Auto Update 2021/09/17 18:13:02

This commit is contained in:
motikan2010-bot 2021-09-17 18:13:02 +09:00
parent 8467c9f070
commit 12958cd6d5
24 changed files with 146 additions and 112 deletions

View file

@ -133,14 +133,14 @@
"description": "Exploit toolkit CVE-2017-0199 - v2.0 is a handy python script which provides a quick and effective way to exploit Microsoft RTF RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter \/ any other payload to victim without any complex configuration.",
"fork": false,
"created_at": "2017-04-22T04:01:38Z",
"updated_at": "2021-03-11T23:59:40Z",
"updated_at": "2021-09-17T03:35:29Z",
"pushed_at": "2017-04-22T04:01:54Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 13,
"allow_forking": true,
"forks": 13,
"watchers": 7,
"watchers": 8,
"score": 0
},
{

View file

@ -17,9 +17,9 @@
"pushed_at": "2020-06-11T00:16:40Z",
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 52,
"forks_count": 53,
"allow_forking": true,
"forks": 52,
"forks": 53,
"watchers": 34,
"score": 0
}

View file

@ -589,14 +589,14 @@
"description": " (CVE-2017-10271)Java反序列化漏洞",
"fork": false,
"created_at": "2019-11-05T13:33:56Z",
"updated_at": "2020-07-03T04:06:16Z",
"updated_at": "2021-09-17T05:08:34Z",
"pushed_at": "2019-11-05T13:35:14Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"allow_forking": true,
"forks": 2,
"watchers": 2,
"watchers": 3,
"score": 0
},
{

View file

@ -89,9 +89,9 @@
"pushed_at": "2019-06-06T14:53:51Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"forks": 3,
"forks": 4,
"watchers": 3,
"score": 0
},

View file

@ -37,14 +37,14 @@
"description": "A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.",
"fork": false,
"created_at": "2018-02-08T15:52:50Z",
"updated_at": "2021-06-29T22:55:53Z",
"updated_at": "2021-09-17T06:17:10Z",
"pushed_at": "2018-11-23T11:47:10Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 17,
"allow_forking": true,
"forks": 17,
"watchers": 41,
"watchers": 42,
"score": 0
}
]

View file

@ -65,9 +65,9 @@
"pushed_at": "2020-08-18T00:00:15Z",
"stargazers_count": 468,
"watchers_count": 468,
"forks_count": 165,
"forks_count": 166,
"allow_forking": true,
"forks": 165,
"forks": 166,
"watchers": 468,
"score": 0
},
@ -85,14 +85,14 @@
"description": "Multi-threaded, IPv6 aware, wordlists\/single-user username enumeration via CVE-2018-15473",
"fork": false,
"created_at": "2018-10-03T10:18:04Z",
"updated_at": "2021-08-25T09:48:04Z",
"updated_at": "2021-09-17T07:46:08Z",
"pushed_at": "2019-03-24T11:20:27Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 12,
"allow_forking": true,
"forks": 12,
"watchers": 23,
"watchers": 24,
"score": 0
},
{

View file

@ -41,9 +41,9 @@
"pushed_at": "2019-02-22T07:47:26Z",
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 14,
"forks_count": 15,
"allow_forking": true,
"forks": 14,
"forks": 15,
"watchers": 25,
"score": 0
},

View file

@ -137,9 +137,9 @@
"pushed_at": "2021-01-01T06:10:58Z",
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 12,
"forks_count": 13,
"allow_forking": true,
"forks": 12,
"forks": 13,
"watchers": 67,
"score": 0
}

View file

@ -37,14 +37,14 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-09-16T13:34:25Z",
"updated_at": "2021-09-17T07:47:57Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2871,
"watchers_count": 2871,
"stargazers_count": 2873,
"watchers_count": 2873,
"forks_count": 839,
"allow_forking": true,
"forks": 839,
"watchers": 2871,
"watchers": 2873,
"score": 0
},
{

View file

@ -65,9 +65,9 @@
"pushed_at": "2020-01-22T20:23:51Z",
"stargazers_count": 532,
"watchers_count": 532,
"forks_count": 129,
"forks_count": 130,
"allow_forking": true,
"forks": 129,
"forks": 130,
"watchers": 532,
"score": 0
},

26
2019/CVE-2019-6260.json Normal file
View file

@ -0,0 +1,26 @@
[
{
"id": 369476141,
"name": "cve-2019-6260",
"full_name": "nikitapbst\/cve-2019-6260",
"owner": {
"login": "nikitapbst",
"id": 76496360,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76496360?v=4",
"html_url": "https:\/\/github.com\/nikitapbst"
},
"html_url": "https:\/\/github.com\/nikitapbst\/cve-2019-6260",
"description": null,
"fork": false,
"created_at": "2021-05-21T09:01:05Z",
"updated_at": "2021-09-17T07:55:05Z",
"pushed_at": "2021-05-21T09:02:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,14 +13,14 @@
"description": "Exploits for Android Binder bug CVE-2020-0041",
"fork": false,
"created_at": "2020-03-31T17:53:57Z",
"updated_at": "2021-09-09T06:30:53Z",
"updated_at": "2021-09-17T05:46:36Z",
"pushed_at": "2020-04-08T08:55:30Z",
"stargazers_count": 173,
"watchers_count": 173,
"forks_count": 55,
"stargazers_count": 174,
"watchers_count": 174,
"forks_count": 56,
"allow_forking": true,
"forks": 55,
"watchers": 173,
"forks": 56,
"watchers": 174,
"score": 0
},
{

View file

@ -13,14 +13,14 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-09-16T13:34:25Z",
"updated_at": "2021-09-17T07:47:57Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2871,
"watchers_count": 2871,
"stargazers_count": 2873,
"watchers_count": 2873,
"forks_count": 839,
"allow_forking": true,
"forks": 839,
"watchers": 2871,
"watchers": 2873,
"score": 0
},
{

View file

@ -17,9 +17,9 @@
"pushed_at": "2021-09-06T15:05:21Z",
"stargazers_count": 285,
"watchers_count": 285,
"forks_count": 25,
"forks_count": 26,
"allow_forking": true,
"forks": 25,
"forks": 26,
"watchers": 285,
"score": 0
}

View file

@ -65,9 +65,9 @@
"pushed_at": "2020-02-23T17:06:06Z",
"stargazers_count": 80,
"watchers_count": 80,
"forks_count": 58,
"forks_count": 59,
"allow_forking": true,
"forks": 58,
"forks": 59,
"watchers": 80,
"score": 0
},

View file

@ -37,14 +37,14 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2021-09-17T01:59:32Z",
"updated_at": "2021-09-17T04:04:16Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1376,
"watchers_count": 1376,
"stargazers_count": 1377,
"watchers_count": 1377,
"forks_count": 501,
"allow_forking": true,
"forks": 501,
"watchers": 1376,
"watchers": 1377,
"score": 0
},
{
@ -493,14 +493,14 @@
"description": "Youtube : https:\/\/youtu.be\/Zr0KjYDSFKQ",
"fork": false,
"created_at": "2021-07-04T09:50:39Z",
"updated_at": "2021-08-31T12:34:53Z",
"updated_at": "2021-09-17T08:02:28Z",
"pushed_at": "2021-07-04T09:57:46Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0
},
{
@ -541,14 +541,14 @@
"description": "CVE-2021-1675 (PrintNightmare)",
"fork": false,
"created_at": "2021-07-05T14:17:03Z",
"updated_at": "2021-09-13T13:55:45Z",
"updated_at": "2021-09-17T03:54:34Z",
"pushed_at": "2021-07-05T14:34:34Z",
"stargazers_count": 55,
"watchers_count": 55,
"stargazers_count": 56,
"watchers_count": 56,
"forks_count": 22,
"allow_forking": true,
"forks": 22,
"watchers": 55,
"watchers": 56,
"score": 0
},
{

View file

@ -13,14 +13,14 @@
"description": "CVE-2021-1732 Exploit",
"fork": false,
"created_at": "2021-03-05T02:11:10Z",
"updated_at": "2021-09-14T06:42:41Z",
"updated_at": "2021-09-17T08:02:26Z",
"pushed_at": "2021-03-05T03:10:26Z",
"stargazers_count": 333,
"watchers_count": 333,
"stargazers_count": 334,
"watchers_count": 334,
"forks_count": 84,
"allow_forking": true,
"forks": 84,
"watchers": 333,
"watchers": 334,
"score": 0
},
{
@ -133,14 +133,14 @@
"description": "Read my blog for more info - ",
"fork": false,
"created_at": "2021-04-25T12:55:15Z",
"updated_at": "2021-08-31T12:34:52Z",
"updated_at": "2021-09-17T08:02:27Z",
"pushed_at": "2021-04-27T21:13:18Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 7,
"allow_forking": true,
"forks": 7,
"watchers": 10,
"watchers": 11,
"score": 0
}
]

View file

@ -109,14 +109,14 @@
"description": "Confluence Server Webwork OGNL injection",
"fork": false,
"created_at": "2021-09-01T07:15:17Z",
"updated_at": "2021-09-16T11:33:05Z",
"updated_at": "2021-09-17T09:09:18Z",
"pushed_at": "2021-09-10T19:42:33Z",
"stargazers_count": 213,
"watchers_count": 213,
"forks_count": 50,
"stargazers_count": 216,
"watchers_count": 216,
"forks_count": 51,
"allow_forking": true,
"forks": 50,
"watchers": 213,
"forks": 51,
"watchers": 216,
"score": 0
},
{
@ -209,9 +209,9 @@
"pushed_at": "2021-09-02T07:09:08Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"forks": 2,
"forks": 3,
"watchers": 3,
"score": 0
},

View file

@ -397,14 +397,14 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2021-09-16T12:47:32Z",
"updated_at": "2021-09-17T09:11:31Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 761,
"watchers_count": 761,
"stargazers_count": 762,
"watchers_count": 762,
"forks_count": 220,
"allow_forking": true,
"forks": 220,
"watchers": 761,
"watchers": 762,
"score": 0
},
{

View file

@ -13,14 +13,14 @@
"description": null,
"fork": false,
"created_at": "2021-07-13T06:15:21Z",
"updated_at": "2021-09-16T08:33:27Z",
"updated_at": "2021-09-17T08:33:36Z",
"pushed_at": "2021-07-13T06:16:11Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 1,
"allow_forking": true,
"forks": 1,
"watchers": 26,
"watchers": 28,
"score": 0
}
]

View file

@ -13,8 +13,8 @@
"description": "TP Seguridad Informática",
"fork": false,
"created_at": "2021-09-09T12:55:55Z",
"updated_at": "2021-09-09T12:56:56Z",
"pushed_at": "2021-09-09T12:56:53Z",
"updated_at": "2021-09-17T03:34:31Z",
"pushed_at": "2021-09-17T03:34:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -37,14 +37,14 @@
"description": "Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)",
"fork": false,
"created_at": "2021-09-16T02:11:36Z",
"updated_at": "2021-09-17T03:03:02Z",
"updated_at": "2021-09-17T09:10:06Z",
"pushed_at": "2021-09-16T10:39:04Z",
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 11,
"stargazers_count": 60,
"watchers_count": 60,
"forks_count": 18,
"allow_forking": true,
"forks": 11,
"watchers": 37,
"forks": 18,
"watchers": 60,
"score": 0
},
{
@ -65,9 +65,9 @@
"pushed_at": "2021-09-16T14:50:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"forks": 1,
"forks": 2,
"watchers": 0,
"score": 0
}

View file

@ -205,14 +205,14 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2021-09-17T03:18:54Z",
"updated_at": "2021-09-17T09:01:20Z",
"pushed_at": "2021-09-11T09:50:26Z",
"stargazers_count": 1078,
"watchers_count": 1078,
"forks_count": 350,
"stargazers_count": 1091,
"watchers_count": 1091,
"forks_count": 351,
"allow_forking": true,
"forks": 350,
"watchers": 1078,
"forks": 351,
"watchers": 1091,
"score": 0
},
{
@ -373,14 +373,14 @@
"description": "This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit",
"fork": false,
"created_at": "2021-09-12T18:05:53Z",
"updated_at": "2021-09-17T01:53:57Z",
"updated_at": "2021-09-17T07:35:23Z",
"pushed_at": "2021-09-15T16:34:35Z",
"stargazers_count": 143,
"watchers_count": 143,
"stargazers_count": 144,
"watchers_count": 144,
"forks_count": 38,
"allow_forking": true,
"forks": 38,
"watchers": 143,
"watchers": 144,
"score": 0
},
{
@ -445,14 +445,14 @@
"description": null,
"fork": false,
"created_at": "2021-09-14T17:10:48Z",
"updated_at": "2021-09-16T02:05:47Z",
"updated_at": "2021-09-17T08:01:45Z",
"pushed_at": "2021-09-14T17:19:26Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 4,
"allow_forking": true,
"forks": 4,
"watchers": 12,
"watchers": 13,
"score": 0
},
{
@ -469,14 +469,14 @@
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
"fork": false,
"created_at": "2021-09-15T22:34:35Z",
"updated_at": "2021-09-17T03:11:22Z",
"updated_at": "2021-09-17T09:13:03Z",
"pushed_at": "2021-09-16T11:16:34Z",
"stargazers_count": 89,
"watchers_count": 89,
"forks_count": 22,
"stargazers_count": 134,
"watchers_count": 134,
"forks_count": 28,
"allow_forking": true,
"forks": 22,
"watchers": 89,
"forks": 28,
"watchers": 134,
"score": 0
},
{

View file

@ -8070,6 +8070,14 @@ An issue was discovered in HuCart v5.7.4. There is a CSRF vulnerability that can
- [NMTech0x90/CVE-2019-6249_Hucart-cms](https://github.com/NMTech0x90/CVE-2019-6249_Hucart-cms)
### CVE-2019-6260 (2019-01-22)
<code>
The ASPEED ast2400 and ast2500 Baseband Management Controller (BMC) hardware and firmware implement Advanced High-performance Bus (AHB) bridges, which allow arbitrary read and write access to the BMC's physical address space from the host (or from the network in unusual cases where the BMC console uart is attached to a serial concentrator). This CVE applies to the specific cases of iLPC2AHB bridge Pt I, iLPC2AHB bridge Pt II, PCIe VGA P2A bridge, DMA from/to arbitrary BMC memory via X-DMA, UART-based SoC Debug interface, LPC2AHB bridge, PCIe BMC P2A bridge, and Watchdog setup.
</code>
- [nikitapbst/cve-2019-6260](https://github.com/nikitapbst/cve-2019-6260)
### CVE-2019-6263 (2019-01-16)
<code>