mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2021/07/10 06:13:09
This commit is contained in:
parent
96f9b7e83b
commit
8c978d9443
17 changed files with 104 additions and 75 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T04:32:26Z",
|
||||
"updated_at": "2021-07-04T10:47:43Z",
|
||||
"updated_at": "2021-07-09T19:19:06Z",
|
||||
"pushed_at": "2019-11-19T03:36:46Z",
|
||||
"stargazers_count": 545,
|
||||
"watchers_count": 545,
|
||||
"stargazers_count": 546,
|
||||
"watchers_count": 546,
|
||||
"forks_count": 92,
|
||||
"forks": 92,
|
||||
"watchers": 545,
|
||||
"watchers": 546,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "An exploit for Apache Struts CVE-2017-9805",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-09T01:32:57Z",
|
||||
"updated_at": "2021-04-27T13:44:14Z",
|
||||
"updated_at": "2021-07-09T17:21:14Z",
|
||||
"pushed_at": "2017-11-07T19:24:00Z",
|
||||
"stargazers_count": 239,
|
||||
"watchers_count": 239,
|
||||
"stargazers_count": 240,
|
||||
"watchers_count": 240,
|
||||
"forks_count": 78,
|
||||
"forks": 78,
|
||||
"watchers": 239,
|
||||
"watchers": 240,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "SpecuCheck is a Windows utility for checking the state of the software mitigations and hardware against CVE-2017-5754 (Meltdown), CVE-2017-5715 (Spectre v2), CVE-2018-3260 (Foreshadow), and CVE-2018-3639 (Spectre v4)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T04:32:26Z",
|
||||
"updated_at": "2021-07-04T10:47:43Z",
|
||||
"updated_at": "2021-07-09T19:19:06Z",
|
||||
"pushed_at": "2019-11-19T03:36:46Z",
|
||||
"stargazers_count": 545,
|
||||
"watchers_count": 545,
|
||||
"stargazers_count": 546,
|
||||
"watchers_count": 546,
|
||||
"forks_count": 92,
|
||||
"forks": 92,
|
||||
"watchers": 545,
|
||||
"watchers": 546,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-28T11:50:00Z",
|
||||
"updated_at": "2021-06-26T13:56:18Z",
|
||||
"updated_at": "2021-07-09T16:33:17Z",
|
||||
"pushed_at": "2018-08-30T05:37:03Z",
|
||||
"stargazers_count": 424,
|
||||
"watchers_count": 424,
|
||||
"stargazers_count": 425,
|
||||
"watchers_count": 425,
|
||||
"forks_count": 54,
|
||||
"forks": 54,
|
||||
"watchers": 424,
|
||||
"watchers": 425,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2019-06-21T11:29:41Z",
|
||||
"stargazers_count": 317,
|
||||
"watchers_count": 317,
|
||||
"forks_count": 67,
|
||||
"forks": 67,
|
||||
"forks_count": 68,
|
||||
"forks": 68,
|
||||
"watchers": 317,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "(CVE-2018-9995) Get DVR Credentials",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-29T20:00:06Z",
|
||||
"updated_at": "2021-07-09T08:14:08Z",
|
||||
"updated_at": "2021-07-09T20:20:27Z",
|
||||
"pushed_at": "2019-01-23T14:27:21Z",
|
||||
"stargazers_count": 453,
|
||||
"watchers_count": 453,
|
||||
"stargazers_count": 454,
|
||||
"watchers_count": 454,
|
||||
"forks_count": 187,
|
||||
"forks": 187,
|
||||
"watchers": 453,
|
||||
"watchers": 454,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC code for CVE-2019-0841 Privilege Escalation vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-05T12:53:52Z",
|
||||
"updated_at": "2021-06-18T03:34:13Z",
|
||||
"updated_at": "2021-07-09T20:13:21Z",
|
||||
"pushed_at": "2019-04-09T16:49:19Z",
|
||||
"stargazers_count": 225,
|
||||
"watchers_count": 225,
|
||||
"stargazers_count": 226,
|
||||
"watchers_count": 226,
|
||||
"forks_count": 100,
|
||||
"forks": 100,
|
||||
"watchers": 225,
|
||||
"watchers": 226,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-07-09T12:05:41Z",
|
||||
"updated_at": "2021-07-09T15:25:47Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2671,
|
||||
"watchers_count": 2671,
|
||||
"stargazers_count": 2672,
|
||||
"watchers_count": 2672,
|
||||
"forks_count": 777,
|
||||
"forks": 777,
|
||||
"watchers": 2671,
|
||||
"watchers": 2672,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-09T22:30:42Z",
|
||||
"updated_at": "2021-07-04T07:38:39Z",
|
||||
"updated_at": "2021-07-09T16:14:05Z",
|
||||
"pushed_at": "2019-01-22T21:00:36Z",
|
||||
"stargazers_count": 610,
|
||||
"watchers_count": 610,
|
||||
"stargazers_count": 611,
|
||||
"watchers_count": 611,
|
||||
"forks_count": 132,
|
||||
"forks": 132,
|
||||
"watchers": 610,
|
||||
"watchers": 611,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -113,5 +113,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 384531590,
|
||||
"name": "CVE-2019-6447",
|
||||
"full_name": "3hydraking\/CVE-2019-6447",
|
||||
"owner": {
|
||||
"login": "3hydraking",
|
||||
"id": 66146701,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
|
||||
"html_url": "https:\/\/github.com\/3hydraking"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/3hydraking\/CVE-2019-6447",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-09T19:21:29Z",
|
||||
"updated_at": "2021-07-09T19:27:19Z",
|
||||
"pushed_at": "2021-07-09T19:27:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1094,12 +1094,12 @@
|
|||
"description": "CVE-2020-0796 Remote Code Execution POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-20T14:35:48Z",
|
||||
"updated_at": "2021-07-08T04:00:24Z",
|
||||
"updated_at": "2021-07-09T19:50:59Z",
|
||||
"pushed_at": "2020-06-09T20:46:45Z",
|
||||
"stargazers_count": 399,
|
||||
"watchers_count": 399,
|
||||
"forks_count": 129,
|
||||
"forks": 129,
|
||||
"forks_count": 130,
|
||||
"forks": 130,
|
||||
"watchers": 399,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-07-09T12:05:41Z",
|
||||
"updated_at": "2021-07-09T15:25:47Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2671,
|
||||
"watchers_count": 2671,
|
||||
"stargazers_count": 2672,
|
||||
"watchers_count": 2672,
|
||||
"forks_count": 777,
|
||||
"forks": 777,
|
||||
"watchers": 2671,
|
||||
"watchers": 2672,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-10-21T15:39:00Z",
|
||||
"stargazers_count": 174,
|
||||
"watchers_count": 174,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 174,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "CVE-2020-8554: Man in the middle using LoadBalancer or ExternalIPs",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-01T16:58:39Z",
|
||||
"updated_at": "2021-03-12T13:58:36Z",
|
||||
"pushed_at": "2021-07-07T17:46:26Z",
|
||||
"updated_at": "2021-07-09T16:02:47Z",
|
||||
"pushed_at": "2021-07-09T16:16:14Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 3,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2021-07-09T15:05:17Z",
|
||||
"updated_at": "2021-07-09T19:35:13Z",
|
||||
"pushed_at": "2021-07-08T11:10:36Z",
|
||||
"stargazers_count": 1135,
|
||||
"watchers_count": 1135,
|
||||
"forks_count": 408,
|
||||
"forks": 408,
|
||||
"watchers": 1135,
|
||||
"stargazers_count": 1140,
|
||||
"watchers_count": 1140,
|
||||
"forks_count": 410,
|
||||
"forks": 410,
|
||||
"watchers": 1140,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -220,13 +220,13 @@
|
|||
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T23:45:58Z",
|
||||
"updated_at": "2021-07-09T13:52:21Z",
|
||||
"updated_at": "2021-07-09T17:47:15Z",
|
||||
"pushed_at": "2021-07-05T08:54:06Z",
|
||||
"stargazers_count": 459,
|
||||
"watchers_count": 459,
|
||||
"stargazers_count": 461,
|
||||
"watchers_count": 461,
|
||||
"forks_count": 120,
|
||||
"forks": 120,
|
||||
"watchers": 459,
|
||||
"watchers": 461,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,20 +1,20 @@
|
|||
[
|
||||
{
|
||||
"id": 370771984,
|
||||
"name": "CVE-2021-20914",
|
||||
"full_name": "Shadow0ps\/CVE-2021-20914",
|
||||
"name": "CVE-2021-21974",
|
||||
"full_name": "Shadow0ps\/CVE-2021-21974",
|
||||
"owner": {
|
||||
"login": "Shadow0ps",
|
||||
"id": 6516174,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6516174?v=4",
|
||||
"html_url": "https:\/\/github.com\/Shadow0ps"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Shadow0ps\/CVE-2021-20914",
|
||||
"description": "POC for CVE2021-2091 VMWare ESXi RCE Exploit",
|
||||
"html_url": "https:\/\/github.com\/Shadow0ps\/CVE-2021-21974",
|
||||
"description": "POC for CVE-2021-21974 VMWare ESXi RCE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-25T17:14:38Z",
|
||||
"updated_at": "2021-06-02T02:28:20Z",
|
||||
"pushed_at": "2021-05-31T17:29:25Z",
|
||||
"updated_at": "2021-07-09T19:38:43Z",
|
||||
"pushed_at": "2021-07-09T19:38:41Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 4,
|
|
@ -59,13 +59,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-02T12:10:49Z",
|
||||
"updated_at": "2021-07-09T14:30:39Z",
|
||||
"updated_at": "2021-07-09T15:32:47Z",
|
||||
"pushed_at": "2021-07-02T12:17:50Z",
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 98,
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 99,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -220,13 +220,13 @@
|
|||
"description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-05T20:13:49Z",
|
||||
"updated_at": "2021-07-09T15:16:41Z",
|
||||
"pushed_at": "2021-07-08T12:00:11Z",
|
||||
"stargazers_count": 494,
|
||||
"watchers_count": 494,
|
||||
"updated_at": "2021-07-09T21:17:33Z",
|
||||
"pushed_at": "2021-07-09T15:49:23Z",
|
||||
"stargazers_count": 501,
|
||||
"watchers_count": 501,
|
||||
"forks_count": 59,
|
||||
"forks": 59,
|
||||
"watchers": 494,
|
||||
"watchers": 501,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
12
README.md
12
README.md
|
@ -406,9 +406,6 @@ Cross-site scripting vulnerability in EC-CUBE 4.0.0 to 4.0.5 allows a remote att
|
|||
|
||||
- [s-index/CVE-2021-20717](https://github.com/s-index/CVE-2021-20717)
|
||||
|
||||
### CVE-2021-20914
|
||||
- [Shadow0ps/CVE-2021-20914](https://github.com/Shadow0ps/CVE-2021-20914)
|
||||
|
||||
### CVE-2021-21014 (2021-02-11)
|
||||
|
||||
<code>
|
||||
|
@ -585,6 +582,14 @@ The vSphere Client (HTML5) contains an SSRF (Server Side Request Forgery) vulner
|
|||
|
||||
- [freakanonymous/CVE-2021-21973-Automateme](https://github.com/freakanonymous/CVE-2021-21973-Automateme)
|
||||
|
||||
### CVE-2021-21974 (2021-02-24)
|
||||
|
||||
<code>
|
||||
OpenSLP as used in ESXi (7.0 before ESXi70U1c-17325551, 6.7 before ESXi670-202102401-SG, 6.5 before ESXi650-202102101-SG) has a heap-overflow vulnerability. A malicious actor residing within the same network segment as ESXi who has access to port 427 may be able to trigger the heap-overflow issue in OpenSLP service resulting in remote code execution.
|
||||
</code>
|
||||
|
||||
- [Shadow0ps/CVE-2021-21974](https://github.com/Shadow0ps/CVE-2021-21974)
|
||||
|
||||
### CVE-2021-21975 (2021-03-31)
|
||||
|
||||
<code>
|
||||
|
@ -7039,6 +7044,7 @@ The ES File Explorer File Manager application through 4.1.9.7.4 for Android allo
|
|||
- [N3H4L/CVE-2019-6447](https://github.com/N3H4L/CVE-2019-6447)
|
||||
- [sidhawkss/ES-File-Explorer-Vulnerability-on-port-59777](https://github.com/sidhawkss/ES-File-Explorer-Vulnerability-on-port-59777)
|
||||
- [mcmahonr/cve-2019-6447](https://github.com/mcmahonr/cve-2019-6447)
|
||||
- [3hydraking/CVE-2019-6447](https://github.com/3hydraking/CVE-2019-6447)
|
||||
|
||||
### CVE-2019-6453 (2019-02-18)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue