mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2021/03/16 00:09:38
This commit is contained in:
parent
c3f08d39ca
commit
fb4ecfe1f2
32 changed files with 176 additions and 152 deletions
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2017-04-24T14:16:56Z",
|
||||
"stargazers_count": 288,
|
||||
"watchers_count": 288,
|
||||
"forks_count": 90,
|
||||
"forks": 90,
|
||||
"forks_count": 91,
|
||||
"forks": 91,
|
||||
"watchers": 288,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A checker (site and tool) for CVE-2014-0160",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-07T23:03:09Z",
|
||||
"updated_at": "2021-03-09T02:51:38Z",
|
||||
"updated_at": "2021-03-15T09:18:22Z",
|
||||
"pushed_at": "2021-02-24T09:17:24Z",
|
||||
"stargazers_count": 2249,
|
||||
"watchers_count": 2249,
|
||||
"stargazers_count": 2250,
|
||||
"watchers_count": 2250,
|
||||
"forks_count": 485,
|
||||
"forks": 485,
|
||||
"watchers": 2249,
|
||||
"watchers": 2250,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-03-12T17:49:15Z",
|
||||
"updated_at": "2021-03-15T14:55:25Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 949,
|
||||
"watchers_count": 949,
|
||||
"stargazers_count": 950,
|
||||
"watchers_count": 950,
|
||||
"forks_count": 222,
|
||||
"forks": 222,
|
||||
"watchers": 949,
|
||||
"watchers": 950,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-03-12T17:49:15Z",
|
||||
"updated_at": "2021-03-15T14:55:25Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 949,
|
||||
"watchers_count": 949,
|
||||
"stargazers_count": 950,
|
||||
"watchers_count": 950,
|
||||
"forks_count": 222,
|
||||
"forks": 222,
|
||||
"watchers": 949,
|
||||
"watchers": 950,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2018-07-13T18:56:53Z",
|
||||
"stargazers_count": 130,
|
||||
"watchers_count": 130,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"forks_count": 50,
|
||||
"forks": 50,
|
||||
"watchers": 130,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-03-12T17:49:15Z",
|
||||
"updated_at": "2021-03-15T14:55:25Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 949,
|
||||
"watchers_count": 949,
|
||||
"stargazers_count": 950,
|
||||
"watchers_count": 950,
|
||||
"forks_count": 222,
|
||||
"forks": 222,
|
||||
"watchers": 949,
|
||||
"watchers": 950,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-10T03:44:04Z",
|
||||
"updated_at": "2021-03-05T02:06:40Z",
|
||||
"updated_at": "2021-03-15T14:23:27Z",
|
||||
"pushed_at": "2017-04-12T09:17:27Z",
|
||||
"stargazers_count": 173,
|
||||
"watchers_count": 173,
|
||||
"stargazers_count": 180,
|
||||
"watchers_count": 180,
|
||||
"forks_count": 81,
|
||||
"forks": 81,
|
||||
"watchers": 173,
|
||||
"watchers": 180,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Laravel-PHP-Unit-RCE (CVE-2018-15133) Auto Exploiter and Shell Uploader",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-05T04:54:40Z",
|
||||
"updated_at": "2020-10-09T15:30:18Z",
|
||||
"updated_at": "2021-03-15T12:02:26Z",
|
||||
"pushed_at": "2020-10-09T15:30:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-03-12T17:49:15Z",
|
||||
"updated_at": "2021-03-15T14:55:25Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 949,
|
||||
"watchers_count": 949,
|
||||
"stargazers_count": 950,
|
||||
"watchers_count": 950,
|
||||
"forks_count": 222,
|
||||
"forks": 222,
|
||||
"watchers": 949,
|
||||
"watchers": 950,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -270,8 +270,8 @@
|
|||
"pushed_at": "2018-04-26T15:40:28Z",
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"forks_count": 43,
|
||||
"forks": 43,
|
||||
"watchers": 82,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2018-8581",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-24T06:08:23Z",
|
||||
"updated_at": "2021-03-04T04:27:31Z",
|
||||
"updated_at": "2021-03-15T09:54:03Z",
|
||||
"pushed_at": "2019-06-21T11:29:41Z",
|
||||
"stargazers_count": 312,
|
||||
"watchers_count": 312,
|
||||
"stargazers_count": 313,
|
||||
"watchers_count": 313,
|
||||
"forks_count": 67,
|
||||
"forks": 67,
|
||||
"watchers": 312,
|
||||
"watchers": 313,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Implements the POP\/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS). ",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-10T20:46:30Z",
|
||||
"updated_at": "2021-03-15T08:19:44Z",
|
||||
"updated_at": "2021-03-15T13:20:21Z",
|
||||
"pushed_at": "2018-05-10T20:47:59Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 73,
|
||||
"watchers": 74,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "Arbitrary code execution with kernel privileges using CVE-2018-8897.",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-13T19:34:17Z",
|
||||
"updated_at": "2021-03-15T07:31:58Z",
|
||||
"updated_at": "2021-03-15T15:00:53Z",
|
||||
"pushed_at": "2018-05-18T12:26:53Z",
|
||||
"stargazers_count": 389,
|
||||
"watchers_count": 389,
|
||||
"stargazers_count": 390,
|
||||
"watchers_count": 390,
|
||||
"forks_count": 109,
|
||||
"forks": 109,
|
||||
"watchers": 389,
|
||||
"watchers": 390,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "Implements the POP\/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-08T20:04:56Z",
|
||||
"updated_at": "2021-03-15T07:42:25Z",
|
||||
"updated_at": "2021-03-15T13:20:03Z",
|
||||
"pushed_at": "2018-08-08T20:12:20Z",
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 107,
|
||||
"watchers": 108,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2019-10-18T14:49:10Z",
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"forks_count": 65,
|
||||
"forks": 65,
|
||||
"forks_count": 64,
|
||||
"forks": 64,
|
||||
"watchers": 91,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-1994、CVE-2021-2047、CVE-2021-2064、CVE-2021-2108、CVE-2021-2075、CVE-2019-17195、CVE-2020-14756、CVE-2021-2109",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-04T07:03:56Z",
|
||||
"updated_at": "2021-03-11T22:00:26Z",
|
||||
"updated_at": "2021-03-15T09:36:06Z",
|
||||
"pushed_at": "2021-02-04T07:12:29Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-03-14T10:45:14Z",
|
||||
"updated_at": "2021-03-15T15:09:26Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2393,
|
||||
"watchers_count": 2393,
|
||||
"stargazers_count": 2395,
|
||||
"watchers_count": 2395,
|
||||
"forks_count": 686,
|
||||
"forks": 686,
|
||||
"watchers": 2393,
|
||||
"watchers": 2395,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-03-12T17:49:15Z",
|
||||
"updated_at": "2021-03-15T14:55:25Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 949,
|
||||
"watchers_count": 949,
|
||||
"stargazers_count": 950,
|
||||
"watchers_count": 950,
|
||||
"forks_count": 222,
|
||||
"forks": 222,
|
||||
"watchers": 949,
|
||||
"watchers": 950,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "This repo contains a proof-of-concept for 📱🚀👑⚡, a deserialization vuln for local escalation of privilege to system_server in Android 10. This proof-of-concept only activates a privileged intent.",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-23T14:00:55Z",
|
||||
"updated_at": "2021-03-05T05:55:15Z",
|
||||
"updated_at": "2021-03-15T13:59:58Z",
|
||||
"pushed_at": "2021-02-23T14:03:00Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,8 +59,8 @@
|
|||
"description": "CVE-2020-0096-StrandHogg2 复现",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-07T10:25:25Z",
|
||||
"updated_at": "2020-11-25T07:25:14Z",
|
||||
"pushed_at": "2020-09-16T03:15:30Z",
|
||||
"updated_at": "2021-03-15T11:14:21Z",
|
||||
"pushed_at": "2021-03-15T11:14:18Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 3,
|
||||
|
|
|
@ -385,8 +385,8 @@
|
|||
"pushed_at": "2021-01-04T10:49:21Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Support ALL Windows Version",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-16T08:57:51Z",
|
||||
"updated_at": "2021-03-11T01:02:13Z",
|
||||
"updated_at": "2021-03-15T14:13:44Z",
|
||||
"pushed_at": "2020-09-11T07:38:22Z",
|
||||
"stargazers_count": 510,
|
||||
"watchers_count": 510,
|
||||
"stargazers_count": 509,
|
||||
"watchers_count": 509,
|
||||
"forks_count": 125,
|
||||
"forks": 125,
|
||||
"watchers": 510,
|
||||
"watchers": 509,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-06-25T07:49:34Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -1094,8 +1094,8 @@
|
|||
"description": "Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-20T21:38:47Z",
|
||||
"updated_at": "2021-03-14T04:51:17Z",
|
||||
"pushed_at": "2021-02-17T01:44:34Z",
|
||||
"updated_at": "2021-03-15T12:02:55Z",
|
||||
"pushed_at": "2021-03-15T12:02:53Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2021-1994、CVE-2021-2047、CVE-2021-2064、CVE-2021-2108、CVE-2021-2075、CVE-2019-17195、CVE-2020-14756、CVE-2021-2109",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-04T07:03:56Z",
|
||||
"updated_at": "2021-03-11T22:00:26Z",
|
||||
"updated_at": "2021-03-15T09:36:06Z",
|
||||
"pushed_at": "2021-02-04T07:12:29Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-03-14T10:45:14Z",
|
||||
"updated_at": "2021-03-15T15:09:26Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2393,
|
||||
"watchers_count": 2393,
|
||||
"stargazers_count": 2395,
|
||||
"watchers_count": 2395,
|
||||
"forks_count": 686,
|
||||
"forks": 686,
|
||||
"watchers": 2393,
|
||||
"watchers": 2395,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-03-12T17:49:15Z",
|
||||
"updated_at": "2021-03-15T14:55:25Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 949,
|
||||
"watchers_count": 949,
|
||||
"stargazers_count": 950,
|
||||
"watchers_count": 950,
|
||||
"forks_count": 222,
|
||||
"forks": 222,
|
||||
"watchers": 949,
|
||||
"watchers": 950,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-19T03:34:06Z",
|
||||
"updated_at": "2021-03-12T06:23:04Z",
|
||||
"updated_at": "2021-03-15T12:34:34Z",
|
||||
"pushed_at": "2020-08-25T03:17:32Z",
|
||||
"stargazers_count": 216,
|
||||
"watchers_count": 216,
|
||||
"stargazers_count": 217,
|
||||
"watchers_count": 217,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 216,
|
||||
"watchers": 217,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-02-15T04:14:12Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-1732 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-05T02:11:10Z",
|
||||
"updated_at": "2021-03-15T08:10:45Z",
|
||||
"updated_at": "2021-03-15T12:13:29Z",
|
||||
"pushed_at": "2021-03-05T03:10:26Z",
|
||||
"stargazers_count": 237,
|
||||
"watchers_count": 237,
|
||||
"stargazers_count": 238,
|
||||
"watchers_count": 238,
|
||||
"forks_count": 48,
|
||||
"forks": 48,
|
||||
"watchers": 237,
|
||||
"watchers": 238,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-1994、CVE-2021-2047、CVE-2021-2064、CVE-2021-2108、CVE-2021-2075、CVE-2019-17195、CVE-2020-14756、CVE-2021-2109",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-04T07:03:56Z",
|
||||
"updated_at": "2021-03-11T22:00:26Z",
|
||||
"updated_at": "2021-03-15T09:36:06Z",
|
||||
"pushed_at": "2021-02-04T07:12:29Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": "IoC determination for exploitation of CVE-2021-26855, CVE-2021-26857, CVE-2021-26858 and CVE-2021-27065.",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-03T14:50:16Z",
|
||||
"updated_at": "2021-03-14T19:35:23Z",
|
||||
"pushed_at": "2021-03-14T19:35:21Z",
|
||||
"updated_at": "2021-03-15T11:42:08Z",
|
||||
"pushed_at": "2021-03-15T11:42:06Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 4,
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "A PowerShell script to identify indicators of exploitation of CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-26865",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-03T17:36:18Z",
|
||||
"updated_at": "2021-03-15T00:24:34Z",
|
||||
"updated_at": "2021-03-15T12:58:38Z",
|
||||
"pushed_at": "2021-03-05T17:09:01Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2021-03-13T17:47:07Z",
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 77,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -128,13 +128,13 @@
|
|||
"description": "PoC for CVE-2021-26855 -Just a checker-",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-06T23:12:22Z",
|
||||
"updated_at": "2021-03-13T19:43:13Z",
|
||||
"updated_at": "2021-03-15T13:30:46Z",
|
||||
"pushed_at": "2021-03-09T22:07:46Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -174,8 +174,8 @@
|
|||
"description": "Module pack for #ProxyLogon (part. of my contribute for Metasploit-Framework) [CVE-2021-26855 && CVE-2021-27065]",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-07T12:12:16Z",
|
||||
"updated_at": "2021-03-14T22:20:53Z",
|
||||
"pushed_at": "2021-03-14T21:26:56Z",
|
||||
"updated_at": "2021-03-15T12:12:18Z",
|
||||
"pushed_at": "2021-03-15T12:12:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
|
@ -220,13 +220,13 @@
|
|||
"description": "CVE-2021-26855 exp",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-08T08:39:05Z",
|
||||
"updated_at": "2021-03-15T02:54:30Z",
|
||||
"updated_at": "2021-03-15T13:14:48Z",
|
||||
"pushed_at": "2021-03-08T08:09:01Z",
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"forks_count": 66,
|
||||
"forks": 66,
|
||||
"watchers": 66,
|
||||
"watchers": 67,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -243,13 +243,13 @@
|
|||
"description": "A fast tool to mass scan for a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin (CVE-2021-26855).",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-08T11:54:32Z",
|
||||
"updated_at": "2021-03-15T08:04:45Z",
|
||||
"updated_at": "2021-03-15T12:03:29Z",
|
||||
"pushed_at": "2021-03-08T14:50:48Z",
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 102,
|
||||
"watchers": 103,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -362,8 +362,8 @@
|
|||
"pushed_at": "2021-03-09T16:56:09Z",
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"forks_count": 50,
|
||||
"forks": 50,
|
||||
"forks_count": 51,
|
||||
"forks": 51,
|
||||
"watchers": 66,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -431,8 +431,8 @@
|
|||
"pushed_at": "2021-03-14T23:51:37Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -450,13 +450,13 @@
|
|||
"description": "PoC of proxylogon chain SSRF(CVE-2021-26855) to write file by testanull, censored by github",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T20:51:48Z",
|
||||
"updated_at": "2021-03-15T06:48:02Z",
|
||||
"updated_at": "2021-03-15T11:21:18Z",
|
||||
"pushed_at": "2021-03-11T20:58:08Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 37,
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -519,13 +519,13 @@
|
|||
"description": "CVE-2021-26855: PoC (Not a HoneyPoC for once!)",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-14T14:23:34Z",
|
||||
"updated_at": "2021-03-15T02:07:50Z",
|
||||
"pushed_at": "2021-03-14T21:55:29Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"updated_at": "2021-03-15T13:25:25Z",
|
||||
"pushed_at": "2021-03-15T13:55:13Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -542,13 +542,36 @@
|
|||
"description": "RCE exploit for ProxyLogon vulnerability in Microsoft Exchange",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-14T22:57:21Z",
|
||||
"updated_at": "2021-03-15T01:30:59Z",
|
||||
"updated_at": "2021-03-15T10:14:58Z",
|
||||
"pushed_at": "2021-03-14T23:03:12Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 347992754,
|
||||
"name": "CVE-2021-26855-d",
|
||||
"full_name": "Mr-xn\/CVE-2021-26855-d",
|
||||
"owner": {
|
||||
"login": "Mr-xn",
|
||||
"id": 18260135,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4",
|
||||
"html_url": "https:\/\/github.com\/Mr-xn"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Mr-xn\/CVE-2021-26855-d",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-15T14:03:16Z",
|
||||
"updated_at": "2021-03-15T14:49:10Z",
|
||||
"pushed_at": "2021-03-15T14:08:16Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -381,7 +381,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2021-03-14T19:57:44Z",
|
||||
"updated_at": "2021-03-15T13:45:16Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 646,
|
||||
"watchers_count": 646,
|
||||
|
|
|
@ -408,6 +408,7 @@ Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is uni
|
|||
- [KotSec/CVE-2021-26855-Scanner](https://github.com/KotSec/CVE-2021-26855-Scanner)
|
||||
- [ZephrFish/Exch-CVE-2021-26855](https://github.com/ZephrFish/Exch-CVE-2021-26855)
|
||||
- [mil1200/ProxyLogon-CVE-2021-26855](https://github.com/mil1200/ProxyLogon-CVE-2021-26855)
|
||||
- [Mr-xn/CVE-2021-26855-d](https://github.com/Mr-xn/CVE-2021-26855-d)
|
||||
|
||||
### CVE-2021-26857 (2021-03-02)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue