mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2023/06/09 06:44:48
This commit is contained in:
parent
03e17e1bda
commit
4f82de3374
55 changed files with 1178 additions and 989 deletions
|
@ -71,10 +71,10 @@
|
|||
"description": "Unsigned driver loader using CVE-2018-19320",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-12T05:48:13Z",
|
||||
"updated_at": "2023-06-07T09:10:53Z",
|
||||
"updated_at": "2023-06-09T01:36:36Z",
|
||||
"pushed_at": "2023-04-09T13:50:29Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 55,
|
||||
"watchers": 56,
|
||||
"score": 0
|
||||
}
|
||||
]
|
File diff suppressed because one or more lines are too long
|
@ -13,19 +13,19 @@
|
|||
"description": "Local privilege escalation PoC exploit for CVE-2019-16098",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-10T15:57:36Z",
|
||||
"updated_at": "2023-05-30T07:01:10Z",
|
||||
"updated_at": "2023-06-09T02:35:50Z",
|
||||
"pushed_at": "2019-09-13T20:05:43Z",
|
||||
"stargazers_count": 174,
|
||||
"watchers_count": 174,
|
||||
"stargazers_count": 175,
|
||||
"watchers_count": 175,
|
||||
"has_discussions": false,
|
||||
"forks_count": 54,
|
||||
"forks_count": 56,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 54,
|
||||
"watchers": 174,
|
||||
"forks": 56,
|
||||
"watchers": 175,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -47,7 +47,7 @@
|
|||
"stargazers_count": 3775,
|
||||
"watchers_count": 3775,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1083,
|
||||
"forks_count": 1082,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -73,7 +73,7 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1083,
|
||||
"forks": 1082,
|
||||
"watchers": 3775,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Programa ideal para robar toda la información de un dispositivo remotamente a través de la aplicación AirDroid. [CVE-2019-9599] (https:\/\/www.exploit-db.com\/exploits\/46337)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-09T02:18:37Z",
|
||||
"updated_at": "2023-05-01T11:37:40Z",
|
||||
"updated_at": "2023-06-09T00:51:26Z",
|
||||
"pushed_at": "2019-11-03T17:29:56Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 34,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -18,7 +18,7 @@
|
|||
"stargazers_count": 3775,
|
||||
"watchers_count": 3775,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1083,
|
||||
"forks_count": 1082,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1083,
|
||||
"forks": 1082,
|
||||
"watchers": 3775,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -121,10 +121,10 @@
|
|||
"description": "Weblogic IIOP CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-28T08:46:21Z",
|
||||
"updated_at": "2023-06-06T01:19:45Z",
|
||||
"updated_at": "2023-06-09T02:07:04Z",
|
||||
"pushed_at": "2020-04-07T03:32:24Z",
|
||||
"stargazers_count": 327,
|
||||
"watchers_count": 327,
|
||||
"stargazers_count": 328,
|
||||
"watchers_count": 328,
|
||||
"has_discussions": false,
|
||||
"forks_count": 77,
|
||||
"allow_forking": true,
|
||||
|
@ -133,7 +133,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 77,
|
||||
"watchers": 327,
|
||||
"watchers": 328,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,31 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 390713933,
|
||||
"name": "sdwan-cve-2021-1480",
|
||||
"full_name": "xmco\/sdwan-cve-2021-1480",
|
||||
"owner": {
|
||||
"login": "xmco",
|
||||
"id": 20705504,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20705504?v=4",
|
||||
"html_url": "https:\/\/github.com\/xmco"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xmco\/sdwan-cve-2021-1480",
|
||||
"description": "PoC materials to exploit the CVE-2021-1480 on Cico SD-WAN.",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-29T12:17:50Z",
|
||||
"updated_at": "2022-07-02T18:05:42Z",
|
||||
"pushed_at": "2021-08-02T16:14:44Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -115,6 +115,82 @@
|
|||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 381971547,
|
||||
"name": "CVE-2021-1675-LPE-EXP",
|
||||
"full_name": "evilashz\/CVE-2021-1675-LPE-EXP",
|
||||
"owner": {
|
||||
"login": "evilashz",
|
||||
"id": 50722929,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50722929?v=4",
|
||||
"html_url": "https:\/\/github.com\/evilashz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/evilashz\/CVE-2021-1675-LPE-EXP",
|
||||
"description": "PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T09:00:31Z",
|
||||
"updated_at": "2023-05-19T15:16:57Z",
|
||||
"pushed_at": "2021-07-02T10:47:36Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2021-1675",
|
||||
"cve-2021-34527",
|
||||
"hacktool",
|
||||
"lpe",
|
||||
"printnightmare",
|
||||
"redteam",
|
||||
"redteam-tools",
|
||||
"windows"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 54,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 381984439,
|
||||
"name": "CVE-2021-1675-LPE",
|
||||
"full_name": "hlldz\/CVE-2021-1675-LPE",
|
||||
"owner": {
|
||||
"login": "hlldz",
|
||||
"id": 16455559,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16455559?v=4",
|
||||
"html_url": "https:\/\/github.com\/hlldz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hlldz\/CVE-2021-1675-LPE",
|
||||
"description": "Local Privilege Escalation Edition for CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T09:47:13Z",
|
||||
"updated_at": "2023-06-07T08:18:18Z",
|
||||
"pushed_at": "2021-07-05T06:46:12Z",
|
||||
"stargazers_count": 333,
|
||||
"watchers_count": 333,
|
||||
"has_discussions": false,
|
||||
"forks_count": 80,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cobaltstrike",
|
||||
"cve-2021-1675",
|
||||
"cve-2021-34527",
|
||||
"exploit",
|
||||
"lpe",
|
||||
"printnightmare",
|
||||
"reflectivedll",
|
||||
"windows"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 80,
|
||||
"watchers": 333,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 382024474,
|
||||
"name": "CVE-2021-1675",
|
||||
|
@ -173,6 +249,238 @@
|
|||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 382182179,
|
||||
"name": "CVE-2021-1675",
|
||||
"full_name": "calebstewart\/CVE-2021-1675",
|
||||
"owner": {
|
||||
"login": "calebstewart",
|
||||
"id": 7529189,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7529189?v=4",
|
||||
"html_url": "https:\/\/github.com\/calebstewart"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/calebstewart\/CVE-2021-1675",
|
||||
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T23:45:58Z",
|
||||
"updated_at": "2023-06-08T19:59:35Z",
|
||||
"pushed_at": "2021-07-05T08:54:06Z",
|
||||
"stargazers_count": 911,
|
||||
"watchers_count": 911,
|
||||
"has_discussions": false,
|
||||
"forks_count": 230,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 230,
|
||||
"watchers": 911,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 382399375,
|
||||
"name": "CVE-2021-1675-PrintNightmare",
|
||||
"full_name": "killtr0\/CVE-2021-1675-PrintNightmare",
|
||||
"owner": {
|
||||
"login": "killtr0",
|
||||
"id": 22793707,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22793707?v=4",
|
||||
"html_url": "https:\/\/github.com\/killtr0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/killtr0\/CVE-2021-1675-PrintNightmare",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-02T16:12:15Z",
|
||||
"updated_at": "2021-12-08T22:23:08Z",
|
||||
"pushed_at": "2021-07-02T16:12:59Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 382407157,
|
||||
"name": "CVE-2021-1675",
|
||||
"full_name": "corelight\/CVE-2021-1675",
|
||||
"owner": {
|
||||
"login": "corelight",
|
||||
"id": 21672558,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
|
||||
"html_url": "https:\/\/github.com\/corelight"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/corelight\/CVE-2021-1675",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-02T16:44:24Z",
|
||||
"updated_at": "2022-06-03T07:11:00Z",
|
||||
"pushed_at": "2021-07-09T14:17:40Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 382418030,
|
||||
"name": "CVE-2021-1675",
|
||||
"full_name": "kougyokugentou\/CVE-2021-1675",
|
||||
"owner": {
|
||||
"login": "kougyokugentou",
|
||||
"id": 41278462,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41278462?v=4",
|
||||
"html_url": "https:\/\/github.com\/kougyokugentou"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kougyokugentou\/CVE-2021-1675",
|
||||
"description": "A small powershell script to disable print spooler service using desired state configuration",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-02T17:29:04Z",
|
||||
"updated_at": "2021-12-22T20:12:23Z",
|
||||
"pushed_at": "2021-07-02T17:40:09Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 382425733,
|
||||
"name": "CVE-2021-1675",
|
||||
"full_name": "ptter23\/CVE-2021-1675",
|
||||
"owner": {
|
||||
"login": "ptter23",
|
||||
"id": 55167410,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55167410?v=4",
|
||||
"html_url": "https:\/\/github.com\/ptter23"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ptter23\/CVE-2021-1675",
|
||||
"description": "CVE-2021-1675: ZERO-DAY VULNERABILITY IN WINDOWS PRINTER SERVICE WITH AN EXPLOIT AVAILABLE IN ALL OPERATING SYSTEM VERSIONS",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-02T18:01:21Z",
|
||||
"updated_at": "2021-10-24T04:58:56Z",
|
||||
"pushed_at": "2021-07-02T18:07:45Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 382496518,
|
||||
"name": "cve-2021-1675-printnightmare",
|
||||
"full_name": "initconf\/cve-2021-1675-printnightmare",
|
||||
"owner": {
|
||||
"login": "initconf",
|
||||
"id": 4044729,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4044729?v=4",
|
||||
"html_url": "https:\/\/github.com\/initconf"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/initconf\/cve-2021-1675-printnightmare",
|
||||
"description": "to catch cve-2021-1675-printnightmare",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-03T01:04:06Z",
|
||||
"updated_at": "2021-10-24T06:03:36Z",
|
||||
"pushed_at": "2021-07-03T01:08:43Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 382609559,
|
||||
"name": "PrintNightmare",
|
||||
"full_name": "ozergoker\/PrintNightmare",
|
||||
"owner": {
|
||||
"login": "ozergoker",
|
||||
"id": 86879266,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86879266?v=4",
|
||||
"html_url": "https:\/\/github.com\/ozergoker"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ozergoker\/PrintNightmare",
|
||||
"description": "Windows Print Spooler Service RCE CVE-2021-1675 (PrintNightmare)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-03T12:25:21Z",
|
||||
"updated_at": "2022-06-10T10:41:21Z",
|
||||
"pushed_at": "2021-07-03T12:43:26Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 382815972,
|
||||
"name": "PrintNightmare-CVE-2021-1675",
|
||||
"full_name": "exploitblizzard\/PrintNightmare-CVE-2021-1675",
|
||||
"owner": {
|
||||
"login": "exploitblizzard",
|
||||
"id": 61627070,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61627070?v=4",
|
||||
"html_url": "https:\/\/github.com\/exploitblizzard"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/exploitblizzard\/PrintNightmare-CVE-2021-1675",
|
||||
"description": "Youtube : https:\/\/youtu.be\/Zr0KjYDSFKQ",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-04T09:50:39Z",
|
||||
"updated_at": "2023-02-22T14:39:26Z",
|
||||
"pushed_at": "2021-07-04T09:57:46Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 383128850,
|
||||
"name": "CVE-2021-1675",
|
||||
|
@ -202,6 +510,156 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 383165321,
|
||||
"name": "PrintNightmare-LPE",
|
||||
"full_name": "sailay1996\/PrintNightmare-LPE",
|
||||
"owner": {
|
||||
"login": "sailay1996",
|
||||
"id": 16739401,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16739401?v=4",
|
||||
"html_url": "https:\/\/github.com\/sailay1996"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sailay1996\/PrintNightmare-LPE",
|
||||
"description": "CVE-2021-1675 (PrintNightmare)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-05T14:17:03Z",
|
||||
"updated_at": "2023-03-01T01:46:49Z",
|
||||
"pushed_at": "2021-07-05T14:34:34Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"local-privilege-escalation",
|
||||
"printnightmare",
|
||||
"windows-exploitation",
|
||||
"windows-privilege-escalation"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 73,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 383728669,
|
||||
"name": "PrintNightmare",
|
||||
"full_name": "JumpsecLabs\/PrintNightmare",
|
||||
"owner": {
|
||||
"login": "JumpsecLabs",
|
||||
"id": 49488209,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49488209?v=4",
|
||||
"html_url": "https:\/\/github.com\/JumpsecLabs"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JumpsecLabs\/PrintNightmare",
|
||||
"description": "Information on the Windows Spooler vulnerability - CVE-2021-1675; CVE 2021 34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-07T08:32:09Z",
|
||||
"updated_at": "2023-02-01T21:50:16Z",
|
||||
"pushed_at": "2021-07-12T09:28:16Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 384183711,
|
||||
"name": "CVE-2021-1675-Yara",
|
||||
"full_name": "bartimusprimed\/CVE-2021-1675-Yara",
|
||||
"owner": {
|
||||
"login": "bartimusprimed",
|
||||
"id": 465079,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/465079?v=4",
|
||||
"html_url": "https:\/\/github.com\/bartimusprimed"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bartimusprimed\/CVE-2021-1675-Yara",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-08T16:18:52Z",
|
||||
"updated_at": "2021-10-24T06:06:38Z",
|
||||
"pushed_at": "2021-07-08T16:19:45Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 384854320,
|
||||
"name": "cve-2021-1675",
|
||||
"full_name": "k8gege\/cve-2021-1675",
|
||||
"owner": {
|
||||
"login": "k8gege",
|
||||
"id": 42312878,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42312878?v=4",
|
||||
"html_url": "https:\/\/github.com\/k8gege"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/k8gege\/cve-2021-1675",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-11T03:48:25Z",
|
||||
"updated_at": "2022-11-18T11:29:48Z",
|
||||
"pushed_at": "2021-07-11T03:49:44Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 385174791,
|
||||
"name": "PrintNightmare-CVE-2021-1675-CVE-2021-34527",
|
||||
"full_name": "galoget\/PrintNightmare-CVE-2021-1675-CVE-2021-34527",
|
||||
"owner": {
|
||||
"login": "galoget",
|
||||
"id": 8353133,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8353133?v=4",
|
||||
"html_url": "https:\/\/github.com\/galoget"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/galoget\/PrintNightmare-CVE-2021-1675-CVE-2021-34527",
|
||||
"description": "CVE-2021-1675 \/ CVE-2021-34527 - PrintNightmare Python, C# and PowerShell Exploits Implementations (LPE & RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-12T08:18:40Z",
|
||||
"updated_at": "2021-10-24T06:07:00Z",
|
||||
"pushed_at": "2021-07-12T08:35:30Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 388427598,
|
||||
"name": "my-CVE-2021-1675",
|
||||
|
@ -350,6 +808,35 @@
|
|||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 420590964,
|
||||
"name": "CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler",
|
||||
"full_name": "5l1v3r1\/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler",
|
||||
"owner": {
|
||||
"login": "5l1v3r1",
|
||||
"id": 34143537,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
|
||||
"html_url": "https:\/\/github.com\/5l1v3r1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler",
|
||||
"description": "Temporary mitigation to the CVE-2021-1675. 'Spooler' service-disabled based on time schedule. PowerShell Scripts and Task Scheduler code provided. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-24T04:59:15Z",
|
||||
"updated_at": "2021-10-24T04:59:16Z",
|
||||
"pushed_at": "2021-07-05T05:41:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 435194981,
|
||||
"name": "NimNightmare",
|
||||
|
|
|
@ -672,35 +672,6 @@
|
|||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 389736878,
|
||||
"name": "CVE-2021-21972",
|
||||
"full_name": "haiclover\/CVE-2021-21972",
|
||||
"owner": {
|
||||
"login": "haiclover",
|
||||
"id": 20736458,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20736458?v=4",
|
||||
"html_url": "https:\/\/github.com\/haiclover"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/haiclover\/CVE-2021-21972",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-26T18:48:28Z",
|
||||
"updated_at": "2023-03-08T02:48:17Z",
|
||||
"pushed_at": "2021-08-02T17:45:59Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 413216838,
|
||||
"name": "CVE-2021-21972",
|
||||
|
|
|
@ -213,6 +213,35 @@
|
|||
"watchers": 32,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 384003238,
|
||||
"name": "CVE-2021-21985",
|
||||
"full_name": "haiclover\/CVE-2021-21985",
|
||||
"owner": {
|
||||
"login": "haiclover",
|
||||
"id": 20736458,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20736458?v=4",
|
||||
"html_url": "https:\/\/github.com\/haiclover"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/haiclover\/CVE-2021-21985",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-08T04:45:19Z",
|
||||
"updated_at": "2023-03-08T02:48:17Z",
|
||||
"pushed_at": "2021-07-12T11:04:36Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 426353517,
|
||||
"name": "CVE-2021-21985_PoC",
|
||||
|
|
|
@ -1,31 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 388358547,
|
||||
"name": "cve-2021-22146",
|
||||
"full_name": "magichk\/cve-2021-22146",
|
||||
"owner": {
|
||||
"login": "magichk",
|
||||
"id": 17543960,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17543960?v=4",
|
||||
"html_url": "https:\/\/github.com\/magichk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/magichk\/cve-2021-22146",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-22T06:50:34Z",
|
||||
"updated_at": "2023-01-31T11:19:23Z",
|
||||
"pushed_at": "2021-07-26T16:27:49Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -89,35 +89,6 @@
|
|||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 391882871,
|
||||
"name": "CVE-2021-22204",
|
||||
"full_name": "PenTestical\/CVE-2021-22204",
|
||||
"owner": {
|
||||
"login": "PenTestical",
|
||||
"id": 57206134,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57206134?v=4",
|
||||
"html_url": "https:\/\/github.com\/PenTestical"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/PenTestical\/CVE-2021-22204",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-08-02T09:11:27Z",
|
||||
"updated_at": "2022-07-21T00:41:01Z",
|
||||
"pushed_at": "2021-08-02T13:30:30Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 392061786,
|
||||
"name": "CVE-2021-22204",
|
||||
|
|
|
@ -71,10 +71,10 @@
|
|||
"description": "CVE-2021-22205 Unauthorized RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-28T14:02:51Z",
|
||||
"updated_at": "2022-11-09T18:14:14Z",
|
||||
"updated_at": "2023-06-09T02:06:57Z",
|
||||
"pushed_at": "2021-10-28T14:20:05Z",
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 70,
|
||||
"watchers": 71,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -28,35 +28,6 @@
|
|||
"watchers": 49,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 391193611,
|
||||
"name": "Rocket.Chat-Automated-Account-Takeover-RCE-CVE-2021-22911",
|
||||
"full_name": "optionalCTF\/Rocket.Chat-Automated-Account-Takeover-RCE-CVE-2021-22911",
|
||||
"owner": {
|
||||
"login": "optionalCTF",
|
||||
"id": 45684709,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45684709?v=4",
|
||||
"html_url": "https:\/\/github.com\/optionalCTF"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/optionalCTF\/Rocket.Chat-Automated-Account-Takeover-RCE-CVE-2021-22911",
|
||||
"description": "Full unauthenticated RCE proof of concept for Rocket.Chat 3.12.1 CVE-2021-22911",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-30T21:44:18Z",
|
||||
"updated_at": "2022-02-28T15:50:54Z",
|
||||
"pushed_at": "2021-07-30T22:00:52Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 408111498,
|
||||
"name": "CVE-2021-22911",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-15T15:40:45Z",
|
||||
"updated_at": "2023-05-18T08:47:38Z",
|
||||
"updated_at": "2023-06-09T04:00:58Z",
|
||||
"pushed_at": "2021-12-15T16:37:09Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 7,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -28,35 +28,6 @@
|
|||
"watchers": 38,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 391813400,
|
||||
"name": "CVE-2021-2394",
|
||||
"full_name": "freeide\/CVE-2021-2394",
|
||||
"owner": {
|
||||
"login": "freeide",
|
||||
"id": 33774184,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33774184?v=4",
|
||||
"html_url": "https:\/\/github.com\/freeide"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/freeide\/CVE-2021-2394",
|
||||
"description": "POC of CVE-2021-2394",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-02T04:19:11Z",
|
||||
"updated_at": "2023-01-05T14:20:28Z",
|
||||
"pushed_at": "2021-08-02T02:47:54Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 394009215,
|
||||
"name": "CVE-2021-2394",
|
||||
|
|
|
@ -1,31 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 391040356,
|
||||
"name": "CVE-2021-24155.rb",
|
||||
"full_name": "0dayNinja\/CVE-2021-24155.rb",
|
||||
"owner": {
|
||||
"login": "0dayNinja",
|
||||
"id": 88158703,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88158703?v=4",
|
||||
"html_url": "https:\/\/github.com\/0dayNinja"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0dayNinja\/CVE-2021-24155.rb",
|
||||
"description": "WordPress Backup Guard Authenticated Remote Code Execution Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-30T11:28:53Z",
|
||||
"updated_at": "2022-11-18T13:06:04Z",
|
||||
"pushed_at": "2021-07-30T11:35:54Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,20 +1,20 @@
|
|||
[
|
||||
{
|
||||
"id": 432034471,
|
||||
"name": "CVE-2021-10086",
|
||||
"full_name": "AK-blank\/CVE-2021-10086",
|
||||
"id": 385186614,
|
||||
"name": "CVE-2021-24347-",
|
||||
"full_name": "huydoppa\/CVE-2021-24347-",
|
||||
"owner": {
|
||||
"login": "AK-blank",
|
||||
"id": 56591429,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56591429?v=4",
|
||||
"html_url": "https:\/\/github.com\/AK-blank"
|
||||
"login": "huydoppa",
|
||||
"id": 58453296,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58453296?v=4",
|
||||
"html_url": "https:\/\/github.com\/huydoppa"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AK-blank\/CVE-2021-10086",
|
||||
"html_url": "https:\/\/github.com\/huydoppa\/CVE-2021-24347-",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-11-26T02:43:58Z",
|
||||
"updated_at": "2023-04-28T02:53:28Z",
|
||||
"pushed_at": "2021-08-05T06:47:48Z",
|
||||
"created_at": "2021-07-12T09:02:47Z",
|
||||
"updated_at": "2021-07-12T09:04:13Z",
|
||||
"pushed_at": "2021-07-12T09:04:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
|
@ -1,31 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 391631988,
|
||||
"name": "CVE-2021-28378",
|
||||
"full_name": "pandatix\/CVE-2021-28378",
|
||||
"owner": {
|
||||
"login": "pandatix",
|
||||
"id": 57038071,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57038071?v=4",
|
||||
"html_url": "https:\/\/github.com\/pandatix"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pandatix\/CVE-2021-28378",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-08-01T13:16:53Z",
|
||||
"updated_at": "2022-02-28T14:22:43Z",
|
||||
"pushed_at": "2021-08-07T14:28:09Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,33 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 390723249,
|
||||
"name": "CVE-2021-30573-PoC-Google-Chrome",
|
||||
"full_name": "s4e-lab\/CVE-2021-30573-PoC-Google-Chrome",
|
||||
"owner": {
|
||||
"login": "s4e-lab",
|
||||
"id": 75635867,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75635867?v=4",
|
||||
"html_url": "https:\/\/github.com\/s4e-lab"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/s4e-lab\/CVE-2021-30573-PoC-Google-Chrome",
|
||||
"description": "Google Chrome Use After Free vulnerability reported by S4E Team",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-29T12:53:13Z",
|
||||
"updated_at": "2022-06-03T05:23:09Z",
|
||||
"pushed_at": "2021-07-29T13:18:38Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 421034424,
|
||||
"name": "CVE-2021-30573",
|
||||
|
|
|
@ -57,6 +57,64 @@
|
|||
"watchers": 119,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 332682252,
|
||||
"name": "laravel-CVE-2021-3129-EXP",
|
||||
"full_name": "SecPros-Team\/laravel-CVE-2021-3129-EXP",
|
||||
"owner": {
|
||||
"login": "SecPros-Team",
|
||||
"id": 77960183,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77960183?v=4",
|
||||
"html_url": "https:\/\/github.com\/SecPros-Team"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SecPros-Team\/laravel-CVE-2021-3129-EXP",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-25T08:42:28Z",
|
||||
"updated_at": "2023-04-29T15:27:22Z",
|
||||
"pushed_at": "2021-01-25T08:49:59Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 57,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 333316985,
|
||||
"name": "Laravel_CVE-2021-3129_EXP",
|
||||
"full_name": "crisprss\/Laravel_CVE-2021-3129_EXP",
|
||||
"owner": {
|
||||
"login": "crisprss",
|
||||
"id": 55953931,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55953931?v=4",
|
||||
"html_url": "https:\/\/github.com\/crisprss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/crisprss\/Laravel_CVE-2021-3129_EXP",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-27T05:44:52Z",
|
||||
"updated_at": "2022-11-09T18:11:00Z",
|
||||
"pushed_at": "2021-01-27T06:23:34Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 333380316,
|
||||
"name": "CVE-2021-3129_exploit",
|
||||
|
|
|
@ -1,4 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 333199828,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "mr-r3b00t\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "mr-r3b00t",
|
||||
"id": 14963690,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14963690?v=4",
|
||||
"html_url": "https:\/\/github.com\/mr-r3b00t"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mr-r3b00t\/CVE-2021-3156",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-26T19:53:04Z",
|
||||
"updated_at": "2022-10-10T22:30:28Z",
|
||||
"pushed_at": "2021-01-26T20:09:53Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 333450928,
|
||||
"name": "sudo_cve-2021-3156",
|
||||
|
@ -57,6 +86,35 @@
|
|||
"watchers": 114,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 333492305,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "unauth401\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "unauth401",
|
||||
"id": 61272656,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61272656?v=4",
|
||||
"html_url": "https:\/\/github.com\/unauth401"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/unauth401\/CVE-2021-3156",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-27T16:35:43Z",
|
||||
"updated_at": "2022-11-09T18:11:00Z",
|
||||
"pushed_at": "2021-01-27T15:19:23Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 333557918,
|
||||
"name": "CVE-2021-3156",
|
||||
|
@ -1228,35 +1286,6 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 393627940,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "CyberCommands\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "CyberCommands",
|
||||
"id": 78230607,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78230607?v=4",
|
||||
"html_url": "https:\/\/github.com\/CyberCommands"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CyberCommands\/CVE-2021-3156",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-08-07T08:38:50Z",
|
||||
"updated_at": "2021-08-07T08:43:21Z",
|
||||
"pushed_at": "2021-08-07T08:43:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 395682414,
|
||||
"name": "CVE-2021-3156",
|
||||
|
|
|
@ -1,31 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 391818469,
|
||||
"name": "CVE-2021-31630-OpenPLC_RCE",
|
||||
"full_name": "h3v0x\/CVE-2021-31630-OpenPLC_RCE",
|
||||
"owner": {
|
||||
"login": "h3v0x",
|
||||
"id": 6265911,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6265911?v=4",
|
||||
"html_url": "https:\/\/github.com\/h3v0x"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/h3v0x\/CVE-2021-31630-OpenPLC_RCE",
|
||||
"description": "Exploit for Authenticated Remote Code Execution on OpenPLC v3 Webserver",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-02T04:48:24Z",
|
||||
"updated_at": "2022-07-14T06:12:17Z",
|
||||
"pushed_at": "2021-08-02T04:48:25Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
31
2021/CVE-2021-3281.json
Normal file
31
2021/CVE-2021-3281.json
Normal file
|
@ -0,0 +1,31 @@
|
|||
[
|
||||
{
|
||||
"id": 383067956,
|
||||
"name": "CVE-2021-3281",
|
||||
"full_name": "lwzSoviet\/CVE-2021-3281",
|
||||
"owner": {
|
||||
"login": "lwzSoviet",
|
||||
"id": 30397594,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30397594?v=4",
|
||||
"html_url": "https:\/\/github.com\/lwzSoviet"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lwzSoviet\/CVE-2021-3281",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-05T08:25:26Z",
|
||||
"updated_at": "2022-01-31T11:44:07Z",
|
||||
"pushed_at": "2021-07-05T08:47:14Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"forks": 27,
|
||||
"watchers": 79,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1,33 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 390295076,
|
||||
"name": "CVE-2021-3438",
|
||||
"full_name": "TobiasS1402\/CVE-2021-3438",
|
||||
"owner": {
|
||||
"login": "TobiasS1402",
|
||||
"id": 46230851,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46230851?v=4",
|
||||
"html_url": "https:\/\/github.com\/TobiasS1402"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TobiasS1402\/CVE-2021-3438",
|
||||
"description": "Detection and remediation for CVE-2021-3438 with Powershell",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-28T09:36:42Z",
|
||||
"updated_at": "2021-07-28T14:51:57Z",
|
||||
"pushed_at": "2021-07-28T14:41:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 643396878,
|
||||
"name": "CVE-2021-3438",
|
||||
|
|
|
@ -1,31 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 390877656,
|
||||
"name": "CVE-2021-34470scanner",
|
||||
"full_name": "technion\/CVE-2021-34470scanner",
|
||||
"owner": {
|
||||
"login": "technion",
|
||||
"id": 1948596,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1948596?v=4",
|
||||
"html_url": "https:\/\/github.com\/technion"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/technion\/CVE-2021-34470scanner",
|
||||
"description": "A Powrshell script to scan for CVE-2021-34470",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-29T23:50:31Z",
|
||||
"updated_at": "2022-08-18T06:30:57Z",
|
||||
"pushed_at": "2021-07-29T23:51:22Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 382335385,
|
||||
"name": "CVE-2021-34527",
|
||||
"full_name": "JohnHammond\/CVE-2021-34527",
|
||||
"owner": {
|
||||
"login": "JohnHammond",
|
||||
"id": 6288722,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6288722?v=4",
|
||||
"html_url": "https:\/\/github.com\/JohnHammond"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JohnHammond\/CVE-2021-34527",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-02T12:10:49Z",
|
||||
"updated_at": "2023-06-06T01:29:21Z",
|
||||
"pushed_at": "2021-07-02T12:17:50Z",
|
||||
"stargazers_count": 207,
|
||||
"watchers_count": 207,
|
||||
"has_discussions": false,
|
||||
"forks_count": 57,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 57,
|
||||
"watchers": 207,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 382645654,
|
||||
"name": "PrintNightmare-CVE-2021-34527",
|
||||
|
@ -35,6 +64,93 @@
|
|||
"watchers": 87,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 382894525,
|
||||
"name": "CVE-2021-34527-1675",
|
||||
"full_name": "CnOxx1\/CVE-2021-34527-1675",
|
||||
"owner": {
|
||||
"login": "CnOxx1",
|
||||
"id": 86923954,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86923954?v=4",
|
||||
"html_url": "https:\/\/github.com\/CnOxx1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CnOxx1\/CVE-2021-34527-1675",
|
||||
"description": "Cve-2021-1675 or cve-2021-34527? Detailed analysis and exploitation of windows print spooler 0day vulnerability!!!",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-04T16:09:18Z",
|
||||
"updated_at": "2021-09-06T06:08:09Z",
|
||||
"pushed_at": "2021-07-04T16:31:21Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": true,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 383207766,
|
||||
"name": "disable-RegisterSpoolerRemoteRpcEndPoint",
|
||||
"full_name": "rdboboia\/disable-RegisterSpoolerRemoteRpcEndPoint",
|
||||
"owner": {
|
||||
"login": "rdboboia",
|
||||
"id": 37208426,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37208426?v=4",
|
||||
"html_url": "https:\/\/github.com\/rdboboia"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rdboboia\/disable-RegisterSpoolerRemoteRpcEndPoint",
|
||||
"description": "Workaround for Windows Print Spooler Remote Code Execution Vulnerability(CVE-2021-34527). See: https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-05T16:49:32Z",
|
||||
"updated_at": "2021-07-08T21:11:43Z",
|
||||
"pushed_at": "2021-07-08T21:11:40Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 383223006,
|
||||
"name": "CVE-2021-34527-PrintNightmare-Workaround",
|
||||
"full_name": "geekbrett\/CVE-2021-34527-PrintNightmare-Workaround",
|
||||
"owner": {
|
||||
"login": "geekbrett",
|
||||
"id": 22183376,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22183376?v=4",
|
||||
"html_url": "https:\/\/github.com\/geekbrett"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/geekbrett\/CVE-2021-34527-PrintNightmare-Workaround",
|
||||
"description": "This simple PowerShell script is in response to the \"PrintNightmare\" vulnerability. This was designed to give a end user the ability to stop and disable the \"Print Spooler\" service on their computer while awaiting a fix from Microsoft.",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-05T17:50:56Z",
|
||||
"updated_at": "2022-03-18T12:17:32Z",
|
||||
"pushed_at": "2021-07-07T17:18:07Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 383254488,
|
||||
"name": "ItWasAllADream",
|
||||
|
@ -64,6 +180,122 @@
|
|||
"watchers": 721,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 383699836,
|
||||
"name": "Disable-Spooler-Service-PrintNightmare-CVE-2021-34527",
|
||||
"full_name": "vinaysudheer\/Disable-Spooler-Service-PrintNightmare-CVE-2021-34527",
|
||||
"owner": {
|
||||
"login": "vinaysudheer",
|
||||
"id": 29897973,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29897973?v=4",
|
||||
"html_url": "https:\/\/github.com\/vinaysudheer"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/vinaysudheer\/Disable-Spooler-Service-PrintNightmare-CVE-2021-34527",
|
||||
"description": "Simple batch script to disable the Microsoft Print Spooler service from system",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-07T06:41:15Z",
|
||||
"updated_at": "2021-07-07T06:47:16Z",
|
||||
"pushed_at": "2021-07-07T06:47:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 384221697,
|
||||
"name": "printnightmare",
|
||||
"full_name": "glorisonlai\/printnightmare",
|
||||
"owner": {
|
||||
"login": "glorisonlai",
|
||||
"id": 26339805,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26339805?v=4",
|
||||
"html_url": "https:\/\/github.com\/glorisonlai"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/glorisonlai\/printnightmare",
|
||||
"description": "CVE-2021-34527 implementation",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-08T18:56:04Z",
|
||||
"updated_at": "2021-07-08T18:56:07Z",
|
||||
"pushed_at": "2021-07-08T18:56:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 384385967,
|
||||
"name": "Printnightmare",
|
||||
"full_name": "Eutectico\/Printnightmare",
|
||||
"owner": {
|
||||
"login": "Eutectico",
|
||||
"id": 30925137,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30925137?v=4",
|
||||
"html_url": "https:\/\/github.com\/Eutectico"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Eutectico\/Printnightmare",
|
||||
"description": "Fix for PrintNightmare CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-09T09:22:03Z",
|
||||
"updated_at": "2021-07-09T11:02:54Z",
|
||||
"pushed_at": "2021-07-09T11:02:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 384554464,
|
||||
"name": "PowerShell-PrintNightmare",
|
||||
"full_name": "syntaxbearror\/PowerShell-PrintNightmare",
|
||||
"owner": {
|
||||
"login": "syntaxbearror",
|
||||
"id": 53105897,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53105897?v=4",
|
||||
"html_url": "https:\/\/github.com\/syntaxbearror"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/syntaxbearror\/PowerShell-PrintNightmare",
|
||||
"description": "A collection of scripts to help set the appropriate registry keys for CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-09T21:28:16Z",
|
||||
"updated_at": "2021-07-11T16:21:00Z",
|
||||
"pushed_at": "2021-07-09T21:46:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 390263988,
|
||||
"name": "PrintNightmare",
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Ubuntu OverlayFS Local Privesc",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-19T20:07:01Z",
|
||||
"updated_at": "2023-05-18T23:53:38Z",
|
||||
"updated_at": "2023-06-09T01:13:43Z",
|
||||
"pushed_at": "2021-09-28T04:08:43Z",
|
||||
"stargazers_count": 342,
|
||||
"watchers_count": 342,
|
||||
"stargazers_count": 343,
|
||||
"watchers_count": 343,
|
||||
"has_discussions": false,
|
||||
"forks_count": 127,
|
||||
"forks_count": 128,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 127,
|
||||
"watchers": 342,
|
||||
"forks": 128,
|
||||
"watchers": 343,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -115,6 +115,41 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 383693831,
|
||||
"name": "CVE-2021-3493",
|
||||
"full_name": "inspiringz\/CVE-2021-3493",
|
||||
"owner": {
|
||||
"login": "inspiringz",
|
||||
"id": 47313597,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47313597?v=4",
|
||||
"html_url": "https:\/\/github.com\/inspiringz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/inspiringz\/CVE-2021-3493",
|
||||
"description": "CVE-2021-3493 Ubuntu OverlayFS Local Privesc (Interactive Bash Shell & Execute Command Entered)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-07T06:16:48Z",
|
||||
"updated_at": "2023-05-17T07:42:57Z",
|
||||
"pushed_at": "2021-07-07T07:19:03Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2021-3493",
|
||||
"exploit",
|
||||
"linux",
|
||||
"privesc",
|
||||
"ubuntu"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 405634949,
|
||||
"name": "overlayFS-CVE-2021-3493",
|
||||
|
|
|
@ -1,4 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 384694670,
|
||||
"name": "CVE-2021-35042",
|
||||
"full_name": "YouGina\/CVE-2021-35042",
|
||||
"owner": {
|
||||
"login": "YouGina",
|
||||
"id": 5002624,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5002624?v=4",
|
||||
"html_url": "https:\/\/github.com\/YouGina"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/YouGina\/CVE-2021-35042",
|
||||
"description": "SQL injection via unsanitized QuerySet.order_by() input",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-10T12:38:52Z",
|
||||
"updated_at": "2022-07-21T02:50:56Z",
|
||||
"pushed_at": "2021-07-10T13:43:54Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 402138788,
|
||||
"name": "CVE-2021-35042",
|
||||
|
|
|
@ -196,10 +196,10 @@
|
|||
"description": "Privilege escalation with polkit - CVE-2021-3560",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-19T08:15:17Z",
|
||||
"updated_at": "2023-06-08T08:24:33Z",
|
||||
"updated_at": "2023-06-09T03:19:42Z",
|
||||
"pushed_at": "2021-06-20T07:38:13Z",
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"has_discussions": false,
|
||||
"forks_count": 51,
|
||||
"allow_forking": true,
|
||||
|
@ -208,7 +208,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 51,
|
||||
"watchers": 106,
|
||||
"watchers": 107,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -240,122 +240,6 @@
|
|||
"watchers": 25,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 382305236,
|
||||
"name": "CVE-2021-3560",
|
||||
"full_name": "cpu0x00\/CVE-2021-3560",
|
||||
"owner": {
|
||||
"login": "cpu0x00",
|
||||
"id": 86830248,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86830248?v=4",
|
||||
"html_url": "https:\/\/github.com\/cpu0x00"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cpu0x00\/CVE-2021-3560",
|
||||
"description": "ubuntu new PrivEsc race condition vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-02T10:03:26Z",
|
||||
"updated_at": "2022-11-19T21:44:24Z",
|
||||
"pushed_at": "2021-08-05T02:07:12Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 390233864,
|
||||
"name": "CVE-2021-3560",
|
||||
"full_name": "BizarreLove\/CVE-2021-3560",
|
||||
"owner": {
|
||||
"login": "BizarreLove",
|
||||
"id": 41328139,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41328139?v=4",
|
||||
"html_url": "https:\/\/github.com\/BizarreLove"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/BizarreLove\/CVE-2021-3560",
|
||||
"description": "NYCY_homework_&_meeting",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-28T06:05:46Z",
|
||||
"updated_at": "2021-07-29T08:24:46Z",
|
||||
"pushed_at": "2021-07-29T08:24:43Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 391043530,
|
||||
"name": "CVE-2021-3560",
|
||||
"full_name": "0dayNinja\/CVE-2021-3560",
|
||||
"owner": {
|
||||
"login": "0dayNinja",
|
||||
"id": 88158703,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88158703?v=4",
|
||||
"html_url": "https:\/\/github.com\/0dayNinja"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0dayNinja\/CVE-2021-3560",
|
||||
"description": "Polkit D-Bus Authentication Bypass Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-30T11:41:34Z",
|
||||
"updated_at": "2023-02-26T05:26:34Z",
|
||||
"pushed_at": "2021-07-30T11:43:32Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 427315131,
|
||||
"name": "CVE-2021-3560",
|
||||
"full_name": "TomMalvoRiddle\/CVE-2021-3560",
|
||||
"owner": {
|
||||
"login": "TomMalvoRiddle",
|
||||
"id": 64571518,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64571518?v=4",
|
||||
"html_url": "https:\/\/github.com\/TomMalvoRiddle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TomMalvoRiddle\/CVE-2021-3560",
|
||||
"description": "CVE-2021-3560 (Polkit - Local Privilege Escalation)",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-12T10:15:45Z",
|
||||
"updated_at": "2021-12-21T14:39:48Z",
|
||||
"pushed_at": "2021-07-26T07:08:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 453938064,
|
||||
"name": "CVE-2021-3560",
|
||||
|
|
|
@ -129,10 +129,10 @@
|
|||
"description": "海康威视RCE漏洞 批量检测和利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-03T17:27:59Z",
|
||||
"updated_at": "2023-06-08T05:48:45Z",
|
||||
"updated_at": "2023-06-09T01:52:04Z",
|
||||
"pushed_at": "2022-08-05T19:57:30Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -144,7 +144,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 79,
|
||||
"watchers": 80,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -91,122 +91,6 @@
|
|||
"watchers": 33,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 388453276,
|
||||
"name": "CVE-2021-36934",
|
||||
"full_name": "tda90\/CVE-2021-36934",
|
||||
"owner": {
|
||||
"login": "tda90",
|
||||
"id": 48199685,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48199685?v=4",
|
||||
"html_url": "https:\/\/github.com\/tda90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tda90\/CVE-2021-36934",
|
||||
"description": "CVE-2021-36934 PowerShell Fix",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-22T12:24:24Z",
|
||||
"updated_at": "2021-07-29T06:47:23Z",
|
||||
"pushed_at": "2021-07-29T06:47:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 389555386,
|
||||
"name": "CVE-2021-36934",
|
||||
"full_name": "0x0D1n\/CVE-2021-36934",
|
||||
"owner": {
|
||||
"login": "0x0D1n",
|
||||
"id": 23523771,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23523771?v=4",
|
||||
"html_url": "https:\/\/github.com\/0x0D1n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0x0D1n\/CVE-2021-36934",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-26T08:01:08Z",
|
||||
"updated_at": "2021-07-26T08:18:37Z",
|
||||
"pushed_at": "2021-07-26T08:18:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 389878651,
|
||||
"name": "CVE-2021-36934",
|
||||
"full_name": "exploitblizzard\/CVE-2021-36934",
|
||||
"owner": {
|
||||
"login": "exploitblizzard",
|
||||
"id": 61627070,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61627070?v=4",
|
||||
"html_url": "https:\/\/github.com\/exploitblizzard"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/exploitblizzard\/CVE-2021-36934",
|
||||
"description": "HiveNightmare aka SeriousSAM ",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-27T06:54:30Z",
|
||||
"updated_at": "2023-04-21T05:37:19Z",
|
||||
"pushed_at": "2021-07-27T06:56:18Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 390844451,
|
||||
"name": "CVE-2021-36934",
|
||||
"full_name": "irissentinel\/CVE-2021-36934",
|
||||
"owner": {
|
||||
"login": "irissentinel",
|
||||
"id": 79321563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79321563?v=4",
|
||||
"html_url": "https:\/\/github.com\/irissentinel"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/irissentinel\/CVE-2021-36934",
|
||||
"description": "CVE-2021-36934 HiveNightmare vulnerability checker and workaround",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-29T20:35:22Z",
|
||||
"updated_at": "2021-07-30T12:29:18Z",
|
||||
"pushed_at": "2021-07-30T12:29:15Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 391724401,
|
||||
"name": "CVE-2021-36934",
|
||||
|
@ -236,64 +120,6 @@
|
|||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 391965692,
|
||||
"name": "poc_CVE-2021-36934",
|
||||
"full_name": "grishinpv\/poc_CVE-2021-36934",
|
||||
"owner": {
|
||||
"login": "grishinpv",
|
||||
"id": 88319804,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88319804?v=4",
|
||||
"html_url": "https:\/\/github.com\/grishinpv"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/grishinpv\/poc_CVE-2021-36934",
|
||||
"description": "POC experiments with Volume Shadow copy Service (VSS)",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-02T13:47:17Z",
|
||||
"updated_at": "2022-11-09T18:13:09Z",
|
||||
"pushed_at": "2021-08-02T13:52:20Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 392648426,
|
||||
"name": "SeriousSam",
|
||||
"full_name": "shaktavist\/SeriousSam",
|
||||
"owner": {
|
||||
"login": "shaktavist",
|
||||
"id": 87278238,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87278238?v=4",
|
||||
"html_url": "https:\/\/github.com\/shaktavist"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/shaktavist\/SeriousSam",
|
||||
"description": "Windows Elevation of Privilege Vulnerability CVE-2021-36934",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-04T10:37:41Z",
|
||||
"updated_at": "2021-08-04T10:47:55Z",
|
||||
"pushed_at": "2021-08-04T10:47:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 394763090,
|
||||
"name": "CVE-2021-36934-export-shadow-volume-POC",
|
||||
|
|
|
@ -1,31 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 408041781,
|
||||
"name": "CVE-2021-37152",
|
||||
"full_name": "SecurityAnalysts\/CVE-2021-37152",
|
||||
"owner": {
|
||||
"login": "SecurityAnalysts",
|
||||
"id": 26019141,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26019141?v=4",
|
||||
"html_url": "https:\/\/github.com\/SecurityAnalysts"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SecurityAnalysts\/CVE-2021-37152",
|
||||
"description": "Exploit Accsess network clients by sending packets in wirless TP-LINK and preparing for a mitm attack",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-19T05:37:37Z",
|
||||
"updated_at": "2021-10-27T16:54:04Z",
|
||||
"pushed_at": "2021-07-26T08:37:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,31 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 391489074,
|
||||
"name": "CVE-2021-37833",
|
||||
"full_name": "dievus\/CVE-2021-37833",
|
||||
"owner": {
|
||||
"login": "dievus",
|
||||
"id": 25853389,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25853389?v=4",
|
||||
"html_url": "https:\/\/github.com\/dievus"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dievus\/CVE-2021-37833",
|
||||
"description": "CVE 2021-37833 Hotel Druid 3.0.2 Reflected Cross Site Scripting",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-01T00:34:27Z",
|
||||
"updated_at": "2022-03-25T01:24:43Z",
|
||||
"pushed_at": "2021-08-03T13:44:40Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,31 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 393319863,
|
||||
"name": "CVE-2021-38149",
|
||||
"full_name": "jboogie15\/CVE-2021-38149",
|
||||
"owner": {
|
||||
"login": "jboogie15",
|
||||
"id": 67240643,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67240643?v=4",
|
||||
"html_url": "https:\/\/github.com\/jboogie15"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jboogie15\/CVE-2021-38149",
|
||||
"description": "Chikitsa Patient Management System Stored Cross-Site Scripting (XSS)",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-06T09:01:40Z",
|
||||
"updated_at": "2021-08-10T19:54:20Z",
|
||||
"pushed_at": "2021-08-06T09:39:58Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for CVE-2021-41091",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-02T07:25:13Z",
|
||||
"updated_at": "2023-06-07T21:32:05Z",
|
||||
"updated_at": "2023-06-09T02:39:27Z",
|
||||
"pushed_at": "2023-05-20T09:16:34Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 34,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1273,10 +1273,10 @@
|
|||
"description": "CVE-2022-22947 注入Godzilla内存马",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-26T05:48:27Z",
|
||||
"updated_at": "2023-06-08T22:23:18Z",
|
||||
"updated_at": "2023-06-09T05:50:31Z",
|
||||
"pushed_at": "2022-04-26T05:55:58Z",
|
||||
"stargazers_count": 150,
|
||||
"watchers_count": 150,
|
||||
"stargazers_count": 151,
|
||||
"watchers_count": 151,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -1285,7 +1285,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 150,
|
||||
"watchers": 151,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-07T03:20:23Z",
|
||||
"updated_at": "2023-06-08T10:38:53Z",
|
||||
"updated_at": "2023-06-09T03:13:55Z",
|
||||
"pushed_at": "2022-06-07T03:41:13Z",
|
||||
"stargazers_count": 539,
|
||||
"watchers_count": 539,
|
||||
"stargazers_count": 540,
|
||||
"watchers_count": 540,
|
||||
"has_discussions": false,
|
||||
"forks_count": 92,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 92,
|
||||
"watchers": 539,
|
||||
"watchers": 540,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -134,10 +134,10 @@
|
|||
"description": "Zimbra CVE-2022-27925 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-20T15:58:29Z",
|
||||
"updated_at": "2023-05-30T07:44:33Z",
|
||||
"updated_at": "2023-06-09T04:31:25Z",
|
||||
"pushed_at": "2022-08-27T20:30:21Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -152,7 +152,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 37,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "cve-2022-34169 延伸出的Jdk Xalan的payload自动生成工具,可根据不同的Jdk生成出其所对应的xslt文件",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-17T03:48:11Z",
|
||||
"updated_at": "2023-06-08T16:54:24Z",
|
||||
"updated_at": "2023-06-09T04:01:37Z",
|
||||
"pushed_at": "2023-01-17T12:27:08Z",
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 71,
|
||||
"watchers": 76,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Responsive FileManager v.9.9.5 vulnerable to CVE-2022-46604.",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-03T08:56:16Z",
|
||||
"updated_at": "2023-05-05T09:56:38Z",
|
||||
"updated_at": "2023-06-09T05:36:33Z",
|
||||
"pushed_at": "2023-04-09T23:34:28Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
@ -22,7 +22,11 @@
|
|||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"exploit",
|
||||
"python3",
|
||||
"responsivefilemanager"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
|
|
|
@ -71,10 +71,10 @@
|
|||
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-26T06:56:35Z",
|
||||
"updated_at": "2023-06-08T21:41:17Z",
|
||||
"updated_at": "2023-06-09T00:56:16Z",
|
||||
"pushed_at": "2023-02-21T04:16:19Z",
|
||||
"stargazers_count": 807,
|
||||
"watchers_count": 807,
|
||||
"stargazers_count": 808,
|
||||
"watchers_count": 808,
|
||||
"has_discussions": false,
|
||||
"forks_count": 56,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 56,
|
||||
"watchers": 807,
|
||||
"watchers": 808,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"forks": 6,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -71,10 +71,10 @@
|
|||
"description": "CVE-2023-0386在ubuntu22.04上的提权",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-05T03:02:13Z",
|
||||
"updated_at": "2023-06-08T16:59:46Z",
|
||||
"updated_at": "2023-06-09T05:41:30Z",
|
||||
"pushed_at": "2023-05-08T07:19:34Z",
|
||||
"stargazers_count": 315,
|
||||
"watchers_count": 315,
|
||||
"stargazers_count": 316,
|
||||
"watchers_count": 316,
|
||||
"has_discussions": false,
|
||||
"forks_count": 54,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 54,
|
||||
"watchers": 315,
|
||||
"watchers": 316,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-10T15:59:26Z",
|
||||
"updated_at": "2023-06-02T15:25:05Z",
|
||||
"updated_at": "2023-06-09T03:04:16Z",
|
||||
"pushed_at": "2023-01-13T09:01:20Z",
|
||||
"stargazers_count": 278,
|
||||
"watchers_count": 278,
|
||||
"stargazers_count": 279,
|
||||
"watchers_count": 279,
|
||||
"has_discussions": false,
|
||||
"forks_count": 61,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 61,
|
||||
"watchers": 278,
|
||||
"watchers": 279,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -113,13 +113,13 @@
|
|||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-25157 - GeoServer SQL Injection - PoC",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-06T14:05:09Z",
|
||||
"updated_at": "2023-06-08T15:56:50Z",
|
||||
"updated_at": "2023-06-09T05:23:11Z",
|
||||
"pushed_at": "2023-06-08T09:05:21Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 79,
|
||||
"watchers": 87,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -76,7 +76,7 @@
|
|||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -86,7 +86,7 @@
|
|||
"wordpress-plugin"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"forks": 19,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Proof of Concept Code for CVE-2023-32353: Local privilege escalation via iTunes in Windows",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-08T20:43:03Z",
|
||||
"updated_at": "2023-06-08T20:49:30Z",
|
||||
"updated_at": "2023-06-09T05:47:41Z",
|
||||
"pushed_at": "2023-06-08T21:05:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Original PoC for CVE-2023-32784",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-01T17:08:55Z",
|
||||
"updated_at": "2023-06-08T15:29:12Z",
|
||||
"updated_at": "2023-06-09T06:00:23Z",
|
||||
"pushed_at": "2023-06-03T23:23:11Z",
|
||||
"stargazers_count": 465,
|
||||
"watchers_count": 465,
|
||||
"stargazers_count": 466,
|
||||
"watchers_count": 466,
|
||||
"has_discussions": false,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 465,
|
||||
"watchers": 466,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -100,10 +100,10 @@
|
|||
"description": "Apache RocketMQ 远程代码执行漏洞(CVE-2023-33246) Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-01T06:27:09Z",
|
||||
"updated_at": "2023-06-07T11:26:48Z",
|
||||
"updated_at": "2023-06-09T06:27:32Z",
|
||||
"pushed_at": "2023-06-01T05:54:25Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -112,7 +112,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 29,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -191,10 +191,10 @@
|
|||
"description": "RocketMQ RCE (CVE-2023-33246) woodpecker 利用插件",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-05T09:23:25Z",
|
||||
"updated_at": "2023-06-08T06:45:01Z",
|
||||
"updated_at": "2023-06-09T01:12:36Z",
|
||||
"pushed_at": "2023-06-08T06:27:15Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -203,7 +203,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -225,13 +225,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
35
2023/CVE-2023-34096.json
Normal file
35
2023/CVE-2023-34096.json
Normal file
|
@ -0,0 +1,35 @@
|
|||
[
|
||||
{
|
||||
"id": 651325651,
|
||||
"name": "Thruk-CVE-2023-34096",
|
||||
"full_name": "galoget\/Thruk-CVE-2023-34096",
|
||||
"owner": {
|
||||
"login": "galoget",
|
||||
"id": 8353133,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8353133?v=4",
|
||||
"html_url": "https:\/\/github.com\/galoget"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/galoget\/Thruk-CVE-2023-34096",
|
||||
"description": "Thruk Monitoring Web Interface <= 3.06 vulnerable to CVE-2023-34096 (Path Traversal).",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-09T02:17:25Z",
|
||||
"updated_at": "2023-06-09T05:36:40Z",
|
||||
"pushed_at": "2023-06-09T05:16:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"exploit",
|
||||
"python3",
|
||||
"thruk"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
147
README.md
147
README.md
|
@ -1677,6 +1677,14 @@ Kiwi TCMS is an open source test management system for both manual and automated
|
|||
|
||||
- [mnqazi/CVE-2023-33977](https://github.com/mnqazi/CVE-2023-33977)
|
||||
|
||||
### CVE-2023-34096 (2023-06-08)
|
||||
|
||||
<code>
|
||||
Thruk is a multibackend monitoring webinterface which currently supports Naemon, Icinga, Shinken and Nagios as backends. In versions 3.06 and prior, the file `panorama.pm` is vulnerable to a Path Traversal vulnerability which allows an attacker to upload a file to any folder which has write permissions on the affected system. The parameter location is not filtered, validated or sanitized and it accepts any kind of characters. For a path traversal attack, the only characters required were the dot (`.`) and the slash (`/`). A fix is available in version 3.06.2.
|
||||
</code>
|
||||
|
||||
- [galoget/Thruk-CVE-2023-34096](https://github.com/galoget/Thruk-CVE-2023-34096)
|
||||
|
||||
### CVE-2023-34362 (2023-06-02)
|
||||
|
||||
<code>
|
||||
|
@ -8690,14 +8698,6 @@ NVIDIA GPU Display Driver for Linux, all versions, contains a vulnerability in t
|
|||
|
||||
- [pokerfaceSad/CVE-2021-1056](https://github.com/pokerfaceSad/CVE-2021-1056)
|
||||
|
||||
### CVE-2021-1480 (2021-04-08)
|
||||
|
||||
<code>
|
||||
Multiple vulnerabilities in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to execute arbitrary code or allow an authenticated, local attacker to gain escalated privileges on an affected system. For more information about these vulnerabilities, see the Details section of this advisory.
|
||||
</code>
|
||||
|
||||
- [xmco/sdwan-cve-2021-1480](https://github.com/xmco/sdwan-cve-2021-1480)
|
||||
|
||||
### CVE-2021-1497 (2021-05-06)
|
||||
|
||||
<code>
|
||||
|
@ -8748,14 +8748,30 @@ Windows Print Spooler Elevation of Privilege Vulnerability
|
|||
- [cube0x0/CVE-2021-1675](https://github.com/cube0x0/CVE-2021-1675)
|
||||
- [LaresLLC/CVE-2021-1675](https://github.com/LaresLLC/CVE-2021-1675)
|
||||
- [kondah/patch-cve-2021-1675](https://github.com/kondah/patch-cve-2021-1675)
|
||||
- [evilashz/CVE-2021-1675-LPE-EXP](https://github.com/evilashz/CVE-2021-1675-LPE-EXP)
|
||||
- [hlldz/CVE-2021-1675-LPE](https://github.com/hlldz/CVE-2021-1675-LPE)
|
||||
- [puckiestyle/CVE-2021-1675](https://github.com/puckiestyle/CVE-2021-1675)
|
||||
- [cybersecurityworks553/CVE-2021-1675_PrintNightMare](https://github.com/cybersecurityworks553/CVE-2021-1675_PrintNightMare)
|
||||
- [calebstewart/CVE-2021-1675](https://github.com/calebstewart/CVE-2021-1675)
|
||||
- [killtr0/CVE-2021-1675-PrintNightmare](https://github.com/killtr0/CVE-2021-1675-PrintNightmare)
|
||||
- [corelight/CVE-2021-1675](https://github.com/corelight/CVE-2021-1675)
|
||||
- [kougyokugentou/CVE-2021-1675](https://github.com/kougyokugentou/CVE-2021-1675)
|
||||
- [ptter23/CVE-2021-1675](https://github.com/ptter23/CVE-2021-1675)
|
||||
- [initconf/cve-2021-1675-printnightmare](https://github.com/initconf/cve-2021-1675-printnightmare)
|
||||
- [ozergoker/PrintNightmare](https://github.com/ozergoker/PrintNightmare)
|
||||
- [exploitblizzard/PrintNightmare-CVE-2021-1675](https://github.com/exploitblizzard/PrintNightmare-CVE-2021-1675)
|
||||
- [edsonjt81/CVE-2021-1675](https://github.com/edsonjt81/CVE-2021-1675)
|
||||
- [sailay1996/PrintNightmare-LPE](https://github.com/sailay1996/PrintNightmare-LPE)
|
||||
- [JumpsecLabs/PrintNightmare](https://github.com/JumpsecLabs/PrintNightmare)
|
||||
- [bartimusprimed/CVE-2021-1675-Yara](https://github.com/bartimusprimed/CVE-2021-1675-Yara)
|
||||
- [k8gege/cve-2021-1675](https://github.com/k8gege/cve-2021-1675)
|
||||
- [galoget/PrintNightmare-CVE-2021-1675-CVE-2021-34527](https://github.com/galoget/PrintNightmare-CVE-2021-1675-CVE-2021-34527)
|
||||
- [hahaleyile/my-CVE-2021-1675](https://github.com/hahaleyile/my-CVE-2021-1675)
|
||||
- [mstxq17/CVE-2021-1675_RDL_LPE](https://github.com/mstxq17/CVE-2021-1675_RDL_LPE)
|
||||
- [ly4k/PrintNightmare](https://github.com/ly4k/PrintNightmare)
|
||||
- [Wra7h/SharpPN](https://github.com/Wra7h/SharpPN)
|
||||
- [OppressionBreedsResistance/CVE-2021-1675-PrintNightmare](https://github.com/OppressionBreedsResistance/CVE-2021-1675-PrintNightmare)
|
||||
- [5l1v3r1/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler](https://github.com/5l1v3r1/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler)
|
||||
- [eversinc33/NimNightmare](https://github.com/eversinc33/NimNightmare)
|
||||
- [AndrewTrube/CVE-2021-1675](https://github.com/AndrewTrube/CVE-2021-1675)
|
||||
- [TheJoyOfHacking/cube0x0-CVE-2021-1675](https://github.com/TheJoyOfHacking/cube0x0-CVE-2021-1675)
|
||||
|
@ -8910,7 +8926,6 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
|
|||
</code>
|
||||
|
||||
- [lz2y/CVE-2021-2394](https://github.com/lz2y/CVE-2021-2394)
|
||||
- [freeide/CVE-2021-2394](https://github.com/freeide/CVE-2021-2394)
|
||||
- [BabyTeam1024/CVE-2021-2394](https://github.com/BabyTeam1024/CVE-2021-2394)
|
||||
- [fasanhlieu/CVE-2021-2394](https://github.com/fasanhlieu/CVE-2021-2394)
|
||||
|
||||
|
@ -8978,6 +8993,8 @@ Ignition before 2.5.2, as used in Laravel and other products, allows unauthentic
|
|||
|
||||
- [ambionics/laravel-exploits](https://github.com/ambionics/laravel-exploits)
|
||||
- [SNCKER/CVE-2021-3129](https://github.com/SNCKER/CVE-2021-3129)
|
||||
- [SecPros-Team/laravel-CVE-2021-3129-EXP](https://github.com/SecPros-Team/laravel-CVE-2021-3129-EXP)
|
||||
- [crisprss/Laravel_CVE-2021-3129_EXP](https://github.com/crisprss/Laravel_CVE-2021-3129_EXP)
|
||||
- [nth347/CVE-2021-3129_exploit](https://github.com/nth347/CVE-2021-3129_exploit)
|
||||
- [FunPhishing/Laravel-8.4.2-rce-CVE-2021-3129](https://github.com/FunPhishing/Laravel-8.4.2-rce-CVE-2021-3129)
|
||||
- [zhzyker/CVE-2021-3129](https://github.com/zhzyker/CVE-2021-3129)
|
||||
|
@ -9025,8 +9042,10 @@ In Discourse 2.7.0 through beta1, a rate-limit bypass leads to a bypass of the 2
|
|||
Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.
|
||||
</code>
|
||||
|
||||
- [mr-r3b00t/CVE-2021-3156](https://github.com/mr-r3b00t/CVE-2021-3156)
|
||||
- [nexcess/sudo_cve-2021-3156](https://github.com/nexcess/sudo_cve-2021-3156)
|
||||
- [reverse-ex/CVE-2021-3156](https://github.com/reverse-ex/CVE-2021-3156)
|
||||
- [unauth401/CVE-2021-3156](https://github.com/unauth401/CVE-2021-3156)
|
||||
- [ymrsmns/CVE-2021-3156](https://github.com/ymrsmns/CVE-2021-3156)
|
||||
- [elbee-cyber/CVE-2021-3156-PATCHER](https://github.com/elbee-cyber/CVE-2021-3156-PATCHER)
|
||||
- [kernelzeroday/CVE-2021-3156-Baron-Samedit](https://github.com/kernelzeroday/CVE-2021-3156-Baron-Samedit)
|
||||
|
@ -9067,7 +9086,6 @@ Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based
|
|||
- [ajtech-hue/CVE-2021-3156-Mitigation-ShellScript-Build](https://github.com/ajtech-hue/CVE-2021-3156-Mitigation-ShellScript-Build)
|
||||
- [donghyunlee00/CVE-2021-3156](https://github.com/donghyunlee00/CVE-2021-3156)
|
||||
- [TheFlash2k/CVE-2021-3156](https://github.com/TheFlash2k/CVE-2021-3156)
|
||||
- [CyberCommands/CVE-2021-3156](https://github.com/CyberCommands/CVE-2021-3156)
|
||||
- [0x7183/CVE-2021-3156](https://github.com/0x7183/CVE-2021-3156)
|
||||
- [Y3A/CVE-2021-3156](https://github.com/Y3A/CVE-2021-3156)
|
||||
- [redhawkeye/sudo-exploit](https://github.com/redhawkeye/sudo-exploit)
|
||||
|
@ -9134,6 +9152,14 @@ sz.chat version 4 allows injection of web scripts and HTML in the message box.
|
|||
|
||||
- [rafaelchriss/CVE-2021-3279](https://github.com/rafaelchriss/CVE-2021-3279)
|
||||
|
||||
### CVE-2021-3281 (2021-02-02)
|
||||
|
||||
<code>
|
||||
In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by "startapp --template" and "startproject --template") allows directory traversal via an archive with absolute paths or relative paths with dot segments.
|
||||
</code>
|
||||
|
||||
- [lwzSoviet/CVE-2021-3281](https://github.com/lwzSoviet/CVE-2021-3281)
|
||||
|
||||
### CVE-2021-3291 (2021-01-26)
|
||||
|
||||
<code>
|
||||
|
@ -9199,7 +9225,6 @@ A cross-site scripting (XSS) vulnerability in Pryaniki 6.44.3 allows remote auth
|
|||
A potential buffer overflow in the software drivers for certain HP LaserJet products and Samsung product printers could lead to an escalation of privilege.
|
||||
</code>
|
||||
|
||||
- [TobiasS1402/CVE-2021-3438](https://github.com/TobiasS1402/CVE-2021-3438)
|
||||
- [Exploitables/CVE-2021-3438](https://github.com/Exploitables/CVE-2021-3438)
|
||||
|
||||
### CVE-2021-3441 (2021-10-29)
|
||||
|
@ -9245,6 +9270,7 @@ The overlayfs implementation in the linux kernel did not properly validate with
|
|||
- [oneoy/CVE-2021-3493](https://github.com/oneoy/CVE-2021-3493)
|
||||
- [Abdennour-py/CVE-2021-3493](https://github.com/Abdennour-py/CVE-2021-3493)
|
||||
- [Ishan3011/CVE-2021-3493](https://github.com/Ishan3011/CVE-2021-3493)
|
||||
- [inspiringz/CVE-2021-3493](https://github.com/inspiringz/CVE-2021-3493)
|
||||
- [cerodah/overlayFS-CVE-2021-3493](https://github.com/cerodah/overlayFS-CVE-2021-3493)
|
||||
- [puckiestyle/CVE-2021-3493](https://github.com/puckiestyle/CVE-2021-3493)
|
||||
- [Senz4wa/CVE-2021-3493](https://github.com/Senz4wa/CVE-2021-3493)
|
||||
|
@ -9266,10 +9292,6 @@ It was found that polkit could be tricked into bypassing the credential checks f
|
|||
- [curtishoughton/CVE-2021-3560](https://github.com/curtishoughton/CVE-2021-3560)
|
||||
- [Almorabea/Polkit-exploit](https://github.com/Almorabea/Polkit-exploit)
|
||||
- [AssassinUKG/Polkit-CVE-2021-3560](https://github.com/AssassinUKG/Polkit-CVE-2021-3560)
|
||||
- [cpu0x00/CVE-2021-3560](https://github.com/cpu0x00/CVE-2021-3560)
|
||||
- [BizarreLove/CVE-2021-3560](https://github.com/BizarreLove/CVE-2021-3560)
|
||||
- [0dayNinja/CVE-2021-3560](https://github.com/0dayNinja/CVE-2021-3560)
|
||||
- [TomMalvoRiddle/CVE-2021-3560](https://github.com/TomMalvoRiddle/CVE-2021-3560)
|
||||
- [chenaotian/CVE-2021-3560](https://github.com/chenaotian/CVE-2021-3560)
|
||||
- [n3onhacks/CVE-2021-3560](https://github.com/n3onhacks/CVE-2021-3560)
|
||||
- [f4T1H21/CVE-2021-3560-Polkit-DBus](https://github.com/f4T1H21/CVE-2021-3560-Polkit-DBus)
|
||||
|
@ -9564,9 +9586,6 @@ An out-of-bounds (OOB) memory access flaw was found in the Linux kernel's eBPF d
|
|||
### CVE-2021-6901
|
||||
- [mooneee/cve-2021-6901](https://github.com/mooneee/cve-2021-6901)
|
||||
|
||||
### CVE-2021-10086
|
||||
- [AK-blank/CVE-2021-10086](https://github.com/AK-blank/CVE-2021-10086)
|
||||
|
||||
### CVE-2021-20038 (2021-12-08)
|
||||
|
||||
<code>
|
||||
|
@ -9874,7 +9893,6 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability in a v
|
|||
- [password520/CVE-2021-21972](https://github.com/password520/CVE-2021-21972)
|
||||
- [murataydemir/CVE-2021-21972](https://github.com/murataydemir/CVE-2021-21972)
|
||||
- [pettyhacks/vSphereyeeter](https://github.com/pettyhacks/vSphereyeeter)
|
||||
- [haiclover/CVE-2021-21972](https://github.com/haiclover/CVE-2021-21972)
|
||||
- [orangmuda/CVE-2021-21972](https://github.com/orangmuda/CVE-2021-21972)
|
||||
- [user16-et/cve-2021-21972_PoC](https://github.com/user16-et/cve-2021-21972_PoC)
|
||||
- [Schira4396/VcenterKiller](https://github.com/Schira4396/VcenterKiller)
|
||||
|
@ -9952,6 +9970,7 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability due to
|
|||
- [xnianq/cve-2021-21985_exp](https://github.com/xnianq/cve-2021-21985_exp)
|
||||
- [daedalus/CVE-2021-21985](https://github.com/daedalus/CVE-2021-21985)
|
||||
- [testanull/Project_CVE-2021-21985_PoC](https://github.com/testanull/Project_CVE-2021-21985_PoC)
|
||||
- [haiclover/CVE-2021-21985](https://github.com/haiclover/CVE-2021-21985)
|
||||
- [sknux/CVE-2021-21985_PoC](https://github.com/sknux/CVE-2021-21985_PoC)
|
||||
|
||||
### CVE-2021-22005 (2021-09-23)
|
||||
|
@ -10022,14 +10041,6 @@ An OS command injection vulnerability in FortiWeb's management interface 6.3.7 a
|
|||
|
||||
- [murataydemir/CVE-2021-22123](https://github.com/murataydemir/CVE-2021-22123)
|
||||
|
||||
### CVE-2021-22146 (2021-07-21)
|
||||
|
||||
<code>
|
||||
All versions of Elastic Cloud Enterprise has the Elasticsearch “anonymous” user enabled by default in deployed clusters. While in the default setting the anonymous user has no permissions and is unable to successfully query any Elasticsearch APIs, an attacker could leverage the anonymous user to gain insight into certain details of a deployed cluster.
|
||||
</code>
|
||||
|
||||
- [magichk/cve-2021-22146](https://github.com/magichk/cve-2021-22146)
|
||||
|
||||
### CVE-2021-22192 (2021-03-24)
|
||||
|
||||
<code>
|
||||
|
@ -10056,7 +10067,6 @@ Improper neutralization of user data in the DjVu file format in ExifTool version
|
|||
- [convisolabs/CVE-2021-22204-exiftool](https://github.com/convisolabs/CVE-2021-22204-exiftool)
|
||||
- [se162xg/CVE-2021-22204](https://github.com/se162xg/CVE-2021-22204)
|
||||
- [bilkoh/POC-CVE-2021-22204](https://github.com/bilkoh/POC-CVE-2021-22204)
|
||||
- [PenTestical/CVE-2021-22204](https://github.com/PenTestical/CVE-2021-22204)
|
||||
- [AssassinUKG/CVE-2021-22204](https://github.com/AssassinUKG/CVE-2021-22204)
|
||||
- [ph-arm/CVE-2021-22204-Gitlab](https://github.com/ph-arm/CVE-2021-22204-Gitlab)
|
||||
- [Asaad27/CVE-2021-22204-RSE](https://github.com/Asaad27/CVE-2021-22204-RSE)
|
||||
|
@ -10153,7 +10163,6 @@ A improper input sanitization vulnerability exists in Rocket.Chat server 3.11, 3
|
|||
</code>
|
||||
|
||||
- [CsEnox/CVE-2021-22911](https://github.com/CsEnox/CVE-2021-22911)
|
||||
- [optionalCTF/Rocket.Chat-Automated-Account-Takeover-RCE-CVE-2021-22911](https://github.com/optionalCTF/Rocket.Chat-Automated-Account-Takeover-RCE-CVE-2021-22911)
|
||||
- [jayngng/CVE-2021-22911](https://github.com/jayngng/CVE-2021-22911)
|
||||
- [ChrisPritchard/CVE-2021-22911-rust](https://github.com/ChrisPritchard/CVE-2021-22911-rust)
|
||||
- [MrDottt/CVE-2021-22911](https://github.com/MrDottt/CVE-2021-22911)
|
||||
|
@ -10303,14 +10312,6 @@ Arbitrary file upload in the Modern Events Calendar Lite WordPress plugin, versi
|
|||
|
||||
- [dnr6419/CVE-2021-24145](https://github.com/dnr6419/CVE-2021-24145)
|
||||
|
||||
### CVE-2021-24155 (2021-04-05)
|
||||
|
||||
<code>
|
||||
The WordPress Backup and Migrate Plugin – Backup Guard WordPress plugin before 1.6.0 did not ensure that the imported files are of the SGBP format and extension, allowing high privilege users (admin+) to upload arbitrary files, including PHP ones, leading to RCE.
|
||||
</code>
|
||||
|
||||
- [0dayNinja/CVE-2021-24155.rb](https://github.com/0dayNinja/CVE-2021-24155.rb)
|
||||
|
||||
### CVE-2021-24160 (2021-04-05)
|
||||
|
||||
<code>
|
||||
|
@ -10328,6 +10329,14 @@ The All in One SEO – Best WordPress SEO Plugin – Easily Improve Your SEO Ran
|
|||
|
||||
- [darkpills/CVE-2021-24307-all-in-one-seo-pack-admin-rce](https://github.com/darkpills/CVE-2021-24307-all-in-one-seo-pack-admin-rce)
|
||||
|
||||
### CVE-2021-24347 (2021-06-14)
|
||||
|
||||
<code>
|
||||
The SP Project & Document Manager WordPress plugin before 4.22 allows users to upload files, however, the plugin attempts to prevent php and other similar files that could be executed on the server from being uploaded by checking the file extension. It was discovered that php files could still be uploaded by changing the file extension's case, for example, from "php" to "pHP".
|
||||
</code>
|
||||
|
||||
- [huydoppa/CVE-2021-24347-](https://github.com/huydoppa/CVE-2021-24347-)
|
||||
|
||||
### CVE-2021-24499 (2021-08-09)
|
||||
|
||||
<code>
|
||||
|
@ -11036,14 +11045,6 @@ Windows NTFS Denial of Service Vulnerability
|
|||
|
||||
- [shubham0d/CVE-2021-28312](https://github.com/shubham0d/CVE-2021-28312)
|
||||
|
||||
### CVE-2021-28378 (2021-03-15)
|
||||
|
||||
<code>
|
||||
Gitea 1.12.x and 1.13.x before 1.13.4 allows XSS via certain issue data in some situations.
|
||||
</code>
|
||||
|
||||
- [pandatix/CVE-2021-28378](https://github.com/pandatix/CVE-2021-28378)
|
||||
|
||||
### CVE-2021-28476 (2021-05-11)
|
||||
|
||||
<code>
|
||||
|
@ -11282,7 +11283,6 @@ Type confusion in V8 in Google Chrome prior to 91.0.4472.101 allowed a remote at
|
|||
Use after free in GPU in Google Chrome prior to 92.0.4515.107 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
||||
</code>
|
||||
|
||||
- [s4e-lab/CVE-2021-30573-PoC-Google-Chrome](https://github.com/s4e-lab/CVE-2021-30573-PoC-Google-Chrome)
|
||||
- [orangmuda/CVE-2021-30573](https://github.com/orangmuda/CVE-2021-30573)
|
||||
- [kh4sh3i/CVE-2021-30573](https://github.com/kh4sh3i/CVE-2021-30573)
|
||||
|
||||
|
@ -11438,14 +11438,6 @@ A cross-site scripting (XSS) vulnerability has been reported and confirmed for B
|
|||
|
||||
- [karthi-the-hacker/CVE-2021-31589](https://github.com/karthi-the-hacker/CVE-2021-31589)
|
||||
|
||||
### CVE-2021-31630 (2021-08-03)
|
||||
|
||||
<code>
|
||||
Command Injection in Open PLC Webserver v3 allows remote attackers to execute arbitrary code via the "Hardware Layer Code Box" component on the "/hardware" page of the application.
|
||||
</code>
|
||||
|
||||
- [h3v0x/CVE-2021-31630-OpenPLC_RCE](https://github.com/h3v0x/CVE-2021-31630-OpenPLC_RCE)
|
||||
|
||||
### CVE-2021-31728 (2021-05-17)
|
||||
|
||||
<code>
|
||||
|
@ -11842,14 +11834,6 @@ For Eclipse Jetty versions 9.4.37-9.4.42, 10.0.1-10.0.5 & 11.0.1-11.0.5, URI
|
|||
|
||||
- [ColdFusionX/CVE-2021-34429](https://github.com/ColdFusionX/CVE-2021-34429)
|
||||
|
||||
### CVE-2021-34470 (2021-07-14)
|
||||
|
||||
<code>
|
||||
Microsoft Exchange Server Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-33768, CVE-2021-34523.
|
||||
</code>
|
||||
|
||||
- [technion/CVE-2021-34470scanner](https://github.com/technion/CVE-2021-34470scanner)
|
||||
|
||||
### CVE-2021-34473 (2021-07-14)
|
||||
|
||||
<code>
|
||||
|
@ -11896,8 +11880,16 @@ Microsoft Exchange Server Elevation of Privilege Vulnerability This CVE ID is un
|
|||
Windows Print Spooler Remote Code Execution Vulnerability
|
||||
</code>
|
||||
|
||||
- [JohnHammond/CVE-2021-34527](https://github.com/JohnHammond/CVE-2021-34527)
|
||||
- [nemo-wq/PrintNightmare-CVE-2021-34527](https://github.com/nemo-wq/PrintNightmare-CVE-2021-34527)
|
||||
- [CnOxx1/CVE-2021-34527-1675](https://github.com/CnOxx1/CVE-2021-34527-1675)
|
||||
- [rdboboia/disable-RegisterSpoolerRemoteRpcEndPoint](https://github.com/rdboboia/disable-RegisterSpoolerRemoteRpcEndPoint)
|
||||
- [geekbrett/CVE-2021-34527-PrintNightmare-Workaround](https://github.com/geekbrett/CVE-2021-34527-PrintNightmare-Workaround)
|
||||
- [byt3bl33d3r/ItWasAllADream](https://github.com/byt3bl33d3r/ItWasAllADream)
|
||||
- [vinaysudheer/Disable-Spooler-Service-PrintNightmare-CVE-2021-34527](https://github.com/vinaysudheer/Disable-Spooler-Service-PrintNightmare-CVE-2021-34527)
|
||||
- [glorisonlai/printnightmare](https://github.com/glorisonlai/printnightmare)
|
||||
- [Eutectico/Printnightmare](https://github.com/Eutectico/Printnightmare)
|
||||
- [syntaxbearror/PowerShell-PrintNightmare](https://github.com/syntaxbearror/PowerShell-PrintNightmare)
|
||||
- [Tomparte/PrintNightmare](https://github.com/Tomparte/PrintNightmare)
|
||||
- [Amaranese/CVE-2021-34527](https://github.com/Amaranese/CVE-2021-34527)
|
||||
- [cyb3rpeace/CVE-2021-34527](https://github.com/cyb3rpeace/CVE-2021-34527)
|
||||
|
@ -11951,6 +11943,7 @@ Istio (1.8.x, 1.9.0-1.9.5 and 1.10.0-1.10.1) contains a remotely exploitable vul
|
|||
Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application.
|
||||
</code>
|
||||
|
||||
- [YouGina/CVE-2021-35042](https://github.com/YouGina/CVE-2021-35042)
|
||||
- [mrlihd/CVE-2021-35042](https://github.com/mrlihd/CVE-2021-35042)
|
||||
- [r4vi/CVE-2021-35042](https://github.com/r4vi/CVE-2021-35042)
|
||||
- [Zh0ngS0n1337/CVE-2021-35042](https://github.com/Zh0ngS0n1337/CVE-2021-35042)
|
||||
|
@ -12152,13 +12145,7 @@ Windows Elevation of Privilege Vulnerability
|
|||
- [HuskyHacks/ShadowSteal](https://github.com/HuskyHacks/ShadowSteal)
|
||||
- [JoranSlingerland/CVE-2021-36934](https://github.com/JoranSlingerland/CVE-2021-36934)
|
||||
- [WiredPulse/Invoke-HiveNightmare](https://github.com/WiredPulse/Invoke-HiveNightmare)
|
||||
- [tda90/CVE-2021-36934](https://github.com/tda90/CVE-2021-36934)
|
||||
- [0x0D1n/CVE-2021-36934](https://github.com/0x0D1n/CVE-2021-36934)
|
||||
- [exploitblizzard/CVE-2021-36934](https://github.com/exploitblizzard/CVE-2021-36934)
|
||||
- [irissentinel/CVE-2021-36934](https://github.com/irissentinel/CVE-2021-36934)
|
||||
- [websecnl/CVE-2021-36934](https://github.com/websecnl/CVE-2021-36934)
|
||||
- [grishinpv/poc_CVE-2021-36934](https://github.com/grishinpv/poc_CVE-2021-36934)
|
||||
- [shaktavist/SeriousSam](https://github.com/shaktavist/SeriousSam)
|
||||
- [OlivierLaflamme/CVE-2021-36934-export-shadow-volume-POC](https://github.com/OlivierLaflamme/CVE-2021-36934-export-shadow-volume-POC)
|
||||
- [chron1k/oxide_hive](https://github.com/chron1k/oxide_hive)
|
||||
|
||||
|
@ -12186,14 +12173,6 @@ In the server in SerNet verinice before 1.22.2, insecure Java deserialization al
|
|||
|
||||
- [0xBrAinsTorM/CVE-2021-36981](https://github.com/0xBrAinsTorM/CVE-2021-36981)
|
||||
|
||||
### CVE-2021-37152 (2021-08-10)
|
||||
|
||||
<code>
|
||||
Multiple XSS issues exist in Sonatype Nexus Repository Manager 3 before 3.33.0. An authenticated attacker with the ability to add HTML files to a repository could redirect users to Nexus Repository Manager’s pages with code modifications.
|
||||
</code>
|
||||
|
||||
- [SecurityAnalysts/CVE-2021-37152](https://github.com/SecurityAnalysts/CVE-2021-37152)
|
||||
|
||||
### CVE-2021-37580 (2021-11-16)
|
||||
|
||||
<code>
|
||||
|
@ -12248,14 +12227,6 @@ A SQL injection vulnerability exists in version 3.0.2 of Hotel Druid when SQLite
|
|||
- [dievus/CVE-2021-37832](https://github.com/dievus/CVE-2021-37832)
|
||||
- [AK-blank/CVE-2021-37832](https://github.com/AK-blank/CVE-2021-37832)
|
||||
|
||||
### CVE-2021-37833 (2021-08-03)
|
||||
|
||||
<code>
|
||||
A reflected cross-site scripting (XSS) vulnerability exists in multiple pages in version 3.0.2 of the Hotel Druid application that allows for arbitrary execution of JavaScript commands.
|
||||
</code>
|
||||
|
||||
- [dievus/CVE-2021-37833](https://github.com/dievus/CVE-2021-37833)
|
||||
|
||||
### CVE-2021-37910 (2021-11-11)
|
||||
|
||||
<code>
|
||||
|
@ -12290,14 +12261,6 @@ Inappropriate implementation in V8 in Google Chrome prior to 95.0.4638.69 allowe
|
|||
|
||||
- [SpiralBL0CK/Chrome-V8-RCE-CVE-2021-38003](https://github.com/SpiralBL0CK/Chrome-V8-RCE-CVE-2021-38003)
|
||||
|
||||
### CVE-2021-38149 (2021-08-06)
|
||||
|
||||
<code>
|
||||
index.php/admin/add_user in Chikitsa Patient Management System 2.0.0 allows XSS.
|
||||
</code>
|
||||
|
||||
- [jboogie15/CVE-2021-38149](https://github.com/jboogie15/CVE-2021-38149)
|
||||
|
||||
### CVE-2021-38163 (2021-09-14)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue