Auto Update 2021/04/14 00:11:18

This commit is contained in:
motikan2010-bot 2021-04-14 00:11:18 +09:00
parent edd375ab29
commit ab2c21912d
25 changed files with 139 additions and 134 deletions

View file

@ -13,13 +13,13 @@
"description": "This was converted from a metasploit module as an exercise for OSCP studying",
"fork": false,
"created_at": "2020-08-05T02:54:10Z",
"updated_at": "2021-04-08T15:43:22Z",
"updated_at": "2021-04-13T13:32:01Z",
"pushed_at": "2020-10-30T19:56:54Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "A checker (site and tool) for CVE-2014-0160",
"fork": false,
"created_at": "2014-04-07T23:03:09Z",
"updated_at": "2021-04-11T15:02:16Z",
"updated_at": "2021-04-13T11:21:14Z",
"pushed_at": "2021-02-24T09:17:24Z",
"stargazers_count": 2254,
"watchers_count": 2254,
"stargazers_count": 2255,
"watchers_count": 2255,
"forks_count": 485,
"forks": 485,
"watchers": 2254,
"watchers": 2255,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "A code demonstrating CVE-2018-0886",
"fork": false,
"created_at": "2018-04-02T12:52:07Z",
"updated_at": "2021-03-05T13:55:16Z",
"updated_at": "2021-04-13T09:35:15Z",
"pushed_at": "2020-08-14T16:33:44Z",
"stargazers_count": 248,
"watchers_count": 248,
"stargazers_count": 249,
"watchers_count": 249,
"forks_count": 61,
"forks": 61,
"watchers": 248,
"watchers": 249,
"score": 0
}
]

View file

@ -44,28 +44,5 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 356029378,
"name": "CVE-2018-1133_POC",
"full_name": "m1gnus\/CVE-2018-1133_POC",
"owner": {
"login": "m1gnus",
"id": 50372764,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50372764?v=4",
"html_url": "https:\/\/github.com\/m1gnus"
},
"html_url": "https:\/\/github.com\/m1gnus\/CVE-2018-1133_POC",
"description": null,
"fork": false,
"created_at": "2021-04-08T19:41:57Z",
"updated_at": "2021-04-09T09:57:19Z",
"pushed_at": "2021-04-09T09:57:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Apache Solr DataImport Handler RCE",
"fork": false,
"created_at": "2019-08-09T06:27:39Z",
"updated_at": "2021-02-19T09:18:13Z",
"updated_at": "2021-04-13T13:21:37Z",
"pushed_at": "2019-08-12T02:23:38Z",
"stargazers_count": 75,
"watchers_count": 75,
"stargazers_count": 76,
"watchers_count": 76,
"forks_count": 39,
"forks": 39,
"watchers": 75,
"watchers": 76,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2021-04-10T20:06:38Z",
"updated_at": "2021-04-13T12:18:16Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1649,
"watchers_count": 1649,
"stargazers_count": 1650,
"watchers_count": 1650,
"forks_count": 251,
"forks": 251,
"watchers": 1649,
"watchers": 1650,
"score": 0
},
{

View file

@ -40,8 +40,8 @@
"pushed_at": "2019-02-19T11:45:13Z",
"stargazers_count": 494,
"watchers_count": 494,
"forks_count": 120,
"forks": 120,
"forks_count": 121,
"forks": 121,
"watchers": 494,
"score": 0
},

View file

@ -132,8 +132,8 @@
"pushed_at": "2020-01-20T23:33:19Z",
"stargazers_count": 856,
"watchers_count": 856,
"forks_count": 222,
"forks": 222,
"forks_count": 223,
"forks": 223,
"watchers": 856,
"score": 0
},

View file

@ -197,13 +197,13 @@
"description": "Exploit and detect tools for CVE-2020-0688",
"fork": false,
"created_at": "2020-03-01T12:57:32Z",
"updated_at": "2021-04-11T06:14:30Z",
"updated_at": "2021-04-13T10:28:37Z",
"pushed_at": "2020-03-21T05:44:48Z",
"stargazers_count": 279,
"watchers_count": 279,
"stargazers_count": 280,
"watchers_count": 280,
"forks_count": 71,
"forks": 71,
"watchers": 279,
"watchers": 280,
"score": 0
},
{

View file

@ -155,8 +155,8 @@
"pushed_at": "2020-09-16T14:05:27Z",
"stargazers_count": 147,
"watchers_count": 147,
"forks_count": 36,
"forks": 36,
"forks_count": 37,
"forks": 37,
"watchers": 147,
"score": 0
},

View file

@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-04-13T08:09:12Z",
"updated_at": "2021-04-13T14:27:31Z",
"pushed_at": "2021-04-11T03:25:34Z",
"stargazers_count": 552,
"watchers_count": 552,
"forks_count": 139,
"forks": 139,
"watchers": 552,
"stargazers_count": 554,
"watchers_count": 554,
"forks_count": 141,
"forks": 141,
"watchers": 554,
"score": 0
}
]

View file

@ -182,5 +182,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 357530624,
"name": "CVE-2020-17519",
"full_name": "givemefivw\/CVE-2020-17519",
"owner": {
"login": "givemefivw",
"id": 65514141,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65514141?v=4",
"html_url": "https:\/\/github.com\/givemefivw"
},
"html_url": "https:\/\/github.com\/givemefivw\/CVE-2020-17519",
"description": "CVE-2020-17519 Cheetah",
"fork": false,
"created_at": "2021-04-13T11:38:18Z",
"updated_at": "2021-04-13T11:44:17Z",
"pushed_at": "2021-04-13T11:44:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞一键注册蚁剑filter内存shell",
"fork": false,
"created_at": "2020-08-19T03:34:06Z",
"updated_at": "2021-04-07T09:27:19Z",
"updated_at": "2021-04-13T14:46:13Z",
"pushed_at": "2020-08-25T03:17:32Z",
"stargazers_count": 235,
"watchers_count": 235,
"stargazers_count": 236,
"watchers_count": 236,
"forks_count": 37,
"forks": 37,
"watchers": 235,
"watchers": 236,
"score": 0
},
{

View file

@ -197,13 +197,13 @@
"description": "exploit code for F5-Big-IP (CVE-2020-5902)",
"fork": false,
"created_at": "2020-07-06T01:12:23Z",
"updated_at": "2021-03-18T16:48:45Z",
"updated_at": "2021-04-13T11:35:32Z",
"pushed_at": "2020-07-06T01:36:32Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 11,
"forks": 11,
"watchers": 23,
"watchers": 24,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)",
"fork": false,
"created_at": "2020-07-15T15:20:09Z",
"updated_at": "2021-04-12T14:38:50Z",
"updated_at": "2021-04-13T09:42:14Z",
"pushed_at": "2020-09-29T17:20:12Z",
"stargazers_count": 168,
"watchers_count": 168,
"stargazers_count": 169,
"watchers_count": 169,
"forks_count": 54,
"forks": 54,
"watchers": 168,
"watchers": 169,
"score": 0
},
{

View file

@ -1,25 +0,0 @@
[
{
"id": 357488998,
"name": "CVE-2021-100000",
"full_name": "Henry4E36\/CVE-2021-100000",
"owner": {
"login": "Henry4E36",
"id": 41940481,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41940481?v=4",
"html_url": "https:\/\/github.com\/Henry4E36"
},
"html_url": "https:\/\/github.com\/Henry4E36\/CVE-2021-100000",
"description": null,
"fork": false,
"created_at": "2021-04-13T09:02:14Z",
"updated_at": "2021-04-13T09:02:24Z",
"pushed_at": "2021-04-13T09:02:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2021-02-24T09:56:21Z",
"updated_at": "2021-04-09T08:20:25Z",
"updated_at": "2021-04-13T09:23:11Z",
"pushed_at": "2021-03-01T02:10:44Z",
"stargazers_count": 91,
"watchers_count": 91,
"stargazers_count": 92,
"watchers_count": 92,
"forks_count": 58,
"forks": 58,
"watchers": 91,
"watchers": 92,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2021-02-15T14:41:25Z",
"updated_at": "2021-04-04T22:20:39Z",
"updated_at": "2021-04-13T09:33:54Z",
"pushed_at": "2021-02-15T15:11:00Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 52,
"watchers_count": 52,
"forks_count": 13,
"forks": 13,
"watchers": 51,
"watchers": 52,
"score": 0
}
]

View file

@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-04-13T08:09:12Z",
"updated_at": "2021-04-13T14:27:31Z",
"pushed_at": "2021-04-11T03:25:34Z",
"stargazers_count": 552,
"watchers_count": 552,
"forks_count": 139,
"forks": 139,
"watchers": 552,
"stargazers_count": 554,
"watchers_count": 554,
"forks_count": 141,
"forks": 141,
"watchers": 554,
"score": 0
}
]

View file

@ -220,13 +220,13 @@
"description": "CVE-2021-26855 exp",
"fork": false,
"created_at": "2021-03-08T08:39:05Z",
"updated_at": "2021-04-08T09:24:45Z",
"updated_at": "2021-04-13T14:33:07Z",
"pushed_at": "2021-03-08T08:09:01Z",
"stargazers_count": 78,
"watchers_count": 78,
"stargazers_count": 79,
"watchers_count": 79,
"forks_count": 67,
"forks": 67,
"watchers": 78,
"watchers": 79,
"score": 0
},
{
@ -454,8 +454,8 @@
"pushed_at": "2021-03-11T20:58:08Z",
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 27,
"forks": 27,
"forks_count": 28,
"forks": 28,
"watchers": 45,
"score": 0
},
@ -546,8 +546,8 @@
"pushed_at": "2021-03-14T23:03:12Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 6,
"forks": 6,
"forks_count": 7,
"forks": 7,
"watchers": 5,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.",
"fork": false,
"created_at": "2020-12-31T16:30:02Z",
"updated_at": "2021-04-09T09:31:39Z",
"updated_at": "2021-04-13T13:30:17Z",
"pushed_at": "2021-03-29T12:33:38Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 13,
"forks": 13,
"watchers": 54,
"watchers": 55,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Trigger-only for CVE-2021-29627",
"fork": false,
"created_at": "2021-04-12T07:51:03Z",
"updated_at": "2021-04-13T06:28:09Z",
"updated_at": "2021-04-13T11:51:21Z",
"pushed_at": "2021-04-12T07:51:40Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,
"forks": 3,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

25
2021/CVE-2021-3138.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 329132844,
"name": "CVE-2021-3138",
"full_name": "Mesh3l911\/CVE-2021-3138",
"owner": {
"login": "Mesh3l911",
"id": 74990355,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74990355?v=4",
"html_url": "https:\/\/github.com\/Mesh3l911"
},
"html_url": "https:\/\/github.com\/Mesh3l911\/CVE-2021-3138",
"description": "Disource POC",
"fork": false,
"created_at": "2021-01-12T22:50:27Z",
"updated_at": "2021-04-13T14:26:49Z",
"pushed_at": "2021-04-11T23:12:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -381,13 +381,13 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2021-04-12T06:19:27Z",
"updated_at": "2021-04-13T11:48:19Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 682,
"watchers_count": 682,
"stargazers_count": 684,
"watchers_count": 684,
"forks_count": 190,
"forks": 190,
"watchers": 682,
"watchers": 684,
"score": 0
},
{

View file

@ -120,6 +120,14 @@ The Web server in 1C:Enterprise 8 before 8.3.17.1851 sends base64 encoded creden
- [jet-pentest/CVE-2021-3131](https://github.com/jet-pentest/CVE-2021-3131)
### CVE-2021-3138 (2021-01-13)
<code>
In Discourse 2.7.0 through beta1, a rate-limit bypass leads to a bypass of the 2FA requirement for certain forms.
</code>
- [Mesh3l911/CVE-2021-3138](https://github.com/Mesh3l911/CVE-2021-3138)
### CVE-2021-3156 (2021-01-26)
<code>
@ -798,9 +806,6 @@ Composr 10.0.36 allows XSS in an XML script.
- [orionhridoy/CVE-2021-30150](https://github.com/orionhridoy/CVE-2021-30150)
### CVE-2021-100000
- [Henry4E36/CVE-2021-100000](https://github.com/Henry4E36/CVE-2021-100000)
## 2020
### CVE-2020-0001 (2020-01-08)
@ -3941,6 +3946,7 @@ A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as
- [radbsie/CVE-2020-17519-Exp](https://github.com/radbsie/CVE-2020-17519-Exp)
- [yaunsky/CVE-2020-17519-Apache-Flink](https://github.com/yaunsky/CVE-2020-17519-Apache-Flink)
- [Osyanina/westone-CVE-2020-17519-scanner](https://github.com/Osyanina/westone-CVE-2020-17519-scanner)
- [givemefivw/CVE-2020-17519](https://github.com/givemefivw/CVE-2020-17519)
### CVE-2020-17523 (2021-02-03)
@ -8774,7 +8780,6 @@ An issue was discovered in Moodle 3.x. A Teacher creating a Calculated question
- [darrynten/MoodleExploit](https://github.com/darrynten/MoodleExploit)
- [Feidao-fei/MOODLE-3.X-Remote-Code-Execution](https://github.com/Feidao-fei/MOODLE-3.X-Remote-Code-Execution)
- [m1gnus/CVE-2018-1133_POC](https://github.com/m1gnus/CVE-2018-1133_POC)
### CVE-2018-1160 (2018-12-20)