Auto Update 2022/04/28 00:16:10

This commit is contained in:
motikan2010-bot 2022-04-28 09:16:10 +09:00
parent e53b6ad21f
commit 53fc404d83
32 changed files with 140 additions and 149 deletions

View file

@ -41,7 +41,7 @@
"fork": false,
"created_at": "2021-02-11T17:25:24Z",
"updated_at": "2022-04-25T03:40:01Z",
"pushed_at": "2022-04-26T21:30:52Z",
"pushed_at": "2022-04-27T20:16:17Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,

View file

@ -769,17 +769,17 @@
"description": "OpenSSL Heartbleed (CVE-2014-0160) vulnerability scanner, data miner and RSA key-restore tools.",
"fork": false,
"created_at": "2014-04-15T14:09:54Z",
"updated_at": "2022-04-04T13:38:53Z",
"updated_at": "2022-04-27T18:43:47Z",
"pushed_at": "2014-06-18T11:54:32Z",
"stargazers_count": 93,
"watchers_count": 93,
"stargazers_count": 94,
"watchers_count": 94,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 93,
"watchers": 94,
"score": 0
},
{

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-04-26T06:49:15Z",
"updated_at": "2022-04-27T18:39:36Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1334,
"watchers_count": 1334,
"stargazers_count": 1335,
"watchers_count": 1335,
"forks_count": 290,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 290,
"watchers": 1334,
"watchers": 1335,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-04-26T06:49:15Z",
"updated_at": "2022-04-27T18:39:36Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1334,
"watchers_count": 1334,
"stargazers_count": 1335,
"watchers_count": 1335,
"forks_count": 290,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 290,
"watchers": 1334,
"watchers": 1335,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2020-06-27T10:17:43Z",
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 16,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 16,
"forks": 17,
"watchers": 49,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Blueborne CVE-2017-0785 Android information leak vulnerability",
"fork": false,
"created_at": "2017-09-20T23:32:29Z",
"updated_at": "2022-04-24T08:21:25Z",
"updated_at": "2022-04-27T19:26:16Z",
"pushed_at": "2017-09-23T05:11:45Z",
"stargazers_count": 443,
"watchers_count": 443,
"stargazers_count": 442,
"watchers_count": 442,
"forks_count": 192,
"allow_forking": true,
"is_template": false,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 192,
"watchers": 443,
"watchers": 442,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "Proof-of-Concept exploits for CVE-2017-11882",
"fork": false,
"created_at": "2017-11-20T16:35:30Z",
"updated_at": "2022-03-21T05:27:45Z",
"updated_at": "2022-04-27T19:26:17Z",
"pushed_at": "2017-11-29T16:13:23Z",
"stargazers_count": 497,
"watchers_count": 497,
"stargazers_count": 496,
"watchers_count": 496,
"forks_count": 197,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 197,
"watchers": 497,
"watchers": 496,
"score": 0
},
{
@ -67,17 +67,17 @@
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
"fork": false,
"created_at": "2017-11-21T05:55:53Z",
"updated_at": "2022-04-26T07:39:22Z",
"updated_at": "2022-04-27T19:26:17Z",
"pushed_at": "2017-11-29T03:33:53Z",
"stargazers_count": 527,
"watchers_count": 527,
"stargazers_count": 526,
"watchers_count": 526,
"forks_count": 261,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 261,
"watchers": 527,
"watchers": 526,
"score": 0
},
{

View file

@ -71,12 +71,12 @@
"pushed_at": "2018-12-05T12:50:33Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 8,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"forks": 7,
"watchers": 1,
"score": 0
},

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-04-26T06:49:15Z",
"updated_at": "2022-04-27T18:39:36Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1334,
"watchers_count": 1334,
"stargazers_count": 1335,
"watchers_count": 1335,
"forks_count": 290,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 290,
"watchers": 1334,
"watchers": 1335,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Example of using revealed \"Spectre\" exploit (CVE-2017-5753 and CVE-2017-5715)",
"fork": false,
"created_at": "2018-01-04T00:28:50Z",
"updated_at": "2022-04-20T17:57:10Z",
"updated_at": "2022-04-27T19:26:18Z",
"pushed_at": "2018-01-10T01:14:44Z",
"stargazers_count": 710,
"watchers_count": 710,
"stargazers_count": 709,
"watchers_count": 709,
"forks_count": 184,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 184,
"watchers": 710,
"watchers": 709,
"score": 0
},
{

View file

@ -50,10 +50,10 @@
"description": "Meltdown Exploit \/ Proof-of-concept \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.",
"fork": false,
"created_at": "2018-01-04T23:51:12Z",
"updated_at": "2022-03-02T13:20:42Z",
"updated_at": "2022-04-27T19:26:18Z",
"pushed_at": "2018-02-27T05:22:38Z",
"stargazers_count": 547,
"watchers_count": 547,
"stargazers_count": 546,
"watchers_count": 546,
"forks_count": 72,
"allow_forking": true,
"is_template": false,
@ -69,7 +69,7 @@
],
"visibility": "public",
"forks": 72,
"watchers": 547,
"watchers": 546,
"score": 0
},
{

View file

@ -69,10 +69,10 @@
"description": "An exploit for Apache Struts CVE-2017-9805",
"fork": false,
"created_at": "2017-09-09T01:32:57Z",
"updated_at": "2022-03-26T12:23:42Z",
"updated_at": "2022-04-27T19:26:15Z",
"pushed_at": "2017-11-07T19:24:00Z",
"stargazers_count": 247,
"watchers_count": 247,
"stargazers_count": 246,
"watchers_count": 246,
"forks_count": 78,
"allow_forking": true,
"is_template": false,
@ -81,7 +81,7 @@
],
"visibility": "public",
"forks": 78,
"watchers": 247,
"watchers": 246,
"score": 0
},
{

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2018-07-05T19:09:17Z",
"updated_at": "2021-11-12T13:38:51Z",
"pushed_at": "2021-11-12T13:38:48Z",
"pushed_at": "2022-04-27T22:48:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -530,10 +530,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-04-26T06:49:15Z",
"updated_at": "2022-04-27T18:39:36Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1334,
"watchers_count": 1334,
"stargazers_count": 1335,
"watchers_count": 1335,
"forks_count": 290,
"allow_forking": true,
"is_template": false,
@ -561,7 +561,7 @@
],
"visibility": "public",
"forks": 290,
"watchers": 1334,
"watchers": 1335,
"score": 0
},
{

View file

@ -125,12 +125,12 @@
"pushed_at": "2020-02-20T02:41:44Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"forks": 7,
"watchers": 19,
"score": 0
},

View file

@ -175,10 +175,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-04-26T06:49:15Z",
"updated_at": "2022-04-27T18:39:36Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1334,
"watchers_count": 1334,
"stargazers_count": 1335,
"watchers_count": 1335,
"forks_count": 290,
"allow_forking": true,
"is_template": false,
@ -206,7 +206,7 @@
],
"visibility": "public",
"forks": 290,
"watchers": 1334,
"watchers": 1335,
"score": 0
}
]

View file

@ -121,17 +121,17 @@
"description": "CVE-2019-9053 Exploit for Python 3",
"fork": false,
"created_at": "2021-12-28T16:30:12Z",
"updated_at": "2021-12-28T17:02:30Z",
"updated_at": "2022-04-27T21:59:50Z",
"pushed_at": "2021-12-28T17:02:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -155,17 +155,17 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2022-04-27T01:18:39Z",
"updated_at": "2022-04-27T20:39:29Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 420,
"watchers_count": 420,
"stargazers_count": 421,
"watchers_count": 421,
"forks_count": 124,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 124,
"watchers": 420,
"watchers": 421,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-04-26T06:49:15Z",
"updated_at": "2022-04-27T18:39:36Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1334,
"watchers_count": 1334,
"stargazers_count": 1335,
"watchers_count": 1335,
"forks_count": 290,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 290,
"watchers": 1334,
"watchers": 1335,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "The (WordPress) website test script can be exploited for Unlimited File Upload via CVE-2020-35489",
"fork": false,
"created_at": "2020-12-24T09:10:17Z",
"updated_at": "2022-04-18T02:34:56Z",
"updated_at": "2022-04-27T21:31:20Z",
"pushed_at": "2020-12-25T09:51:37Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 12,
"watchers": 13,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
"fork": false,
"created_at": "2021-05-16T16:15:56Z",
"updated_at": "2022-04-25T14:29:51Z",
"updated_at": "2022-04-27T21:07:13Z",
"pushed_at": "2021-06-12T08:27:09Z",
"stargazers_count": 813,
"watchers_count": 813,
"stargazers_count": 814,
"watchers_count": 814,
"forks_count": 137,
"allow_forking": true,
"is_template": false,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 137,
"watchers": 813,
"watchers": 814,
"score": 0
},
{

View file

@ -130,17 +130,17 @@
"description": null,
"fork": false,
"created_at": "2021-06-14T20:08:20Z",
"updated_at": "2022-04-24T04:35:29Z",
"updated_at": "2022-04-27T22:12:14Z",
"pushed_at": "2022-02-11T15:22:20Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 44,
"watchers": 45,
"score": 0
},
{

View file

@ -106,5 +106,32 @@
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 486343778,
"name": "CVE-2021-40444_PoC",
"full_name": "QwertyStack\/CVE-2021-40444_PoC",
"owner": {
"login": "QwertyStack",
"id": 73184752,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73184752?v=4",
"html_url": "https:\/\/github.com\/QwertyStack"
},
"html_url": "https:\/\/github.com\/QwertyStack\/CVE-2021-40444_PoC",
"description": null,
"fork": false,
"created_at": "2022-04-27T20:38:22Z",
"updated_at": "2022-04-27T20:43:08Z",
"pushed_at": "2022-04-27T20:38:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -558,17 +558,17 @@
"description": "CVE-2021-41773&CVE-2021-42013图形化漏洞检测利用工具",
"fork": false,
"created_at": "2022-04-27T15:17:38Z",
"updated_at": "2022-04-27T15:39:56Z",
"updated_at": "2022-04-27T20:39:26Z",
"pushed_at": "2022-04-27T15:36:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -1,29 +0,0 @@
[
{
"id": 424179332,
"name": "CVE-2021-43471",
"full_name": "cxaqhq\/CVE-2021-43471",
"owner": {
"login": "cxaqhq",
"id": 32918546,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32918546?v=4",
"html_url": "https:\/\/github.com\/cxaqhq"
},
"html_url": "https:\/\/github.com\/cxaqhq\/CVE-2021-43471",
"description": "CVE-2021-43471",
"fork": false,
"created_at": "2021-11-03T10:27:16Z",
"updated_at": "2021-12-06T12:19:51Z",
"pushed_at": "2021-12-06T12:19:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -17,7 +17,7 @@
"pushed_at": "2021-12-17T12:53:51Z",
"stargazers_count": 69,
"watchers_count": 69,
"forks_count": 11,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [
@ -28,7 +28,7 @@
"windows"
],
"visibility": "public",
"forks": 11,
"forks": 10,
"watchers": 69,
"score": 0
}

View file

@ -1867,10 +1867,10 @@
"description": "Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!",
"fork": false,
"created_at": "2021-12-12T00:29:03Z",
"updated_at": "2022-04-19T18:09:37Z",
"updated_at": "2022-04-27T23:02:58Z",
"pushed_at": "2022-03-10T18:44:50Z",
"stargazers_count": 628,
"watchers_count": 628,
"stargazers_count": 627,
"watchers_count": 627,
"forks_count": 100,
"allow_forking": true,
"is_template": false,
@ -1889,7 +1889,7 @@
],
"visibility": "public",
"forks": 100,
"watchers": 628,
"watchers": 627,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2022-0543_RCE,Redis Lua沙盒绕过 命令执行",
"fork": false,
"created_at": "2022-03-16T06:41:50Z",
"updated_at": "2022-04-27T14:47:48Z",
"updated_at": "2022-04-27T21:43:50Z",
"pushed_at": "2022-03-16T06:48:01Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 30,
"watchers": 31,
"score": 0
}
]

View file

@ -121,17 +121,17 @@
"description": "Spring Cloud Gateway < 3.0.7 & < 3.1.1 Code Injection (RCE)",
"fork": false,
"created_at": "2022-03-03T18:26:18Z",
"updated_at": "2022-03-26T13:13:42Z",
"updated_at": "2022-04-27T23:07:50Z",
"pushed_at": "2022-03-04T21:10:45Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 6,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 17,
"forks": 7,
"watchers": 18,
"score": 0
},
{
@ -1214,17 +1214,17 @@
"description": "CVE-2022-22947 注入Godzilla内存马",
"fork": false,
"created_at": "2022-04-26T05:48:27Z",
"updated_at": "2022-04-27T17:42:23Z",
"updated_at": "2022-04-27T19:12:05Z",
"pushed_at": "2022-04-26T05:55:58Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 42,
"watchers": 43,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": "The poc for CVE-2022-26809 RCE via RPC will be updated here. ",
"fork": false,
"created_at": "2022-04-14T03:41:32Z",
"updated_at": "2022-04-25T12:23:55Z",
"updated_at": "2022-04-27T19:52:43Z",
"pushed_at": "2022-04-18T03:28:10Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 15,
"watchers": 16,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.",
"fork": false,
"created_at": "2022-04-15T22:59:03Z",
"updated_at": "2022-04-27T13:12:37Z",
"updated_at": "2022-04-27T19:09:58Z",
"pushed_at": "2022-04-22T11:26:31Z",
"stargazers_count": 631,
"watchers_count": 631,
"stargazers_count": 632,
"watchers_count": 632,
"forks_count": 102,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 102,
"watchers": 631,
"watchers": 632,
"score": 0
},
{

View file

@ -4230,6 +4230,7 @@ Microsoft MSHTML Remote Code Execution Vulnerability
- [factionsypho/TIC4301_Project](https://github.com/factionsypho/TIC4301_Project)
- [34zY/Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit](https://github.com/34zY/Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit)
- [MRacumen/CVE-2021-40444](https://github.com/MRacumen/CVE-2021-40444)
- [QwertyStack/CVE-2021-40444_PoC](https://github.com/QwertyStack/CVE-2021-40444_PoC)
### CVE-2021-40449 (2021-10-12)
@ -4658,14 +4659,6 @@ VINGA WR-N300U 77.102.1.4853 is affected by a command execution vulnerability in
- [badboycxcc/CVE-2021-43469](https://github.com/badboycxcc/CVE-2021-43469)
### CVE-2021-43471 (2021-12-06)
<code>
In Canon LBP223 printers, the System Manager Mode login does not require an account password or PIN. An attacker can remotely shut down the device after entering the background, creating a denial of service vulnerability.
</code>
- [cxaqhq/CVE-2021-43471](https://github.com/cxaqhq/CVE-2021-43471)
### CVE-2021-43515 (2022-04-08)
<code>