mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2021/11/05 00:13:01
This commit is contained in:
parent
b39044af1c
commit
9bf7947267
38 changed files with 191 additions and 191 deletions
|
@ -1071,10 +1071,10 @@
|
|||
"description": "Shellshock exploit + vulnerable environment",
|
||||
"fork": false,
|
||||
"created_at": "2016-12-07T23:38:50Z",
|
||||
"updated_at": "2021-10-27T00:01:05Z",
|
||||
"updated_at": "2021-11-04T23:18:47Z",
|
||||
"pushed_at": "2017-10-30T22:46:11Z",
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"forks_count": 46,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1088,7 +1088,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 46,
|
||||
"watchers": 115,
|
||||
"watchers": 116,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container",
|
||||
"fork": false,
|
||||
"created_at": "2016-12-26T13:39:03Z",
|
||||
"updated_at": "2021-11-02T12:38:27Z",
|
||||
"updated_at": "2021-11-04T23:19:38Z",
|
||||
"pushed_at": "2019-10-13T12:23:02Z",
|
||||
"stargazers_count": 371,
|
||||
"watchers_count": 371,
|
||||
"stargazers_count": 372,
|
||||
"watchers_count": 372,
|
||||
"forks_count": 143,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 143,
|
||||
"watchers": 371,
|
||||
"watchers": 372,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "OpenSSH remote DOS exploit and vulnerable container",
|
||||
"fork": false,
|
||||
"created_at": "2016-12-09T15:22:38Z",
|
||||
"updated_at": "2021-09-05T09:06:50Z",
|
||||
"updated_at": "2021-11-04T23:23:51Z",
|
||||
"pushed_at": "2017-10-30T22:29:20Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 50,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2019-05-08T18:00:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2018-08-17T23:31:46Z",
|
||||
"stargazers_count": 163,
|
||||
"watchers_count": 163,
|
||||
"forks_count": 32,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"forks": 33,
|
||||
"watchers": 163,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2019-03-08T18:42:56Z",
|
||||
"stargazers_count": 202,
|
||||
"watchers_count": 202,
|
||||
"forks_count": 53,
|
||||
"forks_count": 54,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -26,7 +26,7 @@
|
|||
"webkit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 53,
|
||||
"forks": 54,
|
||||
"watchers": 202,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -94,10 +94,10 @@
|
|||
"description": "This repository provides a learning environment to understand how an Exim RCE exploit for CVE-2018-6789 works.",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-02T16:53:02Z",
|
||||
"updated_at": "2021-09-26T16:02:09Z",
|
||||
"updated_at": "2021-11-04T23:33:55Z",
|
||||
"pushed_at": "2020-03-03T07:57:30Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -119,7 +119,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1488,12 +1488,12 @@
|
|||
"pushed_at": "2019-06-22T21:48:45Z",
|
||||
"stargazers_count": 833,
|
||||
"watchers_count": 833,
|
||||
"forks_count": 252,
|
||||
"forks_count": 253,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 252,
|
||||
"forks": 253,
|
||||
"watchers": 833,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -2892,12 +2892,12 @@
|
|||
"pushed_at": "2020-01-21T03:15:41Z",
|
||||
"stargazers_count": 235,
|
||||
"watchers_count": 235,
|
||||
"forks_count": 63,
|
||||
"forks_count": 64,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 63,
|
||||
"forks": 64,
|
||||
"watchers": 235,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2020-06-13T17:40:14Z",
|
||||
"stargazers_count": 596,
|
||||
"watchers_count": 596,
|
||||
"forks_count": 84,
|
||||
"forks_count": 83,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -30,7 +30,7 @@
|
|||
"sandbox-escape"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 84,
|
||||
"forks": 83,
|
||||
"watchers": 596,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "Dockerfiles for CVE-2019-15107(webmin RCE) recurrence including v1.890 and v1.920 with Exp for each version.",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-22T08:48:07Z",
|
||||
"updated_at": "2019-08-29T11:15:41Z",
|
||||
"updated_at": "2021-11-04T23:41:54Z",
|
||||
"pushed_at": "2019-08-22T08:58:55Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2021-04-28T16:31:08Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"forks": 6,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-12T22:07:47Z",
|
||||
"updated_at": "2021-09-28T18:52:20Z",
|
||||
"updated_at": "2021-11-04T23:22:06Z",
|
||||
"pushed_at": "2019-02-20T15:35:34Z",
|
||||
"stargazers_count": 186,
|
||||
"watchers_count": 186,
|
||||
"stargazers_count": 187,
|
||||
"watchers_count": 187,
|
||||
"forks_count": 66,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 66,
|
||||
"watchers": 186,
|
||||
"watchers": 187,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -477,17 +477,17 @@
|
|||
"description": "Code sample for using exploit CVE-2019-5736 to mine bitcoin with no association to original container or user.",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-12T16:57:13Z",
|
||||
"updated_at": "2020-11-25T06:50:26Z",
|
||||
"updated_at": "2021-11-04T23:42:10Z",
|
||||
"pushed_at": "2019-12-12T16:58:18Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -112,33 +112,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 383619273,
|
||||
"name": "cve-2019-6447",
|
||||
"full_name": "mcmahonr\/cve-2019-6447",
|
||||
"owner": {
|
||||
"login": "mcmahonr",
|
||||
"id": 17996673,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17996673?v=4",
|
||||
"html_url": "https:\/\/github.com\/mcmahonr"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mcmahonr\/cve-2019-6447",
|
||||
"description": "Tool to take advantage of CVE-2019-6447",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-06T23:13:55Z",
|
||||
"updated_at": "2021-07-06T23:15:29Z",
|
||||
"pushed_at": "2021-07-06T23:26:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 384531590,
|
||||
"name": "CVE-2019-6447",
|
||||
|
|
|
@ -44,7 +44,7 @@
|
|||
"pushed_at": "2019-12-28T18:25:10Z",
|
||||
"stargazers_count": 211,
|
||||
"watchers_count": 211,
|
||||
"forks_count": 58,
|
||||
"forks_count": 57,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -55,7 +55,7 @@
|
|||
"remote-code-execution"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 58,
|
||||
"forks": 57,
|
||||
"watchers": 211,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-25T07:35:29Z",
|
||||
"updated_at": "2021-10-11T14:15:44Z",
|
||||
"updated_at": "2021-11-04T23:23:58Z",
|
||||
"pushed_at": "2020-06-25T07:49:34Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 53,
|
||||
"watchers": 54,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Study on CVE-2020-13401 vulnerability of containers in dockers older than 19.03.11",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-31T17:45:10Z",
|
||||
"updated_at": "2021-03-31T20:49:38Z",
|
||||
"updated_at": "2021-11-04T23:38:47Z",
|
||||
"pushed_at": "2021-03-31T20:47:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,17 +40,17 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2021-11-02T00:26:04Z",
|
||||
"updated_at": "2021-11-04T20:32:41Z",
|
||||
"pushed_at": "2020-10-21T12:10:28Z",
|
||||
"stargazers_count": 1359,
|
||||
"watchers_count": 1359,
|
||||
"stargazers_count": 1360,
|
||||
"watchers_count": 1360,
|
||||
"forks_count": 310,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 310,
|
||||
"watchers": 1359,
|
||||
"watchers": 1360,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -256,10 +256,10 @@
|
|||
"description": "Tool check: CVE-2021-41773, CVE-2021-42013, CVE-2020-17519",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-13T17:03:56Z",
|
||||
"updated_at": "2021-10-29T13:34:31Z",
|
||||
"updated_at": "2021-11-04T23:08:59Z",
|
||||
"pushed_at": "2021-10-14T21:11:44Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -270,7 +270,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 41,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "wpDiscuz 7.0.4 Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-13T23:10:19Z",
|
||||
"updated_at": "2021-10-02T04:07:08Z",
|
||||
"updated_at": "2021-11-04T22:29:30Z",
|
||||
"pushed_at": "2021-06-15T17:30:23Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Docker repository with a PoC for WP Code Snippets 2.13.3 (CVE-2020-8417)",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-06T00:03:14Z",
|
||||
"updated_at": "2021-04-18T18:19:55Z",
|
||||
"updated_at": "2021-11-04T23:35:19Z",
|
||||
"pushed_at": "2020-04-23T03:28:14Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -213,17 +213,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T11:03:13Z",
|
||||
"updated_at": "2021-10-25T19:33:38Z",
|
||||
"updated_at": "2021-11-04T22:54:52Z",
|
||||
"pushed_at": "2021-06-07T04:00:06Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 26,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -94,17 +94,17 @@
|
|||
"description": "Gitlab CE\/EE RCE 未授权远程代码执行漏洞 POC && EXP CVE-2021-22205",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-29T04:15:00Z",
|
||||
"updated_at": "2021-11-04T02:17:57Z",
|
||||
"updated_at": "2021-11-04T23:47:59Z",
|
||||
"pushed_at": "2021-11-04T02:17:54Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -121,10 +121,10 @@
|
|||
"description": "CVE-2021-22205& GitLab CE\/EE RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-29T04:30:45Z",
|
||||
"updated_at": "2021-11-04T17:25:13Z",
|
||||
"updated_at": "2021-11-04T22:55:02Z",
|
||||
"pushed_at": "2021-10-29T04:31:15Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -133,7 +133,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 47,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -67,17 +67,17 @@
|
|||
"description": "Gitlab CI Lint API未授权 SSRF漏洞 CVE-2021-22214",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-01T04:04:42Z",
|
||||
"updated_at": "2021-11-04T02:21:30Z",
|
||||
"updated_at": "2021-11-04T23:47:29Z",
|
||||
"pushed_at": "2021-11-04T02:21:28Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -148,17 +148,17 @@
|
|||
"description": "Confluence Server Webwork OGNL injection",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-01T07:15:17Z",
|
||||
"updated_at": "2021-11-03T09:10:26Z",
|
||||
"updated_at": "2021-11-04T22:29:40Z",
|
||||
"pushed_at": "2021-09-10T19:42:33Z",
|
||||
"stargazers_count": 240,
|
||||
"watchers_count": 240,
|
||||
"stargazers_count": 241,
|
||||
"watchers_count": 241,
|
||||
"forks_count": 61,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 61,
|
||||
"watchers": 240,
|
||||
"watchers": 241,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Directory Traversal in Afterlogic webmail aurora and pro",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-03T14:32:13Z",
|
||||
"updated_at": "2021-11-04T10:59:03Z",
|
||||
"updated_at": "2021-11-04T18:17:58Z",
|
||||
"pushed_at": "2021-11-04T10:59:00Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Google Chrome Use After Free vulnerability reported by S4E Team",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-29T12:53:13Z",
|
||||
"updated_at": "2021-11-02T14:42:10Z",
|
||||
"updated_at": "2021-11-04T23:42:02Z",
|
||||
"pushed_at": "2021-07-29T13:18:38Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -277,17 +277,17 @@
|
|||
"description": "Windows HTTP协议栈远程代码执行漏洞 CVE-2021-31166",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-27T05:56:45Z",
|
||||
"updated_at": "2021-11-04T02:23:14Z",
|
||||
"updated_at": "2021-11-04T23:47:22Z",
|
||||
"pushed_at": "2021-11-04T02:23:11Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1024,15 +1024,15 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-03-15T17:37:02Z",
|
||||
"updated_at": "2021-10-31T05:35:50Z",
|
||||
"pushed_at": "2021-07-23T15:46:37Z",
|
||||
"pushed_at": "2021-11-04T23:56:50Z",
|
||||
"stargazers_count": 383,
|
||||
"watchers_count": 383,
|
||||
"forks_count": 91,
|
||||
"forks_count": 92,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 91,
|
||||
"forks": 92,
|
||||
"watchers": 383,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for CVE-2021-34429 - Eclipse Jetty 11.0.5 Sensitive File Disclosure",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-03T09:13:12Z",
|
||||
"updated_at": "2021-11-04T11:12:24Z",
|
||||
"updated_at": "2021-11-04T23:40:57Z",
|
||||
"pushed_at": "2021-11-03T11:51:41Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-24T18:50:17Z",
|
||||
"updated_at": "2021-11-04T03:33:44Z",
|
||||
"updated_at": "2021-11-04T20:20:36Z",
|
||||
"pushed_at": "2021-08-25T19:26:21Z",
|
||||
"stargazers_count": 182,
|
||||
"watchers_count": 182,
|
||||
"stargazers_count": 184,
|
||||
"watchers_count": 184,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"watchers": 182,
|
||||
"watchers": 184,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,17 +40,17 @@
|
|||
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-27T15:51:12Z",
|
||||
"updated_at": "2021-11-04T14:31:20Z",
|
||||
"updated_at": "2021-11-04T23:01:25Z",
|
||||
"pushed_at": "2021-10-28T06:37:37Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 39,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-20T22:16:49Z",
|
||||
"updated_at": "2021-10-21T19:45:59Z",
|
||||
"updated_at": "2021-11-04T22:25:09Z",
|
||||
"pushed_at": "2021-09-14T01:42:57Z",
|
||||
"stargazers_count": 180,
|
||||
"watchers_count": 180,
|
||||
"stargazers_count": 181,
|
||||
"watchers_count": 181,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"watchers": 180,
|
||||
"watchers": 181,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -126,17 +126,17 @@
|
|||
"description": "PoC for CVE-2021-36934, which enables a standard user to be able to retrieve the SAM, Security, and Software Registry hives in Windows 10 version 1809 or newer",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-22T03:07:56Z",
|
||||
"updated_at": "2021-10-25T11:58:45Z",
|
||||
"updated_at": "2021-11-04T19:27:02Z",
|
||||
"pushed_at": "2021-07-22T04:17:47Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-18T02:02:43Z",
|
||||
"updated_at": "2021-10-23T05:55:02Z",
|
||||
"updated_at": "2021-11-04T23:44:09Z",
|
||||
"pushed_at": "2021-10-18T02:42:25Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -40,17 +40,17 @@
|
|||
"description": "CVE-2021-40438 exploit PoC with Docker setup.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-24T10:18:08Z",
|
||||
"updated_at": "2021-10-24T10:21:14Z",
|
||||
"updated_at": "2021-11-04T23:39:11Z",
|
||||
"pushed_at": "2021-10-24T10:21:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "Exploitation code for CVE-2021-40539",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-03T14:49:27Z",
|
||||
"updated_at": "2021-11-04T10:48:25Z",
|
||||
"updated_at": "2021-11-04T22:26:12Z",
|
||||
"pushed_at": "2021-11-03T14:52:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -290,17 +290,17 @@
|
|||
"description": "CVE-2021-41773 POC with Docker",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-06T02:30:40Z",
|
||||
"updated_at": "2021-10-10T18:36:42Z",
|
||||
"updated_at": "2021-11-04T23:33:40Z",
|
||||
"pushed_at": "2021-10-06T03:37:20Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -317,17 +317,17 @@
|
|||
"description": "PoC for CVE-2021-41773 with docker to demonstrate",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-06T03:01:41Z",
|
||||
"updated_at": "2021-10-10T18:51:20Z",
|
||||
"updated_at": "2021-11-04T23:35:58Z",
|
||||
"pushed_at": "2021-10-06T05:39:24Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -779,11 +779,11 @@
|
|||
"description": "A framework for bug hunting or pentesting targeting websites that have CVE-2021-41773 Vulnerability in public ",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-07T01:31:13Z",
|
||||
"updated_at": "2021-11-04T17:05:42Z",
|
||||
"updated_at": "2021-11-04T22:05:21Z",
|
||||
"pushed_at": "2021-10-07T08:25:26Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 10,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -794,8 +794,8 @@
|
|||
"pentesting"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 31,
|
||||
"forks": 11,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1506,10 +1506,10 @@
|
|||
"description": "Tool check: CVE-2021-41773, CVE-2021-42013, CVE-2020-17519",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-13T17:03:56Z",
|
||||
"updated_at": "2021-10-29T13:34:31Z",
|
||||
"updated_at": "2021-11-04T23:08:59Z",
|
||||
"pushed_at": "2021-10-14T21:11:44Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1520,7 +1520,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 41,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1657,10 +1657,10 @@
|
|||
"description": "CVE-2021-41773 Docker lab",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-20T01:20:21Z",
|
||||
"updated_at": "2021-10-22T07:27:37Z",
|
||||
"updated_at": "2021-11-04T23:37:34Z",
|
||||
"pushed_at": "2021-10-20T01:21:34Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1669,7 +1669,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1914,5 +1914,32 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 424762276,
|
||||
"name": "CVE-2021-41773-Playground",
|
||||
"full_name": "Hydragyrum\/CVE-2021-41773-Playground",
|
||||
"owner": {
|
||||
"login": "Hydragyrum",
|
||||
"id": 4928181,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4928181?v=4",
|
||||
"html_url": "https:\/\/github.com\/Hydragyrum"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Hydragyrum\/CVE-2021-41773-Playground",
|
||||
"description": "Some docker images to play with CVE-2021-41773 and CVE-2021-42013",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-04T22:52:44Z",
|
||||
"updated_at": "2021-11-04T23:39:42Z",
|
||||
"pushed_at": "2021-11-04T22:56:14Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": "WIP kernel exploit for minor bug i found in amd gpu driver",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-28T21:10:29Z",
|
||||
"updated_at": "2021-11-04T04:25:48Z",
|
||||
"pushed_at": "2021-11-04T04:25:45Z",
|
||||
"updated_at": "2021-11-04T20:18:03Z",
|
||||
"pushed_at": "2021-11-04T20:18:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Generate malicious files using recently published homoglyphic-attack (CVE-2021-42694)",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-02T20:39:47Z",
|
||||
"updated_at": "2021-11-04T02:50:31Z",
|
||||
"updated_at": "2021-11-04T23:49:47Z",
|
||||
"pushed_at": "2021-11-03T18:32:32Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 7,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -3081,6 +3081,7 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
|
|||
- [mr-exo/CVE-2021-41773](https://github.com/mr-exo/CVE-2021-41773)
|
||||
- [Balgogan/CVE-2021-41773](https://github.com/Balgogan/CVE-2021-41773)
|
||||
- [wolf1892/CVE-2021-41773](https://github.com/wolf1892/CVE-2021-41773)
|
||||
- [Hydragyrum/CVE-2021-41773-Playground](https://github.com/Hydragyrum/CVE-2021-41773-Playground)
|
||||
|
||||
### CVE-2021-41822
|
||||
- [badboycxcc/CVE-2021-41822](https://github.com/badboycxcc/CVE-2021-41822)
|
||||
|
@ -8887,7 +8888,6 @@ The ES File Explorer File Manager application through 4.1.9.7.4 for Android allo
|
|||
- [SandaRuFdo/ES-File-Explorer-Open-Port-Vulnerability---CVE-2019-6447](https://github.com/SandaRuFdo/ES-File-Explorer-Open-Port-Vulnerability---CVE-2019-6447)
|
||||
- [N3H4L/CVE-2019-6447](https://github.com/N3H4L/CVE-2019-6447)
|
||||
- [sidhawkss/ES-File-Explorer-Vulnerability-on-port-59777](https://github.com/sidhawkss/ES-File-Explorer-Vulnerability-on-port-59777)
|
||||
- [mcmahonr/cve-2019-6447](https://github.com/mcmahonr/cve-2019-6447)
|
||||
- [1nf1n17yk1ng/CVE-2019-6447](https://github.com/1nf1n17yk1ng/CVE-2019-6447)
|
||||
- [julio-cfa/POC-ES-File-Explorer-CVE-2019-6447](https://github.com/julio-cfa/POC-ES-File-Explorer-CVE-2019-6447)
|
||||
- [febinrev/CVE-2019-6447-ESfile-explorer-exploit](https://github.com/febinrev/CVE-2019-6447-ESfile-explorer-exploit)
|
||||
|
|
Loading…
Add table
Reference in a new issue