Auto Update 2021/11/05 12:13:00

This commit is contained in:
motikan2010-bot 2021-11-05 21:13:00 +09:00
parent abd6a72e91
commit 965fd4d7e3
37 changed files with 420 additions and 127 deletions

View file

@ -17,7 +17,7 @@
"pushed_at": "2019-10-13T12:23:02Z",
"stargazers_count": 372,
"watchers_count": 372,
"forks_count": 143,
"forks_count": 144,
"allow_forking": true,
"is_template": false,
"topics": [
@ -31,7 +31,7 @@
"vulnerable-container"
],
"visibility": "public",
"forks": 143,
"forks": 144,
"watchers": 372,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "CVE-2016-4437-Shiro反序列化爆破模块和key,命令执行反弹shell的脚本",
"fork": false,
"created_at": "2020-05-27T05:02:04Z",
"updated_at": "2021-09-29T03:14:37Z",
"updated_at": "2021-11-05T09:07:43Z",
"pushed_at": "2020-06-27T10:17:43Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 45,
"watchers": 46,
"score": 0
},
{

View file

@ -98,12 +98,12 @@
"pushed_at": "2020-12-08T15:39:24Z",
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 14,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 14,
"forks": 15,
"watchers": 38,
"score": 0
}

View file

@ -67,17 +67,17 @@
"description": "Arbitrary code execution with kernel privileges using CVE-2018-8897.",
"fork": false,
"created_at": "2018-05-13T19:34:17Z",
"updated_at": "2021-10-14T11:49:31Z",
"updated_at": "2021-11-05T09:02:54Z",
"pushed_at": "2018-05-18T12:26:53Z",
"stargazers_count": 395,
"watchers_count": 395,
"stargazers_count": 394,
"watchers_count": 394,
"forks_count": 111,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 111,
"watchers": 395,
"watchers": 394,
"score": 0
},
{

View file

@ -1705,17 +1705,17 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2021-11-03T04:07:06Z",
"updated_at": "2021-11-05T06:11:03Z",
"pushed_at": "2019-09-03T20:50:28Z",
"stargazers_count": 1087,
"watchers_count": 1087,
"stargazers_count": 1088,
"watchers_count": 1088,
"forks_count": 358,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 358,
"watchers": 1087,
"watchers": 1088,
"score": 0
},
{
@ -2888,17 +2888,17 @@
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
"fork": false,
"created_at": "2020-01-21T02:22:29Z",
"updated_at": "2021-10-29T15:30:23Z",
"updated_at": "2021-11-05T07:43:28Z",
"pushed_at": "2020-01-21T03:15:41Z",
"stargazers_count": 235,
"watchers_count": 235,
"stargazers_count": 238,
"watchers_count": 238,
"forks_count": 64,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 64,
"watchers": 235,
"watchers": 238,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "CVE-2019-1040 with Kerberos delegation",
"fork": false,
"created_at": "2019-06-18T12:10:26Z",
"updated_at": "2021-09-22T02:06:10Z",
"updated_at": "2021-11-05T06:24:50Z",
"pushed_at": "2021-06-18T18:43:46Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 27,
"watchers": 28,
"score": 0
},
{

View file

@ -17,7 +17,7 @@
"pushed_at": "2020-06-13T17:40:14Z",
"stargazers_count": 595,
"watchers_count": 595,
"forks_count": 83,
"forks_count": 84,
"allow_forking": true,
"is_template": false,
"topics": [
@ -30,7 +30,7 @@
"sandbox-escape"
],
"visibility": "public",
"forks": 83,
"forks": 84,
"watchers": 595,
"score": 0
}

View file

@ -94,17 +94,17 @@
"description": "CVE 2019-2215 Android Binder Use After Free",
"fork": false,
"created_at": "2019-10-16T11:27:44Z",
"updated_at": "2021-08-07T17:29:25Z",
"updated_at": "2021-11-05T08:01:58Z",
"pushed_at": "2020-03-16T07:20:14Z",
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 13,
"stargazers_count": 63,
"watchers_count": 63,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 62,
"forks": 14,
"watchers": 63,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2021-11-02T22:04:45Z",
"updated_at": "2021-11-05T08:34:20Z",
"pushed_at": "2020-09-11T07:38:22Z",
"stargazers_count": 575,
"watchers_count": 575,
"stargazers_count": 576,
"watchers_count": 576,
"forks_count": 151,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 151,
"watchers": 575,
"watchers": 576,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2020-12-08T15:39:24Z",
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 14,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 14,
"forks": 15,
"watchers": 38,
"score": 0
},

