Auto Update 2021/10/02 00:13:21

This commit is contained in:
motikan2010-bot 2021-10-02 00:13:21 +09:00
parent d01d61bbdf
commit 7a4f8976ad
22 changed files with 244 additions and 83 deletions

View file

@ -689,9 +689,9 @@
"pushed_at": "2014-06-18T11:54:32Z",
"stargazers_count": 92,
"watchers_count": 92,
"forks_count": 21,
"forks_count": 22,
"allow_forking": true,
"forks": 21,
"forks": 22,
"watchers": 92,
"score": 0
},

View file

@ -61,7 +61,7 @@
"description": "Exploit written in Python for CVE-2018-15473 with threading and export formats",
"fork": false,
"created_at": "2018-08-21T00:09:56Z",
"updated_at": "2021-09-22T17:37:16Z",
"updated_at": "2021-10-01T13:11:22Z",
"pushed_at": "2021-09-26T09:31:53Z",
"stargazers_count": 469,
"watchers_count": 469,

View file

@ -1649,9 +1649,9 @@
"pushed_at": "2020-06-14T18:43:51Z",
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 17,
"forks_count": 16,
"allow_forking": true,
"forks": 17,
"forks": 16,
"watchers": 40,
"score": 0
},

View file

@ -373,8 +373,8 @@
"description": "Whatsapp remote code execution CVE-2019-11932 https:\/\/awakened1712.github.io\/hacking\/hacking-whatsapp-gif-rce\/",
"fork": false,
"created_at": "2021-03-19T16:41:31Z",
"updated_at": "2021-09-29T14:12:40Z",
"pushed_at": "2021-09-28T17:45:24Z",
"updated_at": "2021-10-01T10:53:55Z",
"pushed_at": "2021-10-01T10:53:53Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,

View file

@ -13,14 +13,14 @@
"description": "Page Cache Side Channel Attacks (CVE-2019-5489) proof of concept for Linux",
"fork": false,
"created_at": "2019-12-06T05:37:08Z",
"updated_at": "2021-07-11T21:20:54Z",
"updated_at": "2021-10-01T13:27:08Z",
"pushed_at": "2019-12-19T02:09:27Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 0,
"allow_forking": true,
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -13,14 +13,14 @@
"description": "Exploiting a patched vulnerability in JavaScriptCore",
"fork": false,
"created_at": "2020-01-02T00:12:22Z",
"updated_at": "2021-09-30T07:11:28Z",
"updated_at": "2021-10-01T14:13:32Z",
"pushed_at": "2020-01-02T00:13:22Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 2,
"allow_forking": true,
"forks": 2,
"watchers": 10,
"watchers": 9,
"score": 0
}
]

View file

@ -901,14 +901,14 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2021-09-29T07:39:55Z",
"updated_at": "2021-10-01T14:42:11Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1156,
"watchers_count": 1156,
"stargazers_count": 1157,
"watchers_count": 1157,
"forks_count": 360,
"allow_forking": true,
"forks": 360,
"watchers": 1156,
"watchers": 1157,
"score": 0
},
{

View file

@ -286,5 +286,29 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 412501071,
"name": "cve-2020-11651",
"full_name": "puckiestyle\/cve-2020-11651",
"owner": {
"login": "puckiestyle",
"id": 57447087,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
"html_url": "https:\/\/github.com\/puckiestyle"
},
"html_url": "https:\/\/github.com\/puckiestyle\/cve-2020-11651",
"description": null,
"fork": false,
"created_at": "2021-10-01T14:33:29Z",
"updated_at": "2021-10-01T14:33:42Z",
"pushed_at": "2021-10-01T14:33:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -133,14 +133,14 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2021-09-29T12:31:41Z",
"updated_at": "2021-10-01T10:13:40Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 368,
"watchers_count": 368,
"stargazers_count": 369,
"watchers_count": 369,
"forks_count": 112,
"allow_forking": true,
"forks": 112,
"watchers": 368,
"watchers": 369,
"score": 0
},
{

26
2020/CVE-2020-15436.json Normal file
View file

@ -0,0 +1,26 @@
[
{
"id": 412442727,
"name": "linux-4.1.15_CVE-2020-15436_withPatch",
"full_name": "artsking\/linux-4.1.15_CVE-2020-15436_withPatch",
"owner": {
"login": "artsking",
"id": 87514725,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87514725?v=4",
"html_url": "https:\/\/github.com\/artsking"
},
"html_url": "https:\/\/github.com\/artsking\/linux-4.1.15_CVE-2020-15436_withPatch",
"description": null,
"fork": false,
"created_at": "2021-10-01T11:37:52Z",
"updated_at": "2021-10-01T11:44:45Z",
"pushed_at": "2021-10-01T11:43:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -181,14 +181,14 @@
"description": null,
"fork": false,
"created_at": "2020-12-31T21:54:50Z",
"updated_at": "2021-09-21T21:49:52Z",
"updated_at": "2021-10-01T15:02:45Z",
"pushed_at": "2020-12-31T23:45:38Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 5,
"allow_forking": true,
"forks": 5,
"watchers": 6,
"watchers": 7,
"score": 0
},
{

View file

@ -61,14 +61,14 @@
"description": "CVE-2021-22005",
"fork": false,
"created_at": "2021-09-23T19:11:22Z",
"updated_at": "2021-09-29T00:44:48Z",
"updated_at": "2021-10-01T10:06:40Z",
"pushed_at": "2021-09-23T20:01:01Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"allow_forking": true,
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0
},
{
@ -109,14 +109,14 @@
"description": "CVE-2021-22005 - VMWare vCenter Server File Upload to RCE",
"fork": false,
"created_at": "2021-09-25T16:21:56Z",
"updated_at": "2021-10-01T08:19:39Z",
"updated_at": "2021-10-01T14:39:03Z",
"pushed_at": "2021-09-30T14:38:21Z",
"stargazers_count": 78,
"watchers_count": 78,
"stargazers_count": 79,
"watchers_count": 79,
"forks_count": 21,
"allow_forking": true,
"forks": 21,
"watchers": 78,
"watchers": 79,
"score": 0
},
{

View file

@ -133,14 +133,14 @@
"description": "Confluence Server Webwork OGNL injection",
"fork": false,
"created_at": "2021-09-01T07:15:17Z",
"updated_at": "2021-09-28T06:45:13Z",
"updated_at": "2021-10-01T10:38:53Z",
"pushed_at": "2021-09-10T19:42:33Z",
"stargazers_count": 225,
"watchers_count": 225,
"stargazers_count": 226,
"watchers_count": 226,
"forks_count": 53,
"allow_forking": true,
"forks": 53,
"watchers": 225,
"watchers": 226,
"score": 0
},
{
@ -185,9 +185,9 @@
"pushed_at": "2021-09-07T10:25:48Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"forks": 7,
"forks": 8,
"watchers": 14,
"score": 0
},
@ -209,9 +209,9 @@
"pushed_at": "2021-09-02T07:36:51Z",
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 17,
"forks_count": 18,
"allow_forking": true,
"forks": 17,
"forks": 18,
"watchers": 32,
"score": 0
},

View file

@ -37,14 +37,14 @@
"description": null,
"fork": false,
"created_at": "2021-09-28T03:47:36Z",
"updated_at": "2021-09-30T15:18:04Z",
"updated_at": "2021-10-01T13:04:39Z",
"pushed_at": "2021-09-29T02:20:40Z",
"stargazers_count": 88,
"watchers_count": 88,
"forks_count": 19,
"stargazers_count": 90,
"watchers_count": 90,
"forks_count": 20,
"allow_forking": true,
"forks": 19,
"watchers": 88,
"forks": 20,
"watchers": 90,
"score": 0
}
]

View file

@ -805,14 +805,14 @@
"description": "sudo heap overflow to LPE, in Go",
"fork": false,
"created_at": "2021-02-09T07:55:47Z",
"updated_at": "2021-09-18T20:14:53Z",
"updated_at": "2021-10-01T15:09:13Z",
"pushed_at": "2021-02-09T08:11:04Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 3,
"allow_forking": true,
"forks": 3,
"watchers": 13,
"watchers": 14,
"score": 0
},
{

View file

@ -13,14 +13,14 @@
"description": "vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.",
"fork": false,
"created_at": "2021-05-04T17:15:58Z",
"updated_at": "2021-10-01T06:18:05Z",
"updated_at": "2021-10-01T13:49:08Z",
"pushed_at": "2021-05-10T20:42:33Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 9,
"allow_forking": true,
"forks": 9,
"watchers": 42,
"watchers": 43,
"score": 0
}
]

View file

@ -233,9 +233,9 @@
"pushed_at": "2021-08-20T01:54:22Z",
"stargazers_count": 642,
"watchers_count": 642,
"forks_count": 89,
"forks_count": 90,
"allow_forking": true,
"forks": 89,
"forks": 90,
"watchers": 642,
"score": 0
},

View file

@ -61,14 +61,14 @@
"description": null,
"fork": false,
"created_at": "2021-09-09T03:15:57Z",
"updated_at": "2021-09-14T05:56:01Z",
"updated_at": "2021-10-01T13:00:27Z",
"pushed_at": "2021-09-09T03:26:21Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 13,
"allow_forking": true,
"forks": 13,
"watchers": 10,
"watchers": 11,
"score": 0
},
{
@ -157,14 +157,14 @@
"description": "CVE-2021-40444 Sample ",
"fork": false,
"created_at": "2021-09-10T09:43:41Z",
"updated_at": "2021-09-22T10:22:30Z",
"updated_at": "2021-10-01T12:46:58Z",
"pushed_at": "2021-09-11T10:35:20Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 73,
"watchers_count": 73,
"forks_count": 54,
"allow_forking": true,
"forks": 54,
"watchers": 72,
"watchers": 73,
"score": 0
},
{
@ -205,14 +205,14 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2021-09-30T13:57:05Z",
"updated_at": "2021-10-01T12:47:29Z",
"pushed_at": "2021-09-11T09:50:26Z",
"stargazers_count": 1230,
"watchers_count": 1230,
"stargazers_count": 1231,
"watchers_count": 1231,
"forks_count": 390,
"allow_forking": true,
"forks": 390,
"watchers": 1230,
"watchers": 1231,
"score": 0
},
{
@ -373,14 +373,14 @@
"description": "This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit",
"fork": false,
"created_at": "2021-09-12T18:05:53Z",
"updated_at": "2021-09-30T04:03:00Z",
"updated_at": "2021-10-01T12:51:19Z",
"pushed_at": "2021-09-15T16:34:35Z",
"stargazers_count": 158,
"watchers_count": 158,
"stargazers_count": 159,
"watchers_count": 159,
"forks_count": 41,
"allow_forking": true,
"forks": 41,
"watchers": 158,
"watchers": 159,
"score": 0
},
{
@ -493,14 +493,14 @@
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
"fork": false,
"created_at": "2021-09-15T22:34:35Z",
"updated_at": "2021-10-01T07:57:09Z",
"updated_at": "2021-10-01T13:55:06Z",
"pushed_at": "2021-09-25T00:05:37Z",
"stargazers_count": 436,
"watchers_count": 436,
"stargazers_count": 437,
"watchers_count": 437,
"forks_count": 87,
"allow_forking": true,
"forks": 87,
"watchers": 436,
"watchers": 437,
"score": 0
},
{
@ -565,14 +565,14 @@
"description": "Modified code so that we don´t need to rely on CAB archives",
"fork": false,
"created_at": "2021-09-19T19:46:28Z",
"updated_at": "2021-10-01T06:11:19Z",
"updated_at": "2021-10-01T12:45:57Z",
"pushed_at": "2021-09-22T20:07:51Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 15,
"allow_forking": true,
"forks": 15,
"watchers": 66,
"watchers": 67,
"score": 0
},
{

26
2021/CVE-2021-41647.json Normal file
View file

@ -0,0 +1,26 @@
[
{
"id": 411188978,
"name": "CVE-2021-41647",
"full_name": "MobiusBinary\/CVE-2021-41647",
"owner": {
"login": "MobiusBinary",
"id": 91082958,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91082958?v=4",
"html_url": "https:\/\/github.com\/MobiusBinary"
},
"html_url": "https:\/\/github.com\/MobiusBinary\/CVE-2021-41647",
"description": null,
"fork": false,
"created_at": "2021-09-28T07:59:21Z",
"updated_at": "2021-10-01T14:29:04Z",
"pushed_at": "2021-10-01T14:29:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"forks": 0,
"watchers": 0,
"score": 0
}
]

26
2021/CVE-2021-41648.json Normal file
View file

@ -0,0 +1,26 @@
[
{
"id": 411945715,
"name": "CVE-2021-41648",
"full_name": "MobiusBinary\/CVE-2021-41648",
"owner": {
"login": "MobiusBinary",
"id": 91082958,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91082958?v=4",
"html_url": "https:\/\/github.com\/MobiusBinary"
},
"html_url": "https:\/\/github.com\/MobiusBinary\/CVE-2021-41648",
"description": null,
"fork": false,
"created_at": "2021-09-30T06:16:30Z",
"updated_at": "2021-10-01T13:50:36Z",
"pushed_at": "2021-10-01T13:50:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"forks": 0,
"watchers": 0,
"score": 0
}
]

26
2021/CVE-2021-41649.json Normal file
View file

@ -0,0 +1,26 @@
[
{
"id": 411700383,
"name": "CVE-2021-41649",
"full_name": "MobiusBinary\/CVE-2021-41649",
"owner": {
"login": "MobiusBinary",
"id": 91082958,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91082958?v=4",
"html_url": "https:\/\/github.com\/MobiusBinary"
},
"html_url": "https:\/\/github.com\/MobiusBinary\/CVE-2021-41649",
"description": null,
"fork": false,
"created_at": "2021-09-29T14:09:34Z",
"updated_at": "2021-10-01T13:51:00Z",
"pushed_at": "2021-10-01T13:50:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -2545,6 +2545,30 @@ Improper Access Control in Gurock TestRail versions < 7.2.0.3014 resulted in
### CVE-2021-41074
- [dillonkirsch/CVE-2021-41074](https://github.com/dillonkirsch/CVE-2021-41074)
### CVE-2021-41647 (-)
<code>
An un-authenticated error-based and time-based blind SQL injection vulnerability exists in Kaushik Jadhav Online Food Ordering Web App 1.0. An attacker can exploit the vulnerable &quot;username&quot; parameter in login.php and retrieve sensitive database information, as well as add an administrative user.
</code>
- [MobiusBinary/CVE-2021-41647](https://github.com/MobiusBinary/CVE-2021-41647)
### CVE-2021-41648 (2021-10-01)
<code>
An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-system-advanced through the /action.php prId parameter. Using a post request does not sanitize the user input.
</code>
- [MobiusBinary/CVE-2021-41648](https://github.com/MobiusBinary/CVE-2021-41648)
### CVE-2021-41649 (2021-10-01)
<code>
An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-system-advanced through the /homeaction.php cat_id parameter. Using a post request does not sanitize the user input.
</code>
- [MobiusBinary/CVE-2021-41649](https://github.com/MobiusBinary/CVE-2021-41649)
### CVE-2021-123456
- [zoukba0014/cve-2021-123456](https://github.com/zoukba0014/cve-2021-123456)
@ -4847,6 +4871,7 @@ An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2
- [heikanet/CVE-2020-11651-CVE-2020-11652-EXP](https://github.com/heikanet/CVE-2020-11651-CVE-2020-11652-EXP)
- [RakhithJK/CVE-2020-11651](https://github.com/RakhithJK/CVE-2020-11651)
- [appcheck-ng/salt-rce-scanner-CVE-2020-11651-CVE-2020-11652](https://github.com/appcheck-ng/salt-rce-scanner-CVE-2020-11651-CVE-2020-11652)
- [puckiestyle/cve-2020-11651](https://github.com/puckiestyle/cve-2020-11651)
### CVE-2020-11652 (2020-04-30)
@ -5690,6 +5715,14 @@ A user enumeration vulnerability flaw was found in Venki Supravizio BPM 10.1.2.
### CVE-2020-15399
- [mkelepce/CVE-2020-15399](https://github.com/mkelepce/CVE-2020-15399)
### CVE-2020-15436 (2020-11-23)
<code>
Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.
</code>
- [artsking/linux-4.1.15_CVE-2020-15436_withPatch](https://github.com/artsking/linux-4.1.15_CVE-2020-15436_withPatch)
### CVE-2020-15492 (2020-07-23)
<code>