mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2022/04/28 18:15:50
This commit is contained in:
parent
fdcb5931c3
commit
5c510a2e26
37 changed files with 270 additions and 224 deletions
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2014-4210+Redis未授权访问",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-10T02:09:48Z",
|
||||
"updated_at": "2022-03-10T14:58:17Z",
|
||||
"updated_at": "2022-04-28T14:00:12Z",
|
||||
"pushed_at": "2017-03-10T08:35:42Z",
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"watchers": 92,
|
||||
"watchers": 93,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-30T11:56:44Z",
|
||||
"updated_at": "2022-03-06T02:27:34Z",
|
||||
"updated_at": "2022-04-28T15:38:49Z",
|
||||
"pushed_at": "2016-06-30T15:32:42Z",
|
||||
"stargazers_count": 317,
|
||||
"watchers_count": 317,
|
||||
"stargazers_count": 318,
|
||||
"watchers_count": 318,
|
||||
"forks_count": 112,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 112,
|
||||
"watchers": 317,
|
||||
"watchers": 318,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,17 +40,17 @@
|
|||
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-30T11:56:44Z",
|
||||
"updated_at": "2022-03-06T02:27:34Z",
|
||||
"updated_at": "2022-04-28T15:38:49Z",
|
||||
"pushed_at": "2016-06-30T15:32:42Z",
|
||||
"stargazers_count": 317,
|
||||
"watchers_count": 317,
|
||||
"stargazers_count": 318,
|
||||
"watchers_count": 318,
|
||||
"forks_count": 112,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 112,
|
||||
"watchers": 317,
|
||||
"watchers": 318,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "There is a classic heap overflow when eval a string which large enough in Chakra! This issue can be reproduced steadly in uptodate Edge in Win10 WIP. An exception will occur immediatly when opening POC.html in Edge. ",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-21T20:11:11Z",
|
||||
"updated_at": "2017-08-23T09:18:42Z",
|
||||
"updated_at": "2022-04-28T13:45:25Z",
|
||||
"pushed_at": "2017-08-23T09:09:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -26,7 +26,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -114,12 +114,12 @@
|
|||
"pushed_at": "2019-03-24T11:20:27Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"forks_count": 19,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"forks": 18,
|
||||
"watchers": 45,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2022-04-23T04:47:49Z",
|
||||
"updated_at": "2022-04-28T16:09:59Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1713,
|
||||
"watchers_count": 1713,
|
||||
"stargazers_count": 1714,
|
||||
"watchers_count": 1714,
|
||||
"forks_count": 262,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 262,
|
||||
"watchers": 1713,
|
||||
"watchers": 1714,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-01-06T22:34:16Z",
|
||||
"updated_at": "2022-02-01T12:44:17Z",
|
||||
"updated_at": "2022-04-28T12:12:29Z",
|
||||
"pushed_at": "2020-01-07T14:29:45Z",
|
||||
"stargazers_count": 143,
|
||||
"watchers_count": 143,
|
||||
"stargazers_count": 144,
|
||||
"watchers_count": 144,
|
||||
"forks_count": 45,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 45,
|
||||
"watchers": 143,
|
||||
"watchers": 144,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -175,14 +175,14 @@
|
|||
{
|
||||
"id": 374746568,
|
||||
"name": "bloodit",
|
||||
"full_name": "0xbrunosergio\/bloodit",
|
||||
"full_name": "brunosergi0\/bloodit",
|
||||
"owner": {
|
||||
"login": "0xbrunosergio",
|
||||
"login": "brunosergi0",
|
||||
"id": 65323475,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65323475?v=4",
|
||||
"html_url": "https:\/\/github.com\/0xbrunosergio"
|
||||
"html_url": "https:\/\/github.com\/brunosergi0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/0xbrunosergio\/bloodit",
|
||||
"html_url": "https:\/\/github.com\/brunosergi0\/bloodit",
|
||||
"description": "Bludit 3.9.2 - Auth Brute Force Mitigation Bypass. CVE-2019-17240",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-07T17:22:40Z",
|
||||
|
|
|
@ -94,17 +94,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-12-06T08:46:31Z",
|
||||
"updated_at": "2022-02-22T03:18:34Z",
|
||||
"updated_at": "2022-04-28T12:16:11Z",
|
||||
"pushed_at": "2019-12-06T09:18:56Z",
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 88,
|
||||
"watchers": 89,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR\/EDR and BLE [CVE-2019-9506]",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-15T11:54:21Z",
|
||||
"updated_at": "2022-04-04T15:15:10Z",
|
||||
"updated_at": "2022-04-28T16:26:12Z",
|
||||
"pushed_at": "2022-04-04T15:16:08Z",
|
||||
"stargazers_count": 140,
|
||||
"watchers_count": 140,
|
||||
"stargazers_count": 141,
|
||||
"watchers_count": 141,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 140,
|
||||
"watchers": 141,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -54,21 +54,21 @@
|
|||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 475362491,
|
||||
"name": "Nfc-CVE-2020-0453",
|
||||
"full_name": "Trinadh465\/Nfc-CVE-2020-0453",
|
||||
"id": 486600061,
|
||||
"name": "packages_apps_Nfc_AOSP10_r33_CVE-2020-0453",
|
||||
"full_name": "Trinadh465\/packages_apps_Nfc_AOSP10_r33_CVE-2020-0453",
|
||||
"owner": {
|
||||
"login": "Trinadh465",
|
||||
"id": 102574296,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
|
||||
"html_url": "https:\/\/github.com\/Trinadh465"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Trinadh465\/Nfc-CVE-2020-0453",
|
||||
"html_url": "https:\/\/github.com\/Trinadh465\/packages_apps_Nfc_AOSP10_r33_CVE-2020-0453",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-03-29T09:03:39Z",
|
||||
"updated_at": "2022-03-29T09:11:23Z",
|
||||
"pushed_at": "2022-03-29T09:12:32Z",
|
||||
"created_at": "2022-04-28T13:12:23Z",
|
||||
"updated_at": "2022-04-28T13:16:53Z",
|
||||
"pushed_at": "2022-04-28T13:17:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2022-04-27T14:40:06Z",
|
||||
"updated_at": "2022-04-28T14:10:43Z",
|
||||
"pushed_at": "2021-12-08T10:31:54Z",
|
||||
"stargazers_count": 1444,
|
||||
"watchers_count": 1444,
|
||||
"stargazers_count": 1445,
|
||||
"watchers_count": 1445,
|
||||
"forks_count": 329,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 329,
|
||||
"watchers": 1444,
|
||||
"watchers": 1445,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -115,17 +115,17 @@
|
|||
"description": "Weblogic IIOP CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-28T08:46:21Z",
|
||||
"updated_at": "2022-04-28T11:20:38Z",
|
||||
"updated_at": "2022-04-28T12:26:25Z",
|
||||
"pushed_at": "2020-04-07T03:32:24Z",
|
||||
"stargazers_count": 291,
|
||||
"watchers_count": 291,
|
||||
"stargazers_count": 292,
|
||||
"watchers_count": 292,
|
||||
"forks_count": 74,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 74,
|
||||
"watchers": 291,
|
||||
"watchers": 292,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2020-03-23T16:16:39Z",
|
||||
"updated_at": "2021-12-05T21:34:44Z",
|
||||
"pushed_at": "2020-03-23T17:50:39Z",
|
||||
"pushed_at": "2022-04-28T13:39:32Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T15:27:25Z",
|
||||
"updated_at": "2022-03-02T17:27:19Z",
|
||||
"updated_at": "2022-04-28T15:06:41Z",
|
||||
"pushed_at": "2021-05-25T11:14:56Z",
|
||||
"stargazers_count": 125,
|
||||
"watchers_count": 125,
|
||||
"stargazers_count": 126,
|
||||
"watchers_count": 126,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 125,
|
||||
"watchers": 126,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T15:27:25Z",
|
||||
"updated_at": "2022-03-02T17:27:19Z",
|
||||
"updated_at": "2022-04-28T15:06:41Z",
|
||||
"pushed_at": "2021-05-25T11:14:56Z",
|
||||
"stargazers_count": 125,
|
||||
"watchers_count": 125,
|
||||
"stargazers_count": 126,
|
||||
"watchers_count": 126,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 125,
|
||||
"watchers": 126,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2021/CVE-2021-24507.json
Normal file
29
2021/CVE-2021-24507.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 486599533,
|
||||
"name": "CVE-2021-24507",
|
||||
"full_name": "RandomRobbieBF\/CVE-2021-24507",
|
||||
"owner": {
|
||||
"login": "RandomRobbieBF",
|
||||
"id": 51722811,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2021-24507",
|
||||
"description": "Astra Pro Addon < 3.5.2 - Unauthenticated SQL Injection - CVE-2021-24507",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-28T13:10:55Z",
|
||||
"updated_at": "2022-04-28T13:11:23Z",
|
||||
"pushed_at": "2022-04-28T13:11:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
29
2021/CVE-2021-30937.json
Normal file
29
2021/CVE-2021-30937.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 486636223,
|
||||
"name": "ExploiteameEsta",
|
||||
"full_name": "realrodri\/ExploiteameEsta",
|
||||
"owner": {
|
||||
"login": "realrodri",
|
||||
"id": 40494400,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40494400?v=4",
|
||||
"html_url": "https:\/\/github.com\/realrodri"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/realrodri\/ExploiteameEsta",
|
||||
"description": "CVE-2021-30937 vulnerability checking app",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-28T14:50:00Z",
|
||||
"updated_at": "2022-04-28T14:52:37Z",
|
||||
"pushed_at": "2022-04-28T18:00:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -125,12 +125,12 @@
|
|||
"pushed_at": "2022-04-22T05:24:48Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -184,17 +184,17 @@
|
|||
"description": "Privilege escalation with polkit - CVE-2021-3560",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-19T08:15:17Z",
|
||||
"updated_at": "2022-04-28T07:26:51Z",
|
||||
"updated_at": "2022-04-28T12:48:11Z",
|
||||
"pushed_at": "2021-06-20T07:38:13Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 69,
|
||||
"watchers": 70,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -154,10 +154,10 @@
|
|||
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T00:56:36Z",
|
||||
"updated_at": "2022-04-26T18:21:06Z",
|
||||
"updated_at": "2022-04-28T14:57:19Z",
|
||||
"pushed_at": "2022-02-12T05:22:58Z",
|
||||
"stargazers_count": 842,
|
||||
"watchers_count": 842,
|
||||
"stargazers_count": 844,
|
||||
"watchers_count": 844,
|
||||
"forks_count": 272,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -168,7 +168,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 272,
|
||||
"watchers": 842,
|
||||
"watchers": 844,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -875,10 +875,10 @@
|
|||
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T14:26:10Z",
|
||||
"updated_at": "2022-04-27T15:55:07Z",
|
||||
"updated_at": "2022-04-28T14:50:38Z",
|
||||
"pushed_at": "2022-01-27T20:09:24Z",
|
||||
"stargazers_count": 493,
|
||||
"watchers_count": 493,
|
||||
"stargazers_count": 494,
|
||||
"watchers_count": 494,
|
||||
"forks_count": 92,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -887,7 +887,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 92,
|
||||
"watchers": 493,
|
||||
"watchers": 494,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3950,8 +3950,8 @@
|
|||
"description": "My research about CVE-2021-4034",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-24T14:52:55Z",
|
||||
"updated_at": "2022-04-24T15:19:33Z",
|
||||
"pushed_at": "2022-04-26T00:45:19Z",
|
||||
"updated_at": "2022-04-28T17:00:09Z",
|
||||
"pushed_at": "2022-04-28T17:08:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -80,33 +80,6 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 486343778,
|
||||
"name": "CVE-2021-40444_PoC",
|
||||
"full_name": "QwertyStack\/CVE-2021-40444_PoC",
|
||||
"owner": {
|
||||
"login": "QwertyStack",
|
||||
"id": 73184752,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73184752?v=4",
|
||||
"html_url": "https:\/\/github.com\/QwertyStack"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/QwertyStack\/CVE-2021-40444_PoC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-27T20:38:22Z",
|
||||
"updated_at": "2022-04-27T20:43:08Z",
|
||||
"pushed_at": "2022-04-27T20:38:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 486415935,
|
||||
"name": "CVE-2021-40444",
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "Using CVE-2021-40449 to manual map kernel mode driver",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-04T17:55:52Z",
|
||||
"updated_at": "2022-04-28T07:02:30Z",
|
||||
"updated_at": "2022-04-28T14:47:20Z",
|
||||
"pushed_at": "2022-03-05T18:34:25Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 40,
|
||||
"watchers": 41,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -107,37 +107,6 @@
|
|||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 435877595,
|
||||
"name": "CVE-2021-43798",
|
||||
"full_name": "Mr-xn\/CVE-2021-43798",
|
||||
"owner": {
|
||||
"login": "Mr-xn",
|
||||
"id": 18260135,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4",
|
||||
"html_url": "https:\/\/github.com\/Mr-xn"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Mr-xn\/CVE-2021-43798",
|
||||
"description": "CVE-2021-43798:Grafana 任意文件读取漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-07T12:47:58Z",
|
||||
"updated_at": "2022-04-11T04:08:51Z",
|
||||
"pushed_at": "2021-12-07T16:27:56Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2021-43798",
|
||||
"grafana",
|
||||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 435904073,
|
||||
"name": "CVE-2021-43798-Grafana-Exp",
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2021-12-15T06:18:15Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"forks": 5,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -394,14 +394,14 @@
|
|||
"pushed_at": "2022-02-24T12:04:51Z",
|
||||
"stargazers_count": 981,
|
||||
"watchers_count": 981,
|
||||
"forks_count": 435,
|
||||
"forks_count": 436,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"log4shell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 435,
|
||||
"forks": 436,
|
||||
"watchers": 981,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -419,10 +419,10 @@
|
|||
"description": "A script that checks for vulnerable Log4j (CVE-2021-44228) systems using injection of the payload in common HTTP headers.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T14:22:49Z",
|
||||
"updated_at": "2022-03-17T02:06:09Z",
|
||||
"updated_at": "2022-04-28T15:50:57Z",
|
||||
"pushed_at": "2021-12-14T15:16:15Z",
|
||||
"stargazers_count": 123,
|
||||
"watchers_count": 123,
|
||||
"stargazers_count": 122,
|
||||
"watchers_count": 122,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -436,7 +436,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 123,
|
||||
"watchers": 122,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -833,10 +833,10 @@
|
|||
"description": "🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T22:35:00Z",
|
||||
"updated_at": "2022-04-28T02:29:23Z",
|
||||
"updated_at": "2022-04-28T14:44:13Z",
|
||||
"pushed_at": "2022-01-15T16:18:44Z",
|
||||
"stargazers_count": 749,
|
||||
