Auto Update 2021/04/04 12:14:25

This commit is contained in:
motikan2010-bot 2021-04-04 12:14:25 +09:00
parent d6721dda27
commit b8aa9bf6e0
16 changed files with 99 additions and 75 deletions

View file

@ -105,13 +105,13 @@
"description": "详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码动手制作自己的payload",
"fork": false,
"created_at": "2019-12-10T02:39:57Z",
"updated_at": "2021-04-02T09:12:34Z",
"updated_at": "2021-04-04T00:14:01Z",
"pushed_at": "2021-04-02T09:12:32Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 5,
"forks": 5,
"watchers": 22,
"watchers": 23,
"score": 0
}
]

View file

@ -220,13 +220,13 @@
"description": "CVE-2019-2725命令回显+webshell上传+最新绕过",
"fork": false,
"created_at": "2019-06-10T05:12:44Z",
"updated_at": "2021-04-02T01:41:29Z",
"updated_at": "2021-04-04T02:46:49Z",
"pushed_at": "2019-06-21T03:33:05Z",
"stargazers_count": 144,
"watchers_count": 144,
"stargazers_count": 145,
"watchers_count": 145,
"forks_count": 63,
"forks": 63,
"watchers": 144,
"watchers": 145,
"score": 0
},
{

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-05-24T16:28:46Z",
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 22,
"forks": 22,
"forks_count": 23,
"forks": 23,
"watchers": 47,
"score": 0
}

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-08-16T05:54:16Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 10,
"forks": 10,
"forks_count": 11,
"forks": 11,
"watchers": 15,
"score": 0
},

View file

@ -90,5 +90,28 @@
"forks": 42,
"watchers": 144,
"score": 0
},
{
"id": 354442383,
"name": "cve-2020-1337-poc",
"full_name": "password520\/cve-2020-1337-poc",
"owner": {
"login": "password520",
"id": 29515145,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29515145?v=4",
"html_url": "https:\/\/github.com\/password520"
},
"html_url": "https:\/\/github.com\/password520\/cve-2020-1337-poc",
"description": null,
"fork": false,
"created_at": "2021-04-04T02:56:02Z",
"updated_at": "2021-04-04T02:56:12Z",
"pushed_at": "2021-04-04T02:56:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -128,13 +128,13 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2021-04-03T17:38:46Z",
"updated_at": "2021-04-03T21:24:32Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 295,
"watchers_count": 295,
"stargazers_count": 296,
"watchers_count": 296,
"forks_count": 97,
"forks": 97,
"watchers": 295,
"watchers": 296,
"score": 0
},
{

View file

@ -1,27 +1,4 @@
[
{
"id": 297507799,
"name": "CVE-2020-25790",
"full_name": "pownx\/CVE-2020-25790",
"owner": {
"login": "pownx",
"id": 79206826,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79206826?v=4",
"html_url": "https:\/\/github.com\/pownx"
},
"html_url": "https:\/\/github.com\/pownx\/CVE-2020-25790",
"description": "Exploit for CVE-2020-25790",
"fork": false,
"created_at": "2020-09-22T01:57:06Z",
"updated_at": "2021-03-15T21:07:53Z",
"pushed_at": "2021-03-10T21:51:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 302557281,
"name": "CVE-2020-25790",

View file

@ -691,19 +691,19 @@
},
{
"id": 278201438,
"name": "checkvulnCVE2020590",
"full_name": "renanhsilva\/checkvulnCVE2020590",
"name": "checkvulnCVE20205902",
"full_name": "renanhsilva\/checkvulnCVE20205902",
"owner": {
"login": "renanhsilva",
"id": 29900840,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29900840?v=4",
"html_url": "https:\/\/github.com\/renanhsilva"
},
"html_url": "https:\/\/github.com\/renanhsilva\/checkvulnCVE2020590",
"html_url": "https:\/\/github.com\/renanhsilva\/checkvulnCVE20205902",
"description": "A powershell script to check vulnerability CVE-2020-5902 of ip list",
"fork": false,
"created_at": "2020-07-08T21:50:32Z",
"updated_at": "2020-07-09T16:15:21Z",
"updated_at": "2021-04-04T00:01:08Z",
"pushed_at": "2020-07-08T21:56:56Z",
"stargazers_count": 1,
"watchers_count": 1,

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2021-03-30T05:21:26Z",
"updated_at": "2021-04-03T09:37:17Z",
"updated_at": "2021-04-03T21:20:33Z",
"pushed_at": "2021-03-30T05:31:22Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 9,
"forks": 9,
"watchers": 12,
"watchers": 13,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "🐱‍💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...",
"fork": false,
"created_at": "2021-03-22T11:53:57Z",
"updated_at": "2021-04-01T06:47:36Z",
"updated_at": "2021-04-03T23:45:15Z",
"pushed_at": "2021-03-22T18:24:20Z",
"stargazers_count": 95,
"watchers_count": 95,
"stargazers_count": 96,
"watchers_count": 96,
"forks_count": 13,
"forks": 13,
"watchers": 95,
"watchers": 96,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "Nmap script to check vulnerability CVE-2021-21975",
"fork": false,
"created_at": "2021-04-01T21:59:05Z",
"updated_at": "2021-04-03T21:16:21Z",
"updated_at": "2021-04-04T00:15:45Z",
"pushed_at": "2021-04-02T00:32:15Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "POC for CVE-2021-24098",
"fork": false,
"created_at": "2021-04-01T07:29:44Z",
"updated_at": "2021-04-02T11:30:27Z",
"updated_at": "2021-04-03T21:17:20Z",
"pushed_at": "2021-04-01T07:34:23Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -358,13 +358,13 @@
"description": null,
"fork": false,
"created_at": "2021-03-09T16:54:39Z",
"updated_at": "2021-04-01T10:45:33Z",
"updated_at": "2021-04-03T23:24:23Z",
"pushed_at": "2021-03-09T16:56:09Z",
"stargazers_count": 74,
"watchers_count": 74,
"stargazers_count": 75,
"watchers_count": 75,
"forks_count": 56,
"forks": 56,
"watchers": 74,
"watchers": 75,
"score": 0
},
{
@ -454,8 +454,8 @@
"pushed_at": "2021-03-11T20:58:08Z",
"stargazers_count": 44,
"watchers_count": 44,
"forks_count": 28,
"forks": 28,
"forks_count": 29,
"forks": 29,
"watchers": 44,
"score": 0
},

View file

@ -661,8 +661,8 @@
"pushed_at": "2021-02-03T22:28:14Z",
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 16,
"forks": 16,
"forks_count": 15,
"forks": 15,
"watchers": 33,
"score": 0
},
@ -964,5 +964,28 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 354429117,
"name": "CVE-2021-3156",
"full_name": "password520\/CVE-2021-3156",
"owner": {
"login": "password520",
"id": 29515145,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29515145?v=4",
"html_url": "https:\/\/github.com\/password520"
},
"html_url": "https:\/\/github.com\/password520\/CVE-2021-3156",
"description": null,
"fork": false,
"created_at": "2021-04-04T01:15:05Z",
"updated_at": "2021-04-04T01:15:15Z",
"pushed_at": "2021-04-04T01:15:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻‍💻",
"fork": false,
"created_at": "2021-03-26T01:09:25Z",
"updated_at": "2021-04-03T13:58:33Z",
"updated_at": "2021-04-03T23:47:22Z",
"pushed_at": "2021-03-31T12:00:09Z",
"stargazers_count": 164,
"watchers_count": 164,
"forks_count": 27,
"forks": 27,
"watchers": 164,
"stargazers_count": 165,
"watchers_count": 165,
"forks_count": 28,
"forks": 28,
"watchers": 165,
"score": 0
}
]

View file

@ -168,6 +168,7 @@ Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based
- [Chal13W1zz/Sudo-Spunk](https://github.com/Chal13W1zz/Sudo-Spunk)
- [lmol/CVE-2021-3156](https://github.com/lmol/CVE-2021-3156)
- [Nokialinux/CVE-2021-3156](https://github.com/Nokialinux/CVE-2021-3156)
- [password520/CVE-2021-3156](https://github.com/password520/CVE-2021-3156)
### CVE-2021-3157
- [y3rb1t4/CVE-2021-3157](https://github.com/y3rb1t4/CVE-2021-3157)
@ -1202,6 +1203,7 @@ An elevation of privilege vulnerability exists when the Windows Print Spooler se
- [VoidSec/CVE-2020-1337](https://github.com/VoidSec/CVE-2020-1337)
- [neofito/CVE-2020-1337](https://github.com/neofito/CVE-2020-1337)
- [sailay1996/cve-2020-1337-poc](https://github.com/sailay1996/cve-2020-1337-poc)
- [password520/cve-2020-1337-poc](https://github.com/password520/cve-2020-1337-poc)
### CVE-2020-1349 (2020-07-14)
@ -1755,7 +1757,7 @@ In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.
- [zhzyker/CVE-2020-5902](https://github.com/zhzyker/CVE-2020-5902)
- [GovindPalakkal/EvilRip](https://github.com/GovindPalakkal/EvilRip)
- [dnerzker/CVE-2020-5902](https://github.com/dnerzker/CVE-2020-5902)
- [renanhsilva/checkvulnCVE2020590](https://github.com/renanhsilva/checkvulnCVE2020590)
- [renanhsilva/checkvulnCVE20205902](https://github.com/renanhsilva/checkvulnCVE20205902)
- [halencarjunior/f5scan](https://github.com/halencarjunior/f5scan)
- [deepsecurity-pe/GoF5-CVE-2020-5902](https://github.com/deepsecurity-pe/GoF5-CVE-2020-5902)
- [Shu1L/CVE-2020-5902-fofa-scan](https://github.com/Shu1L/CVE-2020-5902-fofa-scan)
@ -4195,7 +4197,6 @@ An issue was discovered on Accfly Wireless Security IR Camera 720P System with s
** DISPUTED ** Typesetter CMS 5.x through 5.1 allows admins to upload and execute arbitrary PHP code via a .php file inside a ZIP archive. NOTE: the vendor disputes the significance of this report because "admins are considered trustworthy"; however, the behavior "contradicts our security policy" and is being fixed for 5.2.
</code>
- [pownx/CVE-2020-25790](https://github.com/pownx/CVE-2020-25790)
- [7Mitu/CVE-2020-25790](https://github.com/7Mitu/CVE-2020-25790)
### CVE-2020-25860 (2020-12-21)