Skip to content

Commit

Permalink
Update CVE sources 2024-08-15 18:54
Browse files Browse the repository at this point in the history
  • Loading branch information
0xMarcio committed Aug 15, 2024
1 parent a2b22a8 commit d4008b7
Show file tree
Hide file tree
Showing 174 changed files with 1,730 additions and 15 deletions.
17 changes: 17 additions & 0 deletions 2005/CVE-2005-1202.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
### [CVE-2005-1202](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1202)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)

### Description

Multiple cross-site scripting (XSS) vulnerabilities in eGroupware before 1.0.0.007 allow remote attackers to inject arbitrary web script or HTML via the (1) ab_id, (2) page, (3) type, or (4) lang parameter to index.php or (5) category_id parameter.

### POC

#### Reference
- http://sourceforge.net/project/shownotes.php?release_id=320768

#### Github
No PoCs found on GitHub currently.

17 changes: 17 additions & 0 deletions 2005/CVE-2005-1203.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
### [CVE-2005-1203](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1203)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)

### Description

Multiple SQL injection vulnerabilities in index.php in eGroupware before 1.0.0.007 allow remote attackers to execute arbitrary SQL commands via the (1) filter or (2) cats_app parameter.

### POC

#### Reference
- http://sourceforge.net/project/shownotes.php?release_id=320768

#### Github
No PoCs found on GitHub currently.

2 changes: 1 addition & 1 deletion 2010/CVE-2010-3275.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,5 +14,5 @@ libdirectx_plugin.dll in VideoLAN VLC Media Player before 1.1.8 allows remote at
- http://www.coresecurity.com/content/vlc-vulnerabilities-amv-nsv-files

#### Github
No PoCs found on GitHub currently.
- https://github.com/JohnSomanza/Qualys-Vulnerability-Management

1 change: 1 addition & 0 deletions 2014/CVE-2014-0160.md
Original file line number Diff line number Diff line change
Expand Up @@ -153,6 +153,7 @@ The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not p
- https://github.com/Muhammd/Awesome-Payloads
- https://github.com/Muhammd/Awesome-Pentest
- https://github.com/MyKings/docker-vulnerability-environment
- https://github.com/N3rdyN3xus/CVE-2014-0160_Heartbleed
- https://github.com/NCSU-DANCE-Research-Group/CDL
- https://github.com/Nicolasbcrrl/h2_Goat
- https://github.com/Nieuport/Awesome-Security
Expand Down
1 change: 1 addition & 0 deletions 2014/CVE-2014-2024.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,5 +14,6 @@ Cross-site scripting (XSS) vulnerability in classes/controller/error.php in Open

#### Github
- https://github.com/pxcs/CVE-29343-Sysmon-list
- https://github.com/pxcs/CVE-Report
- https://github.com/pxcs/CVE_Sysmon_Report

1 change: 1 addition & 0 deletions 2014/CVE-2014-3206.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,4 +14,5 @@ Seagate BlackArmor NAS allows remote attackers to execute arbitrary code via the

