mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/10/12 12:12:40
This commit is contained in:
parent
89b10b7155
commit
2762a26560
25 changed files with 204 additions and 108 deletions
|
@ -13,17 +13,17 @@
|
|||
"description": "I'll submit the poc after blackhat",
|
||||
"fork": false,
|
||||
"created_at": "2015-07-17T06:09:41Z",
|
||||
"updated_at": "2021-08-07T17:11:08Z",
|
||||
"updated_at": "2021-10-12T02:18:56Z",
|
||||
"pushed_at": "2015-08-30T19:24:32Z",
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"forks_count": 78,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 78,
|
||||
"watchers": 114,
|
||||
"watchers": 115,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "This app verifies if your device is still vulnerable to CVE-2015-3825 \/ CVE-2015-3837, aka \"One Class to Rule Them All\", by checking if it contains the vulnerable conscrypt's OpenSSLX509Certificate class. A patch was released in August 2015 by Google.",
|
||||
"fork": false,
|
||||
"created_at": "2016-02-13T08:57:44Z",
|
||||
"updated_at": "2017-12-22T21:03:30Z",
|
||||
"updated_at": "2021-10-12T02:19:42Z",
|
||||
"pushed_at": "2016-02-13T09:16:01Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -429,17 +429,17 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2021-10-11T10:22:24Z",
|
||||
"updated_at": "2021-10-11T23:54:48Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 296,
|
||||
"watchers_count": 296,
|
||||
"stargazers_count": 297,
|
||||
"watchers_count": 297,
|
||||
"forks_count": 105,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 105,
|
||||
"watchers": 296,
|
||||
"watchers": 297,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2,14 +2,14 @@
|
|||
{
|
||||
"id": 390422057,
|
||||
"name": "CVE-2018-12636_exploit",
|
||||
"full_name": "nth347\/CVE-2018-12636_exploit",
|
||||
"full_name": "hungnt199\/CVE-2018-12636_exploit",
|
||||
"owner": {
|
||||
"login": "nth347",
|
||||
"login": "hungnt199",
|
||||
"id": 20441996,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20441996?v=4",
|
||||
"html_url": "https:\/\/github.com\/nth347"
|
||||
"html_url": "https:\/\/github.com\/hungnt199"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nth347\/CVE-2018-12636_exploit",
|
||||
"html_url": "https:\/\/github.com\/hungnt199\/CVE-2018-12636_exploit",
|
||||
"description": "Exploit for CVE-2018-12636",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-28T16:30:05Z",
|
||||
|
|
|
@ -56,14 +56,14 @@
|
|||
{
|
||||
"id": 391018517,
|
||||
"name": "CVE-2018-3810_exploit",
|
||||
"full_name": "nth347\/CVE-2018-3810_exploit",
|
||||
"full_name": "hungnt199\/CVE-2018-3810_exploit",
|
||||
"owner": {
|
||||
"login": "nth347",
|
||||
"login": "hungnt199",
|
||||
"id": 20441996,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20441996?v=4",
|
||||
"html_url": "https:\/\/github.com\/nth347"
|
||||
"html_url": "https:\/\/github.com\/hungnt199"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nth347\/CVE-2018-3810_exploit",
|
||||
"html_url": "https:\/\/github.com\/hungnt199\/CVE-2018-3810_exploit",
|
||||
"description": "Exploit for CVE-2018-3810",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-30T10:06:04Z",
|
||||
|
|
|
@ -1488,12 +1488,12 @@
|
|||
"pushed_at": "2019-06-22T21:48:45Z",
|
||||
"stargazers_count": 830,
|
||||
"watchers_count": 830,
|
||||
"forks_count": 241,
|
||||
"forks_count": 242,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 241,
|
||||
"forks": 242,
|
||||
"watchers": 830,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2021-10-11T08:54:27Z",
|
||||
"updated_at": "2021-10-12T03:14:22Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1678,
|
||||
"watchers_count": 1678,
|
||||
"stargazers_count": 1679,
|
||||
"watchers_count": 1679,
|
||||
"forks_count": 251,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 251,
|
||||
"watchers": 1678,
|
||||
"watchers": 1679,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -25,5 +25,35 @@
|
|||
"forks": 6,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 416094403,
|
||||
"name": "CVE-2019-15858",
|
||||
"full_name": "oxctdev\/CVE-2019-15858",
|
||||
"owner": {
|
||||
"login": "oxctdev",
|
||||
"id": 91846073,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
|
||||
"html_url": "https:\/\/github.com\/oxctdev"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/oxctdev\/CVE-2019-15858",
|
||||
"description": "Unauthenticated Remote Code Execution at Woody Ad Snippets (PoC)",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-11T21:37:06Z",
|
||||
"updated_at": "2021-10-11T21:42:30Z",
|
||||
"pushed_at": "2021-10-11T21:41:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2019-15858",
|
||||
"remote-code-execution"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2021-10-11T10:22:24Z",
|
||||
"updated_at": "2021-10-11T23:54:48Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 296,
|
||||
"watchers_count": 296,
|
||||
"stargazers_count": 297,
|
||||
"watchers_count": 297,
|
||||
"forks_count": 105,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 105,
|
||||
"watchers": 296,
|
||||
"watchers": 297,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2019-05-09T21:34:26Z",
|
||||
"stargazers_count": 605,
|
||||
"watchers_count": 605,
|
||||
"forks_count": 149,
|
||||
"forks_count": 150,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -26,7 +26,7 @@
|
|||
"security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 149,
|
||||
"forks": 150,
|
||||
"watchers": 605,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -2,14 +2,14 @@
|
|||
{
|
||||
"id": 368085499,
|
||||
"name": "CVE-2019-9081_PoC",
|
||||
"full_name": "nth347\/CVE-2019-9081_PoC",
|
||||
"full_name": "hungnt199\/CVE-2019-9081_PoC",
|
||||
"owner": {
|
||||
"login": "nth347",
|
||||
"login": "hungnt199",
|
||||
"id": 20441996,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20441996?v=4",
|
||||
"html_url": "https:\/\/github.com\/nth347"
|
||||
"html_url": "https:\/\/github.com\/hungnt199"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nth347\/CVE-2019-9081_PoC",
|
||||
"html_url": "https:\/\/github.com\/hungnt199\/CVE-2019-9081_PoC",
|
||||
"description": "PoC for CVE-2019-9081",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-17T06:54:05Z",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2020-15368",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T04:38:24Z",
|
||||
"updated_at": "2021-10-11T18:09:27Z",
|
||||
"updated_at": "2021-10-12T03:08:41Z",
|
||||
"pushed_at": "2021-10-11T01:30:56Z",
|
||||
"stargazers_count": 294,
|
||||
"watchers_count": 294,
|
||||
"stargazers_count": 295,
|
||||
"watchers_count": 295,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 294,
|
||||
"watchers": 295,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -274,17 +274,17 @@
|
|||
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T23:45:58Z",
|
||||
"updated_at": "2021-10-11T18:13:55Z",
|
||||
"updated_at": "2021-10-12T00:03:52Z",
|
||||
"pushed_at": "2021-07-05T08:54:06Z",
|
||||
"stargazers_count": 653,
|
||||
"watchers_count": 653,
|
||||
"stargazers_count": 654,
|
||||
"watchers_count": 654,
|
||||
"forks_count": 173,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 173,
|
||||
"watchers": 653,
|
||||
"watchers": 654,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -98,12 +98,12 @@
|
|||
"pushed_at": "2021-09-25T07:58:15Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 8,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"forks": 7,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -121,17 +121,17 @@
|
|||
"description": "CVE-2021-22005 - VMWare vCenter Server File Upload to RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-25T16:21:56Z",
|
||||
"updated_at": "2021-10-11T18:23:26Z",
|
||||
"updated_at": "2021-10-12T01:51:06Z",
|
||||
"pushed_at": "2021-10-02T03:17:45Z",
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 100,
|
||||
"watchers": 102,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2021-02-15T15:11:00Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"forks_count": 15,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"forks": 16,
|
||||
"watchers": 60,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -98,12 +98,12 @@
|
|||
"pushed_at": "2021-09-01T01:17:58Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"forks_count": 26,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"forks": 25,
|
||||
"watchers": 48,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -152,12 +152,12 @@
|
|||
"pushed_at": "2021-09-10T19:42:33Z",
|
||||
"stargazers_count": 227,
|
||||
"watchers_count": 227,
|
||||
"forks_count": 56,
|
||||
"forks_count": 55,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 56,
|
||||
"forks": 55,
|
||||
"watchers": 227,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -179,12 +179,12 @@
|
|||
"pushed_at": "2021-09-01T10:27:12Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 21,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"forks": 20,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-09-28T03:47:36Z",
|
||||
"updated_at": "2021-10-11T19:46:51Z",
|
||||
"updated_at": "2021-10-12T01:51:32Z",
|
||||
"pushed_at": "2021-09-29T02:20:40Z",
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 104,
|
||||
"watchers": 105,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -110,14 +110,14 @@
|
|||
{
|
||||
"id": 333380316,
|
||||
"name": "CVE-2021-3129_exploit",
|
||||
"full_name": "nth347\/CVE-2021-3129_exploit",
|
||||
"full_name": "hungnt199\/CVE-2021-3129_exploit",
|
||||
"owner": {
|
||||
"login": "nth347",
|
||||
"login": "hungnt199",
|
||||
"id": 20441996,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20441996?v=4",
|
||||
"html_url": "https:\/\/github.com\/nth347"
|
||||
"html_url": "https:\/\/github.com\/hungnt199"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nth347\/CVE-2021-3129_exploit",
|
||||
"html_url": "https:\/\/github.com\/hungnt199\/CVE-2021-3129_exploit",
|
||||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-27T10:16:35Z",
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2021-10-11T17:59:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
29
2021/CVE-2021-33044.json
Normal file
29
2021/CVE-2021-33044.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 416101106,
|
||||
"name": "DahuaLoginBypass",
|
||||
"full_name": "bp2008\/DahuaLoginBypass",
|
||||
"owner": {
|
||||
"login": "bp2008",
|
||||
"id": 5639911,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5639911?v=4",
|
||||
"html_url": "https:\/\/github.com\/bp2008"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bp2008\/DahuaLoginBypass",
|
||||
"description": "Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-11T22:08:47Z",
|
||||
"updated_at": "2021-10-11T22:24:50Z",
|
||||
"pushed_at": "2021-10-11T22:24:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-11T15:11:48Z",
|
||||
"updated_at": "2021-10-11T15:24:14Z",
|
||||
"updated_at": "2021-10-12T02:15:56Z",
|
||||
"pushed_at": "2021-10-11T15:23:39Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -229,17 +229,17 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2021-10-11T20:42:57Z",
|
||||
"updated_at": "2021-10-12T01:02:40Z",
|
||||
"pushed_at": "2021-09-11T09:50:26Z",
|
||||
"stargazers_count": 1270,
|
||||
"watchers_count": 1270,
|
||||
"stargazers_count": 1272,
|
||||
"watchers_count": 1272,
|
||||
"forks_count": 402,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 402,
|
||||
"watchers": 1270,
|
||||
"watchers": 1272,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2021-10-09T06:06:47Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -25,7 +25,7 @@
|
|||
"remote-code-execution"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -229,17 +229,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-05T23:53:48Z",
|
||||
"updated_at": "2021-10-11T09:37:17Z",
|
||||
"updated_at": "2021-10-12T02:54:17Z",
|
||||
"pushed_at": "2021-10-06T15:37:23Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 14,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 29,
|
||||
"forks": 15,
|
||||
"watchers": 30,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -256,11 +256,11 @@
|
|||
"description": "Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-06T02:28:41Z",
|
||||
"updated_at": "2021-10-11T16:21:48Z",
|
||||
"updated_at": "2021-10-11T23:00:45Z",
|
||||
"pushed_at": "2021-10-09T19:37:29Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 4,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -272,8 +272,8 @@
|
|||
"rce"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 10,
|
||||
"forks": 5,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -722,16 +722,16 @@
|
|||
"description": "Simple script realizado en bash, para revisión de múltiples hosts para CVE-2021-41773 (Apache)",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-06T23:32:30Z",
|
||||
"updated_at": "2021-10-10T18:37:54Z",
|
||||
"pushed_at": "2021-10-08T18:20:09Z",
|
||||
"updated_at": "2021-10-12T02:59:06Z",
|
||||
"pushed_at": "2021-10-12T02:59:04Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1097,12 +1097,12 @@
|
|||
"pushed_at": "2021-10-08T07:27:04Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"forks": 5,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1147,8 +1147,8 @@
|
|||
"description": "POC",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-08T15:40:41Z",
|
||||
"updated_at": "2021-10-11T16:11:44Z",
|
||||
"pushed_at": "2021-10-10T22:26:26Z",
|
||||
"updated_at": "2021-10-11T22:24:14Z",
|
||||
"pushed_at": "2021-10-11T22:24:12Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
|
@ -1234,17 +1234,17 @@
|
|||
"description": "CVE-2021-41773 CVE-2021-42013漏洞批量检测工具",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-09T03:32:18Z",
|
||||
"updated_at": "2021-10-11T14:27:20Z",
|
||||
"updated_at": "2021-10-12T02:03:22Z",
|
||||
"pushed_at": "2021-10-09T03:49:21Z",
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"forks_count": 21,
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 66,
|
||||
"forks": 22,
|
||||
"watchers": 69,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1381,5 +1381,32 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 416132671,
|
||||
"name": "CVE-2021-41773-PoC",
|
||||
"full_name": "0xAlmighty\/CVE-2021-41773-PoC",
|
||||
"owner": {
|
||||
"login": "0xAlmighty",
|
||||
"id": 58662599,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58662599?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xAlmighty"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xAlmighty\/CVE-2021-41773-PoC",
|
||||
"description": "Path Traversal and RCE in Apache HTTP Server 2.4.49 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-12T00:51:32Z",
|
||||
"updated_at": "2021-10-12T00:53:01Z",
|
||||
"pushed_at": "2021-10-12T00:52:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
18
README.md
18
README.md
|
@ -230,7 +230,7 @@ Ignition before 2.5.2, as used in Laravel and other products, allows unauthentic
|
|||
- [SNCKER/CVE-2021-3129](https://github.com/SNCKER/CVE-2021-3129)
|
||||
- [SecPros-Team/laravel-CVE-2021-3129-EXP](https://github.com/SecPros-Team/laravel-CVE-2021-3129-EXP)
|
||||
- [crisprss/Laravel_CVE-2021-3129_EXP](https://github.com/crisprss/Laravel_CVE-2021-3129_EXP)
|
||||
- [nth347/CVE-2021-3129_exploit](https://github.com/nth347/CVE-2021-3129_exploit)
|
||||
- [hungnt199/CVE-2021-3129_exploit](https://github.com/hungnt199/CVE-2021-3129_exploit)
|
||||
- [FunPhishing/Laravel-8.4.2-rce-CVE-2021-3129](https://github.com/FunPhishing/Laravel-8.4.2-rce-CVE-2021-3129)
|
||||
- [zhzyker/CVE-2021-3129](https://github.com/zhzyker/CVE-2021-3129)
|
||||
- [simonlee-hello/CVE-2021-3129](https://github.com/simonlee-hello/CVE-2021-3129)
|
||||
|
@ -1950,6 +1950,14 @@ In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-fre
|
|||
|
||||
- [artsking/linux-4.1.15_CVE-2021-33034_withPatch](https://github.com/artsking/linux-4.1.15_CVE-2021-33034_withPatch)
|
||||
|
||||
### CVE-2021-33044 (2021-09-15)
|
||||
|
||||
<code>
|
||||
The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.
|
||||
</code>
|
||||
|
||||
- [bp2008/DahuaLoginBypass](https://github.com/bp2008/DahuaLoginBypass)
|
||||
|
||||
### CVE-2021-33045 (2021-09-15)
|
||||
|
||||
<code>
|
||||
|
@ -2783,6 +2791,7 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
|
|||
- [cgddgc/CVE-2021-41773-42013](https://github.com/cgddgc/CVE-2021-41773-42013)
|
||||
- [apapedulimu/Apachuk](https://github.com/apapedulimu/Apachuk)
|
||||
- [scarmandef/CVE-2021-41773](https://github.com/scarmandef/CVE-2021-41773)
|
||||
- [0xAlmighty/CVE-2021-41773-PoC](https://github.com/0xAlmighty/CVE-2021-41773-PoC)
|
||||
|
||||
### CVE-2021-42013 (2021-10-07)
|
||||
|
||||
|
@ -8876,7 +8885,7 @@ An issue was discovered in CMS Made Simple 2.2.8. It is possible with the News m
|
|||
The Illuminate component of Laravel Framework 5.7.x has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the __destruct method of the PendingCommand class in PendingCommand.php.
|
||||
</code>
|
||||
|
||||
- [nth347/CVE-2019-9081_PoC](https://github.com/nth347/CVE-2019-9081_PoC)
|
||||
- [hungnt199/CVE-2019-9081_PoC](https://github.com/hungnt199/CVE-2019-9081_PoC)
|
||||
|
||||
### CVE-2019-9153 (2019-08-22)
|
||||
|
||||
|
@ -10356,6 +10365,7 @@ admin/includes/class.import.snippet.php in the "Woody ad snippets" plu
|
|||
</code>
|
||||
|
||||
- [GeneralEG/CVE-2019-15858](https://github.com/GeneralEG/CVE-2019-15858)
|
||||
- [oxctdev/CVE-2019-15858](https://github.com/oxctdev/CVE-2019-15858)
|
||||
|
||||
### CVE-2019-15972 (2019-11-25)
|
||||
|
||||
|
@ -11700,7 +11710,7 @@ Authentication Bypass vulnerability in the Oturia Smart Google Code Inserter plu
|
|||
|
||||
- [lucad93/CVE-2018-3810](https://github.com/lucad93/CVE-2018-3810)
|
||||
- [cved-sources/cve-2018-3810](https://github.com/cved-sources/cve-2018-3810)
|
||||
- [nth347/CVE-2018-3810_exploit](https://github.com/nth347/CVE-2018-3810_exploit)
|
||||
- [hungnt199/CVE-2018-3810_exploit](https://github.com/hungnt199/CVE-2018-3810_exploit)
|
||||
|
||||
### CVE-2018-3811 (2018-01-01)
|
||||
|
||||
|
@ -13317,7 +13327,7 @@ An issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker c
|
|||
The iThemes Security (better-wp-security) plugin before 7.0.3 for WordPress allows SQL Injection (by attackers with Admin privileges) via the logs page.
|
||||
</code>
|
||||
|
||||
- [nth347/CVE-2018-12636_exploit](https://github.com/nth347/CVE-2018-12636_exploit)
|
||||
- [hungnt199/CVE-2018-12636_exploit](https://github.com/hungnt199/CVE-2018-12636_exploit)
|
||||
|
||||
### CVE-2018-12798 (2018-07-20)
|
||||
|
||||
|
|
Loading…
Reference in a new issue