mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/04/27 18:11:33
This commit is contained in:
parent
d782f4e13e
commit
1079593e58
37 changed files with 217 additions and 156 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
|
||||
"fork": false,
|
||||
"created_at": "2013-09-22T21:20:31Z",
|
||||
"updated_at": "2021-04-25T13:06:08Z",
|
||||
"updated_at": "2021-04-27T08:47:41Z",
|
||||
"pushed_at": "2017-04-24T14:16:56Z",
|
||||
"stargazers_count": 301,
|
||||
"watchers_count": 301,
|
||||
"stargazers_count": 302,
|
||||
"watchers_count": 302,
|
||||
"forks_count": 92,
|
||||
"forks": 92,
|
||||
"watchers": 301,
|
||||
"watchers": 302,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-04-26T15:04:21Z",
|
||||
"updated_at": "2021-04-27T06:58:00Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1007,
|
||||
"watchers_count": 1007,
|
||||
"stargazers_count": 1008,
|
||||
"watchers_count": 1008,
|
||||
"forks_count": 229,
|
||||
"forks": 229,
|
||||
"watchers": 1007,
|
||||
"watchers": 1008,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-04-26T15:04:21Z",
|
||||
"updated_at": "2021-04-27T06:58:00Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1007,
|
||||
"watchers_count": 1007,
|
||||
"stargazers_count": 1008,
|
||||
"watchers_count": 1008,
|
||||
"forks_count": 229,
|
||||
"forks": 229,
|
||||
"watchers": 1007,
|
||||
"watchers": 1008,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,7 +59,7 @@
|
|||
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-21T05:55:53Z",
|
||||
"updated_at": "2021-04-20T08:13:24Z",
|
||||
"updated_at": "2021-04-27T05:09:39Z",
|
||||
"pushed_at": "2017-11-29T03:33:53Z",
|
||||
"stargazers_count": 489,
|
||||
"watchers_count": 489,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Case study and POC of CVE-2017-12635: Apache CouchDB 1.7.0 \/ 2.x < 2.1.1 - Remote Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-07T20:02:31Z",
|
||||
"updated_at": "2020-12-22T00:04:57Z",
|
||||
"updated_at": "2021-04-27T04:39:00Z",
|
||||
"pushed_at": "2019-12-15T15:19:00Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-08-25T12:01:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-04-26T15:04:21Z",
|
||||
"updated_at": "2021-04-27T06:58:00Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1007,
|
||||
"watchers_count": 1007,
|
||||
"stargazers_count": 1008,
|
||||
"watchers_count": 1008,
|
||||
"forks_count": 229,
|
||||
"forks": 229,
|
||||
"watchers": 1007,
|
||||
"watchers": 1008,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "海康威视未授权访问检测poc及口令爆破",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-12T09:02:10Z",
|
||||
"updated_at": "2021-04-24T18:18:01Z",
|
||||
"updated_at": "2021-04-27T08:25:45Z",
|
||||
"pushed_at": "2020-11-19T08:58:04Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 22,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Exploit written in Python for CVE-2018-15473 with threading and export formats",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-21T00:09:56Z",
|
||||
"updated_at": "2021-04-21T08:54:06Z",
|
||||
"updated_at": "2021-04-27T07:31:47Z",
|
||||
"pushed_at": "2020-08-18T00:00:15Z",
|
||||
"stargazers_count": 437,
|
||||
"watchers_count": 437,
|
||||
"stargazers_count": 438,
|
||||
"watchers_count": 438,
|
||||
"forks_count": 150,
|
||||
"forks": 150,
|
||||
"watchers": 437,
|
||||
"watchers": 438,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-04-26T15:04:21Z",
|
||||
"updated_at": "2021-04-27T06:58:00Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1007,
|
||||
"watchers_count": 1007,
|
||||
"stargazers_count": 1008,
|
||||
"watchers_count": 1008,
|
||||
"forks_count": 229,
|
||||
"forks": 229,
|
||||
"watchers": 1007,
|
||||
"watchers": 1008,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -473,8 +473,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-10-18T14:01:59Z",
|
||||
"updated_at": "2021-04-26T03:15:53Z",
|
||||
"pushed_at": "2021-04-26T03:15:16Z",
|
||||
"updated_at": "2021-04-27T05:19:53Z",
|
||||
"pushed_at": "2021-04-27T05:19:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -270,8 +270,8 @@
|
|||
"pushed_at": "2018-04-26T15:40:28Z",
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"forks_count": 43,
|
||||
"forks": 43,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"watchers": 85,
|
||||
"score": 0
|
||||
},
|
||||
|
|
25
2019/CVE-2019-12725.json
Normal file
25
2019/CVE-2019-12725.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 361970258,
|
||||
"name": "CVE-2019-12725",
|
||||
"full_name": "givemefivw\/CVE-2019-12725",
|
||||
"owner": {
|
||||
"login": "givemefivw",
|
||||
"id": 65514141,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65514141?v=4",
|
||||
"html_url": "https:\/\/github.com\/givemefivw"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/givemefivw\/CVE-2019-12725",
|
||||
"description": "CVE-2019-12725 ZeroShell 远程命令执行漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-27T03:36:33Z",
|
||||
"updated_at": "2021-04-27T03:41:35Z",
|
||||
"pushed_at": "2021-04-27T03:41:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Connect Box CH7465LG (CVE-2019-13025)",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-01T20:53:47Z",
|
||||
"updated_at": "2021-04-22T19:30:47Z",
|
||||
"updated_at": "2021-04-27T03:21:23Z",
|
||||
"pushed_at": "2019-10-04T18:40:51Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 31,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-04-26T09:34:44Z",
|
||||
"updated_at": "2021-04-27T09:10:34Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2533,
|
||||
"watchers_count": 2533,
|
||||
"forks_count": 735,
|
||||
"forks": 735,
|
||||
"watchers": 2533,
|
||||
"stargazers_count": 2535,
|
||||
"watchers_count": 2535,
|
||||
"forks_count": 737,
|
||||
"forks": 737,
|
||||
"watchers": 2535,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T00:08:27Z",
|
||||
"updated_at": "2021-04-19T10:41:54Z",
|
||||
"updated_at": "2021-04-27T04:00:07Z",
|
||||
"pushed_at": "2020-01-22T20:23:51Z",
|
||||
"stargazers_count": 527,
|
||||
"watchers_count": 527,
|
||||
"stargazers_count": 528,
|
||||
"watchers_count": 528,
|
||||
"forks_count": 122,
|
||||
"forks": 122,
|
||||
"watchers": 527,
|
||||
"watchers": 528,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-04-26T15:04:21Z",
|
||||
"updated_at": "2021-04-27T06:58:00Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1007,
|
||||
"watchers_count": 1007,
|
||||
"stargazers_count": 1008,
|
||||
"watchers_count": 1008,
|
||||
"forks_count": 229,
|
||||
"forks": 229,
|
||||
"watchers": 1007,
|
||||
"watchers": 1008,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -224,8 +224,8 @@
|
|||
"pushed_at": "2019-06-21T03:33:05Z",
|
||||
"stargazers_count": 146,
|
||||
"watchers_count": 146,
|
||||
"forks_count": 63,
|
||||
"forks": 63,
|
||||
"forks_count": 62,
|
||||
"forks": 62,
|
||||
"watchers": 146,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "A Test and Debug Tool for ASPEED BMC AHB Interfaces",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-21T22:49:53Z",
|
||||
"updated_at": "2021-04-27T02:28:56Z",
|
||||
"pushed_at": "2021-04-27T02:28:52Z",
|
||||
"updated_at": "2021-04-27T03:35:46Z",
|
||||
"pushed_at": "2021-04-27T03:35:44Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 8,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-08T07:37:49Z",
|
||||
"updated_at": "2021-04-22T19:20:28Z",
|
||||
"updated_at": "2021-04-27T09:11:05Z",
|
||||
"pushed_at": "2020-06-17T13:41:23Z",
|
||||
"stargazers_count": 360,
|
||||
"watchers_count": 360,
|
||||
"stargazers_count": 361,
|
||||
"watchers_count": 361,
|
||||
"forks_count": 64,
|
||||
"forks": 64,
|
||||
"watchers": 360,
|
||||
"watchers": 361,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-04-26T09:34:44Z",
|
||||
"updated_at": "2021-04-27T09:10:34Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2533,
|
||||
"watchers_count": 2533,
|
||||
"forks_count": 735,
|
||||
"forks": 735,
|
||||
"watchers": 2533,
|
||||
"stargazers_count": 2535,
|
||||
"watchers_count": 2535,
|
||||
"forks_count": 737,
|
||||
"forks": 737,
|
||||
"watchers": 2535,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-04-27T02:51:22Z",
|
||||
"updated_at": "2021-04-27T08:07:39Z",
|
||||
"pushed_at": "2021-04-26T02:30:11Z",
|
||||
"stargazers_count": 678,
|
||||
"watchers_count": 678,
|
||||
"forks_count": 188,
|
||||
"forks": 188,
|
||||
"watchers": 678,
|
||||
"stargazers_count": 682,
|
||||
"watchers_count": 682,
|
||||
"forks_count": 191,
|
||||
"forks": 191,
|
||||
"watchers": 682,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-12-18T00:57:50Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-04-26T15:04:21Z",
|
||||
"updated_at": "2021-04-27T06:58:00Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1007,
|
||||
"watchers_count": 1007,
|
||||
"stargazers_count": 1008,
|
||||
"watchers_count": 1008,
|
||||
"forks_count": 229,
|
||||
"forks": 229,
|
||||
"watchers": 1007,
|
||||
"watchers": 1008,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2020-8840:FasterXML\/jackson-databind 远程代码执行漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-24T07:43:12Z",
|
||||
"updated_at": "2021-04-04T20:18:12Z",
|
||||
"updated_at": "2021-04-27T07:19:06Z",
|
||||
"pushed_at": "2020-02-24T07:45:37Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 24,
|
||||
"watchers": 25,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2021/CVE-2021-11123.json
Normal file
25
2021/CVE-2021-11123.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 361967513,
|
||||
"name": "cve-2021-11123",
|
||||
"full_name": "chenanu123\/cve-2021-11123",
|
||||
"owner": {
|
||||
"login": "chenanu123",
|
||||
"id": 59187344,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59187344?v=4",
|
||||
"html_url": "https:\/\/github.com\/chenanu123"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/chenanu123\/cve-2021-11123",
|
||||
"description": "测试用的",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-27T03:23:24Z",
|
||||
"updated_at": "2021-04-27T03:23:26Z",
|
||||
"pushed_at": "2021-04-27T03:23:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-1732 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-05T02:11:10Z",
|
||||
"updated_at": "2021-04-25T06:53:32Z",
|
||||
"updated_at": "2021-04-27T07:48:44Z",
|
||||
"pushed_at": "2021-03-05T03:10:26Z",
|
||||
"stargazers_count": 281,
|
||||
"watchers_count": 281,
|
||||
"stargazers_count": 282,
|
||||
"watchers_count": 282,
|
||||
"forks_count": 66,
|
||||
"forks": 66,
|
||||
"watchers": 281,
|
||||
"watchers": 282,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "CVE-2021-1732 poc & exp; tested on 20H2",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-23T08:21:54Z",
|
||||
"updated_at": "2021-04-26T19:19:33Z",
|
||||
"updated_at": "2021-04-27T08:27:04Z",
|
||||
"pushed_at": "2021-04-23T08:28:53Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 37,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 39,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -128,13 +128,13 @@
|
|||
"description": "Read my blog for more info - ",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-25T12:55:15Z",
|
||||
"updated_at": "2021-04-25T15:12:48Z",
|
||||
"updated_at": "2021-04-27T08:09:49Z",
|
||||
"pushed_at": "2021-04-25T14:16:30Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-10T14:38:05Z",
|
||||
"updated_at": "2021-04-22T13:41:30Z",
|
||||
"updated_at": "2021-04-27T07:29:37Z",
|
||||
"pushed_at": "2021-02-10T14:39:04Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 20,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "🐱💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-22T11:53:57Z",
|
||||
"updated_at": "2021-04-23T00:46:54Z",
|
||||
"updated_at": "2021-04-27T06:27:27Z",
|
||||
"pushed_at": "2021-03-22T18:24:20Z",
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 104,
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 105,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-22192 靶场: 未授权用户 RCE 漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-27T07:09:46Z",
|
||||
"updated_at": "2021-04-26T10:43:20Z",
|
||||
"pushed_at": "2021-04-26T10:43:18Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"updated_at": "2021-04-27T09:10:33Z",
|
||||
"pushed_at": "2021-04-27T07:08:19Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-04-27T02:51:22Z",
|
||||
"updated_at": "2021-04-27T08:07:39Z",
|
||||
"pushed_at": "2021-04-26T02:30:11Z",
|
||||
"stargazers_count": 678,
|
||||
"watchers_count": 678,
|
||||
"forks_count": 188,
|
||||
"forks": 188,
|
||||
"watchers": 678,
|
||||
"stargazers_count": 682,
|
||||
"watchers_count": 682,
|
||||
"forks_count": 191,
|
||||
"forks": 191,
|
||||
"watchers": 682,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-04-26T14:21:30Z",
|
||||
"updated_at": "2021-04-27T02:07:52Z",
|
||||
"updated_at": "2021-04-27T04:29:35Z",
|
||||
"pushed_at": "2021-04-26T14:23:48Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-30481",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-17T01:29:31Z",
|
||||
"updated_at": "2021-04-25T06:42:29Z",
|
||||
"updated_at": "2021-04-27T08:58:39Z",
|
||||
"pushed_at": "2021-04-20T16:00:46Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 32,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-13T12:52:20Z",
|
||||
"updated_at": "2021-04-24T16:03:04Z",
|
||||
"updated_at": "2021-04-27T06:19:08Z",
|
||||
"pushed_at": "2021-01-29T13:59:07Z",
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 106,
|
||||
"watchers": 107,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-25T08:42:28Z",
|
||||
"updated_at": "2021-04-25T14:13:29Z",
|
||||
"updated_at": "2021-04-27T06:53:20Z",
|
||||
"pushed_at": "2021-01-25T08:49:59Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -404,13 +404,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-31T03:38:37Z",
|
||||
"updated_at": "2021-02-01T05:02:49Z",
|
||||
"updated_at": "2021-04-27T07:32:37Z",
|
||||
"pushed_at": "2021-01-31T04:02:08Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 4,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -661,8 +661,8 @@
|
|||
"pushed_at": "2021-02-03T22:28:14Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -891,8 +891,8 @@
|
|||
"pushed_at": "2021-03-30T14:44:38Z",
|
||||
"stargazers_count": 284,
|
||||
"watchers_count": 284,
|
||||
"forks_count": 46,
|
||||
"forks": 46,
|
||||
"forks_count": 47,
|
||||
"forks": 47,
|
||||
"watchers": 284,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻💻",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-26T01:09:25Z",
|
||||
"updated_at": "2021-04-26T18:21:45Z",
|
||||
"updated_at": "2021-04-27T03:31:23Z",
|
||||
"pushed_at": "2021-04-26T18:21:42Z",
|
||||
"stargazers_count": 189,
|
||||
"watchers_count": 189,
|
||||
"stargazers_count": 190,
|
||||
"watchers_count": 190,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 189,
|
||||
"watchers": 190,
|
||||
"score": 0
|
||||
}
|
||||
]
|
11
README.md
11
README.md
|
@ -291,6 +291,9 @@ The overlayfs implementation in the linux kernel did not properly validate with
|
|||
### CVE-2021-9999
|
||||
- [Reach-Z/CVE-2021-9999](https://github.com/Reach-Z/CVE-2021-9999)
|
||||
|
||||
### CVE-2021-11123
|
||||
- [chenanu123/cve-2021-11123](https://github.com/chenanu123/cve-2021-11123)
|
||||
|
||||
### CVE-2021-21014 (2021-02-11)
|
||||
|
||||
<code>
|
||||
|
@ -7345,6 +7348,14 @@ DOSBox 0.74-2 has Incorrect Access Control.
|
|||
|
||||
- [Alexandre-Bartel/CVE-2019-12594](https://github.com/Alexandre-Bartel/CVE-2019-12594)
|
||||
|
||||
### CVE-2019-12725 (2019-07-19)
|
||||
|
||||
<code>
|
||||
Zeroshell 3.9.0 is prone to a remote command execution vulnerability. Specifically, this issue occurs because the web application mishandles a few HTTP parameters. An unauthenticated attacker can exploit this issue by injecting OS commands inside the vulnerable parameters.
|
||||
</code>
|
||||
|
||||
- [givemefivw/CVE-2019-12725](https://github.com/givemefivw/CVE-2019-12725)
|
||||
|
||||
### CVE-2019-12735 (2019-06-05)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue