mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
Auto Update 2021/02/28 00:08:57
This commit is contained in:
parent
bf9617b710
commit
774917667b
16 changed files with 116 additions and 68 deletions
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-02-26T13:58:36Z",
|
||||
"updated_at": "2021-02-27T11:15:57Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 928,
|
||||
"watchers_count": 928,
|
||||
"stargazers_count": 929,
|
||||
"watchers_count": 929,
|
||||
"forks_count": 218,
|
||||
"forks": 218,
|
||||
"watchers": 928,
|
||||
"watchers": 929,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-02-26T13:58:36Z",
|
||||
"updated_at": "2021-02-27T11:15:57Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 928,
|
||||
"watchers_count": 928,
|
||||
"stargazers_count": 929,
|
||||
"watchers_count": 929,
|
||||
"forks_count": 218,
|
||||
"forks": 218,
|
||||
"watchers": 928,
|
||||
"watchers": 929,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-10-13T12:23:02Z",
|
||||
"stargazers_count": 355,
|
||||
"watchers_count": 355,
|
||||
"forks_count": 141,
|
||||
"forks": 141,
|
||||
"forks_count": 142,
|
||||
"forks": 142,
|
||||
"watchers": 355,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-02-26T13:58:36Z",
|
||||
"updated_at": "2021-02-27T11:15:57Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 928,
|
||||
"watchers_count": 928,
|
||||
"stargazers_count": 929,
|
||||
"watchers_count": 929,
|
||||
"forks_count": 218,
|
||||
"forks": 218,
|
||||
"watchers": 928,
|
||||
"watchers": 929,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-02-26T13:58:36Z",
|
||||
"updated_at": "2021-02-27T11:15:57Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 928,
|
||||
"watchers_count": 928,
|
||||
"stargazers_count": 929,
|
||||
"watchers_count": 929,
|
||||
"forks_count": 218,
|
||||
"forks": 218,
|
||||
"watchers": 928,
|
||||
"watchers": 929,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-02-26T13:58:36Z",
|
||||
"updated_at": "2021-02-27T11:15:57Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 928,
|
||||
"watchers_count": 928,
|
||||
"stargazers_count": 929,
|
||||
"watchers_count": 929,
|
||||
"forks_count": 218,
|
||||
"forks": 218,
|
||||
"watchers": 928,
|
||||
"watchers": 929,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-09-11T07:38:22Z",
|
||||
"stargazers_count": 504,
|
||||
"watchers_count": 504,
|
||||
"forks_count": 125,
|
||||
"forks": 125,
|
||||
"forks_count": 126,
|
||||
"forks": 126,
|
||||
"watchers": 504,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-11-16T04:23:09Z",
|
||||
"stargazers_count": 212,
|
||||
"watchers_count": 212,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"forks_count": 43,
|
||||
"forks": 43,
|
||||
"watchers": 212,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-02-26T13:58:36Z",
|
||||
"updated_at": "2021-02-27T11:15:57Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 928,
|
||||
"watchers_count": 928,
|
||||
"stargazers_count": 929,
|
||||
"watchers_count": 929,
|
||||
"forks_count": 218,
|
||||
"forks": 218,
|
||||
"watchers": 928,
|
||||
"watchers": 929,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-10T14:38:05Z",
|
||||
"updated_at": "2021-02-25T12:54:58Z",
|
||||
"updated_at": "2021-02-27T13:43:00Z",
|
||||
"pushed_at": "2021-02-10T14:39:04Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-26T14:18:13Z",
|
||||
"updated_at": "2021-02-26T16:28:21Z",
|
||||
"pushed_at": "2021-02-26T16:03:14Z",
|
||||
"updated_at": "2021-02-27T09:57:02Z",
|
||||
"pushed_at": "2021-02-27T09:57:00Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T09:56:21Z",
|
||||
"updated_at": "2021-02-27T06:53:02Z",
|
||||
"updated_at": "2021-02-27T09:25:22Z",
|
||||
"pushed_at": "2021-02-26T03:17:57Z",
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"forks_count": 48,
|
||||
"forks": 48,
|
||||
"watchers": 71,
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"watchers": 72,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2021-21972 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T11:14:58Z",
|
||||
"updated_at": "2021-02-27T06:53:05Z",
|
||||
"updated_at": "2021-02-27T10:28:33Z",
|
||||
"pushed_at": "2021-02-26T06:48:42Z",
|
||||
"stargazers_count": 164,
|
||||
"watchers_count": 164,
|
||||
"stargazers_count": 165,
|
||||
"watchers_count": 165,
|
||||
"forks_count": 61,
|
||||
"forks": 61,
|
||||
"watchers": 164,
|
||||
"watchers": 165,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2021-02-25T16:05:02Z",
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 71,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-25T05:10:06Z",
|
||||
"updated_at": "2021-02-26T19:42:15Z",
|
||||
"updated_at": "2021-02-27T14:25:53Z",
|
||||
"pushed_at": "2021-02-25T05:49:19Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 31,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -320,5 +320,51 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 342822880,
|
||||
"name": "Detect-CVE-2021-21972",
|
||||
"full_name": "JMousqueton\/Detect-CVE-2021-21972",
|
||||
"owner": {
|
||||
"login": "JMousqueton",
|
||||
"id": 4148567,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4148567?v=4",
|
||||
"html_url": "https:\/\/github.com\/JMousqueton"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JMousqueton\/Detect-CVE-2021-21972",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-27T09:53:57Z",
|
||||
"updated_at": "2021-02-27T10:00:17Z",
|
||||
"pushed_at": "2021-02-27T10:00:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 342829114,
|
||||
"name": "VMware_vCenter_CVE-2021-21972",
|
||||
"full_name": "robwillisinfo\/VMware_vCenter_CVE-2021-21972",
|
||||
"owner": {
|
||||
"login": "robwillisinfo",
|
||||
"id": 24982882,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24982882?v=4",
|
||||
"html_url": "https:\/\/github.com\/robwillisinfo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/robwillisinfo\/VMware_vCenter_CVE-2021-21972",
|
||||
"description": "VMware vCenter CVE-2021-21972 Tools",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-27T10:27:04Z",
|
||||
"updated_at": "2021-02-27T10:37:34Z",
|
||||
"pushed_at": "2021-02-27T10:37:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Chaining CVE-2021-25281 and CVE-2021-25282 to exploit a SaltStack",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-26T12:08:25Z",
|
||||
"updated_at": "2021-02-27T09:02:54Z",
|
||||
"updated_at": "2021-02-27T13:07:48Z",
|
||||
"pushed_at": "2021-02-26T14:49:46Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -335,13 +335,13 @@
|
|||
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T03:22:04Z",
|
||||
"updated_at": "2021-02-27T04:21:02Z",
|
||||
"updated_at": "2021-02-27T10:02:19Z",
|
||||
"pushed_at": "2021-02-08T03:42:50Z",
|
||||
"stargazers_count": 355,
|
||||
"watchers_count": 355,
|
||||
"stargazers_count": 356,
|
||||
"watchers_count": 356,
|
||||
"forks_count": 94,
|
||||
"forks": 94,
|
||||
"watchers": 355,
|
||||
"watchers": 356,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -381,13 +381,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2021-02-27T06:19:03Z",
|
||||
"updated_at": "2021-02-27T09:56:03Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 615,
|
||||
"watchers_count": 615,
|
||||
"stargazers_count": 616,
|
||||
"watchers_count": 616,
|
||||
"forks_count": 174,
|
||||
"forks": 174,
|
||||
"watchers": 615,
|
||||
"watchers": 616,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-3378 | FortiLogger - Unauthenticated Arbitrary File Upload (Metasploit)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T23:47:14Z",
|
||||
"updated_at": "2021-02-27T01:44:34Z",
|
||||
"updated_at": "2021-02-27T09:54:22Z",
|
||||
"pushed_at": "2021-02-26T14:31:00Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -236,6 +236,8 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability in a v
|
|||
- [B1anda0/CVE-2021-21972](https://github.com/B1anda0/CVE-2021-21972)
|
||||
- [renini/CVE-2021-21972](https://github.com/renini/CVE-2021-21972)
|
||||
- [3dcyber/CVE-2021-21972](https://github.com/3dcyber/CVE-2021-21972)
|
||||
- [JMousqueton/Detect-CVE-2021-21972](https://github.com/JMousqueton/Detect-CVE-2021-21972)
|
||||
- [robwillisinfo/VMware_vCenter_CVE-2021-21972](https://github.com/robwillisinfo/VMware_vCenter_CVE-2021-21972)
|
||||
|
||||
### CVE-2021-24085 (2021-02-25)
|
||||
|
||||
|
|
Loading…
Reference in a new issue