Auto Update 2021/12/06 12:13:39

This commit is contained in:
motikan2010-bot 2021-12-06 21:13:39 +09:00
parent 66e120fa64
commit dc4db0500e
30 changed files with 138 additions and 110 deletions

View file

@ -13,8 +13,8 @@
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the DHE key exchange.",
"fork": false,
"created_at": "2021-08-31T09:51:12Z",
"updated_at": "2021-12-05T16:07:18Z",
"pushed_at": "2021-12-03T08:54:33Z",
"updated_at": "2021-12-06T11:35:43Z",
"pushed_at": "2021-12-06T11:35:46Z",
"stargazers_count": 77,
"watchers_count": 77,
"forks_count": 8,

View file

@ -40,11 +40,11 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-12-05T00:54:51Z",
"updated_at": "2021-12-06T09:04:57Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1230,
"watchers_count": 1230,
"forks_count": 275,
"stargazers_count": 1231,
"watchers_count": 1231,
"forks_count": 276,
"allow_forking": true,
"is_template": false,
"topics": [
@ -70,8 +70,8 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 275,
"watchers": 1230,
"forks": 276,
"watchers": 1231,
"score": 0
},
{

View file

@ -13,11 +13,11 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-12-05T00:54:51Z",
"updated_at": "2021-12-06T09:04:57Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1230,
"watchers_count": 1230,
"forks_count": 275,
"stargazers_count": 1231,
"watchers_count": 1231,
"forks_count": 276,
"allow_forking": true,
"is_template": false,
"topics": [
@ -43,8 +43,8 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 275,
"watchers": 1230,
"forks": 276,
"watchers": 1231,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2016-06-15T11:27:42Z",
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 22,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 22,
"forks": 23,
"watchers": 49,
"score": 0
},

View file

@ -40,11 +40,11 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-12-05T00:54:51Z",
"updated_at": "2021-12-06T09:04:57Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1230,
"watchers_count": 1230,
"forks_count": 275,
"stargazers_count": 1231,
"watchers_count": 1231,
"forks_count": 276,
"allow_forking": true,
"is_template": false,
"topics": [
@ -70,8 +70,8 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 275,
"watchers": 1230,
"forks": 276,
"watchers": 1231,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2020-10-16T12:09:45Z",
"stargazers_count": 447,
"watchers_count": 447,
"forks_count": 434,
"forks_count": 435,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 434,
"forks": 435,
"watchers": 447,
"score": 0
},

View file

@ -530,11 +530,11 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-12-05T00:54:51Z",
"updated_at": "2021-12-06T09:04:57Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1230,
"watchers_count": 1230,
"forks_count": 275,
"stargazers_count": 1231,
"watchers_count": 1231,
"forks_count": 276,
"allow_forking": true,
"is_template": false,
"topics": [
@ -560,8 +560,8 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 275,
"watchers": 1230,
"forks": 276,
"watchers": 1231,
"score": 0
},
{

View file

@ -44,12 +44,12 @@
"pushed_at": "2018-10-26T17:54:54Z",
"stargazers_count": 103,
"watchers_count": 103,
"forks_count": 48,
"forks_count": 49,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 48,
"forks": 49,
"watchers": 103,
"score": 0
},

View file

@ -331,12 +331,12 @@
"pushed_at": "2018-04-26T15:40:28Z",
"stargazers_count": 94,
"watchers_count": 94,
"forks_count": 50,
"forks_count": 51,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 50,
"forks": 51,
"watchers": 94,
"score": 0
},

View file

@ -412,17 +412,17 @@
"description": "Detect and log CVE-2019-19781 scan and exploitation attempts.",
"fork": false,
"created_at": "2020-01-13T10:09:31Z",
"updated_at": "2021-11-04T04:16:43Z",
"updated_at": "2021-12-06T07:21:31Z",
"pushed_at": "2020-01-15T13:58:22Z",
"stargazers_count": 107,
"watchers_count": 107,
"stargazers_count": 108,
"watchers_count": 108,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 107,
"watchers": 108,
"score": 0
},
{

View file

@ -175,11 +175,11 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-12-05T00:54:51Z",
"updated_at": "2021-12-06T09:04:57Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1230,
"watchers_count": 1230,
"forks_count": 275,
"stargazers_count": 1231,
"watchers_count": 1231,
"forks_count": 276,
"allow_forking": true,
"is_template": false,
"topics": [
@ -205,8 +205,8 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 275,
"watchers": 1230,
"forks": 276,
"watchers": 1231,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2021-12-02T23:49:19Z",
"updated_at": "2021-12-06T09:23:06Z",
"pushed_at": "2020-09-11T07:38:22Z",
"stargazers_count": 588,
"watchers_count": 588,
"stargazers_count": 589,
"watchers_count": 589,
"forks_count": 153,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 153,
"watchers": 588,
"watchers": 589,
"score": 0
},
{

View file

@ -1045,10 +1045,10 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2021-12-03T11:31:02Z",
"updated_at": "2021-12-06T09:22:44Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1167,
"watchers_count": 1167,
"stargazers_count": 1168,
"watchers_count": 1168,
"forks_count": 367,
"allow_forking": true,
"is_template": false,
@ -1061,7 +1061,7 @@
],
"visibility": "public",
"forks": 367,
"watchers": 1167,
"watchers": 1168,
"score": 0
},
{

View file

@ -94,17 +94,17 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2021-12-05T13:42:15Z",
"updated_at": "2021-12-06T06:40:40Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 885,
"watchers_count": 885,
"stargazers_count": 886,
"watchers_count": 886,
"forks_count": 240,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 240,
"watchers": 885,
"watchers": 886,
"score": 0
},
{

View file

@ -13,11 +13,11 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-12-05T00:54:51Z",
"updated_at": "2021-12-06T09:04:57Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1230,
"watchers_count": 1230,
"forks_count": 275,
"stargazers_count": 1231,
"watchers_count": 1231,
"forks_count": 276,
"allow_forking": true,
"is_template": false,
"topics": [
@ -43,8 +43,8 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 275,
"watchers": 1230,
"forks": 276,
"watchers": 1231,
"score": 0
},
{

View file

@ -67,17 +67,17 @@
"description": "Exploit for CVE-2020-3952 in vCenter 6.7",
"fork": false,
"created_at": "2020-04-16T07:40:51Z",
"updated_at": "2021-12-06T03:28:54Z",
"updated_at": "2021-12-06T12:09:08Z",
"pushed_at": "2020-04-16T08:38:42Z",
"stargazers_count": 253,
"watchers_count": 253,
"stargazers_count": 254,
"watchers_count": 254,
"forks_count": 60,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 60,
"watchers": 253,
"watchers": 254,
"score": 0
},
{

View file

@ -966,17 +966,17 @@
"description": "CVE-2021-1675 LPE PoC in Nim (PrintNightmare Local Privilege Escalation)",
"fork": false,
"created_at": "2021-12-05T14:49:32Z",
"updated_at": "2021-12-05T19:44:56Z",
"updated_at": "2021-12-06T09:08:05Z",
"pushed_at": "2021-12-05T14:51:28Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -128,17 +128,17 @@
"description": "CVE-2021-21985 VMware vCenter Server远程代码执行漏洞 EXP (更新可回显EXP)",
"fork": false,
"created_at": "2021-06-03T09:59:21Z",
"updated_at": "2021-12-03T03:41:48Z",
"updated_at": "2021-12-06T08:45:45Z",
"pushed_at": "2021-06-09T10:13:56Z",
"stargazers_count": 288,
"watchers_count": 288,
"stargazers_count": 289,
"watchers_count": 289,
"forks_count": 61,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 61,
"watchers": 288,
"watchers": 289,
"score": 0
},
{

View file

@ -67,17 +67,17 @@
"description": "CVE-2021-22205 Unauthorized RCE",
"fork": false,
"created_at": "2021-10-28T14:02:51Z",
"updated_at": "2021-11-30T02:12:30Z",
"updated_at": "2021-12-06T07:51:55Z",
"pushed_at": "2021-10-28T14:20:05Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 57,
"watchers_count": 57,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 56,
"watchers": 57,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Gitlab CI Lint API未授权 SSRF漏洞 (CVE-2021-22214)",
"fork": false,
"created_at": "2021-06-22T03:04:50Z",
"updated_at": "2021-11-10T06:46:57Z",
"updated_at": "2021-12-06T07:53:04Z",
"pushed_at": "2021-06-22T04:35:08Z",
"stargazers_count": 58,
"watchers_count": 58,
"stargazers_count": 59,
"watchers_count": 59,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 58,
"watchers": 59,
"score": 0
},
{

View file

@ -1050,17 +1050,17 @@
"description": "C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection ",
"fork": false,
"created_at": "2021-03-29T21:10:34Z",
"updated_at": "2021-11-02T03:09:42Z",
"updated_at": "2021-12-06T08:42:51Z",
"pushed_at": "2021-03-31T11:57:38Z",
"stargazers_count": 207,
"watchers_count": 207,
"stargazers_count": 208,
"watchers_count": 208,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 207,
"watchers": 208,
"score": 0
},
{
@ -1162,12 +1162,12 @@
"pushed_at": "2021-12-04T22:39:08Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 4,
"score": 0
}

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-07-15T01:41:13Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 12,
"score": 0
}

View file

@ -17,7 +17,7 @@
"pushed_at": "2021-10-14T12:32:11Z",
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 16,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"topics": [
@ -31,7 +31,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 16,
"forks": 17,
"watchers": 28,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "A FreeSWITCH specific scanning and exploitation toolkit for CVE-2021-37624 and CVE-2021-41157.",
"fork": false,
"created_at": "2021-11-28T13:12:38Z",
"updated_at": "2021-12-06T06:05:44Z",
"updated_at": "2021-12-06T08:41:15Z",
"pushed_at": "2021-12-05T16:54:16Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 5,
"watchers": 8,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "PoC CVE-2021-37980 : Inappropriate implementation in Sandbox (windows only)",
"fork": false,
"created_at": "2021-10-12T19:14:29Z",
"updated_at": "2021-12-03T10:31:38Z",
"updated_at": "2021-12-06T11:03:21Z",
"pushed_at": "2021-10-14T19:54:12Z",
"stargazers_count": 68,
"watchers_count": 68,
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 68,
"watchers": 67,
"score": 0
}
]

View file

@ -44,12 +44,12 @@
"pushed_at": "2021-11-09T11:15:19Z",
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 15,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 15,
"forks": 16,
"watchers": 32,
"score": 0
}

View file

@ -219,5 +219,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 435423428,
"name": "CVE-2021-41277",
"full_name": "zer0yu\/CVE-2021-41277",
"owner": {
"login": "zer0yu",
"id": 16551733,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16551733?v=4",
"html_url": "https:\/\/github.com\/zer0yu"
},
"html_url": "https:\/\/github.com\/zer0yu\/CVE-2021-41277",
"description": null,
"fork": false,
"created_at": "2021-12-06T08:52:32Z",
"updated_at": "2021-12-06T11:43:04Z",
"pushed_at": "2021-12-06T10:23:45Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -785,10 +785,10 @@
"description": "A framework for bug hunting or pentesting targeting websites that have CVE-2021-41773 Vulnerability in public ",
"fork": false,
"created_at": "2021-10-07T01:31:13Z",
"updated_at": "2021-12-05T05:42:56Z",
"updated_at": "2021-12-06T06:33:55Z",
"pushed_at": "2021-10-07T08:25:26Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
@ -801,7 +801,7 @@
],
"visibility": "public",
"forks": 13,
"watchers": 44,
"watchers": 45,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Microsoft Exchange Server Poc",
"fork": false,
"created_at": "2021-11-23T02:26:26Z",
"updated_at": "2021-12-05T06:26:15Z",
"updated_at": "2021-12-06T12:07:04Z",
"pushed_at": "2021-11-23T02:33:47Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 47,
"watchers": 49,
"score": 0
}
]

View file

@ -3146,6 +3146,7 @@ Metabase is an open source data analytics platform. In affected versions a secur
- [kaizensecurity/CVE-2021-41277](https://github.com/kaizensecurity/CVE-2021-41277)
- [Vulnmachines/Metabase_CVE-2021-41277](https://github.com/Vulnmachines/Metabase_CVE-2021-41277)
- [TheLastVvV/CVE-2021-41277](https://github.com/TheLastVvV/CVE-2021-41277)
- [zer0yu/CVE-2021-41277](https://github.com/zer0yu/CVE-2021-41277)
### CVE-2021-41351 (2021-11-09)