Auto Update 2021/11/14 06:12:52

This commit is contained in:
motikan2010-bot 2021-11-14 15:12:52 +09:00
parent 6f37cd929e
commit 6fe8a5a2d6
14 changed files with 82 additions and 54 deletions

View file

@ -17,7 +17,7 @@
"pushed_at": "2021-03-14T09:25:10Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [
@ -27,7 +27,7 @@
"pentesting"
],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 2,
"score": 0
}

View file

@ -40,17 +40,17 @@
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
"fork": false,
"created_at": "2016-06-30T11:56:44Z",
"updated_at": "2021-11-01T10:27:27Z",
"updated_at": "2021-11-14T01:12:56Z",
"pushed_at": "2016-06-30T15:32:42Z",
"stargazers_count": 305,
"watchers_count": 305,
"forks_count": 96,
"stargazers_count": 306,
"watchers_count": 306,
"forks_count": 97,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 96,
"watchers": 305,
"forks": 97,
"watchers": 306,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
"fork": false,
"created_at": "2016-06-30T11:56:44Z",
"updated_at": "2021-11-01T10:27:27Z",
"updated_at": "2021-11-14T01:12:56Z",
"pushed_at": "2016-06-30T15:32:42Z",
"stargazers_count": 305,
"watchers_count": 305,
"forks_count": 96,
"stargazers_count": 306,
"watchers_count": 306,
"forks_count": 97,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 96,
"watchers": 305,
"forks": 97,
"watchers": 306,
"score": 0
}
]

View file

@ -13,11 +13,11 @@
"description": "Safari XSS (CVE-2017-7038) https:\/\/support.apple.com\/en-us\/HT207923",
"fork": false,
"created_at": "2017-12-06T15:31:08Z",
"updated_at": "2021-04-16T05:25:36Z",
"updated_at": "2021-11-14T00:38:34Z",
"pushed_at": "2017-12-06T15:41:28Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 3,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [
@ -29,8 +29,8 @@
"xss"
],
"visibility": "public",
"forks": 3,
"watchers": 2,
"forks": 4,
"watchers": 3,
"score": 0
}
]

View file

@ -17,12 +17,12 @@
"pushed_at": "2019-07-18T10:03:28Z",
"stargazers_count": 91,
"watchers_count": 91,
"forks_count": 18,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 18,
"forks": 19,
"watchers": 91,
"score": 0
},

View file

@ -13,11 +13,11 @@
"description": "CVE-2019-19033 description and scripts to check the vulnerability in Jalios JCMS 10 (Authentication Bypass)",
"fork": false,
"created_at": "2019-11-17T19:32:10Z",
"updated_at": "2021-11-01T09:12:01Z",
"updated_at": "2021-11-14T00:45:55Z",
"pushed_at": "2019-12-03T19:22:32Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [
@ -28,8 +28,8 @@
"webdav"
],
"visibility": "public",
"forks": 1,
"watchers": 3,
"forks": 2,
"watchers": 4,
"score": 0
}
]

View file

@ -121,10 +121,10 @@
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
"fork": false,
"created_at": "2020-09-14T16:57:49Z",
"updated_at": "2021-11-08T08:38:20Z",
"updated_at": "2021-11-14T02:27:43Z",
"pushed_at": "2020-11-05T16:37:20Z",
"stargazers_count": 292,
"watchers_count": 292,
"stargazers_count": 293,
"watchers_count": 293,
"forks_count": 50,
"allow_forking": true,
"is_template": false,
@ -138,7 +138,7 @@
],
"visibility": "public",
"forks": 50,
"watchers": 292,
"watchers": 293,
"score": 0
},
{

View file

@ -573,17 +573,17 @@
"description": "CodeTest信息收集和漏洞利用工具可在进行渗透测试之时方便利用相关信息收集脚本进行信息的获取和验证工作漏洞利用模块可选择需要测试的漏洞模块或者选择所有模块测试包含CVE-2020-14882, CVE-2020-2555等可自己收集脚本后按照模板进行修改。",
"fork": false,
"created_at": "2020-12-30T01:55:52Z",
"updated_at": "2021-05-21T08:22:26Z",
"updated_at": "2021-11-14T02:41:21Z",
"pushed_at": "2020-12-29T10:47:39Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 1,
"watchers": 2,
"score": 0
},
{

View file

@ -13,11 +13,11 @@
"description": "Zoho ManageEngine ServiceDesk Plus MSP - Active Directory User Enumeration (CVE-2021-31159) - https:\/\/ricardojoserf.github.io\/CVE-2021-31159\/",
"fork": false,
"created_at": "2021-03-19T18:28:43Z",
"updated_at": "2021-11-01T09:13:23Z",
"updated_at": "2021-11-14T00:53:48Z",
"pushed_at": "2021-06-16T16:21:29Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [
@ -26,8 +26,8 @@
"servicedeskplus"
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"forks": 1,
"watchers": 4,
"score": 0
}
]

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-10-25T12:57:55Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 2,
"score": 0
}

View file

@ -13,17 +13,17 @@
"description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2021-10-16T16:17:44Z",
"updated_at": "2021-11-13T23:45:35Z",
"updated_at": "2021-11-14T05:33:05Z",
"pushed_at": "2021-11-11T17:09:56Z",
"stargazers_count": 325,
"watchers_count": 325,
"stargazers_count": 326,
"watchers_count": 326,
"forks_count": 73,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 73,
"watchers": 325,
"watchers": 326,
"score": 0
},
{

View file

@ -13,11 +13,11 @@
"description": "AlphaWeb XE, the embedded web server running on AlphaCom XE, has a vulnerability which allows to upload PHP files leading to RCE once the authentication is successful - https:\/\/ricardojoserf.github.io\/CVE-2021-40845\/",
"fork": false,
"created_at": "2021-09-10T10:23:55Z",
"updated_at": "2021-11-01T09:30:58Z",
"updated_at": "2021-11-14T00:42:16Z",
"pushed_at": "2021-09-11T20:20:37Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [
@ -27,8 +27,8 @@
"zenitel"
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"forks": 1,
"watchers": 3,
"score": 0
}
]

View file

@ -2011,5 +2011,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 427815832,
"name": "POC-CVE-2021-41773",
"full_name": "kubota\/POC-CVE-2021-41773",
"owner": {
"login": "kubota",
"id": 119277,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119277?v=4",
"html_url": "https:\/\/github.com\/kubota"
},
"html_url": "https:\/\/github.com\/kubota\/POC-CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-11-14T02:02:45Z",
"updated_at": "2021-11-14T03:04:26Z",
"pushed_at": "2021-11-14T03:04:24Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -3125,6 +3125,7 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
- [Hydragyrum/CVE-2021-41773-Playground](https://github.com/Hydragyrum/CVE-2021-41773-Playground)
- [IcmpOff/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit](https://github.com/IcmpOff/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit)
- [ahmad4fifz/docker-cve-2021-41773](https://github.com/ahmad4fifz/docker-cve-2021-41773)
- [kubota/POC-CVE-2021-41773](https://github.com/kubota/POC-CVE-2021-41773)
### CVE-2021-41822
- [badboycxcc/CVE-2021-41822](https://github.com/badboycxcc/CVE-2021-41822)