mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2022/05/30 06:15:50
This commit is contained in:
parent
655cb7323c
commit
044017d21e
22 changed files with 167 additions and 171 deletions
|
@ -13,16 +13,16 @@
|
|||
"description": "EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)",
|
||||
"fork": false,
|
||||
"created_at": "2016-02-09T21:30:34Z",
|
||||
"updated_at": "2022-03-24T19:13:00Z",
|
||||
"updated_at": "2022-05-30T02:05:40Z",
|
||||
"pushed_at": "2016-05-09T17:53:48Z",
|
||||
"stargazers_count": 330,
|
||||
"watchers_count": 330,
|
||||
"forks_count": 150,
|
||||
"forks_count": 151,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 150,
|
||||
"forks": 151,
|
||||
"watchers": 330,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -272,14 +272,14 @@
|
|||
{
|
||||
"id": 328929654,
|
||||
"name": "CVE-2017-12615-EXP",
|
||||
"full_name": "gardenWhy\/CVE-2017-12615-EXP",
|
||||
"full_name": "w0x68y\/CVE-2017-12615-EXP",
|
||||
"owner": {
|
||||
"login": "gardenWhy",
|
||||
"login": "w0x68y",
|
||||
"id": 22195911,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22195911?v=4",
|
||||
"html_url": "https:\/\/github.com\/gardenWhy"
|
||||
"html_url": "https:\/\/github.com\/w0x68y"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gardenWhy\/CVE-2017-12615-EXP",
|
||||
"html_url": "https:\/\/github.com\/w0x68y\/CVE-2017-12615-EXP",
|
||||
"description": "CVE-2017-12615 任意文件写入exp,写入webshell",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-12T09:07:12Z",
|
||||
|
|
|
@ -154,17 +154,17 @@
|
|||
"description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-06-05T16:25:57Z",
|
||||
"updated_at": "2022-05-18T17:45:04Z",
|
||||
"updated_at": "2022-05-30T04:55:40Z",
|
||||
"pushed_at": "2021-03-09T09:12:55Z",
|
||||
"stargazers_count": 250,
|
||||
"watchers_count": 250,
|
||||
"stargazers_count": 249,
|
||||
"watchers_count": 249,
|
||||
"forks_count": 83,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 83,
|
||||
"watchers": 250,
|
||||
"watchers": 249,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers (all versions prior to V3.5) and TALON TC BACnet Automation Controllers (all versions prior to V3.5). With a 7.5 CVSS, this exploit allows for an attacker to perform an authentication bypass using an alternate path or channel to access hidden directories in the web server. This repository takes advantage of CVE-2017-9947.",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-26T01:13:42Z",
|
||||
"updated_at": "2022-05-29T23:05:25Z",
|
||||
"updated_at": "2022-05-30T03:36:24Z",
|
||||
"pushed_at": "2022-05-26T19:14:20Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 1,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -681,12 +681,12 @@
|
|||
"pushed_at": "2019-05-16T02:12:17Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 35,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"forks": 34,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -2861,17 +2861,17 @@
|
|||
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-21T02:22:29Z",
|
||||
"updated_at": "2022-05-29T06:14:22Z",
|
||||
"updated_at": "2022-05-30T01:34:49Z",
|
||||
"pushed_at": "2020-01-21T03:15:41Z",
|
||||
"stargazers_count": 293,
|
||||
"watchers_count": 293,
|
||||
"stargazers_count": 295,
|
||||
"watchers_count": 295,
|
||||
"forks_count": 71,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 71,
|
||||
"watchers": 293,
|
||||
"watchers": 295,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Atlassian JIRA Template injection vulnerability RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-16T02:27:00Z",
|
||||
"updated_at": "2022-03-09T16:25:30Z",
|
||||
"updated_at": "2022-05-30T05:56:59Z",
|
||||
"pushed_at": "2019-07-22T06:47:52Z",
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 84,
|
||||
"watchers": 85,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2022-05-27T03:03:19Z",
|
||||
"updated_at": "2022-05-30T04:59:18Z",
|
||||
"pushed_at": "2021-12-08T10:31:54Z",
|
||||
"stargazers_count": 1457,
|
||||
"watchers_count": 1457,
|
||||
"stargazers_count": 1458,
|
||||
"watchers_count": 1458,
|
||||
"forks_count": 333,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 333,
|
||||
"watchers": 1457,
|
||||
"watchers": 1458,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -121,10 +121,10 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2022-05-27T17:05:07Z",
|
||||
"updated_at": "2022-05-30T01:20:12Z",
|
||||
"pushed_at": "2021-07-30T03:28:00Z",
|
||||
"stargazers_count": 960,
|
||||
"watchers_count": 960,
|
||||
"stargazers_count": 961,
|
||||
"watchers_count": 961,
|
||||
"forks_count": 300,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -135,7 +135,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 300,
|
||||
"watchers": 960,
|
||||
"watchers": 961,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2021-1732 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-05T02:11:10Z",
|
||||
"updated_at": "2022-05-05T02:28:30Z",
|
||||
"updated_at": "2022-05-30T02:47:05Z",
|
||||
"pushed_at": "2021-03-05T03:10:26Z",
|
||||
"stargazers_count": 379,
|
||||
"watchers_count": 379,
|
||||
"stargazers_count": 380,
|
||||
"watchers_count": 380,
|
||||
"forks_count": 118,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 118,
|
||||
"watchers": 379,
|
||||
"watchers": 380,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -63,14 +63,14 @@
|
|||
{
|
||||
"id": 440732240,
|
||||
"name": "Gitlab-CVE-2021-22205",
|
||||
"full_name": "gardenWhy\/Gitlab-CVE-2021-22205",
|
||||
"full_name": "w0x68y\/Gitlab-CVE-2021-22205",
|
||||
"owner": {
|
||||
"login": "gardenWhy",
|
||||
"login": "w0x68y",
|
||||
"id": 22195911,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22195911?v=4",
|
||||
"html_url": "https:\/\/github.com\/gardenWhy"
|
||||
"html_url": "https:\/\/github.com\/w0x68y"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gardenWhy\/Gitlab-CVE-2021-22205",
|
||||
"html_url": "https:\/\/github.com\/w0x68y\/Gitlab-CVE-2021-22205",
|
||||
"description": "CVE-2021-22205 的批量检测脚本",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-22T04:30:17Z",
|
||||
|
|
56
2021/CVE-2021-24160.json
Normal file
56
2021/CVE-2021-24160.json
Normal file
|
@ -0,0 +1,56 @@
|
|||
[
|
||||
{
|
||||
"id": 497754815,
|
||||
"name": "CVE-2021-24160",
|
||||
"full_name": "hnthuan1998\/CVE-2021-24160",
|
||||
"owner": {
|
||||
"login": "hnthuan1998",
|
||||
"id": 106500287,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106500287?v=4",
|
||||
"html_url": "https:\/\/github.com\/hnthuan1998"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hnthuan1998\/CVE-2021-24160",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-05-30T01:46:50Z",
|
||||
"updated_at": "2022-05-30T01:46:50Z",
|
||||
"pushed_at": "2022-05-30T01:46:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 497755127,
|
||||
"name": "Exploit-CVE-2021-24160",
|
||||
"full_name": "hnthuan1998\/Exploit-CVE-2021-24160",
|
||||
"owner": {
|
||||
"login": "hnthuan1998",
|
||||
"id": 106500287,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106500287?v=4",
|
||||
"html_url": "https:\/\/github.com\/hnthuan1998"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hnthuan1998\/Exploit-CVE-2021-24160",
|
||||
"description": "Exploit CVE-2021-24160",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-30T01:48:27Z",
|
||||
"updated_at": "2022-05-30T01:52:13Z",
|
||||
"pushed_at": "2022-05-30T01:52:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -121,10 +121,10 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2022-05-27T17:05:07Z",
|
||||
"updated_at": "2022-05-30T01:20:12Z",
|
||||
"pushed_at": "2021-07-30T03:28:00Z",
|
||||
"stargazers_count": 960,
|
||||
"watchers_count": 960,
|
||||
"stargazers_count": 961,
|
||||
"watchers_count": 961,
|
||||
"forks_count": 300,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -135,7 +135,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 300,
|
||||
"watchers": 960,
|
||||
"watchers": 961,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "proxylogon exploit - CVE-2021-26857",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T17:32:32Z",
|
||||
"updated_at": "2022-05-29T22:51:56Z",
|
||||
"updated_at": "2022-05-30T01:19:27Z",
|
||||
"pushed_at": "2021-03-11T17:34:15Z",
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 113,
|
||||
"watchers": 114,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -380,17 +380,17 @@
