Merge branch 'main' of git.mcdevitt.tech:bpmcdevitt/github_poc_collector

This commit is contained in:
Brendan McDevitt 2025-03-29 07:50:07 -05:00
commit 89863883af
20 changed files with 1012 additions and 0 deletions

View file

@ -0,0 +1,29 @@
[
{
"name": "CVE-2015-1701",
"full_name": "hfiref0x/CVE-2015-1701",
"html_url": "https://github.com/hfiref0x/CVE-2015-1701",
"description": "Win32k LPE vulnerability used in APT attack",
"stargazers_count": 287,
"forks_count": 176,
"created_at": "2015-05-12T18:04:48Z"
},
{
"name": "CVE-2015-1701",
"full_name": "Anonymous-Family/CVE-2015-1701",
"html_url": "https://github.com/Anonymous-Family/CVE-2015-1701",
"description": "Unspecified vulnerability in Microsoft Windows before 8 allows local users to gain privileges via unknown vectors, as exploited in the wild in April 2015 (Base Score: 7.2 HIGH) Current Description Win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2, Vista SP2, and Server 2008 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in April 2015, aka \"Win32k Elevation of Privilege Vulnerability ",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2022-03-21T06:26:21Z"
},
{
"name": "CVE-2015-1701-download",
"full_name": "Anonymous-Family/CVE-2015-1701-download",
"html_url": "https://github.com/Anonymous-Family/CVE-2015-1701-download",
"description": null,
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2022-03-21T06:39:18Z"
}
]

View file

@ -0,0 +1,11 @@
[
{
"name": "CVE-2015-4495",
"full_name": "vincd/CVE-2015-4495",
"html_url": "https://github.com/vincd/CVE-2015-4495",
"description": "Exploit for CVE-2015-4495 / mfsa2015-78",
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2015-08-10T22:46:46Z"
}
]

View file

@ -0,0 +1,29 @@
[
{
"name": "CVE-2016-9079",
"full_name": "dangokyo/CVE-2016-9079",
"html_url": "https://github.com/dangokyo/CVE-2016-9079",
"description": "A demo exploit of CVE-2016-9079 on Ubuntu x64",
"stargazers_count": 7,
"forks_count": 1,
"created_at": "2018-07-29T12:55:27Z"
},
{
"name": "CVE-2016-9079",
"full_name": "LakshmiDesai/CVE-2016-9079",
"html_url": "https://github.com/LakshmiDesai/CVE-2016-9079",
"description": "CVE-2016-9079 exploit code as it appeared on https://lists.torproject.org/pipermail/tor-talk/2016-November/042639.html",
"stargazers_count": 1,
"forks_count": 2,
"created_at": "2017-02-08T07:41:37Z"
},
{
"name": "Firefox-CVE-2016-9079",
"full_name": "Tau-hub/Firefox-CVE-2016-9079",
"html_url": "https://github.com/Tau-hub/Firefox-CVE-2016-9079",
"description": null,
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2021-10-08T21:44:13Z"
}
]

View file

@ -0,0 +1,74 @@
[
{
"name": "CVE-2021-40438",
"full_name": "Kashkovsky/CVE-2021-40438",
"html_url": "https://github.com/Kashkovsky/CVE-2021-40438",
"description": "Apache forward request CVE",
"stargazers_count": 17,
"forks_count": 1,
"created_at": "2022-04-03T15:24:24Z"
},
{
"name": "CVE-2021-40438",
"full_name": "sixpacksecurity/CVE-2021-40438",
"html_url": "https://github.com/sixpacksecurity/CVE-2021-40438",
"description": "CVE-2021-40438 exploit PoC with Docker setup.",
"stargazers_count": 12,
"forks_count": 4,
"created_at": "2021-10-24T10:18:08Z"
},
{
"name": "CVE-2021-40438-Apache-2.4.48-SSRF-exploit",
"full_name": "sergiovks/CVE-2021-40438-Apache-2.4.48-SSRF-exploit",
"html_url": "https://github.com/sergiovks/CVE-2021-40438-Apache-2.4.48-SSRF-exploit",
"description": "CVE-2021-40438 Apache <= 2.4.48 SSRF exploit",
"stargazers_count": 7,
"forks_count": 1,
"created_at": "2023-12-12T11:56:23Z"
},
{
"name": "CVE-2021-40438",
"full_name": "xiaojiangxl/CVE-2021-40438",
"html_url": "https://github.com/xiaojiangxl/CVE-2021-40438",
"description": null,
"stargazers_count": 4,
"forks_count": 2,
"created_at": "2021-10-18T02:02:43Z"
},
{
"name": "CVE-2021-40438",
"full_name": "BabyTeam1024/CVE-2021-40438",
"html_url": "https://github.com/BabyTeam1024/CVE-2021-40438",
"description": null,
"stargazers_count": 2,
"forks_count": 1,
"created_at": "2021-10-28T11:48:12Z"
},
{
"name": "CVE-2021-40438",
"full_name": "gassara-kys/CVE-2021-40438",
"html_url": "https://github.com/gassara-kys/CVE-2021-40438",
"description": "check CVE-2021-40438",
"stargazers_count": 1,
"forks_count": 1,
"created_at": "2022-06-10T00:46:58Z"
},
{
"name": "Sigma-Rule-for-CVE-2021-40438-exploitation-attempt",
"full_name": "pisut4152/Sigma-Rule-for-CVE-2021-40438-exploitation-attempt",
"html_url": "https://github.com/pisut4152/Sigma-Rule-for-CVE-2021-40438-exploitation-attempt",
"description": "Sigma-Rule-for-CVE-2021-40438-Attack-Attemp",
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2021-11-30T06:07:49Z"
},
{
"name": "CVE-2021-40438",
"full_name": "Cappricio-Securities/CVE-2021-40438",
"html_url": "https://github.com/Cappricio-Securities/CVE-2021-40438",
"description": "Apache <= 2.4.48 Mod_Proxy - Server-Side Request Forgery",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2024-05-19T11:04:58Z"
}
]

View file

@ -0,0 +1,272 @@
[
{
"name": "CVE-2021-41773",
"full_name": "blasty/CVE-2021-41773",
"html_url": "https://github.com/blasty/CVE-2021-41773",
"description": "CVE-2021-41773 playground",
"stargazers_count": 207,
"forks_count": 46,
"created_at": "2021-10-06T07:17:05Z"
},
{
"name": "CVE-2021-41773_CVE-2021-42013",
"full_name": "inbug-team/CVE-2021-41773_CVE-2021-42013",
"html_url": "https://github.com/inbug-team/CVE-2021-41773_CVE-2021-42013",
"description": "CVE-2021-41773 CVE-2021-42013漏洞批量检测工具",
"stargazers_count": 147,
"forks_count": 48,
"created_at": "2021-10-09T03:32:18Z"
},
{
"name": "CVE-2021-41773",
"full_name": "thehackersbrain/CVE-2021-41773",
"html_url": "https://github.com/thehackersbrain/CVE-2021-41773",
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
"stargazers_count": 107,
"forks_count": 35,
"created_at": "2022-03-12T21:24:55Z"
},
{
"name": "PoC-CVE-2021-41773",
"full_name": "iilegacyyii/PoC-CVE-2021-41773",
"html_url": "https://github.com/iilegacyyii/PoC-CVE-2021-41773",
"description": null,
"stargazers_count": 47,
"forks_count": 38,
"created_at": "2021-10-05T17:30:43Z"
},
{
"name": "cve-2021-41773",
"full_name": "Vulnmachines/cve-2021-41773",
"html_url": "https://github.com/Vulnmachines/cve-2021-41773",
"description": "CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.",
"stargazers_count": 40,
"forks_count": 9,
"created_at": "2021-10-05T16:13:38Z"
},
{
"name": "CVE-2021-41773-PoC",
"full_name": "lorddemon/CVE-2021-41773-PoC",
"html_url": "https://github.com/lorddemon/CVE-2021-41773-PoC",
"description": null,
"stargazers_count": 37,
"forks_count": 22,
"created_at": "2021-10-05T23:53:48Z"
},
{
"name": "mass_cve-2021-41773",
"full_name": "justakazh/mass_cve-2021-41773",
"html_url": "https://github.com/justakazh/mass_cve-2021-41773",
"description": "MASS CVE-2021-41773",
"stargazers_count": 27,
"forks_count": 19,
"created_at": "2021-10-07T15:13:18Z"
},
{
"name": "CVE-2021-41773_CVE-2021-42013",
"full_name": "Ls4ss/CVE-2021-41773_CVE-2021-42013",
"html_url": "https://github.com/Ls4ss/CVE-2021-41773_CVE-2021-42013",
"description": "Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE",
"stargazers_count": 21,
"forks_count": 9,
"created_at": "2021-10-06T02:28:41Z"
},
{
"name": "CVE-2021-41773",
"full_name": "BlueTeamSteve/CVE-2021-41773",
"html_url": "https://github.com/BlueTeamSteve/CVE-2021-41773",
"description": "Vulnerable docker images for CVE-2021-41773",
"stargazers_count": 20,
"forks_count": 7,
"created_at": "2021-10-06T14:47:23Z"
},
{
"name": "CVE-2021-41773-PoC",
"full_name": "ZephrFish/CVE-2021-41773-PoC",
"html_url": "https://github.com/ZephrFish/CVE-2021-41773-PoC",
"description": null,
"stargazers_count": 17,
"forks_count": 11,
"created_at": "2021-10-05T17:29:49Z"
},
{
"name": "CVE-2021-41773",
"full_name": "j4k0m/CVE-2021-41773",
"html_url": "https://github.com/j4k0m/CVE-2021-41773",
"description": "Exploitation of CVE-2021-41773 a Directory Traversal in Apache 2.4.49.",
"stargazers_count": 12,
"forks_count": 7,
"created_at": "2021-10-05T20:30:01Z"
},
{
"name": "CVE-2021-41773",
"full_name": "zeronine9/CVE-2021-41773",
"html_url": "https://github.com/zeronine9/CVE-2021-41773",
"description": "Fast python tool to test apache path traversal CVE-2021-41773 in a List of url ",
"stargazers_count": 11,
"forks_count": 7,
"created_at": "2021-10-08T07:24:49Z"
},
{
"name": "CVE-2021-41773",
"full_name": "itsecurityco/CVE-2021-41773",
"html_url": "https://github.com/itsecurityco/CVE-2021-41773",
"description": "CVE-2021-41773 POC with Docker",
"stargazers_count": 11,
"forks_count": 6,
"created_at": "2021-10-06T02:30:40Z"
},
{
"name": "CVE-2021-41773",
"full_name": "knqyf263/CVE-2021-41773",
"html_url": "https://github.com/knqyf263/CVE-2021-41773",
"description": "Path traversal in Apache HTTP Server 2.4.49 (CVE-2021-41773) ",
"stargazers_count": 10,
"forks_count": 7,
"created_at": "2021-10-05T16:45:41Z"
},
{
"name": "CVE-2021-41773",
"full_name": "1nhann/CVE-2021-41773",
"html_url": "https://github.com/1nhann/CVE-2021-41773",
"description": "CVE-2021-41773 的复现",
"stargazers_count": 10,
"forks_count": 4,
"created_at": "2021-10-06T14:17:31Z"
},
{
"name": "CVE-2021-41773",
"full_name": "mr-exo/CVE-2021-41773",
"html_url": "https://github.com/mr-exo/CVE-2021-41773",
"description": "Remote Code Execution exploit for Apache servers. Affected versions: Apache 2.4.49, Apache 2.4.50",
"stargazers_count": 10,
"forks_count": 0,
"created_at": "2021-10-26T17:56:25Z"
},
{
"name": "CVE-2021-41773",
"full_name": "numanturle/CVE-2021-41773",
"html_url": "https://github.com/numanturle/CVE-2021-41773",
"description": "CVE-2021-41773",
"stargazers_count": 9,
"forks_count": 4,
"created_at": "2021-10-05T16:18:09Z"
},
{
"name": "CVE-2021-41773",
"full_name": "aqiao-jashell/CVE-2021-41773",
"html_url": "https://github.com/aqiao-jashell/CVE-2021-41773",
"description": "apache路径穿越漏洞poc&exp",
"stargazers_count": 9,
"forks_count": 1,
"created_at": "2022-11-01T05:58:59Z"
},
{
"name": "CVE-2021-41773-POC",
"full_name": "creadpag/CVE-2021-41773-POC",
"html_url": "https://github.com/creadpag/CVE-2021-41773-POC",
"description": "CVE-2021-41773",
"stargazers_count": 8,
"forks_count": 5,
"created_at": "2021-10-06T05:34:48Z"
},
{
"name": "CVE-2021-41773",
"full_name": "0xRar/CVE-2021-41773",
"html_url": "https://github.com/0xRar/CVE-2021-41773",
"description": "Exploit for Apache 2.4.49",
"stargazers_count": 7,
"forks_count": 12,
"created_at": "2021-10-08T04:26:31Z"
},
{
"name": "py-CVE-2021-41773",
"full_name": "aqiao-jashell/py-CVE-2021-41773",
"html_url": "https://github.com/aqiao-jashell/py-CVE-2021-41773",
"description": "python编写的apache路径穿越poc&exp",
"stargazers_count": 7,
"forks_count": 0,
"created_at": "2022-11-01T09:17:03Z"
},
{
"name": "POC-CVE-2021-41773",
"full_name": "TishcaTpx/POC-CVE-2021-41773",
"html_url": "https://github.com/TishcaTpx/POC-CVE-2021-41773",
"description": "Poc.py ",
"stargazers_count": 6,
"forks_count": 3,
"created_at": "2021-10-05T20:41:34Z"
},
{
"name": "CVE-2021-41773",
"full_name": "noflowpls/CVE-2021-41773",
"html_url": "https://github.com/noflowpls/CVE-2021-41773",
"description": "CVE-2021-41773",
"stargazers_count": 6,
"forks_count": 1,
"created_at": "2021-10-07T12:30:13Z"
},
{
"name": "CVE-2021-41773-MSF",
"full_name": "belajarqywok/CVE-2021-41773-MSF",
"html_url": "https://github.com/belajarqywok/CVE-2021-41773-MSF",
"description": "Simple Metasploit-Framework module for conducting website penetration tests (CVE-2021-41773).",
"stargazers_count": 6,
"forks_count": 0,
"created_at": "2023-08-11T12:12:09Z"
},
{
"name": "CVE-2021-41773-Playground",
"full_name": "Hydragyrum/CVE-2021-41773-Playground",
"html_url": "https://github.com/Hydragyrum/CVE-2021-41773-Playground",
"description": "Some docker images to play with CVE-2021-41773 and CVE-2021-42013",
"stargazers_count": 6,
"forks_count": 1,
"created_at": "2021-11-04T22:52:44Z"
},
{
"name": "cve_2021_41773",
"full_name": "Undefind404/cve_2021_41773",
"html_url": "https://github.com/Undefind404/cve_2021_41773",
"description": null,
"stargazers_count": 5,
"forks_count": 0,
"created_at": "2022-11-02T09:31:31Z"
},
{
"name": "CVE-2021-41773",
"full_name": "jbovet/CVE-2021-41773",
"html_url": "https://github.com/jbovet/CVE-2021-41773",
"description": "Path traversal and file disclosure vulnerability in Apache HTTP Server 2.4.49 (CVE-2021-41773)",
"stargazers_count": 4,
"forks_count": 5,
"created_at": "2021-10-06T13:39:57Z"
},
{
"name": "CVE-2021-41773-PoC",
"full_name": "habibiefaried/CVE-2021-41773-PoC",
"html_url": "https://github.com/habibiefaried/CVE-2021-41773-PoC",
"description": "PoC for CVE-2021-41773 with docker to demonstrate",
"stargazers_count": 4,
"forks_count": 4,
"created_at": "2021-10-06T03:01:41Z"
},
{
"name": "cve-2021-41773",
"full_name": "twseptian/cve-2021-41773",
"html_url": "https://github.com/twseptian/cve-2021-41773",
"description": "CVE-2021-41773: Path Traversal Zero-Day in Apache HTTP Server Exploited",
"stargazers_count": 4,
"forks_count": 3,
"created_at": "2021-10-07T11:55:10Z"
},
{
"name": "CVE-2021-41773_CVE-2021-42013_Exploits",
"full_name": "OfriOuzan/CVE-2021-41773_CVE-2021-42013_Exploits",
"html_url": "https://github.com/OfriOuzan/CVE-2021-41773_CVE-2021-42013_Exploits",
"description": "Exploit CVE-2021-41773 and CVE-2021-42013",
"stargazers_count": 4,
"forks_count": 1,
"created_at": "2023-08-02T09:50:10Z"
}
]

View file

@ -0,0 +1,272 @@
[
{
"name": "CVE-2021-41773_CVE-2021-42013",
"full_name": "inbug-team/CVE-2021-41773_CVE-2021-42013",
"html_url": "https://github.com/inbug-team/CVE-2021-41773_CVE-2021-42013",
"description": "CVE-2021-41773 CVE-2021-42013漏洞批量检测工具",
"stargazers_count": 147,
"forks_count": 48,
"created_at": "2021-10-09T03:32:18Z"
},
{
"name": "cve-2021-42013",
"full_name": "walnutsecurity/cve-2021-42013",
"html_url": "https://github.com/walnutsecurity/cve-2021-42013",
"description": "cve-2021-42013.py is a python script that will help in finding Path Traversal or Remote Code Execution vulnerability in Apache 2.4.50",
"stargazers_count": 24,
"forks_count": 14,
"created_at": "2021-10-27T14:29:10Z"
},
{
"name": "CVE-2021-41773_CVE-2021-42013",
"full_name": "Ls4ss/CVE-2021-41773_CVE-2021-42013",
"html_url": "https://github.com/Ls4ss/CVE-2021-41773_CVE-2021-42013",
"description": "Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE",
"stargazers_count": 21,
"forks_count": 9,
"created_at": "2021-10-06T02:28:41Z"
},
{
"name": "cve-2021-42013",
"full_name": "Vulnmachines/cve-2021-42013",
"html_url": "https://github.com/Vulnmachines/cve-2021-42013",
"description": "Apache 2.4.50 Path traversal vulnerability",
"stargazers_count": 17,
"forks_count": 3,
"created_at": "2021-10-08T05:44:54Z"
},
{
"name": "CVE-2021-42013-Apache-RCE-Poc-Exp",
"full_name": "asaotomo/CVE-2021-42013-Apache-RCE-Poc-Exp",
"html_url": "https://github.com/asaotomo/CVE-2021-42013-Apache-RCE-Poc-Exp",
"description": "Apache 远程代码执行 CVE-2021-42013批量检测工具Apache HTTP Server是美国阿帕奇Apache基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点发现 Apache HTTP Server 2.4.50 中针对 CVE-2021-41773 的修复不够充分。攻击者可以使用路径遍历攻击将 URL 映射到由类似别名的指令配置的目录之外的文件。如果这些目录之外的文件不受通常的默认配置“要求全部拒绝”的保护,则这些请求可能会成功。如果还为这些别名路径启用了 CGI 脚本,则这可能允许远程代码执行。此问题仅影响 Apache 2.4.49 和 Apache 2.4.50,而不影响更早版本。",
"stargazers_count": 10,
"forks_count": 2,
"created_at": "2021-12-23T14:46:41Z"
},
{
"name": "apache-exploit-CVE-2021-42013",
"full_name": "andrea-mattioli/apache-exploit-CVE-2021-42013",
"html_url": "https://github.com/andrea-mattioli/apache-exploit-CVE-2021-42013",
"description": "Exploit with integrated shodan search",
"stargazers_count": 9,
"forks_count": 5,
"created_at": "2021-10-07T18:31:29Z"
},
{
"name": "CVE-2021-42013_Reverse-Shell",
"full_name": "TheLastVvV/CVE-2021-42013_Reverse-Shell",
"html_url": "https://github.com/TheLastVvV/CVE-2021-42013_Reverse-Shell",
"description": "PoC CVE-2021-42013 reverse shell Apache 2.4.50 with CGI",
"stargazers_count": 7,
"forks_count": 2,
"created_at": "2021-10-24T12:57:55Z"
},
{
"name": "CVE-2021-41773_CVE-2021-42013_Exploits",
"full_name": "OfriOuzan/CVE-2021-41773_CVE-2021-42013_Exploits",
"html_url": "https://github.com/OfriOuzan/CVE-2021-41773_CVE-2021-42013_Exploits",
"description": "Exploit CVE-2021-41773 and CVE-2021-42013",
"stargazers_count": 4,
"forks_count": 1,
"created_at": "2023-08-02T09:50:10Z"
},
{
"name": "CVE-2021-42013",
"full_name": "BassoNicolas/CVE-2021-42013",
"html_url": "https://github.com/BassoNicolas/CVE-2021-42013",
"description": "CVE-2021-42013 Vulnerability Scanner This Python script checks for the Remote Code Execution (RCE) vulnerability (CVE-2021-42013) in Apache 2.4.50. ",
"stargazers_count": 3,
"forks_count": 0,
"created_at": "2024-04-07T16:04:06Z"
},
{
"name": "cve-2021-42013-docker-lab",
"full_name": "twseptian/cve-2021-42013-docker-lab",
"html_url": "https://github.com/twseptian/cve-2021-42013-docker-lab",
"description": "Docker container lab to play/learn with CVE-2021-42013",
"stargazers_count": 2,
"forks_count": 6,
"created_at": "2021-10-14T18:00:48Z"
},
{
"name": "cve-2021-41773-and-cve-2021-42013",
"full_name": "5gstudent/cve-2021-41773-and-cve-2021-42013",
"html_url": "https://github.com/5gstudent/cve-2021-41773-and-cve-2021-42013",
"description": "cve-2021-41773 即 cve-2021-42013 批量检测脚本",
"stargazers_count": 2,
"forks_count": 2,
"created_at": "2021-10-09T11:33:56Z"
},
{
"name": "CVE-2021-41773_42013",
"full_name": "zerodaywolf/CVE-2021-41773_42013",
"html_url": "https://github.com/zerodaywolf/CVE-2021-41773_42013",
"description": "Lab setup for CVE-2021-41773 (Apache httpd 2.4.49) and CVE-2021-42013 (Apache httpd 2.4.50).",
"stargazers_count": 2,
"forks_count": 2,
"created_at": "2021-10-18T12:01:58Z"
},
{
"name": "CVE-2021-42013",
"full_name": "TheLastVvV/CVE-2021-42013",
"html_url": "https://github.com/TheLastVvV/CVE-2021-42013",
"description": "Poc CVE-2021-42013 - Apache 2.4.50 without CGI",
"stargazers_count": 2,
"forks_count": 0,
"created_at": "2021-10-23T21:58:44Z"
},
{
"name": "CVE-2021-42013-EXPLOIT",
"full_name": "K3ysTr0K3R/CVE-2021-42013-EXPLOIT",
"html_url": "https://github.com/K3ysTr0K3R/CVE-2021-42013-EXPLOIT",
"description": "A PoC exploit for CVE-2021-42013 - Apache 2.4.49 & 2.4.50 Remote Code Execution",
"stargazers_count": 2,
"forks_count": 0,
"created_at": "2023-08-25T19:51:01Z"
},
{
"name": "CVE-2021-42013",
"full_name": "mauricelambert/CVE-2021-42013",
"html_url": "https://github.com/mauricelambert/CVE-2021-42013",
"description": "These Nmap, Python and Ruby scripts detects and exploits CVE-2021-42013 with RCE and local file disclosure.",
"stargazers_count": 1,
"forks_count": 1,
"created_at": "2022-03-08T21:48:40Z"
},
{
"name": "cve-2021-42013",
"full_name": "bananoname/cve-2021-42013",
"html_url": "https://github.com/bananoname/cve-2021-42013",
"description": null,
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2024-07-31T07:48:39Z"
},
{
"name": "CVE-2021-42013",
"full_name": "robotsense1337/CVE-2021-42013",
"html_url": "https://github.com/robotsense1337/CVE-2021-42013",
"description": "Exploit Apache 2.4.50(CVE-2021-42013)",
"stargazers_count": 1,
"forks_count": 1,
"created_at": "2021-11-03T17:33:52Z"
},
{
"name": "CVE-2021-42013",
"full_name": "Hamesawian/CVE-2021-42013",
"html_url": "https://github.com/Hamesawian/CVE-2021-42013",
"description": null,
"stargazers_count": 1,
"forks_count": 1,
"created_at": "2023-06-29T16:32:44Z"
},
{
"name": "CVE-2021-42013",
"full_name": "vudala/CVE-2021-42013",
"html_url": "https://github.com/vudala/CVE-2021-42013",
"description": "Exploring CVE-2021-42013, using Suricata and OpenVAS to gather info",
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2023-06-20T21:43:13Z"
},
{
"name": "cve-2021-42013-httpd",
"full_name": "cybfar/cve-2021-42013-httpd",
"html_url": "https://github.com/cybfar/cve-2021-42013-httpd",
"description": "CVE: 2021-42013 Tested on: 2.4.49 and 2.4.50 Description: Path Traversal or Remote Code Execution vulnerabilities in Apache 2.4.49 and 2.4.50",
"stargazers_count": 1,
"forks_count": 1,
"created_at": "2023-06-08T08:49:15Z"
},
{
"name": "CVE-2021-42013-LAB",
"full_name": "jas9reet/CVE-2021-42013-LAB",
"html_url": "https://github.com/jas9reet/CVE-2021-42013-LAB",
"description": "Apache HTTP Server 2.4.50 - RCE Lab",
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2022-02-03T13:26:05Z"
},
{
"name": "cve-2021-42013L",
"full_name": "mightysai1997/cve-2021-42013L",
"html_url": "https://github.com/mightysai1997/cve-2021-42013L",
"description": null,
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2022-09-15T11:35:00Z"
},
{
"name": "CVE-2021-42013",
"full_name": "LayarKacaSiber/CVE-2021-42013",
"html_url": "https://github.com/LayarKacaSiber/CVE-2021-42013",
"description": null,
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2021-10-20T15:32:39Z"
},
{
"name": "cve-2021-42013",
"full_name": "viliuspovilaika/cve-2021-42013",
"html_url": "https://github.com/viliuspovilaika/cve-2021-42013",
"description": "Exploit for Apache 2.4.50 (CVE-2021-42013)",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2022-05-31T03:28:20Z"
},
{
"name": "CVE-2021-42013",
"full_name": "12345qwert123456/CVE-2021-42013",
"html_url": "https://github.com/12345qwert123456/CVE-2021-42013",
"description": "Vulnerable configuration Apache HTTP Server version 2.4.49/2.4.50",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2022-11-18T17:53:46Z"
},
{
"name": "CVE-2021-42013",
"full_name": "asepsaepdin/CVE-2021-42013",
"html_url": "https://github.com/asepsaepdin/CVE-2021-42013",
"description": null,
"stargazers_count": 0,
"forks_count": 1,
"created_at": "2025-01-30T01:28:57Z"
},
{
"name": "cve-2021-42013",
"full_name": "mightysai1997/cve-2021-42013",
"html_url": "https://github.com/mightysai1997/cve-2021-42013",
"description": null,
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2022-09-15T11:28:39Z"
},
{
"name": "CVE-2021-42013",
"full_name": "rnsss/CVE-2021-42013",
"html_url": "https://github.com/rnsss/CVE-2021-42013",
"description": "CVE-2021-42013-exp",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2022-01-07T03:12:45Z"
},
{
"name": "CVE-2021-42013",
"full_name": "honypot/CVE-2021-42013",
"html_url": "https://github.com/honypot/CVE-2021-42013",
"description": null,
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2022-03-14T04:08:24Z"
},
{
"name": "cve-2021-42013.get",
"full_name": "mightysai1997/cve-2021-42013.get",
"html_url": "https://github.com/mightysai1997/cve-2021-42013.get",
"description": null,
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2022-09-15T12:15:00Z"
}
]

View file

@ -0,0 +1,11 @@
[
{
"name": "CVE-2022-45460",
"full_name": "born0monday/CVE-2022-45460",
"html_url": "https://github.com/born0monday/CVE-2022-45460",
"description": "Proof of Concept for CVE-2022-45460",
"stargazers_count": 4,
"forks_count": 2,
"created_at": "2025-01-30T16:16:01Z"
}
]

View file

@ -0,0 +1,11 @@
[
{
"name": "cve-2022-45511",
"full_name": "kinderscsaa/cve-2022-45511",
"html_url": "https://github.com/kinderscsaa/cve-2022-45511",
"description": null,
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2022-12-21T14:06:20Z"
}
]

View file

@ -0,0 +1,11 @@
[
{
"name": "CVE-2022-48311",
"full_name": "swzhouu/CVE-2022-48311",
"html_url": "https://github.com/swzhouu/CVE-2022-48311",
"description": "HP Deskjet 2540 series printer Firmware Version CEP1FN1418BR and Product Model Number A9U23B HTTP configuration page Cross Site Scripting (XSS) Vulnerability",
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2023-02-07T15:13:33Z"
}
]

View file

@ -0,0 +1,11 @@
[
{
"name": "CVE-2022-48311",
"full_name": "swzhouu/CVE-2022-48311",
"html_url": "https://github.com/swzhouu/CVE-2022-48311",
"description": "HP Deskjet 2540 series printer Firmware Version CEP1FN1418BR and Product Model Number A9U23B HTTP configuration page Cross Site Scripting (XSS) Vulnerability",
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2023-02-07T15:13:33Z"
}
]

View file

@ -0,0 +1,20 @@
[
{
"name": "CVE-2024-10674",
"full_name": "Nxploited/CVE-2024-10674",
"html_url": "https://github.com/Nxploited/CVE-2024-10674",
"description": "Th Shop Mania <= 1.4.9 - Authenticated (Subscriber+) Arbitrary Plugin Installation/Activation",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-03-12T21:00:14Z"
},
{
"name": "CVE-2024-10673",
"full_name": "Nxploited/CVE-2024-10673",
"html_url": "https://github.com/Nxploited/CVE-2024-10673",
"description": " Top Store <= 1.5.4 - Authenticated (Subscriber+) Arbitrary Plugin Installation/Activation",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-03-12T06:40:00Z"
}
]

View file

@ -0,0 +1,11 @@
[
{
"name": "CVE-2024-1346",
"full_name": "PeterGabaldon/CVE-2024-1346",
"html_url": "https://github.com/PeterGabaldon/CVE-2024-1346",
"description": "Weak MySQL database root password in LaborOfficeFree affects version 19.10. This vulnerability allows an attacker to calculate the root password of the MySQL database used by LaborOfficeFree using two constants.",
"stargazers_count": 2,
"forks_count": 0,
"created_at": "2024-02-25T11:51:03Z"
}
]

View file

@ -0,0 +1,11 @@
[
{
"name": "CVE-2024-25202",
"full_name": "Agampreet-Singh/CVE-2024-25202",
"html_url": "https://github.com/Agampreet-Singh/CVE-2024-25202",
"description": "A vulnerability was found in PHPgurukul visitor management system 1.0. it has been rated as problemic. Affected by the issue is some unknown functionality of the file search bar that called search-result.php and search-visitor.php . The vulnerability is Cross-Site-Scripting (XSS).",
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2024-02-20T18:19:53Z"
}
]

View file

@ -0,0 +1,11 @@
[
{
"name": "CVE-2024-36823-POC",
"full_name": "JAckLosingHeart/CVE-2024-36823-POC",
"html_url": "https://github.com/JAckLosingHeart/CVE-2024-36823-POC",
"description": "Ninja Framework sensitive information leak due to weak encryption",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2024-11-03T01:56:11Z"
}
]

View file

@ -0,0 +1,11 @@
[
{
"name": "prevent_cve_2024_44133",
"full_name": "Ununp3ntium115/prevent_cve_2024_44133",
"html_url": "https://github.com/Ununp3ntium115/prevent_cve_2024_44133",
"description": "prevent_cve_2024_44133",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2024-11-09T21:30:04Z"
}
]

View file

@ -0,0 +1,65 @@
[
{
"name": "CVE-2025-1974",
"full_name": "yoshino-s/CVE-2025-1974",
"html_url": "https://github.com/yoshino-s/CVE-2025-1974",
"description": null,
"stargazers_count": 38,
"forks_count": 9,
"created_at": "2025-03-25T13:23:01Z"
},
{
"name": "ingressNightmare-CVE-2025-1974-exps",
"full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps",
"html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps",
"description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-1974 https://www.wiz.io/blog/ingress-nginx-kubernetes-vulnerabilities#how-did-we-discover-ingressnightmare-24 ",
"stargazers_count": 32,
"forks_count": 5,
"created_at": "2025-03-26T06:43:36Z"
},
{
"name": "CVE-2025-1974-poc",
"full_name": "hi-unc1e/CVE-2025-1974-poc",
"html_url": "https://github.com/hi-unc1e/CVE-2025-1974-poc",
"description": "PoC of CVE-2025-1974, modified from the world-first PoC~",
"stargazers_count": 2,
"forks_count": 2,
"created_at": "2025-03-26T16:54:37Z"
},
{
"name": "CVE-2025-1974",
"full_name": "zwxxb/CVE-2025-1974",
"html_url": "https://github.com/zwxxb/CVE-2025-1974",
"description": "Poc for Ingress RCE ",
"stargazers_count": 2,
"forks_count": 3,
"created_at": "2025-03-26T14:49:29Z"
},
{
"name": "CVE-2025-1974",
"full_name": "0xBingo/CVE-2025-1974",
"html_url": "https://github.com/0xBingo/CVE-2025-1974",
"description": "A minimal test tool to help detect annotation injection vulnerabilities in Kubernetes NGINX Ingress controllers. This script sends a crafted AdmissionReview request to simulate a potential exploit path from CVE-2025-1974 and checks for signs of misinterpreted annotations in controller logs.",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-03-27T03:28:01Z"
},
{
"name": "CVE-2025-1974",
"full_name": "yanmarques/CVE-2025-1974",
"html_url": "https://github.com/yanmarques/CVE-2025-1974",
"description": null,
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-03-25T18:49:23Z"
},
{
"name": "POC-IngressNightmare-CVE-2025-1974",
"full_name": "rjhaikal/POC-IngressNightmare-CVE-2025-1974",
"html_url": "https://github.com/rjhaikal/POC-IngressNightmare-CVE-2025-1974",
"description": "POC IngressNightmare (CVE-2025-1974), modified from https://github.com/yoshino-s/CVE-2025-1974",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-03-28T16:57:02Z"
}
]

View file

@ -0,0 +1,20 @@
[
{
"name": "CVE-2025-26264",
"full_name": "DRAGOWN/CVE-2025-26264",
"html_url": "https://github.com/DRAGOWN/CVE-2025-26264",
"description": "CVE-2025-26264 - GeoVision GV-ASWeb with the version 6.1.2.0 or less, contains a Remote Code Execution (RCE) vulnerability within its Notification Settings feature. An authenticated attacker with \"System Settings\" privileges in ASWeb can exploit this flaw to execute arbitrary commands on the server, leading to a full system compromise. ",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-02-26T18:11:16Z"
},
{
"name": "CVE-2025-26263",
"full_name": "DRAGOWN/CVE-2025-26263",
"html_url": "https://github.com/DRAGOWN/CVE-2025-26263",
"description": "CVE-2025-26263 - GeoVision ASManager Windows desktop application with the version 6.1.2.0 or less, is vulnerable to credentials disclosure due to improper memory handling in the ASManagerService.exe process. ",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-02-26T17:40:40Z"
}
]

View file

@ -0,0 +1,11 @@
[
{
"name": "CVE-2025-26318",
"full_name": "Frozenka/CVE-2025-26318",
"html_url": "https://github.com/Frozenka/CVE-2025-26318",
"description": "POC CVE-2025-26318",
"stargazers_count": 3,
"forks_count": 0,
"created_at": "2024-10-22T12:13:33Z"
}
]

View file

@ -0,0 +1,20 @@
[
{
"name": "CVE-2025-26794",
"full_name": "OscarBataille/CVE-2025-26794",
"html_url": "https://github.com/OscarBataille/CVE-2025-26794",
"description": "CVE-2025-26794: Blind SQL injection in Exim 4.98 (SQLite DBM)- exploit writeup",
"stargazers_count": 7,
"forks_count": 0,
"created_at": "2025-02-22T14:14:59Z"
},
{
"name": "CVE-2025-26794-Exim-Mail-SQLi",
"full_name": "ishwardeepp/CVE-2025-26794-Exim-Mail-SQLi",
"html_url": "https://github.com/ishwardeepp/CVE-2025-26794-Exim-Mail-SQLi",
"description": null,
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-03-05T07:34:50Z"
}
]

View file

@ -0,0 +1,101 @@
[
{
"name": "CVE-2025-30208-EXP",
"full_name": "ThumpBo/CVE-2025-30208-EXP",
"html_url": "https://github.com/ThumpBo/CVE-2025-30208-EXP",
"description": "CVE-2025-30208-EXP",
"stargazers_count": 151,
"forks_count": 25,
"created_at": "2025-03-26T15:42:31Z"
},
{
"name": "CVE-2025-30208",
"full_name": "xuemian168/CVE-2025-30208",
"html_url": "https://github.com/xuemian168/CVE-2025-30208",
"description": "全网首发 The first Vite scanner on the entire network Automatic target asset collection via FOFA Multi-threaded concurrent scanning Automatic CSV report generation",
"stargazers_count": 26,
"forks_count": 1,
"created_at": "2025-03-26T10:26:12Z"
},
{
"name": "CVE-2025-30208",
"full_name": "xaitx/CVE-2025-30208",
"html_url": "https://github.com/xaitx/CVE-2025-30208",
"description": "CVE-2025-30208 检测工具。python script && nuclei template",
"stargazers_count": 7,
"forks_count": 1,
"created_at": "2025-03-26T17:14:11Z"
},
{
"name": "Vite-CVE-2025-30208-Scanner",
"full_name": "marino-admin/Vite-CVE-2025-30208-Scanner",
"html_url": "https://github.com/marino-admin/Vite-CVE-2025-30208-Scanner",
"description": "CVE-2025-30208-EXP 任意文件读取",
"stargazers_count": 4,
"forks_count": 1,
"created_at": "2025-03-26T20:10:20Z"
},
{
"name": "CVE-2025-30208",
"full_name": "LiChaser/CVE-2025-30208",
"html_url": "https://github.com/LiChaser/CVE-2025-30208",
"description": "最新的CVE-2025-30208的poc这个仓库主要拿来写刷src的一些个人思路技巧自己写的或者搜集挖src的bypass-waf的脚本",
"stargazers_count": 2,
"forks_count": 0,
"created_at": "2025-03-21T15:32:24Z"
},
{
"name": "CVE-2025-30208-LFI",
"full_name": "On1onss/CVE-2025-30208-LFI",
"html_url": "https://github.com/On1onss/CVE-2025-30208-LFI",
"description": "This exploit is for educational and ethical security testing purposes only. The use of this exploit against targets without prior mutual consent is illegal, and the developer disclaims any liability for misuse or damage caused by this exploit.",
"stargazers_count": 2,
"forks_count": 0,
"created_at": "2025-03-27T12:36:41Z"
},
{
"name": "CVE-2025-30208",
"full_name": "kk12-30/CVE-2025-30208",
"html_url": "https://github.com/kk12-30/CVE-2025-30208",
"description": "CVE-2025-30208漏洞验证工具",
"stargazers_count": 1,
"forks_count": 0,
"created_at": "2025-03-26T17:18:46Z"
},
{
"name": "CVE-2025-30208_POC",
"full_name": "YuanBenSir/CVE-2025-30208_POC",
"html_url": "https://github.com/YuanBenSir/CVE-2025-30208_POC",
"description": "CVE-2025-30208 任意文件读取漏洞快速验证",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-03-26T19:06:44Z"
},
{
"name": "CVE-2025-30208-Vite",
"full_name": "sadhfdw129/CVE-2025-30208-Vite",
"html_url": "https://github.com/sadhfdw129/CVE-2025-30208-Vite",
"description": "CVE-2025-30208 | Vite脚本",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-03-28T09:50:48Z"
},
{
"name": "CVE-2025-30208-PoC",
"full_name": "iSee857/CVE-2025-30208-PoC",
"html_url": "https://github.com/iSee857/CVE-2025-30208-PoC",
"description": "CVE-2025-30208动态检测脚本支持默认路径自定义路径动态检测",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-03-27T06:22:18Z"
},
{
"name": "CVE-2025-30208-ViteVulnScanner",
"full_name": "keklick1337/CVE-2025-30208-ViteVulnScanner",
"html_url": "https://github.com/keklick1337/CVE-2025-30208-ViteVulnScanner",
"description": "CVE-2025-30208 ViteVulnScanner",
"stargazers_count": 0,
"forks_count": 0,
"created_at": "2025-03-28T12:17:36Z"
}
]