Auto Update 2021/01/25 18:10:12

This commit is contained in:
motikan2010-bot 2021-01-25 18:10:12 +09:00
parent b11e0e48e9
commit d05a121058
21 changed files with 143 additions and 119 deletions

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-01-25T01:34:16Z",
"updated_at": "2021-01-25T03:38:14Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 892,
"watchers_count": 892,
"stargazers_count": 893,
"watchers_count": 893,
"forks_count": 209,
"forks": 209,
"watchers": 892,
"watchers": 893,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-01-25T01:34:16Z",
"updated_at": "2021-01-25T03:38:14Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 892,
"watchers_count": 892,
"stargazers_count": 893,
"watchers_count": 893,
"forks_count": 209,
"forks": 209,
"watchers": 892,
"watchers": 893,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-01-25T01:34:16Z",
"updated_at": "2021-01-25T03:38:14Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 892,
"watchers_count": 892,
"stargazers_count": 893,
"watchers_count": 893,
"forks_count": 209,
"forks": 209,
"watchers": 892,
"watchers": 893,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Chrome < 62 uxss exploit (CVE-2017-5124)",
"fork": false,
"created_at": "2017-11-13T21:33:55Z",
"updated_at": "2020-12-18T03:59:38Z",
"updated_at": "2021-01-25T08:24:21Z",
"pushed_at": "2017-11-14T10:26:28Z",
"stargazers_count": 157,
"watchers_count": 157,
"stargazers_count": 159,
"watchers_count": 159,
"forks_count": 36,
"forks": 36,
"watchers": 157,
"watchers": 159,
"score": 0
}
]

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-01-25T01:34:16Z",
"updated_at": "2021-01-25T03:38:14Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 892,
"watchers_count": 892,
"stargazers_count": 893,
"watchers_count": 893,
"forks_count": 209,
"forks": 209,
"watchers": 892,
"watchers": 893,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "CVE-2018-8120 Windows LPE exploit",
"fork": false,
"created_at": "2018-05-19T02:43:15Z",
"updated_at": "2021-01-22T09:15:52Z",
"updated_at": "2021-01-25T03:33:07Z",
"pushed_at": "2018-05-30T13:09:54Z",
"stargazers_count": 446,
"watchers_count": 446,
"forks_count": 205,
"forks": 205,
"watchers": 446,
"stargazers_count": 447,
"watchers_count": 447,
"forks_count": 206,
"forks": 206,
"watchers": 447,
"score": 0
},
{
@ -86,8 +86,8 @@
"pushed_at": "2018-08-08T05:48:24Z",
"stargazers_count": 278,
"watchers_count": 278,
"forks_count": 120,
"forks": 120,
"forks_count": 121,
"forks": 121,
"watchers": 278,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-01-24T08:55:38Z",
"updated_at": "2021-01-25T08:31:26Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2292,
"watchers_count": 2292,
"stargazers_count": 2294,
"watchers_count": 2294,
"forks_count": 643,
"forks": 643,
"watchers": 2292,
"watchers": 2294,
"score": 0
},
{

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-01-25T01:34:16Z",
"updated_at": "2021-01-25T03:38:14Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 892,
"watchers_count": 892,
"stargazers_count": 893,
"watchers_count": 893,
"forks_count": 209,
"forks": 209,
"watchers": 892,
"watchers": 893,
"score": 0
}
]

View file

@ -293,8 +293,8 @@
"pushed_at": "2019-06-21T01:44:11Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 8,
"forks": 8,
"forks_count": 9,
"forks": 9,
"watchers": 10,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege",
"fork": false,
"created_at": "2020-02-11T16:42:34Z",
"updated_at": "2021-01-25T00:23:30Z",
"updated_at": "2021-01-25T08:09:22Z",
"pushed_at": "2020-02-11T21:34:28Z",
"stargazers_count": 239,
"watchers_count": 239,
"stargazers_count": 243,
"watchers_count": 243,
"forks_count": 49,
"forks": 49,
"watchers": 239,
"watchers": 243,
"score": 0
}
]

View file

@ -1347,13 +1347,13 @@
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
"fork": false,
"created_at": "2020-06-10T16:44:39Z",
"updated_at": "2021-01-20T09:04:14Z",
"updated_at": "2021-01-25T07:50:55Z",
"pushed_at": "2021-01-15T19:21:25Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 77,
"watchers_count": 77,
"forks_count": 32,
"forks": 32,
"watchers": 76,
"watchers": 77,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2021-01-24T13:52:30Z",
"updated_at": "2021-01-25T07:56:20Z",
"pushed_at": "2020-10-21T12:10:28Z",
"stargazers_count": 1229,
"watchers_count": 1229,
"forks_count": 286,
"forks": 286,
"watchers": 1229,
"stargazers_count": 1230,
"watchers_count": 1230,
"forks_count": 287,
"forks": 287,
"watchers": 1230,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2021-01-24T23:08:10Z",
"updated_at": "2021-01-25T07:57:35Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 740,
"watchers_count": 740,
"forks_count": 216,
"forks": 216,
"watchers": 740,
"stargazers_count": 741,
"watchers_count": 741,
"forks_count": 217,
"forks": 217,
"watchers": 741,
"score": 0
},
{
@ -105,13 +105,13 @@
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
"fork": false,
"created_at": "2020-09-14T16:57:49Z",
"updated_at": "2021-01-23T21:18:48Z",
"updated_at": "2021-01-25T04:55:28Z",
"pushed_at": "2020-11-05T16:37:20Z",
"stargazers_count": 171,
"watchers_count": 171,
"stargazers_count": 172,
"watchers_count": 172,
"forks_count": 39,
"forks": 39,
"watchers": 171,
"watchers": 172,
"score": 0
},
{
@ -128,13 +128,13 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2021-01-22T14:50:05Z",
"updated_at": "2021-01-25T07:56:32Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 269,
"watchers_count": 269,
"forks_count": 90,
"forks": 90,
"watchers": 269,
"stargazers_count": 270,
"watchers_count": 270,
"forks_count": 91,
"forks": 91,
"watchers": 270,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-01-24T08:55:38Z",
"updated_at": "2021-01-25T08:31:26Z",
"pushed_at": "2020-11-07T05:55:00Z",
"stargazers_count": 2292,
"watchers_count": 2292,
"stargazers_count": 2294,
"watchers_count": 2294,
"forks_count": 643,
"forks": 643,
"watchers": 2292,
"watchers": 2294,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": "Vulmap - Web vulnerability scanning and verification tools支持扫描 activemq, flink, shiro, solr, struts2, tomcat, unomi, drupal, elasticsearch, nexus, weblogic, jboss, thinkphp并且具备漏洞利用功能。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883, S2-061, CVE-2020-13942, CVE-2020-17530, CVE-2020-17518, CVE-2020-17519",
"fork": false,
"created_at": "2020-10-09T06:34:36Z",
"updated_at": "2021-01-25T02:44:01Z",
"updated_at": "2021-01-25T08:38:16Z",
"pushed_at": "2021-01-22T13:23:09Z",
"stargazers_count": 808,
"watchers_count": 808,
"stargazers_count": 817,
"watchers_count": 817,
"forks_count": 146,
"forks": 146,
"watchers": 808,
"watchers": 817,
"score": 0
},
{
@ -519,13 +519,13 @@
"description": "CodeTest信息收集和漏洞利用工具可在进行渗透测试之时方便利用相关信息收集脚本进行信息的获取和验证工作漏洞利用模块可选择需要测试的漏洞模块或者选择所有模块测试包含CVE-2020-14882, CVE-2020-2555等可自己收集脚本后按照模板进行修改。",
"fork": false,
"created_at": "2020-12-29T09:11:31Z",
"updated_at": "2021-01-20T06:47:18Z",
"pushed_at": "2021-01-20T06:47:15Z",
"stargazers_count": 21,
"watchers_count": 21,
"updated_at": "2021-01-25T08:54:10Z",
"pushed_at": "2021-01-25T07:54:23Z",
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 5,
"forks": 5,
"watchers": 21,
"watchers": 22,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-12-09T09:53:08Z",
"updated_at": "2020-12-24T03:40:47Z",
"updated_at": "2021-01-25T08:00:46Z",
"pushed_at": "2020-12-09T09:57:45Z",
"stargazers_count": 64,
"watchers_count": 64,
"stargazers_count": 65,
"watchers_count": 65,
"forks_count": 13,
"forks": 13,
"watchers": 64,
"watchers": 65,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "Cnvd-2020-10487 \/ cve-2020-1938, scanner tool",
"fork": false,
"created_at": "2020-02-20T21:00:15Z",
"updated_at": "2020-12-21T07:42:44Z",
"updated_at": "2021-01-25T05:19:04Z",
"pushed_at": "2020-02-24T12:06:08Z",
"stargazers_count": 208,
"watchers_count": 208,
"stargazers_count": 209,
"watchers_count": 209,
"forks_count": 91,
"forks": 91,
"watchers": 208,
"watchers": 209,
"score": 0
},
{
@ -155,8 +155,8 @@
"pushed_at": "2020-02-21T10:19:52Z",
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 14,
"forks": 14,
"forks_count": 13,
"forks": 13,
"watchers": 23,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-01-25T01:34:16Z",
"updated_at": "2021-01-25T03:38:14Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 892,
"watchers_count": 892,
"stargazers_count": 893,
"watchers_count": 893,
"forks_count": 209,
"forks": 209,
"watchers": 892,
"watchers": 893,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)",
"fork": false,
"created_at": "2021-01-23T19:07:18Z",
"updated_at": "2021-01-25T01:20:53Z",
"updated_at": "2021-01-25T08:52:41Z",
"pushed_at": "2021-01-24T09:05:40Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"forks": 2,
"watchers": 3,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 9,
"forks": 9,
"watchers": 8,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)",
"fork": false,
"created_at": "2020-07-15T15:20:09Z",
"updated_at": "2021-01-22T16:17:36Z",
"updated_at": "2021-01-25T04:25:23Z",
"pushed_at": "2020-09-29T17:20:12Z",
"stargazers_count": 147,
"watchers_count": 147,
"stargazers_count": 148,
"watchers_count": 148,
"forks_count": 48,
"forks": 48,
"watchers": 147,
"watchers": 148,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2021-2109 && Weblogic Server RCE via JNDI",
"fork": false,
"created_at": "2021-01-22T05:37:11Z",
"updated_at": "2021-01-25T03:06:19Z",
"updated_at": "2021-01-25T08:24:38Z",
"pushed_at": "2021-01-22T05:52:26Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 0,
"forks": 0,
"watchers": 7,
"watchers": 8,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exploit for CVE-2021-3129",
"fork": false,
"created_at": "2021-01-13T12:52:20Z",
"updated_at": "2021-01-22T03:18:07Z",
"updated_at": "2021-01-25T06:00:00Z",
"pushed_at": "2021-01-13T13:25:10Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 2,
"forks": 2,
"watchers": 8,
"watchers": 9,
"score": 0
},
{
@ -36,13 +36,36 @@
"description": "Laravel debug rce",
"fork": false,
"created_at": "2021-01-22T05:12:21Z",
"updated_at": "2021-01-25T00:21:53Z",
"updated_at": "2021-01-25T08:37:10Z",
"pushed_at": "2021-01-24T05:28:07Z",
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 10,
"forks": 10,
"watchers": 31,
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 11,
"forks": 11,
"watchers": 35,
"score": 0
},
{
"id": 332682252,
"name": "laravel-CVE-2021-3129-EXP",
"full_name": "SecPros-Team\/laravel-CVE-2021-3129-EXP",
"owner": {
"login": "SecPros-Team",
"id": 77960183,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77960183?v=4",
"html_url": "https:\/\/github.com\/SecPros-Team"
},
"html_url": "https:\/\/github.com\/SecPros-Team\/laravel-CVE-2021-3129-EXP",
"description": null,
"fork": false,
"created_at": "2021-01-25T08:42:28Z",
"updated_at": "2021-01-25T09:02:05Z",
"pushed_at": "2021-01-25T08:49:59Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -44,6 +44,7 @@ Ignition before 2.5.2, as used in Laravel and other products, allows unauthentic
- [ambionics/laravel-exploits](https://github.com/ambionics/laravel-exploits)
- [SNCKER/CVE-2021-3129](https://github.com/SNCKER/CVE-2021-3129)
- [SecPros-Team/laravel-CVE-2021-3129-EXP](https://github.com/SecPros-Team/laravel-CVE-2021-3129-EXP)
### CVE-2021-3130 (2021-01-20)