mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/03/13 00:09:21
This commit is contained in:
parent
5362feecf9
commit
857ffb7236
31 changed files with 188 additions and 188 deletions
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-09-30T23:38:11Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-21T11:19:21Z",
|
||||
"updated_at": "2021-03-07T20:10:25Z",
|
||||
"updated_at": "2021-03-12T09:48:23Z",
|
||||
"pushed_at": "2021-02-03T16:03:40Z",
|
||||
"stargazers_count": 861,
|
||||
"watchers_count": 861,
|
||||
"stargazers_count": 862,
|
||||
"watchers_count": 862,
|
||||
"forks_count": 410,
|
||||
"forks": 410,
|
||||
"watchers": 861,
|
||||
"watchers": 862,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for Remote Code Execution on GPON home routers (CVE-2018-10562) written in Python. Initially disclosed by VPNMentor (https:\/\/www.vpnmentor.com\/blog\/critical-vulnerability-gpon-router\/), kudos for their work.",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-07T10:34:10Z",
|
||||
"updated_at": "2020-12-30T22:27:48Z",
|
||||
"updated_at": "2021-03-12T14:48:25Z",
|
||||
"pushed_at": "2018-05-10T15:08:43Z",
|
||||
"stargazers_count": 207,
|
||||
"watchers_count": 207,
|
||||
"stargazers_count": 206,
|
||||
"watchers_count": 206,
|
||||
"forks_count": 68,
|
||||
"forks": 68,
|
||||
"watchers": 207,
|
||||
"watchers": 206,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-24T05:34:05Z",
|
||||
"updated_at": "2021-02-23T19:44:00Z",
|
||||
"updated_at": "2021-03-12T09:37:23Z",
|
||||
"pushed_at": "2020-10-16T12:09:45Z",
|
||||
"stargazers_count": 410,
|
||||
"watchers_count": 410,
|
||||
"stargazers_count": 411,
|
||||
"watchers_count": 411,
|
||||
"forks_count": 392,
|
||||
"forks": 392,
|
||||
"watchers": 410,
|
||||
"watchers": 411,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2018-4280: Mach port replacement vulnerability in launchd on iOS 11.2.6 leading to sandbox escape, privilege escalation, and codesigning bypass.",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-23T00:19:05Z",
|
||||
"updated_at": "2021-02-28T13:31:57Z",
|
||||
"updated_at": "2021-03-12T13:17:10Z",
|
||||
"pushed_at": "2018-11-13T00:26:18Z",
|
||||
"stargazers_count": 212,
|
||||
"watchers_count": 212,
|
||||
"stargazers_count": 213,
|
||||
"watchers_count": 213,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"watchers": 212,
|
||||
"watchers": 213,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2019-05-14T21:51:14Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 52,
|
||||
"forks": 52,
|
||||
"forks_count": 53,
|
||||
"forks": 53,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -2409,8 +2409,8 @@
|
|||
"pushed_at": "2020-01-21T03:15:41Z",
|
||||
"stargazers_count": 195,
|
||||
"watchers_count": 195,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"forks_count": 50,
|
||||
"forks": 50,
|
||||
"watchers": 195,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2021-03-11T15:21:29Z",
|
||||
"updated_at": "2021-03-12T10:24:52Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1638,
|
||||
"watchers_count": 1638,
|
||||
"stargazers_count": 1639,
|
||||
"watchers_count": 1639,
|
||||
"forks_count": 248,
|
||||
"forks": 248,
|
||||
"watchers": 1638,
|
||||
"watchers": 1639,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-03-12T02:27:07Z",
|
||||
"updated_at": "2021-03-12T13:10:59Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2389,
|
||||
"watchers_count": 2389,
|
||||
"stargazers_count": 2388,
|
||||
"watchers_count": 2388,
|
||||
"forks_count": 685,
|
||||
"forks": 685,
|
||||
"watchers": 2389,
|
||||
"watchers": 2388,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -71,14 +71,14 @@
|
|||
{
|
||||
"id": 185733954,
|
||||
"name": "Docker-Runc-Exploit",
|
||||
"full_name": "13paulmurith\/Docker-Runc-Exploit",
|
||||
"full_name": "panzouh\/Docker-Runc-Exploit",
|
||||
"owner": {
|
||||
"login": "13paulmurith",
|
||||
"login": "panzouh",
|
||||
"id": 26403285,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26403285?v=4",
|
||||
"html_url": "https:\/\/github.com\/13paulmurith"
|
||||
"html_url": "https:\/\/github.com\/panzouh"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/13paulmurith\/Docker-Runc-Exploit",
|
||||
"html_url": "https:\/\/github.com\/panzouh\/Docker-Runc-Exploit",
|
||||
"description": "Docker runc CVE-2019-5736 exploit Dockerfile. Credits : https:\/\/github.com\/Frichetten\/CVE-2019-5736-PoC.git",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-09T05:45:21Z",
|
||||
|
|
|
@ -2,14 +2,14 @@
|
|||
{
|
||||
"id": 267795979,
|
||||
"name": "CVE-2019-8641-reproduction",
|
||||
"full_name": "ire33164\/CVE-2019-8641-reproduction",
|
||||
"full_name": "chia33164\/CVE-2019-8641-reproduction",
|
||||
"owner": {
|
||||
"login": "ire33164",
|
||||
"login": "chia33164",
|
||||
"id": 26138915,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26138915?v=4",
|
||||
"html_url": "https:\/\/github.com\/ire33164"
|
||||
"html_url": "https:\/\/github.com\/chia33164"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ire33164\/CVE-2019-8641-reproduction",
|
||||
"html_url": "https:\/\/github.com\/chia33164\/CVE-2019-8641-reproduction",
|
||||
"description": "The reproduction code for CVE-2019-8641.",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-29T07:37:15Z",
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-04-08T08:55:30Z",
|
||||
"stargazers_count": 151,
|
||||
"watchers_count": 151,
|
||||
"forks_count": 48,
|
||||
"forks": 48,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"watchers": 151,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-05-15T09:03:36Z",
|
||||
"stargazers_count": 194,
|
||||
"watchers_count": 194,
|
||||
"forks_count": 65,
|
||||
"forks": 65,
|
||||
"forks_count": 66,
|
||||
"forks": 66,
|
||||
"watchers": 194,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-03-11T23:57:10Z",
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 81,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-06-17T00:56:08Z",
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"forks_count": 43,
|
||||
"forks": 43,
|
||||
"watchers": 158,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit code for CVE-2020-11579, an arbitrary file disclosure through the MySQL client in PHPKB",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-19T13:12:48Z",
|
||||
"updated_at": "2020-11-20T13:17:09Z",
|
||||
"updated_at": "2021-03-12T13:28:00Z",
|
||||
"pushed_at": "2020-08-04T09:30:49Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2021-03-11T12:35:53Z",
|
||||
"updated_at": "2021-03-12T15:09:39Z",
|
||||
"pushed_at": "2020-11-03T09:45:24Z",
|
||||
"stargazers_count": 764,
|
||||
"watchers_count": 764,
|
||||
"stargazers_count": 765,
|
||||
"watchers_count": 765,
|
||||
"forks_count": 222,
|
||||
"forks": 222,
|
||||
"watchers": 764,
|
||||
"watchers": 765,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-03-12T02:27:07Z",
|
||||
"updated_at": "2021-03-12T13:10:59Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2389,
|
||||
"watchers_count": 2389,
|
||||
"stargazers_count": 2388,
|
||||
"watchers_count": 2388,
|
||||
"forks_count": 685,
|
||||
"forks": 685,
|
||||
"watchers": 2389,
|
||||
"watchers": 2388,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2020–14882、CVE-2020–14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-28T11:43:37Z",
|
||||
"updated_at": "2021-03-05T04:43:04Z",
|
||||
"updated_at": "2021-03-12T10:10:35Z",
|
||||
"pushed_at": "2020-11-16T04:23:09Z",
|
||||
"stargazers_count": 213,
|
||||
"watchers_count": 213,
|
||||
"stargazers_count": 214,
|
||||
"watchers_count": 214,
|
||||
"forks_count": 43,
|
||||
"forks": 43,
|
||||
"watchers": 213,
|
||||
"watchers": 214,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -266,13 +266,13 @@
|
|||
"description": "CVE-2020-14882_ALL综合利用工具,支持命令回显检测、批量命令回显、外置xml无回显命令执行等功能。",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-03T10:49:35Z",
|
||||
"updated_at": "2021-03-11T08:36:37Z",
|
||||
"updated_at": "2021-03-12T10:13:02Z",
|
||||
"pushed_at": "2020-12-01T05:08:41Z",
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 78,
|
||||
"watchers": 79,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2,18 +2,18 @@
|
|||
{
|
||||
"id": 297507799,
|
||||
"name": "CVE-2020-25790",
|
||||
"full_name": "pownx\/CVE-2020-25790",
|
||||
"full_name": "v4lak\/CVE-2020-25790",
|
||||
"owner": {
|
||||
"login": "pownx",
|
||||
"id": 79206826,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79206826?v=4",
|
||||
"html_url": "https:\/\/github.com\/pownx"
|
||||
"login": "v4lak",
|
||||
"id": 80525493,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80525493?v=4",
|
||||
"html_url": "https:\/\/github.com\/v4lak"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pownx\/CVE-2020-25790",
|
||||
"html_url": "https:\/\/github.com\/v4lak\/CVE-2020-25790",
|
||||
"description": "Exploit for CVE-2020-25790",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-22T01:57:06Z",
|
||||
"updated_at": "2021-03-10T21:51:03Z",
|
||||
"updated_at": "2021-03-12T13:33:07Z",
|
||||
"pushed_at": "2021-03-10T21:51:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-11-27T11:26:01Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Exploit CVE-2020-29134 - TOTVS Fluig Platform - Path Traversal",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-11T13:44:40Z",
|
||||
"updated_at": "2021-03-11T16:12:58Z",
|
||||
"pushed_at": "2021-03-11T16:12:56Z",
|
||||
"updated_at": "2021-03-12T11:58:20Z",
|
||||
"pushed_at": "2021-03-12T11:58:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-09-05T08:36:00Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-8554: Man in the middle using LoadBalancer or ExternalIPs",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-01T16:58:39Z",
|
||||
"updated_at": "2020-12-19T13:03:55Z",
|
||||
"updated_at": "2021-03-12T13:58:36Z",
|
||||
"pushed_at": "2020-12-11T22:45:45Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-1732 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-05T02:11:10Z",
|
||||
"updated_at": "2021-03-12T08:02:56Z",
|
||||
"updated_at": "2021-03-12T09:50:22Z",
|
||||
"pushed_at": "2021-03-05T03:10:26Z",
|
||||
"stargazers_count": 225,
|
||||
"watchers_count": 225,
|
||||
"stargazers_count": 227,
|
||||
"watchers_count": 227,
|
||||
"forks_count": 46,
|
||||
"forks": 46,
|
||||
"watchers": 225,
|
||||
"watchers": 227,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2021-21972 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T11:14:58Z",
|
||||
"updated_at": "2021-03-12T07:44:33Z",
|
||||
"updated_at": "2021-03-12T13:45:34Z",
|
||||
"pushed_at": "2021-03-10T05:01:22Z",
|
||||
"stargazers_count": 212,
|
||||
"watchers_count": 212,
|
||||
"forks_count": 80,
|
||||
"forks": 80,
|
||||
"watchers": 212,
|
||||
"stargazers_count": 214,
|
||||
"watchers_count": 214,
|
||||
"forks_count": 81,
|
||||
"forks": 81,
|
||||
"watchers": 214,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -220,13 +220,13 @@
|
|||
"description": "VMware vCenter 未授权RCE(CVE-2021-21972)",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-25T07:17:21Z",
|
||||
"updated_at": "2021-03-11T05:51:03Z",
|
||||
"updated_at": "2021-03-12T10:25:10Z",
|
||||
"pushed_at": "2021-02-25T09:54:53Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 21,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-03-03T03:52:10Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 52,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-15T14:41:25Z",
|
||||
"updated_at": "2021-03-11T15:49:50Z",
|
||||
"updated_at": "2021-03-12T11:16:28Z",
|
||||
"pushed_at": "2021-02-15T15:11:00Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 48,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "A PowerShell script to identify indicators of exploitation of CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-26865",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-03T17:36:18Z",
|
||||
"updated_at": "2021-03-08T04:47:01Z",
|
||||
"updated_at": "2021-03-12T14:13:35Z",
|
||||
"pushed_at": "2021-03-05T17:09:01Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,36 +82,13 @@
|
|||
"description": "Microsoft Exchange Server SSRF漏洞(CVE-2021-26855)",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-06T09:15:55Z",
|
||||
"updated_at": "2021-03-10T16:37:03Z",
|
||||
"updated_at": "2021-03-12T10:24:19Z",
|
||||
"pushed_at": "2021-03-06T10:34:49Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 345142051,
|
||||
"name": "CVE-2021-26855",
|
||||
"full_name": "Udyz\/CVE-2021-26855",
|
||||
"owner": {
|
||||
"login": "Udyz",
|
||||
"id": 39673284,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39673284?v=4",
|
||||
"html_url": "https:\/\/github.com\/Udyz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Udyz\/CVE-2021-26855",
|
||||
"description": "CVE-2021-26855 SSRF Exchange Server",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-06T16:34:45Z",
|
||||
"updated_at": "2021-03-12T07:29:05Z",
|
||||
"pushed_at": "2021-03-12T04:09:13Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 25,
|
||||
"watchers": 36,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -201,8 +178,8 @@
|
|||
"pushed_at": "2021-03-11T03:28:47Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -220,13 +197,13 @@
|
|||
"description": "CVE-2021-26855 exp",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-08T08:39:05Z",
|
||||
"updated_at": "2021-03-12T08:28:39Z",
|
||||
"updated_at": "2021-03-12T09:38:35Z",
|
||||
"pushed_at": "2021-03-08T08:09:01Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"forks_count": 60,
|
||||
"forks": 60,
|
||||
"watchers": 60,
|
||||
"watchers": 61,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -243,13 +220,13 @@
|
|||
"description": "A fast tool to mass scan for a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin (CVE-2021-26855).",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-08T11:54:32Z",
|
||||
"updated_at": "2021-03-12T08:25:49Z",
|
||||
"updated_at": "2021-03-12T10:22:13Z",
|
||||
"pushed_at": "2021-03-08T14:50:48Z",
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 89,
|
||||
"watchers": 90,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -289,8 +266,8 @@
|
|||
"description": "CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-09T10:36:44Z",
|
||||
"updated_at": "2021-03-11T16:20:40Z",
|
||||
"pushed_at": "2021-03-11T16:20:38Z",
|
||||
"updated_at": "2021-03-12T09:36:14Z",
|
||||
"pushed_at": "2021-03-12T09:36:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
@ -358,13 +335,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-09T16:54:39Z",
|
||||
"updated_at": "2021-03-12T04:47:54Z",
|
||||
"updated_at": "2021-03-12T13:41:33Z",
|
||||
"pushed_at": "2021-03-09T16:56:09Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"forks_count": 45,
|
||||
"forks": 45,
|
||||
"watchers": 56,
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"forks_count": 48,
|
||||
"forks": 48,
|
||||
"watchers": 58,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -381,13 +358,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-10T05:21:19Z",
|
||||
"updated_at": "2021-03-12T02:55:15Z",
|
||||
"updated_at": "2021-03-12T12:44:29Z",
|
||||
"pushed_at": "2021-03-10T05:46:35Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 30,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -450,13 +427,13 @@
|
|||
"description": "PoC of proxylogon chain SSRF(CVE-2021-26855) to write file by testanull, censored by github",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T20:51:48Z",
|
||||
"updated_at": "2021-03-12T08:32:17Z",
|
||||
"updated_at": "2021-03-12T12:56:43Z",
|
||||
"pushed_at": "2021-03-11T20:58:08Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 21,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -504,5 +481,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 347064151,
|
||||
"name": "CVE-2021-26855-Scanner",
|
||||
"full_name": "KotSec\/CVE-2021-26855-Scanner",
|
||||
"owner": {
|
||||
"login": "KotSec",
|
||||
"id": 80525807,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80525807?v=4",
|
||||
"html_url": "https:\/\/github.com\/KotSec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/KotSec\/CVE-2021-26855-Scanner",
|
||||
"description": "Scanner and PoC for CVE-2021-26855 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-12T12:47:41Z",
|
||||
"updated_at": "2021-03-12T12:55:59Z",
|
||||
"pushed_at": "2021-03-12T12:55:57Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "proxylogon exploit - CVE-2021-26857",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T17:32:32Z",
|
||||
"updated_at": "2021-03-12T08:57:37Z",
|
||||
"updated_at": "2021-03-12T15:12:52Z",
|
||||
"pushed_at": "2021-03-11T17:34:15Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 40,
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T13:41:42Z",
|
||||
"updated_at": "2021-03-12T02:56:29Z",
|
||||
"updated_at": "2021-03-12T15:08:29Z",
|
||||
"pushed_at": "2021-03-11T14:01:15Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-13T12:52:20Z",
|
||||
"updated_at": "2021-03-10T08:18:44Z",
|
||||
"updated_at": "2021-03-12T12:42:55Z",
|
||||
"pushed_at": "2021-01-29T13:59:07Z",
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 86,
|
||||
"watchers": 87,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-18T05:42:13Z",
|
||||
"updated_at": "2021-03-12T08:27:17Z",
|
||||
"updated_at": "2021-03-12T11:42:32Z",
|
||||
"pushed_at": "2021-02-18T08:30:23Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 10,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -384,7 +384,6 @@ Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is uni
|
|||
- [soteria-security/HAFNIUM-IOC](https://github.com/soteria-security/HAFNIUM-IOC)
|
||||
- [cert-lv/exchange_webshell_detection](https://github.com/cert-lv/exchange_webshell_detection)
|
||||
- [conjojo/Microsoft_Exchange_Server_SSRF_CVE-2021-26855](https://github.com/conjojo/Microsoft_Exchange_Server_SSRF_CVE-2021-26855)
|
||||
- [Udyz/CVE-2021-26855](https://github.com/Udyz/CVE-2021-26855)
|
||||
- [pussycat0x/CVE-2021-26855-SSRF](https://github.com/pussycat0x/CVE-2021-26855-SSRF)
|
||||
- [0xAbdullah/CVE-2021-26855](https://github.com/0xAbdullah/CVE-2021-26855)
|
||||
- [Th3eCrow/CVE-2021-26855-SSRF-Exchange](https://github.com/Th3eCrow/CVE-2021-26855-SSRF-Exchange)
|
||||
|
@ -402,6 +401,7 @@ Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is uni
|
|||
- [hackerschoice/CVE-2021-26855](https://github.com/hackerschoice/CVE-2021-26855)
|
||||
- [SCS-Labs/HAFNIUM-Microsoft-Exchange-0day](https://github.com/SCS-Labs/HAFNIUM-Microsoft-Exchange-0day)
|
||||
- [XairGit/CVE-2021-26855](https://github.com/XairGit/CVE-2021-26855)
|
||||
- [KotSec/CVE-2021-26855-Scanner](https://github.com/KotSec/CVE-2021-26855-Scanner)
|
||||
|
||||
### CVE-2021-26857 (2021-03-02)
|
||||
|
||||
|
@ -3858,7 +3858,7 @@ An issue was discovered on Accfly Wireless Security IR Camera 720P System with s
|
|||
** DISPUTED ** Typesetter CMS 5.x through 5.1 allows admins to upload and execute arbitrary PHP code via a .php file inside a ZIP archive. NOTE: the vendor disputes the significance of this report because "admins are considered trustworthy"; however, the behavior "contradicts our security policy" and is being fixed for 5.2.
|
||||
</code>
|
||||
|
||||
- [pownx/CVE-2020-25790](https://github.com/pownx/CVE-2020-25790)
|
||||
- [v4lak/CVE-2020-25790](https://github.com/v4lak/CVE-2020-25790)
|
||||
- [7Mitu/CVE-2020-25790](https://github.com/7Mitu/CVE-2020-25790)
|
||||
|
||||
### CVE-2020-25860 (2020-12-21)
|
||||
|
@ -5305,7 +5305,7 @@ runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allow
|
|||
- [twistlock/RunC-CVE-2019-5736](https://github.com/twistlock/RunC-CVE-2019-5736)
|
||||
- [stillan00b/CVE-2019-5736](https://github.com/stillan00b/CVE-2019-5736)
|
||||
- [milloni/cve-2019-5736-exp](https://github.com/milloni/cve-2019-5736-exp)
|
||||
- [13paulmurith/Docker-Runc-Exploit](https://github.com/13paulmurith/Docker-Runc-Exploit)
|
||||
- [panzouh/Docker-Runc-Exploit](https://github.com/panzouh/Docker-Runc-Exploit)
|
||||
- [RyanNgWH/CVE-2019-5736-POC](https://github.com/RyanNgWH/CVE-2019-5736-POC)
|
||||
- [Lee-SungYoung/cve-2019-5736-study](https://github.com/Lee-SungYoung/cve-2019-5736-study)
|
||||
- [chosam2/cve-2019-5736-poc](https://github.com/chosam2/cve-2019-5736-poc)
|
||||
|
@ -5655,7 +5655,7 @@ A use after free issue was addressed with improved memory management. This issue
|
|||
An out-of-bounds read was addressed with improved input validation.
|
||||
</code>
|
||||
|
||||
- [ire33164/CVE-2019-8641-reproduction](https://github.com/ire33164/CVE-2019-8641-reproduction)
|
||||
- [chia33164/CVE-2019-8641-reproduction](https://github.com/chia33164/CVE-2019-8641-reproduction)
|
||||
|
||||
### CVE-2019-8656 (2020-10-27)
|
||||
|
||||
|
|
Loading…
Reference in a new issue