Auto Update 2019/12/20 15:30:02

This commit is contained in:
motikan2010-bot 2019-12-21 00:30:02 +09:00
parent f7d5dbb073
commit 717a42fcf6
43 changed files with 190 additions and 188 deletions

View file

@ -40,8 +40,8 @@
"pushed_at": "2018-08-03T18:49:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"forks_count": 3,
"forks": 3,
"watchers": 0,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "ActiveMQ Deserialization RCE",
"fork": false,
"created_at": "2019-08-30T06:03:51Z",
"updated_at": "2019-10-30T12:14:59Z",
"updated_at": "2019-12-20T09:07:01Z",
"pushed_at": "2019-08-30T06:47:20Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 4,
"forks": 4,
"watchers": 6,
"watchers": 7,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-08-13T07:14:01Z",
"stargazers_count": 85,
"watchers_count": 85,
"forks_count": 39,
"forks": 39,
"forks_count": 40,
"forks": 40,
"watchers": 85,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2017-03-29T05:23:45Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "Exploit code for CVE-2016-9066",
"fork": false,
"created_at": "2017-03-10T20:08:13Z",
"updated_at": "2019-09-02T13:38:51Z",
"updated_at": "2019-12-20T12:22:58Z",
"pushed_at": "2017-03-19T17:37:18Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 9,
"forks": 9,
"watchers": 36,
"watchers": 35,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
"fork": false,
"created_at": "2017-04-17T08:10:07Z",
"updated_at": "2019-12-06T03:32:34Z",
"updated_at": "2019-12-20T12:23:00Z",
"pushed_at": "2017-11-19T11:01:16Z",
"stargazers_count": 602,
"watchers_count": 602,
"stargazers_count": 601,
"watchers_count": 601,
"forks_count": 272,
"forks": 272,
"watchers": 602,
"watchers": 601,
"score": 0
},
{

View file

@ -450,13 +450,13 @@
"description": "CVE-2019-2725poc汇总 更新绕过CVE-2017-10271补丁POC",
"fork": false,
"created_at": "2019-04-25T03:07:53Z",
"updated_at": "2019-12-01T03:43:44Z",
"updated_at": "2019-12-20T09:49:29Z",
"pushed_at": "2019-04-29T02:06:00Z",
"stargazers_count": 95,
"watchers_count": 95,
"stargazers_count": 96,
"watchers_count": 96,
"forks_count": 32,
"forks": 32,
"watchers": 95,
"watchers": 96,
"score": 0
},
{

View file

@ -105,13 +105,13 @@
"description": "CVE-2017-11882 Exploit accepts over 17k bytes long command\/code in maximum.",
"fork": false,
"created_at": "2017-11-21T15:22:41Z",
"updated_at": "2019-11-28T19:20:54Z",
"updated_at": "2019-12-20T12:23:10Z",
"pushed_at": "2017-12-06T12:47:31Z",
"stargazers_count": 256,
"watchers_count": 256,
"stargazers_count": 255,
"watchers_count": 255,
"forks_count": 73,
"forks": 73,
"watchers": 256,
"watchers": 255,
"score": 0
},
{
@ -128,13 +128,13 @@
"description": "This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https:\/\/embedi.com\/blog\/skeleton-closet-ms-office-vulnerability-you-didnt-know-about.",
"fork": false,
"created_at": "2017-11-21T18:17:28Z",
"updated_at": "2019-11-08T14:34:37Z",
"updated_at": "2019-12-20T12:07:13Z",
"pushed_at": "2017-11-21T20:34:57Z",
"stargazers_count": 88,
"watchers_count": 88,
"stargazers_count": 89,
"watchers_count": 89,
"forks_count": 44,
"forks": 44,
"watchers": 88,
"watchers": 89,
"score": 0
},
{

View file

@ -13,8 +13,8 @@
"description": "POC Exploit for Apache Tomcat 7.0.x CVE-2017-12615 PUT JSP vulnerability.",
"fork": false,
"created_at": "2017-09-23T06:15:48Z",
"updated_at": "2019-12-03T07:50:30Z",
"pushed_at": "2018-05-07T05:18:31Z",
"updated_at": "2019-12-20T07:22:19Z",
"pushed_at": "2019-12-20T07:22:17Z",
"stargazers_count": 60,
"watchers_count": 60,
"forks_count": 20,

25
2017/CVE-2017-16778.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 229211992,
"name": "CVE-2017-16778-Intercom-DTMF-Injection",
"full_name": "breaktoprotect\/CVE-2017-16778-Intercom-DTMF-Injection",
"owner": {
"login": "breaktoprotect",
"id": 4725563,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/4725563?v=4",
"html_url": "https:\/\/github.com\/breaktoprotect"
},
"html_url": "https:\/\/github.com\/breaktoprotect\/CVE-2017-16778-Intercom-DTMF-Injection",
"description": "A coordinated disclosure and security advisory on Fermax Intercom DTML Injection vulneraiblity. Special thanks to Fermax International for prompt responses and allowing details to be publicized.",
"fork": false,
"created_at": "2019-12-20T07:20:50Z",
"updated_at": "2019-12-20T10:28:04Z",
"pushed_at": "2019-12-20T10:28:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Chrome < 62 uxss exploit (CVE-2017-5124)",
"fork": false,
"created_at": "2017-11-13T21:33:55Z",
"updated_at": "2019-10-11T19:04:21Z",
"updated_at": "2019-12-20T12:23:09Z",
"pushed_at": "2017-11-14T10:26:28Z",
"stargazers_count": 156,
"watchers_count": 156,
"stargazers_count": 155,
"watchers_count": 155,
"forks_count": 35,
"forks": 35,
"watchers": 156,
"watchers": 155,
"score": 0
}
]

View file

@ -128,13 +128,13 @@
"description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability",
"fork": false,
"created_at": "2017-06-05T16:25:57Z",
"updated_at": "2019-12-12T02:11:41Z",
"updated_at": "2019-12-20T12:23:02Z",
"pushed_at": "2017-11-27T16:28:14Z",
"stargazers_count": 184,
"watchers_count": 184,
"stargazers_count": 183,
"watchers_count": 183,
"forks_count": 64,
"forks": 64,
"watchers": 184,
"watchers": 183,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Proof of Concept exploit for CVE-2017-8570",
"fork": false,
"created_at": "2018-01-09T19:09:33Z",
"updated_at": "2019-12-14T13:18:44Z",
"updated_at": "2019-12-20T12:23:12Z",
"pushed_at": "2018-01-09T19:23:43Z",
"stargazers_count": 165,
"watchers_count": 165,
"stargazers_count": 164,
"watchers_count": 164,
"forks_count": 101,
"forks": 101,
"watchers": 165,
"watchers": 164,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Running CVE-2017-8759 exploit sample.",
"fork": false,
"created_at": "2017-09-13T09:50:04Z",
"updated_at": "2019-12-05T15:51:09Z",
"updated_at": "2019-12-20T12:23:06Z",
"pushed_at": "2017-09-13T09:58:25Z",
"stargazers_count": 257,
"watchers_count": 257,
"stargazers_count": 256,
"watchers_count": 256,
"forks_count": 108,
"forks": 108,
"watchers": 257,
"watchers": 256,
"score": 0
},
{
@ -151,13 +151,13 @@
"description": "Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
"fork": false,
"created_at": "2017-09-14T10:04:39Z",
"updated_at": "2019-12-15T08:17:18Z",
"updated_at": "2019-12-20T12:23:07Z",
"pushed_at": "2018-09-10T16:25:12Z",
"stargazers_count": 300,
"watchers_count": 300,
"stargazers_count": 298,
"watchers_count": 298,
"forks_count": 123,
"forks": 123,
"watchers": 300,
"watchers": 298,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC for Privilege Escalation in Windows 10 Diagnostics Hub Standard Collector Service",
"fork": false,
"created_at": "2018-08-21T20:29:10Z",
"updated_at": "2019-10-29T20:28:43Z",
"updated_at": "2019-12-20T08:59:57Z",
"pushed_at": "2018-08-21T20:30:24Z",
"stargazers_count": 99,
"watchers_count": 99,
"stargazers_count": 100,
"watchers_count": 100,
"forks_count": 36,
"forks": 36,
"watchers": 99,
"watchers": 100,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "GUI版 EXP",
"fork": false,
"created_at": "2019-03-20T14:38:09Z",
"updated_at": "2019-10-21T13:15:50Z",
"updated_at": "2019-12-20T09:49:26Z",
"pushed_at": "2019-03-20T14:50:05Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 1,
"forks": 1,
"watchers": 9,
"watchers": 10,
"score": 0
}
]

View file

@ -105,13 +105,13 @@
"description": "Proof of concept code in C# to exploit the WinRAR ACE file extraction path (CVE-2018-20250).",
"fork": false,
"created_at": "2019-02-23T01:20:34Z",
"updated_at": "2019-06-28T23:16:38Z",
"updated_at": "2019-12-20T10:41:29Z",
"pushed_at": "2019-03-01T13:35:59Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 15,
"forks": 15,
"watchers": 15,
"watchers": 16,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "Messing Apple devices on the network with CVE-2018-4407 (heap overflow in bad packet handling)",
"fork": false,
"created_at": "2018-11-02T08:29:29Z",
"updated_at": "2019-12-05T09:26:13Z",
"updated_at": "2019-12-20T08:10:24Z",
"pushed_at": "2018-12-04T08:21:43Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 6,
"forks": 6,
"watchers": 23,
"watchers": 24,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "CVE-2018-8120 Exploit for Win2003 Win2008 WinXP Win7 ",
"fork": false,
"created_at": "2018-06-07T08:30:07Z",
"updated_at": "2019-11-21T06:37:12Z",
"updated_at": "2019-12-20T08:15:21Z",
"pushed_at": "2018-08-08T05:48:24Z",
"stargazers_count": 260,
"watchers_count": 260,
"stargazers_count": 261,
"watchers_count": 261,
"forks_count": 110,
"forks": 110,
"watchers": 260,
"watchers": 261,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2018-9276 PRTG < 18.2.39 Authenticated Command Injection (Reverse Shell)",
"fork": false,
"created_at": "2019-03-31T08:51:07Z",
"updated_at": "2019-10-30T11:35:37Z",
"updated_at": "2019-12-20T11:26:29Z",
"pushed_at": "2019-03-31T08:52:24Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 3,
"forks": 3,
"watchers": 19,
"watchers": 20,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-03-10T18:33:43Z",
"stargazers_count": 195,
"watchers_count": 195,
"forks_count": 54,
"forks": 54,
"forks_count": 55,
"forks": 55,
"watchers": 195,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Apache Tomcat Remote Code Execution on Windows",
"fork": false,
"created_at": "2019-04-15T07:54:25Z",
"updated_at": "2019-11-27T07:39:42Z",
"updated_at": "2019-12-20T06:47:58Z",
"pushed_at": "2019-11-27T07:39:40Z",
"stargazers_count": 158,
"watchers_count": 158,
"stargazers_count": 159,
"watchers_count": 159,
"forks_count": 44,
"forks": 44,
"watchers": 158,
"watchers": 159,
"score": 0
},
{

View file

@ -312,13 +312,13 @@
"description": "3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)",
"fork": false,
"created_at": "2019-05-15T15:01:38Z",
"updated_at": "2019-12-11T07:39:27Z",
"updated_at": "2019-12-20T10:44:25Z",
"pushed_at": "2019-06-13T13:07:03Z",
"stargazers_count": 276,
"watchers_count": 276,
"stargazers_count": 277,
"watchers_count": 277,
"forks_count": 171,
"forks": 171,
"watchers": 276,
"watchers": 277,
"score": 0
},
{
@ -1301,7 +1301,7 @@
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
"fork": false,
"created_at": "2019-05-23T22:50:12Z",
"updated_at": "2019-12-19T19:00:06Z",
"updated_at": "2019-12-20T12:23:39Z",
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 670,
"watchers_count": 670,
@ -2267,13 +2267,13 @@
"description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )",
"fork": false,
"created_at": "2019-09-30T19:46:21Z",
"updated_at": "2019-12-14T11:44:06Z",
"updated_at": "2019-12-20T08:12:45Z",
"pushed_at": "2019-10-16T01:04:12Z",
"stargazers_count": 129,
"watchers_count": 129,
"stargazers_count": 130,
"watchers_count": 130,
"forks_count": 44,
"forks": 44,
"watchers": 129,
"watchers": 130,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2019-12-19T19:35:30Z",
"updated_at": "2019-12-20T10:28:29Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1477,
"watchers_count": 1477,
"stargazers_count": 1479,
"watchers_count": 1479,
"forks_count": 204,
"forks": 204,
"watchers": 1477,
"watchers": 1479,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.",
"fork": false,
"created_at": "2019-09-29T07:08:52Z",
"updated_at": "2019-12-20T02:56:26Z",
"updated_at": "2019-12-20T08:56:53Z",
"pushed_at": "2019-12-10T11:26:28Z",
"stargazers_count": 526,
"watchers_count": 526,
"stargazers_count": 527,
"watchers_count": 527,
"forks_count": 55,
"forks": 55,
"watchers": 526,
"watchers": 527,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": " double-free bug in WhatsApp exploit poc",
"fork": false,
"created_at": "2019-10-03T09:26:24Z",
"updated_at": "2019-12-18T03:27:44Z",
"updated_at": "2019-12-20T12:23:44Z",
"pushed_at": "2019-10-03T09:43:55Z",
"stargazers_count": 225,
"watchers_count": 225,
"stargazers_count": 224,
"watchers_count": 224,
"forks_count": 70,
"forks": 70,
"watchers": 225,
"watchers": 224,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif",
"fork": false,
"created_at": "2019-10-04T14:43:57Z",
"updated_at": "2019-12-19T06:34:30Z",
"updated_at": "2019-12-20T14:49:43Z",
"pushed_at": "2019-11-30T10:28:01Z",
"stargazers_count": 88,
"watchers_count": 88,
"stargazers_count": 89,
"watchers_count": 89,
"forks_count": 41,
"forks": 41,
"watchers": 88,
"watchers": 89,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Apache Solr RCE (ENABLE_REMOTE_JMX_OPTS=\"true\")",
"fork": false,
"created_at": "2019-11-19T08:53:56Z",
"updated_at": "2019-12-15T03:57:20Z",
"updated_at": "2019-12-20T03:55:29Z",
"pushed_at": "2019-11-19T09:18:00Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 79,
"watchers_count": 79,
"forks_count": 20,
"forks": 20,
"watchers": 80,
"watchers": 79,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "Poc for CVE-2019-1253",
"fork": false,
"created_at": "2019-09-11T20:40:15Z",
"updated_at": "2019-12-19T12:11:12Z",
"updated_at": "2019-12-20T11:30:45Z",
"pushed_at": "2019-09-12T14:43:47Z",
"stargazers_count": 105,
"watchers_count": 105,
"stargazers_count": 108,
"watchers_count": 108,
"forks_count": 31,
"forks": 31,
"watchers": 105,
"watchers": 108,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC for Webmin Package Update Authenticated Remote Command Execution",
"fork": false,
"created_at": "2019-11-05T19:22:45Z",
"updated_at": "2019-12-18T17:38:26Z",
"updated_at": "2019-12-20T08:32:17Z",
"pushed_at": "2019-11-05T19:27:31Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-1388 UAC提权 (nt authority\\system)",
"fork": false,
"created_at": "2019-11-21T06:26:27Z",
"updated_at": "2019-12-19T10:59:19Z",
"updated_at": "2019-12-20T06:19:15Z",
"pushed_at": "2019-11-21T09:27:59Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 44,
"watchers_count": 44,
"forks_count": 15,
"forks": 15,
"watchers": 43,
"watchers": 44,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "AppXSvc Arbitrary File Overwrite DoS",
"fork": false,
"created_at": "2019-12-05T21:00:16Z",
"updated_at": "2019-12-11T00:59:49Z",
"updated_at": "2019-12-20T10:20:32Z",
"pushed_at": "2019-12-10T18:12:43Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Eclipse Che CSRF leading to RCE",
"fork": false,
"created_at": "2019-12-19T20:22:12Z",
"updated_at": "2019-12-20T02:55:31Z",
"updated_at": "2019-12-20T14:16:01Z",
"pushed_at": "2019-12-19T20:26:14Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 0,
"forks": 0,
"watchers": 5,
"watchers": 9,
"score": 0
}
]

View file

@ -13,8 +13,8 @@
"description": "FreeFTPd 1.0.8 Post-Authentication Buffer Overflow via SIZE",
"fork": false,
"created_at": "2019-11-28T18:24:02Z",
"updated_at": "2019-12-08T21:06:54Z",
"pushed_at": "2019-11-29T09:09:04Z",
"updated_at": "2019-12-20T09:44:09Z",
"pushed_at": "2019-12-20T09:44:06Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-2107",
"fork": false,
"created_at": "2019-07-08T14:18:33Z",
"updated_at": "2019-12-19T10:59:55Z",
"updated_at": "2019-12-20T06:33:19Z",
"pushed_at": "2019-07-25T08:01:07Z",
"stargazers_count": 300,
"watchers_count": 300,
"stargazers_count": 301,
"watchers_count": 301,
"forks_count": 92,
"forks": 92,
"watchers": 300,
"watchers": 301,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2019-10-04T06:32:08Z",
"updated_at": "2019-12-09T09:04:08Z",
"updated_at": "2019-12-20T12:23:44Z",
"pushed_at": "2019-11-12T03:58:00Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 44,
"watchers_count": 44,
"forks_count": 16,
"forks": 16,
"watchers": 45,
"watchers": 44,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "CVE-2019-2725poc汇总 更新绕过CVE-2017-10271补丁POC",
"fork": false,
"created_at": "2019-04-25T03:07:53Z",
"updated_at": "2019-12-01T03:43:44Z",
"updated_at": "2019-12-20T09:49:29Z",
"pushed_at": "2019-04-29T02:06:00Z",
"stargazers_count": 95,
"watchers_count": 95,
"stargazers_count": 96,
"watchers_count": 96,
"forks_count": 32,
"forks": 32,
"watchers": 95,
"watchers": 96,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "WebLogic EJBTaglibDescriptor XXE漏洞(CVE-2019-2888)",
"fork": false,
"created_at": "2019-11-01T16:44:51Z",
"updated_at": "2019-12-01T00:01:13Z",
"updated_at": "2019-12-20T03:56:27Z",
"pushed_at": "2019-11-02T10:47:46Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 7,
"forks": 7,
"watchers": 29,
"watchers": 28,
"score": 0
}
]

View file

@ -128,13 +128,13 @@
"description": "0-sec.org",
"fork": false,
"created_at": "2019-12-14T08:01:53Z",
"updated_at": "2019-12-16T07:06:29Z",
"updated_at": "2019-12-20T03:32:05Z",
"pushed_at": "2019-12-14T08:04:01Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -109,8 +109,8 @@
"pushed_at": "2019-11-01T14:33:21Z",
"stargazers_count": 81,
"watchers_count": 81,
"forks_count": 42,
"forks": 42,
"forks_count": 43,
"forks": 43,
"watchers": 81,
"score": 0
},

View file

@ -45,29 +45,6 @@
"watchers": 365,
"score": 0
},
{
"id": 170454928,
"name": "cve-2019-5736",
"full_name": "jakubkrawczyk\/cve-2019-5736",
"owner": {
"login": "jakubkrawczyk",
"id": 22723539,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/22723539?v=4",
"html_url": "https:\/\/github.com\/jakubkrawczyk"
},
"html_url": "https:\/\/github.com\/jakubkrawczyk\/cve-2019-5736",
"description": "My attempt to create PoC of CVE-2019-5736 (Docker escape)",
"fork": false,
"created_at": "2019-02-13T06:41:01Z",
"updated_at": "2019-04-21T11:25:56Z",
"pushed_at": "2019-02-13T06:46:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 170613828,
"name": "CVE-2019-5736",

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-05-17T03:10:30Z",
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 9,
"forks": 9,
"forks_count": 10,
"forks": 10,
"watchers": 27,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
"fork": false,
"created_at": "2019-02-12T06:02:06Z",
"updated_at": "2019-12-11T20:41:29Z",
"updated_at": "2019-12-20T08:43:49Z",
"pushed_at": "2019-05-09T21:34:26Z",
"stargazers_count": 495,
"watchers_count": 495,
"forks_count": 97,
"forks": 97,
"watchers": 495,
"stargazers_count": 496,
"watchers_count": 496,
"forks_count": 99,
"forks": 99,
"watchers": 496,
"score": 0
},
{

View file

@ -36,8 +36,8 @@
"description": "RCE on Kibana versions before 5.6.15 and 6.6.0 in the Timelion visualizer",
"fork": false,
"created_at": "2019-10-21T07:32:31Z",
"updated_at": "2019-11-19T01:31:35Z",
"pushed_at": "2019-10-21T08:05:25Z",
"updated_at": "2019-12-20T14:28:47Z",
"pushed_at": "2019-12-20T14:28:44Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 5,