Auto Update 2021/12/17 00:15:25

This commit is contained in:
motikan2010-bot 2021-12-17 09:15:25 +09:00
parent c6c984826a
commit ff3b861f35
23 changed files with 502 additions and 346 deletions

View file

@ -13,10 +13,10 @@
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the DHE key exchange.",
"fork": false,
"created_at": "2021-08-31T09:51:12Z",
"updated_at": "2021-12-06T11:35:43Z",
"updated_at": "2021-12-16T20:11:56Z",
"pushed_at": "2021-12-14T09:23:32Z",
"stargazers_count": 77,
"watchers_count": 77,
"stargazers_count": 78,
"watchers_count": 78,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
@ -37,7 +37,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 77,
"watchers": 78,
"score": 0
}
]

View file

@ -17,14 +17,14 @@
"pushed_at": "2017-04-24T14:16:56Z",
"stargazers_count": 328,
"watchers_count": 328,
"forks_count": 102,
"forks_count": 101,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2008-0166"
],
"visibility": "public",
"forks": 102,
"forks": 101,
"watchers": 328,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
"fork": false,
"created_at": "2018-04-28T11:50:00Z",
"updated_at": "2021-11-25T22:54:11Z",
"updated_at": "2021-12-16T20:53:46Z",
"pushed_at": "2018-08-30T05:37:03Z",
"stargazers_count": 433,
"watchers_count": 433,
"stargazers_count": 434,
"watchers_count": 434,
"forks_count": 54,
"allow_forking": true,
"is_template": false,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 54,
"watchers": 433,
"watchers": 434,
"score": 0
},
{

View file

@ -2888,17 +2888,17 @@
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
"fork": false,
"created_at": "2020-01-21T02:22:29Z",
"updated_at": "2021-12-16T09:51:36Z",
"updated_at": "2021-12-16T23:31:12Z",
"pushed_at": "2020-01-21T03:15:41Z",
"stargazers_count": 244,
"watchers_count": 244,
"stargazers_count": 245,
"watchers_count": 245,
"forks_count": 64,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 64,
"watchers": 244,
"watchers": 245,
"score": 0
},
{

View file

@ -202,10 +202,10 @@
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
"fork": false,
"created_at": "2019-09-09T15:58:39Z",
"updated_at": "2021-12-09T06:49:35Z",
"updated_at": "2021-12-16T23:58:50Z",
"pushed_at": "2020-01-15T17:01:50Z",
"stargazers_count": 123,
"watchers_count": 123,
"stargazers_count": 122,
"watchers_count": 122,
"forks_count": 56,
"allow_forking": true,
"is_template": false,
@ -221,7 +221,7 @@
],
"visibility": "public",
"forks": 56,
"watchers": 123,
"watchers": 122,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc",
"fork": false,
"created_at": "2020-02-07T02:41:44Z",
"updated_at": "2021-12-15T14:38:17Z",
"updated_at": "2021-12-16T23:44:52Z",
"pushed_at": "2020-02-19T03:47:33Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 56,
"watchers": 55,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]",
"fork": false,
"created_at": "2020-01-10T22:56:35Z",
"updated_at": "2021-12-15T14:38:03Z",
"updated_at": "2021-12-16T23:49:27Z",
"pushed_at": "2020-01-18T07:01:29Z",
"stargazers_count": 369,
"watchers_count": 369,
"stargazers_count": 368,
"watchers_count": 368,
"forks_count": 125,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 125,
"watchers": 369,
"watchers": 368,
"score": 0
},
{
@ -67,17 +67,17 @@
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
"fork": false,
"created_at": "2020-01-11T00:08:27Z",
"updated_at": "2021-12-15T14:38:04Z",
"updated_at": "2021-12-16T23:49:25Z",
"pushed_at": "2020-01-22T20:23:51Z",
"stargazers_count": 538,
"watchers_count": 538,
"stargazers_count": 537,
"watchers_count": 537,
"forks_count": 130,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 130,
"watchers": 538,
"watchers": 537,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": "Synaptics Audio Driver LPE",
"fork": false,
"created_at": "2019-04-14T06:16:34Z",
"updated_at": "2021-12-15T14:36:09Z",
"updated_at": "2021-12-16T23:37:23Z",
"pushed_at": "2019-04-15T11:17:39Z",
"stargazers_count": 37,
"watchers_count": 37,

View file

@ -1018,10 +1018,10 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2021-12-16T07:59:13Z",
"updated_at": "2021-12-16T23:40:21Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1170,
"watchers_count": 1170,
"stargazers_count": 1169,
"watchers_count": 1169,
"forks_count": 367,
"allow_forking": true,
"is_template": false,
@ -1034,7 +1034,7 @@
],
"visibility": "public",
"forks": 367,
"watchers": 1170,
"watchers": 1169,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2020-15999",
"fork": false,
"created_at": "2020-10-28T16:16:25Z",
"updated_at": "2021-12-15T14:40:41Z",
"updated_at": "2021-12-16T21:42:14Z",
"pushed_at": "2021-11-01T19:13:18Z",
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 10,
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 29,
"forks": 11,
"watchers": 30,
"score": 0
},
{

View file

@ -67,17 +67,17 @@
"description": "Exploit for CVE-2020-3952 in vCenter 6.7",
"fork": false,
"created_at": "2020-04-16T07:40:51Z",
"updated_at": "2021-12-15T14:38:58Z",
"updated_at": "2021-12-16T23:36:27Z",
"pushed_at": "2020-04-16T08:38:42Z",
"stargazers_count": 255,
"watchers_count": 255,
"stargazers_count": 254,
"watchers_count": 254,
"forks_count": 60,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 60,
"watchers": 255,
"watchers": 254,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability ",
"fork": false,
"created_at": "2020-07-22T08:36:41Z",
"updated_at": "2021-12-15T14:39:52Z",
"updated_at": "2021-12-16T21:38:33Z",
"pushed_at": "2020-07-23T12:55:28Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 48,
"watchers": 47,
"score": 0
}
]

View file

@ -221,17 +221,17 @@
"description": "CVE-2021-21972",
"fork": false,
"created_at": "2021-02-25T05:16:38Z",
"updated_at": "2021-07-22T21:16:08Z",
"updated_at": "2021-12-16T19:58:09Z",
"pushed_at": "2021-03-01T03:38:00Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 26,
"watchers": 27,
"score": 0
},
{
@ -684,7 +684,7 @@
"description": null,
"fork": false,
"created_at": "2021-07-26T18:48:28Z",
"updated_at": "2021-11-27T06:08:04Z",
"updated_at": "2021-12-16T18:40:13Z",
"pushed_at": "2021-08-02T17:45:59Z",
"stargazers_count": 2,
"watchers_count": 2,

View file

@ -13,17 +13,17 @@
"description": "Exploit for CVE-2021-3129",
"fork": false,
"created_at": "2021-01-13T12:52:20Z",
"updated_at": "2021-12-15T14:41:14Z",
"updated_at": "2021-12-16T21:42:02Z",
"pushed_at": "2021-01-29T13:59:07Z",
"stargazers_count": 186,
"watchers_count": 186,
"stargazers_count": 187,
"watchers_count": 187,
"forks_count": 50,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 50,
"watchers": 186,
"watchers": 187,
"score": 0
},
{

View file

@ -73,17 +73,17 @@
"description": null,
"fork": false,
"created_at": "2021-07-02T12:10:49Z",
"updated_at": "2021-12-12T00:55:56Z",
"updated_at": "2021-12-16T18:44:55Z",
"pushed_at": "2021-07-02T12:17:50Z",
"stargazers_count": 147,
"watchers_count": 147,
"stargazers_count": 146,
"watchers_count": 146,
"forks_count": 39,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 147,
"watchers": 146,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
"fork": false,
"created_at": "2021-10-27T15:51:12Z",
"updated_at": "2021-12-16T09:58:26Z",
"updated_at": "2021-12-16T18:19:08Z",
"pushed_at": "2021-10-28T06:37:37Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 73,
"watchers_count": 73,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 72,
"watchers": 73,
"score": 0
},
{

View file

@ -44,12 +44,12 @@
"pushed_at": "2021-11-18T08:05:48Z",
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 40,
"score": 0
},

View file

@ -44,12 +44,12 @@
"pushed_at": "2021-11-09T11:15:19Z",
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 16,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 16,
"forks": 15,
"watchers": 34,
"score": 0
}

View file

@ -13,10 +13,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-11T15:10:30Z",
"updated_at": "2021-12-16T18:00:28Z",
"updated_at": "2021-12-16T23:39:12Z",
"pushed_at": "2021-12-16T14:47:13Z",
"stargazers_count": 541,
"watchers_count": 541,
"stargazers_count": 546,
"watchers_count": 546,
"forks_count": 108,
"allow_forking": true,
"is_template": false,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 108,
"watchers": 541,
"watchers": 546,
"score": 0
},
{
@ -45,17 +45,17 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2021-12-16T15:59:21Z",
"updated_at": "2021-12-16T18:23:42Z",
"pushed_at": "2021-12-15T11:17:41Z",
"stargazers_count": 99,
"watchers_count": 99,
"stargazers_count": 100,
"watchers_count": 100,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 99,
"watchers": 100,
"score": 0
},
{
@ -99,17 +99,17 @@
"description": "Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)",
"fork": false,
"created_at": "2021-12-13T23:15:05Z",
"updated_at": "2021-12-16T18:04:48Z",
"updated_at": "2021-12-16T22:10:44Z",
"pushed_at": "2021-12-13T23:15:47Z",
"stargazers_count": 132,
"watchers_count": 132,
"forks_count": 16,
"stargazers_count": 134,
"watchers_count": 134,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 132,
"forks": 17,
"watchers": 134,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
"updated_at": "2021-12-16T13:36:03Z",
"updated_at": "2021-12-16T22:06:55Z",
"pushed_at": "2021-12-16T09:50:15Z",
"stargazers_count": 874,
"watchers_count": 874,
"stargazers_count": 877,
"watchers_count": 877,
"forks_count": 227,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 227,
"watchers": 874,
"watchers": 877,
"score": 0
}
]

File diff suppressed because it is too large Load diff

View file

@ -13,17 +13,17 @@
"description": "Log4j 2.15.0 Privilege Escalation -- CVE-2021-45046",
"fork": false,
"created_at": "2021-12-15T05:48:53Z",
"updated_at": "2021-12-16T15:30:46Z",
"updated_at": "2021-12-16T23:59:24Z",
"pushed_at": "2021-12-15T05:50:22Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 7,
"watchers": 9,
"score": 0
},
{
@ -109,5 +109,36 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 439085356,
"name": "log4j-samples",
"full_name": "mergebase\/log4j-samples",
"owner": {
"login": "mergebase",
"id": 73667397,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73667397?v=4",
"html_url": "https:\/\/github.com\/mergebase"
},
"html_url": "https:\/\/github.com\/mergebase\/log4j-samples",
"description": "Samples of log4j library versions to help log4j scanners \/ detectors improve their accuracy for detecting CVE-2021-45046 and CVE-2021-44228.",
"fork": false,
"created_at": "2021-12-16T18:12:29Z",
"updated_at": "2021-12-16T21:20:45Z",
"pushed_at": "2021-12-16T21:02:15Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-44228",
"cve-2021-45046",
"log4j"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -3387,7 +3387,12 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
### CVE-2021-41822
- [badboycxcc/CVE-2021-41822](https://github.com/badboycxcc/CVE-2021-41822)
### CVE-2021-41962
### CVE-2021-41962 (-)
<code>
Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Vehicle Service Management System 1.0 via the Owner fullname parameter in a Send Service Request in vehicle_service.
</code>
- [lohyt/-CVE-2021-41962](https://github.com/lohyt/-CVE-2021-41962)
### CVE-2021-42008 (2021-10-04)
@ -4003,6 +4008,10 @@ Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features u
- [axisops/CVE-2021-44228](https://github.com/axisops/CVE-2021-44228)
- [kal1gh0st/MyLog4Shell](https://github.com/kal1gh0st/MyLog4Shell)
- [hozyx/log4shell](https://github.com/hozyx/log4shell)
- [Vulnmachines/log4j-cve-2021-44228](https://github.com/Vulnmachines/log4j-cve-2021-44228)
- [kannthu/CVE-2021-44228-Apache-Log4j-Rce](https://github.com/kannthu/CVE-2021-44228-Apache-Log4j-Rce)
- [Kr0ff/CVE-2021-44228](https://github.com/Kr0ff/CVE-2021-44228)
- [suuhm/log4shell4shell](https://github.com/suuhm/log4shell4shell)
### CVE-2021-44827
- [full-disclosure/CVE-2021-44827](https://github.com/full-disclosure/CVE-2021-44827)
@ -4025,6 +4034,7 @@ It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was i
- [BobTheShoplifter/CVE-2021-45046-Info](https://github.com/BobTheShoplifter/CVE-2021-45046-Info)
- [tejas-nagchandi/CVE-2021-45046](https://github.com/tejas-nagchandi/CVE-2021-45046)
- [pravin-pp/log4j2-CVE-2021-45046](https://github.com/pravin-pp/log4j2-CVE-2021-45046)
- [mergebase/log4j-samples](https://github.com/mergebase/log4j-samples)
## 2020