Auto Update 2024/04/23 06:28:22

This commit is contained in:
motikan2010-bot 2024-04-23 15:28:22 +09:00
parent 85624e1867
commit fd3fc18f8d
37 changed files with 208 additions and 115 deletions

View file

@ -441,5 +441,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 790562403,
"name": "SmileySploit",
"full_name": "Tenor-Z\/SmileySploit",
"owner": {
"login": "Tenor-Z",
"id": 55516164,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55516164?v=4",
"html_url": "https:\/\/github.com\/Tenor-Z"
},
"html_url": "https:\/\/github.com\/Tenor-Z\/SmileySploit",
"description": "A basic script that exploits CVE-2011-2523",
"fork": false,
"created_at": "2024-04-23T05:33:39Z",
"updated_at": "2024-04-23T05:36:57Z",
"pushed_at": "2024-04-23T05:36:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -43,10 +43,10 @@
"description": "Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)",
"fork": false,
"created_at": "2018-10-17T14:14:12Z",
"updated_at": "2024-02-29T19:32:54Z",
"updated_at": "2024-04-23T03:40:37Z",
"pushed_at": "2023-12-19T20:46:55Z",
"stargazers_count": 495,
"watchers_count": 495,
"stargazers_count": 496,
"watchers_count": 496,
"has_discussions": false,
"forks_count": 121,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 121,
"watchers": 495,
"watchers": 496,
"score": 0,
"subscribers_count": 22
},

View file

@ -78,13 +78,13 @@
"stargazers_count": 145,
"watchers_count": 145,
"has_discussions": false,
"forks_count": 40,
"forks_count": 41,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 40,
"forks": 41,
"watchers": 145,
"score": 0,
"subscribers_count": 6

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2019-10-04T06:32:08Z",
"updated_at": "2024-03-23T16:06:48Z",
"updated_at": "2024-04-23T01:01:45Z",
"pushed_at": "2019-11-12T03:58:00Z",
"stargazers_count": 71,
"watchers_count": 71,
"stargazers_count": 72,
"watchers_count": 72,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 71,
"watchers": 72,
"score": 0,
"subscribers_count": 9
},

View file

@ -258,13 +258,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 4,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 3,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -318,10 +318,10 @@
"description": "Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.",
"fork": false,
"created_at": "2020-09-28T05:00:37Z",
"updated_at": "2024-03-28T20:15:12Z",
"updated_at": "2024-04-23T00:56:24Z",
"pushed_at": "2020-10-10T17:19:51Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -339,7 +339,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 23,
"watchers": 24,
"score": 0,
"subscribers_count": 2
},

View file

@ -63,6 +63,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,12 +13,12 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2024-04-22T14:04:41Z",
"updated_at": "2024-04-23T06:09:59Z",
"pushed_at": "2023-02-26T14:06:05Z",
"stargazers_count": 1129,
"watchers_count": 1129,
"stargazers_count": 1130,
"watchers_count": 1130,
"has_discussions": true,
"forks_count": 187,
"forks_count": 188,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -44,8 +44,8 @@
"gui"
],
"visibility": "public",
"forks": 187,
"watchers": 1129,
"forks": 188,
"watchers": 1130,
"score": 0,
"subscribers_count": 18
},

View file

@ -13,12 +13,12 @@
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
"updated_at": "2024-04-22T15:49:33Z",
"updated_at": "2024-04-23T01:44:52Z",
"pushed_at": "2024-04-05T06:46:47Z",
"stargazers_count": 198,
"watchers_count": 198,
"stargazers_count": 199,
"watchers_count": 199,
"has_discussions": true,
"forks_count": 23,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -27,8 +27,8 @@
"unisoc"
],
"visibility": "public",
"forks": 23,
"watchers": 198,
"forks": 25,
"watchers": 199,
"score": 0,
"subscribers_count": 6
}

View file

@ -227,10 +227,10 @@
"description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ",
"fork": false,
"created_at": "2022-09-26T08:58:21Z",
"updated_at": "2024-04-12T11:36:33Z",
"updated_at": "2024-04-23T03:10:44Z",
"pushed_at": "2022-09-26T13:20:38Z",
"stargazers_count": 303,
"watchers_count": 303,
"stargazers_count": 304,
"watchers_count": 304,
"has_discussions": false,
"forks_count": 46,
"allow_forking": true,
@ -243,7 +243,7 @@
],
"visibility": "public",
"forks": 46,
"watchers": 303,
"watchers": 304,
"score": 0,
"subscribers_count": 5
},

View file

@ -330,5 +330,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 790464197,
"name": "CVE-2023-0386-libs",
"full_name": "EstamelGG\/CVE-2023-0386-libs",
"owner": {
"login": "EstamelGG",
"id": 46676047,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46676047?v=4",
"html_url": "https:\/\/github.com\/EstamelGG"
},
"html_url": "https:\/\/github.com\/EstamelGG\/CVE-2023-0386-libs",
"description": "CVE-2023-0386 包含所需运行库",
"fork": false,
"created_at": "2024-04-22T23:33:35Z",
"updated_at": "2024-04-23T04:29:41Z",
"pushed_at": "2024-04-23T04:29:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -147,7 +147,7 @@
"forks": 11,
"watchers": 30,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 706567964,

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-06-12T10:44:59Z",
"updated_at": "2024-04-19T05:52:38Z",
"pushed_at": "2024-04-12T18:23:49Z",
"pushed_at": "2024-04-23T05:44:07Z",
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,

View file

@ -73,10 +73,10 @@
"description": "GameOver(lay) Ubuntu Privilege Escalation",
"fork": false,
"created_at": "2023-10-09T22:02:42Z",
"updated_at": "2024-04-12T04:08:39Z",
"updated_at": "2024-04-23T02:34:53Z",
"pushed_at": "2023-10-09T22:44:21Z",
"stargazers_count": 98,
"watchers_count": 98,
"stargazers_count": 99,
"watchers_count": 99,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 98,
"watchers": 99,
"score": 0,
"subscribers_count": 1
},

View file

@ -563,8 +563,8 @@
"description": "An issue was discovered in cPanel before 11.109.9999.116. Cross-Site Scripting can occur on the cpsrvd error page via an invalid webcall ID.",
"fork": false,
"created_at": "2024-04-21T12:26:22Z",
"updated_at": "2024-04-21T13:50:09Z",
"pushed_at": "2024-04-21T13:50:05Z",
"updated_at": "2024-04-23T05:24:47Z",
"pushed_at": "2024-04-23T05:24:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -73,10 +73,10 @@
"description": "Use-After-Free in Netfilter nf_tables when processing batch requests CVE-2023-32233",
"fork": false,
"created_at": "2023-05-16T05:58:03Z",
"updated_at": "2024-04-18T10:35:12Z",
"updated_at": "2024-04-23T02:58:15Z",
"pushed_at": "2023-06-20T06:58:04Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 47,
"watchers": 48,
"score": 0,
"subscribers_count": 1
},

View file

@ -87,6 +87,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,12 +13,12 @@
"description": "JetBrains TeamCity Authentication Bypass CVE-2023-42793 Exploit",
"fork": false,
"created_at": "2023-09-29T06:43:35Z",
"updated_at": "2024-04-22T09:03:59Z",
"updated_at": "2024-04-23T02:48:36Z",
"pushed_at": "2023-12-14T06:07:44Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -29,8 +29,8 @@
"teamcity"
],
"visibility": "public",
"forks": 8,
"watchers": 30,
"forks": 9,
"watchers": 32,
"score": 0,
"subscribers_count": 2
},

View file

@ -393,6 +393,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-04-22T18:01:28Z",
"updated_at": "2024-04-23T02:08:12Z",
"pushed_at": "2024-04-08T13:43:21Z",
"stargazers_count": 418,
"watchers_count": 418,
"stargazers_count": 420,
"watchers_count": 420,
"has_discussions": false,
"forks_count": 66,
"allow_forking": true,
@ -25,9 +25,9 @@
"topics": [],
"visibility": "public",
"forks": 66,
"watchers": 418,
"watchers": 420,
"score": 0,
"subscribers_count": 7
"subscribers_count": 8
},
{
"id": 743886715,

View file

@ -13,10 +13,10 @@
"description": "Fortinet FortiClient EMS SQL Injection",
"fork": false,
"created_at": "2024-03-18T20:50:48Z",
"updated_at": "2024-04-19T10:59:53Z",
"updated_at": "2024-04-23T02:36:56Z",
"pushed_at": "2024-03-20T20:42:41Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 36,
"watchers": 37,
"score": 0,
"subscribers_count": 5
},

View file

@ -27,6 +27,6 @@
"forks": 2,
"watchers": 21,
"score": 0,
"subscribers_count": 3
"subscribers_count": 4
}
]

View file

@ -27,7 +27,7 @@
"forks": 21,
"watchers": 73,
"score": 0,
"subscribers_count": 3
"subscribers_count": 4
},
{
"id": 782584156,

View file

@ -13,10 +13,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-04-22T18:39:04Z",
"updated_at": "2024-04-23T06:08:08Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 1873,
"watchers_count": 1873,
"stargazers_count": 1875,
"watchers_count": 1875,
"has_discussions": false,
"forks_count": 232,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 232,
"watchers": 1873,
"watchers": 1875,
"score": 0,
"subscribers_count": 19
},

View file

@ -13,10 +13,10 @@
"description": "This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.",
"fork": false,
"created_at": "2024-04-12T15:07:42Z",
"updated_at": "2024-04-22T19:15:35Z",
"updated_at": "2024-04-23T05:34:36Z",
"pushed_at": "2024-04-18T14:31:34Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 26,
"watchers": 28,
"score": 0,
"subscribers_count": 5
}

View file

@ -13,20 +13,20 @@
"description": "Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability",
"fork": false,
"created_at": "2024-04-22T07:05:04Z",
"updated_at": "2024-04-23T00:19:14Z",
"updated_at": "2024-04-23T06:21:32Z",
"pushed_at": "2024-04-22T10:08:45Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 69,
"watchers_count": 69,
"has_discussions": false,
"forks_count": 8,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 44,
"forks": 12,
"watchers": 69,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.",
"fork": false,
"created_at": "2024-04-13T05:53:02Z",
"updated_at": "2024-04-23T00:34:31Z",
"updated_at": "2024-04-23T06:18:53Z",
"pushed_at": "2024-04-16T21:00:14Z",
"stargazers_count": 195,
"watchers_count": 195,
"stargazers_count": 196,
"watchers_count": 196,
"has_discussions": false,
"forks_count": 44,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 44,
"watchers": 195,
"watchers": 196,
"score": 0,
"subscribers_count": 2
},

View file

@ -147,7 +147,7 @@
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 751817784,

View file

@ -27,7 +27,7 @@
"forks": 9,
"watchers": 46,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 784676322,

View file

@ -37,6 +37,6 @@
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-29296 - User enumeration on Portainer CE - 2.19.4",
"fork": false,
"created_at": "2024-04-09T20:36:03Z",
"updated_at": "2024-04-10T19:24:51Z",
"updated_at": "2024-04-23T06:27:23Z",
"pushed_at": "2024-04-11T13:53:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -27,7 +27,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 787871319,
@ -87,6 +87,6 @@
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -194,5 +194,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 790582261,
"name": "CVE-2024-3273-",
"full_name": "mrrobot0o\/CVE-2024-3273-",
"owner": {
"login": "mrrobot0o",
"id": 88867340,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88867340?v=4",
"html_url": "https:\/\/github.com\/mrrobot0o"
},
"html_url": "https:\/\/github.com\/mrrobot0o\/CVE-2024-3273-",
"description": null,
"fork": false,
"created_at": "2024-04-23T06:31:19Z",
"updated_at": "2024-04-23T06:31:22Z",
"pushed_at": "2024-04-23T06:31:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -73,10 +73,10 @@
"description": "CVE-2024-3400",
"fork": false,
"created_at": "2024-04-13T14:00:31Z",
"updated_at": "2024-04-20T13:36:57Z",
"updated_at": "2024-04-23T04:23:40Z",
"pushed_at": "2024-04-18T07:11:17Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 35,
"watchers": 37,
"score": 0,
"subscribers_count": 2
},
@ -283,19 +283,19 @@
"description": "CVE-2024-3400 Palo Alto OS Command Injection",
"fork": false,
"created_at": "2024-04-16T14:18:08Z",
"updated_at": "2024-04-22T21:37:50Z",
"updated_at": "2024-04-23T02:25:25Z",
"pushed_at": "2024-04-16T22:35:43Z",
"stargazers_count": 110,
"watchers_count": 110,
"stargazers_count": 112,
"watchers_count": 112,
"has_discussions": false,
"forks_count": 18,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 110,
"forks": 19,
"watchers": 112,
"score": 0,
"subscribers_count": 1
},
@ -313,10 +313,10 @@
"description": "CVE-2024-3400-RCE",
"fork": false,
"created_at": "2024-04-16T16:18:56Z",
"updated_at": "2024-04-22T20:43:30Z",
"updated_at": "2024-04-23T04:37:55Z",
"pushed_at": "2024-04-22T08:50:27Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -325,7 +325,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 25,
"watchers": 29,
"score": 0,
"subscribers_count": 3
},
@ -403,19 +403,19 @@
"description": "CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect",
"fork": false,
"created_at": "2024-04-16T21:24:15Z",
"updated_at": "2024-04-22T14:37:12Z",
"updated_at": "2024-04-23T03:33:59Z",
"pushed_at": "2024-04-17T11:03:32Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"forks": 2,
"watchers": 7,
"score": 0,
"subscribers_count": 2
},
@ -477,7 +477,7 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
},
{
"id": 788013743,

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -375,6 +375,7 @@
- [K3ysTr0K3R/CVE-2024-3273-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2024-3273-EXPLOIT)
- [ThatNotEasy/CVE-2024-3273](https://github.com/ThatNotEasy/CVE-2024-3273)
- [LeopoldSkell/CVE-2024-3273](https://github.com/LeopoldSkell/CVE-2024-3273)
- [mrrobot0o/CVE-2024-3273-](https://github.com/mrrobot0o/CVE-2024-3273-)
### CVE-2024-3400 (2024-04-12)
@ -1678,6 +1679,7 @@
- [puckiestyle/CVE-2023-0386](https://github.com/puckiestyle/CVE-2023-0386)
- [letsr00t/CVE-2023-0386](https://github.com/letsr00t/CVE-2023-0386)
- [churamanib/CVE-2023-0386](https://github.com/churamanib/CVE-2023-0386)
- [EstamelGG/CVE-2023-0386-libs](https://github.com/EstamelGG/CVE-2023-0386-libs)
### CVE-2023-0461 (2023-02-28)
@ -40962,6 +40964,7 @@
- [chleba124/vsftpd-exploit](https://github.com/chleba124/vsftpd-exploit)
- [4m3rr0r/CVE-2011-2523-poc](https://github.com/4m3rr0r/CVE-2011-2523-poc)
- [Shubham-2k1/Exploit-CVE-2011-2523](https://github.com/Shubham-2k1/Exploit-CVE-2011-2523)
- [Tenor-Z/SmileySploit](https://github.com/Tenor-Z/SmileySploit)
### CVE-2011-2894 (2011-10-04)