mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2021/06/01 18:11:51
This commit is contained in:
parent
63f9baa1e1
commit
edcb821634
33 changed files with 192 additions and 112 deletions
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2017-03-09T23:00:08Z",
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"forks_count": 54,
|
||||
"forks": 54,
|
||||
"forks_count": 55,
|
||||
"forks": 55,
|
||||
"watchers": 80,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -132,8 +132,8 @@
|
|||
"pushed_at": "2018-04-17T23:14:39Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -312,13 +312,13 @@
|
|||
"description": "An exploit for Apache Struts CVE-2017-5638",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-12T02:02:25Z",
|
||||
"updated_at": "2021-05-26T12:07:49Z",
|
||||
"updated_at": "2021-06-01T08:23:08Z",
|
||||
"pushed_at": "2018-05-21T18:33:26Z",
|
||||
"stargazers_count": 393,
|
||||
"watchers_count": 393,
|
||||
"stargazers_count": 395,
|
||||
"watchers_count": 395,
|
||||
"forks_count": 142,
|
||||
"forks": 142,
|
||||
"watchers": 393,
|
||||
"watchers": 395,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-16T00:23:34Z",
|
||||
"updated_at": "2021-05-13T09:56:39Z",
|
||||
"updated_at": "2021-06-01T06:02:08Z",
|
||||
"pushed_at": "2020-12-22T03:10:47Z",
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"watchers": 103,
|
||||
"watchers": 104,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-10-16T12:09:45Z",
|
||||
"stargazers_count": 423,
|
||||
"watchers_count": 423,
|
||||
"forks_count": 401,
|
||||
"forks": 401,
|
||||
"forks_count": 402,
|
||||
"forks": 402,
|
||||
"watchers": 423,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-04-19T11:20:41Z",
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 114,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2021-05-25T10:21:05Z",
|
||||
"updated_at": "2021-06-01T06:46:56Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 421,
|
||||
"watchers_count": 421,
|
||||
"forks_count": 99,
|
||||
"forks": 99,
|
||||
"watchers": 421,
|
||||
"stargazers_count": 422,
|
||||
"watchers_count": 422,
|
||||
"forks_count": 100,
|
||||
"forks": 100,
|
||||
"watchers": 422,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-12T22:53:14Z",
|
||||
"updated_at": "2021-05-31T15:21:45Z",
|
||||
"updated_at": "2021-06-01T03:33:15Z",
|
||||
"pushed_at": "2021-01-08T10:31:22Z",
|
||||
"stargazers_count": 480,
|
||||
"watchers_count": 480,
|
||||
"stargazers_count": 481,
|
||||
"watchers_count": 481,
|
||||
"forks_count": 159,
|
||||
"forks": 159,
|
||||
"watchers": 480,
|
||||
"watchers": 481,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Apache Solr DataImport Handler RCE",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-09T06:27:39Z",
|
||||
"updated_at": "2021-05-24T07:23:17Z",
|
||||
"updated_at": "2021-06-01T08:12:20Z",
|
||||
"pushed_at": "2019-08-12T02:23:38Z",
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 80,
|
||||
"watchers": 81,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2244,13 +2244,13 @@
|
|||
"description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-30T19:46:21Z",
|
||||
"updated_at": "2021-05-24T17:12:12Z",
|
||||
"updated_at": "2021-06-01T08:46:13Z",
|
||||
"pushed_at": "2021-02-06T00:24:21Z",
|
||||
"stargazers_count": 190,
|
||||
"watchers_count": 190,
|
||||
"stargazers_count": 189,
|
||||
"watchers_count": 189,
|
||||
"forks_count": 73,
|
||||
"forks": 73,
|
||||
"watchers": 190,
|
||||
"watchers": 189,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2019-06-18T14:57:22Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": " double-free bug in WhatsApp exploit poc",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-03T09:26:24Z",
|
||||
"updated_at": "2021-05-18T00:05:13Z",
|
||||
"updated_at": "2021-06-01T08:46:13Z",
|
||||
"pushed_at": "2021-03-19T17:23:25Z",
|
||||
"stargazers_count": 248,
|
||||
"watchers_count": 248,
|
||||
"stargazers_count": 247,
|
||||
"watchers_count": 247,
|
||||
"forks_count": 77,
|
||||
"forks": 77,
|
||||
"watchers": 248,
|
||||
"watchers": 247,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -312,13 +312,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-11-09T21:46:57Z",
|
||||
"updated_at": "2021-05-03T05:31:35Z",
|
||||
"updated_at": "2021-06-01T03:34:21Z",
|
||||
"pushed_at": "2021-02-07T19:51:24Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-11-20T15:05:54Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-01-10T10:58:44Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-05-31T13:23:17Z",
|
||||
"updated_at": "2021-06-01T06:28:54Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2604,
|
||||
"watchers_count": 2604,
|
||||
"stargazers_count": 2605,
|
||||
"watchers_count": 2605,
|
||||
"forks_count": 761,
|
||||
"forks": 761,
|
||||
"watchers": 2604,
|
||||
"watchers": 2605,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2020-0022 vulnerability exploitation on Bouygues BBox Miami (Android TV 8.0 - ARM32 Cortex A9)",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-24T19:33:10Z",
|
||||
"updated_at": "2021-04-23T16:18:39Z",
|
||||
"updated_at": "2021-06-01T08:38:51Z",
|
||||
"pushed_at": "2021-03-21T20:59:46Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 15,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -151,8 +151,8 @@
|
|||
"description": "Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-28T16:04:30Z",
|
||||
"updated_at": "2021-03-11T15:57:50Z",
|
||||
"pushed_at": "2020-10-07T08:10:46Z",
|
||||
"updated_at": "2021-06-01T07:36:56Z",
|
||||
"pushed_at": "2021-06-01T07:36:53Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"forks_count": 12,
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T15:21:27Z",
|
||||
"updated_at": "2021-05-31T18:31:06Z",
|
||||
"updated_at": "2021-06-01T07:43:57Z",
|
||||
"pushed_at": "2020-10-01T08:36:29Z",
|
||||
"stargazers_count": 592,
|
||||
"watchers_count": 592,
|
||||
"stargazers_count": 593,
|
||||
"watchers_count": 593,
|
||||
"forks_count": 197,
|
||||
"forks": 197,
|
||||
"watchers": 592,
|
||||
"watchers": 593,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -224,8 +224,8 @@
|
|||
"pushed_at": "2020-10-04T16:18:45Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-05-31T13:23:17Z",
|
||||
"updated_at": "2021-06-01T06:28:54Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 2604,
|
||||
"watchers_count": 2604,
|
||||
"stargazers_count": 2605,
|
||||
"watchers_count": 2605,
|
||||
"forks_count": 761,
|
||||
"forks": 761,
|
||||
"watchers": 2604,
|
||||
"watchers": 2605,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2020/CVE-2020-19999.json
Normal file
25
2020/CVE-2020-19999.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 372693347,
|
||||
"name": "CVE-2020-19999test-5",
|
||||
"full_name": "dorisroot1\/CVE-2020-19999test-5",
|
||||
"owner": {
|
||||
"login": "dorisroot1",
|
||||
"id": 30891737,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30891737?v=4",
|
||||
"html_url": "https:\/\/github.com\/dorisroot1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dorisroot1\/CVE-2020-19999test-5",
|
||||
"description": "cve-2021-19999test",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-01T03:44:30Z",
|
||||
"updated_at": "2021-06-01T07:25:52Z",
|
||||
"pushed_at": "2021-06-01T03:44:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -197,13 +197,13 @@
|
|||
"description": "exploit code for F5-Big-IP (CVE-2020-5902)",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-06T01:12:23Z",
|
||||
"updated_at": "2021-05-31T18:23:04Z",
|
||||
"updated_at": "2021-06-01T06:34:22Z",
|
||||
"pushed_at": "2020-07-06T01:36:32Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 24,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 26,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2021/CVE-2021-19999.json
Normal file
25
2021/CVE-2021-19999.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 372693347,
|
||||
"name": "CVE-2020-19999test-5",
|
||||
"full_name": "dorisroot1\/CVE-2020-19999test-5",
|
||||
"owner": {
|
||||
"login": "dorisroot1",
|
||||
"id": 30891737,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30891737?v=4",
|
||||
"html_url": "https:\/\/github.com\/dorisroot1"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dorisroot1\/CVE-2020-19999test-5",
|
||||
"description": "cve-2021-19999test",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-01T03:44:30Z",
|
||||
"updated_at": "2021-06-01T07:25:52Z",
|
||||
"pushed_at": "2021-06-01T03:44:31Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "POC for CVE2021-2091 VMWare ESXi RCE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-25T17:14:38Z",
|
||||
"updated_at": "2021-05-26T03:06:30Z",
|
||||
"updated_at": "2021-06-01T06:55:36Z",
|
||||
"pushed_at": "2021-05-31T17:29:25Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2021-21972 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T11:14:58Z",
|
||||
"updated_at": "2021-06-01T02:14:51Z",
|
||||
"updated_at": "2021-06-01T08:46:00Z",
|
||||
"pushed_at": "2021-03-10T05:01:22Z",
|
||||
"stargazers_count": 258,
|
||||
"watchers_count": 258,
|
||||
"stargazers_count": 259,
|
||||
"watchers_count": 259,
|
||||
"forks_count": 97,
|
||||
"forks": 97,
|
||||
"watchers": 258,
|
||||
"watchers": 259,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,36 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-05-29T13:07:14Z",
|
||||
"updated_at": "2021-06-01T02:13:36Z",
|
||||
"updated_at": "2021-06-01T09:10:48Z",
|
||||
"pushed_at": "2021-05-31T06:14:36Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 18,
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 372757311,
|
||||
"name": "CVE-2021-21985-Checker",
|
||||
"full_name": "onSec-fr\/CVE-2021-21985-Checker",
|
||||
"owner": {
|
||||
"login": "onSec-fr",
|
||||
"id": 59887731,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59887731?v=4",
|
||||
"html_url": "https:\/\/github.com\/onSec-fr"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/onSec-fr\/CVE-2021-21985-Checker",
|
||||
"description": "CVE-2021-21985 Checker (credits to alt3kx).",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-01T08:31:05Z",
|
||||
"updated_at": "2021-06-01T08:32:27Z",
|
||||
"pushed_at": "2021-06-01T08:32:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Chaining CVE-2021-25281 and CVE-2021-25282 to exploit a SaltStack",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-26T12:08:25Z",
|
||||
"updated_at": "2021-04-02T11:22:44Z",
|
||||
"updated_at": "2021-06-01T06:31:58Z",
|
||||
"pushed_at": "2021-03-06T12:50:35Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 22,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-04-28T17:56:04Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2021-26295 EXP 可成功反弹Shell",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-24T10:08:54Z",
|
||||
"updated_at": "2021-05-21T10:54:15Z",
|
||||
"updated_at": "2021-06-01T07:17:33Z",
|
||||
"pushed_at": "2021-05-10T02:09:51Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-04-26T14:21:30Z",
|
||||
"updated_at": "2021-04-29T02:14:00Z",
|
||||
"updated_at": "2021-06-01T07:32:55Z",
|
||||
"pushed_at": "2021-04-26T14:23:48Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-31T18:02:39Z",
|
||||
"updated_at": "2021-06-01T03:12:14Z",
|
||||
"updated_at": "2021-06-01T08:58:37Z",
|
||||
"pushed_at": "2021-05-31T21:30:00Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 29,
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 71,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "WordPress - Authenticated XXE (CVE-2021-29447)",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-16T20:41:26Z",
|
||||
"updated_at": "2021-05-28T08:42:51Z",
|
||||
"updated_at": "2021-06-01T08:00:31Z",
|
||||
"pushed_at": "2021-04-18T00:45:34Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -325,6 +325,9 @@ The overlayfs implementation in the linux kernel did not properly validate with
|
|||
### CVE-2021-14562
|
||||
- [Jarry1sec/CVE-2021-14562](https://github.com/Jarry1sec/CVE-2021-14562)
|
||||
|
||||
### CVE-2021-19999
|
||||
- [dorisroot1/CVE-2020-19999test-5](https://github.com/dorisroot1/CVE-2020-19999test-5)
|
||||
|
||||
### CVE-2021-20202 (2021-05-12)
|
||||
|
||||
<code>
|
||||
|
@ -534,6 +537,7 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability due to
|
|||
|
||||
- [bigbroke/CVE-2021-21985](https://github.com/bigbroke/CVE-2021-21985)
|
||||
- [alt3kx/CVE-2021-21985_PoC](https://github.com/alt3kx/CVE-2021-21985_PoC)
|
||||
- [onSec-fr/CVE-2021-21985-Checker](https://github.com/onSec-fr/CVE-2021-21985-Checker)
|
||||
|
||||
### CVE-2021-22192 (2021-03-24)
|
||||
|
||||
|
@ -4504,6 +4508,9 @@ A Java Serialization vulnerability was found in Apache Tapestry 4. Apache Tapest
|
|||
|
||||
- [154802388/CVE-2020-17531](https://github.com/154802388/CVE-2020-17531)
|
||||
|
||||
### CVE-2020-19999
|
||||
- [dorisroot1/CVE-2020-19999test-5](https://github.com/dorisroot1/CVE-2020-19999test-5)
|
||||
|
||||
### CVE-2020-21224 (2021-02-22)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Add table
Reference in a new issue