Auto Update 2021/03/19 12:10:32

This commit is contained in:
motikan2010-bot 2021-03-19 12:10:32 +09:00
parent 2cd3242c13
commit affdc94564
36 changed files with 243 additions and 229 deletions

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-18T09:14:01Z",
"updated_at": "2021-03-19T01:29:39Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 958,
"watchers_count": 958,
"stargazers_count": 959,
"watchers_count": 959,
"forks_count": 223,
"forks": 223,
"watchers": 958,
"watchers": 959,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-18T09:14:01Z",
"updated_at": "2021-03-19T01:29:39Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 958,
"watchers_count": 958,
"stargazers_count": 959,
"watchers_count": 959,
"forks_count": 223,
"forks": 223,
"watchers": 958,
"watchers": 959,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-18T09:14:01Z",
"updated_at": "2021-03-19T01:29:39Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 958,
"watchers_count": 958,
"stargazers_count": 959,
"watchers_count": 959,
"forks_count": 223,
"forks": 223,
"watchers": 958,
"watchers": 959,
"score": 0
}
]

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-18T09:14:01Z",
"updated_at": "2021-03-19T01:29:39Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 958,
"watchers_count": 958,
"stargazers_count": 959,
"watchers_count": 959,
"forks_count": 223,
"forks": 223,
"watchers": 958,
"watchers": 959,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "CVE-2018-8581",
"fork": false,
"created_at": "2019-01-24T06:08:23Z",
"updated_at": "2021-03-15T09:54:03Z",
"updated_at": "2021-03-19T02:20:45Z",
"pushed_at": "2019-06-21T11:29:41Z",
"stargazers_count": 313,
"watchers_count": 313,
"stargazers_count": 314,
"watchers_count": 314,
"forks_count": 67,
"forks": 67,
"watchers": 313,
"watchers": 314,
"score": 0
}
]

View file

@ -1,27 +1,4 @@
[
{
"id": 176290079,
"name": "CVE-2019-0193",
"full_name": "xConsoIe\/CVE-2019-0193",
"owner": {
"login": "xConsoIe",
"id": 48456709,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48456709?v=4",
"html_url": "https:\/\/github.com\/xConsoIe"
},
"html_url": "https:\/\/github.com\/xConsoIe\/CVE-2019-0193",
"description": null,
"fork": false,
"created_at": "2019-03-18T13:18:01Z",
"updated_at": "2020-11-29T10:18:07Z",
"pushed_at": "2019-03-18T13:22:48Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 7,
"forks": 7,
"watchers": 8,
"score": 0
},
{
"id": 201405406,
"name": "CVE-2019-0193",

View file

@ -1857,8 +1857,8 @@
"pushed_at": "2019-11-19T02:43:38Z",
"stargazers_count": 286,
"watchers_count": 286,
"forks_count": 91,
"forks": 91,
"forks_count": 90,
"forks": 90,
"watchers": 286,
"score": 0
},

View file

@ -67,5 +67,28 @@
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 349285752,
"name": "CVE-2019-1003000-2018-1000861-jenkins-rce",
"full_name": "PetrusViet\/CVE-2019-1003000-2018-1000861-jenkins-rce",
"owner": {
"login": "PetrusViet",
"id": 63145078,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63145078?v=4",
"html_url": "https:\/\/github.com\/PetrusViet"
},
"html_url": "https:\/\/github.com\/PetrusViet\/CVE-2019-1003000-2018-1000861-jenkins-rce",
"description": null,
"fork": false,
"created_at": "2021-03-19T03:12:00Z",
"updated_at": "2021-03-19T03:12:03Z",
"pushed_at": "2021-03-19T03:12:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "A standalone POC for CVE-2019-12840",
"fork": false,
"created_at": "2019-11-09T17:48:39Z",
"updated_at": "2020-05-18T15:37:25Z",
"updated_at": "2021-03-19T02:36:25Z",
"pushed_at": "2019-11-10T13:26:41Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-03-18T16:08:05Z",
"updated_at": "2021-03-19T01:29:02Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2403,
"watchers_count": 2403,
"stargazers_count": 2404,
"watchers_count": 2404,
"forks_count": 693,
"forks": 693,
"watchers": 2403,
"watchers": 2404,
"score": 0
},
{

View file

@ -60,7 +60,7 @@
"fork": false,
"created_at": "2020-01-18T13:32:21Z",
"updated_at": "2020-03-30T03:21:39Z",
"pushed_at": "2020-06-05T20:32:20Z",
"pushed_at": "2021-03-18T22:48:13Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 4,

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-18T09:14:01Z",
"updated_at": "2021-03-19T01:29:39Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 958,
"watchers_count": 958,
"stargazers_count": 959,
"watchers_count": 959,
"forks_count": 223,
"forks": 223,
"watchers": 958,
"watchers": 959,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "CVE-2019-2729 Exploit Script",
"fork": false,
"created_at": "2020-02-19T03:49:51Z",
"updated_at": "2021-03-17T03:31:59Z",
"updated_at": "2021-03-19T02:40:30Z",
"pushed_at": "2020-02-19T08:48:02Z",
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 7,
"forks": 7,
"watchers": 23,
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 6,
"forks": 6,
"watchers": 24,
"score": 0
}
]

25
2019/CVE-2019-3403.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 349235683,
"name": "CVE-2019-3403",
"full_name": "davidmckennirey\/CVE-2019-3403",
"owner": {
"login": "davidmckennirey",
"id": 26097321,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26097321?v=4",
"html_url": "https:\/\/github.com\/davidmckennirey"
},
"html_url": "https:\/\/github.com\/davidmckennirey\/CVE-2019-3403",
"description": "A simple python3 exploit for CVE-2019-3403",
"fork": false,
"created_at": "2021-03-18T22:36:58Z",
"updated_at": "2021-03-18T22:37:00Z",
"pushed_at": "2021-03-18T22:36:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,27 +1,4 @@
[
{
"id": 172448763,
"name": "WordPress_4.9.8_RCE_POC",
"full_name": "brianwrf\/WordPress_4.9.8_RCE_POC",
"owner": {
"login": "brianwrf",
"id": 8141813,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8141813?v=4",
"html_url": "https:\/\/github.com\/brianwrf"
},
"html_url": "https:\/\/github.com\/brianwrf\/WordPress_4.9.8_RCE_POC",
"description": "A simple PoC for WordPress RCE (author priviledge), refer to CVE-2019-8942 and CVE-2019-8943.",
"fork": false,
"created_at": "2019-02-25T06:38:15Z",
"updated_at": "2020-12-30T03:48:48Z",
"pushed_at": "2019-03-18T01:20:52Z",
"stargazers_count": 57,
"watchers_count": 57,
"forks_count": 19,
"forks": 19,
"watchers": 57,
"score": 0
},
{
"id": 184548123,
"name": "CVE-2019-8942",

View file

@ -13,13 +13,13 @@
"description": "Exploits for Android Binder bug CVE-2020-0041",
"fork": false,
"created_at": "2020-03-31T17:53:57Z",
"updated_at": "2021-03-07T08:26:37Z",
"updated_at": "2021-03-19T00:59:43Z",
"pushed_at": "2020-04-08T08:55:30Z",
"stargazers_count": 151,
"watchers_count": 151,
"stargazers_count": 152,
"watchers_count": 152,
"forks_count": 49,
"forks": 49,
"watchers": 151,
"watchers": 152,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Scanning for Remote Desktop Gateways (Potentially unpatched CVE-2020-0609 and CVE-2020-0610)",
"fork": false,
"created_at": "2020-01-21T21:33:17Z",
"updated_at": "2021-01-09T11:46:42Z",
"updated_at": "2021-03-19T03:03:06Z",
"pushed_at": "2020-07-05T17:27:24Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 7,
"forks": 7,
"watchers": 36,
"watchers": 37,
"score": 0
}
]

