mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2022/09/09 00:16:54
This commit is contained in:
parent
c6219f98d6
commit
1bfafab96c
36 changed files with 1006 additions and 93 deletions
|
@ -41,11 +41,11 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-09-08T07:57:12Z",
|
||||
"updated_at": "2022-09-08T18:27:21Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1498,
|
||||
"watchers_count": 1498,
|
||||
"forks_count": 305,
|
||||
"stargazers_count": 1499,
|
||||
"watchers_count": 1499,
|
||||
"forks_count": 306,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -72,8 +72,8 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 305,
|
||||
"watchers": 1498,
|
||||
"forks": 306,
|
||||
"watchers": 1499,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,11 +13,11 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-09-08T07:57:12Z",
|
||||
"updated_at": "2022-09-08T18:27:21Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1498,
|
||||
"watchers_count": 1498,
|
||||
"forks_count": 305,
|
||||
"stargazers_count": 1499,
|
||||
"watchers_count": 1499,
|
||||
"forks_count": 306,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -44,8 +44,8 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 305,
|
||||
"watchers": 1498,
|
||||
"forks": 306,
|
||||
"watchers": 1499,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -41,11 +41,11 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-09-08T07:57:12Z",
|
||||
"updated_at": "2022-09-08T18:27:21Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1498,
|
||||
"watchers_count": 1498,
|
||||
"forks_count": 305,
|
||||
"stargazers_count": 1499,
|
||||
"watchers_count": 1499,
|
||||
"forks_count": 306,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -72,8 +72,8 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 305,
|
||||
"watchers": 1498,
|
||||
"forks": 306,
|
||||
"watchers": 1499,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -41,10 +41,10 @@
|
|||
"description": "CVE-2017-8917 - SQL injection Vulnerability Exploit in Joomla 3.7.0 ",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-19T16:50:39Z",
|
||||
"updated_at": "2022-08-26T05:44:58Z",
|
||||
"updated_at": "2022-09-08T21:13:49Z",
|
||||
"pushed_at": "2022-03-07T20:04:08Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -52,7 +52,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,4 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 120640426,
|
||||
"name": "CVE-2018-0101-DOS-POC",
|
||||
"full_name": "1337g\/CVE-2018-0101-DOS-POC",
|
||||
"owner": {
|
||||
"login": "1337g",
|
||||
"id": 32504404,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32504404?v=4",
|
||||
"html_url": "https:\/\/github.com\/1337g"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/1337g\/CVE-2018-0101-DOS-POC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-02-07T16:25:59Z",
|
||||
"updated_at": "2020-04-06T12:17:46Z",
|
||||
"pushed_at": "2018-02-07T16:43:08Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 120782386,
|
||||
"name": "ciscoasa_honeypot",
|
||||
|
|
|
@ -549,11 +549,11 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-09-08T07:57:12Z",
|
||||
"updated_at": "2022-09-08T18:27:21Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1498,
|
||||
"watchers_count": 1498,
|
||||
"forks_count": 305,
|
||||
"stargazers_count": 1499,
|
||||
"watchers_count": 1499,
|
||||
"forks_count": 306,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -580,8 +580,8 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 305,
|
||||
"watchers": 1498,
|
||||
"forks": 306,
|
||||
"watchers": 1499,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
30
2018/CVE-2018-3608.json
Normal file
30
2018/CVE-2018-3608.json
Normal file
|
@ -0,0 +1,30 @@
|
|||
[
|
||||
{
|
||||
"id": 120301126,
|
||||
"name": "Trend_Micro_POC",
|
||||
"full_name": "ZhiyuanWang-Chengdu-Qihoo360\/Trend_Micro_POC",
|
||||
"owner": {
|
||||
"login": "ZhiyuanWang-Chengdu-Qihoo360",
|
||||
"id": 35134599,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35134599?v=4",
|
||||
"html_url": "https:\/\/github.com\/ZhiyuanWang-Chengdu-Qihoo360"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ZhiyuanWang-Chengdu-Qihoo360\/Trend_Micro_POC",
|
||||
"description": "CVE-2018-3608 Trend_Micro_CVE",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-05T12:22:28Z",
|
||||
"updated_at": "2019-09-27T17:09:24Z",
|
||||
"pushed_at": "2018-02-05T12:55:36Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -29,6 +29,62 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 120909146,
|
||||
"name": "CVE-2018-4878",
|
||||
"full_name": "mdsecactivebreach\/CVE-2018-4878",
|
||||
"owner": {
|
||||
"login": "mdsecactivebreach",
|
||||
"id": 29373540,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29373540?v=4",
|
||||
"html_url": "https:\/\/github.com\/mdsecactivebreach"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mdsecactivebreach\/CVE-2018-4878",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-02-09T13:30:46Z",
|
||||
"updated_at": "2022-07-28T12:51:38Z",
|
||||
"pushed_at": "2018-02-09T14:38:27Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 120962228,
|
||||
"name": "CVE-2018-4878",
|
||||
"full_name": "hybridious\/CVE-2018-4878",
|
||||
"owner": {
|
||||
"login": "hybridious",
|
||||
"id": 26754785,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26754785?v=4",
|
||||
"html_url": "https:\/\/github.com\/hybridious"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hybridious\/CVE-2018-4878",
|
||||
"description": "Aggressor Script to just launch IE driveby for CVE-2018-4878",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-09T22:25:03Z",
|
||||
"updated_at": "2022-01-17T03:52:29Z",
|
||||
"pushed_at": "2018-02-09T22:09:42Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 121002284,
|
||||
"name": "CVE-2018-4878",
|
||||
|
|
|
@ -1,4 +1,116 @@
|
|||
[
|
||||
{
|
||||
"id": 120386140,
|
||||
"name": "wordpress-fix-cve-2018-6389",
|
||||
"full_name": "yolabingo\/wordpress-fix-cve-2018-6389",
|
||||
"owner": {
|
||||
"login": "yolabingo",
|
||||
"id": 628954,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/628954?v=4",
|
||||
"html_url": "https:\/\/github.com\/yolabingo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yolabingo\/wordpress-fix-cve-2018-6389",
|
||||
"description": "Apache RewriteRule to mitigate potential DoS attack via Wordpress wp-admin\/load-scripts.php file",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-06T01:43:33Z",
|
||||
"updated_at": "2018-02-08T01:19:57Z",
|
||||
"pushed_at": "2018-02-06T01:46:23Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 120477120,
|
||||
"name": "CVE-2018-6389",
|
||||
"full_name": "WazeHell\/CVE-2018-6389",
|
||||
"owner": {
|
||||
"login": "WazeHell",
|
||||
"id": 20618414,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20618414?v=4",
|
||||
"html_url": "https:\/\/github.com\/WazeHell"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/WazeHell\/CVE-2018-6389",
|
||||
"description": "CVE-2018-6389 Exploit In WordPress DoS ",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-06T15:16:03Z",
|
||||
"updated_at": "2022-07-27T19:27:50Z",
|
||||
"pushed_at": "2018-02-06T15:36:29Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 79,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 120533146,
|
||||
"name": "modsecurity-cve-2018-6389",
|
||||
"full_name": "rastating\/modsecurity-cve-2018-6389",
|
||||
"owner": {
|
||||
"login": "rastating",
|
||||
"id": 2500434,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2500434?v=4",
|
||||
"html_url": "https:\/\/github.com\/rastating"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rastating\/modsecurity-cve-2018-6389",
|
||||
"description": "A ModSecurity ruleset for detecting potential attacks using CVE-2018-6389",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-06T22:51:21Z",
|
||||
"updated_at": "2020-10-21T21:49:25Z",
|
||||
"pushed_at": "2018-02-07T01:05:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 120540306,
|
||||
"name": "CVE-2018-6389",
|
||||
"full_name": "knqyf263\/CVE-2018-6389",
|
||||
"owner": {
|
||||
"login": "knqyf263",
|
||||
"id": 2253692,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
|
||||
"html_url": "https:\/\/github.com\/knqyf263"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2018-6389",
|
||||
"description": "WordPress DoS (CVE-2018-6389)",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-07T00:20:57Z",
|
||||
"updated_at": "2020-01-17T20:42:25Z",
|
||||
"pushed_at": "2018-02-07T00:43:23Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 120617956,
|
||||
"name": "cve-2018-6389-php-patcher",
|
||||
|
@ -27,6 +139,34 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 120916403,
|
||||
"name": "wordpress-CVE-2018-6389",
|
||||
"full_name": "dsfau\/wordpress-CVE-2018-6389",
|
||||
"owner": {
|
||||
"login": "dsfau",
|
||||
"id": 26786936,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26786936?v=4",
|
||||
"html_url": "https:\/\/github.com\/dsfau"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dsfau\/wordpress-CVE-2018-6389",
|
||||
"description": "Metasploit module for WordPress DOS load-scripts.php CVE-2018-638",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-09T14:37:44Z",
|
||||
"updated_at": "2018-12-11T09:20:38Z",
|
||||
"pushed_at": "2018-02-09T19:40:28Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 121636079,
|
||||
"name": "CVE-2018-6389-FIX",
|
||||
|
|
|
@ -1,4 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 119714188,
|
||||
"name": "netwave-dosvulnerability",
|
||||
"full_name": "dreadlocked\/netwave-dosvulnerability",
|
||||
"owner": {
|
||||
"login": "dreadlocked",
|
||||
"id": 7407033,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7407033?v=4",
|
||||
"html_url": "https:\/\/github.com\/dreadlocked"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dreadlocked\/netwave-dosvulnerability",
|
||||
"description": "[CVE-2018-6479] Netwave IP Camera server vulnerable to Denial of Service via one single huge POST request.",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-31T16:38:48Z",
|
||||
"updated_at": "2021-07-26T04:36:04Z",
|
||||
"pushed_at": "2018-02-01T20:08:01Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 460682978,
|
||||
"name": "Tool_Camera_Exploit_Netwave_CVE-2018-6479",
|
||||
|
|
|
@ -13,18 +13,18 @@
|
|||
"description": "Jackson Rce For CVE-2019-12384 ",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-24T07:12:14Z",
|
||||
"updated_at": "2022-06-14T13:06:25Z",
|
||||
"updated_at": "2022-09-08T21:10:08Z",
|
||||
"pushed_at": "2019-07-24T07:31:42Z",
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"forks_count": 27,
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 94,
|
||||
"forks": 28,
|
||||
"watchers": 95,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -822,10 +822,10 @@
|
|||
"description": "Indicator of Compromise Scanner for CVE-2019-19781",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-21T15:20:25Z",
|
||||
"updated_at": "2022-07-02T08:18:59Z",
|
||||
"updated_at": "2022-09-08T21:52:01Z",
|
||||
"pushed_at": "2020-03-25T05:07:43Z",
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -833,7 +833,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 89,
|
||||
"watchers": 90,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -181,11 +181,11 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-09-08T07:57:12Z",
|
||||
"updated_at": "2022-09-08T18:27:21Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1498,
|
||||
"watchers_count": 1498,
|
||||
"forks_count": 305,
|
||||
"stargazers_count": 1499,
|
||||
"watchers_count": 1499,
|
||||
"forks_count": 306,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -212,8 +212,8 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 305,
|
||||
"watchers": 1498,
|
||||
"forks": 306,
|
||||
"watchers": 1499,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -164,13 +164,13 @@
|
|||
"pushed_at": "2020-10-15T18:31:15Z",
|
||||
"stargazers_count": 467,
|
||||
"watchers_count": 467,
|
||||
"forks_count": 131,
|
||||
"forks_count": 132,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 131,
|
||||
"forks": 132,
|
||||
"watchers": 467,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,11 +13,11 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-09-08T07:57:12Z",
|
||||
"updated_at": "2022-09-08T18:27:21Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1498,
|
||||
"watchers_count": 1498,
|
||||
"forks_count": 305,
|
||||
"stargazers_count": 1499,
|
||||
"watchers_count": 1499,
|
||||
"forks_count": 306,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -44,8 +44,8 @@
|
|||
"cve-2020-2883"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 305,
|
||||
"watchers": 1498,
|
||||
"forks": 306,
|
||||
"watchers": 1499,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
34
2021/CVE-2021-1056.json
Normal file
34
2021/CVE-2021-1056.json
Normal file
|
@ -0,0 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 327884232,
|
||||
"name": "CVE-2021-1056",
|
||||
"full_name": "pokerfaceSad\/CVE-2021-1056",
|
||||
"owner": {
|
||||
"login": "pokerfaceSad",
|
||||
"id": 22297037,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22297037?v=4",
|
||||
"html_url": "https:\/\/github.com\/pokerfaceSad"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pokerfaceSad\/CVE-2021-1056",
|
||||
"description": "PoC for CVE-2021-1056, related to GPU Container Security",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-08T11:29:48Z",
|
||||
"updated_at": "2022-06-22T02:08:32Z",
|
||||
"pushed_at": "2021-01-12T09:21:02Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2021-1056",
|
||||
"gpu-container",
|
||||
"kubernetes-clusters"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
}
|
||||
]
|
30
2021/CVE-2021-1647.json
Normal file
30
2021/CVE-2021-1647.json
Normal file
|
@ -0,0 +1,30 @@
|
|||
[
|
||||
{
|
||||
"id": 332213147,
|
||||
"name": "cve-2021-1647",
|
||||
"full_name": "findcool\/cve-2021-1647",
|
||||
"owner": {
|
||||
"login": "findcool",
|
||||
"id": 73280456,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73280456?v=4",
|
||||
"html_url": "https:\/\/github.com\/findcool"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/findcool\/cve-2021-1647",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-23T13:10:35Z",
|
||||
"updated_at": "2021-01-23T13:10:37Z",
|
||||
"pushed_at": "2021-01-20T14:55:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,65 @@
|
|||
[
|
||||
{
|
||||
"id": 331847444,
|
||||
"name": "CVE-2021-2109",
|
||||
"full_name": "Al1ex\/CVE-2021-2109",
|
||||
"owner": {
|
||||
"login": "Al1ex",
|
||||
"id": 38161463,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
|
||||
"html_url": "https:\/\/github.com\/Al1ex"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2021-2109",
|
||||
"description": "CVE-2021-2109 && Weblogic Server RCE via JNDI",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-22T05:37:11Z",
|
||||
"updated_at": "2022-07-27T14:25:40Z",
|
||||
"pushed_at": "2021-01-22T05:52:26Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2021-2109",
|
||||
"jndi",
|
||||
"rce",
|
||||
"weblogic"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 331873303,
|
||||
"name": "CVE-2021-2109",
|
||||
"full_name": "rabbitsafe\/CVE-2021-2109",
|
||||
"owner": {
|
||||
"login": "rabbitsafe",
|
||||
"id": 33046073,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33046073?v=4",
|
||||
"html_url": "https:\/\/github.com\/rabbitsafe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rabbitsafe\/CVE-2021-2109",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-22T07:43:46Z",
|
||||
"updated_at": "2022-07-16T15:08:14Z",
|
||||
"pushed_at": "2021-01-22T08:34:11Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 367086891,
|
||||
"name": "CVE-2021-2109_poc",
|
||||
|
|
|
@ -1,4 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 329979678,
|
||||
"name": "RWCTF21-VirtualBox-61-escape",
|
||||
"full_name": "Sauercloud\/RWCTF21-VirtualBox-61-escape",
|
||||
"owner": {
|
||||
"login": "Sauercloud",
|
||||
"id": 41395211,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41395211?v=4",
|
||||
"html_url": "https:\/\/github.com\/Sauercloud"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Sauercloud\/RWCTF21-VirtualBox-61-escape",
|
||||
"description": "0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020\/2021 CVE-2021-2119",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-15T17:32:24Z",
|
||||
"updated_at": "2022-07-26T02:45:47Z",
|
||||
"pushed_at": "2021-01-23T01:25:22Z",
|
||||
"stargazers_count": 124,
|
||||
"watchers_count": 124,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 124,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 471867550,
|
||||
"name": "Sauercloude",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T15:05:01Z",
|
||||
"updated_at": "2022-08-24T07:43:48Z",
|
||||
"updated_at": "2022-09-08T18:53:25Z",
|
||||
"pushed_at": "2021-09-20T07:58:29Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,18 +13,18 @@
|
|||
"description": "This script can be used to gain access to a victim's Samsung Account if they have a specific version of Samsung Members installed on their Samsung Device, and if the victim's device is from the US or Korea region.",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-10T09:23:52Z",
|
||||
"updated_at": "2022-08-22T13:36:45Z",
|
||||
"updated_at": "2022-09-08T21:18:48Z",
|
||||
"pushed_at": "2021-04-28T17:56:04Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 15,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 16,
|
||||
"forks": 16,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 328097281,
|
||||
"name": "CVE-2021-3019",
|
||||
"full_name": "B1anda0\/CVE-2021-3019",
|
||||
"owner": {
|
||||
"login": "B1anda0",
|
||||
"id": 74232513,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74232513?v=4",
|
||||
"html_url": "https:\/\/github.com\/B1anda0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/B1anda0\/CVE-2021-3019",
|
||||
"description": "lanproxy 目录遍历漏洞批量检测 (CVE-2021-3019)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-09T07:11:38Z",
|
||||
"updated_at": "2021-10-24T05:59:19Z",
|
||||
"pushed_at": "2021-01-09T07:14:26Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 328546705,
|
||||
"name": "CVE-2021-3019",
|
||||
|
@ -27,6 +55,34 @@
|
|||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 329537345,
|
||||
"name": "CVE-2021-3019",
|
||||
"full_name": "Maksim-venus\/CVE-2021-3019",
|
||||
"owner": {
|
||||
"login": "Maksim-venus",
|
||||
"id": 35008035,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35008035?v=4",
|
||||
"html_url": "https:\/\/github.com\/Maksim-venus"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Maksim-venus\/CVE-2021-3019",
|
||||
"description": "lanproxy 目录遍历漏洞批量检测用户名密码POC (CVE-2021-3019)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-14T07:19:21Z",
|
||||
"updated_at": "2021-11-25T06:50:40Z",
|
||||
"pushed_at": "2021-01-14T07:52:31Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 346618078,
|
||||
"name": "CVE-2021-3019",
|
||||
|
|
|
@ -27,6 +27,90 @@
|
|||
"watchers": 223,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 331843308,
|
||||
"name": "CVE-2021-3129",
|
||||
"full_name": "SNCKER\/CVE-2021-3129",
|
||||
"owner": {
|
||||
"login": "SNCKER",
|
||||
"id": 49559334,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49559334?v=4",
|
||||
"html_url": "https:\/\/github.com\/SNCKER"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SNCKER\/CVE-2021-3129",
|
||||
"description": "Laravel debug rce",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-22T05:12:21Z",
|
||||
"updated_at": "2022-09-02T06:42:23Z",
|
||||
"pushed_at": "2021-01-24T05:28:07Z",
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"forks_count": 51,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 51,
|
||||
"watchers": 112,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 332682252,
|
||||
"name": "laravel-CVE-2021-3129-EXP",
|
||||
"full_name": "SecPros-Team\/laravel-CVE-2021-3129-EXP",
|
||||
"owner": {
|
||||
"login": "SecPros-Team",
|
||||
"id": 77960183,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77960183?v=4",
|
||||
"html_url": "https:\/\/github.com\/SecPros-Team"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SecPros-Team\/laravel-CVE-2021-3129-EXP",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-25T08:42:28Z",
|
||||
"updated_at": "2022-08-31T20:47:05Z",
|
||||
"pushed_at": "2021-01-25T08:49:59Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 46,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 333316985,
|
||||
"name": "Laravel_CVE-2021-3129_EXP",
|
||||
"full_name": "crisprss\/Laravel_CVE-2021-3129_EXP",
|
||||
"owner": {
|
||||
"login": "crisprss",
|
||||
"id": 55953931,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55953931?v=4",
|
||||
"html_url": "https:\/\/github.com\/crisprss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/crisprss\/Laravel_CVE-2021-3129_EXP",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-27T05:44:52Z",
|
||||
"updated_at": "2022-07-21T09:16:22Z",
|
||||
"pushed_at": "2021-01-27T06:23:34Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 333380316,
|
||||
"name": "CVE-2021-3129_exploit",
|
||||
|
|
30
2021/CVE-2021-3130.json
Normal file
30
2021/CVE-2021-3130.json
Normal file
|
@ -0,0 +1,30 @@
|
|||
[
|
||||
{
|
||||
"id": 331557374,
|
||||
"name": "CVE-2021-3130",
|
||||
"full_name": "jet-pentest\/CVE-2021-3130",
|
||||
"owner": {
|
||||
"login": "jet-pentest",
|
||||
"id": 71512502,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71512502?v=4",
|
||||
"html_url": "https:\/\/github.com\/jet-pentest"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jet-pentest\/CVE-2021-3130",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-21T08:04:32Z",
|
||||
"updated_at": "2021-02-14T09:24:07Z",
|
||||
"pushed_at": "2021-01-21T12:31:34Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
30
2021/CVE-2021-3131.json
Normal file
30
2021/CVE-2021-3131.json
Normal file
|
@ -0,0 +1,30 @@
|
|||
[
|
||||
{
|
||||
"id": 329230328,
|
||||
"name": "CVE-2021-3131",
|
||||
"full_name": "jet-pentest\/CVE-2021-3131",
|
||||
"owner": {
|
||||
"login": "jet-pentest",
|
||||
"id": 71512502,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71512502?v=4",
|
||||
"html_url": "https:\/\/github.com\/jet-pentest"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jet-pentest\/CVE-2021-3131",
|
||||
"description": "CVE-2021-3131",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-13T07:41:25Z",
|
||||
"updated_at": "2021-12-15T14:41:14Z",
|
||||
"pushed_at": "2021-01-13T07:54:38Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,60 @@
|
|||
[
|
||||
{
|
||||
"id": 333199828,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "mr-r3b00t\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "mr-r3b00t",
|
||||
"id": 14963690,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14963690?v=4",
|
||||
"html_url": "https:\/\/github.com\/mr-r3b00t"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mr-r3b00t\/CVE-2021-3156",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-26T19:53:04Z",
|
||||
"updated_at": "2021-09-15T04:55:34Z",
|
||||
"pushed_at": "2021-01-26T20:09:53Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 34,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 333450928,
|
||||
"name": "sudo_cve-2021-3156",
|
||||
"full_name": "nexcess\/sudo_cve-2021-3156",
|
||||
"owner": {
|
||||
"login": "nexcess",
|
||||
"id": 651829,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/651829?v=4",
|
||||
"html_url": "https:\/\/github.com\/nexcess"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nexcess\/sudo_cve-2021-3156",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-27T14:40:57Z",
|
||||
"updated_at": "2021-09-27T02:51:00Z",
|
||||
"pushed_at": "2021-01-27T18:21:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 333483141,
|
||||
"name": "CVE-2021-3156",
|
||||
|
@ -27,6 +83,34 @@
|
|||
"watchers": 115,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 333492305,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "unauth401\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "unauth401",
|
||||
"id": 61272656,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61272656?v=4",
|
||||
"html_url": "https:\/\/github.com\/unauth401"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/unauth401\/CVE-2021-3156",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-27T16:35:43Z",
|
||||
"updated_at": "2022-08-29T04:01:12Z",
|
||||
"pushed_at": "2021-01-27T15:19:23Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 333557918,
|
||||
"name": "CVE-2021-3156",
|
||||
|
@ -55,6 +139,34 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 333569622,
|
||||
"name": "CVE-2021-3156-PATCHER",
|
||||
"full_name": "elbee-cyber\/CVE-2021-3156-PATCHER",
|
||||
"owner": {
|
||||
"login": "elbee-cyber",
|
||||
"id": 66045908,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66045908?v=4",
|
||||
"html_url": "https:\/\/github.com\/elbee-cyber"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/elbee-cyber\/CVE-2021-3156-PATCHER",
|
||||
"description": "This simple bash script will patch the recently discovered sudo heap overflow vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-27T21:49:06Z",
|
||||
"updated_at": "2021-02-03T09:13:52Z",
|
||||
"pushed_at": "2021-01-28T05:25:26Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 333619288,
|
||||
"name": "CVE-2021-3156-Baron-Samedit",
|
||||
|
@ -83,6 +195,34 @@
|
|||
"watchers": 18,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 333620703,
|
||||
"name": "cve-2021-3156",
|
||||
"full_name": "yaunsky\/cve-2021-3156",
|
||||
"owner": {
|
||||
"login": "yaunsky",
|
||||
"id": 48243087,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48243087?v=4",
|
||||
"html_url": "https:\/\/github.com\/yaunsky"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yaunsky\/cve-2021-3156",
|
||||
"description": "cve-2021-3156;sudo堆溢出漏洞;漏洞检测",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-28T02:20:24Z",
|
||||
"updated_at": "2021-04-18T22:59:59Z",
|
||||
"pushed_at": "2021-01-28T02:21:30Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 333700525,
|
||||
"name": "CVE-2021-3156-Exp",
|
||||
|
|
30
2021/CVE-2021-3157.json
Normal file
30
2021/CVE-2021-3157.json
Normal file
|
@ -0,0 +1,30 @@
|
|||
[
|
||||
{
|
||||
"id": 333708745,
|
||||
"name": "cve-2021-3157",
|
||||
"full_name": "CrackerCat\/cve-2021-3157",
|
||||
"owner": {
|
||||
"login": "CrackerCat",
|
||||
"id": 17995064,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17995064?v=4",
|
||||
"html_url": "https:\/\/github.com\/CrackerCat"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CrackerCat\/cve-2021-3157",
|
||||
"description": "脚本小子竟是我自己?",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-28T09:27:49Z",
|
||||
"updated_at": "2022-01-07T08:58:03Z",
|
||||
"pushed_at": "2021-01-28T02:57:24Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
30
2021/CVE-2021-3164.json
Normal file
30
2021/CVE-2021-3164.json
Normal file
|
@ -0,0 +1,30 @@
|
|||
[
|
||||
{
|
||||
"id": 331173610,
|
||||
"name": "cve-2021-3164",
|
||||
"full_name": "rmccarth\/cve-2021-3164",
|
||||
"owner": {
|
||||
"login": "rmccarth",
|
||||
"id": 36937649,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36937649?v=4",
|
||||
"html_url": "https:\/\/github.com\/rmccarth"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rmccarth\/cve-2021-3164",
|
||||
"description": "Church Rota version 2.6.4 is vulnerable to authenticated remote code execution. The user does not need to have file upload permission in order to upload and execute an arbitrary file. The application is written primarily with PHP so we use PHP in our PoC ",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-20T02:48:46Z",
|
||||
"updated_at": "2021-10-16T06:43:27Z",
|
||||
"pushed_at": "2021-01-20T02:49:27Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -97,10 +97,10 @@
|
|||
"description": "CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-05T23:48:44Z",
|
||||
"updated_at": "2022-09-08T08:23:49Z",
|
||||
"updated_at": "2022-09-08T20:12:53Z",
|
||||
"pushed_at": "2022-09-06T14:07:31Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -108,7 +108,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -343,7 +343,7 @@
|
|||
"description": "Java agent that disables Apache Log4J's JNDI Lookup. Fixes CVE-2021-44228, aka \"Log4Shell.\"",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T21:59:31Z",
|
||||
"updated_at": "2022-09-07T23:30:49Z",
|
||||
"updated_at": "2022-09-08T20:37:57Z",
|
||||
"pushed_at": "2022-05-22T08:27:03Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
|
@ -3583,10 +3583,10 @@
|
|||
"description": "A honeypot for the Log4Shell vulnerability (CVE-2021-44228).",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-15T22:30:34Z",
|
||||
"updated_at": "2022-08-20T16:55:28Z",
|
||||
"updated_at": "2022-09-08T20:00:16Z",
|
||||
"pushed_at": "2022-04-26T14:30:54Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -3594,7 +3594,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 75,
|
||||
"watchers": 76,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,7 +42,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-09-05T15:26:30Z",
|
||||
"updated_at": "2022-09-06T07:26:51Z",
|
||||
"pushed_at": "2022-09-07T04:07:40Z",
|
||||
"pushed_at": "2022-09-09T00:08:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-2639 Linux kernel openvswitch local privilege escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-05T15:31:56Z",
|
||||
"updated_at": "2022-09-08T11:34:21Z",
|
||||
"updated_at": "2022-09-08T21:34:40Z",
|
||||
"pushed_at": "2022-09-05T14:25:17Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 28,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -41,7 +41,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-08-14T22:22:55Z",
|
||||
"updated_at": "2022-09-06T20:40:16Z",
|
||||
"updated_at": "2022-09-08T22:06:04Z",
|
||||
"pushed_at": "2022-09-05T22:05:53Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
|
@ -49,7 +49,12 @@
|
|||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"cve-2022-27925",
|
||||
"exploit",
|
||||
"zimbra",
|
||||
"zimbra-exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 13,
|
||||
|
|
|
@ -84,23 +84,23 @@
|
|||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 534244459,
|
||||
"name": "CVE-2022-34265-mysql",
|
||||
"full_name": "coco0x0a\/CVE-2022-34265-mysql",
|
||||
"id": 534397698,
|
||||
"name": "CTF_CVE-2022-34265",
|
||||
"full_name": "coco0x0a\/CTF_CVE-2022-34265",
|
||||
"owner": {
|
||||
"login": "coco0x0a",
|
||||
"id": 96345719,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96345719?v=4",
|
||||
"html_url": "https:\/\/github.com\/coco0x0a"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/coco0x0a\/CVE-2022-34265-mysql",
|
||||
"html_url": "https:\/\/github.com\/coco0x0a\/CTF_CVE-2022-34265",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-09-08T14:15:03Z",
|
||||
"updated_at": "2022-09-08T14:24:34Z",
|
||||
"pushed_at": "2022-09-08T14:24:09Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"created_at": "2022-09-08T21:22:28Z",
|
||||
"updated_at": "2022-09-08T21:37:57Z",
|
||||
"pushed_at": "2022-09-08T22:10:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -108,7 +108,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "ManageEngine PAM360, Password Manager Pro, and Access Manager Plus unauthenticated remote code execution vulnerability PoC",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-18T20:52:01Z",
|
||||
"updated_at": "2022-09-08T07:00:50Z",
|
||||
"updated_at": "2022-09-08T23:18:14Z",
|
||||
"pushed_at": "2022-09-06T18:26:36Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
]
|
75
README.md
75
README.md
|
@ -3250,7 +3250,7 @@ An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Tr
|
|||
- [aeyesec/CVE-2022-34265](https://github.com/aeyesec/CVE-2022-34265)
|
||||
- [traumatising/CVE-2022-34265](https://github.com/traumatising/CVE-2022-34265)
|
||||
- [ZhaoQi99/CVE-2022-34265](https://github.com/ZhaoQi99/CVE-2022-34265)
|
||||
- [coco0x0a/CVE-2022-34265-mysql](https://github.com/coco0x0a/CVE-2022-34265-mysql)
|
||||
- [coco0x0a/CTF_CVE-2022-34265](https://github.com/coco0x0a/CTF_CVE-2022-34265)
|
||||
|
||||
### CVE-2022-34298 (2022-06-22)
|
||||
|
||||
|
@ -3957,6 +3957,14 @@ In ResolverActivity, there is a possible user interaction bypass due to a tapjac
|
|||
|
||||
- [nanopathi/framework_base_AOSP10_r33_CVE-2021-0954](https://github.com/nanopathi/framework_base_AOSP10_r33_CVE-2021-0954)
|
||||
|
||||
### CVE-2021-1056 (2021-01-07)
|
||||
|
||||
<code>
|
||||
NVIDIA GPU Display Driver for Linux, all versions, contains a vulnerability in the kernel mode layer (nvidia.ko) in which it does not completely honor operating system file system permissions to provide GPU device-level isolation, which may lead to denial of service or information disclosure.
|
||||
</code>
|
||||
|
||||
- [pokerfaceSad/CVE-2021-1056](https://github.com/pokerfaceSad/CVE-2021-1056)
|
||||
|
||||
### CVE-2021-1585 (2021-07-08)
|
||||
|
||||
<code>
|
||||
|
@ -3965,6 +3973,14 @@ A vulnerability in the Cisco Adaptive Security Device Manager (ASDM) Launcher co
|
|||
|
||||
- [jbaines-r7/staystaystay](https://github.com/jbaines-r7/staystaystay)
|
||||
|
||||
### CVE-2021-1647 (2021-01-12)
|
||||
|
||||
<code>
|
||||
Microsoft Defender Remote Code Execution Vulnerability
|
||||
</code>
|
||||
|
||||
- [findcool/cve-2021-1647](https://github.com/findcool/cve-2021-1647)
|
||||
|
||||
### CVE-2021-1656 (2021-01-12)
|
||||
|
||||
<code>
|
||||
|
@ -4073,6 +4089,8 @@ Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Op
|
|||
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
|
||||
</code>
|
||||
|
||||
- [Al1ex/CVE-2021-2109](https://github.com/Al1ex/CVE-2021-2109)
|
||||
- [rabbitsafe/CVE-2021-2109](https://github.com/rabbitsafe/CVE-2021-2109)
|
||||
- [yuaneuro/CVE-2021-2109_poc](https://github.com/yuaneuro/CVE-2021-2109_poc)
|
||||
- [coco0x0a/CVE-2021-2109](https://github.com/coco0x0a/CVE-2021-2109)
|
||||
- [Vulnmachines/oracle-weblogic-CVE-2021-2109](https://github.com/Vulnmachines/oracle-weblogic-CVE-2021-2109)
|
||||
|
@ -4083,6 +4101,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
|
|||
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.18. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
|
||||
</code>
|
||||
|
||||
- [Sauercloud/RWCTF21-VirtualBox-61-escape](https://github.com/Sauercloud/RWCTF21-VirtualBox-61-escape)
|
||||
- [chatbottesisgmailh/Sauercloude](https://github.com/chatbottesisgmailh/Sauercloude)
|
||||
- [shi10587s/Sauercloude](https://github.com/shi10587s/Sauercloude)
|
||||
|
||||
|
@ -4132,7 +4151,9 @@ Vulnerability in the Oracle Business Intelligence Enterprise Edition product of
|
|||
ffay lanproxy 0.1 allows Directory Traversal to read /../conf/config.properties to obtain credentials for a connection to the intranet.
|
||||
</code>
|
||||
|
||||
- [B1anda0/CVE-2021-3019](https://github.com/B1anda0/CVE-2021-3019)
|
||||
- [0xf4n9x/CVE-2021-3019](https://github.com/0xf4n9x/CVE-2021-3019)
|
||||
- [Maksim-venus/CVE-2021-3019](https://github.com/Maksim-venus/CVE-2021-3019)
|
||||
- [murataydemir/CVE-2021-3019](https://github.com/murataydemir/CVE-2021-3019)
|
||||
- [Aoyuh/cve-2021-3019](https://github.com/Aoyuh/cve-2021-3019)
|
||||
- [givemefivw/CVE-2021-3019](https://github.com/givemefivw/CVE-2021-3019)
|
||||
|
@ -4160,6 +4181,9 @@ Ignition before 2.5.2, as used in Laravel and other products, allows unauthentic
|
|||
</code>
|
||||
|
||||
- [ambionics/laravel-exploits](https://github.com/ambionics/laravel-exploits)
|
||||
- [SNCKER/CVE-2021-3129](https://github.com/SNCKER/CVE-2021-3129)
|
||||
- [SecPros-Team/laravel-CVE-2021-3129-EXP](https://github.com/SecPros-Team/laravel-CVE-2021-3129-EXP)
|
||||
- [crisprss/Laravel_CVE-2021-3129_EXP](https://github.com/crisprss/Laravel_CVE-2021-3129_EXP)
|
||||
- [nth347/CVE-2021-3129_exploit](https://github.com/nth347/CVE-2021-3129_exploit)
|
||||
- [FunPhishing/Laravel-8.4.2-rce-CVE-2021-3129](https://github.com/FunPhishing/Laravel-8.4.2-rce-CVE-2021-3129)
|
||||
- [zhzyker/CVE-2021-3129](https://github.com/zhzyker/CVE-2021-3129)
|
||||
|
@ -4169,6 +4193,22 @@ Ignition before 2.5.2, as used in Laravel and other products, allows unauthentic
|
|||
- [shadowabi/Laravel-CVE-2021-3129](https://github.com/shadowabi/Laravel-CVE-2021-3129)
|
||||
- [JacobEbben/CVE-2021-3129](https://github.com/JacobEbben/CVE-2021-3129)
|
||||
|
||||
### CVE-2021-3130 (2021-01-20)
|
||||
|
||||
<code>
|
||||
Within the Open-AudIT up to version 3.5.3 application, the web interface hides SSH secrets, Windows passwords, and SNMP strings from users using HTML 'password field' obfuscation. By using Developer tools or similar, it is possible to change the obfuscation so that the credentials are visible.
|
||||
</code>
|
||||
|
||||
- [jet-pentest/CVE-2021-3130](https://github.com/jet-pentest/CVE-2021-3130)
|
||||
|
||||
### CVE-2021-3131 (2021-01-13)
|
||||
|
||||
<code>
|
||||
The Web server in 1C:Enterprise 8 before 8.3.17.1851 sends base64 encoded credentials in the creds URL parameter.
|
||||
</code>
|
||||
|
||||
- [jet-pentest/CVE-2021-3131](https://github.com/jet-pentest/CVE-2021-3131)
|
||||
|
||||
### CVE-2021-3138 (2021-01-13)
|
||||
|
||||
<code>
|
||||
|
@ -4183,9 +4223,14 @@ In Discourse 2.7.0 through beta1, a rate-limit bypass leads to a bypass of the 2
|
|||
Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.
|
||||
</code>
|
||||
|
||||
- [mr-r3b00t/CVE-2021-3156](https://github.com/mr-r3b00t/CVE-2021-3156)
|
||||
- [nexcess/sudo_cve-2021-3156](https://github.com/nexcess/sudo_cve-2021-3156)
|
||||
- [reverse-ex/CVE-2021-3156](https://github.com/reverse-ex/CVE-2021-3156)
|
||||
- [unauth401/CVE-2021-3156](https://github.com/unauth401/CVE-2021-3156)
|
||||
- [ymrsmns/CVE-2021-3156](https://github.com/ymrsmns/CVE-2021-3156)
|
||||
- [elbee-cyber/CVE-2021-3156-PATCHER](https://github.com/elbee-cyber/CVE-2021-3156-PATCHER)
|
||||
- [kernelzeroday/CVE-2021-3156-Baron-Samedit](https://github.com/kernelzeroday/CVE-2021-3156-Baron-Samedit)
|
||||
- [yaunsky/cve-2021-3156](https://github.com/yaunsky/cve-2021-3156)
|
||||
- [baka9moe/CVE-2021-3156-Exp](https://github.com/baka9moe/CVE-2021-3156-Exp)
|
||||
- [ph4ntonn/CVE-2021-3156](https://github.com/ph4ntonn/CVE-2021-3156)
|
||||
- [binw2018/CVE-2021-3156-SCRIPT](https://github.com/binw2018/CVE-2021-3156-SCRIPT)
|
||||
|
@ -4235,6 +4280,17 @@ Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based
|
|||
- [FrancescoMarchiori/CVE-2021-3156](https://github.com/FrancescoMarchiori/CVE-2021-3156)
|
||||
- [baka9moe/CVE-2021-3156-TestReport](https://github.com/baka9moe/CVE-2021-3156-TestReport)
|
||||
|
||||
### CVE-2021-3157
|
||||
- [CrackerCat/cve-2021-3157](https://github.com/CrackerCat/cve-2021-3157)
|
||||
|
||||
### CVE-2021-3164 (2021-01-21)
|
||||
|
||||
<code>
|
||||
ChurchRota 2.6.4 is vulnerable to authenticated remote code execution. The user does not need to have file upload permission in order to upload and execute an arbitrary file via a POST request to resources.php.
|
||||
</code>
|
||||
|
||||
- [rmccarth/cve-2021-3164](https://github.com/rmccarth/cve-2021-3164)
|
||||
|
||||
### CVE-2021-3165 (2021-01-26)
|
||||
|
||||
<code>
|
||||
|
@ -17514,6 +17570,7 @@ Misskey before 10.102.4 allows hijacking a user's token.
|
|||
A vulnerability in the Secure Sockets Layer (SSL) VPN functionality of the Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause a reload of the affected system or to remotely execute code. The vulnerability is due to an attempt to double free a region of memory when the webvpn feature is enabled on the Cisco ASA device. An attacker could exploit this vulnerability by sending multiple, crafted XML packets to a webvpn-configured interface on the affected system. An exploit could allow the attacker to execute arbitrary code and obtain full control of the system, or cause a reload of the affected device. This vulnerability affects Cisco ASA Software that is running on the following Cisco products: 3000 Series Industrial Security Appliance (ISA), ASA 5500 Series Adaptive Security Appliances, ASA 5500-X Series Next-Generation Firewalls, ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, ASA 1000V Cloud Firewall, Adaptive Security Virtual Appliance (ASAv), Firepower 2100 Series Security Appliance, Firepower 4110 Security Appliance, Firepower 9300 ASA Security Module, Firepower Threat Defense Software (FTD). Cisco Bug IDs: CSCvg35618.
|
||||
</code>
|
||||
|
||||
- [1337g/CVE-2018-0101-DOS-POC](https://github.com/1337g/CVE-2018-0101-DOS-POC)
|
||||
- [Cymmetria/ciscoasa_honeypot](https://github.com/Cymmetria/ciscoasa_honeypot)
|
||||
|
||||
### CVE-2018-0114 (2018-01-04)
|
||||
|
@ -17980,6 +18037,14 @@ Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (su
|
|||
- [ndureiss/e1000_vulnerability_exploit](https://github.com/ndureiss/e1000_vulnerability_exploit)
|
||||
- [vhok74/cve-2018-3295](https://github.com/vhok74/cve-2018-3295)
|
||||
|
||||
### CVE-2018-3608 (2018-07-06)
|
||||
|
||||
<code>
|
||||
A vulnerability in Trend Micro Maximum Security's (Consumer) 2018 (versions 12.0.1191 and below) User-Mode Hooking (UMH) driver could allow an attacker to create a specially crafted packet that could alter a vulnerable system in such a way that malicious code could be injected into other processes.
|
||||
</code>
|
||||
|
||||
- [ZhiyuanWang-Chengdu-Qihoo360/Trend_Micro_POC](https://github.com/ZhiyuanWang-Chengdu-Qihoo360/Trend_Micro_POC)
|
||||
|
||||
### CVE-2018-3639 (2018-05-22)
|
||||
|
||||
<code>
|
||||
|
@ -18266,6 +18331,8 @@ A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.
|
|||
</code>
|
||||
|
||||
- [ydl555/CVE-2018-4878-](https://github.com/ydl555/CVE-2018-4878-)
|
||||
- [mdsecactivebreach/CVE-2018-4878](https://github.com/mdsecactivebreach/CVE-2018-4878)
|
||||
- [hybridious/CVE-2018-4878](https://github.com/hybridious/CVE-2018-4878)
|
||||
- [vysecurity/CVE-2018-4878](https://github.com/vysecurity/CVE-2018-4878)
|
||||
- [KathodeN/CVE-2018-4878](https://github.com/KathodeN/CVE-2018-4878)
|
||||
- [SyFi/CVE-2018-4878](https://github.com/SyFi/CVE-2018-4878)
|
||||
|
@ -18408,7 +18475,12 @@ In Joomla! before 3.8.4, the lack of type casting of a variable in a SQL stateme
|
|||
In WordPress through 4.9.2, unauthenticated attackers can cause a denial of service (resource consumption) by using the large list of registered .js files (from wp-includes/script-loader.php) to construct a series of requests to load every file many times.
|
||||
</code>
|
||||
|
||||
- [yolabingo/wordpress-fix-cve-2018-6389](https://github.com/yolabingo/wordpress-fix-cve-2018-6389)
|
||||
- [WazeHell/CVE-2018-6389](https://github.com/WazeHell/CVE-2018-6389)
|
||||
- [rastating/modsecurity-cve-2018-6389](https://github.com/rastating/modsecurity-cve-2018-6389)
|
||||
- [knqyf263/CVE-2018-6389](https://github.com/knqyf263/CVE-2018-6389)
|
||||
- [JulienGadanho/cve-2018-6389-php-patcher](https://github.com/JulienGadanho/cve-2018-6389-php-patcher)
|
||||
- [dsfau/wordpress-CVE-2018-6389](https://github.com/dsfau/wordpress-CVE-2018-6389)
|
||||
- [Jetserver/CVE-2018-6389-FIX](https://github.com/Jetserver/CVE-2018-6389-FIX)
|
||||
- [thechrono13/PoC---CVE-2018-6389](https://github.com/thechrono13/PoC---CVE-2018-6389)
|
||||
- [BlackRouter/cve-2018-6389](https://github.com/BlackRouter/cve-2018-6389)
|
||||
|
@ -18446,6 +18518,7 @@ An issue was discovered on Conceptronic CIPCAMPTIWL V3 0.61.30.21 devices. An un
|
|||
An issue was discovered on Netwave IP Camera devices. An unauthenticated attacker can crash a device by sending a POST request with a huge body size to the / URI.
|
||||
</code>
|
||||
|
||||
- [dreadlocked/netwave-dosvulnerability](https://github.com/dreadlocked/netwave-dosvulnerability)
|
||||
- [LeQuocKhanh2K/Tool_Camera_Exploit_Netwave_CVE-2018-6479](https://github.com/LeQuocKhanh2K/Tool_Camera_Exploit_Netwave_CVE-2018-6479)
|
||||
|
||||
### CVE-2018-6481 (2018-02-27)
|
||||
|
|
Loading…
Add table
Reference in a new issue