Auto Update 2021/11/03 18:15:12

This commit is contained in:
motikan2010-bot 2021-11-04 03:15:12 +09:00
parent cf3f24ca38
commit 63c345c9ac
38 changed files with 356 additions and 134 deletions

View file

@ -13,17 +13,17 @@
"description": "Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)",
"fork": false,
"created_at": "2016-02-08T08:29:11Z",
"updated_at": "2021-03-08T02:16:41Z",
"updated_at": "2021-11-03T14:29:20Z",
"pushed_at": "2016-04-14T15:53:28Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 36,
"watchers": 37,
"score": 0
},
{

View file

@ -270,5 +270,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 424265185,
"name": "CVE-2015-1635",
"full_name": "nksf7\/CVE-2015-1635",
"owner": {
"login": "nksf7",
"id": 91738909,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91738909?v=4",
"html_url": "https:\/\/github.com\/nksf7"
},
"html_url": "https:\/\/github.com\/nksf7\/CVE-2015-1635",
"description": "PoC for CVE-2015-1635 \/ MS15-034 - HTTP.sys Allows Remote Code Execution \/ Check & DOS",
"fork": false,
"created_at": "2021-11-03T14:50:55Z",
"updated_at": "2021-11-03T15:06:43Z",
"pushed_at": "2021-11-03T15:06:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,8 +13,8 @@
"description": "✨ HAProxy ve Keepalived konusunu load balancer ve cluster'a ek olarak güvenlik(zayıf SSL\/Kripto Kullanımı (LOGJAM) (CVE-2015-4000) zafiyeti önlemi) ve yüksek yüklere karşı ele alır.",
"fork": false,
"created_at": "2021-04-24T12:51:27Z",
"updated_at": "2021-10-16T18:33:12Z",
"pushed_at": "2021-10-16T18:33:09Z",
"updated_at": "2021-11-03T16:02:25Z",
"pushed_at": "2021-11-03T16:02:22Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,

View file

@ -17,12 +17,12 @@
"pushed_at": "2017-01-16T18:13:15Z",
"stargazers_count": 63,
"watchers_count": 63,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 13,
"forks": 14,
"watchers": 63,
"score": 0
}

View file

@ -137,11 +137,11 @@
"description": "OpenSSH < 7.7 User Enumeration CVE-2018-15473 Exploit",
"fork": false,
"created_at": "2018-10-08T20:59:04Z",
"updated_at": "2021-04-06T19:17:07Z",
"updated_at": "2021-11-03T14:57:06Z",
"pushed_at": "2021-04-06T19:17:05Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [
@ -152,8 +152,8 @@
"vulnerability"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{

View file

@ -237,8 +237,8 @@
"description": "Fuel CMS 1.4.1 - Remote Code Execution",
"fork": false,
"created_at": "2021-11-03T04:38:54Z",
"updated_at": "2021-11-03T06:15:17Z",
"pushed_at": "2021-11-03T06:15:15Z",
"updated_at": "2021-11-03T16:12:05Z",
"pushed_at": "2021-11-03T16:12:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -44,12 +44,12 @@
"pushed_at": "2018-11-13T00:26:18Z",
"stargazers_count": 230,
"watchers_count": 230,
"forks_count": 43,
"forks_count": 44,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 43,
"forks": 44,
"watchers": 230,
"score": 0
}

View file

@ -40,10 +40,10 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2021-10-28T13:43:46Z",
"updated_at": "2021-11-03T12:15:52Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 467,
"watchers_count": 467,
"stargazers_count": 468,
"watchers_count": 468,
"forks_count": 111,
"allow_forking": true,
"is_template": false,
@ -63,7 +63,7 @@
],
"visibility": "public",
"forks": 111,
"watchers": 467,
"watchers": 468,
"score": 0
}
]

View file

@ -74,10 +74,10 @@
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
"fork": false,
"created_at": "2018-04-12T22:53:14Z",
"updated_at": "2021-11-03T11:13:17Z",
"updated_at": "2021-11-03T16:00:03Z",
"pushed_at": "2021-01-08T10:31:22Z",
"stargazers_count": 505,
"watchers_count": 505,
"stargazers_count": 506,
"watchers_count": 506,
"forks_count": 170,
"allow_forking": true,
"is_template": false,
@ -94,7 +94,7 @@
],
"visibility": "public",
"forks": 170,
"watchers": 505,
"watchers": 506,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-06-12T15:07:59Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 3,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"forks": 2,
"watchers": 6,
"score": 0
}

View file

@ -40,10 +40,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-11-03T08:29:37Z",
"updated_at": "2021-11-03T13:16:22Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2955,
"watchers_count": 2955,
"stargazers_count": 2956,
"watchers_count": 2956,
"forks_count": 871,
"allow_forking": true,
"is_template": false,
@ -70,7 +70,7 @@
],
"visibility": "public",
"forks": 871,
"watchers": 2955,
"watchers": 2956,
"score": 0
},
{

View file

@ -160,5 +160,32 @@
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 424285995,
"name": "poc-for-cve-2020-0022",
"full_name": "devdanqtuan\/poc-for-cve-2020-0022",
"owner": {
"login": "devdanqtuan",
"id": 88175750,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88175750?v=4",
"html_url": "https:\/\/github.com\/devdanqtuan"
},
"html_url": "https:\/\/github.com\/devdanqtuan\/poc-for-cve-2020-0022",
"description": "cve-2020-0022",
"fork": false,
"created_at": "2021-11-03T15:48:53Z",
"updated_at": "2021-11-03T15:50:17Z",
"pushed_at": "2021-11-03T15:50:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -69,17 +69,17 @@
"description": "cve-2020-0688",
"fork": false,
"created_at": "2020-02-27T02:54:27Z",
"updated_at": "2021-10-31T03:02:30Z",
"updated_at": "2021-11-03T14:34:57Z",
"pushed_at": "2020-06-19T09:28:15Z",
"stargazers_count": 278,
"watchers_count": 278,
"stargazers_count": 279,
"watchers_count": 279,
"forks_count": 93,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 93,
"watchers": 278,
"watchers": 279,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-11-03T08:29:37Z",
"updated_at": "2021-11-03T13:16:22Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2955,
"watchers_count": 2955,
"stargazers_count": 2956,
"watchers_count": 2956,
"forks_count": 871,
"allow_forking": true,
"is_template": false,
@ -43,7 +43,7 @@
],
"visibility": "public",
"forks": 871,
"watchers": 2955,
"watchers": 2956,
"score": 0
},
{

View file

@ -95,7 +95,7 @@
"fork": false,
"created_at": "2020-07-14T02:42:41Z",
"updated_at": "2021-10-07T23:36:52Z",
"pushed_at": "2021-09-08T20:31:12Z",
"pushed_at": "2021-11-03T17:37:09Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 5,

View file

@ -17,7 +17,7 @@
"pushed_at": "2020-12-06T08:23:02Z",
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 11,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [
@ -28,7 +28,7 @@
"security-vulnerability"
],
"visibility": "public",
"forks": 11,
"forks": 10,
"watchers": 40,
"score": 0
}

View file

@ -67,17 +67,17 @@
"description": null,
"fork": false,
"created_at": "2020-07-21T01:22:45Z",
"updated_at": "2021-07-05T05:00:12Z",
"updated_at": "2021-11-03T15:18:29Z",
"pushed_at": "2020-07-21T20:29:53Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 21,
"watchers": 22,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2021-11-03T05:07:32Z",
"updated_at": "2021-11-03T12:16:58Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1441,
"watchers_count": 1441,
"stargazers_count": 1442,
"watchers_count": 1442,
"forks_count": 529,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 529,
"watchers": 1441,
"watchers": 1442,
"score": 0
},
{
@ -274,17 +274,17 @@
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
"fork": false,
"created_at": "2021-07-01T23:45:58Z",
"updated_at": "2021-11-02T18:19:29Z",
"updated_at": "2021-11-03T16:14:37Z",
"pushed_at": "2021-07-05T08:54:06Z",
"stargazers_count": 675,
"watchers_count": 675,
"stargazers_count": 676,
"watchers_count": 676,
"forks_count": 181,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 181,
"watchers": 675,
"watchers": 676,
"score": 0
},
{

View file

@ -40,8 +40,8 @@
"description": "XMLRPC - RCE in MovableTypePoC",
"fork": false,
"created_at": "2021-10-30T09:15:56Z",
"updated_at": "2021-11-02T18:53:38Z",
"pushed_at": "2021-11-02T18:53:36Z",
"updated_at": "2021-11-03T17:07:38Z",
"pushed_at": "2021-11-03T17:07:35Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 6,

View file

@ -13,10 +13,10 @@
"description": "Python exploit for the CVE-2021-22204 vulnerability in Exiftool",
"fork": false,
"created_at": "2021-05-11T18:45:07Z",
"updated_at": "2021-11-02T08:49:19Z",
"updated_at": "2021-11-03T13:07:02Z",
"pushed_at": "2021-05-20T21:42:43Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
@ -26,7 +26,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 18,
"watchers": 19,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-06-05T15:42:16Z",
"updated_at": "2021-11-03T09:55:51Z",
"updated_at": "2021-11-03T14:50:45Z",
"pushed_at": "2021-11-02T14:45:24Z",
"stargazers_count": 143,
"watchers_count": 143,
"stargazers_count": 144,
"watchers_count": 144,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 143,
"watchers": 144,
"score": 0
},
{
@ -67,17 +67,17 @@
"description": "CVE-2021-22205 Unauthorized RCE",
"fork": false,
"created_at": "2021-10-28T14:02:51Z",
"updated_at": "2021-11-02T08:47:29Z",
"updated_at": "2021-11-03T14:51:31Z",
"pushed_at": "2021-10-28T14:20:05Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 44,
"watchers": 45,
"score": 0
},
{
@ -121,19 +121,19 @@
"description": "CVE-2021-22205& GitLab CE\/EE RCE",
"fork": false,
"created_at": "2021-10-29T04:30:45Z",
"updated_at": "2021-11-03T12:05:03Z",
"updated_at": "2021-11-03T17:09:26Z",
"pushed_at": "2021-10-29T04:31:15Z",
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 15,
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-22205"
],
"visibility": "public",
"forks": 15,
"watchers": 31,
"forks": 16,
"watchers": 34,
"score": 0
},
{
@ -231,10 +231,10 @@
"description": "CVE-2021-22205未授权漏洞批量检测与利用工具",
"fork": false,
"created_at": "2021-10-31T04:15:30Z",
"updated_at": "2021-11-03T01:45:16Z",
"updated_at": "2021-11-03T14:56:02Z",
"pushed_at": "2021-11-02T17:22:57Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
@ -243,7 +243,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 5,
"watchers": 6,
"score": 0
},
{
@ -314,17 +314,17 @@
"description": "CVE-2021-22205-getshell",
"fork": false,
"created_at": "2021-11-01T06:06:04Z",
"updated_at": "2021-11-02T15:36:59Z",
"updated_at": "2021-11-03T15:30:34Z",
"pushed_at": "2021-11-01T07:30:16Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -94,17 +94,17 @@
"description": "F5 BIG-IP\/BIG-IQ iControl Rest API SSRF to RCE",
"fork": false,
"created_at": "2021-03-21T04:58:17Z",
"updated_at": "2021-09-13T21:26:38Z",
"updated_at": "2021-11-03T13:24:11Z",
"pushed_at": "2021-03-24T11:49:37Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 13,
"watchers": 14,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-09-16T08:27:30Z",
"updated_at": "2021-10-24T05:52:34Z",
"updated_at": "2021-11-03T13:13:53Z",
"pushed_at": "2021-09-16T08:49:16Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 9,
"watchers": 10,
"score": 0
}
]

View file

@ -67,17 +67,17 @@
"description": null,
"fork": false,
"created_at": "2021-08-31T23:33:44Z",
"updated_at": "2021-11-03T11:18:04Z",
"updated_at": "2021-11-03T17:44:06Z",
"pushed_at": "2021-09-01T01:01:06Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 50,
"watchers": 51,
"score": 0
},
{
@ -958,17 +958,17 @@
"description": "CVE-2021-26084Atlassian Confluence OGNL注入漏洞",
"fork": false,
"created_at": "2021-10-26T06:01:38Z",
"updated_at": "2021-10-30T22:26:07Z",
"updated_at": "2021-11-03T17:08:48Z",
"pushed_at": "2021-10-27T02:30:40Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

29
2021/CVE-2021-26294.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 424258180,
"name": "CVE-2021-26294",
"full_name": "dorkerdevil\/CVE-2021-26294",
"owner": {
"login": "dorkerdevil",
"id": 15796745,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15796745?v=4",
"html_url": "https:\/\/github.com\/dorkerdevil"
},
"html_url": "https:\/\/github.com\/dorkerdevil\/CVE-2021-26294",
"description": "Directory Traversal in Afterlogic webmail aurora and pro",
"fork": false,
"created_at": "2021-11-03T14:32:13Z",
"updated_at": "2021-11-03T16:24:38Z",
"pushed_at": "2021-11-03T14:35:59Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0
}
]

29
2021/CVE-2021-29156.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 424232146,
"name": "CVE-2021-29156",
"full_name": "guidepointsecurity\/CVE-2021-29156",
"owner": {
"login": "guidepointsecurity",
"id": 9867431,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9867431?v=4",
"html_url": "https:\/\/github.com\/guidepointsecurity"
},
"html_url": "https:\/\/github.com\/guidepointsecurity\/CVE-2021-29156",
"description": "Proof-of-Concept tool for CVE-2021-29156, an LDAP injection vulnerability in ForgeRock OpenAM v13.0.0.",
"fork": false,
"created_at": "2021-11-03T13:21:50Z",
"updated_at": "2021-11-03T15:27:18Z",
"pushed_at": "2021-11-03T15:18:36Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
}
]

View file

@ -179,17 +179,17 @@
"description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)",
"fork": false,
"created_at": "2021-02-18T05:42:13Z",
"updated_at": "2021-11-03T06:05:06Z",
"updated_at": "2021-11-03T17:51:45Z",
"pushed_at": "2021-09-09T01:09:31Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 54,
"watchers_count": 54,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 53,
"watchers": 54,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "SolarWinds Orion Platform ActionPluginBaseView 反序列化RCE",
"fork": false,
"created_at": "2021-10-23T01:35:42Z",
"updated_at": "2021-11-02T14:53:37Z",
"updated_at": "2021-11-03T15:38:19Z",
"pushed_at": "2021-10-23T01:44:54Z",
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 8,
"stargazers_count": 44,
"watchers_count": 44,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 43,
"forks": 9,
"watchers": 44,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Apache Druid 任意文件读取",
"fork": false,
"created_at": "2021-10-14T03:47:02Z",
"updated_at": "2021-10-18T15:27:59Z",
"updated_at": "2021-11-03T17:07:34Z",
"pushed_at": "2021-10-15T02:31:03Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 10,
"watchers": 11,
"score": 0
},
{

View file

@ -229,17 +229,17 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2021-11-02T15:41:42Z",
"updated_at": "2021-11-03T13:41:38Z",
"pushed_at": "2021-09-11T09:50:26Z",
"stargazers_count": 1286,
"watchers_count": 1286,
"stargazers_count": 1287,
"watchers_count": 1287,
"forks_count": 416,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 416,
"watchers": 1286,
"watchers": 1287,
"score": 0
},
{

View file

@ -67,10 +67,10 @@
"description": "My exploit for CVE-2021-40449, a Windows LPE via a UAF in win32kfull!GreResetDCInternal.",
"fork": false,
"created_at": "2021-10-25T04:58:49Z",
"updated_at": "2021-10-31T10:07:26Z",
"updated_at": "2021-11-03T14:44:03Z",
"pushed_at": "2021-10-25T06:32:34Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
@ -79,7 +79,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 17,
"watchers": 18,
"score": 0
}
]

