mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/05/03 18:11:43
This commit is contained in:
parent
ca9d6bcf9d
commit
40c039c72d
18 changed files with 112 additions and 60 deletions
|
@ -293,8 +293,8 @@
|
|||
"pushed_at": "2020-10-01T11:51:46Z",
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"forks_count": 58,
|
||||
"forks": 58,
|
||||
"forks_count": 57,
|
||||
"forks": 57,
|
||||
"watchers": 85,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -197,13 +197,13 @@
|
|||
"description": "(PoC) Python version of CVE-2019-11043 exploit by neex",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-28T11:09:06Z",
|
||||
"updated_at": "2021-04-21T09:27:06Z",
|
||||
"updated_at": "2021-05-03T07:05:15Z",
|
||||
"pushed_at": "2019-10-29T15:47:02Z",
|
||||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 130,
|
||||
"stargazers_count": 131,
|
||||
"watchers_count": 131,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"watchers": 131,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -312,13 +312,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-11-09T21:46:57Z",
|
||||
"updated_at": "2021-04-29T04:30:19Z",
|
||||
"updated_at": "2021-05-03T05:31:35Z",
|
||||
"pushed_at": "2021-02-07T19:51:24Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-12T07:58:11Z",
|
||||
"updated_at": "2021-04-26T06:37:18Z",
|
||||
"updated_at": "2021-05-03T05:48:07Z",
|
||||
"pushed_at": "2021-01-25T13:42:41Z",
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"forks_count": 55,
|
||||
"forks": 55,
|
||||
"watchers": 191,
|
||||
"stargazers_count": 192,
|
||||
"watchers_count": 192,
|
||||
"forks_count": 56,
|
||||
"forks": 56,
|
||||
"watchers": 192,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-02-20T15:35:34Z",
|
||||
"stargazers_count": 183,
|
||||
"watchers_count": 183,
|
||||
"forks_count": 62,
|
||||
"forks": 62,
|
||||
"forks_count": 63,
|
||||
"forks": 63,
|
||||
"watchers": 183,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Authenticated SQL injection to command execution on Cacti 1.2.12 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-28T20:57:00Z",
|
||||
"updated_at": "2021-04-29T02:12:22Z",
|
||||
"updated_at": "2021-05-03T03:52:36Z",
|
||||
"pushed_at": "2021-04-29T02:12:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Python script to exploit CVE-2020-14321 - Course enrolments allowed privilege escalation from teacher role into manager role to RCE.",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-28T19:46:55Z",
|
||||
"updated_at": "2021-05-01T15:31:02Z",
|
||||
"updated_at": "2021-05-03T06:59:41Z",
|
||||
"pushed_at": "2021-04-28T19:51:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-05-02T14:31:33Z",
|
||||
"updated_at": "2021-05-03T09:13:51Z",
|
||||
"pushed_at": "2021-04-26T02:30:11Z",
|
||||
"stargazers_count": 721,
|
||||
"watchers_count": 721,
|
||||
"stargazers_count": 722,
|
||||
"watchers_count": 722,
|
||||
"forks_count": 225,
|
||||
"forks": 225,
|
||||
"watchers": 721,
|
||||
"watchers": 722,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -151,13 +151,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-25T05:10:06Z",
|
||||
"updated_at": "2021-04-25T08:28:07Z",
|
||||
"updated_at": "2021-05-03T05:41:42Z",
|
||||
"pushed_at": "2021-02-25T05:49:19Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Nmap script to check vulnerability CVE-2021-21975",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-01T21:59:05Z",
|
||||
"updated_at": "2021-04-08T21:00:22Z",
|
||||
"updated_at": "2021-05-03T07:44:13Z",
|
||||
"pushed_at": "2021-04-02T00:32:15Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof-of-Concept (PoC) script to exploit Pulse Secure CVE-2021-22893. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-21T09:48:57Z",
|
||||
"updated_at": "2021-04-28T10:04:55Z",
|
||||
"updated_at": "2021-05-03T07:32:44Z",
|
||||
"pushed_at": "2021-04-21T11:18:31Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2021-03-21T07:40:59Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-05-02T14:31:33Z",
|
||||
"updated_at": "2021-05-03T09:13:51Z",
|
||||
"pushed_at": "2021-04-26T02:30:11Z",
|
||||
"stargazers_count": 721,
|
||||
"watchers_count": 721,
|
||||
"stargazers_count": 722,
|
||||
"watchers_count": 722,
|
||||
"forks_count": 225,
|
||||
"forks": 225,
|
||||
"watchers": 721,
|
||||
"watchers": 722,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Steps for Exploitation ",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-30T01:21:09Z",
|
||||
"updated_at": "2021-04-30T01:21:12Z",
|
||||
"pushed_at": "2021-04-30T01:21:10Z",
|
||||
"updated_at": "2021-05-03T06:10:28Z",
|
||||
"pushed_at": "2021-05-03T06:10:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
25
2021/CVE-2021-27553.json
Normal file
25
2021/CVE-2021-27553.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 363831902,
|
||||
"name": "CVE-2021-27553",
|
||||
"full_name": "sapkota2k20\/CVE-2021-27553",
|
||||
"owner": {
|
||||
"login": "sapkota2k20",
|
||||
"id": 57771853,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57771853?v=4",
|
||||
"html_url": "https:\/\/github.com\/sapkota2k20"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sapkota2k20\/CVE-2021-27553",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-05-03T06:02:03Z",
|
||||
"updated_at": "2021-05-03T06:08:17Z",
|
||||
"pushed_at": "2021-05-03T06:08:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -381,13 +381,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2021-05-02T00:52:00Z",
|
||||
"updated_at": "2021-05-03T04:22:25Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 705,
|
||||
"watchers_count": 705,
|
||||
"stargazers_count": 706,
|
||||
"watchers_count": 706,
|
||||
"forks_count": 198,
|
||||
"forks": 198,
|
||||
"watchers": 705,
|
||||
"watchers": 706,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -67,5 +67,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 363831101,
|
||||
"name": "OverlayFS-CVE-2021-3493",
|
||||
"full_name": "AmIAHuman\/OverlayFS-CVE-2021-3493",
|
||||
"owner": {
|
||||
"login": "AmIAHuman",
|
||||
"id": 30362241,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30362241?v=4",
|
||||
"html_url": "https:\/\/github.com\/AmIAHuman"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AmIAHuman\/OverlayFS-CVE-2021-3493",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-05-03T05:58:06Z",
|
||||
"updated_at": "2021-05-03T06:06:46Z",
|
||||
"pushed_at": "2021-05-03T06:06:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -283,6 +283,7 @@ The overlayfs implementation in the linux kernel did not properly validate with
|
|||
- [briskets/CVE-2021-3493](https://github.com/briskets/CVE-2021-3493)
|
||||
- [oneoy/CVE-2021-3493](https://github.com/oneoy/CVE-2021-3493)
|
||||
- [Abdennour-py/CVE-2021-3493](https://github.com/Abdennour-py/CVE-2021-3493)
|
||||
- [AmIAHuman/OverlayFS-CVE-2021-3493](https://github.com/AmIAHuman/OverlayFS-CVE-2021-3493)
|
||||
|
||||
### CVE-2021-6857
|
||||
- [ZiHeny/CVE-2021-6857](https://github.com/ZiHeny/CVE-2021-6857)
|
||||
|
@ -808,6 +809,9 @@ Askey RTF8115VW BR_SV_g11.11_RTF_TEF001_V6.54_V014 devices allow injection of a
|
|||
### CVE-2021-27552
|
||||
- [sapkota2k20/CVE-2021-27552](https://github.com/sapkota2k20/CVE-2021-27552)
|
||||
|
||||
### CVE-2021-27553
|
||||
- [sapkota2k20/CVE-2021-27553](https://github.com/sapkota2k20/CVE-2021-27553)
|
||||
|
||||
### CVE-2021-27890 (2021-03-15)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue