Auto Update 2021/05/03 18:11:43

This commit is contained in:
motikan2010-bot 2021-05-03 18:11:43 +09:00
parent ca9d6bcf9d
commit 40c039c72d
18 changed files with 112 additions and 60 deletions

View file

@ -293,8 +293,8 @@
"pushed_at": "2020-10-01T11:51:46Z",
"stargazers_count": 85,
"watchers_count": 85,
"forks_count": 58,
"forks": 58,
"forks_count": 57,
"forks": 57,
"watchers": 85,
"score": 0
},

View file

@ -197,13 +197,13 @@
"description": "(PoC) Python version of CVE-2019-11043 exploit by neex",
"fork": false,
"created_at": "2019-10-28T11:09:06Z",
"updated_at": "2021-04-21T09:27:06Z",
"updated_at": "2021-05-03T07:05:15Z",
"pushed_at": "2019-10-29T15:47:02Z",
"stargazers_count": 130,
"watchers_count": 130,
"forks_count": 29,
"forks": 29,
"watchers": 130,
"stargazers_count": 131,
"watchers_count": 131,
"forks_count": 30,
"forks": 30,
"watchers": 131,
"score": 0
},
{

View file

@ -312,13 +312,13 @@
"description": null,
"fork": false,
"created_at": "2020-11-09T21:46:57Z",
"updated_at": "2021-04-29T04:30:19Z",
"updated_at": "2021-05-03T05:31:35Z",
"pushed_at": "2021-02-07T19:51:24Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 2,
"forks": 2,
"watchers": 9,
"watchers": 10,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
"fork": false,
"created_at": "2019-12-12T07:58:11Z",
"updated_at": "2021-04-26T06:37:18Z",
"updated_at": "2021-05-03T05:48:07Z",
"pushed_at": "2021-01-25T13:42:41Z",
"stargazers_count": 191,
"watchers_count": 191,
"forks_count": 55,
"forks": 55,
"watchers": 191,
"stargazers_count": 192,
"watchers_count": 192,
"forks_count": 56,
"forks": 56,
"watchers": 192,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-02-20T15:35:34Z",
"stargazers_count": 183,
"watchers_count": 183,
"forks_count": 62,
"forks": 62,
"forks_count": 63,
"forks": 63,
"watchers": 183,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Authenticated SQL injection to command execution on Cacti 1.2.12 ",
"fork": false,
"created_at": "2021-04-28T20:57:00Z",
"updated_at": "2021-04-29T02:12:22Z",
"updated_at": "2021-05-03T03:52:36Z",
"pushed_at": "2021-04-29T02:12:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Python script to exploit CVE-2020-14321 - Course enrolments allowed privilege escalation from teacher role into manager role to RCE.",
"fork": false,
"created_at": "2021-04-28T19:46:55Z",
"updated_at": "2021-05-01T15:31:02Z",
"updated_at": "2021-05-03T06:59:41Z",
"pushed_at": "2021-04-28T19:51:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-05-02T14:31:33Z",
"updated_at": "2021-05-03T09:13:51Z",
"pushed_at": "2021-04-26T02:30:11Z",
"stargazers_count": 721,
"watchers_count": 721,
"stargazers_count": 722,
"watchers_count": 722,
"forks_count": 225,
"forks": 225,
"watchers": 721,
"watchers": 722,
"score": 0
}
]

View file

@ -151,13 +151,13 @@
"description": null,
"fork": false,
"created_at": "2021-02-25T05:10:06Z",
"updated_at": "2021-04-25T08:28:07Z",
"updated_at": "2021-05-03T05:41:42Z",
"pushed_at": "2021-02-25T05:49:19Z",
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 8,
"forks": 8,
"watchers": 46,
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 9,
"forks": 9,
"watchers": 47,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "Nmap script to check vulnerability CVE-2021-21975",
"fork": false,
"created_at": "2021-04-01T21:59:05Z",
"updated_at": "2021-04-08T21:00:22Z",
"updated_at": "2021-05-03T07:44:13Z",
"pushed_at": "2021-04-02T00:32:15Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 3,
"forks": 3,
"watchers": 14,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 4,
"forks": 4,
"watchers": 15,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Proof-of-Concept (PoC) script to exploit Pulse Secure CVE-2021-22893. ",
"fork": false,
"created_at": "2021-04-21T09:48:57Z",
"updated_at": "2021-04-28T10:04:55Z",
"updated_at": "2021-05-03T07:32:44Z",
"pushed_at": "2021-04-21T11:18:31Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 9,
"forks": 9,
"watchers": 20,
"watchers": 21,
"score": 0
},
{

View file

@ -109,8 +109,8 @@
"pushed_at": "2021-03-21T07:40:59Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"forks": 3,
"forks_count": 4,
"forks": 4,
"watchers": 3,
"score": 0
},

View file

@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-05-02T14:31:33Z",
"updated_at": "2021-05-03T09:13:51Z",
"pushed_at": "2021-04-26T02:30:11Z",
"stargazers_count": 721,
"watchers_count": 721,
"stargazers_count": 722,
"watchers_count": 722,
"forks_count": 225,
"forks": 225,
"watchers": 721,
"watchers": 722,
"score": 0
},
{

View file

@ -13,8 +13,8 @@
"description": "Steps for Exploitation ",
"fork": false,
"created_at": "2021-04-30T01:21:09Z",
"updated_at": "2021-04-30T01:21:12Z",
"pushed_at": "2021-04-30T01:21:10Z",
"updated_at": "2021-05-03T06:10:28Z",
"pushed_at": "2021-05-03T06:10:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

25
2021/CVE-2021-27553.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 363831902,
"name": "CVE-2021-27553",
"full_name": "sapkota2k20\/CVE-2021-27553",
"owner": {
"login": "sapkota2k20",
"id": 57771853,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57771853?v=4",
"html_url": "https:\/\/github.com\/sapkota2k20"
},
"html_url": "https:\/\/github.com\/sapkota2k20\/CVE-2021-27553",
"description": null,
"fork": false,
"created_at": "2021-05-03T06:02:03Z",
"updated_at": "2021-05-03T06:08:17Z",
"pushed_at": "2021-05-03T06:08:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -381,13 +381,13 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2021-05-02T00:52:00Z",
"updated_at": "2021-05-03T04:22:25Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 705,
"watchers_count": 705,
"stargazers_count": 706,
"watchers_count": 706,
"forks_count": 198,
"forks": 198,
"watchers": 705,
"watchers": 706,
"score": 0
},
{

View file

@ -67,5 +67,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 363831101,
"name": "OverlayFS-CVE-2021-3493",
"full_name": "AmIAHuman\/OverlayFS-CVE-2021-3493",
"owner": {
"login": "AmIAHuman",
"id": 30362241,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30362241?v=4",
"html_url": "https:\/\/github.com\/AmIAHuman"
},
"html_url": "https:\/\/github.com\/AmIAHuman\/OverlayFS-CVE-2021-3493",
"description": null,
"fork": false,
"created_at": "2021-05-03T05:58:06Z",
"updated_at": "2021-05-03T06:06:46Z",
"pushed_at": "2021-05-03T06:06:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -283,6 +283,7 @@ The overlayfs implementation in the linux kernel did not properly validate with
- [briskets/CVE-2021-3493](https://github.com/briskets/CVE-2021-3493)
- [oneoy/CVE-2021-3493](https://github.com/oneoy/CVE-2021-3493)
- [Abdennour-py/CVE-2021-3493](https://github.com/Abdennour-py/CVE-2021-3493)
- [AmIAHuman/OverlayFS-CVE-2021-3493](https://github.com/AmIAHuman/OverlayFS-CVE-2021-3493)
### CVE-2021-6857
- [ZiHeny/CVE-2021-6857](https://github.com/ZiHeny/CVE-2021-6857)
@ -808,6 +809,9 @@ Askey RTF8115VW BR_SV_g11.11_RTF_TEF001_V6.54_V014 devices allow injection of a
### CVE-2021-27552
- [sapkota2k20/CVE-2021-27552](https://github.com/sapkota2k20/CVE-2021-27552)
### CVE-2021-27553
- [sapkota2k20/CVE-2021-27553](https://github.com/sapkota2k20/CVE-2021-27553)
### CVE-2021-27890 (2021-03-15)
<code>