mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2021/09/05 18:12:18
This commit is contained in:
parent
73a2b0efce
commit
b1daef2c67
91 changed files with 5714 additions and 80 deletions
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 143461594,
|
||||
"name": "CVE-2007-2447",
|
||||
"full_name": "amriunix\/CVE-2007-2447",
|
||||
"owner": {
|
||||
"login": "amriunix",
|
||||
"id": 6618368,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6618368?v=4",
|
||||
"html_url": "https:\/\/github.com\/amriunix"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/amriunix\/CVE-2007-2447",
|
||||
"description": "CVE-2007-2447 - Samba usermap script",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-03T18:39:56Z",
|
||||
"updated_at": "2021-08-14T20:31:07Z",
|
||||
"pushed_at": "2020-08-16T18:54:38Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 195401614,
|
||||
"name": "metasploitable2",
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "OpenSSH remote DOS exploit and vulnerable container",
|
||||
"fork": false,
|
||||
"created_at": "2016-12-09T15:22:38Z",
|
||||
"updated_at": "2021-08-25T06:07:22Z",
|
||||
"updated_at": "2021-09-05T09:06:50Z",
|
||||
"pushed_at": "2017-10-30T22:29:20Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 49,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-04T14:43:57Z",
|
||||
"updated_at": "2021-08-16T11:29:35Z",
|
||||
"updated_at": "2021-09-05T06:27:27Z",
|
||||
"pushed_at": "2019-11-30T10:28:01Z",
|
||||
"stargazers_count": 156,
|
||||
"watchers_count": 156,
|
||||
"stargazers_count": 157,
|
||||
"watchers_count": 157,
|
||||
"forks_count": 83,
|
||||
"forks": 83,
|
||||
"watchers": 156,
|
||||
"watchers": 157,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "My first zero day.",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-12T21:25:14Z",
|
||||
"updated_at": "2021-07-10T22:54:20Z",
|
||||
"updated_at": "2021-09-05T04:14:43Z",
|
||||
"pushed_at": "2021-07-10T22:54:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-1652 \/CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-24T10:12:44Z",
|
||||
"updated_at": "2021-08-27T04:05:40Z",
|
||||
"updated_at": "2021-09-05T04:02:11Z",
|
||||
"pushed_at": "2019-02-08T12:38:05Z",
|
||||
"stargazers_count": 207,
|
||||
"watchers_count": 207,
|
||||
"stargazers_count": 208,
|
||||
"watchers_count": 208,
|
||||
"forks_count": 65,
|
||||
"forks": 65,
|
||||
"watchers": 207,
|
||||
"watchers": 208,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2843,
|
||||
"watchers_count": 2843,
|
||||
"forks_count": 832,
|
||||
"forks": 832,
|
||||
"forks_count": 833,
|
||||
"forks": 833,
|
||||
"watchers": 2843,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2019-6340 POC Drupal rce",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-25T07:47:16Z",
|
||||
"updated_at": "2020-04-02T11:50:43Z",
|
||||
"updated_at": "2021-09-05T04:47:39Z",
|
||||
"pushed_at": "2019-02-25T08:57:14Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-04-20T16:14:13Z",
|
||||
"stargazers_count": 134,
|
||||
"watchers_count": 134,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 134,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploits for Android Binder bug CVE-2020-0041",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-31T17:53:57Z",
|
||||
"updated_at": "2021-09-04T13:07:17Z",
|
||||
"updated_at": "2021-09-05T08:58:56Z",
|
||||
"pushed_at": "2020-04-08T08:55:30Z",
|
||||
"stargazers_count": 171,
|
||||
"watchers_count": 171,
|
||||
"stargazers_count": 172,
|
||||
"watchers_count": 172,
|
||||
"forks_count": 55,
|
||||
"forks": 55,
|
||||
"watchers": 171,
|
||||
"watchers": 172,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1600,13 +1600,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-09-04T15:07:15Z",
|
||||
"updated_at": "2021-09-04T15:08:55Z",
|
||||
"updated_at": "2021-09-05T08:57:27Z",
|
||||
"pushed_at": "2021-09-04T15:08:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2843,
|
||||
"watchers_count": 2843,
|
||||
"forks_count": 832,
|
||||
"forks": 832,
|
||||
"forks_count": 833,
|
||||
"forks": 833,
|
||||
"watchers": 2843,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "How to exploit a vulnerable windows driver. Exploit for AsrDrv104.sys",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T04:38:24Z",
|
||||
"updated_at": "2021-09-02T01:52:04Z",
|
||||
"updated_at": "2021-09-05T03:32:35Z",
|
||||
"pushed_at": "2021-09-01T07:56:19Z",
|
||||
"stargazers_count": 280,
|
||||
"watchers_count": 280,
|
||||
"stargazers_count": 281,
|
||||
"watchers_count": 281,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 280,
|
||||
"watchers": 281,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Automated bulk IP or domain scanner for CVE 2020 3580. Cisco ASA and FTD XSS hunter.",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-28T06:51:26Z",
|
||||
"updated_at": "2021-08-23T14:39:08Z",
|
||||
"updated_at": "2021-09-05T05:19:15Z",
|
||||
"pushed_at": "2021-07-10T12:42:24Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-1056.json
Normal file
25
2021/CVE-2021-1056.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 327884232,
|
||||
"name": "CVE-2021-1056",
|
||||
"full_name": "pokerfaceSad\/CVE-2021-1056",
|
||||
"owner": {
|
||||
"login": "pokerfaceSad",
|
||||
"id": 22297037,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22297037?v=4",
|
||||
"html_url": "https:\/\/github.com\/pokerfaceSad"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pokerfaceSad\/CVE-2021-1056",
|
||||
"description": "PoC for CVE-2021-1056, related to GPU Container Security",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-08T11:29:48Z",
|
||||
"updated_at": "2021-04-20T09:37:49Z",
|
||||
"pushed_at": "2021-01-12T09:21:02Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-1656.json
Normal file
25
2021/CVE-2021-1656.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 352879385,
|
||||
"name": "CVE-2021-1656",
|
||||
"full_name": "waleedassar\/CVE-2021-1656",
|
||||
"owner": {
|
||||
"login": "waleedassar",
|
||||
"id": 5983995,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5983995?v=4",
|
||||
"html_url": "https:\/\/github.com\/waleedassar"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/waleedassar\/CVE-2021-1656",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-30T05:21:26Z",
|
||||
"updated_at": "2021-08-18T02:31:09Z",
|
||||
"pushed_at": "2021-03-30T05:31:22Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -703,13 +703,13 @@
|
|||
"description": "PrintNightMare LPE提权漏洞的CS 反射加载插件。开箱即用、通过内存加载、混淆加载的驱动名称来ByPass Defender\/EDR。",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-01T11:25:04Z",
|
||||
"updated_at": "2021-09-04T15:36:45Z",
|
||||
"updated_at": "2021-09-05T08:15:34Z",
|
||||
"pushed_at": "2021-09-01T11:25:22Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 75,
|
||||
"watchers": 76,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-1699.json
Normal file
25
2021/CVE-2021-1699.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 353281089,
|
||||
"name": "CVE-2021-1699",
|
||||
"full_name": "waleedassar\/CVE-2021-1699",
|
||||
"owner": {
|
||||
"login": "waleedassar",
|
||||
"id": 5983995,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5983995?v=4",
|
||||
"html_url": "https:\/\/github.com\/waleedassar"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/waleedassar\/CVE-2021-1699",
|
||||
"description": "POC for CVE-2021-1699",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-31T08:22:49Z",
|
||||
"updated_at": "2021-08-09T21:20:46Z",
|
||||
"pushed_at": "2021-03-31T08:29:23Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-1727.json
Normal file
25
2021/CVE-2021-1727.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 339467650,
|
||||
"name": "CVE-2021-1727",
|
||||
"full_name": "klinix5\/CVE-2021-1727",
|
||||
"owner": {
|
||||
"login": "klinix5",
|
||||
"id": 53986347,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53986347?v=4",
|
||||
"html_url": "https:\/\/github.com\/klinix5"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/klinix5\/CVE-2021-1727",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-16T16:55:46Z",
|
||||
"updated_at": "2021-08-28T06:14:23Z",
|
||||
"pushed_at": "2021-02-16T16:59:09Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,96 @@
|
|||
[
|
||||
{
|
||||
"id": 344667460,
|
||||
"name": "CVE-2021-1732-Exploit",
|
||||
"full_name": "KaLendsi\/CVE-2021-1732-Exploit",
|
||||
"owner": {
|
||||
"login": "KaLendsi",
|
||||
"id": 68001644,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68001644?v=4",
|
||||
"html_url": "https:\/\/github.com\/KaLendsi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/KaLendsi\/CVE-2021-1732-Exploit",
|
||||
"description": "CVE-2021-1732 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-05T02:11:10Z",
|
||||
"updated_at": "2021-09-05T02:13:44Z",
|
||||
"pushed_at": "2021-03-05T03:10:26Z",
|
||||
"stargazers_count": 330,
|
||||
"watchers_count": 330,
|
||||
"forks_count": 84,
|
||||
"forks": 84,
|
||||
"watchers": 330,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 345537174,
|
||||
"name": "CVE-2021-1732",
|
||||
"full_name": "k-k-k-k-k\/CVE-2021-1732",
|
||||
"owner": {
|
||||
"login": "k-k-k-k-k",
|
||||
"id": 36893648,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36893648?v=4",
|
||||
"html_url": "https:\/\/github.com\/k-k-k-k-k"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/k-k-k-k-k\/CVE-2021-1732",
|
||||
"description": "CVE-2021-1732 Microsoft Windows 10 本地提权漏 研究及Poc\/Exploit开发",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-08T05:07:15Z",
|
||||
"updated_at": "2021-08-31T05:08:52Z",
|
||||
"pushed_at": "2021-03-08T11:41:19Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 345855407,
|
||||
"name": "CVE-2021-1732-Exploit",
|
||||
"full_name": "oneoy\/CVE-2021-1732-Exploit",
|
||||
"owner": {
|
||||
"login": "oneoy",
|
||||
"id": 38435398,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38435398?v=4",
|
||||
"html_url": "https:\/\/github.com\/oneoy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/oneoy\/CVE-2021-1732-Exploit",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-09T02:13:43Z",
|
||||
"updated_at": "2021-03-22T08:20:46Z",
|
||||
"pushed_at": "2021-03-09T02:13:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 353872268,
|
||||
"name": "CVE-2021-1732_exp",
|
||||
"full_name": "linuxdy\/CVE-2021-1732_exp",
|
||||
"owner": {
|
||||
"login": "linuxdy",
|
||||
"id": 50064309,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50064309?v=4",
|
||||
"html_url": "https:\/\/github.com\/linuxdy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/linuxdy\/CVE-2021-1732_exp",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-04-02T01:35:41Z",
|
||||
"updated_at": "2021-04-29T12:58:39Z",
|
||||
"pushed_at": "2021-03-30T08:32:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 360813608,
|
||||
"name": "CVE-2021-1732",
|
||||
|
|
25
2021/CVE-2021-1782.json
Normal file
25
2021/CVE-2021-1782.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 337752034,
|
||||
"name": "CVE-2021-1782",
|
||||
"full_name": "synacktiv\/CVE-2021-1782",
|
||||
"owner": {
|
||||
"login": "synacktiv",
|
||||
"id": 50145679,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50145679?v=4",
|
||||
"html_url": "https:\/\/github.com\/synacktiv"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/synacktiv\/CVE-2021-1782",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-10T14:38:05Z",
|
||||
"updated_at": "2021-08-17T18:19:30Z",
|
||||
"pushed_at": "2021-02-10T14:39:04Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 26,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-1994.json
Normal file
25
2021/CVE-2021-1994.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 335868582,
|
||||
"name": "weblogic2021",
|
||||
"full_name": "somatrasss\/weblogic2021",
|
||||
"owner": {
|
||||
"login": "somatrasss",
|
||||
"id": 69829610,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69829610?v=4",
|
||||
"html_url": "https:\/\/github.com\/somatrasss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/somatrasss\/weblogic2021",
|
||||
"description": "CVE-2021-1994、CVE-2021-2047、CVE-2021-2064、CVE-2021-2108、CVE-2021-2075、CVE-2019-17195、CVE-2020-14756、CVE-2021-2109",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-04T07:03:56Z",
|
||||
"updated_at": "2021-08-08T22:50:18Z",
|
||||
"pushed_at": "2021-02-04T07:12:29Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-21014.json
Normal file
25
2021/CVE-2021-21014.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 338510801,
|
||||
"name": "CVE-2021-21014",
|
||||
"full_name": "HoangKien1020\/CVE-2021-21014",
|
||||
"owner": {
|
||||
"login": "HoangKien1020",
|
||||
"id": 24661746,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24661746?v=4",
|
||||
"html_url": "https:\/\/github.com\/HoangKien1020"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/HoangKien1020\/CVE-2021-21014",
|
||||
"description": "Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to a file upload restriction bypass. Successful exploitation could lead to arbitrary code execution by an authenticated attacker.",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-13T06:16:39Z",
|
||||
"updated_at": "2021-07-13T06:19:18Z",
|
||||
"pushed_at": "2021-02-13T06:30:25Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-21017.json
Normal file
25
2021/CVE-2021-21017.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 342597395,
|
||||
"name": "CVE-2021-21017",
|
||||
"full_name": "ZeusBox\/CVE-2021-21017",
|
||||
"owner": {
|
||||
"login": "ZeusBox",
|
||||
"id": 78951067,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78951067?v=4",
|
||||
"html_url": "https:\/\/github.com\/ZeusBox"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ZeusBox\/CVE-2021-21017",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-26T14:18:13Z",
|
||||
"updated_at": "2021-06-23T06:57:10Z",
|
||||
"pushed_at": "2021-02-27T09:57:00Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-21042.json
Normal file
25
2021/CVE-2021-21042.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 344380474,
|
||||
"name": "CVE-2021-21042",
|
||||
"full_name": "NattiSamson\/CVE-2021-21042",
|
||||
"owner": {
|
||||
"login": "NattiSamson",
|
||||
"id": 45117900,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45117900?v=4",
|
||||
"html_url": "https:\/\/github.com\/NattiSamson"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/NattiSamson\/CVE-2021-21042",
|
||||
"description": "Exploit code for CVE-2021-21042",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-04T07:01:08Z",
|
||||
"updated_at": "2021-03-05T10:51:21Z",
|
||||
"pushed_at": "2021-03-04T07:05:01Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,50 @@
|
|||
[
|
||||
{
|
||||
"id": 331847444,
|
||||
"name": "CVE-2021-2109",
|
||||
"full_name": "Al1ex\/CVE-2021-2109",
|
||||
"owner": {
|
||||
"login": "Al1ex",
|
||||
"id": 38161463,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
|
||||
"html_url": "https:\/\/github.com\/Al1ex"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2021-2109",
|
||||
"description": "CVE-2021-2109 && Weblogic Server RCE via JNDI",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-22T05:37:11Z",
|
||||
"updated_at": "2021-05-21T21:43:11Z",
|
||||
"pushed_at": "2021-01-22T05:52:26Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 331873303,
|
||||
"name": "CVE-2021-2109",
|
||||
"full_name": "rabbitsafe\/CVE-2021-2109",
|
||||
"owner": {
|
||||
"login": "rabbitsafe",
|
||||
"id": 33046073,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33046073?v=4",
|
||||
"html_url": "https:\/\/github.com\/rabbitsafe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rabbitsafe\/CVE-2021-2109",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-22T07:43:46Z",
|
||||
"updated_at": "2021-06-20T03:44:33Z",
|
||||
"pushed_at": "2021-01-22T08:34:11Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 367086891,
|
||||
"name": "CVE-2021-2109_poc",
|
||||
|
|
25
2021/CVE-2021-21110.json
Normal file
25
2021/CVE-2021-21110.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 340540711,
|
||||
"name": "CVE-2021-21110",
|
||||
"full_name": "Gh0st0ne\/CVE-2021-21110",
|
||||
"owner": {
|
||||
"login": "Gh0st0ne",
|
||||
"id": 47971115,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47971115?v=4",
|
||||
"html_url": "https:\/\/github.com\/Gh0st0ne"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Gh0st0ne\/CVE-2021-21110",
|
||||
"description": "CVE-2021-21110 : Tiki Wiki CMS GroupWare Serverside Template Injection Remote Code Execution Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-20T02:19:40Z",
|
||||
"updated_at": "2021-03-05T10:52:38Z",
|
||||
"pushed_at": "2021-02-20T02:20:48Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-21123.json
Normal file
25
2021/CVE-2021-21123.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 350325088,
|
||||
"name": "CVE-2021-21123-PoC-Google-Chrome",
|
||||
"full_name": "Puliczek\/CVE-2021-21123-PoC-Google-Chrome",
|
||||
"owner": {
|
||||
"login": "Puliczek",
|
||||
"id": 12344862,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12344862?v=4",
|
||||
"html_url": "https:\/\/github.com\/Puliczek"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Puliczek\/CVE-2021-21123-PoC-Google-Chrome",
|
||||
"description": "🐱💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-22T11:53:57Z",
|
||||
"updated_at": "2021-08-31T17:58:57Z",
|
||||
"pushed_at": "2021-03-22T18:24:20Z",
|
||||
"stargazers_count": 123,
|
||||
"watchers_count": 123,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 123,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-21148.json
Normal file
25
2021/CVE-2021-21148.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 336754176,
|
||||
"name": "CVE-2021-21148",
|
||||
"full_name": "Grayhaxor\/CVE-2021-21148",
|
||||
"owner": {
|
||||
"login": "Grayhaxor",
|
||||
"id": 74397435,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74397435?v=4",
|
||||
"html_url": "https:\/\/github.com\/Grayhaxor"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Grayhaxor\/CVE-2021-21148",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-07T09:59:47Z",
|
||||
"updated_at": "2021-02-07T10:35:05Z",
|
||||
"pushed_at": "2021-02-07T10:03:16Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,234 @@
|
|||
[
|
||||
{
|
||||
"id": 346285133,
|
||||
"name": "CVE-2021-21300",
|
||||
"full_name": "AlkenePan\/CVE-2021-21300",
|
||||
"owner": {
|
||||
"login": "AlkenePan",
|
||||
"id": 8273781,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8273781?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlkenePan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlkenePan\/CVE-2021-21300",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-10T08:29:49Z",
|
||||
"updated_at": "2021-03-10T08:30:28Z",
|
||||
"pushed_at": "2021-03-10T08:30:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 346425578,
|
||||
"name": "CVE-2021-21300",
|
||||
"full_name": "Faisal78123\/CVE-2021-21300",
|
||||
"owner": {
|
||||
"login": "Faisal78123",
|
||||
"id": 2056026,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2056026?v=4",
|
||||
"html_url": "https:\/\/github.com\/Faisal78123"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Faisal78123\/CVE-2021-21300",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-10T16:45:46Z",
|
||||
"updated_at": "2021-03-18T10:37:28Z",
|
||||
"pushed_at": "2021-03-18T10:37:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 346434188,
|
||||
"name": "CVE-2021-21300",
|
||||
"full_name": "erranfenech\/CVE-2021-21300",
|
||||
"owner": {
|
||||
"login": "erranfenech",
|
||||
"id": 52293769,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52293769?v=4",
|
||||
"html_url": "https:\/\/github.com\/erranfenech"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/erranfenech\/CVE-2021-21300",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-10T17:15:49Z",
|
||||
"updated_at": "2021-03-10T17:26:03Z",
|
||||
"pushed_at": "2021-03-10T17:26:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 346559767,
|
||||
"name": "CVE-2021-21300",
|
||||
"full_name": "Maskhe\/CVE-2021-21300",
|
||||
"owner": {
|
||||
"login": "Maskhe",
|
||||
"id": 30264078,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30264078?v=4",
|
||||
"html_url": "https:\/\/github.com\/Maskhe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Maskhe\/CVE-2021-21300",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T02:57:11Z",
|
||||
"updated_at": "2021-03-11T03:16:39Z",
|
||||
"pushed_at": "2021-03-11T03:16:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 346572089,
|
||||
"name": "CVE-2021-21300",
|
||||
"full_name": "1uanWu\/CVE-2021-21300",
|
||||
"owner": {
|
||||
"login": "1uanWu",
|
||||
"id": 23513206,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23513206?v=4",
|
||||
"html_url": "https:\/\/github.com\/1uanWu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/1uanWu\/CVE-2021-21300",
|
||||
"description": "remote code exec for git",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T03:59:49Z",
|
||||
"updated_at": "2021-03-16T02:36:13Z",
|
||||
"pushed_at": "2021-03-11T04:14:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 346654892,
|
||||
"name": "CVE-2021-21300",
|
||||
"full_name": "Kirill89\/CVE-2021-21300",
|
||||
"owner": {
|
||||
"login": "Kirill89",
|
||||
"id": 2003936,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2003936?v=4",
|
||||
"html_url": "https:\/\/github.com\/Kirill89"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Kirill89\/CVE-2021-21300",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T09:56:03Z",
|
||||
"updated_at": "2021-03-11T10:01:59Z",
|
||||
"pushed_at": "2021-03-11T10:01:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 346968682,
|
||||
"name": "CVE-2021-21300",
|
||||
"full_name": "CppXL\/CVE-2021-21300",
|
||||
"owner": {
|
||||
"login": "CppXL",
|
||||
"id": 36043454,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36043454?v=4",
|
||||
"html_url": "https:\/\/github.com\/CppXL"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CppXL\/CVE-2021-21300",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-12T06:45:04Z",
|
||||
"updated_at": "2021-03-12T07:20:22Z",
|
||||
"pushed_at": "2021-03-12T07:20:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 347847778,
|
||||
"name": "cve-2021-21300",
|
||||
"full_name": "ETOCheney\/cve-2021-21300",
|
||||
"owner": {
|
||||
"login": "ETOCheney",
|
||||
"id": 28469578,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28469578?v=4",
|
||||
"html_url": "https:\/\/github.com\/ETOCheney"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ETOCheney\/cve-2021-21300",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-15T05:28:47Z",
|
||||
"updated_at": "2021-03-15T05:30:16Z",
|
||||
"pushed_at": "2021-03-15T05:30:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 355023650,
|
||||
"name": "CVE-2021-21300",
|
||||
"full_name": "fengzhouc\/CVE-2021-21300",
|
||||
"owner": {
|
||||
"login": "fengzhouc",
|
||||
"id": 22309037,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22309037?v=4",
|
||||
"html_url": "https:\/\/github.com\/fengzhouc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fengzhouc\/CVE-2021-21300",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-04-06T01:44:17Z",
|
||||
"updated_at": "2021-04-06T02:14:31Z",
|
||||
"pushed_at": "2021-04-06T02:14:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 355441102,
|
||||
"name": "CVE-2021-21300",
|
||||
"full_name": "danshuizhangyu\/CVE-2021-21300",
|
||||
"owner": {
|
||||
"login": "danshuizhangyu",
|
||||
"id": 82081080,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82081080?v=4",
|
||||
"html_url": "https:\/\/github.com\/danshuizhangyu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/danshuizhangyu\/CVE-2021-21300",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-04-07T06:48:16Z",
|
||||
"updated_at": "2021-04-08T01:46:54Z",
|
||||
"pushed_at": "2021-04-08T01:46:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 367320160,
|
||||
"name": "CVE-2021-21300",
|
||||
|
|
|
@ -22,6 +22,29 @@
|
|||
"watchers": 129,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 344455733,
|
||||
"name": "CVE-2021-21315v2",
|
||||
"full_name": "cherrera0001\/CVE-2021-21315v2",
|
||||
"owner": {
|
||||
"login": "cherrera0001",
|
||||
"id": 19656010,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19656010?v=4",
|
||||
"html_url": "https:\/\/github.com\/cherrera0001"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cherrera0001\/CVE-2021-21315v2",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-04T11:47:18Z",
|
||||
"updated_at": "2021-03-13T02:06:37Z",
|
||||
"pushed_at": "2021-03-04T11:47:48Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 387065961,
|
||||
"name": "CVE-2021-21315-exploit",
|
||||
|
|
94
2021/CVE-2021-21402.json
Normal file
94
2021/CVE-2021-21402.json
Normal file
|
@ -0,0 +1,94 @@
|
|||
[
|
||||
{
|
||||
"id": 355809473,
|
||||
"name": "CVE-2021-21402",
|
||||
"full_name": "MzzdToT\/CVE-2021-21402",
|
||||
"owner": {
|
||||
"login": "MzzdToT",
|
||||
"id": 44486276,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44486276?v=4",
|
||||
"html_url": "https:\/\/github.com\/MzzdToT"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MzzdToT\/CVE-2021-21402",
|
||||
"description": "Jellyfin系统任意文件读取漏洞批量扫描验证脚本。",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-08T07:41:40Z",
|
||||
"updated_at": "2021-04-08T08:38:31Z",
|
||||
"pushed_at": "2021-04-08T07:49:41Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 356203698,
|
||||
"name": "CVE-2021-21402-Jellyfin",
|
||||
"full_name": "jiaocoll\/CVE-2021-21402-Jellyfin",
|
||||
"owner": {
|
||||
"login": "jiaocoll",
|
||||
"id": 62785738,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62785738?v=4",
|
||||
"html_url": "https:\/\/github.com\/jiaocoll"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jiaocoll\/CVE-2021-21402-Jellyfin",
|
||||
"description": "CVE-2021-21402-Jellyfin-任意文件读取",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-09T08:54:55Z",
|
||||
"updated_at": "2021-04-10T03:10:17Z",
|
||||
"pushed_at": "2021-04-10T03:10:15Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 358308476,
|
||||
"name": "CVE-2021-21402",
|
||||
"full_name": "somatrasss\/CVE-2021-21402",
|
||||
"owner": {
|
||||
"login": "somatrasss",
|
||||
"id": 69829610,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69829610?v=4",
|
||||
"html_url": "https:\/\/github.com\/somatrasss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/somatrasss\/CVE-2021-21402",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-04-15T15:32:39Z",
|
||||
"updated_at": "2021-04-15T15:51:18Z",
|
||||
"pushed_at": "2021-04-15T15:51:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 358484211,
|
||||
"name": "CVE-2021-21402",
|
||||
"full_name": "givemefivw\/CVE-2021-21402",
|
||||
"owner": {
|
||||
"login": "givemefivw",
|
||||
"id": 65514141,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65514141?v=4",
|
||||
"html_url": "https:\/\/github.com\/givemefivw"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/givemefivw\/CVE-2021-21402",
|
||||
"description": "CVE-2021-21402 Jellyfin任意文件读取 Wker脚本,可批量。",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-16T05:20:20Z",
|
||||
"updated_at": "2021-04-16T06:04:51Z",
|
||||
"pushed_at": "2021-04-16T05:24:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -22,6 +22,282 @@
|
|||
"watchers": 81,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 341854126,
|
||||
"name": "CVE-2021-21972-vCenter-6.5-7.0-RCE-POC",
|
||||
"full_name": "QmF0c3UK\/CVE-2021-21972-vCenter-6.5-7.0-RCE-POC",
|
||||
"owner": {
|
||||
"login": "QmF0c3UK",
|
||||
"id": 29447678,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29447678?v=4",
|
||||
"html_url": "https:\/\/github.com\/QmF0c3UK"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/QmF0c3UK\/CVE-2021-21972-vCenter-6.5-7.0-RCE-POC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T09:56:21Z",
|
||||
"updated_at": "2021-08-22T11:59:45Z",
|
||||
"pushed_at": "2021-03-01T02:10:44Z",
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"forks_count": 59,
|
||||
"forks": 59,
|
||||
"watchers": 104,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 341874677,
|
||||
"name": "CVE-2021-21972",
|
||||
"full_name": "NS-Sp4ce\/CVE-2021-21972",
|
||||
"owner": {
|
||||
"login": "NS-Sp4ce",
|
||||
"id": 33349032,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33349032?v=4",
|
||||
"html_url": "https:\/\/github.com\/NS-Sp4ce"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/NS-Sp4ce\/CVE-2021-21972",
|
||||
"description": "CVE-2021-21972 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T11:14:58Z",
|
||||
"updated_at": "2021-09-02T02:54:55Z",
|
||||
"pushed_at": "2021-03-10T05:01:22Z",
|
||||
"stargazers_count": 283,
|
||||
"watchers_count": 283,
|
||||
"forks_count": 107,
|
||||
"forks": 107,
|
||||
"watchers": 283,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 341907086,
|
||||
"name": "CVE-2021-21972",
|
||||
"full_name": "yaunsky\/CVE-2021-21972",
|
||||
"owner": {
|
||||
"login": "yaunsky",
|
||||
"id": 48243087,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48243087?v=4",
|
||||
"html_url": "https:\/\/github.com\/yaunsky"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yaunsky\/CVE-2021-21972",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T13:19:41Z",
|
||||
"updated_at": "2021-03-12T04:12:35Z",
|
||||
"pushed_at": "2021-02-24T13:36:28Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 341963506,
|
||||
"name": "CVE-2021-21972",
|
||||
"full_name": "horizon3ai\/CVE-2021-21972",
|
||||
"owner": {
|
||||
"login": "horizon3ai",
|
||||
"id": 79593994,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4",
|
||||
"html_url": "https:\/\/github.com\/horizon3ai"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/horizon3ai\/CVE-2021-21972",
|
||||
"description": "Proof of Concept Exploit for vCenter CVE-2021-21972",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T16:31:34Z",
|
||||
"updated_at": "2021-08-22T11:59:31Z",
|
||||
"pushed_at": "2021-02-25T16:05:02Z",
|
||||
"stargazers_count": 136,
|
||||
"watchers_count": 136,
|
||||
"forks_count": 50,
|
||||
"forks": 50,
|
||||
"watchers": 136,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 342109140,
|
||||
"name": "westone-CVE-2021-21972-scanner",
|
||||
"full_name": "Osyanina\/westone-CVE-2021-21972-scanner",
|
||||
"owner": {
|
||||
"login": "Osyanina",
|
||||
"id": 78467376,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78467376?v=4",
|
||||
"html_url": "https:\/\/github.com\/Osyanina"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Osyanina\/westone-CVE-2021-21972-scanner",
|
||||
"description": "A vulnerability scanner that detects CVE-2021-21972 vulnerabilities.",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-25T03:19:25Z",
|
||||
"updated_at": "2021-03-20T07:55:11Z",
|
||||
"pushed_at": "2021-03-20T07:55:09Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 342129970,
|
||||
"name": "CVE-2021-21972",
|
||||
"full_name": "alt3kx\/CVE-2021-21972",
|
||||
"owner": {
|
||||
"login": "alt3kx",
|
||||
"id": 3140111,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
|
||||
"html_url": "https:\/\/github.com\/alt3kx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2021-21972",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-25T05:10:06Z",
|
||||
"updated_at": "2021-07-01T06:37:16Z",
|
||||
"pushed_at": "2021-02-25T05:49:19Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 52,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 342131182,
|
||||
"name": "CVE-2021-21972",
|
||||
"full_name": "milo2012\/CVE-2021-21972",
|
||||
"owner": {
|
||||
"login": "milo2012",
|
||||
"id": 905335,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/905335?v=4",
|
||||
"html_url": "https:\/\/github.com\/milo2012"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/milo2012\/CVE-2021-21972",
|
||||
"description": "CVE-2021-21972",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-25T05:16:38Z",
|
||||
"updated_at": "2021-07-22T21:16:08Z",
|
||||
"pushed_at": "2021-03-01T03:38:00Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 26,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 342132841,
|
||||
"name": "CVE-2021-21972",
|
||||
"full_name": "Udyz\/CVE-2021-21972",
|
||||
"owner": {
|
||||
"login": "Udyz",
|
||||
"id": 39673284,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39673284?v=4",
|
||||
"html_url": "https:\/\/github.com\/Udyz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Udyz\/CVE-2021-21972",
|
||||
"description": "CVE-2021-21972 vCenter-6.5-7.0 RCE POC",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-25T05:25:46Z",
|
||||
"updated_at": "2021-07-28T18:34:05Z",
|
||||
"pushed_at": "2021-02-25T05:28:16Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 342156654,
|
||||
"name": "VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972",
|
||||
"full_name": "conjojo\/VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972",
|
||||
"owner": {
|
||||
"login": "conjojo",
|
||||
"id": 79626719,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79626719?v=4",
|
||||
"html_url": "https:\/\/github.com\/conjojo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/conjojo\/VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972",
|
||||
"description": "VMware vCenter 未授权RCE(CVE-2021-21972)",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-25T07:17:21Z",
|
||||
"updated_at": "2021-03-12T10:25:10Z",
|
||||
"pushed_at": "2021-02-25T09:54:53Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 342190619,
|
||||
"name": "CVE-2021-21972",
|
||||
"full_name": "L-pin\/CVE-2021-21972",
|
||||
"owner": {
|
||||
"login": "L-pin",
|
||||
"id": 23657203,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23657203?v=4",
|
||||
"html_url": "https:\/\/github.com\/L-pin"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/L-pin\/CVE-2021-21972",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-25T09:28:17Z",
|
||||
"updated_at": "2021-02-26T01:57:28Z",
|
||||
"pushed_at": "2021-02-26T01:57:26Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 342203695,
|
||||
"name": "CVE-2021-21972",
|
||||
"full_name": "B1anda0\/CVE-2021-21972",
|
||||
"owner": {
|
||||
"login": "B1anda0",
|
||||
"id": 74232513,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74232513?v=4",
|
||||
"html_url": "https:\/\/github.com\/B1anda0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/B1anda0\/CVE-2021-21972",
|
||||
"description": "VMware vCenter Server远程代码执行漏洞 (CVE-2021-21972)批量检测脚本",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-25T10:16:20Z",
|
||||
"updated_at": "2021-03-01T01:40:37Z",
|
||||
"pushed_at": "2021-02-25T10:26:53Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 342246923,
|
||||
"name": "CVE-2021-21972",
|
||||
"full_name": "renini\/CVE-2021-21972",
|
||||
"owner": {
|
||||
"login": "renini",
|
||||
"id": 1587083,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1587083?v=4",
|
||||
"html_url": "https:\/\/github.com\/renini"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/renini\/CVE-2021-21972",
|
||||
"description": "CVE-2021-21972",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-25T13:04:37Z",
|
||||
"updated_at": "2021-07-14T14:37:02Z",
|
||||
"pushed_at": "2021-02-25T13:11:43Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 342339317,
|
||||
"name": "cve-2021-21972",
|
||||
|
@ -45,6 +321,213 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 342706243,
|
||||
"name": "CVE-2021-21972",
|
||||
"full_name": "GuayoyoCyber\/CVE-2021-21972",
|
||||
"owner": {
|
||||
"login": "GuayoyoCyber",
|
||||
"id": 17362318,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17362318?v=4",
|
||||
"html_url": "https:\/\/github.com\/GuayoyoCyber"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/GuayoyoCyber\/CVE-2021-21972",
|
||||
"description": "Nmap script to check vulnerability CVE-2021-21972",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-26T21:30:50Z",
|
||||
"updated_at": "2021-08-23T12:52:46Z",
|
||||
"pushed_at": "2021-03-03T13:54:38Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 342822880,
|
||||
"name": "Detect-CVE-2021-21972",
|
||||
"full_name": "JMousqueton\/Detect-CVE-2021-21972",
|
||||
"owner": {
|
||||
"login": "JMousqueton",
|
||||
"id": 4148567,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4148567?v=4",
|
||||
"html_url": "https:\/\/github.com\/JMousqueton"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JMousqueton\/Detect-CVE-2021-21972",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-27T09:53:57Z",
|
||||
"updated_at": "2021-02-27T10:00:17Z",
|
||||
"pushed_at": "2021-02-27T10:00:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 342829114,
|
||||
"name": "VMware_vCenter_CVE-2021-21972",
|
||||
"full_name": "robwillisinfo\/VMware_vCenter_CVE-2021-21972",
|
||||
"owner": {
|
||||
"login": "robwillisinfo",
|
||||
"id": 24982882,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24982882?v=4",
|
||||
"html_url": "https:\/\/github.com\/robwillisinfo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/robwillisinfo\/VMware_vCenter_CVE-2021-21972",
|
||||
"description": "VMware vCenter CVE-2021-21972 Tools",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-27T10:27:04Z",
|
||||
"updated_at": "2021-03-14T04:48:32Z",
|
||||
"pushed_at": "2021-02-27T10:37:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 343440136,
|
||||
"name": "vcenter_rce",
|
||||
"full_name": "gsheller\/vcenter_rce",
|
||||
"owner": {
|
||||
"login": "gsheller",
|
||||
"id": 52943794,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52943794?v=4",
|
||||
"html_url": "https:\/\/github.com\/gsheller"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gsheller\/vcenter_rce",
|
||||
"description": "漏洞利用,Vmware vCenter 6.5-7.0 RCE(CVE-2021-21972),上传冰蝎3,getshell",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-01T14:14:01Z",
|
||||
"updated_at": "2021-04-15T01:53:47Z",
|
||||
"pushed_at": "2021-03-01T14:28:30Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 343983949,
|
||||
"name": "cve-2021-21972",
|
||||
"full_name": "d3sh1n\/cve-2021-21972",
|
||||
"owner": {
|
||||
"login": "d3sh1n",
|
||||
"id": 78736442,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78736442?v=4",
|
||||
"html_url": "https:\/\/github.com\/d3sh1n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/d3sh1n\/cve-2021-21972",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-03T03:01:46Z",
|
||||
"updated_at": "2021-03-11T08:21:06Z",
|
||||
"pushed_at": "2021-03-11T08:21:04Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 344383637,
|
||||
"name": "CVE-2021-21972",
|
||||
"full_name": "ByZain\/CVE-2021-21972",
|
||||
"owner": {
|
||||
"login": "ByZain",
|
||||
"id": 62633744,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62633744?v=4",
|
||||
"html_url": "https:\/\/github.com\/ByZain"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ByZain\/CVE-2021-21972",
|
||||
"description": "CVE-2021-21972 related vulnerability code",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-04T07:14:10Z",
|
||||
"updated_at": "2021-05-22T23:17:06Z",
|
||||
"pushed_at": "2021-03-04T09:17:01Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 345396191,
|
||||
"name": "CVE-2021-21972",
|
||||
"full_name": "TaroballzChen\/CVE-2021-21972",
|
||||
"owner": {
|
||||
"login": "TaroballzChen",
|
||||
"id": 27862593,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27862593?v=4",
|
||||
"html_url": "https:\/\/github.com\/TaroballzChen"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TaroballzChen\/CVE-2021-21972",
|
||||
"description": "CVE-2021-21972 Unauthorized RCE in VMware vCenter metasploit exploit script",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-07T16:30:36Z",
|
||||
"updated_at": "2021-09-04T17:30:24Z",
|
||||
"pushed_at": "2021-03-07T17:12:55Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 354282443,
|
||||
"name": "CVE-2021-21972",
|
||||
"full_name": "password520\/CVE-2021-21972",
|
||||
"owner": {
|
||||
"login": "password520",
|
||||
"id": 29515145,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29515145?v=4",
|
||||
"html_url": "https:\/\/github.com\/password520"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/password520\/CVE-2021-21972",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-04-03T12:09:53Z",
|
||||
"updated_at": "2021-04-03T12:10:03Z",
|
||||
"pushed_at": "2021-04-03T12:10:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 355150639,
|
||||
"name": "CVE-2021-21972",
|
||||
"full_name": "murataydemir\/CVE-2021-21972",
|
||||
"owner": {
|
||||
"login": "murataydemir",
|
||||
"id": 16391655,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16391655?v=4",
|
||||
"html_url": "https:\/\/github.com\/murataydemir"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/murataydemir\/CVE-2021-21972",
|
||||
"description": "[CVE-2021-21972] VMware vSphere Client Unauthorized File Upload to Remote Code Execution (RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-06T10:38:40Z",
|
||||
"updated_at": "2021-08-19T10:39:30Z",
|
||||
"pushed_at": "2021-04-06T16:15:56Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 360539179,
|
||||
"name": "vSphereyeeter",
|
||||
|
|
25
2021/CVE-2021-21973.json
Normal file
25
2021/CVE-2021-21973.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 348167084,
|
||||
"name": "CVE-2021-21973-Automateme",
|
||||
"full_name": "freakanonymous\/CVE-2021-21973-Automateme",
|
||||
"owner": {
|
||||
"login": "freakanonymous",
|
||||
"id": 77834590,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77834590?v=4",
|
||||
"html_url": "https:\/\/github.com\/freakanonymous"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/freakanonymous\/CVE-2021-21973-Automateme",
|
||||
"description": "automate me!",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-16T00:50:15Z",
|
||||
"updated_at": "2021-05-28T06:49:36Z",
|
||||
"pushed_at": "2021-03-16T00:51:04Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 353356863,
|
||||
"name": "VMWare-vRealize-SSRF",
|
||||
"full_name": "Henry4E36\/VMWare-vRealize-SSRF",
|
||||
"owner": {
|
||||
"login": "Henry4E36",
|
||||
"id": 41940481,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41940481?v=4",
|
||||
"html_url": "https:\/\/github.com\/Henry4E36"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Henry4E36\/VMWare-vRealize-SSRF",
|
||||
"description": "VMWare vRealize SSRF-CVE-2021-21975",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-31T12:56:09Z",
|
||||
"updated_at": "2021-04-23T21:09:10Z",
|
||||
"pushed_at": "2021-04-02T08:53:39Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 353368245,
|
||||
"name": "CVE-2021-21975",
|
||||
|
@ -22,6 +45,98 @@
|
|||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 353407250,
|
||||
"name": "CVE-2021-21975",
|
||||
"full_name": "Al1ex\/CVE-2021-21975",
|
||||
"owner": {
|
||||
"login": "Al1ex",
|
||||
"id": 38161463,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
|
||||
"html_url": "https:\/\/github.com\/Al1ex"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2021-21975",
|
||||
"description": "CVE-2021-21975 vRealize Operations Manager SSRF",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-31T15:40:09Z",
|
||||
"updated_at": "2021-07-19T01:13:36Z",
|
||||
"pushed_at": "2021-03-31T15:50:27Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 353836398,
|
||||
"name": "CVE-2021-21975",
|
||||
"full_name": "GuayoyoCyber\/CVE-2021-21975",
|
||||
"owner": {
|
||||
"login": "GuayoyoCyber",
|
||||
"id": 17362318,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17362318?v=4",
|
||||
"html_url": "https:\/\/github.com\/GuayoyoCyber"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/GuayoyoCyber\/CVE-2021-21975",
|
||||
"description": "Nmap script to check vulnerability CVE-2021-21975",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-01T21:59:05Z",
|
||||
"updated_at": "2021-08-23T12:52:57Z",
|
||||
"pushed_at": "2021-04-02T00:32:15Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 354134708,
|
||||
"name": "CVE-2021-21975",
|
||||
"full_name": "murataydemir\/CVE-2021-21975",
|
||||
"owner": {
|
||||
"login": "murataydemir",
|
||||
"id": 16391655,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16391655?v=4",
|
||||
"html_url": "https:\/\/github.com\/murataydemir"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/murataydemir\/CVE-2021-21975",
|
||||
"description": "[CVE-2021-21975] VMware vRealize Operations Manager API Server Side Request Forgery (SSRF)",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-02T21:14:06Z",
|
||||
"updated_at": "2021-08-07T14:04:13Z",
|
||||
"pushed_at": "2021-04-02T23:06:48Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 355355329,
|
||||
"name": "REALITY_SMASHER",
|
||||
"full_name": "rabidwh0re\/REALITY_SMASHER",
|
||||
"owner": {
|
||||
"login": "rabidwh0re",
|
||||
"id": 8302932,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8302932?v=4",
|
||||
"html_url": "https:\/\/github.com\/rabidwh0re"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rabidwh0re\/REALITY_SMASHER",
|
||||
"description": "vRealize RCE + Privesc (CVE-2021-21975, CVE-2021-21983, CVE-0DAY-?????)",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-06T23:24:38Z",
|
||||
"updated_at": "2021-07-30T23:16:34Z",
|
||||
"pushed_at": "2021-04-07T03:10:07Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 25,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 356577164,
|
||||
"name": "VMWare-CVE-2021-21975",
|
||||
|
|
71
2021/CVE-2021-21978.json
Normal file
71
2021/CVE-2021-21978.json
Normal file
|
@ -0,0 +1,71 @@
|
|||
[
|
||||
{
|
||||
"id": 344688633,
|
||||
"name": "CVE-2021-21978",
|
||||
"full_name": "GreyOrder\/CVE-2021-21978",
|
||||
"owner": {
|
||||
"login": "GreyOrder",
|
||||
"id": 39576135,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39576135?v=4",
|
||||
"html_url": "https:\/\/github.com\/GreyOrder"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/GreyOrder\/CVE-2021-21978",
|
||||
"description": "CVE-2021-21978 exp",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-05T03:58:33Z",
|
||||
"updated_at": "2021-04-17T19:09:20Z",
|
||||
"pushed_at": "2021-03-05T04:22:26Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 344694759,
|
||||
"name": "CVE-2021-21978",
|
||||
"full_name": "me1ons\/CVE-2021-21978",
|
||||
"owner": {
|
||||
"login": "me1ons",
|
||||
"id": 36701939,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36701939?v=4",
|
||||
"html_url": "https:\/\/github.com\/me1ons"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/me1ons\/CVE-2021-21978",
|
||||
"description": "CVE-2021-21978 EXP",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-05T04:33:19Z",
|
||||
"updated_at": "2021-05-27T17:55:37Z",
|
||||
"pushed_at": "2021-03-05T04:42:17Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 344740961,
|
||||
"name": "CVE-2021-21978",
|
||||
"full_name": "skytina\/CVE-2021-21978",
|
||||
"owner": {
|
||||
"login": "skytina",
|
||||
"id": 7366310,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7366310?v=4",
|
||||
"html_url": "https:\/\/github.com\/skytina"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/skytina\/CVE-2021-21978",
|
||||
"description": "带回显版本的漏洞利用脚本",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-05T08:15:27Z",
|
||||
"updated_at": "2021-06-29T14:05:46Z",
|
||||
"pushed_at": "2021-03-05T11:09:06Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
}
|
||||
]
|
232
2021/CVE-2021-22986.json
Normal file
232
2021/CVE-2021-22986.json
Normal file
|
@ -0,0 +1,232 @@
|
|||
[
|
||||
{
|
||||
"id": 348585275,
|
||||
"name": "CVE-2021-22986-Poc",
|
||||
"full_name": "dorkerdevil\/CVE-2021-22986-Poc",
|
||||
"owner": {
|
||||
"login": "dorkerdevil",
|
||||
"id": 15796745,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15796745?v=4",
|
||||
"html_url": "https:\/\/github.com\/dorkerdevil"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dorkerdevil\/CVE-2021-22986-Poc",
|
||||
"description": "This is a Poc for BIGIP iControl unauth RCE ",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-17T05:02:45Z",
|
||||
"updated_at": "2021-08-29T11:49:59Z",
|
||||
"pushed_at": "2021-03-17T05:10:03Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 349525234,
|
||||
"name": "f5_rce_poc",
|
||||
"full_name": "S1xHcL\/f5_rce_poc",
|
||||
"owner": {
|
||||
"login": "S1xHcL",
|
||||
"id": 47764705,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47764705?v=4",
|
||||
"html_url": "https:\/\/github.com\/S1xHcL"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/S1xHcL\/f5_rce_poc",
|
||||
"description": "cve-2021-22986 f5 rce 漏洞批量检测 poc",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-19T18:50:22Z",
|
||||
"updated_at": "2021-08-04T21:24:58Z",
|
||||
"pushed_at": "2021-03-27T10:02:59Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 349660227,
|
||||
"name": "westone-CVE-2021-22986-scanner",
|
||||
"full_name": "Osyanina\/westone-CVE-2021-22986-scanner",
|
||||
"owner": {
|
||||
"login": "Osyanina",
|
||||
"id": 78467376,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78467376?v=4",
|
||||
"html_url": "https:\/\/github.com\/Osyanina"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Osyanina\/westone-CVE-2021-22986-scanner",
|
||||
"description": "A vulnerability scanner that detects CVE-2021-22986 vulnerabilities.",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-20T07:45:38Z",
|
||||
"updated_at": "2021-03-20T07:46:00Z",
|
||||
"pushed_at": "2021-03-21T03:39:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 349903906,
|
||||
"name": "CVE-2021-22986-SSRF2RCE",
|
||||
"full_name": "Udyz\/CVE-2021-22986-SSRF2RCE",
|
||||
"owner": {
|
||||
"login": "Udyz",
|
||||
"id": 39673284,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39673284?v=4",
|
||||
"html_url": "https:\/\/github.com\/Udyz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Udyz\/CVE-2021-22986-SSRF2RCE",
|
||||
"description": "F5 BIG-IP\/BIG-IQ iControl Rest API SSRF to RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-21T04:58:17Z",
|
||||
"updated_at": "2021-08-25T12:36:09Z",
|
||||
"pushed_at": "2021-03-24T11:49:37Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 349930753,
|
||||
"name": "F5_RCE",
|
||||
"full_name": "safesword\/F5_RCE",
|
||||
"owner": {
|
||||
"login": "safesword",
|
||||
"id": 79968310,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79968310?v=4",
|
||||
"html_url": "https:\/\/github.com\/safesword"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/safesword\/F5_RCE",
|
||||
"description": "CVE-2021-22986 F5 BIG-IP iControl 命令执行漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-21T07:40:51Z",
|
||||
"updated_at": "2021-07-20T20:19:13Z",
|
||||
"pushed_at": "2021-03-21T07:40:59Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 350243656,
|
||||
"name": "CVE-2021-22986",
|
||||
"full_name": "Al1ex\/CVE-2021-22986",
|
||||
"owner": {
|
||||
"login": "Al1ex",
|
||||
"id": 38161463,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
|
||||
"html_url": "https:\/\/github.com\/Al1ex"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2021-22986",
|
||||
"description": "CVE-2021-22986 & F5 BIG-IP RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-22T07:13:50Z",
|
||||
"updated_at": "2021-09-02T20:16:58Z",
|
||||
"pushed_at": "2021-04-03T12:56:37Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 59,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 350550235,
|
||||
"name": "CVE-2021-22986_Check",
|
||||
"full_name": "ZephrFish\/CVE-2021-22986_Check",
|
||||
"owner": {
|
||||
"login": "ZephrFish",
|
||||
"id": 5783068,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4",
|
||||
"html_url": "https:\/\/github.com\/ZephrFish"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ZephrFish\/CVE-2021-22986_Check",
|
||||
"description": "CVE-2021-22986 Checker Script in Python3",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-23T02:04:39Z",
|
||||
"updated_at": "2021-05-21T00:55:58Z",
|
||||
"pushed_at": "2021-03-23T02:07:30Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 351650917,
|
||||
"name": "CVE-202122986-EXP",
|
||||
"full_name": "yaunsky\/CVE-202122986-EXP",
|
||||
"owner": {
|
||||
"login": "yaunsky",
|
||||
"id": 48243087,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48243087?v=4",
|
||||
"html_url": "https:\/\/github.com\/yaunsky"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yaunsky\/CVE-202122986-EXP",
|
||||
"description": "F5 BIG-IP远程代码执行;cve-2021-22986,批量检测;命令执行利用",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-26T03:32:06Z",
|
||||
"updated_at": "2021-06-30T13:49:42Z",
|
||||
"pushed_at": "2021-03-26T05:09:54Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 352531717,
|
||||
"name": "CVE-2021-22986",
|
||||
"full_name": "Tas9er\/CVE-2021-22986",
|
||||
"owner": {
|
||||
"login": "Tas9er",
|
||||
"id": 57090266,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57090266?v=4",
|
||||
"html_url": "https:\/\/github.com\/Tas9er"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Tas9er\/CVE-2021-22986",
|
||||
"description": "Code By:Tas9er \/ F5 BIG-IP 远程命令执行漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-29T05:56:21Z",
|
||||
"updated_at": "2021-08-09T07:35:37Z",
|
||||
"pushed_at": "2021-03-29T05:58:51Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 352644816,
|
||||
"name": "CVE-2021-22986",
|
||||
"full_name": "dotslashed\/CVE-2021-22986",
|
||||
"owner": {
|
||||
"login": "dotslashed",
|
||||
"id": 73475291,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73475291?v=4",
|
||||
"html_url": "https:\/\/github.com\/dotslashed"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dotslashed\/CVE-2021-22986",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-29T13:01:08Z",
|
||||
"updated_at": "2021-03-29T13:04:49Z",
|
||||
"pushed_at": "2021-03-29T13:04:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-23132.json
Normal file
25
2021/CVE-2021-23132.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 343973725,
|
||||
"name": "CVE-2021-23132",
|
||||
"full_name": "HoangKien1020\/CVE-2021-23132",
|
||||
"owner": {
|
||||
"login": "HoangKien1020",
|
||||
"id": 24661746,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24661746?v=4",
|
||||
"html_url": "https:\/\/github.com\/HoangKien1020"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/HoangKien1020\/CVE-2021-23132",
|
||||
"description": "com_media allowed paths that are not intended for image uploads to RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-03T02:13:57Z",
|
||||
"updated_at": "2021-08-25T07:30:54Z",
|
||||
"pushed_at": "2021-03-03T03:52:10Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 62,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-24085.json
Normal file
25
2021/CVE-2021-24085.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 339107043,
|
||||
"name": "CVE-2021-24085",
|
||||
"full_name": "sourceincite\/CVE-2021-24085",
|
||||
"owner": {
|
||||
"login": "sourceincite",
|
||||
"id": 13770985,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13770985?v=4",
|
||||
"html_url": "https:\/\/github.com\/sourceincite"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sourceincite\/CVE-2021-24085",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-15T14:41:25Z",
|
||||
"updated_at": "2021-07-02T18:14:28Z",
|
||||
"pushed_at": "2021-02-15T15:11:00Z",
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 58,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-24086.json
Normal file
25
2021/CVE-2021-24086.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 355514476,
|
||||
"name": "CVE-2021-24086",
|
||||
"full_name": "0vercl0k\/CVE-2021-24086",
|
||||
"owner": {
|
||||
"login": "0vercl0k",
|
||||
"id": 1476421,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1476421?v=4",
|
||||
"html_url": "https:\/\/github.com\/0vercl0k"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0vercl0k\/CVE-2021-24086",
|
||||
"description": "Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-07T11:10:40Z",
|
||||
"updated_at": "2021-09-01T01:46:08Z",
|
||||
"pushed_at": "2021-04-15T12:46:54Z",
|
||||
"stargazers_count": 186,
|
||||
"watchers_count": 186,
|
||||
"forks_count": 45,
|
||||
"forks": 45,
|
||||
"watchers": 186,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-24096.json
Normal file
25
2021/CVE-2021-24096.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 338023596,
|
||||
"name": "CVE-2021-24096",
|
||||
"full_name": "FunPhishing\/CVE-2021-24096",
|
||||
"owner": {
|
||||
"login": "FunPhishing",
|
||||
"id": 77312720,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77312720?v=4",
|
||||
"html_url": "https:\/\/github.com\/FunPhishing"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/FunPhishing\/CVE-2021-24096",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-11T12:32:34Z",
|
||||
"updated_at": "2021-03-05T10:54:03Z",
|
||||
"pushed_at": "2021-02-11T12:33:02Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-24098.json
Normal file
25
2021/CVE-2021-24098.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 353613611,
|
||||
"name": "CVE-2021-24098",
|
||||
"full_name": "waleedassar\/CVE-2021-24098",
|
||||
"owner": {
|
||||
"login": "waleedassar",
|
||||
"id": 5983995,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5983995?v=4",
|
||||
"html_url": "https:\/\/github.com\/waleedassar"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/waleedassar\/CVE-2021-24098",
|
||||
"description": "POC for CVE-2021-24098",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-01T07:29:44Z",
|
||||
"updated_at": "2021-08-18T02:31:08Z",
|
||||
"pushed_at": "2021-04-01T07:34:23Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 342564562,
|
||||
"name": "CVE-2021-25281",
|
||||
"full_name": "Immersive-Labs-Sec\/CVE-2021-25281",
|
||||
"owner": {
|
||||
"login": "Immersive-Labs-Sec",
|
||||
"id": 79456607,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79456607?v=4",
|
||||
"html_url": "https:\/\/github.com\/Immersive-Labs-Sec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Immersive-Labs-Sec\/CVE-2021-25281",
|
||||
"description": "Chaining CVE-2021-25281 and CVE-2021-25282 to exploit a SaltStack",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-26T12:08:25Z",
|
||||
"updated_at": "2021-06-01T06:31:58Z",
|
||||
"pushed_at": "2021-03-06T12:50:35Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 359022063,
|
||||
"name": "CVE-2021-25281",
|
||||
|
|
|
@ -1,4 +1,73 @@
|
|||
[
|
||||
{
|
||||
"id": 335501856,
|
||||
"name": "cve-2021-25646",
|
||||
"full_name": "yaunsky\/cve-2021-25646",
|
||||
"owner": {
|
||||
"login": "yaunsky",
|
||||
"id": 48243087,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48243087?v=4",
|
||||
"html_url": "https:\/\/github.com\/yaunsky"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yaunsky\/cve-2021-25646",
|
||||
"description": "Apache Druid 远程代码执行;检测脚本",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-03T03:59:52Z",
|
||||
"updated_at": "2021-05-11T13:46:24Z",
|
||||
"pushed_at": "2021-02-03T06:06:24Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 335533066,
|
||||
"name": "CVE-2021-25646",
|
||||
"full_name": "lp008\/CVE-2021-25646",
|
||||
"owner": {
|
||||
"login": "lp008",
|
||||
"id": 11436275,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11436275?v=4",
|
||||
"html_url": "https:\/\/github.com\/lp008"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lp008\/CVE-2021-25646",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-03T06:45:54Z",
|
||||
"updated_at": "2021-02-04T01:40:33Z",
|
||||
"pushed_at": "2021-02-03T06:53:25Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 335952760,
|
||||
"name": "CVE-2021-25646-GUI",
|
||||
"full_name": "AirEvan\/CVE-2021-25646-GUI",
|
||||
"owner": {
|
||||
"login": "AirEvan",
|
||||
"id": 26640179,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26640179?v=4",
|
||||
"html_url": "https:\/\/github.com\/AirEvan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AirEvan\/CVE-2021-25646-GUI",
|
||||
"description": "CSharp CVE-2021-25646-GUI",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-04T12:51:01Z",
|
||||
"updated_at": "2021-02-05T03:55:00Z",
|
||||
"pushed_at": "2021-02-05T03:54:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 338562736,
|
||||
"name": "Apache-Druid-CVE-2021-25646",
|
||||
|
@ -44,5 +113,28 @@
|
|||
"forks": 267,
|
||||
"watchers": 842,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 357955989,
|
||||
"name": "CVE-2021-25646",
|
||||
"full_name": "givemefivw\/CVE-2021-25646",
|
||||
"owner": {
|
||||
"login": "givemefivw",
|
||||
"id": 65514141,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65514141?v=4",
|
||||
"html_url": "https:\/\/github.com\/givemefivw"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/givemefivw\/CVE-2021-25646",
|
||||
"description": "CVE-2021-25646 Apache Druid 远程代码执行漏洞 Wker脚本",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-14T15:36:04Z",
|
||||
"updated_at": "2021-04-22T07:56:07Z",
|
||||
"pushed_at": "2021-04-15T09:55:23Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-08-31T23:33:44Z",
|
||||
"updated_at": "2021-09-05T00:22:55Z",
|
||||
"updated_at": "2021-09-05T03:28:22Z",
|
||||
"pushed_at": "2021-09-01T01:01:06Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 29,
|
||||
"watchers": 30,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-09-01T00:50:30Z",
|
||||
"updated_at": "2021-09-04T17:43:59Z",
|
||||
"updated_at": "2021-09-05T06:35:26Z",
|
||||
"pushed_at": "2021-09-01T01:17:58Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 37,
|
||||
"watchers": 41,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "Confluence Server Webwork OGNL injection",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-01T07:15:17Z",
|
||||
"updated_at": "2021-09-05T01:25:22Z",
|
||||
"updated_at": "2021-09-05T08:02:44Z",
|
||||
"pushed_at": "2021-09-04T22:14:46Z",
|
||||
"stargazers_count": 177,
|
||||
"watchers_count": 177,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 177,
|
||||
"stargazers_count": 179,
|
||||
"watchers_count": 179,
|
||||
"forks_count": 38,
|
||||
"forks": 38,
|
||||
"watchers": 179,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -473,13 +473,13 @@
|
|||
"description": "Confluence OGNL Injection [CVE-2021-26084].",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-04T13:32:42Z",
|
||||
"updated_at": "2021-09-04T15:47:31Z",
|
||||
"updated_at": "2021-09-05T05:07:26Z",
|
||||
"pushed_at": "2021-09-04T13:57:08Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2021/CVE-2021-26119.json
Normal file
25
2021/CVE-2021-26119.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 343119938,
|
||||
"name": "CVE-2021-26119",
|
||||
"full_name": "Udyz\/CVE-2021-26119",
|
||||
"owner": {
|
||||
"login": "Udyz",
|
||||
"id": 39673284,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39673284?v=4",
|
||||
"html_url": "https:\/\/github.com\/Udyz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Udyz\/CVE-2021-26119",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-28T14:05:23Z",
|
||||
"updated_at": "2021-07-28T18:33:03Z",
|
||||
"pushed_at": "2021-02-28T14:25:25Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,50 @@
|
|||
[
|
||||
{
|
||||
"id": 350761950,
|
||||
"name": "CVE-2021-26295",
|
||||
"full_name": "yumusb\/CVE-2021-26295",
|
||||
"owner": {
|
||||
"login": "yumusb",
|
||||
"id": 43062104,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43062104?v=4",
|
||||
"html_url": "https:\/\/github.com\/yumusb"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yumusb\/CVE-2021-26295",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-23T15:25:01Z",
|
||||
"updated_at": "2021-08-04T21:24:34Z",
|
||||
"pushed_at": "2021-04-01T10:38:18Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 25,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 351001241,
|
||||
"name": "CVE-2021-26295-Apache-OFBiz",
|
||||
"full_name": "rakjong\/CVE-2021-26295-Apache-OFBiz",
|
||||
"owner": {
|
||||
"login": "rakjong",
|
||||
"id": 38517715,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38517715?v=4",
|
||||
"html_url": "https:\/\/github.com\/rakjong"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rakjong\/CVE-2021-26295-Apache-OFBiz",
|
||||
"description": "CVE-2021-26295 Apache OFBiz rmi反序列化POC",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-24T08:25:04Z",
|
||||
"updated_at": "2021-04-28T06:38:16Z",
|
||||
"pushed_at": "2021-03-24T09:01:11Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 351031477,
|
||||
"name": "CVE-2021-26295",
|
||||
|
@ -22,6 +68,29 @@
|
|||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 356332111,
|
||||
"name": "CVE-2021-26295--",
|
||||
"full_name": "coolyin001\/CVE-2021-26295--",
|
||||
"owner": {
|
||||
"login": "coolyin001",
|
||||
"id": 82075508,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82075508?v=4",
|
||||
"html_url": "https:\/\/github.com\/coolyin001"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/coolyin001\/CVE-2021-26295--",
|
||||
"description": "CVE-2021-26295-POC 利用DNSlog进行CVE-2021-26295的漏洞验证。 使用 poc:将目标放于target.txt后运行python poc.py即可。(Jdk环境需<12,否则ysoserial无法正常生成有效载荷) exp:python exp.py https:\/\/baidu.com然后进入命令执行界面(无回显)",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-09T16:20:18Z",
|
||||
"updated_at": "2021-04-09T16:20:21Z",
|
||||
"pushed_at": "2021-04-09T16:22:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 357860150,
|
||||
"name": "CVE-2021-26295-Apache-OFBiz-EXP",
|
||||
|
|
25
2021/CVE-2021-26700.json
Normal file
25
2021/CVE-2021-26700.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 338818030,
|
||||
"name": "CVE-2021-26700",
|
||||
"full_name": "jackadamson\/CVE-2021-26700",
|
||||
"owner": {
|
||||
"login": "jackadamson",
|
||||
"id": 7891953,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7891953?v=4",
|
||||
"html_url": "https:\/\/github.com\/jackadamson"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jackadamson\/CVE-2021-26700",
|
||||
"description": "RCE in NPM VSCode Extension",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-14T14:01:04Z",
|
||||
"updated_at": "2021-04-11T13:45:13Z",
|
||||
"pushed_at": "2021-04-11T13:45:11Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-26708.json
Normal file
25
2021/CVE-2021-26708.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 339197991,
|
||||
"name": "vsock_poc",
|
||||
"full_name": "jordan9001\/vsock_poc",
|
||||
"owner": {
|
||||
"login": "jordan9001",
|
||||
"id": 10539462,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10539462?v=4",
|
||||
"html_url": "https:\/\/github.com\/jordan9001"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jordan9001\/vsock_poc",
|
||||
"description": "Investigating the bug behind CVE-2021-26708",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-15T20:27:06Z",
|
||||
"updated_at": "2021-07-06T08:26:14Z",
|
||||
"pushed_at": "2021-02-16T03:03:54Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-26832.json
Normal file
25
2021/CVE-2021-26832.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 357423084,
|
||||
"name": "CVE-2021-26832",
|
||||
"full_name": "NagliNagli\/CVE-2021-26832",
|
||||
"owner": {
|
||||
"login": "NagliNagli",
|
||||
"id": 35578316,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35578316?v=4",
|
||||
"html_url": "https:\/\/github.com\/NagliNagli"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/NagliNagli\/CVE-2021-26832",
|
||||
"description": "Cross Site Scripting (XSS) at the \"Reset Password\" page form of Priority Enterprise Management System v8.00 allows attackers to execute javascript on behalf of the victim by sending a malicious URL or directing the victim to a malicious site.",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-13T04:25:31Z",
|
||||
"updated_at": "2021-06-21T19:18:40Z",
|
||||
"pushed_at": "2021-04-13T04:26:25Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,441 @@
|
|||
[
|
||||
{
|
||||
"id": 344161221,
|
||||
"name": "exchange-0days-202103",
|
||||
"full_name": "sgnls\/exchange-0days-202103",
|
||||
"owner": {
|
||||
"login": "sgnls",
|
||||
"id": 11134228,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11134228?v=4",
|
||||
"html_url": "https:\/\/github.com\/sgnls"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sgnls\/exchange-0days-202103",
|
||||
"description": "IoC determination for exploitation of CVE-2021-26855, CVE-2021-26857, CVE-2021-26858 and CVE-2021-27065.",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-03T14:50:16Z",
|
||||
"updated_at": "2021-08-14T03:38:35Z",
|
||||
"pushed_at": "2021-03-15T11:42:06Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 344210374,
|
||||
"name": "HAFNIUM-IOC",
|
||||
"full_name": "soteria-security\/HAFNIUM-IOC",
|
||||
"owner": {
|
||||
"login": "soteria-security",
|
||||
"id": 49722282,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49722282?v=4",
|
||||
"html_url": "https:\/\/github.com\/soteria-security"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/soteria-security\/HAFNIUM-IOC",
|
||||
"description": "A PowerShell script to identify indicators of exploitation of CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-26865",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-03T17:36:18Z",
|
||||
"updated_at": "2021-08-14T03:36:25Z",
|
||||
"pushed_at": "2021-03-05T17:09:01Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 344742582,
|
||||
"name": "exchange_webshell_detection",
|
||||
"full_name": "cert-lv\/exchange_webshell_detection",
|
||||
"owner": {
|
||||
"login": "cert-lv",
|
||||
"id": 22764485,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22764485?v=4",
|
||||
"html_url": "https:\/\/github.com\/cert-lv"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cert-lv\/exchange_webshell_detection",
|
||||
"description": "Detect webshells dropped on Microsoft Exchange servers exploited through \"proxylogon\" group of vulnerabilites (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065)",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-05T08:22:07Z",
|
||||
"updated_at": "2021-09-02T12:40:06Z",
|
||||
"pushed_at": "2021-03-16T08:34:14Z",
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 92,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 345052378,
|
||||
"name": "Microsoft_Exchange_Server_SSRF_CVE-2021-26855",
|
||||
"full_name": "conjojo\/Microsoft_Exchange_Server_SSRF_CVE-2021-26855",
|
||||
"owner": {
|
||||
"login": "conjojo",
|
||||
"id": 79626719,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79626719?v=4",
|
||||
"html_url": "https:\/\/github.com\/conjojo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/conjojo\/Microsoft_Exchange_Server_SSRF_CVE-2021-26855",
|
||||
"description": "Microsoft Exchange Server SSRF漏洞(CVE-2021-26855)",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-06T09:15:55Z",
|
||||
"updated_at": "2021-07-11T05:29:11Z",
|
||||
"pushed_at": "2021-03-06T10:34:49Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 345173055,
|
||||
"name": "CVE-2021-26855-SSRF",
|
||||
"full_name": "pussycat0x\/CVE-2021-26855-SSRF",
|
||||
"owner": {
|
||||
"login": "pussycat0x",
|
||||
"id": 65701233,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65701233?v=4",
|
||||
"html_url": "https:\/\/github.com\/pussycat0x"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pussycat0x\/CVE-2021-26855-SSRF",
|
||||
"description": "This script helps to identify CVE-2021-26855 ssrf Poc",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-06T19:03:00Z",
|
||||
"updated_at": "2021-07-11T05:29:17Z",
|
||||
"pushed_at": "2021-03-10T07:41:56Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 345215022,
|
||||
"name": "CVE-2021-26855",
|
||||
"full_name": "0xAbdullah\/CVE-2021-26855",
|
||||
"owner": {
|
||||
"login": "0xAbdullah",
|
||||
"id": 29471278,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29471278?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xAbdullah"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xAbdullah\/CVE-2021-26855",
|
||||
"description": "PoC for CVE-2021-26855 -Just a checker-",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-06T23:12:22Z",
|
||||
"updated_at": "2021-08-30T06:33:27Z",
|
||||
"pushed_at": "2021-03-09T22:07:46Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 345228496,
|
||||
"name": "CVE-2021-26855-SSRF-Exchange",
|
||||
"full_name": "Th3eCrow\/CVE-2021-26855-SSRF-Exchange",
|
||||
"owner": {
|
||||
"login": "Th3eCrow",
|
||||
"id": 10507748,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10507748?v=4",
|
||||
"html_url": "https:\/\/github.com\/Th3eCrow"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Th3eCrow\/CVE-2021-26855-SSRF-Exchange",
|
||||
"description": "CVE-2021-26855 SSRF Exchange Server",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-07T00:55:16Z",
|
||||
"updated_at": "2021-03-10T04:02:32Z",
|
||||
"pushed_at": "2021-03-06T18:57:43Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 345337490,
|
||||
"name": "exchange_proxylogon",
|
||||
"full_name": "mekhalleh\/exchange_proxylogon",
|
||||
"owner": {
|
||||
"login": "mekhalleh",
|
||||
"id": 5225129,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5225129?v=4",
|
||||
"html_url": "https:\/\/github.com\/mekhalleh"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mekhalleh\/exchange_proxylogon",
|
||||
"description": "Module pack for #ProxyLogon (part. of my contribute for Metasploit-Framework) [CVE-2021-26855 && CVE-2021-27065]",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-07T12:12:16Z",
|
||||
"updated_at": "2021-06-05T15:06:28Z",
|
||||
"pushed_at": "2021-03-29T08:42:01Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 345567206,
|
||||
"name": "CVE-2021-26855_SSRF",
|
||||
"full_name": "Yt1g3r\/CVE-2021-26855_SSRF",
|
||||
"owner": {
|
||||
"login": "Yt1g3r",
|
||||
"id": 12625147,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12625147?v=4",
|
||||
"html_url": "https:\/\/github.com\/Yt1g3r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Yt1g3r\/CVE-2021-26855_SSRF",
|
||||
"description": "POC of CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-26865, ProxyLogon poc",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-08T07:28:21Z",
|
||||
"updated_at": "2021-03-12T16:16:04Z",
|
||||
"pushed_at": "2021-03-11T03:28:47Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 345586288,
|
||||
"name": "CVE-2021-26855",
|
||||
"full_name": "charlottelatest\/CVE-2021-26855",
|
||||
"owner": {
|
||||
"login": "charlottelatest",
|
||||
"id": 34669056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34669056?v=4",
|
||||
"html_url": "https:\/\/github.com\/charlottelatest"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/charlottelatest\/CVE-2021-26855",
|
||||
"description": "CVE-2021-26855 exp",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-08T08:39:05Z",
|
||||
"updated_at": "2021-09-01T09:23:11Z",
|
||||
"pushed_at": "2021-03-08T08:09:01Z",
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"forks_count": 73,
|
||||
"forks": 73,
|
||||
"watchers": 100,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 345639477,
|
||||
"name": "proxylogscan",
|
||||
"full_name": "dwisiswant0\/proxylogscan",
|
||||
"owner": {
|
||||
"login": "dwisiswant0",
|
||||
"id": 25837540,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25837540?v=4",
|
||||
"html_url": "https:\/\/github.com\/dwisiswant0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dwisiswant0\/proxylogscan",
|
||||
"description": "A fast tool to mass scan for a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin (CVE-2021-26855).",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-08T11:54:32Z",
|
||||
"updated_at": "2021-08-27T17:09:30Z",
|
||||
"pushed_at": "2021-03-17T11:21:52Z",
|
||||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 130,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 345955330,
|
||||
"name": "ExchangeWeaknessTest",
|
||||
"full_name": "mauricelambert\/ExchangeWeaknessTest",
|
||||
"owner": {
|
||||
"login": "mauricelambert",
|
||||
"id": 50479118,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4",
|
||||
"html_url": "https:\/\/github.com\/mauricelambert"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mauricelambert\/ExchangeWeaknessTest",
|
||||
"description": "This script test the CVE-2021-26855 vulnerability on Exchange Server.",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-09T09:40:29Z",
|
||||
"updated_at": "2021-03-09T09:43:55Z",
|
||||
"pushed_at": "2021-03-09T09:42:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 345970212,
|
||||
"name": "Exchange_IOC_Hunter",
|
||||
"full_name": "DCScoder\/Exchange_IOC_Hunter",
|
||||
"owner": {
|
||||
"login": "DCScoder",
|
||||
"id": 42096735,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42096735?v=4",
|
||||
"html_url": "https:\/\/github.com\/DCScoder"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DCScoder\/Exchange_IOC_Hunter",
|
||||
"description": "CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-09T10:36:44Z",
|
||||
"updated_at": "2021-03-17T10:22:07Z",
|
||||
"pushed_at": "2021-03-17T10:22:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 346033440,
|
||||
"name": "CVE-2021-26855-PoC",
|
||||
"full_name": "srvaccount\/CVE-2021-26855-PoC",
|
||||
"owner": {
|
||||
"login": "srvaccount",
|
||||
"id": 76211832,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76211832?v=4",
|
||||
"html_url": "https:\/\/github.com\/srvaccount"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/srvaccount\/CVE-2021-26855-PoC",
|
||||
"description": "PoC exploit code for CVE-2021-26855",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-09T14:27:06Z",
|
||||
"updated_at": "2021-08-30T06:27:23Z",
|
||||
"pushed_at": "2021-03-09T21:59:53Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 346078570,
|
||||
"name": "CVE-2021-26855",
|
||||
"full_name": "h4x0r-dz\/CVE-2021-26855",
|
||||
"owner": {
|
||||
"login": "h4x0r-dz",
|
||||
"id": 26070859,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26070859?v=4",
|
||||
"html_url": "https:\/\/github.com\/h4x0r-dz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/h4x0r-dz\/CVE-2021-26855",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-09T16:54:39Z",
|
||||
"updated_at": "2021-08-24T07:34:14Z",
|
||||
"pushed_at": "2021-03-09T16:56:09Z",
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"forks_count": 59,
|
||||
"forks": 59,
|
||||
"watchers": 88,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 346241102,
|
||||
"name": "CVE-2021-26855_PoC",
|
||||
"full_name": "alt3kx\/CVE-2021-26855_PoC",
|
||||
"owner": {
|
||||
"login": "alt3kx",
|
||||
"id": 3140111,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
|
||||
"html_url": "https:\/\/github.com\/alt3kx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2021-26855_PoC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-10T05:21:19Z",
|
||||
"updated_at": "2021-07-28T08:54:02Z",
|
||||
"pushed_at": "2021-03-12T16:19:50Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 346347325,
|
||||
"name": "CVE-2021-26855",
|
||||
"full_name": "achabahe\/CVE-2021-26855",
|
||||
"owner": {
|
||||
"login": "achabahe",
|
||||
"id": 12010973,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12010973?v=4",
|
||||
"html_url": "https:\/\/github.com\/achabahe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/achabahe\/CVE-2021-26855",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-10T12:23:43Z",
|
||||
"updated_at": "2021-03-12T08:21:02Z",
|
||||
"pushed_at": "2021-03-10T12:46:41Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 346816198,
|
||||
"name": "CVE-2021-26855",
|
||||
"full_name": "raheel0x01\/CVE-2021-26855",
|
||||
"owner": {
|
||||
"login": "raheel0x01",
|
||||
"id": 65211256,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65211256?v=4",
|
||||
"html_url": "https:\/\/github.com\/raheel0x01"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/raheel0x01\/CVE-2021-26855",
|
||||
"description": "CVE-2021-26855, also known as Proxylogon, is a server-side request forgery (SSRF) vulnerability in Exchange that allows an attacker to send arbitrary HTTP requests and authenticate as the Exchange server. According to Orange Tsai, the researcher who discovered the vulnerabilities, CVE-2021-26855 allows code execution when chained with CVE-2021-27065 (see below). A successful exploit chain would allow an unauthenticated attacker to \"execute arbitrary commands on Microsoft Exchange Server through only an open 443 port.\" More information and a disclosure timeline are available at https:\/\/proxylogon.com.",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T19:35:35Z",
|
||||
"updated_at": "2021-08-05T14:04:11Z",
|
||||
"pushed_at": "2021-03-14T23:51:37Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 346834084,
|
||||
"name": "CVE-2021-26855",
|
||||
"full_name": "hackerschoice\/CVE-2021-26855",
|
||||
"owner": {
|
||||
"login": "hackerschoice",
|
||||
"id": 57636453,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57636453?v=4",
|
||||
"html_url": "https:\/\/github.com\/hackerschoice"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hackerschoice\/CVE-2021-26855",
|
||||
"description": "PoC of proxylogon chain SSRF(CVE-2021-26855) to write file by testanull, censored by github",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T20:51:48Z",
|
||||
"updated_at": "2021-08-08T01:05:22Z",
|
||||
"pushed_at": "2021-03-11T20:58:08Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 346840803,
|
||||
"name": "HAFNIUM-Microsoft-Exchange-0day",
|
||||
|
@ -22,6 +459,29 @@
|
|||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 347064151,
|
||||
"name": "CVE-2021-26855-Scanner",
|
||||
"full_name": "KotSec\/CVE-2021-26855-Scanner",
|
||||
"owner": {
|
||||
"login": "KotSec",
|
||||
"id": 80525807,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80525807?v=4",
|
||||
"html_url": "https:\/\/github.com\/KotSec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/KotSec\/CVE-2021-26855-Scanner",
|
||||
"description": "Scanner and PoC for CVE-2021-26855 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-12T12:47:41Z",
|
||||
"updated_at": "2021-03-15T23:37:29Z",
|
||||
"pushed_at": "2021-03-12T12:55:57Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 347638787,
|
||||
"name": "proxylogon",
|
||||
|
@ -45,6 +505,98 @@
|
|||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 347658157,
|
||||
"name": "Exch-CVE-2021-26855",
|
||||
"full_name": "ZephrFish\/Exch-CVE-2021-26855",
|
||||
"owner": {
|
||||
"login": "ZephrFish",
|
||||
"id": 5783068,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4",
|
||||
"html_url": "https:\/\/github.com\/ZephrFish"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ZephrFish\/Exch-CVE-2021-26855",
|
||||
"description": "CVE-2021-26855: PoC (Not a HoneyPoC for once!)",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-14T14:23:34Z",
|
||||
"updated_at": "2021-08-22T13:58:07Z",
|
||||
"pushed_at": "2021-03-15T18:56:38Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 347774757,
|
||||
"name": "ProxyLogon-CVE-2021-26855",
|
||||
"full_name": "mil1200\/ProxyLogon-CVE-2021-26855",
|
||||
"owner": {
|
||||
"login": "mil1200",
|
||||
"id": 18125445,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18125445?v=4",
|
||||
"html_url": "https:\/\/github.com\/mil1200"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mil1200\/ProxyLogon-CVE-2021-26855",
|
||||
"description": "RCE exploit for ProxyLogon vulnerability in Microsoft Exchange",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-14T22:57:21Z",
|
||||
"updated_at": "2021-08-05T03:49:48Z",
|
||||
"pushed_at": "2021-03-14T23:03:12Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 347900434,
|
||||
"name": "ExchangeSSRFtoRCEExploit",
|
||||
"full_name": "evilashz\/ExchangeSSRFtoRCEExploit",
|
||||
"owner": {
|
||||
"login": "evilashz",
|
||||
"id": 50722929,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50722929?v=4",
|
||||
"html_url": "https:\/\/github.com\/evilashz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/evilashz\/ExchangeSSRFtoRCEExploit",
|
||||
"description": "CVE-2021-26855 & CVE-2021-27065",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-15T09:02:40Z",
|
||||
"updated_at": "2021-09-01T06:30:04Z",
|
||||
"pushed_at": "2021-03-15T09:19:45Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 347992754,
|
||||
"name": "CVE-2021-26855-d",
|
||||
"full_name": "Mr-xn\/CVE-2021-26855-d",
|
||||
"owner": {
|
||||
"login": "Mr-xn",
|
||||
"id": 18260135,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4",
|
||||
"html_url": "https:\/\/github.com\/Mr-xn"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Mr-xn\/CVE-2021-26855-d",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-15T14:03:16Z",
|
||||
"updated_at": "2021-03-16T12:52:25Z",
|
||||
"pushed_at": "2021-03-15T14:08:16Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 348253285,
|
||||
"name": "ProxyLogon",
|
||||
|
@ -68,6 +620,236 @@
|
|||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 348300485,
|
||||
"name": "ProxyLogon",
|
||||
"full_name": "Immersive-Labs-Sec\/ProxyLogon",
|
||||
"owner": {
|
||||
"login": "Immersive-Labs-Sec",
|
||||
"id": 79456607,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79456607?v=4",
|
||||
"html_url": "https:\/\/github.com\/Immersive-Labs-Sec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Immersive-Labs-Sec\/ProxyLogon",
|
||||
"description": "Chaining CVE-2021-26855 and CVE-2021-26857 to exploit Microsoft Exchange",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-16T10:14:56Z",
|
||||
"updated_at": "2021-03-24T16:54:40Z",
|
||||
"pushed_at": "2021-03-22T09:22:20Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 348408422,
|
||||
"name": "Scan-Vuln-CVE-2021-26855",
|
||||
"full_name": "shacojx\/Scan-Vuln-CVE-2021-26855",
|
||||
"owner": {
|
||||
"login": "shacojx",
|
||||
"id": 19655109,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19655109?v=4",
|
||||
"html_url": "https:\/\/github.com\/shacojx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/shacojx\/Scan-Vuln-CVE-2021-26855",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-16T15:59:17Z",
|
||||
"updated_at": "2021-03-20T01:39:29Z",
|
||||
"pushed_at": "2021-03-18T10:52:00Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 348486092,
|
||||
"name": "CVE-2021-26855",
|
||||
"full_name": "SotirisKar\/CVE-2021-26855",
|
||||
"owner": {
|
||||
"login": "SotirisKar",
|
||||
"id": 36128807,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36128807?v=4",
|
||||
"html_url": "https:\/\/github.com\/SotirisKar"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SotirisKar\/CVE-2021-26855",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-16T20:42:29Z",
|
||||
"updated_at": "2021-08-13T22:54:47Z",
|
||||
"pushed_at": "2021-03-16T20:43:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 348568793,
|
||||
"name": "ProxyLogon-CVE-2021-26855-metasploit",
|
||||
"full_name": "TaroballzChen\/ProxyLogon-CVE-2021-26855-metasploit",
|
||||
"owner": {
|
||||
"login": "TaroballzChen",
|
||||
"id": 27862593,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27862593?v=4",
|
||||
"html_url": "https:\/\/github.com\/TaroballzChen"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TaroballzChen\/ProxyLogon-CVE-2021-26855-metasploit",
|
||||
"description": "CVE-2021-26855 proxyLogon metasploit exploit script",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-17T03:32:19Z",
|
||||
"updated_at": "2021-05-31T09:43:44Z",
|
||||
"pushed_at": "2021-03-17T05:51:30Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 348573564,
|
||||
"name": "ProxyLogon",
|
||||
"full_name": "p0wershe11\/ProxyLogon",
|
||||
"owner": {
|
||||
"login": "p0wershe11",
|
||||
"id": 80803923,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80803923?v=4",
|
||||
"html_url": "https:\/\/github.com\/p0wershe11"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/p0wershe11\/ProxyLogon",
|
||||
"description": "ProxyLogon(CVE-2021-26855+CVE-2021-27065) Exchange Server RCE(SSRF->GetWebShell)",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-17T03:56:54Z",
|
||||
"updated_at": "2021-09-02T12:40:27Z",
|
||||
"pushed_at": "2021-03-17T05:06:18Z",
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 83,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 348894495,
|
||||
"name": "CVE-2021-26855_Exchange",
|
||||
"full_name": "r0ckysec\/CVE-2021-26855_Exchange",
|
||||
"owner": {
|
||||
"login": "r0ckysec",
|
||||
"id": 44518337,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44518337?v=4",
|
||||
"html_url": "https:\/\/github.com\/r0ckysec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/r0ckysec\/CVE-2021-26855_Exchange",
|
||||
"description": "Microsoft Exchange Proxylogon Exploit Chain EXP分析",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-18T00:44:29Z",
|
||||
"updated_at": "2021-08-27T10:26:04Z",
|
||||
"pushed_at": "2021-03-24T10:39:34Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 349035798,
|
||||
"name": "CVE-2021-26855-exploit-Exchange",
|
||||
"full_name": "shacojx\/CVE-2021-26855-exploit-Exchange",
|
||||
"owner": {
|
||||
"login": "shacojx",
|
||||
"id": 19655109,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19655109?v=4",
|
||||
"html_url": "https:\/\/github.com\/shacojx"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/shacojx\/CVE-2021-26855-exploit-Exchange",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-18T10:45:54Z",
|
||||
"updated_at": "2021-08-06T11:11:17Z",
|
||||
"pushed_at": "2021-04-05T02:36:51Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 350620709,
|
||||
"name": "CVE-2021-26855-CVE-2021-27065",
|
||||
"full_name": "hictf\/CVE-2021-26855-CVE-2021-27065",
|
||||
"owner": {
|
||||
"login": "hictf",
|
||||
"id": 43127173,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43127173?v=4",
|
||||
"html_url": "https:\/\/github.com\/hictf"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hictf\/CVE-2021-26855-CVE-2021-27065",
|
||||
"description": "analytics ProxyLogo Mail exchange RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-23T07:37:47Z",
|
||||
"updated_at": "2021-03-23T19:02:32Z",
|
||||
"pushed_at": "2021-03-23T19:02:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 350906098,
|
||||
"name": "proxylogon-exploit",
|
||||
"full_name": "praetorian-inc\/proxylogon-exploit",
|
||||
"owner": {
|
||||
"login": "praetorian-inc",
|
||||
"id": 8173787,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8173787?v=4",
|
||||
"html_url": "https:\/\/github.com\/praetorian-inc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/praetorian-inc\/proxylogon-exploit",
|
||||
"description": "Proof-of-concept exploit for CVE-2021-26855 and CVE-2021-27065. Unauthenticated RCE in Exchange.",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-24T01:12:48Z",
|
||||
"updated_at": "2021-09-02T12:30:24Z",
|
||||
"pushed_at": "2021-03-24T01:25:05Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 25,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 352785704,
|
||||
"name": "SharpProxyLogon",
|
||||
"full_name": "Flangvik\/SharpProxyLogon",
|
||||
"owner": {
|
||||
"login": "Flangvik",
|
||||
"id": 23613997,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23613997?v=4",
|
||||
"html_url": "https:\/\/github.com\/Flangvik"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Flangvik\/SharpProxyLogon",
|
||||
"description": "C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection ",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-29T21:10:34Z",
|
||||
"updated_at": "2021-08-31T19:10:55Z",
|
||||
"pushed_at": "2021-03-31T11:57:38Z",
|
||||
"stargazers_count": 201,
|
||||
"watchers_count": 201,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 201,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 357875949,
|
||||
"name": "ProxyLogon",
|
||||
|
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 346784494,
|
||||
"name": "Proxylogon-exploit",
|
||||
"full_name": "sirpedrotavares\/Proxylogon-exploit",
|
||||
"owner": {
|
||||
"login": "sirpedrotavares",
|
||||
"id": 10796859,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10796859?v=4",
|
||||
"html_url": "https:\/\/github.com\/sirpedrotavares"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sirpedrotavares\/Proxylogon-exploit",
|
||||
"description": "proxylogon exploit - CVE-2021-26857",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T17:32:32Z",
|
||||
"updated_at": "2021-08-29T11:54:03Z",
|
||||
"pushed_at": "2021-03-11T17:34:15Z",
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 101,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 370111085,
|
||||
"name": "ProxyLogon-Mass-RCE",
|
||||
|
|
25
2021/CVE-2021-26871.json
Normal file
25
2021/CVE-2021-26871.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 351287174,
|
||||
"name": "CVE-2021-26871_POC",
|
||||
"full_name": "robotMD5\/CVE-2021-26871_POC",
|
||||
"owner": {
|
||||
"login": "robotMD5",
|
||||
"id": 81340681,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81340681?v=4",
|
||||
"html_url": "https:\/\/github.com\/robotMD5"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/robotMD5\/CVE-2021-26871_POC",
|
||||
"description": "POC for CVE-2021-26871(Maybe)",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-25T02:38:08Z",
|
||||
"updated_at": "2021-08-05T02:55:26Z",
|
||||
"pushed_at": "2021-03-25T03:15:17Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-26882.json
Normal file
25
2021/CVE-2021-26882.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 346839688,
|
||||
"name": "CVE-2021-26882",
|
||||
"full_name": "api0cradle\/CVE-2021-26882",
|
||||
"owner": {
|
||||
"login": "api0cradle",
|
||||
"id": 12997471,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12997471?v=4",
|
||||
"html_url": "https:\/\/github.com\/api0cradle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/api0cradle\/CVE-2021-26882",
|
||||
"description": "PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T21:13:51Z",
|
||||
"updated_at": "2021-07-13T09:26:36Z",
|
||||
"pushed_at": "2021-03-11T14:01:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-26903.json
Normal file
25
2021/CVE-2021-26903.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 341895421,
|
||||
"name": "CVE-2021-26903",
|
||||
"full_name": "Security-AVS\/CVE-2021-26903",
|
||||
"owner": {
|
||||
"login": "Security-AVS",
|
||||
"id": 72926885,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72926885?v=4",
|
||||
"html_url": "https:\/\/github.com\/Security-AVS"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Security-AVS\/CVE-2021-26903",
|
||||
"description": "ISIDA RETRIEVER v5.2\" Reflected XSS",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T12:36:01Z",
|
||||
"updated_at": "2021-02-24T12:40:09Z",
|
||||
"pushed_at": "2021-02-24T12:40:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-26904.json
Normal file
25
2021/CVE-2021-26904.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 341897194,
|
||||
"name": "-CVE-2021-26904",
|
||||
"full_name": "Security-AVS\/-CVE-2021-26904",
|
||||
"owner": {
|
||||
"login": "Security-AVS",
|
||||
"id": 72926885,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72926885?v=4",
|
||||
"html_url": "https:\/\/github.com\/Security-AVS"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Security-AVS\/-CVE-2021-26904",
|
||||
"description": "LMA ISIDA Retriever 5.2 allows SQL Injection",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T12:42:52Z",
|
||||
"updated_at": "2021-02-24T12:43:56Z",
|
||||
"pushed_at": "2021-02-24T12:43:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-26943.json
Normal file
25
2021/CVE-2021-26943.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 325836310,
|
||||
"name": "SmmExploit",
|
||||
"full_name": "tandasat\/SmmExploit",
|
||||
"owner": {
|
||||
"login": "tandasat",
|
||||
"id": 1620923,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1620923?v=4",
|
||||
"html_url": "https:\/\/github.com\/tandasat"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tandasat\/SmmExploit",
|
||||
"description": "The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-31T16:30:02Z",
|
||||
"updated_at": "2021-08-30T23:02:19Z",
|
||||
"pushed_at": "2021-03-29T12:33:38Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 74,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-27065.json
Normal file
25
2021/CVE-2021-27065.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 345007574,
|
||||
"name": "cve-2021-27065",
|
||||
"full_name": "adamrpostjr\/cve-2021-27065",
|
||||
"owner": {
|
||||
"login": "adamrpostjr",
|
||||
"id": 32047648,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32047648?v=4",
|
||||
"html_url": "https:\/\/github.com\/adamrpostjr"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/adamrpostjr\/cve-2021-27065",
|
||||
"description": "Quick One Line Powershell scripts to detect for webshells, possible zips, and logs.",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-06T04:47:35Z",
|
||||
"updated_at": "2021-05-09T16:08:54Z",
|
||||
"pushed_at": "2021-03-09T13:23:08Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-27180.json
Normal file
25
2021/CVE-2021-27180.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 356335946,
|
||||
"name": "MDaemon-Advisories",
|
||||
"full_name": "chudyPB\/MDaemon-Advisories",
|
||||
"owner": {
|
||||
"login": "chudyPB",
|
||||
"id": 36897432,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36897432?v=4",
|
||||
"html_url": "https:\/\/github.com\/chudyPB"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/chudyPB\/MDaemon-Advisories",
|
||||
"description": "MDaemon Advisories - CVE-2021-27180, CVE-2021-27181, CVE-2021-27182, CVE-2021-27183",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-09T16:34:28Z",
|
||||
"updated_at": "2021-04-09T17:00:44Z",
|
||||
"pushed_at": "2021-04-09T17:00:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-27187.json
Normal file
25
2021/CVE-2021-27187.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 338061784,
|
||||
"name": "CVE-2021-27187",
|
||||
"full_name": "jet-pentest\/CVE-2021-27187",
|
||||
"owner": {
|
||||
"login": "jet-pentest",
|
||||
"id": 71512502,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71512502?v=4",
|
||||
"html_url": "https:\/\/github.com\/jet-pentest"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jet-pentest\/CVE-2021-27187",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-11T15:03:48Z",
|
||||
"updated_at": "2021-02-14T09:24:04Z",
|
||||
"pushed_at": "2021-02-11T15:08:24Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-27188.json
Normal file
25
2021/CVE-2021-27188.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 338251533,
|
||||
"name": "CVE-2021-27188",
|
||||
"full_name": "jet-pentest\/CVE-2021-27188",
|
||||
"owner": {
|
||||
"login": "jet-pentest",
|
||||
"id": 71512502,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71512502?v=4",
|
||||
"html_url": "https:\/\/github.com\/jet-pentest"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jet-pentest\/CVE-2021-27188",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-12T07:32:51Z",
|
||||
"updated_at": "2021-02-14T09:24:02Z",
|
||||
"pushed_at": "2021-02-12T07:36:35Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-27190.json
Normal file
25
2021/CVE-2021-27190.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 337955124,
|
||||
"name": "CVE-2021-27190-PEEL-Shopping-cart-9.3.0-Stored-XSS",
|
||||
"full_name": "anmolksachan\/CVE-2021-27190-PEEL-Shopping-cart-9.3.0-Stored-XSS",
|
||||
"owner": {
|
||||
"login": "anmolksachan",
|
||||
"id": 60771253,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60771253?v=4",
|
||||
"html_url": "https:\/\/github.com\/anmolksachan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/anmolksachan\/CVE-2021-27190-PEEL-Shopping-cart-9.3.0-Stored-XSS",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-11T07:10:58Z",
|
||||
"updated_at": "2021-03-01T08:02:33Z",
|
||||
"pushed_at": "2021-02-12T07:32:18Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-27246.json
Normal file
25
2021/CVE-2021-27246.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 343487613,
|
||||
"name": "CVE-2021-27246_Pwn2Own2020",
|
||||
"full_name": "synacktiv\/CVE-2021-27246_Pwn2Own2020",
|
||||
"owner": {
|
||||
"login": "synacktiv",
|
||||
"id": 50145679,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50145679?v=4",
|
||||
"html_url": "https:\/\/github.com\/synacktiv"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/synacktiv\/CVE-2021-27246_Pwn2Own2020",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-01T16:45:42Z",
|
||||
"updated_at": "2021-08-31T15:17:55Z",
|
||||
"pushed_at": "2021-03-02T07:45:20Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 30,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-27328.json
Normal file
25
2021/CVE-2021-27328.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 340288345,
|
||||
"name": "CVE-2021-27328",
|
||||
"full_name": "SQSamir\/CVE-2021-27328",
|
||||
"owner": {
|
||||
"login": "SQSamir",
|
||||
"id": 12712312,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12712312?v=4",
|
||||
"html_url": "https:\/\/github.com\/SQSamir"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SQSamir\/CVE-2021-27328",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-19T07:15:48Z",
|
||||
"updated_at": "2021-02-19T08:16:14Z",
|
||||
"pushed_at": "2021-02-19T08:16:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-27403.json
Normal file
25
2021/CVE-2021-27403.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 340105810,
|
||||
"name": "CVE-2021-27403",
|
||||
"full_name": "bokanrb\/CVE-2021-27403",
|
||||
"owner": {
|
||||
"login": "bokanrb",
|
||||
"id": 25235094,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25235094?v=4",
|
||||
"html_url": "https:\/\/github.com\/bokanrb"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bokanrb\/CVE-2021-27403",
|
||||
"description": "XSS-Askey",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-18T16:14:48Z",
|
||||
"updated_at": "2021-08-13T04:56:51Z",
|
||||
"pushed_at": "2021-02-18T17:09:47Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-27404.json
Normal file
25
2021/CVE-2021-27404.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 340122850,
|
||||
"name": "CVE-2021-27404",
|
||||
"full_name": "bokanrb\/CVE-2021-27404",
|
||||
"owner": {
|
||||
"login": "bokanrb",
|
||||
"id": 25235094,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25235094?v=4",
|
||||
"html_url": "https:\/\/github.com\/bokanrb"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bokanrb\/CVE-2021-27404",
|
||||
"description": "HostHeaderInjection-Askey",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-18T17:16:39Z",
|
||||
"updated_at": "2021-08-17T04:59:18Z",
|
||||
"pushed_at": "2021-02-18T17:20:25Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-27890.json
Normal file
25
2021/CVE-2021-27890.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 351325727,
|
||||
"name": "Mybb-XSS_SQL_RCE-POC",
|
||||
"full_name": "xiaopan233\/Mybb-XSS_SQL_RCE-POC",
|
||||
"owner": {
|
||||
"login": "xiaopan233",
|
||||
"id": 32785617,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32785617?v=4",
|
||||
"html_url": "https:\/\/github.com\/xiaopan233"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xiaopan233\/Mybb-XSS_SQL_RCE-POC",
|
||||
"description": "Mybb associate CVE-2021-27890 & CVE-2021-27889 to RCE poc",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-25T06:00:31Z",
|
||||
"updated_at": "2021-05-08T06:58:30Z",
|
||||
"pushed_at": "2021-03-25T06:56:52Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-27963.json
Normal file
25
2021/CVE-2021-27963.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 342558842,
|
||||
"name": "SonLogger-vulns",
|
||||
"full_name": "erberkan\/SonLogger-vulns",
|
||||
"owner": {
|
||||
"login": "erberkan",
|
||||
"id": 15521812,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15521812?v=4",
|
||||
"html_url": "https:\/\/github.com\/erberkan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/erberkan\/SonLogger-vulns",
|
||||
"description": "SonLogger Vulns (CVE-2021-27963, CVE-2021-27964)",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-26T11:44:04Z",
|
||||
"updated_at": "2021-07-19T01:14:15Z",
|
||||
"pushed_at": "2021-03-13T08:39:31Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-28310.json
Normal file
25
2021/CVE-2021-28310.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 357800087,
|
||||
"name": "IOC_for_CVE-2021-28310",
|
||||
"full_name": "Rafael-Svechinskaya\/IOC_for_CVE-2021-28310",
|
||||
"owner": {
|
||||
"login": "Rafael-Svechinskaya",
|
||||
"id": 82496408,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82496408?v=4",
|
||||
"html_url": "https:\/\/github.com\/Rafael-Svechinskaya"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Rafael-Svechinskaya\/IOC_for_CVE-2021-28310",
|
||||
"description": "Malicious Payloads that abuses Win32k Elevation of Privilege Vulnerability (CVE-2021-28310)",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-14T06:36:40Z",
|
||||
"updated_at": "2021-08-14T20:55:05Z",
|
||||
"pushed_at": "2021-04-14T07:16:45Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-29267.json
Normal file
25
2021/CVE-2021-29267.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 352641545,
|
||||
"name": "CVE-2021-29267",
|
||||
"full_name": "Security-AVS\/CVE-2021-29267",
|
||||
"owner": {
|
||||
"login": "Security-AVS",
|
||||
"id": 72926885,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72926885?v=4",
|
||||
"html_url": "https:\/\/github.com\/Security-AVS"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Security-AVS\/CVE-2021-29267",
|
||||
"description": "SherlockIM ChatBot XSS",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-29T12:50:23Z",
|
||||
"updated_at": "2021-04-29T02:57:57Z",
|
||||
"pushed_at": "2021-03-29T12:53:20Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 353469792,
|
||||
"name": "CVE-2021-29349",
|
||||
"full_name": "0xBaz\/CVE-2021-29349",
|
||||
"owner": {
|
||||
"login": "0xBaz",
|
||||
"id": 80262250,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80262250?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xBaz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xBaz\/CVE-2021-29349",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-31T19:36:29Z",
|
||||
"updated_at": "2021-05-22T11:00:46Z",
|
||||
"pushed_at": "2021-03-31T19:36:30Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 358957574,
|
||||
"name": "CVE-2021-29349",
|
||||
|
|
25
2021/CVE-2021-29627.json
Normal file
25
2021/CVE-2021-29627.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 357104598,
|
||||
"name": "cve-2021-29627",
|
||||
"full_name": "raymontag\/cve-2021-29627",
|
||||
"owner": {
|
||||
"login": "raymontag",
|
||||
"id": 106421,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106421?v=4",
|
||||
"html_url": "https:\/\/github.com\/raymontag"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/raymontag\/cve-2021-29627",
|
||||
"description": "Trigger-only for CVE-2021-29627",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-12T07:51:03Z",
|
||||
"updated_at": "2021-04-21T13:57:31Z",
|
||||
"pushed_at": "2021-04-12T07:51:40Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-30109.json
Normal file
25
2021/CVE-2021-30109.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 354793600,
|
||||
"name": "CVE-2021-30109",
|
||||
"full_name": "Hackdwerg\/CVE-2021-30109",
|
||||
"owner": {
|
||||
"login": "Hackdwerg",
|
||||
"id": 22836086,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22836086?v=4",
|
||||
"html_url": "https:\/\/github.com\/Hackdwerg"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Hackdwerg\/CVE-2021-30109",
|
||||
"description": "Froala Persistent XSS",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-05T10:14:48Z",
|
||||
"updated_at": "2021-04-29T02:56:24Z",
|
||||
"pushed_at": "2021-04-06T10:44:26Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-30146.json
Normal file
25
2021/CVE-2021-30146.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 355128115,
|
||||
"name": "CVE-2021-30146",
|
||||
"full_name": "Security-AVS\/CVE-2021-30146",
|
||||
"owner": {
|
||||
"login": "Security-AVS",
|
||||
"id": 72926885,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72926885?v=4",
|
||||
"html_url": "https:\/\/github.com\/Security-AVS"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Security-AVS\/CVE-2021-30146",
|
||||
"description": "Seafile 7.0.5 Persistent XSS",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-06T09:16:37Z",
|
||||
"updated_at": "2021-04-29T02:56:09Z",
|
||||
"pushed_at": "2021-04-06T09:19:48Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-30149.json
Normal file
25
2021/CVE-2021-30149.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 355252754,
|
||||
"name": "CVE-2021-30149",
|
||||
"full_name": "orionhridoy\/CVE-2021-30149",
|
||||
"owner": {
|
||||
"login": "orionhridoy",
|
||||
"id": 76449180,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76449180?v=4",
|
||||
"html_url": "https:\/\/github.com\/orionhridoy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/orionhridoy\/CVE-2021-30149",
|
||||
"description": "RCE 0day (Orion Hridoy)",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-06T16:12:03Z",
|
||||
"updated_at": "2021-04-06T16:17:13Z",
|
||||
"pushed_at": "2021-04-06T16:12:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-30150.json
Normal file
25
2021/CVE-2021-30150.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 355253114,
|
||||
"name": "CVE-2021-30150",
|
||||
"full_name": "orionhridoy\/CVE-2021-30150",
|
||||
"owner": {
|
||||
"login": "orionhridoy",
|
||||
"id": 76449180,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76449180?v=4",
|
||||
"html_url": "https:\/\/github.com\/orionhridoy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/orionhridoy\/CVE-2021-30150",
|
||||
"description": "XSS Discovered By: Orion Hridoy",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-06T16:13:04Z",
|
||||
"updated_at": "2021-04-07T15:43:45Z",
|
||||
"pushed_at": "2021-04-07T15:43:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,142 @@
|
|||
[
|
||||
{
|
||||
"id": 328097281,
|
||||
"name": "CVE-2021-3019",
|
||||
"full_name": "B1anda0\/CVE-2021-3019",
|
||||
"owner": {
|
||||
"login": "B1anda0",
|
||||
"id": 74232513,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74232513?v=4",
|
||||
"html_url": "https:\/\/github.com\/B1anda0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/B1anda0\/CVE-2021-3019",
|
||||
"description": "lanproxy 目录遍历漏洞批量检测 (CVE-2021-3019)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-09T07:11:38Z",
|
||||
"updated_at": "2021-07-19T15:42:13Z",
|
||||
"pushed_at": "2021-01-09T07:14:26Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 328546705,
|
||||
"name": "CVE-2021-3019",
|
||||
"full_name": "FanqXu\/CVE-2021-3019",
|
||||
"owner": {
|
||||
"login": "FanqXu",
|
||||
"id": 40891670,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40891670?v=4",
|
||||
"html_url": "https:\/\/github.com\/FanqXu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/FanqXu\/CVE-2021-3019",
|
||||
"description": "CVE-2021-3019 lanproxy目录遍历任意文件读取漏洞探测POC",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-11T04:18:44Z",
|
||||
"updated_at": "2021-07-19T08:19:38Z",
|
||||
"pushed_at": "2021-03-19T14:42:49Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 329537345,
|
||||
"name": "CVE-2021-3019",
|
||||
"full_name": "liuxu54898\/CVE-2021-3019",
|
||||
"owner": {
|
||||
"login": "liuxu54898",
|
||||
"id": 35008035,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35008035?v=4",
|
||||
"html_url": "https:\/\/github.com\/liuxu54898"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/liuxu54898\/CVE-2021-3019",
|
||||
"description": "lanproxy 目录遍历漏洞批量检测用户名密码POC (CVE-2021-3019)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-14T07:19:21Z",
|
||||
"updated_at": "2021-05-24T01:48:33Z",
|
||||
"pushed_at": "2021-01-14T07:52:31Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 346618078,
|
||||
"name": "CVE-2021-3019",
|
||||
"full_name": "murataydemir\/CVE-2021-3019",
|
||||
"owner": {
|
||||
"login": "murataydemir",
|
||||
"id": 16391655,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16391655?v=4",
|
||||
"html_url": "https:\/\/github.com\/murataydemir"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/murataydemir\/CVE-2021-3019",
|
||||
"description": "[CVE-2021-3019] LanProxy Directory Traversal",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T07:40:44Z",
|
||||
"updated_at": "2021-08-19T10:39:30Z",
|
||||
"pushed_at": "2021-03-11T08:13:00Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 350235820,
|
||||
"name": "cve-2021-3019",
|
||||
"full_name": "Aoyuh\/cve-2021-3019",
|
||||
"owner": {
|
||||
"login": "Aoyuh",
|
||||
"id": 48713040,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48713040?v=4",
|
||||
"html_url": "https:\/\/github.com\/Aoyuh"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Aoyuh\/cve-2021-3019",
|
||||
"description": "lanproxy(CVE-2021-3019)目录遍历",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-22T06:44:07Z",
|
||||
"updated_at": "2021-03-22T06:44:07Z",
|
||||
"pushed_at": "2021-03-22T06:44:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 357764838,
|
||||
"name": "CVE-2021-3019",
|
||||
"full_name": "givemefivw\/CVE-2021-3019",
|
||||
"owner": {
|
||||
"login": "givemefivw",
|
||||
"id": 65514141,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65514141?v=4",
|
||||
"html_url": "https:\/\/github.com\/givemefivw"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/givemefivw\/CVE-2021-3019",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-04-14T03:45:38Z",
|
||||
"updated_at": "2021-04-14T07:39:19Z",
|
||||
"pushed_at": "2021-04-14T03:53:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 402656166,
|
||||
"name": "CVE-2021-3019-Lanproxy",
|
||||
|
|
25
2021/CVE-2021-3122.json
Normal file
25
2021/CVE-2021-3122.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 336828311,
|
||||
"name": "CVE-2021-3122-Details",
|
||||
"full_name": "roughb8722\/CVE-2021-3122-Details",
|
||||
"owner": {
|
||||
"login": "roughb8722",
|
||||
"id": 30843972,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30843972?v=4",
|
||||
"html_url": "https:\/\/github.com\/roughb8722"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/roughb8722\/CVE-2021-3122-Details",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-07T16:05:49Z",
|
||||
"updated_at": "2021-03-13T19:27:31Z",
|
||||
"pushed_at": "2021-02-07T16:06:47Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,142 @@
|
|||
[
|
||||
{
|
||||
"id": 329307363,
|
||||
"name": "laravel-exploits",
|
||||
"full_name": "ambionics\/laravel-exploits",
|
||||
"owner": {
|
||||
"login": "ambionics",
|
||||
"id": 29630660,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29630660?v=4",
|
||||
"html_url": "https:\/\/github.com\/ambionics"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ambionics\/laravel-exploits",
|
||||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-13T12:52:20Z",
|
||||
"updated_at": "2021-08-30T13:26:57Z",
|
||||
"pushed_at": "2021-01-29T13:59:07Z",
|
||||
"stargazers_count": 138,
|
||||
"watchers_count": 138,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"watchers": 138,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 331843308,
|
||||
"name": "CVE-2021-3129",
|
||||
"full_name": "SNCKER\/CVE-2021-3129",
|
||||
"owner": {
|
||||
"login": "SNCKER",
|
||||
"id": 49559334,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49559334?v=4",
|
||||
"html_url": "https:\/\/github.com\/SNCKER"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SNCKER\/CVE-2021-3129",
|
||||
"description": "Laravel debug rce",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-22T05:12:21Z",
|
||||
"updated_at": "2021-08-18T09:10:27Z",
|
||||
"pushed_at": "2021-01-24T05:28:07Z",
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"forks_count": 38,
|
||||
"forks": 38,
|
||||
"watchers": 96,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 332682252,
|
||||
"name": "laravel-CVE-2021-3129-EXP",
|
||||
"full_name": "SecPros-Team\/laravel-CVE-2021-3129-EXP",
|
||||
"owner": {
|
||||
"login": "SecPros-Team",
|
||||
"id": 77960183,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77960183?v=4",
|
||||
"html_url": "https:\/\/github.com\/SecPros-Team"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SecPros-Team\/laravel-CVE-2021-3129-EXP",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-25T08:42:28Z",
|
||||
"updated_at": "2021-08-29T19:11:13Z",
|
||||
"pushed_at": "2021-01-25T08:49:59Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 333316985,
|
||||
"name": "Laravel_CVE-2021-3129_EXP",
|
||||
"full_name": "crisprss\/Laravel_CVE-2021-3129_EXP",
|
||||
"owner": {
|
||||
"login": "crisprss",
|
||||
"id": 55953931,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55953931?v=4",
|
||||
"html_url": "https:\/\/github.com\/crisprss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/crisprss\/Laravel_CVE-2021-3129_EXP",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-27T05:44:52Z",
|
||||
"updated_at": "2021-06-06T16:24:53Z",
|
||||
"pushed_at": "2021-01-27T06:23:34Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 333380316,
|
||||
"name": "CVE-2021-3129_exploit",
|
||||
"full_name": "nth347\/CVE-2021-3129_exploit",
|
||||
"owner": {
|
||||
"login": "nth347",
|
||||
"id": 20441996,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20441996?v=4",
|
||||
"html_url": "https:\/\/github.com\/nth347"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nth347\/CVE-2021-3129_exploit",
|
||||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-27T10:16:35Z",
|
||||
"updated_at": "2021-09-04T15:36:50Z",
|
||||
"pushed_at": "2021-03-07T04:39:58Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 338768882,
|
||||
"name": "Laravel-8.4.2-rce-CVE-2021-3129",
|
||||
"full_name": "FunPhishing\/Laravel-8.4.2-rce-CVE-2021-3129",
|
||||
"owner": {
|
||||
"login": "FunPhishing",
|
||||
"id": 77312720,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77312720?v=4",
|
||||
"html_url": "https:\/\/github.com\/FunPhishing"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/FunPhishing\/Laravel-8.4.2-rce-CVE-2021-3129",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-14T09:24:07Z",
|
||||
"updated_at": "2021-02-14T12:27:56Z",
|
||||
"pushed_at": "2021-02-14T12:27:54Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 339947921,
|
||||
"name": "CVE-2021-3129",
|
||||
|
@ -22,6 +160,29 @@
|
|||
"watchers": 40,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 340833719,
|
||||
"name": "CVE-2021-3129",
|
||||
"full_name": "simonlee-hello\/CVE-2021-3129",
|
||||
"owner": {
|
||||
"login": "simonlee-hello",
|
||||
"id": 56343277,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56343277?v=4",
|
||||
"html_url": "https:\/\/github.com\/simonlee-hello"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/simonlee-hello\/CVE-2021-3129",
|
||||
"description": "CVE-2021-3129-Laravel Debug mode 远程代码执行漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-21T06:27:18Z",
|
||||
"updated_at": "2021-02-21T06:34:19Z",
|
||||
"pushed_at": "2021-02-21T06:34:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 388370396,
|
||||
"name": "laravel-CVE-2021-3129-EXP",
|
||||
|
|
25
2021/CVE-2021-3130.json
Normal file
25
2021/CVE-2021-3130.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 331557374,
|
||||
"name": "CVE-2021-3130",
|
||||
"full_name": "jet-pentest\/CVE-2021-3130",
|
||||
"owner": {
|
||||
"login": "jet-pentest",
|
||||
"id": 71512502,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71512502?v=4",
|
||||
"html_url": "https:\/\/github.com\/jet-pentest"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jet-pentest\/CVE-2021-3130",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-21T08:04:32Z",
|
||||
"updated_at": "2021-02-14T09:24:07Z",
|
||||
"pushed_at": "2021-01-21T12:31:34Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-3131.json
Normal file
25
2021/CVE-2021-3131.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 329230328,
|
||||
"name": "CVE-2021-3131",
|
||||
"full_name": "jet-pentest\/CVE-2021-3131",
|
||||
"owner": {
|
||||
"login": "jet-pentest",
|
||||
"id": 71512502,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71512502?v=4",
|
||||
"html_url": "https:\/\/github.com\/jet-pentest"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jet-pentest\/CVE-2021-3131",
|
||||
"description": "CVE-2021-3131",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-13T07:41:25Z",
|
||||
"updated_at": "2021-02-14T09:24:11Z",
|
||||
"pushed_at": "2021-01-13T07:54:38Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,4 +1,441 @@
|
|||
[
|
||||
{
|
||||
"id": 333199828,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "mr-r3b00t\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "mr-r3b00t",
|
||||
"id": 14963690,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14963690?v=4",
|
||||
"html_url": "https:\/\/github.com\/mr-r3b00t"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mr-r3b00t\/CVE-2021-3156",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-26T19:53:04Z",
|
||||
"updated_at": "2021-06-30T05:50:15Z",
|
||||
"pushed_at": "2021-01-26T20:09:53Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 333450928,
|
||||
"name": "sudo_cve-2021-3156",
|
||||
"full_name": "nexcess\/sudo_cve-2021-3156",
|
||||
"owner": {
|
||||
"login": "nexcess",
|
||||
"id": 651829,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/651829?v=4",
|
||||
"html_url": "https:\/\/github.com\/nexcess"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nexcess\/sudo_cve-2021-3156",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-27T14:40:57Z",
|
||||
"updated_at": "2021-01-27T18:21:50Z",
|
||||
"pushed_at": "2021-01-27T18:21:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 333483141,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "reverse-ex\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "reverse-ex",
|
||||
"id": 77421345,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77421345?v=4",
|
||||
"html_url": "https:\/\/github.com\/reverse-ex"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/reverse-ex\/CVE-2021-3156",
|
||||
"description": "CVE-2021-3156",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-27T16:03:34Z",
|
||||
"updated_at": "2021-07-23T15:05:02Z",
|
||||
"pushed_at": "2021-01-31T04:56:56Z",
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"forks_count": 43,
|
||||
"forks": 43,
|
||||
"watchers": 110,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 333492305,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "jokerTPR2004\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "jokerTPR2004",
|
||||
"id": 61272656,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61272656?v=4",
|
||||
"html_url": "https:\/\/github.com\/jokerTPR2004"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jokerTPR2004\/CVE-2021-3156",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-27T16:35:43Z",
|
||||
"updated_at": "2021-01-30T12:26:08Z",
|
||||
"pushed_at": "2021-01-27T15:19:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 333557918,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "ymrsmns\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "ymrsmns",
|
||||
"id": 25608325,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25608325?v=4",
|
||||
"html_url": "https:\/\/github.com\/ymrsmns"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ymrsmns\/CVE-2021-3156",
|
||||
"description": "CVE-2021-3156",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-27T20:57:00Z",
|
||||
"updated_at": "2021-01-31T13:08:37Z",
|
||||
"pushed_at": "2021-01-31T13:08:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 333569622,
|
||||
"name": "CVE-2021-3156-PATCHER",
|
||||
"full_name": "elbee-cyber\/CVE-2021-3156-PATCHER",
|
||||
"owner": {
|
||||
"login": "elbee-cyber",
|
||||
"id": 66045908,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66045908?v=4",
|
||||
"html_url": "https:\/\/github.com\/elbee-cyber"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/elbee-cyber\/CVE-2021-3156-PATCHER",
|
||||
"description": "This simple bash script will patch the recently discovered sudo heap overflow vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-27T21:49:06Z",
|
||||
"updated_at": "2021-02-03T09:13:52Z",
|
||||
"pushed_at": "2021-01-28T05:25:26Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 333619288,
|
||||
"name": "CVE-2021-3156-Baron-Samedit",
|
||||
"full_name": "kernelzeroday\/CVE-2021-3156-Baron-Samedit",
|
||||
"owner": {
|
||||
"login": "kernelzeroday",
|
||||
"id": 11334159,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11334159?v=4",
|
||||
"html_url": "https:\/\/github.com\/kernelzeroday"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kernelzeroday\/CVE-2021-3156-Baron-Samedit",
|
||||
"description": "1day research effort",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-28T02:13:49Z",
|
||||
"updated_at": "2021-06-23T04:08:28Z",
|
||||
"pushed_at": "2021-01-29T03:21:13Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 333620703,
|
||||
"name": "cve-2021-3156",
|
||||
"full_name": "yaunsky\/cve-2021-3156",
|
||||
"owner": {
|
||||
"login": "yaunsky",
|
||||
"id": 48243087,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48243087?v=4",
|
||||
"html_url": "https:\/\/github.com\/yaunsky"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yaunsky\/cve-2021-3156",
|
||||
"description": "cve-2021-3156;sudo堆溢出漏洞;漏洞检测",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-28T02:20:24Z",
|
||||
"updated_at": "2021-04-18T22:59:59Z",
|
||||
"pushed_at": "2021-01-28T02:21:30Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 333622660,
|
||||
"name": "cve-2021-3156",
|
||||
"full_name": "H4ckForJob\/cve-2021-3156",
|
||||
"owner": {
|
||||
"login": "H4ckForJob",
|
||||
"id": 39022267,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39022267?v=4",
|
||||
"html_url": "https:\/\/github.com\/H4ckForJob"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/H4ckForJob\/cve-2021-3156",
|
||||
"description": "脚本小子竟是我自己?",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-28T02:29:37Z",
|
||||
"updated_at": "2021-04-15T09:48:22Z",
|
||||
"pushed_at": "2021-01-28T02:57:24Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 333700525,
|
||||
"name": "CVE-2021-3156-Exp",
|
||||
"full_name": "baka9moe\/CVE-2021-3156-Exp",
|
||||
"owner": {
|
||||
"login": "baka9moe",
|
||||
"id": 17043012,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17043012?v=4",
|
||||
"html_url": "https:\/\/github.com\/baka9moe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/baka9moe\/CVE-2021-3156-Exp",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-28T08:55:04Z",
|
||||
"updated_at": "2021-05-14T12:43:48Z",
|
||||
"pushed_at": "2021-01-28T09:12:29Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 333714882,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "ph4ntonn\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "ph4ntonn",
|
||||
"id": 45198234,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45198234?v=4",
|
||||
"html_url": "https:\/\/github.com\/ph4ntonn"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ph4ntonn\/CVE-2021-3156",
|
||||
"description": "CVE-2021-3156",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-28T09:52:55Z",
|
||||
"updated_at": "2021-01-29T00:08:11Z",
|
||||
"pushed_at": "2021-01-28T10:02:05Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 334027841,
|
||||
"name": "CVE-2021-3156-SCRIPT",
|
||||
"full_name": "binw2018\/CVE-2021-3156-SCRIPT",
|
||||
"owner": {
|
||||
"login": "binw2018",
|
||||
"id": 49139970,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49139970?v=4",
|
||||
"html_url": "https:\/\/github.com\/binw2018"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/binw2018\/CVE-2021-3156-SCRIPT",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-29T03:34:31Z",
|
||||
"updated_at": "2021-02-03T10:32:24Z",
|
||||
"pushed_at": "2021-01-29T06:49:07Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 334128649,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "freeFV\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "freeFV",
|
||||
"id": 32540878,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32540878?v=4",
|
||||
"html_url": "https:\/\/github.com\/freeFV"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/freeFV\/CVE-2021-3156",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-29T11:44:37Z",
|
||||
"updated_at": "2021-04-29T12:50:44Z",
|
||||
"pushed_at": "2021-01-29T11:36:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 334242353,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "mbcrump\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "mbcrump",
|
||||
"id": 534885,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/534885?v=4",
|
||||
"html_url": "https:\/\/github.com\/mbcrump"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mbcrump\/CVE-2021-3156",
|
||||
"description": "Notes regarding CVE-2021-3156: Heap-Based Buffer Overflow in Sudo",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-29T19:24:41Z",
|
||||
"updated_at": "2021-07-23T17:45:05Z",
|
||||
"pushed_at": "2021-01-31T02:21:37Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 39,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 334318140,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "stong\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "stong",
|
||||
"id": 14918218,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14918218?v=4",
|
||||
"html_url": "https:\/\/github.com\/stong"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/stong\/CVE-2021-3156",
|
||||
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T03:22:04Z",
|
||||
"updated_at": "2021-08-30T18:16:40Z",
|
||||
"pushed_at": "2021-02-08T03:42:50Z",
|
||||
"stargazers_count": 410,
|
||||
"watchers_count": 410,
|
||||
"forks_count": 115,
|
||||
"forks": 115,
|
||||
"watchers": 410,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 334390097,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "nobodyatall648\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "nobodyatall648",
|
||||
"id": 35725871,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35725871?v=4",
|
||||
"html_url": "https:\/\/github.com\/nobodyatall648"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nobodyatall648\/CVE-2021-3156",
|
||||
"description": "checking CVE-2021-3156 vulnerability & patch script",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T10:53:26Z",
|
||||
"updated_at": "2021-02-01T04:49:36Z",
|
||||
"pushed_at": "2021-02-01T02:19:20Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 334506851,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "blasty\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "blasty",
|
||||
"id": 101374,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101374?v=4",
|
||||
"html_url": "https:\/\/github.com\/blasty"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/blasty\/CVE-2021-3156",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2021-09-02T14:45:56Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 759,
|
||||
"watchers_count": 759,
|
||||
"forks_count": 219,
|
||||
"forks": 219,
|
||||
"watchers": 759,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 334565393,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "teamtopkarl\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "teamtopkarl",
|
||||
"id": 18065690,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18065690?v=4",
|
||||
"html_url": "https:\/\/github.com\/teamtopkarl"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/teamtopkarl\/CVE-2021-3156",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-31T03:38:37Z",
|
||||
"updated_at": "2021-07-23T15:05:10Z",
|
||||
"pushed_at": "2021-01-31T04:02:08Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 334594270,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "Q4n\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "Q4n",
|
||||
"id": 48317526,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48317526?v=4",
|
||||
"html_url": "https:\/\/github.com\/Q4n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Q4n\/CVE-2021-3156",
|
||||
"description": "复现别人家的CVEs系列",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-31T07:01:50Z",
|
||||
"updated_at": "2021-04-25T03:29:18Z",
|
||||
"pushed_at": "2021-01-31T07:02:44Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 334697314,
|
||||
"name": "CVE-2021-3156",
|
||||
|
@ -22,6 +459,259 @@
|
|||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 334775019,
|
||||
"name": "docker-CVE-2021-3156",
|
||||
"full_name": "apogiatzis\/docker-CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "apogiatzis",
|
||||
"id": 39923420,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39923420?v=4",
|
||||
"html_url": "https:\/\/github.com\/apogiatzis"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/apogiatzis\/docker-CVE-2021-3156",
|
||||
"description": "A docker environment to research CVE-2021-3156",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-31T22:58:13Z",
|
||||
"updated_at": "2021-08-05T04:10:40Z",
|
||||
"pushed_at": "2021-01-31T23:03:51Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 334790116,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "voidlsd\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "voidlsd",
|
||||
"id": 46201891,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46201891?v=4",
|
||||
"html_url": "https:\/\/github.com\/voidlsd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/voidlsd\/CVE-2021-3156",
|
||||
"description": "a simple script to patch CVE-2021-3156 (heap based buffer overflow via sudo).",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-01T00:41:55Z",
|
||||
"updated_at": "2021-02-01T00:42:21Z",
|
||||
"pushed_at": "2021-02-01T00:42:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 334914030,
|
||||
"name": "CVE-2021-3156-Patch",
|
||||
"full_name": "Ashish-dawani\/CVE-2021-3156-Patch",
|
||||
"owner": {
|
||||
"login": "Ashish-dawani",
|
||||
"id": 11299833,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11299833?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ashish-dawani"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ashish-dawani\/CVE-2021-3156-Patch",
|
||||
"description": "Patch Script for CVE-2021-3156 Heap Overflow",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-01T10:35:03Z",
|
||||
"updated_at": "2021-02-01T11:24:51Z",
|
||||
"pushed_at": "2021-02-01T11:24:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 335050084,
|
||||
"name": "ScannerCVE-2021-3156",
|
||||
"full_name": "SantiagoSerrao\/ScannerCVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "SantiagoSerrao",
|
||||
"id": 49415402,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49415402?v=4",
|
||||
"html_url": "https:\/\/github.com\/SantiagoSerrao"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SantiagoSerrao\/ScannerCVE-2021-3156",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-01T18:46:34Z",
|
||||
"updated_at": "2021-02-03T04:53:47Z",
|
||||
"pushed_at": "2021-02-01T18:50:07Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 335558169,
|
||||
"name": "CTF-2021",
|
||||
"full_name": "TheSerialiZator\/CTF-2021",
|
||||
"owner": {
|
||||
"login": "TheSerialiZator",
|
||||
"id": 69147968,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69147968?v=4",
|
||||
"html_url": "https:\/\/github.com\/TheSerialiZator"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TheSerialiZator\/CTF-2021",
|
||||
"description": "CTF for HDE 64 students at See Security College. Exploit a JWT (web part) & CVE-2021-3156 (LPE part).",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-03T08:36:01Z",
|
||||
"updated_at": "2021-05-05T10:52:48Z",
|
||||
"pushed_at": "2021-03-05T16:22:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 335565227,
|
||||
"name": "Serpentiel-CVE-2021-3156",
|
||||
"full_name": "cdeletre\/Serpentiel-CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "cdeletre",
|
||||
"id": 12409537,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12409537?v=4",
|
||||
"html_url": "https:\/\/github.com\/cdeletre"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cdeletre\/Serpentiel-CVE-2021-3156",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-03T09:04:14Z",
|
||||
"updated_at": "2021-08-28T18:19:05Z",
|
||||
"pushed_at": "2021-02-03T09:04:15Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 335576846,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "dinhbaouit\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "dinhbaouit",
|
||||
"id": 17717385,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17717385?v=4",
|
||||
"html_url": "https:\/\/github.com\/dinhbaouit"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dinhbaouit\/CVE-2021-3156",
|
||||
"description": "CVE-2021-3156 Vagrant Lab",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-03T09:48:46Z",
|
||||
"updated_at": "2021-02-11T00:47:24Z",
|
||||
"pushed_at": "2021-02-03T10:58:39Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 335602320,
|
||||
"name": "CVE-2021-3156-sudo-raising",
|
||||
"full_name": "leterts\/CVE-2021-3156-sudo-raising",
|
||||
"owner": {
|
||||
"login": "leterts",
|
||||
"id": 42484153,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42484153?v=4",
|
||||
"html_url": "https:\/\/github.com\/leterts"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/leterts\/CVE-2021-3156-sudo-raising",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-03T11:27:52Z",
|
||||
"updated_at": "2021-02-23T13:57:30Z",
|
||||
"pushed_at": "2021-02-04T06:12:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 335739221,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "CptGibbon\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "CptGibbon",
|
||||
"id": 16000770,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16000770?v=4",
|
||||
"html_url": "https:\/\/github.com\/CptGibbon"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CptGibbon\/CVE-2021-3156",
|
||||
"description": "Root shell PoC for CVE-2021-3156",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-03T19:57:56Z",
|
||||
"updated_at": "2021-09-02T01:02:31Z",
|
||||
"pushed_at": "2021-02-03T22:28:14Z",
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 68,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 336220602,
|
||||
"name": "sudo-1.8.3p1-patched",
|
||||
"full_name": "perlun\/sudo-1.8.3p1-patched",
|
||||
"owner": {
|
||||
"login": "perlun",
|
||||
"id": 630613,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/630613?v=4",
|
||||
"html_url": "https:\/\/github.com\/perlun"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/perlun\/sudo-1.8.3p1-patched",
|
||||
"description": "Custom version of sudo 1.8.3p1 with CVE-2021-3156 patches applied",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-05T09:13:17Z",
|
||||
"updated_at": "2021-02-05T09:25:37Z",
|
||||
"pushed_at": "2021-02-05T09:25:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 336638175,
|
||||
"name": "CVE-2021-3156-PoC",
|
||||
"full_name": "1N53C\/CVE-2021-3156-PoC",
|
||||
"owner": {
|
||||
"login": "1N53C",
|
||||
"id": 34792428,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34792428?v=4",
|
||||
"html_url": "https:\/\/github.com\/1N53C"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/1N53C\/CVE-2021-3156-PoC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-06T21:16:11Z",
|
||||
"updated_at": "2021-05-03T10:49:54Z",
|
||||
"pushed_at": "2021-02-06T21:20:04Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 337169035,
|
||||
"name": "CVE-2021-3156",
|
||||
|
@ -45,6 +735,121 @@
|
|||
"watchers": 34,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 337321053,
|
||||
"name": "cve-2021-3156",
|
||||
"full_name": "gmldbd94\/cve-2021-3156",
|
||||
"owner": {
|
||||
"login": "gmldbd94",
|
||||
"id": 26623299,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26623299?v=4",
|
||||
"html_url": "https:\/\/github.com\/gmldbd94"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/gmldbd94\/cve-2021-3156",
|
||||
"description": "보안취약점 확인",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-09T07:06:49Z",
|
||||
"updated_at": "2021-02-09T07:22:16Z",
|
||||
"pushed_at": "2021-02-09T07:22:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 337331342,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "jm33-m0\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "jm33-m0",
|
||||
"id": 10167884,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10167884?v=4",
|
||||
"html_url": "https:\/\/github.com\/jm33-m0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jm33-m0\/CVE-2021-3156",
|
||||
"description": "sudo heap overflow to LPE, in Go",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-09T07:55:47Z",
|
||||
"updated_at": "2021-04-01T07:31:47Z",
|
||||
"pushed_at": "2021-02-09T08:11:04Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 337512578,
|
||||
"name": "CVE-2021-3156-plus",
|
||||
"full_name": "Rvn0xsy\/CVE-2021-3156-plus",
|
||||
"owner": {
|
||||
"login": "Rvn0xsy",
|
||||
"id": 19944759,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19944759?v=4",
|
||||
"html_url": "https:\/\/github.com\/Rvn0xsy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Rvn0xsy\/CVE-2021-3156-plus",
|
||||
"description": "CVE-2021-3156非交互式执行命令",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-09T19:25:18Z",
|
||||
"updated_at": "2021-08-24T15:13:20Z",
|
||||
"pushed_at": "2021-02-09T19:31:33Z",
|
||||
"stargazers_count": 160,
|
||||
"watchers_count": 160,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"watchers": 160,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 338208683,
|
||||
"name": "how-to-solve-sudo-heap-based-bufferoverflow-vulnerability",
|
||||
"full_name": "r3k4t\/how-to-solve-sudo-heap-based-bufferoverflow-vulnerability",
|
||||
"owner": {
|
||||
"login": "r3k4t",
|
||||
"id": 69615463,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69615463?v=4",
|
||||
"html_url": "https:\/\/github.com\/r3k4t"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/r3k4t\/how-to-solve-sudo-heap-based-bufferoverflow-vulnerability",
|
||||
"description": "How to solve Sudo Heap-Based Buffer Overflow Vulnerability — CVE-2021-3156?",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-12T02:44:30Z",
|
||||
"updated_at": "2021-02-12T10:21:45Z",
|
||||
"pushed_at": "2021-02-12T10:21:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 341413027,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "oneoy\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "oneoy",
|
||||
"id": 38435398,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38435398?v=4",
|
||||
"html_url": "https:\/\/github.com\/oneoy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/oneoy\/CVE-2021-3156",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-23T03:14:36Z",
|
||||
"updated_at": "2021-02-23T03:14:48Z",
|
||||
"pushed_at": "2021-02-23T03:14:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 346111226,
|
||||
"name": "CVE-2021-3156",
|
||||
|
@ -91,6 +896,121 @@
|
|||
"watchers": 369,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 348626339,
|
||||
"name": "Sudo-Spunk",
|
||||
"full_name": "Chal13W1zz\/Sudo-Spunk",
|
||||
"owner": {
|
||||
"login": "Chal13W1zz",
|
||||
"id": 60155767,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60155767?v=4",
|
||||
"html_url": "https:\/\/github.com\/Chal13W1zz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Chal13W1zz\/Sudo-Spunk",
|
||||
"description": "An Exploit Utlising CVE-2021-3156 To Harvest All passwords in any Linux system with Sudo < version 1.9.5p2.",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-17T08:02:07Z",
|
||||
"updated_at": "2021-04-17T07:19:18Z",
|
||||
"pushed_at": "2021-04-17T07:19:16Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 349444222,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "lmol\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "lmol",
|
||||
"id": 1568731,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1568731?v=4",
|
||||
"html_url": "https:\/\/github.com\/lmol"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lmol\/CVE-2021-3156",
|
||||
"description": "Exploit generator for sudo CVE-2021-3156",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-19T14:06:09Z",
|
||||
"updated_at": "2021-07-23T15:04:27Z",
|
||||
"pushed_at": "2021-03-25T23:52:40Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 352891561,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "Nokialinux\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "Nokialinux",
|
||||
"id": 42698332,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42698332?v=4",
|
||||
"html_url": "https:\/\/github.com\/Nokialinux"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Nokialinux\/CVE-2021-3156",
|
||||
"description": "CVE-2021-3156漏洞修复Shell",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-30T06:17:44Z",
|
||||
"updated_at": "2021-03-30T06:59:35Z",
|
||||
"pushed_at": "2021-03-30T06:58:11Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 354429117,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "password520\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "password520",
|
||||
"id": 29515145,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29515145?v=4",
|
||||
"html_url": "https:\/\/github.com\/password520"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/password520\/CVE-2021-3156",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-04-04T01:15:05Z",
|
||||
"updated_at": "2021-04-04T01:15:15Z",
|
||||
"pushed_at": "2021-04-04T01:15:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 354924420,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "capturingcats\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "capturingcats",
|
||||
"id": 81662965,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81662965?v=4",
|
||||
"html_url": "https:\/\/github.com\/capturingcats"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/capturingcats\/CVE-2021-3156",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-04-05T18:00:43Z",
|
||||
"updated_at": "2021-04-05T18:39:34Z",
|
||||
"pushed_at": "2021-04-05T18:03:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 362713324,
|
||||
"name": "pwnedit",
|
||||
|
|
25
2021/CVE-2021-3164.json
Normal file
25
2021/CVE-2021-3164.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 331173610,
|
||||
"name": "cve-2021-3164",
|
||||
"full_name": "rmccarth\/cve-2021-3164",
|
||||
"owner": {
|
||||
"login": "rmccarth",
|
||||
"id": 36937649,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36937649?v=4",
|
||||
"html_url": "https:\/\/github.com\/rmccarth"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rmccarth\/cve-2021-3164",
|
||||
"description": "Church Rota version 2.6.4 is vulnerable to authenticated remote code execution. The user does not need to have file upload permission in order to upload and execute an arbitrary file. The application is written primarily with PHP so we use PHP in our PoC ",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-20T02:48:46Z",
|
||||
"updated_at": "2021-02-04T04:42:03Z",
|
||||
"pushed_at": "2021-01-20T02:49:27Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-3165.json
Normal file
25
2021/CVE-2021-3165.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 337666297,
|
||||
"name": "CVE-2021-3165",
|
||||
"full_name": "orionhridoy\/CVE-2021-3165",
|
||||
"owner": {
|
||||
"login": "orionhridoy",
|
||||
"id": 76449180,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76449180?v=4",
|
||||
"html_url": "https:\/\/github.com\/orionhridoy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/orionhridoy\/CVE-2021-3165",
|
||||
"description": "CVE-2021-3165: SmartAgent 3.1.0 - Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-10T08:51:00Z",
|
||||
"updated_at": "2021-04-07T15:49:11Z",
|
||||
"pushed_at": "2021-04-07T15:49:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-3229.json
Normal file
25
2021/CVE-2021-3229.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 336803155,
|
||||
"name": "CVE-2021-3229",
|
||||
"full_name": "fullbbadda1208\/CVE-2021-3229",
|
||||
"owner": {
|
||||
"login": "fullbbadda1208",
|
||||
"id": 67869836,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67869836?v=4",
|
||||
"html_url": "https:\/\/github.com\/fullbbadda1208"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fullbbadda1208\/CVE-2021-3229",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-07T14:12:27Z",
|
||||
"updated_at": "2021-02-07T14:18:55Z",
|
||||
"pushed_at": "2021-02-07T14:18:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-3317.json
Normal file
25
2021/CVE-2021-3317.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 356180253,
|
||||
"name": "CVE-2021-3317",
|
||||
"full_name": "Al1ex\/CVE-2021-3317",
|
||||
"owner": {
|
||||
"login": "Al1ex",
|
||||
"id": 38161463,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
|
||||
"html_url": "https:\/\/github.com\/Al1ex"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2021-3317",
|
||||
"description": "CVE-2021-3317",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-09T07:36:46Z",
|
||||
"updated_at": "2021-07-19T01:13:20Z",
|
||||
"pushed_at": "2021-04-09T07:37:29Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-3345.json
Normal file
25
2021/CVE-2021-3345.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 334617977,
|
||||
"name": "CVE-2021-3345",
|
||||
"full_name": "MLGRadish\/CVE-2021-3345",
|
||||
"owner": {
|
||||
"login": "MLGRadish",
|
||||
"id": 23532098,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23532098?v=4",
|
||||
"html_url": "https:\/\/github.com\/MLGRadish"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MLGRadish\/CVE-2021-3345",
|
||||
"description": "POC exploit of CVE-2021-3345, a vulnerability in libgcrypt version 1.9.0",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-31T09:28:14Z",
|
||||
"updated_at": "2021-04-02T05:17:18Z",
|
||||
"pushed_at": "2021-02-07T02:40:38Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-3378.json
Normal file
25
2021/CVE-2021-3378.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 334535823,
|
||||
"name": "fortilogger_arbitrary_fileupload",
|
||||
"full_name": "erberkan\/fortilogger_arbitrary_fileupload",
|
||||
"owner": {
|
||||
"login": "erberkan",
|
||||
"id": 15521812,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15521812?v=4",
|
||||
"html_url": "https:\/\/github.com\/erberkan"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/erberkan\/fortilogger_arbitrary_fileupload",
|
||||
"description": "CVE-2021-3378 | FortiLogger - Unauthenticated Arbitrary File Upload (Metasploit)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T23:47:14Z",
|
||||
"updated_at": "2021-07-19T01:14:50Z",
|
||||
"pushed_at": "2021-02-28T16:29:07Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-3395.json
Normal file
25
2021/CVE-2021-3395.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 335386045,
|
||||
"name": "CVE-2021-3395",
|
||||
"full_name": "jet-pentest\/CVE-2021-3395",
|
||||
"owner": {
|
||||
"login": "jet-pentest",
|
||||
"id": 71512502,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71512502?v=4",
|
||||
"html_url": "https:\/\/github.com\/jet-pentest"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jet-pentest\/CVE-2021-3395",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-02T18:31:35Z",
|
||||
"updated_at": "2021-02-14T09:24:05Z",
|
||||
"pushed_at": "2021-02-02T18:38:00Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-26T01:09:25Z",
|
||||
"updated_at": "2021-08-27T08:27:41Z",
|
||||
"updated_at": "2021-09-05T08:54:10Z",
|
||||
"pushed_at": "2021-08-25T01:00:49Z",
|
||||
"stargazers_count": 207,
|
||||
"watchers_count": 207,
|
||||
"stargazers_count": 208,
|
||||
"watchers_count": 208,
|
||||
"forks_count": 38,
|
||||
"forks": 38,
|
||||
"watchers": 207,
|
||||
"watchers": 208,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-02T12:10:49Z",
|
||||
"updated_at": "2021-09-02T11:28:36Z",
|
||||
"updated_at": "2021-09-05T04:16:29Z",
|
||||
"pushed_at": "2021-07-02T12:17:50Z",
|
||||
"stargazers_count": 122,
|
||||
"watchers_count": 122,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 122,
|
||||
"stargazers_count": 123,
|
||||
"watchers_count": 123,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"watchers": 123,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "PrintNightmare - Windows Print Spooler RCE\/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-03T15:15:12Z",
|
||||
"updated_at": "2021-08-27T17:23:44Z",
|
||||
"updated_at": "2021-09-05T03:47:37Z",
|
||||
"pushed_at": "2021-07-19T01:22:40Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
619
README.md
619
README.md
|
@ -4,6 +4,14 @@
|
|||
### CVE-2021-09
|
||||
- [zeroc00I/CVE-2021-09-03](https://github.com/zeroc00I/CVE-2021-09-03)
|
||||
|
||||
### CVE-2021-1056 (2021-01-07)
|
||||
|
||||
<code>
|
||||
NVIDIA GPU Display Driver for Linux, all versions, contains a vulnerability in the kernel mode layer (nvidia.ko) in which it does not completely honor operating system file system permissions to provide GPU device-level isolation, which may lead to denial of service or information disclosure.
|
||||
</code>
|
||||
|
||||
- [pokerfaceSad/CVE-2021-1056](https://github.com/pokerfaceSad/CVE-2021-1056)
|
||||
|
||||
### CVE-2021-1480 (2021-04-08)
|
||||
|
||||
<code>
|
||||
|
@ -12,6 +20,14 @@ Multiple vulnerabilities in Cisco SD-WAN vManage Software could allow an unauthe
|
|||
|
||||
- [xmco/sdwan-cve-2021-1480](https://github.com/xmco/sdwan-cve-2021-1480)
|
||||
|
||||
### CVE-2021-1656 (2021-01-12)
|
||||
|
||||
<code>
|
||||
TPM Device Driver Information Disclosure Vulnerability
|
||||
</code>
|
||||
|
||||
- [waleedassar/CVE-2021-1656](https://github.com/waleedassar/CVE-2021-1656)
|
||||
|
||||
### CVE-2021-1675 (2021-06-08)
|
||||
|
||||
<code>
|
||||
|
@ -50,12 +66,32 @@ Windows Print Spooler Elevation of Privilege Vulnerability
|
|||
- [hahaleyile/my-CVE-2021-1675](https://github.com/hahaleyile/my-CVE-2021-1675)
|
||||
- [mstxq17/CVE-2021-1675_RDL_LPE](https://github.com/mstxq17/CVE-2021-1675_RDL_LPE)
|
||||
|
||||
### CVE-2021-1699 (2021-01-12)
|
||||
|
||||
<code>
|
||||
Windows (modem.sys) Information Disclosure Vulnerability
|
||||
</code>
|
||||
|
||||
- [waleedassar/CVE-2021-1699](https://github.com/waleedassar/CVE-2021-1699)
|
||||
|
||||
### CVE-2021-1727 (2021-02-25)
|
||||
|
||||
<code>
|
||||
Windows Installer Elevation of Privilege Vulnerability
|
||||
</code>
|
||||
|
||||
- [klinix5/CVE-2021-1727](https://github.com/klinix5/CVE-2021-1727)
|
||||
|
||||
### CVE-2021-1732 (2021-02-25)
|
||||
|
||||
<code>
|
||||
Windows Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-1698.
|
||||
</code>
|
||||
|
||||
- [KaLendsi/CVE-2021-1732-Exploit](https://github.com/KaLendsi/CVE-2021-1732-Exploit)
|
||||
- [k-k-k-k-k/CVE-2021-1732](https://github.com/k-k-k-k-k/CVE-2021-1732)
|
||||
- [oneoy/CVE-2021-1732-Exploit](https://github.com/oneoy/CVE-2021-1732-Exploit)
|
||||
- [linuxdy/CVE-2021-1732_exp](https://github.com/linuxdy/CVE-2021-1732_exp)
|
||||
- [Pai-Po/CVE-2021-1732](https://github.com/Pai-Po/CVE-2021-1732)
|
||||
- [exploitblizzard/Windows-Privilege-Escalation-CVE-2021-1732](https://github.com/exploitblizzard/Windows-Privilege-Escalation-CVE-2021-1732)
|
||||
|
||||
|
@ -68,6 +104,14 @@ A validation issue was addressed with improved input sanitization. This issue is
|
|||
- [tihmstar/itmsBlock](https://github.com/tihmstar/itmsBlock)
|
||||
- [ChiChou/mistune-patch-backport](https://github.com/ChiChou/mistune-patch-backport)
|
||||
|
||||
### CVE-2021-1782 (2021-04-02)
|
||||
|
||||
<code>
|
||||
A race condition was addressed with improved locking. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited..
|
||||
</code>
|
||||
|
||||
- [synacktiv/CVE-2021-1782](https://github.com/synacktiv/CVE-2021-1782)
|
||||
|
||||
### CVE-2021-1905 (2021-05-07)
|
||||
|
||||
<code>
|
||||
|
@ -76,6 +120,14 @@ Possible use after free due to improper handling of memory mapping of multiple p
|
|||
|
||||
- [TAKIANFIF/CVE-2021-1905-CVE-2021-1906-CVE-2021-28663-CVE-2021-28664](https://github.com/TAKIANFIF/CVE-2021-1905-CVE-2021-1906-CVE-2021-28663-CVE-2021-28664)
|
||||
|
||||
### CVE-2021-1994 (2021-01-20)
|
||||
|
||||
<code>
|
||||
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Services). Supported versions that are affected are 10.3.6.0.0 and 12.1.3.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
|
||||
</code>
|
||||
|
||||
- [somatrasss/weblogic2021](https://github.com/somatrasss/weblogic2021)
|
||||
|
||||
### CVE-2021-2021 (2021-01-20)
|
||||
|
||||
<code>
|
||||
|
@ -90,6 +142,8 @@ Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Op
|
|||
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
|
||||
</code>
|
||||
|
||||
- [Al1ex/CVE-2021-2109](https://github.com/Al1ex/CVE-2021-2109)
|
||||
- [rabbitsafe/CVE-2021-2109](https://github.com/rabbitsafe/CVE-2021-2109)
|
||||
- [yuaneuro/CVE-2021-2109_poc](https://github.com/yuaneuro/CVE-2021-2109_poc)
|
||||
- [dinosn/CVE-2021-2109](https://github.com/dinosn/CVE-2021-2109)
|
||||
|
||||
|
@ -125,17 +179,54 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
|
|||
ffay lanproxy 0.1 allows Directory Traversal to read /../conf/config.properties to obtain credentials for a connection to the intranet.
|
||||
</code>
|
||||
|
||||
- [B1anda0/CVE-2021-3019](https://github.com/B1anda0/CVE-2021-3019)
|
||||
- [FanqXu/CVE-2021-3019](https://github.com/FanqXu/CVE-2021-3019)
|
||||
- [liuxu54898/CVE-2021-3019](https://github.com/liuxu54898/CVE-2021-3019)
|
||||
- [murataydemir/CVE-2021-3019](https://github.com/murataydemir/CVE-2021-3019)
|
||||
- [Aoyuh/cve-2021-3019](https://github.com/Aoyuh/cve-2021-3019)
|
||||
- [givemefivw/CVE-2021-3019](https://github.com/givemefivw/CVE-2021-3019)
|
||||
- [qiezi-maozi/CVE-2021-3019-Lanproxy](https://github.com/qiezi-maozi/CVE-2021-3019-Lanproxy)
|
||||
|
||||
### CVE-2021-3122 (2021-02-07)
|
||||
|
||||
<code>
|
||||
CMCAgent in NCR Command Center Agent 16.3 on Aloha POS/BOH servers permits the submission of a runCommand parameter (within an XML document sent to port 8089) that enables the remote, unauthenticated execution of an arbitrary command as SYSTEM, as exploited in the wild in 2020 and/or 2021. NOTE: the vendor's position is that exploitation occurs only on devices with a certain "misconfiguration."
|
||||
</code>
|
||||
|
||||
- [roughb8722/CVE-2021-3122-Details](https://github.com/roughb8722/CVE-2021-3122-Details)
|
||||
|
||||
### CVE-2021-3129 (2021-01-12)
|
||||
|
||||
<code>
|
||||
Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2.
|
||||
</code>
|
||||
|
||||
- [ambionics/laravel-exploits](https://github.com/ambionics/laravel-exploits)
|
||||
- [SNCKER/CVE-2021-3129](https://github.com/SNCKER/CVE-2021-3129)
|
||||
- [SecPros-Team/laravel-CVE-2021-3129-EXP](https://github.com/SecPros-Team/laravel-CVE-2021-3129-EXP)
|
||||
- [crisprss/Laravel_CVE-2021-3129_EXP](https://github.com/crisprss/Laravel_CVE-2021-3129_EXP)
|
||||
- [nth347/CVE-2021-3129_exploit](https://github.com/nth347/CVE-2021-3129_exploit)
|
||||
- [FunPhishing/Laravel-8.4.2-rce-CVE-2021-3129](https://github.com/FunPhishing/Laravel-8.4.2-rce-CVE-2021-3129)
|
||||
- [zhzyker/CVE-2021-3129](https://github.com/zhzyker/CVE-2021-3129)
|
||||
- [simonlee-hello/CVE-2021-3129](https://github.com/simonlee-hello/CVE-2021-3129)
|
||||
- [1111one/laravel-CVE-2021-3129-EXP](https://github.com/1111one/laravel-CVE-2021-3129-EXP)
|
||||
|
||||
### CVE-2021-3130 (2021-01-20)
|
||||
|
||||
<code>
|
||||
Within the Open-AudIT up to version 3.5.3 application, the web interface hides SSH secrets, Windows passwords, and SNMP strings from users using HTML 'password field' obfuscation. By using Developer tools or similar, it is possible to change the obfuscation so that the credentials are visible.
|
||||
</code>
|
||||
|
||||
- [jet-pentest/CVE-2021-3130](https://github.com/jet-pentest/CVE-2021-3130)
|
||||
|
||||
### CVE-2021-3131 (2021-01-13)
|
||||
|
||||
<code>
|
||||
The Web server in 1C:Enterprise 8 before 8.3.17.1851 sends base64 encoded credentials in the creds URL parameter.
|
||||
</code>
|
||||
|
||||
- [jet-pentest/CVE-2021-3131](https://github.com/jet-pentest/CVE-2021-3131)
|
||||
|
||||
### CVE-2021-3138 (2021-01-13)
|
||||
|
||||
<code>
|
||||
|
@ -150,10 +241,50 @@ In Discourse 2.7.0 through beta1, a rate-limit bypass leads to a bypass of the 2
|
|||
Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.
|
||||
</code>
|
||||
|
||||
- [mr-r3b00t/CVE-2021-3156](https://github.com/mr-r3b00t/CVE-2021-3156)
|
||||
- [nexcess/sudo_cve-2021-3156](https://github.com/nexcess/sudo_cve-2021-3156)
|
||||
- [reverse-ex/CVE-2021-3156](https://github.com/reverse-ex/CVE-2021-3156)
|
||||
- [jokerTPR2004/CVE-2021-3156](https://github.com/jokerTPR2004/CVE-2021-3156)
|
||||
- [ymrsmns/CVE-2021-3156](https://github.com/ymrsmns/CVE-2021-3156)
|
||||
- [elbee-cyber/CVE-2021-3156-PATCHER](https://github.com/elbee-cyber/CVE-2021-3156-PATCHER)
|
||||
- [kernelzeroday/CVE-2021-3156-Baron-Samedit](https://github.com/kernelzeroday/CVE-2021-3156-Baron-Samedit)
|
||||
- [yaunsky/cve-2021-3156](https://github.com/yaunsky/cve-2021-3156)
|
||||
- [H4ckForJob/cve-2021-3156](https://github.com/H4ckForJob/cve-2021-3156)
|
||||
- [baka9moe/CVE-2021-3156-Exp](https://github.com/baka9moe/CVE-2021-3156-Exp)
|
||||
- [ph4ntonn/CVE-2021-3156](https://github.com/ph4ntonn/CVE-2021-3156)
|
||||
- [binw2018/CVE-2021-3156-SCRIPT](https://github.com/binw2018/CVE-2021-3156-SCRIPT)
|
||||
- [freeFV/CVE-2021-3156](https://github.com/freeFV/CVE-2021-3156)
|
||||
- [mbcrump/CVE-2021-3156](https://github.com/mbcrump/CVE-2021-3156)
|
||||
- [stong/CVE-2021-3156](https://github.com/stong/CVE-2021-3156)
|
||||
- [nobodyatall648/CVE-2021-3156](https://github.com/nobodyatall648/CVE-2021-3156)
|
||||
- [blasty/CVE-2021-3156](https://github.com/blasty/CVE-2021-3156)
|
||||
- [teamtopkarl/CVE-2021-3156](https://github.com/teamtopkarl/CVE-2021-3156)
|
||||
- [Q4n/CVE-2021-3156](https://github.com/Q4n/CVE-2021-3156)
|
||||
- [kal1gh0st/CVE-2021-3156](https://github.com/kal1gh0st/CVE-2021-3156)
|
||||
- [apogiatzis/docker-CVE-2021-3156](https://github.com/apogiatzis/docker-CVE-2021-3156)
|
||||
- [voidlsd/CVE-2021-3156](https://github.com/voidlsd/CVE-2021-3156)
|
||||
- [Ashish-dawani/CVE-2021-3156-Patch](https://github.com/Ashish-dawani/CVE-2021-3156-Patch)
|
||||
- [SantiagoSerrao/ScannerCVE-2021-3156](https://github.com/SantiagoSerrao/ScannerCVE-2021-3156)
|
||||
- [TheSerialiZator/CTF-2021](https://github.com/TheSerialiZator/CTF-2021)
|
||||
- [cdeletre/Serpentiel-CVE-2021-3156](https://github.com/cdeletre/Serpentiel-CVE-2021-3156)
|
||||
- [dinhbaouit/CVE-2021-3156](https://github.com/dinhbaouit/CVE-2021-3156)
|
||||
- [leterts/CVE-2021-3156-sudo-raising](https://github.com/leterts/CVE-2021-3156-sudo-raising)
|
||||
- [CptGibbon/CVE-2021-3156](https://github.com/CptGibbon/CVE-2021-3156)
|
||||
- [perlun/sudo-1.8.3p1-patched](https://github.com/perlun/sudo-1.8.3p1-patched)
|
||||
- [1N53C/CVE-2021-3156-PoC](https://github.com/1N53C/CVE-2021-3156-PoC)
|
||||
- [0xdevil/CVE-2021-3156](https://github.com/0xdevil/CVE-2021-3156)
|
||||
- [gmldbd94/cve-2021-3156](https://github.com/gmldbd94/cve-2021-3156)
|
||||
- [jm33-m0/CVE-2021-3156](https://github.com/jm33-m0/CVE-2021-3156)
|
||||
- [Rvn0xsy/CVE-2021-3156-plus](https://github.com/Rvn0xsy/CVE-2021-3156-plus)
|
||||
- [r3k4t/how-to-solve-sudo-heap-based-bufferoverflow-vulnerability](https://github.com/r3k4t/how-to-solve-sudo-heap-based-bufferoverflow-vulnerability)
|
||||
- [oneoy/CVE-2021-3156](https://github.com/oneoy/CVE-2021-3156)
|
||||
- [dock0d1/CVE-2021-3156](https://github.com/dock0d1/CVE-2021-3156)
|
||||
- [worawit/CVE-2021-3156](https://github.com/worawit/CVE-2021-3156)
|
||||
- [Chal13W1zz/Sudo-Spunk](https://github.com/Chal13W1zz/Sudo-Spunk)
|
||||
- [lmol/CVE-2021-3156](https://github.com/lmol/CVE-2021-3156)
|
||||
- [Nokialinux/CVE-2021-3156](https://github.com/Nokialinux/CVE-2021-3156)
|
||||
- [password520/CVE-2021-3156](https://github.com/password520/CVE-2021-3156)
|
||||
- [capturingcats/CVE-2021-3156](https://github.com/capturingcats/CVE-2021-3156)
|
||||
- [LiveOverflow/pwnedit](https://github.com/LiveOverflow/pwnedit)
|
||||
- [ajtech-hue/CVE-2021-3156-Mitigation-ShellScript-Build](https://github.com/ajtech-hue/CVE-2021-3156-Mitigation-ShellScript-Build)
|
||||
- [wuuconix/CVE-2021-3156-Dockerfile-not-succeed](https://github.com/wuuconix/CVE-2021-3156-Dockerfile-not-succeed)
|
||||
|
@ -161,6 +292,30 @@ Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based
|
|||
- [CyberCommands/CVE-2021-3156](https://github.com/CyberCommands/CVE-2021-3156)
|
||||
- [0x7183/CVE-2021-3156](https://github.com/0x7183/CVE-2021-3156)
|
||||
|
||||
### CVE-2021-3164 (2021-01-21)
|
||||
|
||||
<code>
|
||||
ChurchRota 2.6.4 is vulnerable to authenticated remote code execution. The user does not need to have file upload permission in order to upload and execute an arbitrary file via a POST request to resources.php.
|
||||
</code>
|
||||
|
||||
- [rmccarth/cve-2021-3164](https://github.com/rmccarth/cve-2021-3164)
|
||||
|
||||
### CVE-2021-3165 (2021-01-26)
|
||||
|
||||
<code>
|
||||
SmartAgent 3.1.0 allows a ViewOnly attacker to create a SuperUser account via the /#/CampaignManager/users URI.
|
||||
</code>
|
||||
|
||||
- [orionhridoy/CVE-2021-3165](https://github.com/orionhridoy/CVE-2021-3165)
|
||||
|
||||
### CVE-2021-3229 (2021-02-05)
|
||||
|
||||
<code>
|
||||
Denial of service in ASUSWRT ASUS RT-AX3000 firmware versions 3.0.0.4.384_10177 and earlier versions allows an attacker to disrupt the use of device setup services via continuous login error.
|
||||
</code>
|
||||
|
||||
- [fullbbadda1208/CVE-2021-3229](https://github.com/fullbbadda1208/CVE-2021-3229)
|
||||
|
||||
### CVE-2021-3281 (2021-02-02)
|
||||
|
||||
<code>
|
||||
|
@ -185,9 +340,41 @@ Western Digital My Cloud OS 5 devices before 5.10.122 mishandle Symbolic Link Fo
|
|||
|
||||
- [piffd0s/CVE-2021-3310](https://github.com/piffd0s/CVE-2021-3310)
|
||||
|
||||
### CVE-2021-3317 (2021-01-26)
|
||||
|
||||
<code>
|
||||
KLog Server through 2.4.1 allows authenticated command injection. async.php calls shell_exec() on the original value of the source parameter.
|
||||
</code>
|
||||
|
||||
- [Al1ex/CVE-2021-3317](https://github.com/Al1ex/CVE-2021-3317)
|
||||
|
||||
### CVE-2021-3345 (2021-01-29)
|
||||
|
||||
<code>
|
||||
_gcry_md_block_write in cipher/hash-common.c in Libgcrypt version 1.9.0 has a heap-based buffer overflow when the digest final function sets a large count value. It is recommended to upgrade to 1.9.1 or later.
|
||||
</code>
|
||||
|
||||
- [MLGRadish/CVE-2021-3345](https://github.com/MLGRadish/CVE-2021-3345)
|
||||
|
||||
### CVE-2021-3360
|
||||
- [tcbutler320/CVE-2021-3360](https://github.com/tcbutler320/CVE-2021-3360)
|
||||
|
||||
### CVE-2021-3378 (2021-02-01)
|
||||
|
||||
<code>
|
||||
FortiLogger 4.4.2.2 is affected by Arbitrary File Upload by sending a "Content-Type: image/png" header to Config/SaveUploadedHotspotLogoFile and then visiting Assets/temp/hotspot/img/logohotspot.asp.
|
||||
</code>
|
||||
|
||||
- [erberkan/fortilogger_arbitrary_fileupload](https://github.com/erberkan/fortilogger_arbitrary_fileupload)
|
||||
|
||||
### CVE-2021-3395 (2021-02-02)
|
||||
|
||||
<code>
|
||||
A cross-site scripting (XSS) vulnerability in Pryaniki 6.44.3 allows remote authenticated users to upload an arbitrary file. The JavaScript code will execute when someone visits the attachment.
|
||||
</code>
|
||||
|
||||
- [jet-pentest/CVE-2021-3395](https://github.com/jet-pentest/CVE-2021-3395)
|
||||
|
||||
### CVE-2021-3438 (2021-05-20)
|
||||
|
||||
<code>
|
||||
|
@ -304,6 +491,54 @@ Cross-site scripting vulnerability in EC-CUBE 4.0.0 to 4.0.5 allows a remote att
|
|||
|
||||
- [s-index/CVE-2021-20717](https://github.com/s-index/CVE-2021-20717)
|
||||
|
||||
### CVE-2021-21014 (2021-02-11)
|
||||
|
||||
<code>
|
||||
Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to a file upload restriction bypass. Successful exploitation could lead to arbitrary code execution by an authenticated attacker. Access to the admin console is required for successful exploitation.
|
||||
</code>
|
||||
|
||||
- [HoangKien1020/CVE-2021-21014](https://github.com/HoangKien1020/CVE-2021-21014)
|
||||
|
||||
### CVE-2021-21017 (2021-02-11)
|
||||
|
||||
<code>
|
||||
Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a heap-based buffer overflow vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
||||
</code>
|
||||
|
||||
- [ZeusBox/CVE-2021-21017](https://github.com/ZeusBox/CVE-2021-21017)
|
||||
|
||||
### CVE-2021-21042 (2021-02-11)
|
||||
|
||||
<code>
|
||||
Acrobat Reader DC versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by an Out-of-bounds Read vulnerability that could lead to arbitrary disclosure of information in the memory stack. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
||||
</code>
|
||||
|
||||
- [NattiSamson/CVE-2021-21042](https://github.com/NattiSamson/CVE-2021-21042)
|
||||
|
||||
### CVE-2021-21110 (2021-01-08)
|
||||
|
||||
<code>
|
||||
Use after free in safe browsing in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
|
||||
</code>
|
||||
|
||||
- [Gh0st0ne/CVE-2021-21110](https://github.com/Gh0st0ne/CVE-2021-21110)
|
||||
|
||||
### CVE-2021-21123 (2021-02-09)
|
||||
|
||||
<code>
|
||||
Insufficient data validation in File System API in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page.
|
||||
</code>
|
||||
|
||||
- [Puliczek/CVE-2021-21123-PoC-Google-Chrome](https://github.com/Puliczek/CVE-2021-21123-PoC-Google-Chrome)
|
||||
|
||||
### CVE-2021-21148 (2021-02-09)
|
||||
|
||||
<code>
|
||||
Heap buffer overflow in V8 in Google Chrome prior to 88.0.4324.150 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
||||
</code>
|
||||
|
||||
- [Grayhaxor/CVE-2021-21148](https://github.com/Grayhaxor/CVE-2021-21148)
|
||||
|
||||
### CVE-2021-21234 (2021-01-05)
|
||||
|
||||
<code>
|
||||
|
@ -318,6 +553,16 @@ spring-boot-actuator-logview in a library that adds a simple logfile viewer as s
|
|||
Git is an open-source distributed revision control system. In affected versions of Git a specially crafted repository that contains symbolic links as well as files using a clean/smudge filter such as Git LFS, may cause just-checked out script to be executed while cloning onto a case-insensitive file system such as NTFS, HFS+ or APFS (i.e. the default file systems on Windows and macOS). Note that clean/smudge filters have to be configured for that. Git for Windows configures Git LFS by default, and is therefore vulnerable. The problem has been patched in the versions published on Tuesday, March 9th, 2021. As a workaound, if symbolic link support is disabled in Git (e.g. via `git config --global core.symlinks false`), the described attack won't work. Likewise, if no clean/smudge filters such as Git LFS are configured globally (i.e. _before_ cloning), the attack is foiled. As always, it is best to avoid cloning repositories from untrusted sources. The earliest impacted version is 2.14.2. The fix versions are: 2.30.1, 2.29.3, 2.28.1, 2.27.1, 2.26.3, 2.25.5, 2.24.4, 2.23.4, 2.22.5, 2.21.4, 2.20.5, 2.19.6, 2.18.5, 2.17.62.17.6.
|
||||
</code>
|
||||
|
||||
- [AlkenePan/CVE-2021-21300](https://github.com/AlkenePan/CVE-2021-21300)
|
||||
- [Faisal78123/CVE-2021-21300](https://github.com/Faisal78123/CVE-2021-21300)
|
||||
- [erranfenech/CVE-2021-21300](https://github.com/erranfenech/CVE-2021-21300)
|
||||
- [Maskhe/CVE-2021-21300](https://github.com/Maskhe/CVE-2021-21300)
|
||||
- [1uanWu/CVE-2021-21300](https://github.com/1uanWu/CVE-2021-21300)
|
||||
- [Kirill89/CVE-2021-21300](https://github.com/Kirill89/CVE-2021-21300)
|
||||
- [CppXL/CVE-2021-21300](https://github.com/CppXL/CVE-2021-21300)
|
||||
- [ETOCheney/cve-2021-21300](https://github.com/ETOCheney/cve-2021-21300)
|
||||
- [fengzhouc/CVE-2021-21300](https://github.com/fengzhouc/CVE-2021-21300)
|
||||
- [danshuizhangyu/CVE-2021-21300](https://github.com/danshuizhangyu/CVE-2021-21300)
|
||||
- [tao-sun2/CVE-2021-21300](https://github.com/tao-sun2/CVE-2021-21300)
|
||||
- [xiaofeihahah/CVE-2021-21300](https://github.com/xiaofeihahah/CVE-2021-21300)
|
||||
|
||||
|
@ -328,6 +573,7 @@ The System Information Library for Node.JS (npm package "systeminformation&
|
|||
</code>
|
||||
|
||||
- [ForbiddenProgrammer/CVE-2021-21315-PoC](https://github.com/ForbiddenProgrammer/CVE-2021-21315-PoC)
|
||||
- [cherrera0001/CVE-2021-21315v2](https://github.com/cherrera0001/CVE-2021-21315v2)
|
||||
- [MazX0p/CVE-2021-21315-exploit](https://github.com/MazX0p/CVE-2021-21315-exploit)
|
||||
|
||||
### CVE-2021-21341 (2021-03-22)
|
||||
|
@ -354,6 +600,17 @@ BuddyPress is an open source WordPress plugin to build a community site. In rele
|
|||
|
||||
- [HoangKien1020/CVE-2021-21389](https://github.com/HoangKien1020/CVE-2021-21389)
|
||||
|
||||
### CVE-2021-21402 (2021-03-23)
|
||||
|
||||
<code>
|
||||
Jellyfin is a Free Software Media System. In Jellyfin before version 10.7.1, with certain endpoints, well crafted requests will allow arbitrary file read from a Jellyfin server's file system. This issue is more prevalent when Windows is used as the host OS. Servers that are exposed to the public Internet are potentially at risk. This is fixed in version 10.7.1. As a workaround, users may be able to restrict some access by enforcing strict security permissions on their filesystem, however, it is recommended to update as soon as possible.
|
||||
</code>
|
||||
|
||||
- [MzzdToT/CVE-2021-21402](https://github.com/MzzdToT/CVE-2021-21402)
|
||||
- [jiaocoll/CVE-2021-21402-Jellyfin](https://github.com/jiaocoll/CVE-2021-21402-Jellyfin)
|
||||
- [somatrasss/CVE-2021-21402](https://github.com/somatrasss/CVE-2021-21402)
|
||||
- [givemefivw/CVE-2021-21402](https://github.com/givemefivw/CVE-2021-21402)
|
||||
|
||||
### CVE-2021-21425 (2021-04-07)
|
||||
|
||||
<code>
|
||||
|
@ -382,10 +639,39 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability in a v
|
|||
</code>
|
||||
|
||||
- [psc4re/NSE-scripts](https://github.com/psc4re/NSE-scripts)
|
||||
- [QmF0c3UK/CVE-2021-21972-vCenter-6.5-7.0-RCE-POC](https://github.com/QmF0c3UK/CVE-2021-21972-vCenter-6.5-7.0-RCE-POC)
|
||||
- [NS-Sp4ce/CVE-2021-21972](https://github.com/NS-Sp4ce/CVE-2021-21972)
|
||||
- [yaunsky/CVE-2021-21972](https://github.com/yaunsky/CVE-2021-21972)
|
||||
- [horizon3ai/CVE-2021-21972](https://github.com/horizon3ai/CVE-2021-21972)
|
||||
- [Osyanina/westone-CVE-2021-21972-scanner](https://github.com/Osyanina/westone-CVE-2021-21972-scanner)
|
||||
- [alt3kx/CVE-2021-21972](https://github.com/alt3kx/CVE-2021-21972)
|
||||
- [milo2012/CVE-2021-21972](https://github.com/milo2012/CVE-2021-21972)
|
||||
- [Udyz/CVE-2021-21972](https://github.com/Udyz/CVE-2021-21972)
|
||||
- [conjojo/VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972](https://github.com/conjojo/VMware_vCenter_UNAuthorized_RCE_CVE-2021-21972)
|
||||
- [L-pin/CVE-2021-21972](https://github.com/L-pin/CVE-2021-21972)
|
||||
- [B1anda0/CVE-2021-21972](https://github.com/B1anda0/CVE-2021-21972)
|
||||
- [renini/CVE-2021-21972](https://github.com/renini/CVE-2021-21972)
|
||||
- [stevenp322/cve-2021-21972](https://github.com/stevenp322/cve-2021-21972)
|
||||
- [GuayoyoCyber/CVE-2021-21972](https://github.com/GuayoyoCyber/CVE-2021-21972)
|
||||
- [JMousqueton/Detect-CVE-2021-21972](https://github.com/JMousqueton/Detect-CVE-2021-21972)
|
||||
- [robwillisinfo/VMware_vCenter_CVE-2021-21972](https://github.com/robwillisinfo/VMware_vCenter_CVE-2021-21972)
|
||||
- [gsheller/vcenter_rce](https://github.com/gsheller/vcenter_rce)
|
||||
- [d3sh1n/cve-2021-21972](https://github.com/d3sh1n/cve-2021-21972)
|
||||
- [ByZain/CVE-2021-21972](https://github.com/ByZain/CVE-2021-21972)
|
||||
- [TaroballzChen/CVE-2021-21972](https://github.com/TaroballzChen/CVE-2021-21972)
|
||||
- [password520/CVE-2021-21972](https://github.com/password520/CVE-2021-21972)
|
||||
- [murataydemir/CVE-2021-21972](https://github.com/murataydemir/CVE-2021-21972)
|
||||
- [pettyhacks/vSphereyeeter](https://github.com/pettyhacks/vSphereyeeter)
|
||||
- [haiclover/CVE-2021-21972](https://github.com/haiclover/CVE-2021-21972)
|
||||
|
||||
### CVE-2021-21973 (2021-02-24)
|
||||
|
||||
<code>
|
||||
The vSphere Client (HTML5) contains an SSRF (Server Side Request Forgery) vulnerability due to improper validation of URLs in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue by sending a POST request to vCenter Server plugin leading to information disclosure. This affects: VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2).
|
||||
</code>
|
||||
|
||||
- [freakanonymous/CVE-2021-21973-Automateme](https://github.com/freakanonymous/CVE-2021-21973-Automateme)
|
||||
|
||||
### CVE-2021-21974 (2021-02-24)
|
||||
|
||||
<code>
|
||||
|
@ -400,9 +686,24 @@ OpenSLP as used in ESXi (7.0 before ESXi70U1c-17325551, 6.7 before ESXi670-20210
|
|||
Server Side Request Forgery in vRealize Operations Manager API (CVE-2021-21975) prior to 8.4 may allow a malicious actor with network access to the vRealize Operations Manager API can perform a Server Side Request Forgery attack to steal administrative credentials.
|
||||
</code>
|
||||
|
||||
- [Henry4E36/VMWare-vRealize-SSRF](https://github.com/Henry4E36/VMWare-vRealize-SSRF)
|
||||
- [dorkerdevil/CVE-2021-21975](https://github.com/dorkerdevil/CVE-2021-21975)
|
||||
- [Al1ex/CVE-2021-21975](https://github.com/Al1ex/CVE-2021-21975)
|
||||
- [GuayoyoCyber/CVE-2021-21975](https://github.com/GuayoyoCyber/CVE-2021-21975)
|
||||
- [murataydemir/CVE-2021-21975](https://github.com/murataydemir/CVE-2021-21975)
|
||||
- [rabidwh0re/REALITY_SMASHER](https://github.com/rabidwh0re/REALITY_SMASHER)
|
||||
- [Vulnmachines/VMWare-CVE-2021-21975](https://github.com/Vulnmachines/VMWare-CVE-2021-21975)
|
||||
|
||||
### CVE-2021-21978 (2021-03-03)
|
||||
|
||||
<code>
|
||||
VMware View Planner 4.x prior to 4.6 Security Patch 1 contains a remote code execution vulnerability. Improper input validation and lack of authorization leading to arbitrary file upload in logupload web application. An unauthorized attacker with network access to View Planner Harness could upload and execute a specially crafted file leading to remote code execution within the logupload container.
|
||||
</code>
|
||||
|
||||
- [GreyOrder/CVE-2021-21978](https://github.com/GreyOrder/CVE-2021-21978)
|
||||
- [me1ons/CVE-2021-21978](https://github.com/me1ons/CVE-2021-21978)
|
||||
- [skytina/CVE-2021-21978](https://github.com/skytina/CVE-2021-21978)
|
||||
|
||||
### CVE-2021-21985 (2021-05-26)
|
||||
|
||||
<code>
|
||||
|
@ -510,6 +811,31 @@ A improper input sanitization vulnerability exists in Rocket.Chat server 3.11, 3
|
|||
- [CsEnox/CVE-2021-22911](https://github.com/CsEnox/CVE-2021-22911)
|
||||
- [optionalCTF/Rocket.Chat-Automated-Account-Takeover-RCE-CVE-2021-22911](https://github.com/optionalCTF/Rocket.Chat-Automated-Account-Takeover-RCE-CVE-2021-22911)
|
||||
|
||||
### CVE-2021-22986 (2021-03-31)
|
||||
|
||||
<code>
|
||||
On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, and 12.1.x before 12.1.5.3 amd BIG-IQ 7.1.0.x before 7.1.0.3 and 7.0.0.x before 7.0.0.2, the iControl REST interface has an unauthenticated remote command execution vulnerability. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.
|
||||
</code>
|
||||
|
||||
- [dorkerdevil/CVE-2021-22986-Poc](https://github.com/dorkerdevil/CVE-2021-22986-Poc)
|
||||
- [S1xHcL/f5_rce_poc](https://github.com/S1xHcL/f5_rce_poc)
|
||||
- [Osyanina/westone-CVE-2021-22986-scanner](https://github.com/Osyanina/westone-CVE-2021-22986-scanner)
|
||||
- [Udyz/CVE-2021-22986-SSRF2RCE](https://github.com/Udyz/CVE-2021-22986-SSRF2RCE)
|
||||
- [safesword/F5_RCE](https://github.com/safesword/F5_RCE)
|
||||
- [Al1ex/CVE-2021-22986](https://github.com/Al1ex/CVE-2021-22986)
|
||||
- [ZephrFish/CVE-2021-22986_Check](https://github.com/ZephrFish/CVE-2021-22986_Check)
|
||||
- [yaunsky/CVE-202122986-EXP](https://github.com/yaunsky/CVE-202122986-EXP)
|
||||
- [Tas9er/CVE-2021-22986](https://github.com/Tas9er/CVE-2021-22986)
|
||||
- [dotslashed/CVE-2021-22986](https://github.com/dotslashed/CVE-2021-22986)
|
||||
|
||||
### CVE-2021-23132 (2021-03-04)
|
||||
|
||||
<code>
|
||||
An issue was discovered in Joomla! 3.0.0 through 3.9.24. com_media allowed paths that are not intended for image uploads
|
||||
</code>
|
||||
|
||||
- [HoangKien1020/CVE-2021-23132](https://github.com/HoangKien1020/CVE-2021-23132)
|
||||
|
||||
### CVE-2021-23383 (2021-05-04)
|
||||
|
||||
<code>
|
||||
|
@ -529,6 +855,38 @@ A cache configuration issue prior to WhatsApp for Android v2.21.4.18 and WhatsAp
|
|||
|
||||
- [CENSUS/whatsapp-mitd-mitm](https://github.com/CENSUS/whatsapp-mitd-mitm)
|
||||
|
||||
### CVE-2021-24085 (2021-02-25)
|
||||
|
||||
<code>
|
||||
Microsoft Exchange Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-1730.
|
||||
</code>
|
||||
|
||||
- [sourceincite/CVE-2021-24085](https://github.com/sourceincite/CVE-2021-24085)
|
||||
|
||||
### CVE-2021-24086 (2021-02-25)
|
||||
|
||||
<code>
|
||||
Windows TCP/IP Denial of Service Vulnerability
|
||||
</code>
|
||||
|
||||
- [0vercl0k/CVE-2021-24086](https://github.com/0vercl0k/CVE-2021-24086)
|
||||
|
||||
### CVE-2021-24096 (2021-02-25)
|
||||
|
||||
<code>
|
||||
Windows Kernel Elevation of Privilege Vulnerability
|
||||
</code>
|
||||
|
||||
- [FunPhishing/CVE-2021-24096](https://github.com/FunPhishing/CVE-2021-24096)
|
||||
|
||||
### CVE-2021-24098 (2021-02-25)
|
||||
|
||||
<code>
|
||||
Windows Console Driver Denial of Service Vulnerability
|
||||
</code>
|
||||
|
||||
- [waleedassar/CVE-2021-24098](https://github.com/waleedassar/CVE-2021-24098)
|
||||
|
||||
### CVE-2021-24145 (2021-03-18)
|
||||
|
||||
<code>
|
||||
|
@ -559,6 +917,7 @@ The SP Project & Document Manager WordPress plugin before 4.22 allows users
|
|||
An issue was discovered in through SaltStack Salt before 3002.5. salt-api does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master.
|
||||
</code>
|
||||
|
||||
- [Immersive-Labs-Sec/CVE-2021-25281](https://github.com/Immersive-Labs-Sec/CVE-2021-25281)
|
||||
- [SkyBulk/CVE-2021-25281](https://github.com/SkyBulk/CVE-2021-25281)
|
||||
|
||||
### CVE-2021-25374 (2021-04-09)
|
||||
|
@ -583,8 +942,12 @@ Each Apache Dubbo server will set a serialization id to tell the clients which s
|
|||
Apache Druid includes the ability to execute user-provided JavaScript code embedded in various types of requests. This functionality is intended for use in high-trust environments, and is disabled by default. However, in Druid 0.20.0 and earlier, it is possible for an authenticated user to send a specially-crafted request that forces Druid to run user-provided JavaScript code for that request, regardless of server configuration. This can be leveraged to execute code on the target machine with the privileges of the Druid server process.
|
||||
</code>
|
||||
|
||||
- [yaunsky/cve-2021-25646](https://github.com/yaunsky/cve-2021-25646)
|
||||
- [lp008/CVE-2021-25646](https://github.com/lp008/CVE-2021-25646)
|
||||
- [AirEvan/CVE-2021-25646-GUI](https://github.com/AirEvan/CVE-2021-25646-GUI)
|
||||
- [Vulnmachines/Apache-Druid-CVE-2021-25646](https://github.com/Vulnmachines/Apache-Druid-CVE-2021-25646)
|
||||
- [Yang0615777/PocList](https://github.com/Yang0615777/PocList)
|
||||
- [givemefivw/CVE-2021-25646](https://github.com/givemefivw/CVE-2021-25646)
|
||||
|
||||
### CVE-2021-25679 (2021-04-20)
|
||||
|
||||
|
@ -642,6 +1005,14 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
|
|||
- [march0s1as/CVE-2021-26084](https://github.com/march0s1as/CVE-2021-26084)
|
||||
- [wolf1892/confluence-rce-poc](https://github.com/wolf1892/confluence-rce-poc)
|
||||
|
||||
### CVE-2021-26119 (2021-02-21)
|
||||
|
||||
<code>
|
||||
Smarty before 3.1.39 allows a Sandbox Escape because $smarty.template_object can be accessed in sandbox mode.
|
||||
</code>
|
||||
|
||||
- [Udyz/CVE-2021-26119](https://github.com/Udyz/CVE-2021-26119)
|
||||
|
||||
### CVE-2021-26121
|
||||
- [sourceincite/CVE-2021-26121](https://github.com/sourceincite/CVE-2021-26121)
|
||||
|
||||
|
@ -651,7 +1022,10 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
|
|||
Apache OFBiz has unsafe deserialization prior to 17.12.06. An unauthenticated attacker can use this vulnerability to successfully take over Apache OFBiz.
|
||||
</code>
|
||||
|
||||
- [yumusb/CVE-2021-26295](https://github.com/yumusb/CVE-2021-26295)
|
||||
- [rakjong/CVE-2021-26295-Apache-OFBiz](https://github.com/rakjong/CVE-2021-26295-Apache-OFBiz)
|
||||
- [r0ckysec/CVE-2021-26295](https://github.com/r0ckysec/CVE-2021-26295)
|
||||
- [coolyin001/CVE-2021-26295--](https://github.com/coolyin001/CVE-2021-26295--)
|
||||
- [S0por/CVE-2021-26295-Apache-OFBiz-EXP](https://github.com/S0por/CVE-2021-26295-Apache-OFBiz-EXP)
|
||||
- [yuaneuro/ofbiz-poc](https://github.com/yuaneuro/ofbiz-poc)
|
||||
|
||||
|
@ -679,6 +1053,22 @@ In Apache HTTP Server versions 2.4.0 to 2.4.46 a specially crafted SessionHeader
|
|||
|
||||
- [fkm75P8YjLkb/CVE-2021-26691](https://github.com/fkm75P8YjLkb/CVE-2021-26691)
|
||||
|
||||
### CVE-2021-26700 (2021-02-25)
|
||||
|
||||
<code>
|
||||
Visual Studio Code npm-script Extension Remote Code Execution Vulnerability
|
||||
</code>
|
||||
|
||||
- [jackadamson/CVE-2021-26700](https://github.com/jackadamson/CVE-2021-26700)
|
||||
|
||||
### CVE-2021-26708 (2021-02-05)
|
||||
|
||||
<code>
|
||||
A local privilege escalation was discovered in the Linux kernel before 5.10.13. Multiple race conditions in the AF_VSOCK implementation are caused by wrong locking in net/vmw_vsock/af_vsock.c. The race conditions were implicitly introduced in the commits that added VSOCK multi-transport support.
|
||||
</code>
|
||||
|
||||
- [jordan9001/vsock_poc](https://github.com/jordan9001/vsock_poc)
|
||||
|
||||
### CVE-2021-26714 (2021-03-29)
|
||||
|
||||
<code>
|
||||
|
@ -705,15 +1095,57 @@ OpenPLC ScadaBR through 0.9.1 on Linux and through 1.12.4 on Windows allows remo
|
|||
|
||||
- [h3v0x/CVE-2021-26828_ScadaBR_RCE](https://github.com/h3v0x/CVE-2021-26828_ScadaBR_RCE)
|
||||
|
||||
### CVE-2021-26832 (2021-04-14)
|
||||
|
||||
<code>
|
||||
Cross Site Scripting (XSS) in the "Reset Password" page form of Priority Enterprise Management System v8.00 allows attackers to execute javascript on behalf of the victim by sending a malicious URL or directing the victim to a malicious site.
|
||||
</code>
|
||||
|
||||
- [NagliNagli/CVE-2021-26832](https://github.com/NagliNagli/CVE-2021-26832)
|
||||
|
||||
### CVE-2021-26855 (2021-03-02)
|
||||
|
||||
<code>
|
||||
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078.
|
||||
</code>
|
||||
|
||||
- [sgnls/exchange-0days-202103](https://github.com/sgnls/exchange-0days-202103)
|
||||
- [soteria-security/HAFNIUM-IOC](https://github.com/soteria-security/HAFNIUM-IOC)
|
||||
- [cert-lv/exchange_webshell_detection](https://github.com/cert-lv/exchange_webshell_detection)
|
||||
- [conjojo/Microsoft_Exchange_Server_SSRF_CVE-2021-26855](https://github.com/conjojo/Microsoft_Exchange_Server_SSRF_CVE-2021-26855)
|
||||
- [pussycat0x/CVE-2021-26855-SSRF](https://github.com/pussycat0x/CVE-2021-26855-SSRF)
|
||||
- [0xAbdullah/CVE-2021-26855](https://github.com/0xAbdullah/CVE-2021-26855)
|
||||
- [Th3eCrow/CVE-2021-26855-SSRF-Exchange](https://github.com/Th3eCrow/CVE-2021-26855-SSRF-Exchange)
|
||||
- [mekhalleh/exchange_proxylogon](https://github.com/mekhalleh/exchange_proxylogon)
|
||||
- [Yt1g3r/CVE-2021-26855_SSRF](https://github.com/Yt1g3r/CVE-2021-26855_SSRF)
|
||||
- [charlottelatest/CVE-2021-26855](https://github.com/charlottelatest/CVE-2021-26855)
|
||||
- [dwisiswant0/proxylogscan](https://github.com/dwisiswant0/proxylogscan)
|
||||
- [mauricelambert/ExchangeWeaknessTest](https://github.com/mauricelambert/ExchangeWeaknessTest)
|
||||
- [DCScoder/Exchange_IOC_Hunter](https://github.com/DCScoder/Exchange_IOC_Hunter)
|
||||
- [srvaccount/CVE-2021-26855-PoC](https://github.com/srvaccount/CVE-2021-26855-PoC)
|
||||
- [h4x0r-dz/CVE-2021-26855](https://github.com/h4x0r-dz/CVE-2021-26855)
|
||||
- [alt3kx/CVE-2021-26855_PoC](https://github.com/alt3kx/CVE-2021-26855_PoC)
|
||||
- [achabahe/CVE-2021-26855](https://github.com/achabahe/CVE-2021-26855)
|
||||
- [raheel0x01/CVE-2021-26855](https://github.com/raheel0x01/CVE-2021-26855)
|
||||
- [hackerschoice/CVE-2021-26855](https://github.com/hackerschoice/CVE-2021-26855)
|
||||
- [SCS-Labs/HAFNIUM-Microsoft-Exchange-0day](https://github.com/SCS-Labs/HAFNIUM-Microsoft-Exchange-0day)
|
||||
- [KotSec/CVE-2021-26855-Scanner](https://github.com/KotSec/CVE-2021-26855-Scanner)
|
||||
- [hakivvi/proxylogon](https://github.com/hakivvi/proxylogon)
|
||||
- [ZephrFish/Exch-CVE-2021-26855](https://github.com/ZephrFish/Exch-CVE-2021-26855)
|
||||
- [mil1200/ProxyLogon-CVE-2021-26855](https://github.com/mil1200/ProxyLogon-CVE-2021-26855)
|
||||
- [evilashz/ExchangeSSRFtoRCEExploit](https://github.com/evilashz/ExchangeSSRFtoRCEExploit)
|
||||
- [Mr-xn/CVE-2021-26855-d](https://github.com/Mr-xn/CVE-2021-26855-d)
|
||||
- [RickGeex/ProxyLogon](https://github.com/RickGeex/ProxyLogon)
|
||||
- [Immersive-Labs-Sec/ProxyLogon](https://github.com/Immersive-Labs-Sec/ProxyLogon)
|
||||
- [shacojx/Scan-Vuln-CVE-2021-26855](https://github.com/shacojx/Scan-Vuln-CVE-2021-26855)
|
||||
- [SotirisKar/CVE-2021-26855](https://github.com/SotirisKar/CVE-2021-26855)
|
||||
- [TaroballzChen/ProxyLogon-CVE-2021-26855-metasploit](https://github.com/TaroballzChen/ProxyLogon-CVE-2021-26855-metasploit)
|
||||
- [p0wershe11/ProxyLogon](https://github.com/p0wershe11/ProxyLogon)
|
||||
- [r0ckysec/CVE-2021-26855_Exchange](https://github.com/r0ckysec/CVE-2021-26855_Exchange)
|
||||
- [shacojx/CVE-2021-26855-exploit-Exchange](https://github.com/shacojx/CVE-2021-26855-exploit-Exchange)
|
||||
- [hictf/CVE-2021-26855-CVE-2021-27065](https://github.com/hictf/CVE-2021-26855-CVE-2021-27065)
|
||||
- [praetorian-inc/proxylogon-exploit](https://github.com/praetorian-inc/proxylogon-exploit)
|
||||
- [Flangvik/SharpProxyLogon](https://github.com/Flangvik/SharpProxyLogon)
|
||||
- [hosch3n/ProxyLogon](https://github.com/hosch3n/ProxyLogon)
|
||||
- [Nick-Yin12/106362522](https://github.com/Nick-Yin12/106362522)
|
||||
|
||||
|
@ -723,6 +1155,7 @@ Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is uni
|
|||
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078.
|
||||
</code>
|
||||
|
||||
- [sirpedrotavares/Proxylogon-exploit](https://github.com/sirpedrotavares/Proxylogon-exploit)
|
||||
- [cryptolakk/ProxyLogon-Mass-RCE](https://github.com/cryptolakk/ProxyLogon-Mass-RCE)
|
||||
|
||||
### CVE-2021-26868 (2021-03-11)
|
||||
|
@ -733,6 +1166,86 @@ Windows Graphics Component Elevation of Privilege Vulnerability
|
|||
|
||||
- [KangD1W2/CVE-2021-26868](https://github.com/KangD1W2/CVE-2021-26868)
|
||||
|
||||
### CVE-2021-26871 (2021-03-11)
|
||||
|
||||
<code>
|
||||
Windows WalletService Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-26885.
|
||||
</code>
|
||||
|
||||
- [robotMD5/CVE-2021-26871_POC](https://github.com/robotMD5/CVE-2021-26871_POC)
|
||||
|
||||
### CVE-2021-26882 (2021-03-11)
|
||||
|
||||
<code>
|
||||
Remote Access API Elevation of Privilege Vulnerability
|
||||
</code>
|
||||
|
||||
- [api0cradle/CVE-2021-26882](https://github.com/api0cradle/CVE-2021-26882)
|
||||
|
||||
### CVE-2021-26903 (2021-02-26)
|
||||
|
||||
<code>
|
||||
LMA ISIDA Retriever 5.2 is vulnerable to XSS via query['text'].
|
||||
</code>
|
||||
|
||||
- [Security-AVS/CVE-2021-26903](https://github.com/Security-AVS/CVE-2021-26903)
|
||||
|
||||
### CVE-2021-26904 (2021-02-26)
|
||||
|
||||
<code>
|
||||
LMA ISIDA Retriever 5.2 allows SQL Injection.
|
||||
</code>
|
||||
|
||||
- [Security-AVS/-CVE-2021-26904](https://github.com/Security-AVS/-CVE-2021-26904)
|
||||
|
||||
### CVE-2021-26943 (2021-03-31)
|
||||
|
||||
<code>
|
||||
The UX360CA BIOS through 303 on ASUS laptops allow an attacker (with the ring 0 privilege) to overwrite nearly arbitrary physical memory locations, including SMRAM, and execute arbitrary code in the SMM (issue 3 of 3).
|
||||
</code>
|
||||
|
||||
- [tandasat/SmmExploit](https://github.com/tandasat/SmmExploit)
|
||||
|
||||
### CVE-2021-27065 (2021-03-02)
|
||||
|
||||
<code>
|
||||
Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27078.
|
||||
</code>
|
||||
|
||||
- [adamrpostjr/cve-2021-27065](https://github.com/adamrpostjr/cve-2021-27065)
|
||||
|
||||
### CVE-2021-27180 (2021-04-14)
|
||||
|
||||
<code>
|
||||
An issue was discovered in MDaemon before 20.0.4. There is Reflected XSS in Webmail (aka WorldClient). It can be exploited via a GET request. It allows performing any action with the privileges of the attacked user.
|
||||
</code>
|
||||
|
||||
- [chudyPB/MDaemon-Advisories](https://github.com/chudyPB/MDaemon-Advisories)
|
||||
|
||||
### CVE-2021-27187 (2021-02-12)
|
||||
|
||||
<code>
|
||||
The Sovremennye Delovye Tekhnologii FX Aggregator terminal client 1 stores authentication credentials in cleartext in login.sav when the Save Password box is checked.
|
||||
</code>
|
||||
|
||||
- [jet-pentest/CVE-2021-27187](https://github.com/jet-pentest/CVE-2021-27187)
|
||||
|
||||
### CVE-2021-27188 (2021-02-12)
|
||||
|
||||
<code>
|
||||
The Sovremennye Delovye Tekhnologii FX Aggregator terminal client 1 allows attackers to cause a denial of service (access suspended for five hours) by making five invalid login attempts to a victim's account.
|
||||
</code>
|
||||
|
||||
- [jet-pentest/CVE-2021-27188](https://github.com/jet-pentest/CVE-2021-27188)
|
||||
|
||||
### CVE-2021-27190 (2021-02-11)
|
||||
|
||||
<code>
|
||||
A Stored Cross Site Scripting(XSS) Vulnerability was discovered in PEEL SHOPPING 9.3.0 which is publicly available. The user supplied input containing polyglot payload is echoed back in javascript code in HTML response. This allows an attacker to input malicious JavaScript which can steal cookie, redirect them to other malicious website, etc.
|
||||
</code>
|
||||
|
||||
- [anmolksachan/CVE-2021-27190-PEEL-Shopping-cart-9.3.0-Stored-XSS](https://github.com/anmolksachan/CVE-2021-27190-PEEL-Shopping-cart-9.3.0-Stored-XSS)
|
||||
|
||||
### CVE-2021-27211 (2021-02-15)
|
||||
|
||||
<code>
|
||||
|
@ -741,6 +1254,22 @@ steghide 0.5.1 relies on a certain 32-bit seed value, which makes it easier for
|
|||
|
||||
- [b4shfire/stegcrack](https://github.com/b4shfire/stegcrack)
|
||||
|
||||
### CVE-2021-27246 (2021-04-14)
|
||||
|
||||
<code>
|
||||
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Archer A7 AC1750 1.0.15 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of MAC addresses by the tdpServer endpoint. A crafted TCP message can write stack pointers to the stack. An attacker can leverage this vulnerability to execute code in the context of the root user. Was ZDI-CAN-12306.
|
||||
</code>
|
||||
|
||||
- [synacktiv/CVE-2021-27246_Pwn2Own2020](https://github.com/synacktiv/CVE-2021-27246_Pwn2Own2020)
|
||||
|
||||
### CVE-2021-27328 (2021-02-19)
|
||||
|
||||
<code>
|
||||
Yeastar NeoGate TG400 91.3.0.3 devices are affected by Directory Traversal. An authenticated user can decrypt firmware and can read sensitive information, such as a password or decryption key.
|
||||
</code>
|
||||
|
||||
- [SQSamir/CVE-2021-27328](https://github.com/SQSamir/CVE-2021-27328)
|
||||
|
||||
### CVE-2021-27338 (2021-07-20)
|
||||
|
||||
<code>
|
||||
|
@ -757,6 +1286,22 @@ An authentication brute-force protection mechanism bypass in telnetd in D-Link R
|
|||
|
||||
- [guywhataguy/D-Link-CVE-2021-27342-exploit](https://github.com/guywhataguy/D-Link-CVE-2021-27342-exploit)
|
||||
|
||||
### CVE-2021-27403 (2021-02-18)
|
||||
|
||||
<code>
|
||||
Askey RTF8115VW BR_SV_g11.11_RTF_TEF001_V6.54_V014 devices allow cgi-bin/te_acceso_router.cgi curWebPage XSS.
|
||||
</code>
|
||||
|
||||
- [bokanrb/CVE-2021-27403](https://github.com/bokanrb/CVE-2021-27403)
|
||||
|
||||
### CVE-2021-27404 (2021-02-18)
|
||||
|
||||
<code>
|
||||
Askey RTF8115VW BR_SV_g11.11_RTF_TEF001_V6.54_V014 devices allow injection of a Host HTTP header.
|
||||
</code>
|
||||
|
||||
- [bokanrb/CVE-2021-27404](https://github.com/bokanrb/CVE-2021-27404)
|
||||
|
||||
### CVE-2021-27651 (2021-04-29)
|
||||
|
||||
<code>
|
||||
|
@ -775,6 +1320,14 @@ A critical unauthenticated remote code execution vulnerability was found all rec
|
|||
- [kahla-sec/CVE-2021-27850_POC](https://github.com/kahla-sec/CVE-2021-27850_POC)
|
||||
- [Ovi3/CVE_2021_27850_POC](https://github.com/Ovi3/CVE_2021_27850_POC)
|
||||
|
||||
### CVE-2021-27890 (2021-03-15)
|
||||
|
||||
<code>
|
||||
SQL Injection vulnerablity in MyBB before 1.8.26 via theme properties included in theme XML files.
|
||||
</code>
|
||||
|
||||
- [xiaopan233/Mybb-XSS_SQL_RCE-POC](https://github.com/xiaopan233/Mybb-XSS_SQL_RCE-POC)
|
||||
|
||||
### CVE-2021-27905 (2021-04-13)
|
||||
|
||||
<code>
|
||||
|
@ -793,6 +1346,14 @@ A remote code execution issue was discovered in MariaDB 10.2 before 10.2.37, 10.
|
|||
|
||||
- [Al1ex/CVE-2021-27928](https://github.com/Al1ex/CVE-2021-27928)
|
||||
|
||||
### CVE-2021-27963 (2021-03-04)
|
||||
|
||||
<code>
|
||||
SonLogger before 6.4.1 is affected by user creation with any user permissions profile (e.g., SuperAdmin). An anonymous user can send a POST request to /User/saveUser without any authentication or session header.
|
||||
</code>
|
||||
|
||||
- [erberkan/SonLogger-vulns](https://github.com/erberkan/SonLogger-vulns)
|
||||
|
||||
### CVE-2021-27965 (2021-03-04)
|
||||
|
||||
<code>
|
||||
|
@ -802,6 +1363,14 @@ The MsIo64.sys driver before 1.1.19.1016 in MSI Dragon Center before 2.0.98.0 ha
|
|||
- [mathisvickie/CVE-2021-27965](https://github.com/mathisvickie/CVE-2021-27965)
|
||||
- [Crystalware/CVE-2021-27965](https://github.com/Crystalware/CVE-2021-27965)
|
||||
|
||||
### CVE-2021-28310 (2021-04-13)
|
||||
|
||||
<code>
|
||||
Win32k Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-27072.
|
||||
</code>
|
||||
|
||||
- [Rafael-Svechinskaya/IOC_for_CVE-2021-28310](https://github.com/Rafael-Svechinskaya/IOC_for_CVE-2021-28310)
|
||||
|
||||
### CVE-2021-28312 (2021-04-13)
|
||||
|
||||
<code>
|
||||
|
@ -868,6 +1437,14 @@ Apache OFBiz has unsafe deserialization prior to 17.12.07 version An unauthentic
|
|||
|
||||
- [r0ckysec/CVE-2021-29200](https://github.com/r0ckysec/CVE-2021-29200)
|
||||
|
||||
### CVE-2021-29267 (2021-03-29)
|
||||
|
||||
<code>
|
||||
Sherlock SherlockIM through 2021-03-29 allows Cross Site Scripting (XSS) by leveraging the api/Files/Attachment URI to attack help-desk staff via the chatbot feature.
|
||||
</code>
|
||||
|
||||
- [Security-AVS/CVE-2021-29267](https://github.com/Security-AVS/CVE-2021-29267)
|
||||
|
||||
### CVE-2021-29337 (2021-06-21)
|
||||
|
||||
<code>
|
||||
|
@ -882,6 +1459,7 @@ MODAPI.sys in MSI Dragon Center 2.0.104.0 allows low-privileged users to access
|
|||
Mahara 20.10 is affected by Cross Site Request Forgery (CSRF) that allows a remote attacker to remove inbox-mail on the server. The application fails to validate the CSRF token for a POST request. An attacker can craft a module/multirecipientnotification/inbox.php pieform_delete_all_notifications request, which leads to removing all messages from a mailbox.
|
||||
</code>
|
||||
|
||||
- [0xBaz/CVE-2021-29349](https://github.com/0xBaz/CVE-2021-29349)
|
||||
- [Vulnmachines/CVE-2021-29349](https://github.com/Vulnmachines/CVE-2021-29349)
|
||||
|
||||
### CVE-2021-29386
|
||||
|
@ -914,6 +1492,14 @@ XStream is software for serializing Java objects to XML and back again. A vulner
|
|||
|
||||
- [MyBlackManba/CVE-2021-29505](https://github.com/MyBlackManba/CVE-2021-29505)
|
||||
|
||||
### CVE-2021-29627 (2021-04-07)
|
||||
|
||||
<code>
|
||||
In FreeBSD 13.0-STABLE before n245050, 12.2-STABLE before r369525, 13.0-RC4 before p0, and 12.2-RELEASE before p6, listening socket accept filters implementing the accf_create callback incorrectly freed a process supplied argument string. Additional operations on the socket can lead to a double free or use after free.
|
||||
</code>
|
||||
|
||||
- [raymontag/cve-2021-29627](https://github.com/raymontag/cve-2021-29627)
|
||||
|
||||
### CVE-2021-30005 (2021-05-11)
|
||||
|
||||
<code>
|
||||
|
@ -922,6 +1508,14 @@ In JetBrains PyCharm before 2020.3.4, local code execution was possible because
|
|||
|
||||
- [atorralba/CVE-2021-30005-POC](https://github.com/atorralba/CVE-2021-30005-POC)
|
||||
|
||||
### CVE-2021-30109 (2021-04-05)
|
||||
|
||||
<code>
|
||||
Froala Editor 3.2.6 is affected by Cross Site Scripting (XSS). Under certain conditions, a base64 crafted string leads to persistent Cross-site scripting (XSS) vulnerability within the hyperlink creation module.
|
||||
</code>
|
||||
|
||||
- [Hackdwerg/CVE-2021-30109](https://github.com/Hackdwerg/CVE-2021-30109)
|
||||
|
||||
### CVE-2021-30128 (2021-04-27)
|
||||
|
||||
<code>
|
||||
|
@ -931,6 +1525,30 @@ Apache OFBiz has unsafe deserialization prior to 17.12.07 version
|
|||
- [LioTree/CVE-2021-30128-EXP](https://github.com/LioTree/CVE-2021-30128-EXP)
|
||||
- [r0ckysec/CVE-2021-30128](https://github.com/r0ckysec/CVE-2021-30128)
|
||||
|
||||
### CVE-2021-30146 (2021-04-06)
|
||||
|
||||
<code>
|
||||
Seafile 7.0.5 (2019) allows Persistent XSS via the "share of library functionality."
|
||||
</code>
|
||||
|
||||
- [Security-AVS/CVE-2021-30146](https://github.com/Security-AVS/CVE-2021-30146)
|
||||
|
||||
### CVE-2021-30149 (2021-04-06)
|
||||
|
||||
<code>
|
||||
Composr 10.0.36 allows upload and execution of PHP files.
|
||||
</code>
|
||||
|
||||
- [orionhridoy/CVE-2021-30149](https://github.com/orionhridoy/CVE-2021-30149)
|
||||
|
||||
### CVE-2021-30150 (2021-04-06)
|
||||
|
||||
<code>
|
||||
Composr 10.0.36 allows XSS in an XML script.
|
||||
</code>
|
||||
|
||||
- [orionhridoy/CVE-2021-30150](https://github.com/orionhridoy/CVE-2021-30150)
|
||||
|
||||
### CVE-2021-30461 (2021-05-29)
|
||||
|
||||
<code>
|
||||
|
@ -19623,6 +20241,7 @@ The default SSL cipher configuration in Apache Tomcat 4.1.28 through 4.1.31, 5.0
|
|||
The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote attackers to execute arbitrary commands via shell metacharacters involving the (1) SamrChangePassword function, when the "username map script" smb.conf option is enabled, and allows remote authenticated users to execute commands via shell metacharacters involving other MS-RPC functions in the (2) remote printer and (3) file share management.
|
||||
</code>
|
||||
|
||||
- [amriunix/CVE-2007-2447](https://github.com/amriunix/CVE-2007-2447)
|
||||
- [Unix13/metasploitable2](https://github.com/Unix13/metasploitable2)
|
||||
- [b1fair/smb_usermap](https://github.com/b1fair/smb_usermap)
|
||||
- [JoseBarrios/CVE-2007-2447](https://github.com/JoseBarrios/CVE-2007-2447)
|
||||
|
|
Loading…
Add table
Reference in a new issue