mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2022/01/12 12:18:50
This commit is contained in:
parent
754ac06de6
commit
5ff92de83a
28 changed files with 280 additions and 196 deletions
|
@ -13,19 +13,19 @@
|
|||
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
|
||||
"fork": false,
|
||||
"created_at": "2013-09-22T21:20:31Z",
|
||||
"updated_at": "2022-01-09T14:31:01Z",
|
||||
"updated_at": "2022-01-12T10:42:45Z",
|
||||
"pushed_at": "2017-04-24T14:16:56Z",
|
||||
"stargazers_count": 329,
|
||||
"watchers_count": 329,
|
||||
"forks_count": 102,
|
||||
"stargazers_count": 330,
|
||||
"watchers_count": 330,
|
||||
"forks_count": 103,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2008-0166"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 102,
|
||||
"watchers": 329,
|
||||
"forks": 103,
|
||||
"watchers": 330,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-22T04:52:08Z",
|
||||
"updated_at": "2021-12-15T14:35:46Z",
|
||||
"updated_at": "2022-01-12T06:18:21Z",
|
||||
"pushed_at": "2019-08-05T10:45:34Z",
|
||||
"stargazers_count": 468,
|
||||
"watchers_count": 468,
|
||||
"stargazers_count": 469,
|
||||
"watchers_count": 469,
|
||||
"forks_count": 188,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 188,
|
||||
"watchers": 468,
|
||||
"watchers": 469,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2019-11-14T14:16:54Z",
|
||||
"stargazers_count": 287,
|
||||
"watchers_count": 287,
|
||||
"forks_count": 72,
|
||||
"forks_count": 73,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 72,
|
||||
"forks": 73,
|
||||
"watchers": 287,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -40,10 +40,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-01-11T13:35:38Z",
|
||||
"updated_at": "2022-01-12T10:20:16Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3095,
|
||||
"watchers_count": 3095,
|
||||
"stargazers_count": 3096,
|
||||
"watchers_count": 3096,
|
||||
"forks_count": 916,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -70,7 +70,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 916,
|
||||
"watchers": 3095,
|
||||
"watchers": 3096,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -25,5 +25,32 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 447195023,
|
||||
"name": "CVE-2019-18276",
|
||||
"full_name": "SABI-Ensimag\/CVE-2019-18276",
|
||||
"owner": {
|
||||
"login": "SABI-Ensimag",
|
||||
"id": 97602072,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97602072?v=4",
|
||||
"html_url": "https:\/\/github.com\/SABI-Ensimag"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SABI-Ensimag\/CVE-2019-18276",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-01-12T11:40:57Z",
|
||||
"updated_at": "2022-01-12T11:56:33Z",
|
||||
"pushed_at": "2022-01-12T11:56:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-02T16:42:32Z",
|
||||
"updated_at": "2021-09-04T04:30:33Z",
|
||||
"updated_at": "2022-01-12T07:11:58Z",
|
||||
"pushed_at": "2020-02-03T15:11:25Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -38,7 +38,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 65,
|
||||
"watchers": 64,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T06:22:40Z",
|
||||
"updated_at": "2021-12-15T14:38:23Z",
|
||||
"updated_at": "2022-01-12T09:32:09Z",
|
||||
"pushed_at": "2020-02-20T11:03:18Z",
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"stargazers_count": 192,
|
||||
"watchers_count": 192,
|
||||
"forks_count": 51,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 51,
|
||||
"watchers": 191,
|
||||
"watchers": 192,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -121,10 +121,10 @@
|
|||
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T15:21:27Z",
|
||||
"updated_at": "2022-01-09T18:01:54Z",
|
||||
"updated_at": "2022-01-12T06:31:52Z",
|
||||
"pushed_at": "2020-10-01T08:36:29Z",
|
||||
"stargazers_count": 605,
|
||||
"watchers_count": 605,
|
||||
"stargazers_count": 606,
|
||||
"watchers_count": 606,
|
||||
"forks_count": 201,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -133,7 +133,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 201,
|
||||
"watchers": 605,
|
||||
"watchers": 606,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -25,5 +25,32 @@
|
|||
"forks": 16,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 447177303,
|
||||
"name": "linux-4.19.72_CVE-2020-14386",
|
||||
"full_name": "artsking\/linux-4.19.72_CVE-2020-14386",
|
||||
"owner": {
|
||||
"login": "artsking",
|
||||
"id": 87514725,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87514725?v=4",
|
||||
"html_url": "https:\/\/github.com\/artsking"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/artsking\/linux-4.19.72_CVE-2020-14386",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-01-12T10:41:44Z",
|
||||
"updated_at": "2022-01-12T10:52:16Z",
|
||||
"pushed_at": "2022-01-12T10:53:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,17 +40,17 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2022-01-11T16:18:15Z",
|
||||
"updated_at": "2022-01-12T06:48:35Z",
|
||||
"pushed_at": "2021-12-08T10:31:54Z",
|
||||
"stargazers_count": 1408,
|
||||
"watchers_count": 1408,
|
||||
"stargazers_count": 1409,
|
||||
"watchers_count": 1409,
|
||||
"forks_count": 315,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 315,
|
||||
"watchers": 1408,
|
||||
"watchers": 1409,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -402,12 +402,12 @@
|
|||
"pushed_at": "2020-09-16T15:03:32Z",
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"forks_count": 21,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"forks": 22,
|
||||
"watchers": 64,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2022-01-11T13:35:38Z",
|
||||
"updated_at": "2022-01-12T10:20:16Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3095,
|
||||
"watchers_count": 3095,
|
||||
"stargazers_count": 3096,
|
||||
"watchers_count": 3096,
|
||||
"forks_count": 916,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -43,7 +43,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 916,
|
||||
"watchers": 3095,
|
||||
"watchers": 3096,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
29
2020/CVE-2020-15261.json
Normal file
29
2020/CVE-2020-15261.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 447164459,
|
||||
"name": "CVE-2020-15261",
|
||||
"full_name": "yaoyao-cool\/CVE-2020-15261",
|
||||
"owner": {
|
||||
"login": "yaoyao-cool",
|
||||
"id": 61368305,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61368305?v=4",
|
||||
"html_url": "https:\/\/github.com\/yaoyao-cool"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/yaoyao-cool\/CVE-2020-15261",
|
||||
"description": "CVE-2020-15261 test",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-12T10:00:39Z",
|
||||
"updated_at": "2022-01-12T10:00:39Z",
|
||||
"pushed_at": "2022-01-12T10:00:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Powershell implemetation of CVE-2020-7352",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-05T00:11:58Z",
|
||||
"updated_at": "2022-01-11T10:59:57Z",
|
||||
"updated_at": "2022-01-12T09:04:59Z",
|
||||
"pushed_at": "2022-01-11T10:58:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,17 +40,17 @@
|
|||
"description": "CVE-2021-1732 Microsoft Windows 10 本地提权漏 研究及Poc\/Exploit开发",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-08T05:07:15Z",
|
||||
"updated_at": "2021-12-16T09:50:21Z",
|
||||
"updated_at": "2022-01-12T12:17:01Z",
|
||||
"pushed_at": "2021-03-08T11:41:19Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 47,
|
||||
"watchers": 48,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,11 +13,11 @@
|
|||
"description": "SonicWall SMA-100 Unauth RCE Exploit (CVE-2021-20038)",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-11T02:25:25Z",
|
||||
"updated_at": "2022-01-11T11:25:40Z",
|
||||
"updated_at": "2022-01-12T12:05:31Z",
|
||||
"pushed_at": "2022-01-11T11:22:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 4,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -26,8 +26,8 @@
|
|||
"rce"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 0,
|
||||
"forks": 9,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Gitlab CI Lint API未授权 SSRF漏洞 (CVE-2021-22214)",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-22T03:04:50Z",
|
||||
"updated_at": "2021-12-15T14:42:22Z",
|
||||
"updated_at": "2022-01-12T06:57:08Z",
|
||||
"pushed_at": "2021-06-22T04:35:08Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 60,
|
||||
"watchers": 61,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 396769362,
|
||||
"name": "CVE-2021-25790-Multiple-Stored-XSS",
|
||||
"full_name": "MrCraniums\/CVE-2021-25790-Multiple-Stored-XSS",
|
||||
"owner": {
|
||||
"login": "MrCraniums",
|
||||
"id": 10303989,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10303989?v=4",
|
||||
"html_url": "https:\/\/github.com\/MrCraniums"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MrCraniums\/CVE-2021-25790-Multiple-Stored-XSS",
|
||||
