Auto Update 2021/05/11 18:11:30

This commit is contained in:
motikan2010-bot 2021-05-11 18:11:30 +09:00
parent ba555d10fd
commit ee63a7c351
57 changed files with 218 additions and 323 deletions

View file

@ -2,14 +2,14 @@
{ {
"id": 79179589, "id": 79179589,
"name": "ms09050", "name": "ms09050",
"full_name": "mazding\/ms09050", "full_name": "sooklalad\/ms09050",
"owner": { "owner": {
"login": "mazding", "login": "sooklalad",
"id": 16028654, "id": 16028654,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16028654?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16028654?v=4",
"html_url": "https:\/\/github.com\/mazding" "html_url": "https:\/\/github.com\/sooklalad"
}, },
"html_url": "https:\/\/github.com\/mazding\/ms09050", "html_url": "https:\/\/github.com\/sooklalad\/ms09050",
"description": "cve-2009-3103", "description": "cve-2009-3103",
"fork": false, "fork": false,
"created_at": "2017-01-17T02:24:40Z", "created_at": "2017-01-17T02:24:40Z",

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-05-10T16:23:45Z", "updated_at": "2021-05-11T08:58:22Z",
"pushed_at": "2020-11-27T15:10:58Z", "pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1022, "stargazers_count": 1024,
"watchers_count": 1022, "watchers_count": 1024,
"forks_count": 231, "forks_count": 231,
"forks": 231, "forks": 231,
"watchers": 1022, "watchers": 1024,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-05-10T16:23:45Z", "updated_at": "2021-05-11T08:58:22Z",
"pushed_at": "2020-11-27T15:10:58Z", "pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1022, "stargazers_count": 1024,
"watchers_count": 1022, "watchers_count": 1024,
"forks_count": 231, "forks_count": 231,
"forks": 231, "forks": 231,
"watchers": 1022, "watchers": 1024,
"score": 0 "score": 0
}, },
{ {

View file

@ -611,7 +611,7 @@
"description": "CVE-2017-10271", "description": "CVE-2017-10271",
"fork": false, "fork": false,
"created_at": "2020-11-18T02:31:18Z", "created_at": "2020-11-18T02:31:18Z",
"updated_at": "2020-11-18T02:31:51Z", "updated_at": "2021-05-11T07:36:14Z",
"pushed_at": "2020-11-18T02:31:50Z", "pushed_at": "2020-11-18T02:31:50Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,

View file

@ -1,73 +1,4 @@
[ [
{
"id": 80148945,
"name": "extra_recipe",
"full_name": "maximehip\/extra_recipe",
"owner": {
"login": "maximehip",
"id": 6273425,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6273425?v=4",
"html_url": "https:\/\/github.com\/maximehip"
},
"html_url": "https:\/\/github.com\/maximehip\/extra_recipe",
"description": "Ian Beer's exploit for CVE-2017-2370 (kernel memory r\/w on iOS 10.2) https:\/\/bugs.chromium.org\/p\/project-zero\/issues\/detail?id=1004",
"fork": false,
"created_at": "2017-01-26T19:47:43Z",
"updated_at": "2017-01-26T19:48:19Z",
"pushed_at": "2017-01-26T19:48:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 80717942,
"name": "extra_recipe",
"full_name": "JackBro\/extra_recipe",
"owner": {
"login": "JackBro",
"id": 21210712,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21210712?v=4",
"html_url": "https:\/\/github.com\/JackBro"
},
"html_url": "https:\/\/github.com\/JackBro\/extra_recipe",
"description": "Ian Beer's exploit for CVE-2017-2370 (kernel memory r\/w on iOS 10.2)",
"fork": false,
"created_at": "2017-02-02T11:16:38Z",
"updated_at": "2017-10-14T08:34:32Z",
"pushed_at": "2017-01-27T17:44:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 81874110,
"name": "extra_recipe-iOS-10.2",
"full_name": "Rootkitsmm-zz\/extra_recipe-iOS-10.2",
"owner": {
"login": "Rootkitsmm-zz",
"id": 5567904,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5567904?v=4",
"html_url": "https:\/\/github.com\/Rootkitsmm-zz"
},
"html_url": "https:\/\/github.com\/Rootkitsmm-zz\/extra_recipe-iOS-10.2",
"description": "CVE-2017-2370",
"fork": false,
"created_at": "2017-02-13T21:32:40Z",
"updated_at": "2019-01-03T05:45:15Z",
"pushed_at": "2017-02-01T11:36:26Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 4,
"forks": 4,
"watchers": 1,
"score": 0
},
{ {
"id": 142854846, "id": 142854846,
"name": "CVE-2017-2370", "name": "CVE-2017-2370",

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-05-10T16:23:45Z", "updated_at": "2021-05-11T08:58:22Z",
"pushed_at": "2020-11-27T15:10:58Z", "pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1022, "stargazers_count": 1024,
"watchers_count": 1022, "watchers_count": 1024,
"forks_count": 231, "forks_count": 231,
"forks": 231, "forks": 231,
"watchers": 1022, "watchers": 1024,
"score": 0 "score": 0
} }
] ]

View file

@ -36,7 +36,7 @@
"description": "CVE-2017-3506", "description": "CVE-2017-3506",
"fork": false, "fork": false,
"created_at": "2020-11-18T01:50:47Z", "created_at": "2020-11-18T01:50:47Z",
"updated_at": "2021-03-27T20:09:54Z", "updated_at": "2021-05-11T07:36:55Z",
"pushed_at": "2020-11-18T01:52:26Z", "pushed_at": "2020-11-18T01:52:26Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,

View file

@ -1,25 +0,0 @@
[
{
"id": 79682713,
"name": "CVE-2017-3730",
"full_name": "guidovranken\/CVE-2017-3730",
"owner": {
"login": "guidovranken",
"id": 6846644,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6846644?v=4",
"html_url": "https:\/\/github.com\/guidovranken"
},
"html_url": "https:\/\/github.com\/guidovranken\/CVE-2017-3730",
"description": "OpenSSL CVE-2017-3730 proof-of-concept",
"fork": false,
"created_at": "2017-01-22T00:40:34Z",
"updated_at": "2018-12-04T20:01:55Z",
"pushed_at": "2017-01-26T01:30:54Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 6,
"forks": 6,
"watchers": 11,
"score": 0
}
]

View file

@ -1,27 +1,4 @@
[ [
{
"id": 84158718,
"name": "S2-045",
"full_name": "PolarisLab\/S2-045",
"owner": {
"login": "PolarisLab",
"id": 25890110,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25890110?v=4",
"html_url": "https:\/\/github.com\/PolarisLab"
},
"html_url": "https:\/\/github.com\/PolarisLab\/S2-045",
"description": "Struts2 S2-045CVE-2017-5638Vulnerability environment - http:\/\/www.mottoin.com\/97954.html",
"fork": false,
"created_at": "2017-03-07T05:30:30Z",
"updated_at": "2020-09-22T06:33:06Z",
"pushed_at": "2017-03-07T05:37:55Z",
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 12,
"forks": 12,
"watchers": 23,
"score": 0
},
{ {
"id": 84186490, "id": 84186490,
"name": "Struts2-045-Exp", "name": "Struts2-045-Exp",
@ -45,29 +22,6 @@
"watchers": 61, "watchers": 61,
"score": 0 "score": 0
}, },
{
"id": 84277596,
"name": "cve-2017-5638",
"full_name": "bongbongco\/cve-2017-5638",
"owner": {
"login": "bongbongco",
"id": 3170006,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3170006?v=4",
"html_url": "https:\/\/github.com\/bongbongco"
},
"html_url": "https:\/\/github.com\/bongbongco\/cve-2017-5638",
"description": null,
"fork": false,
"created_at": "2017-03-08T04:17:33Z",
"updated_at": "2017-03-08T04:31:28Z",
"pushed_at": "2017-03-08T04:31:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{ {
"id": 84481525, "id": 84481525,
"name": "S2-045-EXP-POC-TOOLS", "name": "S2-045-EXP-POC-TOOLS",

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-05-10T16:23:45Z", "updated_at": "2021-05-11T08:58:22Z",
"pushed_at": "2020-11-27T15:10:58Z", "pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1022, "stargazers_count": 1024,
"watchers_count": 1022, "watchers_count": 1024,
"forks_count": 231, "forks_count": 231,
"forks": 231, "forks": 231,
"watchers": 1022, "watchers": 1024,
"score": 0 "score": 0
}, },
{ {

View file

@ -82,7 +82,7 @@
"description": "S2-059(CVE-2019-0230)", "description": "S2-059(CVE-2019-0230)",
"fork": false, "fork": false,
"created_at": "2020-12-11T03:40:04Z", "created_at": "2020-12-11T03:40:04Z",
"updated_at": "2020-12-17T08:18:30Z", "updated_at": "2021-05-11T07:34:58Z",
"pushed_at": "2020-12-11T04:28:10Z", "pushed_at": "2020-12-11T04:28:10Z",
"stargazers_count": 6, "stargazers_count": 6,
"watchers_count": 6, "watchers_count": 6,

View file

@ -13,7 +13,7 @@
"description": "CVE-2019-12814:Jackson JDOM XSLTransformer Gadget", "description": "CVE-2019-12814:Jackson JDOM XSLTransformer Gadget",
"fork": false, "fork": false,
"created_at": "2020-05-24T04:33:55Z", "created_at": "2020-05-24T04:33:55Z",
"updated_at": "2020-06-03T03:48:54Z", "updated_at": "2021-05-11T07:30:27Z",
"pushed_at": "2021-01-21T01:14:48Z", "pushed_at": "2021-01-21T01:14:48Z",
"stargazers_count": 2, "stargazers_count": 2,
"watchers_count": 2, "watchers_count": 2,

View file

@ -21,5 +21,28 @@
"forks": 3, "forks": 3,
"watchers": 69, "watchers": 69,
"score": 0 "score": 0
},
{
"id": 280048798,
"name": "CVE-2019-17571",
"full_name": "Al1ex\/CVE-2019-17571",
"owner": {
"login": "Al1ex",
"id": 38161463,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
"html_url": "https:\/\/github.com\/Al1ex"
},
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2019-17571",
"description": "Environment for CVE_2019_17571",
"fork": false,
"created_at": "2020-07-16T04:01:40Z",
"updated_at": "2021-05-11T07:38:51Z",
"pushed_at": "2020-10-13T23:36:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": "A login bypass(CVE-2019-18371) and a command injection vulnerability(CVE-2019-18370) in Xiaomi Router R3G up to version 2.28.23.", "description": "A login bypass(CVE-2019-18371) and a command injection vulnerability(CVE-2019-18370) in Xiaomi Router R3G up to version 2.28.23.",
"fork": false, "fork": false,
"created_at": "2019-08-30T16:32:13Z", "created_at": "2019-08-30T16:32:13Z",
"updated_at": "2021-03-06T21:28:58Z", "updated_at": "2021-05-11T08:06:29Z",
"pushed_at": "2020-01-12T02:34:45Z", "pushed_at": "2020-01-12T02:34:45Z",
"stargazers_count": 138, "stargazers_count": 139,
"watchers_count": 138, "watchers_count": 139,
"forks_count": 27, "forks_count": 27,
"forks": 27, "forks": 27,
"watchers": 138, "watchers": 139,
"score": 0 "score": 0
} }
] ]

View file

@ -36,13 +36,13 @@
"description": "Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]", "description": "Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]",
"fork": false, "fork": false,
"created_at": "2020-01-10T22:56:35Z", "created_at": "2020-01-10T22:56:35Z",
"updated_at": "2021-04-22T07:54:16Z", "updated_at": "2021-05-11T03:33:29Z",
"pushed_at": "2020-01-18T07:01:29Z", "pushed_at": "2020-01-18T07:01:29Z",
"stargazers_count": 357, "stargazers_count": 358,
"watchers_count": 357, "watchers_count": 358,
"forks_count": 120, "forks_count": 120,
"forks": 120, "forks": 120,
"watchers": 357, "watchers": 358,
"score": 0 "score": 0
}, },
{ {
@ -151,13 +151,13 @@
"description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit", "description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit",
"fork": false, "fork": false,
"created_at": "2020-01-11T09:49:17Z", "created_at": "2020-01-11T09:49:17Z",
"updated_at": "2021-05-09T13:17:53Z", "updated_at": "2021-05-11T08:09:33Z",
"pushed_at": "2021-01-24T20:18:04Z", "pushed_at": "2021-01-24T20:18:04Z",
"stargazers_count": 118, "stargazers_count": 120,
"watchers_count": 118, "watchers_count": 120,
"forks_count": 34, "forks_count": 34,
"forks": 34, "forks": 34,
"watchers": 118, "watchers": 120,
"score": 0 "score": 0
}, },
{ {

View file

@ -82,13 +82,13 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持", "description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false, "fork": false,
"created_at": "2019-06-21T09:22:43Z", "created_at": "2019-06-21T09:22:43Z",
"updated_at": "2021-05-07T06:35:42Z", "updated_at": "2021-05-11T06:57:19Z",
"pushed_at": "2020-04-26T10:49:25Z", "pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 759, "stargazers_count": 760,
"watchers_count": 759, "watchers_count": 760,
"forks_count": 160, "forks_count": 160,
"forks": 160, "forks": 160,
"watchers": 759, "watchers": 760,
"score": 0 "score": 0
}, },
{ {
@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-05-10T16:23:45Z", "updated_at": "2021-05-11T08:58:22Z",
"pushed_at": "2020-11-27T15:10:58Z", "pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1022, "stargazers_count": 1024,
"watchers_count": 1022, "watchers_count": 1024,
"forks_count": 231, "forks_count": 231,
"forks": 231, "forks": 231,
"watchers": 1022, "watchers": 1024,
"score": 0 "score": 0
} }
] ]

View file

@ -224,8 +224,8 @@
"pushed_at": "2019-06-21T03:33:05Z", "pushed_at": "2019-06-21T03:33:05Z",
"stargazers_count": 146, "stargazers_count": 146,
"watchers_count": 146, "watchers_count": 146,
"forks_count": 62, "forks_count": 61,
"forks": 62, "forks": 61,
"watchers": 146, "watchers": 146,
"score": 0 "score": 0
}, },

View file

@ -14,7 +14,7 @@
"fork": false, "fork": false,
"created_at": "2019-11-06T07:26:43Z", "created_at": "2019-11-06T07:26:43Z",
"updated_at": "2019-11-06T07:27:36Z", "updated_at": "2019-11-06T07:27:36Z",
"pushed_at": "2021-05-10T18:40:32Z", "pushed_at": "2021-05-11T07:06:36Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"forks_count": 0, "forks_count": 0,

View file

@ -13,13 +13,13 @@
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)", "description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
"fork": false, "fork": false,
"created_at": "2019-02-12T06:02:06Z", "created_at": "2019-02-12T06:02:06Z",
"updated_at": "2021-05-08T18:53:06Z", "updated_at": "2021-05-11T07:53:35Z",
"pushed_at": "2019-05-09T21:34:26Z", "pushed_at": "2019-05-09T21:34:26Z",
"stargazers_count": 563, "stargazers_count": 564,
"watchers_count": 563, "watchers_count": 564,
"forks_count": 131, "forks_count": 131,
"forks": 131, "forks": 131,
"watchers": 563, "watchers": 564,
"score": 0 "score": 0
}, },
{ {

View file

@ -358,13 +358,13 @@
"description": "PoC for triggering buffer overflow via CVE-2020-0796", "description": "PoC for triggering buffer overflow via CVE-2020-0796",
"fork": false, "fork": false,
"created_at": "2020-03-12T18:34:40Z", "created_at": "2020-03-12T18:34:40Z",
"updated_at": "2021-04-24T12:01:28Z", "updated_at": "2021-05-11T07:06:07Z",
"pushed_at": "2020-03-14T10:04:59Z", "pushed_at": "2020-03-14T10:04:59Z",
"stargazers_count": 268, "stargazers_count": 269,
"watchers_count": 268, "watchers_count": 269,
"forks_count": 109, "forks_count": 109,
"forks": 109, "forks": 109,
"watchers": 268, "watchers": 269,
"score": 0 "score": 0
}, },
{ {
@ -1117,13 +1117,13 @@
"description": "CVE-2020-0796 Remote Code Execution POC", "description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false, "fork": false,
"created_at": "2020-04-20T14:35:48Z", "created_at": "2020-04-20T14:35:48Z",
"updated_at": "2021-05-05T14:47:37Z", "updated_at": "2021-05-11T07:27:52Z",
"pushed_at": "2020-06-09T20:46:45Z", "pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 382, "stargazers_count": 383,
"watchers_count": 382, "watchers_count": 383,
"forks_count": 127, "forks_count": 127,
"forks": 127, "forks": 127,
"watchers": 382, "watchers": 383,
"score": 0 "score": 0
}, },
{ {

View file

@ -36,7 +36,7 @@
"description": "CVE-2020-10673:jackson-databind RCE", "description": "CVE-2020-10673:jackson-databind RCE",
"fork": false, "fork": false,
"created_at": "2020-05-21T14:56:30Z", "created_at": "2020-05-21T14:56:30Z",
"updated_at": "2020-06-03T03:48:47Z", "updated_at": "2021-05-11T07:30:47Z",
"pushed_at": "2021-01-21T01:14:03Z", "pushed_at": "2021-01-21T01:14:03Z",
"stargazers_count": 3, "stargazers_count": 3,
"watchers_count": 3, "watchers_count": 3,

View file

@ -36,13 +36,13 @@
"description": "GitLab 12.9.0 Arbitrary File Read ", "description": "GitLab 12.9.0 Arbitrary File Read ",
"fork": false, "fork": false,
"created_at": "2020-11-20T15:40:03Z", "created_at": "2020-11-20T15:40:03Z",
"updated_at": "2021-05-03T22:23:07Z", "updated_at": "2021-05-11T09:13:10Z",
"pushed_at": "2021-04-23T19:21:16Z", "pushed_at": "2021-04-23T19:21:16Z",
"stargazers_count": 37, "stargazers_count": 39,
"watchers_count": 37, "watchers_count": 39,
"forks_count": 13, "forks_count": 14,
"forks": 13, "forks": 14,
"watchers": 37, "watchers": 39,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,7 +13,7 @@
"description": "CVE-2020-11113:Jackson-databind RCE", "description": "CVE-2020-11113:Jackson-databind RCE",
"fork": false, "fork": false,
"created_at": "2020-05-21T14:00:33Z", "created_at": "2020-05-21T14:00:33Z",
"updated_at": "2020-05-21T14:01:23Z", "updated_at": "2021-05-11T07:39:13Z",
"pushed_at": "2020-10-13T22:10:38Z", "pushed_at": "2020-10-13T22:10:38Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,

View file

@ -36,7 +36,7 @@
"description": "Apache Kylin API Unauthorized Access", "description": "Apache Kylin API Unauthorized Access",
"fork": false, "fork": false,
"created_at": "2021-01-22T06:53:34Z", "created_at": "2021-01-22T06:53:34Z",
"updated_at": "2021-02-05T15:36:58Z", "updated_at": "2021-05-11T07:27:46Z",
"pushed_at": "2021-01-22T07:00:37Z", "pushed_at": "2021-01-22T07:00:37Z",
"stargazers_count": 3, "stargazers_count": 3,
"watchers_count": 3, "watchers_count": 3,

View file

@ -13,7 +13,7 @@
"description": "This is a simple test for FasterXML jackson-databind", "description": "This is a simple test for FasterXML jackson-databind",
"fork": false, "fork": false,
"created_at": "2020-05-26T15:11:03Z", "created_at": "2020-05-26T15:11:03Z",
"updated_at": "2020-09-16T15:17:13Z", "updated_at": "2021-05-11T07:30:05Z",
"pushed_at": "2021-01-21T01:18:45Z", "pushed_at": "2021-01-21T01:18:45Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,

View file

@ -59,13 +59,13 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2020-09-14T16:52:37Z", "created_at": "2020-09-14T16:52:37Z",
"updated_at": "2021-04-08T01:07:35Z", "updated_at": "2021-05-11T07:26:43Z",
"pushed_at": "2020-09-14T16:53:07Z", "pushed_at": "2020-09-14T16:53:07Z",
"stargazers_count": 31, "stargazers_count": 30,
"watchers_count": 31, "watchers_count": 30,
"forks_count": 9, "forks_count": 9,
"forks": 9, "forks": 9,
"watchers": 31, "watchers": 30,
"score": 0 "score": 0
}, },
{ {
@ -82,13 +82,13 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura", "description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false, "fork": false,
"created_at": "2020-09-14T16:56:51Z", "created_at": "2020-09-14T16:56:51Z",
"updated_at": "2021-05-11T02:40:33Z", "updated_at": "2021-05-11T07:46:55Z",
"pushed_at": "2020-11-03T09:45:24Z", "pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 788, "stargazers_count": 789,
"watchers_count": 788, "watchers_count": 789,
"forks_count": 229, "forks_count": 229,
"forks": 229, "forks": 229,
"watchers": 788, "watchers": 789,
"score": 0 "score": 0
}, },
{ {

View file

@ -460,26 +460,26 @@
"score": 0 "score": 0
}, },
{ {
"id": 325240057, "id": 325429279,
"name": "CodeTest", "name": "CodeTest",
"full_name": "xkx518\/CodeTest", "full_name": "adm1in\/CodeTest",
"owner": { "owner": {
"login": "xkx518", "login": "adm1in",
"id": 49984697, "id": 37677854,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49984697?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37677854?v=4",
"html_url": "https:\/\/github.com\/xkx518" "html_url": "https:\/\/github.com\/adm1in"
}, },
"html_url": "https:\/\/github.com\/xkx518\/CodeTest", "html_url": "https:\/\/github.com\/adm1in\/CodeTest",
"description": "CodeTest信息收集和漏洞利用工具可在进行渗透测试之时方便利用相关信息收集脚本进行信息的获取和验证工作漏洞利用模块可选择需要测试的漏洞模块或者选择所有模块测试包含CVE-2020-14882, CVE-2020-2555等可自己收集脚本后按照模板进行修改。", "description": "CodeTest信息收集和漏洞利用工具可在进行渗透测试之时方便利用相关信息收集脚本进行信息的获取和验证工作漏洞利用模块可选择需要测试的漏洞模块或者选择所有模块测试包含CVE-2020-14882, CVE-2020-2555等可自己收集脚本后按照模板进行修改。",
"fork": false, "fork": false,
"created_at": "2020-12-29T09:11:31Z", "created_at": "2020-12-30T01:55:52Z",
"updated_at": "2021-03-18T23:43:08Z", "updated_at": "2021-05-11T04:04:34Z",
"pushed_at": "2021-01-25T07:54:23Z", "pushed_at": "2020-12-29T10:47:39Z",
"stargazers_count": 23, "stargazers_count": 0,
"watchers_count": 23, "watchers_count": 0,
"forks_count": 7, "forks_count": 6,
"forks": 7, "forks": 6,
"watchers": 23, "watchers": 0,
"score": 0 "score": 0
}, },
{ {

View file

@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false, "fork": false,
"created_at": "2021-03-11T22:49:17Z", "created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-05-10T14:05:09Z", "updated_at": "2021-05-11T08:27:25Z",
"pushed_at": "2021-04-26T02:30:11Z", "pushed_at": "2021-04-26T02:30:11Z",
"stargazers_count": 740, "stargazers_count": 743,
"watchers_count": 740, "watchers_count": 743,
"forks_count": 238, "forks_count": 238,
"forks": 238, "forks": 238,
"watchers": 740, "watchers": 743,
"score": 0 "score": 0
} }
] ]

View file

@ -13,7 +13,7 @@
"description": "CVE-2020-17456 & Seowon SLC 130 Router RCE", "description": "CVE-2020-17456 & Seowon SLC 130 Router RCE",
"fork": false, "fork": false,
"created_at": "2021-01-21T06:16:40Z", "created_at": "2021-01-21T06:16:40Z",
"updated_at": "2021-01-21T06:48:06Z", "updated_at": "2021-05-11T07:29:23Z",
"pushed_at": "2021-01-21T06:17:00Z", "pushed_at": "2021-01-21T06:17:00Z",
"stargazers_count": 2, "stargazers_count": 2,
"watchers_count": 2, "watchers_count": 2,

View file

@ -59,7 +59,7 @@
"description": "S2-061 CVE-2020-17530", "description": "S2-061 CVE-2020-17530",
"fork": false, "fork": false,
"created_at": "2020-12-13T11:02:15Z", "created_at": "2020-12-13T11:02:15Z",
"updated_at": "2021-02-01T05:08:55Z", "updated_at": "2021-05-11T07:34:31Z",
"pushed_at": "2020-12-22T15:27:51Z", "pushed_at": "2020-12-22T15:27:51Z",
"stargazers_count": 25, "stargazers_count": 25,
"watchers_count": 25, "watchers_count": 25,

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-05-10T16:23:45Z", "updated_at": "2021-05-11T08:58:22Z",
"pushed_at": "2020-11-27T15:10:58Z", "pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1022, "stargazers_count": 1024,
"watchers_count": 1022, "watchers_count": 1024,
"forks_count": 231, "forks_count": 231,
"forks": 231, "forks": 231,
"watchers": 1022, "watchers": 1024,
"score": 0 "score": 0
}, },
{ {

View file

@ -36,7 +36,7 @@
"description": "CVE-2020-26217 && XStream RCE", "description": "CVE-2020-26217 && XStream RCE",
"fork": false, "fork": false,
"created_at": "2021-01-22T09:56:11Z", "created_at": "2021-01-22T09:56:11Z",
"updated_at": "2021-01-22T09:56:32Z", "updated_at": "2021-05-11T07:26:20Z",
"pushed_at": "2021-01-22T09:56:30Z", "pushed_at": "2021-01-22T09:56:30Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,

View file

@ -13,7 +13,7 @@
"description": "CVE-2020-26258 && XStream SSRF", "description": "CVE-2020-26258 && XStream SSRF",
"fork": false, "fork": false,
"created_at": "2021-01-22T08:44:24Z", "created_at": "2021-01-22T08:44:24Z",
"updated_at": "2021-01-22T08:45:00Z", "updated_at": "2021-05-11T07:27:11Z",
"pushed_at": "2021-01-22T08:44:58Z", "pushed_at": "2021-01-22T08:44:58Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,

View file

@ -36,7 +36,7 @@
"description": "CVE-2020-26259 &&XStream Arbitrary File Delete", "description": "CVE-2020-26259 &&XStream Arbitrary File Delete",
"fork": false, "fork": false,
"created_at": "2021-01-22T09:23:28Z", "created_at": "2021-01-22T09:23:28Z",
"updated_at": "2021-01-22T09:23:56Z", "updated_at": "2021-05-11T07:26:46Z",
"pushed_at": "2021-01-22T09:23:54Z", "pushed_at": "2021-01-22T09:23:54Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,

View file

@ -13,13 +13,13 @@
"description": "Demo exploit code for CVE-2020-27904, a tfp0 bug.", "description": "Demo exploit code for CVE-2020-27904, a tfp0 bug.",
"fork": false, "fork": false,
"created_at": "2021-03-31T09:11:29Z", "created_at": "2021-03-31T09:11:29Z",
"updated_at": "2021-05-11T01:46:43Z", "updated_at": "2021-05-11T04:22:01Z",
"pushed_at": "2021-04-29T07:14:33Z", "pushed_at": "2021-04-29T07:14:33Z",
"stargazers_count": 52, "stargazers_count": 54,
"watchers_count": 52, "watchers_count": 54,
"forks_count": 5, "forks_count": 5,
"forks": 5, "forks": 5,
"watchers": 52, "watchers": 54,
"score": 0 "score": 0
} }
] ]

View file

@ -128,7 +128,7 @@
"description": "CVE-2020-2883", "description": "CVE-2020-2883",
"fork": false, "fork": false,
"created_at": "2020-11-26T14:10:25Z", "created_at": "2020-11-26T14:10:25Z",
"updated_at": "2021-03-19T02:25:20Z", "updated_at": "2021-05-11T07:13:57Z",
"pushed_at": "2020-11-27T02:12:52Z", "pushed_at": "2020-11-27T02:12:52Z",
"stargazers_count": 3, "stargazers_count": 3,
"watchers_count": 3, "watchers_count": 3,

View file

@ -13,7 +13,7 @@
"description": "CVE-2020-35713", "description": "CVE-2020-35713",
"fork": false, "fork": false,
"created_at": "2021-01-21T06:39:58Z", "created_at": "2021-01-21T06:39:58Z",
"updated_at": "2021-01-21T10:20:49Z", "updated_at": "2021-05-11T07:29:00Z",
"pushed_at": "2021-01-21T06:40:15Z", "pushed_at": "2021-01-21T06:40:15Z",
"stargazers_count": 1, "stargazers_count": 1,
"watchers_count": 1, "watchers_count": 1,

View file

@ -13,7 +13,7 @@
"description": " CVE-2020-35728 & Jackson-databind RCE", "description": " CVE-2020-35728 & Jackson-databind RCE",
"fork": false, "fork": false,
"created_at": "2020-12-31T01:55:39Z", "created_at": "2020-12-31T01:55:39Z",
"updated_at": "2021-05-06T06:26:34Z", "updated_at": "2021-05-11T07:32:04Z",
"pushed_at": "2020-12-31T01:56:18Z", "pushed_at": "2020-12-31T01:56:18Z",
"stargazers_count": 41, "stargazers_count": 41,
"watchers_count": 41, "watchers_count": 41,

View file

@ -13,7 +13,7 @@
"description": "CVE-2020-35729", "description": "CVE-2020-35729",
"fork": false, "fork": false,
"created_at": "2021-04-09T07:59:43Z", "created_at": "2021-04-09T07:59:43Z",
"updated_at": "2021-04-09T09:37:11Z", "updated_at": "2021-05-11T07:21:25Z",
"pushed_at": "2021-04-09T08:00:19Z", "pushed_at": "2021-04-09T08:00:19Z",
"stargazers_count": 1, "stargazers_count": 1,
"watchers_count": 1, "watchers_count": 1,

View file

@ -13,7 +13,7 @@
"description": "CVE-2020-36179~82 Jackson-databind SSRF&RCE", "description": "CVE-2020-36179~82 Jackson-databind SSRF&RCE",
"fork": false, "fork": false,
"created_at": "2021-01-10T06:47:49Z", "created_at": "2021-01-10T06:47:49Z",
"updated_at": "2021-04-28T12:30:47Z", "updated_at": "2021-05-11T07:31:38Z",
"pushed_at": "2021-01-10T06:48:53Z", "pushed_at": "2021-01-10T06:48:53Z",
"stargazers_count": 63, "stargazers_count": 63,
"watchers_count": 63, "watchers_count": 63,

View file

@ -13,7 +13,7 @@
"description": "CVE-2020-36188 &&Jackson-databind RCE", "description": "CVE-2020-36188 &&Jackson-databind RCE",
"fork": false, "fork": false,
"created_at": "2021-01-11T06:29:38Z", "created_at": "2021-01-11T06:29:38Z",
"updated_at": "2021-01-12T11:01:10Z", "updated_at": "2021-05-11T07:31:11Z",
"pushed_at": "2021-01-11T06:29:59Z", "pushed_at": "2021-01-11T06:29:59Z",
"stargazers_count": 7, "stargazers_count": 7,
"watchers_count": 7, "watchers_count": 7,

View file

@ -933,7 +933,7 @@
"description": "CVE-2020-5902", "description": "CVE-2020-5902",
"fork": false, "fork": false,
"created_at": "2020-07-11T14:01:08Z", "created_at": "2020-07-11T14:01:08Z",
"updated_at": "2020-09-24T16:10:11Z", "updated_at": "2021-05-11T07:44:17Z",
"pushed_at": "2020-07-11T14:12:18Z", "pushed_at": "2020-07-11T14:12:18Z",
"stargazers_count": 4, "stargazers_count": 4,
"watchers_count": 4, "watchers_count": 4,

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-01-15T16:25:19Z", "pushed_at": "2021-01-15T16:25:19Z",
"stargazers_count": 76, "stargazers_count": 76,
"watchers_count": 76, "watchers_count": 76,
"forks_count": 26, "forks_count": 27,
"forks": 26, "forks": 27,
"watchers": 76, "watchers": 76,
"score": 0 "score": 0
} }

View file

@ -13,7 +13,7 @@
"description": "Wing FTP Server 6.2.5 - Privilege Escalation", "description": "Wing FTP Server 6.2.5 - Privilege Escalation",
"fork": false, "fork": false,
"created_at": "2020-12-25T01:53:45Z", "created_at": "2020-12-25T01:53:45Z",
"updated_at": "2020-12-25T01:54:31Z", "updated_at": "2021-05-11T07:34:05Z",
"pushed_at": "2020-12-25T01:54:29Z", "pushed_at": "2020-12-25T01:54:29Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,

View file

@ -13,13 +13,13 @@
"description": "CVE-2021-2109 && Weblogic Server RCE via JNDI", "description": "CVE-2021-2109 && Weblogic Server RCE via JNDI",
"fork": false, "fork": false,
"created_at": "2021-01-22T05:37:11Z", "created_at": "2021-01-22T05:37:11Z",
"updated_at": "2021-04-16T08:32:19Z", "updated_at": "2021-05-11T08:02:06Z",
"pushed_at": "2021-01-22T05:52:26Z", "pushed_at": "2021-01-22T05:52:26Z",
"stargazers_count": 17, "stargazers_count": 18,
"watchers_count": 17, "watchers_count": 18,
"forks_count": 5, "forks_count": 5,
"forks": 5, "forks": 5,
"watchers": 17, "watchers": 18,
"score": 0 "score": 0
}, },
{ {

View file

@ -59,13 +59,13 @@
"description": "CVE-2021-21972 Exploit", "description": "CVE-2021-21972 Exploit",
"fork": false, "fork": false,
"created_at": "2021-02-24T11:14:58Z", "created_at": "2021-02-24T11:14:58Z",
"updated_at": "2021-05-08T10:46:07Z", "updated_at": "2021-05-11T07:41:56Z",
"pushed_at": "2021-03-10T05:01:22Z", "pushed_at": "2021-03-10T05:01:22Z",
"stargazers_count": 247, "stargazers_count": 250,
"watchers_count": 247, "watchers_count": 250,
"forks_count": 91, "forks_count": 92,
"forks": 91, "forks": 92,
"watchers": 247, "watchers": 250,
"score": 0 "score": 0
}, },
{ {

View file

@ -36,7 +36,7 @@
"description": "CVE-2021-21975 vRealize Operations Manager SSRF", "description": "CVE-2021-21975 vRealize Operations Manager SSRF",
"fork": false, "fork": false,
"created_at": "2021-03-31T15:40:09Z", "created_at": "2021-03-31T15:40:09Z",
"updated_at": "2021-04-25T02:04:41Z", "updated_at": "2021-05-11T07:23:30Z",
"pushed_at": "2021-03-31T15:50:27Z", "pushed_at": "2021-03-31T15:50:27Z",
"stargazers_count": 9, "stargazers_count": 9,
"watchers_count": 9, "watchers_count": 9,

View file

@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false, "fork": false,
"created_at": "2021-03-11T22:49:17Z", "created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-05-10T14:05:09Z", "updated_at": "2021-05-11T08:27:25Z",
"pushed_at": "2021-04-26T02:30:11Z", "pushed_at": "2021-04-26T02:30:11Z",
"stargazers_count": 740, "stargazers_count": 743,
"watchers_count": 740, "watchers_count": 743,
"forks_count": 238, "forks_count": 238,
"forks": 238, "forks": 238,
"watchers": 740, "watchers": 743,
"score": 0 "score": 0
}, },
{ {

View file

@ -431,8 +431,8 @@
"pushed_at": "2021-03-14T23:51:37Z", "pushed_at": "2021-03-14T23:51:37Z",
"stargazers_count": 10, "stargazers_count": 10,
"watchers_count": 10, "watchers_count": 10,
"forks_count": 3, "forks_count": 4,
"forks": 3, "forks": 4,
"watchers": 10, "watchers": 10,
"score": 0 "score": 0
}, },

View file

@ -13,7 +13,7 @@
"description": "CVE-2021-27928 MariaDB\/MySQL-'wsrep provider' 命令注入漏洞", "description": "CVE-2021-27928 MariaDB\/MySQL-'wsrep provider' 命令注入漏洞",
"fork": false, "fork": false,
"created_at": "2021-04-15T06:40:49Z", "created_at": "2021-04-15T06:40:49Z",
"updated_at": "2021-04-26T02:33:35Z", "updated_at": "2021-05-11T07:19:39Z",
"pushed_at": "2021-04-15T06:41:20Z", "pushed_at": "2021-04-15T06:41:20Z",
"stargazers_count": 11, "stargazers_count": 11,
"watchers_count": 11, "watchers_count": 11,

View file

@ -13,13 +13,13 @@
"description": "POC from TestANull for CVE-2021-28482 on Exchange Server", "description": "POC from TestANull for CVE-2021-28482 on Exchange Server",
"fork": false, "fork": false,
"created_at": "2021-05-03T13:54:36Z", "created_at": "2021-05-03T13:54:36Z",
"updated_at": "2021-05-11T02:43:26Z", "updated_at": "2021-05-11T06:45:53Z",
"pushed_at": "2021-05-03T14:29:49Z", "pushed_at": "2021-05-03T14:29:49Z",
"stargazers_count": 2, "stargazers_count": 6,
"watchers_count": 2, "watchers_count": 6,
"forks_count": 2, "forks_count": 5,
"forks": 2, "forks": 5,
"watchers": 2, "watchers": 6,
"score": 0 "score": 0
} }
] ]

View file

@ -44,5 +44,28 @@
"forks": 1, "forks": 1,
"watchers": 1, "watchers": 1,
"score": 0 "score": 0
},
{
"id": 366251440,
"name": "CVE-2021-30461",
"full_name": "Al1ex\/CVE-2021-30461",
"owner": {
"login": "Al1ex",
"id": 38161463,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
"html_url": "https:\/\/github.com\/Al1ex"
},
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2021-30461",
"description": "CVE-2021-30461",
"fork": false,
"created_at": "2021-05-11T04:09:04Z",
"updated_at": "2021-05-11T08:15:49Z",
"pushed_at": "2021-05-11T04:14:47Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": "Exploit for CVE-2021-3129", "description": "Exploit for CVE-2021-3129",
"fork": false, "fork": false,
"created_at": "2021-01-13T12:52:20Z", "created_at": "2021-01-13T12:52:20Z",
"updated_at": "2021-04-28T23:24:28Z", "updated_at": "2021-05-11T05:44:28Z",
"pushed_at": "2021-01-29T13:59:07Z", "pushed_at": "2021-01-29T13:59:07Z",
"stargazers_count": 104, "stargazers_count": 105,
"watchers_count": 104, "watchers_count": 105,
"forks_count": 21, "forks_count": 21,
"forks": 21, "forks": 21,
"watchers": 104, "watchers": 105,
"score": 0 "score": 0
}, },
{ {

View file

@ -59,13 +59,13 @@
"description": "CVE-2021-3156", "description": "CVE-2021-3156",
"fork": false, "fork": false,
"created_at": "2021-01-27T16:03:34Z", "created_at": "2021-01-27T16:03:34Z",
"updated_at": "2021-04-21T12:21:38Z", "updated_at": "2021-05-11T08:30:07Z",
"pushed_at": "2021-01-31T04:56:56Z", "pushed_at": "2021-01-31T04:56:56Z",
"stargazers_count": 105, "stargazers_count": 106,
"watchers_count": 105, "watchers_count": 106,
"forks_count": 44, "forks_count": 44,
"forks": 44, "forks": 44,
"watchers": 105, "watchers": 106,
"score": 0 "score": 0
}, },
{ {
@ -381,13 +381,13 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2021-01-30T20:39:58Z", "created_at": "2021-01-30T20:39:58Z",
"updated_at": "2021-05-10T12:48:05Z", "updated_at": "2021-05-11T08:03:38Z",
"pushed_at": "2021-02-02T17:07:09Z", "pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 709, "stargazers_count": 710,
"watchers_count": 709, "watchers_count": 710,
"forks_count": 198, "forks_count": 198,
"forks": 198, "forks": 198,
"watchers": 709, "watchers": 710,
"score": 0 "score": 0
}, },
{ {
@ -661,8 +661,8 @@
"pushed_at": "2021-02-03T22:28:14Z", "pushed_at": "2021-02-03T22:28:14Z",
"stargazers_count": 41, "stargazers_count": 41,
"watchers_count": 41, "watchers_count": 41,
"forks_count": 22, "forks_count": 23,
"forks": 22, "forks": 23,
"watchers": 41, "watchers": 41,
"score": 0 "score": 0
}, },
@ -887,13 +887,13 @@
"description": "Sudo Baron Samedit Exploit", "description": "Sudo Baron Samedit Exploit",
"fork": false, "fork": false,
"created_at": "2021-03-15T17:37:02Z", "created_at": "2021-03-15T17:37:02Z",
"updated_at": "2021-05-11T00:02:39Z", "updated_at": "2021-05-11T08:15:07Z",
"pushed_at": "2021-03-30T14:44:38Z", "pushed_at": "2021-03-30T14:44:38Z",
"stargazers_count": 305, "stargazers_count": 306,
"watchers_count": 305, "watchers_count": 306,
"forks_count": 49, "forks_count": 50,
"forks": 49, "forks": 50,
"watchers": 305, "watchers": 306,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,7 +13,7 @@
"description": "CVE-2021-3317", "description": "CVE-2021-3317",
"fork": false, "fork": false,
"created_at": "2021-04-09T07:36:46Z", "created_at": "2021-04-09T07:36:46Z",
"updated_at": "2021-04-09T07:38:09Z", "updated_at": "2021-05-11T07:21:49Z",
"pushed_at": "2021-04-09T07:37:29Z", "pushed_at": "2021-04-09T07:37:29Z",
"stargazers_count": 1, "stargazers_count": 1,
"watchers_count": 1, "watchers_count": 1,

View file

@ -13,13 +13,13 @@
"description": "Ubuntu OverlayFS Local Privesc", "description": "Ubuntu OverlayFS Local Privesc",
"fork": false, "fork": false,
"created_at": "2021-04-19T20:07:01Z", "created_at": "2021-04-19T20:07:01Z",
"updated_at": "2021-05-10T04:23:29Z", "updated_at": "2021-05-11T07:16:38Z",
"pushed_at": "2021-04-20T00:46:14Z", "pushed_at": "2021-04-20T00:46:14Z",
"stargazers_count": 172, "stargazers_count": 175,
"watchers_count": 172, "watchers_count": 175,
"forks_count": 56, "forks_count": 56,
"forks": 56, "forks": 56,
"watchers": 172, "watchers": 175,
"score": 0 "score": 0
}, },
{ {

View file

@ -1018,6 +1018,7 @@ The default administrator account & password of the EDIMAX wireless network
### CVE-2021-30461 ### CVE-2021-30461
- [daedalus/CVE-2021-30461](https://github.com/daedalus/CVE-2021-30461) - [daedalus/CVE-2021-30461](https://github.com/daedalus/CVE-2021-30461)
- [Vulnmachines/CVE-2021-30461](https://github.com/Vulnmachines/CVE-2021-30461) - [Vulnmachines/CVE-2021-30461](https://github.com/Vulnmachines/CVE-2021-30461)
- [Al1ex/CVE-2021-30461](https://github.com/Al1ex/CVE-2021-30461)
### CVE-2021-30481 (2021-04-10) ### CVE-2021-30481 (2021-04-10)
@ -3948,7 +3949,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
- [corelight/CVE-2020-14882-weblogicRCE](https://github.com/corelight/CVE-2020-14882-weblogicRCE) - [corelight/CVE-2020-14882-weblogicRCE](https://github.com/corelight/CVE-2020-14882-weblogicRCE)
- [x51/CVE-2020-14882](https://github.com/x51/CVE-2020-14882) - [x51/CVE-2020-14882](https://github.com/x51/CVE-2020-14882)
- [BabyTeam1024/CVE-2020-14882](https://github.com/BabyTeam1024/CVE-2020-14882) - [BabyTeam1024/CVE-2020-14882](https://github.com/BabyTeam1024/CVE-2020-14882)
- [xkx518/CodeTest](https://github.com/xkx518/CodeTest) - [adm1in/CodeTest](https://github.com/adm1in/CodeTest)
- [securitysqs/poc](https://github.com/securitysqs/poc) - [securitysqs/poc](https://github.com/securitysqs/poc)
- [ShmilySec/CVE-2020-14882](https://github.com/ShmilySec/CVE-2020-14882) - [ShmilySec/CVE-2020-14882](https://github.com/ShmilySec/CVE-2020-14882)
- [pwn3z/CVE-2020-14882-WebLogic](https://github.com/pwn3z/CVE-2020-14882-WebLogic) - [pwn3z/CVE-2020-14882-WebLogic](https://github.com/pwn3z/CVE-2020-14882-WebLogic)
@ -8607,6 +8608,7 @@ Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserializat
</code> </code>
- [shadow-horse/CVE-2019-17571](https://github.com/shadow-horse/CVE-2019-17571) - [shadow-horse/CVE-2019-17571](https://github.com/shadow-horse/CVE-2019-17571)
- [Al1ex/CVE-2019-17571](https://github.com/Al1ex/CVE-2019-17571)
### CVE-2019-17596 (2019-10-24) ### CVE-2019-17596 (2019-10-24)
@ -12494,9 +12496,6 @@ An issue was discovered in certain Apple products. iOS before 10.2.1 is affected
An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. macOS before 10.12.3 is affected. tvOS before 10.1.1 is affected. watchOS before 3.1.3 is affected. The issue involves the &quot;Kernel&quot; component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (buffer overflow) via a crafted app. An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. macOS before 10.12.3 is affected. tvOS before 10.1.1 is affected. watchOS before 3.1.3 is affected. The issue involves the &quot;Kernel&quot; component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (buffer overflow) via a crafted app.
</code> </code>
- [maximehip/extra_recipe](https://github.com/maximehip/extra_recipe)
- [JackBro/extra_recipe](https://github.com/JackBro/extra_recipe)
- [Rootkitsmm-zz/extra_recipe-iOS-10.2](https://github.com/Rootkitsmm-zz/extra_recipe-iOS-10.2)
- [Peterpan0927/CVE-2017-2370](https://github.com/Peterpan0927/CVE-2017-2370) - [Peterpan0927/CVE-2017-2370](https://github.com/Peterpan0927/CVE-2017-2370)
### CVE-2017-2388 (2017-04-01) ### CVE-2017-2388 (2017-04-01)
@ -12614,14 +12613,6 @@ Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Serve
- [SECFORCE/CVE-2017-3599](https://github.com/SECFORCE/CVE-2017-3599) - [SECFORCE/CVE-2017-3599](https://github.com/SECFORCE/CVE-2017-3599)
### CVE-2017-3730 (2017-05-04)
<code>
In OpenSSL 1.1.0 before 1.1.0d, if a malicious server supplies bad parameters for a DHE or ECDHE key exchange then this can result in the client attempting to dereference a NULL pointer leading to a client crash. This could be exploited in a Denial of Service attack.
</code>
- [guidovranken/CVE-2017-3730](https://github.com/guidovranken/CVE-2017-3730)
### CVE-2017-3881 (2017-03-17) ### CVE-2017-3881 (2017-03-17)
<code> <code>
@ -12721,9 +12712,7 @@ Multiple cross-site request forgery (CSRF) vulnerabilities on the D-Link DI-524
The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string. The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.
</code> </code>
- [PolarisLab/S2-045](https://github.com/PolarisLab/S2-045)
- [Flyteas/Struts2-045-Exp](https://github.com/Flyteas/Struts2-045-Exp) - [Flyteas/Struts2-045-Exp](https://github.com/Flyteas/Struts2-045-Exp)
- [bongbongco/cve-2017-5638](https://github.com/bongbongco/cve-2017-5638)
- [jas502n/S2-045-EXP-POC-TOOLS](https://github.com/jas502n/S2-045-EXP-POC-TOOLS) - [jas502n/S2-045-EXP-POC-TOOLS](https://github.com/jas502n/S2-045-EXP-POC-TOOLS)
- [mthbernardes/strutszeiro](https://github.com/mthbernardes/strutszeiro) - [mthbernardes/strutszeiro](https://github.com/mthbernardes/strutszeiro)
- [xsscx/cve-2017-5638](https://github.com/xsscx/cve-2017-5638) - [xsscx/cve-2017-5638](https://github.com/xsscx/cve-2017-5638)
@ -18345,7 +18334,7 @@ The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2)
Array index error in the SMBv2 protocol implementation in srv2.sys in Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold and SP2, and Windows 7 RC allows remote attackers to execute arbitrary code or cause a denial of service (system crash) via an &amp; (ampersand) character in a Process ID High header field in a NEGOTIATE PROTOCOL REQUEST packet, which triggers an attempted dereference of an out-of-bounds memory location, aka &quot;SMBv2 Negotiation Vulnerability.&quot; NOTE: some of these details are obtained from third party information. Array index error in the SMBv2 protocol implementation in srv2.sys in Microsoft Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold and SP2, and Windows 7 RC allows remote attackers to execute arbitrary code or cause a denial of service (system crash) via an &amp; (ampersand) character in a Process ID High header field in a NEGOTIATE PROTOCOL REQUEST packet, which triggers an attempted dereference of an out-of-bounds memory location, aka &quot;SMBv2 Negotiation Vulnerability.&quot; NOTE: some of these details are obtained from third party information.
</code> </code>
- [mazding/ms09050](https://github.com/mazding/ms09050) - [sooklalad/ms09050](https://github.com/sooklalad/ms09050)
### CVE-2009-4092 (2009-11-27) ### CVE-2009-4092 (2009-11-27)