mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2021/11/24 00:13:07
This commit is contained in:
parent
632c20f85c
commit
d862e5e11a
16 changed files with 76 additions and 71 deletions
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2011-10-04T14:55:01Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 25,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"forks": 24,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1709,12 +1709,12 @@
|
|||
"pushed_at": "2019-09-03T20:50:28Z",
|
||||
"stargazers_count": 1089,
|
||||
"watchers_count": 1089,
|
||||
"forks_count": 355,
|
||||
"forks_count": 354,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 355,
|
||||
"forks": 354,
|
||||
"watchers": 1089,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -121,32 +121,5 @@
|
|||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 429994774,
|
||||
"name": "adamyordan",
|
||||
"full_name": "FoxxD3Vza\/adamyordan",
|
||||
"owner": {
|
||||
"login": "FoxxD3Vza",
|
||||
"id": 94728593,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94728593?v=4",
|
||||
"html_url": "https:\/\/github.com\/FoxxD3Vza"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/FoxxD3Vza\/adamyordan",
|
||||
"description": "Jenkins RCE Proof-of-Concept: SECURITY-1266 \/ CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy)…",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-20T03:06:01Z",
|
||||
"updated_at": "2021-11-20T03:06:05Z",
|
||||
"pushed_at": "2021-11-20T03:06:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Enjoy hacking ;)",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-25T11:03:52Z",
|
||||
"updated_at": "2021-10-24T08:35:04Z",
|
||||
"updated_at": "2021-11-23T22:53:52Z",
|
||||
"pushed_at": "2019-12-25T11:20:19Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,14 +17,14 @@
|
|||
"pushed_at": "2020-03-05T12:29:18Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2019-18426"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"forks": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Zimbra邮件系统漏洞 XXE\/RCE\/SSRF\/Upload GetShell Exploit 1. (CVE-2019-9621 Zimbra<8.8.11 XXE GetShell Exploit)",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-06T15:47:20Z",
|
||||
"updated_at": "2021-11-14T07:52:39Z",
|
||||
"updated_at": "2021-11-23T23:09:47Z",
|
||||
"pushed_at": "2019-05-08T16:22:58Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -35,7 +35,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 59,
|
||||
"watchers": 60,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-04-07T01:17:32Z",
|
||||
"updated_at": "2021-11-17T01:12:28Z",
|
||||
"updated_at": "2021-11-23T22:35:40Z",
|
||||
"pushed_at": "2021-02-21T00:29:05Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Regular expression matching for URL's. Maintained, safe, and browser-friendly version of url-regex. Resolves CVE-2020-7661 for Node.js servers.",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-15T07:42:50Z",
|
||||
"updated_at": "2021-11-23T17:46:57Z",
|
||||
"pushed_at": "2021-11-23T17:46:54Z",
|
||||
"updated_at": "2021-11-23T20:32:26Z",
|
||||
"pushed_at": "2021-11-23T20:32:22Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 10,
|
||||
|
|
|
@ -44,12 +44,12 @@
|
|||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1459,
|
||||
"watchers_count": 1459,
|
||||
"forks_count": 537,
|
||||
"forks_count": 538,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 537,
|
||||
"forks": 538,
|
||||
"watchers": 1459,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-16T16:55:46Z",
|
||||
"updated_at": "2021-11-07T17:17:00Z",
|
||||
"updated_at": "2021-11-23T22:35:55Z",
|
||||
"pushed_at": "2021-02-16T16:59:09Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 26,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -943,5 +943,32 @@
|
|||
"forks": 3,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 431232449,
|
||||
"name": "conflucheck",
|
||||
"full_name": "quesodipesto\/conflucheck",
|
||||
"owner": {
|
||||
"login": "quesodipesto",
|
||||
"id": 13822638,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13822638?v=4",
|
||||
"html_url": "https:\/\/github.com\/quesodipesto"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/quesodipesto\/conflucheck",
|
||||
"description": "Python 3 script to identify CVE-2021-26084 via network requests.",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-23T19:45:31Z",
|
||||
"updated_at": "2021-11-23T19:54:29Z",
|
||||
"pushed_at": "2021-11-23T19:54:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "PoC for CVE-2021-3492 used at Pwn2Own 2021",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-28T09:43:31Z",
|
||||
"updated_at": "2021-10-11T17:45:11Z",
|
||||
"updated_at": "2021-11-23T19:32:07Z",
|
||||
"pushed_at": "2021-08-03T14:48:27Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 31,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "ACE poc exploit for glibc cpio 2.13 through mmap chunk metadata curruption (CVE-2021-38185)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-19T20:10:13Z",
|
||||
"updated_at": "2021-11-10T10:08:49Z",
|
||||
"updated_at": "2021-11-23T21:24:06Z",
|
||||
"pushed_at": "2021-08-11T08:59:33Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": "POC to test the BootROM vulnerability found in LPC55S69 and K82 Series ",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-23T15:44:42Z",
|
||||
"updated_at": "2021-11-23T15:44:49Z",
|
||||
"pushed_at": "2021-11-23T15:44:43Z",
|
||||
"updated_at": "2021-11-23T19:36:34Z",
|
||||
"pushed_at": "2021-11-23T19:36:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-16T16:17:44Z",
|
||||
"updated_at": "2021-11-22T10:45:58Z",
|
||||
"updated_at": "2021-11-23T18:33:19Z",
|
||||
"pushed_at": "2021-11-11T17:09:56Z",
|
||||
"stargazers_count": 338,
|
||||
"watchers_count": 338,
|
||||
"forks_count": 74,
|
||||
"stargazers_count": 339,
|
||||
"watchers_count": 339,
|
||||
"forks_count": 75,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 74,
|
||||
"watchers": 338,
|
||||
"forks": 75,
|
||||
"watchers": 339,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1228,6 +1228,7 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
|
|||
- [oxctdev/CVE-2021-26084](https://github.com/oxctdev/CVE-2021-26084)
|
||||
- [Jun-5heng/CVE-2021-26084](https://github.com/Jun-5heng/CVE-2021-26084)
|
||||
- [lleavesl/CVE-2021-26084](https://github.com/lleavesl/CVE-2021-26084)
|
||||
- [quesodipesto/conflucheck](https://github.com/quesodipesto/conflucheck)
|
||||
|
||||
### CVE-2021-26085 (2021-08-02)
|
||||
|
||||
|
@ -2620,7 +2621,12 @@ Inappropriate implementation in Sandbox in Google Chrome prior to 94.0.4606.81 a
|
|||
|
||||
- [ZeusBox/CVE-2021-37980](https://github.com/ZeusBox/CVE-2021-37980)
|
||||
|
||||
### CVE-2021-38001
|
||||
### CVE-2021-38001 (2021-11-23)
|
||||
|
||||
<code>
|
||||
Type confusion in V8 in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
||||
</code>
|
||||
|
||||
- [Peterpan0927/TFC-Chrome-v8-bug-CVE-2021-38001-poc](https://github.com/Peterpan0927/TFC-Chrome-v8-bug-CVE-2021-38001-poc)
|
||||
|
||||
### CVE-2021-38149 (2021-08-06)
|
||||
|
@ -11944,7 +11950,6 @@ A sandbox bypass vulnerability exists in Script Security Plugin 1.49 and earlier
|
|||
- [adamyordan/cve-2019-1003000-jenkins-rce-poc](https://github.com/adamyordan/cve-2019-1003000-jenkins-rce-poc)
|
||||
- [0xtavian/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins](https://github.com/0xtavian/CVE-2019-1003000-and-CVE-2018-1999002-Pre-Auth-RCE-Jenkins)
|
||||
- [1NTheKut/CVE-2019-1003000_RCE-DETECTION](https://github.com/1NTheKut/CVE-2019-1003000_RCE-DETECTION)
|
||||
- [FoxxD3Vza/adamyordan](https://github.com/FoxxD3Vza/adamyordan)
|
||||
|
||||
### CVE-2019-1010054 (2019-07-18)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue