Auto Update 2024/03/24 12:26:52

This commit is contained in:
motikan2010-bot 2024-03-24 21:26:52 +09:00
parent c6eb434f0e
commit 49c0d5439f
36 changed files with 317 additions and 115 deletions

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-03-16T11:08:04Z", "updated_at": "2024-03-24T09:06:37Z",
"pushed_at": "2023-11-24T09:21:56Z", "pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1896, "stargazers_count": 1897,
"watchers_count": 1896, "watchers_count": 1897,
"has_discussions": true, "has_discussions": true,
"forks_count": 331, "forks_count": 331,
"allow_forking": true, "allow_forking": true,
@ -76,7 +76,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 331, "forks": 331,
"watchers": 1896, "watchers": 1897,
"score": 0, "score": 0,
"subscribers_count": 35 "subscribers_count": 35
}, },

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-03-16T11:08:04Z", "updated_at": "2024-03-24T09:06:37Z",
"pushed_at": "2023-11-24T09:21:56Z", "pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1896, "stargazers_count": 1897,
"watchers_count": 1896, "watchers_count": 1897,
"has_discussions": true, "has_discussions": true,
"forks_count": 331, "forks_count": 331,
"allow_forking": true, "allow_forking": true,
@ -46,7 +46,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 331, "forks": 331,
"watchers": 1896, "watchers": 1897,
"score": 0, "score": 0,
"subscribers_count": 35 "subscribers_count": 35
}, },

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-03-16T11:08:04Z", "updated_at": "2024-03-24T09:06:37Z",
"pushed_at": "2023-11-24T09:21:56Z", "pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1896, "stargazers_count": 1897,
"watchers_count": 1896, "watchers_count": 1897,
"has_discussions": true, "has_discussions": true,
"forks_count": 331, "forks_count": 331,
"allow_forking": true, "allow_forking": true,
@ -76,7 +76,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 331, "forks": 331,
"watchers": 1896, "watchers": 1897,
"score": 0, "score": 0,
"subscribers_count": 35 "subscribers_count": 35
}, },

View file

@ -557,10 +557,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-03-16T11:08:04Z", "updated_at": "2024-03-24T09:06:37Z",
"pushed_at": "2023-11-24T09:21:56Z", "pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1896, "stargazers_count": 1897,
"watchers_count": 1896, "watchers_count": 1897,
"has_discussions": true, "has_discussions": true,
"forks_count": 331, "forks_count": 331,
"allow_forking": true, "allow_forking": true,
@ -590,7 +590,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 331, "forks": 331,
"watchers": 1896, "watchers": 1897,
"score": 0, "score": 0,
"subscribers_count": 35 "subscribers_count": 35
}, },

View file

@ -13,10 +13,10 @@
"description": "Exploit I discovered in October of 2022 with androids Package manager binary (pm) and the way it handled debugging flags, patched out by march 2023. Uses CVE-2019-16253 as a payload to obtain a system shell. ", "description": "Exploit I discovered in October of 2022 with androids Package manager binary (pm) and the way it handled debugging flags, patched out by march 2023. Uses CVE-2019-16253 as a payload to obtain a system shell. ",
"fork": false, "fork": false,
"created_at": "2023-01-19T19:47:13Z", "created_at": "2023-01-19T19:47:13Z",
"updated_at": "2024-03-23T13:26:57Z", "updated_at": "2024-03-24T08:10:00Z",
"pushed_at": "2024-03-20T19:12:39Z", "pushed_at": "2024-03-20T19:12:39Z",
"stargazers_count": 63, "stargazers_count": 64,
"watchers_count": 63, "watchers_count": 64,
"has_discussions": false, "has_discussions": false,
"forks_count": 10, "forks_count": 10,
"allow_forking": true, "allow_forking": true,
@ -32,7 +32,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 10, "forks": 10,
"watchers": 63, "watchers": 64,
"score": 0, "score": 0,
"subscribers_count": 10 "subscribers_count": 10
} }

View file

@ -193,10 +193,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-03-16T11:08:04Z", "updated_at": "2024-03-24T09:06:37Z",
"pushed_at": "2023-11-24T09:21:56Z", "pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1896, "stargazers_count": 1897,
"watchers_count": 1896, "watchers_count": 1897,
"has_discussions": true, "has_discussions": true,
"forks_count": 331, "forks_count": 331,
"allow_forking": true, "allow_forking": true,
@ -226,7 +226,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 331, "forks": 331,
"watchers": 1896, "watchers": 1897,
"score": 0, "score": 0,
"subscribers_count": 35 "subscribers_count": 35
} }

View file

@ -13,10 +13,10 @@
"description": "Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)", "description": "Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)",
"fork": false, "fork": false,
"created_at": "2019-02-12T22:07:47Z", "created_at": "2019-02-12T22:07:47Z",
"updated_at": "2024-03-14T10:40:36Z", "updated_at": "2024-03-24T09:42:22Z",
"pushed_at": "2019-02-20T15:35:34Z", "pushed_at": "2019-02-20T15:35:34Z",
"stargazers_count": 206, "stargazers_count": 207,
"watchers_count": 206, "watchers_count": 207,
"has_discussions": false, "has_discussions": false,
"forks_count": 69, "forks_count": 69,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 69, "forks": 69,
"watchers": 206, "watchers": 207,
"score": 0, "score": 0,
"subscribers_count": 12 "subscribers_count": 12
}, },

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-03-16T11:08:04Z", "updated_at": "2024-03-24T09:06:37Z",
"pushed_at": "2023-11-24T09:21:56Z", "pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1896, "stargazers_count": 1897,
"watchers_count": 1896, "watchers_count": 1897,
"has_discussions": true, "has_discussions": true,
"forks_count": 331, "forks_count": 331,
"allow_forking": true, "allow_forking": true,
@ -46,7 +46,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 331, "forks": 331,
"watchers": 1896, "watchers": 1897,
"score": 0, "score": 0,
"subscribers_count": 35 "subscribers_count": 35
}, },

View file

@ -133,10 +133,10 @@
"description": "Confluence Server Webwork OGNL injection", "description": "Confluence Server Webwork OGNL injection",
"fork": false, "fork": false,
"created_at": "2021-09-01T07:15:17Z", "created_at": "2021-09-01T07:15:17Z",
"updated_at": "2024-03-14T10:40:52Z", "updated_at": "2024-03-24T11:20:48Z",
"pushed_at": "2021-12-03T22:09:31Z", "pushed_at": "2021-12-03T22:09:31Z",
"stargazers_count": 301, "stargazers_count": 302,
"watchers_count": 301, "watchers_count": 302,
"has_discussions": false, "has_discussions": false,
"forks_count": 83, "forks_count": 83,
"allow_forking": true, "allow_forking": true,
@ -145,7 +145,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 83, "forks": 83,
"watchers": 301, "watchers": 302,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2021-30807", "description": "Exploit for CVE-2021-30807",
"fork": false, "fork": false,
"created_at": "2021-10-09T20:11:42Z", "created_at": "2021-10-09T20:11:42Z",
"updated_at": "2024-03-23T02:12:52Z", "updated_at": "2024-03-24T11:23:16Z",
"pushed_at": "2021-11-29T13:50:42Z", "pushed_at": "2021-11-29T13:50:42Z",
"stargazers_count": 130, "stargazers_count": 131,
"watchers_count": 130, "watchers_count": 131,
"has_discussions": false, "has_discussions": false,
"forks_count": 31, "forks_count": 31,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 31, "forks": 31,
"watchers": 130, "watchers": 131,
"score": 0, "score": 0,
"subscribers_count": 5 "subscribers_count": 5
}, },

View file

@ -470,10 +470,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2021-01-30T20:39:58Z", "created_at": "2021-01-30T20:39:58Z",
"updated_at": "2024-03-22T16:11:16Z", "updated_at": "2024-03-24T09:25:36Z",
"pushed_at": "2021-02-02T17:07:09Z", "pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 913, "stargazers_count": 914,
"watchers_count": 913, "watchers_count": 914,
"has_discussions": false, "has_discussions": false,
"forks_count": 235, "forks_count": 235,
"allow_forking": true, "allow_forking": true,
@ -482,7 +482,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 235, "forks": 235,
"watchers": 913, "watchers": 914,
"score": 0, "score": 0,
"subscribers_count": 27 "subscribers_count": 27
}, },
@ -1074,10 +1074,10 @@
"description": "Sudo Baron Samedit Exploit", "description": "Sudo Baron Samedit Exploit",
"fork": false, "fork": false,
"created_at": "2021-03-15T17:37:02Z", "created_at": "2021-03-15T17:37:02Z",
"updated_at": "2024-03-12T10:57:18Z", "updated_at": "2024-03-24T09:17:44Z",
"pushed_at": "2022-01-13T05:48:01Z", "pushed_at": "2022-01-13T05:48:01Z",
"stargazers_count": 703, "stargazers_count": 704,
"watchers_count": 703, "watchers_count": 704,
"has_discussions": false, "has_discussions": false,
"forks_count": 165, "forks_count": 165,
"allow_forking": true, "allow_forking": true,
@ -1086,7 +1086,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 165, "forks": 165,
"watchers": 703, "watchers": 704,
"score": 0, "score": 0,
"subscribers_count": 11 "subscribers_count": 11
}, },

View file

@ -750,5 +750,35 @@
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 776748749,
"name": "CVE-2021-3560-EXPLOIT",
"full_name": "Kyyomaa\/CVE-2021-3560-EXPLOIT",
"owner": {
"login": "Kyyomaa",
"id": 123502260,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123502260?v=4",
"html_url": "https:\/\/github.com\/Kyyomaa"
},
"html_url": "https:\/\/github.com\/Kyyomaa\/CVE-2021-3560-EXPLOIT",
"description": "Part of my cybersecurity thesis consists in exploring and exploiting this vulnerability.",
"fork": false,
"created_at": "2024-03-24T11:37:18Z",
"updated_at": "2024-03-24T11:39:41Z",
"pushed_at": "2024-03-24T12:05:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false, "fork": false,
"created_at": "2021-12-10T23:19:28Z", "created_at": "2021-12-10T23:19:28Z",
"updated_at": "2024-03-23T22:49:13Z", "updated_at": "2024-03-24T07:07:43Z",
"pushed_at": "2024-02-12T22:37:25Z", "pushed_at": "2024-02-12T22:37:25Z",
"stargazers_count": 1729, "stargazers_count": 1730,
"watchers_count": 1729, "watchers_count": 1730,
"has_discussions": false, "has_discussions": false,
"forks_count": 516, "forks_count": 516,
"allow_forking": true, "allow_forking": true,
@ -924,7 +924,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 516, "forks": 516,
"watchers": 1729, "watchers": 1730,
"score": 0, "score": 0,
"subscribers_count": 28 "subscribers_count": 28
}, },

View file

@ -193,10 +193,10 @@
"description": "Docker Breakout Checker and PoC via CAP_SYS_ADMIN and via user namespaces (CVE-2022-0492)", "description": "Docker Breakout Checker and PoC via CAP_SYS_ADMIN and via user namespaces (CVE-2022-0492)",
"fork": false, "fork": false,
"created_at": "2023-02-18T04:48:25Z", "created_at": "2023-02-18T04:48:25Z",
"updated_at": "2023-05-30T00:56:36Z", "updated_at": "2024-03-24T09:39:48Z",
"pushed_at": "2023-02-18T05:28:02Z", "pushed_at": "2023-02-18T05:28:02Z",
"stargazers_count": 1, "stargazers_count": 2,
"watchers_count": 1, "watchers_count": 2,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -212,7 +212,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 1, "watchers": 2,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-21660", "description": "CVE-2022-21660",
"fork": false, "fork": false,
"created_at": "2022-01-10T05:50:35Z", "created_at": "2022-01-10T05:50:35Z",
"updated_at": "2024-01-26T09:40:56Z", "updated_at": "2024-03-24T07:37:20Z",
"pushed_at": "2022-01-10T05:52:03Z", "pushed_at": "2022-01-10T05:52:03Z",
"stargazers_count": 24, "stargazers_count": 25,
"watchers_count": 24, "watchers_count": 25,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 24, "watchers": 25,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -309,5 +309,35 @@
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 776679745,
"name": "WordPress--CVE-2022-21661",
"full_name": "CharonDefalt\/WordPress--CVE-2022-21661",
"owner": {
"login": "CharonDefalt",
"id": 103410775,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103410775?v=4",
"html_url": "https:\/\/github.com\/CharonDefalt"
},
"html_url": "https:\/\/github.com\/CharonDefalt\/WordPress--CVE-2022-21661",
"description": null,
"fork": false,
"created_at": "2024-03-24T07:03:35Z",
"updated_at": "2024-03-24T07:03:35Z",
"pushed_at": "2024-03-24T07:03:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

View file

@ -153,5 +153,35 @@
"watchers": 0, "watchers": 0,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
},
{
"id": 776718207,
"name": "spring-security-CVE-2022-22978",
"full_name": "mukeshkumar286\/spring-security-CVE-2022-22978",
"owner": {
"login": "mukeshkumar286",
"id": 17064062,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17064062?v=4",
"html_url": "https:\/\/github.com\/mukeshkumar286"
},
"html_url": "https:\/\/github.com\/mukeshkumar286\/spring-security-CVE-2022-22978",
"description": null,
"fork": false,
"created_at": "2024-03-24T09:42:40Z",
"updated_at": "2024-03-24T09:42:40Z",
"pushed_at": "2024-03-24T10:28:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
} }
] ]

32
2022/CVE-2022-32898.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 776714071,
"name": "CVE-2022-32898",
"full_name": "ox1111\/CVE-2022-32898",
"owner": {
"login": "ox1111",
"id": 31942498,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31942498?v=4",
"html_url": "https:\/\/github.com\/ox1111"
},
"html_url": "https:\/\/github.com\/ox1111\/CVE-2022-32898",
"description": null,
"fork": false,
"created_at": "2024-03-24T09:26:29Z",
"updated_at": "2024-03-24T09:26:29Z",
"pushed_at": "2024-03-24T10:41:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -360,7 +360,7 @@
"stargazers_count": 8, "stargazers_count": 8,
"watchers_count": 8, "watchers_count": 8,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -373,7 +373,7 @@
"macos" "macos"
], ],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 1,
"watchers": 8, "watchers": 8,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-46718: an app may be able to read sensitive location information.", "description": "CVE-2022-46718: an app may be able to read sensitive location information.",
"fork": false, "fork": false,
"created_at": "2023-05-01T18:34:52Z", "created_at": "2023-05-01T18:34:52Z",
"updated_at": "2024-03-24T01:36:11Z", "updated_at": "2024-03-24T09:17:07Z",
"pushed_at": "2023-05-01T18:48:34Z", "pushed_at": "2023-05-01T18:48:34Z",
"stargazers_count": 14, "stargazers_count": 15,
"watchers_count": 14, "watchers_count": 15,
"has_discussions": false, "has_discussions": false,
"forks_count": 3, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 3,
"watchers": 14, "watchers": 15,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
} }

View file

@ -43,19 +43,19 @@
"description": "GameoverlayFS (CVE-2023-2640 and CVE-2023-32629) exploit in Shell Script tested on Ubuntu 20.04 Kernel 5.4.0", "description": "GameoverlayFS (CVE-2023-2640 and CVE-2023-32629) exploit in Shell Script tested on Ubuntu 20.04 Kernel 5.4.0",
"fork": false, "fork": false,
"created_at": "2023-09-17T23:17:22Z", "created_at": "2023-09-17T23:17:22Z",
"updated_at": "2024-01-28T17:45:12Z", "updated_at": "2024-03-24T07:52:03Z",
"pushed_at": "2023-09-17T23:38:32Z", "pushed_at": "2023-09-17T23:38:32Z",
"stargazers_count": 9, "stargazers_count": 10,
"watchers_count": 9, "watchers_count": 10,
"has_discussions": false, "has_discussions": false,
"forks_count": 3, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 4,
"watchers": 9, "watchers": 10,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -193,10 +193,10 @@
"description": "xortigate-cve-2023-27997", "description": "xortigate-cve-2023-27997",
"fork": false, "fork": false,
"created_at": "2023-10-12T16:12:41Z", "created_at": "2023-10-12T16:12:41Z",
"updated_at": "2024-03-18T13:17:04Z", "updated_at": "2024-03-24T10:14:48Z",
"pushed_at": "2023-10-12T16:17:23Z", "pushed_at": "2023-10-12T16:17:23Z",
"stargazers_count": 55, "stargazers_count": 56,
"watchers_count": 55, "watchers_count": 56,
"has_discussions": false, "has_discussions": false,
"forks_count": 11, "forks_count": 11,
"allow_forking": true, "allow_forking": true,
@ -205,7 +205,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 11, "forks": 11,
"watchers": 55, "watchers": 56,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },

View file

@ -13,10 +13,10 @@
"description": "WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) <= 7.6.4 - Authentication Bypass", "description": "WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) <= 7.6.4 - Authentication Bypass",
"fork": false, "fork": false,
"created_at": "2023-06-29T14:21:08Z", "created_at": "2023-06-29T14:21:08Z",
"updated_at": "2024-01-13T12:40:11Z", "updated_at": "2024-03-24T10:22:10Z",
"pushed_at": "2023-07-06T08:14:17Z", "pushed_at": "2023-07-06T08:14:17Z",
"stargazers_count": 78, "stargazers_count": 79,
"watchers_count": 78, "watchers_count": 79,
"has_discussions": false, "has_discussions": false,
"forks_count": 19, "forks_count": 19,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 19, "forks": 19,
"watchers": 78, "watchers": 79,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
}, },

View file

@ -13,10 +13,10 @@
"description": "Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation", "description": "Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation",
"fork": false, "fork": false,
"created_at": "2024-03-21T21:39:24Z", "created_at": "2024-03-21T21:39:24Z",
"updated_at": "2024-03-24T04:25:00Z", "updated_at": "2024-03-24T11:48:55Z",
"pushed_at": "2024-03-22T06:45:43Z", "pushed_at": "2024-03-22T06:45:43Z",
"stargazers_count": 58, "stargazers_count": 60,
"watchers_count": 58, "watchers_count": 60,
"has_discussions": false, "has_discussions": false,
"forks_count": 16, "forks_count": 16,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 16, "forks": 16,
"watchers": 58, "watchers": 60,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -743,10 +743,10 @@
"description": "Exploit script for Pre-Auth RCE in Metabase (CVE-2023-38646)", "description": "Exploit script for Pre-Auth RCE in Metabase (CVE-2023-38646)",
"fork": false, "fork": false,
"created_at": "2023-10-15T01:29:37Z", "created_at": "2023-10-15T01:29:37Z",
"updated_at": "2024-01-03T23:07:05Z", "updated_at": "2024-03-24T09:15:02Z",
"pushed_at": "2023-10-15T01:51:31Z", "pushed_at": "2023-10-15T01:51:31Z",
"stargazers_count": 5, "stargazers_count": 6,
"watchers_count": 5, "watchers_count": 6,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -755,7 +755,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 5, "watchers": 6,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

32
2023/CVE-2023-41724.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 776684778,
"name": "CVE-2023-41724",
"full_name": "russhackerr\/CVE-2023-41724",
"owner": {
"login": "russhackerr",
"id": 164726028,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164726028?v=4",
"html_url": "https:\/\/github.com\/russhackerr"
},
"html_url": "https:\/\/github.com\/russhackerr\/CVE-2023-41724",
"description": "CVE-2023-41724 POC RCE Ivanti",
"fork": false,
"created_at": "2024-03-24T07:25:46Z",
"updated_at": "2024-03-24T08:37:45Z",
"pushed_at": "2024-03-24T08:23:15Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Fortinet FortiClient EMS SQL Injection", "description": "Fortinet FortiClient EMS SQL Injection",
"fork": false, "fork": false,
"created_at": "2024-03-18T20:50:48Z", "created_at": "2024-03-18T20:50:48Z",
"updated_at": "2024-03-24T00:48:18Z", "updated_at": "2024-03-24T10:10:36Z",
"pushed_at": "2024-03-20T20:42:41Z", "pushed_at": "2024-03-20T20:42:41Z",
"stargazers_count": 16, "stargazers_count": 18,
"watchers_count": 16, "watchers_count": 18,
"has_discussions": false, "has_discussions": false,
"forks_count": 4, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 4,
"watchers": 16, "watchers": 18,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
} }

View file

@ -13,10 +13,10 @@
"description": "KeyTrap (DNSSEC)", "description": "KeyTrap (DNSSEC)",
"fork": false, "fork": false,
"created_at": "2024-02-18T21:50:04Z", "created_at": "2024-02-18T21:50:04Z",
"updated_at": "2024-03-19T22:48:35Z", "updated_at": "2024-03-24T10:24:32Z",
"pushed_at": "2024-02-18T22:15:14Z", "pushed_at": "2024-02-18T22:15:14Z",
"stargazers_count": 37, "stargazers_count": 38,
"watchers_count": 37, "watchers_count": 38,
"has_discussions": false, "has_discussions": false,
"forks_count": 9, "forks_count": 9,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 9, "forks": 9,
"watchers": 37, "watchers": 38,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
} }

View file

@ -125,7 +125,7 @@
"fork": false, "fork": false,
"created_at": "2024-01-02T14:20:10Z", "created_at": "2024-01-02T14:20:10Z",
"updated_at": "2024-03-21T14:04:33Z", "updated_at": "2024-03-21T14:04:33Z",
"pushed_at": "2024-03-05T14:06:45Z", "pushed_at": "2024-03-24T06:38:33Z",
"stargazers_count": 56, "stargazers_count": 56,
"watchers_count": 56, "watchers_count": 56,
"has_discussions": false, "has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "Ultimate Member Unauthorized Database Access \/ SQLi", "description": "Ultimate Member Unauthorized Database Access \/ SQLi",
"fork": false, "fork": false,
"created_at": "2024-02-27T11:41:53Z", "created_at": "2024-02-27T11:41:53Z",
"updated_at": "2024-03-13T21:52:04Z", "updated_at": "2024-03-24T10:08:34Z",
"pushed_at": "2024-02-27T11:45:50Z", "pushed_at": "2024-02-27T11:45:50Z",
"stargazers_count": 5, "stargazers_count": 6,
"watchers_count": 5, "watchers_count": 6,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 5, "watchers": 6,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },

View file

@ -13,10 +13,10 @@
"description": "Unauthenticated Command Injection In Progress Kemp LoadMaster", "description": "Unauthenticated Command Injection In Progress Kemp LoadMaster",
"fork": false, "fork": false,
"created_at": "2024-03-19T22:23:18Z", "created_at": "2024-03-19T22:23:18Z",
"updated_at": "2024-03-23T17:56:13Z", "updated_at": "2024-03-24T08:01:02Z",
"pushed_at": "2024-03-19T22:25:21Z", "pushed_at": "2024-03-19T22:25:21Z",
"stargazers_count": 7, "stargazers_count": 8,
"watchers_count": 7, "watchers_count": 8,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 7, "watchers": 8,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -18,13 +18,13 @@
"stargazers_count": 68, "stargazers_count": 68,
"watchers_count": 68, "watchers_count": 68,
"has_discussions": false, "has_discussions": false,
"forks_count": 9, "forks_count": 10,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 9, "forks": 10,
"watchers": 68, "watchers": 68,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2

32
2024/CVE-2024-2169.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 776691365,
"name": "G3-Loop-DoS",
"full_name": "douglasbuzatto\/G3-Loop-DoS",
"owner": {
"login": "douglasbuzatto",
"id": 10249957,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10249957?v=4",
"html_url": "https:\/\/github.com\/douglasbuzatto"
},
"html_url": "https:\/\/github.com\/douglasbuzatto\/G3-Loop-DoS",
"description": "This Python script automates the process of scanning for systems potentially vulnerable to the Loop DoS attack and the hypothetical CVE-2024-2169 vulnerability. It focuses on scanning ports associated with protocols susceptible to denial-of-service (DoS) attacks. The script can be used for educational purposes or authorized penetration testing.",
"fork": false,
"created_at": "2024-03-24T07:53:52Z",
"updated_at": "2024-03-24T07:56:54Z",
"pushed_at": "2024-03-24T08:00:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -163,10 +163,10 @@
"description": "The PoC demonstrates the potential for remote code execution by exploiting the identified security flaw.", "description": "The PoC demonstrates the potential for remote code execution by exploiting the identified security flaw.",
"fork": false, "fork": false,
"created_at": "2024-03-17T09:15:22Z", "created_at": "2024-03-17T09:15:22Z",
"updated_at": "2024-03-19T21:43:36Z", "updated_at": "2024-03-24T09:36:06Z",
"pushed_at": "2024-03-17T09:20:35Z", "pushed_at": "2024-03-17T09:20:35Z",
"stargazers_count": 1, "stargazers_count": 2,
"watchers_count": 1, "watchers_count": 2,
"has_discussions": false, "has_discussions": false,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
@ -175,7 +175,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 1, "watchers": 2,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -13,10 +13,10 @@
"description": "Proof-of-concept exploit for CVE-2024-25153.", "description": "Proof-of-concept exploit for CVE-2024-25153.",
"fork": false, "fork": false,
"created_at": "2024-03-12T17:26:10Z", "created_at": "2024-03-12T17:26:10Z",
"updated_at": "2024-03-23T01:14:43Z", "updated_at": "2024-03-24T10:03:04Z",
"pushed_at": "2024-03-13T09:46:07Z", "pushed_at": "2024-03-13T09:46:07Z",
"stargazers_count": 34, "stargazers_count": 35,
"watchers_count": 34, "watchers_count": 35,
"has_discussions": false, "has_discussions": false,
"forks_count": 11, "forks_count": 11,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 11, "forks": 11,
"watchers": 34, "watchers": 35,
"score": 0, "score": 0,
"subscribers_count": 5 "subscribers_count": 5
}, },

View file

@ -158,6 +158,9 @@
- [yuziiiiiiiiii/CVE-2024-2074](https://github.com/yuziiiiiiiiii/CVE-2024-2074) - [yuziiiiiiiiii/CVE-2024-2074](https://github.com/yuziiiiiiiiii/CVE-2024-2074)
### CVE-2024-2169
- [douglasbuzatto/G3-Loop-DoS](https://github.com/douglasbuzatto/G3-Loop-DoS)
### CVE-2024-2432 ### CVE-2024-2432
- [Hagrid29/CVE-2024-2432-PaloAlto-GlobalProtect-EoP](https://github.com/Hagrid29/CVE-2024-2432-PaloAlto-GlobalProtect-EoP) - [Hagrid29/CVE-2024-2432-PaloAlto-GlobalProtect-EoP](https://github.com/Hagrid29/CVE-2024-2432-PaloAlto-GlobalProtect-EoP)
@ -6347,6 +6350,9 @@
- [federella/CVE-2023-41717](https://github.com/federella/CVE-2023-41717) - [federella/CVE-2023-41717](https://github.com/federella/CVE-2023-41717)
### CVE-2023-41724
- [russhackerr/CVE-2023-41724](https://github.com/russhackerr/CVE-2023-41724)
### CVE-2023-41772 (2023-10-10) ### CVE-2023-41772 (2023-10-10)
<code>Win32k Elevation of Privilege Vulnerability <code>Win32k Elevation of Privilege Vulnerability
@ -9590,6 +9596,7 @@
- [daniel616/CVE-2022-21661-Demo](https://github.com/daniel616/CVE-2022-21661-Demo) - [daniel616/CVE-2022-21661-Demo](https://github.com/daniel616/CVE-2022-21661-Demo)
- [sealldeveloper/CVE-2022-21661-PoC](https://github.com/sealldeveloper/CVE-2022-21661-PoC) - [sealldeveloper/CVE-2022-21661-PoC](https://github.com/sealldeveloper/CVE-2022-21661-PoC)
- [p4ncontomat3/CVE-2022-21661](https://github.com/p4ncontomat3/CVE-2022-21661) - [p4ncontomat3/CVE-2022-21661](https://github.com/p4ncontomat3/CVE-2022-21661)
- [CharonDefalt/WordPress--CVE-2022-21661](https://github.com/CharonDefalt/WordPress--CVE-2022-21661)
### CVE-2022-21668 (2022-01-10) ### CVE-2022-21668 (2022-01-10)
@ -10168,6 +10175,7 @@
- [aeifkz/CVE-2022-22978](https://github.com/aeifkz/CVE-2022-22978) - [aeifkz/CVE-2022-22978](https://github.com/aeifkz/CVE-2022-22978)
- [umakant76705/CVE-2022-22978](https://github.com/umakant76705/CVE-2022-22978) - [umakant76705/CVE-2022-22978](https://github.com/umakant76705/CVE-2022-22978)
- [Raghvendra1207/CVE-2022-22978](https://github.com/Raghvendra1207/CVE-2022-22978) - [Raghvendra1207/CVE-2022-22978](https://github.com/Raghvendra1207/CVE-2022-22978)
- [mukeshkumar286/spring-security-CVE-2022-22978](https://github.com/mukeshkumar286/spring-security-CVE-2022-22978)
### CVE-2022-22980 (2022-06-22) ### CVE-2022-22980 (2022-06-22)
@ -12500,6 +12508,13 @@
- [breakpointHQ/CVE-2022-32883](https://github.com/breakpointHQ/CVE-2022-32883) - [breakpointHQ/CVE-2022-32883](https://github.com/breakpointHQ/CVE-2022-32883)
### CVE-2022-32898 (2022-11-01)
<code>The issue was addressed with improved memory handling. This issue is fixed in iOS 15.7 and iPadOS 15.7, iOS 16, macOS Ventura 13, watchOS 9. An app may be able to execute arbitrary code with kernel privileges.
</code>
- [ox1111/CVE-2022-32898](https://github.com/ox1111/CVE-2022-32898)
### CVE-2022-32947 (2022-11-01) ### CVE-2022-32947 (2022-11-01)
<code>The issue was addressed with improved memory handling. This issue is fixed in iOS 16.1 and iPadOS 16, macOS Ventura 13, watchOS 9.1. An app may be able to execute arbitrary code with kernel privileges. <code>The issue was addressed with improved memory handling. This issue is fixed in iOS 16.1 and iPadOS 16, macOS Ventura 13, watchOS 9.1. An app may be able to execute arbitrary code with kernel privileges.
@ -15748,6 +15763,7 @@
- [TieuLong21Prosper/CVE-2021-3560](https://github.com/TieuLong21Prosper/CVE-2021-3560) - [TieuLong21Prosper/CVE-2021-3560](https://github.com/TieuLong21Prosper/CVE-2021-3560)
- [LucasPDiniz/CVE-2021-3560](https://github.com/LucasPDiniz/CVE-2021-3560) - [LucasPDiniz/CVE-2021-3560](https://github.com/LucasPDiniz/CVE-2021-3560)
- [markyu0401/CVE-2021-3560-Polkit-Privilege-Escalation](https://github.com/markyu0401/CVE-2021-3560-Polkit-Privilege-Escalation) - [markyu0401/CVE-2021-3560-Polkit-Privilege-Escalation](https://github.com/markyu0401/CVE-2021-3560-Polkit-Privilege-Escalation)
- [Kyyomaa/CVE-2021-3560-EXPLOIT](https://github.com/Kyyomaa/CVE-2021-3560-EXPLOIT)
### CVE-2021-3572 (2021-11-10) ### CVE-2021-3572 (2021-11-10)