mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/03/14 12:09:52
This commit is contained in:
parent
0f7c9fab15
commit
64ec9b8548
12 changed files with 64 additions and 69 deletions
25
2001/CVE-2001-3389.json
Normal file
25
2001/CVE-2001-3389.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 343972874,
|
||||
"name": "Gaston",
|
||||
"full_name": "becrevex\/Gaston",
|
||||
"owner": {
|
||||
"login": "becrevex",
|
||||
"id": 8326868,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8326868?v=4",
|
||||
"html_url": "https:\/\/github.com\/becrevex"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/becrevex\/Gaston",
|
||||
"description": "BEAST (CVE-2001-3389) Checker",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-03T02:10:01Z",
|
||||
"updated_at": "2021-03-03T02:14:10Z",
|
||||
"pushed_at": "2021-03-03T02:14:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 291075050,
|
||||
"name": "CVE-2005-0603-phpBB-2.0.12-Full-path-disclosure",
|
||||
"full_name": "Parcer0\/CVE-2005-0603-phpBB-2.0.12-Full-path-disclosure",
|
||||
"owner": {
|
||||
"login": "Parcer0",
|
||||
"id": 70012338,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70012338?v=4",
|
||||
"html_url": "https:\/\/github.com\/Parcer0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Parcer0\/CVE-2005-0603-phpBB-2.0.12-Full-path-disclosure",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-08-28T15:01:49Z",
|
||||
"updated_at": "2020-08-28T15:04:23Z",
|
||||
"pushed_at": "2020-08-28T15:04:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -473,8 +473,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-10-18T14:01:59Z",
|
||||
"updated_at": "2021-03-10T00:52:29Z",
|
||||
"pushed_at": "2021-03-10T00:52:27Z",
|
||||
"updated_at": "2021-03-14T00:48:40Z",
|
||||
"pushed_at": "2021-03-14T00:48:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2019-05-14T21:51:14Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 53,
|
||||
"forks": 53,
|
||||
"forks_count": 54,
|
||||
"forks": 54,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
|
|
File diff suppressed because one or more lines are too long
|
@ -13,13 +13,13 @@
|
|||
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-31T04:51:43Z",
|
||||
"updated_at": "2021-03-05T01:54:21Z",
|
||||
"updated_at": "2021-03-14T00:21:25Z",
|
||||
"pushed_at": "2019-08-01T16:02:59Z",
|
||||
"stargazers_count": 250,
|
||||
"watchers_count": 250,
|
||||
"stargazers_count": 251,
|
||||
"watchers_count": 251,
|
||||
"forks_count": 95,
|
||||
"forks": 95,
|
||||
"watchers": 250,
|
||||
"watchers": 251,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-1732 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-05T02:11:10Z",
|
||||
"updated_at": "2021-03-13T20:29:59Z",
|
||||
"updated_at": "2021-03-14T02:49:22Z",
|
||||
"pushed_at": "2021-03-05T03:10:26Z",
|
||||
"stargazers_count": 229,
|
||||
"watchers_count": 229,
|
||||
"stargazers_count": 231,
|
||||
"watchers_count": 231,
|
||||
"forks_count": 48,
|
||||
"forks": 48,
|
||||
"watchers": 229,
|
||||
"watchers": 231,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -404,13 +404,13 @@
|
|||
"description": "CVE-2021-26855, also known as Proxylogon, is a server-side request forgery (SSRF) vulnerability in Exchange that allows an attacker to send arbitrary HTTP requests and authenticate as the Exchange server. According to Orange Tsai, the researcher who discovered the vulnerabilities, CVE-2021-26855 allows code execution when chained with CVE-2021-27065 (see below). A successful exploit chain would allow an unauthenticated attacker to \"execute arbitrary commands on Microsoft Exchange Server through only an open 443 port.\" More information and a disclosure timeline are available at https:\/\/proxylogon.com.",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T19:35:35Z",
|
||||
"updated_at": "2021-03-13T11:23:41Z",
|
||||
"updated_at": "2021-03-14T02:01:52Z",
|
||||
"pushed_at": "2021-03-11T20:59:44Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -427,13 +427,13 @@
|
|||
"description": "PoC of proxylogon chain SSRF(CVE-2021-26855) to write file by testanull, censored by github",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T20:51:48Z",
|
||||
"updated_at": "2021-03-13T19:39:21Z",
|
||||
"updated_at": "2021-03-14T00:14:56Z",
|
||||
"pushed_at": "2021-03-11T20:58:08Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 30,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "proxylogon exploit - CVE-2021-26857",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T17:32:32Z",
|
||||
"updated_at": "2021-03-13T19:39:48Z",
|
||||
"updated_at": "2021-03-14T02:51:04Z",
|
||||
"pushed_at": "2021-03-11T17:34:15Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 73,
|
||||
"watchers": 75,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T13:41:42Z",
|
||||
"updated_at": "2021-03-13T14:36:21Z",
|
||||
"updated_at": "2021-03-14T02:51:02Z",
|
||||
"pushed_at": "2021-03-11T14:01:15Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -335,13 +335,13 @@
|
|||
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T03:22:04Z",
|
||||
"updated_at": "2021-03-13T12:55:34Z",
|
||||
"updated_at": "2021-03-14T02:21:41Z",
|
||||
"pushed_at": "2021-02-08T03:42:50Z",
|
||||
"stargazers_count": 370,
|
||||
"watchers_count": 370,
|
||||
"stargazers_count": 369,
|
||||
"watchers_count": 369,
|
||||
"forks_count": 100,
|
||||
"forks": 100,
|
||||
"watchers": 370,
|
||||
"watchers": 369,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
11
README.md
11
README.md
|
@ -17393,14 +17393,6 @@ Multiple stack-based buffer overflows in Allied Telesyn TFTP Server (AT-TFTP) 1.
|
|||
|
||||
|
||||
## 2005
|
||||
### CVE-2005-0603 (2005-03-01)
|
||||
|
||||
<code>
|
||||
viewtopic.php in phpBB 2.0.12 and earlier allows remote attackers to obtain sensitive information via a highlight parameter containing invalid regular expression syntax, which reveals the path in a PHP error message.
|
||||
</code>
|
||||
|
||||
- [Parcer0/CVE-2005-0603-phpBB-2.0.12-Full-path-disclosure](https://github.com/Parcer0/CVE-2005-0603-phpBB-2.0.12-Full-path-disclosure)
|
||||
|
||||
### CVE-2005-1125 (2005-04-16)
|
||||
|
||||
<code>
|
||||
|
@ -17642,6 +17634,9 @@ Buffer overflow in innfeed for ISC InterNetNews (INN) before 2.3.0 allows local
|
|||
|
||||
- [alt3kx/CVE-2001-1442](https://github.com/alt3kx/CVE-2001-1442)
|
||||
|
||||
### CVE-2001-3389
|
||||
- [becrevex/Gaston](https://github.com/becrevex/Gaston)
|
||||
|
||||
|
||||
## 2000
|
||||
### CVE-2000-0170 (2000-04-10)
|
||||
|
|
Loading…
Reference in a new issue