Auto Update 2021/10/24 00:14:20

This commit is contained in:
motikan2010-bot 2021-10-24 00:14:20 +09:00
parent 69f4d9a8bd
commit 61196fc880
16 changed files with 73 additions and 73 deletions

View file

@ -13,17 +13,17 @@
"description": "CVE-2014-2630 exploit for xglance-bin ",
"fork": false,
"created_at": "2020-02-04T16:47:44Z",
"updated_at": "2021-09-21T14:56:11Z",
"updated_at": "2021-10-23T10:41:00Z",
"pushed_at": "2020-02-10T21:16:02Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 3,
"score": 0
}
]

View file

@ -13,8 +13,8 @@
"description": "Exploiting Edge's read:\/\/ urlhandler",
"fork": false,
"created_at": "2017-03-15T13:01:29Z",
"updated_at": "2019-10-26T13:38:33Z",
"pushed_at": "2020-10-01T04:14:25Z",
"updated_at": "2021-10-23T14:56:32Z",
"pushed_at": "2021-10-23T14:56:30Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 14,

View file

@ -207,17 +207,17 @@
"description": "iis6 exploit 2017 CVE-2017-7269",
"fork": false,
"created_at": "2017-04-05T23:21:12Z",
"updated_at": "2021-09-05T13:58:59Z",
"updated_at": "2021-10-23T12:03:44Z",
"pushed_at": "2017-04-05T23:29:03Z",
"stargazers_count": 44,
"watchers_count": 44,
"forks_count": 47,
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 48,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 44,
"forks": 48,
"watchers": 46,
"score": 0
},
{

View file

@ -2,28 +2,28 @@
{
"id": 401087194,
"name": "CVE-2019-19609",
"full_name": "4ugury\/CVE-2019-19609",
"full_name": "z9fr\/CVE-2019-19609",
"owner": {
"login": "4ugury",
"login": "z9fr",
"id": 66930150,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66930150?v=4",
"html_url": "https:\/\/github.com\/4ugury"
"html_url": "https:\/\/github.com\/z9fr"
},
"html_url": "https:\/\/github.com\/4ugury\/CVE-2019-19609",
"html_url": "https:\/\/github.com\/z9fr\/CVE-2019-19609",
"description": "Strapi Framework Vulnerable to Remote Code Execution ",
"fork": false,
"created_at": "2021-08-29T16:18:27Z",
"updated_at": "2021-08-31T14:33:40Z",
"updated_at": "2021-10-23T12:51:35Z",
"pushed_at": "2021-08-29T16:34:16Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 4,
"score": 0
},
{

View file

@ -1609,17 +1609,17 @@
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
"fork": false,
"created_at": "2020-06-10T16:44:39Z",
"updated_at": "2021-10-11T04:40:31Z",
"updated_at": "2021-10-23T11:31:54Z",
"pushed_at": "2021-01-15T19:21:25Z",
"stargazers_count": 145,
"watchers_count": 145,
"stargazers_count": 146,
"watchers_count": 146,
"forks_count": 40,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 40,
"watchers": 145,
"watchers": 146,
"score": 0
},
{

View file

@ -94,17 +94,17 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2021-10-19T20:36:40Z",
"updated_at": "2021-10-23T14:25:51Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 874,
"watchers_count": 874,
"stargazers_count": 873,
"watchers_count": 873,
"forks_count": 238,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 238,
"watchers": 874,
"watchers": 873,
"score": 0
},
{

View file

@ -17,7 +17,7 @@
"pushed_at": "2020-10-26T10:15:32Z",
"stargazers_count": 205,
"watchers_count": 205,
"forks_count": 30,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"topics": [
@ -41,7 +41,7 @@
"windows-10"
],
"visibility": "public",
"forks": 30,
"forks": 29,
"watchers": 205,
"score": 0
},

View file

@ -40,17 +40,17 @@
"description": null,
"fork": false,
"created_at": "2020-05-21T00:41:06Z",
"updated_at": "2021-10-22T14:06:00Z",
"updated_at": "2021-10-23T14:01:14Z",
"pushed_at": "2021-10-21T18:12:50Z",
"stargazers_count": 113,
"watchers_count": 113,
"stargazers_count": 114,
"watchers_count": 114,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 113,
"watchers": 114,
"score": 0
},
{
@ -256,17 +256,17 @@
"description": "Apache Tomcat RCE (CVE-2020-9484)",
"fork": false,
"created_at": "2021-01-15T17:59:50Z",
"updated_at": "2021-01-15T18:12:09Z",
"updated_at": "2021-10-23T14:01:07Z",
"pushed_at": "2021-01-15T18:12:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0
},
{

View file

@ -148,17 +148,17 @@
"description": "Confluence Server Webwork OGNL injection",
"fork": false,
"created_at": "2021-09-01T07:15:17Z",
"updated_at": "2021-10-23T04:20:48Z",
"updated_at": "2021-10-23T14:26:51Z",
"pushed_at": "2021-09-10T19:42:33Z",
"stargazers_count": 233,
"watchers_count": 233,
"stargazers_count": 234,
"watchers_count": 234,
"forks_count": 59,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 59,
"watchers": 233,
"watchers": 234,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "SolarWinds Orion Platform ActionPluginBaseView 反序列化RCE",
"fork": false,
"created_at": "2021-10-23T01:35:42Z",
"updated_at": "2021-10-23T08:37:35Z",
"updated_at": "2021-10-23T11:41:37Z",
"pushed_at": "2021-10-23T01:44:54Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"forks": 2,
"watchers": 10,
"score": 0
}
]

View file

@ -229,17 +229,17 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2021-10-23T03:03:02Z",
"updated_at": "2021-10-23T10:20:28Z",
"pushed_at": "2021-09-11T09:50:26Z",
"stargazers_count": 1283,
"watchers_count": 1283,
"stargazers_count": 1284,
"watchers_count": 1284,
"forks_count": 410,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 410,
"watchers": 1283,
"watchers": 1284,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2021-10-16T16:17:44Z",
"updated_at": "2021-10-23T04:07:17Z",
"updated_at": "2021-10-23T15:10:03Z",
"pushed_at": "2021-10-22T22:48:06Z",
"stargazers_count": 131,
"watchers_count": 131,
"forks_count": 25,
"stargazers_count": 142,
"watchers_count": 142,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 131,
"forks": 30,
"watchers": 142,
"score": 0
},
{
@ -40,17 +40,17 @@
"description": "windows 10 14393 LPE",
"fork": false,
"created_at": "2021-10-20T09:24:36Z",
"updated_at": "2021-10-23T06:58:37Z",
"updated_at": "2021-10-23T14:28:01Z",
"pushed_at": "2021-10-20T09:29:17Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 44,
"watchers_count": 44,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 42,
"watchers": 44,
"score": 0
}
]

View file

@ -564,12 +564,12 @@
"pushed_at": "2021-10-06T15:07:48Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 9,
"score": 0
},
@ -1686,8 +1686,8 @@
"description": null,
"fork": false,
"created_at": "2021-10-20T14:41:15Z",
"updated_at": "2021-10-20T15:14:52Z",
"pushed_at": "2021-10-20T15:14:49Z",
"updated_at": "2021-10-23T13:15:51Z",
"pushed_at": "2021-10-23T13:15:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -97,8 +97,8 @@
"description": null,
"fork": false,
"created_at": "2021-10-20T15:32:39Z",
"updated_at": "2021-10-22T13:56:44Z",
"pushed_at": "2021-10-22T13:56:42Z",
"updated_at": "2021-10-23T13:16:56Z",
"pushed_at": "2021-10-23T13:16:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,17 +13,17 @@
"description": "A small PoC for the recent RCE found in the Goahead Webserver prior to version 5.1.5. ",
"fork": false,
"created_at": "2021-10-12T06:21:02Z",
"updated_at": "2021-10-19T04:30:21Z",
"updated_at": "2021-10-23T09:57:43Z",
"pushed_at": "2021-10-18T20:56:31Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -11150,7 +11150,7 @@ class.upload.php in verot.net class.upload before 1.0.3 and 2.x before 2.0.4, as
The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Execution in the Install and Uninstall Plugin components of the Admin panel, because it does not sanitize the plugin name, and attackers can inject arbitrary shell commands to be executed by the execa function.
</code>
- [4ugury/CVE-2019-19609](https://github.com/4ugury/CVE-2019-19609)
- [z9fr/CVE-2019-19609](https://github.com/z9fr/CVE-2019-19609)
- [diego-tella/CVE-2019-19609-EXPLOIT](https://github.com/diego-tella/CVE-2019-19609-EXPLOIT)
- [guglia001/CVE-2019-19609](https://github.com/guglia001/CVE-2019-19609)
- [D3m0nicw0lf/CVE-2019-19609](https://github.com/D3m0nicw0lf/CVE-2019-19609)