Auto Update 2021/08/15 06:11:51

This commit is contained in:
motikan2010-bot 2021-08-15 06:11:51 +09:00
parent 33f17267ce
commit 6453715750
17 changed files with 132 additions and 47 deletions

View file

@ -13,13 +13,13 @@
"description": "CVE-2007-2447 - Samba usermap script",
"fork": false,
"created_at": "2018-08-03T18:39:56Z",
"updated_at": "2021-08-07T23:47:34Z",
"updated_at": "2021-08-14T20:31:07Z",
"pushed_at": "2020-08-16T18:54:38Z",
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 18,
"forks": 18,
"watchers": 25,
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 19,
"forks": 19,
"watchers": 27,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
"fork": false,
"created_at": "2018-01-04T04:32:26Z",
"updated_at": "2021-08-08T16:42:53Z",
"updated_at": "2021-08-14T20:25:58Z",
"pushed_at": "2019-11-19T03:36:46Z",
"stargazers_count": 546,
"watchers_count": 546,
"stargazers_count": 545,
"watchers_count": 545,
"forks_count": 93,
"forks": 93,
"watchers": 546,
"watchers": 545,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
"fork": false,
"created_at": "2018-01-04T04:32:26Z",
"updated_at": "2021-08-08T16:42:53Z",
"updated_at": "2021-08-14T20:25:58Z",
"pushed_at": "2019-11-19T03:36:46Z",
"stargazers_count": 546,
"watchers_count": 546,
"stargazers_count": 545,
"watchers_count": 545,
"forks_count": 93,
"forks": 93,
"watchers": 546,
"watchers": 545,
"score": 0
}
]

View file

@ -151,7 +151,7 @@
"description": "Bludit 3.9.2 - Remote command execution - CVE-2019-16113",
"fork": false,
"created_at": "2020-10-03T21:38:39Z",
"updated_at": "2021-08-11T17:26:15Z",
"updated_at": "2021-08-14T18:37:33Z",
"pushed_at": "2020-10-12T19:01:20Z",
"stargazers_count": 1,
"watchers_count": 1,

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-02-19T08:48:02Z",
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 13,
"forks": 13,
"forks_count": 14,
"forks": 14,
"watchers": 24,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "Python script to exploit CVE-2020-14321 - Moodle 3.9 - Course enrollments allowed privilege escalation from teacher role into manager role to RCE.",
"fork": false,
"created_at": "2021-04-28T19:46:55Z",
"updated_at": "2021-07-28T11:10:20Z",
"updated_at": "2021-08-14T18:43:13Z",
"pushed_at": "2021-07-07T04:44:06Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 2,
"forks": 2,
"watchers": 8,
"watchers": 9,
"score": 0
}
]

View file

@ -619,5 +619,28 @@
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 396080591,
"name": "ghostcat",
"full_name": "jptr218\/ghostcat",
"owner": {
"login": "jptr218",
"id": 84092766,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84092766?v=4",
"html_url": "https:\/\/github.com\/jptr218"
},
"html_url": "https:\/\/github.com\/jptr218\/ghostcat",
"description": "An implementation of CVE-2020-1938",
"fork": false,
"created_at": "2021-08-14T17:32:51Z",
"updated_at": "2021-08-14T18:21:04Z",
"pushed_at": "2021-08-14T18:21:02Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞一键注册蚁剑filter内存shell",
"fork": false,
"created_at": "2020-08-19T03:34:06Z",
"updated_at": "2021-08-09T08:29:08Z",
"updated_at": "2021-08-14T18:48:50Z",
"pushed_at": "2020-08-25T03:17:32Z",
"stargazers_count": 268,
"watchers_count": 268,
"stargazers_count": 269,
"watchers_count": 269,
"forks_count": 41,
"forks": 41,
"watchers": 268,
"watchers": 269,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-3435 ",
"fork": false,
"created_at": "2020-09-25T20:53:48Z",
"updated_at": "2021-08-14T12:06:38Z",
"updated_at": "2021-08-14T19:37:49Z",
"pushed_at": "2020-09-25T20:55:17Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 8,
"forks": 8,
"watchers": 13,
"watchers": 14,
"score": 0
}
]

View file

@ -519,13 +519,13 @@
"description": "CVE-2021-1675 (PrintNightmare)",
"fork": false,
"created_at": "2021-07-05T14:17:03Z",
"updated_at": "2021-08-14T13:55:19Z",
"updated_at": "2021-08-14T20:23:13Z",
"pushed_at": "2021-07-05T14:34:34Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 16,
"forks": 16,
"watchers": 48,
"watchers": 49,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2021-02-24T09:56:21Z",
"updated_at": "2021-08-03T02:47:26Z",
"updated_at": "2021-08-14T21:10:39Z",
"pushed_at": "2021-03-01T02:10:44Z",
"stargazers_count": 102,
"watchers_count": 102,
"stargazers_count": 103,
"watchers_count": 103,
"forks_count": 59,
"forks": 59,
"watchers": 102,
"watchers": 103,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Malicious Payloads that abuses Win32k Elevation of Privilege Vulnerability (CVE-2021-28310)",
"fork": false,
"created_at": "2021-04-14T06:36:40Z",
"updated_at": "2021-08-05T07:04:35Z",
"updated_at": "2021-08-14T20:55:05Z",
"pushed_at": "2021-04-14T07:16:45Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 3,
"forks": 3,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2021-06-24T18:50:17Z",
"updated_at": "2021-08-13T17:53:44Z",
"updated_at": "2021-08-14T17:32:04Z",
"pushed_at": "2021-07-29T17:54:10Z",
"stargazers_count": 131,
"watchers_count": 131,
"stargazers_count": 132,
"watchers_count": 132,
"forks_count": 35,
"forks": 35,
"watchers": 131,
"watchers": 132,
"score": 0
}
]

View file

@ -385,8 +385,8 @@
"pushed_at": "2021-08-06T10:23:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},

25
2021/CVE-2021-36949.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 396130351,
"name": "Check-AAD-Connect-for-CVE-2021-36949-vulnerability",
"full_name": "Maxwitat\/Check-AAD-Connect-for-CVE-2021-36949-vulnerability",
"owner": {
"login": "Maxwitat",
"id": 18595261,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18595261?v=4",
"html_url": "https:\/\/github.com\/Maxwitat"
},
"html_url": "https:\/\/github.com\/Maxwitat\/Check-AAD-Connect-for-CVE-2021-36949-vulnerability",
"description": "check if Azure AD Connect is affected by the vulnerability described in CVE-2021-36949",
"fork": false,
"created_at": "2021-08-14T21:05:30Z",
"updated_at": "2021-08-14T21:14:07Z",
"pushed_at": "2021-08-14T21:14:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

25
2021/CVE-2021-38699.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 396128386,
"name": "CVE-2021-38699",
"full_name": "Justin-1993\/CVE-2021-38699",
"owner": {
"login": "Justin-1993",
"id": 76507754,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76507754?v=4",
"html_url": "https:\/\/github.com\/Justin-1993"
},
"html_url": "https:\/\/github.com\/Justin-1993\/CVE-2021-38699",
"description": "TastyIgniter 3.0.7 allows XSS via the name field during user-account creation",
"fork": false,
"created_at": "2021-08-14T20:57:00Z",
"updated_at": "2021-08-14T21:01:48Z",
"pushed_at": "2021-08-14T21:01:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1834,6 +1834,14 @@ Windows Elevation of Privilege Vulnerability
- [OlivierLaflamme/CVE-2021-36934_export_shadow_volume](https://github.com/OlivierLaflamme/CVE-2021-36934_export_shadow_volume)
- [chron1k/oxide_hive](https://github.com/chron1k/oxide_hive)
### CVE-2021-36949 (2021-08-12)
<code>
Microsoft Azure Active Directory Connect Authentication Bypass Vulnerability
</code>
- [Maxwitat/Check-AAD-Connect-for-CVE-2021-36949-vulnerability](https://github.com/Maxwitat/Check-AAD-Connect-for-CVE-2021-36949-vulnerability)
### CVE-2021-37152 (2021-08-10)
<code>
@ -1912,6 +1920,9 @@ openBaraza HCM 3.1.6 does not properly neutralize user-controllable input: an un
- [charlesbickel/CVE-2021-38619](https://github.com/charlesbickel/CVE-2021-38619)
### CVE-2021-38699
- [Justin-1993/CVE-2021-38699](https://github.com/Justin-1993/CVE-2021-38699)
### CVE-2021-123456
- [zoukba0014/cve-2021-123456](https://github.com/zoukba0014/cve-2021-123456)
@ -2596,6 +2607,7 @@ When using the Apache JServ Protocol (AJP), care must be taken when trusting inc
- [Hancheng-Lei/Hacking-Vulnerability-CVE-2020-1938-Ghostcat](https://github.com/Hancheng-Lei/Hacking-Vulnerability-CVE-2020-1938-Ghostcat)
- [streghstreek/CVE-2020-1938](https://github.com/streghstreek/CVE-2020-1938)
- [Neko2sh1ro/CVE-2020-1938](https://github.com/Neko2sh1ro/CVE-2020-1938)
- [jptr218/ghostcat](https://github.com/jptr218/ghostcat)
### CVE-2020-1947 (2020-03-11)