Auto Update 2021/09/08 00:13:16

This commit is contained in:
motikan2010-bot 2021-09-08 00:13:16 +09:00
parent 7d01006a3d
commit 43cf6c84e6
29 changed files with 399 additions and 94 deletions

25
2010/CVE-2010-26084.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 403962659,
"name": "cve-2021-26084-confluence",
"full_name": "GlennPegden2\/cve-2021-26084-confluence",
"owner": {
"login": "GlennPegden2",
"id": 34956796,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34956796?v=4",
"html_url": "https:\/\/github.com\/GlennPegden2"
},
"html_url": "https:\/\/github.com\/GlennPegden2\/cve-2021-26084-confluence",
"description": "A quick and dirty PoC of cve-2010-26084 as none of the existing ones worked for me.",
"fork": false,
"created_at": "2021-09-07T12:04:09Z",
"updated_at": "2021-09-07T13:47:39Z",
"pushed_at": "2021-09-07T12:39:53Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -1240,5 +1240,28 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 396322717,
"name": "bleeding-heart",
"full_name": "pierceoneill\/bleeding-heart",
"owner": {
"login": "pierceoneill",
"id": 37594104,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37594104?v=4",
"html_url": "https:\/\/github.com\/pierceoneill"
},
"html_url": "https:\/\/github.com\/pierceoneill\/bleeding-heart",
"description": "The Heartbleed bug `CVE-2014-0160` is a severe implementation flaw in the OpenSSL library, which enables attackers to steal data from the memory of the victim server. The contents of the stolen data depend on what is there in the memory of the server. It could potentially contain private keys, TLS session keys, usernames, passwords, credit cards, etc. The vulnerability is in the implementation of the Heartbeat protocol, which is used by SSL\/TLS to keep the connection alive.",
"fork": false,
"created_at": "2021-08-15T11:05:23Z",
"updated_at": "2021-08-15T11:13:05Z",
"pushed_at": "2021-08-15T11:13:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -44,5 +44,28 @@
"forks": 12,
"watchers": 8,
"score": 0
},
{
"id": 403984253,
"name": "CVE-2016-0792",
"full_name": "Aviksaikat\/CVE-2016-0792",
"owner": {
"login": "Aviksaikat",
"id": 31238298,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31238298?v=4",
"html_url": "https:\/\/github.com\/Aviksaikat"
},
"html_url": "https:\/\/github.com\/Aviksaikat\/CVE-2016-0792",
"description": "Modified Verion of CVE-2016-0792",
"fork": false,
"created_at": "2021-09-07T13:14:16Z",
"updated_at": "2021-09-07T13:57:10Z",
"pushed_at": "2021-09-07T13:57:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -197,13 +197,13 @@
"description": "Remote code execution vulnerability in Ruby-on-Rails when using render on user-supplied data.",
"fork": false,
"created_at": "2021-08-31T15:25:41Z",
"updated_at": "2021-09-02T16:20:08Z",
"updated_at": "2021-09-07T13:17:25Z",
"pushed_at": "2021-08-31T16:06:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Public repository for improvements to the EXTRABACON exploit",
"fork": false,
"created_at": "2016-09-20T23:19:02Z",
"updated_at": "2020-12-10T02:09:41Z",
"updated_at": "2021-09-07T10:07:47Z",
"pushed_at": "2016-11-02T03:11:27Z",
"stargazers_count": 152,
"watchers_count": 152,
"stargazers_count": 151,
"watchers_count": 151,
"forks_count": 78,
"forks": 78,
"watchers": 152,
"watchers": 151,
"score": 0
}
]

View file

@ -1213,8 +1213,8 @@
"pushed_at": "2021-04-29T19:36:35Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 152,
"forks": 152,
"forks_count": 153,
"forks": 153,
"watchers": 8,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-09-19T15:27:48Z",
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 10,
"forks": 10,
"forks_count": 9,
"forks": 9,
"watchers": 20,
"score": 0
},

View file

@ -128,13 +128,13 @@
"description": "A vulnerability can allow an attacker to guess the automatically generated development mode secret token.",
"fork": false,
"created_at": "2021-09-06T12:28:05Z",
"updated_at": "2021-09-06T12:29:02Z",
"pushed_at": "2021-09-06T12:28:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2021-09-07T13:11:05Z",
"pushed_at": "2021-09-07T13:11:02Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
"fork": false,
"created_at": "2019-01-09T22:30:42Z",
"updated_at": "2021-09-02T11:28:46Z",
"updated_at": "2021-09-07T10:07:05Z",
"pushed_at": "2021-09-01T08:56:40Z",
"stargazers_count": 634,
"watchers_count": 634,
"stargazers_count": 633,
"watchers_count": 633,
"forks_count": 136,
"forks": 136,
"watchers": 634,
"watchers": 633,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Proof of concept exploit for CVE-2019-8561 discovered by @jbradley89 ",
"fork": false,
"created_at": "2019-06-07T23:48:55Z",
"updated_at": "2021-04-30T18:31:54Z",
"updated_at": "2021-09-07T11:54:33Z",
"pushed_at": "2021-04-30T13:45:50Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-09-06T07:35:42Z",
"updated_at": "2021-09-07T13:31:34Z",
"pushed_at": "2021-07-30T03:28:00Z",
"stargazers_count": 844,
"watchers_count": 844,
"stargazers_count": 845,
"watchers_count": 845,
"forks_count": 268,
"forks": 268,
"watchers": 844,
"watchers": 845,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-01-06T13:41:04Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 6,
"forks": 6,
"forks_count": 5,
"forks": 5,
"watchers": 8,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2021-02-07T09:42:36Z",
"stargazers_count": 76,
"watchers_count": 76,
"forks_count": 10,
"forks": 10,
"forks_count": 11,
"forks": 11,
"watchers": 76,
"score": 0
}

View file

@ -619,5 +619,28 @@
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 396080591,
"name": "ghostcat",
"full_name": "jptr218\/ghostcat",
"owner": {
"login": "jptr218",
"id": 84092766,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84092766?v=4",
"html_url": "https:\/\/github.com\/jptr218"
},
"html_url": "https:\/\/github.com\/jptr218\/ghostcat",
"description": "An implementation of CVE-2020-1938",
"fork": false,
"created_at": "2021-08-14T17:32:51Z",
"updated_at": "2021-08-14T18:21:04Z",
"pushed_at": "2021-08-14T18:21:02Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "wpDiscuz 7.0.4 Remote Code Execution",
"fork": false,
"created_at": "2021-06-13T23:10:19Z",
"updated_at": "2021-09-07T01:26:41Z",
"updated_at": "2021-09-07T11:32:33Z",
"pushed_at": "2021-06-15T17:30:23Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0
},
{

25
2021/CVE-2021-00001.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 396639027,
"name": "cve-2021-00001",
"full_name": "FirDragon\/cve-2021-00001",
"owner": {
"login": "FirDragon",
"id": 45531183,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45531183?v=4",
"html_url": "https:\/\/github.com\/FirDragon"
},
"html_url": "https:\/\/github.com\/FirDragon\/cve-2021-00001",
"description": "cve-2021-00001",
"fork": false,
"created_at": "2021-08-16T05:45:41Z",
"updated_at": "2021-08-16T05:46:29Z",
"pushed_at": "2021-08-16T05:46:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2021-09-07T09:13:24Z",
"updated_at": "2021-09-07T13:12:45Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1355,
"watchers_count": 1355,
"stargazers_count": 1356,
"watchers_count": 1356,
"forks_count": 492,
"forks": 492,
"watchers": 1355,
"watchers": 1356,
"score": 0
},
{
@ -220,13 +220,13 @@
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
"fork": false,
"created_at": "2021-07-01T23:45:58Z",
"updated_at": "2021-09-07T09:13:14Z",
"updated_at": "2021-09-07T13:13:10Z",
"pushed_at": "2021-07-05T08:54:06Z",
"stargazers_count": 592,
"watchers_count": 592,
"stargazers_count": 593,
"watchers_count": 593,
"forks_count": 159,
"forks": 159,
"watchers": 592,
"watchers": 593,
"score": 0
},
{
@ -707,8 +707,8 @@
"pushed_at": "2021-09-01T11:25:22Z",
"stargazers_count": 81,
"watchers_count": 81,
"forks_count": 9,
"forks": 9,
"forks_count": 10,
"forks": 10,
"watchers": 81,
"score": 0
}

View file

@ -67,5 +67,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 404010458,
"name": "CVE-2021-21315",
"full_name": "alikarimi999\/CVE-2021-21315",
"owner": {
"login": "alikarimi999",
"id": 90207127,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90207127?v=4",
"html_url": "https:\/\/github.com\/alikarimi999"
},
"html_url": "https:\/\/github.com\/alikarimi999\/CVE-2021-21315",
"description": null,
"fork": false,
"created_at": "2021-09-07T14:31:20Z",
"updated_at": "2021-09-07T14:38:04Z",
"pushed_at": "2021-09-07T14:38:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2021-02-15T14:41:25Z",
"updated_at": "2021-07-02T18:14:28Z",
"updated_at": "2021-09-07T13:21:03Z",
"pushed_at": "2021-02-15T15:11:00Z",
"stargazers_count": 58,
"watchers_count": 58,
"stargazers_count": 59,
"watchers_count": 59,
"forks_count": 15,
"forks": 15,
"watchers": 58,
"watchers": 59,
"score": 0
}
]

View file

@ -105,13 +105,13 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-09-06T07:35:42Z",
"updated_at": "2021-09-07T13:31:34Z",
"pushed_at": "2021-07-30T03:28:00Z",
"stargazers_count": 844,
"watchers_count": 844,
"stargazers_count": 845,
"watchers_count": 845,
"forks_count": 268,
"forks": 268,
"watchers": 844,
"watchers": 845,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2021-08-31T23:33:44Z",
"updated_at": "2021-09-07T06:02:18Z",
"updated_at": "2021-09-07T10:12:22Z",
"pushed_at": "2021-09-01T01:01:06Z",
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 10,
"forks": 10,
"watchers": 37,
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 11,
"forks": 11,
"watchers": 38,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": null,
"fork": false,
"created_at": "2021-09-01T00:50:30Z",
"updated_at": "2021-09-07T03:28:21Z",
"updated_at": "2021-09-07T09:30:53Z",
"pushed_at": "2021-09-01T01:17:58Z",
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 21,
"forks": 21,
"watchers": 48,
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 23,
"forks": 23,
"watchers": 49,
"score": 0
},
{
@ -105,13 +105,13 @@
"description": "Confluence Server Webwork OGNL injection",
"fork": false,
"created_at": "2021-09-01T07:15:17Z",
"updated_at": "2021-09-07T09:08:05Z",
"updated_at": "2021-09-07T14:42:08Z",
"pushed_at": "2021-09-04T22:14:46Z",
"stargazers_count": 197,
"watchers_count": 197,
"stargazers_count": 199,
"watchers_count": 199,
"forks_count": 42,
"forks": 42,
"watchers": 197,
"watchers": 199,
"score": 0
},
{
@ -151,8 +151,8 @@
"description": "Atlassian Confluence Pre-Auth RCE",
"fork": false,
"created_at": "2021-09-01T08:18:44Z",
"updated_at": "2021-09-07T08:05:21Z",
"pushed_at": "2021-09-03T11:31:01Z",
"updated_at": "2021-09-07T10:25:50Z",
"pushed_at": "2021-09-07T10:25:48Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 3,
@ -247,8 +247,8 @@
"pushed_at": "2021-09-01T12:51:02Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 5,
"forks": 5,
"forks_count": 6,
"forks": 6,
"watchers": 19,
"score": 0
},
@ -408,8 +408,8 @@
"pushed_at": "2021-09-03T07:37:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
@ -565,13 +565,36 @@
"description": "Atlassian Confluence CVE-2021-26084 one-liner mass checker",
"fork": false,
"created_at": "2021-09-07T01:15:16Z",
"updated_at": "2021-09-07T09:04:45Z",
"pushed_at": "2021-09-07T01:16:15Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 1,
"forks": 1,
"watchers": 8,
"updated_at": "2021-09-07T14:38:06Z",
"pushed_at": "2021-09-07T12:59:45Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 2,
"forks": 2,
"watchers": 15,
"score": 0
},
{
"id": 403962659,
"name": "cve-2021-26084-confluence",
"full_name": "GlennPegden2\/cve-2021-26084-confluence",
"owner": {
"login": "GlennPegden2",
"id": 34956796,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34956796?v=4",
"html_url": "https:\/\/github.com\/GlennPegden2"
},
"html_url": "https:\/\/github.com\/GlennPegden2\/cve-2021-26084-confluence",
"description": "A quick and dirty PoC of cve-2010-26084 as none of the existing ones worked for me.",
"fork": false,
"created_at": "2021-09-07T12:04:09Z",
"updated_at": "2021-09-07T15:09:43Z",
"pushed_at": "2021-09-07T15:09:40Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -44,5 +44,28 @@
"forks": 1,
"watchers": 8,
"score": 0
},
{
"id": 396324186,
"name": "CVE-2021-28476-tools-env",
"full_name": "sh4m2hwz\/CVE-2021-28476-tools-env",
"owner": {
"login": "sh4m2hwz",
"id": 77354315,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77354315?v=4",
"html_url": "https:\/\/github.com\/sh4m2hwz"
},
"html_url": "https:\/\/github.com\/sh4m2hwz\/CVE-2021-28476-tools-env",
"description": "tools for automate configure Ubuntu 20.04 enviroment for testing CVE-2021-28476.",
"fork": false,
"created_at": "2021-08-15T11:10:40Z",
"updated_at": "2021-08-15T17:29:21Z",
"pushed_at": "2021-08-15T11:44:02Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
}
]

View file

@ -1149,6 +1149,29 @@
"watchers": 0,
"score": 0
},
{
"id": 396558758,
"name": "CVE-2021-3156",
"full_name": "Kleptocratic\/CVE-2021-3156",
"owner": {
"login": "Kleptocratic",
"id": 72598486,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72598486?v=4",
"html_url": "https:\/\/github.com\/Kleptocratic"
},
"html_url": "https:\/\/github.com\/Kleptocratic\/CVE-2021-3156",
"description": "Sudo heap-based buffer overflow privilege escalation commands and mitigations.",
"fork": false,
"created_at": "2021-08-16T01:10:34Z",
"updated_at": "2021-08-16T01:29:50Z",
"pushed_at": "2021-08-16T01:26:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 403515290,
"name": "CVE-2021-3156",

View file

@ -105,13 +105,13 @@
"description": "CVE-2021-33909 Sequoia",
"fork": false,
"created_at": "2021-09-02T04:51:54Z",
"updated_at": "2021-09-07T06:22:43Z",
"updated_at": "2021-09-07T14:45:10Z",
"pushed_at": "2021-09-02T04:52:19Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"forks": 1,
"watchers": 4,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 2,
"forks": 2,
"watchers": 10,
"score": 0
}
]

View file

@ -67,5 +67,28 @@
"forks": 7,
"watchers": 8,
"score": 0
},
{
"id": 403092854,
"name": "proxyshell",
"full_name": "horizon3ai\/proxyshell",
"owner": {
"login": "horizon3ai",
"id": 79593994,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4",
"html_url": "https:\/\/github.com\/horizon3ai"
},
"html_url": "https:\/\/github.com\/horizon3ai\/proxyshell",
"description": "Proof of Concept for CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207",
"fork": false,
"created_at": "2021-09-04T15:34:03Z",
"updated_at": "2021-09-07T15:18:48Z",
"pushed_at": "2021-09-07T15:18:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -220,13 +220,13 @@
"description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE",
"fork": false,
"created_at": "2021-07-05T20:13:49Z",
"updated_at": "2021-09-06T15:34:43Z",
"updated_at": "2021-09-07T10:30:11Z",
"pushed_at": "2021-08-20T01:54:22Z",
"stargazers_count": 633,
"watchers_count": 633,
"stargazers_count": 634,
"watchers_count": 634,
"forks_count": 84,
"forks": 84,
"watchers": 633,
"watchers": 634,
"score": 0
},
{

25
2021/CVE-2021-36949.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 396130351,
"name": "Check-AAD-Connect-for-CVE-2021-36949-vulnerability",
"full_name": "Maxwitat\/Check-AAD-Connect-for-CVE-2021-36949-vulnerability",
"owner": {
"login": "Maxwitat",
"id": 18595261,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18595261?v=4",
"html_url": "https:\/\/github.com\/Maxwitat"
},
"html_url": "https:\/\/github.com\/Maxwitat\/Check-AAD-Connect-for-CVE-2021-36949-vulnerability",
"description": "check if Azure AD Connect is affected by the vulnerability described in CVE-2021-36949",
"fork": false,
"created_at": "2021-08-14T21:05:30Z",
"updated_at": "2021-08-16T01:31:50Z",
"pushed_at": "2021-08-15T18:39:55Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -44,5 +44,28 @@
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 396128386,
"name": "CVE-2021-38699",
"full_name": "Justin-1993\/CVE-2021-38699",
"owner": {
"login": "Justin-1993",
"id": 76507754,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76507754?v=4",
"html_url": "https:\/\/github.com\/Justin-1993"
},
"html_url": "https:\/\/github.com\/Justin-1993\/CVE-2021-38699",
"description": "TastyIgniter 3.0.7 allows XSS via the name field during user-account creation",
"fork": false,
"created_at": "2021-08-14T20:57:00Z",
"updated_at": "2021-08-16T00:03:32Z",
"pushed_at": "2021-08-15T23:05:47Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -1,6 +1,9 @@
# PoC in GitHub
## 2021
### CVE-2021-00001
- [FirDragon/cve-2021-00001](https://github.com/FirDragon/cve-2021-00001)
### CVE-2021-1056 (2021-01-07)
<code>
@ -288,6 +291,7 @@ Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based
- [donghyunlee00/CVE-2021-3156](https://github.com/donghyunlee00/CVE-2021-3156)
- [CyberCommands/CVE-2021-3156](https://github.com/CyberCommands/CVE-2021-3156)
- [0x7183/CVE-2021-3156](https://github.com/0x7183/CVE-2021-3156)
- [Kleptocratic/CVE-2021-3156](https://github.com/Kleptocratic/CVE-2021-3156)
- [Y3A/CVE-2021-3156](https://github.com/Y3A/CVE-2021-3156)
### CVE-2021-3164 (2021-01-21)
@ -573,6 +577,7 @@ The System Information Library for Node.JS (npm package &quot;systeminformation&
- [ForbiddenProgrammer/CVE-2021-21315-PoC](https://github.com/ForbiddenProgrammer/CVE-2021-21315-PoC)
- [cherrera0001/CVE-2021-21315v2](https://github.com/cherrera0001/CVE-2021-21315v2)
- [MazX0p/CVE-2021-21315-exploit](https://github.com/MazX0p/CVE-2021-21315-exploit)
- [alikarimi999/CVE-2021-21315](https://github.com/alikarimi999/CVE-2021-21315)
### CVE-2021-21341 (2021-03-22)
@ -1010,6 +1015,7 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
- [rootsmadi/CVE-2021-26084](https://github.com/rootsmadi/CVE-2021-26084)
- [p1gz/CVE-2021-26084-Confluence-OGNL](https://github.com/p1gz/CVE-2021-26084-Confluence-OGNL)
- [1ZRR4H/CVE-2021-26084](https://github.com/1ZRR4H/CVE-2021-26084)
- [GlennPegden2/cve-2021-26084-confluence](https://github.com/GlennPegden2/cve-2021-26084-confluence)
### CVE-2021-26119 (2021-02-21)
@ -1401,6 +1407,7 @@ Hyper-V Remote Code Execution Vulnerability
- [0vercl0k/CVE-2021-28476](https://github.com/0vercl0k/CVE-2021-28476)
- [bluefrostsecurity/CVE-2021-28476](https://github.com/bluefrostsecurity/CVE-2021-28476)
- [sh4m2hwz/CVE-2021-28476-tools-env](https://github.com/sh4m2hwz/CVE-2021-28476-tools-env)
### CVE-2021-28480 (2021-04-13)
@ -1842,6 +1849,7 @@ Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is uni
- [cyberheartmi9/Proxyshell-Scanner](https://github.com/cyberheartmi9/Proxyshell-Scanner)
- [RaouzRouik/CVE-2021-34473-scanner](https://github.com/RaouzRouik/CVE-2021-34473-scanner)
- [phamphuqui1998/CVE-2021-34473](https://github.com/phamphuqui1998/CVE-2021-34473)
- [horizon3ai/proxyshell](https://github.com/horizon3ai/proxyshell)
### CVE-2021-34481 (2021-07-16)
@ -2002,6 +2010,14 @@ Windows Elevation of Privilege Vulnerability
- [OlivierLaflamme/CVE-2021-36934_export_shadow_volume](https://github.com/OlivierLaflamme/CVE-2021-36934_export_shadow_volume)
- [chron1k/oxide_hive](https://github.com/chron1k/oxide_hive)
### CVE-2021-36949 (2021-08-12)
<code>
Microsoft Azure Active Directory Connect Authentication Bypass Vulnerability
</code>
- [Maxwitat/Check-AAD-Connect-for-CVE-2021-36949-vulnerability](https://github.com/Maxwitat/Check-AAD-Connect-for-CVE-2021-36949-vulnerability)
### CVE-2021-37152 (2021-08-10)
<code>
@ -2091,6 +2107,7 @@ TastyIgniter 3.0.7 allows XSS via /account, /reservation, /admin/dashboard, and
- [HuskyHacks/CVE-2021-38699-Reflected-XSS](https://github.com/HuskyHacks/CVE-2021-38699-Reflected-XSS)
- [HuskyHacks/CVE-2021-38699-Stored-XSS](https://github.com/HuskyHacks/CVE-2021-38699-Stored-XSS)
- [Justin-1993/CVE-2021-38699](https://github.com/Justin-1993/CVE-2021-38699)
### CVE-2021-38704
- [sudonoodle/CVE-2021-38704](https://github.com/sudonoodle/CVE-2021-38704)
@ -2884,6 +2901,7 @@ When using the Apache JServ Protocol (AJP), care must be taken when trusting inc
- [Hancheng-Lei/Hacking-Vulnerability-CVE-2020-1938-Ghostcat](https://github.com/Hancheng-Lei/Hacking-Vulnerability-CVE-2020-1938-Ghostcat)
- [streghstreek/CVE-2020-1938](https://github.com/streghstreek/CVE-2020-1938)
- [Neko2sh1ro/CVE-2020-1938](https://github.com/Neko2sh1ro/CVE-2020-1938)
- [jptr218/ghostcat](https://github.com/jptr218/ghostcat)
### CVE-2020-1947 (2020-03-11)
@ -16210,6 +16228,7 @@ Multiple unspecified API endpoints in Jenkins before 1.650 and LTS before 1.642.
- [jpiechowka/jenkins-cve-2016-0792](https://github.com/jpiechowka/jenkins-cve-2016-0792)
- [s0wr0b1ndef/java-deserialization-exploits](https://github.com/s0wr0b1ndef/java-deserialization-exploits)
- [Aviksaikat/CVE-2016-0792](https://github.com/Aviksaikat/CVE-2016-0792)
### CVE-2016-0793 (2016-04-01)
@ -18258,6 +18277,7 @@ The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not p
- [nyc-tophile/A2SV--SSL-VUL-Scan](https://github.com/nyc-tophile/A2SV--SSL-VUL-Scan)
- [ingochris/heartpatch.us](https://github.com/ingochris/heartpatch.us)
- [BelminD/heartbleed](https://github.com/BelminD/heartbleed)
- [pierceoneill/bleeding-heart](https://github.com/pierceoneill/bleeding-heart)
### CVE-2014-0166 (2014-04-09)
@ -19943,6 +19963,9 @@ Multiple untrusted search path vulnerabilities in MicroStation 7.1 allow local u
- [otofoto/CVE-2010-5230](https://github.com/otofoto/CVE-2010-5230)
### CVE-2010-26084
- [GlennPegden2/cve-2021-26084-confluence](https://github.com/GlennPegden2/cve-2021-26084-confluence)
## 2009
### CVE-2009-0182 (2009-01-20)