Auto Update 2021/05/08 00:12:40

This commit is contained in:
motikan2010-bot 2021-05-08 00:12:40 +09:00
parent 7fedf48edf
commit 9c26bd9353
26 changed files with 130 additions and 130 deletions

View file

@ -312,13 +312,13 @@
"description": "Test for SSL heartbeat vulnerability (CVE-2014-0160)",
"fork": false,
"created_at": "2014-04-09T15:59:14Z",
"updated_at": "2021-05-07T00:03:43Z",
"updated_at": "2021-05-07T12:29:19Z",
"pushed_at": "2014-07-10T21:17:22Z",
"stargazers_count": 131,
"watchers_count": 131,
"stargazers_count": 132,
"watchers_count": 132,
"forks_count": 77,
"forks": 77,
"watchers": 131,
"watchers": 132,
"score": 0
},
{

View file

@ -229,29 +229,6 @@
"watchers": 0,
"score": 0
},
{
"id": 30059704,
"name": "ghosttester",
"full_name": "JustDenisYT\/ghosttester",
"owner": {
"login": "JustDenisYT",
"id": 9379272,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9379272?v=4",
"html_url": "https:\/\/github.com\/JustDenisYT"
},
"html_url": "https:\/\/github.com\/JustDenisYT\/ghosttester",
"description": "Script to test vulnarability for CVE-2015-0235",
"fork": false,
"created_at": "2015-01-30T06:37:06Z",
"updated_at": "2015-02-04T08:03:37Z",
"pushed_at": "2015-02-04T08:03:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 30066365,
"name": "CVE-2015-0235",

View file

@ -13,13 +13,13 @@
"description": "EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)",
"fork": false,
"created_at": "2016-02-09T21:30:34Z",
"updated_at": "2021-03-10T15:40:43Z",
"updated_at": "2021-05-07T14:35:46Z",
"pushed_at": "2016-05-09T17:53:48Z",
"stargazers_count": 326,
"watchers_count": 326,
"stargazers_count": 325,
"watchers_count": 325,
"forks_count": 154,
"forks": 154,
"watchers": 326,
"watchers": 325,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
"fork": false,
"created_at": "2017-04-17T08:10:07Z",
"updated_at": "2021-05-04T22:18:58Z",
"updated_at": "2021-05-07T10:12:29Z",
"pushed_at": "2017-11-19T11:01:16Z",
"stargazers_count": 650,
"watchers_count": 650,
"stargazers_count": 651,
"watchers_count": 651,
"forks_count": 288,
"forks": 288,
"watchers": 650,
"watchers": 651,
"score": 0
},
{

View file

@ -358,13 +358,13 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2021-04-29T07:14:58Z",
"updated_at": "2021-05-07T11:34:01Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 272,
"watchers_count": 272,
"stargazers_count": 271,
"watchers_count": 271,
"forks_count": 98,
"forks": 98,
"watchers": 272,
"watchers": 271,
"score": 0
},
{

View file

@ -1581,8 +1581,8 @@
"pushed_at": "2020-06-14T18:43:51Z",
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 17,
"forks": 17,
"forks_count": 16,
"forks": 16,
"watchers": 40,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "Jenkins RCE Proof-of-Concept: SECURITY-1266 \/ CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)",
"fork": false,
"created_at": "2019-02-15T05:59:24Z",
"updated_at": "2021-04-26T08:18:02Z",
"updated_at": "2021-05-07T14:37:21Z",
"pushed_at": "2019-04-01T13:19:49Z",
"stargazers_count": 274,
"watchers_count": 274,
"stargazers_count": 275,
"watchers_count": 275,
"forks_count": 84,
"forks": 84,
"watchers": 274,
"watchers": 275,
"score": 0
},
{

View file

@ -40,8 +40,8 @@
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2553,
"watchers_count": 2553,
"forks_count": 744,
"forks": 744,
"forks_count": 745,
"forks": 745,
"watchers": 2553,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2021-04-29T07:14:58Z",
"updated_at": "2021-05-07T11:34:01Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 272,
"watchers_count": 272,
"stargazers_count": 271,
"watchers_count": 271,
"forks_count": 98,
"forks": 98,
"watchers": 272,
"watchers": 271,
"score": 0
},
{
@ -312,13 +312,13 @@
"description": "Weblogic CVE-2019-2725 CVE-2019-2729 Getshell 命令执行 ",
"fork": false,
"created_at": "2019-06-24T08:33:07Z",
"updated_at": "2021-01-26T23:21:20Z",
"updated_at": "2021-05-07T09:56:44Z",
"pushed_at": "2019-07-15T06:03:15Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 26,
"forks": 26,
"watchers": 60,
"watchers": 61,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Exploit for CVE-2019-9810 Firefox on Windows 64-bit.",
"fork": false,
"created_at": "2019-05-05T17:19:02Z",
"updated_at": "2021-04-08T08:04:36Z",
"updated_at": "2021-05-07T09:13:47Z",
"pushed_at": "2019-12-28T18:25:10Z",
"stargazers_count": 201,
"watchers_count": 201,
"stargazers_count": 202,
"watchers_count": 202,
"forks_count": 56,
"forks": 56,
"watchers": 201,
"watchers": 202,
"score": 0
}
]

View file

@ -864,13 +864,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2021-04-30T20:33:17Z",
"updated_at": "2021-05-07T14:33:28Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1114,
"watchers_count": 1114,
"stargazers_count": 1115,
"watchers_count": 1115,
"forks_count": 356,
"forks": 356,
"watchers": 1114,
"watchers": 1115,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2021-05-06T20:53:38Z",
"updated_at": "2021-05-07T13:22:42Z",
"pushed_at": "2020-10-21T12:10:28Z",
"stargazers_count": 1276,
"watchers_count": 1276,
"stargazers_count": 1275,
"watchers_count": 1275,
"forks_count": 293,
"forks": 293,
"watchers": 1276,
"watchers": 1275,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2553,
"watchers_count": 2553,
"forks_count": 744,
"forks": 744,
"forks_count": 745,
"forks": 745,
"watchers": 2553,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-01-24T09:05:40Z",
"stargazers_count": 68,
"watchers_count": 68,
"forks_count": 31,
"forks": 31,
"forks_count": 32,
"forks": 32,
"watchers": 68,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "Demo exploit code for CVE-2020-27904, a tfp0 bug.",
"fork": false,
"created_at": "2021-03-31T09:11:29Z",
"updated_at": "2021-05-07T08:37:06Z",
"updated_at": "2021-05-07T14:49:09Z",
"pushed_at": "2021-04-29T07:14:33Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 2,
"forks": 2,
"watchers": 9,
"watchers": 18,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-5902",
"fork": false,
"created_at": "2020-07-04T14:12:57Z",
"updated_at": "2021-03-16T07:08:42Z",
"updated_at": "2021-05-07T14:23:07Z",
"pushed_at": "2020-07-04T14:21:27Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 1,
"forks": 1,
"watchers": 10,
"watchers": 9,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-07-15T04:59:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2021-02-10T14:38:05Z",
"updated_at": "2021-04-27T07:29:37Z",
"updated_at": "2021-05-07T11:19:58Z",
"pushed_at": "2021-02-10T14:39:04Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 4,
"forks": 4,
"watchers": 22,
"watchers": 23,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "🐱‍💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...",
"fork": false,
"created_at": "2021-03-22T11:53:57Z",
"updated_at": "2021-05-05T17:33:33Z",
"updated_at": "2021-05-07T10:39:44Z",
"pushed_at": "2021-03-22T18:24:20Z",
"stargazers_count": 111,
"watchers_count": 111,
"stargazers_count": 112,
"watchers_count": 112,
"forks_count": 15,
"forks": 15,
"watchers": 111,
"watchers": 112,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE 2021-21315 PoC",
"fork": false,
"created_at": "2021-03-01T18:52:41Z",
"updated_at": "2021-05-05T22:00:07Z",
"updated_at": "2021-05-07T15:02:07Z",
"pushed_at": "2021-05-05T22:00:05Z",
"stargazers_count": 118,
"watchers_count": 118,
"stargazers_count": 119,
"watchers_count": 119,
"forks_count": 21,
"forks": 21,
"watchers": 118,
"watchers": 119,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-05-04T15:32:18Z",
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 11,
"forks": 11,
"forks_count": 12,
"forks": 12,
"watchers": 26,
"score": 0
},

View file

@ -21,5 +21,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 365180712,
"name": "CVE-2021-30461",
"full_name": "Vulnmachines\/CVE-2021-30461",
"owner": {
"login": "Vulnmachines",
"id": 79006904,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
"html_url": "https:\/\/github.com\/Vulnmachines"
},
"html_url": "https:\/\/github.com\/Vulnmachines\/CVE-2021-30461",
"description": "VOIP RCE",
"fork": false,
"created_at": "2021-05-07T09:22:01Z",
"updated_at": "2021-05-07T13:24:21Z",
"pushed_at": "2021-05-07T09:23:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -86,8 +86,8 @@
"pushed_at": "2021-01-27T15:19:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 24,
"forks": 24,
"forks_count": 25,
"forks": 25,
"watchers": 0,
"score": 0
},
@ -137,29 +137,6 @@
"watchers": 4,
"score": 0
},
{
"id": 333619288,
"name": "CVE-2021-3156-Baron-Samedit",
"full_name": "kernelzeroday\/CVE-2021-3156-Baron-Samedit",
"owner": {
"login": "kernelzeroday",
"id": 11334159,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11334159?v=4",
"html_url": "https:\/\/github.com\/kernelzeroday"
},
"html_url": "https:\/\/github.com\/kernelzeroday\/CVE-2021-3156-Baron-Samedit",
"description": "1day research effort",
"fork": false,
"created_at": "2021-01-28T02:13:49Z",
"updated_at": "2021-03-14T07:05:52Z",
"pushed_at": "2021-01-29T03:21:13Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 5,
"forks": 5,
"watchers": 19,
"score": 0
},
{
"id": 333620703,
"name": "cve-2021-3156",
@ -335,13 +312,13 @@
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
"fork": false,
"created_at": "2021-01-30T03:22:04Z",
"updated_at": "2021-05-05T23:01:49Z",
"updated_at": "2021-05-07T14:23:08Z",
"pushed_at": "2021-02-08T03:42:50Z",
"stargazers_count": 388,
"watchers_count": 388,
"stargazers_count": 387,
"watchers_count": 387,
"forks_count": 108,
"forks": 108,
"watchers": 388,
"watchers": 387,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution.",
"fork": false,
"created_at": "2021-05-04T17:15:58Z",
"updated_at": "2021-05-07T08:50:02Z",
"updated_at": "2021-05-07T14:54:50Z",
"pushed_at": "2021-05-06T15:53:18Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 1,
"forks": 1,
"watchers": 11,
"watchers": 12,
"score": 0
}
]

View file

@ -90,5 +90,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 365269420,
"name": "CVE-2021-3493",
"full_name": "Ishan3011\/CVE-2021-3493",
"owner": {
"login": "Ishan3011",
"id": 68255653,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68255653?v=4",
"html_url": "https:\/\/github.com\/Ishan3011"
},
"html_url": "https:\/\/github.com\/Ishan3011\/CVE-2021-3493",
"description": null,
"fork": false,
"created_at": "2021-05-07T15:01:25Z",
"updated_at": "2021-05-07T15:16:25Z",
"pushed_at": "2021-05-07T15:16:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -143,7 +143,6 @@ Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based
- [jokerTPR2004/CVE-2021-3156](https://github.com/jokerTPR2004/CVE-2021-3156)
- [ymrsmns/CVE-2021-3156](https://github.com/ymrsmns/CVE-2021-3156)
- [elbee-cyber/CVE-2021-3156-PATCHER](https://github.com/elbee-cyber/CVE-2021-3156-PATCHER)
- [kernelzeroday/CVE-2021-3156-Baron-Samedit](https://github.com/kernelzeroday/CVE-2021-3156-Baron-Samedit)
- [yaunsky/cve-2021-3156](https://github.com/yaunsky/cve-2021-3156)
- [H4ckForJob/cve-2021-3156](https://github.com/H4ckForJob/cve-2021-3156)
- [baka9moe/CVE-2021-3156-Exp](https://github.com/baka9moe/CVE-2021-3156-Exp)
@ -277,6 +276,7 @@ The overlayfs implementation in the linux kernel did not properly validate with
- [oneoy/CVE-2021-3493](https://github.com/oneoy/CVE-2021-3493)
- [Abdennour-py/CVE-2021-3493](https://github.com/Abdennour-py/CVE-2021-3493)
- [AmIAHuman/OverlayFS-CVE-2021-3493](https://github.com/AmIAHuman/OverlayFS-CVE-2021-3493)
- [Ishan3011/CVE-2021-3493](https://github.com/Ishan3011/CVE-2021-3493)
### CVE-2021-6857
- [ZiHeny/CVE-2021-6857](https://github.com/ZiHeny/CVE-2021-6857)
@ -957,6 +957,7 @@ Composr 10.0.36 allows XSS in an XML script.
### CVE-2021-30461
- [daedalus/CVE-2021-30461](https://github.com/daedalus/CVE-2021-30461)
- [Vulnmachines/CVE-2021-30461](https://github.com/Vulnmachines/CVE-2021-30461)
### CVE-2021-30481 (2021-04-10)
@ -15575,7 +15576,6 @@ Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2
- [nickanderson/cfengine-CVE_2015_0235](https://github.com/nickanderson/cfengine-CVE_2015_0235)
- [koudaiii-archives/cookbook-update-glibc](https://github.com/koudaiii-archives/cookbook-update-glibc)
- [F88/ghostbusters15](https://github.com/F88/ghostbusters15)
- [JustDenisYT/ghosttester](https://github.com/JustDenisYT/ghosttester)
- [tobyzxj/CVE-2015-0235](https://github.com/tobyzxj/CVE-2015-0235)
- [makelinux/CVE-2015-0235-workaround](https://github.com/makelinux/CVE-2015-0235-workaround)
- [arm13/ghost_exploit](https://github.com/arm13/ghost_exploit)