mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2021/11/10 18:13:30
This commit is contained in:
parent
8f2bdfad4a
commit
cf1739dd06
31 changed files with 228 additions and 194 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
|
||||
"fork": false,
|
||||
"created_at": "2013-09-22T21:20:31Z",
|
||||
"updated_at": "2021-11-06T20:09:39Z",
|
||||
"updated_at": "2021-11-10T16:52:32Z",
|
||||
"pushed_at": "2017-04-24T14:16:56Z",
|
||||
"stargazers_count": 324,
|
||||
"watchers_count": 324,
|
||||
"stargazers_count": 325,
|
||||
"watchers_count": 325,
|
||||
"forks_count": 99,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -25,7 +25,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 99,
|
||||
"watchers": 324,
|
||||
"watchers": 325,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,10 +40,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-11-10T06:36:00Z",
|
||||
"updated_at": "2021-11-10T16:58:06Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1212,
|
||||
"watchers_count": 1212,
|
||||
"stargazers_count": 1213,
|
||||
"watchers_count": 1213,
|
||||
"forks_count": 270,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -71,7 +71,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 270,
|
||||
"watchers": 1212,
|
||||
"watchers": 1213,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-11-10T06:36:00Z",
|
||||
"updated_at": "2021-11-10T16:58:06Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1212,
|
||||
"watchers_count": 1212,
|
||||
"stargazers_count": 1213,
|
||||
"watchers_count": 1213,
|
||||
"forks_count": 270,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 270,
|
||||
"watchers": 1212,
|
||||
"watchers": 1213,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -243,7 +243,7 @@
|
|||
"pushed_at": "2017-03-21T16:46:38Z",
|
||||
"stargazers_count": 238,
|
||||
"watchers_count": 238,
|
||||
"forks_count": 112,
|
||||
"forks_count": 113,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -252,7 +252,7 @@
|
|||
"dirtycow"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 112,
|
||||
"forks": 113,
|
||||
"watchers": 238,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,10 +40,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-11-10T06:36:00Z",
|
||||
"updated_at": "2021-11-10T16:58:06Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1212,
|
||||
"watchers_count": 1212,
|
||||
"stargazers_count": 1213,
|
||||
"watchers_count": 1213,
|
||||
"forks_count": 270,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -71,7 +71,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 270,
|
||||
"watchers": 1212,
|
||||
"watchers": 1213,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -77,12 +77,12 @@
|
|||
"pushed_at": "2021-05-21T23:46:28Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -530,10 +530,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-11-10T06:36:00Z",
|
||||
"updated_at": "2021-11-10T16:58:06Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1212,
|
||||
"watchers_count": 1212,
|
||||
"stargazers_count": 1213,
|
||||
"watchers_count": 1213,
|
||||
"forks_count": 270,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -561,7 +561,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 270,
|
||||
"watchers": 1212,
|
||||
"watchers": 1213,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2019-1040 with Exchange",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-14T11:16:03Z",
|
||||
"updated_at": "2021-11-01T08:12:00Z",
|
||||
"updated_at": "2021-11-10T15:36:04Z",
|
||||
"pushed_at": "2021-06-18T18:43:46Z",
|
||||
"stargazers_count": 202,
|
||||
"watchers_count": 202,
|
||||
"forks_count": 59,
|
||||
"stargazers_count": 203,
|
||||
"watchers_count": 203,
|
||||
"forks_count": 60,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 59,
|
||||
"watchers": 202,
|
||||
"forks": 60,
|
||||
"watchers": 203,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,11 +40,11 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-11-10T07:42:42Z",
|
||||
"updated_at": "2021-11-10T17:09:47Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2969,
|
||||
"watchers_count": 2969,
|
||||
"forks_count": 877,
|
||||
"stargazers_count": 2970,
|
||||
"watchers_count": 2970,
|
||||
"forks_count": 878,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -69,8 +69,8 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 877,
