mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2021/11/14 06:12:52
This commit is contained in:
parent
6f37cd929e
commit
6fe8a5a2d6
14 changed files with 82 additions and 54 deletions
|
@ -17,7 +17,7 @@
|
||||||
"pushed_at": "2021-03-14T09:25:10Z",
|
"pushed_at": "2021-03-14T09:25:10Z",
|
||||||
"stargazers_count": 2,
|
"stargazers_count": 2,
|
||||||
"watchers_count": 2,
|
"watchers_count": 2,
|
||||||
"forks_count": 1,
|
"forks_count": 2,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [
|
"topics": [
|
||||||
|
@ -27,7 +27,7 @@
|
||||||
"pentesting"
|
"pentesting"
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1,
|
"forks": 2,
|
||||||
"watchers": 2,
|
"watchers": 2,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
|
|
|
@ -40,17 +40,17 @@
|
||||||
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2016-06-30T11:56:44Z",
|
"created_at": "2016-06-30T11:56:44Z",
|
||||||
"updated_at": "2021-11-01T10:27:27Z",
|
"updated_at": "2021-11-14T01:12:56Z",
|
||||||
"pushed_at": "2016-06-30T15:32:42Z",
|
"pushed_at": "2016-06-30T15:32:42Z",
|
||||||
"stargazers_count": 305,
|
"stargazers_count": 306,
|
||||||
"watchers_count": 305,
|
"watchers_count": 306,
|
||||||
"forks_count": 96,
|
"forks_count": 97,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 96,
|
"forks": 97,
|
||||||
"watchers": 305,
|
"watchers": 306,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -40,17 +40,17 @@
|
||||||
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2016-06-30T11:56:44Z",
|
"created_at": "2016-06-30T11:56:44Z",
|
||||||
"updated_at": "2021-11-01T10:27:27Z",
|
"updated_at": "2021-11-14T01:12:56Z",
|
||||||
"pushed_at": "2016-06-30T15:32:42Z",
|
"pushed_at": "2016-06-30T15:32:42Z",
|
||||||
"stargazers_count": 305,
|
"stargazers_count": 306,
|
||||||
"watchers_count": 305,
|
"watchers_count": 306,
|
||||||
"forks_count": 96,
|
"forks_count": 97,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 96,
|
"forks": 97,
|
||||||
"watchers": 305,
|
"watchers": 306,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -13,11 +13,11 @@
|
||||||
"description": "Safari XSS (CVE-2017-7038) https:\/\/support.apple.com\/en-us\/HT207923",
|
"description": "Safari XSS (CVE-2017-7038) https:\/\/support.apple.com\/en-us\/HT207923",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2017-12-06T15:31:08Z",
|
"created_at": "2017-12-06T15:31:08Z",
|
||||||
"updated_at": "2021-04-16T05:25:36Z",
|
"updated_at": "2021-11-14T00:38:34Z",
|
||||||
"pushed_at": "2017-12-06T15:41:28Z",
|
"pushed_at": "2017-12-06T15:41:28Z",
|
||||||
"stargazers_count": 2,
|
"stargazers_count": 3,
|
||||||
"watchers_count": 2,
|
"watchers_count": 3,
|
||||||
"forks_count": 3,
|
"forks_count": 4,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [
|
"topics": [
|
||||||
|
@ -29,8 +29,8 @@
|
||||||
"xss"
|
"xss"
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 3,
|
"forks": 4,
|
||||||
"watchers": 2,
|
"watchers": 3,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -17,12 +17,12 @@
|
||||||
"pushed_at": "2019-07-18T10:03:28Z",
|
"pushed_at": "2019-07-18T10:03:28Z",
|
||||||
"stargazers_count": 91,
|
"stargazers_count": 91,
|
||||||
"watchers_count": 91,
|
"watchers_count": 91,
|
||||||
"forks_count": 18,
|
"forks_count": 19,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 18,
|
"forks": 19,
|
||||||
"watchers": 91,
|
"watchers": 91,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
|
|
|
@ -13,11 +13,11 @@
|
||||||
"description": "CVE-2019-19033 description and scripts to check the vulnerability in Jalios JCMS 10 (Authentication Bypass)",
|
"description": "CVE-2019-19033 description and scripts to check the vulnerability in Jalios JCMS 10 (Authentication Bypass)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-11-17T19:32:10Z",
|
"created_at": "2019-11-17T19:32:10Z",
|
||||||
"updated_at": "2021-11-01T09:12:01Z",
|
"updated_at": "2021-11-14T00:45:55Z",
|
||||||
"pushed_at": "2019-12-03T19:22:32Z",
|
"pushed_at": "2019-12-03T19:22:32Z",
|
||||||
"stargazers_count": 3,
|
"stargazers_count": 4,
|
||||||
"watchers_count": 3,
|
"watchers_count": 4,
|
||||||
"forks_count": 1,
|
"forks_count": 2,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [
|
"topics": [
|
||||||
|
@ -28,8 +28,8 @@
|
||||||
"webdav"
|
"webdav"
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1,
|
"forks": 2,
|
||||||
"watchers": 3,
|
"watchers": 4,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -121,10 +121,10 @@
|
||||||
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
|
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-09-14T16:57:49Z",
|
"created_at": "2020-09-14T16:57:49Z",
|
||||||
"updated_at": "2021-11-08T08:38:20Z",
|
"updated_at": "2021-11-14T02:27:43Z",
|
||||||
"pushed_at": "2020-11-05T16:37:20Z",
|
"pushed_at": "2020-11-05T16:37:20Z",
|
||||||
"stargazers_count": 292,
|
"stargazers_count": 293,
|
||||||
"watchers_count": 292,
|
"watchers_count": 293,
|
||||||
"forks_count": 50,
|
"forks_count": 50,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
|
@ -138,7 +138,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 50,
|
"forks": 50,
|
||||||
"watchers": 292,
|
"watchers": 293,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -573,17 +573,17 @@
|
||||||
"description": "CodeTest信息收集和漏洞利用工具,可在进行渗透测试之时方便利用相关信息收集脚本进行信息的获取和验证工作,漏洞利用模块可选择需要测试的漏洞模块,或者选择所有模块测试,包含CVE-2020-14882, CVE-2020-2555等,可自己收集脚本后按照模板进行修改。",
|
"description": "CodeTest信息收集和漏洞利用工具,可在进行渗透测试之时方便利用相关信息收集脚本进行信息的获取和验证工作,漏洞利用模块可选择需要测试的漏洞模块,或者选择所有模块测试,包含CVE-2020-14882, CVE-2020-2555等,可自己收集脚本后按照模板进行修改。",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2020-12-30T01:55:52Z",
|
"created_at": "2020-12-30T01:55:52Z",
|
||||||
"updated_at": "2021-05-21T08:22:26Z",
|
"updated_at": "2021-11-14T02:41:21Z",
|
||||||
"pushed_at": "2020-12-29T10:47:39Z",
|
"pushed_at": "2020-12-29T10:47:39Z",
|
||||||
"stargazers_count": 1,
|
"stargazers_count": 2,
|
||||||
"watchers_count": 1,
|
"watchers_count": 2,
|
||||||
"forks_count": 7,
|
"forks_count": 7,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 7,
|
"forks": 7,
|
||||||
"watchers": 1,
|
"watchers": 2,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,11 +13,11 @@
|
||||||
"description": "Zoho ManageEngine ServiceDesk Plus MSP - Active Directory User Enumeration (CVE-2021-31159) - https:\/\/ricardojoserf.github.io\/CVE-2021-31159\/",
|
"description": "Zoho ManageEngine ServiceDesk Plus MSP - Active Directory User Enumeration (CVE-2021-31159) - https:\/\/ricardojoserf.github.io\/CVE-2021-31159\/",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-03-19T18:28:43Z",
|
"created_at": "2021-03-19T18:28:43Z",
|
||||||
"updated_at": "2021-11-01T09:13:23Z",
|
"updated_at": "2021-11-14T00:53:48Z",
|
||||||
"pushed_at": "2021-06-16T16:21:29Z",
|
"pushed_at": "2021-06-16T16:21:29Z",
|
||||||
"stargazers_count": 3,
|
"stargazers_count": 4,
|
||||||
"watchers_count": 3,
|
"watchers_count": 4,
|
||||||
"forks_count": 0,
|
"forks_count": 1,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [
|
"topics": [
|
||||||
|
@ -26,8 +26,8 @@
|
||||||
"servicedeskplus"
|
"servicedeskplus"
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 1,
|
||||||
"watchers": 3,
|
"watchers": 4,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -17,12 +17,12 @@
|
||||||
"pushed_at": "2021-10-25T12:57:55Z",
|
"pushed_at": "2021-10-25T12:57:55Z",
|
||||||
"stargazers_count": 2,
|
"stargazers_count": 2,
|
||||||
"watchers_count": 2,
|
"watchers_count": 2,
|
||||||
"forks_count": 4,
|
"forks_count": 5,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 4,
|
"forks": 5,
|
||||||
"watchers": 2,
|
"watchers": 2,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
|
|
|
@ -13,17 +13,17 @@
|
||||||
"description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
|
"description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-10-16T16:17:44Z",
|
"created_at": "2021-10-16T16:17:44Z",
|
||||||
"updated_at": "2021-11-13T23:45:35Z",
|
"updated_at": "2021-11-14T05:33:05Z",
|
||||||
"pushed_at": "2021-11-11T17:09:56Z",
|
"pushed_at": "2021-11-11T17:09:56Z",
|
||||||
"stargazers_count": 325,
|
"stargazers_count": 326,
|
||||||
"watchers_count": 325,
|
"watchers_count": 326,
|
||||||
"forks_count": 73,
|
"forks_count": 73,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 73,
|
"forks": 73,
|
||||||
"watchers": 325,
|
"watchers": 326,
|
||||||
"score": 0
|
"score": 0
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -13,11 +13,11 @@
|
||||||
"description": "AlphaWeb XE, the embedded web server running on AlphaCom XE, has a vulnerability which allows to upload PHP files leading to RCE once the authentication is successful - https:\/\/ricardojoserf.github.io\/CVE-2021-40845\/",
|
"description": "AlphaWeb XE, the embedded web server running on AlphaCom XE, has a vulnerability which allows to upload PHP files leading to RCE once the authentication is successful - https:\/\/ricardojoserf.github.io\/CVE-2021-40845\/",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-09-10T10:23:55Z",
|
"created_at": "2021-09-10T10:23:55Z",
|
||||||
"updated_at": "2021-11-01T09:30:58Z",
|
"updated_at": "2021-11-14T00:42:16Z",
|
||||||
"pushed_at": "2021-09-11T20:20:37Z",
|
"pushed_at": "2021-09-11T20:20:37Z",
|
||||||
"stargazers_count": 2,
|
"stargazers_count": 3,
|
||||||
"watchers_count": 2,
|
"watchers_count": 3,
|
||||||
"forks_count": 0,
|
"forks_count": 1,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"topics": [
|
"topics": [
|
||||||
|
@ -27,8 +27,8 @@
|
||||||
"zenitel"
|
"zenitel"
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 1,
|
||||||
"watchers": 2,
|
"watchers": 3,
|
||||||
"score": 0
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -2011,5 +2011,32 @@
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0
|
"score": 0
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": 427815832,
|
||||||
|
"name": "POC-CVE-2021-41773",
|
||||||
|
"full_name": "kubota\/POC-CVE-2021-41773",
|
||||||
|
"owner": {
|
||||||
|
"login": "kubota",
|
||||||
|
"id": 119277,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119277?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/kubota"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/kubota\/POC-CVE-2021-41773",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2021-11-14T02:02:45Z",
|
||||||
|
"updated_at": "2021-11-14T03:04:26Z",
|
||||||
|
"pushed_at": "2021-11-14T03:04:24Z",
|
||||||
|
"stargazers_count": 1,
|
||||||
|
"watchers_count": 1,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 1,
|
||||||
|
"score": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -3125,6 +3125,7 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
|
||||||
- [Hydragyrum/CVE-2021-41773-Playground](https://github.com/Hydragyrum/CVE-2021-41773-Playground)
|
- [Hydragyrum/CVE-2021-41773-Playground](https://github.com/Hydragyrum/CVE-2021-41773-Playground)
|
||||||
- [IcmpOff/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit](https://github.com/IcmpOff/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit)
|
- [IcmpOff/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit](https://github.com/IcmpOff/Apache-2.4.49-2.4.50-Traversal-Remote-Code-Execution-Exploit)
|
||||||
- [ahmad4fifz/docker-cve-2021-41773](https://github.com/ahmad4fifz/docker-cve-2021-41773)
|
- [ahmad4fifz/docker-cve-2021-41773](https://github.com/ahmad4fifz/docker-cve-2021-41773)
|
||||||
|
- [kubota/POC-CVE-2021-41773](https://github.com/kubota/POC-CVE-2021-41773)
|
||||||
|
|
||||||
### CVE-2021-41822
|
### CVE-2021-41822
|
||||||
- [badboycxcc/CVE-2021-41822](https://github.com/badboycxcc/CVE-2021-41822)
|
- [badboycxcc/CVE-2021-41822](https://github.com/badboycxcc/CVE-2021-41822)
|
||||||
|
|
Loading…
Reference in a new issue