Auto Update 2022/03/14 12:14:45

This commit is contained in:
motikan2010-bot 2022-03-14 21:14:45 +09:00
parent ec0bfcbf07
commit cd88c2dbc2
46 changed files with 328 additions and 289 deletions

View file

@ -40,11 +40,11 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-03-14T05:45:33Z",
"updated_at": "2022-03-14T08:45:08Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1308,
"watchers_count": 1308,
"forks_count": 289,
"stargazers_count": 1309,
"watchers_count": 1309,
"forks_count": 290,
"allow_forking": true,
"is_template": false,
"topics": [
@ -70,8 +70,8 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 289,
"watchers": 1308,
"forks": 290,
"watchers": 1309,
"score": 0
},
{

View file

@ -13,11 +13,11 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-03-14T05:45:33Z",
"updated_at": "2022-03-14T08:45:08Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1308,
"watchers_count": 1308,
"forks_count": 289,
"stargazers_count": 1309,
"watchers_count": 1309,
"forks_count": 290,
"allow_forking": true,
"is_template": false,
"topics": [
@ -43,8 +43,8 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 289,
"watchers": 1308,
"forks": 290,
"watchers": 1309,
"score": 0
},
{

View file

@ -17,7 +17,7 @@
"pushed_at": "2019-10-13T12:23:02Z",
"stargazers_count": 378,
"watchers_count": 378,
"forks_count": 149,
"forks_count": 150,
"allow_forking": true,
"is_template": false,
"topics": [
@ -31,7 +31,7 @@
"vulnerable-container"
],
"visibility": "public",
"forks": 149,
"forks": 150,
"watchers": 378,
"score": 0
},

View file

@ -1065,17 +1065,17 @@
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞Dirty Cow但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
"fork": false,
"created_at": "2022-03-07T18:36:50Z",
"updated_at": "2022-03-14T02:47:04Z",
"updated_at": "2022-03-14T11:40:27Z",
"pushed_at": "2022-03-09T08:40:29Z",
"stargazers_count": 139,
"watchers_count": 139,
"forks_count": 42,
"stargazers_count": 143,
"watchers_count": 143,
"forks_count": 44,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 139,
"forks": 44,
"watchers": 143,
"score": 0
}
]

View file

@ -40,11 +40,11 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-03-14T05:45:33Z",
"updated_at": "2022-03-14T08:45:08Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1308,
"watchers_count": 1308,
"forks_count": 289,
"stargazers_count": 1309,
"watchers_count": 1309,
"forks_count": 290,
"allow_forking": true,
"is_template": false,
"topics": [
@ -70,8 +70,8 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 289,
"watchers": 1308,
"forks": 290,
"watchers": 1309,
"score": 0
},
{

View file

@ -180,17 +180,17 @@
"description": "Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
"fork": false,
"created_at": "2017-09-14T10:04:39Z",
"updated_at": "2022-03-14T03:41:42Z",
"updated_at": "2022-03-14T08:29:48Z",
"pushed_at": "2018-09-10T16:25:12Z",
"stargazers_count": 315,
"watchers_count": 315,
"stargazers_count": 316,
"watchers_count": 316,
"forks_count": 124,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 124,
"watchers": 315,
"watchers": 316,
"score": 0
},
{

29
2018/CVE-2018-13784.json Normal file
View file

@ -0,0 +1,29 @@
[
{
"id": 141165293,
"name": "prestashop-exploits",
"full_name": "ambionics\/prestashop-exploits",
"owner": {
"login": "ambionics",
"id": 29630660,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29630660?v=4",
"html_url": "https:\/\/github.com\/ambionics"
},
"html_url": "https:\/\/github.com\/ambionics\/prestashop-exploits",
"description": "Collection of exploits\/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)",
"fork": false,
"created_at": "2018-07-16T16:33:41Z",
"updated_at": "2021-11-18T10:39:32Z",
"pushed_at": "2018-07-17T09:02:34Z",
"stargazers_count": 49,
"watchers_count": 49,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 49,
"score": 0
}
]

View file

@ -476,17 +476,17 @@
"description": "CVE-2018-2628漏洞工具包",
"fork": false,
"created_at": "2018-10-30T03:26:16Z",
"updated_at": "2020-07-13T02:21:36Z",
"updated_at": "2022-03-14T08:18:02Z",
"pushed_at": "2018-10-30T03:35:42Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 7,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 4,
"forks": 8,
"watchers": 5,
"score": 0
},
{
@ -530,11 +530,11 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-03-14T05:45:33Z",
"updated_at": "2022-03-14T08:45:08Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1308,
"watchers_count": 1308,
"forks_count": 289,
"stargazers_count": 1309,
"watchers_count": 1309,
"forks_count": 290,
"allow_forking": true,
"is_template": false,
"topics": [
@ -560,8 +560,8 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 289,
"watchers": 1308,
"forks": 290,
"watchers": 1309,
"score": 0
},
{

View file

@ -40,10 +40,10 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2022-03-13T12:57:36Z",
"updated_at": "2022-03-14T08:10:58Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 498,
"watchers_count": 498,
"stargazers_count": 499,
"watchers_count": 499,
"forks_count": 111,
"allow_forking": true,
"is_template": false,
@ -63,7 +63,7 @@
],
"visibility": "public",
"forks": 111,
"watchers": 498,
"watchers": 499,
"score": 0
}
]

View file

@ -1484,17 +1484,17 @@
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
"fork": false,
"created_at": "2019-05-23T22:50:12Z",
"updated_at": "2022-03-04T10:02:55Z",
"updated_at": "2022-03-14T11:01:09Z",
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 848,
"watchers_count": 848,
"stargazers_count": 849,
"watchers_count": 849,
"forks_count": 274,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 274,
"watchers": 848,
"watchers": 849,
"score": 0
},
{
@ -1705,17 +1705,17 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2022-03-14T04:25:37Z",
"updated_at": "2022-03-14T08:48:38Z",
"pushed_at": "2021-12-02T12:00:46Z",
"stargazers_count": 1099,
"watchers_count": 1099,
"stargazers_count": 1100,
"watchers_count": 1100,
"forks_count": 355,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 355,
"watchers": 1099,
"watchers": 1100,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2019-1064 Local Privilege Escalation Vulnerability",
"fork": false,
"created_at": "2019-06-12T10:21:35Z",
"updated_at": "2022-02-15T08:56:03Z",
"updated_at": "2022-03-14T07:14:40Z",
"pushed_at": "2019-06-13T09:55:07Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 20,
"watchers": 21,
"score": 0
},
{

View file

@ -316,10 +316,10 @@
"description": "Whatsapp Automatic Payload Generator [CVE-2019-11932]",
"fork": false,
"created_at": "2020-04-22T21:11:27Z",
"updated_at": "2022-02-27T14:04:08Z",
"updated_at": "2022-03-14T08:03:28Z",
"pushed_at": "2022-01-02T20:40:58Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
@ -336,7 +336,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 11,
"watchers": 12,
"score": 0
},
{

View file

@ -17,7 +17,7 @@
"pushed_at": "2021-12-09T21:12:38Z",
"stargazers_count": 112,
"watchers_count": 112,
"forks_count": 26,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"topics": [
@ -26,7 +26,7 @@
"jackson-databind"
],
"visibility": "public",
"forks": 26,
"forks": 27,
"watchers": 112,
"score": 0
},
@ -48,12 +48,12 @@
"pushed_at": "2021-12-09T22:24:33Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 3,
"score": 0
}

View file

@ -17,7 +17,7 @@
"pushed_at": "2022-01-21T23:43:12Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [
@ -26,7 +26,7 @@
"rce"
],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 5,
"score": 0
}

View file

@ -17,12 +17,12 @@
"pushed_at": "2019-08-21T03:59:02Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 19,
"score": 0
}

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-06-11T14:19:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0
}

View file

@ -40,10 +40,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-03-14T03:27:23Z",
"updated_at": "2022-03-14T09:33:01Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3207,
"watchers_count": 3207,
"stargazers_count": 3208,
"watchers_count": 3208,
"forks_count": 952,
"allow_forking": true,
"is_template": false,
@ -70,7 +70,7 @@
],
"visibility": "public",
"forks": 952,
"watchers": 3207,
"watchers": 3208,
"score": 0
},
{

View file

@ -44,14 +44,14 @@
"pushed_at": "2020-10-13T23:36:22Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2019-17571"
],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 2,
"score": 0
},

View file

@ -204,11 +204,11 @@
"description": "Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215",
"fork": false,
"created_at": "2020-06-07T15:03:07Z",
"updated_at": "2022-02-25T08:40:54Z",
"updated_at": "2022-03-14T11:23:00Z",
"pushed_at": "2020-08-08T12:54:09Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 9,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [
@ -218,8 +218,8 @@
"kernel-vulnerability"
],
"visibility": "public",
"forks": 9,
"watchers": 13,
"forks": 10,
"watchers": 17,
"score": 0
},
{

View file

@ -175,11 +175,11 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-03-14T05:45:33Z",
"updated_at": "2022-03-14T08:45:08Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1308,
"watchers_count": 1308,
"forks_count": 289,
"stargazers_count": 1309,
"watchers_count": 1309,
"forks_count": 290,
"allow_forking": true,
"is_template": false,
"topics": [
@ -205,8 +205,8 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 289,
"watchers": 1308,
"forks": 290,
"watchers": 1309,
"score": 0
}
]

View file

@ -70,10 +70,10 @@
"description": "exploit CVE-2019-7609(kibana RCE) on right way by python2 scripts",
"fork": false,
"created_at": "2019-10-21T15:31:13Z",
"updated_at": "2022-02-12T18:57:06Z",
"updated_at": "2022-03-14T10:34:20Z",
"pushed_at": "2019-10-23T07:10:35Z",
"stargazers_count": 128,
"watchers_count": 128,
"stargazers_count": 129,
"watchers_count": 129,
"forks_count": 54,
"allow_forking": true,
"is_template": false,
@ -84,7 +84,7 @@
],
"visibility": "public",
"forks": 54,
"watchers": 128,
"watchers": 129,
"score": 0
},
{

View file

@ -303,12 +303,12 @@
"pushed_at": "2020-02-24T18:41:10Z",
"stargazers_count": 63,
"watchers_count": 63,
"forks_count": 17,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 17,
"forks": 16,
"watchers": 63,
"score": 0
},

View file

@ -121,10 +121,10 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-03-11T15:21:27Z",
"updated_at": "2022-03-05T12:34:26Z",
"updated_at": "2022-03-14T09:29:19Z",
"pushed_at": "2020-10-01T08:36:29Z",
"stargazers_count": 611,
"watchers_count": 611,
"stargazers_count": 612,
"watchers_count": 612,
"forks_count": 203,
"allow_forking": true,
"is_template": false,
@ -133,7 +133,7 @@
],
"visibility": "public",
"forks": 203,
"watchers": 611,
"watchers": 612,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
"fork": false,
"created_at": "2020-06-08T07:37:49Z",
"updated_at": "2022-03-13T04:01:07Z",
"updated_at": "2022-03-14T09:35:55Z",
"pushed_at": "2021-08-07T16:48:55Z",
"stargazers_count": 386,
"watchers_count": 386,
"stargazers_count": 385,
"watchers_count": 385,
"forks_count": 64,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 64,
"watchers": 386,
"watchers": 385,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473",
"fork": false,
"created_at": "2020-03-11T17:51:29Z",
"updated_at": "2022-03-14T05:49:19Z",
"updated_at": "2022-03-14T06:13:20Z",
"pushed_at": "2021-08-16T18:16:20Z",
"stargazers_count": 110,
"watchers_count": 110,
"stargazers_count": 112,
"watchers_count": 112,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
@ -40,7 +40,7 @@
],
"visibility": "public",
"forks": 23,
"watchers": 110,
"watchers": 112,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2022-03-14T06:09:40Z",
"updated_at": "2022-03-14T09:46:29Z",
"pushed_at": "2021-12-08T10:31:54Z",
"stargazers_count": 1431,
"watchers_count": 1431,
"stargazers_count": 1432,
"watchers_count": 1432,
"forks_count": 321,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 321,
"watchers": 1431,
"watchers": 1432,
"score": 0
},
{
@ -98,12 +98,12 @@
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 907,
"watchers_count": 907,
"forks_count": 249,
"forks_count": 250,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 249,
"forks": 250,
"watchers": 907,
"score": 0
},
@ -125,7 +125,7 @@
"pushed_at": "2020-11-05T16:37:20Z",
"stargazers_count": 304,
"watchers_count": 304,
"forks_count": 53,
"forks_count": 54,
"allow_forking": true,
"is_template": false,
"topics": [
@ -137,7 +137,7 @@
"zerologon"
],
"visibility": "public",
"forks": 53,
"forks": 54,
"watchers": 304,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-03-14T03:27:23Z",
"updated_at": "2022-03-14T09:33:01Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3207,
"watchers_count": 3207,
"stargazers_count": 3208,
"watchers_count": 3208,
"forks_count": 952,
"allow_forking": true,
"is_template": false,
@ -43,7 +43,7 @@
],
"visibility": "public",
"forks": 952,
"watchers": 3207,
"watchers": 3208,
"score": 0
},
{

View file

@ -13,11 +13,11 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-03-14T05:45:33Z",
"updated_at": "2022-03-14T08:45:08Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1308,
"watchers_count": 1308,
"forks_count": 289,
"stargazers_count": 1309,
"watchers_count": 1309,
"forks_count": 290,
"allow_forking": true,
"is_template": false,
"topics": [
@ -43,8 +43,8 @@
"cve-2020-2883"
],
"visibility": "public",
"forks": 289,
"watchers": 1308,
"forks": 290,
"watchers": 1309,
"score": 0
},
{

View file

@ -94,17 +94,17 @@
"description": "CVE-2020-2555",
"fork": false,
"created_at": "2020-03-10T08:06:08Z",
"updated_at": "2021-12-15T14:38:33Z",
"updated_at": "2022-03-14T10:40:07Z",
"pushed_at": "2020-03-10T08:15:45Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 11,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 13,
"forks": 12,
"watchers": 14,
"score": 0
},
{

View file

@ -1006,12 +1006,12 @@
"pushed_at": "2020-07-10T15:31:07Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 4,
"score": 0
},

View file

@ -17,12 +17,12 @@
"pushed_at": "2022-02-19T13:52:32Z",
"stargazers_count": 145,
"watchers_count": 145,
"forks_count": 25,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 25,
"forks": 26,
"watchers": 145,
"score": 0
},

View file

@ -94,17 +94,44 @@
"description": "iOS 15.1 kernel exploit POC for CVE-2021-30955",
"fork": false,
"created_at": "2022-03-01T12:41:03Z",
"updated_at": "2022-03-13T18:42:37Z",
"updated_at": "2022-03-14T08:50:02Z",
"pushed_at": "2022-03-01T16:11:31Z",
"stargazers_count": 217,
"watchers_count": 217,
"stargazers_count": 218,
"watchers_count": 218,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 217,
"watchers": 218,
"score": 0
},
{
"id": 469611099,
"name": "desc_race_A15",
"full_name": "markie-dev\/desc_race_A15",
"owner": {
"login": "markie-dev",
"id": 34432591,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34432591?v=4",
"html_url": "https:\/\/github.com\/markie-dev"
},
"html_url": "https:\/\/github.com\/markie-dev\/desc_race_A15",
"description": "CVE-2021-30955 iOS 15.1.1 POC for 6GB RAM devices (A14-A15)",
"fork": false,
"created_at": "2022-03-14T06:42:45Z",
"updated_at": "2022-03-14T07:59:08Z",
"pushed_at": "2022-03-14T07:58:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -1104,17 +1104,17 @@
"description": "CVE-2021-3156 - Sudo Baron Samedit",
"fork": false,
"created_at": "2021-04-29T06:29:26Z",
"updated_at": "2022-03-10T16:23:32Z",
"updated_at": "2022-03-14T09:13:28Z",
"pushed_at": "2022-02-12T19:33:07Z",
"stargazers_count": 171,
"watchers_count": 171,
"stargazers_count": 172,
"watchers_count": 172,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 171,
"watchers": 172,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-06-24T18:50:17Z",
"updated_at": "2022-03-11T03:18:23Z",
"updated_at": "2022-03-14T08:08:53Z",
"pushed_at": "2021-08-25T19:26:21Z",
"stargazers_count": 226,
"watchers_count": 226,
"stargazers_count": 227,
"watchers_count": 227,
"forks_count": 46,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 46,
"watchers": 226,
"watchers": 227,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Oracle Access Manager Unauthenticated Attacker Vulnerability CVE-2021-35587",
"fork": false,
"created_at": "2022-03-14T05:03:54Z",
"updated_at": "2022-03-14T05:49:34Z",
"updated_at": "2022-03-14T12:13:10Z",
"pushed_at": "2022-03-14T05:07:01Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 4,
"score": 0
}
]

View file

@ -187,10 +187,10 @@
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkits pkexec (CVE-2021-4034)",
"fork": false,
"created_at": "2022-01-26T00:56:36Z",
"updated_at": "2022-03-13T06:26:56Z",
"updated_at": "2022-03-14T10:53:15Z",
"pushed_at": "2022-02-12T05:22:58Z",
"stargazers_count": 809,
"watchers_count": 809,
"stargazers_count": 810,
"watchers_count": 810,
"forks_count": 264,
"allow_forking": true,
"is_template": false,
@ -201,7 +201,7 @@
],
"visibility": "public",
"forks": 264,
"watchers": 809,
"watchers": 810,
"score": 0
},
{
@ -272,17 +272,17 @@
"description": "PoC for CVE-2021-4034 dubbed pwnkit",
"fork": false,
"created_at": "2022-01-26T01:34:44Z",
"updated_at": "2022-03-07T22:10:42Z",
"updated_at": "2022-03-14T10:35:11Z",
"pushed_at": "2022-01-27T15:13:51Z",
"stargazers_count": 78,
"watchers_count": 78,
"stargazers_count": 80,
"watchers_count": 80,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 78,
"watchers": 80,
"score": 0
},
{
@ -552,17 +552,17 @@
"description": "polkit pkexec Local Privilege Vulnerability to Add custom commands",
"fork": false,
"created_at": "2022-01-26T07:19:21Z",
"updated_at": "2022-02-17T01:42:32Z",
"updated_at": "2022-03-14T09:29:19Z",
"pushed_at": "2022-01-27T06:23:02Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 37,
"watchers": 38,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2022-03-02T19:07:37Z",
"updated_at": "2022-03-12T20:02:56Z",
"updated_at": "2022-03-14T10:28:17Z",
"pushed_at": "2022-03-08T15:37:34Z",
"stargazers_count": 62,
"watchers_count": 62,
"stargazers_count": 63,
"watchers_count": 63,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 62,
"watchers": 63,
"score": 0
}
]

View file

@ -543,11 +543,11 @@
"html_url": "https:\/\/github.com\/mauricelambert"
},
"html_url": "https:\/\/github.com\/mauricelambert\/CVE-2021-41773",
"description": "These Nmap, Python and Ruby scripts detects and exploits CVE-2021-41773 with RCE and local file disclosure.",
"description": "These Metasploit, Nmap, Python and Ruby scripts detects and exploits CVE-2021-41773 with RCE and local file disclosure.",
"fork": false,
"created_at": "2022-03-08T21:55:53Z",
"updated_at": "2022-03-10T07:16:46Z",
"pushed_at": "2022-03-10T07:06:34Z",
"updated_at": "2022-03-14T07:35:34Z",
"pushed_at": "2022-03-14T07:34:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
@ -558,6 +558,7 @@
"cve-2021-41773",
"detection",
"exploit",
"metasploit",
"nmap",
"python3",
"rce",

View file

@ -57,33 +57,6 @@
"watchers": 0,
"score": 0
},
{
"id": 420531710,
"name": "CVE-2021-42013",
"full_name": "TheLastVvV\/CVE-2021-42013",
"owner": {
"login": "TheLastVvV",
"id": 71128830,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71128830?v=4",
"html_url": "https:\/\/github.com\/TheLastVvV"
},
"html_url": "https:\/\/github.com\/TheLastVvV\/CVE-2021-42013",
"description": "Poc CVE-2021-42013 - Apache 2.4.50 without CGI",
"fork": false,
"created_at": "2021-10-23T21:58:44Z",
"updated_at": "2021-11-04T11:44:21Z",
"pushed_at": "2021-10-23T22:00:34Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 420684825,
"name": "CVE-2021-42013_Reverse-Shell",
@ -347,8 +320,8 @@
"description": "These Nmap, Python and Ruby scripts detects and exploits CVE-2021-42013 with RCE and local file disclosure.",
"fork": false,
"created_at": "2022-03-08T21:48:40Z",
"updated_at": "2022-03-10T07:03:51Z",
"pushed_at": "2022-03-10T07:04:18Z",
"updated_at": "2022-03-14T07:37:19Z",
"pushed_at": "2022-03-14T07:36:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
@ -359,6 +332,7 @@
"cve-2021-42013",
"detection",
"exploit",
"metasploit",
"nmap",
"python3",
"rce",

View file

@ -45,17 +45,17 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2022-03-12T00:10:53Z",
"updated_at": "2022-03-14T08:55:05Z",
"pushed_at": "2021-12-20T04:51:01Z",
"stargazers_count": 268,
"watchers_count": 268,
"forks_count": 56,
"stargazers_count": 272,
"watchers_count": 272,
"forks_count": 57,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 56,
"watchers": 268,
"forks": 57,
"watchers": 272,
"score": 0
},
{

View file

@ -121,17 +121,17 @@
"description": "Remote Code Injection In Log4j",
"fork": false,
"created_at": "2021-12-10T05:23:44Z",
"updated_at": "2022-03-08T16:23:38Z",
"updated_at": "2022-03-14T08:31:39Z",
"pushed_at": "2022-01-18T12:01:52Z",
"stargazers_count": 349,
"watchers_count": 349,
"stargazers_count": 350,
"watchers_count": 350,
"forks_count": 106,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 106,
"watchers": 349,
"watchers": 350,
"score": 0
},
{
@ -772,17 +772,17 @@
"description": "Simple Python 3 script to detect the \"Log4j\" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading",
"fork": false,
"created_at": "2021-12-10T21:46:18Z",
"updated_at": "2022-03-10T01:57:25Z",
"updated_at": "2022-03-14T11:46:07Z",
"pushed_at": "2021-12-13T22:27:25Z",
"stargazers_count": 173,
"watchers_count": 173,
"stargazers_count": 172,
"watchers_count": 172,
"forks_count": 59,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 59,
"watchers": 173,
"watchers": 172,
"score": 0
},
{
@ -1235,10 +1235,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2022-03-13T17:09:28Z",
"updated_at": "2022-03-14T07:24:53Z",
"pushed_at": "2022-02-18T08:54:03Z",
"stargazers_count": 251,
"watchers_count": 251,
"stargazers_count": 252,
"watchers_count": 252,
"forks_count": 62,
"allow_forking": true,
"is_template": false,
@ -1250,7 +1250,7 @@
],
"visibility": "public",
"forks": 62,
"watchers": 251,
"watchers": 252,
"score": 0
},
{
@ -1375,11 +1375,11 @@
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T11:18:46Z",
"updated_at": "2022-03-14T05:58:40Z",
"updated_at": "2022-03-14T11:40:37Z",
"pushed_at": "2022-02-17T20:52:22Z",
"stargazers_count": 776,
"watchers_count": 776,
"forks_count": 162,
"stargazers_count": 777,
"watchers_count": 777,
"forks_count": 163,
"allow_forking": true,
"is_template": false,
"topics": [
@ -1397,8 +1397,8 @@
"scanner"
],
"visibility": "public",
"forks": 162,
"watchers": 776,
"forks": 163,
"watchers": 777,
"score": 0
},
{
@ -3548,17 +3548,17 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-03-11T20:39:54Z",
"updated_at": "2022-03-14T06:18:58Z",
"pushed_at": "2022-02-06T03:18:29Z",
"stargazers_count": 2779,
"watchers_count": 2779,
"forks_count": 675,
"stargazers_count": 2780,
"watchers_count": 2780,
"forks_count": 676,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 675,
"watchers": 2779,
"forks": 676,
"watchers": 2780,
"score": 0
},
{
@ -3602,17 +3602,17 @@
"description": "Scanner for Log4j RCE CVE-2021-44228",
"fork": false,
"created_at": "2021-12-13T06:53:01Z",
"updated_at": "2022-03-13T04:24:50Z",
"updated_at": "2022-03-14T07:22:05Z",
"pushed_at": "2021-12-13T13:39:01Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"forks": 2,
"watchers": 4,
"score": 0
},
{
@ -5786,7 +5786,7 @@
"fork": false,
"created_at": "2021-12-14T22:19:29Z",
"updated_at": "2022-01-31T18:15:48Z",
"pushed_at": "2022-03-07T00:26:17Z",
"pushed_at": "2022-03-14T09:32:34Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 3,
@ -7903,17 +7903,17 @@
"description": null,
"fork": false,
"created_at": "2021-12-17T18:45:19Z",
"updated_at": "2022-03-07T03:11:15Z",
"updated_at": "2022-03-14T08:27:22Z",
"pushed_at": "2022-02-14T15:05:42Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"forks": 2,
"watchers": 2,
"score": 0
},
{
@ -9849,7 +9849,7 @@
"fork": false,
"created_at": "2022-01-03T04:36:41Z",
"updated_at": "2022-01-09T19:59:25Z",
"pushed_at": "2022-02-27T11:28:18Z",
"pushed_at": "2022-03-14T10:50:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -94,17 +94,17 @@
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞Dirty Cow但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
"fork": false,
"created_at": "2022-03-07T18:36:50Z",
"updated_at": "2022-03-14T02:47:04Z",
"updated_at": "2022-03-14T11:40:27Z",
"pushed_at": "2022-03-09T08:40:29Z",
"stargazers_count": 139,
"watchers_count": 139,
"forks_count": 42,
"stargazers_count": 143,
"watchers_count": 143,
"forks_count": 44,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 139,
"forks": 44,
"watchers": 143,
"score": 0
},
{
@ -121,17 +121,17 @@
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
"fork": false,
"created_at": "2022-03-07T18:55:20Z",
"updated_at": "2022-03-14T02:37:51Z",
"updated_at": "2022-03-14T10:58:36Z",
"pushed_at": "2022-03-08T06:20:05Z",
"stargazers_count": 807,
"watchers_count": 807,
"forks_count": 156,
"stargazers_count": 811,
"watchers_count": 811,
"forks_count": 157,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 156,
"watchers": 807,
"forks": 157,
"watchers": 811,
"score": 0
},
{
@ -364,17 +364,17 @@
"description": "CVE-2022-0847: Linux Kernel Privilege Escalation Vulnerability",
"fork": false,
"created_at": "2022-03-08T12:43:43Z",
"updated_at": "2022-03-14T02:27:18Z",
"updated_at": "2022-03-14T09:38:59Z",
"pushed_at": "2022-03-08T13:15:35Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 5,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 4,
"forks": 8,
"watchers": 7,
"score": 0
},
{
@ -391,17 +391,17 @@
"description": "The Dirty Pipe Vulnerability",
"fork": false,
"created_at": "2022-03-08T13:48:55Z",
"updated_at": "2022-03-14T04:45:09Z",
"updated_at": "2022-03-14T12:10:50Z",
"pushed_at": "2022-03-08T13:54:08Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 36,
"watchers_count": 36,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 33,
"watchers": 36,
"score": 0
},
{
@ -1074,17 +1074,17 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2022-03-14T05:59:39Z",
"pushed_at": "2022-03-13T01:15:39Z",
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 8,
"updated_at": "2022-03-14T12:13:15Z",
"pushed_at": "2022-03-14T07:40:23Z",
"stargazers_count": 52,
"watchers_count": 52,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 41,
"forks": 12,
"watchers": 52,
"score": 0
},
{

View file

@ -13,11 +13,11 @@
"description": "PoC for CVE-2022-21971 \"Windows Runtime Remote Code Execution Vulnerability\"",
"fork": false,
"created_at": "2022-02-26T20:37:42Z",
"updated_at": "2022-03-14T05:33:33Z",
"updated_at": "2022-03-14T10:16:44Z",
"pushed_at": "2022-02-26T20:45:19Z",
"stargazers_count": 206,
"watchers_count": 206,
"forks_count": 39,
"stargazers_count": 214,
"watchers_count": 214,
"forks_count": 42,
"allow_forking": true,
"is_template": false,
"topics": [
@ -29,8 +29,8 @@
"rtf"
],
"visibility": "public",
"forks": 39,
"watchers": 206,
"forks": 42,
"watchers": 214,
"score": 0
}
]

View file

@ -121,17 +121,17 @@
"description": "Spring Cloud Gateway 远程代码执行漏洞Exp Spring_Cloud_Gateway_RCE_Exp-CVE-2022-22947",
"fork": false,
"created_at": "2022-03-03T13:13:02Z",
"updated_at": "2022-03-14T06:13:38Z",
"updated_at": "2022-03-14T08:31:20Z",
"pushed_at": "2022-03-03T14:31:32Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 25,
"watchers": 30,
"score": 0
},
{
@ -853,7 +853,7 @@
"fork": false,
"created_at": "2022-03-13T10:00:21Z",
"updated_at": "2022-03-13T19:33:46Z",
"pushed_at": "2022-03-13T10:02:25Z",
"pushed_at": "2022-03-14T08:32:17Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,

View file

@ -13,17 +13,17 @@
"description": "CVE-2022-25636",
"fork": false,
"created_at": "2022-03-07T13:38:41Z",
"updated_at": "2022-03-14T05:03:38Z",
"updated_at": "2022-03-14T11:51:35Z",
"pushed_at": "2022-03-07T17:18:19Z",
"stargazers_count": 163,
"watchers_count": 163,
"stargazers_count": 172,
"watchers_count": 172,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 163,
"watchers": 172,
"score": 0
}
]

View file

@ -2622,6 +2622,7 @@ A race condition was addressed with improved state handling. This issue is fixed
- [nickorlow/CVE-2021-30955-POC](https://github.com/nickorlow/CVE-2021-30955-POC)
- [verygenericname/CVE-2021-30955-POC-IPA](https://github.com/verygenericname/CVE-2021-30955-POC-IPA)
- [b1n4r1b01/desc_race](https://github.com/b1n4r1b01/desc_race)
- [markie-dev/desc_race_A15](https://github.com/markie-dev/desc_race_A15)
### CVE-2021-31159 (2021-06-16)
@ -3421,7 +3422,6 @@ It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was in
- [Vulnmachines/cve-2021-42013](https://github.com/Vulnmachines/cve-2021-42013)
- [twseptian/cve-2021-42013-docker-lab](https://github.com/twseptian/cve-2021-42013-docker-lab)
- [TheLastVvV/CVE-2021-42013](https://github.com/TheLastVvV/CVE-2021-42013)
- [TheLastVvV/CVE-2021-42013_Reverse-Shell](https://github.com/TheLastVvV/CVE-2021-42013_Reverse-Shell)
- [walnutsecurity/cve-2021-42013](https://github.com/walnutsecurity/cve-2021-42013)
- [robotsense1337/CVE-2021-42013](https://github.com/robotsense1337/CVE-2021-42013)
@ -15593,6 +15593,14 @@ An Improper Authorization vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.
- [shinecome/zip](https://github.com/shinecome/zip)
### CVE-2018-13784 (2018-07-09)
<code>
PrestaShop before 1.6.1.20 and 1.7.x before 1.7.3.4 mishandles cookie encryption in Cookie.php, Rinjdael.php, and Blowfish.php.
</code>
- [ambionics/prestashop-exploits](https://github.com/ambionics/prestashop-exploits)
### CVE-2018-13797 (2018-07-10)
<code>