Auto Update 2021/03/01 00:08:48

This commit is contained in:
motikan2010-bot 2021-03-01 00:08:48 +09:00
parent c0a0733c7e
commit 5657cf85d6
16 changed files with 100 additions and 67 deletions

View file

@ -13,13 +13,13 @@
"description": "CVE-2018-4248: Out-of-bounds read in libxpc during string serialization.",
"fork": false,
"created_at": "2018-05-10T04:31:38Z",
"updated_at": "2020-03-17T04:31:39Z",
"updated_at": "2021-02-28T13:22:50Z",
"pushed_at": "2018-07-10T00:05:46Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 4,
"forks": 4,
"watchers": 46,
"watchers": 47,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "CVE-2018-4280: Mach port replacement vulnerability in launchd on iOS 11.2.6 leading to sandbox escape, privilege escalation, and codesigning bypass.",
"fork": false,
"created_at": "2018-02-23T00:19:05Z",
"updated_at": "2021-01-26T00:45:25Z",
"updated_at": "2021-02-28T13:31:57Z",
"pushed_at": "2018-11-13T00:26:18Z",
"stargazers_count": 211,
"watchers_count": 211,
"stargazers_count": 212,
"watchers_count": 212,
"forks_count": 40,
"forks": 40,
"watchers": 211,
"watchers": 212,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "Arbitrary code execution with kernel privileges using CVE-2018-8897.",
"fork": false,
"created_at": "2018-05-13T19:34:17Z",
"updated_at": "2021-02-23T22:11:11Z",
"updated_at": "2021-02-28T14:26:43Z",
"pushed_at": "2018-05-18T12:26:53Z",
"stargazers_count": 374,
"watchers_count": 374,
"stargazers_count": 378,
"watchers_count": 378,
"forks_count": 107,
"forks": 107,
"watchers": 374,
"watchers": 378,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2021-02-28T04:47:32Z",
"updated_at": "2021-02-28T14:17:57Z",
"pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 720,
"watchers_count": 720,
"stargazers_count": 721,
"watchers_count": 721,
"forks_count": 151,
"forks": 151,
"watchers": 720,
"watchers": 721,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2020-08-10T21:34:16Z",
"updated_at": "2020-11-16T05:31:22Z",
"updated_at": "2021-02-28T11:22:33Z",
"pushed_at": "2021-02-18T04:17:07Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 12,
"forks": 12,
"watchers": 16,
"watchers": 17,
"score": 0
},
{

View file

@ -887,13 +887,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2021-02-27T01:02:35Z",
"updated_at": "2021-02-28T12:56:56Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1087,
"watchers_count": 1087,
"stargazers_count": 1088,
"watchers_count": 1088,
"forks_count": 359,
"forks": 359,
"watchers": 1087,
"watchers": 1088,
"score": 0
},
{

