Auto Update 2023/06/09 06:44:48

This commit is contained in:
motikan2010-bot 2023-06-09 15:44:48 +09:00
parent 03e17e1bda
commit 4f82de3374
55 changed files with 1178 additions and 989 deletions

View file

@ -71,10 +71,10 @@
"description": "Unsigned driver loader using CVE-2018-19320",
"fork": false,
"created_at": "2022-11-12T05:48:13Z",
"updated_at": "2023-06-07T09:10:53Z",
"updated_at": "2023-06-09T01:36:36Z",
"pushed_at": "2023-04-09T13:50:29Z",
"stargazers_count": 55,
"watchers_count": 55,
"stargazers_count": 56,
"watchers_count": 56,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 55,
"watchers": 56,
"score": 0
}
]

File diff suppressed because one or more lines are too long

View file

@ -13,19 +13,19 @@
"description": "Local privilege escalation PoC exploit for CVE-2019-16098",
"fork": false,
"created_at": "2019-09-10T15:57:36Z",
"updated_at": "2023-05-30T07:01:10Z",
"updated_at": "2023-06-09T02:35:50Z",
"pushed_at": "2019-09-13T20:05:43Z",
"stargazers_count": 174,
"watchers_count": 174,
"stargazers_count": 175,
"watchers_count": 175,
"has_discussions": false,
"forks_count": 54,
"forks_count": 56,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 54,
"watchers": 174,
"forks": 56,
"watchers": 175,
"score": 0
}
]

View file

@ -47,7 +47,7 @@
"stargazers_count": 3775,
"watchers_count": 3775,
"has_discussions": false,
"forks_count": 1083,
"forks_count": 1082,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -73,7 +73,7 @@
"webshell"
],
"visibility": "public",
"forks": 1083,
"forks": 1082,
"watchers": 3775,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Programa ideal para robar toda la información de un dispositivo remotamente a través de la aplicación AirDroid. [CVE-2019-9599] (https:\/\/www.exploit-db.com\/exploits\/46337)",
"fork": false,
"created_at": "2019-02-09T02:18:37Z",
"updated_at": "2023-05-01T11:37:40Z",
"updated_at": "2023-06-09T00:51:26Z",
"pushed_at": "2019-11-03T17:29:56Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 34,
"watchers": 35,
"score": 0
}
]

View file

@ -18,7 +18,7 @@
"stargazers_count": 3775,
"watchers_count": 3775,
"has_discussions": false,
"forks_count": 1083,
"forks_count": 1082,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -44,7 +44,7 @@
"webshell"
],
"visibility": "public",
"forks": 1083,
"forks": 1082,
"watchers": 3775,
"score": 0
},

View file

@ -121,10 +121,10 @@
"description": "Weblogic IIOP CVE-2020-2551",
"fork": false,
"created_at": "2020-02-28T08:46:21Z",
"updated_at": "2023-06-06T01:19:45Z",
"updated_at": "2023-06-09T02:07:04Z",
"pushed_at": "2020-04-07T03:32:24Z",
"stargazers_count": 327,
"watchers_count": 327,
"stargazers_count": 328,
"watchers_count": 328,
"has_discussions": false,
"forks_count": 77,
"allow_forking": true,
@ -133,7 +133,7 @@
"topics": [],
"visibility": "public",
"forks": 77,
"watchers": 327,
"watchers": 328,
"score": 0
},
{

View file

@ -1,31 +0,0 @@
[
{
"id": 390713933,
"name": "sdwan-cve-2021-1480",
"full_name": "xmco\/sdwan-cve-2021-1480",
"owner": {
"login": "xmco",
"id": 20705504,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20705504?v=4",
"html_url": "https:\/\/github.com\/xmco"
},
"html_url": "https:\/\/github.com\/xmco\/sdwan-cve-2021-1480",
"description": "PoC materials to exploit the CVE-2021-1480 on Cico SD-WAN.",
"fork": false,
"created_at": "2021-07-29T12:17:50Z",
"updated_at": "2022-07-02T18:05:42Z",
"pushed_at": "2021-08-02T16:14:44Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 4,
"score": 0
}
]

View file

@ -115,6 +115,82 @@
"watchers": 4,
"score": 0
},
{
"id": 381971547,
"name": "CVE-2021-1675-LPE-EXP",
"full_name": "evilashz\/CVE-2021-1675-LPE-EXP",
"owner": {
"login": "evilashz",
"id": 50722929,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50722929?v=4",
"html_url": "https:\/\/github.com\/evilashz"
},
"html_url": "https:\/\/github.com\/evilashz\/CVE-2021-1675-LPE-EXP",
"description": "PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527",
"fork": false,
"created_at": "2021-07-01T09:00:31Z",
"updated_at": "2023-05-19T15:16:57Z",
"pushed_at": "2021-07-02T10:47:36Z",
"stargazers_count": 54,
"watchers_count": 54,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-1675",
"cve-2021-34527",
"hacktool",
"lpe",
"printnightmare",
"redteam",
"redteam-tools",
"windows"
],
"visibility": "public",
"forks": 20,
"watchers": 54,
"score": 0
},
{
"id": 381984439,
"name": "CVE-2021-1675-LPE",
"full_name": "hlldz\/CVE-2021-1675-LPE",
"owner": {
"login": "hlldz",
"id": 16455559,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16455559?v=4",
"html_url": "https:\/\/github.com\/hlldz"
},
"html_url": "https:\/\/github.com\/hlldz\/CVE-2021-1675-LPE",
"description": "Local Privilege Escalation Edition for CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-07-01T09:47:13Z",
"updated_at": "2023-06-07T08:18:18Z",
"pushed_at": "2021-07-05T06:46:12Z",
"stargazers_count": 333,
"watchers_count": 333,
"has_discussions": false,
"forks_count": 80,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cobaltstrike",
"cve-2021-1675",
"cve-2021-34527",
"exploit",
"lpe",
"printnightmare",
"reflectivedll",
"windows"
],
"visibility": "public",
"forks": 80,
"watchers": 333,
"score": 0
},
{
"id": 382024474,
"name": "CVE-2021-1675",
@ -173,6 +249,238 @@
"watchers": 19,
"score": 0
},
{
"id": 382182179,
"name": "CVE-2021-1675",
"full_name": "calebstewart\/CVE-2021-1675",
"owner": {
"login": "calebstewart",
"id": 7529189,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7529189?v=4",
"html_url": "https:\/\/github.com\/calebstewart"
},
"html_url": "https:\/\/github.com\/calebstewart\/CVE-2021-1675",
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
"fork": false,
"created_at": "2021-07-01T23:45:58Z",
"updated_at": "2023-06-08T19:59:35Z",
"pushed_at": "2021-07-05T08:54:06Z",
"stargazers_count": 911,
"watchers_count": 911,
"has_discussions": false,
"forks_count": 230,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 230,
"watchers": 911,
"score": 0
},
{
"id": 382399375,
"name": "CVE-2021-1675-PrintNightmare",
"full_name": "killtr0\/CVE-2021-1675-PrintNightmare",
"owner": {
"login": "killtr0",
"id": 22793707,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22793707?v=4",
"html_url": "https:\/\/github.com\/killtr0"
},
"html_url": "https:\/\/github.com\/killtr0\/CVE-2021-1675-PrintNightmare",
"description": null,
"fork": false,
"created_at": "2021-07-02T16:12:15Z",
"updated_at": "2021-12-08T22:23:08Z",
"pushed_at": "2021-07-02T16:12:59Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 382407157,
"name": "CVE-2021-1675",
"full_name": "corelight\/CVE-2021-1675",
"owner": {
"login": "corelight",
"id": 21672558,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
"html_url": "https:\/\/github.com\/corelight"
},
"html_url": "https:\/\/github.com\/corelight\/CVE-2021-1675",
"description": null,
"fork": false,
"created_at": "2021-07-02T16:44:24Z",
"updated_at": "2022-06-03T07:11:00Z",
"pushed_at": "2021-07-09T14:17:40Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 9,
"score": 0
},
{
"id": 382418030,
"name": "CVE-2021-1675",
"full_name": "kougyokugentou\/CVE-2021-1675",
"owner": {
"login": "kougyokugentou",
"id": 41278462,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41278462?v=4",
"html_url": "https:\/\/github.com\/kougyokugentou"
},
"html_url": "https:\/\/github.com\/kougyokugentou\/CVE-2021-1675",
"description": "A small powershell script to disable print spooler service using desired state configuration",
"fork": false,
"created_at": "2021-07-02T17:29:04Z",
"updated_at": "2021-12-22T20:12:23Z",
"pushed_at": "2021-07-02T17:40:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 382425733,
"name": "CVE-2021-1675",
"full_name": "ptter23\/CVE-2021-1675",
"owner": {
"login": "ptter23",
"id": 55167410,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55167410?v=4",
"html_url": "https:\/\/github.com\/ptter23"
},
"html_url": "https:\/\/github.com\/ptter23\/CVE-2021-1675",
"description": "CVE-2021-1675: ZERO-DAY VULNERABILITY IN WINDOWS PRINTER SERVICE WITH AN EXPLOIT AVAILABLE IN ALL OPERATING SYSTEM VERSIONS",
"fork": false,
"created_at": "2021-07-02T18:01:21Z",
"updated_at": "2021-10-24T04:58:56Z",
"pushed_at": "2021-07-02T18:07:45Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 382496518,
"name": "cve-2021-1675-printnightmare",
"full_name": "initconf\/cve-2021-1675-printnightmare",
"owner": {
"login": "initconf",
"id": 4044729,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4044729?v=4",
"html_url": "https:\/\/github.com\/initconf"
},
"html_url": "https:\/\/github.com\/initconf\/cve-2021-1675-printnightmare",
"description": "to catch cve-2021-1675-printnightmare",
"fork": false,
"created_at": "2021-07-03T01:04:06Z",
"updated_at": "2021-10-24T06:03:36Z",
"pushed_at": "2021-07-03T01:08:43Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 382609559,
"name": "PrintNightmare",
"full_name": "ozergoker\/PrintNightmare",
"owner": {
"login": "ozergoker",
"id": 86879266,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86879266?v=4",
"html_url": "https:\/\/github.com\/ozergoker"
},
"html_url": "https:\/\/github.com\/ozergoker\/PrintNightmare",
"description": "Windows Print Spooler Service RCE CVE-2021-1675 (PrintNightmare)",
"fork": false,
"created_at": "2021-07-03T12:25:21Z",
"updated_at": "2022-06-10T10:41:21Z",
"pushed_at": "2021-07-03T12:43:26Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 382815972,
"name": "PrintNightmare-CVE-2021-1675",
"full_name": "exploitblizzard\/PrintNightmare-CVE-2021-1675",
"owner": {
"login": "exploitblizzard",
"id": 61627070,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61627070?v=4",
"html_url": "https:\/\/github.com\/exploitblizzard"
},
"html_url": "https:\/\/github.com\/exploitblizzard\/PrintNightmare-CVE-2021-1675",
"description": "Youtube : https:\/\/youtu.be\/Zr0KjYDSFKQ",
"fork": false,
"created_at": "2021-07-04T09:50:39Z",
"updated_at": "2023-02-22T14:39:26Z",
"pushed_at": "2021-07-04T09:57:46Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 7,
"score": 0
},
{
"id": 383128850,
"name": "CVE-2021-1675",
@ -202,6 +510,156 @@
"watchers": 1,
"score": 0
},
{
"id": 383165321,
"name": "PrintNightmare-LPE",
"full_name": "sailay1996\/PrintNightmare-LPE",
"owner": {
"login": "sailay1996",
"id": 16739401,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16739401?v=4",
"html_url": "https:\/\/github.com\/sailay1996"
},
"html_url": "https:\/\/github.com\/sailay1996\/PrintNightmare-LPE",
"description": "CVE-2021-1675 (PrintNightmare)",
"fork": false,
"created_at": "2021-07-05T14:17:03Z",
"updated_at": "2023-03-01T01:46:49Z",
"pushed_at": "2021-07-05T14:34:34Z",
"stargazers_count": 73,
"watchers_count": 73,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"local-privilege-escalation",
"printnightmare",
"windows-exploitation",
"windows-privilege-escalation"
],
"visibility": "public",
"forks": 29,
"watchers": 73,
"score": 0
},
{
"id": 383728669,
"name": "PrintNightmare",
"full_name": "JumpsecLabs\/PrintNightmare",
"owner": {
"login": "JumpsecLabs",
"id": 49488209,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49488209?v=4",
"html_url": "https:\/\/github.com\/JumpsecLabs"
},
"html_url": "https:\/\/github.com\/JumpsecLabs\/PrintNightmare",
"description": "Information on the Windows Spooler vulnerability - CVE-2021-1675; CVE 2021 34527",
"fork": false,
"created_at": "2021-07-07T08:32:09Z",
"updated_at": "2023-02-01T21:50:16Z",
"pushed_at": "2021-07-12T09:28:16Z",
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 20,
"score": 0
},
{
"id": 384183711,
"name": "CVE-2021-1675-Yara",
"full_name": "bartimusprimed\/CVE-2021-1675-Yara",
"owner": {
"login": "bartimusprimed",
"id": 465079,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/465079?v=4",
"html_url": "https:\/\/github.com\/bartimusprimed"
},
"html_url": "https:\/\/github.com\/bartimusprimed\/CVE-2021-1675-Yara",
"description": null,
"fork": false,
"created_at": "2021-07-08T16:18:52Z",
"updated_at": "2021-10-24T06:06:38Z",
"pushed_at": "2021-07-08T16:19:45Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 384854320,
"name": "cve-2021-1675",
"full_name": "k8gege\/cve-2021-1675",
"owner": {
"login": "k8gege",
"id": 42312878,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42312878?v=4",
"html_url": "https:\/\/github.com\/k8gege"
},
"html_url": "https:\/\/github.com\/k8gege\/cve-2021-1675",
"description": null,
"fork": false,
"created_at": "2021-07-11T03:48:25Z",
"updated_at": "2022-11-18T11:29:48Z",
"pushed_at": "2021-07-11T03:49:44Z",
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 16,
"score": 0
},
{
"id": 385174791,
"name": "PrintNightmare-CVE-2021-1675-CVE-2021-34527",
"full_name": "galoget\/PrintNightmare-CVE-2021-1675-CVE-2021-34527",
"owner": {
"login": "galoget",
"id": 8353133,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8353133?v=4",
"html_url": "https:\/\/github.com\/galoget"
},
"html_url": "https:\/\/github.com\/galoget\/PrintNightmare-CVE-2021-1675-CVE-2021-34527",
"description": "CVE-2021-1675 \/ CVE-2021-34527 - PrintNightmare Python, C# and PowerShell Exploits Implementations (LPE & RCE)",
"fork": false,
"created_at": "2021-07-12T08:18:40Z",
"updated_at": "2021-10-24T06:07:00Z",
"pushed_at": "2021-07-12T08:35:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 388427598,
"name": "my-CVE-2021-1675",
@ -350,6 +808,35 @@
"watchers": 2,
"score": 0
},
{
"id": 420590964,
"name": "CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler",
"full_name": "5l1v3r1\/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler",
"owner": {
"login": "5l1v3r1",
"id": 34143537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
"html_url": "https:\/\/github.com\/5l1v3r1"
},
"html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler",
"description": "Temporary mitigation to the CVE-2021-1675. 'Spooler' service-disabled based on time schedule. PowerShell Scripts and Task Scheduler code provided. ",
"fork": false,
"created_at": "2021-10-24T04:59:15Z",
"updated_at": "2021-10-24T04:59:16Z",
"pushed_at": "2021-07-05T05:41:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 435194981,
"name": "NimNightmare",

