Auto Update 2024/03/30 00:26:48

This commit is contained in:
motikan2010-bot 2024-03-30 09:26:48 +09:00
parent c3a0e96eac
commit 2eb5207e19
26 changed files with 292 additions and 98 deletions

View file

@ -73,10 +73,10 @@
"description": "kernel exploit",
"fork": false,
"created_at": "2022-02-07T10:52:51Z",
"updated_at": "2024-03-14T20:44:36Z",
"updated_at": "2024-03-29T20:00:55Z",
"pushed_at": "2022-02-07T14:33:56Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 2
}

View file

@ -45,10 +45,10 @@
"description": "A standalone POC for CVE-2019-12840",
"fork": false,
"created_at": "2019-11-09T17:48:39Z",
"updated_at": "2023-09-28T11:07:56Z",
"updated_at": "2024-03-29T21:01:15Z",
"pushed_at": "2019-11-10T13:26:41Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 2
},

View file

@ -267,6 +267,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -248,6 +248,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,7 +27,7 @@
"forks": 4,
"watchers": 3,
"score": 0,
"subscribers_count": 32
"subscribers_count": 33
},
{
"id": 320642790,

View file

@ -73,10 +73,10 @@
"description": "Python script for exploiting command injection in Open PLC Webserver v3",
"fork": false,
"created_at": "2024-03-28T21:31:45Z",
"updated_at": "2024-03-28T23:17:50Z",
"updated_at": "2024-03-29T19:41:59Z",
"pushed_at": "2024-03-28T22:14:23Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -90,8 +90,8 @@
],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -79,10 +79,10 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2024-03-29T08:58:25Z",
"updated_at": "2024-03-30T00:08:06Z",
"pushed_at": "2022-06-08T04:00:28Z",
"stargazers_count": 1901,
"watchers_count": 1901,
"stargazers_count": 1902,
"watchers_count": 1902,
"has_discussions": false,
"forks_count": 510,
"allow_forking": true,
@ -91,7 +91,7 @@
"topics": [],
"visibility": "public",
"forks": 510,
"watchers": 1901,
"watchers": 1902,
"score": 0,
"subscribers_count": 21
},

View file

@ -213,34 +213,34 @@
"subscribers_count": 0
},
{
"id": 443609406,
"id": 444081415,
"name": "-cve-2021-45232",
"full_name": "itxfahdi\/-cve-2021-45232",
"full_name": "xiju2003\/-cve-2021-45232",
"owner": {
"login": "itxfahdi",
"id": 67527602,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67527602?v=4",
"html_url": "https:\/\/github.com\/itxfahdi"
"login": "xiju2003",
"id": 17631407,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17631407?v=4",
"html_url": "https:\/\/github.com\/xiju2003"
},
"html_url": "https:\/\/github.com\/itxfahdi\/-cve-2021-45232",
"html_url": "https:\/\/github.com\/xiju2003\/-cve-2021-45232",
"description": "The vulnerability affects Apache APISIX Dashboard version 2.10.1",
"fork": false,
"created_at": "2022-01-01T19:31:13Z",
"updated_at": "2022-01-01T20:22:16Z",
"created_at": "2022-01-03T14:01:32Z",
"updated_at": "2022-01-03T14:01:33Z",
"pushed_at": "2022-01-01T20:22:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 0
},
{
"id": 444659919,

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2021-45468, an Imperva WAF bypass.",
"fork": false,
"created_at": "2021-12-12T05:36:46Z",
"updated_at": "2023-06-21T21:03:27Z",
"updated_at": "2024-03-29T23:53:10Z",
"pushed_at": "2021-12-21T21:03:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 2
}

View file

@ -48,10 +48,10 @@
"description": "[PoC] Privilege escalation & code execution via LFI in PwnDoC ",
"fork": false,
"created_at": "2023-02-11T15:26:14Z",
"updated_at": "2023-02-12T09:53:27Z",
"updated_at": "2024-03-29T19:00:28Z",
"pushed_at": "2023-02-11T15:30:56Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -66,7 +66,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "The exploit targets a critical privilege escalation vulnerability in macOS versions Monterey, Ventura, and Sonoma.",
"fork": false,
"created_at": "2024-03-26T11:01:54Z",
"updated_at": "2024-03-29T16:19:38Z",
"updated_at": "2024-03-29T18:38:51Z",
"pushed_at": "2024-03-26T17:16:23Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "A PoC exploit for CVE-2023-43208 - Mirth Connect Remote Code Execution (RCE)",
"fork": false,
"created_at": "2024-03-15T12:03:51Z",
"updated_at": "2024-03-28T12:30:31Z",
"updated_at": "2024-03-29T21:01:15Z",
"pushed_at": "2024-03-16T21:22:27Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -39,7 +39,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 19,
"watchers": 20,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,19 +13,19 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-03-29T17:37:37Z",
"updated_at": "2024-03-29T21:52:50Z",
"pushed_at": "2024-03-29T13:34:43Z",
"stargazers_count": 242,
"watchers_count": 242,
"stargazers_count": 246,
"watchers_count": 246,
"has_discussions": false,
"forks_count": 42,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 242,
"forks": 43,
"watchers": 246,
"score": 0,
"subscribers_count": 3
},

View file

@ -43,7 +43,7 @@
"description": "PoC for CVE-2023-4911",
"fork": false,
"created_at": "2023-10-04T14:12:16Z",
"updated_at": "2024-03-26T05:11:04Z",
"updated_at": "2024-03-29T21:31:45Z",
"pushed_at": "2023-10-04T14:16:36Z",
"stargazers_count": 374,
"watchers_count": 374,

View file

@ -73,10 +73,10 @@
"description": "This script exploits the CVE-2024-0204 vulnerability in Fortra GoAnywhere MFT, allowing the creation of unauthorized administrative users, for educational and authorized testing purposes.",
"fork": false,
"created_at": "2024-01-24T20:10:34Z",
"updated_at": "2024-01-25T19:06:26Z",
"updated_at": "2024-03-29T21:32:33Z",
"pushed_at": "2024-01-24T20:17:01Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,19 +13,19 @@
"description": "LPE exploit for CVE-2024-0582 (io_uring)",
"fork": false,
"created_at": "2024-03-29T14:45:22Z",
"updated_at": "2024-03-29T16:31:36Z",
"updated_at": "2024-03-29T23:50:46Z",
"pushed_at": "2024-03-29T16:05:31Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"forks": 3,
"watchers": 6,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,12 +13,12 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-03-29T18:25:20Z",
"updated_at": "2024-03-30T00:28:43Z",
"pushed_at": "2024-03-27T09:22:28Z",
"stargazers_count": 792,
"watchers_count": 792,
"stargazers_count": 835,
"watchers_count": 835,
"has_discussions": false,
"forks_count": 85,
"forks_count": 88,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,8 +30,8 @@
"poc"
],
"visibility": "public",
"forks": 85,
"watchers": 792,
"forks": 88,
"watchers": 835,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "This is an exploit script to find out wordpress admin's username and password hash by exploiting CVE-2024-1698.",
"fork": false,
"created_at": "2024-03-29T04:11:06Z",
"updated_at": "2024-03-29T17:44:55Z",
"updated_at": "2024-03-29T19:46:50Z",
"pushed_at": "2024-03-29T04:31:31Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-03-08T02:31:41Z",
"updated_at": "2024-03-12T13:33:25Z",
"updated_at": "2024-03-29T20:19:15Z",
"pushed_at": "2024-03-12T13:33:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "This Python script exploits a vulnerability (CVE-2024-21388) in Microsoft Edge, allowing silent installation of browser extensions with elevated privileges via a private API.",
"fork": false,
"created_at": "2024-03-28T09:31:31Z",
"updated_at": "2024-03-28T19:41:43Z",
"updated_at": "2024-03-29T20:31:44Z",
"pushed_at": "2024-03-28T09:33:23Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure",
"fork": false,
"created_at": "2024-02-09T14:31:56Z",
"updated_at": "2024-03-24T21:09:52Z",
"updated_at": "2024-03-29T23:58:16Z",
"pushed_at": "2024-02-09T15:14:03Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 26,
"watchers": 27,
"score": 0,
"subscribers_count": 2
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 12,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"forks": 13,
"watchers": 43,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "WallEscape vulnerability in util-linux",
"fork": false,
"created_at": "2024-03-11T00:15:03Z",
"updated_at": "2024-03-29T14:19:04Z",
"updated_at": "2024-03-29T20:52:43Z",
"pushed_at": "2024-03-12T00:28:14Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 18,
"watchers": 21,
"score": 0,
"subscribers_count": 1
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"forks": 10,
"watchers": 46,
"score": 0,
"subscribers_count": 1

View file

@ -13,8 +13,196 @@
"description": "Information for CVE-2024-3094",
"fork": false,
"created_at": "2024-03-29T17:03:01Z",
"updated_at": "2024-03-29T17:06:14Z",
"pushed_at": "2024-03-29T18:25:51Z",
"updated_at": "2024-03-29T22:51:36Z",
"pushed_at": "2024-03-29T22:39:55Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 0
},
{
"id": 779430633,
"name": "CVE-2024-3094-checker",
"full_name": "FabioBaroni\/CVE-2024-3094-checker",
"owner": {
"login": "FabioBaroni",
"id": 2703045,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2703045?v=4",
"html_url": "https:\/\/github.com\/FabioBaroni"
},
"html_url": "https:\/\/github.com\/FabioBaroni\/CVE-2024-3094-checker",
"description": "Quick and dirty PoC for checking whether a vulnerable version of xz-utils is installed (CVE-2024-3094)",
"fork": false,
"created_at": "2024-03-29T20:28:17Z",
"updated_at": "2024-03-29T20:31:30Z",
"pushed_at": "2024-03-29T20:52:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 779437270,
"name": "CVE-2024-3094-Vulnerabity-Checker",
"full_name": "lypd0\/CVE-2024-3094-Vulnerabity-Checker",
"owner": {
"login": "lypd0",
"id": 146327014,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146327014?v=4",
"html_url": "https:\/\/github.com\/lypd0"
},
"html_url": "https:\/\/github.com\/lypd0\/CVE-2024-3094-Vulnerabity-Checker",
"description": "Verify that your XZ Utils version is not vulnerable to CVE-2024-3094",
"fork": false,
"created_at": "2024-03-29T20:52:27Z",
"updated_at": "2024-03-29T23:14:02Z",
"pushed_at": "2024-03-29T21:56:17Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"check",
"checker",
"cve-2024-3094",
"exploit",
"scanner",
"script",
"vulnerability"
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 0
},
{
"id": 779449882,
"name": "xz_utils-CVE-2024-3094",
"full_name": "OpensourceICTSolutions\/xz_utils-CVE-2024-3094",
"owner": {
"login": "OpensourceICTSolutions",
"id": 68592870,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68592870?v=4",
"html_url": "https:\/\/github.com\/OpensourceICTSolutions"
},
"html_url": "https:\/\/github.com\/OpensourceICTSolutions\/xz_utils-CVE-2024-3094",
"description": null,
"fork": false,
"created_at": "2024-03-29T21:41:42Z",
"updated_at": "2024-03-29T21:41:42Z",
"pushed_at": "2024-03-29T21:42:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 779473804,
"name": "xz_cve-2024-3094_detection",
"full_name": "bioless\/xz_cve-2024-3094_detection",
"owner": {
"login": "bioless",
"id": 10271875,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10271875?v=4",
"html_url": "https:\/\/github.com\/bioless"
},
"html_url": "https:\/\/github.com\/bioless\/xz_cve-2024-3094_detection",
"description": "Script to detect CVE-2024-3094.",
"fork": false,
"created_at": "2024-03-29T23:20:22Z",
"updated_at": "2024-03-29T23:23:15Z",
"pushed_at": "2024-03-29T23:23:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 779474128,
"name": "CVE-2024-3094_xz_check",
"full_name": "Hacker-Hermanos\/CVE-2024-3094_xz_check",
"owner": {
"login": "Hacker-Hermanos",
"id": 152432195,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152432195?v=4",
"html_url": "https:\/\/github.com\/Hacker-Hermanos"
},
"html_url": "https:\/\/github.com\/Hacker-Hermanos\/CVE-2024-3094_xz_check",
"description": "This repository contains a Bash script and a one-liner command to verify if a system is running a vulnerable version of the \"xz\" utility, as specified by CVE-2024-3094.",
"fork": false,
"created_at": "2024-03-29T23:21:44Z",
"updated_at": "2024-03-30T00:14:21Z",
"pushed_at": "2024-03-30T00:04:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 779476965,
"name": "CVE-2024-3094",
"full_name": "Fractal-Tess\/CVE-2024-3094",
"owner": {
"login": "Fractal-Tess",
"id": 75957529,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75957529?v=4",
"html_url": "https:\/\/github.com\/Fractal-Tess"
},
"html_url": "https:\/\/github.com\/Fractal-Tess\/CVE-2024-3094",
"description": null,
"fork": false,
"created_at": "2024-03-29T23:36:07Z",
"updated_at": "2024-03-29T23:36:13Z",
"pushed_at": "2024-03-30T00:28:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -197,6 +197,12 @@
### CVE-2024-3094
- [byinarie/CVE-2024-3094-info](https://github.com/byinarie/CVE-2024-3094-info)
- [FabioBaroni/CVE-2024-3094-checker](https://github.com/FabioBaroni/CVE-2024-3094-checker)
- [lypd0/CVE-2024-3094-Vulnerabity-Checker](https://github.com/lypd0/CVE-2024-3094-Vulnerabity-Checker)
- [OpensourceICTSolutions/xz_utils-CVE-2024-3094](https://github.com/OpensourceICTSolutions/xz_utils-CVE-2024-3094)
- [bioless/xz_cve-2024-3094_detection](https://github.com/bioless/xz_cve-2024-3094_detection)
- [Hacker-Hermanos/CVE-2024-3094_xz_check](https://github.com/Hacker-Hermanos/CVE-2024-3094_xz_check)
- [Fractal-Tess/CVE-2024-3094](https://github.com/Fractal-Tess/CVE-2024-3094)
### CVE-2024-12883
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
@ -20900,7 +20906,7 @@
- [jxpsx/CVE-2021-45232-RCE](https://github.com/jxpsx/CVE-2021-45232-RCE)
- [wuppp/cve-2021-45232-exp](https://github.com/wuppp/cve-2021-45232-exp)
- [dskho/CVE-2021-45232](https://github.com/dskho/CVE-2021-45232)
- [itxfahdi/-cve-2021-45232](https://github.com/itxfahdi/-cve-2021-45232)
- [xiju2003/-cve-2021-45232](https://github.com/xiju2003/-cve-2021-45232)
- [GYLQ/CVE-2021-45232-RCE](https://github.com/GYLQ/CVE-2021-45232-RCE)
- [fany0r/CVE-2021-45232-RCE](https://github.com/fany0r/CVE-2021-45232-RCE)
- [yggcwhat/Demo](https://github.com/yggcwhat/Demo)