mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-26 17:44:10 +01:00
Auto Update 2022/02/22 00:15:26
This commit is contained in:
parent
0ccee262a6
commit
0b99cc00b6
20 changed files with 195 additions and 128 deletions
|
@ -44,12 +44,12 @@
|
|||
"pushed_at": "2018-08-14T07:47:02Z",
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"forks_count": 25,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"forks": 26,
|
||||
"watchers": 85,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -44,12 +44,12 @@
|
|||
"pushed_at": "2021-11-10T21:19:47Z",
|
||||
"stargazers_count": 231,
|
||||
"watchers_count": 231,
|
||||
"forks_count": 67,
|
||||
"forks_count": 68,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 67,
|
||||
"forks": 68,
|
||||
"watchers": 231,
|
||||
"score": 0
|
||||
},
|
||||
|
|
29
2019/CVE-2019-7406.json
Normal file
29
2019/CVE-2019-7406.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 462035961,
|
||||
"name": "alonzzzo",
|
||||
"full_name": "Alonzozzz\/alonzzzo",
|
||||
"owner": {
|
||||
"login": "Alonzozzz",
|
||||
"id": 100165245,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100165245?v=4",
|
||||
"html_url": "https:\/\/github.com\/Alonzozzz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Alonzozzz\/alonzzzo",
|
||||
"description": "Changelog CVE-2021-33044,CVE-2021-33045 Identity authentication bypass vulnerability found in some Dahua products CVE-2021-27248,CVE-2021-27249,CVE-2021-27250,CVE-2021-34860,CVE-2021-34861,CVE-2021-34862,CVE-2021-34863 Multiple vulnerabilities in DAP-2020 H\/W rev. Ax with F\/W v1.01 and below HTTP Path Traversal CVE-2019-7406 RCE vulnerability in TP-Link Wi-Fi Extenders via a malformed user agent field in HTTP headers CVE-2020-2501,CVE-2021-28797 Stack Buffer Overflow in QNAP Surveillance Station CVE-2021-34730 Critical UPnP Service Flaw on Cisco Small Business RV Series Routers CVE-2020-35785 Multiple HTTP authentication vulnerabilities on DGN2200v1",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-21T21:22:43Z",
|
||||
"updated_at": "2022-02-21T21:22:43Z",
|
||||
"pushed_at": "2022-02-21T21:23:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2020/CVE-2020-2501.json
Normal file
29
2020/CVE-2020-2501.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 462035961,
|
||||
"name": "alonzzzo",
|
||||
"full_name": "Alonzozzz\/alonzzzo",
|
||||
"owner": {
|
||||
"login": "Alonzozzz",
|
||||
"id": 100165245,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100165245?v=4",
|
||||
"html_url": "https:\/\/github.com\/Alonzozzz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Alonzozzz\/alonzzzo",
|
||||
"description": "Changelog CVE-2021-33044,CVE-2021-33045 Identity authentication bypass vulnerability found in some Dahua products CVE-2021-27248,CVE-2021-27249,CVE-2021-27250,CVE-2021-34860,CVE-2021-34861,CVE-2021-34862,CVE-2021-34863 Multiple vulnerabilities in DAP-2020 H\/W rev. Ax with F\/W v1.01 and below HTTP Path Traversal CVE-2019-7406 RCE vulnerability in TP-Link Wi-Fi Extenders via a malformed user agent field in HTTP headers CVE-2020-2501,CVE-2021-28797 Stack Buffer Overflow in QNAP Surveillance Station CVE-2021-34730 Critical UPnP Service Flaw on Cisco Small Business RV Series Routers CVE-2020-35785 Multiple HTTP authentication vulnerabilities on DGN2200v1",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-21T21:22:43Z",
|
||||
"updated_at": "2022-02-21T21:22:43Z",
|
||||
"pushed_at": "2022-02-21T21:23:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2021-08-24T15:02:19Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -235,7 +235,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-02-07T10:59:36Z",
|
||||
"updated_at": "2022-02-07T12:49:21Z",
|
||||
"pushed_at": "2022-02-07T23:28:25Z",
|
||||
"pushed_at": "2022-02-21T23:50:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2021-1965 WiFi Zero Click RCE Trigger PoC",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-18T14:19:58Z",
