mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2021/04/03 00:10:47
This commit is contained in:
parent
2db849cd26
commit
f046b8cac5
21 changed files with 100 additions and 109 deletions
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 252219186,
|
||||
"name": "CVE-1999-0016-Land-DOS-tool",
|
||||
"full_name": "pexmee\/CVE-1999-0016-Land-DOS-tool",
|
||||
"owner": {
|
||||
"login": "pexmee",
|
||||
"id": 60260590,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60260590?v=4",
|
||||
"html_url": "https:\/\/github.com\/pexmee"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pexmee\/CVE-1999-0016-Land-DOS-tool",
|
||||
"description": "A simple dos-tool ",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T15:47:31Z",
|
||||
"updated_at": "2021-04-02T10:43:29Z",
|
||||
"pushed_at": "2021-04-02T10:41:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 353825444,
|
||||
"name": "CVE-1999-0016-POC",
|
||||
|
@ -13,8 +36,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-04-01T21:00:13Z",
|
||||
"updated_at": "2021-04-01T21:01:22Z",
|
||||
"pushed_at": "2021-04-01T21:01:20Z",
|
||||
"updated_at": "2021-04-02T09:59:32Z",
|
||||
"pushed_at": "2021-04-02T09:59:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -914,8 +914,8 @@
|
|||
"pushed_at": "2017-10-30T22:46:11Z",
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 102,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-03-12T16:50:20Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 57,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-13T16:34:03Z",
|
||||
"updated_at": "2021-03-27T12:50:21Z",
|
||||
"updated_at": "2021-04-02T12:46:14Z",
|
||||
"pushed_at": "2019-11-14T14:16:54Z",
|
||||
"stargazers_count": 272,
|
||||
"watchers_count": 272,
|
||||
"stargazers_count": 271,
|
||||
"watchers_count": 271,
|
||||
"forks_count": 65,
|
||||
"forks": 65,
|
||||
"watchers": 272,
|
||||
"watchers": 271,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-04-02T09:04:43Z",
|
||||
"updated_at": "2021-04-02T15:12:10Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2456,
|
||||
"watchers_count": 2456,
|
||||
"stargazers_count": 2457,
|
||||
"watchers_count": 2457,
|
||||
"forks_count": 707,
|
||||
"forks": 707,
|
||||
"watchers": 2456,
|
||||
"watchers": 2457,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 216395601,
|
||||
"name": "ClonOS-WEB-control-panel-multi-vulnerability",
|
||||
"full_name": "Andhrimnirr\/ClonOS-WEB-control-panel-multi-vulnerability",
|
||||
"owner": {
|
||||
"login": "Andhrimnirr",
|
||||
"id": 38662689,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38662689?v=4",
|
||||
"html_url": "https:\/\/github.com\/Andhrimnirr"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Andhrimnirr\/ClonOS-WEB-control-panel-multi-vulnerability",
|
||||
"description": "CVE-2019-18418\/18419",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-20T16:55:00Z",
|
||||
"updated_at": "2020-10-23T15:51:28Z",
|
||||
"pushed_at": "2019-10-20T19:18:53Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC for CVE-2019-5736",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-13T05:26:32Z",
|
||||
"updated_at": "2021-03-31T00:48:39Z",
|
||||
"updated_at": "2021-04-02T09:23:00Z",
|
||||
"pushed_at": "2019-02-19T11:45:13Z",
|
||||
"stargazers_count": 488,
|
||||
"watchers_count": 488,
|
||||
"stargazers_count": 489,
|
||||
"watchers_count": 489,
|
||||
"forks_count": 119,
|
||||
"forks": 119,
|
||||
"watchers": 488,
|
||||
"watchers": 489,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-03-27T16:07:14Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 55,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-04-02T09:04:43Z",
|
||||
"updated_at": "2021-04-02T15:12:10Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2456,
|
||||
"watchers_count": 2456,
|
||||
"stargazers_count": 2457,
|
||||
"watchers_count": 2457,
|
||||
"forks_count": 707,
|
||||
"forks": 707,
|
||||
"watchers": 2456,
|
||||
"watchers": 2457,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-07T18:58:09Z",
|
||||
"updated_at": "2021-02-01T04:39:26Z",
|
||||
"updated_at": "2021-04-02T12:05:46Z",
|
||||
"pushed_at": "2020-03-09T05:25:05Z",
|
||||
"stargazers_count": 143,
|
||||
"watchers_count": 143,
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"forks_count": 47,
|
||||
"forks": 47,
|
||||
"watchers": 143,
|
||||
"watchers": 144,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2020-5902 BIG-IP",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-05T16:38:32Z",
|
||||
"updated_at": "2021-04-01T16:09:24Z",
|
||||
"updated_at": "2021-04-02T12:41:00Z",
|
||||
"pushed_at": "2020-07-15T02:52:33Z",
|
||||
"stargazers_count": 342,
|
||||
"watchers_count": 342,
|
||||
"stargazers_count": 343,
|
||||
"watchers_count": 343,
|
||||
"forks_count": 108,
|
||||
"forks": 108,
|
||||
"watchers": 342,
|
||||
"watchers": 343,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Proof of Concept Exploit for vCenter CVE-2021-21972",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T16:31:34Z",
|
||||
"updated_at": "2021-04-02T07:01:29Z",
|
||||
"updated_at": "2021-04-02T10:48:48Z",
|
||||
"pushed_at": "2021-02-25T16:05:02Z",
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 103,
|
||||
"watchers": 104,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Nmap script to check vulnerability CVE-2021-21975",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-01T21:59:05Z",
|
||||
"updated_at": "2021-04-02T07:04:19Z",
|
||||
"updated_at": "2021-04-02T10:51:05Z",
|
||||
"pushed_at": "2021-04-02T00:32:15Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -132,8 +132,8 @@
|
|||
"pushed_at": "2021-03-24T12:10:24Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "POC for CVE-2021-24098",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-01T07:29:44Z",
|
||||
"updated_at": "2021-04-01T17:02:00Z",
|
||||
"updated_at": "2021-04-02T11:30:27Z",
|
||||
"pushed_at": "2021-04-01T07:34:23Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Chaining CVE-2021-25281 and CVE-2021-25282 to exploit a SaltStack",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-26T12:08:25Z",
|
||||
"updated_at": "2021-03-15T06:50:49Z",
|
||||
"updated_at": "2021-04-02T11:22:44Z",
|
||||
"pushed_at": "2021-03-06T12:50:35Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 21,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-31T16:30:02Z",
|
||||
"updated_at": "2021-04-01T19:41:08Z",
|
||||
"updated_at": "2021-04-02T12:11:00Z",
|
||||
"pushed_at": "2021-03-29T12:33:38Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 45,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-13T12:52:20Z",
|
||||
"updated_at": "2021-03-30T13:22:48Z",
|
||||
"updated_at": "2021-04-02T10:32:38Z",
|
||||
"pushed_at": "2021-01-29T13:59:07Z",
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 93,
|
||||
"watchers": 94,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "Laravel debug rce",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-22T05:12:21Z",
|
||||
"updated_at": "2021-04-01T03:08:12Z",
|
||||
"updated_at": "2021-04-02T11:46:54Z",
|
||||
"pushed_at": "2021-01-24T05:28:07Z",
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 77,
|
||||
"watchers": 78,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -335,13 +335,13 @@
|
|||
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T03:22:04Z",
|
||||
"updated_at": "2021-04-01T06:21:12Z",
|
||||
"updated_at": "2021-04-02T13:51:05Z",
|
||||
"pushed_at": "2021-02-08T03:42:50Z",
|
||||
"stargazers_count": 378,
|
||||
"watchers_count": 378,
|
||||
"forks_count": 101,
|
||||
"forks": 101,
|
||||
"watchers": 378,
|
||||
"stargazers_count": 377,
|
||||
"watchers_count": 377,
|
||||
"forks_count": 102,
|
||||
"forks": 102,
|
||||
"watchers": 377,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -887,13 +887,13 @@
|
|||
"description": "Sudo Baron Samedit Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-15T17:37:02Z",
|
||||
"updated_at": "2021-04-01T12:42:37Z",
|
||||
"updated_at": "2021-04-02T09:31:09Z",
|
||||
"pushed_at": "2021-03-30T14:44:38Z",
|
||||
"stargazers_count": 246,
|
||||
"watchers_count": 246,
|
||||
"stargazers_count": 247,
|
||||
"watchers_count": 247,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 246,
|
||||
"watchers": 247,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-26T01:09:25Z",
|
||||
"updated_at": "2021-04-02T07:40:04Z",
|
||||
"updated_at": "2021-04-02T15:00:35Z",
|
||||
"pushed_at": "2021-03-31T12:00:09Z",
|
||||
"stargazers_count": 157,
|
||||
"watchers_count": 157,
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 157,
|
||||
"watchers": 158,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -7968,14 +7968,6 @@ An issue was discovered on Xiaomi Mi WiFi R3G devices before 2.28.23-stable. The
|
|||
|
||||
- [UltramanGaia/Xiaomi_Mi_WiFi_R3G_Vulnerability_POC](https://github.com/UltramanGaia/Xiaomi_Mi_WiFi_R3G_Vulnerability_POC)
|
||||
|
||||
### CVE-2019-18418 (2019-10-24)
|
||||
|
||||
<code>
|
||||
clonos.php in ClonOS WEB control panel 19.09 allows remote attackers to gain full access via change password requests because there is no session management.
|
||||
</code>
|
||||
|
||||
- [Andhrimnirr/ClonOS-WEB-control-panel-multi-vulnerability](https://github.com/Andhrimnirr/ClonOS-WEB-control-panel-multi-vulnerability)
|
||||
|
||||
### CVE-2019-18426 (2020-01-21)
|
||||
|
||||
<code>
|
||||
|
@ -18183,6 +18175,7 @@ File and Print Sharing service in Windows 95, Windows 98, and Windows Me does no
|
|||
Land IP denial of service.
|
||||
</code>
|
||||
|
||||
- [pexmee/CVE-1999-0016-Land-DOS-tool](https://github.com/pexmee/CVE-1999-0016-Land-DOS-tool)
|
||||
- [Pommaq/CVE-1999-0016-POC](https://github.com/Pommaq/CVE-1999-0016-POC)
|
||||
|
||||
### CVE-1999-0532
|
||||
|
|
Loading…
Reference in a new issue