mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/06/30 12:11:19
This commit is contained in:
parent
9cd2db1074
commit
e2d3400b0c
22 changed files with 116 additions and 125 deletions
|
@ -320,5 +320,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 381528580,
|
||||
"name": "CVE-2007-2447",
|
||||
"full_name": "Alien0ne\/CVE-2007-2447",
|
||||
"owner": {
|
||||
"login": "Alien0ne",
|
||||
"id": 73351962,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73351962?v=4",
|
||||
"html_url": "https:\/\/github.com\/Alien0ne"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Alien0ne\/CVE-2007-2447",
|
||||
"description": "CVE-2007-2447 - Samba usermap script",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-30T00:13:31Z",
|
||||
"updated_at": "2021-06-30T00:13:36Z",
|
||||
"pushed_at": "2021-06-30T00:13:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-08T15:52:50Z",
|
||||
"updated_at": "2021-06-23T08:24:54Z",
|
||||
"updated_at": "2021-06-29T22:55:53Z",
|
||||
"pushed_at": "2018-11-23T11:47:10Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 40,
|
||||
"watchers": 41,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2018-13382",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-11T11:13:44Z",
|
||||
"updated_at": "2021-03-23T00:51:41Z",
|
||||
"updated_at": "2021-06-30T02:05:50Z",
|
||||
"pushed_at": "2019-08-13T15:06:28Z",
|
||||
"stargazers_count": 133,
|
||||
"watchers_count": 133,
|
||||
"stargazers_count": 134,
|
||||
"watchers_count": 134,
|
||||
"forks_count": 56,
|
||||
"forks": 56,
|
||||
"watchers": 133,
|
||||
"watchers": 134,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2037,13 +2037,13 @@
|
|||
"description": "CVE-2019-0708 POC RCE 远程代码执行getshell教程",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-07T05:15:23Z",
|
||||
"updated_at": "2021-06-24T11:28:27Z",
|
||||
"updated_at": "2021-06-30T01:53:33Z",
|
||||
"pushed_at": "2019-09-20T04:53:41Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 41,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -140,14 +140,14 @@
|
|||
{
|
||||
"id": 206647936,
|
||||
"name": "exim.exp",
|
||||
"full_name": "ChrissHack\/exim.exp",
|
||||
"full_name": "Chris-dev1\/exim.exp",
|
||||
"owner": {
|
||||
"login": "ChrissHack",
|
||||
"login": "Chris-dev1",
|
||||
"id": 36897897,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36897897?v=4",
|
||||
"html_url": "https:\/\/github.com\/ChrissHack"
|
||||
"html_url": "https:\/\/github.com\/Chris-dev1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ChrissHack\/exim.exp",
|
||||
"html_url": "https:\/\/github.com\/Chris-dev1\/exim.exp",
|
||||
"description": "CVE-2019-10149",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-05T20:04:14Z",
|
||||
|
|
|
@ -220,13 +220,13 @@
|
|||
"description": "CVE-2019-2725命令回显+webshell上传+最新绕过",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-10T05:12:44Z",
|
||||
"updated_at": "2021-06-21T03:39:31Z",
|
||||
"updated_at": "2021-06-30T01:30:53Z",
|
||||
"pushed_at": "2019-06-21T03:33:05Z",
|
||||
"stargazers_count": 149,
|
||||
"watchers_count": 149,
|
||||
"stargazers_count": 150,
|
||||
"watchers_count": 150,
|
||||
"forks_count": 61,
|
||||
"forks": 61,
|
||||
"watchers": 149,
|
||||
"watchers": 150,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2019-02-21T22:49:53Z",
|
||||
"updated_at": "2021-05-18T03:24:05Z",
|
||||
"pushed_at": "2021-04-27T03:35:44Z",
|
||||
"pushed_at": "2021-06-30T01:26:36Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 8,
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "Identifying and Mitigating the CVE-2020–0796 flaw in the fly",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T18:42:32Z",
|
||||
"updated_at": "2021-05-13T18:37:26Z",
|
||||
"updated_at": "2021-06-30T02:43:06Z",
|
||||
"pushed_at": "2020-03-12T10:19:35Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -979,13 +979,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T01:46:08Z",
|
||||
"updated_at": "2021-06-02T13:33:38Z",
|
||||
"updated_at": "2021-06-30T02:41:39Z",
|
||||
"pushed_at": "2020-04-01T01:46:17Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 46,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1117,13 +1117,13 @@
|
|||
"description": "CVE-2020-0796 Remote Code Execution POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-20T14:35:48Z",
|
||||
"updated_at": "2021-06-22T13:10:16Z",
|
||||
"updated_at": "2021-06-30T02:41:55Z",
|
||||
"pushed_at": "2020-06-09T20:46:45Z",
|
||||
"stargazers_count": 394,
|
||||
"watchers_count": 394,
|
||||
"stargazers_count": 395,
|
||||
"watchers_count": 395,
|
||||
"forks_count": 129,
|
||||
"forks": 129,
|
||||
"watchers": 394,
|
||||
"watchers": 395,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-29T15:56:50Z",
|
||||
"updated_at": "2021-05-28T02:04:08Z",
|
||||
"updated_at": "2021-06-30T02:43:07Z",
|
||||
"pushed_at": "2020-07-30T07:48:40Z",
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 111,
|
||||
"watchers": 112,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"description": "poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-12T10:05:36Z",
|
||||
"updated_at": "2021-06-29T16:37:16Z",
|
||||
"updated_at": "2021-06-30T00:27:16Z",
|
||||
"pushed_at": "2020-08-13T07:16:12Z",
|
||||
"stargazers_count": 154,
|
||||
"watchers_count": 154,
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"forks_count": 43,
|
||||
"forks": 43,
|
||||
"watchers": 154,
|
||||
"watchers": 155,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "How to exploit a vulnerable windows driver. Exploit for AsrDrv104.sys",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T04:38:24Z",
|
||||
"updated_at": "2021-06-29T20:56:24Z",
|
||||
"pushed_at": "2021-06-29T14:10:52Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 41,
|
||||
"updated_at": "2021-06-30T03:13:57Z",
|
||||
"pushed_at": "2021-06-30T01:52:59Z",
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 72,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-15T14:32:25Z",
|
||||
"updated_at": "2021-06-22T09:37:37Z",
|
||||
"updated_at": "2021-06-30T01:53:19Z",
|
||||
"pushed_at": "2020-10-20T20:09:58Z",
|
||||
"stargazers_count": 122,
|
||||
"watchers_count": 122,
|
||||
"stargazers_count": 123,
|
||||
"watchers_count": 123,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 122,
|
||||
"watchers": 123,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Impacket implementation of CVE-2021-1675",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2021-06-29T21:13:55Z",
|
||||
"pushed_at": "2021-06-29T19:51:24Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 47,
|
||||
"updated_at": "2021-06-30T03:15:47Z",
|
||||
"pushed_at": "2021-06-29T21:44:20Z",
|
||||
"stargazers_count": 151,
|
||||
"watchers_count": 151,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"watchers": 151,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-1732 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-05T02:11:10Z",
|
||||
"updated_at": "2021-06-28T15:50:29Z",
|
||||
"updated_at": "2021-06-30T02:53:41Z",
|
||||
"pushed_at": "2021-03-05T03:10:26Z",
|
||||
"stargazers_count": 311,
|
||||
"watchers_count": 311,
|
||||
"stargazers_count": 312,
|
||||
"watchers_count": 312,
|
||||
"forks_count": 78,
|
||||
"forks": 78,
|
||||
"watchers": 311,
|
||||
"watchers": 312,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "CVE-2021-21985 VMware vCenter Server远程代码执行漏洞 EXP (更新可回显EXP)",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-03T09:59:21Z",
|
||||
"updated_at": "2021-06-26T12:52:16Z",
|
||||
"updated_at": "2021-06-30T00:06:23Z",
|
||||
"pushed_at": "2021-06-09T10:13:56Z",
|
||||
"stargazers_count": 228,
|
||||
"watchers_count": 228,
|
||||
"stargazers_count": 229,
|
||||
"watchers_count": 229,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"watchers": 228,
|
||||
"watchers": 229,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-22192 靶场: 未授权用户 RCE 漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-27T07:09:46Z",
|
||||
"updated_at": "2021-06-24T20:02:44Z",
|
||||
"updated_at": "2021-06-30T02:23:49Z",
|
||||
"pushed_at": "2021-05-02T05:34:29Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 26,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-15T14:41:25Z",
|
||||
"updated_at": "2021-06-29T18:40:08Z",
|
||||
"updated_at": "2021-06-30T00:46:20Z",
|
||||
"pushed_at": "2021-02-15T15:11:00Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 55,
|
||||
"watchers": 57,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Apache\/Alibaba Dubbo <= 2.7.3 PoC Code for CVE-2021-25641 RCE via Deserialization of Untrusted Data; Affects Versions <= 2.7.6 With Different Gadgets",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-06T06:41:36Z",
|
||||
"updated_at": "2021-06-29T14:39:36Z",
|
||||
"updated_at": "2021-06-30T01:06:17Z",
|
||||
"pushed_at": "2021-06-06T08:41:19Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A Proof of concept for CVE-2021-27850 affecting Apache Tapestry and leading to unauthencticated remote code execution.",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-25T13:55:41Z",
|
||||
"updated_at": "2021-06-29T17:49:06Z",
|
||||
"updated_at": "2021-06-30T02:06:20Z",
|
||||
"pushed_at": "2021-06-25T14:23:45Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 29,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-09T06:55:52Z",
|
||||
"updated_at": "2021-06-29T12:55:39Z",
|
||||
"updated_at": "2021-06-30T02:28:06Z",
|
||||
"pushed_at": "2021-06-10T10:31:30Z",
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 108,
|
||||
"watchers": 109,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 380110029,
|
||||
"name": "CVE-2021-35475",
|
||||
"full_name": "saitamang\/CVE-2021-35475",
|
||||
"owner": {
|
||||
"login": "saitamang",
|
||||
"id": 41514973,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41514973?v=4",
|
||||
"html_url": "https:\/\/github.com\/saitamang"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/saitamang\/CVE-2021-35475",
|
||||
"description": "Writeup for CVE-2021-35475; Stored Cross-Site Scripting(XSS) on SAS® Environment Manager 2.5",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-25T03:08:44Z",
|
||||
"updated_at": "2021-06-29T05:39:49Z",
|
||||
"pushed_at": "2021-06-29T05:39:47Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
11
README.md
11
README.md
|
@ -1452,14 +1452,6 @@ Emote Interactive Remote Mouse 3.008 on Windows allows attackers to execute arbi
|
|||
|
||||
- [deathflash1411/CVE-2021-35448](https://github.com/deathflash1411/CVE-2021-35448)
|
||||
|
||||
### CVE-2021-35475 (2021-06-25)
|
||||
|
||||
<code>
|
||||
SAS Environment Manager 2.5 allows XSS through the Name field when creating/editing a server. The XSS will prompt when editing the Configuration Properties.
|
||||
</code>
|
||||
|
||||
- [saitamang/CVE-2021-35475](https://github.com/saitamang/CVE-2021-35475)
|
||||
|
||||
|
||||
## 2020
|
||||
### CVE-2020-0001 (2020-01-08)
|
||||
|
@ -7529,7 +7521,7 @@ A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation
|
|||
- [aishee/CVE-2019-10149-quick](https://github.com/aishee/CVE-2019-10149-quick)
|
||||
- [AzizMea/CVE-2019-10149-privilege-escalation](https://github.com/AzizMea/CVE-2019-10149-privilege-escalation)
|
||||
- [Brets0150/StickyExim](https://github.com/Brets0150/StickyExim)
|
||||
- [ChrissHack/exim.exp](https://github.com/ChrissHack/exim.exp)
|
||||
- [Chris-dev1/exim.exp](https://github.com/Chris-dev1/exim.exp)
|
||||
- [darsigovrustam/CVE-2019-10149](https://github.com/darsigovrustam/CVE-2019-10149)
|
||||
- [Diefunction/CVE-2019-10149](https://github.com/Diefunction/CVE-2019-10149)
|
||||
- [Dilshan-Eranda/CVE-2019-10149](https://github.com/Dilshan-Eranda/CVE-2019-10149)
|
||||
|
@ -19119,6 +19111,7 @@ The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote
|
|||
- [Un4gi/CVE-2007-2447](https://github.com/Un4gi/CVE-2007-2447)
|
||||
- [Ki11i0n4ir3/Sambaster](https://github.com/Ki11i0n4ir3/Sambaster)
|
||||
- [cherrera0001/CVE-2007-2447](https://github.com/cherrera0001/CVE-2007-2447)
|
||||
- [Alien0ne/CVE-2007-2447](https://github.com/Alien0ne/CVE-2007-2447)
|
||||
|
||||
### CVE-2007-3830 (2007-07-17)
|
||||
|
||||
|
|
Loading…
Reference in a new issue