mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
150 lines
No EOL
5.1 KiB
JSON
150 lines
No EOL
5.1 KiB
JSON
[
|
|
{
|
|
"id": 418375861,
|
|
"name": "CVE-2021-36260",
|
|
"full_name": "rabbitsafe\/CVE-2021-36260",
|
|
"owner": {
|
|
"login": "rabbitsafe",
|
|
"id": 33046073,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33046073?v=4",
|
|
"html_url": "https:\/\/github.com\/rabbitsafe"
|
|
},
|
|
"html_url": "https:\/\/github.com\/rabbitsafe\/CVE-2021-36260",
|
|
"description": "CVE-2021-36260",
|
|
"fork": false,
|
|
"created_at": "2021-10-18T06:40:48Z",
|
|
"updated_at": "2022-11-09T18:14:05Z",
|
|
"pushed_at": "2022-09-19T02:12:42Z",
|
|
"stargazers_count": 15,
|
|
"watchers_count": 15,
|
|
"has_discussions": false,
|
|
"forks_count": 6,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 6,
|
|
"watchers": 15,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 421880973,
|
|
"name": "CVE-2021-36260",
|
|
"full_name": "Aiminsun\/CVE-2021-36260",
|
|
"owner": {
|
|
"login": "Aiminsun",
|
|
"id": 58260225,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58260225?v=4",
|
|
"html_url": "https:\/\/github.com\/Aiminsun"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Aiminsun\/CVE-2021-36260",
|
|
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
|
|
"fork": false,
|
|
"created_at": "2021-10-27T15:51:12Z",
|
|
"updated_at": "2023-03-21T22:16:50Z",
|
|
"pushed_at": "2021-10-28T06:37:37Z",
|
|
"stargazers_count": 175,
|
|
"watchers_count": 175,
|
|
"has_discussions": false,
|
|
"forks_count": 67,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 67,
|
|
"watchers": 175,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 424140037,
|
|
"name": "CVE-2021-36260-metasploit",
|
|
"full_name": "TaroballzChen\/CVE-2021-36260-metasploit",
|
|
"owner": {
|
|
"login": "TaroballzChen",
|
|
"id": 27862593,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27862593?v=4",
|
|
"html_url": "https:\/\/github.com\/TaroballzChen"
|
|
},
|
|
"html_url": "https:\/\/github.com\/TaroballzChen\/CVE-2021-36260-metasploit",
|
|
"description": "the metasploit script(POC) about CVE-2021-36260 ",
|
|
"fork": false,
|
|
"created_at": "2021-11-03T08:11:49Z",
|
|
"updated_at": "2023-03-17T15:16:23Z",
|
|
"pushed_at": "2021-11-03T08:26:24Z",
|
|
"stargazers_count": 15,
|
|
"watchers_count": 15,
|
|
"has_discussions": false,
|
|
"forks_count": 8,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 8,
|
|
"watchers": 15,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 437809411,
|
|
"name": "CheckHKRCE",
|
|
"full_name": "tuntin9x\/CheckHKRCE",
|
|
"owner": {
|
|
"login": "tuntin9x",
|
|
"id": 42837549,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42837549?v=4",
|
|
"html_url": "https:\/\/github.com\/tuntin9x"
|
|
},
|
|
"html_url": "https:\/\/github.com\/tuntin9x\/CheckHKRCE",
|
|
"description": "CVE-2021-36260",
|
|
"fork": false,
|
|
"created_at": "2021-12-13T09:23:36Z",
|
|
"updated_at": "2022-11-17T12:42:51Z",
|
|
"pushed_at": "2022-10-27T01:14:34Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"has_discussions": false,
|
|
"forks_count": 3,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 3,
|
|
"watchers": 3,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 520972929,
|
|
"name": "CVE-2021-36260",
|
|
"full_name": "Cuerz\/CVE-2021-36260",
|
|
"owner": {
|
|
"login": "Cuerz",
|
|
"id": 84277976,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84277976?v=4",
|
|
"html_url": "https:\/\/github.com\/Cuerz"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Cuerz\/CVE-2021-36260",
|
|
"description": "海康威视RCE漏洞 批量检测和利用工具",
|
|
"fork": false,
|
|
"created_at": "2022-08-03T17:27:59Z",
|
|
"updated_at": "2023-03-13T14:16:03Z",
|
|
"pushed_at": "2022-08-05T19:57:30Z",
|
|
"stargazers_count": 63,
|
|
"watchers_count": 63,
|
|
"has_discussions": false,
|
|
"forks_count": 15,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve-2021-36260",
|
|
"exploit"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 15,
|
|
"watchers": 63,
|
|
"score": 0
|
|
}
|
|
] |