|
|||
"description": "PolicyKit CVE-2021-3560 Exploit (Authentication Agent)",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-29T18:57:30Z",
|
||||
"updated_at": "2022-05-29T18:09:24Z",
|
||||
"updated_at": "2022-05-30T06:13:50Z",
|
||||
"pushed_at": "2022-05-02T07:49:01Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 53,
|
||||
"watchers": 62,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -407,17 +407,17 @@
|
|||
"description": "PolicyKit CVE-2021-3560 Exploitation (Authentication Agent)",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-30T05:53:45Z",
|
||||
"updated_at": "2022-05-28T11:58:41Z",
|
||||
"updated_at": "2022-05-30T01:49:35Z",
|
||||
"pushed_at": "2022-05-02T07:49:12Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -44,7 +44,7 @@
|
|||
"pushed_at": "2022-02-09T17:27:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -53,7 +53,7 @@
|
|||
"path-traversal-exploitation"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -142,46 +142,6 @@
|
|||
"watchers": 181,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 436877979,
|
||||
"name": "cloudrasp-log4j2",
|
||||
"full_name": "boundaryx\/cloudrasp-log4j2",
|
||||
"owner": {
|
||||
"login": "boundaryx",
|
||||
"id": 95878655,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95878655?v=4",
|
||||
"html_url": "https:\/\/github.com\/boundaryx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/boundaryx\/cloudrasp-log4j2",
|
||||
"description": "一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T06:42:37Z",
|
||||
"updated_at": "2022-05-19T08:41:19Z",
|
||||
"pushed_at": "2021-12-11T02:49:41Z",
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2021-44228",
|
||||
"defense",
|
||||
"hardening",
|
||||
"java",
|
||||
"log4j",
|
||||
"log4j2",
|
||||
"protection",
|
||||
"rasp",
|
||||
"rce",
|
||||
"security",
|
||||
"security-tools",
|
||||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 106,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 436881928,
|
||||
"name": "CVE-2021-44228",
|
||||
|
@ -649,11 +609,11 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2022-05-28T13:37:57Z",
|
||||
"updated_at": "2022-05-30T02:37:39Z",
|
||||
"pushed_at": "2022-03-20T16:33:49Z",
|
||||
"stargazers_count": 1377,
|
||||
"watchers_count": 1377,
|
||||
"forks_count": 377,
|
||||
"stargazers_count": 1378,
|
||||
"watchers_count": 1378,
|
||||
"forks_count": 378,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -663,8 +623,8 @@
|
|||
"security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 377,
|
||||
"watchers": 1377,
|
||||
"forks": 378,
|
||||
"watchers": 1378,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -699,33 +659,6 @@
|
|||
"watchers": 79,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437142312,
|
||||
"name": "CVE-2021-44228",
|
||||
"full_name": "racoon-rac\/CVE-2021-44228",
|
||||
"owner": {
|
||||
"login": "racoon-rac",
|
||||
"id": 64579294,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64579294?v=4",
|
||||
"html_url": "https:\/\/github.com\/racoon-rac"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/racoon-rac\/CVE-2021-44228",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:37:55Z",
|
||||
"updated_at": "2021-12-11T01:11:19Z",
|
||||
"pushed_at": "2021-12-11T01:07:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437142703,
|
||||
"name": "CVE-2021-44228-PoC",
|
||||
|
@ -3175,17 +3108,17 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2022-05-29T14:54:00Z",
|
||||
"updated_at": "2022-05-30T02:58:32Z",
|
||||
"pushed_at": "2022-05-17T13:25:17Z",
|
||||
"stargazers_count": 2899,
|
||||
"watchers_count": 2899,
|
||||
"stargazers_count": 2901,
|
||||
"watchers_count": 2901,
|
||||
"forks_count": 711,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 711,
|
||||
"watchers": 2899,
|
||||
"watchers": 2901,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Atlassian Jira Seraph Authentication Bypass RCE(CVE-2022-0540)",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-25T10:47:04Z",
|
||||
"updated_at": "2022-05-29T13:52:19Z",
|
||||
"updated_at": "2022-05-30T01:34:01Z",
|
||||
"pushed_at": "2022-05-25T13:43:16Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2022-03-16T06:48:01Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"forks_count": 18,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"forks": 19,
|
||||
"watchers": 46,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -310,17 +310,17 @@
|
|||
"description": "POC for CVE-2022-1388",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-09T11:46:45Z",
|
||||
"updated_at": "2022-05-27T04:40:12Z",
|
||||
"updated_at": "2022-05-30T00:35:04Z",
|
||||
"pushed_at": "2022-05-09T20:52:07Z",
|
||||
"stargazers_count": 201,
|
||||
"watchers_count": 201,
|
||||
"stargazers_count": 202,
|
||||
"watchers_count": 202,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 201,
|
||||
"watchers": 202,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -529,17 +529,17 @@
|
|||
"description": "PoC For F5 BIG-IP - bash script Exploit one Liner",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-10T02:57:31Z",
|
||||
"updated_at": "2022-05-28T12:40:11Z",
|
||||
"updated_at": "2022-05-30T06:16:51Z",
|
||||
"pushed_at": "2022-05-10T08:38:58Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 2,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"forks": 3,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1324,7 +1324,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-05-17T10:51:39Z",
|
||||
"updated_at": "2022-05-19T04:36:29Z",
|
||||
"pushed_at": "2022-05-21T15:36:57Z",
|
||||
"pushed_at": "2022-05-30T05:40:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -420,17 +420,17 @@
|
|||
"description": "CVE-2022-22947批量检测脚本,超时时间不超过2s,已更新可反弹shell的EXP,欢迎师傅们试用",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-04T11:31:00Z",
|
||||
"updated_at": "2022-05-29T16:45:51Z",
|
||||
"updated_at": "2022-05-30T02:01:50Z",
|
||||
"pushed_at": "2022-03-08T09:43:50Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 31,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-05-24T20:19:55Z",
|
||||
"updated_at": "2022-05-29T18:08:08Z",
|
||||
"updated_at": "2022-05-30T01:26:34Z",
|
||||
"pushed_at": "2022-05-26T16:07:18Z",
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"forks_count": 18,
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 105,
|
||||
"forks": 19,
|
||||
"watchers": 106,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -40,8 +40,8 @@
|
|||
"description": "vmware authentication bypass",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-28T20:56:09Z",
|
||||
"updated_at": "2022-05-29T12:32:49Z",
|
||||
"pushed_at": "2022-05-28T21:10:21Z",
|
||||
"updated_at": "2022-05-30T01:01:11Z",
|
||||
"pushed_at": "2022-05-30T03:10:48Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
|
|
15
README.md
15
README.md
|
@ -3459,7 +3459,7 @@ An issue has been discovered in GitLab CE/EE affecting all versions starting fro
|
|||
|
||||
- [mr-r3bot/Gitlab-CVE-2021-22205](https://github.com/mr-r3bot/Gitlab-CVE-2021-22205)
|
||||
- [inspiringz/CVE-2021-22205](https://github.com/inspiringz/CVE-2021-22205)
|
||||
- [gardenWhy/Gitlab-CVE-2021-22205](https://github.com/gardenWhy/Gitlab-CVE-2021-22205)
|
||||
- [w0x68y/Gitlab-CVE-2021-22205](https://github.com/w0x68y/Gitlab-CVE-2021-22205)
|
||||
- [GitLab-Red-Team/cve-2021-22205-hash-harvester](https://github.com/GitLab-Red-Team/cve-2021-22205-hash-harvester)
|
||||
- [honypot/CVE-2021-22205](https://github.com/honypot/CVE-2021-22205)
|
||||
- [momika233/cve-2021-22205-GitLab-13.10.2---Remote-Code-Execution-RCE-Unauthenticated-](https://github.com/momika233/cve-2021-22205-GitLab-13.10.2---Remote-Code-Execution-RCE-Unauthenticated-)
|
||||
|
@ -3605,6 +3605,15 @@ Arbitrary file upload in the Modern Events Calendar Lite WordPress plugin, versi
|
|||
|
||||
- [dnr6419/CVE-2021-24145](https://github.com/dnr6419/CVE-2021-24145)
|
||||
|
||||
### CVE-2021-24160 (2021-04-05)
|
||||
|
||||
<code>
|
||||
In the Reponsive Menu (free and Pro) WordPress plugins before 4.0.4, subscribers could upload zip archives containing malicious PHP files that would get extracted to the /rmp-menu/ directory. These files could then be accessed via the front end of the site to trigger remote code execution and ultimately allow an attacker to execute commands to further infect a WordPress site.
|
||||
</code>
|
||||
|
||||
- [hnthuan1998/CVE-2021-24160](https://github.com/hnthuan1998/CVE-2021-24160)
|
||||
- [hnthuan1998/Exploit-CVE-2021-24160](https://github.com/hnthuan1998/Exploit-CVE-2021-24160)
|
||||
|
||||
### CVE-2021-24307 (2021-05-24)
|
||||
|
||||
<code>
|
||||
|
@ -5548,7 +5557,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [jacobtread/L4J-Vuln-Patch](https://github.com/jacobtread/L4J-Vuln-Patch)
|
||||
- [jas502n/Log4j2-CVE-2021-44228](https://github.com/jas502n/Log4j2-CVE-2021-44228)
|
||||
- [HyCraftHD/Log4J-RCE-Proof-Of-Concept](https://github.com/HyCraftHD/Log4J-RCE-Proof-Of-Concept)
|
||||
- [boundaryx/cloudrasp-log4j2](https://github.com/boundaryx/cloudrasp-log4j2)
|
||||
- [dbgee/CVE-2021-44228](https://github.com/dbgee/CVE-2021-44228)
|
||||
- [CreeperHost/Log4jPatcher](https://github.com/CreeperHost/Log4jPatcher)
|
||||
- [DragonSurvivalEU/RCE](https://github.com/DragonSurvivalEU/RCE)
|
||||
|
@ -5566,7 +5574,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [Puliczek/CVE-2021-44228-PoC-log4j-bypass-words](https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words)
|
||||
- [kozmer/log4j-shell-poc](https://github.com/kozmer/log4j-shell-poc)
|
||||
- [Adikso/minecraft-log4j-honeypot](https://github.com/Adikso/minecraft-log4j-honeypot)
|
||||
- [racoon-rac/CVE-2021-44228](https://github.com/racoon-rac/CVE-2021-44228)
|
||||
- [TheArqsz/CVE-2021-44228-PoC](https://github.com/TheArqsz/CVE-2021-44228-PoC)
|
||||
- [1lann/log4shelldetect](https://github.com/1lann/log4shelldetect)
|
||||
- [binganao/Log4j2-RCE](https://github.com/binganao/Log4j2-RCE)
|
||||
|
@ -20627,7 +20634,7 @@ When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.
|
|||
- [cved-sources/cve-2017-12615](https://github.com/cved-sources/cve-2017-12615)
|
||||
- [ianxtianxt/CVE-2017-12615](https://github.com/ianxtianxt/CVE-2017-12615)
|
||||
- [cyberharsh/Tomcat-CVE-2017-12615](https://github.com/cyberharsh/Tomcat-CVE-2017-12615)
|
||||
- [gardenWhy/CVE-2017-12615-EXP](https://github.com/gardenWhy/CVE-2017-12615-EXP)
|
||||
- [w0x68y/CVE-2017-12615-EXP](https://github.com/w0x68y/CVE-2017-12615-EXP)
|
||||
|
||||
### CVE-2017-12617 (2017-10-03)
|
||||
|
||||
|
|
Loading…
Reference in a new issue