Auto Update 2021/11/26 18:13:03

This commit is contained in:
motikan2010-bot 2021-11-27 03:13:03 +09:00
parent 751d0c6b72
commit b257a75a9c
27 changed files with 187 additions and 131 deletions

View file

@ -17,12 +17,12 @@
"pushed_at": "2018-06-03T09:06:00Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 10,
"score": 0
}

View file

@ -71,12 +71,12 @@
"pushed_at": "2020-07-20T23:52:16Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0
},

View file

@ -1705,17 +1705,17 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2021-11-19T05:28:21Z",
"updated_at": "2021-11-26T16:01:18Z",
"pushed_at": "2019-09-03T20:50:28Z",
"stargazers_count": 1089,
"watchers_count": 1089,
"stargazers_count": 1088,
"watchers_count": 1088,
"forks_count": 354,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 354,
"watchers": 1089,
"watchers": 1088,
"score": 0
},
{

View file

@ -40,10 +40,10 @@
"description": "漏洞POC、EXP合集持续更新。Apache Druid-任意文件读取CVE-2021-36749、ConfluenceRCECVE-2021-26084、ZeroShell防火墙RCECVE-2019-12725、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露",
"fork": false,
"created_at": "2021-05-22T05:06:33Z",
"updated_at": "2021-11-24T03:54:22Z",
"updated_at": "2021-11-26T16:03:05Z",
"pushed_at": "2021-11-21T10:34:06Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
@ -54,7 +54,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 39,
"watchers": 40,
"score": 0
},
{

View file

@ -40,11 +40,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-11-26T11:18:09Z",
"updated_at": "2021-11-26T15:57:59Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3000,
"watchers_count": 3000,
"forks_count": 889,
"stargazers_count": 3005,
"watchers_count": 3005,
"forks_count": 890,
"allow_forking": true,
"is_template": false,
"topics": [
@ -69,8 +69,8 @@
"webshell"
],
"visibility": "public",
"forks": 889,
"watchers": 3000,
"forks": 890,
"watchers": 3005,
"score": 0
},
{

View file

@ -109,6 +109,33 @@
},
{
"id": 432088464,
"name": "CVE-2020-0114-frameworks_basegbdgb",
"full_name": "Nivaskumark\/CVE-2020-0114-frameworks_basegbdgb",
"owner": {
"login": "Nivaskumark",
"id": 90234286,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90234286?v=4",
"html_url": "https:\/\/github.com\/Nivaskumark"
},
"html_url": "https:\/\/github.com\/Nivaskumark\/CVE-2020-0114-frameworks_basegbdgb",
"description": null,
"fork": false,
"created_at": "2021-11-26T07:19:26Z",
"updated_at": "2021-11-26T12:57:28Z",
"pushed_at": "2021-11-26T07:23:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 432179578,
"name": "CVE-2020-0114-frameworks_base",
"full_name": "Nivaskumark\/CVE-2020-0114-frameworks_base",
"owner": {
@ -120,9 +147,9 @@
"html_url": "https:\/\/github.com\/Nivaskumark\/CVE-2020-0114-frameworks_base",
"description": null,
"fork": false,
"created_at": "2021-11-26T07:19:26Z",
"updated_at": "2021-11-26T07:23:20Z",
"pushed_at": "2021-11-26T07:23:19Z",
"created_at": "2021-11-26T12:58:16Z",
"updated_at": "2021-11-26T13:06:23Z",
"pushed_at": "2021-11-26T13:06:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,17 +13,17 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2021-11-25T04:02:30Z",
"updated_at": "2021-11-26T14:51:09Z",
"pushed_at": "2020-09-11T07:38:22Z",
"stargazers_count": 586,
"watchers_count": 586,
"stargazers_count": 585,
"watchers_count": 585,
"forks_count": 152,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 152,
"watchers": 586,
"watchers": 585,
"score": 0
},
{

View file

@ -1364,7 +1364,7 @@
"pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 433,
"watchers_count": 433,
"forks_count": 142,
"forks_count": 141,
"allow_forking": true,
"is_template": false,
"topics": [
@ -1375,7 +1375,7 @@
"smbghost"
],
"visibility": "public",
"forks": 142,
"forks": 141,
"watchers": 433,
"score": 0
},
@ -2024,10 +2024,10 @@
"description": "Remote Code Execution POC for CVE-2020-0796",
"fork": false,
"created_at": "2021-10-09T04:52:55Z",
"updated_at": "2021-11-01T19:36:44Z",
"updated_at": "2021-11-26T15:51:17Z",
"pushed_at": "2021-11-01T19:36:41Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -2038,7 +2038,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
},
{
@ -2109,8 +2109,8 @@
"description": null,
"fork": false,
"created_at": "2021-11-25T04:59:48Z",
"updated_at": "2021-11-25T05:14:01Z",
"pushed_at": "2021-11-25T04:59:58Z",
"updated_at": "2021-11-26T12:36:25Z",
"pushed_at": "2021-11-26T12:36:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,17 +13,17 @@
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
"fork": false,
"created_at": "2020-06-08T07:37:49Z",
"updated_at": "2021-11-12T03:36:48Z",
"updated_at": "2021-11-26T15:33:11Z",
"pushed_at": "2021-08-07T16:48:55Z",
"stargazers_count": 377,
"watchers_count": 377,
"stargazers_count": 378,
"watchers_count": 378,
"forks_count": 66,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 66,
"watchers": 377,
"watchers": 378,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2021-11-26T00:09:30Z",
"updated_at": "2021-11-26T16:20:49Z",
"pushed_at": "2021-11-10T19:56:38Z",
"stargazers_count": 1378,
"watchers_count": 1378,
"stargazers_count": 1379,
"watchers_count": 1379,
"forks_count": 311,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 311,
"watchers": 1378,
"watchers": 1379,
"score": 0
},
{

View file

@ -13,11 +13,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-11-26T11:18:09Z",
"updated_at": "2021-11-26T15:57:59Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3000,
"watchers_count": 3000,
"forks_count": 889,
"stargazers_count": 3005,
"watchers_count": 3005,
"forks_count": 890,
"allow_forking": true,
"is_template": false,
"topics": [
@ -42,8 +42,8 @@
"webshell"
],
"visibility": "public",
"forks": 889,
"watchers": 3000,
"forks": 890,
"watchers": 3005,
"score": 0
},
{

View file

@ -121,10 +121,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-11-25T10:27:32Z",
"updated_at": "2021-11-26T15:08:11Z",
"pushed_at": "2021-07-30T03:28:00Z",
"stargazers_count": 897,
"watchers_count": 897,
"stargazers_count": 898,
"watchers_count": 898,
"forks_count": 279,
"allow_forking": true,
"is_template": false,
@ -135,7 +135,7 @@
],
"visibility": "public",
"forks": 279,
"watchers": 897,
"watchers": 898,
"score": 0
}
]

View file

@ -192,5 +192,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 432255271,
"name": "CVE-2020-7247-POC",
"full_name": "SimonSchoeni\/CVE-2020-7247-POC",
"owner": {
"login": "SimonSchoeni",
"id": 62761108,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62761108?v=4",
"html_url": "https:\/\/github.com\/SimonSchoeni"
},
"html_url": "https:\/\/github.com\/SimonSchoeni\/CVE-2020-7247-POC",
"description": "Proof of concept for CVE-2020-7247 for educational purposes.",
"fork": false,
"created_at": "2021-11-26T17:28:56Z",
"updated_at": "2021-11-26T17:28:59Z",
"pushed_at": "2021-11-26T17:28:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -256,17 +256,17 @@
"description": "Apache Tomcat RCE (CVE-2020-9484)",
"fork": false,
"created_at": "2021-01-15T17:59:50Z",
"updated_at": "2021-11-12T16:03:45Z",
"updated_at": "2021-11-26T17:31:28Z",
"pushed_at": "2021-01-15T18:12:07Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 5,
"watchers": 6,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-03-30T05:21:26Z",
"updated_at": "2021-11-23T02:42:55Z",
"updated_at": "2021-11-26T13:23:32Z",
"pushed_at": "2021-03-30T05:31:22Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 19,
"watchers": 18,
"score": 0
}
]

View file

@ -274,17 +274,17 @@
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
"fork": false,
"created_at": "2021-07-01T23:45:58Z",
"updated_at": "2021-11-26T03:42:14Z",
"updated_at": "2021-11-26T16:56:39Z",
"pushed_at": "2021-07-05T08:54:06Z",
"stargazers_count": 684,
"watchers_count": 684,
"stargazers_count": 685,
"watchers_count": 685,
"forks_count": 188,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 188,
"watchers": 684,
"watchers": 685,
"score": 0
},
{

View file

@ -275,17 +275,17 @@
"description": "VMware vCenter 未授权RCECVE-2021-21972",
"fork": false,
"created_at": "2021-02-25T07:17:21Z",
"updated_at": "2021-03-12T10:25:10Z",
"updated_at": "2021-11-26T16:55:30Z",
"pushed_at": "2021-02-25T09:54:53Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 22,
"watchers": 23,
"score": 0
},
{

View file

@ -487,7 +487,7 @@
"pushed_at": "2021-11-12T07:53:29Z",
"stargazers_count": 85,
"watchers_count": 85,
"forks_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [
@ -499,7 +499,7 @@
"security"
],
"visibility": "public",
"forks": 9,
"forks": 10,
"watchers": 85,
"score": 0
},

View file

@ -121,10 +121,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-11-25T10:27:32Z",
"updated_at": "2021-11-26T15:08:11Z",
"pushed_at": "2021-07-30T03:28:00Z",
"stargazers_count": 897,
"watchers_count": 897,
"stargazers_count": 898,
"watchers_count": 898,
"forks_count": 279,
"allow_forking": true,
"is_template": false,
@ -135,7 +135,7 @@
],
"visibility": "public",
"forks": 279,
"watchers": 897,
"watchers": 898,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "A sample POC for CVE-2021-30657 affecting MacOS",
"fork": false,
"created_at": "2021-11-07T18:33:35Z",
"updated_at": "2021-11-24T22:13:13Z",
"updated_at": "2021-11-26T13:07:14Z",
"pushed_at": "2021-11-08T19:35:28Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 20,
"watchers": 21,
"score": 0
}
]

View file

@ -780,17 +780,17 @@
"description": "Root shell PoC for CVE-2021-3156",
"fork": false,
"created_at": "2021-02-03T19:57:56Z",
"updated_at": "2021-11-18T00:21:32Z",
"updated_at": "2021-11-26T13:47:22Z",
"pushed_at": "2021-02-03T22:28:14Z",
"stargazers_count": 77,
"watchers_count": 77,
"stargazers_count": 78,
"watchers_count": 78,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 77,
"watchers": 78,
"score": 0
},
{
@ -1023,17 +1023,17 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
"updated_at": "2021-11-26T02:10:15Z",
"updated_at": "2021-11-26T17:24:38Z",
"pushed_at": "2021-11-04T23:56:50Z",
"stargazers_count": 396,
"watchers_count": 396,
"stargazers_count": 398,
"watchers_count": 398,
"forks_count": 100,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 100,
"watchers": 396,
"watchers": 398,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "漏洞POC、EXP合集持续更新。Apache Druid-任意文件读取CVE-2021-36749、ConfluenceRCECVE-2021-26084、ZeroShell防火墙RCECVE-2019-12725、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露",
"fork": false,
"created_at": "2021-05-22T05:06:33Z",
"updated_at": "2021-11-24T03:54:22Z",
"updated_at": "2021-11-26T16:03:05Z",
"pushed_at": "2021-11-21T10:34:06Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 39,
"watchers": 40,
"score": 0
},
{

View file

@ -229,17 +229,17 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2021-11-25T09:27:19Z",
"updated_at": "2021-11-26T17:55:02Z",
"pushed_at": "2021-09-11T09:50:26Z",
"stargazers_count": 1316,
"watchers_count": 1316,
"forks_count": 426,
"stargazers_count": 1317,
"watchers_count": 1317,
"forks_count": 427,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 426,
"watchers": 1316,
"forks": 427,
"watchers": 1317,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Remote Code Execution (RCE) vulnerability exists in Sourcecodester Online Reviewer System 1.0 by uploading a maliciously crafted PHP file that bypasses the image upload filters..",
"fork": false,
"created_at": "2021-10-29T22:31:32Z",
"updated_at": "2021-10-29T22:32:30Z",
"updated_at": "2021-11-26T14:16:54Z",
"pushed_at": "2021-10-29T22:32:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -336,33 +336,6 @@
"watchers": 3,
"score": 0
},
{
"id": 414079512,
"name": "cve-2021-41773-nse",
"full_name": "TishcaTpx\/cve-2021-41773-nse",
"owner": {
"login": "TishcaTpx",
"id": 91351013,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91351013?v=4",
"html_url": "https:\/\/github.com\/TishcaTpx"
},
"html_url": "https:\/\/github.com\/TishcaTpx\/cve-2021-41773-nse",
"description": "CVE-2021-41773.nse",
"fork": false,
"created_at": "2021-10-06T05:22:42Z",
"updated_at": "2021-10-06T05:24:35Z",
"pushed_at": "2021-10-06T05:23:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 414082287,
"name": "CVE-2021-41773-POC",
@ -390,6 +363,33 @@
"watchers": 11,
"score": 0
},
{
"id": 414082633,
"name": "cve-2021-41773-nse",
"full_name": "TAI-REx\/cve-2021-41773-nse",
"owner": {
"login": "TAI-REx",
"id": 78527947,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78527947?v=4",
"html_url": "https:\/\/github.com\/TAI-REx"
},
"html_url": "https:\/\/github.com\/TAI-REx\/cve-2021-41773-nse",
"description": "CVE-2021-41773.nse",
"fork": false,
"created_at": "2021-10-06T05:36:22Z",
"updated_at": "2021-11-26T18:07:10Z",
"pushed_at": "2021-10-06T05:23:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 414108838,
"name": "CVE-2021-41773",

View file

@ -13,17 +13,17 @@
"description": "Microsoft Exchange Server Poc",
"fork": false,
"created_at": "2021-11-23T02:26:26Z",
"updated_at": "2021-11-26T08:29:56Z",
"updated_at": "2021-11-26T14:10:22Z",
"pushed_at": "2021-11-23T02:33:47Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 32,
"watchers": 33,
"score": 0
}
]

View file

@ -3185,8 +3185,8 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
- [Ls4ss/CVE-2021-41773_CVE-2021-42013](https://github.com/Ls4ss/CVE-2021-41773_CVE-2021-42013)
- [itsecurityco/CVE-2021-41773](https://github.com/itsecurityco/CVE-2021-41773)
- [habibiefaried/CVE-2021-41773-PoC](https://github.com/habibiefaried/CVE-2021-41773-PoC)
- [TishcaTpx/cve-2021-41773-nse](https://github.com/TishcaTpx/cve-2021-41773-nse)
- [creadpag/CVE-2021-41773-POC](https://github.com/creadpag/CVE-2021-41773-POC)
- [TAI-REx/cve-2021-41773-nse](https://github.com/TAI-REx/cve-2021-41773-nse)
- [blasty/CVE-2021-41773](https://github.com/blasty/CVE-2021-41773)
- [PentesterGuruji/CVE-2021-41773](https://github.com/PentesterGuruji/CVE-2021-41773)
- [jbovet/CVE-2021-41773](https://github.com/jbovet/CVE-2021-41773)
@ -3604,6 +3604,7 @@ In onCreateSliceProvider of KeyguardSliceProvider.java, there is a possible conf
- [Nivaskumark/_beforeCVE-2020-0114-frameworks_base](https://github.com/Nivaskumark/_beforeCVE-2020-0114-frameworks_base)
- [Nivaskumark/CVE-2020-0114-frameworks_base11](https://github.com/Nivaskumark/CVE-2020-0114-frameworks_base11)
- [Nivaskumark/CVE-2020-0114-frameworks](https://github.com/Nivaskumark/CVE-2020-0114-frameworks)
- [Nivaskumark/CVE-2020-0114-frameworks_basegbdgb](https://github.com/Nivaskumark/CVE-2020-0114-frameworks_basegbdgb)
- [Nivaskumark/CVE-2020-0114-frameworks_base](https://github.com/Nivaskumark/CVE-2020-0114-frameworks_base)
### CVE-2020-0121 (2020-06-10)
@ -4859,6 +4860,7 @@ smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and oth
- [QTranspose/CVE-2020-7247-exploit](https://github.com/QTranspose/CVE-2020-7247-exploit)
- [f4T1H21/CVE-2020-7247](https://github.com/f4T1H21/CVE-2020-7247)
- [Sergio928/OpenSMTPD-6.6.1---Remote-Code-Execution---Linux-remote-Exploit](https://github.com/Sergio928/OpenSMTPD-6.6.1---Remote-Code-Execution---Linux-remote-Exploit)
- [SimonSchoeni/CVE-2020-7247-POC](https://github.com/SimonSchoeni/CVE-2020-7247-POC)
### CVE-2020-7283 (2020-07-03)