Auto Update 2021/06/25 12:12:05

This commit is contained in:
motikan2010-bot 2021-06-25 12:12:05 +09:00
parent 79a6cd82ec
commit 3980a5f3d7
22 changed files with 188 additions and 64 deletions

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-10-17T18:11:01Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 5,
"forks": 5,
"forks_count": 4,
"forks": 4,
"watchers": 3,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container",
"fork": false,
"created_at": "2016-12-26T13:39:03Z",
"updated_at": "2021-04-19T15:17:52Z",
"updated_at": "2021-06-25T01:23:06Z",
"pushed_at": "2019-10-13T12:23:02Z",
"stargazers_count": 359,
"watchers_count": 359,
"stargazers_count": 360,
"watchers_count": 360,
"forks_count": 143,
"forks": 143,
"watchers": 359,
"watchers": 360,
"score": 0
},
{

View file

@ -358,13 +358,13 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2021-06-24T13:59:39Z",
"updated_at": "2021-06-25T02:02:28Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 278,
"watchers_count": 278,
"stargazers_count": 279,
"watchers_count": 279,
"forks_count": 99,
"forks": 99,
"watchers": 278,
"watchers": 279,
"score": 0
},
{

View file

@ -159,5 +159,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 380079921,
"name": "spectre",
"full_name": "raul23\/spectre",
"owner": {
"login": "raul23",
"id": 9953156,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9953156?v=4",
"html_url": "https:\/\/github.com\/raul23"
},
"html_url": "https:\/\/github.com\/raul23\/spectre",
"description": "Resources for the Spectre vulnerability (CVE-2017-5753 and CVE-2017-5715)",
"fork": false,
"created_at": "2021-06-25T00:11:51Z",
"updated_at": "2021-06-25T00:13:46Z",
"pushed_at": "2021-06-25T00:13:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -136,5 +136,28 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 380079264,
"name": "meltdown",
"full_name": "raul23\/meltdown",
"owner": {
"login": "raul23",
"id": 9953156,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9953156?v=4",
"html_url": "https:\/\/github.com\/raul23"
},
"html_url": "https:\/\/github.com\/raul23\/meltdown",
"description": "Resources for the Meltdown vulnerability (CVE-2017-5754)",
"fork": false,
"created_at": "2021-06-25T00:07:21Z",
"updated_at": "2021-06-25T03:01:10Z",
"pushed_at": "2021-06-25T03:01:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,8 +13,8 @@
"description": "Remote Command Execution through Unvalidated File Upload in SeedDMS versions <5.1.11",
"fork": false,
"created_at": "2021-06-24T12:58:02Z",
"updated_at": "2021-06-24T18:23:56Z",
"pushed_at": "2021-06-24T18:23:53Z",
"updated_at": "2021-06-24T23:11:45Z",
"pushed_at": "2021-06-24T23:11:43Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,

View file

@ -90,5 +90,28 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 380060753,
"name": "Kr00k",
"full_name": "raul23\/Kr00k",
"owner": {
"login": "raul23",
"id": 9953156,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9953156?v=4",
"html_url": "https:\/\/github.com\/raul23"
},
"html_url": "https:\/\/github.com\/raul23\/Kr00k",
"description": "Resources for the Kr00k vulnerability (CVE-2019-15126)",
"fork": false,
"created_at": "2021-06-24T22:04:42Z",
"updated_at": "2021-06-25T02:38:59Z",
"pushed_at": "2021-06-25T02:38:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
"fork": false,
"created_at": "2020-01-11T00:08:27Z",
"updated_at": "2021-06-14T08:54:11Z",
"updated_at": "2021-06-25T00:34:24Z",
"pushed_at": "2020-01-22T20:23:51Z",
"stargazers_count": 527,
"watchers_count": 527,
"stargazers_count": 528,
"watchers_count": 528,
"forks_count": 124,
"forks": 124,
"watchers": 527,
"watchers": 528,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2021-06-24T13:59:39Z",
"updated_at": "2021-06-25T02:02:28Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 278,
"watchers_count": 278,
"stargazers_count": 279,
"watchers_count": 279,
"forks_count": 99,
"forks": 99,
"watchers": 278,
"watchers": 279,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "PoC for CVE-2019-5736",
"fork": false,
"created_at": "2019-02-13T05:26:32Z",
"updated_at": "2021-06-24T18:30:58Z",
"updated_at": "2021-06-25T02:50:37Z",
"pushed_at": "2019-02-19T11:45:13Z",
"stargazers_count": 515,
"watchers_count": 515,
"stargazers_count": 516,
"watchers_count": 516,
"forks_count": 134,
"forks": 134,
"watchers": 515,
"watchers": 516,
"score": 0
},
{

View file

@ -113,5 +113,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 380101109,
"name": "CVE-2020-0041",
"full_name": "Byte-Master-101\/CVE-2020-0041",
"owner": {
"login": "Byte-Master-101",
"id": 36032977,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36032977?v=4",
"html_url": "https:\/\/github.com\/Byte-Master-101"
},
"html_url": "https:\/\/github.com\/Byte-Master-101\/CVE-2020-0041",
"description": "My implementation of CVE-2020-0041",
"fork": false,
"created_at": "2021-06-25T02:19:17Z",
"updated_at": "2021-06-25T02:19:52Z",
"pushed_at": "2021-06-25T02:19:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Root your MediaTek arm64 device using mtk-su (CVE-2020-0069).",
"fork": false,
"created_at": "2019-09-06T12:12:48Z",
"updated_at": "2021-06-21T15:55:16Z",
"updated_at": "2021-06-25T01:18:33Z",
"pushed_at": "2021-05-31T21:22:33Z",
"stargazers_count": 62,
"watchers_count": 62,
"stargazers_count": 63,
"watchers_count": 63,
"forks_count": 11,
"forks": 11,
"watchers": 62,
"watchers": 63,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-07-18T05:15:05Z",
"updated_at": "2021-05-30T16:51:25Z",
"updated_at": "2021-06-25T00:43:56Z",
"pushed_at": "2021-03-17T11:29:58Z",
"stargazers_count": 94,
"watchers_count": 94,
"stargazers_count": 95,
"watchers_count": 95,
"forks_count": 18,
"forks": 18,
"watchers": 94,
"watchers": 95,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-1938",
"fork": false,
"created_at": "2020-02-20T16:32:52Z",
"updated_at": "2021-05-31T13:23:17Z",
"updated_at": "2021-06-25T01:41:23Z",
"pushed_at": "2020-02-25T02:04:16Z",
"stargazers_count": 226,
"watchers_count": 226,
"stargazers_count": 227,
"watchers_count": 227,
"forks_count": 95,
"forks": 95,
"watchers": 226,
"watchers": 227,
"score": 0
},
{

View file

@ -105,13 +105,13 @@
"description": "CVE-2021-21985 VMware vCenter Server远程代码执行漏洞 EXP (更新可回显EXP)",
"fork": false,
"created_at": "2021-06-03T09:59:21Z",
"updated_at": "2021-06-24T15:02:47Z",
"updated_at": "2021-06-25T02:28:57Z",
"pushed_at": "2021-06-09T10:13:56Z",
"stargazers_count": 227,
"watchers_count": 227,
"forks_count": 38,
"forks": 38,
"watchers": 227,
"stargazers_count": 228,
"watchers_count": 228,
"forks_count": 39,
"forks": 39,
"watchers": 228,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Apache\/Alibaba Dubbo <= 2.7.3 PoC Code for CVE-2021-25641 RCE via Deserialization of Untrusted Data; Affects Versions <= 2.7.6 With Different Gadgets",
"fork": false,
"created_at": "2021-06-06T06:41:36Z",
"updated_at": "2021-06-24T14:08:01Z",
"updated_at": "2021-06-25T00:13:39Z",
"pushed_at": "2021-06-06T08:41:19Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.",
"fork": false,
"created_at": "2021-06-09T15:44:00Z",
"updated_at": "2021-06-24T21:14:41Z",
"updated_at": "2021-06-25T02:27:15Z",
"pushed_at": "2021-06-24T15:29:25Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 0,
"forks": 0,
"watchers": 10,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 2,
"forks": 2,
"watchers": 22,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "SquirrellyJS mixes pure template data with engine configuration options through the Express render API. By overwriting internal configuration options, remote code execution may be triggered in downstream applications.",
"fork": false,
"created_at": "2021-06-12T17:09:48Z",
"updated_at": "2021-06-13T09:46:38Z",
"updated_at": "2021-06-25T01:59:11Z",
"pushed_at": "2021-06-12T17:17:41Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2021-06-09T06:55:52Z",
"updated_at": "2021-06-24T17:13:42Z",
"updated_at": "2021-06-25T02:52:54Z",
"pushed_at": "2021-06-10T10:31:30Z",
"stargazers_count": 89,
"watchers_count": 89,
"stargazers_count": 95,
"watchers_count": 95,
"forks_count": 36,
"forks": 36,
"watchers": 89,
"watchers": 95,
"score": 0
}
]

25
2021/CVE-2021-35475.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 380110029,
"name": "CVE-2021-35475",
"full_name": "saitamang\/CVE-2021-35475",
"owner": {
"login": "saitamang",
"id": 41514973,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41514973?v=4",
"html_url": "https:\/\/github.com\/saitamang"
},
"html_url": "https:\/\/github.com\/saitamang\/CVE-2021-35475",
"description": "Writeup for CVE-2021-35475; Stored Cross-Site Scripting(XSS) on SAS® Environment Manager 2.5",
"fork": false,
"created_at": "2021-06-25T03:08:44Z",
"updated_at": "2021-06-25T03:08:47Z",
"pushed_at": "2021-06-25T03:08:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -128,13 +128,13 @@
"description": "Privilege escalation with polkit - CVE-2021-3560",
"fork": false,
"created_at": "2021-06-19T08:15:17Z",
"updated_at": "2021-06-24T09:50:54Z",
"updated_at": "2021-06-25T01:09:22Z",
"pushed_at": "2021-06-20T07:38:13Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 7,
"forks": 7,
"watchers": 10,
"watchers": 11,
"score": 0
}
]

View file

@ -1400,6 +1400,9 @@ Tencent GameLoop before 4.1.21.90 downloaded updates over an insecure HTTP conne
- [mmiszczyk/cve-2021-33879](https://github.com/mmiszczyk/cve-2021-33879)
### CVE-2021-35475
- [saitamang/CVE-2021-35475](https://github.com/saitamang/CVE-2021-35475)
## 2020
### CVE-2020-0001 (2020-01-08)
@ -1441,6 +1444,7 @@ In binder_transaction of binder.c, there is a possible out of bounds write due t
- [minutesinch/CVE-2020-0041](https://github.com/minutesinch/CVE-2020-0041)
- [minutesinch/CVE-2020-0041-Original](https://github.com/minutesinch/CVE-2020-0041-Original)
- [TechnoHT/CVE-2020-0041](https://github.com/TechnoHT/CVE-2020-0041)
- [Byte-Master-101/CVE-2020-0041](https://github.com/Byte-Master-101/CVE-2020-0041)
### CVE-2020-0069 (2020-03-10)
@ -8584,6 +8588,7 @@ An issue was discovered on Broadcom Wi-Fi client devices. Specifically timed and
- [hexway/r00kie-kr00kie](https://github.com/hexway/r00kie-kr00kie)
- [akabe1/kr00ker](https://github.com/akabe1/kr00ker)
- [mustafasevim/kr00k-vulnerability](https://github.com/mustafasevim/kr00k-vulnerability)
- [raul23/Kr00k](https://github.com/raul23/Kr00k)
### CVE-2019-15224 (2019-08-19)
@ -13257,6 +13262,7 @@ Systems with microprocessors utilizing speculative execution and branch predicti
- [ixtal23/spectreScope](https://github.com/ixtal23/spectreScope)
- [albertleecn/cve-2017-5753](https://github.com/albertleecn/cve-2017-5753)
- [sachinthaBS/Spectre-Vulnerability-CVE-2017-5753-](https://github.com/sachinthaBS/Spectre-Vulnerability-CVE-2017-5753-)
- [raul23/spectre](https://github.com/raul23/spectre)
### CVE-2017-5754 (2018-01-04)
@ -13270,6 +13276,7 @@ Systems with microprocessors utilizing speculative execution and indirect branch
- [speecyy/Am-I-affected-by-Meltdown](https://github.com/speecyy/Am-I-affected-by-Meltdown)
- [zzado/Meltdown](https://github.com/zzado/Meltdown)
- [jdmulloy/meltdown-aws-scanner](https://github.com/jdmulloy/meltdown-aws-scanner)
- [raul23/meltdown](https://github.com/raul23/meltdown)
### CVE-2017-5792 (2018-02-15)