mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/07/15 06:11:45
This commit is contained in:
parent
6f5ec12233
commit
4adf04d158
26 changed files with 125 additions and 101 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "A request parameter filter solution for Struts 1 CVE-2014-0114 based on the work of Alvaro Munoz and the HP Fortify team",
|
||||
"fork": false,
|
||||
"created_at": "2014-05-22T19:14:54Z",
|
||||
"updated_at": "2019-07-16T16:26:56Z",
|
||||
"updated_at": "2021-07-14T19:37:24Z",
|
||||
"pushed_at": "2017-01-23T20:14:14Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-16T19:44:04Z",
|
||||
"updated_at": "2021-06-16T18:56:30Z",
|
||||
"updated_at": "2021-07-14T19:56:11Z",
|
||||
"pushed_at": "2019-07-23T19:24:01Z",
|
||||
"stargazers_count": 277,
|
||||
"watchers_count": 277,
|
||||
"forks_count": 111,
|
||||
"forks": 111,
|
||||
"watchers": 277,
|
||||
"stargazers_count": 278,
|
||||
"watchers_count": 278,
|
||||
"forks_count": 112,
|
||||
"forks": 112,
|
||||
"watchers": 278,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -155,8 +155,8 @@
|
|||
"pushed_at": "2017-03-13T15:03:32Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 36,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-16T00:23:34Z",
|
||||
"updated_at": "2021-07-09T11:17:53Z",
|
||||
"updated_at": "2021-07-14T17:29:23Z",
|
||||
"pushed_at": "2020-12-22T03:10:47Z",
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"watchers": 107,
|
||||
"watchers": 108,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-29T07:08:52Z",
|
||||
"updated_at": "2021-07-14T07:25:21Z",
|
||||
"updated_at": "2021-07-14T18:41:41Z",
|
||||
"pushed_at": "2020-06-13T17:40:14Z",
|
||||
"stargazers_count": 587,
|
||||
"watchers_count": 587,
|
||||
"forks_count": 83,
|
||||
"forks": 83,
|
||||
"watchers": 587,
|
||||
"stargazers_count": 588,
|
||||
"watchers_count": 588,
|
||||
"forks_count": 84,
|
||||
"forks": 84,
|
||||
"watchers": 588,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "POC for cve-2019-1458",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-03T17:55:07Z",
|
||||
"updated_at": "2021-07-11T12:17:25Z",
|
||||
"updated_at": "2021-07-14T17:31:59Z",
|
||||
"pushed_at": "2020-03-04T07:05:24Z",
|
||||
"stargazers_count": 137,
|
||||
"watchers_count": 137,
|
||||
"stargazers_count": 138,
|
||||
"watchers_count": 138,
|
||||
"forks_count": 50,
|
||||
"forks": 50,
|
||||
"watchers": 137,
|
||||
"watchers": 138,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-06-04T13:17:10Z",
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"watchers": 107,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-12T06:02:06Z",
|
||||
"updated_at": "2021-07-14T09:25:40Z",
|
||||
"updated_at": "2021-07-14T18:21:52Z",
|
||||
"pushed_at": "2019-05-09T21:34:26Z",
|
||||
"stargazers_count": 586,
|
||||
"watchers_count": 586,
|
||||
"stargazers_count": 587,
|
||||
"watchers_count": 587,
|
||||
"forks_count": 144,
|
||||
"forks": 144,
|
||||
"watchers": 586,
|
||||
"watchers": 587,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exploit for CVE-2019-9810 Firefox on Windows 64-bit.",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-05T17:19:02Z",
|
||||
"updated_at": "2021-07-01T06:35:46Z",
|
||||
"updated_at": "2021-07-14T18:41:43Z",
|
||||
"pushed_at": "2019-12-28T18:25:10Z",
|
||||
"stargazers_count": 210,
|
||||
"watchers_count": 210,
|
||||
"forks_count": 56,
|
||||
"forks": 56,
|
||||
"watchers": 210,
|
||||
"stargazers_count": 211,
|
||||
"watchers_count": 211,
|
||||
"forks_count": 57,
|
||||
"forks": 57,
|
||||
"watchers": 211,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1094,13 +1094,13 @@
|
|||
"description": "CVE-2020-0796 Remote Code Execution POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-20T14:35:48Z",
|
||||
"updated_at": "2021-07-13T10:09:21Z",
|
||||
"updated_at": "2021-07-14T17:17:08Z",
|
||||
"pushed_at": "2020-06-09T20:46:45Z",
|
||||
"stargazers_count": 401,
|
||||
"watchers_count": 401,
|
||||
"stargazers_count": 402,
|
||||
"watchers_count": 402,
|
||||
"forks_count": 131,
|
||||
"forks": 131,
|
||||
"watchers": 401,
|
||||
"watchers": 402,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2021-04-26T02:30:11Z",
|
||||
"stargazers_count": 807,
|
||||
"watchers_count": 807,
|
||||
"forks_count": 255,
|
||||
"forks": 255,
|
||||
"forks_count": 254,
|
||||
"forks": 254,
|
||||
"watchers": 807,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "How to exploit a vulnerable windows driver. Exploit for AsrDrv104.sys",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T04:38:24Z",
|
||||
"updated_at": "2021-07-14T05:29:08Z",
|
||||
"updated_at": "2021-07-14T20:42:04Z",
|
||||
"pushed_at": "2021-07-09T05:17:40Z",
|
||||
"stargazers_count": 263,
|
||||
"watchers_count": 263,
|
||||
"stargazers_count": 264,
|
||||
"watchers_count": 264,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 263,
|
||||
"watchers": 264,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -178,8 +178,8 @@
|
|||
"pushed_at": "2020-10-16T23:12:52Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2020-8840:FasterXML\/jackson-databind 远程代码执行漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-24T07:43:12Z",
|
||||
"updated_at": "2021-06-24T07:21:33Z",
|
||||
"updated_at": "2021-07-14T15:19:08Z",
|
||||
"pushed_at": "2020-02-24T07:45:37Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 27,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -224,8 +224,8 @@
|
|||
"pushed_at": "2021-01-15T18:12:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2021-07-14T10:26:51Z",
|
||||
"pushed_at": "2021-07-08T11:10:36Z",
|
||||
"stargazers_count": 1189,
|
||||
"watchers_count": 1189,
|
||||
"forks_count": 426,
|
||||
"forks": 426,
|
||||
"watchers": 1189,
|
||||
"updated_at": "2021-07-14T20:57:59Z",
|
||||
"pushed_at": "2021-07-14T21:04:49Z",
|
||||
"stargazers_count": 1192,
|
||||
"watchers_count": 1192,
|
||||
"forks_count": 427,
|
||||
"forks": 427,
|
||||
"watchers": 1192,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -128,13 +128,13 @@
|
|||
"description": "Local Privilege Escalation Edition for CVE-2021-1675",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T09:47:13Z",
|
||||
"updated_at": "2021-07-14T10:07:15Z",
|
||||
"updated_at": "2021-07-14T17:49:17Z",
|
||||
"pushed_at": "2021-07-05T06:46:12Z",
|
||||
"stargazers_count": 269,
|
||||
"watchers_count": 269,
|
||||
"stargazers_count": 270,
|
||||
"watchers_count": 270,
|
||||
"forks_count": 61,
|
||||
"forks": 61,
|
||||
"watchers": 269,
|
||||
"watchers": 270,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -220,13 +220,13 @@
|
|||
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T23:45:58Z",
|
||||
"updated_at": "2021-07-14T15:07:48Z",
|
||||
"updated_at": "2021-07-14T19:50:43Z",
|
||||
"pushed_at": "2021-07-05T08:54:06Z",
|
||||
"stargazers_count": 485,
|
||||
"watchers_count": 485,
|
||||
"forks_count": 127,
|
||||
"forks": 127,
|
||||
"watchers": 485,
|
||||
"stargazers_count": 488,
|
||||
"watchers_count": 488,
|
||||
"forks_count": 128,
|
||||
"forks": 128,
|
||||
"watchers": 488,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2021-1732 Microsoft Windows 10 本地提权漏 研究及Poc\/Exploit开发",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-08T05:07:15Z",
|
||||
"updated_at": "2021-07-14T08:00:14Z",
|
||||
"updated_at": "2021-07-14T18:30:03Z",
|
||||
"pushed_at": "2021-03-08T11:41:19Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 23,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2021-04-26T02:30:11Z",
|
||||
"stargazers_count": 807,
|
||||
"watchers_count": 807,
|
||||
"forks_count": 255,
|
||||
"forks": 255,
|
||||
"forks_count": 254,
|
||||
"forks": 254,
|
||||
"watchers": 807,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -67,5 +67,28 @@
|
|||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 386052413,
|
||||
"name": "CVE-2021-30461",
|
||||
"full_name": "puckiestyle\/CVE-2021-30461",
|
||||
"owner": {
|
||||
"login": "puckiestyle",
|
||||
"id": 57447087,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
|
||||
"html_url": "https:\/\/github.com\/puckiestyle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/puckiestyle\/CVE-2021-30461",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-14T19:20:11Z",
|
||||
"updated_at": "2021-07-14T19:20:24Z",
|
||||
"pushed_at": "2021-07-14T19:20:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-16T16:15:56Z",
|
||||
"updated_at": "2021-07-14T03:50:03Z",
|
||||
"updated_at": "2021-07-14T16:48:53Z",
|
||||
"pushed_at": "2021-06-12T08:27:09Z",
|
||||
"stargazers_count": 748,
|
||||
"watchers_count": 748,
|
||||
"stargazers_count": 749,
|
||||
"watchers_count": 749,
|
||||
"forks_count": 123,
|
||||
"forks": 123,
|
||||
"watchers": 748,
|
||||
"watchers": 749,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -381,13 +381,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2021-07-14T08:30:41Z",
|
||||
"updated_at": "2021-07-14T16:07:52Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 741,
|
||||
"watchers_count": 741,
|
||||
"stargazers_count": 742,
|
||||
"watchers_count": 742,
|
||||
"forks_count": 211,
|
||||
"forks": 211,
|
||||
"watchers": 741,
|
||||
"watchers": 742,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -220,13 +220,13 @@
|
|||
"description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-05T20:13:49Z",
|
||||
"updated_at": "2021-07-14T13:49:55Z",
|
||||
"updated_at": "2021-07-14T16:39:23Z",
|
||||
"pushed_at": "2021-07-09T15:49:23Z",
|
||||
"stargazers_count": 556,
|
||||
"watchers_count": 556,
|
||||
"stargazers_count": 558,
|
||||
"watchers_count": 558,
|
||||
"forks_count": 67,
|
||||
"forks": 67,
|
||||
"watchers": 556,
|
||||
"watchers": 558,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2021-3492 used at Pwn2Own 2021",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-28T09:43:31Z",
|
||||
"updated_at": "2021-07-14T07:56:39Z",
|
||||
"updated_at": "2021-07-14T17:45:19Z",
|
||||
"pushed_at": "2021-06-28T09:55:57Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 7,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -105,8 +105,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-14T20:08:20Z",
|
||||
"updated_at": "2021-06-21T16:52:08Z",
|
||||
"pushed_at": "2021-06-21T15:35:52Z",
|
||||
"updated_at": "2021-07-14T17:17:39Z",
|
||||
"pushed_at": "2021-07-14T17:17:37Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-06-07T09:04:22Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -1343,6 +1343,7 @@ A remote code execution issue was discovered in the web UI of VoIPmonitor before
|
|||
- [daedalus/CVE-2021-30461](https://github.com/daedalus/CVE-2021-30461)
|
||||
- [Vulnmachines/CVE-2021-30461](https://github.com/Vulnmachines/CVE-2021-30461)
|
||||
- [Al1ex/CVE-2021-30461](https://github.com/Al1ex/CVE-2021-30461)
|
||||
- [puckiestyle/CVE-2021-30461](https://github.com/puckiestyle/CVE-2021-30461)
|
||||
|
||||
### CVE-2021-30481 (2021-04-10)
|
||||
|
||||
|
|
Loading…
Reference in a new issue