"description": "CVE-2021-25790-Multiple-Stored-XSS : Multiple Stored XSS in House Rental and Property Listing",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-16T11:46:02Z",
|
||||
"updated_at": "2021-08-16T11:50:43Z",
|
||||
"pushed_at": "2021-08-16T11:50:36Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,17 +40,17 @@
|
|||
"description": "A PowerShell script to identify indicators of exploitation of CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-26865",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-03T17:36:18Z",
|
||||
"updated_at": "2021-08-14T03:36:25Z",
|
||||
"updated_at": "2022-01-12T11:59:39Z",
|
||||
"pushed_at": "2021-03-05T17:09:01Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -299,10 +299,10 @@
|
|||
"description": "A fast tool to mass scan for a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin (CVE-2021-26855).",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-08T11:54:32Z",
|
||||
"updated_at": "2021-12-15T14:41:37Z",
|
||||
"updated_at": "2022-01-12T09:43:49Z",
|
||||
"pushed_at": "2021-03-17T11:21:52Z",
|
||||
"stargazers_count": 135,
|
||||
"watchers_count": 135,
|
||||
"stargazers_count": 136,
|
||||
"watchers_count": 136,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -317,7 +317,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 135,
|
||||
"watchers": 136,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-01-11T16:03:38Z",
|
||||
"updated_at": "2022-01-12T03:59:23Z",
|
||||
"updated_at": "2022-01-12T06:50:57Z",
|
||||
"pushed_at": "2022-01-11T16:52:16Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,13 +17,40 @@
|
|||
"pushed_at": "2022-01-11T08:15:09Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 447197307,
|
||||
"name": "CVE-2021-32099",
|
||||
"full_name": "ibnuuby\/CVE-2021-32099",
|
||||
"owner": {
|
||||
"login": "ibnuuby",
|
||||
"id": 28418984,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28418984?v=4",
|
||||
"html_url": "https:\/\/github.com\/ibnuuby"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ibnuuby\/CVE-2021-32099",
|
||||
"description": "CVE-2021-32099",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-12T11:48:34Z",
|
||||
"updated_at": "2022-01-12T11:48:34Z",
|
||||
"pushed_at": "2022-01-12T11:49:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2021-10-13T22:32:36Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 14,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"forks": 15,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "PoC for CVE-2021-3492 used at Pwn2Own 2021",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-28T09:43:31Z",
|
||||
"updated_at": "2022-01-01T05:23:30Z",
|
||||
"updated_at": "2022-01-12T10:36:26Z",
|
||||
"pushed_at": "2021-08-03T14:48:27Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 35,
|
||||
"watchers": 36,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -229,17 +229,17 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2022-01-11T09:21:46Z",
|
||||
"updated_at": "2022-01-12T07:39:45Z",
|
||||
"pushed_at": "2021-12-25T18:31:02Z",
|
||||
"stargazers_count": 1342,
|
||||
"watchers_count": 1342,
|
||||
"stargazers_count": 1343,
|
||||
"watchers_count": 1343,
|
||||
"forks_count": 442,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 442,
|
||||
"watchers": 1342,
|
||||
"watchers": 1343,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -923,17 +923,17 @@
|
|||
"description": "CVE-2021-40444",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-19T08:16:07Z",
|
||||
"updated_at": "2022-01-12T05:45:03Z",
|
||||
"updated_at": "2022-01-12T09:16:16Z",
|
||||
"pushed_at": "2021-12-19T08:27:33Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 14,
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 43,
|
||||
"forks": 17,
|
||||
"watchers": 45,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-16T16:17:44Z",
|
||||
"updated_at": "2022-01-06T12:35:56Z",
|
||||
"updated_at": "2022-01-12T06:40:33Z",
|
||||
"pushed_at": "2021-11-11T17:09:56Z",
|
||||
"stargazers_count": 363,
|
||||
"watchers_count": 363,
|
||||
"stargazers_count": 364,
|
||||
"watchers_count": 364,
|
||||
"forks_count": 80,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 80,
|
||||
"watchers": 363,
|
||||
"watchers": 364,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -293,10 +293,10 @@
|
|||
"description": "Apache 远程代码执行 (CVE-2021-42013)批量检测工具:Apache HTTP Server是美国阿帕奇(Apache)基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点,发现 Apache HTTP Server 2.4.50 中针对 CVE-2021-41773 的修复不够充分。攻击者可以使用路径遍历攻击将 URL 映射到由类似别名的指令配置的目录之外的文件。如果这些目录之外的文件不受通常的默认配置“要求全部拒绝”的保护,则这些请求可能会成功。如果还为这些别名路径启用了 CGI 脚本,则这可能允许远程代码执行。此问题仅影响 Apache 2.4.49 和 Apache 2.4.50,而不影响更早版本。",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-23T14:46:41Z",
|
||||
"updated_at": "2022-01-10T02:26:59Z",
|
||||
"updated_at": "2022-01-12T09:59:48Z",
|
||||
"pushed_at": "2021-12-24T07:38:39Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -309,7 +309,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -45,17 +45,17 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T10:28:12Z",
|
||||
"updated_at": "2022-01-12T03:54:49Z",
|
||||
"updated_at": "2022-01-12T10:36:56Z",
|
||||
"pushed_at": "2021-12-20T04:51:01Z",
|
||||
"stargazers_count": 192,
|
||||
"watchers_count": 192,
|
||||
"forks_count": 39,
|
||||
"stargazers_count": 196,
|
||||
"watchers_count": 196,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 192,
|
||||
"forks": 40,
|
||||
"watchers": 196,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -156,10 +156,10 @@
|
|||
"description": "一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T06:42:37Z",
|
||||
"updated_at": "2022-01-05T08:08:21Z",
|
||||
"updated_at": "2022-01-12T09:40:34Z",
|
||||
"pushed_at": "2021-12-11T02:49:41Z",
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -179,7 +179,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 95,
|
||||
"watchers": 99,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -390,17 +390,17 @@
|
|||
"description": "Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T12:38:20Z",
|
||||
"updated_at": "2022-01-12T03:23:45Z",
|
||||
"updated_at": "2022-01-12T09:20:39Z",
|
||||
"pushed_at": "2021-12-27T10:27:42Z",
|
||||
"stargazers_count": 903,
|
||||
"watchers_count": 903,
|
||||
"stargazers_count": 904,
|
||||
"watchers_count": 904,
|
||||
"forks_count": 355,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 355,
|
||||
"watchers": 903,
|
||||
"watchers": 904,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -786,14 +786,14 @@
|
|||
{
|
||||
"id": 437124793,
|
||||
"name": "log4noshell",
|
||||
"full_name": "alerithe\/log4noshell",
|
||||
"full_name": "suhtiva\/log4noshell",
|
||||
"owner": {
|
||||
"login": "alerithe",
|
||||
"login": "suhtiva",
|
||||
"id": 31022473,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31022473?v=4",
|
||||
"html_url": "https:\/\/github.com\/alerithe"
|
||||
"html_url": "https:\/\/github.com\/suhtiva"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alerithe\/log4noshell",
|
||||
"html_url": "https:\/\/github.com\/suhtiva\/log4noshell",
|
||||
"description": "Java agent that disables Apache Log4J's JNDI Lookup. Fixes CVE-2021-44228, aka \"Log4Shell.\"",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T21:59:31Z",
|
||||
|
@ -905,11 +905,11 @@
|
|||
"description": "A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2022-01-12T03:53:27Z",
|
||||
"updated_at": "2022-01-12T10:27:35Z",
|
||||
"pushed_at": "2022-01-02T07:12:10Z",
|
||||
"stargazers_count": 1143,
|
||||
"watchers_count": 1143,
|
||||
"forks_count": 291,
|
||||
"stargazers_count": 1145,
|
||||
"watchers_count": 1145,
|
||||
"forks_count": 293,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -919,8 +919,8 @@
|
|||
"security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 291,
|
||||
"watchers": 1143,
|
||||
"forks": 293,
|
||||
"watchers": 1145,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1885,10 +1885,10 @@
|
|||
"description": "Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T00:29:03Z",
|
||||
"updated_at": "2022-01-11T22:29:02Z",
|
||||
"updated_at": "2022-01-12T07:24:58Z",
|
||||
"pushed_at": "2022-01-07T09:40:06Z",
|
||||
"stargazers_count": 569,
|
||||
"watchers_count": 569,
|
||||
"stargazers_count": 570,
|
||||
"watchers_count": 570,
|
||||
"forks_count": 94,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1907,7 +1907,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 94,
|
||||
"watchers": 569,
|
||||
"watchers": 570,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2348,10 +2348,10 @@
|
|||
"description": "Log4J CVE-2021-44228 Minecraft PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T11:22:51Z",
|
||||
"updated_at": "2021-12-20T05:53:38Z",
|
||||
"updated_at": "2022-01-12T09:47:57Z",
|
||||
"pushed_at": "2021-12-12T11:34:50Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -2363,7 +2363,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2446,7 +2446,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-12T11:28:34Z",
|
||||
"updated_at": "2022-01-11T13:47:29Z",
|
||||
"pushed_at": "2022-01-11T10:22:26Z",
|
||||
"pushed_at": "2022-01-12T09:53:43Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"forks_count": 7,
|
||||
|
@ -2507,17 +2507,17 @@
|
|||
"description": "Scan systems and docker images for potential log4j vulnerabilities. Able to patch (remove JndiLookup.class) from layered archives. Will detect in-depth (layered archives jar\/zip\/tar\/war and scans for vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046 and CVE-2021-45105). Binaries for Windows, Linux and OsX, but can be build on each platform supported by supported Golang.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T12:16:07Z",
|
||||
"updated_at": "2022-01-05T11:19:28Z",
|
||||
"updated_at": "2022-01-12T07:38:51Z",
|
||||
"pushed_at": "2021-12-28T22:21:52Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 48,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3539,17 +3539,17 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2022-01-12T05:22:57Z",
|
||||
"updated_at": "2022-01-12T08:34:50Z",
|
||||
"pushed_at": "2022-01-02T20:21:42Z",
|
||||
"stargazers_count": 2576,
|
||||
"watchers_count": 2576,
|
||||
"stargazers_count": 2580,
|
||||
"watchers_count": 2580,
|
||||
"forks_count": 615,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 615,
|
||||
"watchers": 2576,
|
||||
"watchers": 2580,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -5239,10 +5239,10 @@
|
|||
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T06:37:59Z",
|
||||
"updated_at": "2022-01-11T18:23:02Z",
|
||||
"updated_at": "2022-01-12T11:42:16Z",
|
||||
"pushed_at": "2021-12-27T15:12:20Z",
|
||||
"stargazers_count": 252,
|
||||
"watchers_count": 252,
|
||||
"stargazers_count": 253,
|
||||
"watchers_count": 253,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -5255,7 +5255,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 252,
|
||||
"watchers": 253,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -5413,11 +5413,11 @@
|
|||
"description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T10:04:42Z",
|
||||
"updated_at": "2022-01-12T04:18:43Z",
|
||||
"updated_at": "2022-01-12T10:05:37Z",
|
||||
"pushed_at": "2022-01-12T03:31:50Z",
|
||||
"stargazers_count": 383,
|
||||
"watchers_count": 383,
|
||||
"forks_count": 80,
|
||||
"stargazers_count": 385,
|
||||
"watchers_count": 385,
|
||||
"forks_count": 82,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -5431,8 +5431,8 @@
|
|||
"python"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 80,
|
||||
"watchers": 383,
|
||||
"forks": 82,
|
||||
"watchers": 385,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -6000,12 +6000,12 @@
|
|||
"pushed_at": "2022-01-12T03:28:41Z",
|
||||
"stargazers_count": 314,
|
||||
"watchers_count": 314,
|
||||
"forks_count": 85,
|
||||
"forks_count": 84,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 85,
|
||||
"forks": 84,
|
||||
"watchers": 314,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -7066,7 +7066,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-16T12:20:00Z",
|
||||
"updated_at": "2021-12-20T15:36:11Z",
|
||||
"pushed_at": "2021-12-20T15:36:08Z",
|
||||
"pushed_at": "2022-01-12T08:53:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
@ -8691,12 +8691,12 @@
|
|||
"pushed_at": "2021-12-21T06:11:58Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -10044,17 +10044,17 @@
|
|||
"description": "Backdoor detection for VMware view",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-05T11:27:16Z",
|
||||
"updated_at": "2022-01-09T20:43:16Z",
|
||||
"updated_at": "2022-01-12T09:25:48Z",
|
||||
"pushed_at": "2022-01-05T12:37:39Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -10125,17 +10125,17 @@
|
|||
"description": "Log4jshell - CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-07T09:56:30Z",
|
||||
"updated_at": "2022-01-07T14:01:21Z",
|
||||
"updated_at": "2022-01-12T06:44:17Z",
|
||||
"pushed_at": "2022-01-07T14:01:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
21
README.md
21
README.md
|
@ -1147,14 +1147,6 @@ A security issue was discovered in kube-apiserver that could allow node updates
|
|||
|
||||
- [darryk10/CVE-2021-25735](https://github.com/darryk10/CVE-2021-25735)
|
||||
|
||||
### CVE-2021-25790 (2021-07-23)
|
||||
|
||||
<code>
|
||||
Multiple stored cross site scripting (XSS) vulnerabilities in the "Register" module of House Rental and Property Listing 1.0 allows authenticated attackers to execute arbitrary web scripts or HTML via crafted payloads in all text fields except for Phone Number and Alternate Phone Number.
|
||||
</code>
|
||||
|
||||
- [MrCraniums/CVE-2021-25790-Multiple-Stored-XSS](https://github.com/MrCraniums/CVE-2021-25790-Multiple-Stored-XSS)
|
||||
|
||||
### CVE-2021-26084 (2021-08-30)
|
||||
|
||||
<code>
|
||||
|
@ -2019,6 +2011,7 @@ A SQL injection vulnerability in the pandora_console component of Artica Pandora
|
|||
</code>
|
||||
|
||||
- [zjicmDarkWing/CVE-2021-32099](https://github.com/zjicmDarkWing/CVE-2021-32099)
|
||||
- [ibnuuby/CVE-2021-32099](https://github.com/ibnuuby/CVE-2021-32099)
|
||||
|
||||
### CVE-2021-32202 (2021-09-14)
|
||||
|
||||
|
@ -3614,7 +3607,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [StandB/CVE-2021-44228-poc](https://github.com/StandB/CVE-2021-44228-poc)
|
||||
- [seamus-dev/CVE-2021-44228](https://github.com/seamus-dev/CVE-2021-44228)
|
||||
- [takito1812/log4j-detect](https://github.com/takito1812/log4j-detect)
|
||||
- [alerithe/log4noshell](https://github.com/alerithe/log4noshell)
|
||||
- [suhtiva/log4noshell](https://github.com/suhtiva/log4noshell)
|
||||
- [Azeemering/CVE-2021-44228-DFIR-Notes](https://github.com/Azeemering/CVE-2021-44228-DFIR-Notes)
|
||||
- [Puliczek/CVE-2021-44228-PoC-log4j-bypass-words](https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words)
|
||||
- [kozmer/log4j-shell-poc](https://github.com/kozmer/log4j-shell-poc)
|
||||
|
@ -7099,6 +7092,7 @@ A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be ex
|
|||
</code>
|
||||
|
||||
- [cgwalters/cve-2020-14386](https://github.com/cgwalters/cve-2020-14386)
|
||||
- [artsking/linux-4.19.72_CVE-2020-14386](https://github.com/artsking/linux-4.19.72_CVE-2020-14386)
|
||||
|
||||
### CVE-2020-14644 (2020-07-15)
|
||||
|
||||
|
@ -7301,6 +7295,14 @@ containerd is an industry-standard container runtime and is available as a daemo
|
|||
|
||||
- [nccgroup/abstractshimmer](https://github.com/nccgroup/abstractshimmer)
|
||||
|
||||
### CVE-2020-15261 (2020-10-19)
|
||||
|
||||
<code>
|
||||
On Windows the Veyon Service before version 4.4.2 contains an unquoted service path vulnerability, allowing locally authenticated users with administrative privileges to run malicious executables with LocalSystem privileges. Since Veyon users (both students and teachers) usually don't have administrative privileges, this vulnerability is only dangerous in anyway unsafe setups. The problem has been fixed in version 4.4.2. As a workaround, the exploitation of the vulnerability can be prevented by revoking administrative privileges from all potentially untrustworthy users.
|
||||
</code>
|
||||
|
||||
- [yaoyao-cool/CVE-2020-15261](https://github.com/yaoyao-cool/CVE-2020-15261)
|
||||
|
||||
### CVE-2020-15349 (2020-11-16)
|
||||
|
||||
<code>
|
||||
|
@ -12170,6 +12172,7 @@ An issue was discovered in disable_priv_mode in shell.c in GNU Bash through 5.0
|
|||
</code>
|
||||
|
||||
- [M-ensimag/CVE-2019-18276](https://github.com/M-ensimag/CVE-2019-18276)
|
||||
- [SABI-Ensimag/CVE-2019-18276](https://github.com/SABI-Ensimag/CVE-2019-18276)
|
||||
|
||||
### CVE-2019-18371 (2019-10-23)
|
||||
|
||||
|
|
Loading…
Reference in a new issue