Auto Update 2023/11/21 06:37:47

This commit is contained in:
motikan2010-bot 2023-11-21 15:37:47 +09:00
parent ab1ac3de9b
commit 628581f0ea
73 changed files with 1013 additions and 175 deletions

View file

@ -54,10 +54,10 @@
"description": "Mitigated version for CVE-2016-1000027 spring web.",
"fork": false,
"created_at": "2023-11-20T02:02:10Z",
"updated_at": "2023-11-20T07:42:20Z",
"updated_at": "2023-11-21T03:38:27Z",
"pushed_at": "2023-11-20T02:29:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -66,7 +66,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -447,10 +447,10 @@
"description": "Dirty Cow exploit - CVE-2016-5195",
"fork": false,
"created_at": "2016-11-25T21:08:01Z",
"updated_at": "2023-11-15T05:14:48Z",
"updated_at": "2023-11-21T00:09:14Z",
"pushed_at": "2021-04-08T11:35:12Z",
"stargazers_count": 776,
"watchers_count": 776,
"stargazers_count": 777,
"watchers_count": 777,
"has_discussions": false,
"forks_count": 434,
"allow_forking": true,
@ -463,7 +463,7 @@
],
"visibility": "public",
"forks": 434,
"watchers": 776,
"watchers": 777,
"score": 0,
"subscribers_count": 11
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2017-0806 PoC (Android GateKeeperResponse writeToParcel\/createFromParcel mismatch)",
"fork": false,
"created_at": "2018-06-03T09:04:50Z",
"updated_at": "2023-07-17T01:53:23Z",
"updated_at": "2023-11-21T03:59:28Z",
"pushed_at": "2018-06-03T09:06:00Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 19,
"watchers": 20,
"score": 0,
"subscribers_count": 2
}

View file

@ -474,10 +474,10 @@
"description": "针对类似CVE-2017-10271漏洞的一个java反序列化漏洞扫描器",
"fork": false,
"created_at": "2018-12-13T02:00:23Z",
"updated_at": "2021-08-21T07:04:57Z",
"updated_at": "2023-11-21T01:26:28Z",
"pushed_at": "2018-12-13T14:05:28Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -486,7 +486,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 0
},

View file

@ -119,10 +119,10 @@
"description": "Multi-threaded, IPv6 aware, wordlists\/single-user username enumeration via CVE-2018-15473",
"fork": false,
"created_at": "2018-10-03T10:18:04Z",
"updated_at": "2023-11-08T13:10:38Z",
"updated_at": "2023-11-21T05:09:10Z",
"pushed_at": "2019-03-24T11:20:27Z",
"stargazers_count": 84,
"watchers_count": 84,
"stargazers_count": 85,
"watchers_count": 85,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -131,7 +131,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 84,
"watchers": 85,
"score": 0,
"subscribers_count": 1
},

View file

@ -258,7 +258,7 @@
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 10,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -271,7 +271,7 @@
"exploit"
],
"visibility": "public",
"forks": 10,
"forks": 9,
"watchers": 18,
"score": 0,
"subscribers_count": 3

View file

@ -355,10 +355,10 @@
"description": "Android Ransomware Development - AES256 encryption + CVE-2019-2215 (reverse root shell) + Data Exfiltration",
"fork": false,
"created_at": "2022-02-28T02:34:31Z",
"updated_at": "2023-10-28T22:31:13Z",
"updated_at": "2023-11-21T03:02:56Z",
"pushed_at": "2022-03-19T14:07:35Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -376,7 +376,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 16,
"watchers": 17,
"score": 0,
"subscribers_count": 4
},

View file

@ -73,10 +73,10 @@
"description": "CVE-2020-0096-StrandHogg2 复现",
"fork": false,
"created_at": "2020-09-07T10:25:25Z",
"updated_at": "2023-07-31T12:57:57Z",
"updated_at": "2023-11-21T04:01:23Z",
"pushed_at": "2021-03-15T11:14:18Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 4
}

View file

@ -138,7 +138,7 @@
"stargazers_count": 1077,
"watchers_count": 1077,
"has_discussions": false,
"forks_count": 329,
"forks_count": 328,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -148,7 +148,7 @@
"poc"
],
"visibility": "public",
"forks": 329,
"forks": 328,
"watchers": 1077,
"score": 0,
"subscribers_count": 37

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-36179~82 Jackson-databind SSRF&RCE",
"fork": false,
"created_at": "2021-01-10T06:47:49Z",
"updated_at": "2023-11-03T10:11:52Z",
"updated_at": "2023-11-21T03:02:46Z",
"pushed_at": "2021-01-10T06:48:53Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 77,
"watchers_count": 77,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 9,
"watchers": 76,
"watchers": 77,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": "Writeup and exploit for installed app to system privilege escalation on Android 12 Beta through CVE-2021-0928, a `writeToParcel`\/`createFromParcel` serialization mismatch in `OutputConfiguration`",
"fork": false,
"created_at": "2022-01-29T10:14:32Z",
"updated_at": "2023-11-20T06:50:23Z",
"updated_at": "2023-11-21T04:02:07Z",
"pushed_at": "2022-03-03T17:50:03Z",
"stargazers_count": 84,
"watchers_count": 84,
"stargazers_count": 85,
"watchers_count": 85,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 84,
"watchers": 85,
"score": 0,
"subscribers_count": 5
}

32
2021/CVE-2021-10086.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 432034471,
"name": "CVE-2021-10086",
"full_name": "AK-blank\/CVE-2021-10086",
"owner": {
"login": "AK-blank",
"id": 56591429,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56591429?v=4",
"html_url": "https:\/\/github.com\/AK-blank"
},
"html_url": "https:\/\/github.com\/AK-blank\/CVE-2021-10086",
"description": null,
"fork": false,
"created_at": "2021-11-26T02:43:58Z",
"updated_at": "2023-04-28T02:53:28Z",
"pushed_at": "2021-08-05T06:47:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1051,6 +1051,36 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 420590964,
"name": "CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler",
"full_name": "5l1v3r1\/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler",
"owner": {
"login": "5l1v3r1",
"id": 34143537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4",
"html_url": "https:\/\/github.com\/5l1v3r1"
},
"html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler",
"description": "Temporary mitigation to the CVE-2021-1675. 'Spooler' service-disabled based on time schedule. PowerShell Scripts and Task Scheduler code provided. ",
"fork": false,
"created_at": "2021-10-24T04:59:15Z",
"updated_at": "2021-10-24T04:59:16Z",
"pushed_at": "2021-07-05T05:41:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 435194981,
"name": "NimNightmare",

View file

@ -13,10 +13,10 @@
"description": "PoC for the CVE-2021-20837 : RCE in MovableType",
"fork": false,
"created_at": "2021-10-25T21:25:39Z",
"updated_at": "2023-09-28T11:32:38Z",
"updated_at": "2023-11-21T02:18:16Z",
"pushed_at": "2021-10-26T00:34:54Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 18,
"watchers": 19,
"score": 0,
"subscribers_count": 1
},

View file

@ -179,6 +179,36 @@
"score": 0,
"subscribers_count": 3
},
{
"id": 412724557,
"name": "CVE-2021-22005-metasploit",
"full_name": "TaroballzChen\/CVE-2021-22005-metasploit",
"owner": {
"login": "TaroballzChen",
"id": 27862593,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27862593?v=4",
"html_url": "https:\/\/github.com\/TaroballzChen"
},
"html_url": "https:\/\/github.com\/TaroballzChen\/CVE-2021-22005-metasploit",
"description": "the metasploit script(POC\/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability",
"fork": false,
"created_at": "2021-10-02T07:32:04Z",
"updated_at": "2023-09-28T11:31:56Z",
"pushed_at": "2021-10-02T08:21:38Z",
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 25,
"score": 0,
"subscribers_count": 2
},
{
"id": 420817779,
"name": "CVE-2021-22005",

View file

@ -89,6 +89,36 @@
"score": 0,
"subscribers_count": 3
},
{
"id": 412296277,
"name": "CVE-2021-22555-esc-priv",
"full_name": "daletoniris\/CVE-2021-22555-esc-priv",
"owner": {
"login": "daletoniris",
"id": 4347515,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4347515?v=4",
"html_url": "https:\/\/github.com\/daletoniris"
},
"html_url": "https:\/\/github.com\/daletoniris\/CVE-2021-22555-esc-priv",
"description": null,
"fork": false,
"created_at": "2021-10-01T02:18:45Z",
"updated_at": "2021-10-01T02:19:18Z",
"pushed_at": "2021-10-01T02:19:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 478003975,
"name": "CVE-2021-22555-PipeVersion",

View file

@ -29,6 +29,36 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 414051484,
"name": "cve-2021-24499",
"full_name": "hh-hunter\/cve-2021-24499",
"owner": {
"login": "hh-hunter",
"id": 91593280,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91593280?v=4",
"html_url": "https:\/\/github.com\/hh-hunter"
},
"html_url": "https:\/\/github.com\/hh-hunter\/cve-2021-24499",
"description": null,
"fork": false,
"created_at": "2021-10-06T03:07:31Z",
"updated_at": "2021-10-06T03:45:29Z",
"pushed_at": "2021-10-06T03:44:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 698068217,
"name": "CVE-2021-24499",

View file

@ -1,4 +1,34 @@
[
{
"id": 413699979,
"name": "CVE-2021-24545",
"full_name": "V35HR4J\/CVE-2021-24545",
"owner": {
"login": "V35HR4J",
"id": 54109630,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54109630?v=4",
"html_url": "https:\/\/github.com\/V35HR4J"
},
"html_url": "https:\/\/github.com\/V35HR4J\/CVE-2021-24545",
"description": "The plugin does not sanitise the HTML allowed in the Bio of users, allowing them to use malicious JavaScript code, which will be executed when anyone visit a post in the frontend made by such user. As a result, user with a role as low as author could perform Cross-Site Scripting attacks against users, which could potentially lead to privilege escalation when an admin view the related post\/s.",
"fork": false,
"created_at": "2021-10-05T06:28:05Z",
"updated_at": "2021-10-12T14:24:58Z",
"pushed_at": "2021-10-05T06:29:58Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 424104785,
"name": "CVE-2021-24545",

32
2021/CVE-2021-24563.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 413698388,
"name": "CVE-2021-24563",
"full_name": "V35HR4J\/CVE-2021-24563",
"owner": {
"login": "V35HR4J",
"id": 54109630,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54109630?v=4",
"html_url": "https:\/\/github.com\/V35HR4J"
},
"html_url": "https:\/\/github.com\/V35HR4J\/CVE-2021-24563",
"description": "The plugin does not prevent HTML files from being uploaded via its form, allowing unauthenticated user to upload a malicious HTML file containing JavaScript for example, which will be triggered when someone access the file directly",
"fork": false,
"created_at": "2021-10-05T06:21:50Z",
"updated_at": "2022-03-25T03:22:55Z",
"pushed_at": "2021-10-05T06:30:39Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -138,7 +138,7 @@
"stargazers_count": 1077,
"watchers_count": 1077,
"has_discussions": false,
"forks_count": 329,
"forks_count": 328,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -148,7 +148,7 @@
"poc"
],
"visibility": "public",
"forks": 329,
"forks": 328,
"watchers": 1077,
"score": 0,
"subscribers_count": 37

View file

@ -843,6 +843,36 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 412676582,
"name": "CVE-2021-26084",
"full_name": "wdjcy\/CVE-2021-26084",
"owner": {
"login": "wdjcy",
"id": 6531850,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6531850?v=4",
"html_url": "https:\/\/github.com\/wdjcy"
},
"html_url": "https:\/\/github.com\/wdjcy\/CVE-2021-26084",
"description": null,
"fork": false,
"created_at": "2021-10-02T03:11:50Z",
"updated_at": "2021-10-02T03:16:43Z",
"pushed_at": "2021-10-02T03:16:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 414400971,
"name": "CVE-2021-26084",
@ -873,6 +903,36 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 419246152,
"name": "CVE-2021-26084_Confluence",
"full_name": "TheclaMcentire\/CVE-2021-26084_Confluence",
"owner": {
"login": "TheclaMcentire",
"id": 86812068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86812068?v=4",
"html_url": "https:\/\/github.com\/TheclaMcentire"
},
"html_url": "https:\/\/github.com\/TheclaMcentire\/CVE-2021-26084_Confluence",
"description": "Exploit CVE 2021 26084 Confluence",
"fork": false,
"created_at": "2021-10-20T08:27:58Z",
"updated_at": "2022-03-09T21:42:31Z",
"pushed_at": "2021-09-08T11:04:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 420861154,
"name": "CVE-2021-26084",
@ -963,6 +1023,36 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 439271937,
"name": "Confluence-CVE-2021-26084",
"full_name": "30579096\/Confluence-CVE-2021-26084",
"owner": {
"login": "30579096",
"id": 27181766,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27181766?v=4",
"html_url": "https:\/\/github.com\/30579096"
},
"html_url": "https:\/\/github.com\/30579096\/Confluence-CVE-2021-26084",
"description": "OGNL Injection in Confluence server version < 7.12.5",
"fork": false,
"created_at": "2021-12-17T09:04:55Z",
"updated_at": "2022-01-19T15:47:35Z",
"pushed_at": "2021-09-03T07:37:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 447489190,
"name": "CVE-2021-26084",

View file

@ -58,5 +58,39 @@
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 414009465,
"name": "CVE-2021-27651",
"full_name": "orangmuda\/CVE-2021-27651",
"owner": {
"login": "orangmuda",
"id": 91846073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91846073?v=4",
"html_url": "https:\/\/github.com\/orangmuda"
},
"html_url": "https:\/\/github.com\/orangmuda\/CVE-2021-27651",
"description": "bypass all stages of the password reset flow",
"fork": false,
"created_at": "2021-10-05T23:33:50Z",
"updated_at": "2023-09-28T11:32:04Z",
"pushed_at": "2021-10-05T23:35:24Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"code-injection",
"pega",
"remote-code-execution"
],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,4 +1,34 @@
[
{
"id": 413725319,
"name": "nacos-cve-2021-29441",
"full_name": "hh-hunter\/nacos-cve-2021-29441",
"owner": {
"login": "hh-hunter",
"id": 91593280,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91593280?v=4",
"html_url": "https:\/\/github.com\/hh-hunter"
},
"html_url": "https:\/\/github.com\/hh-hunter\/nacos-cve-2021-29441",
"description": null,
"fork": false,
"created_at": "2021-10-05T07:59:05Z",
"updated_at": "2021-10-05T07:59:17Z",
"pushed_at": "2021-10-05T07:59:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 470076597,
"name": "CVE-2021-29441",

View file

@ -542,10 +542,10 @@
"description": "Laravel Debug mode RCE漏洞CVE-2021-3129poc \/ exp",
"fork": false,
"created_at": "2023-03-04T17:04:38Z",
"updated_at": "2023-11-02T00:51:04Z",
"updated_at": "2023-11-21T04:58:17Z",
"pushed_at": "2023-03-04T17:10:43Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -554,7 +554,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -215,6 +215,36 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 412824012,
"name": "CVE-2021-3493",
"full_name": "puckiestyle\/CVE-2021-3493",
"owner": {
"login": "puckiestyle",
"id": 57447087,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
"html_url": "https:\/\/github.com\/puckiestyle"
},
"html_url": "https:\/\/github.com\/puckiestyle\/CVE-2021-3493",
"description": null,
"fork": false,
"created_at": "2021-10-02T14:44:43Z",
"updated_at": "2023-01-10T03:23:13Z",
"pushed_at": "2021-10-02T14:44:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 544564976,
"name": "CVE-2021-3493",

View file

@ -338,6 +338,36 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 427315131,
"name": "CVE-2021-3560",
"full_name": "TomMalvoRiddle\/CVE-2021-3560",
"owner": {
"login": "TomMalvoRiddle",
"id": 64571518,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64571518?v=4",
"html_url": "https:\/\/github.com\/TomMalvoRiddle"
},
"html_url": "https:\/\/github.com\/TomMalvoRiddle\/CVE-2021-3560",
"description": "CVE-2021-3560 (Polkit - Local Privilege Escalation)",
"fork": false,
"created_at": "2021-11-12T10:15:45Z",
"updated_at": "2021-12-21T14:39:48Z",
"pushed_at": "2021-07-26T07:08:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 453938064,
"name": "CVE-2021-3560",

32
2021/CVE-2021-39433.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 413549812,
"name": "CVE-2021-39433",
"full_name": "PinkDraconian\/CVE-2021-39433",
"owner": {
"login": "PinkDraconian",
"id": 44903767,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44903767?v=4",
"html_url": "https:\/\/github.com\/PinkDraconian"
},
"html_url": "https:\/\/github.com\/PinkDraconian\/CVE-2021-39433",
"description": "BIQS IT Biqs-drive v1.83",
"fork": false,
"created_at": "2021-10-04T19:02:35Z",
"updated_at": "2022-12-10T12:13:04Z",
"pushed_at": "2021-10-04T19:02:53Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -705,6 +705,36 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 417517068,
"name": "MSHTML-CVE-2021-40444",
"full_name": "metehangenel\/MSHTML-CVE-2021-40444",
"owner": {
"login": "metehangenel",
"id": 31937891,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31937891?v=4",
"html_url": "https:\/\/github.com\/metehangenel"
},
"html_url": "https:\/\/github.com\/metehangenel\/MSHTML-CVE-2021-40444",
"description": null,
"fork": false,
"created_at": "2021-10-15T13:52:34Z",
"updated_at": "2022-12-16T15:56:59Z",
"pushed_at": "2021-09-16T17:53:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 417810289,
"name": "TIC4301_Project",

32
2021/CVE-2021-41511.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 412766915,
"name": "CVE-2021-41511",
"full_name": "vidvansh\/CVE-2021-41511",
"owner": {
"login": "vidvansh",
"id": 56179464,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56179464?v=4",
"html_url": "https:\/\/github.com\/vidvansh"
},
"html_url": "https:\/\/github.com\/vidvansh\/CVE-2021-41511",
"description": null,
"fork": false,
"created_at": "2021-10-02T10:44:59Z",
"updated_at": "2021-10-02T10:46:57Z",
"pushed_at": "2021-10-02T10:46:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -29,6 +29,66 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 413892415,
"name": "CVE-2021-41773",
"full_name": "numanturle\/CVE-2021-41773",
"owner": {
"login": "numanturle",
"id": 7007951,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4",
"html_url": "https:\/\/github.com\/numanturle"
},
"html_url": "https:\/\/github.com\/numanturle\/CVE-2021-41773",
"description": "CVE-2021-41773",
"fork": false,
"created_at": "2021-10-05T16:18:09Z",
"updated_at": "2023-09-28T11:32:02Z",
"pushed_at": "2021-10-05T16:48:27Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 10,
"score": 0,
"subscribers_count": 2
},
{
"id": 413901787,
"name": "CVE-2021-41773",
"full_name": "knqyf263\/CVE-2021-41773",
"owner": {
"login": "knqyf263",
"id": 2253692,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
"html_url": "https:\/\/github.com\/knqyf263"
},
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2021-41773",
"description": "Path traversal in Apache HTTP Server 2.4.49 (CVE-2021-41773) ",
"fork": false,
"created_at": "2021-10-05T16:45:41Z",
"updated_at": "2023-09-28T11:32:02Z",
"pushed_at": "2021-10-06T05:40:34Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 11,
"score": 0,
"subscribers_count": 3
},
{
"id": 413916578,
"name": "CVE-2021-41773-PoC",
@ -95,6 +155,96 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 413943505,
"name": "CVE-2021-41773",
"full_name": "masahiro331\/CVE-2021-41773",
"owner": {
"login": "masahiro331",
"id": 20438853,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20438853?v=4",
"html_url": "https:\/\/github.com\/masahiro331"
},
"html_url": "https:\/\/github.com\/masahiro331\/CVE-2021-41773",
"description": null,
"fork": false,
"created_at": "2021-10-05T18:56:04Z",
"updated_at": "2023-09-28T11:32:03Z",
"pushed_at": "2021-10-06T03:43:42Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 3
},
{
"id": 413969845,
"name": "CVE-2021-41773",
"full_name": "j4k0m\/CVE-2021-41773",
"owner": {
"login": "j4k0m",
"id": 48088579,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48088579?v=4",
"html_url": "https:\/\/github.com\/j4k0m"
},
"html_url": "https:\/\/github.com\/j4k0m\/CVE-2021-41773",
"description": "Exploitation of CVE-2021-41773 a Directory Traversal in Apache 2.4.49.",
"fork": false,
"created_at": "2021-10-05T20:30:01Z",
"updated_at": "2023-09-28T11:32:03Z",
"pushed_at": "2021-10-05T22:06:50Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 13,
"score": 0,
"subscribers_count": 2
},
{
"id": 413972926,
"name": "POC-CVE-2021-41773",
"full_name": "TishcaTpx\/POC-CVE-2021-41773",
"owner": {
"login": "TishcaTpx",
"id": 91351013,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91351013?v=4",
"html_url": "https:\/\/github.com\/TishcaTpx"
},
"html_url": "https:\/\/github.com\/TishcaTpx\/POC-CVE-2021-41773",
"description": "Poc.py ",
"fork": false,
"created_at": "2021-10-05T20:41:34Z",
"updated_at": "2023-09-28T11:32:03Z",
"pushed_at": "2021-10-05T21:29:59Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 7,
"score": 0,
"subscribers_count": 2
},
{
"id": 414013246,
"name": "CVE-2021-41773-PoC",
@ -192,6 +342,36 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 414050354,
"name": "CVE-2021-41773-PoC",
"full_name": "habibiefaried\/CVE-2021-41773-PoC",
"owner": {
"login": "habibiefaried",
"id": 4345690,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4345690?v=4",
"html_url": "https:\/\/github.com\/habibiefaried"
},
"html_url": "https:\/\/github.com\/habibiefaried\/CVE-2021-41773-PoC",
"description": "PoC for CVE-2021-41773 with docker to demonstrate",
"fork": false,
"created_at": "2021-10-06T03:01:41Z",
"updated_at": "2023-09-28T11:32:04Z",
"pushed_at": "2021-10-06T05:39:24Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 2
},
{
"id": 414082287,
"name": "CVE-2021-41773-POC",
@ -222,6 +402,36 @@
"score": 0,
"subscribers_count": 2
},
{
"id": 414082633,
"name": "cve-2021-41773-nse",
"full_name": "TAI-REx\/cve-2021-41773-nse",
"owner": {
"login": "TAI-REx",
"id": 78527947,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78527947?v=4",
"html_url": "https:\/\/github.com\/TAI-REx"
},
"html_url": "https:\/\/github.com\/TAI-REx\/cve-2021-41773-nse",
"description": "CVE-2021-41773.nse",
"fork": false,
"created_at": "2021-10-06T05:36:22Z",
"updated_at": "2021-11-26T18:07:10Z",
"pushed_at": "2021-10-06T05:23:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 414108838,
"name": "CVE-2021-41773",

View file

@ -48,10 +48,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2023-11-20T14:46:49Z",
"updated_at": "2023-11-21T01:41:23Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 659,
"watchers_count": 659,
"stargazers_count": 660,
"watchers_count": 660,
"has_discussions": false,
"forks_count": 113,
"allow_forking": true,
@ -60,7 +60,7 @@
"topics": [],
"visibility": "public",
"forks": 113,
"watchers": 659,
"watchers": 660,
"score": 0,
"subscribers_count": 12
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
"updated_at": "2023-11-13T01:26:35Z",
"updated_at": "2023-11-21T01:42:30Z",
"pushed_at": "2021-12-16T09:50:15Z",
"stargazers_count": 1264,
"watchers_count": 1264,
"stargazers_count": 1265,
"watchers_count": 1265,
"has_discussions": false,
"forks_count": 315,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 315,
"watchers": 1264,
"watchers": 1265,
"score": 0,
"subscribers_count": 27
},

View file

@ -857,7 +857,7 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
"updated_at": "2023-11-19T19:15:23Z",
"updated_at": "2023-11-21T01:28:56Z",
"pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 923,
"watchers_count": 923,

View file

@ -74,5 +74,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 721416376,
"name": "CVE-2022-0337-RePoC",
"full_name": "zer0ne1\/CVE-2022-0337-RePoC",
"owner": {
"login": "zer0ne1",
"id": 71746399,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71746399?v=4",
"html_url": "https:\/\/github.com\/zer0ne1"
},
"html_url": "https:\/\/github.com\/zer0ne1\/CVE-2022-0337-RePoC",
"description": null,
"fork": false,
"created_at": "2023-11-21T02:34:32Z",
"updated_at": "2023-11-21T02:36:09Z",
"pushed_at": "2023-11-21T02:36:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1215,10 +1215,10 @@
"description": "CVE-2022-0847 (Dirty Pipe) is an arbitrary file overwrite vulnerability that allows escalation of privileges by modifying or overwriting arbitrary read-only files e.g. \/etc\/passwd, \/etc\/shadow.",
"fork": false,
"created_at": "2022-03-13T05:51:06Z",
"updated_at": "2023-09-28T11:36:58Z",
"updated_at": "2023-11-21T01:23:36Z",
"pushed_at": "2022-03-13T06:02:30Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -1231,7 +1231,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()",
"fork": false,
"created_at": "2023-01-10T16:24:51Z",
"updated_at": "2023-11-20T09:46:18Z",
"updated_at": "2023-11-21T03:34:42Z",
"pushed_at": "2023-04-12T17:28:49Z",
"stargazers_count": 240,
"watchers_count": 240,
"stargazers_count": 241,
"watchers_count": 241,
"has_discussions": false,
"forks_count": 45,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 45,
"watchers": 240,
"watchers": 241,
"score": 0,
"subscribers_count": 8
}

View file

@ -163,10 +163,10 @@
"description": null,
"fork": false,
"created_at": "2022-10-17T07:54:13Z",
"updated_at": "2023-02-08T03:02:10Z",
"updated_at": "2023-11-21T01:52:22Z",
"pushed_at": "2022-10-17T08:12:33Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2023-11-20T12:40:09Z",
"updated_at": "2023-11-21T01:58:09Z",
"pushed_at": "2023-02-26T14:06:05Z",
"stargazers_count": 1070,
"watchers_count": 1070,
"stargazers_count": 1071,
"watchers_count": 1071,
"has_discussions": true,
"forks_count": 184,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 184,
"watchers": 1070,
"watchers": 1071,
"score": 0,
"subscribers_count": 18
},
@ -989,7 +989,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 502137857,

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -18,13 +18,13 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 5,
"score": 0,
"subscribers_count": 1

View file

@ -13,10 +13,10 @@
"description": "Automatic Mass Tool for check and exploiting vulnerability in CVE-2022-4061 - JobBoardWP < 1.2.2 - Unauthenticated Arbitrary File Upload",
"fork": false,
"created_at": "2023-09-17T03:20:23Z",
"updated_at": "2023-10-17T17:00:15Z",
"updated_at": "2023-11-21T01:46:05Z",
"pushed_at": "2023-09-17T10:05:02Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -87,6 +87,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -184,10 +184,10 @@
"description": "Confluence未授权添加管理员用户漏洞利用脚本",
"fork": false,
"created_at": "2023-10-12T02:41:23Z",
"updated_at": "2023-11-14T02:33:40Z",
"updated_at": "2023-11-21T05:54:17Z",
"pushed_at": "2023-10-26T07:39:57Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -196,7 +196,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 15,
"watchers": 17,
"score": 0,
"subscribers_count": 1
},

View file

@ -171,13 +171,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 2

View file

@ -13,20 +13,20 @@
"description": "LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.",
"fork": false,
"created_at": "2023-11-16T23:41:27Z",
"updated_at": "2023-11-20T18:34:51Z",
"updated_at": "2023-11-21T01:33:38Z",
"pushed_at": "2023-11-18T22:54:27Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 37,
"forks": 6,
"watchers": 39,
"score": 0,
"subscribers_count": 1
"subscribers_count": 4
}
]

View file

@ -18,13 +18,13 @@
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 18,
"score": 0,
"subscribers_count": 4

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-11-18T04:35:37Z",
"updated_at": "2023-11-18T12:43:05Z",
"updated_at": "2023-11-21T06:30:39Z",
"pushed_at": "2023-11-18T06:20:34Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -48,13 +48,13 @@
"stargazers_count": 88,
"watchers_count": 88,
"has_discussions": false,
"forks_count": 15,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 15,
"forks": 16,
"watchers": 88,
"score": 0,
"subscribers_count": 3

View file

@ -13,10 +13,10 @@
"description": "A Proof of Concept of Spring AMQP Deserialization Vulnerability (CVE-2023-34050)",
"fork": false,
"created_at": "2023-10-20T05:46:15Z",
"updated_at": "2023-11-01T03:05:55Z",
"updated_at": "2023-11-21T01:30:55Z",
"pushed_at": "2023-10-20T06:31:19Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,19 +13,19 @@
"description": "Report and exploit of CVE-2023-36427",
"fork": false,
"created_at": "2023-10-09T16:55:18Z",
"updated_at": "2023-11-20T16:24:58Z",
"updated_at": "2023-11-21T02:58:20Z",
"pushed_at": "2023-11-18T17:24:26Z",
"stargazers_count": 67,
"watchers_count": 67,
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 11,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 67,
"forks": 12,
"watchers": 71,
"score": 0,
"subscribers_count": 3
}

View file

@ -43,19 +43,19 @@
"description": "CVE-2023-36899漏洞的复现环境和工具针对ASP.NET框架中的无cookie会话身份验证绕过。",
"fork": false,
"created_at": "2023-08-15T23:36:17Z",
"updated_at": "2023-11-18T02:27:20Z",
"updated_at": "2023-11-21T00:45:28Z",
"pushed_at": "2023-08-15T23:37:11Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 19,
"forks": 4,
"watchers": 20,
"score": 0,
"subscribers_count": 2
}

View file

@ -107,10 +107,10 @@
"description": "一款用于生成winrar程序RCE即cve-2023-38831的POC的工具。",
"fork": false,
"created_at": "2023-08-27T14:08:36Z",
"updated_at": "2023-11-12T02:51:59Z",
"updated_at": "2023-11-21T05:44:25Z",
"pushed_at": "2023-08-27T14:35:00Z",
"stargazers_count": 95,
"watchers_count": 95,
"stargazers_count": 96,
"watchers_count": 96,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 95,
"watchers": 96,
"score": 0,
"subscribers_count": 1
},

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-10-30T17:03:24Z",
"updated_at": "2023-10-30T17:19:13Z",
"pushed_at": "2023-11-20T00:42:38Z",
"pushed_at": "2023-11-21T03:09:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -13,19 +13,19 @@
"description": "CVE-2023-4357. Chrome XXE 漏洞 POC, 实现对访客者本地文件读取. Chrome XXE vulnerability POC, allowing attackers to obtain local files of visitors.",
"fork": false,
"created_at": "2023-11-17T10:32:31Z",
"updated_at": "2023-11-20T12:56:27Z",
"pushed_at": "2023-11-20T17:09:43Z",
"stargazers_count": 41,
"watchers_count": 41,
"updated_at": "2023-11-21T06:30:46Z",
"pushed_at": "2023-11-21T04:50:58Z",
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 13,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 41,
"forks": 16,
"watchers": 47,
"score": 0,
"subscribers_count": 1
},
@ -43,20 +43,50 @@
"description": "Apt style exploitation of Chrome 0day CVE-2023-4357",
"fork": false,
"created_at": "2023-11-19T22:20:10Z",
"updated_at": "2023-11-20T23:51:20Z",
"updated_at": "2023-11-21T05:52:16Z",
"pushed_at": "2023-11-20T01:02:44Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 9,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 13,
"forks": 12,
"watchers": 15,
"score": 0,
"subscribers_count": 1
},
{
"id": 721463764,
"name": "CVE-2023-4357-APT-Style-exploitation",
"full_name": "passwa11\/CVE-2023-4357-APT-Style-exploitation",
"owner": {
"login": "passwa11",
"id": 112363374,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112363374?v=4",
"html_url": "https:\/\/github.com\/passwa11"
},
"html_url": "https:\/\/github.com\/passwa11\/CVE-2023-4357-APT-Style-exploitation",
"description": null,
"fork": false,
"created_at": "2023-11-21T05:39:15Z",
"updated_at": "2023-11-21T05:39:35Z",
"pushed_at": "2023-11-21T05:39:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具, 基于 Go 语言",
"fork": false,
"created_at": "2023-10-27T05:57:21Z",
"updated_at": "2023-11-20T07:19:13Z",
"updated_at": "2023-11-21T06:38:23Z",
"pushed_at": "2023-11-17T08:40:55Z",
"stargazers_count": 154,
"watchers_count": 154,
"stargazers_count": 155,
"watchers_count": 155,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 154,
"watchers": 155,
"score": 0,
"subscribers_count": 3
},
@ -78,13 +78,13 @@
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 12,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"forks": 13,
"watchers": 47,
"score": 0,
"subscribers_count": 2
@ -165,10 +165,10 @@
"description": "CVE-2023-46604 Apache ActiveMQ RCE exp 基于python",
"fork": false,
"created_at": "2023-11-08T07:48:00Z",
"updated_at": "2023-11-11T13:43:44Z",
"updated_at": "2023-11-21T01:29:23Z",
"pushed_at": "2023-11-08T07:52:43Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -177,7 +177,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
@ -345,10 +345,10 @@
"description": "PY",
"fork": false,
"created_at": "2023-11-20T02:24:47Z",
"updated_at": "2023-11-20T02:25:50Z",
"updated_at": "2023-11-21T01:50:16Z",
"pushed_at": "2023-11-20T07:41:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -357,9 +357,9 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 721121106,
@ -389,6 +389,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "exploit for cve-2023-47246 SysAid RCE (shell upload)",
"fork": false,
"created_at": "2023-11-17T07:03:06Z",
"updated_at": "2023-11-20T15:06:19Z",
"updated_at": "2023-11-21T05:52:39Z",
"pushed_at": "2023-11-17T07:19:11Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 26,
"watchers": 27,
"score": 0,
"subscribers_count": 1
}

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -317,6 +317,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -237,7 +237,7 @@
"fork": false,
"created_at": "2023-11-13T12:51:34Z",
"updated_at": "2023-11-13T12:59:12Z",
"pushed_at": "2023-11-13T12:58:13Z",
"pushed_at": "2023-11-21T03:56:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -692,6 +692,7 @@
- [xcanwin/CVE-2023-4357-Chrome-XXE](https://github.com/xcanwin/CVE-2023-4357-Chrome-XXE)
- [OgulcanUnveren/CVE-2023-4357-APT-Style-exploitation](https://github.com/OgulcanUnveren/CVE-2023-4357-APT-Style-exploitation)
- [passwa11/CVE-2023-4357-APT-Style-exploitation](https://github.com/passwa11/CVE-2023-4357-APT-Style-exploitation)
### CVE-2023-4460
- [0xn4d/poc-cve-xss-uploading-svg](https://github.com/0xn4d/poc-cve-xss-uploading-svg)
@ -5421,6 +5422,7 @@
- [Puliczek/CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera](https://github.com/Puliczek/CVE-2022-0337-PoC-Google-Chrome-Microsoft-Edge-Opera)
- [maldev866/ChExp-CVE-2022-0337-](https://github.com/maldev866/ChExp-CVE-2022-0337-)
- [zer0ne1/CVE-2022-0337-RePoC](https://github.com/zer0ne1/CVE-2022-0337-RePoC)
### CVE-2022-0412 (2022-02-28)
@ -12141,6 +12143,7 @@
- [ly4k/PrintNightmare](https://github.com/ly4k/PrintNightmare)
- [Wra7h/SharpPN](https://github.com/Wra7h/SharpPN)
- [OppressionBreedsResistance/CVE-2021-1675-PrintNightmare](https://github.com/OppressionBreedsResistance/CVE-2021-1675-PrintNightmare)
- [5l1v3r1/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler](https://github.com/5l1v3r1/CVE-2021-1675-Mitigation-For-Systems-That-Need-Spooler)
- [eversinc33/NimNightmare](https://github.com/eversinc33/NimNightmare)
- [AndrewTrube/CVE-2021-1675](https://github.com/AndrewTrube/CVE-2021-1675)
- [TheJoyOfHacking/cube0x0-CVE-2021-1675](https://github.com/TheJoyOfHacking/cube0x0-CVE-2021-1675)
@ -12609,6 +12612,7 @@
- [inspiringz/CVE-2021-3493](https://github.com/inspiringz/CVE-2021-3493)
- [derek-turing/CVE-2021-3493](https://github.com/derek-turing/CVE-2021-3493)
- [cerodah/overlayFS-CVE-2021-3493](https://github.com/cerodah/overlayFS-CVE-2021-3493)
- [puckiestyle/CVE-2021-3493](https://github.com/puckiestyle/CVE-2021-3493)
- [Senz4wa/CVE-2021-3493](https://github.com/Senz4wa/CVE-2021-3493)
- [fei9747/CVE-2021-3493](https://github.com/fei9747/CVE-2021-3493)
- [pmihsan/OverlayFS-CVE-2021-3493](https://github.com/pmihsan/OverlayFS-CVE-2021-3493)
@ -12638,6 +12642,7 @@
- [cpu0x00/CVE-2021-3560](https://github.com/cpu0x00/CVE-2021-3560)
- [BizarreLove/CVE-2021-3560](https://github.com/BizarreLove/CVE-2021-3560)
- [0dayNinja/CVE-2021-3560](https://github.com/0dayNinja/CVE-2021-3560)
- [TomMalvoRiddle/CVE-2021-3560](https://github.com/TomMalvoRiddle/CVE-2021-3560)
- [chenaotian/CVE-2021-3560](https://github.com/chenaotian/CVE-2021-3560)
- [n3onhacks/CVE-2021-3560](https://github.com/n3onhacks/CVE-2021-3560)
- [f4T1H21/CVE-2021-3560-Polkit-DBus](https://github.com/f4T1H21/CVE-2021-3560-Polkit-DBus)
@ -12944,6 +12949,9 @@
### CVE-2021-6901
- [mooneee/cve-2021-6901](https://github.com/mooneee/cve-2021-6901)
### CVE-2021-10086
- [AK-blank/CVE-2021-10086](https://github.com/AK-blank/CVE-2021-10086)
### CVE-2021-20021 (2021-04-09)
<code>A vulnerability in the SonicWall Email Security version 10.0.9.x allows an attacker to create an administrative account by sending a crafted HTTP request to the remote host.
@ -13319,6 +13327,7 @@
- [5gstudent/CVE-2021-22005-](https://github.com/5gstudent/CVE-2021-22005-)
- [RedTeamExp/CVE-2021-22005_PoC](https://github.com/RedTeamExp/CVE-2021-22005_PoC)
- [rwincey/CVE-2021-22005](https://github.com/rwincey/CVE-2021-22005)
- [TaroballzChen/CVE-2021-22005-metasploit](https://github.com/TaroballzChen/CVE-2021-22005-metasploit)
- [TiagoSergio/CVE-2021-22005](https://github.com/TiagoSergio/CVE-2021-22005)
- [Jun-5heng/CVE-2021-22005](https://github.com/Jun-5heng/CVE-2021-22005)
- [shmilylty/cve-2021-22005-exp](https://github.com/shmilylty/cve-2021-22005-exp)
@ -13475,6 +13484,7 @@
- [JoneyJunior/cve-2021-22555](https://github.com/JoneyJunior/cve-2021-22555)
- [xyjl-ly/CVE-2021-22555-Exploit](https://github.com/xyjl-ly/CVE-2021-22555-Exploit)
- [cgwalters/container-cve-2021-22555](https://github.com/cgwalters/container-cve-2021-22555)
- [daletoniris/CVE-2021-22555-esc-priv](https://github.com/daletoniris/CVE-2021-22555-esc-priv)
- [veritas501/CVE-2021-22555-PipeVersion](https://github.com/veritas501/CVE-2021-22555-PipeVersion)
- [masjohncook/netsec-project](https://github.com/masjohncook/netsec-project)
- [tukru/CVE-2021-22555](https://github.com/tukru/CVE-2021-22555)
@ -13706,6 +13716,7 @@
</code>
- [j4k0m/CVE-2021-24499](https://github.com/j4k0m/CVE-2021-24499)
- [hh-hunter/cve-2021-24499](https://github.com/hh-hunter/cve-2021-24499)
- [jytmX/CVE-2021-24499](https://github.com/jytmX/CVE-2021-24499)
### CVE-2021-24507 (2021-08-09)
@ -13720,8 +13731,16 @@
<code>The WP HTML Author Bio WordPress plugin through 1.2.0 does not sanitise the HTML allowed in the Bio of users, allowing them to use malicious JavaScript code, which will be executed when anyone visit a post in the frontend made by such user. As a result, user with a role as low as author could perform Cross-Site Scripting attacks against users, which could potentially lead to privilege escalation when an admin view the related post/s.
</code>
- [V35HR4J/CVE-2021-24545](https://github.com/V35HR4J/CVE-2021-24545)
- [dnr6419/CVE-2021-24545](https://github.com/dnr6419/CVE-2021-24545)
### CVE-2021-24563 (2021-10-11)
<code>The Frontend Uploader WordPress plugin through 1.3.2 does not prevent HTML files from being uploaded via its form, allowing unauthenticated user to upload a malicious HTML file containing JavaScript for example, which will be triggered when someone access the file directly
</code>
- [V35HR4J/CVE-2021-24563](https://github.com/V35HR4J/CVE-2021-24563)
### CVE-2021-24647 (2021-11-08)
<code>The Registration Forms User profile, Content Restriction, Spam Protection, Payment Gateways, Invitation Codes WordPress plugin before 3.1.7.6 has a flaw in the social login implementation, allowing unauthenticated attacker to login as any user on the site by only knowing their user ID or username
@ -13934,10 +13953,13 @@
- [nizar0x1f/CVE-2021-26084-patch-](https://github.com/nizar0x1f/CVE-2021-26084-patch-)
- [dorkerdevil/CVE-2021-26084](https://github.com/dorkerdevil/CVE-2021-26084)
- [ludy-dev/CVE-2021-26084_PoC](https://github.com/ludy-dev/CVE-2021-26084_PoC)
- [wdjcy/CVE-2021-26084](https://github.com/wdjcy/CVE-2021-26084)
- [orangmuda/CVE-2021-26084](https://github.com/orangmuda/CVE-2021-26084)
- [TheclaMcentire/CVE-2021-26084_Confluence](https://github.com/TheclaMcentire/CVE-2021-26084_Confluence)
- [Jun-5heng/CVE-2021-26084](https://github.com/Jun-5heng/CVE-2021-26084)
- [lleavesl/CVE-2021-26084](https://github.com/lleavesl/CVE-2021-26084)
- [quesodipesto/conflucheck](https://github.com/quesodipesto/conflucheck)
- [30579096/Confluence-CVE-2021-26084](https://github.com/30579096/Confluence-CVE-2021-26084)
- [antx-code/CVE-2021-26084](https://github.com/antx-code/CVE-2021-26084)
- [vpxuser/CVE-2021-26084-EXP](https://github.com/vpxuser/CVE-2021-26084-EXP)
@ -14292,6 +14314,7 @@
- [samwcyo/CVE-2021-27651-PoC](https://github.com/samwcyo/CVE-2021-27651-PoC)
- [Vulnmachines/CVE-2021-27651](https://github.com/Vulnmachines/CVE-2021-27651)
- [orangmuda/CVE-2021-27651](https://github.com/orangmuda/CVE-2021-27651)
### CVE-2021-27850 (2021-04-15)
@ -14490,6 +14513,7 @@
<code>Nacos is a platform designed for dynamic service discovery and configuration and service management. In Nacos before version 1.4.1, when configured to use authentication (-Dnacos.core.auth.enabled=true) Nacos uses the AuthFilter servlet filter to enforce authentication. This filter has a backdoor that enables Nacos servers to bypass this filter and therefore skip authentication checks. This mechanism relies on the user-agent HTTP header so it can be easily spoofed. This issue may allow any user to carry out any administrative tasks on the Nacos server.
</code>
- [hh-hunter/nacos-cve-2021-29441](https://github.com/hh-hunter/nacos-cve-2021-29441)
- [bysinks/CVE-2021-29441](https://github.com/bysinks/CVE-2021-29441)
### CVE-2021-29447 (2021-04-15)
@ -15846,6 +15870,13 @@
- [StefanDorresteijn/CVE-2021-39409](https://github.com/StefanDorresteijn/CVE-2021-39409)
### CVE-2021-39433 (2021-10-04)
<code>A local file inclusion (LFI) vulnerability exists in version BIQS IT Biqs-drive v1.83 and below when sending a specific payload as the file parameter to download/index.php. This allows the attacker to read arbitrary files from the server with the permissions of the configured web-user.
</code>
- [PinkDraconian/CVE-2021-39433](https://github.com/PinkDraconian/CVE-2021-39433)
### CVE-2021-39473 (2022-11-04)
<code>Saibamen HotelManager v1.2 is vulnerable to Cross Site Scripting (XSS) due to improper sanitization of comment and contact fields.
@ -16061,6 +16092,7 @@
- [kal1gh0st/CVE-2021-40444_CAB_archives](https://github.com/kal1gh0st/CVE-2021-40444_CAB_archives)
- [LazarusReborn/Docx-Exploit-2021](https://github.com/LazarusReborn/Docx-Exploit-2021)
- [H0j3n/CVE-2021-40444](https://github.com/H0j3n/CVE-2021-40444)
- [metehangenel/MSHTML-CVE-2021-40444](https://github.com/metehangenel/MSHTML-CVE-2021-40444)
- [Jeromeyoung/TIC4301_Project](https://github.com/Jeromeyoung/TIC4301_Project)
- [TiagoSergio/CVE-2021-40444](https://github.com/TiagoSergio/CVE-2021-40444)
- [wh00datz/CVE-2021-40444-POC](https://github.com/wh00datz/CVE-2021-40444-POC)
@ -16308,6 +16340,13 @@
- [Net-hunter121/CVE-2021-41381](https://github.com/Net-hunter121/CVE-2021-41381)
### CVE-2021-41511 (2021-10-04)
<code>The username and password field of login in Lodging Reservation Management System V1 can give access to any user by using SQL injection to bypass authentication.
</code>
- [vidvansh/CVE-2021-41511](https://github.com/vidvansh/CVE-2021-41511)
### CVE-2021-41560 (2021-12-15)
<code>OpenCATS through 0.9.6 allows remote attackers to execute arbitrary code by uploading an executable file via lib/FileUtility.php.
@ -16401,12 +16440,19 @@
</code>
- [Vulnmachines/cve-2021-41773](https://github.com/Vulnmachines/cve-2021-41773)
- [numanturle/CVE-2021-41773](https://github.com/numanturle/CVE-2021-41773)
- [knqyf263/CVE-2021-41773](https://github.com/knqyf263/CVE-2021-41773)
- [ZephrFish/CVE-2021-41773-PoC](https://github.com/ZephrFish/CVE-2021-41773-PoC)
- [iilegacyyii/PoC-CVE-2021-41773](https://github.com/iilegacyyii/PoC-CVE-2021-41773)
- [masahiro331/CVE-2021-41773](https://github.com/masahiro331/CVE-2021-41773)
- [j4k0m/CVE-2021-41773](https://github.com/j4k0m/CVE-2021-41773)
- [TishcaTpx/POC-CVE-2021-41773](https://github.com/TishcaTpx/POC-CVE-2021-41773)
- [lorddemon/CVE-2021-41773-PoC](https://github.com/lorddemon/CVE-2021-41773-PoC)
- [Ls4ss/CVE-2021-41773_CVE-2021-42013](https://github.com/Ls4ss/CVE-2021-41773_CVE-2021-42013)
- [itsecurityco/CVE-2021-41773](https://github.com/itsecurityco/CVE-2021-41773)
- [habibiefaried/CVE-2021-41773-PoC](https://github.com/habibiefaried/CVE-2021-41773-PoC)
- [creadpag/CVE-2021-41773-POC](https://github.com/creadpag/CVE-2021-41773-POC)
- [TAI-REx/cve-2021-41773-nse](https://github.com/TAI-REx/cve-2021-41773-nse)
- [blasty/CVE-2021-41773](https://github.com/blasty/CVE-2021-41773)
- [PentesterGuruji/CVE-2021-41773](https://github.com/PentesterGuruji/CVE-2021-41773)
- [jbovet/CVE-2021-41773](https://github.com/jbovet/CVE-2021-41773)