View file

@ -614,17 +614,17 @@
"description": "Test script for CVE-2020-1472 for both RPC\/TCP and RPC\/SMB",
"fork": false,
"created_at": "2020-09-17T16:53:17Z",
"updated_at": "2021-10-31T21:22:12Z",
"updated_at": "2021-11-05T12:00:12Z",
"pushed_at": "2021-06-18T18:44:06Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 45,
"watchers": 46,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2020-15999",
"fork": false,
"created_at": "2020-10-28T16:16:25Z",
"updated_at": "2021-11-01T19:13:21Z",
"updated_at": "2021-11-05T08:45:13Z",
"pushed_at": "2021-11-01T19:13:18Z",
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 9,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 27,
"forks": 10,
"watchers": 28,
"score": 0
},
{

View file

@ -88,17 +88,17 @@
"description": "how detect CVE-2020-2551 poc exploit python Weblogic RCE with IIOP",
"fork": false,
"created_at": "2020-01-19T13:01:32Z",
"updated_at": "2021-11-01T07:35:48Z",
"updated_at": "2021-11-05T11:55:24Z",
"pushed_at": "2021-10-29T08:55:29Z",
"stargazers_count": 164,
"watchers_count": 164,
"stargazers_count": 165,
"watchers_count": 165,
"forks_count": 38,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 164,
"watchers": 165,
"score": 0
},
{

View file

@ -140,17 +140,17 @@
"description": "Proof of Concept Exploit for vCenter CVE-2021-21972",
"fork": false,
"created_at": "2021-02-24T16:31:34Z",
"updated_at": "2021-11-05T05:42:31Z",
"updated_at": "2021-11-05T09:43:50Z",
"pushed_at": "2021-02-25T16:05:02Z",
"stargazers_count": 158,
"watchers_count": 158,
"stargazers_count": 163,
"watchers_count": 163,
"forks_count": 61,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 61,
"watchers": 158,
"watchers": 163,
"score": 0
},
{

View file

@ -179,12 +179,12 @@
"pushed_at": "2021-09-28T21:08:21Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 15,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 15,
"forks": 14,
"watchers": 16,
"score": 0
},

View file

@ -121,10 +121,10 @@
"description": "CVE-2021-22205& GitLab CE\/EE RCE",
"fork": false,
"created_at": "2021-10-29T04:30:45Z",
"updated_at": "2021-11-05T02:27:11Z",
"updated_at": "2021-11-05T06:49:50Z",
"pushed_at": "2021-10-29T04:31:15Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
@ -133,7 +133,7 @@
],
"visibility": "public",
"forks": 22,
"watchers": 52,
"watchers": 53,
"score": 0
},
{
@ -235,14 +235,14 @@
"pushed_at": "2021-11-04T12:49:58Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-22205"
],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 7,
"score": 0
},

View file

@ -13,11 +13,11 @@
"description": "Atlassian Jira Server\/Data Center 8.4.0 - Arbitrary File read (CVE-2021-26086)",
"fork": false,
"created_at": "2021-10-05T14:09:52Z",
"updated_at": "2021-10-18T06:46:14Z",
"updated_at": "2021-11-05T07:00:15Z",
"pushed_at": "2021-10-12T05:16:48Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [
@ -26,8 +26,8 @@
"jira"
],
"visibility": "public",
"forks": 1,
"watchers": 4,
"forks": 2,
"watchers": 5,
"score": 0
}
]

View file

@ -1158,17 +1158,17 @@
"description": "CVE-2021-3156 - Sudo Baron Samedit",
"fork": false,
"created_at": "2021-04-29T06:29:26Z",
"updated_at": "2021-10-29T08:09:55Z",
"updated_at": "2021-11-05T06:53:38Z",
"pushed_at": "2021-08-11T15:52:19Z",
"stargazers_count": 106,
"watchers_count": 106,
"stargazers_count": 107,
"watchers_count": 107,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 106,
"watchers": 107,
"score": 0
},
{

View file

@ -121,17 +121,17 @@
"description": "CVE-2021-33909 Sequoia",
"fork": false,
"created_at": "2021-09-02T04:51:54Z",
"updated_at": "2021-10-07T12:22:54Z",
"updated_at": "2021-11-05T09:30:37Z",
"pushed_at": "2021-09-02T04:52:19Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 26,
"watchers": 28,
"score": 0
}
]

View file

@ -273,12 +273,12 @@
"pushed_at": "2021-08-20T01:54:22Z",
"stargazers_count": 647,
"watchers_count": 647,
"forks_count": 92,
"forks_count": 93,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 92,
"forks": 93,
"watchers": 647,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-06-24T18:50:17Z",
"updated_at": "2021-11-04T20:20:36Z",
"updated_at": "2021-11-05T08:22:10Z",
"pushed_at": "2021-08-25T19:26:21Z",
"stargazers_count": 184,
"watchers_count": 184,
"stargazers_count": 186,
"watchers_count": 186,
"forks_count": 40,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 40,
"watchers": 184,
"watchers": 186,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-36260",
"fork": false,
"created_at": "2021-10-18T06:40:48Z",
"updated_at": "2021-11-04T02:14:17Z",
"updated_at": "2021-11-05T10:13:53Z",
"pushed_at": "2021-10-27T15:40:38Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 6,
"score": 0
},
{
@ -40,17 +40,17 @@
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
"fork": false,
"created_at": "2021-10-27T15:51:12Z",
"updated_at": "2021-11-04T23:01:25Z",
"updated_at": "2021-11-05T09:46:06Z",
"pushed_at": "2021-10-28T06:37:37Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 40,
"watchers": 46,
"score": 0
},
{

View file

@ -1,29 +1,29 @@
[
{
"id": 424810404,
"id": 424814670,
"name": "TFC-Chrome-v8-bug-CVE-2021-38001-poc",
"full_name": "maldiohead\/TFC-Chrome-v8-bug-CVE-2021-38001-poc",
"full_name": "Peterpan0927\/TFC-Chrome-v8-bug-CVE-2021-38001-poc",
"owner": {
"login": "maldiohead",
"id": 23315692,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23315692?v=4",
"html_url": "https:\/\/github.com\/maldiohead"
"login": "Peterpan0927",
"id": 26504662,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26504662?v=4",
"html_url": "https:\/\/github.com\/Peterpan0927"
},
"html_url": "https:\/\/github.com\/maldiohead\/TFC-Chrome-v8-bug-CVE-2021-38001-poc",
"html_url": "https:\/\/github.com\/Peterpan0927\/TFC-Chrome-v8-bug-CVE-2021-38001-poc",
"description": null,
"fork": false,
"created_at": "2021-11-05T02:58:15Z",
"updated_at": "2021-11-05T05:40:41Z",
"pushed_at": "2021-11-05T03:18:48Z",
"stargazers_count": 8,
"watchers_count": 8,
"created_at": "2021-11-05T03:18:46Z",
"updated_at": "2021-11-05T09:42:16Z",
"pushed_at": "2021-11-05T03:17:58Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 8,
"watchers": 1,
"score": 0
}
]

View file

@ -44,12 +44,12 @@
"pushed_at": "2021-10-24T10:21:12Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 0,
"watchers": 1,
"score": 0
},

View file

@ -229,17 +229,17 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2021-11-05T03:29:10Z",
"updated_at": "2021-11-05T08:23:51Z",
"pushed_at": "2021-09-11T09:50:26Z",
"stargazers_count": 1288,
"watchers_count": 1288,
"forks_count": 416,
"stargazers_count": 1289,
"watchers_count": 1289,
"forks_count": 417,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 416,
"watchers": 1288,
"forks": 417,
"watchers": 1289,
"score": 0
},
{
@ -553,10 +553,10 @@
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
"fork": false,
"created_at": "2021-09-15T22:34:35Z",
"updated_at": "2021-11-02T17:45:51Z",
"updated_at": "2021-11-05T09:48:21Z",
"pushed_at": "2021-10-12T23:05:07Z",
"stargazers_count": 485,
"watchers_count": 485,
"stargazers_count": 486,
"watchers_count": 486,
"forks_count": 102,
"allow_forking": true,
"is_template": false,
@ -570,7 +570,7 @@
],
"visibility": "public",
"forks": 102,
"watchers": 485,
"watchers": 486,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2021-10-16T16:17:44Z",
"updated_at": "2021-11-03T12:09:31Z",
"updated_at": "2021-11-05T09:24:41Z",
"pushed_at": "2021-10-24T21:01:29Z",
"stargazers_count": 310,
"watchers_count": 310,
"stargazers_count": 311,
"watchers_count": 311,
"forks_count": 68,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 68,
"watchers": 310,
"watchers": 311,
"score": 0
},
{
@ -67,8 +67,8 @@
"description": "My exploit for CVE-2021-40449, a Windows LPE via a UAF in win32kfull!GreResetDCInternal.",
"fork": false,
"created_at": "2021-10-25T04:58:49Z",
"updated_at": "2021-11-03T14:44:03Z",
"pushed_at": "2021-10-25T06:32:34Z",
"updated_at": "2021-11-05T06:54:12Z",
"pushed_at": "2021-11-05T06:54:10Z",
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 7,

View file

@ -13,8 +13,8 @@
"description": "CVE-2021-42662 - Stored Cross-Site Scripting vulnerability in the Online event booking and reservation system. ",
"fork": false,
"created_at": "2021-11-03T17:51:55Z",
"updated_at": "2021-11-04T04:51:19Z",
"pushed_at": "2021-11-03T20:08:02Z",
"updated_at": "2021-11-05T10:51:07Z",
"pushed_at": "2021-11-05T10:51:04Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,

29
2021/CVE-2021-42663.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 424343690,
"name": "CVE-2021-42663",
"full_name": "TheHackingRabbi\/CVE-2021-42663",
"owner": {
"login": "TheHackingRabbi",
"id": 93016131,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
"html_url": "https:\/\/github.com\/TheHackingRabbi"
},
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42663",
"description": "CVE-2021-42663 - HTML Injection vulnerability in the Online event booking and reservation system. ",
"fork": false,
"created_at": "2021-11-03T18:49:28Z",
"updated_at": "2021-11-05T10:53:32Z",
"pushed_at": "2021-11-05T10:53:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
}
]

29
2021/CVE-2021-42664.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 424354876,
"name": "CVE-2021-42664",
"full_name": "TheHackingRabbi\/CVE-2021-42664",
"owner": {
"login": "TheHackingRabbi",
"id": 93016131,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
"html_url": "https:\/\/github.com\/TheHackingRabbi"
},
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42664",
"description": " CVE-2021-42664 - Stored Cross-Site Scripting vulnerability in the Engineers online portal system.",
"fork": false,
"created_at": "2021-11-03T19:29:57Z",
"updated_at": "2021-11-05T10:44:41Z",
"pushed_at": "2021-11-03T20:12:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

29
2021/CVE-2021-42665.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 424362612,
"name": "CVE-2021-42665",
"full_name": "TheHackingRabbi\/CVE-2021-42665",
"owner": {
"login": "TheHackingRabbi",
"id": 93016131,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
"html_url": "https:\/\/github.com\/TheHackingRabbi"
},
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42665",
"description": "CVE-2021-42665 - SQL Injection authentication bypass vulnerability in the Engineers online portal system. ",
"fork": false,
"created_at": "2021-11-03T19:58:58Z",
"updated_at": "2021-11-05T10:45:08Z",
"pushed_at": "2021-11-03T20:13:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

29
2021/CVE-2021-42666.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 424367205,
"name": "CVE-2021-42666",
"full_name": "TheHackingRabbi\/CVE-2021-42666",
"owner": {
"login": "TheHackingRabbi",
"id": 93016131,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
"html_url": "https:\/\/github.com\/TheHackingRabbi"
},
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42666",
"description": "CVE-2021-42666 - SQL Injection vulnerability in the Engineers online portal system. ",
"fork": false,
"created_at": "2021-11-03T20:14:58Z",
"updated_at": "2021-11-05T10:45:42Z",
"pushed_at": "2021-11-03T20:29:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

29
2021/CVE-2021-42667.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 424371514,
"name": "CVE-2021-42667",
"full_name": "TheHackingRabbi\/CVE-2021-42667",
"owner": {
"login": "TheHackingRabbi",
"id": 93016131,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
"html_url": "https:\/\/github.com\/TheHackingRabbi"
},
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42667",
"description": "CVE-2021-42667 - SQL Injection vulnerability in the Online event booking and reservation system.",
"fork": false,
"created_at": "2021-11-03T20:31:30Z",
"updated_at": "2021-11-05T10:51:44Z",
"pushed_at": "2021-11-05T10:51:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

29
2021/CVE-2021-42668.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 424374708,
"name": "CVE-2021-42668",
"full_name": "TheHackingRabbi\/CVE-2021-42668",
"owner": {
"login": "TheHackingRabbi",
"id": 93016131,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
"html_url": "https:\/\/github.com\/TheHackingRabbi"
},
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42668",
"description": "CVE-2021-42668 - SQL Injection vulnerability in the Engineers online portal system. ",
"fork": false,
"created_at": "2021-11-03T20:43:30Z",
"updated_at": "2021-11-05T10:46:57Z",
"pushed_at": "2021-11-03T20:50:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

29
2021/CVE-2021-42669.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 424376895,
"name": "CVE-2021-42669",
"full_name": "TheHackingRabbi\/CVE-2021-42669",
"owner": {
"login": "TheHackingRabbi",
"id": 93016131,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
"html_url": "https:\/\/github.com\/TheHackingRabbi"
},
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42669",
"description": "CVE-2021-42669 - Remote code execution via unrestricted file upload vulnerability in the Engineers online portal system.",
"fork": false,
"created_at": "2021-11-03T20:52:08Z",
"updated_at": "2021-11-05T10:47:25Z",
"pushed_at": "2021-11-03T21:23:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

29
2021/CVE-2021-42670.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 424385119,
"name": "CVE-2021-42670",
"full_name": "TheHackingRabbi\/CVE-2021-42670",
"owner": {
"login": "TheHackingRabbi",
"id": 93016131,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
"html_url": "https:\/\/github.com\/TheHackingRabbi"
},
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42670",
"description": "CVE-2021-42670 - SQL Injection vulnerability in the Engineers online portal system. ",
"fork": false,
"created_at": "2021-11-03T21:25:43Z",
"updated_at": "2021-11-05T10:48:07Z",
"pushed_at": "2021-11-03T21:32:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

29
2021/CVE-2021-42671.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 424387160,
"name": "CVE-2021-42671",
"full_name": "TheHackingRabbi\/CVE-2021-42671",
"owner": {
"login": "TheHackingRabbi",
"id": 93016131,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
"html_url": "https:\/\/github.com\/TheHackingRabbi"
},
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42671",
"description": "CVE-2021-42671 - Broken access control vulnerability in the Engineers online portal system. ",
"fork": false,
"created_at": "2021-11-03T21:34:23Z",
"updated_at": "2021-11-05T10:48:51Z",
"pushed_at": "2021-11-03T21:41:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -2531,7 +2531,7 @@ Inappropriate implementation in Sandbox in Google Chrome prior to 94.0.4606.81 a
- [ZeusBox/CVE-2021-37980](https://github.com/ZeusBox/CVE-2021-37980)
### CVE-2021-38001
- [maldiohead/TFC-Chrome-v8-bug-CVE-2021-38001-poc](https://github.com/maldiohead/TFC-Chrome-v8-bug-CVE-2021-38001-poc)
- [Peterpan0927/TFC-Chrome-v8-bug-CVE-2021-38001-poc](https://github.com/Peterpan0927/TFC-Chrome-v8-bug-CVE-2021-38001-poc)
### CVE-2021-38149 (2021-08-06)
@ -3147,9 +3147,41 @@ An issue was discovered in the Bidirectional Algorithm in the Unicode Specificat
- [hffaust/CVE-2021-42574_and_CVE-2021-42694](https://github.com/hffaust/CVE-2021-42574_and_CVE-2021-42694)
- [js-on/CVE-2021-42574](https://github.com/js-on/CVE-2021-42574)
### CVE-2021-42662
### CVE-2021-42662 (2021-11-05)
<code>
A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP/MySQL via the Holiday reason parameter. An attacker can leverage this vulnerability in order to run javascript commands on the web server surfers behalf, which can lead to cookie stealing and more.
</code>
- [TheHackingRabbi/CVE-2021-42662](https://github.com/TheHackingRabbi/CVE-2021-42662)
### CVE-2021-42663
- [TheHackingRabbi/CVE-2021-42663](https://github.com/TheHackingRabbi/CVE-2021-42663)
### CVE-2021-42664
- [TheHackingRabbi/CVE-2021-42664](https://github.com/TheHackingRabbi/CVE-2021-42664)
### CVE-2021-42665
- [TheHackingRabbi/CVE-2021-42665](https://github.com/TheHackingRabbi/CVE-2021-42665)
### CVE-2021-42666
- [TheHackingRabbi/CVE-2021-42666](https://github.com/TheHackingRabbi/CVE-2021-42666)
### CVE-2021-42667
- [TheHackingRabbi/CVE-2021-42667](https://github.com/TheHackingRabbi/CVE-2021-42667)
### CVE-2021-42668
- [TheHackingRabbi/CVE-2021-42668](https://github.com/TheHackingRabbi/CVE-2021-42668)
### CVE-2021-42669
- [TheHackingRabbi/CVE-2021-42669](https://github.com/TheHackingRabbi/CVE-2021-42669)
### CVE-2021-42670
- [TheHackingRabbi/CVE-2021-42670](https://github.com/TheHackingRabbi/CVE-2021-42670)
### CVE-2021-42671
- [TheHackingRabbi/CVE-2021-42671](https://github.com/TheHackingRabbi/CVE-2021-42671)
### CVE-2021-42694 (2021-10-31)
<code>