Auto Update 2021/03/03 00:09:59

This commit is contained in:
motikan2010-bot 2021-03-03 00:09:59 +09:00
parent 0c2c835ab8
commit c4d1aaaec3
27 changed files with 143 additions and 115 deletions

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-01T12:56:56Z",
"updated_at": "2021-03-02T12:27:27Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 933,
"watchers_count": 933,
"stargazers_count": 936,
"watchers_count": 936,
"forks_count": 218,
"forks": 218,
"watchers": 933,
"watchers": 936,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": "POC for CVE-2015-6620, AMessage unmarshal arbitrary write",
"fork": false,
"created_at": "2015-12-16T03:09:30Z",
"updated_at": "2021-02-05T08:31:02Z",
"updated_at": "2021-03-02T09:36:14Z",
"pushed_at": "2015-12-16T03:48:31Z",
"stargazers_count": 38,
"watchers_count": 38,

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-01T12:56:56Z",
"updated_at": "2021-03-02T12:27:27Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 933,
"watchers_count": 933,
"stargazers_count": 936,
"watchers_count": 936,
"forks_count": 218,
"forks": 218,
"watchers": 933,
"watchers": 936,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2016-8610 (SSL Death Alert) PoC",
"fork": false,
"created_at": "2016-12-27T10:09:43Z",
"updated_at": "2021-01-14T09:25:00Z",
"updated_at": "2021-03-02T10:51:54Z",
"pushed_at": "2016-12-28T10:12:29Z",
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 16,
"forks": 16,
"watchers": 25,
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 17,
"forks": 17,
"watchers": 26,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-01T12:56:56Z",
"updated_at": "2021-03-02T12:27:27Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 933,
"watchers_count": 933,
"stargazers_count": 936,
"watchers_count": 936,
"forks_count": 218,
"forks": 218,
"watchers": 933,
"watchers": 936,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Test utility for cve-2018-1002105",
"fork": false,
"created_at": "2018-12-05T02:51:43Z",
"updated_at": "2020-11-04T13:06:55Z",
"updated_at": "2021-03-02T14:25:22Z",
"pushed_at": "2018-12-13T16:56:28Z",
"stargazers_count": 194,
"watchers_count": 194,
"stargazers_count": 193,
"watchers_count": 193,
"forks_count": 25,
"forks": 25,
"watchers": 194,
"watchers": 193,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "PoC for CVE-2018-1002105.",
"fork": false,
"created_at": "2018-12-06T11:28:02Z",
"updated_at": "2021-01-14T13:36:01Z",
"updated_at": "2021-03-02T14:25:58Z",
"pushed_at": "2018-12-21T14:34:04Z",
"stargazers_count": 216,
"watchers_count": 216,
"stargazers_count": 215,
"watchers_count": 215,
"forks_count": 39,
"forks": 39,
"watchers": 216,
"watchers": 215,
"score": 0
},
{

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-01T12:56:56Z",
"updated_at": "2021-03-02T12:27:27Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 933,
"watchers_count": 933,
"stargazers_count": 936,
"watchers_count": 936,
"forks_count": 218,
"forks": 218,
"watchers": 933,
"watchers": 936,
"score": 0
},
{

View file

@ -40,8 +40,8 @@
"pushed_at": "2019-05-14T21:51:14Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 47,
"forks": 47,
"forks_count": 48,
"forks": 48,
"watchers": 12,
"score": 0
},
@ -2244,13 +2244,13 @@
"description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )",
"fork": false,
"created_at": "2019-09-30T19:46:21Z",
"updated_at": "2021-03-01T11:53:12Z",
"updated_at": "2021-03-02T14:45:34Z",
"pushed_at": "2021-02-06T00:24:21Z",
"stargazers_count": 181,
"watchers_count": 181,
"stargazers_count": 183,
"watchers_count": 183,
"forks_count": 71,
"forks": 71,
"watchers": 181,
"watchers": 183,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-08-01T16:02:59Z",
"stargazers_count": 249,
"watchers_count": 249,
"forks_count": 96,
"forks": 96,
"forks_count": 97,
"forks": 97,
"watchers": 249,
"score": 0
},

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-06-04T13:17:10Z",
"stargazers_count": 91,
"watchers_count": 91,
"forks_count": 30,
"forks": 30,
"forks_count": 31,
"forks": 31,
"watchers": 91,
"score": 0
},

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-01T12:56:56Z",
"updated_at": "2021-03-02T12:27:27Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 933,
"watchers_count": 933,
"stargazers_count": 936,
"watchers_count": 936,
"forks_count": 218,
"forks": 218,
"watchers": 933,
"watchers": 936,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "CVE-2019-2729 Exploit Script",
"fork": false,
"created_at": "2020-02-19T03:49:51Z",
"updated_at": "2021-01-28T15:42:16Z",
"updated_at": "2021-03-02T12:33:35Z",
"pushed_at": "2020-02-19T08:48:02Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 6,
"forks": 6,
"watchers": 18,
"watchers": 19,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "[CVE-2020-14882] Oracle WebLogic Server Authenticated Remote Code Execution (RCE)",
"fork": false,
"created_at": "2020-11-09T15:26:28Z",
"updated_at": "2021-01-24T17:06:43Z",
"updated_at": "2021-03-02T13:33:51Z",
"pushed_at": "2020-11-09T17:21:45Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-02-07T09:42:36Z",
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 5,
"forks": 5,
"forks_count": 6,
"forks": 6,
"watchers": 42,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-03-01T12:56:56Z",
"updated_at": "2021-03-02T12:27:27Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 933,
"watchers_count": 933,
"stargazers_count": 936,
"watchers_count": 936,
"forks_count": 218,
"forks": 218,
"watchers": 933,
"watchers": 936,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion",
"fork": false,
"created_at": "2020-12-22T19:35:15Z",
"updated_at": "2021-03-02T09:00:23Z",
"updated_at": "2021-03-02T12:10:44Z",
"pushed_at": "2021-02-04T21:10:59Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks": 0,
"watchers": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"forks": 1,
"watchers": 5,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "[CVE-2020-6286] SAP NetWeaver AS JAVA (LM Configuration Wizard) Directory Traversal",
"fork": false,
"created_at": "2020-08-13T09:00:12Z",
"updated_at": "2021-01-27T19:59:59Z",
"updated_at": "2021-03-02T13:32:54Z",
"pushed_at": "2020-08-29T23:49:49Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"forks": 2,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)",
"fork": false,
"created_at": "2020-07-15T15:20:09Z",
"updated_at": "2021-02-23T02:48:51Z",
"updated_at": "2021-03-02T13:05:47Z",
"pushed_at": "2020-09-29T17:20:12Z",
"stargazers_count": 156,
"watchers_count": 156,
"stargazers_count": 157,
"watchers_count": 157,
"forks_count": 52,
"forks": 52,
"watchers": 156,
"watchers": 157,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "PoC for CVE-2020-6287 The PoC in python for add user only, no administrator permission set. Inspired by @zeroSteiner from metasploit. Original Metasploit PR module: https:\/\/github.com\/rapid7\/metasploit-framework\/pull\/13852\/commits\/d1e2c75b3eafa7f62a6aba9fbe6220c8da97baa8 This PoC only create user with unauthentication permission and no more administrator permission set. This project is created only for educational purposes and cannot be used for law violation or personal gain. The author of this project is not responsible for any possible harm caused by the materials of this project. Original finding: CVE-2020-6287: Pablo Artuso CVE-2020-6286: Yvan 'iggy' G. Usage: python sap-CVE-2020-6287-add-user.py <HTTP(s):\/\/IP:Port",
"fork": false,
"created_at": "2020-07-20T18:45:53Z",
"updated_at": "2021-02-15T18:24:09Z",
"updated_at": "2021-03-02T13:28:36Z",
"pushed_at": "2020-07-21T18:50:07Z",
"stargazers_count": 75,
"watchers_count": 75,
"stargazers_count": 76,
"watchers_count": 76,
"forks_count": 21,
"forks": 21,
"watchers": 75,
"watchers": 76,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-08-15T14:29:49Z",
"updated_at": "2021-02-26T23:09:37Z",
"updated_at": "2021-03-02T13:13:12Z",
"pushed_at": "2020-08-16T01:04:01Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 3,
"forks": 3,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE 2021-21315 PoC",
"fork": false,
"created_at": "2021-03-01T18:52:41Z",
"updated_at": "2021-03-02T08:46:37Z",
"updated_at": "2021-03-02T15:13:00Z",
"pushed_at": "2021-03-02T00:27:47Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 0,
"forks": 0,
"watchers": 8,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 1,
"forks": 1,
"watchers": 17,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "CVE-2021-21972 Exploit",
"fork": false,
"created_at": "2021-02-24T11:14:58Z",
"updated_at": "2021-03-02T07:44:45Z",
"updated_at": "2021-03-02T10:11:28Z",
"pushed_at": "2021-02-28T03:59:59Z",
"stargazers_count": 184,
"watchers_count": 184,
"stargazers_count": 185,
"watchers_count": 185,
"forks_count": 69,
"forks": 69,
"watchers": 184,
"watchers": 185,
"score": 0
},
{
@ -174,13 +174,13 @@
"description": "CVE-2021-21972",
"fork": false,
"created_at": "2021-02-25T05:16:38Z",
"updated_at": "2021-03-01T23:20:29Z",
"updated_at": "2021-03-02T10:10:10Z",
"pushed_at": "2021-03-01T03:38:00Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 3,
"forks": 3,
"watchers": 17,
"watchers": 18,
"score": 0
},
{
@ -312,13 +312,13 @@
"description": "Nmap script to check vulnerability CVE-2021-21972",
"fork": false,
"created_at": "2021-02-26T21:30:50Z",
"updated_at": "2021-03-02T08:47:07Z",
"updated_at": "2021-03-02T14:40:15Z",
"pushed_at": "2021-03-01T23:04:04Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 5,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2021-02-15T14:41:25Z",
"updated_at": "2021-02-27T00:57:45Z",
"updated_at": "2021-03-02T15:14:01Z",
"pushed_at": "2021-02-15T15:11:00Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 4,
"forks": 4,
"watchers": 17,
"watchers": 18,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Chaining CVE-2021-25281 and CVE-2021-25282 to exploit a SaltStack",
"fork": false,
"created_at": "2021-02-26T12:08:25Z",
"updated_at": "2021-03-02T03:26:29Z",
"updated_at": "2021-03-02T10:02:08Z",
"pushed_at": "2021-02-26T14:49:46Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 3,
"forks": 3,
"watchers": 15,
"watchers": 16,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2021-03-01T16:45:42Z",
"updated_at": "2021-03-02T08:10:06Z",
"updated_at": "2021-03-02T13:36:41Z",
"pushed_at": "2021-03-02T07:45:20Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"watchers": 9,
"score": 0
}
]

View file

@ -335,13 +335,13 @@
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
"fork": false,
"created_at": "2021-01-30T03:22:04Z",
"updated_at": "2021-03-02T07:59:22Z",
"updated_at": "2021-03-02T13:19:54Z",
"pushed_at": "2021-02-08T03:42:50Z",
"stargazers_count": 360,
"watchers_count": 360,
"stargazers_count": 361,
"watchers_count": 361,
"forks_count": 95,
"forks": 95,
"watchers": 360,
"watchers": 361,
"score": 0
},
{

25
2021/CVE-2021-9999.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 343728368,
"name": "CVE-2021-9999",
"full_name": "GG-o1\/CVE-2021-9999",
"owner": {
"login": "GG-o1",
"id": 32947015,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32947015?v=4",
"html_url": "https:\/\/github.com\/GG-o1"
},
"html_url": "https:\/\/github.com\/GG-o1\/CVE-2021-9999",
"description": null,
"fork": false,
"created_at": "2021-03-02T10:06:39Z",
"updated_at": "2021-03-02T10:06:41Z",
"pushed_at": "2021-03-02T10:06:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -183,6 +183,9 @@ A cross-site scripting (XSS) vulnerability in Pryaniki 6.44.3 allows remote auth
- [jet-pentest/CVE-2021-3395](https://github.com/jet-pentest/CVE-2021-3395)
### CVE-2021-9999
- [GG-o1/CVE-2021-9999](https://github.com/GG-o1/CVE-2021-9999)
### CVE-2021-21014 (2021-02-11)
<code>