Auto Update 2021/09/25 12:12:49

This commit is contained in:
motikan2010-bot 2021-09-25 12:12:49 +09:00
parent b17472304b
commit 38e9052940
19 changed files with 93 additions and 59 deletions

View file

@ -373,14 +373,14 @@
"description": "Test CIDR blocks for CVE-2014-0160\/Heartbleed",
"fork": false,
"created_at": "2014-04-10T02:28:05Z",
"updated_at": "2014-04-10T02:41:44Z",
"updated_at": "2021-09-24T22:49:27Z",
"pushed_at": "2014-04-10T02:41:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0
},
{

View file

@ -377,9 +377,9 @@
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 292,
"watchers_count": 292,
"forks_count": 103,
"forks_count": 104,
"allow_forking": true,
"forks": 103,
"forks": 104,
"watchers": 292,
"score": 0
},

View file

@ -329,9 +329,9 @@
"pushed_at": "2018-05-21T18:33:26Z",
"stargazers_count": 397,
"watchers_count": 397,
"forks_count": 146,
"forks_count": 147,
"allow_forking": true,
"forks": 146,
"forks": 147,
"watchers": 397,
"score": 0
},

View file

@ -65,9 +65,9 @@
"pushed_at": "2019-02-21T13:18:24Z",
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 3,
"forks_count": 2,
"allow_forking": true,
"forks": 3,
"forks": 2,
"watchers": 18,
"score": 0
},

26
2017/CVE-2017-7651.json Normal file
View file

@ -0,0 +1,26 @@
[
{
"id": 410108471,
"name": "MqttAttack",
"full_name": "mukkul007\/MqttAttack",
"owner": {
"login": "mukkul007",
"id": 14542345,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14542345?v=4",
"html_url": "https:\/\/github.com\/mukkul007"
},
"html_url": "https:\/\/github.com\/mukkul007\/MqttAttack",
"description": "PoC for CVE-2017-7651",
"fork": false,
"created_at": "2021-09-24T21:39:29Z",
"updated_at": "2021-09-24T21:40:43Z",
"pushed_at": "2021-09-24T21:40:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -17,9 +17,9 @@
"pushed_at": "2020-10-16T12:09:45Z",
"stargazers_count": 443,
"watchers_count": 443,
"forks_count": 425,
"forks_count": 426,
"allow_forking": true,
"forks": 425,
"forks": 426,
"watchers": 443,
"score": 0
},

View file

@ -17,9 +17,9 @@
"pushed_at": "2018-10-02T09:03:37Z",
"stargazers_count": 119,
"watchers_count": 119,
"forks_count": 50,
"forks_count": 49,
"allow_forking": true,
"forks": 50,
"forks": 49,
"watchers": 119,
"score": 0
},
@ -65,9 +65,9 @@
"pushed_at": "2018-10-01T03:34:18Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks_count": 0,
"allow_forking": true,
"forks": 1,
"forks": 0,
"watchers": 1,
"score": 0
}

View file

@ -17,9 +17,9 @@
"pushed_at": "2018-08-17T23:31:46Z",
"stargazers_count": 163,
"watchers_count": 163,
"forks_count": 33,
"forks_count": 32,
"allow_forking": true,
"forks": 33,
"forks": 32,
"watchers": 163,
"score": 0
}

View file

@ -17,9 +17,9 @@
"pushed_at": "2018-10-30T21:51:16Z",
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 15,
"forks_count": 14,
"allow_forking": true,
"forks": 15,
"forks": 14,
"watchers": 49,
"score": 0
}

View file

@ -61,14 +61,14 @@
"description": "Apache Solr远程代码执行漏洞(CVE-2019-0193) Exploit",
"fork": false,
"created_at": "2019-08-12T07:17:21Z",
"updated_at": "2021-09-23T10:32:52Z",
"updated_at": "2021-09-25T02:30:00Z",
"pushed_at": "2020-07-08T06:51:47Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 57,
"watchers_count": 57,
"forks_count": 12,
"allow_forking": true,
"forks": 12,
"watchers": 56,
"watchers": 57,
"score": 0
},
{

View file

@ -13,14 +13,14 @@
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
"fork": false,
"created_at": "2019-09-03T15:08:49Z",
"updated_at": "2021-09-23T17:59:14Z",
"updated_at": "2021-09-24T21:59:59Z",
"pushed_at": "2019-09-08T06:09:11Z",
"stargazers_count": 704,
"watchers_count": 704,
"stargazers_count": 705,
"watchers_count": 705,
"forks_count": 61,
"allow_forking": true,
"forks": 61,
"watchers": 704,
"watchers": 705,
"score": 0
}
]

View file

@ -41,9 +41,9 @@
"pushed_at": "2019-07-31T07:05:04Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 6,
"forks_count": 5,
"allow_forking": true,
"forks": 6,
"forks": 5,
"watchers": 4,
"score": 0
},

View file

@ -17,9 +17,9 @@
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 292,
"watchers_count": 292,
"forks_count": 103,
"forks_count": 104,
"allow_forking": true,
"forks": 103,
"forks": 104,
"watchers": 292,
"score": 0
},

View file

@ -13,14 +13,14 @@
"description": "Root your MediaTek arm64 device using mtk-su (CVE-2020-0069).",
"fork": false,
"created_at": "2019-09-06T12:12:48Z",
"updated_at": "2021-09-18T18:18:17Z",
"updated_at": "2021-09-25T03:03:56Z",
"pushed_at": "2021-05-31T21:22:33Z",
"stargazers_count": 67,
"watchers_count": 67,
"stargazers_count": 68,
"watchers_count": 68,
"forks_count": 11,
"allow_forking": true,
"forks": 11,
"watchers": 67,
"watchers": 68,
"score": 0
},
{

View file

@ -85,14 +85,14 @@
"description": "Weblogic IIOP CVE-2020-2551",
"fork": false,
"created_at": "2020-02-28T08:46:21Z",
"updated_at": "2021-08-30T06:44:00Z",
"updated_at": "2021-09-24T22:07:03Z",
"pushed_at": "2020-04-07T03:32:24Z",
"stargazers_count": 272,
"watchers_count": 272,
"stargazers_count": 273,
"watchers_count": 273,
"forks_count": 73,
"allow_forking": true,
"forks": 73,
"watchers": 272,
"watchers": 273,
"score": 0
},
{

View file

@ -13,14 +13,14 @@
"description": "CVE-2021-22192 靶场: 未授权用户 RCE 漏洞",
"fork": false,
"created_at": "2021-03-27T07:09:46Z",
"updated_at": "2021-09-10T12:01:29Z",
"updated_at": "2021-09-25T00:45:55Z",
"pushed_at": "2021-05-02T05:34:29Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 4,
"allow_forking": true,
"forks": 4,
"watchers": 31,
"watchers": 32,
"score": 0
},
{

View file

@ -37,14 +37,14 @@
"description": "CVE-2021-36798 Exp: Cobalt Strike < 4.4 Dos",
"fork": false,
"created_at": "2021-09-06T11:49:03Z",
"updated_at": "2021-09-24T14:37:43Z",
"updated_at": "2021-09-25T02:17:48Z",
"pushed_at": "2021-09-06T13:49:54Z",
"stargazers_count": 76,
"watchers_count": 76,
"forks_count": 11,
"stargazers_count": 79,
"watchers_count": 79,
"forks_count": 12,
"allow_forking": true,
"forks": 11,
"watchers": 76,
"forks": 12,
"watchers": 79,
"score": 0
}
]

View file

@ -161,9 +161,9 @@
"pushed_at": "2021-09-11T10:35:20Z",
"stargazers_count": 72,
"watchers_count": 72,
"forks_count": 54,
"forks_count": 55,
"allow_forking": true,
"forks": 54,
"forks": 55,
"watchers": 72,
"score": 0
},
@ -209,9 +209,9 @@
"pushed_at": "2021-09-11T09:50:26Z",
"stargazers_count": 1193,
"watchers_count": 1193,
"forks_count": 383,
"forks_count": 384,
"allow_forking": true,
"forks": 383,
"forks": 384,
"watchers": 1193,
"score": 0
},
@ -493,14 +493,14 @@
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
"fork": false,
"created_at": "2021-09-15T22:34:35Z",
"updated_at": "2021-09-24T19:09:42Z",
"pushed_at": "2021-09-24T16:55:07Z",
"stargazers_count": 366,
"watchers_count": 366,
"updated_at": "2021-09-25T00:05:40Z",
"pushed_at": "2021-09-25T00:05:37Z",
"stargazers_count": 367,
"watchers_count": 367,
"forks_count": 71,
"allow_forking": true,
"forks": 71,
"watchers": 366,
"watchers": 367,
"score": 0
},
{

View file

@ -15030,6 +15030,14 @@ Foscam networked devices use the same hardcoded SSL private key across different
- [notmot/CVE-2017-7648.](https://github.com/notmot/CVE-2017-7648.)
### CVE-2017-7651 (2018-04-24)
<code>
In Eclipse Mosquitto 1.4.14, a user can shutdown the Mosquitto server simply by filling the RAM memory with a lot of connections with large payload. This can be done without authentications if occur in connection phase of MQTT protocol.
</code>
- [mukkul007/MqttAttack](https://github.com/mukkul007/MqttAttack)
### CVE-2017-7679 (2017-06-19)
<code>