mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2023/03/10 00:28:52
This commit is contained in:
parent
1225fec0fe
commit
7d7576fec2
23 changed files with 154 additions and 74 deletions
|
@ -71,10 +71,10 @@
|
|||
"description": "ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container",
|
||||
"fork": false,
|
||||
"created_at": "2017-01-08T14:19:51Z",
|
||||
"updated_at": "2023-03-09T07:10:32Z",
|
||||
"updated_at": "2023-03-09T20:07:54Z",
|
||||
"pushed_at": "2018-04-07T01:10:06Z",
|
||||
"stargazers_count": 102,
|
||||
"watchers_count": 102,
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"has_discussions": false,
|
||||
"forks_count": 55,
|
||||
"allow_forking": true,
|
||||
|
@ -90,7 +90,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 55,
|
||||
"watchers": 102,
|
||||
"watchers": 103,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -327,14 +327,14 @@
|
|||
{
|
||||
"id": 365651593,
|
||||
"name": "noSAMBAnoCRY-CVE-2017-7494",
|
||||
"full_name": "m4udSec\/noSAMBAnoCRY-CVE-2017-7494",
|
||||
"full_name": "0xm4ud\/noSAMBAnoCRY-CVE-2017-7494",
|
||||
"owner": {
|
||||
"login": "m4udSec",
|
||||
"login": "0xm4ud",
|
||||
"id": 56730389,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56730389?v=4",
|
||||
"html_url": "https:\/\/github.com\/m4udSec"
|
||||
"html_url": "https:\/\/github.com\/0xm4ud"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/m4udSec\/noSAMBAnoCRY-CVE-2017-7494",
|
||||
"html_url": "https:\/\/github.com\/0xm4ud\/noSAMBAnoCRY-CVE-2017-7494",
|
||||
"description": "CVE-2017-7494 python exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-09T02:32:54Z",
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 172,
|
||||
"watchers_count": 172,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"forks": 34,
|
||||
"watchers": 172,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -464,10 +464,10 @@
|
|||
"description": "Whatsapp remote code execution CVE-2019-11932 https:\/\/awakened1712.github.io\/hacking\/hacking-whatsapp-gif-rce\/",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-19T16:41:31Z",
|
||||
"updated_at": "2023-01-31T17:39:15Z",
|
||||
"updated_at": "2023-03-09T20:11:19Z",
|
||||
"pushed_at": "2021-11-17T14:40:14Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -476,7 +476,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -76,13 +76,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -31,14 +31,14 @@
|
|||
{
|
||||
"id": 366529600,
|
||||
"name": "Cacti-CVE-2020-8813",
|
||||
"full_name": "m4udSec\/Cacti-CVE-2020-8813",
|
||||
"full_name": "0xm4ud\/Cacti-CVE-2020-8813",
|
||||
"owner": {
|
||||
"login": "m4udSec",
|
||||
"login": "0xm4ud",
|
||||
"id": 56730389,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56730389?v=4",
|
||||
"html_url": "https:\/\/github.com\/m4udSec"
|
||||
"html_url": "https:\/\/github.com\/0xm4ud"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/m4udSec\/Cacti-CVE-2020-8813",
|
||||
"html_url": "https:\/\/github.com\/0xm4ud\/Cacti-CVE-2020-8813",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-05-11T22:38:39Z",
|
||||
|
|
|
@ -129,10 +129,10 @@
|
|||
"description": "海康威视RCE漏洞 批量检测和利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-03T17:27:59Z",
|
||||
"updated_at": "2023-03-04T05:58:49Z",
|
||||
"updated_at": "2023-03-09T20:41:33Z",
|
||||
"pushed_at": "2022-08-05T19:57:30Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -144,7 +144,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 57,
|
||||
"watchers": 58,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -110,13 +110,13 @@
|
|||
"stargazers_count": 269,
|
||||
"watchers_count": 269,
|
||||
"has_discussions": false,
|
||||
"forks_count": 66,
|
||||
"forks_count": 67,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 66,
|
||||
"forks": 67,
|
||||
"watchers": 269,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -908,10 +908,10 @@
|
|||
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T14:26:10Z",
|
||||
"updated_at": "2023-03-09T11:38:37Z",
|
||||
"updated_at": "2023-03-09T20:59:37Z",
|
||||
"pushed_at": "2022-06-21T14:52:05Z",
|
||||
"stargazers_count": 746,
|
||||
"watchers_count": 746,
|
||||
"stargazers_count": 747,
|
||||
"watchers_count": 747,
|
||||
"has_discussions": false,
|
||||
"forks_count": 153,
|
||||
"allow_forking": true,
|
||||
|
@ -922,7 +922,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 153,
|
||||
"watchers": 746,
|
||||
"watchers": 747,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2374,10 +2374,10 @@
|
|||
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T21:24:55Z",
|
||||
"updated_at": "2023-02-13T21:59:34Z",
|
||||
"updated_at": "2023-03-09T22:35:46Z",
|
||||
"pushed_at": "2022-03-12T21:30:58Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"has_discussions": false,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
|
@ -2395,7 +2395,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 60,
|
||||
"watchers": 61,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -3652,13 +3652,13 @@
|
|||
"stargazers_count": 3203,
|
||||
"watchers_count": 3203,
|
||||
"has_discussions": true,
|
||||
"forks_count": 746,
|
||||
"forks_count": 747,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 746,
|
||||
"forks": 747,
|
||||
"watchers": 3203,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-09T15:53:48Z",
|
||||
"updated_at": "2023-03-09T16:27:48Z",
|
||||
"updated_at": "2023-03-09T23:18:53Z",
|
||||
"pushed_at": "2023-03-02T19:43:36Z",
|
||||
"stargazers_count": 171,
|
||||
"watchers_count": 171,
|
||||
"stargazers_count": 173,
|
||||
"watchers_count": 173,
|
||||
"has_discussions": false,
|
||||
"forks_count": 36,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -30,8 +30,8 @@
|
|||
"windows-boot"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"watchers": 171,
|
||||
"forks": 37,
|
||||
"watchers": 173,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 417,
|
||||
"watchers_count": 417,
|
||||
"has_discussions": false,
|
||||
"forks_count": 58,
|
||||
"forks_count": 59,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 58,
|
||||
"forks": 59,
|
||||
"watchers": 417,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -172,5 +172,34 @@
|
|||
"forks": 3,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 611941666,
|
||||
"name": "CVE-2022-2588",
|
||||
"full_name": "dom4570\/CVE-2022-2588",
|
||||
"owner": {
|
||||
"login": "dom4570",
|
||||
"id": 70895650,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70895650?v=4",
|
||||
"html_url": "https:\/\/github.com\/dom4570"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dom4570\/CVE-2022-2588",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-03-09T21:29:56Z",
|
||||
"updated_at": "2023-03-09T21:30:56Z",
|
||||
"pushed_at": "2023-03-09T21:30:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "One day based on https:\/\/googleprojectzero.blogspot.com\/2022\/10\/rc4-is-still-considered-harmful.html",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-02T18:38:01Z",
|
||||
"updated_at": "2023-03-06T06:06:15Z",
|
||||
"updated_at": "2023-03-10T00:23:01Z",
|
||||
"pushed_at": "2022-12-13T15:26:57Z",
|
||||
"stargazers_count": 364,
|
||||
"watchers_count": 364,
|
||||
"stargazers_count": 365,
|
||||
"watchers_count": 365,
|
||||
"has_discussions": false,
|
||||
"forks_count": 67,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 67,
|
||||
"watchers": 364,
|
||||
"watchers": 365,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for CVE-2022-39952",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-20T15:12:33Z",
|
||||
"updated_at": "2023-03-09T12:43:00Z",
|
||||
"updated_at": "2023-03-09T21:16:37Z",
|
||||
"pushed_at": "2023-02-25T08:52:03Z",
|
||||
"stargazers_count": 237,
|
||||
"watchers_count": 237,
|
||||
"stargazers_count": 238,
|
||||
"watchers_count": 238,
|
||||
"has_discussions": false,
|
||||
"forks_count": 47,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 47,
|
||||
"watchers": 237,
|
||||
"watchers": 238,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -101,7 +101,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-02-04T01:35:08Z",
|
||||
"updated_at": "2023-02-10T14:29:46Z",
|
||||
"pushed_at": "2023-03-07T18:59:01Z",
|
||||
"pushed_at": "2023-03-09T22:28:39Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -56,5 +56,49 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 611950909,
|
||||
"name": "CVE-2022-47986",
|
||||
"full_name": "mauricelambert\/CVE-2022-47986",
|
||||
"owner": {
|
||||
"login": "mauricelambert",
|
||||
"id": 50479118,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4",
|
||||
"html_url": "https:\/\/github.com\/mauricelambert"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mauricelambert\/CVE-2022-47986",
|
||||
"description": "CVE-2022-47986: Python, Ruby, NMAP and Metasploit modules to exploit the vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-09T22:03:48Z",
|
||||
"updated_at": "2023-03-09T22:33:55Z",
|
||||
"pushed_at": "2023-03-09T22:31:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"aspera",
|
||||
"cve-2022-47986",
|
||||
"deserialization",
|
||||
"exploit",
|
||||
"faspex",
|
||||
"ibm",
|
||||
"metasploit",
|
||||
"nmap",
|
||||
"poc",
|
||||
"python3",
|
||||
"rce",
|
||||
"ruby",
|
||||
"vulnerability",
|
||||
"yaml"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 5,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "RTF Crash POC Python 3.11 Windows 10",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-07T15:03:43Z",
|
||||
"updated_at": "2023-03-09T15:54:51Z",
|
||||
"updated_at": "2023-03-09T19:46:22Z",
|
||||
"pushed_at": "2023-03-07T15:17:47Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -71,10 +71,10 @@
|
|||
"description": "A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that opens a malicious RTF document. The attacker could deliver this file as an email attachment (or other means).",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-08T06:20:45Z",
|
||||
"updated_at": "2023-03-09T08:48:52Z",
|
||||
"updated_at": "2023-03-09T22:32:11Z",
|
||||
"pushed_at": "2023-03-08T06:21:58Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-01-10T15:59:26Z",
|
||||
"updated_at": "2023-03-09T10:07:40Z",
|
||||
"updated_at": "2023-03-09T21:32:19Z",
|
||||
"pushed_at": "2023-01-13T09:01:20Z",
|
||||
"stargazers_count": 262,
|
||||
"watchers_count": 262,
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "LPE exploit for CVE-2023-21768",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-07T23:00:27Z",
|
||||
"updated_at": "2023-03-09T18:32:12Z",
|
||||
"updated_at": "2023-03-09T22:35:42Z",
|
||||
"pushed_at": "2023-03-08T14:50:10Z",
|
||||
"stargazers_count": 153,
|
||||
"watchers_count": 153,
|
||||
"stargazers_count": 164,
|
||||
"watchers_count": 164,
|
||||
"has_discussions": false,
|
||||
"forks_count": 66,
|
||||
"forks_count": 71,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 66,
|
||||
"watchers": 153,
|
||||
"forks": 71,
|
||||
"watchers": 164,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-03-03T01:57:28Z",
|
||||
"updated_at": "2023-03-08T17:30:29Z",
|
||||
"pushed_at": "2023-03-08T00:43:48Z",
|
||||
"pushed_at": "2023-03-09T20:41:26Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"has_discussions": true,
|
||||
|
|
13
README.md
13
README.md
|
@ -5,7 +5,12 @@
|
|||
- [ASkyeye/CVE-2023-0045](https://github.com/ASkyeye/CVE-2023-0045)
|
||||
- [es0j/CVE-2023-0045](https://github.com/es0j/CVE-2023-0045)
|
||||
|
||||
### CVE-2023-0050
|
||||
### CVE-2023-0050 (2023-03-09)
|
||||
|
||||
<code>
|
||||
An issue has been discovered in GitLab affecting all versions starting from 13.7 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. A specially crafted Kroki diagram could lead to a stored XSS on the client side which allows attackers to perform arbitrary actions on behalf of victims.
|
||||
</code>
|
||||
|
||||
- [wh-gov/CVE-2023-0050](https://github.com/wh-gov/CVE-2023-0050)
|
||||
|
||||
### CVE-2023-0179
|
||||
|
@ -1025,6 +1030,7 @@ The All-in-One WP Migration WordPress plugin before 7.63 uses the wrong content
|
|||
- [konoha279/2022-LPE-UAF](https://github.com/konoha279/2022-LPE-UAF)
|
||||
- [PolymorphicOpcode/CVE-2022-2588](https://github.com/PolymorphicOpcode/CVE-2022-2588)
|
||||
- [BassamGraini/CVE-2022-2588](https://github.com/BassamGraini/CVE-2022-2588)
|
||||
- [dom4570/CVE-2022-2588](https://github.com/dom4570/CVE-2022-2588)
|
||||
|
||||
### CVE-2022-2602
|
||||
- [LukeGix/CVE-2022-2602](https://github.com/LukeGix/CVE-2022-2602)
|
||||
|
@ -6294,6 +6300,7 @@ IBM Aspera Faspex 4.4.2 Patch Level 1 and earlier could allow a remote attacker
|
|||
|
||||
- [ohnonoyesyes/CVE-2022-47986](https://github.com/ohnonoyesyes/CVE-2022-47986)
|
||||
- [dhina016/CVE-2022-47986](https://github.com/dhina016/CVE-2022-47986)
|
||||
- [mauricelambert/CVE-2022-47986](https://github.com/mauricelambert/CVE-2022-47986)
|
||||
|
||||
### CVE-2022-48194 (2022-12-30)
|
||||
|
||||
|
@ -15182,7 +15189,7 @@ graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary O
|
|||
</code>
|
||||
|
||||
- [mhaskar/CVE-2020-8813](https://github.com/mhaskar/CVE-2020-8813)
|
||||
- [m4udSec/Cacti-CVE-2020-8813](https://github.com/m4udSec/Cacti-CVE-2020-8813)
|
||||
- [0xm4ud/Cacti-CVE-2020-8813](https://github.com/0xm4ud/Cacti-CVE-2020-8813)
|
||||
- [hexcowboy/CVE-2020-8813](https://github.com/hexcowboy/CVE-2020-8813)
|
||||
- [p0dalirius/CVE-2020-8813-Cacti-RCE-in-graph_realtime](https://github.com/p0dalirius/CVE-2020-8813-Cacti-RCE-in-graph_realtime)
|
||||
|
||||
|
@ -27021,7 +27028,7 @@ Samba since version 3.5.0 and before 4.6.4, 4.5.10 and 4.4.14 is vulnerable to r
|
|||
- [cved-sources/cve-2017-7494](https://github.com/cved-sources/cve-2017-7494)
|
||||
- [john-80/cve-2017-7494](https://github.com/john-80/cve-2017-7494)
|
||||
- [Hansindu-M/CVE-2017-7494_IT19115344](https://github.com/Hansindu-M/CVE-2017-7494_IT19115344)
|
||||
- [m4udSec/noSAMBAnoCRY-CVE-2017-7494](https://github.com/m4udSec/noSAMBAnoCRY-CVE-2017-7494)
|
||||
- [0xm4ud/noSAMBAnoCRY-CVE-2017-7494](https://github.com/0xm4ud/noSAMBAnoCRY-CVE-2017-7494)
|
||||
- [I-Rinka/BIT-EternalBlue-for-macOS_Linux](https://github.com/I-Rinka/BIT-EternalBlue-for-macOS_Linux)
|
||||
- [yinyinmeimei/CVE-2017-7494-payload](https://github.com/yinyinmeimei/CVE-2017-7494-payload)
|
||||
- [adjaliya/-CVE-2017-7494-Samba-Exploit-POC](https://github.com/adjaliya/-CVE-2017-7494-Samba-Exploit-POC)
|
||||
|
|
Loading…
Reference in a new issue