mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/10/31 18:12:52
This commit is contained in:
parent
59ff9e8e97
commit
42e3026ad9
22 changed files with 162 additions and 117 deletions
|
@ -546,33 +546,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 156669000,
|
||||
"name": "IDB_Share",
|
||||
"full_name": "R0fM1a\/IDB_Share",
|
||||
"owner": {
|
||||
"login": "R0fM1a",
|
||||
"id": 44599121,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44599121?v=4",
|
||||
"html_url": "https:\/\/github.com\/R0fM1a"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/R0fM1a\/IDB_Share",
|
||||
"description": "CVE-2017-11882 analyse notebook",
|
||||
"fork": false,
|
||||
"created_at": "2018-11-08T07:44:32Z",
|
||||
"updated_at": "2018-11-08T10:27:41Z",
|
||||
"pushed_at": "2018-11-08T10:27:40Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 161162866,
|
||||
"name": "CVE-2017-11882",
|
||||
|
|
|
@ -127,8 +127,8 @@
|
|||
"description": "It is a simple script to exploit RCE for Samba (CVE-2017-7494 ).",
|
||||
"fork": false,
|
||||
"created_at": "2017-05-30T15:08:32Z",
|
||||
"updated_at": "2021-09-03T09:07:53Z",
|
||||
"pushed_at": "2021-09-06T21:32:05Z",
|
||||
"updated_at": "2021-10-31T07:06:28Z",
|
||||
"pushed_at": "2021-10-31T07:06:25Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 24,
|
||||
|
|
|
@ -681,12 +681,12 @@
|
|||
"pushed_at": "2019-05-16T02:12:17Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 32,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"forks": 33,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "漏洞POC、EXP合集,持续更新。ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露、ConfluenceRCE(CVE-2021-26084)、ZeroShell防火墙RCE(CVE-2019-12725)",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-22T05:06:33Z",
|
||||
"updated_at": "2021-10-21T07:11:21Z",
|
||||
"updated_at": "2021-10-31T08:12:05Z",
|
||||
"pushed_at": "2021-09-22T02:19:32Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"forks_count": 6,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 30,
|
||||
"forks": 7,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -44,7 +44,7 @@
|
|||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2950,
|
||||
"watchers_count": 2950,
|
||||
"forks_count": 870,
|
||||
"forks_count": 871,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -69,7 +69,7 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 870,
|
||||
"forks": 871,
|
||||
"watchers": 2950,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -67,17 +67,17 @@
|
|||
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T00:08:27Z",
|
||||
"updated_at": "2021-10-28T08:35:14Z",
|
||||
"updated_at": "2021-10-31T03:16:47Z",
|
||||
"pushed_at": "2020-01-22T20:23:51Z",
|
||||
"stargazers_count": 534,
|
||||
"watchers_count": 534,
|
||||
"stargazers_count": 535,
|
||||
"watchers_count": 535,
|
||||
"forks_count": 131,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 131,
|
||||
"watchers": 534,
|
||||
"watchers": 535,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-08T07:37:49Z",
|
||||
"updated_at": "2021-10-17T01:59:46Z",
|
||||
"updated_at": "2021-10-31T06:51:58Z",
|
||||
"pushed_at": "2021-08-07T16:48:55Z",
|
||||
"stargazers_count": 374,
|
||||
"watchers_count": 374,
|
||||
"stargazers_count": 375,
|
||||
"watchers_count": 375,
|
||||
"forks_count": 66,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 66,
|
||||
"watchers": 374,
|
||||
"watchers": 375,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T17:51:29Z",
|
||||
"updated_at": "2021-10-26T13:18:12Z",
|
||||
"updated_at": "2021-10-31T08:29:00Z",
|
||||
"pushed_at": "2021-08-16T18:16:20Z",
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -40,7 +40,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 93,
|
||||
"watchers": 94,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2950,
|
||||
"watchers_count": 2950,
|
||||
"forks_count": 870,
|
||||
"forks_count": 871,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -42,7 +42,7 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 870,
|
||||
"forks": 871,
|
||||
"watchers": 2950,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -98,12 +98,12 @@
|
|||
"pushed_at": "2020-07-24T17:11:05Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2021-10-26T00:34:54Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T17:51:29Z",
|
||||
"updated_at": "2021-10-26T13:18:12Z",
|
||||
"updated_at": "2021-10-31T08:29:00Z",
|
||||
"pushed_at": "2021-08-16T18:16:20Z",
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -40,7 +40,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 93,
|
||||
"watchers": 94,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T15:42:16Z",
|
||||
"updated_at": "2021-10-30T23:03:51Z",
|
||||
"updated_at": "2021-10-31T08:49:31Z",
|
||||
"pushed_at": "2021-10-28T02:46:54Z",
|
||||
"stargazers_count": 129,
|
||||
"watchers_count": 129,
|
||||
"forks_count": 27,
|
||||
"stargazers_count": 131,
|
||||
"watchers_count": 131,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 129,
|
||||
"forks": 28,
|
||||
"watchers": 131,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -40,17 +40,17 @@
|
|||
"description": "Pocsuite3 For CVE-2021-22205",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-28T06:29:37Z",
|
||||
"updated_at": "2021-10-30T20:37:27Z",
|
||||
"updated_at": "2021-10-31T08:11:03Z",
|
||||
"pushed_at": "2021-10-28T08:54:26Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"forks_count": 19,
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 61,
|
||||
"forks": 20,
|
||||
"watchers": 62,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -67,17 +67,17 @@
|
|||
"description": "CVE-2021-22205 Unauthorized RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-28T14:02:51Z",
|
||||
"updated_at": "2021-10-30T18:44:28Z",
|
||||
"updated_at": "2021-10-31T06:45:42Z",
|
||||
"pushed_at": "2021-10-28T14:20:05Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 32,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -121,10 +121,10 @@
|
|||
"description": "CVE-2021-22205& GitLab CE\/EE RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-29T04:30:45Z",
|
||||
"updated_at": "2021-10-30T09:33:50Z",
|
||||
"updated_at": "2021-10-31T07:08:20Z",
|
||||
"pushed_at": "2021-10-29T04:31:15Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -133,7 +133,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -150,17 +150,17 @@
|
|||
"description": "CVE-2021-22205 移除了对djvumake & djvulibre的依赖,可在win平台使用",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-30T02:56:34Z",
|
||||
"updated_at": "2021-10-30T08:52:27Z",
|
||||
"updated_at": "2021-10-31T08:13:07Z",
|
||||
"pushed_at": "2021-10-30T03:04:03Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -189,5 +189,34 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 423050288,
|
||||
"name": "CVE-2021-22205",
|
||||
"full_name": "Seals6\/CVE-2021-22205",
|
||||
"owner": {
|
||||
"login": "Seals6",
|
||||
"id": 49613759,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49613759?v=4",
|
||||
"html_url": "https:\/\/github.com\/Seals6"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Seals6\/CVE-2021-22205",
|
||||
"description": "CVE-2021-22205未授权漏洞批量检测",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-31T04:15:30Z",
|
||||
"updated_at": "2021-10-31T05:16:36Z",
|
||||
"pushed_at": "2021-10-31T04:59:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2021-22205"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Gitlab CI Lint API未授权 SSRF漏洞 (CVE-2021-22214)",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-22T03:04:50Z",
|
||||
"updated_at": "2021-10-30T10:28:51Z",
|
||||
"updated_at": "2021-10-31T08:58:52Z",
|
||||
"pushed_at": "2021-06-22T04:35:08Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 46,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "漏洞POC、EXP合集,持续更新。ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露、ConfluenceRCE(CVE-2021-26084)、ZeroShell防火墙RCE(CVE-2019-12725)",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-22T05:06:33Z",
|
||||
"updated_at": "2021-10-21T07:11:21Z",
|
||||
"updated_at": "2021-10-31T08:12:05Z",
|
||||
"pushed_at": "2021-09-22T02:19:32Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"forks_count": 6,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 30,
|
||||
"forks": 7,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-31T16:30:02Z",
|
||||
"updated_at": "2021-10-23T03:35:47Z",
|
||||
"updated_at": "2021-10-31T08:02:13Z",
|
||||
"pushed_at": "2021-03-29T12:33:38Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 73,
|
||||
"watchers": 74,
|
||||
"score": 0
|
||||
}
|
||||
]
|
35
2021/CVE-2021-28079.json
Normal file
35
2021/CVE-2021-28079.json
Normal file
|
@ -0,0 +1,35 @@
|
|||
[
|
||||
{
|
||||
"id": 423093176,
|
||||
"name": "CVE-2021-28079",
|
||||
"full_name": "g33xter\/CVE-2021-28079",
|
||||
"owner": {
|
||||
"login": "g33xter",
|
||||
"id": 8503135,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8503135?v=4",
|
||||
"html_url": "https:\/\/github.com\/g33xter"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/g33xter\/CVE-2021-28079",
|
||||
"description": "POC Jamovi <=1.6.18 is affected by a cross-site scripting (XSS) vulnerability. The column-name is vulnerable to XSS in the ElectronJS Framework. An attacker can make a .omv (Jamovi) document containing a payload. When opened by victim, the payload is triggered.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-31T08:29:53Z",
|
||||
"updated_at": "2021-10-31T09:03:17Z",
|
||||
"pushed_at": "2021-10-31T08:57:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2021-28079",
|
||||
"electronjs",
|
||||
"jamovi",
|
||||
"omv",
|
||||
"xss-exploitation"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -207,7 +207,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-02-21T06:27:18Z",
|
||||
"updated_at": "2021-10-24T10:27:36Z",
|
||||
"pushed_at": "2021-02-21T06:34:17Z",
|
||||
"pushed_at": "2021-10-31T06:01:27Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 8,
|
||||
|
|
|
@ -452,17 +452,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2021-10-29T20:35:57Z",
|
||||
"updated_at": "2021-10-31T05:40:43Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 766,
|
||||
"watchers_count": 766,
|
||||
"stargazers_count": 765,
|
||||
"watchers_count": 765,
|
||||
"forks_count": 224,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 224,
|
||||
"watchers": 766,
|
||||
"watchers": 765,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1023,17 +1023,17 @@
|
|||
"description": "Sudo Baron Samedit Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-15T17:37:02Z",
|
||||
"updated_at": "2021-10-29T06:33:10Z",
|
||||
"updated_at": "2021-10-31T05:35:50Z",
|
||||
"pushed_at": "2021-07-23T15:46:37Z",
|
||||
"stargazers_count": 382,
|
||||
"watchers_count": 382,
|
||||
"stargazers_count": 383,
|
||||
"watchers_count": 383,
|
||||
"forks_count": 91,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 91,
|
||||
"watchers": 382,
|
||||
"watchers": 383,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -761,8 +761,8 @@
|
|||
"description": "TIC4301 Project - CVE-2021-40444",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-16T07:07:26Z",
|
||||
"updated_at": "2021-10-16T08:52:11Z",
|
||||
"pushed_at": "2021-10-16T08:52:08Z",
|
||||
"updated_at": "2021-10-31T06:54:05Z",
|
||||
"pushed_at": "2021-10-31T06:54:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
|
@ -815,8 +815,8 @@
|
|||
"description": "An attempt to reproduce Microsoft MSHTML Remote Code Execution (RCE) Vulnerability and using Metasploit Framework.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-28T14:55:46Z",
|
||||
"updated_at": "2021-10-29T05:15:37Z",
|
||||
"pushed_at": "2021-10-29T05:15:34Z",
|
||||
"updated_at": "2021-10-31T08:15:03Z",
|
||||
"pushed_at": "2021-10-31T08:15:00Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -779,10 +779,10 @@
|
|||
"description": "A framework for bug hunting or pentesting targeting websites that have CVE-2021-41773 Vulnerability in public ",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-07T01:31:13Z",
|
||||
"updated_at": "2021-10-30T12:55:02Z",
|
||||
"updated_at": "2021-10-31T07:01:02Z",
|
||||
"pushed_at": "2021-10-07T08:25:26Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -795,7 +795,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
10
README.md
10
README.md
|
@ -881,6 +881,7 @@ An issue has been discovered in GitLab CE/EE affecting all versions starting fro
|
|||
- [Al1ex/CVE-2021-22205](https://github.com/Al1ex/CVE-2021-22205)
|
||||
- [whwlsfb/CVE-2021-22205](https://github.com/whwlsfb/CVE-2021-22205)
|
||||
- [findneo/GitLab-preauth-RCE_CVE-2021-22205](https://github.com/findneo/GitLab-preauth-RCE_CVE-2021-22205)
|
||||
- [Seals6/CVE-2021-22205](https://github.com/Seals6/CVE-2021-22205)
|
||||
|
||||
### CVE-2021-22214 (2021-06-08)
|
||||
|
||||
|
@ -1578,6 +1579,14 @@ The MsIo64.sys driver before 1.1.19.1016 in MSI Dragon Center before 2.0.98.0 ha
|
|||
- [mathisvickie/CVE-2021-27965](https://github.com/mathisvickie/CVE-2021-27965)
|
||||
- [Crystalware/CVE-2021-27965](https://github.com/Crystalware/CVE-2021-27965)
|
||||
|
||||
### CVE-2021-28079 (2021-04-26)
|
||||
|
||||
<code>
|
||||
Jamovi <=1.6.18 is affected by a cross-site scripting (XSS) vulnerability. The column-name is vulnerable to XSS in the ElectronJS Framework. An attacker can make a .omv (Jamovi) document containing a payload. When opened by victim, the payload is triggered.
|
||||
</code>
|
||||
|
||||
- [g33xter/CVE-2021-28079](https://github.com/g33xter/CVE-2021-28079)
|
||||
|
||||
### CVE-2021-28310 (2021-04-13)
|
||||
|
||||
<code>
|
||||
|
@ -16312,7 +16321,6 @@ Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Micr
|
|||
- [ChaitanyaHaritash/CVE-2017-11882](https://github.com/ChaitanyaHaritash/CVE-2017-11882)
|
||||
- [qy1202/https-github.com-Ridter-CVE-2017-11882-](https://github.com/qy1202/https-github.com-Ridter-CVE-2017-11882-)
|
||||
- [j0lama/CVE-2017-11882](https://github.com/j0lama/CVE-2017-11882)
|
||||
- [R0fM1a/IDB_Share](https://github.com/R0fM1a/IDB_Share)
|
||||
- [chanbin/CVE-2017-11882](https://github.com/chanbin/CVE-2017-11882)
|
||||
- [littlebin404/CVE-2017-11882](https://github.com/littlebin404/CVE-2017-11882)
|
||||
- [ekgg/Overflow-Demo-CVE-2017-11882](https://github.com/ekgg/Overflow-Demo-CVE-2017-11882)
|
||||
|
|
Loading…
Reference in a new issue