Auto Update 2022/08/04 00:19:15

This commit is contained in:
motikan2010-bot 2022-08-04 09:19:15 +09:00
parent dcd91cb9bd
commit 899904bcc5
26 changed files with 87 additions and 185 deletions

View file

@ -1,30 +0,0 @@
[
{
"id": 500290836,
"name": "CVE-2004-0230-TCP-Sequence-Number-Approximation-Based-Denial-of-Service",
"full_name": "RakeshShinde97\/CVE-2004-0230-TCP-Sequence-Number-Approximation-Based-Denial-of-Service",
"owner": {
"login": "RakeshShinde97",
"id": 22909509,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22909509?v=4",
"html_url": "https:\/\/github.com\/RakeshShinde97"
},
"html_url": "https:\/\/github.com\/RakeshShinde97\/CVE-2004-0230-TCP-Sequence-Number-Approximation-Based-Denial-of-Service",
"description": "TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet.",
"fork": false,
"created_at": "2022-06-06T04:30:03Z",
"updated_at": "2022-06-06T04:30:03Z",
"pushed_at": "2022-06-06T04:33:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,37 +1,4 @@
[
{
"id": 257726272,
"name": "shiguresh",
"full_name": "sinkaroid\/shiguresh",
"owner": {
"login": "sinkaroid",
"id": 12372481,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12372481?v=4",
"html_url": "https:\/\/github.com\/sinkaroid"
},
"html_url": "https:\/\/github.com\/sinkaroid\/shiguresh",
"description": "CVE-2004-1769 \/\/ Mass cPanel Reset password",
"fork": false,
"created_at": "2020-04-21T22:03:18Z",
"updated_at": "2020-08-22T13:10:27Z",
"pushed_at": "2020-04-21T22:24:07Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"arbitrary-code-execution",
"bash",
"cpanel",
"regex"
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 263513846,
"name": "shiguresh",

View file

@ -13,10 +13,10 @@
"description": "Blueborne CVE-2017-0785 Android information leak vulnerability",
"fork": false,
"created_at": "2017-09-20T23:32:29Z",
"updated_at": "2022-07-27T07:08:30Z",
"updated_at": "2022-08-03T22:09:11Z",
"pushed_at": "2017-09-23T05:11:45Z",
"stargazers_count": 444,
"watchers_count": 444,
"stargazers_count": 445,
"watchers_count": 445,
"forks_count": 194,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 194,
"watchers": 444,
"watchers": 445,
"score": 0
},
{

View file

@ -181,8 +181,8 @@
"description": "Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)",
"fork": false,
"created_at": "2018-01-05T21:57:03Z",
"updated_at": "2022-07-09T19:50:57Z",
"pushed_at": "2018-01-26T14:28:58Z",
"updated_at": "2022-08-03T20:02:39Z",
"pushed_at": "2022-08-03T20:07:09Z",
"stargazers_count": 117,
"watchers_count": 117,
"forks_count": 39,

View file

@ -1,32 +1,4 @@
[
{
"id": 84158718,
"name": "S2-045",
"full_name": "PolarisLab\/S2-045",
"owner": {
"login": "PolarisLab",
"id": 25890110,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25890110?v=4",
"html_url": "https:\/\/github.com\/PolarisLab"
},
"html_url": "https:\/\/github.com\/PolarisLab\/S2-045",
"description": "Struts2 S2-045CVE-2017-5638Vulnerability environment - http:\/\/www.mottoin.com\/97954.html",
"fork": false,
"created_at": "2017-03-07T05:30:30Z",
"updated_at": "2022-03-22T17:04:53Z",
"pushed_at": "2017-03-07T05:37:55Z",
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 24,
"score": 0
},
{
"id": 84186490,
"name": "Struts2-045-Exp",

View file

@ -13,18 +13,18 @@
"description": "APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers (all versions prior to V3.5) and TALON TC BACnet Automation Controllers (all versions prior to V3.5). With a 7.5 CVSS, this exploit allows for an attacker to perform an authentication bypass using an alternate path or channel to access hidden directories in the web server. This repository takes advantage of CVE-2017-9947.",
"fork": false,
"created_at": "2022-05-26T01:13:42Z",
"updated_at": "2022-07-18T02:45:48Z",
"updated_at": "2022-08-03T19:27:39Z",
"pushed_at": "2022-05-26T19:14:20Z",
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 5,
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 28,
"forks": 6,
"watchers": 29,
"score": 0
}
]

View file

@ -1541,13 +1541,13 @@
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 861,
"watchers_count": 861,
"forks_count": 283,
"forks_count": 284,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 283,
"forks": 284,
"watchers": 861,
"score": 0
},

View file

@ -17,13 +17,13 @@
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1729,
"watchers_count": 1729,
"forks_count": 263,
"forks_count": 262,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 263,
"forks": 262,
"watchers": 1729,
"score": 0
},

View file

@ -41,10 +41,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-08-03T17:48:17Z",
"updated_at": "2022-08-03T21:49:39Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3459,
"watchers_count": 3459,
"stargazers_count": 3460,
"watchers_count": 3460,
"forks_count": 1026,
"allow_forking": true,
"is_template": false,
@ -72,7 +72,7 @@
],
"visibility": "public",
"forks": 1026,
"watchers": 3459,
"watchers": 3460,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation",
"fork": false,
"created_at": "2020-06-25T07:35:29Z",
"updated_at": "2022-06-21T12:20:46Z",
"updated_at": "2022-08-03T21:38:41Z",
"pushed_at": "2020-06-25T07:49:34Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 54,
"watchers": 53,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-08-03T17:48:17Z",
"updated_at": "2022-08-03T21:49:39Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3459,
"watchers_count": 3459,
"stargazers_count": 3460,
"watchers_count": 3460,
"forks_count": 1026,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 1026,
"watchers": 3459,
"watchers": 3460,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-2546CVE-2020-2915 CVE-2020-2801 CVE-2020-2798 CVE-2020-2883 CVE-2020-2884 CVE-2020-2950 WebLogic T3 payload exploit poc python3,",
"fork": false,
"created_at": "2020-03-02T15:54:46Z",
"updated_at": "2022-07-18T08:25:42Z",
"updated_at": "2022-08-03T20:49:54Z",
"pushed_at": "2020-06-10T10:49:38Z",
"stargazers_count": 131,
"watchers_count": 131,
"stargazers_count": 132,
"watchers_count": 132,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 131,
"watchers": 132,
"score": 0
}
]

View file

@ -90,10 +90,10 @@
"description": "how detect CVE-2020-2551 poc exploit python Weblogic RCE with IIOP",
"fork": false,
"created_at": "2020-01-19T13:01:32Z",
"updated_at": "2022-07-26T12:47:54Z",
"updated_at": "2022-08-03T20:49:56Z",
"pushed_at": "2021-12-18T20:52:39Z",
"stargazers_count": 190,
"watchers_count": 190,
"stargazers_count": 191,
"watchers_count": 191,
"forks_count": 45,
"allow_forking": true,
"is_template": false,
@ -101,7 +101,7 @@
"topics": [],
"visibility": "public",
"forks": 45,
"watchers": 190,
"watchers": 191,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Python exploit for the CVE-2021-22204 vulnerability in Exiftool",
"fork": false,
"created_at": "2021-05-11T18:45:07Z",
"updated_at": "2022-06-18T01:45:47Z",
"updated_at": "2022-08-03T23:05:56Z",
"pushed_at": "2021-05-20T21:42:43Z",
"stargazers_count": 67,
"watchers_count": 67,
"stargazers_count": 68,
"watchers_count": 68,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 27,
"watchers": 67,
"watchers": 68,
"score": 0
},
{

View file

@ -619,10 +619,10 @@
"description": "RCE exploit for Microsoft Exchange Server (CVE-2021-26855).",
"fork": false,
"created_at": "2021-03-14T13:04:07Z",
"updated_at": "2022-06-21T16:41:26Z",
"updated_at": "2022-08-03T23:25:44Z",
"pushed_at": "2022-04-23T03:21:44Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
@ -632,7 +632,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 13,
"watchers": 14,
"score": 0
},
{

View file

@ -218,10 +218,10 @@
"description": null,
"fork": false,
"created_at": "2021-06-29T20:47:16Z",
"updated_at": "2022-07-27T07:12:56Z",
"updated_at": "2022-08-03T20:07:28Z",
"pushed_at": "2021-06-29T21:09:41Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -229,7 +229,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 23,
"watchers": 24,
"score": 0
},
{

View file

@ -13,15 +13,18 @@
"description": "海康威视RCE漏洞 批量检测和利用工具",
"fork": false,
"created_at": "2022-08-03T17:27:59Z",
"updated_at": "2022-08-03T17:30:26Z",
"pushed_at": "2022-08-03T17:30:23Z",
"updated_at": "2022-08-03T19:38:09Z",
"pushed_at": "2022-08-03T18:29:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"topics": [
"cve-2021-36260",
"exploit"
],
"visibility": "public",
"forks": 0,
"watchers": 0,

View file

@ -906,10 +906,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2022-08-03T06:43:33Z",
"updated_at": "2022-08-03T20:07:34Z",
"pushed_at": "2022-06-21T14:52:05Z",
"stargazers_count": 576,
"watchers_count": 576,
"stargazers_count": 577,
"watchers_count": 577,
"forks_count": 119,
"allow_forking": true,
"is_template": false,
@ -919,7 +919,7 @@
],
"visibility": "public",
"forks": 119,
"watchers": 576,
"watchers": 577,
"score": 0
},
{
@ -1253,13 +1253,13 @@
"pushed_at": "2022-01-28T00:29:15Z",
"stargazers_count": 73,
"watchers_count": 73,
"forks_count": 24,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 24,
"forks": 23,
"watchers": 73,
"score": 0
},

View file

@ -41,7 +41,7 @@
"description": "Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE",
"fork": false,
"created_at": "2021-10-06T02:28:41Z",
"updated_at": "2022-05-12T16:02:24Z",
"updated_at": "2022-08-03T18:35:01Z",
"pushed_at": "2021-12-22T23:54:18Z",
"stargazers_count": 20,
"watchers_count": 20,

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
"updated_at": "2022-07-29T15:35:46Z",
"updated_at": "2022-08-03T19:59:04Z",
"pushed_at": "2021-12-16T09:50:15Z",
"stargazers_count": 1126,
"watchers_count": 1126,
"stargazers_count": 1127,
"watchers_count": 1127,
"forks_count": 294,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 294,
"watchers": 1126,
"watchers": 1127,
"score": 0
},
{

View file

@ -6169,10 +6169,10 @@
"description": "A Proof of Concept of the Log4j vulnerabilities (CVE-2021-44228) over Java-RMI",
"fork": false,
"created_at": "2021-12-19T17:53:31Z",
"updated_at": "2022-07-23T17:46:11Z",
"updated_at": "2022-08-03T21:21:42Z",
"pushed_at": "2021-12-19T22:09:40Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -6180,7 +6180,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0
},
{

View file

@ -125,10 +125,10 @@
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
"fork": false,
"created_at": "2022-03-07T18:55:20Z",
"updated_at": "2022-08-03T05:34:47Z",
"updated_at": "2022-08-03T18:56:46Z",
"pushed_at": "2022-03-08T06:20:05Z",
"stargazers_count": 958,
"watchers_count": 958,
"stargazers_count": 959,
"watchers_count": 959,
"forks_count": 208,
"allow_forking": true,
"is_template": false,
@ -136,7 +136,7 @@
"topics": [],
"visibility": "public",
"forks": 208,
"watchers": 958,
"watchers": 959,
"score": 0
},
{
@ -605,13 +605,13 @@
"pushed_at": "2022-03-09T02:01:28Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 2,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
"fork": false,
"created_at": "2022-04-20T21:23:52Z",
"updated_at": "2022-08-01T17:07:16Z",
"updated_at": "2022-08-03T23:25:49Z",
"pushed_at": "2022-04-27T05:52:43Z",
"stargazers_count": 297,
"watchers_count": 297,
"stargazers_count": 298,
"watchers_count": 298,
"forks_count": 68,
"allow_forking": true,
"is_template": false,
@ -26,7 +26,7 @@
],
"visibility": "public",
"forks": 68,
"watchers": 297,
"watchers": 298,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-31245: RCE and domain admin privilege escalation for Mailcow",
"fork": false,
"created_at": "2022-05-20T10:05:55Z",
"updated_at": "2022-07-25T15:22:00Z",
"updated_at": "2022-08-03T21:33:27Z",
"pushed_at": "2022-07-25T06:33:54Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 9,
"watchers": 10,
"score": 0
}
]

View file

@ -153,10 +153,10 @@
"description": null,
"fork": false,
"created_at": "2022-08-02T09:52:02Z",
"updated_at": "2022-08-03T16:23:24Z",
"updated_at": "2022-08-03T23:03:37Z",
"pushed_at": "2022-08-02T11:04:56Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 44,
"watchers_count": 44,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -164,7 +164,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 43,
"watchers": 44,
"score": 0
}
]

View file

@ -20955,7 +20955,6 @@ Multiple cross-site request forgery (CSRF) vulnerabilities on the D-Link DI-524
The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.
</code>
- [PolarisLab/S2-045](https://github.com/PolarisLab/S2-045)
- [Flyteas/Struts2-045-Exp](https://github.com/Flyteas/Struts2-045-Exp)
- [bongbongco/cve-2017-5638](https://github.com/bongbongco/cve-2017-5638)
- [jas502n/S2-045-EXP-POC-TOOLS](https://github.com/jas502n/S2-045-EXP-POC-TOOLS)
@ -27519,14 +27518,6 @@ PHP file inclusion vulnerability in grab_globals.lib.php in phpMyAdmin 2.6.4 and
## 2004
### CVE-2004-0230 (2004-05-05)
<code>
TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.
</code>
- [RakeshShinde97/CVE-2004-0230-TCP-Sequence-Number-Approximation-Based-Denial-of-Service](https://github.com/RakeshShinde97/CVE-2004-0230-TCP-Sequence-Number-Approximation-Based-Denial-of-Service)
### CVE-2004-0558 (2004-09-17)
<code>
@ -27552,7 +27543,6 @@ Buffer overflow in Icecast 2.0.1 and earlier allows remote attackers to execute
The &quot;Allow cPanel users to reset their password via email&quot; feature in cPanel 9.1.0 build 34 and earlier, including 8.x, allows remote attackers to execute arbitrary code via the user parameter to resetpass.
</code>
- [sinkaroid/shiguresh](https://github.com/sinkaroid/shiguresh)
- [Redsplit/shiguresh](https://github.com/Redsplit/shiguresh)
### CVE-2004-2167 (2005-07-10)