mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/06/05 00:11:24
This commit is contained in:
parent
d28bebe13f
commit
7d215cb547
25 changed files with 102 additions and 150 deletions
|
@ -1255,13 +1255,13 @@
|
|||
"description": "A collection of scripts and instructions to test CVE-2014-0160 (heartbleed).",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-30T13:11:26Z",
|
||||
"updated_at": "2021-06-02T16:28:47Z",
|
||||
"updated_at": "2021-06-04T09:41:50Z",
|
||||
"pushed_at": "2021-05-20T13:28:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2017-12-16T00:39:19Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Test and exploit for CVE-2017-12542",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-05T18:55:56Z",
|
||||
"updated_at": "2021-05-13T02:46:28Z",
|
||||
"updated_at": "2021-06-04T09:33:25Z",
|
||||
"pushed_at": "2018-04-15T12:01:38Z",
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"watchers": 78,
|
||||
"watchers": 77,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -565,13 +565,13 @@
|
|||
"description": "LibSSH Authentication Bypass CVE-2018-10933",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-19T15:33:00Z",
|
||||
"updated_at": "2020-01-09T05:02:59Z",
|
||||
"updated_at": "2021-06-04T09:13:55Z",
|
||||
"pushed_at": "2018-12-19T15:46:37Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -344,52 +344,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 281623003,
|
||||
"name": "CVE-2018-11235",
|
||||
"full_name": "makeross\/CVE-2018-11235",
|
||||
"owner": {
|
||||
"login": "makeross",
|
||||
"id": 10423727,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10423727?v=4",
|
||||
"html_url": "https:\/\/github.com\/makeross"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/makeross\/CVE-2018-11235",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-22T08:41:03Z",
|
||||
"updated_at": "2020-07-22T09:02:48Z",
|
||||
"pushed_at": "2020-07-22T09:02:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 281628593,
|
||||
"name": "CVE-2018-11235_pub",
|
||||
"full_name": "makeross\/CVE-2018-11235_pub",
|
||||
"owner": {
|
||||
"login": "makeross",
|
||||
"id": 10423727,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10423727?v=4",
|
||||
"html_url": "https:\/\/github.com\/makeross"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/makeross\/CVE-2018-11235_pub",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-07-22T09:05:45Z",
|
||||
"updated_at": "2020-07-22T09:26:41Z",
|
||||
"pushed_at": "2020-07-22T09:26:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 307135452,
|
||||
"name": "CVE-2018-11235-PoC",
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2018-13379",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-11T09:44:37Z",
|
||||
"updated_at": "2021-06-03T06:24:00Z",
|
||||
"updated_at": "2021-06-04T09:34:13Z",
|
||||
"pushed_at": "2019-08-14T08:40:25Z",
|
||||
"stargazers_count": 229,
|
||||
"watchers_count": 229,
|
||||
"stargazers_count": 230,
|
||||
"watchers_count": 230,
|
||||
"forks_count": 82,
|
||||
"forks": 82,
|
||||
"watchers": 229,
|
||||
"watchers": 230,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2021-06-04T09:11:57Z",
|
||||
"updated_at": "2021-06-04T14:23:16Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 429,
|
||||
"watchers_count": 429,
|
||||
"stargazers_count": 430,
|
||||
"watchers_count": 430,
|
||||
"forks_count": 100,
|
||||
"forks": 100,
|
||||
"watchers": 429,
|
||||
"watchers": 430,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -358,8 +358,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-05-18T05:19:28Z",
|
||||
"updated_at": "2021-05-19T07:28:25Z",
|
||||
"pushed_at": "2021-05-19T07:28:22Z",
|
||||
"updated_at": "2021-06-04T12:03:29Z",
|
||||
"pushed_at": "2021-06-04T12:03:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -1899,13 +1899,13 @@
|
|||
"description": "rce exploit , made to work with pocsuite3",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-17T17:23:53Z",
|
||||
"updated_at": "2021-05-29T23:31:05Z",
|
||||
"updated_at": "2021-06-04T14:21:25Z",
|
||||
"pushed_at": "2019-08-19T02:52:11Z",
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"forks_count": 58,
|
||||
"forks": 58,
|
||||
"watchers": 111,
|
||||
"watchers": 112,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2382,13 +2382,13 @@
|
|||
"description": "CVE-2019-0708 (BlueKeep)",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-07T10:13:11Z",
|
||||
"updated_at": "2021-05-15T16:01:19Z",
|
||||
"updated_at": "2021-06-04T13:41:15Z",
|
||||
"pushed_at": "2020-07-07T15:28:13Z",
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"stargazers_count": 90,
|
||||
"watchers_count": 90,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 89,
|
||||
"watchers": 90,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2019-02-19T11:45:13Z",
|
||||
"stargazers_count": 511,
|
||||
"watchers_count": 511,
|
||||
"forks_count": 129,
|
||||
"forks": 129,
|
||||
"forks_count": 130,
|
||||
"forks": 130,
|
||||
"watchers": 511,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "QNAP pre-auth root RCE Exploit (CVE-2019-7192 ~ CVE-2019-7195)",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-24T15:44:29Z",
|
||||
"updated_at": "2021-05-31T19:30:41Z",
|
||||
"updated_at": "2021-06-04T12:10:02Z",
|
||||
"pushed_at": "2020-05-24T16:28:46Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 49,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-05-09T21:34:26Z",
|
||||
"stargazers_count": 573,
|
||||
"watchers_count": 573,
|
||||
"forks_count": 135,
|
||||
"forks": 135,
|
||||
"forks_count": 134,
|
||||
"forks": 134,
|
||||
"watchers": 573,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-08T07:37:49Z",
|
||||
"updated_at": "2021-05-30T04:45:22Z",
|
||||
"updated_at": "2021-06-04T11:17:11Z",
|
||||
"pushed_at": "2020-06-17T13:41:23Z",
|
||||
"stargazers_count": 361,
|
||||
"watchers_count": 361,
|
||||
"stargazers_count": 362,
|
||||
"watchers_count": 362,
|
||||
"forks_count": 64,
|
||||
"forks": 64,
|
||||
"watchers": 361,
|
||||
"watchers": 362,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-06-03T08:34:29Z",
|
||||
"updated_at": "2021-06-04T14:27:26Z",
|
||||
"pushed_at": "2021-04-26T02:30:11Z",
|
||||
"stargazers_count": 777,
|
||||
"watchers_count": 777,
|
||||
"stargazers_count": 778,
|
||||
"watchers_count": 778,
|
||||
"forks_count": 243,
|
||||
"forks": 243,
|
||||
"watchers": 777,
|
||||
"watchers": 778,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-19T03:34:06Z",
|
||||
"updated_at": "2021-06-04T04:23:18Z",
|
||||
"updated_at": "2021-06-04T15:12:47Z",
|
||||
"pushed_at": "2020-08-25T03:17:32Z",
|
||||
"stargazers_count": 247,
|
||||
"watchers_count": 247,
|
||||
"stargazers_count": 248,
|
||||
"watchers_count": 248,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"watchers": 247,
|
||||
"watchers": 248,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-05-29T13:07:14Z",
|
||||
"updated_at": "2021-06-04T09:10:36Z",
|
||||
"updated_at": "2021-06-04T15:02:03Z",
|
||||
"pushed_at": "2021-06-03T21:29:39Z",
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 89,
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 98,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "CVE-2021-21985 VMware vCenter Server远程代码执行漏洞 EXP",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-03T09:59:21Z",
|
||||
"updated_at": "2021-06-04T08:27:22Z",
|
||||
"updated_at": "2021-06-04T12:43:00Z",
|
||||
"pushed_at": "2021-06-03T11:07:53Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 39,
|
||||
"watchers": 44,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -128,13 +128,13 @@
|
|||
"description": "cve-2021-21985 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-03T12:17:06Z",
|
||||
"updated_at": "2021-06-04T02:51:07Z",
|
||||
"updated_at": "2021-06-04T14:55:21Z",
|
||||
"pushed_at": "2021-06-04T01:42:01Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-05-25T00:45:31Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-06-03T08:34:29Z",
|
||||
"updated_at": "2021-06-04T14:27:26Z",
|
||||
"pushed_at": "2021-04-26T02:30:11Z",
|
||||
"stargazers_count": 777,
|
||||
"watchers_count": 777,
|
||||
"stargazers_count": 778,
|
||||
"watchers_count": 778,
|
||||
"forks_count": 243,
|
||||
"forks": 243,
|
||||
"watchers": 777,
|
||||
"watchers": 778,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "A simple python PoC to exploit CVE-2021-26814 and gain RCE on Wazuh Manager (v.4.0.0-4.0.3) through the API service.",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-17T10:13:47Z",
|
||||
"updated_at": "2021-05-19T22:00:04Z",
|
||||
"updated_at": "2021-06-04T14:56:48Z",
|
||||
"pushed_at": "2021-05-18T15:15:40Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority\/system",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-03T12:39:11Z",
|
||||
"updated_at": "2021-06-03T17:32:25Z",
|
||||
"pushed_at": "2021-06-03T13:57:17Z",
|
||||
"updated_at": "2021-06-04T14:44:35Z",
|
||||
"pushed_at": "2021-06-04T14:44:32Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-31T18:02:39Z",
|
||||
"updated_at": "2021-06-04T08:55:44Z",
|
||||
"updated_at": "2021-06-04T09:26:55Z",
|
||||
"pushed_at": "2021-06-01T15:08:23Z",
|
||||
"stargazers_count": 147,
|
||||
"watchers_count": 147,
|
||||
"stargazers_count": 148,
|
||||
"watchers_count": 148,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 147,
|
||||
"watchers": 148,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "WordPress - Authenticated XXE (CVE-2021-29447)",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-16T20:41:26Z",
|
||||
"updated_at": "2021-06-01T08:00:31Z",
|
||||
"updated_at": "2021-06-04T14:23:06Z",
|
||||
"pushed_at": "2021-04-18T00:45:34Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,8 +59,8 @@
|
|||
"description": "Wordpress XXE injection 구축 자동화 및 PoC ",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-01T10:10:25Z",
|
||||
"updated_at": "2021-06-02T00:24:54Z",
|
||||
"pushed_at": "2021-06-01T11:26:52Z",
|
||||
"updated_at": "2021-06-04T11:26:42Z",
|
||||
"pushed_at": "2021-06-04T11:26:40Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2021-3156",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-27T16:03:34Z",
|
||||
"updated_at": "2021-06-02T06:28:34Z",
|
||||
"updated_at": "2021-06-04T13:28:02Z",
|
||||
"pushed_at": "2021-01-31T04:56:56Z",
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"forks_count": 44,
|
||||
"forks": 44,
|
||||
"watchers": 108,
|
||||
"watchers": 109,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -381,13 +381,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2021-05-30T06:02:52Z",
|
||||
"updated_at": "2021-06-04T12:56:25Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 722,
|
||||
"watchers_count": 722,
|
||||
"stargazers_count": 723,
|
||||
"watchers_count": 723,
|
||||
"forks_count": 204,
|
||||
"forks": 204,
|
||||
"watchers": 722,
|
||||
"watchers": 723,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -661,8 +661,8 @@
|
|||
"pushed_at": "2021-02-03T22:28:14Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 48,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Ubuntu OverlayFS Local Privesc",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-19T20:07:01Z",
|
||||
"updated_at": "2021-05-28T12:45:23Z",
|
||||
"updated_at": "2021-06-04T15:10:29Z",
|
||||
"pushed_at": "2021-04-20T00:46:14Z",
|
||||
"stargazers_count": 190,
|
||||
"watchers_count": 190,
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"forks_count": 62,
|
||||
"forks": 62,
|
||||
"watchers": 190,
|
||||
"watchers": 191,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -11102,8 +11102,6 @@ In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before
|
|||
- [cchang27/CVE-2018-11235-test](https://github.com/cchang27/CVE-2018-11235-test)
|
||||
- [nthuong95/CVE-2018-11235](https://github.com/nthuong95/CVE-2018-11235)
|
||||
- [xElkomy/CVE-2018-11235](https://github.com/xElkomy/CVE-2018-11235)
|
||||
- [makeross/CVE-2018-11235](https://github.com/makeross/CVE-2018-11235)
|
||||
- [makeross/CVE-2018-11235_pub](https://github.com/makeross/CVE-2018-11235_pub)
|
||||
- [jongmartinez/CVE-2018-11235-PoC](https://github.com/jongmartinez/CVE-2018-11235-PoC)
|
||||
- [MohamedTarekq/test-CVE-2018-11235](https://github.com/MohamedTarekq/test-CVE-2018-11235)
|
||||
- [Yealid/CVE-2018-11235-Git-Submodule-RCE](https://github.com/Yealid/CVE-2018-11235-Git-Submodule-RCE)
|
||||
|
|
Loading…
Reference in a new issue