mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/04/09 18:11:20
This commit is contained in:
parent
2dce4b2b05
commit
aa12b8f9d2
39 changed files with 297 additions and 150 deletions
|
@ -105,13 +105,13 @@
|
|||
"description": "ImaegMagick Code Execution (CVE-2016-3714)",
|
||||
"fork": false,
|
||||
"created_at": "2016-05-07T08:21:27Z",
|
||||
"updated_at": "2020-12-06T05:49:20Z",
|
||||
"updated_at": "2021-04-09T08:47:01Z",
|
||||
"pushed_at": "2016-05-07T17:26:47Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 61,
|
||||
"watchers": 62,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "My journey through WebKit CVE-2016-4622 Exploitation process",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-07T00:46:19Z",
|
||||
"updated_at": "2020-04-19T22:22:17Z",
|
||||
"updated_at": "2021-04-09T08:47:46Z",
|
||||
"pushed_at": "2020-04-12T19:46:40Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2017-04-10T16:06:56Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -59,8 +59,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-04-08T19:41:57Z",
|
||||
"updated_at": "2021-04-08T22:34:39Z",
|
||||
"pushed_at": "2021-04-08T22:34:37Z",
|
||||
"updated_at": "2021-04-09T09:08:37Z",
|
||||
"pushed_at": "2021-04-09T09:08:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-02-03T12:07:33Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-22T04:52:08Z",
|
||||
"updated_at": "2021-04-05T06:58:28Z",
|
||||
"updated_at": "2021-04-09T08:17:03Z",
|
||||
"pushed_at": "2019-08-05T10:45:34Z",
|
||||
"stargazers_count": 440,
|
||||
"watchers_count": 440,
|
||||
"stargazers_count": 441,
|
||||
"watchers_count": 441,
|
||||
"forks_count": 179,
|
||||
"forks": 179,
|
||||
"watchers": 440,
|
||||
"watchers": 441,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "The official exploit code for LibreNMS v1.46 Remote Code Execution CVE-2018-20434",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-25T11:06:48Z",
|
||||
"updated_at": "2020-05-08T13:26:18Z",
|
||||
"updated_at": "2021-04-09T07:12:44Z",
|
||||
"pushed_at": "2019-04-25T11:07:10Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "LPE Exploit For CVE-2019-12181 (Serv-U FTP 15.1.6)",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-12T22:18:45Z",
|
||||
"updated_at": "2021-03-03T08:40:59Z",
|
||||
"updated_at": "2021-04-09T07:10:02Z",
|
||||
"pushed_at": "2019-10-20T21:36:23Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "The official exploit code for Centreon v19.04 Remote Code Execution CVE-2019-13024",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-24T19:26:19Z",
|
||||
"updated_at": "2020-08-24T04:58:20Z",
|
||||
"updated_at": "2021-04-09T07:14:45Z",
|
||||
"pushed_at": "2019-08-24T19:27:24Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "The official exploit code for FusionPBX v4.4.8 Remote Code Execution CVE-2019-15029",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-24T19:28:36Z",
|
||||
"updated_at": "2020-10-26T03:10:58Z",
|
||||
"updated_at": "2021-04-09T07:15:13Z",
|
||||
"pushed_at": "2019-09-23T13:39:09Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-1652 \/CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-24T10:12:44Z",
|
||||
"updated_at": "2021-04-07T14:01:01Z",
|
||||
"updated_at": "2021-04-09T08:59:09Z",
|
||||
"pushed_at": "2019-02-08T12:38:05Z",
|
||||
"stargazers_count": 201,
|
||||
"watchers_count": 201,
|
||||
"stargazers_count": 202,
|
||||
"watchers_count": 202,
|
||||
"forks_count": 63,
|
||||
"forks": 63,
|
||||
"watchers": 201,
|
||||
"watchers": 202,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "The official exploit for rConfig 3.9.2 Pre-auth Remote Code Execution CVE-2019-16662",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-10T18:26:25Z",
|
||||
"updated_at": "2020-08-09T05:29:23Z",
|
||||
"updated_at": "2021-04-09T07:15:35Z",
|
||||
"pushed_at": "2019-11-10T18:27:02Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "The official exploit for rConfig 3.9.2 Post-auth Remote Code Execution CVE-2019-16663",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-10T18:28:11Z",
|
||||
"updated_at": "2020-05-18T10:43:24Z",
|
||||
"updated_at": "2021-04-09T07:15:45Z",
|
||||
"pushed_at": "2019-11-10T18:28:40Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-04-08T14:57:27Z",
|
||||
"updated_at": "2021-04-09T07:53:27Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2474,
|
||||
"watchers_count": 2474,
|
||||
"stargazers_count": 2475,
|
||||
"watchers_count": 2475,
|
||||
"forks_count": 716,
|
||||
"forks": 716,
|
||||
"watchers": 2474,
|
||||
"watchers": 2475,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2021-01-25T13:42:41Z",
|
||||
"stargazers_count": 186,
|
||||
"watchers_count": 186,
|
||||
"forks_count": 54,
|
||||
"forks": 54,
|
||||
"forks_count": 55,
|
||||
"forks": 55,
|
||||
"watchers": 186,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-10T13:41:28Z",
|
||||
"updated_at": "2020-05-18T10:43:32Z",
|
||||
"updated_at": "2021-04-09T07:16:08Z",
|
||||
"pushed_at": "2020-01-10T13:42:12Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Some debug notes and exploit(not blind)",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-26T16:08:40Z",
|
||||
"updated_at": "2021-01-24T08:41:19Z",
|
||||
"updated_at": "2021-04-09T08:01:11Z",
|
||||
"pushed_at": "2019-07-28T02:32:07Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 36,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -197,13 +197,13 @@
|
|||
"description": "Exploit and detect tools for CVE-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-01T12:57:32Z",
|
||||
"updated_at": "2021-04-08T18:35:08Z",
|
||||
"updated_at": "2021-04-09T05:19:04Z",
|
||||
"pushed_at": "2020-03-21T05:44:48Z",
|
||||
"stargazers_count": 277,
|
||||
"watchers_count": 277,
|
||||
"stargazers_count": 278,
|
||||
"watchers_count": 278,
|
||||
"forks_count": 71,
|
||||
"forks": 71,
|
||||
"watchers": 277,
|
||||
"watchers": 278,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-28T13:48:27Z",
|
||||
"updated_at": "2020-09-08T05:58:22Z",
|
||||
"updated_at": "2021-04-09T07:16:44Z",
|
||||
"pushed_at": "2020-04-28T13:51:17Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1094,13 +1094,13 @@
|
|||
"description": "Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-20T21:38:47Z",
|
||||
"updated_at": "2021-03-18T13:50:41Z",
|
||||
"updated_at": "2021-04-09T04:47:53Z",
|
||||
"pushed_at": "2021-03-15T12:02:53Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-04-08T14:57:27Z",
|
||||
"updated_at": "2021-04-09T07:53:27Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2474,
|
||||
"watchers_count": 2474,
|
||||
"stargazers_count": 2475,
|
||||
"watchers_count": 2475,
|
||||
"forks_count": 716,
|
||||
"forks": 716,
|
||||
"watchers": 2474,
|
||||
"watchers": 2475,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -289,13 +289,13 @@
|
|||
"description": "CVE-2020-14882\/14883\/14750",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-04T03:09:13Z",
|
||||
"updated_at": "2021-01-19T07:12:06Z",
|
||||
"updated_at": "2021-04-09T09:00:45Z",
|
||||
"pushed_at": "2020-11-04T03:15:33Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-04-09T02:58:50Z",
|
||||
"updated_at": "2021-04-09T08:43:40Z",
|
||||
"pushed_at": "2021-04-08T13:53:46Z",
|
||||
"stargazers_count": 346,
|
||||
"watchers_count": 346,
|
||||
"forks_count": 80,
|
||||
"forks": 80,
|
||||
"watchers": 346,
|
||||
"stargazers_count": 371,
|
||||
"watchers_count": 371,
|
||||
"forks_count": 88,
|
||||
"forks": 88,
|
||||
"watchers": 371,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-02T16:40:52Z",
|
||||
"updated_at": "2020-10-21T22:17:41Z",
|
||||
"updated_at": "2021-04-09T07:17:04Z",
|
||||
"pushed_at": "2020-07-02T16:46:10Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-35729.json
Normal file
25
2020/CVE-2020-35729.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 356187039,
|
||||
"name": "CVE-2020-35729",
|
||||
"full_name": "Al1ex\/CVE-2020-35729",
|
||||
"owner": {
|
||||
"login": "Al1ex",
|
||||
"id": 38161463,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
|
||||
"html_url": "https:\/\/github.com\/Al1ex"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2020-35729",
|
||||
"description": "CVE-2020-35729",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-09T07:59:43Z",
|
||||
"updated_at": "2021-04-09T08:00:21Z",
|
||||
"pushed_at": "2021-04-09T08:00:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -178,8 +178,8 @@
|
|||
"pushed_at": "2021-01-15T10:51:58Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-07-22T05:30:14Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-07-23T12:55:28Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 45,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "The official exploit for Cacti v1.2.8 Remote Code Execution CVE-2020-8813",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-22T16:27:41Z",
|
||||
"updated_at": "2020-08-29T14:05:25Z",
|
||||
"updated_at": "2021-04-09T07:16:21Z",
|
||||
"pushed_at": "2020-02-22T16:33:31Z",
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 64,
|
||||
"watchers": 65,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-9472.json
Normal file
25
2020/CVE-2020-9472.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 356180975,
|
||||
"name": "CVE-2020-9472-poisoned-plugin",
|
||||
"full_name": "john-dooe\/CVE-2020-9472-poisoned-plugin",
|
||||
"owner": {
|
||||
"login": "john-dooe",
|
||||
"id": 65825969,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65825969?v=4",
|
||||
"html_url": "https:\/\/github.com\/john-dooe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/john-dooe\/CVE-2020-9472-poisoned-plugin",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-04-09T07:39:31Z",
|
||||
"updated_at": "2021-04-09T07:41:42Z",
|
||||
"pushed_at": "2021-04-09T07:41:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -21,5 +21,51 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 356163675,
|
||||
"name": "CVE-2021-21402",
|
||||
"full_name": "xiaoshu-bit\/CVE-2021-21402",
|
||||
"owner": {
|
||||
"login": "xiaoshu-bit",
|
||||
"id": 82120371,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82120371?v=4",
|
||||
"html_url": "https:\/\/github.com\/xiaoshu-bit"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xiaoshu-bit\/CVE-2021-21402",
|
||||
"description": "CVE-2021-21402",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-09T06:38:25Z",
|
||||
"updated_at": "2021-04-09T06:42:34Z",
|
||||
"pushed_at": "2021-04-09T06:41:47Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 356203698,
|
||||
"name": "CVE-2021-21402-Jellyfin",
|
||||
"full_name": "jiaocoll\/CVE-2021-21402-Jellyfin",
|
||||
"owner": {
|
||||
"login": "jiaocoll",
|
||||
"id": 62785738,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62785738?v=4",
|
||||
"html_url": "https:\/\/github.com\/jiaocoll"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jiaocoll\/CVE-2021-21402-Jellyfin",
|
||||
"description": "jiaocoll\/CVE-2021-21402-Jellyfin",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-09T08:54:55Z",
|
||||
"updated_at": "2021-04-09T08:59:51Z",
|
||||
"pushed_at": "2021-04-09T08:59:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T09:56:21Z",
|
||||
"updated_at": "2021-03-14T04:48:16Z",
|
||||
"updated_at": "2021-04-09T08:20:25Z",
|
||||
"pushed_at": "2021-03-01T02:10:44Z",
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"forks_count": 56,
|
||||
"forks": 56,
|
||||
"watchers": 90,
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"forks_count": 58,
|
||||
"forks": 58,
|
||||
"watchers": 91,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2021-21972 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T11:14:58Z",
|
||||
"updated_at": "2021-04-06T02:31:05Z",
|
||||
"updated_at": "2021-04-09T08:19:52Z",
|
||||
"pushed_at": "2021-03-10T05:01:22Z",
|
||||
"stargazers_count": 229,
|
||||
"watchers_count": 229,
|
||||
"forks_count": 88,
|
||||
"forks": 88,
|
||||
"watchers": 229,
|
||||
"stargazers_count": 230,
|
||||
"watchers_count": 230,
|
||||
"forks_count": 90,
|
||||
"forks": 90,
|
||||
"watchers": 230,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-07T11:10:40Z",
|
||||
"updated_at": "2021-04-09T01:34:10Z",
|
||||
"updated_at": "2021-04-09T08:00:14Z",
|
||||
"pushed_at": "2021-04-07T16:34:18Z",
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 88,
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 92,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-04-09T02:58:50Z",
|
||||
"updated_at": "2021-04-09T08:43:40Z",
|
||||
"pushed_at": "2021-04-08T13:53:46Z",
|
||||
"stargazers_count": 346,
|
||||
"watchers_count": 346,
|
||||
"forks_count": 80,
|
||||
"forks": 80,
|
||||
"watchers": 346,
|
||||
"stargazers_count": 371,
|
||||
"watchers_count": 371,
|
||||
"forks_count": 88,
|
||||
"forks": 88,
|
||||
"watchers": 371,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Detect webshells dropped on Microsoft Exchange servers exploited through \"proxylogon\" group of vulnerabilites (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065)",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-05T08:22:07Z",
|
||||
"updated_at": "2021-04-05T13:16:31Z",
|
||||
"updated_at": "2021-04-09T04:28:58Z",
|
||||
"pushed_at": "2021-03-16T08:34:14Z",
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 85,
|
||||
"watchers": 86,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -358,13 +358,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-09T16:54:39Z",
|
||||
"updated_at": "2021-04-03T23:24:23Z",
|
||||
"updated_at": "2021-04-09T08:33:39Z",
|
||||
"pushed_at": "2021-03-09T16:56:09Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"forks_count": 56,
|
||||
"forks": 56,
|
||||
"watchers": 75,
|
||||
"watchers": 76,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -684,8 +684,8 @@
|
|||
"pushed_at": "2021-03-17T05:06:18Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-03-13T08:39:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2021-3019 lanproxy目录遍历任意文件读取漏洞探测POC",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-11T04:18:44Z",
|
||||
"updated_at": "2021-03-19T14:42:51Z",
|
||||
"updated_at": "2021-04-09T09:10:59Z",
|
||||
"pushed_at": "2021-03-19T14:42:49Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Laravel debug rce",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-22T05:12:21Z",
|
||||
"updated_at": "2021-04-08T15:12:49Z",
|
||||
"updated_at": "2021-04-09T03:52:15Z",
|
||||
"pushed_at": "2021-01-24T05:28:07Z",
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"watchers": 82,
|
||||
"watchers": 83,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -887,13 +887,13 @@
|
|||
"description": "Sudo Baron Samedit Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-15T17:37:02Z",
|
||||
"updated_at": "2021-04-08T03:20:59Z",
|
||||
"updated_at": "2021-04-09T07:43:03Z",
|
||||
"pushed_at": "2021-03-30T14:44:38Z",
|
||||
"stargazers_count": 254,
|
||||
"watchers_count": 254,
|
||||
"stargazers_count": 256,
|
||||
"watchers_count": 256,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 254,
|
||||
"watchers": 256,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2021/CVE-2021-3317.json
Normal file
25
2021/CVE-2021-3317.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 356180253,
|
||||
"name": "CVE-2021-3317",
|
||||
"full_name": "Al1ex\/CVE-2021-3317",
|
||||
"owner": {
|
||||
"login": "Al1ex",
|
||||
"id": 38161463,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
|
||||
"html_url": "https:\/\/github.com\/Al1ex"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2021-3317",
|
||||
"description": "CVE-2021-3317",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-09T07:36:46Z",
|
||||
"updated_at": "2021-04-09T07:38:09Z",
|
||||
"pushed_at": "2021-04-09T07:37:29Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
26
README.md
26
README.md
|
@ -206,6 +206,14 @@ On Zyxel NBG2105 V1.00(AAGU.2)C0 devices, setting the login cookie to 1 provides
|
|||
|
||||
- [Sec504/Zyxel-NBG2105-CVE-2021-3297](https://github.com/Sec504/Zyxel-NBG2105-CVE-2021-3297)
|
||||
|
||||
### CVE-2021-3317 (2021-01-26)
|
||||
|
||||
<code>
|
||||
KLog Server through 2.4.1 allows authenticated command injection. async.php calls shell_exec() on the original value of the source parameter.
|
||||
</code>
|
||||
|
||||
- [Al1ex/CVE-2021-3317](https://github.com/Al1ex/CVE-2021-3317)
|
||||
|
||||
### CVE-2021-3327 (2021-03-18)
|
||||
|
||||
<code>
|
||||
|
@ -335,6 +343,8 @@ Jellyfin is a Free Software Media System. In Jellyfin before version 10.7.1, wit
|
|||
</code>
|
||||
|
||||
- [MzzdToT/CVE-2021-21402](https://github.com/MzzdToT/CVE-2021-21402)
|
||||
- [xiaoshu-bit/CVE-2021-21402](https://github.com/xiaoshu-bit/CVE-2021-21402)
|
||||
- [jiaocoll/CVE-2021-21402-Jellyfin](https://github.com/jiaocoll/CVE-2021-21402-Jellyfin)
|
||||
|
||||
### CVE-2021-21635 (2021-03-30)
|
||||
|
||||
|
@ -2508,6 +2518,14 @@ An issue was discovered in Wing FTP Server 6.2.5 before February 2020. Due to in
|
|||
|
||||
- [Al1ex/CVE-2020-9470](https://github.com/Al1ex/CVE-2020-9470)
|
||||
|
||||
### CVE-2020-9472 (2020-03-16)
|
||||
|
||||
<code>
|
||||
Umbraco CMS 8.5.3 allows an authenticated file upload (and consequently Remote Code Execution) via the Install Package functionality.
|
||||
</code>
|
||||
|
||||
- [john-dooe/CVE-2020-9472-poisoned-plugin](https://github.com/john-dooe/CVE-2020-9472-poisoned-plugin)
|
||||
|
||||
### CVE-2020-9483 (2020-06-30)
|
||||
|
||||
<code>
|
||||
|
@ -4777,6 +4795,14 @@ FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction betwee
|
|||
|
||||
- [Al1ex/CVE-2020-35728](https://github.com/Al1ex/CVE-2020-35728)
|
||||
|
||||
### CVE-2020-35729 (2020-12-26)
|
||||
|
||||
<code>
|
||||
KLog Server 2.4.1 allows OS command injection via shell metacharacters in the actions/authenticate.php user parameter.
|
||||
</code>
|
||||
|
||||
- [Al1ex/CVE-2020-35729](https://github.com/Al1ex/CVE-2020-35729)
|
||||
|
||||
### CVE-2020-36079 (2021-02-26)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue