github_poc_collector/exploits/2021/CVE-2021-2021.json

272 lines
No EOL
9.5 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"name": "CVE-2021-4034",
"full_name": "berdav/CVE-2021-4034",
"html_url": "https://github.com/berdav/CVE-2021-4034",
"description": "CVE-2021-4034 1day",
"stargazers_count": 1984,
"forks_count": 513,
"created_at": "2022-01-25T23:51:37Z"
},
{
"name": "CVE-2021-1675",
"full_name": "cube0x0/CVE-2021-1675",
"html_url": "https://github.com/cube0x0/CVE-2021-1675",
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527",
"stargazers_count": 1872,
"forks_count": 583,
"created_at": "2021-06-29T17:24:14Z"
},
{
"name": "CVE-2021-40444",
"full_name": "lockedbyte/CVE-2021-40444",
"html_url": "https://github.com/lockedbyte/CVE-2021-40444",
"description": "CVE-2021-40444 PoC",
"stargazers_count": 1618,
"forks_count": 481,
"created_at": "2021-09-10T16:55:53Z"
},
{
"name": "CVE-2021-4034",
"full_name": "arthepsy/CVE-2021-4034",
"html_url": "https://github.com/arthepsy/CVE-2021-4034",
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkits pkexec (CVE-2021-4034)",
"stargazers_count": 1078,
"forks_count": 307,
"created_at": "2022-01-26T00:56:36Z"
},
{
"name": "CVE-2021-1675",
"full_name": "calebstewart/CVE-2021-1675",
"html_url": "https://github.com/calebstewart/CVE-2021-1675",
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
"stargazers_count": 1043,
"forks_count": 229,
"created_at": "2021-07-01T23:45:58Z"
},
{
"name": "CVE-2021-3156",
"full_name": "blasty/CVE-2021-3156",
"html_url": "https://github.com/blasty/CVE-2021-3156",
"description": null,
"stargazers_count": 971,
"forks_count": 236,
"created_at": "2021-01-30T20:39:58Z"
},
{
"name": "CVE-2021-44228-PoC-log4j-bypass-words",
"full_name": "Puliczek/CVE-2021-44228-PoC-log4j-bypass-words",
"html_url": "https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words",
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"stargazers_count": 932,
"forks_count": 142,
"created_at": "2021-12-10T22:35:00Z"
},
{
"name": "CVE-2021-44228-Scanner",
"full_name": "logpresso/CVE-2021-44228-Scanner",
"html_url": "https://github.com/logpresso/CVE-2021-44228-Scanner",
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
"stargazers_count": 857,
"forks_count": 173,
"created_at": "2021-12-11T11:18:46Z"
},
{
"name": "CVE-2021-31166",
"full_name": "0vercl0k/CVE-2021-31166",
"html_url": "https://github.com/0vercl0k/CVE-2021-31166",
"description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
"stargazers_count": 822,
"forks_count": 139,
"created_at": "2021-05-16T16:15:56Z"
},
{
"name": "CVE-2021-40444",
"full_name": "klezVirus/CVE-2021-40444",
"html_url": "https://github.com/klezVirus/CVE-2021-40444",
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
"stargazers_count": 805,
"forks_count": 170,
"created_at": "2021-09-15T22:34:35Z"
},
{
"name": "CVE-2021-3156",
"full_name": "worawit/CVE-2021-3156",
"html_url": "https://github.com/worawit/CVE-2021-3156",
"description": "Sudo Baron Samedit Exploit",
"stargazers_count": 743,
"forks_count": 169,
"created_at": "2021-03-15T17:37:02Z"
},
{
"name": "CVE-2021-21972",
"full_name": "NS-Sp4ce/CVE-2021-21972",
"html_url": "https://github.com/NS-Sp4ce/CVE-2021-21972",
"description": "CVE-2021-21972 Exploit",
"stargazers_count": 489,
"forks_count": 145,
"created_at": "2021-02-24T11:14:58Z"
},
{
"name": "Log4j2-CVE-2021-44228",
"full_name": "jas502n/Log4j2-CVE-2021-44228",
"html_url": "https://github.com/jas502n/Log4j2-CVE-2021-44228",
"description": "Remote Code Injection In Log4j",
"stargazers_count": 463,
"forks_count": 119,
"created_at": "2021-12-10T05:23:44Z"
},
{
"name": "CVE-2021-3156",
"full_name": "stong/CVE-2021-3156",
"html_url": "https://github.com/stong/CVE-2021-3156",
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
"stargazers_count": 434,
"forks_count": 108,
"created_at": "2021-01-30T03:22:04Z"
},
{
"name": "CVE-2021-3493",
"full_name": "briskets/CVE-2021-3493",
"html_url": "https://github.com/briskets/CVE-2021-3493",
"description": "Ubuntu OverlayFS Local Privesc",
"stargazers_count": 417,
"forks_count": 138,
"created_at": "2021-04-19T20:07:01Z"
},
{
"name": "CVE-2021-1732-Exploit",
"full_name": "KaLendsi/CVE-2021-1732-Exploit",
"html_url": "https://github.com/KaLendsi/CVE-2021-1732-Exploit",
"description": "CVE-2021-1732 Exploit",
"stargazers_count": 417,
"forks_count": 131,
"created_at": "2021-03-05T02:11:10Z"
},
{
"name": "Grafana-CVE-2021-43798",
"full_name": "jas502n/Grafana-CVE-2021-43798",
"html_url": "https://github.com/jas502n/Grafana-CVE-2021-43798",
"description": "Grafana Unauthorized arbitrary file reading vulnerability",
"stargazers_count": 355,
"forks_count": 89,
"created_at": "2021-12-07T09:02:16Z"
},
{
"name": "CVE-2021-44228_scanner",
"full_name": "CERTCC/CVE-2021-44228_scanner",
"html_url": "https://github.com/CERTCC/CVE-2021-44228_scanner",
"description": "Scanners for Jar files that may be vulnerable to CVE-2021-44228",
"stargazers_count": 345,
"forks_count": 87,
"created_at": "2021-12-14T23:33:51Z"
},
{
"name": "CVE-2021-4034",
"full_name": "PwnFunction/CVE-2021-4034",
"html_url": "https://github.com/PwnFunction/CVE-2021-4034",
"description": "Proof of concept for pwnkit vulnerability",
"stargazers_count": 342,
"forks_count": 43,
"created_at": "2022-01-27T14:43:57Z"
},
{
"name": "CVE-2021-1675-LPE",
"full_name": "hlldz/CVE-2021-1675-LPE",
"html_url": "https://github.com/hlldz/CVE-2021-1675-LPE",
"description": "Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527",
"stargazers_count": 333,
"forks_count": 79,
"created_at": "2021-07-01T09:47:13Z"
},
{
"name": "CVE-2021-26084_Confluence",
"full_name": "hev0x/CVE-2021-26084_Confluence",
"html_url": "https://github.com/hev0x/CVE-2021-26084_Confluence",
"description": "Confluence Server Webwork OGNL injection",
"stargazers_count": 308,
"forks_count": 81,
"created_at": "2021-09-01T07:15:17Z"
},
{
"name": "Linux_LPE_eBPF_CVE-2021-3490",
"full_name": "chompie1337/Linux_LPE_eBPF_CVE-2021-3490",
"html_url": "https://github.com/chompie1337/Linux_LPE_eBPF_CVE-2021-3490",
"description": null,
"stargazers_count": 300,
"forks_count": 49,
"created_at": "2021-06-24T18:50:17Z"
},
{
"name": "CVE-2021-34527",
"full_name": "JohnHammond/CVE-2021-34527",
"html_url": "https://github.com/JohnHammond/CVE-2021-34527",
"description": null,
"stargazers_count": 273,
"forks_count": 68,
"created_at": "2021-07-02T12:10:49Z"
},
{
"name": "CVE-2021-22205",
"full_name": "Al1ex/CVE-2021-22205",
"html_url": "https://github.com/Al1ex/CVE-2021-22205",
"description": "CVE-2021-22205& GitLab CE/EE RCE",
"stargazers_count": 270,
"forks_count": 99,
"created_at": "2021-10-29T04:30:45Z"
},
{
"name": "CVE-2021-21972",
"full_name": "horizon3ai/CVE-2021-21972",
"html_url": "https://github.com/horizon3ai/CVE-2021-21972",
"description": "Proof of Concept Exploit for vCenter CVE-2021-21972",
"stargazers_count": 260,
"forks_count": 85,
"created_at": "2021-02-24T16:31:34Z"
},
{
"name": "CVE-2021-36260",
"full_name": "Aiminsun/CVE-2021-36260",
"html_url": "https://github.com/Aiminsun/CVE-2021-36260",
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
"stargazers_count": 260,
"forks_count": 77,
"created_at": "2021-10-27T15:51:12Z"
},
{
"name": "CVE-2021-21551",
"full_name": "waldo-irc/CVE-2021-21551",
"html_url": "https://github.com/waldo-irc/CVE-2021-21551",
"description": "Exploit to SYSTEM for CVE-2021-21551",
"stargazers_count": 237,
"forks_count": 43,
"created_at": "2021-05-13T13:23:38Z"
},
{
"name": "CVE-2021-38647",
"full_name": "horizon3ai/CVE-2021-38647",
"html_url": "https://github.com/horizon3ai/CVE-2021-38647",
"description": "Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)",
"stargazers_count": 233,
"forks_count": 54,
"created_at": "2021-09-16T02:11:36Z"
},
{
"name": "CVE-2021-24086",
"full_name": "0vercl0k/CVE-2021-24086",
"html_url": "https://github.com/0vercl0k/CVE-2021-24086",
"description": "Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.",
"stargazers_count": 233,
"forks_count": 50,
"created_at": "2021-04-07T11:10:40Z"
},
{
"name": "cve-2021-3449",
"full_name": "riptl/cve-2021-3449",
"html_url": "https://github.com/riptl/cve-2021-3449",
"description": "CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻‍💻",
"stargazers_count": 225,
"forks_count": 39,
"created_at": "2021-03-26T01:09:25Z"
}
]