"pushed_at": "2021-11-23T09:56:37Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"forks": 2,
"watchers": 7,
"score": 0
}
]

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-08-25T19:26:21Z",
"stargazers_count": 191,
"watchers_count": 191,
"forks_count": 41,
"forks_count": 40,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 41,
"forks": 40,
"watchers": 191,
"score": 0
}

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-07-10T13:43:54Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 14,
"score": 0
},

View file

@ -40,17 +40,17 @@
"description": "CVE-2021-40438 exploit PoC with Docker setup.",
"fork": false,
"created_at": "2021-10-24T10:18:08Z",
"updated_at": "2021-11-04T23:39:11Z",
"updated_at": "2021-11-29T12:10:34Z",
"pushed_at": "2021-10-24T10:21:12Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
},
{

View file

@ -229,17 +229,17 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2021-11-26T19:31:29Z",
"updated_at": "2021-11-29T08:38:58Z",
"pushed_at": "2021-09-11T09:50:26Z",
"stargazers_count": 1318,
"watchers_count": 1318,
"stargazers_count": 1319,
"watchers_count": 1319,
"forks_count": 428,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 428,
"watchers": 1318,
"watchers": 1319,
"score": 0
},
{
@ -553,10 +553,10 @@
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
"fork": false,
"created_at": "2021-09-15T22:34:35Z",
"updated_at": "2021-11-27T03:55:36Z",
"updated_at": "2021-11-29T08:15:59Z",
"pushed_at": "2021-10-12T23:05:07Z",
"stargazers_count": 508,
"watchers_count": 508,
"stargazers_count": 509,
"watchers_count": 509,
"forks_count": 112,
"allow_forking": true,
"is_template": false,
@ -570,7 +570,7 @@
],
"visibility": "public",
"forks": 112,
"watchers": 508,
"watchers": 509,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "A demo exploiting CVE-2021-40531, a vulnerability in Sketch.",
"fork": false,
"created_at": "2021-11-19T17:38:34Z",
"updated_at": "2021-11-29T02:38:38Z",
"updated_at": "2021-11-29T09:53:27Z",
"pushed_at": "2021-11-22T14:52:04Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 9,
"watchers": 10,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-40865",
"fork": false,
"created_at": "2021-11-26T10:09:40Z",
"updated_at": "2021-11-29T02:05:52Z",
"updated_at": "2021-11-29T09:45:04Z",
"pushed_at": "2021-11-26T10:10:33Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-11-28T01:16:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
}

View file

@ -13,17 +13,17 @@
"description": "Microsoft Exchange Server Poc",
"fork": false,
"created_at": "2021-11-23T02:26:26Z",
"updated_at": "2021-11-29T02:15:27Z",
"updated_at": "2021-11-29T09:38:47Z",
"pushed_at": "2021-11-23T02:33:47Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 35,
"watchers": 37,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": "Local PoC exploit for CVE-2021-43267 (Linux TIPC)",
"fork": false,
"created_at": "2021-11-26T01:51:57Z",
"updated_at": "2021-11-29T03:09:04Z",
"updated_at": "2021-11-29T11:08:27Z",
"pushed_at": "2021-11-28T01:12:40Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 3,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 12,
"forks": 4,
"watchers": 13,
"score": 0
}
]

View file

@ -2147,6 +2147,9 @@ Squirrelly is a template engine implemented in JavaScript that works out of the
- [Abady0x1/CVE-2021-32819](https://github.com/Abady0x1/CVE-2021-32819)
### CVE-2021-32849
- [ohnonoyesyes/CVE-2021-32849](https://github.com/ohnonoyesyes/CVE-2021-32849)
### CVE-2021-33026 (2021-05-13)
<code>
@ -3571,7 +3574,9 @@ In verifyIntentFiltersIfNeeded of PackageManagerService.java, there is a possibl
</code>
- [Nivaskumark/CVE-2020-0074-frameworks_base_old](https://github.com/Nivaskumark/CVE-2020-0074-frameworks_base_old)
- [Nivaskumark/CVE-2020-0074-frameworks_base_old1](https://github.com/Nivaskumark/CVE-2020-0074-frameworks_base_old1)
- [Nivaskumark/CVE-2020-0074-frameworks_base](https://github.com/Nivaskumark/CVE-2020-0074-frameworks_base)
- [Nivaskumark/CVE-2020-0074-frameworks_base_after](https://github.com/Nivaskumark/CVE-2020-0074-frameworks_base_after)
### CVE-2020-0082 (2020-04-17)
@ -3600,8 +3605,8 @@ In various methods of PackageManagerService.java, there is a possible permission
- [Nivaskumark/CVE-2020-0097-frameworks_base_before](https://github.com/Nivaskumark/CVE-2020-0097-frameworks_base_before)
- [Nivaskumark/CVE-2020-0097-frameworks_base_after](https://github.com/Nivaskumark/CVE-2020-0097-frameworks_base_after)
- [Nivaskumark/CVE-2020-0097-frameworks_ba](https://github.com/Nivaskumark/CVE-2020-0097-frameworks_ba)
- [Nivaskumark/CVE-2020-0097-frameworks_base_beforefix](https://github.com/Nivaskumark/CVE-2020-0097-frameworks_base_beforefix)
- [Nivaskumark/CVE-2020-0097-frameworks_base](https://github.com/Nivaskumark/CVE-2020-0097-frameworks_base)
- [Nivaskumark/CVE-2020-0097-frameworks_base_afterfix](https://github.com/Nivaskumark/CVE-2020-0097-frameworks_base_afterfix)
### CVE-2020-0108 (2020-08-11)
@ -3631,8 +3636,8 @@ In onCreateSliceProvider of KeyguardSliceProvider.java, there is a possible conf
- [Nivaskumark/CVE-2020-0114-frameworks](https://github.com/Nivaskumark/CVE-2020-0114-frameworks)
- [Nivaskumark/CVE-2020-0114-frameworks_basegbdgb](https://github.com/Nivaskumark/CVE-2020-0114-frameworks_basegbdgb)
- [Nivaskumark/CVE-2020-0114-frameworks_basety](https://github.com/Nivaskumark/CVE-2020-0114-frameworks_basety)
- [Nivaskumark/CVE-2020-0114-frameworks_base_before](https://github.com/Nivaskumark/CVE-2020-0114-frameworks_base_before)
- [Nivaskumark/CVE-2020-0114-frameworks_base](https://github.com/Nivaskumark/CVE-2020-0114-frameworks_base)
- [Nivaskumark/CVE-2020-0114-frameworks_base_afterfix](https://github.com/Nivaskumark/CVE-2020-0114-frameworks_base_afterfix)
### CVE-2020-0121 (2020-06-10)
@ -7755,6 +7760,9 @@ JamoDat TSMManager Collector version up to 6.5.0.21 is vulnerable to an Authoriz
- [VoidSec/Tivoli-Madness](https://github.com/VoidSec/Tivoli-Madness)
### CVE-2020-28148
- [fengchenzxc/CVE-2020-28148](https://github.com/fengchenzxc/CVE-2020-28148)
### CVE-2020-28169 (2020-12-24)
<code>
@ -20576,14 +20584,6 @@ sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or
- [bekhzod0725/perl-CVE-2013-1775](https://github.com/bekhzod0725/perl-CVE-2013-1775)
### CVE-2013-1965 (2013-07-10)
<code>
Apache Struts Showcase App 2.0.0 through 2.3.13, as used in Struts 2 before 2.3.14.3, allows remote attackers to execute arbitrary OGNL code via a crafted parameter name that is not properly handled when invoking a redirect.
</code>
- [cinno/CVE-2013-1965](https://github.com/cinno/CVE-2013-1965)
### CVE-2013-2028 (2013-07-17)
<code>