mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2022/01/03 12:13:51
This commit is contained in:
parent
c49eb8d52b
commit
ec59077297
36 changed files with 187 additions and 187 deletions
|
@ -148,17 +148,17 @@
|
||||||
"description": "Multi-threaded tool for scanning many hosts for CVE-2014-0160.",
|
"description": "Multi-threaded tool for scanning many hosts for CVE-2014-0160.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2014-04-08T10:10:43Z",
|
"created_at": "2014-04-08T10:10:43Z",
|
||||||
"updated_at": "2021-12-08T08:06:33Z",
|
"updated_at": "2022-01-03T08:41:25Z",
|
||||||
"pushed_at": "2015-07-02T14:47:31Z",
|
"pushed_at": "2015-07-02T14:47:31Z",
|
||||||
"stargazers_count": 576,
|
"stargazers_count": 575,
|
||||||
"watchers_count": 576,
|
"watchers_count": 575,
|
||||||
"forks_count": 233,
|
"forks_count": 233,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 233,
|
"forks": 233,
|
||||||
"watchers": 576,
|
"watchers": 575,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -40,10 +40,10 @@
|
||||||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-15T04:26:29Z",
|
"created_at": "2020-01-15T04:26:29Z",
|
||||||
"updated_at": "2022-01-01T18:27:19Z",
|
"updated_at": "2022-01-03T08:42:08Z",
|
||||||
"pushed_at": "2020-11-27T15:10:58Z",
|
"pushed_at": "2020-11-27T15:10:58Z",
|
||||||
"stargazers_count": 1256,
|
"stargazers_count": 1255,
|
||||||
"watchers_count": 1256,
|
"watchers_count": 1255,
|
||||||
"forks_count": 277,
|
"forks_count": 277,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -71,7 +71,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 277,
|
"forks": 277,
|
||||||
"watchers": 1256,
|
"watchers": 1255,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-15T04:26:29Z",
|
"created_at": "2020-01-15T04:26:29Z",
|
||||||
"updated_at": "2022-01-01T18:27:19Z",
|
"updated_at": "2022-01-03T08:42:08Z",
|
||||||
"pushed_at": "2020-11-27T15:10:58Z",
|
"pushed_at": "2020-11-27T15:10:58Z",
|
||||||
"stargazers_count": 1256,
|
"stargazers_count": 1255,
|
||||||
"watchers_count": 1256,
|
"watchers_count": 1255,
|
||||||
"forks_count": 277,
|
"forks_count": 277,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -44,7 +44,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 277,
|
"forks": 277,
|
||||||
"watchers": 1256,
|
"watchers": 1255,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,17 +13,17 @@
|
||||||
"description": "Apache Tomcat < 9.0.1 (Beta) \/ < 8.5.23 \/ < 8.0.47 \/ < 7.0.8 - JSP Upload Bypass \/ Remote Code Execution ",
|
"description": "Apache Tomcat < 9.0.1 (Beta) \/ < 8.5.23 \/ < 8.0.47 \/ < 7.0.8 - JSP Upload Bypass \/ Remote Code Execution ",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2017-10-05T23:41:52Z",
|
"created_at": "2017-10-05T23:41:52Z",
|
||||||
"updated_at": "2021-12-20T07:44:42Z",
|
"updated_at": "2022-01-03T07:19:46Z",
|
||||||
"pushed_at": "2017-10-11T07:43:50Z",
|
"pushed_at": "2017-10-11T07:43:50Z",
|
||||||
"stargazers_count": 366,
|
"stargazers_count": 367,
|
||||||
"watchers_count": 366,
|
"watchers_count": 367,
|
||||||
"forks_count": 136,
|
"forks_count": 136,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 136,
|
"forks": 136,
|
||||||
"watchers": 366,
|
"watchers": 367,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -40,10 +40,10 @@
|
||||||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-15T04:26:29Z",
|
"created_at": "2020-01-15T04:26:29Z",
|
||||||
"updated_at": "2022-01-01T18:27:19Z",
|
"updated_at": "2022-01-03T08:42:08Z",
|
||||||
"pushed_at": "2020-11-27T15:10:58Z",
|
"pushed_at": "2020-11-27T15:10:58Z",
|
||||||
"stargazers_count": 1256,
|
"stargazers_count": 1255,
|
||||||
"watchers_count": 1256,
|
"watchers_count": 1255,
|
||||||
"forks_count": 277,
|
"forks_count": 277,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -71,7 +71,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 277,
|
"forks": 277,
|
||||||
"watchers": 1256,
|
"watchers": 1255,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,17 +13,17 @@
|
||||||
"description": "CVE-2018-17246 - Kibana LFI < 6.4.3 & 5.6.13",
|
"description": "CVE-2018-17246 - Kibana LFI < 6.4.3 & 5.6.13",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-03-08T20:06:15Z",
|
"created_at": "2019-03-08T20:06:15Z",
|
||||||
"updated_at": "2021-07-19T14:30:17Z",
|
"updated_at": "2022-01-03T08:45:33Z",
|
||||||
"pushed_at": "2019-10-26T13:28:34Z",
|
"pushed_at": "2019-10-26T13:28:34Z",
|
||||||
"stargazers_count": 56,
|
"stargazers_count": 55,
|
||||||
"watchers_count": 56,
|
"watchers_count": 55,
|
||||||
"forks_count": 14,
|
"forks_count": 14,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 14,
|
"forks": 14,
|
||||||
"watchers": 56,
|
"watchers": 55,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -530,10 +530,10 @@
|
||||||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-15T04:26:29Z",
|
"created_at": "2020-01-15T04:26:29Z",
|
||||||
"updated_at": "2022-01-01T18:27:19Z",
|
"updated_at": "2022-01-03T08:42:08Z",
|
||||||
"pushed_at": "2020-11-27T15:10:58Z",
|
"pushed_at": "2020-11-27T15:10:58Z",
|
||||||
"stargazers_count": 1256,
|
"stargazers_count": 1255,
|
||||||
"watchers_count": 1256,
|
"watchers_count": 1255,
|
||||||
"forks_count": 277,
|
"forks_count": 277,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -561,7 +561,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 277,
|
"forks": 277,
|
||||||
"watchers": 1256,
|
"watchers": 1255,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -40,10 +40,10 @@
|
||||||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-12-21T22:45:55Z",
|
"created_at": "2019-12-21T22:45:55Z",
|
||||||
"updated_at": "2022-01-02T06:20:54Z",
|
"updated_at": "2022-01-03T09:18:13Z",
|
||||||
"pushed_at": "2020-01-05T21:46:25Z",
|
"pushed_at": "2020-01-05T21:46:25Z",
|
||||||
"stargazers_count": 481,
|
"stargazers_count": 482,
|
||||||
"watchers_count": 481,
|
"watchers_count": 482,
|
||||||
"forks_count": 111,
|
"forks_count": 111,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -63,7 +63,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 111,
|
"forks": 111,
|
||||||
"watchers": 481,
|
"watchers": 482,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,7 +13,7 @@
|
||||||
"description": "Exploit for CVE-2019-11043",
|
"description": "Exploit for CVE-2019-11043",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-09-23T21:37:27Z",
|
"created_at": "2019-09-23T21:37:27Z",
|
||||||
"updated_at": "2022-01-01T10:47:04Z",
|
"updated_at": "2022-01-03T10:30:14Z",
|
||||||
"pushed_at": "2019-11-12T18:53:14Z",
|
"pushed_at": "2019-11-12T18:53:14Z",
|
||||||
"stargazers_count": 1692,
|
"stargazers_count": 1692,
|
||||||
"watchers_count": 1692,
|
"watchers_count": 1692,
|
||||||
|
|
File diff suppressed because one or more lines are too long
|
@ -40,10 +40,10 @@
|
||||||
"description": "漏洞POC、EXP合集,持续更新。Apache Druid-任意文件读取(CVE-2021-36749)、ConfluenceRCE(CVE-2021-26084)、ZeroShell防火墙RCE(CVE-2019-12725)、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露",
|
"description": "漏洞POC、EXP合集,持续更新。Apache Druid-任意文件读取(CVE-2021-36749)、ConfluenceRCE(CVE-2021-26084)、ZeroShell防火墙RCE(CVE-2019-12725)、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-05-22T05:06:33Z",
|
"created_at": "2021-05-22T05:06:33Z",
|
||||||
"updated_at": "2021-12-30T05:12:22Z",
|
"updated_at": "2022-01-03T09:06:25Z",
|
||||||
"pushed_at": "2021-11-21T10:34:06Z",
|
"pushed_at": "2021-11-21T10:34:06Z",
|
||||||
"stargazers_count": 44,
|
"stargazers_count": 45,
|
||||||
"watchers_count": 44,
|
"watchers_count": 45,
|
||||||
"forks_count": 12,
|
"forks_count": 12,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -54,7 +54,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 12,
|
"forks": 12,
|
||||||
"watchers": 44,
|
"watchers": 45,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -17,12 +17,12 @@
|
||||||
"pushed_at": "2019-08-24T19:27:24Z",
|
"pushed_at": "2019-08-24T19:27:24Z",
|
||||||
"stargazers_count": 13,
|
"stargazers_count": 13,
|
||||||
"watchers_count": 13,
|
"watchers_count": 13,
|
||||||
"forks_count": 7,
|
"forks_count": 8,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 7,
|
"forks": 8,
|
||||||
"watchers": 13,
|
"watchers": 13,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
|
|
@ -405,12 +405,12 @@
|
||||||
"pushed_at": "2021-02-07T19:51:24Z",
|
"pushed_at": "2021-02-07T19:51:24Z",
|
||||||
"stargazers_count": 20,
|
"stargazers_count": 20,
|
||||||
"watchers_count": 20,
|
"watchers_count": 20,
|
||||||
"forks_count": 6,
|
"forks_count": 5,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 6,
|
"forks": 5,
|
||||||
"watchers": 20,
|
"watchers": 20,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
|
|
@ -40,10 +40,10 @@
|
||||||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-04-01T09:33:35Z",
|
"created_at": "2020-04-01T09:33:35Z",
|
||||||
"updated_at": "2022-01-02T14:54:44Z",
|
"updated_at": "2022-01-03T10:01:04Z",
|
||||||
"pushed_at": "2021-04-04T09:13:57Z",
|
"pushed_at": "2021-04-04T09:13:57Z",
|
||||||
"stargazers_count": 3081,
|
"stargazers_count": 3082,
|
||||||
"watchers_count": 3081,
|
"watchers_count": 3082,
|
||||||
"forks_count": 915,
|
"forks_count": 915,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -70,7 +70,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 915,
|
"forks": 915,
|
||||||
"watchers": 3081,
|
"watchers": 3082,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -175,10 +175,10 @@
|
||||||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-15T04:26:29Z",
|
"created_at": "2020-01-15T04:26:29Z",
|
||||||
"updated_at": "2022-01-01T18:27:19Z",
|
"updated_at": "2022-01-03T08:42:08Z",
|
||||||
"pushed_at": "2020-11-27T15:10:58Z",
|
"pushed_at": "2020-11-27T15:10:58Z",
|
||||||
"stargazers_count": 1256,
|
"stargazers_count": 1255,
|
||||||
"watchers_count": 1256,
|
"watchers_count": 1255,
|
||||||
"forks_count": 277,
|
"forks_count": 277,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -206,7 +206,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 277,
|
"forks": 277,
|
||||||
"watchers": 1256,
|
"watchers": 1255,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -472,8 +472,8 @@
|
||||||
"description": "weblogic CVE-2019-2725利用exp。",
|
"description": "weblogic CVE-2019-2725利用exp。",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-08T06:35:28Z",
|
"created_at": "2020-01-08T06:35:28Z",
|
||||||
"updated_at": "2020-01-08T06:43:35Z",
|
"updated_at": "2022-01-03T07:44:53Z",
|
||||||
"pushed_at": "2020-01-08T06:42:30Z",
|
"pushed_at": "2022-01-03T07:44:50Z",
|
||||||
"stargazers_count": 2,
|
"stargazers_count": 2,
|
||||||
"watchers_count": 2,
|
"watchers_count": 2,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
|
|
|
@ -40,17 +40,17 @@
|
||||||
"description": "Test tool for CVE-2020-1472",
|
"description": "Test tool for CVE-2020-1472",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-09-08T08:58:37Z",
|
"created_at": "2020-09-08T08:58:37Z",
|
||||||
"updated_at": "2022-01-02T14:24:24Z",
|
"updated_at": "2022-01-03T10:11:50Z",
|
||||||
"pushed_at": "2021-12-08T10:31:54Z",
|
"pushed_at": "2021-12-08T10:31:54Z",
|
||||||
"stargazers_count": 1406,
|
"stargazers_count": 1407,
|
||||||
"watchers_count": 1406,
|
"watchers_count": 1407,
|
||||||
"forks_count": 316,
|
"forks_count": 316,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 316,
|
"forks": 316,
|
||||||
"watchers": 1406,
|
"watchers": 1407,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -155,17 +155,17 @@
|
||||||
"description": "Exploit for zerologon cve-2020-1472",
|
"description": "Exploit for zerologon cve-2020-1472",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-09-14T19:19:07Z",
|
"created_at": "2020-09-14T19:19:07Z",
|
||||||
"updated_at": "2022-01-01T01:55:52Z",
|
"updated_at": "2022-01-03T11:19:52Z",
|
||||||
"pushed_at": "2020-10-15T18:31:15Z",
|
"pushed_at": "2020-10-15T18:31:15Z",
|
||||||
"stargazers_count": 391,
|
"stargazers_count": 393,
|
||||||
"watchers_count": 391,
|
"watchers_count": 393,
|
||||||
"forks_count": 118,
|
"forks_count": 118,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 118,
|
"forks": 118,
|
||||||
"watchers": 391,
|
"watchers": 393,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-04-01T09:33:35Z",
|
"created_at": "2020-04-01T09:33:35Z",
|
||||||
"updated_at": "2022-01-02T14:54:44Z",
|
"updated_at": "2022-01-03T10:01:04Z",
|
||||||
"pushed_at": "2021-04-04T09:13:57Z",
|
"pushed_at": "2021-04-04T09:13:57Z",
|
||||||
"stargazers_count": 3081,
|
"stargazers_count": 3082,
|
||||||
"watchers_count": 3081,
|
"watchers_count": 3082,
|
||||||
"forks_count": 915,
|
"forks_count": 915,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -43,7 +43,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 915,
|
"forks": 915,
|
||||||
"watchers": 3081,
|
"watchers": 3082,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-01-15T04:26:29Z",
|
"created_at": "2020-01-15T04:26:29Z",
|
||||||
"updated_at": "2022-01-01T18:27:19Z",
|
"updated_at": "2022-01-03T08:42:08Z",
|
||||||
"pushed_at": "2020-11-27T15:10:58Z",
|
"pushed_at": "2020-11-27T15:10:58Z",
|
||||||
"stargazers_count": 1256,
|
"stargazers_count": 1255,
|
||||||
"watchers_count": 1256,
|
"watchers_count": 1255,
|
||||||
"forks_count": 277,
|
"forks_count": 277,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -44,7 +44,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 277,
|
"forks": 277,
|
||||||
"watchers": 1256,
|
"watchers": 1255,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,17 +13,17 @@
|
||||||
"description": "CVE-2020-26259: XStream is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling as long as the executing process has sufficient rights.",
|
"description": "CVE-2020-26259: XStream is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling as long as the executing process has sufficient rights.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-12-13T17:39:11Z",
|
"created_at": "2020-12-13T17:39:11Z",
|
||||||
"updated_at": "2021-06-30T13:25:40Z",
|
"updated_at": "2022-01-03T08:14:12Z",
|
||||||
"pushed_at": "2020-12-13T19:12:34Z",
|
"pushed_at": "2020-12-13T19:12:34Z",
|
||||||
"stargazers_count": 26,
|
"stargazers_count": 27,
|
||||||
"watchers_count": 26,
|
"watchers_count": 27,
|
||||||
"forks_count": 1,
|
"forks_count": 1,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1,
|
"forks": 1,
|
||||||
"watchers": 26,
|
"watchers": 27,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,17 +13,17 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-12-14T19:39:42Z",
|
"created_at": "2020-12-14T19:39:42Z",
|
||||||
"updated_at": "2021-09-18T10:25:12Z",
|
"updated_at": "2022-01-03T07:13:02Z",
|
||||||
"pushed_at": "2020-12-20T17:29:07Z",
|
"pushed_at": "2020-12-20T17:29:07Z",
|
||||||
"stargazers_count": 32,
|
"stargazers_count": 33,
|
||||||
"watchers_count": 32,
|
"watchers_count": 33,
|
||||||
"forks_count": 7,
|
"forks_count": 7,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 7,
|
"forks": 7,
|
||||||
"watchers": 32,
|
"watchers": 33,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,17 +13,17 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-10-12T14:52:38Z",
|
"created_at": "2021-10-12T14:52:38Z",
|
||||||
"updated_at": "2022-01-02T20:14:49Z",
|
"updated_at": "2022-01-03T06:35:43Z",
|
||||||
"pushed_at": "2021-10-12T16:05:19Z",
|
"pushed_at": "2021-10-12T16:05:19Z",
|
||||||
"stargazers_count": 8,
|
"stargazers_count": 9,
|
||||||
"watchers_count": 8,
|
"watchers_count": 9,
|
||||||
"forks_count": 1,
|
"forks_count": 2,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1,
|
"forks": 2,
|
||||||
"watchers": 8,
|
"watchers": 9,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -44,12 +44,12 @@
|
||||||
"pushed_at": "2021-01-24T05:28:07Z",
|
"pushed_at": "2021-01-24T05:28:07Z",
|
||||||
"stargazers_count": 101,
|
"stargazers_count": 101,
|
||||||
"watchers_count": 101,
|
"watchers_count": 101,
|
||||||
"forks_count": 42,
|
"forks_count": 44,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 42,
|
"forks": 44,
|
||||||
"watchers": 101,
|
"watchers": 101,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
@ -179,17 +179,17 @@
|
||||||
"description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)",
|
"description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-02-18T05:42:13Z",
|
"created_at": "2021-02-18T05:42:13Z",
|
||||||
"updated_at": "2021-12-25T08:14:40Z",
|
"updated_at": "2022-01-03T12:05:29Z",
|
||||||
"pushed_at": "2021-12-14T05:12:17Z",
|
"pushed_at": "2021-12-14T05:12:17Z",
|
||||||
"stargazers_count": 63,
|
"stargazers_count": 64,
|
||||||
"watchers_count": 63,
|
"watchers_count": 64,
|
||||||
"forks_count": 32,
|
"forks_count": 32,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 32,
|
"forks": 32,
|
||||||
"watchers": 63,
|
"watchers": 64,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -757,12 +757,12 @@
|
||||||
"pushed_at": "2021-02-03T22:28:14Z",
|
"pushed_at": "2021-02-03T22:28:14Z",
|
||||||
"stargazers_count": 82,
|
"stargazers_count": 82,
|
||||||
"watchers_count": 82,
|
"watchers_count": 82,
|
||||||
"forks_count": 35,
|
"forks_count": 36,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 35,
|
"forks": 36,
|
||||||
"watchers": 82,
|
"watchers": 82,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
|
|
@ -13,8 +13,8 @@
|
||||||
"description": "PoC of CVE-2021-35296 - PTCL Modem HG150-Ub",
|
"description": "PoC of CVE-2021-35296 - PTCL Modem HG150-Ub",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-09-30T18:18:27Z",
|
"created_at": "2021-09-30T18:18:27Z",
|
||||||
"updated_at": "2021-10-06T13:51:00Z",
|
"updated_at": "2022-01-03T10:52:49Z",
|
||||||
"pushed_at": "2021-10-06T13:50:58Z",
|
"pushed_at": "2022-01-03T10:52:45Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 0,
|
||||||
"watchers_count": 0,
|
"watchers_count": 0,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
|
|
|
@ -44,12 +44,12 @@
|
||||||
"pushed_at": "2021-10-28T06:37:37Z",
|
"pushed_at": "2021-10-28T06:37:37Z",
|
||||||
"stargazers_count": 76,
|
"stargazers_count": 76,
|
||||||
"watchers_count": 76,
|
"watchers_count": 76,
|
||||||
"forks_count": 35,
|
"forks_count": 36,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 35,
|
"forks": 36,
|
||||||
"watchers": 76,
|
"watchers": 76,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "漏洞POC、EXP合集,持续更新。Apache Druid-任意文件读取(CVE-2021-36749)、ConfluenceRCE(CVE-2021-26084)、ZeroShell防火墙RCE(CVE-2019-12725)、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露",
|
"description": "漏洞POC、EXP合集,持续更新。Apache Druid-任意文件读取(CVE-2021-36749)、ConfluenceRCE(CVE-2021-26084)、ZeroShell防火墙RCE(CVE-2019-12725)、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-05-22T05:06:33Z",
|
"created_at": "2021-05-22T05:06:33Z",
|
||||||
"updated_at": "2021-12-30T05:12:22Z",
|
"updated_at": "2022-01-03T09:06:25Z",
|
||||||
"pushed_at": "2021-11-21T10:34:06Z",
|
"pushed_at": "2021-11-21T10:34:06Z",
|
||||||
"stargazers_count": 44,
|
"stargazers_count": 45,
|
||||||
"watchers_count": 44,
|
"watchers_count": 45,
|
||||||
"forks_count": 12,
|
"forks_count": 12,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -27,7 +27,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 12,
|
"forks": 12,
|
||||||
"watchers": 44,
|
"watchers": 45,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -207,10 +207,10 @@
|
||||||
"description": "Exploit for CVE-2021-36934",
|
"description": "Exploit for CVE-2021-36934",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-08-12T18:01:21Z",
|
"created_at": "2021-08-12T18:01:21Z",
|
||||||
"updated_at": "2022-01-02T11:20:33Z",
|
"updated_at": "2022-01-03T09:14:05Z",
|
||||||
"pushed_at": "2021-08-13T21:05:51Z",
|
"pushed_at": "2021-08-13T21:05:51Z",
|
||||||
"stargazers_count": 3,
|
"stargazers_count": 4,
|
||||||
"watchers_count": 3,
|
"watchers_count": 4,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -224,7 +224,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 3,
|
"watchers": 4,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -229,17 +229,17 @@
|
||||||
"description": "CVE-2021-40444 PoC",
|
"description": "CVE-2021-40444 PoC",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-09-10T16:55:53Z",
|
"created_at": "2021-09-10T16:55:53Z",
|
||||||
"updated_at": "2021-12-31T09:36:22Z",
|
"updated_at": "2022-01-03T07:36:14Z",
|
||||||
"pushed_at": "2021-12-25T18:31:02Z",
|
"pushed_at": "2021-12-25T18:31:02Z",
|
||||||
"stargazers_count": 1334,
|
"stargazers_count": 1335,
|
||||||
"watchers_count": 1334,
|
"watchers_count": 1335,
|
||||||
"forks_count": 436,
|
"forks_count": 436,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 436,
|
"forks": 436,
|
||||||
"watchers": 1334,
|
"watchers": 1335,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,10 +13,10 @@
|
||||||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-12-11T15:10:30Z",
|
"created_at": "2021-12-11T15:10:30Z",
|
||||||
"updated_at": "2022-01-02T11:06:16Z",
|
"updated_at": "2022-01-03T11:09:12Z",
|
||||||
"pushed_at": "2021-12-21T10:11:05Z",
|
"pushed_at": "2021-12-21T10:11:05Z",
|
||||||
"stargazers_count": 674,
|
"stargazers_count": 675,
|
||||||
"watchers_count": 674,
|
"watchers_count": 675,
|
||||||
"forks_count": 142,
|
"forks_count": 142,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -28,7 +28,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 142,
|
"forks": 142,
|
||||||
"watchers": 674,
|
"watchers": 675,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,17 +13,17 @@
|
||||||
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
|
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-12-11T19:27:30Z",
|
"created_at": "2021-12-11T19:27:30Z",
|
||||||
"updated_at": "2022-01-02T11:10:59Z",
|
"updated_at": "2022-01-03T06:24:22Z",
|
||||||
"pushed_at": "2021-12-16T09:50:15Z",
|
"pushed_at": "2021-12-16T09:50:15Z",
|
||||||
"stargazers_count": 968,
|
"stargazers_count": 969,
|
||||||
"watchers_count": 968,
|
"watchers_count": 969,
|
||||||
"forks_count": 256,
|
"forks_count": 256,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 256,
|
"forks": 256,
|
||||||
"watchers": 968,
|
"watchers": 969,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -94,8 +94,8 @@
|
||||||
"description": "Checks your files for existence of Unicode BIDI characters which can be misused for supply chain attacks. See CVE-2021-42574 ",
|
"description": "Checks your files for existence of Unicode BIDI characters which can be misused for supply chain attacks. See CVE-2021-42574 ",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-11-06T22:12:35Z",
|
"created_at": "2021-11-06T22:12:35Z",
|
||||||
"updated_at": "2021-12-13T20:25:31Z",
|
"updated_at": "2022-01-03T08:53:14Z",
|
||||||
"pushed_at": "2022-01-03T05:21:35Z",
|
"pushed_at": "2022-01-03T08:53:12Z",
|
||||||
"stargazers_count": 4,
|
"stargazers_count": 4,
|
||||||
"watchers_count": 4,
|
"watchers_count": 4,
|
||||||
"forks_count": 2,
|
"forks_count": 2,
|
||||||
|
|
|
@ -67,17 +67,17 @@
|
||||||
"description": "Grafana Unauthorized arbitrary file reading vulnerability",
|
"description": "Grafana Unauthorized arbitrary file reading vulnerability",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-12-07T09:02:16Z",
|
"created_at": "2021-12-07T09:02:16Z",
|
||||||
"updated_at": "2022-01-03T05:51:51Z",
|
"updated_at": "2022-01-03T09:01:23Z",
|
||||||
"pushed_at": "2021-12-09T03:16:21Z",
|
"pushed_at": "2021-12-09T03:16:21Z",
|
||||||
"stargazers_count": 237,
|
"stargazers_count": 239,
|
||||||
"watchers_count": 237,
|
"watchers_count": 239,
|
||||||
"forks_count": 63,
|
"forks_count": 63,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 63,
|
"forks": 63,
|
||||||
"watchers": 237,
|
"watchers": 239,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -574,17 +574,17 @@
|
||||||
"description": "Vulnerability CVE-2021-44228 checker",
|
"description": "Vulnerability CVE-2021-44228 checker",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-12-10T17:24:47Z",
|
"created_at": "2021-12-10T17:24:47Z",
|
||||||
"updated_at": "2021-12-30T13:29:50Z",
|
"updated_at": "2022-01-03T11:28:03Z",
|
||||||
"pushed_at": "2021-12-13T15:16:23Z",
|
"pushed_at": "2021-12-13T15:16:23Z",
|
||||||
"stargazers_count": 37,
|
"stargazers_count": 38,
|
||||||
"watchers_count": 37,
|
"watchers_count": 38,
|
||||||
"forks_count": 4,
|
"forks_count": 4,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 4,
|
"forks": 4,
|
||||||
"watchers": 37,
|
"watchers": 38,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -858,10 +858,10 @@
|
||||||
"description": "🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - A trick to bypass words blocking patches",
|
"description": "🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - A trick to bypass words blocking patches",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-12-10T22:35:00Z",
|
"created_at": "2021-12-10T22:35:00Z",
|
||||||
"updated_at": "2022-01-02T17:25:58Z",
|
"updated_at": "2022-01-03T07:44:51Z",
|
||||||
"pushed_at": "2021-12-31T11:47:19Z",
|
"pushed_at": "2021-12-31T11:47:19Z",
|
||||||
"stargazers_count": 571,
|
"stargazers_count": 573,
|
||||||
"watchers_count": 571,
|
"watchers_count": 573,
|
||||||
"forks_count": 86,
|
"forks_count": 86,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -888,7 +888,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 86,
|
"forks": 86,
|
||||||
"watchers": 571,
|
"watchers": 573,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -905,11 +905,11 @@
|
||||||
"description": "A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability. ",
|
"description": "A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability. ",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-12-10T23:19:28Z",
|
"created_at": "2021-12-10T23:19:28Z",
|
||||||
"updated_at": "2022-01-01T23:36:54Z",
|
"updated_at": "2022-01-03T07:49:53Z",
|
||||||
"pushed_at": "2022-01-02T07:12:10Z",
|
"pushed_at": "2022-01-02T07:12:10Z",
|
||||||
"stargazers_count": 1080,
|
"stargazers_count": 1081,
|
||||||
"watchers_count": 1080,
|
"watchers_count": 1081,
|
||||||
"forks_count": 265,
|
"forks_count": 266,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [
|
"topics": [
|
||||||
|
@ -919,8 +919,8 @@
|
||||||
"security"
|
"security"
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 265,
|
"forks": 266,
|
||||||
"watchers": 1080,
|
"watchers": 1081,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -1139,10 +1139,10 @@
|
||||||
"description": "A minimalistic LDAP server that is meant for test vulnerability to JNDI+LDAP injection attacks in Java, especially CVE-2021-44228.",
|
"description": "A minimalistic LDAP server that is meant for test vulnerability to JNDI+LDAP injection attacks in Java, especially CVE-2021-44228.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-12-11T03:08:14Z",
|
"created_at": "2021-12-11T03:08:14Z",
|
||||||
"updated_at": "2021-12-14T05:02:21Z",
|
"updated_at": "2022-01-03T09:26:00Z",
|
||||||
"pushed_at": "2021-12-13T16:17:03Z",
|
"pushed_at": "2021-12-13T16:17:03Z",
|
||||||
"stargazers_count": 6,
|
"stargazers_count": 7,
|
||||||
"watchers_count": 6,
|
"watchers_count": 7,
|
||||||
"forks_count": 3,
|
"forks_count": 3,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -1155,7 +1155,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 3,
|
"forks": 3,
|
||||||
"watchers": 6,
|
"watchers": 7,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -1373,10 +1373,10 @@
|
||||||
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
|
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-12-11T11:18:46Z",
|
"created_at": "2021-12-11T11:18:46Z",
|
||||||
"updated_at": "2022-01-02T15:09:10Z",
|
"updated_at": "2022-01-03T10:28:39Z",
|
||||||
"pushed_at": "2022-01-02T15:10:51Z",
|
"pushed_at": "2022-01-02T15:10:51Z",
|
||||||
"stargazers_count": 686,
|
"stargazers_count": 689,
|
||||||
"watchers_count": 686,
|
"watchers_count": 689,
|
||||||
"forks_count": 139,
|
"forks_count": 139,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -1393,7 +1393,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 139,
|
"forks": 139,
|
||||||
"watchers": 686,
|
"watchers": 689,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -1885,10 +1885,10 @@
|
||||||
"description": "Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!",
|
"description": "Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-12-12T00:29:03Z",
|
"created_at": "2021-12-12T00:29:03Z",
|
||||||
"updated_at": "2022-01-03T03:43:07Z",
|
"updated_at": "2022-01-03T09:26:32Z",
|
||||||
"pushed_at": "2022-01-01T19:44:06Z",
|
"pushed_at": "2022-01-01T19:44:06Z",
|
||||||
"stargazers_count": 546,
|
"stargazers_count": 548,
|
||||||
"watchers_count": 546,
|
"watchers_count": 548,
|
||||||
"forks_count": 88,
|
"forks_count": 88,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -1907,7 +1907,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 88,
|
"forks": 88,
|
||||||
"watchers": 546,
|
"watchers": 548,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -1986,17 +1986,17 @@
|
||||||
"description": "An agent to hotpatch the log4j RCE from CVE-2021-44228.",
|
"description": "An agent to hotpatch the log4j RCE from CVE-2021-44228.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-12-12T01:24:51Z",
|
"created_at": "2021-12-12T01:24:51Z",
|
||||||
"updated_at": "2022-01-03T05:01:49Z",
|
"updated_at": "2022-01-03T09:58:30Z",
|
||||||
"pushed_at": "2021-12-23T20:40:44Z",
|
"pushed_at": "2021-12-23T20:40:44Z",
|
||||||
"stargazers_count": 459,
|
"stargazers_count": 460,
|
||||||
"watchers_count": 459,
|
"watchers_count": 460,
|
||||||
"forks_count": 59,
|
"forks_count": 59,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 59,
|
"forks": 59,
|
||||||
"watchers": 459,
|
"watchers": 460,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -3198,17 +3198,17 @@
|
||||||
"description": "Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)",
|
"description": "Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-12-12T22:52:02Z",
|
"created_at": "2021-12-12T22:52:02Z",
|
||||||
"updated_at": "2022-01-01T12:18:00Z",
|
"updated_at": "2022-01-03T11:01:47Z",
|
||||||
"pushed_at": "2021-12-20T15:34:21Z",
|
"pushed_at": "2021-12-20T15:34:21Z",
|
||||||
"stargazers_count": 293,
|
"stargazers_count": 295,
|
||||||
"watchers_count": 293,
|
"watchers_count": 295,
|
||||||
"forks_count": 44,
|
"forks_count": 44,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 44,
|
"forks": 44,
|
||||||
"watchers": 293,
|
"watchers": 295,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -3542,12 +3542,12 @@
|
||||||
"pushed_at": "2022-01-02T20:21:42Z",
|
"pushed_at": "2022-01-02T20:21:42Z",
|
||||||
"stargazers_count": 2489,
|
"stargazers_count": 2489,
|
||||||
"watchers_count": 2489,
|
"watchers_count": 2489,
|
||||||
"forks_count": 580,
|
"forks_count": 582,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 580,
|
"forks": 582,
|
||||||
"watchers": 2489,
|
"watchers": 2489,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
@ -3565,17 +3565,17 @@
|
||||||
"description": "a fast check, if your server could be vulnerable to CVE-2021-44228",
|
"description": "a fast check, if your server could be vulnerable to CVE-2021-44228",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-12-13T04:14:18Z",
|
"created_at": "2021-12-13T04:14:18Z",
|
||||||
"updated_at": "2022-01-02T11:02:11Z",
|
"updated_at": "2022-01-03T11:48:52Z",
|
||||||
"pushed_at": "2022-01-01T23:46:03Z",
|
"pushed_at": "2022-01-01T23:46:03Z",
|
||||||
"stargazers_count": 233,
|
"stargazers_count": 234,
|
||||||
"watchers_count": 233,
|
"watchers_count": 234,
|
||||||
"forks_count": 82,
|
"forks_count": 82,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 82,
|
"forks": 82,
|
||||||
"watchers": 233,
|
"watchers": 234,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -3681,12 +3681,12 @@
|
||||||
"pushed_at": "2021-12-22T05:37:11Z",
|
"pushed_at": "2021-12-22T05:37:11Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 0,
|
||||||
"watchers_count": 0,
|
"watchers_count": 0,
|
||||||
"forks_count": 1,
|
"forks_count": 2,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1,
|
"forks": 2,
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
@ -4393,8 +4393,8 @@
|
||||||
"description": "log4j \/ log4shell IoCs from multiple sources put together in one big file (IPs) more coming soon (CVE-2021-44228)",
|
"description": "log4j \/ log4shell IoCs from multiple sources put together in one big file (IPs) more coming soon (CVE-2021-44228)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-12-13T16:39:16Z",
|
"created_at": "2021-12-13T16:39:16Z",
|
||||||
"updated_at": "2022-01-03T06:00:28Z",
|
"updated_at": "2022-01-03T12:00:33Z",
|
||||||
"pushed_at": "2022-01-03T06:00:25Z",
|
"pushed_at": "2022-01-03T12:00:30Z",
|
||||||
"stargazers_count": 26,
|
"stargazers_count": 26,
|
||||||
"watchers_count": 26,
|
"watchers_count": 26,
|
||||||
"forks_count": 10,
|
"forks_count": 10,
|
||||||
|
@ -5412,10 +5412,10 @@
|
||||||
"description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)",
|
"description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-12-14T10:04:42Z",
|
"created_at": "2021-12-14T10:04:42Z",
|
||||||
"updated_at": "2022-01-02T14:12:43Z",
|
"updated_at": "2022-01-03T11:47:44Z",
|
||||||
"pushed_at": "2022-01-03T01:27:06Z",
|
"pushed_at": "2022-01-03T01:27:06Z",
|
||||||
"stargazers_count": 361,
|
"stargazers_count": 362,
|
||||||
"watchers_count": 361,
|
"watchers_count": 362,
|
||||||
"forks_count": 67,
|
"forks_count": 67,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -5431,7 +5431,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 67,
|
"forks": 67,
|
||||||
"watchers": 361,
|
"watchers": 362,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -5691,17 +5691,17 @@
|
||||||
"description": "Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228",
|
"description": "Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-12-14T18:08:45Z",
|
"created_at": "2021-12-14T18:08:45Z",
|
||||||
"updated_at": "2022-01-02T23:22:39Z",
|
"updated_at": "2022-01-03T11:50:57Z",
|
||||||
"pushed_at": "2021-12-20T14:44:27Z",
|
"pushed_at": "2021-12-20T14:44:27Z",
|
||||||
"stargazers_count": 123,
|
"stargazers_count": 125,
|
||||||
"watchers_count": 123,
|
"watchers_count": 125,
|
||||||
"forks_count": 20,
|
"forks_count": 20,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 20,
|
"forks": 20,
|
||||||
"watchers": 123,
|
"watchers": 125,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -6580,8 +6580,8 @@
|
||||||
"description": "Scans for Log4j versions effected by CVE-2021-44228",
|
"description": "Scans for Log4j versions effected by CVE-2021-44228",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-12-15T16:21:26Z",
|
"created_at": "2021-12-15T16:21:26Z",
|
||||||
"updated_at": "2021-12-23T15:00:48Z",
|
"updated_at": "2022-01-03T11:01:26Z",
|
||||||
"pushed_at": "2021-12-23T15:01:22Z",
|
"pushed_at": "2022-01-03T11:01:23Z",
|
||||||
"stargazers_count": 3,
|
"stargazers_count": 3,
|
||||||
"watchers_count": 3,
|
"watchers_count": 3,
|
||||||
"forks_count": 1,
|
"forks_count": 1,
|
||||||
|
|
|
@ -40,17 +40,17 @@
|
||||||
"description": "Log4j 2.15.0 Privilege Escalation -- CVE-2021-45046",
|
"description": "Log4j 2.15.0 Privilege Escalation -- CVE-2021-45046",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-12-15T05:48:53Z",
|
"created_at": "2021-12-15T05:48:53Z",
|
||||||
"updated_at": "2021-12-29T03:10:22Z",
|
"updated_at": "2022-01-03T08:12:55Z",
|
||||||
"pushed_at": "2021-12-23T10:57:19Z",
|
"pushed_at": "2021-12-23T10:57:19Z",
|
||||||
"stargazers_count": 18,
|
"stargazers_count": 19,
|
||||||
"watchers_count": 18,
|
"watchers_count": 19,
|
||||||
"forks_count": 7,
|
"forks_count": 7,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 7,
|
"forks": 7,
|
||||||
"watchers": 18,
|
"watchers": 19,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -175,11 +175,11 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-12-29T07:32:30Z",
|
"created_at": "2021-12-29T07:32:30Z",
|
||||||
"updated_at": "2022-01-03T03:01:19Z",
|
"updated_at": "2022-01-03T11:45:57Z",
|
||||||
"pushed_at": "2021-12-31T08:30:33Z",
|
"pushed_at": "2021-12-31T08:30:33Z",
|
||||||
"stargazers_count": 36,
|
"stargazers_count": 38,
|
||||||
"watchers_count": 36,
|
"watchers_count": 38,
|
||||||
"forks_count": 17,
|
"forks_count": 18,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [
|
"topics": [
|
||||||
|
@ -187,8 +187,8 @@
|
||||||
"cve-2021-45232"
|
"cve-2021-45232"
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 17,
|
"forks": 18,
|
||||||
"watchers": 36,
|
"watchers": 38,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
Loading…
Reference in a new issue