Auto Update 2021/05/06 06:11:07

This commit is contained in:
motikan2010-bot 2021-05-06 06:11:07 +09:00
parent 41dd16cbc9
commit c0c5dd8634
22 changed files with 122 additions and 74 deletions

View file

@ -82,13 +82,13 @@
"description": "ProFTPd 1.3.5 - File Copy",
"fork": false,
"created_at": "2017-07-29T04:31:10Z",
"updated_at": "2017-07-29T04:31:53Z",
"updated_at": "2021-05-05T18:56:50Z",
"pushed_at": "2017-07-29T04:35:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"watchers": 1,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2017-12-16T00:39:19Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 15,
"forks": 15,
"forks_count": 16,
"forks": 16,
"watchers": 9,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2017-11-30T00:24:14Z",
"stargazers_count": 202,
"watchers_count": 202,
"forks_count": 64,
"forks": 64,
"forks_count": 63,
"forks": 63,
"watchers": 202,
"score": 0
}

View file

@ -132,8 +132,8 @@
"pushed_at": "2021-03-09T09:12:55Z",
"stargazers_count": 230,
"watchers_count": 230,
"forks_count": 75,
"forks": 75,
"forks_count": 76,
"forks": 76,
"watchers": 230,
"score": 0
},

View file

@ -59,13 +59,13 @@
"description": "Exploiting CVE-2017-7525 demo project with Angular7 frontend and Spring.",
"fork": false,
"created_at": "2019-01-22T14:19:54Z",
"updated_at": "2021-04-30T06:14:30Z",
"updated_at": "2021-05-05T20:31:30Z",
"pushed_at": "2019-02-21T13:18:24Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 2,
"forks": 2,
"watchers": 15,
"watchers": 16,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "CVE-2018-8120 Exploit for Win2003 Win2008 WinXP Win7 ",
"fork": false,
"created_at": "2018-06-07T08:30:07Z",
"updated_at": "2021-04-20T04:55:05Z",
"updated_at": "2021-05-05T15:36:34Z",
"pushed_at": "2018-08-08T05:48:24Z",
"stargazers_count": 280,
"watchers_count": 280,
"stargazers_count": 281,
"watchers_count": 281,
"forks_count": 121,
"forks": 121,
"watchers": 280,
"watchers": 281,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "Arbitrary code execution with kernel privileges using CVE-2018-8897.",
"fork": false,
"created_at": "2018-05-13T19:34:17Z",
"updated_at": "2021-05-01T14:17:05Z",
"updated_at": "2021-05-05T15:32:41Z",
"pushed_at": "2018-05-18T12:26:53Z",
"stargazers_count": 390,
"watchers_count": 390,
"stargazers_count": 391,
"watchers_count": 391,
"forks_count": 111,
"forks": 111,
"watchers": 390,
"watchers": 391,
"score": 0
},
{

View file

@ -1232,13 +1232,13 @@
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
"fork": false,
"created_at": "2019-05-23T22:50:12Z",
"updated_at": "2021-04-25T23:05:04Z",
"updated_at": "2021-05-05T16:58:13Z",
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 807,
"watchers_count": 807,
"stargazers_count": 808,
"watchers_count": 808,
"forks_count": 196,
"forks": 196,
"watchers": 807,
"watchers": 808,
"score": 0
},
{
@ -1310,6 +1310,29 @@
"watchers": 119,
"score": 0
},
{
"id": 189061944,
"name": "CVE-2019-0708Poc-BatchScanning",
"full_name": "ht0Ruial\/CVE-2019-0708Poc-BatchScanning",
"owner": {
"login": "ht0Ruial",
"id": 44924427,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44924427?v=4",
"html_url": "https:\/\/github.com\/ht0Ruial"
},
"html_url": "https:\/\/github.com\/ht0Ruial\/CVE-2019-0708Poc-BatchScanning",
"description": "基于360公开的无损检测工具的可直接在windows上运行的批量检测程序",
"fork": false,
"created_at": "2019-05-28T16:09:10Z",
"updated_at": "2021-05-05T19:58:14Z",
"pushed_at": "2019-05-28T17:16:24Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"forks": 2,
"watchers": 4,
"score": 0
},
{
"id": 189126322,
"name": "BlueKeep",
@ -1393,13 +1416,13 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2021-04-29T20:21:25Z",
"updated_at": "2021-05-05T17:44:53Z",
"pushed_at": "2019-09-03T20:50:28Z",
"stargazers_count": 1068,
"watchers_count": 1068,
"stargazers_count": 1069,
"watchers_count": 1069,
"forks_count": 357,
"forks": 357,
"watchers": 1068,
"watchers": 1069,
"score": 0
},
{

View file

@ -174,13 +174,13 @@
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
"fork": false,
"created_at": "2019-09-09T15:58:39Z",
"updated_at": "2021-04-28T01:26:16Z",
"updated_at": "2021-05-05T20:25:43Z",
"pushed_at": "2020-01-15T17:01:50Z",
"stargazers_count": 111,
"watchers_count": 111,
"stargazers_count": 112,
"watchers_count": 112,
"forks_count": 51,
"forks": 51,
"watchers": 111,
"watchers": 112,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "CVE-2019-1458 Windows LPE Exploit",
"fork": false,
"created_at": "2020-03-11T08:30:14Z",
"updated_at": "2021-04-08T05:43:24Z",
"updated_at": "2021-05-05T15:37:24Z",
"pushed_at": "2020-03-11T09:59:01Z",
"stargazers_count": 103,
"watchers_count": 103,
"stargazers_count": 104,
"watchers_count": 104,
"forks_count": 32,
"forks": 32,
"watchers": 103,
"watchers": 104,
"score": 0
},
{

View file

@ -44,5 +44,28 @@
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 364638510,
"name": "WP_CROP_RCE",
"full_name": "synod2\/WP_CROP_RCE",
"owner": {
"login": "synod2",
"id": 9367196,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9367196?v=4",
"html_url": "https:\/\/github.com\/synod2"
},
"html_url": "https:\/\/github.com\/synod2\/WP_CROP_RCE",
"description": "cve-2019-8942, cve-2019-8943",
"fork": false,
"created_at": "2021-05-05T16:23:03Z",
"updated_at": "2021-05-05T17:01:38Z",
"pushed_at": "2021-05-05T17:01:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -128,13 +128,13 @@
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
"fork": false,
"created_at": "2020-01-15T23:07:41Z",
"updated_at": "2021-05-05T14:39:34Z",
"updated_at": "2021-05-05T16:31:10Z",
"pushed_at": "2020-01-20T23:33:19Z",
"stargazers_count": 856,
"watchers_count": 856,
"stargazers_count": 855,
"watchers_count": 855,
"forks_count": 223,
"forks": 223,
"watchers": 856,
"watchers": 855,
"score": 0
},
{

View file

@ -891,8 +891,8 @@
"pushed_at": "2020-04-02T08:01:38Z",
"stargazers_count": 216,
"watchers_count": 216,
"forks_count": 87,
"forks": 87,
"forks_count": 86,
"forks": 86,
"watchers": 216,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
"fork": false,
"created_at": "2020-06-08T07:37:49Z",
"updated_at": "2021-05-04T16:08:08Z",
"updated_at": "2021-05-05T17:36:09Z",
"pushed_at": "2020-06-17T13:41:23Z",
"stargazers_count": 363,
"watchers_count": 363,
"stargazers_count": 362,
"watchers_count": 362,
"forks_count": 64,
"forks": 64,
"watchers": 363,
"watchers": 362,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
"fork": false,
"created_at": "2021-03-11T15:27:25Z",
"updated_at": "2021-04-28T17:01:14Z",
"updated_at": "2021-05-05T16:08:10Z",
"pushed_at": "2021-04-20T08:35:26Z",
"stargazers_count": 99,
"watchers_count": 99,
"stargazers_count": 100,
"watchers_count": 100,
"forks_count": 21,
"forks": 21,
"watchers": 99,
"watchers": 100,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "🐱‍💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...",
"fork": false,
"created_at": "2021-03-22T11:53:57Z",
"updated_at": "2021-05-05T06:00:55Z",
"updated_at": "2021-05-05T17:33:33Z",
"pushed_at": "2021-03-22T18:24:20Z",
"stargazers_count": 110,
"watchers_count": 110,
"stargazers_count": 111,
"watchers_count": 111,
"forks_count": 15,
"forks": 15,
"watchers": 110,
"watchers": 111,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "com_media allowed paths that are not intended for image uploads to RCE",
"fork": false,
"created_at": "2021-03-03T02:13:57Z",
"updated_at": "2021-04-25T18:57:49Z",
"updated_at": "2021-05-05T19:58:15Z",
"pushed_at": "2021-03-03T03:52:10Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 57,
"watchers_count": 57,
"forks_count": 21,
"forks": 21,
"watchers": 56,
"watchers": 57,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
"fork": false,
"created_at": "2021-03-11T15:27:25Z",
"updated_at": "2021-04-28T17:01:14Z",
"updated_at": "2021-05-05T16:08:10Z",
"pushed_at": "2021-04-20T08:35:26Z",
"stargazers_count": 99,
"watchers_count": 99,
"stargazers_count": 100,
"watchers_count": 100,
"forks_count": 21,
"forks": 21,
"watchers": 99,
"watchers": 100,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-30481",
"fork": false,
"created_at": "2021-04-17T01:29:31Z",
"updated_at": "2021-04-29T11:58:22Z",
"updated_at": "2021-05-05T16:17:43Z",
"pushed_at": "2021-04-20T16:00:46Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"forks_count": 4,
"forks": 4,
"watchers": 35,
"watchers": 36,
"score": 0
}
]

View file

@ -1025,13 +1025,13 @@
"description": "CVE-2021-3156 - Sudo Baron Samedit",
"fork": false,
"created_at": "2021-04-29T06:29:26Z",
"updated_at": "2021-05-03T01:33:33Z",
"updated_at": "2021-05-05T20:12:08Z",
"pushed_at": "2021-04-29T16:26:45Z",
"stargazers_count": 67,
"watchers_count": 67,
"stargazers_count": 68,
"watchers_count": 68,
"forks_count": 0,
"forks": 0,
"watchers": 67,
"watchers": 68,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-04-24T20:08:12Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
},

View file

@ -5309,6 +5309,7 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly
- [closethe/CVE-2019-0708-POC](https://github.com/closethe/CVE-2019-0708-POC)
- [Rostelecom-CERT/bluekeepscan](https://github.com/Rostelecom-CERT/bluekeepscan)
- [Leoid/CVE-2019-0708](https://github.com/Leoid/CVE-2019-0708)
- [ht0Ruial/CVE-2019-0708Poc-BatchScanning](https://github.com/ht0Ruial/CVE-2019-0708Poc-BatchScanning)
- [oneoy/BlueKeep](https://github.com/oneoy/BlueKeep)
- [infiniti-team/CVE-2019-0708](https://github.com/infiniti-team/CVE-2019-0708)
- [haishanzheng/CVE-2019-0708-generate-hosts](https://github.com/haishanzheng/CVE-2019-0708-generate-hosts)
@ -6607,6 +6608,7 @@ WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution because
- [brianwrf/WordPress_4.9.8_RCE_POC](https://github.com/brianwrf/WordPress_4.9.8_RCE_POC)
- [synacktiv/CVE-2019-8942](https://github.com/synacktiv/CVE-2019-8942)
- [synod2/WP_CROP_RCE](https://github.com/synod2/WP_CROP_RCE)
### CVE-2019-8943 (2019-02-19)