Auto Update 2021/07/15 18:11:58

This commit is contained in:
motikan2010-bot 2021-07-15 18:11:58 +09:00
parent 29dd5aa473
commit 4b928597d8
26 changed files with 282 additions and 84 deletions

25
2012/CVE-2012-1870.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 386163416,
"name": "CVE-2012-1870",
"full_name": "fkm75P8YjLkb\/CVE-2012-1870",
"owner": {
"login": "fkm75P8YjLkb",
"id": 82131630,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82131630?v=4",
"html_url": "https:\/\/github.com\/fkm75P8YjLkb"
},
"html_url": "https:\/\/github.com\/fkm75P8YjLkb\/CVE-2012-1870",
"description": null,
"fork": false,
"created_at": "2021-07-15T04:33:10Z",
"updated_at": "2021-07-15T04:33:10Z",
"pushed_at": "2021-07-15T04:33:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2013-2596 exploit for android",
"fork": false,
"created_at": "2013-07-16T11:24:09Z",
"updated_at": "2019-10-20T07:13:22Z",
"updated_at": "2021-07-15T07:52:01Z",
"pushed_at": "2013-07-17T03:18:50Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 22,
"forks": 22,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -105,13 +105,13 @@
"description": "CVE-2017-11882 Exploit accepts over 17k bytes long command\/code in maximum.",
"fork": false,
"created_at": "2017-11-21T15:22:41Z",
"updated_at": "2021-07-03T10:16:57Z",
"updated_at": "2021-07-15T03:39:38Z",
"pushed_at": "2017-12-06T12:47:31Z",
"stargazers_count": 286,
"watchers_count": 286,
"stargazers_count": 287,
"watchers_count": 287,
"forks_count": 87,
"forks": 87,
"watchers": 286,
"watchers": 287,
"score": 0
},
{

View file

@ -178,8 +178,8 @@
"pushed_at": "2017-04-05T23:29:03Z",
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 42,
"forks": 42,
"forks_count": 43,
"forks": 43,
"watchers": 42,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.",
"fork": false,
"created_at": "2019-09-29T07:08:52Z",
"updated_at": "2021-07-14T18:41:41Z",
"updated_at": "2021-07-15T08:04:37Z",
"pushed_at": "2020-06-13T17:40:14Z",
"stargazers_count": 588,
"watchers_count": 588,
"stargazers_count": 589,
"watchers_count": 589,
"forks_count": 84,
"forks": 84,
"watchers": 588,
"watchers": 589,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Course enrolments allowed privilege escalation from teacher role into manager role to RCE",
"fork": false,
"created_at": "2020-07-26T01:28:53Z",
"updated_at": "2021-07-13T13:17:53Z",
"updated_at": "2021-07-15T06:12:01Z",
"pushed_at": "2021-06-20T08:46:12Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 4,
"forks": 4,
"watchers": 21,
"watchers": 22,
"score": 0
},
{

View file

@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-07-14T06:26:09Z",
"updated_at": "2021-07-15T09:14:50Z",
"pushed_at": "2021-04-26T02:30:11Z",
"stargazers_count": 807,
"watchers_count": 807,
"stargazers_count": 808,
"watchers_count": 808,
"forks_count": 255,
"forks": 255,
"watchers": 807,
"watchers": 808,
"score": 0
}
]

View file

@ -615,8 +615,8 @@
"pushed_at": "2021-07-12T06:06:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-24148 Proof-of-Concept",
"fork": false,
"created_at": "2021-07-12T02:01:26Z",
"updated_at": "2021-07-12T17:27:32Z",
"updated_at": "2021-07-15T04:48:12Z",
"pushed_at": "2021-07-12T02:25:14Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "tomcat使用了自带session同步功能时不安全的配置没有使用EncryptInterceptor导致存在的反序列化漏洞通过精心构造的数据包 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-94849484是session持久化的洞这个是session集群同步的洞",
"fork": false,
"created_at": "2020-05-19T05:12:53Z",
"updated_at": "2021-07-01T06:48:12Z",
"updated_at": "2021-07-15T06:15:15Z",
"pushed_at": "2020-05-19T05:13:19Z",
"stargazers_count": 200,
"watchers_count": 200,
"stargazers_count": 201,
"watchers_count": 201,
"forks_count": 35,
"forks": 35,
"watchers": 200,
"watchers": 201,
"score": 0
},
{

