Auto Update 2021/10/18 12:13:03

This commit is contained in:
motikan2010-bot 2021-10-18 12:13:03 +09:00
parent 3627ddd151
commit 2f8408d728
18 changed files with 131 additions and 86 deletions

View file

@ -17,12 +17,12 @@
"pushed_at": "2020-08-09T15:35:16Z",
"stargazers_count": 36,
"watchers_count": 36,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 36,
"score": 0
},

View file

@ -94,16 +94,24 @@
"description": null,
"fork": false,
"created_at": "2020-10-10T20:23:59Z",
"updated_at": "2020-10-15T22:20:55Z",
"pushed_at": "2020-10-10T21:26:30Z",
"updated_at": "2021-10-18T01:05:08Z",
"pushed_at": "2021-10-18T00:55:48Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"topics": [
"exploit",
"exploitation",
"exploits",
"ignite",
"poc",
"tryhackme",
"vulnerability"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 2,
"score": 0
},

View file

@ -74,10 +74,10 @@
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
"fork": false,
"created_at": "2018-04-12T22:53:14Z",
"updated_at": "2021-10-01T00:13:32Z",
"updated_at": "2021-10-18T00:39:10Z",
"pushed_at": "2021-01-08T10:31:22Z",
"stargazers_count": 503,
"watchers_count": 503,
"stargazers_count": 504,
"watchers_count": 504,
"forks_count": 169,
"allow_forking": true,
"is_template": false,
@ -94,7 +94,7 @@
],
"visibility": "public",
"forks": 169,
"watchers": 503,
"watchers": 504,
"score": 0
},
{

View file

@ -40,10 +40,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-10-15T09:53:49Z",
"updated_at": "2021-10-17T21:40:06Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2927,
"watchers_count": 2927,
"stargazers_count": 2926,
"watchers_count": 2926,
"forks_count": 859,
"allow_forking": true,
"is_template": false,
@ -70,7 +70,7 @@
],
"visibility": "public",
"forks": 859,
"watchers": 2927,
"watchers": 2926,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "InfluxDB CVE-2019-20933 vulnerability exploit",
"fork": false,
"created_at": "2021-04-28T16:25:31Z",
"updated_at": "2021-08-02T01:12:10Z",
"updated_at": "2021-10-17T22:00:43Z",
"pushed_at": "2021-04-28T16:31:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"watchers": 2,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "PoC for CVE-2019-5736",
"fork": false,
"created_at": "2019-02-13T05:26:32Z",
"updated_at": "2021-09-17T02:30:55Z",
"updated_at": "2021-10-18T01:02:57Z",
"pushed_at": "2019-02-19T11:45:13Z",
"stargazers_count": 540,
"watchers_count": 540,
"stargazers_count": 541,
"watchers_count": 541,
"forks_count": 151,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 151,
"watchers": 540,
"watchers": 541,
"score": 0
},
{

View file

@ -44,12 +44,12 @@
"pushed_at": "2020-05-15T09:03:36Z",
"stargazers_count": 194,
"watchers_count": 194,
"forks_count": 68,
"forks_count": 69,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 68,
"forks": 69,
"watchers": 194,
"score": 0
},

View file

@ -1360,10 +1360,10 @@
"description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false,
"created_at": "2020-04-20T14:35:48Z",
"updated_at": "2021-10-13T07:31:41Z",
"updated_at": "2021-10-18T01:32:46Z",
"pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 427,
"watchers_count": 427,
"stargazers_count": 428,
"watchers_count": 428,
"forks_count": 140,
"allow_forking": true,
"is_template": false,
@ -1376,7 +1376,7 @@
],
"visibility": "public",
"forks": 140,
"watchers": 427,
"watchers": 428,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-10-15T09:53:49Z",
"updated_at": "2021-10-17T21:40:06Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2927,
"watchers_count": 2927,
"stargazers_count": 2926,
"watchers_count": 2926,
"forks_count": 859,
"allow_forking": true,
"is_template": false,
@ -43,7 +43,7 @@
],
"visibility": "public",
"forks": 859,
"watchers": 2927,
"watchers": 2926,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2021-10-16T14:51:09Z",
"updated_at": "2021-10-17T22:21:52Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1419,
"watchers_count": 1419,
"stargazers_count": 1420,
"watchers_count": 1420,
"forks_count": 523,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 523,
"watchers": 1419,
"watchers": 1420,
"score": 0
},
{
@ -882,11 +882,11 @@
"description": "Python implementation for PrintNightmare (CVE-2021-1675 \/ CVE-2021-34527)",
"fork": false,
"created_at": "2021-09-26T13:53:10Z",
"updated_at": "2021-10-17T20:55:19Z",
"updated_at": "2021-10-18T02:45:57Z",
"pushed_at": "2021-10-17T13:29:56Z",
"stargazers_count": 58,
"watchers_count": 58,
"forks_count": 12,
"stargazers_count": 65,
"watchers_count": 65,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"topics": [
@ -894,8 +894,8 @@
"cve-2021-34527"
],
"visibility": "public",
"forks": 12,
"watchers": 58,
"forks": 13,
"watchers": 65,
"score": 0
},
{

View file

@ -1077,17 +1077,17 @@
"description": "[ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains. [ProxyShell] CVE-2021-34473 & CVE-2021-34523 & CVE-2021-31207 Exploit Chains.",
"fork": false,
"created_at": "2021-04-14T11:12:30Z",
"updated_at": "2021-10-17T08:35:36Z",
"updated_at": "2021-10-18T01:28:21Z",
"pushed_at": "2021-10-08T09:13:56Z",
"stargazers_count": 91,
"watchers_count": 91,
"stargazers_count": 92,
"watchers_count": 92,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 91,
"watchers": 92,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-06-24T18:50:17Z",
"updated_at": "2021-10-13T22:45:52Z",
"updated_at": "2021-10-18T01:55:15Z",
"pushed_at": "2021-08-25T19:26:21Z",
"stargazers_count": 178,
"watchers_count": 178,
"forks_count": 38,
"stargazers_count": 179,
"watchers_count": 179,
"forks_count": 39,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 178,
"forks": 39,
"watchers": 179,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Apache Druid 任意文件读取",
"fork": false,
"created_at": "2021-10-14T03:47:02Z",
"updated_at": "2021-10-16T06:39:50Z",
"updated_at": "2021-10-18T01:45:20Z",
"pushed_at": "2021-10-15T02:31:03Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"watchers": 9,
"score": 0
},
{

29
2021/CVE-2021-40438.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 418310369,
"name": "CVE-2021-40438",
"full_name": "xiaojiangxl\/CVE-2021-40438",
"owner": {
"login": "xiaojiangxl",
"id": 58814935,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58814935?v=4",
"html_url": "https:\/\/github.com\/xiaojiangxl"
},
"html_url": "https:\/\/github.com\/xiaojiangxl\/CVE-2021-40438",
"description": null,
"fork": false,
"created_at": "2021-10-18T02:02:43Z",
"updated_at": "2021-10-18T02:42:27Z",
"pushed_at": "2021-10-18T02:42:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "PoC (DoS) for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2021-10-16T16:17:44Z",
"updated_at": "2021-10-17T19:43:35Z",
"updated_at": "2021-10-18T03:02:33Z",
"pushed_at": "2021-10-17T13:27:53Z",
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 7,
"stargazers_count": 50,
"watchers_count": 50,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 46,
"forks": 8,
"watchers": 50,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.",
"fork": false,
"created_at": "2021-10-05T16:13:38Z",
"updated_at": "2021-10-10T08:49:10Z",
"updated_at": "2021-10-18T00:59:36Z",
"pushed_at": "2021-10-07T06:55:32Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 25,
"watchers": 26,
"score": 0
},
{
@ -229,17 +229,17 @@
"description": null,
"fork": false,
"created_at": "2021-10-05T23:53:48Z",
"updated_at": "2021-10-16T11:42:50Z",
"updated_at": "2021-10-18T00:16:27Z",
"pushed_at": "2021-10-06T15:37:23Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 32,
"watchers": 33,
"score": 0
},
{
@ -479,7 +479,7 @@
"description": null,
"fork": false,
"created_at": "2021-10-06T14:12:07Z",
"updated_at": "2021-10-13T14:11:28Z",
"updated_at": "2021-10-18T00:55:02Z",
"pushed_at": "2021-10-08T01:55:22Z",
"stargazers_count": 2,
"watchers_count": 2,
@ -1203,10 +1203,10 @@
"description": "Apache (Linux) CVE-2021-41773\/2021-42013 Mass Vulnerability Checker",
"fork": false,
"created_at": "2021-10-09T02:12:39Z",
"updated_at": "2021-10-17T05:34:01Z",
"updated_at": "2021-10-18T01:14:02Z",
"pushed_at": "2021-10-12T07:27:09Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
@ -1219,7 +1219,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 17,
"watchers": 18,
"score": 0
},
{
@ -1483,17 +1483,17 @@
"description": "apache httpd path traversal checker(CVE-2021-41773 \/ CVE-2021-42013)",
"fork": false,
"created_at": "2021-10-15T10:38:44Z",
"updated_at": "2021-10-16T10:28:26Z",
"updated_at": "2021-10-18T01:31:53Z",
"pushed_at": "2021-10-16T10:28:23Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
},
{
@ -1510,8 +1510,8 @@
"description": "The first vulnerability with the CVE identifier CVE-2021-41773 is a path traversal flaw that exists in Apache HTTP Server 2.4.49.",
"fork": false,
"created_at": "2021-10-15T21:38:48Z",
"updated_at": "2021-10-17T21:19:21Z",
"pushed_at": "2021-10-17T21:19:19Z",
"updated_at": "2021-10-17T22:02:39Z",
"pushed_at": "2021-10-17T22:02:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,

View file

@ -40,17 +40,17 @@
"description": "Apache 2.4.50 Path traversal vulnerability",
"fork": false,
"created_at": "2021-10-08T05:44:54Z",
"updated_at": "2021-10-09T09:08:26Z",
"updated_at": "2021-10-18T01:28:33Z",
"pushed_at": "2021-10-09T05:52:32Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 9,
"watchers": 10,
"score": 0
},
{

View file

@ -2647,6 +2647,14 @@ playSMS before 1.4.5 allows Arbitrary Code Execution by entering PHP code at the
### CVE-2021-40375
- [DCKento/CVE-2021-40375](https://github.com/DCKento/CVE-2021-40375)
### CVE-2021-40438 (2021-09-16)
<code>
A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.
</code>
- [xiaojiangxl/CVE-2021-40438](https://github.com/xiaojiangxl/CVE-2021-40438)
### CVE-2021-40444 (2021-09-15)
<code>