mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2021/10/03 12:13:09
This commit is contained in:
parent
c25dc665d0
commit
df2702142c
12 changed files with 82 additions and 56 deletions
|
@ -142,10 +142,10 @@
|
|||
"pushed_at": "2021-03-09T09:12:55Z",
|
||||
"stargazers_count": 240,
|
||||
"watchers_count": 240,
|
||||
"forks_count": 80,
|
||||
"forks_count": 81,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 80,
|
||||
"forks": 81,
|
||||
"watchers": 240,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,15 +13,15 @@
|
|||
"description": "Rails Asset Pipeline Directory Traversal Vulnerability ",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-21T14:15:09Z",
|
||||
"updated_at": "2020-04-05T17:17:34Z",
|
||||
"updated_at": "2021-10-02T22:36:14Z",
|
||||
"pushed_at": "2019-10-21T14:22:42Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -88,15 +88,15 @@
|
|||
"description": "CVE-2019-0708-exploit",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-15T02:24:21Z",
|
||||
"updated_at": "2021-10-01T03:22:29Z",
|
||||
"updated_at": "2021-10-03T02:26:51Z",
|
||||
"pushed_at": "2019-05-15T02:26:46Z",
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 117,
|
||||
"watchers": 118,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,15 +13,15 @@
|
|||
"description": "A Proof of Concept for CVE-2019-14751",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-09T16:56:54Z",
|
||||
"updated_at": "2020-09-29T05:51:03Z",
|
||||
"updated_at": "2021-10-02T21:26:04Z",
|
||||
"pushed_at": "2019-08-20T13:02:11Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -63,8 +63,8 @@
|
|||
"description": "Exploit for CVE-2019-17662 (ThinVNC 1.0b1)",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-02T15:57:11Z",
|
||||
"updated_at": "2021-10-02T16:52:55Z",
|
||||
"pushed_at": "2021-10-02T16:21:56Z",
|
||||
"updated_at": "2021-10-02T22:36:01Z",
|
||||
"pushed_at": "2021-10-02T22:35:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -38,15 +38,15 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2021-10-02T05:40:47Z",
|
||||
"updated_at": "2021-10-03T01:07:48Z",
|
||||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1390,
|
||||
"watchers_count": 1390,
|
||||
"forks_count": 508,
|
||||
"stargazers_count": 1391,
|
||||
"watchers_count": 1391,
|
||||
"forks_count": 510,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 508,
|
||||
"watchers": 1390,
|
||||
"forks": 510,
|
||||
"watchers": 1391,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -138,15 +138,15 @@
|
|||
"description": "Local Privilege Escalation Edition for CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T09:47:13Z",
|
||||
"updated_at": "2021-09-28T07:05:09Z",
|
||||
"updated_at": "2021-10-03T01:10:40Z",
|
||||
"pushed_at": "2021-07-05T06:46:12Z",
|
||||
"stargazers_count": 298,
|
||||
"watchers_count": 298,
|
||||
"stargazers_count": 299,
|
||||
"watchers_count": 299,
|
||||
"forks_count": 72,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 72,
|
||||
"watchers": 298,
|
||||
"watchers": 299,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -238,15 +238,15 @@
|
|||
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T23:45:58Z",
|
||||
"updated_at": "2021-10-02T17:55:11Z",
|
||||
"updated_at": "2021-10-02T22:12:40Z",
|
||||
"pushed_at": "2021-07-05T08:54:06Z",
|
||||
"stargazers_count": 613,
|
||||
"watchers_count": 613,
|
||||
"stargazers_count": 614,
|
||||
"watchers_count": 614,
|
||||
"forks_count": 165,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 165,
|
||||
"watchers": 613,
|
||||
"watchers": 614,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -242,10 +242,10 @@
|
|||
"pushed_at": "2021-03-08T08:09:01Z",
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"forks_count": 74,
|
||||
"forks_count": 73,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 74,
|
||||
"forks": 73,
|
||||
"watchers": 102,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,15 +13,15 @@
|
|||
"description": "Apache Solr SSRF(CVE-2021-27905)",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-21T09:27:21Z",
|
||||
"updated_at": "2021-10-02T10:50:00Z",
|
||||
"updated_at": "2021-10-03T02:09:37Z",
|
||||
"pushed_at": "2021-04-21T10:00:59Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 55,
|
||||
"watchers": 57,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -713,15 +713,15 @@
|
|||
"description": "Root shell PoC for CVE-2021-3156",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-03T19:57:56Z",
|
||||
"updated_at": "2021-10-01T09:06:37Z",
|
||||
"updated_at": "2021-10-03T00:56:53Z",
|
||||
"pushed_at": "2021-02-03T22:28:14Z",
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 71,
|
||||
"watchers": 72,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,10 +17,10 @@
|
|||
"pushed_at": "2021-06-06T18:30:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -213,15 +213,15 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2021-10-02T14:53:42Z",
|
||||
"updated_at": "2021-10-03T02:08:55Z",
|
||||
"pushed_at": "2021-09-11T09:50:26Z",
|
||||
"stargazers_count": 1240,
|
||||
"watchers_count": 1240,
|
||||
"forks_count": 392,
|
||||
"stargazers_count": 1243,
|
||||
"watchers_count": 1243,
|
||||
"forks_count": 393,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 392,
|
||||
"watchers": 1240,
|
||||
"forks": 393,
|
||||
"watchers": 1243,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -388,15 +388,15 @@
|
|||
"description": "This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-12T18:05:53Z",
|
||||
"updated_at": "2021-10-01T12:51:19Z",
|
||||
"updated_at": "2021-10-03T00:20:48Z",
|
||||
"pushed_at": "2021-09-15T16:34:35Z",
|
||||
"stargazers_count": 159,
|
||||
"watchers_count": 159,
|
||||
"stargazers_count": 160,
|
||||
"watchers_count": 160,
|
||||
"forks_count": 41,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 41,
|
||||
"watchers": 159,
|
||||
"watchers": 160,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -513,15 +513,15 @@
|
|||
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-15T22:34:35Z",
|
||||
"updated_at": "2021-10-01T17:55:27Z",
|
||||
"updated_at": "2021-10-03T00:04:38Z",
|
||||
"pushed_at": "2021-09-25T00:05:37Z",
|
||||
"stargazers_count": 438,
|
||||
"watchers_count": 438,
|
||||
"stargazers_count": 439,
|
||||
"watchers_count": 439,
|
||||
"forks_count": 87,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 87,
|
||||
"watchers": 438,
|
||||
"watchers": 439,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -648,5 +648,30 @@
|
|||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 412946991,
|
||||
"name": "CVE-2021-40444",
|
||||
"full_name": "H0j3n\/CVE-2021-40444",
|
||||
"owner": {
|
||||
"login": "H0j3n",
|
||||
"id": 51261763,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51261763?v=4",
|
||||
"html_url": "https:\/\/github.com\/H0j3n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/H0j3n\/CVE-2021-40444",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-03T01:13:42Z",
|
||||
"updated_at": "2021-10-03T01:34:56Z",
|
||||
"pushed_at": "2021-10-03T01:34:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -2515,6 +2515,7 @@ Microsoft MSHTML Remote Code Execution Vulnerability
|
|||
- [Edubr2020/CVE-2021-40444--CABless](https://github.com/Edubr2020/CVE-2021-40444--CABless)
|
||||
- [kal1gh0st/CVE-2021-40444_CAB_archives](https://github.com/kal1gh0st/CVE-2021-40444_CAB_archives)
|
||||
- [LazarusReborn/Docx-Exploit-2021](https://github.com/LazarusReborn/Docx-Exploit-2021)
|
||||
- [H0j3n/CVE-2021-40444](https://github.com/H0j3n/CVE-2021-40444)
|
||||
|
||||
### CVE-2021-40492 (2021-09-03)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue