Auto Update 2021/05/17 06:11:26

This commit is contained in:
motikan2010-bot 2021-05-17 06:11:26 +09:00
parent 623e5a4bd0
commit ec8cbeb5ef
17 changed files with 135 additions and 54 deletions

View file

@ -182,5 +182,28 @@
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 0,
"score": 0 "score": 0
},
{
"id": 367962536,
"name": "ProFTPD_CVE-2015-3306",
"full_name": "m4udSec\/ProFTPD_CVE-2015-3306",
"owner": {
"login": "m4udSec",
"id": 56730389,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56730389?v=4",
"html_url": "https:\/\/github.com\/m4udSec"
},
"html_url": "https:\/\/github.com\/m4udSec\/ProFTPD_CVE-2015-3306",
"description": null,
"fork": false,
"created_at": "2021-05-16T18:57:14Z",
"updated_at": "2021-05-16T19:15:14Z",
"pushed_at": "2021-05-16T19:15:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2019-10-22T15:00:48Z", "created_at": "2019-10-22T15:00:48Z",
"updated_at": "2021-03-17T03:29:59Z", "updated_at": "2021-05-16T20:12:07Z",
"pushed_at": "2019-10-22T15:03:34Z", "pushed_at": "2019-10-22T15:03:34Z",
"stargazers_count": 20, "stargazers_count": 21,
"watchers_count": 20, "watchers_count": 21,
"forks_count": 4, "forks_count": 4,
"forks": 4, "forks": 4,
"watchers": 20, "watchers": 21,
"score": 0 "score": 0
} }
] ]

View file

@ -450,13 +450,13 @@
"description": "CVE-2020-0601 #curveball - Alternative Key Calculator", "description": "CVE-2020-0601 #curveball - Alternative Key Calculator",
"fork": false, "fork": false,
"created_at": "2020-01-20T16:24:20Z", "created_at": "2020-01-20T16:24:20Z",
"updated_at": "2021-01-09T15:45:54Z", "updated_at": "2021-05-16T20:46:56Z",
"pushed_at": "2020-01-20T23:00:14Z", "pushed_at": "2020-01-20T23:00:14Z",
"stargazers_count": 64, "stargazers_count": 65,
"watchers_count": 64, "watchers_count": 65,
"forks_count": 11, "forks_count": 11,
"forks": 11, "forks": 11,
"watchers": 64, "watchers": 65,
"score": 0 "score": 0
}, },
{ {

View file

@ -1324,13 +1324,13 @@
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection", "description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
"fork": false, "fork": false,
"created_at": "2020-06-10T16:44:39Z", "created_at": "2020-06-10T16:44:39Z",
"updated_at": "2021-05-15T11:38:46Z", "updated_at": "2021-05-16T18:18:06Z",
"pushed_at": "2021-01-15T19:21:25Z", "pushed_at": "2021-01-15T19:21:25Z",
"stargazers_count": 110, "stargazers_count": 111,
"watchers_count": 110, "watchers_count": 111,
"forks_count": 33, "forks_count": 33,
"forks": 33, "forks": 33,
"watchers": 110, "watchers": 111,
"score": 0 "score": 0
}, },
{ {

View file

@ -36,8 +36,8 @@
"description": "Python script to exploit CVE-2020-14321 - Course enrolments allowed privilege escalation from teacher role into manager role to RCE.", "description": "Python script to exploit CVE-2020-14321 - Course enrolments allowed privilege escalation from teacher role into manager role to RCE.",
"fork": false, "fork": false,
"created_at": "2021-04-28T19:46:55Z", "created_at": "2021-04-28T19:46:55Z",
"updated_at": "2021-05-03T06:59:41Z", "updated_at": "2021-05-16T15:58:52Z",
"pushed_at": "2021-04-28T19:51:52Z", "pushed_at": "2021-05-16T15:58:50Z",
"stargazers_count": 1, "stargazers_count": 1,
"watchers_count": 1, "watchers_count": 1,
"forks_count": 0, "forks_count": 0,

View file

@ -312,13 +312,13 @@
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ", "description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
"fork": false, "fork": false,
"created_at": "2020-02-22T16:16:20Z", "created_at": "2020-02-22T16:16:20Z",
"updated_at": "2021-05-16T14:47:53Z", "updated_at": "2021-05-16T20:41:30Z",
"pushed_at": "2020-03-09T14:51:43Z", "pushed_at": "2020-03-09T14:51:43Z",
"stargazers_count": 190, "stargazers_count": 191,
"watchers_count": 190, "watchers_count": 191,
"forks_count": 70, "forks_count": 71,
"forks": 70, "forks": 71,
"watchers": 190, "watchers": 191,
"score": 0 "score": 0
}, },
{ {

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-03-11T03:54:34Z", "pushed_at": "2020-03-11T03:54:34Z",
"stargazers_count": 31, "stargazers_count": 31,
"watchers_count": 31, "watchers_count": 31,
"forks_count": 12, "forks_count": 13,
"forks": 12, "forks": 13,
"watchers": 31, "watchers": 31,
"score": 0 "score": 0
}, },

View file

@ -109,8 +109,8 @@
"pushed_at": "2020-07-06T17:47:17Z", "pushed_at": "2020-07-06T17:47:17Z",
"stargazers_count": 71, "stargazers_count": 71,
"watchers_count": 71, "watchers_count": 71,
"forks_count": 23, "forks_count": 24,
"forks": 23, "forks": 24,
"watchers": 71, "watchers": 71,
"score": 0 "score": 0
}, },

View file

@ -36,13 +36,13 @@
"description": "CVE-­2021­-1732 Microsoft Windows 10 本地提权漏 研究及Poc\/Exploit开发", "description": "CVE-­2021­-1732 Microsoft Windows 10 本地提权漏 研究及Poc\/Exploit开发",
"fork": false, "fork": false,
"created_at": "2021-03-08T05:07:15Z", "created_at": "2021-03-08T05:07:15Z",
"updated_at": "2021-05-12T13:59:44Z", "updated_at": "2021-05-16T20:38:04Z",
"pushed_at": "2021-03-08T11:41:19Z", "pushed_at": "2021-03-08T11:41:19Z",
"stargazers_count": 14, "stargazers_count": 15,
"watchers_count": 14, "watchers_count": 15,
"forks_count": 7, "forks_count": 7,
"forks": 7, "forks": 7,
"watchers": 14, "watchers": 15,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "Exploit to SYSTEM for CVE-2021-21551", "description": "Exploit to SYSTEM for CVE-2021-21551",
"fork": false, "fork": false,
"created_at": "2021-05-13T13:23:38Z", "created_at": "2021-05-13T13:23:38Z",
"updated_at": "2021-05-16T10:20:04Z", "updated_at": "2021-05-16T19:17:00Z",
"pushed_at": "2021-05-13T15:22:07Z", "pushed_at": "2021-05-13T15:22:07Z",
"stargazers_count": 119, "stargazers_count": 128,
"watchers_count": 119, "watchers_count": 128,
"forks_count": 18, "forks_count": 20,
"forks": 18, "forks": 20,
"watchers": 119, "watchers": 128,
"score": 0 "score": 0
} }
] ]

View file

@ -358,13 +358,13 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2021-03-09T16:54:39Z", "created_at": "2021-03-09T16:54:39Z",
"updated_at": "2021-05-14T17:16:04Z", "updated_at": "2021-05-16T20:39:32Z",
"pushed_at": "2021-03-09T16:56:09Z", "pushed_at": "2021-03-09T16:56:09Z",
"stargazers_count": 79, "stargazers_count": 80,
"watchers_count": 79, "watchers_count": 80,
"forks_count": 60, "forks_count": 60,
"forks": 60, "forks": 60,
"watchers": 79, "watchers": 80,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,36 @@
"description": "RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2", "description": "RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2",
"fork": false, "fork": false,
"created_at": "2021-05-16T01:40:47Z", "created_at": "2021-05-16T01:40:47Z",
"updated_at": "2021-05-16T14:55:16Z", "updated_at": "2021-05-16T19:50:53Z",
"pushed_at": "2021-05-16T05:54:07Z", "pushed_at": "2021-05-16T05:54:07Z",
"stargazers_count": 8, "stargazers_count": 14,
"watchers_count": 8, "watchers_count": 14,
"forks_count": 3, "forks_count": 3,
"forks": 3, "forks": 3,
"watchers": 8, "watchers": 14,
"score": 0
},
{
"id": 367973600,
"name": "CVE-2021-27651",
"full_name": "Vulnmachines\/CVE-2021-27651",
"owner": {
"login": "Vulnmachines",
"id": 79006904,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
"html_url": "https:\/\/github.com\/Vulnmachines"
},
"html_url": "https:\/\/github.com\/Vulnmachines\/CVE-2021-27651",
"description": "Pega Infinity Password Reset",
"fork": false,
"created_at": "2021-05-16T19:58:31Z",
"updated_at": "2021-05-16T20:00:08Z",
"pushed_at": "2021-05-16T20:00:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0 "score": 0
} }
] ]

View file

@ -36,8 +36,8 @@
"description": "VOIP RCE", "description": "VOIP RCE",
"fork": false, "fork": false,
"created_at": "2021-05-07T09:22:01Z", "created_at": "2021-05-07T09:22:01Z",
"updated_at": "2021-05-07T13:24:21Z", "updated_at": "2021-05-16T20:01:34Z",
"pushed_at": "2021-05-07T09:23:38Z", "pushed_at": "2021-05-16T20:01:31Z",
"stargazers_count": 1, "stargazers_count": 1,
"watchers_count": 1, "watchers_count": 1,
"forks_count": 1, "forks_count": 1,

25
2021/CVE-2021-31166.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 367930039,
"name": "CVE-2021-31166",
"full_name": "0vercl0k\/CVE-2021-31166",
"owner": {
"login": "0vercl0k",
"id": 1476421,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1476421?v=4",
"html_url": "https:\/\/github.com\/0vercl0k"
},
"html_url": "https:\/\/github.com\/0vercl0k\/CVE-2021-31166",
"description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
"fork": false,
"created_at": "2021-05-16T16:15:56Z",
"updated_at": "2021-05-16T21:09:45Z",
"pushed_at": "2021-05-16T20:48:28Z",
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 6,
"forks": 6,
"watchers": 23,
"score": 0
}
]

