Auto Update 2021/06/09 12:11:10

This commit is contained in:
motikan2010-bot 2021-06-09 12:11:10 +09:00
parent e8618c2f15
commit e6c64007b8
26 changed files with 132 additions and 108 deletions

View file

@ -13,13 +13,13 @@
"description": "Primefaces <= 5.2.21, 5.3.8 or 6.0 - Remote Code Execution Exploit",
"fork": false,
"created_at": "2018-09-03T03:11:24Z",
"updated_at": "2021-05-08T21:46:43Z",
"updated_at": "2021-06-09T01:57:57Z",
"pushed_at": "2021-05-18T16:24:42Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 21,
"forks": 21,
"watchers": 52,
"watchers": 53,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "Multi-threaded, IPv6 aware, wordlists\/single-user username enumeration via CVE-2018-15473",
"fork": false,
"created_at": "2018-10-03T10:18:04Z",
"updated_at": "2021-04-18T14:45:00Z",
"updated_at": "2021-06-08T21:39:12Z",
"pushed_at": "2019-03-24T11:20:27Z",
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 6,
"forks": 6,
"watchers": 18,
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 7,
"forks": 7,
"watchers": 19,
"score": 0
},
{

View file

@ -316,8 +316,8 @@
"pushed_at": "2019-07-15T06:03:15Z",
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 27,
"forks": 27,
"forks_count": 28,
"forks": 28,
"watchers": 61,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Python script to scan for enabled OpenSLP services",
"fork": false,
"created_at": "2020-12-01T13:49:26Z",
"updated_at": "2021-06-04T02:27:09Z",
"updated_at": "2021-06-09T03:01:10Z",
"pushed_at": "2020-12-07T00:12:21Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 4,
"forks": 4,
"watchers": 18,
"watchers": 19,
"score": 0
},
{

View file

@ -864,13 +864,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2021-06-07T13:51:00Z",
"updated_at": "2021-06-09T02:01:07Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1123,
"watchers_count": 1123,
"stargazers_count": 1124,
"watchers_count": 1124,
"forks_count": 355,
"forks": 355,
"watchers": 1123,
"watchers": 1124,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE 2020-10135 a.k.a BIAS (Bluetooth Impersonation Attack)",
"fork": false,
"created_at": "2020-06-01T07:36:37Z",
"updated_at": "2021-01-26T18:00:48Z",
"updated_at": "2021-06-09T01:56:16Z",
"pushed_at": "2020-06-07T08:59:47Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 6,
"forks": 6,
"watchers": 19,
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 5,
"forks": 5,
"watchers": 20,
"score": 0
}
]

View file

@ -105,13 +105,13 @@
"description": "PoC exploit of CVE-2020-11651 and CVE-2020-11652",
"fork": false,
"created_at": "2020-05-04T11:52:28Z",
"updated_at": "2021-06-08T08:24:15Z",
"updated_at": "2021-06-09T01:27:45Z",
"pushed_at": "2020-07-10T09:30:47Z",
"stargazers_count": 92,
"watchers_count": 92,
"stargazers_count": 93,
"watchers_count": 93,
"forks_count": 39,
"forks": 39,
"watchers": 92,
"watchers": 93,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC para las vulnerabilidades CVE-2020-14750 y cve-2020-14882",
"fork": false,
"created_at": "2020-11-06T12:46:03Z",
"updated_at": "2021-05-13T06:31:39Z",
"updated_at": "2021-06-09T01:34:57Z",
"pushed_at": "2020-11-10T10:54:36Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 12,
"forks": 12,
"watchers": 32,
"watchers": 31,
"score": 0
},
{

View file

@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-06-07T02:26:09Z",
"updated_at": "2021-06-09T01:04:17Z",
"pushed_at": "2021-04-26T02:30:11Z",
"stargazers_count": 779,
"watchers_count": 779,
"stargazers_count": 780,
"watchers_count": 780,
"forks_count": 244,
"forks": 244,
"watchers": 779,
"watchers": 780,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-10-26T22:01:33Z",
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 7,
"forks": 7,
"forks_count": 8,
"forks": 8,
"watchers": 42,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "Python script to scan for enabled OpenSLP services",
"fork": false,
"created_at": "2020-12-01T13:49:26Z",
"updated_at": "2021-06-04T02:27:09Z",
"updated_at": "2021-06-09T03:01:10Z",
"pushed_at": "2020-12-07T00:12:21Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 4,
"forks": 4,
"watchers": 18,
"watchers": 19,
"score": 0
},
{

View file

@ -90,5 +90,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 373897544,
"name": "CVE-2020-8835-verification",
"full_name": "digamma-ai\/CVE-2020-8835-verification",
"owner": {
"login": "digamma-ai",
"id": 29720627,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29720627?v=4",
"html_url": "https:\/\/github.com\/digamma-ai"
},
"html_url": "https:\/\/github.com\/digamma-ai\/CVE-2020-8835-verification",
"description": "Formal verification example for CVE-2020-8835",
"fork": false,
"created_at": "2021-06-04T16:15:21Z",
"updated_at": "2021-06-08T21:45:07Z",
"pushed_at": "2021-06-08T21:42:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2021-1732 Exploit",
"fork": false,
"created_at": "2021-03-05T02:11:10Z",
"updated_at": "2021-06-07T19:00:38Z",
"updated_at": "2021-06-09T01:22:45Z",
"pushed_at": "2021-03-05T03:10:26Z",
"stargazers_count": 292,
"watchers_count": 292,
"stargazers_count": 293,
"watchers_count": 293,
"forks_count": 75,
"forks": 75,
"watchers": 292,
"watchers": 293,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "🐱‍💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...",
"fork": false,
"created_at": "2021-03-22T11:53:57Z",
"updated_at": "2021-05-17T18:31:55Z",
"updated_at": "2021-06-09T02:48:14Z",
"pushed_at": "2021-03-22T18:24:20Z",
"stargazers_count": 114,
"watchers_count": 114,
"stargazers_count": 115,
"watchers_count": 115,
"forks_count": 18,
"forks": 18,
"watchers": 114,
"watchers": 115,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "CVE-2021-21972 Exploit",
"fork": false,
"created_at": "2021-02-24T11:14:58Z",
"updated_at": "2021-06-06T23:29:40Z",
"updated_at": "2021-06-09T01:18:03Z",
"pushed_at": "2021-03-10T05:01:22Z",
"stargazers_count": 260,
"watchers_count": 260,
"stargazers_count": 261,
"watchers_count": 261,
"forks_count": 99,
"forks": 99,
"watchers": 260,
"watchers": 261,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2021-05-29T13:07:14Z",
"updated_at": "2021-06-08T17:39:37Z",
"updated_at": "2021-06-09T01:29:15Z",
"pushed_at": "2021-06-03T21:29:39Z",
"stargazers_count": 131,
"watchers_count": 131,
"forks_count": 30,
"forks": 30,
"watchers": 131,
"stargazers_count": 132,
"watchers_count": 132,
"forks_count": 31,
"forks": 31,
"watchers": 132,
"score": 0
},
{
@ -105,13 +105,13 @@
"description": "CVE-2021-21985 VMware vCenter Server远程代码执行漏洞 EXP (更新可回显EXP)",
"fork": false,
"created_at": "2021-06-03T09:59:21Z",
"updated_at": "2021-06-08T15:02:11Z",
"updated_at": "2021-06-09T02:30:47Z",
"pushed_at": "2021-06-05T08:35:27Z",
"stargazers_count": 164,
"watchers_count": 164,
"forks_count": 25,
"forks": 25,
"watchers": 164,
"stargazers_count": 168,
"watchers_count": 168,
"forks_count": 27,
"forks": 27,
"watchers": 168,
"score": 0
},
{
@ -132,8 +132,8 @@
"pushed_at": "2021-06-07T01:44:03Z",
"stargazers_count": 59,
"watchers_count": 59,
"forks_count": 16,
"forks": 16,
"forks_count": 17,
"forks": 17,
"watchers": 59,
"score": 0
},

View file

@ -128,13 +128,13 @@
"description": "CVE-2021-22986 & F5 BIG-IP RCE",
"fork": false,
"created_at": "2021-03-22T07:13:50Z",
"updated_at": "2021-06-08T15:42:56Z",
"updated_at": "2021-06-09T02:46:47Z",
"pushed_at": "2021-04-03T12:56:37Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 19,
"forks": 19,
"watchers": 50,
"watchers": 51,
"score": 0
},
{
@ -197,13 +197,13 @@
"description": "Code By:Tas9er \/ F5 BIG-IP 远程命令执行漏洞",
"fork": false,
"created_at": "2021-03-29T05:56:21Z",
"updated_at": "2021-04-17T10:00:02Z",
"updated_at": "2021-06-09T02:12:19Z",
"pushed_at": "2021-03-29T05:58:51Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-03-03T03:52:10Z",
"stargazers_count": 59,
"watchers_count": 59,
"forks_count": 25,
"forks": 25,
"forks_count": 26,
"forks": 26,
"watchers": 59,
"score": 0
}

View file

@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-06-07T02:26:09Z",
"updated_at": "2021-06-09T01:04:17Z",
"pushed_at": "2021-04-26T02:30:11Z",
"stargazers_count": 779,
"watchers_count": 779,
"stargazers_count": 780,
"watchers_count": 780,
"forks_count": 244,
"forks": 244,
"watchers": 779,
"watchers": 780,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.",
"fork": false,
"created_at": "2021-05-31T18:02:39Z",
"updated_at": "2021-06-07T11:28:37Z",
"updated_at": "2021-06-09T02:41:37Z",
"pushed_at": "2021-06-01T15:08:23Z",
"stargazers_count": 157,
"watchers_count": 157,
"stargazers_count": 160,
"watchers_count": 160,
"forks_count": 25,
"forks": 25,
"watchers": 157,
"watchers": 160,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
"fork": false,
"created_at": "2021-05-16T16:15:56Z",
"updated_at": "2021-06-08T10:14:14Z",
"updated_at": "2021-06-09T02:44:01Z",
"pushed_at": "2021-05-21T23:58:50Z",
"stargazers_count": 729,
"watchers_count": 729,
"stargazers_count": 730,
"watchers_count": 730,
"forks_count": 120,
"forks": 120,
"watchers": 729,
"watchers": 730,
"score": 0
},
{

View file

@ -40,8 +40,8 @@
"pushed_at": "2021-01-24T05:28:07Z",
"stargazers_count": 90,
"watchers_count": 90,
"forks_count": 32,
"forks": 32,
"forks_count": 33,
"forks": 33,
"watchers": 90,
"score": 0
},

View file

@ -59,13 +59,13 @@
"description": "CVE-2021-3156",
"fork": false,
"created_at": "2021-01-27T16:03:34Z",
"updated_at": "2021-06-08T04:20:10Z",
"updated_at": "2021-06-09T02:49:53Z",
"pushed_at": "2021-01-31T04:56:56Z",
"stargazers_count": 108,
"watchers_count": 108,
"stargazers_count": 109,
"watchers_count": 109,
"forks_count": 44,
"forks": 44,
"watchers": 108,
"watchers": 109,
"score": 0
},
{
@ -381,13 +381,13 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2021-06-05T16:48:21Z",
"updated_at": "2021-06-08T23:17:42Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 722,
"watchers_count": 722,
"stargazers_count": 723,
"watchers_count": 723,
"forks_count": 204,
"forks": 204,
"watchers": 722,
"watchers": 723,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "A Python program implementing and exploiting the Minsky Turing machine considered in the paper \"Intrinsic Propensity for Vulnerability in Computers? Arbitrary Code Execution in the Universal Turing Machine\" as per CVE-2021-32471 (https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-32471)",
"fork": false,
"created_at": "2021-01-21T10:39:42Z",
"updated_at": "2021-06-01T13:37:35Z",
"updated_at": "2021-06-09T01:57:39Z",
"pushed_at": "2021-05-30T05:25:24Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 4,
"forks": 4,
"watchers": 54,
"watchers": 55,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-06-07T09:04:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
}

View file

@ -2952,6 +2952,7 @@ In the Linux kernel 5.5.0 and newer, the bpf verifier (kernel/bpf/verifier.c) di
- [snappyJack/Rick_write_exp_CVE-2020-8835](https://github.com/snappyJack/Rick_write_exp_CVE-2020-8835)
- [ret2hell/CVE-2020-8835](https://github.com/ret2hell/CVE-2020-8835)
- [SplendidSky/CVE-2020-8835](https://github.com/SplendidSky/CVE-2020-8835)
- [digamma-ai/CVE-2020-8835-verification](https://github.com/digamma-ai/CVE-2020-8835-verification)
### CVE-2020-8840 (2020-02-10)