mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/06/25 12:12:05
This commit is contained in:
parent
79a6cd82ec
commit
3980a5f3d7
22 changed files with 188 additions and 64 deletions
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-10-17T18:11:01Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container",
|
||||
"fork": false,
|
||||
"created_at": "2016-12-26T13:39:03Z",
|
||||
"updated_at": "2021-04-19T15:17:52Z",
|
||||
"updated_at": "2021-06-25T01:23:06Z",
|
||||
"pushed_at": "2019-10-13T12:23:02Z",
|
||||
"stargazers_count": 359,
|
||||
"watchers_count": 359,
|
||||
"stargazers_count": 360,
|
||||
"watchers_count": 360,
|
||||
"forks_count": 143,
|
||||
"forks": 143,
|
||||
"watchers": 359,
|
||||
"watchers": 360,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -358,13 +358,13 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2021-06-24T13:59:39Z",
|
||||
"updated_at": "2021-06-25T02:02:28Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 278,
|
||||
"watchers_count": 278,
|
||||
"stargazers_count": 279,
|
||||
"watchers_count": 279,
|
||||
"forks_count": 99,
|
||||
"forks": 99,
|
||||
"watchers": 278,
|
||||
"watchers": 279,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -159,5 +159,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 380079921,
|
||||
"name": "spectre",
|
||||
"full_name": "raul23\/spectre",
|
||||
"owner": {
|
||||
"login": "raul23",
|
||||
"id": 9953156,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9953156?v=4",
|
||||
"html_url": "https:\/\/github.com\/raul23"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/raul23\/spectre",
|
||||
"description": "Resources for the Spectre vulnerability (CVE-2017-5753 and CVE-2017-5715)",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-25T00:11:51Z",
|
||||
"updated_at": "2021-06-25T00:13:46Z",
|
||||
"pushed_at": "2021-06-25T00:13:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -136,5 +136,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 380079264,
|
||||
"name": "meltdown",
|
||||
"full_name": "raul23\/meltdown",
|
||||
"owner": {
|
||||
"login": "raul23",
|
||||
"id": 9953156,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9953156?v=4",
|
||||
"html_url": "https:\/\/github.com\/raul23"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/raul23\/meltdown",
|
||||
"description": "Resources for the Meltdown vulnerability (CVE-2017-5754)",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-25T00:07:21Z",
|
||||
"updated_at": "2021-06-25T03:01:10Z",
|
||||
"pushed_at": "2021-06-25T03:01:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Remote Command Execution through Unvalidated File Upload in SeedDMS versions <5.1.11",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-24T12:58:02Z",
|
||||
"updated_at": "2021-06-24T18:23:56Z",
|
||||
"pushed_at": "2021-06-24T18:23:53Z",
|
||||
"updated_at": "2021-06-24T23:11:45Z",
|
||||
"pushed_at": "2021-06-24T23:11:43Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -90,5 +90,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 380060753,
|
||||
"name": "Kr00k",
|
||||
"full_name": "raul23\/Kr00k",
|
||||
"owner": {
|
||||
"login": "raul23",
|
||||
"id": 9953156,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9953156?v=4",
|
||||
"html_url": "https:\/\/github.com\/raul23"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/raul23\/Kr00k",
|
||||
"description": "Resources for the Kr00k vulnerability (CVE-2019-15126)",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-24T22:04:42Z",
|
||||
"updated_at": "2021-06-25T02:38:59Z",
|
||||
"pushed_at": "2021-06-25T02:38:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T00:08:27Z",
|
||||
"updated_at": "2021-06-14T08:54:11Z",
|
||||
"updated_at": "2021-06-25T00:34:24Z",
|
||||
"pushed_at": "2020-01-22T20:23:51Z",
|
||||
"stargazers_count": 527,
|
||||
"watchers_count": 527,
|
||||
"stargazers_count": 528,
|
||||
"watchers_count": 528,
|
||||
"forks_count": 124,
|
||||
"forks": 124,
|
||||
"watchers": 527,
|
||||
"watchers": 528,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2021-06-24T13:59:39Z",
|
||||
"updated_at": "2021-06-25T02:02:28Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 278,
|
||||
"watchers_count": 278,
|
||||
"stargazers_count": 279,
|
||||
"watchers_count": 279,
|
||||
"forks_count": 99,
|
||||
"forks": 99,
|
||||
"watchers": 278,
|
||||
"watchers": 279,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC for CVE-2019-5736",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-13T05:26:32Z",
|
||||
"updated_at": "2021-06-24T18:30:58Z",
|
||||
"updated_at": "2021-06-25T02:50:37Z",
|
||||
"pushed_at": "2019-02-19T11:45:13Z",
|
||||
"stargazers_count": 515,
|
||||
"watchers_count": 515,
|
||||
"stargazers_count": 516,
|
||||
"watchers_count": 516,
|
||||
"forks_count": 134,
|
||||
"forks": 134,
|
||||
"watchers": 515,
|
||||
"watchers": 516,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -113,5 +113,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 380101109,
|
||||
"name": "CVE-2020-0041",
|
||||
"full_name": "Byte-Master-101\/CVE-2020-0041",
|
||||
"owner": {
|
||||
"login": "Byte-Master-101",
|
||||
"id": 36032977,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36032977?v=4",
|
||||
"html_url": "https:\/\/github.com\/Byte-Master-101"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Byte-Master-101\/CVE-2020-0041",
|
||||
"description": "My implementation of CVE-2020-0041",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-25T02:19:17Z",
|
||||
"updated_at": "2021-06-25T02:19:52Z",
|
||||
"pushed_at": "2021-06-25T02:19:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Root your MediaTek arm64 device using mtk-su (CVE-2020-0069).",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-06T12:12:48Z",
|
||||
"updated_at": "2021-06-21T15:55:16Z",
|
||||
"updated_at": "2021-06-25T01:18:33Z",
|
||||
"pushed_at": "2021-05-31T21:22:33Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 62,
|
||||
"watchers": 63,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-18T05:15:05Z",
|
||||
"updated_at": "2021-05-30T16:51:25Z",
|
||||
"updated_at": "2021-06-25T00:43:56Z",
|
||||
"pushed_at": "2021-03-17T11:29:58Z",
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 94,
|
||||
"watchers": 95,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-1938",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T16:32:52Z",
|
||||
"updated_at": "2021-05-31T13:23:17Z",
|
||||
"updated_at": "2021-06-25T01:41:23Z",
|
||||
"pushed_at": "2020-02-25T02:04:16Z",
|
||||
"stargazers_count": 226,
|
||||
"watchers_count": 226,
|
||||
"stargazers_count": 227,
|
||||
"watchers_count": 227,
|
||||
"forks_count": 95,
|
||||
"forks": 95,
|
||||
"watchers": 226,
|
||||
"watchers": 227,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "CVE-2021-21985 VMware vCenter Server远程代码执行漏洞 EXP (更新可回显EXP)",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-03T09:59:21Z",
|
||||
"updated_at": "2021-06-24T15:02:47Z",
|
||||
"updated_at": "2021-06-25T02:28:57Z",
|
||||
"pushed_at": "2021-06-09T10:13:56Z",
|
||||
"stargazers_count": 227,
|
||||
"watchers_count": 227,
|
||||
"forks_count": 38,
|
||||
"forks": 38,
|
||||
"watchers": 227,
|
||||
"stargazers_count": 228,
|
||||
"watchers_count": 228,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 228,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Apache\/Alibaba Dubbo <= 2.7.3 PoC Code for CVE-2021-25641 RCE via Deserialization of Untrusted Data; Affects Versions <= 2.7.6 With Different Gadgets",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-06T06:41:36Z",
|
||||
"updated_at": "2021-06-24T14:08:01Z",
|
||||
"updated_at": "2021-06-25T00:13:39Z",
|
||||
"pushed_at": "2021-06-06T08:41:19Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-09T15:44:00Z",
|
||||
"updated_at": "2021-06-24T21:14:41Z",
|
||||
"updated_at": "2021-06-25T02:27:15Z",
|
||||
"pushed_at": "2021-06-24T15:29:25Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 10,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "SquirrellyJS mixes pure template data with engine configuration options through the Express render API. By overwriting internal configuration options, remote code execution may be triggered in downstream applications.",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-12T17:09:48Z",
|
||||
"updated_at": "2021-06-13T09:46:38Z",
|
||||
"updated_at": "2021-06-25T01:59:11Z",
|
||||
"pushed_at": "2021-06-12T17:17:41Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-09T06:55:52Z",
|
||||
"updated_at": "2021-06-24T17:13:42Z",
|
||||
"updated_at": "2021-06-25T02:52:54Z",
|
||||
"pushed_at": "2021-06-10T10:31:30Z",
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"watchers": 89,
|
||||
"watchers": 95,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-35475.json
Normal file
25
2021/CVE-2021-35475.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 380110029,
|
||||
"name": "CVE-2021-35475",
|
||||
"full_name": "saitamang\/CVE-2021-35475",
|
||||
"owner": {
|
||||
"login": "saitamang",
|
||||
"id": 41514973,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41514973?v=4",
|
||||
"html_url": "https:\/\/github.com\/saitamang"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/saitamang\/CVE-2021-35475",
|
||||
"description": "Writeup for CVE-2021-35475; Stored Cross-Site Scripting(XSS) on SAS® Environment Manager 2.5",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-25T03:08:44Z",
|
||||
"updated_at": "2021-06-25T03:08:47Z",
|
||||
"pushed_at": "2021-06-25T03:08:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -128,13 +128,13 @@
|
|||
"description": "Privilege escalation with polkit - CVE-2021-3560",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-19T08:15:17Z",
|
||||
"updated_at": "2021-06-24T09:50:54Z",
|
||||
"updated_at": "2021-06-25T01:09:22Z",
|
||||
"pushed_at": "2021-06-20T07:38:13Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1400,6 +1400,9 @@ Tencent GameLoop before 4.1.21.90 downloaded updates over an insecure HTTP conne
|
|||
|
||||
- [mmiszczyk/cve-2021-33879](https://github.com/mmiszczyk/cve-2021-33879)
|
||||
|
||||
### CVE-2021-35475
|
||||
- [saitamang/CVE-2021-35475](https://github.com/saitamang/CVE-2021-35475)
|
||||
|
||||
|
||||
## 2020
|
||||
### CVE-2020-0001 (2020-01-08)
|
||||
|
@ -1441,6 +1444,7 @@ In binder_transaction of binder.c, there is a possible out of bounds write due t
|
|||
- [minutesinch/CVE-2020-0041](https://github.com/minutesinch/CVE-2020-0041)
|
||||
- [minutesinch/CVE-2020-0041-Original](https://github.com/minutesinch/CVE-2020-0041-Original)
|
||||
- [TechnoHT/CVE-2020-0041](https://github.com/TechnoHT/CVE-2020-0041)
|
||||
- [Byte-Master-101/CVE-2020-0041](https://github.com/Byte-Master-101/CVE-2020-0041)
|
||||
|
||||
### CVE-2020-0069 (2020-03-10)
|
||||
|
||||
|
@ -8584,6 +8588,7 @@ An issue was discovered on Broadcom Wi-Fi client devices. Specifically timed and
|
|||
- [hexway/r00kie-kr00kie](https://github.com/hexway/r00kie-kr00kie)
|
||||
- [akabe1/kr00ker](https://github.com/akabe1/kr00ker)
|
||||
- [mustafasevim/kr00k-vulnerability](https://github.com/mustafasevim/kr00k-vulnerability)
|
||||
- [raul23/Kr00k](https://github.com/raul23/Kr00k)
|
||||
|
||||
### CVE-2019-15224 (2019-08-19)
|
||||
|
||||
|
@ -13257,6 +13262,7 @@ Systems with microprocessors utilizing speculative execution and branch predicti
|
|||
- [ixtal23/spectreScope](https://github.com/ixtal23/spectreScope)
|
||||
- [albertleecn/cve-2017-5753](https://github.com/albertleecn/cve-2017-5753)
|
||||
- [sachinthaBS/Spectre-Vulnerability-CVE-2017-5753-](https://github.com/sachinthaBS/Spectre-Vulnerability-CVE-2017-5753-)
|
||||
- [raul23/spectre](https://github.com/raul23/spectre)
|
||||
|
||||
### CVE-2017-5754 (2018-01-04)
|
||||
|
||||
|
@ -13270,6 +13276,7 @@ Systems with microprocessors utilizing speculative execution and indirect branch
|
|||
- [speecyy/Am-I-affected-by-Meltdown](https://github.com/speecyy/Am-I-affected-by-Meltdown)
|
||||
- [zzado/Meltdown](https://github.com/zzado/Meltdown)
|
||||
- [jdmulloy/meltdown-aws-scanner](https://github.com/jdmulloy/meltdown-aws-scanner)
|
||||
- [raul23/meltdown](https://github.com/raul23/meltdown)
|
||||
|
||||
### CVE-2017-5792 (2018-02-15)
|
||||
|
||||
|
|
Loading…
Reference in a new issue