Auto Update 2021/05/26 18:11:56

This commit is contained in:
motikan2010-bot 2021-05-26 18:11:56 +09:00
parent a6f199fcb8
commit 6bd3827858
28 changed files with 72 additions and 218 deletions

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-05-21T21:20:54Z",
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 16,
"forks": 16,
"forks_count": 17,
"forks": 17,
"watchers": 23,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Blueborne CVE-2017-0785 Android information leak vulnerability",
"fork": false,
"created_at": "2017-09-20T23:32:29Z",
"updated_at": "2021-05-02T00:17:47Z",
"updated_at": "2021-05-26T07:13:50Z",
"pushed_at": "2017-09-23T05:11:45Z",
"stargazers_count": 428,
"watchers_count": 428,
"stargazers_count": 429,
"watchers_count": 429,
"forks_count": 187,
"forks": 187,
"watchers": 428,
"watchers": 429,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
"fork": false,
"created_at": "2017-11-21T05:55:53Z",
"updated_at": "2021-05-14T09:34:30Z",
"updated_at": "2021-05-26T06:25:29Z",
"pushed_at": "2017-11-29T03:33:53Z",
"stargazers_count": 492,
"watchers_count": 492,
"stargazers_count": 493,
"watchers_count": 493,
"forks_count": 247,
"forks": 247,
"watchers": 492,
"watchers": 493,
"score": 0
},
{

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-11-17T17:58:39Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 15,
"forks": 15,
"forks_count": 16,
"forks": 16,
"watchers": 19,
"score": 0
},

View file

@ -1,25 +0,0 @@
[
{
"id": 370766722,
"name": "CVE-2018-19423-Exploit",
"full_name": "Hacker5preme\/CVE-2018-19423-Exploit",
"owner": {
"login": "Hacker5preme",
"id": 54862244,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54862244?v=4",
"html_url": "https:\/\/github.com\/Hacker5preme"
},
"html_url": "https:\/\/github.com\/Hacker5preme\/CVE-2018-19423-Exploit",
"description": "Authenticated RCE in Codiad 2.8.4",
"fork": false,
"created_at": "2021-05-25T16:55:17Z",
"updated_at": "2021-05-25T21:44:42Z",
"pushed_at": "2021-05-25T17:21:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -293,8 +293,8 @@
"pushed_at": "2020-10-01T11:51:46Z",
"stargazers_count": 85,
"watchers_count": 85,
"forks_count": 59,
"forks": 59,
"forks_count": 60,
"forks": 60,
"watchers": 85,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Apache Tomcat Remote Code Execution on Windows",
"fork": false,
"created_at": "2019-04-15T07:54:25Z",
"updated_at": "2021-05-14T10:10:33Z",
"updated_at": "2021-05-26T04:02:32Z",
"pushed_at": "2019-11-27T07:39:40Z",
"stargazers_count": 181,
"watchers_count": 181,
"stargazers_count": 182,
"watchers_count": 182,
"forks_count": 54,
"forks": 54,
"watchers": 181,
"watchers": 182,
"score": 0
},
{

View file

@ -316,8 +316,8 @@
"pushed_at": "2019-06-13T13:07:03Z",
"stargazers_count": 352,
"watchers_count": 352,
"forks_count": 190,
"forks": 190,
"forks_count": 189,
"forks": 189,
"watchers": 352,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2021-05-25T14:19:03Z",
"updated_at": "2021-05-26T06:59:57Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1656,
"watchers_count": 1656,
"stargazers_count": 1657,
"watchers_count": 1657,
"forks_count": 251,
"forks": 251,
"watchers": 1656,
"watchers": 1657,
"score": 0
},
{

View file

@ -13,8 +13,8 @@
"description": "Codiad Remote Code Execution",
"fork": false,
"created_at": "2021-05-13T13:57:07Z",
"updated_at": "2021-05-24T11:22:44Z",
"pushed_at": "2021-05-23T12:45:43Z",
"updated_at": "2021-05-26T07:05:51Z",
"pushed_at": "2021-05-26T07:05:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -105,13 +105,13 @@
"description": "Confluence 未授权 RCE (CVE-2019-3396) 漏洞",
"fork": false,
"created_at": "2019-04-10T02:22:24Z",
"updated_at": "2021-05-12T05:40:51Z",
"updated_at": "2021-05-26T06:27:02Z",
"pushed_at": "2019-11-01T14:33:21Z",
"stargazers_count": 122,
"watchers_count": 122,
"stargazers_count": 123,
"watchers_count": 123,
"forks_count": 58,
"forks": 58,
"watchers": 122,
"watchers": 123,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-05-09T21:34:26Z",
"stargazers_count": 571,
"watchers_count": 571,
"forks_count": 133,
"forks": 133,
"forks_count": 134,
"forks": 134,
"watchers": 571,
"score": 0
},

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-10-21T12:10:28Z",
"stargazers_count": 1284,
"watchers_count": 1284,
"forks_count": 294,
"forks": 294,
"forks_count": 293,
"forks": 293,
"watchers": 1284,
"score": 0
},
@ -155,8 +155,8 @@
"pushed_at": "2020-09-16T14:05:27Z",
"stargazers_count": 148,
"watchers_count": 148,
"forks_count": 36,
"forks": 36,
"forks_count": 35,
"forks": 35,
"watchers": 148,
"score": 0
},

View file

@ -592,8 +592,8 @@
"pushed_at": "2021-05-08T09:41:31Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 11,
"score": 0
},

View file

@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-05-26T02:32:29Z",
"updated_at": "2021-05-26T07:08:44Z",
"pushed_at": "2021-04-26T02:30:11Z",
"stargazers_count": 767,
"watchers_count": 767,
"stargazers_count": 769,
"watchers_count": 769,
"forks_count": 241,
"forks": 241,
"watchers": 767,
"watchers": 769,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "S2-061 的payload以及对应简单的PoC\/Exp",
"fork": false,
"created_at": "2020-12-10T17:42:37Z",
"updated_at": "2021-03-07T11:43:01Z",
"updated_at": "2021-05-26T07:36:39Z",
"pushed_at": "2020-12-18T00:57:50Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 19,
"forks": 19,
"watchers": 40,
"watchers": 41,
"score": 0
},
{

View file

@ -1,25 +0,0 @@
[
{
"id": 370835991,
"name": "CVE-2020-29607-exploit",
"full_name": "Hacker5preme\/CVE-2020-29607-exploit",
"owner": {
"login": "Hacker5preme",
"id": 54862244,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54862244?v=4",
"html_url": "https:\/\/github.com\/Hacker5preme"
},
"html_url": "https:\/\/github.com\/Hacker5preme\/CVE-2020-29607-exploit",
"description": "Exploit coming soon",
"fork": false,
"created_at": "2021-05-25T21:48:04Z",
"updated_at": "2021-05-25T21:48:07Z",
"pushed_at": "2021-05-25T21:48:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Regular expression matching for URL's. Maintained, safe, and browser-friendly version of url-regex. Resolves CVE-2020-7661 for Node.js servers.",
"fork": false,
"created_at": "2020-08-15T07:42:50Z",
"updated_at": "2021-05-21T07:38:32Z",
"updated_at": "2021-05-26T06:49:29Z",
"pushed_at": "2021-02-15T04:14:12Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 5,
"forks": 5,
"watchers": 31,
"watchers": 32,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exploit to SYSTEM for CVE-2021-21551",
"fork": false,
"created_at": "2021-05-13T13:23:38Z",
"updated_at": "2021-05-24T08:18:02Z",
"updated_at": "2021-05-26T07:55:52Z",
"pushed_at": "2021-05-20T20:33:09Z",
"stargazers_count": 196,
"watchers_count": 196,
"forks_count": 31,
"forks": 31,
"watchers": 196,
"stargazers_count": 197,
"watchers_count": 197,
"forks_count": 32,
"forks": 32,
"watchers": 197,
"score": 0
},
{

View file

@ -109,8 +109,8 @@
"pushed_at": "2021-02-25T16:05:02Z",
"stargazers_count": 111,
"watchers_count": 111,
"forks_count": 40,
"forks": 40,
"forks_count": 41,
"forks": 41,
"watchers": 111,
"score": 0
},

View file

@ -44,28 +44,5 @@
"forks": 4,
"watchers": 3,
"score": 0
},
{
"id": 370613273,
"name": "cve-2021-22893",
"full_name": "r90tpass\/cve-2021-22893",
"owner": {
"login": "r90tpass",
"id": 82740056,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82740056?v=4",
"html_url": "https:\/\/github.com\/r90tpass"
},
"html_url": "https:\/\/github.com\/r90tpass\/cve-2021-22893",
"description": "22893 poc",
"fork": false,
"created_at": "2021-05-25T08:04:43Z",
"updated_at": "2021-05-25T08:04:43Z",
"pushed_at": "2021-05-25T08:04:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-05-26T02:32:29Z",
"updated_at": "2021-05-26T07:08:44Z",
"pushed_at": "2021-04-26T02:30:11Z",
"stargazers_count": 767,
"watchers_count": 767,
"stargazers_count": 769,
"watchers_count": 769,
"forks_count": 241,
"forks": 241,
"watchers": 767,
"watchers": 769,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2021-02-12T18:53:37Z",
"updated_at": "2021-04-30T15:45:05Z",
"updated_at": "2021-05-26T08:52:35Z",
"pushed_at": "2021-04-30T15:45:02Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 5,
"forks": 5,
"watchers": 11,
"watchers": 12,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-05-03T14:29:49Z",
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 15,
"forks": 15,
"forks_count": 16,
"forks": 16,
"watchers": 35,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
"fork": false,
"created_at": "2021-05-16T16:15:56Z",
"updated_at": "2021-05-26T03:02:05Z",
"updated_at": "2021-05-26T08:39:24Z",
"pushed_at": "2021-05-21T23:58:50Z",
"stargazers_count": 699,
"watchers_count": 699,
"stargazers_count": 703,
"watchers_count": 703,
"forks_count": 109,
"forks": 109,
"watchers": 699,
"watchers": 703,
"score": 0
},
{

View file

@ -1,25 +0,0 @@
[
{
"id": 370592630,
"name": "CVE-2021-3222222",
"full_name": "r90tpass\/CVE-2021-3222222",
"owner": {
"login": "r90tpass",
"id": 82740056,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82740056?v=4",
"html_url": "https:\/\/github.com\/r90tpass"
},
"html_url": "https:\/\/github.com\/r90tpass\/CVE-2021-3222222",
"description": "RCE",
"fork": false,
"created_at": "2021-05-25T06:46:52Z",
"updated_at": "2021-05-25T06:46:52Z",
"pushed_at": "2021-05-25T06:46:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,25 +0,0 @@
[
{
"id": 370610425,
"name": "CVE-2021-8989898",
"full_name": "r90tpass\/CVE-2021-8989898",
"owner": {
"login": "r90tpass",
"id": 82740056,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82740056?v=4",
"html_url": "https:\/\/github.com\/r90tpass"
},
"html_url": "https:\/\/github.com\/r90tpass\/CVE-2021-8989898",
"description": "RCE",
"fork": false,
"created_at": "2021-05-25T07:53:47Z",
"updated_at": "2021-05-25T07:53:47Z",
"pushed_at": "2021-05-25T07:53:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -543,7 +543,6 @@ Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication b
- [ZephrFish/CVE-2021-22893](https://github.com/ZephrFish/CVE-2021-22893)
- [Mad-robot/CVE-2021-22893](https://github.com/Mad-robot/CVE-2021-22893)
- [r90tpass/cve-2021-22893](https://github.com/r90tpass/cve-2021-22893)
### CVE-2021-22986 (2021-03-31)
@ -1166,12 +1165,6 @@ Insufficient input validation in the Marvin Minsky 1967 implementation of the Un
### CVE-2021-33558
- [mdanzaruddin/CVE-2021-33558.](https://github.com/mdanzaruddin/CVE-2021-33558.)
### CVE-2021-3222222
- [r90tpass/CVE-2021-3222222](https://github.com/r90tpass/CVE-2021-3222222)
### CVE-2021-8989898
- [r90tpass/CVE-2021-8989898](https://github.com/r90tpass/CVE-2021-8989898)
## 2020
### CVE-2020-0001 (2020-01-08)
@ -5233,14 +5226,6 @@ Firmware version 4.60 of Zyxel USG devices contains an undocumented account (zyf
- [ruppde/scan_CVE-2020-29583](https://github.com/ruppde/scan_CVE-2020-29583)
### CVE-2020-29607 (2020-12-16)
<code>
A file upload restriction bypass vulnerability in Pluck CMS before 4.7.13 allows an admin privileged user to gain access in the host through the &quot;manage files&quot; functionality, which may result in remote code execution.
</code>
- [Hacker5preme/CVE-2020-29607-exploit](https://github.com/Hacker5preme/CVE-2020-29607-exploit)
### CVE-2020-29666 (2020-12-10)
<code>
@ -11988,14 +11973,6 @@ The GDrv low-level driver in GIGABYTE APP Center v1.05.21 and earlier, AORUS GRA
- [ASkyeye/CVE-2018-19320](https://github.com/ASkyeye/CVE-2018-19320)
- [a00x90/CVE-2018-19320](https://github.com/a00x90/CVE-2018-19320)
### CVE-2018-19423 (2018-11-21)
<code>
Codiad 2.8.4 allows remote authenticated administrators to execute arbitrary code by uploading an executable file.
</code>
- [Hacker5preme/CVE-2018-19423-Exploit](https://github.com/Hacker5preme/CVE-2018-19423-Exploit)
### CVE-2018-19466 (2019-03-27)
<code>