Auto Update 2021/10/27 18:13:51

This commit is contained in:
motikan2010-bot 2021-10-27 18:13:51 +09:00
parent f9d45882f5
commit 706b2ee8f5
24 changed files with 187 additions and 94 deletions

View file

@ -67,17 +67,17 @@
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
"fork": false,
"created_at": "2017-11-21T05:55:53Z",
"updated_at": "2021-09-17T11:02:55Z",
"updated_at": "2021-10-27T07:12:29Z",
"pushed_at": "2017-11-29T03:33:53Z",
"stargazers_count": 505,
"watchers_count": 505,
"stargazers_count": 506,
"watchers_count": 506,
"forks_count": 256,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 256,
"watchers": 505,
"watchers": 506,
"score": 0
},
{

View file

@ -105,17 +105,17 @@
"description": "CVE-2017-13156-Janus复现",
"fork": false,
"created_at": "2020-09-03T09:28:31Z",
"updated_at": "2020-11-25T07:31:55Z",
"updated_at": "2021-10-27T08:24:18Z",
"pushed_at": "2020-09-07T07:06:50Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0
},
{
@ -132,17 +132,17 @@
"description": null,
"fork": false,
"created_at": "2021-03-22T08:27:10Z",
"updated_at": "2021-10-23T05:25:06Z",
"updated_at": "2021-10-27T08:27:31Z",
"pushed_at": "2021-03-26T10:33:51Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -67,17 +67,17 @@
"description": "个人整理的Centos7.x + Kubernetes-1.12.3 + Dashboard-1.8.3 无 CVE-2018-1002105 漏洞的master节点全自动快速一键安装部署文件适用于测试环境生产环境的快速安装部署",
"fork": false,
"created_at": "2018-12-10T03:14:55Z",
"updated_at": "2021-10-27T02:57:42Z",
"updated_at": "2021-10-27T06:31:50Z",
"pushed_at": "2019-02-26T08:49:22Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 3,
"forks": 4,
"watchers": 4,
"score": 0
},
{

View file

@ -834,5 +834,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 421659872,
"name": "drupalgeddon2-CVE-2018-7600",
"full_name": "rafaelcaria\/drupalgeddon2-CVE-2018-7600",
"owner": {
"login": "rafaelcaria",
"id": 53016430,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53016430?v=4",
"html_url": "https:\/\/github.com\/rafaelcaria"
},
"html_url": "https:\/\/github.com\/rafaelcaria\/drupalgeddon2-CVE-2018-7600",
"description": null,
"fork": false,
"created_at": "2021-10-27T03:09:48Z",
"updated_at": "2021-10-27T05:31:28Z",
"pushed_at": "2021-10-27T05:31:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -40,11 +40,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-10-27T01:44:53Z",
"updated_at": "2021-10-27T07:53:11Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2946,
"watchers_count": 2946,
"forks_count": 866,
"stargazers_count": 2947,
"watchers_count": 2947,
"forks_count": 867,
"allow_forking": true,
"is_template": false,
"topics": [
@ -69,8 +69,8 @@
"webshell"
],
"visibility": "public",
"forks": 866,
"watchers": 2946,
"forks": 867,
"watchers": 2947,
"score": 0
},
{

View file

@ -17,7 +17,7 @@
"pushed_at": "2021-04-20T16:14:13Z",
"stargazers_count": 137,
"watchers_count": 137,
"forks_count": 37,
"forks_count": 38,
"allow_forking": true,
"is_template": false,
"topics": [
@ -32,7 +32,7 @@
"wireless"
],
"visibility": "public",
"forks": 37,
"forks": 38,
"watchers": 137,
"score": 0
}

View file

@ -13,11 +13,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-10-27T01:44:53Z",
"updated_at": "2021-10-27T07:53:11Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2946,
"watchers_count": 2946,
"forks_count": 866,
"stargazers_count": 2947,
"watchers_count": 2947,
"forks_count": 867,
"allow_forking": true,
"is_template": false,
"topics": [
@ -42,8 +42,8 @@
"webshell"
],
"visibility": "public",
"forks": 866,
"watchers": 2946,
"forks": 867,
"watchers": 2947,
"score": 0
},
{

View file

@ -121,10 +121,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-10-24T18:52:11Z",
"updated_at": "2021-10-27T03:19:05Z",
"pushed_at": "2021-07-30T03:28:00Z",
"stargazers_count": 869,
"watchers_count": 869,
"stargazers_count": 870,
"watchers_count": 870,
"forks_count": 274,
"allow_forking": true,
"is_template": false,
@ -135,7 +135,7 @@
],
"visibility": "public",
"forks": 274,
"watchers": 869,
"watchers": 870,
"score": 0
}
]

