Auto Update 2021/10/31 18:12:52

This commit is contained in:
motikan2010-bot 2021-10-31 18:12:52 +09:00
parent 59ff9e8e97
commit 42e3026ad9
22 changed files with 162 additions and 117 deletions

View file

@ -546,33 +546,6 @@
"watchers": 0,
"score": 0
},
{
"id": 156669000,
"name": "IDB_Share",
"full_name": "R0fM1a\/IDB_Share",
"owner": {
"login": "R0fM1a",
"id": 44599121,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44599121?v=4",
"html_url": "https:\/\/github.com\/R0fM1a"
},
"html_url": "https:\/\/github.com\/R0fM1a\/IDB_Share",
"description": "CVE-2017-11882 analyse notebook",
"fork": false,
"created_at": "2018-11-08T07:44:32Z",
"updated_at": "2018-11-08T10:27:41Z",
"pushed_at": "2018-11-08T10:27:40Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 161162866,
"name": "CVE-2017-11882",

View file

@ -127,8 +127,8 @@
"description": "It is a simple script to exploit RCE for Samba (CVE-2017-7494 ).",
"fork": false,
"created_at": "2017-05-30T15:08:32Z",
"updated_at": "2021-09-03T09:07:53Z",
"pushed_at": "2021-09-06T21:32:05Z",
"updated_at": "2021-10-31T07:06:28Z",
"pushed_at": "2021-10-31T07:06:25Z",
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 24,

View file

@ -681,12 +681,12 @@
"pushed_at": "2019-05-16T02:12:17Z",
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 32,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 32,
"forks": 33,
"watchers": 42,
"score": 0
},

View file

@ -40,17 +40,17 @@
"description": "漏洞POC、EXP合集持续更新。ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露、ConfluenceRCECVE-2021-26084、ZeroShell防火墙RCECVE-2019-12725",
"fork": false,
"created_at": "2021-05-22T05:06:33Z",
"updated_at": "2021-10-21T07:11:21Z",
"updated_at": "2021-10-31T08:12:05Z",
"pushed_at": "2021-09-22T02:19:32Z",
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 6,
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 30,
"forks": 7,
"watchers": 31,
"score": 0
},
{

View file

@ -44,7 +44,7 @@
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2950,
"watchers_count": 2950,
"forks_count": 870,
"forks_count": 871,
"allow_forking": true,
"is_template": false,
"topics": [
@ -69,7 +69,7 @@
"webshell"
],
"visibility": "public",
"forks": 870,
"forks": 871,
"watchers": 2950,
"score": 0
},

View file

@ -67,17 +67,17 @@
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
"fork": false,
"created_at": "2020-01-11T00:08:27Z",
"updated_at": "2021-10-28T08:35:14Z",
"updated_at": "2021-10-31T03:16:47Z",
"pushed_at": "2020-01-22T20:23:51Z",
"stargazers_count": 534,
"watchers_count": 534,
"stargazers_count": 535,
"watchers_count": 535,
"forks_count": 131,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 131,
"watchers": 534,
"watchers": 535,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
"fork": false,
"created_at": "2020-06-08T07:37:49Z",
"updated_at": "2021-10-17T01:59:46Z",
"updated_at": "2021-10-31T06:51:58Z",
"pushed_at": "2021-08-07T16:48:55Z",
"stargazers_count": 374,
"watchers_count": 374,
"stargazers_count": 375,
"watchers_count": 375,
"forks_count": 66,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 66,
"watchers": 374,
"watchers": 375,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473",
"fork": false,
"created_at": "2020-03-11T17:51:29Z",
"updated_at": "2021-10-26T13:18:12Z",
"updated_at": "2021-10-31T08:29:00Z",
"pushed_at": "2021-08-16T18:16:20Z",
"stargazers_count": 93,
"watchers_count": 93,
"stargazers_count": 94,
"watchers_count": 94,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
@ -40,7 +40,7 @@
],
"visibility": "public",
"forks": 21,
"watchers": 93,
"watchers": 94,
"score": 0
},
{

View file

@ -17,7 +17,7 @@
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2950,
"watchers_count": 2950,
"forks_count": 870,
"forks_count": 871,
"allow_forking": true,
"is_template": false,
"topics": [
@ -42,7 +42,7 @@
"webshell"
],
"visibility": "public",
"forks": 870,
"forks": 871,
"watchers": 2950,
"score": 0
},

View file

@ -98,12 +98,12 @@
"pushed_at": "2020-07-24T17:11:05Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 1,
"score": 0
},

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-10-26T00:34:54Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 9,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473",
"fork": false,
"created_at": "2020-03-11T17:51:29Z",
"updated_at": "2021-10-26T13:18:12Z",
"updated_at": "2021-10-31T08:29:00Z",
"pushed_at": "2021-08-16T18:16:20Z",
"stargazers_count": 93,
"watchers_count": 93,
"stargazers_count": 94,
"watchers_count": 94,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
@ -40,7 +40,7 @@
],
"visibility": "public",
"forks": 21,
"watchers": 93,
"watchers": 94,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-06-05T15:42:16Z",
"updated_at": "2021-10-30T23:03:51Z",
"updated_at": "2021-10-31T08:49:31Z",
"pushed_at": "2021-10-28T02:46:54Z",
"stargazers_count": 129,
"watchers_count": 129,
"forks_count": 27,
"stargazers_count": 131,
"watchers_count": 131,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 129,
"forks": 28,
"watchers": 131,
"score": 0
},
{
@ -40,17 +40,17 @@
"description": "Pocsuite3 For CVE-2021-22205",
"fork": false,
"created_at": "2021-10-28T06:29:37Z",
"updated_at": "2021-10-30T20:37:27Z",
"updated_at": "2021-10-31T08:11:03Z",
"pushed_at": "2021-10-28T08:54:26Z",
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 19,
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 61,
"forks": 20,
"watchers": 62,
"score": 0
},
{
@ -67,17 +67,17 @@
"description": "CVE-2021-22205 Unauthorized RCE",
"fork": false,
"created_at": "2021-10-28T14:02:51Z",
"updated_at": "2021-10-30T18:44:28Z",
"updated_at": "2021-10-31T06:45:42Z",
"pushed_at": "2021-10-28T14:20:05Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 32,
"watchers": 33,
"score": 0
},
{
@ -121,10 +121,10 @@
"description": "CVE-2021-22205& GitLab CE\/EE RCE",
"fork": false,
"created_at": "2021-10-29T04:30:45Z",
"updated_at": "2021-10-30T09:33:50Z",
"updated_at": "2021-10-31T07:08:20Z",
"pushed_at": "2021-10-29T04:31:15Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
@ -133,7 +133,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 8,
"watchers": 9,
"score": 0
},
{
@ -150,17 +150,17 @@
"description": "CVE-2021-22205 移除了对djvumake & djvulibre的依赖可在win平台使用",
"fork": false,
"created_at": "2021-10-30T02:56:34Z",
"updated_at": "2021-10-30T08:52:27Z",
"updated_at": "2021-10-31T08:13:07Z",
"pushed_at": "2021-10-30T03:04:03Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"watchers": 3,
"score": 0
},
{
@ -189,5 +189,34 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 423050288,
"name": "CVE-2021-22205",
"full_name": "Seals6\/CVE-2021-22205",
"owner": {
"login": "Seals6",
"id": 49613759,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49613759?v=4",
"html_url": "https:\/\/github.com\/Seals6"
},
"html_url": "https:\/\/github.com\/Seals6\/CVE-2021-22205",
"description": "CVE-2021-22205未授权漏洞批量检测",
"fork": false,
"created_at": "2021-10-31T04:15:30Z",
"updated_at": "2021-10-31T05:16:36Z",
"pushed_at": "2021-10-31T04:59:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-22205"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Gitlab CI Lint API未授权 SSRF漏洞 (CVE-2021-22214)",
"fork": false,
"created_at": "2021-06-22T03:04:50Z",
"updated_at": "2021-10-30T10:28:51Z",
"updated_at": "2021-10-31T08:58:52Z",
"pushed_at": "2021-06-22T04:35:08Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 46,
"watchers": 47,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "漏洞POC、EXP合集持续更新。ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露、ConfluenceRCECVE-2021-26084、ZeroShell防火墙RCECVE-2019-12725",
"fork": false,
"created_at": "2021-05-22T05:06:33Z",
"updated_at": "2021-10-21T07:11:21Z",
"updated_at": "2021-10-31T08:12:05Z",
"pushed_at": "2021-09-22T02:19:32Z",
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 6,
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 30,
"forks": 7,
"watchers": 31,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.",
"fork": false,
"created_at": "2020-12-31T16:30:02Z",
"updated_at": "2021-10-23T03:35:47Z",
"updated_at": "2021-10-31T08:02:13Z",
"pushed_at": "2021-03-29T12:33:38Z",
"stargazers_count": 73,
"watchers_count": 73,
"stargazers_count": 74,
"watchers_count": 74,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 18,
"watchers": 73,
"watchers": 74,
"score": 0
}
]

35
2021/CVE-2021-28079.json Normal file
View file

@ -0,0 +1,35 @@
[
{
"id": 423093176,
"name": "CVE-2021-28079",
"full_name": "g33xter\/CVE-2021-28079",
"owner": {
"login": "g33xter",
"id": 8503135,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8503135?v=4",
"html_url": "https:\/\/github.com\/g33xter"
},
"html_url": "https:\/\/github.com\/g33xter\/CVE-2021-28079",
"description": "POC Jamovi <=1.6.18 is affected by a cross-site scripting (XSS) vulnerability. The column-name is vulnerable to XSS in the ElectronJS Framework. An attacker can make a .omv (Jamovi) document containing a payload. When opened by victim, the payload is triggered.",
"fork": false,
"created_at": "2021-10-31T08:29:53Z",
"updated_at": "2021-10-31T09:03:17Z",
"pushed_at": "2021-10-31T08:57:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-28079",
"electronjs",
"jamovi",
"omv",
"xss-exploitation"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -207,7 +207,7 @@
"fork": false,
"created_at": "2021-02-21T06:27:18Z",
"updated_at": "2021-10-24T10:27:36Z",
"pushed_at": "2021-02-21T06:34:17Z",
"pushed_at": "2021-10-31T06:01:27Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 8,

View file

@ -452,17 +452,17 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2021-10-29T20:35:57Z",
"updated_at": "2021-10-31T05:40:43Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 766,
"watchers_count": 766,
"stargazers_count": 765,
"watchers_count": 765,
"forks_count": 224,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 224,
"watchers": 766,
"watchers": 765,
"score": 0
},
{
@ -1023,17 +1023,17 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
"updated_at": "2021-10-29T06:33:10Z",
"updated_at": "2021-10-31T05:35:50Z",
"pushed_at": "2021-07-23T15:46:37Z",
"stargazers_count": 382,
"watchers_count": 382,
"stargazers_count": 383,
"watchers_count": 383,
"forks_count": 91,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 91,
"watchers": 382,
"watchers": 383,
"score": 0
},
{

View file

@ -761,8 +761,8 @@
"description": "TIC4301 Project - CVE-2021-40444",
"fork": false,
"created_at": "2021-10-16T07:07:26Z",
"updated_at": "2021-10-16T08:52:11Z",
"pushed_at": "2021-10-16T08:52:08Z",
"updated_at": "2021-10-31T06:54:05Z",
"pushed_at": "2021-10-31T06:54:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
@ -815,8 +815,8 @@
"description": "An attempt to reproduce Microsoft MSHTML Remote Code Execution (RCE) Vulnerability and using Metasploit Framework.",
"fork": false,
"created_at": "2021-10-28T14:55:46Z",
"updated_at": "2021-10-29T05:15:37Z",
"pushed_at": "2021-10-29T05:15:34Z",
"updated_at": "2021-10-31T08:15:03Z",
"pushed_at": "2021-10-31T08:15:00Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,

View file

@ -779,10 +779,10 @@
"description": "A framework for bug hunting or pentesting targeting websites that have CVE-2021-41773 Vulnerability in public ",
"fork": false,
"created_at": "2021-10-07T01:31:13Z",
"updated_at": "2021-10-30T12:55:02Z",
"updated_at": "2021-10-31T07:01:02Z",
"pushed_at": "2021-10-07T08:25:26Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
@ -795,7 +795,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 17,
"watchers": 18,
"score": 0
},
{

View file

@ -881,6 +881,7 @@ An issue has been discovered in GitLab CE/EE affecting all versions starting fro
- [Al1ex/CVE-2021-22205](https://github.com/Al1ex/CVE-2021-22205)
- [whwlsfb/CVE-2021-22205](https://github.com/whwlsfb/CVE-2021-22205)
- [findneo/GitLab-preauth-RCE_CVE-2021-22205](https://github.com/findneo/GitLab-preauth-RCE_CVE-2021-22205)
- [Seals6/CVE-2021-22205](https://github.com/Seals6/CVE-2021-22205)
### CVE-2021-22214 (2021-06-08)
@ -1578,6 +1579,14 @@ The MsIo64.sys driver before 1.1.19.1016 in MSI Dragon Center before 2.0.98.0 ha
- [mathisvickie/CVE-2021-27965](https://github.com/mathisvickie/CVE-2021-27965)
- [Crystalware/CVE-2021-27965](https://github.com/Crystalware/CVE-2021-27965)
### CVE-2021-28079 (2021-04-26)
<code>
Jamovi &lt;=1.6.18 is affected by a cross-site scripting (XSS) vulnerability. The column-name is vulnerable to XSS in the ElectronJS Framework. An attacker can make a .omv (Jamovi) document containing a payload. When opened by victim, the payload is triggered.
</code>
- [g33xter/CVE-2021-28079](https://github.com/g33xter/CVE-2021-28079)
### CVE-2021-28310 (2021-04-13)
<code>
@ -16312,7 +16321,6 @@ Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Micr
- [ChaitanyaHaritash/CVE-2017-11882](https://github.com/ChaitanyaHaritash/CVE-2017-11882)
- [qy1202/https-github.com-Ridter-CVE-2017-11882-](https://github.com/qy1202/https-github.com-Ridter-CVE-2017-11882-)
- [j0lama/CVE-2017-11882](https://github.com/j0lama/CVE-2017-11882)
- [R0fM1a/IDB_Share](https://github.com/R0fM1a/IDB_Share)
- [chanbin/CVE-2017-11882](https://github.com/chanbin/CVE-2017-11882)
- [littlebin404/CVE-2017-11882](https://github.com/littlebin404/CVE-2017-11882)
- [ekgg/Overflow-Demo-CVE-2017-11882](https://github.com/ekgg/Overflow-Demo-CVE-2017-11882)