|
||||
"watchers": 2969,
|
||||
"forks": 878,
|
||||
"watchers": 2970,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-24T11:12:13Z",
|
||||
"updated_at": "2021-10-17T11:43:44Z",
|
||||
"updated_at": "2021-11-10T15:26:57Z",
|
||||
"pushed_at": "2021-07-24T11:17:34Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -204,11 +204,11 @@
|
|||
"description": "Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-07T15:03:07Z",
|
||||
"updated_at": "2021-11-04T05:02:07Z",
|
||||
"updated_at": "2021-11-10T12:44:20Z",
|
||||
"pushed_at": "2020-08-08T12:54:09Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 6,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -218,8 +218,8 @@
|
|||
"kernel-vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 9,
|
||||
"forks": 7,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -175,10 +175,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-11-10T06:36:00Z",
|
||||
"updated_at": "2021-11-10T16:58:06Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1212,
|
||||
"watchers_count": 1212,
|
||||
"stargazers_count": 1213,
|
||||
"watchers_count": 1213,
|
||||
"forks_count": 270,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -206,7 +206,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 270,
|
||||
"watchers": 1212,
|
||||
"watchers": 1213,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -202,17 +202,17 @@
|
|||
"description": "CVE-2019-2725 命令回显",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T01:57:05Z",
|
||||
"updated_at": "2021-10-05T15:28:21Z",
|
||||
"updated_at": "2021-11-10T15:03:46Z",
|
||||
"pushed_at": "2019-08-08T09:48:20Z",
|
||||
"stargazers_count": 404,
|
||||
"watchers_count": 404,
|
||||
"forks_count": 161,
|
||||
"stargazers_count": 405,
|
||||
"watchers_count": 405,
|
||||
"forks_count": 162,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 161,
|
||||
"watchers": 404,
|
||||
"forks": 162,
|
||||
"watchers": 405,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -260,12 +260,12 @@
|
|||
"pushed_at": "2019-06-21T03:33:05Z",
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"forks_count": 61,
|
||||
"forks_count": 62,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 61,
|
||||
"forks": 62,
|
||||
"watchers": 155,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -153,10 +153,10 @@
|
|||
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T23:07:41Z",
|
||||
"updated_at": "2021-11-09T03:26:35Z",
|
||||
"updated_at": "2021-11-10T16:14:57Z",
|
||||
"pushed_at": "2020-01-20T23:33:19Z",
|
||||
"stargazers_count": 868,
|
||||
"watchers_count": 868,
|
||||
"stargazers_count": 870,
|
||||
"watchers_count": 870,
|
||||
"forks_count": 221,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -165,7 +165,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 221,
|
||||
"watchers": 868,
|
||||
"watchers": 870,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "POC For CVE-2020-1481 - Jira Username Enumerator\/Validator",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-26T17:07:28Z",
|
||||
"updated_at": "2021-06-19T07:28:57Z",
|
||||
"updated_at": "2021-11-10T18:02:09Z",
|
||||
"pushed_at": "2020-10-30T09:36:23Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -402,12 +402,12 @@
|
|||
"pushed_at": "2020-09-16T15:03:32Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"forks_count": 18,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"forks": 19,
|
||||
"watchers": 60,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -614,17 +614,17 @@
|
|||
"description": "Test script for CVE-2020-1472 for both RPC\/TCP and RPC\/SMB",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-17T16:53:17Z",
|
||||
"updated_at": "2021-11-05T12:00:12Z",
|
||||
"updated_at": "2021-11-10T16:23:07Z",
|
||||
"pushed_at": "2021-06-18T18:44:06Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 46,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,11 +13,11 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-11-10T07:42:42Z",
|
||||
"updated_at": "2021-11-10T17:09:47Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2969,
|
||||
"watchers_count": 2969,
|
||||
"forks_count": 877,
|
||||
"stargazers_count": 2970,
|
||||
"watchers_count": 2970,
|
||||
"forks_count": 878,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -42,8 +42,8 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 877,
|
||||
"watchers": 2969,
|
||||
"forks": 878,
|
||||
"watchers": 2970,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-11-10T06:36:00Z",
|
||||
"updated_at": "2021-11-10T16:58:06Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1212,
|
||||
"watchers_count": 1212,
|
||||
"stargazers_count": 1213,
|
||||
"watchers_count": 1213,
|
||||
"forks_count": 270,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 270,
|
||||
"watchers": 1212,
|
||||
"watchers": 1213,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T15:27:25Z",
|
||||
"updated_at": "2021-10-28T09:01:17Z",
|
||||
"updated_at": "2021-11-10T15:15:04Z",
|
||||
"pushed_at": "2021-05-25T11:14:56Z",
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 114,
|
||||
"watchers": 115,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -125,14 +125,14 @@
|
|||
"pushed_at": "2021-11-06T05:20:30Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"forks_count": 32,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2021-22205"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"forks": 31,
|
||||
"watchers": 69,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -434,5 +434,59 @@
|
|||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 426338911,
|
||||
"name": "GitLab-CVE-2021-22205-scanner",
|
||||
"full_name": "faisalfs10x\/GitLab-CVE-2021-22205-scanner",
|
||||
"owner": {
|
||||
"login": "faisalfs10x",
|
||||
"id": 51811615,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51811615?v=4",
|
||||
"html_url": "https:\/\/github.com\/faisalfs10x"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/faisalfs10x\/GitLab-CVE-2021-22205-scanner",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-11-09T18:19:43Z",
|
||||
"updated_at": "2021-11-10T15:29:09Z",
|
||||
"pushed_at": "2021-11-10T15:29:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 426642274,
|
||||
"name": "docker-cve-2021-22205",
|
||||
"full_name": "ahmad4fifz\/docker-cve-2021-22205",
|
||||
"owner": {
|
||||
"login": "ahmad4fifz",
|
||||
"id": 45918058,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45918058?v=4",
|
||||
"html_url": "https:\/\/github.com\/ahmad4fifz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ahmad4fifz\/docker-cve-2021-22205",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-11-10T13:57:55Z",
|
||||
"updated_at": "2021-11-10T17:20:01Z",
|
||||
"pushed_at": "2021-11-10T17:19:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T15:27:25Z",
|
||||
"updated_at": "2021-10-28T09:01:17Z",
|
||||
"updated_at": "2021-11-10T15:15:04Z",
|
||||
"pushed_at": "2021-05-25T11:14:56Z",
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 114,
|
||||
"watchers": 115,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-13T12:52:20Z",
|
||||
"updated_at": "2021-11-10T10:05:01Z",
|
||||
"updated_at": "2021-11-10T17:47:36Z",
|
||||
"pushed_at": "2021-01-29T13:59:07Z",
|
||||
"stargazers_count": 181,
|
||||
"watchers_count": 181,
|
||||
"forks_count": 46,
|
||||
"stargazers_count": 182,
|
||||
"watchers_count": 182,
|
||||
"forks_count": 47,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 46,
|
||||
"watchers": 181,
|
||||
"forks": 47,
|
||||
"watchers": 182,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Ubuntu OverlayFS Local Privesc",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-19T20:07:01Z",
|
||||
"updated_at": "2021-11-03T03:03:00Z",
|
||||
"updated_at": "2021-11-10T17:16:59Z",
|
||||
"pushed_at": "2021-09-28T04:08:43Z",
|
||||
"stargazers_count": 252,
|
||||
"watchers_count": 252,
|
||||
"stargazers_count": 253,
|
||||
"watchers_count": 253,
|
||||
"forks_count": 88,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 88,
|
||||
"watchers": 252,
|
||||
"watchers": 253,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,11 +13,11 @@
|
|||
"description": "ETS5 Password Recovery Tool is a PoC for CVE-2021-36799",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-18T13:59:43Z",
|
||||
"updated_at": "2021-11-09T02:16:40Z",
|
||||
"pushed_at": "2021-11-08T21:52:21Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 1,
|
||||
"updated_at": "2021-11-10T17:31:37Z",
|
||||
"pushed_at": "2021-11-10T17:31:34Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -27,8 +27,8 @@
|
|||
"security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 12,
|
||||
"forks": 2,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-11-05T03:18:46Z",
