Auto Update 2021/11/03 00:12:58

This commit is contained in:
motikan2010-bot 2021-11-03 09:12:58 +09:00
parent 79e23ad3f7
commit 4076197d7f
17 changed files with 123 additions and 76 deletions

View file

@ -67,17 +67,17 @@
"description": "PoC materials to exploit CVE-2018-6789",
"fork": false,
"created_at": "2019-10-10T09:36:03Z",
"updated_at": "2021-08-17T18:24:33Z",
"updated_at": "2021-11-02T20:35:40Z",
"pushed_at": "2019-10-10T09:54:07Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 9,
"watchers": 8,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "(CVE-2018-9995) Get DVR Credentials",
"fork": false,
"created_at": "2018-04-29T20:00:06Z",
"updated_at": "2021-10-14T20:46:17Z",
"updated_at": "2021-11-02T21:52:26Z",
"pushed_at": "2019-01-23T14:27:21Z",
"stargazers_count": 458,
"watchers_count": 458,
"stargazers_count": 459,
"watchers_count": 459,
"forks_count": 189,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 189,
"watchers": 458,
"watchers": 459,
"score": 0
},
{
@ -148,17 +148,17 @@
"description": "DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995",
"fork": false,
"created_at": "2018-09-23T20:58:40Z",
"updated_at": "2021-10-24T13:42:35Z",
"updated_at": "2021-11-02T21:47:31Z",
"pushed_at": "2018-10-11T16:54:31Z",
"stargazers_count": 86,
"watchers_count": 86,
"stargazers_count": 87,
"watchers_count": 87,
"forks_count": 42,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 86,
"watchers": 87,
"score": 0
},
{

View file

@ -545,17 +545,17 @@
"description": "PHP-FPM Remote Command Execution Exploit",
"fork": false,
"created_at": "2020-11-18T07:25:37Z",
"updated_at": "2020-11-20T10:54:40Z",
"updated_at": "2021-11-02T20:02:01Z",
"pushed_at": "2020-11-20T10:53:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"forks": 2,
"watchers": 1,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2020-02-19T03:47:33Z",
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 19,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 19,
"forks": 18,
"watchers": 55,
"score": 0
},

View file

@ -186,12 +186,12 @@
"pushed_at": "2020-03-22T15:14:31Z",
"stargazers_count": 339,
"watchers_count": 339,
"forks_count": 87,
"forks_count": 86,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 87,
"forks": 86,
"watchers": 339,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2021-11-01T15:14:53Z",
"updated_at": "2021-11-02T22:04:45Z",
"pushed_at": "2020-09-11T07:38:22Z",
"stargazers_count": 576,
"watchers_count": 576,
"stargazers_count": 575,
"watchers_count": 575,
"forks_count": 151,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 151,
"watchers": 576,
"watchers": 575,
"score": 0
},
{

View file

@ -67,17 +67,17 @@
"description": "Exploit for CVE-2020-3952 in vCenter 6.7",
"fork": false,
"created_at": "2020-04-16T07:40:51Z",
"updated_at": "2021-10-20T14:15:12Z",
"updated_at": "2021-11-02T21:09:11Z",
"pushed_at": "2020-04-16T08:38:42Z",
"stargazers_count": 250,
"watchers_count": 250,
"stargazers_count": 251,
"watchers_count": 251,
"forks_count": 59,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 59,
"watchers": 250,
"watchers": 251,
"score": 0
},
{

View file

@ -274,17 +274,17 @@
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
"fork": false,
"created_at": "2021-07-01T23:45:58Z",
"updated_at": "2021-10-29T17:57:22Z",
"updated_at": "2021-11-02T18:19:29Z",
"pushed_at": "2021-07-05T08:54:06Z",
"stargazers_count": 674,
"watchers_count": 674,
"forks_count": 179,
"stargazers_count": 675,
"watchers_count": 675,
"forks_count": 180,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 179,
"watchers": 674,
"forks": 180,
"watchers": 675,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "Backporting CVE-2021-1748 patch for iOS <=14.3",
"fork": false,
"created_at": "2021-09-03T22:48:11Z",
"updated_at": "2021-10-24T05:42:07Z",
"updated_at": "2021-11-02T21:56:38Z",
"pushed_at": "2021-09-03T22:50:08Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 19,
"watchers": 20,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"description": "XMLRPC - RCE in MovableTypePoC",
"fork": false,
"created_at": "2021-10-30T09:15:56Z",
"updated_at": "2021-11-01T17:27:14Z",
"pushed_at": "2021-11-01T17:27:12Z",
"updated_at": "2021-11-02T18:53:38Z",
"pushed_at": "2021-11-02T18:53:36Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 6,

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-06-05T15:42:16Z",
"updated_at": "2021-11-02T14:45:27Z",
"updated_at": "2021-11-03T00:01:25Z",
"pushed_at": "2021-11-02T14:45:24Z",
"stargazers_count": 138,
"watchers_count": 138,
"forks_count": 28,
"stargazers_count": 139,
"watchers_count": 139,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 138,
"forks": 29,
"watchers": 139,
"score": 0
},
{
@ -121,10 +121,10 @@
"description": "CVE-2021-22205& GitLab CE\/EE RCE",
"fork": false,
"created_at": "2021-10-29T04:30:45Z",
"updated_at": "2021-11-02T16:10:23Z",
"updated_at": "2021-11-03T00:01:23Z",
"pushed_at": "2021-10-29T04:31:15Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
@ -133,7 +133,7 @@
],
"visibility": "public",
"forks": 13,
"watchers": 25,
"watchers": 26,
"score": 0
},
{
@ -264,12 +264,12 @@
"pushed_at": "2021-10-31T15:40:34Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 3,
"score": 0
},
@ -291,12 +291,12 @@
"pushed_at": "2021-11-01T05:47:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
},

View file

@ -13,11 +13,11 @@
"description": "Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.",
"fork": false,
"created_at": "2021-04-07T11:10:40Z",
"updated_at": "2021-10-21T12:34:16Z",
"updated_at": "2021-11-02T22:48:54Z",
"pushed_at": "2021-04-15T12:46:54Z",
"stargazers_count": 190,
"watchers_count": 190,
"forks_count": 44,
"stargazers_count": 191,
"watchers_count": 191,
"forks_count": 45,
"allow_forking": true,
"is_template": false,
"topics": [
@ -28,8 +28,8 @@
"tcpip"
],
"visibility": "public",
"forks": 44,
"watchers": 190,
"forks": 45,
"watchers": 191,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Testing CVE-2021-30858 Rev3",
"fork": false,
"created_at": "2021-10-14T01:51:39Z",
"updated_at": "2021-10-14T22:07:49Z",
"updated_at": "2021-11-02T22:09:15Z",
"pushed_at": "2021-10-14T22:07:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0
},
{

View file

@ -229,17 +229,17 @@
"description": null,
"fork": false,
"created_at": "2021-10-05T23:53:48Z",
"updated_at": "2021-10-25T05:19:37Z",
"updated_at": "2021-11-02T18:29:15Z",
"pushed_at": "2021-10-06T15:37:23Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 33,
"watchers": 34,
"score": 0
},
{
@ -931,12 +931,12 @@
"pushed_at": "2021-10-10T09:14:27Z",
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 15,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 15,
"forks": 16,
"watchers": 22,
"score": 0
},

View file

@ -67,8 +67,8 @@
"description": "Generate malicious files using recently published bidi-attack (CVE-2021-42574)",
"fork": false,
"created_at": "2021-11-02T15:32:38Z",
"updated_at": "2021-11-02T15:44:19Z",
"pushed_at": "2021-11-02T15:44:16Z",
"updated_at": "2021-11-02T23:44:44Z",
"pushed_at": "2021-11-02T23:44:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

29
2021/CVE-2021-42694.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 423992286,
"name": "CVE-2021-42694",
"full_name": "js-on\/CVE-2021-42694",
"owner": {
"login": "js-on",
"id": 55274241,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55274241?v=4",
"html_url": "https:\/\/github.com\/js-on"
},
"html_url": "https:\/\/github.com\/js-on\/CVE-2021-42694",
"description": "Generate malicious files using recently published homoglyphic-attack (CVE-2021-42694)",
"fork": false,
"created_at": "2021-11-02T20:39:47Z",
"updated_at": "2021-11-02T20:40:20Z",
"pushed_at": "2021-11-02T20:40:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -2493,7 +2493,12 @@ A reflected cross-site scripting (XSS) vulnerability exists in multiple pages in
- [dievus/CVE-2021-37833](https://github.com/dievus/CVE-2021-37833)
### CVE-2021-37980
### CVE-2021-37980 (2021-11-02)
<code>
Inappropriate implementation in Sandbox in Google Chrome prior to 94.0.4606.81 allowed a remote attacker to potentially bypass site isolation via Windows.
</code>
- [ZeusBox/CVE-2021-37980](https://github.com/ZeusBox/CVE-2021-37980)
### CVE-2021-38149 (2021-08-06)
@ -3104,6 +3109,14 @@ An issue was discovered in the Bidirectional Algorithm in the Unicode Specificat
- [hffaust/CVE-2021-42574_and_CVE-2021-42694](https://github.com/hffaust/CVE-2021-42574_and_CVE-2021-42694)
- [js-on/CVE-2021-42574](https://github.com/js-on/CVE-2021-42574)
### CVE-2021-42694 (2021-10-31)
<code>
An issue was discovered in the character definitions of the Unicode Specification through 14.0. The specification allows an adversary to produce source code identifiers such as function names using homoglyphs that render visually identical to a target identifier. Adversaries can leverage this to inject code via adversarial identifier definitions in upstream software dependencies invoked deceptively in downstream software.
</code>
- [js-on/CVE-2021-42694](https://github.com/js-on/CVE-2021-42694)
### CVE-2021-43032
- [SakuraSamuraii/CVE-2021-43032](https://github.com/SakuraSamuraii/CVE-2021-43032)
@ -15226,7 +15239,12 @@ Blink in Google Chrome prior to 56.0.2924.76 for Linux, Windows and Mac, and 56.
- [Ang-YC/CVE-2017-5007](https://github.com/Ang-YC/CVE-2017-5007)
### CVE-2017-5123
### CVE-2017-5123 (2021-11-02)
<code>
Insufficient data validation in waitid allowed an user to escape sandboxes on Linux.
</code>
- [FloatingGuy/CVE-2017-5123](https://github.com/FloatingGuy/CVE-2017-5123)
- [0x5068656e6f6c/CVE-2017-5123](https://github.com/0x5068656e6f6c/CVE-2017-5123)
- [Synacktiv-contrib/exploiting-cve-2017-5123](https://github.com/Synacktiv-contrib/exploiting-cve-2017-5123)