mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-26 17:44:10 +01:00
Auto Update 2021/04/18 12:10:53
This commit is contained in:
parent
a843ff7655
commit
2bdc39b99d
20 changed files with 92 additions and 68 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploiting CVE-2014-7205 by injecting arbitrary JavaScript resulting in Remote Code Execution.",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-05T17:02:36Z",
|
||||
"updated_at": "2021-04-05T17:09:09Z",
|
||||
"updated_at": "2021-04-17T22:24:57Z",
|
||||
"pushed_at": "2021-04-05T17:09:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2021-04-17T14:45:41Z",
|
||||
"updated_at": "2021-04-18T01:56:14Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 406,
|
||||
"watchers_count": 406,
|
||||
"stargazers_count": 407,
|
||||
"watchers_count": 407,
|
||||
"forks_count": 96,
|
||||
"forks": 96,
|
||||
"watchers": 406,
|
||||
"watchers": 407,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -339,8 +339,8 @@
|
|||
"pushed_at": "2019-04-08T08:58:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-04-17T13:26:51Z",
|
||||
"updated_at": "2021-04-17T22:10:43Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2509,
|
||||
"watchers_count": 2509,
|
||||
"stargazers_count": 2510,
|
||||
"watchers_count": 2510,
|
||||
"forks_count": 721,
|
||||
"forks": 721,
|
||||
"watchers": 2509,
|
||||
"watchers": 2510,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC for CVE-2019-5736",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-13T05:26:32Z",
|
||||
"updated_at": "2021-04-14T16:54:44Z",
|
||||
"updated_at": "2021-04-17T22:23:50Z",
|
||||
"pushed_at": "2019-02-19T11:45:13Z",
|
||||
"stargazers_count": 495,
|
||||
"watchers_count": 495,
|
||||
"stargazers_count": 496,
|
||||
"watchers_count": 496,
|
||||
"forks_count": 121,
|
||||
"forks": 121,
|
||||
"watchers": 495,
|
||||
"watchers": 496,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-09T22:30:42Z",
|
||||
"updated_at": "2021-04-05T04:24:54Z",
|
||||
"updated_at": "2021-04-17T21:52:30Z",
|
||||
"pushed_at": "2019-01-22T21:00:36Z",
|
||||
"stargazers_count": 597,
|
||||
"watchers_count": 597,
|
||||
"stargazers_count": 596,
|
||||
"watchers_count": 596,
|
||||
"forks_count": 131,
|
||||
"forks": 131,
|
||||
"watchers": 597,
|
||||
"watchers": 596,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2020-10199 Nexus <= 3.21.1 远程代码执行脚本(有回显)",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-16T09:40:15Z",
|
||||
"updated_at": "2021-04-11T08:55:28Z",
|
||||
"updated_at": "2021-04-18T02:36:14Z",
|
||||
"pushed_at": "2020-05-26T10:23:34Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 33,
|
||||
"watchers": 34,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Early 2019 - late 2020. R.I.P. CVE-2020-12928 https:\/\/h0mbre.github.io\/RyzenMaster_CVE\/#",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-10T13:08:21Z",
|
||||
"updated_at": "2021-02-14T15:08:06Z",
|
||||
"updated_at": "2021-04-17T21:53:59Z",
|
||||
"pushed_at": "2021-02-14T15:08:01Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 13,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T17:51:29Z",
|
||||
"updated_at": "2021-04-15T21:27:27Z",
|
||||
"updated_at": "2021-04-18T01:26:15Z",
|
||||
"pushed_at": "2021-02-25T17:19:39Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 56,
|
||||
"watchers": 57,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-04-17T13:26:51Z",
|
||||
"updated_at": "2021-04-17T22:10:43Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2509,
|
||||
"watchers_count": 2509,
|
||||
"stargazers_count": 2510,
|
||||
"watchers_count": 2510,
|
||||
"forks_count": 721,
|
||||
"forks": 721,
|
||||
"watchers": 2509,
|
||||
"watchers": 2510,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2021-04-11T03:25:34Z",
|
||||
"stargazers_count": 603,
|
||||
"watchers_count": 603,
|
||||
"forks_count": 163,
|
||||
"forks": 163,
|
||||
"forks_count": 164,
|
||||
"forks": 164,
|
||||
"watchers": 603,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-1732 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-05T02:11:10Z",
|
||||
"updated_at": "2021-04-16T10:57:00Z",
|
||||
"updated_at": "2021-04-17T21:52:57Z",
|
||||
"pushed_at": "2021-03-05T03:10:26Z",
|
||||
"stargazers_count": 276,
|
||||
"watchers_count": 276,
|
||||
"stargazers_count": 275,
|
||||
"watchers_count": 275,
|
||||
"forks_count": 62,
|
||||
"forks": 62,
|
||||
"watchers": 276,
|
||||
"watchers": 275,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T17:51:29Z",
|
||||
"updated_at": "2021-04-15T21:27:27Z",
|
||||
"updated_at": "2021-04-18T01:26:15Z",
|
||||
"pushed_at": "2021-02-25T17:19:39Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 56,
|
||||
"watchers": 57,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -21,5 +21,28 @@
|
|||
"forks": 4,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 359022063,
|
||||
"name": "CVE-2021-25281",
|
||||
"full_name": "SkyBulk\/CVE-2021-25281",
|
||||
"owner": {
|
||||
"login": "SkyBulk",
|
||||
"id": 43649816,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43649816?v=4",
|
||||
"html_url": "https:\/\/github.com\/SkyBulk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SkyBulk\/CVE-2021-25281",
|
||||
"description": "demo testing CVE-2021-25281",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-18T01:55:23Z",
|
||||
"updated_at": "2021-04-18T03:09:05Z",
|
||||
"pushed_at": "2021-04-18T01:55:24Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2021-04-11T03:25:34Z",
|
||||
"stargazers_count": 603,
|
||||
"watchers_count": 603,
|
||||
"forks_count": 163,
|
||||
"forks": 163,
|
||||
"forks_count": 164,
|
||||
"forks": 164,
|
||||
"watchers": 603,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A repository hosting write ups for the 0 days CVE-2021-25679, CVE-2021-25680, and CVE-2021-25681 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-03T20:06:54Z",
|
||||
"updated_at": "2021-04-17T20:03:30Z",
|
||||
"updated_at": "2021-04-17T21:39:42Z",
|
||||
"pushed_at": "2021-04-17T20:03:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -10,16 +10,16 @@
|
|||
"html_url": "https:\/\/github.com\/motikan2010"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/motikan2010\/CVE-2021-29447",
|
||||
"description": null,
|
||||
"description": "WordPress - Authenticated XXE (CVE-2021-29447)",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-16T20:41:26Z",
|
||||
"updated_at": "2021-04-17T11:45:38Z",
|
||||
"pushed_at": "2021-04-17T11:45:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"updated_at": "2021-04-18T03:06:05Z",
|
||||
"pushed_at": "2021-04-18T00:45:34Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -381,13 +381,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2021-04-17T11:24:30Z",
|
||||
"updated_at": "2021-04-18T02:13:30Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 687,
|
||||
"watchers_count": 687,
|
||||
"stargazers_count": 688,
|
||||
"watchers_count": 688,
|
||||
"forks_count": 192,
|
||||
"forks": 192,
|
||||
"watchers": 687,
|
||||
"watchers": 688,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-26T01:09:25Z",
|
||||
"updated_at": "2021-04-17T02:47:21Z",
|
||||
"updated_at": "2021-04-18T02:47:26Z",
|
||||
"pushed_at": "2021-03-31T12:00:09Z",
|
||||
"stargazers_count": 186,
|
||||
"watchers_count": 186,
|
||||
"stargazers_count": 188,
|
||||
"watchers_count": 188,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 186,
|
||||
"watchers": 188,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -520,6 +520,7 @@ An issue was discovered in through SaltStack Salt before 3002.5. salt-api does n
|
|||
</code>
|
||||
|
||||
- [Immersive-Labs-Sec/CVE-2021-25281](https://github.com/Immersive-Labs-Sec/CVE-2021-25281)
|
||||
- [SkyBulk/CVE-2021-25281](https://github.com/SkyBulk/CVE-2021-25281)
|
||||
|
||||
### CVE-2021-25374 (2021-04-09)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue