Auto Update 2021/05/14 00:11:40

This commit is contained in:
motikan2010-bot 2021-05-14 00:11:40 +09:00
parent 3bec01005b
commit ddb9d06714
22 changed files with 256 additions and 66 deletions

View file

@ -312,7 +312,7 @@
"description": "CVE-2014-6271の検証用Vagrantfileです",
"fork": false,
"created_at": "2014-09-25T16:19:41Z",
"updated_at": "2014-09-25T16:19:46Z",
"updated_at": "2021-05-13T14:11:03Z",
"pushed_at": "2014-09-28T04:25:41Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -59,13 +59,13 @@
"description": "ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container",
"fork": false,
"created_at": "2017-01-08T14:19:51Z",
"updated_at": "2021-04-23T13:54:50Z",
"updated_at": "2021-05-13T11:23:59Z",
"pushed_at": "2018-04-07T01:10:06Z",
"stargazers_count": 74,
"watchers_count": 74,
"stargazers_count": 75,
"watchers_count": 75,
"forks_count": 41,
"forks": 41,
"watchers": 74,
"watchers": 75,
"score": 0
},
{

View file

@ -174,13 +174,13 @@
"description": "iis6 exploit 2017 CVE-2017-7269",
"fork": false,
"created_at": "2017-04-05T23:21:12Z",
"updated_at": "2021-05-06T15:33:16Z",
"updated_at": "2021-05-13T13:33:12Z",
"pushed_at": "2017-04-05T23:29:03Z",
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 34,
"forks": 34,
"watchers": 38,
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 35,
"forks": 35,
"watchers": 39,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)",
"fork": false,
"created_at": "2018-01-16T00:23:34Z",
"updated_at": "2021-04-27T15:44:11Z",
"updated_at": "2021-05-13T09:56:39Z",
"pushed_at": "2020-12-22T03:10:47Z",
"stargazers_count": 102,
"watchers_count": 102,
"forks_count": 39,
"forks": 39,
"watchers": 102,
"stargazers_count": 103,
"watchers_count": 103,
"forks_count": 40,
"forks": 40,
"watchers": 103,
"score": 0
},
{

View file

@ -910,13 +910,13 @@
"description": "dump",
"fork": false,
"created_at": "2019-05-21T06:57:19Z",
"updated_at": "2021-04-20T04:48:38Z",
"updated_at": "2021-05-13T09:20:17Z",
"pushed_at": "2019-06-01T05:15:11Z",
"stargazers_count": 471,
"watchers_count": 471,
"forks_count": 191,
"forks": 191,
"watchers": 471,
"stargazers_count": 472,
"watchers_count": 472,
"forks_count": 192,
"forks": 192,
"watchers": 472,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "Temproot for Pixel 2 and Pixel 2 XL via CVE-2019-2215",
"fork": false,
"created_at": "2019-10-14T17:27:37Z",
"updated_at": "2021-03-18T12:26:02Z",
"updated_at": "2021-05-13T13:30:44Z",
"pushed_at": "2019-10-15T01:04:08Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 45,
"forks": 45,
"watchers": 66,
"watchers": 67,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2021-05-12T02:54:02Z",
"updated_at": "2021-05-13T13:35:02Z",
"pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 761,
"watchers_count": 761,
"stargazers_count": 762,
"watchers_count": 762,
"forks_count": 160,
"forks": 160,
"watchers": 761,
"watchers": 762,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "PoC for CVE-2019-5736",
"fork": false,
"created_at": "2019-02-13T05:26:32Z",
"updated_at": "2021-05-01T17:32:28Z",
"updated_at": "2021-05-13T12:10:51Z",
"pushed_at": "2019-02-19T11:45:13Z",
"stargazers_count": 502,
"watchers_count": 502,
"stargazers_count": 503,
"watchers_count": 503,
"forks_count": 127,
"forks": 127,
"watchers": 502,
"watchers": 503,
"score": 0
},
{

View file

@ -979,13 +979,13 @@
"description": null,
"fork": false,
"created_at": "2020-04-01T01:46:08Z",
"updated_at": "2021-05-12T13:19:23Z",
"updated_at": "2021-05-13T10:26:42Z",
"pushed_at": "2020-04-01T01:46:17Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 13,
"forks": 13,
"watchers": 46,
"watchers": 47,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972",
"fork": false,
"created_at": "2020-03-11T17:51:29Z",
"updated_at": "2021-05-12T08:04:18Z",
"updated_at": "2021-05-13T12:59:57Z",
"pushed_at": "2021-02-25T17:19:39Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 16,
"forks": 16,
"watchers": 60,
"watchers": 61,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2021-05-13T05:54:36Z",
"updated_at": "2021-05-13T12:42:15Z",
"pushed_at": "2020-10-21T12:10:28Z",
"stargazers_count": 1278,
"watchers_count": 1278,
"stargazers_count": 1279,
"watchers_count": 1279,
"forks_count": 294,
"forks": 294,
"watchers": 1278,
"watchers": 1279,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2021-05-11T10:57:20Z",
"updated_at": "2021-05-13T12:45:11Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 790,
"watchers_count": 790,
"stargazers_count": 791,
"watchers_count": 791,
"forks_count": 229,
"forks": 229,
"watchers": 790,
"watchers": 791,
"score": 0
},
{

View file

@ -247,8 +247,8 @@
"pushed_at": "2021-04-30T09:43:23Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
@ -297,5 +297,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 367014200,
"name": "CVE-2020-27955",
"full_name": "qzyqzynb\/CVE-2020-27955",
"owner": {
"login": "qzyqzynb",
"id": 62465887,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62465887?v=4",
"html_url": "https:\/\/github.com\/qzyqzynb"
},
"html_url": "https:\/\/github.com\/qzyqzynb\/CVE-2020-27955",
"description": null,
"fork": false,
"created_at": "2021-05-13T10:30:28Z",
"updated_at": "2021-05-13T10:33:03Z",
"pushed_at": "2021-05-13T10:33:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,7 +13,7 @@
"description": "CVE-2020-28502 node-XMLHttpRequest RCE",
"fork": false,
"created_at": "2021-05-12T12:11:03Z",
"updated_at": "2021-05-12T23:31:57Z",
"updated_at": "2021-05-13T11:33:03Z",
"pushed_at": "2021-05-12T12:18:50Z",
"stargazers_count": 2,
"watchers_count": 2,

View file

@ -90,5 +90,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 367057442,
"name": "ofbiz-poc",
"full_name": "yuaneuro\/ofbiz-poc",
"owner": {
"login": "yuaneuro",
"id": 42265015,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42265015?v=4",
"html_url": "https:\/\/github.com\/yuaneuro"
},
"html_url": "https:\/\/github.com\/yuaneuro\/ofbiz-poc",
"description": "CVE-2020-9496和CVE-2021-2109利用dnslog批量验证漏洞poc及exp",
"fork": false,
"created_at": "2021-05-13T13:28:15Z",
"updated_at": "2021-05-13T15:13:38Z",
"pushed_at": "2021-05-13T13:53:50Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
}
]

25
2021/CVE-2021-14562.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 367006674,
"name": "CVE-2021-14562",
"full_name": "Jarry1sec\/CVE-2021-14562",
"owner": {
"login": "Jarry1sec",
"id": 54568928,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54568928?v=4",
"html_url": "https:\/\/github.com\/Jarry1sec"
},
"html_url": "https:\/\/github.com\/Jarry1sec\/CVE-2021-14562",
"description": null,
"fork": false,
"created_at": "2021-05-13T09:59:38Z",
"updated_at": "2021-05-13T09:59:38Z",
"pushed_at": "2021-05-13T09:59:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2021-1732 Exploit",
"fork": false,
"created_at": "2021-03-05T02:11:10Z",
"updated_at": "2021-05-12T21:07:34Z",
"updated_at": "2021-05-13T14:23:40Z",
"pushed_at": "2021-03-05T03:10:26Z",
"stargazers_count": 286,
"watchers_count": 286,
"stargazers_count": 287,
"watchers_count": 287,
"forks_count": 69,
"forks": 69,
"watchers": 286,
"watchers": 287,
"score": 0
},
{
@ -109,8 +109,8 @@
"pushed_at": "2021-04-23T08:28:53Z",
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 10,
"forks": 10,
"forks_count": 11,
"forks": 11,
"watchers": 42,
"score": 0
},

25
2021/CVE-2021-20202.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 367001041,
"name": "CVE-2021-20202",
"full_name": "Jarry1sec\/CVE-2021-20202",
"owner": {
"login": "Jarry1sec",
"id": 54568928,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54568928?v=4",
"html_url": "https:\/\/github.com\/Jarry1sec"
},
"html_url": "https:\/\/github.com\/Jarry1sec\/CVE-2021-20202",
"description": null,
"fork": false,
"created_at": "2021-05-13T09:36:50Z",
"updated_at": "2021-05-13T09:36:50Z",
"pushed_at": "2021-05-13T09:36:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -44,5 +44,51 @@
"forks": 1,
"watchers": 6,
"score": 0
},
{
"id": 367057442,
"name": "ofbiz-poc",
"full_name": "yuaneuro\/ofbiz-poc",
"owner": {
"login": "yuaneuro",
"id": 42265015,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42265015?v=4",
"html_url": "https:\/\/github.com\/yuaneuro"
},
"html_url": "https:\/\/github.com\/yuaneuro\/ofbiz-poc",
"description": "CVE-2020-9496和CVE-2021-2109利用dnslog批量验证漏洞poc及exp",
"fork": false,
"created_at": "2021-05-13T13:28:15Z",
"updated_at": "2021-05-13T15:13:38Z",
"pushed_at": "2021-05-13T13:53:50Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 367086891,
"name": "weblogic_CVE-2021-2109_poc",
"full_name": "yuaneuro\/weblogic_CVE-2021-2109_poc",
"owner": {
"login": "yuaneuro",
"id": 42265015,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42265015?v=4",
"html_url": "https:\/\/github.com\/yuaneuro"
},
"html_url": "https:\/\/github.com\/yuaneuro\/weblogic_CVE-2021-2109_poc",
"description": "weblogic CVE-2021-2109批量验证poc",
"fork": false,
"created_at": "2021-05-13T15:10:03Z",
"updated_at": "2021-05-13T15:10:06Z",
"pushed_at": "2021-05-13T15:10:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2021/CVE-2021-21551.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 367056155,
"name": "CVE-2021-21551",
"full_name": "waldo-irc\/CVE-2021-21551",
"owner": {
"login": "waldo-irc",
"id": 10516272,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10516272?v=4",
"html_url": "https:\/\/github.com\/waldo-irc"
},
"html_url": "https:\/\/github.com\/waldo-irc\/CVE-2021-21551",
"description": "Exploit to SYSTEM for CVE-2021-21551",
"fork": false,
"created_at": "2021-05-13T13:23:38Z",
"updated_at": "2021-05-13T14:59:44Z",
"pushed_at": "2021-05-13T13:47:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972",
"fork": false,
"created_at": "2020-03-11T17:51:29Z",
"updated_at": "2021-05-12T08:04:18Z",
"updated_at": "2021-05-13T12:59:57Z",
"pushed_at": "2021-02-25T17:19:39Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 16,
"forks": 16,
"watchers": 60,
"watchers": 61,
"score": 0
},
{

View file

@ -385,8 +385,8 @@
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 713,
"watchers_count": 713,
"forks_count": 198,
"forks": 198,
"forks_count": 199,
"forks": 199,
"watchers": 713,
"score": 0
},

View file

@ -70,6 +70,8 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
- [Al1ex/CVE-2021-2109](https://github.com/Al1ex/CVE-2021-2109)
- [rabbitsafe/CVE-2021-2109](https://github.com/rabbitsafe/CVE-2021-2109)
- [yuaneuro/ofbiz-poc](https://github.com/yuaneuro/ofbiz-poc)
- [yuaneuro/weblogic_CVE-2021-2109_poc](https://github.com/yuaneuro/weblogic_CVE-2021-2109_poc)
### CVE-2021-2321 (2021-04-28)
@ -297,6 +299,17 @@ The overlayfs implementation in the linux kernel did not properly validate with
### CVE-2021-11123
- [chenanu123/cve-2021-11123](https://github.com/chenanu123/cve-2021-11123)
### CVE-2021-14562
- [Jarry1sec/CVE-2021-14562](https://github.com/Jarry1sec/CVE-2021-14562)
### CVE-2021-20202 (2021-05-12)
<code>
A flaw was found in keycloak. Directories can be created prior to the Java process creating them in the temporary directory, but with wider user permissions, allowing the attacker to have access to the contents that keycloak stores in this directory. The highest threat from this vulnerability is to data confidentiality and integrity.
</code>
- [Jarry1sec/CVE-2021-20202](https://github.com/Jarry1sec/CVE-2021-20202)
### CVE-2021-20716 (2021-04-27)
<code>
@ -446,6 +459,14 @@ Dell Hybrid Client versions prior to 1.5 contain an information exposure vulnera
- [JamesGeee/CVE-2021-21536](https://github.com/JamesGeee/CVE-2021-21536)
### CVE-2021-21551 (2021-05-04)
<code>
Dell dbutil_2_3.sys driver contains an insufficient access control vulnerability which may lead to escalation of privileges, denial of service, or information disclosure. Local authenticated user access is required.
</code>
- [waldo-irc/CVE-2021-21551](https://github.com/waldo-irc/CVE-2021-21551)
### CVE-2021-21972 (2021-02-24)
<code>
@ -3234,6 +3255,7 @@ XML-RPC request are vulnerable to unsafe deserialization and Cross-Site Scriptin
- [Vulnmachines/apache-ofbiz-CVE-2020-9496](https://github.com/Vulnmachines/apache-ofbiz-CVE-2020-9496)
- [g33xter/CVE-2020-9496](https://github.com/g33xter/CVE-2020-9496)
- [cyber-niz/CVE-2020-9496](https://github.com/cyber-niz/CVE-2020-9496)
- [yuaneuro/ofbiz-poc](https://github.com/yuaneuro/ofbiz-poc)
### CVE-2020-9547 (2020-03-01)
@ -5330,6 +5352,7 @@ Git LFS 2.12.0 allows Remote Code Execution.
- [DeeLMind/CVE-2020-27955-LFS](https://github.com/DeeLMind/CVE-2020-27955-LFS)
- [exileddb/CVE-2020-27955](https://github.com/exileddb/CVE-2020-27955)
- [IanSmith123/CVE-2020-27955](https://github.com/IanSmith123/CVE-2020-27955)
- [qzyqzynb/CVE-2020-27955](https://github.com/qzyqzynb/CVE-2020-27955)
### CVE-2020-27976 (2020-10-28)