|
||||
"updated_at": "2022-02-21T17:44:17Z",
|
||||
"updated_at": "2022-02-21T22:55:18Z",
|
||||
"pushed_at": "2022-02-19T13:52:32Z",
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 95,
|
||||
"watchers": 103,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Python exploit for the CVE-2021-22204 vulnerability in Exiftool",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-11T18:45:07Z",
|
||||
"updated_at": "2022-02-21T01:10:54Z",
|
||||
"updated_at": "2022-02-21T21:34:36Z",
|
||||
"pushed_at": "2021-05-20T21:42:43Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -26,7 +26,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 46,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -67,5 +67,32 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 462021959,
|
||||
"name": "CVE-2021-27965-Win10-20H2-x64",
|
||||
"full_name": "Leo-Security\/CVE-2021-27965-Win10-20H2-x64",
|
||||
"owner": {
|
||||
"login": "Leo-Security",
|
||||
"id": 82122352,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82122352?v=4",
|
||||
"html_url": "https:\/\/github.com\/Leo-Security"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Leo-Security\/CVE-2021-27965-Win10-20H2-x64",
|
||||
"description": "A repository housing the exploit code for CVE-2021-27965, a stack-buffer overflow vulnerability in MsIo.sys.",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-21T20:31:17Z",
|
||||
"updated_at": "2022-02-21T20:31:17Z",
|
||||
"pushed_at": "2022-02-21T20:31:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -52,5 +52,32 @@
|
|||
"forks": 5,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 462035961,
|
||||
"name": "alonzzzo",
|
||||
"full_name": "Alonzozzz\/alonzzzo",
|
||||
"owner": {
|
||||
"login": "Alonzozzz",
|
||||
"id": 100165245,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100165245?v=4",
|
||||
"html_url": "https:\/\/github.com\/Alonzozzz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Alonzozzz\/alonzzzo",
|
||||
"description": "Changelog CVE-2021-33044,CVE-2021-33045 Identity authentication bypass vulnerability found in some Dahua products CVE-2021-27248,CVE-2021-27249,CVE-2021-27250,CVE-2021-34860,CVE-2021-34861,CVE-2021-34862,CVE-2021-34863 Multiple vulnerabilities in DAP-2020 H\/W rev. Ax with F\/W v1.01 and below HTTP Path Traversal CVE-2019-7406 RCE vulnerability in TP-Link Wi-Fi Extenders via a malformed user agent field in HTTP headers CVE-2020-2501,CVE-2021-28797 Stack Buffer Overflow in QNAP Surveillance Station CVE-2021-34730 Critical UPnP Service Flaw on Cisco Small Business RV Series Routers CVE-2020-35785 Multiple HTTP authentication vulnerabilities on DGN2200v1",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-21T21:22:43Z",
|
||||
"updated_at": "2022-02-21T21:22:43Z",
|
||||
"pushed_at": "2022-02-21T21:23:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-24T18:50:17Z",
|
||||
"updated_at": "2022-02-09T20:30:46Z",
|
||||
"updated_at": "2022-02-21T19:41:00Z",
|
||||
"pushed_at": "2021-08-25T19:26:21Z",
|
||||
"stargazers_count": 212,
|
||||
"watchers_count": 212,
|
||||
"stargazers_count": 213,
|
||||
"watchers_count": 213,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 43,
|
||||
"watchers": 212,
|
||||
"watchers": 213,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -184,17 +184,17 @@
|
|||
"description": "Privilege escalation with polkit - CVE-2021-3560",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-19T08:15:17Z",
|
||||
"updated_at": "2022-02-20T06:59:48Z",
|
||||
"updated_at": "2022-02-21T22:30:03Z",
|
||||
"pushed_at": "2021-06-20T07:38:13Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 36,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -311,5 +311,32 @@
|
|||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 462040432,
|
||||
"name": "Vivald0x6f",
|
||||
"full_name": "Nosferatuvjr\/Vivald0x6f",
|
||||
"owner": {
|
||||
"login": "Nosferatuvjr",
|
||||
"id": 67665267,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67665267?v=4",
|
||||
"html_url": "https:\/\/github.com\/Nosferatuvjr"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Nosferatuvjr\/Vivald0x6f",
|
||||
"description": "CVE-2021-3560 Polkit v0.105-26 Linux Privilege Escalation PoC by Vivald0x6f",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-21T21:39:29Z",
|
||||
"updated_at": "2022-02-21T21:51:04Z",
|
||||
"pushed_at": "2022-02-21T22:37:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -26,33 +26,6 @@
|
|||
"watchers": 1370,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 405716870,
|
||||
"name": "CVE-2021-40444_builders",
|
||||
"full_name": "aslitsecurity\/CVE-2021-40444_builders",
|
||||
"owner": {
|
||||
"login": "aslitsecurity",
|
||||
"id": 9478055,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9478055?v=4",
|
||||
"html_url": "https:\/\/github.com\/aslitsecurity"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/aslitsecurity\/CVE-2021-40444_builders",
|
||||
"description": "This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-12T18:05:53Z",
|
||||
"updated_at": "2022-02-17T13:28:29Z",
|
||||
"pushed_at": "2021-10-11T20:53:19Z",
|
||||
"stargazers_count": 163,
|
||||
"watchers_count": 163,
|
||||
"forks_count": 45,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 45,
|
||||
"watchers": 163,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 406942491,
|
||||
"name": "CVE-2021-40444",
|
||||
|
|
|
@ -255,33 +255,6 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 415041820,
|
||||
"name": "CVE-2021-41773",
|
||||
"full_name": "superzerosec\/CVE-2021-41773",
|
||||
"owner": {
|
||||
"login": "superzerosec",
|
||||
"id": 57648217,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57648217?v=4",
|
||||
"html_url": "https:\/\/github.com\/superzerosec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/superzerosec\/CVE-2021-41773",
|
||||
"description": "POC",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-08T15:40:41Z",
|
||||
"updated_at": "2021-10-11T22:24:14Z",
|
||||
"pushed_at": "2021-10-11T22:24:12Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 415177333,
|
||||
"name": "apachrot",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T15:10:30Z",
|
||||
"updated_at": "2022-02-19T16:15:08Z",
|
||||
"updated_at": "2022-02-21T22:17:12Z",
|
||||
"pushed_at": "2021-12-21T10:11:05Z",
|
||||
"stargazers_count": 735,
|
||||
"watchers_count": 735,
|
||||
"stargazers_count": 736,
|
||||
"watchers_count": 736,
|
||||
"forks_count": 162,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 162,
|
||||
"watchers": 735,
|
||||
"watchers": 736,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -99,10 +99,10 @@
|
|||
"description": "Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T23:15:05Z",
|
||||
"updated_at": "2022-02-17T17:15:29Z",
|
||||
"updated_at": "2022-02-21T20:53:04Z",
|
||||
"pushed_at": "2022-01-13T12:35:19Z",
|
||||
"stargazers_count": 209,
|
||||
"watchers_count": 209,
|
||||
"stargazers_count": 210,
|
||||
"watchers_count": 210,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -111,7 +111,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 209,
|
||||
"watchers": 210,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -98,7 +98,7 @@
|
|||
"pushed_at": "2022-02-05T21:50:38Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 3,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -110,7 +110,7 @@
|
|||
"unicode-characters"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -909,7 +909,7 @@
|
|||
"pushed_at": "2022-01-22T14:55:02Z",
|
||||
"stargazers_count": 1247,
|
||||
"watchers_count": 1247,
|
||||
"forks_count": 331,
|
||||
"forks_count": 332,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -919,7 +919,7 @@
|
|||
"security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 331,
|
||||
"forks": 332,
|
||||
"watchers": 1247,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -4398,7 +4398,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-13T16:04:54Z",
|
||||
"updated_at": "2021-12-21T02:30:06Z",
|
||||
"pushed_at": "2022-01-29T19:00:03Z",
|
||||
"pushed_at": "2022-02-21T23:45:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
@ -4636,7 +4636,7 @@
|
|||
"pushed_at": "2021-12-21T16:01:08Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 4,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -4650,7 +4650,7 @@
|
|||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"forks": 3,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -52,34 +52,5 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 443177434,
|
||||
"name": "CVE-2021-44832",
|
||||
"full_name": "DanielRuf\/CVE-2021-44832",
|
||||
"owner": {
|
||||
"login": "DanielRuf",
|
||||
"id": 827205,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/827205?v=4",
|
||||
"html_url": "https:\/\/github.com\/DanielRuf"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DanielRuf\/CVE-2021-44832",
|
||||
"description": "CVE-2021-44832",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-30T20:24:07Z",
|
||||
"updated_at": "2022-01-01T14:18:33Z",
|
||||
"pushed_at": "2021-12-30T20:28:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2021-44832"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,17 +40,17 @@
|
|||
"description": "cve-2022-23131 exp",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-18T08:38:53Z",
|
||||
"updated_at": "2022-02-21T16:22:40Z",
|
||||
"updated_at": "2022-02-21T22:56:55Z",
|
||||
"pushed_at": "2022-02-21T04:27:48Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 54,
|
||||
"watchers": 55,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
17
README.md
17
README.md
|
@ -764,6 +764,7 @@ It was found that polkit could be tricked into bypassing the credential checks f
|
|||
- [chenaotian/CVE-2021-3560](https://github.com/chenaotian/CVE-2021-3560)
|
||||
- [n3onhacks/CVE-2021-3560](https://github.com/n3onhacks/CVE-2021-3560)
|
||||
- [f4T1H21/CVE-2021-3560-Polkit-DBus](https://github.com/f4T1H21/CVE-2021-3560-Polkit-DBus)
|
||||
- [Nosferatuvjr/Vivald0x6f](https://github.com/Nosferatuvjr/Vivald0x6f)
|
||||
|
||||
### CVE-2021-3572 (2021-11-10)
|
||||
|
||||
|
@ -1975,6 +1976,7 @@ The MsIo64.sys driver before 1.1.19.1016 in MSI Dragon Center before 2.0.98.0 ha
|
|||
|
||||
- [mathisvickie/CVE-2021-27965](https://github.com/mathisvickie/CVE-2021-27965)
|
||||
- [Crystalware/CVE-2021-27965](https://github.com/Crystalware/CVE-2021-27965)
|
||||
- [Leo-Security/CVE-2021-27965-Win10-20H2-x64](https://github.com/Leo-Security/CVE-2021-27965-Win10-20H2-x64)
|
||||
|
||||
### CVE-2021-28079 (2021-04-26)
|
||||
|
||||
|
@ -2457,6 +2459,7 @@ The identity authentication bypass vulnerability found in some Dahua products du
|
|||
|
||||
- [bp2008/DahuaLoginBypass](https://github.com/bp2008/DahuaLoginBypass)
|
||||
- [dorkerdevil/CVE-2021-33044](https://github.com/dorkerdevil/CVE-2021-33044)
|
||||
- [Alonzozzz/alonzzzo](https://github.com/Alonzozzz/alonzzzo)
|
||||
|
||||
### CVE-2021-33558 (2021-05-27)
|
||||
|
||||
|
@ -2829,7 +2832,6 @@ Microsoft MSHTML Remote Code Execution Vulnerability
|
|||
</code>
|
||||
|
||||
- [lockedbyte/CVE-2021-40444](https://github.com/lockedbyte/CVE-2021-40444)
|
||||
- [aslitsecurity/CVE-2021-40444_builders](https://github.com/aslitsecurity/CVE-2021-40444_builders)
|
||||
- [klezVirus/CVE-2021-40444](https://github.com/klezVirus/CVE-2021-40444)
|
||||
- [kal1gh0st/CVE-2021-40444_CAB_archives](https://github.com/kal1gh0st/CVE-2021-40444_CAB_archives)
|
||||
- [factionsypho/TIC4301_Project](https://github.com/factionsypho/TIC4301_Project)
|
||||
|
@ -3013,7 +3015,6 @@ A flaw was found in a change made to path normalization in Apache HTTP Server 2.
|
|||
- [shiomiyan/CVE-2021-41773](https://github.com/shiomiyan/CVE-2021-41773)
|
||||
- [shellreaper/CVE-2021-41773](https://github.com/shellreaper/CVE-2021-41773)
|
||||
- [corelight/CVE-2021-41773](https://github.com/corelight/CVE-2021-41773)
|
||||
- [superzerosec/CVE-2021-41773](https://github.com/superzerosec/CVE-2021-41773)
|
||||
- [im-hanzou/apachrot](https://github.com/im-hanzou/apachrot)
|
||||
- [scarmandef/CVE-2021-41773](https://github.com/scarmandef/CVE-2021-41773)
|
||||
- [0xAlmighty/CVE-2021-41773-PoC](https://github.com/0xAlmighty/CVE-2021-41773-PoC)
|
||||
|
@ -3974,7 +3975,6 @@ Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases
|
|||
|
||||
- [cckuailong/log4j_RCE_CVE-2021-44832](https://github.com/cckuailong/log4j_RCE_CVE-2021-44832)
|
||||
- [name/log4j](https://github.com/name/log4j)
|
||||
- [DanielRuf/CVE-2021-44832](https://github.com/DanielRuf/CVE-2021-44832)
|
||||
|
||||
### CVE-2021-45007 (2022-02-20)
|
||||
|
||||
|
@ -5037,6 +5037,14 @@ An OS Command Injection vulnerability in the PAN-OS GlobalProtect portal allows
|
|||
### CVE-2020-2333
|
||||
- [section-c/CVE-2020-2333](https://github.com/section-c/CVE-2020-2333)
|
||||
|
||||
### CVE-2020-2501 (2021-02-16)
|
||||
|
||||
<code>
|
||||
A stack-based buffer overflow vulnerability has been reported to affect QNAP NAS devices running Surveillance Station. If exploited, this vulnerability allows attackers to execute arbitrary code. QNAP have already fixed this vulnerability in the following versions: Surveillance Station 5.1.5.4.3 (and later) for ARM CPU NAS (64bit OS) and x86 CPU NAS (64bit OS) Surveillance Station 5.1.5.3.3 (and later) for ARM CPU NAS (32bit OS) and x86 CPU NAS (32bit OS)
|
||||
</code>
|
||||
|
||||
- [Alonzozzz/alonzzzo](https://github.com/Alonzozzz/alonzzzo)
|
||||
|
||||
### CVE-2020-2546 (2020-01-15)
|
||||
|
||||
<code>
|
||||
|
@ -10312,6 +10320,9 @@ Subrion CMS 4.2.1 has CSRF in panel/modules/plugins/. The attacker can remotely
|
|||
|
||||
- [ngpentest007/CVE-2019-7357](https://github.com/ngpentest007/CVE-2019-7357)
|
||||
|
||||
### CVE-2019-7406
|
||||
- [Alonzozzz/alonzzzo](https://github.com/Alonzozzz/alonzzzo)
|
||||
|
||||
### CVE-2019-7482 (2019-12-18)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Add table
Reference in a new issue