mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2021/07/02 00:11:43
This commit is contained in:
parent
33d797a803
commit
3b0101030b
95 changed files with 1949 additions and 194 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2013-6117",
|
||||
"fork": false,
|
||||
"created_at": "2018-07-23T14:56:03Z",
|
||||
"updated_at": "2019-08-09T17:37:58Z",
|
||||
"updated_at": "2021-07-01T10:57:40Z",
|
||||
"pushed_at": "2018-07-23T18:16:34Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -891,8 +891,8 @@
|
|||
"pushed_at": "2019-10-08T10:03:04Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-07-01T07:36:20Z",
|
||||
"updated_at": "2021-07-01T11:38:01Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1087,
|
||||
"watchers_count": 1087,
|
||||
"stargazers_count": 1088,
|
||||
"watchers_count": 1088,
|
||||
"forks_count": 242,
|
||||
"forks": 242,
|
||||
"watchers": 1087,
|
||||
"watchers": 1088,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-07-01T07:36:20Z",
|
||||
"updated_at": "2021-07-01T11:38:01Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1087,
|
||||
"watchers_count": 1087,
|
||||
"stargazers_count": 1088,
|
||||
"watchers_count": 1088,
|
||||
"forks_count": 242,
|
||||
"forks": 242,
|
||||
"watchers": 1087,
|
||||
"watchers": 1088,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-02-14T13:03:33Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -178,8 +178,8 @@
|
|||
"pushed_at": "2017-11-28T03:06:32Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 58,
|
||||
"forks": 58,
|
||||
"forks_count": 59,
|
||||
"forks": 59,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-05-23T17:39:09Z",
|
||||
"updated_at": "2021-06-13T15:01:34Z",
|
||||
"pushed_at": "2021-06-13T15:01:32Z",
|
||||
"updated_at": "2021-07-01T13:42:45Z",
|
||||
"pushed_at": "2021-07-01T13:42:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-07-01T07:36:20Z",
|
||||
"updated_at": "2021-07-01T11:38:01Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1087,
|
||||
"watchers_count": 1087,
|
||||
"stargazers_count": 1088,
|
||||
"watchers_count": 1088,
|
||||
"forks_count": 242,
|
||||
"forks": 242,
|
||||
"watchers": 1087,
|
||||
"watchers": 1088,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-24T05:34:05Z",
|
||||
"updated_at": "2021-06-29T15:26:55Z",
|
||||
"updated_at": "2021-07-01T13:35:54Z",
|
||||
"pushed_at": "2020-10-16T12:09:45Z",
|
||||
"stargazers_count": 430,
|
||||
"watchers_count": 430,
|
||||
"stargazers_count": 431,
|
||||
"watchers_count": 431,
|
||||
"forks_count": 407,
|
||||
"forks": 407,
|
||||
"watchers": 430,
|
||||
"watchers": 431,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -450,13 +450,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-07-01T07:36:20Z",
|
||||
"updated_at": "2021-07-01T11:38:01Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1087,
|
||||
"watchers_count": 1087,
|
||||
"stargazers_count": 1088,
|
||||
"watchers_count": 1088,
|
||||
"forks_count": 242,
|
||||
"forks": 242,
|
||||
"watchers": 1087,
|
||||
"watchers": 1088,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2018-02-09T14:38:27Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -270,8 +270,8 @@
|
|||
"pushed_at": "2018-04-26T15:40:28Z",
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"forks_count": 47,
|
||||
"forks": 47,
|
||||
"forks_count": 48,
|
||||
"forks": 48,
|
||||
"watchers": 91,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "cve-2019-0604 SharePoint RCE exploit",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-26T15:00:29Z",
|
||||
"updated_at": "2021-02-09T20:34:20Z",
|
||||
"updated_at": "2021-07-01T13:30:09Z",
|
||||
"pushed_at": "2019-10-18T14:49:10Z",
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"forks_count": 66,
|
||||
"forks": 66,
|
||||
"watchers": 91,
|
||||
"watchers": 92,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -151,7 +151,7 @@
|
|||
"description": "CVE-2019-10149",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-05T20:04:14Z",
|
||||
"updated_at": "2019-09-11T01:27:28Z",
|
||||
"updated_at": "2021-07-01T13:19:02Z",
|
||||
"pushed_at": "2019-09-05T20:34:18Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-10392 RCE Jackson with Git Client Plugin 2.8.2 (Authenticated)",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-26T05:45:00Z",
|
||||
"updated_at": "2020-11-06T17:52:46Z",
|
||||
"updated_at": "2021-07-01T09:44:46Z",
|
||||
"pushed_at": "2019-09-26T05:49:21Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 19,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-06-02T21:00:50Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2654,
|
||||
"watchers_count": 2654,
|
||||
"forks_count": 773,
|
||||
"forks": 773,
|
||||
"forks_count": 774,
|
||||
"forks": 774,
|
||||
"watchers": 2654,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-07-01T07:36:20Z",
|
||||
"updated_at": "2021-07-01T11:38:01Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1087,
|
||||
"watchers_count": 1087,
|
||||
"stargazers_count": 1088,
|
||||
"watchers_count": 1088,
|
||||
"forks_count": 242,
|
||||
"forks": 242,
|
||||
"watchers": 1087,
|
||||
"watchers": 1088,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -220,13 +220,13 @@
|
|||
"description": "CVE-2019-2725命令回显+webshell上传+最新绕过",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-10T05:12:44Z",
|
||||
"updated_at": "2021-06-30T01:30:53Z",
|
||||
"updated_at": "2021-07-01T13:22:26Z",
|
||||
"pushed_at": "2019-06-21T03:33:05Z",
|
||||
"stargazers_count": 150,
|
||||
"watchers_count": 150,
|
||||
"stargazers_count": 151,
|
||||
"watchers_count": 151,
|
||||
"forks_count": 61,
|
||||
"forks": 61,
|
||||
"watchers": 150,
|
||||
"watchers": 151,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC for CVE-2019-5736",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-13T05:26:32Z",
|
||||
"updated_at": "2021-07-01T07:14:37Z",
|
||||
"updated_at": "2021-07-01T09:16:50Z",
|
||||
"pushed_at": "2019-02-19T11:45:13Z",
|
||||
"stargazers_count": 517,
|
||||
"watchers_count": 517,
|
||||
"stargazers_count": 516,
|
||||
"watchers_count": 516,
|
||||
"forks_count": 134,
|
||||
"forks": 134,
|
||||
"watchers": 517,
|
||||
"watchers": 516,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-05-09T21:34:26Z",
|
||||
"stargazers_count": 580,
|
||||
"watchers_count": 580,
|
||||
"forks_count": 140,
|
||||
"forks": 140,
|
||||
"forks_count": 141,
|
||||
"forks": 141,
|
||||
"watchers": 580,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T06:22:40Z",
|
||||
"updated_at": "2021-06-08T15:38:05Z",
|
||||
"updated_at": "2021-07-01T12:27:13Z",
|
||||
"pushed_at": "2020-02-20T11:03:18Z",
|
||||
"stargazers_count": 182,
|
||||
"watchers_count": 182,
|
||||
"stargazers_count": 183,
|
||||
"watchers_count": 183,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"watchers": 182,
|
||||
"watchers": 183,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-12T10:05:36Z",
|
||||
"updated_at": "2021-07-01T07:34:59Z",
|
||||
"updated_at": "2021-07-01T10:15:42Z",
|
||||
"pushed_at": "2020-08-13T07:16:12Z",
|
||||
"stargazers_count": 157,
|
||||
"watchers_count": 157,
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"forks_count": 43,
|
||||
"forks": 43,
|
||||
"watchers": 157,
|
||||
"watchers": 158,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-06-20T08:46:12Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -339,8 +339,8 @@
|
|||
"pushed_at": "2020-09-16T15:03:32Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2654,
|
||||
"watchers_count": 2654,
|
||||
"forks_count": 773,
|
||||
"forks": 773,
|
||||
"forks_count": 774,
|
||||
"forks": 774,
|
||||
"watchers": 2654,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": "CVE-2020-14882 EXP 回显",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-29T15:44:23Z",
|
||||
"updated_at": "2020-12-06T17:09:24Z",
|
||||
"updated_at": "2021-07-01T10:03:00Z",
|
||||
"pushed_at": "2020-11-09T09:55:10Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-07-01T03:15:35Z",
|
||||
"updated_at": "2021-07-01T10:05:29Z",
|
||||
"pushed_at": "2021-04-26T02:30:11Z",
|
||||
"stargazers_count": 794,
|
||||
"watchers_count": 794,
|
||||
"stargazers_count": 795,
|
||||
"watchers_count": 795,
|
||||
"forks_count": 251,
|
||||
"forks": 251,
|
||||
"watchers": 794,
|
||||
"watchers": 795,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "How to exploit a vulnerable windows driver. Exploit for AsrDrv104.sys",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T04:38:24Z",
|
||||
"updated_at": "2021-07-01T09:14:36Z",
|
||||
"updated_at": "2021-07-01T15:14:19Z",
|
||||
"pushed_at": "2021-06-30T01:52:59Z",
|
||||
"stargazers_count": 125,
|
||||
"watchers_count": 125,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 125,
|
||||
"stargazers_count": 154,
|
||||
