mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2025/01/07 00:46:58
This commit is contained in:
parent
c29f62214c
commit
b74083110b
26 changed files with 278 additions and 105 deletions
|
@ -60,5 +60,36 @@
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": 912989719,
|
||||||
|
"name": "Drupalgeddon-Python3",
|
||||||
|
"full_name": "RasmusKnothNielsen\/Drupalgeddon-Python3",
|
||||||
|
"owner": {
|
||||||
|
"login": "RasmusKnothNielsen",
|
||||||
|
"id": 12834690,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12834690?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/RasmusKnothNielsen",
|
||||||
|
"user_view_type": "public"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/RasmusKnothNielsen\/Drupalgeddon-Python3",
|
||||||
|
"description": "An rewritten POC on the CVE-2014-3704 ",
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2025-01-06T20:04:24Z",
|
||||||
|
"updated_at": "2025-01-06T20:18:35Z",
|
||||||
|
"pushed_at": "2025-01-06T20:18:32Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -19,13 +19,13 @@
|
||||||
"stargazers_count": 510,
|
"stargazers_count": 510,
|
||||||
"watchers_count": 510,
|
"watchers_count": 510,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 454,
|
"forks_count": 453,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 454,
|
"forks": 453,
|
||||||
"watchers": 510,
|
"watchers": 510,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 57
|
"subscribers_count": 57
|
||||||
|
|
|
@ -33,7 +33,7 @@
|
||||||
"forks": 24,
|
"forks": 24,
|
||||||
"watchers": 154,
|
"watchers": 154,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 11
|
"subscribers_count": 12
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"id": 244758802,
|
"id": 244758802,
|
||||||
|
|
|
@ -28,6 +28,6 @@
|
||||||
"forks": 38,
|
"forks": 38,
|
||||||
"watchers": 71,
|
"watchers": 71,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 5
|
"subscribers_count": 6
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -139,5 +139,41 @@
|
||||||
"watchers": 1,
|
"watchers": 1,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 0
|
"subscribers_count": 0
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": 913003270,
|
||||||
|
"name": "poc-cve-2020-35489",
|
||||||
|
"full_name": "gh202503\/poc-cve-2020-35489",
|
||||||
|
"owner": {
|
||||||
|
"login": "gh202503",
|
||||||
|
"id": 193975604,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/193975604?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/gh202503",
|
||||||
|
"user_view_type": "public"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/gh202503\/poc-cve-2020-35489",
|
||||||
|
"description": "poc-CVE-2020-35489",
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2025-01-06T20:45:48Z",
|
||||||
|
"updated_at": "2025-01-06T21:24:55Z",
|
||||||
|
"pushed_at": "2025-01-06T21:24:51Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [
|
||||||
|
"cve-2020-35489",
|
||||||
|
"poc-cve-2020-35489",
|
||||||
|
"rce",
|
||||||
|
"rce-exploit"
|
||||||
|
],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "🐱💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...",
|
"description": "🐱💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2021-03-22T11:53:57Z",
|
"created_at": "2021-03-22T11:53:57Z",
|
||||||
"updated_at": "2024-11-11T16:02:36Z",
|
"updated_at": "2025-01-06T18:55:22Z",
|
||||||
"pushed_at": "2021-03-22T18:24:20Z",
|
"pushed_at": "2021-03-22T18:24:20Z",
|
||||||
"stargazers_count": 165,
|
"stargazers_count": 164,
|
||||||
"watchers_count": 165,
|
"watchers_count": 164,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 26,
|
"forks_count": 26,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -41,7 +41,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 26,
|
"forks": 26,
|
||||||
"watchers": 165,
|
"watchers": 164,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 4
|
"subscribers_count": 4
|
||||||
}
|
}
|
||||||
|
|
|
@ -45,10 +45,10 @@
|
||||||
"description": "PoC for Nginx 0.6.18 - 1.20.0 Memory Overwrite Vulnerability CVE-2021-23017",
|
"description": "PoC for Nginx 0.6.18 - 1.20.0 Memory Overwrite Vulnerability CVE-2021-23017",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-06-30T04:39:58Z",
|
"created_at": "2022-06-30T04:39:58Z",
|
||||||
"updated_at": "2024-12-25T00:20:37Z",
|
"updated_at": "2025-01-06T23:20:07Z",
|
||||||
"pushed_at": "2023-11-12T16:29:03Z",
|
"pushed_at": "2023-11-12T16:29:03Z",
|
||||||
"stargazers_count": 100,
|
"stargazers_count": 101,
|
||||||
"watchers_count": 100,
|
"watchers_count": 101,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 21,
|
"forks_count": 21,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -60,7 +60,7 @@
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 21,
|
"forks": 21,
|
||||||
"watchers": 100,
|
"watchers": 101,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 3
|
"subscribers_count": 3
|
||||||
},
|
},
|
||||||
|
|
|
@ -29,36 +29,5 @@
|
||||||
"watchers": 3,
|
"watchers": 3,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 2
|
"subscribers_count": 2
|
||||||
},
|
|
||||||
{
|
|
||||||
"id": 912935660,
|
|
||||||
"name": "CVE-2021-26828",
|
|
||||||
"full_name": "voidvxvt\/CVE-2021-26828",
|
|
||||||
"owner": {
|
|
||||||
"login": "voidvxvt",
|
|
||||||
"id": 86536790,
|
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86536790?v=4",
|
|
||||||
"html_url": "https:\/\/github.com\/voidvxvt",
|
|
||||||
"user_view_type": "public"
|
|
||||||
},
|
|
||||||
"html_url": "https:\/\/github.com\/voidvxvt\/CVE-2021-26828",
|
|
||||||
"description": "python3 port of https:\/\/github.com\/hev0x\/CVE-2021-26828_ScadaBR_RCE\/blob\/main\/LinScada_RCE.py",
|
|
||||||
"fork": false,
|
|
||||||
"created_at": "2025-01-06T17:38:19Z",
|
|
||||||
"updated_at": "2025-01-06T17:40:18Z",
|
|
||||||
"pushed_at": "2025-01-06T17:40:15Z",
|
|
||||||
"stargazers_count": 0,
|
|
||||||
"watchers_count": 0,
|
|
||||||
"has_discussions": false,
|
|
||||||
"forks_count": 0,
|
|
||||||
"allow_forking": true,
|
|
||||||
"is_template": false,
|
|
||||||
"web_commit_signoff_required": false,
|
|
||||||
"topics": [],
|
|
||||||
"visibility": "public",
|
|
||||||
"forks": 0,
|
|
||||||
"watchers": 0,
|
|
||||||
"score": 0,
|
|
||||||
"subscribers_count": 0
|
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -12768,7 +12768,7 @@
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2025-01-03T10:15:17Z",
|
"created_at": "2025-01-03T10:15:17Z",
|
||||||
"updated_at": "2025-01-03T10:15:21Z",
|
"updated_at": "2025-01-03T10:15:21Z",
|
||||||
"pushed_at": "2025-01-03T16:36:23Z",
|
"pushed_at": "2025-01-06T19:10:53Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 0,
|
||||||
"watchers_count": 0,
|
"watchers_count": 0,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
|
|
|
@ -29,5 +29,36 @@
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": 448068658,
|
||||||
|
"name": "CVE-2021-46069",
|
||||||
|
"full_name": "plsanu\/CVE-2021-46069",
|
||||||
|
"owner": {
|
||||||
|
"login": "plsanu",
|
||||||
|
"id": 61007700,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/plsanu",
|
||||||
|
"user_view_type": "public"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/plsanu\/CVE-2021-46069",
|
||||||
|
"description": "CVE-2021-46069 - A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Mechanic List Section in login panel.",
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2022-01-14T18:27:00Z",
|
||||||
|
"updated_at": "2023-12-30T08:24:23Z",
|
||||||
|
"pushed_at": "2022-01-14T18:27:27Z",
|
||||||
|
"stargazers_count": 1,
|
||||||
|
"watchers_count": 1,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 1,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -2897,5 +2897,36 @@
|
||||||
"watchers": 0,
|
"watchers": 0,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": 913058800,
|
||||||
|
"name": "CTF-CVE-2022-0847",
|
||||||
|
"full_name": "JustinYe377\/CTF-CVE-2022-0847",
|
||||||
|
"owner": {
|
||||||
|
"login": "JustinYe377",
|
||||||
|
"id": 97569874,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97569874?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/JustinYe377",
|
||||||
|
"user_view_type": "public"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/JustinYe377\/CTF-CVE-2022-0847",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2025-01-07T00:25:12Z",
|
||||||
|
"updated_at": "2025-01-07T00:25:13Z",
|
||||||
|
"pushed_at": "2025-01-07T00:25:13Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -14,12 +14,12 @@
|
||||||
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
|
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2022-02-08T17:25:44Z",
|
"created_at": "2022-02-08T17:25:44Z",
|
||||||
"updated_at": "2024-12-29T06:32:48Z",
|
"updated_at": "2025-01-06T20:22:58Z",
|
||||||
"pushed_at": "2022-02-09T16:54:09Z",
|
"pushed_at": "2022-02-09T16:54:09Z",
|
||||||
"stargazers_count": 777,
|
"stargazers_count": 778,
|
||||||
"watchers_count": 777,
|
"watchers_count": 778,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 158,
|
"forks_count": 159,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
|
@ -28,8 +28,8 @@
|
||||||
"cve-2022-22718"
|
"cve-2022-22718"
|
||||||
],
|
],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 158,
|
"forks": 159,
|
||||||
"watchers": 777,
|
"watchers": 778,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 15
|
"subscribers_count": 15
|
||||||
}
|
}
|
||||||
|
|
|
@ -107,10 +107,10 @@
|
||||||
"description": "CVE-2023-0386 analysis and Exp",
|
"description": "CVE-2023-0386 analysis and Exp",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-05-06T06:07:23Z",
|
"created_at": "2023-05-06T06:07:23Z",
|
||||||
"updated_at": "2024-11-19T09:49:23Z",
|
"updated_at": "2025-01-07T00:20:14Z",
|
||||||
"pushed_at": "2023-05-06T06:19:25Z",
|
"pushed_at": "2023-05-06T06:19:25Z",
|
||||||
"stargazers_count": 117,
|
"stargazers_count": 118,
|
||||||
"watchers_count": 117,
|
"watchers_count": 118,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 21,
|
"forks_count": 21,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -119,7 +119,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 21,
|
"forks": 21,
|
||||||
"watchers": 117,
|
"watchers": 118,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 4
|
"subscribers_count": 4
|
||||||
},
|
},
|
||||||
|
|
|
@ -383,5 +383,36 @@
|
||||||
"watchers": 1,
|
"watchers": 1,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": 912981235,
|
||||||
|
"name": "CVE-2023-41425",
|
||||||
|
"full_name": "samu21req\/CVE-2023-41425",
|
||||||
|
"owner": {
|
||||||
|
"login": "samu21req",
|
||||||
|
"id": 61760887,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61760887?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/samu21req",
|
||||||
|
"user_view_type": "public"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/samu21req\/CVE-2023-41425",
|
||||||
|
"description": null,
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2025-01-06T19:38:36Z",
|
||||||
|
"updated_at": "2025-01-06T19:44:38Z",
|
||||||
|
"pushed_at": "2025-01-06T19:44:35Z",
|
||||||
|
"stargazers_count": 0,
|
||||||
|
"watchers_count": 0,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 0,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "CVE-2023-41892 - Craft CMS Remote Code Execution (RCE)",
|
"description": "CVE-2023-41892 - Craft CMS Remote Code Execution (RCE)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2023-10-06T01:40:34Z",
|
"created_at": "2023-10-06T01:40:34Z",
|
||||||
"updated_at": "2024-09-27T09:59:05Z",
|
"updated_at": "2025-01-06T20:18:22Z",
|
||||||
"pushed_at": "2023-10-07T03:26:00Z",
|
"pushed_at": "2023-10-07T03:26:00Z",
|
||||||
"stargazers_count": 5,
|
"stargazers_count": 4,
|
||||||
"watchers_count": 5,
|
"watchers_count": 4,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 2,
|
"forks_count": 2,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 2,
|
"forks": 2,
|
||||||
"watchers": 5,
|
"watchers": 4,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-01-16T06:52:02Z",
|
"created_at": "2024-01-16T06:52:02Z",
|
||||||
"updated_at": "2025-01-06T08:21:21Z",
|
"updated_at": "2025-01-06T23:35:29Z",
|
||||||
"pushed_at": "2024-08-18T08:26:46Z",
|
"pushed_at": "2024-08-18T08:26:46Z",
|
||||||
"stargazers_count": 1362,
|
"stargazers_count": 1364,
|
||||||
"watchers_count": 1362,
|
"watchers_count": 1364,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 230,
|
"forks_count": 230,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 230,
|
"forks": 230,
|
||||||
"watchers": 1362,
|
"watchers": 1364,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 21
|
"subscribers_count": 21
|
||||||
},
|
},
|
||||||
|
|
|
@ -2,20 +2,20 @@
|
||||||
{
|
{
|
||||||
"id": 912223220,
|
"id": 912223220,
|
||||||
"name": "CVE-2023-6931",
|
"name": "CVE-2023-6931",
|
||||||
"full_name": "jungju817\/CVE-2023-6931",
|
"full_name": "K0n9-log\/CVE-2023-6931",
|
||||||
"owner": {
|
"owner": {
|
||||||
"login": "jungju817",
|
"login": "K0n9-log",
|
||||||
"id": 102219883,
|
"id": 102219883,
|
||||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102219883?v=4",
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102219883?v=4",
|
||||||
"html_url": "https:\/\/github.com\/jungju817",
|
"html_url": "https:\/\/github.com\/K0n9-log",
|
||||||
"user_view_type": "public"
|
"user_view_type": "public"
|
||||||
},
|
},
|
||||||
"html_url": "https:\/\/github.com\/jungju817\/CVE-2023-6931",
|
"html_url": "https:\/\/github.com\/K0n9-log\/CVE-2023-6931",
|
||||||
"description": "CVE-2023-6931 kernel panic PoC",
|
"description": "CVE-2023-6931 kernel panic PoC",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2025-01-05T00:28:28Z",
|
"created_at": "2025-01-05T00:28:28Z",
|
||||||
"updated_at": "2025-01-05T02:07:34Z",
|
"updated_at": "2025-01-06T19:31:39Z",
|
||||||
"pushed_at": "2025-01-05T02:07:31Z",
|
"pushed_at": "2025-01-06T19:31:35Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 0,
|
||||||
"watchers_count": 0,
|
"watchers_count": 0,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
|
|
|
@ -45,10 +45,10 @@
|
||||||
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
|
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-06-18T12:30:53Z",
|
"created_at": "2024-06-18T12:30:53Z",
|
||||||
"updated_at": "2025-01-06T13:26:15Z",
|
"updated_at": "2025-01-06T23:24:13Z",
|
||||||
"pushed_at": "2024-12-02T06:29:52Z",
|
"pushed_at": "2024-12-02T06:29:52Z",
|
||||||
"stargazers_count": 269,
|
"stargazers_count": 270,
|
||||||
"watchers_count": 269,
|
"watchers_count": 270,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 62,
|
"forks_count": 62,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -57,7 +57,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 62,
|
"forks": 62,
|
||||||
"watchers": 269,
|
"watchers": 270,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 7
|
"subscribers_count": 7
|
||||||
},
|
},
|
||||||
|
@ -297,10 +297,10 @@
|
||||||
"description": "PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from adb to installed app",
|
"description": "PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from adb to installed app",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-09-27T09:02:08Z",
|
"created_at": "2024-09-27T09:02:08Z",
|
||||||
"updated_at": "2025-01-06T12:27:07Z",
|
"updated_at": "2025-01-06T21:27:29Z",
|
||||||
"pushed_at": "2024-09-30T12:48:08Z",
|
"pushed_at": "2024-09-30T12:48:08Z",
|
||||||
"stargazers_count": 132,
|
"stargazers_count": 133,
|
||||||
"watchers_count": 132,
|
"watchers_count": 133,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 17,
|
"forks_count": 17,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -309,7 +309,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 17,
|
"forks": 17,
|
||||||
"watchers": 132,
|
"watchers": 133,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 3
|
"subscribers_count": 3
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,7 +14,7 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2025-01-04T14:47:09Z",
|
"created_at": "2025-01-04T14:47:09Z",
|
||||||
"updated_at": "2025-01-04T14:58:28Z",
|
"updated_at": "2025-01-07T00:35:54Z",
|
||||||
"pushed_at": "2025-01-04T14:58:25Z",
|
"pushed_at": "2025-01-04T14:58:25Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 0,
|
||||||
"watchers_count": 0,
|
"watchers_count": 0,
|
||||||
|
|
|
@ -170,5 +170,36 @@
|
||||||
"watchers": 2,
|
"watchers": 2,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"id": 912544022,
|
||||||
|
"name": "CVE-2024-25641",
|
||||||
|
"full_name": "D3Ext\/CVE-2024-25641",
|
||||||
|
"owner": {
|
||||||
|
"login": "D3Ext",
|
||||||
|
"id": 67125397,
|
||||||
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67125397?v=4",
|
||||||
|
"html_url": "https:\/\/github.com\/D3Ext",
|
||||||
|
"user_view_type": "public"
|
||||||
|
},
|
||||||
|
"html_url": "https:\/\/github.com\/D3Ext\/CVE-2024-25641",
|
||||||
|
"description": "POC exploit for CVE-2024-25641",
|
||||||
|
"fork": false,
|
||||||
|
"created_at": "2025-01-05T21:33:18Z",
|
||||||
|
"updated_at": "2025-01-06T22:33:40Z",
|
||||||
|
"pushed_at": "2025-01-06T18:50:17Z",
|
||||||
|
"stargazers_count": 1,
|
||||||
|
"watchers_count": 1,
|
||||||
|
"has_discussions": false,
|
||||||
|
"forks_count": 0,
|
||||||
|
"allow_forking": true,
|
||||||
|
"is_template": false,
|
||||||
|
"web_commit_signoff_required": false,
|
||||||
|
"topics": [],
|
||||||
|
"visibility": "public",
|
||||||
|
"forks": 0,
|
||||||
|
"watchers": 1,
|
||||||
|
"score": 0,
|
||||||
|
"subscribers_count": 0
|
||||||
}
|
}
|
||||||
]
|
]
|
|
@ -76,8 +76,8 @@
|
||||||
"description": "CVE-2024-28987 Scanner & Exploiter - SolarWinds Web Help Desk",
|
"description": "CVE-2024-28987 Scanner & Exploiter - SolarWinds Web Help Desk",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-09-30T16:12:14Z",
|
"created_at": "2024-09-30T16:12:14Z",
|
||||||
"updated_at": "2024-12-23T19:58:15Z",
|
"updated_at": "2025-01-06T20:50:26Z",
|
||||||
"pushed_at": "2024-12-23T19:58:11Z",
|
"pushed_at": "2025-01-06T20:50:22Z",
|
||||||
"stargazers_count": 1,
|
"stargazers_count": 1,
|
||||||
"watchers_count": 1,
|
"watchers_count": 1,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
|
|
|
@ -14,19 +14,19 @@
|
||||||
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113",
|
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2025-01-01T15:48:38Z",
|
"created_at": "2025-01-01T15:48:38Z",
|
||||||
"updated_at": "2025-01-06T17:18:21Z",
|
"updated_at": "2025-01-06T21:56:41Z",
|
||||||
"pushed_at": "2025-01-02T16:07:23Z",
|
"pushed_at": "2025-01-02T16:07:23Z",
|
||||||
"stargazers_count": 364,
|
"stargazers_count": 366,
|
||||||
"watchers_count": 364,
|
"watchers_count": 366,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 85,
|
"forks_count": 86,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
"is_template": false,
|
"is_template": false,
|
||||||
"web_commit_signoff_required": false,
|
"web_commit_signoff_required": false,
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 85,
|
"forks": 86,
|
||||||
"watchers": 364,
|
"watchers": 366,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 3
|
"subscribers_count": 3
|
||||||
},
|
},
|
||||||
|
|
|
@ -200,10 +200,10 @@
|
||||||
"description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp",
|
"description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-12-23T07:20:47Z",
|
"created_at": "2024-12-23T07:20:47Z",
|
||||||
"updated_at": "2025-01-06T09:45:01Z",
|
"updated_at": "2025-01-06T20:17:42Z",
|
||||||
"pushed_at": "2024-12-23T07:30:27Z",
|
"pushed_at": "2024-12-23T07:30:27Z",
|
||||||
"stargazers_count": 61,
|
"stargazers_count": 62,
|
||||||
"watchers_count": 61,
|
"watchers_count": 62,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 15,
|
"forks_count": 15,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -212,7 +212,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 15,
|
"forks": 15,
|
||||||
"watchers": 61,
|
"watchers": 62,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 3
|
"subscribers_count": 3
|
||||||
},
|
},
|
||||||
|
|
|
@ -14,10 +14,10 @@
|
||||||
"description": "A tool to exploit the CVE-2024-56512 vulnerability in Apache NiFi, which allows unauthorized access to sensitive data through improperly secured APIs.",
|
"description": "A tool to exploit the CVE-2024-56512 vulnerability in Apache NiFi, which allows unauthorized access to sensitive data through improperly secured APIs.",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2025-01-06T17:35:33Z",
|
"created_at": "2025-01-06T17:35:33Z",
|
||||||
"updated_at": "2025-01-06T17:51:41Z",
|
"updated_at": "2025-01-06T23:11:22Z",
|
||||||
"pushed_at": "2025-01-06T17:51:38Z",
|
"pushed_at": "2025-01-06T17:51:38Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 1,
|
||||||
"watchers_count": 0,
|
"watchers_count": 1,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 0,
|
"forks_count": 0,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -26,7 +26,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 0,
|
"forks": 0,
|
||||||
"watchers": 0,
|
"watchers": 1,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 0
|
"subscribers_count": 0
|
||||||
}
|
}
|
||||||
|
|
|
@ -2180,10 +2180,10 @@
|
||||||
"description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)",
|
"description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)",
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2024-07-08T11:27:49Z",
|
"created_at": "2024-07-08T11:27:49Z",
|
||||||
"updated_at": "2024-12-29T22:55:53Z",
|
"updated_at": "2025-01-06T19:43:51Z",
|
||||||
"pushed_at": "2024-08-22T08:50:25Z",
|
"pushed_at": "2024-08-22T08:50:25Z",
|
||||||
"stargazers_count": 63,
|
"stargazers_count": 65,
|
||||||
"watchers_count": 63,
|
"watchers_count": 65,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 29,
|
"forks_count": 29,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -2192,7 +2192,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 29,
|
"forks": 29,
|
||||||
"watchers": 63,
|
"watchers": 65,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 3
|
"subscribers_count": 3
|
||||||
},
|
},
|
||||||
|
@ -2931,10 +2931,10 @@
|
||||||
"description": null,
|
"description": null,
|
||||||
"fork": false,
|
"fork": false,
|
||||||
"created_at": "2025-01-04T00:25:33Z",
|
"created_at": "2025-01-04T00:25:33Z",
|
||||||
"updated_at": "2025-01-04T00:37:18Z",
|
"updated_at": "2025-01-07T00:11:11Z",
|
||||||
"pushed_at": "2025-01-04T00:37:14Z",
|
"pushed_at": "2025-01-04T00:37:14Z",
|
||||||
"stargazers_count": 0,
|
"stargazers_count": 3,
|
||||||
"watchers_count": 0,
|
"watchers_count": 3,
|
||||||
"has_discussions": false,
|
"has_discussions": false,
|
||||||
"forks_count": 1,
|
"forks_count": 1,
|
||||||
"allow_forking": true,
|
"allow_forking": true,
|
||||||
|
@ -2943,7 +2943,7 @@
|
||||||
"topics": [],
|
"topics": [],
|
||||||
"visibility": "public",
|
"visibility": "public",
|
||||||
"forks": 1,
|
"forks": 1,
|
||||||
"watchers": 0,
|
"watchers": 3,
|
||||||
"score": 0,
|
"score": 0,
|
||||||
"subscribers_count": 1
|
"subscribers_count": 1
|
||||||
}
|
}
|
||||||
|
|
21
README.md
21
README.md
|
@ -3864,6 +3864,7 @@
|
||||||
- [Safarchand/CVE-2024-25641](https://github.com/Safarchand/CVE-2024-25641)
|
- [Safarchand/CVE-2024-25641](https://github.com/Safarchand/CVE-2024-25641)
|
||||||
- [StopThatTalace/CVE-2024-25641-CACTI-RCE-1.2.26](https://github.com/StopThatTalace/CVE-2024-25641-CACTI-RCE-1.2.26)
|
- [StopThatTalace/CVE-2024-25641-CACTI-RCE-1.2.26](https://github.com/StopThatTalace/CVE-2024-25641-CACTI-RCE-1.2.26)
|
||||||
- [XiaomingX/cve-2024-25641-poc](https://github.com/XiaomingX/cve-2024-25641-poc)
|
- [XiaomingX/cve-2024-25641-poc](https://github.com/XiaomingX/cve-2024-25641-poc)
|
||||||
|
- [D3Ext/CVE-2024-25641](https://github.com/D3Ext/CVE-2024-25641)
|
||||||
|
|
||||||
### CVE-2024-25723 (2024-02-27)
|
### CVE-2024-25723 (2024-02-27)
|
||||||
|
|
||||||
|
@ -6846,7 +6847,11 @@
|
||||||
|
|
||||||
- [ooooooo-q/puma_header_normalization-CVE-2024-45614](https://github.com/ooooooo-q/puma_header_normalization-CVE-2024-45614)
|
- [ooooooo-q/puma_header_normalization-CVE-2024-45614](https://github.com/ooooooo-q/puma_header_normalization-CVE-2024-45614)
|
||||||
|
|
||||||
### CVE-2024-46209
|
### CVE-2024-46209 (2025-01-06)
|
||||||
|
|
||||||
|
<code>A stored cross-site scripting (XSS) vulnerability in the component /media/test.html of REDAXO CMS v5.17.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the password parameter.
|
||||||
|
</code>
|
||||||
|
|
||||||
- [h4ckr4v3n/CVE-2024-46209](https://github.com/h4ckr4v3n/CVE-2024-46209)
|
- [h4ckr4v3n/CVE-2024-46209](https://github.com/h4ckr4v3n/CVE-2024-46209)
|
||||||
|
|
||||||
### CVE-2024-46256 (2024-09-27)
|
### CVE-2024-46256 (2024-09-27)
|
||||||
|
@ -9545,7 +9550,7 @@
|
||||||
<code>A heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component can be exploited to achieve local privilege escalation.\n\nA perf_event's read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group().\n\nWe recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b.\n\n
|
<code>A heap out-of-bounds write vulnerability in the Linux kernel's Performance Events system component can be exploited to achieve local privilege escalation.\n\nA perf_event's read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group().\n\nWe recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b.\n\n
|
||||||
</code>
|
</code>
|
||||||
|
|
||||||
- [jungju817/CVE-2023-6931](https://github.com/jungju817/CVE-2023-6931)
|
- [K0n9-log/CVE-2023-6931](https://github.com/K0n9-log/CVE-2023-6931)
|
||||||
|
|
||||||
### CVE-2023-6933 (2024-02-05)
|
### CVE-2023-6933 (2024-02-05)
|
||||||
|
|
||||||
|
@ -14186,6 +14191,7 @@
|
||||||
- [Diegomjx/CVE-2023-41425-WonderCMS-Authenticated-RCE](https://github.com/Diegomjx/CVE-2023-41425-WonderCMS-Authenticated-RCE)
|
- [Diegomjx/CVE-2023-41425-WonderCMS-Authenticated-RCE](https://github.com/Diegomjx/CVE-2023-41425-WonderCMS-Authenticated-RCE)
|
||||||
- [0x0d3ad/CVE-2023-41425](https://github.com/0x0d3ad/CVE-2023-41425)
|
- [0x0d3ad/CVE-2023-41425](https://github.com/0x0d3ad/CVE-2023-41425)
|
||||||
- [xpltive/CVE-2023-41425](https://github.com/xpltive/CVE-2023-41425)
|
- [xpltive/CVE-2023-41425](https://github.com/xpltive/CVE-2023-41425)
|
||||||
|
- [samu21req/CVE-2023-41425](https://github.com/samu21req/CVE-2023-41425)
|
||||||
|
|
||||||
### CVE-2023-41436 (2023-09-15)
|
### CVE-2023-41436 (2023-09-15)
|
||||||
|
|
||||||
|
@ -16824,6 +16830,7 @@
|
||||||
- [xsxtw/CVE-2022-0847](https://github.com/xsxtw/CVE-2022-0847)
|
- [xsxtw/CVE-2022-0847](https://github.com/xsxtw/CVE-2022-0847)
|
||||||
- [muhammad1596/CVE-2022-0847-dirty-pipe-checker](https://github.com/muhammad1596/CVE-2022-0847-dirty-pipe-checker)
|
- [muhammad1596/CVE-2022-0847-dirty-pipe-checker](https://github.com/muhammad1596/CVE-2022-0847-dirty-pipe-checker)
|
||||||
- [muhammad1596/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/muhammad1596/CVE-2022-0847-DirtyPipe-Exploits)
|
- [muhammad1596/CVE-2022-0847-DirtyPipe-Exploits](https://github.com/muhammad1596/CVE-2022-0847-DirtyPipe-Exploits)
|
||||||
|
- [JustinYe377/CTF-CVE-2022-0847](https://github.com/JustinYe377/CTF-CVE-2022-0847)
|
||||||
|
|
||||||
### CVE-2022-0848 (2022-03-04)
|
### CVE-2022-0848 (2022-03-04)
|
||||||
|
|
||||||
|
@ -25887,7 +25894,6 @@
|
||||||
</code>
|
</code>
|
||||||
|
|
||||||
- [hev0x/CVE-2021-26828_ScadaBR_RCE](https://github.com/hev0x/CVE-2021-26828_ScadaBR_RCE)
|
- [hev0x/CVE-2021-26828_ScadaBR_RCE](https://github.com/hev0x/CVE-2021-26828_ScadaBR_RCE)
|
||||||
- [voidvxvt/CVE-2021-26828](https://github.com/voidvxvt/CVE-2021-26828)
|
|
||||||
|
|
||||||
### CVE-2021-26832 (2021-04-14)
|
### CVE-2021-26832 (2021-04-14)
|
||||||
|
|
||||||
|
@ -26056,7 +26062,11 @@
|
||||||
|
|
||||||
- [synacktiv/CVE-2021-27246_Pwn2Own2020](https://github.com/synacktiv/CVE-2021-27246_Pwn2Own2020)
|
- [synacktiv/CVE-2021-27246_Pwn2Own2020](https://github.com/synacktiv/CVE-2021-27246_Pwn2Own2020)
|
||||||
|
|
||||||
### CVE-2021-27285
|
### CVE-2021-27285 (2025-01-06)
|
||||||
|
|
||||||
|
<code>An issue was discovered in Inspur ClusterEngine v4.0 that allows attackers to gain escalated Local privileges and execute arbitrary commands via /opt/tsce4/torque6/bin/getJobsByShell.
