mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/07/15 18:11:58
This commit is contained in:
parent
29dd5aa473
commit
4b928597d8
26 changed files with 282 additions and 84 deletions
25
2012/CVE-2012-1870.json
Normal file
25
2012/CVE-2012-1870.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 386163416,
|
||||
"name": "CVE-2012-1870",
|
||||
"full_name": "fkm75P8YjLkb\/CVE-2012-1870",
|
||||
"owner": {
|
||||
"login": "fkm75P8YjLkb",
|
||||
"id": 82131630,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82131630?v=4",
|
||||
"html_url": "https:\/\/github.com\/fkm75P8YjLkb"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fkm75P8YjLkb\/CVE-2012-1870",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-15T04:33:10Z",
|
||||
"updated_at": "2021-07-15T04:33:10Z",
|
||||
"pushed_at": "2021-07-15T04:33:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2013-2596 exploit for android",
|
||||
"fork": false,
|
||||
"created_at": "2013-07-16T11:24:09Z",
|
||||
"updated_at": "2019-10-20T07:13:22Z",
|
||||
"updated_at": "2021-07-15T07:52:01Z",
|
||||
"pushed_at": "2013-07-17T03:18:50Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -105,13 +105,13 @@
|
|||
"description": "CVE-2017-11882 Exploit accepts over 17k bytes long command\/code in maximum.",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-21T15:22:41Z",
|
||||
"updated_at": "2021-07-03T10:16:57Z",
|
||||
"updated_at": "2021-07-15T03:39:38Z",
|
||||
"pushed_at": "2017-12-06T12:47:31Z",
|
||||
"stargazers_count": 286,
|
||||
"watchers_count": 286,
|
||||
"stargazers_count": 287,
|
||||
"watchers_count": 287,
|
||||
"forks_count": 87,
|
||||
"forks": 87,
|
||||
"watchers": 286,
|
||||
"watchers": 287,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -178,8 +178,8 @@
|
|||
"pushed_at": "2017-04-05T23:29:03Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"forks_count": 43,
|
||||
"forks": 43,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-29T07:08:52Z",
|
||||
"updated_at": "2021-07-14T18:41:41Z",
|
||||
"updated_at": "2021-07-15T08:04:37Z",
|
||||
"pushed_at": "2020-06-13T17:40:14Z",
|
||||
"stargazers_count": 588,
|
||||
"watchers_count": 588,
|
||||
"stargazers_count": 589,
|
||||
"watchers_count": 589,
|
||||
"forks_count": 84,
|
||||
"forks": 84,
|
||||
"watchers": 588,
|
||||
"watchers": 589,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Course enrolments allowed privilege escalation from teacher role into manager role to RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-26T01:28:53Z",
|
||||
"updated_at": "2021-07-13T13:17:53Z",
|
||||
"updated_at": "2021-07-15T06:12:01Z",
|
||||
"pushed_at": "2021-06-20T08:46:12Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 21,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-07-14T06:26:09Z",
|
||||
"updated_at": "2021-07-15T09:14:50Z",
|
||||
"pushed_at": "2021-04-26T02:30:11Z",
|
||||
"stargazers_count": 807,
|
||||
"watchers_count": 807,
|
||||
"stargazers_count": 808,
|
||||
"watchers_count": 808,
|
||||
"forks_count": 255,
|
||||
"forks": 255,
|
||||
"watchers": 807,
|
||||
"watchers": 808,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -615,8 +615,8 @@
|
|||
"pushed_at": "2021-07-12T06:06:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-24148 Proof-of-Concept",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-12T02:01:26Z",
|
||||
"updated_at": "2021-07-12T17:27:32Z",
|
||||
"updated_at": "2021-07-15T04:48:12Z",
|
||||
"pushed_at": "2021-07-12T02:25:14Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "tomcat使用了自带session同步功能时,不安全的配置(没有使用EncryptInterceptor)导致存在的反序列化漏洞,通过精心构造的数据包, 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-9484,9484是session持久化的洞,这个是session集群同步的洞!",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-19T05:12:53Z",
|
||||
"updated_at": "2021-07-01T06:48:12Z",
|
||||
"updated_at": "2021-07-15T06:15:15Z",
|
||||
"pushed_at": "2020-05-19T05:13:19Z",
|
||||
"stargazers_count": 200,
|
||||
"watchers_count": 200,
|
||||
"stargazers_count": 201,
|
||||
"watchers_count": 201,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 200,
|
||||
"watchers": 201,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T09:00:31Z",
|
||||
"updated_at": "2021-07-08T11:08:46Z",
|
||||
"updated_at": "2021-07-15T03:50:25Z",
|
||||
"pushed_at": "2021-07-02T10:47:36Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -132,8 +132,8 @@
|
|||
"pushed_at": "2021-07-05T06:46:12Z",
|
||||
"stargazers_count": 270,
|
||||
"watchers_count": 270,
|
||||
"forks_count": 61,
|
||||
"forks": 61,
|
||||
"forks_count": 62,
|
||||
"forks": 62,
|
||||
"watchers": 270,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -542,13 +542,13 @@
|
|||
"description": "Information on the Windows Spooler vulnerability - CVE-2021-1675; CVE 2021 34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-07T08:32:09Z",
|
||||
"updated_at": "2021-07-13T19:19:55Z",
|
||||
"updated_at": "2021-07-15T05:54:08Z",
|
||||
"pushed_at": "2021-07-12T09:28:16Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2021-1732 Microsoft Windows 10 本地提权漏 研究及Poc\/Exploit开发",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-08T05:07:15Z",
|
||||
"updated_at": "2021-07-15T02:58:02Z",
|
||||
"updated_at": "2021-07-15T06:02:02Z",
|
||||
"pushed_at": "2021-03-08T11:41:19Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 25,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 26,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-22192 靶场: 未授权用户 RCE 漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-27T07:09:46Z",
|
||||
"updated_at": "2021-06-30T02:23:49Z",
|
||||
"updated_at": "2021-07-15T03:28:01Z",
|
||||
"pushed_at": "2021-05-02T05:34:29Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 27,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-07T11:10:40Z",
|
||||
"updated_at": "2021-07-11T13:56:45Z",
|
||||
"updated_at": "2021-07-15T06:25:21Z",
|
||||
"pushed_at": "2021-04-15T12:46:54Z",
|
||||
"stargazers_count": 182,
|
||||
"watchers_count": 182,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 182,
|
||||
"stargazers_count": 183,
|
||||
"watchers_count": 183,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"watchers": 183,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-07-14T06:26:09Z",
|
||||
"updated_at": "2021-07-15T09:14:50Z",
|
||||
"pushed_at": "2021-04-26T02:30:11Z",
|
||||
"stargazers_count": 807,
|
||||
"watchers_count": 807,
|
||||
"stargazers_count": 808,
|
||||
"watchers_count": 808,
|
||||
"forks_count": 255,
|
||||
"forks": 255,
|
||||
"watchers": 807,
|
||||
"watchers": 808,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2021/CVE-2021-26690.json
Normal file
25
2021/CVE-2021-26690.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 386164563,
|
||||
"name": "CVE-2021-26690",
|
||||
"full_name": "fkm75P8YjLkb\/CVE-2021-26690",
|
||||
"owner": {
|
||||
"login": "fkm75P8YjLkb",
|
||||
"id": 82131630,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82131630?v=4",
|
||||
"html_url": "https:\/\/github.com\/fkm75P8YjLkb"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fkm75P8YjLkb\/CVE-2021-26690",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-15T04:38:43Z",
|
||||
"updated_at": "2021-07-15T04:38:43Z",
|
||||
"pushed_at": "2021-07-15T04:38:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-26691.json
Normal file
25
2021/CVE-2021-26691.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 386164410,
|
||||
"name": "CVE-2021-26691",
|
||||
"full_name": "fkm75P8YjLkb\/CVE-2021-26691",
|
||||
"owner": {
|
||||
"login": "fkm75P8YjLkb",
|
||||
"id": 82131630,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82131630?v=4",
|
||||
"html_url": "https:\/\/github.com\/fkm75P8YjLkb"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fkm75P8YjLkb\/CVE-2021-26691",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-15T04:37:58Z",
|
||||
"updated_at": "2021-07-15T04:37:58Z",
|
||||
"pushed_at": "2021-07-15T04:37:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "A PowerShell script to identify indicators of exploitation of CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-26865",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-03T17:36:18Z",
|
||||
"updated_at": "2021-06-30T06:07:31Z",
|
||||
"updated_at": "2021-07-15T07:34:15Z",
|
||||
"pushed_at": "2021-03-05T17:09:01Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-31T18:02:39Z",
|
||||
"updated_at": "2021-07-13T16:48:14Z",
|
||||
"updated_at": "2021-07-15T06:23:34Z",
|
||||
"pushed_at": "2021-06-01T15:08:23Z",
|
||||
"stargazers_count": 172,
|
||||
"watchers_count": 172,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 172,
|
||||
"stargazers_count": 174,
|
||||
"watchers_count": 174,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 174,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2021/CVE-2021-30641.json
Normal file
25
2021/CVE-2021-30641.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 386163197,
|
||||
"name": "CVE-2021-30641",
|
||||
"full_name": "fkm75P8YjLkb\/CVE-2021-30641",
|
||||
"owner": {
|
||||
"login": "fkm75P8YjLkb",
|
||||
"id": 82131630,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82131630?v=4",
|
||||
"html_url": "https:\/\/github.com\/fkm75P8YjLkb"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fkm75P8YjLkb\/CVE-2021-30641",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-15T04:31:58Z",
|
||||
"updated_at": "2021-07-15T04:31:58Z",
|
||||
"pushed_at": "2021-07-15T04:31:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-09T15:44:00Z",
|
||||
"updated_at": "2021-07-01T06:35:02Z",
|
||||
"updated_at": "2021-07-15T06:41:27Z",
|
||||
"pushed_at": "2021-06-26T18:31:23Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 44,
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 45,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-34496.json
Normal file
25
2021/CVE-2021-34496.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 386161559,
|
||||
"name": "CVE-2021-34496",
|
||||
"full_name": "fkm75P8YjLkb\/CVE-2021-34496",
|
||||
"owner": {
|
||||
"login": "fkm75P8YjLkb",
|
||||
"id": 82131630,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82131630?v=4",
|
||||
"html_url": "https:\/\/github.com\/fkm75P8YjLkb"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fkm75P8YjLkb\/CVE-2021-34496",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-15T04:23:58Z",
|
||||
"updated_at": "2021-07-15T04:23:58Z",
|
||||
"pushed_at": "2021-07-15T04:23:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -224,8 +224,8 @@
|
|||
"pushed_at": "2021-07-09T15:49:23Z",
|
||||
"stargazers_count": 558,
|
||||
"watchers_count": 558,
|
||||
"forks_count": 67,
|
||||
"forks": 67,
|
||||
"forks_count": 68,
|
||||
"forks": 68,
|
||||
"watchers": 558,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2021-3492 used at Pwn2Own 2021",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-28T09:43:31Z",
|
||||
"updated_at": "2021-07-14T17:45:19Z",
|
||||
"updated_at": "2021-07-15T04:32:12Z",
|
||||
"pushed_at": "2021-06-28T09:55:57Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
}
|
||||
]
|
25
2021/CVE-2021-3516.json
Normal file
25
2021/CVE-2021-3516.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 386162783,
|
||||
"name": "CVE-2021-3516",
|
||||
"full_name": "fkm75P8YjLkb\/CVE-2021-3516",
|
||||
"owner": {
|
||||
"login": "fkm75P8YjLkb",
|
||||
"id": 82131630,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82131630?v=4",
|
||||
"html_url": "https:\/\/github.com\/fkm75P8YjLkb"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fkm75P8YjLkb\/CVE-2021-3516",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-15T04:29:56Z",
|
||||
"updated_at": "2021-07-15T04:29:56Z",
|
||||
"pushed_at": "2021-07-15T04:29:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
48
README.md
48
README.md
|
@ -374,6 +374,14 @@ The overlayfs implementation in the linux kernel did not properly validate with
|
|||
- [Ishan3011/CVE-2021-3493](https://github.com/Ishan3011/CVE-2021-3493)
|
||||
- [inspiringz/CVE-2021-3493](https://github.com/inspiringz/CVE-2021-3493)
|
||||
|
||||
### CVE-2021-3516 (2021-06-01)
|
||||
|
||||
<code>
|
||||
There's a flaw in libxml2's xmllint in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by xmllint could trigger a use-after-free. The greatest impact of this flaw is to confidentiality, integrity, and availability.
|
||||
</code>
|
||||
|
||||
- [fkm75P8YjLkb/CVE-2021-3516](https://github.com/fkm75P8YjLkb/CVE-2021-3516)
|
||||
|
||||
### CVE-2021-3560
|
||||
- [swapravo/polkadots](https://github.com/swapravo/polkadots)
|
||||
- [deathflash1411/CVE-2021-3560](https://github.com/deathflash1411/CVE-2021-3560)
|
||||
|
@ -864,6 +872,22 @@ Windows Installer Elevation of Privilege Vulnerability This CVE ID is unique fro
|
|||
|
||||
- [adenkiewicz/CVE-2021-26415](https://github.com/adenkiewicz/CVE-2021-26415)
|
||||
|
||||
### CVE-2021-26690 (2021-06-10)
|
||||
|
||||
<code>
|
||||
Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Cookie header handled by mod_session can cause a NULL pointer dereference and crash, leading to a possible Denial Of Service
|
||||
</code>
|
||||
|
||||
- [fkm75P8YjLkb/CVE-2021-26690](https://github.com/fkm75P8YjLkb/CVE-2021-26690)
|
||||
|
||||
### CVE-2021-26691 (2021-06-10)
|
||||
|
||||
<code>
|
||||
In Apache HTTP Server versions 2.4.0 to 2.4.46 a specially crafted SessionHeader sent by an origin server could cause a heap overflow
|
||||
</code>
|
||||
|
||||
- [fkm75P8YjLkb/CVE-2021-26691](https://github.com/fkm75P8YjLkb/CVE-2021-26691)
|
||||
|
||||
### CVE-2021-26700 (2021-02-25)
|
||||
|
||||
<code>
|
||||
|
@ -1353,6 +1377,14 @@ Valve Steam through 2021-04-10, when a Source engine game is installed, allows r
|
|||
|
||||
- [floesen/CVE-2021-30481](https://github.com/floesen/CVE-2021-30481)
|
||||
|
||||
### CVE-2021-30641 (2021-06-10)
|
||||
|
||||
<code>
|
||||
Apache HTTP Server versions 2.4.39 to 2.4.46 Unexpected matching behavior with 'MergeSlashes OFF'
|
||||
</code>
|
||||
|
||||
- [fkm75P8YjLkb/CVE-2021-30641](https://github.com/fkm75P8YjLkb/CVE-2021-30641)
|
||||
|
||||
### CVE-2021-31159 (2021-06-16)
|
||||
|
||||
<code>
|
||||
|
@ -1518,6 +1550,14 @@ Tencent GameLoop before 4.1.21.90 downloaded updates over an insecure HTTP conne
|
|||
### CVE-2021-34045
|
||||
- [Al1ex/CVE-2021-34045](https://github.com/Al1ex/CVE-2021-34045)
|
||||
|
||||
### CVE-2021-34496 (2021-07-14)
|
||||
|
||||
<code>
|
||||
Windows GDI Information Disclosure Vulnerability
|
||||
</code>
|
||||
|
||||
- [fkm75P8YjLkb/CVE-2021-34496](https://github.com/fkm75P8YjLkb/CVE-2021-34496)
|
||||
|
||||
### CVE-2021-34527 (2021-07-02)
|
||||
|
||||
<code>
|
||||
|
@ -18470,6 +18510,14 @@ sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured
|
|||
- [Unix13/metasploitable2](https://github.com/Unix13/metasploitable2)
|
||||
- [cyberharsh/PHP_CVE-2012-1823](https://github.com/cyberharsh/PHP_CVE-2012-1823)
|
||||
|
||||
### CVE-2012-1870 (2012-07-10)
|
||||
|
||||
<code>
|
||||
The CBC mode in the TLS protocol, as used in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and other products, allows remote web servers to obtain plaintext data by triggering multiple requests to a third-party HTTPS server and sniffing the network during the resulting HTTPS session, aka "TLS Protocol Vulnerability."
|
||||
</code>
|
||||
|
||||
- [fkm75P8YjLkb/CVE-2012-1870](https://github.com/fkm75P8YjLkb/CVE-2012-1870)
|
||||
|
||||
### CVE-2012-1876 (2012-06-12)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue