Auto Update 2024/10/22 06:31:08

This commit is contained in:
motikan2010-bot 2024-10-22 15:31:08 +09:00
parent f4c42c315c
commit 9a4d5dcd93
56 changed files with 301 additions and 309 deletions

View file

@ -87,13 +87,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1

View file

@ -45,10 +45,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-10-18T05:06:59Z",
"updated_at": "2024-10-22T02:40:48Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1996,
"watchers_count": 1996,
"stargazers_count": 1997,
"watchers_count": 1997,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -78,7 +78,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1996,
"watchers": 1997,
"score": 0,
"subscribers_count": 37
},

View file

@ -14,10 +14,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-10-18T05:06:59Z",
"updated_at": "2024-10-22T02:40:48Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1996,
"watchers_count": 1996,
"stargazers_count": 1997,
"watchers_count": 1997,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -47,7 +47,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1996,
"watchers": 1997,
"score": 0,
"subscribers_count": 37
},

View file

@ -241,7 +241,7 @@
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 74,
"forks_count": 73,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -249,7 +249,7 @@
"cve-2017-11882"
],
"visibility": "public",
"forks": 74,
"forks": 73,
"watchers": 43,
"score": 0,
"subscribers_count": 5

View file

@ -417,10 +417,10 @@
"description": "最新tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-10-21T01:39:29Z",
"updated_at": "2024-10-22T05:37:42Z",
"pushed_at": "2024-09-09T07:42:24Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 80,
"watchers_count": 80,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -437,7 +437,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 76,
"watchers": 80,
"score": 0,
"subscribers_count": 2
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 389,
"watchers_count": 389,
"has_discussions": false,
"forks_count": 122,
"forks_count": 121,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 122,
"forks": 121,
"watchers": 389,
"score": 0,
"subscribers_count": 14

View file

@ -45,10 +45,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-10-18T05:06:59Z",
"updated_at": "2024-10-22T02:40:48Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1996,
"watchers_count": 1996,
"stargazers_count": 1997,
"watchers_count": 1997,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -78,7 +78,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1996,
"watchers": 1997,
"score": 0,
"subscribers_count": 37
},

View file

@ -576,10 +576,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-10-18T05:06:59Z",
"updated_at": "2024-10-22T02:40:48Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1996,
"watchers_count": 1996,
"stargazers_count": 1997,
"watchers_count": 1997,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -609,7 +609,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1996,
"watchers": 1997,
"score": 0,
"subscribers_count": 37
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-10-18T14:21:10Z",
"updated_at": "2024-10-21T17:56:28Z",
"updated_at": "2024-10-22T00:34:42Z",
"pushed_at": "2024-10-18T14:23:52Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -200,10 +200,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-10-18T05:06:59Z",
"updated_at": "2024-10-22T02:40:48Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1996,
"watchers_count": 1996,
"stargazers_count": 1997,
"watchers_count": 1997,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -233,7 +233,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1996,
"watchers": 1997,
"score": 0,
"subscribers_count": 37
}

View file

@ -950,10 +950,10 @@
"description": "最新tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2024-10-21T01:39:29Z",
"updated_at": "2024-10-22T05:37:42Z",
"pushed_at": "2024-09-09T07:42:24Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 80,
"watchers_count": 80,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -970,7 +970,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 76,
"watchers": 80,
"score": 0,
"subscribers_count": 2
},
@ -989,10 +989,10 @@
"description": "cve-2020-1938 POC, updated version",
"fork": false,
"created_at": "2024-10-12T01:46:15Z",
"updated_at": "2024-10-12T11:25:37Z",
"updated_at": "2024-10-22T00:36:34Z",
"pushed_at": "2024-10-12T11:25:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -1008,7 +1008,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-10-18T05:06:59Z",
"updated_at": "2024-10-22T02:40:48Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1996,
"watchers_count": 1996,
"stargazers_count": 1997,
"watchers_count": 1997,
"has_discussions": true,
"forks_count": 337,
"allow_forking": true,
@ -47,7 +47,7 @@
],
"visibility": "public",
"forks": 337,
"watchers": 1996,
"watchers": 1997,
"score": 0,
"subscribers_count": 37
},

View file

@ -112,10 +112,10 @@
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞一键注册蚁剑filter内存shell",
"fork": false,
"created_at": "2020-08-19T03:34:06Z",
"updated_at": "2024-09-29T13:59:43Z",
"updated_at": "2024-10-22T02:31:53Z",
"pushed_at": "2020-08-25T03:17:32Z",
"stargazers_count": 529,
"watchers_count": 529,
"stargazers_count": 530,
"watchers_count": 530,
"has_discussions": false,
"forks_count": 62,
"allow_forking": true,
@ -124,7 +124,7 @@
"topics": [],
"visibility": "public",
"forks": 62,
"watchers": 529,
"watchers": 530,
"score": 0,
"subscribers_count": 8
},

View file

@ -14,10 +14,10 @@
"description": "PoC CVE-2020-6308",
"fork": false,
"created_at": "2020-12-27T10:37:11Z",
"updated_at": "2024-08-12T20:08:54Z",
"updated_at": "2024-10-22T02:10:32Z",
"pushed_at": "2020-12-29T10:49:49Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 33,
"watchers": 34,
"score": 0,
"subscribers_count": 3
},

View file

@ -138,10 +138,10 @@
"description": "CVE-2021-22205& GitLab CE\/EE RCE",
"fork": false,
"created_at": "2021-10-29T04:30:45Z",
"updated_at": "2024-09-27T05:54:15Z",
"updated_at": "2024-10-22T03:17:36Z",
"pushed_at": "2022-11-16T08:14:33Z",
"stargazers_count": 263,
"watchers_count": 263,
"stargazers_count": 264,
"watchers_count": 264,
"has_discussions": false,
"forks_count": 100,
"allow_forking": true,
@ -152,7 +152,7 @@
],
"visibility": "public",
"forks": 100,
"watchers": 263,
"watchers": 264,
"score": 0,
"subscribers_count": 2
},

View file

@ -107,10 +107,10 @@
"description": "Proof of Concept for CVE-2021-34473, CVE-2021-34523, and CVE-2021-31207",
"fork": false,
"created_at": "2021-09-04T15:34:03Z",
"updated_at": "2024-09-15T00:28:50Z",
"updated_at": "2024-10-22T03:56:58Z",
"pushed_at": "2023-08-25T22:42:24Z",
"stargazers_count": 108,
"watchers_count": 108,
"stargazers_count": 109,
"watchers_count": 109,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 108,
"watchers": 109,
"score": 0,
"subscribers_count": 3
},

View file

@ -1,33 +0,0 @@
[
{
"id": 652119437,
"name": "cve-2021-35448",
"full_name": "deathflash1411\/cve-2021-35448",
"owner": {
"login": "deathflash1411",
"id": 42869390,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42869390?v=4",
"html_url": "https:\/\/github.com\/deathflash1411",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/deathflash1411\/cve-2021-35448",
"description": "Local Privilege Escalation in Remote Mouse 3.008",
"fork": false,
"created_at": "2023-06-11T06:32:12Z",
"updated_at": "2023-06-11T13:06:16Z",
"pushed_at": "2023-06-11T13:05:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -45,10 +45,10 @@
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
"fork": false,
"created_at": "2021-10-27T15:51:12Z",
"updated_at": "2024-10-10T16:57:54Z",
"updated_at": "2024-10-22T02:21:47Z",
"pushed_at": "2021-10-28T06:37:37Z",
"stargazers_count": 248,
"watchers_count": 248,
"stargazers_count": 249,
"watchers_count": 249,
"has_discussions": false,
"forks_count": 76,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 76,
"watchers": 248,
"watchers": 249,
"score": 0,
"subscribers_count": 6
},
@ -138,10 +138,10 @@
"description": "海康威视RCE漏洞 批量检测和利用工具",
"fork": false,
"created_at": "2022-08-03T17:27:59Z",
"updated_at": "2024-10-18T05:50:37Z",
"updated_at": "2024-10-22T05:59:06Z",
"pushed_at": "2022-08-05T19:57:30Z",
"stargazers_count": 140,
"watchers_count": 140,
"stargazers_count": 141,
"watchers_count": 141,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -153,7 +153,7 @@
],
"visibility": "public",
"forks": 24,
"watchers": 140,
"watchers": 141,
"score": 0,
"subscribers_count": 2
},

View file

@ -1,33 +0,0 @@
[
{
"id": 652119603,
"name": "cve-2021-41652",
"full_name": "deathflash1411\/cve-2021-41652",
"owner": {
"login": "deathflash1411",
"id": 42869390,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42869390?v=4",
"html_url": "https:\/\/github.com\/deathflash1411",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/deathflash1411\/cve-2021-41652",
"description": "Missing Access Control in BatFlat CMS 1.3.6",
"fork": false,
"created_at": "2023-06-11T06:33:01Z",
"updated_at": "2023-06-11T13:15:27Z",
"pushed_at": "2023-06-11T13:15:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -14,10 +14,10 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
"updated_at": "2024-10-17T00:04:28Z",
"updated_at": "2024-10-22T03:10:50Z",
"pushed_at": "2021-12-16T09:50:15Z",
"stargazers_count": 1334,
"watchers_count": 1334,
"stargazers_count": 1335,
"watchers_count": 1335,
"has_discussions": false,
"forks_count": 320,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 320,
"watchers": 1334,
"watchers": 1335,
"score": 0,
"subscribers_count": 27
},

View file

@ -281,6 +281,68 @@
"score": 0,
"subscribers_count": 0
},
{
"id": 445756387,
"name": "Demo",
"full_name": "yggcwhat\/Demo",
"owner": {
"login": "yggcwhat",
"id": 91769835,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91769835?v=4",
"html_url": "https:\/\/github.com\/yggcwhat",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/yggcwhat\/Demo",
"description": "CVE-2021-45232批量一键检测",
"fork": false,
"created_at": "2022-01-08T07:42:43Z",
"updated_at": "2022-01-08T07:42:43Z",
"pushed_at": "2022-01-08T07:42:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 445762780,
"name": "CVE-2021-45232",
"full_name": "yggcwhat\/CVE-2021-45232",
"owner": {
"login": "yggcwhat",
"id": 91769835,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91769835?v=4",
"html_url": "https:\/\/github.com\/yggcwhat",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/yggcwhat\/CVE-2021-45232",
"description": "一键批量检测poc",
"fork": false,
"created_at": "2022-01-08T08:16:06Z",
"updated_at": "2022-01-08T08:28:20Z",
"pushed_at": "2022-01-08T08:27:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 490272524,
"name": "Apisix_Crack",

View file

@ -14,10 +14,10 @@
"description": "A proof of concept exploit for SQLPad RCE (CVE-2022-0944).",
"fork": false,
"created_at": "2024-09-08T23:39:24Z",
"updated_at": "2024-10-08T15:51:27Z",
"updated_at": "2024-10-22T05:02:33Z",
"pushed_at": "2024-09-08T23:57:27Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},
@ -76,10 +76,10 @@
"description": "SQLPad - Template injection (POC exploit for SQLPad RCE [CVE-2022-0944])",
"fork": false,
"created_at": "2024-09-09T19:09:43Z",
"updated_at": "2024-09-27T11:59:56Z",
"updated_at": "2024-10-22T04:00:57Z",
"pushed_at": "2024-09-10T14:23:01Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -28,7 +28,7 @@
"forks": 1,
"watchers": 5,
"score": 0,
"subscribers_count": 7
"subscribers_count": 9
},
{
"id": 448387955,

View file

@ -14,10 +14,10 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
"updated_at": "2024-10-20T23:32:41Z",
"updated_at": "2024-10-22T06:15:22Z",
"pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 764,
"watchers_count": 764,
"stargazers_count": 766,
"watchers_count": 766,
"has_discussions": false,
"forks_count": 160,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 160,
"watchers": 764,
"watchers": 766,
"score": 0,
"subscribers_count": 15
}

View file

@ -1358,7 +1358,7 @@
"description": "Spring Cloud Gateway Actuator API SpEL表达式注入命令执行CVE-2022-22947 注入哥斯拉内存马",
"fork": false,
"created_at": "2022-05-16T15:27:41Z",
"updated_at": "2024-09-13T02:59:32Z",
"updated_at": "2024-10-22T03:44:10Z",
"pushed_at": "2022-05-16T15:33:37Z",
"stargazers_count": 52,
"watchers_count": 52,

View file

@ -310,7 +310,7 @@
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 5
"subscribers_count": 9
},
{
"id": 480975254,

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 9
"subscribers_count": 11
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 5
"subscribers_count": 8
}
]

View file

@ -28,6 +28,6 @@
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 5
"subscribers_count": 9
}
]

View file

@ -29,36 +29,5 @@
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 652119686,
"name": "cve-2022-25012",
"full_name": "deathflash1411\/cve-2022-25012",
"owner": {
"login": "deathflash1411",
"id": 42869390,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42869390?v=4",
"html_url": "https:\/\/github.com\/deathflash1411",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/deathflash1411\/cve-2022-25012",
"description": "Weak Password Encryption in Argus Surveillance DVR 4.0",
"fork": false,
"created_at": "2023-06-11T06:33:25Z",
"updated_at": "2023-12-14T17:44:08Z",
"pushed_at": "2023-06-11T13:23:16Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -123,7 +123,7 @@
"forks": 15,
"watchers": 32,
"score": 0,
"subscribers_count": 11
"subscribers_count": 15
},
{
"id": 483810303,

View file

@ -28,7 +28,7 @@
"forks": 3,
"watchers": 6,
"score": 0,
"subscribers_count": 10
"subscribers_count": 12
},
{
"id": 504359221,

View file

@ -225,7 +225,7 @@
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 8
"subscribers_count": 9
},
{
"id": 562763927,

View file

@ -107,10 +107,10 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
"updated_at": "2024-10-19T13:11:43Z",
"updated_at": "2024-10-22T03:49:15Z",
"pushed_at": "2023-08-02T09:35:14Z",
"stargazers_count": 882,
"watchers_count": 882,
"stargazers_count": 881,
"watchers_count": 881,
"has_discussions": false,
"forks_count": 72,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 72,
"watchers": 882,
"watchers": 881,
"score": 0,
"subscribers_count": 25
},

33
2022/CVE-2022-48656.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 876527302,
"name": "CVE-2022-48656-POC",
"full_name": "Einstein2150\/CVE-2022-48656-POC",
"owner": {
"login": "Einstein2150",
"id": 22019133,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22019133?v=4",
"html_url": "https:\/\/github.com\/Einstein2150",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Einstein2150\/CVE-2022-48656-POC",
"description": "A proof-of-concept for CVE-2022-48656 - python plistlib XML deserialisation attack",
"fork": false,
"created_at": "2024-10-22T05:58:24Z",
"updated_at": "2024-10-22T06:02:32Z",
"pushed_at": "2024-10-22T06:01:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "Database authenticated code execution",
"fork": false,
"created_at": "2022-06-19T15:22:51Z",
"updated_at": "2024-10-18T05:21:05Z",
"updated_at": "2024-10-22T03:21:22Z",
"pushed_at": "2024-10-18T05:21:01Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": "JumpServer 堡垒机未授权综合漏洞利用, Exploit for CVE-2023-42442 \/ CVE-2023-42820 \/ RCE 2021",
"fork": false,
"created_at": "2023-10-14T09:35:07Z",
"updated_at": "2024-10-21T02:28:41Z",
"updated_at": "2024-10-22T05:41:22Z",
"pushed_at": "2024-05-16T07:42:00Z",
"stargazers_count": 212,
"watchers_count": 212,
"stargazers_count": 213,
"watchers_count": 213,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 22,
"watchers": 212,
"watchers": 213,
"score": 0,
"subscribers_count": 3
},

View file

@ -448,10 +448,10 @@
"description": "CVE-2024-21413 | Microsoft Outlook Remote Code Execution Vulnerability PoC",
"fork": false,
"created_at": "2024-08-31T13:18:43Z",
"updated_at": "2024-10-13T09:43:30Z",
"updated_at": "2024-10-22T06:14:30Z",
"pushed_at": "2024-10-13T09:43:26Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -460,7 +460,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -265,10 +265,10 @@
"description": "CVE-2024-23897 - Jenkins 任意文件读取 利用工具",
"fork": false,
"created_at": "2024-01-27T19:34:48Z",
"updated_at": "2024-10-05T09:44:25Z",
"updated_at": "2024-10-22T01:24:42Z",
"pushed_at": "2024-03-16T07:55:41Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 68,
"watchers_count": 68,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -281,7 +281,7 @@
],
"visibility": "public",
"forks": 12,
"watchers": 69,
"watchers": 68,
"score": 0,
"subscribers_count": 2
},

View file

@ -84,7 +84,7 @@
"stargazers_count": 142,
"watchers_count": 142,
"has_discussions": false,
"forks_count": 33,
"forks_count": 34,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -100,7 +100,7 @@
"teamcity"
],
"visibility": "public",
"forks": 33,
"forks": 34,
"watchers": 142,
"score": 0,
"subscribers_count": 3

View file

@ -19,13 +19,13 @@
"stargazers_count": 223,
"watchers_count": 223,
"has_discussions": false,
"forks_count": 48,
"forks_count": 49,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 48,
"forks": 49,
"watchers": 223,
"score": 0,
"subscribers_count": 3

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-30090 - LPE PoC",
"fork": false,
"created_at": "2024-10-17T08:38:47Z",
"updated_at": "2024-10-21T23:39:38Z",
"updated_at": "2024-10-22T04:10:53Z",
"pushed_at": "2024-10-17T09:53:33Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 69,
"watchers": 71,
"score": 0,
"subscribers_count": 1
}

View file

@ -248,7 +248,7 @@
"stargazers_count": 101,
"watchers_count": 101,
"has_discussions": false,
"forks_count": 24,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -258,7 +258,7 @@
"rce"
],
"visibility": "public",
"forks": 24,
"forks": 25,
"watchers": 101,
"score": 0,
"subscribers_count": 3

View file

@ -14,10 +14,10 @@
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
"fork": false,
"created_at": "2024-10-13T19:30:20Z",
"updated_at": "2024-10-21T23:42:26Z",
"updated_at": "2024-10-22T03:49:50Z",
"pushed_at": "2024-10-17T18:36:54Z",
"stargazers_count": 176,
"watchers_count": 176,
"stargazers_count": 177,
"watchers_count": 177,
"has_discussions": false,
"forks_count": 40,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 40,
"watchers": 176,
"watchers": 177,
"score": 0,
"subscribers_count": 3
},

View file

@ -19,7 +19,7 @@
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -29,7 +29,7 @@
"payload"
],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 30,
"score": 0,
"subscribers_count": 1

View file

@ -45,19 +45,19 @@
"description": "CVE-2024-38816 Proof of Concept",
"fork": false,
"created_at": "2024-09-28T23:16:23Z",
"updated_at": "2024-10-12T08:27:06Z",
"updated_at": "2024-10-22T03:46:36Z",
"pushed_at": "2024-09-26T09:46:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 1,
"forks": 7,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 74,
"watchers_count": 74,
"has_discussions": false,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"forks": 11,
"watchers": 74,
"score": 0,
"subscribers_count": 1

View file

@ -19,13 +19,13 @@
"stargazers_count": 65,
"watchers_count": 65,
"has_discussions": false,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"forks": 11,
"watchers": 65,
"score": 0,
"subscribers_count": 1

View file

@ -76,10 +76,10 @@
"description": "Zimbra - Remote Command Execution (CVE-2024-45519)",
"fork": false,
"created_at": "2024-10-05T00:15:18Z",
"updated_at": "2024-10-20T14:38:18Z",
"updated_at": "2024-10-22T01:16:09Z",
"pushed_at": "2024-10-05T00:18:49Z",
"stargazers_count": 97,
"watchers_count": 97,
"stargazers_count": 98,
"watchers_count": 98,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 97,
"watchers": 98,
"score": 0,
"subscribers_count": 3
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 460,
"watchers_count": 460,
"has_discussions": false,
"forks_count": 182,
"forks_count": 183,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 182,
"forks": 183,
"watchers": 460,
"score": 0,
"subscribers_count": 5
@ -81,7 +81,7 @@
"stargazers_count": 108,
"watchers_count": 108,
"has_discussions": false,
"forks_count": 41,
"forks_count": 42,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -94,7 +94,7 @@
"ssh"
],
"visibility": "public",
"forks": 41,
"forks": 42,
"watchers": 108,
"score": 0,
"subscribers_count": 4
@ -274,7 +274,7 @@
"stargazers_count": 450,
"watchers_count": 450,
"has_discussions": false,
"forks_count": 84,
"forks_count": 85,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -286,7 +286,7 @@
"redteam"
],
"visibility": "public",
"forks": 84,
"forks": 85,
"watchers": 450,
"score": 0,
"subscribers_count": 5
@ -720,13 +720,13 @@
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 23,
"score": 0,
"subscribers_count": 1
@ -782,7 +782,7 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -798,7 +798,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
@ -1040,7 +1040,7 @@
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -1059,7 +1059,7 @@
"vulnerability-scanners"
],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 13,
"score": 0,
"subscribers_count": 2
@ -1146,7 +1146,7 @@
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -1170,7 +1170,7 @@
"windows"
],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 8,
"score": 0,
"subscribers_count": 1
@ -1422,7 +1422,7 @@
"stargazers_count": 62,
"watchers_count": 62,
"has_discussions": false,
"forks_count": 21,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -1437,7 +1437,7 @@
"rce"
],
"visibility": "public",
"forks": 21,
"forks": 22,
"watchers": 62,
"score": 0,
"subscribers_count": 1
@ -1493,7 +1493,7 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -1507,7 +1507,7 @@
"sshd"
],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
@ -1656,7 +1656,7 @@
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -1664,7 +1664,7 @@
"cve-2024-6387"
],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 7,
"score": 0,
"subscribers_count": 1
@ -1689,7 +1689,7 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -1702,7 +1702,7 @@
"redteam"
],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 2,
"score": 0,
"subscribers_count": 1
@ -2086,7 +2086,7 @@
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -2098,7 +2098,7 @@
"ssh"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 8,
"score": 0,
"subscribers_count": 1
@ -2278,13 +2278,13 @@
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 13,
"forks": 14,
"watchers": 36,
"score": 0,
"subscribers_count": 2
@ -2371,7 +2371,7 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -2384,7 +2384,7 @@
"regresshion-cve-2024-6387-ssh-security"
],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
@ -2502,13 +2502,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
@ -2714,10 +2714,10 @@
"description": "Proof of concept python script for regreSSHion exploit. ",
"fork": false,
"created_at": "2024-07-30T06:13:11Z",
"updated_at": "2024-10-21T03:40:20Z",
"updated_at": "2024-10-22T03:06:40Z",
"pushed_at": "2024-10-19T04:58:22Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": true,
"forks_count": 1,
"allow_forking": true,
@ -2726,7 +2726,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 6,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "A POC exploit for CVE-2024-5836 and CVE-2024-6778, allowing for a sandbox escape from a Chrome extension. ",
"fork": false,
"created_at": "2024-09-10T06:27:59Z",
"updated_at": "2024-10-21T05:42:27Z",
"updated_at": "2024-10-22T05:55:39Z",
"pushed_at": "2024-10-17T05:12:29Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 32,
"watchers": 34,
"score": 0,
"subscribers_count": 1
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 109,
"watchers_count": 109,
"has_discussions": false,
"forks_count": 17,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 17,
"forks": 18,
"watchers": 109,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)",
"fork": false,
"created_at": "2024-09-14T06:27:11Z",
"updated_at": "2024-10-16T16:19:44Z",
"updated_at": "2024-10-22T01:10:26Z",
"pushed_at": "2024-09-15T21:34:35Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 32,
"watchers": 35,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": "Exploit for Grafana arbitrary file-read (CVE-2024-9264)",
"fork": false,
"created_at": "2024-10-19T13:50:52Z",
"updated_at": "2024-10-21T20:54:08Z",
"updated_at": "2024-10-22T05:10:20Z",
"pushed_at": "2024-10-19T16:01:12Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 54,
"watchers_count": 54,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -38,7 +38,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 50,
"watchers": 54,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-9466 poc",
"fork": false,
"created_at": "2024-10-19T08:22:13Z",
"updated_at": "2024-10-19T08:25:48Z",
"updated_at": "2024-10-22T02:01:29Z",
"pushed_at": "2024-10-19T08:25:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -16433,7 +16433,6 @@
</code>
- [s3l33/CVE-2022-25012](https://github.com/s3l33/CVE-2022-25012)
- [deathflash1411/cve-2022-25012](https://github.com/deathflash1411/cve-2022-25012)
### CVE-2022-25018 (2022-03-01)
@ -20442,6 +20441,13 @@
- [sapellaniz/CVE-2022-48474_CVE-2022-48475](https://github.com/sapellaniz/CVE-2022-48474_CVE-2022-48475)
### CVE-2022-48656 (2024-04-28)
<code>In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: ti: k3-udma-private: Fix refcount leak bug in of_xudma_dev_get()\n\nWe should call of_node_put() for the reference returned by\nof_parse_phandle() in fail path or when it is not used anymore.\nHere we only need to move the of_node_put() before the check.
</code>
- [Einstein2150/CVE-2022-48656-POC](https://github.com/Einstein2150/CVE-2022-48656-POC)
## 2021
### CVE-2021-0302 (2021-02-10)
@ -24318,13 +24324,6 @@
- [afaq1337/CVE-2021-35296](https://github.com/afaq1337/CVE-2021-35296)
### CVE-2021-35448 (2021-06-24)
<code>Emote Interactive Remote Mouse 3.008 on Windows allows attackers to execute arbitrary programs as Administrator by using the Image Transfer Folder feature to navigate to cmd.exe. It binds to local ports to listen for incoming connections.
</code>
- [deathflash1411/cve-2021-35448](https://github.com/deathflash1411/cve-2021-35448)
### CVE-2021-35464 (2021-07-22)
<code>ForgeRock AM server before 7.0 has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted /ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO) found in versions of Java 8 or earlier
@ -25433,13 +25432,6 @@
- [MobiusBinary/CVE-2021-41651](https://github.com/MobiusBinary/CVE-2021-41651)
### CVE-2021-41652 (2022-03-01)
<code>Insecure permissions in the file database.sdb of BatFlat CMS v1.3.6 allows attackers to dump the entire database.
</code>
- [deathflash1411/cve-2021-41652](https://github.com/deathflash1411/cve-2021-41652)
### CVE-2021-41653 (2021-11-13)
<code>The PING function on the TP-Link TL-WR840N EU v5 router with firmware through TL-WR840N(EU)_V5_171211 is vulnerable to remote code execution via a crafted payload in an IP address input field.
@ -26928,6 +26920,8 @@
- [dskho/CVE-2021-45232](https://github.com/dskho/CVE-2021-45232)
- [GYLQ/CVE-2021-45232-RCE](https://github.com/GYLQ/CVE-2021-45232-RCE)
- [fany0r/CVE-2021-45232-RCE](https://github.com/fany0r/CVE-2021-45232-RCE)
- [yggcwhat/Demo](https://github.com/yggcwhat/Demo)
- [yggcwhat/CVE-2021-45232](https://github.com/yggcwhat/CVE-2021-45232)
- [YutuSec/Apisix_Crack](https://github.com/YutuSec/Apisix_Crack)
### CVE-2021-45416 (2022-02-01)