Auto Update 2021/11/30 18:13:15

This commit is contained in:
motikan2010-bot 2021-12-01 03:13:15 +09:00
parent 6f7766f22b
commit 7ddbed21c0
27 changed files with 117 additions and 117 deletions

View file

@ -25,32 +25,5 @@
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 353825444,
"name": "CVE-1999-0016-POC",
"full_name": "Pommaq\/CVE-1999-0016-POC",
"owner": {
"login": "Pommaq",
"id": 42520348,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42520348?v=4",
"html_url": "https:\/\/github.com\/Pommaq"
},
"html_url": "https:\/\/github.com\/Pommaq\/CVE-1999-0016-POC",
"description": null,
"fork": false,
"created_at": "2021-04-01T21:00:13Z",
"updated_at": "2021-04-06T13:33:34Z",
"pushed_at": "2021-04-02T09:59:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -40,10 +40,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-11-30T08:14:22Z",
"updated_at": "2021-11-30T14:56:13Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3016,
"watchers_count": 3016,
"stargazers_count": 3015,
"watchers_count": 3015,
"forks_count": 892,
"allow_forking": true,
"is_template": false,
@ -70,7 +70,7 @@
],
"visibility": "public",
"forks": 892,
"watchers": 3016,
"watchers": 3015,
"score": 0
},
{

View file

@ -46,17 +46,17 @@
"description": "CVE-2020-3992 & CVE-2019-5544",
"fork": false,
"created_at": "2021-02-04T15:15:22Z",
"updated_at": "2021-11-30T08:25:02Z",
"updated_at": "2021-11-30T13:03:37Z",
"pushed_at": "2021-02-05T06:40:50Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 33,
"watchers": 34,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": "PoC for CVE-2019-5736",
"fork": false,
"created_at": "2019-02-13T05:26:32Z",
"updated_at": "2021-11-17T19:27:12Z",
"updated_at": "2021-11-30T17:13:20Z",
"pushed_at": "2019-02-19T11:45:13Z",
"stargazers_count": 544,
"watchers_count": 544,
"stargazers_count": 545,
"watchers_count": 545,
"forks_count": 151,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 151,
"watchers": 544,
"watchers": 545,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR\/EDR and BLE [CVE-2019-9506]",
"fork": false,
"created_at": "2019-08-15T11:54:21Z",
"updated_at": "2021-11-18T09:31:13Z",
"updated_at": "2021-11-30T13:53:59Z",
"pushed_at": "2021-04-20T16:14:13Z",
"stargazers_count": 136,
"watchers_count": 136,
"stargazers_count": 137,
"watchers_count": 137,
"forks_count": 38,
"allow_forking": true,
"is_template": false,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 38,
"watchers": 136,
"watchers": 137,
"score": 0
}
]

View file

@ -47,17 +47,17 @@
"description": "POC exploit code for CVE-2020-1048(PrintDemon)",
"fork": false,
"created_at": "2020-06-23T18:45:24Z",
"updated_at": "2021-11-30T08:17:12Z",
"updated_at": "2021-11-30T15:53:00Z",
"pushed_at": "2020-06-25T12:22:06Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 14,
"watchers": 16,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-11-30T08:14:22Z",
"updated_at": "2021-11-30T14:56:13Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3016,
"watchers_count": 3016,
"stargazers_count": 3015,
"watchers_count": 3015,
"forks_count": 892,
"allow_forking": true,
"is_template": false,
@ -43,7 +43,7 @@
],
"visibility": "public",
"forks": 892,
"watchers": 3016,
"watchers": 3015,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "cve-2020-15148",
"fork": false,
"created_at": "2020-10-27T07:33:47Z",
"updated_at": "2021-09-16T03:53:05Z",
"updated_at": "2021-11-30T16:58:27Z",
"pushed_at": "2020-10-27T07:35:04Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -46,17 +46,17 @@
"description": "CVE-2020-3992 & CVE-2019-5544",
"fork": false,
"created_at": "2021-02-04T15:15:22Z",
"updated_at": "2021-11-30T08:25:02Z",
"updated_at": "2021-11-30T13:03:37Z",
"pushed_at": "2021-02-05T06:40:50Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 33,
"watchers": 34,
"score": 0
}
]

View file

@ -73,17 +73,17 @@
"description": "CVE-2020-5902 BIG-IP",
"fork": false,
"created_at": "2020-07-05T16:38:32Z",
"updated_at": "2021-11-22T14:09:44Z",
"updated_at": "2021-11-30T13:46:03Z",
"pushed_at": "2021-10-13T07:53:46Z",
"stargazers_count": 356,
"watchers_count": 356,
"stargazers_count": 357,
"watchers_count": 357,
"forks_count": 108,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 108,
"watchers": 356,
"watchers": 357,
"score": 0
},
{

View file

@ -121,17 +121,17 @@
"description": "CVE-2021-1732 poc & exp; tested on 20H2",
"fork": false,
"created_at": "2021-04-23T08:21:54Z",
"updated_at": "2021-10-24T05:35:30Z",
"updated_at": "2021-11-30T14:11:09Z",
"pushed_at": "2021-04-23T08:28:53Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 48,
"watchers": 49,
"score": 0
},
{

View file

@ -44,12 +44,12 @@
"pushed_at": "2021-11-27T15:09:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
}

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-09-15T03:22:06Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 2,
"score": 0
}

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-11-28T01:12:20Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0
}

View file

@ -13,17 +13,17 @@
"description": "Spring Cloud Netflix Hystrix Dashboard template resolution vulnerability CVE-2021-22053",
"fork": false,
"created_at": "2021-11-21T08:47:56Z",
"updated_at": "2021-11-28T05:19:47Z",
"updated_at": "2021-11-30T15:39:58Z",
"pushed_at": "2021-11-21T08:52:47Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 27,
"watchers": 28,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "This script can be used to gain access to a victim's Samsung Account if they have a specific version of Samsung Members installed on their Samsung Device, and if the victim's device is from the US or Korea region.",
"fork": false,
"created_at": "2021-04-10T09:23:52Z",
"updated_at": "2021-09-01T19:48:08Z",
"updated_at": "2021-11-30T16:20:13Z",
"pushed_at": "2021-04-28T17:56:04Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 14,
"watchers": 15,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "POC and description for CVE-2021-28312",
"fork": false,
"created_at": "2021-05-07T20:16:22Z",
"updated_at": "2021-11-30T08:16:21Z",
"updated_at": "2021-11-30T15:53:02Z",
"pushed_at": "2021-05-07T20:31:12Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -44,12 +44,12 @@
"pushed_at": "2021-09-29T06:15:17Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 21,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 21,
"forks": 22,
"watchers": 2,
"score": 0
}

View file

@ -13,17 +13,17 @@
"description": "A sample POC for CVE-2021-30657 affecting MacOS",
"fork": false,
"created_at": "2021-11-07T18:33:35Z",
"updated_at": "2021-11-30T07:48:31Z",
"updated_at": "2021-11-30T15:53:04Z",
"pushed_at": "2021-11-08T19:35:28Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 22,
"watchers": 23,
"score": 0
}
]

View file

@ -13,17 +13,44 @@
"description": "Exploit for CVE-2021-30807",
"fork": false,
"created_at": "2021-10-09T20:11:42Z",
"updated_at": "2021-11-30T12:07:45Z",
"updated_at": "2021-11-30T16:35:50Z",
"pushed_at": "2021-11-29T13:50:42Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 75,
"watchers_count": 75,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 69,
"watchers": 75,
"score": 0
},
{
"id": 433471856,
"name": "gex",
"full_name": "30440r\/gex",
"owner": {
"login": "30440r",
"id": 63462198,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63462198?v=4",
"html_url": "https:\/\/github.com\/30440r"
},
"html_url": "https:\/\/github.com\/30440r\/gex",
"description": "Gex is an iOS 14.7 jailbreak using CVE-2021-30807 IOMFB exploit",
"fork": false,
"created_at": "2021-11-30T14:56:04Z",
"updated_at": "2021-11-30T15:03:45Z",
"pushed_at": "2021-11-30T15:03:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -452,17 +452,17 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2021-11-30T09:02:49Z",
"updated_at": "2021-11-30T15:47:25Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 778,
"watchers_count": 778,
"stargazers_count": 779,
"watchers_count": 779,
"forks_count": 228,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 228,
"watchers": 778,
"watchers": 779,
"score": 0
},
{
@ -1023,17 +1023,17 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
"updated_at": "2021-11-29T21:14:30Z",
"updated_at": "2021-11-30T16:31:26Z",
"pushed_at": "2021-11-04T23:56:50Z",
"stargazers_count": 400,
"watchers_count": 400,
"stargazers_count": 402,
"watchers_count": 402,
"forks_count": 100,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 100,
"watchers": 400,
"watchers": 402,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-09-28T04:08:43Z",
"stargazers_count": 258,
"watchers_count": 258,
"forks_count": 90,
"forks_count": 91,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 90,
"forks": 91,
"watchers": 258,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-11-05T02:58:15Z",
"updated_at": "2021-11-30T09:48:10Z",
"updated_at": "2021-11-30T13:13:24Z",
"pushed_at": "2021-11-05T03:18:48Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
},
{

View file

@ -40,7 +40,7 @@
"description": "Exploitation code for CVE-2021-40539",
"fork": false,
"created_at": "2021-11-03T14:49:27Z",
"updated_at": "2021-11-18T03:13:16Z",
"updated_at": "2021-11-30T17:36:09Z",
"pushed_at": "2021-11-09T11:15:19Z",
"stargazers_count": 26,
"watchers_count": 26,

View file

@ -71,12 +71,12 @@
"pushed_at": "2021-10-06T05:40:34Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 9,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "Microsoft Exchange Server Poc",
"fork": false,
"created_at": "2021-11-23T02:26:26Z",
"updated_at": "2021-11-30T02:46:42Z",
"updated_at": "2021-11-30T15:43:32Z",
"pushed_at": "2021-11-23T02:33:47Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 40,
"watchers": 41,
"score": 0
}
]

View file

@ -1941,6 +1941,7 @@ A memory corruption issue was addressed with improved memory handling. This issu
</code>
- [jsherman212/iomfb-exploit](https://github.com/jsherman212/iomfb-exploit)
- [30440r/gex](https://github.com/30440r/gex)
### CVE-2021-30858 (2021-08-24)
@ -22294,7 +22295,6 @@ Land IP denial of service.
</code>
- [pexmee/CVE-1999-0016-Land-DOS-tool](https://github.com/pexmee/CVE-1999-0016-Land-DOS-tool)
- [Pommaq/CVE-1999-0016-POC](https://github.com/Pommaq/CVE-1999-0016-POC)
### CVE-1999-0532
- [websecnl/Bulk_CVE-1999-0532_Scanner](https://github.com/websecnl/Bulk_CVE-1999-0532_Scanner)