|
||||
"updated_at": "2021-11-09T14:28:03Z",
|
||||
"updated_at": "2021-11-10T13:12:17Z",
|
||||
"pushed_at": "2021-11-05T03:17:58Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -229,17 +229,17 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2021-11-10T06:04:28Z",
|
||||
"updated_at": "2021-11-10T13:37:44Z",
|
||||
"pushed_at": "2021-09-11T09:50:26Z",
|
||||
"stargazers_count": 1297,
|
||||
"watchers_count": 1297,
|
||||
"stargazers_count": 1298,
|
||||
"watchers_count": 1298,
|
||||
"forks_count": 419,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 419,
|
||||
"watchers": 1297,
|
||||
"watchers": 1298,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -553,10 +553,10 @@
|
|||
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-15T22:34:35Z",
|
||||
"updated_at": "2021-11-10T06:17:59Z",
|
||||
"updated_at": "2021-11-10T13:44:39Z",
|
||||
"pushed_at": "2021-10-12T23:05:07Z",
|
||||
"stargazers_count": 493,
|
||||
"watchers_count": 493,
|
||||
"stargazers_count": 494,
|
||||
"watchers_count": 494,
|
||||
"forks_count": 104,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -570,7 +570,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 104,
|
||||
"watchers": 493,
|
||||
"watchers": 494,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -732,10 +732,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-03T01:13:42Z",
|
||||
"updated_at": "2021-10-10T06:32:14Z",
|
||||
"updated_at": "2021-11-10T13:43:45Z",
|
||||
"pushed_at": "2021-10-10T06:32:11Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -744,7 +744,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -96,17 +96,17 @@
|
|||
"description": "Exploit for CVE-2021-40449",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-07T16:15:19Z",
|
||||
"updated_at": "2021-11-10T10:08:38Z",
|
||||
"updated_at": "2021-11-10T15:35:36Z",
|
||||
"pushed_at": "2021-11-07T16:21:20Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 32,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2021/CVE-2021-42292.json
Normal file
29
2021/CVE-2021-42292.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 426216342,
|
||||
"name": "CVE-2021-42292",
|
||||
"full_name": "corelight\/CVE-2021-42292",
|
||||
"owner": {
|
||||
"login": "corelight",
|
||||
"id": 21672558,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
|
||||
"html_url": "https:\/\/github.com\/corelight"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/corelight\/CVE-2021-42292",
|
||||
"description": "A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-09T12:14:45Z",
|
||||
"updated_at": "2021-11-10T18:09:35Z",
|
||||
"pushed_at": "2021-11-10T17:16:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 426605142,
|
||||
"name": "CVE-2021-9876",
|
||||
"full_name": "RichardKabuto\/CVE-2021-9876",
|
||||
"owner": {
|
||||
"login": "RichardKabuto",
|
||||
"id": 49665241,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49665241?v=4",
|
||||
"html_url": "https:\/\/github.com\/RichardKabuto"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RichardKabuto\/CVE-2021-9876",
|
||||
"description": "1111111",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-10T11:58:49Z",
|
||||
"updated_at": "2021-11-10T11:58:53Z",
|
||||
"pushed_at": "2021-11-10T11:58:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 426604166,
|
||||
"name": "CVE-2021-99999",
|
||||
"full_name": "RichardKabuto\/CVE-2021-99999",
|
||||
"owner": {
|
||||
"login": "RichardKabuto",
|
||||
"id": 49665241,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49665241?v=4",
|
||||
"html_url": "https:\/\/github.com\/RichardKabuto"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RichardKabuto\/CVE-2021-99999",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-11-10T11:55:22Z",
|
||||
"updated_at": "2021-11-10T11:55:25Z",
|
||||
"pushed_at": "2021-11-10T11:55:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
23
README.md
23
README.md
|
@ -495,7 +495,12 @@ There's a flaw in libxml2's xmllint in versions before 2.9.11. An attacker who i
|
|||
- [BizarreLove/CVE-2021-3560](https://github.com/BizarreLove/CVE-2021-3560)
|
||||
- [0dayNinja/CVE-2021-3560](https://github.com/0dayNinja/CVE-2021-3560)
|
||||
|
||||
### CVE-2021-3572
|
||||
### CVE-2021-3572 (-)
|
||||
|
||||
<code>
|
||||
A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.
|
||||
</code>
|
||||
|
||||
- [frenzymadness/CVE-2021-3572](https://github.com/frenzymadness/CVE-2021-3572)
|
||||
|
||||
### CVE-2021-3625 (2021-10-05)
|
||||
|
@ -525,9 +530,6 @@ D-Link router DSL-2750U with firmware vME1.16 or prior versions is vulnerable to
|
|||
### CVE-2021-6901
|
||||
- [mooneee/cve-2021-6901](https://github.com/mooneee/cve-2021-6901)
|
||||
|
||||
### CVE-2021-9876
|
||||
- [RichardKabuto/CVE-2021-9876](https://github.com/RichardKabuto/CVE-2021-9876)
|
||||
|
||||
### CVE-2021-10086
|
||||
- [xiaoyun-1/CVE-2021-10086](https://github.com/xiaoyun-1/CVE-2021-10086)
|
||||
|
||||
|
@ -894,6 +896,8 @@ An issue has been discovered in GitLab CE/EE affecting all versions starting fro
|
|||
- [hh-hunter/cve-2021-22205](https://github.com/hh-hunter/cve-2021-22205)
|
||||
- [X1pe0/Automated-Gitlab-RCE](https://github.com/X1pe0/Automated-Gitlab-RCE)
|
||||
- [runsel/GitLab-CVE-2021-22205-](https://github.com/runsel/GitLab-CVE-2021-22205-)
|
||||
- [faisalfs10x/GitLab-CVE-2021-22205-scanner](https://github.com/faisalfs10x/GitLab-CVE-2021-22205-scanner)
|
||||
- [ahmad4fifz/docker-cve-2021-22205](https://github.com/ahmad4fifz/docker-cve-2021-22205)
|
||||
|
||||
### CVE-2021-22214 (2021-06-08)
|
||||
|
||||
|
@ -3142,6 +3146,14 @@ Revisor Video Management System (VMS) before 2.0.0 has a directory traversal vul
|
|||
|
||||
- [jet-pentest/CVE-2021-42261](https://github.com/jet-pentest/CVE-2021-42261)
|
||||
|
||||
### CVE-2021-42292 (2021-11-09)
|
||||
|
||||
<code>
|
||||
Microsoft Excel Security Feature Bypass Vulnerability
|
||||
</code>
|
||||
|
||||
- [corelight/CVE-2021-42292](https://github.com/corelight/CVE-2021-42292)
|
||||
|
||||
### CVE-2021-42327 (2021-10-21)
|
||||
|
||||
<code>
|
||||
|
@ -3222,9 +3234,6 @@ A Stored Cross Site Scripting (XSS) Vulneraibiilty exists in Sourcecodester Engi
|
|||
### CVE-2021-43361
|
||||
- [bartutku/CVE-2021-43361](https://github.com/bartutku/CVE-2021-43361)
|
||||
|
||||
### CVE-2021-99999
|
||||
- [RichardKabuto/CVE-2021-99999](https://github.com/RichardKabuto/CVE-2021-99999)
|
||||
|
||||
|
||||
## 2020
|
||||
### CVE-2020-0001 (2020-01-08)
|
||||
|
|
Loading…
Add table
Reference in a new issue