mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/05/08 00:12:40
This commit is contained in:
parent
7fedf48edf
commit
9c26bd9353
26 changed files with 130 additions and 130 deletions
|
@ -312,13 +312,13 @@
|
|||
"description": "Test for SSL heartbeat vulnerability (CVE-2014-0160)",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-09T15:59:14Z",
|
||||
"updated_at": "2021-05-07T00:03:43Z",
|
||||
"updated_at": "2021-05-07T12:29:19Z",
|
||||
"pushed_at": "2014-07-10T21:17:22Z",
|
||||
"stargazers_count": 131,
|
||||
"watchers_count": 131,
|
||||
"stargazers_count": 132,
|
||||
"watchers_count": 132,
|
||||
"forks_count": 77,
|
||||
"forks": 77,
|
||||
"watchers": 131,
|
||||
"watchers": 132,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -229,29 +229,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 30059704,
|
||||
"name": "ghosttester",
|
||||
"full_name": "JustDenisYT\/ghosttester",
|
||||
"owner": {
|
||||
"login": "JustDenisYT",
|
||||
"id": 9379272,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9379272?v=4",
|
||||
"html_url": "https:\/\/github.com\/JustDenisYT"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JustDenisYT\/ghosttester",
|
||||
"description": "Script to test vulnarability for CVE-2015-0235",
|
||||
"fork": false,
|
||||
"created_at": "2015-01-30T06:37:06Z",
|
||||
"updated_at": "2015-02-04T08:03:37Z",
|
||||
"pushed_at": "2015-02-04T08:03:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 30066365,
|
||||
"name": "CVE-2015-0235",
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)",
|
||||
"fork": false,
|
||||
"created_at": "2016-02-09T21:30:34Z",
|
||||
"updated_at": "2021-03-10T15:40:43Z",
|
||||
"updated_at": "2021-05-07T14:35:46Z",
|
||||
"pushed_at": "2016-05-09T17:53:48Z",
|
||||
"stargazers_count": 326,
|
||||
"watchers_count": 326,
|
||||
"stargazers_count": 325,
|
||||
"watchers_count": 325,
|
||||
"forks_count": 154,
|
||||
"forks": 154,
|
||||
"watchers": 326,
|
||||
"watchers": 325,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-17T08:10:07Z",
|
||||
"updated_at": "2021-05-04T22:18:58Z",
|
||||
"updated_at": "2021-05-07T10:12:29Z",
|
||||
"pushed_at": "2017-11-19T11:01:16Z",
|
||||
"stargazers_count": 650,
|
||||
"watchers_count": 650,
|
||||
"stargazers_count": 651,
|
||||
"watchers_count": 651,
|
||||
"forks_count": 288,
|
||||
"forks": 288,
|
||||
"watchers": 650,
|
||||
"watchers": 651,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -358,13 +358,13 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2021-04-29T07:14:58Z",
|
||||
"updated_at": "2021-05-07T11:34:01Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 272,
|
||||
"watchers_count": 272,
|
||||
"stargazers_count": 271,
|
||||
"watchers_count": 271,
|
||||
"forks_count": 98,
|
||||
"forks": 98,
|
||||
"watchers": 272,
|
||||
"watchers": 271,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1581,8 +1581,8 @@
|
|||
"pushed_at": "2020-06-14T18:43:51Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Jenkins RCE Proof-of-Concept: SECURITY-1266 \/ CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-15T05:59:24Z",
|
||||
"updated_at": "2021-04-26T08:18:02Z",
|
||||
"updated_at": "2021-05-07T14:37:21Z",
|
||||
"pushed_at": "2019-04-01T13:19:49Z",
|
||||
"stargazers_count": 274,
|
||||
"watchers_count": 274,
|
||||
"stargazers_count": 275,
|
||||
"watchers_count": 275,
|
||||
"forks_count": 84,
|
||||
"forks": 84,
|
||||
"watchers": 274,
|
||||
"watchers": 275,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2553,
|
||||
"watchers_count": 2553,
|
||||
"forks_count": 744,
|
||||
"forks": 744,
|
||||
"forks_count": 745,
|
||||
"forks": 745,
|
||||
"watchers": 2553,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2021-04-29T07:14:58Z",
|
||||
"updated_at": "2021-05-07T11:34:01Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 272,
|
||||
"watchers_count": 272,
|
||||
"stargazers_count": 271,
|
||||
"watchers_count": 271,
|
||||
"forks_count": 98,
|
||||
"forks": 98,
|
||||
"watchers": 272,
|
||||
"watchers": 271,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -312,13 +312,13 @@
|
|||
"description": "Weblogic CVE-2019-2725 CVE-2019-2729 Getshell 命令执行 ",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-24T08:33:07Z",
|
||||
"updated_at": "2021-01-26T23:21:20Z",
|
||||
"updated_at": "2021-05-07T09:56:44Z",
|
||||
"pushed_at": "2019-07-15T06:03:15Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 60,
|
||||
"watchers": 61,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exploit for CVE-2019-9810 Firefox on Windows 64-bit.",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-05T17:19:02Z",
|
||||
"updated_at": "2021-04-08T08:04:36Z",
|
||||
"updated_at": "2021-05-07T09:13:47Z",
|
||||
"pushed_at": "2019-12-28T18:25:10Z",
|
||||
"stargazers_count": 201,
|
||||
"watchers_count": 201,
|
||||
"stargazers_count": 202,
|
||||
"watchers_count": 202,
|
||||
"forks_count": 56,
|
||||
"forks": 56,
|
||||
"watchers": 201,
|
||||
"watchers": 202,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -864,13 +864,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2021-04-30T20:33:17Z",
|
||||
"updated_at": "2021-05-07T14:33:28Z",
|
||||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1114,
|
||||
"watchers_count": 1114,
|
||||
"stargazers_count": 1115,
|
||||
"watchers_count": 1115,
|
||||
"forks_count": 356,
|
||||
"forks": 356,
|
||||
"watchers": 1114,
|
||||
"watchers": 1115,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2021-05-06T20:53:38Z",
|
||||
"updated_at": "2021-05-07T13:22:42Z",
|
||||
"pushed_at": "2020-10-21T12:10:28Z",
|
||||
"stargazers_count": 1276,
|
||||
"watchers_count": 1276,
|
||||
"stargazers_count": 1275,
|
||||
"watchers_count": 1275,
|
||||
"forks_count": 293,
|
||||
"forks": 293,
|
||||
"watchers": 1276,
|
||||
"watchers": 1275,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2553,
|
||||
"watchers_count": 2553,
|
||||
"forks_count": 744,
|
||||
"forks": 744,
|
||||
"forks_count": 745,
|
||||
"forks": 745,
|
||||
"watchers": 2553,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-01-24T09:05:40Z",
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 68,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Demo exploit code for CVE-2020-27904, a tfp0 bug.",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-31T09:11:29Z",
|
||||
"updated_at": "2021-05-07T08:37:06Z",
|
||||
"updated_at": "2021-05-07T14:49:09Z",
|
||||
"pushed_at": "2021-04-29T07:14:33Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 9,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-5902",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-04T14:12:57Z",
|
||||
"updated_at": "2021-03-16T07:08:42Z",
|
||||
"updated_at": "2021-05-07T14:23:07Z",
|
||||
"pushed_at": "2020-07-04T14:21:27Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 10,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-07-15T04:59:19Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-10T14:38:05Z",
|
||||
"updated_at": "2021-04-27T07:29:37Z",
|
||||
"updated_at": "2021-05-07T11:19:58Z",
|
||||
"pushed_at": "2021-02-10T14:39:04Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 22,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "🐱💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-22T11:53:57Z",
|
||||
"updated_at": "2021-05-05T17:33:33Z",
|
||||
"updated_at": "2021-05-07T10:39:44Z",
|
||||
"pushed_at": "2021-03-22T18:24:20Z",
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 111,
|
||||
"watchers": 112,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE 2021-21315 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-01T18:52:41Z",
|
||||
"updated_at": "2021-05-05T22:00:07Z",
|
||||
"updated_at": "2021-05-07T15:02:07Z",
|
||||
"pushed_at": "2021-05-05T22:00:05Z",
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 118,
|
||||
"watchers": 119,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-05-04T15:32:18Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 26,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -21,5 +21,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 365180712,
|
||||
"name": "CVE-2021-30461",
|
||||
"full_name": "Vulnmachines\/CVE-2021-30461",
|
||||
"owner": {
|
||||
"login": "Vulnmachines",
|
||||
"id": 79006904,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
|
||||
"html_url": "https:\/\/github.com\/Vulnmachines"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Vulnmachines\/CVE-2021-30461",
|
||||
"description": "VOIP RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-07T09:22:01Z",
|
||||
"updated_at": "2021-05-07T13:24:21Z",
|
||||
"pushed_at": "2021-05-07T09:23:38Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2021-01-27T15:19:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -137,29 +137,6 @@
|
|||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 333619288,
|
||||
"name": "CVE-2021-3156-Baron-Samedit",
|
||||
"full_name": "kernelzeroday\/CVE-2021-3156-Baron-Samedit",
|
||||
"owner": {
|
||||
"login": "kernelzeroday",
|
||||
"id": 11334159,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11334159?v=4",
|
||||
"html_url": "https:\/\/github.com\/kernelzeroday"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kernelzeroday\/CVE-2021-3156-Baron-Samedit",
|
||||
"description": "1day research effort",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-28T02:13:49Z",
|
||||
"updated_at": "2021-03-14T07:05:52Z",
|
||||
"pushed_at": "2021-01-29T03:21:13Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 333620703,
|
||||
"name": "cve-2021-3156",
|
||||
|
@ -335,13 +312,13 @@
|
|||
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T03:22:04Z",
|
||||
"updated_at": "2021-05-05T23:01:49Z",
|
||||
"updated_at": "2021-05-07T14:23:08Z",
|
||||
"pushed_at": "2021-02-08T03:42:50Z",
|
||||
"stargazers_count": 388,
|
||||
"watchers_count": 388,
|
||||
"stargazers_count": 387,
|
||||
"watchers_count": 387,
|
||||
"forks_count": 108,
|
||||
"forks": 108,
|
||||
"watchers": 388,
|
||||
"watchers": 387,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution.",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-04T17:15:58Z",
|
||||
"updated_at": "2021-05-07T08:50:02Z",
|
||||
"updated_at": "2021-05-07T14:54:50Z",
|
||||
"pushed_at": "2021-05-06T15:53:18Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -90,5 +90,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 365269420,
|
||||
"name": "CVE-2021-3493",
|
||||
"full_name": "Ishan3011\/CVE-2021-3493",
|
||||
"owner": {
|
||||
"login": "Ishan3011",
|
||||
"id": 68255653,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68255653?v=4",
|
||||
"html_url": "https:\/\/github.com\/Ishan3011"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Ishan3011\/CVE-2021-3493",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-05-07T15:01:25Z",
|
||||
"updated_at": "2021-05-07T15:16:25Z",
|
||||
"pushed_at": "2021-05-07T15:16:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -143,7 +143,6 @@ Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based
|
|||
- [jokerTPR2004/CVE-2021-3156](https://github.com/jokerTPR2004/CVE-2021-3156)
|
||||
- [ymrsmns/CVE-2021-3156](https://github.com/ymrsmns/CVE-2021-3156)
|
||||
- [elbee-cyber/CVE-2021-3156-PATCHER](https://github.com/elbee-cyber/CVE-2021-3156-PATCHER)
|
||||
- [kernelzeroday/CVE-2021-3156-Baron-Samedit](https://github.com/kernelzeroday/CVE-2021-3156-Baron-Samedit)
|
||||
- [yaunsky/cve-2021-3156](https://github.com/yaunsky/cve-2021-3156)
|
||||
- [H4ckForJob/cve-2021-3156](https://github.com/H4ckForJob/cve-2021-3156)
|
||||
- [baka9moe/CVE-2021-3156-Exp](https://github.com/baka9moe/CVE-2021-3156-Exp)
|
||||
|
@ -277,6 +276,7 @@ The overlayfs implementation in the linux kernel did not properly validate with
|
|||
- [oneoy/CVE-2021-3493](https://github.com/oneoy/CVE-2021-3493)
|
||||
- [Abdennour-py/CVE-2021-3493](https://github.com/Abdennour-py/CVE-2021-3493)
|
||||
- [AmIAHuman/OverlayFS-CVE-2021-3493](https://github.com/AmIAHuman/OverlayFS-CVE-2021-3493)
|
||||
- [Ishan3011/CVE-2021-3493](https://github.com/Ishan3011/CVE-2021-3493)
|
||||
|
||||
### CVE-2021-6857
|
||||
- [ZiHeny/CVE-2021-6857](https://github.com/ZiHeny/CVE-2021-6857)
|
||||
|
@ -957,6 +957,7 @@ Composr 10.0.36 allows XSS in an XML script.
|
|||
|
||||
### CVE-2021-30461
|
||||
- [daedalus/CVE-2021-30461](https://github.com/daedalus/CVE-2021-30461)
|
||||
- [Vulnmachines/CVE-2021-30461](https://github.com/Vulnmachines/CVE-2021-30461)
|
||||
|
||||
### CVE-2021-30481 (2021-04-10)
|
||||
|
||||
|
@ -15575,7 +15576,6 @@ Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2
|
|||
- [nickanderson/cfengine-CVE_2015_0235](https://github.com/nickanderson/cfengine-CVE_2015_0235)
|
||||
- [koudaiii-archives/cookbook-update-glibc](https://github.com/koudaiii-archives/cookbook-update-glibc)
|
||||
- [F88/ghostbusters15](https://github.com/F88/ghostbusters15)
|
||||
- [JustDenisYT/ghosttester](https://github.com/JustDenisYT/ghosttester)
|
||||
- [tobyzxj/CVE-2015-0235](https://github.com/tobyzxj/CVE-2015-0235)
|
||||
- [makelinux/CVE-2015-0235-workaround](https://github.com/makelinux/CVE-2015-0235-workaround)
|
||||
- [arm13/ghost_exploit](https://github.com/arm13/ghost_exploit)
|
||||
|
|
Loading…
Reference in a new issue