Auto Update 2021/10/28 06:14:40

This commit is contained in:
motikan2010-bot 2021-10-28 06:14:40 +09:00
parent 9bde90f8aa
commit 10ebe7dfd7
23 changed files with 158 additions and 116 deletions

View file

@ -1636,19 +1636,19 @@
{
"id": 421096576,
"name": "ShellShock",
"full_name": "alexphiliotis\/ShellShock",
"full_name": "JowardBince\/ShellShock",
"owner": {
"login": "alexphiliotis",
"login": "JowardBince",
"id": 66454005,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66454005?v=4",
"html_url": "https:\/\/github.com\/alexphiliotis"
"html_url": "https:\/\/github.com\/JowardBince"
},
"html_url": "https:\/\/github.com\/alexphiliotis\/ShellShock",
"html_url": "https:\/\/github.com\/JowardBince\/ShellShock",
"description": "A python script intended to automate cgi-bin based exploitation of the ShellSchock vulnerability (CVE-2014-6271)",
"fork": false,
"created_at": "2021-10-25T16:13:48Z",
"updated_at": "2021-10-25T16:54:00Z",
"pushed_at": "2021-10-25T16:15:42Z",
"updated_at": "2021-10-27T19:58:19Z",
"pushed_at": "2021-10-27T19:58:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -148,10 +148,10 @@
"description": "A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)",
"fork": false,
"created_at": "2017-09-17T15:03:53Z",
"updated_at": "2021-09-05T12:52:55Z",
"updated_at": "2021-10-27T15:44:20Z",
"pushed_at": "2020-03-23T15:56:02Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
@ -165,7 +165,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 6,
"watchers": 7,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Blueborne CVE-2017-0785 Android information leak vulnerability",
"fork": false,
"created_at": "2017-09-20T23:32:29Z",
"updated_at": "2021-09-17T11:02:52Z",
"updated_at": "2021-10-27T20:33:24Z",
"pushed_at": "2017-09-23T05:11:45Z",
"stargazers_count": 436,
"watchers_count": 436,
"stargazers_count": 437,
"watchers_count": 437,
"forks_count": 192,
"allow_forking": true,
"is_template": false,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 192,
"watchers": 436,
"watchers": 437,
"score": 0
},
{

View file

@ -184,10 +184,10 @@
"description": "Demo Application and Exploit",
"fork": false,
"created_at": "2017-03-10T21:33:25Z",
"updated_at": "2021-10-27T14:51:27Z",
"updated_at": "2021-10-27T16:49:21Z",
"pushed_at": "2017-03-13T15:03:32Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
@ -197,7 +197,7 @@
],
"visibility": "public",
"forks": 37,
"watchers": 38,
"watchers": 37,
"score": 0
},
{
@ -376,10 +376,10 @@
"description": "An exploit for Apache Struts CVE-2017-5638",
"fork": false,
"created_at": "2017-03-12T02:02:25Z",
"updated_at": "2021-10-16T04:24:54Z",
"updated_at": "2021-10-27T15:14:41Z",
"pushed_at": "2018-05-21T18:33:26Z",
"stargazers_count": 398,
"watchers_count": 398,
"stargazers_count": 399,
"watchers_count": 399,
"forks_count": 146,
"allow_forking": true,
"is_template": false,
@ -392,7 +392,7 @@
],
"visibility": "public",
"forks": 146,
"watchers": 398,
"watchers": 399,
"score": 0
},
{

View file

@ -87,12 +87,12 @@
"pushed_at": "2021-09-26T09:31:53Z",
"stargazers_count": 472,
"watchers_count": 472,
"forks_count": 171,
"forks_count": 172,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 171,
"forks": 172,
"watchers": 472,
"score": 0
},
@ -174,12 +174,12 @@
"pushed_at": "2020-10-23T17:03:06Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 16,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 16,
"forks": 17,
"watchers": 11,
"score": 0
},

View file

@ -17,12 +17,12 @@
"pushed_at": "2018-08-17T23:31:46Z",
"stargazers_count": 163,
"watchers_count": 163,
"forks_count": 33,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 33,
"forks": 32,
"watchers": 163,
"score": 0
}

View file

@ -44,7 +44,7 @@
"pushed_at": "2019-03-29T11:25:57Z",
"stargazers_count": 336,
"watchers_count": 336,
"forks_count": 113,
"forks_count": 114,
"allow_forking": true,
"is_template": false,
"topics": [
@ -56,7 +56,7 @@
"sa-core-2018-002"
],
"visibility": "public",
"forks": 113,
"forks": 114,
"watchers": 336,
"score": 0
},

View file

@ -310,10 +310,10 @@
"description": "Docker image and commands to check CVE-2019-11043 vulnerability on nginx\/php-fpm applications.",
"fork": false,
"created_at": "2019-10-30T10:22:41Z",
"updated_at": "2021-06-15T03:01:34Z",
"updated_at": "2021-10-27T19:09:24Z",
"pushed_at": "2019-10-30T12:53:43Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -329,7 +329,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 6,
"watchers": 7,
"score": 0
},
{

View file

@ -44,7 +44,7 @@
"pushed_at": "2020-01-24T15:21:06Z",
"stargazers_count": 247,
"watchers_count": 247,
"forks_count": 79,
"forks_count": 78,
"allow_forking": true,
"is_template": false,
"topics": [
@ -52,7 +52,7 @@
"cve-2020-0610"
],
"visibility": "public",
"forks": 79,
"forks": 78,
"watchers": 247,
"score": 0
},

View file

@ -880,17 +880,17 @@
"description": "CVE-2020-0796_CoronaBlue_SMBGhost",
"fork": false,
"created_at": "2020-03-16T15:31:52Z",
"updated_at": "2020-04-06T03:48:20Z",
"updated_at": "2021-10-27T20:51:11Z",
"pushed_at": "2020-03-19T08:06:51Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"watchers": 2,
"score": 0
},
{
@ -1045,10 +1045,10 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2021-10-24T13:12:46Z",
"updated_at": "2021-10-27T16:45:16Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1158,
"watchers_count": 1158,
"stargazers_count": 1159,
"watchers_count": 1159,
"forks_count": 362,
"allow_forking": true,
"is_template": false,
@ -1061,7 +1061,7 @@
],
"visibility": "public",
"forks": 362,
"watchers": 1158,
"watchers": 1159,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2021-10-25T02:19:20Z",
"updated_at": "2021-10-27T18:15:30Z",
"pushed_at": "2020-10-21T12:10:28Z",
"stargazers_count": 1359,
"watchers_count": 1359,
"stargazers_count": 1360,
"watchers_count": 1360,
"forks_count": 310,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 310,
"watchers": 1359,
"watchers": 1360,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2021-10-27T05:07:33Z",
"updated_at": "2021-10-27T18:52:46Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1431,
"watchers_count": 1431,
"stargazers_count": 1432,
"watchers_count": 1432,
"forks_count": 526,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 526,
"watchers": 1431,
"watchers": 1432,
"score": 0
},
{

View file

@ -276,12 +276,12 @@
"pushed_at": "2021-03-08T08:09:01Z",
"stargazers_count": 102,
"watchers_count": 102,
"forks_count": 73,
"forks_count": 72,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 73,
"forks": 72,
"watchers": 102,
"score": 0
},

View file

@ -452,17 +452,17 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2021-10-25T16:54:26Z",
"updated_at": "2021-10-27T15:29:10Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 766,
"watchers_count": 766,
"stargazers_count": 767,
"watchers_count": 767,
"forks_count": 226,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 226,
"watchers": 766,
"watchers": 767,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "SolarWinds Orion Platform ActionPluginBaseView 反序列化RCE",
"fork": false,
"created_at": "2021-10-23T01:35:42Z",
"updated_at": "2021-10-26T16:20:44Z",
"updated_at": "2021-10-27T18:31:21Z",
"pushed_at": "2021-10-23T01:44:54Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 34,
"watchers": 35,
"score": 0
}
]

View file

@ -13,17 +13,44 @@
"description": "CVE-2021-36260",
"fork": false,
"created_at": "2021-10-18T06:40:48Z",
"updated_at": "2021-10-18T06:40:48Z",
"pushed_at": "2021-10-18T06:40:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2021-10-27T19:56:06Z",
"pushed_at": "2021-10-27T15:40:38Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 2,
"score": 0
},
{
"id": 421880973,
"name": "CVE-2021-36260",
"full_name": "Aiminsun\/CVE-2021-36260",
"owner": {
"login": "Aiminsun",
"id": 58260225,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58260225?v=4",
"html_url": "https:\/\/github.com\/Aiminsun"
},
"html_url": "https:\/\/github.com\/Aiminsun\/CVE-2021-36260",
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
"fork": false,
"created_at": "2021-10-27T15:51:12Z",
"updated_at": "2021-10-27T19:54:05Z",
"pushed_at": "2021-10-27T15:55:20Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0
}
]

View file

@ -1,47 +1,29 @@
[
{
"id": 383071339,
"id": 408041781,
"name": "CVE-2021-37152",
"full_name": "lhashashinl\/CVE-2021-37152",
"full_name": "SecurityAnalysts\/CVE-2021-37152",
"owner": {
"login": "lhashashinl",
"id": 86566488,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86566488?v=4",
"html_url": "https:\/\/github.com\/lhashashinl"
"login": "SecurityAnalysts",
"id": 26019141,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26019141?v=4",
"html_url": "https:\/\/github.com\/SecurityAnalysts"
},
"html_url": "https:\/\/github.com\/lhashashinl\/CVE-2021-37152",
"html_url": "https:\/\/github.com\/SecurityAnalysts\/CVE-2021-37152",
"description": "Exploit Accsess network clients by sending packets in wirless TP-LINK and preparing for a mitm attack",
"fork": false,
"created_at": "2021-07-05T08:37:52Z",
"updated_at": "2021-09-19T05:37:34Z",
"created_at": "2021-09-19T05:37:37Z",
"updated_at": "2021-10-27T16:54:04Z",
"pushed_at": "2021-07-26T08:37:36Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"exploit",
"exploit-development",
"exploitation",
"exploitation-framework",
"hack",
"hacking",
"hashashin",
"lhashashinl",
"mitm",
"mitm-attacks",
"network",
"network-programming",
"python3",
"pythonhacking",
"sniff",
"tp-link",
"tplink"
],
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -229,17 +229,17 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2021-10-27T06:40:33Z",
"updated_at": "2021-10-27T20:03:27Z",
"pushed_at": "2021-09-11T09:50:26Z",
"stargazers_count": 1285,
"watchers_count": 1285,
"stargazers_count": 1286,
"watchers_count": 1286,
"forks_count": 413,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 413,
"watchers": 1285,
"watchers": 1286,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-10-24T21:01:29Z",
"stargazers_count": 293,
"watchers_count": 293,
"forks_count": 63,
"forks_count": 62,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 63,
"forks": 62,
"watchers": 293,
"score": 0
},

29
2021/CVE-2021-41728.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 421957912,
"name": "CVE-2021-41728",
"full_name": "Dir0x\/CVE-2021-41728",
"owner": {
"login": "Dir0x",
"id": 22798238,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22798238?v=4",
"html_url": "https:\/\/github.com\/Dir0x"
},
"html_url": "https:\/\/github.com\/Dir0x\/CVE-2021-41728",
"description": "Information about CVE-2021-41728, a reflected XSS in the search function.",
"fork": false,
"created_at": "2021-10-27T20:04:12Z",
"updated_at": "2021-10-27T20:05:53Z",
"pushed_at": "2021-10-27T20:05:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -398,17 +398,17 @@
"description": "CVE-2021-41773 playground",
"fork": false,
"created_at": "2021-10-06T07:17:05Z",
"updated_at": "2021-10-26T11:51:00Z",
"updated_at": "2021-10-27T17:46:28Z",
"pushed_at": "2021-10-07T17:56:38Z",
"stargazers_count": 193,
"watchers_count": 193,
"stargazers_count": 194,
"watchers_count": 194,
"forks_count": 49,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 49,
"watchers": 193,
"watchers": 194,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "A small PoC for the recent RCE found in the Goahead Webserver prior to version 5.1.5. ",
"fork": false,
"created_at": "2021-10-12T06:21:02Z",
"updated_at": "2021-10-23T09:57:43Z",
"updated_at": "2021-10-27T19:53:12Z",
"pushed_at": "2021-10-18T20:56:31Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -2298,6 +2298,7 @@ A command injection vulnerability in the web server of some Hikvision product. D
</code>
- [rabbitsafe/CVE-2021-36260](https://github.com/rabbitsafe/CVE-2021-36260)
- [Aiminsun/CVE-2021-36260](https://github.com/Aiminsun/CVE-2021-36260)
### CVE-2021-36394
- [dinhbaouit/CVE-2021-36394](https://github.com/dinhbaouit/CVE-2021-36394)
@ -2410,7 +2411,7 @@ Microsoft Azure Active Directory Connect Authentication Bypass Vulnerability
Multiple XSS issues exist in Sonatype Nexus Repository Manager 3 before 3.33.0. An authenticated attacker with the ability to add HTML files to a repository could redirect users to Nexus Repository Managers pages with code modifications.
</code>
- [lhashashinl/CVE-2021-37152](https://github.com/lhashashinl/CVE-2021-37152)
- [SecurityAnalysts/CVE-2021-37152](https://github.com/SecurityAnalysts/CVE-2021-37152)
### CVE-2021-37589
- [lucaregne/CVE-2021-37589](https://github.com/lucaregne/CVE-2021-37589)
@ -2876,6 +2877,9 @@ A blind SQL injection vulnerability exists in the Raymart DG / Ahmed Helal Hotel
- [MobiusBinary/CVE-2021-41651](https://github.com/MobiusBinary/CVE-2021-41651)
### CVE-2021-41728
- [Dir0x/CVE-2021-41728](https://github.com/Dir0x/CVE-2021-41728)
### CVE-2021-41730
- [IBUILI/CVE-2021-41730](https://github.com/IBUILI/CVE-2021-41730)
@ -19637,7 +19641,7 @@ GNU Bash through 4.3 processes trailing strings after function definitions in th
- [mochizuki875/CVE-2014-6271-Apache-Debian](https://github.com/mochizuki875/CVE-2014-6271-Apache-Debian)
- [b4keSn4ke/shellshock](https://github.com/b4keSn4ke/shellshock)
- [0bfxgh0st/ShellShock](https://github.com/0bfxgh0st/ShellShock)
- [alexphiliotis/ShellShock](https://github.com/alexphiliotis/ShellShock)
- [JowardBince/ShellShock](https://github.com/JowardBince/ShellShock)
### CVE-2014-6287 (2014-10-07)