Auto Update 2021/11/22 18:15:36

This commit is contained in:
motikan2010-bot 2021-11-23 03:15:36 +09:00
parent d05908a5fa
commit a33291975f
23 changed files with 220 additions and 67 deletions

View file

@ -13,17 +13,17 @@
"description": "MS16-032(CVE-2016-0099) for SERVICE ONLY",
"fork": false,
"created_at": "2017-03-15T17:16:55Z",
"updated_at": "2021-11-15T11:25:17Z",
"updated_at": "2021-11-22T16:27:21Z",
"pushed_at": "2017-03-15T17:24:59Z",
"stargazers_count": 79,
"watchers_count": 79,
"stargazers_count": 78,
"watchers_count": 78,
"forks_count": 45,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 45,
"watchers": 79,
"watchers": 78,
"score": 0
}
]

View file

@ -114,12 +114,12 @@
"pushed_at": "2019-03-24T11:20:27Z",
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 13,
"forks": 14,
"watchers": 29,
"score": 0
},

View file

@ -249,5 +249,32 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 430749161,
"name": "THM-Vulnerability_Capstone-CVE-2018-16763",
"full_name": "SlizBinksman\/THM-Vulnerability_Capstone-CVE-2018-16763",
"owner": {
"login": "SlizBinksman",
"id": 90923369,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90923369?v=4",
"html_url": "https:\/\/github.com\/SlizBinksman"
},
"html_url": "https:\/\/github.com\/SlizBinksman\/THM-Vulnerability_Capstone-CVE-2018-16763",
"description": "A write up on the THM room Vulnerability Capstone & Exploit script for CVE-2018-16763.",
"fork": false,
"created_at": "2021-11-22T14:53:42Z",
"updated_at": "2021-11-22T14:59:44Z",
"pushed_at": "2021-11-22T14:59:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

File diff suppressed because one or more lines are too long

View file

@ -13,17 +13,17 @@
"description": "Local privilege escalation PoC exploit for CVE-2019-16098",
"fork": false,
"created_at": "2019-09-10T15:57:36Z",
"updated_at": "2021-11-22T07:14:49Z",
"updated_at": "2021-11-22T15:47:21Z",
"pushed_at": "2019-09-13T20:05:43Z",
"stargazers_count": 139,
"watchers_count": 139,
"forks_count": 45,
"stargazers_count": 140,
"watchers_count": 140,
"forks_count": 46,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 45,
"watchers": 139,
"forks": 46,
"watchers": 140,
"score": 0
}
]

View file

@ -40,7 +40,7 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2021-11-19T19:51:01Z",
"updated_at": "2021-11-22T14:46:09Z",
"pushed_at": "2021-11-10T19:56:38Z",
"stargazers_count": 1376,
"watchers_count": 1376,
@ -1270,8 +1270,8 @@
"description": "Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example. This tool will check and exploit bug as well as restore password to original state",
"fork": false,
"created_at": "2021-01-20T21:38:47Z",
"updated_at": "2021-10-05T15:22:57Z",
"pushed_at": "2021-03-15T12:02:53Z",
"updated_at": "2021-11-22T17:41:02Z",
"pushed_at": "2021-11-22T17:40:59Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,

View file

@ -73,17 +73,17 @@
"description": "CVE-2020-5902 BIG-IP",
"fork": false,
"created_at": "2020-07-05T16:38:32Z",
"updated_at": "2021-11-18T09:33:59Z",
"updated_at": "2021-11-22T14:09:44Z",
"pushed_at": "2021-10-13T07:53:46Z",
"stargazers_count": 355,
"watchers_count": 355,
"stargazers_count": 356,
"watchers_count": 356,
"forks_count": 108,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 108,
"watchers": 355,
"watchers": 356,
"score": 0
},
{

View file

@ -17,7 +17,7 @@
"pushed_at": "2021-03-22T18:24:20Z",
"stargazers_count": 123,
"watchers_count": 123,
"forks_count": 20,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"topics": [
@ -37,7 +37,7 @@
"writeups"
],
"visibility": "public",
"forks": 20,
"forks": 21,
"watchers": 123,
"score": 0
}

View file

@ -13,17 +13,17 @@
"description": "Spring Cloud Netflix Hystrix Dashboard template resolution vulnerability CVE-2021-22053",
"fork": false,
"created_at": "2021-11-21T08:47:56Z",
"updated_at": "2021-11-22T11:01:15Z",
"updated_at": "2021-11-22T15:58:42Z",
"pushed_at": "2021-11-21T08:52:47Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 21,
"watchers": 22,
"score": 0
}
]

View file

@ -121,10 +121,10 @@
"description": "CVE-2021-22205& GitLab CE\/EE RCE",
"fork": false,
"created_at": "2021-10-29T04:30:45Z",
"updated_at": "2021-11-22T11:16:02Z",
"updated_at": "2021-11-22T15:16:34Z",
"pushed_at": "2021-11-06T05:20:30Z",
"stargazers_count": 94,
"watchers_count": 94,
"stargazers_count": 96,
"watchers_count": 96,
"forks_count": 42,
"allow_forking": true,
"is_template": false,
@ -133,7 +133,7 @@
],
"visibility": "public",
"forks": 42,
"watchers": 94,
"watchers": 96,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Apache\/Alibaba Dubbo <= 2.7.3 PoC Code for CVE-2021-25641 RCE via Deserialization of Untrusted Data; Affects Versions <= 2.7.6 With Different Gadgets",
"fork": false,
"created_at": "2021-06-06T06:41:36Z",
"updated_at": "2021-11-16T12:11:23Z",
"updated_at": "2021-11-22T17:01:52Z",
"pushed_at": "2021-06-06T08:41:19Z",
"stargazers_count": 49,
"watchers_count": 49,
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 49,
"watchers": 48,
"score": 0
}
]

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-11-18T08:33:05Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 2,
"score": 0
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-27928 MariaDB\/MySQL-'wsrep provider' 命令注入漏洞",
"fork": false,
"created_at": "2021-04-15T06:40:49Z",
"updated_at": "2021-11-21T10:16:11Z",
"updated_at": "2021-11-22T14:21:52Z",
"pushed_at": "2021-06-21T00:51:49Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 27,
"watchers": 28,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.",
"fork": false,
"created_at": "2021-05-31T18:02:39Z",
"updated_at": "2021-11-21T14:53:43Z",
"updated_at": "2021-11-22T18:00:10Z",
"pushed_at": "2021-06-01T15:08:23Z",
"stargazers_count": 201,
"watchers_count": 201,
"stargazers_count": 202,
"watchers_count": 202,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 33,
"watchers": 201,
"watchers": 202,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Exploit for CVE-2021-3129",
"fork": false,
"created_at": "2021-01-13T12:52:20Z",
"updated_at": "2021-11-18T10:39:25Z",
"updated_at": "2021-11-22T14:44:20Z",
"pushed_at": "2021-01-29T13:59:07Z",
"stargazers_count": 183,
"watchers_count": 183,
"stargazers_count": 184,
"watchers_count": 184,
"forks_count": 48,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 48,
"watchers": 183,
"watchers": 184,
"score": 0
},
{

View file

@ -1428,8 +1428,8 @@
"description": null,
"fork": false,
"created_at": "2021-10-13T17:43:51Z",
"updated_at": "2021-11-22T09:13:54Z",
"pushed_at": "2021-11-22T09:13:52Z",
"updated_at": "2021-11-22T17:31:46Z",
"pushed_at": "2021-11-22T17:31:43Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,

View file

@ -40,17 +40,17 @@
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
"fork": false,
"created_at": "2021-10-27T15:51:12Z",
"updated_at": "2021-11-21T21:50:25Z",
"updated_at": "2021-11-22T12:27:30Z",
"pushed_at": "2021-10-28T06:37:37Z",
"stargazers_count": 58,
"watchers_count": 58,
"stargazers_count": 59,
"watchers_count": 59,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 58,
"watchers": 59,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-08-28T04:21:44Z",
"updated_at": "2021-09-01T18:38:08Z",
"updated_at": "2021-11-22T15:24:53Z",
"pushed_at": "2021-08-29T14:06:28Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -233,12 +233,12 @@
"pushed_at": "2021-09-11T09:50:26Z",
"stargazers_count": 1313,
"watchers_count": 1313,
"forks_count": 425,
"forks_count": 426,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 425,
"forks": 426,
"watchers": 1313,
"score": 0
},
@ -854,5 +854,32 @@
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 430718153,
"name": "CVE-2021-40444",
"full_name": "Alexcot25051999\/CVE-2021-40444",
"owner": {
"login": "Alexcot25051999",
"id": 94846095,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94846095?v=4",
"html_url": "https:\/\/github.com\/Alexcot25051999"
},
"html_url": "https:\/\/github.com\/Alexcot25051999\/CVE-2021-40444",
"description": null,
"fork": false,
"created_at": "2021-11-22T13:29:20Z",
"updated_at": "2021-11-22T13:41:39Z",
"pushed_at": "2021-11-22T13:41:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

33
2021/CVE-2021-40531.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 429884385,
"name": "CVE-2021-40531",
"full_name": "jonpalmisc\/CVE-2021-40531",
"owner": {
"login": "jonpalmisc",
"id": 41548458,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41548458?v=4",
"html_url": "https:\/\/github.com\/jonpalmisc"
},
"html_url": "https:\/\/github.com\/jonpalmisc\/CVE-2021-40531",
"description": "A demo of exploiting CVE-2021-40531, a vulnerability in Sketch.",
"fork": false,
"created_at": "2021-11-19T17:38:34Z",
"updated_at": "2021-11-22T17:22:45Z",
"pushed_at": "2021-11-22T14:52:04Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"cve",
"macos",
"sketch"
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -81,5 +81,59 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 430704302,
"name": "CVE-2021-41277",
"full_name": "kap1ush0n\/CVE-2021-41277",
"owner": {
"login": "kap1ush0n",
"id": 94843370,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94843370?v=4",
"html_url": "https:\/\/github.com\/kap1ush0n"
},
"html_url": "https:\/\/github.com\/kap1ush0n\/CVE-2021-41277",
"description": "MetaBase 任意文件读取漏洞 fofa批量poc",
"fork": false,
"created_at": "2021-11-22T12:49:42Z",
"updated_at": "2021-11-22T12:50:17Z",
"pushed_at": "2021-11-22T12:50:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 430814901,
"name": "CVE-2021-41277",
"full_name": "z3n70\/CVE-2021-41277",
"owner": {
"login": "z3n70",
"id": 39817707,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39817707?v=4",
"html_url": "https:\/\/github.com\/z3n70"
},
"html_url": "https:\/\/github.com\/z3n70\/CVE-2021-41277",
"description": "simple program for exploit metabase",
"fork": false,
"created_at": "2021-11-22T18:06:11Z",
"updated_at": "2021-11-22T18:10:29Z",
"pushed_at": "2021-11-22T18:10:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,8 +13,8 @@
"description": "CVE-2021-43617 bypass CRF",
"fork": false,
"created_at": "2021-11-19T05:39:25Z",
"updated_at": "2021-11-19T05:41:38Z",
"pushed_at": "2021-11-19T05:41:36Z",
"updated_at": "2021-11-22T12:38:26Z",
"pushed_at": "2021-11-22T12:38:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,

View file

@ -2949,6 +2949,7 @@ Microsoft MSHTML Remote Code Execution Vulnerability
- [TiagoSergio/CVE-2021-40444](https://github.com/TiagoSergio/CVE-2021-40444)
- [0xK4gura/CVE-2021-40444-POC](https://github.com/0xK4gura/CVE-2021-40444-POC)
- [Zeop-CyberSec/word_mshtml](https://github.com/Zeop-CyberSec/word_mshtml)
- [Alexcot25051999/CVE-2021-40444](https://github.com/Alexcot25051999/CVE-2021-40444)
### CVE-2021-40449 (2021-10-12)
@ -2979,6 +2980,14 @@ A reflected XSS vulnerability exists in multiple pages in version 22 of the Gibb
### CVE-2021-40514
- [war4uthor/CVE-2021-40514](https://github.com/war4uthor/CVE-2021-40514)
### CVE-2021-40531 (2021-09-06)
<code>
Sketch before 75 mishandles external library feeds.
</code>
- [jonpalmisc/CVE-2021-40531](https://github.com/jonpalmisc/CVE-2021-40531)
### CVE-2021-40539 (2021-09-07)
<code>
@ -3034,6 +3043,8 @@ Metabase is an open source data analytics platform. In affected versions a secur
- [Seals6/CVE-2021-41277](https://github.com/Seals6/CVE-2021-41277)
- [tahtaciburak/CVE-2021-41277](https://github.com/tahtaciburak/CVE-2021-41277)
- [Henry4E36/Metabase-cve-2021-41277](https://github.com/Henry4E36/Metabase-cve-2021-41277)
- [kap1ush0n/CVE-2021-41277](https://github.com/kap1ush0n/CVE-2021-41277)
- [z3n70/CVE-2021-41277](https://github.com/z3n70/CVE-2021-41277)
### CVE-2021-41351 (2021-11-09)
@ -14504,6 +14515,7 @@ FUEL CMS 1.4.1 allows PHP Code Evaluation via the pages/select/ filter parameter
- [NeKroFR/CVE-2018-16763](https://github.com/NeKroFR/CVE-2018-16763)
- [k4is3r13/Bash-Script-CVE-2018-16763](https://github.com/k4is3r13/Bash-Script-CVE-2018-16763)
- [padsalatushal/CVE-2018-16763](https://github.com/padsalatushal/CVE-2018-16763)
- [SlizBinksman/THM-Vulnerability_Capstone-CVE-2018-16763](https://github.com/SlizBinksman/THM-Vulnerability_Capstone-CVE-2018-16763)
### CVE-2018-16843 (2018-11-07)