Auto Update 2021/11/10 18:13:30

This commit is contained in:
motikan2010-bot 2021-11-11 03:13:30 +09:00
parent 8f2bdfad4a
commit cf1739dd06
31 changed files with 228 additions and 194 deletions

View file

@ -13,10 +13,10 @@
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
"fork": false,
"created_at": "2013-09-22T21:20:31Z",
"updated_at": "2021-11-06T20:09:39Z",
"updated_at": "2021-11-10T16:52:32Z",
"pushed_at": "2017-04-24T14:16:56Z",
"stargazers_count": 324,
"watchers_count": 324,
"stargazers_count": 325,
"watchers_count": 325,
"forks_count": 99,
"allow_forking": true,
"is_template": false,
@ -25,7 +25,7 @@
],
"visibility": "public",
"forks": 99,
"watchers": 324,
"watchers": 325,
"score": 0
},
{

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-11-10T06:36:00Z",
"updated_at": "2021-11-10T16:58:06Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1212,
"watchers_count": 1212,
"stargazers_count": 1213,
"watchers_count": 1213,
"forks_count": 270,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 270,
"watchers": 1212,
"watchers": 1213,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-11-10T06:36:00Z",
"updated_at": "2021-11-10T16:58:06Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1212,
"watchers_count": 1212,
"stargazers_count": 1213,
"watchers_count": 1213,
"forks_count": 270,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 270,
"watchers": 1212,
"watchers": 1213,
"score": 0
},
{

View file

@ -243,7 +243,7 @@
"pushed_at": "2017-03-21T16:46:38Z",
"stargazers_count": 238,
"watchers_count": 238,
"forks_count": 112,
"forks_count": 113,
"allow_forking": true,
"is_template": false,
"topics": [
@ -252,7 +252,7 @@
"dirtycow"
],
"visibility": "public",
"forks": 112,
"forks": 113,
"watchers": 238,
"score": 0
},

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-11-10T06:36:00Z",
"updated_at": "2021-11-10T16:58:06Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1212,
"watchers_count": 1212,
"stargazers_count": 1213,
"watchers_count": 1213,
"forks_count": 270,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 270,
"watchers": 1212,
"watchers": 1213,
"score": 0
},
{

View file

@ -77,12 +77,12 @@
"pushed_at": "2021-05-21T23:46:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
},

View file

@ -530,10 +530,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-11-10T06:36:00Z",
"updated_at": "2021-11-10T16:58:06Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1212,
"watchers_count": 1212,
"stargazers_count": 1213,
"watchers_count": 1213,
"forks_count": 270,
"allow_forking": true,
"is_template": false,
@ -561,7 +561,7 @@
],
"visibility": "public",
"forks": 270,
"watchers": 1212,
"watchers": 1213,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2019-1040 with Exchange",
"fork": false,
"created_at": "2019-06-14T11:16:03Z",
"updated_at": "2021-11-01T08:12:00Z",
"updated_at": "2021-11-10T15:36:04Z",
"pushed_at": "2021-06-18T18:43:46Z",
"stargazers_count": 202,
"watchers_count": 202,
"forks_count": 59,
"stargazers_count": 203,
"watchers_count": 203,
"forks_count": 60,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 59,
"watchers": 202,
"forks": 60,
"watchers": 203,
"score": 0
},
{

View file

@ -40,11 +40,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-11-10T07:42:42Z",
"updated_at": "2021-11-10T17:09:47Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2969,
"watchers_count": 2969,
"forks_count": 877,
"stargazers_count": 2970,
"watchers_count": 2970,
"forks_count": 878,
"allow_forking": true,
"is_template": false,
"topics": [
@ -69,8 +69,8 @@
"webshell"
],
"visibility": "public",
"forks": 877,
"watchers": 2969,
"forks": 878,
"watchers": 2970,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": null,
"fork": false,
"created_at": "2021-07-24T11:12:13Z",
"updated_at": "2021-10-17T11:43:44Z",
"updated_at": "2021-11-10T15:26:57Z",
"pushed_at": "2021-07-24T11:17:34Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -204,11 +204,11 @@
"description": "Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215",
"fork": false,
"created_at": "2020-06-07T15:03:07Z",
"updated_at": "2021-11-04T05:02:07Z",
"updated_at": "2021-11-10T12:44:20Z",
"pushed_at": "2020-08-08T12:54:09Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 6,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [
@ -218,8 +218,8 @@
"kernel-vulnerability"
],
"visibility": "public",
"forks": 6,
"watchers": 9,
"forks": 7,
"watchers": 10,
"score": 0
},
{

View file

@ -175,10 +175,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-11-10T06:36:00Z",
"updated_at": "2021-11-10T16:58:06Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1212,
"watchers_count": 1212,
"stargazers_count": 1213,
"watchers_count": 1213,
"forks_count": 270,
"allow_forking": true,
"is_template": false,
@ -206,7 +206,7 @@
],
"visibility": "public",
"forks": 270,
"watchers": 1212,
"watchers": 1213,
"score": 0
}
]

View file

@ -202,17 +202,17 @@
"description": "CVE-2019-2725 命令回显",
"fork": false,
"created_at": "2019-05-29T01:57:05Z",
"updated_at": "2021-10-05T15:28:21Z",
"updated_at": "2021-11-10T15:03:46Z",
"pushed_at": "2019-08-08T09:48:20Z",
"stargazers_count": 404,
"watchers_count": 404,
"forks_count": 161,
"stargazers_count": 405,
"watchers_count": 405,
"forks_count": 162,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 161,
"watchers": 404,
"forks": 162,
"watchers": 405,
"score": 0
},
{
@ -260,12 +260,12 @@
"pushed_at": "2019-06-21T03:33:05Z",
"stargazers_count": 155,
"watchers_count": 155,
"forks_count": 61,
"forks_count": 62,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 61,
"forks": 62,
"watchers": 155,
"score": 0
},

View file

@ -153,10 +153,10 @@
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
"fork": false,
"created_at": "2020-01-15T23:07:41Z",
"updated_at": "2021-11-09T03:26:35Z",
"updated_at": "2021-11-10T16:14:57Z",
"pushed_at": "2020-01-20T23:33:19Z",
"stargazers_count": 868,
"watchers_count": 868,
"stargazers_count": 870,
"watchers_count": 870,
"forks_count": 221,
"allow_forking": true,
"is_template": false,
@ -165,7 +165,7 @@
],
"visibility": "public",
"forks": 221,
"watchers": 868,
"watchers": 870,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "POC For CVE-2020-1481 - Jira Username Enumerator\/Validator",
"fork": false,
"created_at": "2020-10-26T17:07:28Z",
"updated_at": "2021-06-19T07:28:57Z",
"updated_at": "2021-11-10T18:02:09Z",
"pushed_at": "2020-10-30T09:36:23Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0
},
{

View file

@ -402,12 +402,12 @@
"pushed_at": "2020-09-16T15:03:32Z",
"stargazers_count": 60,
"watchers_count": 60,
"forks_count": 18,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 18,
"forks": 19,
"watchers": 60,
"score": 0
},
@ -614,17 +614,17 @@
"description": "Test script for CVE-2020-1472 for both RPC\/TCP and RPC\/SMB",
"fork": false,
"created_at": "2020-09-17T16:53:17Z",
"updated_at": "2021-11-05T12:00:12Z",
"updated_at": "2021-11-10T16:23:07Z",
"pushed_at": "2021-06-18T18:44:06Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 46,
"watchers": 47,
"score": 0
},
{

View file

@ -13,11 +13,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-11-10T07:42:42Z",
"updated_at": "2021-11-10T17:09:47Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2969,
"watchers_count": 2969,
"forks_count": 877,
"stargazers_count": 2970,
"watchers_count": 2970,
"forks_count": 878,
"allow_forking": true,
"is_template": false,
"topics": [
@ -42,8 +42,8 @@
"webshell"
],
"visibility": "public",
"forks": 877,
"watchers": 2969,
"forks": 878,
"watchers": 2970,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-11-10T06:36:00Z",
"updated_at": "2021-11-10T16:58:06Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1212,
"watchers_count": 1212,
"stargazers_count": 1213,
"watchers_count": 1213,
"forks_count": 270,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 270,
"watchers": 1212,
"watchers": 1213,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
"fork": false,
"created_at": "2021-03-11T15:27:25Z",
"updated_at": "2021-10-28T09:01:17Z",
"updated_at": "2021-11-10T15:15:04Z",
"pushed_at": "2021-05-25T11:14:56Z",
"stargazers_count": 114,
"watchers_count": 114,
"stargazers_count": 115,
"watchers_count": 115,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 114,
"watchers": 115,
"score": 0
}
]

View file

@ -125,14 +125,14 @@
"pushed_at": "2021-11-06T05:20:30Z",
"stargazers_count": 69,
"watchers_count": 69,
"forks_count": 32,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-22205"
],
"visibility": "public",
"forks": 32,
"forks": 31,
"watchers": 69,
"score": 0
},
@ -434,5 +434,59 @@
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 426338911,
"name": "GitLab-CVE-2021-22205-scanner",
"full_name": "faisalfs10x\/GitLab-CVE-2021-22205-scanner",
"owner": {
"login": "faisalfs10x",
"id": 51811615,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51811615?v=4",
"html_url": "https:\/\/github.com\/faisalfs10x"
},
"html_url": "https:\/\/github.com\/faisalfs10x\/GitLab-CVE-2021-22205-scanner",
"description": null,
"fork": false,
"created_at": "2021-11-09T18:19:43Z",
"updated_at": "2021-11-10T15:29:09Z",
"pushed_at": "2021-11-10T15:29:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 426642274,
"name": "docker-cve-2021-22205",
"full_name": "ahmad4fifz\/docker-cve-2021-22205",
"owner": {
"login": "ahmad4fifz",
"id": 45918058,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45918058?v=4",
"html_url": "https:\/\/github.com\/ahmad4fifz"
},
"html_url": "https:\/\/github.com\/ahmad4fifz\/docker-cve-2021-22205",
"description": null,
"fork": false,
"created_at": "2021-11-10T13:57:55Z",
"updated_at": "2021-11-10T17:20:01Z",
"pushed_at": "2021-11-10T17:19:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
"fork": false,
"created_at": "2021-03-11T15:27:25Z",
"updated_at": "2021-10-28T09:01:17Z",
"updated_at": "2021-11-10T15:15:04Z",
"pushed_at": "2021-05-25T11:14:56Z",
"stargazers_count": 114,
"watchers_count": 114,
"stargazers_count": 115,
"watchers_count": 115,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 114,
"watchers": 115,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Exploit for CVE-2021-3129",
"fork": false,
"created_at": "2021-01-13T12:52:20Z",
"updated_at": "2021-11-10T10:05:01Z",
"updated_at": "2021-11-10T17:47:36Z",
"pushed_at": "2021-01-29T13:59:07Z",
"stargazers_count": 181,
"watchers_count": 181,
"forks_count": 46,
"stargazers_count": 182,
"watchers_count": 182,
"forks_count": 47,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 46,
"watchers": 181,
"forks": 47,
"watchers": 182,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Ubuntu OverlayFS Local Privesc",
"fork": false,
"created_at": "2021-04-19T20:07:01Z",
"updated_at": "2021-11-03T03:03:00Z",
"updated_at": "2021-11-10T17:16:59Z",
"pushed_at": "2021-09-28T04:08:43Z",
"stargazers_count": 252,
"watchers_count": 252,
"stargazers_count": 253,
"watchers_count": 253,
"forks_count": 88,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 88,
"watchers": 252,
"watchers": 253,
"score": 0
},
{

View file

@ -13,11 +13,11 @@
"description": "ETS5 Password Recovery Tool is a PoC for CVE-2021-36799",
"fork": false,
"created_at": "2021-07-18T13:59:43Z",
"updated_at": "2021-11-09T02:16:40Z",
"pushed_at": "2021-11-08T21:52:21Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 1,
"updated_at": "2021-11-10T17:31:37Z",
"pushed_at": "2021-11-10T17:31:34Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [
@ -27,8 +27,8 @@
"security"
],
"visibility": "public",
"forks": 1,
"watchers": 12,
"forks": 2,
"watchers": 14,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-11-05T03:18:46Z",
"updated_at": "2021-11-09T14:28:03Z",
"updated_at": "2021-11-10T13:12:17Z",
"pushed_at": "2021-11-05T03:17:58Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 19,
"watchers": 20,
"score": 0
}
]

View file

@ -229,17 +229,17 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2021-11-10T06:04:28Z",
"updated_at": "2021-11-10T13:37:44Z",
"pushed_at": "2021-09-11T09:50:26Z",
"stargazers_count": 1297,
"watchers_count": 1297,
"stargazers_count": 1298,
"watchers_count": 1298,
"forks_count": 419,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 419,
"watchers": 1297,
"watchers": 1298,
"score": 0
},
{
@ -553,10 +553,10 @@
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
"fork": false,
"created_at": "2021-09-15T22:34:35Z",
"updated_at": "2021-11-10T06:17:59Z",
"updated_at": "2021-11-10T13:44:39Z",
"pushed_at": "2021-10-12T23:05:07Z",
"stargazers_count": 493,
"watchers_count": 493,
"stargazers_count": 494,
"watchers_count": 494,
"forks_count": 104,
"allow_forking": true,
"is_template": false,
@ -570,7 +570,7 @@
],
"visibility": "public",
"forks": 104,
"watchers": 493,
"watchers": 494,
"score": 0
},
{
@ -732,10 +732,10 @@
"description": null,
"fork": false,
"created_at": "2021-10-03T01:13:42Z",
"updated_at": "2021-10-10T06:32:14Z",
"updated_at": "2021-11-10T13:43:45Z",
"pushed_at": "2021-10-10T06:32:11Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -744,7 +744,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 8,
"score": 0
},
{

View file

@ -96,17 +96,17 @@
"description": "Exploit for CVE-2021-40449",
"fork": false,
"created_at": "2021-11-07T16:15:19Z",
"updated_at": "2021-11-10T10:08:38Z",
"updated_at": "2021-11-10T15:35:36Z",
"pushed_at": "2021-11-07T16:21:20Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 32,
"watchers": 35,
"score": 0
}
]

29
2021/CVE-2021-42292.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 426216342,
"name": "CVE-2021-42292",
"full_name": "corelight\/CVE-2021-42292",
"owner": {
"login": "corelight",
"id": 21672558,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
"html_url": "https:\/\/github.com\/corelight"
},
"html_url": "https:\/\/github.com\/corelight\/CVE-2021-42292",
"description": "A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.",
"fork": false,
"created_at": "2021-11-09T12:14:45Z",
"updated_at": "2021-11-10T18:09:35Z",
"pushed_at": "2021-11-10T17:16:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,29 +0,0 @@
[
{
"id": 426605142,
"name": "CVE-2021-9876",
"full_name": "RichardKabuto\/CVE-2021-9876",
"owner": {
"login": "RichardKabuto",
"id": 49665241,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49665241?v=4",
"html_url": "https:\/\/github.com\/RichardKabuto"
},
"html_url": "https:\/\/github.com\/RichardKabuto\/CVE-2021-9876",
"description": "1111111",
"fork": false,
"created_at": "2021-11-10T11:58:49Z",
"updated_at": "2021-11-10T11:58:53Z",
"pushed_at": "2021-11-10T11:58:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,29 +0,0 @@
[
{
"id": 426604166,
"name": "CVE-2021-99999",
"full_name": "RichardKabuto\/CVE-2021-99999",
"owner": {
"login": "RichardKabuto",
"id": 49665241,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49665241?v=4",
"html_url": "https:\/\/github.com\/RichardKabuto"
},
"html_url": "https:\/\/github.com\/RichardKabuto\/CVE-2021-99999",
"description": null,
"fork": false,
"created_at": "2021-11-10T11:55:22Z",
"updated_at": "2021-11-10T11:55:25Z",
"pushed_at": "2021-11-10T11:55:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -495,7 +495,12 @@ There's a flaw in libxml2's xmllint in versions before 2.9.11. An attacker who i
- [BizarreLove/CVE-2021-3560](https://github.com/BizarreLove/CVE-2021-3560)
- [0dayNinja/CVE-2021-3560](https://github.com/0dayNinja/CVE-2021-3560)
### CVE-2021-3572
### CVE-2021-3572 (-)
<code>
A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.
</code>
- [frenzymadness/CVE-2021-3572](https://github.com/frenzymadness/CVE-2021-3572)
### CVE-2021-3625 (2021-10-05)
@ -525,9 +530,6 @@ D-Link router DSL-2750U with firmware vME1.16 or prior versions is vulnerable to
### CVE-2021-6901
- [mooneee/cve-2021-6901](https://github.com/mooneee/cve-2021-6901)
### CVE-2021-9876
- [RichardKabuto/CVE-2021-9876](https://github.com/RichardKabuto/CVE-2021-9876)
### CVE-2021-10086
- [xiaoyun-1/CVE-2021-10086](https://github.com/xiaoyun-1/CVE-2021-10086)
@ -894,6 +896,8 @@ An issue has been discovered in GitLab CE/EE affecting all versions starting fro
- [hh-hunter/cve-2021-22205](https://github.com/hh-hunter/cve-2021-22205)
- [X1pe0/Automated-Gitlab-RCE](https://github.com/X1pe0/Automated-Gitlab-RCE)
- [runsel/GitLab-CVE-2021-22205-](https://github.com/runsel/GitLab-CVE-2021-22205-)
- [faisalfs10x/GitLab-CVE-2021-22205-scanner](https://github.com/faisalfs10x/GitLab-CVE-2021-22205-scanner)
- [ahmad4fifz/docker-cve-2021-22205](https://github.com/ahmad4fifz/docker-cve-2021-22205)
### CVE-2021-22214 (2021-06-08)
@ -3142,6 +3146,14 @@ Revisor Video Management System (VMS) before 2.0.0 has a directory traversal vul
- [jet-pentest/CVE-2021-42261](https://github.com/jet-pentest/CVE-2021-42261)
### CVE-2021-42292 (2021-11-09)
<code>
Microsoft Excel Security Feature Bypass Vulnerability
</code>
- [corelight/CVE-2021-42292](https://github.com/corelight/CVE-2021-42292)
### CVE-2021-42327 (2021-10-21)
<code>
@ -3222,9 +3234,6 @@ A Stored Cross Site Scripting (XSS) Vulneraibiilty exists in Sourcecodester Engi
### CVE-2021-43361
- [bartutku/CVE-2021-43361](https://github.com/bartutku/CVE-2021-43361)
### CVE-2021-99999
- [RichardKabuto/CVE-2021-99999](https://github.com/RichardKabuto/CVE-2021-99999)
## 2020
### CVE-2020-0001 (2020-01-08)