Auto Update 2021/01/14 18:10:20

This commit is contained in:
motikan2010-bot 2021-01-14 18:10:20 +09:00
parent 5e658a9ee4
commit 6a52bc8de3
26 changed files with 141 additions and 117 deletions

View file

@ -197,13 +197,13 @@
"description": "A CVE-2016-5195 exploit example.",
"fork": false,
"created_at": "2016-10-23T00:16:33Z",
"updated_at": "2021-01-05T14:51:28Z",
"updated_at": "2021-01-14T09:02:57Z",
"pushed_at": "2017-03-21T16:46:38Z",
"stargazers_count": 204,
"watchers_count": 204,
"stargazers_count": 205,
"watchers_count": 205,
"forks_count": 101,
"forks": 101,
"watchers": 204,
"watchers": 205,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "CVE-2017-7529_PoC",
"fork": false,
"created_at": "2018-06-20T15:16:10Z",
"updated_at": "2020-11-01T16:15:15Z",
"updated_at": "2021-01-14T07:44:15Z",
"pushed_at": "2018-06-20T15:16:39Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 18,
"forks": 18,
"watchers": 11,
"watchers": 12,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)",
"fork": false,
"created_at": "2018-10-17T14:14:12Z",
"updated_at": "2021-01-13T19:56:57Z",
"updated_at": "2021-01-14T06:22:26Z",
"pushed_at": "2020-07-24T17:54:54Z",
"stargazers_count": 468,
"watchers_count": 468,
"stargazers_count": 467,
"watchers_count": 467,
"forks_count": 114,
"forks": 114,
"watchers": 468,
"watchers": 467,
"score": 0
},
{

View file

@ -17,9 +17,32 @@
"pushed_at": "2020-07-19T12:23:34Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 8,
"forks": 8,
"forks_count": 7,
"forks": 7,
"watchers": 10,
"score": 0
},
{
"id": 329543907,
"name": "CVE-2019-0887",
"full_name": "t43Wiu6\/CVE-2019-0887",
"owner": {
"login": "t43Wiu6",
"id": 40162856,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/40162856?v=4",
"html_url": "https:\/\/github.com\/t43Wiu6"
},
"html_url": "https:\/\/github.com\/t43Wiu6\/CVE-2019-0887",
"description": "exp for CVE-2019-0887",
"fork": false,
"created_at": "2021-01-14T07:49:51Z",
"updated_at": "2021-01-14T07:49:56Z",
"pushed_at": "2021-01-14T07:49:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "guest→systemUAC手动提权",
"fork": false,
"created_at": "2019-11-27T02:47:37Z",
"updated_at": "2020-11-29T16:09:21Z",
"updated_at": "2021-01-14T06:59:59Z",
"pushed_at": "2020-03-18T06:21:13Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 66,
"watchers_count": 66,
"forks_count": 19,
"forks": 19,
"watchers": 65,
"watchers": 66,
"score": 0
}
]

View file

@ -174,13 +174,13 @@
"description": "CVE-2019-2725 命令回显",
"fork": false,
"created_at": "2019-05-29T01:57:05Z",
"updated_at": "2021-01-13T15:05:30Z",
"updated_at": "2021-01-14T05:45:38Z",
"pushed_at": "2019-08-08T09:48:20Z",
"stargazers_count": 376,
"watchers_count": 376,
"stargazers_count": 377,
"watchers_count": 377,
"forks_count": 156,
"forks": 156,
"watchers": 376,
"watchers": 377,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-08-03T14:12:56Z",
"updated_at": "2021-01-10T18:52:41Z",
"updated_at": "2021-01-14T08:44:02Z",
"pushed_at": "2020-12-12T03:41:43Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 5,
"forks": 5,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -45,29 +45,6 @@
"watchers": 452,
"score": 0
},
{
"id": 170613828,
"name": "CVE-2019-5736",
"full_name": "jas502n\/CVE-2019-5736",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-5736",
"description": "runc容器逃逸漏洞预警",
"fork": false,
"created_at": "2019-02-14T02:30:12Z",
"updated_at": "2020-02-03T01:45:33Z",
"pushed_at": "2019-02-14T02:40:55Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 4,
"forks": 4,
"watchers": 14,
"score": 0
},
{
"id": 170656576,
"name": "CVE-2019-5736",

View file

@ -13,13 +13,13 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2021-01-12T18:35:20Z",
"updated_at": "2021-01-14T08:25:08Z",
"pushed_at": "2020-09-11T07:38:22Z",
"stargazers_count": 483,
"watchers_count": 483,
"stargazers_count": 484,
"watchers_count": 484,
"forks_count": 119,
"forks": 119,
"watchers": 483,
"watchers": 484,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-12-29T03:30:47Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 2,
"forks": 2,
"forks_count": 3,
"forks": 3,
"watchers": 5,
"score": 0
},

View file

@ -109,8 +109,8 @@
"pushed_at": "2020-07-10T09:30:47Z",
"stargazers_count": 74,
"watchers_count": 74,
"forks_count": 33,
"forks": 33,
"forks_count": 34,
"forks": 34,
"watchers": 74,
"score": 0
},

View file

@ -105,13 +105,13 @@
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
"fork": false,
"created_at": "2020-09-14T16:57:49Z",
"updated_at": "2021-01-10T13:01:22Z",
"updated_at": "2021-01-14T08:56:00Z",
"pushed_at": "2020-11-05T16:37:20Z",
"stargazers_count": 168,
"watchers_count": 168,
"stargazers_count": 169,
"watchers_count": 169,
"forks_count": 39,
"forks": 39,
"watchers": 168,
"watchers": 169,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Vulmap - Web vulnerability scanning and verification tools支持扫描 activemq, flink, shiro, solr, struts2, tomcat, unomi, drupal, elasticsearch, nexus, weblogic, jboss, thinkphp并且具备漏洞利用功能。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883, S2-061, CVE-2020-13942, CVE-2020-17530, CVE-2020-17518, CVE-2020-17519",
"fork": false,
"created_at": "2020-10-09T06:34:36Z",
"updated_at": "2021-01-14T02:03:20Z",
"updated_at": "2021-01-14T08:02:25Z",
"pushed_at": "2021-01-13T10:38:48Z",
"stargazers_count": 745,
"watchers_count": 745,
"forks_count": 131,
"forks": 131,
"watchers": 745,
"stargazers_count": 748,
"watchers_count": 748,
"forks_count": 133,
"forks": 133,
"watchers": 748,
"score": 0
},
{
@ -519,13 +519,13 @@
"description": "CodeTest信息收集和漏洞利用工具可在进行渗透测试之时方便利用相关信息收集脚本进行信息的获取和验证工作漏洞利用模块可选择需要测试的漏洞模块或者选择所有模块测试包含CVE-2020-14882, CVE-2020-2555等可自己收集脚本后按照模板进行修改。",
"fork": false,
"created_at": "2020-12-29T09:11:31Z",
"updated_at": "2021-01-08T17:01:37Z",
"updated_at": "2021-01-14T07:05:18Z",
"pushed_at": "2021-01-08T17:01:35Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 3,
"forks": 3,
"watchers": 10,
"watchers": 16,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Proof of concept for CVE-2020-15257 in containerd.",
"fork": false,
"created_at": "2020-12-07T08:47:09Z",
"updated_at": "2021-01-13T07:45:02Z",
"updated_at": "2021-01-14T04:23:20Z",
"pushed_at": "2021-01-12T09:46:50Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-01-06T23:51:32Z",
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 12,
"forks": 12,
"forks_count": 13,
"forks": 13,
"watchers": 33,
"score": 0
},

View file

@ -151,13 +151,13 @@
"description": "Tomcat的文件包含及文件读取漏洞利用POC",
"fork": false,
"created_at": "2020-02-21T07:48:50Z",
"updated_at": "2020-12-09T08:06:29Z",
"updated_at": "2021-01-14T07:05:40Z",
"pushed_at": "2020-02-21T10:19:52Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 14,
"forks": 14,
"watchers": 22,
"watchers": 23,
"score": 0
},
{

View file

@ -13,8 +13,8 @@
"description": "SKYWORTH GN542VF Hardware Version 2.0 and Software Version 2.0.0.16 HTML Injection Vulnerability",
"fork": false,
"created_at": "2021-01-07T08:01:47Z",
"updated_at": "2021-01-14T02:22:41Z",
"pushed_at": "2021-01-14T02:22:39Z",
"updated_at": "2021-01-14T06:16:10Z",
"pushed_at": "2021-01-14T06:16:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,

View file

@ -13,8 +13,8 @@
"description": "SKYWORTH GN542VF Hardware Version 2.0 and Software Version 2.0.0.16 Directory Enumeration Vulnerability",
"fork": false,
"created_at": "2021-01-07T08:00:33Z",
"updated_at": "2021-01-14T02:23:50Z",
"pushed_at": "2021-01-14T02:23:48Z",
"updated_at": "2021-01-14T06:11:23Z",
"pushed_at": "2021-01-14T06:11:21Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,

View file

@ -36,13 +36,13 @@
"description": "PoC CVE-2020-6308",
"fork": false,
"created_at": "2020-12-27T10:37:11Z",
"updated_at": "2021-01-13T16:37:25Z",
"updated_at": "2021-01-14T05:07:58Z",
"pushed_at": "2020-12-29T10:49:49Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 6,
"forks": 6,
"watchers": 26,
"watchers": 27,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "该脚本为Citrix XenMobile 目录遍历漏洞CVE-2020-8209批量检测脚本。",
"fork": false,
"created_at": "2020-11-17T07:20:46Z",
"updated_at": "2021-01-12T03:20:16Z",
"updated_at": "2021-01-14T07:30:45Z",
"pushed_at": "2020-12-07T07:46:06Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 9,
"forks": 9,
"watchers": 27,
"watchers": 28,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": null,
"fork": false,
"created_at": "2020-09-16T19:38:43Z",
"updated_at": "2020-11-25T00:43:26Z",
"updated_at": "2021-01-14T08:18:42Z",
"pushed_at": "2020-09-18T10:03:45Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 3,
"forks": 3,
"watchers": 6,
"watchers": 7,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "CVE-2020-8840FasterXML\/jackson-databind 远程代码执行漏洞",
"fork": false,
"created_at": "2020-02-24T07:43:12Z",
"updated_at": "2020-12-13T17:15:26Z",
"updated_at": "2021-01-14T09:13:19Z",
"pushed_at": "2020-02-24T07:45:37Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 6,
"forks": 6,
"watchers": 21,
"watchers": 22,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "tomcat使用了自带session同步功能时不安全的配置没有使用EncryptInterceptor导致存在的反序列化漏洞通过精心构造的数据包 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-94849484是session持久化的洞这个是session集群同步的洞",
"fork": false,
"created_at": "2020-05-19T05:12:53Z",
"updated_at": "2021-01-03T13:11:32Z",
"updated_at": "2021-01-14T06:10:35Z",
"pushed_at": "2020-05-19T05:13:19Z",
"stargazers_count": 196,
"watchers_count": 196,
"stargazers_count": 198,
"watchers_count": 198,
"forks_count": 35,
"forks": 35,
"watchers": 196,
"watchers": 198,
"score": 0
},
{
@ -105,13 +105,13 @@
"description": "CVE-2020-9484 Mass Scanner, Scan a list of urls for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCE ",
"fork": false,
"created_at": "2020-06-05T20:40:28Z",
"updated_at": "2021-01-13T15:07:22Z",
"updated_at": "2021-01-14T08:28:27Z",
"pushed_at": "2020-06-05T21:04:43Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 11,
"forks": 11,
"watchers": 21,
"watchers": 22,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-01-09T07:14:26Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 3,
"forks": 3,
"forks_count": 4,
"forks": 4,
"watchers": 2,
"score": 0
},
@ -40,9 +40,32 @@
"pushed_at": "2021-01-13T07:29:01Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 329537345,
"name": "CVE-2021-3019",
"full_name": "liuxu54898\/CVE-2021-3019",
"owner": {
"login": "liuxu54898",
"id": 35008035,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/35008035?v=4",
"html_url": "https:\/\/github.com\/liuxu54898"
},
"html_url": "https:\/\/github.com\/liuxu54898\/CVE-2021-3019",
"description": "lanproxy 目录遍历漏洞批量检测用户名密码POC (CVE-2021-3019)",
"fork": false,
"created_at": "2021-01-14T07:19:21Z",
"updated_at": "2021-01-14T07:52:52Z",
"pushed_at": "2021-01-14T07:52:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exploit for CVE-2021-3129",
"fork": false,
"created_at": "2021-01-13T12:52:20Z",
"updated_at": "2021-01-13T21:02:47Z",
"updated_at": "2021-01-14T06:59:58Z",
"pushed_at": "2021-01-13T13:25:10Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -17,6 +17,7 @@ ffay lanproxy 0.1 allows Directory Traversal to read /../conf/config.properties
- [B1anda0/CVE-2021-3019](https://github.com/B1anda0/CVE-2021-3019)
- [FanqXu/CVE-2021-3019](https://github.com/FanqXu/CVE-2021-3019)
- [liuxu54898/CVE-2021-3019](https://github.com/liuxu54898/CVE-2021-3019)
### CVE-2021-3129 (2021-01-12)
@ -4038,6 +4039,7 @@ A remote code execution vulnerability exists in Remote Desktop Services - former
</code>
- [qianshuidewajueji/CVE-2019-0887](https://github.com/qianshuidewajueji/CVE-2019-0887)
- [t43Wiu6/CVE-2019-0887](https://github.com/t43Wiu6/CVE-2019-0887)
### CVE-2019-0888 (2019-06-12)
@ -4666,7 +4668,6 @@ runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allow
- [q3k/cve-2019-5736-poc](https://github.com/q3k/cve-2019-5736-poc)
- [Frichetten/CVE-2019-5736-PoC](https://github.com/Frichetten/CVE-2019-5736-PoC)
- [jas502n/CVE-2019-5736](https://github.com/jas502n/CVE-2019-5736)
- [likescam/CVE-2019-5736](https://github.com/likescam/CVE-2019-5736)
- [likescam/cve-2019-5736-poc](https://github.com/likescam/cve-2019-5736-poc)
- [agppp/cve-2019-5736-poc](https://github.com/agppp/cve-2019-5736-poc)