mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2021/08/15 06:11:51
This commit is contained in:
parent
33f17267ce
commit
6453715750
17 changed files with 132 additions and 47 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2007-2447 - Samba usermap script",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-03T18:39:56Z",
|
||||
"updated_at": "2021-08-07T23:47:34Z",
|
||||
"updated_at": "2021-08-14T20:31:07Z",
|
||||
"pushed_at": "2020-08-16T18:54:38Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 25,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T04:32:26Z",
|
||||
"updated_at": "2021-08-08T16:42:53Z",
|
||||
"updated_at": "2021-08-14T20:25:58Z",
|
||||
"pushed_at": "2019-11-19T03:36:46Z",
|
||||
"stargazers_count": 546,
|
||||
"watchers_count": 546,
|
||||
"stargazers_count": 545,
|
||||
"watchers_count": 545,
|
||||
"forks_count": 93,
|
||||
"forks": 93,
|
||||
"watchers": 546,
|
||||
"watchers": 545,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T04:32:26Z",
|
||||
"updated_at": "2021-08-08T16:42:53Z",
|
||||
"updated_at": "2021-08-14T20:25:58Z",
|
||||
"pushed_at": "2019-11-19T03:36:46Z",
|
||||
"stargazers_count": 546,
|
||||
"watchers_count": 546,
|
||||
"stargazers_count": 545,
|
||||
"watchers_count": 545,
|
||||
"forks_count": 93,
|
||||
"forks": 93,
|
||||
"watchers": 546,
|
||||
"watchers": 545,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -151,7 +151,7 @@
|
|||
"description": "Bludit 3.9.2 - Remote command execution - CVE-2019-16113",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-03T21:38:39Z",
|
||||
"updated_at": "2021-08-11T17:26:15Z",
|
||||
"updated_at": "2021-08-14T18:37:33Z",
|
||||
"pushed_at": "2020-10-12T19:01:20Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-02-19T08:48:02Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Python script to exploit CVE-2020-14321 - Moodle 3.9 - Course enrollments allowed privilege escalation from teacher role into manager role to RCE.",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-28T19:46:55Z",
|
||||
"updated_at": "2021-07-28T11:10:20Z",
|
||||
"updated_at": "2021-08-14T18:43:13Z",
|
||||
"pushed_at": "2021-07-07T04:44:06Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -619,5 +619,28 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 396080591,
|
||||
"name": "ghostcat",
|
||||
"full_name": "jptr218\/ghostcat",
|
||||
"owner": {
|
||||
"login": "jptr218",
|
||||
"id": 84092766,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84092766?v=4",
|
||||
"html_url": "https:\/\/github.com\/jptr218"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jptr218\/ghostcat",
|
||||
"description": "An implementation of CVE-2020-1938",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-14T17:32:51Z",
|
||||
"updated_at": "2021-08-14T18:21:04Z",
|
||||
"pushed_at": "2021-08-14T18:21:02Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-19T03:34:06Z",
|
||||
"updated_at": "2021-08-09T08:29:08Z",
|
||||
"updated_at": "2021-08-14T18:48:50Z",
|
||||
"pushed_at": "2020-08-25T03:17:32Z",
|
||||
"stargazers_count": 268,
|
||||
"watchers_count": 268,
|
||||
"stargazers_count": 269,
|
||||
"watchers_count": 269,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 268,
|
||||
"watchers": 269,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-3435 ",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-25T20:53:48Z",
|
||||
"updated_at": "2021-08-14T12:06:38Z",
|
||||
"updated_at": "2021-08-14T19:37:49Z",
|
||||
"pushed_at": "2020-09-25T20:55:17Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -519,13 +519,13 @@
|
|||
"description": "CVE-2021-1675 (PrintNightmare)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-05T14:17:03Z",
|
||||
"updated_at": "2021-08-14T13:55:19Z",
|
||||
"updated_at": "2021-08-14T20:23:13Z",
|
||||
"pushed_at": "2021-07-05T14:34:34Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 48,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T09:56:21Z",
|
||||
"updated_at": "2021-08-03T02:47:26Z",
|
||||
"updated_at": "2021-08-14T21:10:39Z",
|
||||
"pushed_at": "2021-03-01T02:10:44Z",
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"forks_count": 59,
|
||||
"forks": 59,
|
||||
"watchers": 102,
|
||||
"watchers": 103,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Malicious Payloads that abuses Win32k Elevation of Privilege Vulnerability (CVE-2021-28310)",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-14T06:36:40Z",
|
||||
"updated_at": "2021-08-05T07:04:35Z",
|
||||
"updated_at": "2021-08-14T20:55:05Z",
|
||||
"pushed_at": "2021-04-14T07:16:45Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-24T18:50:17Z",
|
||||
"updated_at": "2021-08-13T17:53:44Z",
|
||||
"updated_at": "2021-08-14T17:32:04Z",
|
||||
"pushed_at": "2021-07-29T17:54:10Z",
|
||||
"stargazers_count": 131,
|
||||
"watchers_count": 131,
|
||||
"stargazers_count": 132,
|
||||
"watchers_count": 132,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 131,
|
||||
"watchers": 132,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -385,8 +385,8 @@
|
|||
"pushed_at": "2021-08-06T10:23:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
|
25
2021/CVE-2021-36949.json
Normal file
25
2021/CVE-2021-36949.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 396130351,
|
||||
"name": "Check-AAD-Connect-for-CVE-2021-36949-vulnerability",
|
||||
"full_name": "Maxwitat\/Check-AAD-Connect-for-CVE-2021-36949-vulnerability",
|
||||
"owner": {
|
||||
"login": "Maxwitat",
|
||||
"id": 18595261,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18595261?v=4",
|
||||
"html_url": "https:\/\/github.com\/Maxwitat"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Maxwitat\/Check-AAD-Connect-for-CVE-2021-36949-vulnerability",
|
||||
"description": "check if Azure AD Connect is affected by the vulnerability described in CVE-2021-36949",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-14T21:05:30Z",
|
||||
"updated_at": "2021-08-14T21:14:07Z",
|
||||
"pushed_at": "2021-08-14T21:14:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-38699.json
Normal file
25
2021/CVE-2021-38699.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 396128386,
|
||||
"name": "CVE-2021-38699",
|
||||
"full_name": "Justin-1993\/CVE-2021-38699",
|
||||
"owner": {
|
||||
"login": "Justin-1993",
|
||||
"id": 76507754,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76507754?v=4",
|
||||
"html_url": "https:\/\/github.com\/Justin-1993"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Justin-1993\/CVE-2021-38699",
|
||||
"description": "TastyIgniter 3.0.7 allows XSS via the name field during user-account creation",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-14T20:57:00Z",
|
||||
"updated_at": "2021-08-14T21:01:48Z",
|
||||
"pushed_at": "2021-08-14T21:01:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
12
README.md
12
README.md
|
@ -1834,6 +1834,14 @@ Windows Elevation of Privilege Vulnerability
|
|||
- [OlivierLaflamme/CVE-2021-36934_export_shadow_volume](https://github.com/OlivierLaflamme/CVE-2021-36934_export_shadow_volume)
|
||||
- [chron1k/oxide_hive](https://github.com/chron1k/oxide_hive)
|
||||
|
||||
### CVE-2021-36949 (2021-08-12)
|
||||
|
||||
<code>
|
||||
Microsoft Azure Active Directory Connect Authentication Bypass Vulnerability
|
||||
</code>
|
||||
|
||||
- [Maxwitat/Check-AAD-Connect-for-CVE-2021-36949-vulnerability](https://github.com/Maxwitat/Check-AAD-Connect-for-CVE-2021-36949-vulnerability)
|
||||
|
||||
### CVE-2021-37152 (2021-08-10)
|
||||
|
||||
<code>
|
||||
|
@ -1912,6 +1920,9 @@ openBaraza HCM 3.1.6 does not properly neutralize user-controllable input: an un
|
|||
|
||||
- [charlesbickel/CVE-2021-38619](https://github.com/charlesbickel/CVE-2021-38619)
|
||||
|
||||
### CVE-2021-38699
|
||||
- [Justin-1993/CVE-2021-38699](https://github.com/Justin-1993/CVE-2021-38699)
|
||||
|
||||
### CVE-2021-123456
|
||||
- [zoukba0014/cve-2021-123456](https://github.com/zoukba0014/cve-2021-123456)
|
||||
|
||||
|
@ -2596,6 +2607,7 @@ When using the Apache JServ Protocol (AJP), care must be taken when trusting inc
|
|||
- [Hancheng-Lei/Hacking-Vulnerability-CVE-2020-1938-Ghostcat](https://github.com/Hancheng-Lei/Hacking-Vulnerability-CVE-2020-1938-Ghostcat)
|
||||
- [streghstreek/CVE-2020-1938](https://github.com/streghstreek/CVE-2020-1938)
|
||||
- [Neko2sh1ro/CVE-2020-1938](https://github.com/Neko2sh1ro/CVE-2020-1938)
|
||||
- [jptr218/ghostcat](https://github.com/jptr218/ghostcat)
|
||||
|
||||
### CVE-2020-1947 (2020-03-11)
|
||||
|
||||
|
|
Loading…
Reference in a new issue