mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-26 09:34:11 +01:00
Auto Update 2021/09/08 00:13:16
This commit is contained in:
parent
7d01006a3d
commit
43cf6c84e6
29 changed files with 399 additions and 94 deletions
25
2010/CVE-2010-26084.json
Normal file
25
2010/CVE-2010-26084.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 403962659,
|
||||
"name": "cve-2021-26084-confluence",
|
||||
"full_name": "GlennPegden2\/cve-2021-26084-confluence",
|
||||
"owner": {
|
||||
"login": "GlennPegden2",
|
||||
"id": 34956796,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34956796?v=4",
|
||||
"html_url": "https:\/\/github.com\/GlennPegden2"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/GlennPegden2\/cve-2021-26084-confluence",
|
||||
"description": "A quick and dirty PoC of cve-2010-26084 as none of the existing ones worked for me.",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-07T12:04:09Z",
|
||||
"updated_at": "2021-09-07T13:47:39Z",
|
||||
"pushed_at": "2021-09-07T12:39:53Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1240,5 +1240,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 396322717,
|
||||
"name": "bleeding-heart",
|
||||
"full_name": "pierceoneill\/bleeding-heart",
|
||||
"owner": {
|
||||
"login": "pierceoneill",
|
||||
"id": 37594104,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37594104?v=4",
|
||||
"html_url": "https:\/\/github.com\/pierceoneill"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pierceoneill\/bleeding-heart",
|
||||
"description": "The Heartbleed bug `CVE-2014-0160` is a severe implementation flaw in the OpenSSL library, which enables attackers to steal data from the memory of the victim server. The contents of the stolen data depend on what is there in the memory of the server. It could potentially contain private keys, TLS session keys, usernames, passwords, credit cards, etc. The vulnerability is in the implementation of the Heartbeat protocol, which is used by SSL\/TLS to keep the connection alive.",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-15T11:05:23Z",
|
||||
"updated_at": "2021-08-15T11:13:05Z",
|
||||
"pushed_at": "2021-08-15T11:13:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -44,5 +44,28 @@
|
|||
"forks": 12,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 403984253,
|
||||
"name": "CVE-2016-0792",
|
||||
"full_name": "Aviksaikat\/CVE-2016-0792",
|
||||
"owner": {
|
||||
"login": "Aviksaikat",
|
||||
"id": 31238298,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31238298?v=4",
|
||||
"html_url": "https:\/\/github.com\/Aviksaikat"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Aviksaikat\/CVE-2016-0792",
|
||||
"description": "Modified Verion of CVE-2016-0792",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-07T13:14:16Z",
|
||||
"updated_at": "2021-09-07T13:57:10Z",
|
||||
"pushed_at": "2021-09-07T13:57:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -197,13 +197,13 @@
|
|||
"description": "Remote code execution vulnerability in Ruby-on-Rails when using render on user-supplied data.",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-31T15:25:41Z",
|
||||
"updated_at": "2021-09-02T16:20:08Z",
|
||||
"updated_at": "2021-09-07T13:17:25Z",
|
||||
"pushed_at": "2021-08-31T16:06:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Public repository for improvements to the EXTRABACON exploit",
|
||||
"fork": false,
|
||||
"created_at": "2016-09-20T23:19:02Z",
|
||||
"updated_at": "2020-12-10T02:09:41Z",
|
||||
"updated_at": "2021-09-07T10:07:47Z",
|
||||
"pushed_at": "2016-11-02T03:11:27Z",
|
||||
"stargazers_count": 152,
|
||||
"watchers_count": 152,
|
||||
"stargazers_count": 151,
|
||||
"watchers_count": 151,
|
||||
"forks_count": 78,
|
||||
"forks": 78,
|
||||
"watchers": 152,
|
||||
"watchers": 151,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1213,8 +1213,8 @@
|
|||
"pushed_at": "2021-04-29T19:36:35Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 152,
|
||||
"forks": 152,
|
||||
"forks_count": 153,
|
||||
"forks": 153,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-09-19T15:27:48Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -128,13 +128,13 @@
|
|||
"description": "A vulnerability can allow an attacker to guess the automatically generated development mode secret token.",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-06T12:28:05Z",
|
||||
"updated_at": "2021-09-06T12:29:02Z",
|
||||
"pushed_at": "2021-09-06T12:28:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"updated_at": "2021-09-07T13:11:05Z",
|
||||
"pushed_at": "2021-09-07T13:11:02Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-09T22:30:42Z",
|
||||
"updated_at": "2021-09-02T11:28:46Z",
|
||||
"updated_at": "2021-09-07T10:07:05Z",
|
||||
"pushed_at": "2021-09-01T08:56:40Z",
|
||||
"stargazers_count": 634,
|
||||
"watchers_count": 634,
|
||||
"stargazers_count": 633,
|
||||
"watchers_count": 633,
|
||||
"forks_count": 136,
|
||||
"forks": 136,
|
||||
"watchers": 634,
|
||||
"watchers": 633,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of concept exploit for CVE-2019-8561 discovered by @jbradley89 ",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-07T23:48:55Z",
|
||||
"updated_at": "2021-04-30T18:31:54Z",
|
||||
"updated_at": "2021-09-07T11:54:33Z",
|
||||
"pushed_at": "2021-04-30T13:45:50Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-09-06T07:35:42Z",
|
||||
"updated_at": "2021-09-07T13:31:34Z",
|
||||
"pushed_at": "2021-07-30T03:28:00Z",
|
||||
"stargazers_count": 844,
|
||||
"watchers_count": 844,
|
||||
"stargazers_count": 845,
|
||||
"watchers_count": 845,
|
||||
"forks_count": 268,
|
||||
"forks": 268,
|
||||
"watchers": 844,
|
||||
"watchers": 845,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-01-06T13:41:04Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-02-07T09:42:36Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 76,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -619,5 +619,28 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 396080591,
|
||||
"name": "ghostcat",
|
||||
"full_name": "jptr218\/ghostcat",
|
||||
"owner": {
|
||||
"login": "jptr218",
|
||||
"id": 84092766,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84092766?v=4",
|
||||
"html_url": "https:\/\/github.com\/jptr218"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jptr218\/ghostcat",
|
||||
"description": "An implementation of CVE-2020-1938",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-14T17:32:51Z",
|
||||
"updated_at": "2021-08-14T18:21:04Z",
|
||||
"pushed_at": "2021-08-14T18:21:02Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "wpDiscuz 7.0.4 Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-13T23:10:19Z",
|
||||
"updated_at": "2021-09-07T01:26:41Z",
|
||||
"updated_at": "2021-09-07T11:32:33Z",
|
||||
"pushed_at": "2021-06-15T17:30:23Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2021/CVE-2021-00001.json
Normal file
25
2021/CVE-2021-00001.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 396639027,
|
||||
"name": "cve-2021-00001",
|
||||
"full_name": "FirDragon\/cve-2021-00001",
|
||||
"owner": {
|
||||
"login": "FirDragon",
|
||||
"id": 45531183,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45531183?v=4",
|
||||
"html_url": "https:\/\/github.com\/FirDragon"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/FirDragon\/cve-2021-00001",
|
||||
"description": "cve-2021-00001",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-16T05:45:41Z",
|
||||
"updated_at": "2021-08-16T05:46:29Z",
|
||||
"pushed_at": "2021-08-16T05:46:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2021-09-07T09:13:24Z",
|
||||
"updated_at": "2021-09-07T13:12:45Z",
|
||||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1355,
|
||||
"watchers_count": 1355,
|
||||
"stargazers_count": 1356,
|
||||
"watchers_count": 1356,
|
||||
"forks_count": 492,
|
||||
"forks": 492,
|
||||
"watchers": 1355,
|
||||
"watchers": 1356,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -220,13 +220,13 @@
|
|||
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T23:45:58Z",
|
||||
"updated_at": "2021-09-07T09:13:14Z",
|
||||
"updated_at": "2021-09-07T13:13:10Z",
|
||||
"pushed_at": "2021-07-05T08:54:06Z",
|
||||
"stargazers_count": 592,
|
||||
"watchers_count": 592,
|
||||
"stargazers_count": 593,
|
||||
"watchers_count": 593,
|
||||
"forks_count": 159,
|
||||
"forks": 159,
|
||||
"watchers": 592,
|
||||
"watchers": 593,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -707,8 +707,8 @@
|
|||
"pushed_at": "2021-09-01T11:25:22Z",
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 81,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -67,5 +67,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 404010458,
|
||||
"name": "CVE-2021-21315",
|
||||
"full_name": "alikarimi999\/CVE-2021-21315",
|
||||
"owner": {
|
||||
"login": "alikarimi999",
|
||||
"id": 90207127,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90207127?v=4",
|
||||
"html_url": "https:\/\/github.com\/alikarimi999"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alikarimi999\/CVE-2021-21315",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-09-07T14:31:20Z",
|
||||
"updated_at": "2021-09-07T14:38:04Z",
|
||||
"pushed_at": "2021-09-07T14:38:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-15T14:41:25Z",
|
||||
"updated_at": "2021-07-02T18:14:28Z",
|
||||
"updated_at": "2021-09-07T13:21:03Z",
|
||||
"pushed_at": "2021-02-15T15:11:00Z",
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 58,
|
||||
"watchers": 59,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-09-06T07:35:42Z",
|
||||
"updated_at": "2021-09-07T13:31:34Z",
|
||||
"pushed_at": "2021-07-30T03:28:00Z",
|
||||
"stargazers_count": 844,
|
||||
"watchers_count": 844,
|
||||
"stargazers_count": 845,
|
||||
"watchers_count": 845,
|
||||
"forks_count": 268,
|
||||
"forks": 268,
|
||||
"watchers": 844,
|
||||
"watchers": 845,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-08-31T23:33:44Z",
|
||||
"updated_at": "2021-09-07T06:02:18Z",
|
||||
"updated_at": "2021-09-07T10:12:22Z",
|
||||
"pushed_at": "2021-09-01T01:01:06Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 37,
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-09-01T00:50:30Z",
|
||||
"updated_at": "2021-09-07T03:28:21Z",
|
||||
"updated_at": "2021-09-07T09:30:53Z",
|
||||
"pushed_at": "2021-09-01T01:17:58Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 48,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "Confluence Server Webwork OGNL injection",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-01T07:15:17Z",
|
||||
"updated_at": "2021-09-07T09:08:05Z",
|
||||
"updated_at": "2021-09-07T14:42:08Z",
|
||||
"pushed_at": "2021-09-04T22:14:46Z",
|
||||
"stargazers_count": 197,
|
||||
"watchers_count": 197,
|
||||
"stargazers_count": 199,
|
||||
"watchers_count": 199,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"watchers": 197,
|
||||
"watchers": 199,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -151,8 +151,8 @@
|
|||
"description": "Atlassian Confluence Pre-Auth RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-01T08:18:44Z",
|
||||
"updated_at": "2021-09-07T08:05:21Z",
|
||||
"pushed_at": "2021-09-03T11:31:01Z",
|
||||
"updated_at": "2021-09-07T10:25:50Z",
|
||||
"pushed_at": "2021-09-07T10:25:48Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 3,
|
||||
|
@ -247,8 +247,8 @@
|
|||
"pushed_at": "2021-09-01T12:51:02Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -408,8 +408,8 @@
|
|||
"pushed_at": "2021-09-03T07:37:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -565,13 +565,36 @@
|
|||
"description": "Atlassian Confluence CVE-2021-26084 one-liner mass checker",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-07T01:15:16Z",
|
||||
"updated_at": "2021-09-07T09:04:45Z",
|
||||
"pushed_at": "2021-09-07T01:16:15Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"updated_at": "2021-09-07T14:38:06Z",
|
||||
"pushed_at": "2021-09-07T12:59:45Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 403962659,
|
||||
"name": "cve-2021-26084-confluence",
|
||||
"full_name": "GlennPegden2\/cve-2021-26084-confluence",
|
||||
"owner": {
|
||||
"login": "GlennPegden2",
|
||||
"id": 34956796,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34956796?v=4",
|
||||
"html_url": "https:\/\/github.com\/GlennPegden2"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/GlennPegden2\/cve-2021-26084-confluence",
|
||||
"description": "A quick and dirty PoC of cve-2010-26084 as none of the existing ones worked for me.",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-07T12:04:09Z",
|
||||
"updated_at": "2021-09-07T15:09:43Z",
|
||||
"pushed_at": "2021-09-07T15:09:40Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -44,5 +44,28 @@
|
|||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 396324186,
|
||||
"name": "CVE-2021-28476-tools-env",
|
||||
"full_name": "sh4m2hwz\/CVE-2021-28476-tools-env",
|
||||
"owner": {
|
||||
"login": "sh4m2hwz",
|
||||
"id": 77354315,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77354315?v=4",
|
||||
"html_url": "https:\/\/github.com\/sh4m2hwz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sh4m2hwz\/CVE-2021-28476-tools-env",
|
||||
"description": "tools for automate configure Ubuntu 20.04 enviroment for testing CVE-2021-28476.",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-15T11:10:40Z",
|
||||
"updated_at": "2021-08-15T17:29:21Z",
|
||||
"pushed_at": "2021-08-15T11:44:02Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1149,6 +1149,29 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 396558758,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "Kleptocratic\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "Kleptocratic",
|
||||
"id": 72598486,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72598486?v=4",
|
||||
"html_url": "https:\/\/github.com\/Kleptocratic"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Kleptocratic\/CVE-2021-3156",
|
||||
"description": "Sudo heap-based buffer overflow privilege escalation commands and mitigations.",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-16T01:10:34Z",
|
||||
"updated_at": "2021-08-16T01:29:50Z",
|
||||
"pushed_at": "2021-08-16T01:26:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 403515290,
|
||||
"name": "CVE-2021-3156",
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "CVE-2021-33909 Sequoia",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-02T04:51:54Z",
|
||||
"updated_at": "2021-09-07T06:22:43Z",
|
||||
"updated_at": "2021-09-07T14:45:10Z",
|
||||
"pushed_at": "2021-09-02T04:52:19Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -67,5 +67,28 @@
|
|||
"forks": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 403092854,
|
||||
"name": "proxyshell",
|
||||
"full_name": "horizon3ai\/proxyshell",
|
||||
"owner": {
|
||||
"login": "horizon3ai",
|
||||
"id": 79593994,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4",
|
||||
"html_url": "https:\/\/github.com\/horizon3ai"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/horizon3ai\/proxyshell",
|
||||
"description": "Proof of Concept for CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-04T15:34:03Z",
|
||||
"updated_at": "2021-09-07T15:18:48Z",
|
||||
"pushed_at": "2021-09-07T15:18:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -220,13 +220,13 @@
|
|||
"description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-05T20:13:49Z",
|
||||
"updated_at": "2021-09-06T15:34:43Z",
|
||||
"updated_at": "2021-09-07T10:30:11Z",
|
||||
"pushed_at": "2021-08-20T01:54:22Z",
|
||||
"stargazers_count": 633,
|
||||
"watchers_count": 633,
|
||||
"stargazers_count": 634,
|
||||
"watchers_count": 634,
|
||||
"forks_count": 84,
|
||||
"forks": 84,
|
||||
"watchers": 633,
|
||||
"watchers": 634,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2021/CVE-2021-36949.json
Normal file
25
2021/CVE-2021-36949.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 396130351,
|
||||
"name": "Check-AAD-Connect-for-CVE-2021-36949-vulnerability",
|
||||
"full_name": "Maxwitat\/Check-AAD-Connect-for-CVE-2021-36949-vulnerability",
|
||||
"owner": {
|
||||
"login": "Maxwitat",
|
||||
"id": 18595261,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18595261?v=4",
|
||||
"html_url": "https:\/\/github.com\/Maxwitat"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Maxwitat\/Check-AAD-Connect-for-CVE-2021-36949-vulnerability",
|
||||
"description": "check if Azure AD Connect is affected by the vulnerability described in CVE-2021-36949",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-14T21:05:30Z",
|
||||
"updated_at": "2021-08-16T01:31:50Z",
|
||||
"pushed_at": "2021-08-15T18:39:55Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -44,5 +44,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 396128386,
|
||||
"name": "CVE-2021-38699",
|
||||
"full_name": "Justin-1993\/CVE-2021-38699",
|
||||
"owner": {
|
||||
"login": "Justin-1993",
|
||||
"id": 76507754,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76507754?v=4",
|
||||
"html_url": "https:\/\/github.com\/Justin-1993"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Justin-1993\/CVE-2021-38699",
|
||||
"description": "TastyIgniter 3.0.7 allows XSS via the name field during user-account creation",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-14T20:57:00Z",
|
||||
"updated_at": "2021-08-16T00:03:32Z",
|
||||
"pushed_at": "2021-08-15T23:05:47Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
23
README.md
23
README.md
|
@ -1,6 +1,9 @@
|
|||
# PoC in GitHub
|
||||
|
||||
## 2021
|
||||
### CVE-2021-00001
|
||||
- [FirDragon/cve-2021-00001](https://github.com/FirDragon/cve-2021-00001)
|
||||
|
||||
### CVE-2021-1056 (2021-01-07)
|
||||
|
||||
<code>
|
||||
|
@ -288,6 +291,7 @@ Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based
|
|||
- [donghyunlee00/CVE-2021-3156](https://github.com/donghyunlee00/CVE-2021-3156)
|
||||
- [CyberCommands/CVE-2021-3156](https://github.com/CyberCommands/CVE-2021-3156)
|
||||
- [0x7183/CVE-2021-3156](https://github.com/0x7183/CVE-2021-3156)
|
||||
- [Kleptocratic/CVE-2021-3156](https://github.com/Kleptocratic/CVE-2021-3156)
|
||||
- [Y3A/CVE-2021-3156](https://github.com/Y3A/CVE-2021-3156)
|
||||
|
||||
### CVE-2021-3164 (2021-01-21)
|
||||
|
@ -573,6 +577,7 @@ The System Information Library for Node.JS (npm package "systeminformation&
|
|||
- [ForbiddenProgrammer/CVE-2021-21315-PoC](https://github.com/ForbiddenProgrammer/CVE-2021-21315-PoC)
|
||||
- [cherrera0001/CVE-2021-21315v2](https://github.com/cherrera0001/CVE-2021-21315v2)
|
||||
- [MazX0p/CVE-2021-21315-exploit](https://github.com/MazX0p/CVE-2021-21315-exploit)
|
||||
- [alikarimi999/CVE-2021-21315](https://github.com/alikarimi999/CVE-2021-21315)
|
||||
|
||||
### CVE-2021-21341 (2021-03-22)
|
||||
|
||||
|
@ -1010,6 +1015,7 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
|
|||
- [rootsmadi/CVE-2021-26084](https://github.com/rootsmadi/CVE-2021-26084)
|
||||
- [p1gz/CVE-2021-26084-Confluence-OGNL](https://github.com/p1gz/CVE-2021-26084-Confluence-OGNL)
|
||||
- [1ZRR4H/CVE-2021-26084](https://github.com/1ZRR4H/CVE-2021-26084)
|
||||
- [GlennPegden2/cve-2021-26084-confluence](https://github.com/GlennPegden2/cve-2021-26084-confluence)
|
||||
|
||||
### CVE-2021-26119 (2021-02-21)
|
||||
|
||||
|
@ -1401,6 +1407,7 @@ Hyper-V Remote Code Execution Vulnerability
|
|||
|
||||
- [0vercl0k/CVE-2021-28476](https://github.com/0vercl0k/CVE-2021-28476)
|
||||
- [bluefrostsecurity/CVE-2021-28476](https://github.com/bluefrostsecurity/CVE-2021-28476)
|
||||
- [sh4m2hwz/CVE-2021-28476-tools-env](https://github.com/sh4m2hwz/CVE-2021-28476-tools-env)
|
||||
|
||||
### CVE-2021-28480 (2021-04-13)
|
||||
|
||||
|
@ -1842,6 +1849,7 @@ Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is uni
|
|||
- [cyberheartmi9/Proxyshell-Scanner](https://github.com/cyberheartmi9/Proxyshell-Scanner)
|
||||
- [RaouzRouik/CVE-2021-34473-scanner](https://github.com/RaouzRouik/CVE-2021-34473-scanner)
|
||||
- [phamphuqui1998/CVE-2021-34473](https://github.com/phamphuqui1998/CVE-2021-34473)
|
||||
- [horizon3ai/proxyshell](https://github.com/horizon3ai/proxyshell)
|
||||
|
||||
### CVE-2021-34481 (2021-07-16)
|
||||
|
||||
|
@ -2002,6 +2010,14 @@ Windows Elevation of Privilege Vulnerability
|
|||
- [OlivierLaflamme/CVE-2021-36934_export_shadow_volume](https://github.com/OlivierLaflamme/CVE-2021-36934_export_shadow_volume)
|
||||
- [chron1k/oxide_hive](https://github.com/chron1k/oxide_hive)
|
||||
|
||||
### CVE-2021-36949 (2021-08-12)
|
||||
|
||||
<code>
|
||||
Microsoft Azure Active Directory Connect Authentication Bypass Vulnerability
|
||||
</code>
|
||||
|
||||
- [Maxwitat/Check-AAD-Connect-for-CVE-2021-36949-vulnerability](https://github.com/Maxwitat/Check-AAD-Connect-for-CVE-2021-36949-vulnerability)
|
||||
|
||||
### CVE-2021-37152 (2021-08-10)
|
||||
|
||||
<code>
|
||||
|
@ -2091,6 +2107,7 @@ TastyIgniter 3.0.7 allows XSS via /account, /reservation, /admin/dashboard, and
|
|||
|
||||
- [HuskyHacks/CVE-2021-38699-Reflected-XSS](https://github.com/HuskyHacks/CVE-2021-38699-Reflected-XSS)
|
||||
- [HuskyHacks/CVE-2021-38699-Stored-XSS](https://github.com/HuskyHacks/CVE-2021-38699-Stored-XSS)
|
||||
- [Justin-1993/CVE-2021-38699](https://github.com/Justin-1993/CVE-2021-38699)
|
||||
|
||||
### CVE-2021-38704
|
||||
- [sudonoodle/CVE-2021-38704](https://github.com/sudonoodle/CVE-2021-38704)
|
||||
|
@ -2884,6 +2901,7 @@ When using the Apache JServ Protocol (AJP), care must be taken when trusting inc
|
|||
- [Hancheng-Lei/Hacking-Vulnerability-CVE-2020-1938-Ghostcat](https://github.com/Hancheng-Lei/Hacking-Vulnerability-CVE-2020-1938-Ghostcat)
|
||||
- [streghstreek/CVE-2020-1938](https://github.com/streghstreek/CVE-2020-1938)
|
||||
- [Neko2sh1ro/CVE-2020-1938](https://github.com/Neko2sh1ro/CVE-2020-1938)
|
||||
- [jptr218/ghostcat](https://github.com/jptr218/ghostcat)
|
||||
|
||||
### CVE-2020-1947 (2020-03-11)
|
||||
|
||||
|
@ -16210,6 +16228,7 @@ Multiple unspecified API endpoints in Jenkins before 1.650 and LTS before 1.642.
|
|||
|
||||
- [jpiechowka/jenkins-cve-2016-0792](https://github.com/jpiechowka/jenkins-cve-2016-0792)
|
||||
- [s0wr0b1ndef/java-deserialization-exploits](https://github.com/s0wr0b1ndef/java-deserialization-exploits)
|
||||
- [Aviksaikat/CVE-2016-0792](https://github.com/Aviksaikat/CVE-2016-0792)
|
||||
|
||||
### CVE-2016-0793 (2016-04-01)
|
||||
|
||||
|
@ -18258,6 +18277,7 @@ The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not p
|
|||
- [nyc-tophile/A2SV--SSL-VUL-Scan](https://github.com/nyc-tophile/A2SV--SSL-VUL-Scan)
|
||||
- [ingochris/heartpatch.us](https://github.com/ingochris/heartpatch.us)
|
||||
- [BelminD/heartbleed](https://github.com/BelminD/heartbleed)
|
||||
- [pierceoneill/bleeding-heart](https://github.com/pierceoneill/bleeding-heart)
|
||||
|
||||
### CVE-2014-0166 (2014-04-09)
|
||||
|
||||
|
@ -19943,6 +19963,9 @@ Multiple untrusted search path vulnerabilities in MicroStation 7.1 allow local u
|
|||
|
||||
- [otofoto/CVE-2010-5230](https://github.com/otofoto/CVE-2010-5230)
|
||||
|
||||
### CVE-2010-26084
|
||||
- [GlennPegden2/cve-2021-26084-confluence](https://github.com/GlennPegden2/cve-2021-26084-confluence)
|
||||
|
||||
|
||||
## 2009
|
||||
### CVE-2009-0182 (2009-01-20)
|
||||
|
|
Loading…
Add table
Reference in a new issue