Auto Update 2021/07/15 06:11:45

This commit is contained in:
motikan2010-bot 2021-07-15 06:11:45 +09:00
parent 6f5ec12233
commit 4adf04d158
26 changed files with 125 additions and 101 deletions

View file

@ -13,13 +13,13 @@
"description": "A request parameter filter solution for Struts 1 CVE-2014-0114 based on the work of Alvaro Munoz and the HP Fortify team", "description": "A request parameter filter solution for Struts 1 CVE-2014-0114 based on the work of Alvaro Munoz and the HP Fortify team",
"fork": false, "fork": false,
"created_at": "2014-05-22T19:14:54Z", "created_at": "2014-05-22T19:14:54Z",
"updated_at": "2019-07-16T16:26:56Z", "updated_at": "2021-07-14T19:37:24Z",
"pushed_at": "2017-01-23T20:14:14Z", "pushed_at": "2017-01-23T20:14:14Z",
"stargazers_count": 7, "stargazers_count": 8,
"watchers_count": 7, "watchers_count": 8,
"forks_count": 7, "forks_count": 7,
"forks": 7, "forks": 7,
"watchers": 7, "watchers": 8,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)", "description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)",
"fork": false, "fork": false,
"created_at": "2017-07-16T19:44:04Z", "created_at": "2017-07-16T19:44:04Z",
"updated_at": "2021-06-16T18:56:30Z", "updated_at": "2021-07-14T19:56:11Z",
"pushed_at": "2019-07-23T19:24:01Z", "pushed_at": "2019-07-23T19:24:01Z",
"stargazers_count": 277, "stargazers_count": 278,
"watchers_count": 277, "watchers_count": 278,
"forks_count": 111, "forks_count": 112,
"forks": 111, "forks": 112,
"watchers": 277, "watchers": 278,
"score": 0 "score": 0
}, },
{ {

View file

@ -155,8 +155,8 @@
"pushed_at": "2017-03-13T15:03:32Z", "pushed_at": "2017-03-13T15:03:32Z",
"stargazers_count": 36, "stargazers_count": 36,
"watchers_count": 36, "watchers_count": 36,
"forks_count": 36, "forks_count": 37,
"forks": 36, "forks": 37,
"watchers": 36, "watchers": 36,
"score": 0 "score": 0
}, },

View file

@ -13,13 +13,13 @@
"description": "Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)", "description": "Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)",
"fork": false, "fork": false,
"created_at": "2018-01-16T00:23:34Z", "created_at": "2018-01-16T00:23:34Z",
"updated_at": "2021-07-09T11:17:53Z", "updated_at": "2021-07-14T17:29:23Z",
"pushed_at": "2020-12-22T03:10:47Z", "pushed_at": "2020-12-22T03:10:47Z",
"stargazers_count": 107, "stargazers_count": 108,
"watchers_count": 107, "watchers_count": 108,
"forks_count": 40, "forks_count": 40,
"forks": 40, "forks": 40,
"watchers": 107, "watchers": 108,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.", "description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.",
"fork": false, "fork": false,
"created_at": "2019-09-29T07:08:52Z", "created_at": "2019-09-29T07:08:52Z",
"updated_at": "2021-07-14T07:25:21Z", "updated_at": "2021-07-14T18:41:41Z",
"pushed_at": "2020-06-13T17:40:14Z", "pushed_at": "2020-06-13T17:40:14Z",
"stargazers_count": 587, "stargazers_count": 588,
"watchers_count": 587, "watchers_count": 588,
"forks_count": 83, "forks_count": 84,
"forks": 83, "forks": 84,
"watchers": 587, "watchers": 588,
"score": 0 "score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": "POC for cve-2019-1458", "description": "POC for cve-2019-1458",
"fork": false, "fork": false,
"created_at": "2020-03-03T17:55:07Z", "created_at": "2020-03-03T17:55:07Z",
"updated_at": "2021-07-11T12:17:25Z", "updated_at": "2021-07-14T17:31:59Z",
"pushed_at": "2020-03-04T07:05:24Z", "pushed_at": "2020-03-04T07:05:24Z",
"stargazers_count": 137, "stargazers_count": 138,
"watchers_count": 137, "watchers_count": 138,
"forks_count": 50, "forks_count": 50,
"forks": 50, "forks": 50,
"watchers": 137, "watchers": 138,
"score": 0 "score": 0
}, },
{ {

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-06-04T13:17:10Z", "pushed_at": "2020-06-04T13:17:10Z",
"stargazers_count": 107, "stargazers_count": 107,
"watchers_count": 107, "watchers_count": 107,
"forks_count": 35, "forks_count": 36,
"forks": 35, "forks": 36,
"watchers": 107, "watchers": 107,
"score": 0 "score": 0
}, },

View file

@ -13,13 +13,13 @@
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)", "description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
"fork": false, "fork": false,
"created_at": "2019-02-12T06:02:06Z", "created_at": "2019-02-12T06:02:06Z",
"updated_at": "2021-07-14T09:25:40Z", "updated_at": "2021-07-14T18:21:52Z",
"pushed_at": "2019-05-09T21:34:26Z", "pushed_at": "2019-05-09T21:34:26Z",
"stargazers_count": 586, "stargazers_count": 587,
"watchers_count": 586, "watchers_count": 587,
"forks_count": 144, "forks_count": 144,
"forks": 144, "forks": 144,
"watchers": 586, "watchers": 587,
"score": 0 "score": 0
}, },
{ {

View file

@ -36,13 +36,13 @@
"description": "Exploit for CVE-2019-9810 Firefox on Windows 64-bit.", "description": "Exploit for CVE-2019-9810 Firefox on Windows 64-bit.",
"fork": false, "fork": false,
"created_at": "2019-05-05T17:19:02Z", "created_at": "2019-05-05T17:19:02Z",
"updated_at": "2021-07-01T06:35:46Z", "updated_at": "2021-07-14T18:41:43Z",
"pushed_at": "2019-12-28T18:25:10Z", "pushed_at": "2019-12-28T18:25:10Z",
"stargazers_count": 210, "stargazers_count": 211,
"watchers_count": 210, "watchers_count": 211,
"forks_count": 56, "forks_count": 57,
"forks": 56, "forks": 57,
"watchers": 210, "watchers": 211,
"score": 0 "score": 0
} }
] ]

View file

@ -1094,13 +1094,13 @@
"description": "CVE-2020-0796 Remote Code Execution POC", "description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false, "fork": false,
"created_at": "2020-04-20T14:35:48Z", "created_at": "2020-04-20T14:35:48Z",
"updated_at": "2021-07-13T10:09:21Z", "updated_at": "2021-07-14T17:17:08Z",
"pushed_at": "2020-06-09T20:46:45Z", "pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 401, "stargazers_count": 402,
"watchers_count": 401, "watchers_count": 402,
"forks_count": 131, "forks_count": 131,
"forks": 131, "forks": 131,
"watchers": 401, "watchers": 402,
"score": 0 "score": 0
}, },
{ {

View file

@ -109,8 +109,8 @@
"pushed_at": "2021-04-26T02:30:11Z", "pushed_at": "2021-04-26T02:30:11Z",
"stargazers_count": 807, "stargazers_count": 807,
"watchers_count": 807, "watchers_count": 807,
"forks_count": 255, "forks_count": 254,
"forks": 255, "forks": 254,
"watchers": 807, "watchers": 807,
"score": 0 "score": 0
} }

View file

@ -13,13 +13,13 @@
"description": "How to exploit a vulnerable windows driver. Exploit for AsrDrv104.sys", "description": "How to exploit a vulnerable windows driver. Exploit for AsrDrv104.sys",
"fork": false, "fork": false,
"created_at": "2021-06-29T04:38:24Z", "created_at": "2021-06-29T04:38:24Z",
"updated_at": "2021-07-14T05:29:08Z", "updated_at": "2021-07-14T20:42:04Z",
"pushed_at": "2021-07-09T05:17:40Z", "pushed_at": "2021-07-09T05:17:40Z",
"stargazers_count": 263, "stargazers_count": 264,
"watchers_count": 263, "watchers_count": 264,
"forks_count": 19, "forks_count": 19,
"forks": 19, "forks": 19,
"watchers": 263, "watchers": 264,
"score": 0 "score": 0
} }
] ]

View file

@ -178,8 +178,8 @@
"pushed_at": "2020-10-16T23:12:52Z", "pushed_at": "2020-10-16T23:12:52Z",
"stargazers_count": 20, "stargazers_count": 20,
"watchers_count": 20, "watchers_count": 20,
"forks_count": 6, "forks_count": 5,
"forks": 6, "forks": 5,
"watchers": 20, "watchers": 20,
"score": 0 "score": 0
}, },

View file

@ -59,13 +59,13 @@
"description": "CVE-2020-8840FasterXML\/jackson-databind 远程代码执行漏洞", "description": "CVE-2020-8840FasterXML\/jackson-databind 远程代码执行漏洞",
"fork": false, "fork": false,
"created_at": "2020-02-24T07:43:12Z", "created_at": "2020-02-24T07:43:12Z",
"updated_at": "2021-06-24T07:21:33Z", "updated_at": "2021-07-14T15:19:08Z",
"pushed_at": "2020-02-24T07:45:37Z", "pushed_at": "2020-02-24T07:45:37Z",
"stargazers_count": 27, "stargazers_count": 28,
"watchers_count": 27, "watchers_count": 28,
"forks_count": 9, "forks_count": 9,
"forks": 9, "forks": 9,
"watchers": 27, "watchers": 28,
"score": 0 "score": 0
}, },
{ {

View file

@ -224,8 +224,8 @@
"pushed_at": "2021-01-15T18:12:07Z", "pushed_at": "2021-01-15T18:12:07Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"forks_count": 2, "forks_count": 1,
"forks": 2, "forks": 1,
"watchers": 0, "watchers": 0,
"score": 0 "score": 0
}, },

View file

@ -36,13 +36,13 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527", "description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false, "fork": false,
"created_at": "2021-06-29T17:24:14Z", "created_at": "2021-06-29T17:24:14Z",
"updated_at": "2021-07-14T10:26:51Z", "updated_at": "2021-07-14T20:57:59Z",
"pushed_at": "2021-07-08T11:10:36Z", "pushed_at": "2021-07-14T21:04:49Z",
"stargazers_count": 1189, "stargazers_count": 1192,
"watchers_count": 1189, "watchers_count": 1192,
"forks_count": 426, "forks_count": 427,
"forks": 426, "forks": 427,
"watchers": 1189, "watchers": 1192,
"score": 0 "score": 0
}, },
{ {
@ -128,13 +128,13 @@
"description": "Local Privilege Escalation Edition for CVE-2021-1675", "description": "Local Privilege Escalation Edition for CVE-2021-1675",
"fork": false, "fork": false,
"created_at": "2021-07-01T09:47:13Z", "created_at": "2021-07-01T09:47:13Z",
"updated_at": "2021-07-14T10:07:15Z", "updated_at": "2021-07-14T17:49:17Z",
"pushed_at": "2021-07-05T06:46:12Z", "pushed_at": "2021-07-05T06:46:12Z",
"stargazers_count": 269, "stargazers_count": 270,
"watchers_count": 269, "watchers_count": 270,
"forks_count": 61, "forks_count": 61,
"forks": 61, "forks": 61,
"watchers": 269, "watchers": 270,
"score": 0 "score": 0
}, },
{ {
@ -220,13 +220,13 @@
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)", "description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
"fork": false, "fork": false,
"created_at": "2021-07-01T23:45:58Z", "created_at": "2021-07-01T23:45:58Z",
"updated_at": "2021-07-14T15:07:48Z", "updated_at": "2021-07-14T19:50:43Z",
"pushed_at": "2021-07-05T08:54:06Z", "pushed_at": "2021-07-05T08:54:06Z",
"stargazers_count": 485, "stargazers_count": 488,
"watchers_count": 485, "watchers_count": 488,
"forks_count": 127, "forks_count": 128,
"forks": 127, "forks": 128,
"watchers": 485, "watchers": 488,
"score": 0 "score": 0
}, },
{ {

View file

@ -36,13 +36,13 @@
"description": "CVE-­2021­-1732 Microsoft Windows 10 本地提权漏 研究及Poc\/Exploit开发", "description": "CVE-­2021­-1732 Microsoft Windows 10 本地提权漏 研究及Poc\/Exploit开发",
"fork": false, "fork": false,
"created_at": "2021-03-08T05:07:15Z", "created_at": "2021-03-08T05:07:15Z",
"updated_at": "2021-07-14T08:00:14Z", "updated_at": "2021-07-14T18:30:03Z",
"pushed_at": "2021-03-08T11:41:19Z", "pushed_at": "2021-03-08T11:41:19Z",
"stargazers_count": 23, "stargazers_count": 24,
"watchers_count": 23, "watchers_count": 24,
"forks_count": 14, "forks_count": 14,
"forks": 14, "forks": 14,
"watchers": 23, "watchers": 24,
"score": 0 "score": 0
}, },
{ {

View file

@ -109,8 +109,8 @@
"pushed_at": "2021-04-26T02:30:11Z", "pushed_at": "2021-04-26T02:30:11Z",
"stargazers_count": 807, "stargazers_count": 807,
"watchers_count": 807, "watchers_count": 807,
"forks_count": 255, "forks_count": 254,
"forks": 255, "forks": 254,
"watchers": 807, "watchers": 807,
"score": 0 "score": 0
}, },

View file

@ -67,5 +67,28 @@
"forks": 2, "forks": 2,
"watchers": 8, "watchers": 8,
"score": 0 "score": 0
},
{
"id": 386052413,
"name": "CVE-2021-30461",
"full_name": "puckiestyle\/CVE-2021-30461",
"owner": {
"login": "puckiestyle",
"id": 57447087,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
"html_url": "https:\/\/github.com\/puckiestyle"
},
"html_url": "https:\/\/github.com\/puckiestyle\/CVE-2021-30461",
"description": null,
"fork": false,
"created_at": "2021-07-14T19:20:11Z",
"updated_at": "2021-07-14T19:20:24Z",
"pushed_at": "2021-07-14T19:20:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.", "description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
"fork": false, "fork": false,
"created_at": "2021-05-16T16:15:56Z", "created_at": "2021-05-16T16:15:56Z",
"updated_at": "2021-07-14T03:50:03Z", "updated_at": "2021-07-14T16:48:53Z",
"pushed_at": "2021-06-12T08:27:09Z", "pushed_at": "2021-06-12T08:27:09Z",
"stargazers_count": 748, "stargazers_count": 749,
"watchers_count": 748, "watchers_count": 749,
"forks_count": 123, "forks_count": 123,
"forks": 123, "forks": 123,
"watchers": 748, "watchers": 749,
"score": 0 "score": 0
}, },
{ {

View file

@ -381,13 +381,13 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2021-01-30T20:39:58Z", "created_at": "2021-01-30T20:39:58Z",
"updated_at": "2021-07-14T08:30:41Z", "updated_at": "2021-07-14T16:07:52Z",
"pushed_at": "2021-02-02T17:07:09Z", "pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 741, "stargazers_count": 742,
"watchers_count": 741, "watchers_count": 742,
"forks_count": 211, "forks_count": 211,
"forks": 211, "forks": 211,
"watchers": 741, "watchers": 742,
"score": 0 "score": 0
}, },
{ {

View file

@ -220,13 +220,13 @@
"description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE", "description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE",
"fork": false, "fork": false,
"created_at": "2021-07-05T20:13:49Z", "created_at": "2021-07-05T20:13:49Z",
"updated_at": "2021-07-14T13:49:55Z", "updated_at": "2021-07-14T16:39:23Z",
"pushed_at": "2021-07-09T15:49:23Z", "pushed_at": "2021-07-09T15:49:23Z",
"stargazers_count": 556, "stargazers_count": 558,
"watchers_count": 556, "watchers_count": 558,
"forks_count": 67, "forks_count": 67,
"forks": 67, "forks": 67,
"watchers": 556, "watchers": 558,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2021-3492 used at Pwn2Own 2021", "description": "PoC for CVE-2021-3492 used at Pwn2Own 2021",
"fork": false, "fork": false,
"created_at": "2021-06-28T09:43:31Z", "created_at": "2021-06-28T09:43:31Z",
"updated_at": "2021-07-14T07:56:39Z", "updated_at": "2021-07-14T17:45:19Z",
"pushed_at": "2021-06-28T09:55:57Z", "pushed_at": "2021-06-28T09:55:57Z",
"stargazers_count": 7, "stargazers_count": 10,
"watchers_count": 7, "watchers_count": 10,
"forks_count": 0, "forks_count": 1,
"forks": 0, "forks": 1,
"watchers": 7, "watchers": 10,
"score": 0 "score": 0
} }
] ]

View file

@ -105,8 +105,8 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2021-06-14T20:08:20Z", "created_at": "2021-06-14T20:08:20Z",
"updated_at": "2021-06-21T16:52:08Z", "updated_at": "2021-07-14T17:17:39Z",
"pushed_at": "2021-06-21T15:35:52Z", "pushed_at": "2021-07-14T17:17:37Z",
"stargazers_count": 1, "stargazers_count": 1,
"watchers_count": 1, "watchers_count": 1,
"forks_count": 0, "forks_count": 0,

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-06-07T09:04:22Z", "pushed_at": "2021-06-07T09:04:22Z",
"stargazers_count": 1, "stargazers_count": 1,
"watchers_count": 1, "watchers_count": 1,
"forks_count": 1, "forks_count": 2,
"forks": 1, "forks": 2,
"watchers": 1, "watchers": 1,
"score": 0 "score": 0
} }

View file

@ -1343,6 +1343,7 @@ A remote code execution issue was discovered in the web UI of VoIPmonitor before
- [daedalus/CVE-2021-30461](https://github.com/daedalus/CVE-2021-30461) - [daedalus/CVE-2021-30461](https://github.com/daedalus/CVE-2021-30461)
- [Vulnmachines/CVE-2021-30461](https://github.com/Vulnmachines/CVE-2021-30461) - [Vulnmachines/CVE-2021-30461](https://github.com/Vulnmachines/CVE-2021-30461)
- [Al1ex/CVE-2021-30461](https://github.com/Al1ex/CVE-2021-30461) - [Al1ex/CVE-2021-30461](https://github.com/Al1ex/CVE-2021-30461)
- [puckiestyle/CVE-2021-30461](https://github.com/puckiestyle/CVE-2021-30461)
### CVE-2021-30481 (2021-04-10) ### CVE-2021-30481 (2021-04-10)