From b3224840b378eee649be7d921ba9293c5a04d30d Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Sat, 16 Dec 2023 09:30:00 +0900 Subject: [PATCH] Auto Update 2023/12/16 00:30:00 --- 2013/CVE-2013-2028.json | 30 --------------------------- 2019/CVE-2019-11408.json | 2 +- 2020/CVE-2020-0787.json | 8 +++---- 2020/CVE-2020-2551.json | 2 +- 2020/CVE-2020-2655.json | 2 +- 2021/CVE-2021-3560.json | 2 +- 2021/CVE-2021-40438.json | 8 +++---- 2021/CVE-2021-44228.json | 12 +++++------ 2022/CVE-2022-29464.json | 8 +++---- 2023/CVE-2023-20273.json | 8 +++---- 2023/CVE-2023-22524.json | 8 +++---- 2023/CVE-2023-25690.json | 45 ++++------------------------------------ 2023/CVE-2023-29357.json | 8 +++---- 2023/CVE-2023-46454.json | 8 +++---- 2023/CVE-2023-49070.json | 8 +++---- 2023/CVE-2023-49954.json | 2 +- 2023/CVE-2023-50070.json | 32 ++++++++++++++++++++++++++++ 2023/CVE-2023-50164.json | 38 +++++++++++++++++++++++++++++---- 2023/CVE-2023-50643.json | 32 ++++++++++++++++++++++++++++ 2023/CVE-2023-6553.json | 8 +++---- README.md | 9 ++++++-- 21 files changed, 156 insertions(+), 124 deletions(-) create mode 100644 2023/CVE-2023-50070.json create mode 100644 2023/CVE-2023-50643.json diff --git a/2013/CVE-2013-2028.json b/2013/CVE-2013-2028.json index 7a10ae9d5c..8bf43f532f 100644 --- a/2013/CVE-2013-2028.json +++ b/2013/CVE-2013-2028.json @@ -59,36 +59,6 @@ "score": 0, "subscribers_count": 6 }, - { - "id": 200347068, - "name": "CVE-2013-2028-x64-bypass-ssp-and-pie-PoC", - "full_name": "tachibana51\/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC", - "owner": { - "login": "tachibana51", - "id": 29031994, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29031994?v=4", - "html_url": "https:\/\/github.com\/tachibana51" - }, - "html_url": "https:\/\/github.com\/tachibana51\/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC", - "description": "this is not stable", - "fork": false, - "created_at": "2019-08-03T07:38:18Z", - "updated_at": "2019-10-26T18:48:26Z", - "pushed_at": "2019-08-03T07:58:04Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - }, { "id": 275396332, "name": "CVE-2013-2028-Exploit", diff --git a/2019/CVE-2019-11408.json b/2019/CVE-2019-11408.json index 830145b545..9c4fb7b8e3 100644 --- a/2019/CVE-2019-11408.json +++ b/2019/CVE-2019-11408.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2023-11-25T17:04:39Z", "updated_at": "2023-11-25T17:14:55Z", - "pushed_at": "2023-12-15T16:17:24Z", + "pushed_at": "2023-12-15T18:36:12Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2020/CVE-2020-0787.json b/2020/CVE-2020-0787.json index 755c0cfdd4..b47619ec5c 100644 --- a/2020/CVE-2020-0787.json +++ b/2020/CVE-2020-0787.json @@ -13,10 +13,10 @@ "description": "Support ALL Windows Version", "fork": false, "created_at": "2020-06-16T08:57:51Z", - "updated_at": "2023-12-14T14:33:47Z", + "updated_at": "2023-12-16T00:14:18Z", "pushed_at": "2020-09-11T07:38:22Z", - "stargazers_count": 702, - "watchers_count": 702, + "stargazers_count": 703, + "watchers_count": 703, "has_discussions": false, "forks_count": 179, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 179, - "watchers": 702, + "watchers": 703, "score": 0, "subscribers_count": 18 }, diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index c61321ada2..1bb2593b5e 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -48,7 +48,7 @@ "forks": 340, "watchers": 1847, "score": 0, - "subscribers_count": 34 + "subscribers_count": 35 }, { "id": 234696172, diff --git a/2020/CVE-2020-2655.json b/2020/CVE-2020-2655.json index 99068b5d87..f3bff5afe6 100644 --- a/2020/CVE-2020-2655.json +++ b/2020/CVE-2020-2655.json @@ -27,6 +27,6 @@ "forks": 2, "watchers": 5, "score": 0, - "subscribers_count": 7 + "subscribers_count": 6 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3560.json b/2021/CVE-2021-3560.json index 40b5a61c29..2760b9e0ab 100644 --- a/2021/CVE-2021-3560.json +++ b/2021/CVE-2021-3560.json @@ -749,6 +749,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2021/CVE-2021-40438.json b/2021/CVE-2021-40438.json index ee7fb0f162..d829edb988 100644 --- a/2021/CVE-2021-40438.json +++ b/2021/CVE-2021-40438.json @@ -223,10 +223,10 @@ "description": "CVE-2021-40438 Apache <= 2.4.48 SSRF exploit", "fork": false, "created_at": "2023-12-12T11:56:23Z", - "updated_at": "2023-12-12T12:09:49Z", + "updated_at": "2023-12-15T19:23:41Z", "pushed_at": "2023-12-12T12:29:24Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -243,7 +243,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index f2fa8d6f82..0d6be12986 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -926,7 +926,7 @@ "forks": 491, "watchers": 1671, "score": 0, - "subscribers_count": 25 + "subscribers_count": 26 }, { "id": 437141854, @@ -3841,7 +3841,7 @@ "forks": 4, "watchers": 1, "score": 0, - "subscribers_count": 46 + "subscribers_count": 44 }, { "id": 437774679, @@ -5560,10 +5560,10 @@ "description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.", "fork": false, "created_at": "2021-12-14T06:37:59Z", - "updated_at": "2023-12-05T21:21:47Z", + "updated_at": "2023-12-15T21:29:56Z", "pushed_at": "2023-04-06T18:09:41Z", - "stargazers_count": 371, - "watchers_count": 371, + "stargazers_count": 372, + "watchers_count": 372, "has_discussions": false, "forks_count": 55, "allow_forking": true, @@ -5578,7 +5578,7 @@ ], "visibility": "public", "forks": 55, - "watchers": 371, + "watchers": 372, "score": 0, "subscribers_count": 12 }, diff --git a/2022/CVE-2022-29464.json b/2022/CVE-2022-29464.json index 8379f2a09b..92d4e1eb43 100644 --- a/2022/CVE-2022-29464.json +++ b/2022/CVE-2022-29464.json @@ -13,10 +13,10 @@ "description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.", "fork": false, "created_at": "2022-04-20T21:23:52Z", - "updated_at": "2023-12-11T06:17:41Z", + "updated_at": "2023-12-15T22:17:04Z", "pushed_at": "2022-04-27T05:52:43Z", - "stargazers_count": 357, - "watchers_count": 357, + "stargazers_count": 358, + "watchers_count": 358, "has_discussions": false, "forks_count": 95, "allow_forking": true, @@ -27,7 +27,7 @@ ], "visibility": "public", "forks": 95, - "watchers": 357, + "watchers": 358, "score": 0, "subscribers_count": 8 }, diff --git a/2023/CVE-2023-20273.json b/2023/CVE-2023-20273.json index 228792cf02..88662eab0b 100644 --- a/2023/CVE-2023-20273.json +++ b/2023/CVE-2023-20273.json @@ -13,10 +13,10 @@ "description": "CVE-2023-20273 Exploit PoC", "fork": false, "created_at": "2023-12-09T07:25:43Z", - "updated_at": "2023-12-14T10:02:59Z", + "updated_at": "2023-12-16T00:09:03Z", "pushed_at": "2023-12-09T07:28:40Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-22524.json b/2023/CVE-2023-22524.json index 7aba74678c..033ced72e6 100644 --- a/2023/CVE-2023-22524.json +++ b/2023/CVE-2023-22524.json @@ -43,10 +43,10 @@ "description": "Atlassian Companion RCE Vulnerability Proof of Concept", "fork": false, "created_at": "2023-12-14T15:33:11Z", - "updated_at": "2023-12-15T18:09:01Z", + "updated_at": "2023-12-16T00:23:13Z", "pushed_at": "2023-12-15T06:13:34Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 14, + "watchers_count": 14, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -59,7 +59,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 11, + "watchers": 14, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-25690.json b/2023/CVE-2023-25690.json index 7e4f67ff92..f90587c5d3 100644 --- a/2023/CVE-2023-25690.json +++ b/2023/CVE-2023-25690.json @@ -47,10 +47,10 @@ "description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.", "fork": false, "created_at": "2023-05-22T03:06:31Z", - "updated_at": "2023-12-11T06:17:50Z", + "updated_at": "2023-12-15T19:20:01Z", "pushed_at": "2023-09-10T10:44:32Z", - "stargazers_count": 231, - "watchers_count": 231, + "stargazers_count": 232, + "watchers_count": 232, "has_discussions": false, "forks_count": 34, "allow_forking": true, @@ -67,7 +67,7 @@ ], "visibility": "public", "forks": 34, - "watchers": 231, + "watchers": 232, "score": 0, "subscribers_count": 4 }, @@ -100,42 +100,5 @@ "watchers": 0, "score": 0, "subscribers_count": 1 - }, - { - "id": 732126947, - "name": "CVE-2023-25690-exploit", - "full_name": "sergiovks\/CVE-2023-25690-exploit", - "owner": { - "login": "sergiovks", - "id": 118485549, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118485549?v=4", - "html_url": "https:\/\/github.com\/sergiovks" - }, - "html_url": "https:\/\/github.com\/sergiovks\/CVE-2023-25690-exploit", - "description": "CVE-2023-25690 - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 to 2.4.55 leads to HTTP Request Smuggling.", - "fork": false, - "created_at": "2023-12-15T17:57:00Z", - "updated_at": "2023-12-15T18:44:24Z", - "pushed_at": "2023-12-15T18:43:41Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "apache", - "crlf", - "cve-2023-25690", - "http-request-smuggling", - "http-resquest-splitting", - "ssrf" - ], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-29357.json b/2023/CVE-2023-29357.json index 187565b680..013fbbd0ba 100644 --- a/2023/CVE-2023-29357.json +++ b/2023/CVE-2023-29357.json @@ -13,10 +13,10 @@ "description": "Microsoft SharePoint Server Elevation of Privilege Vulnerability", "fork": false, "created_at": "2023-09-26T16:18:41Z", - "updated_at": "2023-12-13T03:54:56Z", + "updated_at": "2023-12-15T19:43:03Z", "pushed_at": "2023-09-26T19:04:21Z", - "stargazers_count": 177, - "watchers_count": 177, + "stargazers_count": 178, + "watchers_count": 178, "has_discussions": false, "forks_count": 24, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 24, - "watchers": 177, + "watchers": 178, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-46454.json b/2023/CVE-2023-46454.json index b56c35d094..76e5f7131e 100644 --- a/2023/CVE-2023-46454.json +++ b/2023/CVE-2023-46454.json @@ -13,10 +13,10 @@ "description": "Exploits for GL.iNet CVE-2023-46454, CVE-2023-46455 and CVE-2023-46456", "fork": false, "created_at": "2023-12-08T01:45:16Z", - "updated_at": "2023-12-11T03:37:18Z", + "updated_at": "2023-12-15T19:49:41Z", "pushed_at": "2023-12-08T04:35:40Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-49070.json b/2023/CVE-2023-49070.json index d9943cb593..07bec3a9fd 100644 --- a/2023/CVE-2023-49070.json +++ b/2023/CVE-2023-49070.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-12-14T09:32:41Z", - "updated_at": "2023-12-15T08:17:06Z", + "updated_at": "2023-12-15T21:13:40Z", "pushed_at": "2023-12-15T06:29:09Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 4, + "watchers": 6, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-49954.json b/2023/CVE-2023-49954.json index 6a89db4c8a..f6dc540f52 100644 --- a/2023/CVE-2023-49954.json +++ b/2023/CVE-2023-49954.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2023-12-14T18:38:28Z", "updated_at": "2023-12-14T20:06:19Z", - "pushed_at": "2023-12-15T08:38:21Z", + "pushed_at": "2023-12-15T23:09:16Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2023/CVE-2023-50070.json b/2023/CVE-2023-50070.json new file mode 100644 index 0000000000..13e0b07bfb --- /dev/null +++ b/2023/CVE-2023-50070.json @@ -0,0 +1,32 @@ +[ + { + "id": 732171989, + "name": "CVE-2023-50070", + "full_name": "geraldoalcantara\/CVE-2023-50070", + "owner": { + "login": "geraldoalcantara", + "id": 152064551, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152064551?v=4", + "html_url": "https:\/\/github.com\/geraldoalcantara" + }, + "html_url": "https:\/\/github.com\/geraldoalcantara\/CVE-2023-50070", + "description": "Multiple SQL injection vulnerabilities in \/customer_support\/ajax.php?action=save_ticket in Customer Support System 1.0 allow authenticated attackers to execute arbitrary SQL commands via department_id, customer_id and subject.", + "fork": false, + "created_at": "2023-12-15T20:37:39Z", + "updated_at": "2023-12-15T22:08:02Z", + "pushed_at": "2023-12-15T22:14:35Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-50164.json b/2023/CVE-2023-50164.json index 378241f907..e20452ccad 100644 --- a/2023/CVE-2023-50164.json +++ b/2023/CVE-2023-50164.json @@ -13,10 +13,10 @@ "description": "A critical security vulnerability, identified as CVE-2023-50164 (CVE: 9.8) was found in Apache Struts, allowing attackers to manipulate file upload parameters that can potentially lead to unauthorized path traversal and remote code execution (RCE).", "fork": false, "created_at": "2023-12-13T09:31:36Z", - "updated_at": "2023-12-15T14:58:24Z", + "updated_at": "2023-12-16T00:23:27Z", "pushed_at": "2023-12-13T13:18:18Z", - "stargazers_count": 37, - "watchers_count": 37, + "stargazers_count": 41, + "watchers_count": 41, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -25,8 +25,38 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 37, + "watchers": 41, "score": 0, "subscribers_count": 2 + }, + { + "id": 732181811, + "name": "CVE-2023-50164", + "full_name": "bcdannyboy\/CVE-2023-50164", + "owner": { + "login": "bcdannyboy", + "id": 12553297, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12553297?v=4", + "html_url": "https:\/\/github.com\/bcdannyboy" + }, + "html_url": "https:\/\/github.com\/bcdannyboy\/CVE-2023-50164", + "description": "A scanning utility and PoC for CVE-2023-50164", + "fork": false, + "created_at": "2023-12-15T21:19:51Z", + "updated_at": "2023-12-15T22:11:48Z", + "pushed_at": "2023-12-15T23:50:17Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-50643.json b/2023/CVE-2023-50643.json new file mode 100644 index 0000000000..2ea77edc3c --- /dev/null +++ b/2023/CVE-2023-50643.json @@ -0,0 +1,32 @@ +[ + { + "id": 729209972, + "name": "CVE-2023-50643", + "full_name": "V3x0r\/CVE-2023-50643", + "owner": { + "login": "V3x0r", + "id": 83291215, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83291215?v=4", + "html_url": "https:\/\/github.com\/V3x0r" + }, + "html_url": "https:\/\/github.com\/V3x0r\/CVE-2023-50643", + "description": "CVE-2023-50643", + "fork": false, + "created_at": "2023-12-08T16:37:16Z", + "updated_at": "2023-12-15T20:53:41Z", + "pushed_at": "2023-12-15T21:06:14Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-6553.json b/2023/CVE-2023-6553.json index 9ebb637cf9..3c1f19ee7f 100644 --- a/2023/CVE-2023-6553.json +++ b/2023/CVE-2023-6553.json @@ -13,10 +13,10 @@ "description": "Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution", "fork": false, "created_at": "2023-12-13T20:26:59Z", - "updated_at": "2023-12-15T17:12:55Z", + "updated_at": "2023-12-15T21:15:31Z", "pushed_at": "2023-12-15T18:13:06Z", - "stargazers_count": 22, - "watchers_count": 22, + "stargazers_count": 23, + "watchers_count": 23, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -39,7 +39,7 @@ ], "visibility": "public", "forks": 6, - "watchers": 22, + "watchers": 23, "score": 0, "subscribers_count": 1 } diff --git a/README.md b/README.md index 8ae1922d90..ead58af04d 100644 --- a/README.md +++ b/README.md @@ -1966,7 +1966,6 @@ - [tbachvarova/linux-apache-fix-mod_rewrite-spaceInURL](https://github.com/tbachvarova/linux-apache-fix-mod_rewrite-spaceInURL) - [dhmosfunk/CVE-2023-25690-POC](https://github.com/dhmosfunk/CVE-2023-25690-POC) - [thanhlam-attt/CVE-2023-25690](https://github.com/thanhlam-attt/CVE-2023-25690) -- [sergiovks/CVE-2023-25690-exploit](https://github.com/sergiovks/CVE-2023-25690-exploit) ### CVE-2023-25725 (2023-02-14) @@ -5769,12 +5768,19 @@ - [mbadanoiu/CVE-2023-49964](https://github.com/mbadanoiu/CVE-2023-49964) +### CVE-2023-50070 +- [geraldoalcantara/CVE-2023-50070](https://github.com/geraldoalcantara/CVE-2023-50070) + ### CVE-2023-50164 (2023-12-07) An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.\nUsers are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.\n - [jakabakos/CVE-2023-50164-Apache-Struts-RCE](https://github.com/jakabakos/CVE-2023-50164-Apache-Struts-RCE) +- [bcdannyboy/CVE-2023-50164](https://github.com/bcdannyboy/CVE-2023-50164) + +### CVE-2023-50643 +- [V3x0r/CVE-2023-50643](https://github.com/V3x0r/CVE-2023-50643) ### CVE-2023-51504 - [Sybelle03/CVE-2023-51504](https://github.com/Sybelle03/CVE-2023-51504) @@ -36394,7 +36400,6 @@ - [danghvu/nginx-1.4.0](https://github.com/danghvu/nginx-1.4.0) - [kitctf/nginxpwn](https://github.com/kitctf/nginxpwn) -- [tachibana51/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC](https://github.com/tachibana51/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC) - [m4drat/CVE-2013-2028-Exploit](https://github.com/m4drat/CVE-2013-2028-Exploit) - [mambroziak/docker-cve-2013-2028](https://github.com/mambroziak/docker-cve-2013-2028) - [jptr218/nginxhack](https://github.com/jptr218/nginxhack)