View file

@ -105,13 +105,13 @@
"description": "PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527",
"fork": false,
"created_at": "2021-07-01T09:00:31Z",
"updated_at": "2021-07-08T11:08:46Z",
"updated_at": "2021-07-15T03:50:25Z",
"pushed_at": "2021-07-02T10:47:36Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 8,
"forks": 8,
"watchers": 16,
"watchers": 17,
"score": 0
},
{
@ -132,8 +132,8 @@
"pushed_at": "2021-07-05T06:46:12Z",
"stargazers_count": 270,
"watchers_count": 270,
"forks_count": 61,
"forks": 61,
"forks_count": 62,
"forks": 62,
"watchers": 270,
"score": 0
},
@ -542,13 +542,13 @@
"description": "Information on the Windows Spooler vulnerability - CVE-2021-1675; CVE 2021 34527",
"fork": false,
"created_at": "2021-07-07T08:32:09Z",
"updated_at": "2021-07-13T19:19:55Z",
"updated_at": "2021-07-15T05:54:08Z",
"pushed_at": "2021-07-12T09:28:16Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 5,
"forks": 5,
"watchers": 8,
"watchers": 9,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "CVE-­2021­-1732 Microsoft Windows 10 本地提权漏 研究及Poc\/Exploit开发",
"fork": false,
"created_at": "2021-03-08T05:07:15Z",
"updated_at": "2021-07-15T02:58:02Z",
"updated_at": "2021-07-15T06:02:02Z",
"pushed_at": "2021-03-08T11:41:19Z",
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 14,
"forks": 14,
"watchers": 25,
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 15,
"forks": 15,
"watchers": 26,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2021-22192 靶场: 未授权用户 RCE 漏洞",
"fork": false,
"created_at": "2021-03-27T07:09:46Z",
"updated_at": "2021-06-30T02:23:49Z",
"updated_at": "2021-07-15T03:28:01Z",
"pushed_at": "2021-05-02T05:34:29Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 4,
"forks": 4,
"watchers": 27,
"watchers": 28,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.",
"fork": false,
"created_at": "2021-04-07T11:10:40Z",
"updated_at": "2021-07-11T13:56:45Z",
"updated_at": "2021-07-15T06:25:21Z",
"pushed_at": "2021-04-15T12:46:54Z",
"stargazers_count": 182,
"watchers_count": 182,
"forks_count": 41,
"forks": 41,
"watchers": 182,
"stargazers_count": 183,
"watchers_count": 183,
"forks_count": 42,
"forks": 42,
"watchers": 183,
"score": 0
}
]

View file

@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-07-14T06:26:09Z",
"updated_at": "2021-07-15T09:14:50Z",
"pushed_at": "2021-04-26T02:30:11Z",
"stargazers_count": 807,
"watchers_count": 807,
"stargazers_count": 808,
"watchers_count": 808,
"forks_count": 255,
"forks": 255,
"watchers": 807,
"watchers": 808,
"score": 0
},
{

25
2021/CVE-2021-26690.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 386164563,
"name": "CVE-2021-26690",
"full_name": "fkm75P8YjLkb\/CVE-2021-26690",
"owner": {
"login": "fkm75P8YjLkb",
"id": 82131630,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82131630?v=4",
"html_url": "https:\/\/github.com\/fkm75P8YjLkb"
},
"html_url": "https:\/\/github.com\/fkm75P8YjLkb\/CVE-2021-26690",
"description": null,
"fork": false,
"created_at": "2021-07-15T04:38:43Z",
"updated_at": "2021-07-15T04:38:43Z",
"pushed_at": "2021-07-15T04:38:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2021/CVE-2021-26691.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 386164410,
"name": "CVE-2021-26691",
"full_name": "fkm75P8YjLkb\/CVE-2021-26691",
"owner": {
"login": "fkm75P8YjLkb",
"id": 82131630,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82131630?v=4",
"html_url": "https:\/\/github.com\/fkm75P8YjLkb"
},
"html_url": "https:\/\/github.com\/fkm75P8YjLkb\/CVE-2021-26691",
"description": null,
"fork": false,
"created_at": "2021-07-15T04:37:58Z",
"updated_at": "2021-07-15T04:37:58Z",
"pushed_at": "2021-07-15T04:37:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "A PowerShell script to identify indicators of exploitation of CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-26865",
"fork": false,
"created_at": "2021-03-03T17:36:18Z",
"updated_at": "2021-06-30T06:07:31Z",
"updated_at": "2021-07-15T07:34:15Z",
"pushed_at": "2021-03-05T17:09:01Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 1,
"forks": 1,
"watchers": 16,
"watchers": 17,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.",
"fork": false,
"created_at": "2021-05-31T18:02:39Z",
"updated_at": "2021-07-13T16:48:14Z",
"updated_at": "2021-07-15T06:23:34Z",
"pushed_at": "2021-06-01T15:08:23Z",
"stargazers_count": 172,
"watchers_count": 172,
"forks_count": 26,
"forks": 26,
"watchers": 172,
"stargazers_count": 174,
"watchers_count": 174,
"forks_count": 27,
"forks": 27,
"watchers": 174,
"score": 0
},
{

25
2021/CVE-2021-30641.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 386163197,
"name": "CVE-2021-30641",
"full_name": "fkm75P8YjLkb\/CVE-2021-30641",
"owner": {
"login": "fkm75P8YjLkb",
"id": 82131630,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82131630?v=4",
"html_url": "https:\/\/github.com\/fkm75P8YjLkb"
},
"html_url": "https:\/\/github.com\/fkm75P8YjLkb\/CVE-2021-30641",
"description": null,
"fork": false,
"created_at": "2021-07-15T04:31:58Z",
"updated_at": "2021-07-15T04:31:58Z",
"pushed_at": "2021-07-15T04:31:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.",
"fork": false,
"created_at": "2021-06-09T15:44:00Z",
"updated_at": "2021-07-01T06:35:02Z",
"updated_at": "2021-07-15T06:41:27Z",
"pushed_at": "2021-06-26T18:31:23Z",
"stargazers_count": 44,
"watchers_count": 44,
"forks_count": 5,
"forks": 5,
"watchers": 44,
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 6,
"forks": 6,
"watchers": 45,
"score": 0
}
]

25
2021/CVE-2021-34496.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 386161559,
"name": "CVE-2021-34496",
"full_name": "fkm75P8YjLkb\/CVE-2021-34496",
"owner": {
"login": "fkm75P8YjLkb",
"id": 82131630,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82131630?v=4",
"html_url": "https:\/\/github.com\/fkm75P8YjLkb"
},
"html_url": "https:\/\/github.com\/fkm75P8YjLkb\/CVE-2021-34496",
"description": null,
"fork": false,
"created_at": "2021-07-15T04:23:58Z",
"updated_at": "2021-07-15T04:23:58Z",
"pushed_at": "2021-07-15T04:23:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -224,8 +224,8 @@
"pushed_at": "2021-07-09T15:49:23Z",
"stargazers_count": 558,
"watchers_count": 558,
"forks_count": 67,
"forks": 67,
"forks_count": 68,
"forks": 68,
"watchers": 558,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2021-3492 used at Pwn2Own 2021",
"fork": false,
"created_at": "2021-06-28T09:43:31Z",
"updated_at": "2021-07-14T17:45:19Z",
"updated_at": "2021-07-15T04:32:12Z",
"pushed_at": "2021-06-28T09:55:57Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 1,
"forks": 1,
"watchers": 10,
"watchers": 11,
"score": 0
}
]

25
2021/CVE-2021-3516.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 386162783,
"name": "CVE-2021-3516",
"full_name": "fkm75P8YjLkb\/CVE-2021-3516",
"owner": {
"login": "fkm75P8YjLkb",
"id": 82131630,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82131630?v=4",
"html_url": "https:\/\/github.com\/fkm75P8YjLkb"
},
"html_url": "https:\/\/github.com\/fkm75P8YjLkb\/CVE-2021-3516",
"description": null,
"fork": false,
"created_at": "2021-07-15T04:29:56Z",
"updated_at": "2021-07-15T04:29:56Z",
"pushed_at": "2021-07-15T04:29:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -374,6 +374,14 @@ The overlayfs implementation in the linux kernel did not properly validate with
- [Ishan3011/CVE-2021-3493](https://github.com/Ishan3011/CVE-2021-3493)
- [inspiringz/CVE-2021-3493](https://github.com/inspiringz/CVE-2021-3493)
### CVE-2021-3516 (2021-06-01)
<code>
There's a flaw in libxml2's xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.
</code>
- [fkm75P8YjLkb/CVE-2021-3516](https://github.com/fkm75P8YjLkb/CVE-2021-3516)
### CVE-2021-3560
- [swapravo/polkadots](https://github.com/swapravo/polkadots)
- [deathflash1411/CVE-2021-3560](https://github.com/deathflash1411/CVE-2021-3560)
@ -864,6 +872,22 @@ Windows Installer Elevation of Privilege Vulnerability This CVE ID is unique fro
- [adenkiewicz/CVE-2021-26415](https://github.com/adenkiewicz/CVE-2021-26415)
### CVE-2021-26690 (2021-06-10)
<code>
Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Cookie header handled by mod_session can cause a NULL pointer dereference and crash, leading to a possible Denial Of Service
</code>
- [fkm75P8YjLkb/CVE-2021-26690](https://github.com/fkm75P8YjLkb/CVE-2021-26690)
### CVE-2021-26691 (2021-06-10)
<code>
In Apache HTTP Server versions 2.4.0 to 2.4.46 a specially crafted SessionHeader sent by an origin server could cause a heap overflow
</code>
- [fkm75P8YjLkb/CVE-2021-26691](https://github.com/fkm75P8YjLkb/CVE-2021-26691)
### CVE-2021-26700 (2021-02-25)
<code>
@ -1353,6 +1377,14 @@ Valve Steam through 2021-04-10, when a Source engine game is installed, allows r
- [floesen/CVE-2021-30481](https://github.com/floesen/CVE-2021-30481)
### CVE-2021-30641 (2021-06-10)
<code>
Apache HTTP Server versions 2.4.39 to 2.4.46 Unexpected matching behavior with 'MergeSlashes OFF'
</code>
- [fkm75P8YjLkb/CVE-2021-30641](https://github.com/fkm75P8YjLkb/CVE-2021-30641)
### CVE-2021-31159 (2021-06-16)
<code>
@ -1518,6 +1550,14 @@ Tencent GameLoop before 4.1.21.90 downloaded updates over an insecure HTTP conne
### CVE-2021-34045
- [Al1ex/CVE-2021-34045](https://github.com/Al1ex/CVE-2021-34045)
### CVE-2021-34496 (2021-07-14)
<code>
Windows GDI Information Disclosure Vulnerability
</code>
- [fkm75P8YjLkb/CVE-2021-34496](https://github.com/fkm75P8YjLkb/CVE-2021-34496)
### CVE-2021-34527 (2021-07-02)
<code>
@ -18470,6 +18510,14 @@ sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured
- [Unix13/metasploitable2](https://github.com/Unix13/metasploitable2)
- [cyberharsh/PHP_CVE-2012-1823](https://github.com/cyberharsh/PHP_CVE-2012-1823)
### CVE-2012-1870 (2012-07-10)
<code>
The CBC mode in the TLS protocol, as used in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and other products, allows remote web servers to obtain plaintext data by triggering multiple requests to a third-party HTTPS server and sniffing the network during the resulting HTTPS session, aka &quot;TLS Protocol Vulnerability.&quot;
</code>
- [fkm75P8YjLkb/CVE-2012-1870](https://github.com/fkm75P8YjLkb/CVE-2012-1870)
### CVE-2012-1876 (2012-06-12)
<code>