Auto Update 2021/11/05 00:13:01

This commit is contained in:
motikan2010-bot 2021-11-05 09:13:01 +09:00
parent b39044af1c
commit 9bf7947267
38 changed files with 191 additions and 191 deletions

View file

@ -1071,10 +1071,10 @@
"description": "Shellshock exploit + vulnerable environment",
"fork": false,
"created_at": "2016-12-07T23:38:50Z",
"updated_at": "2021-10-27T00:01:05Z",
"updated_at": "2021-11-04T23:18:47Z",
"pushed_at": "2017-10-30T22:46:11Z",
"stargazers_count": 115,
"watchers_count": 115,
"stargazers_count": 116,
"watchers_count": 116,
"forks_count": 46,
"allow_forking": true,
"is_template": false,
@ -1088,7 +1088,7 @@
],
"visibility": "public",
"forks": 46,
"watchers": 115,
"watchers": 116,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container",
"fork": false,
"created_at": "2016-12-26T13:39:03Z",
"updated_at": "2021-11-02T12:38:27Z",
"updated_at": "2021-11-04T23:19:38Z",
"pushed_at": "2019-10-13T12:23:02Z",
"stargazers_count": 371,
"watchers_count": 371,
"stargazers_count": 372,
"watchers_count": 372,
"forks_count": 143,
"allow_forking": true,
"is_template": false,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 143,
"watchers": 371,
"watchers": 372,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "OpenSSH remote DOS exploit and vulnerable container",
"fork": false,
"created_at": "2016-12-09T15:22:38Z",
"updated_at": "2021-09-05T09:06:50Z",
"updated_at": "2021-11-04T23:23:51Z",
"pushed_at": "2017-10-30T22:29:20Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 27,
"watchers": 50,
"watchers": 51,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2019-05-08T18:00:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 0,
"watchers": 0,
"score": 0
},

View file

@ -17,12 +17,12 @@
"pushed_at": "2018-08-17T23:31:46Z",
"stargazers_count": 163,
"watchers_count": 163,
"forks_count": 32,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 32,
"forks": 33,
"watchers": 163,
"score": 0
}

View file

@ -17,7 +17,7 @@
"pushed_at": "2019-03-08T18:42:56Z",
"stargazers_count": 202,
"watchers_count": 202,
"forks_count": 53,
"forks_count": 54,
"allow_forking": true,
"is_template": false,
"topics": [
@ -26,7 +26,7 @@
"webkit"
],
"visibility": "public",
"forks": 53,
"forks": 54,
"watchers": 202,
"score": 0
}

View file

@ -94,10 +94,10 @@
"description": "This repository provides a learning environment to understand how an Exim RCE exploit for CVE-2018-6789 works.",
"fork": false,
"created_at": "2020-03-02T16:53:02Z",
"updated_at": "2021-09-26T16:02:09Z",
"updated_at": "2021-11-04T23:33:55Z",
"pushed_at": "2020-03-03T07:57:30Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
@ -119,7 +119,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -1488,12 +1488,12 @@
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 833,
"watchers_count": 833,
"forks_count": 252,
"forks_count": 253,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 252,
"forks": 253,
"watchers": 833,
"score": 0
},
@ -2892,12 +2892,12 @@
"pushed_at": "2020-01-21T03:15:41Z",
"stargazers_count": 235,
"watchers_count": 235,
"forks_count": 63,
"forks_count": 64,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 63,
"forks": 64,
"watchers": 235,
"score": 0
},

View file

@ -17,7 +17,7 @@
"pushed_at": "2020-06-13T17:40:14Z",
"stargazers_count": 596,
"watchers_count": 596,
"forks_count": 84,
"forks_count": 83,
"allow_forking": true,
"is_template": false,
"topics": [
@ -30,7 +30,7 @@
"sandbox-escape"
],
"visibility": "public",
"forks": 84,
"forks": 83,
"watchers": 596,
"score": 0
}

View file

@ -40,17 +40,17 @@
"description": "Dockerfiles for CVE-2019-15107(webmin RCE) recurrence including v1.890 and v1.920 with Exp for each version.",
"fork": false,
"created_at": "2019-08-22T08:48:07Z",
"updated_at": "2019-08-29T11:15:41Z",
"updated_at": "2021-11-04T23:41:54Z",
"pushed_at": "2019-08-22T08:58:55Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-04-28T16:31:08Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 10,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)",
"fork": false,
"created_at": "2019-02-12T22:07:47Z",
"updated_at": "2021-09-28T18:52:20Z",
"updated_at": "2021-11-04T23:22:06Z",
"pushed_at": "2019-02-20T15:35:34Z",
"stargazers_count": 186,
"watchers_count": 186,
"stargazers_count": 187,
"watchers_count": 187,
"forks_count": 66,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 66,
"watchers": 186,
"watchers": 187,
"score": 0
},
{
@ -477,17 +477,17 @@
"description": "Code sample for using exploit CVE-2019-5736 to mine bitcoin with no association to original container or user.",
"fork": false,
"created_at": "2019-12-12T16:57:13Z",
"updated_at": "2020-11-25T06:50:26Z",
"updated_at": "2021-11-04T23:42:10Z",
"pushed_at": "2019-12-12T16:58:18Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
},
{

View file

@ -112,33 +112,6 @@
"watchers": 0,
"score": 0
},
{
"id": 383619273,
"name": "cve-2019-6447",
"full_name": "mcmahonr\/cve-2019-6447",
"owner": {
"login": "mcmahonr",
"id": 17996673,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17996673?v=4",
"html_url": "https:\/\/github.com\/mcmahonr"
},
"html_url": "https:\/\/github.com\/mcmahonr\/cve-2019-6447",
"description": "Tool to take advantage of CVE-2019-6447",
"fork": false,
"created_at": "2021-07-06T23:13:55Z",
"updated_at": "2021-07-06T23:15:29Z",
"pushed_at": "2021-07-06T23:26:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 384531590,
"name": "CVE-2019-6447",

View file

@ -44,7 +44,7 @@
"pushed_at": "2019-12-28T18:25:10Z",
"stargazers_count": 211,
"watchers_count": 211,
"forks_count": 58,
"forks_count": 57,
"allow_forking": true,
"is_template": false,
"topics": [
@ -55,7 +55,7 @@
"remote-code-execution"
],
"visibility": "public",
"forks": 58,
"forks": 57,
"watchers": 211,
"score": 0
}

View file

@ -13,17 +13,17 @@
"description": "POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation",
"fork": false,
"created_at": "2020-06-25T07:35:29Z",
"updated_at": "2021-10-11T14:15:44Z",
"updated_at": "2021-11-04T23:23:58Z",
"pushed_at": "2020-06-25T07:49:34Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 54,
"watchers_count": 54,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 53,
"watchers": 54,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Study on CVE-2020-13401 vulnerability of containers in dockers older than 19.03.11",
"fork": false,
"created_at": "2021-03-31T17:45:10Z",
"updated_at": "2021-03-31T20:49:38Z",
"updated_at": "2021-11-04T23:38:47Z",
"pushed_at": "2021-03-31T20:47:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2021-11-02T00:26:04Z",
"updated_at": "2021-11-04T20:32:41Z",
"pushed_at": "2020-10-21T12:10:28Z",
"stargazers_count": 1359,
"watchers_count": 1359,
"stargazers_count": 1360,
"watchers_count": 1360,
"forks_count": 310,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 310,
"watchers": 1359,
"watchers": 1360,
"score": 0
},
{

View file

@ -256,10 +256,10 @@
"description": "Tool check: CVE-2021-41773, CVE-2021-42013, CVE-2020-17519",
"fork": false,
"created_at": "2021-10-13T17:03:56Z",
"updated_at": "2021-10-29T13:34:31Z",
"updated_at": "2021-11-04T23:08:59Z",
"pushed_at": "2021-10-14T21:11:44Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
@ -270,7 +270,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 41,
"watchers": 42,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "wpDiscuz 7.0.4 Remote Code Execution",
"fork": false,
"created_at": "2021-06-13T23:10:19Z",
"updated_at": "2021-10-02T04:07:08Z",
"updated_at": "2021-11-04T22:29:30Z",
"pushed_at": "2021-06-15T17:30:23Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Docker repository with a PoC for WP Code Snippets 2.13.3 (CVE-2020-8417)",
"fork": false,
"created_at": "2020-02-06T00:03:14Z",
"updated_at": "2021-04-18T18:19:55Z",
"updated_at": "2021-11-04T23:35:19Z",
"pushed_at": "2020-04-23T03:28:14Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0
},
{

View file

@ -213,17 +213,17 @@
"description": null,
"fork": false,
"created_at": "2021-06-05T11:03:13Z",
"updated_at": "2021-10-25T19:33:38Z",
"updated_at": "2021-11-04T22:54:52Z",
"pushed_at": "2021-06-07T04:00:06Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 26,
"watchers": 27,
"score": 0
},
{

View file

@ -94,17 +94,17 @@
"description": "Gitlab CE\/EE RCE 未授权远程代码执行漏洞 POC && EXP CVE-2021-22205",
"fork": false,
"created_at": "2021-10-29T04:15:00Z",
"updated_at": "2021-11-04T02:17:57Z",
"updated_at": "2021-11-04T23:47:59Z",
"pushed_at": "2021-11-04T02:17:54Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
},
{
@ -121,10 +121,10 @@
"description": "CVE-2021-22205& GitLab CE\/EE RCE",
"fork": false,
"created_at": "2021-10-29T04:30:45Z",
"updated_at": "2021-11-04T17:25:13Z",
"updated_at": "2021-11-04T22:55:02Z",
"pushed_at": "2021-10-29T04:31:15Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
@ -133,7 +133,7 @@
],
"visibility": "public",
"forks": 22,
"watchers": 47,
"watchers": 49,
"score": 0
},
{

View file

@ -67,17 +67,17 @@
"description": "Gitlab CI Lint API未授权 SSRF漏洞 CVE-2021-22214",
"fork": false,
"created_at": "2021-11-01T04:04:42Z",
"updated_at": "2021-11-04T02:21:30Z",
"updated_at": "2021-11-04T23:47:29Z",
"pushed_at": "2021-11-04T02:21:28Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -148,17 +148,17 @@
"description": "Confluence Server Webwork OGNL injection",
"fork": false,
"created_at": "2021-09-01T07:15:17Z",
"updated_at": "2021-11-03T09:10:26Z",
"updated_at": "2021-11-04T22:29:40Z",
"pushed_at": "2021-09-10T19:42:33Z",
"stargazers_count": 240,
"watchers_count": 240,
"stargazers_count": 241,
"watchers_count": 241,
"forks_count": 61,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 61,
"watchers": 240,
"watchers": 241,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Directory Traversal in Afterlogic webmail aurora and pro",
"fork": false,
"created_at": "2021-11-03T14:32:13Z",
"updated_at": "2021-11-04T10:59:03Z",
"updated_at": "2021-11-04T18:17:58Z",
"pushed_at": "2021-11-04T10:59:00Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Google Chrome Use After Free vulnerability reported by S4E Team",
"fork": false,
"created_at": "2021-07-29T12:53:13Z",
"updated_at": "2021-11-02T14:42:10Z",
"updated_at": "2021-11-04T23:42:02Z",
"pushed_at": "2021-07-29T13:18:38Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 10,
"watchers": 11,
"score": 0
},
{

View file

@ -277,17 +277,17 @@
"description": "Windows HTTP协议栈远程代码执行漏洞 CVE-2021-31166",
"fork": false,
"created_at": "2021-09-27T05:56:45Z",
"updated_at": "2021-11-04T02:23:14Z",
"updated_at": "2021-11-04T23:47:22Z",
"pushed_at": "2021-11-04T02:23:11Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 5,
"watchers": 6,
"score": 0
},
{

View file

@ -1024,15 +1024,15 @@
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
"updated_at": "2021-10-31T05:35:50Z",
"pushed_at": "2021-07-23T15:46:37Z",
"pushed_at": "2021-11-04T23:56:50Z",
"stargazers_count": 383,
"watchers_count": 383,
"forks_count": 91,
"forks_count": 92,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 91,
"forks": 92,
"watchers": 383,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "POC for CVE-2021-34429 - Eclipse Jetty 11.0.5 Sensitive File Disclosure",
"fork": false,
"created_at": "2021-11-03T09:13:12Z",
"updated_at": "2021-11-04T11:12:24Z",
"updated_at": "2021-11-04T23:40:57Z",
"pushed_at": "2021-11-03T11:51:41Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-06-24T18:50:17Z",
"updated_at": "2021-11-04T03:33:44Z",
"updated_at": "2021-11-04T20:20:36Z",
"pushed_at": "2021-08-25T19:26:21Z",
"stargazers_count": 182,
"watchers_count": 182,
"stargazers_count": 184,
"watchers_count": 184,
"forks_count": 40,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 40,
"watchers": 182,
"watchers": 184,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
"fork": false,
"created_at": "2021-10-27T15:51:12Z",
"updated_at": "2021-11-04T14:31:20Z",
"updated_at": "2021-11-04T23:01:25Z",
"pushed_at": "2021-10-28T06:37:37Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 39,
"watchers": 40,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation",
"fork": false,
"created_at": "2021-07-20T22:16:49Z",
"updated_at": "2021-10-21T19:45:59Z",
"updated_at": "2021-11-04T22:25:09Z",
"pushed_at": "2021-09-14T01:42:57Z",
"stargazers_count": 180,
"watchers_count": 180,
"stargazers_count": 181,
"watchers_count": 181,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 36,
"watchers": 180,
"watchers": 181,
"score": 0
},
{
@ -126,17 +126,17 @@
"description": "PoC for CVE-2021-36934, which enables a standard user to be able to retrieve the SAM, Security, and Software Registry hives in Windows 10 version 1809 or newer",
"fork": false,
"created_at": "2021-07-22T03:07:56Z",
"updated_at": "2021-10-25T11:58:45Z",
"updated_at": "2021-11-04T19:27:02Z",
"pushed_at": "2021-07-22T04:17:47Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 15,
"watchers": 16,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-10-18T02:02:43Z",
"updated_at": "2021-10-23T05:55:02Z",
"updated_at": "2021-11-04T23:44:09Z",
"pushed_at": "2021-10-18T02:42:25Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
},
{
@ -40,17 +40,17 @@
"description": "CVE-2021-40438 exploit PoC with Docker setup.",
"fork": false,
"created_at": "2021-10-24T10:18:08Z",
"updated_at": "2021-10-24T10:21:14Z",
"updated_at": "2021-11-04T23:39:11Z",
"pushed_at": "2021-10-24T10:21:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "Exploitation code for CVE-2021-40539",
"fork": false,
"created_at": "2021-11-03T14:49:27Z",
"updated_at": "2021-11-04T10:48:25Z",
"updated_at": "2021-11-04T22:26:12Z",
"pushed_at": "2021-11-03T14:52:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -290,17 +290,17 @@
"description": "CVE-2021-41773 POC with Docker",
"fork": false,
"created_at": "2021-10-06T02:30:40Z",
"updated_at": "2021-10-10T18:36:42Z",
"updated_at": "2021-11-04T23:33:40Z",
"pushed_at": "2021-10-06T03:37:20Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 3,
"watchers": 4,
"score": 0
},
{
@ -317,17 +317,17 @@
"description": "PoC for CVE-2021-41773 with docker to demonstrate",
"fork": false,
"created_at": "2021-10-06T03:01:41Z",
"updated_at": "2021-10-10T18:51:20Z",
"updated_at": "2021-11-04T23:35:58Z",
"pushed_at": "2021-10-06T05:39:24Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 2,
"watchers": 3,
"score": 0
},
{
@ -779,11 +779,11 @@
"description": "A framework for bug hunting or pentesting targeting websites that have CVE-2021-41773 Vulnerability in public ",
"fork": false,
"created_at": "2021-10-07T01:31:13Z",
"updated_at": "2021-11-04T17:05:42Z",
"updated_at": "2021-11-04T22:05:21Z",
"pushed_at": "2021-10-07T08:25:26Z",
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 10,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [
@ -794,8 +794,8 @@
"pentesting"
],
"visibility": "public",
"forks": 10,
"watchers": 31,
"forks": 11,
"watchers": 32,
"score": 0
},
{
@ -1506,10 +1506,10 @@
"description": "Tool check: CVE-2021-41773, CVE-2021-42013, CVE-2020-17519",
"fork": false,
"created_at": "2021-10-13T17:03:56Z",
"updated_at": "2021-10-29T13:34:31Z",
"updated_at": "2021-11-04T23:08:59Z",
"pushed_at": "2021-10-14T21:11:44Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
@ -1520,7 +1520,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 41,
"watchers": 42,
"score": 0
},
{
@ -1657,10 +1657,10 @@
"description": "CVE-2021-41773 Docker lab",
"fork": false,
"created_at": "2021-10-20T01:20:21Z",
"updated_at": "2021-10-22T07:27:37Z",
"updated_at": "2021-11-04T23:37:34Z",
"pushed_at": "2021-10-20T01:21:34Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -1669,7 +1669,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
},
{
@ -1914,5 +1914,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 424762276,
"name": "CVE-2021-41773-Playground",
"full_name": "Hydragyrum\/CVE-2021-41773-Playground",
"owner": {
"login": "Hydragyrum",
"id": 4928181,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4928181?v=4",
"html_url": "https:\/\/github.com\/Hydragyrum"
},
"html_url": "https:\/\/github.com\/Hydragyrum\/CVE-2021-41773-Playground",
"description": "Some docker images to play with CVE-2021-41773 and CVE-2021-42013",
"fork": false,
"created_at": "2021-11-04T22:52:44Z",
"updated_at": "2021-11-04T23:39:42Z",
"pushed_at": "2021-11-04T22:56:14Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,8 +13,8 @@
"description": "WIP kernel exploit for minor bug i found in amd gpu driver",
"fork": false,
"created_at": "2021-10-28T21:10:29Z",
"updated_at": "2021-11-04T04:25:48Z",
"pushed_at": "2021-11-04T04:25:45Z",
"updated_at": "2021-11-04T20:18:03Z",
"pushed_at": "2021-11-04T20:18:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,17 +13,17 @@
"description": "Generate malicious files using recently published homoglyphic-attack (CVE-2021-42694)",
"fork": false,
"created_at": "2021-11-02T20:39:47Z",
"updated_at": "2021-11-04T02:50:31Z",
"updated_at": "2021-11-04T23:49:47Z",
"pushed_at": "2021-11-03T18:32:32Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 7,
"watchers": 9,
"score": 0
}
]

View file

@ -3081,6 +3081,7 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
- [mr-exo/CVE-2021-41773](https://github.com/mr-exo/CVE-2021-41773)
- [Balgogan/CVE-2021-41773](https://github.com/Balgogan/CVE-2021-41773)
- [wolf1892/CVE-2021-41773](https://github.com/wolf1892/CVE-2021-41773)
- [Hydragyrum/CVE-2021-41773-Playground](https://github.com/Hydragyrum/CVE-2021-41773-Playground)
### CVE-2021-41822
- [badboycxcc/CVE-2021-41822](https://github.com/badboycxcc/CVE-2021-41822)
@ -8887,7 +8888,6 @@ The ES File Explorer File Manager application through 4.1.9.7.4 for Android allo
- [SandaRuFdo/ES-File-Explorer-Open-Port-Vulnerability---CVE-2019-6447](https://github.com/SandaRuFdo/ES-File-Explorer-Open-Port-Vulnerability---CVE-2019-6447)
- [N3H4L/CVE-2019-6447](https://github.com/N3H4L/CVE-2019-6447)
- [sidhawkss/ES-File-Explorer-Vulnerability-on-port-59777](https://github.com/sidhawkss/ES-File-Explorer-Vulnerability-on-port-59777)
- [mcmahonr/cve-2019-6447](https://github.com/mcmahonr/cve-2019-6447)
- [1nf1n17yk1ng/CVE-2019-6447](https://github.com/1nf1n17yk1ng/CVE-2019-6447)
- [julio-cfa/POC-ES-File-Explorer-CVE-2019-6447](https://github.com/julio-cfa/POC-ES-File-Explorer-CVE-2019-6447)
- [febinrev/CVE-2019-6447-ESfile-explorer-exploit](https://github.com/febinrev/CVE-2019-6447-ESfile-explorer-exploit)