mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2021/05/17 06:11:26
This commit is contained in:
parent
623e5a4bd0
commit
ec8cbeb5ef
17 changed files with 135 additions and 54 deletions
|
@ -182,5 +182,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 367962536,
|
||||
"name": "ProFTPD_CVE-2015-3306",
|
||||
"full_name": "m4udSec\/ProFTPD_CVE-2015-3306",
|
||||
"owner": {
|
||||
"login": "m4udSec",
|
||||
"id": 56730389,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56730389?v=4",
|
||||
"html_url": "https:\/\/github.com\/m4udSec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/m4udSec\/ProFTPD_CVE-2015-3306",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-05-16T18:57:14Z",
|
||||
"updated_at": "2021-05-16T19:15:14Z",
|
||||
"pushed_at": "2021-05-16T19:15:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-10-22T15:00:48Z",
|
||||
"updated_at": "2021-03-17T03:29:59Z",
|
||||
"updated_at": "2021-05-16T20:12:07Z",
|
||||
"pushed_at": "2019-10-22T15:03:34Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -450,13 +450,13 @@
|
|||
"description": "CVE-2020-0601 #curveball - Alternative Key Calculator",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-20T16:24:20Z",
|
||||
"updated_at": "2021-01-09T15:45:54Z",
|
||||
"updated_at": "2021-05-16T20:46:56Z",
|
||||
"pushed_at": "2020-01-20T23:00:14Z",
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 64,
|
||||
"watchers": 65,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1324,13 +1324,13 @@
|
|||
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-10T16:44:39Z",
|
||||
"updated_at": "2021-05-15T11:38:46Z",
|
||||
"updated_at": "2021-05-16T18:18:06Z",
|
||||
"pushed_at": "2021-01-15T19:21:25Z",
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 110,
|
||||
"watchers": 111,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,8 +36,8 @@
|
|||
"description": "Python script to exploit CVE-2020-14321 - Course enrolments allowed privilege escalation from teacher role into manager role to RCE.",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-28T19:46:55Z",
|
||||
"updated_at": "2021-05-03T06:59:41Z",
|
||||
"pushed_at": "2021-04-28T19:51:52Z",
|
||||
"updated_at": "2021-05-16T15:58:52Z",
|
||||
"pushed_at": "2021-05-16T15:58:50Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -312,13 +312,13 @@
|
|||
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-22T16:16:20Z",
|
||||
"updated_at": "2021-05-16T14:47:53Z",
|
||||
"updated_at": "2021-05-16T20:41:30Z",
|
||||
"pushed_at": "2020-03-09T14:51:43Z",
|
||||
"stargazers_count": 190,
|
||||
"watchers_count": 190,
|
||||
"forks_count": 70,
|
||||
"forks": 70,
|
||||
"watchers": 190,
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"forks_count": 71,
|
||||
"forks": 71,
|
||||
"watchers": 191,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-03-11T03:54:34Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2020-07-06T17:47:17Z",
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 71,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2021-1732 Microsoft Windows 10 本地提权漏 研究及Poc\/Exploit开发",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-08T05:07:15Z",
|
||||
"updated_at": "2021-05-12T13:59:44Z",
|
||||
"updated_at": "2021-05-16T20:38:04Z",
|
||||
"pushed_at": "2021-03-08T11:41:19Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit to SYSTEM for CVE-2021-21551",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-13T13:23:38Z",
|
||||
"updated_at": "2021-05-16T10:20:04Z",
|
||||
"updated_at": "2021-05-16T19:17:00Z",
|
||||
"pushed_at": "2021-05-13T15:22:07Z",
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 119,
|
||||
"stargazers_count": 128,
|
||||
"watchers_count": 128,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 128,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -358,13 +358,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-09T16:54:39Z",
|
||||
"updated_at": "2021-05-14T17:16:04Z",
|
||||
"updated_at": "2021-05-16T20:39:32Z",
|
||||
"pushed_at": "2021-03-09T16:56:09Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"forks_count": 60,
|
||||
"forks": 60,
|
||||
"watchers": 79,
|
||||
"watchers": 80,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,36 @@
|
|||
"description": "RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-16T01:40:47Z",
|
||||
"updated_at": "2021-05-16T14:55:16Z",
|
||||
"updated_at": "2021-05-16T19:50:53Z",
|
||||
"pushed_at": "2021-05-16T05:54:07Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 367973600,
|
||||
"name": "CVE-2021-27651",
|
||||
"full_name": "Vulnmachines\/CVE-2021-27651",
|
||||
"owner": {
|
||||
"login": "Vulnmachines",
|
||||
"id": 79006904,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
|
||||
"html_url": "https:\/\/github.com\/Vulnmachines"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Vulnmachines\/CVE-2021-27651",
|
||||
"description": "Pega Infinity Password Reset",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-16T19:58:31Z",
|
||||
"updated_at": "2021-05-16T20:00:08Z",
|
||||
"pushed_at": "2021-05-16T20:00:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,8 +36,8 @@
|
|||
"description": "VOIP RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-07T09:22:01Z",
|
||||
"updated_at": "2021-05-07T13:24:21Z",
|
||||
"pushed_at": "2021-05-07T09:23:38Z",
|
||||
"updated_at": "2021-05-16T20:01:34Z",
|
||||
"pushed_at": "2021-05-16T20:01:31Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
|
|
25
2021/CVE-2021-31166.json
Normal file
25
2021/CVE-2021-31166.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 367930039,
|
||||
"name": "CVE-2021-31166",
|
||||
"full_name": "0vercl0k\/CVE-2021-31166",
|
||||
"owner": {
|
||||
"login": "0vercl0k",
|
||||
"id": 1476421,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1476421?v=4",
|
||||
"html_url": "https:\/\/github.com\/0vercl0k"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0vercl0k\/CVE-2021-31166",
|
||||
"description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-16T16:15:56Z",
|
||||
"updated_at": "2021-05-16T21:09:45Z",
|
||||
"pushed_at": "2021-05-16T20:48:28Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -381,13 +381,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2021-05-16T12:11:15Z",
|
||||
"updated_at": "2021-05-16T20:41:07Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 714,
|
||||
"watchers_count": 714,
|
||||
"stargazers_count": 715,
|
||||
"watchers_count": 715,
|
||||
"forks_count": 199,
|
||||
"forks": 199,
|
||||
"watchers": 714,
|
||||
"watchers": 715,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -864,8 +864,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-09T18:53:14Z",
|
||||
"updated_at": "2021-04-30T13:20:15Z",
|
||||
"pushed_at": "2021-04-30T13:20:13Z",
|
||||
"updated_at": "2021-05-16T21:16:46Z",
|
||||
"pushed_at": "2021-05-16T21:16:44Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A Python program implementing and exploiting the Minsky Turing machine considered in the paper \"Intrinsic Propensity for Vulnerability in Computers? Arbitrary Code Execution in the Universal Turing Machine\" as per CVE-2021-32471 (https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-32471)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-21T10:39:42Z",
|
||||
"updated_at": "2021-05-16T11:13:32Z",
|
||||
"updated_at": "2021-05-16T15:39:00Z",
|
||||
"pushed_at": "2021-05-15T09:09:15Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 35,
|
||||
"watchers": 36,
|
||||
"score": 0
|
||||
}
|
||||
]
|
10
README.md
10
README.md
|
@ -943,6 +943,7 @@ In versions 8.2.1 through 8.5.2 of Pega Infinity, the password reset functionali
|
|||
</code>
|
||||
|
||||
- [samwcyo/CVE-2021-27651-PoC](https://github.com/samwcyo/CVE-2021-27651-PoC)
|
||||
- [Vulnmachines/CVE-2021-27651](https://github.com/Vulnmachines/CVE-2021-27651)
|
||||
|
||||
### CVE-2021-27890 (2021-03-15)
|
||||
|
||||
|
@ -1260,6 +1261,14 @@ An input validation flaw in the Symantec Security Analytics web UI 7.2 prior 7.2
|
|||
|
||||
- [JamesGeee/CVE-2021-30642](https://github.com/JamesGeee/CVE-2021-30642)
|
||||
|
||||
### CVE-2021-31166 (2021-05-11)
|
||||
|
||||
<code>
|
||||
HTTP Protocol Stack Remote Code Execution Vulnerability
|
||||
</code>
|
||||
|
||||
- [0vercl0k/CVE-2021-31166](https://github.com/0vercl0k/CVE-2021-31166)
|
||||
|
||||
### CVE-2021-31184 (2021-05-11)
|
||||
|
||||
<code>
|
||||
|
@ -16470,6 +16479,7 @@ The mod_copy module in ProFTPD 1.3.5 allows remote attackers to read and write t
|
|||
- [hackarada/cve-2015-3306](https://github.com/hackarada/cve-2015-3306)
|
||||
- [cdedmondson/Modified-CVE-2015-3306-Exploit](https://github.com/cdedmondson/Modified-CVE-2015-3306-Exploit)
|
||||
- [cd6629/CVE-2015-3306-Python-PoC](https://github.com/cd6629/CVE-2015-3306-Python-PoC)
|
||||
- [m4udSec/ProFTPD_CVE-2015-3306](https://github.com/m4udSec/ProFTPD_CVE-2015-3306)
|
||||
|
||||
### CVE-2015-3337 (2015-05-01)
|
||||
|
||||
|
|
Loading…
Reference in a new issue