"watchers_count": 749,
|
||||
"stargazers_count": 750,
|
||||
"watchers_count": 750,
|
||||
"forks_count": 123,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -863,7 +863,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 123,
|
||||
"watchers": 749,
|
||||
"watchers": 750,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -884,7 +884,7 @@
|
|||
"pushed_at": "2022-03-20T16:33:49Z",
|
||||
"stargazers_count": 1336,
|
||||
"watchers_count": 1336,
|
||||
"forks_count": 366,
|
||||
"forks_count": 365,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -894,7 +894,7 @@
|
|||
"security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 366,
|
||||
"forks": 365,
|
||||
"watchers": 1336,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -3465,17 +3465,17 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2022-04-28T07:09:53Z",
|
||||
"updated_at": "2022-04-28T15:50:47Z",
|
||||
"pushed_at": "2022-02-06T03:18:29Z",
|
||||
"stargazers_count": 2844,
|
||||
"watchers_count": 2844,
|
||||
"stargazers_count": 2843,
|
||||
"watchers_count": 2843,
|
||||
"forks_count": 693,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 693,
|
||||
"watchers": 2844,
|
||||
"watchers": 2843,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -5135,7 +5135,7 @@
|
|||
"pushed_at": "2022-04-24T08:56:47Z",
|
||||
"stargazers_count": 311,
|
||||
"watchers_count": 311,
|
||||
"forks_count": 43,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -5146,7 +5146,7 @@
|
|||
"vulnerability-scanners"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 43,
|
||||
"forks": 44,
|
||||
"watchers": 311,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -5305,10 +5305,10 @@
|
|||
"description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T10:04:42Z",
|
||||
"updated_at": "2022-04-20T18:38:51Z",
|
||||
"updated_at": "2022-04-28T15:50:40Z",
|
||||
"pushed_at": "2022-01-27T16:08:20Z",
|
||||
"stargazers_count": 414,
|
||||
"watchers_count": 414,
|
||||
"stargazers_count": 413,
|
||||
"watchers_count": 413,
|
||||
"forks_count": 93,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -5324,7 +5324,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 93,
|
||||
"watchers": 414,
|
||||
"watchers": 413,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -8514,17 +8514,17 @@
|
|||
"description": "log4j2 RCE漏洞(CVE-2021-44228)内网扫描器,可用于在不出网的条件下进行漏洞扫描,帮助企业内部快速发现Log4jShell漏洞。",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-20T13:41:35Z",
|
||||
"updated_at": "2022-04-06T08:49:41Z",
|
||||
"updated_at": "2022-04-28T13:15:05Z",
|
||||
"pushed_at": "2021-12-21T06:11:58Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 4,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 16,
|
||||
"forks": 5,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2022-0543_RCE,Redis Lua沙盒绕过 命令执行",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-16T06:41:50Z",
|
||||
"updated_at": "2022-04-28T11:02:49Z",
|
||||
"updated_at": "2022-04-28T17:47:58Z",
|
||||
"pushed_at": "2022-03-16T06:48:01Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 41,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -121,17 +121,17 @@
|
|||
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T18:55:20Z",
|
||||
"updated_at": "2022-04-28T06:34:30Z",
|
||||
"updated_at": "2022-04-28T15:27:44Z",
|
||||
"pushed_at": "2022-03-08T06:20:05Z",
|
||||
"stargazers_count": 936,
|
||||
"watchers_count": 936,
|
||||
"stargazers_count": 937,
|
||||
"watchers_count": 937,
|
||||
"forks_count": 194,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 194,
|
||||
"watchers": 936,
|
||||
"watchers": 937,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-12T10:56:10Z",
|
||||
"updated_at": "2022-04-28T07:31:55Z",
|
||||
"updated_at": "2022-04-28T14:40:00Z",
|
||||
"pushed_at": "2022-04-12T10:59:41Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1214,17 +1214,17 @@
|
|||
"description": "CVE-2022-22947 注入Godzilla内存马",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-26T05:48:27Z",
|
||||
"updated_at": "2022-04-28T07:36:38Z",
|
||||
"updated_at": "2022-04-28T16:44:25Z",
|
||||
"pushed_at": "2022-04-26T05:55:58Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 46,
|
||||
"watchers": 49,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -43,17 +43,17 @@
|
|||
"description": "POC for VMWARE CVE-2022-22954",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-11T13:59:23Z",
|
||||
"updated_at": "2022-04-28T11:54:42Z",
|
||||
"updated_at": "2022-04-28T18:15:11Z",
|
||||
"pushed_at": "2022-04-13T06:15:11Z",
|
||||
"stargazers_count": 242,
|
||||
"watchers_count": 242,
|
||||
"stargazers_count": 244,
|
||||
"watchers_count": 244,
|
||||
"forks_count": 41,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 41,
|
||||
"watchers": 242,
|
||||
"watchers": 244,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,11 +13,11 @@
|
|||
"description": "Spring4Shell Proof Of Concept\/And vulnerable application CVE-2022-22965",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-30T07:54:45Z",
|
||||
"updated_at": "2022-04-26T10:24:35Z",
|
||||
"updated_at": "2022-04-28T17:31:37Z",
|
||||
"pushed_at": "2022-04-07T19:05:54Z",
|
||||
"stargazers_count": 252,
|
||||
"watchers_count": 252,
|
||||
"forks_count": 79,
|
||||
"stargazers_count": 253,
|
||||
"watchers_count": 253,
|
||||
"forks_count": 80,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -31,8 +31,8 @@
|
|||
"tomcat"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 79,
|
||||
"watchers": 252,
|
||||
"forks": 80,
|
||||
"watchers": 253,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -119,17 +119,17 @@
|
|||
"description": "Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-31T00:24:28Z",
|
||||
"updated_at": "2022-04-28T08:36:56Z",
|
||||
"updated_at": "2022-04-28T13:02:32Z",
|
||||
"pushed_at": "2022-04-05T16:02:33Z",
|
||||
"stargazers_count": 213,
|
||||
"watchers_count": 213,
|
||||
"stargazers_count": 214,
|
||||
"watchers_count": 214,
|
||||
"forks_count": 186,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 186,
|
||||
"watchers": 213,
|
||||
"watchers": 214,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1618,7 +1618,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-04-23T09:01:22Z",
|
||||
"updated_at": "2022-04-28T12:15:48Z",
|
||||
"pushed_at": "2022-04-26T22:16:08Z",
|
||||
"pushed_at": "2022-04-28T13:25:08Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "SXF VPN RCE",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-25T10:13:40Z",
|
||||
"updated_at": "2022-04-27T03:32:45Z",
|
||||
"updated_at": "2022-04-28T14:28:52Z",
|
||||
"pushed_at": "2022-04-25T10:26:28Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 43,
|
||||
"watchers": 44,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -44,12 +44,12 @@
|
|||
"pushed_at": "2022-02-26T10:29:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
|
29
2022/CVE-2022-24449.json
Normal file
29
2022/CVE-2022-24449.json
Normal file
|
@ -0,0 +1,29 @@
|
|||
[
|
||||
{
|
||||
"id": 486592621,
|
||||
"name": "CVE-2022-24449",
|
||||
"full_name": "jet-pentest\/CVE-2022-24449",
|
||||
"owner": {
|
||||
"login": "jet-pentest",
|
||||
"id": 71512502,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71512502?v=4",
|
||||
"html_url": "https:\/\/github.com\/jet-pentest"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jet-pentest\/CVE-2022-24449",
|
||||
"description": "Solar Appscreener XXE",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-28T12:51:01Z",
|
||||
"updated_at": "2022-04-28T12:51:01Z",
|
||||
"pushed_at": "2022-04-28T13:07:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-15T22:59:03Z",
|
||||
"updated_at": "2022-04-28T09:58:06Z",
|
||||
"updated_at": "2022-04-28T13:03:45Z",
|
||||
"pushed_at": "2022-04-22T11:26:31Z",
|
||||
"stargazers_count": 635,
|
||||
"watchers_count": 635,
|
||||
"forks_count": 102,
|
||||
"stargazers_count": 636,
|
||||
"watchers_count": 636,
|
||||
"forks_count": 101,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 102,
|
||||
"watchers": 635,
|
||||
"forks": 101,
|
||||
"watchers": 636,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-20T21:23:52Z",
|
||||
"updated_at": "2022-04-28T10:22:31Z",
|
||||
"updated_at": "2022-04-28T14:30:09Z",
|
||||
"pushed_at": "2022-04-27T05:52:43Z",
|
||||
"stargazers_count": 249,
|
||||
"watchers_count": 249,
|
||||
"forks_count": 51,
|
||||
"stargazers_count": 251,
|
||||
"watchers_count": 251,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2022-29464"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 51,
|
||||
"watchers": 249,
|
||||
"forks": 52,
|
||||
"watchers": 251,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
27
README.md
27
README.md
|
@ -876,6 +876,9 @@ Argo CD before 2.1.9 and 2.2.x before 2.2.4 allows directory traversal related t
|
|||
|
||||
- [jkroepke/CVE-2022-24348-2](https://github.com/jkroepke/CVE-2022-24348-2)
|
||||
|
||||
### CVE-2022-24449
|
||||
- [jet-pentest/CVE-2022-24449](https://github.com/jet-pentest/CVE-2022-24449)
|
||||
|
||||
### CVE-2022-24483 (2022-04-15)
|
||||
|
||||
<code>
|
||||
|
@ -2937,6 +2940,14 @@ The All in One SEO – Best WordPress SEO Plugin – Easily Improve Your SEO Ran
|
|||
|
||||
- [darkpills/CVE-2021-24307-all-in-one-seo-pack-admin-rce](https://github.com/darkpills/CVE-2021-24307-all-in-one-seo-pack-admin-rce)
|
||||
|
||||
### CVE-2021-24507 (2021-08-09)
|
||||
|
||||
<code>
|
||||
The Astra Pro Addon WordPress plugin before 3.5.2 did not properly sanitise or escape some of the POST parameters from the astra_pagination_infinite and astra_shop_pagination_infinite AJAX action (available to both unauthenticated and authenticated user) before using them in SQL statement, leading to an SQL Injection issues
|
||||
</code>
|
||||
|
||||
- [RandomRobbieBF/CVE-2021-24507](https://github.com/RandomRobbieBF/CVE-2021-24507)
|
||||
|
||||
### CVE-2021-24750 (2021-12-21)
|
||||
|
||||
<code>
|
||||
|
@ -3652,6 +3663,14 @@ An integer overflow was addressed with improved input validation. This issue is
|
|||
|
||||
- [jeffssh/CVE-2021-30860](https://github.com/jeffssh/CVE-2021-30860)
|
||||
|
||||
### CVE-2021-30937 (2021-08-24)
|
||||
|
||||
<code>
|
||||
A memory corruption vulnerability was addressed with improved locking. This issue is fixed in macOS Big Sur 11.6.2, tvOS 15.2, macOS Monterey 12.1, Security Update 2021-008 Catalina, iOS 15.2 and iPadOS 15.2, watchOS 8.3. A malicious application may be able to execute arbitrary code with kernel privileges.
|
||||
</code>
|
||||
|
||||
- [realrodri/ExploiteameEsta](https://github.com/realrodri/ExploiteameEsta)
|
||||
|
||||
### CVE-2021-30955 (2021-08-24)
|
||||
|
||||
<code>
|
||||
|
@ -4008,7 +4027,7 @@ Windows Print Spooler Remote Code Execution Vulnerability
|
|||
### CVE-2021-34600 (2022-01-20)
|
||||
|
||||
<code>
|
||||
Telenot CompasX versions prior to 32.0 use a weak seed for random number generation leading to predictable AES keys used in the NFC tags used for authorization of users.
|
||||
Telenot CompasX versions prior to 32.0 use a weak seed for random number generation leading to predictable AES keys used in the NFC tags used for local authorization of users. This may lead to total loss of trustworthiness of the installation.
|
||||
</code>
|
||||
|
||||
- [x41sec/CVE-2021-34600](https://github.com/x41sec/CVE-2021-34600)
|
||||
|
@ -4271,7 +4290,6 @@ Microsoft MSHTML Remote Code Execution Vulnerability
|
|||
- [lockedbyte/CVE-2021-40444](https://github.com/lockedbyte/CVE-2021-40444)
|
||||
- [34zY/Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit](https://github.com/34zY/Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit)
|
||||
- [MRacumen/CVE-2021-40444](https://github.com/MRacumen/CVE-2021-40444)
|
||||
- [QwertyStack/CVE-2021-40444_PoC](https://github.com/QwertyStack/CVE-2021-40444_PoC)
|
||||
- [RedLeavesChilde/CVE-2021-40444](https://github.com/RedLeavesChilde/CVE-2021-40444)
|
||||
|
||||
### CVE-2021-40449 (2021-10-12)
|
||||
|
@ -4726,7 +4744,6 @@ Grafana is an open-source platform for monitoring and observability. Grafana ver
|
|||
- [tangxiaofeng7/CVE-2021-43798-Grafana-File-Read](https://github.com/tangxiaofeng7/CVE-2021-43798-Grafana-File-Read)
|
||||
- [jas502n/Grafana-CVE-2021-43798](https://github.com/jas502n/Grafana-CVE-2021-43798)
|
||||
- [ScorpionsMAX/CVE-2021-43798-Grafana-POC](https://github.com/ScorpionsMAX/CVE-2021-43798-Grafana-POC)
|
||||
- [Mr-xn/CVE-2021-43798](https://github.com/Mr-xn/CVE-2021-43798)
|
||||
- [asaotomo/CVE-2021-43798-Grafana-Exp](https://github.com/asaotomo/CVE-2021-43798-Grafana-Exp)
|
||||
- [A-D-Team/grafanaExp](https://github.com/A-D-Team/grafanaExp)
|
||||
- [j-jasson/CVE-2021-43798-grafana_fileread](https://github.com/j-jasson/CVE-2021-43798-grafana_fileread)
|
||||
|
@ -5979,7 +5996,7 @@ In updateNotification of BeamTransferManager.java, there is a possible permissio
|
|||
|
||||
- [pazhanivel07/Nfc_CVE-2020-0453](https://github.com/pazhanivel07/Nfc_CVE-2020-0453)
|
||||
- [nanopathi/Packages_apps_Nfc_CVE-2020-0453](https://github.com/nanopathi/Packages_apps_Nfc_CVE-2020-0453)
|
||||
- [Trinadh465/Nfc-CVE-2020-0453](https://github.com/Trinadh465/Nfc-CVE-2020-0453)
|
||||
- [Trinadh465/packages_apps_Nfc_AOSP10_r33_CVE-2020-0453](https://github.com/Trinadh465/packages_apps_Nfc_AOSP10_r33_CVE-2020-0453)
|
||||
|
||||
### CVE-2020-0458 (2020-12-14)
|
||||
|
||||
|
@ -14085,7 +14102,7 @@ bl-kernel/security.class.php in Bludit 3.9.2 allows attackers to bypass a brute-
|
|||
- [0xkasra/CVE-2019-17240](https://github.com/0xkasra/CVE-2019-17240)
|
||||
- [ColdFusionX/CVE-2019-17240_Bludit-BF-Bypass](https://github.com/ColdFusionX/CVE-2019-17240_Bludit-BF-Bypass)
|
||||
- [jayngng/bludit-CVE-2019-17240](https://github.com/jayngng/bludit-CVE-2019-17240)
|
||||
- [0xbrunosergio/bloodit](https://github.com/0xbrunosergio/bloodit)
|
||||
- [brunosergi0/bloodit](https://github.com/brunosergi0/bloodit)
|
||||
- [spyx/cve-2019-17240](https://github.com/spyx/cve-2019-17240)
|
||||
|
||||
### CVE-2019-17424 (2019-10-22)
|
||||
|
|
Loading…
Add table
Reference in a new issue