View file

@ -128,13 +128,13 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2021-02-23T13:31:12Z",
"updated_at": "2021-02-28T12:58:48Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 287,
"watchers_count": 287,
"stargazers_count": 288,
"watchers_count": 288,
"forks_count": 94,
"forks": 94,
"watchers": 287,
"watchers": 288,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC of CVE",
"fork": false,
"created_at": "2020-02-27T08:18:56Z",
"updated_at": "2020-12-22T07:51:17Z",
"updated_at": "2021-02-28T09:16:36Z",
"pushed_at": "2020-03-08T05:53:47Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 10,
"forks": 10,
"watchers": 22,
"watchers": 23,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2021-02-16T16:55:46Z",
"updated_at": "2021-02-24T09:04:01Z",
"updated_at": "2021-02-28T09:32:57Z",
"pushed_at": "2021-02-16T16:59:09Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 10,
"forks": 10,
"watchers": 16,
"watchers": 17,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2021-02-24T09:56:21Z",
"updated_at": "2021-02-27T15:46:58Z",
"updated_at": "2021-02-28T10:58:54Z",
"pushed_at": "2021-02-26T03:17:57Z",
"stargazers_count": 73,
"watchers_count": 73,
"stargazers_count": 74,
"watchers_count": 74,
"forks_count": 50,
"forks": 50,
"watchers": 73,
"watchers": 74,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "CVE-2021-21972 Exploit",
"fork": false,
"created_at": "2021-02-24T11:14:58Z",
"updated_at": "2021-02-28T08:08:44Z",
"updated_at": "2021-02-28T14:03:03Z",
"pushed_at": "2021-02-28T03:59:59Z",
"stargazers_count": 172,
"watchers_count": 172,
"stargazers_count": 174,
"watchers_count": 174,
"forks_count": 63,
"forks": 63,
"watchers": 172,
"watchers": 174,
"score": 0
},
{
@ -105,13 +105,13 @@
"description": "Proof of Concept Exploit for vCenter CVE-2021-21972",
"fork": false,
"created_at": "2021-02-24T16:31:34Z",
"updated_at": "2021-02-28T01:54:09Z",
"updated_at": "2021-02-28T11:42:48Z",
"pushed_at": "2021-02-25T16:05:02Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 73,
"watchers_count": 73,
"forks_count": 25,
"forks": 25,
"watchers": 72,
"watchers": 73,
"score": 0
},
{
@ -155,8 +155,8 @@
"pushed_at": "2021-02-25T05:49:19Z",
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 7,
"forks": 7,
"forks_count": 6,
"forks": 6,
"watchers": 33,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Chaining CVE-2021-25281 and CVE-2021-25282 to exploit a SaltStack",
"fork": false,
"created_at": "2021-02-26T12:08:25Z",
"updated_at": "2021-02-27T20:39:14Z",
"updated_at": "2021-02-28T14:16:43Z",
"pushed_at": "2021-02-26T14:49:46Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 1,
"forks": 1,
"watchers": 7,
"watchers": 9,
"score": 0
}
]

25
2021/CVE-2021-26119.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 343119938,
"name": "CVE-2021-26119",
"full_name": "Udyz\/CVE-2021-26119",
"owner": {
"login": "Udyz",
"id": 39673284,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39673284?v=4",
"html_url": "https:\/\/github.com\/Udyz"
},
"html_url": "https:\/\/github.com\/Udyz\/CVE-2021-26119",
"description": null,
"fork": false,
"created_at": "2021-02-28T14:05:23Z",
"updated_at": "2021-02-28T14:25:27Z",
"pushed_at": "2021-02-28T14:25:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "RCE in NPM VSCode Extention",
"fork": false,
"created_at": "2021-02-14T14:01:04Z",
"updated_at": "2021-02-26T06:54:30Z",
"updated_at": "2021-02-28T13:14:54Z",
"pushed_at": "2021-02-14T14:01:40Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 0,
"forks": 0,
"watchers": 16,
"watchers": 17,
"score": 0
}
]

View file

@ -335,13 +335,13 @@
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
"fork": false,
"created_at": "2021-01-30T03:22:04Z",
"updated_at": "2021-02-27T15:51:04Z",
"updated_at": "2021-02-28T11:57:13Z",
"pushed_at": "2021-02-08T03:42:50Z",
"stargazers_count": 357,
"watchers_count": 357,
"stargazers_count": 358,
"watchers_count": 358,
"forks_count": 94,
"forks": 94,
"watchers": 357,
"watchers": 358,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2021-3378 | FortiLogger - Unauthenticated Arbitrary File Upload (Metasploit)",
"fork": false,
"created_at": "2021-01-30T23:47:14Z",
"updated_at": "2021-02-27T20:39:18Z",
"pushed_at": "2021-02-26T14:31:00Z",
"stargazers_count": 5,
"watchers_count": 5,
"updated_at": "2021-02-28T13:47:42Z",
"pushed_at": "2021-02-28T13:47:41Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 0,
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -274,6 +274,14 @@ Apache Druid includes the ability to execute user-provided JavaScript code embed
- [AirEvan/CVE-2021-25646-GUI](https://github.com/AirEvan/CVE-2021-25646-GUI)
- [Vulnmachines/Apache-Druid-CVE-2021-25646](https://github.com/Vulnmachines/Apache-Druid-CVE-2021-25646)
### CVE-2021-26119 (2021-02-21)
<code>
Smarty before 3.1.39 allows a Sandbox Escape because $smarty.template_object can be accessed in sandbox mode.
</code>
- [Udyz/CVE-2021-26119](https://github.com/Udyz/CVE-2021-26119)
### CVE-2021-26121
- [sourceincite/CVE-2021-26121](https://github.com/sourceincite/CVE-2021-26121)