View file

@ -22,6 +22,29 @@
"watchers": 266,
"score": 0
},
{
"id": 243531424,
"name": "CVE-2020-0688_EXP",
"full_name": "Yt1g3r\/CVE-2020-0688_EXP",
"owner": {
"login": "Yt1g3r",
"id": 12625147,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12625147?v=4",
"html_url": "https:\/\/github.com\/Yt1g3r"
},
"html_url": "https:\/\/github.com\/Yt1g3r\/CVE-2020-0688_EXP",
"description": "CVE-2020-0688_EXP Auto trigger payload & encrypt method",
"fork": false,
"created_at": "2020-02-27T13:53:46Z",
"updated_at": "2021-03-14T05:07:44Z",
"pushed_at": "2020-02-27T15:57:53Z",
"stargazers_count": 134,
"watchers_count": 134,
"forks_count": 58,
"forks": 58,
"watchers": 134,
"score": 0
},
{
"id": 243640997,
"name": "CVE-2020-0688",

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code",
"fork": false,
"created_at": "2020-09-03T14:45:51Z",
"updated_at": "2021-01-08T01:46:37Z",
"updated_at": "2021-03-19T02:06:23Z",
"pushed_at": "2020-09-08T20:01:05Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 7,
"forks": 7,
"watchers": 28,
"watchers": 27,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-03-18T16:08:05Z",
"updated_at": "2021-03-19T01:29:02Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2403,
"watchers_count": 2403,
"stargazers_count": 2404,
"watchers_count": 2404,
"forks_count": 693,
"forks": 693,
"watchers": 2403,
"watchers": 2404,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "CVE-202014882、CVE-202014883",
"fork": false,
"created_at": "2020-10-28T11:43:37Z",
"updated_at": "2021-03-12T10:10:35Z",
"updated_at": "2021-03-19T00:13:14Z",
"pushed_at": "2020-11-16T04:23:09Z",
"stargazers_count": 214,
"watchers_count": 214,
"stargazers_count": 216,
"watchers_count": 216,
"forks_count": 43,
"forks": 43,
"watchers": 214,
"watchers": 216,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "CVE-202014882 by Jang",
"fork": false,
"created_at": "2020-10-28T21:28:12Z",
"updated_at": "2021-02-24T06:37:09Z",
"updated_at": "2021-03-18T23:50:58Z",
"pushed_at": "2020-10-29T03:57:09Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 19,
"forks": 19,
"watchers": 27,
"watchers": 28,
"score": 0
},
{
@ -128,13 +128,13 @@
"description": "Bash script to exploit the Oracle's Weblogic Unauthenticated Remote Command Execution - CVE-2020-14882",
"fork": false,
"created_at": "2020-10-29T13:53:31Z",
"updated_at": "2020-10-31T13:03:28Z",
"updated_at": "2021-03-18T23:46:12Z",
"pushed_at": "2020-10-31T13:03:26Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
},
{
@ -220,13 +220,13 @@
"description": "CVE-2020-14882批量验证工具。",
"fork": false,
"created_at": "2020-10-31T01:43:54Z",
"updated_at": "2020-12-01T05:05:26Z",
"updated_at": "2021-03-18T23:37:34Z",
"pushed_at": "2020-12-01T05:05:24Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 1,
"forks": 1,
"watchers": 11,
"watchers": 12,
"score": 0
},
{
@ -243,13 +243,13 @@
"description": "(CVE-2020-14882) Oracle Weblogic Unauthorized bypass RCE test script",
"fork": false,
"created_at": "2020-11-01T13:12:27Z",
"updated_at": "2020-11-24T16:16:12Z",
"updated_at": "2021-03-18T23:50:26Z",
"pushed_at": "2020-11-01T13:56:48Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0
},
{
@ -289,13 +289,13 @@
"description": "CVE-2020-14882 detection script",
"fork": false,
"created_at": "2020-11-03T11:34:38Z",
"updated_at": "2020-11-03T11:42:04Z",
"updated_at": "2021-03-18T23:48:22Z",
"pushed_at": "2020-11-03T11:34:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{
@ -496,13 +496,13 @@
"description": "CodeTest信息收集和漏洞利用工具可在进行渗透测试之时方便利用相关信息收集脚本进行信息的获取和验证工作漏洞利用模块可选择需要测试的漏洞模块或者选择所有模块测试包含CVE-2020-14882, CVE-2020-2555等可自己收集脚本后按照模板进行修改。",
"fork": false,
"created_at": "2020-12-29T09:11:31Z",
"updated_at": "2021-01-25T08:54:10Z",
"updated_at": "2021-03-18T23:43:08Z",
"pushed_at": "2021-01-25T07:54:23Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 6,
"forks": 6,
"watchers": 22,
"watchers": 23,
"score": 0
},
{

View file

@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-03-18T20:54:07Z",
"pushed_at": "2021-03-18T14:11:05Z",
"stargazers_count": 72,
"watchers_count": 72,
"forks_count": 24,
"forks": 24,
"watchers": 72,
"updated_at": "2021-03-19T03:02:24Z",
"pushed_at": "2021-03-19T02:03:46Z",
"stargazers_count": 112,
"watchers_count": 112,
"forks_count": 28,
"forks": 28,
"watchers": 112,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": "HoneyPoC 2.0: Proof-of-Concept (PoC) script to exploit IPv6 (CVE-2020-16898).",
"fork": false,
"created_at": "2020-10-14T14:42:52Z",
"updated_at": "2021-03-12T03:42:43Z",
"updated_at": "2021-03-19T01:24:50Z",
"pushed_at": "2020-10-14T16:56:04Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 6,
"forks": 6,
"watchers": 19,
"watchers": 18,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability",
"fork": false,
"created_at": "2021-03-18T16:13:23Z",
"updated_at": "2021-03-18T16:42:37Z",
"updated_at": "2021-03-19T02:27:24Z",
"pushed_at": "2021-03-18T16:41:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-18T09:14:01Z",
"updated_at": "2021-03-19T01:29:39Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 958,
"watchers_count": 958,
"stargazers_count": 959,
"watchers_count": 959,
"forks_count": 223,
"forks": 223,
"watchers": 958,
"watchers": 959,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Weblogic coherence.jar RCE",
"fork": false,
"created_at": "2020-05-10T09:04:43Z",
"updated_at": "2021-01-25T14:53:42Z",
"updated_at": "2021-03-19T01:21:27Z",
"pushed_at": "2020-05-10T09:29:36Z",
"stargazers_count": 167,
"watchers_count": 167,
"stargazers_count": 168,
"watchers_count": 168,
"forks_count": 32,
"forks": 32,
"watchers": 167,
"watchers": 168,
"score": 0
},
{
@ -128,13 +128,13 @@
"description": "CVE-2020-2883",
"fork": false,
"created_at": "2020-11-26T14:10:25Z",
"updated_at": "2021-02-16T15:28:51Z",
"updated_at": "2021-03-19T02:25:20Z",
"pushed_at": "2020-11-27T02:12:52Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -21,28 +21,5 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 340126442,
"name": "CVE-2020-3161",
"full_name": "uromulou\/CVE-2020-3161",
"owner": {
"login": "uromulou",
"id": 79270508,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79270508?v=4",
"html_url": "https:\/\/github.com\/uromulou"
},
"html_url": "https:\/\/github.com\/uromulou\/CVE-2020-3161",
"description": null,
"fork": false,
"created_at": "2021-02-18T17:30:44Z",
"updated_at": "2021-02-18T17:31:10Z",
"pushed_at": "2021-02-18T17:31:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2020-02-13T07:55:44Z",
"updated_at": "2020-02-13T07:57:34Z",
"pushed_at": "2021-03-04T09:23:24Z",
"pushed_at": "2021-03-18T23:42:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-07-13T14:40:34Z",
"updated_at": "2020-07-24T02:02:52Z",
"updated_at": "2021-03-19T02:30:16Z",
"pushed_at": "2020-07-13T14:47:02Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2021-1056, related to GPU Container Security",
"fork": false,
"created_at": "2021-01-08T11:29:48Z",
"updated_at": "2021-03-18T14:36:24Z",
"updated_at": "2021-03-19T00:32:36Z",
"pushed_at": "2021-01-12T09:21:02Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 4,
"forks": 4,
"watchers": 7,
"watchers": 8,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2021-1732 Exploit",
"fork": false,
"created_at": "2021-03-05T02:11:10Z",
"updated_at": "2021-03-18T20:12:39Z",
"updated_at": "2021-03-19T02:27:51Z",
"pushed_at": "2021-03-05T03:10:26Z",
"stargazers_count": 250,
"watchers_count": 250,
"stargazers_count": 251,
"watchers_count": 251,
"forks_count": 52,
"forks": 52,
"watchers": 250,
"watchers": 251,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "CVE-2021-21972 Exploit",
"fork": false,
"created_at": "2021-02-24T11:14:58Z",
"updated_at": "2021-03-18T19:45:49Z",
"updated_at": "2021-03-18T22:17:45Z",
"pushed_at": "2021-03-10T05:01:22Z",
"stargazers_count": 217,
"watchers_count": 217,
"stargazers_count": 218,
"watchers_count": 218,
"forks_count": 83,
"forks": 83,
"watchers": 217,
"watchers": 218,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "This is a Poc for BIGIP iControl unauth RCE ",
"fork": false,
"created_at": "2021-03-17T05:02:45Z",
"updated_at": "2021-03-17T20:06:27Z",
"updated_at": "2021-03-19T02:07:43Z",
"pushed_at": "2021-03-17T05:10:03Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 2,
"forks": 2,
"watchers": 7,
"watchers": 8,
"score": 0
}
]

View file

@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-03-18T20:54:07Z",
"pushed_at": "2021-03-18T14:11:05Z",
"stargazers_count": 72,
"watchers_count": 72,
"forks_count": 24,
"forks": 24,
"watchers": 72,
"updated_at": "2021-03-19T03:02:24Z",
"pushed_at": "2021-03-19T02:03:46Z",
"stargazers_count": 112,
"watchers_count": 112,
"forks_count": 28,
"forks": 28,
"watchers": 112,
"score": 0
}
]

View file

@ -454,8 +454,8 @@
"pushed_at": "2021-03-11T20:58:08Z",
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 25,
"forks": 25,
"forks_count": 26,
"forks": 26,
"watchers": 41,
"score": 0
},
@ -680,13 +680,13 @@
"description": "ProxyLogon(CVE-2021-26855+CVE-2021-27065) Exchange Server RCE(SSRF->GetWebShell)",
"fork": false,
"created_at": "2021-03-17T03:56:54Z",
"updated_at": "2021-03-18T11:34:45Z",
"updated_at": "2021-03-19T02:57:48Z",
"pushed_at": "2021-03-17T05:06:18Z",
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 6,
"forks": 6,
"watchers": 31,
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 7,
"forks": 7,
"watchers": 34,
"score": 0
},
{

View file

@ -887,13 +887,13 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
"updated_at": "2021-03-18T18:44:27Z",
"updated_at": "2021-03-19T03:01:01Z",
"pushed_at": "2021-03-18T17:12:35Z",
"stargazers_count": 173,
"watchers_count": 173,
"forks_count": 27,
"forks": 27,
"watchers": 173,
"stargazers_count": 183,
"watchers_count": 183,
"forks_count": 28,
"forks": 28,
"watchers": 183,
"score": 0
},
{

View file

@ -171,7 +171,12 @@ Denial of service in ASUSWRT ASUS RT-AX3000 firmware versions 3.0.0.4.384_10177
- [fullbbadda1208/CVE-2021-3229](https://github.com/fullbbadda1208/CVE-2021-3229)
### CVE-2021-3327
### CVE-2021-3327 (-)
<code>
Ovation Dynamic Content 1.10.1 for Elementor allows XSS via the post_title parameter.
</code>
- [IthacaLabs/CVE-2021-3327](https://github.com/IthacaLabs/CVE-2021-3327)
### CVE-2021-3345 (2021-01-29)
@ -713,6 +718,7 @@ A remote code execution vulnerability exists in Microsoft Exchange software when
</code>
- [Ridter/cve-2020-0688](https://github.com/Ridter/cve-2020-0688)
- [Yt1g3r/CVE-2020-0688_EXP](https://github.com/Yt1g3r/CVE-2020-0688_EXP)
- [righter83/CVE-2020-0688](https://github.com/righter83/CVE-2020-0688)
- [truongtn/cve-2020-0688](https://github.com/truongtn/cve-2020-0688)
- [onSec-fr/CVE-2020-0688-Scanner](https://github.com/onSec-fr/CVE-2020-0688-Scanner)
@ -1256,7 +1262,6 @@ A vulnerability in the web server for Cisco IP Phones could allow an unauthentic
</code>
- [abood05972/CVE-2020-3161](https://github.com/abood05972/CVE-2020-3161)
- [uromulou/CVE-2020-3161](https://github.com/uromulou/CVE-2020-3161)
### CVE-2020-3187 (2020-05-06)
@ -4416,7 +4421,6 @@ In Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, the Config API allows
In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's &quot;dataConfig&quot; parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a DIH config. Since a DIH config can contain scripts, this parameter is a security risk. Starting with version 8.2.0 of Solr, use of this parameter requires setting the Java System property &quot;enable.dih.dataConfigParam&quot; to true.
</code>
- [xConsoIe/CVE-2019-0193](https://github.com/xConsoIe/CVE-2019-0193)
- [jas502n/CVE-2019-0193](https://github.com/jas502n/CVE-2019-0193)
- [1135/solr_exploit](https://github.com/1135/solr_exploit)
- [jaychouzzk/CVE-2019-0193-exp](https://github.com/jaychouzzk/CVE-2019-0193-exp)
@ -5143,6 +5147,14 @@ Confluence Server and Data Center had a path traversal vulnerability in the down
- [superevr/cve-2019-3398](https://github.com/superevr/cve-2019-3398)
### CVE-2019-3403 (2019-05-22)
<code>
The /rest/api/2/user/picker rest resource in Jira before version 7.13.3, from version 8.0.0 before version 8.0.4, and from version 8.1.0 before version 8.1.1 allows remote attackers to enumerate usernames via an incorrect authorisation check.
</code>
- [davidmckennirey/CVE-2019-3403](https://github.com/davidmckennirey/CVE-2019-3403)
### CVE-2019-3663 (2019-11-13)
<code>
@ -5717,7 +5729,6 @@ NTP through 4.2.8p12 has a NULL Pointer Dereference.
WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution because an _wp_attached_file Post Meta entry can be changed to an arbitrary string, such as one ending with a .jpg?file.php substring. An attacker with author privileges can execute arbitrary code by uploading a crafted image containing PHP code in the Exif metadata. Exploitation can leverage CVE-2019-8943.
</code>
- [brianwrf/WordPress_4.9.8_RCE_POC](https://github.com/brianwrf/WordPress_4.9.8_RCE_POC)
- [synacktiv/CVE-2019-8942](https://github.com/synacktiv/CVE-2019-8942)
### CVE-2019-8943 (2019-02-19)
@ -7934,6 +7945,7 @@ A sandbox bypass vulnerability exists in Script Security Plugin 1.49 and earlier
- [wetw0rk/Exploit-Development](https://github.com/wetw0rk/Exploit-Development)
- [adamyordan/cve-2019-1003000-jenkins-rce-poc](https://github.com/adamyordan/cve-2019-1003000-jenkins-rce-poc)
- [1NTheKut/CVE-2019-1003000_RCE-DETECTION](https://github.com/1NTheKut/CVE-2019-1003000_RCE-DETECTION)
- [PetrusViet/CVE-2019-1003000-2018-1000861-jenkins-rce](https://github.com/PetrusViet/CVE-2019-1003000-2018-1000861-jenkins-rce)
### CVE-2019-1010054 (2019-07-18)