Auto Update 2021/09/22 06:14:45

This commit is contained in:
motikan2010-bot 2021-09-22 06:14:45 +09:00
parent 78ac894b79
commit cc100e9fd8
12 changed files with 74 additions and 49 deletions

View file

@ -37,14 +37,14 @@
"description": "This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included function will help you to get only the important information.", "description": "This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included function will help you to get only the important information.",
"fork": false, "fork": false,
"created_at": "2020-12-04T11:44:22Z", "created_at": "2020-12-04T11:44:22Z",
"updated_at": "2021-02-07T15:20:41Z", "updated_at": "2021-09-21T16:48:45Z",
"pushed_at": "2020-12-04T12:19:11Z", "pushed_at": "2020-12-04T12:19:11Z",
"stargazers_count": 7, "stargazers_count": 8,
"watchers_count": 7, "watchers_count": 8,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"forks": 1, "forks": 1,
"watchers": 7, "watchers": 8,
"score": 0 "score": 0
} }
] ]

View file

@ -325,14 +325,14 @@
"description": "Test for SSL heartbeat vulnerability (CVE-2014-0160)", "description": "Test for SSL heartbeat vulnerability (CVE-2014-0160)",
"fork": false, "fork": false,
"created_at": "2014-04-09T15:59:14Z", "created_at": "2014-04-09T15:59:14Z",
"updated_at": "2021-09-12T02:04:21Z", "updated_at": "2021-09-21T15:20:53Z",
"pushed_at": "2014-07-10T21:17:22Z", "pushed_at": "2014-07-10T21:17:22Z",
"stargazers_count": 135, "stargazers_count": 136,
"watchers_count": 135, "watchers_count": 136,
"forks_count": 79, "forks_count": 79,
"allow_forking": true, "allow_forking": true,
"forks": 79, "forks": 79,
"watchers": 135, "watchers": 136,
"score": 0 "score": 0
}, },
{ {

View file

@ -17,9 +17,9 @@
"pushed_at": "2020-01-10T10:58:44Z", "pushed_at": "2020-01-10T10:58:44Z",
"stargazers_count": 22, "stargazers_count": 22,
"watchers_count": 22, "watchers_count": 22,
"forks_count": 4, "forks_count": 5,
"allow_forking": true, "allow_forking": true,
"forks": 4, "forks": 5,
"watchers": 22, "watchers": 22,
"score": 0 "score": 0
}, },

View file

@ -109,14 +109,14 @@
"description": "Exploit Code for CVE-2020-1472 aka Zerologon", "description": "Exploit Code for CVE-2020-1472 aka Zerologon",
"fork": false, "fork": false,
"created_at": "2020-09-14T16:57:49Z", "created_at": "2020-09-14T16:57:49Z",
"updated_at": "2021-09-21T07:54:36Z", "updated_at": "2021-09-21T19:26:52Z",
"pushed_at": "2020-11-05T16:37:20Z", "pushed_at": "2020-11-05T16:37:20Z",
"stargazers_count": 271, "stargazers_count": 272,
"watchers_count": 271, "watchers_count": 272,
"forks_count": 48, "forks_count": 48,
"allow_forking": true, "allow_forking": true,
"forks": 48, "forks": 48,
"watchers": 271, "watchers": 272,
"score": 0 "score": 0
}, },
{ {

View file

@ -421,14 +421,14 @@
"description": "Detection of RCE in Oracle's WebLogic Server CVE-2020-14882 \/ CVE-2020-14750", "description": "Detection of RCE in Oracle's WebLogic Server CVE-2020-14882 \/ CVE-2020-14750",
"fork": false, "fork": false,
"created_at": "2020-11-12T06:59:54Z", "created_at": "2020-11-12T06:59:54Z",
"updated_at": "2021-06-22T16:36:19Z", "updated_at": "2021-09-21T20:14:09Z",
"pushed_at": "2020-12-02T21:43:52Z", "pushed_at": "2020-12-02T21:43:52Z",
"stargazers_count": 3, "stargazers_count": 4,
"watchers_count": 3, "watchers_count": 4,
"forks_count": 3, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
"forks": 3, "forks": 3,
"watchers": 3, "watchers": 4,
"score": 0 "score": 0
}, },
{ {

View file

@ -541,14 +541,14 @@
"description": "CVE-2021-1675 (PrintNightmare)", "description": "CVE-2021-1675 (PrintNightmare)",
"fork": false, "fork": false,
"created_at": "2021-07-05T14:17:03Z", "created_at": "2021-07-05T14:17:03Z",
"updated_at": "2021-09-17T03:54:34Z", "updated_at": "2021-09-21T19:37:26Z",
"pushed_at": "2021-07-05T14:34:34Z", "pushed_at": "2021-07-05T14:34:34Z",
"stargazers_count": 56, "stargazers_count": 57,
"watchers_count": 56, "watchers_count": 57,
"forks_count": 22, "forks_count": 22,
"allow_forking": true, "allow_forking": true,
"forks": 22, "forks": 22,
"watchers": 56, "watchers": 57,
"score": 0 "score": 0
}, },
{ {

View file

@ -109,14 +109,14 @@
"description": "Confluence Server Webwork OGNL injection", "description": "Confluence Server Webwork OGNL injection",
"fork": false, "fork": false,
"created_at": "2021-09-01T07:15:17Z", "created_at": "2021-09-01T07:15:17Z",
"updated_at": "2021-09-18T16:15:41Z", "updated_at": "2021-09-21T20:38:34Z",
"pushed_at": "2021-09-10T19:42:33Z", "pushed_at": "2021-09-10T19:42:33Z",
"stargazers_count": 218, "stargazers_count": 219,
"watchers_count": 218, "watchers_count": 219,
"forks_count": 52, "forks_count": 52,
"allow_forking": true, "allow_forking": true,
"forks": 52, "forks": 52,
"watchers": 218, "watchers": 219,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,14 +13,14 @@
"description": "PoC CVE-2021-30632 - Out of bounds write in V8", "description": "PoC CVE-2021-30632 - Out of bounds write in V8",
"fork": false, "fork": false,
"created_at": "2021-09-20T09:49:51Z", "created_at": "2021-09-20T09:49:51Z",
"updated_at": "2021-09-21T14:19:24Z", "updated_at": "2021-09-21T19:49:01Z",
"pushed_at": "2021-09-20T09:52:06Z", "pushed_at": "2021-09-20T09:52:06Z",
"stargazers_count": 13, "stargazers_count": 15,
"watchers_count": 13, "watchers_count": 15,
"forks_count": 3, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
"forks": 3, "forks": 3,
"watchers": 13, "watchers": 15,
"score": 0 "score": 0
} }
] ]

View file

@ -13,14 +13,14 @@
"description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.", "description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
"fork": false, "fork": false,
"created_at": "2021-05-16T16:15:56Z", "created_at": "2021-05-16T16:15:56Z",
"updated_at": "2021-09-19T05:15:47Z", "updated_at": "2021-09-21T18:57:23Z",
"pushed_at": "2021-06-12T08:27:09Z", "pushed_at": "2021-06-12T08:27:09Z",
"stargazers_count": 775, "stargazers_count": 776,
"watchers_count": 775, "watchers_count": 776,
"forks_count": 127, "forks_count": 127,
"allow_forking": true, "allow_forking": true,
"forks": 127, "forks": 127,
"watchers": 775, "watchers": 776,
"score": 0 "score": 0
}, },
{ {

View file

@ -166,5 +166,29 @@
"forks": 1, "forks": 1,
"watchers": 1, "watchers": 1,
"score": 0 "score": 0
},
{
"id": 408518731,
"name": "CVE-2021-38647",
"full_name": "AlteredSecurity\/CVE-2021-38647",
"owner": {
"login": "AlteredSecurity",
"id": 71595940,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71595940?v=4",
"html_url": "https:\/\/github.com\/AlteredSecurity"
},
"html_url": "https:\/\/github.com\/AlteredSecurity\/CVE-2021-38647",
"description": "CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD",
"fork": false,
"created_at": "2021-09-20T16:29:48Z",
"updated_at": "2021-09-21T20:23:26Z",
"pushed_at": "2021-09-21T15:49:36Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 3,
"allow_forking": true,
"forks": 3,
"watchers": 5,
"score": 0
} }
] ]

