mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/03/01 00:08:48
This commit is contained in:
parent
c0a0733c7e
commit
5657cf85d6
16 changed files with 100 additions and 67 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2018-4248: Out-of-bounds read in libxpc during string serialization.",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-10T04:31:38Z",
|
||||
"updated_at": "2020-03-17T04:31:39Z",
|
||||
"updated_at": "2021-02-28T13:22:50Z",
|
||||
"pushed_at": "2018-07-10T00:05:46Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 46,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2018-4280: Mach port replacement vulnerability in launchd on iOS 11.2.6 leading to sandbox escape, privilege escalation, and codesigning bypass.",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-23T00:19:05Z",
|
||||
"updated_at": "2021-01-26T00:45:25Z",
|
||||
"updated_at": "2021-02-28T13:31:57Z",
|
||||
"pushed_at": "2018-11-13T00:26:18Z",
|
||||
"stargazers_count": 211,
|
||||
"watchers_count": 211,
|
||||
"stargazers_count": 212,
|
||||
"watchers_count": 212,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"watchers": 211,
|
||||
"watchers": 212,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Arbitrary code execution with kernel privileges using CVE-2018-8897.",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-13T19:34:17Z",
|
||||
"updated_at": "2021-02-23T22:11:11Z",
|
||||
"updated_at": "2021-02-28T14:26:43Z",
|
||||
"pushed_at": "2018-05-18T12:26:53Z",
|
||||
"stargazers_count": 374,
|
||||
"watchers_count": 374,
|
||||
"stargazers_count": 378,
|
||||
"watchers_count": 378,
|
||||
"forks_count": 107,
|
||||
"forks": 107,
|
||||
"watchers": 374,
|
||||
"watchers": 378,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2021-02-28T04:47:32Z",
|
||||
"updated_at": "2021-02-28T14:17:57Z",
|
||||
"pushed_at": "2020-04-26T10:49:25Z",
|
||||
"stargazers_count": 720,
|
||||
"watchers_count": 720,
|
||||
"stargazers_count": 721,
|
||||
"watchers_count": 721,
|
||||
"forks_count": 151,
|
||||
"forks": 151,
|
||||
"watchers": 720,
|
||||
"watchers": 721,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-08-10T21:34:16Z",
|
||||
"updated_at": "2020-11-16T05:31:22Z",
|
||||
"updated_at": "2021-02-28T11:22:33Z",
|
||||
"pushed_at": "2021-02-18T04:17:07Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -887,13 +887,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2021-02-27T01:02:35Z",
|
||||
"updated_at": "2021-02-28T12:56:56Z",
|
||||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1087,
|
||||
"watchers_count": 1087,
|
||||
"stargazers_count": 1088,
|
||||
"watchers_count": 1088,
|
||||
"forks_count": 359,
|
||||
"forks": 359,
|
||||
"watchers": 1087,
|
||||
"watchers": 1088,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -128,13 +128,13 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2021-02-23T13:31:12Z",
|
||||
"updated_at": "2021-02-28T12:58:48Z",
|
||||
"pushed_at": "2020-10-15T18:31:15Z",
|
||||
"stargazers_count": 287,
|
||||
"watchers_count": 287,
|
||||
"stargazers_count": 288,
|
||||
"watchers_count": 288,
|
||||
"forks_count": 94,
|
||||
"forks": 94,
|
||||
"watchers": 287,
|
||||
"watchers": 288,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC of CVE",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-27T08:18:56Z",
|
||||
"updated_at": "2020-12-22T07:51:17Z",
|
||||
"updated_at": "2021-02-28T09:16:36Z",
|
||||
"pushed_at": "2020-03-08T05:53:47Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 22,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-16T16:55:46Z",
|
||||
"updated_at": "2021-02-24T09:04:01Z",
|
||||
"updated_at": "2021-02-28T09:32:57Z",
|
||||
"pushed_at": "2021-02-16T16:59:09Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T09:56:21Z",
|
||||
"updated_at": "2021-02-27T15:46:58Z",
|
||||
"updated_at": "2021-02-28T10:58:54Z",
|
||||
"pushed_at": "2021-02-26T03:17:57Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"forks_count": 50,
|
||||
"forks": 50,
|
||||
"watchers": 73,
|
||||
"watchers": 74,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2021-21972 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T11:14:58Z",
|
||||
"updated_at": "2021-02-28T08:08:44Z",
|
||||
"updated_at": "2021-02-28T14:03:03Z",
|
||||
"pushed_at": "2021-02-28T03:59:59Z",
|
||||
"stargazers_count": 172,
|
||||
"watchers_count": 172,
|
||||
"stargazers_count": 174,
|
||||
"watchers_count": 174,
|
||||
"forks_count": 63,
|
||||
"forks": 63,
|
||||
"watchers": 172,
|
||||
"watchers": 174,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "Proof of Concept Exploit for vCenter CVE-2021-21972",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T16:31:34Z",
|
||||
"updated_at": "2021-02-28T01:54:09Z",
|
||||
"updated_at": "2021-02-28T11:42:48Z",
|
||||
"pushed_at": "2021-02-25T16:05:02Z",
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 72,
|
||||
"watchers": 73,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -155,8 +155,8 @@
|
|||
"pushed_at": "2021-02-25T05:49:19Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Chaining CVE-2021-25281 and CVE-2021-25282 to exploit a SaltStack",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-26T12:08:25Z",
|
||||
"updated_at": "2021-02-27T20:39:14Z",
|
||||
"updated_at": "2021-02-28T14:16:43Z",
|
||||
"pushed_at": "2021-02-26T14:49:46Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-26119.json
Normal file
25
2021/CVE-2021-26119.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 343119938,
|
||||
"name": "CVE-2021-26119",
|
||||
"full_name": "Udyz\/CVE-2021-26119",
|
||||
"owner": {
|
||||
"login": "Udyz",
|
||||
"id": 39673284,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39673284?v=4",
|
||||
"html_url": "https:\/\/github.com\/Udyz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Udyz\/CVE-2021-26119",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-28T14:05:23Z",
|
||||
"updated_at": "2021-02-28T14:25:27Z",
|
||||
"pushed_at": "2021-02-28T14:25:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "RCE in NPM VSCode Extention",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-14T14:01:04Z",
|
||||
"updated_at": "2021-02-26T06:54:30Z",
|
||||
"updated_at": "2021-02-28T13:14:54Z",
|
||||
"pushed_at": "2021-02-14T14:01:40Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -335,13 +335,13 @@
|
|||
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T03:22:04Z",
|
||||
"updated_at": "2021-02-27T15:51:04Z",
|
||||
"updated_at": "2021-02-28T11:57:13Z",
|
||||
"pushed_at": "2021-02-08T03:42:50Z",
|
||||
"stargazers_count": 357,
|
||||
"watchers_count": 357,
|
||||
"stargazers_count": 358,
|
||||
"watchers_count": 358,
|
||||
"forks_count": 94,
|
||||
"forks": 94,
|
||||
"watchers": 357,
|
||||
"watchers": 358,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-3378 | FortiLogger - Unauthenticated Arbitrary File Upload (Metasploit)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T23:47:14Z",
|
||||
"updated_at": "2021-02-27T20:39:18Z",
|
||||
"pushed_at": "2021-02-26T14:31:00Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"updated_at": "2021-02-28T13:47:42Z",
|
||||
"pushed_at": "2021-02-28T13:47:41Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -274,6 +274,14 @@ Apache Druid includes the ability to execute user-provided JavaScript code embed
|
|||
- [AirEvan/CVE-2021-25646-GUI](https://github.com/AirEvan/CVE-2021-25646-GUI)
|
||||
- [Vulnmachines/Apache-Druid-CVE-2021-25646](https://github.com/Vulnmachines/Apache-Druid-CVE-2021-25646)
|
||||
|
||||
### CVE-2021-26119 (2021-02-21)
|
||||
|
||||
<code>
|
||||
Smarty before 3.1.39 allows a Sandbox Escape because $smarty.template_object can be accessed in sandbox mode.
|
||||
</code>
|
||||
|
||||
- [Udyz/CVE-2021-26119](https://github.com/Udyz/CVE-2021-26119)
|
||||
|
||||
### CVE-2021-26121
|
||||
- [sourceincite/CVE-2021-26121](https://github.com/sourceincite/CVE-2021-26121)
|
||||
|
||||
|
|
Loading…
Reference in a new issue