Auto Update 2021/12/15 00:13:47

This commit is contained in:
motikan2010-bot 2021-12-15 09:13:47 +09:00
parent d2d132b5f8
commit ca9302db68
24 changed files with 560 additions and 346 deletions

View file

@ -25,5 +25,32 @@
"forks": 7,
"watchers": 13,
"score": 0
},
{
"id": 205628184,
"name": "CVE-2006-6184",
"full_name": "b03902043\/CVE-2006-6184",
"owner": {
"login": "b03902043",
"id": 9023845,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9023845?v=4",
"html_url": "https:\/\/github.com\/b03902043"
},
"html_url": "https:\/\/github.com\/b03902043\/CVE-2006-6184",
"description": "simplified version of https:\/\/github.com\/shauntdergrigorian\/cve-2006-6184",
"fork": false,
"created_at": "2019-09-01T04:18:53Z",
"updated_at": "2019-09-01T04:23:25Z",
"pushed_at": "2019-09-01T04:23:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
}
]

View file

@ -98,10 +98,10 @@
"description": ":poodle: Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566 :poodle:",
"fork": false,
"created_at": "2015-02-03T20:28:27Z",
"updated_at": "2021-12-08T06:17:20Z",
"updated_at": "2021-12-14T21:00:36Z",
"pushed_at": "2020-07-21T09:46:40Z",
"stargazers_count": 206,
"watchers_count": 206,
"stargazers_count": 207,
"watchers_count": 207,
"forks_count": 65,
"allow_forking": true,
"is_template": false,
@ -116,7 +116,7 @@
],
"visibility": "public",
"forks": 65,
"watchers": 206,
"watchers": 207,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "MailMasta wordpress plugin Local File Inclusion vulnerability (CVE-2016-10956)",
"fork": false,
"created_at": "2021-12-10T16:06:46Z",
"updated_at": "2021-12-14T17:52:13Z",
"pushed_at": "2021-12-14T17:51:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2021-12-14T21:38:46Z",
"pushed_at": "2021-12-14T19:22:18Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -71,12 +71,12 @@
"pushed_at": "2021-02-03T16:03:40Z",
"stargazers_count": 885,
"watchers_count": 885,
"forks_count": 409,
"forks_count": 410,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 409,
"forks": 410,
"watchers": 885,
"score": 0
},

View file

@ -17,12 +17,12 @@
"pushed_at": "2020-06-11T00:16:40Z",
"stargazers_count": 36,
"watchers_count": 36,
"forks_count": 57,
"forks_count": 58,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 57,
"forks": 58,
"watchers": 36,
"score": 0
}

View file

@ -1576,7 +1576,7 @@
"fork": false,
"created_at": "2019-08-15T22:27:23Z",
"updated_at": "2019-09-07T02:06:14Z",
"pushed_at": "2021-12-10T01:21:07Z",
"pushed_at": "2021-12-14T21:31:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,17 +13,17 @@
"description": "CVE-2017-5645 - Apache Log4j RCE due Insecure Deserialization",
"fork": false,
"created_at": "2017-08-04T01:12:47Z",
"updated_at": "2021-12-14T00:41:46Z",
"updated_at": "2021-12-14T23:50:18Z",
"pushed_at": "2018-11-18T11:14:20Z",
"stargazers_count": 93,
"watchers_count": 93,
"stargazers_count": 94,
"watchers_count": 94,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 93,
"watchers": 94,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2017-9506 - SSRF",
"fork": false,
"created_at": "2018-04-25T11:25:18Z",
"updated_at": "2021-12-07T14:43:25Z",
"updated_at": "2021-12-14T20:54:10Z",
"pushed_at": "2018-04-26T12:47:54Z",
"stargazers_count": 166,
"watchers_count": 166,
"stargazers_count": 167,
"watchers_count": 167,
"forks_count": 47,
"allow_forking": true,
"is_template": false,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 47,
"watchers": 166,
"watchers": 167,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.",
"fork": false,
"created_at": "2018-06-21T15:44:29Z",
"updated_at": "2021-12-13T07:33:50Z",
"updated_at": "2021-12-14T22:39:39Z",
"pushed_at": "2020-01-30T12:52:42Z",
"stargazers_count": 189,
"watchers_count": 189,
"stargazers_count": 188,
"watchers_count": 188,
"forks_count": 71,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 71,
"watchers": 189,
"watchers": 188,
"score": 0
},
{

View file

@ -121,17 +121,17 @@
"description": "Script to identify hosts vulnerable to CVE-2018-10933",
"fork": false,
"created_at": "2018-10-17T23:05:10Z",
"updated_at": "2021-12-10T05:36:01Z",
"updated_at": "2021-12-14T22:30:55Z",
"pushed_at": "2018-11-04T17:29:33Z",
"stargazers_count": 231,
"watchers_count": 231,
"stargazers_count": 230,
"watchers_count": 230,
"forks_count": 54,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 54,
"watchers": 231,
"watchers": 230,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2019-08-01T16:02:59Z",
"stargazers_count": 265,
"watchers_count": 265,
"forks_count": 100,
"forks_count": 101,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 100,
"forks": 101,
"watchers": 265,
"score": 0
},

View file

@ -40,17 +40,17 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2021-12-14T00:00:44Z",
"updated_at": "2021-12-14T22:25:16Z",
"pushed_at": "2021-12-08T10:31:54Z",
"stargazers_count": 1390,
"watchers_count": 1390,
"stargazers_count": 1391,
"watchers_count": 1391,
"forks_count": 313,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 313,
"watchers": 1390,
"watchers": 1391,
"score": 0
},
{

View file

@ -95,7 +95,7 @@
"fork": false,
"created_at": "2020-07-14T02:42:41Z",
"updated_at": "2021-10-07T23:36:52Z",
"pushed_at": "2021-12-10T01:50:50Z",
"pushed_at": "2021-12-14T21:57:44Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 5,

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-06-05T15:42:16Z",
"updated_at": "2021-12-07T05:19:14Z",
"updated_at": "2021-12-14T18:54:51Z",
"pushed_at": "2021-11-02T14:45:24Z",
"stargazers_count": 167,
"watchers_count": 167,
"stargazers_count": 168,
"watchers_count": 168,
"forks_count": 40,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 40,
"watchers": 167,
"watchers": 168,
"score": 0
},
{

View file

@ -1158,7 +1158,7 @@
"description": "CVE-2021-3156 - Sudo Baron Samedit",
"fork": false,
"created_at": "2021-04-29T06:29:26Z",
"updated_at": "2021-12-14T15:45:57Z",
"updated_at": "2021-12-14T19:48:06Z",
"pushed_at": "2021-08-11T15:52:19Z",
"stargazers_count": 111,
"watchers_count": 111,

View file

@ -44,12 +44,12 @@
"pushed_at": "2021-10-18T16:09:44Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 8,
"score": 0
}

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-10-11T15:23:39Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 3,
"score": 0
}

View file

@ -1,29 +0,0 @@
[
{
"id": 397689060,
"name": "CVE-2021-39281",
"full_name": "grahamhelton\/CVE-2021-39281",
"owner": {
"login": "grahamhelton",
"id": 19278569,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19278569?v=4",
"html_url": "https:\/\/github.com\/grahamhelton"
},
"html_url": "https:\/\/github.com\/grahamhelton\/CVE-2021-39281",
"description": "Documentation for cve-2021-39281",
"fork": false,
"created_at": "2021-08-18T17:49:20Z",
"updated_at": "2021-10-06T19:35:20Z",
"pushed_at": "2021-08-20T22:19:26Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2021-10-16T16:17:44Z",
"updated_at": "2021-12-14T17:43:06Z",
"updated_at": "2021-12-14T22:54:50Z",
"pushed_at": "2021-11-11T17:09:56Z",
"stargazers_count": 347,
"watchers_count": 347,
"stargazers_count": 348,
"watchers_count": 348,
"forks_count": 76,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 76,
"watchers": 347,
"watchers": 348,
"score": 0
},
{

View file

@ -262,10 +262,10 @@
"description": "Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE",
"fork": false,
"created_at": "2021-10-06T02:28:41Z",
"updated_at": "2021-12-10T06:06:40Z",
"updated_at": "2021-12-14T19:49:48Z",
"pushed_at": "2021-10-09T19:37:29Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
@ -279,7 +279,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 15,
"watchers": 14,
"score": 0
},
{

View file

@ -13,11 +13,11 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-11T15:10:30Z",
"updated_at": "2021-12-14T17:57:11Z",
"updated_at": "2021-12-15T00:09:43Z",
"pushed_at": "2021-12-11T15:43:11Z",
"stargazers_count": 419,
"watchers_count": 419,
"forks_count": 85,
"stargazers_count": 442,
"watchers_count": 442,
"forks_count": 87,
"allow_forking": true,
"is_template": false,
"topics": [
@ -27,8 +27,8 @@
"s4u2self"
],
"visibility": "public",
"forks": 85,
"watchers": 419,
"forks": 87,
"watchers": 442,
"score": 0
},
{
@ -45,17 +45,17 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2021-12-14T17:39:51Z",
"updated_at": "2021-12-14T19:24:04Z",
"pushed_at": "2021-12-14T03:36:08Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 71,
"watchers_count": 71,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 70,
"watchers": 71,
"score": 0
},
{
@ -99,17 +99,17 @@
"description": "Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)",
"fork": false,
"created_at": "2021-12-13T23:15:05Z",
"updated_at": "2021-12-14T17:24:07Z",
"updated_at": "2021-12-14T22:58:15Z",
"pushed_at": "2021-12-13T23:15:47Z",
"stargazers_count": 72,
"watchers_count": 72,
"forks_count": 10,
"stargazers_count": 82,
"watchers_count": 82,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 72,
"forks": 11,
"watchers": 82,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
"updated_at": "2021-12-14T17:19:31Z",
"updated_at": "2021-12-14T23:19:01Z",
"pushed_at": "2021-12-12T10:50:54Z",
"stargazers_count": 814,
"watchers_count": 814,
"forks_count": 212,
"stargazers_count": 824,
"watchers_count": 824,
"forks_count": 215,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 212,
"watchers": 814,
"forks": 215,
"watchers": 824,
"score": 0
}
]

File diff suppressed because it is too large Load diff

View file

@ -2881,9 +2881,6 @@ In XeroSecurity Sn1per 9.0 (free version), insecure permissions (0777) are set u
- [nikip72/CVE-2021-39273-CVE-2021-39274](https://github.com/nikip72/CVE-2021-39273-CVE-2021-39274)
### CVE-2021-39281
- [grahamhelton/CVE-2021-39281](https://github.com/grahamhelton/CVE-2021-39281)
### CVE-2021-39287
- [Fearless523/CVE-2021-39287-Stored-XSS](https://github.com/Fearless523/CVE-2021-39287-Stored-XSS)
@ -3785,7 +3782,7 @@ Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and
- [zzzz0317/log4j2-vulnerable-spring-app](https://github.com/zzzz0317/log4j2-vulnerable-spring-app)
- [datadavev/test-44228](https://github.com/datadavev/test-44228)
- [zhangxvx/Log4j-Rec-CVE-2021-44228](https://github.com/zhangxvx/Log4j-Rec-CVE-2021-44228)
- [darkarnium/CVE-2021-44228](https://github.com/darkarnium/CVE-2021-44228)
- [darkarnium/Log4j-CVE-Detect](https://github.com/darkarnium/Log4j-CVE-Detect)
- [chilliwebs/CVE-2021-44228_Example](https://github.com/chilliwebs/CVE-2021-44228_Example)
- [irgoncalves/f5-waf-enforce-sig-CVE-2021-44228](https://github.com/irgoncalves/f5-waf-enforce-sig-CVE-2021-44228)
- [jeffbryner/log4j-docker-vaccine](https://github.com/jeffbryner/log4j-docker-vaccine)
@ -3881,7 +3878,6 @@ Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and
- [yanghaoi/CVE-2021-44228_Log4Shell](https://github.com/yanghaoi/CVE-2021-44228_Log4Shell)
- [lfama/log4j_checker](https://github.com/lfama/log4j_checker)
- [threatmonit/Log4j-IOCs](https://github.com/threatmonit/Log4j-IOCs)
- [mcedica/fix-cve-2021-44228](https://github.com/mcedica/fix-cve-2021-44228)
- [ben-smash/l4j-info](https://github.com/ben-smash/l4j-info)
- [strawhatasif/log4j-test](https://github.com/strawhatasif/log4j-test)
- [giterlizzi/nmap-log4shell](https://github.com/giterlizzi/nmap-log4shell)
@ -3921,6 +3917,14 @@ Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and
- [yanicksenn/CVE-2021-44228](https://github.com/yanicksenn/CVE-2021-44228)
- [municipalparkingservices/CVE-2021-44228-Scanner](https://github.com/municipalparkingservices/CVE-2021-44228-Scanner)
- [BinaryDefense/log4j-honeypot-flask](https://github.com/BinaryDefense/log4j-honeypot-flask)
- [MalwareTech/Log4jTools](https://github.com/MalwareTech/Log4jTools)
- [mufeedvh/log4jail](https://github.com/mufeedvh/log4jail)
- [csduncan9/Log4j-CVE-2021-44228-command-generator](https://github.com/csduncan9/Log4j-CVE-2021-44228-command-generator)
- [guerzon/log4shellpoc](https://github.com/guerzon/log4shellpoc)
- [ab0x90/CVE-2021-44228_PoC](https://github.com/ab0x90/CVE-2021-44228_PoC)
- [razz0r/CVE-2021-44228-Mass-RCE](https://github.com/razz0r/CVE-2021-44228-Mass-RCE)
- [xsultan/log4jshield](https://github.com/xsultan/log4jshield)
- [CERTCC/CVE-2021-44228_scanner](https://github.com/CERTCC/CVE-2021-44228_scanner)
### CVE-2021-44827
- [full-disclosure/CVE-2021-44827](https://github.com/full-disclosure/CVE-2021-44827)
@ -22380,6 +22384,7 @@ Multiple stack-based buffer overflows in Allied Telesyn TFTP Server (AT-TFTP) 1.
</code>
- [shauntdergrigorian/cve-2006-6184](https://github.com/shauntdergrigorian/cve-2006-6184)
- [b03902043/CVE-2006-6184](https://github.com/b03902043/CVE-2006-6184)
## 2005