mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/03/30 00:10:56
This commit is contained in:
parent
4d47086099
commit
8836583811
39 changed files with 271 additions and 158 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2014-0472 Django unexpected code execution using reverse()",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-23T16:21:57Z",
|
||||
"updated_at": "2020-12-24T08:12:34Z",
|
||||
"updated_at": "2021-03-29T11:22:01Z",
|
||||
"pushed_at": "2020-12-24T08:12:32Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 976,
|
||||
"watchers_count": 976,
|
||||
"forks_count": 225,
|
||||
"forks": 225,
|
||||
"forks_count": 226,
|
||||
"forks": 226,
|
||||
"watchers": 976,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2016-02-20T07:57:58Z",
|
||||
"stargazers_count": 549,
|
||||
"watchers_count": 549,
|
||||
"forks_count": 179,
|
||||
"forks": 179,
|
||||
"forks_count": 178,
|
||||
"forks": 178,
|
||||
"watchers": 549,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 976,
|
||||
"watchers_count": 976,
|
||||
"forks_count": 225,
|
||||
"forks": 225,
|
||||
"forks_count": 226,
|
||||
"forks": 226,
|
||||
"watchers": 976,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -178,8 +178,8 @@
|
|||
"pushed_at": "2017-11-28T03:06:32Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 52,
|
||||
"forks": 52,
|
||||
"forks_count": 53,
|
||||
"forks": 53,
|
||||
"watchers": 39,
|
||||
"score": 0
|
||||
},
|
||||
|
|
25
2017/CVE-2017-16541.json
Normal file
25
2017/CVE-2017-16541.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 352593664,
|
||||
"name": "A-breif-introduction-of-CVE-2017-16541",
|
||||
"full_name": "Ethan-Chen-uwo\/A-breif-introduction-of-CVE-2017-16541",
|
||||
"owner": {
|
||||
"login": "Ethan-Chen-uwo",
|
||||
"id": 71363177,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71363177?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ethan-Chen-uwo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ethan-Chen-uwo\/A-breif-introduction-of-CVE-2017-16541",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-29T09:52:11Z",
|
||||
"updated_at": "2021-03-29T10:06:30Z",
|
||||
"pushed_at": "2021-03-29T10:06:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 976,
|
||||
"watchers_count": 976,
|
||||
"forks_count": 225,
|
||||
"forks": 225,
|
||||
"forks_count": 226,
|
||||
"forks": 226,
|
||||
"watchers": 976,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -128,13 +128,13 @@
|
|||
"description": "Exploit for Laravel Remote Code Execution with API_KEY (CVE-2018-15133)",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-13T16:33:52Z",
|
||||
"updated_at": "2021-03-22T19:30:15Z",
|
||||
"updated_at": "2021-03-29T11:04:03Z",
|
||||
"pushed_at": "2020-12-31T20:34:30Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-22T04:52:08Z",
|
||||
"updated_at": "2021-03-24T02:17:24Z",
|
||||
"updated_at": "2021-03-29T10:12:42Z",
|
||||
"pushed_at": "2019-08-05T10:45:34Z",
|
||||
"stargazers_count": 437,
|
||||
"watchers_count": 437,
|
||||
"stargazers_count": 438,
|
||||
"watchers_count": 438,
|
||||
"forks_count": 179,
|
||||
"forks": 179,
|
||||
"watchers": 437,
|
||||
"watchers": 438,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -454,8 +454,8 @@
|
|||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 976,
|
||||
"watchers_count": 976,
|
||||
"forks_count": 225,
|
||||
"forks": 225,
|
||||
"forks_count": 226,
|
||||
"forks": 226,
|
||||
"watchers": 976,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -910,13 +910,13 @@
|
|||
"description": "dump",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-21T06:57:19Z",
|
||||
"updated_at": "2021-03-29T07:49:23Z",
|
||||
"updated_at": "2021-03-29T12:54:46Z",
|
||||
"pushed_at": "2019-06-01T05:15:11Z",
|
||||
"stargazers_count": 469,
|
||||
"watchers_count": 469,
|
||||
"stargazers_count": 470,
|
||||
"watchers_count": 470,
|
||||
"forks_count": 188,
|
||||
"forks": 188,
|
||||
"watchers": 469,
|
||||
"watchers": 470,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1025,7 +1025,7 @@
|
|||
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-22T00:08:44Z",
|
||||
"updated_at": "2021-03-24T13:09:30Z",
|
||||
"updated_at": "2021-03-29T12:57:45Z",
|
||||
"pushed_at": "2020-12-06T04:48:38Z",
|
||||
"stargazers_count": 1146,
|
||||
"watchers_count": 1146,
|
||||
|
@ -1416,13 +1416,13 @@
|
|||
"description": "Proof of concept for CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T16:53:54Z",
|
||||
"updated_at": "2021-03-28T14:50:23Z",
|
||||
"updated_at": "2021-03-29T12:56:56Z",
|
||||
"pushed_at": "2019-09-03T20:50:28Z",
|
||||
"stargazers_count": 1069,
|
||||
"watchers_count": 1069,
|
||||
"stargazers_count": 1070,
|
||||
"watchers_count": 1070,
|
||||
"forks_count": 355,
|
||||
"forks": 355,
|
||||
"watchers": 1069,
|
||||
"watchers": 1070,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1485,13 +1485,13 @@
|
|||
"description": "An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-31T00:04:12Z",
|
||||
"updated_at": "2021-02-27T02:00:58Z",
|
||||
"updated_at": "2021-03-29T12:56:53Z",
|
||||
"pushed_at": "2021-01-10T04:31:22Z",
|
||||
"stargazers_count": 342,
|
||||
"watchers_count": 342,
|
||||
"stargazers_count": 343,
|
||||
"watchers_count": 343,
|
||||
"forks_count": 120,
|
||||
"forks": 120,
|
||||
"watchers": 342,
|
||||
"watchers": 343,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1853,13 +1853,13 @@
|
|||
"description": "Public work for CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-23T03:15:53Z",
|
||||
"updated_at": "2021-03-10T15:34:56Z",
|
||||
"updated_at": "2021-03-29T12:56:21Z",
|
||||
"pushed_at": "2019-11-19T02:43:38Z",
|
||||
"stargazers_count": 286,
|
||||
"watchers_count": 286,
|
||||
"stargazers_count": 287,
|
||||
"watchers_count": 287,
|
||||
"forks_count": 90,
|
||||
"forks": 90,
|
||||
"watchers": 286,
|
||||
"watchers": 287,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "[CVE-2019-18935] Telerik UI for ASP.NET AJAX (RadAsyncUpload Handler) .NET JSON Deserialization",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-19T17:11:02Z",
|
||||
"updated_at": "2021-01-24T17:06:17Z",
|
||||
"updated_at": "2021-03-29T12:19:42Z",
|
||||
"pushed_at": "2020-08-25T07:55:22Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -155,8 +155,8 @@
|
|||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 976,
|
||||
"watchers_count": 976,
|
||||
"forks_count": 225,
|
||||
"forks": 225,
|
||||
"forks_count": 226,
|
||||
"forks": 226,
|
||||
"watchers": 976,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2020-3992 & CVE-2019-5544",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-04T15:15:22Z",
|
||||
"updated_at": "2021-03-21T01:57:19Z",
|
||||
"updated_at": "2021-03-29T14:59:21Z",
|
||||
"pushed_at": "2021-02-05T06:40:50Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC for CVE-2019-5736",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-13T05:26:32Z",
|
||||
"updated_at": "2021-03-26T10:02:03Z",
|
||||
"updated_at": "2021-03-29T09:47:03Z",
|
||||
"pushed_at": "2019-02-19T11:45:13Z",
|
||||
"stargazers_count": 485,
|
||||
"watchers_count": 485,
|
||||
"stargazers_count": 486,
|
||||
"watchers_count": 486,
|
||||
"forks_count": 118,
|
||||
"forks": 118,
|
||||
"watchers": 485,
|
||||
"watchers": 486,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "This repo contains a proof-of-concept for 📱🚀👑⚡, a deserialization vuln for local escalation of privilege to system_server in Android 10. This proof-of-concept only activates a privileged intent.",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-23T14:00:55Z",
|
||||
"updated_at": "2021-03-16T16:20:15Z",
|
||||
"updated_at": "2021-03-29T11:31:50Z",
|
||||
"pushed_at": "2021-02-23T14:03:00Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Support ALL Windows Version",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-16T08:57:51Z",
|
||||
"updated_at": "2021-03-25T14:41:07Z",
|
||||
"updated_at": "2021-03-29T12:03:45Z",
|
||||
"pushed_at": "2020-09-11T07:38:22Z",
|
||||
"stargazers_count": 512,
|
||||
"watchers_count": 512,
|
||||
"stargazers_count": 513,
|
||||
"watchers_count": 513,
|
||||
"forks_count": 128,
|
||||
"forks": 128,
|
||||
"watchers": 512,
|
||||
"watchers": 513,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -956,13 +956,13 @@
|
|||
"description": "Windows SMBv3 LPE exploit 已编译版",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-31T11:25:50Z",
|
||||
"updated_at": "2021-02-18T06:33:05Z",
|
||||
"updated_at": "2021-03-29T10:27:09Z",
|
||||
"pushed_at": "2020-03-31T11:34:02Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for WebSocket Vulnerability in Apache Tomcat",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-02T14:48:55Z",
|
||||
"updated_at": "2021-03-23T03:03:21Z",
|
||||
"updated_at": "2021-03-29T13:20:33Z",
|
||||
"pushed_at": "2020-11-02T14:51:48Z",
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 117,
|
||||
"watchers": 118,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2021-03-29T06:45:26Z",
|
||||
"updated_at": "2021-03-29T11:49:29Z",
|
||||
"pushed_at": "2020-10-21T12:10:28Z",
|
||||
"stargazers_count": 1263,
|
||||
"watchers_count": 1263,
|
||||
"stargazers_count": 1264,
|
||||
"watchers_count": 1264,
|
||||
"forks_count": 290,
|
||||
"forks": 290,
|
||||
"watchers": 1263,
|
||||
"watchers": 1264,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -772,13 +772,13 @@
|
|||
"description": "Zerologon AutoExploit Tool | CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-29T20:43:06Z",
|
||||
"updated_at": "2021-03-29T07:17:08Z",
|
||||
"updated_at": "2021-03-29T09:15:33Z",
|
||||
"pushed_at": "2020-10-02T13:00:21Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-03-29T08:12:01Z",
|
||||
"updated_at": "2021-03-29T13:43:00Z",
|
||||
"pushed_at": "2021-03-22T03:46:42Z",
|
||||
"stargazers_count": 265,
|
||||
"watchers_count": 265,
|
||||
"forks_count": 60,
|
||||
"forks": 60,
|
||||
"watchers": 265,
|
||||
"stargazers_count": 267,
|
||||
"watchers_count": 267,
|
||||
"forks_count": 61,
|
||||
"forks": 61,
|
||||
"watchers": 267,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2020-06-17T05:16:08Z",
|
||||
"updated_at": "2020-12-05T14:22:34Z",
|
||||
"pushed_at": "2020-12-03T03:01:18Z",
|
||||
"pushed_at": "2021-03-29T12:39:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "[CVE-2020-17519] Apache Flink RESTful API Arbitrary File Read",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-10T01:24:50Z",
|
||||
"updated_at": "2021-03-11T03:23:07Z",
|
||||
"updated_at": "2021-03-29T12:20:23Z",
|
||||
"pushed_at": "2021-01-10T01:26:07Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-02-23T17:06:06Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"forks_count": 53,
|
||||
"forks": 53,
|
||||
"forks_count": 54,
|
||||
"forks": 54,
|
||||
"watchers": 74,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 976,
|
||||
"watchers_count": 976,
|
||||
"forks_count": 225,
|
||||
"forks": 225,
|
||||
"forks_count": 226,
|
||||
"forks": 226,
|
||||
"watchers": 976,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2020-04-07T03:32:24Z",
|
||||
"stargazers_count": 265,
|
||||
"watchers_count": 265,
|
||||
"forks_count": 71,
|
||||
"forks": 71,
|
||||
"forks_count": 72,
|
||||
"forks": 72,
|
||||
"watchers": 265,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2020-3992 & CVE-2019-5544",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-04T15:15:22Z",
|
||||
"updated_at": "2021-03-21T01:57:19Z",
|
||||
"updated_at": "2021-03-29T14:59:21Z",
|
||||
"pushed_at": "2021-02-05T06:40:50Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -105,13 +105,13 @@
|
|||
"description": "[CVE-2020-6287] SAP NetWeaver AS JAVA (LM Configuration Wizard) Authentication Bypass (Create Simple & Administrator Java User)",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-13T09:12:37Z",
|
||||
"updated_at": "2021-01-27T18:19:21Z",
|
||||
"updated_at": "2021-03-29T12:19:34Z",
|
||||
"pushed_at": "2020-09-18T15:18:21Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "🐱💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-22T11:53:57Z",
|
||||
"updated_at": "2021-03-29T06:31:54Z",
|
||||
"updated_at": "2021-03-29T13:57:01Z",
|
||||
"pushed_at": "2021-03-22T18:24:20Z",
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 80,
|
||||
"watchers": 83,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2021-02-25T16:05:02Z",
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 100,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "cve-2021-22986 f5 rce 漏洞批量检测 poc",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-19T18:50:22Z",
|
||||
"updated_at": "2021-03-29T08:08:33Z",
|
||||
"updated_at": "2021-03-29T11:25:19Z",
|
||||
"pushed_at": "2021-03-27T10:02:59Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 14,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -128,7 +128,7 @@
|
|||
"description": "CVE-2021-22986 & F5 BIG-IP RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-22T07:13:50Z",
|
||||
"updated_at": "2021-03-26T20:48:19Z",
|
||||
"updated_at": "2021-03-29T11:32:42Z",
|
||||
"pushed_at": "2021-03-24T12:10:24Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
|
@ -205,5 +205,28 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 352644816,
|
||||
"name": "CVE-2021-22986",
|
||||
"full_name": "dotslashed\/CVE-2021-22986",
|
||||
"owner": {
|
||||
"login": "dotslashed",
|
||||
"id": 73475291,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73475291?v=4",
|
||||
"html_url": "https:\/\/github.com\/dotslashed"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dotslashed\/CVE-2021-22986",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-29T13:01:08Z",
|
||||
"updated_at": "2021-03-29T13:04:49Z",
|
||||
"pushed_at": "2021-03-29T13:04:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-03-29T08:12:01Z",
|
||||
"updated_at": "2021-03-29T13:43:00Z",
|
||||
"pushed_at": "2021-03-22T03:46:42Z",
|
||||
"stargazers_count": 265,
|
||||
"watchers_count": 265,
|
||||
"forks_count": 60,
|
||||
"forks": 60,
|
||||
"watchers": 265,
|
||||
"stargazers_count": 267,
|
||||
"watchers_count": 267,
|
||||
"forks_count": 61,
|
||||
"forks": 61,
|
||||
"watchers": 267,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -749,13 +749,13 @@
|
|||
"description": "Proof-of-concept exploit for CVE-2021-26855 and CVE-2021-27065. Unauthenticated RCE in Exchange.",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-24T01:12:48Z",
|
||||
"updated_at": "2021-03-27T20:12:31Z",
|
||||
"updated_at": "2021-03-29T12:15:54Z",
|
||||
"pushed_at": "2021-03-24T01:25:05Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "proxylogon exploit - CVE-2021-26857",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T17:32:32Z",
|
||||
"updated_at": "2021-03-29T02:34:33Z",
|
||||
"updated_at": "2021-03-29T11:52:36Z",
|
||||
"pushed_at": "2021-03-11T17:34:15Z",
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 93,
|
||||
"watchers": 94,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-26943.json
Normal file
25
2021/CVE-2021-26943.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 325836310,
|
||||
"name": "SmmExploit",
|
||||
"full_name": "tandasat\/SmmExploit",
|
||||
"owner": {
|
||||
"login": "tandasat",
|
||||
"id": 1620923,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1620923?v=4",
|
||||
"html_url": "https:\/\/github.com\/tandasat"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tandasat\/SmmExploit",
|
||||
"description": "The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-31T16:30:02Z",
|
||||
"updated_at": "2021-03-29T14:59:56Z",
|
||||
"pushed_at": "2021-03-29T12:33:38Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-29267.json
Normal file
25
2021/CVE-2021-29267.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 352641545,
|
||||
"name": "CVE-2021-29267",
|
||||
"full_name": "Security-AVS\/CVE-2021-29267",
|
||||
"owner": {
|
||||
"login": "Security-AVS",
|
||||
"id": 72926885,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72926885?v=4",
|
||||
"html_url": "https:\/\/github.com\/Security-AVS"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Security-AVS\/CVE-2021-29267",
|
||||
"description": "SherlockIM ChatBot XSS",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-29T12:50:23Z",
|
||||
"updated_at": "2021-03-29T13:34:39Z",
|
||||
"pushed_at": "2021-03-29T12:53:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Laravel debug rce",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-22T05:12:21Z",
|
||||
"updated_at": "2021-03-29T07:26:14Z",
|
||||
"updated_at": "2021-03-29T09:22:35Z",
|
||||
"pushed_at": "2021-01-24T05:28:07Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 74,
|
||||
"watchers": 75,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-18T05:42:13Z",
|
||||
"updated_at": "2021-03-21T08:41:05Z",
|
||||
"updated_at": "2021-03-29T14:30:39Z",
|
||||
"pushed_at": "2021-02-18T08:30:23Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -381,13 +381,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2021-03-29T07:39:35Z",
|
||||
"updated_at": "2021-03-29T09:22:16Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 661,
|
||||
"watchers_count": 661,
|
||||
"stargazers_count": 662,
|
||||
"watchers_count": 662,
|
||||
"forks_count": 186,
|
||||
"forks": 186,
|
||||
"watchers": 661,
|
||||
"watchers": 662,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -473,13 +473,13 @@
|
|||
"description": "A docker environment to research CVE-2021-3156",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-31T22:58:13Z",
|
||||
"updated_at": "2021-03-17T06:06:38Z",
|
||||
"updated_at": "2021-03-29T14:49:42Z",
|
||||
"pushed_at": "2021-01-31T23:03:51Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -657,13 +657,13 @@
|
|||
"description": "Root shell PoC for CVE-2021-3156",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-03T19:57:56Z",
|
||||
"updated_at": "2021-03-27T17:18:11Z",
|
||||
"updated_at": "2021-03-29T12:51:11Z",
|
||||
"pushed_at": "2021-02-03T22:28:14Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 32,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -887,13 +887,13 @@
|
|||
"description": "Sudo Baron Samedit Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-15T17:37:02Z",
|
||||
"updated_at": "2021-03-29T07:56:20Z",
|
||||
"updated_at": "2021-03-29T14:14:27Z",
|
||||
"pushed_at": "2021-03-28T15:22:59Z",
|
||||
"stargazers_count": 232,
|
||||
"watchers_count": 232,
|
||||
"stargazers_count": 235,
|
||||
"watchers_count": 235,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"watchers": 232,
|
||||
"watchers": 235,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-26T01:09:25Z",
|
||||
"updated_at": "2021-03-29T09:03:50Z",
|
||||
"pushed_at": "2021-03-28T08:21:39Z",
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"updated_at": "2021-03-29T15:14:22Z",
|
||||
"pushed_at": "2021-03-29T13:42:04Z",
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 101,
|
||||
"watchers": 117,
|
||||
"score": 0
|
||||
}
|
||||
]
|
15
README.md
15
README.md
|
@ -356,6 +356,7 @@ An issue has been discovered in GitLab CE/EE affecting all versions starting fro
|
|||
- [ZephrFish/CVE-2021-22986_Check](https://github.com/ZephrFish/CVE-2021-22986_Check)
|
||||
- [yaunsky/CVE-202122986-EXP](https://github.com/yaunsky/CVE-202122986-EXP)
|
||||
- [Tas9er/CVE-2021-22986](https://github.com/Tas9er/CVE-2021-22986)
|
||||
- [dotslashed/CVE-2021-22986](https://github.com/dotslashed/CVE-2021-22986)
|
||||
|
||||
### CVE-2021-23132 (2021-03-04)
|
||||
|
||||
|
@ -519,6 +520,9 @@ LMA ISIDA Retriever 5.2 allows SQL Injection.
|
|||
|
||||
- [Security-AVS/-CVE-2021-26904](https://github.com/Security-AVS/-CVE-2021-26904)
|
||||
|
||||
### CVE-2021-26943
|
||||
- [tandasat/SmmExploit](https://github.com/tandasat/SmmExploit)
|
||||
|
||||
### CVE-2021-27065 (2021-03-02)
|
||||
|
||||
<code>
|
||||
|
@ -602,6 +606,9 @@ SonLogger before 6.4.1 is affected by user creation with any user permissions pr
|
|||
|
||||
- [erberkan/SonLogger-vulns](https://github.com/erberkan/SonLogger-vulns)
|
||||
|
||||
### CVE-2021-29267
|
||||
- [Security-AVS/CVE-2021-29267](https://github.com/Security-AVS/CVE-2021-29267)
|
||||
|
||||
|
||||
## 2020
|
||||
### CVE-2020-0001 (2020-01-08)
|
||||
|
@ -13319,6 +13326,14 @@ Web Viewer 1.0.0.193 on Samsung SRN-1670D devices suffers from an Unrestricted f
|
|||
|
||||
- [realistic-security/CVE-2017-16524](https://github.com/realistic-security/CVE-2017-16524)
|
||||
|
||||
### CVE-2017-16541 (2017-11-04)
|
||||
|
||||
<code>
|
||||
Tor Browser before 7.0.9 on macOS and Linux allows remote attackers to bypass the intended anonymity feature and discover a client IP address via vectors involving a crafted web site that leverages file:// mishandling in Firefox, aka TorMoil. NOTE: Tails is unaffected.
|
||||
</code>
|
||||
|
||||
- [Ethan-Chen-uwo/A-breif-introduction-of-CVE-2017-16541](https://github.com/Ethan-Chen-uwo/A-breif-introduction-of-CVE-2017-16541)
|
||||
|
||||
### CVE-2017-16567 (2017-11-09)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue