Auto Update 2021/05/08 06:11:10

This commit is contained in:
motikan2010-bot 2021-05-08 06:11:10 +09:00
parent 9c26bd9353
commit 387844e0bf
20 changed files with 159 additions and 54 deletions

View file

@ -174,13 +174,13 @@
"description": "Heartbleed (CVE-2014-0160) client exploit",
"fork": false,
"created_at": "2014-04-08T16:41:51Z",
"updated_at": "2021-05-02T10:58:26Z",
"updated_at": "2021-05-07T15:23:59Z",
"pushed_at": "2016-01-22T00:42:35Z",
"stargazers_count": 314,
"watchers_count": 314,
"stargazers_count": 313,
"watchers_count": 313,
"forks_count": 82,
"forks": 82,
"watchers": 314,
"watchers": 313,
"score": 0
},
{

View file

@ -229,6 +229,29 @@
"watchers": 0,
"score": 0
},
{
"id": 30059704,
"name": "ghosttester",
"full_name": "JustDenisYT\/ghosttester",
"owner": {
"login": "JustDenisYT",
"id": 9379272,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9379272?v=4",
"html_url": "https:\/\/github.com\/JustDenisYT"
},
"html_url": "https:\/\/github.com\/JustDenisYT\/ghosttester",
"description": "Script to test vulnarability for CVE-2015-0235",
"fork": false,
"created_at": "2015-01-30T06:37:06Z",
"updated_at": "2015-02-04T08:03:37Z",
"pushed_at": "2015-02-04T08:03:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 30066365,
"name": "CVE-2015-0235",

View file

@ -63,8 +63,8 @@
"pushed_at": "2021-02-03T16:03:40Z",
"stargazers_count": 871,
"watchers_count": 871,
"forks_count": 413,
"forks": 413,
"forks_count": 412,
"forks": 412,
"watchers": 871,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2016-11-02T03:11:27Z",
"stargazers_count": 152,
"watchers_count": 152,
"forks_count": 77,
"forks": 77,
"forks_count": 78,
"forks": 78,
"watchers": 152,
"score": 0
}

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-10-16T12:09:45Z",
"stargazers_count": 418,
"watchers_count": 418,
"forks_count": 399,
"forks": 399,
"forks_count": 400,
"forks": 400,
"watchers": 418,
"score": 0
},

View file

@ -1416,13 +1416,13 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2021-05-05T17:44:53Z",
"updated_at": "2021-05-07T18:04:43Z",
"pushed_at": "2019-09-03T20:50:28Z",
"stargazers_count": 1069,
"watchers_count": 1069,
"stargazers_count": 1070,
"watchers_count": 1070,
"forks_count": 356,
"forks": 356,
"watchers": 1069,
"watchers": 1070,
"score": 0
},
{

View file

@ -358,13 +358,13 @@
"description": "Detect and log CVE-2019-19781 scan and exploitation attempts.",
"fork": false,
"created_at": "2020-01-13T10:09:31Z",
"updated_at": "2021-04-01T00:30:04Z",
"updated_at": "2021-05-07T17:06:22Z",
"pushed_at": "2020-01-15T13:58:22Z",
"stargazers_count": 101,
"watchers_count": 101,
"stargazers_count": 102,
"watchers_count": 102,
"forks_count": 24,
"forks": 24,
"watchers": 101,
"watchers": 102,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-11-12T03:58:00Z",
"stargazers_count": 63,
"watchers_count": 63,
"forks_count": 26,
"forks": 26,
"forks_count": 25,
"forks": 25,
"watchers": 63,
"score": 0
},
@ -228,5 +228,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 365297869,
"name": "CVE-2019-2215",
"full_name": "mufidmb38\/CVE-2019-2215",
"owner": {
"login": "mufidmb38",
"id": 27908179,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27908179?v=4",
"html_url": "https:\/\/github.com\/mufidmb38"
},
"html_url": "https:\/\/github.com\/mufidmb38\/CVE-2019-2215",
"description": "CVE-2019-2215",
"fork": false,
"created_at": "2021-05-07T16:48:40Z",
"updated_at": "2021-05-07T17:48:48Z",
"pushed_at": "2021-05-07T17:48:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,7 +13,7 @@
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
"fork": false,
"created_at": "2019-02-12T06:02:06Z",
"updated_at": "2021-05-03T09:15:02Z",
"updated_at": "2021-05-07T20:29:10Z",
"pushed_at": "2019-05-09T21:34:26Z",
"stargazers_count": 561,
"watchers_count": 561,

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-04-03T14:04:36Z",
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 10,
"forks": 10,
"forks_count": 11,
"forks": 11,
"watchers": 31,
"score": 0
},

View file

@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-05-07T06:36:24Z",
"updated_at": "2021-05-07T19:38:34Z",
"pushed_at": "2021-04-26T02:30:11Z",
"stargazers_count": 729,
"watchers_count": 729,
"stargazers_count": 730,
"watchers_count": 730,
"forks_count": 233,
"forks": 233,
"watchers": 729,
"watchers": 730,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Demo exploit code for CVE-2020-27904, a tfp0 bug.",
"fork": false,
"created_at": "2021-03-31T09:11:29Z",
"updated_at": "2021-05-07T14:49:09Z",
"updated_at": "2021-05-07T21:05:23Z",
"pushed_at": "2021-04-29T07:14:33Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 2,
"forks": 2,
"watchers": 18,
"watchers": 23,
"score": 0
}
]

View file

@ -63,9 +63,32 @@
"pushed_at": "2021-04-30T08:00:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 365298270,
"name": "CVE-2020-9496",
"full_name": "cyber-niz\/CVE-2020-9496",
"owner": {
"login": "cyber-niz",
"id": 25560738,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25560738?v=4",
"html_url": "https:\/\/github.com\/cyber-niz"
},
"html_url": "https:\/\/github.com\/cyber-niz\/CVE-2020-9496",
"description": "CVE-2020-9496 manual exploit",
"fork": false,
"created_at": "2021-05-07T16:50:23Z",
"updated_at": "2021-05-07T17:43:18Z",
"pushed_at": "2021-05-07T17:43:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -128,13 +128,13 @@
"description": "CVE-2021-22986 & F5 BIG-IP RCE",
"fork": false,
"created_at": "2021-03-22T07:13:50Z",
"updated_at": "2021-04-26T06:58:16Z",
"updated_at": "2021-05-07T20:54:19Z",
"pushed_at": "2021-04-03T12:56:37Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 15,
"forks": 15,
"watchers": 46,
"watchers": 47,
"score": 0
},
{

View file

@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-05-07T06:36:24Z",
"updated_at": "2021-05-07T19:38:34Z",
"pushed_at": "2021-04-26T02:30:11Z",
"stargazers_count": 729,
"watchers_count": 729,
"stargazers_count": 730,
"watchers_count": 730,
"forks_count": 233,
"forks": 233,
"watchers": 729,
"watchers": 730,
"score": 0
},
{

25
2021/CVE-2021-28312.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 365343703,
"name": "CVE-2021-28312",
"full_name": "shubham0d\/CVE-2021-28312",
"owner": {
"login": "shubham0d",
"id": 12750163,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12750163?v=4",
"html_url": "https:\/\/github.com\/shubham0d"
},
"html_url": "https:\/\/github.com\/shubham0d\/CVE-2021-28312",
"description": "POC and description for CVE-2021-28312",
"fork": false,
"created_at": "2021-05-07T20:16:22Z",
"updated_at": "2021-05-07T20:31:14Z",
"pushed_at": "2021-05-07T20:31:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution.",
"fork": false,
"created_at": "2021-05-04T17:15:58Z",
"updated_at": "2021-05-07T14:54:50Z",
"updated_at": "2021-05-07T20:22:42Z",
"pushed_at": "2021-05-06T15:53:18Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 1,
"forks": 1,
"watchers": 12,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 2,
"forks": 2,
"watchers": 16,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-04-26T18:21:42Z",
"stargazers_count": 194,
"watchers_count": 194,
"forks_count": 34,
"forks": 34,
"forks_count": 35,
"forks": 35,
"watchers": 194,
"score": 0
}

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-04-20T00:46:14Z",
"stargazers_count": 169,
"watchers_count": 169,
"forks_count": 54,
"forks": 54,
"forks_count": 55,
"forks": 55,
"watchers": 169,
"score": 0
},
@ -105,13 +105,13 @@
"description": null,
"fork": false,
"created_at": "2021-05-07T15:01:25Z",
"updated_at": "2021-05-07T15:16:25Z",
"updated_at": "2021-05-07T15:25:57Z",
"pushed_at": "2021-05-07T15:16:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -862,6 +862,14 @@ Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-
- [Rafael-Svechinskaya/IOC_for_CVE-2021-28310](https://github.com/Rafael-Svechinskaya/IOC_for_CVE-2021-28310)
### CVE-2021-28312 (2021-04-13)
<code>
Windows NTFS Denial of Service Vulnerability
</code>
- [shubham0d/CVE-2021-28312](https://github.com/shubham0d/CVE-2021-28312)
### CVE-2021-28480 (2021-04-13)
<code>
@ -2878,6 +2886,7 @@ XML-RPC request are vulnerable to unsafe deserialization and Cross-Site Scriptin
- [dwisiswant0/CVE-2020-9496](https://github.com/dwisiswant0/CVE-2020-9496)
- [Vulnmachines/apache-ofbiz-CVE-2020-9496](https://github.com/Vulnmachines/apache-ofbiz-CVE-2020-9496)
- [g33xter/CVE-2020-9496](https://github.com/g33xter/CVE-2020-9496)
- [cyber-niz/CVE-2020-9496](https://github.com/cyber-niz/CVE-2020-9496)
### CVE-2020-9547 (2020-03-01)
@ -5853,6 +5862,7 @@ A use-after-free in binder.c allows an elevation of privilege from an applicatio
- [sharif-dev/AndroidKernelVulnerability](https://github.com/sharif-dev/AndroidKernelVulnerability)
- [c3r34lk1ll3r/CVE-2019-2215](https://github.com/c3r34lk1ll3r/CVE-2019-2215)
- [Byte-Master-101/CVE-2019-2215](https://github.com/Byte-Master-101/CVE-2019-2215)
- [mufidmb38/CVE-2019-2215](https://github.com/mufidmb38/CVE-2019-2215)
### CVE-2019-2525 (2019-01-16)
@ -15576,6 +15586,7 @@ Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2
- [nickanderson/cfengine-CVE_2015_0235](https://github.com/nickanderson/cfengine-CVE_2015_0235)
- [koudaiii-archives/cookbook-update-glibc](https://github.com/koudaiii-archives/cookbook-update-glibc)
- [F88/ghostbusters15](https://github.com/F88/ghostbusters15)
- [JustDenisYT/ghosttester](https://github.com/JustDenisYT/ghosttester)
- [tobyzxj/CVE-2015-0235](https://github.com/tobyzxj/CVE-2015-0235)
- [makelinux/CVE-2015-0235-workaround](https://github.com/makelinux/CVE-2015-0235-workaround)
- [arm13/ghost_exploit](https://github.com/arm13/ghost_exploit)