mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-26 01:24:10 +01:00
Auto Update 2022/02/12 12:14:01
This commit is contained in:
parent
070fd34dc5
commit
7b359515f8
24 changed files with 256 additions and 157 deletions
29
2014/CVE-2014-1767.json
Normal file
29
2014/CVE-2014-1767.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 458469806,
|
||||
"name": "CVE-2014-1767-EXP-PAPER",
|
||||
"full_name": "ExploitCN\/CVE-2014-1767-EXP-PAPER",
|
||||
"owner": {
|
||||
"login": "ExploitCN",
|
||||
"id": 98264245,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98264245?v=4",
|
||||
"html_url": "https:\/\/github.com\/ExploitCN"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ExploitCN\/CVE-2014-1767-EXP-PAPER",
|
||||
"description": "CVE-2014-1767在win7_x64平台的EXP和分析文章",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-12T08:57:19Z",
|
||||
"updated_at": "2022-02-12T09:05:38Z",
|
||||
"pushed_at": "2022-02-12T09:05:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)",
|
||||
"fork": false,
|
||||
"created_at": "2016-02-09T21:30:34Z",
|
||||
"updated_at": "2021-08-12T14:47:47Z",
|
||||
"updated_at": "2022-02-12T09:14:27Z",
|
||||
"pushed_at": "2016-05-09T17:53:48Z",
|
||||
"stargazers_count": 328,
|
||||
"watchers_count": 328,
|
||||
"stargazers_count": 329,
|
||||
"watchers_count": 329,
|
||||
"forks_count": 150,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 150,
|
||||
"watchers": 328,
|
||||
"watchers": 329,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,10 +40,10 @@
|
|||
"description": "Fastest filesystem scanner for log4shell (CVE-2021-44228, CVE-2021-45046) and other vulnerable (CVE-2017-5645, CVE-2019-17571, CVE-2022-23305, CVE-2022-23307 ... ) instances of log4j library. Excellent performance and low memory footprint.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T22:27:14Z",
|
||||
"updated_at": "2022-02-06T12:31:42Z",
|
||||
"updated_at": "2022-02-12T07:31:06Z",
|
||||
"pushed_at": "2022-01-26T10:07:39Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -69,7 +69,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "TPM vulnerability checking tool for CVE-2018-6622. This tool will be published at Black Hat Asia 2019 and Black Hat Europe 2019",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-07T06:45:27Z",
|
||||
"updated_at": "2022-01-21T07:50:03Z",
|
||||
"updated_at": "2022-02-12T06:09:59Z",
|
||||
"pushed_at": "2020-11-18T03:01:31Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 79,
|
||||
"watchers": 78,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -99,7 +99,7 @@
|
|||
"description": "CVE-2019-0708-exploit",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-15T02:24:21Z",
|
||||
"updated_at": "2022-01-30T01:04:07Z",
|
||||
"updated_at": "2022-02-12T06:21:52Z",
|
||||
"pushed_at": "2019-05-15T02:26:46Z",
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
|
|
|
@ -121,5 +121,32 @@
|
|||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 458501569,
|
||||
"name": "Jenkins_CVE-2019-1003000",
|
||||
"full_name": "purple-WL\/Jenkins_CVE-2019-1003000",
|
||||
"owner": {
|
||||
"login": "purple-WL",
|
||||
"id": 63894044,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63894044?v=4",
|
||||
"html_url": "https:\/\/github.com\/purple-WL"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/purple-WL\/Jenkins_CVE-2019-1003000",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-02-12T11:26:07Z",
|
||||
"updated_at": "2022-02-12T11:27:23Z",
|
||||
"pushed_at": "2022-02-12T11:27:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "telegram bug that discloses user's hidden phone number (still unpatched) (exploit included) ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T19:03:53Z",
|
||||
"updated_at": "2022-02-11T21:17:09Z",
|
||||
"updated_at": "2022-02-12T08:00:55Z",
|
||||
"pushed_at": "2021-12-19T18:18:36Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -34,7 +34,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 11,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -69,10 +69,10 @@
|
|||
"description": "Fastest filesystem scanner for log4shell (CVE-2021-44228, CVE-2021-45046) and other vulnerable (CVE-2017-5645, CVE-2019-17571, CVE-2022-23305, CVE-2022-23307 ... ) instances of log4j library. Excellent performance and low memory footprint.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T22:27:14Z",
