Auto Update 2024/10/07 00:29:53

This commit is contained in:
motikan2010-bot 2024-10-07 09:29:53 +09:00
parent 526bfa4b24
commit 58dae64549
24 changed files with 127 additions and 127 deletions

View file

@ -73,10 +73,10 @@
"description": null,
"fork": false,
"created_at": "2021-03-22T09:33:51Z",
"updated_at": "2024-06-30T05:13:54Z",
"updated_at": "2024-10-06T23:17:01Z",
"pushed_at": "2021-03-22T10:46:07Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 1
},

View file

@ -595,19 +595,19 @@
"description": "is a PoC tool demonstrating an exploit for a known vulnerability in the WebDAV component of IIS6",
"fork": false,
"created_at": "2024-10-06T17:33:11Z",
"updated_at": "2024-10-06T17:49:13Z",
"updated_at": "2024-10-06T22:53:30Z",
"pushed_at": "2024-10-06T17:38:29Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"forks": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 0
}

View file

@ -1176,13 +1176,13 @@
"stargazers_count": 491,
"watchers_count": 491,
"has_discussions": false,
"forks_count": 179,
"forks_count": 178,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 179,
"forks": 178,
"watchers": 491,
"score": 0,
"subscribers_count": 34

View file

@ -228,6 +228,6 @@
"forks": 337,
"watchers": 1988,
"score": 0,
"subscribers_count": 36
"subscribers_count": 37
}
]

View file

@ -141,19 +141,19 @@
"description": "is a PoC tool designed to exploit an authenticated Remote Code Execution (RCE) vulnerability in specific versions of PostgreSQL (9.3 - 11.7)",
"fork": false,
"created_at": "2024-10-06T17:16:44Z",
"updated_at": "2024-10-06T17:49:12Z",
"updated_at": "2024-10-06T22:51:58Z",
"pushed_at": "2024-10-06T17:45:30Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"forks": 1,
"watchers": 5,
"score": 0,
"subscribers_count": 0
}

View file

@ -48,7 +48,7 @@
"forks": 337,
"watchers": 1988,
"score": 0,
"subscribers_count": 36
"subscribers_count": 37
},
{
"id": 234696172,

View file

@ -299,66 +299,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 470823423,
"name": "cve-2021-21300",
"full_name": "Jiang59991\/cve-2021-21300",
"owner": {
"login": "Jiang59991",
"id": 101699680,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101699680?v=4",
"html_url": "https:\/\/github.com\/Jiang59991"
},
"html_url": "https:\/\/github.com\/Jiang59991\/cve-2021-21300",
"description": null,
"fork": false,
"created_at": "2022-03-17T02:37:58Z",
"updated_at": "2022-03-17T02:37:58Z",
"pushed_at": "2022-03-17T02:47:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 473848809,
"name": "cve-2021-21300-plus",
"full_name": "Jiang59991\/cve-2021-21300-plus",
"owner": {
"login": "Jiang59991",
"id": 101699680,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101699680?v=4",
"html_url": "https:\/\/github.com\/Jiang59991"
},
"html_url": "https:\/\/github.com\/Jiang59991\/cve-2021-21300-plus",
"description": null,
"fork": false,
"created_at": "2022-03-25T02:59:41Z",
"updated_at": "2022-03-25T03:26:08Z",
"pushed_at": "2022-03-25T03:26:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 509747722,
"name": "CVE-2021-21300",

View file

@ -299,6 +299,36 @@
"score": 0,
"subscribers_count": 5
},
{
"id": 444978473,
"name": "testanull-CVE-2021-22005.py",
"full_name": "timb-machine-mirrors\/testanull-CVE-2021-22005.py",
"owner": {
"login": "timb-machine-mirrors",
"id": 49810875,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49810875?v=4",
"html_url": "https:\/\/github.com\/timb-machine-mirrors"
},
"html_url": "https:\/\/github.com\/timb-machine-mirrors\/testanull-CVE-2021-22005.py",
"description": "Clone from gist",
"fork": false,
"created_at": "2022-01-05T23:22:08Z",
"updated_at": "2023-04-08T20:15:10Z",
"pushed_at": "2022-01-05T23:22:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 505737586,
"name": "cve-2021-22005",

View file

@ -29,6 +29,36 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 444977303,
"name": "testanull-CVE-2021-42321_poc.py",
"full_name": "timb-machine-mirrors\/testanull-CVE-2021-42321_poc.py",
"owner": {
"login": "timb-machine-mirrors",
"id": 49810875,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49810875?v=4",
"html_url": "https:\/\/github.com\/timb-machine-mirrors"
},
"html_url": "https:\/\/github.com\/timb-machine-mirrors\/testanull-CVE-2021-42321_poc.py",
"description": "Clone from gist",
"fork": false,
"created_at": "2022-01-05T23:15:55Z",
"updated_at": "2023-04-08T20:14:09Z",
"pushed_at": "2022-01-05T23:16:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 535520694,
"name": "cve-2021-42321",

View file

@ -1305,6 +1305,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -2604,10 +2604,10 @@
"description": "Working Dirty Pipe (CVE-2022-0847) exploit tool with root access and file overwrites.",
"fork": false,
"created_at": "2023-10-15T20:13:11Z",
"updated_at": "2024-09-17T22:04:05Z",
"updated_at": "2024-10-06T20:17:48Z",
"pushed_at": "2023-10-15T22:23:44Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -2622,7 +2622,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability",
"fork": false,
"created_at": "2022-08-09T15:53:48Z",
"updated_at": "2024-09-17T10:08:14Z",
"updated_at": "2024-10-06T18:37:39Z",
"pushed_at": "2023-09-27T06:44:27Z",
"stargazers_count": 288,
"watchers_count": 288,
"stargazers_count": 289,
"watchers_count": 289,
"has_discussions": false,
"forks_count": 59,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 59,
"watchers": 288,
"watchers": 289,
"score": 0,
"subscribers_count": 11
},

View file

@ -676,8 +676,8 @@
"description": "CVE-2023-22527 | RCE using SSTI in Confluence",
"fork": false,
"created_at": "2024-10-06T15:16:04Z",
"updated_at": "2024-10-06T15:57:13Z",
"pushed_at": "2024-10-06T15:57:10Z",
"updated_at": "2024-10-06T19:48:58Z",
"pushed_at": "2024-10-06T19:48:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -412,8 +412,8 @@
"description": "Stack-Overflow on Citrix",
"fork": false,
"created_at": "2023-10-27T18:39:31Z",
"updated_at": "2024-09-18T08:50:08Z",
"pushed_at": "2023-10-27T18:52:52Z",
"updated_at": "2024-10-06T18:51:15Z",
"pushed_at": "2024-10-06T18:51:12Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-10-06T10:40:52Z",
"updated_at": "2024-10-06T22:28:12Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1199,
"watchers_count": 1199,
"stargazers_count": 1202,
"watchers_count": 1202,
"has_discussions": false,
"forks_count": 204,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 204,
"watchers": 1199,
"watchers": 1202,
"score": 0,
"subscribers_count": 20
},

View file

@ -13,10 +13,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-10-06T08:22:43Z",
"updated_at": "2024-10-06T20:01:52Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2256,
"watchers_count": 2256,
"stargazers_count": 2257,
"watchers_count": 2257,
"has_discussions": false,
"forks_count": 296,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 296,
"watchers": 2256,
"watchers": 2257,
"score": 0,
"subscribers_count": 23
},

View file

@ -103,10 +103,10 @@
"description": "Deserialization of untrusted data can occur in versions 0.17.0 to 1.14.2 of the client SDK of Allegro AIs ClearML platform, enabling a maliciously uploaded artifact to run arbitrary code on an end users system when interacted with.",
"fork": false,
"created_at": "2024-06-20T11:23:56Z",
"updated_at": "2024-06-21T00:52:48Z",
"updated_at": "2024-10-06T20:48:49Z",
"pushed_at": "2024-06-21T00:52:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Critical RCE Vulnerabilities in HPE Aruba Devices (may 2024)",
"fork": false,
"created_at": "2024-05-04T10:09:24Z",
"updated_at": "2024-10-06T14:42:17Z",
"updated_at": "2024-10-06T23:28:27Z",
"pushed_at": "2024-05-04T10:17:53Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},

View file

@ -83,10 +83,10 @@
"description": "is a PoC Python script that exploits an authenticated Server-Side Template Injection (SSTI) vulnerability in Grav CMS versions <= 1.7.44 (CVE-2024-28116)",
"fork": false,
"created_at": "2024-10-05T12:05:06Z",
"updated_at": "2024-10-06T16:49:17Z",
"updated_at": "2024-10-06T22:55:38Z",
"pushed_at": "2024-10-05T12:08:37Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -95,7 +95,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
}

View file

@ -2203,10 +2203,10 @@
"description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)",
"fork": false,
"created_at": "2024-07-08T11:27:49Z",
"updated_at": "2024-10-03T09:06:30Z",
"updated_at": "2024-10-06T23:11:08Z",
"pushed_at": "2024-08-22T08:50:25Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -2215,7 +2215,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 27,
"watchers": 28,
"score": 0,
"subscribers_count": 2
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 64,
"watchers_count": 64,
"has_discussions": false,
"forks_count": 12,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"forks": 13,
"watchers": 64,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12",
"fork": false,
"created_at": "2024-08-10T20:15:41Z",
"updated_at": "2024-09-23T14:56:00Z",
"updated_at": "2024-10-06T19:12:23Z",
"pushed_at": "2024-08-12T13:46:06Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},

View file

@ -18,7 +18,7 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -32,7 +32,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 1

View file

@ -21753,8 +21753,6 @@
- [fengzhouc/CVE-2021-21300](https://github.com/fengzhouc/CVE-2021-21300)
- [danshuizhangyu/CVE-2021-21300](https://github.com/danshuizhangyu/CVE-2021-21300)
- [0ahu/CVE-2021-21300](https://github.com/0ahu/CVE-2021-21300)
- [Jiang59991/cve-2021-21300](https://github.com/Jiang59991/cve-2021-21300)
- [Jiang59991/cve-2021-21300-plus](https://github.com/Jiang59991/cve-2021-21300-plus)
- [macilin/CVE-2021-21300](https://github.com/macilin/CVE-2021-21300)
- [Roboterh/CVE-2021-21300](https://github.com/Roboterh/CVE-2021-21300)
- [henry861010/Network_Security_NYCU](https://github.com/henry861010/Network_Security_NYCU)
@ -21978,6 +21976,7 @@
- [tiagob0b/CVE-2021-22005](https://github.com/tiagob0b/CVE-2021-22005)
- [Jun-5heng/CVE-2021-22005](https://github.com/Jun-5heng/CVE-2021-22005)
- [shmilylty/cve-2021-22005-exp](https://github.com/shmilylty/cve-2021-22005-exp)
- [timb-machine-mirrors/testanull-CVE-2021-22005.py](https://github.com/timb-machine-mirrors/testanull-CVE-2021-22005.py)
- [InventorMAO/cve-2021-22005](https://github.com/InventorMAO/cve-2021-22005)
### CVE-2021-22006 (2021-09-23)
@ -25446,6 +25445,7 @@
</code>
- [DarkSprings/CVE-2021-42321](https://github.com/DarkSprings/CVE-2021-42321)
- [timb-machine-mirrors/testanull-CVE-2021-42321_poc.py](https://github.com/timb-machine-mirrors/testanull-CVE-2021-42321_poc.py)
- [xnyuq/cve-2021-42321](https://github.com/xnyuq/cve-2021-42321)
- [7BitsTeam/exch_CVE-2021-42321](https://github.com/7BitsTeam/exch_CVE-2021-42321)