Auto Update 2022/07/14 18:21:48

This commit is contained in:
motikan2010-bot 2022-07-15 03:21:48 +09:00
parent c5d5f8d7a5
commit 505af1fd02
25 changed files with 197 additions and 129 deletions

View file

@ -13,18 +13,18 @@
"description": "Lets have fun by digging into a Zyxel router firmware and MIPS Arch",
"fork": false,
"created_at": "2019-06-11T18:00:36Z",
"updated_at": "2022-07-14T10:53:36Z",
"updated_at": "2022-07-14T12:32:18Z",
"pushed_at": "2019-06-12T20:07:46Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"forks": 1,
"watchers": 4,
"score": 0
},
{

View file

@ -68,14 +68,14 @@
{
"id": 342944268,
"name": "CVE-2015-3224-",
"full_name": "xda3m00n\/CVE-2015-3224-",
"full_name": "n000xy\/CVE-2015-3224-",
"owner": {
"login": "xda3m00n",
"login": "n000xy",
"id": 45253703,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45253703?v=4",
"html_url": "https:\/\/github.com\/xda3m00n"
"html_url": "https:\/\/github.com\/n000xy"
},
"html_url": "https:\/\/github.com\/xda3m00n\/CVE-2015-3224-",
"html_url": "https:\/\/github.com\/n000xy\/CVE-2015-3224-",
"description": "CVE-2015-3224 ",
"fork": false,
"created_at": "2021-02-27T19:47:14Z",

View file

@ -439,10 +439,10 @@
"description": "SambaCry exploit (CVE-2017-7494) ",
"fork": false,
"created_at": "2022-05-07T11:42:40Z",
"updated_at": "2022-07-13T21:04:39Z",
"updated_at": "2022-07-14T13:29:36Z",
"pushed_at": "2022-05-08T09:02:36Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
@ -450,7 +450,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 33,
"watchers": 32,
"score": 0
}
]

View file

@ -3024,13 +3024,13 @@
"pushed_at": "2022-03-28T04:10:20Z",
"stargazers_count": 86,
"watchers_count": 86,
"forks_count": 15,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 15,
"forks": 16,
"watchers": 86,
"score": 0
},

View file

@ -1,4 +1,32 @@
[
{
"id": 244704461,
"name": "cve-2019-1458_POC",
"full_name": "piotrflorczyk\/cve-2019-1458_POC",
"owner": {
"login": "piotrflorczyk",
"id": 7830144,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7830144?v=4",
"html_url": "https:\/\/github.com\/piotrflorczyk"
},
"html_url": "https:\/\/github.com\/piotrflorczyk\/cve-2019-1458_POC",
"description": "POC for cve-2019-1458",
"fork": false,
"created_at": "2020-03-03T17:55:07Z",
"updated_at": "2022-07-13T12:47:00Z",
"pushed_at": "2022-01-17T19:45:41Z",
"stargazers_count": 161,
"watchers_count": 161,
"forks_count": 55,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 55,
"watchers": 161,
"score": 0
},
{
"id": 246515470,
"name": "CVE-2019-1458",

View file

@ -111,6 +111,34 @@
"watchers": 0,
"score": 0
},
{
"id": 432475559,
"name": "CVE-2019-19609-POC-Python",
"full_name": "n000xy\/CVE-2019-19609-POC-Python",
"owner": {
"login": "n000xy",
"id": 45253703,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45253703?v=4",
"html_url": "https:\/\/github.com\/n000xy"
},
"html_url": "https:\/\/github.com\/n000xy\/CVE-2019-19609-POC-Python",
"description": "Strapi Framework, 3.0.0-beta.17.4",
"fork": false,
"created_at": "2021-11-27T13:58:18Z",
"updated_at": "2022-07-14T13:47:06Z",
"pushed_at": "2021-11-27T14:15:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 436300401,
"name": "CVE-2019-19609-EXPLOIT",

View file

@ -13,10 +13,10 @@
"description": "Root your MediaTek device with CVE-2020-0069",
"fork": false,
"created_at": "2019-09-06T12:12:48Z",
"updated_at": "2022-06-30T06:09:57Z",
"updated_at": "2022-07-14T14:40:57Z",
"pushed_at": "2022-05-04T14:12:43Z",
"stargazers_count": 94,
"watchers_count": 94,
"stargazers_count": 95,
"watchers_count": 95,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 19,
"watchers": 94,
"watchers": 95,
"score": 0
},
{

View file

@ -17,13 +17,13 @@
"pushed_at": "2020-11-02T14:51:48Z",
"stargazers_count": 146,
"watchers_count": 146,
"forks_count": 39,
"forks_count": 40,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 39,
"forks": 40,
"watchers": 146,
"score": 0
},

View file

@ -41,18 +41,18 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2022-07-13T08:54:59Z",
"updated_at": "2022-07-14T14:57:47Z",
"pushed_at": "2021-12-08T10:31:54Z",
"stargazers_count": 1478,
"watchers_count": 1478,
"forks_count": 335,
"stargazers_count": 1479,
"watchers_count": 1479,
"forks_count": 336,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 335,
"watchers": 1478,
"forks": 336,
"watchers": 1479,
"score": 0
},
{
@ -97,10 +97,10 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2022-07-13T14:12:26Z",
"updated_at": "2022-07-14T14:57:43Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 938,
"watchers_count": 938,
"stargazers_count": 939,
"watchers_count": 939,
"forks_count": 262,
"allow_forking": true,
"is_template": false,
@ -108,7 +108,7 @@
"topics": [],
"visibility": "public",
"forks": 262,
"watchers": 938,
"watchers": 939,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exchange2010 authorized RCE",
"fork": false,
"created_at": "2020-12-09T10:30:16Z",
"updated_at": "2022-06-29T09:48:33Z",
"updated_at": "2022-07-14T14:52:00Z",
"pushed_at": "2020-12-24T08:11:51Z",
"stargazers_count": 153,
"watchers_count": 153,
"stargazers_count": 154,
"watchers_count": 154,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 153,
"watchers": 154,
"score": 0
},
{

View file

@ -41,10 +41,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2022-07-13T12:10:41Z",
"updated_at": "2022-07-14T14:39:06Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1577,
"watchers_count": 1577,
"stargazers_count": 1578,
"watchers_count": 1578,
"forks_count": 569,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 569,
"watchers": 1577,
"watchers": 1578,
"score": 0
},
{

View file

@ -1,32 +1,4 @@
[
{
"id": 437822133,
"name": "CVE-2021-34527",
"full_name": "Amaranese\/CVE-2021-34527",
"owner": {
"login": "Amaranese",
"id": 32201849,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32201849?v=4",
"html_url": "https:\/\/github.com\/Amaranese"
},
"html_url": "https:\/\/github.com\/Amaranese\/CVE-2021-34527",
"description": null,
"fork": false,
"created_at": "2021-12-13T10:04:49Z",
"updated_at": "2021-12-13T10:21:38Z",
"pushed_at": "2021-12-13T10:21:35Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 461336839,
"name": "CVE-2021-34527-CVE-2021-1675",

View file

@ -138,13 +138,13 @@
"pushed_at": "2022-02-11T15:22:20Z",
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 28,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 28,
"forks": 29,
"watchers": 61,
"score": 0
},

View file

@ -75,18 +75,18 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2022-07-13T14:50:35Z",
"updated_at": "2022-07-14T13:38:14Z",
"pushed_at": "2022-06-08T04:00:28Z",
"stargazers_count": 1604,
"watchers_count": 1604,
"forks_count": 470,
"stargazers_count": 1605,
"watchers_count": 1605,
"forks_count": 469,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 470,
"watchers": 1604,
"forks": 469,
"watchers": 1605,
"score": 0
},
{
@ -1884,10 +1884,10 @@
"description": "Proof of concept for pwnkit vulnerability",
"fork": false,
"created_at": "2022-01-27T14:43:57Z",
"updated_at": "2022-07-07T08:08:07Z",
"updated_at": "2022-07-14T15:30:42Z",
"pushed_at": "2022-04-19T12:33:32Z",
"stargazers_count": 279,
"watchers_count": 279,
"stargazers_count": 280,
"watchers_count": 280,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
@ -1895,7 +1895,7 @@
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 279,
"watchers": 280,
"score": 0
},
{
@ -2906,6 +2906,39 @@
"watchers": 6,
"score": 0
},
{
"id": 455655673,
"name": "CVE-2021-4034",
"full_name": "rvizx\/CVE-2021-4034",
"owner": {
"login": "rvizx",
"id": 84989569,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84989569?v=4",
"html_url": "https:\/\/github.com\/rvizx"
},
"html_url": "https:\/\/github.com\/rvizx\/CVE-2021-4034",
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkits pkexec in Python",
"fork": false,
"created_at": "2022-02-04T18:31:15Z",
"updated_at": "2022-07-04T18:23:42Z",
"pushed_at": "2022-07-14T16:02:20Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"c",
"cve-2021-4034",
"cybersecurity",
"python3"
],
"visibility": "public",
"forks": 3,
"watchers": 2,
"score": 0
},
{
"id": 456253867,
"name": "Polkit-CVE-2021-4034-HLP",

View file

@ -191,10 +191,10 @@
"description": "CVE-2021-42013批量",
"fork": false,
"created_at": "2022-03-04T06:38:26Z",
"updated_at": "2022-07-13T15:48:39Z",
"updated_at": "2022-07-14T14:50:33Z",
"pushed_at": "2022-03-04T10:49:00Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
@ -202,7 +202,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 61,
"watchers": 62,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-4204: Linux Kernel eBPF Local Privilege Escalation",
"fork": false,
"created_at": "2022-02-24T06:43:56Z",
"updated_at": "2022-07-08T09:40:36Z",
"updated_at": "2022-07-14T14:28:17Z",
"pushed_at": "2022-03-19T06:32:50Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 52,
"watchers_count": 52,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 51,
"watchers": 52,
"score": 0
}
]

View file

@ -737,10 +737,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2022-07-14T08:29:22Z",
"updated_at": "2022-07-14T15:29:46Z",
"pushed_at": "2022-06-02T02:16:13Z",
"stargazers_count": 416,
"watchers_count": 416,
"stargazers_count": 418,
"watchers_count": 418,
"forks_count": 90,
"allow_forking": true,
"is_template": false,
@ -753,7 +753,7 @@
],
"visibility": "public",
"forks": 90,
"watchers": 416,
"watchers": 418,
"score": 0
},
{
@ -2015,10 +2015,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-07-13T22:06:26Z",
"updated_at": "2022-07-14T14:38:43Z",
"pushed_at": "2022-05-17T13:25:17Z",
"stargazers_count": 2951,
"watchers_count": 2951,
"stargazers_count": 2953,
"watchers_count": 2953,
"forks_count": 718,
"allow_forking": true,
"is_template": false,
@ -2026,7 +2026,7 @@
"topics": [],
"visibility": "public",
"forks": 718,
"watchers": 2951,
"watchers": 2953,
"score": 0
},
{
@ -9018,7 +9018,7 @@
"fork": false,
"created_at": "2022-02-12T11:19:41Z",
"updated_at": "2022-07-13T00:54:21Z",
"pushed_at": "2022-07-13T06:18:05Z",
"pushed_at": "2022-07-14T18:13:27Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,

View file

@ -323,10 +323,10 @@
"description": "CVE-2021-42013批量",
"fork": false,
"created_at": "2022-03-04T06:38:26Z",
"updated_at": "2022-07-13T15:48:39Z",
"updated_at": "2022-07-14T14:50:33Z",
"pushed_at": "2022-03-04T10:49:00Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
@ -334,7 +334,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 61,
"watchers": 62,
"score": 0
},
{

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2022-03-30T07:54:45Z",
"updated_at": "2022-07-08T12:38:50Z",
"pushed_at": "2022-07-14T03:56:53Z",
"pushed_at": "2022-07-14T14:55:24Z",
"stargazers_count": 286,
"watchers_count": 286,
"forks_count": 92,
@ -87,7 +87,7 @@
"pushed_at": "2022-04-04T14:09:11Z",
"stargazers_count": 104,
"watchers_count": 104,
"forks_count": 82,
"forks_count": 81,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -104,7 +104,7 @@
"working-example"
],
"visibility": "public",
"forks": 82,
"forks": 81,
"watchers": 104,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation",
"fork": false,
"created_at": "2022-06-07T03:20:23Z",
"updated_at": "2022-07-12T08:03:51Z",
"updated_at": "2022-07-14T14:28:03Z",
"pushed_at": "2022-06-07T03:41:13Z",
"stargazers_count": 476,
"watchers_count": 476,
"stargazers_count": 477,
"watchers_count": 477,
"forks_count": 80,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 80,
"watchers": 476,
"watchers": 477,
"score": 0
},
{

View file

@ -97,10 +97,10 @@
"description": null,
"fork": false,
"created_at": "2022-04-15T09:08:00Z",
"updated_at": "2022-07-14T02:09:32Z",
"updated_at": "2022-07-14T12:56:56Z",
"pushed_at": "2022-04-15T09:13:12Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -108,7 +108,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2022-07-14T09:09:16Z",
"updated_at": "2022-07-14T14:20:34Z",
"pushed_at": "2022-07-14T04:50:50Z",
"stargazers_count": 220,
"watchers_count": 220,
"stargazers_count": 221,
"watchers_count": 221,
"forks_count": 42,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 42,
"watchers": 220,
"watchers": 221,
"score": 0
},
{
@ -1447,10 +1447,10 @@
"description": "This is a python script that can be used with Shodan CLI to mass hunting Confluence Servers vulnerable to CVE-2022-26134",
"fork": false,
"created_at": "2022-07-12T05:34:09Z",
"updated_at": "2022-07-13T05:34:20Z",
"updated_at": "2022-07-14T14:48:57Z",
"pushed_at": "2022-07-12T05:52:32Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -1458,7 +1458,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
"fork": false,
"created_at": "2022-04-20T21:23:52Z",
"updated_at": "2022-07-13T11:45:49Z",
"updated_at": "2022-07-14T17:48:18Z",
"pushed_at": "2022-04-27T05:52:43Z",
"stargazers_count": 289,
"watchers_count": 289,
"stargazers_count": 290,
"watchers_count": 290,
"forks_count": 66,
"allow_forking": true,
"is_template": false,
@ -26,7 +26,7 @@
],
"visibility": "public",
"forks": 66,
"watchers": 289,
"watchers": 290,
"score": 0
},
{

View file

@ -683,7 +683,7 @@
"fork": false,
"created_at": "2022-06-02T06:45:19Z",
"updated_at": "2022-07-06T05:22:16Z",
"pushed_at": "2022-07-06T04:44:27Z",
"pushed_at": "2022-07-14T13:09:11Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 4,
@ -1364,7 +1364,7 @@
"fork": false,
"created_at": "2022-06-08T14:20:50Z",
"updated_at": "2022-06-08T14:29:37Z",
"pushed_at": "2022-06-08T15:08:52Z",
"pushed_at": "2022-07-14T16:18:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -2254,7 +2254,12 @@ A reflected XSS issue exists in the Management Console of several WSO2 products.
### CVE-2022-29554
- [ComparedArray/printix-CVE-2022-29554](https://github.com/ComparedArray/printix-CVE-2022-29554)
### CVE-2022-29593
### CVE-2022-29593 (2022-07-14)
<code>
relay_cgi.cgi on Dingtian DT-R002 2CH relay devices with firmware 3.1.276A allows an attacker to replay HTTP post requests without the need for authentication or a valid signed/authorized request.
</code>
- [9lyph/CVE-2022-29593](https://github.com/9lyph/CVE-2022-29593)
### CVE-2022-29597 (2022-06-02)
@ -3851,6 +3856,7 @@ A local privilege escalation vulnerability was found on polkit's pkexec utility.
- [Ankit-Ojha16/CVE-2021-4034](https://github.com/Ankit-Ojha16/CVE-2021-4034)
- [Ph4nt0mh4x0r/auto-CVE-2021-4034](https://github.com/Ph4nt0mh4x0r/auto-CVE-2021-4034)
- [drapl0n/pwnKit](https://github.com/drapl0n/pwnKit)
- [rvizx/CVE-2021-4034](https://github.com/rvizx/CVE-2021-4034)
- [Joffr3y/Polkit-CVE-2021-4034-HLP](https://github.com/Joffr3y/Polkit-CVE-2021-4034-HLP)
- [pyhrr0/pwnkit](https://github.com/pyhrr0/pwnkit)
- [ziadsaleemi/polkit_CVE-2021-4034](https://github.com/ziadsaleemi/polkit_CVE-2021-4034)
@ -5548,7 +5554,6 @@ Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is uni
Windows Print Spooler Remote Code Execution Vulnerability
</code>
- [Amaranese/CVE-2021-34527](https://github.com/Amaranese/CVE-2021-34527)
- [Exploitspacks/CVE-2021-34527-CVE-2021-1675](https://github.com/Exploitspacks/CVE-2021-34527-CVE-2021-1675)
- [cyb3rpeace/CVE-2021-34527](https://github.com/cyb3rpeace/CVE-2021-34527)
@ -13022,6 +13027,7 @@ An elevation of privilege vulnerability exists in the way that the iphlpsvc.dll
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'.
</code>
- [piotrflorczyk/cve-2019-1458_POC](https://github.com/piotrflorczyk/cve-2019-1458_POC)
- [unamer/CVE-2019-1458](https://github.com/unamer/CVE-2019-1458)
- [DreamoneOnly/CVE-2019-1458-malware](https://github.com/DreamoneOnly/CVE-2019-1458-malware)
- [Eternit7/CVE-2019-1458](https://github.com/Eternit7/CVE-2019-1458)
@ -16273,6 +16279,7 @@ The Strapi framework before 3.0.0-beta.17.8 is vulnerable to Remote Code Executi
- [diego-tella/CVE-2019-19609-EXPLOIT](https://github.com/diego-tella/CVE-2019-19609-EXPLOIT)
- [guglia001/CVE-2019-19609](https://github.com/guglia001/CVE-2019-19609)
- [D3m0nicw0lf/CVE-2019-19609](https://github.com/D3m0nicw0lf/CVE-2019-19609)
- [n000xy/CVE-2019-19609-POC-Python](https://github.com/n000xy/CVE-2019-19609-POC-Python)
- [RamPanic/CVE-2019-19609-EXPLOIT](https://github.com/RamPanic/CVE-2019-19609-EXPLOIT)
- [glowbase/CVE-2019-19609](https://github.com/glowbase/CVE-2019-19609)
@ -24097,7 +24104,7 @@ request.rb in Web Console before 2.1.3, as used with Ruby on Rails 3.x and 4.x,
- [0x00-0x00/CVE-2015-3224](https://github.com/0x00-0x00/CVE-2015-3224)
- [0xEval/cve-2015-3224](https://github.com/0xEval/cve-2015-3224)
- [xda3m00n/CVE-2015-3224-](https://github.com/xda3m00n/CVE-2015-3224-)
- [n000xy/CVE-2015-3224-](https://github.com/n000xy/CVE-2015-3224-)
### CVE-2015-3306 (2015-05-18)