View file

@ -71,12 +71,12 @@
"pushed_at": "2020-02-23T17:06:06Z",
"stargazers_count": 82,
"watchers_count": 82,
"forks_count": 61,
"forks_count": 62,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 61,
"forks": 62,
"watchers": 82,
"score": 0
},

View file

@ -119,12 +119,12 @@
"pushed_at": "2020-04-07T03:32:24Z",
"stargazers_count": 275,
"watchers_count": 275,
"forks_count": 74,
"forks_count": 73,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 74,
"forks": 73,
"watchers": 275,
"score": 0
},

View file

@ -40,17 +40,17 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2021-10-26T06:41:23Z",
"updated_at": "2021-10-27T05:07:33Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1430,
"watchers_count": 1430,
"stargazers_count": 1431,
"watchers_count": 1431,
"forks_count": 525,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 525,
"watchers": 1430,
"watchers": 1431,
"score": 0
},
{
@ -274,17 +274,17 @@
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
"fork": false,
"created_at": "2021-07-01T23:45:58Z",
"updated_at": "2021-10-27T02:34:41Z",
"updated_at": "2021-10-27T09:05:38Z",
"pushed_at": "2021-07-05T08:54:06Z",
"stargazers_count": 668,
"watchers_count": 668,
"forks_count": 176,
"stargazers_count": 669,
"watchers_count": 669,
"forks_count": 177,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 176,
"watchers": 668,
"forks": 177,
"watchers": 669,
"score": 0
},
{

View file

@ -715,7 +715,7 @@
"pushed_at": "2021-10-16T13:48:00Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [
@ -725,7 +725,7 @@
"vmware"
],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 5,
"score": 0
}

View file

@ -98,10 +98,10 @@
"description": "漏洞复现与poc收集CVE-2021-21975cve-2021-22005CVE-2021-26295VMware vCenter任意文件读取",
"fork": false,
"created_at": "2021-04-01T01:14:20Z",
"updated_at": "2021-10-03T11:14:17Z",
"updated_at": "2021-10-27T08:52:02Z",
"pushed_at": "2021-09-30T11:14:58Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
@ -111,7 +111,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 3,
"watchers": 4,
"score": 0
},
{

View file

@ -121,17 +121,17 @@
"description": "CVE-2021-22005 - VMWare vCenter Server File Upload to RCE",
"fork": false,
"created_at": "2021-09-25T16:21:56Z",
"updated_at": "2021-10-26T07:47:23Z",
"updated_at": "2021-10-27T09:12:20Z",
"pushed_at": "2021-10-02T03:17:45Z",
"stargazers_count": 119,
"watchers_count": 119,
"forks_count": 31,
"stargazers_count": 135,
"watchers_count": 135,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 119,
"forks": 33,
"watchers": 135,
"score": 0
},
{
@ -241,5 +241,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 421739207,
"name": "CVE-2021-22005",
"full_name": "Jun-5heng\/CVE-2021-22005",
"owner": {
"login": "Jun-5heng",
"id": 88525975,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88525975?v=4",
"html_url": "https:\/\/github.com\/Jun-5heng"
},
"html_url": "https:\/\/github.com\/Jun-5heng\/CVE-2021-22005",
"description": null,
"fork": false,
"created_at": "2021-10-27T08:36:21Z",
"updated_at": "2021-10-27T09:03:16Z",
"pushed_at": "2021-10-27T09:03:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-06-05T15:42:16Z",
"updated_at": "2021-10-27T01:45:09Z",
"updated_at": "2021-10-27T05:08:26Z",
"pushed_at": "2021-06-07T02:03:19Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 19,
"watchers": 21,
"score": 0
}
]

View file

@ -121,10 +121,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-10-24T18:52:11Z",
"updated_at": "2021-10-27T03:19:05Z",
"pushed_at": "2021-07-30T03:28:00Z",
"stargazers_count": 869,
"watchers_count": 869,
"stargazers_count": 870,
"watchers_count": 870,
"forks_count": 274,
"allow_forking": true,
"is_template": false,
@ -135,7 +135,7 @@
],
"visibility": "public",
"forks": 274,
"watchers": 869,
"watchers": 870,
"score": 0
},
{

View file

@ -121,10 +121,10 @@
"description": "Exploit for CVE-2021-3129",
"fork": false,
"created_at": "2021-01-27T10:16:35Z",
"updated_at": "2021-10-24T10:27:30Z",
"updated_at": "2021-10-27T05:35:04Z",
"pushed_at": "2021-03-07T04:39:58Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
@ -135,7 +135,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 23,
"watchers": 24,
"score": 0
},
{

29
2021/CVE-2021-32789.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 421673491,
"name": "CVE-2021-32789",
"full_name": "andnorack\/CVE-2021-32789",
"owner": {
"login": "andnorack",
"id": 90847935,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90847935?v=4",
"html_url": "https:\/\/github.com\/andnorack"
},
"html_url": "https:\/\/github.com\/andnorack\/CVE-2021-32789",
"description": "WooCommerce exploit",
"fork": false,
"created_at": "2021-10-27T04:15:07Z",
"updated_at": "2021-10-27T04:21:06Z",
"pushed_at": "2021-10-27T04:18:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-10-23T01:44:54Z",
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"forks": 7,
"watchers": 34,
"score": 0
}

View file

@ -13,17 +13,17 @@
"description": "XSTREAM<=1.4.17漏洞复现CVE-2021-39141、CVE-2021-39144、CVE-2021-39150",
"fork": false,
"created_at": "2021-08-24T06:15:20Z",
"updated_at": "2021-10-07T07:11:08Z",
"updated_at": "2021-10-27T03:39:33Z",
"pushed_at": "2021-08-25T02:00:12Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 52,
"watchers_count": 52,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 51,
"watchers": 52,
"score": 0
}
]

View file

@ -229,17 +229,17 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2021-10-26T20:57:27Z",
"updated_at": "2021-10-27T06:40:33Z",
"pushed_at": "2021-09-11T09:50:26Z",
"stargazers_count": 1284,
"watchers_count": 1284,
"forks_count": 412,
"stargazers_count": 1285,
"watchers_count": 1285,
"forks_count": 413,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 412,
"watchers": 1284,
"forks": 413,
"watchers": 1285,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2021-10-16T16:17:44Z",
"updated_at": "2021-10-27T02:27:13Z",
"updated_at": "2021-10-27T07:40:43Z",
"pushed_at": "2021-10-24T21:01:29Z",
"stargazers_count": 290,
"watchers_count": 290,
"forks_count": 58,
"stargazers_count": 292,
"watchers_count": 292,
"forks_count": 60,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 58,
"watchers": 290,
"forks": 60,
"watchers": 292,
"score": 0
},
{

View file

@ -931,12 +931,12 @@
"pushed_at": "2021-10-10T09:14:27Z",
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 12,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 12,
"forks": 13,
"watchers": 22,
"score": 0
},

View file

@ -807,6 +807,7 @@ The vCenter Server contains an arbitrary file upload vulnerability in the Analyt
- [rwincey/CVE-2021-22005](https://github.com/rwincey/CVE-2021-22005)
- [TaroballzChen/CVE-2021-22005-metasploit](https://github.com/TaroballzChen/CVE-2021-22005-metasploit)
- [TiagoSergio/CVE-2021-22005](https://github.com/TiagoSergio/CVE-2021-22005)
- [Jun-5heng/CVE-2021-22005](https://github.com/Jun-5heng/CVE-2021-22005)
### CVE-2021-22015 (2021-09-23)
@ -1987,6 +1988,14 @@ Ampache is an open source web based audio/video streaming application and file m
- [dnr6419/CVE-2021-32644](https://github.com/dnr6419/CVE-2021-32644)
### CVE-2021-32789 (2021-07-26)
<code>
woocommerce-gutenberg-products-block is a feature plugin for WooCommerce Gutenberg Blocks. An SQL injection vulnerability impacts all WooCommerce sites running the WooCommerce Blocks feature plugin between version 2.5.0 and prior to version 2.5.16. Via a carefully crafted URL, an exploit can be executed against the `wc/store/products/collection-data?calculate_attribute_counts[][taxonomy]` endpoint that allows the execution of a read only sql query. There are patches for many versions of this package, starting with version 2.5.16. There are no known workarounds aside from upgrading.
</code>
- [andnorack/CVE-2021-32789](https://github.com/andnorack/CVE-2021-32789)
### CVE-2021-32804 (2021-08-03)
<code>
@ -12580,6 +12589,7 @@ Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1
- [ruthvikvegunta/Drupalgeddon2](https://github.com/ruthvikvegunta/Drupalgeddon2)
- [ludy-dev/drupal8-REST-RCE](https://github.com/ludy-dev/drupal8-REST-RCE)
- [0xAJ2K/CVE-2018-7600](https://github.com/0xAJ2K/CVE-2018-7600)
- [rafaelcaria/drupalgeddon2-CVE-2018-7600](https://github.com/rafaelcaria/drupalgeddon2-CVE-2018-7600)
### CVE-2018-7602 (2018-07-19)