mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2021/05/03 12:11:15
This commit is contained in:
parent
0313bc2f10
commit
ca9d6bcf9d
9 changed files with 99 additions and 18 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-16T19:44:04Z",
|
||||
"updated_at": "2021-04-26T18:51:24Z",
|
||||
"updated_at": "2021-05-03T01:50:26Z",
|
||||
"pushed_at": "2019-07-23T19:24:01Z",
|
||||
"stargazers_count": 276,
|
||||
"watchers_count": 276,
|
||||
"stargazers_count": 277,
|
||||
"watchers_count": 277,
|
||||
"forks_count": 110,
|
||||
"forks": 110,
|
||||
"watchers": 276,
|
||||
"watchers": 277,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2018/CVE-2018-17463.json
Normal file
25
2018/CVE-2018-17463.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 363765446,
|
||||
"name": "CVE-2018-17463",
|
||||
"full_name": "kdmarti2\/CVE-2018-17463",
|
||||
"owner": {
|
||||
"login": "kdmarti2",
|
||||
"id": 2709377,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2709377?v=4",
|
||||
"html_url": "https:\/\/github.com\/kdmarti2"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kdmarti2\/CVE-2018-17463",
|
||||
"description": "Completed a working exploit for CVE-2018-17463 for fun.",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-02T22:44:33Z",
|
||||
"updated_at": "2021-05-02T22:53:44Z",
|
||||
"pushed_at": "2021-05-02T22:53:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -128,13 +128,13 @@
|
|||
"description": "DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-23T20:58:40Z",
|
||||
"updated_at": "2021-04-24T20:27:00Z",
|
||||
"updated_at": "2021-05-03T01:41:19Z",
|
||||
"pushed_at": "2018-10-11T16:54:31Z",
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"watchers": 82,
|
||||
"watchers": 83,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -887,13 +887,13 @@
|
|||
"description": "CVE-2019-0708 远程代码执行漏洞批量检测",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-21T05:38:54Z",
|
||||
"updated_at": "2021-01-13T19:58:11Z",
|
||||
"updated_at": "2021-05-02T23:57:01Z",
|
||||
"pushed_at": "2019-05-30T02:43:06Z",
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 78,
|
||||
"watchers": 79,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 295868190,
|
||||
"name": "UserEnumJira",
|
||||
"full_name": "und3sc0n0c1d0\/UserEnumJira",
|
||||
"owner": {
|
||||
"login": "und3sc0n0c1d0",
|
||||
"id": 32236059,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32236059?v=4",
|
||||
"html_url": "https:\/\/github.com\/und3sc0n0c1d0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/und3sc0n0c1d0\/UserEnumJira",
|
||||
"description": "Serie de scripts para enumerar nombres de usuarios de JIRA a partir de vulnerabilidades conocidas (CVE-2020-14181, CVE-2019-3403, CVE-2019-8449...)",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-15T23:00:03Z",
|
||||
"updated_at": "2021-05-03T00:39:20Z",
|
||||
"pushed_at": "2021-05-03T00:39:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 349235683,
|
||||
"name": "CVE-2019-3403",
|
||||
|
|
|
@ -1,4 +1,27 @@
|
|||
[
|
||||
{
|
||||
"id": 295868190,
|
||||
"name": "UserEnumJira",
|
||||
"full_name": "und3sc0n0c1d0\/UserEnumJira",
|
||||
"owner": {
|
||||
"login": "und3sc0n0c1d0",
|
||||
"id": 32236059,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32236059?v=4",
|
||||
"html_url": "https:\/\/github.com\/und3sc0n0c1d0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/und3sc0n0c1d0\/UserEnumJira",
|
||||
"description": "Serie de scripts para enumerar nombres de usuarios de JIRA a partir de vulnerabilidades conocidas (CVE-2020-14181, CVE-2019-3403, CVE-2019-8449...)",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-15T23:00:03Z",
|
||||
"updated_at": "2021-05-03T00:39:20Z",
|
||||
"pushed_at": "2021-05-03T00:39:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 307446561,
|
||||
"name": "CVE-2020-14181",
|
||||
|
|
|
@ -1025,13 +1025,13 @@
|
|||
"description": "CVE-2021-3156 - Sudo Baron Samedit",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-29T06:29:26Z",
|
||||
"updated_at": "2021-05-02T07:38:12Z",
|
||||
"updated_at": "2021-05-03T01:33:33Z",
|
||||
"pushed_at": "2021-04-29T16:26:45Z",
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 64,
|
||||
"watchers": 67,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-04-20T00:46:14Z",
|
||||
"stargazers_count": 156,
|
||||
"watchers_count": 156,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"forks_count": 50,
|
||||
"forks": 50,
|
||||
"watchers": 156,
|
||||
"score": 0
|
||||
},
|
||||
|
|
10
README.md
10
README.md
|
@ -3628,6 +3628,7 @@ Affected versions of Atlassian Jira Server and Data Center allow remote, unauthe
|
|||
Affected versions of Atlassian Jira Server and Data Center allow an unauthenticated user to enumerate users via an Information Disclosure vulnerability in the /ViewUserHover.jspa endpoint. The affected versions are before version 7.13.6, from version 8.0.0 before 8.5.7, and from version 8.6.0 before 8.12.0.
|
||||
</code>
|
||||
|
||||
- [und3sc0n0c1d0/UserEnumJira](https://github.com/und3sc0n0c1d0/UserEnumJira)
|
||||
- [Rival420/CVE-2020-14181](https://github.com/Rival420/CVE-2020-14181)
|
||||
- [bk-rao/CVE-2020-14181](https://github.com/bk-rao/CVE-2020-14181)
|
||||
|
||||
|
@ -5901,6 +5902,7 @@ Confluence Server and Data Center had a path traversal vulnerability in the down
|
|||
The /rest/api/2/user/picker rest resource in Jira before version 7.13.3, from version 8.0.0 before version 8.0.4, and from version 8.1.0 before version 8.1.1 allows remote attackers to enumerate usernames via an incorrect authorisation check.
|
||||
</code>
|
||||
|
||||
- [und3sc0n0c1d0/UserEnumJira](https://github.com/und3sc0n0c1d0/UserEnumJira)
|
||||
- [davidmckennirey/CVE-2019-3403](https://github.com/davidmckennirey/CVE-2019-3403)
|
||||
|
||||
### CVE-2019-3462 (2019-01-28)
|
||||
|
@ -11511,6 +11513,14 @@ Git before 2.14.5, 2.15.x before 2.15.3, 2.16.x before 2.16.5, 2.17.x before 2.1
|
|||
- [799600966/CVE-2018-17456](https://github.com/799600966/CVE-2018-17456)
|
||||
- [AnonymKing/CVE-2018-17456](https://github.com/AnonymKing/CVE-2018-17456)
|
||||
|
||||
### CVE-2018-17463 (2018-11-14)
|
||||
|
||||
<code>
|
||||
Incorrect side effect annotation in V8 in Google Chrome prior to 70.0.3538.64 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
|
||||
</code>
|
||||
|
||||
- [kdmarti2/CVE-2018-17463](https://github.com/kdmarti2/CVE-2018-17463)
|
||||
|
||||
### CVE-2018-17873 (2018-10-23)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue