mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-26 09:34:11 +01:00
Auto Update 2021/09/16 00:15:22
This commit is contained in:
parent
01a7c3f2c8
commit
4cf93cee0d
29 changed files with 199 additions and 130 deletions
|
@ -17,9 +17,9 @@
|
|||
"pushed_at": "2017-04-24T14:16:56Z",
|
||||
"stargazers_count": 312,
|
||||
"watchers_count": 312,
|
||||
"forks_count": 97,
|
||||
"forks_count": 98,
|
||||
"allow_forking": true,
|
||||
"forks": 97,
|
||||
"forks": 98,
|
||||
"watchers": 312,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -37,14 +37,14 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-09-15T02:44:24Z",
|
||||
"updated_at": "2021-09-15T14:00:30Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1166,
|
||||
"watchers_count": 1166,
|
||||
"stargazers_count": 1167,
|
||||
"watchers_count": 1167,
|
||||
"forks_count": 261,
|
||||
"allow_forking": true,
|
||||
"forks": 261,
|
||||
"watchers": 1166,
|
||||
"watchers": 1167,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,14 +13,14 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-09-15T02:44:24Z",
|
||||
"updated_at": "2021-09-15T14:00:30Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1166,
|
||||
"watchers_count": 1166,
|
||||
"stargazers_count": 1167,
|
||||
"watchers_count": 1167,
|
||||
"forks_count": 261,
|
||||
"allow_forking": true,
|
||||
"forks": 261,
|
||||
"watchers": 1166,
|
||||
"watchers": 1167,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,14 +13,14 @@
|
|||
"description": "ActiveMQ_putshell直接获取webshell",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-31T09:06:15Z",
|
||||
"updated_at": "2021-05-28T06:59:23Z",
|
||||
"updated_at": "2021-09-15T09:34:16Z",
|
||||
"pushed_at": "2020-08-01T06:47:34Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"forks": 4,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,14 +13,14 @@
|
|||
"description": "Blueborne CVE-2017-0781 Android heap overflow vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-09T15:13:25Z",
|
||||
"updated_at": "2021-08-05T07:22:15Z",
|
||||
"updated_at": "2021-09-15T09:20:24Z",
|
||||
"pushed_at": "2021-07-29T12:00:48Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
"forks": 40,
|
||||
"watchers": 79,
|
||||
"watchers": 80,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -37,14 +37,14 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-09-15T02:44:24Z",
|
||||
"updated_at": "2021-09-15T14:00:30Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1166,
|
||||
"watchers_count": 1166,
|
||||
"stargazers_count": 1167,
|
||||
"watchers_count": 1167,
|
||||
"forks_count": 261,
|
||||
"allow_forking": true,
|
||||
"forks": 261,
|
||||
"watchers": 1166,
|
||||
"watchers": 1167,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,9 +17,9 @@
|
|||
"pushed_at": "2020-10-16T12:09:45Z",
|
||||
"stargazers_count": 440,
|
||||
"watchers_count": 440,
|
||||
"forks_count": 423,
|
||||
"forks_count": 424,
|
||||
"allow_forking": true,
|
||||
"forks": 423,
|
||||
"forks": 424,
|
||||
"watchers": 440,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -469,14 +469,14 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-09-15T02:44:24Z",
|
||||
"updated_at": "2021-09-15T14:00:30Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1166,
|
||||
"watchers_count": 1166,
|
||||
"stargazers_count": 1167,
|
||||
"watchers_count": 1167,
|
||||
"forks_count": 261,
|
||||
"allow_forking": true,
|
||||
"forks": 261,
|
||||
"watchers": 1166,
|
||||
"watchers": 1167,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,14 +13,14 @@
|
|||
"description": "CVE-2019-1388 UAC提权 (nt authority\\system)",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-21T06:26:27Z",
|
||||
"updated_at": "2021-08-22T10:19:42Z",
|
||||
"updated_at": "2021-09-15T12:39:51Z",
|
||||
"pushed_at": "2019-11-21T09:27:59Z",
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"forks_count": 41,
|
||||
"allow_forking": true,
|
||||
"forks": 41,
|
||||
"watchers": 117,
|
||||
"watchers": 118,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -61,14 +61,14 @@
|
|||
"description": "guest→system(UAC手动提权)",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-27T02:47:37Z",
|
||||
"updated_at": "2021-08-05T23:36:29Z",
|
||||
"updated_at": "2021-09-15T12:28:46Z",
|
||||
"pushed_at": "2020-03-18T06:21:13Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
"forks": 19,
|
||||
"watchers": 69,
|
||||
"watchers": 70,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -37,14 +37,14 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-09-14T09:01:21Z",
|
||||
"updated_at": "2021-09-15T14:00:19Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2867,
|
||||
"watchers_count": 2867,
|
||||
"stargazers_count": 2868,
|
||||
"watchers_count": 2868,
|
||||
"forks_count": 836,
|
||||
"allow_forking": true,
|
||||
"forks": 836,
|
||||
"watchers": 2867,
|
||||
"watchers": 2868,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -61,14 +61,14 @@
|
|||
"description": "Solr_CVE-2019-17558",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-04T06:13:33Z",
|
||||
"updated_at": "2021-01-15T02:38:31Z",
|
||||
"updated_at": "2021-09-15T09:34:12Z",
|
||||
"pushed_at": "2020-08-04T06:29:22Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -157,14 +157,14 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-09-15T02:44:24Z",
|
||||
"updated_at": "2021-09-15T14:00:30Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1166,
|
||||
"watchers_count": 1166,
|
||||
"stargazers_count": 1167,
|
||||
"watchers_count": 1167,
|
||||
"forks_count": 261,
|
||||
"allow_forking": true,
|
||||
"forks": 261,
|
||||
"watchers": 1166,
|
||||
"watchers": 1167,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,9 +17,9 @@
|
|||
"pushed_at": "2020-07-21T10:28:42Z",
|
||||
"stargazers_count": 151,
|
||||
"watchers_count": 151,
|
||||
"forks_count": 29,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
"forks": 29,
|
||||
"forks": 30,
|
||||
"watchers": 151,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -161,9 +161,9 @@
|
|||
"pushed_at": "2020-09-16T14:05:27Z",
|
||||
"stargazers_count": 147,
|
||||
"watchers_count": 147,
|
||||
"forks_count": 37,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
"forks": 37,
|
||||
"forks": 38,
|
||||
"watchers": 147,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,14 +13,14 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-09-14T09:01:21Z",
|
||||
"updated_at": "2021-09-15T14:00:19Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2867,
|
||||
"watchers_count": 2867,
|
||||
"stargazers_count": 2868,
|
||||
"watchers_count": 2868,
|
||||
"forks_count": 836,
|
||||
"allow_forking": true,
|
||||
"forks": 836,
|
||||
"watchers": 2867,
|
||||
"watchers": 2868,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,14 +13,14 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-09-15T02:44:24Z",
|
||||
"updated_at": "2021-09-15T14:00:30Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1166,
|
||||
"watchers_count": 1166,
|
||||
"stargazers_count": 1167,
|
||||
"watchers_count": 1167,
|
||||
"forks_count": 261,
|
||||
"allow_forking": true,
|
||||
"forks": 261,
|
||||
"watchers": 1166,
|
||||
"watchers": 1167,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
26
2020/CVE-2020-36386.json
Normal file
26
2020/CVE-2020-36386.json
Normal file
|
@ -0,0 +1,26 @@
|
|||
[
|
||||
{
|
||||
"id": 406719264,
|
||||
"name": "linux-3.0.35_CVE-2020-36386_withPatch",
|
||||
"full_name": "artsking\/linux-3.0.35_CVE-2020-36386_withPatch",
|
||||
"owner": {
|
||||
"login": "artsking",
|
||||
"id": 87514725,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87514725?v=4",
|
||||
"html_url": "https:\/\/github.com\/artsking"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/artsking\/linux-3.0.35_CVE-2020-36386_withPatch",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-09-15T10:38:52Z",
|
||||
"updated_at": "2021-09-15T10:44:18Z",
|
||||
"pushed_at": "2021-09-15T10:43:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -41,9 +41,9 @@
|
|||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1370,
|
||||
"watchers_count": 1370,
|
||||
"forks_count": 498,
|
||||
"forks_count": 499,
|
||||
"allow_forking": true,
|
||||
"forks": 498,
|
||||
"forks": 499,
|
||||
"watchers": 1370,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -229,14 +229,14 @@
|
|||
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T23:45:58Z",
|
||||
"updated_at": "2021-09-15T09:01:51Z",
|
||||
"updated_at": "2021-09-15T14:01:54Z",
|
||||
"pushed_at": "2021-07-05T08:54:06Z",
|
||||
"stargazers_count": 604,
|
||||
"watchers_count": 604,
|
||||
"stargazers_count": 603,
|
||||
"watchers_count": 603,
|
||||
"forks_count": 161,
|
||||
"allow_forking": true,
|
||||
"forks": 161,
|
||||
"watchers": 604,
|
||||
"watchers": 603,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -37,14 +37,14 @@
|
|||
"description": "Backporting CVE-2021-1748 patch for iOS <=14.3",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-03T22:48:11Z",
|
||||
"updated_at": "2021-09-06T02:13:24Z",
|
||||
"updated_at": "2021-09-15T11:10:31Z",
|
||||
"pushed_at": "2021-09-03T22:50:08Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -421,14 +421,14 @@
|
|||
"description": "漏洞利用,Vmware vCenter 6.5-7.0 RCE(CVE-2021-21972),上传冰蝎3,getshell",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-01T14:14:01Z",
|
||||
"updated_at": "2021-04-15T01:53:47Z",
|
||||
"updated_at": "2021-09-15T09:33:53Z",
|
||||
"pushed_at": "2021-03-01T14:28:30Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -89,9 +89,9 @@
|
|||
"pushed_at": "2021-06-01T19:13:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,9 +17,9 @@
|
|||
"pushed_at": "2021-09-12T12:59:14Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -37,14 +37,14 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-08-31T23:33:44Z",
|
||||
"updated_at": "2021-09-08T17:13:53Z",
|
||||
"updated_at": "2021-09-15T10:40:46Z",
|
||||
"pushed_at": "2021-09-01T01:01:06Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
"forks": 12,
|
||||
"watchers": 40,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -109,14 +109,14 @@
|
|||
"description": "Confluence Server Webwork OGNL injection",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-01T07:15:17Z",
|
||||
"updated_at": "2021-09-14T06:21:50Z",
|
||||
"updated_at": "2021-09-15T14:13:47Z",
|
||||
"pushed_at": "2021-09-10T19:42:33Z",
|
||||
"stargazers_count": 209,
|
||||
"watchers_count": 209,
|
||||
"forks_count": 49,
|
||||
"stargazers_count": 210,
|
||||
"watchers_count": 210,
|
||||
"forks_count": 50,
|
||||
"allow_forking": true,
|
||||
"forks": 49,
|
||||
"watchers": 209,
|
||||
"forks": 50,
|
||||
"watchers": 210,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,14 +13,14 @@
|
|||
"description": "A basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-01T22:59:29Z",
|
||||
"updated_at": "2021-09-13T04:01:59Z",
|
||||
"updated_at": "2021-09-15T14:53:27Z",
|
||||
"pushed_at": "2021-09-03T10:24:34Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"forks": 6,
|
||||
"watchers": 28,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -61,14 +61,14 @@
|
|||
"description": "CVE-2021-3156",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-27T16:03:34Z",
|
||||
"updated_at": "2021-07-23T15:05:02Z",
|
||||
"updated_at": "2021-09-15T10:16:13Z",
|
||||
"pushed_at": "2021-01-31T04:56:56Z",
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
"forks": 43,
|
||||
"watchers": 110,
|
||||
"watchers": 111,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1127,6 +1127,30 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 381790796,
|
||||
"name": "CVE-2021-3156",
|
||||
"full_name": "TheFlash2k\/CVE-2021-3156",
|
||||
"owner": {
|
||||
"login": "TheFlash2k",
|
||||
"id": 19727349,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19727349?v=4",
|
||||
"html_url": "https:\/\/github.com\/TheFlash2k"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/TheFlash2k\/CVE-2021-3156",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-30T18:00:03Z",
|
||||
"updated_at": "2021-09-15T11:53:44Z",
|
||||
"pushed_at": "2021-06-30T18:00:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 393627940,
|
||||
"name": "CVE-2021-3156",
|
||||
|
|
|
@ -37,14 +37,14 @@
|
|||
"description": "CVE-2021-33766-poc",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-15T09:09:20Z",
|
||||
"updated_at": "2021-09-15T09:17:48Z",
|
||||
"pushed_at": "2021-09-15T09:09:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"updated_at": "2021-09-15T09:26:35Z",
|
||||
"pushed_at": "2021-09-15T09:23:39Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -113,9 +113,9 @@
|
|||
"pushed_at": "2021-07-22T04:17:47Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"forks": 6,
|
||||
"forks": 7,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -254,12 +254,12 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-07-24T12:55:05Z",
|
||||
"updated_at": "2021-09-15T00:50:09Z",
|
||||
"pushed_at": "2021-07-25T15:41:33Z",
|
||||
"pushed_at": "2021-09-15T12:41:32Z",
|
||||
"stargazers_count": 209,
|
||||
"watchers_count": 209,
|
||||
"forks_count": 51,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
"forks": 51,
|
||||
"forks": 52,
|
||||
"watchers": 209,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,14 +13,14 @@
|
|||
"description": "CVE-2021-3707 , CVE-2021-3708",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-29T12:24:04Z",
|
||||
"updated_at": "2021-09-07T05:50:53Z",
|
||||
"updated_at": "2021-09-15T15:14:53Z",
|
||||
"pushed_at": "2021-09-05T17:10:48Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"forks": 4,
|
||||
"watchers": 9,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -205,14 +205,14 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2021-09-15T09:16:22Z",
|
||||
"updated_at": "2021-09-15T15:21:41Z",
|
||||
"pushed_at": "2021-09-11T09:50:26Z",
|
||||
"stargazers_count": 992,
|
||||
"watchers_count": 992,
|
||||
"forks_count": 313,
|
||||
"stargazers_count": 1014,
|
||||
"watchers_count": 1014,
|
||||
"forks_count": 325,
|
||||
"allow_forking": true,
|
||||
"forks": 313,
|
||||
"watchers": 992,
|
||||
"forks": 325,
|
||||
"watchers": 1014,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -373,14 +373,14 @@
|
|||
"description": "This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-12T18:05:53Z",
|
||||
"updated_at": "2021-09-15T08:25:16Z",
|
||||
"updated_at": "2021-09-15T14:25:35Z",
|
||||
"pushed_at": "2021-09-13T12:30:10Z",
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
"forks": 30,
|
||||
"watchers": 93,
|
||||
"watchers": 102,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -445,14 +445,14 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-09-14T17:10:48Z",
|
||||
"updated_at": "2021-09-15T07:43:59Z",
|
||||
"updated_at": "2021-09-15T11:45:16Z",
|
||||
"pushed_at": "2021-09-14T17:19:26Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 1,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"forks": 1,
|
||||
"watchers": 9,
|
||||
"forks": 2,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
23
README.md
23
README.md
|
@ -289,6 +289,7 @@ Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based
|
|||
- [ajtech-hue/CVE-2021-3156-Mitigation-ShellScript-Build](https://github.com/ajtech-hue/CVE-2021-3156-Mitigation-ShellScript-Build)
|
||||
- [wuuconix/CVE-2021-3156-Dockerfile-not-succeed](https://github.com/wuuconix/CVE-2021-3156-Dockerfile-not-succeed)
|
||||
- [donghyunlee00/CVE-2021-3156](https://github.com/donghyunlee00/CVE-2021-3156)
|
||||
- [TheFlash2k/CVE-2021-3156](https://github.com/TheFlash2k/CVE-2021-3156)
|
||||
- [CyberCommands/CVE-2021-3156](https://github.com/CyberCommands/CVE-2021-3156)
|
||||
- [0x7183/CVE-2021-3156](https://github.com/0x7183/CVE-2021-3156)
|
||||
- [Kleptocratic/CVE-2021-3156](https://github.com/Kleptocratic/CVE-2021-3156)
|
||||
|
@ -2341,7 +2342,12 @@ playSMS before 1.4.5 allows Arbitrary Code Execution by entering PHP code at the
|
|||
### CVE-2021-40375
|
||||
- [DCKento/CVE-2021-40375](https://github.com/DCKento/CVE-2021-40375)
|
||||
|
||||
### CVE-2021-40444
|
||||
### CVE-2021-40444 (2021-09-15)
|
||||
|
||||
<code>
|
||||
Microsoft MSHTML Remote Code Execution Vulnerability
|
||||
</code>
|
||||
|
||||
- [ozergoker/CVE-2021-40444](https://github.com/ozergoker/CVE-2021-40444)
|
||||
- [DarkSprings/CVE-2021-40444](https://github.com/DarkSprings/CVE-2021-40444)
|
||||
- [rfcxv/CVE-2021-40444-POC](https://github.com/rfcxv/CVE-2021-40444-POC)
|
||||
|
@ -2370,7 +2376,12 @@ A reflected XSS vulnerability exists in multiple pages in version 22 of the Gibb
|
|||
|
||||
- [5qu1n7/CVE-2021-40492](https://github.com/5qu1n7/CVE-2021-40492)
|
||||
|
||||
### CVE-2021-40845
|
||||
### CVE-2021-40845 (2021-09-15)
|
||||
|
||||
<code>
|
||||
The web part of Zenitel AlphaCom XE Audio Server through 11.2.3.10, called AlphaWeb XE, does not restrict file upload in the Custom Scripts section at php/index.php. Neither the content nor extension of the uploaded files is checked, allowing execution of PHP code under the /cmd directory.
|
||||
</code>
|
||||
|
||||
- [ricardojoserf/CVE-2021-40845](https://github.com/ricardojoserf/CVE-2021-40845)
|
||||
|
||||
### CVE-2021-41074
|
||||
|
@ -6877,6 +6888,14 @@ The dashboard gadgets preference resource of the Atlassian gadgets plugin used i
|
|||
|
||||
- [f4rber/CVE-2020-36287](https://github.com/f4rber/CVE-2020-36287)
|
||||
|
||||
### CVE-2020-36386 (2021-06-07)
|
||||
|
||||
<code>
|
||||
An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.
|
||||
</code>
|
||||
|
||||
- [artsking/linux-3.0.35_CVE-2020-36386_withPatch](https://github.com/artsking/linux-3.0.35_CVE-2020-36386_withPatch)
|
||||
|
||||
### CVE-2020-72381
|
||||
- [jdordonezn/CVE-2020-72381](https://github.com/jdordonezn/CVE-2020-72381)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue