Auto Update 2021/06/08 18:12:46

This commit is contained in:
motikan2010-bot 2021-06-08 18:12:46 +09:00
parent 3678dc1d5e
commit b4797f1def
23 changed files with 125 additions and 92 deletions

View file

@ -197,13 +197,13 @@
"description": "OpenSSL TLS heartbeat read overrun (CVE-2014-0160)",
"fork": false,
"created_at": "2014-04-08T20:58:26Z",
"updated_at": "2019-10-02T13:26:04Z",
"updated_at": "2021-06-08T03:29:39Z",
"pushed_at": "2014-04-11T02:40:46Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 9,
"forks": 9,
"watchers": 38,
"watchers": 37,
"score": 0
},
{

View file

@ -266,13 +266,13 @@
"description": "Exploit for Drupal 7 <= 7.57 CVE-2018-7600",
"fork": false,
"created_at": "2018-04-17T15:38:15Z",
"updated_at": "2021-06-01T02:26:51Z",
"updated_at": "2021-06-08T07:28:03Z",
"pushed_at": "2018-04-26T15:40:28Z",
"stargazers_count": 88,
"watchers_count": 88,
"stargazers_count": 90,
"watchers_count": 90,
"forks_count": 43,
"forks": 43,
"watchers": 88,
"watchers": 90,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "(CVE-2018-9995) Get DVR Credentials",
"fork": false,
"created_at": "2018-04-29T20:00:06Z",
"updated_at": "2021-04-26T07:52:02Z",
"updated_at": "2021-06-08T03:17:42Z",
"pushed_at": "2019-01-23T14:27:21Z",
"stargazers_count": 448,
"watchers_count": 448,
"stargazers_count": 449,
"watchers_count": 449,
"forks_count": 185,
"forks": 185,
"watchers": 448,
"watchers": 449,
"score": 0
},
{

View file

@ -82,7 +82,7 @@
"description": "CVE-2019-0604: SharePoint RCE detection rules and sample PCAP",
"fork": false,
"created_at": "2019-09-15T20:06:54Z",
"updated_at": "2020-06-25T02:16:52Z",
"updated_at": "2021-06-08T06:05:07Z",
"pushed_at": "2019-09-17T19:40:29Z",
"stargazers_count": 2,
"watchers_count": 2,

View file

@ -13,13 +13,13 @@
"description": "ASUS SmartHome Exploit for CVE-2019-11061 and CVE-2019-11063",
"fork": false,
"created_at": "2019-03-29T06:01:49Z",
"updated_at": "2020-08-30T21:54:35Z",
"updated_at": "2021-06-08T06:06:34Z",
"pushed_at": "2019-08-27T04:23:24Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 7,
"forks": 7,
"watchers": 24,
"watchers": 23,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-10-01T08:43:36Z",
"stargazers_count": 71,
"watchers_count": 71,
"forks_count": 33,
"forks": 33,
"forks_count": 34,
"forks": 34,
"watchers": 71,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-08-01T16:02:59Z",
"stargazers_count": 256,
"watchers_count": 256,
"forks_count": 96,
"forks": 96,
"forks_count": 95,
"forks": 95,
"watchers": 256,
"score": 0
},
@ -40,8 +40,8 @@
"pushed_at": "2019-07-31T07:05:04Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 7,
"forks": 7,
"forks_count": 6,
"forks": 6,
"watchers": 4,
"score": 0
},

View file

@ -155,8 +155,8 @@
"pushed_at": "2021-01-24T20:18:04Z",
"stargazers_count": 123,
"watchers_count": 123,
"forks_count": 34,
"forks": 34,
"forks_count": 35,
"forks": 35,
"watchers": 123,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-04-08T08:55:30Z",
"stargazers_count": 163,
"watchers_count": 163,
"forks_count": 51,
"forks": 51,
"forks_count": 52,
"forks": 52,
"watchers": 163,
"score": 0
},

View file

@ -197,13 +197,13 @@
"description": "Exploit and detect tools for CVE-2020-0688",
"fork": false,
"created_at": "2020-03-01T12:57:32Z",
"updated_at": "2021-06-03T03:02:49Z",
"updated_at": "2021-06-08T05:23:16Z",
"pushed_at": "2020-03-21T05:44:48Z",
"stargazers_count": 286,
"watchers_count": 286,
"stargazers_count": 287,
"watchers_count": 287,
"forks_count": 70,
"forks": 70,
"watchers": 286,
"watchers": 287,
"score": 0
},
{

View file

@ -105,13 +105,13 @@
"description": "PoC exploit of CVE-2020-11651 and CVE-2020-11652",
"fork": false,
"created_at": "2020-05-04T11:52:28Z",
"updated_at": "2021-03-24T07:03:34Z",
"updated_at": "2021-06-08T08:24:15Z",
"pushed_at": "2020-07-10T09:30:47Z",
"stargazers_count": 91,
"watchers_count": 91,
"stargazers_count": 92,
"watchers_count": 92,
"forks_count": 39,
"forks": 39,
"watchers": 91,
"watchers": 92,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2021-06-07T13:01:51Z",
"updated_at": "2021-06-08T07:42:52Z",
"pushed_at": "2020-10-21T12:10:28Z",
"stargazers_count": 1291,
"watchers_count": 1291,
"stargazers_count": 1292,
"watchers_count": 1292,
"forks_count": 293,
"forks": 293,
"watchers": 1291,
"watchers": 1292,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2021-06-03T18:26:58Z",
"updated_at": "2021-06-08T06:32:55Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 794,
"watchers_count": 794,
"stargazers_count": 795,
"watchers_count": 795,
"forks_count": 228,
"forks": 228,
"watchers": 794,
"watchers": 795,
"score": 0
},
{
@ -128,13 +128,13 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2021-06-07T21:34:51Z",
"updated_at": "2021-06-08T03:58:29Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 313,
"watchers_count": 313,
"stargazers_count": 312,
"watchers_count": 312,
"forks_count": 100,
"forks": 100,
"watchers": 313,
"watchers": 312,
"score": 0
},
{
@ -151,13 +151,13 @@
"description": "Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.",
"fork": false,
"created_at": "2020-09-14T19:27:14Z",
"updated_at": "2021-05-13T18:47:53Z",
"updated_at": "2021-06-08T03:58:28Z",
"pushed_at": "2020-09-16T14:05:27Z",
"stargazers_count": 148,
"watchers_count": 148,
"stargazers_count": 147,
"watchers_count": 147,
"forks_count": 35,
"forks": 35,
"watchers": 148,
"watchers": 147,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "WebLogic T3\/IIOP RCE ExternalizableHelper.class of coherence.jar",
"fork": false,
"created_at": "2021-01-27T01:24:52Z",
"updated_at": "2021-04-26T06:00:58Z",
"updated_at": "2021-06-08T03:36:24Z",
"pushed_at": "2021-01-27T01:40:56Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 59,
"watchers_count": 59,
"forks_count": 12,
"forks": 12,
"watchers": 60,
"watchers": 59,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "weaponized tool for CVE-2020-17144",
"fork": false,
"created_at": "2020-12-09T20:57:16Z",
"updated_at": "2021-05-29T15:56:03Z",
"updated_at": "2021-06-08T03:42:39Z",
"pushed_at": "2020-12-09T20:57:32Z",
"stargazers_count": 125,
"watchers_count": 125,
"stargazers_count": 124,
"watchers_count": 124,
"forks_count": 21,
"forks": 21,
"watchers": 125,
"watchers": 124,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": "Cnvd-2020-10487 \/ cve-2020-1938, scanner tool",
"fork": false,
"created_at": "2020-02-20T21:00:15Z",
"updated_at": "2021-05-28T04:19:47Z",
"updated_at": "2021-06-08T04:51:38Z",
"pushed_at": "2021-04-20T10:12:22Z",
"stargazers_count": 225,
"watchers_count": 225,
"stargazers_count": 226,
"watchers_count": 226,
"forks_count": 94,
"forks": 94,
"watchers": 225,
"watchers": 226,
"score": 0
},
{

View file

@ -40,8 +40,8 @@
"pushed_at": "2021-03-01T02:10:44Z",
"stargazers_count": 97,
"watchers_count": 97,
"forks_count": 58,
"forks": 58,
"forks_count": 59,
"forks": 59,
"watchers": 97,
"score": 0
},
@ -63,8 +63,8 @@
"pushed_at": "2021-03-10T05:01:22Z",
"stargazers_count": 260,
"watchers_count": 260,
"forks_count": 98,
"forks": 98,
"forks_count": 99,
"forks": 99,
"watchers": 260,
"score": 0
},
@ -109,8 +109,8 @@
"pushed_at": "2021-02-25T16:05:02Z",
"stargazers_count": 119,
"watchers_count": 119,
"forks_count": 44,
"forks": 44,
"forks_count": 45,
"forks": 45,
"watchers": 119,
"score": 0
},
@ -155,8 +155,8 @@
"pushed_at": "2021-02-25T05:49:19Z",
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 10,
"forks": 10,
"forks_count": 11,
"forks": 11,
"watchers": 51,
"score": 0
},
@ -454,8 +454,8 @@
"pushed_at": "2021-03-07T17:12:55Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 2,
"forks": 2,
"forks_count": 3,
"forks": 3,
"watchers": 10,
"score": 0
},

