Auto Update 2021/05/01 00:11:25

This commit is contained in:
motikan2010-bot 2021-05-01 00:11:25 +09:00
parent f40b1a1f8b
commit b7581dcb14
43 changed files with 201 additions and 177 deletions

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-04-29T08:55:21Z",
"updated_at": "2021-04-30T14:56:07Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1011,
"watchers_count": 1011,
"stargazers_count": 1012,
"watchers_count": 1012,
"forks_count": 229,
"forks": 229,
"watchers": 1011,
"watchers": 1012,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-04-29T08:55:21Z",
"updated_at": "2021-04-30T14:56:07Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1011,
"watchers_count": 1011,
"stargazers_count": 1012,
"watchers_count": 1012,
"forks_count": 229,
"forks": 229,
"watchers": 1011,
"watchers": 1012,
"score": 0
},
{

View file

@ -59,8 +59,8 @@
"description": "Simple detection tool for Blueborne vulnerability found on Android devices --- CVE-2017-0781. ",
"fork": false,
"created_at": "2020-07-30T21:06:19Z",
"updated_at": "2020-08-10T08:50:38Z",
"pushed_at": "2020-07-31T00:24:35Z",
"updated_at": "2021-04-30T12:44:56Z",
"pushed_at": "2021-04-30T12:44:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,13 +13,13 @@
"description": "Blueborne CVE-2017-1000251 PoC for linux machines",
"fork": false,
"created_at": "2017-09-23T06:29:31Z",
"updated_at": "2020-11-04T16:52:04Z",
"updated_at": "2021-04-30T12:56:20Z",
"pushed_at": "2017-10-11T17:46:21Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 13,
"forks": 13,
"watchers": 16,
"watchers": 15,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-10-02T10:27:06Z",
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 8,
"forks": 8,
"forks_count": 7,
"forks": 7,
"watchers": 20,
"score": 0
},
@ -40,8 +40,8 @@
"pushed_at": "2018-11-22T03:50:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
@ -109,8 +109,8 @@
"pushed_at": "2020-04-10T13:11:03Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 3,
"forks": 3,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},

View file

@ -13,7 +13,7 @@
"description": "Exploit for CVE-2017-11826",
"fork": false,
"created_at": "2018-02-09T17:20:53Z",
"updated_at": "2021-02-28T21:53:00Z",
"updated_at": "2021-04-30T12:16:19Z",
"pushed_at": "2020-05-18T20:53:40Z",
"stargazers_count": 8,
"watchers_count": 8,

View file

@ -17,8 +17,8 @@
"pushed_at": "2017-10-11T07:43:50Z",
"stargazers_count": 354,
"watchers_count": 354,
"forks_count": 134,
"forks": 134,
"forks_count": 133,
"forks": 133,
"watchers": 354,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-04-29T08:55:21Z",
"updated_at": "2021-04-30T14:56:07Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1011,
"watchers_count": 1011,
"stargazers_count": 1012,
"watchers_count": 1012,
"forks_count": 229,
"forks": 229,
"watchers": 1011,
"watchers": 1012,
"score": 0
}
]

View file

@ -63,8 +63,8 @@
"pushed_at": "2019-01-04T09:29:01Z",
"stargazers_count": 182,
"watchers_count": 182,
"forks_count": 65,
"forks": 65,
"forks_count": 64,
"forks": 64,
"watchers": 182,
"score": 0
},

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-04-29T08:55:21Z",
"updated_at": "2021-04-30T14:56:07Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1011,
"watchers_count": 1011,
"stargazers_count": 1012,
"watchers_count": 1012,
"forks_count": 229,
"forks": 229,
"watchers": 1011,
"watchers": 1012,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-08-17T23:31:46Z",
"stargazers_count": 158,
"watchers_count": 158,
"forks_count": 33,
"forks": 33,
"forks_count": 32,
"forks": 32,
"watchers": 158,
"score": 0
}

View file

@ -36,13 +36,13 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2021-04-30T08:01:09Z",
"updated_at": "2021-04-30T09:47:41Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 414,
"watchers_count": 414,
"stargazers_count": 415,
"watchers_count": 415,
"forks_count": 98,
"forks": 98,
"watchers": 414,
"watchers": 415,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-06-17T08:10:53Z",
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 11,
"forks": 11,
"forks_count": 10,
"forks": 10,
"watchers": 34,
"score": 0
}

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-01-07T03:22:20Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2021-04-27T15:30:21Z",
"updated_at": "2021-04-30T10:10:39Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1653,
"watchers_count": 1653,
"forks_count": 250,
"forks": 250,
"watchers": 1653,
"stargazers_count": 1652,
"watchers_count": 1652,
"forks_count": 249,
"forks": 249,
"watchers": 1652,
"score": 0
},
{

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-04-29T08:55:21Z",
"updated_at": "2021-04-30T14:56:07Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1011,
"watchers_count": 1011,
"stargazers_count": 1012,
"watchers_count": 1012,
"forks_count": 229,
"forks": 229,
"watchers": 1011,
"watchers": 1012,
"score": 0
}
]

View file

@ -178,8 +178,8 @@
"pushed_at": "2019-08-08T09:48:20Z",
"stargazers_count": 386,
"watchers_count": 386,
"forks_count": 157,
"forks": 157,
"forks_count": 158,
"forks": 158,
"watchers": 386,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Moodle (< 3.6.2, < 3.5.4, < 3.4.7, < 3.1.16) XSS PoC for Privilege Escalation (Student to Admin)",
"fork": false,
"created_at": "2021-04-29T09:38:08Z",
"updated_at": "2021-04-30T08:27:37Z",
"updated_at": "2021-04-30T13:08:13Z",
"pushed_at": "2021-04-29T10:46:08Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 0,
"forks": 0,
"watchers": 11,
"watchers": 13,
"score": 0
}
]

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2019-11-06T07:26:43Z",
"updated_at": "2019-11-06T07:27:36Z",
"pushed_at": "2021-03-31T04:59:23Z",
"pushed_at": "2021-04-30T12:18:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

25
2019/CVE-2019-8561.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 190824936,
"name": "CVE-2019-8561",
"full_name": "0xmachos\/CVE-2019-8561",
"owner": {
"login": "0xmachos",
"id": 30755149,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30755149?v=4",
"html_url": "https:\/\/github.com\/0xmachos"
},
"html_url": "https:\/\/github.com\/0xmachos\/CVE-2019-8561",
"description": "Proof of concept exploit for CVE-2019-8561 discovered by @jbradley89 ",
"fork": false,
"created_at": "2019-06-07T23:48:55Z",
"updated_at": "2021-04-30T14:45:42Z",
"pushed_at": "2021-04-30T13:45:50Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -1144,8 +1144,8 @@
"pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 383,
"watchers_count": 383,
"forks_count": 128,
"forks": 128,
"forks_count": 127,
"forks": 127,
"watchers": 383,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-06-08T22:09:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-06-09T20:41:32Z",
"stargazers_count": 133,
"watchers_count": 133,
"forks_count": 44,
"forks": 44,
"forks_count": 43,
"forks": 43,
"watchers": 133,
"score": 0
},

View file

@ -155,8 +155,8 @@
"pushed_at": "2020-07-17T13:07:29Z",
"stargazers_count": 228,
"watchers_count": 228,
"forks_count": 53,
"forks": 53,
"forks_count": 52,
"forks": 52,
"watchers": 228,
"score": 0
},
@ -178,8 +178,8 @@
"pushed_at": "2020-07-16T18:32:04Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 5,
"forks": 5,
"forks_count": 4,
"forks": 4,
"watchers": 17,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-09-18T00:01:00Z",
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 15,
"forks": 15,
"forks_count": 14,
"forks": 14,
"watchers": 35,
"score": 0
}

View file

@ -128,13 +128,13 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2021-04-29T14:06:27Z",
"updated_at": "2021-04-30T14:02:21Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 301,
"watchers_count": 301,
"stargazers_count": 302,
"watchers_count": 302,
"forks_count": 99,
"forks": 99,
"watchers": 301,
"watchers": 302,
"score": 0
},
{
@ -155,8 +155,8 @@
"pushed_at": "2020-09-16T14:05:27Z",
"stargazers_count": 147,
"watchers_count": 147,
"forks_count": 37,
"forks": 37,
"forks_count": 36,
"forks": 36,
"watchers": 147,
"score": 0
},

View file

@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-04-30T05:43:15Z",
"updated_at": "2021-04-30T14:35:03Z",
"pushed_at": "2021-04-26T02:30:11Z",
"stargazers_count": 716,
"watchers_count": 716,
"forks_count": 222,
"forks": 222,
"watchers": 716,
"stargazers_count": 718,
"watchers_count": 718,
"forks_count": 223,
"forks": 223,
"watchers": 718,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-11-24T09:13:14Z",
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 10,
"forks": 10,
"forks_count": 9,
"forks": 9,
"watchers": 27,
"score": 0
},
@ -63,8 +63,8 @@
"pushed_at": "2021-01-04T15:01:14Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-11-26T04:21:20Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
}

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-02-23T17:06:06Z",
"stargazers_count": 75,
"watchers_count": 75,
"forks_count": 54,
"forks": 54,
"forks_count": 53,
"forks": 53,
"watchers": 75,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-04-29T08:55:21Z",
"updated_at": "2021-04-30T14:56:07Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1011,
"watchers_count": 1011,
"stargazers_count": 1012,
"watchers_count": 1012,
"forks_count": 229,
"forks": 229,
"watchers": 1011,
"watchers": 1012,
"score": 0
},
{

View file

@ -230,21 +230,44 @@
"score": 0
},
{
"id": 363088237,
"name": "GIT-LFS-CVE-2020-27955",
"full_name": "DeeLMind\/GIT-LFS-CVE-2020-27955",
"id": 363093968,
"name": "CVE-2020-27955-LFS",
"full_name": "DeeLMind\/CVE-2020-27955-LFS",
"owner": {
"login": "DeeLMind",
"id": 18142084,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18142084?v=4",
"html_url": "https:\/\/github.com\/DeeLMind"
},
"html_url": "https:\/\/github.com\/DeeLMind\/GIT-LFS-CVE-2020-27955",
"description": "GIT-LFS-CVE-2020-27955",
"html_url": "https:\/\/github.com\/DeeLMind\/CVE-2020-27955-LFS",
"description": null,
"fork": false,
"created_at": "2021-04-30T09:15:39Z",
"updated_at": "2021-04-30T09:15:42Z",
"pushed_at": "2021-04-30T09:15:40Z",
"created_at": "2021-04-30T09:38:48Z",
"updated_at": "2021-04-30T09:43:25Z",
"pushed_at": "2021-04-30T09:43:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 363165166,
"name": "CVE-2020-27955",
"full_name": "exileddb\/CVE-2020-27955",
"owner": {
"login": "exileddb",
"id": 61073603,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61073603?v=4",
"html_url": "https:\/\/github.com\/exileddb"
},
"html_url": "https:\/\/github.com\/exileddb\/CVE-2020-27955",
"description": "CVE-2020-27955",
"fork": false,
"created_at": "2021-04-30T14:25:42Z",
"updated_at": "2021-04-30T14:29:08Z",
"pushed_at": "2021-04-30T14:29:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-05-13T09:45:12Z",
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 12,
"forks": 12,
"forks_count": 11,
"forks": 11,
"watchers": 31,
"score": 0
}

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-08-12T08:27:10Z",
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 16,
"forks": 16,
"forks_count": 15,
"forks": 15,
"watchers": 25,
"score": 0
}

View file

@ -178,8 +178,8 @@
"pushed_at": "2020-12-31T23:45:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},

View file

@ -1,25 +0,0 @@
[
{
"id": 355955764,
"name": "cve-2021-21635",
"full_name": "kenyon-wong\/cve-2021-21635",
"owner": {
"login": "kenyon-wong",
"id": 39546510,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39546510?v=4",
"html_url": "https:\/\/github.com\/kenyon-wong"
},
"html_url": "https:\/\/github.com\/kenyon-wong\/cve-2021-21635",
"description": "测试",
"fork": false,
"created_at": "2021-04-08T15:13:28Z",
"updated_at": "2021-04-08T15:13:28Z",
"pushed_at": "2021-04-08T15:13:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-04-30T05:43:15Z",
"updated_at": "2021-04-30T14:35:03Z",
"pushed_at": "2021-04-26T02:30:11Z",
"stargazers_count": 716,
"watchers_count": 716,
"forks_count": 222,
"forks": 222,
"watchers": 716,
"stargazers_count": 718,
"watchers_count": 718,
"forks_count": 223,
"forks": 223,
"watchers": 718,
"score": 0
},
{

