mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-27 18:14:12 +01:00
Auto Update 2021/03/10 18:09:31
This commit is contained in:
parent
ede5dbd950
commit
70fbbe2bf9
31 changed files with 229 additions and 196 deletions
2014
2016
2017
2018
2019
2020
CVE-2020-0688.jsonCVE-2020-0796.jsonCVE-2020-1337.jsonCVE-2020-14882.jsonCVE-2020-2551.jsonCVE-2020-29134.jsonCVE-2020-8950.json
2021
CVE-2021-1732.jsonCVE-2021-21300.jsonCVE-2021-21315.jsonCVE-2021-21972.jsonCVE-2021-21978.jsonCVE-2021-23132.jsonCVE-2021-26855.jsonCVE-2021-3129.jsonCVE-2021-3156.json
README.md
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-03-08T16:23:08Z",
|
||||
"updated_at": "2021-03-10T03:24:07Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 944,
|
||||
"watchers_count": 944,
|
||||
"stargazers_count": 945,
|
||||
"watchers_count": 945,
|
||||
"forks_count": 220,
|
||||
"forks": 220,
|
||||
"watchers": 944,
|
||||
"watchers": 945,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-03-08T16:23:08Z",
|
||||
"updated_at": "2021-03-10T03:24:07Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 944,
|
||||
"watchers_count": 944,
|
||||
"stargazers_count": 945,
|
||||
"watchers_count": 945,
|
||||
"forks_count": 220,
|
||||
"forks": 220,
|
||||
"watchers": 944,
|
||||
"watchers": 945,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "dnsmasq rop exploit with NX bypass",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-04T08:15:53Z",
|
||||
"updated_at": "2020-07-25T06:42:55Z",
|
||||
"updated_at": "2021-03-10T09:05:32Z",
|
||||
"pushed_at": "2018-07-31T23:26:06Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-03-08T16:23:08Z",
|
||||
"updated_at": "2021-03-10T03:24:07Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 944,
|
||||
"watchers_count": 944,
|
||||
"stargazers_count": 945,
|
||||
"watchers_count": 945,
|
||||
"forks_count": 220,
|
||||
"forks": 220,
|
||||
"watchers": 944,
|
||||
"watchers": 945,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Checks a shared hosting environment for CVE-2017-9798",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-18T15:17:13Z",
|
||||
"updated_at": "2020-11-02T21:51:36Z",
|
||||
"updated_at": "2021-03-10T05:40:19Z",
|
||||
"pushed_at": "2017-09-18T15:38:40Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -128,13 +128,13 @@
|
|||
"description": "Exploit for Laravel Remote Code Execution with API_KEY (CVE-2018-15133)",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-13T16:33:52Z",
|
||||
"updated_at": "2021-03-06T22:27:07Z",
|
||||
"updated_at": "2021-03-10T07:37:15Z",
|
||||
"pushed_at": "2020-12-31T20:34:30Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -137,29 +137,6 @@
|
|||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 155426753,
|
||||
"name": "CrappyCode",
|
||||
"full_name": "JoeBlackSecurity\/CrappyCode",
|
||||
"owner": {
|
||||
"login": "JoeBlackSecurity",
|
||||
"id": 44617164,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44617164?v=4",
|
||||
"html_url": "https:\/\/github.com\/JoeBlackSecurity"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JoeBlackSecurity\/CrappyCode",
|
||||
"description": "Functional script for brute forcing SSH and trying credentials - CVE-2018-15473",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-30T17:17:09Z",
|
||||
"updated_at": "2018-11-06T19:03:05Z",
|
||||
"pushed_at": "2018-11-06T19:03:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 155492594,
|
||||
"name": "SSHUsernameBruter-SSHUB",
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-22T04:52:08Z",
|
||||
"updated_at": "2021-03-04T04:06:49Z",
|
||||
"updated_at": "2021-03-10T08:58:08Z",
|
||||
"pushed_at": "2019-08-05T10:45:34Z",
|
||||
"stargazers_count": 431,
|
||||
"watchers_count": 431,
|
||||
"stargazers_count": 432,
|
||||
"watchers_count": 432,
|
||||
"forks_count": 179,
|
||||
"forks": 179,
|
||||
"watchers": 431,
|
||||
"watchers": 432,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-03-08T16:23:08Z",
|
||||
"updated_at": "2021-03-10T03:24:07Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 944,
|
||||
"watchers_count": 944,
|
||||
"stargazers_count": 945,
|
||||
"watchers_count": 945,
|
||||
"forks_count": 220,
|
||||
"forks": 220,
|
||||
"watchers": 944,
|
||||
"watchers": 945,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2021-03-09T09:45:19Z",
|
||||
"updated_at": "2021-03-10T05:56:57Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 386,
|
||||
"watchers_count": 386,
|
||||
"stargazers_count": 387,
|
||||
"watchers_count": 387,
|
||||
"forks_count": 88,
|
||||
"forks": 88,
|
||||
"watchers": 386,
|
||||
"watchers": 387,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-1040 with Exchange",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-14T11:16:03Z",
|
||||
"updated_at": "2021-03-04T04:27:46Z",
|
||||
"updated_at": "2021-03-10T06:30:22Z",
|
||||
"pushed_at": "2021-02-02T12:25:57Z",
|
||||
"stargazers_count": 184,
|
||||
"watchers_count": 184,
|
||||
"stargazers_count": 185,
|
||||
"watchers_count": 185,
|
||||
"forks_count": 56,
|
||||
"forks": 56,
|
||||
"watchers": 184,
|
||||
"watchers": 185,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Tool Suite for V0LTpwn (CVE-2019-11157). Code will be published soon.",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-15T15:11:07Z",
|
||||
"updated_at": "2020-08-07T01:06:07Z",
|
||||
"updated_at": "2021-03-10T06:19:44Z",
|
||||
"pushed_at": "2019-12-16T22:32:06Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2380,
|
||||
"watchers_count": 2380,
|
||||
"forks_count": 681,
|
||||
"forks": 681,
|
||||
"forks_count": 682,
|
||||
"forks": 682,
|
||||
"watchers": 2380,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-03-08T16:23:08Z",
|
||||
"updated_at": "2021-03-10T03:24:07Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 944,
|
||||
"watchers_count": 944,
|
||||
"stargazers_count": 945,
|
||||
"watchers_count": 945,
|
||||
"forks_count": 220,
|
||||
"forks": 220,
|
||||
"watchers": 944,
|
||||
"watchers": 945,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "cve-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-27T02:54:27Z",
|
||||
"updated_at": "2021-03-09T06:45:51Z",
|
||||
"updated_at": "2021-03-10T04:08:31Z",
|
||||
"pushed_at": "2020-06-19T09:28:15Z",
|
||||
"stargazers_count": 265,
|
||||
"watchers_count": 265,
|
||||
"stargazers_count": 266,
|
||||
"watchers_count": 266,
|
||||
"forks_count": 89,
|
||||
"forks": 89,
|
||||
"watchers": 265,
|
||||
"watchers": 266,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -887,13 +887,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2021-03-10T01:01:26Z",
|
||||
"updated_at": "2021-03-10T07:50:51Z",
|
||||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1095,
|
||||
"watchers_count": 1095,
|
||||
"forks_count": 358,
|
||||
"forks": 358,
|
||||
"watchers": 1095,
|
||||
"stargazers_count": 1098,
|
||||
"watchers_count": 1098,
|
||||
"forks_count": 359,
|
||||
"forks": 359,
|
||||
"watchers": 1098,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-12T10:05:36Z",
|
||||
"updated_at": "2021-02-22T14:26:47Z",
|
||||
"updated_at": "2021-03-10T05:50:53Z",
|
||||
"pushed_at": "2020-08-13T07:16:12Z",
|
||||
"stargazers_count": 143,
|
||||
"watchers_count": 143,
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"watchers": 143,
|
||||
"watchers": 144,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2380,
|
||||
"watchers_count": 2380,
|
||||
"forks_count": 681,
|
||||
"forks": 681,
|
||||
"forks_count": 682,
|
||||
"forks": 682,
|
||||
"watchers": 2380,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-03-08T16:23:08Z",
|
||||
"updated_at": "2021-03-10T03:24:07Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 944,
|
||||
"watchers_count": 944,
|
||||
"stargazers_count": 945,
|
||||
"watchers_count": 945,
|
||||
"forks_count": 220,
|
||||
"forks": 220,
|
||||
"watchers": 944,
|
||||
"watchers": 945,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Exploit CVE-2020-29134 - TOTVS Fluig Platform - Path Traversal",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-11T13:44:40Z",
|
||||
"updated_at": "2021-03-09T14:36:32Z",
|
||||
"pushed_at": "2021-03-09T14:31:36Z",
|
||||
"updated_at": "2021-03-10T04:02:36Z",
|
||||
"pushed_at": "2021-03-10T04:02:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop) ",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-07T18:22:51Z",
|
||||
"updated_at": "2020-07-07T02:56:27Z",
|
||||
"updated_at": "2021-03-10T05:51:05Z",
|
||||
"pushed_at": "2020-04-23T07:01:59Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 25,
|
||||
"watchers": 26,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-1732 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-05T02:11:10Z",
|
||||
"updated_at": "2021-03-10T03:11:17Z",
|
||||
"updated_at": "2021-03-10T08:56:07Z",
|
||||
"pushed_at": "2021-03-05T03:10:26Z",
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 108,
|
||||
"stargazers_count": 141,
|
||||
"watchers_count": 141,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"watchers": 141,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2021/CVE-2021-21300.json
Normal file
25
2021/CVE-2021-21300.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 346285133,
|
||||
"name": "CVE-2021-21300",
|
||||
"full_name": "AlkenePan\/CVE-2021-21300",
|
||||
"owner": {
|
||||
"login": "AlkenePan",
|
||||
"id": 8273781,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8273781?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlkenePan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlkenePan\/CVE-2021-21300",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-10T08:29:49Z",
|
||||
"updated_at": "2021-03-10T08:30:28Z",
|
||||
"pushed_at": "2021-03-10T08:30:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE 2021-21315 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-01T18:52:41Z",
|
||||
"updated_at": "2021-03-10T00:12:07Z",
|
||||
"updated_at": "2021-03-10T06:02:00Z",
|
||||
"pushed_at": "2021-03-02T00:27:47Z",
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 98,
|
||||
"watchers": 99,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T09:56:21Z",
|
||||
"updated_at": "2021-03-04T06:23:18Z",
|
||||
"updated_at": "2021-03-10T08:38:38Z",
|
||||
"pushed_at": "2021-03-01T02:10:44Z",
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"forks_count": 53,
|
||||
"forks": 53,
|
||||
"watchers": 86,
|
||||
"watchers": 87,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2021-21972 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T11:14:58Z",
|
||||
"updated_at": "2021-03-09T15:26:39Z",
|
||||
"pushed_at": "2021-02-28T03:59:59Z",
|
||||
"stargazers_count": 200,
|
||||
"watchers_count": 200,
|
||||
"updated_at": "2021-03-10T08:38:36Z",
|
||||
"pushed_at": "2021-03-10T05:01:22Z",
|
||||
"stargazers_count": 201,
|
||||
"watchers_count": 201,
|
||||
"forks_count": 73,
|
||||
"forks": 73,
|
||||
"watchers": 200,
|
||||
"watchers": 201,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "Proof of Concept Exploit for vCenter CVE-2021-21972",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T16:31:34Z",
|
||||
"updated_at": "2021-03-05T07:01:24Z",
|
||||
"updated_at": "2021-03-10T08:38:42Z",
|
||||
"pushed_at": "2021-02-25T16:05:02Z",
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 93,
|
||||
"watchers": 94,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -450,13 +450,13 @@
|
|||
"description": "CVE-2021-21972 Unauthorized RCE in VMware vCenter metasploit exploit script",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-07T16:30:36Z",
|
||||
"updated_at": "2021-03-08T01:56:54Z",
|
||||
"updated_at": "2021-03-10T09:06:15Z",
|
||||
"pushed_at": "2021-03-07T17:12:55Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-21978 exp",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-05T03:58:33Z",
|
||||
"updated_at": "2021-03-10T01:23:55Z",
|
||||
"updated_at": "2021-03-10T07:15:36Z",
|
||||
"pushed_at": "2021-03-05T04:22:26Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 8,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2021-03-05T04:42:17Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2021-03-05T11:09:06Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "com_media allowed paths that are not intended for image uploads to RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-03T02:13:57Z",
|
||||
"updated_at": "2021-03-09T21:21:53Z",
|
||||
"updated_at": "2021-03-10T06:20:51Z",
|
||||
"pushed_at": "2021-03-03T03:52:10Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 48,
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2021-03-05T17:09:01Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "CVE-2021-26855 SSRF Exchange Server",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-06T16:34:45Z",
|
||||
"updated_at": "2021-03-09T17:26:13Z",
|
||||
"pushed_at": "2021-03-09T17:26:11Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 12,
|
||||
"updated_at": "2021-03-10T09:02:29Z",
|
||||
"pushed_at": "2021-03-10T09:02:27Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -128,8 +128,8 @@
|
|||
"description": "This script helps to identify CVE-2021-26855 ssrf Poc",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-06T19:03:00Z",
|
||||
"updated_at": "2021-03-09T20:55:45Z",
|
||||
"pushed_at": "2021-03-06T19:42:49Z",
|
||||
"updated_at": "2021-03-10T07:49:18Z",
|
||||
"pushed_at": "2021-03-10T07:41:56Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 2,
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": "PoC for CVE-2021-26855 -Just a checker-",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-06T23:12:22Z",
|
||||
"updated_at": "2021-03-09T22:07:48Z",
|
||||
"updated_at": "2021-03-10T08:03:57Z",
|
||||
"pushed_at": "2021-03-09T22:07:46Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -174,13 +174,13 @@
|
|||
"description": "CVE-2021-26855 SSRF Exchange Server",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-07T00:55:16Z",
|
||||
"updated_at": "2021-03-09T15:01:32Z",
|
||||
"updated_at": "2021-03-10T04:02:32Z",
|
||||
"pushed_at": "2021-03-06T18:57:43Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -220,13 +220,13 @@
|
|||
"description": "CVE-2021-26855 exp",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-08T08:39:05Z",
|
||||
"updated_at": "2021-03-10T03:03:49Z",
|
||||
"updated_at": "2021-03-10T09:07:13Z",
|
||||
"pushed_at": "2021-03-08T08:09:01Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 45,
|
||||
"forks": 45,
|
||||
"watchers": 25,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"forks_count": 47,
|
||||
"forks": 47,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -243,13 +243,13 @@
|
|||
"description": "A fast tool to mass scan for a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin (CVE-2021-26855).",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-08T11:54:32Z",
|
||||
"updated_at": "2021-03-10T01:59:13Z",
|
||||
"updated_at": "2021-03-10T09:09:39Z",
|
||||
"pushed_at": "2021-03-08T14:50:48Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 59,
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 68,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -339,8 +339,8 @@
|
|||
"pushed_at": "2021-03-09T21:59:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -358,13 +358,36 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-09T16:54:39Z",
|
||||
"updated_at": "2021-03-10T01:59:14Z",
|
||||
"updated_at": "2021-03-10T08:44:58Z",
|
||||
"pushed_at": "2021-03-09T16:56:09Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 13,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 346241102,
|
||||
"name": "CVE-2021-26855_PoC",
|
||||
"full_name": "alt3kx\/CVE-2021-26855_PoC",
|
||||
"owner": {
|
||||
"login": "alt3kx",
|
||||
"id": 3140111,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
|
||||
"html_url": "https:\/\/github.com\/alt3kx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2021-26855_PoC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-10T05:21:19Z",
|
||||
"updated_at": "2021-03-10T08:51:19Z",
|
||||
"pushed_at": "2021-03-10T05:46:35Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-13T12:52:20Z",
|
||||
"updated_at": "2021-03-10T01:36:22Z",
|
||||
"updated_at": "2021-03-10T08:18:44Z",
|
||||
"pushed_at": "2021-01-29T13:59:07Z",
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 84,
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 86,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -657,13 +657,13 @@
|
|||
"description": "Root shell PoC for CVE-2021-3156",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-03T19:57:56Z",
|
||||
"updated_at": "2021-03-09T19:38:27Z",
|
||||
"updated_at": "2021-03-10T06:52:04Z",
|
||||
"pushed_at": "2021-02-03T22:28:14Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 22,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
10
README.md
10
README.md
|
@ -235,6 +235,14 @@ Heap buffer overflow in V8 in Google Chrome prior to 88.0.4324.150 allowed a rem
|
|||
|
||||
- [Grayhaxor/CVE-2021-21148](https://github.com/Grayhaxor/CVE-2021-21148)
|
||||
|
||||
### CVE-2021-21300 (2021-03-09)
|
||||
|
||||
<code>
|
||||
Git is an open-source distributed revision control system. In affected versions of Git a specially crafted repository that contains symbolic links as well as files using a clean/smudge filter such as Git LFS, may cause just-checked out script to be executed while cloning onto a case-insensitive file system such as NTFS, HFS+ or APFS (i.e. the default file systems on Windows and macOS). Note that clean/smudge filters have to be configured for that. Git for Windows configures Git LFS by default, and is therefore vulnerable. The problem has been patched in the versions published on Tuesday, March 9th, 2021. As a workaound, if symbolic link support is disabled in Git (e.g. via `git config --global core.symlinks false`), the described attack won't work. Likewise, if no clean/smudge filters such as Git LFS are configured globally (i.e. _before_ cloning), the attack is foiled. As always, it is best to avoid cloning repositories from untrusted sources. The earliest impacted version is 2.14.2. The fix versions are: 2.30.1, 2.29.3, 2.28.1, 2.27.1, 2.26.3, 2.25.5, 2.24.4, 2.23.4, 2.22.5, 2.21.4, 2.20.5, 2.19.6, 2.18.5, 2.17.62.17.6.
|
||||
</code>
|
||||
|
||||
- [AlkenePan/CVE-2021-21300](https://github.com/AlkenePan/CVE-2021-21300)
|
||||
|
||||
### CVE-2021-21315 (2021-02-16)
|
||||
|
||||
<code>
|
||||
|
@ -381,6 +389,7 @@ Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is uni
|
|||
- [PwCNO-CTO/CVE-2021-26855](https://github.com/PwCNO-CTO/CVE-2021-26855)
|
||||
- [srvaccount/CVE-2021-26855-PoC](https://github.com/srvaccount/CVE-2021-26855-PoC)
|
||||
- [h4x0r-dz/CVE-2021-26855](https://github.com/h4x0r-dz/CVE-2021-26855)
|
||||
- [alt3kx/CVE-2021-26855_PoC](https://github.com/alt3kx/CVE-2021-26855_PoC)
|
||||
|
||||
### CVE-2021-26903 (2021-02-26)
|
||||
|
||||
|
@ -10171,7 +10180,6 @@ OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not dela
|
|||
- [epi052/cve-2018-15473](https://github.com/epi052/cve-2018-15473)
|
||||
- [pyperanger/CVE-2018-15473_exploit](https://github.com/pyperanger/CVE-2018-15473_exploit)
|
||||
- [r3dxpl0it/CVE-2018-15473](https://github.com/r3dxpl0it/CVE-2018-15473)
|
||||
- [JoeBlackSecurity/CrappyCode](https://github.com/JoeBlackSecurity/CrappyCode)
|
||||
- [JoeBlackSecurity/SSHUsernameBruter-SSHUB](https://github.com/JoeBlackSecurity/SSHUsernameBruter-SSHUB)
|
||||
- [cved-sources/cve-2018-15473](https://github.com/cved-sources/cve-2018-15473)
|
||||
- [LINYIKAI/CVE-2018-15473-exp](https://github.com/LINYIKAI/CVE-2018-15473-exp)
|
||||
|
|
Loading…
Add table
Reference in a new issue