|
||||
"updated_at": "2022-02-06T12:31:42Z",
|
||||
"updated_at": "2022-02-12T07:31:06Z",
|
||||
"pushed_at": "2022-01-26T10:07:39Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -98,7 +98,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-10T13:41:28Z",
|
||||
"updated_at": "2021-12-15T14:38:03Z",
|
||||
"updated_at": "2022-02-12T11:51:07Z",
|
||||
"pushed_at": "2020-01-10T13:42:12Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 15,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "InfluxDB CVE-2019-20933 vulnerability exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-28T16:25:31Z",
|
||||
"updated_at": "2022-02-04T02:08:02Z",
|
||||
"updated_at": "2022-02-12T12:06:49Z",
|
||||
"pushed_at": "2021-11-12T13:02:41Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-18T05:15:05Z",
|
||||
"updated_at": "2022-02-02T14:55:24Z",
|
||||
"updated_at": "2022-02-12T10:23:29Z",
|
||||
"pushed_at": "2021-03-17T11:29:58Z",
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 107,
|
||||
"watchers": 108,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -67,17 +67,17 @@
|
|||
"description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-07T18:58:09Z",
|
||||
"updated_at": "2022-02-12T01:16:12Z",
|
||||
"updated_at": "2022-02-12T11:54:32Z",
|
||||
"pushed_at": "2020-03-09T05:25:05Z",
|
||||
"stargazers_count": 154,
|
||||
"watchers_count": 154,
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 52,
|
||||
"watchers": 154,
|
||||
"watchers": 155,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-10T21:52:24Z",
|
||||
"updated_at": "2022-02-11T20:53:21Z",
|
||||
"updated_at": "2022-02-12T06:34:09Z",
|
||||
"pushed_at": "2022-02-11T17:20:32Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -684,10 +684,10 @@
|
|||
"description": "CVE-2021-21972 – ᴠᴍᴡᴀʀᴇ ᴄʟɪᴇɴᴛ ᴜɴᴀᴜᴛʜᴏʀɪᴢᴇᴅ ᴄᴏᴅᴇ ɪɴᴊᴇᴄᴛɪᴏɴ (ʀᴄᴇ)",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-03T23:03:11Z",
|
||||
"updated_at": "2021-11-09T11:30:14Z",
|
||||
"updated_at": "2022-02-12T11:51:32Z",
|
||||
"pushed_at": "2021-10-16T13:48:00Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -699,7 +699,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 7,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-31T02:39:02Z",
|
||||
"updated_at": "2021-12-15T14:41:46Z",
|
||||
"updated_at": "2022-02-12T11:51:28Z",
|
||||
"pushed_at": "2021-06-11T03:53:22Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -104,17 +104,17 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2022-02-11T20:24:03Z",
|
||||
"updated_at": "2022-02-12T11:31:14Z",
|
||||
"pushed_at": "2022-01-30T14:22:23Z",
|
||||
"stargazers_count": 1251,
|
||||
"watchers_count": 1251,
|
||||
"stargazers_count": 1256,
|
||||
"watchers_count": 1256,
|
||||
"forks_count": 365,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 365,
|
||||
"watchers": 1251,
|
||||
"watchers": 1256,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -185,11 +185,11 @@
|
|||
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T00:56:36Z",
|
||||
"updated_at": "2022-02-11T21:39:57Z",
|
||||
"updated_at": "2022-02-12T10:08:20Z",
|
||||
"pushed_at": "2022-02-12T05:22:58Z",
|
||||
"stargazers_count": 740,
|
||||
"watchers_count": 740,
|
||||
"forks_count": 241,
|
||||
"stargazers_count": 744,
|
||||
"watchers_count": 744,
|
||||
"forks_count": 242,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -198,8 +198,8 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 241,
|
||||
"watchers": 740,
|
||||
"forks": 242,
|
||||
"watchers": 744,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -631,10 +631,10 @@
|
|||
"description": "A python3 and bash PoC for CVE-2021-4034 by Kim Schulz",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T08:43:15Z",
|
||||
"updated_at": "2022-02-10T01:57:40Z",
|
||||
"updated_at": "2022-02-12T08:24:24Z",
|
||||
"pushed_at": "2022-01-27T10:40:14Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -646,7 +646,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -906,19 +906,19 @@
|
|||
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T14:26:10Z",
|
||||
"updated_at": "2022-02-12T01:46:47Z",
|
||||
"updated_at": "2022-02-12T08:49:41Z",
|
||||
"pushed_at": "2022-01-27T20:09:24Z",
|
||||
"stargazers_count": 413,
|
||||
"watchers_count": 413,
|
||||
"forks_count": 70,
|
||||
"stargazers_count": 412,
|
||||
"watchers_count": 412,
|
||||
"forks_count": 71,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2021-4034"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 70,
|
||||
"watchers": 413,
|
||||
"forks": 71,
|
||||
"watchers": 412,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2336,17 +2336,17 @@
|
|||
"description": "Pwnkit Exploit (CVE-2021-4034), no download capabilty? Copy and paste it!",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-28T18:12:54Z",
|
||||
"updated_at": "2022-02-10T08:02:51Z",
|
||||
"updated_at": "2022-02-12T09:19:36Z",
|
||||
"pushed_at": "2022-01-28T18:22:53Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2969,5 +2969,32 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 458439369,
|
||||
"name": "CVE-2021-4034",
|
||||
"full_name": "an0n7os\/CVE-2021-4034",
|
||||
"owner": {
|
||||
"login": "an0n7os",
|
||||
"id": 67602602,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67602602?v=4",
|
||||
"html_url": "https:\/\/github.com\/an0n7os"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/an0n7os\/CVE-2021-4034",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-02-12T06:20:49Z",
|
||||
"updated_at": "2022-02-12T06:26:41Z",
|
||||
"pushed_at": "2022-02-12T06:26:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2021-12-25T18:31:02Z",
|
||||
"stargazers_count": 1363,
|
||||
"watchers_count": 1363,
|
||||
"forks_count": 448,
|
||||
"forks_count": 449,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 448,
|
||||
"forks": 449,
|
||||
"watchers": 1363,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -93,33 +93,6 @@
|
|||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 414108838,
|
||||
"name": "CVE-2021-41773",
|
||||
"full_name": "blasty\/CVE-2021-41773",
|
||||
"owner": {
|
||||
"login": "blasty",
|
||||
"id": 101374,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101374?v=4",
|
||||
"html_url": "https:\/\/github.com\/blasty"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/blasty\/CVE-2021-41773",
|
||||
"description": "CVE-2021-41773 playground",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-06T07:17:05Z",
|
||||
"updated_at": "2022-02-08T07:55:00Z",
|
||||
"pushed_at": "2021-10-07T17:56:38Z",
|
||||
"stargazers_count": 203,
|
||||
"watchers_count": 203,
|
||||
"forks_count": 51,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 51,
|
||||
"watchers": 203,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 414159388,
|
||||
"name": "CVE-2021-41773",
|
||||
|
@ -451,33 +424,6 @@
|
|||
"watchers": 24,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 414674481,
|
||||
"name": "Poc-CVE-2021-41773",
|
||||
"full_name": "LetouRaphael\/Poc-CVE-2021-41773",
|
||||
"owner": {
|
||||
"login": "LetouRaphael",
|
||||
"id": 48223543,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48223543?v=4",
|
||||
"html_url": "https:\/\/github.com\/LetouRaphael"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/LetouRaphael\/Poc-CVE-2021-41773",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-07T16:19:45Z",
|
||||
"updated_at": "2021-10-08T01:15:42Z",
|
||||
"pushed_at": "2021-10-07T16:48:27Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 414764740,
|
||||
"name": "CVE-2021-41773",
|
||||
|
|
|
@ -905,10 +905,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2022-02-12T03:02:27Z",
|
||||
"updated_at": "2022-02-12T08:01:04Z",
|
||||
"pushed_at": "2022-01-22T14:55:02Z",
|
||||
"stargazers_count": 1230,
|
||||
"watchers_count": 1230,
|
||||
"stargazers_count": 1231,
|
||||
"watchers_count": 1231,
|
||||
"forks_count": 321,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -920,7 +920,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 321,
|
||||
"watchers": 1230,
|
||||
"watchers": 1231,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -5886,10 +5886,10 @@
|
|||
"description": "Fastest filesystem scanner for log4shell (CVE-2021-44228, CVE-2021-45046) and other vulnerable (CVE-2017-5645, CVE-2019-17571, CVE-2022-23305, CVE-2022-23307 ... ) instances of log4j library. Excellent performance and low memory footprint.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T22:27:14Z",
|
||||
"updated_at": "2022-02-06T12:31:42Z",
|
||||
"updated_at": "2022-02-12T07:31:06Z",
|
||||
"pushed_at": "2022-01-26T10:07:39Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -5915,7 +5915,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -7985,17 +7985,17 @@
|
|||
"description": "This project will help to test the Log4j CVE-2021-44228 vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-17T20:07:12Z",
|
||||
"updated_at": "2021-12-29T05:29:26Z",
|
||||
"updated_at": "2022-02-12T08:17:39Z",
|
||||
"pushed_at": "2021-12-22T20:17:36Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -10657,5 +10657,38 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 458500087,
|
||||
"name": "lol4j-white-box",
|
||||
"full_name": "hotpotcookie\/lol4j-white-box",
|
||||
"owner": {
|
||||
"login": "hotpotcookie",
|
||||
"id": 68333318,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68333318?v=4",
|
||||
"html_url": "https:\/\/github.com\/hotpotcookie"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hotpotcookie\/lol4j-white-box",
|
||||
"description": "Log4j vulnerability testing environment that based on CVE-2021-44228. This environment provide guidance to build the sample infrastructure and the exploit scripts",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-12T11:19:41Z",
|
||||
"updated_at": "2022-02-12T11:28:29Z",
|
||||
"pushed_at": "2022-02-12T11:21:32Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2021-44228",
|
||||
"ldap-authentication",
|
||||
"log4j2",
|
||||
"penetration-testing",
|
||||
"spring-boot"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Cisco Anyconnect VPN unauth RCE (rwx stack)",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-07T15:53:21Z",
|
||||
"updated_at": "2022-02-12T05:55:28Z",
|
||||
"updated_at": "2022-02-12T11:45:59Z",
|
||||
"pushed_at": "2022-02-07T15:55:03Z",
|
||||
"stargazers_count": 124,
|
||||
"watchers_count": 124,
|
||||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 124,
|
||||
"watchers": 130,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -25,5 +25,32 @@
|
|||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 458502807,
|
||||
"name": "wordpress-CVE-2022-21661",
|
||||
"full_name": "purple-WL\/wordpress-CVE-2022-21661",
|
||||
"owner": {
|
||||
"login": "purple-WL",
|
||||
"id": 63894044,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63894044?v=4",
|
||||
"html_url": "https:\/\/github.com\/purple-WL"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/purple-WL\/wordpress-CVE-2022-21661",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-02-12T11:31:26Z",
|
||||
"updated_at": "2022-02-12T11:31:26Z",
|
||||
"pushed_at": "2022-02-12T11:31:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,11 +13,11 @@
|
|||
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-08T17:25:44Z",
|
||||
"updated_at": "2022-02-12T06:00:08Z",
|
||||
"updated_at": "2022-02-12T11:22:47Z",
|
||||
"pushed_at": "2022-02-09T16:54:09Z",
|
||||
"stargazers_count": 369,
|
||||
"watchers_count": 369,
|
||||
"forks_count": 62,
|
||||
"stargazers_count": 373,
|
||||
"watchers_count": 373,
|
||||
"forks_count": 63,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -25,8 +25,8 @@
|
|||
"cve-2022-22718"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 62,
|
||||
"watchers": 369,
|
||||
"forks": 63,
|
||||
"watchers": 373,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Fastest filesystem scanner for log4shell (CVE-2021-44228, CVE-2021-45046) and other vulnerable (CVE-2017-5645, CVE-2019-17571, CVE-2022-23305, CVE-2022-23307 ... ) instances of log4j library. Excellent performance and low memory footprint.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T22:27:14Z",
|
||||
"updated_at": "2022-02-06T12:31:42Z",
|
||||
"updated_at": "2022-02-12T07:31:06Z",
|
||||
"pushed_at": "2022-01-26T10:07:39Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -42,7 +42,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
14
README.md
14
README.md
|
@ -84,6 +84,7 @@ WordPress is a free and open-source content management system written in PHP and
|
|||
</code>
|
||||
|
||||
- [TAPESH-TEAM/CVE-2022-21661-WordPress-Core-5.8.2-WP_Query-SQL-Injection](https://github.com/TAPESH-TEAM/CVE-2022-21661-WordPress-Core-5.8.2-WP_Query-SQL-Injection)
|
||||
- [purple-WL/wordpress-CVE-2022-21661](https://github.com/purple-WL/wordpress-CVE-2022-21661)
|
||||
|
||||
### CVE-2022-21877 (2022-01-11)
|
||||
|
||||
|
@ -804,6 +805,7 @@ A local privilege escalation vulnerability was found on polkit's pkexec utility.
|
|||
- [ziadsaleemi/polkit_CVE-2021-4034](https://github.com/ziadsaleemi/polkit_CVE-2021-4034)
|
||||
- [FDlucifer/Pwnkit-go](https://github.com/FDlucifer/Pwnkit-go)
|
||||
- [fireclasher/pwnkit-CVE-2021-4034-](https://github.com/fireclasher/pwnkit-CVE-2021-4034-)
|
||||
- [an0n7os/CVE-2021-4034](https://github.com/an0n7os/CVE-2021-4034)
|
||||
|
||||
### CVE-2021-4043 (2022-02-04)
|
||||
|
||||
|
@ -2908,7 +2910,6 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
|
|||
- [Vulnmachines/cve-2021-41773](https://github.com/Vulnmachines/cve-2021-41773)
|
||||
- [iilegacyyii/PoC-CVE-2021-41773](https://github.com/iilegacyyii/PoC-CVE-2021-41773)
|
||||
- [Ls4ss/CVE-2021-41773_CVE-2021-42013](https://github.com/Ls4ss/CVE-2021-41773_CVE-2021-42013)
|
||||
- [blasty/CVE-2021-41773](https://github.com/blasty/CVE-2021-41773)
|
||||
- [PentesterGuruji/CVE-2021-41773](https://github.com/PentesterGuruji/CVE-2021-41773)
|
||||
- [mohwahyudi/cve-2021-41773](https://github.com/mohwahyudi/cve-2021-41773)
|
||||
- [1nhann/CVE-2021-41773](https://github.com/1nhann/CVE-2021-41773)
|
||||
|
@ -2921,7 +2922,6 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
|
|||
- [ComdeyOverflow/CVE-2021-41773](https://github.com/ComdeyOverflow/CVE-2021-41773)
|
||||
- [shiomiyan/CVE-2021-41773](https://github.com/shiomiyan/CVE-2021-41773)
|
||||
- [justakazh/mass_cve-2021-41773](https://github.com/justakazh/mass_cve-2021-41773)
|
||||
- [LetouRaphael/Poc-CVE-2021-41773](https://github.com/LetouRaphael/Poc-CVE-2021-41773)
|
||||
- [Sakura-nee/CVE-2021-41773](https://github.com/Sakura-nee/CVE-2021-41773)
|
||||
- [shellreaper/CVE-2021-41773](https://github.com/shellreaper/CVE-2021-41773)
|
||||
- [0xRar/CVE-2021-41773](https://github.com/0xRar/CVE-2021-41773)
|
||||
|
@ -3834,6 +3834,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [0xalwayslucky/log4j-polkit-poc](https://github.com/0xalwayslucky/log4j-polkit-poc)
|
||||
- [y-security/yLog4j](https://github.com/y-security/yLog4j)
|
||||
- [FeryaelJustice/Log4Shell](https://github.com/FeryaelJustice/Log4Shell)
|
||||
- [hotpotcookie/lol4j-white-box](https://github.com/hotpotcookie/lol4j-white-box)
|
||||
|
||||
### CVE-2021-44270
|
||||
- [pinpinsec/Anviz-Access-Control-Authentication-Bypass](https://github.com/pinpinsec/Anviz-Access-Control-Authentication-Bypass)
|
||||
|
@ -12815,6 +12816,7 @@ A sandbox bypass vulnerability exists in Script Security Plugin 1.49 and earlier
|
|||
- [adamyordan/cve-2019-1003000-jenkins-rce-poc](https://github.com/adamyordan/cve-2019-1003000-jenkins-rce-poc)
|
||||
- [0xtavian/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins](https://github.com/0xtavian/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins)
|
||||
- [1NTheKut/CVE-2019-1003000_RCE-DETECTION](https://github.com/1NTheKut/CVE-2019-1003000_RCE-DETECTION)
|
||||
- [purple-WL/Jenkins_CVE-2019-1003000](https://github.com/purple-WL/Jenkins_CVE-2019-1003000)
|
||||
|
||||
### CVE-2019-1010054 (2019-07-18)
|
||||
|
||||
|
@ -20815,6 +20817,14 @@ Technicolor TC7200 with firmware STD6.01.12 could allow remote attackers to obta
|
|||
|
||||
- [tihmstar/freePW_tc7200Eploit](https://github.com/tihmstar/freePW_tc7200Eploit)
|
||||
|
||||
### CVE-2014-1767 (2014-07-08)
|
||||
|
||||
<code>
|
||||
Double free vulnerability in the Ancillary Function Driver (AFD) in afd.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a crafted application, aka "Ancillary Function Driver Elevation of Privilege Vulnerability."
|
||||
</code>
|
||||
|
||||
- [ExploitCN/CVE-2014-1767-EXP-PAPER](https://github.com/ExploitCN/CVE-2014-1767-EXP-PAPER)
|
||||
|
||||
### CVE-2014-1773 (2014-06-10)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Add table
Reference in a new issue