mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-26 09:34:11 +01:00
Auto Update 2021/02/15 00:09:43
This commit is contained in:
parent
94ad93ec3e
commit
c30cadf9c7
30 changed files with 177 additions and 101 deletions
2006
2014
2016
2018
2019
2020
CVE-2020-0796.jsonCVE-2020-12928.jsonCVE-2020-14882.jsonCVE-2020-24032.jsonCVE-2020-25747.jsonCVE-2020-25748.jsonCVE-2020-25749.jsonCVE-2020-27747.jsonCVE-2020-28414.jsonCVE-2020-28415.jsonCVE-2020-2883.jsonCVE-2020-29666.jsonCVE-2020-29667.jsonCVE-2020-3187.jsonCVE-2020-3452.json
2021
CVE-2021-21014.jsonCVE-2021-26700.jsonCVE-2021-27187.jsonCVE-2021-27188.jsonCVE-2021-3129.jsonCVE-2021-3130.jsonCVE-2021-3131.jsonCVE-2021-3156.jsonCVE-2021-3395.json
README.md
|
@ -2,14 +2,14 @@
|
|||
{
|
||||
"id": 74795309,
|
||||
"name": "CVE-2006-3747",
|
||||
"full_name": "spinfoo\/CVE-2006-3747",
|
||||
"full_name": "defensahacker\/CVE-2006-3747",
|
||||
"owner": {
|
||||
"login": "spinfoo",
|
||||
"login": "defensahacker",
|
||||
"id": 23421429,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23421429?v=4",
|
||||
"html_url": "https:\/\/github.com\/spinfoo"
|
||||
"html_url": "https:\/\/github.com\/defensahacker"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/spinfoo\/CVE-2006-3747",
|
||||
"html_url": "https:\/\/github.com\/defensahacker\/CVE-2006-3747",
|
||||
"description": "Information about my advisory on CVE-2006-3747 (Apache mod_rewrite LDAP off-by-one buffer overflow).. At the time, it was the first public working exploit :)",
|
||||
"fork": false,
|
||||
"created_at": "2016-11-26T00:20:33Z",
|
||||
|
|
|
@ -1217,5 +1217,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 338782923,
|
||||
"name": "heartpatch.us",
|
||||
"full_name": "ingochris\/heartpatch.us",
|
||||
"owner": {
|
||||
"login": "ingochris",
|
||||
"id": 2686679,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2686679?v=4",
|
||||
"html_url": "https:\/\/github.com\/ingochris"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ingochris\/heartpatch.us",
|
||||
"description": "OpenSSL Heartbleed Bug CVE-2014-0160 Toolkit. Built with ❤ by Christopher Ngo.",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-14T10:48:56Z",
|
||||
"updated_at": "2021-02-14T13:34:20Z",
|
||||
"pushed_at": "2021-02-14T13:34:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": "PoC for CVE-2016-1000027",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-01T19:46:51Z",
|
||||
"updated_at": "2021-02-13T09:17:36Z",
|
||||
"pushed_at": "2021-02-01T22:30:53Z",
|
||||
"updated_at": "2021-02-14T11:29:55Z",
|
||||
"pushed_at": "2021-02-14T11:29:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Noodle [Moodle RCE] (v3.4.1) - CVE-2018-1133",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-15T14:25:20Z",
|
||||
"updated_at": "2021-01-24T08:02:06Z",
|
||||
"updated_at": "2021-02-14T12:38:09Z",
|
||||
"pushed_at": "2019-03-15T14:48:18Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2334,
|
||||
"watchers_count": 2334,
|
||||
"forks_count": 656,
|
||||
"forks": 656,
|
||||
"forks_count": 657,
|
||||
"forks": 657,
|
||||
"watchers": 2334,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -887,13 +887,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2021-02-14T08:15:34Z",
|
||||
"updated_at": "2021-02-14T14:24:31Z",
|
||||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1072,
|
||||
"watchers_count": 1072,
|
||||
"stargazers_count": 1073,
|
||||
"watchers_count": 1073,
|
||||
"forks_count": 358,
|
||||
"forks": 358,
|
||||
"watchers": 1072,
|
||||
"watchers": 1073,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Early 2019 - late 2020. R.I.P. CVE-2020-12928 https:\/\/h0mbre.github.io\/RyzenMaster_CVE\/#",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-10T13:08:21Z",
|
||||
"updated_at": "2021-02-02T13:49:01Z",
|
||||
"pushed_at": "2020-11-11T20:13:05Z",
|
||||
"updated_at": "2021-02-14T15:08:06Z",
|
||||
"pushed_at": "2021-02-14T15:08:01Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 12,
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2334,
|
||||
"watchers_count": 2334,
|
||||
"forks_count": 656,
|
||||
"forks": 656,
|
||||
"forks_count": 657,
|
||||
"forks": 657,
|
||||
"watchers": 2334,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-21T08:07:09Z",
|
||||
"updated_at": "2021-01-21T08:08:29Z",
|
||||
"updated_at": "2021-02-14T09:24:10Z",
|
||||
"pushed_at": "2021-01-21T08:08:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-25747",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-18T14:23:35Z",
|
||||
"updated_at": "2020-09-18T15:02:53Z",
|
||||
"updated_at": "2021-02-14T09:24:26Z",
|
||||
"pushed_at": "2020-09-18T15:02:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-25748",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-18T15:03:38Z",
|
||||
"updated_at": "2020-09-18T15:04:20Z",
|
||||
"updated_at": "2021-02-14T09:24:25Z",
|
||||
"pushed_at": "2020-09-18T15:04:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-25749",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-18T15:05:16Z",
|
||||
"updated_at": "2020-09-18T15:06:02Z",
|
||||
"updated_at": "2021-02-14T09:24:24Z",
|
||||
"pushed_at": "2020-09-18T15:06:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Possible Account Takeover | Brute Force Ability",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-29T09:06:24Z",
|
||||
"updated_at": "2020-10-29T09:23:49Z",
|
||||
"updated_at": "2021-02-14T09:24:22Z",
|
||||
"pushed_at": "2020-10-29T09:23:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-11-12T13:31:50Z",
|
||||
"updated_at": "2020-11-12T13:32:04Z",
|
||||
"updated_at": "2021-02-14T09:24:18Z",
|
||||
"pushed_at": "2020-11-12T13:32:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-11-12T13:32:23Z",
|
||||
"updated_at": "2020-11-12T13:32:34Z",
|
||||
"updated_at": "2021-02-14T09:24:17Z",
|
||||
"pushed_at": "2020-11-12T13:32:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -128,13 +128,13 @@
|
|||
"description": "CVE-2020-2883",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-26T14:10:25Z",
|
||||
"updated_at": "2020-11-27T02:12:54Z",
|
||||
"updated_at": "2021-02-14T12:53:40Z",
|
||||
"pushed_at": "2020-11-27T02:12:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-12-10T06:24:48Z",
|
||||
"updated_at": "2020-12-10T06:39:56Z",
|
||||
"updated_at": "2021-02-14T09:24:16Z",
|
||||
"pushed_at": "2020-12-10T06:39:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-12-10T06:43:58Z",
|
||||
"updated_at": "2020-12-10T07:04:44Z",
|
||||
"updated_at": "2021-02-14T09:24:13Z",
|
||||
"pushed_at": "2020-12-10T07:04:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-09-10T06:34:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2020-3452 Cisco ASA Scanner -unauth Path Traversal Check",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-24T15:04:45Z",
|
||||
"updated_at": "2021-02-07T00:10:48Z",
|
||||
"updated_at": "2021-02-14T14:19:55Z",
|
||||
"pushed_at": "2020-08-30T21:34:41Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-02-13T06:30:25Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
|
|
25
2021/CVE-2021-26700.json
Normal file
25
2021/CVE-2021-26700.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 338818030,
|
||||
"name": "CVE-2021-26700",
|
||||
"full_name": "jackadamson\/CVE-2021-26700",
|
||||
"owner": {
|
||||
"login": "jackadamson",
|
||||
"id": 7891953,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7891953?v=4",
|
||||
"html_url": "https:\/\/github.com\/jackadamson"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jackadamson\/CVE-2021-26700",
|
||||
"description": "RCE in NPM VSCode Extention",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-14T14:01:04Z",
|
||||
"updated_at": "2021-02-14T14:01:43Z",
|
||||
"pushed_at": "2021-02-14T14:01:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-11T15:03:48Z",
|
||||
"updated_at": "2021-02-11T15:08:26Z",
|
||||
"updated_at": "2021-02-14T09:24:04Z",
|
||||
"pushed_at": "2021-02-11T15:08:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-12T07:32:51Z",
|
||||
"updated_at": "2021-02-12T07:36:37Z",
|
||||
"updated_at": "2021-02-14T09:24:02Z",
|
||||
"pushed_at": "2021-02-12T07:36:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -113,5 +113,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 338768882,
|
||||
"name": "Laravel-8.4.2-rce-CVE-2021-3129",
|
||||
"full_name": "FunPhishing\/Laravel-8.4.2-rce-CVE-2021-3129",
|
||||
"owner": {
|
||||
"login": "FunPhishing",
|
||||
"id": 77312720,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77312720?v=4",
|
||||
"html_url": "https:\/\/github.com\/FunPhishing"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/FunPhishing\/Laravel-8.4.2-rce-CVE-2021-3129",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-14T09:24:07Z",
|
||||
"updated_at": "2021-02-14T12:27:56Z",
|
||||
"pushed_at": "2021-02-14T12:27:54Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-21T08:04:32Z",
|
||||
"updated_at": "2021-01-21T12:31:36Z",
|
||||
"updated_at": "2021-02-14T09:24:07Z",
|
||||
"pushed_at": "2021-01-21T12:31:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2021-3131",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-13T07:41:25Z",
|
||||
"updated_at": "2021-01-13T07:54:41Z",
|
||||
"updated_at": "2021-02-14T09:24:11Z",
|
||||
"pushed_at": "2021-01-13T07:54:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -335,13 +335,13 @@
|
|||
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T03:22:04Z",
|
||||
"updated_at": "2021-02-14T07:40:20Z",
|
||||
"updated_at": "2021-02-14T14:48:57Z",
|
||||
"pushed_at": "2021-02-08T03:42:50Z",
|
||||
"stargazers_count": 327,
|
||||
"watchers_count": 327,
|
||||
"stargazers_count": 329,
|
||||
"watchers_count": 329,
|
||||
"forks_count": 89,
|
||||
"forks": 89,
|
||||
"watchers": 327,
|
||||
"watchers": 329,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -381,13 +381,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2021-02-14T06:11:37Z",
|
||||
"updated_at": "2021-02-14T12:59:04Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 572,
|
||||
"watchers_count": 572,
|
||||
"stargazers_count": 574,
|
||||
"watchers_count": 574,
|
||||
"forks_count": 162,
|
||||
"forks": 162,
|
||||
"watchers": 572,
|
||||
"watchers": 574,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -795,13 +795,13 @@
|
|||
"description": "CVE-2021-3156非交互式执行命令",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-09T19:25:18Z",
|
||||
"updated_at": "2021-02-14T02:43:41Z",
|
||||
"updated_at": "2021-02-14T14:02:26Z",
|
||||
"pushed_at": "2021-02-09T19:31:33Z",
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 89,
|
||||
"watchers": 91,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-02T18:31:35Z",
|
||||
"updated_at": "2021-02-02T18:38:02Z",
|
||||
"updated_at": "2021-02-14T09:24:05Z",
|
||||
"pushed_at": "2021-02-02T18:38:00Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -58,6 +58,7 @@ Ignition before 2.5.2, as used in Laravel and other products, allows unauthentic
|
|||
- [SecPros-Team/laravel-CVE-2021-3129-EXP](https://github.com/SecPros-Team/laravel-CVE-2021-3129-EXP)
|
||||
- [crisprss/Laravel_CVE-2021-3129_EXP](https://github.com/crisprss/Laravel_CVE-2021-3129_EXP)
|
||||
- [nth347/CVE-2021-3129-exploit](https://github.com/nth347/CVE-2021-3129-exploit)
|
||||
- [FunPhishing/Laravel-8.4.2-rce-CVE-2021-3129](https://github.com/FunPhishing/Laravel-8.4.2-rce-CVE-2021-3129)
|
||||
|
||||
### CVE-2021-3130 (2021-01-20)
|
||||
|
||||
|
@ -194,6 +195,9 @@ Apache Druid includes the ability to execute user-provided JavaScript code embed
|
|||
### CVE-2021-26121
|
||||
- [sourceincite/CVE-2021-26121](https://github.com/sourceincite/CVE-2021-26121)
|
||||
|
||||
### CVE-2021-26700
|
||||
- [jackadamson/CVE-2021-26700](https://github.com/jackadamson/CVE-2021-26700)
|
||||
|
||||
### CVE-2021-27187 (2021-02-12)
|
||||
|
||||
<code>
|
||||
|
@ -14963,6 +14967,7 @@ The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not p
|
|||
- [WildfootW/CVE-2014-0160_OpenSSL_1.0.1f_Heartbleed](https://github.com/WildfootW/CVE-2014-0160_OpenSSL_1.0.1f_Heartbleed)
|
||||
- [GuillermoEscobero/heartbleed](https://github.com/GuillermoEscobero/heartbleed)
|
||||
- [nyc-tophile/A2SV--SSL-VUL-Scan](https://github.com/nyc-tophile/A2SV--SSL-VUL-Scan)
|
||||
- [ingochris/heartpatch.us](https://github.com/ingochris/heartpatch.us)
|
||||
|
||||
### CVE-2014-0166 (2014-04-09)
|
||||
|
||||
|
@ -16972,7 +16977,7 @@ Unspecified vulnerability in the command line interface (CLI) in Cisco Unified C
|
|||
Off-by-one error in the ldap scheme handling in the Rewrite module (mod_rewrite) in Apache 1.3 from 1.3.28, 2.0.46 and other versions before 2.0.59, and 2.2, when RewriteEngine is enabled, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted URLs that are not properly handled using certain rewrite rules.
|
||||
</code>
|
||||
|
||||
- [spinfoo/CVE-2006-3747](https://github.com/spinfoo/CVE-2006-3747)
|
||||
- [defensahacker/CVE-2006-3747](https://github.com/defensahacker/CVE-2006-3747)
|
||||
|
||||
### CVE-2006-4777 (2006-09-13)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue