Auto Update 2021/05/28 06:11:42

This commit is contained in:
motikan2010-bot 2021-05-28 06:11:42 +09:00
parent cca7daef83
commit 46dc0c7e24
24 changed files with 151 additions and 94 deletions

View file

@ -13,13 +13,13 @@
"description": "Exploit for Remote Code Execution on GPON home routers (CVE-2018-10562) written in Python. Initially disclosed by VPNMentor (https:\/\/www.vpnmentor.com\/blog\/critical-vulnerability-gpon-router\/), kudos for their work.",
"fork": false,
"created_at": "2018-05-07T10:34:10Z",
"updated_at": "2021-05-18T04:20:39Z",
"updated_at": "2021-05-27T20:03:09Z",
"pushed_at": "2018-05-10T15:08:43Z",
"stargazers_count": 207,
"watchers_count": 207,
"forks_count": 68,
"forks": 68,
"watchers": 207,
"stargazers_count": 208,
"watchers_count": 208,
"forks_count": 69,
"forks": 69,
"watchers": 208,
"score": 0
},
{

25
2018/CVE-2018-17254.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 344934273,
"name": "Joomla-JCK-Editor-6.4.4-SQL-Injection",
"full_name": "Nickguitar\/Joomla-JCK-Editor-6.4.4-SQL-Injection",
"owner": {
"login": "Nickguitar",
"id": 3837916,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3837916?v=4",
"html_url": "https:\/\/github.com\/Nickguitar"
},
"html_url": "https:\/\/github.com\/Nickguitar\/Joomla-JCK-Editor-6.4.4-SQL-Injection",
"description": "Exploit for Joomla JCK Editor 6.4.4 (CVE-2018-17254)",
"fork": false,
"created_at": "2021-03-05T21:06:45Z",
"updated_at": "2021-05-27T20:28:48Z",
"pushed_at": "2021-04-17T20:55:23Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 0,
"forks": 0,
"watchers": 8,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-05-27T14:18:00Z",
"updated_at": "2021-05-27T15:54:42Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2593,
"watchers_count": 2593,
"stargazers_count": 2595,
"watchers_count": 2595,
"forks_count": 758,
"forks": 758,
"watchers": 2593,
"watchers": 2595,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2021-05-26T12:42:47Z",
"updated_at": "2021-05-27T16:46:52Z",
"pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 763,
"watchers_count": 763,
"stargazers_count": 764,
"watchers_count": 764,
"forks_count": 160,
"forks": 160,
"watchers": 763,
"watchers": 764,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "PoC for CVE-2019-5736",
"fork": false,
"created_at": "2019-02-13T05:26:32Z",
"updated_at": "2021-05-26T18:00:16Z",
"updated_at": "2021-05-27T15:51:56Z",
"pushed_at": "2019-02-19T11:45:13Z",
"stargazers_count": 506,
"watchers_count": 506,
"stargazers_count": 507,
"watchers_count": 507,
"forks_count": 129,
"forks": 129,
"watchers": 506,
"watchers": 507,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "🐱‍💻 Poc of CVE-2019-7238 - Nexus Repository Manager 3 Remote Code Execution 🐱‍💻",
"fork": false,
"created_at": "2019-02-24T23:09:43Z",
"updated_at": "2021-03-25T19:42:11Z",
"updated_at": "2021-05-27T15:43:40Z",
"pushed_at": "2019-02-25T07:37:07Z",
"stargazers_count": 138,
"watchers_count": 138,
"stargazers_count": 139,
"watchers_count": 139,
"forks_count": 47,
"forks": 47,
"watchers": 138,
"watchers": 139,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
"fork": false,
"created_at": "2019-02-12T06:02:06Z",
"updated_at": "2021-05-20T20:55:21Z",
"updated_at": "2021-05-27T17:51:33Z",
"pushed_at": "2019-05-09T21:34:26Z",
"stargazers_count": 571,
"watchers_count": 571,
"stargazers_count": 572,
"watchers_count": 572,
"forks_count": 134,
"forks": 134,
"watchers": 571,
"watchers": 572,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Exploit for CVE-2019-9810 Firefox on Windows 64-bit.",
"fork": false,
"created_at": "2019-05-05T17:19:02Z",
"updated_at": "2021-05-25T09:38:10Z",
"updated_at": "2021-05-27T19:49:39Z",
"pushed_at": "2019-12-28T18:25:10Z",
"stargazers_count": 207,
"watchers_count": 207,
"stargazers_count": 208,
"watchers_count": 208,
"forks_count": 56,
"forks": 56,
"watchers": 207,
"watchers": 208,
"score": 0
}
]

View file

@ -86,8 +86,8 @@
"pushed_at": "2020-03-24T13:19:34Z",
"stargazers_count": 81,
"watchers_count": 81,
"forks_count": 23,
"forks": 23,
"forks_count": 24,
"forks": 24,
"watchers": 81,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-1337 Windows Print Spooler Privilege Escalation",
"fork": false,
"created_at": "2020-07-21T08:01:20Z",
"updated_at": "2021-02-07T02:19:32Z",
"updated_at": "2021-05-27T18:59:02Z",
"pushed_at": "2020-07-21T10:28:42Z",
"stargazers_count": 144,
"watchers_count": 144,
"stargazers_count": 143,
"watchers_count": 143,
"forks_count": 29,
"forks": 29,
"watchers": 144,
"watchers": 143,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-05-27T14:18:00Z",
"updated_at": "2021-05-27T15:54:42Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2593,
"watchers_count": 2593,
"stargazers_count": 2595,
"watchers_count": 2595,
"forks_count": 758,
"forks": 758,
"watchers": 2593,
"watchers": 2595,
"score": 0
},
{

View file

@ -21,5 +21,28 @@
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 371444911,
"name": "OHTS_IE6052-CVE-2020-17087",
"full_name": "ykg88\/OHTS_IE6052-CVE-2020-17087",
"owner": {
"login": "ykg88",
"id": 12491544,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12491544?v=4",
"html_url": "https:\/\/github.com\/ykg88"
},
"html_url": "https:\/\/github.com\/ykg88\/OHTS_IE6052-CVE-2020-17087",
"description": null,
"fork": false,
"created_at": "2021-05-27T16:55:39Z",
"updated_at": "2021-05-27T17:18:12Z",
"pushed_at": "2021-05-27T17:18:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "The (WordPress) website test script can be exploited for Unlimited File Upload via CVE-2020-35489",
"fork": false,
"created_at": "2020-12-24T09:10:17Z",
"updated_at": "2020-12-26T02:03:37Z",
"updated_at": "2021-05-27T15:31:31Z",
"pushed_at": "2020-12-25T09:51:37Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
},
{

View file

@ -197,13 +197,13 @@
"description": "exploit code for F5-Big-IP (CVE-2020-5902)",
"fork": false,
"created_at": "2020-07-06T01:12:23Z",
"updated_at": "2021-04-13T11:35:32Z",
"updated_at": "2021-05-27T17:05:40Z",
"pushed_at": "2020-07-06T01:36:32Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 12,
"forks": 12,
"watchers": 24,
"watchers": 23,
"score": 0
},
{

View file

@ -109,8 +109,8 @@
"pushed_at": "2020-10-17T08:34:49Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "CVE-2021-21978 EXP",
"fork": false,
"created_at": "2021-03-05T04:33:19Z",
"updated_at": "2021-03-19T09:29:02Z",
"updated_at": "2021-05-27T17:55:37Z",
"pushed_at": "2021-03-05T04:42:17Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,
"forks": 3,
"watchers": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 4,
"forks": 4,
"watchers": 5,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "com_media allowed paths that are not intended for image uploads to RCE",
"fork": false,
"created_at": "2021-03-03T02:13:57Z",
"updated_at": "2021-05-05T19:58:15Z",
"updated_at": "2021-05-27T17:54:15Z",
"pushed_at": "2021-03-03T03:52:10Z",
"stargazers_count": 57,
"watchers_count": 57,
"forks_count": 22,
"forks": 22,
"watchers": 57,
"stargazers_count": 58,
"watchers_count": 58,
"forks_count": 23,
"forks": 23,
"watchers": 58,
"score": 0
}
]

View file

@ -795,13 +795,13 @@
"description": "Proof-of-concept exploit for CVE-2021-26855 and CVE-2021-27065. Unauthenticated RCE in Exchange.",
"fork": false,
"created_at": "2021-03-24T01:12:48Z",
"updated_at": "2021-05-20T09:11:29Z",
"updated_at": "2021-05-27T17:55:20Z",
"pushed_at": "2021-03-24T01:25:05Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 4,
"forks": 4,
"watchers": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 5,
"forks": 5,
"watchers": 16,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "WordPress - Authenticated XXE (CVE-2021-29447)",
"fork": false,
"created_at": "2021-04-16T20:41:26Z",
"updated_at": "2021-05-27T15:13:07Z",
"updated_at": "2021-05-27T16:46:07Z",
"pushed_at": "2021-04-18T00:45:34Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 2,
"forks": 2,
"watchers": 7,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 3,
"forks": 3,
"watchers": 9,
"score": 0
},
{

View file

@ -381,13 +381,13 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2021-05-25T22:25:56Z",
"updated_at": "2021-05-27T16:07:54Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 720,
"watchers_count": 720,
"stargazers_count": 721,
"watchers_count": 721,
"forks_count": 203,
"forks": 203,
"watchers": 720,
"watchers": 721,
"score": 0
},
{
@ -795,13 +795,13 @@
"description": "CVE-2021-3156非交互式执行命令",
"fork": false,
"created_at": "2021-02-09T19:25:18Z",
"updated_at": "2021-05-19T07:32:14Z",
"updated_at": "2021-05-27T16:08:42Z",
"pushed_at": "2021-02-09T19:31:33Z",
"stargazers_count": 148,
"watchers_count": 148,
"stargazers_count": 149,
"watchers_count": 149,
"forks_count": 24,
"forks": 24,
"watchers": 148,
"watchers": 149,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "A Python program implementing and exploiting the Minsky Turing machine considered in the paper \"Intrinsic Propensity for Vulnerability in Computers? Arbitrary Code Execution in the Universal Turing Machine\" as per CVE-2021-32471 (https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-32471)",
"fork": false,
"created_at": "2021-01-21T10:39:42Z",
"updated_at": "2021-05-27T12:06:18Z",
"updated_at": "2021-05-27T18:34:47Z",
"pushed_at": "2021-05-24T04:25:48Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 52,
"watchers_count": 52,
"forks_count": 4,
"forks": 4,
"watchers": 51,
"watchers": 52,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Argument Injection in Dragonfly Ruby Gem",
"fork": false,
"created_at": "2021-05-25T02:48:08Z",
"updated_at": "2021-05-27T14:22:36Z",
"updated_at": "2021-05-27T15:42:16Z",
"pushed_at": "2021-05-26T21:30:29Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-02-28T16:29:07Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 19,
"score": 0
}

View file

@ -4342,6 +4342,7 @@ Windows Kernel Local Elevation of Privilege Vulnerability
</code>
- [revengsh/CVE-2020-17087](https://github.com/revengsh/CVE-2020-17087)
- [ykg88/OHTS_IE6052-CVE-2020-17087](https://github.com/ykg88/OHTS_IE6052-CVE-2020-17087)
### CVE-2020-17136 (2020-12-09)
@ -11815,6 +11816,14 @@ Kibana versions before 6.4.3 and 5.6.13 contain an arbitrary file inclusion flaw
- [mpgn/CVE-2018-17246](https://github.com/mpgn/CVE-2018-17246)
### CVE-2018-17254 (2018-09-20)
<code>
The JCK Editor component 6.4.4 for Joomla! allows SQL Injection via the jtreelink/dialogs/links.php parent parameter.
</code>
- [Nickguitar/Joomla-JCK-Editor-6.4.4-SQL-Injection](https://github.com/Nickguitar/Joomla-JCK-Editor-6.4.4-SQL-Injection)
### CVE-2018-17418 (2019-03-07)
<code>