|
||||||
|
</code>
|
||||||
|
|
||||||
- [fjh1997/CVE-2021-27285](https://github.com/fjh1997/CVE-2021-27285)
|
- [fjh1997/CVE-2021-27285](https://github.com/fjh1997/CVE-2021-27285)
|
||||||
|
|
||||||
### CVE-2021-27328 (2021-02-19)
|
### CVE-2021-27328 (2021-02-19)
|
||||||
|
@ -29857,6 +29867,7 @@
|
||||||
</code>
|
</code>
|
||||||
|
|
||||||
- [plsanu/Vehicle-Service-Management-System-Mechanic-List-Stored-Cross-Site-Scripting-XSS](https://github.com/plsanu/Vehicle-Service-Management-System-Mechanic-List-Stored-Cross-Site-Scripting-XSS)
|
- [plsanu/Vehicle-Service-Management-System-Mechanic-List-Stored-Cross-Site-Scripting-XSS](https://github.com/plsanu/Vehicle-Service-Management-System-Mechanic-List-Stored-Cross-Site-Scripting-XSS)
|
||||||
|
- [plsanu/CVE-2021-46069](https://github.com/plsanu/CVE-2021-46069)
|
||||||
|
|
||||||
### CVE-2021-46070 (2022-01-06)
|
### CVE-2021-46070 (2022-01-06)
|
||||||
|
|
||||||
|
@ -35198,6 +35209,7 @@
|
||||||
- [X0UCYB3R/Check-WP-CVE-2020-35489](https://github.com/X0UCYB3R/Check-WP-CVE-2020-35489)
|
- [X0UCYB3R/Check-WP-CVE-2020-35489](https://github.com/X0UCYB3R/Check-WP-CVE-2020-35489)
|
||||||
- [reneoliveirajr/wp_CVE-2020-35489_checker](https://github.com/reneoliveirajr/wp_CVE-2020-35489_checker)
|
- [reneoliveirajr/wp_CVE-2020-35489_checker](https://github.com/reneoliveirajr/wp_CVE-2020-35489_checker)
|
||||||
- [Cappricio-Securities/CVE-2020-35489](https://github.com/Cappricio-Securities/CVE-2020-35489)
|
- [Cappricio-Securities/CVE-2020-35489](https://github.com/Cappricio-Securities/CVE-2020-35489)
|
||||||
|
- [gh202503/poc-cve-2020-35489](https://github.com/gh202503/poc-cve-2020-35489)
|
||||||
|
|
||||||
### CVE-2020-35498 (2021-02-11)
|
### CVE-2020-35498 (2021-02-11)
|
||||||
|
|
||||||
|
@ -47978,6 +47990,7 @@
|
||||||
|
|
||||||
- [happynote3966/CVE-2014-3704](https://github.com/happynote3966/CVE-2014-3704)
|
- [happynote3966/CVE-2014-3704](https://github.com/happynote3966/CVE-2014-3704)
|
||||||
- [AleDiBen/Drupalgeddon](https://github.com/AleDiBen/Drupalgeddon)
|
- [AleDiBen/Drupalgeddon](https://github.com/AleDiBen/Drupalgeddon)
|
||||||
|
- [RasmusKnothNielsen/Drupalgeddon-Python3](https://github.com/RasmusKnothNielsen/Drupalgeddon-Python3)
|
||||||
|
|
||||||
### CVE-2014-4014 (2014-06-23)
|
### CVE-2014-4014 (2014-06-23)
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue