Auto Update 2021/06/22 06:12:41

This commit is contained in:
motikan2010-bot 2021-06-22 06:12:41 +09:00
parent 225fb0361f
commit d4dd6649bc
22 changed files with 86 additions and 86 deletions

View file

@ -13,13 +13,13 @@
"description": "CVE-2007-2447 - Samba usermap script",
"fork": false,
"created_at": "2018-08-03T18:39:56Z",
"updated_at": "2021-04-12T17:56:59Z",
"updated_at": "2021-06-21T18:39:16Z",
"pushed_at": "2020-08-16T18:54:38Z",
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 16,
"forks": 16,
"watchers": 23,
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 17,
"forks": 17,
"watchers": 24,
"score": 0
},
{

View file

@ -155,8 +155,8 @@
"pushed_at": "2017-04-22T11:35:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},

View file

@ -358,13 +358,13 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2021-06-19T04:52:41Z",
"updated_at": "2021-06-21T16:18:56Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 276,
"watchers_count": 276,
"stargazers_count": 277,
"watchers_count": 277,
"forks_count": 99,
"forks": 99,
"watchers": 276,
"watchers": 277,
"score": 0
},
{

View file

@ -86,8 +86,8 @@
"pushed_at": "2017-05-11T13:52:12Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2017-07-10T23:37:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},

View file

@ -63,8 +63,8 @@
"pushed_at": "2019-10-22T07:08:19Z",
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 12,
"forks": 12,
"forks_count": 13,
"forks": 13,
"watchers": 23,
"score": 0
}

View file

@ -17,8 +17,8 @@
"pushed_at": "2017-08-25T13:04:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
}

View file

@ -17,8 +17,8 @@
"pushed_at": "2017-08-23T09:09:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-01-23T06:53:00Z",
"stargazers_count": 259,
"watchers_count": 259,
"forks_count": 111,
"forks": 111,
"forks_count": 112,
"forks": 112,
"watchers": 259,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-08-13T15:06:28Z",
"stargazers_count": 133,
"watchers_count": 133,
"forks_count": 55,
"forks": 55,
"forks_count": 56,
"forks": 56,
"watchers": 133,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "CVE-2018-4280: Mach port replacement vulnerability in launchd on iOS 11.2.6 leading to sandbox escape, privilege escalation, and codesigning bypass.",
"fork": false,
"created_at": "2018-02-23T00:19:05Z",
"updated_at": "2021-06-14T19:24:36Z",
"updated_at": "2021-06-21T20:23:07Z",
"pushed_at": "2018-11-13T00:26:18Z",
"stargazers_count": 220,
"watchers_count": 220,
"stargazers_count": 221,
"watchers_count": 221,
"forks_count": 40,
"forks": 40,
"watchers": 220,
"watchers": 221,
"score": 0
}
]

View file

@ -1236,8 +1236,8 @@
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 817,
"watchers_count": 817,
"forks_count": 207,
"forks": 207,
"forks_count": 208,
"forks": 208,
"watchers": 817,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2021-06-19T04:52:41Z",
"updated_at": "2021-06-21T16:18:56Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 276,
"watchers_count": 276,
"stargazers_count": 277,
"watchers_count": 277,
"forks_count": 99,
"forks": 99,
"watchers": 276,
"watchers": 277,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Root your MediaTek arm64 device using mtk-su (CVE-2020-0069).",
"fork": false,
"created_at": "2019-09-06T12:12:48Z",
"updated_at": "2021-06-09T23:27:40Z",
"updated_at": "2021-06-21T15:55:16Z",
"pushed_at": "2021-05-31T21:22:33Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 11,
"forks": 11,
"watchers": 61,
"watchers": 62,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2021-06-18T03:31:02Z",
"updated_at": "2021-06-21T16:59:33Z",
"pushed_at": "2020-10-21T12:10:28Z",
"stargazers_count": 1296,
"watchers_count": 1296,
"forks_count": 296,
"forks": 296,
"watchers": 1296,
"stargazers_count": 1297,
"watchers_count": 1297,
"forks_count": 297,
"forks": 297,
"watchers": 1297,
"score": 0
},
{
@ -128,13 +128,13 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2021-06-20T09:37:34Z",
"updated_at": "2021-06-21T17:37:40Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 317,
"watchers_count": 317,
"forks_count": 101,
"forks": 101,
"watchers": 317,
"stargazers_count": 318,
"watchers_count": 318,
"forks_count": 102,
"forks": 102,
"watchers": 318,
"score": 0
},
{
@ -519,13 +519,13 @@
"description": "Test script for CVE-2020-1472 for both RPC\/TCP and RPC\/SMB",
"fork": false,
"created_at": "2020-09-17T16:53:17Z",
"updated_at": "2021-05-20T16:30:01Z",
"updated_at": "2021-06-21T17:28:30Z",
"pushed_at": "2021-06-18T18:44:06Z",
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 7,
"forks": 7,
"watchers": 42,
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 8,
"forks": 8,
"watchers": 43,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": "Determine the Version Running on the Palo Alto Network Firewall for the Global Protect Portal",
"fork": false,
"created_at": "2020-08-08T14:19:44Z",
"updated_at": "2021-01-03T06:31:44Z",
"updated_at": "2021-06-21T19:34:44Z",
"pushed_at": "2020-08-14T09:24:34Z",
"stargazers_count": 2,
"watchers_count": 2,

