mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2021/03/06 06:10:47
This commit is contained in:
parent
76e1f1ca24
commit
07f17e58b8
17 changed files with 86 additions and 81 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC exploit for CVE-2015-5477 BIND9 TKEY assertion failure",
|
||||
"fork": false,
|
||||
"created_at": "2015-07-31T23:29:43Z",
|
||||
"updated_at": "2020-11-10T00:46:07Z",
|
||||
"updated_at": "2021-03-05T19:47:50Z",
|
||||
"pushed_at": "2015-08-01T21:32:51Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"watchers": 61,
|
||||
"watchers": 62,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -155,8 +155,8 @@
|
|||
"pushed_at": "2018-01-26T14:28:58Z",
|
||||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 120,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-16T00:23:34Z",
|
||||
"updated_at": "2021-02-23T07:08:24Z",
|
||||
"updated_at": "2021-03-05T16:08:02Z",
|
||||
"pushed_at": "2020-12-22T03:10:47Z",
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"watchers": 98,
|
||||
"watchers": 99,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-17T23:48:15Z",
|
||||
"updated_at": "2021-02-26T10:55:01Z",
|
||||
"updated_at": "2021-03-05T18:53:53Z",
|
||||
"pushed_at": "2019-11-15T08:12:32Z",
|
||||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"stargazers_count": 121,
|
||||
"watchers_count": 121,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 120,
|
||||
"watchers": 121,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-28T11:50:00Z",
|
||||
"updated_at": "2021-02-20T01:43:00Z",
|
||||
"updated_at": "2021-03-05T20:30:00Z",
|
||||
"pushed_at": "2018-08-30T05:37:03Z",
|
||||
"stargazers_count": 415,
|
||||
"watchers_count": 415,
|
||||
"stargazers_count": 416,
|
||||
"watchers_count": 416,
|
||||
"forks_count": 54,
|
||||
"forks": 54,
|
||||
"watchers": 415,
|
||||
"watchers": 416,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1232,13 +1232,13 @@
|
|||
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-23T22:50:12Z",
|
||||
"updated_at": "2021-02-23T08:27:01Z",
|
||||
"updated_at": "2021-03-05T19:36:32Z",
|
||||
"pushed_at": "2019-06-22T21:48:45Z",
|
||||
"stargazers_count": 793,
|
||||
"watchers_count": 793,
|
||||
"stargazers_count": 794,
|
||||
"watchers_count": 794,
|
||||
"forks_count": 195,
|
||||
"forks": 195,
|
||||
"watchers": 793,
|
||||
"watchers": 794,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1416,13 +1416,13 @@
|
|||
"description": "Proof of concept for CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T16:53:54Z",
|
||||
"updated_at": "2021-03-03T22:38:25Z",
|
||||
"updated_at": "2021-03-05T16:12:59Z",
|
||||
"pushed_at": "2019-09-03T20:50:28Z",
|
||||
"stargazers_count": 1062,
|
||||
"watchers_count": 1062,
|
||||
"forks_count": 353,
|
||||
"forks": 353,
|
||||
"watchers": 1062,
|
||||
"stargazers_count": 1063,
|
||||
"watchers_count": 1063,
|
||||
"forks_count": 354,
|
||||
"forks": 354,
|
||||
"watchers": 1063,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC of CVE-2019-15126 kr00k vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-09T11:15:08Z",
|
||||
"updated_at": "2021-02-27T09:05:56Z",
|
||||
"updated_at": "2021-03-05T18:18:44Z",
|
||||
"pushed_at": "2020-03-19T06:55:28Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-13T14:53:54Z",
|
||||
"updated_at": "2021-02-11T06:03:43Z",
|
||||
"updated_at": "2021-03-05T18:18:36Z",
|
||||
"pushed_at": "2020-03-22T19:46:04Z",
|
||||
"stargazers_count": 189,
|
||||
"watchers_count": 189,
|
||||
"stargazers_count": 190,
|
||||
"watchers_count": 190,
|
||||
"forks_count": 58,
|
||||
"forks": 58,
|
||||
"watchers": 189,
|
||||
"watchers": 190,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Confluence 未授权 RCE (CVE-2019-3396) 漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-10T02:22:24Z",
|
||||
"updated_at": "2021-02-22T01:34:08Z",
|
||||
"updated_at": "2021-03-05T20:32:39Z",
|
||||
"pushed_at": "2019-11-01T14:33:21Z",
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"forks_count": 58,
|
||||
"forks": 58,
|
||||
"watchers": 113,
|
||||
"watchers": 114,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T17:51:29Z",
|
||||
"updated_at": "2021-03-04T16:01:52Z",
|
||||
"updated_at": "2021-03-05T20:37:45Z",
|
||||
"pushed_at": "2021-02-25T17:19:39Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 44,
|
||||
"watchers": 46,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exchange2010 authorized RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-09T10:30:16Z",
|
||||
"updated_at": "2021-02-20T10:49:44Z",
|
||||
"updated_at": "2021-03-05T19:48:01Z",
|
||||
"pushed_at": "2020-12-24T08:11:51Z",
|
||||
"stargazers_count": 126,
|
||||
"watchers_count": 126,
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 126,
|
||||
"watchers": 127,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE 2021-21315 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-01T18:52:41Z",
|
||||
"updated_at": "2021-03-05T12:07:41Z",
|
||||
"updated_at": "2021-03-05T15:38:36Z",
|
||||
"pushed_at": "2021-03-02T00:27:47Z",
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 90,
|
||||
"watchers": 91,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T17:51:29Z",
|
||||
"updated_at": "2021-03-04T16:01:52Z",
|
||||
"updated_at": "2021-03-05T20:37:45Z",
|
||||
"pushed_at": "2021-02-25T17:19:39Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 44,
|
||||
"watchers": 46,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-25T05:10:06Z",
|
||||
"updated_at": "2021-03-04T11:14:02Z",
|
||||
"updated_at": "2021-03-05T15:28:03Z",
|
||||
"pushed_at": "2021-02-25T05:49:19Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 39,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "com_media allowed paths that are not intended for image uploads to RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-03T02:13:57Z",
|
||||
"updated_at": "2021-03-05T11:14:08Z",
|
||||
"updated_at": "2021-03-05T20:42:31Z",
|
||||
"pushed_at": "2021-03-03T03:52:10Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 30,
|
||||
"watchers": 34,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "A PowerShell script to identify indicators of exploitation of CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-26865",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-03T17:36:18Z",
|
||||
"updated_at": "2021-03-05T15:12:18Z",
|
||||
"pushed_at": "2021-03-05T15:12:16Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"updated_at": "2021-03-05T17:09:03Z",
|
||||
"pushed_at": "2021-03-05T17:09:01Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -56,15 +56,15 @@
|
|||
"html_url": "https:\/\/github.com\/cert-lv"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cert-lv\/exchange_webshell_detection",
|
||||
"description": "Detect webshells dropped on Microsoft Exchange servers after 0day compromises (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065)",
|
||||
"description": "Detect webshells dropped on Microsoft Exchange servers exploited through \"proxylogon\" group of vulnerabilites (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065)",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-05T08:22:07Z",
|
||||
"updated_at": "2021-03-05T13:37:43Z",
|
||||
"pushed_at": "2021-03-05T13:37:41Z",
|
||||
"updated_at": "2021-03-05T18:42:18Z",
|
||||
"pushed_at": "2021-03-05T15:33:56Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Laravel debug rce",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-22T05:12:21Z",
|
||||
"updated_at": "2021-03-05T09:19:35Z",
|
||||
"updated_at": "2021-03-05T16:28:56Z",
|
||||
"pushed_at": "2021-01-24T05:28:07Z",
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 71,
|
||||
"watchers": 72,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -565,8 +565,8 @@
|
|||
"description": "CTF for HDE 64 students at See Security College. Exploit a JWT (web part) & CVE-2021-3156 (LPE part).",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-03T08:36:01Z",
|
||||
"updated_at": "2021-02-25T16:37:50Z",
|
||||
"pushed_at": "2021-02-25T16:37:47Z",
|
||||
"updated_at": "2021-03-05T16:22:11Z",
|
||||
"pushed_at": "2021-03-05T16:22:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -4098,7 +4098,12 @@ osCommerce 2.3.4.1 has XSS vulnerability via the authenticated user entering the
|
|||
|
||||
- [aslanemre/cve-2020-29070](https://github.com/aslanemre/cve-2020-29070)
|
||||
|
||||
### CVE-2020-29134
|
||||
### CVE-2020-29134 (2021-03-05)
|
||||
|
||||
<code>
|
||||
TOTVS Fluig Luke 1.7.0 allows directory traversal via a base64 encoded file=../ to a volume/stream/ URI. This affects: Fluig Lake 1.7.0-210217, Fluig Lake 1.7.0-210112, Fluig Lake 1.7.0-201215, Fluig Lake 1.7.0-201124 and Fluig Lake 1.7.0-200915.
|
||||
</code>
|
||||
|
||||
- [lucxssouza/CVE-2020-29134](https://github.com/lucxssouza/CVE-2020-29134)
|
||||
|
||||
### CVE-2020-29156 (2020-12-27)
|
||||
|
|
Loading…
Add table
Reference in a new issue