mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/11/03 18:15:12
This commit is contained in:
parent
cf3f24ca38
commit
63c345c9ac
38 changed files with 356 additions and 134 deletions
|
@ -13,17 +13,17 @@
|
|||
"description": "Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)",
|
||||
"fork": false,
|
||||
"created_at": "2016-02-08T08:29:11Z",
|
||||
"updated_at": "2021-03-08T02:16:41Z",
|
||||
"updated_at": "2021-11-03T14:29:20Z",
|
||||
"pushed_at": "2016-04-14T15:53:28Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 36,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -270,5 +270,32 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 424265185,
|
||||
"name": "CVE-2015-1635",
|
||||
"full_name": "nksf7\/CVE-2015-1635",
|
||||
"owner": {
|
||||
"login": "nksf7",
|
||||
"id": 91738909,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91738909?v=4",
|
||||
"html_url": "https:\/\/github.com\/nksf7"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nksf7\/CVE-2015-1635",
|
||||
"description": "PoC for CVE-2015-1635 \/ MS15-034 - HTTP.sys Allows Remote Code Execution \/ Check & DOS",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-03T14:50:55Z",
|
||||
"updated_at": "2021-11-03T15:06:43Z",
|
||||
"pushed_at": "2021-11-03T15:06:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": "✨ HAProxy ve Keepalived konusunu load balancer ve cluster'a ek olarak güvenlik(zayıf SSL\/Kripto Kullanımı (LOGJAM) (CVE-2015-4000) zafiyeti önlemi) ve yüksek yüklere karşı ele alır.",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-24T12:51:27Z",
|
||||
"updated_at": "2021-10-16T18:33:12Z",
|
||||
"pushed_at": "2021-10-16T18:33:09Z",
|
||||
"updated_at": "2021-11-03T16:02:25Z",
|
||||
"pushed_at": "2021-11-03T16:02:22Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 1,
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2017-01-16T18:13:15Z",
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"forks_count": 13,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"forks": 14,
|
||||
"watchers": 63,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -137,11 +137,11 @@
|
|||
"description": "OpenSSH < 7.7 User Enumeration CVE-2018-15473 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-08T20:59:04Z",
|
||||
"updated_at": "2021-04-06T19:17:07Z",
|
||||
"updated_at": "2021-11-03T14:57:06Z",
|
||||
"pushed_at": "2021-04-06T19:17:05Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -152,8 +152,8 @@
|
|||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -237,8 +237,8 @@
|
|||
"description": "Fuel CMS 1.4.1 - Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-03T04:38:54Z",
|
||||
"updated_at": "2021-11-03T06:15:17Z",
|
||||
"pushed_at": "2021-11-03T06:15:15Z",
|
||||
"updated_at": "2021-11-03T16:12:05Z",
|
||||
"pushed_at": "2021-11-03T16:12:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -44,12 +44,12 @@
|
|||
"pushed_at": "2018-11-13T00:26:18Z",
|
||||
"stargazers_count": 230,
|
||||
"watchers_count": 230,
|
||||
"forks_count": 43,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 43,
|
||||
"forks": 44,
|
||||
"watchers": 230,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -40,10 +40,10 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2021-10-28T13:43:46Z",
|
||||
"updated_at": "2021-11-03T12:15:52Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 467,
|
||||
"watchers_count": 467,
|
||||
"stargazers_count": 468,
|
||||
"watchers_count": 468,
|
||||
"forks_count": 111,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -63,7 +63,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 111,
|
||||
"watchers": 467,
|
||||
"watchers": 468,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -74,10 +74,10 @@
|
|||
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-12T22:53:14Z",
|
||||
"updated_at": "2021-11-03T11:13:17Z",
|
||||
"updated_at": "2021-11-03T16:00:03Z",
|
||||
"pushed_at": "2021-01-08T10:31:22Z",
|
||||
"stargazers_count": 505,
|
||||
"watchers_count": 505,
|
||||
"stargazers_count": 506,
|
||||
"watchers_count": 506,
|
||||
"forks_count": 170,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -94,7 +94,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 170,
|
||||
"watchers": 505,
|
||||
"watchers": 506,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2021-06-12T15:07:59Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 3,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -40,10 +40,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-11-03T08:29:37Z",
|
||||
"updated_at": "2021-11-03T13:16:22Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2955,
|
||||
"watchers_count": 2955,
|
||||
"stargazers_count": 2956,
|
||||
"watchers_count": 2956,
|
||||
"forks_count": 871,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -70,7 +70,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 871,
|
||||
"watchers": 2955,
|
||||
"watchers": 2956,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -160,5 +160,32 @@
|
|||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 424285995,
|
||||
"name": "poc-for-cve-2020-0022",
|
||||
"full_name": "devdanqtuan\/poc-for-cve-2020-0022",
|
||||
"owner": {
|
||||
"login": "devdanqtuan",
|
||||
"id": 88175750,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88175750?v=4",
|
||||
"html_url": "https:\/\/github.com\/devdanqtuan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/devdanqtuan\/poc-for-cve-2020-0022",
|
||||
"description": "cve-2020-0022",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-03T15:48:53Z",
|
||||
"updated_at": "2021-11-03T15:50:17Z",
|
||||
"pushed_at": "2021-11-03T15:50:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -69,17 +69,17 @@
|
|||
"description": "cve-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-27T02:54:27Z",
|
||||
"updated_at": "2021-10-31T03:02:30Z",
|
||||
"updated_at": "2021-11-03T14:34:57Z",
|
||||
"pushed_at": "2020-06-19T09:28:15Z",
|
||||
"stargazers_count": 278,
|
||||
"watchers_count": 278,
|
||||
"stargazers_count": 279,
|
||||
"watchers_count": 279,
|
||||
"forks_count": 93,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 93,
|
||||
"watchers": 278,
|
||||
"watchers": 279,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-11-03T08:29:37Z",
|
||||
"updated_at": "2021-11-03T13:16:22Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2955,
|
||||
"watchers_count": 2955,
|
||||
"stargazers_count": 2956,
|
||||
"watchers_count": 2956,
|
||||
"forks_count": 871,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -43,7 +43,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 871,
|
||||
"watchers": 2955,
|
||||
"watchers": 2956,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -95,7 +95,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2020-07-14T02:42:41Z",
|
||||
"updated_at": "2021-10-07T23:36:52Z",
|
||||
"pushed_at": "2021-09-08T20:31:12Z",
|
||||
"pushed_at": "2021-11-03T17:37:09Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 5,
|
||||
|
|
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2020-12-06T08:23:02Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 11,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -28,7 +28,7 @@
|
|||
"security-vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"forks": 10,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -67,17 +67,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-21T01:22:45Z",
|
||||
"updated_at": "2021-07-05T05:00:12Z",
|
||||
"updated_at": "2021-11-03T15:18:29Z",
|
||||
"pushed_at": "2020-07-21T20:29:53Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 21,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2021-11-03T05:07:32Z",
|
||||
"updated_at": "2021-11-03T12:16:58Z",
|
||||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1441,
|
||||
"watchers_count": 1441,
|
||||
"stargazers_count": 1442,
|
||||
"watchers_count": 1442,
|
||||
"forks_count": 529,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 529,
|
||||
"watchers": 1441,
|
||||
"watchers": 1442,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -274,17 +274,17 @@
|
|||
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T23:45:58Z",
|
||||
"updated_at": "2021-11-02T18:19:29Z",
|
||||
"updated_at": "2021-11-03T16:14:37Z",
|
||||
"pushed_at": "2021-07-05T08:54:06Z",
|
||||
"stargazers_count": 675,
|
||||
"watchers_count": 675,
|
||||
"stargazers_count": 676,
|
||||
"watchers_count": 676,
|
||||
"forks_count": 181,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 181,
|
||||
"watchers": 675,
|
||||
"watchers": 676,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"description": "XMLRPC - RCE in MovableTypePoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-30T09:15:56Z",
|
||||
"updated_at": "2021-11-02T18:53:38Z",
|
||||
"pushed_at": "2021-11-02T18:53:36Z",
|
||||
"updated_at": "2021-11-03T17:07:38Z",
|
||||
"pushed_at": "2021-11-03T17:07:35Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 6,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Python exploit for the CVE-2021-22204 vulnerability in Exiftool",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-11T18:45:07Z",
|
||||
"updated_at": "2021-11-02T08:49:19Z",
|
||||
"updated_at": "2021-11-03T13:07:02Z",
|
||||
"pushed_at": "2021-05-20T21:42:43Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -26,7 +26,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T15:42:16Z",
|
||||
"updated_at": "2021-11-03T09:55:51Z",
|
||||
"updated_at": "2021-11-03T14:50:45Z",
|
||||
"pushed_at": "2021-11-02T14:45:24Z",
|
||||
"stargazers_count": 143,
|
||||
"watchers_count": 143,
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 143,
|
||||
"watchers": 144,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -67,17 +67,17 @@
|
|||
"description": "CVE-2021-22205 Unauthorized RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-28T14:02:51Z",
|
||||
"updated_at": "2021-11-02T08:47:29Z",
|
||||
"updated_at": "2021-11-03T14:51:31Z",
|
||||
"pushed_at": "2021-10-28T14:20:05Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 44,
|
||||
"watchers": 45,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -121,19 +121,19 @@
|
|||
"description": "CVE-2021-22205& GitLab CE\/EE RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-29T04:30:45Z",
|
||||
"updated_at": "2021-11-03T12:05:03Z",
|
||||
"updated_at": "2021-11-03T17:09:26Z",
|
||||
"pushed_at": "2021-10-29T04:31:15Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 15,
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2021-22205"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 31,
|
||||
"forks": 16,
|
||||
"watchers": 34,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -231,10 +231,10 @@
|
|||
"description": "CVE-2021-22205未授权漏洞批量检测与利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-31T04:15:30Z",
|
||||
"updated_at": "2021-11-03T01:45:16Z",
|
||||
"updated_at": "2021-11-03T14:56:02Z",
|
||||
"pushed_at": "2021-11-02T17:22:57Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -243,7 +243,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -314,17 +314,17 @@
|
|||
"description": "CVE-2021-22205-getshell",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-01T06:06:04Z",
|
||||
"updated_at": "2021-11-02T15:36:59Z",
|
||||
"updated_at": "2021-11-03T15:30:34Z",
|
||||
"pushed_at": "2021-11-01T07:30:16Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -94,17 +94,17 @@
|
|||
"description": "F5 BIG-IP\/BIG-IQ iControl Rest API SSRF to RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-21T04:58:17Z",
|
||||
"updated_at": "2021-09-13T21:26:38Z",
|
||||
"updated_at": "2021-11-03T13:24:11Z",
|
||||
"pushed_at": "2021-03-24T11:49:37Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-09-16T08:27:30Z",
|
||||
"updated_at": "2021-10-24T05:52:34Z",
|
||||
"updated_at": "2021-11-03T13:13:53Z",
|
||||
"pushed_at": "2021-09-16T08:49:16Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -67,17 +67,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-08-31T23:33:44Z",
|
||||
"updated_at": "2021-11-03T11:18:04Z",
|
||||
"updated_at": "2021-11-03T17:44:06Z",
|
||||
"pushed_at": "2021-09-01T01:01:06Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 50,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -958,17 +958,17 @@
|
|||
"description": "CVE-2021-26084,Atlassian Confluence OGNL注入漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-26T06:01:38Z",
|
||||
"updated_at": "2021-10-30T22:26:07Z",
|
||||
"updated_at": "2021-11-03T17:08:48Z",
|
||||
"pushed_at": "2021-10-27T02:30:40Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2021/CVE-2021-26294.json
Normal file
29
2021/CVE-2021-26294.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 424258180,
|
||||
"name": "CVE-2021-26294",
|
||||
"full_name": "dorkerdevil\/CVE-2021-26294",
|
||||
"owner": {
|
||||
"login": "dorkerdevil",
|
||||
"id": 15796745,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15796745?v=4",
|
||||
"html_url": "https:\/\/github.com\/dorkerdevil"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dorkerdevil\/CVE-2021-26294",
|
||||
"description": "Directory Traversal in Afterlogic webmail aurora and pro",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-03T14:32:13Z",
|
||||
"updated_at": "2021-11-03T16:24:38Z",
|
||||
"pushed_at": "2021-11-03T14:35:59Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2021/CVE-2021-29156.json
Normal file
29
2021/CVE-2021-29156.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 424232146,
|
||||
"name": "CVE-2021-29156",
|
||||
"full_name": "guidepointsecurity\/CVE-2021-29156",
|
||||
"owner": {
|
||||
"login": "guidepointsecurity",
|
||||
"id": 9867431,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9867431?v=4",
|
||||
"html_url": "https:\/\/github.com\/guidepointsecurity"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/guidepointsecurity\/CVE-2021-29156",
|
||||
"description": "Proof-of-Concept tool for CVE-2021-29156, an LDAP injection vulnerability in ForgeRock OpenAM v13.0.0.",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-03T13:21:50Z",
|
||||
"updated_at": "2021-11-03T15:27:18Z",
|
||||
"pushed_at": "2021-11-03T15:18:36Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -179,17 +179,17 @@
|
|||
"description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-18T05:42:13Z",
|
||||
"updated_at": "2021-11-03T06:05:06Z",
|
||||
"updated_at": "2021-11-03T17:51:45Z",
|
||||
"pushed_at": "2021-09-09T01:09:31Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 53,
|
||||
"watchers": 54,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "SolarWinds Orion Platform ActionPluginBaseView 反序列化RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-23T01:35:42Z",
|
||||
"updated_at": "2021-11-02T14:53:37Z",
|
||||
"updated_at": "2021-11-03T15:38:19Z",
|
||||
"pushed_at": "2021-10-23T01:44:54Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 8,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 43,
|
||||
"forks": 9,
|
||||
"watchers": 44,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Apache Druid 任意文件读取",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-14T03:47:02Z",
|
||||
"updated_at": "2021-10-18T15:27:59Z",
|
||||
"updated_at": "2021-11-03T17:07:34Z",
|
||||
"pushed_at": "2021-10-15T02:31:03Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -229,17 +229,17 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2021-11-02T15:41:42Z",
|
||||
"updated_at": "2021-11-03T13:41:38Z",
|
||||
"pushed_at": "2021-09-11T09:50:26Z",
|
||||
"stargazers_count": 1286,
|
||||
"watchers_count": 1286,
|
||||
"stargazers_count": 1287,
|
||||
"watchers_count": 1287,
|
||||
"forks_count": 416,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 416,
|
||||
"watchers": 1286,
|
||||
"watchers": 1287,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -67,10 +67,10 @@
|
|||
"description": "My exploit for CVE-2021-40449, a Windows LPE via a UAF in win32kfull!GreResetDCInternal.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-25T04:58:49Z",
|
||||
"updated_at": "2021-10-31T10:07:26Z",
|
||||
"updated_at": "2021-11-03T14:44:03Z",
|
||||
"pushed_at": "2021-10-25T06:32:34Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -79,7 +79,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -779,10 +779,10 @@
|
|||
"description": "A framework for bug hunting or pentesting targeting websites that have CVE-2021-41773 Vulnerability in public ",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-07T01:31:13Z",
|
||||
"updated_at": "2021-11-02T17:39:57Z",
|
||||
"updated_at": "2021-11-03T12:56:38Z",
|
||||
"pushed_at": "2021-10-07T08:25:26Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -795,7 +795,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 27,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -190,5 +190,32 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 424321579,
|
||||
"name": "CVE-2021-42013",
|
||||
"full_name": "robotsense1337\/CVE-2021-42013",
|
||||
"owner": {
|
||||
"login": "robotsense1337",
|
||||
"id": 84665951,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84665951?v=4",
|
||||
"html_url": "https:\/\/github.com\/robotsense1337"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/robotsense1337\/CVE-2021-42013",
|
||||
"description": "Exploit Apache 2.4.50(CVE-2021-42013)",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-03T17:33:52Z",
|
||||
"updated_at": "2021-11-03T17:41:44Z",
|
||||
"pushed_at": "2021-11-03T17:41:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": "WIP kernel exploit for minor bug i found in amd gpu driver",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-28T21:10:29Z",
|
||||
"updated_at": "2021-11-03T03:33:43Z",
|
||||
"pushed_at": "2021-11-03T03:33:40Z",
|
||||
"updated_at": "2021-11-03T15:48:10Z",
|
||||
"pushed_at": "2021-11-03T15:48:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Generate malicious files using recently published homoglyphic-attack (CVE-2021-42694)",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-02T20:39:47Z",
|
||||
"updated_at": "2021-11-03T08:18:42Z",
|
||||
"updated_at": "2021-11-03T17:09:24Z",
|
||||
"pushed_at": "2021-11-02T20:40:17Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 3,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"forks": 4,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2021/CVE-2021-43140.json
Normal file
29
2021/CVE-2021-43140.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 424323213,
|
||||
"name": "CVE-2021-43140",
|
||||
"full_name": "Dir0x\/CVE-2021-43140",
|
||||
"owner": {
|
||||
"login": "Dir0x",
|
||||
"id": 22798238,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22798238?v=4",
|
||||
"html_url": "https:\/\/github.com\/Dir0x"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Dir0x\/CVE-2021-43140",
|
||||
"description": "SQL injection vulnerability in login exists in Sourcecodester Simple Subscription Website.",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-03T17:39:22Z",
|
||||
"updated_at": "2021-11-03T17:49:30Z",
|
||||
"pushed_at": "2021-11-03T17:49:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2021/CVE-2021-43141.json
Normal file
29
2021/CVE-2021-43141.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 424326828,
|
||||
"name": "CVE-2021-43141",
|
||||
"full_name": "Dir0x\/CVE-2021-43141",
|
||||
"owner": {
|
||||
"login": "Dir0x",
|
||||
"id": 22798238,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22798238?v=4",
|
||||
"html_url": "https:\/\/github.com\/Dir0x"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Dir0x\/CVE-2021-43141",
|
||||
"description": "Information about CVE-2021-43141, a reflected XSS in the plan_application section.",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-03T17:51:29Z",
|
||||
"updated_at": "2021-11-03T17:57:33Z",
|
||||
"pushed_at": "2021-11-03T17:57:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
27
README.md
27
README.md
|
@ -1236,6 +1236,14 @@ Smarty before 3.1.39 allows a Sandbox Escape because $smarty.template_object can
|
|||
### CVE-2021-26121
|
||||
- [sourceincite/CVE-2021-26121](https://github.com/sourceincite/CVE-2021-26121)
|
||||
|
||||
### CVE-2021-26294 (2021-03-06)
|
||||
|
||||
<code>
|
||||
An issue was discovered in AfterLogic Aurora through 7.7.9 and WebMail Pro through 7.7.9. They allow directory traversal to read files (such as a data/settings/settings.xml file containing admin panel credentials), as demonstrated by dav/server.php/files/personal/%2e%2e when using the caldav_public_user account (with caldav_public_user as its password).
|
||||
</code>
|
||||
|
||||
- [dorkerdevil/CVE-2021-26294](https://github.com/dorkerdevil/CVE-2021-26294)
|
||||
|
||||
### CVE-2021-26295 (2021-03-22)
|
||||
|
||||
<code>
|
||||
|
@ -1462,7 +1470,7 @@ The Sovremennye Delovye Tekhnologii FX Aggregator terminal client 1 allows attac
|
|||
### CVE-2021-27190 (2021-02-11)
|
||||
|
||||
<code>
|
||||
A Stored Cross Site Scripting(XSS) Vulnerability was discovered in PEEL SHOPPING 9.3.0 which is publicly available. The user supplied input containing polyglot payload is echoed back in javascript code in HTML response. This allows an attacker to input malicious JavaScript which can steal cookie, redirect them to other malicious website, etc.
|
||||
A Stored Cross Site Scripting(XSS) Vulnerability was discovered in PEEL SHOPPING 9.3.0 and 9.4.0, which are publicly available. The user supplied input containing polyglot payload is echoed back in javascript code in HTML response. This allows an attacker to input malicious JavaScript which can steal cookie, redirect them to other malicious website, etc.
|
||||
</code>
|
||||
|
||||
- [anmolksachan/CVE-2021-27190-PEEL-Shopping-cart-9.3.0-Stored-XSS](https://github.com/anmolksachan/CVE-2021-27190-PEEL-Shopping-cart-9.3.0-Stored-XSS)
|
||||
|
@ -1678,6 +1686,14 @@ An issue was discovered in the Linux kernel through 5.11.x. kernel/bpf/verifier.
|
|||
|
||||
- [Kakashiiiiy/CVE-2021-29155](https://github.com/Kakashiiiiy/CVE-2021-29155)
|
||||
|
||||
### CVE-2021-29156 (2021-03-25)
|
||||
|
||||
<code>
|
||||
ForgeRock OpenAM before 13.5.1 allows LDAP injection via the Webfinger protocol. For example, an unauthenticated attacker can perform character-by-character retrieval of password hashes, or retrieve a session token or a private key.
|
||||
</code>
|
||||
|
||||
- [guidepointsecurity/CVE-2021-29156](https://github.com/guidepointsecurity/CVE-2021-29156)
|
||||
|
||||
### CVE-2021-29200 (2021-04-27)
|
||||
|
||||
<code>
|
||||
|
@ -3079,6 +3095,7 @@ It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was in
|
|||
- [TheLastVvV/CVE-2021-42013](https://github.com/TheLastVvV/CVE-2021-42013)
|
||||
- [TheLastVvV/CVE-2021-42013_Reverse-Shell](https://github.com/TheLastVvV/CVE-2021-42013_Reverse-Shell)
|
||||
- [walnutsecurity/cve-2021-42013](https://github.com/walnutsecurity/cve-2021-42013)
|
||||
- [robotsense1337/CVE-2021-42013](https://github.com/robotsense1337/CVE-2021-42013)
|
||||
|
||||
### CVE-2021-42071 (2021-10-07)
|
||||
|
||||
|
@ -3133,6 +3150,12 @@ An issue was discovered in the character definitions of the Unicode Specificatio
|
|||
### CVE-2021-43032
|
||||
- [SakuraSamuraii/CVE-2021-43032](https://github.com/SakuraSamuraii/CVE-2021-43032)
|
||||
|
||||
### CVE-2021-43140
|
||||
- [Dir0x/CVE-2021-43140](https://github.com/Dir0x/CVE-2021-43140)
|
||||
|
||||
### CVE-2021-43141
|
||||
- [Dir0x/CVE-2021-43141](https://github.com/Dir0x/CVE-2021-43141)
|
||||
|
||||
|
||||
## 2020
|
||||
### CVE-2020-0001 (2020-01-08)
|
||||
|
@ -3163,6 +3186,7 @@ In reassemble_and_dispatch of packet_fragmenter.cc, there is possible out of bou
|
|||
- [Polo35/CVE-2020-0022](https://github.com/Polo35/CVE-2020-0022)
|
||||
- [5k1l/cve-2020-0022](https://github.com/5k1l/cve-2020-0022)
|
||||
- [lsw29475/CVE-2020-0022](https://github.com/lsw29475/CVE-2020-0022)
|
||||
- [devdanqtuan/poc-for-cve-2020-0022](https://github.com/devdanqtuan/poc-for-cve-2020-0022)
|
||||
|
||||
### CVE-2020-0041 (2020-03-10)
|
||||
|
||||
|
@ -18562,6 +18586,7 @@ HTTP.sys in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Wind
|
|||
- [limkokholefork/CVE-2015-1635](https://github.com/limkokholefork/CVE-2015-1635)
|
||||
- [1nf1n17yk1ng/CVE-2015-1635-POC](https://github.com/1nf1n17yk1ng/CVE-2015-1635-POC)
|
||||
- [1nf1n17yk1ng/CVE-2015-1635](https://github.com/1nf1n17yk1ng/CVE-2015-1635)
|
||||
- [nksf7/CVE-2015-1635](https://github.com/nksf7/CVE-2015-1635)
|
||||
|
||||
### CVE-2015-1641 (2015-04-14)
|
||||
|
||||
|
|
Loading…
Reference in a new issue