mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/10/23 12:14:10
This commit is contained in:
parent
df441f1543
commit
073f171253
14 changed files with 103 additions and 127 deletions
|
@ -107,6 +107,33 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 33072756,
|
||||
"name": "cve-2013-2094",
|
||||
"full_name": "timhsutw\/cve-2013-2094",
|
||||
"owner": {
|
||||
"login": "timhsutw",
|
||||
"id": 3866079,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3866079?v=4",
|
||||
"html_url": "https:\/\/github.com\/timhsutw"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/timhsutw\/cve-2013-2094",
|
||||
"description": "CVE-2013-2094 kernel exploit for i386",
|
||||
"fork": false,
|
||||
"created_at": "2015-03-29T12:55:03Z",
|
||||
"updated_at": "2020-04-07T07:55:01Z",
|
||||
"pushed_at": "2015-03-29T12:58:32Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 198426665,
|
||||
"name": "CVE-2013-2094",
|
||||
|
|
|
@ -67,17 +67,17 @@
|
|||
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-17T08:10:07Z",
|
||||
"updated_at": "2021-10-13T18:17:52Z",
|
||||
"updated_at": "2021-10-23T00:10:57Z",
|
||||
"pushed_at": "2017-11-19T11:01:16Z",
|
||||
"stargazers_count": 662,
|
||||
"watchers_count": 662,
|
||||
"stargazers_count": 661,
|
||||
"watchers_count": 661,
|
||||
"forks_count": 293,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 293,
|
||||
"watchers": 662,
|
||||
"watchers": 661,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2019-11-03T17:29:56Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Support ALL Windows Version",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-16T08:57:51Z",
|
||||
"updated_at": "2021-10-21T13:23:29Z",
|
||||
"updated_at": "2021-10-23T00:10:59Z",
|
||||
"pushed_at": "2020-09-11T07:38:22Z",
|
||||
"stargazers_count": 572,
|
||||
"watchers_count": 572,
|
||||
"stargazers_count": 571,
|
||||
"watchers_count": 571,
|
||||
"forks_count": 150,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 150,
|
||||
"watchers": 572,
|
||||
"watchers": 571,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1045,10 +1045,10 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2021-10-22T11:45:48Z",
|
||||
"updated_at": "2021-10-22T21:35:54Z",
|
||||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1160,
|
||||
"watchers_count": 1160,
|
||||
"stargazers_count": 1159,
|
||||
"watchers_count": 1159,
|
||||
"forks_count": 362,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1061,7 +1061,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 362,
|
||||
"watchers": 1160,
|
||||
"watchers": 1159,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1448,32 +1448,5 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 417689613,
|
||||
"name": "CVE-2020-5902-Scanner",
|
||||
"full_name": "anonsecteaminc\/CVE-2020-5902-Scanner",
|
||||
"owner": {
|
||||
"login": "anonsecteaminc",
|
||||
"id": 87980180,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87980180?v=4",
|
||||
"html_url": "https:\/\/github.com\/anonsecteaminc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/anonsecteaminc\/CVE-2020-5902-Scanner",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-16T02:10:03Z",
|
||||
"updated_at": "2021-10-16T02:10:25Z",
|
||||
"pushed_at": "2021-10-16T02:10:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "h2-jdbc(https:\/\/github.com\/h2database\/h2database\/issues\/3195) & mysql-jdbc(CVE-2021-2471) SQLXML XXE vulnerability reproduction.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-22T07:14:25Z",
|
||||
"updated_at": "2021-10-22T16:02:42Z",
|
||||
"updated_at": "2021-10-23T02:58:10Z",
|
||||
"pushed_at": "2021-10-22T07:28:11Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 28,
|
||||
"watchers": 30,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -40,8 +40,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-22T15:36:38Z",
|
||||
"updated_at": "2021-10-22T15:36:38Z",
|
||||
"pushed_at": "2021-10-22T15:36:39Z",
|
||||
"updated_at": "2021-10-23T02:06:42Z",
|
||||
"pushed_at": "2021-10-23T02:06:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -77,12 +77,12 @@
|
|||
"pushed_at": "2021-07-02T12:17:50Z",
|
||||
"stargazers_count": 134,
|
||||
"watchers_count": 134,
|
||||
"forks_count": 34,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"forks": 35,
|
||||
"watchers": 134,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -148,10 +148,10 @@
|
|||
"description": "CVE-2021-3493 Ubuntu OverlayFS Local Privesc (Interactive Bash Shell & Execute Command Entered)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-07T06:16:48Z",
|
||||
"updated_at": "2021-08-27T02:13:57Z",
|
||||
"updated_at": "2021-10-22T21:36:20Z",
|
||||
"pushed_at": "2021-07-07T07:19:03Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -164,7 +164,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
29
2021/CVE-2021-35215.json
Normal file
29
2021/CVE-2021-35215.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 420286323,
|
||||
"name": "CVE-2021-35215",
|
||||
"full_name": "Y4er\/CVE-2021-35215",
|
||||
"owner": {
|
||||
"login": "Y4er",
|
||||
"id": 40487319,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40487319?v=4",
|
||||
"html_url": "https:\/\/github.com\/Y4er"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Y4er\/CVE-2021-35215",
|
||||
"description": "SolarWinds Orion Platform ActionPluginBaseView 反序列化RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-23T01:35:42Z",
|
||||
"updated_at": "2021-10-23T02:57:46Z",
|
||||
"pushed_at": "2021-10-23T01:44:54Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -229,16 +229,16 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2021-10-22T12:08:42Z",
|
||||
"updated_at": "2021-10-23T03:03:02Z",
|
||||
"pushed_at": "2021-09-11T09:50:26Z",
|
||||
"stargazers_count": 1283,
|
||||
"watchers_count": 1283,
|
||||
"forks_count": 409,
|
||||
"forks_count": 410,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 409,
|
||||
"forks": 410,
|
||||
"watchers": 1283,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -10,19 +10,19 @@
|
|||
"html_url": "https:\/\/github.com\/ly4k"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ly4k\/CallbackHell",
|
||||
"description": "PoC (DoS) for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
|
||||
"description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-16T16:17:44Z",
|
||||
"updated_at": "2021-10-22T20:15:19Z",
|
||||
"pushed_at": "2021-10-17T13:27:53Z",
|
||||
"updated_at": "2021-10-22T22:48:12Z",
|
||||
"pushed_at": "2021-10-22T22:48:06Z",
|
||||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
"forks_count": 23,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"forks": 24,
|
||||
"watchers": 130,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -40,17 +40,17 @@
|
|||
"description": "windows 10 14393 LPE",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-20T09:24:36Z",
|
||||
"updated_at": "2021-10-22T18:34:16Z",
|
||||
"updated_at": "2021-10-23T02:31:37Z",
|
||||
"pushed_at": "2021-10-20T09:29:17Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 39,
|
||||
"watchers": 41,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -242,33 +242,6 @@
|
|||
"watchers": 33,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 414027620,
|
||||
"name": "CVE-2021-41773",
|
||||
"full_name": "ajdumanhug\/CVE-2021-41773",
|
||||
"owner": {
|
||||
"login": "ajdumanhug",
|
||||
"id": 9420289,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9420289?v=4",
|
||||
"html_url": "https:\/\/github.com\/ajdumanhug"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ajdumanhug\/CVE-2021-41773",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-06T01:08:04Z",
|
||||
"updated_at": "2021-10-19T09:26:46Z",
|
||||
"pushed_at": "2021-10-13T13:33:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 414043746,
|
||||
"name": "CVE-2021-41773_CVE-2021-42013",
|
||||
|
@ -1577,38 +1550,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 417683389,
|
||||
"name": "CVE-2021-41773-PoC",
|
||||
"full_name": "anonsecteaminc\/CVE-2021-41773-PoC",
|
||||
"owner": {
|
||||
"login": "anonsecteaminc",
|
||||
"id": 87980180,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87980180?v=4",
|
||||
"html_url": "https:\/\/github.com\/anonsecteaminc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/anonsecteaminc\/CVE-2021-41773-PoC",
|
||||
"description": "CVE-2021-41773-PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-16T01:32:17Z",
|
||||
"updated_at": "2021-10-16T01:38:11Z",
|
||||
"pushed_at": "2021-10-16T01:34:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"2021",
|
||||
"cve",
|
||||
"cve-2021-41773-poc",
|
||||
"hacktoberfest2021"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 417869261,
|
||||
"name": "CVE-2021-41773_Honeypot",
|
||||
|
|
12
README.md
12
README.md
|
@ -2219,6 +2219,14 @@ Microsoft discovered a remote code execution (RCE) vulnerability in the SolarWin
|
|||
|
||||
- [NattiSamson/Serv-U-CVE-2021-35211](https://github.com/NattiSamson/Serv-U-CVE-2021-35211)
|
||||
|
||||
### CVE-2021-35215 (2021-09-01)
|
||||
|
||||
<code>
|
||||
Insecure deserialization leading to Remote Code Execution was detected in the Orion Platform version 2020.2.5. Authentication is required to exploit this vulnerability.
|
||||
</code>
|
||||
|
||||
- [Y4er/CVE-2021-35215](https://github.com/Y4er/CVE-2021-35215)
|
||||
|
||||
### CVE-2021-35296 (2021-10-04)
|
||||
|
||||
<code>
|
||||
|
@ -2851,7 +2859,6 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
|
|||
- [RyouYoo/CVE-2021-41773](https://github.com/RyouYoo/CVE-2021-41773)
|
||||
- [TishcaTpx/POC-CVE-2021-41773](https://github.com/TishcaTpx/POC-CVE-2021-41773)
|
||||
- [lorddemon/CVE-2021-41773-PoC](https://github.com/lorddemon/CVE-2021-41773-PoC)
|
||||
- [ajdumanhug/CVE-2021-41773](https://github.com/ajdumanhug/CVE-2021-41773)
|
||||
- [Ls4ss/CVE-2021-41773_CVE-2021-42013](https://github.com/Ls4ss/CVE-2021-41773_CVE-2021-42013)
|
||||
- [itsecurityco/CVE-2021-41773](https://github.com/itsecurityco/CVE-2021-41773)
|
||||
- [habibiefaried/CVE-2021-41773-PoC](https://github.com/habibiefaried/CVE-2021-41773-PoC)
|
||||
|
@ -2899,7 +2906,6 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
|
|||
- [MrCl0wnLab/SimplesApachePathTraversal](https://github.com/MrCl0wnLab/SimplesApachePathTraversal)
|
||||
- [theLSA/apache-httpd-path-traversal-checker](https://github.com/theLSA/apache-httpd-path-traversal-checker)
|
||||
- [LudovicPatho/CVE-2021-41773](https://github.com/LudovicPatho/CVE-2021-41773)
|
||||
- [anonsecteaminc/CVE-2021-41773-PoC](https://github.com/anonsecteaminc/CVE-2021-41773-PoC)
|
||||
- [lopqto/CVE-2021-41773_Honeypot](https://github.com/lopqto/CVE-2021-41773_Honeypot)
|
||||
- [vulf/CVE-2021-41773_42013](https://github.com/vulf/CVE-2021-41773_42013)
|
||||
- [cloudbyteelias/CVE-2021-41773](https://github.com/cloudbyteelias/CVE-2021-41773)
|
||||
|
@ -4120,7 +4126,6 @@ In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.
|
|||
- [ludy-dev/BIG-IP-F5-TMUI-RCE-Vulnerability](https://github.com/ludy-dev/BIG-IP-F5-TMUI-RCE-Vulnerability)
|
||||
- [faisalfs10x/F5-BIG-IP-CVE-2020-5902-shodan-scanner](https://github.com/faisalfs10x/F5-BIG-IP-CVE-2020-5902-shodan-scanner)
|
||||
- [haisenberg/CVE-2020-5902](https://github.com/haisenberg/CVE-2020-5902)
|
||||
- [anonsecteaminc/CVE-2020-5902-Scanner](https://github.com/anonsecteaminc/CVE-2020-5902-Scanner)
|
||||
|
||||
### CVE-2020-5903 (2020-07-01)
|
||||
|
||||
|
@ -19934,6 +19939,7 @@ The perf_swevent_init function in kernel/events/core.c in the Linux kernel befor
|
|||
- [hiikezoe/libperf_event_exploit](https://github.com/hiikezoe/libperf_event_exploit)
|
||||
- [Pashkela/CVE-2013-2094](https://github.com/Pashkela/CVE-2013-2094)
|
||||
- [tarunyadav/fix-cve-2013-2094](https://github.com/tarunyadav/fix-cve-2013-2094)
|
||||
- [timhsutw/cve-2013-2094](https://github.com/timhsutw/cve-2013-2094)
|
||||
- [vnik5287/CVE-2013-2094](https://github.com/vnik5287/CVE-2013-2094)
|
||||
|
||||
### CVE-2013-2186 (2013-10-28)
|
||||
|
|
Loading…
Reference in a new issue