mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-27 18:14:12 +01:00
Auto Update 2021/04/26 00:10:56
This commit is contained in:
parent
647a334bca
commit
cda36e1083
24 changed files with 192 additions and 111 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
|
||||
"fork": false,
|
||||
"created_at": "2013-09-22T21:20:31Z",
|
||||
"updated_at": "2021-04-18T10:49:11Z",
|
||||
"updated_at": "2021-04-25T13:06:08Z",
|
||||
"pushed_at": "2017-04-24T14:16:56Z",
|
||||
"stargazers_count": 300,
|
||||
"watchers_count": 300,
|
||||
"forks_count": 93,
|
||||
"forks": 93,
|
||||
"watchers": 300,
|
||||
"stargazers_count": 301,
|
||||
"watchers_count": 301,
|
||||
"forks_count": 92,
|
||||
"forks": 92,
|
||||
"watchers": 301,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -385,8 +385,8 @@
|
|||
"pushed_at": "2014-05-09T15:51:53Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -174,13 +174,13 @@
|
|||
"description": "Exploiting CVE-2014-3153, AKA Towelroot.",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-31T11:39:11Z",
|
||||
"updated_at": "2021-03-01T16:50:24Z",
|
||||
"updated_at": "2021-04-25T12:20:10Z",
|
||||
"pushed_at": "2021-01-16T17:37:12Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -128,13 +128,13 @@
|
|||
"description": "an impacket-dependent script exploiting CVE-2019-1040",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-01T05:59:06Z",
|
||||
"updated_at": "2021-04-25T03:35:25Z",
|
||||
"updated_at": "2021-04-25T14:42:09Z",
|
||||
"pushed_at": "2021-01-01T06:10:58Z",
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 58,
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 60,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "weaponized radare2 vulnerability found by @CaptnBanana and blenk92",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-04T22:31:27Z",
|
||||
"updated_at": "2021-04-24T07:30:01Z",
|
||||
"updated_at": "2021-04-25T11:26:32Z",
|
||||
"pushed_at": "2019-11-04T22:46:52Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-04-24T11:00:00Z",
|
||||
"updated_at": "2021-04-25T11:24:44Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2530,
|
||||
"watchers_count": 2530,
|
||||
"stargazers_count": 2529,
|
||||
"watchers_count": 2529,
|
||||
"forks_count": 733,
|
||||
"forks": 733,
|
||||
"watchers": 2530,
|
||||
"watchers": 2529,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -114,29 +114,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 276656035,
|
||||
"name": "CVE-2019-18935",
|
||||
"full_name": "Un4gi\/CVE-2019-18935",
|
||||
"owner": {
|
||||
"login": "Un4gi",
|
||||
"id": 47873286,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47873286?v=4",
|
||||
"html_url": "https:\/\/github.com\/Un4gi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Un4gi\/CVE-2019-18935",
|
||||
"description": "Files for 2019-18935",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-02T13:38:56Z",
|
||||
"updated_at": "2021-04-25T09:12:27Z",
|
||||
"pushed_at": "2021-04-25T09:12:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 288791272,
|
||||
"name": "CVE-2019-18935",
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-05-09T21:34:26Z",
|
||||
"stargazers_count": 555,
|
||||
"watchers_count": 555,
|
||||
"forks_count": 128,
|
||||
"forks": 128,
|
||||
"forks_count": 129,
|
||||
"forks": 129,
|
||||
"watchers": 555,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -887,13 +887,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2021-04-21T23:53:02Z",
|
||||
"updated_at": "2021-04-25T09:59:02Z",
|
||||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1110,
|
||||
"watchers_count": 1110,
|
||||
"stargazers_count": 1111,
|
||||
"watchers_count": 1111,
|
||||
"forks_count": 356,
|
||||
"forks": 356,
|
||||
"watchers": 1110,
|
||||
"watchers": 1111,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-03T14:45:51Z",
|
||||
"updated_at": "2021-03-19T02:06:23Z",
|
||||
"updated_at": "2021-04-25T12:49:30Z",
|
||||
"pushed_at": "2020-09-08T20:01:05Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 27,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-04-24T11:00:00Z",
|
||||
"updated_at": "2021-04-25T11:24:44Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2530,
|
||||
"watchers_count": 2530,
|
||||
"stargazers_count": 2529,
|
||||
"watchers_count": 2529,
|
||||
"forks_count": 733,
|
||||
"forks": 733,
|
||||
"watchers": 2530,
|
||||
"watchers": 2529,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-04-25T05:00:15Z",
|
||||
"updated_at": "2021-04-25T14:25:40Z",
|
||||
"pushed_at": "2021-04-24T08:27:02Z",
|
||||
"stargazers_count": 648,
|
||||
"watchers_count": 648,
|
||||
"forks_count": 170,
|
||||
"forks": 170,
|
||||
"watchers": 648,
|
||||
"stargazers_count": 655,
|
||||
"watchers_count": 655,
|
||||
"forks_count": 176,
|
||||
"forks": 176,
|
||||
"watchers": 655,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -21,5 +21,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 361457294,
|
||||
"name": "CVE-2020-3161",
|
||||
"full_name": "uromulouinthehouse\/CVE-2020-3161",
|
||||
"owner": {
|
||||
"login": "uromulouinthehouse",
|
||||
"id": 83171871,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83171871?v=4",
|
||||
"html_url": "https:\/\/github.com\/uromulouinthehouse"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/uromulouinthehouse\/CVE-2020-3161",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-04-25T14:54:33Z",
|
||||
"updated_at": "2021-04-25T14:55:34Z",
|
||||
"pushed_at": "2021-04-25T14:55:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -105,13 +105,36 @@
|
|||
"description": "CVE-2021-1732 poc & exp; tested on 20H2",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-23T08:21:54Z",
|
||||
"updated_at": "2021-04-25T07:34:42Z",
|
||||
"updated_at": "2021-04-25T10:00:41Z",
|
||||
"pushed_at": "2021-04-23T08:28:53Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 30,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 361428612,
|
||||
"name": "Windows-Privilege-Escalation-CVE-2021-1732",
|
||||
"full_name": "exploitblizzard\/Windows-Privilege-Escalation-CVE-2021-1732",
|
||||
"owner": {
|
||||
"login": "exploitblizzard",
|
||||
"id": 61627070,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61627070?v=4",
|
||||
"html_url": "https:\/\/github.com\/exploitblizzard"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/exploitblizzard\/Windows-Privilege-Escalation-CVE-2021-1732",
|
||||
"description": "Read my blog for more info - ",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-25T12:55:15Z",
|
||||
"updated_at": "2021-04-25T15:12:48Z",
|
||||
"pushed_at": "2021-04-25T14:16:30Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": "CVE-2021-22192 靶场: 未授权用户 RCE 漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-27T07:09:46Z",
|
||||
"updated_at": "2021-04-25T02:10:52Z",
|
||||
"pushed_at": "2021-04-22T09:27:05Z",
|
||||
"updated_at": "2021-04-25T11:08:16Z",
|
||||
"pushed_at": "2021-04-25T11:08:14Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 3,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-07T11:10:40Z",
|
||||
"updated_at": "2021-04-21T13:10:47Z",
|
||||
"updated_at": "2021-04-25T13:23:32Z",
|
||||
"pushed_at": "2021-04-15T12:46:54Z",
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"stargazers_count": 156,
|
||||
"watchers_count": 156,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 155,
|
||||
"watchers": 156,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-04-25T05:00:15Z",
|
||||
"updated_at": "2021-04-25T14:25:40Z",
|
||||
"pushed_at": "2021-04-24T08:27:02Z",
|
||||
"stargazers_count": 648,
|
||||
"watchers_count": 648,
|
||||
"forks_count": 170,
|
||||
"forks": 170,
|
||||
"watchers": 648,
|
||||
"stargazers_count": 655,
|
||||
"watchers_count": 655,
|
||||
"forks_count": 176,
|
||||
"forks": 176,
|
||||
"watchers": 655,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-23T15:25:01Z",
|
||||
"updated_at": "2021-04-07T05:34:41Z",
|
||||
"updated_at": "2021-04-25T12:33:54Z",
|
||||
"pushed_at": "2021-04-01T10:38:18Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
|
|
|
@ -13,13 +13,36 @@
|
|||
"description": "Apache Solr SSRF(CVE-2021-27905)",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-21T09:27:21Z",
|
||||
"updated_at": "2021-04-23T21:08:16Z",
|
||||
"updated_at": "2021-04-25T13:35:10Z",
|
||||
"pushed_at": "2021-04-21T10:00:59Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 27,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 361414198,
|
||||
"name": "Solr-SSRF",
|
||||
"full_name": "W2Ning\/Solr-SSRF",
|
||||
"owner": {
|
||||
"login": "W2Ning",
|
||||
"id": 33406415,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33406415?v=4",
|
||||
"html_url": "https:\/\/github.com\/W2Ning"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/W2Ning\/Solr-SSRF",
|
||||
"description": "CVE-2021-27905",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-25T11:50:19Z",
|
||||
"updated_at": "2021-04-25T11:50:50Z",
|
||||
"pushed_at": "2021-04-25T11:50:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-25T08:42:28Z",
|
||||
"updated_at": "2021-04-11T09:16:02Z",
|
||||
"updated_at": "2021-04-25T14:13:29Z",
|
||||
"pushed_at": "2021-01-25T08:49:59Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -381,13 +381,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2021-04-25T04:53:24Z",
|
||||
"updated_at": "2021-04-25T14:17:16Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 694,
|
||||
"watchers_count": 694,
|
||||
"forks_count": 198,
|
||||
"forks": 198,
|
||||
"watchers": 694,
|
||||
"stargazers_count": 696,
|
||||
"watchers_count": 696,
|
||||
"forks_count": 199,
|
||||
"forks": 199,
|
||||
"watchers": 696,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -887,13 +887,13 @@
|
|||
"description": "Sudo Baron Samedit Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-15T17:37:02Z",
|
||||
"updated_at": "2021-04-24T16:10:43Z",
|
||||
"updated_at": "2021-04-25T11:47:01Z",
|
||||
"pushed_at": "2021-03-30T14:44:38Z",
|
||||
"stargazers_count": 282,
|
||||
"watchers_count": 282,
|
||||
"stargazers_count": 283,
|
||||
"watchers_count": 283,
|
||||
"forks_count": 46,
|
||||
"forks": 46,
|
||||
"watchers": 282,
|
||||
"watchers": 283,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2021/CVE-2021-3291.json
Normal file
25
2021/CVE-2021-3291.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 361407419,
|
||||
"name": "CVE-2021-3291",
|
||||
"full_name": "ImHades101\/CVE-2021-3291",
|
||||
"owner": {
|
||||
"login": "ImHades101",
|
||||
"id": 52188500,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52188500?v=4",
|
||||
"html_url": "https:\/\/github.com\/ImHades101"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ImHades101\/CVE-2021-3291",
|
||||
"description": "rebuild cve",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-25T11:18:09Z",
|
||||
"updated_at": "2021-04-25T11:42:29Z",
|
||||
"pushed_at": "2021-04-25T11:42:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Ubuntu OverlayFS Local Privesc",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-19T20:07:01Z",
|
||||
"updated_at": "2021-04-25T05:26:04Z",
|
||||
"updated_at": "2021-04-25T11:04:10Z",
|
||||
"pushed_at": "2021-04-20T00:46:14Z",
|
||||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"watchers": 120,
|
||||
"stargazers_count": 121,
|
||||
"watchers_count": 121,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"watchers": 121,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
12
README.md
12
README.md
|
@ -47,6 +47,7 @@ Windows Win32k Elevation of Privilege Vulnerability This CVE ID is unique from C
|
|||
- [oneoy/CVE-2021-1732-Exploit](https://github.com/oneoy/CVE-2021-1732-Exploit)
|
||||
- [ltfafei/CVE-2021-1732_exp](https://github.com/ltfafei/CVE-2021-1732_exp)
|
||||
- [Pai-Po/CVE-2021-1732](https://github.com/Pai-Po/CVE-2021-1732)
|
||||
- [exploitblizzard/Windows-Privilege-Escalation-CVE-2021-1732](https://github.com/exploitblizzard/Windows-Privilege-Escalation-CVE-2021-1732)
|
||||
|
||||
### CVE-2021-1782 (2021-04-02)
|
||||
|
||||
|
@ -211,6 +212,14 @@ Denial of service in ASUSWRT ASUS RT-AX3000 firmware versions 3.0.0.4.384_10177
|
|||
|
||||
- [fullbbadda1208/CVE-2021-3229](https://github.com/fullbbadda1208/CVE-2021-3229)
|
||||
|
||||
### CVE-2021-3291 (2021-01-26)
|
||||
|
||||
<code>
|
||||
Zen Cart 1.5.7b allows admins to execute arbitrary OS commands by inspecting an HTML radio input element (within the modules edit page) and inserting a command.
|
||||
</code>
|
||||
|
||||
- [ImHades101/CVE-2021-3291](https://github.com/ImHades101/CVE-2021-3291)
|
||||
|
||||
### CVE-2021-3297 (2021-01-26)
|
||||
|
||||
<code>
|
||||
|
@ -809,6 +818,7 @@ The ReplicationHandler (normally registered at "/replication" under a
|
|||
</code>
|
||||
|
||||
- [Henry4E36/Solr-SSRF](https://github.com/Henry4E36/Solr-SSRF)
|
||||
- [W2Ning/Solr-SSRF](https://github.com/W2Ning/Solr-SSRF)
|
||||
|
||||
### CVE-2021-27928 (2021-03-18)
|
||||
|
||||
|
@ -1752,6 +1762,7 @@ A vulnerability in the web server for Cisco IP Phones could allow an unauthentic
|
|||
</code>
|
||||
|
||||
- [abood05972/CVE-2020-3161](https://github.com/abood05972/CVE-2020-3161)
|
||||
- [uromulouinthehouse/CVE-2020-3161](https://github.com/uromulouinthehouse/CVE-2020-3161)
|
||||
|
||||
### CVE-2020-3187 (2020-05-06)
|
||||
|
||||
|
@ -8396,7 +8407,6 @@ Progress Telerik UI for ASP.NET AJAX through 2019.3.1023 contains a .NET deseria
|
|||
- [becrevex/Telerik_CVE-2019-18935](https://github.com/becrevex/Telerik_CVE-2019-18935)
|
||||
- [ThanHuuTuan/Telerik_CVE-2019-18935](https://github.com/ThanHuuTuan/Telerik_CVE-2019-18935)
|
||||
- [ThanHuuTuan/CVE_2019_18935](https://github.com/ThanHuuTuan/CVE_2019_18935)
|
||||
- [Un4gi/CVE-2019-18935](https://github.com/Un4gi/CVE-2019-18935)
|
||||
- [murataydemir/CVE-2019-18935](https://github.com/murataydemir/CVE-2019-18935)
|
||||
- [random-robbie/CVE-2019-18935](https://github.com/random-robbie/CVE-2019-18935)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue