Auto Update 2021/02/01 12:09:42

This commit is contained in:
motikan2010-bot 2021-02-01 12:09:42 +09:00
parent 45b6d24ad5
commit 47d3ce6826
21 changed files with 188 additions and 140 deletions

View file

@ -13,13 +13,13 @@
"description": "CVE-2014-4210+Redis未授权访问",
"fork": false,
"created_at": "2017-03-10T02:09:48Z",
"updated_at": "2020-11-17T07:24:18Z",
"updated_at": "2021-02-01T01:42:50Z",
"pushed_at": "2017-03-10T08:35:42Z",
"stargazers_count": 82,
"watchers_count": 82,
"stargazers_count": 83,
"watchers_count": 83,
"forks_count": 31,
"forks": 31,
"watchers": 82,
"watchers": 83,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-01-30T10:47:38Z",
"updated_at": "2021-02-01T02:12:14Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 905,
"watchers_count": 905,
"stargazers_count": 906,
"watchers_count": 906,
"forks_count": 213,
"forks": 213,
"watchers": 905,
"watchers": 906,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-01-30T10:47:38Z",
"updated_at": "2021-02-01T02:12:14Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 905,
"watchers_count": 905,
"stargazers_count": 906,
"watchers_count": 906,
"forks_count": 213,
"forks": 213,
"watchers": 905,
"watchers": 906,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Blueborne CVE-2017-0781 Android heap overflow vulnerability",
"fork": false,
"created_at": "2017-10-09T15:13:25Z",
"updated_at": "2021-01-20T00:16:24Z",
"updated_at": "2021-01-31T21:17:04Z",
"pushed_at": "2017-10-09T15:20:11Z",
"stargazers_count": 74,
"watchers_count": 74,
"stargazers_count": 73,
"watchers_count": 73,
"forks_count": 36,
"forks": 36,
"watchers": 74,
"watchers": 73,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Blueborne CVE-2017-0785 Android information leak vulnerability",
"fork": false,
"created_at": "2017-09-20T23:32:29Z",
"updated_at": "2020-10-25T00:52:16Z",
"updated_at": "2021-01-31T21:17:03Z",
"pushed_at": "2017-09-23T05:11:45Z",
"stargazers_count": 431,
"watchers_count": 431,
"stargazers_count": 430,
"watchers_count": 430,
"forks_count": 189,
"forks": 189,
"watchers": 431,
"watchers": 430,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "POC Exploit for Apache Tomcat 7.0.x CVE-2017-12615 PUT JSP vulnerability.",
"fork": false,
"created_at": "2017-09-23T06:15:48Z",
"updated_at": "2021-01-27T14:01:40Z",
"updated_at": "2021-02-01T01:23:16Z",
"pushed_at": "2019-12-20T07:22:17Z",
"stargazers_count": 75,
"watchers_count": 75,
"stargazers_count": 76,
"watchers_count": 76,
"forks_count": 21,
"forks": 21,
"watchers": 75,
"watchers": 76,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-01-30T10:47:38Z",
"updated_at": "2021-02-01T02:12:14Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 905,
"watchers_count": 905,
"stargazers_count": 906,
"watchers_count": 906,
"forks_count": 213,
"forks": 213,
"watchers": 905,
"watchers": 906,
"score": 0
}
]

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-01-30T10:47:38Z",
"updated_at": "2021-02-01T02:12:14Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 905,
"watchers_count": 905,
"stargazers_count": 906,
"watchers_count": 906,
"forks_count": 213,
"forks": 213,
"watchers": 905,
"watchers": 906,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.",
"fork": false,
"created_at": "2019-06-13T23:21:53Z",
"updated_at": "2020-06-28T05:23:37Z",
"updated_at": "2021-02-01T01:20:15Z",
"pushed_at": "2019-06-18T14:57:22Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 5,
"forks": 5,
"watchers": 14,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 6,
"forks": 6,
"watchers": 15,
"score": 0
},
{

View file

@ -197,13 +197,13 @@
"description": "Automated script for Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API. You must have a Shodan account to use this script.",
"fork": false,
"created_at": "2019-12-07T17:09:24Z",
"updated_at": "2020-04-25T05:06:47Z",
"updated_at": "2021-02-01T00:34:37Z",
"pushed_at": "2020-04-25T05:06:45Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"forks": 3,
"watchers": 3,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Atlassian JIRA Template injection vulnerability RCE",
"fork": false,
"created_at": "2019-07-16T02:27:00Z",
"updated_at": "2020-11-26T19:56:26Z",
"updated_at": "2021-01-31T21:42:24Z",
"pushed_at": "2019-07-22T06:47:52Z",
"stargazers_count": 73,
"watchers_count": 73,
"stargazers_count": 74,
"watchers_count": 74,
"forks_count": 27,
"forks": 27,
"watchers": 73,
"watchers": 74,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-01-31T14:01:39Z",
"updated_at": "2021-02-01T01:37:13Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2309,
"watchers_count": 2309,
"forks_count": 646,
"forks": 646,
"watchers": 2309,
"stargazers_count": 2311,
"watchers_count": 2311,
"forks_count": 647,
"forks": 647,
"watchers": 2311,
"score": 0
},
{

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-01-30T10:47:38Z",
"updated_at": "2021-02-01T02:12:14Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 905,
"watchers_count": 905,
"stargazers_count": 906,
"watchers_count": 906,
"forks_count": 213,
"forks": 213,
"watchers": 905,
"watchers": 906,
"score": 0
}
]

View file

@ -68,29 +68,6 @@
"watchers": 336,
"score": 0
},
{
"id": 234220195,
"name": "Awesome-CVE-2020-0601",
"full_name": "RrUZi\/Awesome-CVE-2020-0601",
"owner": {
"login": "RrUZi",
"id": 43235635,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43235635?v=4",
"html_url": "https:\/\/github.com\/RrUZi"
},
"html_url": "https:\/\/github.com\/RrUZi\/Awesome-CVE-2020-0601",
"description": "😂An awesome curated list of repos for CVE-2020-0601.",
"fork": false,
"created_at": "2020-01-16T02:46:21Z",
"updated_at": "2020-02-13T14:33:37Z",
"pushed_at": "2020-02-02T02:29:23Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 234317211,
"name": "CVE-2020-0601",

View file

@ -1393,13 +1393,13 @@
"description": "SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner",
"fork": false,
"created_at": "2020-07-06T14:45:07Z",
"updated_at": "2021-01-03T15:30:24Z",
"updated_at": "2021-01-31T23:34:46Z",
"pushed_at": "2020-07-06T19:00:06Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 10,
"forks": 10,
"watchers": 25,
"watchers": 26,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Apache Kylin API未授权访问漏洞;CVE-2020-13937;Apache Kylin漏洞",
"fork": false,
"created_at": "2021-01-15T08:57:09Z",
"updated_at": "2021-01-29T10:43:36Z",
"updated_at": "2021-02-01T01:49:06Z",
"pushed_at": "2021-01-15T08:59:18Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
"forks": 1,
"watchers": 5,
"watchers": 6,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-01-31T14:01:39Z",
"updated_at": "2021-02-01T01:37:13Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2309,
"watchers_count": 2309,
"forks_count": 646,
"forks": 646,
"watchers": 2309,
"stargazers_count": 2311,
"watchers_count": 2311,
"forks_count": 647,
"forks": 647,
"watchers": 2311,
"score": 0
},
{

View file

@ -527,5 +527,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 334802810,
"name": "CVE-2020-1938-MSF-MODULE",
"full_name": "YU5Z8X2CvH1fv4ep\/CVE-2020-1938-MSF-MODULE",
"owner": {
"login": "YU5Z8X2CvH1fv4ep",
"id": 57204004,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57204004?v=4",
"html_url": "https:\/\/github.com\/YU5Z8X2CvH1fv4ep"
},
"html_url": "https:\/\/github.com\/YU5Z8X2CvH1fv4ep\/CVE-2020-1938-MSF-MODULE",
"description": "Modified version of auxiliary\/admin\/http\/tomcat_ghostcat, it cant Read any file",
"fork": false,
"created_at": "2021-02-01T01:59:17Z",
"updated_at": "2021-02-01T02:10:09Z",
"pushed_at": "2021-02-01T02:10:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-01-30T10:47:38Z",
"updated_at": "2021-02-01T02:12:14Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 905,
"watchers_count": 905,
"stargazers_count": 906,
"watchers_count": 906,
"forks_count": 213,
"forks": 213,
"watchers": 905,
"watchers": 906,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Information about Kubernetes CVE-2020-8558, including proof of concept exploit.",
"fork": false,
"created_at": "2020-07-09T06:56:07Z",
"updated_at": "2021-01-27T21:16:51Z",
"updated_at": "2021-01-31T22:36:08Z",
"pushed_at": "2020-07-22T12:34:47Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 4,
"forks": 4,
"watchers": 26,
"watchers": 27,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "CVE-2021-3156",
"fork": false,
"created_at": "2021-01-27T16:03:34Z",
"updated_at": "2021-01-31T09:30:17Z",
"updated_at": "2021-02-01T02:26:46Z",
"pushed_at": "2021-01-31T04:56:56Z",
"stargazers_count": 77,
"watchers_count": 77,
"forks_count": 40,
"forks": 40,
"watchers": 77,
"stargazers_count": 80,
"watchers_count": 80,
"forks_count": 41,
"forks": 41,
"watchers": 80,
"score": 0
},
{
@ -289,13 +289,13 @@
"description": null,
"fork": false,
"created_at": "2021-01-29T11:32:33Z",
"updated_at": "2021-01-31T13:17:31Z",
"updated_at": "2021-02-01T01:56:17Z",
"pushed_at": "2021-01-31T10:37:32Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 6,
"forks": 6,
"watchers": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 7,
"forks": 7,
"watchers": 5,
"score": 0
},
{
@ -312,13 +312,13 @@
"description": "Notes regarding CVE-2021-3156: Heap-Based Buffer Overflow in Sudo",
"fork": false,
"created_at": "2021-01-29T19:24:41Z",
"updated_at": "2021-01-31T19:08:18Z",
"updated_at": "2021-02-01T00:19:22Z",
"pushed_at": "2021-01-31T02:21:37Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 3,
"forks": 3,
"watchers": 33,
"watchers": 34,
"score": 0
},
{
@ -335,13 +335,13 @@
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
"fork": false,
"created_at": "2021-01-30T03:22:04Z",
"updated_at": "2021-01-31T20:27:23Z",
"updated_at": "2021-02-01T03:03:48Z",
"pushed_at": "2021-01-30T04:30:24Z",
"stargazers_count": 164,
"watchers_count": 164,
"forks_count": 46,
"forks": 46,
"watchers": 164,
"stargazers_count": 183,
"watchers_count": 183,
"forks_count": 52,
"forks": 52,
"watchers": 183,
"score": 0
},
{
@ -358,8 +358,8 @@
"description": "checking CVE-2021-3156 vulnerability & patch script",
"fork": false,
"created_at": "2021-01-30T10:53:26Z",
"updated_at": "2021-01-30T10:57:40Z",
"pushed_at": "2021-01-30T10:57:38Z",
"updated_at": "2021-02-01T02:19:22Z",
"pushed_at": "2021-02-01T02:19:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
@ -381,13 +381,13 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2021-01-31T20:29:11Z",
"updated_at": "2021-02-01T03:05:09Z",
"pushed_at": "2021-01-31T17:37:38Z",
"stargazers_count": 98,
"watchers_count": 98,
"forks_count": 28,
"forks": 28,
"watchers": 98,
"stargazers_count": 133,
"watchers_count": 133,
"forks_count": 40,
"forks": 40,
"watchers": 133,
"score": 0
},
{
@ -404,13 +404,13 @@
"description": null,
"fork": false,
"created_at": "2021-01-31T03:38:37Z",
"updated_at": "2021-01-31T15:52:37Z",
"updated_at": "2021-02-01T01:01:45Z",
"pushed_at": "2021-01-31T04:02:08Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"forks": 3,
"watchers": 3,
"score": 0
},
{
@ -458,5 +458,51 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 334775019,
"name": "docker-CVE-2021-3156",
"full_name": "apogiatzis\/docker-CVE-2021-3156",
"owner": {
"login": "apogiatzis",
"id": 39923420,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39923420?v=4",
"html_url": "https:\/\/github.com\/apogiatzis"
},
"html_url": "https:\/\/github.com\/apogiatzis\/docker-CVE-2021-3156",
"description": "A docker environment to research CVE-2021-3156",
"fork": false,
"created_at": "2021-01-31T22:58:13Z",
"updated_at": "2021-01-31T23:03:53Z",
"pushed_at": "2021-01-31T23:03:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 334790116,
"name": "CVE-2021-3156",
"full_name": "voidlsd\/CVE-2021-3156",
"owner": {
"login": "voidlsd",
"id": 46201891,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46201891?v=4",
"html_url": "https:\/\/github.com\/voidlsd"
},
"html_url": "https:\/\/github.com\/voidlsd\/CVE-2021-3156",
"description": "a simple script to patch CVE-2021-3156 (heap based buffer overflow via sudo).",
"fork": false,
"created_at": "2021-02-01T00:41:55Z",
"updated_at": "2021-02-01T00:42:21Z",
"pushed_at": "2021-02-01T00:42:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -82,6 +82,8 @@ Sudo before 1.9.5p2 has a Heap-based Buffer Overflow, allowing privilege escalat
- [teamtopkarl/CVE-2021-3156](https://github.com/teamtopkarl/CVE-2021-3156)
- [Q4n/CVE-2021-3156](https://github.com/Q4n/CVE-2021-3156)
- [kal1gh0st/CVE-2021-3156](https://github.com/kal1gh0st/CVE-2021-3156)
- [apogiatzis/docker-CVE-2021-3156](https://github.com/apogiatzis/docker-CVE-2021-3156)
- [voidlsd/CVE-2021-3156](https://github.com/voidlsd/CVE-2021-3156)
### CVE-2021-3164 (2021-01-21)
@ -225,7 +227,6 @@ A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) valid
- [0xxon/cve-2020-0601](https://github.com/0xxon/cve-2020-0601)
- [0xxon/cve-2020-0601-plugin](https://github.com/0xxon/cve-2020-0601-plugin)
- [kudelskisecurity/chainoffools](https://github.com/kudelskisecurity/chainoffools)
- [RrUZi/Awesome-CVE-2020-0601](https://github.com/RrUZi/Awesome-CVE-2020-0601)
- [BleepSec/CVE-2020-0601](https://github.com/BleepSec/CVE-2020-0601)
- [saleemrashid/badecparams](https://github.com/saleemrashid/badecparams)
- [apodlosky/PoC_CurveBall](https://github.com/apodlosky/PoC_CurveBall)
@ -721,6 +722,7 @@ When using the Apache JServ Protocol (AJP), care must be taken when trusting inc
- [Umesh2807/Ghostcat](https://github.com/Umesh2807/Ghostcat)
- [MateoSec/ghostcatch](https://github.com/MateoSec/ghostcatch)
- [kukudechen-chen/cve-2020-1938](https://github.com/kukudechen-chen/cve-2020-1938)
- [YU5Z8X2CvH1fv4ep/CVE-2020-1938-MSF-MODULE](https://github.com/YU5Z8X2CvH1fv4ep/CVE-2020-1938-MSF-MODULE)
### CVE-2020-1947 (2020-03-11)