mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/12/24 00:31:38
This commit is contained in:
parent
4dac3ea6f7
commit
f687cf902d
21 changed files with 148 additions and 107 deletions
|
@ -1108,10 +1108,10 @@
|
|||
"description": ":broken_heart: Hearbleed exploit to retrieve sensitive information CVE-2014-0160 :broken_heart:",
|
||||
"fork": false,
|
||||
"created_at": "2015-03-08T19:54:33Z",
|
||||
"updated_at": "2024-11-14T20:34:27Z",
|
||||
"updated_at": "2024-12-23T18:21:57Z",
|
||||
"pushed_at": "2021-02-20T19:41:03Z",
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"has_discussions": false,
|
||||
"forks_count": 42,
|
||||
"allow_forking": true,
|
||||
|
@ -1120,7 +1120,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 42,
|
||||
"watchers": 80,
|
||||
"watchers": 81,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Array.prototype.slice wrong alias information.",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-25T02:33:18Z",
|
||||
"updated_at": "2024-08-12T19:47:12Z",
|
||||
"updated_at": "2024-12-23T19:57:22Z",
|
||||
"pushed_at": "2019-03-25T02:41:43Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 67,
|
||||
"watchers": 68,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -224,15 +224,15 @@
|
|||
{
|
||||
"id": 818448931,
|
||||
"name": "cve-2021-31630",
|
||||
"full_name": "adibabdala123\/cve-2021-31630",
|
||||
"full_name": "ttps-byte\/cve-2021-31630",
|
||||
"owner": {
|
||||
"login": "adibabdala123",
|
||||
"login": "ttps-byte",
|
||||
"id": 76139191,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76139191?v=4",
|
||||
"html_url": "https:\/\/github.com\/adibabdala123",
|
||||
"html_url": "https:\/\/github.com\/ttps-byte",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/adibabdala123\/cve-2021-31630",
|
||||
"html_url": "https:\/\/github.com\/ttps-byte\/cve-2021-31630",
|
||||
"description": "This is a automation of cve-2021-31630 exploitation",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-21T22:10:49Z",
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Apache Log4j 远程代码执行",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-09T15:27:38Z",
|
||||
"updated_at": "2024-11-02T09:32:11Z",
|
||||
"updated_at": "2024-12-23T21:14:37Z",
|
||||
"pushed_at": "2023-05-14T04:54:32Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"has_discussions": false,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 27,
|
||||
"watchers": 75,
|
||||
"watchers": 76,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -935,10 +935,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2024-12-23T05:30:44Z",
|
||||
"updated_at": "2024-12-23T21:14:48Z",
|
||||
"pushed_at": "2024-02-12T22:37:25Z",
|
||||
"stargazers_count": 1811,
|
||||
"watchers_count": 1811,
|
||||
"stargazers_count": 1812,
|
||||
"watchers_count": 1812,
|
||||
"has_discussions": false,
|
||||
"forks_count": 529,
|
||||
"allow_forking": true,
|
||||
|
@ -952,7 +952,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 529,
|
||||
"watchers": 1811,
|
||||
"watchers": 1812,
|
||||
"score": 0,
|
||||
"subscribers_count": 26
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Local privilege escalation PoC for Linux kernel CVE-2022-1015",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-02T03:27:11Z",
|
||||
"updated_at": "2024-11-23T19:24:29Z",
|
||||
"updated_at": "2024-12-23T23:38:25Z",
|
||||
"pushed_at": "2022-04-03T01:36:45Z",
|
||||
"stargazers_count": 200,
|
||||
"watchers_count": 200,
|
||||
"stargazers_count": 202,
|
||||
"watchers_count": 202,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 200,
|
||||
"watchers": 202,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
},
|
||||
|
|
|
@ -15,7 +15,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2024-11-15T22:21:16Z",
|
||||
"updated_at": "2024-11-15T22:24:28Z",
|
||||
"pushed_at": "2024-12-12T21:02:01Z",
|
||||
"pushed_at": "2024-12-23T23:40:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -29,44 +29,5 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 893013183,
|
||||
"name": "CVE-2022-45354",
|
||||
"full_name": "NekomataCode\/CVE-2022-45354",
|
||||
"owner": {
|
||||
"login": "NekomataCode",
|
||||
"id": 173536806,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/173536806?v=4",
|
||||
"html_url": "https:\/\/github.com\/NekomataCode",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/NekomataCode\/CVE-2022-45354",
|
||||
"description": "CVE-2022-45354 Download Monitor <= 4.7.60 - Sensitive Information Exposure via REST API",
|
||||
"fork": false,
|
||||
"created_at": "2024-11-23T09:56:19Z",
|
||||
"updated_at": "2024-11-24T00:04:48Z",
|
||||
"pushed_at": "2024-11-24T00:04:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2022-45354",
|
||||
"wordpress-bugs",
|
||||
"wordpress-hack",
|
||||
"wordpress-hacking",
|
||||
"wordpress-vuln",
|
||||
"wordpress-vulnerability",
|
||||
"wordpress-vulnerable"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Exploit for CVE-2023-27532 against Veeam Backup & Replication",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-23T16:08:43Z",
|
||||
"updated_at": "2024-12-23T12:47:32Z",
|
||||
"updated_at": "2024-12-23T19:54:11Z",
|
||||
"pushed_at": "2023-03-23T18:03:27Z",
|
||||
"stargazers_count": 103,
|
||||
"watchers_count": 103,
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 103,
|
||||
"watchers": 104,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -641,13 +641,13 @@
|
|||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "exploits for CVE-2024-20017",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-30T05:54:36Z",
|
||||
"updated_at": "2024-12-03T14:32:42Z",
|
||||
"updated_at": "2024-12-24T00:01:39Z",
|
||||
"pushed_at": "2024-09-07T10:11:22Z",
|
||||
"stargazers_count": 136,
|
||||
"watchers_count": 136,
|
||||
"stargazers_count": 137,
|
||||
"watchers_count": 137,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 136,
|
||||
"watchers": 137,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"forks": 14,
|
||||
"watchers": 95,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
|
|
|
@ -50,13 +50,13 @@
|
|||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
@ -81,13 +81,13 @@
|
|||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "CVE-2024-28987 Scanner & Exploiter - SolarWinds Web Help Desk",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-30T16:12:14Z",
|
||||
"updated_at": "2024-11-20T16:31:06Z",
|
||||
"pushed_at": "2024-10-02T20:28:28Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"updated_at": "2024-12-23T19:58:15Z",
|
||||
"pushed_at": "2024-12-23T19:58:11Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -88,7 +88,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,19 +14,19 @@
|
|||
"description": "CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-24T19:24:55Z",
|
||||
"updated_at": "2024-12-23T17:25:40Z",
|
||||
"updated_at": "2024-12-23T20:53:47Z",
|
||||
"pushed_at": "2024-12-09T22:58:22Z",
|
||||
"stargazers_count": 132,
|
||||
"watchers_count": 132,
|
||||
"stargazers_count": 133,
|
||||
"watchers_count": 133,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 132,
|
||||
"forks": 27,
|
||||
"watchers": 133,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -112,13 +112,13 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"forks": 6,
|
||||
"watchers": 19,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
@ -50,7 +50,7 @@
|
|||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -62,7 +62,7 @@
|
|||
"rce-exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
33
2024/CVE-2024-52002.json
Normal file
33
2024/CVE-2024-52002.json
Normal file
|
@ -0,0 +1,33 @@
|
|||
[
|
||||
{
|
||||
"id": 907531691,
|
||||
"name": "iTop-CVEs-exploit",
|
||||
"full_name": "Harshit-Mashru\/iTop-CVEs-exploit",
|
||||
"owner": {
|
||||
"login": "Harshit-Mashru",
|
||||
"id": 31271975,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31271975?v=4",
|
||||
"html_url": "https:\/\/github.com\/Harshit-Mashru",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Harshit-Mashru\/iTop-CVEs-exploit",
|
||||
"description": "This repository contains exploits for iTOP CVE-2024-52002, 52000, 31998, 31448 that involve CSRF+XSS chaining to get RCE",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-23T19:56:56Z",
|
||||
"updated_at": "2024-12-23T20:38:40Z",
|
||||
"pushed_at": "2024-12-23T20:38:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -138,10 +138,10 @@
|
|||
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-18T02:03:56Z",
|
||||
"updated_at": "2024-12-23T10:25:33Z",
|
||||
"updated_at": "2024-12-23T20:07:47Z",
|
||||
"pushed_at": "2024-12-18T02:08:09Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -150,7 +150,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "CVE-2024-8504",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-22T20:17:10Z",
|
||||
"updated_at": "2024-12-01T19:54:33Z",
|
||||
"updated_at": "2024-12-23T19:59:21Z",
|
||||
"pushed_at": "2024-10-04T00:43:08Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -32,5 +32,45 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 907588481,
|
||||
"name": "CVE-2024-9290",
|
||||
"full_name": "Jenderal92\/CVE-2024-9290",
|
||||
"owner": {
|
||||
"login": "Jenderal92",
|
||||
"id": 59664965,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59664965?v=4",
|
||||
"html_url": "https:\/\/github.com\/Jenderal92",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Jenderal92\/CVE-2024-9290",
|
||||
"description": "The tool targets WordPress websites that use the Super Backup & Clone plugin and are vulnerable to arbitrary file upload.",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-24T00:04:17Z",
|
||||
"updated_at": "2024-12-24T00:07:21Z",
|
||||
"pushed_at": "2024-12-24T00:05:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2024-9290",
|
||||
"ethical-hacking",
|
||||
"exploit-script",
|
||||
"penetration-testing",
|
||||
"vulnerability",
|
||||
"vulnerability-detection",
|
||||
"wordpress-exploit",
|
||||
"wordpress-vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
11
README.md
11
README.md
|
@ -1859,6 +1859,7 @@
|
|||
</code>
|
||||
|
||||
- [RandomRobbieBF/CVE-2024-9290](https://github.com/RandomRobbieBF/CVE-2024-9290)
|
||||
- [Jenderal92/CVE-2024-9290](https://github.com/Jenderal92/CVE-2024-9290)
|
||||
|
||||
### CVE-2024-9326 (2024-09-29)
|
||||
|
||||
|
@ -7444,6 +7445,13 @@
|
|||
|
||||
- [l20170217b/CVE-2024-51747](https://github.com/l20170217b/CVE-2024-51747)
|
||||
|
||||
### CVE-2024-52002 (2024-11-08)
|
||||
|
||||
<code>Combodo iTop is a simple, web based IT Service Management tool. Several url endpoints are subject to a Cross-Site Request Forgery (CSRF) vulnerability. Please refer to the linked GHSA for the complete list. This issue has been addressed in version 3.2.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
|
||||
</code>
|
||||
|
||||
- [Harshit-Mashru/iTop-CVEs-exploit](https://github.com/Harshit-Mashru/iTop-CVEs-exploit)
|
||||
|
||||
### CVE-2024-52301 (2024-11-12)
|
||||
|
||||
<code>Laravel is a web application framework. When the register_argc_argv php directive is set to on , and users call any URL with a special crafted query string, they are able to change the environment used by the framework when handling the request. The vulnerability fixed in 6.20.45, 7.30.7, 8.83.28, 9.52.17, 10.48.23, and 11.31.0. The framework now ignores argv values for environment detection on non-cli SAPIs.
|
||||
|
@ -22402,7 +22410,6 @@
|
|||
</code>
|
||||
|
||||
- [RandomRobbieBF/CVE-2022-45354](https://github.com/RandomRobbieBF/CVE-2022-45354)
|
||||
- [NekomataCode/CVE-2022-45354](https://github.com/NekomataCode/CVE-2022-45354)
|
||||
|
||||
### CVE-2022-45436 (2023-02-15)
|
||||
|
||||
|
@ -26181,7 +26188,7 @@
|
|||
- [mind2hex/CVE-2021-31630](https://github.com/mind2hex/CVE-2021-31630)
|
||||
- [sealldeveloper/CVE-2021-31630-PoC](https://github.com/sealldeveloper/CVE-2021-31630-PoC)
|
||||
- [junnythemarksman/CVE-2021-31630](https://github.com/junnythemarksman/CVE-2021-31630)
|
||||
- [adibabdala123/cve-2021-31630](https://github.com/adibabdala123/cve-2021-31630)
|
||||
- [ttps-byte/cve-2021-31630](https://github.com/ttps-byte/cve-2021-31630)
|
||||
- [manuelsantosiglesias/CVE-2021-31630](https://github.com/manuelsantosiglesias/CVE-2021-31630)
|
||||
- [FlojBoj/CVE-2021-31630](https://github.com/FlojBoj/CVE-2021-31630)
|
||||
|
||||
|
|
Loading…
Reference in a new issue