Auto Update 2021/04/01 00:11:14

This commit is contained in:
motikan2010-bot 2021-04-01 00:11:14 +09:00
parent 25209d0503
commit 0c3e692625
35 changed files with 207 additions and 146 deletions

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-30T08:47:45Z",
"updated_at": "2021-03-31T12:06:16Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 978,
"watchers_count": 978,
"stargazers_count": 980,
"watchers_count": 980,
"forks_count": 226,
"forks": 226,
"watchers": 978,
"watchers": 980,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-30T08:47:45Z",
"updated_at": "2021-03-31T12:06:16Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 978,
"watchers_count": 978,
"stargazers_count": 980,
"watchers_count": 980,
"forks_count": 226,
"forks": 226,
"watchers": 978,
"watchers": 980,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-07-23T19:24:01Z",
"stargazers_count": 276,
"watchers_count": 276,
"forks_count": 109,
"forks": 109,
"forks_count": 110,
"forks": 110,
"watchers": 276,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-30T08:47:45Z",
"updated_at": "2021-03-31T12:06:16Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 978,
"watchers_count": 978,
"stargazers_count": 980,
"watchers_count": 980,
"forks_count": 226,
"forks": 226,
"watchers": 978,
"watchers": 980,
"score": 0
}
]

View file

@ -68,29 +68,6 @@
"watchers": 11,
"score": 0
},
{
"id": 116402577,
"name": "cve-2017-5753",
"full_name": "xsscx\/cve-2017-5753",
"owner": {
"login": "xsscx",
"id": 10790582,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10790582?v=4",
"html_url": "https:\/\/github.com\/xsscx"
},
"html_url": "https:\/\/github.com\/xsscx\/cve-2017-5753",
"description": "OSX 10.13.2, CVE-2017-5753, Spectre, PoC, C, ASM for OSX, MAC, Intel Arch, Proof of Concept, Hopper.App Output",
"fork": false,
"created_at": "2018-01-05T16:05:05Z",
"updated_at": "2019-12-01T20:12:59Z",
"pushed_at": "2018-01-06T13:06:25Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 2,
"forks": 2,
"watchers": 12,
"score": 0
},
{
"id": 116442461,
"name": "spectre-attack-demo",
@ -137,6 +114,29 @@
"watchers": 7,
"score": 0
},
{
"id": 116532057,
"name": "cve-2017-5753",
"full_name": "albertleecn\/cve-2017-5753",
"owner": {
"login": "albertleecn",
"id": 4608961,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4608961?v=4",
"html_url": "https:\/\/github.com\/albertleecn"
},
"html_url": "https:\/\/github.com\/albertleecn\/cve-2017-5753",
"description": "OSX 10.13.2, CVE-2017-5753, Spectre, PoC, C, ASM for OSX, MAC, Intel Arch, Proof of Concept, Hopper.App Output",
"fork": false,
"created_at": "2018-01-07T02:46:38Z",
"updated_at": "2021-03-31T12:50:11Z",
"pushed_at": "2018-01-06T13:06:25Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 263311084,
"name": "Spectre-Vulnerability-CVE-2017-5753-",

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-30T08:47:45Z",
"updated_at": "2021-03-31T12:06:16Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 978,
"watchers_count": 978,
"stargazers_count": 980,
"watchers_count": 980,
"forks_count": 226,
"forks": 226,
"watchers": 978,
"watchers": 980,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "Apache Solr远程代码执行漏洞(CVE-2019-0193) Exploit",
"fork": false,
"created_at": "2019-08-12T07:17:21Z",
"updated_at": "2021-03-26T06:37:25Z",
"updated_at": "2021-03-31T12:40:31Z",
"pushed_at": "2020-07-08T06:51:47Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 11,
"forks": 11,
"watchers": 46,
"watchers": 47,
"score": 0
},
{

View file

@ -1646,8 +1646,8 @@
"description": "CVE-2019-0708批量检测",
"fork": false,
"created_at": "2019-06-11T05:38:26Z",
"updated_at": "2020-12-06T10:24:24Z",
"pushed_at": "2019-06-11T06:40:41Z",
"updated_at": "2021-03-31T10:07:36Z",
"pushed_at": "2021-03-31T10:07:34Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 2,
@ -2409,8 +2409,8 @@
"pushed_at": "2020-01-21T03:15:41Z",
"stargazers_count": 198,
"watchers_count": 198,
"forks_count": 51,
"forks": 51,
"forks_count": 50,
"forks": 50,
"watchers": 198,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Atlassian JIRA Template injection vulnerability RCE",
"fork": false,
"created_at": "2019-07-16T02:27:00Z",
"updated_at": "2021-03-26T09:25:39Z",
"updated_at": "2021-03-31T13:18:00Z",
"pushed_at": "2019-07-22T06:47:52Z",
"stargazers_count": 75,
"watchers_count": 75,
"stargazers_count": 76,
"watchers_count": 76,
"forks_count": 27,
"forks": 27,
"watchers": 75,
"watchers": 76,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-03-31T07:36:03Z",
"updated_at": "2021-03-31T12:20:23Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2451,
"watchers_count": 2451,
"stargazers_count": 2453,
"watchers_count": 2453,
"forks_count": 704,
"forks": 704,
"watchers": 2451,
"watchers": 2453,
"score": 0
},
{

View file

@ -86,8 +86,8 @@
"pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 747,
"watchers_count": 747,
"forks_count": 154,
"forks": 154,
"forks_count": 155,
"forks": 155,
"watchers": 747,
"score": 0
},
@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-30T08:47:45Z",
"updated_at": "2021-03-31T12:06:16Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 978,
"watchers_count": 978,
"stargazers_count": 980,
"watchers_count": 980,
"forks_count": 226,
"forks": 226,
"watchers": 978,
"watchers": 980,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2021-03-01T14:09:02Z",
"updated_at": "2021-03-01T14:10:37Z",
"updated_at": "2021-03-31T13:33:47Z",
"pushed_at": "2021-03-01T14:10:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "kibana < 6.6.0 未授权远程代码命令执行 (Need Timelion And Canvas),CVE-2019-7609",
"fork": false,
"created_at": "2019-10-18T03:25:22Z",
"updated_at": "2021-01-24T09:54:44Z",
"updated_at": "2021-03-31T12:57:07Z",
"pushed_at": "2019-10-22T06:44:20Z",
"stargazers_count": 84,
"watchers_count": 84,
"stargazers_count": 85,
"watchers_count": 85,
"forks_count": 17,
"forks": 17,
"watchers": 84,
"watchers": 85,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "CVE-2020-0022 vulnerability exploitation on Bouygues BBox Miami (Android TV 8.0 - ARM32 Cortex A9)",
"fork": false,
"created_at": "2020-08-24T19:33:10Z",
"updated_at": "2021-03-27T03:16:33Z",
"updated_at": "2021-03-31T14:20:21Z",
"pushed_at": "2021-03-21T20:59:46Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 5,
"forks": 5,
"watchers": 12,
"watchers": 13,
"score": 0
},
{

View file

@ -891,8 +891,8 @@
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1104,
"watchers_count": 1104,
"forks_count": 359,
"forks": 359,
"forks_count": 358,
"forks": 358,
"watchers": 1104,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-02-14T15:08:01Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 13,
"forks": 13,
"forks_count": 14,
"forks": 14,
"watchers": 13,
"score": 0
}

View file

@ -128,13 +128,13 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2021-03-24T02:10:56Z",
"updated_at": "2021-03-31T11:53:46Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 290,
"watchers_count": 290,
"stargazers_count": 291,
"watchers_count": 291,
"forks_count": 95,
"forks": 95,
"watchers": 290,
"watchers": 291,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-03-31T07:36:03Z",
"updated_at": "2021-03-31T12:20:23Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2451,
"watchers_count": 2451,
"stargazers_count": 2453,
"watchers_count": 2453,
"forks_count": 704,
"forks": 704,
"watchers": 2451,
"watchers": 2453,
"score": 0
},
{

View file

@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-03-31T07:34:04Z",
"updated_at": "2021-03-31T15:05:40Z",
"pushed_at": "2021-03-30T04:09:42Z",
"stargazers_count": 285,
"watchers_count": 285,
"stargazers_count": 287,
"watchers_count": 287,
"forks_count": 64,
"forks": 64,
"watchers": 285,
"watchers": 287,
"score": 0
}
]

View file

@ -13,8 +13,8 @@
"description": "CVE-2020-17136 exploit",
"fork": false,
"created_at": "2021-03-18T11:16:36Z",
"updated_at": "2021-03-18T15:11:29Z",
"pushed_at": "2021-03-18T14:41:57Z",
"updated_at": "2021-03-31T14:42:21Z",
"pushed_at": "2021-03-31T14:42:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-03-02T20:25:35Z",
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 23,
"forks": 23,
"forks_count": 24,
"forks": 24,
"watchers": 34,
"score": 0
},
@ -82,13 +82,13 @@
"description": "Cnvd-2020-10487 \/ cve-2020-1938, scanner tool",
"fork": false,
"created_at": "2020-02-20T21:00:15Z",
"updated_at": "2021-03-02T02:08:51Z",
"updated_at": "2021-03-31T12:41:15Z",
"pushed_at": "2020-02-24T12:06:08Z",
"stargazers_count": 209,
"watchers_count": 209,
"stargazers_count": 210,
"watchers_count": 210,
"forks_count": 91,
"forks": 91,
"watchers": 209,
"watchers": 210,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-30T08:47:45Z",
"updated_at": "2021-03-31T12:06:16Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 978,
"watchers_count": 978,
"stargazers_count": 980,
"watchers_count": 980,
"forks_count": 226,
"forks": 226,
"watchers": 978,
"watchers": 980,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞一键注册蚁剑filter内存shell",
"fork": false,
"created_at": "2020-08-19T03:34:06Z",
"updated_at": "2021-03-31T06:15:05Z",
"updated_at": "2021-03-31T10:51:13Z",
"pushed_at": "2020-08-25T03:17:32Z",
"stargazers_count": 229,
"watchers_count": 229,
"stargazers_count": 230,
"watchers_count": 230,
"forks_count": 35,
"forks": 35,
"watchers": 229,
"watchers": 230,
"score": 0
},
{

View file

@ -1006,8 +1006,8 @@
"pushed_at": "2020-07-17T08:09:30Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 2,
"forks": 2,
"forks_count": 1,
"forks": 1,
"watchers": 8,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "tomcat使用了自带session同步功能时不安全的配置没有使用EncryptInterceptor导致存在的反序列化漏洞通过精心构造的数据包 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-94849484是session持久化的洞这个是session集群同步的洞",
"fork": false,
"created_at": "2020-05-19T05:12:53Z",
"updated_at": "2021-02-06T08:49:46Z",
"updated_at": "2021-03-31T12:52:29Z",
"pushed_at": "2020-05-19T05:13:19Z",
"stargazers_count": 197,
"watchers_count": 197,
"stargazers_count": 198,
"watchers_count": 198,
"forks_count": 35,
"forks": 35,
"watchers": 197,
"watchers": 198,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "POC for CVE-2021-1699",
"fork": false,
"created_at": "2021-03-31T08:22:49Z",
"updated_at": "2021-03-31T08:29:25Z",
"updated_at": "2021-03-31T13:35:56Z",
"pushed_at": "2021-03-31T08:29:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"watchers": 4,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "🐱‍💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...",
"fork": false,
"created_at": "2021-03-22T11:53:57Z",
"updated_at": "2021-03-31T07:56:51Z",
"updated_at": "2021-03-31T13:51:22Z",
"pushed_at": "2021-03-22T18:24:20Z",
"stargazers_count": 90,
"watchers_count": 90,
"stargazers_count": 91,
"watchers_count": 91,
"forks_count": 12,
"forks": 12,
"watchers": 90,
"watchers": 91,
"score": 0
}
]

25
2021/CVE-2021-21975.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 353356863,
"name": "VMWare-vRealize-SSRF",
"full_name": "Henry4E36\/VMWare-vRealize-SSRF",
"owner": {
"login": "Henry4E36",
"id": 41940481,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41940481?v=4",
"html_url": "https:\/\/github.com\/Henry4E36"
},
"html_url": "https:\/\/github.com\/Henry4E36\/VMWare-vRealize-SSRF",
"description": "VMWare vRealize SSRF-CVE-2021-21975",
"fork": false,
"created_at": "2021-03-31T12:56:09Z",
"updated_at": "2021-03-31T13:42:25Z",
"pushed_at": "2021-03-31T12:58:15Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "带回显版本的漏洞利用脚本",
"fork": false,
"created_at": "2021-03-05T08:15:27Z",
"updated_at": "2021-03-09T14:42:22Z",
"updated_at": "2021-03-31T12:35:15Z",
"pushed_at": "2021-03-05T11:09:06Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 3,
"forks": 3,
"watchers": 14,
"watchers": 15,
"score": 0
}
]

View file

@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-03-31T07:34:04Z",
"updated_at": "2021-03-31T15:05:40Z",
"pushed_at": "2021-03-30T04:09:42Z",
"stargazers_count": 285,
"watchers_count": 285,
"stargazers_count": 287,
"watchers_count": 287,
"forks_count": 64,
"forks": 64,
"watchers": 285,
"watchers": 287,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.",
"fork": false,
"created_at": "2020-12-31T16:30:02Z",
"updated_at": "2021-03-31T06:35:58Z",
"updated_at": "2021-03-31T11:44:59Z",
"pushed_at": "2021-03-29T12:33:38Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 8,
"forks": 8,
"watchers": 37,
"watchers": 39,
"score": 0
}
]

25
2021/CVE-2021-29386.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 316086221,
"name": "PowerSchool-Grade-Stealer",
"full_name": "Umarovm\/PowerSchool-Grade-Stealer",
"owner": {
"login": "Umarovm",
"id": 25722145,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25722145?v=4",
"html_url": "https:\/\/github.com\/Umarovm"
},
"html_url": "https:\/\/github.com\/Umarovm\/PowerSchool-Grade-Stealer",
"description": "Due to a reflected XSS vulnerability in PowerSchool (CVE-2021-29386), it is possible to view other people's grades just by having them click on a link while they are logged in to PowerSchool. This demonstrates that with a proof-of-concept.",
"fork": false,
"created_at": "2020-11-26T00:43:36Z",
"updated_at": "2021-03-31T12:18:37Z",
"pushed_at": "2021-03-31T12:18:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -381,13 +381,13 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2021-03-29T09:22:16Z",
"updated_at": "2021-03-31T11:19:52Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 662,
"watchers_count": 662,
"stargazers_count": 663,
"watchers_count": 663,
"forks_count": 187,
"forks": 187,
"watchers": 662,
"watchers": 663,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻‍💻",
"fork": false,
"created_at": "2021-03-26T01:09:25Z",
"updated_at": "2021-03-31T08:16:06Z",
"pushed_at": "2021-03-29T13:42:04Z",
"stargazers_count": 148,
"watchers_count": 148,
"updated_at": "2021-03-31T12:00:12Z",
"pushed_at": "2021-03-31T12:00:09Z",
"stargazers_count": 149,
"watchers_count": 149,
"forks_count": 24,
"forks": 24,
"watchers": 148,
"watchers": 149,
"score": 0
}
]

View file

@ -346,6 +346,9 @@ The vSphere Client (HTML5) contains an SSRF (Server Side Request Forgery) vulner
- [freakanonymous/CVE-2021-21973-Automateme](https://github.com/freakanonymous/CVE-2021-21973-Automateme)
### CVE-2021-21975
- [Henry4E36/VMWare-vRealize-SSRF](https://github.com/Henry4E36/VMWare-vRealize-SSRF)
### CVE-2021-21978 (2021-03-03)
<code>
@ -364,7 +367,12 @@ An issue has been discovered in GitLab CE/EE affecting all versions starting fro
- [lyy289065406/CVE-2021-22192](https://github.com/lyy289065406/CVE-2021-22192)
### CVE-2021-22986
### CVE-2021-22986 (2021-03-31)
<code>
On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, and 12.1.x before 12.1.5.3 amd BIG-IQ 7.1.0.x before 7.1.0.3 and 7.0.0.x before 7.0.0.2, the iControl REST interface has an unauthenticated remote command execution vulnerability. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
</code>
- [dorkerdevil/CVE-2021-22986-Poc](https://github.com/dorkerdevil/CVE-2021-22986-Poc)
- [S1xHcL/f5_rce_poc](https://github.com/S1xHcL/f5_rce_poc)
- [Osyanina/westone-CVE-2021-22986-scanner](https://github.com/Osyanina/westone-CVE-2021-22986-scanner)
@ -635,6 +643,9 @@ Sherlock SherlockIM through 2021-03-29 allows Cross Site Scripting (XSS) by leve
- [Security-AVS/CVE-2021-29267](https://github.com/Security-AVS/CVE-2021-29267)
### CVE-2021-29386
- [Umarovm/PowerSchool-Grade-Stealer](https://github.com/Umarovm/PowerSchool-Grade-Stealer)
## 2020
### CVE-2020-0001 (2020-01-08)
@ -12086,9 +12097,9 @@ Systems with microprocessors utilizing speculative execution and branch predicti
- [Eugnis/spectre-attack](https://github.com/Eugnis/spectre-attack)
- [EdwardOwusuAdjei/Spectre-PoC](https://github.com/EdwardOwusuAdjei/Spectre-PoC)
- [poilynx/spectre-attack-example](https://github.com/poilynx/spectre-attack-example)
- [xsscx/cve-2017-5753](https://github.com/xsscx/cve-2017-5753)
- [pedrolucasoliva/spectre-attack-demo](https://github.com/pedrolucasoliva/spectre-attack-demo)
- [ixtal23/spectreScope](https://github.com/ixtal23/spectreScope)
- [albertleecn/cve-2017-5753](https://github.com/albertleecn/cve-2017-5753)
- [sachinthaBS/Spectre-Vulnerability-CVE-2017-5753-](https://github.com/sachinthaBS/Spectre-Vulnerability-CVE-2017-5753-)
### CVE-2017-5754 (2018-01-04)