mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2021/11/10 00:13:05
This commit is contained in:
parent
e4acc210bf
commit
62cdc98374
13 changed files with 114 additions and 51 deletions
|
@ -1709,12 +1709,12 @@
|
|||
"pushed_at": "2019-09-03T20:50:28Z",
|
||||
"stargazers_count": 1089,
|
||||
"watchers_count": 1089,
|
||||
"forks_count": 358,
|
||||
"forks_count": 357,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 358,
|
||||
"forks": 357,
|
||||
"watchers": 1089,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-29T07:08:52Z",
|
||||
"updated_at": "2021-11-08T13:04:45Z",
|
||||
"updated_at": "2021-11-09T21:53:19Z",
|
||||
"pushed_at": "2020-06-13T17:40:14Z",
|
||||
"stargazers_count": 596,
|
||||
"watchers_count": 596,
|
||||
"stargazers_count": 597,
|
||||
"watchers_count": 597,
|
||||
"forks_count": 83,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 83,
|
||||
"watchers": 596,
|
||||
"watchers": 597,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,17 +40,17 @@
|
|||
"description": "CVE-2020-2555 Python POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-06T16:02:59Z",
|
||||
"updated_at": "2021-08-04T22:31:39Z",
|
||||
"updated_at": "2021-11-09T20:01:29Z",
|
||||
"pushed_at": "2020-04-16T12:04:18Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 48,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -279,5 +279,32 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 426353517,
|
||||
"name": "CVE-2021-21985_PoC",
|
||||
"full_name": "sknux\/CVE-2021-21985_PoC",
|
||||
"owner": {
|
||||
"login": "sknux",
|
||||
"id": 45546882,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45546882?v=4",
|
||||
"html_url": "https:\/\/github.com\/sknux"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sknux\/CVE-2021-21985_PoC",
|
||||
"description": "VMWARE VCENTER SERVER VIRTUAL SAN HEALTH CHECK PLUG-IN RCE (CVE-2021-21985) ",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-09T19:06:29Z",
|
||||
"updated_at": "2021-11-09T23:06:09Z",
|
||||
"pushed_at": "2021-11-09T19:14:55Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T15:42:16Z",
|
||||
"updated_at": "2021-11-06T20:57:13Z",
|
||||
"updated_at": "2021-11-09T20:48:25Z",
|
||||
"pushed_at": "2021-11-02T14:45:24Z",
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"stargazers_count": 156,
|
||||
"watchers_count": 156,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 155,
|
||||
"watchers": 156,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -422,16 +422,43 @@
|
|||
"description": "Exploit for GitLab CVE-2021-22205 Unauthenticated Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-05T16:56:06Z",
|
||||
"updated_at": "2021-11-05T17:05:31Z",
|
||||
"updated_at": "2021-11-09T20:47:08Z",
|
||||
"pushed_at": "2021-11-05T17:05:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 426338911,
|
||||
"name": "GitLab-CVE-2021-22205-scanner",
|
||||
"full_name": "faisalfs10x\/GitLab-CVE-2021-22205-scanner",
|
||||
"owner": {
|
||||
"login": "faisalfs10x",
|
||||
"id": 51811615,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51811615?v=4",
|
||||
"html_url": "https:\/\/github.com\/faisalfs10x"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/faisalfs10x\/GitLab-CVE-2021-22205-scanner",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-11-09T18:19:43Z",
|
||||
"updated_at": "2021-11-09T19:09:52Z",
|
||||
"pushed_at": "2021-11-09T19:09:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T15:05:01Z",
|
||||
"updated_at": "2021-09-20T07:58:32Z",
|
||||
"updated_at": "2021-11-09T20:59:58Z",
|
||||
"pushed_at": "2021-09-20T07:58:29Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 31,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-31T18:02:39Z",
|
||||
"updated_at": "2021-11-04T10:05:33Z",
|
||||
"updated_at": "2021-11-09T18:24:47Z",
|
||||
"pushed_at": "2021-06-01T15:08:23Z",
|
||||
"stargazers_count": 198,
|
||||
"watchers_count": 198,
|
||||
"stargazers_count": 199,
|
||||
"watchers_count": 199,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 198,
|
||||
"watchers": 199,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -48,17 +48,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-02T14:50:56Z",
|
||||
"updated_at": "2021-09-15T03:45:37Z",
|
||||
"updated_at": "2021-11-09T18:21:53Z",
|
||||
"pushed_at": "2021-06-02T14:54:14Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-01T22:59:29Z",
|
||||
"updated_at": "2021-11-01T16:02:57Z",
|
||||
"updated_at": "2021-11-09T20:51:09Z",
|
||||
"pushed_at": "2021-09-03T10:24:34Z",
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 63,
|
||||
"watchers": 62,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -121,10 +121,10 @@
|
|||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-27T10:16:35Z",
|
||||
"updated_at": "2021-11-04T11:04:39Z",
|
||||
"updated_at": "2021-11-09T19:17:03Z",
|
||||
"pushed_at": "2021-03-07T04:39:58Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -135,7 +135,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 28,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -229,17 +229,17 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2021-11-09T13:46:54Z",
|
||||
"updated_at": "2021-11-09T18:16:32Z",
|
||||
"pushed_at": "2021-09-11T09:50:26Z",
|
||||
"stargazers_count": 1293,
|
||||
"watchers_count": 1293,
|
||||
"stargazers_count": 1294,
|
||||
"watchers_count": 1294,
|
||||
"forks_count": 417,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 417,
|
||||
"watchers": 1293,
|
||||
"watchers": 1294,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-16T16:17:44Z",
|
||||
"updated_at": "2021-11-08T09:48:11Z",
|
||||
"updated_at": "2021-11-09T22:11:59Z",
|
||||
"pushed_at": "2021-10-24T21:01:29Z",
|
||||
"stargazers_count": 315,
|
||||
"watchers_count": 315,
|
||||
"stargazers_count": 316,
|
||||
"watchers_count": 316,
|
||||
"forks_count": 71,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 71,
|
||||
"watchers": 315,
|
||||
"watchers": 316,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -94,17 +94,24 @@
|
|||
"description": "Checks your files for existence of Unicode BIDI characters which can be misused for supply chain attacks. See CVE-2021-42574 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-06T22:12:35Z",
|
||||
"updated_at": "2021-11-07T00:43:47Z",
|
||||
"pushed_at": "2021-11-07T00:43:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"updated_at": "2021-11-09T22:52:02Z",
|
||||
"pushed_at": "2021-11-09T21:52:58Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"cve-2021-42574",
|
||||
"docker",
|
||||
"rust",
|
||||
"security",
|
||||
"supply-chain-attacks",
|
||||
"unicode-characters"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -788,6 +788,7 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability due to
|
|||
- [testanull/Project_CVE-2021-21985_PoC](https://github.com/testanull/Project_CVE-2021-21985_PoC)
|
||||
- [haiclover/CVE-2021-21985](https://github.com/haiclover/CVE-2021-21985)
|
||||
- [aristosMiliaressis/CVE-2021-21985](https://github.com/aristosMiliaressis/CVE-2021-21985)
|
||||
- [sknux/CVE-2021-21985_PoC](https://github.com/sknux/CVE-2021-21985_PoC)
|
||||
|
||||
### CVE-2021-22005 (2021-09-23)
|
||||
|
||||
|
@ -890,6 +891,7 @@ An issue has been discovered in GitLab CE/EE affecting all versions starting fro
|
|||
- [hh-hunter/cve-2021-22205](https://github.com/hh-hunter/cve-2021-22205)
|
||||
- [X1pe0/Automated-Gitlab-RCE](https://github.com/X1pe0/Automated-Gitlab-RCE)
|
||||
- [runsel/GitLab-CVE-2021-22205-](https://github.com/runsel/GitLab-CVE-2021-22205-)
|
||||
- [faisalfs10x/GitLab-CVE-2021-22205-scanner](https://github.com/faisalfs10x/GitLab-CVE-2021-22205-scanner)
|
||||
|
||||
### CVE-2021-22214 (2021-06-08)
|
||||
|
||||
|
|
Loading…
Reference in a new issue