Auto Update 2023/07/22 18:27:07

This commit is contained in:
motikan2010-bot 2023-07-23 03:27:07 +09:00
parent 7a7ffba831
commit 238e90ef50
22 changed files with 127 additions and 92 deletions

View file

@ -43,10 +43,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-07-22T10:09:50Z",
"updated_at": "2023-07-22T15:01:21Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3814,
"watchers_count": 3814,
"stargazers_count": 3815,
"watchers_count": 3815,
"has_discussions": false,
"forks_count": 1086,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 1086,
"watchers": 3814,
"watchers": 3815,
"score": 0,
"subscribers_count": 154
},

View file

@ -94,7 +94,7 @@
"forks": 66,
"watchers": 152,
"score": 0,
"subscribers_count": 7
"subscribers_count": 8
},
{
"id": 225175128,

View file

@ -168,10 +168,10 @@
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
"fork": false,
"created_at": "2020-01-15T23:07:41Z",
"updated_at": "2023-06-05T16:11:35Z",
"updated_at": "2023-07-22T14:47:04Z",
"pushed_at": "2020-01-20T23:33:19Z",
"stargazers_count": 881,
"watchers_count": 881,
"stargazers_count": 882,
"watchers_count": 882,
"has_discussions": false,
"forks_count": 219,
"allow_forking": true,
@ -182,7 +182,7 @@
],
"visibility": "public",
"forks": 219,
"watchers": 881,
"watchers": 882,
"score": 0,
"subscribers_count": 34
},

View file

@ -133,10 +133,10 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-03-11T15:21:27Z",
"updated_at": "2023-06-25T16:26:58Z",
"updated_at": "2023-07-22T14:45:45Z",
"pushed_at": "2020-10-01T08:36:29Z",
"stargazers_count": 639,
"watchers_count": 639,
"stargazers_count": 640,
"watchers_count": 640,
"has_discussions": false,
"forks_count": 204,
"allow_forking": true,
@ -147,7 +147,7 @@
],
"visibility": "public",
"forks": 204,
"watchers": 639,
"watchers": 640,
"score": 0,
"subscribers_count": 27
},

View file

@ -43,10 +43,10 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2023-07-21T14:55:06Z",
"updated_at": "2023-07-22T16:39:11Z",
"pushed_at": "2023-07-20T10:51:42Z",
"stargazers_count": 1612,
"watchers_count": 1612,
"stargazers_count": 1613,
"watchers_count": 1613,
"has_discussions": false,
"forks_count": 359,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 359,
"watchers": 1612,
"watchers": 1613,
"score": 0,
"subscribers_count": 90
},

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-07-22T10:09:50Z",
"updated_at": "2023-07-22T15:01:21Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3814,
"watchers_count": 3814,
"stargazers_count": 3815,
"watchers_count": 3815,
"has_discussions": false,
"forks_count": 1086,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1086,
"watchers": 3814,
"watchers": 3815,
"score": 0,
"subscribers_count": 154
},

View file

@ -103,10 +103,10 @@
"description": "Cnvd-2020-10487 \/ cve-2020-1938, scanner tool",
"fork": false,
"created_at": "2020-02-20T21:00:15Z",
"updated_at": "2023-07-16T06:15:36Z",
"updated_at": "2023-07-22T17:19:36Z",
"pushed_at": "2021-11-26T07:40:35Z",
"stargazers_count": 288,
"watchers_count": 288,
"stargazers_count": 287,
"watchers_count": 287,
"has_discussions": false,
"forks_count": 102,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 102,
"watchers": 288,
"watchers": 287,
"score": 0,
"subscribers_count": 7
},

View file

@ -938,10 +938,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2023-07-21T14:20:11Z",
"updated_at": "2023-07-22T14:47:16Z",
"pushed_at": "2022-06-21T14:52:05Z",
"stargazers_count": 809,
"watchers_count": 809,
"stargazers_count": 810,
"watchers_count": 810,
"has_discussions": false,
"forks_count": 167,
"allow_forking": true,
@ -952,7 +952,7 @@
],
"visibility": "public",
"forks": 167,
"watchers": 809,
"watchers": 810,
"score": 0,
"subscribers_count": 13
},

View file

@ -197,19 +197,19 @@
"description": "cve-2021-42013.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.50",
"fork": false,
"created_at": "2021-10-27T14:29:10Z",
"updated_at": "2023-07-19T18:21:08Z",
"updated_at": "2023-07-22T14:07:34Z",
"pushed_at": "2023-01-23T16:41:56Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 12,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 13,
"forks": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 2
},

32
2021/CVE-2021-44910.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 669553669,
"name": "CVE-2021-44910_SpringBlade",
"full_name": "Securify-Pro\/CVE-2021-44910_SpringBlade",
"owner": {
"login": "Securify-Pro",
"id": 86119333,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86119333?v=4",
"html_url": "https:\/\/github.com\/Securify-Pro"
},
"html_url": "https:\/\/github.com\/Securify-Pro\/CVE-2021-44910_SpringBlade",
"description": "在21年SpringBlade框架曾发现一个JWT认证的漏洞。尽管我们搜索了许多基于原理的扫描工具但没有找到能够支持这个漏洞的工具。可能是因为这个漏洞相对冷门而不被广泛关注。",
"fork": false,
"created_at": "2023-07-22T16:48:24Z",
"updated_at": "2023-07-22T16:51:39Z",
"pushed_at": "2023-07-22T16:52:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "An unauthenticated data extraction vulnerability in Kyocera printers, which allows for recovery of cleartext address book and domain joined passwords",
"fork": false,
"created_at": "2023-03-15T14:23:41Z",
"updated_at": "2023-07-02T08:08:48Z",
"updated_at": "2023-07-22T14:11:43Z",
"pushed_at": "2023-03-15T14:33:48Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)",
"fork": false,
"created_at": "2023-03-23T10:25:59Z",
"updated_at": "2023-07-22T09:31:21Z",
"updated_at": "2023-07-22T13:39:04Z",
"pushed_at": "2023-05-27T15:39:41Z",
"stargazers_count": 164,
"watchers_count": 164,
"stargazers_count": 165,
"watchers_count": 165,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 164,
"watchers": 165,
"score": 0,
"subscribers_count": 6
}

View file

@ -43,10 +43,10 @@
"description": "PoC of CVE-2022-22978 vulnerability in Spring Security framework",
"fork": false,
"created_at": "2022-06-04T16:57:18Z",
"updated_at": "2023-07-07T19:09:13Z",
"updated_at": "2023-07-22T17:57:36Z",
"pushed_at": "2022-06-04T17:14:05Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -60,7 +60,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 10,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "unlock bootloader for theoretically ALL unisoc ud710 and ums512 model",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
"updated_at": "2023-07-19T12:26:28Z",
"updated_at": "2023-07-22T16:51:44Z",
"pushed_at": "2023-07-08T14:51:32Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 36,
"watchers": 37,
"score": 0,
"subscribers_count": 3
}

View file

@ -18,7 +18,7 @@
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,7 +30,7 @@
"vulnerability-scanners"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 6,
"score": 0,
"subscribers_count": 1

View file

@ -43,10 +43,10 @@
"description": "cve-2023-21768",
"fork": false,
"created_at": "2023-03-10T03:36:52Z",
"updated_at": "2023-06-06T06:57:01Z",
"updated_at": "2023-07-22T15:47:35Z",
"pushed_at": "2023-03-10T04:03:04Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "WooCommerce Payments: Unauthorized Admin Access Exploit",
"fork": false,
"created_at": "2023-03-30T23:50:39Z",
"updated_at": "2023-07-22T13:06:38Z",
"updated_at": "2023-07-22T16:35:17Z",
"pushed_at": "2023-05-31T13:21:43Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 11,
"watchers": 15,
"score": 0,
"subscribers_count": 1
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 65,
"watchers_count": 65,
"has_discussions": false,
"forks_count": 19,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 19,
"forks": 20,
"watchers": 65,
"score": 0,
"subscribers_count": 3

View file

@ -13,12 +13,12 @@
"description": "Citrix Scanner for CVE-2023-3519",
"fork": false,
"created_at": "2023-07-20T13:16:38Z",
"updated_at": "2023-07-22T06:59:16Z",
"updated_at": "2023-07-22T17:32:09Z",
"pushed_at": "2023-07-21T09:43:23Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 4,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -28,8 +28,8 @@
"patch"
],
"visibility": "public",
"forks": 4,
"watchers": 27,
"forks": 6,
"watchers": 28,
"score": 0,
"subscribers_count": 4
},
@ -48,7 +48,7 @@
"fork": false,
"created_at": "2023-07-20T16:05:07Z",
"updated_at": "2023-07-22T12:01:27Z",
"pushed_at": "2023-07-22T03:28:33Z",
"pushed_at": "2023-07-22T16:31:59Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
@ -82,10 +82,10 @@
"description": null,
"fork": false,
"created_at": "2023-07-21T08:55:28Z",
"updated_at": "2023-07-22T06:19:43Z",
"updated_at": "2023-07-22T17:10:35Z",
"pushed_at": "2023-07-21T09:02:23Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -94,7 +94,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
},
@ -142,10 +142,10 @@
"description": "nse script to identify server vulnerable to CVE-2023-3519",
"fork": false,
"created_at": "2023-07-21T15:44:14Z",
"updated_at": "2023-07-22T12:31:48Z",
"updated_at": "2023-07-22T18:09:59Z",
"pushed_at": "2023-07-21T16:16:28Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -154,7 +154,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
@ -172,10 +172,10 @@
"description": "CVE-2023-3519 vuln for nuclei scanner",
"fork": false,
"created_at": "2023-07-21T22:10:03Z",
"updated_at": "2023-07-22T12:49:33Z",
"updated_at": "2023-07-22T17:36:03Z",
"pushed_at": "2023-07-21T22:18:12Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -184,7 +184,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
@ -267,13 +267,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0

View file

@ -13,10 +13,10 @@
"description": "Cloudpanel 0-day Exploit",
"fork": false,
"created_at": "2023-06-08T09:20:22Z",
"updated_at": "2023-07-21T03:01:51Z",
"updated_at": "2023-07-22T16:46:13Z",
"pushed_at": "2023-07-20T03:22:47Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-38408 Remote Code Execution in OpenSSH's forwarded ssh-agent",
"fork": false,
"created_at": "2023-07-21T01:53:10Z",
"updated_at": "2023-07-22T03:05:14Z",
"updated_at": "2023-07-22T18:26:35Z",
"pushed_at": "2023-07-21T01:56:59Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
}

View file

@ -14324,6 +14324,9 @@
- [CrackerCat/CVE-2021-44852](https://github.com/CrackerCat/CVE-2021-44852)
### CVE-2021-44910
- [Securify-Pro/CVE-2021-44910_SpringBlade](https://github.com/Securify-Pro/CVE-2021-44910_SpringBlade)
### CVE-2021-45007 (2022-02-20)
<code>** DISPUTED ** Plesk 18.0.37 is affected by a Cross Site Request Forgery (CSRF) vulnerability that allows an attacker to insert data on the user and admin panel. NOTE: the vendor states that this is only a site-specific problem on websites of one or more Plesk users.