Auto Update 2021/10/27 06:16:55

This commit is contained in:
motikan2010-bot 2021-10-27 06:16:55 +09:00
parent d990c1bf96
commit 409703375e
25 changed files with 151 additions and 95 deletions

View file

@ -205,10 +205,10 @@
"description": "Exploiting CVE-2014-3153, AKA Towelroot.",
"fork": false,
"created_at": "2020-10-31T11:39:11Z",
"updated_at": "2021-07-21T17:35:50Z",
"updated_at": "2021-10-26T19:00:23Z",
"pushed_at": "2021-01-16T17:37:12Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -222,7 +222,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 8,
"watchers": 9,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Exploits for the win32kfull!bFill vulnerability on Win10 x64 RS2 using Bitmap or Palette techniques",
"fork": false,
"created_at": "2017-10-06T07:59:07Z",
"updated_at": "2021-10-22T09:09:35Z",
"updated_at": "2021-10-26T20:41:55Z",
"pushed_at": "2017-10-06T09:47:43Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 42,
"watchers": 43,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)",
"fork": false,
"created_at": "2017-07-16T19:44:04Z",
"updated_at": "2021-10-07T18:11:34Z",
"updated_at": "2021-10-26T17:00:56Z",
"pushed_at": "2019-07-23T19:24:01Z",
"stargazers_count": 279,
"watchers_count": 279,
"stargazers_count": 280,
"watchers_count": 280,
"forks_count": 114,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 114,
"watchers": 279,
"watchers": 280,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "PoC for CVE-2018-15133 (Laravel unserialize vulnerability)",
"fork": false,
"created_at": "2018-08-14T18:51:50Z",
"updated_at": "2021-10-13T15:53:02Z",
"updated_at": "2021-10-26T21:01:23Z",
"pushed_at": "2018-09-27T07:32:19Z",
"stargazers_count": 231,
"watchers_count": 231,
"stargazers_count": 232,
"watchers_count": 232,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 231,
"watchers": 232,
"score": 0
},
{

View file

@ -235,17 +235,17 @@
"description": "Double-free vulnerability in DDGifSlurp in decoding.c in libpl_droidsonroids_gif can read more https:\/\/awakened1712.github.io\/hacking\/hacking-whatsapp-gif-rce\/",
"fork": false,
"created_at": "2019-10-23T08:02:15Z",
"updated_at": "2021-10-03T20:03:50Z",
"updated_at": "2021-10-26T17:42:45Z",
"pushed_at": "2019-10-23T08:25:48Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 10,
"watchers": 11,
"score": 0
},
{

View file

@ -405,12 +405,12 @@
"pushed_at": "2021-02-07T19:51:24Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 5,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 4,
"watchers": 15,
"score": 0
},

View file

@ -40,10 +40,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-10-26T12:05:46Z",
"updated_at": "2021-10-26T20:13:51Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2944,
"watchers_count": 2944,
"stargazers_count": 2945,
"watchers_count": 2945,
"forks_count": 866,
"allow_forking": true,
"is_template": false,
@ -70,7 +70,7 @@
],
"visibility": "public",
"forks": 866,
"watchers": 2944,
"watchers": 2945,
"score": 0
},
{

View file

@ -1360,10 +1360,10 @@
"description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false,
"created_at": "2020-04-20T14:35:48Z",
"updated_at": "2021-10-18T01:32:46Z",
"updated_at": "2021-10-26T18:12:53Z",
"pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 428,
"watchers_count": 428,
"stargazers_count": 429,
"watchers_count": 429,
"forks_count": 140,
"allow_forking": true,
"is_template": false,
@ -1376,7 +1376,7 @@
],
"visibility": "public",
"forks": 140,
"watchers": 428,
"watchers": 429,
"score": 0
},
{

View file

@ -155,17 +155,17 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2021-10-25T16:16:58Z",
"updated_at": "2021-10-26T18:57:14Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 375,
"watchers_count": 375,
"stargazers_count": 376,
"watchers_count": 376,
"forks_count": 115,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 115,
"watchers": 375,
"watchers": 376,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-10-26T12:05:46Z",
"updated_at": "2021-10-26T20:13:51Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2944,
"watchers_count": 2944,
"stargazers_count": 2945,
"watchers_count": 2945,
"forks_count": 866,
"allow_forking": true,
"is_template": false,
@ -43,7 +43,7 @@
],
"visibility": "public",
"forks": 866,
"watchers": 2944,
"watchers": 2945,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-15368",
"fork": false,
"created_at": "2021-06-29T04:38:24Z",
"updated_at": "2021-10-25T21:48:05Z",
"updated_at": "2021-10-26T15:39:38Z",
"pushed_at": "2021-10-11T01:30:56Z",
"stargazers_count": 293,
"watchers_count": 293,
"stargazers_count": 294,
"watchers_count": 294,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 29,
"watchers": 293,
"watchers": 294,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": null,
"fork": false,
"created_at": "2021-05-29T13:07:14Z",
"updated_at": "2021-10-08T02:43:10Z",
"updated_at": "2021-10-26T18:11:02Z",
"pushed_at": "2021-06-03T21:29:39Z",
"stargazers_count": 174,
"watchers_count": 174,
"stargazers_count": 175,
"watchers_count": 175,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 174,
"watchers": 175,
"score": 0
},
{

View file

@ -124,8 +124,8 @@
"description": null,
"fork": false,
"created_at": "2021-08-02T18:56:16Z",
"updated_at": "2021-08-06T18:25:29Z",
"pushed_at": "2021-08-03T15:55:40Z",
"updated_at": "2021-10-26T16:51:50Z",
"pushed_at": "2021-10-26T16:51:48Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-06-05T15:42:16Z",
"updated_at": "2021-10-26T15:06:18Z",
"updated_at": "2021-10-26T16:15:56Z",
"pushed_at": "2021-06-07T02:03:19Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 17,
"watchers": 18,
"score": 0
}
]

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-09-20T07:58:29Z",
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 7,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"forks": 6,
"watchers": 31,
"score": 0
},

View file

@ -229,17 +229,17 @@
"description": "CVE-2021-26084 Remote Code Execution on Confluence Servers",
"fork": false,
"created_at": "2021-09-01T09:50:26Z",
"updated_at": "2021-10-22T11:31:22Z",
"updated_at": "2021-10-26T21:14:50Z",
"pushed_at": "2021-09-02T07:36:51Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 35,
"watchers": 36,
"score": 0
},
{
@ -958,17 +958,17 @@
"description": "CVE-2021-26084Atlassian Confluence OGNL注入漏洞",
"fork": false,
"created_at": "2021-10-26T06:01:38Z",
"updated_at": "2021-10-26T11:35:19Z",
"updated_at": "2021-10-26T17:47:25Z",
"pushed_at": "2021-10-26T07:34:38Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -17,7 +17,7 @@
"pushed_at": "2021-06-12T08:27:09Z",
"stargazers_count": 781,
"watchers_count": 781,
"forks_count": 129,
"forks_count": 130,
"allow_forking": true,
"is_template": false,
"topics": [
@ -27,7 +27,7 @@
"ulpparsecontentcoding"
],
"visibility": "public",
"forks": 129,
"forks": 130,
"watchers": 781,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "Exploit for CVE-2021-3129",
"fork": false,
"created_at": "2021-01-13T12:52:20Z",
"updated_at": "2021-10-25T11:31:11Z",
"updated_at": "2021-10-26T20:58:36Z",
"pushed_at": "2021-01-29T13:59:07Z",
"stargazers_count": 177,
"watchers_count": 177,
"stargazers_count": 178,
"watchers_count": 178,
"forks_count": 45,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 45,
"watchers": 177,
"watchers": 178,
"score": 0
},
{

View file

@ -398,17 +398,17 @@
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
"fork": false,
"created_at": "2021-01-30T03:22:04Z",
"updated_at": "2021-09-30T06:48:41Z",
"updated_at": "2021-10-26T16:23:21Z",
"pushed_at": "2021-02-08T03:42:50Z",
"stargazers_count": 412,
"watchers_count": 412,
"stargazers_count": 413,
"watchers_count": 413,
"forks_count": 116,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 116,
"watchers": 412,
"watchers": 413,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "ProxyToken (CVE-2021-33766) : An Authentication Bypass in Microsoft Exchange Server POC exploit",
"fork": false,
"created_at": "2021-08-31T22:03:13Z",
"updated_at": "2021-10-19T18:03:19Z",
"updated_at": "2021-10-26T15:49:45Z",
"pushed_at": "2021-10-14T12:32:11Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 23,
"watchers": 24,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "SolarWinds Orion Platform ActionPluginBaseView 反序列化RCE",
"fork": false,
"created_at": "2021-10-23T01:35:42Z",
"updated_at": "2021-10-26T11:09:37Z",
"updated_at": "2021-10-26T16:20:44Z",
"pushed_at": "2021-10-23T01:44:54Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 32,
"watchers": 34,
"score": 0
}
]

View file

@ -229,17 +229,17 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2021-10-25T05:05:57Z",
"updated_at": "2021-10-26T20:57:27Z",
"pushed_at": "2021-09-11T09:50:26Z",
"stargazers_count": 1283,
"watchers_count": 1283,
"stargazers_count": 1284,
"watchers_count": 1284,
"forks_count": 412,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 412,
"watchers": 1283,
"watchers": 1284,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2021-10-16T16:17:44Z",
"updated_at": "2021-10-26T08:58:57Z",
"updated_at": "2021-10-26T20:41:51Z",
"pushed_at": "2021-10-24T21:01:29Z",
"stargazers_count": 284,
"watchers_count": 284,
"forks_count": 57,
"stargazers_count": 286,
"watchers_count": 286,
"forks_count": 58,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 57,
"watchers": 284,
"forks": 58,
"watchers": 286,
"score": 0
},
{
@ -67,10 +67,10 @@
"description": "My exploit for CVE-2021-40449, a Windows LPE via a UAF in win32kfull!GreResetDCInternal.",
"fork": false,
"created_at": "2021-10-25T04:58:49Z",
"updated_at": "2021-10-26T13:21:54Z",
"updated_at": "2021-10-26T16:20:12Z",
"pushed_at": "2021-10-25T06:32:34Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
@ -79,7 +79,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 12,
"watchers": 13,
"score": 0
}
]

View file

@ -122,7 +122,7 @@
"fork": false,
"created_at": "2021-10-05T17:30:43Z",
"updated_at": "2021-10-14T17:15:03Z",
"pushed_at": "2021-10-10T04:43:33Z",
"pushed_at": "2021-10-26T18:49:46Z",
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 30,
@ -1860,5 +1860,59 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 421530564,
"name": "CVE-2021-41773",
"full_name": "mr-exo\/CVE-2021-41773",
"owner": {
"login": "mr-exo",
"id": 76655540,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76655540?v=4",
"html_url": "https:\/\/github.com\/mr-exo"
},
"html_url": "https:\/\/github.com\/mr-exo\/CVE-2021-41773",
"description": "Remote Code Execution exploit for Apache servers. Affected versions: Apache 2.4.49, Apache 2.4.50",
"fork": false,
"created_at": "2021-10-26T17:56:25Z",
"updated_at": "2021-10-26T18:04:45Z",
"pushed_at": "2021-10-26T18:04:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 421553366,
"name": "CVE-2021-41773",
"full_name": "Balgogan\/CVE-2021-41773",
"owner": {
"login": "Balgogan",
"id": 88535377,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
"html_url": "https:\/\/github.com\/Balgogan"
},
"html_url": "https:\/\/github.com\/Balgogan\/CVE-2021-41773",
"description": "Ce programme permet de détecter une faille RCE sur les serveurs Apache 2.4.49 et Apache 2.4.50",
"fork": false,
"created_at": "2021-10-26T19:11:28Z",
"updated_at": "2021-10-26T21:05:17Z",
"pushed_at": "2021-10-26T19:15:04Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -2942,6 +2942,8 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
- [TheLastVvV/CVE-2021-41773](https://github.com/TheLastVvV/CVE-2021-41773)
- [MazX0p/CVE-2021-41773](https://github.com/MazX0p/CVE-2021-41773)
- [vida00/Scanner-CVE-2021-41773](https://github.com/vida00/Scanner-CVE-2021-41773)
- [mr-exo/CVE-2021-41773](https://github.com/mr-exo/CVE-2021-41773)
- [Balgogan/CVE-2021-41773](https://github.com/Balgogan/CVE-2021-41773)
### CVE-2021-42013 (2021-10-07)