Auto Update 2021/04/26 00:10:56

This commit is contained in:
motikan2010-bot 2021-04-26 00:10:56 +09:00
parent 647a334bca
commit cda36e1083
24 changed files with 192 additions and 111 deletions

View file

@ -13,13 +13,13 @@
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
"fork": false,
"created_at": "2013-09-22T21:20:31Z",
"updated_at": "2021-04-18T10:49:11Z",
"updated_at": "2021-04-25T13:06:08Z",
"pushed_at": "2017-04-24T14:16:56Z",
"stargazers_count": 300,
"watchers_count": 300,
"forks_count": 93,
"forks": 93,
"watchers": 300,
"stargazers_count": 301,
"watchers_count": 301,
"forks_count": 92,
"forks": 92,
"watchers": 301,
"score": 0
},
{

View file

@ -385,8 +385,8 @@
"pushed_at": "2014-05-09T15:51:53Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 11,
"forks": 11,
"forks_count": 10,
"forks": 10,
"watchers": 6,
"score": 0
},

View file

@ -174,13 +174,13 @@
"description": "Exploiting CVE-2014-3153, AKA Towelroot.",
"fork": false,
"created_at": "2020-10-31T11:39:11Z",
"updated_at": "2021-03-01T16:50:24Z",
"updated_at": "2021-04-25T12:20:10Z",
"pushed_at": "2021-01-16T17:37:12Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -128,13 +128,13 @@
"description": "an impacket-dependent script exploiting CVE-2019-1040",
"fork": false,
"created_at": "2021-01-01T05:59:06Z",
"updated_at": "2021-04-25T03:35:25Z",
"updated_at": "2021-04-25T14:42:09Z",
"pushed_at": "2021-01-01T06:10:58Z",
"stargazers_count": 58,
"watchers_count": 58,
"forks_count": 8,
"forks": 8,
"watchers": 58,
"stargazers_count": 60,
"watchers_count": 60,
"forks_count": 9,
"forks": 9,
"watchers": 60,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "weaponized radare2 vulnerability found by @CaptnBanana and blenk92",
"fork": false,
"created_at": "2019-11-04T22:31:27Z",
"updated_at": "2021-04-24T07:30:01Z",
"updated_at": "2021-04-25T11:26:32Z",
"pushed_at": "2019-11-04T22:46:52Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"watchers": 2,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-04-24T11:00:00Z",
"updated_at": "2021-04-25T11:24:44Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2530,
"watchers_count": 2530,
"stargazers_count": 2529,
"watchers_count": 2529,
"forks_count": 733,
"forks": 733,
"watchers": 2530,
"watchers": 2529,
"score": 0
},
{

View file

@ -114,29 +114,6 @@
"watchers": 0,
"score": 0
},
{
"id": 276656035,
"name": "CVE-2019-18935",
"full_name": "Un4gi\/CVE-2019-18935",
"owner": {
"login": "Un4gi",
"id": 47873286,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47873286?v=4",
"html_url": "https:\/\/github.com\/Un4gi"
},
"html_url": "https:\/\/github.com\/Un4gi\/CVE-2019-18935",
"description": "Files for 2019-18935",
"fork": false,
"created_at": "2020-07-02T13:38:56Z",
"updated_at": "2021-04-25T09:12:27Z",
"pushed_at": "2021-04-25T09:12:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 288791272,
"name": "CVE-2019-18935",

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-05-09T21:34:26Z",
"stargazers_count": 555,
"watchers_count": 555,
"forks_count": 128,
"forks": 128,
"forks_count": 129,
"forks": 129,
"watchers": 555,
"score": 0
},

View file

@ -887,13 +887,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2021-04-21T23:53:02Z",
"updated_at": "2021-04-25T09:59:02Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1110,
"watchers_count": 1110,
"stargazers_count": 1111,
"watchers_count": 1111,
"forks_count": 356,
"forks": 356,
"watchers": 1110,
"watchers": 1111,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code",
"fork": false,
"created_at": "2020-09-03T14:45:51Z",
"updated_at": "2021-03-19T02:06:23Z",
"updated_at": "2021-04-25T12:49:30Z",
"pushed_at": "2020-09-08T20:01:05Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 7,
"forks": 7,
"watchers": 27,
"watchers": 28,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-04-24T11:00:00Z",
"updated_at": "2021-04-25T11:24:44Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2530,
"watchers_count": 2530,
"stargazers_count": 2529,
"watchers_count": 2529,
"forks_count": 733,
"forks": 733,
"watchers": 2530,
"watchers": 2529,
"score": 0
},
{

View file

@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-04-25T05:00:15Z",
"updated_at": "2021-04-25T14:25:40Z",
"pushed_at": "2021-04-24T08:27:02Z",
"stargazers_count": 648,
"watchers_count": 648,
"forks_count": 170,
"forks": 170,
"watchers": 648,
"stargazers_count": 655,
"watchers_count": 655,
"forks_count": 176,
"forks": 176,
"watchers": 655,
"score": 0
}
]

View file

@ -21,5 +21,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 361457294,
"name": "CVE-2020-3161",
"full_name": "uromulouinthehouse\/CVE-2020-3161",
"owner": {
"login": "uromulouinthehouse",
"id": 83171871,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83171871?v=4",
"html_url": "https:\/\/github.com\/uromulouinthehouse"
},
"html_url": "https:\/\/github.com\/uromulouinthehouse\/CVE-2020-3161",
"description": null,
"fork": false,
"created_at": "2021-04-25T14:54:33Z",
"updated_at": "2021-04-25T14:55:34Z",
"pushed_at": "2021-04-25T14:55:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -105,13 +105,36 @@
"description": "CVE-2021-1732 poc & exp; tested on 20H2",
"fork": false,
"created_at": "2021-04-23T08:21:54Z",
"updated_at": "2021-04-25T07:34:42Z",
"updated_at": "2021-04-25T10:00:41Z",
"pushed_at": "2021-04-23T08:28:53Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 7,
"forks": 7,
"watchers": 30,
"watchers": 31,
"score": 0
},
{
"id": 361428612,
"name": "Windows-Privilege-Escalation-CVE-2021-1732",
"full_name": "exploitblizzard\/Windows-Privilege-Escalation-CVE-2021-1732",
"owner": {
"login": "exploitblizzard",
"id": 61627070,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61627070?v=4",
"html_url": "https:\/\/github.com\/exploitblizzard"
},
"html_url": "https:\/\/github.com\/exploitblizzard\/Windows-Privilege-Escalation-CVE-2021-1732",
"description": "Read my blog for more info - ",
"fork": false,
"created_at": "2021-04-25T12:55:15Z",
"updated_at": "2021-04-25T15:12:48Z",
"pushed_at": "2021-04-25T14:16:30Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -13,8 +13,8 @@
"description": "CVE-2021-22192 靶场: 未授权用户 RCE 漏洞",
"fork": false,
"created_at": "2021-03-27T07:09:46Z",
"updated_at": "2021-04-25T02:10:52Z",
"pushed_at": "2021-04-22T09:27:05Z",
"updated_at": "2021-04-25T11:08:16Z",
"pushed_at": "2021-04-25T11:08:14Z",
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 3,

View file

@ -13,13 +13,13 @@
"description": "Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.",
"fork": false,
"created_at": "2021-04-07T11:10:40Z",
"updated_at": "2021-04-21T13:10:47Z",
"updated_at": "2021-04-25T13:23:32Z",
"pushed_at": "2021-04-15T12:46:54Z",
"stargazers_count": 155,
"watchers_count": 155,
"stargazers_count": 156,
"watchers_count": 156,
"forks_count": 33,
"forks": 33,
"watchers": 155,
"watchers": 156,
"score": 0
},
{

View file

@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-04-25T05:00:15Z",
"updated_at": "2021-04-25T14:25:40Z",
"pushed_at": "2021-04-24T08:27:02Z",
"stargazers_count": 648,
"watchers_count": 648,
"forks_count": 170,
"forks": 170,
"watchers": 648,
"stargazers_count": 655,
"watchers_count": 655,
"forks_count": 176,
"forks": 176,
"watchers": 655,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": null,
"fork": false,
"created_at": "2021-03-23T15:25:01Z",
"updated_at": "2021-04-07T05:34:41Z",
"updated_at": "2021-04-25T12:33:54Z",
"pushed_at": "2021-04-01T10:38:18Z",
"stargazers_count": 22,
"watchers_count": 22,

View file

@ -13,13 +13,36 @@
"description": "Apache Solr SSRF(CVE-2021-27905)",
"fork": false,
"created_at": "2021-04-21T09:27:21Z",
"updated_at": "2021-04-23T21:08:16Z",
"updated_at": "2021-04-25T13:35:10Z",
"pushed_at": "2021-04-21T10:00:59Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 11,
"forks": 11,
"watchers": 27,
"watchers": 28,
"score": 0
},
{
"id": 361414198,
"name": "Solr-SSRF",
"full_name": "W2Ning\/Solr-SSRF",
"owner": {
"login": "W2Ning",
"id": 33406415,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33406415?v=4",
"html_url": "https:\/\/github.com\/W2Ning"
},
"html_url": "https:\/\/github.com\/W2Ning\/Solr-SSRF",
"description": "CVE-2021-27905",
"fork": false,
"created_at": "2021-04-25T11:50:19Z",
"updated_at": "2021-04-25T11:50:50Z",
"pushed_at": "2021-04-25T11:50:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": null,
"fork": false,
"created_at": "2021-01-25T08:42:28Z",
"updated_at": "2021-04-11T09:16:02Z",
"updated_at": "2021-04-25T14:13:29Z",
"pushed_at": "2021-01-25T08:49:59Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 1,
"forks": 1,
"watchers": 7,
"watchers": 8,
"score": 0
},
{

View file

@ -381,13 +381,13 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2021-04-25T04:53:24Z",
"updated_at": "2021-04-25T14:17:16Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 694,
"watchers_count": 694,
"forks_count": 198,
"forks": 198,
"watchers": 694,
"stargazers_count": 696,
"watchers_count": 696,
"forks_count": 199,
"forks": 199,
"watchers": 696,
"score": 0
},
{
@ -887,13 +887,13 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
"updated_at": "2021-04-24T16:10:43Z",
"updated_at": "2021-04-25T11:47:01Z",
"pushed_at": "2021-03-30T14:44:38Z",
"stargazers_count": 282,
"watchers_count": 282,
"stargazers_count": 283,
"watchers_count": 283,
"forks_count": 46,
"forks": 46,
"watchers": 282,
"watchers": 283,
"score": 0
},
{

25
2021/CVE-2021-3291.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 361407419,
"name": "CVE-2021-3291",
"full_name": "ImHades101\/CVE-2021-3291",
"owner": {
"login": "ImHades101",
"id": 52188500,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52188500?v=4",
"html_url": "https:\/\/github.com\/ImHades101"
},
"html_url": "https:\/\/github.com\/ImHades101\/CVE-2021-3291",
"description": "rebuild cve",
"fork": false,
"created_at": "2021-04-25T11:18:09Z",
"updated_at": "2021-04-25T11:42:29Z",
"pushed_at": "2021-04-25T11:42:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Ubuntu OverlayFS Local Privesc",
"fork": false,
"created_at": "2021-04-19T20:07:01Z",
"updated_at": "2021-04-25T05:26:04Z",
"updated_at": "2021-04-25T11:04:10Z",
"pushed_at": "2021-04-20T00:46:14Z",
"stargazers_count": 120,
"watchers_count": 120,
"forks_count": 40,
"forks": 40,
"watchers": 120,
"stargazers_count": 121,
"watchers_count": 121,
"forks_count": 42,
"forks": 42,
"watchers": 121,
"score": 0
},
{

View file

@ -47,6 +47,7 @@ Windows Win32k Elevation of Privilege Vulnerability This CVE ID is unique from C
- [oneoy/CVE-2021-1732-Exploit](https://github.com/oneoy/CVE-2021-1732-Exploit)
- [ltfafei/CVE-2021-1732_exp](https://github.com/ltfafei/CVE-2021-1732_exp)
- [Pai-Po/CVE-2021-1732](https://github.com/Pai-Po/CVE-2021-1732)
- [exploitblizzard/Windows-Privilege-Escalation-CVE-2021-1732](https://github.com/exploitblizzard/Windows-Privilege-Escalation-CVE-2021-1732)
### CVE-2021-1782 (2021-04-02)
@ -211,6 +212,14 @@ Denial of service in ASUSWRT ASUS RT-AX3000 firmware versions 3.0.0.4.384_10177
- [fullbbadda1208/CVE-2021-3229](https://github.com/fullbbadda1208/CVE-2021-3229)
### CVE-2021-3291 (2021-01-26)
<code>
Zen Cart 1.5.7b allows admins to execute arbitrary OS commands by inspecting an HTML radio input element (within the modules edit page) and inserting a command.
</code>
- [ImHades101/CVE-2021-3291](https://github.com/ImHades101/CVE-2021-3291)
### CVE-2021-3297 (2021-01-26)
<code>
@ -809,6 +818,7 @@ The ReplicationHandler (normally registered at &quot;/replication&quot; under a
</code>
- [Henry4E36/Solr-SSRF](https://github.com/Henry4E36/Solr-SSRF)
- [W2Ning/Solr-SSRF](https://github.com/W2Ning/Solr-SSRF)
### CVE-2021-27928 (2021-03-18)
@ -1752,6 +1762,7 @@ A vulnerability in the web server for Cisco IP Phones could allow an unauthentic
</code>
- [abood05972/CVE-2020-3161](https://github.com/abood05972/CVE-2020-3161)
- [uromulouinthehouse/CVE-2020-3161](https://github.com/uromulouinthehouse/CVE-2020-3161)
### CVE-2020-3187 (2020-05-06)
@ -8396,7 +8407,6 @@ Progress Telerik UI for ASP.NET AJAX through 2019.3.1023 contains a .NET deseria
- [becrevex/Telerik_CVE-2019-18935](https://github.com/becrevex/Telerik_CVE-2019-18935)
- [ThanHuuTuan/Telerik_CVE-2019-18935](https://github.com/ThanHuuTuan/Telerik_CVE-2019-18935)
- [ThanHuuTuan/CVE_2019_18935](https://github.com/ThanHuuTuan/CVE_2019_18935)
- [Un4gi/CVE-2019-18935](https://github.com/Un4gi/CVE-2019-18935)
- [murataydemir/CVE-2019-18935](https://github.com/murataydemir/CVE-2019-18935)
- [random-robbie/CVE-2019-18935](https://github.com/random-robbie/CVE-2019-18935)