Auto Update 2021/08/04 18:12:04

This commit is contained in:
motikan2010-bot 2021-08-04 18:12:04 +09:00
parent 3c448e1b49
commit 99f7bf6004
37 changed files with 179 additions and 207 deletions

View file

@ -13,13 +13,13 @@
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
"fork": false,
"created_at": "2013-09-22T21:20:31Z",
"updated_at": "2021-07-29T07:20:15Z",
"updated_at": "2021-08-04T08:16:38Z",
"pushed_at": "2017-04-24T14:16:56Z",
"stargazers_count": 309,
"watchers_count": 309,
"forks_count": 94,
"forks": 94,
"watchers": 309,
"stargazers_count": 310,
"watchers_count": 310,
"forks_count": 95,
"forks": 95,
"watchers": 310,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-07-02T20:04:05Z",
"updated_at": "2020-09-11T05:13:59Z",
"updated_at": "2021-08-04T07:07:18Z",
"pushed_at": "2020-07-02T21:27:50Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Obtain root access through CVE-2012-4220",
"fork": false,
"created_at": "2013-01-07T11:45:35Z",
"updated_at": "2019-02-28T17:21:23Z",
"updated_at": "2021-08-04T05:58:03Z",
"pushed_at": "2013-04-03T11:58:57Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 8,
"forks": 8,
"watchers": 9,
"watchers": 10,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "CVE-2013-2094 exploit for android",
"fork": false,
"created_at": "2013-06-05T10:59:16Z",
"updated_at": "2020-07-28T09:59:49Z",
"updated_at": "2021-08-04T05:49:22Z",
"pushed_at": "2013-06-20T09:34:21Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 33,
"forks": 33,
"watchers": 14,
"watchers": 15,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2013-2596 exploit for android",
"fork": false,
"created_at": "2013-07-16T11:24:09Z",
"updated_at": "2021-07-15T07:52:01Z",
"updated_at": "2021-08-04T05:58:22Z",
"pushed_at": "2013-07-17T03:18:50Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 22,
"forks": 22,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-08-04T01:21:10Z",
"updated_at": "2021-08-04T07:55:15Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1133,
"watchers_count": 1133,
"forks_count": 249,
"forks": 249,
"watchers": 1133,
"stargazers_count": 1135,
"watchers_count": 1135,
"forks_count": 251,
"forks": 251,
"watchers": 1135,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-08-04T01:21:10Z",
"updated_at": "2021-08-04T07:55:15Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1133,
"watchers_count": 1133,
"forks_count": 249,
"forks": 249,
"watchers": 1133,
"stargazers_count": 1135,
"watchers_count": 1135,
"forks_count": 251,
"forks": 251,
"watchers": 1135,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Local privilege escalation through macOS 10.12.1 via CVE-2016-1825 or CVE-2016-7617.",
"fork": false,
"created_at": "2016-12-25T05:07:22Z",
"updated_at": "2021-03-20T19:56:21Z",
"updated_at": "2021-08-04T06:28:03Z",
"pushed_at": "2017-01-16T18:13:15Z",
"stargazers_count": 62,
"watchers_count": 62,
"stargazers_count": 63,
"watchers_count": 63,
"forks_count": 13,
"forks": 13,
"watchers": 62,
"watchers": 63,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Proof-of-concept exploit for CVE-2016-1827 on OS X Yosemite.",
"fork": false,
"created_at": "2017-01-10T03:41:56Z",
"updated_at": "2018-09-24T18:54:24Z",
"updated_at": "2021-08-04T06:24:24Z",
"pushed_at": "2017-01-10T03:52:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Local privilege escalation for OS X 10.10.5 via CVE-2016-1828.",
"fork": false,
"created_at": "2016-05-18T03:49:02Z",
"updated_at": "2021-07-13T05:32:21Z",
"updated_at": "2021-08-04T06:24:07Z",
"pushed_at": "2016-05-18T03:53:42Z",
"stargazers_count": 78,
"watchers_count": 78,
"stargazers_count": 79,
"watchers_count": 79,
"forks_count": 28,
"forks": 28,
"watchers": 78,
"watchers": 79,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2017-2388: Null-pointer dereference in IOFireWireFamily.",
"fork": false,
"created_at": "2017-08-04T19:35:20Z",
"updated_at": "2018-09-24T18:54:13Z",
"updated_at": "2021-08-04T06:28:49Z",
"pushed_at": "2017-08-16T20:16:12Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-08-04T01:21:10Z",
"updated_at": "2021-08-04T07:55:15Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1133,
"watchers_count": 1133,
"forks_count": 249,
"forks": 249,
"watchers": 1133,
"stargazers_count": 1135,
"watchers_count": 1135,
"forks_count": 251,
"forks": 251,
"watchers": 1135,
"score": 0
}
]

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-08-04T01:21:10Z",
"updated_at": "2021-08-04T07:55:15Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1133,
"watchers_count": 1133,
"forks_count": 249,
"forks": 249,
"watchers": 1133,
"stargazers_count": 1135,
"watchers_count": 1135,
"forks_count": 251,
"forks": 251,
"watchers": 1135,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-08-03T09:44:13Z",
"updated_at": "2021-08-04T08:56:29Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2728,
"watchers_count": 2728,
"stargazers_count": 2731,
"watchers_count": 2731,
"forks_count": 796,
"forks": 796,
"watchers": 2728,
"watchers": 2731,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "TelerikUI Vulnerability Scanner (CVE-2019-18935)",
"fork": false,
"created_at": "2020-05-25T08:37:51Z",
"updated_at": "2021-07-13T20:10:41Z",
"updated_at": "2021-08-04T04:29:50Z",
"pushed_at": "2020-05-25T08:15:28Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 3,
"forks": 3,
"watchers": 5,
"watchers": 6,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.4",
"fork": false,
"created_at": "2019-12-08T10:44:51Z",
"updated_at": "2021-07-03T09:33:34Z",
"updated_at": "2021-08-04T08:01:30Z",
"pushed_at": "2019-12-08T17:55:01Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 11,
"forks": 11,
"watchers": 37,
"watchers": 38,
"score": 0
}
]

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-08-04T01:21:10Z",
"updated_at": "2021-08-04T07:55:15Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1133,
"watchers_count": 1133,
"forks_count": 249,
"forks": 249,
"watchers": 1133,
"stargazers_count": 1135,
"watchers_count": 1135,
"forks_count": 251,
"forks": 251,
"watchers": 1135,
"score": 0
}
]

View file

@ -224,8 +224,8 @@
"pushed_at": "2019-06-21T03:33:05Z",
"stargazers_count": 152,
"watchers_count": 152,
"forks_count": 60,
"forks": 60,
"forks_count": 61,
"forks": 61,
"watchers": 152,
"score": 0
},

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-02-19T08:48:02Z",
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 11,
"forks": 11,
"forks_count": 12,
"forks": 12,
"watchers": 24,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "A proof-of-concept scanner to check an RDG Gateway Server for vulnerabilities CVE-2020-0609 & CVE-2020-0610.",
"fork": false,
"created_at": "2020-01-24T03:52:49Z",
"updated_at": "2021-05-16T23:00:15Z",
"updated_at": "2021-08-04T04:41:44Z",
"pushed_at": "2020-01-26T21:04:27Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 71,
"watchers_count": 71,
"forks_count": 32,
"forks": 32,
"watchers": 70,
"watchers": 71,
"score": 0
},
{

View file

@ -1094,13 +1094,13 @@
"description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false,
"created_at": "2020-04-20T14:35:48Z",
"updated_at": "2021-07-31T01:15:09Z",
"updated_at": "2021-08-04T08:58:27Z",
"pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 408,
"watchers_count": 408,
"stargazers_count": 409,
"watchers_count": 409,
"forks_count": 130,
"forks": 130,
"watchers": 408,
"watchers": 409,
"score": 0
},
{
@ -1531,7 +1531,7 @@
"description": "local exploit",
"fork": false,
"created_at": "2021-01-11T04:48:26Z",
"updated_at": "2021-07-26T14:23:45Z",
"updated_at": "2021-08-04T06:42:54Z",
"pushed_at": "2021-05-31T16:20:17Z",
"stargazers_count": 3,
"watchers_count": 3,

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-08-03T09:44:13Z",
"updated_at": "2021-08-04T08:56:29Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2728,
"watchers_count": 2728,
"stargazers_count": 2731,
"watchers_count": 2731,
"forks_count": 796,
"forks": 796,
"watchers": 2728,
"watchers": 2731,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "How to exploit a vulnerable windows driver. Exploit for AsrDrv104.sys",
"fork": false,
"created_at": "2021-06-29T04:38:24Z",
"updated_at": "2021-07-30T07:53:07Z",
"updated_at": "2021-08-04T04:40:33Z",
"pushed_at": "2021-07-30T07:53:04Z",
"stargazers_count": 272,
"watchers_count": 272,
"stargazers_count": 273,
"watchers_count": 273,
"forks_count": 21,
"forks": 21,
"watchers": 272,
"watchers": 273,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CVE-2020-17087 and an off-by-one overflow",
"fork": false,
"created_at": "2021-07-02T16:03:16Z",
"updated_at": "2021-08-04T03:08:30Z",
"updated_at": "2021-08-04T05:40:08Z",
"pushed_at": "2021-08-03T18:32:09Z",
"stargazers_count": 83,
"watchers_count": 83,
"forks_count": 25,
"forks": 25,
"watchers": 83,
"stargazers_count": 85,
"watchers_count": 85,
"forks_count": 27,
"forks": 27,
"watchers": 85,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-08-04T01:21:10Z",
"updated_at": "2021-08-04T07:55:15Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1133,
"watchers_count": 1133,
"forks_count": 249,
"forks": 249,
"watchers": 1133,
"stargazers_count": 1135,
"watchers_count": 1135,
"forks_count": 251,
"forks": 251,
"watchers": 1135,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal",
"fork": false,
"created_at": "2020-05-19T18:59:26Z",
"updated_at": "2021-06-07T17:35:46Z",
"updated_at": "2021-08-04T08:39:21Z",
"pushed_at": "2020-05-25T08:33:24Z",
"stargazers_count": 90,
"watchers_count": 90,
"stargazers_count": 91,
"watchers_count": 91,
"forks_count": 21,
"forks": 21,
"watchers": 90,
"watchers": 91,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"pushed_at": "2021-05-20T20:25:14Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 4,
"score": 0
}

View file

@ -136,5 +136,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 392581141,
"name": "CVE-2020-9496",
"full_name": "s4dbrd\/CVE-2020-9496",
"owner": {
"login": "s4dbrd",
"id": 79448708,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79448708?v=4",
"html_url": "https:\/\/github.com\/s4dbrd"
},
"html_url": "https:\/\/github.com\/s4dbrd\/CVE-2020-9496",
"description": null,
"fork": false,
"created_at": "2021-08-04T06:48:31Z",
"updated_at": "2021-08-04T06:49:23Z",
"pushed_at": "2021-08-04T06:49:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2021-08-02T20:01:40Z",
"updated_at": "2021-08-04T08:04:57Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1275,
"watchers_count": 1275,
"forks_count": 459,
"forks": 459,
"watchers": 1275,
"stargazers_count": 1279,
"watchers_count": 1279,
"forks_count": 460,
"forks": 460,
"watchers": 1279,
"score": 0
},
{
@ -688,28 +688,5 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 391880312,
"name": "PrintNightmare-LPE",
"full_name": "tacbliw\/PrintNightmare-LPE",
"owner": {
"login": "tacbliw",
"id": 19433926,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19433926?v=4",
"html_url": "https:\/\/github.com\/tacbliw"
},
"html_url": "https:\/\/github.com\/tacbliw\/PrintNightmare-LPE",
"description": "Local exploit for CVE-2021-1675",
"fork": false,
"created_at": "2021-08-02T09:03:07Z",
"updated_at": "2021-08-02T10:26:43Z",
"pushed_at": "2021-08-02T10:26:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -105,13 +105,13 @@
"description": null,
"fork": false,
"created_at": "2021-08-02T18:56:16Z",
"updated_at": "2021-08-03T15:55:43Z",
"updated_at": "2021-08-04T03:39:49Z",
"pushed_at": "2021-08-03T15:55:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -220,13 +220,13 @@
"description": "CVE-2021-26855 exp",
"fork": false,
"created_at": "2021-03-08T08:39:05Z",
"updated_at": "2021-07-28T06:54:34Z",
"updated_at": "2021-08-04T03:31:41Z",
"pushed_at": "2021-03-08T08:09:01Z",
"stargazers_count": 92,
"watchers_count": 92,
"stargazers_count": 93,
"watchers_count": 93,
"forks_count": 71,
"forks": 71,
"watchers": 92,
"watchers": 93,
"score": 0
},
{

View file

@ -381,13 +381,13 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2021-07-30T02:38:49Z",
"updated_at": "2021-08-04T08:45:23Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 745,
"watchers_count": 745,
"stargazers_count": 747,
"watchers_count": 747,
"forks_count": 213,
"forks": 213,
"watchers": 745,
"watchers": 747,
"score": 0
},
{
@ -795,13 +795,13 @@
"description": "CVE-2021-3156非交互式执行命令",
"fork": false,
"created_at": "2021-02-09T19:25:18Z",
"updated_at": "2021-07-30T02:25:43Z",
"updated_at": "2021-08-04T03:31:25Z",
"pushed_at": "2021-02-09T19:31:33Z",
"stargazers_count": 154,
"watchers_count": 154,
"stargazers_count": 155,
"watchers_count": 155,
"forks_count": 28,
"forks": 28,
"watchers": 154,
"watchers": 155,
"score": 0
},
{

View file

@ -1,25 +0,0 @@
[
{
"id": 336219056,
"name": "CVE-2021-3157",
"full_name": "gabobike\/CVE-2021-3157",
"owner": {
"login": "gabobike",
"id": 12781133,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12781133?v=4",
"html_url": "https:\/\/github.com\/gabobike"
},
"html_url": "https:\/\/github.com\/gabobike\/CVE-2021-3157",
"description": null,
"fork": false,
"created_at": "2021-02-05T09:07:20Z",
"updated_at": "2021-07-07T11:28:39Z",
"pushed_at": "2021-02-05T09:07:21Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2021-06-24T18:50:17Z",
"updated_at": "2021-08-04T01:10:16Z",
"updated_at": "2021-08-04T08:05:57Z",
"pushed_at": "2021-07-29T17:54:10Z",
"stargazers_count": 107,
"watchers_count": 107,
"forks_count": 28,
"forks": 28,
"watchers": 107,
"stargazers_count": 109,
"watchers_count": 109,
"forks_count": 29,
"forks": 29,
"watchers": 109,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Ubuntu OverlayFS Local Privesc",
"fork": false,
"created_at": "2021-04-19T20:07:01Z",
"updated_at": "2021-08-02T09:52:52Z",
"updated_at": "2021-08-04T07:55:11Z",
"pushed_at": "2021-04-20T00:46:14Z",
"stargazers_count": 212,
"watchers_count": 212,
"stargazers_count": 213,
"watchers_count": 213,
"forks_count": 68,
"forks": 68,
"watchers": 212,
"watchers": 213,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "openam-CVE-2021-35464 tomcat 执行命令回显",
"fork": false,
"created_at": "2021-07-01T03:51:32Z",
"updated_at": "2021-07-28T00:50:30Z",
"updated_at": "2021-08-04T06:16:37Z",
"pushed_at": "2021-07-01T03:56:55Z",
"stargazers_count": 84,
"watchers_count": 84,
"stargazers_count": 85,
"watchers_count": 85,
"forks_count": 11,
"forks": 11,
"watchers": 84,
"watchers": 85,
"score": 0
}
]

View file

@ -61,7 +61,6 @@ Windows Print Spooler Elevation of Privilege Vulnerability
- [thalpius/Microsoft-CVE-2021-1675](https://github.com/thalpius/Microsoft-CVE-2021-1675)
- [Winter3un/CVE-2021-1675](https://github.com/Winter3un/CVE-2021-1675)
- [hahaleyile/my-CVE-2021-1675](https://github.com/hahaleyile/my-CVE-2021-1675)
- [tacbliw/PrintNightmare-LPE](https://github.com/tacbliw/PrintNightmare-LPE)
### CVE-2021-1699 (2021-01-12)
@ -274,9 +273,6 @@ Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based
- [wuuconix/CVE-2021-3156-Dockerfile-not-succeed](https://github.com/wuuconix/CVE-2021-3156-Dockerfile-not-succeed)
- [donghyunlee00/CVE-2021-3156](https://github.com/donghyunlee00/CVE-2021-3156)
### CVE-2021-3157
- [gabobike/CVE-2021-3157](https://github.com/gabobike/CVE-2021-3157)
### CVE-2021-3164 (2021-01-21)
<code>
@ -3714,6 +3710,7 @@ XML-RPC request are vulnerable to unsafe deserialization and Cross-Site Scriptin
- [cyber-niz/CVE-2020-9496](https://github.com/cyber-niz/CVE-2020-9496)
- [yuaneuro/ofbiz-poc](https://github.com/yuaneuro/ofbiz-poc)
- [ambalabanov/CVE-2020-9496](https://github.com/ambalabanov/CVE-2020-9496)
- [s4dbrd/CVE-2020-9496](https://github.com/s4dbrd/CVE-2020-9496)
### CVE-2020-9547 (2020-03-01)