Auto Update 2021/05/05 06:11:10

This commit is contained in:
motikan2010-bot 2021-05-05 06:11:10 +09:00
parent 2e0466b5a3
commit dd6c5cdc1c
34 changed files with 186 additions and 138 deletions

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-05-04T11:10:38Z",
"updated_at": "2021-05-04T16:18:15Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1014,
"watchers_count": 1014,
"stargazers_count": 1015,
"watchers_count": 1015,
"forks_count": 229,
"forks": 229,
"watchers": 1014,
"watchers": 1015,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-08-13T07:14:01Z",
"stargazers_count": 102,
"watchers_count": 102,
"forks_count": 49,
"forks": 49,
"forks_count": 50,
"forks": 50,
"watchers": 102,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-05-04T11:10:38Z",
"updated_at": "2021-05-04T16:18:15Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1014,
"watchers_count": 1014,
"stargazers_count": 1015,
"watchers_count": 1015,
"forks_count": 229,
"forks": 229,
"watchers": 1014,
"watchers": 1015,
"score": 0
},
{

View file

@ -197,13 +197,13 @@
"description": "A CVE-2016-5195 exploit example.",
"fork": false,
"created_at": "2016-10-23T00:16:33Z",
"updated_at": "2021-04-29T05:58:50Z",
"updated_at": "2021-05-04T17:36:11Z",
"pushed_at": "2017-03-21T16:46:38Z",
"stargazers_count": 220,
"watchers_count": 220,
"stargazers_count": 219,
"watchers_count": 219,
"forks_count": 105,
"forks": 105,
"watchers": 220,
"watchers": 219,
"score": 0
},
{
@ -247,8 +247,8 @@
"pushed_at": "2016-10-29T08:50:34Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 10,
"forks": 10,
"forks_count": 11,
"forks": 11,
"watchers": 9,
"score": 0
},

View file

@ -13,8 +13,8 @@
"description": "Jquery File Tree 1.6.6 Path Traversal exploit (CVE-2017-1000170)",
"fork": false,
"created_at": "2021-03-19T12:39:10Z",
"updated_at": "2021-03-19T20:12:25Z",
"pushed_at": "2021-03-19T13:01:08Z",
"updated_at": "2021-05-04T18:21:32Z",
"pushed_at": "2021-05-04T18:21:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,

View file

@ -289,13 +289,13 @@
"description": "PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)",
"fork": false,
"created_at": "2018-01-11T09:43:46Z",
"updated_at": "2021-04-15T02:18:21Z",
"updated_at": "2021-05-04T19:03:00Z",
"pushed_at": "2018-02-28T12:32:54Z",
"stargazers_count": 265,
"watchers_count": 265,
"stargazers_count": 266,
"watchers_count": 266,
"forks_count": 135,
"forks": 135,
"watchers": 265,
"watchers": 266,
"score": 0
},
{
@ -312,13 +312,13 @@
"description": "PoC for CVE-2018-0802 And CVE-2017-11882",
"fork": false,
"created_at": "2018-01-12T11:38:33Z",
"updated_at": "2021-03-11T01:08:36Z",
"updated_at": "2021-05-04T19:02:54Z",
"pushed_at": "2018-01-12T11:42:29Z",
"stargazers_count": 157,
"watchers_count": 157,
"stargazers_count": 158,
"watchers_count": 158,
"forks_count": 64,
"forks": 64,
"watchers": 157,
"watchers": 158,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-05-04T11:10:38Z",
"updated_at": "2021-05-04T16:18:15Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1014,
"watchers_count": 1014,
"stargazers_count": 1015,
"watchers_count": 1015,
"forks_count": 229,
"forks": 229,
"watchers": 1014,
"watchers": 1015,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)",
"fork": false,
"created_at": "2018-01-11T09:43:46Z",
"updated_at": "2021-04-15T02:18:21Z",
"updated_at": "2021-05-04T19:03:00Z",
"pushed_at": "2018-02-28T12:32:54Z",
"stargazers_count": 265,
"watchers_count": 265,
"stargazers_count": 266,
"watchers_count": 266,
"forks_count": 135,
"forks": 135,
"watchers": 265,
"watchers": 266,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "PoC for CVE-2018-0802 And CVE-2017-11882",
"fork": false,
"created_at": "2018-01-12T11:38:33Z",
"updated_at": "2021-03-11T01:08:36Z",
"updated_at": "2021-05-04T19:02:54Z",
"pushed_at": "2018-01-12T11:42:29Z",
"stargazers_count": 157,
"watchers_count": 157,
"stargazers_count": 158,
"watchers_count": 158,
"forks_count": 64,
"forks": 64,
"watchers": 157,
"watchers": 158,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)",
"fork": false,
"created_at": "2018-06-24T05:34:05Z",
"updated_at": "2021-05-01T02:27:32Z",
"updated_at": "2021-05-04T20:55:31Z",
"pushed_at": "2020-10-16T12:09:45Z",
"stargazers_count": 417,
"watchers_count": 417,
"stargazers_count": 418,
"watchers_count": 418,
"forks_count": 399,
"forks": 399,
"watchers": 417,
"watchers": 418,
"score": 0
},
{

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-05-04T11:10:38Z",
"updated_at": "2021-05-04T16:18:15Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1014,
"watchers_count": 1014,
"stargazers_count": 1015,
"watchers_count": 1015,
"forks_count": 229,
"forks": 229,
"watchers": 1014,
"watchers": 1015,
"score": 0
},
{

View file

@ -458,5 +458,28 @@
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 305114825,
"name": "CVE-2018-6389",
"full_name": "Elsfa7-110\/CVE-2018-6389",
"owner": {
"login": "Elsfa7-110",
"id": 26175351,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26175351?v=4",
"html_url": "https:\/\/github.com\/Elsfa7-110"
},
"html_url": "https:\/\/github.com\/Elsfa7-110\/CVE-2018-6389",
"description": null,
"fork": false,
"created_at": "2020-10-18T14:01:59Z",
"updated_at": "2021-05-04T16:35:09Z",
"pushed_at": "2021-05-04T16:34:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": null,
"fork": false,
"created_at": "2019-06-24T15:33:50Z",
"updated_at": "2021-04-19T04:43:17Z",
"updated_at": "2021-05-04T16:11:37Z",
"pushed_at": "2020-11-09T07:33:12Z",
"stargazers_count": 247,
"watchers_count": 247,
"stargazers_count": 246,
"watchers_count": 246,
"forks_count": 51,
"forks": 51,
"watchers": 247,
"watchers": 246,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2021-04-30T10:10:39Z",
"updated_at": "2021-05-04T19:46:05Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1652,
"watchers_count": 1652,
"stargazers_count": 1651,
"watchers_count": 1651,
"forks_count": 249,
"forks": 249,
"watchers": 1652,
"watchers": 1651,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "patches for SNYK-JS-JQUERY-565129, SNYK-JS-JQUERY-567880, CVE-2020-1102, CVE-2020-11023, includes the patches for SNYK-JS-JQUERY-174006, CVE-2019-11358, CVE-2019-5428",
"fork": false,
"created_at": "2020-04-14T19:12:01Z",
"updated_at": "2021-03-03T21:12:03Z",
"updated_at": "2021-05-04T16:16:24Z",
"pushed_at": "2020-05-05T23:34:04Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 6,
"forks": 6,
"watchers": 10,
"watchers": 11,
"score": 0
},
{

View file

@ -174,13 +174,13 @@
"description": "Programa para hackear Whatsapp Mediante Gif ,asiendo un exploit con el puerto.",
"fork": false,
"created_at": "2019-10-16T20:13:23Z",
"updated_at": "2021-03-20T12:58:59Z",
"updated_at": "2021-05-04T20:58:41Z",
"pushed_at": "2019-10-16T20:24:56Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"forks": 3,
"watchers": 2,
"watchers": 3,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2019-09-03T11:29:51Z",
"updated_at": "2021-03-12T01:24:39Z",
"updated_at": "2021-05-04T16:16:12Z",
"pushed_at": "2019-09-03T11:30:26Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 0,
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2019-10-04T06:32:08Z",
"updated_at": "2021-04-15T09:19:58Z",
"updated_at": "2021-05-04T20:59:30Z",
"pushed_at": "2019-11-12T03:58:00Z",
"stargazers_count": 62,
"watchers_count": 62,
"stargazers_count": 63,
"watchers_count": 63,
"forks_count": 26,
"forks": 26,
"watchers": 62,
"watchers": 63,
"score": 0
},
{

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-05-04T11:10:38Z",
"updated_at": "2021-05-04T16:18:15Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1014,
"watchers_count": 1014,
"stargazers_count": 1015,
"watchers_count": 1015,
"forks_count": 229,
"forks": 229,
"watchers": 1014,
"watchers": 1015,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "patches for SNYK-JS-JQUERY-565129, SNYK-JS-JQUERY-567880, CVE-2020-1102, CVE-2020-11023, includes the patches for SNYK-JS-JQUERY-174006, CVE-2019-11358, CVE-2019-5428",
"fork": false,
"created_at": "2020-04-14T19:12:01Z",
"updated_at": "2021-03-03T21:12:03Z",
"updated_at": "2021-05-04T16:16:24Z",
"pushed_at": "2020-05-05T23:34:04Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 6,
"forks": 6,
"watchers": 10,
"watchers": 11,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
"fork": false,
"created_at": "2020-06-08T07:37:49Z",
"updated_at": "2021-04-27T12:47:04Z",
"updated_at": "2021-05-04T16:08:08Z",
"pushed_at": "2020-06-17T13:41:23Z",
"stargazers_count": 362,
"watchers_count": 362,
"stargazers_count": 363,
"watchers_count": 363,
"forks_count": 64,
"forks": 64,
"watchers": 362,
"watchers": 363,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2021-05-04T15:16:14Z",
"updated_at": "2021-05-04T18:53:09Z",
"pushed_at": "2020-10-21T12:10:28Z",
"stargazers_count": 1272,
"watchers_count": 1272,
"stargazers_count": 1273,
"watchers_count": 1273,
"forks_count": 293,
"forks": 293,
"watchers": 1272,
"watchers": 1273,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-05-04T11:10:38Z",
"updated_at": "2021-05-04T16:18:15Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1014,
"watchers_count": 1014,
"stargazers_count": 1015,
"watchers_count": 1015,
"forks_count": 229,
"forks": 229,
"watchers": 1014,
"watchers": 1015,
"score": 0
},
{

View file

@ -1,25 +1,25 @@
[
{
"id": 283057472,
"id": 283097598,
"name": "CVE-2020-3187",
"full_name": "pry0cc\/CVE-2020-3187",
"full_name": "CrackerCat\/CVE-2020-3187",
"owner": {
"login": "pry0cc",
"id": 4334403,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4334403?v=4",
"html_url": "https:\/\/github.com\/pry0cc"
"login": "CrackerCat",
"id": 17995064,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17995064?v=4",
"html_url": "https:\/\/github.com\/CrackerCat"
},
"html_url": "https:\/\/github.com\/pry0cc\/CVE-2020-3187",
"html_url": "https:\/\/github.com\/CrackerCat\/CVE-2020-3187",
"description": null,
"fork": false,
"created_at": "2020-07-28T00:59:06Z",
"updated_at": "2021-04-14T06:44:30Z",
"pushed_at": "2020-07-28T09:45:42Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 5,
"forks": 5,
"watchers": 6,
"created_at": "2020-07-28T04:20:17Z",
"updated_at": "2021-05-04T19:34:52Z",
"pushed_at": "2020-07-28T01:13:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 4,
"forks": 4,
"watchers": 0,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "tomcat使用了自带session同步功能时不安全的配置没有使用EncryptInterceptor导致存在的反序列化漏洞通过精心构造的数据包 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-94849484是session持久化的洞这个是session集群同步的洞",
"fork": false,
"created_at": "2020-05-19T05:12:53Z",
"updated_at": "2021-03-31T12:52:29Z",
"updated_at": "2021-05-04T18:05:56Z",
"pushed_at": "2020-05-19T05:13:19Z",
"stargazers_count": 198,
"watchers_count": 198,
"stargazers_count": 199,
"watchers_count": 199,
"forks_count": 35,
"forks": 35,
"watchers": 198,
"watchers": 199,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2020-05-21T00:41:06Z",
"updated_at": "2021-04-28T21:17:53Z",
"updated_at": "2021-05-04T18:36:15Z",
"pushed_at": "2020-05-21T10:15:35Z",
"stargazers_count": 103,
"watchers_count": 103,
"stargazers_count": 104,
"watchers_count": 104,
"forks_count": 25,
"forks": 25,
"watchers": 103,
"watchers": 104,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "🐱‍💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...",
"fork": false,
"created_at": "2021-03-22T11:53:57Z",
"updated_at": "2021-04-27T10:04:05Z",
"updated_at": "2021-05-04T17:30:05Z",
"pushed_at": "2021-03-22T18:24:20Z",
"stargazers_count": 107,
"watchers_count": 107,
"stargazers_count": 109,
"watchers_count": 109,
"forks_count": 15,
"forks": 15,
"watchers": 107,
"watchers": 109,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"pushed_at": "2021-03-01T02:10:44Z",
"stargazers_count": 93,
"watchers_count": 93,
"forks_count": 58,
"forks": 58,
"forks_count": 57,
"forks": 57,
"watchers": 93,
"score": 0
},

View file

@ -13,8 +13,8 @@
"description": "Proof-of-Concept (PoC) script to exploit Pulse Secure CVE-2021-22893. ",
"fork": false,
"created_at": "2021-04-21T09:48:57Z",
"updated_at": "2021-05-04T10:19:52Z",
"pushed_at": "2021-05-03T18:50:56Z",
"updated_at": "2021-05-04T15:32:21Z",
"pushed_at": "2021-05-04T15:32:18Z",
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 9,

View file

@ -611,13 +611,13 @@
"description": "ProxyLogon is the formally generic name for CVE-2021-26855, a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin. We have also chained this bug with another post-auth arbitrary-file-write vulnerability, CVE-2021-27065, to get code execution.",
"fork": false,
"created_at": "2021-03-16T07:31:25Z",
"updated_at": "2021-05-01T17:20:16Z",
"updated_at": "2021-05-04T15:17:14Z",
"pushed_at": "2021-05-01T17:20:15Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
},
{

View file

@ -13,8 +13,8 @@
"description": "PoC for exploiting RCE in Exchange CVEs: CVE-2021-28480, CVE-2021-28481, CVE-2021-28482 and CVE-2021-28483. Achieves Domain Admin on Exchange Servers running Windows Server 2003 up to Windows Server 2019.",
"fork": false,
"created_at": "2021-04-21T09:50:39Z",
"updated_at": "2021-05-04T13:13:38Z",
"pushed_at": "2021-04-23T15:55:24Z",
"updated_at": "2021-05-04T16:48:39Z",
"pushed_at": "2021-05-04T16:48:36Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 5,

View file

@ -21,5 +21,28 @@
"forks": 3,
"watchers": 15,
"score": 0
},
{
"id": 364317316,
"name": "CVE-2021-30128",
"full_name": "r0ckysec\/CVE-2021-30128",
"owner": {
"login": "r0ckysec",
"id": 44518337,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44518337?v=4",
"html_url": "https:\/\/github.com\/r0ckysec"
},
"html_url": "https:\/\/github.com\/r0ckysec\/CVE-2021-30128",
"description": "CVE-2021-30128 Apache OFBiz 反序列化漏洞远程代码执行",
"fork": false,
"created_at": "2021-05-04T16:21:55Z",
"updated_at": "2021-05-04T16:27:02Z",
"pushed_at": "2021-05-04T16:26:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,8 +13,8 @@
"description": "Discource POC",
"fork": false,
"created_at": "2021-01-12T22:50:27Z",
"updated_at": "2021-04-30T21:20:55Z",
"pushed_at": "2021-04-11T23:12:36Z",
"updated_at": "2021-05-04T19:08:13Z",
"pushed_at": "2021-05-04T19:08:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,

View file

@ -335,13 +335,13 @@
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
"fork": false,
"created_at": "2021-01-30T03:22:04Z",
"updated_at": "2021-05-03T10:42:10Z",
"updated_at": "2021-05-04T19:53:12Z",
"pushed_at": "2021-02-08T03:42:50Z",
"stargazers_count": 385,
"watchers_count": 385,
"stargazers_count": 386,
"watchers_count": 386,
"forks_count": 107,
"forks": 107,
"watchers": 385,
"watchers": 386,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Ubuntu OverlayFS Local Privesc",
"fork": false,
"created_at": "2021-04-19T20:07:01Z",
"updated_at": "2021-05-04T07:44:53Z",
"updated_at": "2021-05-04T17:47:05Z",
"pushed_at": "2021-04-20T00:46:14Z",
"stargazers_count": 159,
"watchers_count": 159,
"stargazers_count": 161,
"watchers_count": 161,
"forks_count": 53,
"forks": 53,
"watchers": 159,
"watchers": 161,
"score": 0
},
{

View file

@ -904,6 +904,7 @@ Apache OFBiz has unsafe deserialization prior to 17.12.07 version
</code>
- [LioTree/CVE-2021-30128-EXP](https://github.com/LioTree/CVE-2021-30128-EXP)
- [r0ckysec/CVE-2021-30128](https://github.com/r0ckysec/CVE-2021-30128)
### CVE-2021-30146 (2021-04-06)
@ -1807,7 +1808,7 @@ A vulnerability in the web server for Cisco IP Phones could allow an unauthentic
A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct directory traversal attacks and obtain read and delete access to sensitive files on a targeted system. The vulnerability is due to a lack of proper input validation of the HTTP URL. An attacker could exploit this vulnerability by sending a crafted HTTP request containing directory traversal character sequences. An exploit could allow the attacker to view or delete arbitrary files on the targeted system. When the device is reloaded after exploitation of this vulnerability, any files that were deleted are restored. The attacker can only view and delete files within the web services file system. This file system is enabled when the affected device is configured with either WebVPN or AnyConnect features. This vulnerability can not be used to obtain access to ASA or FTD system files or underlying operating system (OS) files. Reloading the affected device will restore all files within the web services file system.
</code>
- [pry0cc/CVE-2020-3187](https://github.com/pry0cc/CVE-2020-3187)
- [CrackerCat/CVE-2020-3187](https://github.com/CrackerCat/CVE-2020-3187)
- [Ph4nt0m-b/CVE-2020-3187](https://github.com/Ph4nt0m-b/CVE-2020-3187)
### CVE-2020-3433 (2020-08-17)
@ -9738,6 +9739,7 @@ In WordPress through 4.9.2, unauthenticated attackers can cause a denial of serv
- [fakedob/tvsz](https://github.com/fakedob/tvsz)
- [vineetkia/Wordpress-DOS-Attack-CVE-2018-6389](https://github.com/vineetkia/Wordpress-DOS-Attack-CVE-2018-6389)
- [ianxtianxt/CVE-2018-6389](https://github.com/ianxtianxt/CVE-2018-6389)
- [Elsfa7-110/CVE-2018-6389](https://github.com/Elsfa7-110/CVE-2018-6389)
### CVE-2018-6396 (2018-02-17)