Auto Update 2021/11/10 00:13:05

This commit is contained in:
motikan2010-bot 2021-11-10 09:13:05 +09:00
parent e4acc210bf
commit 62cdc98374
13 changed files with 114 additions and 51 deletions

View file

@ -1709,12 +1709,12 @@
"pushed_at": "2019-09-03T20:50:28Z",
"stargazers_count": 1089,
"watchers_count": 1089,
"forks_count": 358,
"forks_count": 357,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 358,
"forks": 357,
"watchers": 1089,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.",
"fork": false,
"created_at": "2019-09-29T07:08:52Z",
"updated_at": "2021-11-08T13:04:45Z",
"updated_at": "2021-11-09T21:53:19Z",
"pushed_at": "2020-06-13T17:40:14Z",
"stargazers_count": 596,
"watchers_count": 596,
"stargazers_count": 597,
"watchers_count": 597,
"forks_count": 83,
"allow_forking": true,
"is_template": false,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 83,
"watchers": 596,
"watchers": 597,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": "CVE-2020-2555 Python POC",
"fork": false,
"created_at": "2020-03-06T16:02:59Z",
"updated_at": "2021-08-04T22:31:39Z",
"updated_at": "2021-11-09T20:01:29Z",
"pushed_at": "2020-04-16T12:04:18Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 48,
"watchers": 49,
"score": 0
},
{

View file

@ -279,5 +279,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 426353517,
"name": "CVE-2021-21985_PoC",
"full_name": "sknux\/CVE-2021-21985_PoC",
"owner": {
"login": "sknux",
"id": 45546882,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45546882?v=4",
"html_url": "https:\/\/github.com\/sknux"
},
"html_url": "https:\/\/github.com\/sknux\/CVE-2021-21985_PoC",
"description": "VMWARE VCENTER SERVER VIRTUAL SAN HEALTH CHECK PLUG-IN RCE (CVE-2021-21985) ",
"fork": false,
"created_at": "2021-11-09T19:06:29Z",
"updated_at": "2021-11-09T23:06:09Z",
"pushed_at": "2021-11-09T19:14:55Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-06-05T15:42:16Z",
"updated_at": "2021-11-06T20:57:13Z",
"updated_at": "2021-11-09T20:48:25Z",
"pushed_at": "2021-11-02T14:45:24Z",
"stargazers_count": 155,
"watchers_count": 155,
"stargazers_count": 156,
"watchers_count": 156,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 155,
"watchers": 156,
"score": 0
},
{
@ -422,16 +422,43 @@
"description": "Exploit for GitLab CVE-2021-22205 Unauthenticated Remote Code Execution",
"fork": false,
"created_at": "2021-11-05T16:56:06Z",
"updated_at": "2021-11-05T17:05:31Z",
"updated_at": "2021-11-09T20:47:08Z",
"pushed_at": "2021-11-05T17:05:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 426338911,
"name": "GitLab-CVE-2021-22205-scanner",
"full_name": "faisalfs10x\/GitLab-CVE-2021-22205-scanner",
"owner": {
"login": "faisalfs10x",
"id": 51811615,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51811615?v=4",
"html_url": "https:\/\/github.com\/faisalfs10x"
},
"html_url": "https:\/\/github.com\/faisalfs10x\/GitLab-CVE-2021-22205-scanner",
"description": null,
"fork": false,
"created_at": "2021-11-09T18:19:43Z",
"updated_at": "2021-11-09T19:09:52Z",
"pushed_at": "2021-11-09T19:09:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}

View file

@ -13,17 +13,17 @@
"description": "Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1",
"fork": false,
"created_at": "2021-06-05T15:05:01Z",
"updated_at": "2021-09-20T07:58:32Z",
"updated_at": "2021-11-09T20:59:58Z",
"pushed_at": "2021-09-20T07:58:29Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 31,
"watchers": 32,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.",
"fork": false,
"created_at": "2021-05-31T18:02:39Z",
"updated_at": "2021-11-04T10:05:33Z",
"updated_at": "2021-11-09T18:24:47Z",
"pushed_at": "2021-06-01T15:08:23Z",
"stargazers_count": 198,
"watchers_count": 198,
"stargazers_count": 199,
"watchers_count": 199,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 33,
"watchers": 198,
"watchers": 199,
"score": 0
},
{
@ -48,17 +48,17 @@
"description": null,
"fork": false,
"created_at": "2021-06-02T14:50:56Z",
"updated_at": "2021-09-15T03:45:37Z",
"updated_at": "2021-11-09T18:21:53Z",
"pushed_at": "2021-06-02T14:54:14Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 9,
"watchers": 10,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)",
"fork": false,
"created_at": "2021-09-01T22:59:29Z",
"updated_at": "2021-11-01T16:02:57Z",
"updated_at": "2021-11-09T20:51:09Z",
"pushed_at": "2021-09-03T10:24:34Z",
"stargazers_count": 63,
"watchers_count": 63,
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 63,
"watchers": 62,
"score": 0
}
]

View file

@ -121,10 +121,10 @@
"description": "Exploit for CVE-2021-3129",
"fork": false,
"created_at": "2021-01-27T10:16:35Z",
"updated_at": "2021-11-04T11:04:39Z",
"updated_at": "2021-11-09T19:17:03Z",
"pushed_at": "2021-03-07T04:39:58Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
@ -135,7 +135,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 28,
"watchers": 29,
"score": 0
},
{

View file

@ -229,17 +229,17 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2021-11-09T13:46:54Z",
"updated_at": "2021-11-09T18:16:32Z",
"pushed_at": "2021-09-11T09:50:26Z",
"stargazers_count": 1293,
"watchers_count": 1293,
"stargazers_count": 1294,
"watchers_count": 1294,
"forks_count": 417,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 417,
"watchers": 1293,
"watchers": 1294,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2021-10-16T16:17:44Z",
"updated_at": "2021-11-08T09:48:11Z",
"updated_at": "2021-11-09T22:11:59Z",
"pushed_at": "2021-10-24T21:01:29Z",
"stargazers_count": 315,
"watchers_count": 315,
"stargazers_count": 316,
"watchers_count": 316,
"forks_count": 71,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 71,
"watchers": 315,
"watchers": 316,
"score": 0
},
{

View file

@ -94,17 +94,24 @@
"description": "Checks your files for existence of Unicode BIDI characters which can be misused for supply chain attacks. See CVE-2021-42574 ",
"fork": false,
"created_at": "2021-11-06T22:12:35Z",
"updated_at": "2021-11-07T00:43:47Z",
"pushed_at": "2021-11-07T00:43:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2021-11-09T22:52:02Z",
"pushed_at": "2021-11-09T21:52:58Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"topics": [
"cve-2021-42574",
"docker",
"rust",
"security",
"supply-chain-attacks",
"unicode-characters"
],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -788,6 +788,7 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability due to
- [testanull/Project_CVE-2021-21985_PoC](https://github.com/testanull/Project_CVE-2021-21985_PoC)
- [haiclover/CVE-2021-21985](https://github.com/haiclover/CVE-2021-21985)
- [aristosMiliaressis/CVE-2021-21985](https://github.com/aristosMiliaressis/CVE-2021-21985)
- [sknux/CVE-2021-21985_PoC](https://github.com/sknux/CVE-2021-21985_PoC)
### CVE-2021-22005 (2021-09-23)
@ -890,6 +891,7 @@ An issue has been discovered in GitLab CE/EE affecting all versions starting fro
- [hh-hunter/cve-2021-22205](https://github.com/hh-hunter/cve-2021-22205)
- [X1pe0/Automated-Gitlab-RCE](https://github.com/X1pe0/Automated-Gitlab-RCE)
- [runsel/GitLab-CVE-2021-22205-](https://github.com/runsel/GitLab-CVE-2021-22205-)
- [faisalfs10x/GitLab-CVE-2021-22205-scanner](https://github.com/faisalfs10x/GitLab-CVE-2021-22205-scanner)
### CVE-2021-22214 (2021-06-08)