Auto Update 2021/07/10 06:13:09

This commit is contained in:
motikan2010-bot 2021-07-10 06:13:09 +09:00
parent 96f9b7e83b
commit 8c978d9443
17 changed files with 104 additions and 75 deletions

View file

@ -13,13 +13,13 @@
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
"fork": false,
"created_at": "2018-01-04T04:32:26Z",
"updated_at": "2021-07-04T10:47:43Z",
"updated_at": "2021-07-09T19:19:06Z",
"pushed_at": "2019-11-19T03:36:46Z",
"stargazers_count": 545,
"watchers_count": 545,
"stargazers_count": 546,
"watchers_count": 546,
"forks_count": 92,
"forks": 92,
"watchers": 545,
"watchers": 546,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "An exploit for Apache Struts CVE-2017-9805",
"fork": false,
"created_at": "2017-09-09T01:32:57Z",
"updated_at": "2021-04-27T13:44:14Z",
"updated_at": "2021-07-09T17:21:14Z",
"pushed_at": "2017-11-07T19:24:00Z",
"stargazers_count": 239,
"watchers_count": 239,
"stargazers_count": 240,
"watchers_count": 240,
"forks_count": 78,
"forks": 78,
"watchers": 239,
"watchers": 240,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
"fork": false,
"created_at": "2018-01-04T04:32:26Z",
"updated_at": "2021-07-04T10:47:43Z",
"updated_at": "2021-07-09T19:19:06Z",
"pushed_at": "2019-11-19T03:36:46Z",
"stargazers_count": 545,
"watchers_count": 545,
"stargazers_count": 546,
"watchers_count": 546,
"forks_count": 92,
"forks": 92,
"watchers": 545,
"watchers": 546,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
"fork": false,
"created_at": "2018-04-28T11:50:00Z",
"updated_at": "2021-06-26T13:56:18Z",
"updated_at": "2021-07-09T16:33:17Z",
"pushed_at": "2018-08-30T05:37:03Z",
"stargazers_count": 424,
"watchers_count": 424,
"stargazers_count": 425,
"watchers_count": 425,
"forks_count": 54,
"forks": 54,
"watchers": 424,
"watchers": 425,
"score": 0
},
{

View file

@ -63,8 +63,8 @@
"pushed_at": "2019-06-21T11:29:41Z",
"stargazers_count": 317,
"watchers_count": 317,
"forks_count": 67,
"forks": 67,
"forks_count": 68,
"forks": 68,
"watchers": 317,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "(CVE-2018-9995) Get DVR Credentials",
"fork": false,
"created_at": "2018-04-29T20:00:06Z",
"updated_at": "2021-07-09T08:14:08Z",
"updated_at": "2021-07-09T20:20:27Z",
"pushed_at": "2019-01-23T14:27:21Z",
"stargazers_count": 453,
"watchers_count": 453,
"stargazers_count": 454,
"watchers_count": 454,
"forks_count": 187,
"forks": 187,
"watchers": 453,
"watchers": 454,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC code for CVE-2019-0841 Privilege Escalation vulnerability",
"fork": false,
"created_at": "2019-04-05T12:53:52Z",
"updated_at": "2021-06-18T03:34:13Z",
"updated_at": "2021-07-09T20:13:21Z",
"pushed_at": "2019-04-09T16:49:19Z",
"stargazers_count": 225,
"watchers_count": 225,
"stargazers_count": 226,
"watchers_count": 226,
"forks_count": 100,
"forks": 100,
"watchers": 225,
"watchers": 226,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-07-09T12:05:41Z",
"updated_at": "2021-07-09T15:25:47Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2671,
"watchers_count": 2671,
"stargazers_count": 2672,
"watchers_count": 2672,
"forks_count": 777,
"forks": 777,
"watchers": 2671,
"watchers": 2672,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
"fork": false,
"created_at": "2019-01-09T22:30:42Z",
"updated_at": "2021-07-04T07:38:39Z",
"updated_at": "2021-07-09T16:14:05Z",
"pushed_at": "2019-01-22T21:00:36Z",
"stargazers_count": 610,
"watchers_count": 610,
"stargazers_count": 611,
"watchers_count": 611,
"forks_count": 132,
"forks": 132,
"watchers": 610,
"watchers": 611,
"score": 0
},
{
@ -113,5 +113,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 384531590,
"name": "CVE-2019-6447",
"full_name": "3hydraking\/CVE-2019-6447",
"owner": {
"login": "3hydraking",
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/3hydraking"
},
"html_url": "https:\/\/github.com\/3hydraking\/CVE-2019-6447",
"description": null,
"fork": false,
"created_at": "2021-07-09T19:21:29Z",
"updated_at": "2021-07-09T19:27:19Z",
"pushed_at": "2021-07-09T19:27:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1094,12 +1094,12 @@
"description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false,
"created_at": "2020-04-20T14:35:48Z",
"updated_at": "2021-07-08T04:00:24Z",
"updated_at": "2021-07-09T19:50:59Z",
"pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 399,
"watchers_count": 399,
"forks_count": 129,
"forks": 129,
"forks_count": 130,
"forks": 130,
"watchers": 399,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-07-09T12:05:41Z",
"updated_at": "2021-07-09T15:25:47Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2671,
"watchers_count": 2671,
"stargazers_count": 2672,
"watchers_count": 2672,
"forks_count": 777,
"forks": 777,
"watchers": 2671,
"watchers": 2672,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-10-21T15:39:00Z",
"stargazers_count": 174,
"watchers_count": 174,
"forks_count": 36,
"forks": 36,
"forks_count": 37,
"forks": 37,
"watchers": 174,
"score": 0
}

View file

@ -13,8 +13,8 @@
"description": "CVE-2020-8554: Man in the middle using LoadBalancer or ExternalIPs",
"fork": false,
"created_at": "2020-12-01T16:58:39Z",
"updated_at": "2021-03-12T13:58:36Z",
"pushed_at": "2021-07-07T17:46:26Z",
"updated_at": "2021-07-09T16:02:47Z",
"pushed_at": "2021-07-09T16:16:14Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 3,

View file

@ -36,13 +36,13 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2021-07-09T15:05:17Z",
"updated_at": "2021-07-09T19:35:13Z",
"pushed_at": "2021-07-08T11:10:36Z",
"stargazers_count": 1135,
"watchers_count": 1135,
"forks_count": 408,
"forks": 408,
"watchers": 1135,
"stargazers_count": 1140,
"watchers_count": 1140,
"forks_count": 410,
"forks": 410,
"watchers": 1140,
"score": 0
},
{
@ -220,13 +220,13 @@
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
"fork": false,
"created_at": "2021-07-01T23:45:58Z",
"updated_at": "2021-07-09T13:52:21Z",
"updated_at": "2021-07-09T17:47:15Z",
"pushed_at": "2021-07-05T08:54:06Z",
"stargazers_count": 459,
"watchers_count": 459,
"stargazers_count": 461,
"watchers_count": 461,
"forks_count": 120,
"forks": 120,
"watchers": 459,
"watchers": 461,
"score": 0
},
{

View file

@ -1,20 +1,20 @@
[
{
"id": 370771984,
"name": "CVE-2021-20914",
"full_name": "Shadow0ps\/CVE-2021-20914",
"name": "CVE-2021-21974",
"full_name": "Shadow0ps\/CVE-2021-21974",
"owner": {
"login": "Shadow0ps",
"id": 6516174,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6516174?v=4",
"html_url": "https:\/\/github.com\/Shadow0ps"
},
"html_url": "https:\/\/github.com\/Shadow0ps\/CVE-2021-20914",
"description": "POC for CVE2021-2091 VMWare ESXi RCE Exploit",
"html_url": "https:\/\/github.com\/Shadow0ps\/CVE-2021-21974",
"description": "POC for CVE-2021-21974 VMWare ESXi RCE Exploit",
"fork": false,
"created_at": "2021-05-25T17:14:38Z",
"updated_at": "2021-06-02T02:28:20Z",
"pushed_at": "2021-05-31T17:29:25Z",
"updated_at": "2021-07-09T19:38:43Z",
"pushed_at": "2021-07-09T19:38:41Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 4,

View file

@ -59,13 +59,13 @@
"description": null,
"fork": false,
"created_at": "2021-07-02T12:10:49Z",
"updated_at": "2021-07-09T14:30:39Z",
"updated_at": "2021-07-09T15:32:47Z",
"pushed_at": "2021-07-02T12:17:50Z",
"stargazers_count": 98,
"watchers_count": 98,
"forks_count": 17,
"forks": 17,
"watchers": 98,
"stargazers_count": 99,
"watchers_count": 99,
"forks_count": 18,
"forks": 18,
"watchers": 99,
"score": 0
},
{
@ -220,13 +220,13 @@
"description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE",
"fork": false,
"created_at": "2021-07-05T20:13:49Z",
"updated_at": "2021-07-09T15:16:41Z",
"pushed_at": "2021-07-08T12:00:11Z",
"stargazers_count": 494,
"watchers_count": 494,
"updated_at": "2021-07-09T21:17:33Z",
"pushed_at": "2021-07-09T15:49:23Z",
"stargazers_count": 501,
"watchers_count": 501,
"forks_count": 59,
"forks": 59,
"watchers": 494,
"watchers": 501,
"score": 0
},
{

View file

@ -406,9 +406,6 @@ Cross-site scripting vulnerability in EC-CUBE 4.0.0 to 4.0.5 allows a remote att
- [s-index/CVE-2021-20717](https://github.com/s-index/CVE-2021-20717)
### CVE-2021-20914
- [Shadow0ps/CVE-2021-20914](https://github.com/Shadow0ps/CVE-2021-20914)
### CVE-2021-21014 (2021-02-11)
<code>
@ -585,6 +582,14 @@ The vSphere Client (HTML5) contains an SSRF (Server Side Request Forgery) vulner
- [freakanonymous/CVE-2021-21973-Automateme](https://github.com/freakanonymous/CVE-2021-21973-Automateme)
### CVE-2021-21974 (2021-02-24)
<code>
OpenSLP as used in ESXi (7.0 before ESXi70U1c-17325551, 6.7 before ESXi670-202102401-SG, 6.5 before ESXi650-202102101-SG) has a heap-overflow vulnerability. A malicious actor residing within the same network segment as ESXi who has access to port 427 may be able to trigger the heap-overflow issue in OpenSLP service resulting in remote code execution.
</code>
- [Shadow0ps/CVE-2021-21974](https://github.com/Shadow0ps/CVE-2021-21974)
### CVE-2021-21975 (2021-03-31)
<code>
@ -7039,6 +7044,7 @@ The ES File Explorer File Manager application through 4.1.9.7.4 for Android allo
- [N3H4L/CVE-2019-6447](https://github.com/N3H4L/CVE-2019-6447)
- [sidhawkss/ES-File-Explorer-Vulnerability-on-port-59777](https://github.com/sidhawkss/ES-File-Explorer-Vulnerability-on-port-59777)
- [mcmahonr/cve-2019-6447](https://github.com/mcmahonr/cve-2019-6447)
- [3hydraking/CVE-2019-6447](https://github.com/3hydraking/CVE-2019-6447)
### CVE-2019-6453 (2019-02-18)