"watchers_count": 154,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 154,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-1675.json
Normal file
25
2020/CVE-2020-1675.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 382021281,
|
||||
"name": "CVE-2020-1675",
|
||||
"full_name": "DenizSe\/CVE-2020-1675",
|
||||
"owner": {
|
||||
"login": "DenizSe",
|
||||
"id": 43039427,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43039427?v=4",
|
||||
"html_url": "https:\/\/github.com\/DenizSe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/DenizSe\/CVE-2020-1675",
|
||||
"description": "Small Powershell Script to detect Running Printer Spoolers on Domain Controller",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T12:12:16Z",
|
||||
"updated_at": "2021-07-01T15:11:27Z",
|
||||
"pushed_at": "2021-07-01T15:11:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-21784.json
Normal file
25
2020/CVE-2020-21784.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381989780,
|
||||
"name": "CVE-2020-21784",
|
||||
"full_name": "AlAIAL90\/CVE-2020-21784",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2020-21784",
|
||||
"description": "PoC for exploiting CVE-2020-21784",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:06:45Z",
|
||||
"updated_at": "2021-07-01T10:10:16Z",
|
||||
"pushed_at": "2021-07-01T10:10:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-21787.json
Normal file
25
2020/CVE-2020-21787.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381989901,
|
||||
"name": "CVE-2020-21787",
|
||||
"full_name": "AlAIAL90\/CVE-2020-21787",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2020-21787",
|
||||
"description": "PoC for exploiting CVE-2020-21787",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:07:10Z",
|
||||
"updated_at": "2021-07-01T10:10:53Z",
|
||||
"pushed_at": "2021-07-01T10:10:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-24511.json
Normal file
25
2020/CVE-2020-24511.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381989848,
|
||||
"name": "CVE-2020-24511",
|
||||
"full_name": "AlAIAL90\/CVE-2020-24511",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2020-24511",
|
||||
"description": "PoC for exploiting CVE-2020-24511",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:06:58Z",
|
||||
"updated_at": "2021-07-01T10:10:34Z",
|
||||
"pushed_at": "2021-07-01T10:10:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2020/CVE-2020-24512.json
Normal file
25
2020/CVE-2020-24512.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381989814,
|
||||
"name": "CVE-2020-24512",
|
||||
"full_name": "AlAIAL90\/CVE-2020-24512",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2020-24512",
|
||||
"description": "PoC for exploiting CVE-2020-24512",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:06:51Z",
|
||||
"updated_at": "2021-07-01T10:10:28Z",
|
||||
"pushed_at": "2021-07-01T10:10:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-07-01T07:36:20Z",
|
||||
"updated_at": "2021-07-01T11:38:01Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1087,
|
||||
"watchers_count": 1087,
|
||||
"stargazers_count": 1088,
|
||||
"watchers_count": 1088,
|
||||
"forks_count": 242,
|
||||
"forks": 242,
|
||||
"watchers": 1087,
|
||||
"watchers": 1088,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Exploit for CVE-2020-3952 in vCenter 6.7",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-16T07:40:51Z",
|
||||
"updated_at": "2021-06-29T19:13:25Z",
|
||||
"updated_at": "2021-07-01T12:29:17Z",
|
||||
"pushed_at": "2020-04-16T08:38:42Z",
|
||||
"stargazers_count": 243,
|
||||
"watchers_count": 243,
|
||||
"stargazers_count": 244,
|
||||
"watchers_count": 244,
|
||||
"forks_count": 56,
|
||||
"forks": 56,
|
||||
"watchers": 243,
|
||||
"watchers": 244,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "IBM Maximo Asset Management is vulnerable to Information Disclosure via XXE Vulnerability (CVE-2020-4463)",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-13T09:03:40Z",
|
||||
"updated_at": "2021-05-22T08:09:31Z",
|
||||
"updated_at": "2021-07-01T14:20:43Z",
|
||||
"pushed_at": "2020-12-06T08:23:02Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 38,
|
||||
"watchers": 39,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-1075.json
Normal file
25
2021/CVE-2021-1075.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381990346,
|
||||
"name": "CVE-2021-1075",
|
||||
"full_name": "AlAIAL90\/CVE-2021-1075",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-1075",
|
||||
"description": "PoC for exploiting CVE-2021-1075",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:08:39Z",
|
||||
"updated_at": "2021-07-01T10:08:44Z",
|
||||
"pushed_at": "2021-07-01T10:08:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -33,16 +33,16 @@
|
|||
"html_url": "https:\/\/github.com\/cube0x0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cube0x0\/CVE-2021-1675",
|
||||
"description": "Impacket implementation of CVE-2021-1675",
|
||||
"description": "C# and Impacket implementation of CVE-2021-1675\/PrintNightmare",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2021-07-01T09:14:11Z",
|
||||
"pushed_at": "2021-06-30T14:15:58Z",
|
||||
"stargazers_count": 546,
|
||||
"watchers_count": 546,
|
||||
"forks_count": 201,
|
||||
"forks": 201,
|
||||
"watchers": 546,
|
||||
"updated_at": "2021-07-01T15:08:03Z",
|
||||
"pushed_at": "2021-07-01T11:57:01Z",
|
||||
"stargazers_count": 601,
|
||||
"watchers_count": 601,
|
||||
"forks_count": 237,
|
||||
"forks": 237,
|
||||
"watchers": 601,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2021-1675 Detection Info",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-30T18:32:17Z",
|
||||
"updated_at": "2021-07-01T09:09:04Z",
|
||||
"pushed_at": "2021-07-01T09:01:26Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 47,
|
||||
"updated_at": "2021-07-01T15:02:48Z",
|
||||
"pushed_at": "2021-07-01T15:02:45Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 59,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-30T23:39:21Z",
|
||||
"updated_at": "2021-07-01T06:15:05Z",
|
||||
"updated_at": "2021-07-01T11:52:46Z",
|
||||
"pushed_at": "2021-06-30T23:40:44Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,12 +105,81 @@
|
|||
"description": "CVE-2021-1675 Simple LPE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T09:00:31Z",
|
||||
"updated_at": "2021-07-01T09:00:34Z",
|
||||
"pushed_at": "2021-07-01T09:00:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"updated_at": "2021-07-01T12:14:10Z",
|
||||
"pushed_at": "2021-07-01T12:14:07Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 381984439,
|
||||
"name": "CVE-2021-1675-LPE",
|
||||
"full_name": "hlldz\/CVE-2021-1675-LPE",
|
||||
"owner": {
|
||||
"login": "hlldz",
|
||||
"id": 16455559,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16455559?v=4",
|
||||
"html_url": "https:\/\/github.com\/hlldz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hlldz\/CVE-2021-1675-LPE",
|
||||
"description": "Local Privilege Escalation Edition for CVE-2021-1675",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T09:47:13Z",
|
||||
"updated_at": "2021-07-01T15:08:28Z",
|
||||
"pushed_at": "2021-07-01T13:24:06Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 382024474,
|
||||
"name": "CVE-2021-1675",
|
||||
"full_name": "puckiestyle\/CVE-2021-1675",
|
||||
"owner": {
|
||||
"login": "puckiestyle",
|
||||
"id": 57447087,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
|
||||
"html_url": "https:\/\/github.com\/puckiestyle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/puckiestyle\/CVE-2021-1675",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T12:24:19Z",
|
||||
"updated_at": "2021-07-01T12:24:32Z",
|
||||
"pushed_at": "2021-07-01T12:24:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 382050919,
|
||||
"name": "CVE-2021-1675_PrintNightMare",
|
||||
"full_name": "cybersecurityworks553\/CVE-2021-1675_PrintNightMare",
|
||||
"owner": {
|
||||
"login": "cybersecurityworks553",
|
||||
"id": 63910792,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63910792?v=4",
|
||||
"html_url": "https:\/\/github.com\/cybersecurityworks553"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cybersecurityworks553\/CVE-2021-1675_PrintNightMare",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T13:58:01Z",
|
||||
"updated_at": "2021-07-01T14:26:07Z",
|
||||
"pushed_at": "2021-07-01T14:26:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
25
2021/CVE-2021-20477.json
Normal file
25
2021/CVE-2021-20477.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381990231,
|
||||
"name": "CVE-2021-20477",
|
||||
"full_name": "AlAIAL90\/CVE-2021-20477",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-20477",
|
||||
"description": "PoC for exploiting CVE-2021-20477",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:08:14Z",
|
||||
"updated_at": "2021-07-01T10:08:22Z",
|
||||
"pushed_at": "2021-07-01T10:08:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-20490.json
Normal file
25
2021/CVE-2021-20490.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381990284,
|
||||
"name": "CVE-2021-20490",
|
||||
"full_name": "AlAIAL90\/CVE-2021-20490",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-20490",
|
||||
"description": "PoC for exploiting CVE-2021-20490",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:08:26Z",
|
||||
"updated_at": "2021-07-01T10:08:33Z",
|
||||
"pushed_at": "2021-07-01T10:08:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-20580.json
Normal file
25
2021/CVE-2021-20580.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381990308,
|
||||
"name": "CVE-2021-20580",
|
||||
"full_name": "AlAIAL90\/CVE-2021-20580",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-20580",
|
||||
"description": "PoC for exploiting CVE-2021-20580",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:08:31Z",
|
||||
"updated_at": "2021-07-01T10:08:37Z",
|
||||
"pushed_at": "2021-07-01T10:08:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-20583.json
Normal file
25
2021/CVE-2021-20583.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381990015,
|
||||
"name": "CVE-2021-20583",
|
||||
"full_name": "AlAIAL90\/CVE-2021-20583",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-20583",
|
||||
"description": "PoC for exploiting CVE-2021-20583",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:07:33Z",
|
||||
"updated_at": "2021-07-01T10:07:39Z",
|
||||
"pushed_at": "2021-07-01T10:07:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-21572.json
Normal file
25
2021/CVE-2021-21572.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381990161,
|
||||
"name": "CVE-2021-21572",
|
||||
"full_name": "AlAIAL90\/CVE-2021-21572",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-21572",
|
||||
"description": "PoC for exploiting CVE-2021-21572",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:07:58Z",
|
||||
"updated_at": "2021-07-01T10:08:04Z",
|
||||
"pushed_at": "2021-07-01T10:08:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-21573.json
Normal file
25
2021/CVE-2021-21573.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381990135,
|
||||
"name": "CVE-2021-21573",
|
||||
"full_name": "AlAIAL90\/CVE-2021-21573",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-21573",
|
||||
"description": "PoC for exploiting CVE-2021-21573",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:07:54Z",
|
||||
"updated_at": "2021-07-01T10:08:00Z",
|
||||
"pushed_at": "2021-07-01T10:07:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-21574.json
Normal file
25
2021/CVE-2021-21574.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381990188,
|
||||
"name": "CVE-2021-21574",
|
||||
"full_name": "AlAIAL90\/CVE-2021-21574",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-21574",
|
||||
"description": "PoC for exploiting CVE-2021-21574",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:08:06Z",
|
||||
"updated_at": "2021-07-01T10:08:12Z",
|
||||
"pushed_at": "2021-07-01T10:08:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-21670.json
Normal file
25
2021/CVE-2021-21670.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381990626,
|
||||
"name": "CVE-2021-21670",
|
||||
"full_name": "AlAIAL90\/CVE-2021-21670",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-21670",
|
||||
"description": "PoC for exploiting CVE-2021-21670",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:09:36Z",
|
||||
"updated_at": "2021-07-01T10:09:42Z",
|
||||
"pushed_at": "2021-07-01T10:09:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-21671.json
Normal file
25
2021/CVE-2021-21671.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381990643,
|
||||
"name": "CVE-2021-21671",
|
||||
"full_name": "AlAIAL90\/CVE-2021-21671",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-21671",
|
||||
"description": "PoC for exploiting CVE-2021-21671",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:09:40Z",
|
||||
"updated_at": "2021-07-01T10:09:47Z",
|
||||
"pushed_at": "2021-07-01T10:09:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-21672.json
Normal file
25
2021/CVE-2021-21672.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381990662,
|
||||
"name": "CVE-2021-21672",
|
||||
"full_name": "AlAIAL90\/CVE-2021-21672",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-21672",
|
||||
"description": "PoC for exploiting CVE-2021-21672",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:09:45Z",
|
||||
"updated_at": "2021-07-01T10:09:50Z",
|
||||
"pushed_at": "2021-07-01T10:09:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-21673.json
Normal file
25
2021/CVE-2021-21673.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381990677,
|
||||
"name": "CVE-2021-21673",
|
||||
"full_name": "AlAIAL90\/CVE-2021-21673",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-21673",
|
||||
"description": "PoC for exploiting CVE-2021-21673",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:09:48Z",
|
||||
"updated_at": "2021-07-01T10:09:55Z",
|
||||
"pushed_at": "2021-07-01T10:09:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-21674.json
Normal file
25
2021/CVE-2021-21674.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381990693,
|
||||
"name": "CVE-2021-21674",
|
||||
"full_name": "AlAIAL90\/CVE-2021-21674",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-21674",
|
||||
"description": "PoC for exploiting CVE-2021-21674",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:09:52Z",
|
||||
"updated_at": "2021-07-01T10:09:59Z",
|
||||
"pushed_at": "2021-07-01T10:09:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-21675.json
Normal file
25
2021/CVE-2021-21675.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381990710,
|
||||
"name": "CVE-2021-21675",
|
||||
"full_name": "AlAIAL90\/CVE-2021-21675",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-21675",
|
||||
"description": "PoC for exploiting CVE-2021-21675",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:09:57Z",
|
||||
"updated_at": "2021-07-01T10:10:03Z",
|
||||
"pushed_at": "2021-07-01T10:10:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-21676.json
Normal file
25
2021/CVE-2021-21676.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381990732,
|
||||
"name": "CVE-2021-21676",
|
||||
"full_name": "AlAIAL90\/CVE-2021-21676",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-21676",
|
||||
"description": "PoC for exploiting CVE-2021-21676",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:10:01Z",
|
||||
"updated_at": "2021-07-01T10:10:09Z",
|
||||
"pushed_at": "2021-07-01T10:10:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2021-03-01T02:10:44Z",
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"forks_count": 59,
|
||||
"forks": 59,
|
||||
"forks_count": 60,
|
||||
"forks": 60,
|
||||
"watchers": 100,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -155,8 +155,8 @@
|
|||
"pushed_at": "2021-02-25T05:49:19Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 52,
|
||||
"score": 0
|
||||
},
|
||||
|
|
25
2021/CVE-2021-22346.json
Normal file
25
2021/CVE-2021-22346.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381989418,
|
||||
"name": "CVE-2021-22346",
|
||||
"full_name": "AlAIAL90\/CVE-2021-22346",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-22346",
|
||||
"description": "PoC for exploiting CVE-2021-22346",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:05:31Z",
|
||||
"updated_at": "2021-07-01T10:05:31Z",
|
||||
"pushed_at": "2021-07-01T10:05:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-22348.json
Normal file
25
2021/CVE-2021-22348.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381989430,
|
||||
"name": "CVE-2021-22348",
|
||||
"full_name": "AlAIAL90\/CVE-2021-22348",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-22348",
|
||||
"description": "PoC for exploiting CVE-2021-22348",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:05:33Z",
|
||||
"updated_at": "2021-07-01T10:05:33Z",
|
||||
"pushed_at": "2021-07-01T10:05:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-22349.json
Normal file
25
2021/CVE-2021-22349.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381989440,
|
||||
"name": "CVE-2021-22349",
|
||||
"full_name": "AlAIAL90\/CVE-2021-22349",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-22349",
|
||||
"description": "PoC for exploiting CVE-2021-22349",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:05:35Z",
|
||||
"updated_at": "2021-07-01T10:05:35Z",
|
||||
"pushed_at": "2021-07-01T10:05:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-22350.json
Normal file
25
2021/CVE-2021-22350.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381989449,
|
||||
"name": "CVE-2021-22350",
|
||||
"full_name": "AlAIAL90\/CVE-2021-22350",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-22350",
|
||||
"description": "PoC for exploiting CVE-2021-22350",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:05:36Z",
|
||||
"updated_at": "2021-07-01T10:05:36Z",
|
||||
"pushed_at": "2021-07-01T10:05:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-22351.json
Normal file
25
2021/CVE-2021-22351.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381989458,
|
||||
"name": "CVE-2021-22351",
|
||||
"full_name": "AlAIAL90\/CVE-2021-22351",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-22351",
|
||||
"description": "PoC for exploiting CVE-2021-22351",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:05:38Z",
|
||||
"updated_at": "2021-07-01T10:06:39Z",
|
||||
"pushed_at": "2021-07-01T10:06:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-22352.json
Normal file
25
2021/CVE-2021-22352.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381989733,
|
||||
"name": "CVE-2021-22352",
|
||||
"full_name": "AlAIAL90\/CVE-2021-22352",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-22352",
|
||||
"description": "PoC for exploiting CVE-2021-22352",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:06:37Z",
|
||||
"updated_at": "2021-07-01T10:06:43Z",
|
||||
"pushed_at": "2021-07-01T10:06:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-22353.json
Normal file
25
2021/CVE-2021-22353.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381990371,
|
||||
"name": "CVE-2021-22353",
|
||||
"full_name": "AlAIAL90\/CVE-2021-22353",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-22353",
|
||||
"description": "PoC for exploiting CVE-2021-22353",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:08:42Z",
|
||||
"updated_at": "2021-07-01T10:08:49Z",
|
||||
"pushed_at": "2021-07-01T10:08:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-22354.json
Normal file
25
2021/CVE-2021-22354.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381990386,
|
||||
"name": "CVE-2021-22354",
|
||||
"full_name": "AlAIAL90\/CVE-2021-22354",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-22354",
|
||||
"description": "PoC for exploiting CVE-2021-22354",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:08:46Z",
|
||||
"updated_at": "2021-07-01T10:08:52Z",
|
||||
"pushed_at": "2021-07-01T10:08:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-22367.json
Normal file
25
2021/CVE-2021-22367.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381990403,
|
||||
"name": "CVE-2021-22367",
|
||||
"full_name": "AlAIAL90\/CVE-2021-22367",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-22367",
|
||||
"description": "PoC for exploiting CVE-2021-22367",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:08:50Z",
|
||||
"updated_at": "2021-07-01T10:08:56Z",
|
||||
"pushed_at": "2021-07-01T10:08:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-22368.json
Normal file
25
2021/CVE-2021-22368.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381990423,
|
||||
"name": "CVE-2021-22368",
|
||||
"full_name": "AlAIAL90\/CVE-2021-22368",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-22368",
|
||||
"description": "PoC for exploiting CVE-2021-22368",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:08:54Z",
|
||||
"updated_at": "2021-07-01T10:09:01Z",
|
||||
"pushed_at": "2021-07-01T10:08:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-23398.json
Normal file
25
2021/CVE-2021-23398.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381990035,
|
||||
"name": "CVE-2021-23398",
|
||||
"full_name": "AlAIAL90\/CVE-2021-23398",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-23398",
|
||||
"description": "PoC for exploiting CVE-2021-23398",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:07:37Z",
|
||||
"updated_at": "2021-07-01T10:07:43Z",
|
||||
"pushed_at": "2021-07-01T10:07:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Apache\/Alibaba Dubbo <= 2.7.3 PoC Code for CVE-2021-25641 RCE via Deserialization of Untrusted Data; Affects Versions <= 2.7.6 With Different Gadgets",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-06T06:41:36Z",
|
||||
"updated_at": "2021-07-01T08:43:36Z",
|
||||
"updated_at": "2021-07-01T13:39:17Z",
|
||||
"pushed_at": "2021-06-06T08:41:19Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 29,
|
||||
"watchers": 30,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-07-01T03:15:35Z",
|
||||
"updated_at": "2021-07-01T10:05:29Z",
|
||||
"pushed_at": "2021-04-26T02:30:11Z",
|
||||
"stargazers_count": 794,
|
||||
"watchers_count": 794,
|
||||
"stargazers_count": 795,
|
||||
"watchers_count": 795,
|
||||
"forks_count": 251,
|
||||
"forks": 251,
|
||||
"watchers": 794,
|
||||
"watchers": 795,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -795,13 +795,13 @@
|
|||
"description": "C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection ",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-29T21:10:34Z",
|
||||
"updated_at": "2021-06-20T20:46:21Z",
|
||||
"updated_at": "2021-07-01T12:39:31Z",
|
||||
"pushed_at": "2021-03-31T11:57:38Z",
|
||||
"stargazers_count": 133,
|
||||
"watchers_count": 133,
|
||||
"stargazers_count": 134,
|
||||
"watchers_count": 134,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 133,
|
||||
"watchers": 134,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A Proof of concept for CVE-2021-27850 affecting Apache Tapestry and leading to unauthencticated remote code execution.",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-25T13:55:41Z",
|
||||
"updated_at": "2021-07-01T07:46:19Z",
|
||||
"updated_at": "2021-07-01T09:33:56Z",
|
||||
"pushed_at": "2021-06-25T14:23:45Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 36,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "WordPress - Authenticated XXE (CVE-2021-29447)",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-16T20:41:26Z",
|
||||
"updated_at": "2021-07-01T08:14:09Z",
|
||||
"updated_at": "2021-07-01T10:26:22Z",
|
||||
"pushed_at": "2021-07-01T08:14:06Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2021/CVE-2021-29676.json
Normal file
25
2021/CVE-2021-29676.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381990108,
|
||||
"name": "CVE-2021-29676",
|
||||
"full_name": "AlAIAL90\/CVE-2021-29676",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-29676",
|
||||
"description": "PoC for exploiting CVE-2021-29676",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:07:49Z",
|
||||
"updated_at": "2021-07-01T10:07:55Z",
|
||||
"pushed_at": "2021-07-01T10:07:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-29677.json
Normal file
25
2021/CVE-2021-29677.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381990208,
|
||||
"name": "CVE-2021-29677",
|
||||
"full_name": "AlAIAL90\/CVE-2021-29677",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-29677",
|
||||
"description": "PoC for exploiting CVE-2021-29677",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:08:10Z",
|
||||
"updated_at": "2021-07-01T10:08:16Z",
|
||||
"pushed_at": "2021-07-01T10:08:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-29945.json
Normal file
25
2021/CVE-2021-29945.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381990324,
|
||||
"name": "CVE-2021-29945",
|
||||
"full_name": "AlAIAL90\/CVE-2021-29945",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-29945",
|
||||
"description": "PoC for exploiting CVE-2021-29945",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:08:34Z",
|
||||
"updated_at": "2021-07-01T10:08:41Z",
|
||||
"pushed_at": "2021-07-01T10:08:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-29948.json
Normal file
25
2021/CVE-2021-29948.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381990608,
|
||||
"name": "CVE-2021-29948",
|
||||
"full_name": "AlAIAL90\/CVE-2021-29948",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-29948",
|
||||
"description": "PoC for exploiting CVE-2021-29948",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:09:32Z",
|
||||
"updated_at": "2021-07-01T10:09:38Z",
|
||||
"pushed_at": "2021-07-01T10:09:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-29949.json
Normal file
25
2021/CVE-2021-29949.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381990754,
|
||||
"name": "CVE-2021-29949",
|
||||
"full_name": "AlAIAL90\/CVE-2021-29949",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-29949",
|
||||
"description": "PoC for exploiting CVE-2021-29949",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:10:07Z",
|
||||
"updated_at": "2021-07-01T10:10:13Z",
|
||||
"pushed_at": "2021-07-01T10:10:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-29951.json
Normal file
25
2021/CVE-2021-29951.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381990172,
|
||||
"name": "CVE-2021-29951",
|
||||
"full_name": "AlAIAL90\/CVE-2021-29951",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-29951",
|
||||
"description": "PoC for exploiting CVE-2021-29951",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:08:02Z",
|
||||
"updated_at": "2021-07-01T10:08:09Z",
|
||||
"pushed_at": "2021-07-01T10:08:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-29954.json
Normal file
25
2021/CVE-2021-29954.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381990472,
|
||||
"name": "CVE-2021-29954",
|
||||
"full_name": "AlAIAL90\/CVE-2021-29954",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-29954",
|
||||
"description": "PoC for exploiting CVE-2021-29954",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:09:04Z",
|
||||
"updated_at": "2021-07-01T10:09:10Z",
|
||||
"pushed_at": "2021-07-01T10:09:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-29956.json
Normal file
25
2021/CVE-2021-29956.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381990076,
|
||||
"name": "CVE-2021-29956",
|
||||
"full_name": "AlAIAL90\/CVE-2021-29956",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-29956",
|
||||
"description": "PoC for exploiting CVE-2021-29956",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:07:45Z",
|
||||
"updated_at": "2021-07-01T10:07:51Z",
|
||||
"pushed_at": "2021-07-01T10:07:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-29961.json
Normal file
25
2021/CVE-2021-29961.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381990053,
|
||||
"name": "CVE-2021-29961",
|
||||
"full_name": "AlAIAL90\/CVE-2021-29961",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-29961",
|
||||
"description": "PoC for exploiting CVE-2021-29961",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:07:41Z",
|
||||
"updated_at": "2021-07-01T10:07:47Z",
|
||||
"pushed_at": "2021-07-01T10:07:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-29964.json
Normal file
25
2021/CVE-2021-29964.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381989806,
|
||||
"name": "CVE-2021-29964",
|
||||
"full_name": "AlAIAL90\/CVE-2021-29964",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-29964",
|
||||
"description": "PoC for exploiting CVE-2021-29964",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:06:50Z",
|
||||
"updated_at": "2021-07-01T10:10:23Z",
|
||||
"pushed_at": "2021-07-01T10:10:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-29965.json
Normal file
25
2021/CVE-2021-29965.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381989875,
|
||||
"name": "CVE-2021-29965",
|
||||
"full_name": "AlAIAL90\/CVE-2021-29965",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-29965",
|
||||
"description": "PoC for exploiting CVE-2021-29965",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:07:06Z",
|
||||
"updated_at": "2021-07-01T10:10:45Z",
|
||||
"pushed_at": "2021-07-01T10:10:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-31506.json
Normal file
25
2021/CVE-2021-31506.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381989858,
|
||||
"name": "CVE-2021-31506",
|
||||
"full_name": "AlAIAL90\/CVE-2021-31506",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-31506",
|
||||
"description": "PoC for exploiting CVE-2021-31506",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:07:02Z",
|
||||
"updated_at": "2021-07-01T10:10:40Z",
|
||||
"pushed_at": "2021-07-01T10:10:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-32736.json
Normal file
25
2021/CVE-2021-32736.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381990444,
|
||||
"name": "CVE-2021-32736",
|
||||
"full_name": "AlAIAL90\/CVE-2021-32736",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-32736",
|
||||
"description": "PoC for exploiting CVE-2021-32736",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:08:59Z",
|
||||
"updated_at": "2021-07-01T10:09:06Z",
|
||||
"pushed_at": "2021-07-01T10:09:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-33348.json
Normal file
25
2021/CVE-2021-33348.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381989975,
|
||||
"name": "CVE-2021-33348",
|
||||
"full_name": "AlAIAL90\/CVE-2021-33348",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-33348",
|
||||
"description": "PoC for exploiting CVE-2021-33348",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:07:25Z",
|
||||
"updated_at": "2021-07-01T10:10:58Z",
|
||||
"pushed_at": "2021-07-01T10:10:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-33528.json
Normal file
25
2021/CVE-2021-33528.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381990595,
|
||||
"name": "CVE-2021-33528",
|
||||
"full_name": "AlAIAL90\/CVE-2021-33528",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-33528",
|
||||
"description": "PoC for exploiting CVE-2021-33528",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:09:28Z",
|
||||
"updated_at": "2021-07-01T10:09:34Z",
|
||||
"pushed_at": "2021-07-01T10:09:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-33529.json
Normal file
25
2021/CVE-2021-33529.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381990511,
|
||||
"name": "CVE-2021-33529",
|
||||
"full_name": "AlAIAL90\/CVE-2021-33529",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-33529",
|
||||
"description": "PoC for exploiting CVE-2021-33529",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:09:12Z",
|
||||
"updated_at": "2021-07-01T10:09:18Z",
|
||||
"pushed_at": "2021-07-01T10:09:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-33530.json
Normal file
25
2021/CVE-2021-33530.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381990537,
|
||||
"name": "CVE-2021-33530",
|
||||
"full_name": "AlAIAL90\/CVE-2021-33530",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-33530",
|
||||
"description": "PoC for exploiting CVE-2021-33530",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:09:16Z",
|
||||
"updated_at": "2021-07-01T10:09:23Z",
|
||||
"pushed_at": "2021-07-01T10:09:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-33531.json
Normal file
25
2021/CVE-2021-33531.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381990498,
|
||||
"name": "CVE-2021-33531",
|
||||
"full_name": "AlAIAL90\/CVE-2021-33531",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-33531",
|
||||
"description": "PoC for exploiting CVE-2021-33531",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:09:08Z",
|
||||
"updated_at": "2021-07-01T10:09:14Z",
|
||||
"pushed_at": "2021-07-01T10:09:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-09T06:55:52Z",
|
||||
"updated_at": "2021-06-30T06:31:33Z",
|
||||
"updated_at": "2021-07-01T13:09:34Z",
|
||||
"pushed_at": "2021-06-10T10:31:30Z",
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 108,
|
||||
"watchers": 109,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-34075.json
Normal file
25
2021/CVE-2021-34075.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381989988,
|
||||
"name": "CVE-2021-34075",
|
||||
"full_name": "AlAIAL90\/CVE-2021-34075",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-34075",
|
||||
"description": "PoC for exploiting CVE-2021-34075",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:07:28Z",
|
||||
"updated_at": "2021-07-01T10:07:35Z",
|
||||
"pushed_at": "2021-07-01T10:07:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "openam-CVE-2021-35464 tomcat 执行命令回显",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T03:51:32Z",
|
||||
"updated_at": "2021-07-01T08:43:12Z",
|
||||
"updated_at": "2021-07-01T15:06:00Z",
|
||||
"pushed_at": "2021-07-01T03:56:55Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 10,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 380110029,
|
||||
"name": "CVE-2021-35475",
|
||||
"full_name": "saitamang\/CVE-2021-35475",
|
||||
"owner": {
|
||||
"login": "saitamang",
|
||||
"id": 41514973,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41514973?v=4",
|
||||
"html_url": "https:\/\/github.com\/saitamang"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/saitamang\/CVE-2021-35475",
|
||||
"description": "Writeup for CVE-2021-35475; Stored Cross-Site Scripting(XSS) on SAS® Environment Manager 2.5",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-25T03:08:44Z",
|
||||
"updated_at": "2021-07-01T04:16:42Z",
|
||||
"pushed_at": "2021-07-01T04:16:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -128,13 +128,13 @@
|
|||
"description": "Privilege escalation with polkit - CVE-2021-3560",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-19T08:15:17Z",
|
||||
"updated_at": "2021-06-28T18:46:54Z",
|
||||
"updated_at": "2021-07-01T12:05:56Z",
|
||||
"pushed_at": "2021-06-20T07:38:13Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2021/CVE-2021-35956.json
Normal file
25
2021/CVE-2021-35956.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 382029870,
|
||||
"name": "CVE-2021-35956",
|
||||
"full_name": "tcbutler320\/CVE-2021-35956",
|
||||
"owner": {
|
||||
"login": "tcbutler320",
|
||||
"id": 41709108,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41709108?v=4",
|
||||
"html_url": "https:\/\/github.com\/tcbutler320"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tcbutler320\/CVE-2021-35956",
|
||||
"description": "Proof of Concept Exploit for CVE-2021-35956, AKCP sensorProbe - 'Multiple' Cross Site Scripting (XSS)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T12:44:05Z",
|
||||
"updated_at": "2021-07-01T12:49:26Z",
|
||||
"pushed_at": "2021-07-01T12:46:54Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-35959.json
Normal file
25
2021/CVE-2021-35959.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 381989754,
|
||||
"name": "CVE-2021-35959",
|
||||
"full_name": "AlAIAL90\/CVE-2021-35959",
|
||||
"owner": {
|
||||
"login": "AlAIAL90",
|
||||
"id": 86665563,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86665563?v=4",
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AlAIAL90\/CVE-2021-35959",
|
||||
"description": "PoC for exploiting CVE-2021-35959",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T10:06:41Z",
|
||||
"updated_at": "2021-07-01T10:06:47Z",
|
||||
"pushed_at": "2021-07-01T10:06:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
417
README.md
417
README.md
|
@ -12,6 +12,14 @@ NVIDIA GPU Display Driver for Linux, all versions, contains a vulnerability in t
|
|||
|
||||
- [pokerfaceSad/CVE-2021-1056](https://github.com/pokerfaceSad/CVE-2021-1056)
|
||||
|
||||
### CVE-2021-1075 (2021-04-21)
|
||||
|
||||
<code>
|
||||
NVIDIA Windows GPU Display Driver for Windows, all versions, contains a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgkDdiEscape where the program dereferences a pointer that contains a location for memory that is no longer valid, which may lead to code execution, denial of service, or escalation of privileges. Attacker does not have any control over the information and may conduct limited data modification.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-1075](https://github.com/AlAIAL90/CVE-2021-1075)
|
||||
|
||||
### CVE-2021-1656 (2021-01-12)
|
||||
|
||||
<code>
|
||||
|
@ -31,6 +39,9 @@ Windows Print Spooler Elevation of Privilege Vulnerability
|
|||
- [LaresLLC/CVE-2021-1675](https://github.com/LaresLLC/CVE-2021-1675)
|
||||
- [kondah/patch-cve-2021-1675](https://github.com/kondah/patch-cve-2021-1675)
|
||||
- [evilashz/CVE-2021-1675-LPE-EXP](https://github.com/evilashz/CVE-2021-1675-LPE-EXP)
|
||||
- [hlldz/CVE-2021-1675-LPE](https://github.com/hlldz/CVE-2021-1675-LPE)
|
||||
- [puckiestyle/CVE-2021-1675](https://github.com/puckiestyle/CVE-2021-1675)
|
||||
- [cybersecurityworks553/CVE-2021-1675_PrintNightMare](https://github.com/cybersecurityworks553/CVE-2021-1675_PrintNightMare)
|
||||
|
||||
### CVE-2021-1699 (2021-01-12)
|
||||
|
||||
|
@ -368,6 +379,38 @@ A flaw was found in keycloak. Directories can be created prior to the Java proce
|
|||
|
||||
- [Jarry1sec/CVE-2021-20202](https://github.com/Jarry1sec/CVE-2021-20202)
|
||||
|
||||
### CVE-2021-20477 (2021-06-29)
|
||||
|
||||
<code>
|
||||
IBM Planning Analytics 2.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 196949.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-20477](https://github.com/AlAIAL90/CVE-2021-20477)
|
||||
|
||||
### CVE-2021-20490 (2021-06-29)
|
||||
|
||||
<code>
|
||||
IBM Spectrum Protect Plus 10.1.0 through 10.1.8 could allow a local user to cause a denial of service due to insecure file permission settings. IBM X-Force ID: 197791.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-20490](https://github.com/AlAIAL90/CVE-2021-20490)
|
||||
|
||||
### CVE-2021-20580 (2021-06-29)
|
||||
|
||||
<code>
|
||||
IBM Planning Analytics 2.0 could be vulnerable to cross-site request forgery (CSRF) which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 198241.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-20580](https://github.com/AlAIAL90/CVE-2021-20580)
|
||||
|
||||
### CVE-2021-20583 (2021-06-25)
|
||||
|
||||
<code>
|
||||
IBM Security Verify (IBM Security Verify Privilege Vault 10.9.66) could disclose sensitive information through an HTTP GET request by a privileged user due to improper input validation.. IBM X-Force ID: 199396.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-20583](https://github.com/AlAIAL90/CVE-2021-20583)
|
||||
|
||||
### CVE-2021-20717 (2021-05-10)
|
||||
|
||||
<code>
|
||||
|
@ -517,6 +560,86 @@ Dell dbutil_2_3.sys driver contains an insufficient access control vulnerability
|
|||
- [arnaudluti/PS-CVE-2021-21551](https://github.com/arnaudluti/PS-CVE-2021-21551)
|
||||
- [mathisvickie/CVE-2021-21551](https://github.com/mathisvickie/CVE-2021-21551)
|
||||
|
||||
### CVE-2021-21572 (2021-06-24)
|
||||
|
||||
<code>
|
||||
Dell BIOSConnect feature contains a buffer overflow vulnerability. An authenticated malicious admin user with local access to the system may potentially exploit this vulnerability to run arbitrary code and bypass UEFI restrictions.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-21572](https://github.com/AlAIAL90/CVE-2021-21572)
|
||||
|
||||
### CVE-2021-21573 (2021-06-24)
|
||||
|
||||
<code>
|
||||
Dell BIOSConnect feature contains a buffer overflow vulnerability. An authenticated malicious admin user with local access to the system may potentially exploit this vulnerability to run arbitrary code and bypass UEFI restrictions.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-21573](https://github.com/AlAIAL90/CVE-2021-21573)
|
||||
|
||||
### CVE-2021-21574 (2021-06-24)
|
||||
|
||||
<code>
|
||||
Dell BIOSConnect feature contains a buffer overflow vulnerability. An authenticated malicious admin user with local access to the system may potentially exploit this vulnerability to run arbitrary code and bypass UEFI restrictions.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-21574](https://github.com/AlAIAL90/CVE-2021-21574)
|
||||
|
||||
### CVE-2021-21670 (2021-06-30)
|
||||
|
||||
<code>
|
||||
Jenkins 2.299 and earlier, LTS 2.289.1 and earlier allows users to cancel queue items and abort builds of jobs for which they have Item/Cancel permission even when they do not have Item/Read permission.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-21670](https://github.com/AlAIAL90/CVE-2021-21670)
|
||||
|
||||
### CVE-2021-21671 (2021-06-30)
|
||||
|
||||
<code>
|
||||
Jenkins 2.299 and earlier, LTS 2.289.1 and earlier does not invalidate the previous session on login.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-21671](https://github.com/AlAIAL90/CVE-2021-21671)
|
||||
|
||||
### CVE-2021-21672 (2021-06-30)
|
||||
|
||||
<code>
|
||||
Jenkins Selenium HTML report Plugin 1.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-21672](https://github.com/AlAIAL90/CVE-2021-21672)
|
||||
|
||||
### CVE-2021-21673 (2021-06-30)
|
||||
|
||||
<code>
|
||||
Jenkins CAS Plugin 1.6.0 and earlier improperly determines that a redirect URL after login is legitimately pointing to Jenkins, allowing attackers to perform phishing attacks.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-21673](https://github.com/AlAIAL90/CVE-2021-21673)
|
||||
|
||||
### CVE-2021-21674 (2021-06-30)
|
||||
|
||||
<code>
|
||||
A missing permission check in Jenkins requests-plugin Plugin 2.2.6 and earlier allows attackers with Overall/Read permission to view the list of pending requests.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-21674](https://github.com/AlAIAL90/CVE-2021-21674)
|
||||
|
||||
### CVE-2021-21675 (2021-06-30)
|
||||
|
||||
<code>
|
||||
A cross-site request forgery (CSRF) vulnerability in Jenkins requests-plugin Plugin 2.2.12 and earlier allows attackers to create requests and/or have administrators apply pending requests.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-21675](https://github.com/AlAIAL90/CVE-2021-21675)
|
||||
|
||||
### CVE-2021-21676 (2021-06-30)
|
||||
|
||||
<code>
|
||||
Jenkins requests-plugin Plugin 2.2.7 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to send test emails to an attacker-specified email address.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-21676](https://github.com/AlAIAL90/CVE-2021-21676)
|
||||
|
||||
### CVE-2021-21972 (2021-02-24)
|
||||
|
||||
<code>
|
||||
|
@ -637,6 +760,86 @@ When requests to the internal network for webhooks are enabled, a server-side re
|
|||
- [r0ckysec/CVE-2021-22214](https://github.com/r0ckysec/CVE-2021-22214)
|
||||
- [Vulnmachines/gitlab-cve-2021-22214](https://github.com/Vulnmachines/gitlab-cve-2021-22214)
|
||||
|
||||
### CVE-2021-22346 (2021-06-30)
|
||||
|
||||
<code>
|
||||
There is an Improper Permission Management Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may lead to the disclosure of user habits.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-22346](https://github.com/AlAIAL90/CVE-2021-22346)
|
||||
|
||||
### CVE-2021-22348 (2021-06-30)
|
||||
|
||||
<code>
|
||||
There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause code to execute.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-22348](https://github.com/AlAIAL90/CVE-2021-22348)
|
||||
|
||||
### CVE-2021-22349 (2021-06-30)
|
||||
|
||||
<code>
|
||||
There is an Input Verification Vulnerability in Huawei Smartphone. Successful exploitation of insufficient input verification may cause the system to restart.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-22349](https://github.com/AlAIAL90/CVE-2021-22349)
|
||||
|
||||
### CVE-2021-22350 (2021-06-30)
|
||||
|
||||
<code>
|
||||
There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause the device to crash and restart.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-22350](https://github.com/AlAIAL90/CVE-2021-22350)
|
||||
|
||||
### CVE-2021-22351 (2021-06-30)
|
||||
|
||||
<code>
|
||||
There is a Credentials Management Errors Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may induce users to grant permissions on modifying items in the configuration table,causing system exceptions.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-22351](https://github.com/AlAIAL90/CVE-2021-22351)
|
||||
|
||||
### CVE-2021-22352 (2021-06-30)
|
||||
|
||||
<code>
|
||||
There is a Configuration Defect Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may allow attackers to hijack the device and forge UIs to induce users to execute malicious commands.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-22352](https://github.com/AlAIAL90/CVE-2021-22352)
|
||||
|
||||
### CVE-2021-22353 (2021-06-30)
|
||||
|
||||
<code>
|
||||
There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause the kernel to restart.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-22353](https://github.com/AlAIAL90/CVE-2021-22353)
|
||||
|
||||
### CVE-2021-22354 (2021-06-30)
|
||||
|
||||
<code>
|
||||
There is an Information Disclosure Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause out-of-bounds read.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-22354](https://github.com/AlAIAL90/CVE-2021-22354)
|
||||
|
||||
### CVE-2021-22367 (2021-06-30)
|
||||
|
||||
<code>
|
||||
There is a Key Management Errors Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may lead to authentication bypass.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-22367](https://github.com/AlAIAL90/CVE-2021-22367)
|
||||
|
||||
### CVE-2021-22368 (2021-06-30)
|
||||
|
||||
<code>
|
||||
There is a Permission Control Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect normal use of the device.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-22368](https://github.com/AlAIAL90/CVE-2021-22368)
|
||||
|
||||
### CVE-2021-22893 (2021-04-23)
|
||||
|
||||
<code>
|
||||
|
@ -688,6 +891,14 @@ The package handlebars before 4.7.7 are vulnerable to Prototype Pollution when s
|
|||
|
||||
- [dn9uy3n/Check-CVE-2021-23383](https://github.com/dn9uy3n/Check-CVE-2021-23383)
|
||||
|
||||
### CVE-2021-23398 (2021-06-24)
|
||||
|
||||
<code>
|
||||
All versions of package react-bootstrap-table are vulnerable to Cross-site Scripting (XSS) via the dataFormat parameter. The problem is triggered when an invalid React element is returned, leading to dangerouslySetInnerHTML being used, which does not sanitize the output.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-23398](https://github.com/AlAIAL90/CVE-2021-23398)
|
||||
|
||||
### CVE-2021-24027 (2021-04-06)
|
||||
|
||||
<code>
|
||||
|
@ -1228,6 +1439,94 @@ In FreeBSD 13.0-STABLE before n245050, 12.2-STABLE before r369525, 13.0-RC4 befo
|
|||
|
||||
- [raymontag/cve-2021-29627](https://github.com/raymontag/cve-2021-29627)
|
||||
|
||||
### CVE-2021-29676 (2021-06-25)
|
||||
|
||||
<code>
|
||||
IBM Security Verify (IBM Security Verify Privilege Vault 10.9.66) is vulnerable to link injection. By persuading a victim to click on a specially-crafted URL link, a remote attacker could exploit this vulnerability to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-29676](https://github.com/AlAIAL90/CVE-2021-29676)
|
||||
|
||||
### CVE-2021-29677 (2021-06-25)
|
||||
|
||||
<code>
|
||||
IBM Security Verify (IBM Security Verify Privilege Vault 10.9.66) is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-29677](https://github.com/AlAIAL90/CVE-2021-29677)
|
||||
|
||||
### CVE-2021-29945 (2021-06-24)
|
||||
|
||||
<code>
|
||||
The WebAssembly JIT could miscalculate the size of a return type, which could lead to a null read and result in a crash. *Note: This issue only affected x86-32 platforms. Other platforms are unaffected.*. This vulnerability affects Firefox ESR < 78.10, Thunderbird < 78.10, and Firefox < 88.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-29945](https://github.com/AlAIAL90/CVE-2021-29945)
|
||||
|
||||
### CVE-2021-29948 (2021-06-24)
|
||||
|
||||
<code>
|
||||
Signatures are written to disk before and read during verification, which might be subject to a race condition when a malicious local process or user is replacing the file. This vulnerability affects Thunderbird < 78.10.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-29948](https://github.com/AlAIAL90/CVE-2021-29948)
|
||||
|
||||
### CVE-2021-29949 (2021-06-24)
|
||||
|
||||
<code>
|
||||
When loading the shared library that provides the OTR protocol implementation, Thunderbird will initially attempt to open it using a filename that isn't distributed by Thunderbird. If a computer has already been infected with a malicious library of the alternative filename, and the malicious library has been copied to a directory that is contained in the search path for executable libraries, then Thunderbird will load the incorrect library. This vulnerability affects Thunderbird < 78.9.1.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-29949](https://github.com/AlAIAL90/CVE-2021-29949)
|
||||
|
||||
### CVE-2021-29951 (2021-06-24)
|
||||
|
||||
<code>
|
||||
The Mozilla Maintenance Service granted SERVICE_START access to BUILTIN|Users which, in a domain network, grants normal remote users access to start or stop the service. This could be used to prevent the browser update service from operating (if an attacker spammed the 'Stop' command); but also exposed attack surface in the maintenance service. *Note: This issue only affected Windows operating systems older than Win 10 build 1709. Other operating systems are unaffected.*. This vulnerability affects Thunderbird < 78.10.1, Firefox < 87, and Firefox ESR < 78.10.1.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-29951](https://github.com/AlAIAL90/CVE-2021-29951)
|
||||
|
||||
### CVE-2021-29954 (2021-06-24)
|
||||
|
||||
<code>
|
||||
Proxy functionality built into Hubs Cloud’s Reticulum software allowed access to internal URLs, including the metadata service. This vulnerability affects Hubs Cloud < mozillareality/reticulum/1.0.1/20210428201255.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-29954](https://github.com/AlAIAL90/CVE-2021-29954)
|
||||
|
||||
### CVE-2021-29956 (2021-06-24)
|
||||
|
||||
<code>
|
||||
OpenPGP secret keys that were imported using Thunderbird version 78.8.1 up to version 78.10.1 were stored unencrypted on the user's local disk. The master password protection was inactive for those keys. Version 78.10.2 will restore the protection mechanism for newly imported keys, and will automatically protect keys that had been imported using affected Thunderbird versions. This vulnerability affects Thunderbird < 78.10.2.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-29956](https://github.com/AlAIAL90/CVE-2021-29956)
|
||||
|
||||
### CVE-2021-29961 (2021-06-24)
|
||||
|
||||
<code>
|
||||
When styling and rendering an oversized `<select>` element, Firefox did not apply correct clipping which allowed an attacker to paint over the user interface. This vulnerability affects Firefox < 89.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-29961](https://github.com/AlAIAL90/CVE-2021-29961)
|
||||
|
||||
### CVE-2021-29964 (2021-06-24)
|
||||
|
||||
<code>
|
||||
A locally-installed hostile program could send `WM_COPYDATA` messages that Firefox would process incorrectly, leading to an out-of-bounds read. *This bug only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird < 78.11, Firefox < 89, and Firefox ESR < 78.11.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-29964](https://github.com/AlAIAL90/CVE-2021-29964)
|
||||
|
||||
### CVE-2021-29965 (2021-06-24)
|
||||
|
||||
<code>
|
||||
A malicious website that causes an HTTP Authentication dialog to be spawned could trick the built-in password manager to suggest passwords for the currently active website instead of the website that triggered the dialog. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 89.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-29965](https://github.com/AlAIAL90/CVE-2021-29965)
|
||||
|
||||
### CVE-2021-30005 (2021-05-11)
|
||||
|
||||
<code>
|
||||
|
@ -1325,6 +1624,14 @@ Microsoft Windows Infrared Data Association (IrDA) Information Disclosure Vulner
|
|||
|
||||
- [waleedassar/CVE-2021-31184](https://github.com/waleedassar/CVE-2021-31184)
|
||||
|
||||
### CVE-2021-31506 (2021-06-29)
|
||||
|
||||
<code>
|
||||
This vulnerability allows remote attackers to disclose sensitive information on affected installations of OpenText Brava! Desktop Build 16.6.4.55. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated data structure. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-13674.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-31506](https://github.com/AlAIAL90/CVE-2021-31506)
|
||||
|
||||
### CVE-2021-31702 (2021-05-29)
|
||||
|
||||
<code>
|
||||
|
@ -1403,6 +1710,14 @@ Insufficient input validation in the Marvin Minsky 1967 implementation of the Un
|
|||
### CVE-2021-32537
|
||||
- [0vercl0k/CVE-2021-32537](https://github.com/0vercl0k/CVE-2021-32537)
|
||||
|
||||
### CVE-2021-32736 (2021-06-30)
|
||||
|
||||
<code>
|
||||
think-helper defines a set of helper functions for ThinkJS. In versions of think-helper prior to 1.1.3, the software receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype. The vulnerability is patched in version 1.1.3.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-32736](https://github.com/AlAIAL90/CVE-2021-32736)
|
||||
|
||||
### CVE-2021-32819 (2021-05-14)
|
||||
|
||||
<code>
|
||||
|
@ -1411,6 +1726,46 @@ Squirrelly is a template engine implemented in JavaScript that works out of the
|
|||
|
||||
- [Abady0x1/CVE-2021-32819](https://github.com/Abady0x1/CVE-2021-32819)
|
||||
|
||||
### CVE-2021-33348 (2021-06-24)
|
||||
|
||||
<code>
|
||||
An issue was discovered in JFinal framework v4.9.10 and below. The "set" method of the "Controller" class of jfinal framework is not strictly filtered, which will lead to XSS vulnerabilities in some cases.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-33348](https://github.com/AlAIAL90/CVE-2021-33348)
|
||||
|
||||
### CVE-2021-33528 (2021-06-25)
|
||||
|
||||
<code>
|
||||
In Weidmueller Industrial WLAN devices in multiple versions an exploitable privilege escalation vulnerability exists in the iw_console functionality. A specially crafted menu selection string can cause an escape from the restricted console, resulting in system access as the root user. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-33528](https://github.com/AlAIAL90/CVE-2021-33528)
|
||||
|
||||
### CVE-2021-33529 (2021-06-25)
|
||||
|
||||
<code>
|
||||
In Weidmueller Industrial WLAN devices in multiple versions the usage of hard-coded cryptographic keys within the service agent binary allows for the decryption of captured traffic across the network from or to the device.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-33529](https://github.com/AlAIAL90/CVE-2021-33529)
|
||||
|
||||
### CVE-2021-33530 (2021-06-25)
|
||||
|
||||
<code>
|
||||
In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in encrypted diagnostic script functionality of the devices. A specially crafted diagnostic script file can cause arbitrary busybox commands to be executed, resulting in remote control over the device. An attacker can send diagnostic while authenticated as a low privilege user to trigger this vulnerability.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-33530](https://github.com/AlAIAL90/CVE-2021-33530)
|
||||
|
||||
### CVE-2021-33531 (2021-06-25)
|
||||
|
||||
<code>
|
||||
In Weidmueller Industrial WLAN devices in multiple versions an exploitable use of hard-coded credentials vulnerability exists in multiple iw_* utilities. The device operating system contains an undocumented encryption password, allowing for the creation of custom diagnostic scripts. An attacker can send diagnostic scripts while authenticated as a low privilege user to trigger this vulnerability.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-33531](https://github.com/AlAIAL90/CVE-2021-33531)
|
||||
|
||||
### CVE-2021-33558 (2021-05-27)
|
||||
|
||||
<code>
|
||||
|
@ -1451,6 +1806,14 @@ Tencent GameLoop before 4.1.21.90 downloaded updates over an insecure HTTP conne
|
|||
|
||||
- [mmiszczyk/cve-2021-33879](https://github.com/mmiszczyk/cve-2021-33879)
|
||||
|
||||
### CVE-2021-34075 (2021-06-30)
|
||||
|
||||
<code>
|
||||
In Artica Pandora FMS <=754 in the File Manager component, there is sensitive information exposed on the client side which attackers can access.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-34075](https://github.com/AlAIAL90/CVE-2021-34075)
|
||||
|
||||
### CVE-2021-35448 (2021-06-24)
|
||||
|
||||
<code>
|
||||
|
@ -1462,13 +1825,21 @@ Emote Interactive Remote Mouse 3.008 on Windows allows attackers to execute arbi
|
|||
### CVE-2021-35464
|
||||
- [Y4er/openam-CVE-2021-35464](https://github.com/Y4er/openam-CVE-2021-35464)
|
||||
|
||||
### CVE-2021-35475 (2021-06-25)
|
||||
### CVE-2021-35956 (2021-06-30)
|
||||
|
||||
<code>
|
||||
SAS Environment Manager 2.5 allows XSS through the Name field when creating/editing a server. The XSS will prompt when editing the Configuration Properties.
|
||||
Stored cross-site scripting (XSS) in the embedded webserver of AKCP sensorProbe before SP480-20210624 enables remote authenticated attackers to introduce arbitrary JavaScript via the Sensor Description, Email (from/to/cc), System Name, and System Location fields.
|
||||
</code>
|
||||
|
||||
- [saitamang/CVE-2021-35475](https://github.com/saitamang/CVE-2021-35475)
|
||||
- [tcbutler320/CVE-2021-35956](https://github.com/tcbutler320/CVE-2021-35956)
|
||||
|
||||
### CVE-2021-35959 (2021-06-29)
|
||||
|
||||
<code>
|
||||
In Plone 5.0 through 5.2.4, Editors are vulnerable to XSS in the folder contents view, if a Contributor has created a folder with a SCRIPT tag in the description field.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2021-35959](https://github.com/AlAIAL90/CVE-2021-35959)
|
||||
|
||||
|
||||
## 2020
|
||||
|
@ -2107,6 +2478,14 @@ A Local File Inclusion vulnerability in Juniper Networks Junos Space allows an a
|
|||
|
||||
- [Ibonok/CVE-2020-1611](https://github.com/Ibonok/CVE-2020-1611)
|
||||
|
||||
### CVE-2020-1675 (2020-10-16)
|
||||
|
||||
<code>
|
||||
When Security Assertion Markup Language (SAML) authentication is enabled, Juniper Networks Mist Cloud UI might incorrectly process invalid authentication certificates which could allow a malicious network-based user to access unauthorized data. This issue affects all Juniper Networks Mist Cloud UI versions prior to September 2 2020.
|
||||
</code>
|
||||
|
||||
- [DenizSe/CVE-2020-1675](https://github.com/DenizSe/CVE-2020-1675)
|
||||
|
||||
### CVE-2020-1764 (2020-03-26)
|
||||
|
||||
<code>
|
||||
|
@ -4804,6 +5183,22 @@ A Remote Code Execution vulnerability has been found in Inspur ClusterEngine V4.
|
|||
|
||||
- [MzzdToT/CVE-2020-21224](https://github.com/MzzdToT/CVE-2020-21224)
|
||||
|
||||
### CVE-2020-21784 (2021-06-24)
|
||||
|
||||
<code>
|
||||
phpwcms 1.9.13 is vulnerable to Code Injection via /phpwcms/setup/setup.php.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2020-21784](https://github.com/AlAIAL90/CVE-2020-21784)
|
||||
|
||||
### CVE-2020-21787 (2021-06-24)
|
||||
|
||||
<code>
|
||||
CRMEB 3.1.0+ is vulnerable to File Upload Getshell via /crmeb/crmeb/services/UploadService.php.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2020-21787](https://github.com/AlAIAL90/CVE-2020-21787)
|
||||
|
||||
### CVE-2020-23160 (2021-01-22)
|
||||
|
||||
<code>
|
||||
|
@ -4924,6 +5319,22 @@ Playground Sessions v2.5.582 (and earlier) for Windows, stores the user credenti
|
|||
|
||||
- [nathunandwani/CVE-2020-24227](https://github.com/nathunandwani/CVE-2020-24227)
|
||||
|
||||
### CVE-2020-24511 (2021-06-09)
|
||||
|
||||
<code>
|
||||
Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2020-24511](https://github.com/AlAIAL90/CVE-2020-24511)
|
||||
|
||||
### CVE-2020-24512 (2021-06-09)
|
||||
|
||||
<code>
|
||||
Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
|
||||
</code>
|
||||
|
||||
- [AlAIAL90/CVE-2020-24512](https://github.com/AlAIAL90/CVE-2020-24512)
|
||||
|
||||
### CVE-2020-24572 (2020-08-24)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Add table
Reference in a new issue