Auto Update 2021/08/16 00:12:47

This commit is contained in:
motikan2010-bot 2021-08-16 00:12:47 +09:00
parent 058890f96b
commit f005b71f26
19 changed files with 103 additions and 79 deletions

View file

@ -1240,5 +1240,28 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 396322717,
"name": "bleeding-heart",
"full_name": "pierceoneill\/bleeding-heart",
"owner": {
"login": "pierceoneill",
"id": 37594104,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37594104?v=4",
"html_url": "https:\/\/github.com\/pierceoneill"
},
"html_url": "https:\/\/github.com\/pierceoneill\/bleeding-heart",
"description": "The Heartbleed bug `CVE-2014-0160` is a severe implementation flaw in the OpenSSL library, which enables attackers to steal data from the memory of the victim server. The contents of the stolen data depend on what is there in the memory of the server. It could potentially contain private keys, TLS session keys, usernames, passwords, credit cards, etc. The vulnerability is in the implementation of the Heartbeat protocol, which is used by SSL\/TLS to keep the connection alive.",
"fork": false,
"created_at": "2021-08-15T11:05:23Z",
"updated_at": "2021-08-15T11:13:05Z",
"pushed_at": "2021-08-15T11:13:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1393,13 +1393,13 @@
"description": null,
"fork": false,
"created_at": "2021-03-09T12:56:08Z",
"updated_at": "2021-04-04T16:57:46Z",
"updated_at": "2021-08-15T12:24:09Z",
"pushed_at": "2021-04-03T14:42:10Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
},
{

View file

@ -109,8 +109,8 @@
"pushed_at": "2017-05-30T16:13:24Z",
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 22,
"forks": 22,
"forks_count": 23,
"forks": 23,
"watchers": 38,
"score": 0
},

View file

@ -13,8 +13,8 @@
"description": null,
"fork": false,
"created_at": "2018-07-26T19:31:45Z",
"updated_at": "2021-08-04T16:44:06Z",
"pushed_at": "2018-07-27T12:09:40Z",
"updated_at": "2021-08-15T14:18:14Z",
"pushed_at": "2021-08-15T14:18:12Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 7,

View file

@ -63,8 +63,8 @@
"pushed_at": "2019-06-21T11:29:41Z",
"stargazers_count": 322,
"watchers_count": 322,
"forks_count": 70,
"forks": 70,
"forks_count": 72,
"forks": 72,
"watchers": 322,
"score": 0
}

View file

@ -344,29 +344,6 @@
"watchers": 2,
"score": 0
},
{
"id": 368409342,
"name": "CVE-2018-9995-Exploit",
"full_name": "kienquoc102\/CVE-2018-9995-Exploit",
"owner": {
"login": "kienquoc102",
"id": 84182708,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84182708?v=4",
"html_url": "https:\/\/github.com\/kienquoc102"
},
"html_url": "https:\/\/github.com\/kienquoc102\/CVE-2018-9995-Exploit",
"description": null,
"fork": false,
"created_at": "2021-05-18T05:19:28Z",
"updated_at": "2021-06-04T12:03:29Z",
"pushed_at": "2021-06-04T12:03:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 374551249,
"name": "CVE-2018-9995-2",
@ -381,7 +358,7 @@
"description": null,
"fork": false,
"created_at": "2021-06-07T05:57:43Z",
"updated_at": "2021-08-04T09:32:35Z",
"updated_at": "2021-08-15T10:30:19Z",
"pushed_at": "2021-06-10T11:42:32Z",
"stargazers_count": 1,
"watchers_count": 1,

View file

@ -1025,13 +1025,13 @@
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
"fork": false,
"created_at": "2019-05-22T00:08:44Z",
"updated_at": "2021-08-03T11:05:19Z",
"updated_at": "2021-08-15T10:02:05Z",
"pushed_at": "2020-12-06T04:48:38Z",
"stargazers_count": 1156,
"watchers_count": 1156,
"stargazers_count": 1155,
"watchers_count": 1155,
"forks_count": 400,
"forks": 400,
"watchers": 1156,
"watchers": 1155,
"score": 0
},
{
@ -2244,13 +2244,13 @@
"description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )",
"fork": false,
"created_at": "2019-09-30T19:46:21Z",
"updated_at": "2021-07-30T03:25:43Z",
"updated_at": "2021-08-15T10:18:04Z",
"pushed_at": "2021-02-06T00:24:21Z",
"stargazers_count": 189,
"watchers_count": 189,
"stargazers_count": 188,
"watchers_count": 188,
"forks_count": 72,
"forks": 72,
"watchers": 189,
"watchers": 188,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Root your MediaTek arm64 device using mtk-su (CVE-2020-0069).",
"fork": false,
"created_at": "2019-09-06T12:12:48Z",
"updated_at": "2021-07-27T20:29:33Z",
"updated_at": "2021-08-15T11:10:50Z",
"pushed_at": "2021-05-31T21:22:33Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 66,
"watchers_count": 66,
"forks_count": 10,
"forks": 10,
"watchers": 65,
"watchers": 66,
"score": 0
},
{

View file

@ -105,13 +105,13 @@
"description": "PoC exploit of CVE-2020-11651 and CVE-2020-11652",
"fork": false,
"created_at": "2020-05-04T11:52:28Z",
"updated_at": "2021-07-01T18:10:42Z",
"updated_at": "2021-08-15T11:52:58Z",
"pushed_at": "2020-07-10T09:30:47Z",
"stargazers_count": 96,
"watchers_count": 96,
"stargazers_count": 97,
"watchers_count": 97,
"forks_count": 39,
"forks": 39,
"watchers": 96,
"watchers": 97,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-08-01T12:25:59Z",
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 6,
"forks": 6,
"forks_count": 7,
"forks": 7,
"watchers": 32,
"score": 0
},

View file

@ -128,13 +128,13 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2021-08-11T16:14:12Z",
"updated_at": "2021-08-15T14:24:27Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 351,
"watchers_count": 351,
"stargazers_count": 352,
"watchers_count": 352,
"forks_count": 106,
"forks": 106,
"watchers": 351,
"watchers": 352,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-01-24T09:05:40Z",
"stargazers_count": 72,
"watchers_count": 72,
"forks_count": 34,
"forks": 34,
"forks_count": 35,
"forks": 35,
"watchers": 72,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-3435 ",
"fork": false,
"created_at": "2020-09-25T20:53:48Z",
"updated_at": "2021-08-15T04:52:29Z",
"updated_at": "2021-08-15T11:35:37Z",
"pushed_at": "2020-09-25T20:55:17Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 8,
"forks": 8,
"watchers": 14,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 10,
"forks": 10,
"watchers": 15,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2021-08-14T13:05:37Z",
"updated_at": "2021-08-15T14:08:24Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1305,
"watchers_count": 1305,
"stargazers_count": 1307,
"watchers_count": 1307,
"forks_count": 471,
"forks": 471,
"watchers": 1305,
"watchers": 1307,
"score": 0
},
{
@ -224,8 +224,8 @@
"pushed_at": "2021-07-05T08:54:06Z",
"stargazers_count": 556,
"watchers_count": 556,
"forks_count": 146,
"forks": 146,
"forks_count": 147,
"forks": 147,
"watchers": 556,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "POC of CVE-2021-2394",
"fork": false,
"created_at": "2021-08-02T02:22:04Z",
"updated_at": "2021-08-15T03:50:31Z",
"updated_at": "2021-08-15T11:08:47Z",
"pushed_at": "2021-08-15T03:48:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{

View file

@ -44,5 +44,28 @@
"forks": 1,
"watchers": 8,
"score": 0
},
{
"id": 396324186,
"name": "CVE-2021-28476-tools-env",
"full_name": "sh4m2hwz\/CVE-2021-28476-tools-env",
"owner": {
"login": "sh4m2hwz",
"id": 77354315,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77354315?v=4",
"html_url": "https:\/\/github.com\/sh4m2hwz"
},
"html_url": "https:\/\/github.com\/sh4m2hwz\/CVE-2021-28476-tools-env",
"description": "tools for automate configure Ubuntu 20.04 enviroment for testing CVE-2021-28476.",
"fork": false,
"created_at": "2021-08-15T11:10:40Z",
"updated_at": "2021-08-15T11:44:04Z",
"pushed_at": "2021-08-15T11:44:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -109,8 +109,8 @@
"pushed_at": "2021-07-19T01:22:40Z",
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 12,
"forks": 12,
"forks_count": 13,
"forks": 13,
"watchers": 23,
"score": 0
},

View file

@ -247,8 +247,8 @@
"pushed_at": "2021-07-25T15:41:33Z",
"stargazers_count": 181,
"watchers_count": 181,
"forks_count": 36,
"forks": 36,
"forks_count": 37,
"forks": 37,
"watchers": 181,
"score": 0
},

View file

@ -1307,6 +1307,7 @@ Hyper-V Remote Code Execution Vulnerability
- [0vercl0k/CVE-2021-28476](https://github.com/0vercl0k/CVE-2021-28476)
- [bluefrostsecurity/CVE-2021-28476](https://github.com/bluefrostsecurity/CVE-2021-28476)
- [sh4m2hwz/CVE-2021-28476-tools-env](https://github.com/sh4m2hwz/CVE-2021-28476-tools-env)
### CVE-2021-28480 (2021-04-13)
@ -11869,7 +11870,6 @@ TBK DVR4104 and DVR4216 devices, as well as Novo, CeNova, QSee, Pulnix, XVR 5 in
- [akuhidayat/HTC](https://github.com/akuhidayat/HTC)
- [g5q2/cve-2018-9995](https://github.com/g5q2/cve-2018-9995)
- [HACKGM/CVE-2018-9995](https://github.com/HACKGM/CVE-2018-9995)
- [kienquoc102/CVE-2018-9995-Exploit](https://github.com/kienquoc102/CVE-2018-9995-Exploit)
- [kienquoc102/CVE-2018-9995-2](https://github.com/kienquoc102/CVE-2018-9995-2)
### CVE-2018-10118 (2018-04-15)
@ -17829,6 +17829,7 @@ The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not p
- [nyc-tophile/A2SV--SSL-VUL-Scan](https://github.com/nyc-tophile/A2SV--SSL-VUL-Scan)
- [ingochris/heartpatch.us](https://github.com/ingochris/heartpatch.us)
- [BelminD/heartbleed](https://github.com/BelminD/heartbleed)
- [pierceoneill/bleeding-heart](https://github.com/pierceoneill/bleeding-heart)
### CVE-2014-0166 (2014-04-09)