mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2025/01/05 18:31:44
This commit is contained in:
parent
33b37994b6
commit
36fb76d460
30 changed files with 213 additions and 132 deletions
|
@ -181,8 +181,8 @@
|
||||||
"description": "Test code for poodle attack (CVE-2014-3566)",
|
"description": "Test code for poodle attack (CVE-2014-3566)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-11-14T04:35:59Z",
|
"created_at": "2024-11-14T04:35:59Z",
|
||||||
"updated_at": "2025-01-01T15:43:07Z",
|
"updated_at": "2025-01-05T15:26:10Z",
|
||||||
"pushed_at": "2025-01-01T15:42:06Z",
|
"pushed_at": "2025-01-05T17:52:11Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 0,
|
||||||
"watchers_count": 0,
|
"watchers_count": 0,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
|
|
|
@ -76,10 +76,10 @@
|
||||||
"description": "Unsigned driver loader using CVE-2018-19320",
|
"description": "Unsigned driver loader using CVE-2018-19320",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-11-12T05:48:13Z",
|
"created_at": "2022-11-12T05:48:13Z",
|
||||||
"updated_at": "2025-01-02T03:01:47Z",
|
"updated_at": "2025-01-05T16:26:29Z",
|
||||||
"pushed_at": "2023-04-09T13:50:29Z",
|
"pushed_at": "2023-04-09T13:50:29Z",
|
||||||
"stargazers_count": 217,
|
"stargazers_count": 218,
|
||||||
"watchers_count": 217,
|
"watchers_count": 218,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 58,
|
"forks_count": 58,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -88,7 +88,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 58,
|
"forks": 58,
|
||||||
"watchers": 217,
|
"watchers": 218,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 10
|
"subscribers_count": 10
|
||||||
}
|
}
|
||||||
|
|
|
@ -28,6 +28,6 @@
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 0
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "Root your MediaTek device with CVE-2020-0069",
|
"description": "Root your MediaTek device with CVE-2020-0069",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2019-09-06T12:12:48Z",
|
"created_at": "2019-09-06T12:12:48Z",
|
||||||
"updated_at": "2024-12-20T01:17:39Z",
|
"updated_at": "2025-01-05T16:29:27Z",
|
||||||
"pushed_at": "2023-02-06T19:18:56Z",
|
"pushed_at": "2023-02-06T19:18:56Z",
|
||||||
"stargazers_count": 153,
|
"stargazers_count": 154,
|
||||||
"watchers_count": 153,
|
"watchers_count": 154,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 24,
|
"forks_count": 24,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -31,7 +31,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 24,
|
"forks": 24,
|
||||||
"watchers": 153,
|
"watchers": 154,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 11
|
"subscribers_count": 11
|
||||||
},
|
},
|
||||||
|
|
|
@ -76,7 +76,7 @@
|
||||||
"description": "poc-cve-2020-25223",
|
"description": "poc-cve-2020-25223",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2025-01-05T03:34:33Z",
|
"created_at": "2025-01-05T03:34:33Z",
|
||||||
"updated_at": "2025-01-05T03:40:15Z",
|
"updated_at": "2025-01-05T17:28:34Z",
|
||||||
"pushed_at": "2025-01-05T03:40:12Z",
|
"pushed_at": "2025-01-05T03:40:12Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 0,
|
||||||
"watchers_count": 0,
|
"watchers_count": 0,
|
||||||
|
@ -85,7 +85,12 @@
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [
|
||||||
|
"cve-2020-25223",
|
||||||
|
"poc",
|
||||||
|
"poc-cve-2020-25223",
|
||||||
|
"rce"
|
||||||
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "Recursive MMIO VM Escape PoC",
|
"description": "Recursive MMIO VM Escape PoC",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-05-13T05:33:28Z",
|
"created_at": "2022-05-13T05:33:28Z",
|
||||||
"updated_at": "2024-12-20T00:07:19Z",
|
"updated_at": "2025-01-05T18:08:29Z",
|
||||||
"pushed_at": "2022-05-13T05:37:41Z",
|
"pushed_at": "2022-05-13T05:37:41Z",
|
||||||
"stargazers_count": 170,
|
"stargazers_count": 171,
|
||||||
"watchers_count": 170,
|
"watchers_count": 171,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 24,
|
"forks_count": 24,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 24,
|
"forks": 24,
|
||||||
"watchers": 170,
|
"watchers": 171,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 7
|
"subscribers_count": 7
|
||||||
}
|
}
|
||||||
|
|
|
@ -231,10 +231,10 @@
|
||||||
"description": "CVE-2021-40444 PoC",
|
"description": "CVE-2021-40444 PoC",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-09-10T16:55:53Z",
|
"created_at": "2021-09-10T16:55:53Z",
|
||||||
"updated_at": "2025-01-04T01:28:08Z",
|
"updated_at": "2025-01-05T14:16:19Z",
|
||||||
"pushed_at": "2021-12-25T18:31:02Z",
|
"pushed_at": "2021-12-25T18:31:02Z",
|
||||||
"stargazers_count": 1605,
|
"stargazers_count": 1606,
|
||||||
"watchers_count": 1605,
|
"watchers_count": 1606,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 483,
|
"forks_count": 483,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -243,7 +243,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 483,
|
"forks": 483,
|
||||||
"watchers": 1605,
|
"watchers": 1606,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 28
|
"subscribers_count": 28
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "Exploit for command injection vulnerability found in uhttpd binary from TP-Link Tapo c200 IP camera",
|
"description": "Exploit for command injection vulnerability found in uhttpd binary from TP-Link Tapo c200 IP camera",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-11-15T14:48:14Z",
|
"created_at": "2021-11-15T14:48:14Z",
|
||||||
"updated_at": "2025-01-04T15:32:04Z",
|
"updated_at": "2025-01-05T16:37:14Z",
|
||||||
"pushed_at": "2024-10-31T18:50:48Z",
|
"pushed_at": "2024-10-31T18:50:48Z",
|
||||||
"stargazers_count": 77,
|
"stargazers_count": 78,
|
||||||
"watchers_count": 77,
|
"watchers_count": 78,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 9,
|
"forks_count": 9,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -32,7 +32,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 9,
|
"forks": 9,
|
||||||
"watchers": 77,
|
"watchers": 78,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "POC for CVE-2021-41091",
|
"description": "POC for CVE-2021-41091",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-05-02T07:25:13Z",
|
"created_at": "2023-05-02T07:25:13Z",
|
||||||
"updated_at": "2024-09-12T10:27:44Z",
|
"updated_at": "2025-01-05T16:21:20Z",
|
||||||
"pushed_at": "2023-05-20T09:16:34Z",
|
"pushed_at": "2023-05-20T09:16:34Z",
|
||||||
"stargazers_count": 65,
|
"stargazers_count": 64,
|
||||||
"watchers_count": 65,
|
"watchers_count": 64,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 7,
|
"forks_count": 7,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 7,
|
"forks": 7,
|
||||||
"watchers": 65,
|
"watchers": 64,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
|
33
2021/CVE-2021-44967.json
Normal file
33
2021/CVE-2021-44967.json
Normal file
|
@ -0,0 +1,33 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"id": 912395761,
|
||||||
|
"name": "LimeSurvey-RCE",
|
||||||
|
"full_name": "D3Ext\/LimeSurvey-RCE",
|
||||||
|
"owner": {
|
||||||
|
"login": "D3Ext",
|
||||||
|
"id": 67125397,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67125397?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/D3Ext",
|
||||||
|
"user_view_type": "public"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/D3Ext\/LimeSurvey-RCE",
|
||||||
|
"description": "POC exploit for CVE-2021-44967",
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2025-01-05T13:12:07Z",
|
||||||
|
"updated_at": "2025-01-05T13:13:21Z",
|
||||||
|
"pushed_at": "2025-01-05T13:13:17Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
|
}
|
||||||
|
]
|
|
@ -29,36 +29,5 @@
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
|
||||||
{
|
|
||||||
"id": 448040948,
|
|
||||||
"name": "CVE-2021-45745",
|
|
||||||
"full_name": "plsanu\/CVE-2021-45745",
|
|
||||||
"owner": {
|
|
||||||
"login": "plsanu",
|
|
||||||
"id": 61007700,
|
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
|
|
||||||
"html_url": "https:\/\/github.com\/plsanu",
|
|
||||||
"user_view_type": "public"
|
|
||||||
},
|
|
||||||
"html_url": "https:\/\/github.com\/plsanu\/CVE-2021-45745",
|
|
||||||
"description": "CVE-2021-45745 - A Stored Cross Site Scripting (XSS) vulnerability exists in Bludit 3.13.1 via the About Plugin in login panel. Application stores attacker injected dangerous JavaScript in to the database and executes without validating.",
|
|
||||||
"fork": false,
|
|
||||||
"created_at": "2022-01-14T16:52:08Z",
|
|
||||||
"updated_at": "2023-12-30T08:24:27Z",
|
|
||||||
"pushed_at": "2022-01-14T16:52:45Z",
|
|
||||||
"stargazers_count": 1,
|
|
||||||
"watchers_count": 1,
|
|
||||||
"has_discussions": false,
|
|
||||||
"forks_count": 0,
|
|
||||||
"allow_forking": true,
|
|
||||||
"is_template": false,
|
|
||||||
"web_commit_signoff_required": false,
|
|
||||||
"topics": [],
|
|
||||||
"visibility": "public",
|
|
||||||
"forks": 0,
|
|
||||||
"watchers": 1,
|
|
||||||
"score": 0,
|
|
||||||
"subscribers_count": 1
|
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -64,7 +64,7 @@
|
||||||
"description": "test 反向辣鸡数据投放 CVE-2022-23305 工具 利用 教程 Exploit POC ",
|
"description": "test 反向辣鸡数据投放 CVE-2022-23305 工具 利用 教程 Exploit POC ",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-01-21T05:07:59Z",
|
"created_at": "2022-01-21T05:07:59Z",
|
||||||
"updated_at": "2022-11-05T22:58:02Z",
|
"updated_at": "2025-01-05T13:55:52Z",
|
||||||
"pushed_at": "2022-01-21T05:21:25Z",
|
"pushed_at": "2022-01-21T05:21:25Z",
|
||||||
"stargazers_count": 5,
|
"stargazers_count": 5,
|
||||||
"watchers_count": 5,
|
"watchers_count": 5,
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "CVE-2022-25375 - Demo exploit of RNDIS USB Gadget",
|
"description": "CVE-2022-25375 - Demo exploit of RNDIS USB Gadget",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-02-17T14:02:58Z",
|
"created_at": "2022-02-17T14:02:58Z",
|
||||||
"updated_at": "2025-01-05T05:53:23Z",
|
"updated_at": "2025-01-05T14:13:23Z",
|
||||||
"pushed_at": "2022-02-20T19:56:48Z",
|
"pushed_at": "2022-02-20T19:56:48Z",
|
||||||
"stargazers_count": 6,
|
"stargazers_count": 7,
|
||||||
"watchers_count": 6,
|
"watchers_count": 7,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 2,
|
"forks_count": 2,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 2,
|
"forks": 2,
|
||||||
"watchers": 6,
|
"watchers": 7,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
}
|
}
|
||||||
|
|
|
@ -336,10 +336,10 @@
|
||||||
"description": "iOS customization app powered by CVE-2022-46689. No jailbreak required.",
|
"description": "iOS customization app powered by CVE-2022-46689. No jailbreak required.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-02-12T01:33:45Z",
|
"created_at": "2023-02-12T01:33:45Z",
|
||||||
"updated_at": "2025-01-05T04:38:44Z",
|
"updated_at": "2025-01-05T16:49:42Z",
|
||||||
"pushed_at": "2023-02-12T01:33:48Z",
|
"pushed_at": "2023-02-12T01:33:48Z",
|
||||||
"stargazers_count": 18,
|
"stargazers_count": 17,
|
||||||
"watchers_count": 18,
|
"watchers_count": 17,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 4,
|
"forks_count": 4,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -348,7 +348,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 4,
|
"forks": 4,
|
||||||
"watchers": 18,
|
"watchers": 17,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
},
|
},
|
||||||
|
|
|
@ -45,10 +45,10 @@
|
||||||
"description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)",
|
"description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-02-24T13:54:42Z",
|
"created_at": "2023-02-24T13:54:42Z",
|
||||||
"updated_at": "2025-01-05T05:24:23Z",
|
"updated_at": "2025-01-05T12:47:00Z",
|
||||||
"pushed_at": "2023-02-24T13:29:38Z",
|
"pushed_at": "2023-02-24T13:29:38Z",
|
||||||
"stargazers_count": 64,
|
"stargazers_count": 65,
|
||||||
"watchers_count": 64,
|
"watchers_count": 65,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 108,
|
"forks_count": 108,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -57,7 +57,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 108,
|
"forks": 108,
|
||||||
"watchers": 64,
|
"watchers": 65,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
|
|
@ -209,10 +209,10 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-07-10T06:38:14Z",
|
"created_at": "2023-07-10T06:38:14Z",
|
||||||
"updated_at": "2024-10-26T17:02:01Z",
|
"updated_at": "2025-01-05T17:10:39Z",
|
||||||
"pushed_at": "2023-07-13T06:20:19Z",
|
"pushed_at": "2023-07-13T06:20:19Z",
|
||||||
"stargazers_count": 5,
|
"stargazers_count": 6,
|
||||||
"watchers_count": 5,
|
"watchers_count": 6,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 1,
|
"forks_count": 1,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -221,7 +221,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1,
|
"forks": 1,
|
||||||
"watchers": 5,
|
"watchers": 6,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "EXP for CVE-2023-28434 MinIO unauthorized to RCE",
|
"description": "EXP for CVE-2023-28434 MinIO unauthorized to RCE",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-03-27T08:53:04Z",
|
"created_at": "2023-03-27T08:53:04Z",
|
||||||
"updated_at": "2024-11-21T06:22:45Z",
|
"updated_at": "2025-01-05T17:25:07Z",
|
||||||
"pushed_at": "2023-04-04T05:26:59Z",
|
"pushed_at": "2023-04-04T05:26:59Z",
|
||||||
"stargazers_count": 307,
|
"stargazers_count": 308,
|
||||||
"watchers_count": 307,
|
"watchers_count": 308,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 38,
|
"forks_count": 38,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -29,7 +29,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 38,
|
"forks": 38,
|
||||||
"watchers": 307,
|
"watchers": 308,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 3
|
"subscribers_count": 3
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,19 +14,19 @@
|
||||||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-01-16T06:52:02Z",
|
"created_at": "2024-01-16T06:52:02Z",
|
||||||
"updated_at": "2025-01-05T11:09:21Z",
|
"updated_at": "2025-01-05T17:27:45Z",
|
||||||
"pushed_at": "2024-08-18T08:26:46Z",
|
"pushed_at": "2024-08-18T08:26:46Z",
|
||||||
"stargazers_count": 1357,
|
"stargazers_count": 1358,
|
||||||
"watchers_count": 1357,
|
"watchers_count": 1358,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 228,
|
"forks_count": 229,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 228,
|
"forks": 229,
|
||||||
"watchers": 1357,
|
"watchers": 1358,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 21
|
"subscribers_count": 21
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "CVE-2023-6319 proof of concept",
|
"description": "CVE-2023-6319 proof of concept",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-04-11T18:58:17Z",
|
"created_at": "2024-04-11T18:58:17Z",
|
||||||
"updated_at": "2025-01-03T09:17:30Z",
|
"updated_at": "2025-01-05T15:56:13Z",
|
||||||
"pushed_at": "2024-10-17T11:18:46Z",
|
"pushed_at": "2024-10-17T11:18:46Z",
|
||||||
"stargazers_count": 39,
|
"stargazers_count": 40,
|
||||||
"watchers_count": 39,
|
"watchers_count": 40,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 4,
|
"forks_count": 4,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -31,7 +31,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 4,
|
"forks": 4,
|
||||||
"watchers": 39,
|
"watchers": 40,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 5
|
"subscribers_count": 5
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-03-20T21:16:41Z",
|
"created_at": "2024-03-20T21:16:41Z",
|
||||||
"updated_at": "2025-01-03T15:13:52Z",
|
"updated_at": "2025-01-05T13:37:59Z",
|
||||||
"pushed_at": "2024-04-17T16:09:54Z",
|
"pushed_at": "2024-04-17T16:09:54Z",
|
||||||
"stargazers_count": 2318,
|
"stargazers_count": 2319,
|
||||||
"watchers_count": 2318,
|
"watchers_count": 2319,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 300,
|
"forks_count": 300,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -32,7 +32,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 300,
|
"forks": 300,
|
||||||
"watchers": 2318,
|
"watchers": 2319,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 26
|
"subscribers_count": 26
|
||||||
},
|
},
|
||||||
|
|
|
@ -29,5 +29,36 @@
|
||||||
"watchers": 2,
|
"watchers": 2,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": 912431927,
|
||||||
|
"name": "CVE-2024-2667-Poc",
|
||||||
|
"full_name": "Nxploited\/CVE-2024-2667-Poc",
|
||||||
|
"owner": {
|
||||||
|
"login": "Nxploited",
|
||||||
|
"id": 188819918,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188819918?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/Nxploited",
|
||||||
|
"user_view_type": "public"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/Nxploited\/CVE-2024-2667-Poc",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2025-01-05T15:03:50Z",
|
||||||
|
"updated_at": "2025-01-05T16:21:03Z",
|
||||||
|
"pushed_at": "2025-01-05T16:21:00Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -14,10 +14,10 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-06-24T10:37:26Z",
|
"created_at": "2024-06-24T10:37:26Z",
|
||||||
"updated_at": "2025-01-05T01:29:42Z",
|
"updated_at": "2025-01-05T12:50:13Z",
|
||||||
"pushed_at": "2024-07-31T19:11:55Z",
|
"pushed_at": "2024-07-31T19:11:55Z",
|
||||||
"stargazers_count": 245,
|
"stargazers_count": 246,
|
||||||
"watchers_count": 245,
|
"watchers_count": 246,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 54,
|
"forks_count": 54,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 54,
|
"forks": 54,
|
||||||
"watchers": 245,
|
"watchers": 246,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 3
|
"subscribers_count": 3
|
||||||
},
|
},
|
||||||
|
|
|
@ -200,19 +200,19 @@
|
||||||
"description": "Zabbix CVE-2024-42327 PoC",
|
"description": "Zabbix CVE-2024-42327 PoC",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2025-01-01T18:25:44Z",
|
"created_at": "2025-01-01T18:25:44Z",
|
||||||
"updated_at": "2025-01-05T07:51:36Z",
|
"updated_at": "2025-01-05T14:59:02Z",
|
||||||
"pushed_at": "2025-01-03T13:49:03Z",
|
"pushed_at": "2025-01-03T13:49:03Z",
|
||||||
"stargazers_count": 5,
|
"stargazers_count": 8,
|
||||||
"watchers_count": 5,
|
"watchers_count": 8,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 2,
|
"forks_count": 3,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 2,
|
"forks": 3,
|
||||||
"watchers": 5,
|
"watchers": 8,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
|
@ -324,5 +324,40 @@
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": 912425407,
|
||||||
|
"name": "WEAPONIZING-CVE-2024-4367",
|
||||||
|
"full_name": "exfil0\/WEAPONIZING-CVE-2024-4367",
|
||||||
|
"owner": {
|
||||||
|
"login": "exfil0",
|
||||||
|
"id": 84948741,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84948741?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/exfil0",
|
||||||
|
"user_view_type": "public"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/exfil0\/WEAPONIZING-CVE-2024-4367",
|
||||||
|
"description": "CVE-2024-4367 is a critical vulnerability (CVSS 9.8) in PDF.js, allowing arbitrary JavaScript code execution due to insufficient type checks on the FontMatrix object within PDF files.",
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2025-01-05T14:44:01Z",
|
||||||
|
"updated_at": "2025-01-05T15:09:38Z",
|
||||||
|
"pushed_at": "2025-01-05T15:09:35Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [
|
||||||
|
"cve-2024-4367",
|
||||||
|
"spyware",
|
||||||
|
"weaponized"
|
||||||
|
],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "Information & PoC for CVE-2024-45200, Mario Kart 8 Deluxe's \"KartLANPwn\" buffer overflow vulnerability",
|
"description": "Information & PoC for CVE-2024-45200, Mario Kart 8 Deluxe's \"KartLANPwn\" buffer overflow vulnerability",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-09-13T00:41:32Z",
|
"created_at": "2024-09-13T00:41:32Z",
|
||||||
"updated_at": "2024-12-20T01:07:07Z",
|
"updated_at": "2025-01-05T15:43:39Z",
|
||||||
"pushed_at": "2024-10-01T00:57:03Z",
|
"pushed_at": "2024-10-01T00:57:03Z",
|
||||||
"stargazers_count": 54,
|
"stargazers_count": 55,
|
||||||
"watchers_count": 54,
|
"watchers_count": 55,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 1,
|
"forks_count": 1,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -32,7 +32,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1,
|
"forks": 1,
|
||||||
"watchers": 54,
|
"watchers": 55,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,19 +14,19 @@
|
||||||
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113",
|
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2025-01-01T15:48:38Z",
|
"created_at": "2025-01-01T15:48:38Z",
|
||||||
"updated_at": "2025-01-05T09:22:19Z",
|
"updated_at": "2025-01-05T14:27:28Z",
|
||||||
"pushed_at": "2025-01-02T16:07:23Z",
|
"pushed_at": "2025-01-02T16:07:23Z",
|
||||||
"stargazers_count": 340,
|
"stargazers_count": 344,
|
||||||
"watchers_count": 340,
|
"watchers_count": 344,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 78,
|
"forks_count": 79,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 78,
|
"forks": 79,
|
||||||
"watchers": 340,
|
"watchers": 344,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 3
|
"subscribers_count": 3
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "CVE-2024-51567 is a Python PoC exploit targeting an RCE vulnerability in CyberPanel v2.3.6’s upgrademysqlstatus endpoint, bypassing CSRF protections.",
|
"description": "CVE-2024-51567 is a Python PoC exploit targeting an RCE vulnerability in CyberPanel v2.3.6’s upgrademysqlstatus endpoint, bypassing CSRF protections.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-10-31T21:55:57Z",
|
"created_at": "2024-10-31T21:55:57Z",
|
||||||
"updated_at": "2024-12-11T09:00:00Z",
|
"updated_at": "2025-01-05T16:12:36Z",
|
||||||
"pushed_at": "2024-11-01T10:48:42Z",
|
"pushed_at": "2024-11-01T10:48:42Z",
|
||||||
"stargazers_count": 3,
|
"stargazers_count": 4,
|
||||||
"watchers_count": 3,
|
"watchers_count": 4,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -29,7 +29,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 3,
|
"watchers": 4,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
|
|
@ -653,10 +653,10 @@
|
||||||
"description": "This Python script exploits a remote code execution vulnerability (CVE-2024-6387) in OpenSSH.",
|
"description": "This Python script exploits a remote code execution vulnerability (CVE-2024-6387) in OpenSSH.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-07-02T06:53:35Z",
|
"created_at": "2024-07-02T06:53:35Z",
|
||||||
"updated_at": "2024-12-17T12:52:05Z",
|
"updated_at": "2025-01-05T15:46:06Z",
|
||||||
"pushed_at": "2024-07-04T20:04:30Z",
|
"pushed_at": "2024-07-04T20:04:30Z",
|
||||||
"stargazers_count": 34,
|
"stargazers_count": 35,
|
||||||
"watchers_count": 34,
|
"watchers_count": 35,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 11,
|
"forks_count": 11,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -665,7 +665,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 11,
|
"forks": 11,
|
||||||
"watchers": 34,
|
"watchers": 35,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
@ -1159,10 +1159,10 @@
|
||||||
"description": "CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.",
|
"description": "CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-07-02T14:41:43Z",
|
"created_at": "2024-07-02T14:41:43Z",
|
||||||
"updated_at": "2024-12-26T06:26:46Z",
|
"updated_at": "2025-01-05T15:39:31Z",
|
||||||
"pushed_at": "2024-07-02T15:16:04Z",
|
"pushed_at": "2024-07-02T15:16:04Z",
|
||||||
"stargazers_count": 31,
|
"stargazers_count": 32,
|
||||||
"watchers_count": 31,
|
"watchers_count": 32,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 8,
|
"forks_count": 8,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -1181,7 +1181,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 8,
|
"forks": 8,
|
||||||
"watchers": 31,
|
"watchers": 32,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "This repository contains an exploit for CVE-2024-7703 in the ARMember WordPress plugin. It allows attackers with Subscriber-level access or higher to upload SVG files with malicious JavaScript, leading to Stored XSS attacks. This can result in executing scripts when the file is accessed, potentially compromising user sessions or data.",
|
"description": "This repository contains an exploit for CVE-2024-7703 in the ARMember WordPress plugin. It allows attackers with Subscriber-level access or higher to upload SVG files with malicious JavaScript, leading to Stored XSS attacks. This can result in executing scripts when the file is accessed, potentially compromising user sessions or data.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-08-17T14:44:08Z",
|
"created_at": "2024-08-17T14:44:08Z",
|
||||||
"updated_at": "2024-08-22T02:30:08Z",
|
"updated_at": "2025-01-05T14:30:25Z",
|
||||||
"pushed_at": "2024-08-17T14:51:10Z",
|
"pushed_at": "2024-08-17T14:51:10Z",
|
||||||
"stargazers_count": 1,
|
"stargazers_count": 2,
|
||||||
"watchers_count": 1,
|
"watchers_count": 2,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 1,
|
"watchers": 2,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
10
README.md
10
README.md
|
@ -571,6 +571,7 @@
|
||||||
</code>
|
</code>
|
||||||
|
|
||||||
- [Puvipavan/CVE-2024-2667](https://github.com/Puvipavan/CVE-2024-2667)
|
- [Puvipavan/CVE-2024-2667](https://github.com/Puvipavan/CVE-2024-2667)
|
||||||
|
- [Nxploited/CVE-2024-2667-Poc](https://github.com/Nxploited/CVE-2024-2667-Poc)
|
||||||
|
|
||||||
### CVE-2024-2876 (2024-05-02)
|
### CVE-2024-2876 (2024-05-02)
|
||||||
|
|
||||||
|
@ -970,6 +971,7 @@
|
||||||
- [UnHackerEnCapital/PDFernetRemotelo](https://github.com/UnHackerEnCapital/PDFernetRemotelo)
|
- [UnHackerEnCapital/PDFernetRemotelo](https://github.com/UnHackerEnCapital/PDFernetRemotelo)
|
||||||
- [Masamuneee/CVE-2024-4367-Analysis](https://github.com/Masamuneee/CVE-2024-4367-Analysis)
|
- [Masamuneee/CVE-2024-4367-Analysis](https://github.com/Masamuneee/CVE-2024-4367-Analysis)
|
||||||
- [pedrochalegre7/CVE-2024-4367-pdf-sample](https://github.com/pedrochalegre7/CVE-2024-4367-pdf-sample)
|
- [pedrochalegre7/CVE-2024-4367-pdf-sample](https://github.com/pedrochalegre7/CVE-2024-4367-pdf-sample)
|
||||||
|
- [exfil0/WEAPONIZING-CVE-2024-4367](https://github.com/exfil0/WEAPONIZING-CVE-2024-4367)
|
||||||
|
|
||||||
### CVE-2024-4406 (2024-05-02)
|
### CVE-2024-4406 (2024-05-02)
|
||||||
|
|
||||||
|
@ -29497,6 +29499,13 @@
|
||||||
### CVE-2021-44910
|
### CVE-2021-44910
|
||||||
- [W000i/CVE-2021-44910_SpringBlade](https://github.com/W000i/CVE-2021-44910_SpringBlade)
|
- [W000i/CVE-2021-44910_SpringBlade](https://github.com/W000i/CVE-2021-44910_SpringBlade)
|
||||||
|
|
||||||
|
### CVE-2021-44967 (2022-02-22)
|
||||||
|
|
||||||
|
<code>A Remote Code Execution (RCE) vulnerabilty exists in LimeSurvey 5.2.4 via the upload and install plugins function, which could let a remote malicious user upload an arbitrary PHP code file.
|
||||||
|
</code>
|
||||||
|
|
||||||
|
- [D3Ext/LimeSurvey-RCE](https://github.com/D3Ext/LimeSurvey-RCE)
|
||||||
|
|
||||||
### CVE-2021-45007 (2022-02-20)
|
### CVE-2021-45007 (2022-02-20)
|
||||||
|
|
||||||
<code>Plesk 18.0.37 is affected by a Cross Site Request Forgery (CSRF) vulnerability that allows an attacker to insert data on the user and admin panel. NOTE: the vendor states that this is only a site-specific problem on websites of one or more Plesk users
|
<code>Plesk 18.0.37 is affected by a Cross Site Request Forgery (CSRF) vulnerability that allows an attacker to insert data on the user and admin panel. NOTE: the vendor states that this is only a site-specific problem on websites of one or more Plesk users
|
||||||
|
@ -29636,7 +29645,6 @@
|
||||||
</code>
|
</code>
|
||||||
|
|
||||||
- [plsanu/Bludit-3.13.1-About-Plugin-Stored-Cross-Site-Scripting-XSS](https://github.com/plsanu/Bludit-3.13.1-About-Plugin-Stored-Cross-Site-Scripting-XSS)
|
- [plsanu/Bludit-3.13.1-About-Plugin-Stored-Cross-Site-Scripting-XSS](https://github.com/plsanu/Bludit-3.13.1-About-Plugin-Stored-Cross-Site-Scripting-XSS)
|
||||||
- [plsanu/CVE-2021-45745](https://github.com/plsanu/CVE-2021-45745)
|
|
||||||
|
|
||||||
### CVE-2021-45897 (2022-01-28)
|
### CVE-2021-45897 (2022-01-28)
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue