mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-26 17:44:10 +01:00
Auto Update 2021/06/04 00:12:05
This commit is contained in:
parent
1b8c8d95e5
commit
bf4bd13168
29 changed files with 254 additions and 116 deletions
2014
2015
2016
2017
2018
2019
2020
CVE-2020-0022.jsonCVE-2020-10977.jsonCVE-2020-1472.jsonCVE-2020-24949.jsonCVE-2020-2551.jsonCVE-2020-36109.jsonCVE-2020-7471.json
2021
CVE-2021-21551.jsonCVE-2021-21985.jsonCVE-2021-24086.jsonCVE-2021-27651.jsonCVE-2021-27965.jsonCVE-2021-28476.jsonCVE-2021-3156.json
README.md
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-06-03T08:48:31Z",
|
||||
"updated_at": "2021-06-03T14:20:31Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1048,
|
||||
"watchers_count": 1048,
|
||||
"stargazers_count": 1049,
|
||||
"watchers_count": 1049,
|
||||
"forks_count": 234,
|
||||
"forks": 234,
|
||||
"watchers": 1048,
|
||||
"watchers": 1049,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -23,26 +23,26 @@
|
|||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 295014591,
|
||||
"id": 308175941,
|
||||
"name": "exploit-joomla",
|
||||
"full_name": "kally-life\/exploit-joomla",
|
||||
"full_name": "areaventuno\/exploit-joomla",
|
||||
"owner": {
|
||||
"login": "kally-life",
|
||||
"id": 57679174,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57679174?v=4",
|
||||
"html_url": "https:\/\/github.com\/kally-life"
|
||||
"login": "areaventuno",
|
||||
"id": 73592193,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73592193?v=4",
|
||||
"html_url": "https:\/\/github.com\/areaventuno"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kally-life\/exploit-joomla",
|
||||
"html_url": "https:\/\/github.com\/areaventuno\/exploit-joomla",
|
||||
"description": "Un semplice exploit che sfrutta CVE-2015-7297, CVE-2015-7857 and CVE-2015-7858 per elencare gli utenti con la psw del db",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-12T19:44:41Z",
|
||||
"updated_at": "2020-09-13T18:08:13Z",
|
||||
"pushed_at": "2020-09-13T18:08:11Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"created_at": "2020-10-29T00:35:35Z",
|
||||
"updated_at": "2021-06-03T13:29:34Z",
|
||||
"pushed_at": "2020-09-13T18:01:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-06-03T08:48:31Z",
|
||||
"updated_at": "2021-06-03T14:20:31Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1048,
|
||||
"watchers_count": 1048,
|
||||
"stargazers_count": 1049,
|
||||
"watchers_count": 1049,
|
||||
"forks_count": 234,
|
||||
"forks": 234,
|
||||
"watchers": 1048,
|
||||
"watchers": 1049,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2017-05-19T12:57:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2017-0144",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-02T03:41:47Z",
|
||||
"updated_at": "2021-03-17T09:29:07Z",
|
||||
"updated_at": "2021-06-03T12:27:46Z",
|
||||
"pushed_at": "2019-06-02T03:51:12Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "CVE-2017-11882 Exploit accepts over 17k bytes long command\/code in maximum.",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-21T15:22:41Z",
|
||||
"updated_at": "2021-06-01T12:58:46Z",
|
||||
"updated_at": "2021-06-03T13:05:09Z",
|
||||
"pushed_at": "2017-12-06T12:47:31Z",
|
||||
"stargazers_count": 282,
|
||||
"watchers_count": 282,
|
||||
"stargazers_count": 283,
|
||||
"watchers_count": 283,
|
||||
"forks_count": 84,
|
||||
"forks": 84,
|
||||
"watchers": 282,
|
||||
"watchers": 283,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-06-03T08:48:31Z",
|
||||
"updated_at": "2021-06-03T14:20:31Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1048,
|
||||
"watchers_count": 1048,
|
||||
"stargazers_count": 1049,
|
||||
"watchers_count": 1049,
|
||||
"forks_count": 234,
|
||||
"forks": 234,
|
||||
"watchers": 1048,
|
||||
"watchers": 1049,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Joomla 3.7 SQL injection (CVE-2017-8917)",
|
||||
"fork": false,
|
||||
"created_at": "2017-05-19T15:21:46Z",
|
||||
"updated_at": "2021-02-28T21:11:38Z",
|
||||
"updated_at": "2021-06-03T12:54:34Z",
|
||||
"pushed_at": "2017-05-19T15:30:18Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 9,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "POC CVE-2018-14714",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-25T03:43:44Z",
|
||||
"updated_at": "2021-02-13T16:18:17Z",
|
||||
"updated_at": "2021-06-03T11:34:48Z",
|
||||
"pushed_at": "2021-02-13T16:18:15Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-06-03T08:48:31Z",
|
||||
"updated_at": "2021-06-03T14:20:31Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1048,
|
||||
"watchers_count": 1048,
|
||||
"stargazers_count": 1049,
|
||||
"watchers_count": 1049,
|
||||
"forks_count": 234,
|
||||
"forks": 234,
|
||||
"watchers": 1048,
|
||||
"watchers": 1049,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2021-06-03T08:32:03Z",
|
||||
"updated_at": "2021-06-03T12:29:14Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 426,
|
||||
"watchers_count": 426,
|
||||
"stargazers_count": 427,
|
||||
"watchers_count": 427,
|
||||
"forks_count": 100,
|
||||
"forks": 100,
|
||||
"watchers": 426,
|
||||
"watchers": 427,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -454,8 +454,8 @@
|
|||
"pushed_at": "2020-08-31T14:52:37Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -684,8 +684,8 @@
|
|||
"pushed_at": "2020-03-25T05:07:43Z",
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 84,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-06-03T08:48:31Z",
|
||||
"updated_at": "2021-06-03T14:20:31Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1048,
|
||||
"watchers_count": 1048,
|
||||
"stargazers_count": 1049,
|
||||
"watchers_count": 1049,
|
||||
"forks_count": 234,
|
||||
"forks": 234,
|
||||
"watchers": 1048,
|
||||
"watchers": 1049,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2020-0022 vulnerability exploitation on Bouygues BBox Miami (Android TV 8.0 - ARM32 Cortex A9)",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-24T19:33:10Z",
|
||||
"updated_at": "2021-06-01T08:38:51Z",
|
||||
"updated_at": "2021-06-03T14:46:00Z",
|
||||
"pushed_at": "2021-03-21T20:59:46Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "GitLab 12.9.0 Arbitrary File Read ",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-20T15:40:03Z",
|
||||
"updated_at": "2021-05-25T06:13:30Z",
|
||||
"updated_at": "2021-06-03T09:51:06Z",
|
||||
"pushed_at": "2021-04-23T19:21:16Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 44,
|
||||
"watchers": 45,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2021-06-02T15:28:47Z",
|
||||
"updated_at": "2021-06-03T12:23:21Z",
|
||||
"pushed_at": "2020-10-21T12:10:28Z",
|
||||
"stargazers_count": 1289,
|
||||
"watchers_count": 1289,
|
||||
"stargazers_count": 1288,
|
||||
"watchers_count": 1288,
|
||||
"forks_count": 293,
|
||||
"forks": 293,
|
||||
"watchers": 1289,
|
||||
"watchers": 1288,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:57:49Z",
|
||||
"updated_at": "2021-06-01T23:10:43Z",
|
||||
"updated_at": "2021-06-03T11:57:59Z",
|
||||
"pushed_at": "2020-11-05T16:37:20Z",
|
||||
"stargazers_count": 209,
|
||||
"watchers_count": 209,
|
||||
"stargazers_count": 210,
|
||||
"watchers_count": 210,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"watchers": 209,
|
||||
"watchers": 210,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2020/CVE-2020-24949.json
Normal file
25
2020/CVE-2020-24949.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 373457880,
|
||||
"name": "CVE-2020-24949",
|
||||
"full_name": "r90tpass\/CVE-2020-24949",
|
||||
"owner": {
|
||||
"login": "r90tpass",
|
||||
"id": 82740056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82740056?v=4",
|
||||
"html_url": "https:\/\/github.com\/r90tpass"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/r90tpass\/CVE-2020-24949",
|
||||
"description": "PHPFusion 9.03.50 - Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-03T09:49:22Z",
|
||||
"updated_at": "2021-06-03T09:50:31Z",
|
||||
"pushed_at": "2021-06-03T09:50:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-06-03T08:48:31Z",
|
||||
"updated_at": "2021-06-03T14:20:31Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1048,
|
||||
"watchers_count": 1048,
|
||||
"stargazers_count": 1049,
|
||||
"watchers_count": 1049,
|
||||
"forks_count": 234,
|
||||
"forks": 234,
|
||||
"watchers": 1048,
|
||||
"watchers": 1049,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC DoS CVE-2020-36109",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-13T16:03:36Z",
|
||||
"updated_at": "2021-02-15T09:25:48Z",
|
||||
"updated_at": "2021-06-03T11:33:50Z",
|
||||
"pushed_at": "2021-02-15T09:25:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -113,5 +113,28 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 373481625,
|
||||
"name": "CVE-2020-7471-Django",
|
||||
"full_name": "huzaifakhan771\/CVE-2020-7471-Django",
|
||||
"owner": {
|
||||
"login": "huzaifakhan771",
|
||||
"id": 56702423,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56702423?v=4",
|
||||
"html_url": "https:\/\/github.com\/huzaifakhan771"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/huzaifakhan771\/CVE-2020-7471-Django",
|
||||
"description": "PoC for the SQL injection vulnerability in PostgreSQL with Django, found in Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-03T11:21:27Z",
|
||||
"updated_at": "2021-06-03T11:37:30Z",
|
||||
"pushed_at": "2021-06-03T11:37:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -79,11 +79,11 @@
|
|||
"html_url": "https:\/\/github.com\/mathisvickie"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mathisvickie\/CVE-2021-21551",
|
||||
"description": "CVE-2021-21551 local privilege escalation to nt authority\/system",
|
||||
"description": "arbitrary kernel read\/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority\/system",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-30T10:15:10Z",
|
||||
"updated_at": "2021-06-01T17:51:31Z",
|
||||
"pushed_at": "2021-05-31T13:05:24Z",
|
||||
"updated_at": "2021-06-03T13:01:07Z",
|
||||
"pushed_at": "2021-06-03T14:47:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-05-29T13:07:14Z",
|
||||
"updated_at": "2021-06-03T07:53:34Z",
|
||||
"pushed_at": "2021-05-31T06:14:36Z",
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"updated_at": "2021-06-03T10:19:10Z",
|
||||
"pushed_at": "2021-06-03T10:04:41Z",
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 80,
|
||||
"watchers": 82,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -90,5 +90,51 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 373460655,
|
||||
"name": "CVE-2021-21985",
|
||||
"full_name": "r0ckysec\/CVE-2021-21985",
|
||||
"owner": {
|
||||
"login": "r0ckysec",
|
||||
"id": 44518337,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44518337?v=4",
|
||||
"html_url": "https:\/\/github.com\/r0ckysec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/r0ckysec\/CVE-2021-21985",
|
||||
"description": "CVE-2021-21985 vmware vcenter 远程代码执行 EXP",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-03T09:59:21Z",
|
||||
"updated_at": "2021-06-03T14:42:51Z",
|
||||
"pushed_at": "2021-06-03T11:07:53Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 373496154,
|
||||
"name": "cve-2021-21985_exp",
|
||||
"full_name": "xnianq\/cve-2021-21985_exp",
|
||||
"owner": {
|
||||
"login": "xnianq",
|
||||
"id": 17513849,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17513849?v=4",
|
||||
"html_url": "https:\/\/github.com\/xnianq"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/xnianq\/cve-2021-21985_exp",
|
||||
"description": "cve-2021-21985 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-03T12:17:06Z",
|
||||
"updated_at": "2021-06-03T13:43:17Z",
|
||||
"pushed_at": "2021-06-03T13:43:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-07T11:10:40Z",
|
||||
"updated_at": "2021-06-01T23:23:47Z",
|
||||
"updated_at": "2021-06-03T12:49:07Z",
|
||||
"pushed_at": "2021-04-15T12:46:54Z",
|
||||
"stargazers_count": 172,
|
||||
"watchers_count": 172,
|
||||
"stargazers_count": 173,
|
||||
"watchers_count": 173,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 172,
|
||||
"watchers": 173,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-16T01:40:47Z",
|
||||
"updated_at": "2021-06-02T06:47:25Z",
|
||||
"updated_at": "2021-06-03T13:09:57Z",
|
||||
"pushed_at": "2021-05-16T05:54:07Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 40,
|
||||
"watchers": 41,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2021/CVE-2021-27965.json
Normal file
25
2021/CVE-2021-27965.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 373502325,
|
||||
"name": "CVE-2021-27965",
|
||||
"full_name": "mathisvickie\/CVE-2021-27965",
|
||||
"owner": {
|
||||
"login": "mathisvickie",
|
||||
"id": 60326914,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60326914?v=4",
|
||||
"html_url": "https:\/\/github.com\/mathisvickie"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mathisvickie\/CVE-2021-27965",
|
||||
"description": "stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority\/system",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-03T12:39:11Z",
|
||||
"updated_at": "2021-06-03T14:03:54Z",
|
||||
"pushed_at": "2021-06-03T13:57:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-31T18:02:39Z",
|
||||
"updated_at": "2021-06-03T07:32:25Z",
|
||||
"updated_at": "2021-06-03T14:06:06Z",
|
||||
"pushed_at": "2021-06-01T15:08:23Z",
|
||||
"stargazers_count": 137,
|
||||
"watchers_count": 137,
|
||||
"stargazers_count": 141,
|
||||
"watchers_count": 141,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 137,
|
||||
"watchers": 141,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-02T14:50:56Z",
|
||||
"updated_at": "2021-06-03T06:25:30Z",
|
||||
"updated_at": "2021-06-03T10:55:55Z",
|
||||
"pushed_at": "2021-06-02T14:54:14Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -887,13 +887,13 @@
|
|||
"description": "Sudo Baron Samedit Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-15T17:37:02Z",
|
||||
"updated_at": "2021-06-01T02:43:38Z",
|
||||
"updated_at": "2021-06-03T13:27:35Z",
|
||||
"pushed_at": "2021-05-12T12:01:20Z",
|
||||
"stargazers_count": 318,
|
||||
"watchers_count": 318,
|
||||
"stargazers_count": 319,
|
||||
"watchers_count": 319,
|
||||
"forks_count": 54,
|
||||
"forks": 54,
|
||||
"watchers": 318,
|
||||
"watchers": 319,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
README.md
25
README.md
|
@ -528,6 +528,8 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability due to
|
|||
- [alt3kx/CVE-2021-21985_PoC](https://github.com/alt3kx/CVE-2021-21985_PoC)
|
||||
- [onSec-fr/CVE-2021-21985-Checker](https://github.com/onSec-fr/CVE-2021-21985-Checker)
|
||||
- [mauricelambert/CVE-2021-21985](https://github.com/mauricelambert/CVE-2021-21985)
|
||||
- [r0ckysec/CVE-2021-21985](https://github.com/r0ckysec/CVE-2021-21985)
|
||||
- [xnianq/cve-2021-21985_exp](https://github.com/xnianq/cve-2021-21985_exp)
|
||||
|
||||
### CVE-2021-22192 (2021-03-24)
|
||||
|
||||
|
@ -967,6 +969,14 @@ SonLogger before 6.4.1 is affected by user creation with any user permissions pr
|
|||
|
||||
- [erberkan/SonLogger-vulns](https://github.com/erberkan/SonLogger-vulns)
|
||||
|
||||
### CVE-2021-27965 (2021-03-04)
|
||||
|
||||
<code>
|
||||
The MsIo64.sys driver before 1.1.19.1016 in MSI Dragon Center before 2.0.98.0 has a buffer overflow that allows privilege escalation via a crafted 0x80102040, 0x80102044, 0x80102050, or 0x80102054 IOCTL request.
|
||||
</code>
|
||||
|
||||
- [mathisvickie/CVE-2021-27965](https://github.com/mathisvickie/CVE-2021-27965)
|
||||
|
||||
### CVE-2021-28310 (2021-04-13)
|
||||
|
||||
<code>
|
||||
|
@ -2518,6 +2528,7 @@ Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL I
|
|||
- [SNCKER/CVE-2020-7471](https://github.com/SNCKER/CVE-2020-7471)
|
||||
- [Tempuss/CTF_CVE-2020-7471](https://github.com/Tempuss/CTF_CVE-2020-7471)
|
||||
- [victomteng1997/cve-2020-7471-Time_Blind_SQLi-](https://github.com/victomteng1997/cve-2020-7471-Time_Blind_SQLi-)
|
||||
- [huzaifakhan771/CVE-2020-7471-Django](https://github.com/huzaifakhan771/CVE-2020-7471-Django)
|
||||
|
||||
### CVE-2020-7473 (2020-05-07)
|
||||
|
||||
|
@ -4664,6 +4675,14 @@ InterMind iMind Server through 3.13.65 allows remote unauthenticated attackers t
|
|||
|
||||
- [trump88/CVE-2020-24765](https://github.com/trump88/CVE-2020-24765)
|
||||
|
||||
### CVE-2020-24949 (2020-09-03)
|
||||
|
||||
<code>
|
||||
Privilege escalation in PHP-Fusion 9.03.50 downloads/downloads.php allows an authenticated user (not admin) to send a crafted request to the server and perform remote command execution (RCE).
|
||||
</code>
|
||||
|
||||
- [r90tpass/CVE-2020-24949](https://github.com/r90tpass/CVE-2020-24949)
|
||||
|
||||
### CVE-2020-24955 (2020-09-01)
|
||||
|
||||
<code>
|
||||
|
@ -11367,7 +11386,7 @@ Crestron TSW-X60 all versions prior to 2.001.0037.001 and MC3 all versions prior
|
|||
### CVE-2018-13379 (2019-06-04)
|
||||
|
||||
<code>
|
||||
An Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal") in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 and 5.4.6 to 5.4.12 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests.
|
||||
An Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal") in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 and 5.4.6 to 5.4.12 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests.
|
||||
</code>
|
||||
|
||||
- [milo2012/CVE-2018-13379](https://github.com/milo2012/CVE-2018-13379)
|
||||
|
@ -11383,7 +11402,7 @@ An Improper Limitation of a Pathname to a Restricted Directory ("Path Trave
|
|||
### CVE-2018-13382 (2019-06-04)
|
||||
|
||||
<code>
|
||||
An Improper Authorization vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.8 and 5.4.1 to 5.4.10 under SSL VPN web portal allows an unauthenticated attacker to modify the password of an SSL VPN web portal user via specially crafted HTTP requests.
|
||||
An Improper Authorization vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.8 and 5.4.1 to 5.4.10 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to modify the password of an SSL VPN web portal user via specially crafted HTTP requests
|
||||
</code>
|
||||
|
||||
- [milo2012/CVE-2018-13382](https://github.com/milo2012/CVE-2018-13382)
|
||||
|
@ -16530,7 +16549,7 @@ SQL injection vulnerability in Joomla! 3.2 before 3.4.4 allows remote attackers
|
|||
</code>
|
||||
|
||||
- [CCrashBandicot/ContentHistory](https://github.com/CCrashBandicot/ContentHistory)
|
||||
- [kally-life/exploit-joomla](https://github.com/kally-life/exploit-joomla)
|
||||
- [areaventuno/exploit-joomla](https://github.com/areaventuno/exploit-joomla)
|
||||
|
||||
### CVE-2015-7501 (2017-11-09)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue