mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/05/26 18:11:56
This commit is contained in:
parent
a6f199fcb8
commit
6bd3827858
28 changed files with 72 additions and 218 deletions
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-05-21T21:20:54Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Blueborne CVE-2017-0785 Android information leak vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-20T23:32:29Z",
|
||||
"updated_at": "2021-05-02T00:17:47Z",
|
||||
"updated_at": "2021-05-26T07:13:50Z",
|
||||
"pushed_at": "2017-09-23T05:11:45Z",
|
||||
"stargazers_count": 428,
|
||||
"watchers_count": 428,
|
||||
"stargazers_count": 429,
|
||||
"watchers_count": 429,
|
||||
"forks_count": 187,
|
||||
"forks": 187,
|
||||
"watchers": 428,
|
||||
"watchers": 429,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-21T05:55:53Z",
|
||||
"updated_at": "2021-05-14T09:34:30Z",
|
||||
"updated_at": "2021-05-26T06:25:29Z",
|
||||
"pushed_at": "2017-11-29T03:33:53Z",
|
||||
"stargazers_count": 492,
|
||||
"watchers_count": 492,
|
||||
"stargazers_count": 493,
|
||||
"watchers_count": 493,
|
||||
"forks_count": 247,
|
||||
"forks": 247,
|
||||
"watchers": 492,
|
||||
"watchers": 493,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-11-17T17:58:39Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 370766722,
|
||||
"name": "CVE-2018-19423-Exploit",
|
||||
"full_name": "Hacker5preme\/CVE-2018-19423-Exploit",
|
||||
"owner": {
|
||||
"login": "Hacker5preme",
|
||||
"id": 54862244,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54862244?v=4",
|
||||
"html_url": "https:\/\/github.com\/Hacker5preme"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Hacker5preme\/CVE-2018-19423-Exploit",
|
||||
"description": "Authenticated RCE in Codiad 2.8.4",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-25T16:55:17Z",
|
||||
"updated_at": "2021-05-25T21:44:42Z",
|
||||
"pushed_at": "2021-05-25T17:21:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -293,8 +293,8 @@
|
|||
"pushed_at": "2020-10-01T11:51:46Z",
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"forks_count": 59,
|
||||
"forks": 59,
|
||||
"forks_count": 60,
|
||||
"forks": 60,
|
||||
"watchers": 85,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Apache Tomcat Remote Code Execution on Windows",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-15T07:54:25Z",
|
||||
"updated_at": "2021-05-14T10:10:33Z",
|
||||
"updated_at": "2021-05-26T04:02:32Z",
|
||||
"pushed_at": "2019-11-27T07:39:40Z",
|
||||
"stargazers_count": 181,
|
||||
"watchers_count": 181,
|
||||
"stargazers_count": 182,
|
||||
"watchers_count": 182,
|
||||
"forks_count": 54,
|
||||
"forks": 54,
|
||||
"watchers": 181,
|
||||
"watchers": 182,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -316,8 +316,8 @@
|
|||
"pushed_at": "2019-06-13T13:07:03Z",
|
||||
"stargazers_count": 352,
|
||||
"watchers_count": 352,
|
||||
"forks_count": 190,
|
||||
"forks": 190,
|
||||
"forks_count": 189,
|
||||
"forks": 189,
|
||||
"watchers": 352,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2021-05-25T14:19:03Z",
|
||||
"updated_at": "2021-05-26T06:59:57Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1656,
|
||||
"watchers_count": 1656,
|
||||
"stargazers_count": 1657,
|
||||
"watchers_count": 1657,
|
||||
"forks_count": 251,
|
||||
"forks": 251,
|
||||
"watchers": 1656,
|
||||
"watchers": 1657,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Codiad Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-13T13:57:07Z",
|
||||
"updated_at": "2021-05-24T11:22:44Z",
|
||||
"pushed_at": "2021-05-23T12:45:43Z",
|
||||
"updated_at": "2021-05-26T07:05:51Z",
|
||||
"pushed_at": "2021-05-26T07:05:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Confluence 未授权 RCE (CVE-2019-3396) 漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-10T02:22:24Z",
|
||||
"updated_at": "2021-05-12T05:40:51Z",
|
||||
"updated_at": "2021-05-26T06:27:02Z",
|
||||
"pushed_at": "2019-11-01T14:33:21Z",
|
||||
"stargazers_count": 122,
|
||||
"watchers_count": 122,
|
||||
"stargazers_count": 123,
|
||||
"watchers_count": 123,
|
||||
"forks_count": 58,
|
||||
"forks": 58,
|
||||
"watchers": 122,
|
||||
"watchers": 123,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-05-09T21:34:26Z",
|
||||
"stargazers_count": 571,
|
||||
"watchers_count": 571,
|
||||
"forks_count": 133,
|
||||
"forks": 133,
|
||||
"forks_count": 134,
|
||||
"forks": 134,
|
||||
"watchers": 571,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-10-21T12:10:28Z",
|
||||
"stargazers_count": 1284,
|
||||
"watchers_count": 1284,
|
||||
"forks_count": 294,
|
||||
"forks": 294,
|
||||
"forks_count": 293,
|
||||
"forks": 293,
|
||||
"watchers": 1284,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -155,8 +155,8 @@
|
|||
"pushed_at": "2020-09-16T14:05:27Z",
|
||||
"stargazers_count": 148,
|
||||
"watchers_count": 148,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 148,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -592,8 +592,8 @@
|
|||
"pushed_at": "2021-05-08T09:41:31Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-05-26T02:32:29Z",
|
||||
"updated_at": "2021-05-26T07:08:44Z",
|
||||
"pushed_at": "2021-04-26T02:30:11Z",
|
||||
"stargazers_count": 767,
|
||||
"watchers_count": 767,
|
||||
"stargazers_count": 769,
|
||||
"watchers_count": 769,
|
||||
"forks_count": 241,
|
||||
"forks": 241,
|
||||
"watchers": 767,
|
||||
"watchers": 769,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "S2-061 的payload,以及对应简单的PoC\/Exp",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-10T17:42:37Z",
|
||||
"updated_at": "2021-03-07T11:43:01Z",
|
||||
"updated_at": "2021-05-26T07:36:39Z",
|
||||
"pushed_at": "2020-12-18T00:57:50Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 40,
|
||||
"watchers": 41,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 370835991,
|
||||
"name": "CVE-2020-29607-exploit",
|
||||
"full_name": "Hacker5preme\/CVE-2020-29607-exploit",
|
||||
"owner": {
|
||||
"login": "Hacker5preme",
|
||||
"id": 54862244,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54862244?v=4",
|
||||
"html_url": "https:\/\/github.com\/Hacker5preme"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Hacker5preme\/CVE-2020-29607-exploit",
|
||||
"description": "Exploit coming soon",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-25T21:48:04Z",
|
||||
"updated_at": "2021-05-25T21:48:07Z",
|
||||
"pushed_at": "2021-05-25T21:48:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Regular expression matching for URL's. Maintained, safe, and browser-friendly version of url-regex. Resolves CVE-2020-7661 for Node.js servers.",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-15T07:42:50Z",
|
||||
"updated_at": "2021-05-21T07:38:32Z",
|
||||
"updated_at": "2021-05-26T06:49:29Z",
|
||||
"pushed_at": "2021-02-15T04:14:12Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 31,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit to SYSTEM for CVE-2021-21551",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-13T13:23:38Z",
|
||||
"updated_at": "2021-05-24T08:18:02Z",
|
||||
"updated_at": "2021-05-26T07:55:52Z",
|
||||
"pushed_at": "2021-05-20T20:33:09Z",
|
||||
"stargazers_count": 196,
|
||||
"watchers_count": 196,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 196,
|
||||
"stargazers_count": 197,
|
||||
"watchers_count": 197,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 197,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2021-02-25T16:05:02Z",
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 111,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -44,28 +44,5 @@
|
|||
"forks": 4,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 370613273,
|
||||
"name": "cve-2021-22893",
|
||||
"full_name": "r90tpass\/cve-2021-22893",
|
||||
"owner": {
|
||||
"login": "r90tpass",
|
||||
"id": 82740056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82740056?v=4",
|
||||
"html_url": "https:\/\/github.com\/r90tpass"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/r90tpass\/cve-2021-22893",
|
||||
"description": "22893 poc",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-25T08:04:43Z",
|
||||
"updated_at": "2021-05-25T08:04:43Z",
|
||||
"pushed_at": "2021-05-25T08:04:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-05-26T02:32:29Z",
|
||||
"updated_at": "2021-05-26T07:08:44Z",
|
||||
"pushed_at": "2021-04-26T02:30:11Z",
|
||||
"stargazers_count": 767,
|
||||
"watchers_count": 767,
|
||||
"stargazers_count": 769,
|
||||
"watchers_count": 769,
|
||||
"forks_count": 241,
|
||||
"forks": 241,
|
||||
"watchers": 767,
|
||||
"watchers": 769,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-02-12T18:53:37Z",
|
||||
"updated_at": "2021-04-30T15:45:05Z",
|
||||
"updated_at": "2021-05-26T08:52:35Z",
|
||||
"pushed_at": "2021-04-30T15:45:02Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-05-03T14:29:49Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-16T16:15:56Z",
|
||||
"updated_at": "2021-05-26T03:02:05Z",
|
||||
"updated_at": "2021-05-26T08:39:24Z",
|
||||
"pushed_at": "2021-05-21T23:58:50Z",
|
||||
"stargazers_count": 699,
|
||||
"watchers_count": 699,
|
||||
"stargazers_count": 703,
|
||||
"watchers_count": 703,
|
||||
"forks_count": 109,
|
||||
"forks": 109,
|
||||
"watchers": 699,
|
||||
"watchers": 703,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 370592630,
|
||||
"name": "CVE-2021-3222222",
|
||||
"full_name": "r90tpass\/CVE-2021-3222222",
|
||||
"owner": {
|
||||
"login": "r90tpass",
|
||||
"id": 82740056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82740056?v=4",
|
||||
"html_url": "https:\/\/github.com\/r90tpass"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/r90tpass\/CVE-2021-3222222",
|
||||
"description": "RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-25T06:46:52Z",
|
||||
"updated_at": "2021-05-25T06:46:52Z",
|
||||
"pushed_at": "2021-05-25T06:46:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,25 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 370610425,
|
||||
"name": "CVE-2021-8989898",
|
||||
"full_name": "r90tpass\/CVE-2021-8989898",
|
||||
"owner": {
|
||||
"login": "r90tpass",
|
||||
"id": 82740056,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82740056?v=4",
|
||||
"html_url": "https:\/\/github.com\/r90tpass"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/r90tpass\/CVE-2021-8989898",
|
||||
"description": "RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-25T07:53:47Z",
|
||||
"updated_at": "2021-05-25T07:53:47Z",
|
||||
"pushed_at": "2021-05-25T07:53:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
23
README.md
23
README.md
|
@ -543,7 +543,6 @@ Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication b
|
|||
|
||||
- [ZephrFish/CVE-2021-22893](https://github.com/ZephrFish/CVE-2021-22893)
|
||||
- [Mad-robot/CVE-2021-22893](https://github.com/Mad-robot/CVE-2021-22893)
|
||||
- [r90tpass/cve-2021-22893](https://github.com/r90tpass/cve-2021-22893)
|
||||
|
||||
### CVE-2021-22986 (2021-03-31)
|
||||
|
||||
|
@ -1166,12 +1165,6 @@ Insufficient input validation in the Marvin Minsky 1967 implementation of the Un
|
|||
### CVE-2021-33558
|
||||
- [mdanzaruddin/CVE-2021-33558.](https://github.com/mdanzaruddin/CVE-2021-33558.)
|
||||
|
||||
### CVE-2021-3222222
|
||||
- [r90tpass/CVE-2021-3222222](https://github.com/r90tpass/CVE-2021-3222222)
|
||||
|
||||
### CVE-2021-8989898
|
||||
- [r90tpass/CVE-2021-8989898](https://github.com/r90tpass/CVE-2021-8989898)
|
||||
|
||||
|
||||
## 2020
|
||||
### CVE-2020-0001 (2020-01-08)
|
||||
|
@ -5233,14 +5226,6 @@ Firmware version 4.60 of Zyxel USG devices contains an undocumented account (zyf
|
|||
|
||||
- [ruppde/scan_CVE-2020-29583](https://github.com/ruppde/scan_CVE-2020-29583)
|
||||
|
||||
### CVE-2020-29607 (2020-12-16)
|
||||
|
||||
<code>
|
||||
A file upload restriction bypass vulnerability in Pluck CMS before 4.7.13 allows an admin privileged user to gain access in the host through the "manage files" functionality, which may result in remote code execution.
|
||||
</code>
|
||||
|
||||
- [Hacker5preme/CVE-2020-29607-exploit](https://github.com/Hacker5preme/CVE-2020-29607-exploit)
|
||||
|
||||
### CVE-2020-29666 (2020-12-10)
|
||||
|
||||
<code>
|
||||
|
@ -11988,14 +11973,6 @@ The GDrv low-level driver in GIGABYTE APP Center v1.05.21 and earlier, AORUS GRA
|
|||
- [ASkyeye/CVE-2018-19320](https://github.com/ASkyeye/CVE-2018-19320)
|
||||
- [a00x90/CVE-2018-19320](https://github.com/a00x90/CVE-2018-19320)
|
||||
|
||||
### CVE-2018-19423 (2018-11-21)
|
||||
|
||||
<code>
|
||||
Codiad 2.8.4 allows remote authenticated administrators to execute arbitrary code by uploading an executable file.
|
||||
</code>
|
||||
|
||||
- [Hacker5preme/CVE-2018-19423-Exploit](https://github.com/Hacker5preme/CVE-2018-19423-Exploit)
|
||||
|
||||
### CVE-2018-19466 (2019-03-27)
|
||||
|
||||
<code>
|
||||
|
|
Loading…
Reference in a new issue