Auto Update 2021/10/19 18:13:22

This commit is contained in:
motikan2010-bot 2021-10-19 18:13:23 +09:00
parent 8c5c5ec9f2
commit e387a4aec8
43 changed files with 254 additions and 208 deletions

View file

@ -13,10 +13,10 @@
"description": ":muscle: Proof Of Concept of the BEAST attack against SSL\/TLS CVE-2011-3389 :muscle:",
"fork": false,
"created_at": "2015-03-28T10:28:16Z",
"updated_at": "2021-09-03T00:10:28Z",
"updated_at": "2021-10-19T07:45:18Z",
"pushed_at": "2019-01-30T21:36:22Z",
"stargazers_count": 49,
"watchers_count": 49,
"stargazers_count": 50,
"watchers_count": 50,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 30,
"watchers": 49,
"watchers": 50,
"score": 0
}
]

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-10-16T02:03:37Z",
"updated_at": "2021-10-19T06:28:16Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1200,
"watchers_count": 1200,
"stargazers_count": 1199,
"watchers_count": 1199,
"forks_count": 267,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 267,
"watchers": 1200,
"watchers": 1199,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-10-16T02:03:37Z",
"updated_at": "2021-10-19T06:28:16Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1200,
"watchers_count": 1200,
"stargazers_count": 1199,
"watchers_count": 1199,
"forks_count": 267,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 267,
"watchers": 1200,
"watchers": 1199,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Exploits for the win32kfull!bFill vulnerability on Win10 x64 RS2 using Bitmap or Palette techniques",
"fork": false,
"created_at": "2017-10-06T07:59:07Z",
"updated_at": "2021-10-17T08:43:29Z",
"updated_at": "2021-10-19T03:14:00Z",
"pushed_at": "2017-10-06T09:47:43Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 40,
"watchers": 41,
"score": 0
}
]

View file

@ -17,7 +17,7 @@
"pushed_at": "2016-10-27T20:23:15Z",
"stargazers_count": 93,
"watchers_count": 93,
"forks_count": 37,
"forks_count": 38,
"allow_forking": true,
"is_template": false,
"topics": [
@ -25,7 +25,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 37,
"forks": 38,
"watchers": 93,
"score": 0
},

View file

@ -67,17 +67,17 @@
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
"fork": false,
"created_at": "2016-10-21T11:19:21Z",
"updated_at": "2021-10-09T05:08:45Z",
"updated_at": "2021-10-19T06:39:34Z",
"pushed_at": "2021-02-03T16:03:40Z",
"stargazers_count": 879,
"watchers_count": 879,
"stargazers_count": 880,
"watchers_count": 880,
"forks_count": 411,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 411,
"watchers": 879,
"watchers": 880,
"score": 0
},
{
@ -934,32 +934,5 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 380896191,
"name": "CVE-2016-5195",
"full_name": "sijidufei\/CVE-2016-5195",
"owner": {
"login": "sijidufei",
"id": 86583938,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86583938?v=4",
"html_url": "https:\/\/github.com\/sijidufei"
},
"html_url": "https:\/\/github.com\/sijidufei\/CVE-2016-5195",
"description": null,
"fork": false,
"created_at": "2021-06-28T03:38:32Z",
"updated_at": "2021-06-28T04:04:02Z",
"pushed_at": "2021-06-28T04:04:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -722,33 +722,6 @@
"watchers": 9,
"score": 0
},
{
"id": 318228897,
"name": "CVE-2017-11882",
"full_name": "ActorExpose\/CVE-2017-11882",
"owner": {
"login": "ActorExpose",
"id": 57215674,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57215674?v=4",
"html_url": "https:\/\/github.com\/ActorExpose"
},
"html_url": "https:\/\/github.com\/ActorExpose\/CVE-2017-11882",
"description": null,
"fork": false,
"created_at": "2020-12-03T15:00:27Z",
"updated_at": "2020-12-03T15:01:17Z",
"pushed_at": "2020-12-03T15:01:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 332744031,
"name": "SignHere",

View file

@ -13,17 +13,17 @@
"description": "Exploitation Tool for CVE-2017-3066 targeting Adobe Coldfusion 11\/12",
"fork": false,
"created_at": "2018-03-12T16:44:12Z",
"updated_at": "2021-10-10T08:49:35Z",
"updated_at": "2021-10-19T06:29:13Z",
"pushed_at": "2018-03-12T16:50:20Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 66,
"watchers_count": 66,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 65,
"watchers": 66,
"score": 0
},
{

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-10-16T02:03:37Z",
"updated_at": "2021-10-19T06:28:16Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1200,
"watchers_count": 1200,
"stargazers_count": 1199,
"watchers_count": 1199,
"forks_count": 267,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 267,
"watchers": 1200,
"watchers": 1199,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2017-09-15T14:39:25Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 0,
"watchers": 1,
"score": 0
}

View file

@ -530,10 +530,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-10-16T02:03:37Z",
"updated_at": "2021-10-19T06:28:16Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1200,
"watchers_count": 1200,
"stargazers_count": 1199,
"watchers_count": 1199,
"forks_count": 267,
"allow_forking": true,
"is_template": false,
@ -561,7 +561,7 @@
],
"visibility": "public",
"forks": 267,
"watchers": 1200,
"watchers": 1199,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-04-27T12:00:24Z",
"updated_at": "2021-09-20T06:42:10Z",
"updated_at": "2021-10-19T08:21:31Z",
"pushed_at": "2021-04-30T02:27:52Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -1488,12 +1488,12 @@
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 830,
"watchers_count": 830,
"forks_count": 243,
"forks_count": 244,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 243,
"forks": 244,
"watchers": 830,
"score": 0
},
@ -3286,5 +3286,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 418804153,
"name": "kali-CVE-2019-0708-lab",
"full_name": "bibo318\/kali-CVE-2019-0708-lab",
"owner": {
"login": "bibo318",
"id": 56821442,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56821442?v=4",
"html_url": "https:\/\/github.com\/bibo318"
},
"html_url": "https:\/\/github.com\/bibo318\/kali-CVE-2019-0708-lab",
"description": null,
"fork": false,
"created_at": "2021-10-19T06:49:45Z",
"updated_at": "2021-10-19T06:52:04Z",
"pushed_at": "2021-10-19T06:49:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": null,
"fork": false,
"created_at": "2021-02-24T13:18:54Z",
"updated_at": "2021-02-24T13:19:15Z",
"updated_at": "2021-10-19T08:21:06Z",
"pushed_at": "2021-02-24T13:19:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -40,7 +40,7 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-10-19T02:33:33Z",
"updated_at": "2021-10-19T06:39:26Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2929,
"watchers_count": 2929,

View file

@ -767,17 +767,17 @@
"description": "Indicator of Compromise Scanner for CVE-2019-19781",
"fork": false,
"created_at": "2020-01-21T15:20:25Z",
"updated_at": "2021-09-15T18:24:51Z",
"updated_at": "2021-10-19T06:40:46Z",
"pushed_at": "2020-03-25T05:07:43Z",
"stargazers_count": 86,
"watchers_count": 86,
"stargazers_count": 87,
"watchers_count": 87,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 86,
"watchers": 87,
"score": 0
},
{

View file

@ -175,10 +175,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-10-16T02:03:37Z",
"updated_at": "2021-10-19T06:28:16Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1200,
"watchers_count": 1200,
"stargazers_count": 1199,
"watchers_count": 1199,
"forks_count": 267,
"allow_forking": true,
"is_template": false,
@ -206,7 +206,7 @@
],
"visibility": "public",
"forks": 267,
"watchers": 1200,
"watchers": 1199,
"score": 0
}
]

29
2019/CVE-2019-6339.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 418807056,
"name": "drupal-cve-2019-6339",
"full_name": "Vulnmachines\/drupal-cve-2019-6339",
"owner": {
"login": "Vulnmachines",
"id": 79006904,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
"html_url": "https:\/\/github.com\/Vulnmachines"
},
"html_url": "https:\/\/github.com\/Vulnmachines\/drupal-cve-2019-6339",
"description": "Drupal remote code execution vulnerabilty",
"fork": false,
"created_at": "2021-10-19T06:59:29Z",
"updated_at": "2021-10-19T07:00:17Z",
"pushed_at": "2021-10-19T07:00:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -148,17 +148,17 @@
"description": null,
"fork": false,
"created_at": "2021-02-24T13:17:41Z",
"updated_at": "2021-02-24T13:18:27Z",
"updated_at": "2021-10-19T08:21:14Z",
"pushed_at": "2021-02-24T13:18:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -153,10 +153,10 @@
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
"fork": false,
"created_at": "2020-01-15T23:07:41Z",
"updated_at": "2021-10-18T14:17:50Z",
"updated_at": "2021-10-19T07:50:54Z",
"pushed_at": "2020-01-20T23:33:19Z",
"stargazers_count": 863,
"watchers_count": 863,
"stargazers_count": 864,
"watchers_count": 864,
"forks_count": 221,
"allow_forking": true,
"is_template": false,
@ -165,7 +165,7 @@
],
"visibility": "public",
"forks": 221,
"watchers": 863,
"watchers": 864,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Apache Kylin API未授权访问漏洞;CVE-2020-13937;Apache Kylin漏洞",
"fork": false,
"created_at": "2021-01-15T08:57:09Z",
"updated_at": "2021-02-01T08:45:04Z",
"updated_at": "2021-10-19T07:11:42Z",
"pushed_at": "2021-01-15T08:59:18Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 8,
"watchers": 9,
"score": 0
},
{
@ -40,10 +40,10 @@
"description": "Apache Kylin API Unauthorized Access",
"fork": false,
"created_at": "2021-01-22T06:53:34Z",
"updated_at": "2021-05-21T21:43:13Z",
"updated_at": "2021-10-19T03:38:55Z",
"pushed_at": "2021-01-22T07:00:37Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -53,7 +53,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -13,7 +13,7 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-10-19T02:33:33Z",
"updated_at": "2021-10-19T06:39:26Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2929,
"watchers_count": 2929,

View file

@ -121,10 +121,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-10-18T11:12:08Z",
"updated_at": "2021-10-19T06:45:32Z",
"pushed_at": "2021-07-30T03:28:00Z",
"stargazers_count": 865,
"watchers_count": 865,
"stargazers_count": 866,
"watchers_count": 866,
"forks_count": 272,
"allow_forking": true,
"is_template": false,
@ -135,7 +135,7 @@
],
"visibility": "public",
"forks": 272,
"watchers": 865,
"watchers": 866,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": null,
"fork": false,
"created_at": "2021-02-24T13:19:44Z",
"updated_at": "2021-02-25T00:18:17Z",
"updated_at": "2021-10-19T08:21:33Z",
"pushed_at": "2021-02-25T00:18:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -310,17 +310,17 @@
"description": "CVE-2020-1938",
"fork": false,
"created_at": "2020-02-22T05:17:09Z",
"updated_at": "2021-07-03T10:33:02Z",
"updated_at": "2021-10-19T07:58:15Z",
"pushed_at": "2020-02-22T05:23:53Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 11,
"watchers": 12,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Determine the Version Running on the Palo Alto Network Firewall for the Global Protect Portal",
"fork": false,
"created_at": "2020-08-08T14:19:44Z",
"updated_at": "2021-08-23T14:47:38Z",
"updated_at": "2021-10-19T07:21:28Z",
"pushed_at": "2020-08-14T09:24:34Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-10-16T02:03:37Z",
"updated_at": "2021-10-19T06:28:16Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1200,
"watchers_count": 1200,
"stargazers_count": 1199,
"watchers_count": 1199,
"forks_count": 267,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 267,
"watchers": 1200,
"watchers": 1199,
"score": 0
},
{

View file

@ -886,7 +886,7 @@
"pushed_at": "2021-10-17T13:29:56Z",
"stargazers_count": 69,
"watchers_count": 69,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"topics": [
@ -894,7 +894,7 @@
"cve-2021-34527"
],
"visibility": "public",
"forks": 13,
"forks": 14,
"watchers": 69,
"score": 0
},

View file

@ -148,17 +148,17 @@
"description": "Read my blog for more info - ",
"fork": false,
"created_at": "2021-04-25T12:55:15Z",
"updated_at": "2021-09-22T14:32:58Z",
"updated_at": "2021-10-19T05:31:17Z",
"pushed_at": "2021-04-27T21:13:18Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 8,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 10,
"forks": 9,
"watchers": 11,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": null,
"fork": false,
"created_at": "2021-10-19T01:08:48Z",
"updated_at": "2021-10-19T01:18:52Z",
"updated_at": "2021-10-19T06:36:21Z",
"pushed_at": "2021-10-19T01:18:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

34
2021/CVE-2021-24884.json Normal file
View file

@ -0,0 +1,34 @@
[
{
"id": 418585239,
"name": "CVE-2021-24884",
"full_name": "S1lkys\/CVE-2021-24884",
"owner": {
"login": "S1lkys",
"id": 40408435,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40408435?v=4",
"html_url": "https:\/\/github.com\/S1lkys"
},
"html_url": "https:\/\/github.com\/S1lkys\/CVE-2021-24884",
"description": "If an authenticated user who is able to edit Wordpress PHP code in any kind, clicks a malicious link, PHP code can be edited through XSS in Formidable Forms 4.09.04.",
"fork": false,
"created_at": "2021-10-18T16:37:08Z",
"updated_at": "2021-10-19T07:48:47Z",
"pushed_at": "2021-10-19T07:48:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"exploit",
"formidable",
"wordpress",
"xss"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -121,10 +121,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-10-18T11:12:08Z",
"updated_at": "2021-10-19T06:45:32Z",
"pushed_at": "2021-07-30T03:28:00Z",
"stargazers_count": 865,
"watchers_count": 865,
"stargazers_count": 866,
"watchers_count": 866,
"forks_count": 272,
"allow_forking": true,
"is_template": false,
@ -135,7 +135,7 @@
],
"visibility": "public",
"forks": 272,
"watchers": 865,
"watchers": 866,
"score": 0
},
{

View file

@ -229,17 +229,17 @@
"description": "CVE-2021-26084 Remote Code Execution on Confluence Servers",
"fork": false,
"created_at": "2021-09-01T09:50:26Z",
"updated_at": "2021-09-22T10:22:47Z",
"updated_at": "2021-10-19T07:03:44Z",
"pushed_at": "2021-09-02T07:36:51Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 32,
"watchers": 33,
"score": 0
},
{

View file

@ -165,12 +165,12 @@
"pushed_at": "2021-03-09T22:07:46Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 16,
"score": 0
},

View file

@ -17,7 +17,7 @@
"pushed_at": "2021-06-01T15:08:23Z",
"stargazers_count": 195,
"watchers_count": 195,
"forks_count": 33,
"forks_count": 34,
"allow_forking": true,
"is_template": false,
"topics": [
@ -30,7 +30,7 @@
"vmswitch"
],
"visibility": "public",
"forks": 33,
"forks": 34,
"watchers": 195,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "Exploit for CVE-2021-3129",
"fork": false,
"created_at": "2021-01-13T12:52:20Z",
"updated_at": "2021-10-18T09:45:28Z",
"updated_at": "2021-10-19T06:26:01Z",
"pushed_at": "2021-01-29T13:59:07Z",
"stargazers_count": 173,
"watchers_count": 173,
"stargazers_count": 174,
"watchers_count": 174,
"forks_count": 44,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 44,
"watchers": 173,
"watchers": 174,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "Dahua IPC\/VTH\/VTO devices auth bypass exploit",
"fork": false,
"created_at": "2021-10-18T16:02:41Z",
"updated_at": "2021-10-18T17:45:24Z",
"updated_at": "2021-10-19T05:07:23Z",
"pushed_at": "2021-10-18T16:09:44Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Windows Etw LPE",
"fork": false,
"created_at": "2021-10-12T03:50:44Z",
"updated_at": "2021-10-15T15:04:54Z",
"updated_at": "2021-10-19T06:27:06Z",
"pushed_at": "2021-10-12T05:52:00Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 21,
"watchers": 22,
"score": 0
}
]

View file

@ -233,12 +233,12 @@
"pushed_at": "2021-09-11T09:50:26Z",
"stargazers_count": 1281,
"watchers_count": 1281,
"forks_count": 408,
"forks_count": 409,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 408,
"forks": 409,
"watchers": 1281,
"score": 0
},
@ -553,10 +553,10 @@
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
"fork": false,
"created_at": "2021-09-15T22:34:35Z",
"updated_at": "2021-10-18T12:43:22Z",
"updated_at": "2021-10-19T07:37:14Z",
"pushed_at": "2021-10-12T23:05:07Z",
"stargazers_count": 469,
"watchers_count": 469,
"stargazers_count": 470,
"watchers_count": 470,
"forks_count": 95,
"allow_forking": true,
"is_template": false,
@ -570,7 +570,7 @@
],
"visibility": "public",
"forks": 95,
"watchers": 469,
"watchers": 470,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "PoC (DoS) for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2021-10-16T16:17:44Z",
"updated_at": "2021-10-18T19:05:30Z",
"updated_at": "2021-10-19T07:57:54Z",
"pushed_at": "2021-10-17T13:27:53Z",
"stargazers_count": 70,
"watchers_count": 70,
"forks_count": 12,
"stargazers_count": 80,
"watchers_count": 80,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 70,
"forks": 15,
"watchers": 80,
"score": 0
}
]

View file

@ -94,17 +94,17 @@
"description": null,
"fork": false,
"created_at": "2021-10-05T17:29:49Z",
"updated_at": "2021-10-10T08:49:08Z",
"updated_at": "2021-10-19T08:07:47Z",
"pushed_at": "2021-10-06T09:25:38Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 17,
"watchers": 18,
"score": 0
},
{
@ -1263,17 +1263,17 @@
"description": "CVE-2021-41773 CVE-2021-42013漏洞批量检测工具",
"fork": false,
"created_at": "2021-10-09T03:32:18Z",
"updated_at": "2021-10-19T01:39:20Z",
"updated_at": "2021-10-19T07:08:15Z",
"pushed_at": "2021-10-09T03:49:21Z",
"stargazers_count": 81,
"watchers_count": 81,
"stargazers_count": 82,
"watchers_count": 82,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 81,
"watchers": 82,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "A small PoC for the recent RCE found in the Goahead Webserver prior to version 5.1.5. ",
"fork": false,
"created_at": "2021-10-12T06:21:02Z",
"updated_at": "2021-10-18T20:57:00Z",
"updated_at": "2021-10-19T04:30:21Z",
"pushed_at": "2021-10-18T20:56:31Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 3,
"score": 0
}
]

View file

@ -1030,6 +1030,9 @@ The Support Board WordPress plugin before 3.3.4 does not escape multiple POST pa
- [itsjeffersonli/CVE-2021-24741](https://github.com/itsjeffersonli/CVE-2021-24741)
### CVE-2021-24884
- [S1lkys/CVE-2021-24884](https://github.com/S1lkys/CVE-2021-24884)
### CVE-2021-25162 (2021-03-29)
<code>
@ -7658,6 +7661,7 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly
- [FroydCod3r/CVE-2019-0708](https://github.com/FroydCod3r/CVE-2019-0708)
- [pywc/CVE-2019-0708](https://github.com/pywc/CVE-2019-0708)
- [c4dr01d/CVE-2019-0708](https://github.com/c4dr01d/CVE-2019-0708)
- [bibo318/kali-CVE-2019-0708-lab](https://github.com/bibo318/kali-CVE-2019-0708-lab)
### CVE-2019-0709 (2019-06-12)
@ -8561,6 +8565,14 @@ HP Support Assistant 8.7.50 and earlier allows a user to gain system privilege a
- [ManhNDd/CVE-2019-6329](https://github.com/ManhNDd/CVE-2019-6329)
### CVE-2019-6339 (2019-01-22)
<code>
In Drupal Core versions 7.x prior to 7.62, 8.6.x prior to 8.6.6 and 8.5.x prior to 8.5.9; A remote code execution vulnerability exists in PHP's built-in phar stream wrapper when performing file operations on an untrusted phar:// URI. Some Drupal code (core, contrib, and custom) may be performing file operations on insufficiently validated user input, thereby being exposed to this vulnerability. This vulnerability is mitigated by the fact that such code paths typically require access to an administrative permission or an atypical configuration.
</code>
- [Vulnmachines/drupal-cve-2019-6339](https://github.com/Vulnmachines/drupal-cve-2019-6339)
### CVE-2019-6340 (2019-02-21)
<code>
@ -16119,7 +16131,6 @@ Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Micr
- [ekgg/Overflow-Demo-CVE-2017-11882](https://github.com/ekgg/Overflow-Demo-CVE-2017-11882)
- [HaoJame/CVE-2017-11882](https://github.com/HaoJame/CVE-2017-11882)
- [dcsync/rtfkit](https://github.com/dcsync/rtfkit)
- [ActorExpose/CVE-2017-11882](https://github.com/ActorExpose/CVE-2017-11882)
- [Retr0-code/SignHere](https://github.com/Retr0-code/SignHere)
### CVE-2017-11907 (2017-12-12)
@ -17550,7 +17561,6 @@ Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allo
- [KaviDk/dirtyCow](https://github.com/KaviDk/dirtyCow)
- [DanielEbert/CVE-2016-5195](https://github.com/DanielEbert/CVE-2016-5195)
- [arttnba3/CVE-2016-5195](https://github.com/arttnba3/CVE-2016-5195)
- [sijidufei/CVE-2016-5195](https://github.com/sijidufei/CVE-2016-5195)
### CVE-2016-5345 (2018-01-22)