Auto Update 2021/05/12 00:12:55

This commit is contained in:
motikan2010-bot 2021-05-12 00:12:55 +09:00
parent ee63a7c351
commit d4def1d1c8
39 changed files with 384 additions and 117 deletions

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-05-11T08:58:22Z",
"updated_at": "2021-05-11T11:13:35Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1024,
"watchers_count": 1024,
"stargazers_count": 1025,
"watchers_count": 1025,
"forks_count": 231,
"forks": 231,
"watchers": 1024,
"watchers": 1025,
"score": 0
},
{

View file

@ -63,8 +63,8 @@
"pushed_at": "2018-04-07T01:10:06Z",
"stargazers_count": 74,
"watchers_count": 74,
"forks_count": 40,
"forks": 40,
"forks_count": 41,
"forks": 41,
"watchers": 74,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-05-11T08:58:22Z",
"updated_at": "2021-05-11T11:13:35Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1024,
"watchers_count": 1024,
"stargazers_count": 1025,
"watchers_count": 1025,
"forks_count": 231,
"forks": 231,
"watchers": 1024,
"watchers": 1025,
"score": 0
},
{

View file

@ -1,4 +1,73 @@
[
{
"id": 80148945,
"name": "extra_recipe",
"full_name": "maximehip\/extra_recipe",
"owner": {
"login": "maximehip",
"id": 6273425,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6273425?v=4",
"html_url": "https:\/\/github.com\/maximehip"
},
"html_url": "https:\/\/github.com\/maximehip\/extra_recipe",
"description": "Ian Beer's exploit for CVE-2017-2370 (kernel memory r\/w on iOS 10.2) https:\/\/bugs.chromium.org\/p\/project-zero\/issues\/detail?id=1004",
"fork": false,
"created_at": "2017-01-26T19:47:43Z",
"updated_at": "2017-01-26T19:48:19Z",
"pushed_at": "2017-01-26T19:48:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 80717942,
"name": "extra_recipe",
"full_name": "JackBro\/extra_recipe",
"owner": {
"login": "JackBro",
"id": 21210712,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21210712?v=4",
"html_url": "https:\/\/github.com\/JackBro"
},
"html_url": "https:\/\/github.com\/JackBro\/extra_recipe",
"description": "Ian Beer's exploit for CVE-2017-2370 (kernel memory r\/w on iOS 10.2)",
"fork": false,
"created_at": "2017-02-02T11:16:38Z",
"updated_at": "2017-10-14T08:34:32Z",
"pushed_at": "2017-01-27T17:44:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 81874110,
"name": "extra_recipe-iOS-10.2",
"full_name": "Rootkitsmm-zz\/extra_recipe-iOS-10.2",
"owner": {
"login": "Rootkitsmm-zz",
"id": 5567904,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5567904?v=4",
"html_url": "https:\/\/github.com\/Rootkitsmm-zz"
},
"html_url": "https:\/\/github.com\/Rootkitsmm-zz\/extra_recipe-iOS-10.2",
"description": "CVE-2017-2370",
"fork": false,
"created_at": "2017-02-13T21:32:40Z",
"updated_at": "2019-01-03T05:45:15Z",
"pushed_at": "2017-02-01T11:36:26Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 4,
"forks": 4,
"watchers": 1,
"score": 0
},
{
"id": 142854846,
"name": "CVE-2017-2370",

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-05-11T08:58:22Z",
"updated_at": "2021-05-11T11:13:35Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1024,
"watchers_count": 1024,
"stargazers_count": 1025,
"watchers_count": 1025,
"forks_count": 231,
"forks": 231,
"watchers": 1024,
"watchers": 1025,
"score": 0
}
]

25
2017/CVE-2017-3730.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 79682713,
"name": "CVE-2017-3730",
"full_name": "guidovranken\/CVE-2017-3730",
"owner": {
"login": "guidovranken",
"id": 6846644,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6846644?v=4",
"html_url": "https:\/\/github.com\/guidovranken"
},
"html_url": "https:\/\/github.com\/guidovranken\/CVE-2017-3730",
"description": "OpenSSL CVE-2017-3730 proof-of-concept",
"fork": false,
"created_at": "2017-01-22T00:40:34Z",
"updated_at": "2018-12-04T20:01:55Z",
"pushed_at": "2017-01-26T01:30:54Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 6,
"forks": 6,
"watchers": 11,
"score": 0
}
]

View file

@ -1,4 +1,27 @@
[
{
"id": 84158718,
"name": "S2-045",
"full_name": "PolarisLab\/S2-045",
"owner": {
"login": "PolarisLab",
"id": 25890110,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25890110?v=4",
"html_url": "https:\/\/github.com\/PolarisLab"
},
"html_url": "https:\/\/github.com\/PolarisLab\/S2-045",
"description": "Struts2 S2-045CVE-2017-5638Vulnerability environment - http:\/\/www.mottoin.com\/97954.html",
"fork": false,
"created_at": "2017-03-07T05:30:30Z",
"updated_at": "2020-09-22T06:33:06Z",
"pushed_at": "2017-03-07T05:37:55Z",
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 12,
"forks": 12,
"watchers": 23,
"score": 0
},
{
"id": 84186490,
"name": "Struts2-045-Exp",
@ -22,6 +45,29 @@
"watchers": 61,
"score": 0
},
{
"id": 84277596,
"name": "cve-2017-5638",
"full_name": "bongbongco\/cve-2017-5638",
"owner": {
"login": "bongbongco",
"id": 3170006,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3170006?v=4",
"html_url": "https:\/\/github.com\/bongbongco"
},
"html_url": "https:\/\/github.com\/bongbongco\/cve-2017-5638",
"description": null,
"fork": false,
"created_at": "2017-03-08T04:17:33Z",
"updated_at": "2017-03-08T04:31:28Z",
"pushed_at": "2017-03-08T04:31:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 84481525,
"name": "S2-045-EXP-POC-TOOLS",

View file

@ -113,5 +113,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 366358015,
"name": "CVE-2018-0114",
"full_name": "scumdestroy\/CVE-2018-0114",
"owner": {
"login": "scumdestroy",
"id": 35894688,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35894688?v=4",
"html_url": "https:\/\/github.com\/scumdestroy"
},
"html_url": "https:\/\/github.com\/scumdestroy\/CVE-2018-0114",
"description": "Exploit for Node-jose < 0.11.0 written in Ruby",
"fork": false,
"created_at": "2021-05-11T11:29:15Z",
"updated_at": "2021-05-11T11:31:03Z",
"pushed_at": "2021-05-11T11:31:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-08-18T00:00:15Z",
"stargazers_count": 438,
"watchers_count": 438,
"forks_count": 150,
"forks": 150,
"forks_count": 151,
"forks": 151,
"watchers": 438,
"score": 0
},

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-05-11T08:58:22Z",
"updated_at": "2021-05-11T11:13:35Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1024,
"watchers_count": 1024,
"stargazers_count": 1025,
"watchers_count": 1025,
"forks_count": 231,
"forks": 231,
"watchers": 1024,
"watchers": 1025,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "A WebKit exploit using CVE-2018-4441 to obtain RCE on PS4 6.20.",
"fork": false,
"created_at": "2019-03-08T18:06:10Z",
"updated_at": "2021-03-15T01:45:20Z",
"updated_at": "2021-05-11T13:34:08Z",
"pushed_at": "2019-03-08T18:42:56Z",
"stargazers_count": 197,
"watchers_count": 197,
"forks_count": 53,
"forks": 53,
"watchers": 197,
"stargazers_count": 198,
"watchers_count": 198,
"forks_count": 54,
"forks": 54,
"watchers": 198,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-03-10T18:33:43Z",
"stargazers_count": 210,
"watchers_count": 210,
"forks_count": 60,
"forks": 60,
"forks_count": 61,
"forks": 61,
"watchers": 210,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-05-10T07:54:29Z",
"updated_at": "2021-05-11T13:45:18Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2556,
"watchers_count": 2556,
"stargazers_count": 2557,
"watchers_count": 2557,
"forks_count": 747,
"forks": 747,
"watchers": 2556,
"watchers": 2557,
"score": 0
},
{

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-05-11T08:58:22Z",
"updated_at": "2021-05-11T11:13:35Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1024,
"watchers_count": 1024,
"stargazers_count": 1025,
"watchers_count": 1025,
"forks_count": 231,
"forks": 231,
"watchers": 1024,
"watchers": 1025,
"score": 0
}
]

View file

@ -90,5 +90,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 366358815,
"name": "CVE-2019-5420.rb",
"full_name": "scumdestroy\/CVE-2019-5420.rb",
"owner": {
"login": "scumdestroy",
"id": 35894688,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35894688?v=4",
"html_url": "https:\/\/github.com\/scumdestroy"
},
"html_url": "https:\/\/github.com\/scumdestroy\/CVE-2019-5420.rb",
"description": "POC Exploit written in Ruby",
"fork": false,
"created_at": "2021-05-11T11:32:18Z",
"updated_at": "2021-05-11T11:33:16Z",
"pushed_at": "2021-05-11T11:33:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-02-20T15:35:34Z",
"stargazers_count": 183,
"watchers_count": 183,
"forks_count": 63,
"forks": 63,
"forks_count": 64,
"forks": 64,
"watchers": 183,
"score": 0
},

25
2019/CVE-2019-9081.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 366390292,
"name": "CVE-2019-9081_poc",
"full_name": "nth347\/CVE-2019-9081_poc",
"owner": {
"login": "nth347",
"id": 20441996,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20441996?v=4",
"html_url": "https:\/\/github.com\/nth347"
},
"html_url": "https:\/\/github.com\/nth347\/CVE-2019-9081_poc",
"description": "Poc for CVE-2019-9081",
"fork": false,
"created_at": "2021-05-11T13:24:19Z",
"updated_at": "2021-05-11T13:24:22Z",
"pushed_at": "2021-05-11T13:24:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "GitLab 12.9.0 Arbitrary File Read ",
"fork": false,
"created_at": "2020-11-20T15:40:03Z",
"updated_at": "2021-05-11T09:13:10Z",
"updated_at": "2021-05-11T09:44:54Z",
"pushed_at": "2021-04-23T19:21:16Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 14,
"forks": 14,
"watchers": 39,
"watchers": 40,
"score": 0
},
{

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2020-05-11T13:09:52Z",
"updated_at": "2021-05-09T12:11:55Z",
"pushed_at": "2021-05-09T12:13:56Z",
"pushed_at": "2021-05-11T14:14:41Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 4,

View file

@ -82,13 +82,13 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2021-05-11T07:46:55Z",
"updated_at": "2021-05-11T10:57:20Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 789,
"watchers_count": 789,
"stargazers_count": 790,
"watchers_count": 790,
"forks_count": 229,
"forks": 229,
"watchers": 789,
"watchers": 790,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-01-27T01:40:56Z",
"stargazers_count": 60,
"watchers_count": 60,
"forks_count": 11,
"forks": 11,
"forks_count": 12,
"forks": 12,
"watchers": 60,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-05-10T07:54:29Z",
"updated_at": "2021-05-11T13:45:18Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2556,
"watchers_count": 2556,
"stargazers_count": 2557,
"watchers_count": 2557,
"forks_count": 747,
"forks": 747,
"watchers": 2556,
"watchers": 2557,
"score": 0
},
{

View file

@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-05-11T08:27:25Z",
"updated_at": "2021-05-11T12:08:08Z",
"pushed_at": "2021-04-26T02:30:11Z",
"stargazers_count": 743,
"watchers_count": 743,
"stargazers_count": 744,
"watchers_count": 744,
"forks_count": 238,
"forks": 238,
"watchers": 743,
"watchers": 744,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-05-11T08:58:22Z",
"updated_at": "2021-05-11T11:13:35Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1024,
"watchers_count": 1024,
"stargazers_count": 1025,
"watchers_count": 1025,
"forks_count": 231,
"forks": 231,
"watchers": 1024,
"watchers": 1025,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Demo exploit code for CVE-2020-27904, a tfp0 bug.",
"fork": false,
"created_at": "2021-03-31T09:11:29Z",
"updated_at": "2021-05-11T04:22:01Z",
"updated_at": "2021-05-11T14:47:34Z",
"pushed_at": "2021-04-29T07:14:33Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 5,
"forks": 5,
"watchers": 54,
"watchers": 55,
"score": 0
}
]

View file

@ -105,13 +105,13 @@
"description": "vRealize RCE + Privesc (CVE-2021-21975, CVE-2021-21983, CVE-0DAY-?????)",
"fork": false,
"created_at": "2021-04-06T23:24:38Z",
"updated_at": "2021-04-15T02:49:40Z",
"updated_at": "2021-05-11T10:26:11Z",
"pushed_at": "2021-04-07T03:10:07Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 5,
"forks": 5,
"watchers": 21,
"watchers": 22,
"score": 0
},
{

View file

@ -132,8 +132,8 @@
"pushed_at": "2021-04-03T12:56:37Z",
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 15,
"forks": 15,
"forks_count": 16,
"forks": 16,
"watchers": 47,
"score": 0
},

View file

@ -13,7 +13,7 @@
"description": "This script can be used to gain access to a victim's Samsung Account if they have a specific version of Samsung Members installed on their Samsung Device, and if the victim's device is from the US or Korea region.",
"fork": false,
"created_at": "2021-04-10T09:23:52Z",
"updated_at": "2021-05-05T13:31:26Z",
"updated_at": "2021-05-11T10:47:32Z",
"pushed_at": "2021-04-28T17:56:04Z",
"stargazers_count": 9,
"watchers_count": 9,

View file

@ -13,13 +13,13 @@
"description": "Apache Druid 远程代码执行;检测脚本",
"fork": false,
"created_at": "2021-02-03T03:59:52Z",
"updated_at": "2021-04-12T01:33:43Z",
"updated_at": "2021-05-11T13:46:24Z",
"pushed_at": "2021-02-03T06:06:24Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 6,
"forks": 6,
"watchers": 10,
"watchers": 11,
"score": 0
},
{
@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-05-11T08:27:25Z",
"updated_at": "2021-05-11T12:08:08Z",
"pushed_at": "2021-04-26T02:30:11Z",
"stargazers_count": 743,
"watchers_count": 743,
"stargazers_count": 744,
"watchers_count": 744,
"forks_count": 238,
"forks": 238,
"watchers": 743,
"watchers": 744,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-04-30T15:45:02Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 4,
"forks": 4,
"forks_count": 5,
"forks": 5,
"watchers": 11,
"score": 0
}

View file

@ -63,8 +63,8 @@
"pushed_at": "2021-05-10T02:09:51Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 3,
"forks": 3,
"forks_count": 4,
"forks": 4,
"watchers": 10,
"score": 0
},

View file

@ -730,8 +730,8 @@
"pushed_at": "2021-03-24T10:39:34Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "proxylogon exploit - CVE-2021-26857",
"fork": false,
"created_at": "2021-03-11T17:32:32Z",
"updated_at": "2021-04-12T14:20:44Z",
"updated_at": "2021-05-11T13:08:45Z",
"pushed_at": "2021-03-11T17:34:15Z",
"stargazers_count": 96,
"watchers_count": 96,
"stargazers_count": 97,
"watchers_count": 97,
"forks_count": 33,
"forks": 33,
"watchers": 96,
"watchers": 97,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "POC from TestANull for CVE-2021-28482 on Exchange Server",
"fork": false,
"created_at": "2021-05-03T13:54:36Z",
"updated_at": "2021-05-11T06:45:53Z",
"updated_at": "2021-05-11T14:15:32Z",
"pushed_at": "2021-05-03T14:29:49Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 5,
"forks": 5,
"watchers": 6,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 7,
"forks": 7,
"watchers": 10,
"score": 0
}
]

25
2021/CVE-2021-29200.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 366345649,
"name": "CVE-2021-29200",
"full_name": "r0ckysec\/CVE-2021-29200",
"owner": {
"login": "r0ckysec",
"id": 44518337,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44518337?v=4",
"html_url": "https:\/\/github.com\/r0ckysec"
},
"html_url": "https:\/\/github.com\/r0ckysec\/CVE-2021-29200",
"description": null,
"fork": false,
"created_at": "2021-05-11T10:40:20Z",
"updated_at": "2021-05-11T13:20:45Z",
"pushed_at": "2021-05-11T10:42:40Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "CVE-2021-30461",
"fork": false,
"created_at": "2021-05-11T04:09:04Z",
"updated_at": "2021-05-11T08:15:49Z",
"updated_at": "2021-05-11T15:09:13Z",
"pushed_at": "2021-05-11T04:14:47Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"forks": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -431,8 +431,8 @@
"pushed_at": "2021-01-31T07:02:44Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 4,
"forks": 4,
"forks_count": 3,
"forks": 3,
"watchers": 2,
"score": 0
},
@ -887,13 +887,13 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
"updated_at": "2021-05-11T08:15:07Z",
"pushed_at": "2021-03-30T14:44:38Z",
"stargazers_count": 306,
"watchers_count": 306,
"forks_count": 50,
"forks": 50,
"watchers": 306,
"updated_at": "2021-05-11T15:08:12Z",
"pushed_at": "2021-05-11T13:09:18Z",
"stargazers_count": 307,
"watchers_count": 307,
"forks_count": 51,
"forks": 51,
"watchers": 307,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Ubuntu OverlayFS Local Privesc",
"fork": false,
"created_at": "2021-04-19T20:07:01Z",
"updated_at": "2021-05-11T07:16:38Z",
"updated_at": "2021-05-11T10:36:53Z",
"pushed_at": "2021-04-20T00:46:14Z",
"stargazers_count": 175,
"watchers_count": 175,
"forks_count": 56,
"forks": 56,
"watchers": 175,
"stargazers_count": 176,
"watchers_count": 176,
"forks_count": 57,
"forks": 57,
"watchers": 176,
"score": 0
},
{

View file

@ -930,6 +930,14 @@ Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is uni
- [Shadow0ps/CVE-2021-28482-Exchange-POC](https://github.com/Shadow0ps/CVE-2021-28482-Exchange-POC)
### CVE-2021-29200 (2021-04-27)
<code>
Apache OFBiz has unsafe deserialization prior to 17.12.07 version An unauthenticated user can perform an RCE attack
</code>
- [r0ckysec/CVE-2021-29200](https://github.com/r0ckysec/CVE-2021-29200)
### CVE-2021-29267 (2021-03-29)
<code>
@ -6251,6 +6259,7 @@ A remote code execution vulnerability in development mode Rails &lt;5.2.2.1, &lt
- [cved-sources/cve-2019-5420](https://github.com/cved-sources/cve-2019-5420)
- [AnasTaoutaou/CVE-2019-5420](https://github.com/AnasTaoutaou/CVE-2019-5420)
- [Eremiel/CVE-2019-5420](https://github.com/Eremiel/CVE-2019-5420)
- [scumdestroy/CVE-2019-5420.rb](https://github.com/scumdestroy/CVE-2019-5420.rb)
### CVE-2019-5427 (2019-04-22)
@ -6875,6 +6884,14 @@ An XML External Entity Injection (XXE) vulnerability in the Management System (c
- [nxkennedy/CVE-2019-8997](https://github.com/nxkennedy/CVE-2019-8997)
### CVE-2019-9081 (2019-02-24)
<code>
The Illuminate component of Laravel Framework 5.7.x has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the __destruct method of the PendingCommand class in PendingCommand.php.
</code>
- [nth347/CVE-2019-9081_poc](https://github.com/nth347/CVE-2019-9081_poc)
### CVE-2019-9153 (2019-08-22)
<code>
@ -9150,6 +9167,7 @@ A vulnerability in the Cisco node-jose open source library before 0.11.0 could a
- [adityathebe/POC-CVE-2018-0114](https://github.com/adityathebe/POC-CVE-2018-0114)
- [Eremiel/CVE-2018-0114](https://github.com/Eremiel/CVE-2018-0114)
- [Starry-lord/CVE-2018-0114](https://github.com/Starry-lord/CVE-2018-0114)
- [scumdestroy/CVE-2018-0114](https://github.com/scumdestroy/CVE-2018-0114)
### CVE-2018-0202 (2018-03-27)
@ -12496,6 +12514,9 @@ An issue was discovered in certain Apple products. iOS before 10.2.1 is affected
An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. macOS before 10.12.3 is affected. tvOS before 10.1.1 is affected. watchOS before 3.1.3 is affected. The issue involves the &quot;Kernel&quot; component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (buffer overflow) via a crafted app.
</code>
- [maximehip/extra_recipe](https://github.com/maximehip/extra_recipe)
- [JackBro/extra_recipe](https://github.com/JackBro/extra_recipe)
- [Rootkitsmm-zz/extra_recipe-iOS-10.2](https://github.com/Rootkitsmm-zz/extra_recipe-iOS-10.2)
- [Peterpan0927/CVE-2017-2370](https://github.com/Peterpan0927/CVE-2017-2370)
### CVE-2017-2388 (2017-04-01)
@ -12613,6 +12634,14 @@ Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Serve
- [SECFORCE/CVE-2017-3599](https://github.com/SECFORCE/CVE-2017-3599)
### CVE-2017-3730 (2017-05-04)
<code>
In OpenSSL 1.1.0 before 1.1.0d, if a malicious server supplies bad parameters for a DHE or ECDHE key exchange then this can result in the client attempting to dereference a NULL pointer leading to a client crash. This could be exploited in a Denial of Service attack.
</code>
- [guidovranken/CVE-2017-3730](https://github.com/guidovranken/CVE-2017-3730)
### CVE-2017-3881 (2017-03-17)
<code>
@ -12712,7 +12741,9 @@ Multiple cross-site request forgery (CSRF) vulnerabilities on the D-Link DI-524
The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.
</code>
- [PolarisLab/S2-045](https://github.com/PolarisLab/S2-045)
- [Flyteas/Struts2-045-Exp](https://github.com/Flyteas/Struts2-045-Exp)
- [bongbongco/cve-2017-5638](https://github.com/bongbongco/cve-2017-5638)
- [jas502n/S2-045-EXP-POC-TOOLS](https://github.com/jas502n/S2-045-EXP-POC-TOOLS)
- [mthbernardes/strutszeiro](https://github.com/mthbernardes/strutszeiro)
- [xsscx/cve-2017-5638](https://github.com/xsscx/cve-2017-5638)