mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2021/04/19 18:11:21
This commit is contained in:
parent
3d0d711dae
commit
8e2aefc315
34 changed files with 116 additions and 216 deletions
|
@ -247,8 +247,8 @@
|
|||
"pushed_at": "2016-10-29T08:50:34Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC exploit for CVE-2018-5234",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-01T16:40:30Z",
|
||||
"updated_at": "2021-01-15T23:48:08Z",
|
||||
"updated_at": "2021-04-19T03:43:33Z",
|
||||
"pushed_at": "2018-05-02T08:50:57Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 28,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -458,28 +458,5 @@
|
|||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 305114825,
|
||||
"name": "CVE-2018-6389",
|
||||
"full_name": "Elsfa7-110\/CVE-2018-6389",
|
||||
"owner": {
|
||||
"login": "Elsfa7-110",
|
||||
"id": 26175351,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26175351?v=4",
|
||||
"html_url": "https:\/\/github.com\/Elsfa7-110"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Elsfa7-110\/CVE-2018-6389",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-10-18T14:01:59Z",
|
||||
"updated_at": "2021-04-18T12:39:16Z",
|
||||
"pushed_at": "2021-04-18T12:38:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2019-03-29T11:25:57Z",
|
||||
"stargazers_count": 331,
|
||||
"watchers_count": 331,
|
||||
"forks_count": 117,
|
||||
"forks": 117,
|
||||
"forks_count": 116,
|
||||
"forks": 116,
|
||||
"watchers": 331,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -2405,13 +2405,13 @@
|
|||
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-21T02:22:29Z",
|
||||
"updated_at": "2021-04-06T05:16:29Z",
|
||||
"updated_at": "2021-04-19T07:43:51Z",
|
||||
"pushed_at": "2020-01-21T03:15:41Z",
|
||||
"stargazers_count": 201,
|
||||
"watchers_count": 201,
|
||||
"stargazers_count": 202,
|
||||
"watchers_count": 202,
|
||||
"forks_count": 50,
|
||||
"forks": 50,
|
||||
"watchers": 201,
|
||||
"watchers": 202,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-06-24T15:33:50Z",
|
||||
"updated_at": "2021-03-03T13:22:08Z",
|
||||
"updated_at": "2021-04-19T04:43:17Z",
|
||||
"pushed_at": "2020-11-09T07:33:12Z",
|
||||
"stargazers_count": 248,
|
||||
"watchers_count": 248,
|
||||
"stargazers_count": 247,
|
||||
"watchers_count": 247,
|
||||
"forks_count": 51,
|
||||
"forks": 51,
|
||||
"watchers": 248,
|
||||
"watchers": 247,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-04-18T11:55:01Z",
|
||||
"updated_at": "2021-04-19T07:57:54Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2511,
|
||||
"watchers_count": 2511,
|
||||
"forks_count": 722,
|
||||
"forks": 722,
|
||||
"watchers": 2511,
|
||||
"stargazers_count": 2516,
|
||||
"watchers_count": 2516,
|
||||
"forks_count": 724,
|
||||
"forks": 724,
|
||||
"watchers": 2516,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T09:49:17Z",
|
||||
"updated_at": "2021-04-12T09:12:33Z",
|
||||
"updated_at": "2021-04-19T04:43:19Z",
|
||||
"pushed_at": "2021-01-24T20:18:04Z",
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 117,
|
||||
"watchers": 116,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -220,13 +220,13 @@
|
|||
"description": "All Working Exploits",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-11T20:43:09Z",
|
||||
"updated_at": "2020-03-05T01:05:55Z",
|
||||
"updated_at": "2021-04-19T06:52:48Z",
|
||||
"pushed_at": "2020-01-11T22:09:34Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-21T09:22:43Z",
|
||||
"updated_at": "2021-04-16T04:59:51Z",
|
||||
"updated_at": "2021-04-19T04:37:35Z",
|
||||
"pushed_at": "2020-04-26T10:49:25Z",
|
||||
"stargazers_count": 757,
|
||||
"watchers_count": 757,
|
||||
"stargazers_count": 756,
|
||||
"watchers_count": 756,
|
||||
"forks_count": 159,
|
||||
"forks": 159,
|
||||
"watchers": 757,
|
||||
"watchers": 756,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-03-20T18:47:25Z",
|
||||
"stargazers_count": 255,
|
||||
"watchers_count": 255,
|
||||
"forks_count": 86,
|
||||
"forks": 86,
|
||||
"forks_count": 87,
|
||||
"forks": 87,
|
||||
"watchers": 255,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "MacOS kernel memory leak (4 bytes)",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-10T14:30:16Z",
|
||||
"updated_at": "2020-06-22T01:50:02Z",
|
||||
"updated_at": "2021-04-19T04:29:01Z",
|
||||
"pushed_at": "2020-04-14T06:57:49Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 24,
|
||||
"watchers": 25,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-02-25T07:37:07Z",
|
||||
"stargazers_count": 138,
|
||||
"watchers_count": 138,
|
||||
"forks_count": 46,
|
||||
"forks": 46,
|
||||
"forks_count": 47,
|
||||
"forks": 47,
|
||||
"watchers": 138,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-12T06:02:06Z",
|
||||
"updated_at": "2021-04-17T08:41:31Z",
|
||||
"updated_at": "2021-04-19T05:52:31Z",
|
||||
"pushed_at": "2019-05-09T21:34:26Z",
|
||||
"stargazers_count": 551,
|
||||
"watchers_count": 551,
|
||||
"forks_count": 127,
|
||||
"forks": 127,
|
||||
"watchers": 551,
|
||||
"stargazers_count": 552,
|
||||
"watchers_count": 552,
|
||||
"forks_count": 128,
|
||||
"forks": 128,
|
||||
"watchers": 552,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -358,13 +358,13 @@
|
|||
"description": "PoC for triggering buffer overflow via CVE-2020-0796",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-12T18:34:40Z",
|
||||
"updated_at": "2021-03-26T10:25:27Z",
|
||||
"updated_at": "2021-04-19T07:54:59Z",
|
||||
"pushed_at": "2020-03-14T10:04:59Z",
|
||||
"stargazers_count": 267,
|
||||
"watchers_count": 267,
|
||||
"stargazers_count": 268,
|
||||
"watchers_count": 268,
|
||||
"forks_count": 108,
|
||||
"forks": 108,
|
||||
"watchers": 267,
|
||||
"watchers": 268,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-01T04:44:05Z",
|
||||
"updated_at": "2021-04-02T02:52:11Z",
|
||||
"updated_at": "2021-04-19T07:44:47Z",
|
||||
"pushed_at": "2020-06-17T00:56:08Z",
|
||||
"stargazers_count": 161,
|
||||
"watchers_count": 161,
|
||||
"stargazers_count": 162,
|
||||
"watchers_count": 162,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"watchers": 161,
|
||||
"watchers": 162,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-08T07:37:49Z",
|
||||
"updated_at": "2021-04-06T04:07:38Z",
|
||||
"updated_at": "2021-04-19T06:10:01Z",
|
||||
"pushed_at": "2020-06-17T13:41:23Z",
|
||||
"stargazers_count": 360,
|
||||
"watchers_count": 360,
|
||||
"stargazers_count": 361,
|
||||
"watchers_count": 361,
|
||||
"forks_count": 64,
|
||||
"forks": 64,
|
||||
"watchers": 360,
|
||||
"watchers": 361,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Course enrolments allowed privilege escalation from teacher role into manager role to RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-26T01:28:53Z",
|
||||
"updated_at": "2021-04-12T04:48:23Z",
|
||||
"updated_at": "2021-04-19T08:20:04Z",
|
||||
"pushed_at": "2020-07-26T01:36:14Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -128,13 +128,13 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2021-04-10T15:21:21Z",
|
||||
"updated_at": "2021-04-19T08:52:38Z",
|
||||
"pushed_at": "2020-10-15T18:31:15Z",
|
||||
"stargazers_count": 298,
|
||||
"watchers_count": 298,
|
||||
"stargazers_count": 299,
|
||||
"watchers_count": 299,
|
||||
"forks_count": 98,
|
||||
"forks": 98,
|
||||
"watchers": 298,
|
||||
"watchers": 299,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-04-18T11:55:01Z",
|
||||
"updated_at": "2021-04-19T07:57:54Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2511,
|
||||
"watchers_count": 2511,
|
||||
"forks_count": 722,
|
||||
"forks": 722,
|
||||
"watchers": 2511,
|
||||
"stargazers_count": 2516,
|
||||
"watchers_count": 2516,
|
||||
"forks_count": 724,
|
||||
"forks": 724,
|
||||
"watchers": 2516,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-04-19T03:12:21Z",
|
||||
"updated_at": "2021-04-19T05:13:13Z",
|
||||
"pushed_at": "2021-04-11T03:25:34Z",
|
||||
"stargazers_count": 610,
|
||||
"watchers_count": 610,
|
||||
"stargazers_count": 611,
|
||||
"watchers_count": 611,
|
||||
"forks_count": 166,
|
||||
"forks": 166,
|
||||
"watchers": 610,
|
||||
"watchers": 611,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-01-15T16:25:19Z",
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 76,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T15:27:25Z",
|
||||
"updated_at": "2021-04-18T20:55:02Z",
|
||||
"updated_at": "2021-04-19T08:42:10Z",
|
||||
"pushed_at": "2021-03-18T15:42:38Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 79,
|
||||
"watchers": 83,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-1732 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-05T02:11:10Z",
|
||||
"updated_at": "2021-04-19T03:12:57Z",
|
||||
"updated_at": "2021-04-19T03:45:18Z",
|
||||
"pushed_at": "2021-03-05T03:10:26Z",
|
||||
"stargazers_count": 274,
|
||||
"watchers_count": 274,
|
||||
"stargazers_count": 275,
|
||||
"watchers_count": 275,
|
||||
"forks_count": 63,
|
||||
"forks": 63,
|
||||
"watchers": 274,
|
||||
"watchers": 275,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T15:27:25Z",
|
||||
"updated_at": "2021-04-18T20:55:02Z",
|
||||
"updated_at": "2021-04-19T08:42:10Z",
|
||||
"pushed_at": "2021-03-18T15:42:38Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 79,
|
||||
"watchers": 83,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-07T11:10:40Z",
|
||||
"updated_at": "2021-04-16T21:40:35Z",
|
||||
"updated_at": "2021-04-19T06:22:40Z",
|
||||
"pushed_at": "2021-04-15T12:46:54Z",
|
||||
"stargazers_count": 150,
|
||||
"watchers_count": 150,
|
||||
"stargazers_count": 151,
|
||||
"watchers_count": 151,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 150,
|
||||
"watchers": 151,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -21,28 +21,5 @@
|
|||
"forks": 4,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 359022063,
|
||||
"name": "CVE-2021-25281",
|
||||
"full_name": "SkyBulk\/CVE-2021-25281",
|
||||
"owner": {
|
||||
"login": "SkyBulk",
|
||||
"id": 43649816,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43649816?v=4",
|
||||
"html_url": "https:\/\/github.com\/SkyBulk"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SkyBulk\/CVE-2021-25281",
|
||||
"description": "demo testing CVE-2021-25281",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-18T01:55:23Z",
|
||||
"updated_at": "2021-04-18T04:21:23Z",
|
||||
"pushed_at": "2021-04-18T01:55:24Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-04-19T03:12:21Z",
|
||||
"updated_at": "2021-04-19T05:13:13Z",
|
||||
"pushed_at": "2021-04-11T03:25:34Z",
|
||||
"stargazers_count": 610,
|
||||
"watchers_count": 610,
|
||||
"stargazers_count": 611,
|
||||
"watchers_count": 611,
|
||||
"forks_count": 166,
|
||||
"forks": 166,
|
||||
"watchers": 610,
|
||||
"watchers": 611,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 344250257,
|
||||
"name": "AdTran-Personal-Phone-Manager-Vulns",
|
||||
"full_name": "3ndG4me\/AdTran-Personal-Phone-Manager-Vulns",
|
||||
"owner": {
|
||||
"login": "3ndG4me",
|
||||
"id": 14339392,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14339392?v=4",
|
||||
"html_url": "https:\/\/github.com\/3ndG4me"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/3ndG4me\/AdTran-Personal-Phone-Manager-Vulns",
|
||||
"description": "A repository hosting write ups for the 0 days CVE-2021-25679, CVE-2021-25680, and CVE-2021-25681 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-03T20:06:54Z",
|
||||
"updated_at": "2021-04-17T21:39:42Z",
|
||||
"pushed_at": "2021-04-17T20:03:28Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -473,13 +473,13 @@
|
|||
"description": "CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T21:18:29Z",
|
||||
"updated_at": "2021-04-18T22:06:50Z",
|
||||
"updated_at": "2021-04-19T05:48:58Z",
|
||||
"pushed_at": "2021-04-18T22:06:48Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-31T16:30:02Z",
|
||||
"updated_at": "2021-04-18T18:48:32Z",
|
||||
"updated_at": "2021-04-19T08:37:00Z",
|
||||
"pushed_at": "2021-03-29T12:33:38Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 56,
|
||||
"watchers": 57,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -21,28 +21,5 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 358957574,
|
||||
"name": "CVE-2021-29349",
|
||||
"full_name": "Vulnmachines\/CVE-2021-29349",
|
||||
"owner": {
|
||||
"login": "Vulnmachines",
|
||||
"id": 79006904,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
|
||||
"html_url": "https:\/\/github.com\/Vulnmachines"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Vulnmachines\/CVE-2021-29349",
|
||||
"description": "CVE-2021-29349 CSRF to remove all messages in Mahara 20.10",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-17T18:48:38Z",
|
||||
"updated_at": "2021-04-17T18:54:50Z",
|
||||
"pushed_at": "2021-04-17T18:54:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-13T12:52:20Z",
|
||||
"updated_at": "2021-04-13T20:01:54Z",
|
||||
"updated_at": "2021-04-19T06:13:12Z",
|
||||
"pushed_at": "2021-01-29T13:59:07Z",
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 98,
|
||||
"watchers": 99,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -381,13 +381,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2021-04-18T02:13:30Z",
|
||||
"updated_at": "2021-04-19T04:45:30Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 688,
|
||||
"watchers_count": 688,
|
||||
"stargazers_count": 687,
|
||||
"watchers_count": 687,
|
||||
"forks_count": 193,
|
||||
"forks": 193,
|
||||
"watchers": 688,
|
||||
"watchers": 687,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -520,7 +520,6 @@ An issue was discovered in through SaltStack Salt before 3002.5. salt-api does n
|
|||
</code>
|
||||
|
||||
- [Immersive-Labs-Sec/CVE-2021-25281](https://github.com/Immersive-Labs-Sec/CVE-2021-25281)
|
||||
- [SkyBulk/CVE-2021-25281](https://github.com/SkyBulk/CVE-2021-25281)
|
||||
|
||||
### CVE-2021-25374 (2021-04-09)
|
||||
|
||||
|
@ -543,9 +542,6 @@ Apache Druid includes the ability to execute user-provided JavaScript code embed
|
|||
- [Yang0615777/PocList](https://github.com/Yang0615777/PocList)
|
||||
- [givemefivw/CVE-2021-25646](https://github.com/givemefivw/CVE-2021-25646)
|
||||
|
||||
### CVE-2021-25679
|
||||
- [3ndG4me/AdTran-Personal-Phone-Manager-Vulns](https://github.com/3ndG4me/AdTran-Personal-Phone-Manager-Vulns)
|
||||
|
||||
### CVE-2021-26119 (2021-02-21)
|
||||
|
||||
<code>
|
||||
|
@ -815,7 +811,6 @@ Mahara 20.10 is affected by Cross Site Request Forgery (CSRF) that allows a remo
|
|||
</code>
|
||||
|
||||
- [0xBaz/CVE-2021-29349](https://github.com/0xBaz/CVE-2021-29349)
|
||||
- [Vulnmachines/CVE-2021-29349](https://github.com/Vulnmachines/CVE-2021-29349)
|
||||
|
||||
### CVE-2021-29386
|
||||
- [Umarovm/PowerSchool-Grade-Stealer](https://github.com/Umarovm/PowerSchool-Grade-Stealer)
|
||||
|
@ -9550,7 +9545,6 @@ In WordPress through 4.9.2, unauthenticated attackers can cause a denial of serv
|
|||
- [fakedob/tvsz](https://github.com/fakedob/tvsz)
|
||||
- [vineetkia/Wordpress-DOS-Attack-CVE-2018-6389](https://github.com/vineetkia/Wordpress-DOS-Attack-CVE-2018-6389)
|
||||
- [ianxtianxt/CVE-2018-6389](https://github.com/ianxtianxt/CVE-2018-6389)
|
||||
- [Elsfa7-110/CVE-2018-6389](https://github.com/Elsfa7-110/CVE-2018-6389)
|
||||
|
||||
### CVE-2018-6396 (2018-02-17)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue