diff --git a/2014/CVE-2014-0160.json b/2014/CVE-2014-0160.json index 2fec0e4274..79361f40c7 100644 --- a/2014/CVE-2014-0160.json +++ b/2014/CVE-2014-0160.json @@ -1255,13 +1255,13 @@ "description": "A collection of scripts and instructions to test CVE-2014-0160 (heartbleed).", "fork": false, "created_at": "2021-03-30T13:11:26Z", - "updated_at": "2021-06-02T16:28:47Z", + "updated_at": "2021-06-04T09:41:50Z", "pushed_at": "2021-05-20T13:28:44Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "forks_count": 0, "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0 } ] \ No newline at end of file diff --git a/2015/CVE-2015-5602.json b/2015/CVE-2015-5602.json index 4796870b00..7bc0fd7f60 100644 --- a/2015/CVE-2015-5602.json +++ b/2015/CVE-2015-5602.json @@ -17,8 +17,8 @@ "pushed_at": "2017-12-16T00:39:19Z", "stargazers_count": 9, "watchers_count": 9, - "forks_count": 17, - "forks": 17, + "forks_count": 18, + "forks": 18, "watchers": 9, "score": 0 }, diff --git a/2017/CVE-2017-12542.json b/2017/CVE-2017-12542.json index 98735efae7..6c7b2a00e1 100644 --- a/2017/CVE-2017-12542.json +++ b/2017/CVE-2017-12542.json @@ -13,13 +13,13 @@ "description": "Test and exploit for CVE-2017-12542", "fork": false, "created_at": "2018-02-05T18:55:56Z", - "updated_at": "2021-05-13T02:46:28Z", + "updated_at": "2021-06-04T09:33:25Z", "pushed_at": "2018-04-15T12:01:38Z", - "stargazers_count": 78, - "watchers_count": 78, + "stargazers_count": 77, + "watchers_count": 77, "forks_count": 30, "forks": 30, - "watchers": 78, + "watchers": 77, "score": 0 }, { diff --git a/2018/CVE-2018-10933.json b/2018/CVE-2018-10933.json index 57eb0a3907..a24ca40fc7 100644 --- a/2018/CVE-2018-10933.json +++ b/2018/CVE-2018-10933.json @@ -565,13 +565,13 @@ "description": "LibSSH Authentication Bypass CVE-2018-10933", "fork": false, "created_at": "2018-12-19T15:33:00Z", - "updated_at": "2020-01-09T05:02:59Z", + "updated_at": "2021-06-04T09:13:55Z", "pushed_at": "2018-12-19T15:46:37Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "forks_count": 1, "forks": 1, - "watchers": 5, + "watchers": 6, "score": 0 }, { diff --git a/2018/CVE-2018-11235.json b/2018/CVE-2018-11235.json index 2dead59969..e5e6270504 100644 --- a/2018/CVE-2018-11235.json +++ b/2018/CVE-2018-11235.json @@ -344,52 +344,6 @@ "watchers": 0, "score": 0 }, - { - "id": 281623003, - "name": "CVE-2018-11235", - "full_name": "makeross\/CVE-2018-11235", - "owner": { - "login": "makeross", - "id": 10423727, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10423727?v=4", - "html_url": "https:\/\/github.com\/makeross" - }, - "html_url": "https:\/\/github.com\/makeross\/CVE-2018-11235", - "description": null, - "fork": false, - "created_at": "2020-07-22T08:41:03Z", - "updated_at": "2020-07-22T09:02:48Z", - "pushed_at": "2020-07-22T09:02:45Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, - { - "id": 281628593, - "name": "CVE-2018-11235_pub", - "full_name": "makeross\/CVE-2018-11235_pub", - "owner": { - "login": "makeross", - "id": 10423727, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10423727?v=4", - "html_url": "https:\/\/github.com\/makeross" - }, - "html_url": "https:\/\/github.com\/makeross\/CVE-2018-11235_pub", - "description": null, - "fork": false, - "created_at": "2020-07-22T09:05:45Z", - "updated_at": "2020-07-22T09:26:41Z", - "pushed_at": "2020-07-22T09:26:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "forks_count": 0, - "forks": 0, - "watchers": 0, - "score": 0 - }, { "id": 307135452, "name": "CVE-2018-11235-PoC", diff --git a/2018/CVE-2018-13379.json b/2018/CVE-2018-13379.json index b00970182b..9e3d8c38a1 100644 --- a/2018/CVE-2018-13379.json +++ b/2018/CVE-2018-13379.json @@ -13,13 +13,13 @@ "description": "CVE-2018-13379", "fork": false, "created_at": "2019-08-11T09:44:37Z", - "updated_at": "2021-06-03T06:24:00Z", + "updated_at": "2021-06-04T09:34:13Z", "pushed_at": "2019-08-14T08:40:25Z", - "stargazers_count": 229, - "watchers_count": 229, + "stargazers_count": 230, + "watchers_count": 230, "forks_count": 82, "forks": 82, - "watchers": 229, + "watchers": 230, "score": 0 }, { diff --git a/2018/CVE-2018-5955.json b/2018/CVE-2018-5955.json index 5be0fe3c58..dad0dd1225 100644 --- a/2018/CVE-2018-5955.json +++ b/2018/CVE-2018-5955.json @@ -36,13 +36,13 @@ "description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能", "fork": false, "created_at": "2019-12-21T22:45:55Z", - "updated_at": "2021-06-04T09:11:57Z", + "updated_at": "2021-06-04T14:23:16Z", "pushed_at": "2020-01-05T21:46:25Z", - "stargazers_count": 429, - "watchers_count": 429, + "stargazers_count": 430, + "watchers_count": 430, "forks_count": 100, "forks": 100, - "watchers": 429, + "watchers": 430, "score": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-9995.json b/2018/CVE-2018-9995.json index a7438af26e..f4c83273d3 100644 --- a/2018/CVE-2018-9995.json +++ b/2018/CVE-2018-9995.json @@ -358,8 +358,8 @@ "description": null, "fork": false, "created_at": "2021-05-18T05:19:28Z", - "updated_at": "2021-05-19T07:28:25Z", - "pushed_at": "2021-05-19T07:28:22Z", + "updated_at": "2021-06-04T12:03:29Z", + "pushed_at": "2021-06-04T12:03:27Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index f411fd80d2..81496620e6 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -1899,13 +1899,13 @@ "description": "rce exploit , made to work with pocsuite3", "fork": false, "created_at": "2019-08-17T17:23:53Z", - "updated_at": "2021-05-29T23:31:05Z", + "updated_at": "2021-06-04T14:21:25Z", "pushed_at": "2019-08-19T02:52:11Z", - "stargazers_count": 111, - "watchers_count": 111, + "stargazers_count": 112, + "watchers_count": 112, "forks_count": 58, "forks": 58, - "watchers": 111, + "watchers": 112, "score": 0 }, { @@ -2382,13 +2382,13 @@ "description": "CVE-2019-0708 (BlueKeep)", "fork": false, "created_at": "2019-12-07T10:13:11Z", - "updated_at": "2021-05-15T16:01:19Z", + "updated_at": "2021-06-04T13:41:15Z", "pushed_at": "2020-07-07T15:28:13Z", - "stargazers_count": 89, - "watchers_count": 89, + "stargazers_count": 90, + "watchers_count": 90, "forks_count": 16, "forks": 16, - "watchers": 89, + "watchers": 90, "score": 0 }, { diff --git a/2019/CVE-2019-5736.json b/2019/CVE-2019-5736.json index 51ce082780..cac747a9d8 100644 --- a/2019/CVE-2019-5736.json +++ b/2019/CVE-2019-5736.json @@ -40,8 +40,8 @@ "pushed_at": "2019-02-19T11:45:13Z", "stargazers_count": 511, "watchers_count": 511, - "forks_count": 129, - "forks": 129, + "forks_count": 130, + "forks": 130, "watchers": 511, "score": 0 }, diff --git a/2019/CVE-2019-7192.json b/2019/CVE-2019-7192.json index 45b50760a6..0efe428dd8 100644 --- a/2019/CVE-2019-7192.json +++ b/2019/CVE-2019-7192.json @@ -36,13 +36,13 @@ "description": "QNAP pre-auth root RCE Exploit (CVE-2019-7192 ~ CVE-2019-7195)", "fork": false, "created_at": "2020-05-24T15:44:29Z", - "updated_at": "2021-05-31T19:30:41Z", + "updated_at": "2021-06-04T12:10:02Z", "pushed_at": "2020-05-24T16:28:46Z", - "stargazers_count": 49, - "watchers_count": 49, + "stargazers_count": 50, + "watchers_count": 50, "forks_count": 23, "forks": 23, - "watchers": 49, + "watchers": 50, "score": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-7304.json b/2019/CVE-2019-7304.json index e39d8ebc69..4b6e4a740d 100644 --- a/2019/CVE-2019-7304.json +++ b/2019/CVE-2019-7304.json @@ -17,8 +17,8 @@ "pushed_at": "2019-05-09T21:34:26Z", "stargazers_count": 573, "watchers_count": 573, - "forks_count": 135, - "forks": 135, + "forks_count": 134, + "forks": 134, "watchers": 573, "score": 0 }, diff --git a/2020/CVE-2020-12695.json b/2020/CVE-2020-12695.json index ac917a693f..d11ae86e33 100644 --- a/2020/CVE-2020-12695.json +++ b/2020/CVE-2020-12695.json @@ -13,13 +13,13 @@ "description": "Vulnerability checker for Callstranger (CVE-2020-12695)", "fork": false, "created_at": "2020-06-08T07:37:49Z", - "updated_at": "2021-05-30T04:45:22Z", + "updated_at": "2021-06-04T11:17:11Z", "pushed_at": "2020-06-17T13:41:23Z", - "stargazers_count": 361, - "watchers_count": 361, + "stargazers_count": 362, + "watchers_count": 362, "forks_count": 64, "forks": 64, - "watchers": 361, + "watchers": 362, "score": 0 }, { diff --git a/2020/CVE-2020-14883.json b/2020/CVE-2020-14883.json index 3246ef76b7..67d680ae88 100644 --- a/2020/CVE-2020-14883.json +++ b/2020/CVE-2020-14883.json @@ -105,13 +105,13 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2021-06-03T08:34:29Z", + "updated_at": "2021-06-04T14:27:26Z", "pushed_at": "2021-04-26T02:30:11Z", - "stargazers_count": 777, - "watchers_count": 777, + "stargazers_count": 778, + "watchers_count": 778, "forks_count": 243, "forks": 243, - "watchers": 777, + "watchers": 778, "score": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-2883.json b/2020/CVE-2020-2883.json index 0a78d3d71f..a0f9964ad4 100644 --- a/2020/CVE-2020-2883.json +++ b/2020/CVE-2020-2883.json @@ -82,13 +82,13 @@ "description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell", "fork": false, "created_at": "2020-08-19T03:34:06Z", - "updated_at": "2021-06-04T04:23:18Z", + "updated_at": "2021-06-04T15:12:47Z", "pushed_at": "2020-08-25T03:17:32Z", - "stargazers_count": 247, - "watchers_count": 247, + "stargazers_count": 248, + "watchers_count": 248, "forks_count": 40, "forks": 40, - "watchers": 247, + "watchers": 248, "score": 0 }, { diff --git a/2021/CVE-2021-21985.json b/2021/CVE-2021-21985.json index 163407c3ce..ac08f04faf 100644 --- a/2021/CVE-2021-21985.json +++ b/2021/CVE-2021-21985.json @@ -36,13 +36,13 @@ "description": null, "fork": false, "created_at": "2021-05-29T13:07:14Z", - "updated_at": "2021-06-04T09:10:36Z", + "updated_at": "2021-06-04T15:02:03Z", "pushed_at": "2021-06-03T21:29:39Z", - "stargazers_count": 89, - "watchers_count": 89, - "forks_count": 17, - "forks": 17, - "watchers": 89, + "stargazers_count": 98, + "watchers_count": 98, + "forks_count": 18, + "forks": 18, + "watchers": 98, "score": 0 }, { @@ -105,13 +105,13 @@ "description": "CVE-2021-21985 VMware vCenter Server远程代码执行漏洞 EXP", "fork": false, "created_at": "2021-06-03T09:59:21Z", - "updated_at": "2021-06-04T08:27:22Z", + "updated_at": "2021-06-04T12:43:00Z", "pushed_at": "2021-06-03T11:07:53Z", - "stargazers_count": 39, - "watchers_count": 39, + "stargazers_count": 44, + "watchers_count": 44, "forks_count": 5, "forks": 5, - "watchers": 39, + "watchers": 44, "score": 0 }, { @@ -128,13 +128,13 @@ "description": "cve-2021-21985 exploit", "fork": false, "created_at": "2021-06-03T12:17:06Z", - "updated_at": "2021-06-04T02:51:07Z", + "updated_at": "2021-06-04T14:55:21Z", "pushed_at": "2021-06-04T01:42:01Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 8, + "watchers_count": 8, "forks_count": 0, "forks": 0, - "watchers": 1, + "watchers": 8, "score": 0 }, { diff --git a/2021/CVE-2021-22893.json b/2021/CVE-2021-22893.json index 814288d626..fe39d650c8 100644 --- a/2021/CVE-2021-22893.json +++ b/2021/CVE-2021-22893.json @@ -17,8 +17,8 @@ "pushed_at": "2021-05-25T00:45:31Z", "stargazers_count": 33, "watchers_count": 33, - "forks_count": 13, - "forks": 13, + "forks_count": 14, + "forks": 14, "watchers": 33, "score": 0 }, diff --git a/2021/CVE-2021-25646.json b/2021/CVE-2021-25646.json index 653352cca7..385fd3e96e 100644 --- a/2021/CVE-2021-25646.json +++ b/2021/CVE-2021-25646.json @@ -105,13 +105,13 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2021-06-03T08:34:29Z", + "updated_at": "2021-06-04T14:27:26Z", "pushed_at": "2021-04-26T02:30:11Z", - "stargazers_count": 777, - "watchers_count": 777, + "stargazers_count": 778, + "watchers_count": 778, "forks_count": 243, "forks": 243, - "watchers": 777, + "watchers": 778, "score": 0 }, { diff --git a/2021/CVE-2021-26814.json b/2021/CVE-2021-26814.json index f7e4d30fe6..27b8836008 100644 --- a/2021/CVE-2021-26814.json +++ b/2021/CVE-2021-26814.json @@ -13,13 +13,13 @@ "description": "A simple python PoC to exploit CVE-2021-26814 and gain RCE on Wazuh Manager (v.4.0.0-4.0.3) through the API service.", "fork": false, "created_at": "2021-05-17T10:13:47Z", - "updated_at": "2021-05-19T22:00:04Z", + "updated_at": "2021-06-04T14:56:48Z", "pushed_at": "2021-05-18T15:15:40Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "forks_count": 0, "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0 }, { diff --git a/2021/CVE-2021-27965.json b/2021/CVE-2021-27965.json index 688fa73f45..1bb1f01ce7 100644 --- a/2021/CVE-2021-27965.json +++ b/2021/CVE-2021-27965.json @@ -13,8 +13,8 @@ "description": "stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority\/system", "fork": false, "created_at": "2021-06-03T12:39:11Z", - "updated_at": "2021-06-03T17:32:25Z", - "pushed_at": "2021-06-03T13:57:17Z", + "updated_at": "2021-06-04T14:44:35Z", + "pushed_at": "2021-06-04T14:44:32Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, diff --git a/2021/CVE-2021-28476.json b/2021/CVE-2021-28476.json index 685f96fbcd..ff4ee74cae 100644 --- a/2021/CVE-2021-28476.json +++ b/2021/CVE-2021-28476.json @@ -13,13 +13,13 @@ "description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.", "fork": false, "created_at": "2021-05-31T18:02:39Z", - "updated_at": "2021-06-04T08:55:44Z", + "updated_at": "2021-06-04T09:26:55Z", "pushed_at": "2021-06-01T15:08:23Z", - "stargazers_count": 147, - "watchers_count": 147, + "stargazers_count": 148, + "watchers_count": 148, "forks_count": 25, "forks": 25, - "watchers": 147, + "watchers": 148, "score": 0 }, { diff --git a/2021/CVE-2021-29447.json b/2021/CVE-2021-29447.json index 5fd1c66aa3..1ce07675c4 100644 --- a/2021/CVE-2021-29447.json +++ b/2021/CVE-2021-29447.json @@ -13,13 +13,13 @@ "description": "WordPress - Authenticated XXE (CVE-2021-29447)", "fork": false, "created_at": "2021-04-16T20:41:26Z", - "updated_at": "2021-06-01T08:00:31Z", + "updated_at": "2021-06-04T14:23:06Z", "pushed_at": "2021-04-18T00:45:34Z", - "stargazers_count": 13, - "watchers_count": 13, + "stargazers_count": 14, + "watchers_count": 14, "forks_count": 5, "forks": 5, - "watchers": 13, + "watchers": 14, "score": 0 }, { @@ -59,8 +59,8 @@ "description": "Wordpress XXE injection 구축 자동화 및 PoC ", "fork": false, "created_at": "2021-06-01T10:10:25Z", - "updated_at": "2021-06-02T00:24:54Z", - "pushed_at": "2021-06-01T11:26:52Z", + "updated_at": "2021-06-04T11:26:42Z", + "pushed_at": "2021-06-04T11:26:40Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index af1381c63e..c9626704ba 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -59,13 +59,13 @@ "description": "CVE-2021-3156", "fork": false, "created_at": "2021-01-27T16:03:34Z", - "updated_at": "2021-06-02T06:28:34Z", + "updated_at": "2021-06-04T13:28:02Z", "pushed_at": "2021-01-31T04:56:56Z", - "stargazers_count": 108, - "watchers_count": 108, + "stargazers_count": 109, + "watchers_count": 109, "forks_count": 44, "forks": 44, - "watchers": 108, + "watchers": 109, "score": 0 }, { @@ -381,13 +381,13 @@ "description": null, "fork": false, "created_at": "2021-01-30T20:39:58Z", - "updated_at": "2021-05-30T06:02:52Z", + "updated_at": "2021-06-04T12:56:25Z", "pushed_at": "2021-02-02T17:07:09Z", - "stargazers_count": 722, - "watchers_count": 722, + "stargazers_count": 723, + "watchers_count": 723, "forks_count": 204, "forks": 204, - "watchers": 722, + "watchers": 723, "score": 0 }, { @@ -661,8 +661,8 @@ "pushed_at": "2021-02-03T22:28:14Z", "stargazers_count": 48, "watchers_count": 48, - "forks_count": 27, - "forks": 27, + "forks_count": 28, + "forks": 28, "watchers": 48, "score": 0 }, diff --git a/2021/CVE-2021-3493.json b/2021/CVE-2021-3493.json index 2817e82484..f255c33f47 100644 --- a/2021/CVE-2021-3493.json +++ b/2021/CVE-2021-3493.json @@ -13,13 +13,13 @@ "description": "Ubuntu OverlayFS Local Privesc", "fork": false, "created_at": "2021-04-19T20:07:01Z", - "updated_at": "2021-05-28T12:45:23Z", + "updated_at": "2021-06-04T15:10:29Z", "pushed_at": "2021-04-20T00:46:14Z", - "stargazers_count": 190, - "watchers_count": 190, + "stargazers_count": 191, + "watchers_count": 191, "forks_count": 62, "forks": 62, - "watchers": 190, + "watchers": 191, "score": 0 }, { diff --git a/README.md b/README.md index 0642499101..99c564bf48 100644 --- a/README.md +++ b/README.md @@ -11102,8 +11102,6 @@ In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before - [cchang27/CVE-2018-11235-test](https://github.com/cchang27/CVE-2018-11235-test) - [nthuong95/CVE-2018-11235](https://github.com/nthuong95/CVE-2018-11235) - [xElkomy/CVE-2018-11235](https://github.com/xElkomy/CVE-2018-11235) -- [makeross/CVE-2018-11235](https://github.com/makeross/CVE-2018-11235) -- [makeross/CVE-2018-11235_pub](https://github.com/makeross/CVE-2018-11235_pub) - [jongmartinez/CVE-2018-11235-PoC](https://github.com/jongmartinez/CVE-2018-11235-PoC) - [MohamedTarekq/test-CVE-2018-11235](https://github.com/MohamedTarekq/test-CVE-2018-11235) - [Yealid/CVE-2018-11235-Git-Submodule-RCE](https://github.com/Yealid/CVE-2018-11235-Git-Submodule-RCE)