mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2021/12/15 00:13:47
This commit is contained in:
parent
d2d132b5f8
commit
ca9302db68
24 changed files with 560 additions and 346 deletions
|
@ -25,5 +25,32 @@
|
|||
"forks": 7,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 205628184,
|
||||
"name": "CVE-2006-6184",
|
||||
"full_name": "b03902043\/CVE-2006-6184",
|
||||
"owner": {
|
||||
"login": "b03902043",
|
||||
"id": 9023845,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9023845?v=4",
|
||||
"html_url": "https:\/\/github.com\/b03902043"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/b03902043\/CVE-2006-6184",
|
||||
"description": "simplified version of https:\/\/github.com\/shauntdergrigorian\/cve-2006-6184",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-01T04:18:53Z",
|
||||
"updated_at": "2019-09-01T04:23:25Z",
|
||||
"pushed_at": "2019-09-01T04:23:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -98,10 +98,10 @@
|
|||
"description": ":poodle: Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566 :poodle:",
|
||||
"fork": false,
|
||||
"created_at": "2015-02-03T20:28:27Z",
|
||||
"updated_at": "2021-12-08T06:17:20Z",
|
||||
"updated_at": "2021-12-14T21:00:36Z",
|
||||
"pushed_at": "2020-07-21T09:46:40Z",
|
||||
"stargazers_count": 206,
|
||||
"watchers_count": 206,
|
||||
"stargazers_count": 207,
|
||||
"watchers_count": 207,
|
||||
"forks_count": 65,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -116,7 +116,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 65,
|
||||
"watchers": 206,
|
||||
"watchers": 207,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "MailMasta wordpress plugin Local File Inclusion vulnerability (CVE-2016-10956)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T16:06:46Z",
|
||||
"updated_at": "2021-12-14T17:52:13Z",
|
||||
"pushed_at": "2021-12-14T17:51:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"updated_at": "2021-12-14T21:38:46Z",
|
||||
"pushed_at": "2021-12-14T19:22:18Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -71,12 +71,12 @@
|
|||
"pushed_at": "2021-02-03T16:03:40Z",
|
||||
"stargazers_count": 885,
|
||||
"watchers_count": 885,
|
||||
"forks_count": 409,
|
||||
"forks_count": 410,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 409,
|
||||
"forks": 410,
|
||||
"watchers": 885,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2020-06-11T00:16:40Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"forks_count": 57,
|
||||
"forks_count": 58,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 57,
|
||||
"forks": 58,
|
||||
"watchers": 36,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -1576,7 +1576,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2019-08-15T22:27:23Z",
|
||||
"updated_at": "2019-09-07T02:06:14Z",
|
||||
"pushed_at": "2021-12-10T01:21:07Z",
|
||||
"pushed_at": "2021-12-14T21:31:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2017-5645 - Apache Log4j RCE due Insecure Deserialization",
|
||||
"fork": false,
|
||||
"created_at": "2017-08-04T01:12:47Z",
|
||||
"updated_at": "2021-12-14T00:41:46Z",
|
||||
"updated_at": "2021-12-14T23:50:18Z",
|
||||
"pushed_at": "2018-11-18T11:14:20Z",
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"stargazers_count": 94,
|
||||
"watchers_count": 94,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 93,
|
||||
"watchers": 94,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2017-9506 - SSRF",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-25T11:25:18Z",
|
||||
"updated_at": "2021-12-07T14:43:25Z",
|
||||
"updated_at": "2021-12-14T20:54:10Z",
|
||||
"pushed_at": "2018-04-26T12:47:54Z",
|
||||
"stargazers_count": 166,
|
||||
"watchers_count": 166,
|
||||
"stargazers_count": 167,
|
||||
"watchers_count": 167,
|
||||
"forks_count": 47,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 47,
|
||||
"watchers": 166,
|
||||
"watchers": 167,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-21T15:44:29Z",
|
||||
"updated_at": "2021-12-13T07:33:50Z",
|
||||
"updated_at": "2021-12-14T22:39:39Z",
|
||||
"pushed_at": "2020-01-30T12:52:42Z",
|
||||
"stargazers_count": 189,
|
||||
"watchers_count": 189,
|
||||
"stargazers_count": 188,
|
||||
"watchers_count": 188,
|
||||
"forks_count": 71,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 71,
|
||||
"watchers": 189,
|
||||
"watchers": 188,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -121,17 +121,17 @@
|
|||
"description": "Script to identify hosts vulnerable to CVE-2018-10933",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-17T23:05:10Z",
|
||||
"updated_at": "2021-12-10T05:36:01Z",
|
||||
"updated_at": "2021-12-14T22:30:55Z",
|
||||
"pushed_at": "2018-11-04T17:29:33Z",
|
||||
"stargazers_count": 231,
|
||||
"watchers_count": 231,
|
||||
"stargazers_count": 230,
|
||||
"watchers_count": 230,
|
||||
"forks_count": 54,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 54,
|
||||
"watchers": 231,
|
||||
"watchers": 230,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2019-08-01T16:02:59Z",
|
||||
"stargazers_count": 265,
|
||||
"watchers_count": 265,
|
||||
"forks_count": 100,
|
||||
"forks_count": 101,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 100,
|
||||
"forks": 101,
|
||||
"watchers": 265,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2021-12-14T00:00:44Z",
|
||||
"updated_at": "2021-12-14T22:25:16Z",
|
||||
"pushed_at": "2021-12-08T10:31:54Z",
|
||||
"stargazers_count": 1390,
|
||||
"watchers_count": 1390,
|
||||
"stargazers_count": 1391,
|
||||
"watchers_count": 1391,
|
||||
"forks_count": 313,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 313,
|
||||
"watchers": 1390,
|
||||
"watchers": 1391,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -95,7 +95,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2020-07-14T02:42:41Z",
|
||||
"updated_at": "2021-10-07T23:36:52Z",
|
||||
"pushed_at": "2021-12-10T01:50:50Z",
|
||||
"pushed_at": "2021-12-14T21:57:44Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 5,
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T15:42:16Z",
|
||||
"updated_at": "2021-12-07T05:19:14Z",
|
||||
"updated_at": "2021-12-14T18:54:51Z",
|
||||
"pushed_at": "2021-11-02T14:45:24Z",
|
||||
"stargazers_count": 167,
|
||||
"watchers_count": 167,
|
||||
"stargazers_count": 168,
|
||||
"watchers_count": 168,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"watchers": 167,
|
||||
"watchers": 168,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1158,7 +1158,7 @@
|
|||
"description": "CVE-2021-3156 - Sudo Baron Samedit",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-29T06:29:26Z",
|
||||
"updated_at": "2021-12-14T15:45:57Z",
|
||||
"updated_at": "2021-12-14T19:48:06Z",
|
||||
"pushed_at": "2021-08-11T15:52:19Z",
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
|
|
|
@ -44,12 +44,12 @@
|
|||
"pushed_at": "2021-10-18T16:09:44Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"forks": 5,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2021-10-11T15:23:39Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 397689060,
|
||||
"name": "CVE-2021-39281",
|
||||
"full_name": "grahamhelton\/CVE-2021-39281",
|
||||
"owner": {
|
||||
"login": "grahamhelton",
|
||||
"id": 19278569,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19278569?v=4",
|
||||
"html_url": "https:\/\/github.com\/grahamhelton"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/grahamhelton\/CVE-2021-39281",
|
||||
"description": "Documentation for cve-2021-39281",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-18T17:49:20Z",
|
||||
"updated_at": "2021-10-06T19:35:20Z",
|
||||
"pushed_at": "2021-08-20T22:19:26Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-16T16:17:44Z",
|
||||
"updated_at": "2021-12-14T17:43:06Z",
|
||||
"updated_at": "2021-12-14T22:54:50Z",
|
||||
"pushed_at": "2021-11-11T17:09:56Z",
|
||||
"stargazers_count": 347,
|
||||
"watchers_count": 347,
|
||||
"stargazers_count": 348,
|
||||
"watchers_count": 348,
|
||||
"forks_count": 76,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 76,
|
||||
"watchers": 347,
|
||||
"watchers": 348,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -262,10 +262,10 @@
|
|||
"description": "Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-06T02:28:41Z",
|
||||
"updated_at": "2021-12-10T06:06:40Z",
|
||||
"updated_at": "2021-12-14T19:49:48Z",
|
||||
"pushed_at": "2021-10-09T19:37:29Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -279,7 +279,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 15,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,11 +13,11 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T15:10:30Z",
|
||||
"updated_at": "2021-12-14T17:57:11Z",
|
||||
"updated_at": "2021-12-15T00:09:43Z",
|
||||
"pushed_at": "2021-12-11T15:43:11Z",
|
||||
"stargazers_count": 419,
|
||||
"watchers_count": 419,
|
||||
"forks_count": 85,
|
||||
"stargazers_count": 442,
|
||||
"watchers_count": 442,
|
||||
"forks_count": 87,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -27,8 +27,8 @@
|
|||
"s4u2self"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 85,
|
||||
"watchers": 419,
|
||||
"forks": 87,
|
||||
"watchers": 442,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -45,17 +45,17 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T10:28:12Z",
|
||||
"updated_at": "2021-12-14T17:39:51Z",
|
||||
"updated_at": "2021-12-14T19:24:04Z",
|
||||
"pushed_at": "2021-12-14T03:36:08Z",
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 70,
|
||||
"watchers": 71,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -99,17 +99,17 @@
|
|||
"description": "Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T23:15:05Z",
|
||||
"updated_at": "2021-12-14T17:24:07Z",
|
||||
"updated_at": "2021-12-14T22:58:15Z",
|
||||
"pushed_at": "2021-12-13T23:15:47Z",
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"forks_count": 10,
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 72,
|
||||
"forks": 11,
|
||||
"watchers": 82,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T19:27:30Z",
|
||||
"updated_at": "2021-12-14T17:19:31Z",
|
||||
"updated_at": "2021-12-14T23:19:01Z",
|
||||
"pushed_at": "2021-12-12T10:50:54Z",
|
||||
"stargazers_count": 814,
|
||||
"watchers_count": 814,
|
||||
"forks_count": 212,
|
||||
"stargazers_count": 824,
|
||||
"watchers_count": 824,
|
||||
"forks_count": 215,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 212,
|
||||
"watchers": 814,
|
||||
"forks": 215,
|
||||
"watchers": 824,
|
||||
"score": 0
|
||||
}
|
||||
]
|
File diff suppressed because it is too large
Load diff
15
README.md
15
README.md
|
@ -2881,9 +2881,6 @@ In XeroSecurity Sn1per 9.0 (free version), insecure permissions (0777) are set u
|
|||
|
||||
- [nikip72/CVE-2021-39273-CVE-2021-39274](https://github.com/nikip72/CVE-2021-39273-CVE-2021-39274)
|
||||
|
||||
### CVE-2021-39281
|
||||
- [grahamhelton/CVE-2021-39281](https://github.com/grahamhelton/CVE-2021-39281)
|
||||
|
||||
### CVE-2021-39287
|
||||
- [Fearless523/CVE-2021-39287-Stored-XSS](https://github.com/Fearless523/CVE-2021-39287-Stored-XSS)
|
||||
|
||||
|
@ -3785,7 +3782,7 @@ Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and
|
|||
- [zzzz0317/log4j2-vulnerable-spring-app](https://github.com/zzzz0317/log4j2-vulnerable-spring-app)
|
||||
- [datadavev/test-44228](https://github.com/datadavev/test-44228)
|
||||
- [zhangxvx/Log4j-Rec-CVE-2021-44228](https://github.com/zhangxvx/Log4j-Rec-CVE-2021-44228)
|
||||
- [darkarnium/CVE-2021-44228](https://github.com/darkarnium/CVE-2021-44228)
|
||||
- [darkarnium/Log4j-CVE-Detect](https://github.com/darkarnium/Log4j-CVE-Detect)
|
||||
- [chilliwebs/CVE-2021-44228_Example](https://github.com/chilliwebs/CVE-2021-44228_Example)
|
||||
- [irgoncalves/f5-waf-enforce-sig-CVE-2021-44228](https://github.com/irgoncalves/f5-waf-enforce-sig-CVE-2021-44228)
|
||||
- [jeffbryner/log4j-docker-vaccine](https://github.com/jeffbryner/log4j-docker-vaccine)
|
||||
|
@ -3881,7 +3878,6 @@ Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and
|
|||
- [yanghaoi/CVE-2021-44228_Log4Shell](https://github.com/yanghaoi/CVE-2021-44228_Log4Shell)
|
||||
- [lfama/log4j_checker](https://github.com/lfama/log4j_checker)
|
||||
- [threatmonit/Log4j-IOCs](https://github.com/threatmonit/Log4j-IOCs)
|
||||
- [mcedica/fix-cve-2021-44228](https://github.com/mcedica/fix-cve-2021-44228)
|
||||
- [ben-smash/l4j-info](https://github.com/ben-smash/l4j-info)
|
||||
- [strawhatasif/log4j-test](https://github.com/strawhatasif/log4j-test)
|
||||
- [giterlizzi/nmap-log4shell](https://github.com/giterlizzi/nmap-log4shell)
|
||||
|
@ -3921,6 +3917,14 @@ Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and
|
|||
- [yanicksenn/CVE-2021-44228](https://github.com/yanicksenn/CVE-2021-44228)
|
||||
- [municipalparkingservices/CVE-2021-44228-Scanner](https://github.com/municipalparkingservices/CVE-2021-44228-Scanner)
|
||||
- [BinaryDefense/log4j-honeypot-flask](https://github.com/BinaryDefense/log4j-honeypot-flask)
|
||||
- [MalwareTech/Log4jTools](https://github.com/MalwareTech/Log4jTools)
|
||||
- [mufeedvh/log4jail](https://github.com/mufeedvh/log4jail)
|
||||
- [csduncan9/Log4j-CVE-2021-44228-command-generator](https://github.com/csduncan9/Log4j-CVE-2021-44228-command-generator)
|
||||
- [guerzon/log4shellpoc](https://github.com/guerzon/log4shellpoc)
|
||||
- [ab0x90/CVE-2021-44228_PoC](https://github.com/ab0x90/CVE-2021-44228_PoC)
|
||||
- [razz0r/CVE-2021-44228-Mass-RCE](https://github.com/razz0r/CVE-2021-44228-Mass-RCE)
|
||||
- [xsultan/log4jshield](https://github.com/xsultan/log4jshield)
|
||||
- [CERTCC/CVE-2021-44228_scanner](https://github.com/CERTCC/CVE-2021-44228_scanner)
|
||||
|
||||
### CVE-2021-44827
|
||||
- [full-disclosure/CVE-2021-44827](https://github.com/full-disclosure/CVE-2021-44827)
|
||||
|
@ -22380,6 +22384,7 @@ Multiple stack-based buffer overflows in Allied Telesyn TFTP Server (AT-TFTP) 1.
|
|||
</code>
|
||||
|
||||
- [shauntdergrigorian/cve-2006-6184](https://github.com/shauntdergrigorian/cve-2006-6184)
|
||||
- [b03902043/CVE-2006-6184](https://github.com/b03902043/CVE-2006-6184)
|
||||
|
||||
|
||||
## 2005
|
||||
|
|
Loading…
Reference in a new issue