Auto Update 2022/05/30 06:15:50

This commit is contained in:
motikan2010-bot 2022-05-30 15:15:50 +09:00
parent 655cb7323c
commit 044017d21e
22 changed files with 167 additions and 171 deletions

View file

@ -13,16 +13,16 @@
"description": "EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)",
"fork": false,
"created_at": "2016-02-09T21:30:34Z",
"updated_at": "2022-03-24T19:13:00Z",
"updated_at": "2022-05-30T02:05:40Z",
"pushed_at": "2016-05-09T17:53:48Z",
"stargazers_count": 330,
"watchers_count": 330,
"forks_count": 150,
"forks_count": 151,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 150,
"forks": 151,
"watchers": 330,
"score": 0
},

View file

@ -272,14 +272,14 @@
{
"id": 328929654,
"name": "CVE-2017-12615-EXP",
"full_name": "gardenWhy\/CVE-2017-12615-EXP",
"full_name": "w0x68y\/CVE-2017-12615-EXP",
"owner": {
"login": "gardenWhy",
"login": "w0x68y",
"id": 22195911,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22195911?v=4",
"html_url": "https:\/\/github.com\/gardenWhy"
"html_url": "https:\/\/github.com\/w0x68y"
},
"html_url": "https:\/\/github.com\/gardenWhy\/CVE-2017-12615-EXP",
"html_url": "https:\/\/github.com\/w0x68y\/CVE-2017-12615-EXP",
"description": "CVE-2017-12615 任意文件写入exp写入webshell",
"fork": false,
"created_at": "2021-01-12T09:07:12Z",

View file

@ -154,17 +154,17 @@
"description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability",
"fork": false,
"created_at": "2017-06-05T16:25:57Z",
"updated_at": "2022-05-18T17:45:04Z",
"updated_at": "2022-05-30T04:55:40Z",
"pushed_at": "2021-03-09T09:12:55Z",
"stargazers_count": 250,
"watchers_count": 250,
"stargazers_count": 249,
"watchers_count": 249,
"forks_count": 83,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 83,
"watchers": 250,
"watchers": 249,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers (all versions prior to V3.5) and TALON TC BACnet Automation Controllers (all versions prior to V3.5). With a 7.5 CVSS, this exploit allows for an attacker to perform an authentication bypass using an alternate path or channel to access hidden directories in the web server. This repository takes advantage of CVE-2017-9947.",
"fork": false,
"created_at": "2022-05-26T01:13:42Z",
"updated_at": "2022-05-29T23:05:25Z",
"updated_at": "2022-05-30T03:36:24Z",
"pushed_at": "2022-05-26T19:14:20Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"forks": 2,
"watchers": 7,
"score": 0
}
]

View file

@ -681,12 +681,12 @@
"pushed_at": "2019-05-16T02:12:17Z",
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 35,
"forks_count": 34,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 35,
"forks": 34,
"watchers": 42,
"score": 0
},
@ -2861,17 +2861,17 @@
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
"fork": false,
"created_at": "2020-01-21T02:22:29Z",
"updated_at": "2022-05-29T06:14:22Z",
"updated_at": "2022-05-30T01:34:49Z",
"pushed_at": "2020-01-21T03:15:41Z",
"stargazers_count": 293,
"watchers_count": 293,
"stargazers_count": 295,
"watchers_count": 295,
"forks_count": 71,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 71,
"watchers": 293,
"watchers": 295,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Atlassian JIRA Template injection vulnerability RCE",
"fork": false,
"created_at": "2019-07-16T02:27:00Z",
"updated_at": "2022-03-09T16:25:30Z",
"updated_at": "2022-05-30T05:56:59Z",
"pushed_at": "2019-07-22T06:47:52Z",
"stargazers_count": 84,
"watchers_count": 84,
"stargazers_count": 85,
"watchers_count": 85,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 84,
"watchers": 85,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2022-05-27T03:03:19Z",
"updated_at": "2022-05-30T04:59:18Z",
"pushed_at": "2021-12-08T10:31:54Z",
"stargazers_count": 1457,
"watchers_count": 1457,
"stargazers_count": 1458,
"watchers_count": 1458,
"forks_count": 333,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 333,
"watchers": 1457,
"watchers": 1458,
"score": 0
},
{

View file

@ -121,10 +121,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2022-05-27T17:05:07Z",
"updated_at": "2022-05-30T01:20:12Z",
"pushed_at": "2021-07-30T03:28:00Z",
"stargazers_count": 960,
"watchers_count": 960,
"stargazers_count": 961,
"watchers_count": 961,
"forks_count": 300,
"allow_forking": true,
"is_template": false,
@ -135,7 +135,7 @@
],
"visibility": "public",
"forks": 300,
"watchers": 960,
"watchers": 961,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-1732 Exploit",
"fork": false,
"created_at": "2021-03-05T02:11:10Z",
"updated_at": "2022-05-05T02:28:30Z",
"updated_at": "2022-05-30T02:47:05Z",
"pushed_at": "2021-03-05T03:10:26Z",
"stargazers_count": 379,
"watchers_count": 379,
"stargazers_count": 380,
"watchers_count": 380,
"forks_count": 118,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 118,
"watchers": 379,
"watchers": 380,
"score": 0
},
{

View file

@ -63,14 +63,14 @@
{
"id": 440732240,
"name": "Gitlab-CVE-2021-22205",
"full_name": "gardenWhy\/Gitlab-CVE-2021-22205",
"full_name": "w0x68y\/Gitlab-CVE-2021-22205",
"owner": {
"login": "gardenWhy",
"login": "w0x68y",
"id": 22195911,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22195911?v=4",
"html_url": "https:\/\/github.com\/gardenWhy"
"html_url": "https:\/\/github.com\/w0x68y"
},
"html_url": "https:\/\/github.com\/gardenWhy\/Gitlab-CVE-2021-22205",
"html_url": "https:\/\/github.com\/w0x68y\/Gitlab-CVE-2021-22205",
"description": "CVE-2021-22205 的批量检测脚本",
"fork": false,
"created_at": "2021-12-22T04:30:17Z",

56
2021/CVE-2021-24160.json Normal file
View file

@ -0,0 +1,56 @@
[
{
"id": 497754815,
"name": "CVE-2021-24160",
"full_name": "hnthuan1998\/CVE-2021-24160",
"owner": {
"login": "hnthuan1998",
"id": 106500287,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106500287?v=4",
"html_url": "https:\/\/github.com\/hnthuan1998"
},
"html_url": "https:\/\/github.com\/hnthuan1998\/CVE-2021-24160",
"description": null,
"fork": false,
"created_at": "2022-05-30T01:46:50Z",
"updated_at": "2022-05-30T01:46:50Z",
"pushed_at": "2022-05-30T01:46:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 497755127,
"name": "Exploit-CVE-2021-24160",
"full_name": "hnthuan1998\/Exploit-CVE-2021-24160",
"owner": {
"login": "hnthuan1998",
"id": 106500287,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106500287?v=4",
"html_url": "https:\/\/github.com\/hnthuan1998"
},
"html_url": "https:\/\/github.com\/hnthuan1998\/Exploit-CVE-2021-24160",
"description": "Exploit CVE-2021-24160",
"fork": false,
"created_at": "2022-05-30T01:48:27Z",
"updated_at": "2022-05-30T01:52:13Z",
"pushed_at": "2022-05-30T01:52:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -121,10 +121,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2022-05-27T17:05:07Z",
"updated_at": "2022-05-30T01:20:12Z",
"pushed_at": "2021-07-30T03:28:00Z",
"stargazers_count": 960,
"watchers_count": 960,
"stargazers_count": 961,
"watchers_count": 961,
"forks_count": 300,
"allow_forking": true,
"is_template": false,
@ -135,7 +135,7 @@
],
"visibility": "public",
"forks": 300,
"watchers": 960,
"watchers": 961,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "proxylogon exploit - CVE-2021-26857",
"fork": false,
"created_at": "2021-03-11T17:32:32Z",
"updated_at": "2022-05-29T22:51:56Z",
"updated_at": "2022-05-30T01:19:27Z",
"pushed_at": "2021-03-11T17:34:15Z",
"stargazers_count": 113,
"watchers_count": 113,
"stargazers_count": 114,
"watchers_count": 114,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 113,
"watchers": 114,
"score": 0
},
{

View file

@ -380,17 +380,17 @@
"description": "PolicyKit CVE-2021-3560 Exploit (Authentication Agent)",
"fork": false,
"created_at": "2022-04-29T18:57:30Z",
"updated_at": "2022-05-29T18:09:24Z",
"updated_at": "2022-05-30T06:13:50Z",
"pushed_at": "2022-05-02T07:49:01Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 53,
"watchers": 62,
"score": 0
},
{
@ -407,17 +407,17 @@
"description": "PolicyKit CVE-2021-3560 Exploitation (Authentication Agent)",
"fork": false,
"created_at": "2022-04-30T05:53:45Z",
"updated_at": "2022-05-28T11:58:41Z",
"updated_at": "2022-05-30T01:49:35Z",
"pushed_at": "2022-05-02T07:49:12Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 10,
"watchers": 11,
"score": 0
},
{

View file

@ -44,7 +44,7 @@
"pushed_at": "2022-02-09T17:27:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [
@ -53,7 +53,7 @@
"path-traversal-exploitation"
],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 0,
"score": 0
},

View file

@ -142,46 +142,6 @@
"watchers": 181,
"score": 0
},
{
"id": 436877979,
"name": "cloudrasp-log4j2",
"full_name": "boundaryx\/cloudrasp-log4j2",
"owner": {
"login": "boundaryx",
"id": 95878655,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95878655?v=4",
"html_url": "https:\/\/github.com\/boundaryx"
},
"html_url": "https:\/\/github.com\/boundaryx\/cloudrasp-log4j2",
"description": "一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.",
"fork": false,
"created_at": "2021-12-10T06:42:37Z",
"updated_at": "2022-05-19T08:41:19Z",
"pushed_at": "2021-12-11T02:49:41Z",
"stargazers_count": 106,
"watchers_count": 106,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-44228",
"defense",
"hardening",
"java",
"log4j",
"log4j2",
"protection",
"rasp",
"rce",
"security",
"security-tools",
"vulnerability"
],
"visibility": "public",
"forks": 19,
"watchers": 106,
"score": 0
},
{
"id": 436881928,
"name": "CVE-2021-44228",
@ -649,11 +609,11 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2022-05-28T13:37:57Z",
"updated_at": "2022-05-30T02:37:39Z",
"pushed_at": "2022-03-20T16:33:49Z",
"stargazers_count": 1377,
"watchers_count": 1377,
"forks_count": 377,
"stargazers_count": 1378,
"watchers_count": 1378,
"forks_count": 378,
"allow_forking": true,
"is_template": false,
"topics": [
@ -663,8 +623,8 @@
"security"
],
"visibility": "public",
"forks": 377,
"watchers": 1377,
"forks": 378,
"watchers": 1378,
"score": 0
},
{
@ -699,33 +659,6 @@
"watchers": 79,
"score": 0
},
{
"id": 437142312,
"name": "CVE-2021-44228",
"full_name": "racoon-rac\/CVE-2021-44228",
"owner": {
"login": "racoon-rac",
"id": 64579294,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64579294?v=4",
"html_url": "https:\/\/github.com\/racoon-rac"
},
"html_url": "https:\/\/github.com\/racoon-rac\/CVE-2021-44228",
"description": null,
"fork": false,
"created_at": "2021-12-10T23:37:55Z",
"updated_at": "2021-12-11T01:11:19Z",
"pushed_at": "2021-12-11T01:07:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 437142703,
"name": "CVE-2021-44228-PoC",
@ -3175,17 +3108,17 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-05-29T14:54:00Z",
"updated_at": "2022-05-30T02:58:32Z",
"pushed_at": "2022-05-17T13:25:17Z",
"stargazers_count": 2899,
"watchers_count": 2899,
"stargazers_count": 2901,
"watchers_count": 2901,
"forks_count": 711,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 711,
"watchers": 2899,
"watchers": 2901,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Atlassian Jira Seraph Authentication Bypass RCECVE-2022-0540",
"fork": false,
"created_at": "2022-05-25T10:47:04Z",
"updated_at": "2022-05-29T13:52:19Z",
"updated_at": "2022-05-30T01:34:01Z",
"pushed_at": "2022-05-25T13:43:16Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 15,
"watchers": 16,
"score": 0
}
]

View file

@ -17,12 +17,12 @@
"pushed_at": "2022-03-16T06:48:01Z",
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 18,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 18,
"forks": 19,
"watchers": 46,
"score": 0
}

View file

@ -310,17 +310,17 @@
"description": "POC for CVE-2022-1388",
"fork": false,
"created_at": "2022-05-09T11:46:45Z",
"updated_at": "2022-05-27T04:40:12Z",
"updated_at": "2022-05-30T00:35:04Z",
"pushed_at": "2022-05-09T20:52:07Z",
"stargazers_count": 201,
"watchers_count": 201,
"stargazers_count": 202,
"watchers_count": 202,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 201,
"watchers": 202,
"score": 0
},
{
@ -529,17 +529,17 @@
"description": "PoC For F5 BIG-IP - bash script Exploit one Liner",
"fork": false,
"created_at": "2022-05-10T02:57:31Z",
"updated_at": "2022-05-28T12:40:11Z",
"updated_at": "2022-05-30T06:16:51Z",
"pushed_at": "2022-05-10T08:38:58Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 2,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"forks": 3,
"watchers": 9,
"score": 0
},
{
@ -1324,7 +1324,7 @@
"fork": false,
"created_at": "2022-05-17T10:51:39Z",
"updated_at": "2022-05-19T04:36:29Z",
"pushed_at": "2022-05-21T15:36:57Z",
"pushed_at": "2022-05-30T05:40:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -420,17 +420,17 @@
"description": "CVE-2022-22947批量检测脚本超时时间不超过2s已更新可反弹shell的EXP欢迎师傅们试用",
"fork": false,
"created_at": "2022-03-04T11:31:00Z",
"updated_at": "2022-05-29T16:45:51Z",
"updated_at": "2022-05-30T02:01:50Z",
"pushed_at": "2022-03-08T09:43:50Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 31,
"watchers": 32,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2022-05-24T20:19:55Z",
"updated_at": "2022-05-29T18:08:08Z",
"updated_at": "2022-05-30T01:26:34Z",
"pushed_at": "2022-05-26T16:07:18Z",
"stargazers_count": 105,
"watchers_count": 105,
"forks_count": 18,
"stargazers_count": 106,
"watchers_count": 106,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 105,
"forks": 19,
"watchers": 106,
"score": 0
},
{
@ -40,8 +40,8 @@
"description": "vmware authentication bypass",
"fork": false,
"created_at": "2022-05-28T20:56:09Z",
"updated_at": "2022-05-29T12:32:49Z",
"pushed_at": "2022-05-28T21:10:21Z",
"updated_at": "2022-05-30T01:01:11Z",
"pushed_at": "2022-05-30T03:10:48Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,

View file

@ -3459,7 +3459,7 @@ An issue has been discovered in GitLab CE/EE affecting all versions starting fro
- [mr-r3bot/Gitlab-CVE-2021-22205](https://github.com/mr-r3bot/Gitlab-CVE-2021-22205)
- [inspiringz/CVE-2021-22205](https://github.com/inspiringz/CVE-2021-22205)
- [gardenWhy/Gitlab-CVE-2021-22205](https://github.com/gardenWhy/Gitlab-CVE-2021-22205)
- [w0x68y/Gitlab-CVE-2021-22205](https://github.com/w0x68y/Gitlab-CVE-2021-22205)
- [GitLab-Red-Team/cve-2021-22205-hash-harvester](https://github.com/GitLab-Red-Team/cve-2021-22205-hash-harvester)
- [honypot/CVE-2021-22205](https://github.com/honypot/CVE-2021-22205)
- [momika233/cve-2021-22205-GitLab-13.10.2---Remote-Code-Execution-RCE-Unauthenticated-](https://github.com/momika233/cve-2021-22205-GitLab-13.10.2---Remote-Code-Execution-RCE-Unauthenticated-)
@ -3605,6 +3605,15 @@ Arbitrary file upload in the Modern Events Calendar Lite WordPress plugin, versi
- [dnr6419/CVE-2021-24145](https://github.com/dnr6419/CVE-2021-24145)
### CVE-2021-24160 (2021-04-05)
<code>
In the Reponsive Menu (free and Pro) WordPress plugins before 4.0.4, subscribers could upload zip archives containing malicious PHP files that would get extracted to the /rmp-menu/ directory. These files could then be accessed via the front end of the site to trigger remote code execution and ultimately allow an attacker to execute commands to further infect a WordPress site.
</code>
- [hnthuan1998/CVE-2021-24160](https://github.com/hnthuan1998/CVE-2021-24160)
- [hnthuan1998/Exploit-CVE-2021-24160](https://github.com/hnthuan1998/Exploit-CVE-2021-24160)
### CVE-2021-24307 (2021-05-24)
<code>
@ -5548,7 +5557,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [jacobtread/L4J-Vuln-Patch](https://github.com/jacobtread/L4J-Vuln-Patch)
- [jas502n/Log4j2-CVE-2021-44228](https://github.com/jas502n/Log4j2-CVE-2021-44228)
- [HyCraftHD/Log4J-RCE-Proof-Of-Concept](https://github.com/HyCraftHD/Log4J-RCE-Proof-Of-Concept)
- [boundaryx/cloudrasp-log4j2](https://github.com/boundaryx/cloudrasp-log4j2)
- [dbgee/CVE-2021-44228](https://github.com/dbgee/CVE-2021-44228)
- [CreeperHost/Log4jPatcher](https://github.com/CreeperHost/Log4jPatcher)
- [DragonSurvivalEU/RCE](https://github.com/DragonSurvivalEU/RCE)
@ -5566,7 +5574,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [Puliczek/CVE-2021-44228-PoC-log4j-bypass-words](https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words)
- [kozmer/log4j-shell-poc](https://github.com/kozmer/log4j-shell-poc)
- [Adikso/minecraft-log4j-honeypot](https://github.com/Adikso/minecraft-log4j-honeypot)
- [racoon-rac/CVE-2021-44228](https://github.com/racoon-rac/CVE-2021-44228)
- [TheArqsz/CVE-2021-44228-PoC](https://github.com/TheArqsz/CVE-2021-44228-PoC)
- [1lann/log4shelldetect](https://github.com/1lann/log4shelldetect)
- [binganao/Log4j2-RCE](https://github.com/binganao/Log4j2-RCE)
@ -20627,7 +20634,7 @@ When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.
- [cved-sources/cve-2017-12615](https://github.com/cved-sources/cve-2017-12615)
- [ianxtianxt/CVE-2017-12615](https://github.com/ianxtianxt/CVE-2017-12615)
- [cyberharsh/Tomcat-CVE-2017-12615](https://github.com/cyberharsh/Tomcat-CVE-2017-12615)
- [gardenWhy/CVE-2017-12615-EXP](https://github.com/gardenWhy/CVE-2017-12615-EXP)
- [w0x68y/CVE-2017-12615-EXP](https://github.com/w0x68y/CVE-2017-12615-EXP)
### CVE-2017-12617 (2017-10-03)