mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/10/12 12:30:54
This commit is contained in:
parent
5b4871bdad
commit
e9d4d1d02a
42 changed files with 240 additions and 236 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": "use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range",
|
||||
"fork": false,
|
||||
"created_at": "2013-09-09T21:50:30Z",
|
||||
"updated_at": "2024-08-12T19:12:16Z",
|
||||
"updated_at": "2024-10-12T08:13:44Z",
|
||||
"pushed_at": "2015-01-12T19:56:04Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 17,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -1889,36 +1889,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 493163626,
|
||||
"name": "pentesterlab",
|
||||
"full_name": "ThaFWord\/pentesterlab",
|
||||
"owner": {
|
||||
"login": "ThaFWord",
|
||||
"id": 77698145,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77698145?v=4",
|
||||
"html_url": "https:\/\/github.com\/ThaFWord"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ThaFWord\/pentesterlab",
|
||||
"description": "CVE-2018-6574: go get RCE",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-17T08:32:20Z",
|
||||
"updated_at": "2022-05-19T10:07:49Z",
|
||||
"pushed_at": "2022-05-17T08:47:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 497029793,
|
||||
"name": "CVE-2018-6574",
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2024-10-09T21:15:37Z",
|
||||
"updated_at": "2024-10-12T07:50:11Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 4105,
|
||||
"watchers_count": 4105,
|
||||
"stargazers_count": 4106,
|
||||
"watchers_count": 4106,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1095,
|
||||
"allow_forking": true,
|
||||
|
@ -75,7 +75,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1095,
|
||||
"watchers": 4105,
|
||||
"watchers": 4106,
|
||||
"score": 0,
|
||||
"subscribers_count": 148
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-12T07:58:11Z",
|
||||
"updated_at": "2024-10-11T12:57:04Z",
|
||||
"updated_at": "2024-10-12T09:02:56Z",
|
||||
"pushed_at": "2022-04-14T18:23:38Z",
|
||||
"stargazers_count": 346,
|
||||
"watchers_count": 346,
|
||||
"stargazers_count": 345,
|
||||
"watchers_count": 345,
|
||||
"has_discussions": false,
|
||||
"forks_count": 85,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 85,
|
||||
"watchers": 346,
|
||||
"watchers": 345,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
|
|
@ -1011,7 +1011,7 @@
|
|||
"stargazers_count": 1297,
|
||||
"watchers_count": 1297,
|
||||
"has_discussions": false,
|
||||
"forks_count": 344,
|
||||
"forks_count": 343,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -1023,7 +1023,7 @@
|
|||
"smbghost"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 344,
|
||||
"forks": 343,
|
||||
"watchers": 1297,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
|
|
|
@ -170,10 +170,10 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2024-10-09T14:18:57Z",
|
||||
"updated_at": "2024-10-12T11:27:01Z",
|
||||
"pushed_at": "2020-10-15T18:31:15Z",
|
||||
"stargazers_count": 628,
|
||||
"watchers_count": 628,
|
||||
"stargazers_count": 629,
|
||||
"watchers_count": 629,
|
||||
"has_discussions": false,
|
||||
"forks_count": 146,
|
||||
"allow_forking": true,
|
||||
|
@ -182,7 +182,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 146,
|
||||
"watchers": 628,
|
||||
"watchers": 629,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2024-10-09T21:15:37Z",
|
||||
"updated_at": "2024-10-12T07:50:11Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 4105,
|
||||
"watchers_count": 4105,
|
||||
"stargazers_count": 4106,
|
||||
"watchers_count": 4106,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1095,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1095,
|
||||
"watchers": 4105,
|
||||
"watchers": 4106,
|
||||
"score": 0,
|
||||
"subscribers_count": 148
|
||||
},
|
||||
|
|
|
@ -48,8 +48,8 @@
|
|||
"description": "CVE-2020-15368 updated",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-10T23:51:38Z",
|
||||
"updated_at": "2024-09-18T22:48:08Z",
|
||||
"pushed_at": "2024-08-10T23:57:40Z",
|
||||
"updated_at": "2024-10-12T08:25:16Z",
|
||||
"pushed_at": "2024-10-12T08:25:12Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -62,10 +62,10 @@
|
|||
"description": "A network detection package for CVE-2020-16898 (Windows TCP\/IP Remote Code Execution Vulnerability)",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-14T03:25:00Z",
|
||||
"updated_at": "2024-09-03T18:23:15Z",
|
||||
"updated_at": "2024-10-12T10:28:29Z",
|
||||
"pushed_at": "2024-09-03T18:23:10Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -74,7 +74,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -957,8 +957,8 @@
|
|||
"description": "cve-2020-1938 POC, updated version",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-12T01:46:15Z",
|
||||
"updated_at": "2024-10-12T01:53:59Z",
|
||||
"pushed_at": "2024-10-12T01:51:05Z",
|
||||
"updated_at": "2024-10-12T11:25:37Z",
|
||||
"pushed_at": "2024-10-12T11:25:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Regular expression matching for URL's. Maintained, safe, and browser-friendly version of url-regex. Resolves CVE-2020-7661 for Node.js servers.",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-15T07:42:50Z",
|
||||
"updated_at": "2024-09-28T12:21:17Z",
|
||||
"updated_at": "2024-10-12T07:12:58Z",
|
||||
"pushed_at": "2024-04-16T15:11:54Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -38,7 +38,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 79,
|
||||
"watchers": 80,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
}
|
||||
|
|
|
@ -457,10 +457,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-02T16:44:24Z",
|
||||
"updated_at": "2024-09-03T18:23:12Z",
|
||||
"updated_at": "2024-10-12T10:29:08Z",
|
||||
"pushed_at": "2024-09-03T18:23:07Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -469,7 +469,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -299,36 +299,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
{
|
||||
"id": 444978473,
|
||||
"name": "testanull-CVE-2021-22005.py",
|
||||
"full_name": "timb-machine-mirrors\/testanull-CVE-2021-22005.py",
|
||||
"owner": {
|
||||
"login": "timb-machine-mirrors",
|
||||
"id": 49810875,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49810875?v=4",
|
||||
"html_url": "https:\/\/github.com\/timb-machine-mirrors"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/timb-machine-mirrors\/testanull-CVE-2021-22005.py",
|
||||
"description": "Clone from gist",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-05T23:22:08Z",
|
||||
"updated_at": "2023-04-08T20:15:10Z",
|
||||
"pushed_at": "2022-01-05T23:22:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 505737586,
|
||||
"name": "cve-2021-22005",
|
||||
|
|
|
@ -58,35 +58,5 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 444979391,
|
||||
"name": "testanull-CVE-2021-28482.py",
|
||||
"full_name": "timb-machine-mirrors\/testanull-CVE-2021-28482.py",
|
||||
"owner": {
|
||||
"login": "timb-machine-mirrors",
|
||||
"id": 49810875,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49810875?v=4",
|
||||
"html_url": "https:\/\/github.com\/timb-machine-mirrors"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/timb-machine-mirrors\/testanull-CVE-2021-28482.py",
|
||||
"description": "Clone from gist",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-05T23:26:58Z",
|
||||
"updated_at": "2023-04-08T20:15:02Z",
|
||||
"pushed_at": "2022-01-05T23:27:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -133,10 +133,10 @@
|
|||
"description": "海康威视RCE漏洞 批量检测和利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-03T17:27:59Z",
|
||||
"updated_at": "2024-09-03T15:06:29Z",
|
||||
"updated_at": "2024-10-12T08:14:07Z",
|
||||
"pushed_at": "2022-08-05T19:57:30Z",
|
||||
"stargazers_count": 137,
|
||||
"watchers_count": 137,
|
||||
"stargazers_count": 138,
|
||||
"watchers_count": 138,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -148,7 +148,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 137,
|
||||
"watchers": 138,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -58,5 +58,65 @@
|
|||
"watchers": 46,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
{
|
||||
"id": 871545050,
|
||||
"name": "CVE-2021-40539",
|
||||
"full_name": "lpyzds\/CVE-2021-40539",
|
||||
"owner": {
|
||||
"login": "lpyzds",
|
||||
"id": 178446553,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/178446553?v=4",
|
||||
"html_url": "https:\/\/github.com\/lpyzds"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lpyzds\/CVE-2021-40539",
|
||||
"description": "CVE-2021-40539:ADSelfService Plus RCE漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-12T09:01:42Z",
|
||||
"updated_at": "2024-10-12T09:06:21Z",
|
||||
"pushed_at": "2024-10-12T09:06:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 871547174,
|
||||
"name": "CVE-2021-40539",
|
||||
"full_name": "lpyydxs\/CVE-2021-40539",
|
||||
"owner": {
|
||||
"login": "lpyydxs",
|
||||
"id": 184594317,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/184594317?v=4",
|
||||
"html_url": "https:\/\/github.com\/lpyydxs"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lpyydxs\/CVE-2021-40539",
|
||||
"description": "CVE-2021-40539:ADSelfService Plus RCE漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-12T09:09:00Z",
|
||||
"updated_at": "2024-10-12T09:15:57Z",
|
||||
"pushed_at": "2024-10-12T09:15:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Apache 2.4.50 Path traversal vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-08T05:44:54Z",
|
||||
"updated_at": "2024-08-12T20:17:05Z",
|
||||
"updated_at": "2024-10-12T09:02:56Z",
|
||||
"pushed_at": "2022-08-30T11:59:18Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 18,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -907,10 +907,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2024-10-11T18:33:35Z",
|
||||
"updated_at": "2024-10-12T08:05:29Z",
|
||||
"pushed_at": "2024-02-12T22:37:25Z",
|
||||
"stargazers_count": 1797,
|
||||
"watchers_count": 1797,
|
||||
"stargazers_count": 1798,
|
||||
"watchers_count": 1798,
|
||||
"has_discussions": false,
|
||||
"forks_count": 525,
|
||||
"allow_forking": true,
|
||||
|
@ -924,7 +924,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 525,
|
||||
"watchers": 1797,
|
||||
"watchers": 1798,
|
||||
"score": 0,
|
||||
"subscribers_count": 27
|
||||
},
|
||||
|
@ -1966,10 +1966,10 @@
|
|||
"description": "A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T00:29:03Z",
|
||||
"updated_at": "2024-09-27T19:44:04Z",
|
||||
"updated_at": "2024-10-12T07:30:06Z",
|
||||
"pushed_at": "2022-03-10T18:44:50Z",
|
||||
"stargazers_count": 634,
|
||||
"watchers_count": 634,
|
||||
"stargazers_count": 635,
|
||||
"watchers_count": 635,
|
||||
"has_discussions": false,
|
||||
"forks_count": 98,
|
||||
"allow_forking": true,
|
||||
|
@ -1990,7 +1990,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 98,
|
||||
"watchers": 634,
|
||||
"watchers": 635,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
},
|
||||
|
@ -4721,10 +4721,10 @@
|
|||
"description": "Log4j Exploit Detection Logic for Zeek",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T17:25:52Z",
|
||||
"updated_at": "2022-02-09T10:00:20Z",
|
||||
"updated_at": "2024-10-12T10:55:49Z",
|
||||
"pushed_at": "2024-05-04T18:38:58Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -4736,7 +4736,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -169,8 +169,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-10-11T16:57:20Z",
|
||||
"updated_at": "2024-10-11T17:13:10Z",
|
||||
"pushed_at": "2024-10-11T17:13:06Z",
|
||||
"updated_at": "2024-10-12T11:13:11Z",
|
||||
"pushed_at": "2024-10-12T11:13:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-06-10T13:15:20Z",
|
||||
"updated_at": "2024-08-12T20:24:01Z",
|
||||
"updated_at": "2024-10-12T07:48:23Z",
|
||||
"pushed_at": "2022-06-13T17:00:33Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-10T16:24:51Z",
|
||||
"updated_at": "2024-09-25T08:36:08Z",
|
||||
"updated_at": "2024-10-12T08:35:14Z",
|
||||
"pushed_at": "2023-04-12T17:28:49Z",
|
||||
"stargazers_count": 274,
|
||||
"watchers_count": 274,
|
||||
"stargazers_count": 275,
|
||||
"watchers_count": 275,
|
||||
"has_discussions": false,
|
||||
"forks_count": 47,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 47,
|
||||
"watchers": 274,
|
||||
"watchers": 275,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "cve-2022-21907",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-11T05:00:55Z",
|
||||
"updated_at": "2022-03-21T07:03:34Z",
|
||||
"updated_at": "2024-10-12T10:25:17Z",
|
||||
"pushed_at": "2024-10-11T14:52:28Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "Security issue in the hypervisor firmware of some older Qualcomm chipsets",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-27T19:48:30Z",
|
||||
"updated_at": "2024-10-02T14:50:40Z",
|
||||
"updated_at": "2024-10-12T07:32:28Z",
|
||||
"pushed_at": "2022-12-27T20:32:37Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": true,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -33,8 +33,8 @@
|
|||
"security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 20,
|
||||
"forks": 1,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -105,10 +105,10 @@
|
|||
"description": "Detects attempts and successful exploitation of CVE-2022-26809",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-14T16:58:09Z",
|
||||
"updated_at": "2024-09-16T15:44:38Z",
|
||||
"updated_at": "2024-10-12T10:26:20Z",
|
||||
"pushed_at": "2024-09-16T15:44:34Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -117,7 +117,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 31,
|
||||
"watchers": 32,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
@ -44,7 +44,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-12-23T12:33:21Z",
|
||||
"updated_at": "2023-03-10T01:15:25Z",
|
||||
"pushed_at": "2024-10-11T02:37:08Z",
|
||||
"pushed_at": "2024-10-12T11:29:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-19T12:46:45Z",
|
||||
"updated_at": "2024-10-08T11:35:22Z",
|
||||
"updated_at": "2024-10-12T07:48:20Z",
|
||||
"pushed_at": "2022-09-06T14:05:22Z",
|
||||
"stargazers_count": 243,
|
||||
"watchers_count": 243,
|
||||
"stargazers_count": 244,
|
||||
"watchers_count": 244,
|
||||
"has_discussions": false,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 243,
|
||||
"watchers": 244,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
},
|
||||
|
|
|
@ -108,13 +108,13 @@
|
|||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"forks": 13,
|
||||
"watchers": 48,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "MOC3ingbird Exploit for Live2D (CVE-2023-27566)",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-03T01:57:28Z",
|
||||
"updated_at": "2024-09-28T03:10:19Z",
|
||||
"updated_at": "2024-10-12T07:47:08Z",
|
||||
"pushed_at": "2023-09-19T01:12:41Z",
|
||||
"stargazers_count": 77,
|
||||
"watchers_count": 77,
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"has_discussions": true,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 77,
|
||||
"watchers": 78,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2023-3824 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-11T10:53:04Z",
|
||||
"updated_at": "2024-10-11T15:14:00Z",
|
||||
"updated_at": "2024-10-12T12:12:20Z",
|
||||
"pushed_at": "2024-10-11T10:59:49Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -95,7 +95,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -193,10 +193,10 @@
|
|||
"description": "Bu betik, Microsoft Outlook'ta keşfedilen ve CVSS değeri 9.8 olan önemli bir güvenlik açığı olan CVE-2024-21413 için bir kavram kanıtı (PoC) sunmaktadır. MonikerLink hatası olarak adlandırılan bu güvenlik açığı, yerel NTLM bilgilerinin potansiyel sızıntısı ve uzaktan kod çalıştırma olasılığı dahil olmak üzere geniş kapsamlı etkilere sahiptir.",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-23T12:13:11Z",
|
||||
"updated_at": "2024-04-02T15:01:16Z",
|
||||
"updated_at": "2024-10-12T07:56:40Z",
|
||||
"pushed_at": "2024-02-24T15:36:22Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -205,7 +205,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -73,10 +73,10 @@
|
|||
"description": "CVE-2024-23897",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-26T09:44:32Z",
|
||||
"updated_at": "2024-09-23T03:28:47Z",
|
||||
"updated_at": "2024-10-12T07:59:45Z",
|
||||
"pushed_at": "2024-01-28T06:47:28Z",
|
||||
"stargazers_count": 190,
|
||||
"watchers_count": 190,
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"has_discussions": false,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"watchers": 190,
|
||||
"watchers": 191,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -982,10 +982,10 @@
|
|||
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-01T14:28:09Z",
|
||||
"updated_at": "2024-10-11T08:19:38Z",
|
||||
"updated_at": "2024-10-12T11:52:12Z",
|
||||
"pushed_at": "2024-04-03T04:58:50Z",
|
||||
"stargazers_count": 3491,
|
||||
"watchers_count": 3491,
|
||||
"stargazers_count": 3492,
|
||||
"watchers_count": 3492,
|
||||
"has_discussions": false,
|
||||
"forks_count": 239,
|
||||
"allow_forking": true,
|
||||
|
@ -994,7 +994,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 239,
|
||||
"watchers": 3491,
|
||||
"watchers": 3492,
|
||||
"score": 0,
|
||||
"subscribers_count": 38
|
||||
},
|
||||
|
|
32
2024/CVE-2024-3656.json
Normal file
32
2024/CVE-2024-3656.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 871549647,
|
||||
"name": "CVE-2024-3656",
|
||||
"full_name": "h4x0r-dz\/CVE-2024-3656",
|
||||
"owner": {
|
||||
"login": "h4x0r-dz",
|
||||
"id": 26070859,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26070859?v=4",
|
||||
"html_url": "https:\/\/github.com\/h4x0r-dz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/h4x0r-dz\/CVE-2024-3656",
|
||||
"description": "Keycloak admin API allows low privilege users to use administrative functions",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-12T09:17:00Z",
|
||||
"updated_at": "2024-10-12T12:04:30Z",
|
||||
"pushed_at": "2024-10-12T09:48:10Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2024-38200 - Microsoft Office NTLMv2 Disclosure Vulnerability ",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-24T19:24:55Z",
|
||||
"updated_at": "2024-10-10T14:59:31Z",
|
||||
"updated_at": "2024-10-12T08:14:19Z",
|
||||
"pushed_at": "2024-10-01T15:38:24Z",
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 115,
|
||||
"watchers": 116,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2024-38816 Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-28T23:16:23Z",
|
||||
"updated_at": "2024-09-28T23:16:23Z",
|
||||
"updated_at": "2024-10-12T08:27:06Z",
|
||||
"pushed_at": "2024-09-26T09:46:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "Unauthenticated Remote Code Execution via Angular-Base64-Upload Library ",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-09T14:35:06Z",
|
||||
"updated_at": "2024-10-11T18:41:59Z",
|
||||
"updated_at": "2024-10-12T10:22:25Z",
|
||||
"pushed_at": "2024-10-11T16:31:01Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -29,8 +29,8 @@
|
|||
"poc-exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -73,19 +73,19 @@
|
|||
"description": "Zimbra - Remote Command Execution (CVE-2024-45519)",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-05T00:15:18Z",
|
||||
"updated_at": "2024-10-11T11:18:58Z",
|
||||
"updated_at": "2024-10-12T09:23:17Z",
|
||||
"pushed_at": "2024-10-05T00:18:49Z",
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 88,
|
||||
"forks": 16,
|
||||
"watchers": 89,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -82,10 +82,10 @@
|
|||
"description": " A PoC exploit for the CVE-2024-7029 vulnerability found in AvTech devices, allowing Remote Code Execution (RCE)",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-08T10:04:08Z",
|
||||
"updated_at": "2024-10-11T16:47:25Z",
|
||||
"updated_at": "2024-10-12T09:07:03Z",
|
||||
"pushed_at": "2024-10-08T10:08:07Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -94,7 +94,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof-of-Concept for CVE-2024-8353",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-30T17:33:59Z",
|
||||
"updated_at": "2024-10-08T02:39:22Z",
|
||||
"updated_at": "2024-10-12T07:06:23Z",
|
||||
"pushed_at": "2024-10-01T00:04:52Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Proof of Concept Exploit for CVE-2024-9464",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-09T16:36:25Z",
|
||||
"updated_at": "2024-10-11T23:21:10Z",
|
||||
"updated_at": "2024-10-12T09:36:31Z",
|
||||
"pushed_at": "2024-10-09T16:41:41Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 22,
|
||||
"watchers": 24,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -774,6 +774,9 @@
|
|||
|
||||
- [alperenugurlu/CVE-2024-3596-Detector](https://github.com/alperenugurlu/CVE-2024-3596-Detector)
|
||||
|
||||
### CVE-2024-3656
|
||||
- [h4x0r-dz/CVE-2024-3656](https://github.com/h4x0r-dz/CVE-2024-3656)
|
||||
|
||||
### CVE-2024-3806 (2024-05-09)
|
||||
|
||||
<code>The Porto theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 7.1.0 via the 'porto_ajax_posts' function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php file type can be uploaded and included.
|
||||
|
@ -22092,7 +22095,6 @@
|
|||
- [tiagob0b/CVE-2021-22005](https://github.com/tiagob0b/CVE-2021-22005)
|
||||
- [Jun-5heng/CVE-2021-22005](https://github.com/Jun-5heng/CVE-2021-22005)
|
||||
- [shmilylty/cve-2021-22005-exp](https://github.com/shmilylty/cve-2021-22005-exp)
|
||||
- [timb-machine-mirrors/testanull-CVE-2021-22005.py](https://github.com/timb-machine-mirrors/testanull-CVE-2021-22005.py)
|
||||
- [InventorMAO/cve-2021-22005](https://github.com/InventorMAO/cve-2021-22005)
|
||||
|
||||
### CVE-2021-22006 (2021-09-23)
|
||||
|
@ -23206,7 +23208,6 @@
|
|||
|
||||
- [Shadow0ps/CVE-2021-28482-Exchange-POC](https://github.com/Shadow0ps/CVE-2021-28482-Exchange-POC)
|
||||
- [KevinWorst/CVE-2021-28482_Exploit](https://github.com/KevinWorst/CVE-2021-28482_Exploit)
|
||||
- [timb-machine-mirrors/testanull-CVE-2021-28482.py](https://github.com/timb-machine-mirrors/testanull-CVE-2021-28482.py)
|
||||
|
||||
### CVE-2021-28663 (2021-05-10)
|
||||
|
||||
|
@ -24976,6 +24977,8 @@
|
|||
|
||||
- [DarkSprings/CVE-2021-40539](https://github.com/DarkSprings/CVE-2021-40539)
|
||||
- [synacktiv/CVE-2021-40539](https://github.com/synacktiv/CVE-2021-40539)
|
||||
- [lpyzds/CVE-2021-40539](https://github.com/lpyzds/CVE-2021-40539)
|
||||
- [lpyydxs/CVE-2021-40539](https://github.com/lpyydxs/CVE-2021-40539)
|
||||
|
||||
### CVE-2021-40822 (2022-05-01)
|
||||
|
||||
|
@ -37377,7 +37380,6 @@
|
|||
- [twseptian/cve-2018-6574](https://github.com/twseptian/cve-2018-6574)
|
||||
- [the-valluvarsploit/CVE-2018-6574](https://github.com/the-valluvarsploit/CVE-2018-6574)
|
||||
- [yavolo/CVE-2018-6574](https://github.com/yavolo/CVE-2018-6574)
|
||||
- [ThaFWord/pentesterlab](https://github.com/ThaFWord/pentesterlab)
|
||||
- [jftierno/CVE-2018-6574](https://github.com/jftierno/CVE-2018-6574)
|
||||
- [Cypheer/exploit_CVE-2018-6574](https://github.com/Cypheer/exploit_CVE-2018-6574)
|
||||
- [jftierno/CVE-2018-6574-2](https://github.com/jftierno/CVE-2018-6574-2)
|
||||
|
|
Loading…
Reference in a new issue