Auto Update 2021/06/04 00:12:05

This commit is contained in:
motikan2010-bot 2021-06-04 00:12:05 +09:00
parent 1b8c8d95e5
commit bf4bd13168
29 changed files with 254 additions and 116 deletions

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-06-03T08:48:31Z",
"updated_at": "2021-06-03T14:20:31Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1048,
"watchers_count": 1048,
"stargazers_count": 1049,
"watchers_count": 1049,
"forks_count": 234,
"forks": 234,
"watchers": 1048,
"watchers": 1049,
"score": 0
},
{

View file

@ -23,26 +23,26 @@
"score": 0
},
{
"id": 295014591,
"id": 308175941,
"name": "exploit-joomla",
"full_name": "kally-life\/exploit-joomla",
"full_name": "areaventuno\/exploit-joomla",
"owner": {
"login": "kally-life",
"id": 57679174,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57679174?v=4",
"html_url": "https:\/\/github.com\/kally-life"
"login": "areaventuno",
"id": 73592193,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73592193?v=4",
"html_url": "https:\/\/github.com\/areaventuno"
},
"html_url": "https:\/\/github.com\/kally-life\/exploit-joomla",
"html_url": "https:\/\/github.com\/areaventuno\/exploit-joomla",
"description": "Un semplice exploit che sfrutta CVE-2015-7297, CVE-2015-7857 and CVE-2015-7858 per elencare gli utenti con la psw del db",
"fork": false,
"created_at": "2020-09-12T19:44:41Z",
"updated_at": "2020-09-13T18:08:13Z",
"pushed_at": "2020-09-13T18:08:11Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"created_at": "2020-10-29T00:35:35Z",
"updated_at": "2021-06-03T13:29:34Z",
"pushed_at": "2020-09-13T18:01:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-06-03T08:48:31Z",
"updated_at": "2021-06-03T14:20:31Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1048,
"watchers_count": 1048,
"stargazers_count": 1049,
"watchers_count": 1049,
"forks_count": 234,
"forks": 234,
"watchers": 1048,
"watchers": 1049,
"score": 0
},
{

View file

@ -109,8 +109,8 @@
"pushed_at": "2017-05-19T12:57:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "CVE-2017-0144",
"fork": false,
"created_at": "2019-06-02T03:41:47Z",
"updated_at": "2021-03-17T09:29:07Z",
"updated_at": "2021-06-03T12:27:46Z",
"pushed_at": "2019-06-02T03:51:12Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 0,
"score": 0
},
{

View file

@ -105,13 +105,13 @@
"description": "CVE-2017-11882 Exploit accepts over 17k bytes long command\/code in maximum.",
"fork": false,
"created_at": "2017-11-21T15:22:41Z",
"updated_at": "2021-06-01T12:58:46Z",
"updated_at": "2021-06-03T13:05:09Z",
"pushed_at": "2017-12-06T12:47:31Z",
"stargazers_count": 282,
"watchers_count": 282,
"stargazers_count": 283,
"watchers_count": 283,
"forks_count": 84,
"forks": 84,
"watchers": 282,
"watchers": 283,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-06-03T08:48:31Z",
"updated_at": "2021-06-03T14:20:31Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1048,
"watchers_count": 1048,
"stargazers_count": 1049,
"watchers_count": 1049,
"forks_count": 234,
"forks": 234,
"watchers": 1048,
"watchers": 1049,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Joomla 3.7 SQL injection (CVE-2017-8917)",
"fork": false,
"created_at": "2017-05-19T15:21:46Z",
"updated_at": "2021-02-28T21:11:38Z",
"updated_at": "2021-06-03T12:54:34Z",
"pushed_at": "2017-05-19T15:30:18Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 3,
"forks": 3,
"watchers": 9,
"watchers": 8,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "POC CVE-2018-14714",
"fork": false,
"created_at": "2020-04-25T03:43:44Z",
"updated_at": "2021-02-13T16:18:17Z",
"updated_at": "2021-06-03T11:34:48Z",
"pushed_at": "2021-02-13T16:18:15Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 0,
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0
}
]

View file

@ -450,13 +450,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-06-03T08:48:31Z",
"updated_at": "2021-06-03T14:20:31Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1048,
"watchers_count": 1048,
"stargazers_count": 1049,
"watchers_count": 1049,
"forks_count": 234,
"forks": 234,
"watchers": 1048,
"watchers": 1049,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2021-06-03T08:32:03Z",
"updated_at": "2021-06-03T12:29:14Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 426,
"watchers_count": 426,
"stargazers_count": 427,
"watchers_count": 427,
"forks_count": 100,
"forks": 100,
"watchers": 426,
"watchers": 427,
"score": 0
}
]

View file

@ -454,8 +454,8 @@
"pushed_at": "2020-08-31T14:52:37Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,
"forks": 3,
"forks_count": 4,
"forks": 4,
"watchers": 4,
"score": 0
},

View file

@ -684,8 +684,8 @@
"pushed_at": "2020-03-25T05:07:43Z",
"stargazers_count": 84,
"watchers_count": 84,
"forks_count": 20,
"forks": 20,
"forks_count": 21,
"forks": 21,
"watchers": 84,
"score": 0
},

View file

@ -151,13 +151,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-06-03T08:48:31Z",
"updated_at": "2021-06-03T14:20:31Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1048,
"watchers_count": 1048,
"stargazers_count": 1049,
"watchers_count": 1049,
"forks_count": 234,
"forks": 234,
"watchers": 1048,
"watchers": 1049,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "CVE-2020-0022 vulnerability exploitation on Bouygues BBox Miami (Android TV 8.0 - ARM32 Cortex A9)",
"fork": false,
"created_at": "2020-08-24T19:33:10Z",
"updated_at": "2021-06-01T08:38:51Z",
"updated_at": "2021-06-03T14:46:00Z",
"pushed_at": "2021-03-21T20:59:46Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 6,
"forks": 6,
"watchers": 17,
"watchers": 18,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "GitLab 12.9.0 Arbitrary File Read ",
"fork": false,
"created_at": "2020-11-20T15:40:03Z",
"updated_at": "2021-05-25T06:13:30Z",
"updated_at": "2021-06-03T09:51:06Z",
"pushed_at": "2021-04-23T19:21:16Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 18,
"forks": 18,
"watchers": 44,
"watchers": 45,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2021-06-02T15:28:47Z",
"updated_at": "2021-06-03T12:23:21Z",
"pushed_at": "2020-10-21T12:10:28Z",
"stargazers_count": 1289,
"watchers_count": 1289,
"stargazers_count": 1288,
"watchers_count": 1288,
"forks_count": 293,
"forks": 293,
"watchers": 1289,
"watchers": 1288,
"score": 0
},
{
@ -105,13 +105,13 @@
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
"fork": false,
"created_at": "2020-09-14T16:57:49Z",
"updated_at": "2021-06-01T23:10:43Z",
"updated_at": "2021-06-03T11:57:59Z",
"pushed_at": "2020-11-05T16:37:20Z",
"stargazers_count": 209,
"watchers_count": 209,
"stargazers_count": 210,
"watchers_count": 210,
"forks_count": 40,
"forks": 40,
"watchers": 209,
"watchers": 210,
"score": 0
},
{

25
2020/CVE-2020-24949.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 373457880,
"name": "CVE-2020-24949",
"full_name": "r90tpass\/CVE-2020-24949",
"owner": {
"login": "r90tpass",
"id": 82740056,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82740056?v=4",
"html_url": "https:\/\/github.com\/r90tpass"
},
"html_url": "https:\/\/github.com\/r90tpass\/CVE-2020-24949",
"description": "PHPFusion 9.03.50 - Remote Code Execution",
"fork": false,
"created_at": "2021-06-03T09:49:22Z",
"updated_at": "2021-06-03T09:50:31Z",
"pushed_at": "2021-06-03T09:50:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-06-03T08:48:31Z",
"updated_at": "2021-06-03T14:20:31Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1048,
"watchers_count": 1048,
"stargazers_count": 1049,
"watchers_count": 1049,
"forks_count": 234,
"forks": 234,
"watchers": 1048,
"watchers": 1049,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC DoS CVE-2020-36109",
"fork": false,
"created_at": "2021-02-13T16:03:36Z",
"updated_at": "2021-02-15T09:25:48Z",
"updated_at": "2021-06-03T11:33:50Z",
"pushed_at": "2021-02-15T09:25:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -113,5 +113,28 @@
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 373481625,
"name": "CVE-2020-7471-Django",
"full_name": "huzaifakhan771\/CVE-2020-7471-Django",
"owner": {
"login": "huzaifakhan771",
"id": 56702423,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56702423?v=4",
"html_url": "https:\/\/github.com\/huzaifakhan771"
},
"html_url": "https:\/\/github.com\/huzaifakhan771\/CVE-2020-7471-Django",
"description": "PoC for the SQL injection vulnerability in PostgreSQL with Django, found in Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3",
"fork": false,
"created_at": "2021-06-03T11:21:27Z",
"updated_at": "2021-06-03T11:37:30Z",
"pushed_at": "2021-06-03T11:37:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -79,11 +79,11 @@
"html_url": "https:\/\/github.com\/mathisvickie"
},
"html_url": "https:\/\/github.com\/mathisvickie\/CVE-2021-21551",
"description": "CVE-2021-21551 local privilege escalation to nt authority\/system",
"description": "arbitrary kernel read\/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority\/system",
"fork": false,
"created_at": "2021-05-30T10:15:10Z",
"updated_at": "2021-06-01T17:51:31Z",
"pushed_at": "2021-05-31T13:05:24Z",
"updated_at": "2021-06-03T13:01:07Z",
"pushed_at": "2021-06-03T14:47:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2021-05-29T13:07:14Z",
"updated_at": "2021-06-03T07:53:34Z",
"pushed_at": "2021-05-31T06:14:36Z",
"stargazers_count": 80,
"watchers_count": 80,
"updated_at": "2021-06-03T10:19:10Z",
"pushed_at": "2021-06-03T10:04:41Z",
"stargazers_count": 82,
"watchers_count": 82,
"forks_count": 17,
"forks": 17,
"watchers": 80,
"watchers": 82,
"score": 0
},
{
@ -90,5 +90,51 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 373460655,
"name": "CVE-2021-21985",
"full_name": "r0ckysec\/CVE-2021-21985",
"owner": {
"login": "r0ckysec",
"id": 44518337,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44518337?v=4",
"html_url": "https:\/\/github.com\/r0ckysec"
},
"html_url": "https:\/\/github.com\/r0ckysec\/CVE-2021-21985",
"description": "CVE-2021-21985 vmware vcenter 远程代码执行 EXP",
"fork": false,
"created_at": "2021-06-03T09:59:21Z",
"updated_at": "2021-06-03T14:42:51Z",
"pushed_at": "2021-06-03T11:07:53Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 373496154,
"name": "cve-2021-21985_exp",
"full_name": "xnianq\/cve-2021-21985_exp",
"owner": {
"login": "xnianq",
"id": 17513849,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17513849?v=4",
"html_url": "https:\/\/github.com\/xnianq"
},
"html_url": "https:\/\/github.com\/xnianq\/cve-2021-21985_exp",
"description": "cve-2021-21985 exploit",
"fork": false,
"created_at": "2021-06-03T12:17:06Z",
"updated_at": "2021-06-03T13:43:17Z",
"pushed_at": "2021-06-03T13:43:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.",
"fork": false,
"created_at": "2021-04-07T11:10:40Z",
"updated_at": "2021-06-01T23:23:47Z",
"updated_at": "2021-06-03T12:49:07Z",
"pushed_at": "2021-04-15T12:46:54Z",
"stargazers_count": 172,
"watchers_count": 172,
"stargazers_count": 173,
"watchers_count": 173,
"forks_count": 37,
"forks": 37,
"watchers": 172,
"watchers": 173,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2",
"fork": false,
"created_at": "2021-05-16T01:40:47Z",
"updated_at": "2021-06-02T06:47:25Z",
"updated_at": "2021-06-03T13:09:57Z",
"pushed_at": "2021-05-16T05:54:07Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 8,
"forks": 8,
"watchers": 40,
"watchers": 41,
"score": 0
},
{

25
2021/CVE-2021-27965.json Normal file
View file

@ -0,0 +1,25 @@
[
{
"id": 373502325,
"name": "CVE-2021-27965",
"full_name": "mathisvickie\/CVE-2021-27965",
"owner": {
"login": "mathisvickie",
"id": 60326914,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60326914?v=4",
"html_url": "https:\/\/github.com\/mathisvickie"
},
"html_url": "https:\/\/github.com\/mathisvickie\/CVE-2021-27965",
"description": "stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority\/system",
"fork": false,
"created_at": "2021-06-03T12:39:11Z",
"updated_at": "2021-06-03T14:03:54Z",
"pushed_at": "2021-06-03T13:57:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.",
"fork": false,
"created_at": "2021-05-31T18:02:39Z",
"updated_at": "2021-06-03T07:32:25Z",
"updated_at": "2021-06-03T14:06:06Z",
"pushed_at": "2021-06-01T15:08:23Z",
"stargazers_count": 137,
"watchers_count": 137,
"stargazers_count": 141,
"watchers_count": 141,
"forks_count": 25,
"forks": 25,
"watchers": 137,
"watchers": 141,
"score": 0
},
{
@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2021-06-02T14:50:56Z",
"updated_at": "2021-06-03T06:25:30Z",
"updated_at": "2021-06-03T10:55:55Z",
"pushed_at": "2021-06-02T14:54:14Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
"forks": 1,
"watchers": 4,
"watchers": 6,
"score": 0
}
]

View file

@ -887,13 +887,13 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
"updated_at": "2021-06-01T02:43:38Z",
"updated_at": "2021-06-03T13:27:35Z",
"pushed_at": "2021-05-12T12:01:20Z",
"stargazers_count": 318,
"watchers_count": 318,
"stargazers_count": 319,
"watchers_count": 319,
"forks_count": 54,
"forks": 54,
"watchers": 318,
"watchers": 319,
"score": 0
},
{

View file

@ -528,6 +528,8 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability due to
- [alt3kx/CVE-2021-21985_PoC](https://github.com/alt3kx/CVE-2021-21985_PoC)
- [onSec-fr/CVE-2021-21985-Checker](https://github.com/onSec-fr/CVE-2021-21985-Checker)
- [mauricelambert/CVE-2021-21985](https://github.com/mauricelambert/CVE-2021-21985)
- [r0ckysec/CVE-2021-21985](https://github.com/r0ckysec/CVE-2021-21985)
- [xnianq/cve-2021-21985_exp](https://github.com/xnianq/cve-2021-21985_exp)
### CVE-2021-22192 (2021-03-24)
@ -967,6 +969,14 @@ SonLogger before 6.4.1 is affected by user creation with any user permissions pr
- [erberkan/SonLogger-vulns](https://github.com/erberkan/SonLogger-vulns)
### CVE-2021-27965 (2021-03-04)
<code>
The MsIo64.sys driver before 1.1.19.1016 in MSI Dragon Center before 2.0.98.0 has a buffer overflow that allows privilege escalation via a crafted 0x80102040, 0x80102044, 0x80102050, or 0x80102054 IOCTL request.
</code>
- [mathisvickie/CVE-2021-27965](https://github.com/mathisvickie/CVE-2021-27965)
### CVE-2021-28310 (2021-04-13)
<code>
@ -2518,6 +2528,7 @@ Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL I
- [SNCKER/CVE-2020-7471](https://github.com/SNCKER/CVE-2020-7471)
- [Tempuss/CTF_CVE-2020-7471](https://github.com/Tempuss/CTF_CVE-2020-7471)
- [victomteng1997/cve-2020-7471-Time_Blind_SQLi-](https://github.com/victomteng1997/cve-2020-7471-Time_Blind_SQLi-)
- [huzaifakhan771/CVE-2020-7471-Django](https://github.com/huzaifakhan771/CVE-2020-7471-Django)
### CVE-2020-7473 (2020-05-07)
@ -4664,6 +4675,14 @@ InterMind iMind Server through 3.13.65 allows remote unauthenticated attackers t
- [trump88/CVE-2020-24765](https://github.com/trump88/CVE-2020-24765)
### CVE-2020-24949 (2020-09-03)
<code>
Privilege escalation in PHP-Fusion 9.03.50 downloads/downloads.php allows an authenticated user (not admin) to send a crafted request to the server and perform remote command execution (RCE).
</code>
- [r90tpass/CVE-2020-24949](https://github.com/r90tpass/CVE-2020-24949)
### CVE-2020-24955 (2020-09-01)
<code>
@ -11367,7 +11386,7 @@ Crestron TSW-X60 all versions prior to 2.001.0037.001 and MC3 all versions prior
### CVE-2018-13379 (2019-06-04)
<code>
An Improper Limitation of a Pathname to a Restricted Directory (&quot;Path Traversal&quot;) in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 and 5.4.6 to 5.4.12 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests.
An Improper Limitation of a Pathname to a Restricted Directory (&quot;Path Traversal&quot;) in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 and 5.4.6 to 5.4.12 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests.
</code>
- [milo2012/CVE-2018-13379](https://github.com/milo2012/CVE-2018-13379)
@ -11383,7 +11402,7 @@ An Improper Limitation of a Pathname to a Restricted Directory (&quot;Path Trave
### CVE-2018-13382 (2019-06-04)
<code>
An Improper Authorization vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.8 and 5.4.1 to 5.4.10 under SSL VPN web portal allows an unauthenticated attacker to modify the password of an SSL VPN web portal user via specially crafted HTTP requests.
An Improper Authorization vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.8 and 5.4.1 to 5.4.10 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to modify the password of an SSL VPN web portal user via specially crafted HTTP requests
</code>
- [milo2012/CVE-2018-13382](https://github.com/milo2012/CVE-2018-13382)
@ -16530,7 +16549,7 @@ SQL injection vulnerability in Joomla! 3.2 before 3.4.4 allows remote attackers
</code>
- [CCrashBandicot/ContentHistory](https://github.com/CCrashBandicot/ContentHistory)
- [kally-life/exploit-joomla](https://github.com/kally-life/exploit-joomla)
- [areaventuno/exploit-joomla](https://github.com/areaventuno/exploit-joomla)
### CVE-2015-7501 (2017-11-09)