mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2021/06/22 00:11:41
This commit is contained in:
parent
ccf270d8f5
commit
225fb0361f
17 changed files with 74 additions and 69 deletions
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-06-13T09:40:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2015-08-30T19:24:32Z",
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"forks_count": 77,
|
||||
"forks": 77,
|
||||
"forks_count": 78,
|
||||
"forks": 78,
|
||||
"watchers": 112,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-06-11T00:16:40Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 48,
|
||||
"forks": 48,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -362,8 +362,8 @@
|
|||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 276,
|
||||
"watchers_count": 276,
|
||||
"forks_count": 98,
|
||||
"forks": 98,
|
||||
"forks_count": 99,
|
||||
"forks": 99,
|
||||
"watchers": 276,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1236,8 +1236,8 @@
|
|||
"pushed_at": "2019-06-22T21:48:45Z",
|
||||
"stargazers_count": 817,
|
||||
"watchers_count": 817,
|
||||
"forks_count": 206,
|
||||
"forks": 206,
|
||||
"forks_count": 207,
|
||||
"forks": 207,
|
||||
"watchers": 817,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -2405,13 +2405,13 @@
|
|||
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-21T02:22:29Z",
|
||||
"updated_at": "2021-06-17T13:31:53Z",
|
||||
"updated_at": "2021-06-21T12:15:39Z",
|
||||
"pushed_at": "2020-01-21T03:15:41Z",
|
||||
"stargazers_count": 206,
|
||||
"watchers_count": 206,
|
||||
"forks_count": 53,
|
||||
"forks": 53,
|
||||
"watchers": 206,
|
||||
"stargazers_count": 207,
|
||||
"watchers_count": 207,
|
||||
"forks_count": 54,
|
||||
"forks": 54,
|
||||
"watchers": 207,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2639,8 +2639,8 @@
|
|||
"pushed_at": "2021-03-25T07:12:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -496,13 +496,13 @@
|
|||
"description": "This script checks the Citrix Netscaler if it has been compromised by CVE-2019-19781 attacks and collects all file system information",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-16T08:52:14Z",
|
||||
"updated_at": "2020-10-27T12:03:36Z",
|
||||
"updated_at": "2021-06-21T13:40:35Z",
|
||||
"pushed_at": "2020-10-27T12:03:34Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 276,
|
||||
"watchers_count": 276,
|
||||
"forks_count": 98,
|
||||
"forks": 98,
|
||||
"forks_count": 99,
|
||||
"forks": 99,
|
||||
"watchers": 276,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -887,13 +887,13 @@
|
|||
"description": "CVE-2020-0796 Local Privilege Escalation POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T16:06:50Z",
|
||||
"updated_at": "2021-06-21T00:40:20Z",
|
||||
"updated_at": "2021-06-21T09:33:59Z",
|
||||
"pushed_at": "2020-04-02T08:01:38Z",
|
||||
"stargazers_count": 223,
|
||||
"watchers_count": 223,
|
||||
"stargazers_count": 224,
|
||||
"watchers_count": 224,
|
||||
"forks_count": 87,
|
||||
"forks": 87,
|
||||
"watchers": 223,
|
||||
"watchers": 224,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-1337 Windows Print Spooler Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-21T08:01:20Z",
|
||||
"updated_at": "2021-05-27T18:59:02Z",
|
||||
"updated_at": "2021-06-21T12:19:34Z",
|
||||
"pushed_at": "2020-07-21T10:28:42Z",
|
||||
"stargazers_count": 143,
|
||||
"watchers_count": 143,
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 143,
|
||||
"watchers": 144,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-17T21:25:18Z",
|
||||
"updated_at": "2021-06-21T08:03:25Z",
|
||||
"updated_at": "2021-06-21T09:46:45Z",
|
||||
"pushed_at": "2020-09-18T00:01:00Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 38,
|
||||
"watchers": 39,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "how detect CVE-2020-2551 poc exploit python Weblogic RCE with IIOP",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-19T13:01:32Z",
|
||||
"updated_at": "2021-06-08T15:52:54Z",
|
||||
"updated_at": "2021-06-21T10:26:43Z",
|
||||
"pushed_at": "2020-05-22T08:46:20Z",
|
||||
"stargazers_count": 154,
|
||||
"watchers_count": 154,
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"watchers": 154,
|
||||
"watchers": 155,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Detect Citrix ADC SAML action or SAML iDP Profile config vulnerable to CVE-2020-8300 using Citrix ADC NITRO API",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-15T07:21:16Z",
|
||||
"updated_at": "2021-06-17T08:31:57Z",
|
||||
"updated_at": "2021-06-21T12:12:36Z",
|
||||
"pushed_at": "2021-06-17T08:31:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -105,13 +105,13 @@
|
|||
"description": "CVE-2021-1732 poc & exp; tested on 20H2",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-23T08:21:54Z",
|
||||
"updated_at": "2021-06-09T10:04:16Z",
|
||||
"updated_at": "2021-06-21T10:16:51Z",
|
||||
"pushed_at": "2021-04-23T08:28:53Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 44,
|
||||
"watchers": 45,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Cross Site Scripting (XSS) at the \"Reset Password\" page form of Priority Enterprise Management System v8.00 allows attackers to execute javascript on behalf of the victim by sending a malicious URL or directing the victim to a malicious site.",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-13T04:25:31Z",
|
||||
"updated_at": "2021-04-13T04:26:27Z",
|
||||
"updated_at": "2021-06-21T14:07:29Z",
|
||||
"pushed_at": "2021-04-13T04:26:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -243,13 +243,13 @@
|
|||
"description": "A fast tool to mass scan for a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin (CVE-2021-26855).",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-08T11:54:32Z",
|
||||
"updated_at": "2021-06-21T07:23:24Z",
|
||||
"updated_at": "2021-06-21T14:18:51Z",
|
||||
"pushed_at": "2021-03-17T11:21:52Z",
|
||||
"stargazers_count": 122,
|
||||
"watchers_count": 122,
|
||||
"stargazers_count": 123,
|
||||
"watchers_count": 123,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 122,
|
||||
"watchers": 123,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,8 +105,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-14T20:08:20Z",
|
||||
"updated_at": "2021-06-16T14:36:12Z",
|
||||
"pushed_at": "2021-06-16T12:47:36Z",
|
||||
"updated_at": "2021-06-21T15:08:44Z",
|
||||
"pushed_at": "2021-06-21T15:08:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
@ -128,13 +128,13 @@
|
|||
"description": "Privilege escalation with polkit - CVE-2021-3560",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-19T08:15:17Z",
|
||||
"updated_at": "2021-06-20T07:38:16Z",
|
||||
"updated_at": "2021-06-21T14:50:38Z",
|
||||
"pushed_at": "2021-06-20T07:38:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1122,7 +1122,12 @@ Sherlock SherlockIM through 2021-03-29 allows Cross Site Scripting (XSS) by leve
|
|||
|
||||
- [Security-AVS/CVE-2021-29267](https://github.com/Security-AVS/CVE-2021-29267)
|
||||
|
||||
### CVE-2021-29337
|
||||
### CVE-2021-29337 (2021-06-21)
|
||||
|
||||
<code>
|
||||
MODAPI.sys in MSI Dragon Center 2.0.104.0 allows low-privileged users to access kernel memory and potentially escalate privileges via a crafted IOCTL 0x9c406104 call. This IOCTL provides the MmMapIoSpace feature for mapping physical memory.
|
||||
</code>
|
||||
|
||||
- [rjt-gupta/CVE-2021-29337](https://github.com/rjt-gupta/CVE-2021-29337)
|
||||
|
||||
### CVE-2021-29349 (2021-03-31)
|
||||
|
|
Loading…
Add table
Reference in a new issue