Auto Update 2022/05/21 00:15:16

This commit is contained in:
motikan2010-bot 2022-05-21 09:15:16 +09:00
parent bda416bf8d
commit 75e893e929
19 changed files with 115 additions and 111 deletions

View file

@ -17,12 +17,12 @@
"pushed_at": "2020-06-11T00:16:40Z",
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 58,
"forks_count": 59,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 58,
"forks": 59,
"watchers": 42,
"score": 0
}

View file

@ -106,32 +106,5 @@
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 494459884,
"name": "Nuclei-Template-Primefaces-RCE",
"full_name": "prok3z\/Nuclei-Template-Primefaces-RCE",
"owner": {
"login": "prok3z",
"id": 43358190,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43358190?v=4",
"html_url": "https:\/\/github.com\/prok3z"
},
"html_url": "https:\/\/github.com\/prok3z\/Nuclei-Template-Primefaces-RCE",
"description": "CVE-2017-1000486",
"fork": false,
"created_at": "2022-05-20T12:43:10Z",
"updated_at": "2022-05-20T12:44:23Z",
"pushed_at": "2022-05-20T12:43:57Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
"fork": false,
"created_at": "2018-04-28T11:50:00Z",
"updated_at": "2022-05-02T19:14:22Z",
"updated_at": "2022-05-20T19:20:00Z",
"pushed_at": "2018-08-30T05:37:03Z",
"stargazers_count": 450,
"watchers_count": 450,
"stargazers_count": 451,
"watchers_count": 451,
"forks_count": 58,
"allow_forking": true,
"is_template": false,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 58,
"watchers": 450,
"watchers": 451,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "A tool to check if your lnd node was targeted by CVE-2019-12999",
"fork": false,
"created_at": "2019-09-27T03:47:09Z",
"updated_at": "2021-12-05T22:18:25Z",
"updated_at": "2022-05-20T21:14:41Z",
"pushed_at": "2019-09-27T21:08:41Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 9,
"watchers": 10,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "telegram bug that discloses user's hidden phone number (still unpatched) (exploit included) ",
"fork": false,
"created_at": "2021-12-10T19:03:53Z",
"updated_at": "2022-05-16T01:45:44Z",
"updated_at": "2022-05-20T23:12:59Z",
"pushed_at": "2021-12-19T18:18:36Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 54,
"watchers": 55,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "A login bypass(CVE-2019-18371) and a command injection vulnerability(CVE-2019-18370) in Xiaomi Router R3G up to version 2.28.23.",
"fork": false,
"created_at": "2019-08-30T16:32:13Z",
"updated_at": "2022-05-20T09:24:07Z",
"updated_at": "2022-05-20T22:34:20Z",
"pushed_at": "2020-01-12T02:34:45Z",
"stargazers_count": 158,
"watchers_count": 158,
"stargazers_count": 159,
"watchers_count": 159,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 158,
"watchers": 159,
"score": 0
},
{

View file

@ -229,17 +229,17 @@
"description": "CVE-2019-2725命令回显+webshell上传+最新绕过",
"fork": false,
"created_at": "2019-06-10T05:12:44Z",
"updated_at": "2022-05-17T12:34:30Z",
"updated_at": "2022-05-20T23:25:06Z",
"pushed_at": "2019-06-21T03:33:05Z",
"stargazers_count": 160,
"watchers_count": 160,
"stargazers_count": 161,
"watchers_count": 161,
"forks_count": 63,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 63,
"watchers": 160,
"watchers": 161,
"score": 0
},
{

View file

@ -95,7 +95,7 @@
"fork": false,
"created_at": "2020-07-14T02:42:41Z",
"updated_at": "2022-04-14T08:25:21Z",
"pushed_at": "2022-05-16T22:36:28Z",
"pushed_at": "2022-05-20T21:57:46Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 5,

View file

@ -188,12 +188,12 @@
"pushed_at": "2021-06-20T07:38:13Z",
"stargazers_count": 77,
"watchers_count": 77,
"forks_count": 43,
"forks_count": 44,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 43,
"forks": 44,
"watchers": 77,
"score": 0
},

29
2021/CVE-2021-3929.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 491769512,
"name": "CVE-2021-3929-3947",
"full_name": "QiuhaoLi\/CVE-2021-3929-3947",
"owner": {
"login": "QiuhaoLi",
"id": 45557084,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45557084?v=4",
"html_url": "https:\/\/github.com\/QiuhaoLi"
},
"html_url": "https:\/\/github.com\/QiuhaoLi\/CVE-2021-3929-3947",
"description": "Recursive MMIO VM Escape PoC",
"fork": false,
"created_at": "2022-05-13T05:33:28Z",
"updated_at": "2022-05-20T23:14:52Z",
"pushed_at": "2022-05-13T05:37:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2022-05-17T13:58:11Z",
"updated_at": "2022-05-18T17:53:20Z",
"updated_at": "2022-05-20T18:23:52Z",
"pushed_at": "2022-05-17T18:38:15Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -26,33 +26,6 @@
"watchers": 0,
"score": 0
},
{
"id": 435810052,
"name": "Grafana-CVE-2021-43798",
"full_name": "jas502n\/Grafana-CVE-2021-43798",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/Grafana-CVE-2021-43798",
"description": "Grafana Unauthorized arbitrary file reading vulnerability",
"fork": false,
"created_at": "2021-12-07T09:02:16Z",
"updated_at": "2022-04-16T04:07:08Z",
"pushed_at": "2021-12-09T03:16:21Z",
"stargazers_count": 271,
"watchers_count": 271,
"forks_count": 76,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 76,
"watchers": 271,
"score": 0
},
{
"id": 435840491,
"name": "CVE-2021-43798-Grafana-POC",

View file

@ -857,7 +857,7 @@
"pushed_at": "2022-03-20T16:33:49Z",
"stargazers_count": 1362,
"watchers_count": 1362,
"forks_count": 374,
"forks_count": 375,
"allow_forking": true,
"is_template": false,
"topics": [
@ -867,7 +867,7 @@
"security"
],
"visibility": "public",
"forks": 374,
"forks": 375,
"watchers": 1362,
"score": 0
},

View file

@ -155,12 +155,12 @@
"pushed_at": "2022-04-12T12:00:26Z",
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 18,
"score": 0
},

View file

@ -1675,7 +1675,7 @@
"pushed_at": "2022-05-20T00:42:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [
@ -1685,7 +1685,7 @@
"spring4shell-poc"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
}

View file

@ -13,17 +13,17 @@
"description": "Atlassian Bitbucket Data Center RCE(CVE-2022-26133) verification and exploitation.",
"fork": false,
"created_at": "2022-05-09T12:07:51Z",
"updated_at": "2022-05-20T06:23:00Z",
"updated_at": "2022-05-20T21:26:39Z",
"pushed_at": "2022-05-11T02:02:59Z",
"stargazers_count": 111,
"watchers_count": 111,
"stargazers_count": 113,
"watchers_count": 113,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 111,
"watchers": 113,
"score": 0
}
]

View file

@ -13,17 +13,44 @@
"description": null,
"fork": false,
"created_at": "2022-05-19T01:16:01Z",
"updated_at": "2022-05-20T12:21:20Z",
"updated_at": "2022-05-20T20:37:17Z",
"pushed_at": "2022-05-19T01:17:07Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 28,
"watchers": 29,
"score": 0
},
{
"id": 494602673,
"name": "CVE-2022-26717-Safari-WebGL-Exploit",
"full_name": "trhacknon\/CVE-2022-26717-Safari-WebGL-Exploit",
"owner": {
"login": "trhacknon",
"id": 98242014,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
"html_url": "https:\/\/github.com\/trhacknon"
},
"html_url": "https:\/\/github.com\/trhacknon\/CVE-2022-26717-Safari-WebGL-Exploit",
"description": null,
"fork": false,
"created_at": "2022-05-20T20:46:40Z",
"updated_at": "2022-05-20T20:46:52Z",
"pushed_at": "2022-05-20T20:46:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -375,17 +375,17 @@
"description": "CVE-2022-26809 is a vulnerability in Remote Procedure Call Runtime ",
"fork": false,
"created_at": "2022-05-20T14:26:38Z",
"updated_at": "2022-05-20T14:35:44Z",
"updated_at": "2022-05-20T20:30:39Z",
"pushed_at": "2022-05-20T14:26:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"forks": 3,
"watchers": 3,
"score": 0
},
{
@ -402,17 +402,17 @@
"description": "CVE-2022-26809 | is a remote code execution vulnerablity in rpc runtime and affects a wide versions of windows",
"fork": false,
"created_at": "2022-05-20T15:16:30Z",
"updated_at": "2022-05-20T15:16:30Z",
"updated_at": "2022-05-20T18:50:01Z",
"pushed_at": "2022-05-20T15:16:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 1,
"watchers": 1,
"score": 0
}
]

View file

@ -1382,6 +1382,7 @@ Automatic Question Paper Generator v1.0 contains a Time-Based Blind SQL injectio
### CVE-2022-26717
- [theori-io/CVE-2022-26717-Safari-WebGL-Exploit](https://github.com/theori-io/CVE-2022-26717-Safari-WebGL-Exploit)
- [trhacknon/CVE-2022-26717-Safari-WebGL-Exploit](https://github.com/trhacknon/CVE-2022-26717-Safari-WebGL-Exploit)
### CVE-2022-26726
- [acheong08/CVE-2022-26726-POC](https://github.com/acheong08/CVE-2022-26726-POC)
@ -2687,6 +2688,9 @@ D-Link router DSL-2750U with firmware vME1.16 or prior versions is vulnerable to
### CVE-2021-3864
- [walac/cve-2021-3864](https://github.com/walac/cve-2021-3864)
### CVE-2021-3929
- [QiuhaoLi/CVE-2021-3929-3947](https://github.com/QiuhaoLi/CVE-2021-3929-3947)
### CVE-2021-3972 (2022-04-22)
<code>
@ -5189,7 +5193,6 @@ Grafana is an open-source platform for monitoring and observability. Grafana ver
</code>
- [tangxiaofeng7/CVE-2021-43798-Grafana-File-Read](https://github.com/tangxiaofeng7/CVE-2021-43798-Grafana-File-Read)
- [jas502n/Grafana-CVE-2021-43798](https://github.com/jas502n/Grafana-CVE-2021-43798)
- [ScorpionsMAX/CVE-2021-43798-Grafana-POC](https://github.com/ScorpionsMAX/CVE-2021-43798-Grafana-POC)
- [asaotomo/CVE-2021-43798-Grafana-Exp](https://github.com/asaotomo/CVE-2021-43798-Grafana-Exp)
- [A-D-Team/grafanaExp](https://github.com/A-D-Team/grafanaExp)
@ -20967,7 +20970,6 @@ Primetek Primefaces 5.x is vulnerable to a weak encryption flaw resulting in rem
- [mogwailabs/CVE-2017-1000486](https://github.com/mogwailabs/CVE-2017-1000486)
- [cved-sources/cve-2017-1000486](https://github.com/cved-sources/cve-2017-1000486)
- [Pastea/CVE-2017-1000486](https://github.com/Pastea/CVE-2017-1000486)
- [prok3z/Nuclei-Template-Primefaces-RCE](https://github.com/prok3z/Nuclei-Template-Primefaces-RCE)
### CVE-2017-1000499 (2018-01-03)