Auto Update 2021/06/01 18:11:51

This commit is contained in:
motikan2010-bot 2021-06-01 18:11:51 +09:00
parent 63f9baa1e1
commit edcb821634
33 changed files with 192 additions and 112 deletions

View file

@ -40,8 +40,8 @@
"pushed_at": "2017-03-09T23:00:08Z",
"stargazers_count": 80,
"watchers_count": 80,
"forks_count": 54,
"forks": 54,
"forks_count": 55,
"forks": 55,
"watchers": 80,
"score": 0
},

View file

@ -132,8 +132,8 @@
"pushed_at": "2018-04-17T23:14:39Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 7,
"forks": 7,
"forks_count": 8,
"forks": 8,
"watchers": 2,
"score": 0
},

View file

@ -312,13 +312,13 @@
"description": "An exploit for Apache Struts CVE-2017-5638",
"fork": false,
"created_at": "2017-03-12T02:02:25Z",
"updated_at": "2021-05-26T12:07:49Z",
"updated_at": "2021-06-01T08:23:08Z",
"pushed_at": "2018-05-21T18:33:26Z",
"stargazers_count": 393,
"watchers_count": 393,
"stargazers_count": 395,
"watchers_count": 395,
"forks_count": 142,
"forks": 142,
"watchers": 393,
"watchers": 395,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)",
"fork": false,
"created_at": "2018-01-16T00:23:34Z",
"updated_at": "2021-05-13T09:56:39Z",
"updated_at": "2021-06-01T06:02:08Z",
"pushed_at": "2020-12-22T03:10:47Z",
"stargazers_count": 103,
"watchers_count": 103,
"stargazers_count": 104,
"watchers_count": 104,
"forks_count": 40,
"forks": 40,
"watchers": 103,
"watchers": 104,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-10-16T12:09:45Z",
"stargazers_count": 423,
"watchers_count": 423,
"forks_count": 401,
"forks": 401,
"forks_count": 402,
"forks": 402,
"watchers": 423,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-04-19T11:20:41Z",
"stargazers_count": 114,
"watchers_count": 114,
"forks_count": 34,
"forks": 34,
"forks_count": 35,
"forks": 35,
"watchers": 114,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2021-05-25T10:21:05Z",
"updated_at": "2021-06-01T06:46:56Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 421,
"watchers_count": 421,
"forks_count": 99,
"forks": 99,
"watchers": 421,
"stargazers_count": 422,
"watchers_count": 422,
"forks_count": 100,
"forks": 100,
"watchers": 422,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
"fork": false,
"created_at": "2018-04-12T22:53:14Z",
"updated_at": "2021-05-31T15:21:45Z",
"updated_at": "2021-06-01T03:33:15Z",
"pushed_at": "2021-01-08T10:31:22Z",
"stargazers_count": 480,
"watchers_count": 480,
"stargazers_count": 481,
"watchers_count": 481,
"forks_count": 159,
"forks": 159,
"watchers": 480,
"watchers": 481,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Apache Solr DataImport Handler RCE",
"fork": false,
"created_at": "2019-08-09T06:27:39Z",
"updated_at": "2021-05-24T07:23:17Z",
"updated_at": "2021-06-01T08:12:20Z",
"pushed_at": "2019-08-12T02:23:38Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 81,
"watchers_count": 81,
"forks_count": 39,
"forks": 39,
"watchers": 80,
"watchers": 81,
"score": 0
},
{

View file

@ -2244,13 +2244,13 @@
"description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )",
"fork": false,
"created_at": "2019-09-30T19:46:21Z",
"updated_at": "2021-05-24T17:12:12Z",
"updated_at": "2021-06-01T08:46:13Z",
"pushed_at": "2021-02-06T00:24:21Z",
"stargazers_count": 190,
"watchers_count": 190,
"stargazers_count": 189,
"watchers_count": 189,
"forks_count": 73,
"forks": 73,
"watchers": 190,
"watchers": 189,
"score": 0
},
{

View file

@ -63,8 +63,8 @@
"pushed_at": "2019-06-18T14:57:22Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 6,
"forks": 6,
"forks_count": 7,
"forks": 7,
"watchers": 16,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": " double-free bug in WhatsApp exploit poc",
"fork": false,
"created_at": "2019-10-03T09:26:24Z",
"updated_at": "2021-05-18T00:05:13Z",
"updated_at": "2021-06-01T08:46:13Z",
"pushed_at": "2021-03-19T17:23:25Z",
"stargazers_count": 248,
"watchers_count": 248,
"stargazers_count": 247,
"watchers_count": 247,
"forks_count": 77,
"forks": 77,
"watchers": 248,
"watchers": 247,
"score": 0
},
{

View file

@ -312,13 +312,13 @@
"description": null,
"fork": false,
"created_at": "2020-11-09T21:46:57Z",
"updated_at": "2021-05-03T05:31:35Z",
"updated_at": "2021-06-01T03:34:21Z",
"pushed_at": "2021-02-07T19:51:24Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 2,
"forks": 2,
"watchers": 10,
"watchers": 11,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-11-20T15:05:54Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 5,
"forks": 5,
"forks_count": 6,
"forks": 6,
"watchers": 4,
"score": 0
}

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-01-10T10:58:44Z",
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 5,
"forks": 5,
"forks_count": 4,
"forks": 4,
"watchers": 21,
"score": 0
},
@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-05-31T13:23:17Z",
"updated_at": "2021-06-01T06:28:54Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2604,
"watchers_count": 2604,
"stargazers_count": 2605,
"watchers_count": 2605,
"forks_count": 761,
"forks": 761,
"watchers": 2604,
"watchers": 2605,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "CVE-2020-0022 vulnerability exploitation on Bouygues BBox Miami (Android TV 8.0 - ARM32 Cortex A9)",
"fork": false,
"created_at": "2020-08-24T19:33:10Z",
"updated_at": "2021-04-23T16:18:39Z",
"updated_at": "2021-06-01T08:38:51Z",
"pushed_at": "2021-03-21T20:59:46Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 6,
"forks": 6,
"watchers": 15,
"watchers": 17,
"score": 0
},
{

View file

@ -151,8 +151,8 @@
"description": "Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.",
"fork": false,
"created_at": "2020-02-28T16:04:30Z",
"updated_at": "2021-03-11T15:57:50Z",
"pushed_at": "2020-10-07T08:10:46Z",
"updated_at": "2021-06-01T07:36:56Z",
"pushed_at": "2021-06-01T07:36:53Z",
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 12,

View file

@ -105,13 +105,13 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-03-11T15:21:27Z",
"updated_at": "2021-05-31T18:31:06Z",
"updated_at": "2021-06-01T07:43:57Z",
"pushed_at": "2020-10-01T08:36:29Z",
"stargazers_count": 592,
"watchers_count": 592,
"stargazers_count": 593,
"watchers_count": 593,
"forks_count": 197,
"forks": 197,
"watchers": 592,
"watchers": 593,
"score": 0
},
{

View file

@ -224,8 +224,8 @@
"pushed_at": "2020-10-04T16:18:45Z",
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 14,
"forks": 14,
"forks_count": 13,
"forks": 13,
"watchers": 21,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-05-31T13:23:17Z",
"updated_at": "2021-06-01T06:28:54Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2604,
"watchers_count": 2604,
"stargazers_count": 2605,
"watchers_count": 2605,
"forks_count": 761,
"forks": 761,
"watchers": 2604,
"watchers": 2605,
"score": 0
},
{

25
2020/CVE-2020-19999.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 372693347,
"name": "CVE-2020-19999test-5",
"full_name": "dorisroot1\/CVE-2020-19999test-5",
"owner": {
"login": "dorisroot1",
"id": 30891737,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30891737?v=4",
"html_url": "https:\/\/github.com\/dorisroot1"
},
"html_url": "https:\/\/github.com\/dorisroot1\/CVE-2020-19999test-5",
"description": "cve-2021-19999test",
"fork": false,
"created_at": "2021-06-01T03:44:30Z",
"updated_at": "2021-06-01T07:25:52Z",
"pushed_at": "2021-06-01T03:44:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -197,13 +197,13 @@
"description": "exploit code for F5-Big-IP (CVE-2020-5902)",
"fork": false,
"created_at": "2020-07-06T01:12:23Z",
"updated_at": "2021-05-31T18:23:04Z",
"updated_at": "2021-06-01T06:34:22Z",
"pushed_at": "2020-07-06T01:36:32Z",
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 12,
"forks": 12,
"watchers": 24,
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 13,
"forks": 13,
"watchers": 26,
"score": 0
},
{

25
2021/CVE-2021-19999.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 372693347,
"name": "CVE-2020-19999test-5",
"full_name": "dorisroot1\/CVE-2020-19999test-5",
"owner": {
"login": "dorisroot1",
"id": 30891737,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30891737?v=4",
"html_url": "https:\/\/github.com\/dorisroot1"
},
"html_url": "https:\/\/github.com\/dorisroot1\/CVE-2020-19999test-5",
"description": "cve-2021-19999test",
"fork": false,
"created_at": "2021-06-01T03:44:30Z",
"updated_at": "2021-06-01T07:25:52Z",
"pushed_at": "2021-06-01T03:44:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "POC for CVE2021-2091 VMWare ESXi RCE Exploit",
"fork": false,
"created_at": "2021-05-25T17:14:38Z",
"updated_at": "2021-05-26T03:06:30Z",
"updated_at": "2021-06-01T06:55:36Z",
"pushed_at": "2021-05-31T17:29:25Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "CVE-2021-21972 Exploit",
"fork": false,
"created_at": "2021-02-24T11:14:58Z",
"updated_at": "2021-06-01T02:14:51Z",
"updated_at": "2021-06-01T08:46:00Z",
"pushed_at": "2021-03-10T05:01:22Z",
"stargazers_count": 258,
"watchers_count": 258,
"stargazers_count": 259,
"watchers_count": 259,
"forks_count": 97,
"forks": 97,
"watchers": 258,
"watchers": 259,
"score": 0
},
{

View file

@ -36,13 +36,36 @@
"description": null,
"fork": false,
"created_at": "2021-05-29T13:07:14Z",
"updated_at": "2021-06-01T02:13:36Z",
"updated_at": "2021-06-01T09:10:48Z",
"pushed_at": "2021-05-31T06:14:36Z",
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 5,
"forks": 5,
"watchers": 18,
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 6,
"forks": 6,
"watchers": 38,
"score": 0
},
{
"id": 372757311,
"name": "CVE-2021-21985-Checker",
"full_name": "onSec-fr\/CVE-2021-21985-Checker",
"owner": {
"login": "onSec-fr",
"id": 59887731,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59887731?v=4",
"html_url": "https:\/\/github.com\/onSec-fr"
},
"html_url": "https:\/\/github.com\/onSec-fr\/CVE-2021-21985-Checker",
"description": "CVE-2021-21985 Checker (credits to alt3kx).",
"fork": false,
"created_at": "2021-06-01T08:31:05Z",
"updated_at": "2021-06-01T08:32:27Z",
"pushed_at": "2021-06-01T08:32:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Chaining CVE-2021-25281 and CVE-2021-25282 to exploit a SaltStack",
"fork": false,
"created_at": "2021-02-26T12:08:25Z",
"updated_at": "2021-04-02T11:22:44Z",
"updated_at": "2021-06-01T06:31:58Z",
"pushed_at": "2021-03-06T12:50:35Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 4,
"forks": 4,
"watchers": 22,
"watchers": 23,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-04-28T17:56:04Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 5,
"forks": 5,
"forks_count": 6,
"forks": 6,
"watchers": 9,
"score": 0
}

View file

@ -59,13 +59,13 @@
"description": "CVE-2021-26295 EXP 可成功反弹Shell",
"fork": false,
"created_at": "2021-03-24T10:08:54Z",
"updated_at": "2021-05-21T10:54:15Z",
"updated_at": "2021-06-01T07:17:33Z",
"pushed_at": "2021-05-10T02:09:51Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 4,
"forks": 4,
"watchers": 11,
"watchers": 12,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2021-04-26T14:21:30Z",
"updated_at": "2021-04-29T02:14:00Z",
"updated_at": "2021-06-01T07:32:55Z",
"pushed_at": "2021-04-26T14:23:48Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 2,
"forks": 2,
"watchers": 12,
"watchers": 13,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.",
"fork": false,
"created_at": "2021-05-31T18:02:39Z",
"updated_at": "2021-06-01T03:12:14Z",
"updated_at": "2021-06-01T08:58:37Z",
"pushed_at": "2021-05-31T21:30:00Z",
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 4,
"forks": 4,
"watchers": 29,
"stargazers_count": 71,
"watchers_count": 71,
"forks_count": 10,
"forks": 10,
"watchers": 71,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "WordPress - Authenticated XXE (CVE-2021-29447)",
"fork": false,
"created_at": "2021-04-16T20:41:26Z",
"updated_at": "2021-05-28T08:42:51Z",
"updated_at": "2021-06-01T08:00:31Z",
"pushed_at": "2021-04-18T00:45:34Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 5,
"forks": 5,
"watchers": 12,
"watchers": 13,
"score": 0
},
{

View file

@ -325,6 +325,9 @@ The overlayfs implementation in the linux kernel did not properly validate with
### CVE-2021-14562
- [Jarry1sec/CVE-2021-14562](https://github.com/Jarry1sec/CVE-2021-14562)
### CVE-2021-19999
- [dorisroot1/CVE-2020-19999test-5](https://github.com/dorisroot1/CVE-2020-19999test-5)
### CVE-2021-20202 (2021-05-12)
<code>
@ -534,6 +537,7 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability due to
- [bigbroke/CVE-2021-21985](https://github.com/bigbroke/CVE-2021-21985)
- [alt3kx/CVE-2021-21985_PoC](https://github.com/alt3kx/CVE-2021-21985_PoC)
- [onSec-fr/CVE-2021-21985-Checker](https://github.com/onSec-fr/CVE-2021-21985-Checker)
### CVE-2021-22192 (2021-03-24)
@ -4504,6 +4508,9 @@ A Java Serialization vulnerability was found in Apache Tapestry 4. Apache Tapest
- [154802388/CVE-2020-17531](https://github.com/154802388/CVE-2020-17531)
### CVE-2020-19999
- [dorisroot1/CVE-2020-19999test-5](https://github.com/dorisroot1/CVE-2020-19999test-5)
### CVE-2020-21224 (2021-02-22)
<code>