mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/09/05 00:12:45
This commit is contained in:
parent
5ceca60cc2
commit
d3931ea998
26 changed files with 333 additions and 92 deletions
|
@ -105,13 +105,13 @@
|
|||
"description": "A Python replicated exploit for Webmin 1.580 \/file\/show.cgi Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-04T04:01:56Z",
|
||||
"updated_at": "2021-09-04T05:39:40Z",
|
||||
"updated_at": "2021-09-04T13:45:49Z",
|
||||
"pushed_at": "2021-09-04T07:25:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "This repository contains the POC of an exploit for node-jose < 0.11.0",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-20T20:37:29Z",
|
||||
"updated_at": "2021-06-06T07:37:15Z",
|
||||
"pushed_at": "2019-07-30T13:12:41Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 22,
|
||||
"updated_at": "2021-09-04T13:41:47Z",
|
||||
"pushed_at": "2021-09-04T13:48:49Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -136,5 +136,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 402774667,
|
||||
"name": "CVE-2018-0114",
|
||||
"full_name": "RyouYoo\/CVE-2018-0114",
|
||||
"owner": {
|
||||
"login": "RyouYoo",
|
||||
"id": 48088579,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48088579?v=4",
|
||||
"html_url": "https:\/\/github.com\/RyouYoo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RyouYoo\/CVE-2018-0114",
|
||||
"description": "Exploitation of a vulnerability in Cisco's node-jose, a JavaScript library created to manage JWT.",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-03T13:11:28Z",
|
||||
"updated_at": "2021-09-04T13:41:38Z",
|
||||
"pushed_at": "2021-09-04T13:41:35Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -358,8 +358,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-07T05:57:43Z",
|
||||
"updated_at": "2021-08-31T07:15:17Z",
|
||||
"pushed_at": "2021-08-31T07:15:15Z",
|
||||
"updated_at": "2021-09-04T09:17:50Z",
|
||||
"pushed_at": "2021-09-04T09:17:47Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-11-14T14:16:54Z",
|
||||
"stargazers_count": 278,
|
||||
"watchers_count": 278,
|
||||
"forks_count": 68,
|
||||
"forks": 68,
|
||||
"forks_count": 69,
|
||||
"forks": 69,
|
||||
"watchers": 278,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2019-1458 Windows LPE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T08:30:14Z",
|
||||
"updated_at": "2021-08-25T11:03:35Z",
|
||||
"updated_at": "2021-09-04T15:08:24Z",
|
||||
"pushed_at": "2020-03-11T09:59:01Z",
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 109,
|
||||
"watchers": 110,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-09-03T13:21:22Z",
|
||||
"updated_at": "2021-09-04T12:31:39Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2839,
|
||||
"watchers_count": 2839,
|
||||
"stargazers_count": 2841,
|
||||
"watchers_count": 2841,
|
||||
"forks_count": 832,
|
||||
"forks": 832,
|
||||
"watchers": 2839,
|
||||
"watchers": 2841,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-2107",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-08T14:18:33Z",
|
||||
"updated_at": "2021-09-03T12:55:00Z",
|
||||
"updated_at": "2021-09-04T10:00:41Z",
|
||||
"pushed_at": "2020-11-02T06:43:15Z",
|
||||
"stargazers_count": 311,
|
||||
"watchers_count": 311,
|
||||
"stargazers_count": 310,
|
||||
"watchers_count": 310,
|
||||
"forks_count": 97,
|
||||
"forks": 97,
|
||||
"watchers": 311,
|
||||
"watchers": 310,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-08-03T14:12:56Z",
|
||||
"updated_at": "2021-09-03T14:49:18Z",
|
||||
"updated_at": "2021-09-04T10:36:21Z",
|
||||
"pushed_at": "2020-12-12T03:41:43Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploits for Android Binder bug CVE-2020-0041",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-31T17:53:57Z",
|
||||
"updated_at": "2021-09-01T08:08:15Z",
|
||||
"updated_at": "2021-09-04T13:07:17Z",
|
||||
"pushed_at": "2020-04-08T08:55:30Z",
|
||||
"stargazers_count": 170,
|
||||
"watchers_count": 170,
|
||||
"stargazers_count": 171,
|
||||
"watchers_count": 171,
|
||||
"forks_count": 55,
|
||||
"forks": 55,
|
||||
"watchers": 170,
|
||||
"watchers": 171,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -960,8 +960,8 @@
|
|||
"pushed_at": "2020-04-01T01:46:17Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 48,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1585,5 +1585,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 403086776,
|
||||
"name": "SMBGhost_CVE-2020-0796_checker",
|
||||
"full_name": "Anonimo501\/SMBGhost_CVE-2020-0796_checker",
|
||||
"owner": {
|
||||
"login": "Anonimo501",
|
||||
"id": 67207446,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67207446?v=4",
|
||||
"html_url": "https:\/\/github.com\/Anonimo501"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Anonimo501\/SMBGhost_CVE-2020-0796_checker",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-09-04T15:07:15Z",
|
||||
"updated_at": "2021-09-04T15:08:55Z",
|
||||
"pushed_at": "2021-09-04T15:08:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:57:49Z",
|
||||
"updated_at": "2021-08-29T12:22:38Z",
|
||||
"updated_at": "2021-09-04T13:18:50Z",
|
||||
"pushed_at": "2020-11-05T16:37:20Z",
|
||||
"stargazers_count": 268,
|
||||
"watchers_count": 268,
|
||||
"stargazers_count": 269,
|
||||
"watchers_count": 269,
|
||||
"forks_count": 48,
|
||||
"forks": 48,
|
||||
"watchers": 268,
|
||||
"watchers": 269,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-09-03T13:21:22Z",
|
||||
"updated_at": "2021-09-04T12:31:39Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2839,
|
||||
"watchers_count": 2839,
|
||||
"stargazers_count": 2841,
|
||||
"watchers_count": 2841,
|
||||
"forks_count": 832,
|
||||
"forks": 832,
|
||||
"watchers": 2839,
|
||||
"watchers": 2841,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,8 +59,8 @@
|
|||
"description": "Draytek CVE-2020-8515 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-01T22:47:54Z",
|
||||
"updated_at": "2021-09-02T11:32:43Z",
|
||||
"pushed_at": "2021-09-02T11:32:41Z",
|
||||
"updated_at": "2021-09-04T10:45:20Z",
|
||||
"pushed_at": "2021-09-04T10:45:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
|
|
|
@ -703,13 +703,13 @@
|
|||
"description": "PrintNightMare LPE提权漏洞的CS 反射加载插件。开箱即用、通过内存加载、混淆加载的驱动名称来ByPass Defender\/EDR。",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-01T11:25:04Z",
|
||||
"updated_at": "2021-09-04T08:08:14Z",
|
||||
"updated_at": "2021-09-04T12:54:28Z",
|
||||
"pushed_at": "2021-09-01T11:25:22Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 73,
|
||||
"watchers": 74,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Backporting CVE-2021-1748 patch for iOS <=14.3",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-03T22:48:11Z",
|
||||
"updated_at": "2021-09-04T08:44:04Z",
|
||||
"updated_at": "2021-09-04T12:07:00Z",
|
||||
"pushed_at": "2021-09-03T22:50:08Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -132,8 +132,8 @@
|
|||
"pushed_at": "2021-06-07T01:44:03Z",
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 70,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-09-01T00:50:30Z",
|
||||
"updated_at": "2021-09-03T08:19:28Z",
|
||||
"updated_at": "2021-09-04T11:07:55Z",
|
||||
"pushed_at": "2021-09-01T01:17:58Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 35,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 36,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "Confluence Server Webwork OGNL injection",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-01T07:15:17Z",
|
||||
"updated_at": "2021-09-04T09:15:32Z",
|
||||
"pushed_at": "2021-09-04T03:47:13Z",
|
||||
"stargazers_count": 168,
|
||||
"watchers_count": 168,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 168,
|
||||
"updated_at": "2021-09-04T14:52:43Z",
|
||||
"pushed_at": "2021-09-04T14:50:15Z",
|
||||
"stargazers_count": 174,
|
||||
"watchers_count": 174,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"watchers": 174,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -128,13 +128,13 @@
|
|||
"description": "CVE-2021-26084 - Confluence Pre-Auth RCE OGNL injection 命令回显+一键getshell",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-01T07:45:55Z",
|
||||
"updated_at": "2021-09-04T07:58:50Z",
|
||||
"updated_at": "2021-09-04T15:14:25Z",
|
||||
"pushed_at": "2021-09-01T10:27:12Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -458,5 +458,51 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 403064487,
|
||||
"name": "CVE-2021-26084",
|
||||
"full_name": "march0s1as\/CVE-2021-26084",
|
||||
"owner": {
|
||||
"login": "march0s1as",
|
||||
"id": 44043159,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44043159?v=4",
|
||||
"html_url": "https:\/\/github.com\/march0s1as"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/march0s1as\/CVE-2021-26084",
|
||||
"description": "Confluence OGNL Injection [CVE-2021-26084].",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-04T13:32:42Z",
|
||||
"updated_at": "2021-09-04T14:38:56Z",
|
||||
"pushed_at": "2021-09-04T13:57:08Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 403083297,
|
||||
"name": "confluence-rce-poc",
|
||||
"full_name": "wolf1892\/confluence-rce-poc",
|
||||
"owner": {
|
||||
"login": "wolf1892",
|
||||
"id": 24608781,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24608781?v=4",
|
||||
"html_url": "https:\/\/github.com\/wolf1892"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/wolf1892\/confluence-rce-poc",
|
||||
"description": "Setting up POC for CVE-2021-26084",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-04T14:53:38Z",
|
||||
"updated_at": "2021-09-04T15:16:43Z",
|
||||
"pushed_at": "2021-09-04T15:16:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-01T22:59:29Z",
|
||||
"updated_at": "2021-09-04T08:53:36Z",
|
||||
"updated_at": "2021-09-04T14:11:43Z",
|
||||
"pushed_at": "2021-09-03T10:24:34Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 20,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-27T10:16:35Z",
|
||||
"updated_at": "2021-09-02T11:28:16Z",
|
||||
"updated_at": "2021-09-04T14:23:58Z",
|
||||
"pushed_at": "2021-03-07T04:39:58Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2021/CVE-2021-34646.json
Normal file
25
2021/CVE-2021-34646.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 403075256,
|
||||
"name": "CVE-2021-34646",
|
||||
"full_name": "motikan2010\/CVE-2021-34646",
|
||||
"owner": {
|
||||
"login": "motikan2010",
|
||||
"id": 3177297,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3177297?v=4",
|
||||
"html_url": "https:\/\/github.com\/motikan2010"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/motikan2010\/CVE-2021-34646",
|
||||
"description": "CVE-2021-34646 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-04T14:19:05Z",
|
||||
"updated_at": "2021-09-04T15:10:08Z",
|
||||
"pushed_at": "2021-09-04T14:23:08Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -243,13 +243,13 @@
|
|||
"description": "C# PoC for CVE-2021-36934\/HiveNightmare\/SeriousSAM",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-24T12:55:05Z",
|
||||
"updated_at": "2021-09-03T15:07:04Z",
|
||||
"updated_at": "2021-09-04T12:54:47Z",
|
||||
"pushed_at": "2021-07-25T15:41:33Z",
|
||||
"stargazers_count": 204,
|
||||
"watchers_count": 204,
|
||||
"stargazers_count": 205,
|
||||
"watchers_count": 205,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"watchers": 204,
|
||||
"watchers": 205,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -381,8 +381,8 @@
|
|||
"description": "SeriousSAM Auto Exploiter",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-01T19:54:31Z",
|
||||
"updated_at": "2021-08-06T10:23:26Z",
|
||||
"pushed_at": "2021-08-06T10:23:24Z",
|
||||
"updated_at": "2021-09-04T09:27:52Z",
|
||||
"pushed_at": "2021-09-04T09:27:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
|
|
25
2021/CVE-2021-38704.json
Normal file
25
2021/CVE-2021-38704.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 402892991,
|
||||
"name": "CVE-2021-38704",
|
||||
"full_name": "sudonoodle\/CVE-2021-38704",
|
||||
"owner": {
|
||||
"login": "sudonoodle",
|
||||
"id": 52385049,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52385049?v=4",
|
||||
"html_url": "https:\/\/github.com\/sudonoodle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sudonoodle\/CVE-2021-38704",
|
||||
"description": "Reflected Cross-Site Scripting (XSS) in ClinicCases 7.3.3 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-03T20:41:58Z",
|
||||
"updated_at": "2021-09-04T13:13:40Z",
|
||||
"pushed_at": "2021-09-04T12:14:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-38705.json
Normal file
25
2021/CVE-2021-38705.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 402893125,
|
||||
"name": "CVE-2021-38705",
|
||||
"full_name": "sudonoodle\/CVE-2021-38705",
|
||||
"owner": {
|
||||
"login": "sudonoodle",
|
||||
"id": 52385049,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52385049?v=4",
|
||||
"html_url": "https:\/\/github.com\/sudonoodle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sudonoodle\/CVE-2021-38705",
|
||||
"description": "Cross-Site Request Forgery (CSRF) in ClinicCases 7.3.3",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-03T20:42:43Z",
|
||||
"updated_at": "2021-09-04T13:22:53Z",
|
||||
"pushed_at": "2021-09-04T12:42:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-38706.json
Normal file
25
2021/CVE-2021-38706.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 402893797,
|
||||
"name": "CVE-2021-38706",
|
||||
"full_name": "sudonoodle\/CVE-2021-38706",
|
||||
"owner": {
|
||||
"login": "sudonoodle",
|
||||
"id": 52385049,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52385049?v=4",
|
||||
"html_url": "https:\/\/github.com\/sudonoodle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sudonoodle\/CVE-2021-38706",
|
||||
"description": "Blind SQL Injection in ClinicCases 7.3.3",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-03T20:46:11Z",
|
||||
"updated_at": "2021-09-04T13:29:14Z",
|
||||
"pushed_at": "2021-09-04T13:11:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-38707.json
Normal file
25
2021/CVE-2021-38707.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 402893433,
|
||||
"name": "CVE-2021-38707",
|
||||
"full_name": "sudonoodle\/CVE-2021-38707",
|
||||
"owner": {
|
||||
"login": "sudonoodle",
|
||||
"id": 52385049,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52385049?v=4",
|
||||
"html_url": "https:\/\/github.com\/sudonoodle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sudonoodle\/CVE-2021-38707",
|
||||
"description": "Persistent Cross-Site Scripting (XSS) in ClinicCases 7.3.3 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-03T20:44:20Z",
|
||||
"updated_at": "2021-09-04T13:31:44Z",
|
||||
"pushed_at": "2021-09-04T12:31:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
24
README.md
24
README.md
|
@ -1003,6 +1003,8 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
|
|||
- [mr-r3bot/Confluence-CVE-2021-26084](https://github.com/mr-r3bot/Confluence-CVE-2021-26084)
|
||||
- [Loneyers/CVE-2021-26084](https://github.com/Loneyers/CVE-2021-26084)
|
||||
- [Xc1Ym/cve_2021_26084](https://github.com/Xc1Ym/cve_2021_26084)
|
||||
- [march0s1as/CVE-2021-26084](https://github.com/march0s1as/CVE-2021-26084)
|
||||
- [wolf1892/confluence-rce-poc](https://github.com/wolf1892/confluence-rce-poc)
|
||||
|
||||
### CVE-2021-26119 (2021-02-21)
|
||||
|
||||
|
@ -1873,6 +1875,14 @@ The crypto/tls package of Go through 1.16.5 does not properly assert that the ty
|
|||
|
||||
- [alexzorin/cve-2021-34558](https://github.com/alexzorin/cve-2021-34558)
|
||||
|
||||
### CVE-2021-34646 (2021-08-30)
|
||||
|
||||
<code>
|
||||
Versions up to, and including, 5.4.3, of the Booster for WooCommerce WordPress plugin are vulnerable to authentication bypass via the process_email_verification function due to a random token generation weakness in the reset_and_mail_activation_link function found in the ~/includes/class-wcj-emails-verification.php file. This allows attackers to impersonate users and trigger an email address verification for arbitrary accounts, including administrative accounts, and automatically be logged in as that user, including any site administrators. This requires the Email Verification module to be active in the plugin and the Login User After Successful Verification setting to be enabled, which it is by default.
|
||||
</code>
|
||||
|
||||
- [motikan2010/CVE-2021-34646](https://github.com/motikan2010/CVE-2021-34646)
|
||||
|
||||
### CVE-2021-35042 (2021-07-02)
|
||||
|
||||
<code>
|
||||
|
@ -2063,6 +2073,18 @@ TastyIgniter 3.0.7 allows XSS via /account, /reservation, /admin/dashboard, and
|
|||
- [HuskyHacks/CVE-2021-38699-Reflected-XSS](https://github.com/HuskyHacks/CVE-2021-38699-Reflected-XSS)
|
||||
- [HuskyHacks/CVE-2021-38699-Stored-XSS](https://github.com/HuskyHacks/CVE-2021-38699-Stored-XSS)
|
||||
|
||||
### CVE-2021-38704
|
||||
- [sudonoodle/CVE-2021-38704](https://github.com/sudonoodle/CVE-2021-38704)
|
||||
|
||||
### CVE-2021-38705
|
||||
- [sudonoodle/CVE-2021-38705](https://github.com/sudonoodle/CVE-2021-38705)
|
||||
|
||||
### CVE-2021-38706
|
||||
- [sudonoodle/CVE-2021-38706](https://github.com/sudonoodle/CVE-2021-38706)
|
||||
|
||||
### CVE-2021-38707
|
||||
- [sudonoodle/CVE-2021-38707](https://github.com/sudonoodle/CVE-2021-38707)
|
||||
|
||||
### CVE-2021-38710 (2021-08-18)
|
||||
|
||||
<code>
|
||||
|
@ -2512,6 +2534,7 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
|
|||
- [ORCA666/CVE-2020-0796](https://github.com/ORCA666/CVE-2020-0796)
|
||||
- [Nephael/Nephael-CVE-2020-0796](https://github.com/Nephael/Nephael-CVE-2020-0796)
|
||||
- [1stPeak/CVE-2020-0796-Scanner](https://github.com/1stPeak/CVE-2020-0796-Scanner)
|
||||
- [Anonimo501/SMBGhost_CVE-2020-0796_checker](https://github.com/Anonimo501/SMBGhost_CVE-2020-0796_checker)
|
||||
|
||||
### CVE-2020-0797 (2020-03-12)
|
||||
|
||||
|
@ -10608,6 +10631,7 @@ A vulnerability in the Cisco node-jose open source library before 0.11.0 could a
|
|||
- [Eremiel/CVE-2018-0114](https://github.com/Eremiel/CVE-2018-0114)
|
||||
- [Starry-lord/CVE-2018-0114](https://github.com/Starry-lord/CVE-2018-0114)
|
||||
- [scumdestroy/CVE-2018-0114](https://github.com/scumdestroy/CVE-2018-0114)
|
||||
- [RyouYoo/CVE-2018-0114](https://github.com/RyouYoo/CVE-2018-0114)
|
||||
|
||||
### CVE-2018-0202 (2018-03-27)
|
||||
|
||||
|
|
Loading…
Reference in a new issue