Auto Update 2021/07/12 00:11:25

This commit is contained in:
motikan2010-bot 2021-07-12 00:11:25 +09:00
parent 469762d01d
commit d00dac1248
34 changed files with 129 additions and 387 deletions

View file

@ -13,13 +13,13 @@
"description": ":muscle: Proof Of Concept of the BEAST attack against SSL\/TLS CVE-2011-3389 :muscle:",
"fork": false,
"created_at": "2015-03-28T10:28:16Z",
"updated_at": "2021-07-03T11:20:31Z",
"updated_at": "2021-07-11T09:25:13Z",
"pushed_at": "2019-01-30T21:36:22Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 28,
"forks": 28,
"watchers": 47,
"watchers": 48,
"score": 0
}
]

View file

@ -21,28 +21,5 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 28126641,
"name": "CVE-2014-0196",
"full_name": "tempbottle\/CVE-2014-0196",
"owner": {
"login": "tempbottle",
"id": 1203820,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1203820?v=4",
"html_url": "https:\/\/github.com\/tempbottle"
},
"html_url": "https:\/\/github.com\/tempbottle\/CVE-2014-0196",
"description": "CVE-2014-0196: Linux kernel pty layer race condition memory corruption",
"fork": false,
"created_at": "2014-12-17T07:39:00Z",
"updated_at": "2015-10-24T13:32:06Z",
"pushed_at": "2014-05-13T04:53:40Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
}
]

View file

@ -22,52 +22,6 @@
"watchers": 35,
"score": 0
},
{
"id": 21604310,
"name": "CVE-2014-0224",
"full_name": "iph0n3\/CVE-2014-0224",
"owner": {
"login": "iph0n3",
"id": 1528152,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1528152?v=4",
"html_url": "https:\/\/github.com\/iph0n3"
},
"html_url": "https:\/\/github.com\/iph0n3\/CVE-2014-0224",
"description": null,
"fork": false,
"created_at": "2014-07-08T08:08:00Z",
"updated_at": "2015-08-10T05:31:12Z",
"pushed_at": "2014-06-06T08:33:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 21711116,
"name": "ccs-eval",
"full_name": "droptables\/ccs-eval",
"owner": {
"login": "droptables",
"id": 5084547,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5084547?v=4",
"html_url": "https:\/\/github.com\/droptables"
},
"html_url": "https:\/\/github.com\/droptables\/ccs-eval",
"description": "Used for evaluating hosts for CVE-2014-0224",
"fork": false,
"created_at": "2014-07-10T21:32:28Z",
"updated_at": "2015-04-07T04:27:18Z",
"pushed_at": "2014-07-10T21:41:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 21854976,
"name": "openssl-ccs-cve-2014-0224",
@ -90,28 +44,5 @@
"forks": 4,
"watchers": 13,
"score": 0
},
{
"id": 21900951,
"name": "CVE-2014-0224",
"full_name": "secretnonempty\/CVE-2014-0224",
"owner": {
"login": "secretnonempty",
"id": 1168808,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1168808?v=4",
"html_url": "https:\/\/github.com\/secretnonempty"
},
"html_url": "https:\/\/github.com\/secretnonempty\/CVE-2014-0224",
"description": null,
"fork": false,
"created_at": "2014-07-16T13:09:41Z",
"updated_at": "2021-03-26T12:43:40Z",
"pushed_at": "2014-07-18T06:53:23Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 4,
"forks": 4,
"watchers": 7,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 23252947,
"name": "cve-2014-0521",
"full_name": "molnarg\/cve-2014-0521",
"owner": {
"login": "molnarg",
"id": 894421,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/894421?v=4",
"html_url": "https:\/\/github.com\/molnarg"
},
"html_url": "https:\/\/github.com\/molnarg\/cve-2014-0521",
"description": null,
"fork": false,
"created_at": "2014-08-23T09:54:18Z",
"updated_at": "2021-02-15T11:51:51Z",
"pushed_at": "2014-08-25T06:41:02Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 11,
"forks": 11,
"watchers": 12,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 22477484,
"name": "freePW_tc7200Eploit",
"full_name": "tihmstar\/freePW_tc7200Eploit",
"owner": {
"login": "tihmstar",
"id": 1363935,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1363935?v=4",
"html_url": "https:\/\/github.com\/tihmstar"
},
"html_url": "https:\/\/github.com\/tihmstar\/freePW_tc7200Eploit",
"description": "Technicolor TC7200 - Credentials Disclosure CVE : CVE-2014-1677",
"fork": false,
"created_at": "2014-07-31T17:01:29Z",
"updated_at": "2019-10-08T13:33:12Z",
"pushed_at": "2014-07-31T17:07:46Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -21,28 +21,5 @@
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 21585576,
"name": "ElasticSearch-CVE-2014-3120",
"full_name": "echohtp\/ElasticSearch-CVE-2014-3120",
"owner": {
"login": "echohtp",
"id": 313060,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/313060?v=4",
"html_url": "https:\/\/github.com\/echohtp"
},
"html_url": "https:\/\/github.com\/echohtp\/ElasticSearch-CVE-2014-3120",
"description": "POC Code to exploite CVE-2014-3120",
"fork": false,
"created_at": "2014-07-07T20:28:34Z",
"updated_at": "2021-05-06T08:08:37Z",
"pushed_at": "2014-07-07T20:35:30Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 5,
"forks": 5,
"watchers": 7,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-07-10T17:17:21Z",
"updated_at": "2021-07-11T14:27:04Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1103,
"watchers_count": 1103,
"stargazers_count": 1104,
"watchers_count": 1104,
"forks_count": 245,
"forks": 245,
"watchers": 1103,
"watchers": 1104,
"score": 0
},
{

View file

@ -1,50 +1,4 @@
[
{
"id": 24422837,
"name": "bash-cve-2014-6271-fixes",
"full_name": "dlitz\/bash-cve-2014-6271-fixes",
"owner": {
"login": "dlitz",
"id": 99377,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99377?v=4",
"html_url": "https:\/\/github.com\/dlitz"
},
"html_url": "https:\/\/github.com\/dlitz\/bash-cve-2014-6271-fixes",
"description": "Collected fixes for bash CVE-2014-6271",
"fork": false,
"created_at": "2014-09-24T16:26:17Z",
"updated_at": "2014-09-24T16:26:17Z",
"pushed_at": "2014-09-24T17:38:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 24427252,
"name": "ansible-bashpocalypse",
"full_name": "npm\/ansible-bashpocalypse",
"owner": {
"login": "npm",
"id": 6078720,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6078720?v=4",
"html_url": "https:\/\/github.com\/npm"
},
"html_url": "https:\/\/github.com\/npm\/ansible-bashpocalypse",
"description": "Patch for CVE-2014-6271",
"fork": false,
"created_at": "2014-09-24T18:27:03Z",
"updated_at": "2019-11-15T20:59:42Z",
"pushed_at": "2014-09-24T19:03:14Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 5,
"forks": 5,
"watchers": 6,
"score": 0
},
{
"id": 24433228,
"name": "patched-bash-4.3",

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-07-10T17:17:21Z",
"updated_at": "2021-07-11T14:27:04Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1103,
"watchers_count": 1103,
"stargazers_count": 1104,
"watchers_count": 1104,
"forks_count": 245,
"forks": 245,
"watchers": 1103,
"watchers": 1104,
"score": 0
},
{

View file

@ -21,28 +21,5 @@
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 329959230,
"name": "poc_CVE-2016-6210",
"full_name": "ubrito\/poc_CVE-2016-6210",
"owner": {
"login": "ubrito",
"id": 13032912,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13032912?v=4",
"html_url": "https:\/\/github.com\/ubrito"
},
"html_url": "https:\/\/github.com\/ubrito\/poc_CVE-2016-6210",
"description": null,
"fork": false,
"created_at": "2021-01-15T16:05:09Z",
"updated_at": "2021-01-15T16:41:05Z",
"pushed_at": "2021-01-15T16:41:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-07-10T17:17:21Z",
"updated_at": "2021-07-11T14:27:04Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1103,
"watchers_count": 1103,
"stargazers_count": 1104,
"watchers_count": 1104,
"forks_count": 245,
"forks": 245,
"watchers": 1103,
"watchers": 1104,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)",
"fork": false,
"created_at": "2018-10-17T14:14:12Z",
"updated_at": "2021-06-14T16:47:22Z",
"updated_at": "2021-07-11T13:49:13Z",
"pushed_at": "2021-03-14T10:52:28Z",
"stargazers_count": 470,
"watchers_count": 470,
"stargazers_count": 471,
"watchers_count": 471,
"forks_count": 116,
"forks": 116,
"watchers": 470,
"watchers": 471,
"score": 0
},
{

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-07-10T17:17:21Z",
"updated_at": "2021-07-11T14:27:04Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1103,
"watchers_count": 1103,
"stargazers_count": 1104,
"watchers_count": 1104,
"forks_count": 245,
"forks": 245,
"watchers": 1103,
"watchers": 1104,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "POC for cve-2019-1458",
"fork": false,
"created_at": "2020-03-03T17:55:07Z",
"updated_at": "2021-07-05T06:50:32Z",
"updated_at": "2021-07-11T12:17:25Z",
"pushed_at": "2020-03-04T07:05:24Z",
"stargazers_count": 136,
"watchers_count": 136,
"stargazers_count": 137,
"watchers_count": 137,
"forks_count": 50,
"forks": 50,
"watchers": 136,
"watchers": 137,
"score": 0
},
{

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-07-10T17:17:21Z",
"updated_at": "2021-07-11T14:27:04Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1103,
"watchers_count": 1103,
"stargazers_count": 1104,
"watchers_count": 1104,
"forks_count": 245,
"forks": 245,
"watchers": 1103,
"watchers": 1104,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"pushed_at": "2019-02-19T11:45:13Z",
"stargazers_count": 518,
"watchers_count": 518,
"forks_count": 137,
"forks": 137,
"forks_count": 138,
"forks": 138,
"watchers": 518,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
"fork": false,
"created_at": "2019-02-12T06:02:06Z",
"updated_at": "2021-07-08T03:26:07Z",
"updated_at": "2021-07-11T10:11:01Z",
"pushed_at": "2019-05-09T21:34:26Z",
"stargazers_count": 582,
"watchers_count": 582,
"stargazers_count": 583,
"watchers_count": 583,
"forks_count": 144,
"forks": 144,
"watchers": 582,
"watchers": 583,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "macOS Kernel Exploit for CVE-2019-8781. Credit for the bug goes to @LinusHenze :)",
"fork": false,
"created_at": "2019-09-17T17:59:26Z",
"updated_at": "2021-07-08T09:10:43Z",
"updated_at": "2021-07-11T10:08:25Z",
"pushed_at": "2019-10-15T17:05:38Z",
"stargazers_count": 282,
"watchers_count": 282,
"stargazers_count": 284,
"watchers_count": 284,
"forks_count": 45,
"forks": 45,
"watchers": 282,
"watchers": 284,
"score": 0
},
{

View file

@ -841,13 +841,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2021-07-11T02:54:54Z",
"updated_at": "2021-07-11T12:24:33Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1133,
"watchers_count": 1133,
"stargazers_count": 1134,
"watchers_count": 1134,
"forks_count": 357,
"forks": 357,
"watchers": 1133,
"watchers": 1134,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
"fork": false,
"created_at": "2020-06-08T07:37:49Z",
"updated_at": "2021-07-08T15:33:32Z",
"updated_at": "2021-07-11T12:35:00Z",
"pushed_at": "2020-06-17T13:41:23Z",
"stargazers_count": 368,
"watchers_count": 368,
"stargazers_count": 369,
"watchers_count": 369,
"forks_count": 64,
"forks": 64,
"watchers": 368,
"watchers": 369,
"score": 0
},
{

View file

@ -13,8 +13,8 @@
"description": "Experimenting with the CVE-2020-14343 PyYAML vulnerability",
"fork": false,
"created_at": "2021-06-27T06:56:15Z",
"updated_at": "2021-07-11T04:20:46Z",
"pushed_at": "2021-07-11T04:20:44Z",
"updated_at": "2021-07-11T12:54:08Z",
"pushed_at": "2021-07-11T12:54:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -128,13 +128,13 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2021-07-10T12:13:49Z",
"updated_at": "2021-07-11T14:23:02Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 330,
"watchers_count": 330,
"forks_count": 102,
"forks": 102,
"watchers": 330,
"stargazers_count": 331,
"watchers_count": 331,
"forks_count": 103,
"forks": 103,
"watchers": 331,
"score": 0
},
{

View file

@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-07-11T04:43:40Z",
"updated_at": "2021-07-11T11:28:47Z",
"pushed_at": "2021-04-26T02:30:11Z",
"stargazers_count": 800,
"watchers_count": 800,
"stargazers_count": 801,
"watchers_count": 801,
"forks_count": 253,
"forks": 253,
"watchers": 800,
"watchers": 801,
"score": 0
}
]

View file

@ -596,5 +596,28 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 384971364,
"name": "CVE-2020-1938",
"full_name": "yukiNeko114514\/CVE-2020-1938",
"owner": {
"login": "yukiNeko114514",
"id": 83222283,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83222283?v=4",
"html_url": "https:\/\/github.com\/yukiNeko114514"
},
"html_url": "https:\/\/github.com\/yukiNeko114514\/CVE-2020-1938",
"description": "Scanner for CVE-2020-1938",
"fork": false,
"created_at": "2021-07-11T14:38:21Z",
"updated_at": "2021-07-11T14:41:14Z",
"pushed_at": "2021-07-11T14:41:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-07-10T17:17:21Z",
"updated_at": "2021-07-11T14:27:04Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1103,
"watchers_count": 1103,
"stargazers_count": 1104,
"watchers_count": 1104,
"forks_count": 245,
"forks": 245,
"watchers": 1103,
"watchers": 1104,
"score": 0
},
{

View file

@ -36,7 +36,7 @@
"description": "Automated bulk IP or domain scanner for CVE 2020 3580. Cisco ASA and FTD XSS hunter.",
"fork": false,
"created_at": "2021-06-28T06:51:26Z",
"updated_at": "2021-07-10T12:42:26Z",
"updated_at": "2021-07-11T12:14:30Z",
"pushed_at": "2021-07-10T12:42:24Z",
"stargazers_count": 3,
"watchers_count": 3,

View file

@ -36,13 +36,13 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2021-07-11T08:55:53Z",
"updated_at": "2021-07-11T14:10:40Z",
"pushed_at": "2021-07-08T11:10:36Z",
"stargazers_count": 1156,
"watchers_count": 1156,
"stargazers_count": 1159,
"watchers_count": 1159,
"forks_count": 413,
"forks": 413,
"watchers": 1156,
"watchers": 1159,
"score": 0
},
{
@ -220,13 +220,13 @@
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
"fork": false,
"created_at": "2021-07-01T23:45:58Z",
"updated_at": "2021-07-11T07:31:11Z",
"updated_at": "2021-07-11T10:41:35Z",
"pushed_at": "2021-07-05T08:54:06Z",
"stargazers_count": 469,
"watchers_count": 469,
"stargazers_count": 470,
"watchers_count": 470,
"forks_count": 122,
"forks": 122,
"watchers": 469,
"watchers": 470,
"score": 0
},
{
@ -519,13 +519,13 @@
"description": "CVE-2021-1675 (PrintNightmare)",
"fork": false,
"created_at": "2021-07-05T14:17:03Z",
"updated_at": "2021-07-10T16:56:40Z",
"updated_at": "2021-07-11T10:41:15Z",
"pushed_at": "2021-07-05T14:34:34Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 12,
"forks": 12,
"watchers": 40,
"watchers": 41,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2021-02-24T09:56:21Z",
"updated_at": "2021-06-30T13:31:11Z",
"updated_at": "2021-07-11T14:27:07Z",
"pushed_at": "2021-03-01T02:10:44Z",
"stargazers_count": 100,
"watchers_count": 100,
"stargazers_count": 101,
"watchers_count": 101,
"forks_count": 59,
"forks": 59,
"watchers": 100,
"watchers": 101,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "CVE-2021-21972 Exploit",
"fork": false,
"created_at": "2021-02-24T11:14:58Z",
"updated_at": "2021-07-05T16:10:41Z",
"updated_at": "2021-07-11T14:34:58Z",
"pushed_at": "2021-03-10T05:01:22Z",
"stargazers_count": 268,
"watchers_count": 268,
"stargazers_count": 269,
"watchers_count": 269,
"forks_count": 102,
"forks": 102,
"watchers": 268,
"watchers": 269,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.",
"fork": false,
"created_at": "2021-04-07T11:10:40Z",
"updated_at": "2021-07-08T10:34:46Z",
"updated_at": "2021-07-11T13:56:45Z",
"pushed_at": "2021-04-15T12:46:54Z",
"stargazers_count": 181,
"watchers_count": 181,
"stargazers_count": 182,
"watchers_count": 182,
"forks_count": 41,
"forks": 41,
"watchers": 181,
"watchers": 182,
"score": 0
}
]

View file

@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-07-11T04:43:40Z",
"updated_at": "2021-07-11T11:28:47Z",
"pushed_at": "2021-04-26T02:30:11Z",
"stargazers_count": 800,
"watchers_count": 800,
"stargazers_count": 801,
"watchers_count": 801,
"forks_count": 253,
"forks": 253,
"watchers": 800,
"watchers": 801,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-01-29T13:59:07Z",
"stargazers_count": 124,
"watchers_count": 124,
"forks_count": 29,
"forks": 29,
"forks_count": 30,
"forks": 30,
"watchers": 124,
"score": 0
},

View file

@ -887,13 +887,13 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
"updated_at": "2021-07-11T08:26:09Z",
"updated_at": "2021-07-11T11:42:02Z",
"pushed_at": "2021-07-05T13:29:56Z",
"stargazers_count": 329,
"watchers_count": 329,
"stargazers_count": 330,
"watchers_count": 330,
"forks_count": 58,
"forks": 58,
"watchers": 329,
"watchers": 330,
"score": 0
},
{
@ -1080,29 +1080,6 @@
"watchers": 0,
"score": 0
},
{
"id": 378544483,
"name": "docker-cve-2021-3156",
"full_name": "mrofisr\/docker-cve-2021-3156",
"owner": {
"login": "mrofisr",
"id": 31870041,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31870041?v=4",
"html_url": "https:\/\/github.com\/mrofisr"
},
"html_url": "https:\/\/github.com\/mrofisr\/docker-cve-2021-3156",
"description": null,
"fork": false,
"created_at": "2021-06-20T02:47:02Z",
"updated_at": "2021-06-20T02:47:02Z",
"pushed_at": "2021-06-20T02:47:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 380136612,
"name": "CVE-2021-3156",

View file

@ -220,13 +220,13 @@
"description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE",
"fork": false,
"created_at": "2021-07-05T20:13:49Z",
"updated_at": "2021-07-11T08:50:45Z",
"updated_at": "2021-07-11T12:46:50Z",
"pushed_at": "2021-07-09T15:49:23Z",
"stargazers_count": 517,
"watchers_count": 517,
"stargazers_count": 519,
"watchers_count": 519,
"forks_count": 59,
"forks": 59,
"watchers": 517,
"watchers": 519,
"score": 0
},
{

