Auto Update 2021/03/30 00:10:56

This commit is contained in:
motikan2010-bot 2021-03-30 00:10:56 +09:00
parent 4d47086099
commit 8836583811
39 changed files with 271 additions and 158 deletions

View file

@ -13,13 +13,13 @@
"description": "CVE-2014-0472 Django unexpected code execution using reverse()",
"fork": false,
"created_at": "2020-09-23T16:21:57Z",
"updated_at": "2020-12-24T08:12:34Z",
"updated_at": "2021-03-29T11:22:01Z",
"pushed_at": "2020-12-24T08:12:32Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 976,
"watchers_count": 976,
"forks_count": 225,
"forks": 225,
"forks_count": 226,
"forks": 226,
"watchers": 976,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2016-02-20T07:57:58Z",
"stargazers_count": 549,
"watchers_count": 549,
"forks_count": 179,
"forks": 179,
"forks_count": 178,
"forks": 178,
"watchers": 549,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 976,
"watchers_count": 976,
"forks_count": 225,
"forks": 225,
"forks_count": 226,
"forks": 226,
"watchers": 976,
"score": 0
},

View file

@ -178,8 +178,8 @@
"pushed_at": "2017-11-28T03:06:32Z",
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 52,
"forks": 52,
"forks_count": 53,
"forks": 53,
"watchers": 39,
"score": 0
},

25
2017/CVE-2017-16541.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 352593664,
"name": "A-breif-introduction-of-CVE-2017-16541",
"full_name": "Ethan-Chen-uwo\/A-breif-introduction-of-CVE-2017-16541",
"owner": {
"login": "Ethan-Chen-uwo",
"id": 71363177,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71363177?v=4",
"html_url": "https:\/\/github.com\/Ethan-Chen-uwo"
},
"html_url": "https:\/\/github.com\/Ethan-Chen-uwo\/A-breif-introduction-of-CVE-2017-16541",
"description": null,
"fork": false,
"created_at": "2021-03-29T09:52:11Z",
"updated_at": "2021-03-29T10:06:30Z",
"pushed_at": "2021-03-29T10:06:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 976,
"watchers_count": 976,
"forks_count": 225,
"forks": 225,
"forks_count": 226,
"forks": 226,
"watchers": 976,
"score": 0
}

View file

@ -128,13 +128,13 @@
"description": "Exploit for Laravel Remote Code Execution with API_KEY (CVE-2018-15133)",
"fork": false,
"created_at": "2020-11-13T16:33:52Z",
"updated_at": "2021-03-22T19:30:15Z",
"updated_at": "2021-03-29T11:04:03Z",
"pushed_at": "2020-12-31T20:34:30Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 8,
"forks": 8,
"watchers": 12,
"watchers": 13,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar",
"fork": false,
"created_at": "2019-02-22T04:52:08Z",
"updated_at": "2021-03-24T02:17:24Z",
"updated_at": "2021-03-29T10:12:42Z",
"pushed_at": "2019-08-05T10:45:34Z",
"stargazers_count": 437,
"watchers_count": 437,
"stargazers_count": 438,
"watchers_count": 438,
"forks_count": 179,
"forks": 179,
"watchers": 437,
"watchers": 438,
"score": 0
},
{

View file

@ -454,8 +454,8 @@
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 976,
"watchers_count": 976,
"forks_count": 225,
"forks": 225,
"forks_count": 226,
"forks": 226,
"watchers": 976,
"score": 0
},

View file

@ -910,13 +910,13 @@
"description": "dump",
"fork": false,
"created_at": "2019-05-21T06:57:19Z",
"updated_at": "2021-03-29T07:49:23Z",
"updated_at": "2021-03-29T12:54:46Z",
"pushed_at": "2019-06-01T05:15:11Z",
"stargazers_count": 469,
"watchers_count": 469,
"stargazers_count": 470,
"watchers_count": 470,
"forks_count": 188,
"forks": 188,
"watchers": 469,
"watchers": 470,
"score": 0
},
{
@ -1025,7 +1025,7 @@
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
"fork": false,
"created_at": "2019-05-22T00:08:44Z",
"updated_at": "2021-03-24T13:09:30Z",
"updated_at": "2021-03-29T12:57:45Z",
"pushed_at": "2020-12-06T04:48:38Z",
"stargazers_count": 1146,
"watchers_count": 1146,
@ -1416,13 +1416,13 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2021-03-28T14:50:23Z",
"updated_at": "2021-03-29T12:56:56Z",
"pushed_at": "2019-09-03T20:50:28Z",
"stargazers_count": 1069,
"watchers_count": 1069,
"stargazers_count": 1070,
"watchers_count": 1070,
"forks_count": 355,
"forks": 355,
"watchers": 1069,
"watchers": 1070,
"score": 0
},
{
@ -1485,13 +1485,13 @@
"description": "An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits",
"fork": false,
"created_at": "2019-05-31T00:04:12Z",
"updated_at": "2021-02-27T02:00:58Z",
"updated_at": "2021-03-29T12:56:53Z",
"pushed_at": "2021-01-10T04:31:22Z",
"stargazers_count": 342,
"watchers_count": 342,
"stargazers_count": 343,
"watchers_count": 343,
"forks_count": 120,
"forks": 120,
"watchers": 342,
"watchers": 343,
"score": 0
},
{
@ -1853,13 +1853,13 @@
"description": "Public work for CVE-2019-0708",
"fork": false,
"created_at": "2019-07-23T03:15:53Z",
"updated_at": "2021-03-10T15:34:56Z",
"updated_at": "2021-03-29T12:56:21Z",
"pushed_at": "2019-11-19T02:43:38Z",
"stargazers_count": 286,
"watchers_count": 286,
"stargazers_count": 287,
"watchers_count": 287,
"forks_count": 90,
"forks": 90,
"watchers": 286,
"watchers": 287,
"score": 0
},
{

View file

@ -151,13 +151,13 @@
"description": "[CVE-2019-18935] Telerik UI for ASP.NET AJAX (RadAsyncUpload Handler) .NET JSON Deserialization",
"fork": false,
"created_at": "2020-08-19T17:11:02Z",
"updated_at": "2021-01-24T17:06:17Z",
"updated_at": "2021-03-29T12:19:42Z",
"pushed_at": "2020-08-25T07:55:22Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0
},
{

View file

@ -155,8 +155,8 @@
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 976,
"watchers_count": 976,
"forks_count": 225,
"forks": 225,
"forks_count": 226,
"forks": 226,
"watchers": 976,
"score": 0
}

View file

@ -36,13 +36,13 @@
"description": "CVE-2020-3992 & CVE-2019-5544",
"fork": false,
"created_at": "2021-02-04T15:15:22Z",
"updated_at": "2021-03-21T01:57:19Z",
"updated_at": "2021-03-29T14:59:21Z",
"pushed_at": "2021-02-05T06:40:50Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 3,
"forks": 3,
"watchers": 17,
"watchers": 18,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "PoC for CVE-2019-5736",
"fork": false,
"created_at": "2019-02-13T05:26:32Z",
"updated_at": "2021-03-26T10:02:03Z",
"updated_at": "2021-03-29T09:47:03Z",
"pushed_at": "2019-02-19T11:45:13Z",
"stargazers_count": 485,
"watchers_count": 485,
"stargazers_count": 486,
"watchers_count": 486,
"forks_count": 118,
"forks": 118,
"watchers": 485,
"watchers": 486,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "This repo contains a proof-of-concept for 📱🚀👑⚡, a deserialization vuln for local escalation of privilege to system_server in Android 10. This proof-of-concept only activates a privileged intent.",
"fork": false,
"created_at": "2021-02-23T14:00:55Z",
"updated_at": "2021-03-16T16:20:15Z",
"updated_at": "2021-03-29T11:31:50Z",
"pushed_at": "2021-02-23T14:03:00Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 1,
"forks": 1,
"watchers": 17,
"watchers": 18,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2021-03-25T14:41:07Z",
"updated_at": "2021-03-29T12:03:45Z",
"pushed_at": "2020-09-11T07:38:22Z",
"stargazers_count": 512,
"watchers_count": 512,
"stargazers_count": 513,
"watchers_count": 513,
"forks_count": 128,
"forks": 128,
"watchers": 512,
"watchers": 513,
"score": 0
},
{

View file

@ -956,13 +956,13 @@
"description": "Windows SMBv3 LPE exploit 已编译版",
"fork": false,
"created_at": "2020-03-31T11:25:50Z",
"updated_at": "2021-02-18T06:33:05Z",
"updated_at": "2021-03-29T10:27:09Z",
"pushed_at": "2020-03-31T11:34:02Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 5,
"forks": 5,
"watchers": 11,
"watchers": 12,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exploit for WebSocket Vulnerability in Apache Tomcat",
"fork": false,
"created_at": "2020-11-02T14:48:55Z",
"updated_at": "2021-03-23T03:03:21Z",
"updated_at": "2021-03-29T13:20:33Z",
"pushed_at": "2020-11-02T14:51:48Z",
"stargazers_count": 117,
"watchers_count": 117,
"stargazers_count": 118,
"watchers_count": 118,
"forks_count": 27,
"forks": 27,
"watchers": 117,
"watchers": 118,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2021-03-29T06:45:26Z",
"updated_at": "2021-03-29T11:49:29Z",
"pushed_at": "2020-10-21T12:10:28Z",
"stargazers_count": 1263,
"watchers_count": 1263,
"stargazers_count": 1264,
"watchers_count": 1264,
"forks_count": 290,
"forks": 290,
"watchers": 1263,
"watchers": 1264,
"score": 0
},
{
@ -772,13 +772,13 @@
"description": "Zerologon AutoExploit Tool | CVE-2020-1472",
"fork": false,
"created_at": "2020-09-29T20:43:06Z",
"updated_at": "2021-03-29T07:17:08Z",
"updated_at": "2021-03-29T09:15:33Z",
"pushed_at": "2020-10-02T13:00:21Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 1,
"forks": 1,
"watchers": 15,
"watchers": 16,
"score": 0
},
{

View file

@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-03-29T08:12:01Z",
"updated_at": "2021-03-29T13:43:00Z",
"pushed_at": "2021-03-22T03:46:42Z",
"stargazers_count": 265,
"watchers_count": 265,
"forks_count": 60,
"forks": 60,
"watchers": 265,
"stargazers_count": 267,
"watchers_count": 267,
"forks_count": 61,
"forks": 61,
"watchers": 267,
"score": 0
}
]

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2020-06-17T05:16:08Z",
"updated_at": "2020-12-05T14:22:34Z",
"pushed_at": "2020-12-03T03:01:18Z",
"pushed_at": "2021-03-29T12:39:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -105,13 +105,13 @@
"description": "[CVE-2020-17519] Apache Flink RESTful API Arbitrary File Read",
"fork": false,
"created_at": "2021-01-10T01:24:50Z",
"updated_at": "2021-03-11T03:23:07Z",
"updated_at": "2021-03-29T12:20:23Z",
"pushed_at": "2021-01-10T01:26:07Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0
},
{

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-02-23T17:06:06Z",
"stargazers_count": 74,
"watchers_count": 74,
"forks_count": 53,
"forks": 53,
"forks_count": 54,
"forks": 54,
"watchers": 74,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 976,
"watchers_count": 976,
"forks_count": 225,
"forks": 225,
"forks_count": 226,
"forks": 226,
"watchers": 976,
"score": 0
},
@ -109,8 +109,8 @@
"pushed_at": "2020-04-07T03:32:24Z",
"stargazers_count": 265,
"watchers_count": 265,
"forks_count": 71,
"forks": 71,
"forks_count": 72,
"forks": 72,
"watchers": 265,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "CVE-2020-3992 & CVE-2019-5544",
"fork": false,
"created_at": "2021-02-04T15:15:22Z",
"updated_at": "2021-03-21T01:57:19Z",
"updated_at": "2021-03-29T14:59:21Z",
"pushed_at": "2021-02-05T06:40:50Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 3,
"forks": 3,
"watchers": 17,
"watchers": 18,
"score": 0
}
]

View file

@ -105,13 +105,13 @@
"description": "[CVE-2020-6287] SAP NetWeaver AS JAVA (LM Configuration Wizard) Authentication Bypass (Create Simple & Administrator Java User)",
"fork": false,
"created_at": "2020-08-13T09:12:37Z",
"updated_at": "2021-01-27T18:19:21Z",
"updated_at": "2021-03-29T12:19:34Z",
"pushed_at": "2020-09-18T15:18:21Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 2,
"forks": 2,
"watchers": 8,
"watchers": 9,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "🐱‍💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...",
"fork": false,
"created_at": "2021-03-22T11:53:57Z",
"updated_at": "2021-03-29T06:31:54Z",
"updated_at": "2021-03-29T13:57:01Z",
"pushed_at": "2021-03-22T18:24:20Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 83,
"watchers_count": 83,
"forks_count": 11,
"forks": 11,
"watchers": 80,
"watchers": 83,
"score": 0
}
]

View file

@ -109,8 +109,8 @@
"pushed_at": "2021-02-25T16:05:02Z",
"stargazers_count": 100,
"watchers_count": 100,
"forks_count": 34,
"forks": 34,
"forks_count": 35,
"forks": 35,
"watchers": 100,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "cve-2021-22986 f5 rce 漏洞批量检测 poc",
"fork": false,
"created_at": "2021-03-19T18:50:22Z",
"updated_at": "2021-03-29T08:08:33Z",
"updated_at": "2021-03-29T11:25:19Z",
"pushed_at": "2021-03-27T10:02:59Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 4,
"forks": 4,
"watchers": 14,
"watchers": 16,
"score": 0
},
{
@ -128,7 +128,7 @@
"description": "CVE-2021-22986 & F5 BIG-IP RCE",
"fork": false,
"created_at": "2021-03-22T07:13:50Z",
"updated_at": "2021-03-26T20:48:19Z",
"updated_at": "2021-03-29T11:32:42Z",
"pushed_at": "2021-03-24T12:10:24Z",
"stargazers_count": 34,
"watchers_count": 34,
@ -205,5 +205,28 @@
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 352644816,
"name": "CVE-2021-22986",
"full_name": "dotslashed\/CVE-2021-22986",
"owner": {
"login": "dotslashed",
"id": 73475291,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73475291?v=4",
"html_url": "https:\/\/github.com\/dotslashed"
},
"html_url": "https:\/\/github.com\/dotslashed\/CVE-2021-22986",
"description": null,
"fork": false,
"created_at": "2021-03-29T13:01:08Z",
"updated_at": "2021-03-29T13:04:49Z",
"pushed_at": "2021-03-29T13:04:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-03-29T08:12:01Z",
"updated_at": "2021-03-29T13:43:00Z",
"pushed_at": "2021-03-22T03:46:42Z",
"stargazers_count": 265,
"watchers_count": 265,
"forks_count": 60,
"forks": 60,
"watchers": 265,
"stargazers_count": 267,
"watchers_count": 267,
"forks_count": 61,
"forks": 61,
"watchers": 267,
"score": 0
}
]

View file

@ -749,13 +749,13 @@
"description": "Proof-of-concept exploit for CVE-2021-26855 and CVE-2021-27065. Unauthenticated RCE in Exchange.",
"fork": false,
"created_at": "2021-03-24T01:12:48Z",
"updated_at": "2021-03-27T20:12:31Z",
"updated_at": "2021-03-29T12:15:54Z",
"pushed_at": "2021-03-24T01:25:05Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "proxylogon exploit - CVE-2021-26857",
"fork": false,
"created_at": "2021-03-11T17:32:32Z",
"updated_at": "2021-03-29T02:34:33Z",
"updated_at": "2021-03-29T11:52:36Z",
"pushed_at": "2021-03-11T17:34:15Z",
"stargazers_count": 93,
"watchers_count": 93,
"stargazers_count": 94,
"watchers_count": 94,
"forks_count": 32,
"forks": 32,
"watchers": 93,
"watchers": 94,
"score": 0
}
]

25
2021/CVE-2021-26943.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 325836310,
"name": "SmmExploit",
"full_name": "tandasat\/SmmExploit",
"owner": {
"login": "tandasat",
"id": 1620923,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1620923?v=4",
"html_url": "https:\/\/github.com\/tandasat"
},
"html_url": "https:\/\/github.com\/tandasat\/SmmExploit",
"description": "The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.",
"fork": false,
"created_at": "2020-12-31T16:30:02Z",
"updated_at": "2021-03-29T14:59:56Z",
"pushed_at": "2021-03-29T12:33:38Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"forks": 1,
"watchers": 7,
"score": 0
}
]

25
2021/CVE-2021-29267.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 352641545,
"name": "CVE-2021-29267",
"full_name": "Security-AVS\/CVE-2021-29267",
"owner": {
"login": "Security-AVS",
"id": 72926885,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72926885?v=4",
"html_url": "https:\/\/github.com\/Security-AVS"
},
"html_url": "https:\/\/github.com\/Security-AVS\/CVE-2021-29267",
"description": "SherlockIM ChatBot XSS",
"fork": false,
"created_at": "2021-03-29T12:50:23Z",
"updated_at": "2021-03-29T13:34:39Z",
"pushed_at": "2021-03-29T12:53:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Laravel debug rce",
"fork": false,
"created_at": "2021-01-22T05:12:21Z",
"updated_at": "2021-03-29T07:26:14Z",
"updated_at": "2021-03-29T09:22:35Z",
"pushed_at": "2021-01-24T05:28:07Z",
"stargazers_count": 74,
"watchers_count": 74,
"stargazers_count": 75,
"watchers_count": 75,
"forks_count": 28,
"forks": 28,
"watchers": 74,
"watchers": 75,
"score": 0
},
{
@ -151,13 +151,13 @@
"description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)",
"fork": false,
"created_at": "2021-02-18T05:42:13Z",
"updated_at": "2021-03-21T08:41:05Z",
"updated_at": "2021-03-29T14:30:39Z",
"pushed_at": "2021-02-18T08:30:23Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 6,
"forks": 6,
"watchers": 18,
"watchers": 19,
"score": 0
},
{

View file

@ -381,13 +381,13 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2021-03-29T07:39:35Z",
"updated_at": "2021-03-29T09:22:16Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 661,
"watchers_count": 661,
"stargazers_count": 662,
"watchers_count": 662,
"forks_count": 186,
"forks": 186,
"watchers": 661,
"watchers": 662,
"score": 0
},
{
@ -473,13 +473,13 @@
"description": "A docker environment to research CVE-2021-3156",
"fork": false,
"created_at": "2021-01-31T22:58:13Z",
"updated_at": "2021-03-17T06:06:38Z",
"updated_at": "2021-03-29T14:49:42Z",
"pushed_at": "2021-01-31T23:03:51Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"forks": 2,
"watchers": 3,
"watchers": 4,
"score": 0
},
{
@ -657,13 +657,13 @@
"description": "Root shell PoC for CVE-2021-3156",
"fork": false,
"created_at": "2021-02-03T19:57:56Z",
"updated_at": "2021-03-27T17:18:11Z",
"updated_at": "2021-03-29T12:51:11Z",
"pushed_at": "2021-02-03T22:28:14Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 15,
"forks": 15,
"watchers": 32,
"watchers": 33,
"score": 0
},
{
@ -887,13 +887,13 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
"updated_at": "2021-03-29T07:56:20Z",
"updated_at": "2021-03-29T14:14:27Z",
"pushed_at": "2021-03-28T15:22:59Z",
"stargazers_count": 232,
"watchers_count": 232,
"stargazers_count": 235,
"watchers_count": 235,
"forks_count": 36,
"forks": 36,
"watchers": 232,
"watchers": 235,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻‍💻",
"fork": false,
"created_at": "2021-03-26T01:09:25Z",
"updated_at": "2021-03-29T09:03:50Z",
"pushed_at": "2021-03-28T08:21:39Z",
"stargazers_count": 101,
"watchers_count": 101,
"updated_at": "2021-03-29T15:14:22Z",
"pushed_at": "2021-03-29T13:42:04Z",
"stargazers_count": 117,
"watchers_count": 117,
"forks_count": 19,
"forks": 19,
"watchers": 101,
"watchers": 117,
"score": 0
}
]

View file

@ -356,6 +356,7 @@ An issue has been discovered in GitLab CE/EE affecting all versions starting fro
- [ZephrFish/CVE-2021-22986_Check](https://github.com/ZephrFish/CVE-2021-22986_Check)
- [yaunsky/CVE-202122986-EXP](https://github.com/yaunsky/CVE-202122986-EXP)
- [Tas9er/CVE-2021-22986](https://github.com/Tas9er/CVE-2021-22986)
- [dotslashed/CVE-2021-22986](https://github.com/dotslashed/CVE-2021-22986)
### CVE-2021-23132 (2021-03-04)
@ -519,6 +520,9 @@ LMA ISIDA Retriever 5.2 allows SQL Injection.
- [Security-AVS/-CVE-2021-26904](https://github.com/Security-AVS/-CVE-2021-26904)
### CVE-2021-26943
- [tandasat/SmmExploit](https://github.com/tandasat/SmmExploit)
### CVE-2021-27065 (2021-03-02)
<code>
@ -602,6 +606,9 @@ SonLogger before 6.4.1 is affected by user creation with any user permissions pr
- [erberkan/SonLogger-vulns](https://github.com/erberkan/SonLogger-vulns)
### CVE-2021-29267
- [Security-AVS/CVE-2021-29267](https://github.com/Security-AVS/CVE-2021-29267)
## 2020
### CVE-2020-0001 (2020-01-08)
@ -13319,6 +13326,14 @@ Web Viewer 1.0.0.193 on Samsung SRN-1670D devices suffers from an Unrestricted f
- [realistic-security/CVE-2017-16524](https://github.com/realistic-security/CVE-2017-16524)
### CVE-2017-16541 (2017-11-04)
<code>
Tor Browser before 7.0.9 on macOS and Linux allows remote attackers to bypass the intended anonymity feature and discover a client IP address via vectors involving a crafted web site that leverages file:// mishandling in Firefox, aka TorMoil. NOTE: Tails is unaffected.
</code>
- [Ethan-Chen-uwo/A-breif-introduction-of-CVE-2017-16541](https://github.com/Ethan-Chen-uwo/A-breif-introduction-of-CVE-2017-16541)
### CVE-2017-16567 (2017-11-09)
<code>