mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2023/12/16 00:30:00
This commit is contained in:
parent
9648a88274
commit
b3224840b3
21 changed files with 156 additions and 124 deletions
|
@ -59,36 +59,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
{
|
||||
"id": 200347068,
|
||||
"name": "CVE-2013-2028-x64-bypass-ssp-and-pie-PoC",
|
||||
"full_name": "tachibana51\/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC",
|
||||
"owner": {
|
||||
"login": "tachibana51",
|
||||
"id": 29031994,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29031994?v=4",
|
||||
"html_url": "https:\/\/github.com\/tachibana51"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/tachibana51\/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC",
|
||||
"description": "this is not stable",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-03T07:38:18Z",
|
||||
"updated_at": "2019-10-26T18:48:26Z",
|
||||
"pushed_at": "2019-08-03T07:58:04Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 275396332,
|
||||
"name": "CVE-2013-2028-Exploit",
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-11-25T17:04:39Z",
|
||||
"updated_at": "2023-11-25T17:14:55Z",
|
||||
"pushed_at": "2023-12-15T16:17:24Z",
|
||||
"pushed_at": "2023-12-15T18:36:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Support ALL Windows Version",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-16T08:57:51Z",
|
||||
"updated_at": "2023-12-14T14:33:47Z",
|
||||
"updated_at": "2023-12-16T00:14:18Z",
|
||||
"pushed_at": "2020-09-11T07:38:22Z",
|
||||
"stargazers_count": 702,
|
||||
"watchers_count": 702,
|
||||
"stargazers_count": 703,
|
||||
"watchers_count": 703,
|
||||
"has_discussions": false,
|
||||
"forks_count": 179,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 179,
|
||||
"watchers": 702,
|
||||
"watchers": 703,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
},
|
||||
|
|
|
@ -48,7 +48,7 @@
|
|||
"forks": 340,
|
||||
"watchers": 1847,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
"subscribers_count": 35
|
||||
},
|
||||
{
|
||||
"id": 234696172,
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
"subscribers_count": 6
|
||||
}
|
||||
]
|
|
@ -749,6 +749,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -223,10 +223,10 @@
|
|||
"description": "CVE-2021-40438 Apache <= 2.4.48 SSRF exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-12T11:56:23Z",
|
||||
"updated_at": "2023-12-12T12:09:49Z",
|
||||
"updated_at": "2023-12-15T19:23:41Z",
|
||||
"pushed_at": "2023-12-12T12:29:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -243,7 +243,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -926,7 +926,7 @@
|
|||
"forks": 491,
|
||||
"watchers": 1671,
|
||||
"score": 0,
|
||||
"subscribers_count": 25
|
||||
"subscribers_count": 26
|
||||
},
|
||||
{
|
||||
"id": 437141854,
|
||||
|
@ -3841,7 +3841,7 @@
|
|||
"forks": 4,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 46
|
||||
"subscribers_count": 44
|
||||
},
|
||||
{
|
||||
"id": 437774679,
|
||||
|
@ -5560,10 +5560,10 @@
|
|||
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T06:37:59Z",
|
||||
"updated_at": "2023-12-05T21:21:47Z",
|
||||
"updated_at": "2023-12-15T21:29:56Z",
|
||||
"pushed_at": "2023-04-06T18:09:41Z",
|
||||
"stargazers_count": 371,
|
||||
"watchers_count": 371,
|
||||
"stargazers_count": 372,
|
||||
"watchers_count": 372,
|
||||
"has_discussions": false,
|
||||
"forks_count": 55,
|
||||
"allow_forking": true,
|
||||
|
@ -5578,7 +5578,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 55,
|
||||
"watchers": 371,
|
||||
"watchers": 372,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-20T21:23:52Z",
|
||||
"updated_at": "2023-12-11T06:17:41Z",
|
||||
"updated_at": "2023-12-15T22:17:04Z",
|
||||
"pushed_at": "2022-04-27T05:52:43Z",
|
||||
"stargazers_count": 357,
|
||||
"watchers_count": 357,
|
||||
"stargazers_count": 358,
|
||||
"watchers_count": 358,
|
||||
"has_discussions": false,
|
||||
"forks_count": 95,
|
||||
"allow_forking": true,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 95,
|
||||
"watchers": 357,
|
||||
"watchers": 358,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-20273 Exploit PoC",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-09T07:25:43Z",
|
||||
"updated_at": "2023-12-14T10:02:59Z",
|
||||
"updated_at": "2023-12-16T00:09:03Z",
|
||||
"pushed_at": "2023-12-09T07:28:40Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Atlassian Companion RCE Vulnerability Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-14T15:33:11Z",
|
||||
"updated_at": "2023-12-15T18:09:01Z",
|
||||
"updated_at": "2023-12-16T00:23:13Z",
|
||||
"pushed_at": "2023-12-15T06:13:34Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -59,7 +59,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 11,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -47,10 +47,10 @@
|
|||
"description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-22T03:06:31Z",
|
||||
"updated_at": "2023-12-11T06:17:50Z",
|
||||
"updated_at": "2023-12-15T19:20:01Z",
|
||||
"pushed_at": "2023-09-10T10:44:32Z",
|
||||
"stargazers_count": 231,
|
||||
"watchers_count": 231,
|
||||
"stargazers_count": 232,
|
||||
"watchers_count": 232,
|
||||
"has_discussions": false,
|
||||
"forks_count": 34,
|
||||
"allow_forking": true,
|
||||
|
@ -67,7 +67,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 34,
|
||||
"watchers": 231,
|
||||
"watchers": 232,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -100,42 +100,5 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 732126947,
|
||||
"name": "CVE-2023-25690-exploit",
|
||||
"full_name": "sergiovks\/CVE-2023-25690-exploit",
|
||||
"owner": {
|
||||
"login": "sergiovks",
|
||||
"id": 118485549,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118485549?v=4",
|
||||
"html_url": "https:\/\/github.com\/sergiovks"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sergiovks\/CVE-2023-25690-exploit",
|
||||
"description": "CVE-2023-25690 - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 to 2.4.55 leads to HTTP Request Smuggling.",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-15T17:57:00Z",
|
||||
"updated_at": "2023-12-15T18:44:24Z",
|
||||
"pushed_at": "2023-12-15T18:43:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"apache",
|
||||
"crlf",
|
||||
"cve-2023-25690",
|
||||
"http-request-smuggling",
|
||||
"http-resquest-splitting",
|
||||
"ssrf"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Microsoft SharePoint Server Elevation of Privilege Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-26T16:18:41Z",
|
||||
"updated_at": "2023-12-13T03:54:56Z",
|
||||
"updated_at": "2023-12-15T19:43:03Z",
|
||||
"pushed_at": "2023-09-26T19:04:21Z",
|
||||
"stargazers_count": 177,
|
||||
"watchers_count": 177,
|
||||
"stargazers_count": 178,
|
||||
"watchers_count": 178,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 177,
|
||||
"watchers": 178,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploits for GL.iNet CVE-2023-46454, CVE-2023-46455 and CVE-2023-46456",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-08T01:45:16Z",
|
||||
"updated_at": "2023-12-11T03:37:18Z",
|
||||
"updated_at": "2023-12-15T19:49:41Z",
|
||||
"pushed_at": "2023-12-08T04:35:40Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-12-14T09:32:41Z",
|
||||
"updated_at": "2023-12-15T08:17:06Z",
|
||||
"updated_at": "2023-12-15T21:13:40Z",
|
||||
"pushed_at": "2023-12-15T06:29:09Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-12-14T18:38:28Z",
|
||||
"updated_at": "2023-12-14T20:06:19Z",
|
||||
"pushed_at": "2023-12-15T08:38:21Z",
|
||||
"pushed_at": "2023-12-15T23:09:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
32
2023/CVE-2023-50070.json
Normal file
32
2023/CVE-2023-50070.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 732171989,
|
||||
"name": "CVE-2023-50070",
|
||||
"full_name": "geraldoalcantara\/CVE-2023-50070",
|
||||
"owner": {
|
||||
"login": "geraldoalcantara",
|
||||
"id": 152064551,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4",
|
||||
"html_url": "https:\/\/github.com\/geraldoalcantara"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-50070",
|
||||
"description": "Multiple SQL injection vulnerabilities in \/customer_support\/ajax.php?action=save_ticket in Customer Support System 1.0 allow authenticated attackers to execute arbitrary SQL commands via department_id, customer_id and subject.",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-15T20:37:39Z",
|
||||
"updated_at": "2023-12-15T22:08:02Z",
|
||||
"pushed_at": "2023-12-15T22:14:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A critical security vulnerability, identified as CVE-2023-50164 (CVE: 9.8) was found in Apache Struts, allowing attackers to manipulate file upload parameters that can potentially lead to unauthorized path traversal and remote code execution (RCE).",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-13T09:31:36Z",
|
||||
"updated_at": "2023-12-15T14:58:24Z",
|
||||
"updated_at": "2023-12-16T00:23:27Z",
|
||||
"pushed_at": "2023-12-13T13:18:18Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -25,8 +25,38 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 37,
|
||||
"watchers": 41,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 732181811,
|
||||
"name": "CVE-2023-50164",
|
||||
"full_name": "bcdannyboy\/CVE-2023-50164",
|
||||
"owner": {
|
||||
"login": "bcdannyboy",
|
||||
"id": 12553297,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12553297?v=4",
|
||||
"html_url": "https:\/\/github.com\/bcdannyboy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bcdannyboy\/CVE-2023-50164",
|
||||
"description": "A scanning utility and PoC for CVE-2023-50164",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-15T21:19:51Z",
|
||||
"updated_at": "2023-12-15T22:11:48Z",
|
||||
"pushed_at": "2023-12-15T23:50:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
32
2023/CVE-2023-50643.json
Normal file
32
2023/CVE-2023-50643.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 729209972,
|
||||
"name": "CVE-2023-50643",
|
||||
"full_name": "V3x0r\/CVE-2023-50643",
|
||||
"owner": {
|
||||
"login": "V3x0r",
|
||||
"id": 83291215,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83291215?v=4",
|
||||
"html_url": "https:\/\/github.com\/V3x0r"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/V3x0r\/CVE-2023-50643",
|
||||
"description": "CVE-2023-50643",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-08T16:37:16Z",
|
||||
"updated_at": "2023-12-15T20:53:41Z",
|
||||
"pushed_at": "2023-12-15T21:06:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-13T20:26:59Z",
|
||||
"updated_at": "2023-12-15T17:12:55Z",
|
||||
"updated_at": "2023-12-15T21:15:31Z",
|
||||
"pushed_at": "2023-12-15T18:13:06Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -39,7 +39,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 22,
|
||||
"watchers": 23,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -1966,7 +1966,6 @@
|
|||
- [tbachvarova/linux-apache-fix-mod_rewrite-spaceInURL](https://github.com/tbachvarova/linux-apache-fix-mod_rewrite-spaceInURL)
|
||||
- [dhmosfunk/CVE-2023-25690-POC](https://github.com/dhmosfunk/CVE-2023-25690-POC)
|
||||
- [thanhlam-attt/CVE-2023-25690](https://github.com/thanhlam-attt/CVE-2023-25690)
|
||||
- [sergiovks/CVE-2023-25690-exploit](https://github.com/sergiovks/CVE-2023-25690-exploit)
|
||||
|
||||
### CVE-2023-25725 (2023-02-14)
|
||||
|
||||
|
@ -5769,12 +5768,19 @@
|
|||
|
||||
- [mbadanoiu/CVE-2023-49964](https://github.com/mbadanoiu/CVE-2023-49964)
|
||||
|
||||
### CVE-2023-50070
|
||||
- [geraldoalcantara/CVE-2023-50070](https://github.com/geraldoalcantara/CVE-2023-50070)
|
||||
|
||||
### CVE-2023-50164 (2023-12-07)
|
||||
|
||||
<code>An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.\nUsers are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.\n
|
||||
</code>
|
||||
|
||||
- [jakabakos/CVE-2023-50164-Apache-Struts-RCE](https://github.com/jakabakos/CVE-2023-50164-Apache-Struts-RCE)
|
||||
- [bcdannyboy/CVE-2023-50164](https://github.com/bcdannyboy/CVE-2023-50164)
|
||||
|
||||
### CVE-2023-50643
|
||||
- [V3x0r/CVE-2023-50643](https://github.com/V3x0r/CVE-2023-50643)
|
||||
|
||||
### CVE-2023-51504
|
||||
- [Sybelle03/CVE-2023-51504](https://github.com/Sybelle03/CVE-2023-51504)
|
||||
|
@ -36394,7 +36400,6 @@
|
|||
|
||||
- [danghvu/nginx-1.4.0](https://github.com/danghvu/nginx-1.4.0)
|
||||
- [kitctf/nginxpwn](https://github.com/kitctf/nginxpwn)
|
||||
- [tachibana51/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC](https://github.com/tachibana51/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC)
|
||||
- [m4drat/CVE-2013-2028-Exploit](https://github.com/m4drat/CVE-2013-2028-Exploit)
|
||||
- [mambroziak/docker-cve-2013-2028](https://github.com/mambroziak/docker-cve-2013-2028)
|
||||
- [jptr218/nginxhack](https://github.com/jptr218/nginxhack)
|
||||
|
|
Loading…
Reference in a new issue