Auto Update 2021/02/19 12:08:48

This commit is contained in:
motikan2010-bot 2021-02-19 12:08:48 +09:00
parent c477f27dae
commit d07e557a75
20 changed files with 209 additions and 104 deletions

25
2003/CVE-2003-0222.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 164414012,
"name": "CVE-2003-0222",
"full_name": "phamthanhsang280477\/CVE-2003-0222",
"owner": {
"login": "phamthanhsang280477",
"id": 45278781,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45278781?v=4",
"html_url": "https:\/\/github.com\/phamthanhsang280477"
},
"html_url": "https:\/\/github.com\/phamthanhsang280477\/CVE-2003-0222",
"description": "CVE-2003-0222",
"fork": false,
"created_at": "2019-01-07T10:09:07Z",
"updated_at": "2019-01-07T10:09:07Z",
"pushed_at": "2019-01-07T10:09:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -44,5 +44,97 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 162499093,
"name": "CVE-2003-0264",
"full_name": "war4uthor\/CVE-2003-0264",
"owner": {
"login": "war4uthor",
"id": 45926018,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45926018?v=4",
"html_url": "https:\/\/github.com\/war4uthor"
},
"html_url": "https:\/\/github.com\/war4uthor\/CVE-2003-0264",
"description": "CVE-2003-0264 - SLMail 5.5 POP3 'PASS' Remote Buffer Overflow Vulnerability. Tested on Windows XP Professional SP3.",
"fork": false,
"created_at": "2018-12-19T22:49:13Z",
"updated_at": "2018-12-19T22:50:49Z",
"pushed_at": "2018-12-19T22:50:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 247077498,
"name": "CVE-2003-0264-SLmail-5.5",
"full_name": "pwncone\/CVE-2003-0264-SLmail-5.5",
"owner": {
"login": "pwncone",
"id": 57570315,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57570315?v=4",
"html_url": "https:\/\/github.com\/pwncone"
},
"html_url": "https:\/\/github.com\/pwncone\/CVE-2003-0264-SLmail-5.5",
"description": "A POC remote buffer overflow for CVE-2003-0264 - SLMail 5.5",
"fork": false,
"created_at": "2020-03-13T13:27:56Z",
"updated_at": "2020-03-13T13:31:38Z",
"pushed_at": "2020-03-13T13:31:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 323381650,
"name": "CVE-2003-0264",
"full_name": "PepeTheRital\/CVE-2003-0264",
"owner": {
"login": "PepeTheRital",
"id": 65770864,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65770864?v=4",
"html_url": "https:\/\/github.com\/PepeTheRital"
},
"html_url": "https:\/\/github.com\/PepeTheRital\/CVE-2003-0264",
"description": "Exploit CVE-2003-0264 ",
"fork": false,
"created_at": "2020-12-21T15:52:32Z",
"updated_at": "2021-01-12T20:46:38Z",
"pushed_at": "2020-12-21T15:58:46Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 326101078,
"name": "pop3_SLmail-exploit",
"full_name": "medn1c\/pop3_SLmail-exploit",
"owner": {
"login": "medn1c",
"id": 74918589,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74918589?v=4",
"html_url": "https:\/\/github.com\/medn1c"
},
"html_url": "https:\/\/github.com\/medn1c\/pop3_SLmail-exploit",
"description": "Um exploit de buffer overflow para SLmail-5.5 pop3 service CVE-2003-0264 ",
"fork": false,
"created_at": "2021-01-02T03:30:54Z",
"updated_at": "2021-02-11T18:07:18Z",
"pushed_at": "2021-02-11T18:07:15Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "海康威视未授权访问检测poc及口令爆破",
"fork": false,
"created_at": "2020-11-12T09:02:10Z",
"updated_at": "2021-01-08T07:10:54Z",
"updated_at": "2021-02-19T02:51:44Z",
"pushed_at": "2020-11-19T08:58:04Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 2,
"forks": 2,
"watchers": 19,
"watchers": 20,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Test CVE-2018-0296 and extract usernames",
"fork": false,
"created_at": "2018-06-21T08:36:34Z",
"updated_at": "2020-11-13T03:19:23Z",
"updated_at": "2021-02-19T00:12:27Z",
"pushed_at": "2018-12-09T11:57:20Z",
"stargazers_count": 105,
"watchers_count": 105,
"stargazers_count": 106,
"watchers_count": 106,
"forks_count": 39,
"forks": 39,
"watchers": 105,
"watchers": 106,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2018-15133 (Laravel unserialize vulnerability)",
"fork": false,
"created_at": "2018-08-14T18:51:50Z",
"updated_at": "2021-02-18T11:32:01Z",
"updated_at": "2021-02-18T21:55:28Z",
"pushed_at": "2018-09-27T07:32:19Z",
"stargazers_count": 215,
"watchers_count": 215,
"stargazers_count": 216,
"watchers_count": 216,
"forks_count": 40,
"forks": 40,
"watchers": 215,
"watchers": 216,
"score": 0
},
{

View file

@ -473,8 +473,8 @@
"description": null,
"fork": false,
"created_at": "2020-10-18T14:01:59Z",
"updated_at": "2021-02-18T15:18:54Z",
"pushed_at": "2021-02-18T15:18:52Z",
"updated_at": "2021-02-19T02:55:48Z",
"pushed_at": "2021-02-19T02:55:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -67,5 +67,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 340239658,
"name": "CVE-2019-1458",
"full_name": "Eternit7\/CVE-2019-1458",
"owner": {
"login": "Eternit7",
"id": 30485227,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30485227?v=4",
"html_url": "https:\/\/github.com\/Eternit7"
},
"html_url": "https:\/\/github.com\/Eternit7\/CVE-2019-1458",
"description": null,
"fork": false,
"created_at": "2021-02-19T02:44:27Z",
"updated_at": "2021-02-19T02:44:27Z",
"pushed_at": "2021-02-19T02:44:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,27 +1,4 @@
[
{
"id": 172401532,
"name": "CVE-2019-7238",
"full_name": "mpgn\/CVE-2019-7238",
"owner": {
"login": "mpgn",
"id": 5891788,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5891788?v=4",
"html_url": "https:\/\/github.com\/mpgn"
},
"html_url": "https:\/\/github.com\/mpgn\/CVE-2019-7238",
"description": "🐱‍💻 Poc of CVE-2019-7238 - Nexus Repository Manager 3 Remote Code Execution 🐱‍💻",
"fork": false,
"created_at": "2019-02-24T23:09:43Z",
"updated_at": "2020-12-30T11:55:07Z",
"pushed_at": "2019-02-25T07:37:07Z",
"stargazers_count": 137,
"watchers_count": 137,
"forks_count": 45,
"forks": 45,
"watchers": 137,
"score": 0
},
{
"id": 187840869,
"name": "CVE-2019-7238",

View file

@ -13,13 +13,13 @@
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
"fork": false,
"created_at": "2019-02-12T06:02:06Z",
"updated_at": "2021-01-26T14:22:10Z",
"updated_at": "2021-02-19T00:40:16Z",
"pushed_at": "2019-05-09T21:34:26Z",
"stargazers_count": 532,
"watchers_count": 532,
"stargazers_count": 533,
"watchers_count": 533,
"forks_count": 112,
"forks": 112,
"watchers": 532,
"watchers": 533,
"score": 0
}
]

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2020-03-23T09:10:54Z",
"updated_at": "2021-02-16T13:52:27Z",
"pushed_at": "2020-03-24T13:22:30Z",
"pushed_at": "2021-02-18T21:29:07Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 4,

View file

@ -13,13 +13,13 @@
"description": "Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability",
"fork": false,
"created_at": "2020-07-29T19:02:29Z",
"updated_at": "2021-02-18T13:48:46Z",
"updated_at": "2021-02-19T01:21:41Z",
"pushed_at": "2020-11-11T19:48:38Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 4,
"forks": 4,
"watchers": 16,
"watchers": 17,
"score": 0
}
]

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-05-25T08:33:24Z",
"stargazers_count": 88,
"watchers_count": 88,
"forks_count": 18,
"forks": 18,
"forks_count": 19,
"forks": 19,
"watchers": 88,
"score": 0
}

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-09-25T20:55:17Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 5,
"forks": 5,
"forks_count": 6,
"forks": 6,
"watchers": 11,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-36179~82 Jackson-databind SSRF&RCE",
"fork": false,
"created_at": "2021-01-10T06:47:49Z",
"updated_at": "2021-01-28T11:16:56Z",
"updated_at": "2021-02-19T01:20:44Z",
"pushed_at": "2021-01-10T06:48:53Z",
"stargazers_count": 58,
"watchers_count": 58,
"stargazers_count": 59,
"watchers_count": 59,
"forks_count": 7,
"forks": 7,
"watchers": 58,
"watchers": 59,
"score": 0
}
]

View file

@ -83,7 +83,7 @@
"fork": false,
"created_at": "2020-02-24T14:32:24Z",
"updated_at": "2020-05-31T05:18:22Z",
"pushed_at": "2020-02-28T09:12:59Z",
"pushed_at": "2021-02-18T21:26:56Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 1,

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2021-02-15T14:41:25Z",
"updated_at": "2021-02-17T23:54:48Z",
"updated_at": "2021-02-18T22:36:00Z",
"pushed_at": "2021-02-15T15:11:00Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 4,
"forks": 4,
"watchers": 11,
"watchers": 12,
"score": 0
}
]

View file

@ -90,28 +90,5 @@
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 340008922,
"name": "apache_druid_rce_CVE-2021-25646",
"full_name": "hoanx4\/apache_druid_rce_CVE-2021-25646",
"owner": {
"login": "hoanx4",
"id": 54475792,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54475792?v=4",
"html_url": "https:\/\/github.com\/hoanx4"
},
"html_url": "https:\/\/github.com\/hoanx4\/apache_druid_rce_CVE-2021-25646",
"description": null,
"fork": false,
"created_at": "2021-02-18T10:08:55Z",
"updated_at": "2021-02-18T17:09:34Z",
"pushed_at": "2021-02-18T17:09:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -151,13 +151,13 @@
"description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)",
"fork": false,
"created_at": "2021-02-18T05:42:13Z",
"updated_at": "2021-02-18T19:01:33Z",
"updated_at": "2021-02-19T00:36:59Z",
"pushed_at": "2021-02-18T08:30:23Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 3,
"forks": 3,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -335,13 +335,13 @@
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
"fork": false,
"created_at": "2021-01-30T03:22:04Z",
"updated_at": "2021-02-18T08:27:40Z",
"updated_at": "2021-02-18T23:13:15Z",
"pushed_at": "2021-02-08T03:42:50Z",
"stargazers_count": 340,
"watchers_count": 340,
"stargazers_count": 341,
"watchers_count": 341,
"forks_count": 91,
"forks": 91,
"watchers": 340,
"watchers": 341,
"score": 0
},
{
@ -381,13 +381,13 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2021-02-18T09:18:47Z",
"updated_at": "2021-02-18T23:16:33Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 590,
"watchers_count": 590,
"stargazers_count": 591,
"watchers_count": 591,
"forks_count": 165,
"forks": 165,
"watchers": 590,
"watchers": 591,
"score": 0
},
{
@ -749,13 +749,13 @@
"description": "Exploit for Sudo heap overflow (CVE-2021-3156) on Debain 10",
"fork": false,
"created_at": "2021-02-08T18:21:58Z",
"updated_at": "2021-02-18T02:53:22Z",
"updated_at": "2021-02-19T01:41:44Z",
"pushed_at": "2021-02-10T10:15:53Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 0,
"forks": 0,
"watchers": 6,
"watchers": 7,
"score": 0
},
{
@ -818,13 +818,13 @@
"description": "CVE-2021-3156非交互式执行命令",
"fork": false,
"created_at": "2021-02-09T19:25:18Z",
"updated_at": "2021-02-18T16:47:35Z",
"updated_at": "2021-02-19T01:18:02Z",
"pushed_at": "2021-02-09T19:31:33Z",
"stargazers_count": 106,
"watchers_count": 106,
"stargazers_count": 107,
"watchers_count": 107,
"forks_count": 13,
"forks": 13,
"watchers": 106,
"watchers": 107,
"score": 0
},
{

View file

@ -199,7 +199,6 @@ Apache Druid includes the ability to execute user-provided JavaScript code embed
- [lp008/CVE-2021-25646](https://github.com/lp008/CVE-2021-25646)
- [AirEvan/CVE-2021-25646-GUI](https://github.com/AirEvan/CVE-2021-25646-GUI)
- [Vulnmachines/Apache-Druid-CVE-2021-25646](https://github.com/Vulnmachines/Apache-Druid-CVE-2021-25646)
- [hoanx4/apache_druid_rce_CVE-2021-25646](https://github.com/hoanx4/apache_druid_rce_CVE-2021-25646)
### CVE-2021-26121
- [sourceincite/CVE-2021-26121](https://github.com/sourceincite/CVE-2021-26121)
@ -4564,6 +4563,7 @@ An elevation of privilege vulnerability exists in Windows when the Win32k compon
- [piotrflorczyk/cve-2019-1458_POC](https://github.com/piotrflorczyk/cve-2019-1458_POC)
- [unamer/CVE-2019-1458](https://github.com/unamer/CVE-2019-1458)
- [DreamoneOnly/CVE-2019-1458-malware](https://github.com/DreamoneOnly/CVE-2019-1458-malware)
- [Eternit7/CVE-2019-1458](https://github.com/Eternit7/CVE-2019-1458)
### CVE-2019-1476 (2019-12-10)
@ -5177,7 +5177,6 @@ Unauthenticated reflected cross-site scripting (XSS) exists in Zarafa Webapp 2.0
Sonatype Nexus Repository Manager before 3.15.0 has Incorrect Access Control.
</code>
- [mpgn/CVE-2019-7238](https://github.com/mpgn/CVE-2019-7238)
- [jas502n/CVE-2019-7238](https://github.com/jas502n/CVE-2019-7238)
- [verctor/nexus_rce_CVE-2019-7238](https://github.com/verctor/nexus_rce_CVE-2019-7238)
- [magicming200/CVE-2019-7238_Nexus_RCE_Tool](https://github.com/magicming200/CVE-2019-7238_Nexus_RCE_Tool)
@ -17130,6 +17129,14 @@ Nortel Wireless LAN (WLAN) Access Point (AP) 2220, 2221, and 2225 allow remote a
## 2003
### CVE-2003-0222 (2003-04-30)
<code>
Stack-based buffer overflow in Oracle Net Services for Oracle Database Server 9i release 2 and earlier allows attackers to execute arbitrary code via a &quot;CREATE DATABASE LINK&quot; query containing a connect string with a long USING parameter.
</code>
- [phamthanhsang280477/CVE-2003-0222](https://github.com/phamthanhsang280477/CVE-2003-0222)
### CVE-2003-0264 (2003-05-08)
<code>
@ -17138,6 +17145,10 @@ Multiple buffer overflows in SLMail 5.1.0.4420 allows remote attackers to execut
- [adenkiewicz/CVE-2003-0264](https://github.com/adenkiewicz/CVE-2003-0264)
- [fyoderxx/slmail-exploit](https://github.com/fyoderxx/slmail-exploit)
- [war4uthor/CVE-2003-0264](https://github.com/war4uthor/CVE-2003-0264)
- [pwncone/CVE-2003-0264-SLmail-5.5](https://github.com/pwncone/CVE-2003-0264-SLmail-5.5)
- [PepeTheRital/CVE-2003-0264](https://github.com/PepeTheRital/CVE-2003-0264)
- [medn1c/pop3_SLmail-exploit](https://github.com/medn1c/pop3_SLmail-exploit)
### CVE-2003-0282 (2003-05-14)