mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2022/03/24 18:15:06
This commit is contained in:
parent
988387ac73
commit
7541769022
42 changed files with 192 additions and 192 deletions
|
@ -150,11 +150,11 @@
|
|||
"html_url": "https:\/\/github.com\/PrestaDZ"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/PrestaDZ\/vsftpd-2.3.4",
|
||||
"description": "Simple python script to exploit Vsftpd 2.3.4 Backdoor Command Execution (CVE-2011-2523)",
|
||||
"description": "Simple python script to exploit VsFTPd 2.3.4 Backdoor Command Execution (CVE-2011-2523)",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-15T13:39:19Z",
|
||||
"updated_at": "2022-03-15T13:44:22Z",
|
||||
"pushed_at": "2022-03-15T17:05:12Z",
|
||||
"updated_at": "2022-03-24T17:49:15Z",
|
||||
"pushed_at": "2022-03-24T17:52:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -321,12 +321,12 @@
|
|||
"pushed_at": "2017-11-27T01:50:52Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2019-02-08T15:55:55Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -27,7 +27,7 @@
|
|||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2019-1040 with Exchange",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-14T11:16:03Z",
|
||||
"updated_at": "2022-03-01T14:11:50Z",
|
||||
"updated_at": "2022-03-24T14:40:17Z",
|
||||
"pushed_at": "2021-06-18T18:43:46Z",
|
||||
"stargazers_count": 213,
|
||||
"watchers_count": 213,
|
||||
"stargazers_count": 214,
|
||||
"watchers_count": 214,
|
||||
"forks_count": 60,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 60,
|
||||
"watchers": 213,
|
||||
"watchers": 214,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "This repository contains the sources and documentation for the SWAPGS attack PoC (CVE-2019-1125)",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-27T12:27:53Z",
|
||||
"updated_at": "2021-07-22T16:04:10Z",
|
||||
"updated_at": "2022-03-24T17:53:22Z",
|
||||
"pushed_at": "2020-01-27T12:32:04Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 39,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "POC for cve-2019-1458",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-03T17:55:07Z",
|
||||
"updated_at": "2022-03-20T20:43:56Z",
|
||||
"updated_at": "2022-03-24T12:23:03Z",
|
||||
"pushed_at": "2022-01-17T19:45:41Z",
|
||||
"stargazers_count": 156,
|
||||
"watchers_count": 156,
|
||||
"stargazers_count": 157,
|
||||
"watchers_count": 157,
|
||||
"forks_count": 55,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 55,
|
||||
"watchers": 156,
|
||||
"watchers": 157,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -286,8 +286,8 @@
|
|||
"description": "A quick python exploit for the Nostromo 1.9.6 remote code execution vulnerability. Only takes in host and port of web server as required arguments.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-24T12:06:55Z",
|
||||
"updated_at": "2022-03-24T12:06:55Z",
|
||||
"pushed_at": "2022-03-24T12:06:55Z",
|
||||
"updated_at": "2022-03-24T12:25:16Z",
|
||||
"pushed_at": "2022-03-24T12:25:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Proof of concept for CVE-2020-15257 in containerd.",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-07T08:47:09Z",
|
||||
"updated_at": "2022-03-14T15:13:14Z",
|
||||
"updated_at": "2022-03-24T14:36:57Z",
|
||||
"pushed_at": "2021-01-12T09:46:50Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2022-01-03T21:44:29Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 12,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -35,7 +35,7 @@
|
|||
"urls"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"forks": 13,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -98,10 +98,10 @@
|
|||
"description": "CVE-2020-8597 in RM2100",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-24T15:28:00Z",
|
||||
"updated_at": "2021-09-24T07:09:36Z",
|
||||
"updated_at": "2022-03-24T14:13:01Z",
|
||||
"pushed_at": "2021-01-24T15:46:11Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -111,7 +111,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -44,12 +44,12 @@
|
|||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1541,
|
||||
"watchers_count": 1541,
|
||||
"forks_count": 559,
|
||||
"forks_count": 560,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 559,
|
||||
"forks": 560,
|
||||
"watchers": 1541,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2021-1732 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-05T02:11:10Z",
|
||||
"updated_at": "2022-03-13T02:28:30Z",
|
||||
"updated_at": "2022-03-24T15:43:18Z",
|
||||
"pushed_at": "2021-03-05T03:10:26Z",
|
||||
"stargazers_count": 372,
|
||||
"watchers_count": 372,
|
||||
"stargazers_count": 373,
|
||||
"watchers_count": 373,
|
||||
"forks_count": 115,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 115,
|
||||
"watchers": 372,
|
||||
"watchers": 373,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -399,7 +399,7 @@
|
|||
"pushed_at": "2022-01-16T15:54:14Z",
|
||||
"stargazers_count": 128,
|
||||
"watchers_count": 128,
|
||||
"forks_count": 22,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -411,7 +411,7 @@
|
|||
"security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"forks": 23,
|
||||
"watchers": 128,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Github repository which contains a functional exploit for CVE-2021-39165",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-15T18:14:46Z",
|
||||
"updated_at": "2022-03-20T14:28:13Z",
|
||||
"updated_at": "2022-03-24T17:39:47Z",
|
||||
"pushed_at": "2022-03-16T18:01:04Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -879,14 +879,14 @@
|
|||
"pushed_at": "2022-01-27T20:09:24Z",
|
||||
"stargazers_count": 464,
|
||||
"watchers_count": 464,
|
||||
"forks_count": 85,
|
||||
"forks_count": 86,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2021-4034"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 85,
|
||||
"forks": 86,
|
||||
"watchers": 464,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -504,10 +504,10 @@
|
|||
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T21:24:55Z",
|
||||
"updated_at": "2022-03-22T13:09:20Z",
|
||||
"updated_at": "2022-03-24T13:32:22Z",
|
||||
"pushed_at": "2022-03-12T21:30:58Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -523,7 +523,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 49,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -45,17 +45,17 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T10:28:12Z",
|
||||
"updated_at": "2022-03-22T09:59:19Z",
|
||||
"updated_at": "2022-03-24T17:10:40Z",
|
||||
"pushed_at": "2022-03-16T13:59:31Z",
|
||||
"stargazers_count": 284,
|
||||
"watchers_count": 284,
|
||||
"stargazers_count": 285,
|
||||
"watchers_count": 285,
|
||||
"forks_count": 57,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 57,
|
||||
"watchers": 284,
|
||||
"watchers": 285,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2,19 +2,19 @@
|
|||
{
|
||||
"id": 424326946,
|
||||
"name": "CVE-2021-42662",
|
||||
"full_name": "TheHackingRabbi\/CVE-2021-42662",
|
||||
"full_name": "0xDeku\/CVE-2021-42662",
|
||||
"owner": {
|
||||
"login": "TheHackingRabbi",
|
||||
"login": "0xDeku",
|
||||
"id": 93016131,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi"
|
||||
"html_url": "https:\/\/github.com\/0xDeku"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42662",
|
||||
"html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42662",
|
||||
"description": "CVE-2021-42662 - Stored Cross-Site Scripting vulnerability in the Online event booking and reservation system. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-03T17:51:55Z",
|
||||
"updated_at": "2021-11-06T17:41:08Z",
|
||||
"pushed_at": "2021-11-06T17:41:05Z",
|
||||
"pushed_at": "2022-03-24T18:08:34Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
|
|
|
@ -2,19 +2,19 @@
|
|||
{
|
||||
"id": 424343690,
|
||||
"name": "CVE-2021-42663",
|
||||
"full_name": "TheHackingRabbi\/CVE-2021-42663",
|
||||
"full_name": "0xDeku\/CVE-2021-42663",
|
||||
"owner": {
|
||||
"login": "TheHackingRabbi",
|
||||
"login": "0xDeku",
|
||||
"id": 93016131,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi"
|
||||
"html_url": "https:\/\/github.com\/0xDeku"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42663",
|
||||
"html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42663",
|
||||
"description": "CVE-2021-42663 - HTML Injection vulnerability in the Online event booking and reservation system. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-03T18:49:28Z",
|
||||
"updated_at": "2021-11-06T17:42:07Z",
|
||||
"pushed_at": "2021-11-06T17:42:05Z",
|
||||
"pushed_at": "2022-03-24T18:09:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
|
|
|
@ -2,19 +2,19 @@
|
|||
{
|
||||
"id": 424354876,
|
||||
"name": "CVE-2021-42664",
|
||||
"full_name": "TheHackingRabbi\/CVE-2021-42664",
|
||||
"full_name": "0xDeku\/CVE-2021-42664",
|
||||
"owner": {
|
||||
"login": "TheHackingRabbi",
|
||||
"login": "0xDeku",
|
||||
"id": 93016131,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi"
|
||||
"html_url": "https:\/\/github.com\/0xDeku"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42664",
|
||||
"html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42664",
|
||||
"description": " CVE-2021-42664 - Stored Cross-Site Scripting vulnerability in the Engineers online portal system.",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-03T19:29:57Z",
|
||||
"updated_at": "2021-11-06T17:43:07Z",
|
||||
"pushed_at": "2021-11-06T17:43:05Z",
|
||||
"pushed_at": "2022-03-24T18:09:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -2,19 +2,19 @@
|
|||
{
|
||||
"id": 424362612,
|
||||
"name": "CVE-2021-42665",
|
||||
"full_name": "TheHackingRabbi\/CVE-2021-42665",
|
||||
"full_name": "0xDeku\/CVE-2021-42665",
|
||||
"owner": {
|
||||
"login": "TheHackingRabbi",
|
||||
"login": "0xDeku",
|
||||
"id": 93016131,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi"
|
||||
"html_url": "https:\/\/github.com\/0xDeku"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42665",
|
||||
"html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42665",
|
||||
"description": "CVE-2021-42665 - SQL Injection authentication bypass vulnerability in the Engineers online portal system. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-03T19:58:58Z",
|
||||
"updated_at": "2021-11-06T17:44:14Z",
|
||||
"pushed_at": "2021-11-06T17:44:12Z",
|
||||
"pushed_at": "2022-03-24T18:09:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -2,19 +2,19 @@
|
|||
{
|
||||
"id": 424367205,
|
||||
"name": "CVE-2021-42666",
|
||||
"full_name": "TheHackingRabbi\/CVE-2021-42666",
|
||||
"full_name": "0xDeku\/CVE-2021-42666",
|
||||
"owner": {
|
||||
"login": "TheHackingRabbi",
|
||||
"login": "0xDeku",
|
||||
"id": 93016131,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi"
|
||||
"html_url": "https:\/\/github.com\/0xDeku"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42666",
|
||||
"html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42666",
|
||||
"description": "CVE-2021-42666 - SQL Injection vulnerability in the Engineers online portal system. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-03T20:14:58Z",
|
||||
"updated_at": "2021-11-06T17:45:39Z",
|
||||
"pushed_at": "2021-11-06T17:45:37Z",
|
||||
"pushed_at": "2022-03-24T18:10:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -2,19 +2,19 @@
|
|||
{
|
||||
"id": 424371514,
|
||||
"name": "CVE-2021-42667",
|
||||
"full_name": "TheHackingRabbi\/CVE-2021-42667",
|
||||
"full_name": "0xDeku\/CVE-2021-42667",
|
||||
"owner": {
|
||||
"login": "TheHackingRabbi",
|
||||
"login": "0xDeku",
|
||||
"id": 93016131,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi"
|
||||
"html_url": "https:\/\/github.com\/0xDeku"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42667",
|
||||
"html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42667",
|
||||
"description": "CVE-2021-42667 - SQL Injection vulnerability in the Online event booking and reservation system.",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-03T20:31:30Z",
|
||||
"updated_at": "2022-02-14T12:01:54Z",
|
||||
"pushed_at": "2021-11-06T17:46:34Z",
|
||||
"pushed_at": "2022-03-24T18:10:23Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -2,19 +2,19 @@
|
|||
{
|
||||
"id": 424374708,
|
||||
"name": "CVE-2021-42668",
|
||||
"full_name": "TheHackingRabbi\/CVE-2021-42668",
|
||||
"full_name": "0xDeku\/CVE-2021-42668",
|
||||
"owner": {
|
||||
"login": "TheHackingRabbi",
|
||||
"login": "0xDeku",
|
||||
"id": 93016131,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi"
|
||||
"html_url": "https:\/\/github.com\/0xDeku"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42668",
|
||||
"html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42668",
|
||||
"description": "CVE-2021-42668 - SQL Injection vulnerability in the Engineers online portal system. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-03T20:43:30Z",
|
||||
"updated_at": "2021-11-06T17:47:22Z",
|
||||
"pushed_at": "2021-11-06T17:47:19Z",
|
||||
"pushed_at": "2022-03-24T18:11:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -2,19 +2,19 @@
|
|||
{
|
||||
"id": 424376895,
|
||||
"name": "CVE-2021-42669",
|
||||
"full_name": "TheHackingRabbi\/CVE-2021-42669",
|
||||
"full_name": "0xDeku\/CVE-2021-42669",
|
||||
"owner": {
|
||||
"login": "TheHackingRabbi",
|
||||
"login": "0xDeku",
|
||||
"id": 93016131,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi"
|
||||
"html_url": "https:\/\/github.com\/0xDeku"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42669",
|
||||
"html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42669",
|
||||
"description": "CVE-2021-42669 - Remote code execution via unrestricted file upload vulnerability in the Engineers online portal system.",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-03T20:52:08Z",
|
||||
"updated_at": "2022-01-10T01:42:29Z",
|
||||
"pushed_at": "2021-11-06T17:48:02Z",
|
||||
"pushed_at": "2022-03-24T18:11:50Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -2,19 +2,19 @@
|
|||
{
|
||||
"id": 424385119,
|
||||
"name": "CVE-2021-42670",
|
||||
"full_name": "TheHackingRabbi\/CVE-2021-42670",
|
||||
"full_name": "0xDeku\/CVE-2021-42670",
|
||||
"owner": {
|
||||
"login": "TheHackingRabbi",
|
||||
"login": "0xDeku",
|
||||
"id": 93016131,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi"
|
||||
"html_url": "https:\/\/github.com\/0xDeku"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42670",
|
||||
"html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42670",
|
||||
"description": "CVE-2021-42670 - SQL Injection vulnerability in the Engineers online portal system. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-03T21:25:43Z",
|
||||
"updated_at": "2021-11-06T17:49:03Z",
|
||||
"pushed_at": "2021-11-06T17:49:00Z",
|
||||
"pushed_at": "2022-03-24T18:12:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -2,19 +2,19 @@
|
|||
{
|
||||
"id": 424387160,
|
||||
"name": "CVE-2021-42671",
|
||||
"full_name": "TheHackingRabbi\/CVE-2021-42671",
|
||||
"full_name": "0xDeku\/CVE-2021-42671",
|
||||
"owner": {
|
||||
"login": "TheHackingRabbi",
|
||||
"login": "0xDeku",
|
||||
"id": 93016131,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi"
|
||||
"html_url": "https:\/\/github.com\/0xDeku"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42671",
|
||||
"html_url": "https:\/\/github.com\/0xDeku\/CVE-2021-42671",
|
||||
"description": "CVE-2021-42671 - Broken access control vulnerability in the Engineers online portal system. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-03T21:34:23Z",
|
||||
"updated_at": "2021-11-06T17:49:42Z",
|
||||
"pushed_at": "2021-11-06T17:49:40Z",
|
||||
"pushed_at": "2022-03-24T18:12:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit tool for CVE-2021-43008 Adminer 1.0 up to 4.6.2 Arbitrary File Read vulnerability ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T17:26:49Z",
|
||||
"updated_at": "2022-03-24T09:39:42Z",
|
||||
"updated_at": "2022-03-24T15:05:45Z",
|
||||
"pushed_at": "2022-03-16T09:35:04Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -35,7 +35,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 33,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -210,10 +210,10 @@
|
|||
"description": "A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins \/ extract secret_key \/ decrypt data_source info automatic.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-07T15:11:34Z",
|
||||
"updated_at": "2022-03-17T09:35:49Z",
|
||||
"updated_at": "2022-03-24T15:28:36Z",
|
||||
"pushed_at": "2021-12-09T07:22:26Z",
|
||||
"stargazers_count": 185,
|
||||
"watchers_count": 185,
|
||||
"stargazers_count": 186,
|
||||
"watchers_count": 186,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -224,7 +224,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 185,
|
||||
"watchers": 186,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -907,10 +907,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2022-03-24T01:30:51Z",
|
||||
"updated_at": "2022-03-24T12:37:31Z",
|
||||
"pushed_at": "2022-03-20T16:33:49Z",
|
||||
"stargazers_count": 1275,
|
||||
"watchers_count": 1275,
|
||||
"stargazers_count": 1276,
|
||||
"watchers_count": 1276,
|
||||
"forks_count": 347,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -922,7 +922,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 347,
|
||||
"watchers": 1275,
|
||||
"watchers": 1276,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2419,10 +2419,10 @@
|
|||
"description": "Abuse Log4J CVE-2021-44228 to patch CVE-2021-44228 in vulnerable Minecraft game sessions to prevent exploitation in the session :) ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T11:26:42Z",
|
||||
"updated_at": "2022-02-18T17:26:26Z",
|
||||
"updated_at": "2022-03-24T15:17:44Z",
|
||||
"pushed_at": "2021-12-12T17:37:11Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -2437,7 +2437,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 56,
|
||||
"watchers": 57,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3548,17 +3548,17 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2022-03-24T04:52:17Z",
|
||||
"updated_at": "2022-03-24T17:21:13Z",
|
||||
"pushed_at": "2022-02-06T03:18:29Z",
|
||||
"stargazers_count": 2793,
|
||||
"watchers_count": 2793,
|
||||
"stargazers_count": 2794,
|
||||
"watchers_count": 2794,
|
||||
"forks_count": 676,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 676,
|
||||
"watchers": 2793,
|
||||
"watchers": 2794,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -6707,17 +6707,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-15T20:17:41Z",
|
||||
"updated_at": "2022-01-27T12:49:45Z",
|
||||
"updated_at": "2022-03-24T14:29:40Z",
|
||||
"pushed_at": "2022-01-05T16:26:16Z",
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 85,
|
||||
"watchers": 86,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -9431,7 +9431,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-24T20:00:12Z",
|
||||
"updated_at": "2022-01-06T13:31:29Z",
|
||||
"pushed_at": "2022-02-28T17:35:20Z",
|
||||
"pushed_at": "2022-03-24T17:32:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -175,10 +175,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-29T07:32:30Z",
|
||||
"updated_at": "2022-02-14T09:42:04Z",
|
||||
"updated_at": "2022-03-24T12:19:52Z",
|
||||
"pushed_at": "2021-12-31T08:30:33Z",
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -188,7 +188,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 66,
|
||||
"watchers": 67,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrt",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-15T19:06:33Z",
|
||||
"updated_at": "2022-03-24T09:25:14Z",
|
||||
"updated_at": "2022-03-24T17:01:14Z",
|
||||
"pushed_at": "2022-03-21T12:12:16Z",
|
||||
"stargazers_count": 126,
|
||||
"watchers_count": 126,
|
||||
"forks_count": 34,
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 126,
|
||||
"forks": 35,
|
||||
"watchers": 127,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -121,17 +121,17 @@
|
|||
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T18:55:20Z",
|
||||
"updated_at": "2022-03-23T12:03:25Z",
|
||||
"updated_at": "2022-03-24T15:41:03Z",
|
||||
"pushed_at": "2022-03-08T06:20:05Z",
|
||||
"stargazers_count": 880,
|
||||
"watchers_count": 880,
|
||||
"stargazers_count": 881,
|
||||
"watchers_count": 881,
|
||||
"forks_count": 181,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 181,
|
||||
"watchers": 880,
|
||||
"watchers": 881,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -530,12 +530,12 @@
|
|||
"pushed_at": "2022-03-18T09:32:30Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 10,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"forks": 11,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1074,17 +1074,17 @@
|
|||
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T20:57:24Z",
|
||||
"updated_at": "2022-03-24T09:12:07Z",
|
||||
"updated_at": "2022-03-24T14:43:52Z",
|
||||
"pushed_at": "2022-03-15T00:26:45Z",
|
||||
"stargazers_count": 178,
|
||||
"watchers_count": 178,
|
||||
"forks_count": 31,
|
||||
"stargazers_count": 179,
|
||||
"watchers_count": 179,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 178,
|
||||
"forks": 32,
|
||||
"watchers": 179,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Cisco Anyconnect VPN unauth RCE (rwx stack)",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-07T15:53:21Z",
|
||||
"updated_at": "2022-03-22T04:41:57Z",
|
||||
"updated_at": "2022-03-24T14:39:46Z",
|
||||
"pushed_at": "2022-02-07T15:55:03Z",
|
||||
"stargazers_count": 225,
|
||||
"watchers_count": 225,
|
||||
"stargazers_count": 226,
|
||||
"watchers_count": 226,
|
||||
"forks_count": 42,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 42,
|
||||
"watchers": 225,
|
||||
"watchers": 226,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "win32k LPE ",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-27T03:44:10Z",
|
||||
"updated_at": "2022-03-24T02:47:48Z",
|
||||
"updated_at": "2022-03-24T15:42:06Z",
|
||||
"pushed_at": "2022-01-27T04:18:18Z",
|
||||
"stargazers_count": 395,
|
||||
"watchers_count": 395,
|
||||
"stargazers_count": 396,
|
||||
"watchers_count": 396,
|
||||
"forks_count": 120,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 120,
|
||||
"watchers": 395,
|
||||
"watchers": 396,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -141,10 +141,10 @@
|
|||
"description": "Proof of concept of CVE-2022-21907 Double Free in http.sys driver, triggering a kernel crash on IIS servers",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-17T15:42:37Z",
|
||||
"updated_at": "2022-03-23T17:01:49Z",
|
||||
"updated_at": "2022-03-24T14:41:25Z",
|
||||
"pushed_at": "2022-02-25T11:05:11Z",
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -158,7 +158,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 58,
|
||||
"watchers": 59,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\"",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-26T20:37:42Z",
|
||||
"updated_at": "2022-03-23T09:02:10Z",
|
||||
"updated_at": "2022-03-24T14:08:50Z",
|
||||
"pushed_at": "2022-02-26T20:45:19Z",
|
||||
"stargazers_count": 248,
|
||||
"watchers_count": 248,
|
||||
"stargazers_count": 249,
|
||||
"watchers_count": 249,
|
||||
"forks_count": 53,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 53,
|
||||
"watchers": 248,
|
||||
"watchers": 249,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-08T17:25:44Z",
|
||||
"updated_at": "2022-03-24T11:52:02Z",
|
||||
"updated_at": "2022-03-24T18:08:06Z",
|
||||
"pushed_at": "2022-02-09T16:54:09Z",
|
||||
"stargazers_count": 535,
|
||||
"watchers_count": 535,
|
||||
"stargazers_count": 537,
|
||||
"watchers_count": 537,
|
||||
"forks_count": 105,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -26,7 +26,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 105,
|
||||
"watchers": 535,
|
||||
"watchers": 537,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -98,12 +98,12 @@
|
|||
"pushed_at": "2022-03-20T06:02:59Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2022-25636",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T13:38:41Z",
|
||||
"updated_at": "2022-03-24T11:35:09Z",
|
||||
"updated_at": "2022-03-24T15:41:06Z",
|
||||
"pushed_at": "2022-03-07T17:18:19Z",
|
||||
"stargazers_count": 326,
|
||||
"watchers_count": 326,
|
||||
"stargazers_count": 327,
|
||||
"watchers_count": 327,
|
||||
"forks_count": 64,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 64,
|
||||
"watchers": 326,
|
||||
"watchers": 327,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-23T15:03:09Z",
|
||||
"updated_at": "2022-03-24T10:30:54Z",
|
||||
"updated_at": "2022-03-24T18:06:50Z",
|
||||
"pushed_at": "2022-03-23T15:19:21Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 0,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 7,
|
||||
"forks": 1,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
]
|
20
README.md
20
README.md
|
@ -3709,7 +3709,7 @@ An issue was discovered in the Bidirectional Algorithm in the Unicode Specificat
|
|||
A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP/MySQL via the Holiday reason parameter. An attacker can leverage this vulnerability in order to run javascript commands on the web server surfers behalf, which can lead to cookie stealing and more.
|
||||
</code>
|
||||
|
||||
- [TheHackingRabbi/CVE-2021-42662](https://github.com/TheHackingRabbi/CVE-2021-42662)
|
||||
- [0xDeku/CVE-2021-42662](https://github.com/0xDeku/CVE-2021-42662)
|
||||
|
||||
### CVE-2021-42663 (2021-11-05)
|
||||
|
||||
|
@ -3717,7 +3717,7 @@ A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Onlin
|
|||
An HTML injection vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP/MySQL via the msg parameter to /event-management/index.php. An attacker can leverage this vulnerability in order to change the visibility of the website. Once the target user clicks on a given link he will display the content of the HTML code of the attacker's choice.
|
||||
</code>
|
||||
|
||||
- [TheHackingRabbi/CVE-2021-42663](https://github.com/TheHackingRabbi/CVE-2021-42663)
|
||||
- [0xDeku/CVE-2021-42663](https://github.com/0xDeku/CVE-2021-42663)
|
||||
|
||||
### CVE-2021-42664 (2021-11-05)
|
||||
|
||||
|
@ -3725,7 +3725,7 @@ An HTML injection vulnerability exists in Sourcecodester Online Event Booking an
|
|||
A Stored Cross Site Scripting (XSS) Vulneraibiilty exists in Sourcecodester Engineers Online Portal in PHP via the (1) Quiz title and (2) quiz description parameters to add_quiz.php. An attacker can leverage this vulnerability in order to run javascript commands on the web server surfers behalf, which can lead to cookie stealing and more.
|
||||
</code>
|
||||
|
||||
- [TheHackingRabbi/CVE-2021-42664](https://github.com/TheHackingRabbi/CVE-2021-42664)
|
||||
- [0xDeku/CVE-2021-42664](https://github.com/0xDeku/CVE-2021-42664)
|
||||
|
||||
### CVE-2021-42665 (2021-11-05)
|
||||
|
||||
|
@ -3733,7 +3733,7 @@ A Stored Cross Site Scripting (XSS) Vulneraibiilty exists in Sourcecodester Engi
|
|||
An SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the login form inside of index.php, which can allow an attacker to bypass authentication.
|
||||
</code>
|
||||
|
||||
- [TheHackingRabbi/CVE-2021-42665](https://github.com/TheHackingRabbi/CVE-2021-42665)
|
||||
- [0xDeku/CVE-2021-42665](https://github.com/0xDeku/CVE-2021-42665)
|
||||
|
||||
### CVE-2021-42666 (2021-11-05)
|
||||
|
||||
|
@ -3741,7 +3741,7 @@ An SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal
|
|||
A SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the id parameter to quiz_question.php, which could let a malicious user extract sensitive data from the web server and in some cases use this vulnerability in order to get a remote code execution on the remote web server.
|
||||
</code>
|
||||
|
||||
- [TheHackingRabbi/CVE-2021-42666](https://github.com/TheHackingRabbi/CVE-2021-42666)
|
||||
- [0xDeku/CVE-2021-42666](https://github.com/0xDeku/CVE-2021-42666)
|
||||
|
||||
### CVE-2021-42667 (2021-11-05)
|
||||
|
||||
|
@ -3749,7 +3749,7 @@ A SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal i
|
|||
A SQL Injection vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP in event-management/views. An attacker can leverage this vulnerability in order to manipulate the sql query performed. As a result he can extract sensitive data from the web server and in some cases he can use this vulnerability in order to get a remote code execution on the remote web server.
|
||||
</code>
|
||||
|
||||
- [TheHackingRabbi/CVE-2021-42667](https://github.com/TheHackingRabbi/CVE-2021-42667)
|
||||
- [0xDeku/CVE-2021-42667](https://github.com/0xDeku/CVE-2021-42667)
|
||||
|
||||
### CVE-2021-42668 (2021-11-05)
|
||||
|
||||
|
@ -3757,7 +3757,7 @@ A SQL Injection vulnerability exists in Sourcecodester Online Event Booking and
|
|||
A SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the id parameter in the my_classmates.php web page.. As a result, an attacker can extract sensitive data from the web server and in some cases can use this vulnerability in order to get a remote code execution on the remote web server.
|
||||
</code>
|
||||
|
||||
- [TheHackingRabbi/CVE-2021-42668](https://github.com/TheHackingRabbi/CVE-2021-42668)
|
||||
- [0xDeku/CVE-2021-42668](https://github.com/0xDeku/CVE-2021-42668)
|
||||
|
||||
### CVE-2021-42669 (2021-11-05)
|
||||
|
||||
|
@ -3765,7 +3765,7 @@ A SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal i
|
|||
A file upload vulnerability exists in Sourcecodester Engineers Online Portal in PHP via dashboard_teacher.php, which allows changing the avatar through teacher_avatar.php. Once an avatar gets uploaded it is getting uploaded to the /admin/uploads/ directory, and is accessible by all users. By uploading a php webshell containing "<?php system($_GET["cmd"]); ?>" the attacker can execute commands on the web server with - /admin/uploads/php-webshell?cmd=id.
|
||||
</code>
|
||||
|
||||
- [TheHackingRabbi/CVE-2021-42669](https://github.com/TheHackingRabbi/CVE-2021-42669)
|
||||
- [0xDeku/CVE-2021-42669](https://github.com/0xDeku/CVE-2021-42669)
|
||||
|
||||
### CVE-2021-42670 (2021-11-05)
|
||||
|
||||
|
@ -3773,7 +3773,7 @@ A file upload vulnerability exists in Sourcecodester Engineers Online Portal in
|
|||
A SQL injection vulnerability exists in Sourcecodester Engineers Online Portal in PHP via the id parameter to the announcements_student.php web page. As a result a malicious user can extract sensitive data from the web server and in some cases use this vulnerability in order to get a remote code execution on the remote web server.
|
||||
</code>
|
||||
|
||||
- [TheHackingRabbi/CVE-2021-42670](https://github.com/TheHackingRabbi/CVE-2021-42670)
|
||||
- [0xDeku/CVE-2021-42670](https://github.com/0xDeku/CVE-2021-42670)
|
||||
|
||||
### CVE-2021-42671 (2021-11-05)
|
||||
|
||||
|
@ -3781,7 +3781,7 @@ A SQL injection vulnerability exists in Sourcecodester Engineers Online Portal i
|
|||
An incorrect access control vulnerability exists in Sourcecodester Engineers Online Portal in PHP in nia_munoz_monitoring_system/admin/uploads. An attacker can leverage this vulnerability in order to bypass access controls and access all the files uploaded to the web server without the need of authentication or authorization.
|
||||
</code>
|
||||
|
||||
- [TheHackingRabbi/CVE-2021-42671](https://github.com/TheHackingRabbi/CVE-2021-42671)
|
||||
- [0xDeku/CVE-2021-42671](https://github.com/0xDeku/CVE-2021-42671)
|
||||
|
||||
### CVE-2021-42694 (2021-10-31)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue