Auto Update 2021/04/25 06:11:02

This commit is contained in:
motikan2010-bot 2021-04-25 06:11:02 +09:00
parent 505bf05864
commit 5b4b54e707
24 changed files with 252 additions and 96 deletions

View file

@ -17,8 +17,8 @@
"pushed_at": "2017-12-18T14:11:29Z",
"stargazers_count": 275,
"watchers_count": 275,
"forks_count": 187,
"forks": 187,
"forks_count": 188,
"forks": 188,
"watchers": 275,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "CVE-2016-4437-Shiro反序列化爆破模块和key,命令执行反弹shell的脚本",
"fork": false,
"created_at": "2020-05-27T05:02:04Z",
"updated_at": "2021-03-24T05:39:25Z",
"updated_at": "2021-04-24T17:05:46Z",
"pushed_at": "2020-06-27T10:17:43Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 13,
"forks": 13,
"watchers": 34,
"watchers": 35,
"score": 0
}
]

View file

@ -36,7 +36,7 @@
"description": "海康威视未授权访问检测poc及口令爆破",
"fork": false,
"created_at": "2020-11-12T09:02:10Z",
"updated_at": "2021-04-20T05:09:11Z",
"updated_at": "2021-04-24T18:18:01Z",
"pushed_at": "2020-11-19T08:58:04Z",
"stargazers_count": 22,
"watchers_count": 22,

View file

@ -128,13 +128,13 @@
"description": "Exploit for Laravel Remote Code Execution with API_KEY (CVE-2018-15133)",
"fork": false,
"created_at": "2020-11-13T16:33:52Z",
"updated_at": "2021-04-23T21:16:14Z",
"updated_at": "2021-04-24T20:21:16Z",
"pushed_at": "2020-12-31T20:34:30Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 10,
"forks": 10,
"watchers": 14,
"watchers": 15,
"score": 0
},
{

View file

@ -1149,29 +1149,6 @@
"watchers": 0,
"score": 0
},
{
"id": 338829928,
"name": "CVE-2018-6574",
"full_name": "Yealid\/CVE-2018-6574",
"owner": {
"login": "Yealid",
"id": 47418084,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47418084?v=4",
"html_url": "https:\/\/github.com\/Yealid"
},
"html_url": "https:\/\/github.com\/Yealid\/CVE-2018-6574",
"description": null,
"fork": false,
"created_at": "2021-02-14T14:59:24Z",
"updated_at": "2021-02-15T13:03:08Z",
"pushed_at": "2021-02-14T16:33:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 345243566,
"name": "POC-CVE-2018-6574",
@ -1240,5 +1217,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 361210786,
"name": "CVE-2018-6574",
"full_name": "Yealid\/CVE-2018-6574",
"owner": {
"login": "Yealid",
"id": 47418084,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47418084?v=4",
"html_url": "https:\/\/github.com\/Yealid"
},
"html_url": "https:\/\/github.com\/Yealid\/CVE-2018-6574",
"description": null,
"fork": false,
"created_at": "2021-04-24T16:25:20Z",
"updated_at": "2021-04-24T16:49:56Z",
"pushed_at": "2021-04-24T16:49:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "(CVE-2018-9995) Get DVR Credentials",
"fork": false,
"created_at": "2018-04-29T20:00:06Z",
"updated_at": "2021-04-14T03:36:40Z",
"updated_at": "2021-04-24T19:02:28Z",
"pushed_at": "2019-01-23T14:27:21Z",
"stargazers_count": 446,
"watchers_count": 446,
"stargazers_count": 447,
"watchers_count": 447,
"forks_count": 184,
"forks": 184,
"watchers": 446,
"watchers": 447,
"score": 0
},
{
@ -128,13 +128,13 @@
"description": "DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995",
"fork": false,
"created_at": "2018-09-23T20:58:40Z",
"updated_at": "2020-12-23T20:45:44Z",
"updated_at": "2021-04-24T20:27:00Z",
"pushed_at": "2018-10-11T16:54:31Z",
"stargazers_count": 81,
"watchers_count": 81,
"stargazers_count": 82,
"watchers_count": 82,
"forks_count": 42,
"forks": 42,
"watchers": 81,
"watchers": 82,
"score": 0
},
{

View file

@ -2244,13 +2244,13 @@
"description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )",
"fork": false,
"created_at": "2019-09-30T19:46:21Z",
"updated_at": "2021-04-17T15:07:11Z",
"updated_at": "2021-04-24T20:26:33Z",
"pushed_at": "2021-02-06T00:24:21Z",
"stargazers_count": 187,
"watchers_count": 187,
"stargazers_count": 188,
"watchers_count": 188,
"forks_count": 73,
"forks": 73,
"watchers": 187,
"watchers": 188,
"score": 0
},
{

View file

@ -128,13 +128,13 @@
"description": "an impacket-dependent script exploiting CVE-2019-1040",
"fork": false,
"created_at": "2021-01-01T05:59:06Z",
"updated_at": "2021-04-22T06:02:23Z",
"updated_at": "2021-04-24T17:17:58Z",
"pushed_at": "2021-01-01T06:10:58Z",
"stargazers_count": 55,
"watchers_count": 55,
"stargazers_count": 56,
"watchers_count": 56,
"forks_count": 8,
"forks": 8,
"watchers": 55,
"watchers": 56,
"score": 0
}
]

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-08-04T06:29:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972",
"fork": false,
"created_at": "2020-03-11T17:51:29Z",
"updated_at": "2021-04-18T01:26:15Z",
"updated_at": "2021-04-24T16:58:43Z",
"pushed_at": "2021-02-25T17:19:39Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 58,
"watchers_count": 58,
"forks_count": 15,
"forks": 15,
"watchers": 57,
"watchers": 58,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2021-04-14T00:31:09Z",
"updated_at": "2021-04-24T19:10:31Z",
"pushed_at": "2020-10-21T12:10:28Z",
"stargazers_count": 1270,
"watchers_count": 1270,
"stargazers_count": 1271,
"watchers_count": 1271,
"forks_count": 293,
"forks": 293,
"watchers": 1270,
"watchers": 1271,
"score": 0
},
{

View file

@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-04-24T10:57:44Z",
"updated_at": "2021-04-24T17:43:24Z",
"pushed_at": "2021-04-24T08:27:02Z",
"stargazers_count": 645,
"watchers_count": 645,
"stargazers_count": 646,
"watchers_count": 646,
"forks_count": 169,
"forks": 169,
"watchers": 645,
"watchers": 646,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-07-22T05:30:14Z",
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 5,
"forks": 5,
"forks_count": 4,
"forks": 4,
"watchers": 18,
"score": 0
},

View file

@ -105,13 +105,13 @@
"description": "CVE-2021-1732 poc & exp; tested on 20H2",
"fork": false,
"created_at": "2021-04-23T08:21:54Z",
"updated_at": "2021-04-24T14:32:02Z",
"updated_at": "2021-04-24T16:41:04Z",
"pushed_at": "2021-04-23T08:28:53Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 4,
"forks": 4,
"watchers": 23,
"watchers": 24,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972",
"fork": false,
"created_at": "2020-03-11T17:51:29Z",
"updated_at": "2021-04-18T01:26:15Z",
"updated_at": "2021-04-24T16:58:43Z",
"pushed_at": "2021-02-25T17:19:39Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 58,
"watchers_count": 58,
"forks_count": 15,
"forks": 15,
"watchers": 57,
"watchers": 58,
"score": 0
},
{

View file

@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-04-24T10:57:44Z",
"updated_at": "2021-04-24T17:43:24Z",
"pushed_at": "2021-04-24T08:27:02Z",
"stargazers_count": 645,
"watchers_count": 645,
"stargazers_count": 646,
"watchers_count": 646,
"forks_count": 169,
"forks": 169,
"watchers": 645,
"watchers": 646,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-03-29T12:33:38Z",
"stargazers_count": 58,
"watchers_count": 58,
"forks_count": 15,
"forks": 15,
"forks_count": 16,
"forks": 16,
"watchers": 58,
"score": 0
}

View file

@ -13,7 +13,7 @@
"description": "Exploit for CVE-2021-3129",
"fork": false,
"created_at": "2021-01-13T12:52:20Z",
"updated_at": "2021-04-23T23:30:32Z",
"updated_at": "2021-04-24T16:03:04Z",
"pushed_at": "2021-01-29T13:59:07Z",
"stargazers_count": 106,
"watchers_count": 106,

View file

@ -887,13 +887,13 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
"updated_at": "2021-04-24T11:56:42Z",
"updated_at": "2021-04-24T16:10:43Z",
"pushed_at": "2021-03-30T14:44:38Z",
"stargazers_count": 281,
"watchers_count": 281,
"stargazers_count": 282,
"watchers_count": 282,
"forks_count": 46,
"forks": 46,
"watchers": 281,
"watchers": 282,
"score": 0
},
{

48
2021/CVE-2021-31760.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 359983710,
"name": "CVE-2021-31760",
"full_name": "Mesh3l911\/CVE-2021-31760",
"owner": {
"login": "Mesh3l911",
"id": 74990355,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74990355?v=4",
"html_url": "https:\/\/github.com\/Mesh3l911"
},
"html_url": "https:\/\/github.com\/Mesh3l911\/CVE-2021-31760",
"description": "Exploiting a Cross-site request forgery (CSRF) attack to get a Remote Command Execution (RCE) through the Webmin's running process feature",
"fork": false,
"created_at": "2021-04-21T00:09:54Z",
"updated_at": "2021-04-24T20:07:04Z",
"pushed_at": "2021-04-24T20:07:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 360287311,
"name": "CVE-2021-31760",
"full_name": "electronicbots\/CVE-2021-31760",
"owner": {
"login": "electronicbots",
"id": 37217081,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37217081?v=4",
"html_url": "https:\/\/github.com\/electronicbots"
},
"html_url": "https:\/\/github.com\/electronicbots\/CVE-2021-31760",
"description": "Exploiting a Cross-site request forgery (CSRF) attack to get a Remote Command Execution (RCE) through the Webmin's running process feature",
"fork": false,
"created_at": "2021-04-21T19:43:53Z",
"updated_at": "2021-04-24T20:06:16Z",
"pushed_at": "2021-04-24T20:06:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

48
2021/CVE-2021-31761.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 360288017,
"name": "CVE-2021-31761",
"full_name": "Mesh3l911\/CVE-2021-31761",
"owner": {
"login": "Mesh3l911",
"id": 74990355,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74990355?v=4",
"html_url": "https:\/\/github.com\/Mesh3l911"
},
"html_url": "https:\/\/github.com\/Mesh3l911\/CVE-2021-31761",
"description": "Exploiting a Reflected Cross-Site Scripting (XSS) attack to get a Remote Command Execution (RCE) through the Webmin's running process feature",
"fork": false,
"created_at": "2021-04-21T19:46:43Z",
"updated_at": "2021-04-24T20:08:14Z",
"pushed_at": "2021-04-24T20:08:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 360291163,
"name": "CVE-2021-31761",
"full_name": "electronicbots\/CVE-2021-31761",
"owner": {
"login": "electronicbots",
"id": 37217081,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37217081?v=4",
"html_url": "https:\/\/github.com\/electronicbots"
},
"html_url": "https:\/\/github.com\/electronicbots\/CVE-2021-31761",
"description": "Exploiting a Reflected Cross-Site Scripting (XSS) attack to get a Remote Command Execution (RCE) through the Webmin's running process feature",
"fork": false,
"created_at": "2021-04-21T20:00:09Z",
"updated_at": "2021-04-24T20:07:27Z",
"pushed_at": "2021-04-24T20:07:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

48
2021/CVE-2021-31762.json Normal file
View file

@ -0,0 +1,48 @@
[
{
"id": 360292539,
"name": "CVE-2021-31762",
"full_name": "Mesh3l911\/CVE-2021-31762",
"owner": {
"login": "Mesh3l911",
"id": 74990355,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74990355?v=4",
"html_url": "https:\/\/github.com\/Mesh3l911"
},
"html_url": "https:\/\/github.com\/Mesh3l911\/CVE-2021-31762",
"description": "Exploiting a Cross-site request forgery (CSRF) attack to creat a new privileged user through the Webmin's add users feature",
"fork": false,
"created_at": "2021-04-21T20:06:09Z",
"updated_at": "2021-04-24T20:10:03Z",
"pushed_at": "2021-04-24T20:10:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 360294065,
"name": "CVE-2021-31762",
"full_name": "electronicbots\/CVE-2021-31762",
"owner": {
"login": "electronicbots",
"id": 37217081,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37217081?v=4",
"html_url": "https:\/\/github.com\/electronicbots"
},
"html_url": "https:\/\/github.com\/electronicbots\/CVE-2021-31762",
"description": "Exploiting a Cross-site request forgery (CSRF) attack to creat a new privileged user through the Webmin's add users feature ",
"fork": false,
"created_at": "2021-04-21T20:13:06Z",
"updated_at": "2021-04-24T20:10:01Z",
"pushed_at": "2021-04-24T20:09:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Ubuntu OverlayFS Local Privesc",
"fork": false,
"created_at": "2021-04-19T20:07:01Z",
"updated_at": "2021-04-24T11:29:36Z",
"updated_at": "2021-04-24T16:10:55Z",
"pushed_at": "2021-04-20T00:46:14Z",
"stargazers_count": 116,
"watchers_count": 116,
"forks_count": 38,
"forks": 38,
"watchers": 116,
"stargazers_count": 117,
"watchers_count": 117,
"forks_count": 39,
"forks": 39,
"watchers": 117,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2021-04-22T02:06:21Z",
"updated_at": "2021-04-22T02:06:33Z",
"updated_at": "2021-04-24T16:14:17Z",
"pushed_at": "2021-04-22T02:06:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -917,6 +917,18 @@ Valve Steam through 2021-04-10, when a Source engine game is installed, allows r
- [floesen/CVE-2021-30481](https://github.com/floesen/CVE-2021-30481)
### CVE-2021-31760
- [Mesh3l911/CVE-2021-31760](https://github.com/Mesh3l911/CVE-2021-31760)
- [electronicbots/CVE-2021-31760](https://github.com/electronicbots/CVE-2021-31760)
### CVE-2021-31761
- [Mesh3l911/CVE-2021-31761](https://github.com/Mesh3l911/CVE-2021-31761)
- [electronicbots/CVE-2021-31761](https://github.com/electronicbots/CVE-2021-31761)
### CVE-2021-31762
- [Mesh3l911/CVE-2021-31762](https://github.com/Mesh3l911/CVE-2021-31762)
- [electronicbots/CVE-2021-31762](https://github.com/electronicbots/CVE-2021-31762)
### CVE-2021-1000000
- [13202311145/CVE-2021-1000000](https://github.com/13202311145/CVE-2021-1000000)
@ -9709,10 +9721,10 @@ Go before 1.8.7, Go 1.9.x before 1.9.4, and Go 1.10 pre-releases before Go 1.10r
- [PLP-Orange/cve-2018-6574-exercise](https://github.com/PLP-Orange/cve-2018-6574-exercise)
- [purgedemo/CVE-2018-6574](https://github.com/purgedemo/CVE-2018-6574)
- [purgedemo/CVE-2018-6574_2](https://github.com/purgedemo/CVE-2018-6574_2)
- [Yealid/CVE-2018-6574](https://github.com/Yealid/CVE-2018-6574)
- [killtr0/POC-CVE-2018-6574](https://github.com/killtr0/POC-CVE-2018-6574)
- [theJuan1112/pentesterlab-cve-2018-6574](https://github.com/theJuan1112/pentesterlab-cve-2018-6574)
- [MohamedTarekq/test-CVE-2018-6574-](https://github.com/MohamedTarekq/test-CVE-2018-6574-)
- [Yealid/CVE-2018-6574](https://github.com/Yealid/CVE-2018-6574)
### CVE-2018-6622 (2018-08-17)