mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2021/11/27 18:12:52
This commit is contained in:
parent
f98d650c06
commit
2090e54c3d
11 changed files with 56 additions and 56 deletions
|
@ -1647,17 +1647,17 @@
|
|||
"description": "A python script intended to automate cgi-bin based exploitation of the ShellSchock vulnerability (CVE-2014-6271)",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-25T16:13:48Z",
|
||||
"updated_at": "2021-11-18T12:52:23Z",
|
||||
"updated_at": "2021-11-27T17:59:13Z",
|
||||
"pushed_at": "2021-10-28T14:09:22Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -283,17 +283,17 @@
|
|||
"description": "WebLogic wls-wsat RCE CVE-2017-10271",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-19T15:50:08Z",
|
||||
"updated_at": "2020-09-24T10:47:12Z",
|
||||
"updated_at": "2021-11-27T15:58:13Z",
|
||||
"pushed_at": "2018-01-19T11:29:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 59,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 60,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 59,
|
||||
"watchers": 0,
|
||||
"forks": 60,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2018-2893",
|
||||
"fork": false,
|
||||
"created_at": "2018-07-19T06:06:10Z",
|
||||
"updated_at": "2020-12-10T06:55:01Z",
|
||||
"updated_at": "2021-11-27T14:13:06Z",
|
||||
"pushed_at": "2018-07-19T05:59:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 42,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 42,
|
||||
"watchers": 0,
|
||||
"forks": 43,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1430,17 +1430,17 @@
|
|||
"description": "Working proof of concept for CVE-2019-0708, spawns remote shell.",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-23T17:02:00Z",
|
||||
"updated_at": "2019-08-17T15:27:52Z",
|
||||
"updated_at": "2021-11-27T14:34:25Z",
|
||||
"pushed_at": "2019-05-23T17:02:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 21,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 0,
|
||||
"forks": 22,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -45,17 +45,17 @@
|
|||
"description": "CVE-2019-17570 details and proof of concept",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-25T15:39:48Z",
|
||||
"updated_at": "2021-11-02T07:45:41Z",
|
||||
"updated_at": "2021-11-27T14:34:01Z",
|
||||
"pushed_at": "2020-01-24T11:52:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 8,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 0,
|
||||
"forks": 9,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -42,10 +42,10 @@
|
|||
"description": "CVE-2020-8958: Authenticated RCE exploit for NetLink HG323",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-27T15:51:08Z",
|
||||
"updated_at": "2021-06-26T11:35:45Z",
|
||||
"updated_at": "2021-11-27T14:14:38Z",
|
||||
"pushed_at": "2021-04-28T16:27:01Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -57,7 +57,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-11-26T21:31:18Z",
|
||||
"updated_at": "2021-11-26T21:38:08Z",
|
||||
"pushed_at": "2021-11-26T21:38:06Z",
|
||||
"updated_at": "2021-11-27T15:09:05Z",
|
||||
"pushed_at": "2021-11-27T15:09:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -299,10 +299,10 @@
|
|||
"description": "A fast tool to mass scan for a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin (CVE-2021-26855).",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-08T11:54:32Z",
|
||||
"updated_at": "2021-11-26T11:56:58Z",
|
||||
"updated_at": "2021-11-27T13:33:08Z",
|
||||
"pushed_at": "2021-03-17T11:21:52Z",
|
||||
"stargazers_count": 131,
|
||||
"watchers_count": 131,
|
||||
"stargazers_count": 132,
|
||||
"watchers_count": 132,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -317,7 +317,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 131,
|
||||
"watchers": 132,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -765,17 +765,17 @@
|
|||
"description": "ProxyLogon is the formally generic name for CVE-2021-26855, a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin. We have also chained this bug with another post-auth arbitrary-file-write vulnerability, CVE-2021-27065, to get code execution.",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-16T07:31:25Z",
|
||||
"updated_at": "2021-11-16T11:02:51Z",
|
||||
"updated_at": "2021-11-27T13:35:46Z",
|
||||
"pushed_at": "2021-05-01T17:20:15Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1023,17 +1023,17 @@
|
|||
"description": "Proof-of-concept exploit for CVE-2021-26855 and CVE-2021-27065. Unauthenticated RCE in Exchange.",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-24T01:12:48Z",
|
||||
"updated_at": "2021-11-17T15:55:47Z",
|
||||
"updated_at": "2021-11-27T13:32:26Z",
|
||||
"pushed_at": "2021-03-24T01:25:05Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 32,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -44,12 +44,12 @@
|
|||
"pushed_at": "2021-10-28T06:37:37Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"forks_count": 26,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"forks": 27,
|
||||
"watchers": 61,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1296,17 +1296,17 @@
|
|||
"description": "CVE-2021-41773 CVE-2021-42013漏洞批量检测工具",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-09T03:32:18Z",
|
||||
"updated_at": "2021-11-25T07:28:25Z",
|
||||
"updated_at": "2021-11-27T14:47:24Z",
|
||||
"pushed_at": "2021-10-09T03:49:21Z",
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 105,
|
||||
"watchers": 106,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "PoC for CVE-2021-43557",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-22T20:23:05Z",
|
||||
"updated_at": "2021-11-25T03:38:47Z",
|
||||
"updated_at": "2021-11-27T16:18:27Z",
|
||||
"pushed_at": "2021-11-22T20:24:32Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
]
|
Loading…
Add table
Reference in a new issue