Auto Update 2021/11/07 12:12:48

This commit is contained in:
motikan2010-bot 2021-11-07 21:12:48 +09:00
parent 6cad8a0dd3
commit ca7cb3ca4e
22 changed files with 100 additions and 72 deletions

View file

@ -13,17 +13,17 @@
"description": "An implementation of CVE-2009-0689 for the Nintendo Wii.",
"fork": false,
"created_at": "2018-12-18T04:24:43Z",
"updated_at": "2021-11-04T17:23:09Z",
"updated_at": "2021-11-07T06:04:27Z",
"pushed_at": "2019-09-30T23:38:11Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 39,
"watchers": 40,
"score": 0
}
]

View file

@ -79,5 +79,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 425428807,
"name": "CVE-2011-2523",
"full_name": "padsalatushal\/CVE-2011-2523",
"owner": {
"login": "padsalatushal",
"id": 57517785,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57517785?v=4",
"html_url": "https:\/\/github.com\/padsalatushal"
},
"html_url": "https:\/\/github.com\/padsalatushal\/CVE-2011-2523",
"description": "Python exploit for vsftpd 2.3.4 - Backdoor Command Execution",
"fork": false,
"created_at": "2021-11-07T06:20:27Z",
"updated_at": "2021-11-07T10:53:35Z",
"pushed_at": "2021-11-07T10:16:27Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -148,8 +148,8 @@
"description": null,
"fork": false,
"created_at": "2021-11-04T02:25:57Z",
"updated_at": "2021-11-04T16:08:56Z",
"pushed_at": "2021-11-04T16:07:10Z",
"updated_at": "2021-11-07T11:35:07Z",
"pushed_at": "2021-11-07T11:35:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -114,12 +114,12 @@
"pushed_at": "2019-03-24T11:20:27Z",
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 12,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 12,
"forks": 13,
"watchers": 26,
"score": 0
},

View file

@ -237,17 +237,17 @@
"description": "Fuel CMS 1.4.1 - Remote Code Execution",
"fork": false,
"created_at": "2021-11-03T04:38:54Z",
"updated_at": "2021-11-04T05:45:23Z",
"pushed_at": "2021-11-04T05:45:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2021-11-07T10:53:30Z",
"pushed_at": "2021-11-07T10:48:50Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": "漏洞POC、EXP合集持续更新。ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露、ConfluenceRCECVE-2021-26084、ZeroShell防火墙RCECVE-2019-12725",
"fork": false,
"created_at": "2021-05-22T05:06:33Z",
"updated_at": "2021-11-07T06:04:04Z",
"updated_at": "2021-11-07T07:06:26Z",
"pushed_at": "2021-09-22T02:19:32Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 34,
"watchers": 33,
"score": 0
},
{

View file

@ -44,12 +44,12 @@
"pushed_at": "2021-09-27T14:26:16Z",
"stargazers_count": 216,
"watchers_count": 216,
"forks_count": 60,
"forks_count": 61,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 60,
"forks": 61,
"watchers": 216,
"score": 0
},

View file

@ -67,17 +67,17 @@
"description": null,
"fork": false,
"created_at": "2021-10-27T09:40:32Z",
"updated_at": "2021-10-27T11:37:41Z",
"updated_at": "2021-11-07T10:53:41Z",
"pushed_at": "2021-10-27T11:37:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -260,12 +260,12 @@
"pushed_at": "2020-02-22T01:58:22Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 10,
"score": 0
},

View file

@ -40,7 +40,7 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2021-11-06T20:44:39Z",
"updated_at": "2021-11-07T07:14:44Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1449,
"watchers_count": 1449,
@ -855,17 +855,17 @@
"description": "PrintNightMare LPE提权漏洞的CS 反射加载插件。开箱即用、通过内存加载、混淆加载的驱动名称来ByPass Defender\/EDR。",
"fork": false,
"created_at": "2021-09-01T11:25:04Z",
"updated_at": "2021-11-05T14:47:09Z",
"updated_at": "2021-11-07T07:08:44Z",
"pushed_at": "2021-09-01T11:25:22Z",
"stargazers_count": 103,
"watchers_count": 103,
"stargazers_count": 102,
"watchers_count": 102,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 103,
"watchers": 102,
"score": 0
},
{

View file

@ -44,12 +44,12 @@
"pushed_at": "2021-03-08T11:41:19Z",
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 22,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 22,
"forks": 23,
"watchers": 45,
"score": 0
},

View file

@ -40,8 +40,8 @@
"description": "XMLRPC - RCE in MovableTypePoC",
"fork": false,
"created_at": "2021-10-30T09:15:56Z",
"updated_at": "2021-11-06T18:35:46Z",
"pushed_at": "2021-11-06T18:35:43Z",
"updated_at": "2021-11-07T10:53:15Z",
"pushed_at": "2021-11-07T10:53:12Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 8,

View file

@ -121,10 +121,10 @@
"description": "CVE-2021-22205& GitLab CE\/EE RCE",
"fork": false,
"created_at": "2021-10-29T04:30:45Z",
"updated_at": "2021-11-06T20:48:33Z",
"updated_at": "2021-11-07T06:22:16Z",
"pushed_at": "2021-11-06T05:20:30Z",
"stargazers_count": 58,
"watchers_count": 58,
"stargazers_count": 59,
"watchers_count": 59,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
@ -133,7 +133,7 @@
],
"visibility": "public",
"forks": 25,
"watchers": 58,
"watchers": 59,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "漏洞POC、EXP合集持续更新。ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露、ConfluenceRCECVE-2021-26084、ZeroShell防火墙RCECVE-2019-12725",
"fork": false,
"created_at": "2021-05-22T05:06:33Z",
"updated_at": "2021-11-07T06:04:04Z",
"updated_at": "2021-11-07T07:06:26Z",
"pushed_at": "2021-09-22T02:19:32Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 34,
"watchers": 33,
"score": 0
},
{
@ -67,17 +67,17 @@
"description": null,
"fork": false,
"created_at": "2021-08-31T23:33:44Z",
"updated_at": "2021-11-04T01:10:48Z",
"updated_at": "2021-11-07T06:42:21Z",
"pushed_at": "2021-09-01T01:01:06Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 52,
"watchers_count": 52,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 51,
"watchers": 52,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-01-29T13:59:07Z",
"stargazers_count": 178,
"watchers_count": 178,
"forks_count": 45,
"forks_count": 46,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 45,
"forks": 46,
"watchers": 178,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.",
"fork": false,
"created_at": "2021-05-04T17:15:58Z",
"updated_at": "2021-11-06T10:04:18Z",
"updated_at": "2021-11-07T11:58:42Z",
"pushed_at": "2021-05-10T20:42:33Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 47,
"watchers": 48,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "A Python program implementing and exploiting the Minsky Turing machine considered in the paper \"Intrinsic Propensity for Vulnerability in Computers? Arbitrary Code Execution in the Universal Turing Machine\" as per CVE-2021-32471 (https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-32471)",
"fork": false,
"created_at": "2021-01-21T10:39:42Z",
"updated_at": "2021-09-19T17:44:29Z",
"updated_at": "2021-11-07T11:25:11Z",
"pushed_at": "2021-05-30T05:25:24Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 58,
"watchers_count": 58,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 57,
"watchers": 58,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
"fork": false,
"created_at": "2021-10-27T15:51:12Z",
"updated_at": "2021-11-05T09:46:06Z",
"updated_at": "2021-11-07T06:40:58Z",
"pushed_at": "2021-10-28T06:37:37Z",
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 17,
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 46,
"forks": 18,
"watchers": 47,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Apache Druid 任意文件读取",
"fork": false,
"created_at": "2021-10-14T03:47:02Z",
"updated_at": "2021-11-07T01:58:56Z",
"updated_at": "2021-11-07T06:33:12Z",
"pushed_at": "2021-10-15T02:31:03Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 16,
"watchers": 17,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-11-05T03:17:58Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"forks": 8,
"watchers": 14,
"score": 0
}

View file

@ -779,10 +779,10 @@
"description": "A framework for bug hunting or pentesting targeting websites that have CVE-2021-41773 Vulnerability in public ",
"fork": false,
"created_at": "2021-10-07T01:31:13Z",
"updated_at": "2021-11-04T22:05:21Z",
"updated_at": "2021-11-07T10:26:41Z",
"pushed_at": "2021-10-07T08:25:26Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
@ -795,7 +795,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 32,
"watchers": 33,
"score": 0
},
{

View file

@ -20899,6 +20899,7 @@ vsftpd 2.3.4 downloaded between 20110630 and 20110703 contains a backdoor which
- [HerculesRD/vsftpd2.3.4PyExploit](https://github.com/HerculesRD/vsftpd2.3.4PyExploit)
- [nobodyatall648/CVE-2011-2523](https://github.com/nobodyatall648/CVE-2011-2523)
- [Gr4ykt/CVE-2011-2523](https://github.com/Gr4ykt/CVE-2011-2523)
- [padsalatushal/CVE-2011-2523](https://github.com/padsalatushal/CVE-2011-2523)
### CVE-2011-2894 (2011-10-04)