#### Github
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/north-vuln-intel/nuclei-nvi

1 change: 1 addition & 0 deletions 2014/CVE-2014-3704.md
Original file line number Diff line number Diff line change
Expand Up @@ -53,6 +53,7 @@ The expandArguments function in the database abstraction API in Drupal core 7.x
- https://github.com/smartFlash/pySecurity
- https://github.com/superfish9/pt
- https://github.com/superlink996/chunqiuyunjingbachang
- https://github.com/t0ffe/CybSec_Course_Project_II
- https://github.com/t0m4too/t0m4to
- https://github.com/vshaliii/DC-1-Vulnhub-Walkthrough
- https://github.com/xinyisleep/pocscan
Expand Down
4 changes: 4 additions & 0 deletions 2014/CVE-2014-6271.md
Original file line number Diff line number Diff line change
Expand Up @@ -430,6 +430,7 @@ GNU Bash through 4.3 processes trailing strings after function definitions in th
- https://github.com/jeholliday/shellshock
- https://github.com/jerryxk/awesome-hacking
- https://github.com/jj1bdx/bash-3.2-osx-fix
- https://github.com/jli149/Incident-handling-with-Splunk
- https://github.com/jmedeng/suriya73-exploits
- https://github.com/jottama/pentesting
- https://github.com/justone0127/Red-Hat-Advanced-Cluster-Security-for-Kubernetes-Operator-Installation
Expand All @@ -445,6 +446,7 @@ GNU Bash through 4.3 processes trailing strings after function definitions in th
- https://github.com/kk98kk0/Payloads
- https://github.com/kowshik-sundararajan/CVE-2014-6271
- https://github.com/kraloveckey/venom
- https://github.com/krillavilla/CryptoV4ULT-Enterprise-Security-Assessment
- https://github.com/ksw9722/PayloadsAllTheThings
- https://github.com/kxcode/kbash
- https://github.com/lethanhtrung22/Awesome-Hacking
Expand Down Expand Up @@ -591,6 +593,7 @@ GNU Bash through 4.3 processes trailing strings after function definitions in th
- https://github.com/sulsseo/BSY-report
- https://github.com/sunnyjiang/shellshocker-android
- https://github.com/sv3nbeast/Attack-Notes
- https://github.com/t0ffe/CybSec_Course_Project_II
- https://github.com/t0m4too/t0m4to
- https://github.com/takuzoo3868/laputa
- https://github.com/tanjiti/sec_profile
Expand Down Expand Up @@ -659,6 +662,7 @@ GNU Bash through 4.3 processes trailing strings after function definitions in th
- https://github.com/yojiwatanabe/NetworkAlarm
- https://github.com/yukitsukai47/PenetrationTesting_cheatsheet
- https://github.com/yumoL/cybersecurity-project2
- https://github.com/yveeranki5566/LogData-Analysis
- https://github.com/zalalov/CVE-2014-6271
- https://github.com/zeroch1ll/CodePathWeek9
- https://github.com/zgimszhd61/awesome-security
Expand Down
2 changes: 2 additions & 0 deletions 2015/CVE-2015-1635.md
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,8 @@ HTTP.sys in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Wind
- https://github.com/Cappricio-Securities/CVE-2015-1635
- https://github.com/H3xL00m/CVE-2015-1635
- https://github.com/H3xL00m/CVE-2015-1635-POC
- https://github.com/N3rdyN3xus/CVE-2015-1635
- https://github.com/N3rdyN3xus/CVE-2015-1635-POC
- https://github.com/Olysyan/MSS
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
Expand Down
1 change: 1 addition & 0 deletions 2015/CVE-2015-6668.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,7 @@ The Job Manager plugin before 0.7.25 allows remote attackers to read arbitrary C
- https://github.com/G01d3nW01f/CVE-2015-6668
- https://github.com/H3xL00m/CVE-2015-6668
- https://github.com/Ki11i0n4ir3/CVE-2015-6668
- https://github.com/N3rdyN3xus/CVE-2015-6668
- https://github.com/Sp3c73rSh4d0w/CVE-2015-6668
- https://github.com/c0d3cr4f73r/CVE-2015-6668
- https://github.com/crypticdante/CVE-2015-6668
Expand Down
1 change: 1 addition & 0 deletions 2016/CVE-2016-1555.md
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,7 @@
- https://github.com/faisalfs10x/faisalfs10x
- https://github.com/ide0x90/cve-2016-1555
- https://github.com/ker2x/DearDiary
- https://github.com/north-vuln-intel/nuclei-nvi
- https://github.com/padresvater/Mobile-Internet-Security
- https://github.com/zyw-200/EQUAFL_setup

1 change: 1 addition & 0 deletions 2017/CVE-2017-12629.md
Original file line number Diff line number Diff line change
Expand Up @@ -42,6 +42,7 @@ Remote code execution occurs in Apache Solr before 7.1 with Apache Lucene before
- https://github.com/huimzjty/vulwiki
- https://github.com/ilmila/J2EEScan
- https://github.com/jweny/pocassistdb
- https://github.com/merlinepedra25/AttackWebFrameworkTools-5.0
- https://github.com/mustblade/solr_hacktool
- https://github.com/p4d0rn/Siren
- https://github.com/password520/RedTeamer
Expand Down
1 change: 1 addition & 0 deletions 2017/CVE-2017-3506.md
Original file line number Diff line number Diff line change
Expand Up @@ -76,6 +76,7 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar
- https://github.com/lonehand/Oracle-WebLogic-CVE-2017-10271-master
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
- https://github.com/nihaohello/N-MiddlewareScan
- https://github.com/north-vuln-intel/nuclei-nvi
- https://github.com/openx-org/BLEN
- https://github.com/password520/RedTeamer
- https://github.com/peterpeter228/Oracle-WebLogic-CVE-2017-10271
Expand Down
1 change: 1 addition & 0 deletions 2017/CVE-2017-7199.md
Original file line number Diff line number Diff line change
Expand Up @@ -28,6 +28,7 @@ No PoCs from references.
- https://github.com/OFD5/R3d-Teaming-Automation
- https://github.com/SamuelYtsejaM/Herramientas-Red-Team
- https://github.com/TheJoyOfHacking/rasta-mouse-Sherlock
- https://github.com/errorwiki/AttacksToolkit
- https://github.com/garyweller020/Red-Teams-Tools
- https://github.com/marklindsey11/OSINT1
- https://github.com/nmvuonginfosec/redteam_tool
Expand Down
1 change: 1 addition & 0 deletions 2017/CVE-2017-9506.md
Original file line number Diff line number Diff line change
Expand Up @@ -36,6 +36,7 @@ The IconUriServlet of the Atlassian OAuth Plugin from version 1.3.0 before versi
- https://github.com/merlinepedra/nuclei-templates
- https://github.com/merlinepedra25/nuclei-templates
- https://github.com/murksombra/rmap
- https://github.com/north-vuln-intel/nuclei-nvi
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/vulnerability-research
- https://github.com/pen4uin/vulnerability-research-list
Expand Down
1 change: 1 addition & 0 deletions 2018/CVE-2018-16167.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,4 +15,5 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/dnr6419/CVE-2018-16167
- https://github.com/north-vuln-intel/nuclei-nvi

17 changes: 17 additions & 0 deletions 2018/CVE-2018-21177.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
### [CVE-2018-21177](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21177)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)

### Description

Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D6100 before 1.0.0.57, R6100 before 1.0.1.20, R7800 before 1.0.2.40, R9000 before 1.0.2.52, WNDR3700v4 before 1.0.2.92, WNDR4300 before 1.0.2.94, WNDR4300v2 before 1.0.0.50, WNDR4500v3 before 1.0.0.50, and WNR2000v5 before 1.0.0.62.

### POC

#### Reference
- https://kb.netgear.com/000055181/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-Some-Routers-and-Gateways-PSV-2017-2622

#### Github
No PoCs found on GitHub currently.

17 changes: 17 additions & 0 deletions 2018/CVE-2018-2444.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
### [CVE-2018-2444](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2444)
![](https://img.shields.io/static/v1?label=Product&message=SAP%20BusinessObjects%20Financial%20Consolidation&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=10.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Cross-Site%20Scripting&color=brighgreen)

### Description

SAP BusinessObjects Financial Consolidation, versions 10.0, 10.1, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.

### POC

#### Reference
- https://launchpad.support.sap.com/#/notes/2621395

#### Github
No PoCs found on GitHub currently.

2 changes: 1 addition & 1 deletion 2018/CVE-2018-25088.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ A vulnerability, which was classified as critical, was found in Blue Yonder post
### POC

#### Reference
No PoCs from references.
- https://vuldb.com/?ctiid.234246

#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
Expand Down
1 change: 1 addition & 0 deletions 2019/CVE-2019-1003000.md
Original file line number Diff line number Diff line change
Expand Up @@ -46,6 +46,7 @@ A sandbox bypass vulnerability exists in Script Security Plugin 1.49 and earlier
- https://github.com/huimzjty/vulwiki
- https://github.com/jaychouzzk/-
- https://github.com/jbmihoub/all-poc
- https://github.com/merlinepedra25/AttackWebFrameworkTools-5.0
- https://github.com/onewinner/VulToolsKit
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
- https://github.com/purple-WL/Jenkins_CVE-2019-1003000
Expand Down
1 change: 1 addition & 0 deletions 2019/CVE-2019-10758.md
Original file line number Diff line number Diff line change
Expand Up @@ -51,6 +51,7 @@ mongo-express before 0.54.0 is vulnerable to Remote Code Execution via endpoints
- https://github.com/lovechinacoco/https-github.com-mai-lang-chai-Middleware-Vulnerability-detection
- https://github.com/lp008/CVE-2019-10758
- https://github.com/masahiro331/CVE-2019-10758
- https://github.com/north-vuln-intel/nuclei-nvi
- https://github.com/ossf-cve-benchmark/CVE-2019-10758
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
Expand Down
1 change: 1 addition & 0 deletions 2019/CVE-2019-17506.md
Original file line number Diff line number Diff line change
Expand Up @@ -27,6 +27,7 @@ No PoCs from references.
- https://github.com/amcai/myscan
- https://github.com/bigblackhat/oFx
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/merlinepedra25/AttackWebFrameworkTools-5.0
- https://github.com/openx-org/BLEN
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
- https://github.com/sobinge/nuclei-templates
Expand Down
2 changes: 2 additions & 0 deletions 2019/CVE-2019-17558.md
Original file line number Diff line number Diff line change
Expand Up @@ -54,12 +54,14 @@ Apache Solr 5.0.0 to Apache Solr 8.3.1 are vulnerable to a Remote Code Execution
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/hktalent/TOP
- https://github.com/hktalent/bug-bounty
- https://github.com/huan-cdm/secure_tools_link
- https://github.com/huike007/penetration_poc
- https://github.com/huimzjty/vulwiki
- https://github.com/jbmihoub/all-poc
- https://github.com/koala2099/GitHub-Chinese-Top-Charts
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/merlinepedra/nuclei-templates
- https://github.com/merlinepedra25/AttackWebFrameworkTools-5.0
- https://github.com/merlinepedra25/nuclei-templates
- https://github.com/mustblade/solr_hacktool
- https://github.com/neilzhang1/Chinese-Charts
Expand Down
17 changes: 17 additions & 0 deletions 2019/CVE-2019-18193.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
### [CVE-2019-18193](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18193)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)

### Description

In Unisys Stealth (core) 3.4.108.0, 3.4.209.x, 4.0.027.x and 4.0.114, key material inadvertently logged under certain conditions. Fixed included in 3.4.109, 4.0.027.13, 4.0.125 and 5.0.013.0.

### POC

#### Reference
- https://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=52

#### Github
No PoCs found on GitHub currently.

1 change: 1 addition & 0 deletions 2019/CVE-2019-2616.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,4 +17,5 @@ Vulnerability in the BI Publisher (formerly XML Publisher) component of Oracle F
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/north-vuln-intel/nuclei-nvi

1 change: 1 addition & 0 deletions 2019/CVE-2019-6340.md
Original file line number Diff line number Diff line change
Expand Up @@ -55,6 +55,7 @@ Some field types do not properly sanitize data from non-form sources in Drupal 8
- https://github.com/hktalent/TOP
- https://github.com/hktalent/bug-bounty
- https://github.com/honeybot/wtf-plugin-honeybot-cve_2019_6340
- https://github.com/huan-cdm/secure_tools_link
- https://github.com/itsamirac1e/Offensive_Security_CTF_Rekall
- https://github.com/jas502n/CVE-2019-6340
- https://github.com/jbmihoub/all-poc
Expand Down
1 change: 1 addition & 0 deletions 2020/CVE-2020-10199.md
Original file line number Diff line number Diff line change
Expand Up @@ -57,6 +57,7 @@ Sonatype Nexus Repository before 3.21.2 allows JavaEL Injection (issue 1 of 2).
- https://github.com/hasee2018/Penetration_Testing_POC
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/hktalent/TOP
- https://github.com/huan-cdm/secure_tools_link
- https://github.com/hugosg97/CVE-2020-10199-Nexus-3.21.01
- https://github.com/huike007/penetration_poc
- https://github.com/huike007/poc
Expand Down
1 change: 1 addition & 0 deletions 2020/CVE-2020-10204.md
Original file line number Diff line number Diff line change
Expand Up @@ -51,6 +51,7 @@ Sonatype Nexus Repository before 3.21.2 allows Remote Code Execution.
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/hktalent/TOP
- https://github.com/hktalent/bug-bounty
- https://github.com/huan-cdm/secure_tools_link
- https://github.com/huike007/penetration_poc
- https://github.com/huike007/poc
- https://github.com/jas502n/CVE-2020-10199
Expand Down
1 change: 1 addition & 0 deletions 2020/CVE-2020-10560.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,7 @@ An issue was discovered in Open Source Social Network (OSSN) through 5.3. A user
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
- https://github.com/LucidUnicorn/CVE-2020-10560-Key-Recovery
- https://github.com/alex-seymour/CVE-2020-10560-Key-Recovery
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/jandersoncampelo/InfosecBookmarks
Expand Down
1 change: 1 addition & 0 deletions 2020/CVE-2020-11444.md
Original file line number Diff line number Diff line change
Expand Up @@ -36,6 +36,7 @@ Sonatype Nexus Repository Manager 3.x up to and including 3.21.2 has Incorrect A
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/hktalent/TOP
- https://github.com/huan-cdm/secure_tools_link
- https://github.com/jas502n/CVE-2020-10199
- https://github.com/jbmihoub/all-poc
- https://github.com/koala2099/GitHub-Chinese-Top-Charts
Expand Down
1 change: 1 addition & 0 deletions 2020/CVE-2020-14181.md
Original file line number Diff line number Diff line change
Expand Up @@ -42,6 +42,7 @@ Affected versions of Atlassian Jira Server and Data Center allow an unauthentica
- https://github.com/imhunterand/JiraCVE
- https://github.com/jweny/pocassistdb
- https://github.com/merlinepedra/nuclei-templates
- https://github.com/merlinepedra25/AttackWebFrameworkTools-5.0
- https://github.com/merlinepedra25/nuclei-templates
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
Expand Down
1 change: 1 addition & 0 deletions 2020/CVE-2020-1938.md
Original file line number Diff line number Diff line change
Expand Up @@ -132,6 +132,7 @@ When using the Apache JServ Protocol (AJP), care must be taken when trusting inc
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/hktalent/TOP
- https://github.com/hktalent/bug-bounty
- https://github.com/huan-cdm/secure_tools_link
- https://github.com/huike007/penetration_poc
- https://github.com/huike007/poc
- https://github.com/huimzjty/vulwiki
Expand Down
1 change: 1 addition & 0 deletions 2020/CVE-2020-25078.md
Original file line number Diff line number Diff line change
Expand Up @@ -46,6 +46,7 @@ No PoCs from references.
- https://github.com/fishykz/2530L-analyze
- https://github.com/jorhelp/Ingram
- https://github.com/lovechinacoco/https-github.com-mai-lang-chai-Middleware-Vulnerability-detection
- https://github.com/merlinepedra25/AttackWebFrameworkTools-5.0
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
- https://github.com/pen4uin/awesome-vulnerability-research
Expand Down
1 change: 1 addition & 0 deletions 2020/CVE-2020-2555.md
Original file line number Diff line number Diff line change
Expand Up @@ -108,6 +108,7 @@ Vulnerability in the Oracle Coherence product of Oracle Fusion Middleware (compo
- https://github.com/hktalent/CVE_2020_2546
- https://github.com/hktalent/TOP
- https://github.com/hktalent/bug-bounty
- https://github.com/huan-cdm/secure_tools_link
- https://github.com/huike007/penetration_poc
- https://github.com/huike007/poc
- https://github.com/hungslab/awd-tools
Expand Down
1 change: 1 addition & 0 deletions 2020/CVE-2020-2883.md
Original file line number Diff line number Diff line change
Expand Up @@ -80,6 +80,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
- https://github.com/hktalent/CVE_2020_2546
- https://github.com/hktalent/TOP
- https://github.com/hktalent/bug-bounty
- https://github.com/huan-cdm/secure_tools_link
- https://github.com/huike007/penetration_poc
- https://github.com/huike007/poc
- https://github.com/hungslab/awd-tools
Expand Down
1 change: 1 addition & 0 deletions 2020/CVE-2020-8515.md
Original file line number Diff line number Diff line change
Expand Up @@ -52,4 +52,5 @@ DrayTek Vigor2960 1.3.1_Beta, Vigor3900 1.4.4_Beta, and Vigor300B 1.3.3_Beta, 1.
- https://github.com/trhacknon/CVE-2020-8515-PoC
- https://github.com/trhacknon/nmap_draytek_rce
- https://github.com/truerandom/nmap_draytek_rce
- https://github.com/yveeranki5566/LogData-Analysis

1 change: 1 addition & 0 deletions 2020/CVE-2020-8958.md
Original file line number Diff line number Diff line change
Expand Up @@ -23,4 +23,5 @@ Guangzhou 1GE ONU V2801RW 1.9.1-181203 through 2.9.0-181024 and V2804RGW 1.9.1-1
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/qurbat/CVE-2020-8958
- https://github.com/soosmile/POC
- https://github.com/yveeranki5566/LogData-Analysis

1 change: 1 addition & 0 deletions 2020/CVE-2020-9496.md
Original file line number Diff line number Diff line change
Expand Up @@ -47,6 +47,7 @@ XML-RPC request are vulnerable to unsafe deserialization and Cross-Site Scriptin
- https://github.com/g33xter/CVE-2020-9496
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/merlinepedra/nuclei-templates
- https://github.com/merlinepedra25/AttackWebFrameworkTools-5.0
- https://github.com/merlinepedra25/nuclei-templates
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
- https://github.com/nomi-sec/PoC-in-GitHub
Expand Down
1 change: 1 addition & 0 deletions 2021/CVE-2021-21315.md
Original file line number Diff line number Diff line change
Expand Up @@ -44,6 +44,7 @@ No PoCs from references.
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/lovechinacoco/https-github.com-mai-lang-chai-Middleware-Vulnerability-detection
- https://github.com/manas3c/CVE-POC
- https://github.com/merlinepedra25/AttackWebFrameworkTools-5.0
- https://github.com/mintoolkit/mint
- https://github.com/mmk-1/kubernetes-poc
- https://github.com/n1sh1th/CVE-POC
Expand Down
1 change: 1 addition & 0 deletions 2021/CVE-2021-21972.md
Original file line number Diff line number Diff line change
Expand Up @@ -119,6 +119,7 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability in a v
- https://github.com/mamba-2021/fscan-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/mdisec/mdisec-twitch-yayinlari
- https://github.com/merlinepedra25/AttackWebFrameworkTools-5.0
- https://github.com/milo2012/CVE-2021-21972
- https://github.com/mstxq17/SecurityArticleLogger
- https://github.com/murataydemir/CVE-2021-21972
Expand Down
1 change: 1 addition & 0 deletions 2021/CVE-2021-22005.md
Original file line number Diff line number Diff line change
Expand Up @@ -66,6 +66,7 @@ The vCenter Server contains an arbitrary file upload vulnerability in the Analyt
- https://github.com/mamba-2021/EXP-POC
- https://github.com/mamba-2021/fscan-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/merlinepedra25/AttackWebFrameworkTools-5.0
- https://github.com/nday-ldgz/ZoomEye-dork
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/onewinner/VulToolsKit
Expand Down
Loading

0 comments on commit d4008b7

Please sign in to comment.