View file

@ -253,7 +253,6 @@ Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based
- [LiveOverflow/pwnedit](https://github.com/LiveOverflow/pwnedit)
- [ajtech-hue/CVE-2021-3156-Mitigation-ShellScript-Build](https://github.com/ajtech-hue/CVE-2021-3156-Mitigation-ShellScript-Build)
- [wuuconix/CVE-2021-3156-Dockerfile-not-succeed](https://github.com/wuuconix/CVE-2021-3156-Dockerfile-not-succeed)
- [mrofisr/docker-cve-2021-3156](https://github.com/mrofisr/docker-cve-2021-3156)
- [donghyunlee00/CVE-2021-3156](https://github.com/donghyunlee00/CVE-2021-3156)
- [TheFlash2k/CVE-2021-3156](https://github.com/TheFlash2k/CVE-2021-3156)
@ -2242,6 +2241,7 @@ When using the Apache JServ Protocol (AJP), care must be taken when trusting inc
- [YU5Z8X2CvH1fv4ep/CVE-2020-1938-MSF-MODULE](https://github.com/YU5Z8X2CvH1fv4ep/CVE-2020-1938-MSF-MODULE)
- [Hancheng-Lei/Hacking-Vulnerability-CVE-2020-1938-Ghostcat](https://github.com/Hancheng-Lei/Hacking-Vulnerability-CVE-2020-1938-Ghostcat)
- [streghstreek/CVE-2020-1938](https://github.com/streghstreek/CVE-2020-1938)
- [yukiNeko114514/CVE-2020-1938](https://github.com/yukiNeko114514/CVE-2020-1938)
### CVE-2020-1947 (2020-03-11)
@ -15927,7 +15927,6 @@ sshd in OpenSSH before 7.3, when SHA256 or SHA512 are used for user password has
</code>
- [justlce/CVE-2016-6210-Exploit](https://github.com/justlce/CVE-2016-6210-Exploit)
- [ubrito/poc_CVE-2016-6210](https://github.com/ubrito/poc_CVE-2016-6210)
### CVE-2016-6271 (2017-01-18)
@ -17322,7 +17321,6 @@ The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14
</code>
- [SunRain/CVE-2014-0196](https://github.com/SunRain/CVE-2014-0196)
- [tempbottle/CVE-2014-0196](https://github.com/tempbottle/CVE-2014-0196)
### CVE-2014-0224 (2014-06-05)
@ -17331,10 +17329,7 @@ OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not pr
</code>
- [Tripwire/OpenSSL-CCS-Inject-Test](https://github.com/Tripwire/OpenSSL-CCS-Inject-Test)
- [iph0n3/CVE-2014-0224](https://github.com/iph0n3/CVE-2014-0224)
- [droptables/ccs-eval](https://github.com/droptables/ccs-eval)
- [ssllabs/openssl-ccs-cve-2014-0224](https://github.com/ssllabs/openssl-ccs-cve-2014-0224)
- [secretnonempty/CVE-2014-0224](https://github.com/secretnonempty/CVE-2014-0224)
### CVE-2014-0226 (2014-07-20)
@ -17363,14 +17358,6 @@ The django.core.urlresolvers.reverse function in Django before 1.4.11, 1.5.x bef
- [christasa/CVE-2014-0472](https://github.com/christasa/CVE-2014-0472)
### CVE-2014-0521 (2014-05-14)
<code>
Adobe Reader and Acrobat 10.x before 10.1.10 and 11.x before 11.0.07 on Windows and OS X do not properly implement JavaScript APIs, which allows remote attackers to obtain sensitive information via a crafted PDF document.
</code>
- [molnarg/cve-2014-0521](https://github.com/molnarg/cve-2014-0521)
### CVE-2014-0816 (2014-02-26)
<code>
@ -17425,14 +17412,6 @@ Race condition in the virNetServerClientStartKeepAlive function in libvirt befor
- [tagatac/libvirt-CVE-2014-1447](https://github.com/tagatac/libvirt-CVE-2014-1447)
### CVE-2014-1677 (2017-04-03)
<code>
Technicolor TC7200 with firmware STD6.01.12 could allow remote attackers to obtain sensitive information.
</code>
- [tihmstar/freePW_tc7200Eploit](https://github.com/tihmstar/freePW_tc7200Eploit)
### CVE-2014-1773 (2014-06-10)
<code>
@ -17497,7 +17476,6 @@ The default configuration in Elasticsearch before 1.2 enables dynamic scripting,
</code>
- [jeffgeiger/es_inject](https://github.com/jeffgeiger/es_inject)
- [echohtp/ElasticSearch-CVE-2014-3120](https://github.com/echohtp/ElasticSearch-CVE-2014-3120)
### CVE-2014-3153 (2014-06-07)
@ -17729,8 +17707,6 @@ host-deny.sh in OSSEC before 2.8.1 writes to temporary files with predictable fi
GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka &quot;ShellShock.&quot; NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
</code>
- [dlitz/bash-cve-2014-6271-fixes](https://github.com/dlitz/bash-cve-2014-6271-fixes)
- [npm/ansible-bashpocalypse](https://github.com/npm/ansible-bashpocalypse)
- [ryancnelson/patched-bash-4.3](https://github.com/ryancnelson/patched-bash-4.3)
- [jblaine/cookbook-bash-CVE-2014-6271](https://github.com/jblaine/cookbook-bash-CVE-2014-6271)
- [rrreeeyyy/cve-2014-6271-spec](https://github.com/rrreeeyyy/cve-2014-6271-spec)