mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/05/04 00:11:21
This commit is contained in:
parent
40c039c72d
commit
96d89b2dcc
23 changed files with 137 additions and 80 deletions
|
@ -13,8 +13,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-05-01T14:04:58Z",
|
||||
"updated_at": "2021-05-02T15:00:07Z",
|
||||
"pushed_at": "2021-05-02T15:00:05Z",
|
||||
"updated_at": "2021-05-03T13:47:54Z",
|
||||
"pushed_at": "2021-05-03T13:47:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-13T13:40:10Z",
|
||||
"updated_at": "2021-04-09T17:09:52Z",
|
||||
"updated_at": "2021-05-03T10:39:10Z",
|
||||
"pushed_at": "2018-11-14T02:40:24Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,8 +36,8 @@
|
|||
"description": "GitLab 11.4.7 CE RCE exploit with different reverse shells. CVE-2018-19571 + CVE-2018-19585",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-11T11:23:37Z",
|
||||
"updated_at": "2021-04-14T23:35:21Z",
|
||||
"pushed_at": "2021-04-14T23:35:19Z",
|
||||
"updated_at": "2021-05-03T12:59:20Z",
|
||||
"pushed_at": "2021-05-03T12:59:18Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-04-29T16:04:12Z",
|
||||
"updated_at": "2021-05-03T14:50:42Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2547,
|
||||
"watchers_count": 2547,
|
||||
"stargazers_count": 2548,
|
||||
"watchers_count": 2548,
|
||||
"forks_count": 741,
|
||||
"forks": 741,
|
||||
"watchers": 2547,
|
||||
"watchers": 2548,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-12T06:02:06Z",
|
||||
"updated_at": "2021-05-02T14:33:44Z",
|
||||
"updated_at": "2021-05-03T09:15:02Z",
|
||||
"pushed_at": "2019-05-09T21:34:26Z",
|
||||
"stargazers_count": 560,
|
||||
"watchers_count": 560,
|
||||
"stargazers_count": 561,
|
||||
"watchers_count": 561,
|
||||
"forks_count": 131,
|
||||
"forks": 131,
|
||||
"watchers": 560,
|
||||
"watchers": 561,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -435,5 +435,28 @@
|
|||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 363882684,
|
||||
"name": "proxylogon",
|
||||
"full_name": "ann0906\/proxylogon",
|
||||
"owner": {
|
||||
"login": "ann0906",
|
||||
"id": 82447420,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82447420?v=4",
|
||||
"html_url": "https:\/\/github.com\/ann0906"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ann0906\/proxylogon",
|
||||
"description": "事件: 微軟(Microsoft)上周公布了修補遭到駭客攻擊的 Exchange Server 漏洞,全球恐有數萬個組織受到影響。網域與被入侵的Exchange郵件伺服器有關,而這臺伺服器後來被駭客當作C&C中繼站使用,導致接下來發生加密攻擊事故。 嚴重性: 全球企業普遍使用微軟生態系執行日常業務,若遭受駭客攻擊,將造成用戶機敏資料外洩並導致極大損失。雖然微軟已推出更新補釘,但阿戴爾強調這尚未去除儲存在受害伺服器內的後門殼層(webshell),因此就算尚未受到攻擊的企業可以免於被駭風險,駭客仍有時間入侵已被駭的伺服器留下「定時炸彈」。 從2020年開始,美國便不斷指控中國入侵多家醫藥公司及學術單位,試圖竊取疫苗研發機密,這次事件很可能將使中美之間的關係進一步惡化。至於華為、TikTok等中國服務是否會受到這次駭客事件波及,則暫時還不明朗。 漏洞通報程序: 在2年前,曾經拿下資安圈漏洞奧斯卡獎Pwnie Awards「最佳伺服器漏洞獎」戴夫寇爾首席資安研究員Orange Tsai(蔡政達),漏洞通報記錄不勝枚舉,後來因為針對企業常用的SSL VPN進行漏洞研究與通報,更是在全球資安圈聲名大噪。 不過,在今年3月2日卻發生讓Orange Tsai錯愕不已的事情。那就是,他在今年一月跟微軟通報的2個Exchange漏洞,微軟原訂在3月9日對外釋出修補程式,卻突然提前一週,在3月2日便緊急釋出修補程式。原來是因為,在2月26日到2月28日,這個週五下班後到週末這段期間,全球各地發生許多利用微軟Exchange漏洞發動攻擊的資安事件。 攻擊本質: 有人在網路上大量掃描微軟於本月修補的CVE-2020-0688安全漏洞,該漏洞攸關Microsoft Exchange伺服器,呼籲Exchange用戶應儘速修補。 CVE-2020-0688漏洞肇因於Exchange伺服器在安裝時沒能妥善建立唯一金鑰,將允許具備該知識及信箱的授權用戶以系統權限傳遞任意物件,屬於遠端程式攻擊漏洞,該漏洞影響Microsoft Exchange Server 2010 SP3、Microsoft Exchange Server 2013、Microsoft Exchange Server 2016與Microsoft Exchange Server 2019,但只被微軟列為重要(Important)等級的風險。",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-03T09:44:25Z",
|
||||
"updated_at": "2021-05-03T09:52:40Z",
|
||||
"pushed_at": "2021-05-03T09:44:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1324,13 +1324,13 @@
|
|||
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-10T16:44:39Z",
|
||||
"updated_at": "2021-05-01T22:22:19Z",
|
||||
"updated_at": "2021-05-03T10:47:42Z",
|
||||
"pushed_at": "2021-01-15T19:21:25Z",
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 103,
|
||||
"watchers": 104,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -178,8 +178,8 @@
|
|||
"pushed_at": "2020-07-16T18:32:04Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2021-05-02T08:59:56Z",
|
||||
"updated_at": "2021-05-03T10:05:02Z",
|
||||
"pushed_at": "2020-10-21T12:10:28Z",
|
||||
"stargazers_count": 1270,
|
||||
"watchers_count": 1270,
|
||||
"stargazers_count": 1271,
|
||||
"watchers_count": 1271,
|
||||
"forks_count": 293,
|
||||
"forks": 293,
|
||||
"watchers": 1270,
|
||||
"watchers": 1271,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -339,8 +339,8 @@
|
|||
"pushed_at": "2020-09-16T15:03:32Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 46,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-04-29T16:04:12Z",
|
||||
"updated_at": "2021-05-03T14:50:42Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2547,
|
||||
"watchers_count": 2547,
|
||||
"stargazers_count": 2548,
|
||||
"watchers_count": 2548,
|
||||
"forks_count": 741,
|
||||
"forks": 741,
|
||||
"watchers": 2547,
|
||||
"watchers": 2548,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-1938",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T16:32:52Z",
|
||||
"updated_at": "2021-04-16T02:30:59Z",
|
||||
"updated_at": "2021-05-03T14:25:53Z",
|
||||
"pushed_at": "2020-02-25T02:04:16Z",
|
||||
"stargazers_count": 225,
|
||||
"watchers_count": 225,
|
||||
"stargazers_count": 224,
|
||||
"watchers_count": 224,
|
||||
"forks_count": 95,
|
||||
"forks": 95,
|
||||
"watchers": 225,
|
||||
"watchers": 224,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-01-12T10:11:42Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 26,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-03-02T00:27:47Z",
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 118,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-03-03T03:52:10Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 56,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -795,13 +795,13 @@
|
|||
"description": "Proof-of-concept exploit for CVE-2021-26855 and CVE-2021-27065. Unauthenticated RCE in Exchange.",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-24T01:12:48Z",
|
||||
"updated_at": "2021-05-01T11:27:51Z",
|
||||
"updated_at": "2021-05-03T14:39:43Z",
|
||||
"pushed_at": "2021-03-24T01:25:05Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2021/CVE-2021-28482.json
Normal file
25
2021/CVE-2021-28482.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 363946586,
|
||||
"name": "CVE-2021-28482-Exchange-POC",
|
||||
"full_name": "Shadow0ps\/CVE-2021-28482-Exchange-POC",
|
||||
"owner": {
|
||||
"login": "Shadow0ps",
|
||||
"id": 6516174,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6516174?v=4",
|
||||
"html_url": "https:\/\/github.com\/Shadow0ps"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Shadow0ps\/CVE-2021-28482-Exchange-POC",
|
||||
"description": "POC from TestANull for CVE-2021-28482 on Exchange Server",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-03T13:54:36Z",
|
||||
"updated_at": "2021-05-03T14:29:51Z",
|
||||
"pushed_at": "2021-05-03T14:29:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -335,13 +335,13 @@
|
|||
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T03:22:04Z",
|
||||
"updated_at": "2021-04-28T05:19:44Z",
|
||||
"updated_at": "2021-05-03T10:42:10Z",
|
||||
"pushed_at": "2021-02-08T03:42:50Z",
|
||||
"stargazers_count": 384,
|
||||
"watchers_count": 384,
|
||||
"forks_count": 105,
|
||||
"forks": 105,
|
||||
"watchers": 384,
|
||||
"stargazers_count": 385,
|
||||
"watchers_count": 385,
|
||||
"forks_count": 107,
|
||||
"forks": 107,
|
||||
"watchers": 385,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -657,13 +657,13 @@
|
|||
"description": "Root shell PoC for CVE-2021-3156",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-03T19:57:56Z",
|
||||
"updated_at": "2021-04-19T14:02:05Z",
|
||||
"updated_at": "2021-05-03T10:49:59Z",
|
||||
"pushed_at": "2021-02-03T22:28:14Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 38,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 39,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -703,13 +703,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-06T21:16:11Z",
|
||||
"updated_at": "2021-03-27T00:25:00Z",
|
||||
"updated_at": "2021-05-03T10:49:54Z",
|
||||
"pushed_at": "2021-02-06T21:20:04Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -933,13 +933,13 @@
|
|||
"description": "Exploit generator for sudo CVE-2021-3156",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-19T14:06:09Z",
|
||||
"updated_at": "2021-03-25T23:52:42Z",
|
||||
"updated_at": "2021-05-03T10:22:40Z",
|
||||
"pushed_at": "2021-03-25T23:52:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2021-04-24T22:06:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2021-04-24T22:08:16Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2021-04-24T22:05:36Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-04-26T18:21:42Z",
|
||||
"stargazers_count": 193,
|
||||
"watchers_count": 193,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 193,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Ubuntu OverlayFS Local Privesc",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-19T20:07:01Z",
|
||||
"updated_at": "2021-05-01T07:27:43Z",
|
||||
"updated_at": "2021-05-03T14:13:09Z",
|
||||
"pushed_at": "2021-04-20T00:46:14Z",
|
||||
"stargazers_count": 156,
|
||||
"watchers_count": 156,
|
||||
"stargazers_count": 157,
|
||||
"watchers_count": 157,
|
||||
"forks_count": 50,
|
||||
"forks": 50,
|
||||
"watchers": 156,
|
||||
"watchers": 157,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -861,6 +861,14 @@ Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is uni
|
|||
|
||||
- [ZephrFish/ExchangeRCE-CVE-2021-28480](https://github.com/ZephrFish/ExchangeRCE-CVE-2021-28480)
|
||||
|
||||
### CVE-2021-28482 (2021-04-13)
|
||||
|
||||
<code>
|
||||
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-28480, CVE-2021-28481, CVE-2021-28483.
|
||||
</code>
|
||||
|
||||
- [Shadow0ps/CVE-2021-28482-Exchange-POC](https://github.com/Shadow0ps/CVE-2021-28482-Exchange-POC)
|
||||
|
||||
### CVE-2021-29267 (2021-03-29)
|
||||
|
||||
<code>
|
||||
|
@ -1226,6 +1234,7 @@ A remote code execution vulnerability exists in Microsoft Exchange software when
|
|||
- [zyn3rgy/ecp_slap](https://github.com/zyn3rgy/ecp_slap)
|
||||
- [SLSteff/CVE-2020-0688-Scanner](https://github.com/SLSteff/CVE-2020-0688-Scanner)
|
||||
- [MrTiz9/CVE-2020-0688](https://github.com/MrTiz9/CVE-2020-0688)
|
||||
- [ann0906/proxylogon](https://github.com/ann0906/proxylogon)
|
||||
|
||||
### CVE-2020-0708 (2020-02-11)
|
||||
|
||||
|
|
Loading…
Reference in a new issue