mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/06/06 00:11:01
This commit is contained in:
parent
cc18caa84b
commit
2e51545b97
85 changed files with 1890 additions and 168 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
|
||||
"fork": false,
|
||||
"created_at": "2013-09-22T21:20:31Z",
|
||||
"updated_at": "2021-05-19T02:13:18Z",
|
||||
"updated_at": "2021-06-05T14:44:39Z",
|
||||
"pushed_at": "2017-04-24T14:16:56Z",
|
||||
"stargazers_count": 306,
|
||||
"watchers_count": 306,
|
||||
"stargazers_count": 307,
|
||||
"watchers_count": 307,
|
||||
"forks_count": 93,
|
||||
"forks": 93,
|
||||
"watchers": 306,
|
||||
"watchers": 307,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-06-04T02:22:33Z",
|
||||
"updated_at": "2021-06-05T13:24:19Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1050,
|
||||
"watchers_count": 1050,
|
||||
"forks_count": 234,
|
||||
"forks": 234,
|
||||
"watchers": 1050,
|
||||
"stargazers_count": 1051,
|
||||
"watchers_count": 1051,
|
||||
"forks_count": 235,
|
||||
"forks": 235,
|
||||
"watchers": 1051,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2015/CVE-2015-5232.json
Normal file
25
2015/CVE-2015-5232.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374106595,
|
||||
"name": "CVE-2015-5232",
|
||||
"full_name": "JamesGeeee\/CVE-2015-5232",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2015-5232",
|
||||
"description": "PoC for exploiting CVE-2015-5232",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:17:53Z",
|
||||
"updated_at": "2021-06-05T12:18:00Z",
|
||||
"pushed_at": "2021-06-05T12:17:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-06-04T02:22:33Z",
|
||||
"updated_at": "2021-06-05T13:24:19Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1050,
|
||||
"watchers_count": 1050,
|
||||
"forks_count": 234,
|
||||
"forks": 234,
|
||||
"watchers": 1050,
|
||||
"stargazers_count": 1051,
|
||||
"watchers_count": 1051,
|
||||
"forks_count": 235,
|
||||
"forks": 235,
|
||||
"watchers": 1051,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-21T11:19:21Z",
|
||||
"updated_at": "2021-06-04T15:48:25Z",
|
||||
"updated_at": "2021-06-05T10:41:18Z",
|
||||
"pushed_at": "2021-02-03T16:03:40Z",
|
||||
"stargazers_count": 870,
|
||||
"watchers_count": 870,
|
||||
"stargazers_count": 871,
|
||||
"watchers_count": 871,
|
||||
"forks_count": 412,
|
||||
"forks": 412,
|
||||
"watchers": 870,
|
||||
"watchers": 871,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-17T08:10:07Z",
|
||||
"updated_at": "2021-05-25T21:32:11Z",
|
||||
"updated_at": "2021-06-05T10:44:05Z",
|
||||
"pushed_at": "2017-11-19T11:01:16Z",
|
||||
"stargazers_count": 653,
|
||||
"watchers_count": 653,
|
||||
"stargazers_count": 654,
|
||||
"watchers_count": 654,
|
||||
"forks_count": 287,
|
||||
"forks": 287,
|
||||
"watchers": 653,
|
||||
"watchers": 654,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Blueborne CVE-2017-0781 Android heap overflow vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-09T15:13:25Z",
|
||||
"updated_at": "2021-05-25T03:54:37Z",
|
||||
"updated_at": "2021-06-05T10:37:02Z",
|
||||
"pushed_at": "2017-10-09T15:20:11Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"forks_count": 38,
|
||||
"forks": 38,
|
||||
"watchers": 75,
|
||||
"watchers": 76,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-09T13:53:57Z",
|
||||
"updated_at": "2021-05-15T09:12:39Z",
|
||||
"updated_at": "2021-06-05T15:08:10Z",
|
||||
"pushed_at": "2020-08-22T06:15:54Z",
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 113,
|
||||
"watchers": 114,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-06-04T02:22:33Z",
|
||||
"updated_at": "2021-06-05T15:10:19Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1050,
|
||||
"watchers_count": 1050,
|
||||
"forks_count": 234,
|
||||
"forks": 234,
|
||||
"watchers": 1050,
|
||||
"stargazers_count": 1052,
|
||||
"watchers_count": 1052,
|
||||
"forks_count": 235,
|
||||
"forks": 235,
|
||||
"watchers": 1052,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T00:28:50Z",
|
||||
"updated_at": "2021-05-29T10:48:02Z",
|
||||
"updated_at": "2021-06-05T15:09:25Z",
|
||||
"pushed_at": "2018-01-10T01:14:44Z",
|
||||
"stargazers_count": 694,
|
||||
"watchers_count": 694,
|
||||
"stargazers_count": 695,
|
||||
"watchers_count": 695,
|
||||
"forks_count": 186,
|
||||
"forks": 186,
|
||||
"watchers": 694,
|
||||
"watchers": 695,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC + Docker Environment for Python PIL\/Pillow Remote Shell Command Execution via Ghostscript CVE-2018-16509",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-15T07:44:43Z",
|
||||
"updated_at": "2021-02-28T08:05:37Z",
|
||||
"updated_at": "2021-06-05T14:02:48Z",
|
||||
"pushed_at": "2021-01-06T01:11:32Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-14T09:20:21Z",
|
||||
"updated_at": "2021-03-04T05:52:00Z",
|
||||
"updated_at": "2021-06-05T11:04:34Z",
|
||||
"pushed_at": "2018-03-14T12:13:43Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 47,
|
||||
"watchers": 48,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-06-04T02:22:33Z",
|
||||
"updated_at": "2021-06-05T15:10:19Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1050,
|
||||
"watchers_count": 1050,
|
||||
"forks_count": 234,
|
||||
"forks": 234,
|
||||
"watchers": 1050,
|
||||
"stargazers_count": 1052,
|
||||
"watchers_count": 1052,
|
||||
"forks_count": 235,
|
||||
"forks": 235,
|
||||
"watchers": 1052,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -665,5 +665,28 @@
|
|||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 374077433,
|
||||
"name": "CVE-2018-7600",
|
||||
"full_name": "0xAJ2K\/CVE-2018-7600",
|
||||
"owner": {
|
||||
"login": "0xAJ2K",
|
||||
"id": 48768952,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48768952?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xAJ2K"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xAJ2K\/CVE-2018-7600",
|
||||
"description": "Drupal 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations.",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T09:49:56Z",
|
||||
"updated_at": "2021-06-05T09:53:49Z",
|
||||
"pushed_at": "2021-06-05T09:53:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,12 +82,12 @@
|
|||
"description": "CVE-2019-0708-exploit",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-15T02:24:21Z",
|
||||
"updated_at": "2021-04-18T07:02:19Z",
|
||||
"updated_at": "2021-06-05T13:06:53Z",
|
||||
"pushed_at": "2019-05-15T02:26:46Z",
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 117,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -910,13 +910,13 @@
|
|||
"description": "dump",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-21T06:57:19Z",
|
||||
"updated_at": "2021-05-30T02:40:40Z",
|
||||
"updated_at": "2021-06-05T13:04:13Z",
|
||||
"pushed_at": "2019-06-01T05:15:11Z",
|
||||
"stargazers_count": 473,
|
||||
"watchers_count": 473,
|
||||
"stargazers_count": 474,
|
||||
"watchers_count": 474,
|
||||
"forks_count": 194,
|
||||
"forks": 194,
|
||||
"watchers": 473,
|
||||
"watchers": 474,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1025,13 +1025,13 @@
|
|||
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-22T00:08:44Z",
|
||||
"updated_at": "2021-05-28T02:59:44Z",
|
||||
"updated_at": "2021-06-05T13:03:35Z",
|
||||
"pushed_at": "2020-12-06T04:48:38Z",
|
||||
"stargazers_count": 1150,
|
||||
"watchers_count": 1150,
|
||||
"stargazers_count": 1152,
|
||||
"watchers_count": 1152,
|
||||
"forks_count": 391,
|
||||
"forks": 391,
|
||||
"watchers": 1150,
|
||||
"watchers": 1152,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1416,13 +1416,13 @@
|
|||
"description": "Proof of concept for CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T16:53:54Z",
|
||||
"updated_at": "2021-06-01T13:04:56Z",
|
||||
"updated_at": "2021-06-05T10:46:20Z",
|
||||
"pushed_at": "2019-09-03T20:50:28Z",
|
||||
"stargazers_count": 1070,
|
||||
"watchers_count": 1070,
|
||||
"stargazers_count": 1071,
|
||||
"watchers_count": 1071,
|
||||
"forks_count": 356,
|
||||
"forks": 356,
|
||||
"watchers": 1070,
|
||||
"watchers": 1071,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-29T07:08:52Z",
|
||||
"updated_at": "2021-06-04T15:41:21Z",
|
||||
"updated_at": "2021-06-05T12:43:48Z",
|
||||
"pushed_at": "2020-06-13T17:40:14Z",
|
||||
"stargazers_count": 583,
|
||||
"watchers_count": 583,
|
||||
"stargazers_count": 584,
|
||||
"watchers_count": 584,
|
||||
"forks_count": 83,
|
||||
"forks": 83,
|
||||
"watchers": 583,
|
||||
"watchers": 584,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-04T14:43:57Z",
|
||||
"updated_at": "2021-04-18T23:34:44Z",
|
||||
"updated_at": "2021-06-05T12:27:10Z",
|
||||
"pushed_at": "2019-11-30T10:28:01Z",
|
||||
"stargazers_count": 151,
|
||||
"watchers_count": 151,
|
||||
"stargazers_count": 152,
|
||||
"watchers_count": 152,
|
||||
"forks_count": 82,
|
||||
"forks": 82,
|
||||
"watchers": 151,
|
||||
"watchers": 152,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-03T15:08:49Z",
|
||||
"updated_at": "2021-05-17T01:07:43Z",
|
||||
"updated_at": "2021-06-05T11:23:00Z",
|
||||
"pushed_at": "2019-09-08T06:09:11Z",
|
||||
"stargazers_count": 692,
|
||||
"watchers_count": 692,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-09T13:53:57Z",
|
||||
"updated_at": "2021-05-15T09:12:39Z",
|
||||
"updated_at": "2021-06-05T15:08:10Z",
|
||||
"pushed_at": "2020-08-22T06:15:54Z",
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 113,
|
||||
"watchers": 114,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-06-04T02:22:33Z",
|
||||
"updated_at": "2021-06-05T15:10:19Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1050,
|
||||
"watchers_count": 1050,
|
||||
"forks_count": 234,
|
||||
"forks": 234,
|
||||
"watchers": 1050,
|
||||
"stargazers_count": 1052,
|
||||
"watchers_count": 1052,
|
||||
"forks_count": 235,
|
||||
"forks": 235,
|
||||
"watchers": 1052,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR\/EDR and BLE [CVE-2019-9506]",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-15T11:54:21Z",
|
||||
"updated_at": "2021-05-29T01:52:07Z",
|
||||
"updated_at": "2021-06-05T11:17:06Z",
|
||||
"pushed_at": "2021-04-20T16:14:13Z",
|
||||
"stargazers_count": 131,
|
||||
"watchers_count": 131,
|
||||
"stargazers_count": 132,
|
||||
"watchers_count": 132,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 131,
|
||||
"watchers": 132,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-11T16:42:34Z",
|
||||
"updated_at": "2021-04-20T04:41:55Z",
|
||||
"updated_at": "2021-06-05T13:35:54Z",
|
||||
"pushed_at": "2020-02-11T21:34:28Z",
|
||||
"stargazers_count": 252,
|
||||
"watchers_count": 252,
|
||||
"stargazers_count": 253,
|
||||
"watchers_count": 253,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"watchers": 252,
|
||||
"watchers": 253,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -864,13 +864,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2021-06-04T02:03:30Z",
|
||||
"updated_at": "2021-06-05T10:42:06Z",
|
||||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1123,
|
||||
"watchers_count": 1123,
|
||||
"stargazers_count": 1124,
|
||||
"watchers_count": 1124,
|
||||
"forks_count": 354,
|
||||
"forks": 354,
|
||||
"watchers": 1123,
|
||||
"watchers": 1124,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2020/CVE-2020-13558.json
Normal file
25
2020/CVE-2020-13558.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374106820,
|
||||
"name": "CVE-2020-13558",
|
||||
"full_name": "JamesGeeee\/CVE-2020-13558",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2020-13558",
|
||||
"description": "PoC for exploiting CVE-2020-13558",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:18:56Z",
|
||||
"updated_at": "2021-06-05T12:19:02Z",
|
||||
"pushed_at": "2021-06-05T12:18:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-13956.json
Normal file
25
2020/CVE-2020-13956.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374105307,
|
||||
"name": "CVE-2020-13956",
|
||||
"full_name": "JamesGeeee\/CVE-2020-13956",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2020-13956",
|
||||
"description": "PoC for exploiting CVE-2020-13956",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:12:01Z",
|
||||
"updated_at": "2021-06-05T12:14:56Z",
|
||||
"pushed_at": "2021-06-05T12:14:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2021-06-03T17:54:27Z",
|
||||
"updated_at": "2021-06-05T10:43:00Z",
|
||||
"pushed_at": "2020-10-21T12:10:28Z",
|
||||
"stargazers_count": 1288,
|
||||
"watchers_count": 1288,
|
||||
"stargazers_count": 1289,
|
||||
"watchers_count": 1289,
|
||||
"forks_count": 293,
|
||||
"forks": 293,
|
||||
"watchers": 1288,
|
||||
"watchers": 1289,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-06-04T02:22:33Z",
|
||||
"updated_at": "2021-06-05T15:10:19Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1050,
|
||||
"watchers_count": 1050,
|
||||
"forks_count": 234,
|
||||
"forks": 234,
|
||||
"watchers": 1050,
|
||||
"stargazers_count": 1052,
|
||||
"watchers_count": 1052,
|
||||
"forks_count": 235,
|
||||
"forks": 235,
|
||||
"watchers": 1052,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2020/CVE-2020-29321.json
Normal file
25
2020/CVE-2020-29321.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374106348,
|
||||
"name": "CVE-2020-29321",
|
||||
"full_name": "JamesGeeee\/CVE-2020-29321",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2020-29321",
|
||||
"description": "PoC for exploiting CVE-2020-29321",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:16:48Z",
|
||||
"updated_at": "2021-06-05T12:16:54Z",
|
||||
"pushed_at": "2021-06-05T12:16:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-29322.json
Normal file
25
2020/CVE-2020-29322.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374106335,
|
||||
"name": "CVE-2020-29322",
|
||||
"full_name": "JamesGeeee\/CVE-2020-29322",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2020-29322",
|
||||
"description": "PoC for exploiting CVE-2020-29322",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:16:45Z",
|
||||
"updated_at": "2021-06-05T12:16:50Z",
|
||||
"pushed_at": "2021-06-05T12:16:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-29323.json
Normal file
25
2020/CVE-2020-29323.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374106360,
|
||||
"name": "CVE-2020-29323",
|
||||
"full_name": "JamesGeeee\/CVE-2020-29323",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2020-29323",
|
||||
"description": "PoC for exploiting CVE-2020-29323",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:16:52Z",
|
||||
"updated_at": "2021-06-05T12:16:57Z",
|
||||
"pushed_at": "2021-06-05T12:16:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-29324.json
Normal file
25
2020/CVE-2020-29324.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374106195,
|
||||
"name": "CVE-2020-29324",
|
||||
"full_name": "JamesGeeee\/CVE-2020-29324",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2020-29324",
|
||||
"description": "PoC for exploiting CVE-2020-29324",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:16:12Z",
|
||||
"updated_at": "2021-06-05T12:16:18Z",
|
||||
"pushed_at": "2021-06-05T12:16:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2020-6207 (Missing Authentication Check in SAP Solution Manager)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-14T10:49:40Z",
|
||||
"updated_at": "2021-04-15T07:02:27Z",
|
||||
"updated_at": "2021-06-05T09:45:39Z",
|
||||
"pushed_at": "2021-01-15T16:25:19Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 76,
|
||||
"watchers": 77,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-15T15:20:09Z",
|
||||
"updated_at": "2021-06-04T23:01:57Z",
|
||||
"updated_at": "2021-06-05T09:33:13Z",
|
||||
"pushed_at": "2020-09-29T17:20:12Z",
|
||||
"stargazers_count": 177,
|
||||
"watchers_count": 177,
|
||||
"stargazers_count": 178,
|
||||
"watchers_count": 178,
|
||||
"forks_count": 57,
|
||||
"forks": 57,
|
||||
"watchers": 177,
|
||||
"watchers": 178,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC for CVE-2020-6287 The PoC in python for add user only, no administrator permission set. Inspired by @zeroSteiner from metasploit. Original Metasploit PR module: https:\/\/github.com\/rapid7\/metasploit-framework\/pull\/13852\/commits\/d1e2c75b3eafa7f62a6aba9fbe6220c8da97baa8 This PoC only create user with unauthentication permission and no more administrator permission set. This project is created only for educational purposes and cannot be used for law violation or personal gain. The author of this project is not responsible for any possible harm caused by the materials of this project. Original finding: CVE-2020-6287: Pablo Artuso CVE-2020-6286: Yvan 'iggy' G. Usage: python sap-CVE-2020-6287-add-user.py <HTTP(s):\/\/IP:Port",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-20T18:45:53Z",
|
||||
"updated_at": "2021-04-28T23:24:17Z",
|
||||
"updated_at": "2021-06-05T11:06:00Z",
|
||||
"pushed_at": "2020-07-21T18:50:07Z",
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 77,
|
||||
"watchers": 78,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "[CVE-2020-6287] SAP NetWeaver AS JAVA (LM Configuration Wizard) Authentication Bypass (Create Simple & Administrator Java User)",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-13T09:12:37Z",
|
||||
"updated_at": "2021-04-07T09:07:29Z",
|
||||
"updated_at": "2021-06-05T10:14:54Z",
|
||||
"pushed_at": "2020-09-18T15:18:21Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-20585.json
Normal file
25
2021/CVE-2021-20585.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374107085,
|
||||
"name": "CVE-2021-20585",
|
||||
"full_name": "JamesGeeee\/CVE-2021-20585",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-20585",
|
||||
"description": "PoC for exploiting CVE-2021-20585",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:20:09Z",
|
||||
"updated_at": "2021-06-05T12:20:15Z",
|
||||
"pushed_at": "2021-06-05T12:20:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-05-29T13:07:14Z",
|
||||
"updated_at": "2021-06-05T09:08:17Z",
|
||||
"updated_at": "2021-06-05T13:56:36Z",
|
||||
"pushed_at": "2021-06-03T21:29:39Z",
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 106,
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 109,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "CVE-2021-21985 VMware vCenter Server远程代码执行漏洞 EXP (更新可回显EXP)",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-03T09:59:21Z",
|
||||
"updated_at": "2021-06-05T08:36:13Z",
|
||||
"updated_at": "2021-06-05T14:56:18Z",
|
||||
"pushed_at": "2021-06-05T08:35:27Z",
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 63,
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 74,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -128,13 +128,13 @@
|
|||
"description": "cve-2021-21985 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-03T12:17:06Z",
|
||||
"updated_at": "2021-06-05T07:47:49Z",
|
||||
"updated_at": "2021-06-05T15:16:20Z",
|
||||
"pushed_at": "2021-06-04T01:42:01Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 23,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -159,5 +159,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 374091686,
|
||||
"name": "Project_CVE-2021-21985_PoC",
|
||||
"full_name": "testanull\/Project_CVE-2021-21985_PoC",
|
||||
"owner": {
|
||||
"login": "testanull",
|
||||
"id": 21060210,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21060210?v=4",
|
||||
"html_url": "https:\/\/github.com\/testanull"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/testanull\/Project_CVE-2021-21985_PoC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T11:03:13Z",
|
||||
"updated_at": "2021-06-05T13:59:31Z",
|
||||
"pushed_at": "2021-06-05T11:05:17Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-21987.json
Normal file
25
2021/CVE-2021-21987.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374106517,
|
||||
"name": "CVE-2021-21987",
|
||||
"full_name": "JamesGeeee\/CVE-2021-21987",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-21987",
|
||||
"description": "PoC for exploiting CVE-2021-21987",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:17:32Z",
|
||||
"updated_at": "2021-06-05T12:17:41Z",
|
||||
"pushed_at": "2021-06-05T12:17:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-21988.json
Normal file
25
2021/CVE-2021-21988.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374106368,
|
||||
"name": "CVE-2021-21988",
|
||||
"full_name": "JamesGeeee\/CVE-2021-21988",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-21988",
|
||||
"description": "PoC for exploiting CVE-2021-21988",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:16:55Z",
|
||||
"updated_at": "2021-06-05T12:17:00Z",
|
||||
"pushed_at": "2021-06-05T12:16:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-21989.json
Normal file
25
2021/CVE-2021-21989.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374106567,
|
||||
"name": "CVE-2021-21989",
|
||||
"full_name": "JamesGeeee\/CVE-2021-21989",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-21989",
|
||||
"description": "PoC for exploiting CVE-2021-21989",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:17:46Z",
|
||||
"updated_at": "2021-06-05T12:17:51Z",
|
||||
"pushed_at": "2021-06-05T12:17:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-22160.json
Normal file
25
2021/CVE-2021-22160.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374106181,
|
||||
"name": "CVE-2021-22160",
|
||||
"full_name": "JamesGeeee\/CVE-2021-22160",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-22160",
|
||||
"description": "PoC for exploiting CVE-2021-22160",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:16:09Z",
|
||||
"updated_at": "2021-06-05T12:16:14Z",
|
||||
"pushed_at": "2021-06-05T12:16:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-22207.json
Normal file
25
2021/CVE-2021-22207.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374105298,
|
||||
"name": "CVE-2021-22207",
|
||||
"full_name": "JamesGeeee\/CVE-2021-22207",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-22207",
|
||||
"description": "PoC for exploiting CVE-2021-22207",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:11:59Z",
|
||||
"updated_at": "2021-06-05T12:14:53Z",
|
||||
"pushed_at": "2021-06-05T12:14:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-22358.json
Normal file
25
2021/CVE-2021-22358.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374106540,
|
||||
"name": "CVE-2021-22358",
|
||||
"full_name": "JamesGeeee\/CVE-2021-22358",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-22358",
|
||||
"description": "PoC for exploiting CVE-2021-22358",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:17:39Z",
|
||||
"updated_at": "2021-06-05T12:17:44Z",
|
||||
"pushed_at": "2021-06-05T12:17:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-22359.json
Normal file
25
2021/CVE-2021-22359.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374106380,
|
||||
"name": "CVE-2021-22359",
|
||||
"full_name": "JamesGeeee\/CVE-2021-22359",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-22359",
|
||||
"description": "PoC for exploiting CVE-2021-22359",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:16:59Z",
|
||||
"updated_at": "2021-06-05T12:17:04Z",
|
||||
"pushed_at": "2021-06-05T12:17:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof-of-Concept (PoC) script to exploit Pulse Secure CVE-2021-22893. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-21T09:48:57Z",
|
||||
"updated_at": "2021-05-29T14:04:43Z",
|
||||
"updated_at": "2021-06-05T09:42:06Z",
|
||||
"pushed_at": "2021-05-25T00:45:31Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 33,
|
||||
"watchers": 34,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2021/CVE-2021-22900.json
Normal file
25
2021/CVE-2021-22900.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374107133,
|
||||
"name": "CVE-2021-22900",
|
||||
"full_name": "JamesGeeee\/CVE-2021-22900",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-22900",
|
||||
"description": "PoC for exploiting CVE-2021-22900",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:20:20Z",
|
||||
"updated_at": "2021-06-05T12:20:25Z",
|
||||
"pushed_at": "2021-06-05T12:20:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-22911.json
Normal file
25
2021/CVE-2021-22911.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374143127,
|
||||
"name": "CVE-2021-22911",
|
||||
"full_name": "CsEnox\/CVE-2021-22911",
|
||||
"owner": {
|
||||
"login": "CsEnox",
|
||||
"id": 60170196,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60170196?v=4",
|
||||
"html_url": "https:\/\/github.com\/CsEnox"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CsEnox\/CVE-2021-22911",
|
||||
"description": "Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T15:05:01Z",
|
||||
"updated_at": "2021-06-05T15:07:33Z",
|
||||
"pushed_at": "2021-06-05T15:07:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-23983.json
Normal file
25
2021/CVE-2021-23983.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374106804,
|
||||
"name": "CVE-2021-23983",
|
||||
"full_name": "JamesGeeee\/CVE-2021-23983",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-23983",
|
||||
"description": "PoC for exploiting CVE-2021-23983",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:18:53Z",
|
||||
"updated_at": "2021-06-05T12:18:58Z",
|
||||
"pushed_at": "2021-06-05T12:18:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-23984.json
Normal file
25
2021/CVE-2021-23984.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374106912,
|
||||
"name": "CVE-2021-23984",
|
||||
"full_name": "JamesGeeee\/CVE-2021-23984",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-23984",
|
||||
"description": "PoC for exploiting CVE-2021-23984",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:19:18Z",
|
||||
"updated_at": "2021-06-05T12:19:23Z",
|
||||
"pushed_at": "2021-06-05T12:19:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-23985.json
Normal file
25
2021/CVE-2021-23985.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374106955,
|
||||
"name": "CVE-2021-23985",
|
||||
"full_name": "JamesGeeee\/CVE-2021-23985",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-23985",
|
||||
"description": "PoC for exploiting CVE-2021-23985",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:19:29Z",
|
||||
"updated_at": "2021-06-05T12:19:35Z",
|
||||
"pushed_at": "2021-06-05T12:19:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-23986.json
Normal file
25
2021/CVE-2021-23986.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374106923,
|
||||
"name": "CVE-2021-23986",
|
||||
"full_name": "JamesGeeee\/CVE-2021-23986",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-23986",
|
||||
"description": "PoC for exploiting CVE-2021-23986",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:19:22Z",
|
||||
"updated_at": "2021-06-05T12:19:28Z",
|
||||
"pushed_at": "2021-06-05T12:19:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-23987.json
Normal file
25
2021/CVE-2021-23987.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374106937,
|
||||
"name": "CVE-2021-23987",
|
||||
"full_name": "JamesGeeee\/CVE-2021-23987",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-23987",
|
||||
"description": "PoC for exploiting CVE-2021-23987",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:19:26Z",
|
||||
"updated_at": "2021-06-05T12:19:31Z",
|
||||
"pushed_at": "2021-06-05T12:19:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-04-15T12:46:54Z",
|
||||
"stargazers_count": 173,
|
||||
"watchers_count": 173,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"forks_count": 38,
|
||||
"forks": 38,
|
||||
"watchers": 173,
|
||||
"score": 0
|
||||
}
|
||||
|
|
25
2021/CVE-2021-25217.json
Normal file
25
2021/CVE-2021-25217.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374105286,
|
||||
"name": "CVE-2021-25217",
|
||||
"full_name": "JamesGeeee\/CVE-2021-25217",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-25217",
|
||||
"description": "PoC for exploiting CVE-2021-25217",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:11:57Z",
|
||||
"updated_at": "2021-06-05T12:14:50Z",
|
||||
"pushed_at": "2021-06-05T12:14:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-25326.json
Normal file
25
2021/CVE-2021-25326.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374107044,
|
||||
"name": "CVE-2021-25326",
|
||||
"full_name": "JamesGeeee\/CVE-2021-25326",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-25326",
|
||||
"description": "PoC for exploiting CVE-2021-25326",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:19:54Z",
|
||||
"updated_at": "2021-06-05T12:20:11Z",
|
||||
"pushed_at": "2021-06-05T12:20:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-25327.json
Normal file
25
2021/CVE-2021-25327.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374106857,
|
||||
"name": "CVE-2021-25327",
|
||||
"full_name": "JamesGeeee\/CVE-2021-25327",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-25327",
|
||||
"description": "PoC for exploiting CVE-2021-25327",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:19:04Z",
|
||||
"updated_at": "2021-06-05T12:19:20Z",
|
||||
"pushed_at": "2021-06-05T12:19:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-25328.json
Normal file
25
2021/CVE-2021-25328.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374106837,
|
||||
"name": "CVE-2021-25328",
|
||||
"full_name": "JamesGeeee\/CVE-2021-25328",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-25328",
|
||||
"description": "PoC for exploiting CVE-2021-25328",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:19:00Z",
|
||||
"updated_at": "2021-06-05T12:19:05Z",
|
||||
"pushed_at": "2021-06-05T12:19:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -174,13 +174,13 @@
|
|||
"description": "Module pack for #ProxyLogon (part. of my contribute for Metasploit-Framework) [CVE-2021-26855 && CVE-2021-27065]",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-07T12:12:16Z",
|
||||
"updated_at": "2021-04-10T04:55:12Z",
|
||||
"updated_at": "2021-06-05T15:06:28Z",
|
||||
"pushed_at": "2021-03-29T08:42:01Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -799,8 +799,8 @@
|
|||
"pushed_at": "2021-03-24T01:25:05Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
|
|
25
2021/CVE-2021-26928.json
Normal file
25
2021/CVE-2021-26928.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374105477,
|
||||
"name": "CVE-2021-26928",
|
||||
"full_name": "JamesGeeee\/CVE-2021-26928",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-26928",
|
||||
"description": "PoC for exploiting CVE-2021-26928",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:12:52Z",
|
||||
"updated_at": "2021-06-05T12:15:39Z",
|
||||
"pushed_at": "2021-06-05T12:15:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": "stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority\/system",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-03T12:39:11Z",
|
||||
"updated_at": "2021-06-04T14:44:35Z",
|
||||
"pushed_at": "2021-06-04T14:44:32Z",
|
||||
"updated_at": "2021-06-05T10:13:00Z",
|
||||
"pushed_at": "2021-06-05T10:12:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
25
2021/CVE-2021-28242.json
Normal file
25
2021/CVE-2021-28242.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374106986,
|
||||
"name": "CVE-2021-28242",
|
||||
"full_name": "JamesGeeee\/CVE-2021-28242",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-28242",
|
||||
"description": "PoC for exploiting CVE-2021-28242",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:19:38Z",
|
||||
"updated_at": "2021-06-05T12:19:43Z",
|
||||
"pushed_at": "2021-06-05T12:19:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-28326.json
Normal file
25
2021/CVE-2021-28326.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374107104,
|
||||
"name": "CVE-2021-28326",
|
||||
"full_name": "JamesGeeee\/CVE-2021-28326",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-28326",
|
||||
"description": "PoC for exploiting CVE-2021-28326",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:20:13Z",
|
||||
"updated_at": "2021-06-05T12:20:18Z",
|
||||
"pushed_at": "2021-06-05T12:20:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-28453.json
Normal file
25
2021/CVE-2021-28453.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374107117,
|
||||
"name": "CVE-2021-28453",
|
||||
"full_name": "JamesGeeee\/CVE-2021-28453",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-28453",
|
||||
"description": "PoC for exploiting CVE-2021-28453",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:20:16Z",
|
||||
"updated_at": "2021-06-05T12:20:22Z",
|
||||
"pushed_at": "2021-06-05T12:20:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-31T18:02:39Z",
|
||||
"updated_at": "2021-06-04T15:46:07Z",
|
||||
"updated_at": "2021-06-05T14:59:44Z",
|
||||
"pushed_at": "2021-06-01T15:08:23Z",
|
||||
"stargazers_count": 149,
|
||||
"watchers_count": 149,
|
||||
"stargazers_count": 150,
|
||||
"watchers_count": 150,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 149,
|
||||
"watchers": 150,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2021/CVE-2021-29271.json
Normal file
25
2021/CVE-2021-29271.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374106674,
|
||||
"name": "CVE-2021-29271",
|
||||
"full_name": "JamesGeeee\/CVE-2021-29271",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-29271",
|
||||
"description": "PoC for exploiting CVE-2021-29271",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:18:17Z",
|
||||
"updated_at": "2021-06-05T12:18:22Z",
|
||||
"pushed_at": "2021-06-05T12:18:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-29272.json
Normal file
25
2021/CVE-2021-29272.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374106659,
|
||||
"name": "CVE-2021-29272",
|
||||
"full_name": "JamesGeeee\/CVE-2021-29272",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-29272",
|
||||
"description": "PoC for exploiting CVE-2021-29272",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:18:13Z",
|
||||
"updated_at": "2021-06-05T12:18:19Z",
|
||||
"pushed_at": "2021-06-05T12:18:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-29417.json
Normal file
25
2021/CVE-2021-29417.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374106625,
|
||||
"name": "CVE-2021-29417",
|
||||
"full_name": "JamesGeeee\/CVE-2021-29417",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-29417",
|
||||
"description": "PoC for exploiting CVE-2021-29417",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:18:02Z",
|
||||
"updated_at": "2021-06-05T12:18:15Z",
|
||||
"pushed_at": "2021-06-05T12:18:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-29500.json
Normal file
25
2021/CVE-2021-29500.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374106254,
|
||||
"name": "CVE-2021-29500",
|
||||
"full_name": "JamesGeeee\/CVE-2021-29500",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-29500",
|
||||
"description": "PoC for exploiting CVE-2021-29500",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:16:24Z",
|
||||
"updated_at": "2021-06-05T12:16:29Z",
|
||||
"pushed_at": "2021-06-05T12:16:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-29642.json
Normal file
25
2021/CVE-2021-29642.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374106689,
|
||||
"name": "CVE-2021-29642",
|
||||
"full_name": "JamesGeeee\/CVE-2021-29642",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-29642",
|
||||
"description": "PoC for exploiting CVE-2021-29642",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:18:20Z",
|
||||
"updated_at": "2021-06-05T12:18:26Z",
|
||||
"pushed_at": "2021-06-05T12:18:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-30123.json
Normal file
25
2021/CVE-2021-30123.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374106705,
|
||||
"name": "CVE-2021-30123",
|
||||
"full_name": "JamesGeeee\/CVE-2021-30123",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-30123",
|
||||
"description": "PoC for exploiting CVE-2021-30123",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:18:24Z",
|
||||
"updated_at": "2021-06-05T12:18:29Z",
|
||||
"pushed_at": "2021-06-05T12:18:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-30159.json
Normal file
25
2021/CVE-2021-30159.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374106793,
|
||||
"name": "CVE-2021-30159",
|
||||
"full_name": "JamesGeeee\/CVE-2021-30159",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-30159",
|
||||
"description": "PoC for exploiting CVE-2021-30159",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:18:50Z",
|
||||
"updated_at": "2021-06-05T12:18:54Z",
|
||||
"pushed_at": "2021-06-05T12:18:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-30178.json
Normal file
25
2021/CVE-2021-30178.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374106788,
|
||||
"name": "CVE-2021-30178",
|
||||
"full_name": "JamesGeeee\/CVE-2021-30178",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-30178",
|
||||
"description": "PoC for exploiting CVE-2021-30178",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:18:46Z",
|
||||
"updated_at": "2021-06-05T12:18:51Z",
|
||||
"pushed_at": "2021-06-05T12:18:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-30510.json
Normal file
25
2021/CVE-2021-30510.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374107149,
|
||||
"name": "CVE-2021-30510",
|
||||
"full_name": "JamesGeeee\/CVE-2021-30510",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-30510",
|
||||
"description": "PoC for exploiting CVE-2021-30510",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:20:24Z",
|
||||
"updated_at": "2021-06-05T12:20:47Z",
|
||||
"pushed_at": "2021-06-05T12:20:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-30513.json
Normal file
25
2021/CVE-2021-30513.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374107285,
|
||||
"name": "CVE-2021-30513",
|
||||
"full_name": "JamesGeeee\/CVE-2021-30513",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-30513",
|
||||
"description": "PoC for exploiting CVE-2021-30513",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:21:04Z",
|
||||
"updated_at": "2021-06-05T12:21:10Z",
|
||||
"pushed_at": "2021-06-05T12:21:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-16T16:15:56Z",
|
||||
"updated_at": "2021-06-04T19:17:50Z",
|
||||
"updated_at": "2021-06-05T13:44:18Z",
|
||||
"pushed_at": "2021-05-21T23:58:50Z",
|
||||
"stargazers_count": 723,
|
||||
"watchers_count": 723,
|
||||
"stargazers_count": 724,
|
||||
"watchers_count": 724,
|
||||
"forks_count": 118,
|
||||
"forks": 118,
|
||||
"watchers": 723,
|
||||
"watchers": 724,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2021/CVE-2021-31249.json
Normal file
25
2021/CVE-2021-31249.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374105483,
|
||||
"name": "CVE-2021-31249",
|
||||
"full_name": "JamesGeeee\/CVE-2021-31249",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-31249",
|
||||
"description": "PoC for exploiting CVE-2021-31249",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:12:53Z",
|
||||
"updated_at": "2021-06-05T12:16:01Z",
|
||||
"pushed_at": "2021-06-05T12:15:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-31250.json
Normal file
25
2021/CVE-2021-31250.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374105490,
|
||||
"name": "CVE-2021-31250",
|
||||
"full_name": "JamesGeeee\/CVE-2021-31250",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-31250",
|
||||
"description": "PoC for exploiting CVE-2021-31250",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:12:55Z",
|
||||
"updated_at": "2021-06-05T12:16:04Z",
|
||||
"pushed_at": "2021-06-05T12:16:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-31251.json
Normal file
25
2021/CVE-2021-31251.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374105499,
|
||||
"name": "CVE-2021-31251",
|
||||
"full_name": "JamesGeeee\/CVE-2021-31251",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-31251",
|
||||
"description": "PoC for exploiting CVE-2021-31251",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:12:57Z",
|
||||
"updated_at": "2021-06-05T12:16:07Z",
|
||||
"pushed_at": "2021-06-05T12:16:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-31252.json
Normal file
25
2021/CVE-2021-31252.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374106169,
|
||||
"name": "CVE-2021-31252",
|
||||
"full_name": "JamesGeeee\/CVE-2021-31252",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-31252",
|
||||
"description": "PoC for exploiting CVE-2021-31252",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:16:05Z",
|
||||
"updated_at": "2021-06-05T12:16:11Z",
|
||||
"pushed_at": "2021-06-05T12:16:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-32638.json
Normal file
25
2021/CVE-2021-32638.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374105465,
|
||||
"name": "CVE-2021-32638",
|
||||
"full_name": "JamesGeeee\/CVE-2021-32638",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-32638",
|
||||
"description": "PoC for exploiting CVE-2021-32638",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:12:49Z",
|
||||
"updated_at": "2021-06-05T12:14:59Z",
|
||||
"pushed_at": "2021-06-05T12:14:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-32641.json
Normal file
25
2021/CVE-2021-32641.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374105467,
|
||||
"name": "CVE-2021-32641",
|
||||
"full_name": "JamesGeeee\/CVE-2021-32641",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-32641",
|
||||
"description": "PoC for exploiting CVE-2021-32641",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:12:50Z",
|
||||
"updated_at": "2021-06-05T12:15:04Z",
|
||||
"pushed_at": "2021-06-05T12:15:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -21,5 +21,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 374106456,
|
||||
"name": "CVE-2021-33558",
|
||||
"full_name": "JamesGeeee\/CVE-2021-33558",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-33558",
|
||||
"description": "PoC for exploiting CVE-2021-33558",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:17:18Z",
|
||||
"updated_at": "2021-06-05T12:17:23Z",
|
||||
"pushed_at": "2021-06-05T12:17:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-33587.json
Normal file
25
2021/CVE-2021-33587.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374106553,
|
||||
"name": "CVE-2021-33587",
|
||||
"full_name": "JamesGeeee\/CVE-2021-33587",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-33587",
|
||||
"description": "PoC for exploiting CVE-2021-33587",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:17:42Z",
|
||||
"updated_at": "2021-06-05T12:17:47Z",
|
||||
"pushed_at": "2021-06-05T12:17:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-33623.json
Normal file
25
2021/CVE-2021-33623.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374106584,
|
||||
"name": "CVE-2021-33623",
|
||||
"full_name": "JamesGeeee\/CVE-2021-33623",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-33623",
|
||||
"description": "PoC for exploiting CVE-2021-33623",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:17:49Z",
|
||||
"updated_at": "2021-06-05T12:17:55Z",
|
||||
"pushed_at": "2021-06-05T12:17:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-3393.json
Normal file
25
2021/CVE-2021-3393.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374106737,
|
||||
"name": "CVE-2021-3393",
|
||||
"full_name": "JamesGeeee\/CVE-2021-3393",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-3393",
|
||||
"description": "PoC for exploiting CVE-2021-3393",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:18:32Z",
|
||||
"updated_at": "2021-06-05T12:18:48Z",
|
||||
"pushed_at": "2021-06-05T12:18:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-3448.json
Normal file
25
2021/CVE-2021-3448.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 374106715,
|
||||
"name": "CVE-2021-3448",
|
||||
"full_name": "JamesGeeee\/CVE-2021-3448",
|
||||
"owner": {
|
||||
"login": "JamesGeeee",
|
||||
"id": 85397056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85397056?v=4",
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamesGeeee\/CVE-2021-3448",
|
||||
"description": "PoC for exploiting CVE-2021-3448",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T12:18:27Z",
|
||||
"updated_at": "2021-06-05T12:18:33Z",
|
||||
"pushed_at": "2021-06-05T12:18:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
403
README.md
403
README.md
|
@ -285,6 +285,14 @@ FortiLogger 4.4.2.2 is affected by Arbitrary File Upload by sending a "Cont
|
|||
|
||||
- [erberkan/fortilogger_arbitrary_fileupload](https://github.com/erberkan/fortilogger_arbitrary_fileupload)
|
||||
|
||||
### CVE-2021-3393 (2021-04-01)
|
||||
|
||||
<code>
|
||||
An information leak was discovered in postgresql in versions before 13.2, before 12.6 and before 11.11. A user having UPDATE permission but not SELECT permission to a particular column could craft queries which, under some circumstances, might disclose values from that column in error messages. An attacker could use this flaw to obtain information stored in a column they are allowed to write but not read.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-3393](https://github.com/JamesGeeee/CVE-2021-3393)
|
||||
|
||||
### CVE-2021-3395 (2021-02-02)
|
||||
|
||||
<code>
|
||||
|
@ -293,6 +301,14 @@ A cross-site scripting (XSS) vulnerability in Pryaniki 6.44.3 allows remote auth
|
|||
|
||||
- [jet-pentest/CVE-2021-3395](https://github.com/jet-pentest/CVE-2021-3395)
|
||||
|
||||
### CVE-2021-3448 (2021-04-08)
|
||||
|
||||
<code>
|
||||
A flaw was found in dnsmasq in versions before 2.85. When configured to use a specific server for a given network interface, dnsmasq uses a fixed port while forwarding queries. An attacker on the network, able to find the outgoing port used by dnsmasq, only needs to guess the random transmission ID to forge a reply and get it accepted by dnsmasq. This flaw makes a DNS Cache Poisoning attack much easier. The highest threat from this vulnerability is to data integrity.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-3448](https://github.com/JamesGeeee/CVE-2021-3448)
|
||||
|
||||
### CVE-2021-3449 (2021-03-25)
|
||||
|
||||
<code>
|
||||
|
@ -333,6 +349,14 @@ A flaw was found in keycloak. Directories can be created prior to the Java proce
|
|||
|
||||
- [Jarry1sec/CVE-2021-20202](https://github.com/Jarry1sec/CVE-2021-20202)
|
||||
|
||||
### CVE-2021-20585 (2021-05-31)
|
||||
|
||||
<code>
|
||||
IBM Security Verify Access 20.07 could disclose sensitive information in HTTP server headers that could be used in further attacks against the system. IBM X-Force ID: 199398.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-20585](https://github.com/JamesGeeee/CVE-2021-20585)
|
||||
|
||||
### CVE-2021-20717 (2021-05-10)
|
||||
|
||||
<code>
|
||||
|
@ -539,6 +563,39 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability due to
|
|||
- [r0ckysec/CVE-2021-21985](https://github.com/r0ckysec/CVE-2021-21985)
|
||||
- [xnianq/cve-2021-21985_exp](https://github.com/xnianq/cve-2021-21985_exp)
|
||||
- [daedalus/CVE-2021-21985](https://github.com/daedalus/CVE-2021-21985)
|
||||
- [testanull/Project_CVE-2021-21985_PoC](https://github.com/testanull/Project_CVE-2021-21985_PoC)
|
||||
|
||||
### CVE-2021-21987 (2021-05-24)
|
||||
|
||||
<code>
|
||||
VMware Workstation (16.x prior to 16.1.2) and Horizon Client for Windows (5.x prior to 5.5.2) contain out-of-bounds read vulnerability in the Cortado ThinPrint component (TTC Parser). A malicious actor with access to a virtual machine or remote desktop may be able to exploit these issues leading to information disclosure from the TPView process running on the system where Workstation or Horizon Client for Windows is installed.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-21987](https://github.com/JamesGeeee/CVE-2021-21987)
|
||||
|
||||
### CVE-2021-21988 (2021-05-24)
|
||||
|
||||
<code>
|
||||
VMware Workstation (16.x prior to 16.1.2) and Horizon Client for Windows (5.x prior to 5.5.2) contain out-of-bounds read vulnerability in the Cortado ThinPrint component (JPEG2000 Parser). A malicious actor with access to a virtual machine or remote desktop may be able to exploit these issues leading to information disclosure from the TPView process running on the system where Workstation or Horizon Client for Windows is installed.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-21988](https://github.com/JamesGeeee/CVE-2021-21988)
|
||||
|
||||
### CVE-2021-21989 (2021-05-24)
|
||||
|
||||
<code>
|
||||
VMware Workstation (16.x prior to 16.1.2) and Horizon Client for Windows (5.x prior to 5.5.2) contain out-of-bounds read vulnerability in the Cortado ThinPrint component (TTC Parser). A malicious actor with access to a virtual machine or remote desktop may be able to exploit these issues leading to information disclosure from the TPView process running on the system where Workstation or Horizon Client for Windows is installed.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-21989](https://github.com/JamesGeeee/CVE-2021-21989)
|
||||
|
||||
### CVE-2021-22160 (2021-05-26)
|
||||
|
||||
<code>
|
||||
If Apache Pulsar is configured to authenticate clients using tokens based on JSON Web Tokens (JWT), the signature of the token is not validated if the algorithm of the presented token is set to "none". This allows an attacker to connect to Pulsar instances as any user (incl. admins).
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-22160](https://github.com/JamesGeeee/CVE-2021-22160)
|
||||
|
||||
### CVE-2021-22192 (2021-03-24)
|
||||
|
||||
|
@ -559,6 +616,30 @@ Improper neutralization of user data in the DjVu file format in ExifTool version
|
|||
- [se162xg/CVE-2021-22204](https://github.com/se162xg/CVE-2021-22204)
|
||||
- [bilkoh/POC-CVE-2021-22204](https://github.com/bilkoh/POC-CVE-2021-22204)
|
||||
|
||||
### CVE-2021-22207 (2021-04-23)
|
||||
|
||||
<code>
|
||||
Excessive memory consumption in MS-WSP dissector in Wireshark 3.4.0 to 3.4.4 and 3.2.0 to 3.2.12 allows denial of service via packet injection or crafted capture file
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-22207](https://github.com/JamesGeeee/CVE-2021-22207)
|
||||
|
||||
### CVE-2021-22358 (2021-05-27)
|
||||
|
||||
<code>
|
||||
There is an insufficient input validation vulnerability in FusionCompute 8.0.0. Due to the input validation is insufficient, an attacker can exploit this vulnerability to upload any files to the device. Successful exploit may cause the service abnormal.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-22358](https://github.com/JamesGeeee/CVE-2021-22358)
|
||||
|
||||
### CVE-2021-22359 (2021-05-27)
|
||||
|
||||
<code>
|
||||
There is a denial of service vulnerability in the verisions V200R005C00SPC500 of S5700 and V200R005C00SPC500 of S6700. An attacker could exploit this vulnerability by sending specific message to a targeted device. Due to insufficient input validation, successful exploit can cause the service abnormal.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-22359](https://github.com/JamesGeeee/CVE-2021-22359)
|
||||
|
||||
### CVE-2021-22893 (2021-04-23)
|
||||
|
||||
<code>
|
||||
|
@ -568,6 +649,22 @@ Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication b
|
|||
- [ZephrFish/CVE-2021-22893](https://github.com/ZephrFish/CVE-2021-22893)
|
||||
- [Mad-robot/CVE-2021-22893](https://github.com/Mad-robot/CVE-2021-22893)
|
||||
|
||||
### CVE-2021-22900 (2021-05-27)
|
||||
|
||||
<code>
|
||||
A vulnerability allowed multiple unrestricted uploads in Pulse Connect Secure before 9.1R11.4 that could lead to an authenticated administrator to perform a file write via a maliciously crafted archive upload in the administrator web interface.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-22900](https://github.com/JamesGeeee/CVE-2021-22900)
|
||||
|
||||
### CVE-2021-22911 (2021-05-27)
|
||||
|
||||
<code>
|
||||
A improper input sanitization vulnerability exists in Rocket.Chat server 3.11, 3.12 & 3.13 that could lead to unauthenticated NoSQL injection, resulting potentially in RCE.
|
||||
</code>
|
||||
|
||||
- [CsEnox/CVE-2021-22911](https://github.com/CsEnox/CVE-2021-22911)
|
||||
|
||||
### CVE-2021-22986 (2021-03-31)
|
||||
|
||||
<code>
|
||||
|
@ -594,6 +691,46 @@ An issue was discovered in Joomla! 3.0.0 through 3.9.24. com_media allowed paths
|
|||
|
||||
- [HoangKien1020/CVE-2021-23132](https://github.com/HoangKien1020/CVE-2021-23132)
|
||||
|
||||
### CVE-2021-23983 (2021-03-31)
|
||||
|
||||
<code>
|
||||
By causing a transition on a parent node by removing a CSS rule, an invalid property for a marker could have been applied, resulting in memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 87.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-23983](https://github.com/JamesGeeee/CVE-2021-23983)
|
||||
|
||||
### CVE-2021-23984 (2021-03-31)
|
||||
|
||||
<code>
|
||||
A malicious extension could have opened a popup window lacking an address bar. The title of the popup lacking an address bar should not be fully controllable, but in this situation was. This could have been used to spoof a website and attempt to trick the user into providing credentials. This vulnerability affects Firefox ESR < 78.9, Thunderbird < 78.9, and Firefox < 87.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-23984](https://github.com/JamesGeeee/CVE-2021-23984)
|
||||
|
||||
### CVE-2021-23985 (2021-03-31)
|
||||
|
||||
<code>
|
||||
If an attacker is able to alter specific about:config values (for example malware running on the user's computer), the Devtools remote debugging feature could have been enabled in a way that was unnoticable to the user. This would have allowed a remote attacker (able to make a direct network connection to the victim) to monitor the user's browsing activity and (plaintext) network traffic. This was addressed by providing a visual cue when Devtools has an open network socket. This vulnerability affects Firefox < 87.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-23985](https://github.com/JamesGeeee/CVE-2021-23985)
|
||||
|
||||
### CVE-2021-23986 (2021-03-31)
|
||||
|
||||
<code>
|
||||
A malicious extension with the 'search' permission could have installed a new search engine whose favicon referenced a cross-origin URL. The response to this cross-origin request could have been read by the extension, allowing a same-origin policy bypass by the extension, which should not have cross-origin permissions. This cross-origin request was made without cookies, so the sensitive information disclosed by the violation was limited to local-network resources or resources that perform IP-based authentication. This vulnerability affects Firefox < 87.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-23986](https://github.com/JamesGeeee/CVE-2021-23986)
|
||||
|
||||
### CVE-2021-23987 (2021-03-31)
|
||||
|
||||
<code>
|
||||
Mozilla developers and community members reported memory safety bugs present in Firefox 86 and Firefox ESR 78.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 78.9, Thunderbird < 78.9, and Firefox < 87.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-23987](https://github.com/JamesGeeee/CVE-2021-23987)
|
||||
|
||||
### CVE-2021-24027 (2021-04-06)
|
||||
|
||||
<code>
|
||||
|
@ -634,6 +771,14 @@ Windows Console Driver Denial of Service Vulnerability
|
|||
|
||||
- [waleedassar/CVE-2021-24098](https://github.com/waleedassar/CVE-2021-24098)
|
||||
|
||||
### CVE-2021-25217 (2021-05-26)
|
||||
|
||||
<code>
|
||||
In ISC DHCP 4.1-ESV-R1 -> 4.1-ESV-R16, ISC DHCP 4.4.0 -> 4.4.2 (Other branches of ISC DHCP (i.e., releases in the 4.0.x series or lower and releases in the 4.3.x series) are beyond their End-of-Life (EOL) and no longer supported by ISC. From inspection it is clear that the defect is also present in releases from those series, but they have not been officially tested for the vulnerability), The outcome of encountering the defect while reading a lease that will trigger it varies, according to: the component being affected (i.e., dhclient or dhcpd) whether the package was built as a 32-bit or 64-bit binary whether the compiler flag -fstack-protection-strong was used when compiling In dhclient, ISC has not successfully reproduced the error on a 64-bit system. However, on a 32-bit system it is possible to cause dhclient to crash when reading an improper lease, which could cause network connectivity problems for an affected system due to the absence of a running DHCP client process. In dhcpd, when run in DHCPv4 or DHCPv6 mode: if the dhcpd server binary was built for a 32-bit architecture AND the -fstack-protection-strong flag was specified to the compiler, dhcpd may exit while parsing a lease file containing an objectionable lease, resulting in lack of service to clients. Additionally, the offending lease and the lease immediately following it in the lease database may be improperly deleted. if the dhcpd server binary was built for a 64-bit architecture OR if the -fstack-protection-strong compiler flag was NOT specified, the crash will not occur, but it is possible for the offending lease and the lease which immediately followed it to be improperly deleted.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-25217](https://github.com/JamesGeeee/CVE-2021-25217)
|
||||
|
||||
### CVE-2021-25281 (2021-02-26)
|
||||
|
||||
<code>
|
||||
|
@ -643,6 +788,30 @@ An issue was discovered in through SaltStack Salt before 3002.5. salt-api does n
|
|||
- [Immersive-Labs-Sec/CVE-2021-25281](https://github.com/Immersive-Labs-Sec/CVE-2021-25281)
|
||||
- [SkyBulk/CVE-2021-25281](https://github.com/SkyBulk/CVE-2021-25281)
|
||||
|
||||
### CVE-2021-25326 (2021-04-09)
|
||||
|
||||
<code>
|
||||
Skyworth Digital Technology RN510 V.3.1.0.4 is affected by an incorrect access control vulnerability in/cgi-bin/test_version.asp. If Wi-Fi is connected but an unauthenticated user visits a URL, the SSID password and web UI password may be disclosed.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-25326](https://github.com/JamesGeeee/CVE-2021-25326)
|
||||
|
||||
### CVE-2021-25327 (2021-04-09)
|
||||
|
||||
<code>
|
||||
Skyworth Digital Technology RN510 V.3.1.0.4 contains a cross-site request forgery (CSRF) vulnerability in /cgi-bin/net-routeadd.asp and /cgi-bin/sec-urlfilter.asp. Missing CSRF protection in devices can lead to XSRF, as the above pages are vulnerable to cross-site scripting (XSS).
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-25327](https://github.com/JamesGeeee/CVE-2021-25327)
|
||||
|
||||
### CVE-2021-25328 (2021-04-09)
|
||||
|
||||
<code>
|
||||
Skyworth Digital Technology RN510 V.3.1.0.4 RN510 V.3.1.0.4 contains a buffer overflow vulnerability in /cgi-bin/app-staticIP.asp. An authenticated attacker can send a specially crafted request to endpoint which can lead to a denial of service (DoS) or possible code execution on the device.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-25328](https://github.com/JamesGeeee/CVE-2021-25328)
|
||||
|
||||
### CVE-2021-25374 (2021-04-09)
|
||||
|
||||
<code>
|
||||
|
@ -837,6 +1006,14 @@ LMA ISIDA Retriever 5.2 allows SQL Injection.
|
|||
|
||||
- [Security-AVS/-CVE-2021-26904](https://github.com/Security-AVS/-CVE-2021-26904)
|
||||
|
||||
### CVE-2021-26928 (2021-06-04)
|
||||
|
||||
<code>
|
||||
** DISPUTED ** BIRD through 2.0.7 does not provide functionality for password authentication of BGP peers. Because of this, products that use BIRD (which may, for example, include Tigera products in some configurations, as well as products of other vendors) may have been susceptible to route redirection for Denial of Service and/or Information Disclosure. NOTE: a researcher has asserted that the behavior is within Tigera’s area of responsibility; however, Tigera disagrees.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-26928](https://github.com/JamesGeeee/CVE-2021-26928)
|
||||
|
||||
### CVE-2021-26943 (2021-03-31)
|
||||
|
||||
<code>
|
||||
|
@ -986,6 +1163,14 @@ The MsIo64.sys driver before 1.1.19.1016 in MSI Dragon Center before 2.0.98.0 ha
|
|||
|
||||
- [mathisvickie/CVE-2021-27965](https://github.com/mathisvickie/CVE-2021-27965)
|
||||
|
||||
### CVE-2021-28242 (2021-04-15)
|
||||
|
||||
<code>
|
||||
SQL Injection in the "evoadm.php" component of b2evolution v7.2.2-stable allows remote attackers to obtain sensitive database information by injecting SQL commands into the "cf_name" parameter when creating a new filter under the "Collections" tab.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-28242](https://github.com/JamesGeeee/CVE-2021-28242)
|
||||
|
||||
### CVE-2021-28310 (2021-04-13)
|
||||
|
||||
<code>
|
||||
|
@ -1002,6 +1187,22 @@ Windows NTFS Denial of Service Vulnerability
|
|||
|
||||
- [shubham0d/CVE-2021-28312](https://github.com/shubham0d/CVE-2021-28312)
|
||||
|
||||
### CVE-2021-28326 (2021-04-13)
|
||||
|
||||
<code>
|
||||
Windows AppX Deployment Server Denial of Service Vulnerability
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-28326](https://github.com/JamesGeeee/CVE-2021-28326)
|
||||
|
||||
### CVE-2021-28453 (2021-04-13)
|
||||
|
||||
<code>
|
||||
Microsoft Word Remote Code Execution Vulnerability
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-28453](https://github.com/JamesGeeee/CVE-2021-28453)
|
||||
|
||||
### CVE-2021-28476 (2021-05-11)
|
||||
|
||||
<code>
|
||||
|
@ -1052,6 +1253,22 @@ Sherlock SherlockIM through 2021-03-29 allows Cross Site Scripting (XSS) by leve
|
|||
|
||||
- [Security-AVS/CVE-2021-29267](https://github.com/Security-AVS/CVE-2021-29267)
|
||||
|
||||
### CVE-2021-29271 (2021-03-27)
|
||||
|
||||
<code>
|
||||
remark42 before 1.6.1 allows XSS, as demonstrated by "Locator: Locator{URL:" followed by an XSS payload. This is related to backend/app/store/comment.go and backend/app/store/service/service.go.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-29271](https://github.com/JamesGeeee/CVE-2021-29271)
|
||||
|
||||
### CVE-2021-29272 (2021-03-27)
|
||||
|
||||
<code>
|
||||
bluemonday before 1.0.5 allows XSS because certain Go lowercasing converts an uppercase Cyrillic character, defeating a protection mechanism against the "script" string.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-29272](https://github.com/JamesGeeee/CVE-2021-29272)
|
||||
|
||||
### CVE-2021-29349 (2021-03-31)
|
||||
|
||||
<code>
|
||||
|
@ -1064,6 +1281,14 @@ Mahara 20.10 is affected by Cross Site Request Forgery (CSRF) that allows a remo
|
|||
### CVE-2021-29386
|
||||
- [Umarovm/PowerSchool-Grade-Stealer](https://github.com/Umarovm/PowerSchool-Grade-Stealer)
|
||||
|
||||
### CVE-2021-29417 (2021-03-29)
|
||||
|
||||
<code>
|
||||
gitjacker before 0.1.0 allows remote attackers to execute arbitrary code via a crafted .git directory because of directory traversal.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-29417](https://github.com/JamesGeeee/CVE-2021-29417)
|
||||
|
||||
### CVE-2021-29447 (2021-04-15)
|
||||
|
||||
<code>
|
||||
|
@ -1074,6 +1299,14 @@ Wordpress is an open source CMS. A user with the ability to upload files (like a
|
|||
- [Vulnmachines/wordpress_cve-2021-29447](https://github.com/Vulnmachines/wordpress_cve-2021-29447)
|
||||
- [dnr6419/CVE-2021-29447](https://github.com/dnr6419/CVE-2021-29447)
|
||||
|
||||
### CVE-2021-29500 (2021-06-04)
|
||||
|
||||
<code>
|
||||
bubble fireworks is an open source java package relating to Spring Framework. In bubble fireworks before version 2021.BUILD-SNAPSHOT there is a vulnerability in which the package did not properly verify the signature of JSON Web Tokens. This allows to forgery of valid JWTs.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-29500](https://github.com/JamesGeeee/CVE-2021-29500)
|
||||
|
||||
### CVE-2021-29627 (2021-04-07)
|
||||
|
||||
<code>
|
||||
|
@ -1082,6 +1315,14 @@ In FreeBSD 13.0-STABLE before n245050, 12.2-STABLE before r369525, 13.0-RC4 befo
|
|||
|
||||
- [raymontag/cve-2021-29627](https://github.com/raymontag/cve-2021-29627)
|
||||
|
||||
### CVE-2021-29642 (2021-03-30)
|
||||
|
||||
<code>
|
||||
GistPad before 0.2.7 allows a crafted workspace folder to change the URL for the Gist API, which leads to leakage of GitHub access tokens.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-29642](https://github.com/JamesGeeee/CVE-2021-29642)
|
||||
|
||||
### CVE-2021-30005 (2021-05-11)
|
||||
|
||||
<code>
|
||||
|
@ -1098,6 +1339,14 @@ Froala Editor 3.2.6 is affected by Cross Site Scripting (XSS). Under certain con
|
|||
|
||||
- [Hackdwerg/CVE-2021-30109](https://github.com/Hackdwerg/CVE-2021-30109)
|
||||
|
||||
### CVE-2021-30123 (2021-04-07)
|
||||
|
||||
<code>
|
||||
FFmpeg <=4.3 contains a buffer overflow vulnerability in libavcodec through a crafted file that may lead to remote code execution.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-30123](https://github.com/JamesGeeee/CVE-2021-30123)
|
||||
|
||||
### CVE-2021-30128 (2021-04-27)
|
||||
|
||||
<code>
|
||||
|
@ -1131,6 +1380,22 @@ Composr 10.0.36 allows XSS in an XML script.
|
|||
|
||||
- [orionhridoy/CVE-2021-30150](https://github.com/orionhridoy/CVE-2021-30150)
|
||||
|
||||
### CVE-2021-30159 (2021-04-09)
|
||||
|
||||
<code>
|
||||
An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. Users can bypass intended restrictions on deleting pages in certain "fast double move" situations. MovePage::isValidMoveTarget() uses FOR UPDATE, but it's only called if Title::getArticleID() returns non-zero with no special flags. Next, MovePage::moveToInternal() will delete the page if getArticleID(READ_LATEST) is non-zero. Therefore, if the page is missing in the replica DB, isValidMove() will return true, and then moveToInternal() will unconditionally delete the page if it can be found in the master.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-30159](https://github.com/JamesGeeee/CVE-2021-30159)
|
||||
|
||||
### CVE-2021-30178 (2021-04-06)
|
||||
|
||||
<code>
|
||||
An issue was discovered in the Linux kernel through 5.11.11. synic_get in arch/x86/kvm/hyperv.c has a NULL pointer dereference for certain accesses to the SynIC Hyper-V context, aka CID-919f4ebc5987.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-30178](https://github.com/JamesGeeee/CVE-2021-30178)
|
||||
|
||||
### CVE-2021-30461 (2021-05-29)
|
||||
|
||||
<code>
|
||||
|
@ -1149,6 +1414,22 @@ Valve Steam through 2021-04-10, when a Source engine game is installed, allows r
|
|||
|
||||
- [floesen/CVE-2021-30481](https://github.com/floesen/CVE-2021-30481)
|
||||
|
||||
### CVE-2021-30510 (2021-06-04)
|
||||
|
||||
<code>
|
||||
Use after free in Aura in Google Chrome prior to 90.0.4430.212 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-30510](https://github.com/JamesGeeee/CVE-2021-30510)
|
||||
|
||||
### CVE-2021-30513 (2021-06-04)
|
||||
|
||||
<code>
|
||||
Type confusion in V8 in Google Chrome prior to 90.0.4430.212 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-30513](https://github.com/JamesGeeee/CVE-2021-30513)
|
||||
|
||||
### CVE-2021-31166 (2021-05-11)
|
||||
|
||||
<code>
|
||||
|
@ -1171,6 +1452,38 @@ Microsoft Windows Infrared Data Association (IrDA) Information Disclosure Vulner
|
|||
|
||||
- [waleedassar/CVE-2021-31184](https://github.com/waleedassar/CVE-2021-31184)
|
||||
|
||||
### CVE-2021-31249 (2021-06-04)
|
||||
|
||||
<code>
|
||||
A CRLF injection vulnerability was found on BF-430, BF-431, and BF-450M TCP/IP Converter devices from CHIYU Technology Inc due to a lack of validation on the parameter redirect= available on multiple CGI components.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-31249](https://github.com/JamesGeeee/CVE-2021-31249)
|
||||
|
||||
### CVE-2021-31250 (2021-06-04)
|
||||
|
||||
<code>
|
||||
Multiple storage XSS vulnerabilities were discovered on BF-430, BF-431 and BF-450M TCP/IP Converter devices from CHIYU Technology Inc due to a lack of sanitization of the input on the components man.cgi, if.cgi, dhcpc.cgi, ppp.cgi.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-31250](https://github.com/JamesGeeee/CVE-2021-31250)
|
||||
|
||||
### CVE-2021-31251 (2021-06-04)
|
||||
|
||||
<code>
|
||||
An authentication bypass in telnet server in BF-430 and BF431 232/422 TCP/IP Converter, BF-450M and SEMAC from CHIYU Technology Inc allows obtaining a privileged connection with the target device by supplying a specially malformed request and an attacker may force the remote telnet server to believe that the user has already authenticated.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-31251](https://github.com/JamesGeeee/CVE-2021-31251)
|
||||
|
||||
### CVE-2021-31252 (2021-06-04)
|
||||
|
||||
<code>
|
||||
An open redirect vulnerability exists in BF-630, BF-450M, BF-430, BF-431, BF631-W, BF830-W, Webpass, and SEMAC devices from CHIYU Technology that can be exploited by sending a link that has a specially crafted URL to convince the user to click on it.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-31252](https://github.com/JamesGeeee/CVE-2021-31252)
|
||||
|
||||
### CVE-2021-31702 (2021-05-29)
|
||||
|
||||
<code>
|
||||
|
@ -1238,6 +1551,22 @@ Insufficient input validation in the Marvin Minsky 1967 implementation of the Un
|
|||
|
||||
- [intrinsic-propensity/turing-machine](https://github.com/intrinsic-propensity/turing-machine)
|
||||
|
||||
### CVE-2021-32638 (2021-05-25)
|
||||
|
||||
<code>
|
||||
Github's CodeQL action is provided to run CodeQL-based code scanning on non-GitHub CI/CD systems and requires a GitHub access token to connect to a GitHub repository. The runner and its documentation previously suggested passing the GitHub token as a command-line parameter to the process instead of reading it from a file, standard input, or an environment variable. This approach made the token visible to other processes on the same machine, for example in the output of the `ps` command. If the CI system publicly exposes the output of `ps`, for example by logging the output, then the GitHub access token can be exposed beyond the scope intended. Users of the CodeQL runner on 3rd-party systems, who are passing a GitHub token via the `--github-auth` flag, are affected. This applies to both GitHub.com and GitHub Enterprise users. Users of the CodeQL Action on GitHub Actions are not affected. The `--github-auth` flag is now considered insecure and deprecated. The undocumented `--external-repository-token` flag has been removed. To securely provide a GitHub access token to the CodeQL runner, users should **do one of the following instead**: Use the `--github-auth-stdin` flag and pass the token on the command line via standard input OR set the `GITHUB_TOKEN` environment variable to contain the token, then call the command without passing in the token. The old flag remains present for backwards compatibility with existing workflows. If the user tries to specify an access token using the `--github-auth` flag, there is a deprecation warning printed to the terminal that directs the user to one of the above options. All CodeQL runner releases codeql-bundle-20210304 onwards contain the patches. We recommend updating to a recent version of the CodeQL runner, storing a token in your CI system's secret storage mechanism, and passing the token to the CodeQL runner using `--github-auth-stdin` or the `GITHUB_TOKEN` environment variable. If still using the old flag, ensure that process output, such as from `ps`, is not persisted in CI logs.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-32638](https://github.com/JamesGeeee/CVE-2021-32638)
|
||||
|
||||
### CVE-2021-32641 (2021-06-04)
|
||||
|
||||
<code>
|
||||
auth0-lock is Auth0's signin solution. Versions of nauth0-lock before and including `11.30.0` are vulnerable to reflected XSS. An attacker can execute arbitrary code when the library's `flashMessage` feature is utilized and user input or data from URL parameters is incorporated into the `flashMessage` or the library's `languageDictionary` feature is utilized and user input or data from URL parameters is incorporated into the `languageDictionary`. The vulnerability is patched in version 11.30.1.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-32641](https://github.com/JamesGeeee/CVE-2021-32641)
|
||||
|
||||
### CVE-2021-33558 (2021-05-27)
|
||||
|
||||
<code>
|
||||
|
@ -1245,6 +1574,7 @@ Boa 0.94.13 allows remote attackers to obtain sensitive information via a miscon
|
|||
</code>
|
||||
|
||||
- [mdanzaruddin/CVE-2021-33558.](https://github.com/mdanzaruddin/CVE-2021-33558.)
|
||||
- [JamesGeeee/CVE-2021-33558](https://github.com/JamesGeeee/CVE-2021-33558)
|
||||
|
||||
### CVE-2021-33564 (2021-05-29)
|
||||
|
||||
|
@ -1254,6 +1584,22 @@ An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby a
|
|||
|
||||
- [mlr0p/CVE-2021-33564](https://github.com/mlr0p/CVE-2021-33564)
|
||||
|
||||
### CVE-2021-33587 (2021-05-28)
|
||||
|
||||
<code>
|
||||
The css-what package before 5.0.1 for Node.js does not ensure that attribute parsing has Linear Time Complexity relative to the size of the input.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-33587](https://github.com/JamesGeeee/CVE-2021-33587)
|
||||
|
||||
### CVE-2021-33623 (2021-05-28)
|
||||
|
||||
<code>
|
||||
The trim-newlines package before 3.0.1 and 4.x before 4.0.1 for Node.js has an issue related to regular expression denial-of-service (ReDoS) for the .end() method.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2021-33623](https://github.com/JamesGeeee/CVE-2021-33623)
|
||||
|
||||
|
||||
## 2020
|
||||
### CVE-2020-0001 (2020-01-08)
|
||||
|
@ -3777,6 +4123,14 @@ The XCloner component before 3.5.4 for Joomla! allows Authenticated Local File D
|
|||
### CVE-2020-13457
|
||||
- [alt3kx/CVE-2020-13457](https://github.com/alt3kx/CVE-2020-13457)
|
||||
|
||||
### CVE-2020-13558 (2021-03-03)
|
||||
|
||||
<code>
|
||||
A code execution vulnerability exists in the AudioSourceProviderGStreamer functionality of Webkit WebKitGTK 2.30.1. A specially crafted web page can lead to a use after free.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2020-13558](https://github.com/JamesGeeee/CVE-2020-13558)
|
||||
|
||||
### CVE-2020-13640 (2020-06-18)
|
||||
|
||||
<code>
|
||||
|
@ -3874,6 +4228,14 @@ It is possible to inject malicious OGNL or MVEL scripts into the /context.json p
|
|||
- [yaunsky/Unomi-CVE-2020-13942](https://github.com/yaunsky/Unomi-CVE-2020-13942)
|
||||
- [hoanx4/apche_unomi_rce](https://github.com/hoanx4/apche_unomi_rce)
|
||||
|
||||
### CVE-2020-13956 (2020-12-02)
|
||||
|
||||
<code>
|
||||
Apache HttpClient versions prior to version 4.5.13 and 5.0.3 can misinterpret malformed authority component in request URIs passed to the library as java.net.URI object and pick the wrong target host for request execution.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2020-13956](https://github.com/JamesGeeee/CVE-2020-13956)
|
||||
|
||||
### CVE-2020-13957 (2020-10-13)
|
||||
|
||||
<code>
|
||||
|
@ -5311,6 +5673,38 @@ TikiWiki 21.2 allows templates to be edited without CSRF protection. This could
|
|||
|
||||
- [S1lkys/CVE-2020-29254](https://github.com/S1lkys/CVE-2020-29254)
|
||||
|
||||
### CVE-2020-29321 (2021-06-04)
|
||||
|
||||
<code>
|
||||
The D-Link router DIR-868L 3.01 is vulnerable to credentials disclosure in telnet service through decompilation of firmware, that allows an unauthenticated attacker to gain access to the firmware and to extract sensitive data.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2020-29321](https://github.com/JamesGeeee/CVE-2020-29321)
|
||||
|
||||
### CVE-2020-29322 (2021-06-04)
|
||||
|
||||
<code>
|
||||
The D-Link router DIR-880L 1.07 is vulnerable to credentials disclosure in telnet service through decompilation of firmware, that allows an unauthenticated attacker to gain access to the firmware and to extract sensitive data.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2020-29322](https://github.com/JamesGeeee/CVE-2020-29322)
|
||||
|
||||
### CVE-2020-29323 (2021-06-04)
|
||||
|
||||
<code>
|
||||
The D-link router DIR-885L-MFC 1.15b02, v1.21b05 is vulnerable to credentials disclosure in telnet service through decompilation of firmware, that allows an unauthenticated attacker to gain access to the firmware and to extract sensitive data.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2020-29323](https://github.com/JamesGeeee/CVE-2020-29323)
|
||||
|
||||
### CVE-2020-29324 (2021-06-04)
|
||||
|
||||
<code>
|
||||
The DLink Router DIR-895L MFC v1.21b05 is vulnerable to credentials disclosure in telnet service through decompilation of firmware, that allows an unauthenticated attacker to gain access to the firmware and to extract sensitive data.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2020-29324](https://github.com/JamesGeeee/CVE-2020-29324)
|
||||
|
||||
### CVE-2020-29364 (2020-11-30)
|
||||
|
||||
<code>
|
||||
|
@ -10424,6 +10818,7 @@ Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1
|
|||
- [ynsmroztas/drupalhunter](https://github.com/ynsmroztas/drupalhunter)
|
||||
- [ruthvikvegunta/Drupalgeddon2](https://github.com/ruthvikvegunta/Drupalgeddon2)
|
||||
- [ludy-dev/drupal8-REST-RCE](https://github.com/ludy-dev/drupal8-REST-RCE)
|
||||
- [0xAJ2K/CVE-2018-7600](https://github.com/0xAJ2K/CVE-2018-7600)
|
||||
|
||||
### CVE-2018-7602 (2018-07-19)
|
||||
|
||||
|
@ -16361,6 +16756,14 @@ ntp_openssl.m4 in ntpd in NTP before 4.2.7p112 allows remote attackers to cause
|
|||
|
||||
- [theglife214/CVE-2015-5195](https://github.com/theglife214/CVE-2015-5195)
|
||||
|
||||
### CVE-2015-5232 (2017-06-07)
|
||||
|
||||
<code>
|
||||
Race conditions in opa-fm before 10.4.0.0.196 and opa-ff before 10.4.0.0.197.
|
||||
</code>
|
||||
|
||||
- [JamesGeeee/CVE-2015-5232](https://github.com/JamesGeeee/CVE-2015-5232)
|
||||
|
||||
### CVE-2015-5254 (2016-01-08)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue