mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/11/22 18:15:36
This commit is contained in:
parent
d05908a5fa
commit
a33291975f
23 changed files with 220 additions and 67 deletions
|
@ -13,17 +13,17 @@
|
|||
"description": "MS16-032(CVE-2016-0099) for SERVICE ONLY",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-15T17:16:55Z",
|
||||
"updated_at": "2021-11-15T11:25:17Z",
|
||||
"updated_at": "2021-11-22T16:27:21Z",
|
||||
"pushed_at": "2017-03-15T17:24:59Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"forks_count": 45,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 45,
|
||||
"watchers": 79,
|
||||
"watchers": 78,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -114,12 +114,12 @@
|
|||
"pushed_at": "2019-03-24T11:20:27Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 13,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"forks": 14,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -249,5 +249,32 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 430749161,
|
||||
"name": "THM-Vulnerability_Capstone-CVE-2018-16763",
|
||||
"full_name": "SlizBinksman\/THM-Vulnerability_Capstone-CVE-2018-16763",
|
||||
"owner": {
|
||||
"login": "SlizBinksman",
|
||||
"id": 90923369,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90923369?v=4",
|
||||
"html_url": "https:\/\/github.com\/SlizBinksman"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SlizBinksman\/THM-Vulnerability_Capstone-CVE-2018-16763",
|
||||
"description": "A write up on the THM room Vulnerability Capstone & Exploit script for CVE-2018-16763.",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-22T14:53:42Z",
|
||||
"updated_at": "2021-11-22T14:59:44Z",
|
||||
"pushed_at": "2021-11-22T14:59:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
File diff suppressed because one or more lines are too long
|
@ -13,17 +13,17 @@
|
|||
"description": "Local privilege escalation PoC exploit for CVE-2019-16098",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-10T15:57:36Z",
|
||||
"updated_at": "2021-11-22T07:14:49Z",
|
||||
"updated_at": "2021-11-22T15:47:21Z",
|
||||
"pushed_at": "2019-09-13T20:05:43Z",
|
||||
"stargazers_count": 139,
|
||||
"watchers_count": 139,
|
||||
"forks_count": 45,
|
||||
"stargazers_count": 140,
|
||||
"watchers_count": 140,
|
||||
"forks_count": 46,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 45,
|
||||
"watchers": 139,
|
||||
"forks": 46,
|
||||
"watchers": 140,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,7 +40,7 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2021-11-19T19:51:01Z",
|
||||
"updated_at": "2021-11-22T14:46:09Z",
|
||||
"pushed_at": "2021-11-10T19:56:38Z",
|
||||
"stargazers_count": 1376,
|
||||
"watchers_count": 1376,
|
||||
|
@ -1270,8 +1270,8 @@
|
|||
"description": "Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example. This tool will check and exploit bug as well as restore password to original state",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-20T21:38:47Z",
|
||||
"updated_at": "2021-10-05T15:22:57Z",
|
||||
"pushed_at": "2021-03-15T12:02:53Z",
|
||||
"updated_at": "2021-11-22T17:41:02Z",
|
||||
"pushed_at": "2021-11-22T17:40:59Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 1,
|
||||
|
|
|
@ -73,17 +73,17 @@
|
|||
"description": "CVE-2020-5902 BIG-IP",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-05T16:38:32Z",
|
||||
"updated_at": "2021-11-18T09:33:59Z",
|
||||
"updated_at": "2021-11-22T14:09:44Z",
|
||||
"pushed_at": "2021-10-13T07:53:46Z",
|
||||
"stargazers_count": 355,
|
||||
"watchers_count": 355,
|
||||
"stargazers_count": 356,
|
||||
"watchers_count": 356,
|
||||
"forks_count": 108,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 108,
|
||||
"watchers": 355,
|
||||
"watchers": 356,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,7 +17,7 @@
|
|||
"pushed_at": "2021-03-22T18:24:20Z",
|
||||
"stargazers_count": 123,
|
||||
"watchers_count": 123,
|
||||
"forks_count": 20,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -37,7 +37,7 @@
|
|||
"writeups"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"forks": 21,
|
||||
"watchers": 123,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Spring Cloud Netflix Hystrix Dashboard template resolution vulnerability CVE-2021-22053",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-21T08:47:56Z",
|
||||
"updated_at": "2021-11-22T11:01:15Z",
|
||||
"updated_at": "2021-11-22T15:58:42Z",
|
||||
"pushed_at": "2021-11-21T08:52:47Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 21,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -121,10 +121,10 @@
|
|||
"description": "CVE-2021-22205& GitLab CE\/EE RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-29T04:30:45Z",
|
||||
"updated_at": "2021-11-22T11:16:02Z",
|
||||
"updated_at": "2021-11-22T15:16:34Z",
|
||||
"pushed_at": "2021-11-06T05:20:30Z",
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"forks_count": 42,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -133,7 +133,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 42,
|
||||
"watchers": 94,
|
||||
"watchers": 96,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Apache\/Alibaba Dubbo <= 2.7.3 PoC Code for CVE-2021-25641 RCE via Deserialization of Untrusted Data; Affects Versions <= 2.7.6 With Different Gadgets",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-06T06:41:36Z",
|
||||
"updated_at": "2021-11-16T12:11:23Z",
|
||||
"updated_at": "2021-11-22T17:01:52Z",
|
||||
"pushed_at": "2021-06-06T08:41:19Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 49,
|
||||
"watchers": 48,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2021-11-18T08:33:05Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-27928 MariaDB\/MySQL-'wsrep provider' 命令注入漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-15T06:40:49Z",
|
||||
"updated_at": "2021-11-21T10:16:11Z",
|
||||
"updated_at": "2021-11-22T14:21:52Z",
|
||||
"pushed_at": "2021-06-21T00:51:49Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 27,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-31T18:02:39Z",
|
||||
"updated_at": "2021-11-21T14:53:43Z",
|
||||
"updated_at": "2021-11-22T18:00:10Z",
|
||||
"pushed_at": "2021-06-01T15:08:23Z",
|
||||
"stargazers_count": 201,
|
||||
"watchers_count": 201,
|
||||
"stargazers_count": 202,
|
||||
"watchers_count": 202,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 201,
|
||||
"watchers": 202,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-13T12:52:20Z",
|
||||
"updated_at": "2021-11-18T10:39:25Z",
|
||||
"updated_at": "2021-11-22T14:44:20Z",
|
||||
"pushed_at": "2021-01-29T13:59:07Z",
|
||||
"stargazers_count": 183,
|
||||
"watchers_count": 183,
|
||||
"stargazers_count": 184,
|
||||
"watchers_count": 184,
|
||||
"forks_count": 48,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 48,
|
||||
"watchers": 183,
|
||||
"watchers": 184,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1428,8 +1428,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-10-13T17:43:51Z",
|
||||
"updated_at": "2021-11-22T09:13:54Z",
|
||||
"pushed_at": "2021-11-22T09:13:52Z",
|
||||
"updated_at": "2021-11-22T17:31:46Z",
|
||||
"pushed_at": "2021-11-22T17:31:43Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-27T15:51:12Z",
|
||||
"updated_at": "2021-11-21T21:50:25Z",
|
||||
"updated_at": "2021-11-22T12:27:30Z",
|
||||
"pushed_at": "2021-10-28T06:37:37Z",
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 58,
|
||||
"watchers": 59,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-08-28T04:21:44Z",
|
||||
"updated_at": "2021-09-01T18:38:08Z",
|
||||
"updated_at": "2021-11-22T15:24:53Z",
|
||||
"pushed_at": "2021-08-29T14:06:28Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -233,12 +233,12 @@
|
|||
"pushed_at": "2021-09-11T09:50:26Z",
|
||||
"stargazers_count": 1313,
|
||||
"watchers_count": 1313,
|
||||
"forks_count": 425,
|
||||
"forks_count": 426,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 425,
|
||||
"forks": 426,
|
||||
"watchers": 1313,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -854,5 +854,32 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 430718153,
|
||||
"name": "CVE-2021-40444",
|
||||
"full_name": "Alexcot25051999\/CVE-2021-40444",
|
||||
"owner": {
|
||||
"login": "Alexcot25051999",
|
||||
"id": 94846095,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94846095?v=4",
|
||||
"html_url": "https:\/\/github.com\/Alexcot25051999"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Alexcot25051999\/CVE-2021-40444",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-11-22T13:29:20Z",
|
||||
"updated_at": "2021-11-22T13:41:39Z",
|
||||
"pushed_at": "2021-11-22T13:41:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
33
2021/CVE-2021-40531.json
Normal file
33
2021/CVE-2021-40531.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 429884385,
|
||||
"name": "CVE-2021-40531",
|
||||
"full_name": "jonpalmisc\/CVE-2021-40531",
|
||||
"owner": {
|
||||
"login": "jonpalmisc",
|
||||
"id": 41548458,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41548458?v=4",
|
||||
"html_url": "https:\/\/github.com\/jonpalmisc"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jonpalmisc\/CVE-2021-40531",
|
||||
"description": "A demo of exploiting CVE-2021-40531, a vulnerability in Sketch.",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-19T17:38:34Z",
|
||||
"updated_at": "2021-11-22T17:22:45Z",
|
||||
"pushed_at": "2021-11-22T14:52:04Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve",
|
||||
"macos",
|
||||
"sketch"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -81,5 +81,59 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 430704302,
|
||||
"name": "CVE-2021-41277",
|
||||
"full_name": "kap1ush0n\/CVE-2021-41277",
|
||||
"owner": {
|
||||
"login": "kap1ush0n",
|
||||
"id": 94843370,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94843370?v=4",
|
||||
"html_url": "https:\/\/github.com\/kap1ush0n"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kap1ush0n\/CVE-2021-41277",
|
||||
"description": "MetaBase 任意文件读取漏洞 fofa批量poc",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-22T12:49:42Z",
|
||||
"updated_at": "2021-11-22T12:50:17Z",
|
||||
"pushed_at": "2021-11-22T12:50:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 430814901,
|
||||
"name": "CVE-2021-41277",
|
||||
"full_name": "z3n70\/CVE-2021-41277",
|
||||
"owner": {
|
||||
"login": "z3n70",
|
||||
"id": 39817707,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39817707?v=4",
|
||||
"html_url": "https:\/\/github.com\/z3n70"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/z3n70\/CVE-2021-41277",
|
||||
"description": "simple program for exploit metabase",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-22T18:06:11Z",
|
||||
"updated_at": "2021-11-22T18:10:29Z",
|
||||
"pushed_at": "2021-11-22T18:10:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": "CVE-2021-43617 bypass CRF",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-19T05:39:25Z",
|
||||
"updated_at": "2021-11-19T05:41:38Z",
|
||||
"pushed_at": "2021-11-19T05:41:36Z",
|
||||
"updated_at": "2021-11-22T12:38:26Z",
|
||||
"pushed_at": "2021-11-22T12:38:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
|
|
12
README.md
12
README.md
|
@ -2949,6 +2949,7 @@ Microsoft MSHTML Remote Code Execution Vulnerability
|
|||
- [TiagoSergio/CVE-2021-40444](https://github.com/TiagoSergio/CVE-2021-40444)
|
||||
- [0xK4gura/CVE-2021-40444-POC](https://github.com/0xK4gura/CVE-2021-40444-POC)
|
||||
- [Zeop-CyberSec/word_mshtml](https://github.com/Zeop-CyberSec/word_mshtml)
|
||||
- [Alexcot25051999/CVE-2021-40444](https://github.com/Alexcot25051999/CVE-2021-40444)
|
||||
|
||||
### CVE-2021-40449 (2021-10-12)
|
||||
|
||||
|
@ -2979,6 +2980,14 @@ A reflected XSS vulnerability exists in multiple pages in version 22 of the Gibb
|
|||
### CVE-2021-40514
|
||||
- [war4uthor/CVE-2021-40514](https://github.com/war4uthor/CVE-2021-40514)
|
||||
|
||||
### CVE-2021-40531 (2021-09-06)
|
||||
|
||||
<code>
|
||||
Sketch before 75 mishandles external library feeds.
|
||||
</code>
|
||||
|
||||
- [jonpalmisc/CVE-2021-40531](https://github.com/jonpalmisc/CVE-2021-40531)
|
||||
|
||||
### CVE-2021-40539 (2021-09-07)
|
||||
|
||||
<code>
|
||||
|
@ -3034,6 +3043,8 @@ Metabase is an open source data analytics platform. In affected versions a secur
|
|||
- [Seals6/CVE-2021-41277](https://github.com/Seals6/CVE-2021-41277)
|
||||
- [tahtaciburak/CVE-2021-41277](https://github.com/tahtaciburak/CVE-2021-41277)
|
||||
- [Henry4E36/Metabase-cve-2021-41277](https://github.com/Henry4E36/Metabase-cve-2021-41277)
|
||||
- [kap1ush0n/CVE-2021-41277](https://github.com/kap1ush0n/CVE-2021-41277)
|
||||
- [z3n70/CVE-2021-41277](https://github.com/z3n70/CVE-2021-41277)
|
||||
|
||||
### CVE-2021-41351 (2021-11-09)
|
||||
|
||||
|
@ -14504,6 +14515,7 @@ FUEL CMS 1.4.1 allows PHP Code Evaluation via the pages/select/ filter parameter
|
|||
- [NeKroFR/CVE-2018-16763](https://github.com/NeKroFR/CVE-2018-16763)
|
||||
- [k4is3r13/Bash-Script-CVE-2018-16763](https://github.com/k4is3r13/Bash-Script-CVE-2018-16763)
|
||||
- [padsalatushal/CVE-2018-16763](https://github.com/padsalatushal/CVE-2018-16763)
|
||||
- [SlizBinksman/THM-Vulnerability_Capstone-CVE-2018-16763](https://github.com/SlizBinksman/THM-Vulnerability_Capstone-CVE-2018-16763)
|
||||
|
||||
### CVE-2018-16843 (2018-11-07)
|
||||
|
||||
|
|
Loading…
Reference in a new issue