Auto Update 2021/11/24 00:13:07

This commit is contained in:
motikan2010-bot 2021-11-24 09:13:07 +09:00
parent 632c20f85c
commit d862e5e11a
16 changed files with 76 additions and 71 deletions

View file

@ -17,12 +17,12 @@
"pushed_at": "2011-10-04T14:55:01Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 25,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 25,
"forks": 24,
"watchers": 10,
"score": 0
},

View file

@ -1709,12 +1709,12 @@
"pushed_at": "2019-09-03T20:50:28Z",
"stargazers_count": 1089,
"watchers_count": 1089,
"forks_count": 355,
"forks_count": 354,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 355,
"forks": 354,
"watchers": 1089,
"score": 0
},

View file

@ -121,32 +121,5 @@
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 429994774,
"name": "adamyordan",
"full_name": "FoxxD3Vza\/adamyordan",
"owner": {
"login": "FoxxD3Vza",
"id": 94728593,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94728593?v=4",
"html_url": "https:\/\/github.com\/FoxxD3Vza"
},
"html_url": "https:\/\/github.com\/FoxxD3Vza\/adamyordan",
"description": "Jenkins RCE Proof-of-Concept: SECURITY-1266 \/ CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy)…",
"fork": false,
"created_at": "2021-11-20T03:06:01Z",
"updated_at": "2021-11-20T03:06:05Z",
"pushed_at": "2021-11-20T03:06:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Enjoy hacking ;)",
"fork": false,
"created_at": "2019-12-25T11:03:52Z",
"updated_at": "2021-10-24T08:35:04Z",
"updated_at": "2021-11-23T22:53:52Z",
"pushed_at": "2019-12-25T11:20:19Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 7,
"watchers": 8,
"score": 0
},
{

View file

@ -17,14 +17,14 @@
"pushed_at": "2020-03-05T12:29:18Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2019-18426"
],
"visibility": "public",
"forks": 6,
"forks": 7,
"watchers": 8,
"score": 0
}

View file

@ -13,10 +13,10 @@
"description": "Zimbra邮件系统漏洞 XXE\/RCE\/SSRF\/Upload GetShell Exploit 1. (CVE-2019-9621 Zimbra<8.8.11 XXE GetShell Exploit)",
"fork": false,
"created_at": "2019-05-06T15:47:20Z",
"updated_at": "2021-11-14T07:52:39Z",
"updated_at": "2021-11-23T23:09:47Z",
"pushed_at": "2019-05-08T16:22:58Z",
"stargazers_count": 59,
"watchers_count": 59,
"stargazers_count": 60,
"watchers_count": 60,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
@ -35,7 +35,7 @@
],
"visibility": "public",
"forks": 37,
"watchers": 59,
"watchers": 60,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2020-04-07T01:17:32Z",
"updated_at": "2021-11-17T01:12:28Z",
"updated_at": "2021-11-23T22:35:40Z",
"pushed_at": "2021-02-21T00:29:05Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 8,
"watchers": 9,
"score": 0
}
]

View file

@ -13,8 +13,8 @@
"description": "Regular expression matching for URL's. Maintained, safe, and browser-friendly version of url-regex. Resolves CVE-2020-7661 for Node.js servers.",
"fork": false,
"created_at": "2020-08-15T07:42:50Z",
"updated_at": "2021-11-23T17:46:57Z",
"pushed_at": "2021-11-23T17:46:54Z",
"updated_at": "2021-11-23T20:32:26Z",
"pushed_at": "2021-11-23T20:32:22Z",
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 10,

View file

@ -44,12 +44,12 @@
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1459,
"watchers_count": 1459,
"forks_count": 537,
"forks_count": 538,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 537,
"forks": 538,
"watchers": 1459,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-02-16T16:55:46Z",
"updated_at": "2021-11-07T17:17:00Z",
"updated_at": "2021-11-23T22:35:55Z",
"pushed_at": "2021-02-16T16:59:09Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 26,
"watchers": 27,
"score": 0
}
]

View file

@ -943,5 +943,32 @@
"forks": 3,
"watchers": 6,
"score": 0
},
{
"id": 431232449,
"name": "conflucheck",
"full_name": "quesodipesto\/conflucheck",
"owner": {
"login": "quesodipesto",
"id": 13822638,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13822638?v=4",
"html_url": "https:\/\/github.com\/quesodipesto"
},
"html_url": "https:\/\/github.com\/quesodipesto\/conflucheck",
"description": "Python 3 script to identify CVE-2021-26084 via network requests.",
"fork": false,
"created_at": "2021-11-23T19:45:31Z",
"updated_at": "2021-11-23T19:54:29Z",
"pushed_at": "2021-11-23T19:54:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "PoC for CVE-2021-3492 used at Pwn2Own 2021",
"fork": false,
"created_at": "2021-06-28T09:43:31Z",
"updated_at": "2021-10-11T17:45:11Z",
"updated_at": "2021-11-23T19:32:07Z",
"pushed_at": "2021-08-03T14:48:27Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 31,
"watchers": 32,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "ACE poc exploit for glibc cpio 2.13 through mmap chunk metadata curruption (CVE-2021-38185)",
"fork": false,
"created_at": "2021-07-19T20:10:13Z",
"updated_at": "2021-11-10T10:08:49Z",
"updated_at": "2021-11-23T21:24:06Z",
"pushed_at": "2021-08-11T08:59:33Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -13,8 +13,8 @@
"description": "POC to test the BootROM vulnerability found in LPC55S69 and K82 Series ",
"fork": false,
"created_at": "2021-11-23T15:44:42Z",
"updated_at": "2021-11-23T15:44:49Z",
"pushed_at": "2021-11-23T15:44:43Z",
"updated_at": "2021-11-23T19:36:34Z",
"pushed_at": "2021-11-23T19:36:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,17 +13,17 @@
"description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2021-10-16T16:17:44Z",
"updated_at": "2021-11-22T10:45:58Z",
"updated_at": "2021-11-23T18:33:19Z",
"pushed_at": "2021-11-11T17:09:56Z",
"stargazers_count": 338,
"watchers_count": 338,
"forks_count": 74,
"stargazers_count": 339,
"watchers_count": 339,
"forks_count": 75,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 74,
"watchers": 338,
"forks": 75,
"watchers": 339,
"score": 0
},
{

View file

@ -1228,6 +1228,7 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
- [oxctdev/CVE-2021-26084](https://github.com/oxctdev/CVE-2021-26084)
- [Jun-5heng/CVE-2021-26084](https://github.com/Jun-5heng/CVE-2021-26084)
- [lleavesl/CVE-2021-26084](https://github.com/lleavesl/CVE-2021-26084)
- [quesodipesto/conflucheck](https://github.com/quesodipesto/conflucheck)
### CVE-2021-26085 (2021-08-02)
@ -2620,7 +2621,12 @@ Inappropriate implementation in Sandbox in Google Chrome prior to 94.0.4606.81 a
- [ZeusBox/CVE-2021-37980](https://github.com/ZeusBox/CVE-2021-37980)
### CVE-2021-38001
### CVE-2021-38001 (2021-11-23)
<code>
Type confusion in V8 in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
</code>
- [Peterpan0927/TFC-Chrome-v8-bug-CVE-2021-38001-poc](https://github.com/Peterpan0927/TFC-Chrome-v8-bug-CVE-2021-38001-poc)
### CVE-2021-38149 (2021-08-06)
@ -11944,7 +11950,6 @@ A sandbox bypass vulnerability exists in Script Security Plugin 1.49 and earlier
- [adamyordan/cve-2019-1003000-jenkins-rce-poc](https://github.com/adamyordan/cve-2019-1003000-jenkins-rce-poc)
- [0xtavian/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins](https://github.com/0xtavian/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins)
- [1NTheKut/CVE-2019-1003000_RCE-DETECTION](https://github.com/1NTheKut/CVE-2019-1003000_RCE-DETECTION)
- [FoxxD3Vza/adamyordan](https://github.com/FoxxD3Vza/adamyordan)
### CVE-2019-1010054 (2019-07-18)