Auto Update 2025/01/07 00:46:58

This commit is contained in:
motikan2010-bot 2025-01-07 09:46:58 +09:00
parent c29f62214c
commit b74083110b
26 changed files with 278 additions and 105 deletions

View file

@ -60,5 +60,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 912989719,
"name": "Drupalgeddon-Python3",
"full_name": "RasmusKnothNielsen\/Drupalgeddon-Python3",
"owner": {
"login": "RasmusKnothNielsen",
"id": 12834690,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12834690?v=4",
"html_url": "https:\/\/github.com\/RasmusKnothNielsen",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RasmusKnothNielsen\/Drupalgeddon-Python3",
"description": "An rewritten POC on the CVE-2014-3704 ",
"fork": false,
"created_at": "2025-01-06T20:04:24Z",
"updated_at": "2025-01-06T20:18:35Z",
"pushed_at": "2025-01-06T20:18:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -19,13 +19,13 @@
"stargazers_count": 510,
"watchers_count": 510,
"has_discussions": false,
"forks_count": 454,
"forks_count": 453,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 454,
"forks": 453,
"watchers": 510,
"score": 0,
"subscribers_count": 57

View file

@ -33,7 +33,7 @@
"forks": 24,
"watchers": 154,
"score": 0,
"subscribers_count": 11
"subscribers_count": 12
},
{
"id": 244758802,

View file

@ -28,6 +28,6 @@
"forks": 38,
"watchers": 71,
"score": 0,
"subscribers_count": 5
"subscribers_count": 6
}
]

View file

@ -139,5 +139,41 @@
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 913003270,
"name": "poc-cve-2020-35489",
"full_name": "gh202503\/poc-cve-2020-35489",
"owner": {
"login": "gh202503",
"id": 193975604,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/193975604?v=4",
"html_url": "https:\/\/github.com\/gh202503",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/gh202503\/poc-cve-2020-35489",
"description": "poc-CVE-2020-35489",
"fork": false,
"created_at": "2025-01-06T20:45:48Z",
"updated_at": "2025-01-06T21:24:55Z",
"pushed_at": "2025-01-06T21:24:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2020-35489",
"poc-cve-2020-35489",
"rce",
"rce-exploit"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "🐱‍💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...",
"fork": false,
"created_at": "2021-03-22T11:53:57Z",
"updated_at": "2024-11-11T16:02:36Z",
"updated_at": "2025-01-06T18:55:22Z",
"pushed_at": "2021-03-22T18:24:20Z",
"stargazers_count": 165,
"watchers_count": 165,
"stargazers_count": 164,
"watchers_count": 164,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -41,7 +41,7 @@
],
"visibility": "public",
"forks": 26,
"watchers": 165,
"watchers": 164,
"score": 0,
"subscribers_count": 4
}

View file

@ -45,10 +45,10 @@
"description": "PoC for Nginx 0.6.18 - 1.20.0 Memory Overwrite Vulnerability CVE-2021-23017",
"fork": false,
"created_at": "2022-06-30T04:39:58Z",
"updated_at": "2024-12-25T00:20:37Z",
"updated_at": "2025-01-06T23:20:07Z",
"pushed_at": "2023-11-12T16:29:03Z",
"stargazers_count": 100,
"watchers_count": 100,
"stargazers_count": 101,
"watchers_count": 101,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -60,7 +60,7 @@
],
"visibility": "public",
"forks": 21,
"watchers": 100,
"watchers": 101,
"score": 0,
"subscribers_count": 3
},

View file

@ -29,36 +29,5 @@
"watchers": 3,
"score": 0,
"subscribers_count": 2
},
{
"id": 912935660,
"name": "CVE-2021-26828",
"full_name": "voidvxvt\/CVE-2021-26828",
"owner": {
"login": "voidvxvt",
"id": 86536790,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86536790?v=4",
"html_url": "https:\/\/github.com\/voidvxvt",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/voidvxvt\/CVE-2021-26828",
"description": "python3 port of https:\/\/github.com\/hev0x\/CVE-2021-26828_ScadaBR_RCE\/blob\/main\/LinScada_RCE.py",
"fork": false,
"created_at": "2025-01-06T17:38:19Z",
"updated_at": "2025-01-06T17:40:18Z",
"pushed_at": "2025-01-06T17:40:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -12768,7 +12768,7 @@
"fork": false,
"created_at": "2025-01-03T10:15:17Z",
"updated_at": "2025-01-03T10:15:21Z",
"pushed_at": "2025-01-03T16:36:23Z",
"pushed_at": "2025-01-06T19:10:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -29,5 +29,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 448068658,
"name": "CVE-2021-46069",
"full_name": "plsanu\/CVE-2021-46069",
"owner": {
"login": "plsanu",
"id": 61007700,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
"html_url": "https:\/\/github.com\/plsanu",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/plsanu\/CVE-2021-46069",
"description": "CVE-2021-46069 - A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Mechanic List Section in login panel.",
"fork": false,
"created_at": "2022-01-14T18:27:00Z",
"updated_at": "2023-12-30T08:24:23Z",
"pushed_at": "2022-01-14T18:27:27Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -2897,5 +2897,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 913058800,
"name": "CTF-CVE-2022-0847",
"full_name": "JustinYe377\/CTF-CVE-2022-0847",
"owner": {
"login": "JustinYe377",
"id": 97569874,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97569874?v=4",
"html_url": "https:\/\/github.com\/JustinYe377",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/JustinYe377\/CTF-CVE-2022-0847",
"description": null,
"fork": false,
"created_at": "2025-01-07T00:25:12Z",
"updated_at": "2025-01-07T00:25:13Z",
"pushed_at": "2025-01-07T00:25:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,12 +14,12 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
"updated_at": "2024-12-29T06:32:48Z",
"updated_at": "2025-01-06T20:22:58Z",
"pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 777,
"watchers_count": 777,
"stargazers_count": 778,
"watchers_count": 778,
"has_discussions": false,
"forks_count": 158,
"forks_count": 159,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -28,8 +28,8 @@
"cve-2022-22718"
],
"visibility": "public",
"forks": 158,
"watchers": 777,
"forks": 159,
"watchers": 778,
"score": 0,
"subscribers_count": 15
}

View file

@ -107,10 +107,10 @@
"description": "CVE-2023-0386 analysis and Exp",
"fork": false,
"created_at": "2023-05-06T06:07:23Z",
"updated_at": "2024-11-19T09:49:23Z",
"updated_at": "2025-01-07T00:20:14Z",
"pushed_at": "2023-05-06T06:19:25Z",
"stargazers_count": 117,
"watchers_count": 117,
"stargazers_count": 118,
"watchers_count": 118,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 117,
"watchers": 118,
"score": 0,
"subscribers_count": 4
},

View file

@ -383,5 +383,36 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 912981235,
"name": "CVE-2023-41425",
"full_name": "samu21req\/CVE-2023-41425",
"owner": {
"login": "samu21req",
"id": 61760887,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61760887?v=4",
"html_url": "https:\/\/github.com\/samu21req",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/samu21req\/CVE-2023-41425",
"description": null,
"fork": false,
"created_at": "2025-01-06T19:38:36Z",
"updated_at": "2025-01-06T19:44:38Z",
"pushed_at": "2025-01-06T19:44:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "CVE-2023-41892 - Craft CMS Remote Code Execution (RCE)",
"fork": false,
"created_at": "2023-10-06T01:40:34Z",
"updated_at": "2024-09-27T09:59:05Z",
"updated_at": "2025-01-06T20:18:22Z",
"pushed_at": "2023-10-07T03:26:00Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2025-01-06T08:21:21Z",
"updated_at": "2025-01-06T23:35:29Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1362,
"watchers_count": 1362,
"stargazers_count": 1364,
"watchers_count": 1364,
"has_discussions": false,
"forks_count": 230,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 230,
"watchers": 1362,
"watchers": 1364,
"score": 0,
"subscribers_count": 21
},

View file

@ -2,20 +2,20 @@
{
"id": 912223220,
"name": "CVE-2023-6931",
"full_name": "jungju817\/CVE-2023-6931",
"full_name": "K0n9-log\/CVE-2023-6931",
"owner": {
"login": "jungju817",
"login": "K0n9-log",
"id": 102219883,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102219883?v=4",
"html_url": "https:\/\/github.com\/jungju817",
"html_url": "https:\/\/github.com\/K0n9-log",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jungju817\/CVE-2023-6931",
"html_url": "https:\/\/github.com\/K0n9-log\/CVE-2023-6931",
"description": "CVE-2023-6931 kernel panic PoC",
"fork": false,
"created_at": "2025-01-05T00:28:28Z",
"updated_at": "2025-01-05T02:07:34Z",
"pushed_at": "2025-01-05T02:07:31Z",
"updated_at": "2025-01-06T19:31:39Z",
"pushed_at": "2025-01-06T19:31:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -45,10 +45,10 @@
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
"fork": false,
"created_at": "2024-06-18T12:30:53Z",
"updated_at": "2025-01-06T13:26:15Z",
"updated_at": "2025-01-06T23:24:13Z",
"pushed_at": "2024-12-02T06:29:52Z",
"stargazers_count": 269,
"watchers_count": 269,
"stargazers_count": 270,
"watchers_count": 270,
"has_discussions": false,
"forks_count": 62,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 62,
"watchers": 269,
"watchers": 270,
"score": 0,
"subscribers_count": 7
},
@ -297,10 +297,10 @@
"description": "PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from adb to installed app",
"fork": false,
"created_at": "2024-09-27T09:02:08Z",
"updated_at": "2025-01-06T12:27:07Z",
"updated_at": "2025-01-06T21:27:29Z",
"pushed_at": "2024-09-30T12:48:08Z",
"stargazers_count": 132,
"watchers_count": 132,
"stargazers_count": 133,
"watchers_count": 133,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -309,7 +309,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 132,
"watchers": 133,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,7 +14,7 @@
"description": null,
"fork": false,
"created_at": "2025-01-04T14:47:09Z",
"updated_at": "2025-01-04T14:58:28Z",
"updated_at": "2025-01-07T00:35:54Z",
"pushed_at": "2025-01-04T14:58:25Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -170,5 +170,36 @@
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 912544022,
"name": "CVE-2024-25641",
"full_name": "D3Ext\/CVE-2024-25641",
"owner": {
"login": "D3Ext",
"id": 67125397,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67125397?v=4",
"html_url": "https:\/\/github.com\/D3Ext",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/D3Ext\/CVE-2024-25641",
"description": "POC exploit for CVE-2024-25641",
"fork": false,
"created_at": "2025-01-05T21:33:18Z",
"updated_at": "2025-01-06T22:33:40Z",
"pushed_at": "2025-01-06T18:50:17Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -76,8 +76,8 @@
"description": "CVE-2024-28987 Scanner & Exploiter - SolarWinds Web Help Desk",
"fork": false,
"created_at": "2024-09-30T16:12:14Z",
"updated_at": "2024-12-23T19:58:15Z",
"pushed_at": "2024-12-23T19:58:11Z",
"updated_at": "2025-01-06T20:50:26Z",
"pushed_at": "2025-01-06T20:50:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -14,19 +14,19 @@
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113",
"fork": false,
"created_at": "2025-01-01T15:48:38Z",
"updated_at": "2025-01-06T17:18:21Z",
"updated_at": "2025-01-06T21:56:41Z",
"pushed_at": "2025-01-02T16:07:23Z",
"stargazers_count": 364,
"watchers_count": 364,
"stargazers_count": 366,
"watchers_count": 366,
"has_discussions": false,
"forks_count": 85,
"forks_count": 86,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 85,
"watchers": 364,
"forks": 86,
"watchers": 366,
"score": 0,
"subscribers_count": 3
},

View file

@ -200,10 +200,10 @@
"description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp",
"fork": false,
"created_at": "2024-12-23T07:20:47Z",
"updated_at": "2025-01-06T09:45:01Z",
"updated_at": "2025-01-06T20:17:42Z",
"pushed_at": "2024-12-23T07:30:27Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 62,
"watchers_count": 62,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -212,7 +212,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 61,
"watchers": 62,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": "A tool to exploit the CVE-2024-56512 vulnerability in Apache NiFi, which allows unauthorized access to sensitive data through improperly secured APIs.",
"fork": false,
"created_at": "2025-01-06T17:35:33Z",
"updated_at": "2025-01-06T17:51:41Z",
"updated_at": "2025-01-06T23:11:22Z",
"pushed_at": "2025-01-06T17:51:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -2180,10 +2180,10 @@
"description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)",
"fork": false,
"created_at": "2024-07-08T11:27:49Z",
"updated_at": "2024-12-29T22:55:53Z",
"updated_at": "2025-01-06T19:43:51Z",
"pushed_at": "2024-08-22T08:50:25Z",
"stargazers_count": 63,
"watchers_count": 63,
"stargazers_count": 65,
"watchers_count": 65,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -2192,7 +2192,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 63,
"watchers": 65,
"score": 0,
"subscribers_count": 3
},
@ -2931,10 +2931,10 @@
"description": null,
"fork": false,
"created_at": "2025-01-04T00:25:33Z",
"updated_at": "2025-01-04T00:37:18Z",
"updated_at": "2025-01-07T00:11:11Z",
"pushed_at": "2025-01-04T00:37:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -2943,7 +2943,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -3864,6 +3864,7 @@
- [Safarchand/CVE-2024-25641](https://github.com/Safarchand/CVE-2024-25641)
- [StopThatTalace/CVE-2024-25641-CACTI-RCE-1.2.26](https://github.com/StopThatTalace/CVE-2024-25641-CACTI-RCE-1.2.26)
- [XiaomingX/cve-2024-25641-poc](https://github.com/XiaomingX/cve-2024-25641-poc)
- [D3Ext/CVE-2024-25641](https://github.com/D3Ext/CVE-2024-25641)
### CVE-2024-25723 (2024-02-27)
@ -6846,7 +6847,11 @@
- [ooooooo-q/puma_header_normalization-CVE-2024-45614](https://github.com/ooooooo-q/puma_header_normalization-CVE-2024-45614)
### CVE-2024-46209
### CVE-2024-46209 (2025-01-06)
<code>A stored cross-site scripting (XSS) vulnerability in the component /media/test.html of REDAXO CMS v5.17.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the password parameter.
</code>
- [h4ckr4v3n/CVE-2024-46209](https://github.com/h4ckr4v3n/CVE-2024-46209)
### CVE-2024-46256 (2024-09-27)
@ -9545,7 +9550,7 @@
<code>A heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component can be exploited to achieve local privilege escalation.\n\nA perf_event's read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group().\n\nWe recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b.\n\n
</code>
- [jungju817/CVE-2023-6931](https://github.com/jungju817/CVE-2023-6931)
- [K0n9-log/CVE-2023-6931](https://github.com/K0n9-log/CVE-2023-6931)
### CVE-2023-6933 (2024-02-05)
@ -14186,6 +14191,7 @@
- [Diegomjx/CVE-2023-41425-WonderCMS-Authenticated-RCE](https://github.com/Diegomjx/CVE-2023-41425-WonderCMS-Authenticated-RCE)
- [0x0d3ad/CVE-2023-41425](https://github.com/0x0d3ad/CVE-2023-41425)
- [xpltive/CVE-2023-41425](https://github.com/xpltive/CVE-2023-41425)
- [samu21req/CVE-2023-41425](https://github.com/samu21req/CVE-2023-41425)
### CVE-2023-41436 (2023-09-15)
@ -16824,6 +16830,7 @@
- [xsxtw/CVE-2022-0847](https://github.com/xsxtw/CVE-2022-0847)
- [muhammad1596/CVE-2022-0847-dirty-pipe-checker](https://github.com/muhammad1596/CVE-2022-0847-dirty-pipe-checker)
- [muhammad1596/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/muhammad1596/CVE-2022-0847-DirtyPipe-Exploits)
- [JustinYe377/CTF-CVE-2022-0847](https://github.com/JustinYe377/CTF-CVE-2022-0847)
### CVE-2022-0848 (2022-03-04)
@ -25887,7 +25894,6 @@
</code>
- [hev0x/CVE-2021-26828_ScadaBR_RCE](https://github.com/hev0x/CVE-2021-26828_ScadaBR_RCE)
- [voidvxvt/CVE-2021-26828](https://github.com/voidvxvt/CVE-2021-26828)
### CVE-2021-26832 (2021-04-14)
@ -26056,7 +26062,11 @@
- [synacktiv/CVE-2021-27246_Pwn2Own2020](https://github.com/synacktiv/CVE-2021-27246_Pwn2Own2020)
### CVE-2021-27285
### CVE-2021-27285 (2025-01-06)
<code>An issue was discovered in Inspur ClusterEngine v4.0 that allows attackers to gain escalated Local privileges and execute arbitrary commands via /opt/tsce4/torque6/bin/getJobsByShell.
</code>
- [fjh1997/CVE-2021-27285](https://github.com/fjh1997/CVE-2021-27285)
### CVE-2021-27328 (2021-02-19)
@ -29857,6 +29867,7 @@
</code>
- [plsanu/Vehicle-Service-Management-System-Mechanic-List-Stored-Cross-Site-Scripting-XSS](https://github.com/plsanu/Vehicle-Service-Management-System-Mechanic-List-Stored-Cross-Site-Scripting-XSS)
- [plsanu/CVE-2021-46069](https://github.com/plsanu/CVE-2021-46069)
### CVE-2021-46070 (2022-01-06)
@ -35198,6 +35209,7 @@
- [X0UCYB3R/Check-WP-CVE-2020-35489](https://github.com/X0UCYB3R/Check-WP-CVE-2020-35489)
- [reneoliveirajr/wp_CVE-2020-35489_checker](https://github.com/reneoliveirajr/wp_CVE-2020-35489_checker)
- [Cappricio-Securities/CVE-2020-35489](https://github.com/Cappricio-Securities/CVE-2020-35489)
- [gh202503/poc-cve-2020-35489](https://github.com/gh202503/poc-cve-2020-35489)
### CVE-2020-35498 (2021-02-11)
@ -47978,6 +47990,7 @@
- [happynote3966/CVE-2014-3704](https://github.com/happynote3966/CVE-2014-3704)
- [AleDiBen/Drupalgeddon](https://github.com/AleDiBen/Drupalgeddon)
- [RasmusKnothNielsen/Drupalgeddon-Python3](https://github.com/RasmusKnothNielsen/Drupalgeddon-Python3)
### CVE-2014-4014 (2014-06-23)