mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2021/10/28 06:14:40
This commit is contained in:
parent
9bde90f8aa
commit
10ebe7dfd7
23 changed files with 158 additions and 116 deletions
|
@ -1636,19 +1636,19 @@
|
|||
{
|
||||
"id": 421096576,
|
||||
"name": "ShellShock",
|
||||
"full_name": "alexphiliotis\/ShellShock",
|
||||
"full_name": "JowardBince\/ShellShock",
|
||||
"owner": {
|
||||
"login": "alexphiliotis",
|
||||
"login": "JowardBince",
|
||||
"id": 66454005,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66454005?v=4",
|
||||
"html_url": "https:\/\/github.com\/alexphiliotis"
|
||||
"html_url": "https:\/\/github.com\/JowardBince"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alexphiliotis\/ShellShock",
|
||||
"html_url": "https:\/\/github.com\/JowardBince\/ShellShock",
|
||||
"description": "A python script intended to automate cgi-bin based exploitation of the ShellSchock vulnerability (CVE-2014-6271)",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-25T16:13:48Z",
|
||||
"updated_at": "2021-10-25T16:54:00Z",
|
||||
"pushed_at": "2021-10-25T16:15:42Z",
|
||||
"updated_at": "2021-10-27T19:58:19Z",
|
||||
"pushed_at": "2021-10-27T19:58:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -148,10 +148,10 @@
|
|||
"description": "A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-17T15:03:53Z",
|
||||
"updated_at": "2021-09-05T12:52:55Z",
|
||||
"updated_at": "2021-10-27T15:44:20Z",
|
||||
"pushed_at": "2020-03-23T15:56:02Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -165,7 +165,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Blueborne CVE-2017-0785 Android information leak vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-20T23:32:29Z",
|
||||
"updated_at": "2021-09-17T11:02:52Z",
|
||||
"updated_at": "2021-10-27T20:33:24Z",
|
||||
"pushed_at": "2017-09-23T05:11:45Z",
|
||||
"stargazers_count": 436,
|
||||
"watchers_count": 436,
|
||||
"stargazers_count": 437,
|
||||
"watchers_count": 437,
|
||||
"forks_count": 192,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 192,
|
||||
"watchers": 436,
|
||||
"watchers": 437,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -184,10 +184,10 @@
|
|||
"description": "Demo Application and Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-10T21:33:25Z",
|
||||
"updated_at": "2021-10-27T14:51:27Z",
|
||||
"updated_at": "2021-10-27T16:49:21Z",
|
||||
"pushed_at": "2017-03-13T15:03:32Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -197,7 +197,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 37,
|
||||
"watchers": 38,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -376,10 +376,10 @@
|
|||
"description": "An exploit for Apache Struts CVE-2017-5638",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-12T02:02:25Z",
|
||||
"updated_at": "2021-10-16T04:24:54Z",
|
||||
"updated_at": "2021-10-27T15:14:41Z",
|
||||
"pushed_at": "2018-05-21T18:33:26Z",
|
||||
"stargazers_count": 398,
|
||||
"watchers_count": 398,
|
||||
"stargazers_count": 399,
|
||||
"watchers_count": 399,
|
||||
"forks_count": 146,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -392,7 +392,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 146,
|
||||
"watchers": 398,
|
||||
"watchers": 399,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -87,12 +87,12 @@
|
|||
"pushed_at": "2021-09-26T09:31:53Z",
|
||||
"stargazers_count": 472,
|
||||
"watchers_count": 472,
|
||||
"forks_count": 171,
|
||||
"forks_count": 172,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 171,
|
||||
"forks": 172,
|
||||
"watchers": 472,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -174,12 +174,12 @@
|
|||
"pushed_at": "2020-10-23T17:03:06Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 16,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"forks": 17,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2018-08-17T23:31:46Z",
|
||||
"stargazers_count": 163,
|
||||
"watchers_count": 163,
|
||||
"forks_count": 33,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"forks": 32,
|
||||
"watchers": 163,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -44,7 +44,7 @@
|
|||
"pushed_at": "2019-03-29T11:25:57Z",
|
||||
"stargazers_count": 336,
|
||||
"watchers_count": 336,
|
||||
"forks_count": 113,
|
||||
"forks_count": 114,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -56,7 +56,7 @@
|
|||
"sa-core-2018-002"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 113,
|
||||
"forks": 114,
|
||||
"watchers": 336,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -310,10 +310,10 @@
|
|||
"description": "Docker image and commands to check CVE-2019-11043 vulnerability on nginx\/php-fpm applications.",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-30T10:22:41Z",
|
||||
"updated_at": "2021-06-15T03:01:34Z",
|
||||
"updated_at": "2021-10-27T19:09:24Z",
|
||||
"pushed_at": "2019-10-30T12:53:43Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -329,7 +329,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -44,7 +44,7 @@
|
|||
"pushed_at": "2020-01-24T15:21:06Z",
|
||||
"stargazers_count": 247,
|
||||
"watchers_count": 247,
|
||||
"forks_count": 79,
|
||||
"forks_count": 78,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -52,7 +52,7 @@
|
|||
"cve-2020-0610"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 79,
|
||||
"forks": 78,
|
||||
"watchers": 247,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -880,17 +880,17 @@
|
|||
"description": "CVE-2020-0796_CoronaBlue_SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-16T15:31:52Z",
|
||||
"updated_at": "2020-04-06T03:48:20Z",
|
||||
"updated_at": "2021-10-27T20:51:11Z",
|
||||
"pushed_at": "2020-03-19T08:06:51Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1045,10 +1045,10 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2021-10-24T13:12:46Z",
|
||||
"updated_at": "2021-10-27T16:45:16Z",
|
||||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1158,
|
||||
"watchers_count": 1158,
|
||||
"stargazers_count": 1159,
|
||||
"watchers_count": 1159,
|
||||
"forks_count": 362,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1061,7 +1061,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 362,
|
||||
"watchers": 1158,
|
||||
"watchers": 1159,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2021-10-25T02:19:20Z",
|
||||
"updated_at": "2021-10-27T18:15:30Z",
|
||||
"pushed_at": "2020-10-21T12:10:28Z",
|
||||
"stargazers_count": 1359,
|
||||
"watchers_count": 1359,
|
||||
"stargazers_count": 1360,
|
||||
"watchers_count": 1360,
|
||||
"forks_count": 310,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 310,
|
||||
"watchers": 1359,
|
||||
"watchers": 1360,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2021-10-27T05:07:33Z",
|
||||
"updated_at": "2021-10-27T18:52:46Z",
|
||||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1431,
|
||||
"watchers_count": 1431,
|
||||
"stargazers_count": 1432,
|
||||
"watchers_count": 1432,
|
||||
"forks_count": 526,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 526,
|
||||
"watchers": 1431,
|
||||
"watchers": 1432,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -276,12 +276,12 @@
|
|||
"pushed_at": "2021-03-08T08:09:01Z",
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"forks_count": 73,
|
||||
"forks_count": 72,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 73,
|
||||
"forks": 72,
|
||||
"watchers": 102,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -452,17 +452,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2021-10-25T16:54:26Z",
|
||||
"updated_at": "2021-10-27T15:29:10Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 766,
|
||||
"watchers_count": 766,
|
||||
"stargazers_count": 767,
|
||||
"watchers_count": 767,
|
||||
"forks_count": 226,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 226,
|
||||
"watchers": 766,
|
||||
"watchers": 767,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "SolarWinds Orion Platform ActionPluginBaseView 反序列化RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-23T01:35:42Z",
|
||||
"updated_at": "2021-10-26T16:20:44Z",
|
||||
"updated_at": "2021-10-27T18:31:21Z",
|
||||
"pushed_at": "2021-10-23T01:44:54Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 34,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,44 @@
|
|||
"description": "CVE-2021-36260",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-18T06:40:48Z",
|
||||
"updated_at": "2021-10-18T06:40:48Z",
|
||||
"pushed_at": "2021-10-18T06:40:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"updated_at": "2021-10-27T19:56:06Z",
|
||||
"pushed_at": "2021-10-27T15:40:38Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 421880973,
|
||||
"name": "CVE-2021-36260",
|
||||
"full_name": "Aiminsun\/CVE-2021-36260",
|
||||
"owner": {
|
||||
"login": "Aiminsun",
|
||||
"id": 58260225,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58260225?v=4",
|
||||
"html_url": "https:\/\/github.com\/Aiminsun"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Aiminsun\/CVE-2021-36260",
|
||||
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-27T15:51:12Z",
|
||||
"updated_at": "2021-10-27T19:54:05Z",
|
||||
"pushed_at": "2021-10-27T15:55:20Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,47 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 383071339,
|
||||
"id": 408041781,
|
||||
"name": "CVE-2021-37152",
|
||||
"full_name": "lhashashinl\/CVE-2021-37152",
|
||||
"full_name": "SecurityAnalysts\/CVE-2021-37152",
|
||||
"owner": {
|
||||
"login": "lhashashinl",
|
||||
"id": 86566488,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86566488?v=4",
|
||||
"html_url": "https:\/\/github.com\/lhashashinl"
|
||||
"login": "SecurityAnalysts",
|
||||
"id": 26019141,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26019141?v=4",
|
||||
"html_url": "https:\/\/github.com\/SecurityAnalysts"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lhashashinl\/CVE-2021-37152",
|
||||
"html_url": "https:\/\/github.com\/SecurityAnalysts\/CVE-2021-37152",
|
||||
"description": "Exploit Accsess network clients by sending packets in wirless TP-LINK and preparing for a mitm attack",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-05T08:37:52Z",
|
||||
"updated_at": "2021-09-19T05:37:34Z",
|
||||
"created_at": "2021-09-19T05:37:37Z",
|
||||
"updated_at": "2021-10-27T16:54:04Z",
|
||||
"pushed_at": "2021-07-26T08:37:36Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 1,
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"exploit",
|
||||
"exploit-development",
|
||||
"exploitation",
|
||||
"exploitation-framework",
|
||||
"hack",
|
||||
"hacking",
|
||||
"hashashin",
|
||||
"lhashashinl",
|
||||
"mitm",
|
||||
"mitm-attacks",
|
||||
"network",
|
||||
"network-programming",
|
||||
"python3",
|
||||
"pythonhacking",
|
||||
"sniff",
|
||||
"tp-link",
|
||||
"tplink"
|
||||
],
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -229,17 +229,17 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2021-10-27T06:40:33Z",
|
||||
"updated_at": "2021-10-27T20:03:27Z",
|
||||
"pushed_at": "2021-09-11T09:50:26Z",
|
||||
"stargazers_count": 1285,
|
||||
"watchers_count": 1285,
|
||||
"stargazers_count": 1286,
|
||||
"watchers_count": 1286,
|
||||
"forks_count": 413,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 413,
|
||||
"watchers": 1285,
|
||||
"watchers": 1286,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2021-10-24T21:01:29Z",
|
||||
"stargazers_count": 293,
|
||||
"watchers_count": 293,
|
||||
"forks_count": 63,
|
||||
"forks_count": 62,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 63,
|
||||
"forks": 62,
|
||||
"watchers": 293,
|
||||
"score": 0
|
||||
},
|
||||
|
|
29
2021/CVE-2021-41728.json
Normal file
29
2021/CVE-2021-41728.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 421957912,
|
||||
"name": "CVE-2021-41728",
|
||||
"full_name": "Dir0x\/CVE-2021-41728",
|
||||
"owner": {
|
||||
"login": "Dir0x",
|
||||
"id": 22798238,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22798238?v=4",
|
||||
"html_url": "https:\/\/github.com\/Dir0x"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Dir0x\/CVE-2021-41728",
|
||||
"description": "Information about CVE-2021-41728, a reflected XSS in the search function.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-27T20:04:12Z",
|
||||
"updated_at": "2021-10-27T20:05:53Z",
|
||||
"pushed_at": "2021-10-27T20:05:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -398,17 +398,17 @@
|
|||
"description": "CVE-2021-41773 playground",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-06T07:17:05Z",
|
||||
"updated_at": "2021-10-26T11:51:00Z",
|
||||
"updated_at": "2021-10-27T17:46:28Z",
|
||||
"pushed_at": "2021-10-07T17:56:38Z",
|
||||
"stargazers_count": 193,
|
||||
"watchers_count": 193,
|
||||
"stargazers_count": 194,
|
||||
"watchers_count": 194,
|
||||
"forks_count": 49,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 49,
|
||||
"watchers": 193,
|
||||
"watchers": 194,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "A small PoC for the recent RCE found in the Goahead Webserver prior to version 5.1.5. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-12T06:21:02Z",
|
||||
"updated_at": "2021-10-23T09:57:43Z",
|
||||
"updated_at": "2021-10-27T19:53:12Z",
|
||||
"pushed_at": "2021-10-18T20:56:31Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -2298,6 +2298,7 @@ A command injection vulnerability in the web server of some Hikvision product. D
|
|||
</code>
|
||||
|
||||
- [rabbitsafe/CVE-2021-36260](https://github.com/rabbitsafe/CVE-2021-36260)
|
||||
- [Aiminsun/CVE-2021-36260](https://github.com/Aiminsun/CVE-2021-36260)
|
||||
|
||||
### CVE-2021-36394
|
||||
- [dinhbaouit/CVE-2021-36394](https://github.com/dinhbaouit/CVE-2021-36394)
|
||||
|
@ -2410,7 +2411,7 @@ Microsoft Azure Active Directory Connect Authentication Bypass Vulnerability
|
|||
Multiple XSS issues exist in Sonatype Nexus Repository Manager 3 before 3.33.0. An authenticated attacker with the ability to add HTML files to a repository could redirect users to Nexus Repository Manager’s pages with code modifications.
|
||||
</code>
|
||||
|
||||
- [lhashashinl/CVE-2021-37152](https://github.com/lhashashinl/CVE-2021-37152)
|
||||
- [SecurityAnalysts/CVE-2021-37152](https://github.com/SecurityAnalysts/CVE-2021-37152)
|
||||
|
||||
### CVE-2021-37589
|
||||
- [lucaregne/CVE-2021-37589](https://github.com/lucaregne/CVE-2021-37589)
|
||||
|
@ -2876,6 +2877,9 @@ A blind SQL injection vulnerability exists in the Raymart DG / Ahmed Helal Hotel
|
|||
|
||||
- [MobiusBinary/CVE-2021-41651](https://github.com/MobiusBinary/CVE-2021-41651)
|
||||
|
||||
### CVE-2021-41728
|
||||
- [Dir0x/CVE-2021-41728](https://github.com/Dir0x/CVE-2021-41728)
|
||||
|
||||
### CVE-2021-41730
|
||||
- [IBUILI/CVE-2021-41730](https://github.com/IBUILI/CVE-2021-41730)
|
||||
|
||||
|
@ -19637,7 +19641,7 @@ GNU Bash through 4.3 processes trailing strings after function definitions in th
|
|||
- [mochizuki875/CVE-2014-6271-Apache-Debian](https://github.com/mochizuki875/CVE-2014-6271-Apache-Debian)
|
||||
- [b4keSn4ke/shellshock](https://github.com/b4keSn4ke/shellshock)
|
||||
- [0bfxgh0st/ShellShock](https://github.com/0bfxgh0st/ShellShock)
|
||||
- [alexphiliotis/ShellShock](https://github.com/alexphiliotis/ShellShock)
|
||||
- [JowardBince/ShellShock](https://github.com/JowardBince/ShellShock)
|
||||
|
||||
### CVE-2014-6287 (2014-10-07)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue