mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/04/25 06:11:02
This commit is contained in:
parent
505bf05864
commit
5b4b54e707
24 changed files with 252 additions and 96 deletions
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2017-12-18T14:11:29Z",
|
||||
"stargazers_count": 275,
|
||||
"watchers_count": 275,
|
||||
"forks_count": 187,
|
||||
"forks": 187,
|
||||
"forks_count": 188,
|
||||
"forks": 188,
|
||||
"watchers": 275,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2016-4437-Shiro反序列化爆破模块和key,命令执行,反弹shell的脚本",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-27T05:02:04Z",
|
||||
"updated_at": "2021-03-24T05:39:25Z",
|
||||
"updated_at": "2021-04-24T17:05:46Z",
|
||||
"pushed_at": "2020-06-27T10:17:43Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 34,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,7 +36,7 @@
|
|||
"description": "海康威视未授权访问检测poc及口令爆破",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-12T09:02:10Z",
|
||||
"updated_at": "2021-04-20T05:09:11Z",
|
||||
"updated_at": "2021-04-24T18:18:01Z",
|
||||
"pushed_at": "2020-11-19T08:58:04Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
|
|
|
@ -128,13 +128,13 @@
|
|||
"description": "Exploit for Laravel Remote Code Execution with API_KEY (CVE-2018-15133)",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-13T16:33:52Z",
|
||||
"updated_at": "2021-04-23T21:16:14Z",
|
||||
"updated_at": "2021-04-24T20:21:16Z",
|
||||
"pushed_at": "2020-12-31T20:34:30Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1149,29 +1149,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 338829928,
|
||||
"name": "CVE-2018-6574",
|
||||
"full_name": "Yealid\/CVE-2018-6574",
|
||||
"owner": {
|
||||
"login": "Yealid",
|
||||
"id": 47418084,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47418084?v=4",
|
||||
"html_url": "https:\/\/github.com\/Yealid"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Yealid\/CVE-2018-6574",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-14T14:59:24Z",
|
||||
"updated_at": "2021-02-15T13:03:08Z",
|
||||
"pushed_at": "2021-02-14T16:33:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 345243566,
|
||||
"name": "POC-CVE-2018-6574",
|
||||
|
@ -1240,5 +1217,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 361210786,
|
||||
"name": "CVE-2018-6574",
|
||||
"full_name": "Yealid\/CVE-2018-6574",
|
||||
"owner": {
|
||||
"login": "Yealid",
|
||||
"id": 47418084,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47418084?v=4",
|
||||
"html_url": "https:\/\/github.com\/Yealid"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Yealid\/CVE-2018-6574",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-04-24T16:25:20Z",
|
||||
"updated_at": "2021-04-24T16:49:56Z",
|
||||
"pushed_at": "2021-04-24T16:49:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "(CVE-2018-9995) Get DVR Credentials",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-29T20:00:06Z",
|
||||
"updated_at": "2021-04-14T03:36:40Z",
|
||||
"updated_at": "2021-04-24T19:02:28Z",
|
||||
"pushed_at": "2019-01-23T14:27:21Z",
|
||||
"stargazers_count": 446,
|
||||
"watchers_count": 446,
|
||||
"stargazers_count": 447,
|
||||
"watchers_count": 447,
|
||||
"forks_count": 184,
|
||||
"forks": 184,
|
||||
"watchers": 446,
|
||||
"watchers": 447,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -128,13 +128,13 @@
|
|||
"description": "DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-23T20:58:40Z",
|
||||
"updated_at": "2020-12-23T20:45:44Z",
|
||||
"updated_at": "2021-04-24T20:27:00Z",
|
||||
"pushed_at": "2018-10-11T16:54:31Z",
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"watchers": 81,
|
||||
"watchers": 82,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2244,13 +2244,13 @@
|
|||
"description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-30T19:46:21Z",
|
||||
"updated_at": "2021-04-17T15:07:11Z",
|
||||
"updated_at": "2021-04-24T20:26:33Z",
|
||||
"pushed_at": "2021-02-06T00:24:21Z",
|
||||
"stargazers_count": 187,
|
||||
"watchers_count": 187,
|
||||
"stargazers_count": 188,
|
||||
"watchers_count": 188,
|
||||
"forks_count": 73,
|
||||
"forks": 73,
|
||||
"watchers": 187,
|
||||
"watchers": 188,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -128,13 +128,13 @@
|
|||
"description": "an impacket-dependent script exploiting CVE-2019-1040",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-01T05:59:06Z",
|
||||
"updated_at": "2021-04-22T06:02:23Z",
|
||||
"updated_at": "2021-04-24T17:17:58Z",
|
||||
"pushed_at": "2021-01-01T06:10:58Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 55,
|
||||
"watchers": 56,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-08-04T06:29:22Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T17:51:29Z",
|
||||
"updated_at": "2021-04-18T01:26:15Z",
|
||||
"updated_at": "2021-04-24T16:58:43Z",
|
||||
"pushed_at": "2021-02-25T17:19:39Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 57,
|
||||
"watchers": 58,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2021-04-14T00:31:09Z",
|
||||
"updated_at": "2021-04-24T19:10:31Z",
|
||||
"pushed_at": "2020-10-21T12:10:28Z",
|
||||
"stargazers_count": 1270,
|
||||
"watchers_count": 1270,
|
||||
"stargazers_count": 1271,
|
||||
"watchers_count": 1271,
|
||||
"forks_count": 293,
|
||||
"forks": 293,
|
||||
"watchers": 1270,
|
||||
"watchers": 1271,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-04-24T10:57:44Z",
|
||||
"updated_at": "2021-04-24T17:43:24Z",
|
||||
"pushed_at": "2021-04-24T08:27:02Z",
|
||||
"stargazers_count": 645,
|
||||
"watchers_count": 645,
|
||||
"stargazers_count": 646,
|
||||
"watchers_count": 646,
|
||||
"forks_count": 169,
|
||||
"forks": 169,
|
||||
"watchers": 645,
|
||||
"watchers": 646,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-07-22T05:30:14Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "CVE-2021-1732 poc & exp; tested on 20H2",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-23T08:21:54Z",
|
||||
"updated_at": "2021-04-24T14:32:02Z",
|
||||
"updated_at": "2021-04-24T16:41:04Z",
|
||||
"pushed_at": "2021-04-23T08:28:53Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 23,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T17:51:29Z",
|
||||
"updated_at": "2021-04-18T01:26:15Z",
|
||||
"updated_at": "2021-04-24T16:58:43Z",
|
||||
"pushed_at": "2021-02-25T17:19:39Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 57,
|
||||
"watchers": 58,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-04-24T10:57:44Z",
|
||||
"updated_at": "2021-04-24T17:43:24Z",
|
||||
"pushed_at": "2021-04-24T08:27:02Z",
|
||||
"stargazers_count": 645,
|
||||
"watchers_count": 645,
|
||||
"stargazers_count": 646,
|
||||
"watchers_count": 646,
|
||||
"forks_count": 169,
|
||||
"forks": 169,
|
||||
"watchers": 645,
|
||||
"watchers": 646,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-03-29T12:33:38Z",
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 58,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-13T12:52:20Z",
|
||||
"updated_at": "2021-04-23T23:30:32Z",
|
||||
"updated_at": "2021-04-24T16:03:04Z",
|
||||
"pushed_at": "2021-01-29T13:59:07Z",
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
|
|
|
@ -887,13 +887,13 @@
|
|||
"description": "Sudo Baron Samedit Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-15T17:37:02Z",
|
||||
"updated_at": "2021-04-24T11:56:42Z",
|
||||
"updated_at": "2021-04-24T16:10:43Z",
|
||||
"pushed_at": "2021-03-30T14:44:38Z",
|
||||
"stargazers_count": 281,
|
||||
"watchers_count": 281,
|
||||
"stargazers_count": 282,
|
||||
"watchers_count": 282,
|
||||
"forks_count": 46,
|
||||
"forks": 46,
|
||||
"watchers": 281,
|
||||
"watchers": 282,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
48
2021/CVE-2021-31760.json
Normal file
48
2021/CVE-2021-31760.json
Normal file
|
@ -0,0 +1,48 @@
|
|||
[
|
||||
{
|
||||
"id": 359983710,
|
||||
"name": "CVE-2021-31760",
|
||||
"full_name": "Mesh3l911\/CVE-2021-31760",
|
||||
"owner": {
|
||||
"login": "Mesh3l911",
|
||||
"id": 74990355,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74990355?v=4",
|
||||
"html_url": "https:\/\/github.com\/Mesh3l911"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Mesh3l911\/CVE-2021-31760",
|
||||
"description": "Exploiting a Cross-site request forgery (CSRF) attack to get a Remote Command Execution (RCE) through the Webmin's running process feature",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-21T00:09:54Z",
|
||||
"updated_at": "2021-04-24T20:07:04Z",
|
||||
"pushed_at": "2021-04-24T20:07:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 360287311,
|
||||
"name": "CVE-2021-31760",
|
||||
"full_name": "electronicbots\/CVE-2021-31760",
|
||||
"owner": {
|
||||
"login": "electronicbots",
|
||||
"id": 37217081,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37217081?v=4",
|
||||
"html_url": "https:\/\/github.com\/electronicbots"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/electronicbots\/CVE-2021-31760",
|
||||
"description": "Exploiting a Cross-site request forgery (CSRF) attack to get a Remote Command Execution (RCE) through the Webmin's running process feature",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-21T19:43:53Z",
|
||||
"updated_at": "2021-04-24T20:06:16Z",
|
||||
"pushed_at": "2021-04-24T20:06:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
48
2021/CVE-2021-31761.json
Normal file
48
2021/CVE-2021-31761.json
Normal file
|
@ -0,0 +1,48 @@
|
|||
[
|
||||
{
|
||||
"id": 360288017,
|
||||
"name": "CVE-2021-31761",
|
||||
"full_name": "Mesh3l911\/CVE-2021-31761",
|
||||
"owner": {
|
||||
"login": "Mesh3l911",
|
||||
"id": 74990355,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74990355?v=4",
|
||||
"html_url": "https:\/\/github.com\/Mesh3l911"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Mesh3l911\/CVE-2021-31761",
|
||||
"description": "Exploiting a Reflected Cross-Site Scripting (XSS) attack to get a Remote Command Execution (RCE) through the Webmin's running process feature",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-21T19:46:43Z",
|
||||
"updated_at": "2021-04-24T20:08:14Z",
|
||||
"pushed_at": "2021-04-24T20:08:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 360291163,
|
||||
"name": "CVE-2021-31761",
|
||||
"full_name": "electronicbots\/CVE-2021-31761",
|
||||
"owner": {
|
||||
"login": "electronicbots",
|
||||
"id": 37217081,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37217081?v=4",
|
||||
"html_url": "https:\/\/github.com\/electronicbots"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/electronicbots\/CVE-2021-31761",
|
||||
"description": "Exploiting a Reflected Cross-Site Scripting (XSS) attack to get a Remote Command Execution (RCE) through the Webmin's running process feature",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-21T20:00:09Z",
|
||||
"updated_at": "2021-04-24T20:07:27Z",
|
||||
"pushed_at": "2021-04-24T20:07:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
48
2021/CVE-2021-31762.json
Normal file
48
2021/CVE-2021-31762.json
Normal file
|
@ -0,0 +1,48 @@
|
|||
[
|
||||
{
|
||||
"id": 360292539,
|
||||
"name": "CVE-2021-31762",
|
||||
"full_name": "Mesh3l911\/CVE-2021-31762",
|
||||
"owner": {
|
||||
"login": "Mesh3l911",
|
||||
"id": 74990355,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74990355?v=4",
|
||||
"html_url": "https:\/\/github.com\/Mesh3l911"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Mesh3l911\/CVE-2021-31762",
|
||||
"description": "Exploiting a Cross-site request forgery (CSRF) attack to creat a new privileged user through the Webmin's add users feature",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-21T20:06:09Z",
|
||||
"updated_at": "2021-04-24T20:10:03Z",
|
||||
"pushed_at": "2021-04-24T20:10:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 360294065,
|
||||
"name": "CVE-2021-31762",
|
||||
"full_name": "electronicbots\/CVE-2021-31762",
|
||||
"owner": {
|
||||
"login": "electronicbots",
|
||||
"id": 37217081,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37217081?v=4",
|
||||
"html_url": "https:\/\/github.com\/electronicbots"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/electronicbots\/CVE-2021-31762",
|
||||
"description": "Exploiting a Cross-site request forgery (CSRF) attack to creat a new privileged user through the Webmin's add users feature ",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-21T20:13:06Z",
|
||||
"updated_at": "2021-04-24T20:10:01Z",
|
||||
"pushed_at": "2021-04-24T20:09:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Ubuntu OverlayFS Local Privesc",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-19T20:07:01Z",
|
||||
"updated_at": "2021-04-24T11:29:36Z",
|
||||
"updated_at": "2021-04-24T16:10:55Z",
|
||||
"pushed_at": "2021-04-20T00:46:14Z",
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"forks_count": 38,
|
||||
"forks": 38,
|
||||
"watchers": 116,
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 117,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-04-22T02:06:21Z",
|
||||
"updated_at": "2021-04-22T02:06:33Z",
|
||||
"updated_at": "2021-04-24T16:14:17Z",
|
||||
"pushed_at": "2021-04-22T02:06:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
14
README.md
14
README.md
|
@ -917,6 +917,18 @@ Valve Steam through 2021-04-10, when a Source engine game is installed, allows r
|
|||
|
||||
- [floesen/CVE-2021-30481](https://github.com/floesen/CVE-2021-30481)
|
||||
|
||||
### CVE-2021-31760
|
||||
- [Mesh3l911/CVE-2021-31760](https://github.com/Mesh3l911/CVE-2021-31760)
|
||||
- [electronicbots/CVE-2021-31760](https://github.com/electronicbots/CVE-2021-31760)
|
||||
|
||||
### CVE-2021-31761
|
||||
- [Mesh3l911/CVE-2021-31761](https://github.com/Mesh3l911/CVE-2021-31761)
|
||||
- [electronicbots/CVE-2021-31761](https://github.com/electronicbots/CVE-2021-31761)
|
||||
|
||||
### CVE-2021-31762
|
||||
- [Mesh3l911/CVE-2021-31762](https://github.com/Mesh3l911/CVE-2021-31762)
|
||||
- [electronicbots/CVE-2021-31762](https://github.com/electronicbots/CVE-2021-31762)
|
||||
|
||||
### CVE-2021-1000000
|
||||
- [13202311145/CVE-2021-1000000](https://github.com/13202311145/CVE-2021-1000000)
|
||||
|
||||
|
@ -9709,10 +9721,10 @@ Go before 1.8.7, Go 1.9.x before 1.9.4, and Go 1.10 pre-releases before Go 1.10r
|
|||
- [PLP-Orange/cve-2018-6574-exercise](https://github.com/PLP-Orange/cve-2018-6574-exercise)
|
||||
- [purgedemo/CVE-2018-6574](https://github.com/purgedemo/CVE-2018-6574)
|
||||
- [purgedemo/CVE-2018-6574_2](https://github.com/purgedemo/CVE-2018-6574_2)
|
||||
- [Yealid/CVE-2018-6574](https://github.com/Yealid/CVE-2018-6574)
|
||||
- [killtr0/POC-CVE-2018-6574](https://github.com/killtr0/POC-CVE-2018-6574)
|
||||
- [theJuan1112/pentesterlab-cve-2018-6574](https://github.com/theJuan1112/pentesterlab-cve-2018-6574)
|
||||
- [MohamedTarekq/test-CVE-2018-6574-](https://github.com/MohamedTarekq/test-CVE-2018-6574-)
|
||||
- [Yealid/CVE-2018-6574](https://github.com/Yealid/CVE-2018-6574)
|
||||
|
||||
### CVE-2018-6622 (2018-08-17)
|
||||
|
||||
|
|
Loading…
Reference in a new issue