View file

@ -205,7 +205,7 @@
"description": "CVE-2021-40444 PoC", "description": "CVE-2021-40444 PoC",
"fork": false, "fork": false,
"created_at": "2021-09-10T16:55:53Z", "created_at": "2021-09-10T16:55:53Z",
"updated_at": "2021-09-21T11:19:45Z", "updated_at": "2021-09-21T19:19:27Z",
"pushed_at": "2021-09-11T09:50:26Z", "pushed_at": "2021-09-11T09:50:26Z",
"stargazers_count": 1161, "stargazers_count": 1161,
"watchers_count": 1161, "watchers_count": 1161,
@ -373,14 +373,14 @@
"description": "This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit", "description": "This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit",
"fork": false, "fork": false,
"created_at": "2021-09-12T18:05:53Z", "created_at": "2021-09-12T18:05:53Z",
"updated_at": "2021-09-19T06:43:12Z", "updated_at": "2021-09-21T19:23:24Z",
"pushed_at": "2021-09-15T16:34:35Z", "pushed_at": "2021-09-15T16:34:35Z",
"stargazers_count": 148, "stargazers_count": 149,
"watchers_count": 148, "watchers_count": 149,
"forks_count": 39, "forks_count": 39,
"allow_forking": true, "allow_forking": true,
"forks": 39, "forks": 39,
"watchers": 148, "watchers": 149,
"score": 0 "score": 0
}, },
{ {
@ -493,14 +493,14 @@
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit", "description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
"fork": false, "fork": false,
"created_at": "2021-09-15T22:34:35Z", "created_at": "2021-09-15T22:34:35Z",
"updated_at": "2021-09-21T03:20:46Z", "updated_at": "2021-09-21T17:03:16Z",
"pushed_at": "2021-09-16T11:16:34Z", "pushed_at": "2021-09-16T11:16:34Z",
"stargazers_count": 319, "stargazers_count": 323,
"watchers_count": 319, "watchers_count": 323,
"forks_count": 66, "forks_count": 68,
"allow_forking": true, "allow_forking": true,
"forks": 66, "forks": 68,
"watchers": 319, "watchers": 323,
"score": 0 "score": 0
}, },
{ {
@ -565,14 +565,14 @@
"description": "Modified code so that we don´t need to rely on CAB archives", "description": "Modified code so that we don´t need to rely on CAB archives",
"fork": false, "fork": false,
"created_at": "2021-09-19T19:46:28Z", "created_at": "2021-09-19T19:46:28Z",
"updated_at": "2021-09-21T15:05:50Z", "updated_at": "2021-09-21T20:09:55Z",
"pushed_at": "2021-09-19T23:26:34Z", "pushed_at": "2021-09-19T23:26:34Z",
"stargazers_count": 9, "stargazers_count": 10,
"watchers_count": 9, "watchers_count": 10,
"forks_count": 4, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
"forks": 4, "forks": 4,
"watchers": 9, "watchers": 10,
"score": 0 "score": 0
} }
] ]

View file

@ -2242,6 +2242,7 @@ Open Management Infrastructure Remote Code Execution Vulnerability
- [marcosimioni/omigood](https://github.com/marcosimioni/omigood) - [marcosimioni/omigood](https://github.com/marcosimioni/omigood)
- [craig-m-unsw/omigod-lab](https://github.com/craig-m-unsw/omigod-lab) - [craig-m-unsw/omigod-lab](https://github.com/craig-m-unsw/omigod-lab)
- [SimenBai/CVE-2021-38647-POC-and-Demo-environment](https://github.com/SimenBai/CVE-2021-38647-POC-and-Demo-environment) - [SimenBai/CVE-2021-38647-POC-and-Demo-environment](https://github.com/SimenBai/CVE-2021-38647-POC-and-Demo-environment)
- [AlteredSecurity/CVE-2021-38647](https://github.com/AlteredSecurity/CVE-2021-38647)
### CVE-2021-38699 (2021-08-15) ### CVE-2021-38699 (2021-08-15)