Auto Update 2021/04/18 12:10:53

This commit is contained in:
motikan2010-bot 2021-04-18 12:10:53 +09:00
parent a843ff7655
commit 2bdc39b99d
20 changed files with 92 additions and 68 deletions

View file

@ -13,13 +13,13 @@
"description": "Exploiting CVE-2014-7205 by injecting arbitrary JavaScript resulting in Remote Code Execution.",
"fork": false,
"created_at": "2021-04-05T17:02:36Z",
"updated_at": "2021-04-05T17:09:09Z",
"updated_at": "2021-04-17T22:24:57Z",
"pushed_at": "2021-04-05T17:09:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2021-04-17T14:45:41Z",
"updated_at": "2021-04-18T01:56:14Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 406,
"watchers_count": 406,
"stargazers_count": 407,
"watchers_count": 407,
"forks_count": 96,
"forks": 96,
"watchers": 406,
"watchers": 407,
"score": 0
}
]

View file

@ -339,8 +339,8 @@
"pushed_at": "2019-04-08T08:58:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-04-17T13:26:51Z",
"updated_at": "2021-04-17T22:10:43Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2509,
"watchers_count": 2509,
"stargazers_count": 2510,
"watchers_count": 2510,
"forks_count": 721,
"forks": 721,
"watchers": 2509,
"watchers": 2510,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "PoC for CVE-2019-5736",
"fork": false,
"created_at": "2019-02-13T05:26:32Z",
"updated_at": "2021-04-14T16:54:44Z",
"updated_at": "2021-04-17T22:23:50Z",
"pushed_at": "2019-02-19T11:45:13Z",
"stargazers_count": 495,
"watchers_count": 495,
"stargazers_count": 496,
"watchers_count": 496,
"forks_count": 121,
"forks": 121,
"watchers": 495,
"watchers": 496,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
"fork": false,
"created_at": "2019-01-09T22:30:42Z",
"updated_at": "2021-04-05T04:24:54Z",
"updated_at": "2021-04-17T21:52:30Z",
"pushed_at": "2019-01-22T21:00:36Z",
"stargazers_count": 597,
"watchers_count": 597,
"stargazers_count": 596,
"watchers_count": 596,
"forks_count": 131,
"forks": 131,
"watchers": 597,
"watchers": 596,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "CVE-2020-10199 Nexus <= 3.21.1 远程代码执行脚本(有回显)",
"fork": false,
"created_at": "2020-04-16T09:40:15Z",
"updated_at": "2021-04-11T08:55:28Z",
"updated_at": "2021-04-18T02:36:14Z",
"pushed_at": "2020-05-26T10:23:34Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 10,
"forks": 10,
"watchers": 33,
"watchers": 34,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Early 2019 - late 2020. R.I.P. CVE-2020-12928 https:\/\/h0mbre.github.io\/RyzenMaster_CVE\/#",
"fork": false,
"created_at": "2020-11-10T13:08:21Z",
"updated_at": "2021-02-14T15:08:06Z",
"updated_at": "2021-04-17T21:53:59Z",
"pushed_at": "2021-02-14T15:08:01Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 14,
"forks": 14,
"watchers": 13,
"watchers": 12,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972",
"fork": false,
"created_at": "2020-03-11T17:51:29Z",
"updated_at": "2021-04-15T21:27:27Z",
"updated_at": "2021-04-18T01:26:15Z",
"pushed_at": "2021-02-25T17:19:39Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 57,
"watchers_count": 57,
"forks_count": 15,
"forks": 15,
"watchers": 56,
"watchers": 57,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-04-17T13:26:51Z",
"updated_at": "2021-04-17T22:10:43Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2509,
"watchers_count": 2509,
"stargazers_count": 2510,
"watchers_count": 2510,
"forks_count": 721,
"forks": 721,
"watchers": 2509,
"watchers": 2510,
"score": 0
},
{

View file

@ -109,8 +109,8 @@
"pushed_at": "2021-04-11T03:25:34Z",
"stargazers_count": 603,
"watchers_count": 603,
"forks_count": 163,
"forks": 163,
"forks_count": 164,
"forks": 164,
"watchers": 603,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "CVE-2021-1732 Exploit",
"fork": false,
"created_at": "2021-03-05T02:11:10Z",
"updated_at": "2021-04-16T10:57:00Z",
"updated_at": "2021-04-17T21:52:57Z",
"pushed_at": "2021-03-05T03:10:26Z",
"stargazers_count": 276,
"watchers_count": 276,
"stargazers_count": 275,
"watchers_count": 275,
"forks_count": 62,
"forks": 62,
"watchers": 276,
"watchers": 275,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972",
"fork": false,
"created_at": "2020-03-11T17:51:29Z",
"updated_at": "2021-04-15T21:27:27Z",
"updated_at": "2021-04-18T01:26:15Z",
"pushed_at": "2021-02-25T17:19:39Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 57,
"watchers_count": 57,
"forks_count": 15,
"forks": 15,
"watchers": 56,
"watchers": 57,
"score": 0
},
{

View file

@ -21,5 +21,28 @@
"forks": 4,
"watchers": 22,
"score": 0
},
{
"id": 359022063,
"name": "CVE-2021-25281",
"full_name": "SkyBulk\/CVE-2021-25281",
"owner": {
"login": "SkyBulk",
"id": 43649816,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43649816?v=4",
"html_url": "https:\/\/github.com\/SkyBulk"
},
"html_url": "https:\/\/github.com\/SkyBulk\/CVE-2021-25281",
"description": "demo testing CVE-2021-25281",
"fork": false,
"created_at": "2021-04-18T01:55:23Z",
"updated_at": "2021-04-18T03:09:05Z",
"pushed_at": "2021-04-18T01:55:24Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -109,8 +109,8 @@
"pushed_at": "2021-04-11T03:25:34Z",
"stargazers_count": 603,
"watchers_count": 603,
"forks_count": 163,
"forks": 163,
"forks_count": 164,
"forks": 164,
"watchers": 603,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "A repository hosting write ups for the 0 days CVE-2021-25679, CVE-2021-25680, and CVE-2021-25681 ",
"fork": false,
"created_at": "2021-03-03T20:06:54Z",
"updated_at": "2021-04-17T20:03:30Z",
"updated_at": "2021-04-17T21:39:42Z",
"pushed_at": "2021-04-17T20:03:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -10,16 +10,16 @@
"html_url": "https:\/\/github.com\/motikan2010"
},
"html_url": "https:\/\/github.com\/motikan2010\/CVE-2021-29447",
"description": null,
"description": "WordPress - Authenticated XXE (CVE-2021-29447)",
"fork": false,
"created_at": "2021-04-16T20:41:26Z",
"updated_at": "2021-04-17T11:45:38Z",
"pushed_at": "2021-04-17T11:45:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2021-04-18T03:06:05Z",
"pushed_at": "2021-04-18T00:45:34Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -381,13 +381,13 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2021-04-17T11:24:30Z",
"updated_at": "2021-04-18T02:13:30Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 687,
"watchers_count": 687,
"stargazers_count": 688,
"watchers_count": 688,
"forks_count": 192,
"forks": 192,
"watchers": 687,
"watchers": 688,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻‍💻",
"fork": false,
"created_at": "2021-03-26T01:09:25Z",
"updated_at": "2021-04-17T02:47:21Z",
"updated_at": "2021-04-18T02:47:26Z",
"pushed_at": "2021-03-31T12:00:09Z",
"stargazers_count": 186,
"watchers_count": 186,
"stargazers_count": 188,
"watchers_count": 188,
"forks_count": 33,
"forks": 33,
"watchers": 186,
"watchers": 188,
"score": 0
}
]

View file

@ -520,6 +520,7 @@ An issue was discovered in through SaltStack Salt before 3002.5. salt-api does n
</code>
- [Immersive-Labs-Sec/CVE-2021-25281](https://github.com/Immersive-Labs-Sec/CVE-2021-25281)
- [SkyBulk/CVE-2021-25281](https://github.com/SkyBulk/CVE-2021-25281)
### CVE-2021-25374 (2021-04-09)