View file

@ -105,13 +105,13 @@
"description": "CVE-2021-21985 VMware vCenter Server远程代码执行漏洞 EXP (更新可回显EXP)",
"fork": false,
"created_at": "2021-06-03T09:59:21Z",
"updated_at": "2021-06-08T03:11:28Z",
"updated_at": "2021-06-08T08:47:01Z",
"pushed_at": "2021-06-05T08:35:27Z",
"stargazers_count": 150,
"watchers_count": 150,
"stargazers_count": 159,
"watchers_count": 159,
"forks_count": 24,
"forks": 24,
"watchers": 150,
"watchers": 159,
"score": 0
},
{
@ -132,8 +132,8 @@
"pushed_at": "2021-06-07T01:44:03Z",
"stargazers_count": 57,
"watchers_count": 57,
"forks_count": 14,
"forks": 14,
"forks_count": 15,
"forks": 15,
"watchers": 57,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1",
"fork": false,
"created_at": "2021-06-05T15:05:01Z",
"updated_at": "2021-06-08T02:57:26Z",
"updated_at": "2021-06-08T04:06:19Z",
"pushed_at": "2021-06-06T00:30:43Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 1,
"forks": 1,
"watchers": 13,
"watchers": 14,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "CVE-2021-26295 EXP 可成功反弹Shell",
"fork": false,
"created_at": "2021-03-24T10:08:54Z",
"updated_at": "2021-06-04T03:13:58Z",
"updated_at": "2021-06-08T08:08:28Z",
"pushed_at": "2021-05-10T02:09:51Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 6,
"forks": 6,
"watchers": 13,
"watchers": 14,
"score": 0
},
{

25
2021/CVE-2021-29505.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 374891682,
"name": "CVE-2021-29505",
"full_name": "MyBlackManba\/CVE-2021-29505",
"owner": {
"login": "MyBlackManba",
"id": 31227970,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31227970?v=4",
"html_url": "https:\/\/github.com\/MyBlackManba"
},
"html_url": "https:\/\/github.com\/MyBlackManba\/CVE-2021-29505",
"description": "对CVE-2021-29505进行复现并分析学了下Xstream反序列化过程",
"fork": false,
"created_at": "2021-06-08T05:27:57Z",
"updated_at": "2021-06-08T05:57:32Z",
"pushed_at": "2021-06-08T05:55:57Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": null,
"fork": false,
"created_at": "2021-01-25T08:42:28Z",
"updated_at": "2021-05-26T01:29:36Z",
"updated_at": "2021-06-08T07:35:23Z",
"pushed_at": "2021-01-25T08:49:59Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 3,
"forks": 3,
"watchers": 11,
"watchers": 12,
"score": 0
},
{

View file

@ -59,7 +59,7 @@
"description": "CVE-2021-3156",
"fork": false,
"created_at": "2021-01-27T16:03:34Z",
"updated_at": "2021-06-07T15:28:20Z",
"updated_at": "2021-06-08T04:20:10Z",
"pushed_at": "2021-01-31T04:56:56Z",
"stargazers_count": 108,
"watchers_count": 108,

View file

@ -1107,6 +1107,14 @@ Wordpress is an open source CMS. A user with the ability to upload files (like a
- [Vulnmachines/wordpress_cve-2021-29447](https://github.com/Vulnmachines/wordpress_cve-2021-29447)
- [dnr6419/CVE-2021-29447](https://github.com/dnr6419/CVE-2021-29447)
### CVE-2021-29505 (2021-05-28)
<code>
XStream is software for serializing Java objects to XML and back again. A vulnerability in XStream versions prior to 1.4.17 may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types is affected. The vulnerability is patched in version 1.4.17.
</code>
- [MyBlackManba/CVE-2021-29505](https://github.com/MyBlackManba/CVE-2021-29505)
### CVE-2021-29627 (2021-04-07)
<code>