View file

@ -247,8 +247,8 @@
"pushed_at": "2021-03-17T11:21:52Z",
"stargazers_count": 115,
"watchers_count": 115,
"forks_count": 18,
"forks": 18,
"forks_count": 19,
"forks": 19,
"watchers": 115,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "WordPress - Authenticated XXE (CVE-2021-29447)",
"fork": false,
"created_at": "2021-04-16T20:41:26Z",
"updated_at": "2021-04-18T03:06:05Z",
"updated_at": "2021-04-30T14:20:20Z",
"pushed_at": "2021-04-18T00:45:34Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2021-04-29T17:59:59Z",
"updated_at": "2021-04-30T08:30:02Z",
"pushed_at": "2021-04-30T04:57:46Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 2,
"forks": 2,
"watchers": 9,
"updated_at": "2021-04-30T15:01:40Z",
"pushed_at": "2021-04-30T15:01:38Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 3,
"forks": 3,
"watchers": 11,
"score": 0
}
]

View file

@ -385,8 +385,8 @@
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 703,
"watchers_count": 703,
"forks_count": 199,
"forks": 199,
"forks_count": 198,
"forks": 198,
"watchers": 703,
"score": 0
},
@ -864,8 +864,8 @@
"description": null,
"fork": false,
"created_at": "2021-03-09T18:53:14Z",
"updated_at": "2021-04-30T02:01:44Z",
"pushed_at": "2021-04-30T02:01:42Z",
"updated_at": "2021-04-30T13:20:15Z",
"pushed_at": "2021-04-30T13:20:13Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
@ -1025,13 +1025,13 @@
"description": "CVE-2021-3156 - Sudo Baron Samedit",
"fork": false,
"created_at": "2021-04-29T06:29:26Z",
"updated_at": "2021-04-30T08:01:00Z",
"updated_at": "2021-04-30T13:09:01Z",
"pushed_at": "2021-04-29T16:26:45Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 50,
"watchers_count": 50,
"forks_count": 0,
"forks": 0,
"watchers": 40,
"watchers": 50,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Ubuntu OverlayFS Local Privesc",
"fork": false,
"created_at": "2021-04-19T20:07:01Z",
"updated_at": "2021-04-30T05:04:59Z",
"updated_at": "2021-04-30T13:40:41Z",
"pushed_at": "2021-04-20T00:46:14Z",
"stargazers_count": 154,
"watchers_count": 154,
"forks_count": 47,
"forks": 47,
"watchers": 154,
"stargazers_count": 155,
"watchers_count": 155,
"forks_count": 48,
"forks": 48,
"watchers": 155,
"score": 0
},
{

View file

@ -388,14 +388,6 @@ Jellyfin is a Free Software Media System. In Jellyfin before version 10.7.1, wit
- [somatrasss/CVE-2021-21402](https://github.com/somatrasss/CVE-2021-21402)
- [givemefivw/CVE-2021-21402](https://github.com/givemefivw/CVE-2021-21402)
### CVE-2021-21635 (2021-03-30)
<code>
Jenkins REST List Parameter Plugin 1.3.0 and earlier does not escape a parameter name reference in embedded JavaScript, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
</code>
- [kenyon-wong/cve-2021-21635](https://github.com/kenyon-wong/cve-2021-21635)
### CVE-2021-21972 (2021-02-24)
<code>
@ -4785,7 +4777,8 @@ Git LFS 2.12.0 allows Remote Code Execution.
- [TheTh1nk3r/cve-2020-27955](https://github.com/TheTh1nk3r/cve-2020-27955)
- [dennyson120/CVE-2020-27955](https://github.com/dennyson120/CVE-2020-27955)
- [NeoDarwin/CVE-2020-27955](https://github.com/NeoDarwin/CVE-2020-27955)
- [DeeLMind/GIT-LFS-CVE-2020-27955](https://github.com/DeeLMind/GIT-LFS-CVE-2020-27955)
- [DeeLMind/CVE-2020-27955-LFS](https://github.com/DeeLMind/CVE-2020-27955-LFS)
- [exileddb/CVE-2020-27955](https://github.com/exileddb/CVE-2020-27955)
### CVE-2020-27976 (2020-10-28)
@ -6502,6 +6495,14 @@ A memory initialization issue was addressed with improved memory handling. This
- [maldiohead/CVE-2019-8540](https://github.com/maldiohead/CVE-2019-8540)
### CVE-2019-8561 (2019-12-18)
<code>
A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4. A malicious application may be able to elevate privileges.
</code>
- [0xmachos/CVE-2019-8561](https://github.com/0xmachos/CVE-2019-8561)
### CVE-2019-8565 (2019-12-18)
<code>