Auto Update 2021/05/04 00:11:21

This commit is contained in:
motikan2010-bot 2021-05-04 00:11:21 +09:00
parent 40c039c72d
commit 96d89b2dcc
23 changed files with 137 additions and 80 deletions

View file

@ -13,8 +13,8 @@
"description": null,
"fork": false,
"created_at": "2021-05-01T14:04:58Z",
"updated_at": "2021-05-02T15:00:07Z",
"pushed_at": "2021-05-02T15:00:05Z",
"updated_at": "2021-05-03T13:47:54Z",
"pushed_at": "2021-05-03T13:47:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,13 +13,13 @@
"description": "Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate",
"fork": false,
"created_at": "2018-11-13T13:40:10Z",
"updated_at": "2021-04-09T17:09:52Z",
"updated_at": "2021-05-03T10:39:10Z",
"pushed_at": "2018-11-14T02:40:24Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 2,
"forks": 2,
"watchers": 14,
"watchers": 15,
"score": 0
}
]

View file

@ -36,8 +36,8 @@
"description": "GitLab 11.4.7 CE RCE exploit with different reverse shells. CVE-2018-19571 + CVE-2018-19585",
"fork": false,
"created_at": "2021-04-11T11:23:37Z",
"updated_at": "2021-04-14T23:35:21Z",
"pushed_at": "2021-04-14T23:35:19Z",
"updated_at": "2021-05-03T12:59:20Z",
"pushed_at": "2021-05-03T12:59:18Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-04-29T16:04:12Z",
"updated_at": "2021-05-03T14:50:42Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2547,
"watchers_count": 2547,
"stargazers_count": 2548,
"watchers_count": 2548,
"forks_count": 741,
"forks": 741,
"watchers": 2547,
"watchers": 2548,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
"fork": false,
"created_at": "2019-02-12T06:02:06Z",
"updated_at": "2021-05-02T14:33:44Z",
"updated_at": "2021-05-03T09:15:02Z",
"pushed_at": "2019-05-09T21:34:26Z",
"stargazers_count": 560,
"watchers_count": 560,
"stargazers_count": 561,
"watchers_count": 561,
"forks_count": 131,
"forks": 131,
"watchers": 560,
"watchers": 561,
"score": 0
},
{

View file

@ -435,5 +435,28 @@
"forks": 2,
"watchers": 3,
"score": 0
},
{
"id": 363882684,
"name": "proxylogon",
"full_name": "ann0906\/proxylogon",
"owner": {
"login": "ann0906",
"id": 82447420,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82447420?v=4",
"html_url": "https:\/\/github.com\/ann0906"
},
"html_url": "https:\/\/github.com\/ann0906\/proxylogon",
"description": "事件: 微軟Microsoft上周公布了修補遭到駭客攻擊的 Exchange Server 漏洞全球恐有數萬個組織受到影響。網域與被入侵的Exchange郵件伺服器有關而這臺伺服器後來被駭客當作C&C中繼站使用導致接下來發生加密攻擊事故。 嚴重性: 全球企業普遍使用微軟生態系執行日常業務若遭受駭客攻擊將造成用戶機敏資料外洩並導致極大損失。雖然微軟已推出更新補釘但阿戴爾強調這尚未去除儲存在受害伺服器內的後門殼層webshell因此就算尚未受到攻擊的企業可以免於被駭風險駭客仍有時間入侵已被駭的伺服器留下「定時炸彈」。 從2020年開始美國便不斷指控中國入侵多家醫藥公司及學術單位試圖竊取疫苗研發機密這次事件很可能將使中美之間的關係進一步惡化。至於華為、TikTok等中國服務是否會受到這次駭客事件波及則暫時還不明朗。 漏洞通報程序: 在2年前曾經拿下資安圈漏洞奧斯卡獎Pwnie Awards「最佳伺服器漏洞獎」戴夫寇爾首席資安研究員Orange Tsai蔡政達漏洞通報記錄不勝枚舉後來因為針對企業常用的SSL VPN進行漏洞研究與通報更是在全球資安圈聲名大噪。 不過在今年3月2日卻發生讓Orange Tsai錯愕不已的事情。那就是他在今年一月跟微軟通報的2個Exchange漏洞微軟原訂在3月9日對外釋出修補程式卻突然提前一週在3月2日便緊急釋出修補程式。原來是因為在2月26日到2月28日這個週五下班後到週末這段期間全球各地發生許多利用微軟Exchange漏洞發動攻擊的資安事件。 攻擊本質: 有人在網路上大量掃描微軟於本月修補的CVE-2020-0688安全漏洞該漏洞攸關Microsoft Exchange伺服器呼籲Exchange用戶應儘速修補。 CVE-2020-0688漏洞肇因於Exchange伺服器在安裝時沒能妥善建立唯一金鑰將允許具備該知識及信箱的授權用戶以系統權限傳遞任意物件屬於遠端程式攻擊漏洞該漏洞影響Microsoft Exchange Server 2010 SP3、Microsoft Exchange Server 2013、Microsoft Exchange Server 2016與Microsoft Exchange Server 2019但只被微軟列為重要Important等級的風險。",
"fork": false,
"created_at": "2021-05-03T09:44:25Z",
"updated_at": "2021-05-03T09:52:40Z",
"pushed_at": "2021-05-03T09:44:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1324,13 +1324,13 @@
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
"fork": false,
"created_at": "2020-06-10T16:44:39Z",
"updated_at": "2021-05-01T22:22:19Z",
"updated_at": "2021-05-03T10:47:42Z",
"pushed_at": "2021-01-15T19:21:25Z",
"stargazers_count": 103,
"watchers_count": 103,
"stargazers_count": 104,
"watchers_count": 104,
"forks_count": 33,
"forks": 33,
"watchers": 103,
"watchers": 104,
"score": 0
},
{

View file

@ -178,8 +178,8 @@
"pushed_at": "2020-07-16T18:32:04Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 4,
"forks": 4,
"forks_count": 3,
"forks": 3,
"watchers": 17,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2021-05-02T08:59:56Z",
"updated_at": "2021-05-03T10:05:02Z",
"pushed_at": "2020-10-21T12:10:28Z",
"stargazers_count": 1270,
"watchers_count": 1270,
"stargazers_count": 1271,
"watchers_count": 1271,
"forks_count": 293,
"forks": 293,
"watchers": 1270,
"watchers": 1271,
"score": 0
},
{
@ -339,8 +339,8 @@
"pushed_at": "2020-09-16T15:03:32Z",
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 11,
"forks": 11,
"forks_count": 12,
"forks": 12,
"watchers": 46,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-04-29T16:04:12Z",
"updated_at": "2021-05-03T14:50:42Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2547,
"watchers_count": 2547,
"stargazers_count": 2548,
"watchers_count": 2548,
"forks_count": 741,
"forks": 741,
"watchers": 2547,
"watchers": 2548,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-1938",
"fork": false,
"created_at": "2020-02-20T16:32:52Z",
"updated_at": "2021-04-16T02:30:59Z",
"updated_at": "2021-05-03T14:25:53Z",
"pushed_at": "2020-02-25T02:04:16Z",
"stargazers_count": 225,
"watchers_count": 225,
"stargazers_count": 224,
"watchers_count": 224,
"forks_count": 95,
"forks": 95,
"watchers": 225,
"watchers": 224,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-01-12T10:11:42Z",
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 14,
"forks": 14,
"forks_count": 15,
"forks": 15,
"watchers": 26,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-03-02T00:27:47Z",
"stargazers_count": 118,
"watchers_count": 118,
"forks_count": 22,
"forks": 22,
"forks_count": 21,
"forks": 21,
"watchers": 118,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-03-03T03:52:10Z",
"stargazers_count": 56,
"watchers_count": 56,
"forks_count": 22,
"forks": 22,
"forks_count": 21,
"forks": 21,
"watchers": 56,
"score": 0
}

View file

@ -795,13 +795,13 @@
"description": "Proof-of-concept exploit for CVE-2021-26855 and CVE-2021-27065. Unauthenticated RCE in Exchange.",
"fork": false,
"created_at": "2021-03-24T01:12:48Z",
"updated_at": "2021-05-01T11:27:51Z",
"updated_at": "2021-05-03T14:39:43Z",
"pushed_at": "2021-03-24T01:25:05Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 1,
"forks": 1,
"watchers": 13,
"watchers": 14,
"score": 0
},
{

25
2021/CVE-2021-28482.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 363946586,
"name": "CVE-2021-28482-Exchange-POC",
"full_name": "Shadow0ps\/CVE-2021-28482-Exchange-POC",
"owner": {
"login": "Shadow0ps",
"id": 6516174,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6516174?v=4",
"html_url": "https:\/\/github.com\/Shadow0ps"
},
"html_url": "https:\/\/github.com\/Shadow0ps\/CVE-2021-28482-Exchange-POC",
"description": "POC from TestANull for CVE-2021-28482 on Exchange Server",
"fork": false,
"created_at": "2021-05-03T13:54:36Z",
"updated_at": "2021-05-03T14:29:51Z",
"pushed_at": "2021-05-03T14:29:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -335,13 +335,13 @@
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
"fork": false,
"created_at": "2021-01-30T03:22:04Z",
"updated_at": "2021-04-28T05:19:44Z",
"updated_at": "2021-05-03T10:42:10Z",
"pushed_at": "2021-02-08T03:42:50Z",
"stargazers_count": 384,
"watchers_count": 384,
"forks_count": 105,
"forks": 105,
"watchers": 384,
"stargazers_count": 385,
"watchers_count": 385,
"forks_count": 107,
"forks": 107,
"watchers": 385,
"score": 0
},
{
@ -657,13 +657,13 @@
"description": "Root shell PoC for CVE-2021-3156",
"fork": false,
"created_at": "2021-02-03T19:57:56Z",
"updated_at": "2021-04-19T14:02:05Z",
"updated_at": "2021-05-03T10:49:59Z",
"pushed_at": "2021-02-03T22:28:14Z",
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 19,
"forks": 19,
"watchers": 38,
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 20,
"forks": 20,
"watchers": 39,
"score": 0
},
{
@ -703,13 +703,13 @@
"description": null,
"fork": false,
"created_at": "2021-02-06T21:16:11Z",
"updated_at": "2021-03-27T00:25:00Z",
"updated_at": "2021-05-03T10:49:54Z",
"pushed_at": "2021-02-06T21:20:04Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
},
{
@ -933,13 +933,13 @@
"description": "Exploit generator for sudo CVE-2021-3156",
"fork": false,
"created_at": "2021-03-19T14:06:09Z",
"updated_at": "2021-03-25T23:52:42Z",
"updated_at": "2021-05-03T10:22:40Z",
"pushed_at": "2021-03-25T23:52:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{

View file

@ -40,8 +40,8 @@
"pushed_at": "2021-04-24T22:06:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"forks_count": 3,
"forks": 3,
"watchers": 0,
"score": 0
}

View file

@ -40,8 +40,8 @@
"pushed_at": "2021-04-24T22:08:16Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
}

View file

@ -40,8 +40,8 @@
"pushed_at": "2021-04-24T22:05:36Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 3,
"forks": 3,
"forks_count": 4,
"forks": 4,
"watchers": 6,
"score": 0
}

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-04-26T18:21:42Z",
"stargazers_count": 193,
"watchers_count": 193,
"forks_count": 33,
"forks": 33,
"forks_count": 34,
"forks": 34,
"watchers": 193,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "Ubuntu OverlayFS Local Privesc",
"fork": false,
"created_at": "2021-04-19T20:07:01Z",
"updated_at": "2021-05-01T07:27:43Z",
"updated_at": "2021-05-03T14:13:09Z",
"pushed_at": "2021-04-20T00:46:14Z",
"stargazers_count": 156,
"watchers_count": 156,
"stargazers_count": 157,
"watchers_count": 157,
"forks_count": 50,
"forks": 50,
"watchers": 156,
"watchers": 157,
"score": 0
},
{

View file

@ -861,6 +861,14 @@ Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is uni
- [ZephrFish/ExchangeRCE-CVE-2021-28480](https://github.com/ZephrFish/ExchangeRCE-CVE-2021-28480)
### CVE-2021-28482 (2021-04-13)
<code>
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-28480, CVE-2021-28481, CVE-2021-28483.
</code>
- [Shadow0ps/CVE-2021-28482-Exchange-POC](https://github.com/Shadow0ps/CVE-2021-28482-Exchange-POC)
### CVE-2021-29267 (2021-03-29)
<code>
@ -1226,6 +1234,7 @@ A remote code execution vulnerability exists in Microsoft Exchange software when
- [zyn3rgy/ecp_slap](https://github.com/zyn3rgy/ecp_slap)
- [SLSteff/CVE-2020-0688-Scanner](https://github.com/SLSteff/CVE-2020-0688-Scanner)
- [MrTiz9/CVE-2020-0688](https://github.com/MrTiz9/CVE-2020-0688)
- [ann0906/proxylogon](https://github.com/ann0906/proxylogon)
### CVE-2020-0708 (2020-02-11)