View file

@ -13,13 +13,13 @@
"description": "BuddyPress is an open source WordPress plugin to build a community site. In releases of BuddyPress from 5.0.0 before 7.2.1 it's possible for a non-privileged, regular user to obtain administrator rights by exploiting an issue in the REST API members endpoint. The vulnerability has been fixed in BuddyPress 7.2.1. Existing installations of the plugin should be updated to this version to mitigate the issue.",
"fork": false,
"created_at": "2021-05-31T14:12:26Z",
"updated_at": "2021-06-16T10:23:08Z",
"updated_at": "2021-06-21T17:40:36Z",
"pushed_at": "2021-05-31T14:16:20Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 6,
"forks": 6,
"watchers": 9,
"watchers": 10,
"score": 0
}
]

View file

@ -105,13 +105,13 @@
"description": "CVE-2021-21985 VMware vCenter Server远程代码执行漏洞 EXP (更新可回显EXP)",
"fork": false,
"created_at": "2021-06-03T09:59:21Z",
"updated_at": "2021-06-21T05:14:30Z",
"updated_at": "2021-06-21T16:51:23Z",
"pushed_at": "2021-06-09T10:13:56Z",
"stargazers_count": 221,
"watchers_count": 221,
"stargazers_count": 222,
"watchers_count": 222,
"forks_count": 37,
"forks": 37,
"watchers": 221,
"watchers": 222,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Cross Site Scripting (XSS) at the \"Reset Password\" page form of Priority Enterprise Management System v8.00 allows attackers to execute javascript on behalf of the victim by sending a malicious URL or directing the victim to a malicious site.",
"fork": false,
"created_at": "2021-04-13T04:25:31Z",
"updated_at": "2021-06-21T14:07:29Z",
"updated_at": "2021-06-21T19:18:40Z",
"pushed_at": "2021-04-13T04:26:25Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
"fork": false,
"created_at": "2021-05-16T16:15:56Z",
"updated_at": "2021-06-21T08:48:41Z",
"updated_at": "2021-06-21T15:41:14Z",
"pushed_at": "2021-06-12T08:27:09Z",
"stargazers_count": 738,
"watchers_count": 738,
"stargazers_count": 739,
"watchers_count": 739,
"forks_count": 119,
"forks": 119,
"watchers": 738,
"watchers": 739,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exploit for CVE-2021-3129",
"fork": false,
"created_at": "2021-01-13T12:52:20Z",
"updated_at": "2021-06-21T04:57:41Z",
"updated_at": "2021-06-21T18:02:56Z",
"pushed_at": "2021-01-29T13:59:07Z",
"stargazers_count": 120,
"watchers_count": 120,
"stargazers_count": 121,
"watchers_count": 121,
"forks_count": 28,
"forks": 28,
"watchers": 120,
"watchers": 121,
"score": 0
},
{

View file

@ -59,8 +59,8 @@
"description": "a reliable C based exploit for CVE-2021-3560.",
"fork": false,
"created_at": "2021-06-12T05:22:35Z",
"updated_at": "2021-06-19T20:19:56Z",
"pushed_at": "2021-06-12T15:58:11Z",
"updated_at": "2021-06-21T19:17:37Z",
"pushed_at": "2021-06-21T19:17:34Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 0,
@ -105,13 +105,13 @@
"description": null,
"fork": false,
"created_at": "2021-06-14T20:08:20Z",
"updated_at": "2021-06-21T15:08:44Z",
"pushed_at": "2021-06-21T15:08:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2021-06-21T16:52:08Z",
"pushed_at": "2021-06-21T15:35:52Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{