mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2023/11/21 06:37:47
This commit is contained in:
parent
ab1ac3de9b
commit
628581f0ea
73 changed files with 1013 additions and 175 deletions
|
@ -54,10 +54,10 @@
|
|||
"description": "Mitigated version for CVE-2016-1000027 spring web.",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-20T02:02:10Z",
|
||||
"updated_at": "2023-11-20T07:42:20Z",
|
||||
"updated_at": "2023-11-21T03:38:27Z",
|
||||
"pushed_at": "2023-11-20T02:29:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -66,7 +66,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -447,10 +447,10 @@
|
|||
"description": "Dirty Cow exploit - CVE-2016-5195",
|
||||
"fork": false,
|
||||
"created_at": "2016-11-25T21:08:01Z",
|
||||
"updated_at": "2023-11-15T05:14:48Z",
|
||||
"updated_at": "2023-11-21T00:09:14Z",
|
||||
"pushed_at": "2021-04-08T11:35:12Z",
|
||||
"stargazers_count": 776,
|
||||
"watchers_count": 776,
|
||||
"stargazers_count": 777,
|
||||
"watchers_count": 777,
|
||||
"has_discussions": false,
|
||||
"forks_count": 434,
|
||||
"allow_forking": true,
|
||||
|
@ -463,7 +463,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 434,
|
||||
"watchers": 776,
|
||||
"watchers": 777,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel\/createFromParcel mismatch)",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-03T09:04:50Z",
|
||||
"updated_at": "2023-07-17T01:53:23Z",
|
||||
"updated_at": "2023-11-21T03:59:28Z",
|
||||
"pushed_at": "2018-06-03T09:06:00Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -474,10 +474,10 @@
|
|||
"description": "针对类似CVE-2017-10271漏洞的一个java反序列化漏洞扫描器",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-13T02:00:23Z",
|
||||
"updated_at": "2021-08-21T07:04:57Z",
|
||||
"updated_at": "2023-11-21T01:26:28Z",
|
||||
"pushed_at": "2018-12-13T14:05:28Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -486,7 +486,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -119,10 +119,10 @@
|
|||
"description": "Multi-threaded, IPv6 aware, wordlists\/single-user username enumeration via CVE-2018-15473",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-03T10:18:04Z",
|
||||
"updated_at": "2023-11-08T13:10:38Z",
|
||||
"updated_at": "2023-11-21T05:09:10Z",
|
||||
"pushed_at": "2019-03-24T11:20:27Z",
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
|
@ -131,7 +131,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 84,
|
||||
"watchers": 85,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -258,7 +258,7 @@
|
|||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -271,7 +271,7 @@
|
|||
"exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"forks": 9,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -355,10 +355,10 @@
|
|||
"description": "Android Ransomware Development - AES256 encryption + CVE-2019-2215 (reverse root shell) + Data Exfiltration",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-28T02:34:31Z",
|
||||
"updated_at": "2023-10-28T22:31:13Z",
|
||||
"updated_at": "2023-11-21T03:02:56Z",
|
||||
"pushed_at": "2022-03-19T14:07:35Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -376,7 +376,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2020-0096-StrandHogg2 复现",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-07T10:25:25Z",
|
||||
"updated_at": "2023-07-31T12:57:57Z",
|
||||
"updated_at": "2023-11-21T04:01:23Z",
|
||||
"pushed_at": "2021-03-15T11:14:18Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -138,7 +138,7 @@
|
|||
"stargazers_count": 1077,
|
||||
"watchers_count": 1077,
|
||||
"has_discussions": false,
|
||||
"forks_count": 329,
|
||||
"forks_count": 328,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -148,7 +148,7 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 329,
|
||||
"forks": 328,
|
||||
"watchers": 1077,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2020-36179~82 Jackson-databind SSRF&RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-10T06:47:49Z",
|
||||
"updated_at": "2023-11-03T10:11:52Z",
|
||||
"updated_at": "2023-11-21T03:02:46Z",
|
||||
"pushed_at": "2021-01-10T06:48:53Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 76,
|
||||
"watchers": 77,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`\/`createFromParcel` serialization mismatch in `OutputConfiguration`",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-29T10:14:32Z",
|
||||
"updated_at": "2023-11-20T06:50:23Z",
|
||||
"updated_at": "2023-11-21T04:02:07Z",
|
||||
"pushed_at": "2022-03-03T17:50:03Z",
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 84,
|
||||
"watchers": 85,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
32
2021/CVE-2021-10086.json
Normal file
32
2021/CVE-2021-10086.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 432034471,
|
||||
"name": "CVE-2021-10086",
|
||||
"full_name": "AK-blank\/CVE-2021-10086",
|
||||
"owner": {
|
||||
"login": "AK-blank",
|
||||
"id": 56591429,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56591429?v=4",
|
||||
"html_url": "https:\/\/github.com\/AK-blank"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AK-blank\/CVE-2021-10086",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-11-26T02:43:58Z",
|
||||
"updated_at": "2023-04-28T02:53:28Z",
|
||||
"pushed_at": "2021-08-05T06:47:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -1051,6 +1051,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 420590964,
|
||||
"name": "CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler",
|
||||
"full_name": "5l1v3r1\/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler",
|
||||
"owner": {
|
||||
"login": "5l1v3r1",
|
||||
"id": 34143537,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
|
||||
"html_url": "https:\/\/github.com\/5l1v3r1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler",
|
||||
"description": "Temporary mitigation to the CVE-2021-1675. 'Spooler' service-disabled based on time schedule. PowerShell Scripts and Task Scheduler code provided. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-24T04:59:15Z",
|
||||
"updated_at": "2021-10-24T04:59:16Z",
|
||||
"pushed_at": "2021-07-05T05:41:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 435194981,
|
||||
"name": "NimNightmare",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for the CVE-2021-20837 : RCE in MovableType",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-25T21:25:39Z",
|
||||
"updated_at": "2023-09-28T11:32:38Z",
|
||||
"updated_at": "2023-11-21T02:18:16Z",
|
||||
"pushed_at": "2021-10-26T00:34:54Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -179,6 +179,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 412724557,
|
||||
"name": "CVE-2021-22005-metasploit",
|
||||
"full_name": "TaroballzChen\/CVE-2021-22005-metasploit",
|
||||
"owner": {
|
||||
"login": "TaroballzChen",
|
||||
"id": 27862593,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27862593?v=4",
|
||||
"html_url": "https:\/\/github.com\/TaroballzChen"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TaroballzChen\/CVE-2021-22005-metasploit",
|
||||
"description": "the metasploit script(POC\/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-02T07:32:04Z",
|
||||
"updated_at": "2023-09-28T11:31:56Z",
|
||||
"pushed_at": "2021-10-02T08:21:38Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 25,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 420817779,
|
||||
"name": "CVE-2021-22005",
|
||||
|
|
|
@ -89,6 +89,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 412296277,
|
||||
"name": "CVE-2021-22555-esc-priv",
|
||||
"full_name": "daletoniris\/CVE-2021-22555-esc-priv",
|
||||
"owner": {
|
||||
"login": "daletoniris",
|
||||
"id": 4347515,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4347515?v=4",
|
||||
"html_url": "https:\/\/github.com\/daletoniris"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/daletoniris\/CVE-2021-22555-esc-priv",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-01T02:18:45Z",
|
||||
"updated_at": "2021-10-01T02:19:18Z",
|
||||
"pushed_at": "2021-10-01T02:19:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 478003975,
|
||||
"name": "CVE-2021-22555-PipeVersion",
|
||||
|
|
|
@ -29,6 +29,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 414051484,
|
||||
"name": "cve-2021-24499",
|
||||
"full_name": "hh-hunter\/cve-2021-24499",
|
||||
"owner": {
|
||||
"login": "hh-hunter",
|
||||
"id": 91593280,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91593280?v=4",
|
||||
"html_url": "https:\/\/github.com\/hh-hunter"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hh-hunter\/cve-2021-24499",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-06T03:07:31Z",
|
||||
"updated_at": "2021-10-06T03:45:29Z",
|
||||
"pushed_at": "2021-10-06T03:44:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 698068217,
|
||||
"name": "CVE-2021-24499",
|
||||
|
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 413699979,
|
||||
"name": "CVE-2021-24545",
|
||||
"full_name": "V35HR4J\/CVE-2021-24545",
|
||||
"owner": {
|
||||
"login": "V35HR4J",
|
||||
"id": 54109630,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54109630?v=4",
|
||||
"html_url": "https:\/\/github.com\/V35HR4J"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/V35HR4J\/CVE-2021-24545",
|
||||
"description": "The plugin does not sanitise the HTML allowed in the Bio of users, allowing them to use malicious JavaScript code, which will be executed when anyone visit a post in the frontend made by such user. As a result, user with a role as low as author could perform Cross-Site Scripting attacks against users, which could potentially lead to privilege escalation when an admin view the related post\/s.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-05T06:28:05Z",
|
||||
"updated_at": "2021-10-12T14:24:58Z",
|
||||
"pushed_at": "2021-10-05T06:29:58Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 424104785,
|
||||
"name": "CVE-2021-24545",
|
||||
|
|
32
2021/CVE-2021-24563.json
Normal file
32
2021/CVE-2021-24563.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 413698388,
|
||||
"name": "CVE-2021-24563",
|
||||
"full_name": "V35HR4J\/CVE-2021-24563",
|
||||
"owner": {
|
||||
"login": "V35HR4J",
|
||||
"id": 54109630,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54109630?v=4",
|
||||
"html_url": "https:\/\/github.com\/V35HR4J"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/V35HR4J\/CVE-2021-24563",
|
||||
"description": "The plugin does not prevent HTML files from being uploaded via its form, allowing unauthenticated user to upload a malicious HTML file containing JavaScript for example, which will be triggered when someone access the file directly",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-05T06:21:50Z",
|
||||
"updated_at": "2022-03-25T03:22:55Z",
|
||||
"pushed_at": "2021-10-05T06:30:39Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -138,7 +138,7 @@
|
|||
"stargazers_count": 1077,
|
||||
"watchers_count": 1077,
|
||||
"has_discussions": false,
|
||||
"forks_count": 329,
|
||||
"forks_count": 328,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -148,7 +148,7 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 329,
|
||||
"forks": 328,
|
||||
"watchers": 1077,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
|
|
|
@ -843,6 +843,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 412676582,
|
||||
"name": "CVE-2021-26084",
|
||||
"full_name": "wdjcy\/CVE-2021-26084",
|
||||
"owner": {
|
||||
"login": "wdjcy",
|
||||
"id": 6531850,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6531850?v=4",
|
||||
"html_url": "https:\/\/github.com\/wdjcy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wdjcy\/CVE-2021-26084",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-02T03:11:50Z",
|
||||
"updated_at": "2021-10-02T03:16:43Z",
|
||||
"pushed_at": "2021-10-02T03:16:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 414400971,
|
||||
"name": "CVE-2021-26084",
|
||||
|
@ -873,6 +903,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 419246152,
|
||||
"name": "CVE-2021-26084_Confluence",
|
||||
"full_name": "TheclaMcentire\/CVE-2021-26084_Confluence",
|
||||
"owner": {
|
||||
"login": "TheclaMcentire",
|
||||
"id": 86812068,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86812068?v=4",
|
||||
"html_url": "https:\/\/github.com\/TheclaMcentire"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TheclaMcentire\/CVE-2021-26084_Confluence",
|
||||
"description": "Exploit CVE 2021 26084 Confluence",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-20T08:27:58Z",
|
||||
"updated_at": "2022-03-09T21:42:31Z",
|
||||
"pushed_at": "2021-09-08T11:04:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 420861154,
|
||||
"name": "CVE-2021-26084",
|
||||
|
@ -963,6 +1023,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 439271937,
|
||||
"name": "Confluence-CVE-2021-26084",
|
||||
"full_name": "30579096\/Confluence-CVE-2021-26084",
|
||||
"owner": {
|
||||
"login": "30579096",
|
||||
"id": 27181766,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27181766?v=4",
|
||||
"html_url": "https:\/\/github.com\/30579096"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/30579096\/Confluence-CVE-2021-26084",
|
||||
"description": "OGNL Injection in Confluence server version < 7.12.5",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-17T09:04:55Z",
|
||||
"updated_at": "2022-01-19T15:47:35Z",
|
||||
"pushed_at": "2021-09-03T07:37:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 447489190,
|
||||
"name": "CVE-2021-26084",
|
||||
|
|
|
@ -58,5 +58,39 @@
|
|||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 414009465,
|
||||
"name": "CVE-2021-27651",
|
||||
"full_name": "orangmuda\/CVE-2021-27651",
|
||||
"owner": {
|
||||
"login": "orangmuda",
|
||||
"id": 91846073,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
|
||||
"html_url": "https:\/\/github.com\/orangmuda"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/orangmuda\/CVE-2021-27651",
|
||||
"description": "bypass all stages of the password reset flow",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-05T23:33:50Z",
|
||||
"updated_at": "2023-09-28T11:32:04Z",
|
||||
"pushed_at": "2021-10-05T23:35:24Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"code-injection",
|
||||
"pega",
|
||||
"remote-code-execution"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 413725319,
|
||||
"name": "nacos-cve-2021-29441",
|
||||
"full_name": "hh-hunter\/nacos-cve-2021-29441",
|
||||
"owner": {
|
||||
"login": "hh-hunter",
|
||||
"id": 91593280,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91593280?v=4",
|
||||
"html_url": "https:\/\/github.com\/hh-hunter"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hh-hunter\/nacos-cve-2021-29441",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-05T07:59:05Z",
|
||||
"updated_at": "2021-10-05T07:59:17Z",
|
||||
"pushed_at": "2021-10-05T07:59:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 470076597,
|
||||
"name": "CVE-2021-29441",
|
||||
|
|
|
@ -542,10 +542,10 @@
|
|||
"description": "Laravel Debug mode RCE漏洞(CVE-2021-3129)poc \/ exp",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-04T17:04:38Z",
|
||||
"updated_at": "2023-11-02T00:51:04Z",
|
||||
"updated_at": "2023-11-21T04:58:17Z",
|
||||
"pushed_at": "2023-03-04T17:10:43Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -554,7 +554,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -215,6 +215,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 412824012,
|
||||
"name": "CVE-2021-3493",
|
||||
"full_name": "puckiestyle\/CVE-2021-3493",
|
||||
"owner": {
|
||||
"login": "puckiestyle",
|
||||
"id": 57447087,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
|
||||
"html_url": "https:\/\/github.com\/puckiestyle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/puckiestyle\/CVE-2021-3493",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-02T14:44:43Z",
|
||||
"updated_at": "2023-01-10T03:23:13Z",
|
||||
"pushed_at": "2021-10-02T14:44:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 544564976,
|
||||
"name": "CVE-2021-3493",
|
||||
|
|
|
@ -338,6 +338,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 427315131,
|
||||
"name": "CVE-2021-3560",
|
||||
"full_name": "TomMalvoRiddle\/CVE-2021-3560",
|
||||
"owner": {
|
||||
"login": "TomMalvoRiddle",
|
||||
"id": 64571518,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64571518?v=4",
|
||||
"html_url": "https:\/\/github.com\/TomMalvoRiddle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TomMalvoRiddle\/CVE-2021-3560",
|
||||
"description": "CVE-2021-3560 (Polkit - Local Privilege Escalation)",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-12T10:15:45Z",
|
||||
"updated_at": "2021-12-21T14:39:48Z",
|
||||
"pushed_at": "2021-07-26T07:08:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 453938064,
|
||||
"name": "CVE-2021-3560",
|
||||
|
|
32
2021/CVE-2021-39433.json
Normal file
32
2021/CVE-2021-39433.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 413549812,
|
||||
"name": "CVE-2021-39433",
|
||||
"full_name": "PinkDraconian\/CVE-2021-39433",
|
||||
"owner": {
|
||||
"login": "PinkDraconian",
|
||||
"id": 44903767,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44903767?v=4",
|
||||
"html_url": "https:\/\/github.com\/PinkDraconian"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/PinkDraconian\/CVE-2021-39433",
|
||||
"description": "BIQS IT Biqs-drive v1.83",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-04T19:02:35Z",
|
||||
"updated_at": "2022-12-10T12:13:04Z",
|
||||
"pushed_at": "2021-10-04T19:02:53Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -705,6 +705,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 417517068,
|
||||
"name": "MSHTML-CVE-2021-40444",
|
||||
"full_name": "metehangenel\/MSHTML-CVE-2021-40444",
|
||||
"owner": {
|
||||
"login": "metehangenel",
|
||||
"id": 31937891,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31937891?v=4",
|
||||
"html_url": "https:\/\/github.com\/metehangenel"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/metehangenel\/MSHTML-CVE-2021-40444",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-15T13:52:34Z",
|
||||
"updated_at": "2022-12-16T15:56:59Z",
|
||||
"pushed_at": "2021-09-16T17:53:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 417810289,
|
||||
"name": "TIC4301_Project",
|
||||
|
|
32
2021/CVE-2021-41511.json
Normal file
32
2021/CVE-2021-41511.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 412766915,
|
||||
"name": "CVE-2021-41511",
|
||||
"full_name": "vidvansh\/CVE-2021-41511",
|
||||
"owner": {
|
||||
"login": "vidvansh",
|
||||
"id": 56179464,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56179464?v=4",
|
||||
"html_url": "https:\/\/github.com\/vidvansh"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/vidvansh\/CVE-2021-41511",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-02T10:44:59Z",
|
||||
"updated_at": "2021-10-02T10:46:57Z",
|
||||
"pushed_at": "2021-10-02T10:46:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -29,6 +29,66 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 413892415,
|
||||
"name": "CVE-2021-41773",
|
||||
"full_name": "numanturle\/CVE-2021-41773",
|
||||
"owner": {
|
||||
"login": "numanturle",
|
||||
"id": 7007951,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4",
|
||||
"html_url": "https:\/\/github.com\/numanturle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/numanturle\/CVE-2021-41773",
|
||||
"description": "CVE-2021-41773",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-05T16:18:09Z",
|
||||
"updated_at": "2023-09-28T11:32:02Z",
|
||||
"pushed_at": "2021-10-05T16:48:27Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 413901787,
|
||||
"name": "CVE-2021-41773",
|
||||
"full_name": "knqyf263\/CVE-2021-41773",
|
||||
"owner": {
|
||||
"login": "knqyf263",
|
||||
"id": 2253692,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
|
||||
"html_url": "https:\/\/github.com\/knqyf263"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2021-41773",
|
||||
"description": "Path traversal in Apache HTTP Server 2.4.49 (CVE-2021-41773) ",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-05T16:45:41Z",
|
||||
"updated_at": "2023-09-28T11:32:02Z",
|
||||
"pushed_at": "2021-10-06T05:40:34Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 413916578,
|
||||
"name": "CVE-2021-41773-PoC",
|
||||
|
@ -95,6 +155,96 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 413943505,
|
||||
"name": "CVE-2021-41773",
|
||||
"full_name": "masahiro331\/CVE-2021-41773",
|
||||
"owner": {
|
||||
"login": "masahiro331",
|
||||
"id": 20438853,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20438853?v=4",
|
||||
"html_url": "https:\/\/github.com\/masahiro331"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/masahiro331\/CVE-2021-41773",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-05T18:56:04Z",
|
||||
"updated_at": "2023-09-28T11:32:03Z",
|
||||
"pushed_at": "2021-10-06T03:43:42Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 413969845,
|
||||
"name": "CVE-2021-41773",
|
||||
"full_name": "j4k0m\/CVE-2021-41773",
|
||||
"owner": {
|
||||
"login": "j4k0m",
|
||||
"id": 48088579,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48088579?v=4",
|
||||
"html_url": "https:\/\/github.com\/j4k0m"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/j4k0m\/CVE-2021-41773",
|
||||
"description": "Exploitation of CVE-2021-41773 a Directory Traversal in Apache 2.4.49.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-05T20:30:01Z",
|
||||
"updated_at": "2023-09-28T11:32:03Z",
|
||||
"pushed_at": "2021-10-05T22:06:50Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 13,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 413972926,
|
||||
"name": "POC-CVE-2021-41773",
|
||||
"full_name": "TishcaTpx\/POC-CVE-2021-41773",
|
||||
"owner": {
|
||||
"login": "TishcaTpx",
|
||||
"id": 91351013,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91351013?v=4",
|
||||
"html_url": "https:\/\/github.com\/TishcaTpx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TishcaTpx\/POC-CVE-2021-41773",
|
||||
"description": "Poc.py ",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-05T20:41:34Z",
|
||||
"updated_at": "2023-09-28T11:32:03Z",
|
||||
"pushed_at": "2021-10-05T21:29:59Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 414013246,
|
||||
"name": "CVE-2021-41773-PoC",
|
||||
|
@ -192,6 +342,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 414050354,
|
||||
"name": "CVE-2021-41773-PoC",
|
||||
"full_name": "habibiefaried\/CVE-2021-41773-PoC",
|
||||
"owner": {
|
||||
"login": "habibiefaried",
|
||||
"id": 4345690,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4345690?v=4",
|
||||
"html_url": "https:\/\/github.com\/habibiefaried"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/habibiefaried\/CVE-2021-41773-PoC",
|
||||
"description": "PoC for CVE-2021-41773 with docker to demonstrate",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-06T03:01:41Z",
|
||||
"updated_at": "2023-09-28T11:32:04Z",
|
||||
"pushed_at": "2021-10-06T05:39:24Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 414082287,
|
||||
"name": "CVE-2021-41773-POC",
|
||||
|
@ -222,6 +402,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 414082633,
|
||||
"name": "cve-2021-41773-nse",
|
||||
"full_name": "TAI-REx\/cve-2021-41773-nse",
|
||||
"owner": {
|
||||
"login": "TAI-REx",
|
||||
"id": 78527947,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78527947?v=4",
|
||||
"html_url": "https:\/\/github.com\/TAI-REx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TAI-REx\/cve-2021-41773-nse",
|
||||
"description": "CVE-2021-41773.nse",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-06T05:36:22Z",
|
||||
"updated_at": "2021-11-26T18:07:10Z",
|
||||
"pushed_at": "2021-10-06T05:23:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 414108838,
|
||||
"name": "CVE-2021-41773",
|
||||
|
|
|
@ -48,10 +48,10 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T10:28:12Z",
|
||||
"updated_at": "2023-11-20T14:46:49Z",
|
||||
"updated_at": "2023-11-21T01:41:23Z",
|
||||
"pushed_at": "2023-01-29T03:31:27Z",
|
||||
"stargazers_count": 659,
|
||||
"watchers_count": 659,
|
||||
"stargazers_count": 660,
|
||||
"watchers_count": 660,
|
||||
"has_discussions": false,
|
||||
"forks_count": 113,
|
||||
"allow_forking": true,
|
||||
|
@ -60,7 +60,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 113,
|
||||
"watchers": 659,
|
||||
"watchers": 660,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T19:27:30Z",
|
||||
"updated_at": "2023-11-13T01:26:35Z",
|
||||
"updated_at": "2023-11-21T01:42:30Z",
|
||||
"pushed_at": "2021-12-16T09:50:15Z",
|
||||
"stargazers_count": 1264,
|
||||
"watchers_count": 1264,
|
||||
"stargazers_count": 1265,
|
||||
"watchers_count": 1265,
|
||||
"has_discussions": false,
|
||||
"forks_count": 315,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 315,
|
||||
"watchers": 1264,
|
||||
"watchers": 1265,
|
||||
"score": 0,
|
||||
"subscribers_count": 27
|
||||
},
|
||||
|
|
|
@ -857,7 +857,7 @@
|
|||
"description": "🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T22:35:00Z",
|
||||
"updated_at": "2023-11-19T19:15:23Z",
|
||||
"updated_at": "2023-11-21T01:28:56Z",
|
||||
"pushed_at": "2022-01-15T16:18:44Z",
|
||||
"stargazers_count": 923,
|
||||
"watchers_count": 923,
|
||||
|
|
|
@ -74,5 +74,35 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 721416376,
|
||||
"name": "CVE-2022-0337-RePoC",
|
||||
"full_name": "zer0ne1\/CVE-2022-0337-RePoC",
|
||||
"owner": {
|
||||
"login": "zer0ne1",
|
||||
"id": 71746399,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71746399?v=4",
|
||||
"html_url": "https:\/\/github.com\/zer0ne1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zer0ne1\/CVE-2022-0337-RePoC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-11-21T02:34:32Z",
|
||||
"updated_at": "2023-11-21T02:36:09Z",
|
||||
"pushed_at": "2023-11-21T02:36:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -1215,10 +1215,10 @@
|
|||
"description": "CVE-2022-0847 (Dirty Pipe) is an arbitrary file overwrite vulnerability that allows escalation of privileges by modifying or overwriting arbitrary read-only files e.g. \/etc\/passwd, \/etc\/shadow.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-13T05:51:06Z",
|
||||
"updated_at": "2023-09-28T11:36:58Z",
|
||||
"updated_at": "2023-11-21T01:23:36Z",
|
||||
"pushed_at": "2022-03-13T06:02:30Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -1231,7 +1231,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-10T16:24:51Z",
|
||||
"updated_at": "2023-11-20T09:46:18Z",
|
||||
"updated_at": "2023-11-21T03:34:42Z",
|
||||
"pushed_at": "2023-04-12T17:28:49Z",
|
||||
"stargazers_count": 240,
|
||||
"watchers_count": 240,
|
||||
"stargazers_count": 241,
|
||||
"watchers_count": 241,
|
||||
"has_discussions": false,
|
||||
"forks_count": 45,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 45,
|
||||
"watchers": 240,
|
||||
"watchers": 241,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
}
|
||||
|
|
|
@ -163,10 +163,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-10-17T07:54:13Z",
|
||||
"updated_at": "2023-02-08T03:02:10Z",
|
||||
"updated_at": "2023-11-21T01:52:22Z",
|
||||
"pushed_at": "2022-10-17T08:12:33Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -175,7 +175,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T07:44:01Z",
|
||||
"updated_at": "2023-11-20T12:40:09Z",
|
||||
"updated_at": "2023-11-21T01:58:09Z",
|
||||
"pushed_at": "2023-02-26T14:06:05Z",
|
||||
"stargazers_count": 1070,
|
||||
"watchers_count": 1070,
|
||||
"stargazers_count": 1071,
|
||||
"watchers_count": 1071,
|
||||
"has_discussions": true,
|
||||
"forks_count": 184,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 184,
|
||||
"watchers": 1070,
|
||||
"watchers": 1071,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
},
|
||||
|
@ -989,7 +989,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 502137857,
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Automatic Mass Tool for check and exploiting vulnerability in CVE-2022-4061 - JobBoardWP < 1.2.2 - Unauthenticated Arbitrary File Upload",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-17T03:20:23Z",
|
||||
"updated_at": "2023-10-17T17:00:15Z",
|
||||
"updated_at": "2023-11-21T01:46:05Z",
|
||||
"pushed_at": "2023-09-17T10:05:02Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -34,7 +34,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -87,6 +87,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -184,10 +184,10 @@
|
|||
"description": "Confluence未授权添加管理员用户漏洞利用脚本",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-12T02:41:23Z",
|
||||
"updated_at": "2023-11-14T02:33:40Z",
|
||||
"updated_at": "2023-11-21T05:54:17Z",
|
||||
"pushed_at": "2023-10-26T07:39:57Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -196,7 +196,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 15,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -171,13 +171,13 @@
|
|||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -13,20 +13,20 @@
|
|||
"description": "LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-16T23:41:27Z",
|
||||
"updated_at": "2023-11-20T18:34:51Z",
|
||||
"updated_at": "2023-11-21T01:33:38Z",
|
||||
"pushed_at": "2023-11-18T22:54:27Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 37,
|
||||
"forks": 6,
|
||||
"watchers": 39,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 4
|
||||
}
|
||||
]
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"forks": 9,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-11-18T04:35:37Z",
|
||||
"updated_at": "2023-11-18T12:43:05Z",
|
||||
"updated_at": "2023-11-21T06:30:39Z",
|
||||
"pushed_at": "2023-11-18T06:20:34Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -48,13 +48,13 @@
|
|||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"forks": 16,
|
||||
"watchers": 88,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A Proof of Concept of Spring AMQP Deserialization Vulnerability (CVE-2023-34050)",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-20T05:46:15Z",
|
||||
"updated_at": "2023-11-01T03:05:55Z",
|
||||
"updated_at": "2023-11-21T01:30:55Z",
|
||||
"pushed_at": "2023-10-20T06:31:19Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Report and exploit of CVE-2023-36427",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-09T16:55:18Z",
|
||||
"updated_at": "2023-11-20T16:24:58Z",
|
||||
"updated_at": "2023-11-21T02:58:20Z",
|
||||
"pushed_at": "2023-11-18T17:24:26Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 67,
|
||||
"forks": 12,
|
||||
"watchers": 71,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -43,19 +43,19 @@
|
|||
"description": "CVE-2023-36899漏洞的复现环境和工具,针对ASP.NET框架中的无cookie会话身份验证绕过。",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-15T23:36:17Z",
|
||||
"updated_at": "2023-11-18T02:27:20Z",
|
||||
"updated_at": "2023-11-21T00:45:28Z",
|
||||
"pushed_at": "2023-08-15T23:37:11Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 19,
|
||||
"forks": 4,
|
||||
"watchers": 20,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -107,10 +107,10 @@
|
|||
"description": "一款用于生成winrar程序RCE(即cve-2023-38831)的POC的工具。",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-27T14:08:36Z",
|
||||
"updated_at": "2023-11-12T02:51:59Z",
|
||||
"updated_at": "2023-11-21T05:44:25Z",
|
||||
"pushed_at": "2023-08-27T14:35:00Z",
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
|
@ -119,7 +119,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 95,
|
||||
"watchers": 96,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-10-30T17:03:24Z",
|
||||
"updated_at": "2023-10-30T17:19:13Z",
|
||||
"pushed_at": "2023-11-20T00:42:38Z",
|
||||
"pushed_at": "2023-11-21T03:09:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "CVE-2023-4357. Chrome XXE 漏洞 POC, 实现对访客者本地文件读取. Chrome XXE vulnerability POC, allowing attackers to obtain local files of visitors.",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-17T10:32:31Z",
|
||||
"updated_at": "2023-11-20T12:56:27Z",
|
||||
"pushed_at": "2023-11-20T17:09:43Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"updated_at": "2023-11-21T06:30:46Z",
|
||||
"pushed_at": "2023-11-21T04:50:58Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 41,
|
||||
"forks": 16,
|
||||
"watchers": 47,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -43,20 +43,50 @@
|
|||
"description": "Apt style exploitation of Chrome 0day CVE-2023-4357",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-19T22:20:10Z",
|
||||
"updated_at": "2023-11-20T23:51:20Z",
|
||||
"updated_at": "2023-11-21T05:52:16Z",
|
||||
"pushed_at": "2023-11-20T01:02:44Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 13,
|
||||
"forks": 12,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 721463764,
|
||||
"name": "CVE-2023-4357-APT-Style-exploitation",
|
||||
"full_name": "passwa11\/CVE-2023-4357-APT-Style-exploitation",
|
||||
"owner": {
|
||||
"login": "passwa11",
|
||||
"id": 112363374,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112363374?v=4",
|
||||
"html_url": "https:\/\/github.com\/passwa11"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/passwa11\/CVE-2023-4357-APT-Style-exploitation",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-11-21T05:39:15Z",
|
||||
"updated_at": "2023-11-21T05:39:35Z",
|
||||
"pushed_at": "2023-11-21T05:39:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具, 基于 Go 语言",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-27T05:57:21Z",
|
||||
"updated_at": "2023-11-20T07:19:13Z",
|
||||
"updated_at": "2023-11-21T06:38:23Z",
|
||||
"pushed_at": "2023-11-17T08:40:55Z",
|
||||
"stargazers_count": 154,
|
||||
"watchers_count": 154,
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 154,
|
||||
"watchers": 155,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
@ -78,13 +78,13 @@
|
|||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"forks": 13,
|
||||
"watchers": 47,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
@ -165,10 +165,10 @@
|
|||
"description": "CVE-2023-46604 Apache ActiveMQ RCE exp 基于python",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-08T07:48:00Z",
|
||||
"updated_at": "2023-11-11T13:43:44Z",
|
||||
"updated_at": "2023-11-21T01:29:23Z",
|
||||
"pushed_at": "2023-11-08T07:52:43Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -177,7 +177,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -345,10 +345,10 @@
|
|||
"description": "PY",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-20T02:24:47Z",
|
||||
"updated_at": "2023-11-20T02:25:50Z",
|
||||
"updated_at": "2023-11-21T01:50:16Z",
|
||||
"pushed_at": "2023-11-20T07:41:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -357,9 +357,9 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 721121106,
|
||||
|
@ -389,6 +389,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "exploit for cve-2023-47246 SysAid RCE (shell upload)",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-17T07:03:06Z",
|
||||
"updated_at": "2023-11-20T15:06:19Z",
|
||||
"updated_at": "2023-11-21T05:52:39Z",
|
||||
"pushed_at": "2023-11-17T07:19:11Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 26,
|
||||
"watchers": 27,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -317,6 +317,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -237,7 +237,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-11-13T12:51:34Z",
|
||||
"updated_at": "2023-11-13T12:59:12Z",
|
||||
"pushed_at": "2023-11-13T12:58:13Z",
|
||||
"pushed_at": "2023-11-21T03:56:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
46
README.md
46
README.md
|
@ -692,6 +692,7 @@
|
|||
|
||||
- [xcanwin/CVE-2023-4357-Chrome-XXE](https://github.com/xcanwin/CVE-2023-4357-Chrome-XXE)
|
||||
- [OgulcanUnveren/CVE-2023-4357-APT-Style-exploitation](https://github.com/OgulcanUnveren/CVE-2023-4357-APT-Style-exploitation)
|
||||
- [passwa11/CVE-2023-4357-APT-Style-exploitation](https://github.com/passwa11/CVE-2023-4357-APT-Style-exploitation)
|
||||
|
||||
### CVE-2023-4460
|
||||
- [0xn4d/poc-cve-xss-uploading-svg](https://github.com/0xn4d/poc-cve-xss-uploading-svg)
|
||||
|
@ -5421,6 +5422,7 @@
|
|||
|
||||
- [Puliczek/CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera](https://github.com/Puliczek/CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera)
|
||||
- [maldev866/ChExp-CVE-2022-0337-](https://github.com/maldev866/ChExp-CVE-2022-0337-)
|
||||
- [zer0ne1/CVE-2022-0337-RePoC](https://github.com/zer0ne1/CVE-2022-0337-RePoC)
|
||||
|
||||
### CVE-2022-0412 (2022-02-28)
|
||||
|
||||
|
@ -12141,6 +12143,7 @@
|
|||
- [ly4k/PrintNightmare](https://github.com/ly4k/PrintNightmare)
|
||||
- [Wra7h/SharpPN](https://github.com/Wra7h/SharpPN)
|
||||
- [OppressionBreedsResistance/CVE-2021-1675-PrintNightmare](https://github.com/OppressionBreedsResistance/CVE-2021-1675-PrintNightmare)
|
||||
- [5l1v3r1/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler](https://github.com/5l1v3r1/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler)
|
||||
- [eversinc33/NimNightmare](https://github.com/eversinc33/NimNightmare)
|
||||
- [AndrewTrube/CVE-2021-1675](https://github.com/AndrewTrube/CVE-2021-1675)
|
||||
- [TheJoyOfHacking/cube0x0-CVE-2021-1675](https://github.com/TheJoyOfHacking/cube0x0-CVE-2021-1675)
|
||||
|
@ -12609,6 +12612,7 @@
|
|||
- [inspiringz/CVE-2021-3493](https://github.com/inspiringz/CVE-2021-3493)
|
||||
- [derek-turing/CVE-2021-3493](https://github.com/derek-turing/CVE-2021-3493)
|
||||
- [cerodah/overlayFS-CVE-2021-3493](https://github.com/cerodah/overlayFS-CVE-2021-3493)
|
||||
- [puckiestyle/CVE-2021-3493](https://github.com/puckiestyle/CVE-2021-3493)
|
||||
- [Senz4wa/CVE-2021-3493](https://github.com/Senz4wa/CVE-2021-3493)
|
||||
- [fei9747/CVE-2021-3493](https://github.com/fei9747/CVE-2021-3493)
|
||||
- [pmihsan/OverlayFS-CVE-2021-3493](https://github.com/pmihsan/OverlayFS-CVE-2021-3493)
|
||||
|
@ -12638,6 +12642,7 @@
|
|||
- [cpu0x00/CVE-2021-3560](https://github.com/cpu0x00/CVE-2021-3560)
|
||||
- [BizarreLove/CVE-2021-3560](https://github.com/BizarreLove/CVE-2021-3560)
|
||||
- [0dayNinja/CVE-2021-3560](https://github.com/0dayNinja/CVE-2021-3560)
|
||||
- [TomMalvoRiddle/CVE-2021-3560](https://github.com/TomMalvoRiddle/CVE-2021-3560)
|
||||
- [chenaotian/CVE-2021-3560](https://github.com/chenaotian/CVE-2021-3560)
|
||||
- [n3onhacks/CVE-2021-3560](https://github.com/n3onhacks/CVE-2021-3560)
|
||||
- [f4T1H21/CVE-2021-3560-Polkit-DBus](https://github.com/f4T1H21/CVE-2021-3560-Polkit-DBus)
|
||||
|
@ -12944,6 +12949,9 @@
|
|||
### CVE-2021-6901
|
||||
- [mooneee/cve-2021-6901](https://github.com/mooneee/cve-2021-6901)
|
||||
|
||||
### CVE-2021-10086
|
||||
- [AK-blank/CVE-2021-10086](https://github.com/AK-blank/CVE-2021-10086)
|
||||
|
||||
### CVE-2021-20021 (2021-04-09)
|
||||
|
||||
<code>A vulnerability in the SonicWall Email Security version 10.0.9.x allows an attacker to create an administrative account by sending a crafted HTTP request to the remote host.
|
||||
|
@ -13319,6 +13327,7 @@
|
|||
- [5gstudent/CVE-2021-22005-](https://github.com/5gstudent/CVE-2021-22005-)
|
||||
- [RedTeamExp/CVE-2021-22005_PoC](https://github.com/RedTeamExp/CVE-2021-22005_PoC)
|
||||
- [rwincey/CVE-2021-22005](https://github.com/rwincey/CVE-2021-22005)
|
||||
- [TaroballzChen/CVE-2021-22005-metasploit](https://github.com/TaroballzChen/CVE-2021-22005-metasploit)
|
||||
- [TiagoSergio/CVE-2021-22005](https://github.com/TiagoSergio/CVE-2021-22005)
|
||||
- [Jun-5heng/CVE-2021-22005](https://github.com/Jun-5heng/CVE-2021-22005)
|
||||
- [shmilylty/cve-2021-22005-exp](https://github.com/shmilylty/cve-2021-22005-exp)
|
||||
|
@ -13475,6 +13484,7 @@
|
|||
- [JoneyJunior/cve-2021-22555](https://github.com/JoneyJunior/cve-2021-22555)
|
||||
- [xyjl-ly/CVE-2021-22555-Exploit](https://github.com/xyjl-ly/CVE-2021-22555-Exploit)
|
||||
- [cgwalters/container-cve-2021-22555](https://github.com/cgwalters/container-cve-2021-22555)
|
||||
- [daletoniris/CVE-2021-22555-esc-priv](https://github.com/daletoniris/CVE-2021-22555-esc-priv)
|
||||
- [veritas501/CVE-2021-22555-PipeVersion](https://github.com/veritas501/CVE-2021-22555-PipeVersion)
|
||||
- [masjohncook/netsec-project](https://github.com/masjohncook/netsec-project)
|
||||
- [tukru/CVE-2021-22555](https://github.com/tukru/CVE-2021-22555)
|
||||
|
@ -13706,6 +13716,7 @@
|
|||
</code>
|
||||
|
||||
- [j4k0m/CVE-2021-24499](https://github.com/j4k0m/CVE-2021-24499)
|
||||
- [hh-hunter/cve-2021-24499](https://github.com/hh-hunter/cve-2021-24499)
|
||||
- [jytmX/CVE-2021-24499](https://github.com/jytmX/CVE-2021-24499)
|
||||
|
||||
### CVE-2021-24507 (2021-08-09)
|
||||
|
@ -13720,8 +13731,16 @@
|
|||
<code>The WP HTML Author Bio WordPress plugin through 1.2.0 does not sanitise the HTML allowed in the Bio of users, allowing them to use malicious JavaScript code, which will be executed when anyone visit a post in the frontend made by such user. As a result, user with a role as low as author could perform Cross-Site Scripting attacks against users, which could potentially lead to privilege escalation when an admin view the related post/s.
|
||||
</code>
|
||||
|
||||
- [V35HR4J/CVE-2021-24545](https://github.com/V35HR4J/CVE-2021-24545)
|
||||
- [dnr6419/CVE-2021-24545](https://github.com/dnr6419/CVE-2021-24545)
|
||||
|
||||
### CVE-2021-24563 (2021-10-11)
|
||||
|
||||
<code>The Frontend Uploader WordPress plugin through 1.3.2 does not prevent HTML files from being uploaded via its form, allowing unauthenticated user to upload a malicious HTML file containing JavaScript for example, which will be triggered when someone access the file directly
|
||||
</code>
|
||||
|
||||
- [V35HR4J/CVE-2021-24563](https://github.com/V35HR4J/CVE-2021-24563)
|
||||
|
||||
### CVE-2021-24647 (2021-11-08)
|
||||
|
||||
<code>The Registration Forms – User profile, Content Restriction, Spam Protection, Payment Gateways, Invitation Codes WordPress plugin before 3.1.7.6 has a flaw in the social login implementation, allowing unauthenticated attacker to login as any user on the site by only knowing their user ID or username
|
||||
|
@ -13934,10 +13953,13 @@
|
|||
- [nizar0x1f/CVE-2021-26084-patch-](https://github.com/nizar0x1f/CVE-2021-26084-patch-)
|
||||
- [dorkerdevil/CVE-2021-26084](https://github.com/dorkerdevil/CVE-2021-26084)
|
||||
- [ludy-dev/CVE-2021-26084_PoC](https://github.com/ludy-dev/CVE-2021-26084_PoC)
|
||||
- [wdjcy/CVE-2021-26084](https://github.com/wdjcy/CVE-2021-26084)
|
||||
- [orangmuda/CVE-2021-26084](https://github.com/orangmuda/CVE-2021-26084)
|
||||
- [TheclaMcentire/CVE-2021-26084_Confluence](https://github.com/TheclaMcentire/CVE-2021-26084_Confluence)
|
||||
- [Jun-5heng/CVE-2021-26084](https://github.com/Jun-5heng/CVE-2021-26084)
|
||||
- [lleavesl/CVE-2021-26084](https://github.com/lleavesl/CVE-2021-26084)
|
||||
- [quesodipesto/conflucheck](https://github.com/quesodipesto/conflucheck)
|
||||
- [30579096/Confluence-CVE-2021-26084](https://github.com/30579096/Confluence-CVE-2021-26084)
|
||||
- [antx-code/CVE-2021-26084](https://github.com/antx-code/CVE-2021-26084)
|
||||
- [vpxuser/CVE-2021-26084-EXP](https://github.com/vpxuser/CVE-2021-26084-EXP)
|
||||
|
||||
|
@ -14292,6 +14314,7 @@
|
|||
|
||||
- [samwcyo/CVE-2021-27651-PoC](https://github.com/samwcyo/CVE-2021-27651-PoC)
|
||||
- [Vulnmachines/CVE-2021-27651](https://github.com/Vulnmachines/CVE-2021-27651)
|
||||
- [orangmuda/CVE-2021-27651](https://github.com/orangmuda/CVE-2021-27651)
|
||||
|
||||
### CVE-2021-27850 (2021-04-15)
|
||||
|
||||
|
@ -14490,6 +14513,7 @@
|
|||
<code>Nacos is a platform designed for dynamic service discovery and configuration and service management. In Nacos before version 1.4.1, when configured to use authentication (-Dnacos.core.auth.enabled=true) Nacos uses the AuthFilter servlet filter to enforce authentication. This filter has a backdoor that enables Nacos servers to bypass this filter and therefore skip authentication checks. This mechanism relies on the user-agent HTTP header so it can be easily spoofed. This issue may allow any user to carry out any administrative tasks on the Nacos server.
|
||||
</code>
|
||||
|
||||
- [hh-hunter/nacos-cve-2021-29441](https://github.com/hh-hunter/nacos-cve-2021-29441)
|
||||
- [bysinks/CVE-2021-29441](https://github.com/bysinks/CVE-2021-29441)
|
||||
|
||||
### CVE-2021-29447 (2021-04-15)
|
||||
|
@ -15846,6 +15870,13 @@
|
|||
|
||||
- [StefanDorresteijn/CVE-2021-39409](https://github.com/StefanDorresteijn/CVE-2021-39409)
|
||||
|
||||
### CVE-2021-39433 (2021-10-04)
|
||||
|
||||
<code>A local file inclusion (LFI) vulnerability exists in version BIQS IT Biqs-drive v1.83 and below when sending a specific payload as the file parameter to download/index.php. This allows the attacker to read arbitrary files from the server with the permissions of the configured web-user.
|
||||
</code>
|
||||
|
||||
- [PinkDraconian/CVE-2021-39433](https://github.com/PinkDraconian/CVE-2021-39433)
|
||||
|
||||
### CVE-2021-39473 (2022-11-04)
|
||||
|
||||
<code>Saibamen HotelManager v1.2 is vulnerable to Cross Site Scripting (XSS) due to improper sanitization of comment and contact fields.
|
||||
|
@ -16061,6 +16092,7 @@
|
|||
- [kal1gh0st/CVE-2021-40444_CAB_archives](https://github.com/kal1gh0st/CVE-2021-40444_CAB_archives)
|
||||
- [LazarusReborn/Docx-Exploit-2021](https://github.com/LazarusReborn/Docx-Exploit-2021)
|
||||
- [H0j3n/CVE-2021-40444](https://github.com/H0j3n/CVE-2021-40444)
|
||||
- [metehangenel/MSHTML-CVE-2021-40444](https://github.com/metehangenel/MSHTML-CVE-2021-40444)
|
||||
- [Jeromeyoung/TIC4301_Project](https://github.com/Jeromeyoung/TIC4301_Project)
|
||||
- [TiagoSergio/CVE-2021-40444](https://github.com/TiagoSergio/CVE-2021-40444)
|
||||
- [wh00datz/CVE-2021-40444-POC](https://github.com/wh00datz/CVE-2021-40444-POC)
|
||||
|
@ -16308,6 +16340,13 @@
|
|||
|
||||
- [Net-hunter121/CVE-2021-41381](https://github.com/Net-hunter121/CVE-2021-41381)
|
||||
|
||||
### CVE-2021-41511 (2021-10-04)
|
||||
|
||||
<code>The username and password field of login in Lodging Reservation Management System V1 can give access to any user by using SQL injection to bypass authentication.
|
||||
</code>
|
||||
|
||||
- [vidvansh/CVE-2021-41511](https://github.com/vidvansh/CVE-2021-41511)
|
||||
|
||||
### CVE-2021-41560 (2021-12-15)
|
||||
|
||||
<code>OpenCATS through 0.9.6 allows remote attackers to execute arbitrary code by uploading an executable file via lib/FileUtility.php.
|
||||
|
@ -16401,12 +16440,19 @@
|
|||
</code>
|
||||
|
||||
- [Vulnmachines/cve-2021-41773](https://github.com/Vulnmachines/cve-2021-41773)
|
||||
- [numanturle/CVE-2021-41773](https://github.com/numanturle/CVE-2021-41773)
|
||||
- [knqyf263/CVE-2021-41773](https://github.com/knqyf263/CVE-2021-41773)
|
||||
- [ZephrFish/CVE-2021-41773-PoC](https://github.com/ZephrFish/CVE-2021-41773-PoC)
|
||||
- [iilegacyyii/PoC-CVE-2021-41773](https://github.com/iilegacyyii/PoC-CVE-2021-41773)
|
||||
- [masahiro331/CVE-2021-41773](https://github.com/masahiro331/CVE-2021-41773)
|
||||
- [j4k0m/CVE-2021-41773](https://github.com/j4k0m/CVE-2021-41773)
|
||||
- [TishcaTpx/POC-CVE-2021-41773](https://github.com/TishcaTpx/POC-CVE-2021-41773)
|
||||
- [lorddemon/CVE-2021-41773-PoC](https://github.com/lorddemon/CVE-2021-41773-PoC)
|
||||
- [Ls4ss/CVE-2021-41773_CVE-2021-42013](https://github.com/Ls4ss/CVE-2021-41773_CVE-2021-42013)
|
||||
- [itsecurityco/CVE-2021-41773](https://github.com/itsecurityco/CVE-2021-41773)
|
||||
- [habibiefaried/CVE-2021-41773-PoC](https://github.com/habibiefaried/CVE-2021-41773-PoC)
|
||||
- [creadpag/CVE-2021-41773-POC](https://github.com/creadpag/CVE-2021-41773-POC)
|
||||
- [TAI-REx/cve-2021-41773-nse](https://github.com/TAI-REx/cve-2021-41773-nse)
|
||||
- [blasty/CVE-2021-41773](https://github.com/blasty/CVE-2021-41773)
|
||||
- [PentesterGuruji/CVE-2021-41773](https://github.com/PentesterGuruji/CVE-2021-41773)
|
||||
- [jbovet/CVE-2021-41773](https://github.com/jbovet/CVE-2021-41773)
|
||||
|
|
Loading…
Reference in a new issue