Auto Update 2021/11/06 06:12:56

This commit is contained in:
motikan2010-bot 2021-11-06 15:12:56 +09:00
parent 71727ab2f6
commit 4779d09ecf
20 changed files with 119 additions and 63 deletions

View file

@ -13,17 +13,17 @@
"description": "This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actually consists of embedded payload. The exploit was made public as CVE-2010-1240. ",
"fork": false,
"created_at": "2021-06-05T18:59:28Z",
"updated_at": "2021-09-25T12:44:25Z",
"updated_at": "2021-11-06T04:21:34Z",
"pushed_at": "2021-06-06T09:41:51Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -187,5 +187,32 @@
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 425153525,
"name": "CVE-2018-0114",
"full_name": "mmeza-developer\/CVE-2018-0114",
"owner": {
"login": "mmeza-developer",
"id": 20251063,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20251063?v=4",
"html_url": "https:\/\/github.com\/mmeza-developer"
},
"html_url": "https:\/\/github.com\/mmeza-developer\/CVE-2018-0114",
"description": "JWT Exploit",
"fork": false,
"created_at": "2021-11-06T04:16:10Z",
"updated_at": "2021-11-06T04:16:23Z",
"pushed_at": "2021-11-06T04:16:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -160,5 +160,32 @@
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 425154730,
"name": "CVE-2019-5420-RCE",
"full_name": "mmeza-developer\/CVE-2019-5420-RCE",
"owner": {
"login": "mmeza-developer",
"id": 20251063,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20251063?v=4",
"html_url": "https:\/\/github.com\/mmeza-developer"
},
"html_url": "https:\/\/github.com\/mmeza-developer\/CVE-2019-5420-RCE",
"description": null,
"fork": false,
"created_at": "2021-11-06T04:24:43Z",
"updated_at": "2021-11-06T04:25:00Z",
"pushed_at": "2021-11-06T04:24:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1609,17 +1609,17 @@
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
"fork": false,
"created_at": "2020-06-10T16:44:39Z",
"updated_at": "2021-10-23T11:31:54Z",
"updated_at": "2021-11-06T03:38:11Z",
"pushed_at": "2021-01-15T19:21:25Z",
"stargazers_count": 146,
"watchers_count": 146,
"stargazers_count": 147,
"watchers_count": 147,
"forks_count": 40,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 40,
"watchers": 146,
"watchers": 147,
"score": 0
},
{

View file

@ -121,10 +121,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-11-05T05:49:49Z",
"updated_at": "2021-11-06T02:26:48Z",
"pushed_at": "2021-07-30T03:28:00Z",
"stargazers_count": 876,
"watchers_count": 876,
"stargazers_count": 877,
"watchers_count": 877,
"forks_count": 278,
"allow_forking": true,
"is_template": false,
@ -135,7 +135,7 @@
],
"visibility": "public",
"forks": 278,
"watchers": 876,
"watchers": 877,
"score": 0
}
]

View file

@ -77,12 +77,12 @@
"pushed_at": "2021-10-13T07:53:46Z",
"stargazers_count": 353,
"watchers_count": 353,
"forks_count": 109,
"forks_count": 108,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 109,
"forks": 108,
"watchers": 353,
"score": 0
},
@ -293,12 +293,12 @@
"pushed_at": "2021-06-02T02:22:58Z",
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 9,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"forks": 8,
"watchers": 38,
"score": 0
},

View file

@ -144,12 +144,12 @@
"pushed_at": "2021-02-25T16:05:02Z",
"stargazers_count": 164,
"watchers_count": 164,
"forks_count": 61,
"forks_count": 62,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 61,
"forks": 62,
"watchers": 164,
"score": 0
},

View file

@ -121,19 +121,19 @@
"description": "CVE-2021-22205& GitLab CE\/EE RCE",
"fork": false,
"created_at": "2021-10-29T04:30:45Z",
"updated_at": "2021-11-05T13:29:13Z",
"pushed_at": "2021-10-29T04:31:15Z",
"stargazers_count": 54,
"watchers_count": 54,
"forks_count": 22,
"updated_at": "2021-11-06T05:20:26Z",
"pushed_at": "2021-11-06T05:20:30Z",
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-22205"
],
"visibility": "public",
"forks": 22,
"watchers": 54,
"forks": 23,
"watchers": 55,
"score": 0
},
{

View file

@ -67,17 +67,17 @@
"description": "Gitlab CI Lint API未授权 SSRF漏洞 CVE-2021-22214",
"fork": false,
"created_at": "2021-11-01T04:04:42Z",
"updated_at": "2021-11-04T23:47:29Z",
"updated_at": "2021-11-06T04:24:38Z",
"pushed_at": "2021-11-04T02:21:28Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -121,10 +121,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-11-05T05:49:49Z",
"updated_at": "2021-11-06T02:26:48Z",
"pushed_at": "2021-07-30T03:28:00Z",
"stargazers_count": 876,
"watchers_count": 876,
"stargazers_count": 877,
"watchers_count": 877,
"forks_count": 278,
"allow_forking": true,
"is_template": false,
@ -135,7 +135,7 @@
],
"visibility": "public",
"forks": 278,
"watchers": 876,
"watchers": 877,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-05-11T10:40:20Z",
"updated_at": "2021-11-05T15:53:38Z",
"updated_at": "2021-11-06T04:43:47Z",
"pushed_at": "2021-05-11T10:42:40Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 28,
"watchers": 29,
"score": 0
}
]

View file

@ -780,17 +780,17 @@
"description": "Root shell PoC for CVE-2021-3156",
"fork": false,
"created_at": "2021-02-03T19:57:56Z",
"updated_at": "2021-11-04T02:08:45Z",
"updated_at": "2021-11-06T00:18:51Z",
"pushed_at": "2021-02-03T22:28:14Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 77,
"watchers_count": 77,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 76,
"watchers": 77,
"score": 0
},
{

View file

@ -98,12 +98,12 @@
"pushed_at": "2021-09-07T15:18:45Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 11,
"score": 0
}

View file

@ -13,8 +13,8 @@
"description": "TP Seguridad Informática UTN FRBA 2021",
"fork": false,
"created_at": "2021-09-09T12:55:55Z",
"updated_at": "2021-10-30T22:06:59Z",
"pushed_at": "2021-10-30T22:05:00Z",
"updated_at": "2021-11-06T02:59:16Z",
"pushed_at": "2021-11-06T02:59:14Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-11-05T03:18:46Z",
"updated_at": "2021-11-05T09:42:16Z",
"updated_at": "2021-11-06T03:39:53Z",
"pushed_at": "2021-11-05T03:17:58Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 5,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 1,
"forks": 7,
"watchers": 5,
"score": 0
}
]

View file

@ -71,12 +71,12 @@
"pushed_at": "2021-09-16T10:39:04Z",
"stargazers_count": 178,
"watchers_count": 178,
"forks_count": 51,
"forks_count": 52,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 51,
"forks": 52,
"watchers": 178,
"score": 0
},

View file

@ -40,17 +40,17 @@
"description": "windows 10 14393 LPE",
"fork": false,
"created_at": "2021-10-20T09:24:36Z",
"updated_at": "2021-11-01T11:52:39Z",
"updated_at": "2021-11-06T03:46:34Z",
"pushed_at": "2021-10-28T03:51:09Z",
"stargazers_count": 64,
"watchers_count": 64,
"stargazers_count": 65,
"watchers_count": 65,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 64,
"watchers": 65,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "Exploitation code for CVE-2021-40539",
"fork": false,
"created_at": "2021-11-03T14:49:27Z",
"updated_at": "2021-11-04T22:26:12Z",
"updated_at": "2021-11-06T04:03:04Z",
"pushed_at": "2021-11-03T14:52:06Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,8 +13,8 @@
"description": "WIP kernel exploit for minor bug i found in amd gpu driver",
"fork": false,
"created_at": "2021-10-28T21:10:29Z",
"updated_at": "2021-11-05T23:50:07Z",
"pushed_at": "2021-11-05T23:50:04Z",
"updated_at": "2021-11-06T00:18:40Z",
"pushed_at": "2021-11-06T00:18:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -8712,6 +8712,7 @@ A remote code execution vulnerability in development mode Rails <5.2.2.1, &lt
- [Eremiel/CVE-2019-5420](https://github.com/Eremiel/CVE-2019-5420)
- [scumdestroy/CVE-2019-5420.rb](https://github.com/scumdestroy/CVE-2019-5420.rb)
- [RyouYoo/CVE-2019-5420](https://github.com/RyouYoo/CVE-2019-5420)
- [mmeza-developer/CVE-2019-5420-RCE](https://github.com/mmeza-developer/CVE-2019-5420-RCE)
### CVE-2019-5427 (2019-04-22)
@ -11764,6 +11765,7 @@ A vulnerability in the Cisco node-jose open source library before 0.11.0 could a
- [Starry-lord/CVE-2018-0114](https://github.com/Starry-lord/CVE-2018-0114)
- [scumdestroy/CVE-2018-0114](https://github.com/scumdestroy/CVE-2018-0114)
- [RyouYoo/CVE-2018-0114](https://github.com/RyouYoo/CVE-2018-0114)
- [mmeza-developer/CVE-2018-0114](https://github.com/mmeza-developer/CVE-2018-0114)
### CVE-2018-0202 (2018-03-27)