PoC-in-GitHub/2021/CVE-2021-27928.json
2022-08-11 09:18:35 +09:00

67 lines
No EOL
2.1 KiB
JSON

[
{
"id": 358154501,
"name": "CVE-2021-27928",
"full_name": "Al1ex\/CVE-2021-27928",
"owner": {
"login": "Al1ex",
"id": 38161463,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
"html_url": "https:\/\/github.com\/Al1ex"
},
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2021-27928",
"description": "CVE-2021-27928 MariaDB\/MySQL-'wsrep provider' 命令注入漏洞",
"fork": false,
"created_at": "2021-04-15T06:40:49Z",
"updated_at": "2022-07-23T07:58:28Z",
"pushed_at": "2021-12-08T03:06:43Z",
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2021-27928",
"mariadb"
],
"visibility": "public",
"forks": 14,
"watchers": 49,
"score": 0
},
{
"id": 475258147,
"name": "CVE-2021-27928",
"full_name": "GatoGamer1155\/CVE-2021-27928",
"owner": {
"login": "GatoGamer1155",
"id": 95899548,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95899548?v=4",
"html_url": "https:\/\/github.com\/GatoGamer1155"
},
"html_url": "https:\/\/github.com\/GatoGamer1155\/CVE-2021-27928",
"description": "Pasos a seguir para explotar la vulnerabilidad CVE-2021-27928",
"fork": false,
"created_at": "2022-03-29T02:54:37Z",
"updated_at": "2022-06-15T16:02:30Z",
"pushed_at": "2022-04-15T16:59:59Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2021-27928",
"exploit",
"mariadb"
],
"visibility": "public",
"forks": 0,
"watchers": 5,
"score": 0
}
]