mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2021/11/05 12:13:00
This commit is contained in:
parent
abd6a72e91
commit
965fd4d7e3
37 changed files with 420 additions and 127 deletions
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2019-10-13T12:23:02Z",
|
||||
"stargazers_count": 372,
|
||||
"watchers_count": 372,
|
||||
"forks_count": 143,
|
||||
"forks_count": 144,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -31,7 +31,7 @@
|
|||
"vulnerable-container"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 143,
|
||||
"forks": 144,
|
||||
"watchers": 372,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2016-4437-Shiro反序列化爆破模块和key,命令执行,反弹shell的脚本",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-27T05:02:04Z",
|
||||
"updated_at": "2021-09-29T03:14:37Z",
|
||||
"updated_at": "2021-11-05T09:07:43Z",
|
||||
"pushed_at": "2020-06-27T10:17:43Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 45,
|
||||
"watchers": 46,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -98,12 +98,12 @@
|
|||
"pushed_at": "2020-12-08T15:39:24Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 14,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"forks": 15,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -67,17 +67,17 @@
|
|||
"description": "Arbitrary code execution with kernel privileges using CVE-2018-8897.",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-13T19:34:17Z",
|
||||
"updated_at": "2021-10-14T11:49:31Z",
|
||||
"updated_at": "2021-11-05T09:02:54Z",
|
||||
"pushed_at": "2018-05-18T12:26:53Z",
|
||||
"stargazers_count": 395,
|
||||
"watchers_count": 395,
|
||||
"stargazers_count": 394,
|
||||
"watchers_count": 394,
|
||||
"forks_count": 111,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 111,
|
||||
"watchers": 395,
|
||||
"watchers": 394,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1705,17 +1705,17 @@
|
|||
"description": "Proof of concept for CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T16:53:54Z",
|
||||
"updated_at": "2021-11-03T04:07:06Z",
|
||||
"updated_at": "2021-11-05T06:11:03Z",
|
||||
"pushed_at": "2019-09-03T20:50:28Z",
|
||||
"stargazers_count": 1087,
|
||||
"watchers_count": 1087,
|
||||
"stargazers_count": 1088,
|
||||
"watchers_count": 1088,
|
||||
"forks_count": 358,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 358,
|
||||
"watchers": 1087,
|
||||
"watchers": 1088,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2888,17 +2888,17 @@
|
|||
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-21T02:22:29Z",
|
||||
"updated_at": "2021-10-29T15:30:23Z",
|
||||
"updated_at": "2021-11-05T07:43:28Z",
|
||||
"pushed_at": "2020-01-21T03:15:41Z",
|
||||
"stargazers_count": 235,
|
||||
"watchers_count": 235,
|
||||
"stargazers_count": 238,
|
||||
"watchers_count": 238,
|
||||
"forks_count": 64,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 64,
|
||||
"watchers": 235,
|
||||
"watchers": 238,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "CVE-2019-1040 with Kerberos delegation",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-18T12:10:26Z",
|
||||
"updated_at": "2021-09-22T02:06:10Z",
|
||||
"updated_at": "2021-11-05T06:24:50Z",
|
||||
"pushed_at": "2021-06-18T18:43:46Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 27,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2020-06-13T17:40:14Z",
|
||||
"stargazers_count": 595,
|
||||
"watchers_count": 595,
|
||||
"forks_count": 83,
|
||||
"forks_count": 84,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -30,7 +30,7 @@
|
|||
"sandbox-escape"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 83,
|
||||
"forks": 84,
|
||||
"watchers": 595,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -94,17 +94,17 @@
|
|||
"description": "CVE 2019-2215 Android Binder Use After Free",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-16T11:27:44Z",
|
||||
"updated_at": "2021-08-07T17:29:25Z",
|
||||
"updated_at": "2021-11-05T08:01:58Z",
|
||||
"pushed_at": "2020-03-16T07:20:14Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"forks_count": 13,
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 62,
|
||||
"forks": 14,
|
||||
"watchers": 63,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Support ALL Windows Version",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-16T08:57:51Z",
|
||||
"updated_at": "2021-11-02T22:04:45Z",
|
||||
"updated_at": "2021-11-05T08:34:20Z",
|
||||
"pushed_at": "2020-09-11T07:38:22Z",
|
||||
"stargazers_count": 575,
|
||||
"watchers_count": 575,
|
||||
"stargazers_count": 576,
|
||||
"watchers_count": 576,
|
||||
"forks_count": 151,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 151,
|
||||
"watchers": 575,
|
||||
"watchers": 576,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2020-12-08T15:39:24Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 14,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"forks": 15,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -614,17 +614,17 @@
|
|||
"description": "Test script for CVE-2020-1472 for both RPC\/TCP and RPC\/SMB",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-17T16:53:17Z",
|
||||
"updated_at": "2021-10-31T21:22:12Z",
|
||||
"updated_at": "2021-11-05T12:00:12Z",
|
||||
"pushed_at": "2021-06-18T18:44:06Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 45,
|
||||
"watchers": 46,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2020-15999",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-28T16:16:25Z",
|
||||
"updated_at": "2021-11-01T19:13:21Z",
|
||||
"updated_at": "2021-11-05T08:45:13Z",
|
||||
"pushed_at": "2021-11-01T19:13:18Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 9,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 27,
|
||||
"forks": 10,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -88,17 +88,17 @@
|
|||
"description": "how detect CVE-2020-2551 poc exploit python Weblogic RCE with IIOP",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-19T13:01:32Z",
|
||||
"updated_at": "2021-11-01T07:35:48Z",
|
||||
"updated_at": "2021-11-05T11:55:24Z",
|
||||
"pushed_at": "2021-10-29T08:55:29Z",
|
||||
"stargazers_count": 164,
|
||||
"watchers_count": 164,
|
||||
"stargazers_count": 165,
|
||||
"watchers_count": 165,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 164,
|
||||
"watchers": 165,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -140,17 +140,17 @@
|
|||
"description": "Proof of Concept Exploit for vCenter CVE-2021-21972",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T16:31:34Z",
|
||||
"updated_at": "2021-11-05T05:42:31Z",
|
||||
"updated_at": "2021-11-05T09:43:50Z",
|
||||
"pushed_at": "2021-02-25T16:05:02Z",
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"stargazers_count": 163,
|
||||
"watchers_count": 163,
|
||||
"forks_count": 61,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 61,
|
||||
"watchers": 158,
|
||||
"watchers": 163,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -179,12 +179,12 @@
|
|||
"pushed_at": "2021-09-28T21:08:21Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 15,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"forks": 14,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -121,10 +121,10 @@
|
|||
"description": "CVE-2021-22205& GitLab CE\/EE RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-29T04:30:45Z",
|
||||
"updated_at": "2021-11-05T02:27:11Z",
|
||||
"updated_at": "2021-11-05T06:49:50Z",
|
||||
"pushed_at": "2021-10-29T04:31:15Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -133,7 +133,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 52,
|
||||
"watchers": 53,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -235,14 +235,14 @@
|
|||
"pushed_at": "2021-11-04T12:49:58Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2021-22205"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,11 +13,11 @@
|
|||
"description": "Atlassian Jira Server\/Data Center 8.4.0 - Arbitrary File read (CVE-2021-26086)",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-05T14:09:52Z",
|
||||
"updated_at": "2021-10-18T06:46:14Z",
|
||||
"updated_at": "2021-11-05T07:00:15Z",
|
||||
"pushed_at": "2021-10-12T05:16:48Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -26,8 +26,8 @@
|
|||
"jira"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1158,17 +1158,17 @@
|
|||
"description": "CVE-2021-3156 - Sudo Baron Samedit",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-29T06:29:26Z",
|
||||
"updated_at": "2021-10-29T08:09:55Z",
|
||||
"updated_at": "2021-11-05T06:53:38Z",
|
||||
"pushed_at": "2021-08-11T15:52:19Z",
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 106,
|
||||
"watchers": 107,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -121,17 +121,17 @@
|
|||
"description": "CVE-2021-33909 Sequoia",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-02T04:51:54Z",
|
||||
"updated_at": "2021-10-07T12:22:54Z",
|
||||
"updated_at": "2021-11-05T09:30:37Z",
|
||||
"pushed_at": "2021-09-02T04:52:19Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 26,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -273,12 +273,12 @@
|
|||
"pushed_at": "2021-08-20T01:54:22Z",
|
||||
"stargazers_count": 647,
|
||||
"watchers_count": 647,
|
||||
"forks_count": 92,
|
||||
"forks_count": 93,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 92,
|
||||
"forks": 93,
|
||||
"watchers": 647,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-24T18:50:17Z",
|
||||
"updated_at": "2021-11-04T20:20:36Z",
|
||||
"updated_at": "2021-11-05T08:22:10Z",
|
||||
"pushed_at": "2021-08-25T19:26:21Z",
|
||||
"stargazers_count": 184,
|
||||
"watchers_count": 184,
|
||||
"stargazers_count": 186,
|
||||
"watchers_count": 186,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"watchers": 184,
|
||||
"watchers": 186,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2021-36260",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-18T06:40:48Z",
|
||||
"updated_at": "2021-11-04T02:14:17Z",
|
||||
"updated_at": "2021-11-05T10:13:53Z",
|
||||
"pushed_at": "2021-10-27T15:40:38Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -40,17 +40,17 @@
|
|||
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-27T15:51:12Z",
|
||||
"updated_at": "2021-11-04T23:01:25Z",
|
||||
"updated_at": "2021-11-05T09:46:06Z",
|
||||
"pushed_at": "2021-10-28T06:37:37Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 40,
|
||||
"watchers": 46,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,29 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 424810404,
|
||||
"id": 424814670,
|
||||
"name": "TFC-Chrome-v8-bug-CVE-2021-38001-poc",
|
||||
"full_name": "maldiohead\/TFC-Chrome-v8-bug-CVE-2021-38001-poc",
|
||||
"full_name": "Peterpan0927\/TFC-Chrome-v8-bug-CVE-2021-38001-poc",
|
||||
"owner": {
|
||||
"login": "maldiohead",
|
||||
"id": 23315692,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23315692?v=4",
|
||||
"html_url": "https:\/\/github.com\/maldiohead"
|
||||
"login": "Peterpan0927",
|
||||
"id": 26504662,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26504662?v=4",
|
||||
"html_url": "https:\/\/github.com\/Peterpan0927"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/maldiohead\/TFC-Chrome-v8-bug-CVE-2021-38001-poc",
|
||||
"html_url": "https:\/\/github.com\/Peterpan0927\/TFC-Chrome-v8-bug-CVE-2021-38001-poc",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-11-05T02:58:15Z",
|
||||
"updated_at": "2021-11-05T05:40:41Z",
|
||||
"pushed_at": "2021-11-05T03:18:48Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"created_at": "2021-11-05T03:18:46Z",
|
||||
"updated_at": "2021-11-05T09:42:16Z",
|
||||
"pushed_at": "2021-11-05T03:17:58Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 8,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -44,12 +44,12 @@
|
|||
"pushed_at": "2021-10-24T10:21:12Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -229,17 +229,17 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2021-11-05T03:29:10Z",
|
||||
"updated_at": "2021-11-05T08:23:51Z",
|
||||
"pushed_at": "2021-09-11T09:50:26Z",
|
||||
"stargazers_count": 1288,
|
||||
"watchers_count": 1288,
|
||||
"forks_count": 416,
|
||||
"stargazers_count": 1289,
|
||||
"watchers_count": 1289,
|
||||
"forks_count": 417,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 416,
|
||||
"watchers": 1288,
|
||||
"forks": 417,
|
||||
"watchers": 1289,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -553,10 +553,10 @@
|
|||
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-15T22:34:35Z",
|
||||
"updated_at": "2021-11-02T17:45:51Z",
|
||||
"updated_at": "2021-11-05T09:48:21Z",
|
||||
"pushed_at": "2021-10-12T23:05:07Z",
|
||||
"stargazers_count": 485,
|
||||
"watchers_count": 485,
|
||||
"stargazers_count": 486,
|
||||
"watchers_count": 486,
|
||||
"forks_count": 102,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -570,7 +570,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 102,
|
||||
"watchers": 485,
|
||||
"watchers": 486,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-16T16:17:44Z",
|
||||
"updated_at": "2021-11-03T12:09:31Z",
|
||||
"updated_at": "2021-11-05T09:24:41Z",
|
||||
"pushed_at": "2021-10-24T21:01:29Z",
|
||||
"stargazers_count": 310,
|
||||
"watchers_count": 310,
|
||||
"stargazers_count": 311,
|
||||
"watchers_count": 311,
|
||||
"forks_count": 68,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 68,
|
||||
"watchers": 310,
|
||||
"watchers": 311,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -67,8 +67,8 @@
|
|||
"description": "My exploit for CVE-2021-40449, a Windows LPE via a UAF in win32kfull!GreResetDCInternal.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-25T04:58:49Z",
|
||||
"updated_at": "2021-11-03T14:44:03Z",
|
||||
"pushed_at": "2021-10-25T06:32:34Z",
|
||||
"updated_at": "2021-11-05T06:54:12Z",
|
||||
"pushed_at": "2021-11-05T06:54:10Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 7,
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "CVE-2021-42662 - Stored Cross-Site Scripting vulnerability in the Online event booking and reservation system. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-03T17:51:55Z",
|
||||
"updated_at": "2021-11-04T04:51:19Z",
|
||||
"pushed_at": "2021-11-03T20:08:02Z",
|
||||
"updated_at": "2021-11-05T10:51:07Z",
|
||||
"pushed_at": "2021-11-05T10:51:04Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
|
|
29
2021/CVE-2021-42663.json
Normal file
29
2021/CVE-2021-42663.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 424343690,
|
||||
"name": "CVE-2021-42663",
|
||||
"full_name": "TheHackingRabbi\/CVE-2021-42663",
|
||||
"owner": {
|
||||
"login": "TheHackingRabbi",
|
||||
"id": 93016131,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42663",
|
||||
"description": "CVE-2021-42663 - HTML Injection vulnerability in the Online event booking and reservation system. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-03T18:49:28Z",
|
||||
"updated_at": "2021-11-05T10:53:32Z",
|
||||
"pushed_at": "2021-11-05T10:53:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2021/CVE-2021-42664.json
Normal file
29
2021/CVE-2021-42664.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 424354876,
|
||||
"name": "CVE-2021-42664",
|
||||
"full_name": "TheHackingRabbi\/CVE-2021-42664",
|
||||
"owner": {
|
||||
"login": "TheHackingRabbi",
|
||||
"id": 93016131,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42664",
|
||||
"description": " CVE-2021-42664 - Stored Cross-Site Scripting vulnerability in the Engineers online portal system.",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-03T19:29:57Z",
|
||||
"updated_at": "2021-11-05T10:44:41Z",
|
||||
"pushed_at": "2021-11-03T20:12:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2021/CVE-2021-42665.json
Normal file
29
2021/CVE-2021-42665.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 424362612,
|
||||
"name": "CVE-2021-42665",
|
||||
"full_name": "TheHackingRabbi\/CVE-2021-42665",
|
||||
"owner": {
|
||||
"login": "TheHackingRabbi",
|
||||
"id": 93016131,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42665",
|
||||
"description": "CVE-2021-42665 - SQL Injection authentication bypass vulnerability in the Engineers online portal system. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-03T19:58:58Z",
|
||||
"updated_at": "2021-11-05T10:45:08Z",
|
||||
"pushed_at": "2021-11-03T20:13:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2021/CVE-2021-42666.json
Normal file
29
2021/CVE-2021-42666.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 424367205,
|
||||
"name": "CVE-2021-42666",
|
||||
"full_name": "TheHackingRabbi\/CVE-2021-42666",
|
||||
"owner": {
|
||||
"login": "TheHackingRabbi",
|
||||
"id": 93016131,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42666",
|
||||
"description": "CVE-2021-42666 - SQL Injection vulnerability in the Engineers online portal system. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-03T20:14:58Z",
|
||||
"updated_at": "2021-11-05T10:45:42Z",
|
||||
"pushed_at": "2021-11-03T20:29:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2021/CVE-2021-42667.json
Normal file
29
2021/CVE-2021-42667.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 424371514,
|
||||
"name": "CVE-2021-42667",
|
||||
"full_name": "TheHackingRabbi\/CVE-2021-42667",
|
||||
"owner": {
|
||||
"login": "TheHackingRabbi",
|
||||
"id": 93016131,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42667",
|
||||
"description": "CVE-2021-42667 - SQL Injection vulnerability in the Online event booking and reservation system.",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-03T20:31:30Z",
|
||||
"updated_at": "2021-11-05T10:51:44Z",
|
||||
"pushed_at": "2021-11-05T10:51:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2021/CVE-2021-42668.json
Normal file
29
2021/CVE-2021-42668.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 424374708,
|
||||
"name": "CVE-2021-42668",
|
||||
"full_name": "TheHackingRabbi\/CVE-2021-42668",
|
||||
"owner": {
|
||||
"login": "TheHackingRabbi",
|
||||
"id": 93016131,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42668",
|
||||
"description": "CVE-2021-42668 - SQL Injection vulnerability in the Engineers online portal system. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-03T20:43:30Z",
|
||||
"updated_at": "2021-11-05T10:46:57Z",
|
||||
"pushed_at": "2021-11-03T20:50:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2021/CVE-2021-42669.json
Normal file
29
2021/CVE-2021-42669.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 424376895,
|
||||
"name": "CVE-2021-42669",
|
||||
"full_name": "TheHackingRabbi\/CVE-2021-42669",
|
||||
"owner": {
|
||||
"login": "TheHackingRabbi",
|
||||
"id": 93016131,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42669",
|
||||
"description": "CVE-2021-42669 - Remote code execution via unrestricted file upload vulnerability in the Engineers online portal system.",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-03T20:52:08Z",
|
||||
"updated_at": "2021-11-05T10:47:25Z",
|
||||
"pushed_at": "2021-11-03T21:23:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2021/CVE-2021-42670.json
Normal file
29
2021/CVE-2021-42670.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 424385119,
|
||||
"name": "CVE-2021-42670",
|
||||
"full_name": "TheHackingRabbi\/CVE-2021-42670",
|
||||
"owner": {
|
||||
"login": "TheHackingRabbi",
|
||||
"id": 93016131,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42670",
|
||||
"description": "CVE-2021-42670 - SQL Injection vulnerability in the Engineers online portal system. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-03T21:25:43Z",
|
||||
"updated_at": "2021-11-05T10:48:07Z",
|
||||
"pushed_at": "2021-11-03T21:32:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2021/CVE-2021-42671.json
Normal file
29
2021/CVE-2021-42671.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 424387160,
|
||||
"name": "CVE-2021-42671",
|
||||
"full_name": "TheHackingRabbi\/CVE-2021-42671",
|
||||
"owner": {
|
||||
"login": "TheHackingRabbi",
|
||||
"id": 93016131,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93016131?v=4",
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TheHackingRabbi\/CVE-2021-42671",
|
||||
"description": "CVE-2021-42671 - Broken access control vulnerability in the Engineers online portal system. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-03T21:34:23Z",
|
||||
"updated_at": "2021-11-05T10:48:51Z",
|
||||
"pushed_at": "2021-11-03T21:41:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
36
README.md
36
README.md
|
@ -2531,7 +2531,7 @@ Inappropriate implementation in Sandbox in Google Chrome prior to 94.0.4606.81 a
|
|||
- [ZeusBox/CVE-2021-37980](https://github.com/ZeusBox/CVE-2021-37980)
|
||||
|
||||
### CVE-2021-38001
|
||||
- [maldiohead/TFC-Chrome-v8-bug-CVE-2021-38001-poc](https://github.com/maldiohead/TFC-Chrome-v8-bug-CVE-2021-38001-poc)
|
||||
- [Peterpan0927/TFC-Chrome-v8-bug-CVE-2021-38001-poc](https://github.com/Peterpan0927/TFC-Chrome-v8-bug-CVE-2021-38001-poc)
|
||||
|
||||
### CVE-2021-38149 (2021-08-06)
|
||||
|
||||
|
@ -3147,9 +3147,41 @@ An issue was discovered in the Bidirectional Algorithm in the Unicode Specificat
|
|||
- [hffaust/CVE-2021-42574_and_CVE-2021-42694](https://github.com/hffaust/CVE-2021-42574_and_CVE-2021-42694)
|
||||
- [js-on/CVE-2021-42574](https://github.com/js-on/CVE-2021-42574)
|
||||
|
||||
### CVE-2021-42662
|
||||
### CVE-2021-42662 (2021-11-05)
|
||||
|
||||
<code>
|
||||
A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP/MySQL via the Holiday reason parameter. An attacker can leverage this vulnerability in order to run javascript commands on the web server surfers behalf, which can lead to cookie stealing and more.
|
||||
</code>
|
||||
|
||||
- [TheHackingRabbi/CVE-2021-42662](https://github.com/TheHackingRabbi/CVE-2021-42662)
|
||||
|
||||
### CVE-2021-42663
|
||||
- [TheHackingRabbi/CVE-2021-42663](https://github.com/TheHackingRabbi/CVE-2021-42663)
|
||||
|
||||
### CVE-2021-42664
|
||||
- [TheHackingRabbi/CVE-2021-42664](https://github.com/TheHackingRabbi/CVE-2021-42664)
|
||||
|
||||
### CVE-2021-42665
|
||||
- [TheHackingRabbi/CVE-2021-42665](https://github.com/TheHackingRabbi/CVE-2021-42665)
|
||||
|
||||
### CVE-2021-42666
|
||||
- [TheHackingRabbi/CVE-2021-42666](https://github.com/TheHackingRabbi/CVE-2021-42666)
|
||||
|
||||
### CVE-2021-42667
|
||||
- [TheHackingRabbi/CVE-2021-42667](https://github.com/TheHackingRabbi/CVE-2021-42667)
|
||||
|
||||
### CVE-2021-42668
|
||||
- [TheHackingRabbi/CVE-2021-42668](https://github.com/TheHackingRabbi/CVE-2021-42668)
|
||||
|
||||
### CVE-2021-42669
|
||||
- [TheHackingRabbi/CVE-2021-42669](https://github.com/TheHackingRabbi/CVE-2021-42669)
|
||||
|
||||
### CVE-2021-42670
|
||||
- [TheHackingRabbi/CVE-2021-42670](https://github.com/TheHackingRabbi/CVE-2021-42670)
|
||||
|
||||
### CVE-2021-42671
|
||||
- [TheHackingRabbi/CVE-2021-42671](https://github.com/TheHackingRabbi/CVE-2021-42671)
|
||||
|
||||
### CVE-2021-42694 (2021-10-31)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Add table
Reference in a new issue