mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2023/07/30 06:26:19
This commit is contained in:
parent
40e5753254
commit
d8c0754bda
40 changed files with 146 additions and 417 deletions
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"has_discussions": false,
|
||||
"forks_count": 57,
|
||||
"forks_count": 58,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 57,
|
||||
"forks": 58,
|
||||
"watchers": 112,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
|
|
|
@ -48,13 +48,13 @@
|
|||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "JWT Key Confusion PoC (CVE-2015-9235) Written for the Hack the Box challenge - Under Construction",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-13T23:09:13Z",
|
||||
"updated_at": "2023-04-16T19:34:25Z",
|
||||
"updated_at": "2023-07-30T01:17:32Z",
|
||||
"pushed_at": "2022-02-13T22:42:53Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
@ -2679,13 +2679,13 @@
|
|||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"forks": 14,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.4",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-08T10:44:51Z",
|
||||
"updated_at": "2022-07-06T21:45:25Z",
|
||||
"updated_at": "2023-07-30T04:19:30Z",
|
||||
"pushed_at": "2019-12-08T17:55:01Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 36,
|
||||
"watchers": 37,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-17T19:05:38Z",
|
||||
"updated_at": "2023-01-04T03:10:18Z",
|
||||
"updated_at": "2023-07-30T05:12:19Z",
|
||||
"pushed_at": "2022-08-17T19:20:34Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -851,10 +851,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-07-28T14:15:56Z",
|
||||
"updated_at": "2023-07-30T05:14:05Z",
|
||||
"pushed_at": "2023-05-14T12:08:39Z",
|
||||
"stargazers_count": 988,
|
||||
"watchers_count": 988,
|
||||
"stargazers_count": 989,
|
||||
"watchers_count": 989,
|
||||
"has_discussions": false,
|
||||
"forks_count": 129,
|
||||
"allow_forking": true,
|
||||
|
@ -870,7 +870,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 129,
|
||||
"watchers": 988,
|
||||
"watchers": 989,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
}
|
||||
|
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 443710863,
|
||||
"name": "CVE-2021-24307-all-in-one-seo-pack-admin-rce",
|
||||
"full_name": "darkpills\/CVE-2021-24307-all-in-one-seo-pack-admin-rce",
|
||||
"owner": {
|
||||
"login": "darkpills",
|
||||
"id": 209987,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/209987?v=4",
|
||||
"html_url": "https:\/\/github.com\/darkpills"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/darkpills\/CVE-2021-24307-all-in-one-seo-pack-admin-rce",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-01-02T07:50:09Z",
|
||||
"updated_at": "2022-09-16T22:23:18Z",
|
||||
"pushed_at": "2022-01-02T08:27:37Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 444335154,
|
||||
"name": "CVE-2021-28750-site",
|
||||
"full_name": "PfalzPrince\/CVE-2021-28750-site",
|
||||
"owner": {
|
||||
"login": "PfalzPrince",
|
||||
"id": 96906354,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96906354?v=4",
|
||||
"html_url": "https:\/\/github.com\/PfalzPrince"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/PfalzPrince\/CVE-2021-28750-site",
|
||||
"description": "PoC Site for tsunami-security-scanner-plugins. ",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-04T08:05:03Z",
|
||||
"updated_at": "2022-01-04T09:01:44Z",
|
||||
"pushed_at": "2022-01-04T09:02:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -1,32 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 443862591,
|
||||
"name": "CVE-2021-30853",
|
||||
"full_name": "shubham0d\/CVE-2021-30853",
|
||||
"owner": {
|
||||
"login": "shubham0d",
|
||||
"id": 12750163,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12750163?v=4",
|
||||
"html_url": "https:\/\/github.com\/shubham0d"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/shubham0d\/CVE-2021-30853",
|
||||
"description": "A sample POC to test CVE-2021-30853",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-02T20:24:11Z",
|
||||
"updated_at": "2023-07-28T03:36:19Z",
|
||||
"pushed_at": "2022-01-02T20:50:48Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -223,10 +223,10 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2023-07-28T18:10:05Z",
|
||||
"updated_at": "2023-07-30T05:47:17Z",
|
||||
"pushed_at": "2021-12-25T18:31:02Z",
|
||||
"stargazers_count": 1483,
|
||||
"watchers_count": 1483,
|
||||
"stargazers_count": 1484,
|
||||
"watchers_count": 1484,
|
||||
"has_discussions": false,
|
||||
"forks_count": 489,
|
||||
"allow_forking": true,
|
||||
|
@ -235,7 +235,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 489,
|
||||
"watchers": 1483,
|
||||
"watchers": 1484,
|
||||
"score": 0,
|
||||
"subscribers_count": 27
|
||||
},
|
||||
|
@ -523,10 +523,10 @@
|
|||
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-15T22:34:35Z",
|
||||
"updated_at": "2023-07-25T11:20:18Z",
|
||||
"updated_at": "2023-07-30T05:47:19Z",
|
||||
"pushed_at": "2022-06-22T20:21:42Z",
|
||||
"stargazers_count": 751,
|
||||
"watchers_count": 751,
|
||||
"stargazers_count": 752,
|
||||
"watchers_count": 752,
|
||||
"has_discussions": false,
|
||||
"forks_count": 169,
|
||||
"allow_forking": true,
|
||||
|
@ -542,7 +542,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 169,
|
||||
"watchers": 751,
|
||||
"watchers": 752,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
},
|
||||
|
|
|
@ -1,34 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 444133204,
|
||||
"name": "CVE-2021-43857",
|
||||
"full_name": "LongWayHomie\/CVE-2021-43857",
|
||||
"owner": {
|
||||
"login": "LongWayHomie",
|
||||
"id": 63229183,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63229183?v=4",
|
||||
"html_url": "https:\/\/github.com\/LongWayHomie"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/LongWayHomie\/CVE-2021-43857",
|
||||
"description": "Gerapy prior to version 0.9.8 is vulnerable to remote code execution. This issue is patched in version 0.9.8.",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-03T16:47:42Z",
|
||||
"updated_at": "2023-03-29T02:26:23Z",
|
||||
"pushed_at": "2022-01-03T16:53:04Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 485594121,
|
||||
"name": "CVE-2021-43857",
|
||||
|
|
|
@ -1,34 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 444140549,
|
||||
"name": "cve-2021-43858",
|
||||
"full_name": "0rx1\/cve-2021-43858",
|
||||
"owner": {
|
||||
"login": "0rx1",
|
||||
"id": 12779060,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12779060?v=4",
|
||||
"html_url": "https:\/\/github.com\/0rx1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0rx1\/cve-2021-43858",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-01-03T17:11:54Z",
|
||||
"updated_at": "2022-06-10T03:20:10Z",
|
||||
"pushed_at": "2022-01-03T14:15:40Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 626802613,
|
||||
"name": "CVE-2021-43858-MinIO",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A download of code without integrity check vulnerability in the \"execute restore src-vis\" command of FortiOS before 7.0.3.",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-08T07:30:52Z",
|
||||
"updated_at": "2023-07-29T23:54:40Z",
|
||||
"updated_at": "2023-07-30T04:01:35Z",
|
||||
"pushed_at": "2023-06-22T19:19:02Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -3359,10 +3359,10 @@
|
|||
"description": "Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T22:52:02Z",
|
||||
"updated_at": "2023-05-28T01:56:12Z",
|
||||
"updated_at": "2023-07-30T01:24:51Z",
|
||||
"pushed_at": "2021-12-20T15:34:21Z",
|
||||
"stargazers_count": 345,
|
||||
"watchers_count": 345,
|
||||
"stargazers_count": 346,
|
||||
"watchers_count": 346,
|
||||
"has_discussions": false,
|
||||
"forks_count": 50,
|
||||
"allow_forking": true,
|
||||
|
@ -3371,7 +3371,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 50,
|
||||
"watchers": 345,
|
||||
"watchers": 346,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
@ -10446,69 +10446,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 443563564,
|
||||
"name": "-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.",
|
||||
"full_name": "marklindsey11\/-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.",
|
||||
"owner": {
|
||||
"login": "marklindsey11",
|
||||
"id": 81498475,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81498475?v=4",
|
||||
"html_url": "https:\/\/github.com\/marklindsey11"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/marklindsey11\/-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.",
|
||||
"description": "Log4j Vulnerability Scanner",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-01T15:13:22Z",
|
||||
"updated_at": "2023-03-07T19:39:44Z",
|
||||
"pushed_at": "2022-01-01T15:31:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": true,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"hunting",
|
||||
"threat"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 443614046,
|
||||
"name": "gh-repo-clone-marklindsey11--CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CV",
|
||||
"full_name": "marklindsey11\/gh-repo-clone-marklindsey11--CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CV",
|
||||
"owner": {
|
||||
"login": "marklindsey11",
|
||||
"id": 81498475,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81498475?v=4",
|
||||
"html_url": "https:\/\/github.com\/marklindsey11"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/marklindsey11\/gh-repo-clone-marklindsey11--CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CV",
|
||||
"description": "Log4j-Scanner",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-01T20:01:01Z",
|
||||
"updated_at": "2022-01-01T20:01:06Z",
|
||||
"pushed_at": "2022-01-01T20:01:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 443941194,
|
||||
"name": "log4j2-test",
|
||||
|
@ -10902,36 +10839,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 447682859,
|
||||
"name": "log4j-exploit-builder",
|
||||
"full_name": "atlassion\/log4j-exploit-builder",
|
||||
"owner": {
|
||||
"login": "atlassion",
|
||||
"id": 49542929,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49542929?v=4",
|
||||
"html_url": "https:\/\/github.com\/atlassion"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/atlassion\/log4j-exploit-builder",
|
||||
"description": "Script to create a log4j (CVE-2021-44228) exploit with support for different methods of getting a reverse shell",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-13T17:03:54Z",
|
||||
"updated_at": "2022-06-30T18:53:34Z",
|
||||
"pushed_at": "2021-12-29T18:34:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 447683203,
|
||||
"name": "RS4LOGJ-CVE-2021-44228",
|
||||
|
|
|
@ -212,36 +212,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 443609406,
|
||||
"name": "-cve-2021-45232",
|
||||
"full_name": "itxfahdi\/-cve-2021-45232",
|
||||
"owner": {
|
||||
"login": "itxfahdi",
|
||||
"id": 67527602,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67527602?v=4",
|
||||
"html_url": "https:\/\/github.com\/itxfahdi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/itxfahdi\/-cve-2021-45232",
|
||||
"description": "The vulnerability affects Apache APISIX Dashboard version 2.10.1",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-01T19:31:13Z",
|
||||
"updated_at": "2022-01-01T20:22:16Z",
|
||||
"pushed_at": "2022-01-01T20:22:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 444659919,
|
||||
"name": "CVE-2021-45232-RCE",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "BLURtooth: Exploiting Cross-Transport Key Derivation in Bluetooth Classic and Bluetooth Low Energy [CVE-2020-15802] [CVE-2022-20361]",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-17T19:05:38Z",
|
||||
"updated_at": "2023-01-04T03:10:18Z",
|
||||
"updated_at": "2023-07-30T05:12:19Z",
|
||||
"pushed_at": "2022-08-17T19:20:34Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -348,7 +348,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-10-29T18:25:26Z",
|
||||
"updated_at": "2023-05-06T12:14:50Z",
|
||||
"pushed_at": "2023-07-25T20:46:14Z",
|
||||
"pushed_at": "2023-07-30T06:14:28Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -766,10 +766,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-07-28T14:15:56Z",
|
||||
"updated_at": "2023-07-30T05:14:05Z",
|
||||
"pushed_at": "2023-05-14T12:08:39Z",
|
||||
"stargazers_count": 988,
|
||||
"watchers_count": 988,
|
||||
"stargazers_count": 989,
|
||||
"watchers_count": 989,
|
||||
"has_discussions": false,
|
||||
"forks_count": 129,
|
||||
"allow_forking": true,
|
||||
|
@ -785,7 +785,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 129,
|
||||
"watchers": 988,
|
||||
"watchers": 989,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -211,7 +211,7 @@
|
|||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 635230649,
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Nmap scripts to detect exchange 0-day (CVE-2022-41082) vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-01T11:53:14Z",
|
||||
"updated_at": "2023-04-23T20:16:20Z",
|
||||
"updated_at": "2023-07-30T01:29:26Z",
|
||||
"pushed_at": "2023-01-03T08:37:33Z",
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 77,
|
||||
"watchers": 78,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -197,10 +197,10 @@
|
|||
"description": "An exploit for CVE-2022-42475, a pre-authentication heap overflow in Fortinet networking products",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-21T21:22:35Z",
|
||||
"updated_at": "2023-07-29T22:44:28Z",
|
||||
"updated_at": "2023-07-30T04:04:25Z",
|
||||
"pushed_at": "2023-06-21T21:24:52Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -209,7 +209,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -78,13 +78,13 @@
|
|||
"stargazers_count": 814,
|
||||
"watchers_count": 814,
|
||||
"has_discussions": false,
|
||||
"forks_count": 55,
|
||||
"forks_count": 56,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 55,
|
||||
"forks": 56,
|
||||
"watchers": 814,
|
||||
"score": 0,
|
||||
"subscribers_count": 25
|
||||
|
@ -344,7 +344,7 @@
|
|||
"forks": 1,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 608056893,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-30T12:57:48Z",
|
||||
"updated_at": "2023-07-27T06:55:12Z",
|
||||
"updated_at": "2023-07-30T02:39:26Z",
|
||||
"pushed_at": "2023-02-27T04:51:20Z",
|
||||
"stargazers_count": 237,
|
||||
"watchers_count": 237,
|
||||
"stargazers_count": 238,
|
||||
"watchers_count": 238,
|
||||
"has_discussions": false,
|
||||
"forks_count": 54,
|
||||
"allow_forking": true,
|
||||
|
@ -35,9 +35,9 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 54,
|
||||
"watchers": 237,
|
||||
"watchers": 238,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
"subscribers_count": 5
|
||||
},
|
||||
{
|
||||
"id": 600993696,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "LPE exploit for CVE-2023-21768",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-07T23:00:27Z",
|
||||
"updated_at": "2023-07-28T02:45:44Z",
|
||||
"updated_at": "2023-07-30T04:43:12Z",
|
||||
"pushed_at": "2023-07-10T16:35:49Z",
|
||||
"stargazers_count": 420,
|
||||
"watchers_count": 420,
|
||||
"stargazers_count": 421,
|
||||
"watchers_count": 421,
|
||||
"has_discussions": false,
|
||||
"forks_count": 157,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 157,
|
||||
"watchers": 420,
|
||||
"watchers": 421,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -480,13 +480,13 @@
|
|||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 23,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions are 3.2.18, 4.0.10, 4.1.8, and 4.2.1.",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-19T14:36:47Z",
|
||||
"updated_at": "2023-07-26T13:34:25Z",
|
||||
"updated_at": "2023-07-30T04:33:25Z",
|
||||
"pushed_at": "2023-06-22T07:19:36Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -40,7 +40,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 46,
|
||||
"watchers": 47,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -318,7 +318,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-07-29T20:43:16Z",
|
||||
"updated_at": "2023-07-29T21:17:58Z",
|
||||
"pushed_at": "2023-07-29T20:48:00Z",
|
||||
"pushed_at": "2023-07-30T03:47:05Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
@ -331,6 +331,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-28T13:22:26Z",
|
||||
"updated_at": "2023-07-29T21:51:39Z",
|
||||
"updated_at": "2023-07-30T06:22:26Z",
|
||||
"pushed_at": "2023-07-28T13:20:45Z",
|
||||
"stargazers_count": 329,
|
||||
"watchers_count": 329,
|
||||
"stargazers_count": 332,
|
||||
"watchers_count": 332,
|
||||
"has_discussions": false,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
|
@ -25,8 +25,8 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 329,
|
||||
"watchers": 332,
|
||||
"score": 0,
|
||||
"subscribers_count": 19
|
||||
"subscribers_count": 16
|
||||
}
|
||||
]
|
|
@ -103,10 +103,10 @@
|
|||
"description": "Apache RocketMQ 远程代码执行漏洞(CVE-2023-33246) Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-01T06:27:09Z",
|
||||
"updated_at": "2023-07-27T09:03:51Z",
|
||||
"updated_at": "2023-07-30T01:10:52Z",
|
||||
"pushed_at": "2023-06-01T05:54:25Z",
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"has_discussions": false,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 63,
|
||||
"watchers": 64,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
@ -57,6 +57,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -172,13 +172,13 @@
|
|||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-29T05:06:27Z",
|
||||
"updated_at": "2023-07-29T23:18:32Z",
|
||||
"updated_at": "2023-07-30T02:50:10Z",
|
||||
"pushed_at": "2023-07-29T16:58:16Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -25,9 +25,9 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 672358707,
|
||||
|
@ -57,6 +57,6 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC of CVE-2023-35086 only DoS",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-25T01:36:07Z",
|
||||
"updated_at": "2023-07-29T01:07:28Z",
|
||||
"updated_at": "2023-07-30T04:21:45Z",
|
||||
"pushed_at": "2023-07-25T01:42:02Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 30,
|
||||
"watchers": 31,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Citrix Scanner for CVE-2023-3519",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-20T13:16:38Z",
|
||||
"updated_at": "2023-07-25T20:06:06Z",
|
||||
"updated_at": "2023-07-30T03:42:46Z",
|
||||
"pushed_at": "2023-07-24T11:49:37Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 35,
|
||||
"watchers": 36,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -47,10 +47,10 @@
|
|||
"description": "Accurately fingerprint and detect vulnerable (and patched!) versions of Netscaler \/ Citrix ADC to CVE-2023-3519",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-20T16:05:07Z",
|
||||
"updated_at": "2023-07-29T01:54:37Z",
|
||||
"updated_at": "2023-07-30T03:31:57Z",
|
||||
"pushed_at": "2023-07-23T03:54:44Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -64,7 +64,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 39,
|
||||
"watchers": 40,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -73,10 +73,10 @@
|
|||
"description": "Proof of Concept for CVE-2023-38646",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-28T12:29:16Z",
|
||||
"updated_at": "2023-07-28T12:30:14Z",
|
||||
"updated_at": "2023-07-30T01:31:51Z",
|
||||
"pushed_at": "2023-07-28T12:31:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -133,10 +133,10 @@
|
|||
"description": "Metabase Pre-auth RCE (CVE-2023-38646)!!",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-29T13:07:00Z",
|
||||
"updated_at": "2023-07-29T16:46:28Z",
|
||||
"updated_at": "2023-07-30T01:33:04Z",
|
||||
"pushed_at": "2023-07-29T14:02:24Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -150,7 +150,37 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 672405863,
|
||||
"name": "CVE-2023-38646",
|
||||
"full_name": "Chocapikk\/CVE-2023-38646",
|
||||
"owner": {
|
||||
"login": "Chocapikk",
|
||||
"id": 88535377,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
|
||||
"html_url": "https:\/\/github.com\/Chocapikk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2023-38646",
|
||||
"description": "Remote Code Execution on Metabase CVE-2023-38646",
|
||||
"fork": false,
|
||||
"created_at": "2023-07-30T01:12:24Z",
|
||||
"updated_at": "2023-07-30T01:12:56Z",
|
||||
"pushed_at": "2023-07-30T01:12:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
24
README.md
24
README.md
|
@ -2522,6 +2522,7 @@
|
|||
- [Zenmovie/CVE-2023-38646](https://github.com/Zenmovie/CVE-2023-38646)
|
||||
- [hheeyywweellccoommee/CVE-2023-38646-suynl](https://github.com/hheeyywweellccoommee/CVE-2023-38646-suynl)
|
||||
- [0xrobiul/CVE-2023-38646](https://github.com/0xrobiul/CVE-2023-38646)
|
||||
- [Chocapikk/CVE-2023-38646](https://github.com/Chocapikk/CVE-2023-38646)
|
||||
|
||||
### CVE-2023-39144
|
||||
- [cduram/CVE-2023-39144](https://github.com/cduram/CVE-2023-39144)
|
||||
|
@ -10518,13 +10519,6 @@
|
|||
- [hnthuan1998/CVE-2021-24160](https://github.com/hnthuan1998/CVE-2021-24160)
|
||||
- [hnthuan1998/Exploit-CVE-2021-24160](https://github.com/hnthuan1998/Exploit-CVE-2021-24160)
|
||||
|
||||
### CVE-2021-24307 (2021-05-24)
|
||||
|
||||
<code>The All in One SEO – Best WordPress SEO Plugin – Easily Improve Your SEO Rankings before 4.1.0.2 enables authenticated users with "aioseo_tools_settings" privilege (most of the time admin) to execute arbitrary code on the underlying host. Users can restore plugin's configuration by uploading a backup .ini file in the section "Tool > Import/Export". However, the plugin attempts to unserialize values of the .ini file. Moreover, the plugin embeds Monolog library which can be used to craft a gadget chain and thus trigger system command execution.
|
||||
</code>
|
||||
|
||||
- [darkpills/CVE-2021-24307-all-in-one-seo-pack-admin-rce](https://github.com/darkpills/CVE-2021-24307-all-in-one-seo-pack-admin-rce)
|
||||
|
||||
### CVE-2021-24347 (2021-06-14)
|
||||
|
||||
<code>The SP Project & Document Manager WordPress plugin before 4.22 allows users to upload files, however, the plugin attempts to prevent php and other similar files that could be executed on the server from being uploaded by checking the file extension. It was discovered that php files could still be uploaded by changing the file extension's case, for example, from "php" to "pHP".
|
||||
|
@ -11238,9 +11232,6 @@
|
|||
|
||||
- [lntrx/CVE-2021-28663](https://github.com/lntrx/CVE-2021-28663)
|
||||
|
||||
### CVE-2021-28750
|
||||
- [PfalzPrince/CVE-2021-28750-site](https://github.com/PfalzPrince/CVE-2021-28750-site)
|
||||
|
||||
### CVE-2021-29003 (2021-04-13)
|
||||
|
||||
<code>Genexis PLATINUM 4410 2.1 P4410-V2-1.28 devices allow remote attackers to execute arbitrary code via shell metacharacters to sys_config_valid.xgi, as demonstrated by the sys_config_valid.xgi?exeshell=%60telnetd%20%26%60 URI.
|
||||
|
@ -11477,13 +11468,6 @@
|
|||
- [jsherman212/iomfb-exploit](https://github.com/jsherman212/iomfb-exploit)
|
||||
- [30440r/gex](https://github.com/30440r/gex)
|
||||
|
||||
### CVE-2021-30853 (2021-08-24)
|
||||
|
||||
<code>This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.6. A malicious application may bypass Gatekeeper checks.
|
||||
</code>
|
||||
|
||||
- [shubham0d/CVE-2021-30853](https://github.com/shubham0d/CVE-2021-30853)
|
||||
|
||||
### CVE-2021-30858 (2021-08-24)
|
||||
|
||||
<code>A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
|
||||
|
@ -13904,7 +13888,6 @@
|
|||
<code>Gerapy is a distributed crawler management framework. Gerapy prior to version 0.9.8 is vulnerable to remote code execution, and this issue is patched in version 0.9.8.
|
||||
</code>
|
||||
|
||||
- [LongWayHomie/CVE-2021-43857](https://github.com/LongWayHomie/CVE-2021-43857)
|
||||
- [lowkey0808/CVE-2021-43857](https://github.com/lowkey0808/CVE-2021-43857)
|
||||
|
||||
### CVE-2021-43858 (2021-12-27)
|
||||
|
@ -13912,7 +13895,6 @@
|
|||
<code>MinIO is a Kubernetes native application for cloud storage. Prior to version `RELEASE.2021-12-27T07-23-18Z`, a malicious client can hand-craft an HTTP API call that allows for updating policy for a user and gaining higher privileges. The patch in version `RELEASE.2021-12-27T07-23-18Z` changes the accepted request body type and removes the ability to apply policy changes through this API. There is a workaround for this vulnerability: Changing passwords can be disabled by adding an explicit `Deny` rule to disable the API for users.
|
||||
</code>
|
||||
|
||||
- [0rx1/cve-2021-43858](https://github.com/0rx1/cve-2021-43858)
|
||||
- [khuntor/CVE-2021-43858-MinIO](https://github.com/khuntor/CVE-2021-43858-MinIO)
|
||||
|
||||
### CVE-2021-43883 (2021-12-15)
|
||||
|
@ -14340,8 +14322,6 @@
|
|||
- [PoneyClairDeLune/LogJackFix](https://github.com/PoneyClairDeLune/LogJackFix)
|
||||
- [MarceloLeite2604/log4j-vulnerability](https://github.com/MarceloLeite2604/log4j-vulnerability)
|
||||
- [romanutti/log4shell-vulnerable-app](https://github.com/romanutti/log4shell-vulnerable-app)
|
||||
- [marklindsey11/-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.](https://github.com/marklindsey11/-CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CVE-2021-44228-https-nvd.)
|
||||
- [marklindsey11/gh-repo-clone-marklindsey11--CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CV](https://github.com/marklindsey11/gh-repo-clone-marklindsey11--CVE-2021-44228_scanner-Applications-that-are-vulnerable-to-the-log4j-CV)
|
||||
- [mklinkj/log4j2-test](https://github.com/mklinkj/log4j2-test)
|
||||
- [4jfinder/4jfinder.github.io](https://github.com/4jfinder/4jfinder.github.io)
|
||||
- [alexpena5635/CVE-2021-44228_scanner-main-Modified-](https://github.com/alexpena5635/CVE-2021-44228_scanner-main-Modified-)
|
||||
|
@ -14355,7 +14335,6 @@
|
|||
- [maximofernandezriera/CVE-2021-44228](https://github.com/maximofernandezriera/CVE-2021-44228)
|
||||
- [jxerome/log4shell](https://github.com/jxerome/log4shell)
|
||||
- [solitarysp/Log4j-CVE-2021-44228](https://github.com/solitarysp/Log4j-CVE-2021-44228)
|
||||
- [atlassion/log4j-exploit-builder](https://github.com/atlassion/log4j-exploit-builder)
|
||||
- [atlassion/RS4LOGJ-CVE-2021-44228](https://github.com/atlassion/RS4LOGJ-CVE-2021-44228)
|
||||
- [sdogancesur/log4j_github_repository](https://github.com/sdogancesur/log4j_github_repository)
|
||||
- [jrocia/Search-log4Jvuln-AppScanSTD](https://github.com/jrocia/Search-log4Jvuln-AppScanSTD)
|
||||
|
@ -14592,7 +14571,6 @@
|
|||
- [jxpsx/CVE-2021-45232-RCE](https://github.com/jxpsx/CVE-2021-45232-RCE)
|
||||
- [wuppp/cve-2021-45232-exp](https://github.com/wuppp/cve-2021-45232-exp)
|
||||
- [dskho/CVE-2021-45232](https://github.com/dskho/CVE-2021-45232)
|
||||
- [itxfahdi/-cve-2021-45232](https://github.com/itxfahdi/-cve-2021-45232)
|
||||
- [GYLQ/CVE-2021-45232-RCE](https://github.com/GYLQ/CVE-2021-45232-RCE)
|
||||
- [Kuibagit/CVE-2021-45232-RCE](https://github.com/Kuibagit/CVE-2021-45232-RCE)
|
||||
- [yggcwhat/Demo](https://github.com/yggcwhat/Demo)
|
||||
|
|
Loading…
Add table
Reference in a new issue