Auto Update 2021/03/16 00:09:38

This commit is contained in:
motikan2010-bot 2021-03-16 00:09:38 +09:00
parent c3f08d39ca
commit fb4ecfe1f2
32 changed files with 176 additions and 152 deletions

View file

@ -17,8 +17,8 @@
"pushed_at": "2017-04-24T14:16:56Z",
"stargazers_count": 288,
"watchers_count": 288,
"forks_count": 90,
"forks": 90,
"forks_count": 91,
"forks": 91,
"watchers": 288,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "A checker (site and tool) for CVE-2014-0160",
"fork": false,
"created_at": "2014-04-07T23:03:09Z",
"updated_at": "2021-03-09T02:51:38Z",
"updated_at": "2021-03-15T09:18:22Z",
"pushed_at": "2021-02-24T09:17:24Z",
"stargazers_count": 2249,
"watchers_count": 2249,
"stargazers_count": 2250,
"watchers_count": 2250,
"forks_count": 485,
"forks": 485,
"watchers": 2249,
"watchers": 2250,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-12T17:49:15Z",
"updated_at": "2021-03-15T14:55:25Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 949,
"watchers_count": 949,
"stargazers_count": 950,
"watchers_count": 950,
"forks_count": 222,
"forks": 222,
"watchers": 949,
"watchers": 950,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-12T17:49:15Z",
"updated_at": "2021-03-15T14:55:25Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 949,
"watchers_count": 949,
"stargazers_count": 950,
"watchers_count": 950,
"forks_count": 222,
"forks": 222,
"watchers": 949,
"watchers": 950,
"score": 0
},
{

View file

@ -86,8 +86,8 @@
"pushed_at": "2018-07-13T18:56:53Z",
"stargazers_count": 130,
"watchers_count": 130,
"forks_count": 49,
"forks": 49,
"forks_count": 50,
"forks": 50,
"watchers": 130,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-12T17:49:15Z",
"updated_at": "2021-03-15T14:55:25Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 949,
"watchers_count": 949,
"stargazers_count": 950,
"watchers_count": 950,
"forks_count": 222,
"forks": 222,
"watchers": 949,
"watchers": 950,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC",
"fork": false,
"created_at": "2017-04-10T03:44:04Z",
"updated_at": "2021-03-05T02:06:40Z",
"updated_at": "2021-03-15T14:23:27Z",
"pushed_at": "2017-04-12T09:17:27Z",
"stargazers_count": 173,
"watchers_count": 173,
"stargazers_count": 180,
"watchers_count": 180,
"forks_count": 81,
"forks": 81,
"watchers": 173,
"watchers": 180,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "Laravel-PHP-Unit-RCE (CVE-2018-15133) Auto Exploiter and Shell Uploader",
"fork": false,
"created_at": "2020-04-05T04:54:40Z",
"updated_at": "2020-10-09T15:30:18Z",
"updated_at": "2021-03-15T12:02:26Z",
"pushed_at": "2020-10-09T15:30:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0
},
{

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-12T17:49:15Z",
"updated_at": "2021-03-15T14:55:25Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 949,
"watchers_count": 949,
"stargazers_count": 950,
"watchers_count": 950,
"forks_count": 222,
"forks": 222,
"watchers": 949,
"watchers": 950,
"score": 0
},
{

View file

@ -270,8 +270,8 @@
"pushed_at": "2018-04-26T15:40:28Z",
"stargazers_count": 82,
"watchers_count": 82,
"forks_count": 42,
"forks": 42,
"forks_count": 43,
"forks": 43,
"watchers": 82,
"score": 0
},

View file

@ -59,13 +59,13 @@
"description": "CVE-2018-8581",
"fork": false,
"created_at": "2019-01-24T06:08:23Z",
"updated_at": "2021-03-04T04:27:31Z",
"updated_at": "2021-03-15T09:54:03Z",
"pushed_at": "2019-06-21T11:29:41Z",
"stargazers_count": 312,
"watchers_count": 312,
"stargazers_count": 313,
"watchers_count": 313,
"forks_count": 67,
"forks": 67,
"watchers": 312,
"watchers": 313,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Implements the POP\/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS). ",
"fork": false,
"created_at": "2018-05-10T20:46:30Z",
"updated_at": "2021-03-15T08:19:44Z",
"updated_at": "2021-03-15T13:20:21Z",
"pushed_at": "2018-05-10T20:47:59Z",
"stargazers_count": 73,
"watchers_count": 73,
"stargazers_count": 74,
"watchers_count": 74,
"forks_count": 29,
"forks": 29,
"watchers": 73,
"watchers": 74,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "Arbitrary code execution with kernel privileges using CVE-2018-8897.",
"fork": false,
"created_at": "2018-05-13T19:34:17Z",
"updated_at": "2021-03-15T07:31:58Z",
"updated_at": "2021-03-15T15:00:53Z",
"pushed_at": "2018-05-18T12:26:53Z",
"stargazers_count": 389,
"watchers_count": 389,
"stargazers_count": 390,
"watchers_count": 390,
"forks_count": 109,
"forks": 109,
"watchers": 389,
"watchers": 390,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "Implements the POP\/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).",
"fork": false,
"created_at": "2018-08-08T20:04:56Z",
"updated_at": "2021-03-15T07:42:25Z",
"updated_at": "2021-03-15T13:20:03Z",
"pushed_at": "2018-08-08T20:12:20Z",
"stargazers_count": 107,
"watchers_count": 107,
"stargazers_count": 108,
"watchers_count": 108,
"forks_count": 25,
"forks": 25,
"watchers": 107,
"watchers": 108,
"score": 0
}
]

View file

@ -63,8 +63,8 @@
"pushed_at": "2019-10-18T14:49:10Z",
"stargazers_count": 91,
"watchers_count": 91,
"forks_count": 65,
"forks": 65,
"forks_count": 64,
"forks": 64,
"watchers": 91,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "CVE-2021-1994、CVE-2021-2047、CVE-2021-2064、CVE-2021-2108、CVE-2021-2075、CVE-2019-17195、CVE-2020-14756、CVE-2021-2109",
"fork": false,
"created_at": "2021-02-04T07:03:56Z",
"updated_at": "2021-03-11T22:00:26Z",
"updated_at": "2021-03-15T09:36:06Z",
"pushed_at": "2021-02-04T07:12:29Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-03-14T10:45:14Z",
"updated_at": "2021-03-15T15:09:26Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2393,
"watchers_count": 2393,
"stargazers_count": 2395,
"watchers_count": 2395,
"forks_count": 686,
"forks": 686,
"watchers": 2393,
"watchers": 2395,
"score": 0
},
{

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-12T17:49:15Z",
"updated_at": "2021-03-15T14:55:25Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 949,
"watchers_count": 949,
"stargazers_count": 950,
"watchers_count": 950,
"forks_count": 222,
"forks": 222,
"watchers": 949,
"watchers": 950,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "This repo contains a proof-of-concept for 📱🚀👑⚡, a deserialization vuln for local escalation of privilege to system_server in Android 10. This proof-of-concept only activates a privileged intent.",
"fork": false,
"created_at": "2021-02-23T14:00:55Z",
"updated_at": "2021-03-05T05:55:15Z",
"updated_at": "2021-03-15T13:59:58Z",
"pushed_at": "2021-02-23T14:03:00Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 1,
"forks": 1,
"watchers": 15,
"watchers": 16,
"score": 0
}
]

View file

@ -59,8 +59,8 @@
"description": "CVE-2020-0096-StrandHogg2 复现",
"fork": false,
"created_at": "2020-09-07T10:25:25Z",
"updated_at": "2020-11-25T07:25:14Z",
"pushed_at": "2020-09-16T03:15:30Z",
"updated_at": "2021-03-15T11:14:21Z",
"pushed_at": "2021-03-15T11:14:18Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 3,

View file

@ -385,8 +385,8 @@
"pushed_at": "2021-01-04T10:49:21Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 3,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2021-03-11T01:02:13Z",
"updated_at": "2021-03-15T14:13:44Z",
"pushed_at": "2020-09-11T07:38:22Z",
"stargazers_count": 510,
"watchers_count": 510,
"stargazers_count": 509,
"watchers_count": 509,
"forks_count": 125,
"forks": 125,
"watchers": 510,
"watchers": 509,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-06-25T07:49:34Z",
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 15,
"forks": 15,
"forks_count": 16,
"forks": 16,
"watchers": 51,
"score": 0
}

View file

@ -1094,8 +1094,8 @@
"description": "Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example",
"fork": false,
"created_at": "2021-01-20T21:38:47Z",
"updated_at": "2021-03-14T04:51:17Z",
"pushed_at": "2021-02-17T01:44:34Z",
"updated_at": "2021-03-15T12:02:55Z",
"pushed_at": "2021-03-15T12:02:53Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,

View file

@ -36,13 +36,13 @@
"description": "CVE-2021-1994、CVE-2021-2047、CVE-2021-2064、CVE-2021-2108、CVE-2021-2075、CVE-2019-17195、CVE-2020-14756、CVE-2021-2109",
"fork": false,
"created_at": "2021-02-04T07:03:56Z",
"updated_at": "2021-03-11T22:00:26Z",
"updated_at": "2021-03-15T09:36:06Z",
"pushed_at": "2021-02-04T07:12:29Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-03-14T10:45:14Z",
"updated_at": "2021-03-15T15:09:26Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2393,
"watchers_count": 2393,
"stargazers_count": 2395,
"watchers_count": 2395,
"forks_count": 686,
"forks": 686,
"watchers": 2393,
"watchers": 2395,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-12T17:49:15Z",
"updated_at": "2021-03-15T14:55:25Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 949,
"watchers_count": 949,
"stargazers_count": 950,
"watchers_count": 950,
"forks_count": 222,
"forks": 222,
"watchers": 949,
"watchers": 950,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞一键注册蚁剑filter内存shell",
"fork": false,
"created_at": "2020-08-19T03:34:06Z",
"updated_at": "2021-03-12T06:23:04Z",
"updated_at": "2021-03-15T12:34:34Z",
"pushed_at": "2020-08-25T03:17:32Z",
"stargazers_count": 216,
"watchers_count": 216,
"stargazers_count": 217,
"watchers_count": 217,
"forks_count": 33,
"forks": 33,
"watchers": 216,
"watchers": 217,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-02-15T04:14:12Z",
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 4,
"forks": 4,
"forks_count": 5,
"forks": 5,
"watchers": 24,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "CVE-2021-1732 Exploit",
"fork": false,
"created_at": "2021-03-05T02:11:10Z",
"updated_at": "2021-03-15T08:10:45Z",
"updated_at": "2021-03-15T12:13:29Z",
"pushed_at": "2021-03-05T03:10:26Z",
"stargazers_count": 237,
"watchers_count": 237,
"stargazers_count": 238,
"watchers_count": 238,
"forks_count": 48,
"forks": 48,
"watchers": 237,
"watchers": 238,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2021-1994、CVE-2021-2047、CVE-2021-2064、CVE-2021-2108、CVE-2021-2075、CVE-2019-17195、CVE-2020-14756、CVE-2021-2109",
"fork": false,
"created_at": "2021-02-04T07:03:56Z",
"updated_at": "2021-03-11T22:00:26Z",
"updated_at": "2021-03-15T09:36:06Z",
"pushed_at": "2021-02-04T07:12:29Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -13,8 +13,8 @@
"description": "IoC determination for exploitation of CVE-2021-26855, CVE-2021-26857, CVE-2021-26858 and CVE-2021-27065.",
"fork": false,
"created_at": "2021-03-03T14:50:16Z",
"updated_at": "2021-03-14T19:35:23Z",
"pushed_at": "2021-03-14T19:35:21Z",
"updated_at": "2021-03-15T11:42:08Z",
"pushed_at": "2021-03-15T11:42:06Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 4,
@ -36,13 +36,13 @@
"description": "A PowerShell script to identify indicators of exploitation of CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-26865",
"fork": false,
"created_at": "2021-03-03T17:36:18Z",
"updated_at": "2021-03-15T00:24:34Z",
"updated_at": "2021-03-15T12:58:38Z",
"pushed_at": "2021-03-05T17:09:01Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 1,
"forks": 1,
"watchers": 13,
"watchers": 14,
"score": 0
},
{
@ -63,8 +63,8 @@
"pushed_at": "2021-03-13T17:47:07Z",
"stargazers_count": 77,
"watchers_count": 77,
"forks_count": 15,
"forks": 15,
"forks_count": 16,
"forks": 16,
"watchers": 77,
"score": 0
},
@ -128,13 +128,13 @@
"description": "PoC for CVE-2021-26855 -Just a checker-",
"fork": false,
"created_at": "2021-03-06T23:12:22Z",
"updated_at": "2021-03-13T19:43:13Z",
"updated_at": "2021-03-15T13:30:46Z",
"pushed_at": "2021-03-09T22:07:46Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 2,
"forks": 2,
"watchers": 10,
"watchers": 11,
"score": 0
},
{
@ -174,8 +174,8 @@
"description": "Module pack for #ProxyLogon (part. of my contribute for Metasploit-Framework) [CVE-2021-26855 && CVE-2021-27065]",
"fork": false,
"created_at": "2021-03-07T12:12:16Z",
"updated_at": "2021-03-14T22:20:53Z",
"pushed_at": "2021-03-14T21:26:56Z",
"updated_at": "2021-03-15T12:12:18Z",
"pushed_at": "2021-03-15T12:12:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
@ -220,13 +220,13 @@
"description": "CVE-2021-26855 exp",
"fork": false,
"created_at": "2021-03-08T08:39:05Z",
"updated_at": "2021-03-15T02:54:30Z",
"updated_at": "2021-03-15T13:14:48Z",
"pushed_at": "2021-03-08T08:09:01Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 66,
"forks": 66,
"watchers": 66,
"watchers": 67,
"score": 0
},
{
@ -243,13 +243,13 @@
"description": "A fast tool to mass scan for a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin (CVE-2021-26855).",
"fork": false,
"created_at": "2021-03-08T11:54:32Z",
"updated_at": "2021-03-15T08:04:45Z",
"updated_at": "2021-03-15T12:03:29Z",
"pushed_at": "2021-03-08T14:50:48Z",
"stargazers_count": 102,
"watchers_count": 102,
"stargazers_count": 103,
"watchers_count": 103,
"forks_count": 12,
"forks": 12,
"watchers": 102,
"watchers": 103,
"score": 0
},
{
@ -362,8 +362,8 @@
"pushed_at": "2021-03-09T16:56:09Z",
"stargazers_count": 66,
"watchers_count": 66,
"forks_count": 50,
"forks": 50,
"forks_count": 51,
"forks": 51,
"watchers": 66,
"score": 0
},
@ -431,8 +431,8 @@
"pushed_at": "2021-03-14T23:51:37Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 5,
"score": 0
},
@ -450,13 +450,13 @@
"description": "PoC of proxylogon chain SSRF(CVE-2021-26855) to write file by testanull, censored by github",
"fork": false,
"created_at": "2021-03-11T20:51:48Z",
"updated_at": "2021-03-15T06:48:02Z",
"updated_at": "2021-03-15T11:21:18Z",
"pushed_at": "2021-03-11T20:58:08Z",
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 18,
"forks": 18,
"watchers": 37,
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 20,
"forks": 20,
"watchers": 38,
"score": 0
},
{
@ -519,13 +519,13 @@
"description": "CVE-2021-26855: PoC (Not a HoneyPoC for once!)",
"fork": false,
"created_at": "2021-03-14T14:23:34Z",
"updated_at": "2021-03-15T02:07:50Z",
"pushed_at": "2021-03-14T21:55:29Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 2,
"forks": 2,
"watchers": 8,
"updated_at": "2021-03-15T13:25:25Z",
"pushed_at": "2021-03-15T13:55:13Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 4,
"forks": 4,
"watchers": 11,
"score": 0
},
{
@ -542,13 +542,36 @@
"description": "RCE exploit for ProxyLogon vulnerability in Microsoft Exchange",
"fork": false,
"created_at": "2021-03-14T22:57:21Z",
"updated_at": "2021-03-15T01:30:59Z",
"updated_at": "2021-03-15T10:14:58Z",
"pushed_at": "2021-03-14T23:03:12Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 3,
"forks": 3,
"watchers": 2,
"score": 0
},
{
"id": 347992754,
"name": "CVE-2021-26855-d",
"full_name": "Mr-xn\/CVE-2021-26855-d",
"owner": {
"login": "Mr-xn",
"id": 18260135,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4",
"html_url": "https:\/\/github.com\/Mr-xn"
},
"html_url": "https:\/\/github.com\/Mr-xn\/CVE-2021-26855-d",
"description": null,
"fork": false,
"created_at": "2021-03-15T14:03:16Z",
"updated_at": "2021-03-15T14:49:10Z",
"pushed_at": "2021-03-15T14:08:16Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -381,7 +381,7 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2021-03-14T19:57:44Z",
"updated_at": "2021-03-15T13:45:16Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 646,
"watchers_count": 646,

View file

@ -408,6 +408,7 @@ Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is uni
- [KotSec/CVE-2021-26855-Scanner](https://github.com/KotSec/CVE-2021-26855-Scanner)
- [ZephrFish/Exch-CVE-2021-26855](https://github.com/ZephrFish/Exch-CVE-2021-26855)
- [mil1200/ProxyLogon-CVE-2021-26855](https://github.com/mil1200/ProxyLogon-CVE-2021-26855)
- [Mr-xn/CVE-2021-26855-d](https://github.com/Mr-xn/CVE-2021-26855-d)
### CVE-2021-26857 (2021-03-02)