Auto Update 2021/10/08 12:12:49

This commit is contained in:
motikan2010-bot 2021-10-08 12:12:49 +09:00
parent a1eb3c09a3
commit d79eb458eb
36 changed files with 385 additions and 205 deletions

View file

@ -13,17 +13,17 @@
"description": "Simple uc httpd exploit made with py3.. this exploit was written from CVE-2014-2324", "description": "Simple uc httpd exploit made with py3.. this exploit was written from CVE-2014-2324",
"fork": false, "fork": false,
"created_at": "2017-12-30T17:46:39Z", "created_at": "2017-12-30T17:46:39Z",
"updated_at": "2021-03-27T22:22:06Z", "updated_at": "2021-10-07T22:42:32Z",
"pushed_at": "2017-12-31T12:39:05Z", "pushed_at": "2017-12-31T12:39:05Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 0, "watchers": 1,
"score": 0 "score": 0
} }
] ]

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-10-07T08:02:02Z", "updated_at": "2021-10-08T02:05:52Z",
"pushed_at": "2020-11-27T15:10:58Z", "pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1186, "stargazers_count": 1187,
"watchers_count": 1186, "watchers_count": 1187,
"forks_count": 264, "forks_count": 264,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -71,7 +71,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 264, "forks": 264,
"watchers": 1186, "watchers": 1187,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-10-07T08:02:02Z", "updated_at": "2021-10-08T02:05:52Z",
"pushed_at": "2020-11-27T15:10:58Z", "pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1186, "stargazers_count": 1187,
"watchers_count": 1186, "watchers_count": 1187,
"forks_count": 264, "forks_count": 264,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -44,7 +44,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 264, "forks": 264,
"watchers": 1186, "watchers": 1187,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,17 +13,17 @@
"description": "Exploitation Tool for CVE-2017-3066 targeting Adobe Coldfusion 11\/12", "description": "Exploitation Tool for CVE-2017-3066 targeting Adobe Coldfusion 11\/12",
"fork": false, "fork": false,
"created_at": "2018-03-12T16:44:12Z", "created_at": "2018-03-12T16:44:12Z",
"updated_at": "2021-09-19T10:51:34Z", "updated_at": "2021-10-08T03:01:55Z",
"pushed_at": "2018-03-12T16:50:20Z", "pushed_at": "2018-03-12T16:50:20Z",
"stargazers_count": 63, "stargazers_count": 64,
"watchers_count": 63, "watchers_count": 64,
"forks_count": 24, "forks_count": 24,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 24, "forks": 24,
"watchers": 63, "watchers": 64,
"score": 0 "score": 0
}, },
{ {

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-10-07T08:02:02Z", "updated_at": "2021-10-08T02:05:52Z",
"pushed_at": "2020-11-27T15:10:58Z", "pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1186, "stargazers_count": 1187,
"watchers_count": 1186, "watchers_count": 1187,
"forks_count": 264, "forks_count": 264,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -71,7 +71,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 264, "forks": 264,
"watchers": 1186, "watchers": 1187,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,17 +13,17 @@
"description": "POC for CVE-2018-0824", "description": "POC for CVE-2018-0824",
"fork": false, "fork": false,
"created_at": "2018-06-15T08:59:37Z", "created_at": "2018-06-15T08:59:37Z",
"updated_at": "2021-09-05T21:29:42Z", "updated_at": "2021-10-08T03:01:39Z",
"pushed_at": "2018-06-25T07:13:36Z", "pushed_at": "2018-06-25T07:13:36Z",
"stargazers_count": 76, "stargazers_count": 77,
"watchers_count": 76, "watchers_count": 77,
"forks_count": 35, "forks_count": 36,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 35, "forks": 36,
"watchers": 76, "watchers": 77,
"score": 0 "score": 0
} }
] ]

View file

@ -530,10 +530,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-10-07T08:02:02Z", "updated_at": "2021-10-08T02:05:52Z",
"pushed_at": "2020-11-27T15:10:58Z", "pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1186, "stargazers_count": 1187,
"watchers_count": 1186, "watchers_count": 1187,
"forks_count": 264, "forks_count": 264,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -561,7 +561,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 264, "forks": 264,
"watchers": 1186, "watchers": 1187,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,17 +13,17 @@
"description": "The SSC REST API contains Insecure Direct Object Reference (IDOR) vulnerabilities in Fortify Software Security Center (SSC) 17.10, 17.20 & 18.10 ", "description": "The SSC REST API contains Insecure Direct Object Reference (IDOR) vulnerabilities in Fortify Software Security Center (SSC) 17.10, 17.20 & 18.10 ",
"fork": false, "fork": false,
"created_at": "2018-11-26T13:52:45Z", "created_at": "2018-11-26T13:52:45Z",
"updated_at": "2021-07-01T06:37:32Z", "updated_at": "2021-10-08T02:56:59Z",
"pushed_at": "2018-12-15T11:14:25Z", "pushed_at": "2018-12-15T11:14:25Z",
"stargazers_count": 1, "stargazers_count": 2,
"watchers_count": 1, "watchers_count": 2,
"forks_count": 0, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 1,
"watchers": 1, "watchers": 2,
"score": 0 "score": 0
} }
] ]

View file

@ -13,17 +13,17 @@
"description": "The SSC REST API contains Insecure Direct Object Reference (IDOR) vulnerabilities in Fortify Software Security Center (SSC) 17.10, 17.20 & 18.10 ", "description": "The SSC REST API contains Insecure Direct Object Reference (IDOR) vulnerabilities in Fortify Software Security Center (SSC) 17.10, 17.20 & 18.10 ",
"fork": false, "fork": false,
"created_at": "2018-11-26T13:54:08Z", "created_at": "2018-11-26T13:54:08Z",
"updated_at": "2021-07-01T06:37:26Z", "updated_at": "2021-10-08T02:56:38Z",
"pushed_at": "2018-12-15T11:18:54Z", "pushed_at": "2018-12-15T11:18:54Z",
"stargazers_count": 1, "stargazers_count": 2,
"watchers_count": 1, "watchers_count": 2,
"forks_count": 0, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 1,
"watchers": 1, "watchers": 2,
"score": 0 "score": 0
} }
] ]

View file

@ -13,17 +13,17 @@
"description": "A Reflected Cross Site Scripting (XSS) Vulnerability was discovered in Print Archive System v2015 release 2.6", "description": "A Reflected Cross Site Scripting (XSS) Vulnerability was discovered in Print Archive System v2015 release 2.6",
"fork": false, "fork": false,
"created_at": "2019-04-02T12:50:46Z", "created_at": "2019-04-02T12:50:46Z",
"updated_at": "2021-07-01T06:37:23Z", "updated_at": "2021-10-08T02:56:50Z",
"pushed_at": "2019-05-07T11:50:39Z", "pushed_at": "2019-05-07T11:50:39Z",
"stargazers_count": 3, "stargazers_count": 4,
"watchers_count": 3, "watchers_count": 4,
"forks_count": 0, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 1,
"watchers": 3, "watchers": 4,
"score": 0 "score": 0
} }
] ]

View file

@ -40,11 +40,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false, "fork": false,
"created_at": "2020-04-01T09:33:35Z", "created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-10-06T15:18:35Z", "updated_at": "2021-10-08T01:51:23Z",
"pushed_at": "2021-04-04T09:13:57Z", "pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2905, "stargazers_count": 2906,
"watchers_count": 2905, "watchers_count": 2906,
"forks_count": 852, "forks_count": 853,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [ "topics": [
@ -69,8 +69,8 @@
"webshell" "webshell"
], ],
"visibility": "public", "visibility": "public",
"forks": 852, "forks": 853,
"watchers": 2905, "watchers": 2906,
"score": 0 "score": 0
}, },
{ {

View file

@ -175,10 +175,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-10-07T08:02:02Z", "updated_at": "2021-10-08T02:05:52Z",
"pushed_at": "2020-11-27T15:10:58Z", "pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1186, "stargazers_count": 1187,
"watchers_count": 1186, "watchers_count": 1187,
"forks_count": 264, "forks_count": 264,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -206,7 +206,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 264, "forks": 264,
"watchers": 1186, "watchers": 1187,
"score": 0 "score": 0
} }
] ]

View file

@ -13,10 +13,10 @@
"description": "Root your MediaTek arm64 device using mtk-su (CVE-2020-0069).", "description": "Root your MediaTek arm64 device using mtk-su (CVE-2020-0069).",
"fork": false, "fork": false,
"created_at": "2019-09-06T12:12:48Z", "created_at": "2019-09-06T12:12:48Z",
"updated_at": "2021-10-04T20:30:41Z", "updated_at": "2021-10-08T02:01:55Z",
"pushed_at": "2021-05-31T21:22:33Z", "pushed_at": "2021-05-31T21:22:33Z",
"stargazers_count": 70, "stargazers_count": 71,
"watchers_count": 70, "watchers_count": 71,
"forks_count": 12, "forks_count": 12,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -28,7 +28,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 12, "forks": 12,
"watchers": 70, "watchers": 71,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,17 +13,17 @@
"description": "Support ALL Windows Version", "description": "Support ALL Windows Version",
"fork": false, "fork": false,
"created_at": "2020-06-16T08:57:51Z", "created_at": "2020-06-16T08:57:51Z",
"updated_at": "2021-10-07T13:12:38Z", "updated_at": "2021-10-08T02:27:56Z",
"pushed_at": "2020-09-11T07:38:22Z", "pushed_at": "2020-09-11T07:38:22Z",
"stargazers_count": 565, "stargazers_count": 566,
"watchers_count": 565, "watchers_count": 566,
"forks_count": 143, "forks_count": 143,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 143, "forks": 143,
"watchers": 565, "watchers": 566,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,17 +13,17 @@
"description": "CVE-2020-13457", "description": "CVE-2020-13457",
"fork": false, "fork": false,
"created_at": "2020-06-01T13:27:11Z", "created_at": "2020-06-01T13:27:11Z",
"updated_at": "2021-07-01T06:37:22Z", "updated_at": "2021-10-08T02:46:13Z",
"pushed_at": "2020-06-01T13:35:16Z", "pushed_at": "2020-06-01T13:35:16Z",
"stargazers_count": 1, "stargazers_count": 2,
"watchers_count": 1, "watchers_count": 2,
"forks_count": 0, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 1,
"watchers": 1, "watchers": 2,
"score": 0 "score": 0
} }
] ]

View file

@ -13,11 +13,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false, "fork": false,
"created_at": "2020-04-01T09:33:35Z", "created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-10-06T15:18:35Z", "updated_at": "2021-10-08T01:51:23Z",
"pushed_at": "2021-04-04T09:13:57Z", "pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2905, "stargazers_count": 2906,
"watchers_count": 2905, "watchers_count": 2906,
"forks_count": 852, "forks_count": 853,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [ "topics": [
@ -42,8 +42,8 @@
"webshell" "webshell"
], ],
"visibility": "public", "visibility": "public",
"forks": 852, "forks": 853,
"watchers": 2905, "watchers": 2906,
"score": 0 "score": 0
}, },
{ {

View file

@ -94,17 +94,17 @@
"description": "[CVE-2020-1948] Apache Dubbo Provider default deserialization cause RCE", "description": "[CVE-2020-1948] Apache Dubbo Provider default deserialization cause RCE",
"fork": false, "fork": false,
"created_at": "2020-07-14T02:42:41Z", "created_at": "2020-07-14T02:42:41Z",
"updated_at": "2021-04-12T09:08:27Z", "updated_at": "2021-10-07T23:36:52Z",
"pushed_at": "2021-09-08T20:31:12Z", "pushed_at": "2021-09-08T20:31:12Z",
"stargazers_count": 10, "stargazers_count": 11,
"watchers_count": 10, "watchers_count": 11,
"forks_count": 5, "forks_count": 5,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 5, "forks": 5,
"watchers": 10, "watchers": 11,
"score": 0 "score": 0
} }
] ]

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-10-07T08:02:02Z", "updated_at": "2021-10-08T02:05:52Z",
"pushed_at": "2020-11-27T15:10:58Z", "pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1186, "stargazers_count": 1187,
"watchers_count": 1186, "watchers_count": 1187,
"forks_count": 264, "forks_count": 264,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -44,7 +44,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 264, "forks": 264,
"watchers": 1186, "watchers": 1187,
"score": 0 "score": 0
}, },
{ {

View file

@ -274,17 +274,17 @@
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)", "description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
"fork": false, "fork": false,
"created_at": "2021-07-01T23:45:58Z", "created_at": "2021-07-01T23:45:58Z",
"updated_at": "2021-10-07T13:04:21Z", "updated_at": "2021-10-08T02:13:21Z",
"pushed_at": "2021-07-05T08:54:06Z", "pushed_at": "2021-07-05T08:54:06Z",
"stargazers_count": 637, "stargazers_count": 642,
"watchers_count": 637, "watchers_count": 642,
"forks_count": 171, "forks_count": 171,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 171, "forks": 171,
"watchers": 637, "watchers": 642,
"score": 0 "score": 0
}, },
{ {
@ -720,17 +720,17 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2021-07-11T03:48:25Z", "created_at": "2021-07-11T03:48:25Z",
"updated_at": "2021-10-07T06:04:11Z", "updated_at": "2021-10-08T02:26:42Z",
"pushed_at": "2021-07-11T03:49:44Z", "pushed_at": "2021-07-11T03:49:44Z",
"stargazers_count": 11, "stargazers_count": 12,
"watchers_count": 11, "watchers_count": 12,
"forks_count": 1, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 2,
"watchers": 11, "watchers": 12,
"score": 0 "score": 0
}, },
{ {
@ -882,17 +882,17 @@
"description": "Python implementation for PrintNightmare (CVE-2021-1675 \/ CVE-2021-34527)", "description": "Python implementation for PrintNightmare (CVE-2021-1675 \/ CVE-2021-34527)",
"fork": false, "fork": false,
"created_at": "2021-09-26T13:53:10Z", "created_at": "2021-09-26T13:53:10Z",
"updated_at": "2021-10-07T20:21:28Z", "updated_at": "2021-10-08T02:59:46Z",
"pushed_at": "2021-09-26T13:58:18Z", "pushed_at": "2021-09-26T13:58:18Z",
"stargazers_count": 47, "stargazers_count": 48,
"watchers_count": 47, "watchers_count": 48,
"forks_count": 10, "forks_count": 11,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 10, "forks": 11,
"watchers": 47, "watchers": 48,
"score": 0 "score": 0
}, },
{ {

View file

@ -194,17 +194,17 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2021-02-25T05:10:06Z", "created_at": "2021-02-25T05:10:06Z",
"updated_at": "2021-07-01T06:37:16Z", "updated_at": "2021-10-08T02:42:21Z",
"pushed_at": "2021-02-25T05:49:19Z", "pushed_at": "2021-02-25T05:49:19Z",
"stargazers_count": 52, "stargazers_count": 53,
"watchers_count": 52, "watchers_count": 53,
"forks_count": 12, "forks_count": 13,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 12, "forks": 13,
"watchers": 52, "watchers": 53,
"score": 0 "score": 0
}, },
{ {
@ -711,10 +711,10 @@
"description": "CVE-2021-21972 ᴠᴍᴡᴀʀᴇ ᴄʟɪᴇɴᴛ ᴜɴᴀᴜᴛʜᴏʀɪᴢᴇᴅ ᴄᴏᴅᴇ ɪɴᴊᴇᴄᴛɪᴏɴ (ʀᴄᴇ)", "description": "CVE-2021-21972 ᴠᴍᴡᴀʀᴇ ᴄʟɪᴇɴᴛ ᴜɴᴀᴜᴛʜᴏʀɪᴢᴇᴅ ᴄᴏᴅᴇ ɪɴᴊᴇᴄᴛɪᴏɴ (ʀᴄᴇ)",
"fork": false, "fork": false,
"created_at": "2021-10-03T23:03:11Z", "created_at": "2021-10-03T23:03:11Z",
"updated_at": "2021-10-04T12:45:32Z", "updated_at": "2021-10-07T23:45:50Z",
"pushed_at": "2021-10-03T23:10:21Z", "pushed_at": "2021-10-03T23:10:21Z",
"stargazers_count": 3, "stargazers_count": 4,
"watchers_count": 3, "watchers_count": 4,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -726,7 +726,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 3, "watchers": 4,
"score": 0 "score": 0
} }
] ]

View file

@ -40,17 +40,17 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2021-05-29T13:07:14Z", "created_at": "2021-05-29T13:07:14Z",
"updated_at": "2021-09-25T22:50:20Z", "updated_at": "2021-10-08T02:43:10Z",
"pushed_at": "2021-06-03T21:29:39Z", "pushed_at": "2021-06-03T21:29:39Z",
"stargazers_count": 173, "stargazers_count": 174,
"watchers_count": 173, "watchers_count": 174,
"forks_count": 42, "forks_count": 43,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 42, "forks": 43,
"watchers": 173, "watchers": 174,
"score": 0 "score": 0
}, },
{ {

View file

@ -121,17 +121,17 @@
"description": "CVE-2021-22005 - VMWare vCenter Server File Upload to RCE", "description": "CVE-2021-22005 - VMWare vCenter Server File Upload to RCE",
"fork": false, "fork": false,
"created_at": "2021-09-25T16:21:56Z", "created_at": "2021-09-25T16:21:56Z",
"updated_at": "2021-10-07T04:44:07Z", "updated_at": "2021-10-08T00:41:04Z",
"pushed_at": "2021-10-02T03:17:45Z", "pushed_at": "2021-10-02T03:17:45Z",
"stargazers_count": 90, "stargazers_count": 91,
"watchers_count": 90, "watchers_count": 91,
"forks_count": 23, "forks_count": 23,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 23, "forks": 23,
"watchers": 90, "watchers": 91,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,17 +13,17 @@
"description": "Gitlab CI Lint API未授权 SSRF漏洞 (CVE-2021-22214)", "description": "Gitlab CI Lint API未授权 SSRF漏洞 (CVE-2021-22214)",
"fork": false, "fork": false,
"created_at": "2021-06-22T03:04:50Z", "created_at": "2021-06-22T03:04:50Z",
"updated_at": "2021-08-15T20:05:57Z", "updated_at": "2021-10-08T02:53:43Z",
"pushed_at": "2021-06-22T04:35:08Z", "pushed_at": "2021-06-22T04:35:08Z",
"stargazers_count": 10, "stargazers_count": 11,
"watchers_count": 10, "watchers_count": 11,
"forks_count": 5, "forks_count": 5,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 5, "forks": 5,
"watchers": 10, "watchers": 11,
"score": 0 "score": 0
}, },
{ {

View file

@ -67,10 +67,10 @@
"description": "Proof On Concept — Pulse Secure CVE-2021-22893", "description": "Proof On Concept — Pulse Secure CVE-2021-22893",
"fork": false, "fork": false,
"created_at": "2021-10-03T21:46:58Z", "created_at": "2021-10-03T21:46:58Z",
"updated_at": "2021-10-04T12:45:40Z", "updated_at": "2021-10-07T22:26:24Z",
"pushed_at": "2021-10-03T21:50:34Z", "pushed_at": "2021-10-03T21:50:34Z",
"stargazers_count": 2, "stargazers_count": 3,
"watchers_count": 2, "watchers_count": 3,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -81,7 +81,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 2, "watchers": 3,
"score": 0 "score": 0
} }
] ]

View file

@ -94,17 +94,17 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2021-02-13T11:48:35Z", "created_at": "2021-02-13T11:48:35Z",
"updated_at": "2021-10-07T04:56:20Z", "updated_at": "2021-10-08T01:59:38Z",
"pushed_at": "2021-06-10T17:24:55Z", "pushed_at": "2021-06-10T17:24:55Z",
"stargazers_count": 2, "stargazers_count": 3,
"watchers_count": 2, "watchers_count": 3,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 2, "watchers": 3,
"score": 0 "score": 0
}, },
{ {

View file

@ -67,17 +67,17 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2021-08-31T23:33:44Z", "created_at": "2021-08-31T23:33:44Z",
"updated_at": "2021-09-22T10:22:48Z", "updated_at": "2021-10-08T02:42:00Z",
"pushed_at": "2021-09-01T01:01:06Z", "pushed_at": "2021-09-01T01:01:06Z",
"stargazers_count": 44, "stargazers_count": 45,
"watchers_count": 44, "watchers_count": 45,
"forks_count": 13, "forks_count": 14,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 13, "forks": 14,
"watchers": 44, "watchers": 45,
"score": 0 "score": 0
}, },
{ {
@ -889,5 +889,32 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0 "score": 0
},
{
"id": 414400971,
"name": "CVE-2021-26084",
"full_name": "oxctdev\/CVE-2021-26084",
"owner": {
"login": "oxctdev",
"id": 91846073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
"html_url": "https:\/\/github.com\/oxctdev"
},
"html_url": "https:\/\/github.com\/oxctdev\/CVE-2021-26084",
"description": "CVE-2021-26084 - Confluence Server Webwork OGNL injection ",
"fork": false,
"created_at": "2021-10-06T23:24:24Z",
"updated_at": "2021-10-07T23:16:55Z",
"pushed_at": "2021-10-06T23:25:50Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0
} }
] ]

View file

@ -13,17 +13,17 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2021-03-01T16:45:42Z", "created_at": "2021-03-01T16:45:42Z",
"updated_at": "2021-09-22T18:19:16Z", "updated_at": "2021-10-08T02:40:50Z",
"pushed_at": "2021-03-02T07:45:20Z", "pushed_at": "2021-03-02T07:45:20Z",
"stargazers_count": 34, "stargazers_count": 35,
"watchers_count": 34, "watchers_count": 35,
"forks_count": 5, "forks_count": 6,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 5, "forks": 6,
"watchers": 34, "watchers": 35,
"score": 0 "score": 0
} }
] ]

View file

@ -13,17 +13,17 @@
"description": "Exploit for CVE-2021-3129", "description": "Exploit for CVE-2021-3129",
"fork": false, "fork": false,
"created_at": "2021-01-13T12:52:20Z", "created_at": "2021-01-13T12:52:20Z",
"updated_at": "2021-10-06T11:30:14Z", "updated_at": "2021-10-07T23:46:38Z",
"pushed_at": "2021-01-29T13:59:07Z", "pushed_at": "2021-01-29T13:59:07Z",
"stargazers_count": 149, "stargazers_count": 150,
"watchers_count": 149, "watchers_count": 150,
"forks_count": 41, "forks_count": 41,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 41, "forks": 41,
"watchers": 149, "watchers": 150,
"score": 0 "score": 0
}, },
{ {
@ -183,12 +183,12 @@
"pushed_at": "2021-09-09T01:09:31Z", "pushed_at": "2021-09-09T01:09:31Z",
"stargazers_count": 48, "stargazers_count": 48,
"watchers_count": 48, "watchers_count": 48,
"forks_count": 24, "forks_count": 25,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 24, "forks": 25,
"watchers": 48, "watchers": 48,
"score": 0 "score": 0
}, },

View file

@ -13,17 +13,17 @@
"description": "PoC for CVE-2021-3492 used at Pwn2Own 2021", "description": "PoC for CVE-2021-3492 used at Pwn2Own 2021",
"fork": false, "fork": false,
"created_at": "2021-06-28T09:43:31Z", "created_at": "2021-06-28T09:43:31Z",
"updated_at": "2021-09-08T07:09:16Z", "updated_at": "2021-10-08T02:40:39Z",
"pushed_at": "2021-08-03T14:48:27Z", "pushed_at": "2021-08-03T14:48:27Z",
"stargazers_count": 28, "stargazers_count": 29,
"watchers_count": 28, "watchers_count": 29,
"forks_count": 5, "forks_count": 6,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 5, "forks": 6,
"watchers": 28, "watchers": 29,
"score": 0 "score": 0
} }
] ]

View file

@ -13,17 +13,17 @@
"description": "Sample exploits for Zephyr CVE-2021-3625", "description": "Sample exploits for Zephyr CVE-2021-3625",
"fork": false, "fork": false,
"created_at": "2021-10-06T12:47:24Z", "created_at": "2021-10-06T12:47:24Z",
"updated_at": "2021-10-07T16:52:20Z", "updated_at": "2021-10-07T22:58:43Z",
"pushed_at": "2021-10-07T08:51:59Z", "pushed_at": "2021-10-07T08:51:59Z",
"stargazers_count": 5, "stargazers_count": 6,
"watchers_count": 5, "watchers_count": 6,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 5, "watchers": 6,
"score": 0 "score": 0
} }
] ]

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-37832 - Hotel Druid 3.0.2 SQL Injection Vulnerability - 9.8 CVSS 3.1", "description": "CVE-2021-37832 - Hotel Druid 3.0.2 SQL Injection Vulnerability - 9.8 CVSS 3.1",
"fork": false, "fork": false,
"created_at": "2021-08-01T00:38:56Z", "created_at": "2021-08-01T00:38:56Z",
"updated_at": "2021-08-13T16:52:46Z", "updated_at": "2021-10-08T02:42:49Z",
"pushed_at": "2021-08-12T00:09:39Z", "pushed_at": "2021-08-12T00:09:39Z",
"stargazers_count": 5, "stargazers_count": 6,
"watchers_count": 5, "watchers_count": 6,
"forks_count": 0, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 1,
"watchers": 5, "watchers": 6,
"score": 0 "score": 0
} }
] ]

View file

@ -229,17 +229,17 @@
"description": "CVE-2021-40444 PoC", "description": "CVE-2021-40444 PoC",
"fork": false, "fork": false,
"created_at": "2021-09-10T16:55:53Z", "created_at": "2021-09-10T16:55:53Z",
"updated_at": "2021-10-07T13:36:18Z", "updated_at": "2021-10-08T03:12:12Z",
"pushed_at": "2021-09-11T09:50:26Z", "pushed_at": "2021-09-11T09:50:26Z",
"stargazers_count": 1258, "stargazers_count": 1260,
"watchers_count": 1258, "watchers_count": 1260,
"forks_count": 396, "forks_count": 397,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 396, "forks": 397,
"watchers": 1258, "watchers": 1260,
"score": 0 "score": 0
}, },
{ {

View file

@ -25,5 +25,35 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0 "score": 0
},
{
"id": 414763941,
"name": "CVE-2021-40870",
"full_name": "oxctdev\/CVE-2021-40870",
"owner": {
"login": "oxctdev",
"id": 91846073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
"html_url": "https:\/\/github.com\/oxctdev"
},
"html_url": "https:\/\/github.com\/oxctdev\/CVE-2021-40870",
"description": "Aviatrix allows an authenticated user to execute arbitrary code",
"fork": false,
"created_at": "2021-10-07T21:34:00Z",
"updated_at": "2021-10-07T21:38:46Z",
"pushed_at": "2021-10-07T21:36:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-40870",
"remote-code-execution"
],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
} }
] ]

View file

@ -121,17 +121,17 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2021-10-05T17:30:43Z", "created_at": "2021-10-05T17:30:43Z",
"updated_at": "2021-10-07T17:59:52Z", "updated_at": "2021-10-08T03:18:00Z",
"pushed_at": "2021-10-07T17:45:30Z", "pushed_at": "2021-10-07T17:45:30Z",
"stargazers_count": 19, "stargazers_count": 21,
"watchers_count": 19, "watchers_count": 21,
"forks_count": 26, "forks_count": 26,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 26, "forks": 26,
"watchers": 19, "watchers": 21,
"score": 0 "score": 0
}, },
{ {
@ -202,17 +202,17 @@
"description": "Poc.py ", "description": "Poc.py ",
"fork": false, "fork": false,
"created_at": "2021-10-05T20:41:34Z", "created_at": "2021-10-05T20:41:34Z",
"updated_at": "2021-10-06T01:07:17Z", "updated_at": "2021-10-08T03:17:29Z",
"pushed_at": "2021-10-05T21:29:59Z", "pushed_at": "2021-10-05T21:29:59Z",
"stargazers_count": 2, "stargazers_count": 3,
"watchers_count": 2, "watchers_count": 3,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 2, "watchers": 3,
"score": 0 "score": 0
}, },
{ {
@ -229,17 +229,17 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2021-10-05T23:53:48Z", "created_at": "2021-10-05T23:53:48Z",
"updated_at": "2021-10-07T11:12:19Z", "updated_at": "2021-10-08T02:14:35Z",
"pushed_at": "2021-10-06T15:37:23Z", "pushed_at": "2021-10-06T15:37:23Z",
"stargazers_count": 16, "stargazers_count": 17,
"watchers_count": 16, "watchers_count": 17,
"forks_count": 11, "forks_count": 11,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 11, "forks": 11,
"watchers": 16, "watchers": 17,
"score": 0 "score": 0
}, },
{ {
@ -398,17 +398,17 @@
"description": "CVE-2021-41773 playground", "description": "CVE-2021-41773 playground",
"fork": false, "fork": false,
"created_at": "2021-10-06T07:17:05Z", "created_at": "2021-10-06T07:17:05Z",
"updated_at": "2021-10-07T20:11:02Z", "updated_at": "2021-10-08T03:05:36Z",
"pushed_at": "2021-10-07T17:56:38Z", "pushed_at": "2021-10-07T17:56:38Z",
"stargazers_count": 50, "stargazers_count": 68,
"watchers_count": 50, "watchers_count": 68,
"forks_count": 22, "forks_count": 22,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 22, "forks": 22,
"watchers": 50, "watchers": 68,
"score": 0 "score": 0
}, },
{ {
@ -479,16 +479,16 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2021-10-06T14:12:07Z", "created_at": "2021-10-06T14:12:07Z",
"updated_at": "2021-10-06T14:36:53Z", "updated_at": "2021-10-08T01:55:25Z",
"pushed_at": "2021-10-06T14:36:50Z", "pushed_at": "2021-10-08T01:55:22Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"forks_count": 0, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 1,
"watchers": 0, "watchers": 0,
"score": 0 "score": 0
}, },
@ -506,17 +506,17 @@
"description": "CVE-2021-41773 的复现", "description": "CVE-2021-41773 的复现",
"fork": false, "fork": false,
"created_at": "2021-10-06T14:17:31Z", "created_at": "2021-10-06T14:17:31Z",
"updated_at": "2021-10-07T02:59:35Z", "updated_at": "2021-10-08T01:44:12Z",
"pushed_at": "2021-10-07T02:59:33Z", "pushed_at": "2021-10-07T02:59:33Z",
"stargazers_count": 1, "stargazers_count": 2,
"watchers_count": 1, "watchers_count": 2,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 1, "watchers": 2,
"score": 0 "score": 0
}, },
{ {
@ -564,12 +564,12 @@
"pushed_at": "2021-10-06T15:07:48Z", "pushed_at": "2021-10-06T15:07:48Z",
"stargazers_count": 4, "stargazers_count": 4,
"watchers_count": 4, "watchers_count": 4,
"forks_count": 1, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 2,
"watchers": 4, "watchers": 4,
"score": 0 "score": 0
}, },
@ -708,6 +708,36 @@
"watchers": 2, "watchers": 2,
"score": 0 "score": 0
}, },
{
"id": 414410579,
"name": "CVE-2021-41773",
"full_name": "oxctdev\/CVE-2021-41773",
"owner": {
"login": "oxctdev",
"id": 91846073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
"html_url": "https:\/\/github.com\/oxctdev"
},
"html_url": "https:\/\/github.com\/oxctdev\/CVE-2021-41773",
"description": "Apache HTTPd (2.4.49) Local File Disclosure (LFI)",
"fork": false,
"created_at": "2021-10-07T00:14:40Z",
"updated_at": "2021-10-08T02:42:11Z",
"pushed_at": "2021-10-07T00:19:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [
"httpd",
"remote-code-execution"
],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{ {
"id": 414650983, "id": 414650983,
"name": "mass_cve-2021-41773", "name": "mass_cve-2021-41773",
@ -722,8 +752,8 @@
"description": "MASS CVE-2021-41773", "description": "MASS CVE-2021-41773",
"fork": false, "fork": false,
"created_at": "2021-10-07T15:13:18Z", "created_at": "2021-10-07T15:13:18Z",
"updated_at": "2021-10-07T20:16:18Z", "updated_at": "2021-10-08T00:44:19Z",
"pushed_at": "2021-10-07T15:39:51Z", "pushed_at": "2021-10-08T00:44:16Z",
"stargazers_count": 2, "stargazers_count": 2,
"watchers_count": 2, "watchers_count": 2,
"forks_count": 2, "forks_count": 2,
@ -749,8 +779,35 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2021-10-07T16:19:45Z", "created_at": "2021-10-07T16:19:45Z",
"updated_at": "2021-10-07T16:48:30Z", "updated_at": "2021-10-08T01:15:42Z",
"pushed_at": "2021-10-07T16:48:27Z", "pushed_at": "2021-10-07T16:48:27Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 414764740,
"name": "CVE-2021-41773",
"full_name": "Sakura-nee\/CVE-2021-41773",
"owner": {
"login": "Sakura-nee",
"id": 74785477,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74785477?v=4",
"html_url": "https:\/\/github.com\/Sakura-nee"
},
"html_url": "https:\/\/github.com\/Sakura-nee\/CVE-2021-41773",
"description": "Mass exploitation CVE-2021-41773 and auto detect possible RCE",
"fork": false,
"created_at": "2021-10-07T21:37:50Z",
"updated_at": "2021-10-07T21:53:00Z",
"pushed_at": "2021-10-07T21:52:57Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"forks_count": 0, "forks_count": 0,
@ -761,5 +818,65 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0 "score": 0
},
{
"id": 414787621,
"name": "lab-cve-2021-41773",
"full_name": "htrgouvea\/lab-cve-2021-41773",
"owner": {
"login": "htrgouvea",
"id": 10741284,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10741284?v=4",
"html_url": "https:\/\/github.com\/htrgouvea"
},
"html_url": "https:\/\/github.com\/htrgouvea\/lab-cve-2021-41773",
"description": "Docker container lab to play\/learn with CVE-2021-41773",
"fork": false,
"created_at": "2021-10-07T23:38:36Z",
"updated_at": "2021-10-08T02:15:47Z",
"pushed_at": "2021-10-08T00:21:39Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [
"apache",
"container",
"cve-2021-41773",
"docker",
"lab"
],
"visibility": "public",
"forks": 1,
"watchers": 6,
"score": 0
},
{
"id": 414804962,
"name": "CVE-2021-41773",
"full_name": "shellreaper\/CVE-2021-41773",
"owner": {
"login": "shellreaper",
"id": 76930483,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76930483?v=4",
"html_url": "https:\/\/github.com\/shellreaper"
},
"html_url": "https:\/\/github.com\/shellreaper\/CVE-2021-41773",
"description": "This a simple poc for Apache\/2.4.49 Path Traversal Vulnerability",
"fork": false,
"created_at": "2021-10-08T01:13:33Z",
"updated_at": "2021-10-08T01:20:28Z",
"pushed_at": "2021-10-08T01:16:36Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
} }
] ]

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-10-07T18:44:04Z", "pushed_at": "2021-10-07T18:44:04Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"forks_count": 0, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 1,
"watchers": 0, "watchers": 0,
"score": 0 "score": 0
} }

View file

@ -1128,6 +1128,7 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
- [dorkerdevil/CVE-2021-26084](https://github.com/dorkerdevil/CVE-2021-26084) - [dorkerdevil/CVE-2021-26084](https://github.com/dorkerdevil/CVE-2021-26084)
- [ludy-dev/CVE-2021-26084_PoC](https://github.com/ludy-dev/CVE-2021-26084_PoC) - [ludy-dev/CVE-2021-26084_PoC](https://github.com/ludy-dev/CVE-2021-26084_PoC)
- [wdjcy/CVE-2021-26084](https://github.com/wdjcy/CVE-2021-26084) - [wdjcy/CVE-2021-26084](https://github.com/wdjcy/CVE-2021-26084)
- [oxctdev/CVE-2021-26084](https://github.com/oxctdev/CVE-2021-26084)
### CVE-2021-26085 (2021-08-02) ### CVE-2021-26085 (2021-08-02)
@ -2618,6 +2619,7 @@ An issue was discovered in Aviatrix Controller 6.x before 6.5-1804.1922. Unrestr
</code> </code>
- [0xAgun/CVE-2021-40870](https://github.com/0xAgun/CVE-2021-40870) - [0xAgun/CVE-2021-40870](https://github.com/0xAgun/CVE-2021-40870)
- [oxctdev/CVE-2021-40870](https://github.com/oxctdev/CVE-2021-40870)
### CVE-2021-40875 (2021-09-22) ### CVE-2021-40875 (2021-09-22)
@ -2710,8 +2712,12 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
- [fnatalucci/CVE-2021-41773-RCE](https://github.com/fnatalucci/CVE-2021-41773-RCE) - [fnatalucci/CVE-2021-41773-RCE](https://github.com/fnatalucci/CVE-2021-41773-RCE)
- [AssassinUKG/CVE-2021-41773](https://github.com/AssassinUKG/CVE-2021-41773) - [AssassinUKG/CVE-2021-41773](https://github.com/AssassinUKG/CVE-2021-41773)
- [jheeree/Simple-CVE-2021-41773-checker](https://github.com/jheeree/Simple-CVE-2021-41773-checker) - [jheeree/Simple-CVE-2021-41773-checker](https://github.com/jheeree/Simple-CVE-2021-41773-checker)
- [oxctdev/CVE-2021-41773](https://github.com/oxctdev/CVE-2021-41773)
- [justakazh/mass_cve-2021-41773](https://github.com/justakazh/mass_cve-2021-41773) - [justakazh/mass_cve-2021-41773](https://github.com/justakazh/mass_cve-2021-41773)
- [LetouRaphael/Poc-CVE-2021-41773](https://github.com/LetouRaphael/Poc-CVE-2021-41773) - [LetouRaphael/Poc-CVE-2021-41773](https://github.com/LetouRaphael/Poc-CVE-2021-41773)
- [Sakura-nee/CVE-2021-41773](https://github.com/Sakura-nee/CVE-2021-41773)
- [htrgouvea/lab-cve-2021-41773](https://github.com/htrgouvea/lab-cve-2021-41773)
- [shellreaper/CVE-2021-41773](https://github.com/shellreaper/CVE-2021-41773)
### CVE-2021-42013 (2021-10-07) ### CVE-2021-42013 (2021-10-07)