Auto Update 2021/11/01 00:12:44

This commit is contained in:
motikan2010-bot 2021-11-01 00:12:44 +09:00
parent 42e3026ad9
commit 6959b6fa39
22 changed files with 133 additions and 216 deletions

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-06-06T09:41:51Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 2,
"score": 0
}

View file

@ -17,7 +17,7 @@
"pushed_at": "2018-04-07T00:30:52Z",
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 15,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"topics": [
@ -28,7 +28,7 @@
"vulnerable-container"
],
"visibility": "public",
"forks": 15,
"forks": 16,
"watchers": 29,
"score": 0
},

View file

@ -17,12 +17,12 @@
"pushed_at": "2015-04-22T12:54:22Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 2,
"score": 0
},
@ -71,7 +71,7 @@
"pushed_at": "2018-04-07T01:10:06Z",
"stargazers_count": 81,
"watchers_count": 81,
"forks_count": 42,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
"topics": [
@ -83,7 +83,7 @@
"vulnerable-container"
],
"visibility": "public",
"forks": 42,
"forks": 43,
"watchers": 81,
"score": 0
},
@ -186,12 +186,12 @@
"pushed_at": "2020-05-15T18:12:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
},
@ -213,12 +213,12 @@
"pushed_at": "2020-12-24T02:20:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
},
@ -240,12 +240,12 @@
"pushed_at": "2021-06-07T20:16:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
},

View file

@ -1,29 +0,0 @@
[
{
"id": 57211701,
"name": "mach_race",
"full_name": "gdbinit\/mach_race",
"owner": {
"login": "gdbinit",
"id": 859134,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/859134?v=4",
"html_url": "https:\/\/github.com\/gdbinit"
},
"html_url": "https:\/\/github.com\/gdbinit\/mach_race",
"description": "Exploit code for CVE-2016-1757",
"fork": false,
"created_at": "2016-04-27T12:29:28Z",
"updated_at": "2021-09-09T02:27:23Z",
"pushed_at": "2016-04-27T14:07:43Z",
"stargazers_count": 81,
"watchers_count": 81,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 81,
"score": 0
}
]

View file

@ -1,29 +0,0 @@
[
{
"id": 56461631,
"name": "cfengine-CVE-2016-2118",
"full_name": "nickanderson\/cfengine-CVE-2016-2118",
"owner": {
"login": "nickanderson",
"id": 202896,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/202896?v=4",
"html_url": "https:\/\/github.com\/nickanderson"
},
"html_url": "https:\/\/github.com\/nickanderson\/cfengine-CVE-2016-2118",
"description": "An example detection and remediation policy.",
"fork": false,
"created_at": "2016-04-17T22:22:04Z",
"updated_at": "2016-04-18T02:57:44Z",
"pushed_at": "2016-04-19T14:24:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1,29 +0,0 @@
[
{
"id": 56758577,
"name": "CVE-2016-3141",
"full_name": "peternguyen93\/CVE-2016-3141",
"owner": {
"login": "peternguyen93",
"id": 1802870,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1802870?v=4",
"html_url": "https:\/\/github.com\/peternguyen93"
},
"html_url": "https:\/\/github.com\/peternguyen93\/CVE-2016-3141",
"description": "CVE-2016-3141",
"fork": false,
"created_at": "2016-04-21T08:59:05Z",
"updated_at": "2019-11-27T06:28:33Z",
"pushed_at": "2016-04-23T15:55:01Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 14,
"score": 0
}
]

View file

@ -17,12 +17,12 @@
"pushed_at": "2018-08-17T23:31:46Z",
"stargazers_count": 163,
"watchers_count": 163,
"forks_count": 33,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 33,
"forks": 32,
"watchers": 163,
"score": 0
}

View file

@ -78,7 +78,7 @@
"pushed_at": "2021-01-08T10:31:22Z",
"stargazers_count": 504,
"watchers_count": 504,
"forks_count": 169,
"forks_count": 170,
"allow_forking": true,
"is_template": false,
"topics": [
@ -93,7 +93,7 @@
"sa-core-2018-002"
],
"visibility": "public",
"forks": 169,
"forks": 170,
"watchers": 504,
"score": 0
},

View file

@ -44,12 +44,12 @@
"pushed_at": "2021-09-22T02:19:32Z",
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"forks": 8,
"watchers": 31,
"score": 0
},

View file

@ -40,10 +40,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-10-30T07:38:33Z",
"updated_at": "2021-10-31T13:51:47Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2950,
"watchers_count": 2950,
"stargazers_count": 2952,
"watchers_count": 2952,
"forks_count": 871,
"allow_forking": true,
"is_template": false,
@ -70,7 +70,7 @@
],
"visibility": "public",
"forks": 871,
"watchers": 2950,
"watchers": 2952,
"score": 0
},
{

View file

@ -94,17 +94,17 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2021-10-29T12:36:18Z",
"updated_at": "2021-10-31T09:13:59Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 875,
"watchers_count": 875,
"stargazers_count": 876,
"watchers_count": 876,
"forks_count": 239,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 239,
"watchers": 875,
"watchers": 876,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-10-30T07:38:33Z",
"updated_at": "2021-10-31T13:51:47Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 2950,
"watchers_count": 2950,
"stargazers_count": 2952,
"watchers_count": 2952,
"forks_count": 871,
"allow_forking": true,
"is_template": false,
@ -43,7 +43,7 @@
],
"visibility": "public",
"forks": 871,
"watchers": 2950,
"watchers": 2952,
"score": 0
},
{

View file

@ -1,28 +1,28 @@
[
{
"id": 385804187,
"id": 401543989,
"name": "CVE-2021-10086",
"full_name": "0ahu\/CVE-2021-10086",
"full_name": "xiaoyun-1\/CVE-2021-10086",
"owner": {
"login": "0ahu",
"id": 9623677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9623677?v=4",
"html_url": "https:\/\/github.com\/0ahu"
"login": "xiaoyun-1",
"id": 58814739,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58814739?v=4",
"html_url": "https:\/\/github.com\/xiaoyun-1"
},
"html_url": "https:\/\/github.com\/0ahu\/CVE-2021-10086",
"html_url": "https:\/\/github.com\/xiaoyun-1\/CVE-2021-10086",
"description": null,
"fork": false,
"created_at": "2021-07-14T03:38:36Z",
"updated_at": "2021-08-05T06:47:50Z",
"pushed_at": "2021-10-02T14:38:18Z",
"created_at": "2021-08-31T02:08:07Z",
"updated_at": "2021-10-31T12:23:49Z",
"pushed_at": "2021-08-05T06:47:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 0,
"watchers": 0,
"score": 0
}

View file

@ -13,17 +13,17 @@
"description": "PoC for the CVE-2021-20837 : RCE in MovableType",
"fork": false,
"created_at": "2021-10-25T21:25:39Z",
"updated_at": "2021-10-30T07:34:56Z",
"updated_at": "2021-10-31T10:18:48Z",
"pushed_at": "2021-10-26T00:34:54Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 9,
"watchers": 10,
"score": 0
},
{
@ -40,11 +40,11 @@
"description": "XMLRPC - RCE in MovableTypePoC",
"fork": false,
"created_at": "2021-10-30T09:15:56Z",
"updated_at": "2021-10-30T18:25:11Z",
"updated_at": "2021-10-31T10:30:17Z",
"pushed_at": "2021-10-30T09:22:31Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [
@ -52,8 +52,8 @@
"xmlrpc-api"
],
"visibility": "public",
"forks": 1,
"watchers": 3,
"forks": 2,
"watchers": 4,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-06-05T15:42:16Z",
"updated_at": "2021-10-31T08:49:31Z",
"updated_at": "2021-10-31T09:39:44Z",
"pushed_at": "2021-10-28T02:46:54Z",
"stargazers_count": 131,
"watchers_count": 131,
"stargazers_count": 132,
"watchers_count": 132,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 131,
"watchers": 132,
"score": 0
},
{
@ -44,12 +44,12 @@
"pushed_at": "2021-10-28T08:54:26Z",
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 20,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 20,
"forks": 21,
"watchers": 62,
"score": 0
},
@ -67,17 +67,17 @@
"description": "CVE-2021-22205 Unauthorized RCE",
"fork": false,
"created_at": "2021-10-28T14:02:51Z",
"updated_at": "2021-10-31T06:45:42Z",
"updated_at": "2021-10-31T09:45:34Z",
"pushed_at": "2021-10-28T14:20:05Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 33,
"watchers": 34,
"score": 0
},
{
@ -121,10 +121,10 @@
"description": "CVE-2021-22205& GitLab CE\/EE RCE",
"fork": false,
"created_at": "2021-10-29T04:30:45Z",
"updated_at": "2021-10-31T07:08:20Z",
"updated_at": "2021-10-31T11:00:50Z",
"pushed_at": "2021-10-29T04:31:15Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
@ -133,7 +133,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 9,
"watchers": 10,
"score": 0
},
{
@ -147,10 +147,10 @@
"html_url": "https:\/\/github.com\/whwlsfb"
},
"html_url": "https:\/\/github.com\/whwlsfb\/CVE-2021-22205",
"description": "CVE-2021-22205 移除了对djvumake & djvulibre的依赖可在win平台使用",
"description": "CVE-2021-22205 Gitlab 未授权远程代码执行漏洞 EXP 移除了对djvumake & djvulibre的依赖可在win平台使用",
"fork": false,
"created_at": "2021-10-30T02:56:34Z",
"updated_at": "2021-10-31T08:13:07Z",
"updated_at": "2021-10-31T13:56:24Z",
"pushed_at": "2021-10-30T03:04:03Z",
"stargazers_count": 3,
"watchers_count": 3,
@ -218,5 +218,32 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 423172219,
"name": "CVE-2021-22205",
"full_name": "c0okB\/CVE-2021-22205",
"owner": {
"login": "c0okB",
"id": 57324119,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57324119?v=4",
"html_url": "https:\/\/github.com\/c0okB"
},
"html_url": "https:\/\/github.com\/c0okB\/CVE-2021-22205",
"description": "CVE-2021-22205 RCE ",
"fork": false,
"created_at": "2021-10-31T14:34:51Z",
"updated_at": "2021-10-31T14:34:54Z",
"pushed_at": "2021-10-31T14:34:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Gitlab CI Lint API未授权 SSRF漏洞 (CVE-2021-22214)",
"fork": false,
"created_at": "2021-06-22T03:04:50Z",
"updated_at": "2021-10-31T08:58:52Z",
"updated_at": "2021-10-31T14:53:14Z",
"pushed_at": "2021-06-22T04:35:08Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 50,
"watchers_count": 50,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 47,
"watchers": 50,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-09-22T02:19:32Z",
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"forks": 8,
"watchers": 31,
"score": 0
},
@ -503,12 +503,12 @@
"pushed_at": "2021-09-03T07:37:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 0,
"watchers": 0,
"score": 0
},

View file

@ -121,10 +121,10 @@
"description": "Exploit for CVE-2021-3129",
"fork": false,
"created_at": "2021-01-27T10:16:35Z",
"updated_at": "2021-10-30T22:49:12Z",
"updated_at": "2021-10-31T10:12:08Z",
"pushed_at": "2021-03-07T04:39:58Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
@ -135,7 +135,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 26,
"watchers": 27,
"score": 0
},
{
@ -179,17 +179,17 @@
"description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)",
"fork": false,
"created_at": "2021-02-18T05:42:13Z",
"updated_at": "2021-10-10T14:17:20Z",
"updated_at": "2021-10-31T14:30:57Z",
"pushed_at": "2021-09-09T01:09:31Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 50,
"watchers": 51,
"score": 0
},
{

View file

@ -422,12 +422,12 @@
"pushed_at": "2021-10-11T20:53:19Z",
"stargazers_count": 159,
"watchers_count": 159,
"forks_count": 43,
"forks_count": 44,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 43,
"forks": 44,
"watchers": 159,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2021-10-16T16:17:44Z",
"updated_at": "2021-10-30T05:34:37Z",
"updated_at": "2021-10-31T12:30:48Z",
"pushed_at": "2021-10-24T21:01:29Z",
"stargazers_count": 304,
"watchers_count": 304,
"forks_count": 63,
"stargazers_count": 305,
"watchers_count": 305,
"forks_count": 65,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 63,
"watchers": 304,
"forks": 65,
"watchers": 305,
"score": 0
},
{
@ -67,19 +67,19 @@
"description": "My exploit for CVE-2021-40449, a Windows LPE via a UAF in win32kfull!GreResetDCInternal.",
"fork": false,
"created_at": "2021-10-25T04:58:49Z",
"updated_at": "2021-10-30T11:26:42Z",
"updated_at": "2021-10-31T10:07:26Z",
"pushed_at": "2021-10-25T06:32:34Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 6,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-40449"
],
"visibility": "public",
"forks": 6,
"watchers": 16,
"forks": 7,
"watchers": 17,
"score": 0
}
]

View file

@ -779,10 +779,10 @@
"description": "A framework for bug hunting or pentesting targeting websites that have CVE-2021-41773 Vulnerability in public ",
"fork": false,
"created_at": "2021-10-07T01:31:13Z",
"updated_at": "2021-10-31T07:01:02Z",
"updated_at": "2021-10-31T10:21:15Z",
"pushed_at": "2021-10-07T08:25:26Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
@ -795,7 +795,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 18,
"watchers": 19,
"score": 0
},
{

View file

@ -525,7 +525,7 @@ D-Link router DSL-2750U with firmware vME1.16 or prior versions is vulnerable to
- [mooneee/cve-2021-6901](https://github.com/mooneee/cve-2021-6901)
### CVE-2021-10086
- [0ahu/CVE-2021-10086](https://github.com/0ahu/CVE-2021-10086)
- [xiaoyun-1/CVE-2021-10086](https://github.com/xiaoyun-1/CVE-2021-10086)
### CVE-2021-14562
- [Jarry1sec/CVE-2021-14562](https://github.com/Jarry1sec/CVE-2021-14562)
@ -882,6 +882,7 @@ An issue has been discovered in GitLab CE/EE affecting all versions starting fro
- [whwlsfb/CVE-2021-22205](https://github.com/whwlsfb/CVE-2021-22205)
- [findneo/GitLab-preauth-RCE_CVE-2021-22205](https://github.com/findneo/GitLab-preauth-RCE_CVE-2021-22205)
- [Seals6/CVE-2021-22205](https://github.com/Seals6/CVE-2021-22205)
- [c0okB/CVE-2021-22205](https://github.com/c0okB/CVE-2021-22205)
### CVE-2021-22214 (2021-06-08)
@ -17275,14 +17276,6 @@ AppleUSBNetworking in Apple iOS before 9.3 and OS X before 10.11.4 allows physic
- [Manouchehri/CVE-2016-1734](https://github.com/Manouchehri/CVE-2016-1734)
### CVE-2016-1757 (2016-03-23)
<code>
Race condition in the kernel in Apple iOS before 9.3 and OS X before 10.11.4 allows attackers to execute arbitrary code in a privileged context via a crafted app.
</code>
- [gdbinit/mach_race](https://github.com/gdbinit/mach_race)
### CVE-2016-1764 (2016-03-23)
<code>
@ -17348,14 +17341,6 @@ The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does
- [FiloSottile/CVE-2016-2107](https://github.com/FiloSottile/CVE-2016-2107)
- [tmiklas/docker-cve-2016-2107](https://github.com/tmiklas/docker-cve-2016-2107)
### CVE-2016-2118 (2016-04-12)
<code>
The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka &quot;BADLOCK.&quot;
</code>
- [nickanderson/cfengine-CVE-2016-2118](https://github.com/nickanderson/cfengine-CVE-2016-2118)
### CVE-2016-2173 (2017-04-21)
<code>
@ -17477,14 +17462,6 @@ Cross-site scripting (XSS) vulnerability in ovirt-engine allows remote attackers
- [0xEmanuel/CVE-2016-3113](https://github.com/0xEmanuel/CVE-2016-3113)
### CVE-2016-3141 (2016-03-31)
<code>
Use-after-free vulnerability in wddx.c in the WDDX extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact by triggering a wddx_deserialize call on XML data containing a crafted var element.
</code>
- [peternguyen93/CVE-2016-3141](https://github.com/peternguyen93/CVE-2016-3141)
### CVE-2016-3238 (2016-07-12)
<code>