mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/03/28 00:26:31
This commit is contained in:
parent
750ab042a5
commit
ff48f56792
35 changed files with 266 additions and 218 deletions
|
@ -73,10 +73,10 @@
|
|||
"description": "SambaCry exploit and vulnerable container (CVE-2017-7494)",
|
||||
"fork": false,
|
||||
"created_at": "2017-05-26T00:58:25Z",
|
||||
"updated_at": "2024-02-07T04:27:39Z",
|
||||
"updated_at": "2024-03-27T20:00:05Z",
|
||||
"pushed_at": "2022-12-27T20:25:09Z",
|
||||
"stargazers_count": 367,
|
||||
"watchers_count": 367,
|
||||
"stargazers_count": 368,
|
||||
"watchers_count": 368,
|
||||
"has_discussions": false,
|
||||
"forks_count": 99,
|
||||
"allow_forking": true,
|
||||
|
@ -91,7 +91,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 99,
|
||||
"watchers": 367,
|
||||
"watchers": 368,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
@ -169,10 +169,10 @@
|
|||
"description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-06-05T16:25:57Z",
|
||||
"updated_at": "2024-01-04T16:14:38Z",
|
||||
"updated_at": "2024-03-27T20:05:20Z",
|
||||
"pushed_at": "2021-03-09T09:12:55Z",
|
||||
"stargazers_count": 258,
|
||||
"watchers_count": 258,
|
||||
"stargazers_count": 259,
|
||||
"watchers_count": 259,
|
||||
"has_discussions": false,
|
||||
"forks_count": 80,
|
||||
"allow_forking": true,
|
||||
|
@ -181,7 +181,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 80,
|
||||
"watchers": 258,
|
||||
"watchers": 259,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
|
|
|
@ -1841,10 +1841,10 @@
|
|||
"description": "Proof of concept for CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T16:53:54Z",
|
||||
"updated_at": "2024-03-21T15:50:09Z",
|
||||
"updated_at": "2024-03-27T20:01:48Z",
|
||||
"pushed_at": "2021-12-02T12:00:46Z",
|
||||
"stargazers_count": 1160,
|
||||
"watchers_count": 1160,
|
||||
"stargazers_count": 1161,
|
||||
"watchers_count": 1161,
|
||||
"has_discussions": false,
|
||||
"forks_count": 346,
|
||||
"allow_forking": true,
|
||||
|
@ -1853,7 +1853,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 346,
|
||||
"watchers": 1160,
|
||||
"watchers": 1161,
|
||||
"score": 0,
|
||||
"subscribers_count": 68
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2024-03-26T22:13:16Z",
|
||||
"updated_at": "2024-03-27T21:04:19Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1782,
|
||||
"watchers_count": 1782,
|
||||
"stargazers_count": 1783,
|
||||
"watchers_count": 1783,
|
||||
"has_discussions": false,
|
||||
"forks_count": 259,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 259,
|
||||
"watchers": 1782,
|
||||
"watchers": 1783,
|
||||
"score": 0,
|
||||
"subscribers_count": 37
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-09T22:30:42Z",
|
||||
"updated_at": "2024-03-05T19:31:51Z",
|
||||
"updated_at": "2024-03-27T22:26:45Z",
|
||||
"pushed_at": "2023-09-28T18:58:28Z",
|
||||
"stargazers_count": 672,
|
||||
"watchers_count": 672,
|
||||
"stargazers_count": 671,
|
||||
"watchers_count": 671,
|
||||
"has_discussions": false,
|
||||
"forks_count": 137,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 137,
|
||||
"watchers": 672,
|
||||
"watchers": 671,
|
||||
"score": 0,
|
||||
"subscribers_count": 44
|
||||
},
|
||||
|
|
|
@ -313,7 +313,7 @@
|
|||
"forks": 13,
|
||||
"watchers": 65,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
"subscribers_count": 5
|
||||
},
|
||||
{
|
||||
"id": 234442281,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Little thing put together quickly to demonstrate this CVE ",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-16T01:10:33Z",
|
||||
"updated_at": "2024-03-22T11:34:05Z",
|
||||
"updated_at": "2024-03-27T19:28:31Z",
|
||||
"pushed_at": "2022-09-11T22:06:40Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 22,
|
||||
"watchers": 23,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-08T07:37:49Z",
|
||||
"updated_at": "2024-03-23T18:19:54Z",
|
||||
"updated_at": "2024-03-27T18:33:50Z",
|
||||
"pushed_at": "2021-08-07T16:48:55Z",
|
||||
"stargazers_count": 398,
|
||||
"watchers_count": 398,
|
||||
"stargazers_count": 399,
|
||||
"watchers_count": 399,
|
||||
"has_discussions": false,
|
||||
"forks_count": 70,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 70,
|
||||
"watchers": 398,
|
||||
"watchers": 399,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 184,
|
||||
"watchers_count": 184,
|
||||
"has_discussions": false,
|
||||
"forks_count": 43,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 43,
|
||||
"forks": 44,
|
||||
"watchers": 184,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
@ -138,7 +138,7 @@
|
|||
"stargazers_count": 253,
|
||||
"watchers_count": 253,
|
||||
"has_discussions": false,
|
||||
"forks_count": 99,
|
||||
"forks_count": 100,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -146,7 +146,7 @@
|
|||
"cve-2021-22205"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 99,
|
||||
"forks": 100,
|
||||
"watchers": 253,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
@ -225,10 +225,10 @@
|
|||
"description": "CVE-2021-22205未授权漏洞批量检测与利用工具",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-31T04:15:30Z",
|
||||
"updated_at": "2023-09-12T11:13:45Z",
|
||||
"updated_at": "2024-03-27T18:37:33Z",
|
||||
"pushed_at": "2021-11-04T12:49:58Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -239,7 +239,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 31,
|
||||
"watchers": 32,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -412,13 +412,13 @@
|
|||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
@ -478,7 +478,7 @@
|
|||
"stargazers_count": 205,
|
||||
"watchers_count": 205,
|
||||
"has_discussions": false,
|
||||
"forks_count": 38,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -491,7 +491,7 @@
|
|||
"security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"forks": 39,
|
||||
"watchers": 205,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 15,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -48,10 +48,10 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T10:28:12Z",
|
||||
"updated_at": "2024-03-21T15:24:28Z",
|
||||
"updated_at": "2024-03-27T20:42:58Z",
|
||||
"pushed_at": "2023-01-29T03:31:27Z",
|
||||
"stargazers_count": 704,
|
||||
"watchers_count": 704,
|
||||
"stargazers_count": 705,
|
||||
"watchers_count": 705,
|
||||
"has_discussions": false,
|
||||
"forks_count": 115,
|
||||
"allow_forking": true,
|
||||
|
@ -60,7 +60,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 115,
|
||||
"watchers": 704,
|
||||
"watchers": 705,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
},
|
||||
|
|
|
@ -1239,5 +1239,35 @@
|
|||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 778520336,
|
||||
"name": "CVE-2021-43798",
|
||||
"full_name": "ticofookfook\/CVE-2021-43798",
|
||||
"owner": {
|
||||
"login": "ticofookfook",
|
||||
"id": 99700348,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99700348?v=4",
|
||||
"html_url": "https:\/\/github.com\/ticofookfook"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ticofookfook\/CVE-2021-43798",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-03-27T21:47:06Z",
|
||||
"updated_at": "2024-03-27T21:57:13Z",
|
||||
"pushed_at": "2024-03-27T22:02:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -907,10 +907,10 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2024-03-26T22:37:44Z",
|
||||
"updated_at": "2024-03-27T21:06:51Z",
|
||||
"pushed_at": "2024-02-12T22:37:25Z",
|
||||
"stargazers_count": 1734,
|
||||
"watchers_count": 1734,
|
||||
"stargazers_count": 1735,
|
||||
"watchers_count": 1735,
|
||||
"has_discussions": false,
|
||||
"forks_count": 514,
|
||||
"allow_forking": true,
|
||||
|
@ -924,7 +924,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 514,
|
||||
"watchers": 1734,
|
||||
"watchers": 1735,
|
||||
"score": 0,
|
||||
"subscribers_count": 28
|
||||
},
|
||||
|
@ -1428,7 +1428,7 @@
|
|||
"stargazers_count": 854,
|
||||
"watchers_count": 854,
|
||||
"has_discussions": false,
|
||||
"forks_count": 173,
|
||||
"forks_count": 174,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -1447,7 +1447,7 @@
|
|||
"scanner"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 173,
|
||||
"forks": 174,
|
||||
"watchers": 854,
|
||||
"score": 0,
|
||||
"subscribers_count": 33
|
||||
|
@ -12005,10 +12005,10 @@
|
|||
"description": "Vulnerability CVE-2021-44228 allows remote code execution without authentication for several versions of Apache Log4j2 (Log4Shell). Attackers can exploit vulnerable servers by connecting over any protocol, such as HTTPS, and sending a specially crafted string.",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-31T20:29:26Z",
|
||||
"updated_at": "2023-09-28T11:44:58Z",
|
||||
"updated_at": "2024-03-27T19:53:25Z",
|
||||
"pushed_at": "2023-01-31T20:35:59Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -12031,7 +12031,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"forks": 4,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -29,45 +29,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 523301905,
|
||||
"name": "CVE-2022-1040",
|
||||
"full_name": "APTIRAN\/CVE-2022-1040",
|
||||
"owner": {
|
||||
"login": "APTIRAN",
|
||||
"id": 80196564,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80196564?v=4",
|
||||
"html_url": "https:\/\/github.com\/APTIRAN"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/APTIRAN\/CVE-2022-1040",
|
||||
"description": "This vulnerability allows an attacker to gain unauthorized access to the firewall management space by bypassing authentication",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-10T10:38:59Z",
|
||||
"updated_at": "2024-01-24T06:11:09Z",
|
||||
"pushed_at": "2022-10-21T07:55:22Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2022-1040",
|
||||
"cve-2022-1040-poc",
|
||||
"exploit",
|
||||
"firewall",
|
||||
"poc",
|
||||
"sophos",
|
||||
"sophos-xg",
|
||||
"xg115w"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 29,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 541212587,
|
||||
"name": "Sophos-Vulnerability",
|
||||
|
@ -128,6 +89,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 559654558,
|
||||
"name": "CVE-2022-1040",
|
||||
"full_name": "jackson5sec\/CVE-2022-1040",
|
||||
"owner": {
|
||||
"login": "jackson5sec",
|
||||
"id": 17192323,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17192323?v=4",
|
||||
"html_url": "https:\/\/github.com\/jackson5sec"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/jackson5sec\/CVE-2022-1040",
|
||||
"description": "This vulnerability allows an attacker to gain unauthorized access to the firewall management space by bypassing authentication",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-30T19:20:57Z",
|
||||
"updated_at": "2022-10-24T03:11:53Z",
|
||||
"pushed_at": "2022-10-21T07:55:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 586568152,
|
||||
"name": "CVE-2022-1040",
|
||||
|
|
|
@ -150,40 +150,34 @@
|
|||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 562600305,
|
||||
"id": 563211004,
|
||||
"name": "CVE-2022-21661",
|
||||
"full_name": "APTIRAN\/CVE-2022-21661",
|
||||
"full_name": "safe3s\/CVE-2022-21661",
|
||||
"owner": {
|
||||
"login": "APTIRAN",
|
||||
"id": 80196564,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80196564?v=4",
|
||||
"html_url": "https:\/\/github.com\/APTIRAN"
|
||||
"login": "safe3s",
|
||||
"id": 108328094,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108328094?v=4",
|
||||
"html_url": "https:\/\/github.com\/safe3s"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/APTIRAN\/CVE-2022-21661",
|
||||
"html_url": "https:\/\/github.com\/safe3s\/CVE-2022-21661",
|
||||
"description": "The first poc video presenting the sql injection test from ( WordPress Core 5.8.2-'WP_Query' \/ CVE-2022-21661) ",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-06T20:44:10Z",
|
||||
"updated_at": "2024-01-24T11:21:41Z",
|
||||
"pushed_at": "2022-11-23T21:09:11Z",
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"created_at": "2022-11-08T06:10:49Z",
|
||||
"updated_at": "2022-11-07T04:28:00Z",
|
||||
"pushed_at": "2022-11-06T21:43:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve",
|
||||
"cve-2022-21661",
|
||||
"exploit",
|
||||
"poc",
|
||||
"wordpress"
|
||||
],
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 100,
|
||||
"forks": 22,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 588582544,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-20T21:23:52Z",
|
||||
"updated_at": "2024-03-13T00:05:04Z",
|
||||
"updated_at": "2024-03-27T21:52:11Z",
|
||||
"pushed_at": "2022-04-27T05:52:43Z",
|
||||
"stargazers_count": 359,
|
||||
"watchers_count": 359,
|
||||
"stargazers_count": 360,
|
||||
"watchers_count": 360,
|
||||
"has_discussions": false,
|
||||
"forks_count": 92,
|
||||
"allow_forking": true,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 92,
|
||||
"watchers": 359,
|
||||
"watchers": 360,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-08-24T06:00:47Z",
|
||||
"updated_at": "2024-02-22T09:54:50Z",
|
||||
"updated_at": "2024-03-27T20:50:58Z",
|
||||
"pushed_at": "2023-06-18T14:43:52Z",
|
||||
"stargazers_count": 159,
|
||||
"watchers_count": 159,
|
||||
"stargazers_count": 160,
|
||||
"watchers_count": 160,
|
||||
"has_discussions": false,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 44,
|
||||
"watchers": 159,
|
||||
"watchers": 160,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "Apache Spark Shell Command Injection Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-19T18:52:12Z",
|
||||
"updated_at": "2024-01-04T17:10:29Z",
|
||||
"updated_at": "2024-03-27T19:32:37Z",
|
||||
"pushed_at": "2022-09-07T18:12:27Z",
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"has_discussions": false,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 87,
|
||||
"watchers": 88,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Public disclosure of TitanFTP 19.X Open Redirection vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-19T09:34:49Z",
|
||||
"updated_at": "2022-12-19T09:34:49Z",
|
||||
"updated_at": "2024-03-27T20:36:30Z",
|
||||
"pushed_at": "2022-12-19T11:53:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-21554 Windows MessageQueuing PoC,分析见 https:\/\/www.zoemurmure.top\/posts\/cve_2023_21554\/",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-18T10:30:49Z",
|
||||
"updated_at": "2023-12-01T21:48:35Z",
|
||||
"updated_at": "2024-03-27T22:00:07Z",
|
||||
"pushed_at": "2023-05-18T10:38:57Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 50,
|
||||
"watchers": 51,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2023-02-07T15:33:41Z",
|
||||
"updated_at": "2024-01-18T14:51:33Z",
|
||||
"updated_at": "2024-03-27T19:31:55Z",
|
||||
"pushed_at": "2023-02-09T09:06:15Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -103,10 +103,10 @@
|
|||
"description": "OpenSSH Pre-Auth Double Free CVE-2023-25136 POC",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-18T21:47:47Z",
|
||||
"updated_at": "2024-01-02T10:32:22Z",
|
||||
"updated_at": "2024-03-27T19:12:22Z",
|
||||
"pushed_at": "2023-04-21T14:22:41Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 44,
|
||||
"watchers": 45,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -133,10 +133,10 @@
|
|||
"description": "OpenSSH 9.1 vulnerability mass scan and exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-28T19:46:03Z",
|
||||
"updated_at": "2023-12-24T02:52:24Z",
|
||||
"updated_at": "2024-03-27T19:25:21Z",
|
||||
"pushed_at": "2023-04-28T20:29:10Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -145,7 +145,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "Openfire Console Authentication Bypass Vulnerability with RCE plugin",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-18T15:42:00Z",
|
||||
"updated_at": "2024-03-19T00:12:15Z",
|
||||
"updated_at": "2024-03-28T00:15:48Z",
|
||||
"pushed_at": "2024-03-07T07:23:41Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 25,
|
||||
"watchers": 26,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-28T13:22:26Z",
|
||||
"updated_at": "2024-03-25T11:17:49Z",
|
||||
"updated_at": "2024-03-27T20:50:24Z",
|
||||
"pushed_at": "2023-07-28T13:20:45Z",
|
||||
"stargazers_count": 446,
|
||||
"watchers_count": 446,
|
||||
"stargazers_count": 447,
|
||||
"watchers_count": 447,
|
||||
"has_discussions": false,
|
||||
"forks_count": 45,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 45,
|
||||
"watchers": 446,
|
||||
"watchers": 447,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Linux kernel LPE practice with an NPD vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-29T10:12:18Z",
|
||||
"updated_at": "2024-02-26T06:09:32Z",
|
||||
"updated_at": "2024-03-27T21:07:48Z",
|
||||
"pushed_at": "2023-07-11T23:13:38Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 34,
|
||||
"watchers": 35,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 773579290,
|
||||
"name": "CVE-2023-3824-PHP-to-RCE-LockBit-LEAK",
|
||||
"full_name": "StayBeautiful-collab\/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK",
|
||||
"owner": {
|
||||
"login": "StayBeautiful-collab",
|
||||
"id": 106727356,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106727356?v=4",
|
||||
"html_url": "https:\/\/github.com\/StayBeautiful-collab"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/StayBeautiful-collab\/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-03-18T02:19:03Z",
|
||||
"updated_at": "2024-03-18T02:19:03Z",
|
||||
"pushed_at": "2024-03-10T04:37:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 773755811,
|
||||
"name": "CVE-2023-3824",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for the recent critical vuln affecting OpenSSH versions < 9.3p2",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-09T19:56:07Z",
|
||||
"updated_at": "2024-03-20T23:10:02Z",
|
||||
"updated_at": "2024-03-27T19:32:37Z",
|
||||
"pushed_at": "2023-08-10T05:12:20Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 26,
|
||||
"watchers": 27,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -43,10 +43,10 @@
|
|||
"description": "Takeover Account OpenSSH",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-09T04:34:39Z",
|
||||
"updated_at": "2024-03-14T00:54:26Z",
|
||||
"updated_at": "2024-03-27T19:33:46Z",
|
||||
"pushed_at": "2024-03-14T03:55:10Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -61,7 +61,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -1234,10 +1234,10 @@
|
|||
"description": "evil-winrar,CVE-2023-38831漏洞利用和社会工程学攻击框架 (evil-winrar, CVE-2023-38831 Vulnerability Exploitation and Social Engineering Attack Framework)",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-25T14:05:24Z",
|
||||
"updated_at": "2024-03-26T04:12:11Z",
|
||||
"updated_at": "2024-03-27T18:41:32Z",
|
||||
"pushed_at": "2024-03-25T14:38:29Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -1246,7 +1246,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Public disclosure of Ivanti's Avalanche Path Traversal vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-08T08:21:39Z",
|
||||
"updated_at": "2024-01-30T15:10:36Z",
|
||||
"updated_at": "2024-03-27T20:40:42Z",
|
||||
"pushed_at": "2024-01-08T08:46:27Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2024-03-27T18:05:15Z",
|
||||
"updated_at": "2024-03-28T00:12:04Z",
|
||||
"pushed_at": "2024-03-27T18:25:56Z",
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"stargazers_count": 139,
|
||||
"watchers_count": 139,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 110,
|
||||
"forks": 26,
|
||||
"watchers": 139,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-03-27T18:04:07Z",
|
||||
"updated_at": "2024-03-28T00:29:11Z",
|
||||
"pushed_at": "2024-03-27T09:22:28Z",
|
||||
"stargazers_count": 347,
|
||||
"watchers_count": 347,
|
||||
"stargazers_count": 369,
|
||||
"watchers_count": 369,
|
||||
"has_discussions": false,
|
||||
"forks_count": 30,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -30,8 +30,8 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 347,
|
||||
"forks": 35,
|
||||
"watchers": 369,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "Exploit for CVE-2024-20767 - Adobe ColdFusion",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-26T06:51:08Z",
|
||||
"updated_at": "2024-03-27T13:41:37Z",
|
||||
"updated_at": "2024-03-27T23:31:42Z",
|
||||
"pushed_at": "2024-03-26T15:52:49Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -28,8 +28,8 @@
|
|||
"cve-2024-20767"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 15,
|
||||
"forks": 9,
|
||||
"watchers": 18,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -77,10 +77,10 @@
|
|||
"description": "Exploit Toolkit for Adobe ColdFusion CVE-2024-20767 Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-26T19:17:14Z",
|
||||
"updated_at": "2024-03-27T17:01:30Z",
|
||||
"updated_at": "2024-03-27T21:09:20Z",
|
||||
"pushed_at": "2024-03-26T19:21:19Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -89,7 +89,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "The Poc for CVE-2024-20931",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-02T01:58:49Z",
|
||||
"updated_at": "2024-03-26T07:52:42Z",
|
||||
"updated_at": "2024-03-27T18:45:37Z",
|
||||
"pushed_at": "2024-02-02T02:05:01Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 69,
|
||||
"watchers": 70,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -133,10 +133,10 @@
|
|||
"description": "Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-13T22:57:00Z",
|
||||
"updated_at": "2024-03-15T15:08:21Z",
|
||||
"updated_at": "2024-03-27T23:12:59Z",
|
||||
"pushed_at": "2024-03-24T22:01:21Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -145,7 +145,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "WallEscape vulnerability in util-linux",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-11T00:15:03Z",
|
||||
"updated_at": "2024-03-27T16:28:14Z",
|
||||
"updated_at": "2024-03-27T19:01:51Z",
|
||||
"pushed_at": "2024-03-12T00:28:14Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -24,14 +24,15 @@
|
|||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve",
|
||||
"cve-2024-28085",
|
||||
"exploit",
|
||||
"privesc",
|
||||
"privilege-escalation",
|
||||
"redteam",
|
||||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -1611,6 +1611,7 @@
|
|||
<code>In PHP version 8.0.* before 8.0.30, 8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE. \n\n
|
||||
</code>
|
||||
|
||||
- [StayBeautiful-collab/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK](https://github.com/StayBeautiful-collab/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK)
|
||||
- [jhonnybonny/CVE-2023-3824](https://github.com/jhonnybonny/CVE-2023-3824)
|
||||
|
||||
### CVE-2023-3836 (2023-07-22)
|
||||
|
@ -8521,9 +8522,9 @@
|
|||
</code>
|
||||
|
||||
- [killvxk/CVE-2022-1040](https://github.com/killvxk/CVE-2022-1040)
|
||||
- [APTIRAN/CVE-2022-1040](https://github.com/APTIRAN/CVE-2022-1040)
|
||||
- [jam620/Sophos-Vulnerability](https://github.com/jam620/Sophos-Vulnerability)
|
||||
- [Keith-amateur/cve-2022-1040](https://github.com/Keith-amateur/cve-2022-1040)
|
||||
- [jackson5sec/CVE-2022-1040](https://github.com/jackson5sec/CVE-2022-1040)
|
||||
- [michealadams30/CVE-2022-1040](https://github.com/michealadams30/CVE-2022-1040)
|
||||
- [Cyb3rEnthusiast/CVE-2022-1040](https://github.com/Cyb3rEnthusiast/CVE-2022-1040)
|
||||
- [xMr110/CVE-2022-1040](https://github.com/xMr110/CVE-2022-1040)
|
||||
|
@ -9485,7 +9486,7 @@
|
|||
- [0x4E0x650x6F/Wordpress-cve-CVE-2022-21661](https://github.com/0x4E0x650x6F/Wordpress-cve-CVE-2022-21661)
|
||||
- [z92g/CVE-2022-21661](https://github.com/z92g/CVE-2022-21661)
|
||||
- [guestzz/CVE-2022-21661](https://github.com/guestzz/CVE-2022-21661)
|
||||
- [APTIRAN/CVE-2022-21661](https://github.com/APTIRAN/CVE-2022-21661)
|
||||
- [safe3s/CVE-2022-21661](https://github.com/safe3s/CVE-2022-21661)
|
||||
- [WellingtonEspindula/SSI-CVE-2022-21661](https://github.com/WellingtonEspindula/SSI-CVE-2022-21661)
|
||||
- [daniel616/CVE-2022-21661-Demo](https://github.com/daniel616/CVE-2022-21661-Demo)
|
||||
- [sealldeveloper/CVE-2022-21661-PoC](https://github.com/sealldeveloper/CVE-2022-21661-PoC)
|
||||
|
@ -20130,6 +20131,7 @@
|
|||
- [Iris288/CVE-2021-43798](https://github.com/Iris288/CVE-2021-43798)
|
||||
- [wagneralves/CVE-2021-43798](https://github.com/wagneralves/CVE-2021-43798)
|
||||
- [K3ysTr0K3R/CVE-2021-43798-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2021-43798-EXPLOIT)
|
||||
- [ticofookfook/CVE-2021-43798](https://github.com/ticofookfook/CVE-2021-43798)
|
||||
|
||||
### CVE-2021-43799 (2022-01-25)
|
||||
|
||||
|
|
Loading…
Reference in a new issue