Auto Update 2024/02/12 12:26:24

This commit is contained in:
motikan2010-bot 2024-02-12 21:26:24 +09:00
parent bef25d6180
commit 6106180dcd
30 changed files with 160 additions and 125 deletions

View file

@ -43,10 +43,10 @@
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
"fork": false,
"created_at": "2016-06-30T11:56:44Z",
"updated_at": "2024-01-04T16:05:53Z",
"updated_at": "2024-02-12T10:37:28Z",
"pushed_at": "2016-06-30T15:32:42Z",
"stargazers_count": 335,
"watchers_count": 335,
"stargazers_count": 336,
"watchers_count": 336,
"has_discussions": false,
"forks_count": 120,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 120,
"watchers": 335,
"watchers": 336,
"score": 0,
"subscribers_count": 48
}

View file

@ -13,19 +13,19 @@
"description": "Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)",
"fork": false,
"created_at": "2016-06-22T23:03:30Z",
"updated_at": "2024-01-10T06:46:34Z",
"updated_at": "2024-02-12T10:51:54Z",
"pushed_at": "2016-06-23T00:47:50Z",
"stargazers_count": 113,
"watchers_count": 113,
"stargazers_count": 114,
"watchers_count": 114,
"has_discussions": false,
"forks_count": 61,
"forks_count": 62,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 61,
"watchers": 113,
"forks": 62,
"watchers": 114,
"score": 0,
"subscribers_count": 13
},

View file

@ -43,10 +43,10 @@
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
"fork": false,
"created_at": "2016-06-30T11:56:44Z",
"updated_at": "2024-01-04T16:05:53Z",
"updated_at": "2024-02-12T10:37:28Z",
"pushed_at": "2016-06-30T15:32:42Z",
"stargazers_count": 335,
"watchers_count": 335,
"stargazers_count": 336,
"watchers_count": 336,
"has_discussions": false,
"forks_count": 120,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 120,
"watchers": 335,
"watchers": 336,
"score": 0,
"subscribers_count": 48
}

View file

@ -163,10 +163,10 @@
"description": "Exploit for Laravel Remote Code Execution with API_KEY (CVE-2018-15133)",
"fork": false,
"created_at": "2020-11-13T16:33:52Z",
"updated_at": "2024-01-17T04:43:27Z",
"updated_at": "2024-02-12T10:20:51Z",
"pushed_at": "2020-12-31T20:34:30Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 42,
"watchers": 43,
"score": 0,
"subscribers_count": 2
},

View file

@ -43,10 +43,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-02-11T08:32:50Z",
"updated_at": "2024-02-12T11:32:42Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3987,
"watchers_count": 3987,
"stargazers_count": 3986,
"watchers_count": 3986,
"has_discussions": false,
"forks_count": 1093,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 1093,
"watchers": 3987,
"watchers": 3986,
"score": 0,
"subscribers_count": 154
},

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-02-11T08:32:50Z",
"updated_at": "2024-02-12T11:32:42Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3987,
"watchers_count": 3987,
"stargazers_count": 3986,
"watchers_count": 3986,
"has_discussions": false,
"forks_count": 1093,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1093,
"watchers": 3987,
"watchers": 3986,
"score": 0,
"subscribers_count": 154
},

View file

@ -13,10 +13,10 @@
"description": "Exploit code for CVE-2021-1961",
"fork": false,
"created_at": "2022-09-03T13:31:13Z",
"updated_at": "2024-01-24T19:14:59Z",
"updated_at": "2024-02-12T10:44:25Z",
"pushed_at": "2022-09-07T11:47:56Z",
"stargazers_count": 99,
"watchers_count": 99,
"stargazers_count": 100,
"watchers_count": 100,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 99,
"watchers": 100,
"score": 0,
"subscribers_count": 8
}

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.",
"fork": false,
"created_at": "2021-05-31T18:02:39Z",
"updated_at": "2024-02-09T10:23:57Z",
"updated_at": "2024-02-12T11:50:18Z",
"pushed_at": "2021-06-01T15:08:23Z",
"stargazers_count": 210,
"watchers_count": 210,
"stargazers_count": 211,
"watchers_count": 211,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 37,
"watchers": 210,
"watchers": 211,
"score": 0,
"subscribers_count": 4
},

View file

@ -2143,5 +2143,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 756290635,
"name": "LMU-CVE-2021-3156",
"full_name": "SamTruss\/LMU-CVE-2021-3156",
"owner": {
"login": "SamTruss",
"id": 46684055,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46684055?v=4",
"html_url": "https:\/\/github.com\/SamTruss"
},
"html_url": "https:\/\/github.com\/SamTruss\/LMU-CVE-2021-3156",
"description": null,
"fork": false,
"created_at": "2024-02-12T11:24:31Z",
"updated_at": "2024-02-12T11:24:32Z",
"pushed_at": "2024-02-12T11:29:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-38003 exploits extracted from https:\/\/twitter.com\/WhichbufferArda\/status\/1609604183535284224",
"fork": false,
"created_at": "2023-01-07T06:09:14Z",
"updated_at": "2023-10-31T02:59:13Z",
"updated_at": "2024-02-12T10:07:35Z",
"pushed_at": "2023-01-07T19:41:36Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 28,
"watchers": 29,
"score": 0,
"subscribers_count": 4
}

View file

@ -938,10 +938,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2024-02-12T02:02:12Z",
"updated_at": "2024-02-12T10:14:39Z",
"pushed_at": "2022-06-21T14:52:05Z",
"stargazers_count": 951,
"watchers_count": 951,
"stargazers_count": 952,
"watchers_count": 952,
"has_discussions": false,
"forks_count": 181,
"allow_forking": true,
@ -952,7 +952,7 @@
],
"visibility": "public",
"forks": 181,
"watchers": 951,
"watchers": 952,
"score": 0,
"subscribers_count": 14
},

View file

@ -907,12 +907,12 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2024-02-11T22:37:32Z",
"updated_at": "2024-02-12T08:45:53Z",
"pushed_at": "2023-11-08T21:02:16Z",
"stargazers_count": 1694,
"watchers_count": 1694,
"stargazers_count": 1695,
"watchers_count": 1695,
"has_discussions": false,
"forks_count": 501,
"forks_count": 502,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -923,8 +923,8 @@
"security"
],
"visibility": "public",
"forks": 501,
"watchers": 1694,
"forks": 502,
"watchers": 1695,
"score": 0,
"subscribers_count": 27
},
@ -6241,10 +6241,10 @@
"description": "Scanners for Jar files that may be vulnerable to CVE-2021-44228",
"fork": false,
"created_at": "2021-12-14T23:33:51Z",
"updated_at": "2024-01-26T09:40:55Z",
"updated_at": "2024-02-12T12:00:08Z",
"pushed_at": "2022-03-23T18:12:51Z",
"stargazers_count": 345,
"watchers_count": 345,
"stargazers_count": 346,
"watchers_count": 346,
"has_discussions": false,
"forks_count": 92,
"allow_forking": true,
@ -6253,7 +6253,7 @@
"topics": [],
"visibility": "public",
"forks": 92,
"watchers": 345,
"watchers": 346,
"score": 0,
"subscribers_count": 35
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-11-22T10:55:34Z",
"updated_at": "2024-01-18T12:02:57Z",
"updated_at": "2024-02-12T08:33:55Z",
"pushed_at": "2023-11-22T11:09:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2024-02-09T03:46:16Z",
"updated_at": "2024-02-12T07:28:19Z",
"pushed_at": "2023-02-26T14:06:05Z",
"stargazers_count": 1095,
"watchers_count": 1095,
"stargazers_count": 1096,
"watchers_count": 1096,
"has_discussions": true,
"forks_count": 186,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 186,
"watchers": 1095,
"watchers": 1096,
"score": 0,
"subscribers_count": 18
},

View file

@ -13,10 +13,10 @@
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
"updated_at": "2024-02-11T04:57:28Z",
"updated_at": "2024-02-12T06:44:21Z",
"pushed_at": "2024-02-11T02:51:34Z",
"stargazers_count": 161,
"watchers_count": 161,
"stargazers_count": 162,
"watchers_count": 162,
"has_discussions": true,
"forks_count": 22,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 22,
"watchers": 161,
"watchers": 162,
"score": 0,
"subscribers_count": 7
}

View file

@ -13,10 +13,10 @@
"description": "nps认证绕过利用工具CVE-2022-40494使用此工具可在浏览器访问web控制端后台页面或者批量获取socks5和http代理",
"fork": false,
"created_at": "2022-08-04T08:22:41Z",
"updated_at": "2024-02-08T13:29:39Z",
"updated_at": "2024-02-12T07:29:50Z",
"pushed_at": "2022-08-19T09:04:09Z",
"stargazers_count": 265,
"watchers_count": 265,
"stargazers_count": 266,
"watchers_count": 266,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 33,
"watchers": 265,
"watchers": 266,
"score": 0,
"subscribers_count": 6
}

View file

@ -13,10 +13,10 @@
"description": "Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.",
"fork": false,
"created_at": "2023-07-13T13:17:20Z",
"updated_at": "2024-02-12T06:19:07Z",
"updated_at": "2024-02-12T10:19:40Z",
"pushed_at": "2024-02-11T03:01:51Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 50,
"watchers_count": 50,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 48,
"watchers": 50,
"score": 0,
"subscribers_count": 2
},

View file

@ -172,10 +172,10 @@
"description": "RCE exploit for CVE-2023-3519",
"fork": false,
"created_at": "2023-07-21T20:17:43Z",
"updated_at": "2024-01-24T11:24:45Z",
"updated_at": "2024-02-12T11:10:32Z",
"pushed_at": "2023-08-23T16:27:28Z",
"stargazers_count": 209,
"watchers_count": 209,
"stargazers_count": 208,
"watchers_count": 208,
"has_discussions": false,
"forks_count": 41,
"allow_forking": true,
@ -184,7 +184,7 @@
"topics": [],
"visibility": "public",
"forks": 41,
"watchers": 209,
"watchers": 208,
"score": 0,
"subscribers_count": 4
},

View file

@ -308,10 +308,10 @@
"description": "Juniper RCE (Remote Code Execution) CVE-2023-36845 is a vulnerability that has been identified within Juniper's software. This particular flaw allows for remote code execution, meaning an attacker could run arbitrary code on a system without needing physical access to the device.",
"fork": false,
"created_at": "2024-01-30T08:00:23Z",
"updated_at": "2024-01-30T08:12:20Z",
"updated_at": "2024-02-12T07:51:29Z",
"pushed_at": "2024-01-30T08:23:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -320,7 +320,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "This repository is to provide a write-up and PoC for CVE-2023-41717.",
"fork": false,
"created_at": "2023-08-31T08:10:22Z",
"updated_at": "2023-09-28T11:46:52Z",
"updated_at": "2024-02-12T10:59:24Z",
"pushed_at": "2023-08-31T09:51:35Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 2
}

View file

@ -43,10 +43,10 @@
"description": "Exploit for CVE-2023-41892",
"fork": false,
"created_at": "2023-12-26T18:31:27Z",
"updated_at": "2024-02-03T17:31:01Z",
"updated_at": "2024-02-12T10:50:08Z",
"pushed_at": "2023-12-26T22:39:21Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-09-21T05:22:51Z",
"updated_at": "2024-01-30T02:34:04Z",
"updated_at": "2024-02-12T09:34:32Z",
"pushed_at": "2023-12-18T04:25:00Z",
"stargazers_count": 273,
"watchers_count": 273,
"stargazers_count": 274,
"watchers_count": 274,
"has_discussions": false,
"forks_count": 44,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 44,
"watchers": 273,
"watchers": 274,
"score": 0,
"subscribers_count": 13
},

View file

@ -1,6 +1,6 @@
[
{
"id": 742770050,
"id": 756306550,
"name": "CVE-2023-51000",
"full_name": "Team-Byerus\/CVE-2023-51000",
"owner": {
@ -12,11 +12,11 @@
"html_url": "https:\/\/github.com\/Team-Byerus\/CVE-2023-51000",
"description": null,
"fork": false,
"created_at": "2024-01-13T10:11:18Z",
"updated_at": "2024-01-16T10:51:59Z",
"pushed_at": "2024-01-18T13:27:36Z",
"stargazers_count": 2,
"watchers_count": 2,
"created_at": "2024-02-12T12:06:07Z",
"updated_at": "2024-02-12T12:06:08Z",
"pushed_at": "2024-02-12T12:06:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -43,10 +43,10 @@
"description": "PoC and Detection for CVE-2024-21626",
"fork": false,
"created_at": "2024-02-01T15:28:37Z",
"updated_at": "2024-02-10T19:28:47Z",
"updated_at": "2024-02-12T07:30:29Z",
"pushed_at": "2024-02-06T16:09:05Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 43,
"watchers": 44,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure",
"fork": false,
"created_at": "2024-02-09T14:31:56Z",
"updated_at": "2024-02-11T16:02:01Z",
"updated_at": "2024-02-12T09:53:22Z",
"pushed_at": "2024-02-09T15:14:03Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,19 +13,19 @@
"description": "File Upload vulnerability in MCMS 5.3.5",
"fork": false,
"created_at": "2024-02-12T06:19:19Z",
"updated_at": "2024-02-12T06:19:19Z",
"pushed_at": "2024-02-12T06:19:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"updated_at": "2024-02-12T08:22:45Z",
"pushed_at": "2024-02-12T07:04:25Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-02-04T07:37:21Z",
"updated_at": "2024-02-10T10:04:06Z",
"updated_at": "2024-02-12T09:10:12Z",
"pushed_at": "2024-02-05T02:11:42Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 2
}

View file

@ -73,10 +73,10 @@
"description": "CVE-2024-23897",
"fork": false,
"created_at": "2024-01-26T09:44:32Z",
"updated_at": "2024-02-08T06:09:40Z",
"updated_at": "2024-02-12T07:57:06Z",
"pushed_at": "2024-01-28T06:47:28Z",
"stargazers_count": 145,
"watchers_count": 145,
"stargazers_count": 146,
"watchers_count": 146,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 145,
"watchers": 146,
"score": 0,
"subscribers_count": 3
},

View file

@ -6461,7 +6461,11 @@
- [Mudoleto/Broker_ApacheMQ](https://github.com/Mudoleto/Broker_ApacheMQ)
- [hh-hunter/cve-2023-46604](https://github.com/hh-hunter/cve-2023-46604)
### CVE-2023-46615
### CVE-2023-46615 (-)
<code>Deserialization of Untrusted Data vulnerability in Kalli Dan. KD Coming Soon.This issue affects KD Coming Soon: from n/a through 1.7.\n\n
</code>
- [RandomRobbieBF/CVE-2023-46615](https://github.com/RandomRobbieBF/CVE-2023-46615)
### CVE-2023-46747 (2023-10-26)
@ -14479,6 +14483,7 @@
- [asepsaepdin/CVE-2021-3156](https://github.com/asepsaepdin/CVE-2021-3156)
- [DDayLuong/CVE-2021-3156](https://github.com/DDayLuong/CVE-2021-3156)
- [wurwur/CVE-2021-3156](https://github.com/wurwur/CVE-2021-3156)
- [SamTruss/LMU-CVE-2021-3156](https://github.com/SamTruss/LMU-CVE-2021-3156)
### CVE-2021-3157
- [CrackerCat/cve-2021-3157](https://github.com/CrackerCat/cve-2021-3157)