Auto Update 2021/03/22 18:12:24

This commit is contained in:
motikan2010-bot 2021-03-22 18:12:24 +09:00
parent 8b746f2f2c
commit 93c8848add
28 changed files with 198 additions and 126 deletions

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-02-24T09:17:24Z",
"stargazers_count": 2252,
"watchers_count": 2252,
"forks_count": 485,
"forks": 485,
"forks_count": 484,
"forks": 484,
"watchers": 2252,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-22T01:49:49Z",
"updated_at": "2021-03-22T07:31:40Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 962,
"watchers_count": 962,
"stargazers_count": 963,
"watchers_count": 963,
"forks_count": 223,
"forks": 223,
"watchers": 962,
"watchers": 963,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-22T01:49:49Z",
"updated_at": "2021-03-22T07:31:40Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 962,
"watchers_count": 962,
"stargazers_count": 963,
"watchers_count": 963,
"forks_count": 223,
"forks": 223,
"watchers": 962,
"watchers": 963,
"score": 0
},
{

View file

@ -90,5 +90,28 @@
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 350263870,
"name": "Janus-Vulnerability-CVE-2017-13156-Exploit-with-Proof-of-Concept-POC-",
"full_name": "ari5ti\/Janus-Vulnerability-CVE-2017-13156-Exploit-with-Proof-of-Concept-POC-",
"owner": {
"login": "ari5ti",
"id": 52395887,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52395887?v=4",
"html_url": "https:\/\/github.com\/ari5ti"
},
"html_url": "https:\/\/github.com\/ari5ti\/Janus-Vulnerability-CVE-2017-13156-Exploit-with-Proof-of-Concept-POC-",
"description": null,
"fork": false,
"created_at": "2021-03-22T08:27:10Z",
"updated_at": "2021-03-22T08:30:48Z",
"pushed_at": "2021-03-22T08:30:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-22T01:49:49Z",
"updated_at": "2021-03-22T07:31:40Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 962,
"watchers_count": 962,
"stargazers_count": 963,
"watchers_count": 963,
"forks_count": 223,
"forks": 223,
"watchers": 962,
"watchers": 963,
"score": 0
}
]

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-22T01:49:49Z",
"updated_at": "2021-03-22T07:31:40Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 962,
"watchers_count": 962,
"stargazers_count": 963,
"watchers_count": 963,
"forks_count": 223,
"forks": 223,
"watchers": 962,
"watchers": 963,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "CVE-2018-3191 反弹shell",
"fork": false,
"created_at": "2018-10-23T17:24:43Z",
"updated_at": "2021-02-16T18:19:59Z",
"updated_at": "2021-03-22T07:47:56Z",
"pushed_at": "2018-10-23T17:28:05Z",
"stargazers_count": 55,
"watchers_count": 55,
"stargazers_count": 56,
"watchers_count": 56,
"forks_count": 31,
"forks": 31,
"watchers": 55,
"watchers": 56,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-03-22T03:03:20Z",
"updated_at": "2021-03-22T07:54:25Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2414,
"watchers_count": 2414,
"stargazers_count": 2418,
"watchers_count": 2418,
"forks_count": 695,
"forks": 695,
"watchers": 2414,
"watchers": 2418,
"score": 0
},
{

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-22T01:49:49Z",
"updated_at": "2021-03-22T07:31:40Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 962,
"watchers_count": 962,
"stargazers_count": 963,
"watchers_count": 963,
"forks_count": 223,
"forks": 223,
"watchers": 962,
"watchers": 963,
"score": 0
}
]

View file

@ -105,13 +105,13 @@
"description": "Confluence 未授权 RCE (CVE-2019-3396) 漏洞",
"fork": false,
"created_at": "2019-04-10T02:22:24Z",
"updated_at": "2021-03-09T02:12:48Z",
"updated_at": "2021-03-22T08:02:48Z",
"pushed_at": "2019-11-01T14:33:21Z",
"stargazers_count": 115,
"watchers_count": 115,
"stargazers_count": 116,
"watchers_count": 116,
"forks_count": 58,
"forks": 58,
"watchers": 115,
"watchers": 116,
"score": 0
},
{

View file

@ -105,13 +105,13 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-03-11T15:21:27Z",
"updated_at": "2021-03-03T11:48:00Z",
"updated_at": "2021-03-22T08:30:24Z",
"pushed_at": "2020-10-01T08:36:29Z",
"stargazers_count": 579,
"watchers_count": 579,
"stargazers_count": 580,
"watchers_count": 580,
"forks_count": 195,
"forks": 195,
"watchers": 579,
"watchers": 580,
"score": 0
},
{
@ -887,13 +887,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2021-03-13T19:46:03Z",
"updated_at": "2021-03-22T04:46:26Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1102,
"watchers_count": 1102,
"stargazers_count": 1103,
"watchers_count": 1103,
"forks_count": 359,
"forks": 359,
"watchers": 1102,
"watchers": 1103,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2021-03-19T21:43:06Z",
"updated_at": "2021-03-22T08:37:05Z",
"pushed_at": "2020-10-21T12:10:28Z",
"stargazers_count": 1256,
"watchers_count": 1256,
"stargazers_count": 1258,
"watchers_count": 1258,
"forks_count": 290,
"forks": 290,
"watchers": 1256,
"watchers": 1258,
"score": 0
},
{
@ -105,13 +105,13 @@
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
"fork": false,
"created_at": "2020-09-14T16:57:49Z",
"updated_at": "2021-03-20T05:47:32Z",
"updated_at": "2021-03-22T07:39:15Z",
"pushed_at": "2020-11-05T16:37:20Z",
"stargazers_count": 183,
"watchers_count": 183,
"stargazers_count": 184,
"watchers_count": 184,
"forks_count": 38,
"forks": 38,
"watchers": 183,
"watchers": 184,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-03-22T03:03:20Z",
"updated_at": "2021-03-22T07:54:25Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2414,
"watchers_count": 2414,
"stargazers_count": 2418,
"watchers_count": 2418,
"forks_count": 695,
"forks": 695,
"watchers": 2414,
"watchers": 2418,
"score": 0
},
{
@ -500,8 +500,8 @@
"pushed_at": "2021-01-25T07:54:23Z",
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 6,
"forks": 6,
"forks_count": 7,
"forks": 7,
"watchers": 23,
"score": 0
},

View file

@ -59,13 +59,13 @@
"description": "用于对WebLogic(10.3.6.0.0 ;12.1.3.0.0 ;12.2.1.3.0; 12.2.1.4.0 ;14.1.1.0.0)进行验证及利用",
"fork": false,
"created_at": "2021-01-25T15:33:04Z",
"updated_at": "2021-01-26T14:31:14Z",
"updated_at": "2021-03-22T03:22:01Z",
"pushed_at": "2021-01-26T14:26:17Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
},
{
@ -102,16 +102,16 @@
"html_url": "https:\/\/github.com\/Yang0615777"
},
"html_url": "https:\/\/github.com\/Yang0615777\/PocList",
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE",
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-03-22T02:04:28Z",
"pushed_at": "2021-03-21T16:38:20Z",
"stargazers_count": 176,
"watchers_count": 176,
"updated_at": "2021-03-22T08:31:11Z",
"pushed_at": "2021-03-22T03:46:42Z",
"stargazers_count": 182,
"watchers_count": 182,
"forks_count": 44,
"forks": 44,
"watchers": 176,
"watchers": 182,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Writeup of CVE-2020-15906",
"fork": false,
"created_at": "2020-07-23T09:20:53Z",
"updated_at": "2021-02-20T15:03:34Z",
"updated_at": "2021-03-22T04:03:34Z",
"pushed_at": "2020-10-26T22:01:33Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 4,
"forks": 4,
"watchers": 39,
"watchers": 40,
"score": 0
}
]

View file

@ -312,13 +312,13 @@
"description": "CVE-2020-16898 Windows TCP\/IP远程代码执行漏洞 EXP&POC",
"fork": false,
"created_at": "2020-10-28T11:25:58Z",
"updated_at": "2021-03-22T02:57:56Z",
"updated_at": "2021-03-22T03:25:52Z",
"pushed_at": "2020-10-28T11:27:17Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 6,
"forks": 6,
"watchers": 8,
"watchers": 7,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "shiro-cve-2020-17523 漏洞的两种绕过姿势分析(带漏洞环境)",
"fork": false,
"created_at": "2021-02-03T08:14:03Z",
"updated_at": "2021-03-22T02:14:09Z",
"updated_at": "2021-03-22T07:44:31Z",
"pushed_at": "2021-02-07T09:42:36Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 58,
"watchers_count": 58,
"forks_count": 7,
"forks": 7,
"watchers": 56,
"watchers": 58,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-22T01:49:49Z",
"updated_at": "2021-03-22T07:31:40Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 962,
"watchers_count": 962,
"stargazers_count": 963,
"watchers_count": 963,
"forks_count": 223,
"forks": 223,
"watchers": 962,
"watchers": 963,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)",
"fork": false,
"created_at": "2021-01-23T19:07:18Z",
"updated_at": "2021-03-12T23:36:44Z",
"updated_at": "2021-03-22T03:33:22Z",
"pushed_at": "2021-01-24T09:05:40Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 66,
"watchers_count": 66,
"forks_count": 31,
"forks": 31,
"watchers": 65,
"watchers": 66,
"score": 0
}
]

View file

@ -86,8 +86,8 @@
"pushed_at": "2020-08-25T03:17:32Z",
"stargazers_count": 218,
"watchers_count": 218,
"forks_count": 33,
"forks": 33,
"forks_count": 34,
"forks": 34,
"watchers": 218,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-9483 OR CVE-2020-13921",
"fork": false,
"created_at": "2021-01-06T13:22:32Z",
"updated_at": "2021-01-06T13:54:42Z",
"updated_at": "2021-03-22T05:21:36Z",
"pushed_at": "2021-01-06T13:52:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2021-1732 Exploit",
"fork": false,
"created_at": "2021-03-05T02:11:10Z",
"updated_at": "2021-03-20T16:49:12Z",
"updated_at": "2021-03-22T08:20:06Z",
"pushed_at": "2021-03-05T03:10:26Z",
"stargazers_count": 255,
"watchers_count": 255,
"stargazers_count": 256,
"watchers_count": 256,
"forks_count": 53,
"forks": 53,
"watchers": 255,
"watchers": 256,
"score": 0
},
{
@ -59,7 +59,7 @@
"description": null,
"fork": false,
"created_at": "2021-03-09T02:13:43Z",
"updated_at": "2021-03-09T02:13:54Z",
"updated_at": "2021-03-22T08:20:46Z",
"pushed_at": "2021-03-09T02:13:51Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -13,13 +13,13 @@
"description": "This is a Poc for BIGIP iControl unauth RCE ",
"fork": false,
"created_at": "2021-03-17T05:02:45Z",
"updated_at": "2021-03-22T02:41:28Z",
"updated_at": "2021-03-22T07:55:18Z",
"pushed_at": "2021-03-17T05:10:03Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 6,
"forks": 6,
"watchers": 26,
"watchers": 27,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "F5 BIG-IP\/BIG-IQ iControl Rest API SSRF to RCE",
"fork": false,
"created_at": "2021-03-21T04:58:17Z",
"updated_at": "2021-03-22T02:44:58Z",
"updated_at": "2021-03-22T07:53:50Z",
"pushed_at": "2021-03-21T17:10:41Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0
},
{
@ -105,8 +105,31 @@
"description": "CVE-2021-22986 F5 BIG-IP iControl 命令执行漏洞",
"fork": false,
"created_at": "2021-03-21T07:40:51Z",
"updated_at": "2021-03-21T07:55:14Z",
"updated_at": "2021-03-22T07:52:00Z",
"pushed_at": "2021-03-21T07:40:59Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 350243656,
"name": "CVE-2021-22986",
"full_name": "Al1ex\/CVE-2021-22986",
"owner": {
"login": "Al1ex",
"id": 38161463,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
"html_url": "https:\/\/github.com\/Al1ex"
},
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2021-22986",
"description": "CVE-2021-22986 & F5 BIG-IP RCE",
"fork": false,
"created_at": "2021-03-22T07:13:50Z",
"updated_at": "2021-03-22T08:40:16Z",
"pushed_at": "2021-03-22T08:40:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -102,16 +102,16 @@
"html_url": "https:\/\/github.com\/Yang0615777"
},
"html_url": "https:\/\/github.com\/Yang0615777\/PocList",
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE",
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-03-22T02:04:28Z",
"pushed_at": "2021-03-21T16:38:20Z",
"stargazers_count": 176,
"watchers_count": 176,
"updated_at": "2021-03-22T08:31:11Z",
"pushed_at": "2021-03-22T03:46:42Z",
"stargazers_count": 182,
"watchers_count": 182,
"forks_count": 44,
"forks": 44,
"watchers": 176,
"watchers": 182,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "Detect webshells dropped on Microsoft Exchange servers exploited through \"proxylogon\" group of vulnerabilites (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065)",
"fork": false,
"created_at": "2021-03-05T08:22:07Z",
"updated_at": "2021-03-20T08:34:47Z",
"updated_at": "2021-03-22T03:36:12Z",
"pushed_at": "2021-03-16T08:34:14Z",
"stargazers_count": 83,
"watchers_count": 83,
"stargazers_count": 84,
"watchers_count": 84,
"forks_count": 19,
"forks": 19,
"watchers": 83,
"watchers": 84,
"score": 0
},
{
@ -450,13 +450,13 @@
"description": "PoC of proxylogon chain SSRF(CVE-2021-26855) to write file by testanull, censored by github",
"fork": false,
"created_at": "2021-03-11T20:51:48Z",
"updated_at": "2021-03-19T16:14:46Z",
"updated_at": "2021-03-22T06:50:36Z",
"pushed_at": "2021-03-11T20:58:08Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 26,
"forks": 26,
"watchers": 42,
"watchers": 43,
"score": 0
},
{

View file

@ -90,5 +90,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 350235820,
"name": "cve-2021-3019",
"full_name": "Aoyuh\/cve-2021-3019",
"owner": {
"login": "Aoyuh",
"id": 48713040,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48713040?v=4",
"html_url": "https:\/\/github.com\/Aoyuh"
},
"html_url": "https:\/\/github.com\/Aoyuh\/cve-2021-3019",
"description": "lanproxy(CVE-2021-3019)目录遍历",
"fork": false,
"created_at": "2021-03-22T06:44:07Z",
"updated_at": "2021-03-22T06:44:07Z",
"pushed_at": "2021-03-22T06:44:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -887,13 +887,13 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
"updated_at": "2021-03-22T02:12:51Z",
"updated_at": "2021-03-22T08:50:14Z",
"pushed_at": "2021-03-19T17:21:48Z",
"stargazers_count": 211,
"watchers_count": 211,
"forks_count": 33,
"forks": 33,
"watchers": 211,
"stargazers_count": 214,
"watchers_count": 214,
"forks_count": 34,
"forks": 34,
"watchers": 214,
"score": 0
},
{

View file

@ -57,6 +57,7 @@ ffay lanproxy 0.1 allows Directory Traversal to read /../conf/config.properties
- [FanqXu/CVE-2021-3019](https://github.com/FanqXu/CVE-2021-3019)
- [liuxu54898/CVE-2021-3019](https://github.com/liuxu54898/CVE-2021-3019)
- [murataydemir/CVE-2021-3019](https://github.com/murataydemir/CVE-2021-3019)
- [Aoyuh/cve-2021-3019](https://github.com/Aoyuh/cve-2021-3019)
### CVE-2021-3122 (2021-02-07)
@ -319,6 +320,7 @@ VMware View Planner 4.x prior to 4.6 Security Patch 1 contains a remote code exe
- [Osyanina/westone-CVE-2021-22986-scanner](https://github.com/Osyanina/westone-CVE-2021-22986-scanner)
- [Udyz/CVE-2021-22986](https://github.com/Udyz/CVE-2021-22986)
- [safesword/F5_RCE](https://github.com/safesword/F5_RCE)
- [Al1ex/CVE-2021-22986](https://github.com/Al1ex/CVE-2021-22986)
### CVE-2021-23132 (2021-03-04)
@ -13030,6 +13032,7 @@ An elevation of privilege vulnerability in the Android system (art). Product: An
- [caxmd/CVE-2017-13156](https://github.com/caxmd/CVE-2017-13156)
- [giacomoferretti/janus-toolkit](https://github.com/giacomoferretti/janus-toolkit)
- [tea9/CVE-2017-13156-Janus](https://github.com/tea9/CVE-2017-13156-Janus)
- [ari5ti/Janus-Vulnerability-CVE-2017-13156-Exploit-with-Proof-of-Concept-POC-](https://github.com/ari5ti/Janus-Vulnerability-CVE-2017-13156-Exploit-with-Proof-of-Concept-POC-)
### CVE-2017-13253 (2018-04-04)