View file

@ -381,13 +381,13 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2021-01-30T20:39:58Z", "created_at": "2021-01-30T20:39:58Z",
"updated_at": "2021-05-16T12:11:15Z", "updated_at": "2021-05-16T20:41:07Z",
"pushed_at": "2021-02-02T17:07:09Z", "pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 714, "stargazers_count": 715,
"watchers_count": 714, "watchers_count": 715,
"forks_count": 199, "forks_count": 199,
"forks": 199, "forks": 199,
"watchers": 714, "watchers": 715,
"score": 0 "score": 0
}, },
{ {
@ -864,8 +864,8 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2021-03-09T18:53:14Z", "created_at": "2021-03-09T18:53:14Z",
"updated_at": "2021-04-30T13:20:15Z", "updated_at": "2021-05-16T21:16:46Z",
"pushed_at": "2021-04-30T13:20:13Z", "pushed_at": "2021-05-16T21:16:44Z",
"stargazers_count": 2, "stargazers_count": 2,
"watchers_count": 2, "watchers_count": 2,
"forks_count": 0, "forks_count": 0,

View file

@ -13,13 +13,13 @@
"description": "A Python program implementing and exploiting the Minsky Turing machine considered in the paper \"Intrinsic Propensity for Vulnerability in Computers? Arbitrary Code Execution in the Universal Turing Machine\" as per CVE-2021-32471 (https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-32471)", "description": "A Python program implementing and exploiting the Minsky Turing machine considered in the paper \"Intrinsic Propensity for Vulnerability in Computers? Arbitrary Code Execution in the Universal Turing Machine\" as per CVE-2021-32471 (https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-32471)",
"fork": false, "fork": false,
"created_at": "2021-01-21T10:39:42Z", "created_at": "2021-01-21T10:39:42Z",
"updated_at": "2021-05-16T11:13:32Z", "updated_at": "2021-05-16T15:39:00Z",
"pushed_at": "2021-05-15T09:09:15Z", "pushed_at": "2021-05-15T09:09:15Z",
"stargazers_count": 35, "stargazers_count": 36,
"watchers_count": 35, "watchers_count": 36,
"forks_count": 3, "forks_count": 3,
"forks": 3, "forks": 3,
"watchers": 35, "watchers": 36,
"score": 0 "score": 0
} }
] ]

View file

@ -943,6 +943,7 @@ In versions 8.2.1 through 8.5.2 of Pega Infinity, the password reset functionali
</code> </code>
- [samwcyo/CVE-2021-27651-PoC](https://github.com/samwcyo/CVE-2021-27651-PoC) - [samwcyo/CVE-2021-27651-PoC](https://github.com/samwcyo/CVE-2021-27651-PoC)
- [Vulnmachines/CVE-2021-27651](https://github.com/Vulnmachines/CVE-2021-27651)
### CVE-2021-27890 (2021-03-15) ### CVE-2021-27890 (2021-03-15)
@ -1260,6 +1261,14 @@ An input validation flaw in the Symantec Security Analytics web UI 7.2 prior 7.2
- [JamesGeee/CVE-2021-30642](https://github.com/JamesGeee/CVE-2021-30642) - [JamesGeee/CVE-2021-30642](https://github.com/JamesGeee/CVE-2021-30642)
### CVE-2021-31166 (2021-05-11)
<code>
HTTP Protocol Stack Remote Code Execution Vulnerability
</code>
- [0vercl0k/CVE-2021-31166](https://github.com/0vercl0k/CVE-2021-31166)
### CVE-2021-31184 (2021-05-11) ### CVE-2021-31184 (2021-05-11)
<code> <code>
@ -16470,6 +16479,7 @@ The mod_copy module in ProFTPD 1.3.5 allows remote attackers to read and write t
- [hackarada/cve-2015-3306](https://github.com/hackarada/cve-2015-3306) - [hackarada/cve-2015-3306](https://github.com/hackarada/cve-2015-3306)
- [cdedmondson/Modified-CVE-2015-3306-Exploit](https://github.com/cdedmondson/Modified-CVE-2015-3306-Exploit) - [cdedmondson/Modified-CVE-2015-3306-Exploit](https://github.com/cdedmondson/Modified-CVE-2015-3306-Exploit)
- [cd6629/CVE-2015-3306-Python-PoC](https://github.com/cd6629/CVE-2015-3306-Python-PoC) - [cd6629/CVE-2015-3306-Python-PoC](https://github.com/cd6629/CVE-2015-3306-Python-PoC)
- [m4udSec/ProFTPD_CVE-2015-3306](https://github.com/m4udSec/ProFTPD_CVE-2015-3306)
### CVE-2015-3337 (2015-05-01) ### CVE-2015-3337 (2015-05-01)