View file

@ -672,35 +672,6 @@
"watchers": 2,
"score": 0
},
{
"id": 389736878,
"name": "CVE-2021-21972",
"full_name": "haiclover\/CVE-2021-21972",
"owner": {
"login": "haiclover",
"id": 20736458,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20736458?v=4",
"html_url": "https:\/\/github.com\/haiclover"
},
"html_url": "https:\/\/github.com\/haiclover\/CVE-2021-21972",
"description": null,
"fork": false,
"created_at": "2021-07-26T18:48:28Z",
"updated_at": "2023-03-08T02:48:17Z",
"pushed_at": "2021-08-02T17:45:59Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 413216838,
"name": "CVE-2021-21972",

View file

@ -213,6 +213,35 @@
"watchers": 32,
"score": 0
},
{
"id": 384003238,
"name": "CVE-2021-21985",
"full_name": "haiclover\/CVE-2021-21985",
"owner": {
"login": "haiclover",
"id": 20736458,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20736458?v=4",
"html_url": "https:\/\/github.com\/haiclover"
},
"html_url": "https:\/\/github.com\/haiclover\/CVE-2021-21985",
"description": null,
"fork": false,
"created_at": "2021-07-08T04:45:19Z",
"updated_at": "2023-03-08T02:48:17Z",
"pushed_at": "2021-07-12T11:04:36Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 426353517,
"name": "CVE-2021-21985_PoC",

View file

@ -1,31 +0,0 @@
[
{
"id": 388358547,
"name": "cve-2021-22146",
"full_name": "magichk\/cve-2021-22146",
"owner": {
"login": "magichk",
"id": 17543960,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17543960?v=4",
"html_url": "https:\/\/github.com\/magichk"
},
"html_url": "https:\/\/github.com\/magichk\/cve-2021-22146",
"description": null,
"fork": false,
"created_at": "2021-07-22T06:50:34Z",
"updated_at": "2023-01-31T11:19:23Z",
"pushed_at": "2021-07-26T16:27:49Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 4,
"score": 0
}
]

View file

@ -89,35 +89,6 @@
"watchers": 8,
"score": 0
},
{
"id": 391882871,
"name": "CVE-2021-22204",
"full_name": "PenTestical\/CVE-2021-22204",
"owner": {
"login": "PenTestical",
"id": 57206134,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57206134?v=4",
"html_url": "https:\/\/github.com\/PenTestical"
},
"html_url": "https:\/\/github.com\/PenTestical\/CVE-2021-22204",
"description": null,
"fork": false,
"created_at": "2021-08-02T09:11:27Z",
"updated_at": "2022-07-21T00:41:01Z",
"pushed_at": "2021-08-02T13:30:30Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 392061786,
"name": "CVE-2021-22204",

View file

@ -71,10 +71,10 @@
"description": "CVE-2021-22205 Unauthorized RCE",
"fork": false,
"created_at": "2021-10-28T14:02:51Z",
"updated_at": "2022-11-09T18:14:14Z",
"updated_at": "2023-06-09T02:06:57Z",
"pushed_at": "2021-10-28T14:20:05Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 70,
"watchers": 71,
"score": 0
},
{

View file

@ -28,35 +28,6 @@
"watchers": 49,
"score": 0
},
{
"id": 391193611,
"name": "Rocket.Chat-Automated-Account-Takeover-RCE-CVE-2021-22911",
"full_name": "optionalCTF\/Rocket.Chat-Automated-Account-Takeover-RCE-CVE-2021-22911",
"owner": {
"login": "optionalCTF",
"id": 45684709,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45684709?v=4",
"html_url": "https:\/\/github.com\/optionalCTF"
},
"html_url": "https:\/\/github.com\/optionalCTF\/Rocket.Chat-Automated-Account-Takeover-RCE-CVE-2021-22911",
"description": "Full unauthenticated RCE proof of concept for Rocket.Chat 3.12.1 CVE-2021-22911",
"fork": false,
"created_at": "2021-07-30T21:44:18Z",
"updated_at": "2022-02-28T15:50:54Z",
"pushed_at": "2021-07-30T22:00:52Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"score": 0
},
{
"id": 408111498,
"name": "CVE-2021-22911",

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2021-12-15T15:40:45Z",
"updated_at": "2023-05-18T08:47:38Z",
"updated_at": "2023-06-09T04:00:58Z",
"pushed_at": "2021-12-15T16:37:09Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 7,
"watchers": 11,
"score": 0
}
]

View file

@ -28,35 +28,6 @@
"watchers": 38,
"score": 0
},
{
"id": 391813400,
"name": "CVE-2021-2394",
"full_name": "freeide\/CVE-2021-2394",
"owner": {
"login": "freeide",
"id": 33774184,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33774184?v=4",
"html_url": "https:\/\/github.com\/freeide"
},
"html_url": "https:\/\/github.com\/freeide\/CVE-2021-2394",
"description": "POC of CVE-2021-2394",
"fork": false,
"created_at": "2021-08-02T04:19:11Z",
"updated_at": "2023-01-05T14:20:28Z",
"pushed_at": "2021-08-02T02:47:54Z",
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 23,
"score": 0
},
{
"id": 394009215,
"name": "CVE-2021-2394",

View file

@ -1,31 +0,0 @@
[
{
"id": 391040356,
"name": "CVE-2021-24155.rb",
"full_name": "0dayNinja\/CVE-2021-24155.rb",
"owner": {
"login": "0dayNinja",
"id": 88158703,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88158703?v=4",
"html_url": "https:\/\/github.com\/0dayNinja"
},
"html_url": "https:\/\/github.com\/0dayNinja\/CVE-2021-24155.rb",
"description": "WordPress Backup Guard Authenticated Remote Code Execution Exploit",
"fork": false,
"created_at": "2021-07-30T11:28:53Z",
"updated_at": "2022-11-18T13:06:04Z",
"pushed_at": "2021-07-30T11:35:54Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 11,
"score": 0
}
]

View file

@ -1,20 +1,20 @@
[
{
"id": 432034471,
"name": "CVE-2021-10086",
"full_name": "AK-blank\/CVE-2021-10086",
"id": 385186614,
"name": "CVE-2021-24347-",
"full_name": "huydoppa\/CVE-2021-24347-",
"owner": {
"login": "AK-blank",
"id": 56591429,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56591429?v=4",
"html_url": "https:\/\/github.com\/AK-blank"
"login": "huydoppa",
"id": 58453296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58453296?v=4",
"html_url": "https:\/\/github.com\/huydoppa"
},
"html_url": "https:\/\/github.com\/AK-blank\/CVE-2021-10086",
"html_url": "https:\/\/github.com\/huydoppa\/CVE-2021-24347-",
"description": null,
"fork": false,
"created_at": "2021-11-26T02:43:58Z",
"updated_at": "2023-04-28T02:53:28Z",
"pushed_at": "2021-08-05T06:47:48Z",
"created_at": "2021-07-12T09:02:47Z",
"updated_at": "2021-07-12T09:04:13Z",
"pushed_at": "2021-07-12T09:04:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -1,31 +0,0 @@
[
{
"id": 391631988,
"name": "CVE-2021-28378",
"full_name": "pandatix\/CVE-2021-28378",
"owner": {
"login": "pandatix",
"id": 57038071,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57038071?v=4",
"html_url": "https:\/\/github.com\/pandatix"
},
"html_url": "https:\/\/github.com\/pandatix\/CVE-2021-28378",
"description": null,
"fork": false,
"created_at": "2021-08-01T13:16:53Z",
"updated_at": "2022-02-28T14:22:43Z",
"pushed_at": "2021-08-07T14:28:09Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0
}
]

View file

@ -1,33 +1,4 @@
[
{
"id": 390723249,
"name": "CVE-2021-30573-PoC-Google-Chrome",
"full_name": "s4e-lab\/CVE-2021-30573-PoC-Google-Chrome",
"owner": {
"login": "s4e-lab",
"id": 75635867,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75635867?v=4",
"html_url": "https:\/\/github.com\/s4e-lab"
},
"html_url": "https:\/\/github.com\/s4e-lab\/CVE-2021-30573-PoC-Google-Chrome",
"description": "Google Chrome Use After Free vulnerability reported by S4E Team",
"fork": false,
"created_at": "2021-07-29T12:53:13Z",
"updated_at": "2022-06-03T05:23:09Z",
"pushed_at": "2021-07-29T13:18:38Z",
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 15,
"score": 0
},
{
"id": 421034424,
"name": "CVE-2021-30573",

View file

@ -57,6 +57,64 @@
"watchers": 119,
"score": 0
},
{
"id": 332682252,
"name": "laravel-CVE-2021-3129-EXP",
"full_name": "SecPros-Team\/laravel-CVE-2021-3129-EXP",
"owner": {
"login": "SecPros-Team",
"id": 77960183,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77960183?v=4",
"html_url": "https:\/\/github.com\/SecPros-Team"
},
"html_url": "https:\/\/github.com\/SecPros-Team\/laravel-CVE-2021-3129-EXP",
"description": null,
"fork": false,
"created_at": "2021-01-25T08:42:28Z",
"updated_at": "2023-04-29T15:27:22Z",
"pushed_at": "2021-01-25T08:49:59Z",
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 57,
"score": 0
},
{
"id": 333316985,
"name": "Laravel_CVE-2021-3129_EXP",
"full_name": "crisprss\/Laravel_CVE-2021-3129_EXP",
"owner": {
"login": "crisprss",
"id": 55953931,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55953931?v=4",
"html_url": "https:\/\/github.com\/crisprss"
},
"html_url": "https:\/\/github.com\/crisprss\/Laravel_CVE-2021-3129_EXP",
"description": null,
"fork": false,
"created_at": "2021-01-27T05:44:52Z",
"updated_at": "2022-11-09T18:11:00Z",
"pushed_at": "2021-01-27T06:23:34Z",
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 17,
"score": 0
},
{
"id": 333380316,
"name": "CVE-2021-3129_exploit",

View file

@ -1,4 +1,33 @@
[
{
"id": 333199828,
"name": "CVE-2021-3156",
"full_name": "mr-r3b00t\/CVE-2021-3156",
"owner": {
"login": "mr-r3b00t",
"id": 14963690,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14963690?v=4",
"html_url": "https:\/\/github.com\/mr-r3b00t"
},
"html_url": "https:\/\/github.com\/mr-r3b00t\/CVE-2021-3156",
"description": null,
"fork": false,
"created_at": "2021-01-26T19:53:04Z",
"updated_at": "2022-10-10T22:30:28Z",
"pushed_at": "2021-01-26T20:09:53Z",
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 35,
"score": 0
},
{
"id": 333450928,
"name": "sudo_cve-2021-3156",
@ -57,6 +86,35 @@
"watchers": 114,
"score": 0
},
{
"id": 333492305,
"name": "CVE-2021-3156",
"full_name": "unauth401\/CVE-2021-3156",
"owner": {
"login": "unauth401",
"id": 61272656,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61272656?v=4",
"html_url": "https:\/\/github.com\/unauth401"
},
"html_url": "https:\/\/github.com\/unauth401\/CVE-2021-3156",
"description": null,
"fork": false,
"created_at": "2021-01-27T16:35:43Z",
"updated_at": "2022-11-09T18:11:00Z",
"pushed_at": "2021-01-27T15:19:23Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 2,
"score": 0
},
{
"id": 333557918,
"name": "CVE-2021-3156",
@ -1228,35 +1286,6 @@
"watchers": 1,
"score": 0
},
{
"id": 393627940,
"name": "CVE-2021-3156",
"full_name": "CyberCommands\/CVE-2021-3156",
"owner": {
"login": "CyberCommands",
"id": 78230607,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78230607?v=4",
"html_url": "https:\/\/github.com\/CyberCommands"
},
"html_url": "https:\/\/github.com\/CyberCommands\/CVE-2021-3156",
"description": null,
"fork": false,
"created_at": "2021-08-07T08:38:50Z",
"updated_at": "2021-08-07T08:43:21Z",
"pushed_at": "2021-08-07T08:43:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 395682414,
"name": "CVE-2021-3156",

View file

@ -1,31 +0,0 @@
[
{
"id": 391818469,
"name": "CVE-2021-31630-OpenPLC_RCE",
"full_name": "h3v0x\/CVE-2021-31630-OpenPLC_RCE",
"owner": {
"login": "h3v0x",
"id": 6265911,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6265911?v=4",
"html_url": "https:\/\/github.com\/h3v0x"
},
"html_url": "https:\/\/github.com\/h3v0x\/CVE-2021-31630-OpenPLC_RCE",
"description": "Exploit for Authenticated Remote Code Execution on OpenPLC v3 Webserver",
"fork": false,
"created_at": "2021-08-02T04:48:24Z",
"updated_at": "2022-07-14T06:12:17Z",
"pushed_at": "2021-08-02T04:48:25Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0
}
]

31
2021/CVE-2021-3281.json Normal file
View file

@ -0,0 +1,31 @@
[
{
"id": 383067956,
"name": "CVE-2021-3281",
"full_name": "lwzSoviet\/CVE-2021-3281",
"owner": {
"login": "lwzSoviet",
"id": 30397594,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30397594?v=4",
"html_url": "https:\/\/github.com\/lwzSoviet"
},
"html_url": "https:\/\/github.com\/lwzSoviet\/CVE-2021-3281",
"description": null,
"fork": false,
"created_at": "2021-07-05T08:25:26Z",
"updated_at": "2022-01-31T11:44:07Z",
"pushed_at": "2021-07-05T08:47:14Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -18,13 +18,13 @@
"stargazers_count": 79,
"watchers_count": 79,
"has_discussions": false,
"forks_count": 26,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 26,
"forks": 27,
"watchers": 79,
"score": 0
},

View file

@ -1,33 +1,4 @@
[
{
"id": 390295076,
"name": "CVE-2021-3438",
"full_name": "TobiasS1402\/CVE-2021-3438",
"owner": {
"login": "TobiasS1402",
"id": 46230851,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46230851?v=4",
"html_url": "https:\/\/github.com\/TobiasS1402"
},
"html_url": "https:\/\/github.com\/TobiasS1402\/CVE-2021-3438",
"description": "Detection and remediation for CVE-2021-3438 with Powershell",
"fork": false,
"created_at": "2021-07-28T09:36:42Z",
"updated_at": "2021-07-28T14:51:57Z",
"pushed_at": "2021-07-28T14:41:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 643396878,
"name": "CVE-2021-3438",

View file

@ -1,31 +0,0 @@
[
{
"id": 390877656,
"name": "CVE-2021-34470scanner",
"full_name": "technion\/CVE-2021-34470scanner",
"owner": {
"login": "technion",
"id": 1948596,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1948596?v=4",
"html_url": "https:\/\/github.com\/technion"
},
"html_url": "https:\/\/github.com\/technion\/CVE-2021-34470scanner",
"description": "A Powrshell script to scan for CVE-2021-34470",
"fork": false,
"created_at": "2021-07-29T23:50:31Z",
"updated_at": "2022-08-18T06:30:57Z",
"pushed_at": "2021-07-29T23:51:22Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -1,4 +1,33 @@
[
{
"id": 382335385,
"name": "CVE-2021-34527",
"full_name": "JohnHammond\/CVE-2021-34527",
"owner": {
"login": "JohnHammond",
"id": 6288722,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6288722?v=4",
"html_url": "https:\/\/github.com\/JohnHammond"
},
"html_url": "https:\/\/github.com\/JohnHammond\/CVE-2021-34527",
"description": null,
"fork": false,
"created_at": "2021-07-02T12:10:49Z",
"updated_at": "2023-06-06T01:29:21Z",
"pushed_at": "2021-07-02T12:17:50Z",
"stargazers_count": 207,
"watchers_count": 207,
"has_discussions": false,
"forks_count": 57,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 57,
"watchers": 207,
"score": 0
},
{
"id": 382645654,
"name": "PrintNightmare-CVE-2021-34527",
@ -35,6 +64,93 @@
"watchers": 87,
"score": 0
},
{
"id": 382894525,
"name": "CVE-2021-34527-1675",
"full_name": "CnOxx1\/CVE-2021-34527-1675",
"owner": {
"login": "CnOxx1",
"id": 86923954,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86923954?v=4",
"html_url": "https:\/\/github.com\/CnOxx1"
},
"html_url": "https:\/\/github.com\/CnOxx1\/CVE-2021-34527-1675",
"description": "Cve-2021-1675 or cve-2021-34527? Detailed analysis and exploitation of windows print spooler 0day vulnerability",
"fork": false,
"created_at": "2021-07-04T16:09:18Z",
"updated_at": "2021-09-06T06:08:09Z",
"pushed_at": "2021-07-04T16:31:21Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": true,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"score": 0
},
{
"id": 383207766,
"name": "disable-RegisterSpoolerRemoteRpcEndPoint",
"full_name": "rdboboia\/disable-RegisterSpoolerRemoteRpcEndPoint",
"owner": {
"login": "rdboboia",
"id": 37208426,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37208426?v=4",
"html_url": "https:\/\/github.com\/rdboboia"
},
"html_url": "https:\/\/github.com\/rdboboia\/disable-RegisterSpoolerRemoteRpcEndPoint",
"description": "Workaround for Windows Print Spooler Remote Code Execution Vulnerability(CVE-2021-34527). See: https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34527",
"fork": false,
"created_at": "2021-07-05T16:49:32Z",
"updated_at": "2021-07-08T21:11:43Z",
"pushed_at": "2021-07-08T21:11:40Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 383223006,
"name": "CVE-2021-34527-PrintNightmare-Workaround",
"full_name": "geekbrett\/CVE-2021-34527-PrintNightmare-Workaround",
"owner": {
"login": "geekbrett",
"id": 22183376,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22183376?v=4",
"html_url": "https:\/\/github.com\/geekbrett"
},
"html_url": "https:\/\/github.com\/geekbrett\/CVE-2021-34527-PrintNightmare-Workaround",
"description": "This simple PowerShell script is in response to the \"PrintNightmare\" vulnerability. This was designed to give a end user the ability to stop and disable the \"Print Spooler\" service on their computer while awaiting a fix from Microsoft.",
"fork": false,
"created_at": "2021-07-05T17:50:56Z",
"updated_at": "2022-03-18T12:17:32Z",
"pushed_at": "2021-07-07T17:18:07Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 383254488,
"name": "ItWasAllADream",
@ -64,6 +180,122 @@
"watchers": 721,
"score": 0
},
{
"id": 383699836,
"name": "Disable-Spooler-Service-PrintNightmare-CVE-2021-34527",
"full_name": "vinaysudheer\/Disable-Spooler-Service-PrintNightmare-CVE-2021-34527",
"owner": {
"login": "vinaysudheer",
"id": 29897973,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29897973?v=4",
"html_url": "https:\/\/github.com\/vinaysudheer"
},
"html_url": "https:\/\/github.com\/vinaysudheer\/Disable-Spooler-Service-PrintNightmare-CVE-2021-34527",
"description": "Simple batch script to disable the Microsoft Print Spooler service from system",
"fork": false,
"created_at": "2021-07-07T06:41:15Z",
"updated_at": "2021-07-07T06:47:16Z",
"pushed_at": "2021-07-07T06:47:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 384221697,
"name": "printnightmare",
"full_name": "glorisonlai\/printnightmare",
"owner": {
"login": "glorisonlai",
"id": 26339805,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26339805?v=4",
"html_url": "https:\/\/github.com\/glorisonlai"
},
"html_url": "https:\/\/github.com\/glorisonlai\/printnightmare",
"description": "CVE-2021-34527 implementation",
"fork": false,
"created_at": "2021-07-08T18:56:04Z",
"updated_at": "2021-07-08T18:56:07Z",
"pushed_at": "2021-07-08T18:56:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 384385967,
"name": "Printnightmare",
"full_name": "Eutectico\/Printnightmare",
"owner": {
"login": "Eutectico",
"id": 30925137,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30925137?v=4",
"html_url": "https:\/\/github.com\/Eutectico"
},
"html_url": "https:\/\/github.com\/Eutectico\/Printnightmare",
"description": "Fix for PrintNightmare CVE-2021-34527",
"fork": false,
"created_at": "2021-07-09T09:22:03Z",
"updated_at": "2021-07-09T11:02:54Z",
"pushed_at": "2021-07-09T11:02:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 384554464,
"name": "PowerShell-PrintNightmare",
"full_name": "syntaxbearror\/PowerShell-PrintNightmare",
"owner": {
"login": "syntaxbearror",
"id": 53105897,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53105897?v=4",
"html_url": "https:\/\/github.com\/syntaxbearror"
},
"html_url": "https:\/\/github.com\/syntaxbearror\/PowerShell-PrintNightmare",
"description": "A collection of scripts to help set the appropriate registry keys for CVE-2021-34527",
"fork": false,
"created_at": "2021-07-09T21:28:16Z",
"updated_at": "2021-07-11T16:21:00Z",
"pushed_at": "2021-07-09T21:46:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 390263988,
"name": "PrintNightmare",

View file

@ -13,19 +13,19 @@
"description": "Ubuntu OverlayFS Local Privesc",
"fork": false,
"created_at": "2021-04-19T20:07:01Z",
"updated_at": "2023-05-18T23:53:38Z",
"updated_at": "2023-06-09T01:13:43Z",
"pushed_at": "2021-09-28T04:08:43Z",
"stargazers_count": 342,
"watchers_count": 342,
"stargazers_count": 343,
"watchers_count": 343,
"has_discussions": false,
"forks_count": 127,
"forks_count": 128,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 127,
"watchers": 342,
"forks": 128,
"watchers": 343,
"score": 0
},
{
@ -115,6 +115,41 @@
"watchers": 1,
"score": 0
},
{
"id": 383693831,
"name": "CVE-2021-3493",
"full_name": "inspiringz\/CVE-2021-3493",
"owner": {
"login": "inspiringz",
"id": 47313597,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47313597?v=4",
"html_url": "https:\/\/github.com\/inspiringz"
},
"html_url": "https:\/\/github.com\/inspiringz\/CVE-2021-3493",
"description": "CVE-2021-3493 Ubuntu OverlayFS Local Privesc (Interactive Bash Shell & Execute Command Entered)",
"fork": false,
"created_at": "2021-07-07T06:16:48Z",
"updated_at": "2023-05-17T07:42:57Z",
"pushed_at": "2021-07-07T07:19:03Z",
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-3493",
"exploit",
"linux",
"privesc",
"ubuntu"
],
"visibility": "public",
"forks": 8,
"watchers": 33,
"score": 0
},
{
"id": 405634949,
"name": "overlayFS-CVE-2021-3493",

View file

@ -1,4 +1,33 @@
[
{
"id": 384694670,
"name": "CVE-2021-35042",
"full_name": "YouGina\/CVE-2021-35042",
"owner": {
"login": "YouGina",
"id": 5002624,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5002624?v=4",
"html_url": "https:\/\/github.com\/YouGina"
},
"html_url": "https:\/\/github.com\/YouGina\/CVE-2021-35042",
"description": "SQL injection via unsanitized QuerySet.order_by() input",
"fork": false,
"created_at": "2021-07-10T12:38:52Z",
"updated_at": "2022-07-21T02:50:56Z",
"pushed_at": "2021-07-10T13:43:54Z",
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 12,
"score": 0
},
{
"id": 402138788,
"name": "CVE-2021-35042",

View file

@ -196,10 +196,10 @@
"description": "Privilege escalation with polkit - CVE-2021-3560",
"fork": false,
"created_at": "2021-06-19T08:15:17Z",
"updated_at": "2023-06-08T08:24:33Z",
"updated_at": "2023-06-09T03:19:42Z",
"pushed_at": "2021-06-20T07:38:13Z",
"stargazers_count": 106,
"watchers_count": 106,
"stargazers_count": 107,
"watchers_count": 107,
"has_discussions": false,
"forks_count": 51,
"allow_forking": true,
@ -208,7 +208,7 @@
"topics": [],
"visibility": "public",
"forks": 51,
"watchers": 106,
"watchers": 107,
"score": 0
},
{
@ -240,122 +240,6 @@
"watchers": 25,
"score": 0
},
{
"id": 382305236,
"name": "CVE-2021-3560",
"full_name": "cpu0x00\/CVE-2021-3560",
"owner": {
"login": "cpu0x00",
"id": 86830248,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86830248?v=4",
"html_url": "https:\/\/github.com\/cpu0x00"
},
"html_url": "https:\/\/github.com\/cpu0x00\/CVE-2021-3560",
"description": "ubuntu new PrivEsc race condition vulnerability",
"fork": false,
"created_at": "2021-07-02T10:03:26Z",
"updated_at": "2022-11-19T21:44:24Z",
"pushed_at": "2021-08-05T02:07:12Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 390233864,
"name": "CVE-2021-3560",
"full_name": "BizarreLove\/CVE-2021-3560",
"owner": {
"login": "BizarreLove",
"id": 41328139,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41328139?v=4",
"html_url": "https:\/\/github.com\/BizarreLove"
},
"html_url": "https:\/\/github.com\/BizarreLove\/CVE-2021-3560",
"description": "NYCY_homework_&_meeting",
"fork": false,
"created_at": "2021-07-28T06:05:46Z",
"updated_at": "2021-07-29T08:24:46Z",
"pushed_at": "2021-07-29T08:24:43Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 391043530,
"name": "CVE-2021-3560",
"full_name": "0dayNinja\/CVE-2021-3560",
"owner": {
"login": "0dayNinja",
"id": 88158703,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88158703?v=4",
"html_url": "https:\/\/github.com\/0dayNinja"
},
"html_url": "https:\/\/github.com\/0dayNinja\/CVE-2021-3560",
"description": "Polkit D-Bus Authentication Bypass Exploit",
"fork": false,
"created_at": "2021-07-30T11:41:34Z",
"updated_at": "2023-02-26T05:26:34Z",
"pushed_at": "2021-07-30T11:43:32Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 10,
"score": 0
},
{
"id": 427315131,
"name": "CVE-2021-3560",
"full_name": "TomMalvoRiddle\/CVE-2021-3560",
"owner": {
"login": "TomMalvoRiddle",
"id": 64571518,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64571518?v=4",
"html_url": "https:\/\/github.com\/TomMalvoRiddle"
},
"html_url": "https:\/\/github.com\/TomMalvoRiddle\/CVE-2021-3560",
"description": "CVE-2021-3560 (Polkit - Local Privilege Escalation)",
"fork": false,
"created_at": "2021-11-12T10:15:45Z",
"updated_at": "2021-12-21T14:39:48Z",
"pushed_at": "2021-07-26T07:08:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 453938064,
"name": "CVE-2021-3560",

View file

@ -129,10 +129,10 @@
"description": "海康威视RCE漏洞 批量检测和利用工具",
"fork": false,
"created_at": "2022-08-03T17:27:59Z",
"updated_at": "2023-06-08T05:48:45Z",
"updated_at": "2023-06-09T01:52:04Z",
"pushed_at": "2022-08-05T19:57:30Z",
"stargazers_count": 79,
"watchers_count": 79,
"stargazers_count": 80,
"watchers_count": 80,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -144,7 +144,7 @@
],
"visibility": "public",
"forks": 17,
"watchers": 79,
"watchers": 80,
"score": 0
},
{

View file

@ -91,122 +91,6 @@
"watchers": 33,
"score": 0
},
{
"id": 388453276,
"name": "CVE-2021-36934",
"full_name": "tda90\/CVE-2021-36934",
"owner": {
"login": "tda90",
"id": 48199685,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48199685?v=4",
"html_url": "https:\/\/github.com\/tda90"
},
"html_url": "https:\/\/github.com\/tda90\/CVE-2021-36934",
"description": "CVE-2021-36934 PowerShell Fix",
"fork": false,
"created_at": "2021-07-22T12:24:24Z",
"updated_at": "2021-07-29T06:47:23Z",
"pushed_at": "2021-07-29T06:47:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 0,
"score": 0
},
{
"id": 389555386,
"name": "CVE-2021-36934",
"full_name": "0x0D1n\/CVE-2021-36934",
"owner": {
"login": "0x0D1n",
"id": 23523771,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23523771?v=4",
"html_url": "https:\/\/github.com\/0x0D1n"
},
"html_url": "https:\/\/github.com\/0x0D1n\/CVE-2021-36934",
"description": null,
"fork": false,
"created_at": "2021-07-26T08:01:08Z",
"updated_at": "2021-07-26T08:18:37Z",
"pushed_at": "2021-07-26T08:18:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 389878651,
"name": "CVE-2021-36934",
"full_name": "exploitblizzard\/CVE-2021-36934",
"owner": {
"login": "exploitblizzard",
"id": 61627070,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61627070?v=4",
"html_url": "https:\/\/github.com\/exploitblizzard"
},
"html_url": "https:\/\/github.com\/exploitblizzard\/CVE-2021-36934",
"description": "HiveNightmare aka SeriousSAM ",
"fork": false,
"created_at": "2021-07-27T06:54:30Z",
"updated_at": "2023-04-21T05:37:19Z",
"pushed_at": "2021-07-27T06:56:18Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 7,
"score": 0
},
{
"id": 390844451,
"name": "CVE-2021-36934",
"full_name": "irissentinel\/CVE-2021-36934",
"owner": {
"login": "irissentinel",
"id": 79321563,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79321563?v=4",
"html_url": "https:\/\/github.com\/irissentinel"
},
"html_url": "https:\/\/github.com\/irissentinel\/CVE-2021-36934",
"description": "CVE-2021-36934 HiveNightmare vulnerability checker and workaround",
"fork": false,
"created_at": "2021-07-29T20:35:22Z",
"updated_at": "2021-07-30T12:29:18Z",
"pushed_at": "2021-07-30T12:29:15Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 391724401,
"name": "CVE-2021-36934",
@ -236,64 +120,6 @@
"watchers": 2,
"score": 0
},
{
"id": 391965692,
"name": "poc_CVE-2021-36934",
"full_name": "grishinpv\/poc_CVE-2021-36934",
"owner": {
"login": "grishinpv",
"id": 88319804,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88319804?v=4",
"html_url": "https:\/\/github.com\/grishinpv"
},
"html_url": "https:\/\/github.com\/grishinpv\/poc_CVE-2021-36934",
"description": "POC experiments with Volume Shadow copy Service (VSS)",
"fork": false,
"created_at": "2021-08-02T13:47:17Z",
"updated_at": "2022-11-09T18:13:09Z",
"pushed_at": "2021-08-02T13:52:20Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 392648426,
"name": "SeriousSam",
"full_name": "shaktavist\/SeriousSam",
"owner": {
"login": "shaktavist",
"id": 87278238,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87278238?v=4",
"html_url": "https:\/\/github.com\/shaktavist"
},
"html_url": "https:\/\/github.com\/shaktavist\/SeriousSam",
"description": "Windows Elevation of Privilege Vulnerability CVE-2021-36934",
"fork": false,
"created_at": "2021-08-04T10:37:41Z",
"updated_at": "2021-08-04T10:47:55Z",
"pushed_at": "2021-08-04T10:47:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 394763090,
"name": "CVE-2021-36934-export-shadow-volume-POC",

View file

@ -1,31 +0,0 @@
[
{
"id": 408041781,
"name": "CVE-2021-37152",
"full_name": "SecurityAnalysts\/CVE-2021-37152",
"owner": {
"login": "SecurityAnalysts",
"id": 26019141,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26019141?v=4",
"html_url": "https:\/\/github.com\/SecurityAnalysts"
},
"html_url": "https:\/\/github.com\/SecurityAnalysts\/CVE-2021-37152",
"description": "Exploit Accsess network clients by sending packets in wirless TP-LINK and preparing for a mitm attack",
"fork": false,
"created_at": "2021-09-19T05:37:37Z",
"updated_at": "2021-10-27T16:54:04Z",
"pushed_at": "2021-07-26T08:37:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,31 +0,0 @@
[
{
"id": 391489074,
"name": "CVE-2021-37833",
"full_name": "dievus\/CVE-2021-37833",
"owner": {
"login": "dievus",
"id": 25853389,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25853389?v=4",
"html_url": "https:\/\/github.com\/dievus"
},
"html_url": "https:\/\/github.com\/dievus\/CVE-2021-37833",
"description": "CVE 2021-37833 Hotel Druid 3.0.2 Reflected Cross Site Scripting",
"fork": false,
"created_at": "2021-08-01T00:34:27Z",
"updated_at": "2022-03-25T01:24:43Z",
"pushed_at": "2021-08-03T13:44:40Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0
}
]

View file

@ -1,31 +0,0 @@
[
{
"id": 393319863,
"name": "CVE-2021-38149",
"full_name": "jboogie15\/CVE-2021-38149",
"owner": {
"login": "jboogie15",
"id": 67240643,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67240643?v=4",
"html_url": "https:\/\/github.com\/jboogie15"
},
"html_url": "https:\/\/github.com\/jboogie15\/CVE-2021-38149",
"description": "Chikitsa Patient Management System Stored Cross-Site Scripting (XSS)",
"fork": false,
"created_at": "2021-08-06T09:01:40Z",
"updated_at": "2021-08-10T19:54:20Z",
"pushed_at": "2021-08-06T09:39:58Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "POC for CVE-2021-41091",
"fork": false,
"created_at": "2023-05-02T07:25:13Z",
"updated_at": "2023-06-07T21:32:05Z",
"updated_at": "2023-06-09T02:39:27Z",
"pushed_at": "2023-05-20T09:16:34Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 34,
"watchers": 35,
"score": 0
}
]

View file

@ -1273,10 +1273,10 @@
"description": "CVE-2022-22947 注入Godzilla内存马",
"fork": false,
"created_at": "2022-04-26T05:48:27Z",
"updated_at": "2023-06-08T22:23:18Z",
"updated_at": "2023-06-09T05:50:31Z",
"pushed_at": "2022-04-26T05:55:58Z",
"stargazers_count": 150,
"watchers_count": 150,
"stargazers_count": 151,
"watchers_count": 151,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -1285,7 +1285,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 150,
"watchers": 151,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation",
"fork": false,
"created_at": "2022-06-07T03:20:23Z",
"updated_at": "2023-06-08T10:38:53Z",
"updated_at": "2023-06-09T03:13:55Z",
"pushed_at": "2022-06-07T03:41:13Z",
"stargazers_count": 539,
"watchers_count": 539,
"stargazers_count": 540,
"watchers_count": 540,
"has_discussions": false,
"forks_count": 92,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 92,
"watchers": 539,
"watchers": 540,
"score": 0
},
{

View file

@ -134,10 +134,10 @@
"description": "Zimbra CVE-2022-27925 PoC",
"fork": false,
"created_at": "2022-08-20T15:58:29Z",
"updated_at": "2023-05-30T07:44:33Z",
"updated_at": "2023-06-09T04:31:25Z",
"pushed_at": "2022-08-27T20:30:21Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -152,7 +152,7 @@
],
"visibility": "public",
"forks": 23,
"watchers": 37,
"watchers": 38,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "cve-2022-34169 延伸出的Jdk Xalan的payload自动生成工具可根据不同的Jdk生成出其所对应的xslt文件",
"fork": false,
"created_at": "2023-01-17T03:48:11Z",
"updated_at": "2023-06-08T16:54:24Z",
"updated_at": "2023-06-09T04:01:37Z",
"pushed_at": "2023-01-17T12:27:08Z",
"stargazers_count": 71,
"watchers_count": 71,
"stargazers_count": 76,
"watchers_count": 76,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 71,
"watchers": 76,
"score": 0
}
]

View file

@ -13,7 +13,7 @@
"description": "Responsive FileManager v.9.9.5 vulnerable to CVE-2022-46604.",
"fork": false,
"created_at": "2023-02-03T08:56:16Z",
"updated_at": "2023-05-05T09:56:38Z",
"updated_at": "2023-06-09T05:36:33Z",
"pushed_at": "2023-04-09T23:34:28Z",
"stargazers_count": 1,
"watchers_count": 1,
@ -22,7 +22,11 @@
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"topics": [
"exploit",
"python3",
"responsivefilemanager"
],
"visibility": "public",
"forks": 0,
"watchers": 1,

View file

@ -71,10 +71,10 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2023-06-08T21:41:17Z",
"updated_at": "2023-06-09T00:56:16Z",
"pushed_at": "2023-02-21T04:16:19Z",
"stargazers_count": 807,
"watchers_count": 807,
"stargazers_count": 808,
"watchers_count": 808,
"has_discussions": false,
"forks_count": 56,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 56,
"watchers": 807,
"watchers": 808,
"score": 0
},
{

View file

@ -18,13 +18,13 @@
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 13,
"score": 0
},

View file

@ -71,10 +71,10 @@
"description": "CVE-2023-0386在ubuntu22.04上的提权",
"fork": false,
"created_at": "2023-05-05T03:02:13Z",
"updated_at": "2023-06-08T16:59:46Z",
"updated_at": "2023-06-09T05:41:30Z",
"pushed_at": "2023-05-08T07:19:34Z",
"stargazers_count": 315,
"watchers_count": 315,
"stargazers_count": 316,
"watchers_count": 316,
"has_discussions": false,
"forks_count": 54,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 54,
"watchers": 315,
"watchers": 316,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-01-10T15:59:26Z",
"updated_at": "2023-06-02T15:25:05Z",
"updated_at": "2023-06-09T03:04:16Z",
"pushed_at": "2023-01-13T09:01:20Z",
"stargazers_count": 278,
"watchers_count": 278,
"stargazers_count": 279,
"watchers_count": 279,
"has_discussions": false,
"forks_count": 61,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 61,
"watchers": 278,
"watchers": 279,
"score": 0
}
]

View file

@ -113,13 +113,13 @@
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 15,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-25157 - GeoServer SQL Injection - PoC",
"fork": false,
"created_at": "2023-06-06T14:05:09Z",
"updated_at": "2023-06-08T15:56:50Z",
"updated_at": "2023-06-09T05:23:11Z",
"pushed_at": "2023-06-08T09:05:21Z",
"stargazers_count": 79,
"watchers_count": 79,
"stargazers_count": 87,
"watchers_count": 87,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 79,
"watchers": 87,
"score": 0
}
]

View file

@ -76,7 +76,7 @@
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
"forks_count": 18,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -86,7 +86,7 @@
"wordpress-plugin"
],
"visibility": "public",
"forks": 18,
"forks": 19,
"watchers": 51,
"score": 0
},

View file

@ -13,19 +13,19 @@
"description": "Proof of Concept Code for CVE-2023-32353: Local privilege escalation via iTunes in Windows",
"fork": false,
"created_at": "2023-06-08T20:43:03Z",
"updated_at": "2023-06-08T20:49:30Z",
"updated_at": "2023-06-09T05:47:41Z",
"pushed_at": "2023-06-08T21:05:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"forks": 2,
"watchers": 4,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Original PoC for CVE-2023-32784",
"fork": false,
"created_at": "2023-05-01T17:08:55Z",
"updated_at": "2023-06-08T15:29:12Z",
"updated_at": "2023-06-09T06:00:23Z",
"pushed_at": "2023-06-03T23:23:11Z",
"stargazers_count": 465,
"watchers_count": 465,
"stargazers_count": 466,
"watchers_count": 466,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 38,
"watchers": 465,
"watchers": 466,
"score": 0
},
{

View file

@ -100,10 +100,10 @@
"description": "Apache RocketMQ 远程代码执行漏洞(CVE-2023-33246) Exploit",
"fork": false,
"created_at": "2023-06-01T06:27:09Z",
"updated_at": "2023-06-07T11:26:48Z",
"updated_at": "2023-06-09T06:27:32Z",
"pushed_at": "2023-06-01T05:54:25Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -112,7 +112,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 29,
"watchers": 32,
"score": 0
},
{
@ -191,10 +191,10 @@
"description": "RocketMQ RCE (CVE-2023-33246) woodpecker 利用插件",
"fork": false,
"created_at": "2023-06-05T09:23:25Z",
"updated_at": "2023-06-08T06:45:01Z",
"updated_at": "2023-06-09T01:12:36Z",
"pushed_at": "2023-06-08T06:27:15Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -203,7 +203,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 5,
"score": 0
},
{
@ -225,13 +225,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
}

35
2023/CVE-2023-34096.json Normal file
View file

@ -0,0 +1,35 @@
[
{
"id": 651325651,
"name": "Thruk-CVE-2023-34096",
"full_name": "galoget\/Thruk-CVE-2023-34096",
"owner": {
"login": "galoget",
"id": 8353133,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8353133?v=4",
"html_url": "https:\/\/github.com\/galoget"
},
"html_url": "https:\/\/github.com\/galoget\/Thruk-CVE-2023-34096",
"description": "Thruk Monitoring Web Interface <= 3.06 vulnerable to CVE-2023-34096 (Path Traversal).",
"fork": false,
"created_at": "2023-06-09T02:17:25Z",
"updated_at": "2023-06-09T05:36:40Z",
"pushed_at": "2023-06-09T05:16:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"exploit",
"python3",
"thruk"
],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
}
]

147
README.md
View file

@ -1677,6 +1677,14 @@ Kiwi TCMS is an open source test management system for both manual and automated
- [mnqazi/CVE-2023-33977](https://github.com/mnqazi/CVE-2023-33977)
### CVE-2023-34096 (2023-06-08)
<code>
Thruk is a multibackend monitoring webinterface which currently supports Naemon, Icinga, Shinken and Nagios as backends. In versions 3.06 and prior, the file `panorama.pm` is vulnerable to a Path Traversal vulnerability which allows an attacker to upload a file to any folder which has write permissions on the affected system. The parameter location is not filtered, validated or sanitized and it accepts any kind of characters. For a path traversal attack, the only characters required were the dot (`.`) and the slash (`/`). A fix is available in version 3.06.2.
</code>
- [galoget/Thruk-CVE-2023-34096](https://github.com/galoget/Thruk-CVE-2023-34096)
### CVE-2023-34362 (2023-06-02)
<code>
@ -8690,14 +8698,6 @@ NVIDIA GPU Display Driver for Linux, all versions, contains a vulnerability in t
- [pokerfaceSad/CVE-2021-1056](https://github.com/pokerfaceSad/CVE-2021-1056)
### CVE-2021-1480 (2021-04-08)
<code>
Multiple vulnerabilities in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to execute arbitrary code or allow an authenticated, local attacker to gain escalated privileges on an affected system. For more information about these vulnerabilities, see the Details section of this advisory.
</code>
- [xmco/sdwan-cve-2021-1480](https://github.com/xmco/sdwan-cve-2021-1480)
### CVE-2021-1497 (2021-05-06)
<code>
@ -8748,14 +8748,30 @@ Windows Print Spooler Elevation of Privilege Vulnerability
- [cube0x0/CVE-2021-1675](https://github.com/cube0x0/CVE-2021-1675)
- [LaresLLC/CVE-2021-1675](https://github.com/LaresLLC/CVE-2021-1675)
- [kondah/patch-cve-2021-1675](https://github.com/kondah/patch-cve-2021-1675)
- [evilashz/CVE-2021-1675-LPE-EXP](https://github.com/evilashz/CVE-2021-1675-LPE-EXP)
- [hlldz/CVE-2021-1675-LPE](https://github.com/hlldz/CVE-2021-1675-LPE)
- [puckiestyle/CVE-2021-1675](https://github.com/puckiestyle/CVE-2021-1675)
- [cybersecurityworks553/CVE-2021-1675_PrintNightMare](https://github.com/cybersecurityworks553/CVE-2021-1675_PrintNightMare)
- [calebstewart/CVE-2021-1675](https://github.com/calebstewart/CVE-2021-1675)
- [killtr0/CVE-2021-1675-PrintNightmare](https://github.com/killtr0/CVE-2021-1675-PrintNightmare)
- [corelight/CVE-2021-1675](https://github.com/corelight/CVE-2021-1675)
- [kougyokugentou/CVE-2021-1675](https://github.com/kougyokugentou/CVE-2021-1675)
- [ptter23/CVE-2021-1675](https://github.com/ptter23/CVE-2021-1675)
- [initconf/cve-2021-1675-printnightmare](https://github.com/initconf/cve-2021-1675-printnightmare)
- [ozergoker/PrintNightmare](https://github.com/ozergoker/PrintNightmare)
- [exploitblizzard/PrintNightmare-CVE-2021-1675](https://github.com/exploitblizzard/PrintNightmare-CVE-2021-1675)
- [edsonjt81/CVE-2021-1675](https://github.com/edsonjt81/CVE-2021-1675)
- [sailay1996/PrintNightmare-LPE](https://github.com/sailay1996/PrintNightmare-LPE)
- [JumpsecLabs/PrintNightmare](https://github.com/JumpsecLabs/PrintNightmare)
- [bartimusprimed/CVE-2021-1675-Yara](https://github.com/bartimusprimed/CVE-2021-1675-Yara)
- [k8gege/cve-2021-1675](https://github.com/k8gege/cve-2021-1675)
- [galoget/PrintNightmare-CVE-2021-1675-CVE-2021-34527](https://github.com/galoget/PrintNightmare-CVE-2021-1675-CVE-2021-34527)
- [hahaleyile/my-CVE-2021-1675](https://github.com/hahaleyile/my-CVE-2021-1675)
- [mstxq17/CVE-2021-1675_RDL_LPE](https://github.com/mstxq17/CVE-2021-1675_RDL_LPE)
- [ly4k/PrintNightmare](https://github.com/ly4k/PrintNightmare)
- [Wra7h/SharpPN](https://github.com/Wra7h/SharpPN)
- [OppressionBreedsResistance/CVE-2021-1675-PrintNightmare](https://github.com/OppressionBreedsResistance/CVE-2021-1675-PrintNightmare)
- [5l1v3r1/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler](https://github.com/5l1v3r1/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler)
- [eversinc33/NimNightmare](https://github.com/eversinc33/NimNightmare)
- [AndrewTrube/CVE-2021-1675](https://github.com/AndrewTrube/CVE-2021-1675)
- [TheJoyOfHacking/cube0x0-CVE-2021-1675](https://github.com/TheJoyOfHacking/cube0x0-CVE-2021-1675)
@ -8910,7 +8926,6 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
</code>
- [lz2y/CVE-2021-2394](https://github.com/lz2y/CVE-2021-2394)
- [freeide/CVE-2021-2394](https://github.com/freeide/CVE-2021-2394)
- [BabyTeam1024/CVE-2021-2394](https://github.com/BabyTeam1024/CVE-2021-2394)
- [fasanhlieu/CVE-2021-2394](https://github.com/fasanhlieu/CVE-2021-2394)
@ -8978,6 +8993,8 @@ Ignition before 2.5.2, as used in Laravel and other products, allows unauthentic
- [ambionics/laravel-exploits](https://github.com/ambionics/laravel-exploits)
- [SNCKER/CVE-2021-3129](https://github.com/SNCKER/CVE-2021-3129)
- [SecPros-Team/laravel-CVE-2021-3129-EXP](https://github.com/SecPros-Team/laravel-CVE-2021-3129-EXP)
- [crisprss/Laravel_CVE-2021-3129_EXP](https://github.com/crisprss/Laravel_CVE-2021-3129_EXP)
- [nth347/CVE-2021-3129_exploit](https://github.com/nth347/CVE-2021-3129_exploit)
- [FunPhishing/Laravel-8.4.2-rce-CVE-2021-3129](https://github.com/FunPhishing/Laravel-8.4.2-rce-CVE-2021-3129)
- [zhzyker/CVE-2021-3129](https://github.com/zhzyker/CVE-2021-3129)
@ -9025,8 +9042,10 @@ In Discourse 2.7.0 through beta1, a rate-limit bypass leads to a bypass of the 2
Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via &quot;sudoedit -s&quot; and a command-line argument that ends with a single backslash character.
</code>
- [mr-r3b00t/CVE-2021-3156](https://github.com/mr-r3b00t/CVE-2021-3156)
- [nexcess/sudo_cve-2021-3156](https://github.com/nexcess/sudo_cve-2021-3156)
- [reverse-ex/CVE-2021-3156](https://github.com/reverse-ex/CVE-2021-3156)
- [unauth401/CVE-2021-3156](https://github.com/unauth401/CVE-2021-3156)
- [ymrsmns/CVE-2021-3156](https://github.com/ymrsmns/CVE-2021-3156)
- [elbee-cyber/CVE-2021-3156-PATCHER](https://github.com/elbee-cyber/CVE-2021-3156-PATCHER)
- [kernelzeroday/CVE-2021-3156-Baron-Samedit](https://github.com/kernelzeroday/CVE-2021-3156-Baron-Samedit)
@ -9067,7 +9086,6 @@ Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based
- [ajtech-hue/CVE-2021-3156-Mitigation-ShellScript-Build](https://github.com/ajtech-hue/CVE-2021-3156-Mitigation-ShellScript-Build)
- [donghyunlee00/CVE-2021-3156](https://github.com/donghyunlee00/CVE-2021-3156)
- [TheFlash2k/CVE-2021-3156](https://github.com/TheFlash2k/CVE-2021-3156)
- [CyberCommands/CVE-2021-3156](https://github.com/CyberCommands/CVE-2021-3156)
- [0x7183/CVE-2021-3156](https://github.com/0x7183/CVE-2021-3156)
- [Y3A/CVE-2021-3156](https://github.com/Y3A/CVE-2021-3156)
- [redhawkeye/sudo-exploit](https://github.com/redhawkeye/sudo-exploit)
@ -9134,6 +9152,14 @@ sz.chat version 4 allows injection of web scripts and HTML in the message box.
- [rafaelchriss/CVE-2021-3279](https://github.com/rafaelchriss/CVE-2021-3279)
### CVE-2021-3281 (2021-02-02)
<code>
In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by &quot;startapp --template&quot; and &quot;startproject --template&quot;) allows directory traversal via an archive with absolute paths or relative paths with dot segments.
</code>
- [lwzSoviet/CVE-2021-3281](https://github.com/lwzSoviet/CVE-2021-3281)
### CVE-2021-3291 (2021-01-26)
<code>
@ -9199,7 +9225,6 @@ A cross-site scripting (XSS) vulnerability in Pryaniki 6.44.3 allows remote auth
A potential buffer overflow in the software drivers for certain HP LaserJet products and Samsung product printers could lead to an escalation of privilege.
</code>
- [TobiasS1402/CVE-2021-3438](https://github.com/TobiasS1402/CVE-2021-3438)
- [Exploitables/CVE-2021-3438](https://github.com/Exploitables/CVE-2021-3438)
### CVE-2021-3441 (2021-10-29)
@ -9245,6 +9270,7 @@ The overlayfs implementation in the linux kernel did not properly validate with
- [oneoy/CVE-2021-3493](https://github.com/oneoy/CVE-2021-3493)
- [Abdennour-py/CVE-2021-3493](https://github.com/Abdennour-py/CVE-2021-3493)
- [Ishan3011/CVE-2021-3493](https://github.com/Ishan3011/CVE-2021-3493)
- [inspiringz/CVE-2021-3493](https://github.com/inspiringz/CVE-2021-3493)
- [cerodah/overlayFS-CVE-2021-3493](https://github.com/cerodah/overlayFS-CVE-2021-3493)
- [puckiestyle/CVE-2021-3493](https://github.com/puckiestyle/CVE-2021-3493)
- [Senz4wa/CVE-2021-3493](https://github.com/Senz4wa/CVE-2021-3493)
@ -9266,10 +9292,6 @@ It was found that polkit could be tricked into bypassing the credential checks f
- [curtishoughton/CVE-2021-3560](https://github.com/curtishoughton/CVE-2021-3560)
- [Almorabea/Polkit-exploit](https://github.com/Almorabea/Polkit-exploit)
- [AssassinUKG/Polkit-CVE-2021-3560](https://github.com/AssassinUKG/Polkit-CVE-2021-3560)
- [cpu0x00/CVE-2021-3560](https://github.com/cpu0x00/CVE-2021-3560)
- [BizarreLove/CVE-2021-3560](https://github.com/BizarreLove/CVE-2021-3560)
- [0dayNinja/CVE-2021-3560](https://github.com/0dayNinja/CVE-2021-3560)
- [TomMalvoRiddle/CVE-2021-3560](https://github.com/TomMalvoRiddle/CVE-2021-3560)
- [chenaotian/CVE-2021-3560](https://github.com/chenaotian/CVE-2021-3560)
- [n3onhacks/CVE-2021-3560](https://github.com/n3onhacks/CVE-2021-3560)
- [f4T1H21/CVE-2021-3560-Polkit-DBus](https://github.com/f4T1H21/CVE-2021-3560-Polkit-DBus)
@ -9564,9 +9586,6 @@ An out-of-bounds (OOB) memory access flaw was found in the Linux kernel's eBPF d
### CVE-2021-6901
- [mooneee/cve-2021-6901](https://github.com/mooneee/cve-2021-6901)
### CVE-2021-10086
- [AK-blank/CVE-2021-10086](https://github.com/AK-blank/CVE-2021-10086)
### CVE-2021-20038 (2021-12-08)
<code>
@ -9874,7 +9893,6 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability in a v
- [password520/CVE-2021-21972](https://github.com/password520/CVE-2021-21972)
- [murataydemir/CVE-2021-21972](https://github.com/murataydemir/CVE-2021-21972)
- [pettyhacks/vSphereyeeter](https://github.com/pettyhacks/vSphereyeeter)
- [haiclover/CVE-2021-21972](https://github.com/haiclover/CVE-2021-21972)
- [orangmuda/CVE-2021-21972](https://github.com/orangmuda/CVE-2021-21972)
- [user16-et/cve-2021-21972_PoC](https://github.com/user16-et/cve-2021-21972_PoC)
- [Schira4396/VcenterKiller](https://github.com/Schira4396/VcenterKiller)
@ -9952,6 +9970,7 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability due to
- [xnianq/cve-2021-21985_exp](https://github.com/xnianq/cve-2021-21985_exp)
- [daedalus/CVE-2021-21985](https://github.com/daedalus/CVE-2021-21985)
- [testanull/Project_CVE-2021-21985_PoC](https://github.com/testanull/Project_CVE-2021-21985_PoC)
- [haiclover/CVE-2021-21985](https://github.com/haiclover/CVE-2021-21985)
- [sknux/CVE-2021-21985_PoC](https://github.com/sknux/CVE-2021-21985_PoC)
### CVE-2021-22005 (2021-09-23)
@ -10022,14 +10041,6 @@ An OS command injection vulnerability in FortiWeb's management interface 6.3.7 a
- [murataydemir/CVE-2021-22123](https://github.com/murataydemir/CVE-2021-22123)
### CVE-2021-22146 (2021-07-21)
<code>
All versions of Elastic Cloud Enterprise has the Elasticsearch “anonymous” user enabled by default in deployed clusters. While in the default setting the anonymous user has no permissions and is unable to successfully query any Elasticsearch APIs, an attacker could leverage the anonymous user to gain insight into certain details of a deployed cluster.
</code>
- [magichk/cve-2021-22146](https://github.com/magichk/cve-2021-22146)
### CVE-2021-22192 (2021-03-24)
<code>
@ -10056,7 +10067,6 @@ Improper neutralization of user data in the DjVu file format in ExifTool version
- [convisolabs/CVE-2021-22204-exiftool](https://github.com/convisolabs/CVE-2021-22204-exiftool)
- [se162xg/CVE-2021-22204](https://github.com/se162xg/CVE-2021-22204)
- [bilkoh/POC-CVE-2021-22204](https://github.com/bilkoh/POC-CVE-2021-22204)
- [PenTestical/CVE-2021-22204](https://github.com/PenTestical/CVE-2021-22204)
- [AssassinUKG/CVE-2021-22204](https://github.com/AssassinUKG/CVE-2021-22204)
- [ph-arm/CVE-2021-22204-Gitlab](https://github.com/ph-arm/CVE-2021-22204-Gitlab)
- [Asaad27/CVE-2021-22204-RSE](https://github.com/Asaad27/CVE-2021-22204-RSE)
@ -10153,7 +10163,6 @@ A improper input sanitization vulnerability exists in Rocket.Chat server 3.11, 3
</code>
- [CsEnox/CVE-2021-22911](https://github.com/CsEnox/CVE-2021-22911)
- [optionalCTF/Rocket.Chat-Automated-Account-Takeover-RCE-CVE-2021-22911](https://github.com/optionalCTF/Rocket.Chat-Automated-Account-Takeover-RCE-CVE-2021-22911)
- [jayngng/CVE-2021-22911](https://github.com/jayngng/CVE-2021-22911)
- [ChrisPritchard/CVE-2021-22911-rust](https://github.com/ChrisPritchard/CVE-2021-22911-rust)
- [MrDottt/CVE-2021-22911](https://github.com/MrDottt/CVE-2021-22911)
@ -10303,14 +10312,6 @@ Arbitrary file upload in the Modern Events Calendar Lite WordPress plugin, versi
- [dnr6419/CVE-2021-24145](https://github.com/dnr6419/CVE-2021-24145)
### CVE-2021-24155 (2021-04-05)
<code>
The WordPress Backup and Migrate Plugin Backup Guard WordPress plugin before 1.6.0 did not ensure that the imported files are of the SGBP format and extension, allowing high privilege users (admin+) to upload arbitrary files, including PHP ones, leading to RCE.
</code>
- [0dayNinja/CVE-2021-24155.rb](https://github.com/0dayNinja/CVE-2021-24155.rb)
### CVE-2021-24160 (2021-04-05)
<code>
@ -10328,6 +10329,14 @@ The All in One SEO Best WordPress SEO Plugin Easily Improve Your SEO Ran
- [darkpills/CVE-2021-24307-all-in-one-seo-pack-admin-rce](https://github.com/darkpills/CVE-2021-24307-all-in-one-seo-pack-admin-rce)
### CVE-2021-24347 (2021-06-14)
<code>
The SP Project &amp; Document Manager WordPress plugin before 4.22 allows users to upload files, however, the plugin attempts to prevent php and other similar files that could be executed on the server from being uploaded by checking the file extension. It was discovered that php files could still be uploaded by changing the file extension's case, for example, from &quot;php&quot; to &quot;pHP&quot;.
</code>
- [huydoppa/CVE-2021-24347-](https://github.com/huydoppa/CVE-2021-24347-)
### CVE-2021-24499 (2021-08-09)
<code>
@ -11036,14 +11045,6 @@ Windows NTFS Denial of Service Vulnerability
- [shubham0d/CVE-2021-28312](https://github.com/shubham0d/CVE-2021-28312)
### CVE-2021-28378 (2021-03-15)
<code>
Gitea 1.12.x and 1.13.x before 1.13.4 allows XSS via certain issue data in some situations.
</code>
- [pandatix/CVE-2021-28378](https://github.com/pandatix/CVE-2021-28378)
### CVE-2021-28476 (2021-05-11)
<code>
@ -11282,7 +11283,6 @@ Type confusion in V8 in Google Chrome prior to 91.0.4472.101 allowed a remote at
Use after free in GPU in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
</code>
- [s4e-lab/CVE-2021-30573-PoC-Google-Chrome](https://github.com/s4e-lab/CVE-2021-30573-PoC-Google-Chrome)
- [orangmuda/CVE-2021-30573](https://github.com/orangmuda/CVE-2021-30573)
- [kh4sh3i/CVE-2021-30573](https://github.com/kh4sh3i/CVE-2021-30573)
@ -11438,14 +11438,6 @@ A cross-site scripting (XSS) vulnerability has been reported and confirmed for B
- [karthi-the-hacker/CVE-2021-31589](https://github.com/karthi-the-hacker/CVE-2021-31589)
### CVE-2021-31630 (2021-08-03)
<code>
Command Injection in Open PLC Webserver v3 allows remote attackers to execute arbitrary code via the &quot;Hardware Layer Code Box&quot; component on the &quot;/hardware&quot; page of the application.
</code>
- [h3v0x/CVE-2021-31630-OpenPLC_RCE](https://github.com/h3v0x/CVE-2021-31630-OpenPLC_RCE)
### CVE-2021-31728 (2021-05-17)
<code>
@ -11842,14 +11834,6 @@ For Eclipse Jetty versions 9.4.37-9.4.42, 10.0.1-10.0.5 &amp; 11.0.1-11.0.5, URI
- [ColdFusionX/CVE-2021-34429](https://github.com/ColdFusionX/CVE-2021-34429)
### CVE-2021-34470 (2021-07-14)
<code>
Microsoft Exchange Server Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-33768, CVE-2021-34523.
</code>
- [technion/CVE-2021-34470scanner](https://github.com/technion/CVE-2021-34470scanner)
### CVE-2021-34473 (2021-07-14)
<code>
@ -11896,8 +11880,16 @@ Microsoft Exchange Server Elevation of Privilege Vulnerability This CVE ID is un
Windows Print Spooler Remote Code Execution Vulnerability
</code>
- [JohnHammond/CVE-2021-34527](https://github.com/JohnHammond/CVE-2021-34527)
- [nemo-wq/PrintNightmare-CVE-2021-34527](https://github.com/nemo-wq/PrintNightmare-CVE-2021-34527)
- [CnOxx1/CVE-2021-34527-1675](https://github.com/CnOxx1/CVE-2021-34527-1675)
- [rdboboia/disable-RegisterSpoolerRemoteRpcEndPoint](https://github.com/rdboboia/disable-RegisterSpoolerRemoteRpcEndPoint)
- [geekbrett/CVE-2021-34527-PrintNightmare-Workaround](https://github.com/geekbrett/CVE-2021-34527-PrintNightmare-Workaround)
- [byt3bl33d3r/ItWasAllADream](https://github.com/byt3bl33d3r/ItWasAllADream)
- [vinaysudheer/Disable-Spooler-Service-PrintNightmare-CVE-2021-34527](https://github.com/vinaysudheer/Disable-Spooler-Service-PrintNightmare-CVE-2021-34527)
- [glorisonlai/printnightmare](https://github.com/glorisonlai/printnightmare)
- [Eutectico/Printnightmare](https://github.com/Eutectico/Printnightmare)
- [syntaxbearror/PowerShell-PrintNightmare](https://github.com/syntaxbearror/PowerShell-PrintNightmare)
- [Tomparte/PrintNightmare](https://github.com/Tomparte/PrintNightmare)
- [Amaranese/CVE-2021-34527](https://github.com/Amaranese/CVE-2021-34527)
- [cyb3rpeace/CVE-2021-34527](https://github.com/cyb3rpeace/CVE-2021-34527)
@ -11951,6 +11943,7 @@ Istio (1.8.x, 1.9.0-1.9.5 and 1.10.0-1.10.1) contains a remotely exploitable vul
Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application.
</code>
- [YouGina/CVE-2021-35042](https://github.com/YouGina/CVE-2021-35042)
- [mrlihd/CVE-2021-35042](https://github.com/mrlihd/CVE-2021-35042)
- [r4vi/CVE-2021-35042](https://github.com/r4vi/CVE-2021-35042)
- [Zh0ngS0n1337/CVE-2021-35042](https://github.com/Zh0ngS0n1337/CVE-2021-35042)
@ -12152,13 +12145,7 @@ Windows Elevation of Privilege Vulnerability
- [HuskyHacks/ShadowSteal](https://github.com/HuskyHacks/ShadowSteal)
- [JoranSlingerland/CVE-2021-36934](https://github.com/JoranSlingerland/CVE-2021-36934)
- [WiredPulse/Invoke-HiveNightmare](https://github.com/WiredPulse/Invoke-HiveNightmare)
- [tda90/CVE-2021-36934](https://github.com/tda90/CVE-2021-36934)
- [0x0D1n/CVE-2021-36934](https://github.com/0x0D1n/CVE-2021-36934)
- [exploitblizzard/CVE-2021-36934](https://github.com/exploitblizzard/CVE-2021-36934)
- [irissentinel/CVE-2021-36934](https://github.com/irissentinel/CVE-2021-36934)
- [websecnl/CVE-2021-36934](https://github.com/websecnl/CVE-2021-36934)
- [grishinpv/poc_CVE-2021-36934](https://github.com/grishinpv/poc_CVE-2021-36934)
- [shaktavist/SeriousSam](https://github.com/shaktavist/SeriousSam)
- [OlivierLaflamme/CVE-2021-36934-export-shadow-volume-POC](https://github.com/OlivierLaflamme/CVE-2021-36934-export-shadow-volume-POC)
- [chron1k/oxide_hive](https://github.com/chron1k/oxide_hive)
@ -12186,14 +12173,6 @@ In the server in SerNet verinice before 1.22.2, insecure Java deserialization al
- [0xBrAinsTorM/CVE-2021-36981](https://github.com/0xBrAinsTorM/CVE-2021-36981)
### CVE-2021-37152 (2021-08-10)
<code>
Multiple XSS issues exist in Sonatype Nexus Repository Manager 3 before 3.33.0. An authenticated attacker with the ability to add HTML files to a repository could redirect users to Nexus Repository Managers pages with code modifications.
</code>
- [SecurityAnalysts/CVE-2021-37152](https://github.com/SecurityAnalysts/CVE-2021-37152)
### CVE-2021-37580 (2021-11-16)
<code>
@ -12248,14 +12227,6 @@ A SQL injection vulnerability exists in version 3.0.2 of Hotel Druid when SQLite
- [dievus/CVE-2021-37832](https://github.com/dievus/CVE-2021-37832)
- [AK-blank/CVE-2021-37832](https://github.com/AK-blank/CVE-2021-37832)
### CVE-2021-37833 (2021-08-03)
<code>
A reflected cross-site scripting (XSS) vulnerability exists in multiple pages in version 3.0.2 of the Hotel Druid application that allows for arbitrary execution of JavaScript commands.
</code>
- [dievus/CVE-2021-37833](https://github.com/dievus/CVE-2021-37833)
### CVE-2021-37910 (2021-11-11)
<code>
@ -12290,14 +12261,6 @@ Inappropriate implementation in V8 in Google Chrome prior to 95.0.4638.69 allowe
- [SpiralBL0CK/Chrome-V8-RCE-CVE-2021-38003](https://github.com/SpiralBL0CK/Chrome-V8-RCE-CVE-2021-38003)
### CVE-2021-38149 (2021-08-06)
<code>
index.php/admin/add_user in Chikitsa Patient Management System 2.0.0 allows XSS.
</code>
- [jboogie15/CVE-2021-38149](https://github.com/jboogie15/CVE-2021-38149)
### CVE-2021-38163 (2021-09-14)
<code>