View file

@ -779,10 +779,10 @@
"description": "A framework for bug hunting or pentesting targeting websites that have CVE-2021-41773 Vulnerability in public ",
"fork": false,
"created_at": "2021-10-07T01:31:13Z",
"updated_at": "2021-11-02T17:39:57Z",
"updated_at": "2021-11-03T12:56:38Z",
"pushed_at": "2021-10-07T08:25:26Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
@ -795,7 +795,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 27,
"watchers": 28,
"score": 0
},
{

View file

@ -190,5 +190,32 @@
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 424321579,
"name": "CVE-2021-42013",
"full_name": "robotsense1337\/CVE-2021-42013",
"owner": {
"login": "robotsense1337",
"id": 84665951,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84665951?v=4",
"html_url": "https:\/\/github.com\/robotsense1337"
},
"html_url": "https:\/\/github.com\/robotsense1337\/CVE-2021-42013",
"description": "Exploit Apache 2.4.50(CVE-2021-42013)",
"fork": false,
"created_at": "2021-11-03T17:33:52Z",
"updated_at": "2021-11-03T17:41:44Z",
"pushed_at": "2021-11-03T17:41:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,8 +13,8 @@
"description": "WIP kernel exploit for minor bug i found in amd gpu driver",
"fork": false,
"created_at": "2021-10-28T21:10:29Z",
"updated_at": "2021-11-03T03:33:43Z",
"pushed_at": "2021-11-03T03:33:40Z",
"updated_at": "2021-11-03T15:48:10Z",
"pushed_at": "2021-11-03T15:48:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,17 +13,17 @@
"description": "Generate malicious files using recently published homoglyphic-attack (CVE-2021-42694)",
"fork": false,
"created_at": "2021-11-02T20:39:47Z",
"updated_at": "2021-11-03T08:18:42Z",
"updated_at": "2021-11-03T17:09:24Z",
"pushed_at": "2021-11-02T20:40:17Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 3,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 5,
"forks": 4,
"watchers": 6,
"score": 0
}
]

29
2021/CVE-2021-43140.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 424323213,
"name": "CVE-2021-43140",
"full_name": "Dir0x\/CVE-2021-43140",
"owner": {
"login": "Dir0x",
"id": 22798238,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22798238?v=4",
"html_url": "https:\/\/github.com\/Dir0x"
},
"html_url": "https:\/\/github.com\/Dir0x\/CVE-2021-43140",
"description": "SQL injection vulnerability in login exists in Sourcecodester Simple Subscription Website.",
"fork": false,
"created_at": "2021-11-03T17:39:22Z",
"updated_at": "2021-11-03T17:49:30Z",
"pushed_at": "2021-11-03T17:49:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

29
2021/CVE-2021-43141.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 424326828,
"name": "CVE-2021-43141",
"full_name": "Dir0x\/CVE-2021-43141",
"owner": {
"login": "Dir0x",
"id": 22798238,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22798238?v=4",
"html_url": "https:\/\/github.com\/Dir0x"
},
"html_url": "https:\/\/github.com\/Dir0x\/CVE-2021-43141",
"description": "Information about CVE-2021-43141, a reflected XSS in the plan_application section.",
"fork": false,
"created_at": "2021-11-03T17:51:29Z",
"updated_at": "2021-11-03T17:57:33Z",
"pushed_at": "2021-11-03T17:57:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1236,6 +1236,14 @@ Smarty before 3.1.39 allows a Sandbox Escape because $smarty.template_object can
### CVE-2021-26121
- [sourceincite/CVE-2021-26121](https://github.com/sourceincite/CVE-2021-26121)
### CVE-2021-26294 (2021-03-06)
<code>
An issue was discovered in AfterLogic Aurora through 7.7.9 and WebMail Pro through 7.7.9. They allow directory traversal to read files (such as a data/settings/settings.xml file containing admin panel credentials), as demonstrated by dav/server.php/files/personal/%2e%2e when using the caldav_public_user account (with caldav_public_user as its password).
</code>
- [dorkerdevil/CVE-2021-26294](https://github.com/dorkerdevil/CVE-2021-26294)
### CVE-2021-26295 (2021-03-22)
<code>
@ -1462,7 +1470,7 @@ The Sovremennye Delovye Tekhnologii FX Aggregator terminal client 1 allows attac
### CVE-2021-27190 (2021-02-11)
<code>
A Stored Cross Site Scripting(XSS) Vulnerability was discovered in PEEL SHOPPING 9.3.0 which is publicly available. The user supplied input containing polyglot payload is echoed back in javascript code in HTML response. This allows an attacker to input malicious JavaScript which can steal cookie, redirect them to other malicious website, etc.
A Stored Cross Site Scripting(XSS) Vulnerability was discovered in PEEL SHOPPING 9.3.0 and 9.4.0, which are publicly available. The user supplied input containing polyglot payload is echoed back in javascript code in HTML response. This allows an attacker to input malicious JavaScript which can steal cookie, redirect them to other malicious website, etc.
</code>
- [anmolksachan/CVE-2021-27190-PEEL-Shopping-cart-9.3.0-Stored-XSS](https://github.com/anmolksachan/CVE-2021-27190-PEEL-Shopping-cart-9.3.0-Stored-XSS)
@ -1678,6 +1686,14 @@ An issue was discovered in the Linux kernel through 5.11.x. kernel/bpf/verifier.
- [Kakashiiiiy/CVE-2021-29155](https://github.com/Kakashiiiiy/CVE-2021-29155)
### CVE-2021-29156 (2021-03-25)
<code>
ForgeRock OpenAM before 13.5.1 allows LDAP injection via the Webfinger protocol. For example, an unauthenticated attacker can perform character-by-character retrieval of password hashes, or retrieve a session token or a private key.
</code>
- [guidepointsecurity/CVE-2021-29156](https://github.com/guidepointsecurity/CVE-2021-29156)
### CVE-2021-29200 (2021-04-27)
<code>
@ -3079,6 +3095,7 @@ It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was in
- [TheLastVvV/CVE-2021-42013](https://github.com/TheLastVvV/CVE-2021-42013)
- [TheLastVvV/CVE-2021-42013_Reverse-Shell](https://github.com/TheLastVvV/CVE-2021-42013_Reverse-Shell)
- [walnutsecurity/cve-2021-42013](https://github.com/walnutsecurity/cve-2021-42013)
- [robotsense1337/CVE-2021-42013](https://github.com/robotsense1337/CVE-2021-42013)
### CVE-2021-42071 (2021-10-07)
@ -3133,6 +3150,12 @@ An issue was discovered in the character definitions of the Unicode Specificatio
### CVE-2021-43032
- [SakuraSamuraii/CVE-2021-43032](https://github.com/SakuraSamuraii/CVE-2021-43032)
### CVE-2021-43140
- [Dir0x/CVE-2021-43140](https://github.com/Dir0x/CVE-2021-43140)
### CVE-2021-43141
- [Dir0x/CVE-2021-43141](https://github.com/Dir0x/CVE-2021-43141)
## 2020
### CVE-2020-0001 (2020-01-08)
@ -3163,6 +3186,7 @@ In reassemble_and_dispatch of packet_fragmenter.cc, there is possible out of bou
- [Polo35/CVE-2020-0022](https://github.com/Polo35/CVE-2020-0022)
- [5k1l/cve-2020-0022](https://github.com/5k1l/cve-2020-0022)
- [lsw29475/CVE-2020-0022](https://github.com/lsw29475/CVE-2020-0022)
- [devdanqtuan/poc-for-cve-2020-0022](https://github.com/devdanqtuan/poc-for-cve-2020-0022)
### CVE-2020-0041 (2020-03-10)
@ -18562,6 +18586,7 @@ HTTP.sys in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Wind
- [limkokholefork/CVE-2015-1635](https://github.com/limkokholefork/CVE-2015-1635)
- [1nf1n17yk1ng/CVE-2015-1635-POC](https://github.com/1nf1n17yk1ng/CVE-2015-1635-POC)
- [1nf1n17yk1ng/CVE-2015-1635](https://github.com/1nf1n17yk1ng/CVE-2015-1635)
- [nksf7/CVE-2015-1635](https://github.com/nksf7/CVE-2015-1635)
### CVE-2015-1641 (2015-04-14)