diff --git a/2000/CVE-2000-0114.md b/2000/CVE-2000-0114.md
index 5f256bf28b..ee2b6adcae 100644
--- a/2000/CVE-2000-0114.md
+++ b/2000/CVE-2000-0114.md
@@ -16,6 +16,7 @@ No PoCs from references.
- https://github.com/0xPugal/One-Liners
- https://github.com/0xPugazh/One-Liners
- https://github.com/ARPSyndicate/kenzer-templates
+- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/Cappricio-Securities/CVE-2000-0114
- https://github.com/Live-Hack-CVE/CVE-2000-0114
- https://github.com/POORVAJA-195/Nuclei-Analysis-main
diff --git a/2000/CVE-2000-0170.md b/2000/CVE-2000-0170.md
index 6203530d04..c4386d5e82 100644
--- a/2000/CVE-2000-0170.md
+++ b/2000/CVE-2000-0170.md
@@ -15,5 +15,6 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
+- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/mike182/exploit
diff --git a/2000/CVE-2000-0649.md b/2000/CVE-2000-0649.md
index f7f2c8291a..ca6e7b6f16 100644
--- a/2000/CVE-2000-0649.md
+++ b/2000/CVE-2000-0649.md
@@ -16,6 +16,8 @@ No PoCs from references.
- https://github.com/0xNVAN/win-iisadmin
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
+- https://github.com/CVEDB/awesome-cve-repo
+- https://github.com/Downgraderz/PoC-CVE-2000-0649
- https://github.com/JimboJimbabwe/HackGPTV2
- https://github.com/amtzespinosa/lord-of-the-root-walkthrough
- https://github.com/hanmin0512/Web-hacking-LAB
diff --git a/2000/CVE-2000-0979.md b/2000/CVE-2000-0979.md
index 9132d1a5c3..424d482e18 100644
--- a/2000/CVE-2000-0979.md
+++ b/2000/CVE-2000-0979.md
@@ -16,6 +16,7 @@ File and Print Sharing service in Windows 95, Windows 98, and Windows Me does no
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Ascotbe/Kernelhub
- https://github.com/CVEDB/PoC-List
+- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/Cruxer8Mech/Idk
- https://github.com/Z6543/CVE-2000-0979
- https://github.com/ycdxsb/WindowsPrivilegeEscalation
diff --git a/2001/CVE-2001-0550.md b/2001/CVE-2001-0550.md
index 5a07f8fbac..70968945c8 100644
--- a/2001/CVE-2001-0550.md
+++ b/2001/CVE-2001-0550.md
@@ -18,6 +18,7 @@ wu-ftpd 2.6.1 allows remote attackers to execute arbitrary commands via a "~{" a
- https://github.com/Badbug6/EQGRP
- https://github.com/CKmaenn/EQGRP
- https://github.com/CVEDB/PoC-List
+- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CybernetiX-S3C/EQGRP_Linux
- https://github.com/Drift-Security/Shadow_Brokers-Vs-NSA
- https://github.com/IHA114/EQGRP
diff --git a/2001/CVE-2001-0680.md b/2001/CVE-2001-0680.md
index 858fe2306d..de65db22c3 100644
--- a/2001/CVE-2001-0680.md
+++ b/2001/CVE-2001-0680.md
@@ -15,4 +15,5 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
+- https://github.com/CVEDB/awesome-cve-repo
diff --git a/2001/CVE-2001-0758.md b/2001/CVE-2001-0758.md
index 44cfbbae10..d27403f17b 100644
--- a/2001/CVE-2001-0758.md
+++ b/2001/CVE-2001-0758.md
@@ -15,4 +15,5 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
+- https://github.com/CVEDB/awesome-cve-repo
diff --git a/2001/CVE-2001-0931.md b/2001/CVE-2001-0931.md
index 7ba8fd0339..56b0da601d 100644
--- a/2001/CVE-2001-0931.md
+++ b/2001/CVE-2001-0931.md
@@ -15,4 +15,5 @@ Directory traversal vulnerability in Cooolsoft PowerFTP Server 2.03 allows attac
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
+- https://github.com/CVEDB/awesome-cve-repo
diff --git a/2001/CVE-2001-0932.md b/2001/CVE-2001-0932.md
index 3b998b11f4..b5934dce99 100644
--- a/2001/CVE-2001-0932.md
+++ b/2001/CVE-2001-0932.md
@@ -15,4 +15,5 @@ Buffer overflow in Cooolsoft PowerFTP Server 2.03 allows remote attackers to cau
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
+- https://github.com/CVEDB/awesome-cve-repo
diff --git a/2001/CVE-2001-0933.md b/2001/CVE-2001-0933.md
index a93f3b2a27..1e2e425c12 100644
--- a/2001/CVE-2001-0933.md
+++ b/2001/CVE-2001-0933.md
@@ -15,4 +15,5 @@ Cooolsoft PowerFTP Server 2.03 allows remote attackers to list the contents of a
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
+- https://github.com/CVEDB/awesome-cve-repo
diff --git a/2001/CVE-2001-0934.md b/2001/CVE-2001-0934.md
index bc6f8c439a..d8726b8205 100644
--- a/2001/CVE-2001-0934.md
+++ b/2001/CVE-2001-0934.md
@@ -15,4 +15,5 @@ Cooolsoft PowerFTP Server 2.03 allows remote attackers to obtain the physical pa
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
+- https://github.com/CVEDB/awesome-cve-repo
diff --git a/2001/CVE-2001-1442.md b/2001/CVE-2001-1442.md
index c252c6d91c..5815561354 100644
--- a/2001/CVE-2001-1442.md
+++ b/2001/CVE-2001-1442.md
@@ -15,4 +15,5 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
+- https://github.com/CVEDB/awesome-cve-repo
diff --git a/2001/CVE-2001-1473.md b/2001/CVE-2001-1473.md
index 5786b2e1ed..a49aec0ac4 100644
--- a/2001/CVE-2001-1473.md
+++ b/2001/CVE-2001-1473.md
@@ -15,6 +15,7 @@ No PoCs from references.
#### Github
- https://github.com/0xget/cve-2001-1473
- https://github.com/ARPSyndicate/kenzer-templates
+- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/codine7/Hacking_Automated
- https://github.com/codine7/fox
- https://github.com/codine7/jungle
diff --git a/2002/CVE-2002-0200.md b/2002/CVE-2002-0200.md
index c157d0a1eb..a754868332 100644
--- a/2002/CVE-2002-0200.md
+++ b/2002/CVE-2002-0200.md
@@ -15,4 +15,5 @@ Cyberstop Web Server for Windows 0.1 allows remote attackers to cause a denial o
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
+- https://github.com/CVEDB/awesome-cve-repo
diff --git a/2002/CVE-2002-0201.md b/2002/CVE-2002-0201.md
index f425ed3800..10b9c49705 100644
--- a/2002/CVE-2002-0201.md
+++ b/2002/CVE-2002-0201.md
@@ -15,4 +15,5 @@ Cyberstop Web Server for Windows 0.1 allows remote attackers to cause a denial o
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
+- https://github.com/CVEDB/awesome-cve-repo
diff --git a/2002/CVE-2002-0288.md b/2002/CVE-2002-0288.md
index cfaa3e6b92..d6a4812631 100644
--- a/2002/CVE-2002-0288.md
+++ b/2002/CVE-2002-0288.md
@@ -15,4 +15,5 @@ Directory traversal vulnerability in Phusion web server 1.0 allows remote attack
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
+- https://github.com/CVEDB/awesome-cve-repo
diff --git a/2002/CVE-2002-0289.md b/2002/CVE-2002-0289.md
index fcaa1c0262..8b82f6e2bc 100644
--- a/2002/CVE-2002-0289.md
+++ b/2002/CVE-2002-0289.md
@@ -15,4 +15,5 @@ Buffer overflow in Phusion web server 1.0 allows remote attackers to cause a den
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
+- https://github.com/CVEDB/awesome-cve-repo
diff --git a/2002/CVE-2002-0346.md b/2002/CVE-2002-0346.md
index 1ce007022b..c78f1a727e 100644
--- a/2002/CVE-2002-0346.md
+++ b/2002/CVE-2002-0346.md
@@ -15,4 +15,5 @@ Cross-site scripting vulnerability in Cobalt RAQ 4 allows remote attackers to ex
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
+- https://github.com/CVEDB/awesome-cve-repo
diff --git a/2002/CVE-2002-0347.md b/2002/CVE-2002-0347.md
index 5816e02433..6db66d4079 100644
--- a/2002/CVE-2002-0347.md
+++ b/2002/CVE-2002-0347.md
@@ -15,4 +15,5 @@ Directory traversal vulnerability in Cobalt RAQ 4 allows remote attackers to rea
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
+- https://github.com/CVEDB/awesome-cve-repo
diff --git a/2002/CVE-2002-0348.md b/2002/CVE-2002-0348.md
index c5c6141933..d01c7085f4 100644
--- a/2002/CVE-2002-0348.md
+++ b/2002/CVE-2002-0348.md
@@ -15,4 +15,5 @@ service.cgi in Cobalt RAQ 4 allows remote attackers to cause a denial of service
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
+- https://github.com/CVEDB/awesome-cve-repo
diff --git a/2002/CVE-2002-0448.md b/2002/CVE-2002-0448.md
index 47f01b5153..63f2bdfb57 100644
--- a/2002/CVE-2002-0448.md
+++ b/2002/CVE-2002-0448.md
@@ -15,4 +15,5 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
+- https://github.com/CVEDB/awesome-cve-repo
diff --git a/2002/CVE-2002-0740.md b/2002/CVE-2002-0740.md
index ef627d9da4..312edb7aa8 100644
--- a/2002/CVE-2002-0740.md
+++ b/2002/CVE-2002-0740.md
@@ -15,4 +15,5 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
+- https://github.com/CVEDB/awesome-cve-repo
diff --git a/2002/CVE-2002-0748.md b/2002/CVE-2002-0748.md
index 7557e9795a..e10ab15e34 100644
--- a/2002/CVE-2002-0748.md
+++ b/2002/CVE-2002-0748.md
@@ -13,5 +13,6 @@ LabVIEW Web Server 5.1.1 through 6.1 allows remote attackers to cause a denial o
No PoCs from references.
#### Github
+- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/fauzanwijaya/CVE-2002-0748
diff --git a/2002/CVE-2002-0991.md b/2002/CVE-2002-0991.md
index 8feb3a816c..9136323470 100644
--- a/2002/CVE-2002-0991.md
+++ b/2002/CVE-2002-0991.md
@@ -15,4 +15,5 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
+- https://github.com/CVEDB/awesome-cve-repo
diff --git a/2002/CVE-2002-1614.md b/2002/CVE-2002-1614.md
index eedbe65db7..6f53cb05bd 100644
--- a/2002/CVE-2002-1614.md
+++ b/2002/CVE-2002-1614.md
@@ -15,6 +15,7 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
+- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/DrewSC13/Linpeas
- https://github.com/cedelasen/htb-laboratory
- https://github.com/chorankates/Irked
diff --git a/2002/CVE-2002-20001.md b/2002/CVE-2002-20001.md
index 24b08dcacc..e23972df4a 100644
--- a/2002/CVE-2002-20001.md
+++ b/2002/CVE-2002-20001.md
@@ -20,7 +20,9 @@ The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the clie
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/Balasys/dheater
- https://github.com/CVEDB/PoC-List
+- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/Live-Hack-CVE/CVE-2002-20001
- https://github.com/Live-Hack-CVE/CVE-2022-40735
- https://github.com/anquanscan/sec-tools
diff --git a/2002/CVE-2002-2420.md b/2002/CVE-2002-2420.md
index ddd33b5d65..4d7895c6d3 100644
--- a/2002/CVE-2002-2420.md
+++ b/2002/CVE-2002-2420.md
@@ -15,5 +15,6 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
+- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/krdsploit/CVE-2002-2420
diff --git a/2004/CVE-2004-0077.md b/2004/CVE-2004-0077.md
index b6606c4695..8a9bd15421 100644
--- a/2004/CVE-2004-0077.md
+++ b/2004/CVE-2004-0077.md
@@ -21,6 +21,7 @@ The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
- https://github.com/QChiLan/linux-exp
@@ -59,6 +60,7 @@ The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to
- https://github.com/rakjong/LinuxElevation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xfinest/linux-kernel-exploits
- https://github.com/xssfile/linux-kernel-exploits
diff --git a/2004/CVE-2004-0558.md b/2004/CVE-2004-0558.md
index 6009400e79..c5a64c2689 100644
--- a/2004/CVE-2004-0558.md
+++ b/2004/CVE-2004-0558.md
@@ -16,4 +16,5 @@ The Internet Printing Protocol (IPP) implementation in CUPS before 1.1.21 allows
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
+- https://github.com/fibonascii/CVE-2004-0558
diff --git a/2004/CVE-2004-1235.md b/2004/CVE-2004-1235.md
index 5e8ef449cd..063e6081e3 100644
--- a/2004/CVE-2004-1235.md
+++ b/2004/CVE-2004-1235.md
@@ -20,6 +20,7 @@ Race condition in the (1) load_elf_library and (2) binfmt_aout function calls fo
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
- https://github.com/QChiLan/linux-exp
diff --git a/2005/CVE-2005-0736.md b/2005/CVE-2005-0736.md
index c4fb0ea4ed..fafe3b146a 100644
--- a/2005/CVE-2005-0736.md
+++ b/2005/CVE-2005-0736.md
@@ -20,6 +20,7 @@ Integer overflow in sys_epoll_wait in eventpoll.c for Linux kernel 2.6 to 2.6.11
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
- https://github.com/QChiLan/linux-exp
diff --git a/2005/CVE-2005-1263.md b/2005/CVE-2005-1263.md
index 8d64010742..f8c5c2fd28 100644
--- a/2005/CVE-2005-1263.md
+++ b/2005/CVE-2005-1263.md
@@ -19,6 +19,7 @@ The elf_core_dump function in binfmt_elf.c for Linux kernel 2.x.x to 2.2.27-rc2,
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
- https://github.com/QChiLan/linux-exp
diff --git a/2005/CVE-2005-1794.md b/2005/CVE-2005-1794.md
index cecb0feeac..f8b18f0e42 100644
--- a/2005/CVE-2005-1794.md
+++ b/2005/CVE-2005-1794.md
@@ -18,4 +18,5 @@ No PoCs from references.
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/InitRoot/CVE-2005-1794Scanner
- https://github.com/Ressurect0/fluffyLogic
+- https://github.com/anvithalolla/Tesla_PenTest
diff --git a/2005/CVE-2005-2428.md b/2005/CVE-2005-2428.md
index 9b19dcdc9d..d1a3ea10bb 100644
--- a/2005/CVE-2005-2428.md
+++ b/2005/CVE-2005-2428.md
@@ -22,6 +22,7 @@ Lotus Domino R5 and R6 WebMail, with "Generate HTML for all fields" enabled, sto
- https://github.com/POORVAJA-195/Nuclei-Analysis-main
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/gojhonny/Pentesting-Scripts
+- https://github.com/jobroche/Pentesting-Scripts
- https://github.com/merlinepedra/nuclei-templates
- https://github.com/merlinepedra25/nuclei-templates
- https://github.com/schwankner/CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit
diff --git a/2006/CVE-2006-0001.md b/2006/CVE-2006-0001.md
index 0b596d0d69..91cdcc6308 100644
--- a/2006/CVE-2006-0001.md
+++ b/2006/CVE-2006-0001.md
@@ -10,6 +10,7 @@ Stack-based buffer overflow in Microsoft Publisher 2000 through 2003 allows user
### POC
#### Reference
+- http://www.computerterrorism.com/research/ct12-09-2006-2.htm
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-054
#### Github
diff --git a/2006/CVE-2006-20001.md b/2006/CVE-2006-20001.md
index 080cb3e96d..50bf6ddc37 100644
--- a/2006/CVE-2006-20001.md
+++ b/2006/CVE-2006-20001.md
@@ -18,6 +18,7 @@ No PoCs from references.
- https://github.com/ByteXenon/IP-Security-Database
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
+- https://github.com/EzeTauil/Maquina-Upload
- https://github.com/Live-Hack-CVE/CVE-2006-20001
- https://github.com/Saksham2002/CVE-2006-20001
- https://github.com/bioly230/THM_Skynet
diff --git a/2006/CVE-2006-2451.md b/2006/CVE-2006-2451.md
index f2f6b00308..20a26eeda2 100644
--- a/2006/CVE-2006-2451.md
+++ b/2006/CVE-2006-2451.md
@@ -20,6 +20,7 @@ No PoCs from references.
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/Jasut1n/CVE
- https://github.com/Jasut1n/c-exploits
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
diff --git a/2006/CVE-2006-3311.md b/2006/CVE-2006-3311.md
index f273b34e63..5b357b573f 100644
--- a/2006/CVE-2006-3311.md
+++ b/2006/CVE-2006-3311.md
@@ -11,6 +11,7 @@ Buffer overflow in Adobe Flash Player 8.0.24.0 and earlier, Flash Professional 8
#### Reference
- http://securityreason.com/securityalert/1546
+- http://www.computerterrorism.com/research/ct12-09-2006.htm
#### Github
No PoCs found on GitHub currently.
diff --git a/2006/CVE-2006-3626.md b/2006/CVE-2006-3626.md
index 710560d6df..67a857a9cc 100644
--- a/2006/CVE-2006-3626.md
+++ b/2006/CVE-2006-3626.md
@@ -19,6 +19,7 @@ Race condition in Linux kernel 2.6.17.4 and earlier allows local users to gain r
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
- https://github.com/QChiLan/linux-exp
diff --git a/2007/CVE-2007-0034.md b/2007/CVE-2007-0034.md
index 857bb7362c..0aa51963e7 100644
--- a/2007/CVE-2007-0034.md
+++ b/2007/CVE-2007-0034.md
@@ -10,6 +10,7 @@ Buffer overflow in the Advanced Search (Finder.exe) feature of Microsoft Outlook
### POC
#### Reference
+- http://www.computerterrorism.com/research/ct09-01-2007.htm
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-003
#### Github
diff --git a/2007/CVE-2007-4573.md b/2007/CVE-2007-4573.md
index de0a00c2e4..99ec0ebbc2 100644
--- a/2007/CVE-2007-4573.md
+++ b/2007/CVE-2007-4573.md
@@ -27,5 +27,6 @@ The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x bef
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2008/CVE-2008-0009.md b/2008/CVE-2008-0009.md
index 985613ad2b..73cd36890b 100644
--- a/2008/CVE-2008-0009.md
+++ b/2008/CVE-2008-0009.md
@@ -27,5 +27,6 @@ No PoCs from references.
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2008/CVE-2008-0010.md b/2008/CVE-2008-0010.md
index af201cc75a..03209d04dd 100644
--- a/2008/CVE-2008-0010.md
+++ b/2008/CVE-2008-0010.md
@@ -27,5 +27,6 @@ The copy_from_user_mmap_sem function in fs/splice.c in the Linux kernel 2.6.22 t
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2008/CVE-2008-0600.md b/2008/CVE-2008-0600.md
index 4bb03bf801..ee01001d17 100644
--- a/2008/CVE-2008-0600.md
+++ b/2008/CVE-2008-0600.md
@@ -19,6 +19,7 @@ The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not v
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
- https://github.com/QChiLan/linux-exp
@@ -57,6 +58,7 @@ The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not v
- https://github.com/rakjong/LinuxElevation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xfinest/linux-kernel-exploits
- https://github.com/xssfile/linux-kernel-exploits
diff --git a/2008/CVE-2008-0900.md b/2008/CVE-2008-0900.md
index 74d5edb49b..9048e00e24 100644
--- a/2008/CVE-2008-0900.md
+++ b/2008/CVE-2008-0900.md
@@ -14,6 +14,7 @@ No PoCs from references.
#### Github
- https://github.com/Al1ex/LinuxEelvation
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/fei9747/LinuxEelvation
diff --git a/2008/CVE-2008-4210.md b/2008/CVE-2008-4210.md
index 81cd373652..a1d766c76b 100644
--- a/2008/CVE-2008-4210.md
+++ b/2008/CVE-2008-4210.md
@@ -19,6 +19,7 @@ fs/open.c in the Linux kernel before 2.6.22 does not properly strip setuid and s
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
- https://github.com/QChiLan/linux-exp
diff --git a/2009/CVE-2009-0065.md b/2009/CVE-2009-0065.md
index fd6a287e39..9a559a0412 100644
--- a/2009/CVE-2009-0065.md
+++ b/2009/CVE-2009-0065.md
@@ -27,5 +27,6 @@ No PoCs from references.
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2009/CVE-2009-1046.md b/2009/CVE-2009-1046.md
index d708c75c88..1a0ed31091 100644
--- a/2009/CVE-2009-1046.md
+++ b/2009/CVE-2009-1046.md
@@ -27,5 +27,6 @@ No PoCs from references.
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2009/CVE-2009-1185.md b/2009/CVE-2009-1185.md
index c18b341e26..6084daaea4 100644
--- a/2009/CVE-2009-1185.md
+++ b/2009/CVE-2009-1185.md
@@ -20,6 +20,7 @@ udev before 1.4.1 does not verify whether a NETLINK message originates from kern
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
diff --git a/2009/CVE-2009-1337.md b/2009/CVE-2009-1337.md
index 18464ea3e5..72eb333c9e 100644
--- a/2009/CVE-2009-1337.md
+++ b/2009/CVE-2009-1337.md
@@ -20,6 +20,7 @@ The exit_notify function in kernel/exit.c in the Linux kernel before 2.6.30-rc1
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
- https://github.com/QChiLan/linux-exp
diff --git a/2009/CVE-2009-2692.md b/2009/CVE-2009-2692.md
index 7e9784b8a0..16f6ab08f0 100644
--- a/2009/CVE-2009-2692.md
+++ b/2009/CVE-2009-2692.md
@@ -21,6 +21,7 @@ The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not in
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
@@ -71,6 +72,7 @@ The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not in
- https://github.com/talent-x90c/cve_list
- https://github.com/tangsilian/android-vuln
- https://github.com/taviso/iknowthis
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/x90hack/vulnerabilty_lab
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xfinest/linux-kernel-exploits
diff --git a/2009/CVE-2009-2698.md b/2009/CVE-2009-2698.md
index 165a7d2106..c69dbede6d 100644
--- a/2009/CVE-2009-2698.md
+++ b/2009/CVE-2009-2698.md
@@ -23,6 +23,7 @@ The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2)
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
- https://github.com/QChiLan/linux-exp
diff --git a/2009/CVE-2009-2910.md b/2009/CVE-2009-2910.md
index a5975e9087..d906789da9 100644
--- a/2009/CVE-2009-2910.md
+++ b/2009/CVE-2009-2910.md
@@ -27,5 +27,6 @@ No PoCs from references.
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2009/CVE-2009-3001.md b/2009/CVE-2009-3001.md
index 0471bca33b..c7ccd655d9 100644
--- a/2009/CVE-2009-3001.md
+++ b/2009/CVE-2009-3001.md
@@ -27,5 +27,6 @@ No PoCs from references.
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2009/CVE-2009-3547.md b/2009/CVE-2009-3547.md
index 16e0308bde..6fd82fa74f 100644
--- a/2009/CVE-2009-3547.md
+++ b/2009/CVE-2009-3547.md
@@ -19,6 +19,7 @@ Multiple race conditions in fs/pipe.c in the Linux kernel before 2.6.32-rc6 allo
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
diff --git a/2009/CVE-2009-3895.md b/2009/CVE-2009-3895.md
new file mode 100644
index 0000000000..8127b16c41
--- /dev/null
+++ b/2009/CVE-2009-3895.md
@@ -0,0 +1,17 @@
+### [CVE-2009-3895](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3895)
+
+
+
+
+### Description
+
+Heap-based buffer overflow in the exif_entry_fix function (aka the tag fixup routine) in libexif/exif-entry.c in libexif 0.6.18 allows remote attackers to cause a denial of service or possibly execute arbitrary code via an invalid EXIF image. NOTE: some of these details are obtained from third party information.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/ch1hyun/fuzzing-class
+
diff --git a/2010/CVE-2010-1146.md b/2010/CVE-2010-1146.md
index 4ba78f838f..ef1afd8ed1 100644
--- a/2010/CVE-2010-1146.md
+++ b/2010/CVE-2010-1146.md
@@ -19,6 +19,7 @@ No PoCs from references.
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
diff --git a/2010/CVE-2010-2240.md b/2010/CVE-2010-2240.md
index 28b63bbe09..3b31aba152 100644
--- a/2010/CVE-2010-2240.md
+++ b/2010/CVE-2010-2240.md
@@ -26,5 +26,6 @@ The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2010/CVE-2010-2568.md b/2010/CVE-2010-2568.md
index 56ad17217e..3b5e339434 100644
--- a/2010/CVE-2010-2568.md
+++ b/2010/CVE-2010-2568.md
@@ -16,6 +16,7 @@ Windows Shell in Microsoft Windows XP SP3, Server 2003 SP2, Vista SP1 and SP2, S
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Kuromesi/Py4CSKG
+- https://github.com/MN439/bingduziyuan
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/jisosomppi/pentesting
diff --git a/2010/CVE-2010-2883.md b/2010/CVE-2010-2883.md
index ffdd65eeee..152500fdec 100644
--- a/2010/CVE-2010-2883.md
+++ b/2010/CVE-2010-2883.md
@@ -18,6 +18,7 @@ No PoCs from references.
- https://github.com/ThunderJie/CVE
- https://github.com/Zhouyi827/myblog
- https://github.com/amliaW4/amliaW4.github.io
+- https://github.com/fangdada/ctf
- https://github.com/int0/pdfexplorer
- https://github.com/season-lab/rop-collection
- https://github.com/xinali/articles
diff --git a/2010/CVE-2010-2959.md b/2010/CVE-2010-2959.md
index c50fae370e..f616f78eeb 100644
--- a/2010/CVE-2010-2959.md
+++ b/2010/CVE-2010-2959.md
@@ -27,6 +27,7 @@ No PoCs from references.
- https://github.com/DhivaKD/OSCP-Notes
- https://github.com/Elinpf/OSCP-survival-guide
- https://github.com/Feng4/linux-kernel-exploits
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/MLGBSec/os-survival
@@ -102,6 +103,7 @@ No PoCs from references.
- https://github.com/spencerdodd/kernelpop
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/whackmanic/OSCP_Found
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xfinest/linux-kernel-exploits
- https://github.com/xssfile/linux-kernel-exploits
diff --git a/2010/CVE-2010-2963.md b/2010/CVE-2010-2963.md
index 5c9dccfcae..896cf0bc27 100644
--- a/2010/CVE-2010-2963.md
+++ b/2010/CVE-2010-2963.md
@@ -27,5 +27,6 @@ No PoCs from references.
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2010/CVE-2010-3081.md b/2010/CVE-2010-3081.md
index a9cbeefc72..aab71e7a5e 100644
--- a/2010/CVE-2010-3081.md
+++ b/2010/CVE-2010-3081.md
@@ -20,6 +20,7 @@ The compat_alloc_user_space functions in include/asm/compat.h files in the Linux
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
@@ -63,6 +64,7 @@ The compat_alloc_user_space functions in include/asm/compat.h files in the Linux
- https://github.com/ram4u/Linux_Exploit_Suggester
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xfinest/linux-kernel-exploits
- https://github.com/xssfile/linux-kernel-exploits
diff --git a/2010/CVE-2010-3301.md b/2010/CVE-2010-3301.md
index 47137ab777..9f8858b164 100644
--- a/2010/CVE-2010-3301.md
+++ b/2010/CVE-2010-3301.md
@@ -20,6 +20,7 @@ The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
@@ -62,6 +63,7 @@ The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the
- https://github.com/ram4u/Linux_Exploit_Suggester
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xfinest/linux-kernel-exploits
- https://github.com/xssfile/linux-kernel-exploits
diff --git a/2010/CVE-2010-3333.md b/2010/CVE-2010-3333.md
index c6e8179108..22cebecf43 100644
--- a/2010/CVE-2010-3333.md
+++ b/2010/CVE-2010-3333.md
@@ -30,6 +30,7 @@ No PoCs from references.
- https://github.com/doshyt/cve-monitor
- https://github.com/enthought/cve-search
- https://github.com/extremenetworks/cve-search-src
+- https://github.com/fangdada/ctf
- https://github.com/jerfinj/cve-search
- https://github.com/miradam/cve-search
- https://github.com/pandazheng/Threat-Intelligence-Analyst
diff --git a/2010/CVE-2010-3437.md b/2010/CVE-2010-3437.md
index 24b2ae6b81..20f0dad8b6 100644
--- a/2010/CVE-2010-3437.md
+++ b/2010/CVE-2010-3437.md
@@ -62,6 +62,7 @@ No PoCs from references.
- https://github.com/ram4u/Linux_Exploit_Suggester
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xfinest/linux-kernel-exploits
- https://github.com/xssfile/linux-kernel-exploits
diff --git a/2010/CVE-2010-3904.md b/2010/CVE-2010-3904.md
index 9b570191cc..ac18c67162 100644
--- a/2010/CVE-2010-3904.md
+++ b/2010/CVE-2010-3904.md
@@ -35,6 +35,7 @@ The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Socke
- https://github.com/Elinpf/OSCP-survival-guide
- https://github.com/Feng4/linux-kernel-exploits
- https://github.com/Gajasurve/The-Security-Handbook
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/MLGBSec/os-survival
- https://github.com/Micr067/linux-kernel-exploits
diff --git a/2010/CVE-2010-4073.md b/2010/CVE-2010-4073.md
index 354264b0b6..ff6bc75a36 100644
--- a/2010/CVE-2010-4073.md
+++ b/2010/CVE-2010-4073.md
@@ -21,6 +21,7 @@ The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not initialize cert
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
diff --git a/2010/CVE-2010-4258.md b/2010/CVE-2010-4258.md
index 398dd6e36f..eaae0c5ae0 100644
--- a/2010/CVE-2010-4258.md
+++ b/2010/CVE-2010-4258.md
@@ -21,6 +21,7 @@ The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does n
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
- https://github.com/HUSTSeclab/Kernel-Exploits
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
- https://github.com/QChiLan/linux-exp
@@ -65,6 +66,7 @@ The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does n
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/tranquac/Linux-Privilege-Escalation
- https://github.com/usamaelshazly/Linux-Privilege-Escalation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xfinest/linux-kernel-exploits
- https://github.com/xssfile/linux-kernel-exploits
diff --git a/2010/CVE-2010-4347.md b/2010/CVE-2010-4347.md
index bea1962a54..3271367891 100644
--- a/2010/CVE-2010-4347.md
+++ b/2010/CVE-2010-4347.md
@@ -19,6 +19,7 @@ No PoCs from references.
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
diff --git a/2010/CVE-2010-5137.md b/2010/CVE-2010-5137.md
index 66af5af16f..8c94db487a 100644
--- a/2010/CVE-2010-5137.md
+++ b/2010/CVE-2010-5137.md
@@ -14,6 +14,7 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/cryptoquick/ossification
- https://github.com/uvhw/conchimgiangnang
- https://github.com/uvhw/wallet.cpp
diff --git a/2011/CVE-2011-0923.md b/2011/CVE-2011-0923.md
index c59c21a540..ca32378a03 100644
--- a/2011/CVE-2011-0923.md
+++ b/2011/CVE-2011-0923.md
@@ -15,5 +15,5 @@ The client in HP Data Protector does not properly validate EXEC_CMD arguments, w
- http://securityreason.com/securityalert/8329
#### Github
-No PoCs found on GitHub currently.
+- https://github.com/marcocarolasec/CVE-2016-2004-Exploit
diff --git a/2011/CVE-2011-1493.md b/2011/CVE-2011-1493.md
index 175516cdd1..2182877888 100644
--- a/2011/CVE-2011-1493.md
+++ b/2011/CVE-2011-1493.md
@@ -27,5 +27,6 @@ No PoCs from references.
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2011/CVE-2011-2523.md b/2011/CVE-2011-2523.md
index 39e933db17..38b9da29b8 100644
--- a/2011/CVE-2011-2523.md
+++ b/2011/CVE-2011-2523.md
@@ -71,6 +71,7 @@ vsftpd 2.3.4 downloaded between 20110630 and 20110703 contains a backdoor which
- https://github.com/shamsulchowdhury/Unit-16-Homework-Penetration-Testing1
- https://github.com/slxwzk/slxwzkBotnet
- https://github.com/sponkmonk/Ladon_english_update
+- https://github.com/sug4r-wr41th/CVE-2011-2523
- https://github.com/sunzu94/vsftpd_2.3.4_Exploit
- https://github.com/tarikemal/exploit-ftp-samba
- https://github.com/thanawut2903/Port-21-tcp-vsftpd-2.3.4-exploit
diff --git a/2011/CVE-2011-3374.md b/2011/CVE-2011-3374.md
index ad0ac59fac..8179848253 100644
--- a/2011/CVE-2011-3374.md
+++ b/2011/CVE-2011-3374.md
@@ -36,6 +36,7 @@ No PoCs from references.
- https://github.com/garethr/snykout
- https://github.com/goharbor/pluggable-scanner-spec
- https://github.com/jnsgruk/trivy-cvss-tools
+- https://github.com/m-pasima/CI-CD-Security-image-scan
- https://github.com/mauraneh/WIK-DPS-TP02
- https://github.com/sharmapravin1001/Kubernetes-cks
- https://github.com/siddharthraopotukuchi/trivy
diff --git a/2011/CVE-2011-3389.md b/2011/CVE-2011-3389.md
index d4105dc7ab..1eaff481c8 100644
--- a/2011/CVE-2011-3389.md
+++ b/2011/CVE-2011-3389.md
@@ -40,6 +40,7 @@ The SSL protocol, as used in certain configurations in Microsoft Windows and Mic
- https://github.com/alexandrburyakov/Rep2
- https://github.com/alexgro1982/devops-netology
- https://github.com/bysart/devops-netology
+- https://github.com/catsploit/catsploit
- https://github.com/cdupuis/image-api
- https://github.com/daniel1302/litecoin
- https://github.com/dmitrii1312/03-sysadmin-09
diff --git a/2011/CVE-2011-3556.md b/2011/CVE-2011-3556.md
index bfaeaf4269..2b080eaae7 100644
--- a/2011/CVE-2011-3556.md
+++ b/2011/CVE-2011-3556.md
@@ -16,6 +16,7 @@ Unspecified vulnerability in the Java Runtime Environment component in Oracle Ja
#### Github
- https://github.com/20142995/Goby
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/HimmelAward/Goby_POC
- https://github.com/MelanyRoob/Goby
- https://github.com/Z0fhack/Goby_POC
diff --git a/2011/CVE-2011-3730.md b/2011/CVE-2011-3730.md
new file mode 100644
index 0000000000..3c89ba8e47
--- /dev/null
+++ b/2011/CVE-2011-3730.md
@@ -0,0 +1,17 @@
+### [CVE-2011-3730](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3730)
+
+
+
+
+### Description
+
+Drupal 7.0 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by modules/simpletest/tests/upgrade/drupal-6.upload.database.php and certain other files.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/catsploit/catsploit
+
diff --git a/2011/CVE-2011-4461.md b/2011/CVE-2011-4461.md
index bc7e5d5562..2be6c9c2e0 100644
--- a/2011/CVE-2011-4461.md
+++ b/2011/CVE-2011-4461.md
@@ -18,5 +18,6 @@ Jetty 8.1.0.RC2 and earlier computes hash values for form parameters without res
#### Github
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/javirodriguezzz/Shodan-Browser
diff --git a/2011/CVE-2011-4969.md b/2011/CVE-2011-4969.md
index c220c5c464..951d796e9c 100644
--- a/2011/CVE-2011-4969.md
+++ b/2011/CVE-2011-4969.md
@@ -14,6 +14,7 @@ Cross-site scripting (XSS) vulnerability in jQuery before 1.6.3, when using loca
#### Github
- https://github.com/FallibleInc/retirejslib
+- https://github.com/catsploit/catsploit
- https://github.com/ctcpip/jquery-security
- https://github.com/eliasgranderubio/4depcheck
diff --git a/2012/CVE-2012-0056.md b/2012/CVE-2012-0056.md
index 15aa65faa3..e80131bdd7 100644
--- a/2012/CVE-2012-0056.md
+++ b/2012/CVE-2012-0056.md
@@ -35,6 +35,7 @@ No PoCs from references.
- https://github.com/Elinpf/OSCP-survival-guide
- https://github.com/Feng4/linux-kernel-exploits
- https://github.com/Gajasurve/The-Security-Handbook
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/MLGBSec/os-survival
@@ -141,6 +142,7 @@ No PoCs from references.
- https://github.com/tranquac/Linux-Privilege-Escalation
- https://github.com/usamaelshazly/Linux-Privilege-Escalation
- https://github.com/whackmanic/OSCP_Found
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xcsrf/OSCP-PWK-Notes-Public
- https://github.com/xfinest/linux-kernel-exploits
diff --git a/2012/CVE-2012-0158.md b/2012/CVE-2012-0158.md
index d109c3ab52..d1688a387c 100644
--- a/2012/CVE-2012-0158.md
+++ b/2012/CVE-2012-0158.md
@@ -28,6 +28,7 @@ The (1) ListView, (2) ListView2, (3) TreeView, and (4) TreeView2 ActiveX control
- https://github.com/amliaW4/amliaW4.github.io
- https://github.com/cnhouzi/APTNotes
- https://github.com/czq945659538/-study
+- https://github.com/fangdada/ctf
- https://github.com/havocykp/Vulnerability-analysis
- https://github.com/helloandrewpaul/Mandiant---APT
- https://github.com/houjingyi233/office-exploit-case-study
diff --git a/2012/CVE-2012-1823.md b/2012/CVE-2012-1823.md
index 3da90be41e..5f6228956f 100644
--- a/2012/CVE-2012-1823.md
+++ b/2012/CVE-2012-1823.md
@@ -38,9 +38,11 @@ No PoCs from references.
- https://github.com/Soundaryakambhampati/test-6
- https://github.com/Unix13/metasploitable2
- https://github.com/Vibragence/Dockersploit
+- https://github.com/XiangDongCJC/CVE-2024-4577-PHP-CGI-RCE
- https://github.com/ajread4/cve_pull
- https://github.com/alex14324/Eagel
- https://github.com/beched/libpywebhack
+- https://github.com/bl4cksku11/CVE-2024-4577
- https://github.com/cyberdeception/deepdig
- https://github.com/cyberharsh/PHP_CVE-2012-1823
- https://github.com/daai1/CVE-2012-1823
diff --git a/2012/CVE-2012-2098.md b/2012/CVE-2012-2098.md
index cdb8783c3a..6cf3595eb6 100644
--- a/2012/CVE-2012-2098.md
+++ b/2012/CVE-2012-2098.md
@@ -18,5 +18,6 @@ Algorithmic complexity vulnerability in the sorting algorithms in bzip2 compress
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/BrunoBonacci/lein-binplus
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/markus-wa/clj-bin
diff --git a/2012/CVE-2012-2836.md b/2012/CVE-2012-2836.md
index 0781168672..7bb8bcff51 100644
--- a/2012/CVE-2012-2836.md
+++ b/2012/CVE-2012-2836.md
@@ -15,5 +15,6 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/asur4s/fuzzing
+- https://github.com/ch1hyun/fuzzing-class
- https://github.com/chiehw/fuzzing
diff --git a/2012/CVE-2012-2982.md b/2012/CVE-2012-2982.md
index 2cd7ea1de5..9b190bb1ed 100644
--- a/2012/CVE-2012-2982.md
+++ b/2012/CVE-2012-2982.md
@@ -28,6 +28,7 @@ file/show.cgi in Webmin 1.590 and earlier allows remote authenticated users to e
- https://github.com/Mithlonde/Mithlonde
- https://github.com/OstojaOfficial/CVE-2012-2982
- https://github.com/R00tendo/CVE-2012-2982
+- https://github.com/Shadow-Spinner/CVE-2012-2982_python
- https://github.com/SlizBinksman/CVE_2012-2982
- https://github.com/Will-Banksy/My-Exploits
- https://github.com/alien-keric/webmin-v1.580-exploit
diff --git a/2012/CVE-2012-3174.md b/2012/CVE-2012-3174.md
index acb8f726cd..4171ef8bdf 100644
--- a/2012/CVE-2012-3174.md
+++ b/2012/CVE-2012-3174.md
@@ -15,4 +15,5 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ferdinandmudjialim/metasploit-cve-search
+- https://github.com/tunnelcat/metasploit-cve-search
diff --git a/2012/CVE-2012-4929.md b/2012/CVE-2012-4929.md
index 4cd92716a0..e33033a766 100644
--- a/2012/CVE-2012-4929.md
+++ b/2012/CVE-2012-4929.md
@@ -62,6 +62,7 @@ The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt,
- https://github.com/ilya-starchikov/devops-netology
- https://github.com/jselvi/docker-crime
- https://github.com/mohitrex7/Wap-Recon
+- https://github.com/mpgn/CRIME-poc
- https://github.com/nikolay480/devops-netology
- https://github.com/nkiselyov/devops-netology
- https://github.com/paroteen/SecurEagle
diff --git a/2012/CVE-2012-5321.md b/2012/CVE-2012-5321.md
index 70d40948e8..d70c5b246e 100644
--- a/2012/CVE-2012-5321.md
+++ b/2012/CVE-2012-5321.md
@@ -13,5 +13,5 @@ tiki-featured_link.php in TikiWiki CMS/Groupware 8.3 allows remote attackers to
- http://st2tea.blogspot.com/2012/02/tiki-wiki-cms-groupware-frame-injection.html
#### Github
-No PoCs found on GitHub currently.
+- https://github.com/Cappricio-Securities/CVE-2012-5321
diff --git a/2012/CVE-2012-6664.md b/2012/CVE-2012-6664.md
new file mode 100644
index 0000000000..46f362ab2b
--- /dev/null
+++ b/2012/CVE-2012-6664.md
@@ -0,0 +1,17 @@
+### [CVE-2012-6664](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6664)
+
+
+
+
+### Description
+
+Multiple directory traversal vulnerabilities in the TFTP Server in Distinct Intranet Servers 3.10 and earlier allow remote attackers to read or write arbitrary files via a .. (dot dot) in the (1) get or (2) put commands.
+
+### POC
+
+#### Reference
+- https://www.exploit-db.com/exploits/41714
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2012/CVE-2012-6708.md b/2012/CVE-2012-6708.md
index 71a718a7ca..e0c4844b61 100644
--- a/2012/CVE-2012-6708.md
+++ b/2012/CVE-2012-6708.md
@@ -17,6 +17,7 @@ jQuery before 1.9.0 is vulnerable to Cross-site Scripting (XSS) attacks. The jQu
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/catdever/watchdog
+- https://github.com/catsploit/catsploit
- https://github.com/ctcpip/jquery-security
- https://github.com/flipkart-incubator/watchdog
- https://github.com/rohankumardubey/watchdog
diff --git a/2013/CVE-2013-0268.md b/2013/CVE-2013-0268.md
index ab2e2a7667..b02aa84dd4 100644
--- a/2013/CVE-2013-0268.md
+++ b/2013/CVE-2013-0268.md
@@ -19,6 +19,7 @@ No PoCs from references.
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
- https://github.com/QChiLan/linux-exp
diff --git a/2013/CVE-2013-1763.md b/2013/CVE-2013-1763.md
index 7fef43b91f..8a87080401 100644
--- a/2013/CVE-2013-1763.md
+++ b/2013/CVE-2013-1763.md
@@ -21,6 +21,7 @@ Array index error in the __sock_diag_rcv_msg function in net/core/sock_diag.c in
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
- https://github.com/QChiLan/linux-exp
@@ -61,6 +62,7 @@ Array index error in the __sock_diag_rcv_msg function in net/core/sock_diag.c in
- https://github.com/rakjong/LinuxElevation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xfinest/linux-kernel-exploits
- https://github.com/xssfile/linux-kernel-exploits
diff --git a/2013/CVE-2013-1768.md b/2013/CVE-2013-1768.md
index 0cf2a61629..68a8b312b7 100644
--- a/2013/CVE-2013-1768.md
+++ b/2013/CVE-2013-1768.md
@@ -18,6 +18,7 @@ The BrokerFactory functionality in Apache OpenJPA 1.x before 1.2.3 and 2.x befor
- https://github.com/BrittanyKuhn/javascript-tutorial
- https://github.com/CGCL-codes/PHunter
- https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet
+- https://github.com/LibHunter/LibHunter
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs
- https://github.com/klausware/Java-Deserialization-Cheat-Sheet
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
diff --git a/2013/CVE-2013-1858.md b/2013/CVE-2013-1858.md
index 205197b7b2..8f423f5ff1 100644
--- a/2013/CVE-2013-1858.md
+++ b/2013/CVE-2013-1858.md
@@ -19,6 +19,7 @@ The clone system-call implementation in the Linux kernel before 3.8.3 does not p
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
- https://github.com/QChiLan/linux-exp
diff --git a/2013/CVE-2013-1959.md b/2013/CVE-2013-1959.md
index fbb27de16c..5d29fc0c2d 100644
--- a/2013/CVE-2013-1959.md
+++ b/2013/CVE-2013-1959.md
@@ -13,5 +13,6 @@ kernel/user_namespace.c in the Linux kernel before 3.8.9 does not have appropria
- http://www.openwall.com/lists/oss-security/2013/04/29/1
#### Github
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
diff --git a/2013/CVE-2013-2094.md b/2013/CVE-2013-2094.md
index f894a6a492..4918877257 100644
--- a/2013/CVE-2013-2094.md
+++ b/2013/CVE-2013-2094.md
@@ -25,6 +25,7 @@ The perf_swevent_init function in kernel/events/core.c in the Linux kernel befor
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/I-Prashanth-S/CybersecurityTIFAC
- https://github.com/IMCG/awesome-c
- https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
@@ -96,6 +97,7 @@ The perf_swevent_init function in kernel/events/core.c in the Linux kernel befor
- https://github.com/timhsutw/cve-2013-2094
- https://github.com/vnik5287/CVE-2013-2094
- https://github.com/weeka10/-hktalent-TOP
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xfinest/linux-kernel-exploits
- https://github.com/xssfile/linux-kernel-exploits
diff --git a/2013/CVE-2013-6805.md b/2013/CVE-2013-6805.md
index 9b3ade0e4f..9a92fe18ae 100644
--- a/2013/CVE-2013-6805.md
+++ b/2013/CVE-2013-6805.md
@@ -13,4 +13,5 @@ OpenText Exceed OnDemand (EoD) 8 uses weak encryption for passwords, which makes
- https://github.com/koto/exceed-mitm
#### Github
+- https://github.com/koto/exceed-mitm
diff --git a/2013/CVE-2013-6806.md b/2013/CVE-2013-6806.md
index b82c1bfa69..7eb13a4000 100644
--- a/2013/CVE-2013-6806.md
+++ b/2013/CVE-2013-6806.md
@@ -13,4 +13,5 @@ OpenText Exceed OnDemand (EoD) 8 allows man-in-the-middle attackers to disable b
- https://github.com/koto/exceed-mitm
#### Github
+- https://github.com/koto/exceed-mitm
diff --git a/2013/CVE-2013-6807.md b/2013/CVE-2013-6807.md
index d0430969a8..c992aa9450 100644
--- a/2013/CVE-2013-6807.md
+++ b/2013/CVE-2013-6807.md
@@ -13,4 +13,5 @@ The client in OpenText Exceed OnDemand (EoD) 8 supports anonymous ciphers by def
- https://github.com/koto/exceed-mitm
#### Github
+- https://github.com/koto/exceed-mitm
diff --git a/2013/CVE-2013-7285.md b/2013/CVE-2013-7285.md
index bf85bfa308..b88fa7bf0e 100644
--- a/2013/CVE-2013-7285.md
+++ b/2013/CVE-2013-7285.md
@@ -17,6 +17,7 @@ Xstream API versions up to 1.4.6 and version 1.4.10, if the security framework h
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/Live-Hack-CVE/CVE-2019-10173
- https://github.com/OWASP/www-project-ide-vulscanner
- https://github.com/Whoopsunix/PPPVULNS
diff --git a/2014/CVE-2014-0038.md b/2014/CVE-2014-0038.md
index 31a7ee8017..37ba9b5ac0 100644
--- a/2014/CVE-2014-0038.md
+++ b/2014/CVE-2014-0038.md
@@ -24,6 +24,7 @@ The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before 3.13
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
- https://github.com/GhostTroops/TOP
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/IMCG/awesome-c
- https://github.com/JERRY123S/all-poc
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
@@ -77,6 +78,7 @@ The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before 3.13
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/sujayadkesar/Linux-Privilege-Escalation
- https://github.com/weeka10/-hktalent-TOP
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xfinest/linux-kernel-exploits
- https://github.com/xssfile/linux-kernel-exploits
diff --git a/2014/CVE-2014-0193.md b/2014/CVE-2014-0193.md
index d1940a3848..3964756fec 100644
--- a/2014/CVE-2014-0193.md
+++ b/2014/CVE-2014-0193.md
@@ -15,5 +15,6 @@ No PoCs from references.
#### Github
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/ian4hu/super-pom
diff --git a/2014/CVE-2014-0196.md b/2014/CVE-2014-0196.md
index e9335fc62f..adc2cf9650 100644
--- a/2014/CVE-2014-0196.md
+++ b/2014/CVE-2014-0196.md
@@ -22,6 +22,7 @@ The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
- https://github.com/Ostorlab/KEV
@@ -70,6 +71,7 @@ The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/tangsilian/android-vuln
- https://github.com/tempbottle/CVE-2014-0196
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xfinest/linux-kernel-exploits
- https://github.com/xssfile/linux-kernel-exploits
diff --git a/2014/CVE-2014-125093.md b/2014/CVE-2014-125093.md
new file mode 100644
index 0000000000..251e7b30c0
--- /dev/null
+++ b/2014/CVE-2014-125093.md
@@ -0,0 +1,17 @@
+### [CVE-2014-125093](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-125093)
+
+
+
+
+### Description
+
+A vulnerability has been found in Ad Blocking Detector Plugin up to 1.2.1 on WordPress and classified as problematic. This vulnerability affects unknown code of the file ad-blocking-detector.php. The manipulation leads to information disclosure. The attack can be initiated remotely. Upgrading to version 1.2.2 is able to address this issue. The patch is identified as 3312b9cd79e5710d1e282fc9216a4e5ab31b3d94. It is recommended to upgrade the affected component. VDB-222610 is the identifier assigned to this vulnerability.
+
+### POC
+
+#### Reference
+- https://vuldb.com/?id.222610
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2014/CVE-2014-2851.md b/2014/CVE-2014-2851.md
index 15cbc6bffb..f580008426 100644
--- a/2014/CVE-2014-2851.md
+++ b/2014/CVE-2014-2851.md
@@ -30,5 +30,6 @@ No PoCs from references.
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/thomaxxl/group_info
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2014/CVE-2014-3153.md b/2014/CVE-2014-3153.md
index 035a31fb56..230df76172 100644
--- a/2014/CVE-2014-3153.md
+++ b/2014/CVE-2014-3153.md
@@ -23,6 +23,7 @@ No PoCs from references.
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
- https://github.com/GhostTroops/TOP
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/I-Prashanth-S/CybersecurityTIFAC
- https://github.com/IMCG/awesome-c
- https://github.com/JERRY123S/all-poc
@@ -94,6 +95,7 @@ No PoCs from references.
- https://github.com/timwr/CVE-2014-3153
- https://github.com/tymat/android_futex_root
- https://github.com/weeka10/-hktalent-TOP
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xfinest/linux-kernel-exploits
- https://github.com/xssfile/linux-kernel-exploits
diff --git a/2014/CVE-2014-3488.md b/2014/CVE-2014-3488.md
index 212c9fb016..9ba94960c1 100644
--- a/2014/CVE-2014-3488.md
+++ b/2014/CVE-2014-3488.md
@@ -15,6 +15,7 @@ No PoCs from references.
#### Github
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/cezapata/appconfiguration-sample
- https://github.com/ian4hu/super-pom
diff --git a/2014/CVE-2014-3566.md b/2014/CVE-2014-3566.md
index 29ca847531..c5993f7dfc 100644
--- a/2014/CVE-2014-3566.md
+++ b/2014/CVE-2014-3566.md
@@ -95,6 +95,7 @@ The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses
- https://github.com/mawinkler/c1-ws-ansible
- https://github.com/mikemackintosh/ruby-qualys
- https://github.com/mikesplain/CVE-2014-3566-poodle-cookbook
+- https://github.com/mpgn/poodle-PoC
- https://github.com/n13l/measurements
- https://github.com/neominds/ric13351
- https://github.com/nikolay480/devops-netology
diff --git a/2014/CVE-2014-3577.md b/2014/CVE-2014-3577.md
index 2c9c678766..a1408bcbeb 100644
--- a/2014/CVE-2014-3577.md
+++ b/2014/CVE-2014-3577.md
@@ -18,6 +18,7 @@ org.apache.http.conn.ssl.AbstractVerifier in Apache HttpComponents HttpClient be
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/albfernandez/commons-httpclient-3
- https://github.com/argon-gh-demo/clojure-sample
- https://github.com/rm-hull/nvd-clojure
diff --git a/2014/CVE-2014-3704.md b/2014/CVE-2014-3704.md
index becd811933..1e205068b1 100644
--- a/2014/CVE-2014-3704.md
+++ b/2014/CVE-2014-3704.md
@@ -39,6 +39,7 @@ The expandArguments function in the database abstraction API in Drupal core 7.x
- https://github.com/Threekiii/Vulhub-Reproduce
- https://github.com/Z0fhack/Goby_POC
- https://github.com/bakery312/Vulhub-Reproduce
+- https://github.com/catsploit/catsploit
- https://github.com/enomothem/PenTestNote
- https://github.com/happynote3966/CVE-2014-3704
- https://github.com/hxysaury/saury-vulnhub
diff --git a/2014/CVE-2014-3791.md b/2014/CVE-2014-3791.md
index d137d1b1e9..a4275a7d04 100644
--- a/2014/CVE-2014-3791.md
+++ b/2014/CVE-2014-3791.md
@@ -16,5 +16,6 @@ Stack-based buffer overflow in Easy File Sharing (EFS) Web Server 6.8 allows rem
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/Parist0nH1ll/Vulnerabilities-Write-Ups
+- https://github.com/fangdada/ctf
- https://github.com/hectorgie/PoC-in-GitHub
diff --git a/2014/CVE-2014-4014.md b/2014/CVE-2014-4014.md
index 6c6322f49f..518daa452c 100644
--- a/2014/CVE-2014-4014.md
+++ b/2014/CVE-2014-4014.md
@@ -19,6 +19,7 @@ The capabilities implementation in the Linux kernel before 3.14.8 does not prope
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
- https://github.com/QChiLan/linux-exp
@@ -60,6 +61,7 @@ The capabilities implementation in the Linux kernel before 3.14.8 does not prope
- https://github.com/spencerdodd/kernelpop
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/vnik5287/cve-2014-4014-privesc
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xfinest/linux-kernel-exploits
- https://github.com/xssfile/linux-kernel-exploits
diff --git a/2014/CVE-2014-4322.md b/2014/CVE-2014-4322.md
index 937d5edd2c..d29ae43ea5 100644
--- a/2014/CVE-2014-4322.md
+++ b/2014/CVE-2014-4322.md
@@ -47,5 +47,6 @@ No PoCs from references.
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/tangsilian/android-vuln
- https://github.com/weeka10/-hktalent-TOP
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2014/CVE-2014-4699.md b/2014/CVE-2014-4699.md
index fe65e04541..38716a4e91 100644
--- a/2014/CVE-2014-4699.md
+++ b/2014/CVE-2014-4699.md
@@ -23,6 +23,7 @@ The Linux kernel before 3.15.4 on Intel processors does not properly restrict us
- https://github.com/C0dak/local-root-exploit-
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
- https://github.com/QChiLan/linux-exp
@@ -66,6 +67,7 @@ The Linux kernel before 3.15.4 on Intel processors does not properly restrict us
- https://github.com/spencerdodd/kernelpop
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/vnik5287/cve-2014-4699-ptrace
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xfinest/linux-kernel-exploits
- https://github.com/xssfile/linux-kernel-exploits
diff --git a/2014/CVE-2014-4943.md b/2014/CVE-2014-4943.md
index ed339b3bda..255a09cee2 100644
--- a/2014/CVE-2014-4943.md
+++ b/2014/CVE-2014-4943.md
@@ -28,5 +28,6 @@ The PPPoL2TP feature in net/l2tp/l2tp_ppp.c in the Linux kernel through 3.15.6 a
- https://github.com/redes-2015/l2tp-socket-bug
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2014/CVE-2014-5329.md b/2014/CVE-2014-5329.md
index 83fd10d46b..8cd6f352db 100644
--- a/2014/CVE-2014-5329.md
+++ b/2014/CVE-2014-5329.md
@@ -8,8 +8,7 @@
### Description
-GIGAPOD file servers (Appliance model and Software model) provide two web interfaces, 80/tcp and 443/tcp for user operation, and 8001/tcp for administrative operation.
-8001/tcp is served by a version of Apache HTTP server containing a flaw in handling HTTP requests (CVE-2011-3192), which may lead to a denial-of-service (DoS) condition.
+GIGAPOD file servers (Appliance model and Software model) provide two web interfaces, 80/tcp and 443/tcp for user operation, and 8001/tcp for administrative operation.
8001/tcp is served by a version of Apache HTTP server containing a flaw in handling HTTP requests (CVE-2011-3192), which may lead to a denial-of-service (DoS) condition.
### POC
diff --git a/2014/CVE-2014-5470.md b/2014/CVE-2014-5470.md
new file mode 100644
index 0000000000..ca33617d48
--- /dev/null
+++ b/2014/CVE-2014-5470.md
@@ -0,0 +1,17 @@
+### [CVE-2014-5470](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5470)
+
+
+
+
+### Description
+
+Actual Analyzer through 2014-08-29 allows code execution via shell metacharacters because untrusted input is used for part of the input data passed to an eval operation.
+
+### POC
+
+#### Reference
+- https://www.exploit-db.com/exploits/35549
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2014/CVE-2014-9322.md b/2014/CVE-2014-9322.md
index c3635414f1..a9c406db97 100644
--- a/2014/CVE-2014-9322.md
+++ b/2014/CVE-2014-9322.md
@@ -15,6 +15,7 @@ arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly h
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Flerov/WindowsExploitDev
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/R0B1NL1N/linux-kernel-exploitation
- https://github.com/RKX1209/CVE-2014-9322
@@ -34,5 +35,6 @@ arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly h
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/tangsilian/android-vuln
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2014/CVE-2014-9418.md b/2014/CVE-2014-9418.md
index a4e61ab8a8..441f844b28 100644
--- a/2014/CVE-2014-9418.md
+++ b/2014/CVE-2014-9418.md
@@ -13,5 +13,6 @@ The eSpace Meeting ActiveX control (eSpaceStatusCtrl.dll) in Huawei eSpace Deskt
- http://packetstormsecurity.com/files/152968/Huawei-eSpace-1.1.11.103-Meeting-Heap-Overflow.html
#### Github
+- https://github.com/javierparadadev/python-value-objects
- https://github.com/jparadadev/python-value-objects
diff --git a/2015/CVE-2015-0204.md b/2015/CVE-2015-0204.md
index 64555a8d1d..68ffab3848 100644
--- a/2015/CVE-2015-0204.md
+++ b/2015/CVE-2015-0204.md
@@ -49,6 +49,7 @@ The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0
- https://github.com/anthophilee/A2SV--SSL-VUL-Scan
- https://github.com/bysart/devops-netology
- https://github.com/camel-clarkson/non-controlflow-hijacking-datasets
+- https://github.com/catsploit/catsploit
- https://github.com/chnzzh/OpenSSL-CVE-lib
- https://github.com/clic-kbait/A2SV--SSL-VUL-Scan
- https://github.com/clino-mania/A2SV--SSL-VUL-Scan
diff --git a/2015/CVE-2015-0568.md b/2015/CVE-2015-0568.md
index 02332843af..d918dbe9ef 100644
--- a/2015/CVE-2015-0568.md
+++ b/2015/CVE-2015-0568.md
@@ -25,5 +25,6 @@ No PoCs from references.
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2015/CVE-2015-0570.md b/2015/CVE-2015-0570.md
index 99007b01b5..fc4add9736 100644
--- a/2015/CVE-2015-0570.md
+++ b/2015/CVE-2015-0570.md
@@ -27,5 +27,6 @@ No PoCs from references.
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2015/CVE-2015-1328.md b/2015/CVE-2015-1328.md
index a7f1abaab4..6bb25624da 100644
--- a/2015/CVE-2015-1328.md
+++ b/2015/CVE-2015-1328.md
@@ -23,6 +23,7 @@ The overlayfs implementation in the linux (aka Linux kernel) package before 3.19
- https://github.com/DarkenCode/PoC
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/Jean-Francois-C/Boot2root-CTFs-Writeups
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
diff --git a/2015/CVE-2015-1805.md b/2015/CVE-2015-1805.md
index fa170ebbfc..bec7f458f7 100644
--- a/2015/CVE-2015-1805.md
+++ b/2015/CVE-2015-1805.md
@@ -48,5 +48,6 @@ The (1) pipe_read and (2) pipe_write implementations in fs/pipe.c in the Linux k
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/tangsilian/android-vuln
- https://github.com/weeka10/-hktalent-TOP
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2015/CVE-2015-1833.md b/2015/CVE-2015-1833.md
index 2caabd9d8e..e52f5bda93 100644
--- a/2015/CVE-2015-1833.md
+++ b/2015/CVE-2015-1833.md
@@ -18,6 +18,7 @@ XML external entity (XXE) vulnerability in Apache Jackrabbit before 2.0.6, 2.2.x
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/Raz0r/aemscan
- https://github.com/TheRipperJhon/AEMVS
- https://github.com/amarnathadapa-sec/aem
diff --git a/2015/CVE-2015-2080.md b/2015/CVE-2015-2080.md
index 85360f0fb7..9e1056b4b7 100644
--- a/2015/CVE-2015-2080.md
+++ b/2015/CVE-2015-2080.md
@@ -22,6 +22,7 @@ The exception handling code in Eclipse Jetty before 9.2.9.v20150224 allows remot
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
- https://github.com/Elsfa7-110/kenzer-templates
+- https://github.com/LibHunter/LibHunter
- https://github.com/albinowax/ActiveScanPlusPlus
- https://github.com/cranelab/webapp-tech
- https://github.com/ilmila/J2EEScan
diff --git a/2015/CVE-2015-2156.md b/2015/CVE-2015-2156.md
index 6db1dd3da9..9d9db23f9b 100644
--- a/2015/CVE-2015-2156.md
+++ b/2015/CVE-2015-2156.md
@@ -16,5 +16,6 @@ Netty before 3.9.8.Final, 3.10.x before 3.10.3.Final, 4.0.x before 4.0.28.Final,
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/cezapata/appconfiguration-sample
diff --git a/2015/CVE-2015-3253.md b/2015/CVE-2015-3253.md
index a95f99d13f..bce7f1a336 100644
--- a/2015/CVE-2015-3253.md
+++ b/2015/CVE-2015-3253.md
@@ -29,6 +29,7 @@ The MethodClosure class in runtime/MethodClosure.java in Apache Groovy 1.7.0 thr
- https://github.com/CodeIntelligenceTesting/java-demo
- https://github.com/CodeIntelligenceTesting/java-demo-old
- https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet
+- https://github.com/LibHunter/LibHunter
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs
- https://github.com/TheGrinch/elastic
- https://github.com/angelwhu/XStream_unserialization
diff --git a/2015/CVE-2015-3636.md b/2015/CVE-2015-3636.md
index a7342aa598..5e36db49d7 100644
--- a/2015/CVE-2015-3636.md
+++ b/2015/CVE-2015-3636.md
@@ -49,5 +49,6 @@ The ping_unhash function in net/ipv4/ping.c in the Linux kernel before 4.0.3 doe
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/tangsilian/android-vuln
- https://github.com/weeka10/-hktalent-TOP
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2015/CVE-2015-5256.md b/2015/CVE-2015-5256.md
index 01863d3075..039d9778b4 100644
--- a/2015/CVE-2015-5256.md
+++ b/2015/CVE-2015-5256.md
@@ -15,4 +15,5 @@ Apache Cordova-Android before 4.1.0, when an application relies on a remote serv
#### Github
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
diff --git a/2015/CVE-2015-5262.md b/2015/CVE-2015-5262.md
index 3a529b358f..ef7e9de0cf 100644
--- a/2015/CVE-2015-5262.md
+++ b/2015/CVE-2015-5262.md
@@ -17,6 +17,7 @@ http/conn/ssl/SSLConnectionSocketFactory.java in Apache HttpComponents HttpClien
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/albfernandez/commons-httpclient-3
- https://github.com/argon-gh-demo/clojure-sample
- https://github.com/dotanuki-labs/android-oss-cves-research
diff --git a/2015/CVE-2015-6644.md b/2015/CVE-2015-6644.md
index 80b7071b1b..8d88e05278 100644
--- a/2015/CVE-2015-6644.md
+++ b/2015/CVE-2015-6644.md
@@ -17,6 +17,7 @@ No PoCs from references.
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
- https://github.com/IkerSaint/VULNAPP-vulnerable-app
+- https://github.com/LibHunter/LibHunter
- https://github.com/brianhigh/us-cert-bulletins
- https://github.com/pctF/vulnerable-app
diff --git a/2015/CVE-2015-6748.md b/2015/CVE-2015-6748.md
index 9dcab375f5..ee08bb745b 100644
--- a/2015/CVE-2015-6748.md
+++ b/2015/CVE-2015-6748.md
@@ -16,5 +16,6 @@ Cross-site scripting (XSS) vulnerability in jsoup before 1.8.3.
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/epicosy/VUL4J-59
diff --git a/2015/CVE-2015-6925.md b/2015/CVE-2015-6925.md
index af378dc3e6..8b79788f50 100644
--- a/2015/CVE-2015-6925.md
+++ b/2015/CVE-2015-6925.md
@@ -14,6 +14,7 @@ wolfSSL (formerly CyaSSL) before 3.6.8 allows remote attackers to cause a denial
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/IAIK/wolfSSL-DoS
- https://github.com/MrE-Fog/wolfSSL-DoS
- https://github.com/MrE-Fog/wolfSSL-DoS3
diff --git a/2015/CVE-2015-8320.md b/2015/CVE-2015-8320.md
index 0b58a08a08..be3a116571 100644
--- a/2015/CVE-2015-8320.md
+++ b/2015/CVE-2015-8320.md
@@ -15,4 +15,5 @@ Apache Cordova-Android before 3.7.0 improperly generates random values for Bridg
#### Github
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
diff --git a/2015/CVE-2015-8399.md b/2015/CVE-2015-8399.md
index 60f663b635..b97a0240aa 100644
--- a/2015/CVE-2015-8399.md
+++ b/2015/CVE-2015-8399.md
@@ -20,5 +20,6 @@ Atlassian Confluence before 5.8.17 allows remote authenticated users to read con
- https://github.com/Elsfa7-110/kenzer-templates
- https://github.com/HimmelAward/Goby_POC
- https://github.com/Z0fhack/Goby_POC
+- https://github.com/enomothem/PenTestNote
- https://github.com/jweny/pocassistdb
diff --git a/2015/CVE-2015-8550.md b/2015/CVE-2015-8550.md
index c62292059e..84c1fae437 100644
--- a/2015/CVE-2015-8550.md
+++ b/2015/CVE-2015-8550.md
@@ -14,6 +14,7 @@ Xen, when used on a system providing PV backends, allows local guest OS administ
#### Github
- https://github.com/Al1ex/LinuxEelvation
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/bsauce/kernel-exploit-factory
- https://github.com/jfbastien/no-sane-compiler
diff --git a/2015/CVE-2015-8660.md b/2015/CVE-2015-8660.md
index 73f6d07f09..ad62a57abb 100644
--- a/2015/CVE-2015-8660.md
+++ b/2015/CVE-2015-8660.md
@@ -19,6 +19,7 @@ The ovl_setattr function in fs/overlayfs/inode.c in the Linux kernel through 4.3
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Live-Hack-CVE/CVE-2015-8660
- https://github.com/chorankates/Irked
diff --git a/2016/CVE-2016-0701.md b/2016/CVE-2016-0701.md
index ba759d5017..0885c8d338 100644
--- a/2016/CVE-2016-0701.md
+++ b/2016/CVE-2016-0701.md
@@ -25,6 +25,7 @@ The DH_check_pub_key function in crypto/dh/dh_check.c in OpenSSL 1.0.2 before 1.
- https://github.com/RClueX/Hackerone-Reports
- https://github.com/chnzzh/OpenSSL-CVE-lib
- https://github.com/erwinchang/utility-library
+- https://github.com/forget-eve/NSP
- https://github.com/imhunterand/hackerone-publicy-disclosed
- https://github.com/luanjampa/cve-2016-0701
diff --git a/2016/CVE-2016-0728.md b/2016/CVE-2016-0728.md
index 75f37effe7..763ae5cdd1 100644
--- a/2016/CVE-2016-0728.md
+++ b/2016/CVE-2016-0728.md
@@ -25,6 +25,7 @@ The join_session_keyring function in security/keys/process_keys.c in the Linux k
- https://github.com/De30/zabbix_community-templates
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Michael-Git-Web/templateszbx
- https://github.com/Micr067/linux-kernel-exploits
@@ -95,6 +96,7 @@ The join_session_keyring function in security/keys/process_keys.c in the Linux k
- https://github.com/th30d00r/Linux-Vulnerability-CVE-2016-0728-and-Exploit
- https://github.com/tndud042713/cve
- https://github.com/whiteHat001/Kernel-Security
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
- https://github.com/xfinest/linux-kernel-exploits
diff --git a/2016/CVE-2016-0819.md b/2016/CVE-2016-0819.md
index 840ddea35b..2cc6978b26 100644
--- a/2016/CVE-2016-0819.md
+++ b/2016/CVE-2016-0819.md
@@ -27,5 +27,6 @@ No PoCs from references.
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2016/CVE-2016-0820.md b/2016/CVE-2016-0820.md
index ac0475b273..8436b1a820 100644
--- a/2016/CVE-2016-0820.md
+++ b/2016/CVE-2016-0820.md
@@ -27,5 +27,6 @@ No PoCs from references.
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2016/CVE-2016-1000339.md b/2016/CVE-2016-1000339.md
index 8effbb012d..2f60bb2749 100644
--- a/2016/CVE-2016-1000339.md
+++ b/2016/CVE-2016-1000339.md
@@ -17,6 +17,7 @@ In the Bouncy Castle JCE Provider version 1.55 and earlier the primary engine cl
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
- https://github.com/IkerSaint/VULNAPP-vulnerable-app
+- https://github.com/LibHunter/LibHunter
- https://github.com/pctF/vulnerable-app
- https://github.com/wolpert/crypto
diff --git a/2016/CVE-2016-1000341.md b/2016/CVE-2016-1000341.md
index 5760804bb3..e618c8203d 100644
--- a/2016/CVE-2016-1000341.md
+++ b/2016/CVE-2016-1000341.md
@@ -17,5 +17,6 @@ In the Bouncy Castle JCE Provider version 1.55 and earlier DSA signature generat
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
- https://github.com/IkerSaint/VULNAPP-vulnerable-app
+- https://github.com/LibHunter/LibHunter
- https://github.com/pctF/vulnerable-app
diff --git a/2016/CVE-2016-1000342.md b/2016/CVE-2016-1000342.md
index 2a8ee86954..1bbf0c7139 100644
--- a/2016/CVE-2016-1000342.md
+++ b/2016/CVE-2016-1000342.md
@@ -17,5 +17,6 @@ In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
- https://github.com/IkerSaint/VULNAPP-vulnerable-app
+- https://github.com/LibHunter/LibHunter
- https://github.com/pctF/vulnerable-app
diff --git a/2016/CVE-2016-1000343.md b/2016/CVE-2016-1000343.md
index 4bd44a5b8a..15132cf377 100644
--- a/2016/CVE-2016-1000343.md
+++ b/2016/CVE-2016-1000343.md
@@ -18,5 +18,6 @@ In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair gene
- https://github.com/CGCL-codes/PHunter
- https://github.com/CyberSource/cybersource-sdk-java
- https://github.com/IkerSaint/VULNAPP-vulnerable-app
+- https://github.com/LibHunter/LibHunter
- https://github.com/pctF/vulnerable-app
diff --git a/2016/CVE-2016-1000344.md b/2016/CVE-2016-1000344.md
index 327838134d..fc483ae6bf 100644
--- a/2016/CVE-2016-1000344.md
+++ b/2016/CVE-2016-1000344.md
@@ -18,5 +18,6 @@ In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES implementat
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
- https://github.com/IkerSaint/VULNAPP-vulnerable-app
+- https://github.com/LibHunter/LibHunter
- https://github.com/pctF/vulnerable-app
diff --git a/2016/CVE-2016-1000345.md b/2016/CVE-2016-1000345.md
index 5a256786c1..34c967f096 100644
--- a/2016/CVE-2016-1000345.md
+++ b/2016/CVE-2016-1000345.md
@@ -17,5 +17,6 @@ In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES/ECIES CBC m
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
- https://github.com/IkerSaint/VULNAPP-vulnerable-app
+- https://github.com/LibHunter/LibHunter
- https://github.com/pctF/vulnerable-app
diff --git a/2016/CVE-2016-1000346.md b/2016/CVE-2016-1000346.md
index 2cea80f66c..4f85881df9 100644
--- a/2016/CVE-2016-1000346.md
+++ b/2016/CVE-2016-1000346.md
@@ -17,5 +17,6 @@ In the Bouncy Castle JCE Provider version 1.55 and earlier the other party DH pu
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
- https://github.com/IkerSaint/VULNAPP-vulnerable-app
+- https://github.com/LibHunter/LibHunter
- https://github.com/pctF/vulnerable-app
diff --git a/2016/CVE-2016-1000352.md b/2016/CVE-2016-1000352.md
index f8840f9f4f..4c64d1301f 100644
--- a/2016/CVE-2016-1000352.md
+++ b/2016/CVE-2016-1000352.md
@@ -18,5 +18,6 @@ In the Bouncy Castle JCE Provider version 1.55 and earlier the ECIES implementat
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
- https://github.com/IkerSaint/VULNAPP-vulnerable-app
+- https://github.com/LibHunter/LibHunter
- https://github.com/pctF/vulnerable-app
diff --git a/2016/CVE-2016-10027.md b/2016/CVE-2016-10027.md
index 2b3244fc8c..6b0d045ed4 100644
--- a/2016/CVE-2016-10027.md
+++ b/2016/CVE-2016-10027.md
@@ -15,5 +15,6 @@ Race condition in the XMPP library in Smack before 4.1.9, when the SecurityMode.
#### Github
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/tintinweb/striptls
diff --git a/2016/CVE-2016-10033.md b/2016/CVE-2016-10033.md
index f5fa3a4bb1..0bda1481c6 100644
--- a/2016/CVE-2016-10033.md
+++ b/2016/CVE-2016-10033.md
@@ -201,6 +201,7 @@ The mailSend function in the isMail transport in PHPMailer before 5.2.18 might a
- https://github.com/sliani/PHPMailer-File-Attachments-FTP-to-Mail
- https://github.com/superfish9/pt
- https://github.com/supreethsk/rental
+- https://github.com/sweta-web/Online-Registration-System
- https://github.com/trganda/dockerv
- https://github.com/tvirus-01/PHP_mail
- https://github.com/vaartjesd/test
diff --git a/2016/CVE-2016-10045.md b/2016/CVE-2016-10045.md
index 4791c48db0..7d7ecd6677 100644
--- a/2016/CVE-2016-10045.md
+++ b/2016/CVE-2016-10045.md
@@ -144,6 +144,7 @@ The isMail transport in PHPMailer before 5.2.20 might allow remote attackers to
- https://github.com/sccontroltotal/phpmailer
- https://github.com/sliani/PHPMailer-File-Attachments-FTP-to-Mail
- https://github.com/supreethsk/rental
+- https://github.com/sweta-web/Online-Registration-System
- https://github.com/tvirus-01/PHP_mail
- https://github.com/vaartjesd/test
- https://github.com/vatann07/BloodConnect
diff --git a/2016/CVE-2016-10134.md b/2016/CVE-2016-10134.md
index 8934286885..15b3f1a14d 100644
--- a/2016/CVE-2016-10134.md
+++ b/2016/CVE-2016-10134.md
@@ -21,6 +21,7 @@ SQL injection vulnerability in Zabbix before 2.2.14 and 3.0 before 3.0.4 allows
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/Awrrays/FrameVul
+- https://github.com/CLincat/vulcat
- https://github.com/HimmelAward/Goby_POC
- https://github.com/SexyBeast233/SecBooks
- https://github.com/TesterCC/exp_poc_library
diff --git a/2016/CVE-2016-10277.md b/2016/CVE-2016-10277.md
index 28ab4a49fd..df4e68623d 100644
--- a/2016/CVE-2016-10277.md
+++ b/2016/CVE-2016-10277.md
@@ -32,6 +32,7 @@ An elevation of privilege vulnerability in the Motorola bootloader could enable
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
diff --git a/2016/CVE-2016-10728.md b/2016/CVE-2016-10728.md
index f157598d98..0506c79466 100644
--- a/2016/CVE-2016-10728.md
+++ b/2016/CVE-2016-10728.md
@@ -13,4 +13,5 @@ An issue was discovered in Suricata before 3.1.2. If an ICMPv4 error packet is r
- https://github.com/kirillwow/ids_bypass
#### Github
+- https://github.com/kirillwow/ids_bypass
diff --git a/2016/CVE-2016-1247.md b/2016/CVE-2016-1247.md
index 3fb266ba64..39ec32810d 100644
--- a/2016/CVE-2016-1247.md
+++ b/2016/CVE-2016-1247.md
@@ -27,6 +27,7 @@ The nginx package before 1.6.2-5+deb8u3 on Debian jessie, the nginx packages bef
- https://github.com/hungslab/awd-tools
- https://github.com/lukeber4/usn-search
- https://github.com/notnue/Linux-Privilege-Escalation
+- https://github.com/redcountryroad/OSCP-shortsheet
- https://github.com/superfish9/pt
- https://github.com/txuswashere/Pentesting-Linux
- https://github.com/woods-sega/woodswiki
diff --git a/2016/CVE-2016-1583.md b/2016/CVE-2016-1583.md
index 06613b7447..4047807cfe 100644
--- a/2016/CVE-2016-1583.md
+++ b/2016/CVE-2016-1583.md
@@ -32,5 +32,6 @@ The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kern
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2016/CVE-2016-2004.md b/2016/CVE-2016-2004.md
index 3856cbe83b..489cb14ac5 100644
--- a/2016/CVE-2016-2004.md
+++ b/2016/CVE-2016-2004.md
@@ -20,4 +20,6 @@ HPE Data Protector before 7.03_108, 8.x before 8.15, and 9.x before 9.06 allow r
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
+- https://github.com/CVEDB/awesome-cve-repo
+- https://github.com/marcocarolasec/CVE-2016-2004-Exploit
diff --git a/2016/CVE-2016-2059.md b/2016/CVE-2016-2059.md
index 1e53246635..3aae104e91 100644
--- a/2016/CVE-2016-2059.md
+++ b/2016/CVE-2016-2059.md
@@ -24,5 +24,6 @@ No PoCs from references.
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2016/CVE-2016-2175.md b/2016/CVE-2016-2175.md
index 1dd2f03cdb..c01762375c 100644
--- a/2016/CVE-2016-2175.md
+++ b/2016/CVE-2016-2175.md
@@ -17,4 +17,5 @@ Apache PDFBox before 1.8.12 and 2.x before 2.0.1 does not properly initialize th
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
diff --git a/2016/CVE-2016-2183.md b/2016/CVE-2016-2183.md
index 97b04ef86b..e6b1c1de83 100644
--- a/2016/CVE-2016-2183.md
+++ b/2016/CVE-2016-2183.md
@@ -51,6 +51,7 @@ The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and
- https://github.com/aous-al-salek/crypto
- https://github.com/biswajitde/dsm_ips
- https://github.com/bysart/devops-netology
+- https://github.com/catsploit/catsploit
- https://github.com/dmitrii1312/03-sysadmin-09
- https://github.com/gabrieljcs/ips-assessment-reports
- https://github.com/geon071/netolofy_12
diff --git a/2016/CVE-2016-2334.md b/2016/CVE-2016-2334.md
index 7ce0df8914..39366e29a8 100644
--- a/2016/CVE-2016-2334.md
+++ b/2016/CVE-2016-2334.md
@@ -13,6 +13,7 @@ Heap-based buffer overflow in the NArchive::NHfs::CHandler::ExtractZlibFile meth
- http://blog.talosintelligence.com/2017/11/exploiting-cve-2016-2334.html
#### Github
+- https://github.com/ch1hyun/fuzzing-class
- https://github.com/icewall/CVE-2016-2334
- https://github.com/integeruser/on-pwning
- https://github.com/litneet64/containerized-bomb-disposal
diff --git a/2016/CVE-2016-2384.md b/2016/CVE-2016-2384.md
index 989c90f5ca..ff3a231f43 100644
--- a/2016/CVE-2016-2384.md
+++ b/2016/CVE-2016-2384.md
@@ -24,6 +24,7 @@ Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
- https://github.com/HackOvert/awesome-bugs
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
- https://github.com/QChiLan/linux-exp
@@ -66,6 +67,7 @@ Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/spencerdodd/kernelpop
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/kernel-exploits
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
diff --git a/2016/CVE-2016-2386.md b/2016/CVE-2016-2386.md
index 56025225ac..492fead789 100644
--- a/2016/CVE-2016-2386.md
+++ b/2016/CVE-2016-2386.md
@@ -24,5 +24,6 @@ SQL injection vulnerability in the UDDI server in SAP NetWeaver J2EE Engine 7.40
- https://github.com/lnick2023/nicenice
- https://github.com/murataydemir/CVE-2016-2386
- https://github.com/qazbnm456/awesome-cve-poc
+- https://github.com/vah13/SAP_exploit
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
diff --git a/2016/CVE-2016-2411.md b/2016/CVE-2016-2411.md
index 268c53b261..56ca2c7925 100644
--- a/2016/CVE-2016-2411.md
+++ b/2016/CVE-2016-2411.md
@@ -28,5 +28,6 @@ No PoCs from references.
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2016/CVE-2016-2434.md b/2016/CVE-2016-2434.md
index c36b6d2442..0255cd10f6 100644
--- a/2016/CVE-2016-2434.md
+++ b/2016/CVE-2016-2434.md
@@ -42,5 +42,6 @@ No PoCs from references.
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/tangsilian/android-vuln
- https://github.com/weeka10/-hktalent-TOP
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2016/CVE-2016-2435.md b/2016/CVE-2016-2435.md
index f9993abfde..639f7a7a2b 100644
--- a/2016/CVE-2016-2435.md
+++ b/2016/CVE-2016-2435.md
@@ -28,5 +28,6 @@ No PoCs from references.
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2016/CVE-2016-2475.md b/2016/CVE-2016-2475.md
index ea67af0ccd..3f1a9e3621 100644
--- a/2016/CVE-2016-2475.md
+++ b/2016/CVE-2016-2475.md
@@ -27,5 +27,6 @@ No PoCs from references.
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2016/CVE-2016-2503.md b/2016/CVE-2016-2503.md
index f5b3c6a71d..af34151228 100644
--- a/2016/CVE-2016-2503.md
+++ b/2016/CVE-2016-2503.md
@@ -24,5 +24,6 @@ No PoCs from references.
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2016/CVE-2016-2781.md b/2016/CVE-2016-2781.md
index 725c1ae681..08d9c60523 100644
--- a/2016/CVE-2016-2781.md
+++ b/2016/CVE-2016-2781.md
@@ -44,6 +44,7 @@ No PoCs from references.
- https://github.com/hartwork/antijack
- https://github.com/khulnasoft-lab/vulnlist
- https://github.com/khulnasoft-labs/griffon
+- https://github.com/m-pasima/CI-CD-Security-image-scan
- https://github.com/metapull/attackfinder
- https://github.com/nedenwalker/spring-boot-app-using-gradle
- https://github.com/nedenwalker/spring-boot-app-with-log4j-vuln
diff --git a/2016/CVE-2016-3720.md b/2016/CVE-2016-3720.md
index 3a1d70cf41..fefd7b1d55 100644
--- a/2016/CVE-2016-3720.md
+++ b/2016/CVE-2016-3720.md
@@ -17,6 +17,7 @@ No PoCs from references.
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/argon-gh-demo/clojure-sample
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/gitrobtest/Java-Security
diff --git a/2016/CVE-2016-3857.md b/2016/CVE-2016-3857.md
index 25f2869948..950de59338 100644
--- a/2016/CVE-2016-3857.md
+++ b/2016/CVE-2016-3857.md
@@ -28,5 +28,6 @@ No PoCs from references.
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2016/CVE-2016-3873.md b/2016/CVE-2016-3873.md
index 83bc7c9a61..9acac13c84 100644
--- a/2016/CVE-2016-3873.md
+++ b/2016/CVE-2016-3873.md
@@ -27,5 +27,6 @@ No PoCs from references.
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2016/CVE-2016-4557.md b/2016/CVE-2016-4557.md
index 4a4dead1bc..a50a32cc58 100644
--- a/2016/CVE-2016-4557.md
+++ b/2016/CVE-2016-4557.md
@@ -14,6 +14,7 @@ The replace_map_fd_with_map_ptr function in kernel/bpf/verifier.c in the Linux k
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/chreniuc/CTF
- https://github.com/dylandreimerink/gobpfld
diff --git a/2016/CVE-2016-4800.md b/2016/CVE-2016-4800.md
index 912fa273df..b475e74f2a 100644
--- a/2016/CVE-2016-4800.md
+++ b/2016/CVE-2016-4800.md
@@ -16,5 +16,6 @@ The path normalization mechanism in PathResource class in Eclipse Jetty 9.3.x be
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/saidramirezh/Elvis-DAM
diff --git a/2016/CVE-2016-4970.md b/2016/CVE-2016-4970.md
index 5dee748480..4e049fe980 100644
--- a/2016/CVE-2016-4970.md
+++ b/2016/CVE-2016-4970.md
@@ -16,6 +16,7 @@ No PoCs from references.
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/chnzzh/OpenSSL-CVE-lib
- https://github.com/eliasgranderubio/4depcheck
diff --git a/2016/CVE-2016-4994.md b/2016/CVE-2016-4994.md
new file mode 100644
index 0000000000..9961e81e8d
--- /dev/null
+++ b/2016/CVE-2016-4994.md
@@ -0,0 +1,17 @@
+### [CVE-2016-4994](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4994)
+
+
+
+
+### Description
+
+Use-after-free vulnerability in the xcf_load_image function in app/xcf/xcf-load.c in GIMP allows remote attackers to cause a denial of service (program crash) or possibly execute arbitrary code via a crafted XCF file.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/ch1hyun/fuzzing-class
+
diff --git a/2016/CVE-2016-4997.md b/2016/CVE-2016-4997.md
index 24476f62c0..3649b3fc9c 100644
--- a/2016/CVE-2016-4997.md
+++ b/2016/CVE-2016-4997.md
@@ -16,5 +16,6 @@ The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations
- https://www.exploit-db.com/exploits/40489/
#### Github
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
diff --git a/2016/CVE-2016-5195.md b/2016/CVE-2016-5195.md
index a5c3e530a8..b4b4b0aa1a 100644
--- a/2016/CVE-2016-5195.md
+++ b/2016/CVE-2016-5195.md
@@ -29,6 +29,7 @@ Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allo
- https://www.exploit-db.com/exploits/40847/
#### Github
+- https://github.com/0xMarcio/cve
- https://github.com/0xS3rgI0/OSCP
- https://github.com/0xStrygwyr/OSCP-Guide
- https://github.com/0xZipp0/OSCP
@@ -89,6 +90,7 @@ Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allo
- https://github.com/GhostTroops/TOP
- https://github.com/GiorgosXou/Our-Xiaomi-Redmi-5A-riva-debloating-list
- https://github.com/Greetdawn/CVE-2022-0847-DirtyPipe
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/Hellnino18/ansible-dirty-cow
- https://github.com/Hellnino18/ansible-dirty-cow-2
- https://github.com/Hetti/PoC-Exploitchain-GS-VBox-DirtyCow-
@@ -404,6 +406,7 @@ Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allo
- https://github.com/whackmanic/OSCP_Found
- https://github.com/whitephone/farm-root
- https://github.com/whu-enjoy/CVE-2016-5195
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/www-glasswall-nl/UT-DirtyCow
- https://github.com/x90hack/vulnerabilty_lab
- https://github.com/xXxhagenxXx/OSCP_Cheat_sheet
diff --git a/2016/CVE-2016-5340.md b/2016/CVE-2016-5340.md
index a203ee1fdb..db399209f3 100644
--- a/2016/CVE-2016-5340.md
+++ b/2016/CVE-2016-5340.md
@@ -24,5 +24,6 @@ No PoCs from references.
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2016/CVE-2016-5425.md b/2016/CVE-2016-5425.md
index de0a114690..df67eedf92 100644
--- a/2016/CVE-2016-5425.md
+++ b/2016/CVE-2016-5425.md
@@ -19,4 +19,5 @@ The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/starnightcyber/vul-info-collect
+- https://github.com/versio-io/product-lifecycle-security-api
diff --git a/2016/CVE-2016-5696.md b/2016/CVE-2016-5696.md
index f02ff38e28..acc880935a 100644
--- a/2016/CVE-2016-5696.md
+++ b/2016/CVE-2016-5696.md
@@ -19,6 +19,7 @@ net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/GhostTroops/TOP
+- https://github.com/Gnoxter/mountain_goat
- https://github.com/Subbuleo23/Cyberphantom
- https://github.com/ambynotcoder/C-libraries
- https://github.com/bplinux/chackd
diff --git a/2016/CVE-2016-6187.md b/2016/CVE-2016-6187.md
index 8f69c8fe4c..6c1462a199 100644
--- a/2016/CVE-2016-6187.md
+++ b/2016/CVE-2016-6187.md
@@ -34,5 +34,6 @@ No PoCs from references.
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/vnik5287/cve-2016-6187-poc
- https://github.com/whiteHat001/Kernel-Security
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2016/CVE-2016-6195.md b/2016/CVE-2016-6195.md
index e47e12c82a..69b65c8bae 100644
--- a/2016/CVE-2016-6195.md
+++ b/2016/CVE-2016-6195.md
@@ -16,4 +16,5 @@ SQL injection vulnerability in forumrunner/includes/moderation.php in vBulletin
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/TooLaidBack/vbchecker
+- https://github.com/drewlong/vbully
diff --git a/2016/CVE-2016-6271.md b/2016/CVE-2016-6271.md
index 264e2eb717..bc89a514bf 100644
--- a/2016/CVE-2016-6271.md
+++ b/2016/CVE-2016-6271.md
@@ -14,4 +14,5 @@ The Bzrtp library (aka libbzrtp) 1.0.x before 1.0.4 allows man-in-the-middle att
#### Github
- https://github.com/Parist0nH1ll/Vulnerabilities-Write-Ups
+- https://github.com/gteissier/CVE-2016-6271
diff --git a/2016/CVE-2016-6325.md b/2016/CVE-2016-6325.md
index b818bac4bb..c755eb26e7 100644
--- a/2016/CVE-2016-6325.md
+++ b/2016/CVE-2016-6325.md
@@ -14,4 +14,5 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/versio-io/product-lifecycle-security-api
diff --git a/2016/CVE-2016-6329.md b/2016/CVE-2016-6329.md
index 903d0d175a..87b2485e5d 100644
--- a/2016/CVE-2016-6329.md
+++ b/2016/CVE-2016-6329.md
@@ -25,6 +25,7 @@ OpenVPN, when using a 64-bit block cipher, makes it easier for remote attackers
- https://github.com/alexandrburyakov/Rep2
- https://github.com/alexgro1982/devops-netology
- https://github.com/bysart/devops-netology
+- https://github.com/catsploit/catsploit
- https://github.com/dmitrii1312/03-sysadmin-09
- https://github.com/geon071/netolofy_12
- https://github.com/ilya-starchikov/devops-netology
diff --git a/2016/CVE-2016-6787.md b/2016/CVE-2016-6787.md
index b4eece4d26..e757393107 100644
--- a/2016/CVE-2016-6787.md
+++ b/2016/CVE-2016-6787.md
@@ -29,6 +29,7 @@ No PoCs from references.
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/whiteHat001/Kernel-Security
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
diff --git a/2016/CVE-2016-6801.md b/2016/CVE-2016-6801.md
index dd2bc07cfb..4d483ad7e4 100644
--- a/2016/CVE-2016-6801.md
+++ b/2016/CVE-2016-6801.md
@@ -15,5 +15,6 @@ No PoCs from references.
#### Github
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/TSNGL21/CVE-2016-6801
diff --git a/2016/CVE-2016-6814.md b/2016/CVE-2016-6814.md
index a4bde3647c..49dac33105 100644
--- a/2016/CVE-2016-6814.md
+++ b/2016/CVE-2016-6814.md
@@ -21,6 +21,7 @@ When an application with unsupported Codehaus versions of Groovy from 1.7.0 to 2
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/OWASP/www-project-ide-vulscanner
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs
- https://github.com/ilmari666/cybsec
diff --git a/2016/CVE-2016-7117.md b/2016/CVE-2016-7117.md
index 214483cf4e..22b626e558 100644
--- a/2016/CVE-2016-7117.md
+++ b/2016/CVE-2016-7117.md
@@ -27,5 +27,6 @@ No PoCs from references.
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2016/CVE-2016-7200.md b/2016/CVE-2016-7200.md
index 5e370cef50..a865284243 100644
--- a/2016/CVE-2016-7200.md
+++ b/2016/CVE-2016-7200.md
@@ -33,6 +33,7 @@ The Chakra JavaScript scripting engine in Microsoft Edge allows remote attackers
- https://github.com/lnick2023/nicenice
- https://github.com/nyerkym/sectools
- https://github.com/qazbnm456/awesome-cve-poc
+- https://github.com/theori-io/chakra-2016-11
- https://github.com/trhacknon/chakra-2016-11
- https://github.com/tunz/js-vuln-db
- https://github.com/weeka10/-hktalent-TOP
diff --git a/2016/CVE-2016-7201.md b/2016/CVE-2016-7201.md
index 601297f91d..8dbf9730a5 100644
--- a/2016/CVE-2016-7201.md
+++ b/2016/CVE-2016-7201.md
@@ -32,6 +32,7 @@ The Chakra JavaScript scripting engine in Microsoft Edge allows remote attackers
- https://github.com/lnick2023/nicenice
- https://github.com/nyerkym/sectools
- https://github.com/qazbnm456/awesome-cve-poc
+- https://github.com/theori-io/chakra-2016-11
- https://github.com/trhacknon/chakra-2016-11
- https://github.com/tunz/js-vuln-db
- https://github.com/weeka10/-hktalent-TOP
diff --git a/2016/CVE-2016-8453.md b/2016/CVE-2016-8453.md
index c5af9a648a..379f4812cf 100644
--- a/2016/CVE-2016-8453.md
+++ b/2016/CVE-2016-8453.md
@@ -27,5 +27,6 @@ No PoCs from references.
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2016/CVE-2016-8462.md b/2016/CVE-2016-8462.md
index 72376c975a..a0e0673556 100644
--- a/2016/CVE-2016-8462.md
+++ b/2016/CVE-2016-8462.md
@@ -14,4 +14,5 @@ An information disclosure vulnerability in the bootloader could enable a local a
- https://securityresear.ch/2017/01/04/fastboot-oem-sha1sum/
#### Github
+- https://github.com/CunningLogic/PixelDump_CVE-2016-8462
diff --git a/2016/CVE-2016-8633.md b/2016/CVE-2016-8633.md
index 921aeea25b..175b6a900b 100644
--- a/2016/CVE-2016-8633.md
+++ b/2016/CVE-2016-8633.md
@@ -27,5 +27,6 @@ No PoCs from references.
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2016/CVE-2016-8655.md b/2016/CVE-2016-8655.md
index 1f5142e430..757c4c92a2 100644
--- a/2016/CVE-2016-8655.md
+++ b/2016/CVE-2016-8655.md
@@ -20,6 +20,7 @@ Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allo
- https://github.com/ARPSyndicate/cvemon
- https://github.com/AabyssZG/AWD-Guide
- https://github.com/Aneesh-Satla/Linux-Kernel-Exploitation-Suggester
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/KosukeShimofuji/CVE-2016-8655
- https://github.com/LakshmiDesai/CVE-2016-8655
@@ -67,6 +68,7 @@ Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allo
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/stefanocutelle/linux-exploit-suggester
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xyongcn/exploit
diff --git a/2016/CVE-2016-9192.md b/2016/CVE-2016-9192.md
index 4bd17cda13..de120df9bb 100644
--- a/2016/CVE-2016-9192.md
+++ b/2016/CVE-2016-9192.md
@@ -14,4 +14,5 @@ A vulnerability in Cisco AnyConnect Secure Mobility Client for Windows could all
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161207-anyconnect1
#### Github
+- https://github.com/serializingme/cve-2016-9192
diff --git a/2016/CVE-2016-9296.md b/2016/CVE-2016-9296.md
index dff946fda4..b04e07988c 100644
--- a/2016/CVE-2016-9296.md
+++ b/2016/CVE-2016-9296.md
@@ -15,4 +15,5 @@ A null pointer dereference bug affects the 16.02 and many old versions of p7zip.
#### Github
- https://github.com/andir/nixos-issue-db-example
+- https://github.com/yangke/7zip-null-pointer-dereference
diff --git a/2016/CVE-2016-9297.md b/2016/CVE-2016-9297.md
index 93d531f5f5..5118186174 100644
--- a/2016/CVE-2016-9297.md
+++ b/2016/CVE-2016-9297.md
@@ -14,6 +14,7 @@ The TIFFFetchNormalTag function in LibTiff 4.0.6 allows remote attackers to caus
#### Github
- https://github.com/RClueX/Hackerone-Reports
+- https://github.com/ch1hyun/fuzzing-class
- https://github.com/geeknik/cve-fuzzing-poc
- https://github.com/imhunterand/hackerone-publicy-disclosed
diff --git a/2016/CVE-2016-9793.md b/2016/CVE-2016-9793.md
index 36d1e867b2..4b23acc387 100644
--- a/2016/CVE-2016-9793.md
+++ b/2016/CVE-2016-9793.md
@@ -20,6 +20,7 @@ The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.1
- https://github.com/CKmaenn/kernel-exploits
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
- https://github.com/QChiLan/linux-exp
diff --git a/2016/CVE-2016-9949.md b/2016/CVE-2016-9949.md
index 289705bfe9..9e038147a1 100644
--- a/2016/CVE-2016-9949.md
+++ b/2016/CVE-2016-9949.md
@@ -15,4 +15,5 @@ An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads t
- https://www.exploit-db.com/exploits/40937/
#### Github
+- https://github.com/DonnchaC/ubuntu-apport-exploitation
diff --git a/2016/CVE-2016-9950.md b/2016/CVE-2016-9950.md
index 35e39fa6e9..de325e7397 100644
--- a/2016/CVE-2016-9950.md
+++ b/2016/CVE-2016-9950.md
@@ -15,4 +15,5 @@ An issue was discovered in Apport before 2.20.4. There is a path traversal issue
- https://www.exploit-db.com/exploits/40937/
#### Github
+- https://github.com/DonnchaC/ubuntu-apport-exploitation
diff --git a/2016/CVE-2016-9951.md b/2016/CVE-2016-9951.md
index 6315944fb9..073619b347 100644
--- a/2016/CVE-2016-9951.md
+++ b/2016/CVE-2016-9951.md
@@ -16,4 +16,5 @@ An issue was discovered in Apport before 2.20.4. A malicious Apport crash file c
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/DonnchaC/ubuntu-apport-exploitation
diff --git a/2017/CVE-2017-0038.md b/2017/CVE-2017-0038.md
index 0b427d1f99..68f798250a 100644
--- a/2017/CVE-2017-0038.md
+++ b/2017/CVE-2017-0038.md
@@ -21,6 +21,7 @@ gdi32.dll in Graphics Device Interface (GDI) in Microsoft Windows Vista SP2, Win
- https://github.com/ExpLife0011/awesome-windows-kernel-security-development
- https://github.com/Ondrik8/exploit
- https://github.com/howknows/awesome-windows-security-development
+- https://github.com/k0keoyo/CVE-2017-0038-EXP-C-JS
- https://github.com/liuhe3647/Windows
- https://github.com/pr0code/https-github.com-ExpLife0011-awesome-windows-kernel-security-development
- https://github.com/pravinsrc/NOTES-windows-kernel-links
diff --git a/2017/CVE-2017-0146.md b/2017/CVE-2017-0146.md
index 188abf50e0..67aafd1a66 100644
--- a/2017/CVE-2017-0146.md
+++ b/2017/CVE-2017-0146.md
@@ -45,6 +45,7 @@ The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2
- https://github.com/cb4cb4/EternalBlue-EK-Manual-Mode
- https://github.com/ceskillets/DCV-Predefined-Log-Filter-of-Specific-CVE-of-EternalBlue-and-BlueKeep-with-Auto-Tag-
- https://github.com/chaao195/EBEKv2.0
+- https://github.com/enomothem/PenTestNote
- https://github.com/ericjiang97/SecScripts
- https://github.com/geeksniper/active-directory-pentest
- https://github.com/ginapalomo/ScanAll
diff --git a/2017/CVE-2017-0403.md b/2017/CVE-2017-0403.md
index a85a125125..75837d94e8 100644
--- a/2017/CVE-2017-0403.md
+++ b/2017/CVE-2017-0403.md
@@ -26,5 +26,6 @@ No PoCs from references.
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2017/CVE-2017-0437.md b/2017/CVE-2017-0437.md
index 3f725d4569..039cb861a5 100644
--- a/2017/CVE-2017-0437.md
+++ b/2017/CVE-2017-0437.md
@@ -25,5 +25,6 @@ No PoCs from references.
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2017/CVE-2017-0478.md b/2017/CVE-2017-0478.md
index 9e82bc62f1..f7f5830acd 100644
--- a/2017/CVE-2017-0478.md
+++ b/2017/CVE-2017-0478.md
@@ -13,6 +13,7 @@ A remote code execution vulnerability in the Framesequence library could enable
- https://github.com/JiounDai/CVE-2017-0478
#### Github
+- https://github.com/JiounDai/CVE-2017-0478
- https://github.com/bingghost/CVE-2017-0478
- https://github.com/likescam/CVE-2017-0478
- https://github.com/vnik5287/CVE-2017-16995
diff --git a/2017/CVE-2017-0541.md b/2017/CVE-2017-0541.md
index 4b6ef3b12a..0875cadaff 100644
--- a/2017/CVE-2017-0541.md
+++ b/2017/CVE-2017-0541.md
@@ -15,6 +15,7 @@ A remote code execution vulnerability in sonivox in Mediaserver could enable an
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/C0dak/CVE-2017-0541
+- https://github.com/JiounDai/CVE-2017-0541
- https://github.com/likescam/CVE-2017-0541
- https://github.com/lnick2023/nicenice
- https://github.com/qazbnm456/awesome-cve-poc
diff --git a/2017/CVE-2017-0569.md b/2017/CVE-2017-0569.md
index b667d0c229..957b32ea37 100644
--- a/2017/CVE-2017-0569.md
+++ b/2017/CVE-2017-0569.md
@@ -24,5 +24,6 @@ An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enabl
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2017/CVE-2017-1000112.md b/2017/CVE-2017-1000112.md
index 0202baee89..bd9562d168 100644
--- a/2017/CVE-2017-1000112.md
+++ b/2017/CVE-2017-1000112.md
@@ -100,6 +100,7 @@ Linux kernel: Exploitable memory corruption due to UFO to non-UFO path switch. W
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/stefanocutelle/linux-exploit-suggester
- https://github.com/teamssix/container-escape-check
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/kernel-exploits
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
diff --git a/2017/CVE-2017-1000209.md b/2017/CVE-2017-1000209.md
index 6dca4b5b4c..e125a83aa3 100644
--- a/2017/CVE-2017-1000209.md
+++ b/2017/CVE-2017-1000209.md
@@ -15,4 +15,5 @@ No PoCs from references.
#### Github
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
diff --git a/2017/CVE-2017-1000251.md b/2017/CVE-2017-1000251.md
index a9dd5736e6..70e99303dc 100644
--- a/2017/CVE-2017-1000251.md
+++ b/2017/CVE-2017-1000251.md
@@ -50,6 +50,7 @@ The native Bluetooth stack in the Linux Kernel (BlueZ), starting at the Linux ke
- https://github.com/sgxgsx/BlueToolkit
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/tlatkdgus1/blueborne-CVE-2017-1000251
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
diff --git a/2017/CVE-2017-1000253.md b/2017/CVE-2017-1000253.md
index 3ee0857a39..8e21e1e66f 100644
--- a/2017/CVE-2017-1000253.md
+++ b/2017/CVE-2017-1000253.md
@@ -14,6 +14,7 @@ Linux distributions that have not patched their long-term kernels with https://g
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/RicterZ/PIE-Stack-Clash-CVE-2017-1000253
- https://github.com/kaosagnt/ansible-everyday
diff --git a/2017/CVE-2017-1000363.md b/2017/CVE-2017-1000363.md
index 3c1716a5fc..62378552d4 100644
--- a/2017/CVE-2017-1000363.md
+++ b/2017/CVE-2017-1000363.md
@@ -26,5 +26,6 @@ No PoCs from references.
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2017/CVE-2017-1000380.md b/2017/CVE-2017-1000380.md
index c52392c3ed..6bca32790b 100644
--- a/2017/CVE-2017-1000380.md
+++ b/2017/CVE-2017-1000380.md
@@ -27,5 +27,6 @@ sound/core/timer.c in the Linux kernel before 4.11.5 is vulnerable to a data rac
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2017/CVE-2017-1000498.md b/2017/CVE-2017-1000498.md
index 21316c5c50..9a8d9e5231 100644
--- a/2017/CVE-2017-1000498.md
+++ b/2017/CVE-2017-1000498.md
@@ -15,4 +15,5 @@ No PoCs from references.
#### Github
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
diff --git a/2017/CVE-2017-10661.md b/2017/CVE-2017-10661.md
index 7c2db4a82e..f8a5b7a936 100644
--- a/2017/CVE-2017-10661.md
+++ b/2017/CVE-2017-10661.md
@@ -29,6 +29,7 @@ Race condition in fs/timerfd.c in the Linux kernel before 4.10.15 allows local u
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/tangsilian/android-vuln
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
diff --git a/2017/CVE-2017-11176.md b/2017/CVE-2017-11176.md
index d076991f94..5f494ed155 100644
--- a/2017/CVE-2017-11176.md
+++ b/2017/CVE-2017-11176.md
@@ -20,6 +20,7 @@ The mq_notify function in the Linux kernel through 4.11.9 does not set the sock
- https://github.com/DoubleMice/cve-2017-11176
- https://github.com/Flerov/WindowsExploitDev
- https://github.com/Gobinath-B/Exploit-Developement
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/HckEX/CVE-2017-11176
- https://github.com/IdanBanani/Linux-Kernel-VR-Exploitation
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
@@ -52,5 +53,6 @@ The mq_notify function in the Linux kernel through 4.11.9 does not set the sock
- https://github.com/pjlantz/optee-qemu
- https://github.com/prince-stark/Exploit-Developement
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2017/CVE-2017-11611.md b/2017/CVE-2017-11611.md
index 5a5a80ebad..3689920fcd 100644
--- a/2017/CVE-2017-11611.md
+++ b/2017/CVE-2017-11611.md
@@ -13,4 +13,5 @@ Wolf CMS 0.8.3.1 allows Cross-Site Scripting (XSS) attacks. The vulnerability ex
- https://github.com/faizzaidi/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc
#### Github
+- https://github.com/faizzaidi/Wolfcms-v0.8.3.1-xss-POC-by-Provensec-llc
diff --git a/2017/CVE-2017-11882.md b/2017/CVE-2017-11882.md
index ec90e2ceec..f8323e0b34 100644
--- a/2017/CVE-2017-11882.md
+++ b/2017/CVE-2017-11882.md
@@ -22,6 +22,7 @@ Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Micr
#### Github
- https://github.com/00xtrace/Red-Team-Ops-Toolbox
+- https://github.com/0x09AL/CVE-2017-11882-metasploit
- https://github.com/0xT11/CVE-POC
- https://github.com/0xdeadgeek/Red-Teaming-Toolkit
- https://github.com/0xh4di/Red-Teaming-Toolkit
@@ -117,6 +118,7 @@ Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Micr
- https://github.com/edeca/rtfraptor
- https://github.com/ekgg/Overflow-Demo-CVE-2017-11882
- https://github.com/emaan122/Note2
+- https://github.com/embedi/CVE-2017-11882
- https://github.com/emtee40/APT_CyberCriminal_Campagin_Collections
- https://github.com/eric-erki/APT_CyberCriminal_Campagin_Collections
- https://github.com/fengjixuchui/RedTeamer
diff --git a/2017/CVE-2017-12615.md b/2017/CVE-2017-12615.md
index bc20ac3eea..d569134811 100644
--- a/2017/CVE-2017-12615.md
+++ b/2017/CVE-2017-12615.md
@@ -56,6 +56,7 @@ When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.
- https://github.com/Zero094/Vulnerability-verification
- https://github.com/amcai/myscan
- https://github.com/bakery312/Vulhub-Reproduce
+- https://github.com/breaktoprotect/CVE-2017-12615
- https://github.com/cved-sources/cve-2017-12615
- https://github.com/cyberharsh/Tomcat-CVE-2017-12615
- https://github.com/d4n-sec/d4n-sec.github.io
diff --git a/2017/CVE-2017-13028.md b/2017/CVE-2017-13028.md
index 34aa264781..c7c1bc85a9 100644
--- a/2017/CVE-2017-13028.md
+++ b/2017/CVE-2017-13028.md
@@ -13,5 +13,6 @@ The BOOTP parser in tcpdump before 4.9.2 has a buffer over-read in print-bootp.c
No PoCs from references.
#### Github
+- https://github.com/ch1hyun/fuzzing-class
- https://github.com/paras98/AFL_Fuzzing
diff --git a/2017/CVE-2017-13089.md b/2017/CVE-2017-13089.md
index 9836e1f015..1eae5f8fb9 100644
--- a/2017/CVE-2017-13089.md
+++ b/2017/CVE-2017-13089.md
@@ -18,6 +18,7 @@ The http.c:skip_short_body() function is called in some circumstances, such as w
- https://github.com/lnick2023/nicenice
- https://github.com/mzeyong/CVE-2017-13089
- https://github.com/qazbnm456/awesome-cve-poc
+- https://github.com/r1b/CVE-2017-13089
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
- https://github.com/yfoelling/yair
diff --git a/2017/CVE-2017-13098.md b/2017/CVE-2017-13098.md
index 9cffbb69d2..cb43a50836 100644
--- a/2017/CVE-2017-13098.md
+++ b/2017/CVE-2017-13098.md
@@ -19,6 +19,7 @@ BouncyCastle TLS prior to version 1.0.3, when configured to use the JCE (Java Cr
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
- https://github.com/IkerSaint/VULNAPP-vulnerable-app
+- https://github.com/LibHunter/LibHunter
- https://github.com/dotanuki-labs/android-oss-cves-research
- https://github.com/pctF/vulnerable-app
diff --git a/2017/CVE-2017-13868.md b/2017/CVE-2017-13868.md
index 3b9ed8a7f6..e70c248fe4 100644
--- a/2017/CVE-2017-13868.md
+++ b/2017/CVE-2017-13868.md
@@ -13,5 +13,6 @@ An issue was discovered in certain Apple products. iOS before 11.2 is affected.
- https://github.com/bazad/ctl_ctloutput-leak
#### Github
+- https://github.com/bazad/ctl_ctloutput-leak
- https://github.com/houjingyi233/macOS-iOS-system-security
diff --git a/2017/CVE-2017-14105.md b/2017/CVE-2017-14105.md
index 833484232f..1e394b5d08 100644
--- a/2017/CVE-2017-14105.md
+++ b/2017/CVE-2017-14105.md
@@ -13,5 +13,6 @@ HiveManager Classic through 8.1r1 allows arbitrary JSP code execution by modifyi
- https://github.com/theguly/CVE-2017-14105
#### Github
+- https://github.com/theguly/CVE-2017-14105
- https://github.com/theguly/exploits
diff --git a/2017/CVE-2017-16524.md b/2017/CVE-2017-16524.md
index 38a8501748..9b2d9e4be1 100644
--- a/2017/CVE-2017-16524.md
+++ b/2017/CVE-2017-16524.md
@@ -14,4 +14,5 @@ Web Viewer 1.0.0.193 on Samsung SRN-1670D devices suffers from an Unrestricted f
- https://www.exploit-db.com/exploits/43138/
#### Github
+- https://github.com/realistic-security/CVE-2017-16524
diff --git a/2017/CVE-2017-16778.md b/2017/CVE-2017-16778.md
index 0f5f781857..c071ef7433 100644
--- a/2017/CVE-2017-16778.md
+++ b/2017/CVE-2017-16778.md
@@ -13,4 +13,5 @@ An access control weakness in the DTMF tone receiver of Fermax Outdoor Panel all
- https://github.com/breaktoprotect/CVE-2017-16778-Intercom-DTMF-Injection
#### Github
+- https://github.com/breaktoprotect/CVE-2017-16778-Intercom-DTMF-Injection
diff --git a/2017/CVE-2017-16939.md b/2017/CVE-2017-16939.md
index 353f371a61..af6d0e468c 100644
--- a/2017/CVE-2017-16939.md
+++ b/2017/CVE-2017-16939.md
@@ -16,6 +16,7 @@ No PoCs from references.
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Al1ex/LinuxEelvation
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Micr067/linux-kernel-exploits
- https://github.com/QChiLan/linux-exp
diff --git a/2017/CVE-2017-16995.md b/2017/CVE-2017-16995.md
index 04f8454d0f..b124792526 100644
--- a/2017/CVE-2017-16995.md
+++ b/2017/CVE-2017-16995.md
@@ -28,6 +28,7 @@ The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Dk0n9/linux_exploit
- https://github.com/Getshell/LinuxTQ
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JMontRod/Pruebecita
- https://github.com/Jean-Francois-C/Boot2root-CTFs-Writeups
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
@@ -121,6 +122,7 @@ The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4
- https://github.com/thelostvoice/inept-us-military
- https://github.com/tninh27/Lab
- https://github.com/vnik5287/CVE-2017-16995
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
- https://github.com/xfinest/linux-kernel-exploits
diff --git a/2017/CVE-2017-17485.md b/2017/CVE-2017-17485.md
index 46720d4680..9c082d3d4a 100644
--- a/2017/CVE-2017-17485.md
+++ b/2017/CVE-2017-17485.md
@@ -25,6 +25,7 @@ FasterXML jackson-databind through 2.8.10 and 2.9.x through 2.9.3 allows unauthe
- https://github.com/Drun1baby/JavaSecurityLearning
- https://github.com/GhostTroops/myhktools
- https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet
+- https://github.com/LibHunter/LibHunter
- https://github.com/OWASP/www-project-ide-vulscanner
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs
- https://github.com/Pear1y/Vuln-Env
diff --git a/2017/CVE-2017-18344.md b/2017/CVE-2017-18344.md
index f3a99211ca..6fc3f63236 100644
--- a/2017/CVE-2017-18344.md
+++ b/2017/CVE-2017-18344.md
@@ -31,6 +31,7 @@ The timer_create syscall implementation in kernel/time/posix-timers.c in the Lin
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/kernel-exploits
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
diff --git a/2017/CVE-2017-2636.md b/2017/CVE-2017-2636.md
index 818a5698af..55f98835e1 100644
--- a/2017/CVE-2017-2636.md
+++ b/2017/CVE-2017-2636.md
@@ -35,6 +35,7 @@ Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows
- https://github.com/snorez/blog
- https://github.com/snorez/exploits
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
- https://github.com/xyongcn/exploit
diff --git a/2017/CVE-2017-3506.md b/2017/CVE-2017-3506.md
index 51b03cd8d9..2e814226ac 100644
--- a/2017/CVE-2017-3506.md
+++ b/2017/CVE-2017-3506.md
@@ -38,6 +38,7 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar
- https://github.com/MacAsure/WL_Scan_GO
- https://github.com/Maskhe/javasec
- https://github.com/Micr067/CMS-Hunter
+- https://github.com/Ostorlab/KEV
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs
- https://github.com/ParrotSec-CN/ParrotSecCN_Community_QQbot
- https://github.com/SecWiki/CMS-Hunter
diff --git a/2017/CVE-2017-5005.md b/2017/CVE-2017-5005.md
index cbe78e41af..7fd561c0a5 100644
--- a/2017/CVE-2017-5005.md
+++ b/2017/CVE-2017-5005.md
@@ -14,4 +14,5 @@ Stack-based buffer overflow in Quick Heal Internet Security 10.1.0.316 and earli
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/payatu/QuickHeal
diff --git a/2017/CVE-2017-5123.md b/2017/CVE-2017-5123.md
index b1aef4673a..73418bdb86 100644
--- a/2017/CVE-2017-5123.md
+++ b/2017/CVE-2017-5123.md
@@ -20,6 +20,7 @@ Insufficient data validation in waitid allowed an user to escape sandboxes on Li
- https://github.com/Al1ex/LinuxEelvation
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/FloatingGuy/CVE-2017-5123
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Metarget/awesome-cloud-native-security
- https://github.com/Micr067/linux-kernel-exploits
@@ -88,6 +89,7 @@ Insufficient data validation in waitid allowed an user to escape sandboxes on Li
- https://github.com/teawater/CVE-2017-5123
- https://github.com/txuswashere/Privilege-Escalation
- https://github.com/whiteHat001/Kernel-Security
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
- https://github.com/xfinest/linux-kernel-exploits
diff --git a/2017/CVE-2017-5124.md b/2017/CVE-2017-5124.md
index 88eb6143c0..73e4477bf4 100644
--- a/2017/CVE-2017-5124.md
+++ b/2017/CVE-2017-5124.md
@@ -16,6 +16,7 @@ Incorrect application of sandboxing in Blink in Google Chrome prior to 62.0.3202
#### Github
- https://github.com/0xR0/uxss-db
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/Bo0oM/CVE-2017-5124
- https://github.com/Metnew/uxss-db
- https://github.com/grandDancer/CVE-2017-5124-RCE-0-Day
- https://github.com/lnick2023/nicenice
diff --git a/2017/CVE-2017-5223.md b/2017/CVE-2017-5223.md
index 6cc758ff99..b8532ccc95 100644
--- a/2017/CVE-2017-5223.md
+++ b/2017/CVE-2017-5223.md
@@ -132,6 +132,7 @@ An issue was discovered in PHPMailer before 5.2.22. PHPMailer's msgHTML method a
- https://github.com/sccontroltotal/phpmailer
- https://github.com/sliani/PHPMailer-File-Attachments-FTP-to-Mail
- https://github.com/supreethsk/rental
+- https://github.com/sweta-web/Online-Registration-System
- https://github.com/tvirus-01/PHP_mail
- https://github.com/vaartjesd/test
- https://github.com/vatann07/BloodConnect
diff --git a/2017/CVE-2017-5645.md b/2017/CVE-2017-5645.md
index 9f42ceddec..d009da319e 100644
--- a/2017/CVE-2017-5645.md
+++ b/2017/CVE-2017-5645.md
@@ -37,6 +37,7 @@ In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket
- https://github.com/HackJava/HackLog4j2
- https://github.com/HackJava/Log4j2
- https://github.com/HynekPetrak/log4shell-finder
+- https://github.com/LibHunter/LibHunter
- https://github.com/Marcelektro/Log4J-RCE-Implementation
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs
- https://github.com/SexyBeast233/SecBooks
diff --git a/2017/CVE-2017-5929.md b/2017/CVE-2017-5929.md
index 0f76c3bddc..ab66187101 100644
--- a/2017/CVE-2017-5929.md
+++ b/2017/CVE-2017-5929.md
@@ -15,6 +15,7 @@ No PoCs from references.
#### Github
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs
- https://github.com/fergarrui/exploits
- https://github.com/hinat0y/Dataset1
diff --git a/2017/CVE-2017-6074.md b/2017/CVE-2017-6074.md
index b4f8f7ec26..ab4f43078a 100644
--- a/2017/CVE-2017-6074.md
+++ b/2017/CVE-2017-6074.md
@@ -28,6 +28,7 @@ The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel thro
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Dk0n9/linux_exploit
- https://github.com/Feng4/linux-kernel-exploits
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Metarget/metarget
- https://github.com/Micr067/linux-kernel-exploits
@@ -85,6 +86,7 @@ The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel thro
- https://github.com/spencerdodd/kernelpop
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/toanthang1842002/CVE-2017-6074
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/kernel-exploits
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
diff --git a/2017/CVE-2017-6206.md b/2017/CVE-2017-6206.md
index b5e90902e9..6bce06f8eb 100644
--- a/2017/CVE-2017-6206.md
+++ b/2017/CVE-2017-6206.md
@@ -16,4 +16,5 @@ D-Link DGS-1510-28XMP, DGS-1510-28X, DGS-1510-52X, DGS-1510-52, DGS-1510-28P, DG
#### Github
- https://github.com/likescam/CVE-2017-0213
- https://github.com/rockl/cve-2017-7184-bak
+- https://github.com/varangamin/CVE-2017-6206
diff --git a/2017/CVE-2017-6370.md b/2017/CVE-2017-6370.md
index 53ae12f9db..71a019f759 100644
--- a/2017/CVE-2017-6370.md
+++ b/2017/CVE-2017-6370.md
@@ -13,4 +13,5 @@ TYPO3 7.6.15 sends an http request to an index.php?loginProvider URI in cases wi
- https://github.com/faizzaidi/TYPO3-v7.6.15-Unencrypted-Login-Request
#### Github
+- https://github.com/faizzaidi/TYPO3-v7.6.15-Unencrypted-Login-Request
diff --git a/2017/CVE-2017-6736.md b/2017/CVE-2017-6736.md
index 33723eeeea..27655d612d 100644
--- a/2017/CVE-2017-6736.md
+++ b/2017/CVE-2017-6736.md
@@ -20,6 +20,7 @@ The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 throug
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/WinMin/Protocol-Vul
+- https://github.com/artkond/cisco-snmp-rce
- https://github.com/lnick2023/nicenice
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
diff --git a/2017/CVE-2017-6744.md b/2017/CVE-2017-6744.md
index 3500a3bd93..def447d45d 100644
--- a/2017/CVE-2017-6744.md
+++ b/2017/CVE-2017-6744.md
@@ -7,11 +7,7 @@
### Description
-The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities.
-
- The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP - Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. A successful exploit could allow the attacker to execute arbitrary code and obtain full control of the affected system or cause the affected system to reload. Customers are advised to apply the workaround as contained in the Workarounds section below. Fixed software information is available via the Cisco IOS Software Checker. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable.
-
- There are workarounds that address these vulnerabilities.
+The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities.
The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP - Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. A successful exploit could allow the attacker to execute arbitrary code and obtain full control of the affected system or cause the affected system to reload. Customers are advised to apply the workaround as contained in the Workarounds section below. Fixed software information is available via the Cisco IOS Software Checker. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable.
There are workarounds that address these vulnerabilities.
### POC
diff --git a/2017/CVE-2017-7184.md b/2017/CVE-2017-7184.md
index 052f678edd..c6f1ef8544 100644
--- a/2017/CVE-2017-7184.md
+++ b/2017/CVE-2017-7184.md
@@ -35,6 +35,7 @@ The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel
- https://github.com/snorez/blog
- https://github.com/snorez/exploits
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xyongcn/exploit
diff --git a/2017/CVE-2017-7188.md b/2017/CVE-2017-7188.md
index 9fca77ea38..3b25f77fd3 100644
--- a/2017/CVE-2017-7188.md
+++ b/2017/CVE-2017-7188.md
@@ -13,4 +13,5 @@ Zurmo 3.1.1 Stable allows a Cross-Site Scripting (XSS) attack with a base64-enco
- https://github.com/faizzaidi/Zurmo-Stable-3.1.1-XSS-By-Provensec-LLC
#### Github
+- https://github.com/faizzaidi/Zurmo-Stable-3.1.1-XSS-By-Provensec-LLC
diff --git a/2017/CVE-2017-7308.md b/2017/CVE-2017-7308.md
index 53df3c4dcb..c6de4c247b 100644
--- a/2017/CVE-2017-7308.md
+++ b/2017/CVE-2017-7308.md
@@ -21,6 +21,7 @@ The packet_set_ring function in net/packet/af_packet.c in the Linux kernel throu
- https://github.com/CKmaenn/kernel-exploits
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/Feng4/linux-kernel-exploits
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Mecyu/googlecontainers
- https://github.com/Metarget/metarget
@@ -84,6 +85,7 @@ The packet_set_ring function in net/packet/af_packet.c in the Linux kernel throu
- https://github.com/spencerdodd/kernelpop
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/vusec/blindside
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/kernel-exploits
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
diff --git a/2017/CVE-2017-7616.md b/2017/CVE-2017-7616.md
index d8c49ad70a..ab0fe53cba 100644
--- a/2017/CVE-2017-7616.md
+++ b/2017/CVE-2017-7616.md
@@ -27,5 +27,6 @@ No PoCs from references.
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/skbasava/Linux-Kernel-exploit
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2017/CVE-2017-7656.md b/2017/CVE-2017-7656.md
index 572ec32dc7..e31720548b 100644
--- a/2017/CVE-2017-7656.md
+++ b/2017/CVE-2017-7656.md
@@ -19,4 +19,5 @@ In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
- https://github.com/DonnumS/inf226Inchat
+- https://github.com/LibHunter/LibHunter
diff --git a/2017/CVE-2017-7657.md b/2017/CVE-2017-7657.md
index 8fedc1c41c..084f2d8596 100644
--- a/2017/CVE-2017-7657.md
+++ b/2017/CVE-2017-7657.md
@@ -19,5 +19,6 @@ In Eclipse Jetty, versions 9.2.x and older, 9.3.x (all configurations), and 9.4.
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
- https://github.com/DonnumS/inf226Inchat
+- https://github.com/LibHunter/LibHunter
- https://github.com/yahoo/cubed
diff --git a/2017/CVE-2017-7957.md b/2017/CVE-2017-7957.md
index 0ba61a6fd8..4ee96d5832 100644
--- a/2017/CVE-2017-7957.md
+++ b/2017/CVE-2017-7957.md
@@ -16,6 +16,7 @@ No PoCs from references.
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/Whoopsunix/PPPVULNS
- https://github.com/dotanuki-labs/android-oss-cves-research
- https://github.com/lmarso-asapp/kotlin-unsecure
diff --git a/2017/CVE-2017-8382.md b/2017/CVE-2017-8382.md
index b4e83f84a3..dbc6b5a5c9 100644
--- a/2017/CVE-2017-8382.md
+++ b/2017/CVE-2017-8382.md
@@ -16,4 +16,5 @@ admidio 3.2.8 has CSRF in adm_program/modules/members/members_function.php with
- https://www.exploit-db.com/exploits/42005/
#### Github
+- https://github.com/faizzaidi/Admidio-3.2.8-CSRF-POC-by-Provensec-llc
diff --git a/2017/CVE-2017-8570.md b/2017/CVE-2017-8570.md
index e7392e1081..27784943ff 100644
--- a/2017/CVE-2017-8570.md
+++ b/2017/CVE-2017-8570.md
@@ -95,6 +95,7 @@ Microsoft Office allows a remote code execution vulnerability due to the way tha
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/qiantu88/office-cve
- https://github.com/r0r0x-xx/Red-Team-OPS-Modern-Adversary
+- https://github.com/rxwx/CVE-2017-8570
- https://github.com/sasqwatch/CVE-2017-8570
- https://github.com/scriptsboy/Red-Teaming-Toolkit
- https://github.com/shr3ddersec/Shr3dKit
diff --git a/2017/CVE-2017-8625.md b/2017/CVE-2017-8625.md
index 4796d20d72..9f5da92ae6 100644
--- a/2017/CVE-2017-8625.md
+++ b/2017/CVE-2017-8625.md
@@ -26,6 +26,7 @@ Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016
- https://github.com/Digit4lBytes/RedTeam
- https://github.com/DigitalQuinn/InfosecCompilation
- https://github.com/Fa1c0n35/Awesome-Red-Teaming.
+- https://github.com/GoVanguard/list-infosec-encyclopedia
- https://github.com/H4CK3RT3CH/Awesome-Red-Teaming
- https://github.com/Hemanthraju02/Red-team
- https://github.com/HildeTeamTNT/Awesome-Red-Teaming
diff --git a/2017/CVE-2017-8890.md b/2017/CVE-2017-8890.md
index a215702387..d1d5a30599 100644
--- a/2017/CVE-2017-8890.md
+++ b/2017/CVE-2017-8890.md
@@ -16,6 +16,7 @@ No PoCs from references.
- https://github.com/7043mcgeep/cve-2017-8890-msf
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Al1ex/LinuxEelvation
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/beraphin/CVE-2017-8890
- https://github.com/bsauce/kernel-exploit-factory
diff --git a/2017/CVE-2017-8917.md b/2017/CVE-2017-8917.md
index 9213ddf530..89b7dbf29a 100644
--- a/2017/CVE-2017-8917.md
+++ b/2017/CVE-2017-8917.md
@@ -23,6 +23,7 @@ SQL injection vulnerability in Joomla! 3.7.x before 3.7.1 allows attackers to ex
- https://github.com/Aukaii/notes
- https://github.com/Awrrays/FrameVul
- https://github.com/BaptisteContreras/CVE-2017-8917-Joomla
+- https://github.com/CLincat/vulcat
- https://github.com/Elsfa7-110/kenzer-templates
- https://github.com/HattMobb/TryHackMe-Bugle-Machine-Writeup-Walkthrough
- https://github.com/HimmelAward/Goby_POC
diff --git a/2017/CVE-2017-9048.md b/2017/CVE-2017-9048.md
index b3fcb3da18..66d5f636e5 100644
--- a/2017/CVE-2017-9048.md
+++ b/2017/CVE-2017-9048.md
@@ -14,4 +14,5 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/ch1hyun/fuzzing-class
diff --git a/2017/CVE-2017-9096.md b/2017/CVE-2017-9096.md
index 198af61fad..a4828f6f1f 100644
--- a/2017/CVE-2017-9096.md
+++ b/2017/CVE-2017-9096.md
@@ -17,6 +17,7 @@ The XML parsers in iText before 5.5.12 and 7.x before 7.0.3 do not disable exter
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/jakabakos/CVE-2017-9096
- https://github.com/jakabakos/CVE-2017-9096-iText-XXE
diff --git a/2017/CVE-2017-9609.md b/2017/CVE-2017-9609.md
index 01de24458d..cf8b64e3cb 100644
--- a/2017/CVE-2017-9609.md
+++ b/2017/CVE-2017-9609.md
@@ -15,4 +15,5 @@ Cross-site scripting (XSS) vulnerability in Blackcat CMS 1.2 allows remote authe
- https://github.com/faizzaidi/Blackcat-cms-v1.2-xss-POC-by-Provensec-llc
#### Github
+- https://github.com/faizzaidi/Blackcat-cms-v1.2-xss-POC-by-Provensec-llc
diff --git a/2017/CVE-2017-9735.md b/2017/CVE-2017-9735.md
index 349226632a..4a7bed4aaf 100644
--- a/2017/CVE-2017-9735.md
+++ b/2017/CVE-2017-9735.md
@@ -18,5 +18,6 @@ Jetty through 9.4.x is prone to a timing channel in util/security/Password.java,
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/fredfeng/Themis-taint
diff --git a/2017/CVE-2017-9798.md b/2017/CVE-2017-9798.md
index 49236a0710..bbcfa237c7 100644
--- a/2017/CVE-2017-9798.md
+++ b/2017/CVE-2017-9798.md
@@ -42,6 +42,7 @@ Apache httpd allows remote attackers to read secret data from process memory if
- https://github.com/cnnrshd/bbot-utils
- https://github.com/firatesatoglu/shodanSearch
- https://github.com/hackingyseguridad/apachebleed
+- https://github.com/hannob/optionsbleed
- https://github.com/imhunterand/hackerone-publicy-disclosed
- https://github.com/kasem545/vulnsearch
- https://github.com/l0n3rs/CVE-2017-9798
diff --git a/2018/CVE-2018-0114.md b/2018/CVE-2018-0114.md
index 4e75cb6e56..e4eb0856d9 100644
--- a/2018/CVE-2018-0114.md
+++ b/2018/CVE-2018-0114.md
@@ -41,4 +41,5 @@ A vulnerability in the Cisco node-jose open source library before 0.11.0 could a
- https://github.com/ticarpi/jwt_tool
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
- https://github.com/zhangziyang301/jwt_tool
+- https://github.com/zi0Black/POC-CVE-2018-0114
diff --git a/2018/CVE-2018-0151.md b/2018/CVE-2018-0151.md
index 160bd399cd..aa5efe3a78 100644
--- a/2018/CVE-2018-0151.md
+++ b/2018/CVE-2018-0151.md
@@ -17,4 +17,5 @@ No PoCs from references.
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/ferdinandmudjialim/metasploit-cve-search
+- https://github.com/tunnelcat/metasploit-cve-search
diff --git a/2018/CVE-2018-0171.md b/2018/CVE-2018-0171.md
index f01a8d31d3..1417cfd5e5 100644
--- a/2018/CVE-2018-0171.md
+++ b/2018/CVE-2018-0171.md
@@ -25,5 +25,6 @@ A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/rikosintie/SmartInstall
- https://github.com/tomoyamachi/gocarts
+- https://github.com/tunnelcat/metasploit-cve-search
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
diff --git a/2018/CVE-2018-0304.md b/2018/CVE-2018-0304.md
index d65948bd32..8fdc4e4721 100644
--- a/2018/CVE-2018-0304.md
+++ b/2018/CVE-2018-0304.md
@@ -15,4 +15,5 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ferdinandmudjialim/metasploit-cve-search
+- https://github.com/tunnelcat/metasploit-cve-search
diff --git a/2018/CVE-2018-0743.md b/2018/CVE-2018-0743.md
index a48223010d..1eef194150 100644
--- a/2018/CVE-2018-0743.md
+++ b/2018/CVE-2018-0743.md
@@ -33,6 +33,7 @@ Windows Subsystem for Linux in Windows 10 version 1703, Windows 10 version 1709,
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/renzu0/Windows-exp
- https://github.com/root26/bug
+- https://github.com/saaramar/execve_exploit
- https://github.com/safesword/WindowsExp
- https://github.com/valentinoJones/Windows-Kernel-Exploits
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
diff --git a/2018/CVE-2018-0802.md b/2018/CVE-2018-0802.md
index 2122a527ae..1648b33f88 100644
--- a/2018/CVE-2018-0802.md
+++ b/2018/CVE-2018-0802.md
@@ -85,6 +85,7 @@ Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Offic
- https://github.com/reph0r/poc-exp-tools
- https://github.com/ridhopratama29/zimbohack
- https://github.com/roninAPT/CVE-2018-0802
+- https://github.com/rxwx/CVE-2018-0802
- https://github.com/t31m0/PENTESTING-BIBLE
- https://github.com/tib36/PhishingBook
- https://github.com/vincentfer/PENTESTING-BIBLE-
@@ -93,4 +94,5 @@ Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Offic
- https://github.com/xaitax/cisa-catalog-known-vulnerabilities
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
- https://github.com/yusufazizmustofa/BIBLE
+- https://github.com/zldww2011/CVE-2018-0802_POC
diff --git a/2018/CVE-2018-0886.md b/2018/CVE-2018-0886.md
index 1015fdd071..039132aef9 100644
--- a/2018/CVE-2018-0886.md
+++ b/2018/CVE-2018-0886.md
@@ -33,6 +33,7 @@ The Credential Security Support Provider protocol (CredSSP) in Microsoft Windows
- https://github.com/jborean93/requests-credssp
- https://github.com/lnick2023/nicenice
- https://github.com/paulveillard/cybersecurity-exploit-development
+- https://github.com/preempt/credssp
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/wachira90/fix-credssp
- https://github.com/weeka10/-hktalent-TOP
diff --git a/2018/CVE-2018-1000134.md b/2018/CVE-2018-1000134.md
index e8fa161493..6dcccd2fb3 100644
--- a/2018/CVE-2018-1000134.md
+++ b/2018/CVE-2018-1000134.md
@@ -16,4 +16,5 @@ No PoCs from references.
- https://github.com/0xT11/CVE-POC
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
diff --git a/2018/CVE-2018-1000180.md b/2018/CVE-2018-1000180.md
index 280ba635d4..aa8a454a2e 100644
--- a/2018/CVE-2018-1000180.md
+++ b/2018/CVE-2018-1000180.md
@@ -20,4 +20,5 @@ Bouncy Castle BC 1.54 - 1.59, BC-FJA 1.0.0, BC-FJA 1.0.1 and earlier have a flaw
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
- https://github.com/CyberSource/cybersource-sdk-java
+- https://github.com/LibHunter/LibHunter
diff --git a/2018/CVE-2018-1000529.md b/2018/CVE-2018-1000529.md
index f7b0a486f6..541d91da3e 100644
--- a/2018/CVE-2018-1000529.md
+++ b/2018/CVE-2018-1000529.md
@@ -14,4 +14,5 @@ Grails Fields plugin version 2.2.7 contains a Cross Site Scripting (XSS) vulnera
#### Github
- https://github.com/0xT11/CVE-POC
+- https://github.com/martinfrancois/CVE-2018-1000529
diff --git a/2018/CVE-2018-1000613.md b/2018/CVE-2018-1000613.md
index bb927a7834..c7be06692b 100644
--- a/2018/CVE-2018-1000613.md
+++ b/2018/CVE-2018-1000613.md
@@ -20,6 +20,7 @@ Legion of the Bouncy Castle Legion of the Bouncy Castle Java Cryptography APIs 1
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
- https://github.com/IkerSaint/VULNAPP-vulnerable-app
+- https://github.com/LibHunter/LibHunter
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs
- https://github.com/dotanuki-labs/android-oss-cves-research
- https://github.com/pctF/vulnerable-app
diff --git a/2018/CVE-2018-1000632.md b/2018/CVE-2018-1000632.md
index ab704b08b6..821e097366 100644
--- a/2018/CVE-2018-1000632.md
+++ b/2018/CVE-2018-1000632.md
@@ -18,5 +18,6 @@ dom4j version prior to version 2.1.1 contains a CWE-91: XML Injection vulnerabil
#### Github
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/ilmari666/cybsec
diff --git a/2018/CVE-2018-1000850.md b/2018/CVE-2018-1000850.md
index 932cfa6f8c..4b202da17b 100644
--- a/2018/CVE-2018-1000850.md
+++ b/2018/CVE-2018-1000850.md
@@ -15,6 +15,7 @@ No PoCs from references.
#### Github
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/hinat0y/Dataset1
- https://github.com/hinat0y/Dataset10
- https://github.com/hinat0y/Dataset11
diff --git a/2018/CVE-2018-1002105.md b/2018/CVE-2018-1002105.md
index 0e4bc6550a..09d9a9f4b8 100644
--- a/2018/CVE-2018-1002105.md
+++ b/2018/CVE-2018-1002105.md
@@ -46,6 +46,7 @@ In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect ha
- https://github.com/cloudpassage-community/find_k8s
- https://github.com/cloudyuga/kubecon19-eu
- https://github.com/cyberanand1337x/bug-bounty-2022
+- https://github.com/evict/poc_CVE-2018-1002105
- https://github.com/g3rzi/HackingKubernetes
- https://github.com/gravitational/cve-2018-1002105
- https://github.com/hacking-kubernetes/hacking-kubernetes.info
diff --git a/2018/CVE-2018-1002201.md b/2018/CVE-2018-1002201.md
index 53986d471a..e06fde28d5 100644
--- a/2018/CVE-2018-1002201.md
+++ b/2018/CVE-2018-1002201.md
@@ -15,6 +15,7 @@ No PoCs from references.
#### Github
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/jpbprakash/vuln
- https://github.com/mile9299/zip-slip-vulnerability
- https://github.com/snyk/zip-slip-vulnerability
diff --git a/2018/CVE-2018-10054.md b/2018/CVE-2018-10054.md
index 101515b673..9f7c0c4860 100644
--- a/2018/CVE-2018-10054.md
+++ b/2018/CVE-2018-10054.md
@@ -10,6 +10,7 @@
### POC
#### Reference
+- https://github.com/h2database/h2database/issues/1225
- https://mthbernardes.github.io/rce/2018/03/14/abusing-h2-database-alias.html
- https://www.exploit-db.com/exploits/44422/
diff --git a/2018/CVE-2018-10088.md b/2018/CVE-2018-10088.md
index 216ba56bdd..9e0136e61a 100644
--- a/2018/CVE-2018-10088.md
+++ b/2018/CVE-2018-10088.md
@@ -16,4 +16,5 @@ Buffer overflow in XiongMai uc-httpd 1.0.0 has unspecified impact and attack vec
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/KostasEreksonas/Besder-6024PB-XMA501-ip-camera-security-investigation
+- https://github.com/bitfu/uc-httpd-1.0.0-buffer-overflow-exploit
diff --git a/2018/CVE-2018-10237.md b/2018/CVE-2018-10237.md
index 03b5c61292..3fbd219ed4 100644
--- a/2018/CVE-2018-10237.md
+++ b/2018/CVE-2018-10237.md
@@ -20,6 +20,7 @@ Unbounded memory allocation in Google Guava 11.0 through 24.x before 24.1.1 allo
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
- https://github.com/IkerSaint/VULNAPP-vulnerable-app
+- https://github.com/LibHunter/LibHunter
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs
- https://github.com/diakogiannis/moviebook
- https://github.com/dotanuki-labs/android-oss-cves-research
diff --git a/2018/CVE-2018-11248.md b/2018/CVE-2018-11248.md
index feecc74cd7..b3d2cc8fdd 100644
--- a/2018/CVE-2018-11248.md
+++ b/2018/CVE-2018-11248.md
@@ -15,4 +15,5 @@ No PoCs from references.
#### Github
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
diff --git a/2018/CVE-2018-11307.md b/2018/CVE-2018-11307.md
index 8994285843..0b9965e1cf 100644
--- a/2018/CVE-2018-11307.md
+++ b/2018/CVE-2018-11307.md
@@ -19,6 +19,7 @@ An issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.5. Use o
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/OWASP/www-project-ide-vulscanner
- https://github.com/ilmari666/cybsec
- https://github.com/seal-community/patches
diff --git a/2018/CVE-2018-11409.md b/2018/CVE-2018-11409.md
index 6b2e2667f0..fefe3776c7 100644
--- a/2018/CVE-2018-11409.md
+++ b/2018/CVE-2018-11409.md
@@ -18,6 +18,7 @@ Splunk through 7.0.1 allows information disclosure by appending __raw/services/s
- https://github.com/Elsfa7-110/kenzer-templates
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/jam620/OSIN-Splunk
+- https://github.com/kofa2002/splunk
- https://github.com/merlinepedra/nuclei-templates
- https://github.com/merlinepedra25/nuclei-templates
- https://github.com/sobinge/nuclei-templates
diff --git a/2018/CVE-2018-11471.md b/2018/CVE-2018-11471.md
index 7afc8d1c4d..0ef77f60b6 100644
--- a/2018/CVE-2018-11471.md
+++ b/2018/CVE-2018-11471.md
@@ -13,4 +13,5 @@ Cockpit 0.5.5 has XSS via a collection, form, or region.
- https://github.com/nikhil1232/Cockpit-CMS-XSS-POC
#### Github
+- https://github.com/nikhil1232/Cockpit-CMS-XSS-POC
diff --git a/2018/CVE-2018-11771.md b/2018/CVE-2018-11771.md
index 7048fcdbb3..d51bff58d2 100644
--- a/2018/CVE-2018-11771.md
+++ b/2018/CVE-2018-11771.md
@@ -18,6 +18,7 @@ When reading a specially crafted ZIP archive, the read method of Apache Commons
- https://github.com/CGCL-codes/PHunter
- https://github.com/DennisFeldbusch/Fuzz
- https://github.com/GCFuzzer/SP2023
+- https://github.com/LibHunter/LibHunter
- https://github.com/hwen020/JQF
- https://github.com/jyi/JQF
- https://github.com/mfatima1/CS182
diff --git a/2018/CVE-2018-11776.md b/2018/CVE-2018-11776.md
index 853558fd4a..2ce0873f07 100644
--- a/2018/CVE-2018-11776.md
+++ b/2018/CVE-2018-11776.md
@@ -114,6 +114,7 @@ Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remo
- https://github.com/hellochunqiu/PayloadsAllTheThings
- https://github.com/hktalent/TOP
- https://github.com/hktalent/myhktools
+- https://github.com/hook-s3c/CVE-2018-11776-Python-PoC
- https://github.com/hudunkey/Red-Team-links
- https://github.com/hwiwonl/dayone
- https://github.com/hyeonql/WHS
diff --git a/2018/CVE-2018-11797.md b/2018/CVE-2018-11797.md
index 15caebdfec..6060c69367 100644
--- a/2018/CVE-2018-11797.md
+++ b/2018/CVE-2018-11797.md
@@ -17,4 +17,5 @@ In Apache PDFBox 1.8.0 to 1.8.15 and 2.0.0RC1 to 2.0.11, a carefully crafted PDF
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
diff --git a/2018/CVE-2018-12022.md b/2018/CVE-2018-12022.md
index 63bf11a927..2dd55f10ec 100644
--- a/2018/CVE-2018-12022.md
+++ b/2018/CVE-2018-12022.md
@@ -18,6 +18,7 @@ An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/ilmari666/cybsec
- https://github.com/seal-community/patches
diff --git a/2018/CVE-2018-12034.md b/2018/CVE-2018-12034.md
index 904dd6c866..5a90c5b320 100644
--- a/2018/CVE-2018-12034.md
+++ b/2018/CVE-2018-12034.md
@@ -16,6 +16,7 @@ In YARA 3.7.1 and prior, parsing a specially crafted compiled rule file can caus
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/bnbdr/swisscheese
- https://github.com/lnick2023/nicenice
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
diff --git a/2018/CVE-2018-12035.md b/2018/CVE-2018-12035.md
index e49091ce45..cd48a73b6f 100644
--- a/2018/CVE-2018-12035.md
+++ b/2018/CVE-2018-12035.md
@@ -16,6 +16,7 @@ In YARA 3.7.1 and prior, parsing a specially crafted compiled rule file can caus
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/bnbdr/swisscheese
- https://github.com/lnick2023/nicenice
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
diff --git a/2018/CVE-2018-12418.md b/2018/CVE-2018-12418.md
index 71bc9e60cd..95b5d19c95 100644
--- a/2018/CVE-2018-12418.md
+++ b/2018/CVE-2018-12418.md
@@ -19,6 +19,7 @@ No PoCs from references.
- https://github.com/CGCL-codes/PHunter
- https://github.com/DennisFeldbusch/Fuzz
- https://github.com/GCFuzzer/SP2023
+- https://github.com/LibHunter/LibHunter
- https://github.com/hwen020/JQF
- https://github.com/jyi/JQF
- https://github.com/mfatima1/CS182
diff --git a/2018/CVE-2018-12538.md b/2018/CVE-2018-12538.md
index e9696c17a5..c886e2e4f3 100644
--- a/2018/CVE-2018-12538.md
+++ b/2018/CVE-2018-12538.md
@@ -16,4 +16,5 @@ In Eclipse Jetty versions 9.4.0 through 9.4.8, when using the optional Jetty pro
#### Github
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
diff --git a/2018/CVE-2018-1260.md b/2018/CVE-2018-1260.md
index fa2cac85e0..f977e6aabf 100644
--- a/2018/CVE-2018-1260.md
+++ b/2018/CVE-2018-1260.md
@@ -18,6 +18,7 @@ No PoCs from references.
- https://github.com/Drun1baby/CVE-Reproduction-And-Analysis
- https://github.com/SexyBeast233/SecBooks
- https://github.com/ax1sX/SpringSecurity
+- https://github.com/enomothem/PenTestNote
- https://github.com/gyyyy/footprint
- https://github.com/langu-xyz/JavaVulnMap
diff --git a/2018/CVE-2018-1270.md b/2018/CVE-2018-1270.md
index 25117b16fd..aafb4a8c84 100644
--- a/2018/CVE-2018-1270.md
+++ b/2018/CVE-2018-1270.md
@@ -46,6 +46,7 @@ Spring Framework, versions 5.0 prior to 5.0.5 and versions 4.3 prior to 4.3.15 a
- https://github.com/cybersecsi/docker-vuln-runner
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/do0dl3/myhktools
+- https://github.com/enomothem/PenTestNote
- https://github.com/genxor/CVE-2018-1270_EXP
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/hktalent/myhktools
diff --git a/2018/CVE-2018-1324.md b/2018/CVE-2018-1324.md
index 578aafc984..f43159e062 100644
--- a/2018/CVE-2018-1324.md
+++ b/2018/CVE-2018-1324.md
@@ -16,6 +16,7 @@ A specially crafted ZIP archive can be used to cause an infinite loop inside of
- https://github.com/0xT11/CVE-POC
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/dotanuki-labs/android-oss-cves-research
- https://github.com/hectorgie/PoC-in-GitHub
diff --git a/2018/CVE-2018-13257.md b/2018/CVE-2018-13257.md
index 8d24e10047..7584457fc9 100644
--- a/2018/CVE-2018-13257.md
+++ b/2018/CVE-2018-13257.md
@@ -14,4 +14,5 @@ The bb-auth-provider-cas authentication module within Blackboard Learn 2018-07-0
#### Github
- https://github.com/0xT11/CVE-POC
+- https://github.com/gluxon/CVE-2018-13257
diff --git a/2018/CVE-2018-13379.md b/2018/CVE-2018-13379.md
index 4fe29b4e1b..03743c1416 100644
--- a/2018/CVE-2018-13379.md
+++ b/2018/CVE-2018-13379.md
@@ -36,6 +36,7 @@ An Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal"
- https://github.com/MelanyRoob/Goby
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
+- https://github.com/RedcentricCyber/Fortigate
- https://github.com/SexyBeast233/SecBooks
- https://github.com/TebbaaX/Vault6
- https://github.com/W01fh4cker/Serein
diff --git a/2018/CVE-2018-14333.md b/2018/CVE-2018-14333.md
index 506f691916..bd25c8bb6a 100644
--- a/2018/CVE-2018-14333.md
+++ b/2018/CVE-2018-14333.md
@@ -13,4 +13,5 @@ TeamViewer through 13.1.1548 stores a password in Unicode format within TeamView
- https://github.com/vah13/extractTVpasswords
#### Github
+- https://github.com/vah13/extractTVpasswords
diff --git a/2018/CVE-2018-14568.md b/2018/CVE-2018-14568.md
index 5ec5ac573b..0ef6603027 100644
--- a/2018/CVE-2018-14568.md
+++ b/2018/CVE-2018-14568.md
@@ -14,4 +14,5 @@ Suricata before 4.0.5 stops TCP stream inspection upon a TCP RST from a server.
- https://redmine.openinfosecfoundation.org/issues/2501
#### Github
+- https://github.com/kirillwow/ids_bypass
diff --git a/2018/CVE-2018-14634.md b/2018/CVE-2018-14634.md
index 23d6c1763c..8f95d28f6f 100644
--- a/2018/CVE-2018-14634.md
+++ b/2018/CVE-2018-14634.md
@@ -33,6 +33,7 @@ An integer overflow flaw was found in the Linux kernel's create_elf_tables() fun
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
diff --git a/2018/CVE-2018-14847.md b/2018/CVE-2018-14847.md
index 35b4b7164b..fdfa6568d2 100644
--- a/2018/CVE-2018-14847.md
+++ b/2018/CVE-2018-14847.md
@@ -22,6 +22,7 @@ MikroTik RouterOS through 6.42 allows unauthenticated remote attackers to read a
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Acengerz/WinboxPoC
- https://github.com/AsrafulDev/winboxbug
+- https://github.com/BasuCert/WinboxPoC
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
diff --git a/2018/CVE-2018-15499.md b/2018/CVE-2018-15499.md
index 17f56264d3..340e61a7a2 100644
--- a/2018/CVE-2018-15499.md
+++ b/2018/CVE-2018-15499.md
@@ -16,6 +16,7 @@ GEAR Software products that include GEARAspiWDM.sys, 2.2.5.0, allow local users
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CrackerCat/Kernel-Security-Development
+- https://github.com/DownWithUp/CVE-2018-15499
- https://github.com/DownWithUp/CVE-Stockpile
- https://github.com/ExpLife0011/awesome-windows-kernel-security-development
- https://github.com/Ondrik8/exploit
diff --git a/2018/CVE-2018-15901.md b/2018/CVE-2018-15901.md
index 0bd1a2613d..79c10d1c32 100644
--- a/2018/CVE-2018-15901.md
+++ b/2018/CVE-2018-15901.md
@@ -14,4 +14,5 @@ e107 2.1.8 has CSRF in 'usersettings.php' with an impact of changing details suc
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/dhananjay-bajaj/e107_2.1.8_csrf
diff --git a/2018/CVE-2018-16133.md b/2018/CVE-2018-16133.md
index 7b4077721e..2b3111c521 100644
--- a/2018/CVE-2018-16133.md
+++ b/2018/CVE-2018-16133.md
@@ -15,4 +15,5 @@ Cybrotech CyBroHttpServer 1.0.3 allows Directory Traversal via a ../ in the URI.
#### Github
- https://github.com/ARPSyndicate/kenzer-templates
+- https://github.com/EmreOvunc/CyBroHttpServer-v1.0.3-Directory-Traversal
diff --git a/2018/CVE-2018-16134.md b/2018/CVE-2018-16134.md
index eeb217f7f0..8c60ba0653 100644
--- a/2018/CVE-2018-16134.md
+++ b/2018/CVE-2018-16134.md
@@ -14,4 +14,5 @@ Cybrotech CyBroHttpServer 1.0.3 allows XSS via a URI.
- https://www.exploit-db.com/exploits/45309/
#### Github
+- https://github.com/EmreOvunc/CyBroHttpServer-v1.0.3-Reflected-XSS
diff --git a/2018/CVE-2018-16381.md b/2018/CVE-2018-16381.md
index 13659c1a35..adb02bdd59 100644
--- a/2018/CVE-2018-16381.md
+++ b/2018/CVE-2018-16381.md
@@ -14,4 +14,5 @@ e107 2.1.8 has XSS via the e107_admin/users.php?mode=main&action=list user_login
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/dhananjay-bajaj/E107-v2.1.8-XSS-POC
diff --git a/2018/CVE-2018-16946.md b/2018/CVE-2018-16946.md
index b2650b5a11..61924bb878 100644
--- a/2018/CVE-2018-16946.md
+++ b/2018/CVE-2018-16946.md
@@ -15,6 +15,7 @@ LG LNB*, LND*, LNU*, and LNV* smart network camera devices have broken access co
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/EgeBalci/LG-Smart-IP-Device-Backup-Download
- https://github.com/lnick2023/nicenice
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
diff --git a/2018/CVE-2018-17081.md b/2018/CVE-2018-17081.md
index 323686b0e3..ac106a8f3f 100644
--- a/2018/CVE-2018-17081.md
+++ b/2018/CVE-2018-17081.md
@@ -14,4 +14,5 @@ e107 2.1.9 allows CSRF via e107_admin/wmessage.php?mode=&action=inline&ajax_used
#### Github
- https://github.com/0xT11/CVE-POC
+- https://github.com/himanshurahi/e107_2.1.9_CSRF_POC
diff --git a/2018/CVE-2018-17182.md b/2018/CVE-2018-17182.md
index 72aba58c1f..f52c97794b 100644
--- a/2018/CVE-2018-17182.md
+++ b/2018/CVE-2018-17182.md
@@ -26,6 +26,7 @@ An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_a
- https://github.com/CVEDB/top
- https://github.com/Echocipher/Resource-list
- https://github.com/GhostTroops/TOP
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/IdanBanani/Linux-Kernel-VR-Exploitation
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Ondrik8/RED-Team
@@ -59,6 +60,7 @@ An issue was discovered in the Linux kernel through 4.18.8. The vmacache_flush_a
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/svbjdbk123/-
- https://github.com/twensoo/PersistentThreat
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
- https://github.com/xiaoZ-hc/redtool
diff --git a/2018/CVE-2018-17240.md b/2018/CVE-2018-17240.md
index 6cd87d5d38..2b7ff94254 100644
--- a/2018/CVE-2018-17240.md
+++ b/2018/CVE-2018-17240.md
@@ -14,5 +14,6 @@ There is a memory dump vulnerability on Netwave IP camera devices at //proc/kcor
- https://github.com/BBge/CVE-2018-17240/blob/main/exploit.py
#### Github
+- https://github.com/BBge/CVE-2018-17240
- https://github.com/Xewdy444/Netgrave
diff --git a/2018/CVE-2018-18281.md b/2018/CVE-2018-18281.md
index 7f300f8342..1175eb05d4 100644
--- a/2018/CVE-2018-18281.md
+++ b/2018/CVE-2018-18281.md
@@ -25,5 +25,6 @@ Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2018/CVE-2018-18955.md b/2018/CVE-2018-18955.md
index 043fb1c3b1..0df86ca3b1 100644
--- a/2018/CVE-2018-18955.md
+++ b/2018/CVE-2018-18955.md
@@ -18,6 +18,7 @@ In the Linux kernel 4.15.x through 4.19.x before 4.19.2, map_write() in kernel/u
- https://github.com/Al1ex/LinuxEelvation
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/HaleyWei/POC-available
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Metarget/metarget
- https://github.com/Micr067/linux-kernel-exploits
diff --git a/2018/CVE-2018-19320.md b/2018/CVE-2018-19320.md
index 4359594df3..19da76cf65 100644
--- a/2018/CVE-2018-19320.md
+++ b/2018/CVE-2018-19320.md
@@ -25,6 +25,7 @@ The GDrv low-level driver in GIGABYTE APP Center v1.05.21 and earlier, AORUS GRA
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/cmd-theo/RobbinHood-attack
- https://github.com/cygnosic/Gigabyte_Disable_DSE
+- https://github.com/gmh5225/RobbinHood-attack
- https://github.com/gmh5225/awesome-game-security
- https://github.com/h4rmy/KDU
- https://github.com/hfiref0x/KDU
diff --git a/2018/CVE-2018-19360.md b/2018/CVE-2018-19360.md
index b64c539432..fbb9220b66 100644
--- a/2018/CVE-2018-19360.md
+++ b/2018/CVE-2018-19360.md
@@ -17,6 +17,7 @@ FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspec
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/OWASP/www-project-ide-vulscanner
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs
- https://github.com/aaronm-sysdig/risk-accept
diff --git a/2018/CVE-2018-19361.md b/2018/CVE-2018-19361.md
index ac69dc847c..0933db155f 100644
--- a/2018/CVE-2018-19361.md
+++ b/2018/CVE-2018-19361.md
@@ -17,6 +17,7 @@ FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspec
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/OWASP/www-project-ide-vulscanner
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs
- https://github.com/aaronm-sysdig/risk-accept
diff --git a/2018/CVE-2018-19362.md b/2018/CVE-2018-19362.md
index 253d0551db..aa1daed1cb 100644
--- a/2018/CVE-2018-19362.md
+++ b/2018/CVE-2018-19362.md
@@ -18,6 +18,7 @@ FasterXML jackson-databind 2.x before 2.9.8 might allow attackers to have unspec
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/OWASP/www-project-ide-vulscanner
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs
- https://github.com/aaronm-sysdig/risk-accept
diff --git a/2018/CVE-2018-19466.md b/2018/CVE-2018-19466.md
index afa7d00a39..f89a2b5c5c 100644
--- a/2018/CVE-2018-19466.md
+++ b/2018/CVE-2018-19466.md
@@ -15,6 +15,7 @@ A vulnerability was found in Portainer before 1.20.0. Portainer stores LDAP cred
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/MauroEldritch/lempo
- https://github.com/MauroEldritch/mauroeldritch
- https://github.com/anquanscan/sec-tools
diff --git a/2018/CVE-2018-19487.md b/2018/CVE-2018-19487.md
index 0ab1bb2d3f..d474468775 100644
--- a/2018/CVE-2018-19487.md
+++ b/2018/CVE-2018-19487.md
@@ -16,5 +16,6 @@ The WP-jobhunt plugin before version 2.4 for WordPress does not control AJAX req
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/Antho59/wp-jobhunt-exploit
- https://github.com/YOLOP0wn/wp-jobhunt-exploit
diff --git a/2018/CVE-2018-19488.md b/2018/CVE-2018-19488.md
index 1f992e201a..7e5d21481f 100644
--- a/2018/CVE-2018-19488.md
+++ b/2018/CVE-2018-19488.md
@@ -14,5 +14,6 @@ The WP-jobhunt plugin before version 2.4 for WordPress does not control AJAX req
- https://wpvulndb.com/vulnerabilities/9206
#### Github
+- https://github.com/Antho59/wp-jobhunt-exploit
- https://github.com/YOLOP0wn/wp-jobhunt-exploit
diff --git a/2018/CVE-2018-19537.md b/2018/CVE-2018-19537.md
index c8e2f9fff1..3fc39e0717 100644
--- a/2018/CVE-2018-19537.md
+++ b/2018/CVE-2018-19537.md
@@ -14,4 +14,5 @@ TP-Link Archer C5 devices through V2_160201_US allow remote command execution vi
#### Github
- https://github.com/0xT11/CVE-POC
+- https://github.com/JackDoan/TP-Link-ArcherC5-RCE
diff --git a/2018/CVE-2018-19933.md b/2018/CVE-2018-19933.md
index e5b916f5b3..b47dfd5cb6 100644
--- a/2018/CVE-2018-19933.md
+++ b/2018/CVE-2018-19933.md
@@ -15,4 +15,5 @@ Bolt CMS <3.6.2 allows XSS via text input click preview button as demonstrated b
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/rdincel1/Bolt-CMS-3.6.2---Cross-Site-Scripting
diff --git a/2018/CVE-2018-20161.md b/2018/CVE-2018-20161.md
index 2a5007cadb..50a824c8f0 100644
--- a/2018/CVE-2018-20161.md
+++ b/2018/CVE-2018-20161.md
@@ -13,4 +13,5 @@ A design flaw in the BlinkForHome (aka Blink For Home) Sync Module 2.10.4 and ea
- https://github.com/Jacquais/BlinkVuln
#### Github
+- https://github.com/Jacquais/BlinkVuln
diff --git a/2018/CVE-2018-20343.md b/2018/CVE-2018-20343.md
index a5c61b3358..74d1e36123 100644
--- a/2018/CVE-2018-20343.md
+++ b/2018/CVE-2018-20343.md
@@ -15,5 +15,6 @@ Multiple buffer overflow vulnerabilities have been found in Ken Silverman Build
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/Alexandre-Bartel/CVE-2018-20343
- https://github.com/anquanscan/sec-tools
diff --git a/2018/CVE-2018-20377.md b/2018/CVE-2018-20377.md
index f708d2e9b1..73304852f6 100644
--- a/2018/CVE-2018-20377.md
+++ b/2018/CVE-2018-20377.md
@@ -18,4 +18,5 @@ Orange Livebox 00.96.320S devices allow remote attackers to discover Wi-Fi crede
- https://github.com/angristan/awesome-stars
- https://github.com/oski02/NSE
- https://github.com/pawamoy/stars
+- https://github.com/zadewg/LIVEBOX-0DAY
diff --git a/2018/CVE-2018-20418.md b/2018/CVE-2018-20418.md
index 104335ceab..a0986209d3 100644
--- a/2018/CVE-2018-20418.md
+++ b/2018/CVE-2018-20418.md
@@ -14,4 +14,5 @@ index.php?p=admin/actions/entries/save-entry in Craft CMS 3.0.25 allows XSS by s
- https://www.exploit-db.com/exploits/46054/
#### Github
+- https://github.com/rdincel1/Craft-CMS-3.0.25---Cross-Site-Scripting
diff --git a/2018/CVE-2018-20555.md b/2018/CVE-2018-20555.md
index f05acdf29e..2e045c0ce0 100644
--- a/2018/CVE-2018-20555.md
+++ b/2018/CVE-2018-20555.md
@@ -15,4 +15,5 @@ The Design Chemical Social Network Tabs plugin 1.7.1 for WordPress allows remote
#### Github
- https://github.com/0xT11/CVE-POC
+- https://github.com/fs0c131y/CVE-2018-20555
diff --git a/2018/CVE-2018-20575.md b/2018/CVE-2018-20575.md
index 399d8a85ed..330fddb3ba 100644
--- a/2018/CVE-2018-20575.md
+++ b/2018/CVE-2018-20575.md
@@ -13,4 +13,5 @@ Orange Livebox 00.96.320S devices have an undocumented /system_firmwarel.stm URI
- https://github.com/zadewg/LIVEBOX-0DAY
#### Github
+- https://github.com/zadewg/LIVEBOX-0DAY
diff --git a/2018/CVE-2018-20576.md b/2018/CVE-2018-20576.md
index 5069c6f953..8da9854a06 100644
--- a/2018/CVE-2018-20576.md
+++ b/2018/CVE-2018-20576.md
@@ -14,4 +14,5 @@ Orange Livebox 00.96.320S devices allow cgi-bin/autodialing.exe and cgi-bin/phon
- https://github.com/zadewg/LIVEBOX-0DAY
#### Github
+- https://github.com/zadewg/LIVEBOX-0DAY
diff --git a/2018/CVE-2018-20577.md b/2018/CVE-2018-20577.md
index bfdf06bbdc..d34851d9d3 100644
--- a/2018/CVE-2018-20577.md
+++ b/2018/CVE-2018-20577.md
@@ -13,4 +13,5 @@ Orange Livebox 00.96.320S devices allow cgi-bin/restore.exe, cgi-bin/firewall_SP
- https://github.com/zadewg/LIVEBOX-0DAY
#### Github
+- https://github.com/zadewg/LIVEBOX-0DAY
diff --git a/2018/CVE-2018-20580.md b/2018/CVE-2018-20580.md
index 57d4fdb04d..cc4e34c6cd 100644
--- a/2018/CVE-2018-20580.md
+++ b/2018/CVE-2018-20580.md
@@ -16,4 +16,5 @@ The WSDL import functionality in SmartBear ReadyAPI 2.5.0 and 2.6.0 allows remot
#### Github
- https://github.com/0xT11/CVE-POC
+- https://github.com/gscamelo/CVE-2018-20580
diff --git a/2018/CVE-2018-20817.md b/2018/CVE-2018-20817.md
index e6329b1a55..9ceb41f9a1 100644
--- a/2018/CVE-2018-20817.md
+++ b/2018/CVE-2018-20817.md
@@ -14,5 +14,6 @@ SV_SteamAuthClient in various Activision Infinity Ward Call of Duty games before
- https://github.com/momo5502/cod-exploits/tree/master/steam-auth
#### Github
+- https://github.com/RektInator/cod-steamauth-rce
- https://github.com/momo5502/cod-exploits
diff --git a/2018/CVE-2018-20969.md b/2018/CVE-2018-20969.md
index 5b86ad0dd7..2e0b70f052 100644
--- a/2018/CVE-2018-20969.md
+++ b/2018/CVE-2018-20969.md
@@ -16,5 +16,6 @@ do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginnin
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/irsl/gnu-patch-vulnerabilities
- https://github.com/phonito/phonito-vulnerable-container
diff --git a/2018/CVE-2018-2380.md b/2018/CVE-2018-2380.md
index 161f5a6576..acc7ddb57c 100644
--- a/2018/CVE-2018-2380.md
+++ b/2018/CVE-2018-2380.md
@@ -21,5 +21,6 @@ SAP CRM, 7.01, 7.02,7.30, 7.31, 7.33, 7.54, allows an attacker to exploit insuff
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/developer3000S/PoC-in-GitHub
+- https://github.com/erpscanteam/CVE-2018-2380
- https://github.com/hectorgie/PoC-in-GitHub
diff --git a/2018/CVE-2018-2636.md b/2018/CVE-2018-2636.md
index fa58007b6f..439c638754 100644
--- a/2018/CVE-2018-2636.md
+++ b/2018/CVE-2018-2636.md
@@ -30,6 +30,7 @@ Vulnerability in the Oracle Hospitality Simphony component of Oracle Hospitality
- https://github.com/birdhan/Security_Product
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/eric-erki/awesome-honeypots
+- https://github.com/erpscanteam/CVE-2018-2636
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/investlab/Awesome-honeypots
- https://github.com/paralax/awesome-honeypots
diff --git a/2018/CVE-2018-3639.md b/2018/CVE-2018-3639.md
index 06c13bf2be..6d28c1f955 100644
--- a/2018/CVE-2018-3639.md
+++ b/2018/CVE-2018-3639.md
@@ -77,6 +77,7 @@ Systems with microprocessors utilizing speculative execution and speculative exe
- https://github.com/vintagesucks/awesome-stars
- https://github.com/vurtne/specter---meltdown--checker
- https://github.com/willyb321/willyb321-stars
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/yardenshafir/MitigationFlagsCliTool
diff --git a/2018/CVE-2018-5333.md b/2018/CVE-2018-5333.md
index ae81577c97..3ec3169bb1 100644
--- a/2018/CVE-2018-5333.md
+++ b/2018/CVE-2018-5333.md
@@ -17,6 +17,7 @@ In the Linux kernel through 4.14.13, the rds_cmsg_atomic function in net/rds/rdm
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Al1ex/LinuxEelvation
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/bcoles/kernel-exploits
- https://github.com/bsauce/kernel-exploit-factory
diff --git a/2018/CVE-2018-5353.md b/2018/CVE-2018-5353.md
index afd5e01536..5eb7dff1d6 100644
--- a/2018/CVE-2018-5353.md
+++ b/2018/CVE-2018-5353.md
@@ -16,4 +16,5 @@ The custom GINA/CP module in Zoho ManageEngine ADSelfService Plus before 5.5 bui
- https://github.com/0xT11/CVE-POC
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
+- https://github.com/missing0x00/CVE-2018-5353
diff --git a/2018/CVE-2018-5354.md b/2018/CVE-2018-5354.md
index 2199821b45..06efab86d4 100644
--- a/2018/CVE-2018-5354.md
+++ b/2018/CVE-2018-5354.md
@@ -16,4 +16,5 @@ The custom GINA/CP module in ANIXIS Password Reset Client before version 3.22 al
- https://github.com/0xT11/CVE-POC
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
+- https://github.com/missing0x00/CVE-2018-5354
diff --git a/2018/CVE-2018-5407.md b/2018/CVE-2018-5407.md
index d600eec3a7..4eafb3d8af 100644
--- a/2018/CVE-2018-5407.md
+++ b/2018/CVE-2018-5407.md
@@ -20,6 +20,7 @@ Simultaneous Multi-threading (SMT) in processors can enable local users to explo
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/bbbrumley/portsmash
- https://github.com/codexlynx/hardware-attacks-state-of-the-art
- https://github.com/djschleen/ash
- https://github.com/mrodden/vyger
diff --git a/2018/CVE-2018-5782.md b/2018/CVE-2018-5782.md
index a551e8bb4c..5b125b8030 100644
--- a/2018/CVE-2018-5782.md
+++ b/2018/CVE-2018-5782.md
@@ -14,4 +14,5 @@ A vulnerability in the conferencing component of Mitel Connect ONSITE, versions
- https://www.exploit-db.com/exploits/46174/
#### Github
+- https://github.com/twosevenzero/shoretel-mitel-rce
diff --git a/2018/CVE-2018-5951.md b/2018/CVE-2018-5951.md
index 4b4feeef8f..273d2984b9 100644
--- a/2018/CVE-2018-5951.md
+++ b/2018/CVE-2018-5951.md
@@ -14,6 +14,7 @@ An issue was discovered in Mikrotik RouterOS. Crafting a packet that has a size
#### Github
- https://github.com/0xT11/CVE-POC
+- https://github.com/Nat-Lab/CVE-2018-5951
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
diff --git a/2018/CVE-2018-5968.md b/2018/CVE-2018-5968.md
index 8b338a7cd0..eb75dfd8d9 100644
--- a/2018/CVE-2018-5968.md
+++ b/2018/CVE-2018-5968.md
@@ -17,6 +17,7 @@ FasterXML jackson-databind through 2.8.11 and 2.9.x through 2.9.3 allows unauthe
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
- https://github.com/FHGZS/jackson-rce-via-two-new-gadgets
+- https://github.com/LibHunter/LibHunter
- https://github.com/OneSourceCat/jackson-rce-via-two-new-gadgets
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs
- https://github.com/ilmari666/cybsec
diff --git a/2018/CVE-2018-6389.md b/2018/CVE-2018-6389.md
index 6f296a2577..13083335f3 100644
--- a/2018/CVE-2018-6389.md
+++ b/2018/CVE-2018-6389.md
@@ -58,6 +58,7 @@ In WordPress through 4.9.2, unauthenticated attackers can cause a denial of serv
- https://github.com/Tanvi20/Week-7-Alternative-Assignment-wp-cve
- https://github.com/TheBountyBox/Awesome-Writeups
- https://github.com/Tyro-Shan/gongkaishouji
+- https://github.com/WazeHell/CVE-2018-6389
- https://github.com/YIXINSHUWU/Penetration_Testing_POC
- https://github.com/YemiBeshe/Codepath-WP1
- https://github.com/ZTK-009/Penetration_PoC
diff --git a/2018/CVE-2018-6479.md b/2018/CVE-2018-6479.md
index 5c929d5fbd..da098c3b9e 100644
--- a/2018/CVE-2018-6479.md
+++ b/2018/CVE-2018-6479.md
@@ -16,5 +16,6 @@ An issue was discovered on Netwave IP Camera devices. An unauthenticated attacke
- https://github.com/0xT11/CVE-POC
- https://github.com/LeQuocKhanh2K/Tool_Camera_Exploit_Netwave_CVE-2018-6479
- https://github.com/developer3000S/PoC-in-GitHub
+- https://github.com/dreadlocked/netwave-dosvulnerability
- https://github.com/hectorgie/PoC-in-GitHub
diff --git a/2018/CVE-2018-6554.md b/2018/CVE-2018-6554.md
index 0af440be5d..b1a606d2fb 100644
--- a/2018/CVE-2018-6554.md
+++ b/2018/CVE-2018-6554.md
@@ -26,5 +26,6 @@ Memory leak in the irda_bind function in net/irda/af_irda.c and later in drivers
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2018/CVE-2018-6555.md b/2018/CVE-2018-6555.md
index 9717ce97a2..851ee84f08 100644
--- a/2018/CVE-2018-6555.md
+++ b/2018/CVE-2018-6555.md
@@ -26,5 +26,6 @@ The irda_setsockopt function in net/irda/af_irda.c and later in drivers/staging/
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ostrichxyz7/kexps
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2018/CVE-2018-6871.md b/2018/CVE-2018-6871.md
index ac196bc280..634a862ab6 100644
--- a/2018/CVE-2018-6871.md
+++ b/2018/CVE-2018-6871.md
@@ -16,6 +16,7 @@ LibreOffice before 5.4.5 and 6.x before 6.0.1 allows remote attackers to read ar
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/duckstroms/Web-CTF-Cheatsheet
+- https://github.com/jollheef/libreoffice-remote-arbitrary-file-disclosure
- https://github.com/lnick2023/nicenice
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/w181496/Web-CTF-Cheatsheet
diff --git a/2018/CVE-2018-6890.md b/2018/CVE-2018-6890.md
index e3e88d7fbe..31db2ab078 100644
--- a/2018/CVE-2018-6890.md
+++ b/2018/CVE-2018-6890.md
@@ -16,4 +16,5 @@ Cross-site scripting (XSS) vulnerability in Wolf CMS 0.8.3.1 via the page editin
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/hectorgie/PoC-in-GitHub
+- https://github.com/pradeepjairamani/WolfCMS-XSS-POC
diff --git a/2018/CVE-2018-6905.md b/2018/CVE-2018-6905.md
index 865ce73b91..95fbdd5ebe 100644
--- a/2018/CVE-2018-6905.md
+++ b/2018/CVE-2018-6905.md
@@ -16,4 +16,5 @@ The page module in TYPO3 before 8.7.11, and 9.1.0, has XSS via $GLOBALS['TYPO3_C
- https://github.com/0xT11/CVE-POC
- https://github.com/dnr6419/CVE-2018-6905
- https://github.com/hectorgie/PoC-in-GitHub
+- https://github.com/pradeepjairamani/TYPO3-XSS-POC
diff --git a/2018/CVE-2018-7490.md b/2018/CVE-2018-7490.md
index e2ced417b5..0401f25dcc 100644
--- a/2018/CVE-2018-7490.md
+++ b/2018/CVE-2018-7490.md
@@ -16,6 +16,7 @@ uWSGI before 2.0.17 mishandles a DOCUMENT_ROOT check during use of the --php-doc
- https://github.com/0ps/pocassistdb
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
+- https://github.com/CLincat/vulcat
- https://github.com/Elsfa7-110/kenzer-templates
- https://github.com/H4cking2theGate/TraversalHunter
- https://github.com/SexyBeast233/SecBooks
diff --git a/2018/CVE-2018-7600.md b/2018/CVE-2018-7600.md
index cb1d579412..5d76ba23eb 100644
--- a/2018/CVE-2018-7600.md
+++ b/2018/CVE-2018-7600.md
@@ -105,6 +105,7 @@ Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1
- https://github.com/YgorAlberto/ygoralberto.github.io
- https://github.com/Z0fhack/Goby_POC
- https://github.com/ZTK-009/RedTeamer
+- https://github.com/a2u/CVE-2018-7600
- https://github.com/alexfrancow/Exploits
- https://github.com/amitnandi04/Common-Vulnerability-Exposure-CVE-
- https://github.com/andrysec/PayloadsAllVulnerability
@@ -141,6 +142,7 @@ Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1
- https://github.com/fengjixuchui/RedTeamer
- https://github.com/firefart/CVE-2018-7600
- https://github.com/fyraiga/CVE-2018-7600-drupalgeddon2-scanner
+- https://github.com/g0rx/CVE-2018-7600-Drupal-RCE
- https://github.com/gameFace22/vulnmachine-walkthrough
- https://github.com/githubfoam/yara-sandbox
- https://github.com/gobysec/Goby
diff --git a/2018/CVE-2018-8036.md b/2018/CVE-2018-8036.md
index a8949767af..3bce5b2bf4 100644
--- a/2018/CVE-2018-8036.md
+++ b/2018/CVE-2018-8036.md
@@ -18,6 +18,7 @@ In Apache PDFBox 1.8.0 to 1.8.14 and 2.0.0RC1 to 2.0.10, a carefully crafted (or
- https://github.com/CGCL-codes/PHunter
- https://github.com/DennisFeldbusch/Fuzz
- https://github.com/GCFuzzer/SP2023
+- https://github.com/LibHunter/LibHunter
- https://github.com/hwen020/JQF
- https://github.com/jyi/JQF
- https://github.com/mfatima1/CS182
diff --git a/2018/CVE-2018-8037.md b/2018/CVE-2018-8037.md
index b6f5850475..3c27b16a0e 100644
--- a/2018/CVE-2018-8037.md
+++ b/2018/CVE-2018-8037.md
@@ -17,5 +17,6 @@ If an async request was completed by the application at the same time as the con
#### Github
- https://github.com/ilmari666/cybsec
- https://github.com/tomoyamachi/gocarts
+- https://github.com/versio-io/product-lifecycle-security-api
- https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
diff --git a/2018/CVE-2018-8060.md b/2018/CVE-2018-8060.md
index e7a2c7582e..e945370b8e 100644
--- a/2018/CVE-2018-8060.md
+++ b/2018/CVE-2018-8060.md
@@ -15,4 +15,5 @@ HWiNFO AMD64 Kernel driver version 8.98 and lower allows an unprivileged user to
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/hectorgie/PoC-in-GitHub
+- https://github.com/otavioarj/SIOCtl
diff --git a/2018/CVE-2018-8108.md b/2018/CVE-2018-8108.md
index 6908465210..d77daa1f4a 100644
--- a/2018/CVE-2018-8108.md
+++ b/2018/CVE-2018-8108.md
@@ -15,4 +15,5 @@ The select component in bui through 2018-03-13 has XSS because it performs an es
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/hectorgie/PoC-in-GitHub
+- https://github.com/zlgxzswjy/BUI-select-xss
diff --git a/2018/CVE-2018-8174.md b/2018/CVE-2018-8174.md
index a65407b869..a5d584410a 100644
--- a/2018/CVE-2018-8174.md
+++ b/2018/CVE-2018-8174.md
@@ -44,6 +44,7 @@ A remote code execution vulnerability exists in the way that the VBScript engine
- https://github.com/InQuest/yara-rules
- https://github.com/JERRY123S/all-poc
- https://github.com/KasperskyLab/VBscriptInternals
+- https://github.com/MN439/bingduziyuan
- https://github.com/MrTcsy/Exploit
- https://github.com/Ondrik8/RED-Team
- https://github.com/Ostorlab/KEV
diff --git a/2018/CVE-2018-8781.md b/2018/CVE-2018-8781.md
index 671f600d1e..d751cdece7 100644
--- a/2018/CVE-2018-8781.md
+++ b/2018/CVE-2018-8781.md
@@ -25,5 +25,6 @@ No PoCs from references.
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2018/CVE-2018-8821.md b/2018/CVE-2018-8821.md
index c2302d048e..5420b14cf9 100644
--- a/2018/CVE-2018-8821.md
+++ b/2018/CVE-2018-8821.md
@@ -13,4 +13,5 @@ windrvr1260.sys in Jungo DriverWizard WinDriver 12.6.0 allows attackers to cause
- https://github.com/bigric3/poc
#### Github
+- https://github.com/bigric3/poc
diff --git a/2018/CVE-2018-8941.md b/2018/CVE-2018-8941.md
index b17ac1c631..8c421122f8 100644
--- a/2018/CVE-2018-8941.md
+++ b/2018/CVE-2018-8941.md
@@ -14,5 +14,6 @@ Diagnostics functionality on D-Link DSL-3782 devices with firmware EU v. 1.01 ha
#### Github
- https://github.com/0xT11/CVE-POC
+- https://github.com/SECFORCE/CVE-2018-8941
- https://github.com/hectorgie/PoC-in-GitHub
diff --git a/2018/CVE-2018-9136.md b/2018/CVE-2018-9136.md
index afd30a9149..8428ed91f1 100644
--- a/2018/CVE-2018-9136.md
+++ b/2018/CVE-2018-9136.md
@@ -13,4 +13,5 @@ windrvr1260.sys in Jungo DriverWizard WinDriver 12.6.0 allows attackers to cause
- https://github.com/bigric3/poc2
#### Github
+- https://github.com/bigric3/poc2
diff --git a/2018/CVE-2018-9568.md b/2018/CVE-2018-9568.md
index 77aa89a2e8..7a79221cb9 100644
--- a/2018/CVE-2018-9568.md
+++ b/2018/CVE-2018-9568.md
@@ -26,5 +26,6 @@ No PoCs from references.
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2019/CVE-2019-0228.md b/2019/CVE-2019-0228.md
index d45ebf3554..48af31e1f1 100644
--- a/2019/CVE-2019-0228.md
+++ b/2019/CVE-2019-0228.md
@@ -18,6 +18,7 @@ Apache PDFBox 2.0.14 does not properly initialize the XML parser, which allows c
#### Github
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/bluesNbrews/SkillSearchEngine
- https://github.com/swilliams9671/SkillSearchEngine
diff --git a/2019/CVE-2019-0708.md b/2019/CVE-2019-0708.md
index c00aa02dcf..30cf712eff 100644
--- a/2019/CVE-2019-0708.md
+++ b/2019/CVE-2019-0708.md
@@ -326,6 +326,7 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly
- https://github.com/password520/RedTeamer
- https://github.com/pengusec/awesome-netsec-articles
- https://github.com/pentest-a2p2v/pentest-a2p2v-core
+- https://github.com/pg001001/deception-tech
- https://github.com/phant0n/PENTESTING-BIBLE
- https://github.com/pikpikcu/Pentest-Tools-Framework
- https://github.com/pravinsrc/NOTES-windows-kernel-links
diff --git a/2019/CVE-2019-10086.md b/2019/CVE-2019-10086.md
index 44885b6a56..8cf28fbe59 100644
--- a/2019/CVE-2019-10086.md
+++ b/2019/CVE-2019-10086.md
@@ -27,6 +27,7 @@ In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added wh
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
- https://github.com/IkerSaint/VULNAPP-vulnerable-app
+- https://github.com/LibHunter/LibHunter
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
diff --git a/2019/CVE-2019-10241.md b/2019/CVE-2019-10241.md
index 2b9cea5160..b559ebcc61 100644
--- a/2019/CVE-2019-10241.md
+++ b/2019/CVE-2019-10241.md
@@ -17,4 +17,5 @@ In Eclipse Jetty version 9.2.26 and older, 9.3.25 and older, and 9.4.15 and olde
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
- https://github.com/DonnumS/inf226Inchat
+- https://github.com/LibHunter/LibHunter
diff --git a/2019/CVE-2019-10246.md b/2019/CVE-2019-10246.md
index 702a4cf4a3..219e46da5f 100644
--- a/2019/CVE-2019-10246.md
+++ b/2019/CVE-2019-10246.md
@@ -21,4 +21,5 @@ In Eclipse Jetty version 9.2.27, 9.3.26, and 9.4.16, the server running on Windo
#### Github
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
diff --git a/2019/CVE-2019-10247.md b/2019/CVE-2019-10247.md
index ab0954afde..3a0f0ee753 100644
--- a/2019/CVE-2019-10247.md
+++ b/2019/CVE-2019-10247.md
@@ -23,4 +23,5 @@ In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.1
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
- https://github.com/DonnumS/inf226Inchat
+- https://github.com/LibHunter/LibHunter
diff --git a/2019/CVE-2019-10567.md b/2019/CVE-2019-10567.md
index bafac7e7e1..566b7943f8 100644
--- a/2019/CVE-2019-10567.md
+++ b/2019/CVE-2019-10567.md
@@ -25,5 +25,6 @@ There is a way to deceive the GPU kernel driver into thinking there is room in t
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/secmob/TiYunZong-An-Exploit-Chain-to-Remotely-Root-Modern-Android-Devices
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2019/CVE-2019-10655.md b/2019/CVE-2019-10655.md
index 15368a14da..772d16ee8b 100644
--- a/2019/CVE-2019-10655.md
+++ b/2019/CVE-2019-10655.md
@@ -17,4 +17,5 @@ Grandstream GAC2500 1.0.3.35, GXP2200 1.0.3.27, GVC3202 1.0.3.51, GXV3275 before
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/scarvell/grandstream_exploits
diff --git a/2019/CVE-2019-10656.md b/2019/CVE-2019-10656.md
index abd02a0ac4..5ba6c8a38d 100644
--- a/2019/CVE-2019-10656.md
+++ b/2019/CVE-2019-10656.md
@@ -14,4 +14,5 @@ Grandstream GWN7000 before 1.0.6.32 devices allow remote authenticated users to
- https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1
#### Github
+- https://github.com/scarvell/grandstream_exploits
diff --git a/2019/CVE-2019-10658.md b/2019/CVE-2019-10658.md
index 1444942ce0..f64e0ac465 100644
--- a/2019/CVE-2019-10658.md
+++ b/2019/CVE-2019-10658.md
@@ -14,4 +14,5 @@ Grandstream GWN7610 before 1.0.8.18 devices allow remote authenticated users to
- https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1
#### Github
+- https://github.com/scarvell/grandstream_exploits
diff --git a/2019/CVE-2019-10659.md b/2019/CVE-2019-10659.md
index 3fc2aa34fb..62cb2450d9 100644
--- a/2019/CVE-2019-10659.md
+++ b/2019/CVE-2019-10659.md
@@ -14,4 +14,5 @@ Grandstream GXV3370 before 1.0.1.41 and WP820 before 1.0.3.6 devices allow remot
- https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1
#### Github
+- https://github.com/scarvell/grandstream_exploits
diff --git a/2019/CVE-2019-10660.md b/2019/CVE-2019-10660.md
index 8f0ff55b03..2f86cd28e0 100644
--- a/2019/CVE-2019-10660.md
+++ b/2019/CVE-2019-10660.md
@@ -14,4 +14,5 @@ Grandstream GXV3611IR_HD before 1.0.3.23 devices allow remote authenticated user
- https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1
#### Github
+- https://github.com/scarvell/grandstream_exploits
diff --git a/2019/CVE-2019-10662.md b/2019/CVE-2019-10662.md
index 6afb297680..d49113b616 100644
--- a/2019/CVE-2019-10662.md
+++ b/2019/CVE-2019-10662.md
@@ -14,4 +14,5 @@ Grandstream UCM6204 before 1.0.19.20 devices allow remote authenticated users to
- https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1
#### Github
+- https://github.com/scarvell/grandstream_exploits
diff --git a/2019/CVE-2019-10936.md b/2019/CVE-2019-10936.md
index f2a101d92f..142b95a3ce 100644
--- a/2019/CVE-2019-10936.md
+++ b/2019/CVE-2019-10936.md
@@ -122,9 +122,7 @@
### Description
-A vulnerability has been identified in SIMATIC S7-400 CPU 414-3 PN/DP V7, SIMATIC S7-400 CPU 414F-3 PN/DP V7, SIMATIC S7-400 CPU 416-3 PN/DP V7, SIMATIC S7-400 CPU 416F-3 PN/DP V7, Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller, Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200, Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P, SIMATIC CFU PA, SIMATIC ET 200pro IM154-8 PN/DP CPU, SIMATIC ET 200pro IM154-8F PN/DP CPU, SIMATIC ET 200pro IM154-8FX PN/DP CPU, SIMATIC ET 200S IM151-8 PN/DP CPU, SIMATIC ET 200S IM151-8F PN/DP CPU, SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants), SIMATIC ET200AL, SIMATIC ET200ecoPN, 16DI, DC24V, 8xM12, SIMATIC ET200ecoPN, 16DO DC24V/1,3A, 8xM12, SIMATIC ET200ecoPN, 4AO U/I 4xM12, SIMATIC ET200ecoPN, 8 DIO, DC24V/1,3A, 8xM12, SIMATIC ET200ecoPN, 8 DO, DC24V/2A, 8xM12, SIMATIC ET200ecoPN, 8AI RTD/TC 8xM12, SIMATIC ET200ecoPN, 8AI; 4 U/I; 4 RTD/TC 8xM12, SIMATIC ET200ecoPN, 8DI, DC24V, 4xM12, SIMATIC ET200ecoPN, 8DI, DC24V, 8xM12, SIMATIC ET200ecoPN, 8DO, DC24V/0,5A, 4xM12, SIMATIC ET200ecoPN, 8DO, DC24V/1,3A, 4xM12, SIMATIC ET200ecoPN, 8DO, DC24V/1,3A, 8xM12, SIMATIC ET200ecoPN: IO-Link Master, SIMATIC ET200M (incl. SIPLUS variants), SIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants), SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants), SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants), SIMATIC ET200pro, SIMATIC ET200S (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants), SIMATIC HMI Comfort Outdoor Panels 7" & 15" (incl. SIPLUS variants), SIMATIC HMI Comfort Panels 4" - 22" (incl. SIPLUS variants), SIMATIC HMI KTP Mobile Panels, SIMATIC PN/PN Coupler, SIMATIC PROFINET Driver, SIMATIC S7-1200 CPU family (incl. SIPLUS variants), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants), SIMATIC S7-1500 Software Controller, SIMATIC S7-300 CPU 314C-2 PN/DP, SIMATIC S7-300 CPU 315-2 PN/DP, SIMATIC S7-300 CPU 315F-2 PN/DP, SIMATIC S7-300 CPU 315T-3 PN/DP, SIMATIC S7-300 CPU 317-2 PN/DP, SIMATIC S7-300 CPU 317F-2 PN/DP, SIMATIC S7-300 CPU 317T-3 PN/DP, SIMATIC S7-300 CPU 317TF-3 PN/DP, SIMATIC S7-300 CPU 319-3 PN/DP, SIMATIC S7-300 CPU 319F-3 PN/DP, SIMATIC S7-400 CPU 412-2 PN V7, SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants), SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants), SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants), SIMATIC TDC CP51M1, SIMATIC TDC CPU555, SIMATIC WinAC RTX 2010, SIMATIC WinAC RTX F 2010, SINAMICS DCM, SINAMICS DCP, SINAMICS G110M V4.7 PN Control Unit, SINAMICS G120 V4.7 PN Control Unit (incl. SIPLUS variants), SINAMICS G130 V4.7 Control Unit, SINAMICS G150 Control Unit, SINAMICS GH150 V4.7 Control Unit, SINAMICS GL150 V4.7 Control Unit, SINAMICS GM150 V4.7 Control Unit, SINAMICS S110 Control Unit, SINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants), SINAMICS S150 Control Unit, SINAMICS SL150 V4.7 Control Unit, SINAMICS SM120 V4.7 Control Unit, SINUMERIK 828D, SINUMERIK 840D sl, SIPLUS ET 200S IM151-8 PN/DP CPU, SIPLUS ET 200S IM151-8F PN/DP CPU, SIPLUS NET PN/PN Coupler, SIPLUS S7-300 CPU 314C-2 PN/DP, SIPLUS S7-300 CPU 315-2 PN/DP, SIPLUS S7-300 CPU 315F-2 PN/DP, SIPLUS S7-300 CPU 317-2 PN/DP, SIPLUS S7-300 CPU 317F-2 PN/DP, SIPLUS S7-400 CPU 414-3 PN/DP V7, SIPLUS S7-400 CPU 416-3 PN/DP V7. Affected devices improperly handle large amounts of specially crafted UDP packets.
-
-This could allow an unauthenticated remote attacker to trigger a denial of service condition.
+A vulnerability has been identified in SIMATIC S7-400 CPU 414-3 PN/DP V7, SIMATIC S7-400 CPU 414F-3 PN/DP V7, SIMATIC S7-400 CPU 416-3 PN/DP V7, SIMATIC S7-400 CPU 416F-3 PN/DP V7, Development/Evaluation Kits for PROFINET IO: DK Standard Ethernet Controller, Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200, Development/Evaluation Kits for PROFINET IO: EK-ERTEC 200P, SIMATIC CFU PA, SIMATIC ET 200pro IM154-8 PN/DP CPU, SIMATIC ET 200pro IM154-8F PN/DP CPU, SIMATIC ET 200pro IM154-8FX PN/DP CPU, SIMATIC ET 200S IM151-8 PN/DP CPU, SIMATIC ET 200S IM151-8F PN/DP CPU, SIMATIC ET 200SP Open Controller CPU 1515SP PC (incl. SIPLUS variants), SIMATIC ET200AL, SIMATIC ET200ecoPN, 16DI, DC24V, 8xM12, SIMATIC ET200ecoPN, 16DO DC24V/1,3A, 8xM12, SIMATIC ET200ecoPN, 4AO U/I 4xM12, SIMATIC ET200ecoPN, 8 DIO, DC24V/1,3A, 8xM12, SIMATIC ET200ecoPN, 8 DO, DC24V/2A, 8xM12, SIMATIC ET200ecoPN, 8AI RTD/TC 8xM12, SIMATIC ET200ecoPN, 8AI; 4 U/I; 4 RTD/TC 8xM12, SIMATIC ET200ecoPN, 8DI, DC24V, 4xM12, SIMATIC ET200ecoPN, 8DI, DC24V, 8xM12, SIMATIC ET200ecoPN, 8DO, DC24V/0,5A, 4xM12, SIMATIC ET200ecoPN, 8DO, DC24V/1,3A, 4xM12, SIMATIC ET200ecoPN, 8DO, DC24V/1,3A, 8xM12, SIMATIC ET200ecoPN: IO-Link Master, SIMATIC ET200M (incl. SIPLUS variants), SIMATIC ET200MP IM155-5 PN BA (incl. SIPLUS variants), SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants), SIMATIC ET200MP IM155-5 PN ST (incl. SIPLUS variants), SIMATIC ET200pro, SIMATIC ET200S (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN BA (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HS (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN ST (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants), SIMATIC HMI Comfort Outdoor Panels 7" & 15" (incl. SIPLUS variants), SIMATIC HMI Comfort Panels 4" - 22" (incl. SIPLUS variants), SIMATIC HMI KTP Mobile Panels, SIMATIC PN/PN Coupler, SIMATIC PROFINET Driver, SIMATIC S7-1200 CPU family (incl. SIPLUS variants), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants), SIMATIC S7-1500 Software Controller, SIMATIC S7-300 CPU 314C-2 PN/DP, SIMATIC S7-300 CPU 315-2 PN/DP, SIMATIC S7-300 CPU 315F-2 PN/DP, SIMATIC S7-300 CPU 315T-3 PN/DP, SIMATIC S7-300 CPU 317-2 PN/DP, SIMATIC S7-300 CPU 317F-2 PN/DP, SIMATIC S7-300 CPU 317T-3 PN/DP, SIMATIC S7-300 CPU 317TF-3 PN/DP, SIMATIC S7-300 CPU 319-3 PN/DP, SIMATIC S7-300 CPU 319F-3 PN/DP, SIMATIC S7-400 CPU 412-2 PN V7, SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants), SIMATIC S7-400 PN/DP V6 and below CPU family (incl. SIPLUS variants), SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants), SIMATIC TDC CP51M1, SIMATIC TDC CPU555, SIMATIC WinAC RTX 2010, SIMATIC WinAC RTX F 2010, SINAMICS DCM, SINAMICS DCP, SINAMICS G110M V4.7 PN Control Unit, SINAMICS G120 V4.7 PN Control Unit (incl. SIPLUS variants), SINAMICS G130 V4.7 Control Unit, SINAMICS G150 Control Unit, SINAMICS GH150 V4.7 Control Unit, SINAMICS GL150 V4.7 Control Unit, SINAMICS GM150 V4.7 Control Unit, SINAMICS S110 Control Unit, SINAMICS S120 V4.7 Control Unit (incl. SIPLUS variants), SINAMICS S150 Control Unit, SINAMICS SL150 V4.7 Control Unit, SINAMICS SM120 V4.7 Control Unit, SINUMERIK 828D, SINUMERIK 840D sl, SIPLUS ET 200S IM151-8 PN/DP CPU, SIPLUS ET 200S IM151-8F PN/DP CPU, SIPLUS NET PN/PN Coupler, SIPLUS S7-300 CPU 314C-2 PN/DP, SIPLUS S7-300 CPU 315-2 PN/DP, SIPLUS S7-300 CPU 315F-2 PN/DP, SIPLUS S7-300 CPU 317-2 PN/DP, SIPLUS S7-300 CPU 317F-2 PN/DP, SIPLUS S7-400 CPU 414-3 PN/DP V7, SIPLUS S7-400 CPU 416-3 PN/DP V7. Affected devices improperly handle large amounts of specially crafted UDP packets.
This could allow an unauthenticated remote attacker to trigger a denial of service condition.
### POC
diff --git a/2019/CVE-2019-11076.md b/2019/CVE-2019-11076.md
index b76b7c17d0..0bc28cce87 100644
--- a/2019/CVE-2019-11076.md
+++ b/2019/CVE-2019-11076.md
@@ -16,4 +16,5 @@ Cribl UI 1.5.0 allows remote attackers to run arbitrary commands via an unauthen
- https://github.com/0xT11/CVE-POC
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
+- https://github.com/livehybrid/poc-cribl-rce
diff --git a/2019/CVE-2019-11190.md b/2019/CVE-2019-11190.md
index b31859da88..adc270b856 100644
--- a/2019/CVE-2019-11190.md
+++ b/2019/CVE-2019-11190.md
@@ -26,5 +26,6 @@ The Linux kernel before 4.8 allows local users to bypass ASLR on setuid programs
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2019/CVE-2019-11358.md b/2019/CVE-2019-11358.md
index 7069cbc32a..b9d93765c0 100644
--- a/2019/CVE-2019-11358.md
+++ b/2019/CVE-2019-11358.md
@@ -150,6 +150,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan
- https://github.com/6165-MSET-CuttleFish/PowerPlay
- https://github.com/6165-MSET-CuttleFish/SHS_Swerve_Offseason
- https://github.com/6369Designosars/Summer_Software_6.2
+- https://github.com/6427FTCRobotics/centerstage6427
- https://github.com/731WannabeeStrange/FTC-731-Powerplay
- https://github.com/731WannabeeStrange/centerstage-731
- https://github.com/7390jellyfish/software
@@ -1022,6 +1023,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan
- https://github.com/FTCTeam21217/AutonomousWorkshop
- https://github.com/FTCTeam7610-Software/7610-Software-Version-7.1
- https://github.com/FTCTeam7610-Software/7610Software-7.1
+- https://github.com/FTCclueless/Centerstage
- https://github.com/FUTURE-FTC10366/FTCFreightFrenzy-2021-22
- https://github.com/FaltechFTC/FtcRobotController2122
- https://github.com/Feyorsh/PASC-FTC-robotCode
@@ -1234,6 +1236,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan
- https://github.com/Indubitably8/Bot24Update
- https://github.com/Indubitably8/JakeBot
- https://github.com/Indubitably8/JakeBot24
+- https://github.com/Infernal-Industries/AprilTagTesting
- https://github.com/Infidge/LeagueMeetsBot
- https://github.com/InfinityTechRobotics/IT_2022_Summer_Learning
- https://github.com/Infinitybeond1/RobotCode
@@ -1429,6 +1432,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan
- https://github.com/LenickTan/UltimateGoalCode
- https://github.com/LenickTan/ultgoal
- https://github.com/LeoMavri/RO109-Homosapiens
+- https://github.com/LeozinDaProgramacao/TechZeusCenterstage2023-2024
- https://github.com/LiBaoJake/ftcrobotcontrol
- https://github.com/LiamWalker01/CrowForce22-23
- https://github.com/LiamWalker01/CrowForce22-23-RobotController8.1.1
@@ -1721,6 +1725,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan
- https://github.com/OverlakeRobotics/Nocturnal-2020-Ultimate-Goal
- https://github.com/OverlakeRobotics/OverlakeFTC-2023-7330
- https://github.com/OverripeBanana/9894_Robolions
+- https://github.com/Overture-7421/Hayabusa-2024
- https://github.com/Overture-7421/HayabusaRobotCode_23619
- https://github.com/Owen-Pryga/FtcRobotController_UltamateGoal
- https://github.com/Owen383/WM20
@@ -2062,6 +2067,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan
- https://github.com/Skywalker934/PowerPlay
- https://github.com/Skywalker934/video-tutorial
- https://github.com/Slipperee-CODE/4625---FTC---POWERPLAY
+- https://github.com/Slipperee-CODE/4625-FTC-CenterStage
- https://github.com/Slipperee-CODE/4625-FTC-CenterStage2023-2024
- https://github.com/Slipperee-CODE/4625-FTC-Offseason
- https://github.com/Slipshodleaf74/Freight-Frenzy
@@ -2216,6 +2222,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan
- https://github.com/The-Founders-Academy/2023-Test-Robot
- https://github.com/The-Founders-Academy/2024-Centerstage
- https://github.com/The-Founders-Academy/2024-Centerstage-Archived
+- https://github.com/The-Founders-Academy/shared-code
- https://github.com/The-Innovation-Story/FreightFrenzy_FTC
- https://github.com/The-Knights-of-Ni/Skystone2020
- https://github.com/The-Knights-of-Ni/UltimateGoal2021_6.2
@@ -2962,6 +2969,7 @@ jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishan
- https://github.com/frc4039/ftc2024
- https://github.com/frc5050/FTC7901-2021
- https://github.com/frc5050/FTC7902-2021
+- https://github.com/frc6606/ftc-2024
- https://github.com/frc7787/FTC-2023-Robot
- https://github.com/frc7787/FTC-Centerstage
- https://github.com/frc7787/FTC_AndroidStudio2023
diff --git a/2019/CVE-2019-11510.md b/2019/CVE-2019-11510.md
index f1226e223e..eb0f893264 100644
--- a/2019/CVE-2019-11510.md
+++ b/2019/CVE-2019-11510.md
@@ -67,6 +67,7 @@ In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7
- https://github.com/dnif/content
- https://github.com/es0/CVE-2019-11510_poc
- https://github.com/fengjixuchui/RedTeamer
+- https://github.com/fierceoj/ShonyDanza
- https://github.com/gquere/PulseSecure_session_hijacking
- https://github.com/hasee2018/Penetration_Testing_POC
- https://github.com/hectorgie/PoC-in-GitHub
diff --git a/2019/CVE-2019-11523.md b/2019/CVE-2019-11523.md
index e88f0f7f96..b34baee75e 100644
--- a/2019/CVE-2019-11523.md
+++ b/2019/CVE-2019-11523.md
@@ -16,4 +16,5 @@ Anviz Global M3 Outdoor RFID Access Control executes any command received from a
- https://github.com/0xT11/CVE-POC
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
+- https://github.com/wizlab-it/anviz-m3-rfid-cve-2019-11523-poc
diff --git a/2019/CVE-2019-11606.md b/2019/CVE-2019-11606.md
index a816002f60..f37c823501 100644
--- a/2019/CVE-2019-11606.md
+++ b/2019/CVE-2019-11606.md
@@ -13,4 +13,5 @@ doorGets 7.0 has a sensitive information disclosure vulnerability in /fileman/ph
- https://github.com/itodaro/doorGets_cve
#### Github
+- https://github.com/itodaro/doorGets_cve
diff --git a/2019/CVE-2019-11607.md b/2019/CVE-2019-11607.md
index ebfb292c44..b806892a73 100644
--- a/2019/CVE-2019-11607.md
+++ b/2019/CVE-2019-11607.md
@@ -13,4 +13,5 @@ doorGets 7.0 has a sensitive information disclosure vulnerability in /fileman/ph
- https://github.com/itodaro/doorGets_cve
#### Github
+- https://github.com/itodaro/doorGets_cve
diff --git a/2019/CVE-2019-11608.md b/2019/CVE-2019-11608.md
index cae9f7bede..1570a20013 100644
--- a/2019/CVE-2019-11608.md
+++ b/2019/CVE-2019-11608.md
@@ -13,4 +13,5 @@ doorGets 7.0 has a sensitive information disclosure vulnerability in /fileman/ph
- https://github.com/itodaro/doorGets_cve
#### Github
+- https://github.com/itodaro/doorGets_cve
diff --git a/2019/CVE-2019-11609.md b/2019/CVE-2019-11609.md
index 2bb3572e9c..b6c843a3eb 100644
--- a/2019/CVE-2019-11609.md
+++ b/2019/CVE-2019-11609.md
@@ -13,4 +13,5 @@ doorGets 7.0 has a sensitive information disclosure vulnerability in /fileman/ph
- https://github.com/itodaro/doorGets_cve
#### Github
+- https://github.com/itodaro/doorGets_cve
diff --git a/2019/CVE-2019-11610.md b/2019/CVE-2019-11610.md
index 21b8602bff..ba7ec5bdff 100644
--- a/2019/CVE-2019-11610.md
+++ b/2019/CVE-2019-11610.md
@@ -13,4 +13,5 @@ doorGets 7.0 has a sensitive information disclosure vulnerability in /fileman/ph
- https://github.com/itodaro/doorGets_cve
#### Github
+- https://github.com/itodaro/doorGets_cve
diff --git a/2019/CVE-2019-11611.md b/2019/CVE-2019-11611.md
index 5b1bbd5fa2..fc0af97159 100644
--- a/2019/CVE-2019-11611.md
+++ b/2019/CVE-2019-11611.md
@@ -13,4 +13,5 @@ doorGets 7.0 has a sensitive information disclosure vulnerability in /fileman/ph
- https://github.com/itodaro/doorGets_cve
#### Github
+- https://github.com/itodaro/doorGets_cve
diff --git a/2019/CVE-2019-11612.md b/2019/CVE-2019-11612.md
index 455999ec41..3d191990fc 100644
--- a/2019/CVE-2019-11612.md
+++ b/2019/CVE-2019-11612.md
@@ -13,4 +13,5 @@ doorGets 7.0 has an arbitrary file deletion vulnerability in /fileman/php/delete
- https://github.com/itodaro/doorGets_cve
#### Github
+- https://github.com/itodaro/doorGets_cve
diff --git a/2019/CVE-2019-11613.md b/2019/CVE-2019-11613.md
index bbc8ca92e2..45c69678bd 100644
--- a/2019/CVE-2019-11613.md
+++ b/2019/CVE-2019-11613.md
@@ -13,4 +13,5 @@ doorGets 7.0 has a SQL injection vulnerability in /doorgets/app/views/ajax/conta
- https://github.com/itodaro/doorGets_cve
#### Github
+- https://github.com/itodaro/doorGets_cve
diff --git a/2019/CVE-2019-11614.md b/2019/CVE-2019-11614.md
index a3fd05967b..fecd90b488 100644
--- a/2019/CVE-2019-11614.md
+++ b/2019/CVE-2019-11614.md
@@ -13,4 +13,5 @@ doorGets 7.0 has a SQL injection vulnerability in /doorgets/app/views/ajax/comme
- https://github.com/itodaro/doorGets_cve
#### Github
+- https://github.com/itodaro/doorGets_cve
diff --git a/2019/CVE-2019-11615.md b/2019/CVE-2019-11615.md
index 602277fc8b..db0cba927d 100644
--- a/2019/CVE-2019-11615.md
+++ b/2019/CVE-2019-11615.md
@@ -13,4 +13,5 @@
- https://github.com/itodaro/doorGets_cve
#### Github
+- https://github.com/itodaro/doorGets_cve
diff --git a/2019/CVE-2019-11616.md b/2019/CVE-2019-11616.md
index f222b4b06b..4d9147aeea 100644
--- a/2019/CVE-2019-11616.md
+++ b/2019/CVE-2019-11616.md
@@ -13,4 +13,5 @@ doorGets 7.0 has a sensitive information disclosure vulnerability in /setup/temp
- https://github.com/itodaro/doorGets_cve
#### Github
+- https://github.com/itodaro/doorGets_cve
diff --git a/2019/CVE-2019-11617.md b/2019/CVE-2019-11617.md
index 218e035726..1c3d46361a 100644
--- a/2019/CVE-2019-11617.md
+++ b/2019/CVE-2019-11617.md
@@ -13,4 +13,5 @@ doorGets 7.0 has a CSRF vulnerability in /doorgets/app/requests/user/configurati
- https://github.com/itodaro/doorGets_cve
#### Github
+- https://github.com/itodaro/doorGets_cve
diff --git a/2019/CVE-2019-11618.md b/2019/CVE-2019-11618.md
index 72f715a88f..d6caaf5588 100644
--- a/2019/CVE-2019-11618.md
+++ b/2019/CVE-2019-11618.md
@@ -13,4 +13,5 @@ doorGets 7.0 has a default administrator credential vulnerability. A remote atta
- https://github.com/itodaro/doorGets_cve
#### Github
+- https://github.com/itodaro/doorGets_cve
diff --git a/2019/CVE-2019-11619.md b/2019/CVE-2019-11619.md
index 9edb812145..5f8f31bee2 100644
--- a/2019/CVE-2019-11619.md
+++ b/2019/CVE-2019-11619.md
@@ -13,4 +13,5 @@ doorGets 7.0 has a SQL injection vulnerability in /doorgets/app/requests/user/co
- https://github.com/itodaro/doorGets_cve
#### Github
+- https://github.com/itodaro/doorGets_cve
diff --git a/2019/CVE-2019-11620.md b/2019/CVE-2019-11620.md
index e5237ff07e..ecaa52555b 100644
--- a/2019/CVE-2019-11620.md
+++ b/2019/CVE-2019-11620.md
@@ -13,4 +13,5 @@ doorGets 7.0 has a SQL injection vulnerability in /doorgets/app/requests/user/mo
- https://github.com/itodaro/doorGets_cve
#### Github
+- https://github.com/itodaro/doorGets_cve
diff --git a/2019/CVE-2019-11621.md b/2019/CVE-2019-11621.md
index d54b12a3e3..dc2eee79a7 100644
--- a/2019/CVE-2019-11621.md
+++ b/2019/CVE-2019-11621.md
@@ -13,4 +13,5 @@ doorGets 7.0 has a SQL injection vulnerability in /doorgets/app/requests/user/co
- https://github.com/itodaro/doorGets_cve
#### Github
+- https://github.com/itodaro/doorGets_cve
diff --git a/2019/CVE-2019-11622.md b/2019/CVE-2019-11622.md
index 54f37b9b54..a7ef36af45 100644
--- a/2019/CVE-2019-11622.md
+++ b/2019/CVE-2019-11622.md
@@ -13,4 +13,5 @@ doorGets 7.0 has a SQL injection vulnerability in /doorgets/app/requests/user/mo
- https://github.com/itodaro/doorGets_cve
#### Github
+- https://github.com/itodaro/doorGets_cve
diff --git a/2019/CVE-2019-11623.md b/2019/CVE-2019-11623.md
index 65c6c1bbe3..b7a0de8f58 100644
--- a/2019/CVE-2019-11623.md
+++ b/2019/CVE-2019-11623.md
@@ -13,4 +13,5 @@ doorGets 7.0 has a SQL injection vulnerability in /doorgets/app/requests/user/co
- https://github.com/itodaro/doorGets_cve
#### Github
+- https://github.com/itodaro/doorGets_cve
diff --git a/2019/CVE-2019-11624.md b/2019/CVE-2019-11624.md
index f3a2c5374e..8759de66c5 100644
--- a/2019/CVE-2019-11624.md
+++ b/2019/CVE-2019-11624.md
@@ -13,4 +13,5 @@ doorGets 7.0 has an arbitrary file deletion vulnerability in /doorgets/app/reque
- https://github.com/itodaro/doorGets_cve
#### Github
+- https://github.com/itodaro/doorGets_cve
diff --git a/2019/CVE-2019-11625.md b/2019/CVE-2019-11625.md
index f63b217bf2..40ce793f16 100644
--- a/2019/CVE-2019-11625.md
+++ b/2019/CVE-2019-11625.md
@@ -13,4 +13,5 @@ doorGets 7.0 has a SQL injection vulnerability in /doorgets/app/requests/user/em
- https://github.com/itodaro/doorGets_cve
#### Github
+- https://github.com/itodaro/doorGets_cve
diff --git a/2019/CVE-2019-11626.md b/2019/CVE-2019-11626.md
index 0cd7f4bc5d..7490e54316 100644
--- a/2019/CVE-2019-11626.md
+++ b/2019/CVE-2019-11626.md
@@ -13,4 +13,5 @@ routers/ajaxRouter.php in doorGets 7.0 has a web site physical path leakage vuln
- https://github.com/itodaro/doorGets_cve
#### Github
+- https://github.com/itodaro/doorGets_cve
diff --git a/2019/CVE-2019-11881.md b/2019/CVE-2019-11881.md
index 96226c5b8b..340a09a02f 100644
--- a/2019/CVE-2019-11881.md
+++ b/2019/CVE-2019-11881.md
@@ -15,6 +15,7 @@ A vulnerability exists in Rancher 2.1.4 in the login component, where the errorM
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/MauroEldritch/VanCleef
- https://github.com/MauroEldritch/mauroeldritch
- https://github.com/anquanscan/sec-tools
- https://github.com/developer3000S/PoC-in-GitHub
diff --git a/2019/CVE-2019-12042.md b/2019/CVE-2019-12042.md
index ea718d5a73..7f592c1107 100644
--- a/2019/CVE-2019-12042.md
+++ b/2019/CVE-2019-12042.md
@@ -13,5 +13,6 @@ Insecure permissions of the section object Global\PandaDevicesAgentSharedMemory
- https://github.com/SouhailHammou/Panda-Antivirus-LPE
#### Github
+- https://github.com/SouhailHammou/Panda-Antivirus-LPE
- https://github.com/alphaSeclab/sec-daily-2019
diff --git a/2019/CVE-2019-12086.md b/2019/CVE-2019-12086.md
index 8656066948..b6f02be927 100644
--- a/2019/CVE-2019-12086.md
+++ b/2019/CVE-2019-12086.md
@@ -25,6 +25,7 @@ A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x befo
- https://github.com/Al1ex/CVE-2019-12086
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/SimoLin/CVE-2019-12086-jackson-databind-file-read
- https://github.com/SugarP1g/LearningSecurity
- https://github.com/codeplutos/CVE-2019-12086-jackson-databind-file-read
diff --git a/2019/CVE-2019-12169.md b/2019/CVE-2019-12169.md
index 90d6e5ba2b..04b011472e 100644
--- a/2019/CVE-2019-12169.md
+++ b/2019/CVE-2019-12169.md
@@ -20,6 +20,7 @@ ATutor 2.2.4 allows Arbitrary File Upload and Directory Traversal, resulting in
- https://github.com/SexyBeast233/SecBooks
- https://github.com/anquanscan/sec-tools
- https://github.com/developer3000S/PoC-in-GitHub
+- https://github.com/fuzzlove/ATutor-2.2.4-Language-Exploit
- https://github.com/fuzzlove/ATutor-Instructor-Backup-Arbitrary-File
- https://github.com/hectorgie/PoC-in-GitHub
diff --git a/2019/CVE-2019-12170.md b/2019/CVE-2019-12170.md
index 8b6c20cc8a..4d241c45b1 100644
--- a/2019/CVE-2019-12170.md
+++ b/2019/CVE-2019-12170.md
@@ -19,5 +19,6 @@ ATutor through 2.2.4 is vulnerable to arbitrary file uploads via the mods/_core/
- https://github.com/anquanscan/sec-tools
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/fuzzlove/ATutor-2.2.4-Language-Exploit
+- https://github.com/fuzzlove/ATutor-Instructor-Backup-Arbitrary-File
- https://github.com/hectorgie/PoC-in-GitHub
diff --git a/2019/CVE-2019-12402.md b/2019/CVE-2019-12402.md
index 514506e400..adcaf41eb7 100644
--- a/2019/CVE-2019-12402.md
+++ b/2019/CVE-2019-12402.md
@@ -22,4 +22,5 @@ The file name encoding algorithm used internally in Apache Commons Compress 1.15
#### Github
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
diff --git a/2019/CVE-2019-12418.md b/2019/CVE-2019-12418.md
index 7cc2d8b7d4..4bf8bfc089 100644
--- a/2019/CVE-2019-12418.md
+++ b/2019/CVE-2019-12418.md
@@ -15,5 +15,6 @@ When Apache Tomcat 9.0.0.M1 to 9.0.28, 8.5.0 to 8.5.47, 7.0.0 and 7.0.97 is conf
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/raner/projo
+- https://github.com/versio-io/product-lifecycle-security-api
- https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
diff --git a/2019/CVE-2019-12476.md b/2019/CVE-2019-12476.md
index 77a675183b..d9b6ceae22 100644
--- a/2019/CVE-2019-12476.md
+++ b/2019/CVE-2019-12476.md
@@ -13,6 +13,7 @@ An authentication bypass vulnerability in the password reset functionality in Zo
- https://github.com/0katz/CVE-2019-12476
#### Github
+- https://github.com/0katz/CVE-2019-12476
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
- https://github.com/developer3000S/PoC-in-GitHub
diff --git a/2019/CVE-2019-12586.md b/2019/CVE-2019-12586.md
index 1a7634bae9..554d35a529 100644
--- a/2019/CVE-2019-12586.md
+++ b/2019/CVE-2019-12586.md
@@ -22,6 +22,7 @@ The EAP peer implementation in Espressif ESP-IDF 2.0.0 through 4.0.0 and ESP8266
- https://github.com/CVEDB/top
- https://github.com/GhostTroops/TOP
- https://github.com/JERRY123S/all-poc
+- https://github.com/Matheus-Garbelini/esp32_esp8266_attacks
- https://github.com/armancs12/esp32_esp8266_attacks
- https://github.com/armancswork/esp32_esp8266_attacks
- https://github.com/armancwork/esp32_esp8266_attacks
diff --git a/2019/CVE-2019-12587.md b/2019/CVE-2019-12587.md
index 13ac6dc5eb..a71e02050c 100644
--- a/2019/CVE-2019-12587.md
+++ b/2019/CVE-2019-12587.md
@@ -21,6 +21,7 @@ The EAP peer implementation in Espressif ESP-IDF 2.0.0 through 4.0.0 and ESP8266
- https://github.com/CVEDB/top
- https://github.com/GhostTroops/TOP
- https://github.com/JERRY123S/all-poc
+- https://github.com/Matheus-Garbelini/esp32_esp8266_attacks
- https://github.com/armancs12/esp32_esp8266_attacks
- https://github.com/armancswork/esp32_esp8266_attacks
- https://github.com/armancwork/esp32_esp8266_attacks
diff --git a/2019/CVE-2019-12588.md b/2019/CVE-2019-12588.md
index d7caeb221b..f3c54de76f 100644
--- a/2019/CVE-2019-12588.md
+++ b/2019/CVE-2019-12588.md
@@ -21,6 +21,7 @@ The client 802.11 mac implementation in Espressif ESP8266_NONOS_SDK 2.2.0 throug
- https://github.com/CVEDB/top
- https://github.com/GhostTroops/TOP
- https://github.com/JERRY123S/all-poc
+- https://github.com/Matheus-Garbelini/esp32_esp8266_attacks
- https://github.com/armancs12/esp32_esp8266_attacks
- https://github.com/armancswork/esp32_esp8266_attacks
- https://github.com/armancwork/esp32_esp8266_attacks
diff --git a/2019/CVE-2019-12813.md b/2019/CVE-2019-12813.md
index c50932912b..0752796151 100644
--- a/2019/CVE-2019-12813.md
+++ b/2019/CVE-2019-12813.md
@@ -15,4 +15,5 @@ An issue was discovered in Digital Persona U.are.U 4500 Fingerprint Reader v24.
- https://www.youtube.com/watch?v=wEXJDyEOatM
#### Github
+- https://github.com/sungjungk/fp-scanner-hacking
diff --git a/2019/CVE-2019-12814.md b/2019/CVE-2019-12814.md
index 519e9c0d94..9482db4702 100644
--- a/2019/CVE-2019-12814.md
+++ b/2019/CVE-2019-12814.md
@@ -21,6 +21,7 @@ A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x thro
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/BorderTech/java-common
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/SexyBeast233/SecBooks
- https://github.com/SugarP1g/LearningSecurity
- https://github.com/developer3000S/PoC-in-GitHub
diff --git a/2019/CVE-2019-12949.md b/2019/CVE-2019-12949.md
index bcba691133..5d8489dffd 100644
--- a/2019/CVE-2019-12949.md
+++ b/2019/CVE-2019-12949.md
@@ -16,4 +16,5 @@ In pfSense 2.4.4-p2 and 2.4.4-p3, if it is possible to trick an authenticated ad
- https://github.com/0xT11/CVE-POC
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
+- https://github.com/tarantula-team/CVE-2019-12949
diff --git a/2019/CVE-2019-13272.md b/2019/CVE-2019-13272.md
index 51986c9e3f..a594161a7a 100644
--- a/2019/CVE-2019-13272.md
+++ b/2019/CVE-2019-13272.md
@@ -45,6 +45,7 @@ In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the
- https://github.com/H0j3n/EzpzCheatSheet
- https://github.com/H1CH444MREB0RN/PenTest-free-tools
- https://github.com/HaleyWei/POC-available
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/Huandtx/CVE-2019-13272
- https://github.com/ImranTheThirdEye/AD-Pentesting-Tools
- https://github.com/JERRY123S/all-poc
diff --git a/2019/CVE-2019-13288.md b/2019/CVE-2019-13288.md
index 1ac21cb09f..f2f11892e6 100644
--- a/2019/CVE-2019-13288.md
+++ b/2019/CVE-2019-13288.md
@@ -18,6 +18,7 @@ No PoCs from references.
- https://github.com/Fineas/CVE-2019-13288-POC
- https://github.com/asur4s/blog
- https://github.com/asur4s/fuzzing
+- https://github.com/ch1hyun/fuzzing-class
- https://github.com/chiehw/fuzzing
- https://github.com/gleaming0/CVE-2019-13288
diff --git a/2019/CVE-2019-13603.md b/2019/CVE-2019-13603.md
index 7673c8ec92..30e6af6e29 100644
--- a/2019/CVE-2019-13603.md
+++ b/2019/CVE-2019-13603.md
@@ -15,4 +15,5 @@ An issue was discovered in the HID Global DigitalPersona (formerly Crossmatch) U
- https://www.youtube.com/watch?v=wEXJDyEOatM
#### Github
+- https://github.com/sungjungk/fp-scanner-hacking
diff --git a/2019/CVE-2019-13604.md b/2019/CVE-2019-13604.md
index 73c50bac2f..1390a48fe9 100644
--- a/2019/CVE-2019-13604.md
+++ b/2019/CVE-2019-13604.md
@@ -15,4 +15,5 @@ There is a short key vulnerability in HID Global DigitalPersona (formerly Crossm
- https://www.youtube.com/watch?v=BwYK_xZlKi4
#### Github
+- https://github.com/sungjungk/fp-img-key-crack
diff --git a/2019/CVE-2019-13633.md b/2019/CVE-2019-13633.md
index 3310da3bdb..6385b2da50 100644
--- a/2019/CVE-2019-13633.md
+++ b/2019/CVE-2019-13633.md
@@ -13,6 +13,7 @@ Blinger.io v.1.0.2519 is vulnerable to Blind/Persistent XSS. An attacker can sen
- https://github.com/Security-AVS/CVE-2019-13633
#### Github
+- https://github.com/Security-AVS/CVE-2019-13633
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
diff --git a/2019/CVE-2019-13636.md b/2019/CVE-2019-13636.md
index 129d9e8ee9..5f2af689ca 100644
--- a/2019/CVE-2019-13636.md
+++ b/2019/CVE-2019-13636.md
@@ -15,4 +15,5 @@ In GNU patch through 2.7.6, the following of symlinks is mishandled in certain c
- https://seclists.org/bugtraq/2019/Aug/29
#### Github
+- https://github.com/irsl/gnu-patch-vulnerabilities
diff --git a/2019/CVE-2019-13638.md b/2019/CVE-2019-13638.md
index 175049bee7..43e6f2be49 100644
--- a/2019/CVE-2019-13638.md
+++ b/2019/CVE-2019-13638.md
@@ -15,4 +15,5 @@ GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be
- https://seclists.org/bugtraq/2019/Aug/29
#### Github
+- https://github.com/irsl/gnu-patch-vulnerabilities
diff --git a/2019/CVE-2019-14040.md b/2019/CVE-2019-14040.md
index 1509a1210f..8fa471c80c 100644
--- a/2019/CVE-2019-14040.md
+++ b/2019/CVE-2019-14040.md
@@ -28,5 +28,6 @@ Using memory after being freed in qsee due to wrong implementation can lead to u
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/tamirzb/CVE-2019-14040
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2019/CVE-2019-14041.md b/2019/CVE-2019-14041.md
index 3b87f01fec..709578ab94 100644
--- a/2019/CVE-2019-14041.md
+++ b/2019/CVE-2019-14041.md
@@ -28,5 +28,6 @@ During listener modified response processing, a buffer overrun occurs due to lac
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/tamirzb/CVE-2019-14041
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2019/CVE-2019-14326.md b/2019/CVE-2019-14326.md
index d2ec743aaa..4fb66282cb 100644
--- a/2019/CVE-2019-14326.md
+++ b/2019/CVE-2019-14326.md
@@ -18,4 +18,5 @@ An issue was discovered in AndyOS Andy versions up to 46.11.113. By default, it
- https://github.com/anquanscan/sec-tools
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
+- https://github.com/seqred-s-a/cve-2019-14326
diff --git a/2019/CVE-2019-14439.md b/2019/CVE-2019-14439.md
index c9524d603b..d8b523e1d4 100644
--- a/2019/CVE-2019-14439.md
+++ b/2019/CVE-2019-14439.md
@@ -19,6 +19,7 @@ A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x befo
- https://github.com/0xT11/CVE-POC
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/diakogiannis/moviebook
- https://github.com/galimba/Jackson-deserialization-PoC
diff --git a/2019/CVE-2019-14537.md b/2019/CVE-2019-14537.md
index 1e2eafc511..a3fd77174e 100644
--- a/2019/CVE-2019-14537.md
+++ b/2019/CVE-2019-14537.md
@@ -14,6 +14,7 @@ YOURLS through 1.7.3 is affected by a type juggling vulnerability in the api com
#### Github
- https://github.com/0xT11/CVE-POC
+- https://github.com/Wocanilo/CVE-2019-14537
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
diff --git a/2019/CVE-2019-14751.md b/2019/CVE-2019-14751.md
index 205374e5a9..5cf6953cf5 100644
--- a/2019/CVE-2019-14751.md
+++ b/2019/CVE-2019-14751.md
@@ -17,4 +17,5 @@ NLTK Downloader before 3.4.5 is vulnerable to a directory traversal, allowing at
- https://github.com/0xT11/CVE-POC
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
+- https://github.com/mssalvatore/CVE-2019-14751_PoC
diff --git a/2019/CVE-2019-14776.md b/2019/CVE-2019-14776.md
new file mode 100644
index 0000000000..246027a029
--- /dev/null
+++ b/2019/CVE-2019-14776.md
@@ -0,0 +1,17 @@
+### [CVE-2019-14776](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14776)
+
+
+
+
+### Description
+
+A heap-based buffer over-read exists in DemuxInit() in demux/asf/asf.c in VideoLAN VLC media player 3.0.7.1 via a crafted .mkv file.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/ch1hyun/fuzzing-class
+
diff --git a/2019/CVE-2019-14892.md b/2019/CVE-2019-14892.md
index 0bae2992a9..772754f8fa 100644
--- a/2019/CVE-2019-14892.md
+++ b/2019/CVE-2019-14892.md
@@ -17,6 +17,7 @@ A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 an
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/Live-Hack-CVE/CVE-2019-14892
- https://github.com/OWASP/www-project-ide-vulscanner
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs
diff --git a/2019/CVE-2019-14893.md b/2019/CVE-2019-14893.md
index faf9e745f7..e848940f34 100644
--- a/2019/CVE-2019-14893.md
+++ b/2019/CVE-2019-14893.md
@@ -18,6 +18,7 @@ A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.1
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/OWASP/www-project-ide-vulscanner
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs
- https://github.com/seal-community/patches
diff --git a/2019/CVE-2019-15053.md b/2019/CVE-2019-15053.md
index 118a9857b5..e0eab37574 100644
--- a/2019/CVE-2019-15053.md
+++ b/2019/CVE-2019-15053.md
@@ -16,4 +16,5 @@ The "HTML Include and replace macro" plugin before 1.5.0 for Confluence Server a
- https://github.com/0xT11/CVE-POC
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
+- https://github.com/l0nax/CVE-2019-15053
diff --git a/2019/CVE-2019-15120.md b/2019/CVE-2019-15120.md
index 67b9e6fca6..88d0ed11d9 100644
--- a/2019/CVE-2019-15120.md
+++ b/2019/CVE-2019-15120.md
@@ -15,5 +15,6 @@ The Kunena extension before 5.1.14 for Joomla! allows XSS via BBCode.
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/developer3000S/PoC-in-GitHub
+- https://github.com/h3llraiser/CVE-2019-15120
- https://github.com/hectorgie/PoC-in-GitHub
diff --git a/2019/CVE-2019-15233.md b/2019/CVE-2019-15233.md
index 8d72f3a1fe..3bbfa86af1 100644
--- a/2019/CVE-2019-15233.md
+++ b/2019/CVE-2019-15233.md
@@ -16,4 +16,5 @@ The Live:Text Box macro in the Old Street Live Input Macros app before 2.11 for
- https://github.com/0xT11/CVE-POC
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
+- https://github.com/l0nax/CVE-2019-15233
diff --git a/2019/CVE-2019-15666.md b/2019/CVE-2019-15666.md
index 88dff043b6..91dd88dbaf 100644
--- a/2019/CVE-2019-15666.md
+++ b/2019/CVE-2019-15666.md
@@ -16,6 +16,7 @@ An issue was discovered in the Linux kernel before 5.0.19. There is an out-of-bo
- https://github.com/Al1ex/LinuxEelvation
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
- https://github.com/DrewSC13/Linpeas
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/bsauce/kernel-exploit-factory
- https://github.com/bsauce/kernel-security-learning
diff --git a/2019/CVE-2019-15949.md b/2019/CVE-2019-15949.md
index b8c86c36c6..6993ce4397 100644
--- a/2019/CVE-2019-15949.md
+++ b/2019/CVE-2019-15949.md
@@ -22,6 +22,7 @@ Nagios XI before 5.6.6 allows remote command execution as root. The exploit requ
- https://github.com/catsecorg/CatSec-TryHackMe-WriteUps
- https://github.com/dvanmosselbeen/TryHackMe_writeups
- https://github.com/hadrian3689/nagiosxi_5.6.6
+- https://github.com/jakgibb/nagiosxi-root-rce-exploit
- https://github.com/sunylife24/TryHackMe2
- https://github.com/testermas/tryhackme
diff --git a/2019/CVE-2019-16098.md b/2019/CVE-2019-16098.md
index 4037df2b2c..8f7f27ac3d 100644
--- a/2019/CVE-2019-16098.md
+++ b/2019/CVE-2019-16098.md
@@ -17,7 +17,11 @@ The driver in Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCor
- https://github.com/0xT11/CVE-POC
- https://github.com/474172261/KDU
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/Barakat/CVE-2019-16098
+- https://github.com/CVEDB/awesome-cve-repo
+- https://github.com/CVEDB/top
- https://github.com/ExpLife0011/awesome-windows-kernel-security-development
+- https://github.com/GhostTroops/TOP
- https://github.com/JustaT3ch/Kernel-Snooping
- https://github.com/Ondrik8/exploit
- https://github.com/developer3000S/PoC-in-GitHub
diff --git a/2019/CVE-2019-16508.md b/2019/CVE-2019-16508.md
index 781e385318..c225298a96 100644
--- a/2019/CVE-2019-16508.md
+++ b/2019/CVE-2019-16508.md
@@ -24,5 +24,6 @@ No PoCs from references.
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2019/CVE-2019-16869.md b/2019/CVE-2019-16869.md
index 78c773651e..e38425df32 100644
--- a/2019/CVE-2019-16869.md
+++ b/2019/CVE-2019-16869.md
@@ -16,5 +16,6 @@ No PoCs from references.
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/cezapata/appconfiguration-sample
diff --git a/2019/CVE-2019-16941.md b/2019/CVE-2019-16941.md
index af50cff8b3..bae91d2dd4 100644
--- a/2019/CVE-2019-16941.md
+++ b/2019/CVE-2019-16941.md
@@ -17,4 +17,5 @@ NSA Ghidra through 9.0.4, when experimental mode is enabled, allows arbitrary co
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/geeksniper/reverse-engineering-toolkit
- https://github.com/hectorgie/PoC-in-GitHub
+- https://github.com/purpleracc00n/CVE-2019-16941
diff --git a/2019/CVE-2019-17124.md b/2019/CVE-2019-17124.md
index 9568db07fe..e0c15d6be5 100644
--- a/2019/CVE-2019-17124.md
+++ b/2019/CVE-2019-17124.md
@@ -17,4 +17,5 @@ Kramer VIAware 2.5.0719.1034 has Incorrect Access Control.
- https://github.com/0xT11/CVE-POC
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
+- https://github.com/hessandrew/CVE-2019-17124
diff --git a/2019/CVE-2019-17267.md b/2019/CVE-2019-17267.md
index cbd6f40314..f7a65fe870 100644
--- a/2019/CVE-2019-17267.md
+++ b/2019/CVE-2019-17267.md
@@ -18,6 +18,7 @@ A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/OWASP/www-project-ide-vulscanner
- https://github.com/ilmari666/cybsec
- https://github.com/seal-community/patches
diff --git a/2019/CVE-2019-17359.md b/2019/CVE-2019-17359.md
index ff20f775ce..16c1cdb126 100644
--- a/2019/CVE-2019-17359.md
+++ b/2019/CVE-2019-17359.md
@@ -21,6 +21,7 @@ The ASN.1 parser in Bouncy Castle Crypto (aka BC Java) 1.63 can trigger a large
- https://github.com/CGCL-codes/PHunter
- https://github.com/DennisFeldbusch/Fuzz
- https://github.com/GCFuzzer/SP2023
+- https://github.com/LibHunter/LibHunter
- https://github.com/hwen020/JQF
- https://github.com/mfatima1/CS182
- https://github.com/moudemans/GFuzz
diff --git a/2019/CVE-2019-17427.md b/2019/CVE-2019-17427.md
index b50c4e6b0d..5cf10a2968 100644
--- a/2019/CVE-2019-17427.md
+++ b/2019/CVE-2019-17427.md
@@ -14,6 +14,7 @@ In Redmine before 3.4.11 and 4.0.x before 4.0.4, persistent XSS exists due to te
#### Github
- https://github.com/0xT11/CVE-POC
+- https://github.com/RealLinkers/CVE-2019-17427
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
diff --git a/2019/CVE-2019-17563.md b/2019/CVE-2019-17563.md
index 1e0cb3bc78..a44ff3c34e 100644
--- a/2019/CVE-2019-17563.md
+++ b/2019/CVE-2019-17563.md
@@ -18,5 +18,6 @@ When using FORM authentication with Apache Tomcat 9.0.0.M1 to 9.0.29, 8.5.0 to 8
- https://github.com/Live-Hack-CVE/CVE-2019-17563
- https://github.com/raner/projo
- https://github.com/rootameen/vulpine
+- https://github.com/versio-io/product-lifecycle-security-api
- https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
diff --git a/2019/CVE-2019-17632.md b/2019/CVE-2019-17632.md
index 8957fe81bc..0ec79bccd1 100644
--- a/2019/CVE-2019-17632.md
+++ b/2019/CVE-2019-17632.md
@@ -16,4 +16,5 @@ In Eclipse Jetty versions 9.4.21.v20190926, 9.4.22.v20191022, and 9.4.23.v201911
#### Github
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
diff --git a/2019/CVE-2019-18675.md b/2019/CVE-2019-18675.md
index 73ae970320..1bb38aa40b 100644
--- a/2019/CVE-2019-18675.md
+++ b/2019/CVE-2019-18675.md
@@ -26,5 +26,6 @@ The Linux kernel through 5.3.13 has a start_offset+size Integer Overflow in cpia
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2019/CVE-2019-18683.md b/2019/CVE-2019-18683.md
index e1fdc3dfa5..278c680ca3 100644
--- a/2019/CVE-2019-18683.md
+++ b/2019/CVE-2019-18683.md
@@ -37,6 +37,7 @@ An issue was discovered in drivers/media/platform/vivid in the Linux kernel thro
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/sanjana123-cloud/CVE-2019-18683
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
diff --git a/2019/CVE-2019-18885.md b/2019/CVE-2019-18885.md
index 8fa79af432..2d8c051d17 100644
--- a/2019/CVE-2019-18885.md
+++ b/2019/CVE-2019-18885.md
@@ -17,6 +17,7 @@ fs/btrfs/volumes.c in the Linux kernel before 5.1 allows a btrfs_verify_dev_exte
#### Github
- https://github.com/0xT11/CVE-POC
+- https://github.com/bobfuzzer/CVE-2019-18885
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
diff --git a/2019/CVE-2019-18890.md b/2019/CVE-2019-18890.md
index 09a1449b6f..38ab706aa8 100644
--- a/2019/CVE-2019-18890.md
+++ b/2019/CVE-2019-18890.md
@@ -15,6 +15,7 @@ A SQL injection vulnerability in Redmine through 3.2.9 and 3.3.x before 3.3.10 a
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/RealLinkers/CVE-2019-17427
+- https://github.com/RealLinkers/CVE-2019-18890
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
diff --git a/2019/CVE-2019-18935.md b/2019/CVE-2019-18935.md
index ff98f5dc6a..ff227ca454 100644
--- a/2019/CVE-2019-18935.md
+++ b/2019/CVE-2019-18935.md
@@ -73,6 +73,7 @@ Progress Telerik UI for ASP.NET AJAX through 2019.3.1023 contains a .NET deseria
- https://github.com/merlinepedra25/Pentest-Tools-1
- https://github.com/murataydemir/CVE-2019-18935
- https://github.com/nitishbadole/Pentest_Tools
+- https://github.com/noperator/CVE-2019-18935
- https://github.com/pathakabhi24/Pentest-Tools
- https://github.com/pjgmonteiro/Pentest-tools
- https://github.com/qazbnm456/awesome-cve-poc
diff --git a/2019/CVE-2019-19012.md b/2019/CVE-2019-19012.md
index d99e6e8801..66e77c7632 100644
--- a/2019/CVE-2019-19012.md
+++ b/2019/CVE-2019-19012.md
@@ -24,5 +24,6 @@ An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/kkos/oniguruma
- https://github.com/onivim/esy-oniguruma
+- https://github.com/tarantula-team/CVE-2019-19012
- https://github.com/winlibs/oniguruma
diff --git a/2019/CVE-2019-19203.md b/2019/CVE-2019-19203.md
index d9193ea0c4..f6ec87a0ee 100644
--- a/2019/CVE-2019-19203.md
+++ b/2019/CVE-2019-19203.md
@@ -17,6 +17,7 @@ An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function gb180
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/ManhNDd/CVE-2019-19203
- https://github.com/balabit-deps/balabit-os-8-libonig
- https://github.com/balabit-deps/balabit-os-9-libonig
- https://github.com/deepin-community/libonig
@@ -24,5 +25,6 @@ An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function gb180
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/kkos/oniguruma
- https://github.com/onivim/esy-oniguruma
+- https://github.com/tarantula-team/CVE-2019-19203
- https://github.com/winlibs/oniguruma
diff --git a/2019/CVE-2019-19204.md b/2019/CVE-2019-19204.md
index 7317dce31b..212b7b9a50 100644
--- a/2019/CVE-2019-19204.md
+++ b/2019/CVE-2019-19204.md
@@ -17,6 +17,7 @@ An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function fetch
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/ManhNDd/CVE-2019-19204
- https://github.com/balabit-deps/balabit-os-8-libonig
- https://github.com/balabit-deps/balabit-os-9-libonig
- https://github.com/deepin-community/libonig
@@ -24,5 +25,6 @@ An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function fetch
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/kkos/oniguruma
- https://github.com/onivim/esy-oniguruma
+- https://github.com/tarantula-team/CVE-2019-19204
- https://github.com/winlibs/oniguruma
diff --git a/2019/CVE-2019-19315.md b/2019/CVE-2019-19315.md
index 28d08e3379..40f3f26980 100644
--- a/2019/CVE-2019-19315.md
+++ b/2019/CVE-2019-19315.md
@@ -16,4 +16,5 @@ NLSSRV32.EXE in Nalpeiron Licensing Service 7.3.4.0, as used with Nitro PDF and
- https://github.com/0xT11/CVE-POC
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
+- https://github.com/monoxgas/mailorder
diff --git a/2019/CVE-2019-19377.md b/2019/CVE-2019-19377.md
index f044e314df..13397c89e4 100644
--- a/2019/CVE-2019-19377.md
+++ b/2019/CVE-2019-19377.md
@@ -25,5 +25,6 @@ In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image, performin
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2019/CVE-2019-19393.md b/2019/CVE-2019-19393.md
index ac356333c6..759799f4eb 100644
--- a/2019/CVE-2019-19393.md
+++ b/2019/CVE-2019-19393.md
@@ -16,4 +16,5 @@ The Web application on Rittal CMC PU III 7030.000 V3.00 V3.11.00_2 to V3.15.70_4
- https://github.com/0xT11/CVE-POC
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
+- https://github.com/miguelhamal/CVE-2019-19393
diff --git a/2019/CVE-2019-19469.md b/2019/CVE-2019-19469.md
index f255529cd7..3ecef38628 100644
--- a/2019/CVE-2019-19469.md
+++ b/2019/CVE-2019-19469.md
@@ -13,4 +13,5 @@ In Zmanda Management Console 3.3.9, ZMC_Admin_Advanced?form=adminTasks&action=Ap
- https://github.com/robertchrk/zmanda_exploit
#### Github
+- https://github.com/robertchrk/zmanda_exploit
diff --git a/2019/CVE-2019-19576.md b/2019/CVE-2019-19576.md
index 09ae088449..cafdca00b7 100644
--- a/2019/CVE-2019-19576.md
+++ b/2019/CVE-2019-19576.md
@@ -19,5 +19,6 @@ class.upload.php in verot.net class.upload before 1.0.3 and 2.x before 2.0.4, as
- https://github.com/ARPSyndicate/cvemon
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
+- https://github.com/jra89/CVE-2019-19576
- https://github.com/jra89/CVE-2019-19634
diff --git a/2019/CVE-2019-19634.md b/2019/CVE-2019-19634.md
index 2ce7541aef..cb9b831884 100644
--- a/2019/CVE-2019-19634.md
+++ b/2019/CVE-2019-19634.md
@@ -28,6 +28,7 @@ class.upload.php in verot.net class.upload through 1.0.3 and 2.x through 2.0.4,
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/huike007/penetration_poc
- https://github.com/huike007/poc
+- https://github.com/jra89/CVE-2019-19634
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/password520/Penetration_PoC
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
diff --git a/2019/CVE-2019-19699.md b/2019/CVE-2019-19699.md
index 046d265a2c..a38374888c 100644
--- a/2019/CVE-2019-19699.md
+++ b/2019/CVE-2019-19699.md
@@ -14,6 +14,7 @@ There is Authenticated remote code execution in Centreon Infrastructure Monitori
#### Github
- https://github.com/0xT11/CVE-POC
+- https://github.com/SpengeSec/CVE-2019-19699
- https://github.com/SpengeSec/Centreon-Vulnerable-Images
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
diff --git a/2019/CVE-2019-19781.md b/2019/CVE-2019-19781.md
index d10922a81d..b057f1200b 100644
--- a/2019/CVE-2019-19781.md
+++ b/2019/CVE-2019-19781.md
@@ -120,6 +120,7 @@ An issue was discovered in Citrix Application Delivery Controller (ADC) and Gate
- https://github.com/faisal6me/DFIR-Note
- https://github.com/fcp999/centos
- https://github.com/fengjixuchui/RedTeamer
+- https://github.com/fierceoj/ShonyDanza
- https://github.com/gobysec/Goby
- https://github.com/hack-parthsharma/Pentest-Tools
- https://github.com/hackingyseguridad/nmap
diff --git a/2019/CVE-2019-19889.md b/2019/CVE-2019-19889.md
index 807383bf16..4fd9e148a0 100644
--- a/2019/CVE-2019-19889.md
+++ b/2019/CVE-2019-19889.md
@@ -13,5 +13,6 @@ An issue was discovered on Humax Wireless Voice Gateway HGB10R-2 20160817_1855 d
- https://github.com/V1n1v131r4/HGB10R-2
#### Github
+- https://github.com/V1n1v131r4/HGB10R-2
- https://github.com/V1n1v131r4/My-CVEs
diff --git a/2019/CVE-2019-19890.md b/2019/CVE-2019-19890.md
index 6e8087641a..e0e68f361e 100644
--- a/2019/CVE-2019-19890.md
+++ b/2019/CVE-2019-19890.md
@@ -13,5 +13,6 @@ An issue was discovered on Humax Wireless Voice Gateway HGB10R-2 20160817_1855 d
- https://github.com/V1n1v131r4/HGB10R-2
#### Github
+- https://github.com/V1n1v131r4/HGB10R-2
- https://github.com/V1n1v131r4/My-CVEs
diff --git a/2019/CVE-2019-19967.md b/2019/CVE-2019-19967.md
index e6f491eb17..49976a37d9 100644
--- a/2019/CVE-2019-19967.md
+++ b/2019/CVE-2019-19967.md
@@ -13,4 +13,5 @@ The Administration page on Connect Box EuroDOCSIS 3.0 Voice Gateway CH7465LG-NCI
- https://github.com/filipi86/ConnectBoxDOCSIS-3.0
#### Github
+- https://github.com/filipi86/ConnectBoxDOCSIS-3.0
diff --git a/2019/CVE-2019-2000.md b/2019/CVE-2019-2000.md
index d8111e7767..7adb4d7239 100644
--- a/2019/CVE-2019-2000.md
+++ b/2019/CVE-2019-2000.md
@@ -24,5 +24,6 @@ In several functions of binder.c, there is possible memory corruption due to a u
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2019/CVE-2019-2025.md b/2019/CVE-2019-2025.md
index 892c3d236b..cdf69aa28a 100644
--- a/2019/CVE-2019-2025.md
+++ b/2019/CVE-2019-2025.md
@@ -26,5 +26,6 @@ No PoCs from references.
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2019/CVE-2019-20326.md b/2019/CVE-2019-20326.md
index 03a85b733d..75582354f9 100644
--- a/2019/CVE-2019-20326.md
+++ b/2019/CVE-2019-20326.md
@@ -15,6 +15,7 @@ A heap-based buffer overflow in _cairo_image_surface_create_from_jpeg() in exten
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/Fysac/CVE-2019-20326
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
diff --git a/2019/CVE-2019-20444.md b/2019/CVE-2019-20444.md
index 122a08dc20..e0e645ddef 100644
--- a/2019/CVE-2019-20444.md
+++ b/2019/CVE-2019-20444.md
@@ -15,6 +15,7 @@ No PoCs from references.
#### Github
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/cezapata/appconfiguration-sample
- https://github.com/yahoo/cubed
diff --git a/2019/CVE-2019-20502.md b/2019/CVE-2019-20502.md
index 729f68f1b1..1837a4ded7 100644
--- a/2019/CVE-2019-20502.md
+++ b/2019/CVE-2019-20502.md
@@ -13,4 +13,5 @@ An issue was discovered in EFS Easy Chat Server 3.1. There is a buffer overflow
- https://github.com/s1kr10s/EasyChatServer-DOS
#### Github
+- https://github.com/s1kr10s/EasyChatServer-DOS
diff --git a/2019/CVE-2019-2107.md b/2019/CVE-2019-2107.md
index 8e7c3ff132..eb201c5131 100644
--- a/2019/CVE-2019-2107.md
+++ b/2019/CVE-2019-2107.md
@@ -20,6 +20,7 @@ In ihevcd_parse_pps of ihevcd_parse_headers.c, there is a possible out of bounds
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/CnHack3r/Penetration_PoC
+- https://github.com/CrackerCat/CVE-2019-2107
- https://github.com/EchoGin404/-
- https://github.com/EchoGin404/gongkaishouji
- https://github.com/GhostTroops/TOP
diff --git a/2019/CVE-2019-2181.md b/2019/CVE-2019-2181.md
index 9171673514..bf826c223b 100644
--- a/2019/CVE-2019-2181.md
+++ b/2019/CVE-2019-2181.md
@@ -25,5 +25,6 @@ In binder_transaction of binder.c in the Android kernel, there is a possible out
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2019/CVE-2019-2214.md b/2019/CVE-2019-2214.md
index c6c8c56e53..aaec58a7e1 100644
--- a/2019/CVE-2019-2214.md
+++ b/2019/CVE-2019-2214.md
@@ -24,5 +24,6 @@ In binder_transaction of binder.c, there is a possible out of bounds write due t
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2019/CVE-2019-2215.md b/2019/CVE-2019-2215.md
index 99b1d61e07..81fcf04352 100644
--- a/2019/CVE-2019-2215.md
+++ b/2019/CVE-2019-2215.md
@@ -17,6 +17,7 @@ A use-after-free in binder.c allows an elevation of privilege from an applicatio
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/ATorNinja/CVE-2019-2215
- https://github.com/Al1ex/LinuxEelvation
- https://github.com/Byte-Master-101/CVE-2019-2215
- https://github.com/CrackerCat/Rootsmart-v2.0
@@ -81,6 +82,7 @@ A use-after-free in binder.c allows an elevation of privilege from an applicatio
- https://github.com/timwr/CVE-2019-2215
- https://github.com/wateroot/poc-exp
- https://github.com/willboka/CVE-2019-2215-HuaweiP20Lite
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/wrlu/Vulnerabilities
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/yud121212/Linux_Privilege_Escalation
diff --git a/2019/CVE-2019-25137.md b/2019/CVE-2019-25137.md
index 8ee747f567..657af067c9 100644
--- a/2019/CVE-2019-25137.md
+++ b/2019/CVE-2019-25137.md
@@ -16,4 +16,5 @@ Umbraco CMS 4.11.8 through 7.15.10, and 7.12.4, allows Remote Code Execution by
- https://www.exploit-db.com/exploits/46153
#### Github
+- https://github.com/Ickarah/CVE-2019-25137-Version-Research
diff --git a/2019/CVE-2019-25156.md b/2019/CVE-2019-25156.md
new file mode 100644
index 0000000000..7166b3d877
--- /dev/null
+++ b/2019/CVE-2019-25156.md
@@ -0,0 +1,17 @@
+### [CVE-2019-25156](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25156)
+
+
+
+
+### Description
+
+A vulnerability classified as problematic was found in dstar2018 Agency up to 61. Affected by this vulnerability is an unknown functionality of the file search.php. The manipulation of the argument QSType/QuickSearch leads to cross site scripting. The attack can be launched remotely. The patch is named 975b56953efabb434519d9feefcc53685fb8d0ab. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-244495.
+
+### POC
+
+#### Reference
+- https://vuldb.com/?id.244495
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2019/CVE-2019-2618.md b/2019/CVE-2019-2618.md
index 6642cb3498..c6d13362bb 100644
--- a/2019/CVE-2019-2618.md
+++ b/2019/CVE-2019-2618.md
@@ -46,6 +46,7 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/pyn3rd/CVE-2019-2618
- https://github.com/qazbnm456/awesome-cve-poc
+- https://github.com/qtgavc/list
- https://github.com/r0eXpeR/redteam_vul
- https://github.com/reph0r/poc-exp
- https://github.com/reph0r/poc-exp-tools
diff --git a/2019/CVE-2019-2684.md b/2019/CVE-2019-2684.md
index 1ae3d8ce68..221fac1183 100644
--- a/2019/CVE-2019-2684.md
+++ b/2019/CVE-2019-2684.md
@@ -20,4 +20,5 @@ Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subc
- https://github.com/Live-Hack-CVE/CVE-2020-13946
- https://github.com/psifertex/ctf-vs-the-real-world
- https://github.com/qtc-de/remote-method-guesser
+- https://github.com/versio-io/product-lifecycle-security-api
diff --git a/2019/CVE-2019-2729.md b/2019/CVE-2019-2729.md
index 3f0a3362f9..16505af292 100644
--- a/2019/CVE-2019-2729.md
+++ b/2019/CVE-2019-2729.md
@@ -71,6 +71,7 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar
- https://github.com/pwnagelabs/VEF
- https://github.com/qi4L/WeblogicScan.go
- https://github.com/qianxiao996/FrameScan
+- https://github.com/qtgavc/list
- https://github.com/rabbitmask/WeblogicScan
- https://github.com/rabbitmask/WeblogicScanLot
- https://github.com/rockmelodies/rocComExpRce
diff --git a/2019/CVE-2019-5736.md b/2019/CVE-2019-5736.md
index 4c8ef00d79..d3fd782ce5 100644
--- a/2019/CVE-2019-5736.md
+++ b/2019/CVE-2019-5736.md
@@ -42,6 +42,7 @@ runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allow
- https://github.com/ChristineEdgarse/Secrets6
- https://github.com/DataDog/dirtypipe-container-breakout-poc
- https://github.com/EvilAnne/2019-Read-article
+- https://github.com/Frichetten/CVE-2019-5736-PoC
- https://github.com/GhostTroops/TOP
- https://github.com/GiverOfGifts/CVE-2019-5736-Custom-Runtime
- https://github.com/H3xL00m/CVE-2019-5736
@@ -152,7 +153,9 @@ runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allow
- https://github.com/phxvlabsio/core-nexus
- https://github.com/psifertex/ctf-vs-the-real-world
- https://github.com/pyperanger/dockerevil
+- https://github.com/q3k/cve-2019-5736-poc
- https://github.com/qazbnm456/awesome-cve-poc
+- https://github.com/rancher/runc-cve
- https://github.com/readloud/Awesome-Stars
- https://github.com/reni2study/Cloud-Native-Security2
- https://github.com/revanmalang/OSCP
diff --git a/2019/CVE-2019-5847.md b/2019/CVE-2019-5847.md
index 2bd6265901..fa7f0988d4 100644
--- a/2019/CVE-2019-5847.md
+++ b/2019/CVE-2019-5847.md
@@ -14,6 +14,7 @@ No PoCs from references.
#### Github
- https://github.com/RUB-SysSec/JIT-Picker
+- https://github.com/ch1hyun/fuzzing-class
- https://github.com/googleprojectzero/fuzzilli
- https://github.com/zhangjiahui-buaa/MasterThesis
diff --git a/2019/CVE-2019-5893.md b/2019/CVE-2019-5893.md
index 7eb943ed06..6d67fda29b 100644
--- a/2019/CVE-2019-5893.md
+++ b/2019/CVE-2019-5893.md
@@ -15,5 +15,6 @@ Nelson Open Source ERP v6.3.1 allows SQL Injection via the db/utils/query/data.x
#### Github
- https://github.com/0xT11/CVE-POC
+- https://github.com/EmreOvunc/OpenSource-ERP-SQL-Injection
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2019/CVE-2019-5997.md b/2019/CVE-2019-5997.md
index cc1c7be35c..febc29f7ee 100644
--- a/2019/CVE-2019-5997.md
+++ b/2019/CVE-2019-5997.md
@@ -5,7 +5,7 @@
### Description
-Video Insight VMS versions prior to 7.6.1 allow remote attackers to conduct code injection attacks via unspecified vectors.
+Video Insight VMS versions prior to 7.6.1 allow remote attackers to conduct code injection attacks via unspecified vectors.
### POC
diff --git a/2019/CVE-2019-6340.md b/2019/CVE-2019-6340.md
index 861796e15e..78c517985f 100644
--- a/2019/CVE-2019-6340.md
+++ b/2019/CVE-2019-6340.md
@@ -72,6 +72,7 @@ Some field types do not properly sanitize data from non-form sources in Drupal 8
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/opflep/Drupalgeddon-Toolkit
- https://github.com/oways/CVE-2019-6340
+- https://github.com/pg001001/deception-tech
- https://github.com/pinkieli/GitHub-Chinese-Top-Charts
- https://github.com/qingyuanfeiniao/Chinese-Top-Charts
- https://github.com/resistezauxhackeurs/outils_audit_cms
diff --git a/2019/CVE-2019-6447.md b/2019/CVE-2019-6447.md
index f1ee123825..67a1c17470 100644
--- a/2019/CVE-2019-6447.md
+++ b/2019/CVE-2019-6447.md
@@ -41,6 +41,7 @@ The ES File Explorer File Manager application through 4.1.9.7.4 for Android allo
- https://github.com/e-hakson/OSCP
- https://github.com/eljosep/OSCP-Guide
- https://github.com/febinrev/CVE-2019-6447-ESfile-explorer-exploit
+- https://github.com/fs0c131y/ESFileExplorerOpenPortVuln
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/julio-cfa/POC-ES-File-Explorer-CVE-2019-6447
- https://github.com/k4u5h41/CVE-2019-6447
diff --git a/2019/CVE-2019-6453.md b/2019/CVE-2019-6453.md
index 882ffff928..394d3b03b1 100644
--- a/2019/CVE-2019-6453.md
+++ b/2019/CVE-2019-6453.md
@@ -24,4 +24,5 @@ mIRC before 7.55 allows remote command execution by using argument injection thr
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/proofofcalc/cve-2019-6453-poc
diff --git a/2019/CVE-2019-6973.md b/2019/CVE-2019-6973.md
index 7963331e6e..d7481ab055 100644
--- a/2019/CVE-2019-6973.md
+++ b/2019/CVE-2019-6973.md
@@ -16,4 +16,5 @@ Sricam IP CCTV cameras are vulnerable to denial of service via multiple incomple
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/bitfu/sricam-gsoap2.8-dos-exploit
diff --git a/2019/CVE-2019-7308.md b/2019/CVE-2019-7308.md
index 6ffd13c3aa..0c4f3975da 100644
--- a/2019/CVE-2019-7308.md
+++ b/2019/CVE-2019-7308.md
@@ -27,5 +27,6 @@ No PoCs from references.
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2019/CVE-2019-9213.md b/2019/CVE-2019-9213.md
index 11bcf17f0b..780c154cca 100644
--- a/2019/CVE-2019-9213.md
+++ b/2019/CVE-2019-9213.md
@@ -33,6 +33,7 @@ In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check
- https://github.com/shizhongpwn/Skr_StudyEveryday
- https://github.com/soh0ro0t/HappyHackingOnLinux
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
diff --git a/2019/CVE-2019-9500.md b/2019/CVE-2019-9500.md
index 3364aaf344..675c66ed51 100644
--- a/2019/CVE-2019-9500.md
+++ b/2019/CVE-2019-9500.md
@@ -30,6 +30,7 @@ The Broadcom brcmfmac WiFi driver prior to commit 1b5e2423164b3670e8bc9174e4762d
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
diff --git a/2019/CVE-2019-9503.md b/2019/CVE-2019-9503.md
index 808ef79486..99b1a8ba36 100644
--- a/2019/CVE-2019-9503.md
+++ b/2019/CVE-2019-9503.md
@@ -31,6 +31,7 @@ The Broadcom brcmfmac WiFi driver prior to commit a4176ec356c73a46c07c181c6d0403
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
diff --git a/2019/CVE-2019-9511.md b/2019/CVE-2019-9511.md
index 3c204d368b..35c69d1dcb 100644
--- a/2019/CVE-2019-9511.md
+++ b/2019/CVE-2019-9511.md
@@ -11,6 +11,7 @@ Some HTTP/2 implementations are vulnerable to window size manipulation and strea
#### Reference
- https://kb.cert.org/vuls/id/605641/
+- https://usn.ubuntu.com/4099-1/
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
diff --git a/2019/CVE-2019-9513.md b/2019/CVE-2019-9513.md
index c58a58a78f..7b44f59b26 100644
--- a/2019/CVE-2019-9513.md
+++ b/2019/CVE-2019-9513.md
@@ -11,6 +11,7 @@ Some HTTP/2 implementations are vulnerable to resource loops, potentially leadin
#### Reference
- https://kb.cert.org/vuls/id/605641/
+- https://usn.ubuntu.com/4099-1/
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
diff --git a/2019/CVE-2019-9516.md b/2019/CVE-2019-9516.md
index 18b04647af..cadff082e0 100644
--- a/2019/CVE-2019-9516.md
+++ b/2019/CVE-2019-9516.md
@@ -11,6 +11,7 @@ Some HTTP/2 implementations are vulnerable to a header leak, potentially leading
#### Reference
- https://kb.cert.org/vuls/id/605641/
+- https://usn.ubuntu.com/4099-1/
#### Github
- https://github.com/ARPSyndicate/cvemon
diff --git a/2020/CVE-2020-0022.md b/2020/CVE-2020-0022.md
index 81ad62c7ec..592fc6bba3 100644
--- a/2020/CVE-2020-0022.md
+++ b/2020/CVE-2020-0022.md
@@ -16,6 +16,7 @@ In reassemble_and_dispatch of packet_fragmenter.cc, there is possible out of bou
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/2lambda123/CVE-mitre
+- https://github.com/362902755/CVE-2020-0023
- https://github.com/5k1l/cve-2020-0022
- https://github.com/ARPSyndicate/cvemon
- https://github.com/JeffroMF/awesome-bluetooth-security321
diff --git a/2020/CVE-2020-0023.md b/2020/CVE-2020-0023.md
new file mode 100644
index 0000000000..6c3f786058
--- /dev/null
+++ b/2020/CVE-2020-0023.md
@@ -0,0 +1,17 @@
+### [CVE-2020-0023](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0023)
+
+
+
+
+### Description
+
+In setPhonebookAccessPermission of AdapterService.java, there is a possible disclosure of user contacts over bluetooth due to a missing permission check. This could lead to local information disclosure if a malicious app enables contacts over a bluetooth connection, with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-145130871
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/362902755/CVE-2020-0023
+
diff --git a/2020/CVE-2020-0041.md b/2020/CVE-2020-0041.md
index fd46d52566..8b25ad715f 100644
--- a/2020/CVE-2020-0041.md
+++ b/2020/CVE-2020-0041.md
@@ -13,6 +13,7 @@ In binder_transaction of binder.c, there is a possible out of bounds write due t
No PoCs from references.
#### Github
+- https://github.com/0xMarcio/cve
- https://github.com/0xT11/CVE-POC
- https://github.com/0xZipp0/BIBLE
- https://github.com/ARPSyndicate/cvemon
@@ -76,6 +77,7 @@ No PoCs from references.
- https://github.com/trhacknon/Pocingit
- https://github.com/vaginessa/CVE-2020-0041-Pixel-3a
- https://github.com/weeka10/-hktalent-TOP
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/yeyintminthuhtut/Awesome-Advanced-Windows-Exploitation-References
- https://github.com/yusufazizmustofa/BIBLE
diff --git a/2020/CVE-2020-0423.md b/2020/CVE-2020-0423.md
index 9eb5acf6c4..131c9c3571 100644
--- a/2020/CVE-2020-0423.md
+++ b/2020/CVE-2020-0423.md
@@ -29,5 +29,6 @@ No PoCs from references.
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/sparrow-labz/CVE-2020-0423
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2020/CVE-2020-10135.md b/2020/CVE-2020-10135.md
index db9438e612..af02aa5c59 100644
--- a/2020/CVE-2020-10135.md
+++ b/2020/CVE-2020-10135.md
@@ -24,6 +24,7 @@ Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/engn33r/awesome-bluetooth-security
- https://github.com/hectorgie/PoC-in-GitHub
+- https://github.com/m4rm0k/CVE-2020-10135-BIAS
- https://github.com/marcinguy/CVE-2020-10135-BIAS
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/sgxgsx/BlueToolkit
diff --git a/2020/CVE-2020-10136.md b/2020/CVE-2020-10136.md
index f959518ef2..e4a38ab6ba 100644
--- a/2020/CVE-2020-10136.md
+++ b/2020/CVE-2020-10136.md
@@ -1,11 +1,11 @@
### [CVE-2020-10136](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10136)

-
-
+
+
### Description
-Multiple products that implement the IP Encapsulation within IP standard (RFC 2003, STD 1) decapsulate and route IP-in-IP traffic without any validation, which could allow an unauthenticated remote attacker to route arbitrary traffic via an exposed network interface and lead to spoofing, access control bypass, and other unexpected network behaviors.
+IP-in-IP protocol specifies IP Encapsulation within IP standard (RFC 2003, STD 1) that decapsulate and route IP-in-IP traffic is vulnerable to spoofing, access-control bypass and other unexpected behavior due to the lack of validation to verify network packets before decapsulation and routing.
### POC
diff --git a/2020/CVE-2020-10137.md b/2020/CVE-2020-10137.md
index 681837f6eb..b041969cd9 100644
--- a/2020/CVE-2020-10137.md
+++ b/2020/CVE-2020-10137.md
@@ -13,4 +13,5 @@ Z-Wave devices based on Silicon Labs 700 series chipsets using S2 do not adequat
- https://github.com/CNK2100/VFuzz-public
#### Github
+- https://github.com/CNK2100/VFuzz-public
diff --git a/2020/CVE-2020-10234.md b/2020/CVE-2020-10234.md
index b6c346bd81..1e7efc6248 100644
--- a/2020/CVE-2020-10234.md
+++ b/2020/CVE-2020-10234.md
@@ -15,4 +15,5 @@ The AscRegistryFilter.sys kernel driver in IObit Advanced SystemCare 13.2 allows
#### Github
- https://github.com/Arryboom/Kernel-exploits
+- https://github.com/FULLSHADE/Kernel-exploits
diff --git a/2020/CVE-2020-10560.md b/2020/CVE-2020-10560.md
index 257406b650..0464814200 100644
--- a/2020/CVE-2020-10560.md
+++ b/2020/CVE-2020-10560.md
@@ -15,6 +15,7 @@ An issue was discovered in Open Source Social Network (OSSN) through 5.3. A user
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/LucidUnicorn/CVE-2020-10560-Key-Recovery
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/jandersoncampelo/InfosecBookmarks
diff --git a/2020/CVE-2020-10665.md b/2020/CVE-2020-10665.md
index f8af0283b7..c47a305a70 100644
--- a/2020/CVE-2020-10665.md
+++ b/2020/CVE-2020-10665.md
@@ -21,4 +21,5 @@ Docker Desktop allows local privilege escalation to NT AUTHORITY\SYSTEM because
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/soosmile/POC
+- https://github.com/spaceraccoon/CVE-2020-10665
diff --git a/2020/CVE-2020-10683.md b/2020/CVE-2020-10683.md
index 86d5cc2e8d..07e1189d65 100644
--- a/2020/CVE-2020-10683.md
+++ b/2020/CVE-2020-10683.md
@@ -23,5 +23,6 @@ dom4j before 2.0.3 and 2.1.x before 2.1.3 allows external DTDs and External Enti
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/OWASP/www-project-ide-vulscanner
diff --git a/2020/CVE-2020-11108.md b/2020/CVE-2020-11108.md
index c22873aa87..a1a5589e9b 100644
--- a/2020/CVE-2020-11108.md
+++ b/2020/CVE-2020-11108.md
@@ -20,6 +20,7 @@ The Gravity updater in Pi-hole through 4.4 allows an authenticated adversary to
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/Frichetten/CVE-2020-11108-PoC
- https://github.com/Frichetten/Frichetten
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
diff --git a/2020/CVE-2020-11179.md b/2020/CVE-2020-11179.md
index 4c174dbec3..7455607f05 100644
--- a/2020/CVE-2020-11179.md
+++ b/2020/CVE-2020-11179.md
@@ -25,5 +25,6 @@ Arbitrary read and write to kernel addresses by temporarily overwriting ring buf
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2020/CVE-2020-11549.md b/2020/CVE-2020-11549.md
index 35341e9c75..52c7cc55c9 100644
--- a/2020/CVE-2020-11549.md
+++ b/2020/CVE-2020-11549.md
@@ -14,4 +14,5 @@ An issue was discovered on NETGEAR Orbi Tri-Band Business WiFi Add-on Satellite
- https://www.modzero.com/advisories/MZ-20-02-Netgear-Orbi-Pro-Security.txt
#### Github
+- https://github.com/modzero/MZ-20-02-NETGEAR-Orbi-Security
diff --git a/2020/CVE-2020-11550.md b/2020/CVE-2020-11550.md
index 2fc241c486..d8d70adaaf 100644
--- a/2020/CVE-2020-11550.md
+++ b/2020/CVE-2020-11550.md
@@ -14,4 +14,5 @@ An issue was discovered on NETGEAR Orbi Tri-Band Business WiFi Add-on Satellite
- https://www.modzero.com/advisories/MZ-20-02-Netgear-Orbi-Pro-Security.txt
#### Github
+- https://github.com/modzero/MZ-20-02-NETGEAR-Orbi-Security
diff --git a/2020/CVE-2020-11551.md b/2020/CVE-2020-11551.md
index 75d1ccafd0..f6e50fd67b 100644
--- a/2020/CVE-2020-11551.md
+++ b/2020/CVE-2020-11551.md
@@ -14,4 +14,5 @@ An issue was discovered on NETGEAR Orbi Tri-Band Business WiFi Add-on Satellite
- https://www.modzero.com/advisories/MZ-20-02-Netgear-Orbi-Pro-Security.txt
#### Github
+- https://github.com/modzero/MZ-20-02-NETGEAR-Orbi-Security
diff --git a/2020/CVE-2020-11996.md b/2020/CVE-2020-11996.md
index 90f5b6cc4f..ad9b182a75 100644
--- a/2020/CVE-2020-11996.md
+++ b/2020/CVE-2020-11996.md
@@ -23,5 +23,6 @@ A specially crafted sequence of HTTP/2 requests sent to Apache Tomcat 10.0.0-M1
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/rusakovichma/tomcat-embed-core-9.0.31-CVE-2020-11996
- https://github.com/soosmile/POC
+- https://github.com/versio-io/product-lifecycle-security-api
- https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
diff --git a/2020/CVE-2020-1208.md b/2020/CVE-2020-1208.md
index 44f930896f..8d6a71ba1d 100644
--- a/2020/CVE-2020-1208.md
+++ b/2020/CVE-2020-1208.md
@@ -28,4 +28,5 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ferdinandmudjialim/metasploit-cve-search
+- https://github.com/tunnelcat/metasploit-cve-search
diff --git a/2020/CVE-2020-12112.md b/2020/CVE-2020-12112.md
index c9007e5406..004a79befa 100644
--- a/2020/CVE-2020-12112.md
+++ b/2020/CVE-2020-12112.md
@@ -20,4 +20,5 @@ BigBlueButton before 2.2.5 allows remote attackers to obtain sensitive files via
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/soosmile/POC
+- https://github.com/tchenu/CVE-2020-12112
diff --git a/2020/CVE-2020-12122.md b/2020/CVE-2020-12122.md
index 392a275348..77bcffb7b8 100644
--- a/2020/CVE-2020-12122.md
+++ b/2020/CVE-2020-12122.md
@@ -15,4 +15,5 @@ In Max Secure Max Spyware Detector 1.0.0.044, the driver file (MaxProc64.sys) al
#### Github
- https://github.com/Arryboom/Kernel-exploits
+- https://github.com/FULLSHADE/Kernel-exploits
diff --git a/2020/CVE-2020-1234.md b/2020/CVE-2020-1234.md
index dac361b6ca..e2de4f12cd 100644
--- a/2020/CVE-2020-1234.md
+++ b/2020/CVE-2020-1234.md
@@ -34,4 +34,5 @@ No PoCs from references.
- https://github.com/ivanid22/NVD-scraper
- https://github.com/strobes-co/ql-documentation
- https://github.com/tahtaciburak/CyAnnuaire
+- https://github.com/tunnelcat/metasploit-cve-search
diff --git a/2020/CVE-2020-12340.md b/2020/CVE-2020-12340.md
index ca28d3df32..e38a5175ed 100644
--- a/2020/CVE-2020-12340.md
+++ b/2020/CVE-2020-12340.md
@@ -15,4 +15,5 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ferdinandmudjialim/metasploit-cve-search
+- https://github.com/tunnelcat/metasploit-cve-search
diff --git a/2020/CVE-2020-12351.md b/2020/CVE-2020-12351.md
index 5d8711893e..2a73cb011c 100644
--- a/2020/CVE-2020-12351.md
+++ b/2020/CVE-2020-12351.md
@@ -42,5 +42,6 @@ Improper input validation in BlueZ may allow an unauthenticated user to potentia
- https://github.com/shannonmullins/hopp
- https://github.com/soosmile/POC
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2020/CVE-2020-12352.md b/2020/CVE-2020-12352.md
index de02cc6cc4..f13dba9467 100644
--- a/2020/CVE-2020-12352.md
+++ b/2020/CVE-2020-12352.md
@@ -38,5 +38,6 @@ Improper access control in BlueZ may allow an unauthenticated user to potentiall
- https://github.com/sgxgsx/BlueToolkit
- https://github.com/shannonmullins/hopp
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2020/CVE-2020-12432.md b/2020/CVE-2020-12432.md
index 54cdea8a40..967b9d4f87 100644
--- a/2020/CVE-2020-12432.md
+++ b/2020/CVE-2020-12432.md
@@ -16,6 +16,7 @@ The WOPI API integration for Vereign Collabora CODE through 4.2.2 does not prope
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/d7x/CVE-2020-12432
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2020/CVE-2020-12443.md b/2020/CVE-2020-12443.md
index f92f1daaf6..27bebaab6c 100644
--- a/2020/CVE-2020-12443.md
+++ b/2020/CVE-2020-12443.md
@@ -13,4 +13,5 @@ BigBlueButton before 2.2.6 allows remote attackers to read arbitrary files becau
- https://github.com/mclab-hbrs/BBB-POC
#### Github
+- https://github.com/mclab-hbrs/BBB-POC
diff --git a/2020/CVE-2020-12695.md b/2020/CVE-2020-12695.md
index 580dfc6e8a..2ecfd568fd 100644
--- a/2020/CVE-2020-12695.md
+++ b/2020/CVE-2020-12695.md
@@ -31,6 +31,7 @@ The Open Connectivity Foundation UPnP specification before 2020-04-17 does not f
- https://github.com/ZTK-009/Penetration_PoC
- https://github.com/alphaSeclab/sec-daily-2020
- https://github.com/aoeII/asuswrt-for-Tenda-AC9-Router
+- https://github.com/corelight/callstranger-detector
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/gaahrdner/starred
- https://github.com/hasee2018/Penetration_Testing_POC
diff --git a/2020/CVE-2020-12872.md b/2020/CVE-2020-12872.md
index 905c6cb9ba..3bd65e0a15 100644
--- a/2020/CVE-2020-12872.md
+++ b/2020/CVE-2020-12872.md
@@ -15,4 +15,5 @@ yaws_config.erl in Yaws through 2.0.2 and/or 2.0.7 loads obsolete TLS ciphers, a
#### Github
- https://github.com/Live-Hack-CVE/CVE-2020-12872
+- https://github.com/catsploit/catsploit
diff --git a/2020/CVE-2020-1350.md b/2020/CVE-2020-1350.md
index b4f6ee8ee7..99fbe81968 100644
--- a/2020/CVE-2020-1350.md
+++ b/2020/CVE-2020-1350.md
@@ -16,6 +16,7 @@ A remote code execution vulnerability exists in Windows Domain Name System serve
- http://packetstormsecurity.com/files/158484/SIGRed-Windows-DNS-Denial-Of-Service.html
#### Github
+- https://github.com/0xMarcio/cve
- https://github.com/0xT11/CVE-POC
- https://github.com/20142995/sectool
- https://github.com/2lambda123/diaphora
@@ -75,6 +76,7 @@ A remote code execution vulnerability exists in Windows Domain Name System serve
- https://github.com/mr-r3b00t/CVE-2020-1350
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
+- https://github.com/pg001001/deception-tech
- https://github.com/psc4re/NSE-scripts
- https://github.com/rudraimmunefi/source-code-review
- https://github.com/rudrapwn/source-code-review
diff --git a/2020/CVE-2020-13757.md b/2020/CVE-2020-13757.md
index d6610659aa..7355fb30e7 100644
--- a/2020/CVE-2020-13757.md
+++ b/2020/CVE-2020-13757.md
@@ -16,4 +16,5 @@ Python-RSA before 4.1 ignores leading '\0' bytes during decryption of ciphertext
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/AdiRashkes/python-tda-bug-hunt-0
+- https://github.com/seal-community/patches
diff --git a/2020/CVE-2020-13934.md b/2020/CVE-2020-13934.md
index 703b0a2214..c02679ae8c 100644
--- a/2020/CVE-2020-13934.md
+++ b/2020/CVE-2020-13934.md
@@ -17,5 +17,6 @@ An h2c direct connection to Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M5 to 9.
- https://www.oracle.com/security-alerts/cpuoct2020.html
#### Github
+- https://github.com/versio-io/product-lifecycle-security-api
- https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
diff --git a/2020/CVE-2020-13935.md b/2020/CVE-2020-13935.md
index afc092c0b7..24fb5a1e67 100644
--- a/2020/CVE-2020-13935.md
+++ b/2020/CVE-2020-13935.md
@@ -21,6 +21,7 @@ The payload length in a WebSocket frame was not correctly validated in Apache To
#### Github
- https://github.com/0day404/vulnerability-poc
+- https://github.com/0xMarcio/cve
- https://github.com/20142995/sectool
- https://github.com/2lambda123/CVE-mitre
- https://github.com/404notf0und/CVE-Flow
@@ -53,6 +54,7 @@ The payload length in a WebSocket frame was not correctly validated in Apache To
- https://github.com/trganda/dockerv
- https://github.com/trganda/starrlist
- https://github.com/tzwlhack/Vulnerability
+- https://github.com/versio-io/product-lifecycle-security-api
- https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC
diff --git a/2020/CVE-2020-13942.md b/2020/CVE-2020-13942.md
index 9f5150383a..08b9962cde 100644
--- a/2020/CVE-2020-13942.md
+++ b/2020/CVE-2020-13942.md
@@ -16,6 +16,7 @@ No PoCs from references.
- https://github.com/1135/unomi_exploit
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
+- https://github.com/CLincat/vulcat
- https://github.com/EdgeSecurityTeam/Vulnerability
- https://github.com/Elsfa7-110/kenzer-templates
- https://github.com/HimmelAward/Goby_POC
diff --git a/2020/CVE-2020-13943.md b/2020/CVE-2020-13943.md
index 4c3db83ace..53e33e01c3 100644
--- a/2020/CVE-2020-13943.md
+++ b/2020/CVE-2020-13943.md
@@ -15,5 +15,6 @@ If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Live-Hack-CVE/CVE-2020-13943
+- https://github.com/versio-io/product-lifecycle-security-api
- https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
diff --git a/2020/CVE-2020-14356.md b/2020/CVE-2020-14356.md
index 37dd2706ab..cd4100146c 100644
--- a/2020/CVE-2020-14356.md
+++ b/2020/CVE-2020-14356.md
@@ -28,5 +28,6 @@ A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versio
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2020/CVE-2020-14381.md b/2020/CVE-2020-14381.md
index 9c2371feed..73fd2cb330 100644
--- a/2020/CVE-2020-14381.md
+++ b/2020/CVE-2020-14381.md
@@ -26,5 +26,6 @@ A flaw was found in the Linux kernel’s futex implementation. This flaw allows
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2020/CVE-2020-14386.md b/2020/CVE-2020-14386.md
index b2b8242615..70d33f2868 100644
--- a/2020/CVE-2020-14386.md
+++ b/2020/CVE-2020-14386.md
@@ -50,5 +50,6 @@ A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be ex
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/taielab/awesome-hacking-lists
- https://github.com/teamssix/container-escape-check
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2020/CVE-2020-14421.md b/2020/CVE-2020-14421.md
index 006fe3d8d6..dbc7bf011c 100644
--- a/2020/CVE-2020-14421.md
+++ b/2020/CVE-2020-14421.md
@@ -18,4 +18,5 @@ aaPanel through 6.6.6 allows remote authenticated users to execute arbitrary com
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Orange-Cyberdefense/CVE-repository
- https://github.com/Transmetal/CVE-repository-master
+- https://github.com/jenaye/aapanel
diff --git a/2020/CVE-2020-14882.md b/2020/CVE-2020-14882.md
index a38224b144..a6ab5d9907 100644
--- a/2020/CVE-2020-14882.md
+++ b/2020/CVE-2020-14882.md
@@ -70,6 +70,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
- https://github.com/SouthWind0/southwind0.github.io
- https://github.com/Threekiii/Awesome-Exploit
- https://github.com/Threekiii/Awesome-POC
+- https://github.com/Threekiii/Awesome-Redteam
- https://github.com/Threekiii/Vulhub-Reproduce
- https://github.com/Umarovm/-Patched-McMaster-University-Blind-Command-Injection
- https://github.com/Weik1/Artillery
diff --git a/2020/CVE-2020-14950.md b/2020/CVE-2020-14950.md
index 0b46eca6c1..1697581c5b 100644
--- a/2020/CVE-2020-14950.md
+++ b/2020/CVE-2020-14950.md
@@ -16,4 +16,5 @@ aaPanel through 6.6.6 allows remote authenticated users to execute arbitrary com
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Orange-Cyberdefense/CVE-repository
- https://github.com/Transmetal/CVE-repository-master
+- https://github.com/jenaye/aapanel
diff --git a/2020/CVE-2020-14990.md b/2020/CVE-2020-14990.md
index dec2de23ff..a4e188052b 100644
--- a/2020/CVE-2020-14990.md
+++ b/2020/CVE-2020-14990.md
@@ -14,4 +14,5 @@ IOBit Advanced SystemCare Free 13.5.0.263 allows local users to gain privileges
- https://github.com/Daniel-itsec/AdvancedSystemCare
#### Github
+- https://github.com/Daniel-itsec/AdvancedSystemCare
diff --git a/2020/CVE-2020-15367.md b/2020/CVE-2020-15367.md
index 3ad8688377..6fd95f5dfe 100644
--- a/2020/CVE-2020-15367.md
+++ b/2020/CVE-2020-15367.md
@@ -17,6 +17,7 @@ Venki Supravizio BPM 10.1.2 does not limit the number of authentication attempts
- https://github.com/ARPSyndicate/cvemon
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
+- https://github.com/inflixim4be/CVE-2020-15367
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/soosmile/POC
diff --git a/2020/CVE-2020-15392.md b/2020/CVE-2020-15392.md
index 86b6728f60..55e9993a52 100644
--- a/2020/CVE-2020-15392.md
+++ b/2020/CVE-2020-15392.md
@@ -18,6 +18,7 @@ A user enumeration vulnerability flaw was found in Venki Supravizio BPM 10.1.2.
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/inflixim4be/CVE-2020-15367
+- https://github.com/inflixim4be/CVE-2020-15392
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/soosmile/POC
diff --git a/2020/CVE-2020-15956.md b/2020/CVE-2020-15956.md
index 9fa2788b41..d7ec8d173c 100644
--- a/2020/CVE-2020-15956.md
+++ b/2020/CVE-2020-15956.md
@@ -18,6 +18,7 @@ ActiveMediaServer.exe in ACTi NVR3 Standard Server 3.0.12.42 allows remote unaut
- https://github.com/ARPSyndicate/cvemon
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
+- https://github.com/megamagnus/cve-2020-15956
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/soosmile/POC
diff --git a/2020/CVE-2020-16119.md b/2020/CVE-2020-16119.md
index ac6b2c8f22..0952920d75 100644
--- a/2020/CVE-2020-16119.md
+++ b/2020/CVE-2020-16119.md
@@ -25,5 +25,6 @@ Use-after-free vulnerability in the Linux kernel exploitable by a local attacker
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2020/CVE-2020-16270.md b/2020/CVE-2020-16270.md
index 3f32476bbb..da45c076c2 100644
--- a/2020/CVE-2020-16270.md
+++ b/2020/CVE-2020-16270.md
@@ -16,6 +16,7 @@ OLIMPOKS under 3.3.39 allows Auth/Admin ErrorMessage XSS. Remote Attacker can us
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/Elsfa7-110/kenzer-templates
+- https://github.com/Security-AVS/CVE-2020-16270
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
diff --git a/2020/CVE-2020-17456.md b/2020/CVE-2020-17456.md
index e43594d8ec..00ea6339b0 100644
--- a/2020/CVE-2020-17456.md
+++ b/2020/CVE-2020-17456.md
@@ -19,6 +19,7 @@ SEOWON INTECH SLC-130 And SLR-120S devices allow Remote Code Execution via the i
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/Al1ex/CVE-2020-17456
+- https://github.com/TAPESH-TEAM/CVE-2020-17456-Seowon-SLR-120S42G-RCE-Exploit-Unauthenticated
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/maj0rmil4d/Seowon-SlC-130-And-SLR-120S-Exploit
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2020/CVE-2020-17527.md b/2020/CVE-2020-17527.md
index 95212296a7..de9677863a 100644
--- a/2020/CVE-2020-17527.md
+++ b/2020/CVE-2020-17527.md
@@ -27,5 +27,6 @@ While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/pctF/vulnerable-app
- https://github.com/scordero1234/java_sec_demo-main
+- https://github.com/versio-io/product-lifecycle-security-api
- https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
diff --git a/2020/CVE-2020-18324.md b/2020/CVE-2020-18324.md
index 33dd0775d7..b6159a0589 100644
--- a/2020/CVE-2020-18324.md
+++ b/2020/CVE-2020-18324.md
@@ -13,5 +13,6 @@ Cross Site Scripting (XSS) vulnerability exists in Subrion CMS 4.2.1 via the q p
- https://github.com/hamm0nz/CVE-2020-18324
#### Github
+- https://github.com/hamm0nz/CVE-2020-18324
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2020/CVE-2020-18325.md b/2020/CVE-2020-18325.md
index 479df05ae1..e69407c86f 100644
--- a/2020/CVE-2020-18325.md
+++ b/2020/CVE-2020-18325.md
@@ -13,5 +13,6 @@ Multilple Cross Site Scripting (XSS) vulnerability exists in Intelliants Subrion
- https://github.com/hamm0nz/CVE-2020-18325
#### Github
+- https://github.com/hamm0nz/CVE-2020-18325
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2020/CVE-2020-18326.md b/2020/CVE-2020-18326.md
index 28299d8893..8f727cdfe9 100644
--- a/2020/CVE-2020-18326.md
+++ b/2020/CVE-2020-18326.md
@@ -13,5 +13,6 @@ Cross Site Request Forgery (CSRF) vulnerability exists in Intelliants Subrion CM
- https://github.com/hamm0nz/CVE-2020-18326
#### Github
+- https://github.com/hamm0nz/CVE-2020-18326
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2020/CVE-2020-1935.md b/2020/CVE-2020-1935.md
index 3ac65bd4cd..f124ddd590 100644
--- a/2020/CVE-2020-1935.md
+++ b/2020/CVE-2020-1935.md
@@ -18,5 +18,6 @@ In Apache Tomcat 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99 the HTT
- https://github.com/mklmfane/betvictor
- https://github.com/mo-xiaoxi/HDiff
- https://github.com/raner/projo
+- https://github.com/versio-io/product-lifecycle-security-api
- https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
diff --git a/2020/CVE-2020-19360.md b/2020/CVE-2020-19360.md
index 0ace026c4f..c6941472cf 100644
--- a/2020/CVE-2020-19360.md
+++ b/2020/CVE-2020-19360.md
@@ -18,6 +18,7 @@ Local file inclusion in FHEM 6.0 allows in fhem/FileLog_logWrapper file paramete
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/ArrestX/--POC
+- https://github.com/EmreOvunc/FHEM-6.0-Local-File-Inclusion-LFI-Vulnerability
- https://github.com/KayCHENvip/vulnerability-poc
- https://github.com/Miraitowa70/POC-Notes
- https://github.com/Threekiii/Awesome-POC
diff --git a/2020/CVE-2020-19361.md b/2020/CVE-2020-19361.md
index 30de4aef74..5919203d93 100644
--- a/2020/CVE-2020-19361.md
+++ b/2020/CVE-2020-19361.md
@@ -13,4 +13,5 @@ Reflected XSS in Medintux v2.16.000 CCAM.php by manipulating the mot1 parameter
- https://github.com/EmreOvunc/Medintux-V2.16.000-Reflected-XSS-Vulnerability
#### Github
+- https://github.com/EmreOvunc/Medintux-V2.16.000-Reflected-XSS-Vulnerability
diff --git a/2020/CVE-2020-19364.md b/2020/CVE-2020-19364.md
index 169330a6e2..b985bcb3a5 100644
--- a/2020/CVE-2020-19364.md
+++ b/2020/CVE-2020-19364.md
@@ -13,4 +13,5 @@ OpenEMR 5.0.1 allows an authenticated attacker to upload and execute malicious P
- https://github.com/EmreOvunc/OpenEMR_Vulnerabilities
#### Github
+- https://github.com/EmreOvunc/OpenEMR_Vulnerabilities
diff --git a/2020/CVE-2020-1938.md b/2020/CVE-2020-1938.md
index 3f9add2d3a..f628a710ae 100644
--- a/2020/CVE-2020-1938.md
+++ b/2020/CVE-2020-1938.md
@@ -192,6 +192,7 @@ When using the Apache JServ Protocol (AJP), care must be taken when trusting inc
- https://github.com/tpt11fb/AttackTomcat
- https://github.com/uuuuuuuzi/BugRepairsuggestions
- https://github.com/veo/vscan
+- https://github.com/versio-io/product-lifecycle-security-api
- https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
- https://github.com/w4fz5uck5/CVE-2020-1938-Clean-Version
- https://github.com/weeka10/-hktalent-TOP
diff --git a/2020/CVE-2020-1967.md b/2020/CVE-2020-1967.md
index ce7ca57f7b..86a24315cb 100644
--- a/2020/CVE-2020-1967.md
+++ b/2020/CVE-2020-1967.md
@@ -36,6 +36,7 @@ Server or client applications that call the SSL_check_chain() function during or
- https://github.com/goharbor/pluggable-scanner-spec
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/hstiwana/cks
+- https://github.com/irsl/CVE-2020-1967
- https://github.com/jntass/TASSL-1.1.1k
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/omnibor/bomsh
diff --git a/2020/CVE-2020-20093.md b/2020/CVE-2020-20093.md
index 00626a42a3..e523980824 100644
--- a/2020/CVE-2020-20093.md
+++ b/2020/CVE-2020-20093.md
@@ -15,4 +15,5 @@ The Facebook Messenger app for iOS 227.0 and prior and Android 228.1.0.10.116 an
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/zadewg/RIUS
diff --git a/2020/CVE-2020-23160.md b/2020/CVE-2020-23160.md
index 3572b22279..65124f2ff1 100644
--- a/2020/CVE-2020-23160.md
+++ b/2020/CVE-2020-23160.md
@@ -14,6 +14,7 @@ Remote code execution in Pyrescom Termod4 time management devices before 10.04k
- https://outpost24.com/blog/multiple-vulnerabilities-discovered-in-Pyrescom-Termod4-smart-device
#### Github
+- https://github.com/Outpost24/Pyrescom-Termod-PoC
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2020/CVE-2020-23161.md b/2020/CVE-2020-23161.md
index 02f454e553..d462f8545a 100644
--- a/2020/CVE-2020-23161.md
+++ b/2020/CVE-2020-23161.md
@@ -14,4 +14,5 @@ Local file inclusion in Pyrescom Termod4 time management devices before 10.04k a
- https://outpost24.com/blog/multiple-vulnerabilities-discovered-in-Pyrescom-Termod4-smart-device
#### Github
+- https://github.com/Outpost24/Pyrescom-Termod-PoC
diff --git a/2020/CVE-2020-23162.md b/2020/CVE-2020-23162.md
index cd51505ed2..80d24c2791 100644
--- a/2020/CVE-2020-23162.md
+++ b/2020/CVE-2020-23162.md
@@ -14,4 +14,5 @@ Sensitive information disclosure and weak encryption in Pyrescom Termod4 time ma
- https://outpost24.com/blog/multiple-vulnerabilities-discovered-in-Pyrescom-Termod4-smart-device
#### Github
+- https://github.com/Outpost24/Pyrescom-Termod-PoC
diff --git a/2020/CVE-2020-23839.md b/2020/CVE-2020-23839.md
index 387f3d6db0..089b3e7c1a 100644
--- a/2020/CVE-2020-23839.md
+++ b/2020/CVE-2020-23839.md
@@ -19,5 +19,6 @@ A Reflected Cross-Site Scripting (XSS) vulnerability in GetSimple CMS v3.3.16, i
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Janalytics94/anomaly-detection-software
- https://github.com/Live-Hack-CVE/CVE-2020-23839
+- https://github.com/boku7/CVE-2020-23839
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2020/CVE-2020-24007.md b/2020/CVE-2020-24007.md
index 965e53bb4f..312a825016 100644
--- a/2020/CVE-2020-24007.md
+++ b/2020/CVE-2020-24007.md
@@ -13,4 +13,5 @@ Umanni RH 1.0 does not limit the number of authentication attempts. An unauthent
- https://github.com/inflixim4be/Brute-Force-on-Umanni-RH
#### Github
+- https://github.com/inflixim4be/Brute-Force-on-Umanni-RH
diff --git a/2020/CVE-2020-24008.md b/2020/CVE-2020-24008.md
index fc72dbcad3..52e18dba13 100644
--- a/2020/CVE-2020-24008.md
+++ b/2020/CVE-2020-24008.md
@@ -13,4 +13,5 @@ Umanni RH 1.0 has a user enumeration vulnerability. This issue occurs during pas
- https://github.com/inflixim4be/User-Enumeration-on-Umanni-RH
#### Github
+- https://github.com/inflixim4be/User-Enumeration-on-Umanni-RH
diff --git a/2020/CVE-2020-24033.md b/2020/CVE-2020-24033.md
index 8117aeeb36..5b19c333e2 100644
--- a/2020/CVE-2020-24033.md
+++ b/2020/CVE-2020-24033.md
@@ -15,6 +15,7 @@ An issue was discovered in fs.com S3900 24T4S 1.7.0 and earlier. The form does n
#### Github
- https://github.com/0xT11/CVE-POC
+- https://github.com/M0NsTeRRR/CVE-2020-24033
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2020/CVE-2020-24379.md b/2020/CVE-2020-24379.md
index 47d3f66647..a10949e33d 100644
--- a/2020/CVE-2020-24379.md
+++ b/2020/CVE-2020-24379.md
@@ -17,4 +17,5 @@ WebDAV implementation in Yaws web server versions 1.81 to 2.0.7 is vulnerable to
#### Github
- https://github.com/404notf0und/CVE-Flow
- https://github.com/Live-Hack-CVE/CVE-2020-24379
+- https://github.com/vulnbe/poc-yaws-dav-xxe
diff --git a/2020/CVE-2020-24490.md b/2020/CVE-2020-24490.md
index b3740ff88e..e06a1e42c7 100644
--- a/2020/CVE-2020-24490.md
+++ b/2020/CVE-2020-24490.md
@@ -38,5 +38,6 @@ No PoCs from references.
- https://github.com/sgxgsx/BlueToolkit
- https://github.com/shannonmullins/hopp
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2020/CVE-2020-24574.md b/2020/CVE-2020-24574.md
index 030143e179..30e9af7e61 100644
--- a/2020/CVE-2020-24574.md
+++ b/2020/CVE-2020-24574.md
@@ -17,4 +17,5 @@ The client (aka GalaxyClientService.exe) in GOG GALAXY through 2.0.41 (as of 12:
#### Github
- https://github.com/anvilsecure/gog-galaxy-app-research
+- https://github.com/jtesta/gog_galaxy_client_service_poc
diff --git a/2020/CVE-2020-24765.md b/2020/CVE-2020-24765.md
index 5e4edcb0a3..3563418546 100644
--- a/2020/CVE-2020-24765.md
+++ b/2020/CVE-2020-24765.md
@@ -21,4 +21,5 @@ InterMind iMind Server through 3.13.65 allows remote unauthenticated attackers t
- https://github.com/fbkcs/CVE-2020-24765
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/trump88/CVE-2020-24765
diff --git a/2020/CVE-2020-24916.md b/2020/CVE-2020-24916.md
index fa707a6cbf..e156e9bd97 100644
--- a/2020/CVE-2020-24916.md
+++ b/2020/CVE-2020-24916.md
@@ -17,4 +17,5 @@ CGI implementation in Yaws web server versions 1.81 to 2.0.7 is vulnerable to OS
#### Github
- https://github.com/404notf0und/CVE-Flow
- https://github.com/Live-Hack-CVE/CVE-2020-24916
+- https://github.com/vulnbe/poc-yaws-cgi-shell-injection
diff --git a/2020/CVE-2020-25220.md b/2020/CVE-2020-25220.md
index 70d82d5f0c..68e48fe03a 100644
--- a/2020/CVE-2020-25220.md
+++ b/2020/CVE-2020-25220.md
@@ -27,5 +27,6 @@ The Linux kernel 4.9.x before 4.9.233, 4.14.x before 4.14.194, and 4.19.x before
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2020/CVE-2020-25265.md b/2020/CVE-2020-25265.md
index dff50513a9..8b7030ad4f 100644
--- a/2020/CVE-2020-25265.md
+++ b/2020/CVE-2020-25265.md
@@ -16,4 +16,5 @@ AppImage libappimage before 1.0.3 allows attackers to trigger an overwrite of a
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/refi64/CVE-2020-25265-25266
diff --git a/2020/CVE-2020-25266.md b/2020/CVE-2020-25266.md
index 278016cb9a..ec67baa215 100644
--- a/2020/CVE-2020-25266.md
+++ b/2020/CVE-2020-25266.md
@@ -13,4 +13,5 @@ AppImage appimaged before 1.0.3 does not properly check whether a downloaded fil
- https://github.com/refi64/CVE-2020-25265-25266
#### Github
+- https://github.com/refi64/CVE-2020-25265-25266
diff --git a/2020/CVE-2020-25385.md b/2020/CVE-2020-25385.md
index 19b1abb80a..dea2888603 100644
--- a/2020/CVE-2020-25385.md
+++ b/2020/CVE-2020-25385.md
@@ -13,4 +13,5 @@ Nagios Log Server 2.1.7 contains a cross-site scripting (XSS) vulnerability in /
- https://github.com/EmreOvunc/Nagios-Log-Server-2.1.7-Persistent-Cross-Site-Scripting
#### Github
+- https://github.com/EmreOvunc/Nagios-Log-Server-2.1.7-Persistent-Cross-Site-Scripting
diff --git a/2020/CVE-2020-25398.md b/2020/CVE-2020-25398.md
index f37aa7fa20..7cd80be0f3 100644
--- a/2020/CVE-2020-25398.md
+++ b/2020/CVE-2020-25398.md
@@ -14,6 +14,7 @@ CSV Injection exists in InterMind iMind Server through 3.13.65 via the csv expor
#### Github
- https://github.com/developer3000S/PoC-in-GitHub
+- https://github.com/h3llraiser/CVE-2020-25398
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2020/CVE-2020-25399.md b/2020/CVE-2020-25399.md
index c73bc736db..f8dbe83616 100644
--- a/2020/CVE-2020-25399.md
+++ b/2020/CVE-2020-25399.md
@@ -14,6 +14,7 @@ Stored XSS in InterMind iMind Server through 3.13.65 allows any user to hijack a
#### Github
- https://github.com/developer3000S/PoC-in-GitHub
+- https://github.com/h3llraiser/CVE-2020-25399
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2020/CVE-2020-25498.md b/2020/CVE-2020-25498.md
index 39270b5fa9..7db5d7bfd1 100644
--- a/2020/CVE-2020-25498.md
+++ b/2020/CVE-2020-25498.md
@@ -18,4 +18,5 @@ Cross Site Scripting (XSS) vulnerability in Beetel router 777VR1 can be exploite
- https://github.com/Live-Hack-CVE/CVE-2020-2549
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/the-girl-who-lived/CVE-2020-25498
diff --git a/2020/CVE-2020-2555.md b/2020/CVE-2020-2555.md
index 17e170f8f1..9bcc7e735f 100644
--- a/2020/CVE-2020-2555.md
+++ b/2020/CVE-2020-2555.md
@@ -23,6 +23,7 @@ Vulnerability in the Oracle Coherence product of Oracle Fusion Middleware (compo
#### Github
- https://github.com/0x727/JNDIExploit
+- https://github.com/0xMarcio/cve
- https://github.com/0xT11/CVE-POC
- https://github.com/0xn0ne/weblogicScanner
- https://github.com/20142995/Goby
diff --git a/2020/CVE-2020-25658.md b/2020/CVE-2020-25658.md
index b0d1ab8472..3eda6ee517 100644
--- a/2020/CVE-2020-25658.md
+++ b/2020/CVE-2020-25658.md
@@ -15,4 +15,5 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/AdiRashkes/python-tda-bug-hunt-0
+- https://github.com/seal-community/patches
diff --git a/2020/CVE-2020-26061.md b/2020/CVE-2020-26061.md
index 50ddecdefd..c2722be37e 100644
--- a/2020/CVE-2020-26061.md
+++ b/2020/CVE-2020-26061.md
@@ -16,5 +16,6 @@ ClickStudios Passwordstate Password Reset Portal prior to build 8501 is affected
- https://github.com/ARPSyndicate/cvemon
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
+- https://github.com/missing0x00/CVE-2020-26061
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2020/CVE-2020-26732.md b/2020/CVE-2020-26732.md
index 3cfac294f1..a89cad5274 100644
--- a/2020/CVE-2020-26732.md
+++ b/2020/CVE-2020-26732.md
@@ -16,4 +16,5 @@ SKYWORTH GN542VF Hardware Version 2.0 and Software Version 2.0.0.16 does not set
- https://github.com/ARPSyndicate/cvemon
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/swzhouu/CVE-2020-26732
diff --git a/2020/CVE-2020-26733.md b/2020/CVE-2020-26733.md
index 49086bcce0..a2b465b10f 100644
--- a/2020/CVE-2020-26733.md
+++ b/2020/CVE-2020-26733.md
@@ -16,4 +16,5 @@ Cross Site Scripting (XSS) in Configuration page in SKYWORTH GN542VF Hardware Ve
- https://github.com/ARPSyndicate/cvemon
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/swzhouu/CVE-2020-26733
diff --git a/2020/CVE-2020-26939.md b/2020/CVE-2020-26939.md
index 48d328b0fa..9db37ca5ea 100644
--- a/2020/CVE-2020-26939.md
+++ b/2020/CVE-2020-26939.md
@@ -17,6 +17,7 @@ No PoCs from references.
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
- https://github.com/IkerSaint/VULNAPP-vulnerable-app
+- https://github.com/LibHunter/LibHunter
- https://github.com/box/box-java-sdk
- https://github.com/pctF/vulnerable-app
diff --git a/2020/CVE-2020-27194.md b/2020/CVE-2020-27194.md
index 844370fad4..83e8806eaa 100644
--- a/2020/CVE-2020-27194.md
+++ b/2020/CVE-2020-27194.md
@@ -15,6 +15,7 @@ An issue was discovered in the Linux kernel before 5.8.15. scalar32_min_max_or i
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Al1ex/LinuxEelvation
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/OrangeGzY/security-research-learning
- https://github.com/XiaozaYa/CVE-Recording
@@ -37,6 +38,7 @@ An issue was discovered in the Linux kernel before 5.8.15. scalar32_min_max_or i
- https://github.com/scannells/exploits
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/willinin/CVE-2020-27194-exp
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xmzyshypnc/CVE-2020-27194
diff --git a/2020/CVE-2020-27352.md b/2020/CVE-2020-27352.md
new file mode 100644
index 0000000000..be4a7aedd5
--- /dev/null
+++ b/2020/CVE-2020-27352.md
@@ -0,0 +1,20 @@
+### [CVE-2020-27352](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27352)
+
+
+
+
+### Description
+
+When generating the systemd service units for the docker snap (and other similar snaps), snapd does not specify Delegate=yes - as a result systemd will move processes from the containers created and managed by these snaps into the cgroup of the main daemon within the snap itself when reloading system units. This may grant additional privileges to a container within the snap that were not originally intended.
+
+### POC
+
+#### Reference
+- https://bugs.launchpad.net/snapd/+bug/1910456
+
+#### Github
+- https://github.com/43622283/awesome-cloud-native-security
+- https://github.com/Metarget/awesome-cloud-native-security
+- https://github.com/atesemre/awesome-cloud-native-security
+- https://github.com/reni2study/Cloud-Native-Security2
+
diff --git a/2020/CVE-2020-27368.md b/2020/CVE-2020-27368.md
index d8f2dcdfd5..3f69267e2c 100644
--- a/2020/CVE-2020-27368.md
+++ b/2020/CVE-2020-27368.md
@@ -16,4 +16,5 @@ Directory Indexing in Login Portal of Login Portal of TOTOLINK-A702R-V1.0.0-B201
- https://github.com/ARPSyndicate/cvemon
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/swzhouu/CVE-2020-27368
diff --git a/2020/CVE-2020-27688.md b/2020/CVE-2020-27688.md
index 8a598c4e03..4fc8e89f47 100644
--- a/2020/CVE-2020-27688.md
+++ b/2020/CVE-2020-27688.md
@@ -16,5 +16,6 @@ RVToolsPasswordEncryption.exe in RVTools 4.0.6 allows users to encrypt passwords
- https://github.com/ARPSyndicate/cvemon
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
+- https://github.com/matthiasmaes/CVE-2020-27688
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2020/CVE-2020-27786.md b/2020/CVE-2020-27786.md
index 1fc43388f7..8a133cf11b 100644
--- a/2020/CVE-2020-27786.md
+++ b/2020/CVE-2020-27786.md
@@ -32,5 +32,6 @@ A flaw was found in the Linux kernel’s implementation of MIDI, where an attack
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2020/CVE-2020-28052.md b/2020/CVE-2020-28052.md
index 6e2baf947b..befb23a293 100644
--- a/2020/CVE-2020-28052.md
+++ b/2020/CVE-2020-28052.md
@@ -21,6 +21,7 @@ An issue was discovered in Legion of the Bouncy Castle BC Java 1.65 and 1.66. Th
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/Live-Hack-CVE/CVE-2020-2805
- https://github.com/Live-Hack-CVE/CVE-2020-28052
- https://github.com/alphaSeclab/sec-daily-2020
diff --git a/2020/CVE-2020-28328.md b/2020/CVE-2020-28328.md
index 0b323c6d74..efe5154df2 100644
--- a/2020/CVE-2020-28328.md
+++ b/2020/CVE-2020-28328.md
@@ -19,5 +19,6 @@ SuiteCRM before 7.11.17 is vulnerable to remote code execution via the system se
- https://github.com/ARPSyndicate/cvemon
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
+- https://github.com/mcorybillington/SuiteCRM-RCE
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2020/CVE-2020-28343.md b/2020/CVE-2020-28343.md
index 89b8be7b44..cfa347a251 100644
--- a/2020/CVE-2020-28343.md
+++ b/2020/CVE-2020-28343.md
@@ -24,5 +24,6 @@ An issue was discovered on Samsung mobile devices with P(9.0) and Q(10.0) (Exyno
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2020/CVE-2020-28373.md b/2020/CVE-2020-28373.md
index bffaa5120f..40e68e580f 100644
--- a/2020/CVE-2020-28373.md
+++ b/2020/CVE-2020-28373.md
@@ -13,5 +13,6 @@ upnpd on certain NETGEAR devices allows remote (LAN) attackers to execute arbitr
- https://github.com/cpeggg/Netgear-upnpd-poc
#### Github
+- https://github.com/cpeggg/Netgear-upnpd-poc
- https://github.com/peanuts62/IOT_CVE
diff --git a/2020/CVE-2020-28588.md b/2020/CVE-2020-28588.md
index 50f4d91509..8e88496aaf 100644
--- a/2020/CVE-2020-28588.md
+++ b/2020/CVE-2020-28588.md
@@ -24,5 +24,6 @@ An information disclosure vulnerability exists in the /proc/pid/syscall function
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2020/CVE-2020-2883.md b/2020/CVE-2020-2883.md
index c81308bcff..d53dd42b89 100644
--- a/2020/CVE-2020-2883.md
+++ b/2020/CVE-2020-2883.md
@@ -15,6 +15,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
#### Github
- https://github.com/0x727/JNDIExploit
+- https://github.com/0xMarcio/cve
- https://github.com/0xT11/CVE-POC
- https://github.com/0xdu/WLExploit
- https://github.com/0xn0ne/weblogicScanner
diff --git a/2020/CVE-2020-29007.md b/2020/CVE-2020-29007.md
index d613d4a46e..8fa7035b0c 100644
--- a/2020/CVE-2020-29007.md
+++ b/2020/CVE-2020-29007.md
@@ -21,4 +21,5 @@ The Score extension through 0.3.0 for MediaWiki has a remote code execution vuln
- https://github.com/mariodon/GeekGame-2nd-Writeup
- https://github.com/mbiel92/Hugo-MB
- https://github.com/mmiszczyk/lilypond-scheme-hacking
+- https://github.com/seqred-s-a/cve-2020-29007
diff --git a/2020/CVE-2020-3452.md b/2020/CVE-2020-3452.md
index 952b4ebd67..819504b0fd 100644
--- a/2020/CVE-2020-3452.md
+++ b/2020/CVE-2020-3452.md
@@ -85,6 +85,7 @@ A vulnerability in the web services interface of Cisco Adaptive Security Applian
- https://github.com/dwisiswant0/awesome-oneliner-bugbounty
- https://github.com/faisalfs10x/Cisco-CVE-2020-3452-shodan-scanner
- https://github.com/faisalfs10x/dirty-scripts
+- https://github.com/fierceoj/ShonyDanza
- https://github.com/foulenzer/CVE-2020-3452
- https://github.com/fuzzlove/Cisco-ASA-FTD-Web-Services-Traversal
- https://github.com/grim3/CVE-2020-3452
diff --git a/2020/CVE-2020-35262.md b/2020/CVE-2020-35262.md
index a893ce2acf..68a2f62528 100644
--- a/2020/CVE-2020-35262.md
+++ b/2020/CVE-2020-35262.md
@@ -17,4 +17,5 @@ Cross Site Scripting (XSS) vulnerability in Digisol DG-HR3400 can be exploited v
- https://github.com/ARPSyndicate/cvemon
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/the-girl-who-lived/CVE-2020-35262
diff --git a/2020/CVE-2020-35488.md b/2020/CVE-2020-35488.md
index 8f4b5bcd81..b6f34925a3 100644
--- a/2020/CVE-2020-35488.md
+++ b/2020/CVE-2020-35488.md
@@ -14,6 +14,7 @@ The fileop module of the NXLog service in NXLog Community Edition 2.10.2150 allo
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/GuillaumePetit84/CVE-2020-35488
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/githubfoam/nxlog-ubuntu-githubactions
- https://github.com/hectorgie/PoC-in-GitHub
diff --git a/2020/CVE-2020-36180.md b/2020/CVE-2020-36180.md
index 83ccfa10b9..ca1ff9df6e 100644
--- a/2020/CVE-2020-36180.md
+++ b/2020/CVE-2020-36180.md
@@ -23,5 +23,6 @@ FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction betwee
- https://github.com/Al1ex/Al1ex
- https://github.com/Al1ex/CVE-2020-36179
- https://github.com/Live-Hack-CVE/CVE-2020-36180
+- https://github.com/enomothem/PenTestNote
- https://github.com/seal-community/patches
diff --git a/2020/CVE-2020-36182.md b/2020/CVE-2020-36182.md
index 1ad4410432..bea0748eb6 100644
--- a/2020/CVE-2020-36182.md
+++ b/2020/CVE-2020-36182.md
@@ -24,6 +24,7 @@ FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction betwee
- https://github.com/Al1ex/CVE-2020-36179
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/Live-Hack-CVE/CVE-2020-36182
- https://github.com/seal-community/patches
diff --git a/2020/CVE-2020-3680.md b/2020/CVE-2020-3680.md
index 51b3c2043d..c59b9d7729 100644
--- a/2020/CVE-2020-3680.md
+++ b/2020/CVE-2020-3680.md
@@ -25,5 +25,6 @@ A race condition can occur when using the fastrpc memory mapping API. in Snapdra
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2020/CVE-2020-3952.md b/2020/CVE-2020-3952.md
index 40c23e9510..f34cbabbe9 100644
--- a/2020/CVE-2020-3952.md
+++ b/2020/CVE-2020-3952.md
@@ -13,6 +13,7 @@ Under certain conditions, vmdir that ships with VMware vCenter Server, as part o
- http://packetstormsecurity.com/files/157896/VMware-vCenter-Server-6.7-Authentication-Bypass.html
#### Github
+- https://github.com/0xMarcio/cve
- https://github.com/0xMrNiko/Awesome-Red-Teaming
- https://github.com/0xT11/CVE-POC
- https://github.com/20142995/sectool
diff --git a/2020/CVE-2020-3956.md b/2020/CVE-2020-3956.md
index 5bdbdf7714..ec3c9f79af 100644
--- a/2020/CVE-2020-3956.md
+++ b/2020/CVE-2020-3956.md
@@ -17,6 +17,7 @@ VMware Cloud Director 10.0.x before 10.0.0.2, 9.7.0.x before 9.7.0.5, 9.5.0.x be
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/aaronsvk/CVE-2020-3956
- https://github.com/alphaSeclab/sec-daily-2020
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
diff --git a/2020/CVE-2020-5844.md b/2020/CVE-2020-5844.md
index 22065cf8a3..95522a7156 100644
--- a/2020/CVE-2020-5844.md
+++ b/2020/CVE-2020-5844.md
@@ -18,6 +18,7 @@ index.php?sec=godmode/extensions&sec2=extensions/files_repo in Pandora FMS v7.0
- https://github.com/1Gould/CVE-2020-5844-exploit
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Live-Hack-CVE/CVE-2020-5844
+- https://github.com/TheCyberGeek/CVE-2020-5844
- https://github.com/UNICORDev/exploit-CVE-2020-5844
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
diff --git a/2020/CVE-2020-5902.md b/2020/CVE-2020-5902.md
index cbc7afec7a..73c23ca4eb 100644
--- a/2020/CVE-2020-5902.md
+++ b/2020/CVE-2020-5902.md
@@ -149,6 +149,7 @@ In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.
- https://github.com/emtee40/win-pentest-tools
- https://github.com/f5devcentral/cve-2020-5902-ioc-bigip-checker
- https://github.com/faisalfs10x/F5-BIG-IP-CVE-2020-5902-shodan-scanner
+- https://github.com/fierceoj/ShonyDanza
- https://github.com/freeFV/CVE-2020-5902-fofa-scan
- https://github.com/freeFV/CVE-2020-6308-mass-exploiter
- https://github.com/gaahrdner/starred
diff --git a/2020/CVE-2020-6427.md b/2020/CVE-2020-6427.md
index c86d4f9198..7d072d2fbf 100644
--- a/2020/CVE-2020-6427.md
+++ b/2020/CVE-2020-6427.md
@@ -15,4 +15,5 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ferdinandmudjialim/metasploit-cve-search
+- https://github.com/tunnelcat/metasploit-cve-search
diff --git a/2020/CVE-2020-7693.md b/2020/CVE-2020-7693.md
index 4b17cee7a2..fe97916c8d 100644
--- a/2020/CVE-2020-7693.md
+++ b/2020/CVE-2020-7693.md
@@ -17,6 +17,7 @@ Incorrect handling of Upgrade header with the value websocket leads in crashing
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/andsnw/sockjs-dos-py
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2020/CVE-2020-7934.md b/2020/CVE-2020-7934.md
index 5943ace1fc..94636c2777 100644
--- a/2020/CVE-2020-7934.md
+++ b/2020/CVE-2020-7934.md
@@ -15,6 +15,7 @@ In LifeRay Portal CE 7.1.0 through 7.2.1 GA2, the First Name, Middle Name, and L
- https://semanticbits.com/liferay-portal-authenticated-xss-disclosure/
#### Github
+- https://github.com/3ndG4me/liferay-xss-7.2.1GA2-poc-report-CVE-2020-7934
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Sergio235705/audit-xss-cve-2020-7934
- https://github.com/developer3000S/PoC-in-GitHub
diff --git a/2020/CVE-2020-7980.md b/2020/CVE-2020-7980.md
index d90a460c67..db8f8cd349 100644
--- a/2020/CVE-2020-7980.md
+++ b/2020/CVE-2020-7980.md
@@ -19,6 +19,7 @@ Intellian Aptus Web 1.24 allows remote attackers to execute arbitrary OS command
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/HimmelAward/Goby_POC
+- https://github.com/Xh4H/Satellian-CVE-2020-7980
- https://github.com/Z0fhack/Goby_POC
- https://github.com/apachecn-archive/Middleware-Vulnerability-detection
- https://github.com/hectorgie/PoC-in-GitHub
diff --git a/2020/CVE-2020-8022.md b/2020/CVE-2020-8022.md
index 17a8b7825f..3a7e5f9bca 100644
--- a/2020/CVE-2020-8022.md
+++ b/2020/CVE-2020-8022.md
@@ -28,5 +28,6 @@ A Incorrect Default Permissions vulnerability in the packaging of tomcat on SUSE
No PoCs from references.
#### Github
+- https://github.com/versio-io/product-lifecycle-security-api
- https://github.com/vincent-deng/veracode-container-security-finding-parser
diff --git a/2020/CVE-2020-8130.md b/2020/CVE-2020-8130.md
index bab3402837..c90fce6594 100644
--- a/2020/CVE-2020-8130.md
+++ b/2020/CVE-2020-8130.md
@@ -14,6 +14,7 @@ There is an OS command injection vulnerability in Ruby Rake < 12.3.3 in Rake::Fi
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/m-mizutani/octovy
- https://github.com/m-mizutani/triview
- https://github.com/wxianfeng/hanzi_to_pinyin
diff --git a/2020/CVE-2020-8504.md b/2020/CVE-2020-8504.md
index d32a4fde57..cd42a24f9d 100644
--- a/2020/CVE-2020-8504.md
+++ b/2020/CVE-2020-8504.md
@@ -13,4 +13,5 @@ School Management Software PHP/mySQL through 2019-03-14 allows office_admin/?act
- https://github.com/J3rryBl4nks/SchoolERPCSRF
#### Github
+- https://github.com/J3rryBl4nks/SchoolERPCSRF
diff --git a/2020/CVE-2020-8505.md b/2020/CVE-2020-8505.md
index 2752eb7162..225afec3ee 100644
--- a/2020/CVE-2020-8505.md
+++ b/2020/CVE-2020-8505.md
@@ -13,4 +13,5 @@ School Management Software PHP/mySQL through 2019-03-14 allows office_admin/?act
- https://github.com/J3rryBl4nks/SchoolERPCSRF
#### Github
+- https://github.com/J3rryBl4nks/SchoolERPCSRF
diff --git a/2020/CVE-2020-8597.md b/2020/CVE-2020-8597.md
index 18c35f6701..8c4f478584 100644
--- a/2020/CVE-2020-8597.md
+++ b/2020/CVE-2020-8597.md
@@ -30,6 +30,7 @@ eap.c in pppd in ppp 2.4.2 through 2.4.8 has an rhostname buffer overflow in the
- https://github.com/YIXINSHUWU/Penetration_Testing_POC
- https://github.com/ZTK-009/Penetration_PoC
- https://github.com/developer3000S/PoC-in-GitHub
+- https://github.com/dointisme/CVE-2020-8597
- https://github.com/hasee2018/Penetration_Testing_POC
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/hktalent/bug-bounty
diff --git a/2020/CVE-2020-8825.md b/2020/CVE-2020-8825.md
index 824f430947..64c001c19e 100644
--- a/2020/CVE-2020-8825.md
+++ b/2020/CVE-2020-8825.md
@@ -17,6 +17,7 @@ index.php?p=/dashboard/settings/branding in Vanilla 2.6.3 allows stored XSS.
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
- https://github.com/developer3000S/PoC-in-GitHub
+- https://github.com/hacky1997/CVE-2020-8825
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/soosmile/POC
diff --git a/2020/CVE-2020-8835.md b/2020/CVE-2020-8835.md
index 24dd4bf811..6ec3d19cfe 100644
--- a/2020/CVE-2020-8835.md
+++ b/2020/CVE-2020-8835.md
@@ -18,6 +18,7 @@ In the Linux kernel 5.5.0 and newer, the bpf verifier (kernel/bpf/verifier.c) di
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Al1ex/LinuxEelvation
- https://github.com/De4dCr0w/Linux-kernel-EoP-exp
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/KatsuragiCSL/Presentations-Blogs-Papers-Tutorials-Books
- https://github.com/OrangeGzY/security-research-learning
@@ -47,6 +48,7 @@ In the Linux kernel 5.5.0 and newer, the bpf verifier (kernel/bpf/verifier.c) di
- https://github.com/snorez/ebpf-fuzzer
- https://github.com/soosmile/POC
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xmzyshypnc/CVE-2020-27194
- https://github.com/yoniko/gctf21_ebpf
diff --git a/2020/CVE-2020-8840.md b/2020/CVE-2020-8840.md
index de3603f5e2..f1a0f56647 100644
--- a/2020/CVE-2020-8840.md
+++ b/2020/CVE-2020-8840.md
@@ -28,6 +28,7 @@ FasterXML jackson-databind 2.0.0 through 2.9.10.2 lacks certain xbean-reflect/JN
- https://github.com/EchoGin404/-
- https://github.com/EchoGin404/gongkaishouji
- https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet
+- https://github.com/LibHunter/LibHunter
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/NetW0rK1le3r/awesome-hacking-lists
- https://github.com/OWASP/www-project-ide-vulscanner
diff --git a/2020/CVE-2020-9014.md b/2020/CVE-2020-9014.md
index 5501c574d7..0b13e633fd 100644
--- a/2020/CVE-2020-9014.md
+++ b/2020/CVE-2020-9014.md
@@ -16,5 +16,6 @@ In Epson iProjection v2.30, the driver file (EMP_NSAU.sys) allows local users to
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Arryboom/Kernel-exploits
+- https://github.com/FULLSHADE/Kernel-exploits
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2020/CVE-2020-9057.md b/2020/CVE-2020-9057.md
index cf3afd24d6..88cecd7d15 100644
--- a/2020/CVE-2020-9057.md
+++ b/2020/CVE-2020-9057.md
@@ -18,4 +18,5 @@ Z-Wave devices based on Silicon Labs 100, 200, and 300 series chipsets do not su
- https://github.com/CNK2100/VFuzz-public
#### Github
+- https://github.com/CNK2100/VFuzz-public
diff --git a/2020/CVE-2020-9058.md b/2020/CVE-2020-9058.md
index e029fe2e07..bc1102e466 100644
--- a/2020/CVE-2020-9058.md
+++ b/2020/CVE-2020-9058.md
@@ -19,4 +19,5 @@ Z-Wave devices based on Silicon Labs 500 series chipsets using CRC-16 encapsulat
- https://github.com/CNK2100/VFuzz-public
#### Github
+- https://github.com/CNK2100/VFuzz-public
diff --git a/2020/CVE-2020-9059.md b/2020/CVE-2020-9059.md
index f384eacde4..684dc8238e 100644
--- a/2020/CVE-2020-9059.md
+++ b/2020/CVE-2020-9059.md
@@ -15,5 +15,6 @@ Z-Wave devices based on Silicon Labs 500 series chipsets using S0 authentication
- https://github.com/CNK2100/VFuzz-public
#### Github
+- https://github.com/CNK2100/VFuzz-public
- https://github.com/Live-Hack-CVE/CVE-2020-9059
diff --git a/2020/CVE-2020-9060.md b/2020/CVE-2020-9060.md
index c329e138de..27048dbbaa 100644
--- a/2020/CVE-2020-9060.md
+++ b/2020/CVE-2020-9060.md
@@ -23,5 +23,6 @@ Z-Wave devices based on Silicon Labs 500 series chipsets using S2, including but
- https://github.com/CNK2100/VFuzz-public
#### Github
+- https://github.com/CNK2100/VFuzz-public
- https://github.com/Live-Hack-CVE/CVE-2020-9060
diff --git a/2020/CVE-2020-9061.md b/2020/CVE-2020-9061.md
index 88c34e293d..2225d8a65e 100644
--- a/2020/CVE-2020-9061.md
+++ b/2020/CVE-2020-9061.md
@@ -21,4 +21,5 @@ Z-Wave devices using Silicon Labs 500 and 700 series chipsets, including but not
- https://github.com/CNK2100/VFuzz-public
#### Github
+- https://github.com/CNK2100/VFuzz-public
diff --git a/2020/CVE-2020-9380.md b/2020/CVE-2020-9380.md
index d33c8d9a41..1f9a2873ae 100644
--- a/2020/CVE-2020-9380.md
+++ b/2020/CVE-2020-9380.md
@@ -19,6 +19,7 @@ IPTV Smarters WEB TV PLAYER through 2020-02-22 allows attackers to execute OS co
- https://github.com/Z0fhack/Goby_POC
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/hectorgie/PoC-in-GitHub
+- https://github.com/migueltarga/CVE-2020-9380
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/soosmile/POC
- https://github.com/xu-xiang/awesome-security-vul-llm
diff --git a/2020/CVE-2020-9453.md b/2020/CVE-2020-9453.md
index bc5884b4e9..8cfa9e9f63 100644
--- a/2020/CVE-2020-9453.md
+++ b/2020/CVE-2020-9453.md
@@ -15,4 +15,5 @@ In Epson iProjection v2.30, the driver file EMP_MPAU.sys allows local users to c
#### Github
- https://github.com/Arryboom/Kernel-exploits
+- https://github.com/FULLSHADE/Kernel-exploits
diff --git a/2020/CVE-2020-9484.md b/2020/CVE-2020-9484.md
index e79472efb1..ff393b1cb0 100644
--- a/2020/CVE-2020-9484.md
+++ b/2020/CVE-2020-9484.md
@@ -100,6 +100,7 @@ When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.
- https://github.com/taielab/awesome-hacking-lists
- https://github.com/tdtc7/qps
- https://github.com/threedr3am/tomcat-cluster-session-sync-exp
+- https://github.com/versio-io/product-lifecycle-security-api
- https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/woods-sega/woodswiki
diff --git a/2020/CVE-2020-9546.md b/2020/CVE-2020-9546.md
index 93e146bc23..ede2d2d42a 100644
--- a/2020/CVE-2020-9546.md
+++ b/2020/CVE-2020-9546.md
@@ -22,6 +22,7 @@ FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction betwee
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
- https://github.com/Dzmitry-Basiachenka/dist-foreign-aliakh
+- https://github.com/LibHunter/LibHunter
- https://github.com/OWASP/www-project-ide-vulscanner
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs
- https://github.com/lnick2023/nicenice
diff --git a/2021/CVE-2021-0341.md b/2021/CVE-2021-0341.md
index 0688f2eff4..efa77fd358 100644
--- a/2021/CVE-2021-0341.md
+++ b/2021/CVE-2021-0341.md
@@ -16,6 +16,7 @@ No PoCs from references.
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/NicheToolkit/rest-toolkit
- https://github.com/TinyNiko/android_bulletin_notes
- https://github.com/au-abd/python-stuff
diff --git a/2021/CVE-2021-0399.md b/2021/CVE-2021-0399.md
index 9e4966a25c..4e8ee8f141 100644
--- a/2021/CVE-2021-0399.md
+++ b/2021/CVE-2021-0399.md
@@ -27,5 +27,6 @@ No PoCs from references.
- https://github.com/nipund513/Exploiting-UAF-by-Ret2bpf-in-Android-Kernel-CVE-2021-0399-
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2021/CVE-2021-0920.md b/2021/CVE-2021-0920.md
index bcc7e81c0b..841142bd23 100644
--- a/2021/CVE-2021-0920.md
+++ b/2021/CVE-2021-0920.md
@@ -27,5 +27,6 @@ No PoCs from references.
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2021/CVE-2021-1048.md b/2021/CVE-2021-1048.md
index 4bb1ff9920..535743f553 100644
--- a/2021/CVE-2021-1048.md
+++ b/2021/CVE-2021-1048.md
@@ -26,5 +26,6 @@ No PoCs from references.
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2021/CVE-2021-1585.md b/2021/CVE-2021-1585.md
index 56665b5ddc..acb0ee7c68 100644
--- a/2021/CVE-2021-1585.md
+++ b/2021/CVE-2021-1585.md
@@ -19,6 +19,7 @@ A vulnerability in the Cisco Adaptive Security Device Manager (ASDM) Launcher co
- https://github.com/WhooAmii/POC_to_review
- https://github.com/anquanscan/sec-tools
- https://github.com/jbaines-r7/cisco_asa_research
+- https://github.com/jbaines-r7/staystaystay
- https://github.com/jbaines-r7/theway
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
diff --git a/2021/CVE-2021-1905.md b/2021/CVE-2021-1905.md
index 0f956c4116..3b096e2a3b 100644
--- a/2021/CVE-2021-1905.md
+++ b/2021/CVE-2021-1905.md
@@ -35,6 +35,7 @@ Possible use after free due to improper handling of memory mapping of multiple p
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/trhacknon/Pocingit
- https://github.com/whoforget/CVE-POC
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/youwizard/CVE-POC
- https://github.com/zecool/cve
diff --git a/2021/CVE-2021-1940.md b/2021/CVE-2021-1940.md
index f0588c1e6e..69f1cc3d2f 100644
--- a/2021/CVE-2021-1940.md
+++ b/2021/CVE-2021-1940.md
@@ -25,5 +25,6 @@ Use after free can occur due to improper handling of response from firmware in S
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2021/CVE-2021-1961.md b/2021/CVE-2021-1961.md
index fea6ec97b4..d4a19fc8f6 100644
--- a/2021/CVE-2021-1961.md
+++ b/2021/CVE-2021-1961.md
@@ -35,6 +35,7 @@ Possible buffer overflow due to lack of offset length check while updating the b
- https://github.com/tamirzb/CVE-2021-1961
- https://github.com/trhacknon/Pocingit
- https://github.com/whoforget/CVE-POC
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/youwizard/CVE-POC
- https://github.com/zecool/cve
diff --git a/2021/CVE-2021-1968.md b/2021/CVE-2021-1968.md
index 7e79f0db2b..218cd56261 100644
--- a/2021/CVE-2021-1968.md
+++ b/2021/CVE-2021-1968.md
@@ -25,5 +25,6 @@ Improper validation of kernel buffer address while copying information back to u
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2021/CVE-2021-1969.md b/2021/CVE-2021-1969.md
index 6c38e1d7bd..feeadc6b9d 100644
--- a/2021/CVE-2021-1969.md
+++ b/2021/CVE-2021-1969.md
@@ -25,5 +25,6 @@ Improper validation of kernel buffer address while copying information back to u
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2021/CVE-2021-20021.md b/2021/CVE-2021-20021.md
index 9eaccc5aba..14a4077f62 100644
--- a/2021/CVE-2021-20021.md
+++ b/2021/CVE-2021-20021.md
@@ -13,6 +13,7 @@ A vulnerability in the SonicWall Email Security version 10.0.9.x allows an attac
No PoCs from references.
#### Github
+- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/SUPRAAA-1337/CVE-2021-20021
diff --git a/2021/CVE-2021-20190.md b/2021/CVE-2021-20190.md
index cea2ea3afd..de12919a13 100644
--- a/2021/CVE-2021-20190.md
+++ b/2021/CVE-2021-20190.md
@@ -15,5 +15,6 @@ A flaw was found in jackson-databind before 2.9.10.7. FasterXML mishandles the i
#### Github
- https://github.com/Anonymous-Phunter/PHunter
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/seal-community/patches
diff --git a/2021/CVE-2021-20226.md b/2021/CVE-2021-20226.md
index d1c891701f..de3c197991 100644
--- a/2021/CVE-2021-20226.md
+++ b/2021/CVE-2021-20226.md
@@ -25,5 +25,6 @@ No PoCs from references.
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2021/CVE-2021-2109.md b/2021/CVE-2021-2109.md
index e546f7ef30..0261d4d752 100644
--- a/2021/CVE-2021-2109.md
+++ b/2021/CVE-2021-2109.md
@@ -29,6 +29,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
- https://github.com/Astrogeorgeonethree/Starred2
- https://github.com/Atem1988/Starred
- https://github.com/BrittanyKuhn/javascript-tutorial
+- https://github.com/CLincat/vulcat
- https://github.com/CVEDB/PoC-List
- https://github.com/Drun1baby/JavaSecurityLearning
- https://github.com/EdgeSecurityTeam/Vulnerability
diff --git a/2021/CVE-2021-21315.md b/2021/CVE-2021-21315.md
index 62a5fabe5c..c76f4884cf 100644
--- a/2021/CVE-2021-21315.md
+++ b/2021/CVE-2021-21315.md
@@ -19,6 +19,7 @@ No PoCs from references.
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/CITIZENDOT/CS547-CVEs
+- https://github.com/CLincat/vulcat
- https://github.com/Elsfa7-110/kenzer-templates
- https://github.com/FB-Sec/exploits
- https://github.com/ForbiddenProgrammer/CVE-2021-21315-PoC
diff --git a/2021/CVE-2021-21551.md b/2021/CVE-2021-21551.md
index 77804213a8..f9196fdbc3 100644
--- a/2021/CVE-2021-21551.md
+++ b/2021/CVE-2021-21551.md
@@ -33,6 +33,7 @@ Dell dbutil_2_3.sys driver contains an insufficient access control vulnerability
- https://github.com/SYRTI/POC_to_review
- https://github.com/SpikySabra/Kernel-Cactus
- https://github.com/SyncroScripting/Artichoke_Consulting
+- https://github.com/TheMalwareGuardian/Awesome-Bootkits-Rootkits-Development
- https://github.com/WhooAmii/POC_to_review
- https://github.com/alfarom256/MCP-PoC
- https://github.com/anquanscan/sec-tools
diff --git a/2021/CVE-2021-2173.md b/2021/CVE-2021-2173.md
index 5a176b7227..551aeafdf7 100644
--- a/2021/CVE-2021-2173.md
+++ b/2021/CVE-2021-2173.md
@@ -19,6 +19,7 @@ Vulnerability in the Recovery component of Oracle Database Server. Supported ver
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
+- https://github.com/emad-almousa/CVE-2021-2173
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2021/CVE-2021-21972.md b/2021/CVE-2021-21972.md
index 0eb9413f8e..86709af1ab 100644
--- a/2021/CVE-2021-21972.md
+++ b/2021/CVE-2021-21972.md
@@ -32,6 +32,7 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability in a v
- https://github.com/B1anda0/CVE-2021-21972
- https://github.com/BugBlocker/lotus-scripts
- https://github.com/ByZain/CVE-2021-21972
+- https://github.com/CLincat/vulcat
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
diff --git a/2021/CVE-2021-22205.md b/2021/CVE-2021-22205.md
index 11e895390b..12dbfaac62 100644
--- a/2021/CVE-2021-22205.md
+++ b/2021/CVE-2021-22205.md
@@ -15,6 +15,7 @@ An issue has been discovered in GitLab CE/EE affecting all versions starting fro
#### Github
- https://github.com/0x0021h/expbox
+- https://github.com/0xMarcio/cve
- https://github.com/0xget/cve-2001-1473
- https://github.com/0xn0ne/simple-scanner
- https://github.com/20142995/Goby
@@ -54,6 +55,7 @@ An issue has been discovered in GitLab CE/EE affecting all versions starting fro
- https://github.com/SexyBeast233/SecBooks
- https://github.com/Threekiii/Awesome-Exploit
- https://github.com/Threekiii/Awesome-POC
+- https://github.com/Threekiii/Awesome-Redteam
- https://github.com/Threekiii/Vulhub-Reproduce
- https://github.com/WhooAmii/POC_to_review
- https://github.com/X1pe0/Automated-Gitlab-RCE
diff --git a/2021/CVE-2021-22555.md b/2021/CVE-2021-22555.md
index 615c5d843e..de85fe6560 100644
--- a/2021/CVE-2021-22555.md
+++ b/2021/CVE-2021-22555.md
@@ -36,6 +36,7 @@ A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in n
- https://github.com/EGI-Federation/SVG-advisories
- https://github.com/Ha0-Y/LinuxKernelExploits
- https://github.com/Ha0-Y/kernel-exploit-cve
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/JoneyJunior/cve-2021-22555
- https://github.com/Metarget/awesome-cloud-native-security
@@ -100,6 +101,7 @@ A heap out-of-bounds write affecting Linux since v2.6.19-rc1 was discovered in n
- https://github.com/veritas501/pipe-primitive
- https://github.com/whoforget/CVE-POC
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/x90hack/vulnerabilty_lab
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xuetusummer/Penetration_Testing_POC
diff --git a/2021/CVE-2021-23134.md b/2021/CVE-2021-23134.md
index 22c04317a7..8b4464928c 100644
--- a/2021/CVE-2021-23134.md
+++ b/2021/CVE-2021-23134.md
@@ -24,5 +24,6 @@ No PoCs from references.
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2021/CVE-2021-24122.md b/2021/CVE-2021-24122.md
index 986fd4bc28..830e8acf56 100644
--- a/2021/CVE-2021-24122.md
+++ b/2021/CVE-2021-24122.md
@@ -22,5 +22,6 @@ When serving resources from a network location using the NTFS file system, Apach
- https://github.com/Threekiii/Awesome-POC
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/mklmfane/betvictor
+- https://github.com/versio-io/product-lifecycle-security-api
- https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
diff --git a/2021/CVE-2021-25122.md b/2021/CVE-2021-25122.md
index 8021ab77e8..ed3c7793a0 100644
--- a/2021/CVE-2021-25122.md
+++ b/2021/CVE-2021-25122.md
@@ -17,5 +17,6 @@ When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/DNTYO/F5_Vulnerability
+- https://github.com/versio-io/product-lifecycle-security-api
- https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
diff --git a/2021/CVE-2021-25329.md b/2021/CVE-2021-25329.md
index 620d6991ed..a0e422afd2 100644
--- a/2021/CVE-2021-25329.md
+++ b/2021/CVE-2021-25329.md
@@ -20,5 +20,6 @@ The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to
- https://github.com/Live-Hack-CVE/CVE-2021-25329
- https://github.com/mklmfane/betvictor
- https://github.com/raner/projo
+- https://github.com/versio-io/product-lifecycle-security-api
- https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
diff --git a/2021/CVE-2021-25369.md b/2021/CVE-2021-25369.md
index 3630441ec0..d316de2c4a 100644
--- a/2021/CVE-2021-25369.md
+++ b/2021/CVE-2021-25369.md
@@ -26,5 +26,6 @@ An improper access control vulnerability in sec_log file prior to SMR MAR-2021 R
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2021/CVE-2021-25370.md b/2021/CVE-2021-25370.md
index 41d1f9185f..f95e5973c1 100644
--- a/2021/CVE-2021-25370.md
+++ b/2021/CVE-2021-25370.md
@@ -26,5 +26,6 @@ An incorrect implementation handling file descriptor in dpu driver prior to SMR
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2021/CVE-2021-25646.md b/2021/CVE-2021-25646.md
index ad66ca6c49..f33f13e8bf 100644
--- a/2021/CVE-2021-25646.md
+++ b/2021/CVE-2021-25646.md
@@ -26,6 +26,7 @@ Apache Druid includes the ability to execute user-provided JavaScript code embed
- https://github.com/Astrogeorgeonethree/Starred2
- https://github.com/Atem1988/Starred
- https://github.com/Awrrays/FrameVul
+- https://github.com/CLincat/vulcat
- https://github.com/EdgeSecurityTeam/Vulnerability
- https://github.com/Elsfa7-110/kenzer-templates
- https://github.com/FDlucifer/firece-fish
diff --git a/2021/CVE-2021-26084.md b/2021/CVE-2021-26084.md
index bfd19f8833..01a5ac1700 100644
--- a/2021/CVE-2021-26084.md
+++ b/2021/CVE-2021-26084.md
@@ -18,6 +18,7 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
#### Github
- https://github.com/0day404/vulnerability-poc
- https://github.com/0x727/ShuiZe_0x727
+- https://github.com/0xMarcio/cve
- https://github.com/0xMrNiko/Awesome-Red-Teaming
- https://github.com/0xf4n9x/CVE-2021-26084
- https://github.com/0xsyr0/OSCP
@@ -110,6 +111,7 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
- https://github.com/dorkerdevil/CVE-2021-26084
- https://github.com/elinakrmova/RedTeam-Tools
- https://github.com/emtee40/win-pentest-tools
+- https://github.com/enomothem/PenTestNote
- https://github.com/fardeen-ahmed/Bug-bounty-Writeups
- https://github.com/h3v0x/CVE-2021-26084_Confluence
- https://github.com/hack-parthsharma/Pentest-Tools
diff --git a/2021/CVE-2021-26085.md b/2021/CVE-2021-26085.md
index be3c3f498b..dd31d54f85 100644
--- a/2021/CVE-2021-26085.md
+++ b/2021/CVE-2021-26085.md
@@ -31,6 +31,7 @@ Affected versions of Atlassian Confluence Server allow remote attackers to view
- https://github.com/e-hakson/OSCP
- https://github.com/eljosep/OSCP-Guide
- https://github.com/emadshanab/Some-BugBounty-Tips-from-my-Twitter-feed
+- https://github.com/enomothem/PenTestNote
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/kgwanjala/oscp-cheatsheet
- https://github.com/manas3c/CVE-POC
diff --git a/2021/CVE-2021-26341.md b/2021/CVE-2021-26341.md
index cc4098f15e..11d57af5ed 100644
--- a/2021/CVE-2021-26341.md
+++ b/2021/CVE-2021-26341.md
@@ -26,5 +26,6 @@ No PoCs from references.
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2021/CVE-2021-26708.md b/2021/CVE-2021-26708.md
index a5a47f861b..5eda063b40 100644
--- a/2021/CVE-2021-26708.md
+++ b/2021/CVE-2021-26708.md
@@ -46,6 +46,7 @@ A local privilege escalation was discovered in the Linux kernel before 5.10.13.
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/trhacknon/Pocingit
- https://github.com/whoforget/CVE-POC
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/x90hack/vulnerabilty_lab
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xuetusummer/Penetration_Testing_POC
diff --git a/2021/CVE-2021-27190.md b/2021/CVE-2021-27190.md
index ca3efe6721..6da253f9e5 100644
--- a/2021/CVE-2021-27190.md
+++ b/2021/CVE-2021-27190.md
@@ -21,6 +21,7 @@ A Stored Cross Site Scripting(XSS) Vulnerability was discovered in PEEL SHOPPING
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
- https://github.com/anmolksachan/CVE
+- https://github.com/anmolksachan/CVE-2021-27190-PEEL-Shopping-cart-9.3.0-Stored-XSS
- https://github.com/anmolksachan/anmolksachan
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/k0mi-tg/CVE-POC
diff --git a/2021/CVE-2021-27201.md b/2021/CVE-2021-27201.md
index 62b9c3e106..40bc7b66e5 100644
--- a/2021/CVE-2021-27201.md
+++ b/2021/CVE-2021-27201.md
@@ -14,4 +14,5 @@ Endian Firewall Community (aka EFW) 3.3.2 allows remote authenticated users to e
- https://www.endian.com/company/news/endian-community-releases-new-version-332-148/
#### Github
+- https://github.com/MucahitSaratar/endian_firewall_authenticated_rce
diff --git a/2021/CVE-2021-27328.md b/2021/CVE-2021-27328.md
index a067822192..7b09135f8e 100644
--- a/2021/CVE-2021-27328.md
+++ b/2021/CVE-2021-27328.md
@@ -22,6 +22,7 @@ Yeastar NeoGate TG400 91.3.0.3 devices are affected by Directory Traversal. An a
- https://github.com/KayCHENvip/vulnerability-poc
- https://github.com/Miraitowa70/POC-Notes
- https://github.com/NaInSec/CVE-PoC-in-GitHub
+- https://github.com/SQSamir/CVE-2021-27328
- https://github.com/SYRTI/POC_to_review
- https://github.com/SexyBeast233/SecBooks
- https://github.com/SouthWind0/southwind0.github.io
diff --git a/2021/CVE-2021-27363.md b/2021/CVE-2021-27363.md
index 2f0c8752e2..68e4f050b8 100644
--- a/2021/CVE-2021-27363.md
+++ b/2021/CVE-2021-27363.md
@@ -31,5 +31,6 @@ An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer lea
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/teresaweber685/book_list
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2021/CVE-2021-27364.md b/2021/CVE-2021-27364.md
index ffd1266f77..a24d277925 100644
--- a/2021/CVE-2021-27364.md
+++ b/2021/CVE-2021-27364.md
@@ -32,5 +32,6 @@ An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_tr
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/teresaweber685/book_list
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2021/CVE-2021-27365.md b/2021/CVE-2021-27365.md
index cd5e3a9e67..2e50d93cbd 100644
--- a/2021/CVE-2021-27365.md
+++ b/2021/CVE-2021-27365.md
@@ -19,6 +19,7 @@ An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data s
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/EGI-Federation/SVG-advisories
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/aaronxie55/Presentation2_Markdown
- https://github.com/bollwarm/SecToolSet
@@ -37,5 +38,6 @@ An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data s
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/teresaweber685/book_list
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2021/CVE-2021-27963.md b/2021/CVE-2021-27963.md
index f8549caa83..25c086203d 100644
--- a/2021/CVE-2021-27963.md
+++ b/2021/CVE-2021-27963.md
@@ -18,6 +18,7 @@ SonLogger before 6.4.1 is affected by user creation with any user permissions pr
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
- https://github.com/developer3000S/PoC-in-GitHub
+- https://github.com/erberkan/SonLogger-vulns
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2021/CVE-2021-27964.md b/2021/CVE-2021-27964.md
index cb9b95c94b..421e3cd8c0 100644
--- a/2021/CVE-2021-27964.md
+++ b/2021/CVE-2021-27964.md
@@ -15,4 +15,5 @@ SonLogger before 6.4.1 is affected by Unauthenticated Arbitrary File Upload. An
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/erberkan/SonLogger-vulns
diff --git a/2021/CVE-2021-28663.md b/2021/CVE-2021-28663.md
index 28b9ffb847..7e28dfb647 100644
--- a/2021/CVE-2021-28663.md
+++ b/2021/CVE-2021-28663.md
@@ -28,6 +28,7 @@ The Arm Mali GPU kernel driver allows privilege escalation or information disclo
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
+- https://github.com/lntrx/CVE-2021-28663
- https://github.com/manas3c/CVE-POC
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/nomi-sec/PoC-in-GitHub
@@ -35,6 +36,7 @@ The Arm Mali GPU kernel driver allows privilege escalation or information disclo
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/trhacknon/Pocingit
- https://github.com/whoforget/CVE-POC
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/youwizard/CVE-POC
- https://github.com/zecool/cve
diff --git a/2021/CVE-2021-29267.md b/2021/CVE-2021-29267.md
index 7611dbd71e..aca2ffdefa 100644
--- a/2021/CVE-2021-29267.md
+++ b/2021/CVE-2021-29267.md
@@ -16,6 +16,7 @@ Sherlock SherlockIM through 2021-03-29 allows Cross Site Scripting (XSS) by leve
- https://github.com/ARPSyndicate/cvemon
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
+- https://github.com/Security-AVS/CVE-2021-29267
- https://github.com/WhooAmii/POC_to_review
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/soosmile/POC
diff --git a/2021/CVE-2021-29337.md b/2021/CVE-2021-29337.md
index 0a52a0a0a0..a830737917 100644
--- a/2021/CVE-2021-29337.md
+++ b/2021/CVE-2021-29337.md
@@ -18,6 +18,7 @@ MODAPI.sys in MSI Dragon Center 2.0.104.0 allows low-privileged users to access
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/rjt-gupta/CVE-2021-29337
- https://github.com/soosmile/POC
- https://github.com/trhacknon/Pocingit
- https://github.com/zecool/cve
diff --git a/2021/CVE-2021-29657.md b/2021/CVE-2021-29657.md
index 8806f36b56..a36a28f601 100644
--- a/2021/CVE-2021-29657.md
+++ b/2021/CVE-2021-29657.md
@@ -26,5 +26,6 @@ arch/x86/kvm/svm/nested.c in the Linux kernel before 5.11.12 has a use-after-fre
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2021/CVE-2021-30146.md b/2021/CVE-2021-30146.md
index a6efd10641..811d899f26 100644
--- a/2021/CVE-2021-30146.md
+++ b/2021/CVE-2021-30146.md
@@ -16,6 +16,7 @@ Seafile 7.0.5 (2019) allows Persistent XSS via the "share of library functionali
- https://github.com/ARPSyndicate/cvemon
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
+- https://github.com/Security-AVS/CVE-2021-30146
- https://github.com/WhooAmii/POC_to_review
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/soosmile/POC
diff --git a/2021/CVE-2021-30640.md b/2021/CVE-2021-30640.md
index 3f8570b457..724d55e7ff 100644
--- a/2021/CVE-2021-30640.md
+++ b/2021/CVE-2021-30640.md
@@ -15,5 +15,5 @@ A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authent
- https://www.oracle.com/security-alerts/cpuoct2021.html
#### Github
-No PoCs found on GitHub currently.
+- https://github.com/versio-io/product-lifecycle-security-api
diff --git a/2021/CVE-2021-3120.md b/2021/CVE-2021-3120.md
index 570832dee5..67b3fb5a3b 100644
--- a/2021/CVE-2021-3120.md
+++ b/2021/CVE-2021-3120.md
@@ -13,4 +13,5 @@ An arbitrary file upload vulnerability in the YITH WooCommerce Gift Cards Premiu
- https://github.com/guy-liu/yith-giftdrop
#### Github
+- https://github.com/guy-liu/yith-giftdrop
diff --git a/2021/CVE-2021-3129.md b/2021/CVE-2021-3129.md
index e11136e308..b401c0a75c 100644
--- a/2021/CVE-2021-3129.md
+++ b/2021/CVE-2021-3129.md
@@ -17,6 +17,7 @@ Ignition before 2.5.2, as used in Laravel and other products, allows unauthentic
- https://github.com/0day404/vulnerability-poc
- https://github.com/0day666/Vulnerability-verification
- https://github.com/0nion1/CVE-2021-3129
+- https://github.com/0xMarcio/cve
- https://github.com/0xStrygwyr/OSCP-Guide
- https://github.com/0xZipp0/OSCP
- https://github.com/0xaniketB/HackTheBox-Horizontall
diff --git a/2021/CVE-2021-31440.md b/2021/CVE-2021-31440.md
index faca39d715..b7b25f50d1 100644
--- a/2021/CVE-2021-31440.md
+++ b/2021/CVE-2021-31440.md
@@ -16,6 +16,7 @@ This vulnerability allows local attackers to escalate privileges on affected ins
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Al1ex/LinuxEelvation
- https://github.com/ChoKyuWon/exploit_articles
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/XiaozaYa/CVE-Recording
- https://github.com/adavarski/HomeLab-Proxmox-k8s-DevSecOps-playground
diff --git a/2021/CVE-2021-3164.md b/2021/CVE-2021-3164.md
index e545ebd27e..c7973ff168 100644
--- a/2021/CVE-2021-3164.md
+++ b/2021/CVE-2021-3164.md
@@ -21,6 +21,7 @@ ChurchRota 2.6.4 is vulnerable to authenticated remote code execution. The user
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/rmccarth/cve-2021-3164
- https://github.com/soosmile/POC
- https://github.com/trhacknon/Pocingit
- https://github.com/whoforget/CVE-POC
diff --git a/2021/CVE-2021-31760.md b/2021/CVE-2021-31760.md
index 228dac5bc8..69f9b5fb32 100644
--- a/2021/CVE-2021-31760.md
+++ b/2021/CVE-2021-31760.md
@@ -19,11 +19,13 @@ Webmin 1.973 is affected by Cross Site Request Forgery (CSRF) to achieve Remote
- https://github.com/ARPSyndicate/cvemon
- https://github.com/EdgeSecurityTeam/Vulnerability
- https://github.com/KayCHENvip/vulnerability-poc
+- https://github.com/Mesh3l911/CVE-2021-31760
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/Threekiii/Awesome-POC
- https://github.com/WhooAmii/POC_to_review
- https://github.com/d4n-sec/d4n-sec.github.io
+- https://github.com/electronicbots/CVE-2021-31760
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/soosmile/POC
- https://github.com/trhacknon/Pocingit
diff --git a/2021/CVE-2021-31761.md b/2021/CVE-2021-31761.md
index 2cd1147c27..54203763b9 100644
--- a/2021/CVE-2021-31761.md
+++ b/2021/CVE-2021-31761.md
@@ -16,9 +16,11 @@ Webmin 1.973 is affected by reflected Cross Site Scripting (XSS) to achieve Remo
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/Mesh3l911/CVE-2021-31761
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
+- https://github.com/electronicbots/CVE-2021-31761
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/soosmile/POC
- https://github.com/trhacknon/Pocingit
diff --git a/2021/CVE-2021-31762.md b/2021/CVE-2021-31762.md
index 2049a50dc3..5154816d56 100644
--- a/2021/CVE-2021-31762.md
+++ b/2021/CVE-2021-31762.md
@@ -17,9 +17,11 @@ Webmin 1.973 is affected by Cross Site Request Forgery (CSRF) to create a privil
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/Mesh3l911/CVE-2021-31762
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
+- https://github.com/electronicbots/CVE-2021-31762
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/soosmile/POC
- https://github.com/trhacknon/Pocingit
diff --git a/2021/CVE-2021-32156.md b/2021/CVE-2021-32156.md
index 0a23358a5b..fbec6b889d 100644
--- a/2021/CVE-2021-32156.md
+++ b/2021/CVE-2021-32156.md
@@ -14,6 +14,7 @@ A cross-site request forgery (CSRF) vulnerability exists in Webmin 1.973 via the
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/Mesh3l911/CVE-2021-32156
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
diff --git a/2021/CVE-2021-32157.md b/2021/CVE-2021-32157.md
index 22c00ee809..d154f5be8a 100644
--- a/2021/CVE-2021-32157.md
+++ b/2021/CVE-2021-32157.md
@@ -14,6 +14,7 @@ A Cross-Site Scripting (XSS) vulnerability exists in Webmin 1.973 via the Schedu
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/Mesh3l911/CVE-2021-32157
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
diff --git a/2021/CVE-2021-32158.md b/2021/CVE-2021-32158.md
index b66f7f529c..a38e56520c 100644
--- a/2021/CVE-2021-32158.md
+++ b/2021/CVE-2021-32158.md
@@ -14,6 +14,7 @@ A Cross-Site Scripting (XSS) vulnerability exists in Webmin 1.973 via the Upload
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/Mesh3l911/CVE-2021-32158
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
diff --git a/2021/CVE-2021-32159.md b/2021/CVE-2021-32159.md
index 86bb1df6c1..664bdc4769 100644
--- a/2021/CVE-2021-32159.md
+++ b/2021/CVE-2021-32159.md
@@ -14,6 +14,7 @@ A Cross-site request forgery (CSRF) vulnerability exists in Webmin 1.973 via the
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/Mesh3l911/CVE-2021-32159
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
diff --git a/2021/CVE-2021-32160.md b/2021/CVE-2021-32160.md
index 92746c8e76..18344f021a 100644
--- a/2021/CVE-2021-32160.md
+++ b/2021/CVE-2021-32160.md
@@ -14,6 +14,7 @@ A Cross-Site Scripting (XSS) vulnerability exists in Webmin 1.973 through the Ad
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/Mesh3l911/CVE-2021-32160
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
diff --git a/2021/CVE-2021-32161.md b/2021/CVE-2021-32161.md
index 9464fd2ade..5a85c9a3dc 100644
--- a/2021/CVE-2021-32161.md
+++ b/2021/CVE-2021-32161.md
@@ -14,6 +14,7 @@ A Cross-Site Scripting (XSS) vulnerability exists in Webmin 1.973 through the Fi
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/Mesh3l911/CVE-2021-32161
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
diff --git a/2021/CVE-2021-32162.md b/2021/CVE-2021-32162.md
index 7d8e568b04..2a63df5965 100644
--- a/2021/CVE-2021-32162.md
+++ b/2021/CVE-2021-32162.md
@@ -14,6 +14,7 @@ A Cross-site request forgery (CSRF) vulnerability exists in Webmin 1.973 through
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/Mesh3l911/CVE-2021-32162
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
diff --git a/2021/CVE-2021-32606.md b/2021/CVE-2021-32606.md
index 0fb608279a..e662f52684 100644
--- a/2021/CVE-2021-32606.md
+++ b/2021/CVE-2021-32606.md
@@ -25,5 +25,6 @@ No PoCs from references.
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2021/CVE-2021-3291.md b/2021/CVE-2021-3291.md
index 73e96b97ff..7ebbcaa12a 100644
--- a/2021/CVE-2021-3291.md
+++ b/2021/CVE-2021-3291.md
@@ -17,6 +17,7 @@ Zen Cart 1.5.7b allows admins to execute arbitrary OS commands by inspecting an
- https://github.com/ARPSyndicate/cvemon
- https://github.com/EdgeSecurityTeam/Vulnerability
- https://github.com/ImHades101/CVE-2021-3291
+- https://github.com/MucahitSaratar/zencart_auth_rce_poc
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
diff --git a/2021/CVE-2021-33037.md b/2021/CVE-2021-33037.md
index 3632ee3851..57ec6d2e81 100644
--- a/2021/CVE-2021-33037.md
+++ b/2021/CVE-2021-33037.md
@@ -18,4 +18,5 @@ Apache Tomcat 10.0.0-M1 to 10.0.6, 9.0.0.M1 to 9.0.46 and 8.5.0 to 8.5.66 did no
#### Github
- https://github.com/Dzmitry-Basiachenka/dist-foreign-aliakh
+- https://github.com/versio-io/product-lifecycle-security-api
diff --git a/2021/CVE-2021-33558.md b/2021/CVE-2021-33558.md
index 24feca5784..44b39976d4 100644
--- a/2021/CVE-2021-33558.md
+++ b/2021/CVE-2021-33558.md
@@ -19,6 +19,7 @@
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
- https://github.com/anldori/CVE-2021-33558
+- https://github.com/mdanzaruddin/CVE-2021-33558.
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/soosmile/POC
- https://github.com/trhacknon/Pocingit
diff --git a/2021/CVE-2021-33564.md b/2021/CVE-2021-33564.md
index d7e1566607..1ff5ec2a82 100644
--- a/2021/CVE-2021-33564.md
+++ b/2021/CVE-2021-33564.md
@@ -25,6 +25,7 @@ An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby a
- https://github.com/dorkerdevil/CVE-2021-33564
- https://github.com/harsh-bothra/learn365
- https://github.com/markevans/dragonfly
+- https://github.com/mlr0p/CVE-2021-33564
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/rodolfomarianocy/OSCP-Tricks-2023
- https://github.com/soosmile/POC
diff --git a/2021/CVE-2021-3378.md b/2021/CVE-2021-3378.md
index 596528c292..e36e3764e7 100644
--- a/2021/CVE-2021-3378.md
+++ b/2021/CVE-2021-3378.md
@@ -26,6 +26,7 @@ FortiLogger 4.4.2.2 is affected by Arbitrary File Upload by sending a "Content-T
- https://github.com/Z0fhack/Goby_POC
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/developer3000S/PoC-in-GitHub
+- https://github.com/erberkan/fortilogger_arbitrary_fileupload
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2021/CVE-2021-33909.md b/2021/CVE-2021-33909.md
index 2dbedf5a0a..934e47158a 100644
--- a/2021/CVE-2021-33909.md
+++ b/2021/CVE-2021-33909.md
@@ -51,6 +51,7 @@ fs/seq_file.c in the Linux kernel 3.16 through 5.13.x before 5.13.4 does not pro
- https://github.com/sfowl/deep-directory
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xuetusummer/Penetration_Testing_POC
diff --git a/2021/CVE-2021-34527.md b/2021/CVE-2021-34527.md
index 703c46b554..40aea3cac8 100644
--- a/2021/CVE-2021-34527.md
+++ b/2021/CVE-2021-34527.md
@@ -51,6 +51,7 @@
#### Github
- https://github.com/0x6d69636b/windows_hardening
- https://github.com/0x727/usefull-elevation-of-privilege
+- https://github.com/0xMarcio/cve
- https://github.com/0xStrygwyr/OSCP-Guide
- https://github.com/0xZipp0/OSCP
- https://github.com/0xaniketB/HackTheBox-Driver
diff --git a/2021/CVE-2021-34866.md b/2021/CVE-2021-34866.md
index b27b9dd9e4..15b05b28c1 100644
--- a/2021/CVE-2021-34866.md
+++ b/2021/CVE-2021-34866.md
@@ -25,5 +25,6 @@ No PoCs from references.
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2021/CVE-2021-3490.md b/2021/CVE-2021-3490.md
index e67d60d97c..dfce8c8408 100644
--- a/2021/CVE-2021-3490.md
+++ b/2021/CVE-2021-3490.md
@@ -18,6 +18,7 @@ The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux ke
- https://github.com/20142995/sectool
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Al1ex/LinuxEelvation
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/IdanBanani/Linux-Kernel-VR-Exploitation
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Mr-xn/Penetration_Testing_POC
@@ -54,6 +55,7 @@ The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux ke
- https://github.com/trhacknon/Pocingit
- https://github.com/whoforget/CVE-POC
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/youwizard/CVE-POC
diff --git a/2021/CVE-2021-3492.md b/2021/CVE-2021-3492.md
index ec106678c8..539e27115b 100644
--- a/2021/CVE-2021-3492.md
+++ b/2021/CVE-2021-3492.md
@@ -37,6 +37,7 @@ Shiftfs, an out-of-tree stacking file system included in Ubuntu Linux kernels, d
- https://github.com/synacktiv/CVE-2021-3492
- https://github.com/trhacknon/Pocingit
- https://github.com/whoforget/CVE-POC
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/youwizard/CVE-POC
- https://github.com/zecool/cve
diff --git a/2021/CVE-2021-3493.md b/2021/CVE-2021-3493.md
index d89b7403c6..2a3e779fce 100644
--- a/2021/CVE-2021-3493.md
+++ b/2021/CVE-2021-3493.md
@@ -17,6 +17,7 @@ The overlayfs implementation in the linux kernel did not properly validate with
#### Github
- https://github.com/0day404/vulnerability-poc
+- https://github.com/0xMarcio/cve
- https://github.com/0xMat10/eJPT_Prep
- https://github.com/0xWhoami35/root-kernel
- https://github.com/0xsyr0/OSCP
@@ -35,6 +36,7 @@ The overlayfs implementation in the linux kernel did not properly validate with
- https://github.com/GhostTroops/TOP
- https://github.com/GibzB/THM-Captured-Rooms
- https://github.com/H0j3n/EzpzCheatSheet
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/Ishan3011/CVE-2021-3493
- https://github.com/JERRY123S/all-poc
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
@@ -109,6 +111,7 @@ The overlayfs implementation in the linux kernel did not properly validate with
- https://github.com/tzwlhack/Vulnerability
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/whoforget/CVE-POC
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xhref/OSCP
- https://github.com/xuetusummer/Penetration_Testing_POC
diff --git a/2021/CVE-2021-35296.md b/2021/CVE-2021-35296.md
index f0a938a082..3e526b3fc6 100644
--- a/2021/CVE-2021-35296.md
+++ b/2021/CVE-2021-35296.md
@@ -17,6 +17,7 @@ An issue in the administrator authentication panel of PTCL HG150-Ub v3.0 allows
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
+- https://github.com/afaq1337/CVE-2021-35296
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/soosmile/POC
- https://github.com/trhacknon/Pocingit
diff --git a/2021/CVE-2021-3573.md b/2021/CVE-2021-3573.md
index de0ea246e9..56109f2e77 100644
--- a/2021/CVE-2021-3573.md
+++ b/2021/CVE-2021-3573.md
@@ -26,5 +26,6 @@ A use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subs
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2021/CVE-2021-35975.md b/2021/CVE-2021-35975.md
index a54a9a70d3..6f9e12c1ad 100644
--- a/2021/CVE-2021-35975.md
+++ b/2021/CVE-2021-35975.md
@@ -16,6 +16,7 @@ Absolute path traversal vulnerability in the Systematica SMTP Adapter component
- https://github.com/ARPSyndicate/cvemon
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/WhooAmii/POC_to_review
+- https://github.com/fbkcs/CVE-2021-35975
- https://github.com/soosmile/POC
- https://github.com/trump88/CVE-2021-35975
- https://github.com/zecool/cve
diff --git a/2021/CVE-2021-3609.md b/2021/CVE-2021-3609.md
index dab276b326..53b8a27f1c 100644
--- a/2021/CVE-2021-3609.md
+++ b/2021/CVE-2021-3609.md
@@ -24,5 +24,6 @@
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2021/CVE-2021-36260.md b/2021/CVE-2021-36260.md
index a049994230..6160543271 100644
--- a/2021/CVE-2021-36260.md
+++ b/2021/CVE-2021-36260.md
@@ -15,6 +15,7 @@ A command injection vulnerability in the web server of some Hikvision product. D
#### Github
- https://github.com/0day404/vulnerability-poc
+- https://github.com/0xMarcio/cve
- https://github.com/1f3lse/taiE
- https://github.com/20142995/Goby
- https://github.com/20142995/sectool
diff --git a/2021/CVE-2021-36460.md b/2021/CVE-2021-36460.md
index ee57ef619b..2b822fb5ad 100644
--- a/2021/CVE-2021-36460.md
+++ b/2021/CVE-2021-36460.md
@@ -18,6 +18,7 @@ VeryFitPro (com.veryfit2hr.second) 3.2.8 hashes the account's password locally o
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
- https://github.com/karimhabush/cyberowl
+- https://github.com/martinfrancois/CVE-2021-36460
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/trhacknon/Pocingit
- https://github.com/zecool/cve
diff --git a/2021/CVE-2021-36563.md b/2021/CVE-2021-36563.md
index 6ac6bb103a..b2afae04bf 100644
--- a/2021/CVE-2021-36563.md
+++ b/2021/CVE-2021-36563.md
@@ -14,6 +14,7 @@ The CheckMK management web console (versions 1.5.0 to 2.0.0) does not sanitise u
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/Edgarloyola/CVE-2021-36563
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
diff --git a/2021/CVE-2021-36749.md b/2021/CVE-2021-36749.md
index 67e87890d7..62eb145f98 100644
--- a/2021/CVE-2021-36749.md
+++ b/2021/CVE-2021-36749.md
@@ -21,6 +21,7 @@ No PoCs from references.
- https://github.com/ArrestX/--POC
- https://github.com/Awrrays/FrameVul
- https://github.com/BrucessKING/CVE-2021-36749
+- https://github.com/CLincat/vulcat
- https://github.com/HimmelAward/Goby_POC
- https://github.com/Ilovewomen/db_script_v2
- https://github.com/Ilovewomen/db_script_v2_2
diff --git a/2021/CVE-2021-36799.md b/2021/CVE-2021-36799.md
index 9dd15b6dc7..df1d654542 100644
--- a/2021/CVE-2021-36799.md
+++ b/2021/CVE-2021-36799.md
@@ -19,6 +19,7 @@
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/robertguetzkow/ets5-password-recovery
- https://github.com/robertguetzkow/robertguetzkow
- https://github.com/soosmile/POC
- https://github.com/trhacknon/Pocingit
diff --git a/2021/CVE-2021-36981.md b/2021/CVE-2021-36981.md
index 177d5b8236..7f79143011 100644
--- a/2021/CVE-2021-36981.md
+++ b/2021/CVE-2021-36981.md
@@ -13,6 +13,7 @@ In the server in SerNet verinice before 1.22.2, insecure Java deserialization al
- https://github.com/0xBrAinsTorM/CVE-2021-36981
#### Github
+- https://github.com/0xBrAinsTorM/CVE-2021-36981
- https://github.com/ARPSyndicate/cvemon
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2021/CVE-2021-3715.md b/2021/CVE-2021-3715.md
index ba9aa7488b..d469c31d18 100644
--- a/2021/CVE-2021-3715.md
+++ b/2021/CVE-2021-3715.md
@@ -30,5 +30,6 @@ A flaw was found in the "Routing decision" classifier in the Linux kernel's Traf
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2021/CVE-2021-37740.md b/2021/CVE-2021-37740.md
index 5b1b6a28e8..3abd833b8c 100644
--- a/2021/CVE-2021-37740.md
+++ b/2021/CVE-2021-37740.md
@@ -19,6 +19,7 @@ A denial of service vulnerability exists in MDT's firmware for the KNXnet/IP Sec
- https://github.com/WhooAmii/POC_to_review
- https://github.com/anquanscan/sec-tools
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/robertguetzkow/CVE-2021-37740
- https://github.com/robertguetzkow/robertguetzkow
- https://github.com/trhacknon/Pocingit
- https://github.com/zecool/cve
diff --git a/2021/CVE-2021-38149.md b/2021/CVE-2021-38149.md
index e994ab6c61..09de35602f 100644
--- a/2021/CVE-2021-38149.md
+++ b/2021/CVE-2021-38149.md
@@ -14,4 +14,5 @@ index.php/admin/add_user in Chikitsa Patient Management System 2.0.0 allows XSS.
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/jboogie15/CVE-2021-38149
diff --git a/2021/CVE-2021-38185.md b/2021/CVE-2021-38185.md
index f0f4ecabaf..4e397ef16b 100644
--- a/2021/CVE-2021-38185.md
+++ b/2021/CVE-2021-38185.md
@@ -15,5 +15,6 @@ GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted p
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Jauler/cve2021-3156-sudo-heap-overflow
+- https://github.com/fangqyi/cpiopwn
- https://github.com/fokypoky/places-list
diff --git a/2021/CVE-2021-38647.md b/2021/CVE-2021-38647.md
index 1528cef0ae..2746a99b81 100644
--- a/2021/CVE-2021-38647.md
+++ b/2021/CVE-2021-38647.md
@@ -28,6 +28,7 @@ Open Management Infrastructure Remote Code Execution Vulnerability
- http://packetstormsecurity.com/files/164694/Microsoft-OMI-Management-Interface-Authentication-Bypass.html
#### Github
+- https://github.com/0xMarcio/cve
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/AlteredSecurity/CVE-2021-38647
diff --git a/2021/CVE-2021-38699.md b/2021/CVE-2021-38699.md
index 3b7f03cc30..cdc4d3b6fd 100644
--- a/2021/CVE-2021-38699.md
+++ b/2021/CVE-2021-38699.md
@@ -18,6 +18,8 @@ TastyIgniter 3.0.7 allows XSS via /account, /reservation, /admin/dashboard, and
- https://github.com/2lambda123/CVE-mitre
- https://github.com/2lambda123/Windows10Exploits
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/HuskyHacks/CVE-2021-38699-Reflected-XSS
+- https://github.com/HuskyHacks/CVE-2021-38699-Stored-XSS
- https://github.com/Justin-1993/CVE-2021-38699
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-mitre
diff --git a/2021/CVE-2021-39322.md b/2021/CVE-2021-39322.md
index 2aa987073c..cbb78febef 100644
--- a/2021/CVE-2021-39322.md
+++ b/2021/CVE-2021-39322.md
@@ -10,7 +10,7 @@ The Easy Social Icons plugin <= 3.0.8 for WordPress echoes out the raw value of
### POC
#### Reference
-No PoCs from references.
+- https://wpvulndb.com/vulnerabilities/5e0bf0b6-9809-426b-b1d4-1fb653083b58
#### Github
- https://github.com/ARPSyndicate/cvemon
diff --git a/2021/CVE-2021-39815.md b/2021/CVE-2021-39815.md
index 61e3b9b608..460b9dcfad 100644
--- a/2021/CVE-2021-39815.md
+++ b/2021/CVE-2021-39815.md
@@ -24,5 +24,6 @@ No PoCs from references.
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2021/CVE-2021-40154.md b/2021/CVE-2021-40154.md
index e95b8c397a..b6b68e0924 100644
--- a/2021/CVE-2021-40154.md
+++ b/2021/CVE-2021-40154.md
@@ -15,6 +15,7 @@ NXP LPC55S69 devices before A3 have a buffer over-read via a crafted wlength val
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Jeromeyoung/CVE-2021-40154
+- https://github.com/Xen1thLabs-AE/CVE-2021-40154
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/soosmile/POC
diff --git a/2021/CVE-2021-4034.md b/2021/CVE-2021-4034.md
index d2e69a0f8f..d19eb949b0 100644
--- a/2021/CVE-2021-4034.md
+++ b/2021/CVE-2021-4034.md
@@ -82,6 +82,7 @@ A local privilege escalation vulnerability was found on polkit's pkexec utility.
- https://github.com/H3arn/hackergame-2022-writeup
- https://github.com/HadessCS/Awesome-Privilege-Escalation
- https://github.com/HattMobb/TryHackMe-Bugle-Machine-Writeup-Walkthrough
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/HellGateCorp/pwnkit
- https://github.com/HrishitJoshi/CVE-2021-4034
- https://github.com/IBM-Cloud/vpc-ha-iac
diff --git a/2021/CVE-2021-40845.md b/2021/CVE-2021-40845.md
index 911c81a015..ec2449ec4f 100644
--- a/2021/CVE-2021-40845.md
+++ b/2021/CVE-2021-40845.md
@@ -19,4 +19,5 @@ The web part of Zenitel AlphaCom XE Audio Server through 11.2.3.10, called Alpha
- https://github.com/ARPSyndicate/cvemon
- https://github.com/FDlucifer/firece-fish
- https://github.com/anquanscan/sec-tools
+- https://github.com/ricardojoserf/CVE-2021-40845
diff --git a/2021/CVE-2021-40875.md b/2021/CVE-2021-40875.md
index d52d7c0dc9..920a103f4f 100644
--- a/2021/CVE-2021-40875.md
+++ b/2021/CVE-2021-40875.md
@@ -20,6 +20,7 @@ Improper Access Control in Gurock TestRail versions < 7.2.0.3014 resulted in sen
- https://github.com/Lul/TestRail-files.md5-IAC-scanner
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
+- https://github.com/SakuraSamuraii/derailed
- https://github.com/StarCrossPortal/scalpel
- https://github.com/WhooAmii/POC_to_review
- https://github.com/Z0fhack/Goby_POC
diff --git a/2021/CVE-2021-40904.md b/2021/CVE-2021-40904.md
index c07085b22c..640b399a93 100644
--- a/2021/CVE-2021-40904.md
+++ b/2021/CVE-2021-40904.md
@@ -14,6 +14,7 @@ The web management console of CheckMK Raw Edition (versions 1.5.0 to 1.6.0) allo
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/Edgarloyola/CVE-2021-40904
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
diff --git a/2021/CVE-2021-40906.md b/2021/CVE-2021-40906.md
index 452ad58385..a803072bc8 100644
--- a/2021/CVE-2021-40906.md
+++ b/2021/CVE-2021-40906.md
@@ -14,6 +14,7 @@ CheckMK Raw Edition software (versions 1.5.0 to 1.6.0) does not sanitise the inp
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/Edgarloyola/CVE-2021-40906
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
diff --git a/2021/CVE-2021-40978.md b/2021/CVE-2021-40978.md
index 65f2dbd5c8..84b41a1598 100644
--- a/2021/CVE-2021-40978.md
+++ b/2021/CVE-2021-40978.md
@@ -28,6 +28,7 @@
- https://github.com/WhooAmii/POC_to_review
- https://github.com/Z0fhack/Goby_POC
- https://github.com/d4n-sec/d4n-sec.github.io
+- https://github.com/nisdn/CVE-2021-40978
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/trhacknon/Pocingit
- https://github.com/xinyisleep/pocscan
diff --git a/2021/CVE-2021-41073.md b/2021/CVE-2021-41073.md
index 62bfa655f8..94cdd917b6 100644
--- a/2021/CVE-2021-41073.md
+++ b/2021/CVE-2021-41073.md
@@ -17,6 +17,7 @@ loop_rw_iter in fs/io_uring.c in the Linux kernel 5.10 through 5.14.6 allows loc
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Ch4nc3n/PublicExploitation
- https://github.com/DarkFunct/CVE_Exploits
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
@@ -41,6 +42,7 @@ loop_rw_iter in fs/io_uring.c in the Linux kernel 5.10 through 5.14.6 allows loc
- https://github.com/star-sg/CVE
- https://github.com/trhacknon/CVE2
- https://github.com/trhacknon/Pocingit
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/zecool/cve
- https://github.com/zzcentury/PublicExploitation
diff --git a/2021/CVE-2021-41079.md b/2021/CVE-2021-41079.md
index 022fb46e99..43d8ebe914 100644
--- a/2021/CVE-2021-41079.md
+++ b/2021/CVE-2021-41079.md
@@ -15,4 +15,5 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/chnzzh/OpenSSL-CVE-lib
+- https://github.com/versio-io/product-lifecycle-security-api
diff --git a/2021/CVE-2021-41511.md b/2021/CVE-2021-41511.md
index 62b5d7f9fd..79afed1ac3 100644
--- a/2021/CVE-2021-41511.md
+++ b/2021/CVE-2021-41511.md
@@ -19,6 +19,7 @@ The username and password field of login in Lodging Reservation Management Syste
- https://github.com/2lambda123/CVE-mitre
- https://github.com/2lambda123/Windows10Exploits
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/Ni7inSharma/CVE-2021-41511
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
diff --git a/2021/CVE-2021-4154.md b/2021/CVE-2021-4154.md
index 0094071276..ee1539d1cd 100644
--- a/2021/CVE-2021-4154.md
+++ b/2021/CVE-2021-4154.md
@@ -14,6 +14,7 @@ A use-after-free flaw was found in cgroup1_parse_param in kernel/cgroup/cgroup-v
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Markakd/CVE-2021-4154
- https://github.com/Markakd/DirtyCred
diff --git a/2021/CVE-2021-41647.md b/2021/CVE-2021-41647.md
index b3c57c20e3..1a2e8cd5e4 100644
--- a/2021/CVE-2021-41647.md
+++ b/2021/CVE-2021-41647.md
@@ -18,6 +18,7 @@ An un-authenticated error-based and time-based blind SQL injection vulnerability
- https://github.com/2lambda123/CVE-mitre
- https://github.com/2lambda123/Windows10Exploits
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/MobiusBinary/CVE-2021-41647
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
diff --git a/2021/CVE-2021-41648.md b/2021/CVE-2021-41648.md
index b0cb62e147..dbe543c1a2 100644
--- a/2021/CVE-2021-41648.md
+++ b/2021/CVE-2021-41648.md
@@ -19,6 +19,7 @@ An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-syste
- https://github.com/2lambda123/Windows10Exploits
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
+- https://github.com/MobiusBinary/CVE-2021-41648
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
diff --git a/2021/CVE-2021-41946.md b/2021/CVE-2021-41946.md
index 7b9d639cbd..461d8a7b19 100644
--- a/2021/CVE-2021-41946.md
+++ b/2021/CVE-2021-41946.md
@@ -17,6 +17,7 @@ In FiberHome VDSL2 Modem HG150-Ub_V3.0, a stored cross-site scripting (XSS) vuln
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
+- https://github.com/afaq1337/CVE-2021-41946
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/trhacknon/Pocingit
- https://github.com/zecool/cve
diff --git a/2021/CVE-2021-42008.md b/2021/CVE-2021-42008.md
index 7ff881ae04..fc67273ee1 100644
--- a/2021/CVE-2021-42008.md
+++ b/2021/CVE-2021-42008.md
@@ -18,6 +18,7 @@ The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel bef
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Al1ex/LinuxEelvation
- https://github.com/BachoSeven/stellestelline
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
@@ -40,6 +41,7 @@ The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel bef
- https://github.com/soosmile/POC
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/trhacknon/Pocingit
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/zecool/cve
diff --git a/2021/CVE-2021-4204.md b/2021/CVE-2021-4204.md
index a02de60b16..2355782ff2 100644
--- a/2021/CVE-2021-4204.md
+++ b/2021/CVE-2021-4204.md
@@ -36,6 +36,7 @@ No PoCs from references.
- https://github.com/tr3ee/CVE-2021-4204
- https://github.com/trhacknon/Pocingit
- https://github.com/whoforget/CVE-POC
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/youwizard/CVE-POC
diff --git a/2021/CVE-2021-42056.md b/2021/CVE-2021-42056.md
index 9c82050775..864ec9ec68 100644
--- a/2021/CVE-2021-42056.md
+++ b/2021/CVE-2021-42056.md
@@ -20,5 +20,6 @@ Thales Safenet Authentication Client (SAC) for Linux and Windows through 10.7.7
- https://github.com/WhooAmii/POC_to_review
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/trhacknon/Pocingit
+- https://github.com/z00z00z00/Safenet_SAC_CVE-2021-42056
- https://github.com/zecool/cve
diff --git a/2021/CVE-2021-42327.md b/2021/CVE-2021-42327.md
index 683249dbbd..9f89c5a08d 100644
--- a/2021/CVE-2021-42327.md
+++ b/2021/CVE-2021-42327.md
@@ -31,6 +31,7 @@ No PoCs from references.
- https://github.com/soosmile/POC
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/trhacknon/Pocingit
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/zecool/cve
diff --git a/2021/CVE-2021-42662.md b/2021/CVE-2021-42662.md
index 0475e6935a..4f74d41d5f 100644
--- a/2021/CVE-2021-42662.md
+++ b/2021/CVE-2021-42662.md
@@ -20,6 +20,7 @@ A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Onlin
- https://github.com/ARPSyndicate/cvemon
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
+- https://github.com/TheHackingRabbi/CVE-2021-42662
- https://github.com/TheHackingRabbi/CVE-2021-42663
- https://github.com/WhooAmii/POC_to_review
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2021/CVE-2021-42663.md b/2021/CVE-2021-42663.md
index 59f46f7219..13d1e21677 100644
--- a/2021/CVE-2021-42663.md
+++ b/2021/CVE-2021-42663.md
@@ -18,6 +18,7 @@ An HTML injection vulnerability exists in Sourcecodester Online Event Booking an
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
+- https://github.com/TheHackingRabbi/CVE-2021-42663
- https://github.com/WhooAmii/POC_to_review
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/soosmile/POC
diff --git a/2021/CVE-2021-42664.md b/2021/CVE-2021-42664.md
index b790a43220..fe89b6c061 100644
--- a/2021/CVE-2021-42664.md
+++ b/2021/CVE-2021-42664.md
@@ -19,6 +19,7 @@ A Stored Cross Site Scripting (XSS) Vulneraibiilty exists in Sourcecodester Engi
- https://github.com/ARPSyndicate/cvemon
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
+- https://github.com/TheHackingRabbi/CVE-2021-42664
- https://github.com/WhooAmii/POC_to_review
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/soosmile/POC
diff --git a/2021/CVE-2021-42665.md b/2021/CVE-2021-42665.md
index f2cae92e74..8239d52ade 100644
--- a/2021/CVE-2021-42665.md
+++ b/2021/CVE-2021-42665.md
@@ -22,6 +22,7 @@ An SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/SYRTI/POC_to_review
+- https://github.com/TheHackingRabbi/CVE-2021-42665
- https://github.com/WhooAmii/POC_to_review
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/nu11secur1ty/CVE-mitre
diff --git a/2021/CVE-2021-42666.md b/2021/CVE-2021-42666.md
index 96557a8a71..17ba592262 100644
--- a/2021/CVE-2021-42666.md
+++ b/2021/CVE-2021-42666.md
@@ -21,6 +21,7 @@ A SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal i
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/SYRTI/POC_to_review
+- https://github.com/TheHackingRabbi/CVE-2021-42666
- https://github.com/WhooAmii/POC_to_review
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/nu11secur1ty/CVE-mitre
diff --git a/2021/CVE-2021-42667.md b/2021/CVE-2021-42667.md
index 0f944fce26..0984a625c2 100644
--- a/2021/CVE-2021-42667.md
+++ b/2021/CVE-2021-42667.md
@@ -22,6 +22,7 @@ A SQL Injection vulnerability exists in Sourcecodester Online Event Booking and
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/SYRTI/POC_to_review
+- https://github.com/TheHackingRabbi/CVE-2021-42667
- https://github.com/WhooAmii/POC_to_review
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/nu11secur1ty/CVE-mitre
diff --git a/2021/CVE-2021-42668.md b/2021/CVE-2021-42668.md
index d6d5adfd88..b047bbd96a 100644
--- a/2021/CVE-2021-42668.md
+++ b/2021/CVE-2021-42668.md
@@ -21,6 +21,7 @@ A SQL Injection vulnerability exists in Sourcecodester Engineers Online Portal i
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/SYRTI/POC_to_review
+- https://github.com/TheHackingRabbi/CVE-2021-42668
- https://github.com/WhooAmii/POC_to_review
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/nu11secur1ty/CVE-mitre
diff --git a/2021/CVE-2021-42669.md b/2021/CVE-2021-42669.md
index d86b00363d..96372a60fe 100644
--- a/2021/CVE-2021-42669.md
+++ b/2021/CVE-2021-42669.md
@@ -20,6 +20,7 @@ A file upload vulnerability exists in Sourcecodester Engineers Online Portal in
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/SYRTI/POC_to_review
+- https://github.com/TheHackingRabbi/CVE-2021-42669
- https://github.com/WhooAmii/POC_to_review
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/nu11secur1ty/CVE-mitre
diff --git a/2021/CVE-2021-42670.md b/2021/CVE-2021-42670.md
index 927942ecfe..41e7ee97a9 100644
--- a/2021/CVE-2021-42670.md
+++ b/2021/CVE-2021-42670.md
@@ -20,6 +20,7 @@ A SQL injection vulnerability exists in Sourcecodester Engineers Online Portal i
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/SYRTI/POC_to_review
+- https://github.com/TheHackingRabbi/CVE-2021-42670
- https://github.com/WhooAmii/POC_to_review
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/nu11secur1ty/CVE-mitre
diff --git a/2021/CVE-2021-42671.md b/2021/CVE-2021-42671.md
index 2b1bd3dd80..2d55cb5f2d 100644
--- a/2021/CVE-2021-42671.md
+++ b/2021/CVE-2021-42671.md
@@ -21,6 +21,7 @@ An incorrect access control vulnerability exists in Sourcecodester Engineers Onl
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/SYRTI/POC_to_review
+- https://github.com/TheHackingRabbi/CVE-2021-42671
- https://github.com/WhooAmii/POC_to_review
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/nu11secur1ty/CVE-mitre
diff --git a/2021/CVE-2021-43032.md b/2021/CVE-2021-43032.md
index 274671ed00..76627439a9 100644
--- a/2021/CVE-2021-43032.md
+++ b/2021/CVE-2021-43032.md
@@ -14,5 +14,6 @@ In XenForo through 2.2.7, a threat actor with access to the admin panel can crea
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/SakuraSamuraii/CVE-2021-43032
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2021/CVE-2021-43129.md b/2021/CVE-2021-43129.md
index 4f8b36296e..fc4a33d259 100644
--- a/2021/CVE-2021-43129.md
+++ b/2021/CVE-2021-43129.md
@@ -16,6 +16,7 @@ A bypass exists for Desire2Learn/D2L Brightspace’s “Disable Right Click” o
- https://github.com/ARPSyndicate/cvemon
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
+- https://github.com/Skotizo/CVE-2021-43129
- https://github.com/WhooAmii/POC_to_review
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/trhacknon/Pocingit
diff --git a/2021/CVE-2021-43267.md b/2021/CVE-2021-43267.md
index 14f0a9974c..dd4b1a08d8 100644
--- a/2021/CVE-2021-43267.md
+++ b/2021/CVE-2021-43267.md
@@ -17,6 +17,7 @@ An issue was discovered in net/tipc/crypto.c in the Linux kernel before 5.14.16.
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Al1ex/LinuxEelvation
- https://github.com/DarkSprings/CVE-2021-43267-POC
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/aixcc-public/challenge-001-exemplar
- https://github.com/bcoles/kasld
@@ -37,6 +38,7 @@ An issue was discovered in net/tipc/crypto.c in the Linux kernel before 5.14.16.
- https://github.com/ohnonoyesyes/CVE-2021-43267
- https://github.com/soosmile/POC
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/zzhacked/CVE-2021-43267
diff --git a/2021/CVE-2021-43287.md b/2021/CVE-2021-43287.md
index 033d804ca0..44d46a29a8 100644
--- a/2021/CVE-2021-43287.md
+++ b/2021/CVE-2021-43287.md
@@ -19,6 +19,7 @@ No PoCs from references.
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/ArrestX/--POC
+- https://github.com/CLincat/vulcat
- https://github.com/HimmelAward/Goby_POC
- https://github.com/KayCHENvip/vulnerability-poc
- https://github.com/Miraitowa70/POC-Notes
diff --git a/2021/CVE-2021-43609.md b/2021/CVE-2021-43609.md
index 52bbd3b3a2..feb99f7e79 100644
--- a/2021/CVE-2021-43609.md
+++ b/2021/CVE-2021-43609.md
@@ -14,4 +14,5 @@ An issue was discovered in Spiceworks Help Desk Server before 1.3.3. A Blind Boo
- https://www.linkedin.com/pulse/cve-2021-43609-write-up-division5-security-4lgwe
#### Github
+- https://github.com/d5sec/CVE-2021-43609-POC
diff --git a/2021/CVE-2021-43798.md b/2021/CVE-2021-43798.md
index a2173c2595..23295f5c34 100644
--- a/2021/CVE-2021-43798.md
+++ b/2021/CVE-2021-43798.md
@@ -17,6 +17,7 @@ Grafana is an open-source platform for monitoring and observability. Grafana ver
- https://github.com/0day404/vulnerability-poc
- https://github.com/0x783kb/Security-operation-book
- https://github.com/0xAwali/Virtual-Host
+- https://github.com/0xMarcio/cve
- https://github.com/20142995/Goby
- https://github.com/20142995/pocsuite3
- https://github.com/20142995/sectool
diff --git a/2021/CVE-2021-43980.md b/2021/CVE-2021-43980.md
index 242fc20da5..6a707c637b 100644
--- a/2021/CVE-2021-43980.md
+++ b/2021/CVE-2021-43980.md
@@ -15,4 +15,5 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/sr-monika/sprint-rest
+- https://github.com/versio-io/product-lifecycle-security-api
diff --git a/2021/CVE-2021-44228.md b/2021/CVE-2021-44228.md
index 1f9be59cee..e7f698fc6b 100644
--- a/2021/CVE-2021-44228.md
+++ b/2021/CVE-2021-44228.md
@@ -294,6 +294,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- https://github.com/LemonCraftRu/JndiRemover
- https://github.com/LeonardoE95/yt-it
- https://github.com/Lercas/CVE_scoring
+- https://github.com/LibHunter/LibHunter
- https://github.com/Liderbord/Log4j-Security
- https://github.com/LinkMJB/log4shell_scanner
- https://github.com/Live-Hack-CVE/CVE-2021-4104
@@ -776,6 +777,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- https://github.com/emadshanab/Nuclei-Templates-Collection
- https://github.com/emilywang0/CVE_testing_VULN
- https://github.com/emilywang0/MergeBase_test_vuln
+- https://github.com/enomothem/PenTestNote
- https://github.com/erickrr-bd/TekiumLog4jApp
- https://github.com/ericmedina024/JndiLookupRemover
- https://github.com/erikschippers/Log4J-Hyper-V-Script
diff --git a/2021/CVE-2021-44733.md b/2021/CVE-2021-44733.md
index 17202e6dea..68994ab94d 100644
--- a/2021/CVE-2021-44733.md
+++ b/2021/CVE-2021-44733.md
@@ -32,6 +32,7 @@ A use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Lin
- https://github.com/soosmile/POC
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/trhacknon/Pocingit
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/zecool/cve
diff --git a/2021/CVE-2021-45041.md b/2021/CVE-2021-45041.md
index baf773bd7e..6fe3ec963b 100644
--- a/2021/CVE-2021-45041.md
+++ b/2021/CVE-2021-45041.md
@@ -17,6 +17,7 @@ SuiteCRM before 7.12.2 and 8.x before 8.0.1 allows authenticated SQL injection v
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
+- https://github.com/manuelz120/CVE-2021-45041
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/soosmile/POC
- https://github.com/trhacknon/Pocingit
diff --git a/2021/CVE-2021-45046.md b/2021/CVE-2021-45046.md
index 0d94a88b0b..028edc19ec 100644
--- a/2021/CVE-2021-45046.md
+++ b/2021/CVE-2021-45046.md
@@ -57,6 +57,7 @@ It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was i
- https://github.com/HynekPetrak/log4shell-finder
- https://github.com/ITninja04/awesome-stars
- https://github.com/JERRY123S/all-poc
+- https://github.com/LibHunter/LibHunter
- https://github.com/LoliKingdom/NukeJndiLookupFromLog4j
- https://github.com/MLX15/log4j-scan
- https://github.com/Maelstromage/Log4jSherlock
diff --git a/2021/CVE-2021-45268.md b/2021/CVE-2021-45268.md
index 9e5d8b5e72..2e54419e10 100644
--- a/2021/CVE-2021-45268.md
+++ b/2021/CVE-2021-45268.md
@@ -15,5 +15,6 @@
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/V1n1v131r4/CSRF-to-RCE-on-Backdrop-CMS
- https://github.com/V1n1v131r4/My-CVEs
diff --git a/2021/CVE-2021-45416.md b/2021/CVE-2021-45416.md
index d42a5914fb..6e8fccdcd3 100644
--- a/2021/CVE-2021-45416.md
+++ b/2021/CVE-2021-45416.md
@@ -13,6 +13,7 @@ Reflected Cross-site scripting (XSS) vulnerability in RosarioSIS 8.2.1 allows at
- https://github.com/86x/CVE-2021-45416
#### Github
+- https://github.com/86x/CVE-2021-45416
- https://github.com/ARPSyndicate/cvemon
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
diff --git a/2021/CVE-2021-45608.md b/2021/CVE-2021-45608.md
index 845cc1e680..2c8aa5a83c 100644
--- a/2021/CVE-2021-45608.md
+++ b/2021/CVE-2021-45608.md
@@ -24,5 +24,6 @@ Certain D-Link, Edimax, NETGEAR, TP-Link, Tenda, and Western Digital devices are
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2021/CVE-2021-45897.md b/2021/CVE-2021-45897.md
index 7f4d24dddd..63b7b43bad 100644
--- a/2021/CVE-2021-45897.md
+++ b/2021/CVE-2021-45897.md
@@ -19,6 +19,7 @@ SuiteCRM before 7.12.3 and 8.x before 8.0.2 allows remote code execution.
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
- https://github.com/binganao/vulns-2022
+- https://github.com/manuelz120/CVE-2021-45897
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/soosmile/POC
- https://github.com/trhacknon/Pocingit
diff --git a/2021/CVE-2021-46088.md b/2021/CVE-2021-46088.md
index 48f7e69ed6..2b2192ae6a 100644
--- a/2021/CVE-2021-46088.md
+++ b/2021/CVE-2021-46088.md
@@ -14,4 +14,5 @@ Zabbix 4.0 LTS, 4.2, 4.4, and 5.0 LTS is vulnerable to Remote Code Execution (RC
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/paalbra/zabbix-zbxsec-7
diff --git a/2021/CVE-2021-46557.md b/2021/CVE-2021-46557.md
index 35d6e13800..8604da1120 100644
--- a/2021/CVE-2021-46557.md
+++ b/2021/CVE-2021-46557.md
@@ -14,5 +14,6 @@ Vicidial 2.14-783a was discovered to contain a cross-site scripting (XSS) vulner
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/Zeyad-Azima/Vicidial-stored-XSS
- https://github.com/Zeyad-Azima/Zeyad-Azima
diff --git a/2021/CVE-2021-46558.md b/2021/CVE-2021-46558.md
index 2700cc545e..873cd66b9f 100644
--- a/2021/CVE-2021-46558.md
+++ b/2021/CVE-2021-46558.md
@@ -14,5 +14,6 @@ Multiple cross-site scripting (XSS) vulnerabilities in the Add User module of Is
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/Zeyad-Azima/Issabel-stored-XSS
- https://github.com/Zeyad-Azima/Zeyad-Azima
diff --git a/2022/CVE-2022-0185.md b/2022/CVE-2022-0185.md
index 576582147f..a3edcc1d1e 100644
--- a/2022/CVE-2022-0185.md
+++ b/2022/CVE-2022-0185.md
@@ -27,6 +27,7 @@ A heap-based buffer overflow flaw was found in the way the legacy_parse_param fu
- https://github.com/GhostTroops/TOP
- https://github.com/Ha0-Y/LinuxKernelExploits
- https://github.com/Ha0-Y/kernel-exploit-cve
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JERRY123S/all-poc
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Metarget/metarget
@@ -88,6 +89,7 @@ A heap-based buffer overflow flaw was found in the way the legacy_parse_param fu
- https://github.com/veritas501/pipe-primitive
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/whoforget/CVE-POC
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/youwizard/CVE-POC
diff --git a/2022/CVE-2022-0236.md b/2022/CVE-2022-0236.md
index 26b104ff6f..503fa9479a 100644
--- a/2022/CVE-2022-0236.md
+++ b/2022/CVE-2022-0236.md
@@ -22,6 +22,7 @@ The WP Import Export WordPress plugin (both free and premium versions) is vulner
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/qurbat/CVE-2022-0236
- https://github.com/soosmile/POC
- https://github.com/trhacknon/Pocingit
- https://github.com/whoforget/CVE-POC
diff --git a/2022/CVE-2022-0435.md b/2022/CVE-2022-0435.md
index 75f879664f..42726a9741 100644
--- a/2022/CVE-2022-0435.md
+++ b/2022/CVE-2022-0435.md
@@ -30,6 +30,7 @@ No PoCs from references.
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/teresaweber685/book_list
- https://github.com/whoforget/CVE-POC
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/wlswotmd/CVE-2022-0435
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/youwizard/CVE-POC
diff --git a/2022/CVE-2022-0529.md b/2022/CVE-2022-0529.md
index 969c05be1b..be2674e7d9 100644
--- a/2022/CVE-2022-0529.md
+++ b/2022/CVE-2022-0529.md
@@ -15,6 +15,7 @@ A flaw was found in Unzip. The vulnerability occurs during the conversion of a w
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/ByteHackr/unzip_poc
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
diff --git a/2022/CVE-2022-0530.md b/2022/CVE-2022-0530.md
index 66540b293c..9cdbf0dc2c 100644
--- a/2022/CVE-2022-0530.md
+++ b/2022/CVE-2022-0530.md
@@ -15,6 +15,7 @@ A flaw was found in Unzip. The vulnerability occurs during the conversion of a w
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/ByteHackr/unzip_poc
- https://github.com/maxim12z/ECommerce
- https://github.com/nanaao/unzip_poc
diff --git a/2022/CVE-2022-0557.md b/2022/CVE-2022-0557.md
index 72609896c0..33524626d4 100644
--- a/2022/CVE-2022-0557.md
+++ b/2022/CVE-2022-0557.md
@@ -16,6 +16,7 @@ OS Command Injection in Packagist microweber/microweber prior to 1.2.11.
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/AggressiveUser/AggressiveUser
- https://github.com/Enes4xd/Enes4xd
- https://github.com/cr0ss2018/cr0ss2018
- https://github.com/enesamaafkolan/enesamaafkolan
diff --git a/2022/CVE-2022-0563.md b/2022/CVE-2022-0563.md
index 222cd791d9..382dc4de26 100644
--- a/2022/CVE-2022-0563.md
+++ b/2022/CVE-2022-0563.md
@@ -22,6 +22,7 @@ No PoCs from references.
- https://github.com/cdupuis/image-api
- https://github.com/denoslab/ensf400-lab10-ssc
- https://github.com/fokypoky/places-list
+- https://github.com/m-pasima/CI-CD-Security-image-scan
- https://github.com/mauraneh/WIK-DPS-TP02
- https://github.com/testing-felickz/docker-scout-demo
- https://github.com/toyhoshi/helm
diff --git a/2022/CVE-2022-0847.md b/2022/CVE-2022-0847.md
index 4f14f0f202..9a3901e4a9 100644
--- a/2022/CVE-2022-0847.md
+++ b/2022/CVE-2022-0847.md
@@ -75,6 +75,7 @@ A flaw was found in the way the "flags" member of the new pipe buffer structure
- https://github.com/Ha0-Y/LinuxKernelExploits
- https://github.com/Ha0-Y/kernel-exploit-cve
- https://github.com/HadessCS/Awesome-Privilege-Escalation
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/IHenakaarachchi/debian11-dirty_pipe-patcher
- https://github.com/ITMarcin2211/CVE-2022-0847-DirtyPipe-Exploit
- https://github.com/IdanBanani/Linux-Kernel-VR-Exploitation
@@ -333,6 +334,7 @@ A flaw was found in the way the "flags" member of the new pipe buffer structure
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/whoami-chmod777/Hacking-Articles-Linux-Privilege-Escalation-
- https://github.com/whoforget/CVE-POC
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/wpressly/exploitations
- https://github.com/x90hack/vulnerabilty_lab
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2022/CVE-2022-0995.md b/2022/CVE-2022-0995.md
index c00fdef2f3..4900846498 100644
--- a/2022/CVE-2022-0995.md
+++ b/2022/CVE-2022-0995.md
@@ -28,6 +28,7 @@ An out-of-bounds (OOB) memory write flaw was found in the Linux kernel’s watch
- https://github.com/CVEDB/top
- https://github.com/Ch4nc3n/PublicExploitation
- https://github.com/GhostTroops/TOP
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JERRY123S/all-poc
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Metarget/metarget
@@ -63,6 +64,7 @@ An out-of-bounds (OOB) memory write flaw was found in the Linux kernel’s watch
- https://github.com/trhacknon/Pocingit
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/whoforget/CVE-POC
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/youwizard/CVE-POC
diff --git a/2022/CVE-2022-0996.md b/2022/CVE-2022-0996.md
index 8a7c4d9716..54b7d6757c 100644
--- a/2022/CVE-2022-0996.md
+++ b/2022/CVE-2022-0996.md
@@ -14,4 +14,5 @@ A vulnerability was found in the 389 Directory Server that allows expired passwo
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/ByteHackr/389-ds-base
diff --git a/2022/CVE-2022-1015.md b/2022/CVE-2022-1015.md
index 211ec87493..bfcf543ede 100644
--- a/2022/CVE-2022-1015.md
+++ b/2022/CVE-2022-1015.md
@@ -20,6 +20,7 @@ A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of t
- https://github.com/ARPSyndicate/cvemon
- https://github.com/EGI-Federation/SVG-advisories
- https://github.com/H4K6/CVE-2023-0179-PoC
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/NaInSec/CVE-PoC-in-GitHub
@@ -59,6 +60,7 @@ A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of t
- https://github.com/trhacknon/Pocingit
- https://github.com/wechicken456/Linux-kernel
- https://github.com/whoforget/CVE-POC
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/wlswotmd/CVE-2022-1015
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xuetusummer/Penetration_Testing_POC
diff --git a/2022/CVE-2022-1016.md b/2022/CVE-2022-1016.md
index 5322a899da..01a8a3dd88 100644
--- a/2022/CVE-2022-1016.md
+++ b/2022/CVE-2022-1016.md
@@ -25,6 +25,7 @@ A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_ch
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wechicken456/Linux-kernel
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/yaobinwen/robin_on_rails
- https://github.com/zanezhub/CVE-2022-1015-1016
diff --git a/2022/CVE-2022-1172.md b/2022/CVE-2022-1172.md
index f4a8782900..03545c8d32 100644
--- a/2022/CVE-2022-1172.md
+++ b/2022/CVE-2022-1172.md
@@ -13,5 +13,5 @@ Null Pointer Dereference Caused Segmentation Fault in GitHub repository gpac/gpa
- https://huntr.dev/bounties/a26cb79c-9257-4fbf-98c5-a5a331efa264
#### Github
-No PoCs found on GitHub currently.
+- https://github.com/Joe1sn/Joe1sn
diff --git a/2022/CVE-2022-1388.md b/2022/CVE-2022-1388.md
index 9a49fae77e..e79b95c5e1 100644
--- a/2022/CVE-2022-1388.md
+++ b/2022/CVE-2022-1388.md
@@ -19,6 +19,7 @@ On F5 BIG-IP 16.1.x versions prior to 16.1.2.2, 15.1.x versions prior to 15.1.5.
- https://github.com/0x783kb/Security-operation-book
- https://github.com/0x7eTeam/CVE-2022-1388-PocExp
- https://github.com/0xAgun/CVE-2022-1388
+- https://github.com/0xMarcio/cve
- https://github.com/0xf4n9x/CVE-2022-1388
- https://github.com/20142995/Goby
- https://github.com/20142995/pocsuite3
diff --git a/2022/CVE-2022-1530.md b/2022/CVE-2022-1530.md
index 6fa84726c0..7681d4e508 100644
--- a/2022/CVE-2022-1530.md
+++ b/2022/CVE-2022-1530.md
@@ -13,5 +13,5 @@ Cross-site Scripting (XSS) in GitHub repository livehelperchat/livehelperchat pr
- https://huntr.dev/bounties/8fd8de01-7e83-4324-9cc8-a97acb9b70d6
#### Github
-No PoCs found on GitHub currently.
+- https://github.com/AggressiveUser/AggressiveUser
diff --git a/2022/CVE-2022-1588.md b/2022/CVE-2022-1588.md
index d91bf8ccd2..7924d22462 100644
--- a/2022/CVE-2022-1588.md
+++ b/2022/CVE-2022-1588.md
@@ -14,4 +14,5 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/AggressiveUser/AggressiveUser
diff --git a/2022/CVE-2022-1768.md b/2022/CVE-2022-1768.md
index 4e771c71af..b99b28143a 100644
--- a/2022/CVE-2022-1768.md
+++ b/2022/CVE-2022-1768.md
@@ -5,9 +5,7 @@
### Description
-The RSVPMaker plugin for WordPress is vulnerable to unauthenticated SQL Injection due to insufficient escaping and parameterization on user supplied data passed to multiple SQL queries in the ~/rsvpmaker-email.php file. This makes it possible for unauthenticated attackers to steal sensitive information from the database in versions up to, and including, 9.3.2.
-
-Please note that this is separate from CVE-2022-1453 & CVE-2022-1505.
+The RSVPMaker plugin for WordPress is vulnerable to unauthenticated SQL Injection due to insufficient escaping and parameterization on user supplied data passed to multiple SQL queries in the ~/rsvpmaker-email.php file. This makes it possible for unauthenticated attackers to steal sensitive information from the database in versions up to, and including, 9.3.2.
Please note that this is separate from CVE-2022-1453 & CVE-2022-1505.
### POC
diff --git a/2022/CVE-2022-1786.md b/2022/CVE-2022-1786.md
index 883f8588ff..571d65087c 100644
--- a/2022/CVE-2022-1786.md
+++ b/2022/CVE-2022-1786.md
@@ -27,5 +27,6 @@ No PoCs from references.
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/scratchadams/Heap-Resources
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2022/CVE-2022-1972.md b/2022/CVE-2022-1972.md
index 8739d8f065..bfa740e025 100644
--- a/2022/CVE-2022-1972.md
+++ b/2022/CVE-2022-1972.md
@@ -36,6 +36,7 @@ No PoCs from references.
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/trhacknon/Pocingit
- https://github.com/whoforget/CVE-POC
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/youwizard/CVE-POC
diff --git a/2022/CVE-2022-20004.md b/2022/CVE-2022-20004.md
index 080795adfe..d6b36b657e 100644
--- a/2022/CVE-2022-20004.md
+++ b/2022/CVE-2022-20004.md
@@ -15,6 +15,7 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
+- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/Live-Hack-CVE/CVE-2022-2000
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
diff --git a/2022/CVE-2022-20005.md b/2022/CVE-2022-20005.md
index c86f1ba6c9..7b1816f7f1 100644
--- a/2022/CVE-2022-20005.md
+++ b/2022/CVE-2022-20005.md
@@ -15,6 +15,7 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
+- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/Live-Hack-CVE/CVE-2022-2000
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
diff --git a/2022/CVE-2022-20007.md b/2022/CVE-2022-20007.md
index 95f3bf932e..09dd046057 100644
--- a/2022/CVE-2022-20007.md
+++ b/2022/CVE-2022-20007.md
@@ -15,6 +15,7 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
+- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/Live-Hack-CVE/CVE-2022-2000
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
diff --git a/2022/CVE-2022-20122.md b/2022/CVE-2022-20122.md
index 1b32571570..53b869b080 100644
--- a/2022/CVE-2022-20122.md
+++ b/2022/CVE-2022-20122.md
@@ -25,5 +25,6 @@ No PoCs from references.
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2022/CVE-2022-20186.md b/2022/CVE-2022-20186.md
index c5ba071772..178091c5da 100644
--- a/2022/CVE-2022-20186.md
+++ b/2022/CVE-2022-20186.md
@@ -37,6 +37,7 @@ In kbase_mem_alias of mali_kbase_mem_linux.c, there is a possible arbitrary code
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/trhacknon/Pocingit
- https://github.com/whoforget/CVE-POC
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/youwizard/CVE-POC
- https://github.com/zecool/cve
diff --git a/2022/CVE-2022-20699.md b/2022/CVE-2022-20699.md
index 13a352f7a4..80be619112 100644
--- a/2022/CVE-2022-20699.md
+++ b/2022/CVE-2022-20699.md
@@ -14,6 +14,7 @@ Multiple vulnerabilities in Cisco Small Business RV160, RV260, RV340, and RV345
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-smb-mult-vuln-KA9PK6D
#### Github
+- https://github.com/0xMarcio/cve
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Audiobahn/CVE-2022-20699
- https://github.com/CVEDB/awesome-cve-repo
diff --git a/2022/CVE-2022-2078.md b/2022/CVE-2022-2078.md
index e86e70554b..8adf1ef0af 100644
--- a/2022/CVE-2022-2078.md
+++ b/2022/CVE-2022-2078.md
@@ -26,5 +26,6 @@ A vulnerability was found in the Linux kernel's nft_set_desc_concat_parse() func
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2022/CVE-2022-20826.md b/2022/CVE-2022-20826.md
index 102b2dc7f4..7964df45a5 100644
--- a/2022/CVE-2022-20826.md
+++ b/2022/CVE-2022-20826.md
@@ -7,9 +7,7 @@
### Description
-A vulnerability in the secure boot implementation of Cisco Secure Firewalls 3100 Series that are running Cisco Adaptive Security Appliance (ASA) Software or Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated attacker with physical access to the device to bypass the secure boot functionality.
-
- This vulnerability is due to a logic error in the boot process. An attacker could exploit this vulnerability by injecting malicious code into a specific memory location during the boot process of an affected device. A successful exploit could allow the attacker to execute persistent code at boot time and break the chain of trust.
+A vulnerability in the secure boot implementation of Cisco Secure Firewalls 3100 Series that are running Cisco Adaptive Security Appliance (ASA) Software or Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated attacker with physical access to the device to bypass the secure boot functionality.
This vulnerability is due to a logic error in the boot process. An attacker could exploit this vulnerability by injecting malicious code into a specific memory location during the boot process of an affected device. A successful exploit could allow the attacker to execute persistent code at boot time and break the chain of trust.
### POC
diff --git a/2022/CVE-2022-20829.md b/2022/CVE-2022-20829.md
index e0c098ca67..69d9db99af 100644
--- a/2022/CVE-2022-20829.md
+++ b/2022/CVE-2022-20829.md
@@ -18,6 +18,7 @@ A vulnerability in the packaging of Cisco Adaptive Security Device Manager (ASDM
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
- https://github.com/jbaines-r7/cisco_asa_research
+- https://github.com/jbaines-r7/theway
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2022/CVE-2022-20917.md b/2022/CVE-2022-20917.md
index 99bfe3c304..aeb11298d6 100644
--- a/2022/CVE-2022-20917.md
+++ b/2022/CVE-2022-20917.md
@@ -5,8 +5,7 @@
### Description
-A vulnerability in the Extensible Messaging and Presence Protocol (XMPP) message processing feature of Cisco Jabber could allow an authenticated, remote attacker to manipulate the content of XMPP messages that are used by the affected application.
- This vulnerability is due to the improper handling of nested XMPP messages within requests that are sent to the Cisco Jabber client software. An attacker could exploit this vulnerability by connecting to an XMPP messaging server and sending crafted XMPP messages to an affected Jabber client. A successful exploit could allow the attacker to manipulate the content of XMPP messages, possibly allowing the attacker to cause the Jabber client application to perform unsafe actions.
+A vulnerability in the Extensible Messaging and Presence Protocol (XMPP) message processing feature of Cisco Jabber could allow an authenticated, remote attacker to manipulate the content of XMPP messages that are used by the affected application.
This vulnerability is due to the improper handling of nested XMPP messages within requests that are sent to the Cisco Jabber client software. An attacker could exploit this vulnerability by connecting to an XMPP messaging server and sending crafted XMPP messages to an affected Jabber client. A successful exploit could allow the attacker to manipulate the content of XMPP messages, possibly allowing the attacker to cause the Jabber client application to perform unsafe actions.
### POC
diff --git a/2022/CVE-2022-20929.md b/2022/CVE-2022-20929.md
index 92b424c05e..1f17dbc592 100644
--- a/2022/CVE-2022-20929.md
+++ b/2022/CVE-2022-20929.md
@@ -5,8 +5,7 @@
### Description
-A vulnerability in the upgrade signature verification of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an unauthenticated, local attacker to provide an unauthentic upgrade file for upload.
- This vulnerability is due to insufficient cryptographic signature verification of upgrade files. An attacker could exploit this vulnerability by providing an administrator with an unauthentic upgrade file. A successful exploit could allow the attacker to fully compromise the Cisco NFVIS system.
+A vulnerability in the upgrade signature verification of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an unauthenticated, local attacker to provide an unauthentic upgrade file for upload.
This vulnerability is due to insufficient cryptographic signature verification of upgrade files. An attacker could exploit this vulnerability by providing an administrator with an unauthentic upgrade file. A successful exploit could allow the attacker to fully compromise the Cisco NFVIS system.
### POC
diff --git a/2022/CVE-2022-20951.md b/2022/CVE-2022-20951.md
index c3527663e7..c2cc20be6f 100644
--- a/2022/CVE-2022-20951.md
+++ b/2022/CVE-2022-20951.md
@@ -5,13 +5,7 @@
### Description
-A vulnerability in the web-based management interface of Cisco BroadWorks CommPilot application could allow an authenticated, remote attacker to perform a server-side request forgery (SSRF) attack on an affected device.
-
- This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface. A successful exploit could allow the attacker to obtain confidential information from the BroadWorks server and other device on the network.
-
-
-
- {{value}} ["%7b%7bvalue%7d%7d"])}]]
+A vulnerability in the web-based management interface of Cisco BroadWorks CommPilot application could allow an authenticated, remote attacker to perform a server-side request forgery (SSRF) attack on an affected device.
This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface. A successful exploit could allow the attacker to obtain confidential information from the BroadWorks server and other device on the network.
{{value}} ["%7b%7bvalue%7d%7d"])}]]
### POC
diff --git a/2022/CVE-2022-20956.md b/2022/CVE-2022-20956.md
index 0c0ceb76d1..d58b278cd5 100644
--- a/2022/CVE-2022-20956.md
+++ b/2022/CVE-2022-20956.md
@@ -5,13 +5,7 @@
### Description
-A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to bypass authorization and access system files.
-
- This vulnerability is due to improper access control in the web-based management interface of an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to list, download, and delete certain files that they should not have access to.
-
- Cisco plans to release software updates that address this vulnerability.
-
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCx ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCx"]
+A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to bypass authorization and access system files.
This vulnerability is due to improper access control in the web-based management interface of an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to list, download, and delete certain files that they should not have access to.
Cisco plans to release software updates that address this vulnerability.
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCx ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-access-contol-EeufSUCx"]
### POC
diff --git a/2022/CVE-2022-20964.md b/2022/CVE-2022-20964.md
index ffc3b7ece5..63951bfbdb 100644
--- a/2022/CVE-2022-20964.md
+++ b/2022/CVE-2022-20964.md
@@ -5,11 +5,7 @@
### Description
-A vulnerability in the web-based management interface of Cisco Identity Services Engine could allow an authenticated, remote attacker to inject arbitrary commands on the underlying operating system.
-
- This vulnerability is due to improper validation of user input within requests as part of the web-based management interface. An attacker could exploit this vulnerability by manipulating requests to the web-based management interface to contain operating system commands. A successful exploit could allow the attacker to execute arbitrary operating system commands on the underlying operating system with the privileges of the web services user.
-
- Cisco has not yet released software updates that address this vulnerability.
+A vulnerability in the web-based management interface of Cisco Identity Services Engine could allow an authenticated, remote attacker to inject arbitrary commands on the underlying operating system.
This vulnerability is due to improper validation of user input within requests as part of the web-based management interface. An attacker could exploit this vulnerability by manipulating requests to the web-based management interface to contain operating system commands. A successful exploit could allow the attacker to execute arbitrary operating system commands on the underlying operating system with the privileges of the web services user.
Cisco has not yet released software updates that address this vulnerability.
### POC
diff --git a/2022/CVE-2022-20965.md b/2022/CVE-2022-20965.md
index d6dc0633bc..6c6793d95a 100644
--- a/2022/CVE-2022-20965.md
+++ b/2022/CVE-2022-20965.md
@@ -5,13 +5,7 @@
### Description
-A vulnerability in the web-based management interface of Cisco Identity Services Engine could allow an authenticated, remote attacker to take privileges actions within the web-based management interface.
-
- This vulnerability is due to improper access control on a feature within the web-based management interface of the affected system. An attacker could exploit this vulnerability by accessing features through direct requests, bypassing checks within the application. A successful exploit could allow the attacker to take privileged actions within the web-based management interface that should be otherwise restricted.
-
-
-
- {{value}} ["%7b%7bvalue%7d%7d"])}]]
+A vulnerability in the web-based management interface of Cisco Identity Services Engine could allow an authenticated, remote attacker to take privileges actions within the web-based management interface.
This vulnerability is due to improper access control on a feature within the web-based management interface of the affected system. An attacker could exploit this vulnerability by accessing features through direct requests, bypassing checks within the application. A successful exploit could allow the attacker to take privileged actions within the web-based management interface that should be otherwise restricted.
{{value}} ["%7b%7bvalue%7d%7d"])}]]
### POC
diff --git a/2022/CVE-2022-20966.md b/2022/CVE-2022-20966.md
index 263cb69704..2cb66bbf66 100644
--- a/2022/CVE-2022-20966.md
+++ b/2022/CVE-2022-20966.md
@@ -5,11 +5,7 @@
### Description
-A vulnerability in the web-based management interface of Cisco Identity Services Engine could allow an authenticated, remote attacker to conduct cross-site scripting attacks against other users of the application web-based management interface.
-
- This vulnerability is due to improper validation of input to an application feature before storage within the web-based management interface. An attacker could exploit this vulnerability by creating entries within the application interface that contain malicious HTML or script code. A successful exploit could allow the attacker to store malicious HTML or script code within the application interface for use in further cross-site scripting attacks.
-
- Cisco has not yet released software updates that address this vulnerability.
+A vulnerability in the web-based management interface of Cisco Identity Services Engine could allow an authenticated, remote attacker to conduct cross-site scripting attacks against other users of the application web-based management interface.
This vulnerability is due to improper validation of input to an application feature before storage within the web-based management interface. An attacker could exploit this vulnerability by creating entries within the application interface that contain malicious HTML or script code. A successful exploit could allow the attacker to store malicious HTML or script code within the application interface for use in further cross-site scripting attacks.
Cisco has not yet released software updates that address this vulnerability.
### POC
diff --git a/2022/CVE-2022-20967.md b/2022/CVE-2022-20967.md
index c167e8f5dd..0b36cf5264 100644
--- a/2022/CVE-2022-20967.md
+++ b/2022/CVE-2022-20967.md
@@ -5,11 +5,7 @@
### Description
-A vulnerability in the web-based management interface of Cisco Identity Services Engine could allow an authenticated, remote attacker to conduct cross-site scripting attacks against other users of the application web-based management interface.
-
- This vulnerability is due to improper validation of input to an application feature before storage within the web-based management interface. An attacker could exploit this vulnerability by creating entries within the application interface that contain malicious HTML or script code. A successful exploit could allow the attacker to store malicious HTML or script code within the application interface for use in further cross-site scripting attacks.
-
- Cisco has not yet released software updates that address this vulnerability.
+A vulnerability in the web-based management interface of Cisco Identity Services Engine could allow an authenticated, remote attacker to conduct cross-site scripting attacks against other users of the application web-based management interface.
This vulnerability is due to improper validation of input to an application feature before storage within the web-based management interface. An attacker could exploit this vulnerability by creating entries within the application interface that contain malicious HTML or script code. A successful exploit could allow the attacker to store malicious HTML or script code within the application interface for use in further cross-site scripting attacks.
Cisco has not yet released software updates that address this vulnerability.
### POC
diff --git a/2022/CVE-2022-20968.md b/2022/CVE-2022-20968.md
index 23a004dbb5..c52e69eff7 100644
--- a/2022/CVE-2022-20968.md
+++ b/2022/CVE-2022-20968.md
@@ -5,9 +5,7 @@
### Description
-A vulnerability in the Cisco Discovery Protocol processing feature of Cisco IP Phone 7800 and 8800 Series firmware could allow an unauthenticated, adjacent attacker to cause a stack overflow on an affected device.
-
-This vulnerability is due to insufficient input validation of received Cisco Discovery Protocol packets. An attacker could exploit this vulnerability by sending crafted Cisco Discovery Protocol traffic to an affected device. A successful exploit could allow the attacker to cause a stack overflow, resulting in possible remote code execution or a denial of service (DoS) condition on an affected device.
+A vulnerability in the Cisco Discovery Protocol processing feature of Cisco IP Phone 7800 and 8800 Series firmware could allow an unauthenticated, adjacent attacker to cause a stack overflow on an affected device.
This vulnerability is due to insufficient input validation of received Cisco Discovery Protocol packets. An attacker could exploit this vulnerability by sending crafted Cisco Discovery Protocol traffic to an affected device. A successful exploit could allow the attacker to cause a stack overflow, resulting in possible remote code execution or a denial of service (DoS) condition on an affected device.
### POC
diff --git a/2022/CVE-2022-21894.md b/2022/CVE-2022-21894.md
index 4bd1e20cc9..80de84058b 100644
--- a/2022/CVE-2022-21894.md
+++ b/2022/CVE-2022-21894.md
@@ -41,6 +41,7 @@ Secure Boot Security Feature Bypass Vulnerability
No PoCs from references.
#### Github
+- https://github.com/0xMarcio/cve
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ASkyeye/CVE-2022-21894-Payload
- https://github.com/CVEDB/awesome-cve-repo
diff --git a/2022/CVE-2022-21907.md b/2022/CVE-2022-21907.md
index f0bfe2fd29..162bfa6eee 100644
--- a/2022/CVE-2022-21907.md
+++ b/2022/CVE-2022-21907.md
@@ -28,6 +28,7 @@ HTTP Protocol Stack Remote Code Execution Vulnerability
- https://github.com/nu11secur1ty/Windows10Exploits/tree/master/2022/CVE-2022-21907
#### Github
+- https://github.com/0xMarcio/cve
- https://github.com/0xmaximus/Home-Demolisher
- https://github.com/20142995/sectool
- https://github.com/2lambda123/CVE-mitre
diff --git a/2022/CVE-2022-22057.md b/2022/CVE-2022-22057.md
index cbf5ab931a..7d9ea6b63e 100644
--- a/2022/CVE-2022-22057.md
+++ b/2022/CVE-2022-22057.md
@@ -27,5 +27,6 @@ Use after free in graphics fence due to a race condition while closing fence fil
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2022/CVE-2022-22719.md b/2022/CVE-2022-22719.md
index b1a46be1a6..90ba4dd34a 100644
--- a/2022/CVE-2022-22719.md
+++ b/2022/CVE-2022-22719.md
@@ -15,6 +15,7 @@ A carefully crafted request body can cause a read to a random memory area which
#### Github
- https://github.com/8ctorres/SIND-Practicas
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/EzeTauil/Maquina-Upload
- https://github.com/PierreChrd/py-projet-tut
- https://github.com/Totes5706/TotesHTB
- https://github.com/bioly230/THM_Skynet
diff --git a/2022/CVE-2022-22720.md b/2022/CVE-2022-22720.md
index ac82e9c60d..a829f4dfc3 100644
--- a/2022/CVE-2022-22720.md
+++ b/2022/CVE-2022-22720.md
@@ -17,6 +17,7 @@ Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when err
- https://github.com/8ctorres/SIND-Practicas
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Benasin/CVE-2022-22720
+- https://github.com/EzeTauil/Maquina-Upload
- https://github.com/PierreChrd/py-projet-tut
- https://github.com/Totes5706/TotesHTB
- https://github.com/bioly230/THM_Skynet
diff --git a/2022/CVE-2022-22721.md b/2022/CVE-2022-22721.md
index 814527c32d..09af0d081c 100644
--- a/2022/CVE-2022-22721.md
+++ b/2022/CVE-2022-22721.md
@@ -16,6 +16,7 @@ If LimitXMLRequestBody is set to allow request bodies larger than 350MB (default
#### Github
- https://github.com/8ctorres/SIND-Practicas
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/EzeTauil/Maquina-Upload
- https://github.com/PierreChrd/py-projet-tut
- https://github.com/Totes5706/TotesHTB
- https://github.com/bioly230/THM_Skynet
diff --git a/2022/CVE-2022-22909.md b/2022/CVE-2022-22909.md
index a4a7336c56..60298f5497 100644
--- a/2022/CVE-2022-22909.md
+++ b/2022/CVE-2022-22909.md
@@ -13,6 +13,7 @@ HotelDruid v3.0.3 was discovered to contain a remote code execution (RCE) vulner
- https://github.com/0z09e/CVE-2022-22909
#### Github
+- https://github.com/0z09e/CVE-2022-22909
- https://github.com/ARPSyndicate/cvemon
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
diff --git a/2022/CVE-2022-22947.md b/2022/CVE-2022-22947.md
index b0b3dd1812..8b92a74d64 100644
--- a/2022/CVE-2022-22947.md
+++ b/2022/CVE-2022-22947.md
@@ -122,6 +122,7 @@ In spring cloud gateway versions prior to 3.1.1+ and 3.0.7+ , applications are v
- https://github.com/debug4you/CVE-2022-22947
- https://github.com/dingxiao77/-cve-2022-22947-
- https://github.com/dravenww/curated-article
+- https://github.com/enomothem/PenTestNote
- https://github.com/expzhizhuo/Burp_VulPscan
- https://github.com/fbion/CVE-2022-22947
- https://github.com/flying0er/CVE-2022-22947-goby
diff --git a/2022/CVE-2022-23222.md b/2022/CVE-2022-23222.md
index 5a6e4d79b2..cd4809ca13 100644
--- a/2022/CVE-2022-23222.md
+++ b/2022/CVE-2022-23222.md
@@ -26,6 +26,7 @@ No PoCs from references.
- https://github.com/Ch4nc3n/PublicExploitation
- https://github.com/FridayOrtiz/CVE-2022-23222
- https://github.com/GhostTroops/TOP
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JERRY123S/all-poc
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/KayCHENvip/vulnerability-poc
@@ -70,6 +71,7 @@ No PoCs from references.
- https://github.com/trhacknon/Pocingit
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/whoforget/CVE-POC
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/wxrdnx/bpf_exploit_template
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xuetusummer/Penetration_Testing_POC
diff --git a/2022/CVE-2022-23342.md b/2022/CVE-2022-23342.md
index 31142e11e6..841931e44b 100644
--- a/2022/CVE-2022-23342.md
+++ b/2022/CVE-2022-23342.md
@@ -14,6 +14,7 @@ The Hyland Onbase Application Server releases prior to 20.3.58.1000 and OnBase r
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/InitRoot/CVE-2022-23342
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
diff --git a/2022/CVE-2022-23378.md b/2022/CVE-2022-23378.md
index 0a675e4d29..30d56a7623 100644
--- a/2022/CVE-2022-23378.md
+++ b/2022/CVE-2022-23378.md
@@ -16,6 +16,7 @@ A Cross-Site Scripting (XSS) vulnerability exists within the 3.2.2 version of Ta
- https://github.com/ARPSyndicate/cvemon
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
+- https://github.com/TheGetch/CVE-2022-23378
- https://github.com/WhooAmii/POC_to_review
- https://github.com/binganao/vulns-2022
- https://github.com/k0mi-tg/CVE-POC
diff --git a/2022/CVE-2022-23539.md b/2022/CVE-2022-23539.md
index 05cdd5a6dd..723d476490 100644
--- a/2022/CVE-2022-23539.md
+++ b/2022/CVE-2022-23539.md
@@ -5,7 +5,7 @@
### Description
-Versions `<=8.5.1` of `jsonwebtoken` library could be misconfigured so that legacy, insecure key types are used for signature verification. For example, DSA keys could be used with the RS256 algorithm. You are affected if you are using an algorithm and a key type other than a combination listed in the GitHub Security Advisory as unaffected. This issue has been fixed, please update to version 9.0.0. This version validates for asymmetric key type and algorithm combinations. Please refer to the above mentioned algorithm / key type combinations for the valid secure configuration. After updating to version 9.0.0, if you still intend to continue with signing or verifying tokens using invalid key type/algorithm value combinations, you’ll need to set the `allowInvalidAsymmetricKeyTypes` option to `true` in the `sign()` and/or `verify()` functions.
+Versions `<=8.5.1` of `jsonwebtoken` library could be misconfigured so that legacy, insecure key types are used for signature verification. For example, DSA keys could be used with the RS256 algorithm. You are affected if you are using an algorithm and a key type other than a combination listed in the GitHub Security Advisory as unaffected. This issue has been fixed, please update to version 9.0.0. This version validates for asymmetric key type and algorithm combinations. Please refer to the above mentioned algorithm / key type combinations for the valid secure configuration. After updating to version 9.0.0, if you still intend to continue with signing or verifying tokens using invalid key type/algorithm value combinations, you’ll need to set the `allowInvalidAsymmetricKeyTypes` option to `true` in the `sign()` and/or `verify()` functions.
### POC
diff --git a/2022/CVE-2022-23541.md b/2022/CVE-2022-23541.md
index c8be7fa3d4..9d6025e9b4 100644
--- a/2022/CVE-2022-23541.md
+++ b/2022/CVE-2022-23541.md
@@ -6,7 +6,7 @@
### Description
-jsonwebtoken is an implementation of JSON Web Tokens. Versions `<= 8.5.1` of `jsonwebtoken` library can be misconfigured so that passing a poorly implemented key retrieval function referring to the `secretOrPublicKey` argument from the readme link will result in incorrect verification of tokens. There is a possibility of using a different algorithm and key combination in verification, other than the one that was used to sign the tokens. Specifically, tokens signed with an asymmetric public key could be verified with a symmetric HS256 algorithm. This can lead to successful validation of forged tokens. If your application is supporting usage of both symmetric key and asymmetric key in jwt.verify() implementation with the same key retrieval function. This issue has been patched, please update to version 9.0.0.
+jsonwebtoken is an implementation of JSON Web Tokens. Versions `<= 8.5.1` of `jsonwebtoken` library can be misconfigured so that passing a poorly implemented key retrieval function referring to the `secretOrPublicKey` argument from the readme link will result in incorrect verification of tokens. There is a possibility of using a different algorithm and key combination in verification, other than the one that was used to sign the tokens. Specifically, tokens signed with an asymmetric public key could be verified with a symmetric HS256 algorithm. This can lead to successful validation of forged tokens. If your application is supporting usage of both symmetric key and asymmetric key in jwt.verify() implementation with the same key retrieval function. This issue has been patched, please update to version 9.0.0.
### POC
diff --git a/2022/CVE-2022-23943.md b/2022/CVE-2022-23943.md
index 6c83056776..0ee16695ef 100644
--- a/2022/CVE-2022-23943.md
+++ b/2022/CVE-2022-23943.md
@@ -15,6 +15,7 @@ Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an att
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/EzeTauil/Maquina-Upload
- https://github.com/PierreChrd/py-projet-tut
- https://github.com/Totes5706/TotesHTB
- https://github.com/bioly230/THM_Skynet
diff --git a/2022/CVE-2022-23967.md b/2022/CVE-2022-23967.md
index 63a8f64881..5659781365 100644
--- a/2022/CVE-2022-23967.md
+++ b/2022/CVE-2022-23967.md
@@ -14,6 +14,7 @@
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/MaherAzzouzi/CVE-2022-23967
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
diff --git a/2022/CVE-2022-24125.md b/2022/CVE-2022-24125.md
index 418d7aa72c..b8d5286cea 100644
--- a/2022/CVE-2022-24125.md
+++ b/2022/CVE-2022-24125.md
@@ -22,6 +22,7 @@ The matchmaking servers of Bandai Namco FromSoftware Dark Souls III through 2022
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/soosmile/POC
+- https://github.com/tremwil/ds3-nrssr-rce
- https://github.com/trhacknon/Pocingit
- https://github.com/whoforget/CVE-POC
- https://github.com/youwizard/CVE-POC
diff --git a/2022/CVE-2022-24126.md b/2022/CVE-2022-24126.md
index 8b256be987..0789ae6703 100644
--- a/2022/CVE-2022-24126.md
+++ b/2022/CVE-2022-24126.md
@@ -15,4 +15,5 @@ A buffer overflow in the NRSessionSearchResult parser in Bandai Namco FromSoftwa
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/anquanscan/sec-tools
+- https://github.com/tremwil/ds3-nrssr-rce
diff --git a/2022/CVE-2022-24354.md b/2022/CVE-2022-24354.md
index a7b3443e1d..4455c9da72 100644
--- a/2022/CVE-2022-24354.md
+++ b/2022/CVE-2022-24354.md
@@ -25,5 +25,6 @@ No PoCs from references.
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2022/CVE-2022-24449.md b/2022/CVE-2022-24449.md
index bd5ee3d101..815c92520e 100644
--- a/2022/CVE-2022-24449.md
+++ b/2022/CVE-2022-24449.md
@@ -17,6 +17,7 @@ Solar appScreener through 3.10.4, when a valid license is not present, allows XX
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
+- https://github.com/jet-pentest/CVE-2022-24449
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2022/CVE-2022-24654.md b/2022/CVE-2022-24654.md
index ae7f7b4196..d4f28a4001 100644
--- a/2022/CVE-2022-24654.md
+++ b/2022/CVE-2022-24654.md
@@ -19,6 +19,7 @@ Authenticated stored cross-site scripting (XSS) vulnerability in "Field Server A
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
- https://github.com/k0mi-tg/CVE-POC
+- https://github.com/leonardobg/CVE-2022-24654
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/trhacknon/Pocingit
diff --git a/2022/CVE-2022-24899.md b/2022/CVE-2022-24899.md
index a3d04a3cb6..37ed253bd7 100644
--- a/2022/CVE-2022-24899.md
+++ b/2022/CVE-2022-24899.md
@@ -14,4 +14,5 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/kenzer-templates
+- https://github.com/AggressiveUser/AggressiveUser
diff --git a/2022/CVE-2022-24999.md b/2022/CVE-2022-24999.md
index c55a0d055c..aba0b42fda 100644
--- a/2022/CVE-2022-24999.md
+++ b/2022/CVE-2022-24999.md
@@ -21,6 +21,7 @@ qs before 6.10.3, as used in Express before 4.17.3 and other products, allows at
- https://github.com/k0imet/pyfetch
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
+- https://github.com/n8tz/CVE-2022-24999
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/norefice-github/juvenile
- https://github.com/seal-community/patches
diff --git a/2022/CVE-2022-25090.md b/2022/CVE-2022-25090.md
index 10ed96c716..97047acd15 100644
--- a/2022/CVE-2022-25090.md
+++ b/2022/CVE-2022-25090.md
@@ -17,6 +17,7 @@ Printix Secure Cloud Print Management through 1.3.1106.0 creates a temporary tem
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/ComparedArray/printix-CVE-2022-25090
- https://github.com/Enes4xd/Enes4xd
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
diff --git a/2022/CVE-2022-25165.md b/2022/CVE-2022-25165.md
index d2d5c78fb1..e36565ae4d 100644
--- a/2022/CVE-2022-25165.md
+++ b/2022/CVE-2022-25165.md
@@ -19,6 +19,7 @@ An issue was discovered in Amazon AWS VPN Client 2.0.0. A TOCTOU race condition
- https://github.com/H4cksploit/CVEs-master
- https://github.com/Jaikumar3/Cloud-Security-Attacks
- https://github.com/Mehedi-Babu/security_attacks_cloud
+- https://github.com/RhinoSecurityLabs/CVEs
- https://github.com/SummitRoute/csp_security_mistakes
- https://github.com/atesemre/awesome-aws-security
- https://github.com/blaise442/awesome-aws-security
diff --git a/2022/CVE-2022-25166.md b/2022/CVE-2022-25166.md
index f08c2c5c5a..0b6173f0d6 100644
--- a/2022/CVE-2022-25166.md
+++ b/2022/CVE-2022-25166.md
@@ -16,6 +16,7 @@ An issue was discovered in Amazon AWS VPN Client 2.0.0. It is possible to includ
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/H4cksploit/CVEs-master
+- https://github.com/RhinoSecurityLabs/CVEs
- https://github.com/merlinepedra/RHINOECURITY-CVEs
- https://github.com/merlinepedra25/RHINOSECURITY-CVEs
diff --git a/2022/CVE-2022-25265.md b/2022/CVE-2022-25265.md
index 12f25d2271..e2c9df75a9 100644
--- a/2022/CVE-2022-25265.md
+++ b/2022/CVE-2022-25265.md
@@ -15,4 +15,5 @@ In the Linux kernel through 5.16.10, certain binary files may have the exec-all
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/x0reaxeax/exec-prot-bypass
diff --git a/2022/CVE-2022-25622.md b/2022/CVE-2022-25622.md
index 5a813ffe89..0569af25ca 100644
--- a/2022/CVE-2022-25622.md
+++ b/2022/CVE-2022-25622.md
@@ -1,12 +1,12 @@
### [CVE-2022-25622](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25622)


+





-
&color=blue)

&color=blue)
@@ -82,9 +82,11 @@



+



+



@@ -94,7 +96,7 @@
### Description
-A vulnerability has been identified in SIMATIC CFU DIQ (6ES7655-5PX31-1XX0), SIMATIC CFU PA (6ES7655-5PX11-0XX0), SIMATIC ET 200pro IM154-8 PN/DP CPU (6ES7154-8AB01-0AB0), SIMATIC ET 200pro IM154-8F PN/DP CPU (6ES7154-8FB01-0AB0), SIMATIC ET 200pro IM154-8FX PN/DP CPU (6ES7154-8FX00-0AB0), SIMATIC ET 200S IM151-8 PN/DP CPU (6ES7151-8AB01-0AB0), SIMATIC ET 200S IM151-8F PN/DP CPU (6ES7151-8FB01-0AB0), SIMATIC ET200AL IM157-1 PN, SIMATIC ET200ecoPN, AI 8xRTD/TC, M12-L (6ES7144-6JF00-0BB0), SIMATIC ET200ecoPN, CM 4x IO-Link, M12-L (6ES7148-6JE00-0BB0), SIMATIC ET200ecoPN, CM 8x IO-Link, M12-L (6ES7148-6JG00-0BB0), SIMATIC ET200ecoPN, CM 8x IO-Link, M12-L (6ES7148-6JJ00-0BB0), SIMATIC ET200ecoPN, DI 16x24VDC, M12-L (6ES7141-6BH00-0BB0), SIMATIC ET200ecoPN, DI 8x24VDC, M12-L (6ES7141-6BG00-0BB0), SIMATIC ET200ecoPN, DIQ 16x24VDC/2A, M12-L (6ES7143-6BH00-0BB0), SIMATIC ET200ecoPN, DQ 8x24VDC/0,5A, M12-L (6ES7142-6BG00-0BB0), SIMATIC ET200ecoPN, DQ 8x24VDC/2A, M12-L (6ES7142-6BR00-0BB0), SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 MF HF, SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants), SIMATIC PN/MF Coupler (6ES7158-3MU10-0XA0), SIMATIC PN/PN Coupler (6ES7158-3AD10-0XA0), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants), SIMATIC S7-300 CPU 314C-2 PN/DP (6ES7314-6EH04-0AB0), SIMATIC S7-300 CPU 315-2 PN/DP (6ES7315-2EH14-0AB0), SIMATIC S7-300 CPU 315F-2 PN/DP (6ES7315-2FJ14-0AB0), SIMATIC S7-300 CPU 315T-3 PN/DP (6ES7315-7TJ10-0AB0), SIMATIC S7-300 CPU 317-2 PN/DP (6ES7317-2EK14-0AB0), SIMATIC S7-300 CPU 317F-2 PN/DP (6ES7317-2FK14-0AB0), SIMATIC S7-300 CPU 317T-3 PN/DP (6ES7317-7TK10-0AB0), SIMATIC S7-300 CPU 317TF-3 PN/DP (6ES7317-7UL10-0AB0), SIMATIC S7-300 CPU 319-3 PN/DP (6ES7318-3EL01-0AB0), SIMATIC S7-300 CPU 319F-3 PN/DP (6ES7318-3FL01-0AB0), SIMATIC S7-400 CPU 412-2 PN V7 (6ES7412-2EK07-0AB0), SIMATIC S7-400 CPU 414-3 PN/DP V7 (6ES7414-3EM07-0AB0), SIMATIC S7-400 CPU 414F-3 PN/DP V7 (6ES7414-3FM07-0AB0), SIMATIC S7-400 CPU 416-3 PN/DP V7 (6ES7416-3ES07-0AB0), SIMATIC S7-400 CPU 416F-3 PN/DP V7 (6ES7416-3FS07-0AB0), SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants), SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants), SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants), SIMATIC TDC CP51M1, SIMATIC TDC CPU555, SIMATIC WinAC RTX 2010 (6ES7671-0RC08-0YA0), SIMATIC WinAC RTX F 2010 (6ES7671-1RC08-0YA0), SINAMICS DCM, SINAMICS G110M, SINAMICS G115D, SINAMICS G120 (incl. SIPLUS variants), SINAMICS G130, SINAMICS G150, SINAMICS S110, SINAMICS S120 (incl. SIPLUS variants), SINAMICS S150, SINAMICS S210 (6SL5...), SINAMICS V90, SIPLUS ET 200S IM151-8 PN/DP CPU (6AG1151-8AB01-7AB0), SIPLUS ET 200S IM151-8F PN/DP CPU (6AG1151-8FB01-2AB0), SIPLUS HCS4200 CIM4210 (6BK1942-1AA00-0AA0), SIPLUS HCS4200 CIM4210C (6BK1942-1AA00-0AA1), SIPLUS HCS4300 CIM4310 (6BK1943-1AA00-0AA0), SIPLUS NET PN/PN Coupler (6AG2158-3AD10-4XA0), SIPLUS S7-300 CPU 314C-2 PN/DP (6AG1314-6EH04-7AB0), SIPLUS S7-300 CPU 315-2 PN/DP (6AG1315-2EH14-7AB0), SIPLUS S7-300 CPU 315F-2 PN/DP (6AG1315-2FJ14-2AB0), SIPLUS S7-300 CPU 317-2 PN/DP (6AG1317-2EK14-7AB0), SIPLUS S7-300 CPU 317F-2 PN/DP (6AG1317-2FK14-2AB0), SIPLUS S7-400 CPU 414-3 PN/DP V7 (6AG1414-3EM07-7AB0), SIPLUS S7-400 CPU 416-3 PN/DP V7 (6AG1416-3ES07-7AB0). The PROFINET (PNIO) stack, when integrated with the Interniche IP stack, improperly handles internal resources for TCP segments where the minimum TCP-Header length is less than defined.This could allow an attacker to create a denial of service condition for TCP services on affected devices by sending specially crafted TCP segments.
+A vulnerability has been identified in SIMATIC CFU DIQ (6ES7655-5PX31-1XX0), SIMATIC CFU PA (6ES7655-5PX11-0XX0), SIMATIC ET 200AL IM 157-1 PN (6ES7157-1AB00-0AB0), SIMATIC ET 200pro IM154-8 PN/DP CPU (6ES7154-8AB01-0AB0), SIMATIC ET 200pro IM154-8F PN/DP CPU (6ES7154-8FB01-0AB0), SIMATIC ET 200pro IM154-8FX PN/DP CPU (6ES7154-8FX00-0AB0), SIMATIC ET 200S IM151-8 PN/DP CPU (6ES7151-8AB01-0AB0), SIMATIC ET 200S IM151-8F PN/DP CPU (6ES7151-8FB01-0AB0), SIMATIC ET200ecoPN, AI 8xRTD/TC, M12-L (6ES7144-6JF00-0BB0), SIMATIC ET200ecoPN, CM 4x IO-Link, M12-L (6ES7148-6JE00-0BB0), SIMATIC ET200ecoPN, CM 8x IO-Link, M12-L (6ES7148-6JG00-0BB0), SIMATIC ET200ecoPN, CM 8x IO-Link, M12-L (6ES7148-6JJ00-0BB0), SIMATIC ET200ecoPN, DI 16x24VDC, M12-L (6ES7141-6BH00-0BB0), SIMATIC ET200ecoPN, DI 8x24VDC, M12-L (6ES7141-6BG00-0BB0), SIMATIC ET200ecoPN, DIQ 16x24VDC/2A, M12-L (6ES7143-6BH00-0BB0), SIMATIC ET200ecoPN, DQ 8x24VDC/0,5A, M12-L (6ES7142-6BG00-0BB0), SIMATIC ET200ecoPN, DQ 8x24VDC/2A, M12-L (6ES7142-6BR00-0BB0), SIMATIC ET200MP IM155-5 PN HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 MF HF, SIMATIC ET200SP IM155-6 PN HA (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN/2 HF (incl. SIPLUS variants), SIMATIC ET200SP IM155-6 PN/3 HF (incl. SIPLUS variants), SIMATIC PN/MF Coupler (6ES7158-3MU10-0XA0), SIMATIC PN/PN Coupler (6ES7158-3AD10-0XA0), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants), SIMATIC S7-300 CPU 314C-2 PN/DP (6ES7314-6EH04-0AB0), SIMATIC S7-300 CPU 315-2 PN/DP (6ES7315-2EH14-0AB0), SIMATIC S7-300 CPU 315F-2 PN/DP (6ES7315-2FJ14-0AB0), SIMATIC S7-300 CPU 315T-3 PN/DP (6ES7315-7TJ10-0AB0), SIMATIC S7-300 CPU 317-2 PN/DP (6ES7317-2EK14-0AB0), SIMATIC S7-300 CPU 317F-2 PN/DP (6ES7317-2FK14-0AB0), SIMATIC S7-300 CPU 317T-3 PN/DP (6ES7317-7TK10-0AB0), SIMATIC S7-300 CPU 317TF-3 PN/DP (6ES7317-7UL10-0AB0), SIMATIC S7-300 CPU 319-3 PN/DP (6ES7318-3EL01-0AB0), SIMATIC S7-300 CPU 319F-3 PN/DP (6ES7318-3FL01-0AB0), SIMATIC S7-400 CPU 412-2 PN V7 (6ES7412-2EK07-0AB0), SIMATIC S7-400 CPU 414-3 PN/DP V7 (6ES7414-3EM07-0AB0), SIMATIC S7-400 CPU 414F-3 PN/DP V7 (6ES7414-3FM07-0AB0), SIMATIC S7-400 CPU 416-3 PN/DP V7 (6ES7416-3ES07-0AB0), SIMATIC S7-400 CPU 416F-3 PN/DP V7 (6ES7416-3FS07-0AB0), SIMATIC S7-400 H V6 CPU family (incl. SIPLUS variants), SIMATIC S7-410 V10 CPU family (incl. SIPLUS variants), SIMATIC S7-410 V8 CPU family (incl. SIPLUS variants), SIMATIC TDC CP51M1, SIMATIC TDC CPU555, SIMATIC WinAC RTX 2010 (6ES7671-0RC08-0YA0), SIMATIC WinAC RTX F 2010 (6ES7671-1RC08-0YA0), SINAMICS DCM, SINAMICS G110M, SINAMICS G115D, SINAMICS G120 (incl. SIPLUS variants), SINAMICS G130, SINAMICS G150, SINAMICS S110, SINAMICS S120 (incl. SIPLUS variants), SINAMICS S150, SINAMICS S210 (6SL5...), SINAMICS V90, SIPLUS ET 200S IM151-8 PN/DP CPU (6AG1151-8AB01-7AB0), SIPLUS ET 200S IM151-8F PN/DP CPU (6AG1151-8FB01-2AB0), SIPLUS HCS4200 CIM4210 (6BK1942-1AA00-0AA0), SIPLUS HCS4200 CIM4210C (6BK1942-1AA00-0AA1), SIPLUS HCS4300 CIM4310 (6BK1943-1AA00-0AA0), SIPLUS NET PN/PN Coupler (6AG2158-3AD10-4XA0), SIPLUS S7-300 CPU 314C-2 PN/DP (6AG1314-6EH04-7AB0), SIPLUS S7-300 CPU 315-2 PN/DP (6AG1315-2EH14-7AB0), SIPLUS S7-300 CPU 315F-2 PN/DP (6AG1315-2FJ14-2AB0), SIPLUS S7-300 CPU 317-2 PN/DP (6AG1317-2EK14-7AB0), SIPLUS S7-300 CPU 317F-2 PN/DP (6AG1317-2FK14-2AB0), SIPLUS S7-400 CPU 414-3 PN/DP V7 (6AG1414-3EM07-7AB0), SIPLUS S7-400 CPU 416-3 PN/DP V7 (6AG1416-3ES07-7AB0). The PROFINET (PNIO) stack, when integrated with the Interniche IP stack, improperly handles internal resources for TCP segments where the minimum TCP-Header length is less than defined.This could allow an attacker to create a denial of service condition for TCP services on affected devices by sending specially crafted TCP segments.
### POC
diff --git a/2022/CVE-2022-25636.md b/2022/CVE-2022-25636.md
index f2bc12fd80..aebc29bef9 100644
--- a/2022/CVE-2022-25636.md
+++ b/2022/CVE-2022-25636.md
@@ -20,12 +20,14 @@ net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows loca
- https://github.com/20142995/sectool
- https://github.com/ARPSyndicate/cvemon
- https://github.com/B0nfee/CVE-2022-25636
+- https://github.com/Bonfee/CVE-2022-25636
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/Ch4nc3n/PublicExploitation
- https://github.com/EGI-Federation/SVG-advisories
- https://github.com/GhostTroops/TOP
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JERRY123S/all-poc
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Meowmycks/OSCPprep-Cute
@@ -73,6 +75,7 @@ net/netfilter/nf_dup_netdev.c in the Linux kernel 5.4 through 5.6.10 allows loca
- https://github.com/veritas501/pipe-primitive
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/whoforget/CVE-POC
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/yaobinwen/robin_on_rails
diff --git a/2022/CVE-2022-25647.md b/2022/CVE-2022-25647.md
index fc0641bed2..694fbdb02c 100644
--- a/2022/CVE-2022-25647.md
+++ b/2022/CVE-2022-25647.md
@@ -15,6 +15,7 @@ The package com.google.code.gson:gson before 2.8.9 are vulnerable to Deserializa
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CGCL-codes/PHunter
+- https://github.com/LibHunter/LibHunter
- https://github.com/hinat0y/Dataset1
- https://github.com/hinat0y/Dataset10
- https://github.com/hinat0y/Dataset11
diff --git a/2022/CVE-2022-25762.md b/2022/CVE-2022-25762.md
index 1321bac417..d5d7c0b786 100644
--- a/2022/CVE-2022-25762.md
+++ b/2022/CVE-2022-25762.md
@@ -13,5 +13,5 @@ If a web application sends a WebSocket message concurrently with the WebSocket c
- https://www.oracle.com/security-alerts/cpujul2022.html
#### Github
-No PoCs found on GitHub currently.
+- https://github.com/versio-io/product-lifecycle-security-api
diff --git a/2022/CVE-2022-2585.md b/2022/CVE-2022-2585.md
index cc3ea0ac33..70173f614a 100644
--- a/2022/CVE-2022-2585.md
+++ b/2022/CVE-2022-2585.md
@@ -16,6 +16,7 @@ It was discovered that when exec'ing from a non-leader thread, armed POSIX CPU t
- https://www.openwall.com/lists/oss-security/2022/08/09/7
#### Github
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/greek0x0/2022-LPE-UAF
diff --git a/2022/CVE-2022-2586.md b/2022/CVE-2022-2586.md
index 57c8136950..7823731133 100644
--- a/2022/CVE-2022-2586.md
+++ b/2022/CVE-2022-2586.md
@@ -20,6 +20,7 @@ It was discovered that a nft object or expression could reference a nft set on a
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
@@ -45,6 +46,7 @@ It was discovered that a nft object or expression could reference a nft set on a
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/substing/internal_ctf
- https://github.com/whoforget/CVE-POC
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/youwizard/CVE-POC
- https://github.com/zecool/cve
diff --git a/2022/CVE-2022-2588.md b/2022/CVE-2022-2588.md
index e0591dc53c..66203a68e6 100644
--- a/2022/CVE-2022-2588.md
+++ b/2022/CVE-2022-2588.md
@@ -32,6 +32,7 @@ It was discovered that the cls_route filter implementation in the Linux kernel w
- https://github.com/GhostTroops/TOP
- https://github.com/Ha0-Y/LinuxKernelExploits
- https://github.com/Ha0-Y/kernel-exploit-cve
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Markakd/CVE-2022-2588
- https://github.com/Markakd/DirtyCred
diff --git a/2022/CVE-2022-25881.md b/2022/CVE-2022-25881.md
index eadf4de85a..d6ef0743f0 100644
--- a/2022/CVE-2022-25881.md
+++ b/2022/CVE-2022-25881.md
@@ -6,8 +6,7 @@
### Description
-This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library.
-
+This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library.
### POC
diff --git a/2022/CVE-2022-25883.md b/2022/CVE-2022-25883.md
index ea9751c982..d1013f518e 100644
--- a/2022/CVE-2022-25883.md
+++ b/2022/CVE-2022-25883.md
@@ -5,9 +5,7 @@
### Description
-Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.
-
-
+Versions of the package semver before 7.5.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the function new Range, when untrusted user data is provided as a range.
### POC
diff --git a/2022/CVE-2022-25901.md b/2022/CVE-2022-25901.md
index 29ba2bd99d..3da3249e07 100644
--- a/2022/CVE-2022-25901.md
+++ b/2022/CVE-2022-25901.md
@@ -7,8 +7,7 @@
### Description
-Versions of the package cookiejar before 2.1.4 are vulnerable to Regular Expression Denial of Service (ReDoS) via the Cookie.parse function, which uses an insecure regular expression.
-
+Versions of the package cookiejar before 2.1.4 are vulnerable to Regular Expression Denial of Service (ReDoS) via the Cookie.parse function, which uses an insecure regular expression.
### POC
diff --git a/2022/CVE-2022-25943.md b/2022/CVE-2022-25943.md
index 15b3c15134..999cc05714 100644
--- a/2022/CVE-2022-25943.md
+++ b/2022/CVE-2022-25943.md
@@ -14,6 +14,7 @@ The installer of WPS Office for Windows versions prior to v11.2.0.10258 fails to
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/HadiMed/KINGSOFT-WPS-Office-LPE
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
diff --git a/2022/CVE-2022-2602.md b/2022/CVE-2022-2602.md
index c953f20dbb..8023236d00 100644
--- a/2022/CVE-2022-2602.md
+++ b/2022/CVE-2022-2602.md
@@ -15,6 +15,7 @@ io_uring UAF, Unix SCM garbage collection
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/LukeGix/CVE-2022-2602
- https://github.com/Mr-xn/Penetration_Testing_POC
@@ -39,6 +40,7 @@ io_uring UAF, Unix SCM garbage collection
- https://github.com/th3-5had0w/CVE-2022-2602-Study
- https://github.com/wechicken456/Linux-kernel
- https://github.com/whoforget/CVE-POC
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/youwizard/CVE-POC
diff --git a/2022/CVE-2022-26134.md b/2022/CVE-2022-26134.md
index 8b3a2dd932..95a7e3caa8 100644
--- a/2022/CVE-2022-26134.md
+++ b/2022/CVE-2022-26134.md
@@ -131,6 +131,7 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
- https://github.com/demining/Log4j-Vulnerability
- https://github.com/e-hakson/OSCP
- https://github.com/eljosep/OSCP-Guide
+- https://github.com/enomothem/PenTestNote
- https://github.com/f4yd4-s3c/cve-2022-26134
- https://github.com/getastra/hypejab
- https://github.com/getdrive/PoC
diff --git a/2022/CVE-2022-26180.md b/2022/CVE-2022-26180.md
index 1b2c0c472c..93ee11584a 100644
--- a/2022/CVE-2022-26180.md
+++ b/2022/CVE-2022-26180.md
@@ -15,4 +15,5 @@ qdPM 9.2 allows Cross-Site Request Forgery (CSRF) via the index.php/myAccount/up
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/AggressiveUser/AggressiveUser
diff --git a/2022/CVE-2022-26377.md b/2022/CVE-2022-26377.md
index 132d66918e..6c366c3439 100644
--- a/2022/CVE-2022-26377.md
+++ b/2022/CVE-2022-26377.md
@@ -16,6 +16,7 @@ No PoCs from references.
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Awrrays/FrameVul
- https://github.com/ByteXenon/IP-Security-Database
+- https://github.com/EzeTauil/Maquina-Upload
- https://github.com/Totes5706/TotesHTB
- https://github.com/bioly230/THM_Skynet
- https://github.com/firatesatoglu/shodanSearch
diff --git a/2022/CVE-2022-2639.md b/2022/CVE-2022-2639.md
index 97080f059a..8dd00a67a9 100644
--- a/2022/CVE-2022-2639.md
+++ b/2022/CVE-2022-2639.md
@@ -17,6 +17,7 @@ No PoCs from references.
- https://github.com/20142995/sectool
- https://github.com/ARPSyndicate/cvemon
- https://github.com/EkamSinghWalia/Detection-and-Mitigation-for-CVE-2022-2639
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/KayCHENvip/vulnerability-poc
- https://github.com/Miraitowa70/POC-Notes
diff --git a/2022/CVE-2022-26629.md b/2022/CVE-2022-26629.md
index ef3bd52658..c60362fa4c 100644
--- a/2022/CVE-2022-26629.md
+++ b/2022/CVE-2022-26629.md
@@ -22,6 +22,7 @@ An Access Control vulnerability exists in SoroushPlus+ Messenger 1.0.30 in the L
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/scopion/CVE-2022-26629
- https://github.com/soosmile/POC
+- https://github.com/sysenter-eip/CVE-2022-26629
- https://github.com/trhacknon/Pocingit
- https://github.com/whoforget/CVE-POC
- https://github.com/youwizard/CVE-POC
diff --git a/2022/CVE-2022-27134.md b/2022/CVE-2022-27134.md
index d6fe178644..031a7e3e95 100644
--- a/2022/CVE-2022-27134.md
+++ b/2022/CVE-2022-27134.md
@@ -14,6 +14,7 @@ EOSIO batdappboomx v327c04cf has an Access-control vulnerability in the `transfe
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/Kenun99/CVE-batdappboomx
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
diff --git a/2022/CVE-2022-27226.md b/2022/CVE-2022-27226.md
index 2e11bc8d13..b332dc0781 100644
--- a/2022/CVE-2022-27226.md
+++ b/2022/CVE-2022-27226.md
@@ -19,6 +19,7 @@ A CSRF issue in /api/crontab on iRZ Mobile Routers through 2022-03-16 allows a t
- https://github.com/AlexRogalskiy/AlexRogalskiy
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
+- https://github.com/SakuraSamuraii/ez-iRZ
- https://github.com/WhooAmii/POC_to_review
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/karimhabush/cyberowl
diff --git a/2022/CVE-2022-27254.md b/2022/CVE-2022-27254.md
index ac408558f2..87fd16f7b4 100644
--- a/2022/CVE-2022-27254.md
+++ b/2022/CVE-2022-27254.md
@@ -38,6 +38,7 @@ The remote keyless system on Honda Civic 2018 vehicles sends the same RF signal
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/nonamecoder/CVE-2022-27254
- https://github.com/nonamecoder/FlipperZeroHondaFirmware
- https://github.com/pipiscrew/timeline
- https://github.com/soosmile/POC
diff --git a/2022/CVE-2022-27255.md b/2022/CVE-2022-27255.md
index 8f7c081f8f..9d6d0e26f6 100644
--- a/2022/CVE-2022-27255.md
+++ b/2022/CVE-2022-27255.md
@@ -13,6 +13,7 @@ In Realtek eCos RSDK 1.5.7p1 and MSDK 4.9.4p1, the SIP ALG function that rewrite
No PoCs from references.
#### Github
+- https://github.com/0xMarcio/cve
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
diff --git a/2022/CVE-2022-27666.md b/2022/CVE-2022-27666.md
index c64a017a9e..3f9b35f783 100644
--- a/2022/CVE-2022-27666.md
+++ b/2022/CVE-2022-27666.md
@@ -21,6 +21,7 @@ A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ip
- https://github.com/CVEDB/top
- https://github.com/Ch4nc3n/PublicExploitation
- https://github.com/GhostTroops/TOP
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/IdanBanani/Linux-Kernel-VR-Exploitation
- https://github.com/JERRY123S/all-poc
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
@@ -54,6 +55,7 @@ A heap buffer overflow flaw was found in IPsec ESP transformation code in net/ip
- https://github.com/trhacknon/Pocingit
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/whoforget/CVE-POC
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/youwizard/CVE-POC
diff --git a/2022/CVE-2022-27927.md b/2022/CVE-2022-27927.md
index 6d848ad3ec..d9e6fab41f 100644
--- a/2022/CVE-2022-27927.md
+++ b/2022/CVE-2022-27927.md
@@ -19,6 +19,7 @@ A SQL injection vulnerability exists in Microfinance Management System 1.0 when
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
+- https://github.com/erengozaydin/Microfinance-Management-System-V1.0-SQL-Injection-Vulnerability-Unauthenticated
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2022/CVE-2022-28079.md b/2022/CVE-2022-28079.md
index 45e66d6fee..db3e4c45f6 100644
--- a/2022/CVE-2022-28079.md
+++ b/2022/CVE-2022-28079.md
@@ -19,6 +19,7 @@ College Management System v1.0 was discovered to contain a SQL injection vulnera
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
+- https://github.com/erengozaydin/College-Management-System-course_code-SQL-Injection-Authenticated
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2022/CVE-2022-28080.md b/2022/CVE-2022-28080.md
index 5fdf9bc166..8eac9aaebf 100644
--- a/2022/CVE-2022-28080.md
+++ b/2022/CVE-2022-28080.md
@@ -20,6 +20,7 @@ Royal Event Management System v1.0 was discovered to contain a SQL injection vul
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
+- https://github.com/erengozaydin/Royal-Event-Management-System-todate-SQL-Injection-Authenticated
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2022/CVE-2022-28330.md b/2022/CVE-2022-28330.md
index baf91ad1e2..5d50a97d3a 100644
--- a/2022/CVE-2022-28330.md
+++ b/2022/CVE-2022-28330.md
@@ -15,6 +15,7 @@ No PoCs from references.
#### Github
- https://github.com/8ctorres/SIND-Practicas
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/EzeTauil/Maquina-Upload
- https://github.com/firatesatoglu/shodanSearch
- https://github.com/kasem545/vulnsearch
diff --git a/2022/CVE-2022-28452.md b/2022/CVE-2022-28452.md
index 829b3654d5..70aab1d030 100644
--- a/2022/CVE-2022-28452.md
+++ b/2022/CVE-2022-28452.md
@@ -21,6 +21,7 @@ Red Planet Laundry Management System 1.0 is vulnerable to SQL Injection.
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
+- https://github.com/YavuzSahbaz/Red-Planet-Laundry-Management-System-1.0-is-vulnerable-to-SQL
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2022/CVE-2022-28601.md b/2022/CVE-2022-28601.md
index 54d948b40e..9a18641c2f 100644
--- a/2022/CVE-2022-28601.md
+++ b/2022/CVE-2022-28601.md
@@ -14,6 +14,7 @@ A Two-Factor Authentication (2FA) bypass vulnerability in "Simple 2FA Plugin for
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/FlaviuPopescu/CVE-2022-28601
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
diff --git a/2022/CVE-2022-28614.md b/2022/CVE-2022-28614.md
index 463a126b80..03f0d6f3a4 100644
--- a/2022/CVE-2022-28614.md
+++ b/2022/CVE-2022-28614.md
@@ -16,6 +16,7 @@ No PoCs from references.
#### Github
- https://github.com/8ctorres/SIND-Practicas
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/EzeTauil/Maquina-Upload
- https://github.com/Totes5706/TotesHTB
- https://github.com/bioly230/THM_Skynet
- https://github.com/firatesatoglu/shodanSearch
diff --git a/2022/CVE-2022-28615.md b/2022/CVE-2022-28615.md
index 3dbb292193..a76cd3764a 100644
--- a/2022/CVE-2022-28615.md
+++ b/2022/CVE-2022-28615.md
@@ -15,6 +15,7 @@ No PoCs from references.
#### Github
- https://github.com/8ctorres/SIND-Practicas
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/EzeTauil/Maquina-Upload
- https://github.com/Totes5706/TotesHTB
- https://github.com/bioly230/THM_Skynet
- https://github.com/firatesatoglu/shodanSearch
diff --git a/2022/CVE-2022-28986.md b/2022/CVE-2022-28986.md
index 2ee1760934..a5ad6d752b 100644
--- a/2022/CVE-2022-28986.md
+++ b/2022/CVE-2022-28986.md
@@ -14,6 +14,7 @@ LMS Doctor Simple 2 Factor Authentication Plugin For Moodle Affected: 2021072900
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/FlaviuPopescu/CVE-2022-28986
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
diff --git a/2022/CVE-2022-29072.md b/2022/CVE-2022-29072.md
index 526b9179df..4748756897 100644
--- a/2022/CVE-2022-29072.md
+++ b/2022/CVE-2022-29072.md
@@ -37,6 +37,7 @@
- https://github.com/jbmihoub/all-poc
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/kagancapar/7-zip-malicious-code-vulnerability
+- https://github.com/kagancapar/CVE-2022-29072
- https://github.com/karimhabush/cyberowl
- https://github.com/kun-g/Scraping-Github-trending
- https://github.com/lions2012/Penetration_Testing_POC
diff --git a/2022/CVE-2022-29404.md b/2022/CVE-2022-29404.md
index 6c2e62e4af..4196676890 100644
--- a/2022/CVE-2022-29404.md
+++ b/2022/CVE-2022-29404.md
@@ -15,6 +15,7 @@ No PoCs from references.
#### Github
- https://github.com/8ctorres/SIND-Practicas
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/EzeTauil/Maquina-Upload
- https://github.com/Totes5706/TotesHTB
- https://github.com/bioly230/THM_Skynet
- https://github.com/firatesatoglu/shodanSearch
diff --git a/2022/CVE-2022-29464.md b/2022/CVE-2022-29464.md
index 6379b33cba..f6dcb0eb79 100644
--- a/2022/CVE-2022-29464.md
+++ b/2022/CVE-2022-29464.md
@@ -17,6 +17,7 @@ Certain WSO2 products allow unrestricted file upload with resultant remote code
#### Github
- https://github.com/0day404/vulnerability-poc
- https://github.com/0xAgun/CVE-2022-29464
+- https://github.com/0xMarcio/cve
- https://github.com/20142995/Goby
- https://github.com/20142995/pocsuite3
- https://github.com/2lambda123/panopticon-unattributed
@@ -82,6 +83,7 @@ Certain WSO2 products allow unrestricted file upload with resultant remote code
- https://github.com/gbrsh/CVE-2022-29464
- https://github.com/gpiechnik2/nmap-CVE-2022-29464
- https://github.com/h3v0x/CVE-2022-29464
+- https://github.com/hakivvi/CVE-2022-29464
- https://github.com/hev0x/CVE-2022-29464
- https://github.com/hktalent/TOP
- https://github.com/hupe1980/CVE-2022-29464
diff --git a/2022/CVE-2022-29582.md b/2022/CVE-2022-29582.md
index 3f08e276b3..19a999f91b 100644
--- a/2022/CVE-2022-29582.md
+++ b/2022/CVE-2022-29582.md
@@ -38,6 +38,7 @@ In the Linux kernel before 5.17.3, fs/io_uring.c has a use-after-free due to a r
- https://github.com/tr3ss/gofetch
- https://github.com/trhacknon/Pocingit
- https://github.com/whoforget/CVE-POC
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/youwizard/CVE-POC
- https://github.com/zecool/cve
diff --git a/2022/CVE-2022-29597.md b/2022/CVE-2022-29597.md
index 95719230c8..05a566678e 100644
--- a/2022/CVE-2022-29597.md
+++ b/2022/CVE-2022-29597.md
@@ -16,6 +16,7 @@ Solutions Atlantic Regulatory Reporting System (RRS) v500 is vulnerable to Local
- https://github.com/ARPSyndicate/cvemon
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
+- https://github.com/TheGetch/CVE-2022-29597
- https://github.com/WhooAmii/POC_to_review
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
diff --git a/2022/CVE-2022-29598.md b/2022/CVE-2022-29598.md
index 3bf2854eb1..4b5dab99d0 100644
--- a/2022/CVE-2022-29598.md
+++ b/2022/CVE-2022-29598.md
@@ -16,6 +16,7 @@ Solutions Atlantic Regulatory Reporting System (RRS) v500 is vulnerable to an re
- https://github.com/ARPSyndicate/cvemon
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
+- https://github.com/TheGetch/CVE-2022-29598
- https://github.com/WhooAmii/POC_to_review
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
diff --git a/2022/CVE-2022-29778.md b/2022/CVE-2022-29778.md
index 3c96eb25f4..3d15f22aee 100644
--- a/2022/CVE-2022-29778.md
+++ b/2022/CVE-2022-29778.md
@@ -17,6 +17,7 @@
- https://github.com/ARPSyndicate/cvemon
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
+- https://github.com/TyeYeah/DIR-890L-1.20-RCE
- https://github.com/WhooAmii/POC_to_review
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
diff --git a/2022/CVE-2022-30040.md b/2022/CVE-2022-30040.md
index 08895be3ae..0c0d9cef39 100644
--- a/2022/CVE-2022-30040.md
+++ b/2022/CVE-2022-30040.md
@@ -15,6 +15,7 @@ Tenda AX1803 v1.0.0.1_2890 is vulnerable to Buffer Overflow. The vulnerability l
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/Le1a/CVE-2022-30040
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
diff --git a/2022/CVE-2022-30075.md b/2022/CVE-2022-30075.md
index aca27cd83c..4a4df2176e 100644
--- a/2022/CVE-2022-30075.md
+++ b/2022/CVE-2022-30075.md
@@ -16,6 +16,7 @@ In TP-Link Router AX50 firmware 210730 and older, import of a malicious backup f
- https://www.exploit-db.com/exploits/50962
#### Github
+- https://github.com/0xMarcio/cve
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
@@ -30,6 +31,7 @@ In TP-Link Router AX50 firmware 210730 and older, import of a malicious backup f
- https://github.com/Tig3rHu/Awesome_IOT_Vul_lib
- https://github.com/Tig3rHu/MessageForV
- https://github.com/WhooAmii/POC_to_review
+- https://github.com/aaronsvk/CVE-2022-30075
- https://github.com/cyberanand1337x/bug-bounty-2022
- https://github.com/gscamelo/TP-Link-Archer-AX10-V1
- https://github.com/hktalent/TOP
diff --git a/2022/CVE-2022-30292.md b/2022/CVE-2022-30292.md
index a10ac28f63..e5b71e8316 100644
--- a/2022/CVE-2022-30292.md
+++ b/2022/CVE-2022-30292.md
@@ -20,6 +20,7 @@ Heap-based buffer overflow in sqbaselib.cpp in SQUIRREL 3.2 due to lack of a cer
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/sprushed/CVE-2022-30292
- https://github.com/trhacknon/Pocingit
- https://github.com/whoforget/CVE-POC
- https://github.com/youwizard/CVE-POC
diff --git a/2022/CVE-2022-30556.md b/2022/CVE-2022-30556.md
index 0e0542bdb1..8a299d31f5 100644
--- a/2022/CVE-2022-30556.md
+++ b/2022/CVE-2022-30556.md
@@ -15,6 +15,7 @@ No PoCs from references.
#### Github
- https://github.com/8ctorres/SIND-Practicas
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/EzeTauil/Maquina-Upload
- https://github.com/Totes5706/TotesHTB
- https://github.com/bioly230/THM_Skynet
- https://github.com/firatesatoglu/shodanSearch
diff --git a/2022/CVE-2022-30929.md b/2022/CVE-2022-30929.md
index aff38fcf32..9e47f148e2 100644
--- a/2022/CVE-2022-30929.md
+++ b/2022/CVE-2022-30929.md
@@ -14,6 +14,7 @@ Mini-Tmall v1.0 is vulnerable to Insecure Permissions via tomcat-embed-jasper.
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/AgainstTheLight/CVE-2022-30929
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
diff --git a/2022/CVE-2022-31138.md b/2022/CVE-2022-31138.md
index 50be48d000..a146084d7c 100644
--- a/2022/CVE-2022-31138.md
+++ b/2022/CVE-2022-31138.md
@@ -18,6 +18,7 @@ mailcow is a mailserver suite. Prior to mailcow-dockerized version 2022-06a, an
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
- https://github.com/k0mi-tg/CVE-POC
+- https://github.com/ly1g3/Mailcow-CVE-2022-31138
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/trhacknon/Pocingit
diff --git a/2022/CVE-2022-31245.md b/2022/CVE-2022-31245.md
index 72f2abec8b..cf1299cbe0 100644
--- a/2022/CVE-2022-31245.md
+++ b/2022/CVE-2022-31245.md
@@ -20,6 +20,7 @@ mailcow before 2022-05d allows a remote authenticated user to inject OS commands
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/karimhabush/cyberowl
- https://github.com/ly1g3/Mailcow-CVE-2022-31138
+- https://github.com/ly1g3/Mailcow-CVE-2022-31245
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/trhacknon/Pocingit
diff --git a/2022/CVE-2022-31262.md b/2022/CVE-2022-31262.md
index 0952315fd5..1697923555 100644
--- a/2022/CVE-2022-31262.md
+++ b/2022/CVE-2022-31262.md
@@ -25,6 +25,7 @@ An exploitable local privilege escalation vulnerability exists in GOG Galaxy 2.0
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/secure-77/CVE-2022-31262
- https://github.com/trhacknon/Pocingit
- https://github.com/whoforget/CVE-POC
- https://github.com/xuetusummer/Penetration_Testing_POC
diff --git a/2022/CVE-2022-31373.md b/2022/CVE-2022-31373.md
index 70a6314f12..0c18783337 100644
--- a/2022/CVE-2022-31373.md
+++ b/2022/CVE-2022-31373.md
@@ -15,5 +15,6 @@ SolarView Compact v6.0 was discovered to contain a cross-site scripting (XSS) vu
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
+- https://github.com/badboycxcc/SolarView_Compact_6.0_xss
- https://github.com/badboycxcc/badboycxcc
diff --git a/2022/CVE-2022-31813.md b/2022/CVE-2022-31813.md
index a0c01e24d4..d69df67ee9 100644
--- a/2022/CVE-2022-31813.md
+++ b/2022/CVE-2022-31813.md
@@ -15,6 +15,7 @@ No PoCs from references.
#### Github
- https://github.com/8ctorres/SIND-Practicas
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/EzeTauil/Maquina-Upload
- https://github.com/Totes5706/TotesHTB
- https://github.com/bioly230/THM_Skynet
- https://github.com/firatesatoglu/shodanSearch
diff --git a/2022/CVE-2022-31901.md b/2022/CVE-2022-31901.md
index 546e50d257..50f500bd5b 100644
--- a/2022/CVE-2022-31901.md
+++ b/2022/CVE-2022-31901.md
@@ -13,6 +13,7 @@ Buffer overflow in function Notepad_plus::addHotSpot in Notepad++ v8.4.3 and ear
- https://github.com/CDACesec/CVE-2022-31901
#### Github
+- https://github.com/CDACesec/CVE-2022-31901
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2022/CVE-2022-31902.md b/2022/CVE-2022-31902.md
index 0706b84f39..2d74d67a0c 100644
--- a/2022/CVE-2022-31902.md
+++ b/2022/CVE-2022-31902.md
@@ -13,6 +13,7 @@ Notepad++ v8.4.1 was discovered to contain a stack overflow via the component Fi
- https://github.com/CDACesec/CVE-2022-31902
#### Github
+- https://github.com/CDACesec/CVE-2022-31902
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/karimhabush/cyberowl
- https://github.com/manas3c/CVE-POC
diff --git a/2022/CVE-2022-32199.md b/2022/CVE-2022-32199.md
index b1d15486a8..b52291bd6e 100644
--- a/2022/CVE-2022-32199.md
+++ b/2022/CVE-2022-32199.md
@@ -13,5 +13,6 @@ db_convert.php in ScriptCase through 9.9.008 is vulnerable to Arbitrary File Del
- https://github.com/Toxich4/CVE-2022-32199
#### Github
+- https://github.com/Toxich4/CVE-2022-32199
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2022/CVE-2022-32250.md b/2022/CVE-2022-32250.md
index 9c79551477..e0db184944 100644
--- a/2022/CVE-2022-32250.md
+++ b/2022/CVE-2022-32250.md
@@ -22,6 +22,7 @@ net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Decstor5/2022-32250LPE
- https://github.com/EGI-Federation/SVG-advisories
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/NaInSec/CVE-PoC-in-GitHub
@@ -50,6 +51,7 @@ net/netfilter/nf_tables_api.c in the Linux kernel through 5.18.1 allows a local
- https://github.com/theori-io/CVE-2022-32250-exploit
- https://github.com/trhacknon/Pocingit
- https://github.com/whoforget/CVE-POC
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/youwizard/CVE-POC
diff --git a/2022/CVE-2022-32275.md b/2022/CVE-2022-32275.md
index 936feff5af..634a5cda5b 100644
--- a/2022/CVE-2022-32275.md
+++ b/2022/CVE-2022-32275.md
@@ -15,6 +15,7 @@
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/BrotherOfJhonny/grafana
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/kh4sh3i/Grafana-CVE
- https://github.com/lions2012/Penetration_Testing_POC
diff --git a/2022/CVE-2022-32988.md b/2022/CVE-2022-32988.md
index 6399cc472e..0037e8d48d 100644
--- a/2022/CVE-2022-32988.md
+++ b/2022/CVE-2022-32988.md
@@ -15,6 +15,8 @@ Cross Site Scripting (XSS) vulnerability in router Asus DSL-N14U-B1 1.1.2.3_805
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/FedericoHeichou/CVE-2022-32988
+- https://github.com/FedericoHeichou/DSL-N14U-XSS
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
diff --git a/2022/CVE-2022-34265.md b/2022/CVE-2022-34265.md
index b4828a6a01..941d049341 100644
--- a/2022/CVE-2022-34265.md
+++ b/2022/CVE-2022-34265.md
@@ -34,6 +34,7 @@ No PoCs from references.
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/qwqoro/GPN-Hackathon
+- https://github.com/seal-community/patches
- https://github.com/simonepetruzzi/WebSecurityProject
- https://github.com/t0m4too/t0m4to
- https://github.com/traumatising/CVE-2022-34265
diff --git a/2022/CVE-2022-34328.md b/2022/CVE-2022-34328.md
index c30c52bec7..beddf587d6 100644
--- a/2022/CVE-2022-34328.md
+++ b/2022/CVE-2022-34328.md
@@ -16,4 +16,5 @@ PMB 7.3.10 allows reflected XSS via the id parameter in an lvl=author_see reques
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/Orange-Cyberdefense/CVE-repository
+- https://github.com/jenaye/PMB
diff --git a/2022/CVE-2022-34918.md b/2022/CVE-2022-34918.md
index 8213049e5c..4b4b30f04e 100644
--- a/2022/CVE-2022-34918.md
+++ b/2022/CVE-2022-34918.md
@@ -18,11 +18,13 @@ An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug
- https://www.randorisec.fr/crack-linux-firewall/
#### Github
+- https://github.com/0xMarcio/cve
- https://github.com/0xStrygwyr/OSCP-Guide
- https://github.com/0xZipp0/OSCP
- https://github.com/0xsyr0/OSCP
- https://github.com/20142995/sectool
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/IdanBanani/ELF-Injection-Shellcode-Bridgehead
- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
- https://github.com/Ly0nt4r/OSCP
@@ -72,6 +74,7 @@ An issue was discovered in the Linux kernel through 5.18.9. A type confusion bug
- https://github.com/txuswashere/OSCP
- https://github.com/veritas501/CVE-2022-34918
- https://github.com/whoforget/CVE-POC
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/xhref/OSCP
- https://github.com/xuetusummer/Penetration_Testing_POC
diff --git a/2022/CVE-2022-35131.md b/2022/CVE-2022-35131.md
index f1f700058e..bbf2d75ae7 100644
--- a/2022/CVE-2022-35131.md
+++ b/2022/CVE-2022-35131.md
@@ -19,6 +19,7 @@ Joplin v2.8.8 allows attackers to execute arbitrary commands via a crafted paylo
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
- https://github.com/k0mi-tg/CVE-POC
+- https://github.com/ly1g3/Joplin-CVE-2022-35131
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/trhacknon/Pocingit
diff --git a/2022/CVE-2022-35513.md b/2022/CVE-2022-35513.md
index f1896c4e92..e1598fb2b9 100644
--- a/2022/CVE-2022-35513.md
+++ b/2022/CVE-2022-35513.md
@@ -21,6 +21,7 @@ The Blink1Control2 application <= 2.2.7 uses weak password encryption and an ins
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/p1ckzi/CVE-2022-35513
- https://github.com/security-anthem/IoTPene
- https://github.com/trhacknon/Pocingit
- https://github.com/whoforget/CVE-POC
diff --git a/2022/CVE-2022-35621.md b/2022/CVE-2022-35621.md
index 6f5c486b25..936e563e56 100644
--- a/2022/CVE-2022-35621.md
+++ b/2022/CVE-2022-35621.md
@@ -14,5 +14,6 @@ Access control vulnerability in Evoh NFT EvohClaimable contract with sha256 hash
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/MacherCS/CVE_Evoh_Contract
- https://github.com/karimhabush/cyberowl
diff --git a/2022/CVE-2022-35890.md b/2022/CVE-2022-35890.md
index 1527c59160..52d179022b 100644
--- a/2022/CVE-2022-35890.md
+++ b/2022/CVE-2022-35890.md
@@ -14,4 +14,5 @@ An issue was discovered in Inductive Automation Ignition before 7.9.20 and 8.x b
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/sourceincite/randy
diff --git a/2022/CVE-2022-35899.md b/2022/CVE-2022-35899.md
index 26630bbe96..39fbeb30a2 100644
--- a/2022/CVE-2022-35899.md
+++ b/2022/CVE-2022-35899.md
@@ -16,6 +16,7 @@ There is an unquoted service path in ASUSTeK Aura Ready Game SDK service (GameSD
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/AngeloPioAmirante/CVE-2022-35899
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
diff --git a/2022/CVE-2022-36126.md b/2022/CVE-2022-36126.md
index d28ddfb910..29da0722fe 100644
--- a/2022/CVE-2022-36126.md
+++ b/2022/CVE-2022-36126.md
@@ -15,4 +15,5 @@ An issue was discovered in Inductive Automation Ignition before 7.9.20 and 8.x b
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/sourceincite/randy
diff --git a/2022/CVE-2022-36200.md b/2022/CVE-2022-36200.md
index ec2744894a..c9511209ed 100644
--- a/2022/CVE-2022-36200.md
+++ b/2022/CVE-2022-36200.md
@@ -17,6 +17,7 @@ In FiberHome VDSL2 Modem HG150-Ub_V3.0, Credentials of Admin are submitted in UR
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
+- https://github.com/afaq1337/CVE-2022-36200
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2022/CVE-2022-36231.md b/2022/CVE-2022-36231.md
index 8380e7a2da..77975fb980 100644
--- a/2022/CVE-2022-36231.md
+++ b/2022/CVE-2022-36231.md
@@ -13,6 +13,7 @@ pdf_info 0.5.3 is vulnerable to Command Execution because the Ruby code uses bac
- https://github.com/affix/CVE-2022-36231
#### Github
+- https://github.com/affix/CVE-2022-36231
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2022/CVE-2022-36271.md b/2022/CVE-2022-36271.md
index 7efcedd85b..0fc4600d9d 100644
--- a/2022/CVE-2022-36271.md
+++ b/2022/CVE-2022-36271.md
@@ -16,6 +16,7 @@ Outbyte PC Repair Installation File 1.7.112.7856 is vulnerable to Dll Hijacking.
- https://github.com/ARPSyndicate/cvemon
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
+- https://github.com/SaumyajeetDas/POC-of-CVE-2022-36271
- https://github.com/WhooAmii/POC_to_review
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
diff --git a/2022/CVE-2022-36359.md b/2022/CVE-2022-36359.md
index 21dd0ecf1a..6dd0a0400f 100644
--- a/2022/CVE-2022-36359.md
+++ b/2022/CVE-2022-36359.md
@@ -15,4 +15,5 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/motoyasu-saburi/reported_vulnerability
+- https://github.com/seal-community/patches
diff --git a/2022/CVE-2022-36760.md b/2022/CVE-2022-36760.md
index 320c5e9c89..22b62c9a8d 100644
--- a/2022/CVE-2022-36760.md
+++ b/2022/CVE-2022-36760.md
@@ -14,6 +14,7 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/EzeTauil/Maquina-Upload
- https://github.com/bioly230/THM_Skynet
- https://github.com/firatesatoglu/shodanSearch
- https://github.com/karimhabush/cyberowl
diff --git a/2022/CVE-2022-37298.md b/2022/CVE-2022-37298.md
index 582e0c84f7..d468214554 100644
--- a/2022/CVE-2022-37298.md
+++ b/2022/CVE-2022-37298.md
@@ -14,6 +14,7 @@ Shinken Solutions Shinken Monitoring Version 2.4.3 affected is vulnerable to Inc
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/dbyio/cve-2022-37298
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2022/CVE-2022-37434.md b/2022/CVE-2022-37434.md
index 48bd052ff2..13d71d9160 100644
--- a/2022/CVE-2022-37434.md
+++ b/2022/CVE-2022-37434.md
@@ -31,6 +31,7 @@ zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in infl
- https://github.com/bollwarm/SecToolSet
- https://github.com/fivexl/aws-ecr-client-golang
- https://github.com/isgo-golgo13/gokit-gorillakit-enginesvc
+- https://github.com/ivd38/zlib_overflow
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/karimhabush/cyberowl
- https://github.com/manas3c/CVE-POC
diff --git a/2022/CVE-2022-37436.md b/2022/CVE-2022-37436.md
index 773b60d720..75f8630771 100644
--- a/2022/CVE-2022-37436.md
+++ b/2022/CVE-2022-37436.md
@@ -15,6 +15,7 @@ No PoCs from references.
#### Github
- https://github.com/8ctorres/SIND-Practicas
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/EzeTauil/Maquina-Upload
- https://github.com/bioly230/THM_Skynet
- https://github.com/firatesatoglu/shodanSearch
- https://github.com/karimhabush/cyberowl
diff --git a/2022/CVE-2022-37703.md b/2022/CVE-2022-37703.md
index 3c7e5b8706..f58cb92dac 100644
--- a/2022/CVE-2022-37703.md
+++ b/2022/CVE-2022-37703.md
@@ -14,6 +14,7 @@ In Amanda 3.5.1, an information leak vulnerability was found in the calcsize SUI
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/MaherAzzouzi/CVE-2022-37703
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
diff --git a/2022/CVE-2022-37704.md b/2022/CVE-2022-37704.md
index 9e2a4a9eaa..e57c4f8688 100644
--- a/2022/CVE-2022-37704.md
+++ b/2022/CVE-2022-37704.md
@@ -13,6 +13,7 @@ Amanda 3.5.1 allows privilege escalation from the regular user backup to root. T
- https://github.com/MaherAzzouzi/CVE-2022-37704
#### Github
+- https://github.com/MaherAzzouzi/CVE-2022-37704
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2022/CVE-2022-37705.md b/2022/CVE-2022-37705.md
index eb57e05e31..2a8121212c 100644
--- a/2022/CVE-2022-37705.md
+++ b/2022/CVE-2022-37705.md
@@ -13,6 +13,7 @@ A privilege escalation flaw was found in Amanda 3.5.1 in which the backup user c
- https://github.com/MaherAzzouzi/CVE-2022-37705
#### Github
+- https://github.com/MaherAzzouzi/CVE-2022-37705
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
diff --git a/2022/CVE-2022-37706.md b/2022/CVE-2022-37706.md
index a57874539b..356e703fe1 100644
--- a/2022/CVE-2022-37706.md
+++ b/2022/CVE-2022-37706.md
@@ -17,6 +17,7 @@ enlightenment_sys in Enlightenment before 0.25.4 allows local users to gain priv
- https://github.com/ECU-10525611-Xander/CVE-2022-37706
- https://github.com/GrayHatZone/CVE-2022-37706-LPE-exploit
- https://github.com/J0hnbX/Ubuntu-22-LPE
+- https://github.com/MaherAzzouzi/CVE-2022-37706-LPE-exploit
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
diff --git a/2022/CVE-2022-37783.md b/2022/CVE-2022-37783.md
new file mode 100644
index 0000000000..6552ade458
--- /dev/null
+++ b/2022/CVE-2022-37783.md
@@ -0,0 +1,17 @@
+### [CVE-2022-37783](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37783)
+
+
+
+
+### Description
+
+All Craft CMS versions between 3.0.0 and 3.7.32 disclose password hashes of users who authenticate using their E-Mail address or username in Anti-CSRF-Tokens. Craft CMS uses a cookie called CRAFT_CSRF_TOKEN and a HTML hidden field called CRAFT_CSRF_TOKEN to avoid Cross Site Request Forgery attacks. The CRAFT_CSRF_TOKEN cookie discloses the password hash in without encoding it whereas the corresponding HTML hidden field discloses the users' password hash in a masked manner, which can be decoded by using public functions of the YII framework.
+
+### POC
+
+#### Reference
+- http://www.openwall.com/lists/oss-security/2024/06/06/1
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2022/CVE-2022-38604.md b/2022/CVE-2022-38604.md
index fec51b924d..d0edfc76d7 100644
--- a/2022/CVE-2022-38604.md
+++ b/2022/CVE-2022-38604.md
@@ -14,5 +14,6 @@ Wacom Driver 6.3.46-1 for Windows and lower was discovered to contain an arbitra
- https://lucabarile.github.io/Blog/CVE-2022-38604/index.html
#### Github
+- https://github.com/LucaBarile/CVE-2022-38604
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2022/CVE-2022-38766.md b/2022/CVE-2022-38766.md
index 48943f076c..269e519c8f 100644
--- a/2022/CVE-2022-38766.md
+++ b/2022/CVE-2022-38766.md
@@ -15,6 +15,7 @@ The remote keyless system on Renault ZOE 2021 vehicles sends 433.92 MHz RF signa
#### Github
- https://github.com/1-tong/vehicle_cves
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/AUTOCRYPT-IVS-VnV/CVE-2022-38766
- https://github.com/AUTOCRYPT-RED/CVE-2022-38766
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
diff --git a/2022/CVE-2022-38813.md b/2022/CVE-2022-38813.md
index 3346a0fea4..64995edaf2 100644
--- a/2022/CVE-2022-38813.md
+++ b/2022/CVE-2022-38813.md
@@ -15,6 +15,7 @@ PHPGurukul Blood Donor Management System 1.0 does not properly restrict access t
- https://ihexcoder.wixsite.com/secresearch/post/cve-2022-38813-privilege-escalations-in-blood-donor-management-system-v1-0
#### Github
+- https://github.com/RashidKhanPathan/CVE-2022-38813
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2022/CVE-2022-39838.md b/2022/CVE-2022-39838.md
index 27228834c2..865d793e61 100644
--- a/2022/CVE-2022-39838.md
+++ b/2022/CVE-2022-39838.md
@@ -15,5 +15,6 @@ Systematic FIX Adapter (ALFAFX) 2.4.0.25 13/09/2017 allows remote file inclusion
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/fbkcs/CVE-2021-35975
+- https://github.com/jet-pentest/CVE-2022-39838
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2022/CVE-2022-39952.md b/2022/CVE-2022-39952.md
index a674fbdadb..eec38d5829 100644
--- a/2022/CVE-2022-39952.md
+++ b/2022/CVE-2022-39952.md
@@ -13,6 +13,7 @@ A external control of file name or path in Fortinet FortiNAC versions 9.4.0, 9.2
No PoCs from references.
#### Github
+- https://github.com/0xMarcio/cve
- https://github.com/1f3lse/taiE
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
diff --git a/2022/CVE-2022-40032.md b/2022/CVE-2022-40032.md
index c45879ac89..d5d4efc424 100644
--- a/2022/CVE-2022-40032.md
+++ b/2022/CVE-2022-40032.md
@@ -14,6 +14,7 @@ SQL Injection vulnerability in Simple Task Managing System version 1.0 in login.
- https://github.com/h4md153v63n/CVE-2022-40032_Simple-Task-Managing-System-V1.0-SQL-Injection-Vulnerability-Unauthenticated
#### Github
+- https://github.com/h4md153v63n/CVE-2022-40032_Simple-Task-Managing-System-V1.0-SQL-Injection-Vulnerability-Unauthenticated
- https://github.com/h4md153v63n/CVEs
- https://github.com/h4md153v63n/h4md153v63n
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2022/CVE-2022-40297.md b/2022/CVE-2022-40297.md
index 698d5a1de8..dcef4a2918 100644
--- a/2022/CVE-2022-40297.md
+++ b/2022/CVE-2022-40297.md
@@ -17,6 +17,7 @@
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/SYRTI/POC_to_review
- https://github.com/WhooAmii/POC_to_review
+- https://github.com/filipkarc/PoC-ubuntutouch-pin-privesc
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/karimhabush/cyberowl
- https://github.com/manas3c/CVE-POC
diff --git a/2022/CVE-2022-40347.md b/2022/CVE-2022-40347.md
index d4b9d4e755..a6efe1de7f 100644
--- a/2022/CVE-2022-40347.md
+++ b/2022/CVE-2022-40347.md
@@ -14,6 +14,7 @@ SQL Injection vulnerability in Intern Record System version 1.0 in /intern/contr
- https://github.com/h4md153v63n/CVE-2022-40347_Intern-Record-System-phone-V1.0-SQL-Injection-Vulnerability-Unauthenticated
#### Github
+- https://github.com/h4md153v63n/CVE-2022-40347_Intern-Record-System-phone-V1.0-SQL-Injection-Vulnerability-Unauthenticated
- https://github.com/h4md153v63n/CVEs
- https://github.com/h4md153v63n/h4md153v63n
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2022/CVE-2022-40348.md b/2022/CVE-2022-40348.md
index 4cdd405a05..8edc282169 100644
--- a/2022/CVE-2022-40348.md
+++ b/2022/CVE-2022-40348.md
@@ -13,6 +13,7 @@ Cross Site Scripting (XSS) vulnerability in Intern Record System version 1.0 in
- https://github.com/h4md153v63n/CVE-2022-40348_Intern-Record-System-Cross-site-Scripting-V1.0-Vulnerability-Unauthenticated
#### Github
+- https://github.com/h4md153v63n/CVE-2022-40348_Intern-Record-System-Cross-site-Scripting-V1.0-Vulnerability-Unauthenticated
- https://github.com/h4md153v63n/CVEs
- https://github.com/h4md153v63n/h4md153v63n
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2022/CVE-2022-40471.md b/2022/CVE-2022-40471.md
index f47017a7c2..557af62396 100644
--- a/2022/CVE-2022-40471.md
+++ b/2022/CVE-2022-40471.md
@@ -15,6 +15,7 @@ Remote Code Execution in Clinic's Patient Management System v 1.0 allows Attacke
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/RashidKhanPathan/CVE-2022-40471
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2022/CVE-2022-40624.md b/2022/CVE-2022-40624.md
index aff323b9ac..ebe3884962 100644
--- a/2022/CVE-2022-40624.md
+++ b/2022/CVE-2022-40624.md
@@ -14,6 +14,7 @@ pfSense pfBlockerNG through 2.1.4_27 allows remote attackers to execute arbitrar
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/dhammon/pfBlockerNg-CVE-2022-40624
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2022/CVE-2022-40684.md b/2022/CVE-2022-40684.md
index 79fb02e1d0..b604e4af28 100644
--- a/2022/CVE-2022-40684.md
+++ b/2022/CVE-2022-40684.md
@@ -15,6 +15,7 @@ An authentication bypass using an alternate path or channel [CWE-288] in Fortine
#### Github
- https://github.com/0day404/vulnerability-poc
+- https://github.com/0xMarcio/cve
- https://github.com/20142995/sectool
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
diff --git a/2022/CVE-2022-40881.md b/2022/CVE-2022-40881.md
index 3dbfa1634b..297072f12d 100644
--- a/2022/CVE-2022-40881.md
+++ b/2022/CVE-2022-40881.md
@@ -18,6 +18,7 @@ SolarView Compact 6.00 was discovered to contain a command injection vulnerabili
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/KayCHENvip/vulnerability-poc
- https://github.com/Threekiii/Awesome-POC
+- https://github.com/Timorlover/SolarView_Compact_6.0_rce_via_network_test.php
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/yilin1203/CVE-2022-40881
diff --git a/2022/CVE-2022-40890.md b/2022/CVE-2022-40890.md
index 36558308a4..d170d45981 100644
--- a/2022/CVE-2022-40890.md
+++ b/2022/CVE-2022-40890.md
@@ -14,4 +14,5 @@ A vulnerability in /src/amf/amf-context.c in Open5GS 2.4.10 and earlier leads to
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/ToughRunner/Open5gs_bugreport
diff --git a/2022/CVE-2022-40982.md b/2022/CVE-2022-40982.md
index 30d133e7d3..e9c6180d2b 100644
--- a/2022/CVE-2022-40982.md
+++ b/2022/CVE-2022-40982.md
@@ -16,6 +16,7 @@ Information exposure through microarchitectural state after transient execution
#### Github
- https://github.com/EGI-Federation/SVG-advisories
- https://github.com/bcoles/kasld
+- https://github.com/codexlynx/hardware-attacks-state-of-the-art
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/giterlizzi/secdb-feeds
- https://github.com/hughsie/python-uswid
diff --git a/2022/CVE-2022-41218.md b/2022/CVE-2022-41218.md
index 3cdff643b4..527111c5e7 100644
--- a/2022/CVE-2022-41218.md
+++ b/2022/CVE-2022-41218.md
@@ -33,6 +33,7 @@ In drivers/media/dvb-core/dmxdev.c in the Linux kernel through 5.19.10, there is
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/whoforget/CVE-POC
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
- https://github.com/youwizard/CVE-POC
- https://github.com/zecool/cve
diff --git a/2022/CVE-2022-41358.md b/2022/CVE-2022-41358.md
index e08a7174a3..aaa3df72dd 100644
--- a/2022/CVE-2022-41358.md
+++ b/2022/CVE-2022-41358.md
@@ -20,6 +20,7 @@ A stored cross-site scripting (XSS) vulnerability in Garage Management System v1
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/thecasual/CVE-2022-41358
- https://github.com/whoforget/CVE-POC
- https://github.com/youwizard/CVE-POC
diff --git a/2022/CVE-2022-41401.md b/2022/CVE-2022-41401.md
index 30999c2d88..d9cc2884ad 100644
--- a/2022/CVE-2022-41401.md
+++ b/2022/CVE-2022-41401.md
@@ -13,5 +13,6 @@ OpenRefine <= v3.5.2 contains a Server-Side Request Forgery (SSRF) vulnerability
- https://github.com/ixSly/CVE-2022-41401
#### Github
+- https://github.com/ixSly/CVE-2022-41401
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2022/CVE-2022-41412.md b/2022/CVE-2022-41412.md
index 837cb6573d..aecbc0234e 100644
--- a/2022/CVE-2022-41412.md
+++ b/2022/CVE-2022-41412.md
@@ -17,6 +17,7 @@ An issue in the graphData.cgi component of perfSONAR v4.4.5 and prior allows att
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/renmizo/CVE-2022-41412
- https://github.com/whoforget/CVE-POC
- https://github.com/youwizard/CVE-POC
diff --git a/2022/CVE-2022-41413.md b/2022/CVE-2022-41413.md
index a098762f76..194cd31e2e 100644
--- a/2022/CVE-2022-41413.md
+++ b/2022/CVE-2022-41413.md
@@ -18,6 +18,7 @@ perfSONAR v4.x <= v4.4.5 was discovered to contain a Cross-Site Request Forgery
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/renmizo/CVE-2022-41413
- https://github.com/whoforget/CVE-POC
- https://github.com/youwizard/CVE-POC
diff --git a/2022/CVE-2022-41445.md b/2022/CVE-2022-41445.md
index 397d35b980..e1a807843d 100644
--- a/2022/CVE-2022-41445.md
+++ b/2022/CVE-2022-41445.md
@@ -14,6 +14,7 @@ A cross-site scripting (XSS) vulnerability in Record Management System using Cod
- https://ihexcoder.wixsite.com/secresearch/post/cve-2022-41445-cross-site-scripting-in-teachers-record-management-system-using-codeignitor
#### Github
+- https://github.com/RashidKhanPathan/CVE-2022-41445
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2022/CVE-2022-41446.md b/2022/CVE-2022-41446.md
index 83f066497f..04a403136c 100644
--- a/2022/CVE-2022-41446.md
+++ b/2022/CVE-2022-41446.md
@@ -14,6 +14,7 @@ An access control issue in /Admin/dashboard.php of Record Management System usin
- https://ihexcoder.wixsite.com/secresearch/post/privilege-escalation-in-teachers-record-management-system-using-codeignitor
#### Github
+- https://github.com/RashidKhanPathan/CVE-2022-41446
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2022/CVE-2022-42046.md b/2022/CVE-2022-42046.md
index dc2c0ec42b..7386ad8184 100644
--- a/2022/CVE-2022-42046.md
+++ b/2022/CVE-2022-42046.md
@@ -18,6 +18,7 @@ wfshbr64.sys and wfshbr32.sys specially crafted IOCTL allows arbitrary user to p
- https://github.com/gmh5225/awesome-game-security
- https://github.com/goldenscale/GS_GithubMirror
- https://github.com/k0mi-tg/CVE-POC
+- https://github.com/kkent030315/CVE-2022-42046
- https://github.com/manas3c/CVE-POC
- https://github.com/nanaroam/kaditaroam
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2022/CVE-2022-42176.md b/2022/CVE-2022-42176.md
index 66f23075a4..24cbb0bb23 100644
--- a/2022/CVE-2022-42176.md
+++ b/2022/CVE-2022-42176.md
@@ -17,6 +17,7 @@ In PCTechSoft PCSecure V5.0.8.xw, use of Hard-coded Credentials in configuration
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/soy-oreocato/CVE-2022-42176
- https://github.com/whoforget/CVE-POC
- https://github.com/youwizard/CVE-POC
diff --git a/2022/CVE-2022-42252.md b/2022/CVE-2022-42252.md
index 8980870d06..12b37e02a6 100644
--- a/2022/CVE-2022-42252.md
+++ b/2022/CVE-2022-42252.md
@@ -17,4 +17,5 @@ No PoCs from references.
- https://github.com/fernandoreb/dependency-check-springboot
- https://github.com/sr-monika/sprint-rest
- https://github.com/tanjiti/sec_profile
+- https://github.com/versio-io/product-lifecycle-security-api
diff --git a/2022/CVE-2022-42457.md b/2022/CVE-2022-42457.md
index f5710c7187..c2c45eabbc 100644
--- a/2022/CVE-2022-42457.md
+++ b/2022/CVE-2022-42457.md
@@ -14,4 +14,5 @@ Generex CS141 through 2.10 allows remote command execution by administrators via
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/hubertfarnsworth12/Generex-CS141-Authenticated-Remote-Command-Execution
diff --git a/2022/CVE-2022-42703.md b/2022/CVE-2022-42703.md
index d571037386..bbf3413659 100644
--- a/2022/CVE-2022-42703.md
+++ b/2022/CVE-2022-42703.md
@@ -35,5 +35,6 @@ mm/rmap.c in the Linux kernel before 5.19.7 has a use-after-free related to leaf
- https://github.com/pray77/SCTF2023_kernelpwn
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/veritas501/hbp_attack_demo
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2022/CVE-2022-42889.md b/2022/CVE-2022-42889.md
index 38a6c61de9..c8527257ec 100644
--- a/2022/CVE-2022-42889.md
+++ b/2022/CVE-2022-42889.md
@@ -55,6 +55,7 @@ Apache Commons Text performs variable interpolation, allowing properties to be d
- https://github.com/Vamckis/Container-Security
- https://github.com/Vulnmachines/text4shell-CVE-2022-42889
- https://github.com/WFS-Mend/vtrade-common
+- https://github.com/Whoopsunix/PPPVULNS
- https://github.com/XRSec/AWVS-Update
- https://github.com/Y4tacker/JavaSec
- https://github.com/aaronm-sysdig/text4shell-docker
diff --git a/2022/CVE-2022-42895.md b/2022/CVE-2022-42895.md
index 26139707b3..c2c00f1764 100644
--- a/2022/CVE-2022-42895.md
+++ b/2022/CVE-2022-42895.md
@@ -25,5 +25,6 @@ No PoCs from references.
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2022/CVE-2022-42896.md b/2022/CVE-2022-42896.md
index 0f8107399e..8bd5ac6767 100644
--- a/2022/CVE-2022-42896.md
+++ b/2022/CVE-2022-42896.md
@@ -30,5 +30,6 @@ No PoCs from references.
- https://github.com/nidhi7598/linux-4.1.15_CVE-2022-42896
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/ssr-111/linux-kernel-exploitation
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2022/CVE-2022-43117.md b/2022/CVE-2022-43117.md
index a13e184824..ac1e3cebc0 100644
--- a/2022/CVE-2022-43117.md
+++ b/2022/CVE-2022-43117.md
@@ -14,6 +14,7 @@ Sourcecodester Password Storage Application in PHP/OOP and MySQL 1.0 was discove
- https://github.com/RashidKhanPathan/CVE-2022-43117
#### Github
+- https://github.com/RashidKhanPathan/CVE-2022-43117
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2022/CVE-2022-43144.md b/2022/CVE-2022-43144.md
index b10e18c68e..756140379c 100644
--- a/2022/CVE-2022-43144.md
+++ b/2022/CVE-2022-43144.md
@@ -15,6 +15,7 @@ A cross-site scripting (XSS) vulnerability in Canteen Management System v1.0 all
#### Github
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
+- https://github.com/mudassiruddin/CVE-2022-43144-Stored-XSS
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/whoforget/CVE-POC
- https://github.com/youwizard/CVE-POC
diff --git a/2022/CVE-2022-43293.md b/2022/CVE-2022-43293.md
index 4b270bc733..e36396f3d6 100644
--- a/2022/CVE-2022-43293.md
+++ b/2022/CVE-2022-43293.md
@@ -14,5 +14,6 @@ Wacom Driver 6.3.46-1 for Windows was discovered to contain an arbitrary file wr
- https://lucabarile.github.io/Blog/CVE-2022-43293/index.html
#### Github
+- https://github.com/LucaBarile/CVE-2022-43293
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2022/CVE-2022-44215.md b/2022/CVE-2022-44215.md
index 4d09376d1a..f4e212c581 100644
--- a/2022/CVE-2022-44215.md
+++ b/2022/CVE-2022-44215.md
@@ -13,6 +13,7 @@ There is an open redirect vulnerability in Titan FTP server 19.0 and below. User
- https://github.com/JBalanza/CVE-2022-44215
#### Github
+- https://github.com/JBalanza/CVE-2022-44215
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2022/CVE-2022-44268.md b/2022/CVE-2022-44268.md
index 7887ff27cd..de8676236d 100644
--- a/2022/CVE-2022-44268.md
+++ b/2022/CVE-2022-44268.md
@@ -44,6 +44,7 @@ ImageMagick 7.1.0-49 is vulnerable to Information Disclosure. When it parses a P
- https://github.com/daniellemonika/CSCE-5552-Prying-Eyes
- https://github.com/doyensec/imagemagick-security-policy-evaluator
- https://github.com/duc-nt/CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC
+- https://github.com/enomothem/PenTestNote
- https://github.com/entr0pie/CVE-2022-44268
- https://github.com/fanbyprinciple/ImageMagick-lfi-poc
- https://github.com/jnschaeffer/cve-2022-44268-detector
diff --git a/2022/CVE-2022-44276.md b/2022/CVE-2022-44276.md
index c3d4cf742c..efd36558bf 100644
--- a/2022/CVE-2022-44276.md
+++ b/2022/CVE-2022-44276.md
@@ -13,5 +13,6 @@ In Responsive Filemanager < 9.12.0, an attacker can bypass upload restrictions r
- https://github.com/HerrLeStrate/CVE-2022-44276-PoC
#### Github
+- https://github.com/HerrLeStrate/CVE-2022-44276-PoC
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2022/CVE-2022-44830.md b/2022/CVE-2022-44830.md
index c10ba81eb8..f2c5bb9a82 100644
--- a/2022/CVE-2022-44830.md
+++ b/2022/CVE-2022-44830.md
@@ -13,6 +13,7 @@ Sourcecodester Event Registration App v1.0 was discovered to contain multiple CS
- https://github.com/RashidKhanPathan/CVE-2022-44830
#### Github
+- https://github.com/RashidKhanPathan/CVE-2022-44830
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2022/CVE-2022-45063.md b/2022/CVE-2022-45063.md
index 3f596a7d8a..77a75f49e0 100644
--- a/2022/CVE-2022-45063.md
+++ b/2022/CVE-2022-45063.md
@@ -10,7 +10,7 @@ xterm before 375 allows code execution via font ops, e.g., because an OSC 50 res
### POC
#### Reference
-No PoCs from references.
+- http://www.openwall.com/lists/oss-security/2024/06/17/1
#### Github
- https://github.com/ARPSyndicate/cvemon
diff --git a/2022/CVE-2022-45168.md b/2022/CVE-2022-45168.md
new file mode 100644
index 0000000000..7020b444c0
--- /dev/null
+++ b/2022/CVE-2022-45168.md
@@ -0,0 +1,17 @@
+### [CVE-2022-45168](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45168)
+
+
+
+
+### Description
+
+An issue was discovered in LIVEBOX Collaboration vDesk through v018. A Bypass of Two-Factor Authentication can occur under the /login/backup_code endpoint and the /api/v1/vdeskintegration/createbackupcodes endpoint, because the application allows a user to generate or regenerate the backup codes before checking the TOTP.
+
+### POC
+
+#### Reference
+- https://www.gruppotim.it/it/footer/red-team.html
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2022/CVE-2022-45176.md b/2022/CVE-2022-45176.md
new file mode 100644
index 0000000000..cafff37d62
--- /dev/null
+++ b/2022/CVE-2022-45176.md
@@ -0,0 +1,17 @@
+### [CVE-2022-45176](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45176)
+
+
+
+
+### Description
+
+An issue was discovered in LIVEBOX Collaboration vDesk through v018. Stored Cross-site Scripting (XSS) can occur under the /api/v1/getbodyfile endpoint via the uri parameter. The web application (through its vShare functionality section) doesn't properly check parameters, sent in HTTP requests as input, before saving them on the server. In addition, crafted JavaScript content can then be reflected back to the end user and executed by the web browser.
+
+### POC
+
+#### Reference
+- https://www.gruppotim.it/it/footer/red-team.html
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2022/CVE-2022-45299.md b/2022/CVE-2022-45299.md
index ac6b653426..9df7e314d7 100644
--- a/2022/CVE-2022-45299.md
+++ b/2022/CVE-2022-45299.md
@@ -17,6 +17,7 @@ An issue in the IpFile argument of rust-lang webbrowser-rs v0.8.2 allows attacke
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/offalltn/CVE-2022-45299
- https://github.com/whoforget/CVE-POC
- https://github.com/youwizard/CVE-POC
diff --git a/2022/CVE-2022-4543.md b/2022/CVE-2022-4543.md
index 3717746f7d..388128dcdb 100644
--- a/2022/CVE-2022-4543.md
+++ b/2022/CVE-2022-4543.md
@@ -32,5 +32,6 @@ A flaw named "EntryBleed" was found in the Linux Kernel Page Table Isolation (KP
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/sunichi/cve-2022-4543-wrapper
+- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation
diff --git a/2022/CVE-2022-45599.md b/2022/CVE-2022-45599.md
index 229cfe47d9..036373b82e 100644
--- a/2022/CVE-2022-45599.md
+++ b/2022/CVE-2022-45599.md
@@ -14,5 +14,6 @@ Aztech WMB250AC Mesh Routers Firmware Version 016 2020 is vulnerable to PHP Type
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/ethancunt/CVE-2022-45599
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2022/CVE-2022-45600.md b/2022/CVE-2022-45600.md
index 9ce0231332..3101bfa005 100644
--- a/2022/CVE-2022-45600.md
+++ b/2022/CVE-2022-45600.md
@@ -14,5 +14,6 @@ Aztech WMB250AC Mesh Routers Firmware Version 016 2020 devices improperly manage
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/ethancunt/CVE-2022-45600
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2022/CVE-2022-45697.md b/2022/CVE-2022-45697.md
index fb90e8c9c8..4ef92c6903 100644
--- a/2022/CVE-2022-45697.md
+++ b/2022/CVE-2022-45697.md
@@ -14,4 +14,5 @@ Arbitrary File Delete vulnerability in Razer Central before v7.8.0.381 when hand
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/Wh04m1001/CVE
diff --git a/2022/CVE-2022-46440.md b/2022/CVE-2022-46440.md
index 53ab8034e6..51f22f3ab0 100644
--- a/2022/CVE-2022-46440.md
+++ b/2022/CVE-2022-46440.md
@@ -15,4 +15,5 @@ ttftool v0.9.2 was discovered to contain a segmentation violation via the readU1
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/keepinggg/poc
diff --git a/2022/CVE-2022-46485.md b/2022/CVE-2022-46485.md
index 2cb73b305e..e35daba261 100644
--- a/2022/CVE-2022-46485.md
+++ b/2022/CVE-2022-46485.md
@@ -13,6 +13,7 @@ Data Illusion Survey Software Solutions ngSurvey version 2.4.28 and below is vul
- https://github.com/WodenSec/CVE-2022-46485
#### Github
+- https://github.com/WodenSec/CVE-2022-46485
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2022/CVE-2022-47072.md b/2022/CVE-2022-47072.md
index 00f4fe28b4..637bce62c0 100644
--- a/2022/CVE-2022-47072.md
+++ b/2022/CVE-2022-47072.md
@@ -14,4 +14,5 @@ SQL injection vulnerability in Enterprise Architect 16.0.1605 32-bit allows atta
#### Github
- https://github.com/DojoSecurity/DojoSecurity
+- https://github.com/DojoSecurity/Enterprise-Architect-SQL-Injection
diff --git a/2022/CVE-2022-47514.md b/2022/CVE-2022-47514.md
index d2f604db8d..e6ca343ccf 100644
--- a/2022/CVE-2022-47514.md
+++ b/2022/CVE-2022-47514.md
@@ -14,4 +14,5 @@ An XML external entity (XXE) injection vulnerability in XML-RPC.NET before 2.5.0
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/jumpycastle/xmlrpc.net-poc
diff --git a/2022/CVE-2022-47949.md b/2022/CVE-2022-47949.md
index 4d99ca8187..f44296bccc 100644
--- a/2022/CVE-2022-47949.md
+++ b/2022/CVE-2022-47949.md
@@ -14,5 +14,6 @@ The Nintendo NetworkBuffer class, as used in Animal Crossing: New Horizons befor
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/PabloMK7/ENLBufferPwn
- https://github.com/dgwynne/udp-bind-proxy
diff --git a/2022/CVE-2022-47966.md b/2022/CVE-2022-47966.md
index 814a2799d4..8729ca0f2b 100644
--- a/2022/CVE-2022-47966.md
+++ b/2022/CVE-2022-47966.md
@@ -29,6 +29,7 @@ Multiple Zoho ManageEngine on-premise products, such as ServiceDesk Plus through
- https://github.com/UNC1739/awesome-vulnerability-research
- https://github.com/aneasystone/github-trending
- https://github.com/fardeen-ahmed/Bug-bounty-Writeups
+- https://github.com/horizon3ai/CVE-2022-47966
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2022/CVE-2022-48019.md b/2022/CVE-2022-48019.md
index e018eba838..0cbb49c958 100644
--- a/2022/CVE-2022-48019.md
+++ b/2022/CVE-2022-48019.md
@@ -13,4 +13,5 @@ The components wfshbr64.sys and wfshbr32.sys in Another Eden before v3.0.20 and
- https://github.com/kkent030315/CVE-2022-42046
#### Github
+- https://github.com/kkent030315/CVE-2022-42046
diff --git a/2022/CVE-2022-48150.md b/2022/CVE-2022-48150.md
index df7099467b..6492120337 100644
--- a/2022/CVE-2022-48150.md
+++ b/2022/CVE-2022-48150.md
@@ -14,4 +14,5 @@ Shopware v5.5.10 was discovered to contain a cross-site scripting (XSS) vulnerab
#### Github
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/sahilop123/-CVE-2022-48150
diff --git a/2022/CVE-2022-48311.md b/2022/CVE-2022-48311.md
index e88bcd6b8c..11b8e68046 100644
--- a/2022/CVE-2022-48311.md
+++ b/2022/CVE-2022-48311.md
@@ -17,6 +17,7 @@
- https://github.com/karimhabush/cyberowl
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/swzhouu/CVE-2022-48311
- https://github.com/whoforget/CVE-POC
- https://github.com/youwizard/CVE-POC
diff --git a/2023/CVE-2023-1370.md b/2023/CVE-2023-1370.md
index ba1a366f57..3667571e6e 100644
--- a/2023/CVE-2023-1370.md
+++ b/2023/CVE-2023-1370.md
@@ -5,7 +5,7 @@
### Description
-[Json-smart](https://netplex.github.io/json-smart/) is a performance focused, JSON processor lib. When reaching a ‘[‘ or ‘{‘ character in the JSON input, the code parses an array or an object respectively. It was discovered that the code does not have any limit to the nesting of such arrays or objects. Since the parsing of nested arrays and objects is done recursively, nesting too many of them can cause a stack exhaustion (stack overflow) and crash the software.
+[Json-smart](https://netplex.github.io/json-smart/) is a performance focused, JSON processor lib.When reaching a ‘[‘ or ‘{‘ character in the JSON input, the code parses an array or an object respectively.It was discovered that the code does not have any limit to the nesting of such arrays or objects. Since the parsing of nested arrays and objects is done recursively, nesting too many of them can cause a stack exhaustion (stack overflow) and crash the software.
### POC
diff --git a/2023/CVE-2023-20007.md b/2023/CVE-2023-20007.md
index 55d9331287..e731286c86 100644
--- a/2023/CVE-2023-20007.md
+++ b/2023/CVE-2023-20007.md
@@ -5,9 +5,7 @@
### Description
-A vulnerability in the web-based management interface of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to execute arbitrary code or cause the web-based management process on the device to restart unexpectedly, resulting in a denial of service (DoS) condition. The attacker must have valid administrator credentials.
-
- This vulnerability is due to insufficient validation of user-supplied input to the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the web-based management process to restart, resulting in a DoS condition.
+A vulnerability in the web-based management interface of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to execute arbitrary code or cause the web-based management process on the device to restart unexpectedly, resulting in a denial of service (DoS) condition. The attacker must have valid administrator credentials.
This vulnerability is due to insufficient validation of user-supplied input to the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the web-based management process to restart, resulting in a DoS condition.
### POC
diff --git a/2023/CVE-2023-20009.md b/2023/CVE-2023-20009.md
index f5126d2a55..e7baf443f2 100644
--- a/2023/CVE-2023-20009.md
+++ b/2023/CVE-2023-20009.md
@@ -7,9 +7,7 @@
### Description
-A vulnerability in the Web UI and administrative CLI of the Cisco Secure Email Gateway (ESA) and Cisco Secure Email and Web Manager (SMA) could allow an authenticated remote attacker and or authenticated local attacker to escalate their privilege level and gain root access. The attacker has to have a valid user credential with at least a [[privilege of operator - validate actual name]].
-
- The vulnerability is due to the processing of a specially crafted SNMP configuration file. An attacker could exploit this vulnerability by authenticating to the targeted device and uploading a specially crafted SNMP configuration file that when uploaded could allow for the execution of commands as root. An exploit could allow the attacker to gain root access on the device.
+A vulnerability in the Web UI and administrative CLI of the Cisco Secure Email Gateway (ESA) and Cisco Secure Email and Web Manager (SMA) could allow an authenticated remote attacker and or authenticated local attacker to escalate their privilege level and gain root access. The attacker has to have a valid user credential with at least a [[privilege of operator - validate actual name]].
The vulnerability is due to the processing of a specially crafted SNMP configuration file. An attacker could exploit this vulnerability by authenticating to the targeted device and uploading a specially crafted SNMP configuration file that when uploaded could allow for the execution of commands as root. An exploit could allow the attacker to gain root access on the device.
### POC
diff --git a/2023/CVE-2023-20010.md b/2023/CVE-2023-20010.md
index 4482eaa6b5..565d5d18d6 100644
--- a/2023/CVE-2023-20010.md
+++ b/2023/CVE-2023-20010.md
@@ -5,9 +5,7 @@
### Description
-A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.
-
- This vulnerability exists because the web-based management interface inadequately validates user input. An attacker could exploit this vulnerability by authenticating to the application as a low-privileged user and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to read or modify any data on the underlying database or elevate their privileges.
+A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.
This vulnerability exists because the web-based management interface inadequately validates user input. An attacker could exploit this vulnerability by authenticating to the application as a low-privileged user and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to read or modify any data on the underlying database or elevate their privileges.
### POC
diff --git a/2023/CVE-2023-20019.md b/2023/CVE-2023-20019.md
index 45dbe893af..4b21b9361c 100644
--- a/2023/CVE-2023-20019.md
+++ b/2023/CVE-2023-20019.md
@@ -5,9 +5,7 @@
### Description
-A vulnerability in the web-based management interface of Cisco BroadWorks Application Delivery Platform, Cisco BroadWorks Application Server, and Cisco BroadWorks Xtended Services Platform could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device.
-
- This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
+A vulnerability in the web-based management interface of Cisco BroadWorks Application Delivery Platform, Cisco BroadWorks Application Server, and Cisco BroadWorks Xtended Services Platform could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface of an affected device.
This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
### POC
diff --git a/2023/CVE-2023-20020.md b/2023/CVE-2023-20020.md
index ee5d26afcb..731a1b9d55 100644
--- a/2023/CVE-2023-20020.md
+++ b/2023/CVE-2023-20020.md
@@ -5,9 +5,7 @@
### Description
-A vulnerability in the Device Management Servlet application of Cisco BroadWorks Application Delivery Platform and Cisco BroadWorks Xtended Services Platform could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
-
- This vulnerability is due to improper input validation when parsing HTTP requests. An attacker could exploit this vulnerability by sending a sustained stream of crafted requests to an affected device. A successful exploit could allow the attacker to cause all subsequent requests to be dropped, resulting in a DoS condition.
+A vulnerability in the Device Management Servlet application of Cisco BroadWorks Application Delivery Platform and Cisco BroadWorks Xtended Services Platform could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to improper input validation when parsing HTTP requests. An attacker could exploit this vulnerability by sending a sustained stream of crafted requests to an affected device. A successful exploit could allow the attacker to cause all subsequent requests to be dropped, resulting in a DoS condition.
### POC
diff --git a/2023/CVE-2023-20025.md b/2023/CVE-2023-20025.md
index 85300e5589..5fd853bbc0 100644
--- a/2023/CVE-2023-20025.md
+++ b/2023/CVE-2023-20025.md
@@ -5,9 +5,7 @@
### Description
-A vulnerability in the web-based management interface of Cisco Small Business RV042 Series Routers could allow an unauthenticated, remote attacker to bypass authentication on the affected device.
-
- This vulnerability is due to incorrect user input validation of incoming HTTP packets. An attacker could exploit this vulnerability by sending crafted requests to the web-based management interface. A successful exploit could allow the attacker to gain root privileges on the affected device.
+A vulnerability in the web-based management interface of Cisco Small Business RV042 Series Routers could allow an unauthenticated, remote attacker to bypass authentication on the affected device.
This vulnerability is due to incorrect user input validation of incoming HTTP packets. An attacker could exploit this vulnerability by sending crafted requests to the web-based management interface. A successful exploit could allow the attacker to gain root privileges on the affected device.
### POC
@@ -15,6 +13,7 @@ A vulnerability in the web-based management interface of Cisco Small Business RV
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sbr042-multi-vuln-ej76Pke5
#### Github
+- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/lnversed/CVE-2023-20025
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-20026.md b/2023/CVE-2023-20026.md
index 20e04beeba..1ce62fd111 100644
--- a/2023/CVE-2023-20026.md
+++ b/2023/CVE-2023-20026.md
@@ -5,9 +5,7 @@
### Description
-A vulnerability in the web-based management interface of Cisco Small Business Routers RV042 Series could allow an authenticated, remote attacker to inject arbitrary commands on an affected device.
-
- This vulnerability is due to improper validation of user input fields within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on an affected device with root-level privileges. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device.
+A vulnerability in the web-based management interface of Cisco Small Business Routers RV042 Series could allow an authenticated, remote attacker to inject arbitrary commands on an affected device.
This vulnerability is due to improper validation of user input fields within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary commands on an affected device with root-level privileges. To exploit these vulnerabilities, an attacker would need to have valid Administrator credentials on the affected device.
### POC
diff --git a/2023/CVE-2023-20032.md b/2023/CVE-2023-20032.md
index 58ba8c3b86..40d7aa5f7d 100644
--- a/2023/CVE-2023-20032.md
+++ b/2023/CVE-2023-20032.md
@@ -9,15 +9,7 @@
### Description
-On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed:
-
-
- A vulnerability in the HFS+ partition file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to execute arbitrary code.
-
-
- This vulnerability is due to a missing buffer size check that may result in a heap buffer overflow write. An attacker could exploit this vulnerability by submitting a crafted HFS+ partition file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the ClamAV scanning process, or else crash the process, resulting in a denial of service (DoS) condition.
-
- For a description of this vulnerability, see the ClamAV blog ["https://blog.clamav.net/"].
+On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed:
A vulnerability in the HFS+ partition file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to execute arbitrary code.
This vulnerability is due to a missing buffer size check that may result in a heap buffer overflow write. An attacker could exploit this vulnerability by submitting a crafted HFS+ partition file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the ClamAV scanning process, or else crash the process, resulting in a denial of service (DoS) condition.
For a description of this vulnerability, see the ClamAV blog ["https://blog.clamav.net/"].
### POC
diff --git a/2023/CVE-2023-20043.md b/2023/CVE-2023-20043.md
index 8bd154e309..3130036d85 100644
--- a/2023/CVE-2023-20043.md
+++ b/2023/CVE-2023-20043.md
@@ -5,9 +5,7 @@
### Description
-A vulnerability in Cisco CX Cloud Agent of could allow an authenticated, local attacker to elevate their privileges.
-
- This vulnerability is due to insecure file permissions. An attacker could exploit this vulnerability by calling the script with sudo. A successful exploit could allow the attacker to take complete control of the affected device.
+A vulnerability in Cisco CX Cloud Agent of could allow an authenticated, local attacker to elevate their privileges.
This vulnerability is due to insecure file permissions. An attacker could exploit this vulnerability by calling the script with sudo. A successful exploit could allow the attacker to take complete control of the affected device.
### POC
diff --git a/2023/CVE-2023-20046.md b/2023/CVE-2023-20046.md
index 3cf265bd8a..bbd312beee 100644
--- a/2023/CVE-2023-20046.md
+++ b/2023/CVE-2023-20046.md
@@ -7,11 +7,7 @@
### Description
-A vulnerability in the key-based SSH authentication feature of Cisco StarOS Software could allow an authenticated, remote attacker to elevate privileges on an affected device.
-
- This vulnerability is due to insufficient validation of user-supplied credentials. An attacker could exploit this vulnerability by sending a valid low-privileged SSH key to an affected device from a host that has an IP address that is configured as the source for a high-privileged user account. A successful exploit could allow the attacker to log in to the affected device through SSH as a high-privileged user.
-
- There are workarounds that address this vulnerability.
+A vulnerability in the key-based SSH authentication feature of Cisco StarOS Software could allow an authenticated, remote attacker to elevate privileges on an affected device.
This vulnerability is due to insufficient validation of user-supplied credentials. An attacker could exploit this vulnerability by sending a valid low-privileged SSH key to an affected device from a host that has an IP address that is configured as the source for a high-privileged user account. A successful exploit could allow the attacker to log in to the affected device through SSH as a high-privileged user.
There are workarounds that address this vulnerability.
### POC
diff --git a/2023/CVE-2023-20052.md b/2023/CVE-2023-20052.md
index cf416e51a5..575b4c826f 100644
--- a/2023/CVE-2023-20052.md
+++ b/2023/CVE-2023-20052.md
@@ -5,13 +5,7 @@
### Description
-On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed:
-
-
- A vulnerability in the DMG file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to access sensitive information on an affected device.
-
-
- This vulnerability is due to enabling XML entity substitution that may result in XML external entity injection. An attacker could exploit this vulnerability by submitting a crafted DMG file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to leak bytes from any file that may be read by the ClamAV scanning process.
+On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed:
A vulnerability in the DMG file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to access sensitive information on an affected device.
This vulnerability is due to enabling XML entity substitution that may result in XML external entity injection. An attacker could exploit this vulnerability by submitting a crafted DMG file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to leak bytes from any file that may be read by the ClamAV scanning process.
### POC
diff --git a/2023/CVE-2023-20057.md b/2023/CVE-2023-20057.md
index 64e94bd642..56d4327848 100644
--- a/2023/CVE-2023-20057.md
+++ b/2023/CVE-2023-20057.md
@@ -5,9 +5,7 @@
### Description
-A vulnerability in the URL filtering mechanism of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device.
-
- This vulnerability is due to improper processing of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for an affected device, which could allow malicious URLs to pass through the device.
+A vulnerability in the URL filtering mechanism of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass the URL reputation filters on an affected device.
This vulnerability is due to improper processing of URLs. An attacker could exploit this vulnerability by crafting a URL in a particular way. A successful exploit could allow the attacker to bypass the URL reputation filters that are configured for an affected device, which could allow malicious URLs to pass through the device.
### POC
diff --git a/2023/CVE-2023-20065.md b/2023/CVE-2023-20065.md
index 41ed79c57b..92119e588a 100644
--- a/2023/CVE-2023-20065.md
+++ b/2023/CVE-2023-20065.md
@@ -5,9 +5,7 @@
### Description
-A vulnerability in the Cisco IOx application hosting subsystem of Cisco IOS XE Software could allow an authenticated, local attacker to elevate privileges to root on an affected device.
-
- This vulnerability is due to insufficient restrictions on the hosted application. An attacker could exploit this vulnerability by logging in to and then escaping the Cisco IOx application container. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges.
+A vulnerability in the Cisco IOx application hosting subsystem of Cisco IOS XE Software could allow an authenticated, local attacker to elevate privileges to root on an affected device.
This vulnerability is due to insufficient restrictions on the hosted application. An attacker could exploit this vulnerability by logging in to and then escaping the Cisco IOx application container. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges.
### POC
diff --git a/2023/CVE-2023-20075.md b/2023/CVE-2023-20075.md
index 021acc8f7d..ce12816e34 100644
--- a/2023/CVE-2023-20075.md
+++ b/2023/CVE-2023-20075.md
@@ -5,9 +5,7 @@
### Description
-Vulnerability in the CLI of Cisco Secure Email Gateway could allow an authenticated, remote attacker to execute arbitrary commands.
-
- These vulnerability is due to improper input validation in the CLI. An attacker could exploit this vulnerability by injecting operating system commands into a legitimate command. A successful exploit could allow the attacker to escape the restricted command prompt and execute arbitrary commands on the underlying operating system. To successfully exploit this vulnerability, an attacker would need valid Administrator credentials.
+Vulnerability in the CLI of Cisco Secure Email Gateway could allow an authenticated, remote attacker to execute arbitrary commands.
These vulnerability is due to improper input validation in the CLI. An attacker could exploit this vulnerability by injecting operating system commands into a legitimate command. A successful exploit could allow the attacker to escape the restricted command prompt and execute arbitrary commands on the underlying operating system. To successfully exploit this vulnerability, an attacker would need valid Administrator credentials.
### POC
diff --git a/2023/CVE-2023-20098.md b/2023/CVE-2023-20098.md
index a04c64207c..aaa6ae60f4 100644
--- a/2023/CVE-2023-20098.md
+++ b/2023/CVE-2023-20098.md
@@ -5,9 +5,7 @@
### Description
-A vulnerability in the CLI of Cisco SDWAN vManage Software could allow an authenticated, local attacker to delete arbitrary files.
-
- This vulnerability is due to improper filtering of directory traversal character sequences within system commands. An attacker with administrative privileges could exploit this vulnerability by running a system command containing directory traversal character sequences to target an arbitrary file. A successful exploit could allow the attacker to delete arbitrary files from the system, including files owned by root.
+A vulnerability in the CLI of Cisco SDWAN vManage Software could allow an authenticated, local attacker to delete arbitrary files.
This vulnerability is due to improper filtering of directory traversal character sequences within system commands. An attacker with administrative privileges could exploit this vulnerability by running a system command containing directory traversal character sequences to target an arbitrary file. A successful exploit could allow the attacker to delete arbitrary files from the system, including files owned by root.
### POC
diff --git a/2023/CVE-2023-20105.md b/2023/CVE-2023-20105.md
index 4c4882ea30..f81323c81d 100644
--- a/2023/CVE-2023-20105.md
+++ b/2023/CVE-2023-20105.md
@@ -5,11 +5,7 @@
### Description
-A vulnerability in the change password functionality of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker with Read-only credentials to elevate privileges to Administrator on an affected system.
-
- This vulnerability is due to incorrect handling of password change requests. An attacker could exploit this vulnerability by authenticating to the application as a Read-only user and sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to alter the passwords of any user on the system, including an administrative user, and then impersonate that user.
-
- Note: Cisco Expressway Series refers to the Expressway Control (Expressway-C) device and the Expressway Edge (Expressway-E) device.
+A vulnerability in the change password functionality of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker with Read-only credentials to elevate privileges to Administrator on an affected system.
This vulnerability is due to incorrect handling of password change requests. An attacker could exploit this vulnerability by authenticating to the application as a Read-only user and sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to alter the passwords of any user on the system, including an administrative user, and then impersonate that user.
Note: Cisco Expressway Series refers to the Expressway Control (Expressway-C) device and the Expressway Edge (Expressway-E) device.
### POC
diff --git a/2023/CVE-2023-20109.md b/2023/CVE-2023-20109.md
index b67285b028..111f693c92 100644
--- a/2023/CVE-2023-20109.md
+++ b/2023/CVE-2023-20109.md
@@ -7,9 +7,7 @@
### Description
-A vulnerability in the Cisco Group Encrypted Transport VPN (GET VPN) feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker who has administrative control of either a group member or a key server to execute arbitrary code on an affected device or cause the device to crash.
-
- This vulnerability is due to insufficient validation of attributes in the Group Domain of Interpretation (GDOI) and G-IKEv2 protocols of the GET VPN feature. An attacker could exploit this vulnerability by either compromising an installed key server or modifying the configuration of a group member to point to a key server that is controlled by the attacker. A successful exploit could allow the attacker to execute arbitrary code and gain full control of the affected system or cause the affected system to reload, resulting in a denial of service (DoS) condition. For more information, see the Details ["#details"] section of this advisory.
+A vulnerability in the Cisco Group Encrypted Transport VPN (GET VPN) feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker who has administrative control of either a group member or a key server to execute arbitrary code on an affected device or cause the device to crash.
This vulnerability is due to insufficient validation of attributes in the Group Domain of Interpretation (GDOI) and G-IKEv2 protocols of the GET VPN feature. An attacker could exploit this vulnerability by either compromising an installed key server or modifying the configuration of a group member to point to a key server that is controlled by the attacker. A successful exploit could allow the attacker to execute arbitrary code and gain full control of the affected system or cause the affected system to reload, resulting in a denial of service (DoS) condition. For more information, see the Details ["#details"] section of this advisory.
### POC
diff --git a/2023/CVE-2023-20115.md b/2023/CVE-2023-20115.md
index 6b4a48bb1b..640903ea87 100644
--- a/2023/CVE-2023-20115.md
+++ b/2023/CVE-2023-20115.md
@@ -5,11 +5,7 @@
### Description
-A vulnerability in the SFTP server implementation for Cisco Nexus 3000 Series Switches and 9000 Series Switches in standalone NX-OS mode could allow an authenticated, remote attacker to download or overwrite files from the underlying operating system of an affected device.
-
- This vulnerability is due to a logic error when verifying the user role when an SFTP connection is opened to an affected device. An attacker could exploit this vulnerability by connecting and authenticating via SFTP as a valid, non-administrator user. A successful exploit could allow the attacker to read or overwrite files from the underlying operating system with the privileges of the authenticated user.
-
- There are workarounds that address this vulnerability.
+A vulnerability in the SFTP server implementation for Cisco Nexus 3000 Series Switches and 9000 Series Switches in standalone NX-OS mode could allow an authenticated, remote attacker to download or overwrite files from the underlying operating system of an affected device.
This vulnerability is due to a logic error when verifying the user role when an SFTP connection is opened to an affected device. An attacker could exploit this vulnerability by connecting and authenticating via SFTP as a valid, non-administrator user. A successful exploit could allow the attacker to read or overwrite files from the underlying operating system with the privileges of the authenticated user.
There are workarounds that address this vulnerability.
### POC
diff --git a/2023/CVE-2023-20116.md b/2023/CVE-2023-20116.md
index 6898f9e494..79d7f43b07 100644
--- a/2023/CVE-2023-20116.md
+++ b/2023/CVE-2023-20116.md
@@ -7,9 +7,7 @@
### Description
-A vulnerability in the Administrative XML Web Service (AXL) API of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
-
- This vulnerability is due to insufficient validation of user-supplied input to the web UI of the Self Care Portal. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow the attacker to cause a DoS condition on the affected device.
+A vulnerability in the Administrative XML Web Service (AXL) API of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to insufficient validation of user-supplied input to the web UI of the Self Care Portal. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow the attacker to cause a DoS condition on the affected device.
### POC
diff --git a/2023/CVE-2023-20118.md b/2023/CVE-2023-20118.md
index c8c1fd68b9..80b17d5a41 100644
--- a/2023/CVE-2023-20118.md
+++ b/2023/CVE-2023-20118.md
@@ -5,11 +5,7 @@
### Description
-A vulnerability in the web-based management interface of Cisco Small Business Routers RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an authenticated, remote attacker to execute arbitrary commands on an affected device.
-
- This vulnerability is due to improper validation of user input within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to gain root-level privileges and access unauthorized data. To exploit this vulnerability, an attacker would need to have valid administrative credentials on the affected device.
-
- Cisco has not and will not release software updates that address this vulnerability.
+A vulnerability in the web-based management interface of Cisco Small Business Routers RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an authenticated, remote attacker to execute arbitrary commands on an affected device.
This vulnerability is due to improper validation of user input within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to gain root-level privileges and access unauthorized data. To exploit this vulnerability, an attacker would need to have valid administrative credentials on the affected device.
Cisco has not and will not release software updates that address this vulnerability.
### POC
diff --git a/2023/CVE-2023-20119.md b/2023/CVE-2023-20119.md
index 696f963c93..3093b67901 100644
--- a/2023/CVE-2023-20119.md
+++ b/2023/CVE-2023-20119.md
@@ -5,9 +5,7 @@
### Description
-A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, formerly known as Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.
-
- This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
+A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, formerly known as Content Security Management Appliance (SMA) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.
This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
### POC
diff --git a/2023/CVE-2023-20133.md b/2023/CVE-2023-20133.md
index 13bf8397ad..0cba1cf975 100644
--- a/2023/CVE-2023-20133.md
+++ b/2023/CVE-2023-20133.md
@@ -5,9 +5,7 @@
### Description
-A vulnerability in the web interface of Cisco Webex Meetings could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.
-
- This vulnerability exists because of insufficient validation of user-supplied input in Webex Events (classic) programs, email templates, and survey questions. An attacker could exploit this vulnerability by persuading a user to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
+A vulnerability in the web interface of Cisco Webex Meetings could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.
This vulnerability exists because of insufficient validation of user-supplied input in Webex Events (classic) programs, email templates, and survey questions. An attacker could exploit this vulnerability by persuading a user to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
### POC
diff --git a/2023/CVE-2023-20178.md b/2023/CVE-2023-20178.md
index 5781373659..b3f75a7e06 100644
--- a/2023/CVE-2023-20178.md
+++ b/2023/CVE-2023-20178.md
@@ -5,9 +5,7 @@
### Description
-A vulnerability in the client update process of Cisco AnyConnect Secure Mobility Client Software for Windows and Cisco Secure Client Software for Windows could allow a low-privileged, authenticated, local attacker to elevate privileges to those of SYSTEM. The client update process is executed after a successful VPN connection is established.
-
- This vulnerability exists because improper permissions are assigned to a temporary directory that is created during the update process. An attacker could exploit this vulnerability by abusing a specific function of the Windows installer process. A successful exploit could allow the attacker to execute code with SYSTEM privileges.
+A vulnerability in the client update process of Cisco AnyConnect Secure Mobility Client Software for Windows and Cisco Secure Client Software for Windows could allow a low-privileged, authenticated, local attacker to elevate privileges to those of SYSTEM. The client update process is executed after a successful VPN connection is established.
This vulnerability exists because improper permissions are assigned to a temporary directory that is created during the update process. An attacker could exploit this vulnerability by abusing a specific function of the Windows installer process. A successful exploit could allow the attacker to execute code with SYSTEM privileges.
### POC
diff --git a/2023/CVE-2023-20180.md b/2023/CVE-2023-20180.md
index b698aa7f58..1b073460e9 100644
--- a/2023/CVE-2023-20180.md
+++ b/2023/CVE-2023-20180.md
@@ -5,9 +5,7 @@
### Description
-A vulnerability in the web interface of Cisco Webex Meetings could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system.
-
- This vulnerability is due to insufficient CSRF protections for the web interface on an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to perform arbitrary actions. These actions could include joining meetings and scheduling training sessions.
+A vulnerability in the web interface of Cisco Webex Meetings could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system.
This vulnerability is due to insufficient CSRF protections for the web interface on an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to perform arbitrary actions. These actions could include joining meetings and scheduling training sessions.
### POC
diff --git a/2023/CVE-2023-20188.md b/2023/CVE-2023-20188.md
index 0081e7b938..4e7f0f6e86 100644
--- a/2023/CVE-2023-20188.md
+++ b/2023/CVE-2023-20188.md
@@ -5,11 +5,7 @@
### Description
-A vulnerability in the web-based management interface of Cisco Small Business 200 Series Smart Switches, Cisco Small Business 300 Series Managed Switches, and Cisco Small Business 500 Series Stackable Managed Switches could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected device.
-
- This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to view a page containing malicious HTML or script content. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker would need to have valid credentials to access the web-based management interface of the affected device.
-
- Cisco has not released software updates to address this vulnerability.
+A vulnerability in the web-based management interface of Cisco Small Business 200 Series Smart Switches, Cisco Small Business 300 Series Managed Switches, and Cisco Small Business 500 Series Stackable Managed Switches could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected device.
This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to view a page containing malicious HTML or script content. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker would need to have valid credentials to access the web-based management interface of the affected device.
Cisco has not released software updates to address this vulnerability.
### POC
diff --git a/2023/CVE-2023-20197.md b/2023/CVE-2023-20197.md
index 3d82a7dee3..6d2f68d913 100644
--- a/2023/CVE-2023-20197.md
+++ b/2023/CVE-2023-20197.md
@@ -7,11 +7,7 @@
### Description
-A vulnerability in the filesystem image parser for Hierarchical File System Plus (HFS+) of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
-
- This vulnerability is due to an incorrect check for completion when a file is decompressed, which may result in a loop condition that could cause the affected software to stop responding. An attacker could exploit this vulnerability by submitting a crafted HFS+ filesystem image to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to stop responding, resulting in a DoS condition on the affected software and consuming available system resources.
-
- For a description of this vulnerability, see the ClamAV blog .
+A vulnerability in the filesystem image parser for Hierarchical File System Plus (HFS+) of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to an incorrect check for completion when a file is decompressed, which may result in a loop condition that could cause the affected software to stop responding. An attacker could exploit this vulnerability by submitting a crafted HFS+ filesystem image to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to cause the ClamAV scanning process to stop responding, resulting in a DoS condition on the affected software and consuming available system resources.
For a description of this vulnerability, see the ClamAV blog .
### POC
diff --git a/2023/CVE-2023-20198.md b/2023/CVE-2023-20198.md
index f1188214b6..c8d66672d6 100644
--- a/2023/CVE-2023-20198.md
+++ b/2023/CVE-2023-20198.md
@@ -37,6 +37,7 @@ Cisco is providing an update for the ongoing investigation into observed exploit
- https://github.com/XRSec/AWVS-Update
- https://github.com/ZephrFish/CVE-2023-20198-Checker
- https://github.com/ZephrFish/Cisco-IOS-XE-Scanner
+- https://github.com/aleff-github/aleff-github
- https://github.com/aleff-github/my-flipper-shits
- https://github.com/alekos3/CVE_2023_20198_Detector
- https://github.com/alekos3/CVE_2023_20198_Remediator
diff --git a/2023/CVE-2023-20202.md b/2023/CVE-2023-20202.md
index 9244b5a889..31dc2babd9 100644
--- a/2023/CVE-2023-20202.md
+++ b/2023/CVE-2023-20202.md
@@ -5,9 +5,7 @@
### Description
-A vulnerability in the Wireless Network Control daemon (wncd) of Cisco IOS XE Software for Wireless LAN Controllers could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition.
-
- This vulnerability is due to improper memory management. An attacker could exploit this vulnerability by sending a series of network requests to an affected device. A successful exploit could allow the attacker to cause the wncd process to consume available memory and eventually cause the device to reload, resulting in a DoS condition.
+A vulnerability in the Wireless Network Control daemon (wncd) of Cisco IOS XE Software for Wireless LAN Controllers could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition.
This vulnerability is due to improper memory management. An attacker could exploit this vulnerability by sending a series of network requests to an affected device. A successful exploit could allow the attacker to cause the wncd process to consume available memory and eventually cause the device to reload, resulting in a DoS condition.
### POC
diff --git a/2023/CVE-2023-20209.md b/2023/CVE-2023-20209.md
index d76add2bdb..c08e332d28 100644
--- a/2023/CVE-2023-20209.md
+++ b/2023/CVE-2023-20209.md
@@ -5,9 +5,7 @@
### Description
-A vulnerability in the web-based management interface of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker with read-write privileges on the application to perform a command injection attack that could result in remote code execution on an affected device.
-
- This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to establish a remote shell with root privileges.
+A vulnerability in the web-based management interface of Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) could allow an authenticated, remote attacker with read-write privileges on the application to perform a command injection attack that could result in remote code execution on an affected device.
This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to establish a remote shell with root privileges.
### POC
diff --git a/2023/CVE-2023-20211.md b/2023/CVE-2023-20211.md
index 6bdef5130d..dd7d348cb7 100644
--- a/2023/CVE-2023-20211.md
+++ b/2023/CVE-2023-20211.md
@@ -7,9 +7,7 @@
### Description
-A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.
-
- This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by authenticating to the application as a user with read-only or higher privileges and sending crafted HTTP requests to an affected system. A successful exploit could allow the attacker to read or modify data in the underlying database or elevate their privileges.
+A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.
This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by authenticating to the application as a user with read-only or higher privileges and sending crafted HTTP requests to an affected system. A successful exploit could allow the attacker to read or modify data in the underlying database or elevate their privileges.
### POC
diff --git a/2023/CVE-2023-20217.md b/2023/CVE-2023-20217.md
index 2eec74774c..5a013da11b 100644
--- a/2023/CVE-2023-20217.md
+++ b/2023/CVE-2023-20217.md
@@ -5,9 +5,7 @@
### Description
-A vulnerability in the CLI of Cisco ThousandEyes Enterprise Agent, Virtual Appliance installation type, could allow an authenticated, local attacker to elevate privileges on an affected device.
-
- This vulnerability is due to insufficient input validation by the operating system CLI. An attacker could exploit this vulnerability by issuing certain commands using sudo. A successful exploit could allow the attacker to view arbitrary files as root on the underlying operating system. The attacker must have valid credentials on the affected device.
+A vulnerability in the CLI of Cisco ThousandEyes Enterprise Agent, Virtual Appliance installation type, could allow an authenticated, local attacker to elevate privileges on an affected device.
This vulnerability is due to insufficient input validation by the operating system CLI. An attacker could exploit this vulnerability by issuing certain commands using sudo. A successful exploit could allow the attacker to view arbitrary files as root on the underlying operating system. The attacker must have valid credentials on the affected device.
### POC
diff --git a/2023/CVE-2023-20218.md b/2023/CVE-2023-20218.md
index c313e86f2f..86da4c5d8f 100644
--- a/2023/CVE-2023-20218.md
+++ b/2023/CVE-2023-20218.md
@@ -5,13 +5,7 @@
### Description
-A vulnerability in web-based management interface of Cisco SPA500 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote attacker to to modify a web page in the context of a user's browser.
-
- This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to alter the contents of a web page to redirect the user to potentially malicious websites, or the attacker could use this vulnerability to conduct further client-side attacks.
-
- Cisco will not release software updates that address this vulnerability.
-
- {{value}} ["%7b%7bvalue%7d%7d"])}]]
+A vulnerability in web-based management interface of Cisco SPA500 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote attacker to to modify a web page in the context of a user's browser.
This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to alter the contents of a web page to redirect the user to potentially malicious websites, or the attacker could use this vulnerability to conduct further client-side attacks.
Cisco will not release software updates that address this vulnerability.
{{value}} ["%7b%7bvalue%7d%7d"])}]]
### POC
diff --git a/2023/CVE-2023-20224.md b/2023/CVE-2023-20224.md
index 31732aba2c..7661cdb684 100644
--- a/2023/CVE-2023-20224.md
+++ b/2023/CVE-2023-20224.md
@@ -5,9 +5,7 @@
### Description
-A vulnerability in the CLI of Cisco ThousandEyes Enterprise Agent, Virtual Appliance installation type, could allow an authenticated, local attacker to elevate privileges to root on an affected device.
-
- This vulnerability is due to insufficient input validation of user-supplied CLI arguments. An attacker could exploit this vulnerability by authenticating to an affected device and using crafted commands at the prompt. A successful exploit could allow the attacker to execute arbitrary commands as root. The attacker must have valid credentials on the affected device.
+A vulnerability in the CLI of Cisco ThousandEyes Enterprise Agent, Virtual Appliance installation type, could allow an authenticated, local attacker to elevate privileges to root on an affected device.
This vulnerability is due to insufficient input validation of user-supplied CLI arguments. An attacker could exploit this vulnerability by authenticating to an affected device and using crafted commands at the prompt. A successful exploit could allow the attacker to execute arbitrary commands as root. The attacker must have valid credentials on the affected device.
### POC
diff --git a/2023/CVE-2023-20226.md b/2023/CVE-2023-20226.md
index d7b4bfbcce..ba4f99a54d 100644
--- a/2023/CVE-2023-20226.md
+++ b/2023/CVE-2023-20226.md
@@ -5,9 +5,7 @@
### Description
-A vulnerability in Application Quality of Experience (AppQoE) and Unified Threat Defense (UTD) on Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition.
-
- This vulnerability is due to the mishandling of a crafted packet stream through the AppQoE or UTD application. An attacker could exploit this vulnerability by sending a crafted packet stream through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
+A vulnerability in Application Quality of Experience (AppQoE) and Unified Threat Defense (UTD) on Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition.
This vulnerability is due to the mishandling of a crafted packet stream through the AppQoE or UTD application. An attacker could exploit this vulnerability by sending a crafted packet stream through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
### POC
diff --git a/2023/CVE-2023-20227.md b/2023/CVE-2023-20227.md
index 02212c4313..e95964941a 100644
--- a/2023/CVE-2023-20227.md
+++ b/2023/CVE-2023-20227.md
@@ -5,11 +5,7 @@
### Description
-A vulnerability in the Layer 2 Tunneling Protocol (L2TP) feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
-
- This vulnerability is due to improper handling of certain L2TP packets. An attacker could exploit this vulnerability by sending crafted L2TP packets to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition.
-
- Note: Only traffic directed to the affected system can be used to exploit this vulnerability.
+A vulnerability in the Layer 2 Tunneling Protocol (L2TP) feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to improper handling of certain L2TP packets. An attacker could exploit this vulnerability by sending crafted L2TP packets to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition.
Note: Only traffic directed to the affected system can be used to exploit this vulnerability.
### POC
diff --git a/2023/CVE-2023-20231.md b/2023/CVE-2023-20231.md
index 9b46a7f73a..b1103b5594 100644
--- a/2023/CVE-2023-20231.md
+++ b/2023/CVE-2023-20231.md
@@ -5,11 +5,7 @@
### Description
-A vulnerability in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker to perform an injection attack against an affected device.
-
- This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to execute arbitrary Cisco IOS XE Software CLI commands with level 15 privileges.
-
- Note: This vulnerability is exploitable only if the attacker obtains the credentials for a Lobby Ambassador account. This account is not configured by default.
+A vulnerability in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker to perform an injection attack against an affected device.
This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to execute arbitrary Cisco IOS XE Software CLI commands with level 15 privileges.
Note: This vulnerability is exploitable only if the attacker obtains the credentials for a Lobby Ambassador account. This account is not configured by default.
### POC
diff --git a/2023/CVE-2023-20235.md b/2023/CVE-2023-20235.md
index a55ec564cb..9390131eb0 100644
--- a/2023/CVE-2023-20235.md
+++ b/2023/CVE-2023-20235.md
@@ -5,9 +5,7 @@
### Description
-A vulnerability in the on-device application development workflow feature for the Cisco IOx application hosting infrastructure in Cisco IOS XE Software could allow an authenticated, remote attacker to access the underlying operating system as the root user.
-
- This vulnerability exists because Docker containers with the privileged runtime option are not blocked when they are in application development mode. An attacker could exploit this vulnerability by using the Docker CLI to access an affected device. The application development workflow is meant to be used only on development systems and not in production systems.
+A vulnerability in the on-device application development workflow feature for the Cisco IOx application hosting infrastructure in Cisco IOS XE Software could allow an authenticated, remote attacker to access the underlying operating system as the root user.
This vulnerability exists because Docker containers with the privileged runtime option are not blocked when they are in application development mode. An attacker could exploit this vulnerability by using the Docker CLI to access an affected device. The application development workflow is meant to be used only on development systems and not in production systems.
### POC
diff --git a/2023/CVE-2023-20251.md b/2023/CVE-2023-20251.md
index 912775e154..7d648666c6 100644
--- a/2023/CVE-2023-20251.md
+++ b/2023/CVE-2023-20251.md
@@ -7,9 +7,7 @@
### Description
-A vulnerability in the memory buffer of Cisco Wireless LAN Controller (WLC) AireOS Software could allow an unauthenticated, adjacent attacker to cause memory leaks that could eventually lead to a device reboot.
-
- This vulnerability is due to memory leaks caused by multiple clients connecting under specific conditions. An attacker could exploit this vulnerability by causing multiple wireless clients to attempt to connect to an access point (AP) on an affected device. A successful exploit could allow the attacker to cause the affected device to reboot after a significant amount of time, resulting in a denial of service (DoS) condition.
+A vulnerability in the memory buffer of Cisco Wireless LAN Controller (WLC) AireOS Software could allow an unauthenticated, adjacent attacker to cause memory leaks that could eventually lead to a device reboot.
This vulnerability is due to memory leaks caused by multiple clients connecting under specific conditions. An attacker could exploit this vulnerability by causing multiple wireless clients to attempt to connect to an access point (AP) on an affected device. A successful exploit could allow the attacker to cause the affected device to reboot after a significant amount of time, resulting in a denial of service (DoS) condition.
### POC
diff --git a/2023/CVE-2023-20268.md b/2023/CVE-2023-20268.md
index 214203d2c1..1bd8d86f22 100644
--- a/2023/CVE-2023-20268.md
+++ b/2023/CVE-2023-20268.md
@@ -9,9 +9,7 @@
### Description
-A vulnerability in the packet processing functionality of Cisco access point (AP) software could allow an unauthenticated, adjacent attacker to exhaust resources on an affected device.
-
- This vulnerability is due to insufficient management of resources when handling certain types of traffic. An attacker could exploit this vulnerability by sending a series of specific wireless packets to an affected device. A successful exploit could allow the attacker to consume resources on an affected device. A sustained attack could lead to the disruption of the Control and Provisioning of Wireless Access Points (CAPWAP) tunnel and intermittent loss of wireless client traffic.
+A vulnerability in the packet processing functionality of Cisco access point (AP) software could allow an unauthenticated, adjacent attacker to exhaust resources on an affected device.
This vulnerability is due to insufficient management of resources when handling certain types of traffic. An attacker could exploit this vulnerability by sending a series of specific wireless packets to an affected device. A successful exploit could allow the attacker to consume resources on an affected device. A sustained attack could lead to the disruption of the Control and Provisioning of Wireless Access Points (CAPWAP) tunnel and intermittent loss of wireless client traffic.
### POC
diff --git a/2023/CVE-2023-20269.md b/2023/CVE-2023-20269.md
index 4b817525c0..d1199f0707 100644
--- a/2023/CVE-2023-20269.md
+++ b/2023/CVE-2023-20269.md
@@ -7,21 +7,7 @@
### Description
-A vulnerability in the remote access VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct a brute force attack in an attempt to identify valid username and password combinations or an authenticated, remote attacker to establish a clientless SSL VPN session with an unauthorized user.
-
- This vulnerability is due to improper separation of authentication, authorization, and accounting (AAA) between the remote access VPN feature and the HTTPS management and site-to-site VPN features. An attacker could exploit this vulnerability by specifying a default connection profile/tunnel group while conducting a brute force attack or while establishing a clientless SSL VPN session using valid credentials. A successful exploit could allow the attacker to achieve one or both of the following:
-
-
- Identify valid credentials that could then be used to establish an unauthorized remote access VPN session.
- Establish a clientless SSL VPN session (only when running Cisco ASA Software Release 9.16 or earlier).
-
- Notes:
-
-
- Establishing a client-based remote access VPN tunnel is not possible as these default connection profiles/tunnel groups do not and cannot have an IP address pool configured.
- This vulnerability does not allow an attacker to bypass authentication. To successfully establish a remote access VPN session, valid credentials are required, including a valid second factor if multi-factor authentication (MFA) is configured.
-
- Cisco will release software updates that address this vulnerability. There are workarounds that address this vulnerability.
+A vulnerability in the remote access VPN feature of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct a brute force attack in an attempt to identify valid username and password combinations or an authenticated, remote attacker to establish a clientless SSL VPN session with an unauthorized user.
This vulnerability is due to improper separation of authentication, authorization, and accounting (AAA) between the remote access VPN feature and the HTTPS management and site-to-site VPN features. An attacker could exploit this vulnerability by specifying a default connection profile/tunnel group while conducting a brute force attack or while establishing a clientless SSL VPN session using valid credentials. A successful exploit could allow the attacker to achieve one or both of the following:
Identify valid credentials that could then be used to establish an unauthorized remote access VPN session.
Establish a clientless SSL VPN session (only when running Cisco ASA Software Release 9.16 or earlier).
Notes:
Establishing a client-based remote access VPN tunnel is not possible as these default connection profiles/tunnel groups do not and cannot have an IP address pool configured.
This vulnerability does not allow an attacker to bypass authentication. To successfully establish a remote access VPN session, valid credentials are required, including a valid second factor if multi-factor authentication (MFA) is configured.
Cisco will release software updates that address this vulnerability. There are workarounds that address this vulnerability.
### POC
diff --git a/2023/CVE-2023-20273.md b/2023/CVE-2023-20273.md
index ff992ab70e..ede2d16ef9 100644
--- a/2023/CVE-2023-20273.md
+++ b/2023/CVE-2023-20273.md
@@ -17,6 +17,7 @@ A vulnerability in the web UI feature of Cisco IOS XE Software could allow an au
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/Shadow0ps/CVE-2023-20198-Scanner
+- https://github.com/aleff-github/aleff-github
- https://github.com/aleff-github/my-flipper-shits
- https://github.com/cadencejames/Check-HttpServerStatus
- https://github.com/f1tao/awesome-iot-security-resource
diff --git a/2023/CVE-2023-20598.md b/2023/CVE-2023-20598.md
index 84a2c5c9bd..77165471e2 100644
--- a/2023/CVE-2023-20598.md
+++ b/2023/CVE-2023-20598.md
@@ -25,4 +25,5 @@ No PoCs from references.
#### Github
- https://github.com/hfiref0x/KDU
+- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-2123.md b/2023/CVE-2023-2123.md
index 31bb375d62..86076dcfad 100644
--- a/2023/CVE-2023-2123.md
+++ b/2023/CVE-2023-2123.md
@@ -15,5 +15,6 @@ The WP Inventory Manager WordPress plugin before 2.1.0.13 does not sanitise and
#### Github
- https://github.com/0xn4d/poc-cve-xss-encoded-wp-inventory-manager-plugin
+- https://github.com/daniloalbuqrque/poc-cve-xss-encoded-wp-inventory-manager-plugin
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-21839.md b/2023/CVE-2023-21839.md
index 30770a2c78..dbfdf34767 100644
--- a/2023/CVE-2023-21839.md
+++ b/2023/CVE-2023-21839.md
@@ -14,6 +14,7 @@ Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware
- https://www.oracle.com/security-alerts/cpujan2023.html
#### Github
+- https://github.com/0xMarcio/cve
- https://github.com/0xn0ne/simple-scanner
- https://github.com/20142995/pocsuite3
- https://github.com/20142995/sectool
diff --git a/2023/CVE-2023-21987.md b/2023/CVE-2023-21987.md
index 7835e8396b..42b880e477 100644
--- a/2023/CVE-2023-21987.md
+++ b/2023/CVE-2023-21987.md
@@ -14,4 +14,5 @@ Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (comp
#### Github
- https://github.com/AtonceInventions/Hypervisor
+- https://github.com/husseinmuhaisen/Hypervisor
diff --git a/2023/CVE-2023-21991.md b/2023/CVE-2023-21991.md
index 7a68422da8..bdcc2f995f 100644
--- a/2023/CVE-2023-21991.md
+++ b/2023/CVE-2023-21991.md
@@ -14,4 +14,5 @@ Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (comp
#### Github
- https://github.com/AtonceInventions/Hypervisor
+- https://github.com/husseinmuhaisen/Hypervisor
diff --git a/2023/CVE-2023-22515.md b/2023/CVE-2023-22515.md
index 05723667fd..8f4321d636 100644
--- a/2023/CVE-2023-22515.md
+++ b/2023/CVE-2023-22515.md
@@ -6,9 +6,7 @@
### Description
-Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances.
-
-Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.
+Atlassian has been made aware of an issue reported by a handful of customers where external attackers may have exploited a previously unknown vulnerability in publicly accessible Confluence Data Center and Server instances to create unauthorized Confluence administrator accounts and access Confluence instances.
Atlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.
### POC
diff --git a/2023/CVE-2023-22527.md b/2023/CVE-2023-22527.md
index 848c917071..e2fdeda50c 100644
--- a/2023/CVE-2023-22527.md
+++ b/2023/CVE-2023-22527.md
@@ -36,6 +36,7 @@ A template injection vulnerability on older versions of Confluence Data Center a
- https://github.com/RevoltSecurities/CVE-2023-22527
- https://github.com/Sudistark/patch-diff-CVE-2023-22527
- https://github.com/Threekiii/Awesome-POC
+- https://github.com/Threekiii/Awesome-Redteam
- https://github.com/Threekiii/CVE
- https://github.com/Threekiii/Vulhub-Reproduce
- https://github.com/Tropinene/Yscanner
diff --git a/2023/CVE-2023-22906.md b/2023/CVE-2023-22906.md
index 53efd5cdf3..6bd671956e 100644
--- a/2023/CVE-2023-22906.md
+++ b/2023/CVE-2023-22906.md
@@ -15,4 +15,5 @@ Hero Qubo HCD01_02_V1.38_20220125 devices allow TELNET access with root privileg
#### Github
- https://github.com/abrahim7112/Vulnerability-checking-program-for-Android
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/nonamecoder/CVE-2023-22906
diff --git a/2023/CVE-2023-23169.md b/2023/CVE-2023-23169.md
index 70fd7f818d..da0703ef07 100644
--- a/2023/CVE-2023-23169.md
+++ b/2023/CVE-2023-23169.md
@@ -13,5 +13,6 @@ Synapsoft pdfocus 1.17 is vulnerable to local file inclusion and server-side req
- https://github.com/S4nshine/CVE-2023-23169
#### Github
+- https://github.com/S4nshine/CVE-2023-23169
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-23333.md b/2023/CVE-2023-23333.md
index 6996962b02..de2f661426 100644
--- a/2023/CVE-2023-23333.md
+++ b/2023/CVE-2023-23333.md
@@ -17,6 +17,7 @@ There is a command injection vulnerability in SolarView Compact through 6.00, at
- https://github.com/BugBlocker/lotus-scripts
- https://github.com/Mr-xn/CVE-2023-23333
- https://github.com/Mr-xn/Penetration_Testing_POC
+- https://github.com/Timorlover/CVE-2023-23333
- https://github.com/WhiteOwl-Pub/PoC-SolarView-Compact-CVE-2023-23333
- https://github.com/abrahim7112/Vulnerability-checking-program-for-Android
- https://github.com/dddinmx/POC-Pocsuite3
diff --git a/2023/CVE-2023-23397.md b/2023/CVE-2023-23397.md
index 68d2164891..c39da8f18f 100644
--- a/2023/CVE-2023-23397.md
+++ b/2023/CVE-2023-23397.md
@@ -58,6 +58,7 @@ No PoCs from references.
- https://github.com/ahmedkhlief/CVE-2023-23397-POC
- https://github.com/ahmedkhlief/CVE-2023-23397-POC-Using-Interop-Outlook
- https://github.com/alecdhuse/Lantern-Shark
+- https://github.com/aleff-github/aleff-github
- https://github.com/aleff-github/my-flipper-shits
- https://github.com/alicangnll/CVE-2023-23397
- https://github.com/alsaeroth/CVE-2023-23397-POC
diff --git a/2023/CVE-2023-23563.md b/2023/CVE-2023-23563.md
index a32ce3a5b5..e96ecd14a9 100644
--- a/2023/CVE-2023-23563.md
+++ b/2023/CVE-2023-23563.md
@@ -14,4 +14,5 @@ An issue was discovered in Geomatika IsiGeo Web 6.0. It allows remote authentica
- https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/poc_geomatika_isigeoweb.md
#### Github
+- https://github.com/Orange-Cyberdefense/CVE-repository
diff --git a/2023/CVE-2023-23564.md b/2023/CVE-2023-23564.md
index fb0b99122b..5386c55406 100644
--- a/2023/CVE-2023-23564.md
+++ b/2023/CVE-2023-23564.md
@@ -14,4 +14,5 @@ An issue was discovered in Geomatika IsiGeo Web 6.0. It allows remote authentica
- https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/poc_geomatika_isigeoweb.md
#### Github
+- https://github.com/Orange-Cyberdefense/CVE-repository
diff --git a/2023/CVE-2023-23565.md b/2023/CVE-2023-23565.md
index fd041cf280..a50308a2d4 100644
--- a/2023/CVE-2023-23565.md
+++ b/2023/CVE-2023-23565.md
@@ -14,4 +14,5 @@ An issue was discovered in Geomatika IsiGeo Web 6.0. It allows remote authentica
- https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/poc_geomatika_isigeoweb.md
#### Github
+- https://github.com/Orange-Cyberdefense/CVE-repository
diff --git a/2023/CVE-2023-23583.md b/2023/CVE-2023-23583.md
index 04ac64979a..222a846b13 100644
--- a/2023/CVE-2023-23583.md
+++ b/2023/CVE-2023-23583.md
@@ -17,6 +17,7 @@ No PoCs from references.
- https://github.com/EGI-Federation/SVG-advisories
- https://github.com/Mav3r1ck0x1/CVE-2023-23583-Reptar-
- https://github.com/blazcode/INTEL-SA-00950
+- https://github.com/codexlynx/hardware-attacks-state-of-the-art
- https://github.com/giterlizzi/secdb-feeds
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/speed47/spectre-meltdown-checker
diff --git a/2023/CVE-2023-23607.md b/2023/CVE-2023-23607.md
index 62426c6479..ed764d54ae 100644
--- a/2023/CVE-2023-23607.md
+++ b/2023/CVE-2023-23607.md
@@ -13,5 +13,5 @@ erohtar/Dasherr is a dashboard for self-hosted services. In affected versions un
- https://github.com/erohtar/Dasherr/security/advisories/GHSA-6rgc-2x44-7phq
#### Github
-No PoCs found on GitHub currently.
+- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-23752.md b/2023/CVE-2023-23752.md
index 97b025b187..d6a95c2d49 100644
--- a/2023/CVE-2023-23752.md
+++ b/2023/CVE-2023-23752.md
@@ -35,6 +35,7 @@ No PoCs from references.
- https://github.com/BearClaw96/Joomla-v4.x-Unauthenticated-information-disclosure
- https://github.com/BugBlocker/lotus-scripts
- https://github.com/C1ph3rX13/CVE-2023-23752
+- https://github.com/CLincat/vulcat
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
diff --git a/2023/CVE-2023-24580.md b/2023/CVE-2023-24580.md
index 9b22245b11..4dca2e7c2f 100644
--- a/2023/CVE-2023-24580.md
+++ b/2023/CVE-2023-24580.md
@@ -14,4 +14,5 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/seal-community/patches
diff --git a/2023/CVE-2023-24709.md b/2023/CVE-2023-24709.md
index 721b7b5a0b..4468931092 100644
--- a/2023/CVE-2023-24709.md
+++ b/2023/CVE-2023-24709.md
@@ -17,6 +17,7 @@ An issue found in Paradox Security Systems IPR512 allows attackers to cause a de
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/DRAGOWN/Injection-vulnerability-in-Paradox-Security-Systems-IPR512-CVE-2023-24709-PoC
+- https://github.com/SlashXzerozero/Injection-vulnerability-in-Paradox-Security-Systems-IPR512
- https://github.com/SlashXzerozero/Injection-vulnerability-in-Paradox-Security-Systems-IPR512-CVE-2023-24709-PoC
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-25157.md b/2023/CVE-2023-25157.md
index 1d9c9691f3..d33148c472 100644
--- a/2023/CVE-2023-25157.md
+++ b/2023/CVE-2023-25157.md
@@ -15,6 +15,7 @@ No PoCs from references.
#### Github
- https://github.com/0x2458bughunt/CVE-2023-25157
- https://github.com/0x783kb/Security-operation-book
+- https://github.com/0xMarcio/cve
- https://github.com/20142995/sectool
- https://github.com/7imbitz/CVE-2023-25157-checker
- https://github.com/Awrrays/FrameVul
diff --git a/2023/CVE-2023-25690.md b/2023/CVE-2023-25690.md
index 4a4b1aa48b..dc1ed2b37f 100644
--- a/2023/CVE-2023-25690.md
+++ b/2023/CVE-2023-25690.md
@@ -18,6 +18,7 @@ Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.5
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/EGI-Federation/SVG-advisories
+- https://github.com/EzeTauil/Maquina-Upload
- https://github.com/GGontijo/CTF-s
- https://github.com/GhostTroops/TOP
- https://github.com/H4lo/awesome-IoT-security-article
diff --git a/2023/CVE-2023-2579.md b/2023/CVE-2023-2579.md
index 3b6fcdabbb..016dc8b763 100644
--- a/2023/CVE-2023-2579.md
+++ b/2023/CVE-2023-2579.md
@@ -15,5 +15,6 @@ The InventoryPress WordPress plugin through 1.7 does not sanitise and escape som
#### Github
- https://github.com/0xn4d/poc-cve-xss-inventory-press-plugin
+- https://github.com/daniloalbuqrque/poc-cve-xss-inventory-press-plugin
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-26112.md b/2023/CVE-2023-26112.md
index 6a20d07cf8..502b0c82af 100644
--- a/2023/CVE-2023-26112.md
+++ b/2023/CVE-2023-26112.md
@@ -5,10 +5,7 @@
### Description
-All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\).
-
-**Note:** This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.
-
+All versions of the package configobj are vulnerable to Regular Expression Denial of Service (ReDoS) via the validate function, using (.+?)\((.*)\).
**Note:** This is only exploitable in the case of a developer, putting the offending value in a server side configuration file.
### POC
diff --git a/2023/CVE-2023-26115.md b/2023/CVE-2023-26115.md
index 7b27caff5b..6ee5f63752 100644
--- a/2023/CVE-2023-26115.md
+++ b/2023/CVE-2023-26115.md
@@ -6,8 +6,7 @@
### Description
-All versions of the package word-wrap are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of an insecure regular expression within the result variable.
-
+All versions of the package word-wrap are vulnerable to Regular Expression Denial of Service (ReDoS) due to the usage of an insecure regular expression within the result variable.
### POC
diff --git a/2023/CVE-2023-26122.md b/2023/CVE-2023-26122.md
index 495876cdfe..7d7d88a617 100644
--- a/2023/CVE-2023-26122.md
+++ b/2023/CVE-2023-26122.md
@@ -5,12 +5,7 @@
### Description
-All versions of the package safe-eval are vulnerable to Sandbox Bypass due to improper input sanitization. The vulnerability is derived from prototype pollution exploitation.
-Exploiting this vulnerability might result in remote code execution ("RCE").
-
-**Vulnerable functions:**
-
-__defineGetter__, stack(), toLocaleString(), propertyIsEnumerable.call(), valueOf().
+All versions of the package safe-eval are vulnerable to Sandbox Bypass due to improper input sanitization. The vulnerability is derived from prototype pollution exploitation.
Exploiting this vulnerability might result in remote code execution ("RCE").
**Vulnerable functions:**
__defineGetter__, stack(), toLocaleString(), propertyIsEnumerable.call(), valueOf().
### POC
diff --git a/2023/CVE-2023-26123.md b/2023/CVE-2023-26123.md
index da03cfb4b5..fac99b54a1 100644
--- a/2023/CVE-2023-26123.md
+++ b/2023/CVE-2023-26123.md
@@ -5,9 +5,7 @@
### Description
-Versions of the package raysan5/raylib before 4.5.0 are vulnerable to Cross-site Scripting (XSS) such that the SetClipboardText API does not properly escape the ' character, allowing attacker-controlled input to break out of the string and execute arbitrary JavaScript via emscripten_run_script function.
-
-**Note:** This vulnerability is present only when compiling raylib for PLATFORM_WEB. All the other Desktop/Mobile/Embedded platforms are not affected.
+Versions of the package raysan5/raylib before 4.5.0 are vulnerable to Cross-site Scripting (XSS) such that the SetClipboardText API does not properly escape the ' character, allowing attacker-controlled input to break out of the string and execute arbitrary JavaScript via emscripten_run_script function.
**Note:** This vulnerability is present only when compiling raylib for PLATFORM_WEB. All the other Desktop/Mobile/Embedded platforms are not affected.
### POC
diff --git a/2023/CVE-2023-26125.md b/2023/CVE-2023-26125.md
index fa6537296f..e9cb193328 100644
--- a/2023/CVE-2023-26125.md
+++ b/2023/CVE-2023-26125.md
@@ -5,9 +5,7 @@
### Description
-Versions of the package github.com/gin-gonic/gin before 1.9.0 are vulnerable to Improper Input Validation by allowing an attacker to use a specially crafted request via the X-Forwarded-Prefix header, potentially leading to cache poisoning.
-
-**Note:** Although this issue does not pose a significant threat on its own it can serve as an input vector for other more impactful vulnerabilities. However, successful exploitation may depend on the server configuration and whether the header is used in the application logic.
+Versions of the package github.com/gin-gonic/gin before 1.9.0 are vulnerable to Improper Input Validation by allowing an attacker to use a specially crafted request via the X-Forwarded-Prefix header, potentially leading to cache poisoning.
**Note:** Although this issue does not pose a significant threat on its own it can serve as an input vector for other more impactful vulnerabilities. However, successful exploitation may depend on the server configuration and whether the header is used in the application logic.
### POC
diff --git a/2023/CVE-2023-26126.md b/2023/CVE-2023-26126.md
index 4abf3846f2..f072573134 100644
--- a/2023/CVE-2023-26126.md
+++ b/2023/CVE-2023-26126.md
@@ -5,8 +5,7 @@
### Description
-All versions of the package m.static are vulnerable to Directory Traversal due to improper input sanitization of the path being requested via the requestFile function.
-
+All versions of the package m.static are vulnerable to Directory Traversal due to improper input sanitization of the path being requested via the requestFile function.
### POC
diff --git a/2023/CVE-2023-26127.md b/2023/CVE-2023-26127.md
index 623b43b27a..cf1c6abc93 100644
--- a/2023/CVE-2023-26127.md
+++ b/2023/CVE-2023-26127.md
@@ -5,11 +5,7 @@
### Description
-All versions of the package n158 are vulnerable to Command Injection due to improper input sanitization in the 'module.exports' function.
-
-**Note:**
-
-To execute the code snippet and potentially exploit the vulnerability, the attacker needs to have the ability to run Node.js code within the target environment. This typically requires some level of access to the system or application hosting the Node.js environment.
+All versions of the package n158 are vulnerable to Command Injection due to improper input sanitization in the 'module.exports' function.
**Note:**
To execute the code snippet and potentially exploit the vulnerability, the attacker needs to have the ability to run Node.js code within the target environment. This typically requires some level of access to the system or application hosting the Node.js environment.
### POC
diff --git a/2023/CVE-2023-26128.md b/2023/CVE-2023-26128.md
index a5a642e9bf..13840b6fef 100644
--- a/2023/CVE-2023-26128.md
+++ b/2023/CVE-2023-26128.md
@@ -5,11 +5,7 @@
### Description
-All versions of the package keep-module-latest are vulnerable to Command Injection due to missing input sanitization or other checks and sandboxes being employed to the installModule function.
-
-**Note:**
-
-To execute the code snippet and potentially exploit the vulnerability, the attacker needs to have the ability to run Node.js code within the target environment. This typically requires some level of access to the system or application hosting the Node.js environment.
+All versions of the package keep-module-latest are vulnerable to Command Injection due to missing input sanitization or other checks and sandboxes being employed to the installModule function.
**Note:**
To execute the code snippet and potentially exploit the vulnerability, the attacker needs to have the ability to run Node.js code within the target environment. This typically requires some level of access to the system or application hosting the Node.js environment.
### POC
diff --git a/2023/CVE-2023-26129.md b/2023/CVE-2023-26129.md
index 60971d1812..6a15b4e967 100644
--- a/2023/CVE-2023-26129.md
+++ b/2023/CVE-2023-26129.md
@@ -5,11 +5,7 @@
### Description
-All versions of the package bwm-ng are vulnerable to Command Injection due to improper input sanitization in the 'check' function in the bwm-ng.js file.
-
-**Note:**
-
-To execute the code snippet and potentially exploit the vulnerability, the attacker needs to have the ability to run Node.js code within the target environment. This typically requires some level of access to the system or application hosting the Node.js environment.
+All versions of the package bwm-ng are vulnerable to Command Injection due to improper input sanitization in the 'check' function in the bwm-ng.js file.
**Note:**
To execute the code snippet and potentially exploit the vulnerability, the attacker needs to have the ability to run Node.js code within the target environment. This typically requires some level of access to the system or application hosting the Node.js environment.
### POC
diff --git a/2023/CVE-2023-26130.md b/2023/CVE-2023-26130.md
index 02afa5b332..327c0e5f65 100644
--- a/2023/CVE-2023-26130.md
+++ b/2023/CVE-2023-26130.md
@@ -5,9 +5,7 @@
### Description
-Versions of the package yhirose/cpp-httplib before 0.12.4 are vulnerable to CRLF Injection when untrusted user input is used to set the content-type header in the HTTP .Patch, .Post, .Put and .Delete requests. This can lead to logical errors and other misbehaviors.
-
-**Note:** This issue is present due to an incomplete fix for [CVE-2020-11709](https://security.snyk.io/vuln/SNYK-UNMANAGED-YHIROSECPPHTTPLIB-2366507).
+Versions of the package yhirose/cpp-httplib before 0.12.4 are vulnerable to CRLF Injection when untrusted user input is used to set the content-type header in the HTTP .Patch, .Post, .Put and .Delete requests. This can lead to logical errors and other misbehaviors.
**Note:** This issue is present due to an incomplete fix for [CVE-2020-11709](https://security.snyk.io/vuln/SNYK-UNMANAGED-YHIROSECPPHTTPLIB-2366507).
### POC
diff --git a/2023/CVE-2023-26131.md b/2023/CVE-2023-26131.md
index 85a64f25f6..efa9689e9e 100644
--- a/2023/CVE-2023-26131.md
+++ b/2023/CVE-2023-26131.md
@@ -6,8 +6,7 @@
### Description
-All versions of the package github.com/xyproto/algernon/engine; all versions of the package github.com/xyproto/algernon/themes are vulnerable to Cross-site Scripting (XSS) via the themes.NoPage(filename, theme) function due to improper user input sanitization. Exploiting this vulnerability is possible when a file/resource is not found.
-
+All versions of the package github.com/xyproto/algernon/engine; all versions of the package github.com/xyproto/algernon/themes are vulnerable to Cross-site Scripting (XSS) via the themes.NoPage(filename, theme) function due to improper user input sanitization. Exploiting this vulnerability is possible when a file/resource is not found.
### POC
diff --git a/2023/CVE-2023-26133.md b/2023/CVE-2023-26133.md
index 9cf648fe23..ae2181f9bc 100644
--- a/2023/CVE-2023-26133.md
+++ b/2023/CVE-2023-26133.md
@@ -5,8 +5,7 @@
### Description
-All versions of the package progressbar.js are vulnerable to Prototype Pollution via the function extend() in the file utils.js.
-
+All versions of the package progressbar.js are vulnerable to Prototype Pollution via the function extend() in the file utils.js.
### POC
diff --git a/2023/CVE-2023-26144.md b/2023/CVE-2023-26144.md
index 71442e72ab..0fe2520a96 100644
--- a/2023/CVE-2023-26144.md
+++ b/2023/CVE-2023-26144.md
@@ -5,9 +5,7 @@
### Description
-Versions of the package graphql from 16.3.0 and before 16.8.1 are vulnerable to Denial of Service (DoS) due to insufficient checks in the OverlappingFieldsCanBeMergedRule.ts file when parsing large queries. This vulnerability allows an attacker to degrade system performance.
-
-**Note:** It was not proven that this vulnerability can crash the process.
+Versions of the package graphql from 16.3.0 and before 16.8.1 are vulnerable to Denial of Service (DoS) due to insufficient checks in the OverlappingFieldsCanBeMergedRule.ts file when parsing large queries. This vulnerability allows an attacker to degrade system performance.
**Note:** It was not proven that this vulnerability can crash the process.
### POC
diff --git a/2023/CVE-2023-26145.md b/2023/CVE-2023-26145.md
index 30c8dfc97a..4e2904973d 100644
--- a/2023/CVE-2023-26145.md
+++ b/2023/CVE-2023-26145.md
@@ -5,18 +5,7 @@
### Description
-This affects versions of the package pydash before 6.0.0. A number of pydash methods such as pydash.objects.invoke() and pydash.collections.invoke_map() accept dotted paths (Deep Path Strings) to target a nested Python object, relative to the original source object. These paths can be used to target internal class attributes and dict items, to retrieve, modify or invoke nested Python objects.
-
-**Note:**
-
-The pydash.objects.invoke() method is vulnerable to Command Injection when the following prerequisites are satisfied:
-
-1) The source object (argument 1) is not a built-in object such as list/dict (otherwise, the __init__.__globals__ path is not accessible)
-
-2) The attacker has control over argument 2 (the path string) and argument 3 (the argument to pass to the invoked method)
-
-
-The pydash.collections.invoke_map() method is also vulnerable, but is harder to exploit as the attacker does not have direct control over the argument to be passed to the invoked function.
+This affects versions of the package pydash before 6.0.0. A number of pydash methods such as pydash.objects.invoke() and pydash.collections.invoke_map() accept dotted paths (Deep Path Strings) to target a nested Python object, relative to the original source object. These paths can be used to target internal class attributes and dict items, to retrieve, modify or invoke nested Python objects.
**Note:**
The pydash.objects.invoke() method is vulnerable to Command Injection when the following prerequisites are satisfied:
1) The source object (argument 1) is not a built-in object such as list/dict (otherwise, the __init__.__globals__ path is not accessible)
2) The attacker has control over argument 2 (the path string) and argument 3 (the argument to pass to the invoked method)
The pydash.collections.invoke_map() method is also vulnerable, but is harder to exploit as the attacker does not have direct control over the argument to be passed to the invoked function.
### POC
diff --git a/2023/CVE-2023-26149.md b/2023/CVE-2023-26149.md
index 69a7c20037..b585e359f7 100644
--- a/2023/CVE-2023-26149.md
+++ b/2023/CVE-2023-26149.md
@@ -5,11 +5,7 @@
### Description
-Versions of the package quill-mention before 4.0.0 are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization, via the renderList function.
-
-**Note:**
-
-If the mentions list is sourced from unsafe (user-sourced) data, this might allow an injection attack when a Quill user hits @.
+Versions of the package quill-mention before 4.0.0 are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization, via the renderList function.
**Note:**
If the mentions list is sourced from unsafe (user-sourced) data, this might allow an injection attack when a Quill user hits @.
### POC
diff --git a/2023/CVE-2023-26150.md b/2023/CVE-2023-26150.md
index c38f7c3135..88df5f52aa 100644
--- a/2023/CVE-2023-26150.md
+++ b/2023/CVE-2023-26150.md
@@ -5,11 +5,7 @@
### Description
-Versions of the package asyncua before 0.9.96 are vulnerable to Improper Authentication such that it is possible to access Address Space without encryption and authentication.
-
-**Note:**
-
-This issue is a result of missing checks for services that require an active session.
+Versions of the package asyncua before 0.9.96 are vulnerable to Improper Authentication such that it is possible to access Address Space without encryption and authentication.
**Note:**
This issue is a result of missing checks for services that require an active session.
### POC
diff --git a/2023/CVE-2023-26153.md b/2023/CVE-2023-26153.md
index 245702dedf..18f19433b5 100644
--- a/2023/CVE-2023-26153.md
+++ b/2023/CVE-2023-26153.md
@@ -5,11 +5,7 @@
### Description
-Versions of the package geokit-rails before 2.5.0 are vulnerable to Command Injection due to unsafe deserialisation of YAML within the 'geo_location' cookie. This issue can be exploited remotely via a malicious cookie value.
-
-**Note:**
-
- An attacker can use this vulnerability to execute commands on the host system.
+Versions of the package geokit-rails before 2.5.0 are vulnerable to Command Injection due to unsafe deserialisation of YAML within the 'geo_location' cookie. This issue can be exploited remotely via a malicious cookie value.
**Note:**
An attacker can use this vulnerability to execute commands on the host system.
### POC
diff --git a/2023/CVE-2023-26156.md b/2023/CVE-2023-26156.md
index 80c975b685..6ed271e247 100644
--- a/2023/CVE-2023-26156.md
+++ b/2023/CVE-2023-26156.md
@@ -5,11 +5,7 @@
### Description
-Versions of the package chromedriver before 119.0.1 are vulnerable to Command Injection when setting the chromedriver.path to an arbitrary system binary. This could lead to unauthorized access and potentially malicious actions on the host system.
-
-**Note:**
-
-An attacker must have access to the system running the vulnerable chromedriver library to exploit it. The success of exploitation also depends on the permissions and privileges of the process running chromedriver.
+Versions of the package chromedriver before 119.0.1 are vulnerable to Command Injection when setting the chromedriver.path to an arbitrary system binary. This could lead to unauthorized access and potentially malicious actions on the host system.
**Note:**
An attacker must have access to the system running the vulnerable chromedriver library to exploit it. The success of exploitation also depends on the permissions and privileges of the process running chromedriver.
### POC
diff --git a/2023/CVE-2023-26158.md b/2023/CVE-2023-26158.md
index de8f656a14..a0c0ba62de 100644
--- a/2023/CVE-2023-26158.md
+++ b/2023/CVE-2023-26158.md
@@ -5,58 +5,7 @@
### Description
-All versions of the package mockjs are vulnerable to Prototype Pollution via the Util.extend function due to missing check if the attribute resolves to the object prototype. By adding or modifying attributes of an object prototype, it is possible to create attributes that exist on every object, or replace critical attributes with malicious ones. This can be problematic if the software depends on existence or non-existence of certain attributes, or uses pre-defined attributes of object prototype (such as hasOwnProperty, toString or valueOf).
-
-User controlled inputs inside the extend() method of the Mock.Handler, Mock.Random, Mock.RE.Handler or Mock.Util, will allow an attacker to exploit this vulnerability.
-
- Workaround
-
-By using a denylist of dangerous attributes, this weakness can be eliminated.
-
-Add the following line in the Util.extend function:
-
-js
-js if (["__proto__", "constructor", "prototype"].includes(name)) continue
-
-
-js
-// src/mock/handler.js
-Util.extend = function extend() {
- var target = arguments[0] || {},
- i = 1,
- length = arguments.length,
- options, name, src, copy, clone
-
- if (length === 1) {
- target = this
- i = 0
- }
-
- for (; i < length; i++) {
- options = arguments[i]
- if (!options) continue
-
- for (name in options) {
- if (["__proto__", "constructor", "prototype"].includes(name)) continue
- src = target[name]
- copy = options[name]
-
- if (target === copy) continue
- if (copy === undefined) continue
-
- if (Util.isArray(copy) || Util.isObject(copy)) {
- if (Util.isArray(copy)) clone = src && Util.isArray(src) ? src : []
- if (Util.isObject(copy)) clone = src && Util.isObject(src) ? src : {}
-
- target[name] = Util.extend(clone, copy)
- } else {
- target[name] = copy
- }
- }
- }
-
- return target
- }
+All versions of the package mockjs are vulnerable to Prototype Pollution via the Util.extend function due to missing check if the attribute resolves to the object prototype. By adding or modifying attributes of an object prototype, it is possible to create attributes that exist on every object, or replace critical attributes with malicious ones. This can be problematic if the software depends on existence or non-existence of certain attributes, or uses pre-defined attributes of object prototype (such as hasOwnProperty, toString or valueOf).
User controlled inputs inside the extend() method of the Mock.Handler, Mock.Random, Mock.RE.Handler or Mock.Util, will allow an attacker to exploit this vulnerability.
Workaround
By using a denylist of dangerous attributes, this weakness can be eliminated.
Add the following line in the Util.extend function:
js
js if (["__proto__", "constructor", "prototype"].includes(name)) continue
js
// src/mock/handler.js
Util.extend = function extend() {
var target = arguments[0] || {},
i = 1,
length = arguments.length,
options, name, src, copy, clone
if (length === 1) {
target = this
i = 0
}
for (; i < length; i++) {
options = arguments[i]
if (!options) continue
for (name in options) {
if (["__proto__", "constructor", "prototype"].includes(name)) continue
src = target[name]
copy = options[name]
if (target === copy) continue
if (copy === undefined) continue
if (Util.isArray(copy) || Util.isObject(copy)) {
if (Util.isArray(copy)) clone = src && Util.isArray(src) ? src : []
if (Util.isObject(copy)) clone = src && Util.isObject(src) ? src : {}
target[name] = Util.extend(clone, copy)
} else {
target[name] = copy
}
}
}
return target
}
### POC
diff --git a/2023/CVE-2023-2640.md b/2023/CVE-2023-2640.md
index dd6587587a..35ce8c38e6 100644
--- a/2023/CVE-2023-2640.md
+++ b/2023/CVE-2023-2640.md
@@ -16,6 +16,7 @@ No PoCs from references.
- https://github.com/0xWhoami35/root-kernel
- https://github.com/0xsyr0/OSCP
- https://github.com/Ev3rPalestine/Analytics-HTB-Walkthrough
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/K5LK/CVE-2023-2640-32629
- https://github.com/Kiosec/Linux-Exploitation
- https://github.com/Nkipohcs/CVE-2023-2640-CVE-2023-32629
diff --git a/2023/CVE-2023-27035.md b/2023/CVE-2023-27035.md
index 2e811ef6b2..7c3af3c6bd 100644
--- a/2023/CVE-2023-27035.md
+++ b/2023/CVE-2023-27035.md
@@ -14,5 +14,6 @@ An issue discovered in Obsidian Canvas 1.1.9 allows remote attackers to send des
- https://github.com/fivex3/CVE-2023-27035
#### Github
+- https://github.com/fivex3/CVE-2023-27035
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-27055.md b/2023/CVE-2023-27055.md
index 106cc3ab4e..146fc8d824 100644
--- a/2023/CVE-2023-27055.md
+++ b/2023/CVE-2023-27055.md
@@ -13,4 +13,5 @@ Aver Information Inc PTZApp2 v20.01044.48 allows attackers to access sensitive f
- https://github.com/StolidWaffle/AVer-PTZApp2
#### Github
+- https://github.com/StolidWaffle/AVer-PTZApp2
diff --git a/2023/CVE-2023-27522.md b/2023/CVE-2023-27522.md
index 20bdb51e20..49c7e2a46b 100644
--- a/2023/CVE-2023-27522.md
+++ b/2023/CVE-2023-27522.md
@@ -14,6 +14,7 @@ No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/EzeTauil/Maquina-Upload
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/xonoxitron/cpe2cve
diff --git a/2023/CVE-2023-27653.md b/2023/CVE-2023-27653.md
new file mode 100644
index 0000000000..122fe25851
--- /dev/null
+++ b/2023/CVE-2023-27653.md
@@ -0,0 +1,17 @@
+### [CVE-2023-27653](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27653)
+
+
+
+
+### Description
+
+An issue found in WHOv.1.0.28, v.1.0.30, v.1.0.32 allows an attacker to cause a denial of service via the SharedPreference files.
+
+### POC
+
+#### Reference
+- https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27653/CVE%20detail.md
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2023/CVE-2023-27654.md b/2023/CVE-2023-27654.md
new file mode 100644
index 0000000000..bc473b0842
--- /dev/null
+++ b/2023/CVE-2023-27654.md
@@ -0,0 +1,17 @@
+### [CVE-2023-27654](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27654)
+
+
+
+
+### Description
+
+An issue found in WHOv.1.0.28, v.1.0.30, v.1.0.32 allows an attacker to cause a escalation of privileges via the TTMultiProvider component.
+
+### POC
+
+#### Reference
+- https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27654/CVE%20detail.md
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2023/CVE-2023-27742.md b/2023/CVE-2023-27742.md
index d3a9a17651..8e9393882f 100644
--- a/2023/CVE-2023-27742.md
+++ b/2023/CVE-2023-27742.md
@@ -13,5 +13,6 @@ IDURAR ERP/CRM v1 was discovered to contain a SQL injection vulnerability via th
- https://github.com/G37SYS73M/CVE-2023-27742
#### Github
+- https://github.com/G37SYS73M/CVE-2023-27742
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-27842.md b/2023/CVE-2023-27842.md
index 86e65290d2..144c622d3e 100644
--- a/2023/CVE-2023-27842.md
+++ b/2023/CVE-2023-27842.md
@@ -18,4 +18,5 @@ Insecure Permissions vulnerability found in Extplorer File manager eXtplorer v.2
- https://github.com/0xFTW/CVE-2023-27842
- https://github.com/cowsecurity/CVE-2023-27842
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/tristao-marinho/CVE-2023-27842
diff --git a/2023/CVE-2023-28252.md b/2023/CVE-2023-28252.md
index 6a633ac411..eae917346e 100644
--- a/2023/CVE-2023-28252.md
+++ b/2023/CVE-2023-28252.md
@@ -47,6 +47,7 @@ Windows Common Log File System Driver Elevation of Privilege Vulnerability
- http://packetstormsecurity.com/files/174668/Windows-Common-Log-File-System-Driver-clfs.sys-Privilege-Escalation.html
#### Github
+- https://github.com/0xMarcio/cve
- https://github.com/726232111/CVE-2023-28252
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/awesome-cve-repo
diff --git a/2023/CVE-2023-28489.md b/2023/CVE-2023-28489.md
index ba8ba40ef5..1a9844f5c6 100644
--- a/2023/CVE-2023-28489.md
+++ b/2023/CVE-2023-28489.md
@@ -6,8 +6,7 @@
### Description
-A vulnerability has been identified in CP-8031 MASTER MODULE (All versions < CPCI85 V05), CP-8050 MASTER MODULE (All versions < CPCI85 V05). Affected devices are vulnerable to command injection via the web server port 443/tcp, if the parameter “Remote Operation” is enabled. The parameter is disabled by default.
-The vulnerability could allow an unauthenticated remote attacker to perform arbitrary code execution on the device.
+A vulnerability has been identified in CP-8031 MASTER MODULE (All versions < CPCI85 V05), CP-8050 MASTER MODULE (All versions < CPCI85 V05). Affected devices are vulnerable to command injection via the web server port 443/tcp, if the parameter “Remote Operation” is enabled. The parameter is disabled by default.
The vulnerability could allow an unauthenticated remote attacker to perform arbitrary code execution on the device.
### POC
diff --git a/2023/CVE-2023-28708.md b/2023/CVE-2023-28708.md
index 004187d183..59ba789973 100644
--- a/2023/CVE-2023-28708.md
+++ b/2023/CVE-2023-28708.md
@@ -19,4 +19,5 @@ No PoCs from references.
- https://github.com/fernandoreb/dependency-check-springboot
- https://github.com/scordero1234/java_sec_demo-main
- https://github.com/trganda/dockerv
+- https://github.com/versio-io/product-lifecycle-security-api
diff --git a/2023/CVE-2023-29357.md b/2023/CVE-2023-29357.md
index da37df7bc8..58850be7f4 100644
--- a/2023/CVE-2023-29357.md
+++ b/2023/CVE-2023-29357.md
@@ -13,6 +13,7 @@ Microsoft SharePoint Server Elevation of Privilege Vulnerability
No PoCs from references.
#### Github
+- https://github.com/0xMarcio/cve
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/Chocapikk/CVE-2023-29357
diff --git a/2023/CVE-2023-29360.md b/2023/CVE-2023-29360.md
index c354d5e8c3..18681cf2e2 100644
--- a/2023/CVE-2023-29360.md
+++ b/2023/CVE-2023-29360.md
@@ -29,6 +29,9 @@ Microsoft Streaming Service Elevation of Privilege Vulnerability
No PoCs from references.
#### Github
+- https://github.com/CVEDB/awesome-cve-repo
+- https://github.com/CVEDB/top
+- https://github.com/GhostTroops/TOP
- https://github.com/Nero22k/cve-2023-29360
- https://github.com/Ostorlab/KEV
- https://github.com/cvefeed/cvefeed.io
diff --git a/2023/CVE-2023-29478.md b/2023/CVE-2023-29478.md
index d72a0398f2..cd5cb6a294 100644
--- a/2023/CVE-2023-29478.md
+++ b/2023/CVE-2023-29478.md
@@ -14,5 +14,6 @@ BiblioCraft before 2.4.6 does not sanitize path-traversal characters in filename
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/Exopteron/BiblioRCE
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-2986.md b/2023/CVE-2023-2986.md
index c7a7b78437..6b7747ac3c 100644
--- a/2023/CVE-2023-2986.md
+++ b/2023/CVE-2023-2986.md
@@ -17,6 +17,7 @@ The Abandoned Cart Lite for WooCommerce plugin for WordPress is vulnerable to au
#### Github
- https://github.com/Alucard0x1/CVE-2023-2986
+- https://github.com/Ayantaker/CVE-2023-2986
- https://github.com/abrahim7112/Vulnerability-checking-program-for-Android
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-30145.md b/2023/CVE-2023-30145.md
index a08e779947..a99d841bab 100644
--- a/2023/CVE-2023-30145.md
+++ b/2023/CVE-2023-30145.md
@@ -16,4 +16,5 @@ Camaleon CMS v2.7.0 was discovered to contain a Server-Side Template Injection (
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/paragbagul111/CVE-2023-30145
diff --git a/2023/CVE-2023-30146.md b/2023/CVE-2023-30146.md
index 155fac892d..a20ce35de5 100644
--- a/2023/CVE-2023-30146.md
+++ b/2023/CVE-2023-30146.md
@@ -13,5 +13,6 @@ Assmann Digitus Plug&View IP Camera HT-IP211HDP, version 2.000.022 allows unauth
- https://github.com/L1-0/CVE-2023-30146
#### Github
+- https://github.com/L1-0/CVE-2023-30146
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-30256.md b/2023/CVE-2023-30256.md
index d1348742a7..ffbbf96147 100644
--- a/2023/CVE-2023-30256.md
+++ b/2023/CVE-2023-30256.md
@@ -14,6 +14,7 @@ Cross Site Scripting vulnerability found in Webkil QloApps v.1.5.2 allows a remo
- https://github.com/ahrixia/CVE-2023-30256
#### Github
+- https://github.com/ahrixia/CVE-2023-30256
- https://github.com/ahrixia/ahrixia
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-30330.md b/2023/CVE-2023-30330.md
index 66dc7a7c59..d4e6d6e2ec 100644
--- a/2023/CVE-2023-30330.md
+++ b/2023/CVE-2023-30330.md
@@ -14,4 +14,5 @@ SoftExpert (SE) Excellence Suite 2.x versions before 2.1.3 is vulnerable to Loca
- https://www.exploit-db.com/exploits/51404
#### Github
+- https://github.com/Filiplain/LFI-to-RCE-SE-Suite-2.0
diff --git a/2023/CVE-2023-30367.md b/2023/CVE-2023-30367.md
index 13d1a73798..0aaf339635 100644
--- a/2023/CVE-2023-30367.md
+++ b/2023/CVE-2023-30367.md
@@ -14,6 +14,7 @@ Multi-Remote Next Generation Connection Manager (mRemoteNG) is free software tha
- https://github.com/S1lkys/CVE-2023-30367-mRemoteNG-password-dumper
#### Github
+- https://github.com/S1lkys/CVE-2023-30367-mRemoteNG-password-dumper
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-3044.md b/2023/CVE-2023-3044.md
index 94378b746c..0e3e85491b 100644
--- a/2023/CVE-2023-3044.md
+++ b/2023/CVE-2023-3044.md
@@ -13,4 +13,5 @@ An excessively large PDF page size (found in fuzz testing, unlikely in normal PD
- https://github.com/baker221/poc-xpdf
#### Github
+- https://github.com/baker221/poc-xpdf
diff --git a/2023/CVE-2023-30459.md b/2023/CVE-2023-30459.md
index d1128b6d33..92d900810d 100644
--- a/2023/CVE-2023-30459.md
+++ b/2023/CVE-2023-30459.md
@@ -14,5 +14,6 @@ SmartPTT SCADA 1.1.0.0 allows remote code execution (when the attacker has admin
- https://smartptt.com
#### Github
+- https://github.com/Toxich4/CVE-2023-30459
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-30757.md b/2023/CVE-2023-30757.md
index 8581b25a16..c6b5e31153 100644
--- a/2023/CVE-2023-30757.md
+++ b/2023/CVE-2023-30757.md
@@ -11,9 +11,7 @@
### Description
-A vulnerability has been identified in Totally Integrated Automation Portal (TIA Portal) V14 (All versions), Totally Integrated Automation Portal (TIA Portal) V15 (All versions), Totally Integrated Automation Portal (TIA Portal) V15.1 (All versions), Totally Integrated Automation Portal (TIA Portal) V16 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions), Totally Integrated Automation Portal (TIA Portal) V18 (All versions), Totally Integrated Automation Portal (TIA Portal) V19 (All versions). The know-how protection feature in affected products does not properly update the encryption of existing program blocks when a project file is updated.
-
-This could allow attackers with access to the project file to recover previous - yet unprotected - versions of the project without the knowledge of the know-how protection password.
+A vulnerability has been identified in Totally Integrated Automation Portal (TIA Portal) V14 (All versions), Totally Integrated Automation Portal (TIA Portal) V15 (All versions), Totally Integrated Automation Portal (TIA Portal) V15.1 (All versions), Totally Integrated Automation Portal (TIA Portal) V16 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions), Totally Integrated Automation Portal (TIA Portal) V18 (All versions), Totally Integrated Automation Portal (TIA Portal) V19 (All versions). The know-how protection feature in affected products does not properly update the encryption of existing program blocks when a project file is updated.
This could allow attackers with access to the project file to recover previous - yet unprotected - versions of the project without the knowledge of the know-how protection password.
### POC
diff --git a/2023/CVE-2023-31122.md b/2023/CVE-2023-31122.md
index b7b140fe06..cf8cfa95c5 100644
--- a/2023/CVE-2023-31122.md
+++ b/2023/CVE-2023-31122.md
@@ -13,6 +13,7 @@ Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.This issue a
No PoCs from references.
#### Github
+- https://github.com/EzeTauil/Maquina-Upload
- https://github.com/arsenalzp/apch-operator
- https://github.com/klemakle/audit-pentest-BOX
- https://github.com/xonoxitron/cpe2cve
diff --git a/2023/CVE-2023-31445.md b/2023/CVE-2023-31445.md
index eb1a7b8bea..0cb392e138 100644
--- a/2023/CVE-2023-31445.md
+++ b/2023/CVE-2023-31445.md
@@ -15,5 +15,6 @@ Cassia Access controller before 2.1.1.2203171453, was discovered to have a unpri
- https://www.swiruhack.online/cves/202331445/md.html
#### Github
+- https://github.com/Dodge-MPTC/CVE-2023-31445-Unprivileged-Information-Disclosure
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-3149.md b/2023/CVE-2023-3149.md
index f994785b27..7c5a1c48d9 100644
--- a/2023/CVE-2023-3149.md
+++ b/2023/CVE-2023-3149.md
@@ -11,6 +11,7 @@ A vulnerability was found in SourceCodester Online Discussion Forum Site 1.0. It
#### Reference
- https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#4sql-injection-vulnerability-in-adminusermanage_userphp
+- https://vuldb.com/?id.231018
#### Github
No PoCs found on GitHub currently.
diff --git a/2023/CVE-2023-31497.md b/2023/CVE-2023-31497.md
index e7f91d66df..fb6f2df528 100644
--- a/2023/CVE-2023-31497.md
+++ b/2023/CVE-2023-31497.md
@@ -13,5 +13,6 @@ Incorrect access control in Quick Heal Technologies Limited Seqrite Endpoint Sec
- https://github.com/0xInfection/EPScalate
#### Github
+- https://github.com/0xInfection/EPScalate
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-31594.md b/2023/CVE-2023-31594.md
index e9b8dce109..ef8fb8f959 100644
--- a/2023/CVE-2023-31594.md
+++ b/2023/CVE-2023-31594.md
@@ -13,5 +13,6 @@ IC Realtime ICIP-P2012T 2.420 is vulnerable to Incorrect Access Control via an e
- https://github.com/Yozarseef95/CVE-2023-31594
#### Github
+- https://github.com/Yozarseef95/CVE-2023-31594
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-31595.md b/2023/CVE-2023-31595.md
index 4147c9ada0..5edfc9584d 100644
--- a/2023/CVE-2023-31595.md
+++ b/2023/CVE-2023-31595.md
@@ -13,5 +13,6 @@ IC Realtime ICIP-P2012T 2.420 is vulnerable to Incorrect Access Control via unau
- https://github.com/Yozarseef95/CVE-2023-31595
#### Github
+- https://github.com/Yozarseef95/CVE-2023-31595
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-31664.md b/2023/CVE-2023-31664.md
index d250056c07..dfc87c98c2 100644
--- a/2023/CVE-2023-31664.md
+++ b/2023/CVE-2023-31664.md
@@ -13,5 +13,6 @@ A reflected cross-site scripting (XSS) vulnerability in /authenticationendpoint/
- https://github.com/adilkhan7/CVE-2023-31664
#### Github
+- https://github.com/adilkhan7/CVE-2023-31664
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-31705.md b/2023/CVE-2023-31705.md
index c983e056c3..cf937c7fb8 100644
--- a/2023/CVE-2023-31705.md
+++ b/2023/CVE-2023-31705.md
@@ -13,5 +13,6 @@ A Reflected Cross-site scripting (XSS) vulnerability in Sourcecodester Task Remi
- https://github.com/d34dun1c02n/CVE-2023-31705
#### Github
+- https://github.com/d34dun1c02n/CVE-2023-31705
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-31726.md b/2023/CVE-2023-31726.md
index b502a52d93..cf9bccb4a7 100644
--- a/2023/CVE-2023-31726.md
+++ b/2023/CVE-2023-31726.md
@@ -13,5 +13,6 @@ AList 3.15.1 is vulnerable to Incorrect Access Control, which can be exploited b
- https://github.com/J6451/CVE-2023-31726
#### Github
+- https://github.com/J6451/CVE-2023-31726
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-31851.md b/2023/CVE-2023-31851.md
index 944497c8c3..279b49c21c 100644
--- a/2023/CVE-2023-31851.md
+++ b/2023/CVE-2023-31851.md
@@ -13,5 +13,6 @@ Cudy LT400 1.13.4 is has a cross-site scripting (XSS) vulnerability in /cgi-bin/
- https://github.com/CalfCrusher/CVE-2023-31851
#### Github
+- https://github.com/CalfCrusher/CVE-2023-31851
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-31852.md b/2023/CVE-2023-31852.md
index f96c4089ad..df64b18e92 100644
--- a/2023/CVE-2023-31852.md
+++ b/2023/CVE-2023-31852.md
@@ -13,5 +13,6 @@ Cudy LT400 1.13.4 is vulnerable to Cross Site Scripting (XSS) in cgi-bin/luci/ad
- https://github.com/CalfCrusher/CVE-2023-31852
#### Github
+- https://github.com/CalfCrusher/CVE-2023-31852
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-31853.md b/2023/CVE-2023-31853.md
index e286baa814..112b24a0bc 100644
--- a/2023/CVE-2023-31853.md
+++ b/2023/CVE-2023-31853.md
@@ -13,5 +13,6 @@ Cudy LT400 1.13.4 is vulnerable Cross Site Scripting (XSS) in /cgi-bin/luci/admi
- https://github.com/CalfCrusher/CVE-2023-31853
#### Github
+- https://github.com/CalfCrusher/CVE-2023-31853
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-32522.md b/2023/CVE-2023-32522.md
index a4dd9f55dd..0d981d3008 100644
--- a/2023/CVE-2023-32522.md
+++ b/2023/CVE-2023-32522.md
@@ -5,9 +5,7 @@
### Description
-A path traversal exists in a specific dll of Trend Micro Mobile Security (Enterprise) 9.8 SP5 which could allow an authenticated remote attacker to delete arbitrary files.
-
-Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
+A path traversal exists in a specific dll of Trend Micro Mobile Security (Enterprise) 9.8 SP5 which could allow an authenticated remote attacker to delete arbitrary files.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
### POC
diff --git a/2023/CVE-2023-32629.md b/2023/CVE-2023-32629.md
index 91a4d35f32..dbb89ffd42 100644
--- a/2023/CVE-2023-32629.md
+++ b/2023/CVE-2023-32629.md
@@ -16,6 +16,7 @@ Local privilege escalation vulnerability in Ubuntu Kernels overlayfs ovl_copy_up
- https://github.com/0xWhoami35/root-kernel
- https://github.com/0xsyr0/OSCP
- https://github.com/Ev3rPalestine/Analytics-HTB-Walkthrough
+- https://github.com/HaxorSecInfec/autoroot.sh
- https://github.com/K5LK/CVE-2023-2640-32629
- https://github.com/Kiosec/Linux-Exploitation
- https://github.com/Nkipohcs/CVE-2023-2640-CVE-2023-32629
diff --git a/2023/CVE-2023-32784.md b/2023/CVE-2023-32784.md
index 96f3afa9d2..9be05613b1 100644
--- a/2023/CVE-2023-32784.md
+++ b/2023/CVE-2023-32784.md
@@ -53,6 +53,7 @@ In KeePass 2.x before 2.54, it is possible to recover the cleartext master passw
- https://github.com/rvsvishnuv/rvsvishnuv.github.io
- https://github.com/s3mPr1linux/KEEPASS_PASS_DUMP
- https://github.com/und3sc0n0c1d0/BruteForce-to-KeePass
+- https://github.com/vdohney/keepass-password-dumper
- https://github.com/ynuwenhof/keedump
- https://github.com/z-jxy/keepass_dump
diff --git a/2023/CVE-2023-33105.md b/2023/CVE-2023-33105.md
index 77e7e09787..0147ac7757 100644
--- a/2023/CVE-2023-33105.md
+++ b/2023/CVE-2023-33105.md
@@ -14,4 +14,5 @@ No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
+- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-33253.md b/2023/CVE-2023-33253.md
index af13d7b9b9..b5c45bcf47 100644
--- a/2023/CVE-2023-33253.md
+++ b/2023/CVE-2023-33253.md
@@ -13,5 +13,6 @@ LabCollector 6.0 though 6.15 allows remote code execution. An authenticated remo
- https://github.com/Toxich4/CVE-2023-33253
#### Github
+- https://github.com/Toxich4/CVE-2023-33253
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-33408.md b/2023/CVE-2023-33408.md
index e0bd4a44ec..93d64d7034 100644
--- a/2023/CVE-2023-33408.md
+++ b/2023/CVE-2023-33408.md
@@ -13,5 +13,6 @@ Minical 1.0.0 is vulnerable to Cross Site Scripting (XSS). The vulnerability exi
- https://github.com/Thirukrishnan/CVE-2023-33408
#### Github
+- https://github.com/Thirukrishnan/CVE-2023-33408
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-33409.md b/2023/CVE-2023-33409.md
index 6302d841ef..a836550d73 100644
--- a/2023/CVE-2023-33409.md
+++ b/2023/CVE-2023-33409.md
@@ -13,5 +13,6 @@ Minical 1.0.0 is vulnerable to Cross Site Request Forgery (CSRF) via minical/pub
- https://github.com/Thirukrishnan/CVE-2023-33409
#### Github
+- https://github.com/Thirukrishnan/CVE-2023-33409
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-33410.md b/2023/CVE-2023-33410.md
index b3cf9b1d4f..7adb3ff627 100644
--- a/2023/CVE-2023-33410.md
+++ b/2023/CVE-2023-33410.md
@@ -13,5 +13,6 @@ Minical 1.0.0 and earlier contains a CSV injection vulnerability which allows an
- https://github.com/Thirukrishnan/CVE-2023-33410
#### Github
+- https://github.com/Thirukrishnan/CVE-2023-33410
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-33693.md b/2023/CVE-2023-33693.md
index c3c6d93b9d..7a6b0d9a91 100644
--- a/2023/CVE-2023-33693.md
+++ b/2023/CVE-2023-33693.md
@@ -13,5 +13,5 @@ A buffer overflow in EasyPlayerPro-Win v3.2.19.0106 to v3.6.19.0823 allows attac
- https://github.com/tsingsee/EasyPlayerPro-Win/pull/24
#### Github
-No PoCs found on GitHub currently.
+- https://github.com/ernestang98/win-exploits
diff --git a/2023/CVE-2023-33733.md b/2023/CVE-2023-33733.md
index fc3234780a..0121e50e45 100644
--- a/2023/CVE-2023-33733.md
+++ b/2023/CVE-2023-33733.md
@@ -15,6 +15,7 @@ Reportlab up to v3.6.12 allows attackers to execute arbitrary code via supplying
#### Github
- https://github.com/L41KAA/CVE-2023-33733-Exploit-PoC
- https://github.com/buiduchoang24/CVE-2023-33733
+- https://github.com/c53elyas/CVE-2023-33733
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/onion2203/CVE-2023-33733
- https://github.com/onion2203/Lab_Reportlab
diff --git a/2023/CVE-2023-33747.md b/2023/CVE-2023-33747.md
index 18bd1cf2ba..90503256cb 100644
--- a/2023/CVE-2023-33747.md
+++ b/2023/CVE-2023-33747.md
@@ -15,5 +15,6 @@ CloudPanel v2.2.2 allows attackers to execute a path traversal.
#### Github
- https://github.com/0xWhoami35/CloudPanel-CVE-2023-33747
+- https://github.com/EagleTube/CloudPanel
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-33757.md b/2023/CVE-2023-33757.md
index 527b63f341..9c0ddaed71 100644
--- a/2023/CVE-2023-33757.md
+++ b/2023/CVE-2023-33757.md
@@ -13,4 +13,5 @@ A lack of SSL certificate validation in Splicecom iPCS (iOS App) v1.3.4, iPCS2 (
- https://github.com/twignet/splicecom
#### Github
+- https://github.com/twignet/splicecom
diff --git a/2023/CVE-2023-33758.md b/2023/CVE-2023-33758.md
index 341bea458d..11bb7a2daa 100644
--- a/2023/CVE-2023-33758.md
+++ b/2023/CVE-2023-33758.md
@@ -13,4 +13,5 @@ Splicecom Maximiser Soft PBX v1.5 and before was discovered to contain a cross-s
- https://github.com/twignet/splicecom
#### Github
+- https://github.com/twignet/splicecom
diff --git a/2023/CVE-2023-33759.md b/2023/CVE-2023-33759.md
index 676f795d1e..12ad356b06 100644
--- a/2023/CVE-2023-33759.md
+++ b/2023/CVE-2023-33759.md
@@ -13,4 +13,5 @@ SpliceCom Maximiser Soft PBX v1.5 and before does not restrict excessive authent
- https://github.com/twignet/splicecom
#### Github
+- https://github.com/twignet/splicecom
diff --git a/2023/CVE-2023-33760.md b/2023/CVE-2023-33760.md
index 89a31065b2..e39cffbf2d 100644
--- a/2023/CVE-2023-33760.md
+++ b/2023/CVE-2023-33760.md
@@ -13,4 +13,5 @@ SpliceCom Maximiser Soft PBX v1.5 and before was discovered to utilize a default
- https://github.com/twignet/splicecom
#### Github
+- https://github.com/twignet/splicecom
diff --git a/2023/CVE-2023-33781.md b/2023/CVE-2023-33781.md
index 3a91a1578e..ee4a39d97e 100644
--- a/2023/CVE-2023-33781.md
+++ b/2023/CVE-2023-33781.md
@@ -14,4 +14,5 @@ An issue in D-Link DIR-842V2 v1.0.3 allows attackers to execute arbitrary comman
#### Github
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/s0tr/CVE-2023-33781
diff --git a/2023/CVE-2023-33782.md b/2023/CVE-2023-33782.md
index ef06d11bd6..c668aaf994 100644
--- a/2023/CVE-2023-33782.md
+++ b/2023/CVE-2023-33782.md
@@ -14,4 +14,5 @@ D-Link DIR-842V2 v1.0.3 was discovered to contain a command injection vulnerabil
#### Github
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/s0tr/CVE-2023-33782
diff --git a/2023/CVE-2023-33817.md b/2023/CVE-2023-33817.md
index bca2b26e75..bef9a8b831 100644
--- a/2023/CVE-2023-33817.md
+++ b/2023/CVE-2023-33817.md
@@ -14,5 +14,6 @@ hoteldruid v3.0.5 was discovered to contain a SQL injection vulnerability.
#### Github
- https://github.com/ARPSyndicate/cvemon
+- https://github.com/leekenghwa/CVE-2023-33817---SQL-Injection-found-in-HotelDruid-3.0.5
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-3396.md b/2023/CVE-2023-3396.md
new file mode 100644
index 0000000000..d6da42f469
--- /dev/null
+++ b/2023/CVE-2023-3396.md
@@ -0,0 +1,17 @@
+### [CVE-2023-3396](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3396)
+
+
+
+
+### Description
+
+A vulnerability was found in Campcodes Retro Cellphone Online Store 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/index.php. The manipulation of the argument username/password leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-232351.
+
+### POC
+
+#### Reference
+- https://vuldb.com/?id.232351
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2023/CVE-2023-34096.md b/2023/CVE-2023-34096.md
index 51e6ea98e8..079357a248 100644
--- a/2023/CVE-2023-34096.md
+++ b/2023/CVE-2023-34096.md
@@ -17,5 +17,6 @@ Thruk is a multibackend monitoring webinterface which currently supports Naemon,
- https://www.exploit-db.com/exploits/51509
#### Github
+- https://github.com/galoget/Thruk-CVE-2023-34096
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-34312.md b/2023/CVE-2023-34312.md
index 018784964f..3d6bdfb0be 100644
--- a/2023/CVE-2023-34312.md
+++ b/2023/CVE-2023-34312.md
@@ -25,4 +25,5 @@ In Tencent QQ through 9.7.8.29039 and TIM through 3.4.7.22084, QQProtect.exe and
- https://github.com/silentEAG/awesome-stars
- https://github.com/u604b/Awsome-Stars
- https://github.com/u604b/awesome-stars
+- https://github.com/vi3t1/qq-tim-elevation
diff --git a/2023/CVE-2023-34362.md b/2023/CVE-2023-34362.md
index 1dd2444833..df6e6f505a 100644
--- a/2023/CVE-2023-34362.md
+++ b/2023/CVE-2023-34362.md
@@ -14,6 +14,7 @@ In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.
- http://packetstormsecurity.com/files/173110/MOVEit-SQL-Injection.html
#### Github
+- https://github.com/0xMarcio/cve
- https://github.com/0xdead8ead-randori/cve_search_msf
- https://github.com/ARPSyndicate/cvemon
- https://github.com/BenjiTrapp/cisa-known-vuln-scraper
diff --git a/2023/CVE-2023-34598.md b/2023/CVE-2023-34598.md
index 43676ca78c..1e78a22460 100644
--- a/2023/CVE-2023-34598.md
+++ b/2023/CVE-2023-34598.md
@@ -20,6 +20,7 @@ Gibbon v25.0.0 is vulnerable to a Local File Inclusion (LFI) where it's possible
- https://github.com/izj007/wechat
- https://github.com/komodoooo/Some-things
- https://github.com/komodoooo/some-things
+- https://github.com/maddsec/CVE-2023-34598
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/whoami13apt/files2
diff --git a/2023/CVE-2023-34599.md b/2023/CVE-2023-34599.md
index c1a0873ee7..5ef10d0336 100644
--- a/2023/CVE-2023-34599.md
+++ b/2023/CVE-2023-34599.md
@@ -15,5 +15,6 @@ Multiple Cross-Site Scripting (XSS) vulnerabilities have been identified in Gibb
#### Github
- https://github.com/Imahian/CVE-2023-34599
- https://github.com/hheeyywweellccoommee/CVE-2023-34599-xsddo
+- https://github.com/maddsec/CVE-2023-34599
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-34758.md b/2023/CVE-2023-34758.md
index 059d064334..84c5ce3bf0 100644
--- a/2023/CVE-2023-34758.md
+++ b/2023/CVE-2023-34758.md
@@ -15,4 +15,5 @@ Sliver from v1.5.x to v1.5.39 has an improper cryptographic implementation, whic
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
+- https://github.com/tangent65536/Slivjacker
diff --git a/2023/CVE-2023-34924.md b/2023/CVE-2023-34924.md
index 8fde7379cf..c9fe12b24b 100644
--- a/2023/CVE-2023-34924.md
+++ b/2023/CVE-2023-34924.md
@@ -13,6 +13,7 @@ H3C Magic B1STW B1STV100R012 was discovered to contain a stack overflow via the
- https://github.com/ChrisL0tus/CVE-2023-34924
#### Github
+- https://github.com/ChrisL0tus/CVE-2023-34924
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-34939.md b/2023/CVE-2023-34939.md
index 14a9958b29..98b20b17c5 100644
--- a/2023/CVE-2023-34939.md
+++ b/2023/CVE-2023-34939.md
@@ -15,4 +15,5 @@ Onlyoffice Community Server before v12.5.2 was discovered to contain a remote co
#### Github
- https://github.com/20142995/sectool
+- https://github.com/firsov/onlyoffice
diff --git a/2023/CVE-2023-3505.md b/2023/CVE-2023-3505.md
new file mode 100644
index 0000000000..adcac7a8c5
--- /dev/null
+++ b/2023/CVE-2023-3505.md
@@ -0,0 +1,17 @@
+### [CVE-2023-3505](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3505)
+
+
+
+
+### Description
+
+A vulnerability was found in Onest CRM 1.0. It has been classified as problematic. This affects an unknown part of the file /admin/project/update/2 of the component Project List Handler. The manipulation of the argument name with the input leads to cross site scripting. It is possible to initiate the attack remotely. The identifier VDB-232953 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
+
+### POC
+
+#### Reference
+- https://vuldb.com/?id.232953
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2023/CVE-2023-3519.md b/2023/CVE-2023-3519.md
index e876e0ae42..07b32b06ae 100644
--- a/2023/CVE-2023-3519.md
+++ b/2023/CVE-2023-3519.md
@@ -14,6 +14,7 @@ Unauthenticated remote code execution
- http://packetstormsecurity.com/files/173997/Citrix-ADC-NetScaler-Remote-Code-Execution.html
#### Github
+- https://github.com/0xMarcio/cve
- https://github.com/Aicks/Citrix-CVE-2023-3519
- https://github.com/BishopFox/CVE-2023-3519
- https://github.com/CVEDB/awesome-cve-repo
diff --git a/2023/CVE-2023-35885.md b/2023/CVE-2023-35885.md
index a637e35c0a..7573e6ea8a 100644
--- a/2023/CVE-2023-35885.md
+++ b/2023/CVE-2023-35885.md
@@ -19,6 +19,7 @@ CloudPanel 2 before 2.3.1 has insecure file-manager cookie authentication.
- https://github.com/Threekiii/Awesome-POC
- https://github.com/Tropinene/Yscanner
- https://github.com/d4n-sec/d4n-sec.github.io
+- https://github.com/datackmy/FallingSkies-CVE-2023-35885
- https://github.com/getdrive/PoC
- https://github.com/iluaster/getdrive_PoC
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-36123.md b/2023/CVE-2023-36123.md
index 663bcdc623..cd2189c92d 100644
--- a/2023/CVE-2023-36123.md
+++ b/2023/CVE-2023-36123.md
@@ -13,5 +13,6 @@ Directory Traversal vulnerability in Hex-Dragon Plain Craft Launcher 2 version A
- https://github.com/9Bakabaka/CVE-2023-36123
#### Github
+- https://github.com/9Bakabaka/CVE-2023-36123
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-36143.md b/2023/CVE-2023-36143.md
index 61537604f0..4bd45c1bcb 100644
--- a/2023/CVE-2023-36143.md
+++ b/2023/CVE-2023-36143.md
@@ -14,5 +14,6 @@ Maxprint Maxlink 1200G v3.4.11E has an OS command injection vulnerability in the
#### Github
- https://github.com/RobinTrigon/CVE-2023-36143
+- https://github.com/leonardobg/CVE-2023-36143
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-36144.md b/2023/CVE-2023-36144.md
index 8c6057e6e8..d63cdeccbf 100644
--- a/2023/CVE-2023-36144.md
+++ b/2023/CVE-2023-36144.md
@@ -13,5 +13,6 @@ An authentication bypass in Intelbras Switch SG 2404 MR in firmware 1.00.54 allo
- https://github.com/leonardobg/CVE-2023-36144
#### Github
+- https://github.com/leonardobg/CVE-2023-36144
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-36644.md b/2023/CVE-2023-36644.md
index f9dd5ac9cd..d303084d85 100644
--- a/2023/CVE-2023-36644.md
+++ b/2023/CVE-2023-36644.md
@@ -13,5 +13,6 @@ Incorrect Access Control in ITB-GmbH TradePro v9.5, allows remote attackers to r
- https://github.com/caffeinated-labs/CVE-2023-36644
#### Github
+- https://github.com/caffeinated-labs/CVE-2023-36644
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-36745.md b/2023/CVE-2023-36745.md
index d3be5f56a1..c3ed1e77b9 100644
--- a/2023/CVE-2023-36745.md
+++ b/2023/CVE-2023-36745.md
@@ -17,6 +17,7 @@ Microsoft Exchange Server Remote Code Execution Vulnerability
No PoCs from references.
#### Github
+- https://github.com/0xMarcio/cve
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/GhostTroops/TOP
diff --git a/2023/CVE-2023-3684.md b/2023/CVE-2023-3684.md
index a606da0eba..57098154db 100644
--- a/2023/CVE-2023-3684.md
+++ b/2023/CVE-2023-3684.md
@@ -10,7 +10,7 @@ A vulnerability was found in LivelyWorks Articart 2.0.1 and classified as proble
### POC
#### Reference
-No PoCs from references.
+- https://vuldb.com/?id.234230
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
diff --git a/2023/CVE-2023-36884.md b/2023/CVE-2023-36884.md
index 84fbb0b1d9..0d1f4684ad 100644
--- a/2023/CVE-2023-36884.md
+++ b/2023/CVE-2023-36884.md
@@ -49,6 +49,7 @@ Windows Search Remote Code Execution Vulnerability
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/ToddMaxey/CVE-2023-36884
+- https://github.com/aleff-github/aleff-github
- https://github.com/aleff-github/my-flipper-shits
- https://github.com/bkzk/cisco-email-filters
- https://github.com/deepinstinct/Storm0978-RomCom-Campaign
diff --git a/2023/CVE-2023-3753.md b/2023/CVE-2023-3753.md
new file mode 100644
index 0000000000..75d5a4a985
--- /dev/null
+++ b/2023/CVE-2023-3753.md
@@ -0,0 +1,17 @@
+### [CVE-2023-3753](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3753)
+
+
+
+
+### Description
+
+A vulnerability classified as problematic has been found in Creativeitem Mastery LMS 1.2. This affects an unknown part of the file /browse. The manipulation of the argument search/featured/recommended/skill leads to cross site scripting. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-234423. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
+
+### POC
+
+#### Reference
+- https://vuldb.com/?id.234423
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2023/CVE-2023-37598.md b/2023/CVE-2023-37598.md
index 680fa77bf7..208944a948 100644
--- a/2023/CVE-2023-37598.md
+++ b/2023/CVE-2023-37598.md
@@ -15,4 +15,5 @@ A Cross Site Request Forgery (CSRF) vulnerability in issabel-pbx v.4.0.0-6 allow
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/sahiloj/CVE-2023-37598
diff --git a/2023/CVE-2023-3784.md b/2023/CVE-2023-3784.md
index ac8b8ef453..8d086b594f 100644
--- a/2023/CVE-2023-3784.md
+++ b/2023/CVE-2023-3784.md
@@ -11,6 +11,7 @@ A vulnerability was found in Dooblou WiFi File Explorer 1.13.3. It has been decl
#### Reference
- https://seclists.org/fulldisclosure/2023/Jul/37
+- https://vuldb.com/?id.235051
- https://www.vulnerability-lab.com/get_content.php?id=2317
#### Github
diff --git a/2023/CVE-2023-38286.md b/2023/CVE-2023-38286.md
index f7a873801f..2cd9c5bbdc 100644
--- a/2023/CVE-2023-38286.md
+++ b/2023/CVE-2023-38286.md
@@ -15,5 +15,6 @@ Thymeleaf through 3.1.1.RELEASE, as used in spring-boot-admin (aka Spring Boot A
#### Github
- https://github.com/fractal-visi0n/security-assessement
- https://github.com/izj007/wechat
+- https://github.com/p1n93r/SpringBootAdmin-thymeleaf-SSTI
- https://github.com/whoami13apt/files2
diff --git a/2023/CVE-2023-3833.md b/2023/CVE-2023-3833.md
new file mode 100644
index 0000000000..b0a8c096f4
--- /dev/null
+++ b/2023/CVE-2023-3833.md
@@ -0,0 +1,17 @@
+### [CVE-2023-3833](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3833)
+
+
+
+
+### Description
+
+A vulnerability was found in Bug Finder Montage 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /user/ticket/create of the component Ticket Handler. The manipulation of the argument message leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-235159. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
+
+### POC
+
+#### Reference
+- https://vuldb.com/?id.235159
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2023/CVE-2023-38389.md b/2023/CVE-2023-38389.md
new file mode 100644
index 0000000000..9fcc24030a
--- /dev/null
+++ b/2023/CVE-2023-38389.md
@@ -0,0 +1,18 @@
+### [CVE-2023-38389](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38389)
+
+
+
+
+### Description
+
+Incorrect Authorization vulnerability in Artbees JupiterX Core allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects JupiterX Core: from n/a through 3.3.8.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/codeb0ss/CVE-2023-38389-PoC
+- https://github.com/securi3ytalent/wordpress-exploit
+
diff --git a/2023/CVE-2023-38545.md b/2023/CVE-2023-38545.md
index 1316e890c3..47f1bb2131 100644
--- a/2023/CVE-2023-38545.md
+++ b/2023/CVE-2023-38545.md
@@ -25,6 +25,7 @@ No PoCs from references.
- https://github.com/fatmo666/CVE-2023-38545-libcurl-SOCKS5-heap-buffer-overflow
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/imfht/CVE-2023-38545
+- https://github.com/industrial-edge/iih-essentials-development-kit
- https://github.com/izj007/wechat
- https://github.com/kherrick/lobsters
- https://github.com/malinkamedok/devops_sandbox
diff --git a/2023/CVE-2023-38546.md b/2023/CVE-2023-38546.md
index 68a474dcde..c1b416d69c 100644
--- a/2023/CVE-2023-38546.md
+++ b/2023/CVE-2023-38546.md
@@ -15,6 +15,7 @@ No PoCs from references.
#### Github
- https://github.com/alex-grandson/docker-python-example
- https://github.com/fokypoky/places-list
+- https://github.com/industrial-edge/iih-essentials-development-kit
- https://github.com/malinkamedok/devops_sandbox
- https://github.com/testing-felickz/docker-scout-demo
diff --git a/2023/CVE-2023-38624.md b/2023/CVE-2023-38624.md
index cf051a13d8..e73f9a2e40 100644
--- a/2023/CVE-2023-38624.md
+++ b/2023/CVE-2023-38624.md
@@ -5,11 +5,7 @@
### Description
-A post-authenticated server-side request forgery (SSRF) vulnerability in Trend Micro Apex Central 2019 (lower than build 6481) could allow an attacker to interact with internal or local services directly.
-
-Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
-
-This is a similar, but not identical vulnerability as CVE-2023-38625 through CVE-2023-38627.
+A post-authenticated server-side request forgery (SSRF) vulnerability in Trend Micro Apex Central 2019 (lower than build 6481) could allow an attacker to interact with internal or local services directly.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
This is a similar, but not identical vulnerability as CVE-2023-38625 through CVE-2023-38627.
### POC
diff --git a/2023/CVE-2023-38829.md b/2023/CVE-2023-38829.md
index 2f6cc818e2..49e4ab8b04 100644
--- a/2023/CVE-2023-38829.md
+++ b/2023/CVE-2023-38829.md
@@ -14,5 +14,6 @@ An issue in NETIS SYSTEMS WF2409E v.3.6.42541 allows a remote attacker to execut
#### Github
- https://github.com/Luwak-IoT-Security/CVEs
+- https://github.com/adhikara13/CVE-2023-38829-NETIS-WF2409E
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-38840.md b/2023/CVE-2023-38840.md
index 5d65b96065..ab7405e306 100644
--- a/2023/CVE-2023-38840.md
+++ b/2023/CVE-2023-38840.md
@@ -15,5 +15,6 @@ Bitwarden Desktop 2023.7.0 and below allows an attacker with local access to obt
- https://redmaple.tech/blogs/2023/extract-bitwarden-vault-passwords/
#### Github
+- https://github.com/markuta/bw-dump
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-38890.md b/2023/CVE-2023-38890.md
index 138ca6c7e1..5416ee78fd 100644
--- a/2023/CVE-2023-38890.md
+++ b/2023/CVE-2023-38890.md
@@ -13,5 +13,6 @@ Online Shopping Portal Project 3.1 allows remote attackers to execute arbitrary
- https://github.com/akshadjoshi/CVE-2023-38890
#### Github
+- https://github.com/akshadjoshi/CVE-2023-38890
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-38891.md b/2023/CVE-2023-38891.md
index e26d05bfc6..7c5c1d7abb 100644
--- a/2023/CVE-2023-38891.md
+++ b/2023/CVE-2023-38891.md
@@ -13,5 +13,6 @@ SQL injection vulnerability in Vtiger CRM v.7.5.0 allows a remote authenticated
- https://github.com/jselliott/CVE-2023-38891
#### Github
+- https://github.com/jselliott/CVE-2023-38891
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-39063.md b/2023/CVE-2023-39063.md
index f70caca44d..58c8a67729 100644
--- a/2023/CVE-2023-39063.md
+++ b/2023/CVE-2023-39063.md
@@ -13,5 +13,6 @@ Buffer Overflow vulnerability in RaidenFTPD 2.4.4005 allows a local attacker to
- https://github.com/AndreGNogueira/CVE-2023-39063
#### Github
+- https://github.com/AndreGNogueira/CVE-2023-39063
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-39115.md b/2023/CVE-2023-39115.md
index cb3328589b..125ecebfd4 100644
--- a/2023/CVE-2023-39115.md
+++ b/2023/CVE-2023-39115.md
@@ -15,5 +15,6 @@ install/aiz-uploader/upload in Campcodes Online Matrimonial Website System Scrip
- https://www.exploit-db.com/exploits/51656
#### Github
+- https://github.com/Raj789-sec/CVE-2023-39115
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-39269.md b/2023/CVE-2023-39269.md
index c8ec9a243d..3b3cbf8827 100644
--- a/2023/CVE-2023-39269.md
+++ b/2023/CVE-2023-39269.md
@@ -154,8 +154,7 @@
### Description
-A vulnerability has been identified in RUGGEDCOM i800, RUGGEDCOM i800NC, RUGGEDCOM i801, RUGGEDCOM i801NC, RUGGEDCOM i802, RUGGEDCOM i802NC, RUGGEDCOM i803, RUGGEDCOM i803NC, RUGGEDCOM M2100, RUGGEDCOM M2100F, RUGGEDCOM M2100NC, RUGGEDCOM M2200, RUGGEDCOM M2200F, RUGGEDCOM M2200NC, RUGGEDCOM M969, RUGGEDCOM M969F, RUGGEDCOM M969NC, RUGGEDCOM RMC30, RUGGEDCOM RMC30NC, RUGGEDCOM RMC8388 V4.X, RUGGEDCOM RMC8388 V5.X, RUGGEDCOM RMC8388NC V4.X, RUGGEDCOM RMC8388NC V5.X, RUGGEDCOM RP110, RUGGEDCOM RP110NC, RUGGEDCOM RS1600, RUGGEDCOM RS1600F, RUGGEDCOM RS1600FNC, RUGGEDCOM RS1600NC, RUGGEDCOM RS1600T, RUGGEDCOM RS1600TNC, RUGGEDCOM RS400, RUGGEDCOM RS400F, RUGGEDCOM RS400NC, RUGGEDCOM RS401, RUGGEDCOM RS401NC, RUGGEDCOM RS416, RUGGEDCOM RS416F, RUGGEDCOM RS416NC, RUGGEDCOM RS416NCv2 V4.X, RUGGEDCOM RS416NCv2 V5.X, RUGGEDCOM RS416P, RUGGEDCOM RS416PF, RUGGEDCOM RS416PNC, RUGGEDCOM RS416PNCv2 V4.X, RUGGEDCOM RS416PNCv2 V5.X, RUGGEDCOM RS416Pv2 V4.X, RUGGEDCOM RS416Pv2 V5.X, RUGGEDCOM RS416v2 V4.X, RUGGEDCOM RS416v2 V5.X, RUGGEDCOM RS8000, RUGGEDCOM RS8000A, RUGGEDCOM RS8000ANC, RUGGEDCOM RS8000H, RUGGEDCOM RS8000HNC, RUGGEDCOM RS8000NC, RUGGEDCOM RS8000T, RUGGEDCOM RS8000TNC, RUGGEDCOM RS900, RUGGEDCOM RS900 (32M) V4.X, RUGGEDCOM RS900 (32M) V5.X, RUGGEDCOM RS900F, RUGGEDCOM RS900G, RUGGEDCOM RS900G (32M) V4.X, RUGGEDCOM RS900G (32M) V5.X, RUGGEDCOM RS900GF, RUGGEDCOM RS900GNC, RUGGEDCOM RS900GNC(32M) V4.X, RUGGEDCOM RS900GNC(32M) V5.X, RUGGEDCOM RS900GP, RUGGEDCOM RS900GPF, RUGGEDCOM RS900GPNC, RUGGEDCOM RS900L, RUGGEDCOM RS900LNC, RUGGEDCOM RS900M-GETS-C01, RUGGEDCOM RS900M-GETS-XX, RUGGEDCOM RS900M-STND-C01, RUGGEDCOM RS900M-STND-XX, RUGGEDCOM RS900MNC-GETS-C01, RUGGEDCOM RS900MNC-GETS-XX, RUGGEDCOM RS900MNC-STND-XX, RUGGEDCOM RS900MNC-STND-XX-C01, RUGGEDCOM RS900NC, RUGGEDCOM RS900NC(32M) V4.X, RUGGEDCOM RS900NC(32M) V5.X, RUGGEDCOM RS900W, RUGGEDCOM RS910, RUGGEDCOM RS910L, RUGGEDCOM RS910LNC, RUGGEDCOM RS910NC, RUGGEDCOM RS910W, RUGGEDCOM RS920L, RUGGEDCOM RS920LNC, RUGGEDCOM RS920W, RUGGEDCOM RS930L, RUGGEDCOM RS930LNC, RUGGEDCOM RS930W, RUGGEDCOM RS940G, RUGGEDCOM RS940GF, RUGGEDCOM RS940GNC, RUGGEDCOM RS969, RUGGEDCOM RS969NC, RUGGEDCOM RSG2100, RUGGEDCOM RSG2100 (32M) V4.X, RUGGEDCOM RSG2100 (32M) V5.X, RUGGEDCOM RSG2100F, RUGGEDCOM RSG2100NC, RUGGEDCOM RSG2100NC(32M) V4.X, RUGGEDCOM RSG2100NC(32M) V5.X, RUGGEDCOM RSG2100P, RUGGEDCOM RSG2100PF, RUGGEDCOM RSG2100PNC, RUGGEDCOM RSG2200, RUGGEDCOM RSG2200F, RUGGEDCOM RSG2200NC, RUGGEDCOM RSG2288 V4.X, RUGGEDCOM RSG2288 V5.X, RUGGEDCOM RSG2288NC V4.X, RUGGEDCOM RSG2288NC V5.X, RUGGEDCOM RSG2300 V4.X, RUGGEDCOM RSG2300 V5.X, RUGGEDCOM RSG2300F, RUGGEDCOM RSG2300NC V4.X, RUGGEDCOM RSG2300NC V5.X, RUGGEDCOM RSG2300P V4.X, RUGGEDCOM RSG2300P V5.X, RUGGEDCOM RSG2300PF, RUGGEDCOM RSG2300PNC V4.X, RUGGEDCOM RSG2300PNC V5.X, RUGGEDCOM RSG2488 V4.X, RUGGEDCOM RSG2488 V5.X, RUGGEDCOM RSG2488F, RUGGEDCOM RSG2488NC V4.X, RUGGEDCOM RSG2488NC V5.X, RUGGEDCOM RSG907R, RUGGEDCOM RSG908C, RUGGEDCOM RSG909R, RUGGEDCOM RSG910C, RUGGEDCOM RSG920P V4.X, RUGGEDCOM RSG920P V5.X, RUGGEDCOM RSG920PNC V4.X, RUGGEDCOM RSG920PNC V5.X, RUGGEDCOM RSL910, RUGGEDCOM RSL910NC, RUGGEDCOM RST2228, RUGGEDCOM RST2228P, RUGGEDCOM RST916C, RUGGEDCOM RST916P. The web server of the affected devices contains a vulnerability that may lead to a denial of service condition.
-An attacker may cause total loss of availability of the web server, which might recover after the attack is over.
+A vulnerability has been identified in RUGGEDCOM i800, RUGGEDCOM i800NC, RUGGEDCOM i801, RUGGEDCOM i801NC, RUGGEDCOM i802, RUGGEDCOM i802NC, RUGGEDCOM i803, RUGGEDCOM i803NC, RUGGEDCOM M2100, RUGGEDCOM M2100F, RUGGEDCOM M2100NC, RUGGEDCOM M2200, RUGGEDCOM M2200F, RUGGEDCOM M2200NC, RUGGEDCOM M969, RUGGEDCOM M969F, RUGGEDCOM M969NC, RUGGEDCOM RMC30, RUGGEDCOM RMC30NC, RUGGEDCOM RMC8388 V4.X, RUGGEDCOM RMC8388 V5.X, RUGGEDCOM RMC8388NC V4.X, RUGGEDCOM RMC8388NC V5.X, RUGGEDCOM RP110, RUGGEDCOM RP110NC, RUGGEDCOM RS1600, RUGGEDCOM RS1600F, RUGGEDCOM RS1600FNC, RUGGEDCOM RS1600NC, RUGGEDCOM RS1600T, RUGGEDCOM RS1600TNC, RUGGEDCOM RS400, RUGGEDCOM RS400F, RUGGEDCOM RS400NC, RUGGEDCOM RS401, RUGGEDCOM RS401NC, RUGGEDCOM RS416, RUGGEDCOM RS416F, RUGGEDCOM RS416NC, RUGGEDCOM RS416NCv2 V4.X, RUGGEDCOM RS416NCv2 V5.X, RUGGEDCOM RS416P, RUGGEDCOM RS416PF, RUGGEDCOM RS416PNC, RUGGEDCOM RS416PNCv2 V4.X, RUGGEDCOM RS416PNCv2 V5.X, RUGGEDCOM RS416Pv2 V4.X, RUGGEDCOM RS416Pv2 V5.X, RUGGEDCOM RS416v2 V4.X, RUGGEDCOM RS416v2 V5.X, RUGGEDCOM RS8000, RUGGEDCOM RS8000A, RUGGEDCOM RS8000ANC, RUGGEDCOM RS8000H, RUGGEDCOM RS8000HNC, RUGGEDCOM RS8000NC, RUGGEDCOM RS8000T, RUGGEDCOM RS8000TNC, RUGGEDCOM RS900, RUGGEDCOM RS900 (32M) V4.X, RUGGEDCOM RS900 (32M) V5.X, RUGGEDCOM RS900F, RUGGEDCOM RS900G, RUGGEDCOM RS900G (32M) V4.X, RUGGEDCOM RS900G (32M) V5.X, RUGGEDCOM RS900GF, RUGGEDCOM RS900GNC, RUGGEDCOM RS900GNC(32M) V4.X, RUGGEDCOM RS900GNC(32M) V5.X, RUGGEDCOM RS900GP, RUGGEDCOM RS900GPF, RUGGEDCOM RS900GPNC, RUGGEDCOM RS900L, RUGGEDCOM RS900LNC, RUGGEDCOM RS900M-GETS-C01, RUGGEDCOM RS900M-GETS-XX, RUGGEDCOM RS900M-STND-C01, RUGGEDCOM RS900M-STND-XX, RUGGEDCOM RS900MNC-GETS-C01, RUGGEDCOM RS900MNC-GETS-XX, RUGGEDCOM RS900MNC-STND-XX, RUGGEDCOM RS900MNC-STND-XX-C01, RUGGEDCOM RS900NC, RUGGEDCOM RS900NC(32M) V4.X, RUGGEDCOM RS900NC(32M) V5.X, RUGGEDCOM RS900W, RUGGEDCOM RS910, RUGGEDCOM RS910L, RUGGEDCOM RS910LNC, RUGGEDCOM RS910NC, RUGGEDCOM RS910W, RUGGEDCOM RS920L, RUGGEDCOM RS920LNC, RUGGEDCOM RS920W, RUGGEDCOM RS930L, RUGGEDCOM RS930LNC, RUGGEDCOM RS930W, RUGGEDCOM RS940G, RUGGEDCOM RS940GF, RUGGEDCOM RS940GNC, RUGGEDCOM RS969, RUGGEDCOM RS969NC, RUGGEDCOM RSG2100, RUGGEDCOM RSG2100 (32M) V4.X, RUGGEDCOM RSG2100 (32M) V5.X, RUGGEDCOM RSG2100F, RUGGEDCOM RSG2100NC, RUGGEDCOM RSG2100NC(32M) V4.X, RUGGEDCOM RSG2100NC(32M) V5.X, RUGGEDCOM RSG2100P, RUGGEDCOM RSG2100PF, RUGGEDCOM RSG2100PNC, RUGGEDCOM RSG2200, RUGGEDCOM RSG2200F, RUGGEDCOM RSG2200NC, RUGGEDCOM RSG2288 V4.X, RUGGEDCOM RSG2288 V5.X, RUGGEDCOM RSG2288NC V4.X, RUGGEDCOM RSG2288NC V5.X, RUGGEDCOM RSG2300 V4.X, RUGGEDCOM RSG2300 V5.X, RUGGEDCOM RSG2300F, RUGGEDCOM RSG2300NC V4.X, RUGGEDCOM RSG2300NC V5.X, RUGGEDCOM RSG2300P V4.X, RUGGEDCOM RSG2300P V5.X, RUGGEDCOM RSG2300PF, RUGGEDCOM RSG2300PNC V4.X, RUGGEDCOM RSG2300PNC V5.X, RUGGEDCOM RSG2488 V4.X, RUGGEDCOM RSG2488 V5.X, RUGGEDCOM RSG2488F, RUGGEDCOM RSG2488NC V4.X, RUGGEDCOM RSG2488NC V5.X, RUGGEDCOM RSG907R, RUGGEDCOM RSG908C, RUGGEDCOM RSG909R, RUGGEDCOM RSG910C, RUGGEDCOM RSG920P V4.X, RUGGEDCOM RSG920P V5.X, RUGGEDCOM RSG920PNC V4.X, RUGGEDCOM RSG920PNC V5.X, RUGGEDCOM RSL910, RUGGEDCOM RSL910NC, RUGGEDCOM RST2228, RUGGEDCOM RST2228P, RUGGEDCOM RST916C, RUGGEDCOM RST916P. The web server of the affected devices contains a vulnerability that may lead to a denial of service condition.
An attacker may cause total loss of availability of the web server, which might recover after the attack is over.
### POC
diff --git a/2023/CVE-2023-39341.md b/2023/CVE-2023-39341.md
index e3b2dbe260..b4aff6c8b5 100644
--- a/2023/CVE-2023-39341.md
+++ b/2023/CVE-2023-39341.md
@@ -17,8 +17,7 @@
### Description
-"FFRI yarai", "FFRI yarai Home and Business Edition" and their OEM products handle exceptional conditions improperly, which may lead to denial-of-service (DoS) condition.
-Affected products and versions are as follows: FFRI yarai versions 3.4.0 to 3.4.6 and 3.5.0, FFRI yarai Home and Business Edition version 1.4.0, InfoTrace Mark II Malware Protection (Mark II Zerona) versions 3.0.1 to 3.2.2, Zerona / Zerona PLUS versions 3.2.32 to 3.2.36, ActSecure χ versions 3.4.0 to 3.4.6 and 3.5.0, Dual Safe Powered by FFRI yarai version 1.4.1, EDR Plus Pack (Bundled FFRI yarai versions 3.4.0 to 3.4.6 and 3.5.0), and EDR Plus Pack Cloud (Bundled FFRI yarai versions 3.4.0 to 3.4.6 and 3.5.0).
+"FFRI yarai", "FFRI yarai Home and Business Edition" and their OEM products handle exceptional conditions improperly, which may lead to denial-of-service (DoS) condition.
Affected products and versions are as follows: FFRI yarai versions 3.4.0 to 3.4.6 and 3.5.0, FFRI yarai Home and Business Edition version 1.4.0, InfoTrace Mark II Malware Protection (Mark II Zerona) versions 3.0.1 to 3.2.2, Zerona / Zerona PLUS versions 3.2.32 to 3.2.36, ActSecure χ versions 3.4.0 to 3.4.6 and 3.5.0, Dual Safe Powered by FFRI yarai version 1.4.1, EDR Plus Pack (Bundled FFRI yarai versions 3.4.0 to 3.4.6 and 3.5.0), and EDR Plus Pack Cloud (Bundled FFRI yarai versions 3.4.0 to 3.4.6 and 3.5.0).
### POC
diff --git a/2023/CVE-2023-39379.md b/2023/CVE-2023-39379.md
index ab9beb66cf..1755b6c1fc 100644
--- a/2023/CVE-2023-39379.md
+++ b/2023/CVE-2023-39379.md
@@ -7,7 +7,7 @@
### Description
-Fujitsu Software Infrastructure Manager (ISM) stores sensitive information at the product's maintenance data (ismsnap) in cleartext form. As a result, the password for the proxy server that is configured in ISM may be retrieved. Affected products and versions are as follows: Fujitsu Software Infrastructure Manager Advanced Edition V2.8.0.060, Fujitsu Software Infrastructure Manager Advanced Edition for PRIMEFLEX V2.8.0.060, and Fujitsu Software Infrastructure Manager Essential Edition V2.8.0.060.
+Fujitsu Software Infrastructure Manager (ISM) stores sensitive information at the product's maintenance data (ismsnap) in cleartext form. As a result, the password for the proxy server that is configured in ISM may be retrieved. Affected products and versions are as follows: Fujitsu Software Infrastructure Manager Advanced Edition V2.8.0.060, Fujitsu Software Infrastructure Manager Advanced Edition for PRIMEFLEX V2.8.0.060, and Fujitsu Software Infrastructure Manager Essential Edition V2.8.0.060.
### POC
diff --git a/2023/CVE-2023-39848.md b/2023/CVE-2023-39848.md
index de85d18187..98de84a1b5 100644
--- a/2023/CVE-2023-39848.md
+++ b/2023/CVE-2023-39848.md
@@ -14,6 +14,7 @@ No PoCs from references.
#### Github
- https://github.com/AS-Mend-RenovateEE/RenovateEEDVWA
+- https://github.com/Abhitejabodapati/DVWA-SAST
- https://github.com/Blake384/DVWA
- https://github.com/BrunoiMesquita/DAMN-VULNERABLE-PHP-WEB-APPLICATION
- https://github.com/Bulnick/SCode
@@ -25,6 +26,7 @@ No PoCs from references.
- https://github.com/HowAreYouChristian/crs
- https://github.com/HycCodeQL/DVWA
- https://github.com/Iamishfaq07/DVWA
+- https://github.com/Jackbling/DVWA
- https://github.com/Jun1u2/TestGR
- https://github.com/Kir-Scheluh/SSDLC-lab4-test
- https://github.com/LenninPeren/PruebaDVWA
@@ -43,6 +45,8 @@ No PoCs from references.
- https://github.com/Security-Test-Account/DVWA
- https://github.com/ShrutikaNakhale/DVWA2
- https://github.com/Slon12jr/DVWA
+- https://github.com/TINNI-Lal/DVWA
+- https://github.com/Yahyazaizi/application-test-security
- https://github.com/Zahidkhan1221/DWVA
- https://github.com/andersongodoy/DVWA-CORRIGIDO
- https://github.com/asmendio/RenovateEETest
diff --git a/2023/CVE-2023-40297.md b/2023/CVE-2023-40297.md
index dac55aeb63..49c9d0a825 100644
--- a/2023/CVE-2023-40297.md
+++ b/2023/CVE-2023-40297.md
@@ -14,4 +14,5 @@ Stakater Forecastle 1.0.139 and before allows %5C../ directory traversal in the
#### Github
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/sahar042/CVE-2023-40297
diff --git a/2023/CVE-2023-40362.md b/2023/CVE-2023-40362.md
index 3c81386982..013f493548 100644
--- a/2023/CVE-2023-40362.md
+++ b/2023/CVE-2023-40362.md
@@ -13,5 +13,6 @@ An issue was discovered in CentralSquare Click2Gov Building Permit before Octobe
- https://github.com/ally-petitt/CVE-2023-40362
#### Github
+- https://github.com/ally-petitt/CVE-2023-40362
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-4039.md b/2023/CVE-2023-4039.md
index 7b65cf42f5..d7bae6e309 100644
--- a/2023/CVE-2023-4039.md
+++ b/2023/CVE-2023-4039.md
@@ -6,7 +6,7 @@
### Description
-**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables.The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.
+** DISPUTED ** **DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables.The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.
### POC
@@ -17,4 +17,5 @@
- https://github.com/GrigGM/05-virt-04-docker-hw
- https://github.com/bollwarm/SecToolSet
- https://github.com/fokypoky/places-list
+- https://github.com/m-pasima/CI-CD-Security-image-scan
diff --git a/2023/CVE-2023-40546.md b/2023/CVE-2023-40546.md
index daebd90d15..aab7faa99f 100644
--- a/2023/CVE-2023-40546.md
+++ b/2023/CVE-2023-40546.md
@@ -26,4 +26,5 @@ No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
+- https://github.com/seal-community/patches
diff --git a/2023/CVE-2023-40547.md b/2023/CVE-2023-40547.md
index 0c1593bf27..4f27dfdf80 100644
--- a/2023/CVE-2023-40547.md
+++ b/2023/CVE-2023-40547.md
@@ -26,4 +26,5 @@ No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
+- https://github.com/seal-community/patches
diff --git a/2023/CVE-2023-40549.md b/2023/CVE-2023-40549.md
index bd16178fef..f139556565 100644
--- a/2023/CVE-2023-40549.md
+++ b/2023/CVE-2023-40549.md
@@ -26,4 +26,5 @@ No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
+- https://github.com/seal-community/patches
diff --git a/2023/CVE-2023-40550.md b/2023/CVE-2023-40550.md
index 3f27ad431b..0f99794419 100644
--- a/2023/CVE-2023-40550.md
+++ b/2023/CVE-2023-40550.md
@@ -26,4 +26,5 @@ No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
+- https://github.com/seal-community/patches
diff --git a/2023/CVE-2023-40551.md b/2023/CVE-2023-40551.md
index c7b462e6d0..2b19198c17 100644
--- a/2023/CVE-2023-40551.md
+++ b/2023/CVE-2023-40551.md
@@ -26,4 +26,5 @@ No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
+- https://github.com/seal-community/patches
diff --git a/2023/CVE-2023-40661.md b/2023/CVE-2023-40661.md
index fd35bbe77d..1f6ce615b8 100644
--- a/2023/CVE-2023-40661.md
+++ b/2023/CVE-2023-40661.md
@@ -7,8 +7,7 @@
### Description
-Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow
-compromise key generation, certificate loading, and other card management operations during enrollment.
+Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow
compromise key generation, certificate loading, and other card management operations during enrollment.
### POC
diff --git a/2023/CVE-2023-40868.md b/2023/CVE-2023-40868.md
index 0f47866d99..ea35379368 100644
--- a/2023/CVE-2023-40868.md
+++ b/2023/CVE-2023-40868.md
@@ -13,5 +13,6 @@ Cross Site Request Forgery vulnerability in mooSocial MooSocial Software v.Demo
- https://github.com/MinoTauro2020/CVE-2023-40868
#### Github
+- https://github.com/MinoTauro2020/CVE-2023-40868
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-40869.md b/2023/CVE-2023-40869.md
index dd77eaa972..0d4ecabb3e 100644
--- a/2023/CVE-2023-40869.md
+++ b/2023/CVE-2023-40869.md
@@ -13,5 +13,6 @@ Cross Site Scripting vulnerability in mooSocial mooSocial Software 3.1.6 and 3.1
- https://github.com/MinoTauro2020/CVE-2023-40869
#### Github
+- https://github.com/MinoTauro2020/CVE-2023-40869
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-41164.md b/2023/CVE-2023-41164.md
index 1ca17327b4..82655e5469 100644
--- a/2023/CVE-2023-41164.md
+++ b/2023/CVE-2023-41164.md
@@ -14,4 +14,5 @@ No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
+- https://github.com/seal-community/patches
diff --git a/2023/CVE-2023-41179.md b/2023/CVE-2023-41179.md
index 33351efbda..825c8593c4 100644
--- a/2023/CVE-2023-41179.md
+++ b/2023/CVE-2023-41179.md
@@ -9,9 +9,7 @@
### Description
-A vulnerability in the 3rd party AV uninstaller module contained in Trend Micro Apex One (on-prem and SaaS), Worry-Free Business Security and Worry-Free Business Security Services could allow an attacker to manipulate the module to execute arbitrary commands on an affected installation.
-
-Note that an attacker must first obtain administrative console access on the target system in order to exploit this vulnerability.
+A vulnerability in the 3rd party AV uninstaller module contained in Trend Micro Apex One (on-prem and SaaS), Worry-Free Business Security and Worry-Free Business Security Services could allow an attacker to manipulate the module to execute arbitrary commands on an affected installation.
Note that an attacker must first obtain administrative console access on the target system in order to exploit this vulnerability.
### POC
diff --git a/2023/CVE-2023-41707.md b/2023/CVE-2023-41707.md
index bdc5afd9f6..3aeca01b81 100644
--- a/2023/CVE-2023-41707.md
+++ b/2023/CVE-2023-41707.md
@@ -5,8 +5,7 @@
### Description
-Processing of user-defined mail search expressions is not limited. Availability of OX App Suite could be reduced due to high processing load. Please deploy the provided updates and patch releases. Processing time of mail search expressions now gets monitored, and the related request is terminated if a resource threshold is reached.
- No publicly available exploits are known.
+Processing of user-defined mail search expressions is not limited. Availability of OX App Suite could be reduced due to high processing load. Please deploy the provided updates and patch releases. Processing time of mail search expressions now gets monitored, and the related request is terminated if a resource threshold is reached.
No publicly available exploits are known.
### POC
diff --git a/2023/CVE-2023-41717.md b/2023/CVE-2023-41717.md
index a63c118551..3d97366cab 100644
--- a/2023/CVE-2023-41717.md
+++ b/2023/CVE-2023-41717.md
@@ -13,5 +13,6 @@ Inappropriate file type control in Zscaler Proxy versions 3.6.1.25 and prior all
- https://github.com/federella/CVE-2023-41717
#### Github
+- https://github.com/federella/CVE-2023-41717
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-42222.md b/2023/CVE-2023-42222.md
index 580debde46..cc31250b9a 100644
--- a/2023/CVE-2023-42222.md
+++ b/2023/CVE-2023-42222.md
@@ -14,5 +14,6 @@ WebCatalog before 49.0 is vulnerable to Incorrect Access Control. WebCatalog cal
- https://github.com/itssixtyn3in/CVE-2023-42222
#### Github
+- https://github.com/itssixtyn3in/CVE-2023-42222
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-42283.md b/2023/CVE-2023-42283.md
index 7a44dad463..8bb44062dc 100644
--- a/2023/CVE-2023-42283.md
+++ b/2023/CVE-2023-42283.md
@@ -13,5 +13,6 @@ Blind SQL injection in api_id parameter in Tyk Gateway version 5.0.3 allows atta
- https://github.com/andreysanyuk/CVE-2023-42283
#### Github
+- https://github.com/andreysanyuk/CVE-2023-42283
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-42284.md b/2023/CVE-2023-42284.md
index 9a1c669dff..2f0f253655 100644
--- a/2023/CVE-2023-42284.md
+++ b/2023/CVE-2023-42284.md
@@ -13,5 +13,6 @@ Blind SQL injection in api_version parameter in Tyk Gateway version 5.0.3 allows
- https://github.com/andreysanyuk/CVE-2023-42284
#### Github
+- https://github.com/andreysanyuk/CVE-2023-42284
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-42362.md b/2023/CVE-2023-42362.md
index 45b7793f1d..11eee24ca6 100644
--- a/2023/CVE-2023-42362.md
+++ b/2023/CVE-2023-42362.md
@@ -13,5 +13,6 @@ An arbitrary file upload vulnerability in Teller Web App v.4.4.0 allows a remote
- https://github.com/Mr-n0b3dy/CVE-2023-42362
#### Github
+- https://github.com/Mr-n0b3dy/CVE-2023-42362
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-42363.md b/2023/CVE-2023-42363.md
index 2e5569722d..f83424ecf5 100644
--- a/2023/CVE-2023-42363.md
+++ b/2023/CVE-2023-42363.md
@@ -13,5 +13,6 @@ A use-after-free vulnerability was discovered in xasprintf function in xfuncs_pr
No PoCs from references.
#### Github
+- https://github.com/bcgov/jag-cdds
- https://github.com/cdupuis/aspnetapp
diff --git a/2023/CVE-2023-42366.md b/2023/CVE-2023-42366.md
index 8c8b1407f8..f4f780a7d9 100644
--- a/2023/CVE-2023-42366.md
+++ b/2023/CVE-2023-42366.md
@@ -13,5 +13,6 @@ A heap-buffer-overflow was discovered in BusyBox v.1.36.1 in the next_token func
No PoCs from references.
#### Github
+- https://github.com/bcgov/jag-cdds
- https://github.com/cdupuis/aspnetapp
diff --git a/2023/CVE-2023-42469.md b/2023/CVE-2023-42469.md
index b4e62a1266..ef46c08bdf 100644
--- a/2023/CVE-2023-42469.md
+++ b/2023/CVE-2023-42469.md
@@ -16,6 +16,7 @@ The com.full.dialer.top.secure.encrypted application through 1.0.1 for Android e
- https://github.com/actuator/cve/blob/main/CVE-2023-42469
#### Github
+- https://github.com/actuator/com.full.dialer.top.secure.encrypted
- https://github.com/actuator/cve
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-43148.md b/2023/CVE-2023-43148.md
index 12a0b3d169..e80212b526 100644
--- a/2023/CVE-2023-43148.md
+++ b/2023/CVE-2023-43148.md
@@ -14,5 +14,6 @@ SPA-Cart 1.9.0.3 has a Cross Site Request Forgery (CSRF) vulnerability that allo
#### Github
- https://github.com/MinoTauro2020/CVE-2023-43147
+- https://github.com/MinoTauro2020/CVE-2023-43148
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-43149.md b/2023/CVE-2023-43149.md
index 541d28ea64..b3bd6851e4 100644
--- a/2023/CVE-2023-43149.md
+++ b/2023/CVE-2023-43149.md
@@ -13,6 +13,7 @@ SPA-Cart 1.9.0.3 is vulnerable to Cross Site Request Forgery (CSRF) that allows
- https://github.com/MinoTauro2020/CVE-2023-43149
#### Github
+- https://github.com/MinoTauro2020/CVE-2023-43149
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-43261.md b/2023/CVE-2023-43261.md
index ec81f648d5..6531bf31a9 100644
--- a/2023/CVE-2023-43261.md
+++ b/2023/CVE-2023-43261.md
@@ -20,4 +20,5 @@ An information disclosure in Milesight UR5X, UR32L, UR32, UR35, UR41 before v35.
- https://github.com/johe123qwe/github-trending
- https://github.com/komodoooo/Some-things
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/win3zz/CVE-2023-43261
diff --git a/2023/CVE-2023-43284.md b/2023/CVE-2023-43284.md
index 546fecbefc..a2cf254f03 100644
--- a/2023/CVE-2023-43284.md
+++ b/2023/CVE-2023-43284.md
@@ -13,5 +13,6 @@ D-Link Wireless MU-MIMO Gigabit AC1200 Router DIR-846 100A53DBR-Retail devices a
- https://github.com/MateusTesser/CVE-2023-43284
#### Github
+- https://github.com/MateusTesser/CVE-2023-43284
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-43323.md b/2023/CVE-2023-43323.md
index 0483c48a94..88068df89a 100644
--- a/2023/CVE-2023-43323.md
+++ b/2023/CVE-2023-43323.md
@@ -13,5 +13,6 @@ mooSocial 3.1.8 is vulnerable to external service interaction on post function.
- https://github.com/ahrixia/CVE-2023-43323
#### Github
+- https://github.com/ahrixia/CVE-2023-43323
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-43325.md b/2023/CVE-2023-43325.md
index c6808775e8..a9001e267b 100644
--- a/2023/CVE-2023-43325.md
+++ b/2023/CVE-2023-43325.md
@@ -13,6 +13,7 @@ A reflected cross-site scripting (XSS) vulnerability in the data[redirect_url] p
- https://github.com/ahrixia/CVE-2023-43325
#### Github
+- https://github.com/ahrixia/CVE-2023-43325
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-43326.md b/2023/CVE-2023-43326.md
index 8da3e2baaf..5ac20afeed 100644
--- a/2023/CVE-2023-43326.md
+++ b/2023/CVE-2023-43326.md
@@ -13,5 +13,6 @@ A reflected cross-site scripting (XSS) vulnerability exisits in multiple url of
- https://github.com/ahrixia/CVE-2023-43326
#### Github
+- https://github.com/ahrixia/CVE-2023-43326
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-43340.md b/2023/CVE-2023-43340.md
index 5ee60cee30..9527b9642b 100644
--- a/2023/CVE-2023-43340.md
+++ b/2023/CVE-2023-43340.md
@@ -15,4 +15,5 @@ Cross-site scripting (XSS) vulnerability in evolution v.3.2.3 allows a local att
#### Github
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/sromanhu/-CVE-2023-43340-Evolution-Reflected-XSS---Installation-Admin-Options
diff --git a/2023/CVE-2023-43341.md b/2023/CVE-2023-43341.md
index b59e09d184..388ebe4ed5 100644
--- a/2023/CVE-2023-43341.md
+++ b/2023/CVE-2023-43341.md
@@ -15,4 +15,5 @@ Cross-site scripting (XSS) vulnerability in evolution evo v.3.2.3 allows a local
#### Github
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/sromanhu/CVE-2023-43341-Evolution-Reflected-XSS---Installation-Connection-
diff --git a/2023/CVE-2023-43342.md b/2023/CVE-2023-43342.md
index e34d95cd76..33ab0495c8 100644
--- a/2023/CVE-2023-43342.md
+++ b/2023/CVE-2023-43342.md
@@ -15,4 +15,5 @@ Cross-site scripting (XSS) vulnerability in opensolution Quick CMS v.6.7 allows
#### Github
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/sromanhu/CVE-2023-43342-Quick-CMS-Stored-XSS---Languages-Frontend
diff --git a/2023/CVE-2023-43343.md b/2023/CVE-2023-43343.md
index 123d92b1c1..0bffc5c7d5 100644
--- a/2023/CVE-2023-43343.md
+++ b/2023/CVE-2023-43343.md
@@ -15,4 +15,5 @@ Cross-site scripting (XSS) vulnerability in opensolution Quick CMS v.6.7 allows
#### Github
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/sromanhu/CVE-2023-43343-Quick-CMS-Stored-XSS---Pages-Files
diff --git a/2023/CVE-2023-43344.md b/2023/CVE-2023-43344.md
index 4537a668b6..7b821dc45f 100644
--- a/2023/CVE-2023-43344.md
+++ b/2023/CVE-2023-43344.md
@@ -14,4 +14,5 @@ Cross-site scripting (XSS) vulnerability in opensolution Quick CMS v.6.7 allows
#### Github
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/sromanhu/CVE-2023-43344-Quick-CMS-Stored-XSS---SEO-Meta-description
diff --git a/2023/CVE-2023-43345.md b/2023/CVE-2023-43345.md
index 5c699a2e64..802e780ec7 100644
--- a/2023/CVE-2023-43345.md
+++ b/2023/CVE-2023-43345.md
@@ -14,4 +14,5 @@ Cross-site scripting (XSS) vulnerability in opensolution Quick CMS v.6.7 allows
#### Github
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/sromanhu/CVE-2023-43345-Quick-CMS-Stored-XSS---Pages-Content
diff --git a/2023/CVE-2023-43346.md b/2023/CVE-2023-43346.md
index 8e51707d02..b062a5635e 100644
--- a/2023/CVE-2023-43346.md
+++ b/2023/CVE-2023-43346.md
@@ -15,4 +15,5 @@ Cross-site scripting (XSS) vulnerability in opensolution Quick CMS v.6.7 allows
#### Github
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/sromanhu/CVE-2023-43346-Quick-CMS-Stored-XSS---Languages-Backend
diff --git a/2023/CVE-2023-43352.md b/2023/CVE-2023-43352.md
index 0944fe9458..1874f1a0d7 100644
--- a/2023/CVE-2023-43352.md
+++ b/2023/CVE-2023-43352.md
@@ -15,4 +15,5 @@ An issue in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary
#### Github
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/sromanhu/CVE-2023-43352-CMSmadesimple-SSTI--Content
diff --git a/2023/CVE-2023-43353.md b/2023/CVE-2023-43353.md
index cfbd5c423b..180639d27c 100644
--- a/2023/CVE-2023-43353.md
+++ b/2023/CVE-2023-43353.md
@@ -14,4 +14,5 @@ Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local atta
#### Github
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/sromanhu/CVE-2023-43353-CMSmadesimple-Stored-XSS---News---Extra
diff --git a/2023/CVE-2023-43354.md b/2023/CVE-2023-43354.md
index 5097b024ad..6f56eb5ac8 100644
--- a/2023/CVE-2023-43354.md
+++ b/2023/CVE-2023-43354.md
@@ -14,4 +14,5 @@ Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local atta
#### Github
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/sromanhu/CVE-2023-43354-CMSmadesimple-Stored-XSS---MicroTIny-extension
diff --git a/2023/CVE-2023-43355.md b/2023/CVE-2023-43355.md
index 58735851ed..81fcbe0995 100644
--- a/2023/CVE-2023-43355.md
+++ b/2023/CVE-2023-43355.md
@@ -15,4 +15,5 @@ Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local atta
#### Github
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/sromanhu/CVE-2023-43355-CMSmadesimple-Reflected-XSS---Add-user
diff --git a/2023/CVE-2023-43356.md b/2023/CVE-2023-43356.md
index 85d60a8e64..9c93343d30 100644
--- a/2023/CVE-2023-43356.md
+++ b/2023/CVE-2023-43356.md
@@ -14,4 +14,5 @@ Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local atta
#### Github
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/sromanhu/CVE-2023-43356-CMSmadesimple-Stored-XSS---Global-Settings
diff --git a/2023/CVE-2023-43357.md b/2023/CVE-2023-43357.md
index ceacb41299..ba3c68230c 100644
--- a/2023/CVE-2023-43357.md
+++ b/2023/CVE-2023-43357.md
@@ -14,4 +14,5 @@ Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local atta
#### Github
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/sromanhu/CVE-2023-43357-CMSmadesimple-Stored-XSS---Shortcut
diff --git a/2023/CVE-2023-43358.md b/2023/CVE-2023-43358.md
index edab2e54a4..9762c4ac1b 100644
--- a/2023/CVE-2023-43358.md
+++ b/2023/CVE-2023-43358.md
@@ -15,4 +15,5 @@ Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local atta
#### Github
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/sromanhu/CVE-2023-43358-CMSmadesimple-Stored-XSS---News
diff --git a/2023/CVE-2023-43359.md b/2023/CVE-2023-43359.md
index d0b4a30cef..7757315975 100644
--- a/2023/CVE-2023-43359.md
+++ b/2023/CVE-2023-43359.md
@@ -14,4 +14,5 @@ Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local atta
#### Github
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/sromanhu/CVE-2023-43359-CMSmadesimple-Stored-XSS----Content-Manager
diff --git a/2023/CVE-2023-43360.md b/2023/CVE-2023-43360.md
index ca92d6f1e4..9a48708632 100644
--- a/2023/CVE-2023-43360.md
+++ b/2023/CVE-2023-43360.md
@@ -15,4 +15,5 @@ Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local atta
#### Github
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/sromanhu/CVE-2023-43360-CMSmadesimple-Stored-XSS---File-Picker-extension
diff --git a/2023/CVE-2023-43662.md b/2023/CVE-2023-43662.md
new file mode 100644
index 0000000000..abd891c9a8
--- /dev/null
+++ b/2023/CVE-2023-43662.md
@@ -0,0 +1,17 @@
+### [CVE-2023-43662](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43662)
+
+
+&color=brighgreen)
+
+### Description
+
+ShokoServer is a media server which specializes in organizing anime. In affected versions the `/api/Image/WithPath` endpoint is accessible without authentication and is supposed to return default server images. The endpoint accepts the parameter `serverImagePath`, which is not sanitized in any way before being passed to `System.IO.File.OpenRead`, which results in an arbitrary file read. This issue may lead to an arbitrary file read which is exacerbated in the windows installer which installs the ShokoServer as administrator. Any unauthenticated attacker may be able to access sensitive information and read files stored on the server. The `/api/Image/WithPath` endpoint has been removed in commit `6c57ba0f0` which will be included in subsequent releases. Users should limit access to the `/api/Image/WithPath` endpoint or manually patch their installations until a patched release is made. This issue was discovered by the GitHub Security lab and is also indexed as GHSL-2023-191.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/wy876/POC
+
diff --git a/2023/CVE-2023-43955.md b/2023/CVE-2023-43955.md
index cf84a8909d..7deb34abaa 100644
--- a/2023/CVE-2023-43955.md
+++ b/2023/CVE-2023-43955.md
@@ -15,6 +15,7 @@ The com.phlox.tvwebbrowser TV Bro application through 2.0.0 for Android mishandl
- https://github.com/actuator/com.phlox.tvwebbrowser/blob/main/poc.apk
#### Github
+- https://github.com/actuator/com.phlox.tvwebbrowser
- https://github.com/actuator/cve
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-44313.md b/2023/CVE-2023-44313.md
new file mode 100644
index 0000000000..2cd5bd7a27
--- /dev/null
+++ b/2023/CVE-2023-44313.md
@@ -0,0 +1,17 @@
+### [CVE-2023-44313](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44313)
+
+
+&color=brighgreen)
+
+### Description
+
+Server-Side Request Forgery (SSRF) vulnerability in Apache ServiceComb Service-Center. Attackers can obtain sensitive server information through specially crafted requests.This issue affects Apache ServiceComb before 2.1.0(include).Users are recommended to upgrade to version 2.2.0, which fixes the issue.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/tanjiti/sec_profile
+
diff --git a/2023/CVE-2023-44487.md b/2023/CVE-2023-44487.md
index 113a08f1dd..1e77ac6fd0 100644
--- a/2023/CVE-2023-44487.md
+++ b/2023/CVE-2023-44487.md
@@ -45,6 +45,7 @@ The HTTP/2 protocol allows a denial of service (server resource consumption) bec
- https://www.darkreading.com/cloud/internet-wide-zero-day-bug-fuels-largest-ever-ddos-event
#### Github
+- https://github.com/0xMarcio/cve
- https://github.com/AlexRogalskiy/AlexRogalskiy
- https://github.com/Austnez/tools
- https://github.com/ByteHackr/CVE-2023-44487
@@ -84,6 +85,7 @@ The HTTP/2 protocol allows a denial of service (server resource consumption) bec
- https://github.com/lucasrod16/exploitlens
- https://github.com/m00dy/r4p1d-r3s3t
- https://github.com/malinkamedok/devops_sandbox
+- https://github.com/micrictor/http2-rst-stream
- https://github.com/ndrscodes/http2-rst-stream-attacker
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/nvdg2/http2RapidReset
diff --git a/2023/CVE-2023-4450.md b/2023/CVE-2023-4450.md
index b6e5c4f93d..7e8873e553 100644
--- a/2023/CVE-2023-4450.md
+++ b/2023/CVE-2023-4450.md
@@ -14,6 +14,7 @@ No PoCs from references.
#### Github
- https://github.com/Threekiii/Awesome-POC
+- https://github.com/bigblackhat/oFx
- https://github.com/chennbnbnb/JDoop-release
- https://github.com/hxysaury/saury-vulnhub
- https://github.com/ilikeoyt/CVE-2023-4450-Attack
diff --git a/2023/CVE-2023-4462.md b/2023/CVE-2023-4462.md
index f02d25dd2b..48b561901c 100644
--- a/2023/CVE-2023-4462.md
+++ b/2023/CVE-2023-4462.md
@@ -49,4 +49,5 @@ A vulnerability classified as problematic has been found in Poly Trio 8300, Trio
- https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices
#### Github
+- https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices
diff --git a/2023/CVE-2023-4464.md b/2023/CVE-2023-4464.md
index b59d175efc..030291981c 100644
--- a/2023/CVE-2023-4464.md
+++ b/2023/CVE-2023-4464.md
@@ -49,4 +49,5 @@ A vulnerability, which was classified as critical, has been found in Poly Trio 8
- https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices
#### Github
+- https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices
diff --git a/2023/CVE-2023-4465.md b/2023/CVE-2023-4465.md
index 2c946d15c9..4b6f198f30 100644
--- a/2023/CVE-2023-4465.md
+++ b/2023/CVE-2023-4465.md
@@ -49,4 +49,5 @@ A vulnerability, which was classified as problematic, was found in Poly Trio 830
- https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices
#### Github
+- https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices
diff --git a/2023/CVE-2023-4467.md b/2023/CVE-2023-4467.md
index ff21efffca..a2c1d62b17 100644
--- a/2023/CVE-2023-4467.md
+++ b/2023/CVE-2023-4467.md
@@ -14,4 +14,5 @@ A vulnerability was found in Poly Trio 8800 7.2.6.0019 and classified as critica
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
+- https://github.com/modzero/MZ-23-01-Poly-VoIP-Devices
diff --git a/2023/CVE-2023-44811.md b/2023/CVE-2023-44811.md
index 2d0724665a..a4c67df12b 100644
--- a/2023/CVE-2023-44811.md
+++ b/2023/CVE-2023-44811.md
@@ -13,5 +13,6 @@ Cross Site Request Forgery (CSRF) vulnerability in MooSocial v.3.1.8 allows a re
- https://github.com/ahrixia/CVE-2023-44811
#### Github
+- https://github.com/ahrixia/CVE-2023-44811
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-44812.md b/2023/CVE-2023-44812.md
index e72f2b1890..f18a86bbc6 100644
--- a/2023/CVE-2023-44812.md
+++ b/2023/CVE-2023-44812.md
@@ -13,5 +13,6 @@ Cross Site Scripting (XSS) vulnerability in mooSocial v.3.1.8 allows a remote at
- https://github.com/ahrixia/CVE-2023-44812
#### Github
+- https://github.com/ahrixia/CVE-2023-44812
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-44813.md b/2023/CVE-2023-44813.md
index abac28d4dd..376d579459 100644
--- a/2023/CVE-2023-44813.md
+++ b/2023/CVE-2023-44813.md
@@ -13,5 +13,6 @@ Cross Site Scripting (XSS) vulnerability in mooSocial v.3.1.8 allows a remote at
- https://github.com/ahrixia/CVE-2023-44813
#### Github
+- https://github.com/ahrixia/CVE-2023-44813
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-44961.md b/2023/CVE-2023-44961.md
index 669dcf2db7..253e4eb94c 100644
--- a/2023/CVE-2023-44961.md
+++ b/2023/CVE-2023-44961.md
@@ -13,5 +13,6 @@ SQL Injection vulnerability in Koha Library Software 23.0.5.04 and before allows
- https://github.com/ggb0n/CVE-2023-44961
#### Github
+- https://github.com/ggb0n/CVE-2023-44961
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-44962.md b/2023/CVE-2023-44962.md
index 8ead16aba7..d6a9e740e2 100644
--- a/2023/CVE-2023-44962.md
+++ b/2023/CVE-2023-44962.md
@@ -13,5 +13,6 @@ File Upload vulnerability in Koha Library Software 23.05.04 and before allows a
- https://github.com/ggb0n/CVE-2023-44962
#### Github
+- https://github.com/ggb0n/CVE-2023-44962
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-45205.md b/2023/CVE-2023-45205.md
index f7c688814a..afaddd5174 100644
--- a/2023/CVE-2023-45205.md
+++ b/2023/CVE-2023-45205.md
@@ -1,6 +1,6 @@
### [CVE-2023-45205](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45205)

-
+

### Description
diff --git a/2023/CVE-2023-45471.md b/2023/CVE-2023-45471.md
index 394f629ad1..2572b162aa 100644
--- a/2023/CVE-2023-45471.md
+++ b/2023/CVE-2023-45471.md
@@ -13,6 +13,7 @@ The QAD Search Server is vulnerable to Stored Cross-Site Scripting (XSS) in vers
- https://github.com/itsAptx/CVE-2023-45471
#### Github
+- https://github.com/itsAptx/CVE-2023-45471
- https://github.com/mehdibelhajamor/CVE-2023-45471
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-45542.md b/2023/CVE-2023-45542.md
index 506b14096e..91cd322700 100644
--- a/2023/CVE-2023-45542.md
+++ b/2023/CVE-2023-45542.md
@@ -13,5 +13,6 @@ Cross Site Scripting vulnerability in mooSocial 3.1.8 allows a remote attacker t
- https://github.com/ahrixia/CVE-2023-45542
#### Github
+- https://github.com/ahrixia/CVE-2023-45542
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-45674.md b/2023/CVE-2023-45674.md
new file mode 100644
index 0000000000..3a87f9baae
--- /dev/null
+++ b/2023/CVE-2023-45674.md
@@ -0,0 +1,17 @@
+### [CVE-2023-45674](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45674)
+
+
+&color=brighgreen)
+
+### Description
+
+Farmbot-Web-App is a web control interface for the Farmbot farm automation platform. An SQL injection vulnerability was found in FarmBot's web app that allows authenticated attackers to extract arbitrary data from its database (including the user table). This issue may lead to Information Disclosure. This issue has been patched in version 15.8.4. Users are advised to upgrade. There are no known workarounds for this issue.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/OrenGitHub/dhscanner
+
diff --git a/2023/CVE-2023-45802.md b/2023/CVE-2023-45802.md
index f177d8c4fd..ed4f7daa5d 100644
--- a/2023/CVE-2023-45802.md
+++ b/2023/CVE-2023-45802.md
@@ -13,6 +13,7 @@ When a HTTP/2 stream was reset (RST frame) by a client, there was a time window
No PoCs from references.
#### Github
+- https://github.com/EzeTauil/Maquina-Upload
- https://github.com/arsenalzp/apch-operator
- https://github.com/karimhabush/cyberowl
- https://github.com/xonoxitron/cpe2cve
diff --git a/2023/CVE-2023-45992.md b/2023/CVE-2023-45992.md
index 3de8bee383..4f4fc5c8f4 100644
--- a/2023/CVE-2023-45992.md
+++ b/2023/CVE-2023-45992.md
@@ -14,5 +14,6 @@ A vulnerability in the web-based interface of the RUCKUS Cloudpath product on ve
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
+- https://github.com/harry935/CVE-2023-45992
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-46014.md b/2023/CVE-2023-46014.md
index 0d627f2a0d..e45f796fbc 100644
--- a/2023/CVE-2023-46014.md
+++ b/2023/CVE-2023-46014.md
@@ -13,6 +13,7 @@ SQL Injection vulnerability in hospitalLogin.php in Code-Projects Blood Bank 1.0
- https://github.com/ersinerenler/CVE-2023-46014-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability
#### Github
+- https://github.com/ersinerenler/CVE-2023-46014-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability
- https://github.com/ersinerenler/Code-Projects-Blood-Bank-1.0
- https://github.com/esasadam06/Simple-CRUD-Functionality-SQLi-POC
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-46015.md b/2023/CVE-2023-46015.md
index 149138c635..8d5f96830e 100644
--- a/2023/CVE-2023-46015.md
+++ b/2023/CVE-2023-46015.md
@@ -13,6 +13,7 @@ Cross Site Scripting (XSS) vulnerability in index.php in Code-Projects Blood Ban
- https://github.com/ersinerenler/CVE-2023-46015-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability
#### Github
+- https://github.com/ersinerenler/CVE-2023-46015-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability
- https://github.com/ersinerenler/Code-Projects-Blood-Bank-1.0
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-46016.md b/2023/CVE-2023-46016.md
index f8a9d1c88a..9c6f03e0de 100644
--- a/2023/CVE-2023-46016.md
+++ b/2023/CVE-2023-46016.md
@@ -13,6 +13,7 @@ Cross Site Scripting (XSS) in abs.php in Code-Projects Blood Bank 1.0 allows att
- https://github.com/ersinerenler/CVE-2023-46016-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability
#### Github
+- https://github.com/ersinerenler/CVE-2023-46016-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability
- https://github.com/ersinerenler/Code-Projects-Blood-Bank-1.0
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-46017.md b/2023/CVE-2023-46017.md
index 56a3dcc152..aba14ee280 100644
--- a/2023/CVE-2023-46017.md
+++ b/2023/CVE-2023-46017.md
@@ -13,6 +13,7 @@ SQL Injection vulnerability in receiverLogin.php in Code-Projects Blood Bank 1.0
- https://github.com/ersinerenler/CVE-2023-46017-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability
#### Github
+- https://github.com/ersinerenler/CVE-2023-46017-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability
- https://github.com/ersinerenler/Code-Projects-Blood-Bank-1.0
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-46018.md b/2023/CVE-2023-46018.md
index ba28a29d44..67428a7cc0 100644
--- a/2023/CVE-2023-46018.md
+++ b/2023/CVE-2023-46018.md
@@ -13,6 +13,7 @@ SQL injection vulnerability in receiverReg.php in Code-Projects Blood Bank 1.0 \
- https://github.com/ersinerenler/CVE-2023-46018-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability
#### Github
+- https://github.com/ersinerenler/CVE-2023-46018-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability
- https://github.com/ersinerenler/Code-Projects-Blood-Bank-1.0
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-46019.md b/2023/CVE-2023-46019.md
index 5434ef7792..d97d23c39d 100644
--- a/2023/CVE-2023-46019.md
+++ b/2023/CVE-2023-46019.md
@@ -13,6 +13,7 @@ Cross Site Scripting (XSS) vulnerability in abs.php in Code-Projects Blood Bank
- https://github.com/ersinerenler/CVE-2023-46019-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability
#### Github
+- https://github.com/ersinerenler/CVE-2023-46019-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability
- https://github.com/ersinerenler/Code-Projects-Blood-Bank-1.0
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-46020.md b/2023/CVE-2023-46020.md
index eda46ed760..aaaeb03ac6 100644
--- a/2023/CVE-2023-46020.md
+++ b/2023/CVE-2023-46020.md
@@ -13,6 +13,7 @@ Cross Site Scripting (XSS) in updateprofile.php in Code-Projects Blood Bank 1.0
- https://github.com/ersinerenler/CVE-2023-46020-Code-Projects-Blood-Bank-1.0-Stored-Cross-Site-Scripting-Vulnerability
#### Github
+- https://github.com/ersinerenler/CVE-2023-46020-Code-Projects-Blood-Bank-1.0-Stored-Cross-Site-Scripting-Vulnerability
- https://github.com/ersinerenler/Code-Projects-Blood-Bank-1.0
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-46021.md b/2023/CVE-2023-46021.md
index 04a2df885b..b7a1286305 100644
--- a/2023/CVE-2023-46021.md
+++ b/2023/CVE-2023-46021.md
@@ -13,6 +13,7 @@ SQL Injection vulnerability in cancel.php in Code-Projects Blood Bank 1.0 allows
- https://github.com/ersinerenler/CVE-2023-46021-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability
#### Github
+- https://github.com/ersinerenler/CVE-2023-46021-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability
- https://github.com/ersinerenler/Code-Projects-Blood-Bank-1.0
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-46022.md b/2023/CVE-2023-46022.md
index 231ed7e7ce..b855eb4224 100644
--- a/2023/CVE-2023-46022.md
+++ b/2023/CVE-2023-46022.md
@@ -13,6 +13,7 @@ SQL Injection vulnerability in delete.php in Code-Projects Blood Bank 1.0 allows
- https://github.com/ersinerenler/CVE-2023-46022-Code-Projects-Blood-Bank-1.0-OOB-SQL-Injection-Vulnerability
#### Github
+- https://github.com/ersinerenler/CVE-2023-46022-Code-Projects-Blood-Bank-1.0-OOB-SQL-Injection-Vulnerability
- https://github.com/ersinerenler/Code-Projects-Blood-Bank-1.0
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-46404.md b/2023/CVE-2023-46404.md
index 9a5128beb0..d6988e03c1 100644
--- a/2023/CVE-2023-46404.md
+++ b/2023/CVE-2023-46404.md
@@ -14,4 +14,5 @@ PCRS <= 3.11 (d0de1e) “Questions” page and “Code editor” page are vulner
#### Github
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/windecks/CVE-2023-46404
diff --git a/2023/CVE-2023-46451.md b/2023/CVE-2023-46451.md
index 6a03e6105a..1df7d00013 100644
--- a/2023/CVE-2023-46451.md
+++ b/2023/CVE-2023-46451.md
@@ -15,4 +15,5 @@ Best Courier Management System v1.0 is vulnerable to Cross Site Scripting (XSS)
#### Github
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/sajaljat/CVE-2023-46451
diff --git a/2023/CVE-2023-46480.md b/2023/CVE-2023-46480.md
index 9bc11a4c78..9cfbd4b730 100644
--- a/2023/CVE-2023-46480.md
+++ b/2023/CVE-2023-46480.md
@@ -14,4 +14,5 @@ An issue in OwnCast v.0.1.1 allows a remote attacker to execute arbitrary code a
#### Github
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/shahzaibak96/CVE-2023-46480
diff --git a/2023/CVE-2023-46694.md b/2023/CVE-2023-46694.md
index 84432f9a51..7cbdc452de 100644
--- a/2023/CVE-2023-46694.md
+++ b/2023/CVE-2023-46694.md
@@ -13,4 +13,5 @@ Vtenext 21.02 allows an authenticated attacker to upload arbitrary files, potent
- https://github.com/invisiblebyte/CVE-2023-46694
#### Github
+- https://github.com/invisiblebyte/CVE-2023-46694
diff --git a/2023/CVE-2023-46747.md b/2023/CVE-2023-46747.md
index 63e48a5b35..8ba473a12e 100644
--- a/2023/CVE-2023-46747.md
+++ b/2023/CVE-2023-46747.md
@@ -13,6 +13,7 @@ Undisclosed requests may bypass configuration utility authentication, allowing a
- http://packetstormsecurity.com/files/175673/F5-BIG-IP-TMUI-AJP-Smuggling-Remote-Command-Execution.html
#### Github
+- https://github.com/0xMarcio/cve
- https://github.com/AliBrTab/CVE-2023-46747-POC
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
diff --git a/2023/CVE-2023-46865.md b/2023/CVE-2023-46865.md
index 08036db584..8bb60ab7b0 100644
--- a/2023/CVE-2023-46865.md
+++ b/2023/CVE-2023-46865.md
@@ -15,6 +15,7 @@
- https://notes.netbytesec.com/2023/11/post-auth-rce-in-crater-invoice.html
#### Github
+- https://github.com/asylumdx/Crater-CVE-2023-46865-RCE
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-48078.md b/2023/CVE-2023-48078.md
index 0a3540a0aa..1b5888e613 100644
--- a/2023/CVE-2023-48078.md
+++ b/2023/CVE-2023-48078.md
@@ -13,4 +13,5 @@ SQL Injection vulnerability in add.php in Simple CRUD Functionality v1.0 allows
- https://github.com/esasadam06/Simple-CRUD-Functionality-SQLi-POC
#### Github
+- https://github.com/esasadam06/Simple-CRUD-Functionality-SQLi-POC
diff --git a/2023/CVE-2023-48104.md b/2023/CVE-2023-48104.md
index 04e10224f6..83058ad40a 100644
--- a/2023/CVE-2023-48104.md
+++ b/2023/CVE-2023-48104.md
@@ -14,5 +14,6 @@ Alinto SOGo before 5.9.1 is vulnerable to HTML Injection.
- https://habr.com/ru/articles/804863/
#### Github
+- https://github.com/E1tex/CVE-2023-48104
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-48193.md b/2023/CVE-2023-48193.md
index 44f018cfc6..e372e513ac 100644
--- a/2023/CVE-2023-48193.md
+++ b/2023/CVE-2023-48193.md
@@ -5,7 +5,7 @@
### Description
-Insecure Permissions vulnerability in JumpServer GPLv3 v.3.8.0 allows a remote attacker to execute arbitrary code via bypassing the command filtering function.
+** DISPUTED ** Insecure Permissions vulnerability in JumpServer GPLv3 v.3.8.0 allows a remote attacker to execute arbitrary code via bypassing the command filtering function. NOTE: this is disputed because command filtering is not intended to restrict what code can be run by authorized users who are allowed to execute files.
### POC
diff --git a/2023/CVE-2023-48849.md b/2023/CVE-2023-48849.md
index 823cc14c9d..baa5142096 100644
--- a/2023/CVE-2023-48849.md
+++ b/2023/CVE-2023-48849.md
@@ -13,5 +13,6 @@ Ruijie EG Series Routers version EG_3.0(1)B11P216 and before allows unauthentica
- https://github.com/delsploit/CVE-2023-48849
#### Github
+- https://github.com/delsploit/CVE-2023-48849
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-48858.md b/2023/CVE-2023-48858.md
index 943148ee4b..f1e844dc8c 100644
--- a/2023/CVE-2023-48858.md
+++ b/2023/CVE-2023-48858.md
@@ -13,5 +13,6 @@ A Cross-site scripting (XSS) vulnerability in login page php code in Armex ABO.C
- https://github.com/Shumerez/CVE-2023-48858
#### Github
+- https://github.com/Shumerez/CVE-2023-48858
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-49052.md b/2023/CVE-2023-49052.md
index 98c51d2eae..a9d5ae82e4 100644
--- a/2023/CVE-2023-49052.md
+++ b/2023/CVE-2023-49052.md
@@ -14,5 +14,6 @@ File Upload vulnerability in Microweber v.2.0.4 allows a remote attacker to exec
- https://github.com/Cyber-Wo0dy/report/blob/main/microweber/v2.0.4/microweber_unrestricted_upload
#### Github
+- https://github.com/Cyber-Wo0dy/CVE-2023-49052
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2023/CVE-2023-49110.md b/2023/CVE-2023-49110.md
new file mode 100644
index 0000000000..03b7b76946
--- /dev/null
+++ b/2023/CVE-2023-49110.md
@@ -0,0 +1,17 @@
+### [CVE-2023-49110](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49110)
+
+
+
+
+### Description
+
+When the Kiuwan Local Analyzer uploads the scan results to the Kiuwan SAST web application (either on-premises or cloud/SaaS solution), the transmitted data consists of a ZIP archive containing several files, some of them in the XML file format. During Kiuwan's server-side processing of these XML files, it resolves external XML entities, resulting in a XML external entity injection attack. An attacker with privileges to scan source code within the "Code Security" module is able to extract any files of the operating system with the rights of the application server user and is potentially able to gain sensitive files, such as configuration and passwords. Furthermore, this vulnerability also allows an attacker to initiate connections to internal systems, e.g. for port scans or accessing other internal functions / applications such as the Wildfly admin console of Kiuwan.This issue affects Kiuwan SAST: = V3.2.3 < V3.3.0 only when manufactured between LQN231003... and LQN231215... ( with LQNYYMMDD...)), SENTRON 7KM PAC3120 DC (7KM3120-1BA01-1EA0) (All versions >= V3.2.3 < V3.3.0 only when manufactured between LQN231003... and LQN231215... ( with LQNYYMMDD...)), SENTRON 7KM PAC3220 AC/DC (7KM3220-0BA01-1DA0) (All versions >= V3.2.3 < V3.3.0 only when manufactured between LQN231003... and LQN231215... ( with LQNYYMMDD...)), SENTRON 7KM PAC3220 DC (7KM3220-1BA01-1EA0) (All versions >= V3.2.3 < V3.3.0 only when manufactured between LQN231003... and LQN231215... ( with LQNYYMMDD...)). The read out protection of the internal flash of affected devices was not properly set at the end of the manufacturing process.
-
-An attacker with physical access to the device could read out the data.
+A vulnerability has been identified in SENTRON 7KM PAC3120 AC/DC (7KM3120-0BA01-1DA0) (All versions >= V3.2.3 < V3.3.0 only when manufactured between LQN231003... and LQN231215... ( with LQNYYMMDD...)), SENTRON 7KM PAC3120 DC (7KM3120-1BA01-1EA0) (All versions >= V3.2.3 < V3.3.0 only when manufactured between LQN231003... and LQN231215... ( with LQNYYMMDD...)), SENTRON 7KM PAC3220 AC/DC (7KM3220-0BA01-1DA0) (All versions >= V3.2.3 < V3.3.0 only when manufactured between LQN231003... and LQN231215... ( with LQNYYMMDD...)), SENTRON 7KM PAC3220 DC (7KM3220-1BA01-1EA0) (All versions >= V3.2.3 < V3.3.0 only when manufactured between LQN231003... and LQN231215... ( with LQNYYMMDD...)). The read out protection of the internal flash of affected devices was not properly set at the end of the manufacturing process.
An attacker with physical access to the device could read out the data.
### POC
diff --git a/2024/CVE-2024-21484.md b/2024/CVE-2024-21484.md
index f02c68c393..3fa96105c4 100644
--- a/2024/CVE-2024-21484.md
+++ b/2024/CVE-2024-21484.md
@@ -9,11 +9,7 @@
### Description
-Versions of the package jsrsasign before 11.0.0 are vulnerable to Observable Discrepancy via the RSA PKCS1.5 or RSAOAEP decryption process. An attacker can decrypt ciphertexts by exploiting the Marvin security flaw. Exploiting this vulnerability requires the attacker to have access to a large number of ciphertexts encrypted with the same key.
-
- Workaround
-
-The vulnerability can be mitigated by finding and replacing RSA and RSAOAEP decryption with another crypto library.
+Versions of the package jsrsasign before 11.0.0 are vulnerable to Observable Discrepancy via the RSA PKCS1.5 or RSAOAEP decryption process. An attacker can decrypt ciphertexts by exploiting the Marvin security flaw. Exploiting this vulnerability requires the attacker to have access to a large number of ciphertexts encrypted with the same key.
Workaround
The vulnerability can be mitigated by finding and replacing RSA and RSAOAEP decryption with another crypto library.
### POC
diff --git a/2024/CVE-2024-21485.md b/2024/CVE-2024-21485.md
index cd4ec60279..9b65faa5e8 100644
--- a/2024/CVE-2024-21485.md
+++ b/2024/CVE-2024-21485.md
@@ -9,11 +9,7 @@
### Description
-Versions of the package dash-core-components before 2.13.0; versions of the package dash-core-components before 2.0.0; versions of the package dash before 2.15.0; versions of the package dash-html-components before 2.0.0; versions of the package dash-html-components before 2.0.16 are vulnerable to Cross-site Scripting (XSS) when the href of the a tag is controlled by an adversary. An authenticated attacker who stores a view that exploits this vulnerability could steal the data that's visible to another user who opens that view - not just the data already included on the page, but they could also, in theory, make additional requests and access other data accessible to this user. In some cases, they could also steal the access tokens of that user, which would allow the attacker to act as that user, including viewing other apps and resources hosted on the same server.
-
-**Note:**
-
-This is only exploitable in Dash apps that include some mechanism to store user input to be reloaded by a different user.
+Versions of the package dash-core-components before 2.13.0; versions of the package dash-core-components before 2.0.0; versions of the package dash before 2.15.0; versions of the package dash-html-components before 2.0.0; versions of the package dash-html-components before 2.0.16 are vulnerable to Cross-site Scripting (XSS) when the href of the a tag is controlled by an adversary. An authenticated attacker who stores a view that exploits this vulnerability could steal the data that's visible to another user who opens that view - not just the data already included on the page, but they could also, in theory, make additional requests and access other data accessible to this user. In some cases, they could also steal the access tokens of that user, which would allow the attacker to act as that user, including viewing other apps and resources hosted on the same server.
**Note:**
This is only exploitable in Dash apps that include some mechanism to store user input to be reloaded by a different user.
### POC
diff --git a/2024/CVE-2024-21490.md b/2024/CVE-2024-21490.md
index f1ca5adff5..317fd98159 100644
--- a/2024/CVE-2024-21490.md
+++ b/2024/CVE-2024-21490.md
@@ -7,12 +7,7 @@
### Description
-This affects versions of the package angular from 1.3.0. A regular expression used to split the value of the ng-srcset directive is vulnerable to super-linear runtime due to backtracking. With large carefully-crafted input, this can result in catastrophic backtracking and cause a denial of service.
-
-
-**Note:**
-
-This package is EOL and will not receive any updates to address this issue. Users should migrate to [@angular/core](https://www.npmjs.com/package/@angular/core).
+This affects versions of the package angular from 1.3.0. A regular expression used to split the value of the ng-srcset directive is vulnerable to super-linear runtime due to backtracking. With large carefully-crafted input, this can result in catastrophic backtracking and cause a denial of service.
**Note:**
This package is EOL and will not receive any updates to address this issue. Users should migrate to [@angular/core](https://www.npmjs.com/package/@angular/core).
### POC
diff --git a/2024/CVE-2024-21491.md b/2024/CVE-2024-21491.md
index c3b34a3c65..39a227ac25 100644
--- a/2024/CVE-2024-21491.md
+++ b/2024/CVE-2024-21491.md
@@ -5,11 +5,7 @@
### Description
-Versions of the package svix before 1.17.0 are vulnerable to Authentication Bypass due to an issue in the verify function where signatures of different lengths are incorrectly compared. An attacker can bypass signature verification by providing a shorter signature that matches the beginning of the actual signature.
-
-**Note:**
-
-The attacker would need to know a victim uses the Rust library for verification,no easy way to automatically check that; and uses webhooks by a service that uses Svix, and then figure out a way to craft a malicious payload that will actually include all of the correct identifiers needed to trick the receivers to cause actual issues.
+Versions of the package svix before 1.17.0 are vulnerable to Authentication Bypass due to an issue in the verify function where signatures of different lengths are incorrectly compared. An attacker can bypass signature verification by providing a shorter signature that matches the beginning of the actual signature.
**Note:**
The attacker would need to know a victim uses the Rust library for verification,no easy way to automatically check that; and uses webhooks by a service that uses Svix, and then figure out a way to craft a malicious payload that will actually include all of the correct identifiers needed to trick the receivers to cause actual issues.
### POC
diff --git a/2024/CVE-2024-21503.md b/2024/CVE-2024-21503.md
index 92d42803c3..07e8c2c20b 100644
--- a/2024/CVE-2024-21503.md
+++ b/2024/CVE-2024-21503.md
@@ -5,9 +5,7 @@
### Description
-Versions of the package black before 24.3.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the lines_with_leading_tabs_expanded function in the strings.py file. An attacker could exploit this vulnerability by crafting a malicious input that causes a denial of service.
-
-Exploiting this vulnerability is possible when running Black on untrusted input, or if you habitually put thousands of leading tab characters in your docstrings.
+Versions of the package black before 24.3.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the lines_with_leading_tabs_expanded function in the strings.py file. An attacker could exploit this vulnerability by crafting a malicious input that causes a denial of service.
Exploiting this vulnerability is possible when running Black on untrusted input, or if you habitually put thousands of leading tab characters in your docstrings.
### POC
diff --git a/2024/CVE-2024-21505.md b/2024/CVE-2024-21505.md
index 3fc5117d1f..be237606d0 100644
--- a/2024/CVE-2024-21505.md
+++ b/2024/CVE-2024-21505.md
@@ -5,8 +5,7 @@
### Description
-Versions of the package web3-utils before 4.2.1 are vulnerable to Prototype Pollution via the utility functions format and mergeDeep, due to insecure recursive merge.
-An attacker can manipulate an object's prototype, potentially leading to the alteration of the behavior of all objects inheriting from the affected prototype by passing specially crafted input to these functions.
+Versions of the package web3-utils before 4.2.1 are vulnerable to Prototype Pollution via the utility functions format and mergeDeep, due to insecure recursive merge.
An attacker can manipulate an object's prototype, potentially leading to the alteration of the behavior of all objects inheriting from the affected prototype by passing specially crafted input to these functions.
### POC
diff --git a/2024/CVE-2024-21677.md b/2024/CVE-2024-21677.md
index 33d2583ba9..88ae3466fa 100644
--- a/2024/CVE-2024-21677.md
+++ b/2024/CVE-2024-21677.md
@@ -14,6 +14,7 @@ No PoCs from references.
#### Github
- https://github.com/NaInSec/CVE-LIST
+- https://github.com/enomothem/PenTestNote
- https://github.com/netlas-io/netlas-dorks
- https://github.com/tanjiti/sec_profile
diff --git a/2024/CVE-2024-21683.md b/2024/CVE-2024-21683.md
index d01ef1d9eb..f82503542e 100644
--- a/2024/CVE-2024-21683.md
+++ b/2024/CVE-2024-21683.md
@@ -5,7 +5,7 @@
### Description
-This High severity RCE (Remote Code Execution) vulnerability was introduced in version 5.2 of Confluence Data Center and Server.This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 8.3, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires no user interaction. Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version. If you are unable to do so, upgrade your instance to one of the specified supported fixed versions. See the release notes https://confluence.atlassian.com/doc/confluence-release-notes-327.htmlYou can download the latest version of Confluence Data Center and Server from the download center https://www.atlassian.com/software/confluence/download-archives.This vulnerability was found internally.
+This High severity RCE (Remote Code Execution) vulnerability was introduced in version 5.2 of Confluence Data Center and Server.This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.2, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires no user interaction. Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version. If you are unable to do so, upgrade your instance to one of the specified supported fixed versions. See the release notes https://confluence.atlassian.com/doc/confluence-release-notes-327.htmlYou can download the latest version of Confluence Data Center and Server from the download center https://www.atlassian.com/software/confluence/download-archives.This vulnerability was found internally.
### POC
@@ -21,6 +21,7 @@ No PoCs from references.
- https://github.com/ZonghaoLi777/githubTrending
- https://github.com/absholi7ly/-CVE-2024-21683-RCE-in-Confluence-Data-Center-and-Server
- https://github.com/aneasystone/github-trending
+- https://github.com/enomothem/PenTestNote
- https://github.com/fireinrain/github-trending
- https://github.com/jafshare/GithubTrending
- https://github.com/johe123qwe/github-trending
diff --git a/2024/CVE-2024-21733.md b/2024/CVE-2024-21733.md
index 3780fd7adb..08ddba969e 100644
--- a/2024/CVE-2024-21733.md
+++ b/2024/CVE-2024-21733.md
@@ -17,6 +17,7 @@ Generation of Error Message Containing Sensitive Information vulnerability in Ap
- https://github.com/Marco-zcl/POC
- https://github.com/Ostorlab/KEV
- https://github.com/fkie-cad/nvd-json-data-feeds
+- https://github.com/versio-io/product-lifecycle-security-api
- https://github.com/wjlin0/poc-doc
- https://github.com/wy876/POC
diff --git a/2024/CVE-2024-21751.md b/2024/CVE-2024-21751.md
new file mode 100644
index 0000000000..a5c597c6a7
--- /dev/null
+++ b/2024/CVE-2024-21751.md
@@ -0,0 +1,17 @@
+### [CVE-2024-21751](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21751)
+
+
+
+
+### Description
+
+Missing Authorization vulnerability in RabbitLoader.This issue affects RabbitLoader: from n/a through 2.19.13.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/fkie-cad/nvd-json-data-feeds
+
diff --git a/2024/CVE-2024-21798.md b/2024/CVE-2024-21798.md
index e1c9c7e627..0aac23f476 100644
--- a/2024/CVE-2024-21798.md
+++ b/2024/CVE-2024-21798.md
@@ -1,4 +1,5 @@
### [CVE-2024-21798](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21798)
+



@@ -8,13 +9,14 @@



+


&color=brighgreen)
### Description
-ELECOM wireless LAN routers contain a cross-site scripting vulnerability. Assume that a malicious administrative user configures the affected product with specially crafted content. When another administrative user logs in and operates the product, an arbitrary script may be executed on the web browser. Affected products and versions are as follows: WRC-1167GS2-B v1.67 and earlier, WRC-1167GS2H-B v1.67 and earlier, WRC-2533GS2-B v1.62 and earlier, WRC-2533GS2-W v1.62 and earlier, WRC-2533GS2V-B v1.62 and earlier, WRC-X3200GST3-B v1.25 and earlier, and WRC-G01-W v1.24 and earlier.
+ELECOM wireless LAN routers contain a cross-site scripting vulnerability. Assume that a malicious administrative user configures the affected product with specially crafted content. When another administrative user logs in and operates the product, an arbitrary script may be executed on the web browser. Note that WMC-X1800GST-B is also included in e-Mesh Starter Kit "WMC-2LX-B".
### POC
diff --git a/2024/CVE-2024-2193.md b/2024/CVE-2024-2193.md
index 86dbe35439..852edd609a 100644
--- a/2024/CVE-2024-2193.md
+++ b/2024/CVE-2024-2193.md
@@ -16,6 +16,7 @@ A Speculative Race Condition (SRC) vulnerability that impacts modern CPU archite
#### Github
- https://github.com/NaInSec/CVE-LIST
+- https://github.com/codexlynx/hardware-attacks-state-of-the-art
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/uthrasri/CVE-2024-2193
diff --git a/2024/CVE-2024-22002.md b/2024/CVE-2024-22002.md
new file mode 100644
index 0000000000..b467f6fa7b
--- /dev/null
+++ b/2024/CVE-2024-22002.md
@@ -0,0 +1,18 @@
+### [CVE-2024-22002](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22002)
+
+
+
+
+### Description
+
+CORSAIR iCUE 5.9.105 with iCUE Murals on Windows allows unprivileged users to insert DLL files in the cuepkg-1.2.6 subdirectory of the installation directory.
+
+### POC
+
+#### Reference
+- https://github.com/0xkickit/iCUE_DllHijack_LPE-CVE-2024-22002
+
+#### Github
+- https://github.com/0xkickit/iCUE_DllHijack_LPE-CVE-2024-22002
+- https://github.com/nomi-sec/PoC-in-GitHub
+
diff --git a/2024/CVE-2024-22039.md b/2024/CVE-2024-22039.md
index 04ffb7ef37..71771a0385 100644
--- a/2024/CVE-2024-22039.md
+++ b/2024/CVE-2024-22039.md
@@ -37,8 +37,7 @@
### Description
-A vulnerability has been identified in Cerberus PRO EN Engineering Tool (All versions < IP8), Cerberus PRO EN Fire Panel FC72x IP6 (All versions < IP6 SR3), Cerberus PRO EN Fire Panel FC72x IP7 (All versions < IP7 SR5), Cerberus PRO EN X200 Cloud Distribution IP7 (All versions < V3.0.6602), Cerberus PRO EN X200 Cloud Distribution IP8 (All versions < V4.0.5016), Cerberus PRO EN X300 Cloud Distribution IP7 (All versions < V3.2.6601), Cerberus PRO EN X300 Cloud Distribution IP8 (All versions < V4.2.5015), Cerberus PRO UL Compact Panel FC922/924 (All versions < MP4), Cerberus PRO UL Engineering Tool (All versions < MP4), Cerberus PRO UL X300 Cloud Distribution (All versions < V4.3.0001), Desigo Fire Safety UL Compact Panel FC2025/2050 (All versions < MP4), Desigo Fire Safety UL Engineering Tool (All versions < MP4), Desigo Fire Safety UL X300 Cloud Distribution (All versions < V4.3.0001), Sinteso FS20 EN Engineering Tool (All versions < MP8), Sinteso FS20 EN Fire Panel FC20 MP6 (All versions < MP6 SR3), Sinteso FS20 EN Fire Panel FC20 MP7 (All versions < MP7 SR5), Sinteso FS20 EN X200 Cloud Distribution MP7 (All versions < V3.0.6602), Sinteso FS20 EN X200 Cloud Distribution MP8 (All versions < V4.0.5016), Sinteso FS20 EN X300 Cloud Distribution MP7 (All versions < V3.2.6601), Sinteso FS20 EN X300 Cloud Distribution MP8 (All versions < V4.2.5015), Sinteso Mobile (All versions < V3.0.0). The network communication library in affected systems does not validate the length of certain X.509 certificate attributes which might result in a stack-based buffer overflow.
-This could allow an unauthenticated remote attacker to execute code on the underlying operating system with root privileges.
+A vulnerability has been identified in Cerberus PRO EN Engineering Tool (All versions < IP8), Cerberus PRO EN Fire Panel FC72x IP6 (All versions < IP6 SR3), Cerberus PRO EN Fire Panel FC72x IP7 (All versions < IP7 SR5), Cerberus PRO EN X200 Cloud Distribution IP7 (All versions < V3.0.6602), Cerberus PRO EN X200 Cloud Distribution IP8 (All versions < V4.0.5016), Cerberus PRO EN X300 Cloud Distribution IP7 (All versions < V3.2.6601), Cerberus PRO EN X300 Cloud Distribution IP8 (All versions < V4.2.5015), Cerberus PRO UL Compact Panel FC922/924 (All versions < MP4), Cerberus PRO UL Engineering Tool (All versions < MP4), Cerberus PRO UL X300 Cloud Distribution (All versions < V4.3.0001), Desigo Fire Safety UL Compact Panel FC2025/2050 (All versions < MP4), Desigo Fire Safety UL Engineering Tool (All versions < MP4), Desigo Fire Safety UL X300 Cloud Distribution (All versions < V4.3.0001), Sinteso FS20 EN Engineering Tool (All versions < MP8), Sinteso FS20 EN Fire Panel FC20 MP6 (All versions < MP6 SR3), Sinteso FS20 EN Fire Panel FC20 MP7 (All versions < MP7 SR5), Sinteso FS20 EN X200 Cloud Distribution MP7 (All versions < V3.0.6602), Sinteso FS20 EN X200 Cloud Distribution MP8 (All versions < V4.0.5016), Sinteso FS20 EN X300 Cloud Distribution MP7 (All versions < V3.2.6601), Sinteso FS20 EN X300 Cloud Distribution MP8 (All versions < V4.2.5015), Sinteso Mobile (All versions < V3.0.0). The network communication library in affected systems does not validate the length of certain X.509 certificate attributes which might result in a stack-based buffer overflow.
This could allow an unauthenticated remote attacker to execute code on the underlying operating system with root privileges.
### POC
diff --git a/2024/CVE-2024-22040.md b/2024/CVE-2024-22040.md
index fd024cbedd..ac5f425f03 100644
--- a/2024/CVE-2024-22040.md
+++ b/2024/CVE-2024-22040.md
@@ -33,8 +33,7 @@
### Description
-A vulnerability has been identified in Cerberus PRO EN Engineering Tool (All versions), Cerberus PRO EN Fire Panel FC72x IP6 (All versions), Cerberus PRO EN Fire Panel FC72x IP7 (All versions), Cerberus PRO EN Fire Panel FC72x IP8 (All versions < IP8 SR4), Cerberus PRO EN X200 Cloud Distribution IP7 (All versions), Cerberus PRO EN X200 Cloud Distribution IP8 (All versions < V4.3.5618), Cerberus PRO EN X300 Cloud Distribution IP7 (All versions), Cerberus PRO EN X300 Cloud Distribution IP8 (All versions < V4.3.5617), Cerberus PRO UL Compact Panel FC922/924 (All versions < MP4), Cerberus PRO UL Engineering Tool (All versions < MP4), Cerberus PRO UL X300 Cloud Distribution (All versions < V4.3.0001), Desigo Fire Safety UL Compact Panel FC2025/2050 (All versions < MP4), Desigo Fire Safety UL Engineering Tool (All versions < MP4), Desigo Fire Safety UL X300 Cloud Distribution (All versions < V4.3.0001), Sinteso FS20 EN Engineering Tool (All versions), Sinteso FS20 EN Fire Panel FC20 MP6 (All versions), Sinteso FS20 EN Fire Panel FC20 MP7 (All versions), Sinteso FS20 EN Fire Panel FC20 MP8 (All versions < MP8 SR4), Sinteso FS20 EN X200 Cloud Distribution MP7 (All versions), Sinteso FS20 EN X200 Cloud Distribution MP8 (All versions < V4.3.5618), Sinteso FS20 EN X300 Cloud Distribution MP7 (All versions), Sinteso FS20 EN X300 Cloud Distribution MP8 (All versions < V4.3.5617), Sinteso Mobile (All versions). The network communication library in affected systems insufficiently validates HMAC values which might result in a buffer overread.
-This could allow an unauthenticated remote attacker to crash the network service.
+A vulnerability has been identified in Cerberus PRO EN Engineering Tool (All versions), Cerberus PRO EN Fire Panel FC72x IP6 (All versions), Cerberus PRO EN Fire Panel FC72x IP7 (All versions), Cerberus PRO EN Fire Panel FC72x IP8 (All versions < IP8 SR4), Cerberus PRO EN X200 Cloud Distribution IP7 (All versions), Cerberus PRO EN X200 Cloud Distribution IP8 (All versions < V4.3.5618), Cerberus PRO EN X300 Cloud Distribution IP7 (All versions), Cerberus PRO EN X300 Cloud Distribution IP8 (All versions < V4.3.5617), Cerberus PRO UL Compact Panel FC922/924 (All versions < MP4), Cerberus PRO UL Engineering Tool (All versions < MP4), Cerberus PRO UL X300 Cloud Distribution (All versions < V4.3.0001), Desigo Fire Safety UL Compact Panel FC2025/2050 (All versions < MP4), Desigo Fire Safety UL Engineering Tool (All versions < MP4), Desigo Fire Safety UL X300 Cloud Distribution (All versions < V4.3.0001), Sinteso FS20 EN Engineering Tool (All versions), Sinteso FS20 EN Fire Panel FC20 MP6 (All versions), Sinteso FS20 EN Fire Panel FC20 MP7 (All versions), Sinteso FS20 EN Fire Panel FC20 MP8 (All versions < MP8 SR4), Sinteso FS20 EN X200 Cloud Distribution MP7 (All versions), Sinteso FS20 EN X200 Cloud Distribution MP8 (All versions < V4.3.5618), Sinteso FS20 EN X300 Cloud Distribution MP7 (All versions), Sinteso FS20 EN X300 Cloud Distribution MP8 (All versions < V4.3.5617), Sinteso Mobile (All versions). The network communication library in affected systems insufficiently validates HMAC values which might result in a buffer overread.
This could allow an unauthenticated remote attacker to crash the network service.
### POC
diff --git a/2024/CVE-2024-22041.md b/2024/CVE-2024-22041.md
index 7472f77962..8f25ddab2b 100644
--- a/2024/CVE-2024-22041.md
+++ b/2024/CVE-2024-22041.md
@@ -33,8 +33,7 @@
### Description
-A vulnerability has been identified in Cerberus PRO EN Engineering Tool (All versions), Cerberus PRO EN Fire Panel FC72x IP6 (All versions), Cerberus PRO EN Fire Panel FC72x IP7 (All versions), Cerberus PRO EN Fire Panel FC72x IP8 (All versions < IP8 SR4), Cerberus PRO EN X200 Cloud Distribution IP7 (All versions), Cerberus PRO EN X200 Cloud Distribution IP8 (All versions < V4.3.5618), Cerberus PRO EN X300 Cloud Distribution IP7 (All versions), Cerberus PRO EN X300 Cloud Distribution IP8 (All versions < V4.3.5617), Cerberus PRO UL Compact Panel FC922/924 (All versions < MP4), Cerberus PRO UL Engineering Tool (All versions < MP4), Cerberus PRO UL X300 Cloud Distribution (All versions < V4.3.0001), Desigo Fire Safety UL Compact Panel FC2025/2050 (All versions < MP4), Desigo Fire Safety UL Engineering Tool (All versions < MP4), Desigo Fire Safety UL X300 Cloud Distribution (All versions < V4.3.0001), Sinteso FS20 EN Engineering Tool (All versions), Sinteso FS20 EN Fire Panel FC20 MP6 (All versions), Sinteso FS20 EN Fire Panel FC20 MP7 (All versions), Sinteso FS20 EN Fire Panel FC20 MP8 (All versions < MP8 SR4), Sinteso FS20 EN X200 Cloud Distribution MP7 (All versions), Sinteso FS20 EN X200 Cloud Distribution MP8 (All versions < V4.3.5618), Sinteso FS20 EN X300 Cloud Distribution MP7 (All versions), Sinteso FS20 EN X300 Cloud Distribution MP8 (All versions < V4.3.5617), Sinteso Mobile (All versions). The network communication library in affected systems improperly handles memory buffers when parsing X.509 certificates.
-This could allow an unauthenticated remote attacker to crash the network service.
+A vulnerability has been identified in Cerberus PRO EN Engineering Tool (All versions), Cerberus PRO EN Fire Panel FC72x IP6 (All versions), Cerberus PRO EN Fire Panel FC72x IP7 (All versions), Cerberus PRO EN Fire Panel FC72x IP8 (All versions < IP8 SR4), Cerberus PRO EN X200 Cloud Distribution IP7 (All versions), Cerberus PRO EN X200 Cloud Distribution IP8 (All versions < V4.3.5618), Cerberus PRO EN X300 Cloud Distribution IP7 (All versions), Cerberus PRO EN X300 Cloud Distribution IP8 (All versions < V4.3.5617), Cerberus PRO UL Compact Panel FC922/924 (All versions < MP4), Cerberus PRO UL Engineering Tool (All versions < MP4), Cerberus PRO UL X300 Cloud Distribution (All versions < V4.3.0001), Desigo Fire Safety UL Compact Panel FC2025/2050 (All versions < MP4), Desigo Fire Safety UL Engineering Tool (All versions < MP4), Desigo Fire Safety UL X300 Cloud Distribution (All versions < V4.3.0001), Sinteso FS20 EN Engineering Tool (All versions), Sinteso FS20 EN Fire Panel FC20 MP6 (All versions), Sinteso FS20 EN Fire Panel FC20 MP7 (All versions), Sinteso FS20 EN Fire Panel FC20 MP8 (All versions < MP8 SR4), Sinteso FS20 EN X200 Cloud Distribution MP7 (All versions), Sinteso FS20 EN X200 Cloud Distribution MP8 (All versions < V4.3.5618), Sinteso FS20 EN X300 Cloud Distribution MP7 (All versions), Sinteso FS20 EN X300 Cloud Distribution MP8 (All versions < V4.3.5617), Sinteso Mobile (All versions). The network communication library in affected systems improperly handles memory buffers when parsing X.509 certificates.
This could allow an unauthenticated remote attacker to crash the network service.
### POC
diff --git a/2024/CVE-2024-22120.md b/2024/CVE-2024-22120.md
index 81e7730cfe..8cfd0b32b6 100644
--- a/2024/CVE-2024-22120.md
+++ b/2024/CVE-2024-22120.md
@@ -19,6 +19,7 @@ Zabbix server can perform command execution for configured scripts. After comman
- https://github.com/W01fh4cker/CVE-2024-22120-RCE
- https://github.com/ZonghaoLi777/githubTrending
- https://github.com/aneasystone/github-trending
+- https://github.com/enomothem/PenTestNote
- https://github.com/fireinrain/github-trending
- https://github.com/johe123qwe/github-trending
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-2218.md b/2024/CVE-2024-2218.md
new file mode 100644
index 0000000000..0004f8a116
--- /dev/null
+++ b/2024/CVE-2024-2218.md
@@ -0,0 +1,17 @@
+### [CVE-2024-2218](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2218)
+
+
+&color=brighgreen)
+
+### Description
+
+The LuckyWP Table of Contents WordPress plugin through 2.1.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/ecd615f7-946e-45af-a610-0654a243b1dc/
+
+#### Github
+- https://github.com/DojoSecurity/DojoSecurity
+
diff --git a/2024/CVE-2024-22296.md b/2024/CVE-2024-22296.md
new file mode 100644
index 0000000000..32667221eb
--- /dev/null
+++ b/2024/CVE-2024-22296.md
@@ -0,0 +1,17 @@
+### [CVE-2024-22296](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22296)
+
+
+
+
+### Description
+
+Missing Authorization vulnerability in Code for Recovery 12 Step Meeting List.This issue affects 12 Step Meeting List: from n/a through 3.14.28.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/fkie-cad/nvd-json-data-feeds
+
diff --git a/2024/CVE-2024-22298.md b/2024/CVE-2024-22298.md
new file mode 100644
index 0000000000..eee87fdab1
--- /dev/null
+++ b/2024/CVE-2024-22298.md
@@ -0,0 +1,17 @@
+### [CVE-2024-22298](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22298)
+
+
+
+
+### Description
+
+Missing Authorization vulnerability in TMS Amelia ameliabooking.This issue affects Amelia: from n/a through 1.0.98.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/fkie-cad/nvd-json-data-feeds
+
diff --git a/2024/CVE-2024-22514.md b/2024/CVE-2024-22514.md
index 21b2960f35..2cc450567d 100644
--- a/2024/CVE-2024-22514.md
+++ b/2024/CVE-2024-22514.md
@@ -14,5 +14,6 @@ An issue discovered in iSpyConnect.com Agent DVR 5.1.6.0 allows attackers to run
#### Github
- https://github.com/Orange-418/AgentDVR-5.1.6.0-File-Upload-and-Remote-Code-Execution
+- https://github.com/Orange-418/CVE-2024-22514-Remote-Code-Execution
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-22515.md b/2024/CVE-2024-22515.md
index be03dc8cec..8f3912f6aa 100644
--- a/2024/CVE-2024-22515.md
+++ b/2024/CVE-2024-22515.md
@@ -14,5 +14,6 @@ Unrestricted File Upload vulnerability in iSpyConnect.com Agent DVR 5.1.6.0 allo
#### Github
- https://github.com/Orange-418/AgentDVR-5.1.6.0-File-Upload-and-Remote-Code-Execution
+- https://github.com/Orange-418/CVE-2024-22515-File-Upload-Vulnerability
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-22532.md b/2024/CVE-2024-22532.md
index edd08fb65e..b680f748c1 100644
--- a/2024/CVE-2024-22532.md
+++ b/2024/CVE-2024-22532.md
@@ -15,4 +15,5 @@ Buffer Overflow vulnerability in XNSoft NConvert 7.163 (for Windows x86) allows
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/pwndorei/CVE-2024-22532
diff --git a/2024/CVE-2024-2257.md b/2024/CVE-2024-2257.md
new file mode 100644
index 0000000000..9dafdd26ac
--- /dev/null
+++ b/2024/CVE-2024-2257.md
@@ -0,0 +1,17 @@
+### [CVE-2024-2257](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2257)
+
+
+
+
+### Description
+
+This vulnerability exists in Digisol Router (DG-GR1321: Hardware version 3.7L; Firmware version : v3.2.02) due to improper implementation of password policies. An attacker with physical access could exploit this by creating password that do not adhere to the defined security standards/policy on the vulnerable system.Successful exploitation of this vulnerability could allow the attacker to expose the router to potential security threats.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/nomi-sec/PoC-in-GitHub
+
diff --git a/2024/CVE-2024-22640.md b/2024/CVE-2024-22640.md
index 71a910679c..1621d88b20 100644
--- a/2024/CVE-2024-22640.md
+++ b/2024/CVE-2024-22640.md
@@ -15,4 +15,5 @@ TCPDF version <=6.6.5 is vulnerable to ReDoS (Regular Expression Denial of Servi
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/zunak/CVE-2024-22640
diff --git a/2024/CVE-2024-22641.md b/2024/CVE-2024-22641.md
index 3d33413d07..f28241a95a 100644
--- a/2024/CVE-2024-22641.md
+++ b/2024/CVE-2024-22641.md
@@ -14,4 +14,5 @@ TCPDF version 6.6.5 and before is vulnerable to ReDoS (Regular Expression Denial
#### Github
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/zunak/CVE-2024-22641
diff --git a/2024/CVE-2024-22663.md b/2024/CVE-2024-22663.md
index 9fd1e5b850..67bb5aa7dd 100644
--- a/2024/CVE-2024-22663.md
+++ b/2024/CVE-2024-22663.md
@@ -13,5 +13,5 @@ TOTOLINK_A3700R_V9.1.2u.6165_20211012has a command Injection vulnerability via s
- https://github.com/Covteam/iot_vuln/tree/main/setOpModeCfg2
#### Github
-No PoCs found on GitHub currently.
+- https://github.com/Joe1sn/Joe1sn
diff --git a/2024/CVE-2024-22752.md b/2024/CVE-2024-22752.md
index c0ffdbe0f4..9834397058 100644
--- a/2024/CVE-2024-22752.md
+++ b/2024/CVE-2024-22752.md
@@ -13,5 +13,6 @@ Insecure permissions issue in EaseUS MobiMover 6.0.5 Build 21620 allows attacker
- https://github.com/hacker625/CVE-2024-22752
#### Github
+- https://github.com/hacker625/CVE-2024-22752
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-22795.md b/2024/CVE-2024-22795.md
index 8ec44f9ee8..6c48f2aedd 100644
--- a/2024/CVE-2024-22795.md
+++ b/2024/CVE-2024-22795.md
@@ -13,4 +13,5 @@ Insecure Permissions vulnerability in Forescout SecureConnector v.11.3.06.0063 a
- https://github.com/Hagrid29/ForeScout-SecureConnector-EoP
#### Github
+- https://github.com/Hagrid29/ForeScout-SecureConnector-EoP
diff --git a/2024/CVE-2024-22855.md b/2024/CVE-2024-22855.md
new file mode 100644
index 0000000000..502c3dda63
--- /dev/null
+++ b/2024/CVE-2024-22855.md
@@ -0,0 +1,17 @@
+### [CVE-2024-22855](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22855)
+
+
+
+
+### Description
+
+A cross-site scripting (XSS) vulnerability in the User Maintenance section of ITSS iMLog v1.307 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Last Name parameter.
+
+### POC
+
+#### Reference
+- https://www.exploit-db.com/exploits/52025
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-22889.md b/2024/CVE-2024-22889.md
index f294354628..31d6a41fa2 100644
--- a/2024/CVE-2024-22889.md
+++ b/2024/CVE-2024-22889.md
@@ -15,4 +15,5 @@ Due to incorrect access control in Plone version v6.0.9, remote attackers can vi
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/shenhav12/CVE-2024-22889-Plone-v6.0.9
diff --git a/2024/CVE-2024-22939.md b/2024/CVE-2024-22939.md
index 6e0aec1dd9..ebef31f9af 100644
--- a/2024/CVE-2024-22939.md
+++ b/2024/CVE-2024-22939.md
@@ -14,5 +14,6 @@ Cross Site Request Forgery vulnerability in FlyCms v.1.0 allows a remote attacke
- https://github.com/NUDTTAN91/CVE20240109/blob/master/README.md
#### Github
+- https://github.com/NUDTTAN91/CVE-2024-22939
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-23120.md b/2024/CVE-2024-23120.md
index bf54d29ff1..1c9706cf5c 100644
--- a/2024/CVE-2024-23120.md
+++ b/2024/CVE-2024-23120.md
@@ -1,11 +1,11 @@
### [CVE-2024-23120](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23120)
-
+


### Description
-A maliciously crafted STP file in ASMIMPORT228A.dll when parsed throughAutodesk AutoCAD can force an Out-of-Bound Write. A malicious actor canleverage this vulnerability to cause a crash, write sensitive data, or executearbitrary code in the context of the current process.
+A maliciously crafted STP and STEP file when parsed in ASMIMPORT228A.dll and ASMIMPORT229A.dll and through Autodesk applications can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
### POC
diff --git a/2024/CVE-2024-23121.md b/2024/CVE-2024-23121.md
index 90180675d3..41deb28ce0 100644
--- a/2024/CVE-2024-23121.md
+++ b/2024/CVE-2024-23121.md
@@ -1,11 +1,11 @@
### [CVE-2024-23121](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23121)
-
+


### Description
-A maliciously crafted MODEL file in libodxdll.dll when parsed through Autodesk AutoCAD can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process.
+A maliciously crafted MODEL file when parsed in libodxdll.dll through Autodesk applications can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.
### POC
diff --git a/2024/CVE-2024-23134.md b/2024/CVE-2024-23134.md
index f4847550d8..7e5dfc20ff 100644
--- a/2024/CVE-2024-23134.md
+++ b/2024/CVE-2024-23134.md
@@ -1,5 +1,5 @@
### [CVE-2024-23134](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23134)
-
+


diff --git a/2024/CVE-2024-23282.md b/2024/CVE-2024-23282.md
new file mode 100644
index 0000000000..fd7295925c
--- /dev/null
+++ b/2024/CVE-2024-23282.md
@@ -0,0 +1,21 @@
+### [CVE-2024-23282](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23282)
+
+
+
+
+
+
+
+
+### Description
+
+The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.5, watchOS 10.5, iOS 17.5 and iPadOS 17.5, iOS 16.7.8 and iPadOS 16.7.8. A maliciously crafted email may be able to initiate FaceTime calls without user authorization.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/dlehgus1023/dlehgus1023
+
diff --git a/2024/CVE-2024-23524.md b/2024/CVE-2024-23524.md
new file mode 100644
index 0000000000..6c1ff8f702
--- /dev/null
+++ b/2024/CVE-2024-23524.md
@@ -0,0 +1,17 @@
+### [CVE-2024-23524](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23524)
+
+
+
+
+### Description
+
+Missing Authorization vulnerability in ONTRAPORT Inc. PilotPress.This issue affects PilotPress: from n/a through 2.0.30.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/fkie-cad/nvd-json-data-feeds
+
diff --git a/2024/CVE-2024-23656.md b/2024/CVE-2024-23656.md
index ae2510decf..021bf720f0 100644
--- a/2024/CVE-2024-23656.md
+++ b/2024/CVE-2024-23656.md
@@ -11,6 +11,7 @@ Dex is an identity service that uses OpenID Connect to drive authentication for
### POC
#### Reference
+- https://github.com/dexidp/dex/pull/2964
- https://github.com/dexidp/dex/security/advisories/GHSA-gr79-9v6v-gc9r
#### Github
diff --git a/2024/CVE-2024-2369.md b/2024/CVE-2024-2369.md
index 98fb64afcb..8d1a29b02d 100644
--- a/2024/CVE-2024-2369.md
+++ b/2024/CVE-2024-2369.md
@@ -14,4 +14,5 @@ The Page Builder Gutenberg Blocks WordPress plugin before 3.1.7 does not validat
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
+- https://github.com/tanjiti/sec_profile
diff --git a/2024/CVE-2024-23692.md b/2024/CVE-2024-23692.md
index 92c1abff9a..2b16f998e8 100644
--- a/2024/CVE-2024-23692.md
+++ b/2024/CVE-2024-23692.md
@@ -14,5 +14,9 @@
- https://mohemiv.com/all/rejetto-http-file-server-2-3m-unauthenticated-rce/
#### Github
-No PoCs found on GitHub currently.
+- https://github.com/Threekiii/CVE
+- https://github.com/enomothem/PenTestNote
+- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/tanjiti/sec_profile
+- https://github.com/wy876/POC
diff --git a/2024/CVE-2024-23745.md b/2024/CVE-2024-23745.md
index 27782d61be..65419c0ce7 100644
--- a/2024/CVE-2024-23745.md
+++ b/2024/CVE-2024-23745.md
@@ -16,6 +16,7 @@
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
+- https://github.com/louiselalanne/CVE-2024-23745
- https://github.com/louiselalanne/louiselalanne
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-23746.md b/2024/CVE-2024-23746.md
index 8636a7f46d..d930edb928 100644
--- a/2024/CVE-2024-23746.md
+++ b/2024/CVE-2024-23746.md
@@ -14,6 +14,7 @@ Miro Desktop 0.8.18 on macOS allows local Electron code injection via a complex
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
+- https://github.com/louiselalanne/CVE-2024-23746
- https://github.com/louiselalanne/louiselalanne
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-23747.md b/2024/CVE-2024-23747.md
index f8bd2f7195..e96a383fd9 100644
--- a/2024/CVE-2024-23747.md
+++ b/2024/CVE-2024-23747.md
@@ -13,6 +13,7 @@ The Moderna Sistemas ModernaNet Hospital Management System 2024 is susceptible t
- https://github.com/louiselalanne/CVE-2024-23747
#### Github
+- https://github.com/louiselalanne/CVE-2024-23747
- https://github.com/louiselalanne/louiselalanne
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-2389.md b/2024/CVE-2024-2389.md
index 2ce9377b00..a005a5bed6 100644
--- a/2024/CVE-2024-2389.md
+++ b/2024/CVE-2024-2389.md
@@ -17,6 +17,7 @@ No PoCs from references.
- https://github.com/RhinoSecurityLabs/CVEs
- https://github.com/YN1337/exploit
- https://github.com/adhikara13/CVE-2024-2389
+- https://github.com/enomothem/PenTestNote
- https://github.com/getdrive/PoC
- https://github.com/mayur-esh/vuln-liners
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-23910.md b/2024/CVE-2024-23910.md
index 2f8674dd6b..cbc63c796f 100644
--- a/2024/CVE-2024-23910.md
+++ b/2024/CVE-2024-23910.md
@@ -1,4 +1,5 @@
### [CVE-2024-23910](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23910)
+



@@ -6,15 +7,17 @@



+


+


&color=brighgreen)
### Description
-Cross-site request forgery (CSRF) vulnerability in ELECOM wireless LAN routers allows a remote unauthenticated attacker to hijack the authentication of administrators and to perform unintended operations to the affected product. Affected products and versions are as follows: WRC-1167GS2-B v1.67 and earlier, WRC-1167GS2H-B v1.67 and earlier, WRC-2533GS2-B v1.62 and earlier, WRC-2533GS2-W v1.62 and earlier, WRC-2533GS2V-B v1.62 and earlier, WRC-X3200GST3-B v1.25 and earlier, and WRC-G01-W v1.24 and earlier.
+Cross-site request forgery (CSRF) vulnerability in ELECOM wireless LAN routers and wireless LAN repeater allows a remote unauthenticated attacker to hijack the authentication of administrators and to perform unintended operations to the affected product. Note that WMC-X1800GST-B and WSC-X1800GS-B are also included in e-Mesh Starter Kit "WMC-2LX-B".
### POC
diff --git a/2024/CVE-2024-24051.md b/2024/CVE-2024-24051.md
new file mode 100644
index 0000000000..8569dd0460
--- /dev/null
+++ b/2024/CVE-2024-24051.md
@@ -0,0 +1,17 @@
+### [CVE-2024-24051](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24051)
+
+
+
+
+### Description
+
+Improper input validation of printing files in Monoprice Select Mini V2 V37.115.32 allows attackers to instruct the device's movable parts to destinations that exceed the devices' maximum coordinates via the printing of a malicious .gcode file.
+
+### POC
+
+#### Reference
+- https://github.com/tkruppert/Reported_Vulnerabilities/blob/main/CVE-2024-24051.md
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-24320.md b/2024/CVE-2024-24320.md
new file mode 100644
index 0000000000..a64b515330
--- /dev/null
+++ b/2024/CVE-2024-24320.md
@@ -0,0 +1,17 @@
+### [CVE-2024-24320](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24320)
+
+
+
+
+### Description
+
+Directory Traversal vulnerability in Mgt-commerce CloudPanel v.2.0.0 thru v.2.4.0 allows a remote attacker to obtain sensitive information and execute arbitrary code via the service parameter of the load-logfiles function.
+
+### POC
+
+#### Reference
+- https://datack.my/cloudpanel-v2-0-0-v2-4-0-authenticated-user-session-hijacking-cve-2024-24320/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-24590.md b/2024/CVE-2024-24590.md
index 74f3412a88..2588ad8b90 100644
--- a/2024/CVE-2024-24590.md
+++ b/2024/CVE-2024-24590.md
@@ -14,4 +14,5 @@ No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
+- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-24919.md b/2024/CVE-2024-24919.md
index c8476995be..c71029943d 100644
--- a/2024/CVE-2024-24919.md
+++ b/2024/CVE-2024-24919.md
@@ -32,6 +32,7 @@ No PoCs from references.
- https://github.com/Praison001/CVE-2024-24919-Check-Point-Remote-Access-VPN
- https://github.com/RevoltSecurities/CVE-2024-24919
- https://github.com/Rug4lo/CVE-2024-24919-Exploit
+- https://github.com/Threekiii/CVE
- https://github.com/Tim-Hoekstra/CVE-2024-24919
- https://github.com/Vulnpire/CVE-2024-24919
- https://github.com/YN1337/CVE-2024-24919
@@ -39,7 +40,9 @@ No PoCs from references.
- https://github.com/bigb0x/CVE-2024-24919-Sniper
- https://github.com/birdlex/cve-2024-24919-checker
- https://github.com/c3rrberu5/CVE-2024-24919
+- https://github.com/defronixpro/Defronix-Cybersecurity-Roadmap
- https://github.com/emanueldosreis/CVE-2024-24919
+- https://github.com/enomothem/PenTestNote
- https://github.com/eoslvs/CVE-2024-24919
- https://github.com/fernandobortotti/CVE-2024-24919
- https://github.com/gurudattch/CVE-2024-24919
diff --git a/2024/CVE-2024-2511.md b/2024/CVE-2024-2511.md
index 2462202093..1f2372537b 100644
--- a/2024/CVE-2024-2511.md
+++ b/2024/CVE-2024-2511.md
@@ -14,6 +14,7 @@ No PoCs from references.
#### Github
- https://github.com/GrigGM/05-virt-04-docker-hw
+- https://github.com/bcgov/jag-cdds
- https://github.com/chnzzh/OpenSSL-CVE-lib
- https://github.com/fkie-cad/nvd-json-data-feeds
diff --git a/2024/CVE-2024-25111.md b/2024/CVE-2024-25111.md
new file mode 100644
index 0000000000..99fd4755f7
--- /dev/null
+++ b/2024/CVE-2024-25111.md
@@ -0,0 +1,17 @@
+### [CVE-2024-25111](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25111)
+
+
+
+
+### Description
+
+Squid is a web proxy cache. Starting in version 3.5.27 and prior to version 6.8, Squid may be vulnerable to a Denial of Service attack against HTTP Chunked decoder due to an uncontrolled recursion bug. This problem allows a remote attacker to cause Denial of Service when sending a crafted, chunked, encoded HTTP Message. This bug is fixed in Squid version 6.8. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. There is no workaround for this issue.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/MegaManSec/Squid-Security-Audit
+
diff --git a/2024/CVE-2024-25169.md b/2024/CVE-2024-25169.md
index fa099d42d9..930687bc3c 100644
--- a/2024/CVE-2024-25169.md
+++ b/2024/CVE-2024-25169.md
@@ -16,4 +16,5 @@ An issue in Mezzanine v6.0.0 allows attackers to bypass access control mechanism
- https://github.com/AppThreat/vulnerability-db
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/shenhav12/CVE-2024-25169-Mezzanine-v6.0.0
diff --git a/2024/CVE-2024-25170.md b/2024/CVE-2024-25170.md
index 2a8c6315d6..52c945eeb0 100644
--- a/2024/CVE-2024-25170.md
+++ b/2024/CVE-2024-25170.md
@@ -15,4 +15,5 @@ An issue in Mezzanine v6.0.0 allows attackers to bypass access controls via mani
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/shenhav12/CVE-2024-25170-Mezzanine-v6.0.0
diff --git a/2024/CVE-2024-25202.md b/2024/CVE-2024-25202.md
index 77cb3e514e..67c30ef059 100644
--- a/2024/CVE-2024-25202.md
+++ b/2024/CVE-2024-25202.md
@@ -14,6 +14,7 @@ Cross Site Scripting vulnerability in Phpgurukul User Registration & Login and U
- https://medium.com/@agampreetsingh_93704/cve-2024-25202-discover-by-agampreet-singh-cyber-security-expert-ff8e32f5cf52
#### Github
+- https://github.com/Agampreet-Singh/CVE-2024-25202
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-25359.md b/2024/CVE-2024-25359.md
new file mode 100644
index 0000000000..b8837e7287
--- /dev/null
+++ b/2024/CVE-2024-25359.md
@@ -0,0 +1,17 @@
+### [CVE-2024-25359](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25359)
+
+
+
+
+### Description
+
+An issue in zuoxingdong lagom v.0.1.2 allows a local attacker to execute arbitrary code via the pickle_load function of the serialize.py file.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/bayuncao/bayuncao
+
diff --git a/2024/CVE-2024-25400.md b/2024/CVE-2024-25400.md
index 330c523a04..543beecb31 100644
--- a/2024/CVE-2024-25400.md
+++ b/2024/CVE-2024-25400.md
@@ -5,7 +5,7 @@
### Description
-Subrion CMS 4.2.1 is vulnerable to SQL Injection via ia.core.mysqli.php.
+** DISPUTED ** Subrion CMS 4.2.1 is vulnerable to SQL Injection via ia.core.mysqli.php. NOTE: this is disputed by multiple third parties because it refers to an HTTP request to a PHP file that only contains a class, without any mechanism for accepting external input, and the reportedly vulnerable method is not present in the file.
### POC
diff --git a/2024/CVE-2024-25423.md b/2024/CVE-2024-25423.md
index 1d7dcee6a6..566ce2f825 100644
--- a/2024/CVE-2024-25423.md
+++ b/2024/CVE-2024-25423.md
@@ -13,6 +13,7 @@ An issue in MAXON CINEMA 4D R2024.2.0 allows a local attacker to execute arbitra
- https://github.com/DriverUnload/cve-2024-25423
#### Github
+- https://github.com/DriverUnload/cve-2024-25423
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-25579.md b/2024/CVE-2024-25579.md
index 9a614f765f..2b661504f7 100644
--- a/2024/CVE-2024-25579.md
+++ b/2024/CVE-2024-25579.md
@@ -1,4 +1,5 @@
### [CVE-2024-25579](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25579)
+



@@ -8,13 +9,14 @@



+



### Description
-OS command injection vulnerability in ELECOM wireless LAN routers allows a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by sending a specially crafted request to the product. Affected products and versions are as follows: WRC-1167GS2-B v1.67 and earlier, WRC-1167GS2H-B v1.67 and earlier, WRC-2533GS2-B v1.62 and earlier, WRC-2533GS2-W v1.62 and earlier, WRC-2533GS2V-B v1.62 and earlier, WRC-X3200GST3-B v1.25 and earlier, and WRC-G01-W v1.24 and earlier.
+OS command injection vulnerability in ELECOM wireless LAN routers allows a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by sending a specially crafted request to the product. Note that WMC-X1800GST-B is also included in e-Mesh Starter Kit "WMC-2LX-B".
### POC
diff --git a/2024/CVE-2024-25600.md b/2024/CVE-2024-25600.md
index f48cd93ab4..7dc70c8bf5 100644
--- a/2024/CVE-2024-25600.md
+++ b/2024/CVE-2024-25600.md
@@ -17,8 +17,10 @@ Improper Control of Generation of Code ('Code Injection') vulnerability in Codee
#### Github
- https://github.com/0bl1v10nf0rg0773n/0BL1V10N-CVE-2024-25600-Bricks-Builder-plugin-for-WordPress
- https://github.com/0xMarcio/cve
+- https://github.com/Chocapikk/CVE-2024-25600
- https://github.com/Christbowel/CVE-2024-25600_Nuclei-Template
- https://github.com/GhostTroops/TOP
+- https://github.com/K3ysTr0K3R/CVE-2024-25600-EXPLOIT
- https://github.com/K3ysTr0K3R/K3ysTr0K3R
- https://github.com/RHYru9/CVE-2024-25600-mass
- https://github.com/Threekiii/CVE
diff --git a/2024/CVE-2024-25617.md b/2024/CVE-2024-25617.md
index ce7ef094c5..2e0f5d30b8 100644
--- a/2024/CVE-2024-25617.md
+++ b/2024/CVE-2024-25617.md
@@ -14,5 +14,6 @@ Squid is an open source caching proxy for the Web supporting HTTP, HTTPS, FTP, a
No PoCs from references.
#### Github
+- https://github.com/MegaManSec/Squid-Security-Audit
- https://github.com/NaInSec/CVE-LIST
diff --git a/2024/CVE-2024-25975.md b/2024/CVE-2024-25975.md
index bc0ce3ff9e..07250f0e68 100644
--- a/2024/CVE-2024-25975.md
+++ b/2024/CVE-2024-25975.md
@@ -10,6 +10,7 @@ The application implements an up- and downvote function which alters a value wit
### POC
#### Reference
+- http://seclists.org/fulldisclosure/2024/May/34
- https://r.sec-consult.com/hawki
#### Github
diff --git a/2024/CVE-2024-25976.md b/2024/CVE-2024-25976.md
index dadbe2f170..27ce008fe2 100644
--- a/2024/CVE-2024-25976.md
+++ b/2024/CVE-2024-25976.md
@@ -10,6 +10,7 @@ When LDAP authentication is activated in the configuration it is possible to obt
### POC
#### Reference
+- http://seclists.org/fulldisclosure/2024/May/34
- https://r.sec-consult.com/hawki
#### Github
diff --git a/2024/CVE-2024-25977.md b/2024/CVE-2024-25977.md
index 56a9aa5c54..d3f950c53e 100644
--- a/2024/CVE-2024-25977.md
+++ b/2024/CVE-2024-25977.md
@@ -10,6 +10,7 @@ The application does not change the session token when using the login or logout
### POC
#### Reference
+- http://seclists.org/fulldisclosure/2024/May/34
- https://r.sec-consult.com/hawki
#### Github
diff --git a/2024/CVE-2024-26026.md b/2024/CVE-2024-26026.md
index 27715328f1..aa33f672ed 100644
--- a/2024/CVE-2024-26026.md
+++ b/2024/CVE-2024-26026.md
@@ -15,6 +15,7 @@ No PoCs from references.
#### Github
- https://github.com/GRTMALDET/Big-IP-Next-CVE-2024-26026
- https://github.com/Threekiii/CVE
+- https://github.com/enomothem/PenTestNote
- https://github.com/netlas-io/netlas-dorks
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/passwa11/CVE-2024-26026
diff --git a/2024/CVE-2024-26163.md b/2024/CVE-2024-26163.md
index 229d8ce284..3ffc5d17cf 100644
--- a/2024/CVE-2024-26163.md
+++ b/2024/CVE-2024-26163.md
@@ -1,7 +1,8 @@
### [CVE-2024-26163](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26163)
+%20Extended%20Stable&color=blue)
&color=blue)

-
+
### Description
diff --git a/2024/CVE-2024-26165.md b/2024/CVE-2024-26165.md
index 6a8141c287..9545de08a7 100644
--- a/2024/CVE-2024-26165.md
+++ b/2024/CVE-2024-26165.md
@@ -1,7 +1,7 @@
### [CVE-2024-26165](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26165)


-
+
### Description
diff --git a/2024/CVE-2024-26167.md b/2024/CVE-2024-26167.md
index a2ff21ab00..c24dbba1a1 100644
--- a/2024/CVE-2024-26167.md
+++ b/2024/CVE-2024-26167.md
@@ -1,7 +1,7 @@
### [CVE-2024-26167](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26167)


-
+
### Description
diff --git a/2024/CVE-2024-26173.md b/2024/CVE-2024-26173.md
index d4b7cb835e..53e56574bc 100644
--- a/2024/CVE-2024-26173.md
+++ b/2024/CVE-2024-26173.md
@@ -38,7 +38,7 @@



-
+
### Description
diff --git a/2024/CVE-2024-26181.md b/2024/CVE-2024-26181.md
index 0b03052bfd..a5bb84a280 100644
--- a/2024/CVE-2024-26181.md
+++ b/2024/CVE-2024-26181.md
@@ -38,7 +38,7 @@



-
+
### Description
diff --git a/2024/CVE-2024-26188.md b/2024/CVE-2024-26188.md
index 3cf7084d97..df9ce8e9ea 100644
--- a/2024/CVE-2024-26188.md
+++ b/2024/CVE-2024-26188.md
@@ -1,7 +1,7 @@
### [CVE-2024-26188](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26188)


-
+
### Description
diff --git a/2024/CVE-2024-26192.md b/2024/CVE-2024-26192.md
index f25c7a6bf3..7983c2af7a 100644
--- a/2024/CVE-2024-26192.md
+++ b/2024/CVE-2024-26192.md
@@ -1,7 +1,7 @@
### [CVE-2024-26192](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26192)
&color=blue)

-
+
### Description
diff --git a/2024/CVE-2024-26196.md b/2024/CVE-2024-26196.md
index 28979f14a7..87827f2292 100644
--- a/2024/CVE-2024-26196.md
+++ b/2024/CVE-2024-26196.md
@@ -1,7 +1,7 @@
### [CVE-2024-26196](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26196)


-
+
### Description
diff --git a/2024/CVE-2024-26229.md b/2024/CVE-2024-26229.md
new file mode 100644
index 0000000000..40a040571f
--- /dev/null
+++ b/2024/CVE-2024-26229.md
@@ -0,0 +1,58 @@
+### [CVE-2024-26229](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26229)
+
+
+
+
+
+
+
+
+
+
+&color=blue)
+
+&color=blue)
+
+&color=blue)
+&color=blue)
+
+
+&color=blue)
+
+&color=blue)
+
+&color=blue)
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+### Description
+
+Windows CSC Service Elevation of Privilege Vulnerability
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/0xMarcio/cve
+- https://github.com/GhostTroops/TOP
+- https://github.com/michredteam/PoC-26229
+- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/tanjiti/sec_profile
+
diff --git a/2024/CVE-2024-26246.md b/2024/CVE-2024-26246.md
index f619db997d..96d2a1fd7e 100644
--- a/2024/CVE-2024-26246.md
+++ b/2024/CVE-2024-26246.md
@@ -1,7 +1,7 @@
### [CVE-2024-26246](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26246)


-
+
### Description
diff --git a/2024/CVE-2024-26247.md b/2024/CVE-2024-26247.md
index 4ed501188e..87106ea4fe 100644
--- a/2024/CVE-2024-26247.md
+++ b/2024/CVE-2024-26247.md
@@ -1,7 +1,7 @@
### [CVE-2024-26247](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26247)
&color=blue)

-
+
### Description
diff --git a/2024/CVE-2024-26256.md b/2024/CVE-2024-26256.md
index 760fd6bbc8..c639cef556 100644
--- a/2024/CVE-2024-26256.md
+++ b/2024/CVE-2024-26256.md
@@ -10,7 +10,7 @@
### Description
-libarchive Remote Code Execution Vulnerability
+Libarchive Remote Code Execution Vulnerability
### POC
diff --git a/2024/CVE-2024-26507.md b/2024/CVE-2024-26507.md
new file mode 100644
index 0000000000..9751dfc7f9
--- /dev/null
+++ b/2024/CVE-2024-26507.md
@@ -0,0 +1,17 @@
+### [CVE-2024-26507](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26507)
+
+
+
+
+### Description
+
+An issue in FinalWire AIRDA Extreme, AIDA64 Engineer, AIDA64 Business, AIDA64 Network Audit v.7.00.6700 and before allows a local attacker to escalate privileges via the DeviceIoControl call associated with MmMapIoSpace, IoAllocateMdl, MmBuildMdlForNonPagedPool, or MmMapLockedPages components.
+
+### POC
+
+#### Reference
+- https://belong2yourself.github.io/vulnerabilities/docs/AIDA/Elevation-of-Privileges/readme/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-26521.md b/2024/CVE-2024-26521.md
index f735c1798a..0eec55856f 100644
--- a/2024/CVE-2024-26521.md
+++ b/2024/CVE-2024-26521.md
@@ -14,5 +14,6 @@ HTML Injection vulnerability in CE Phoenix v1.0.8.20 and before allows a remote
- https://github.com/hackervegas001/CVE-2024-26521
#### Github
+- https://github.com/hackervegas001/CVE-2024-26521
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-26581.md b/2024/CVE-2024-26581.md
index e63f997b59..5ae252d735 100644
--- a/2024/CVE-2024-26581.md
+++ b/2024/CVE-2024-26581.md
@@ -1,6 +1,6 @@
### [CVE-2024-26581](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26581)

-
+

### Description
diff --git a/2024/CVE-2024-26602.md b/2024/CVE-2024-26602.md
index f91e9bd9d1..0057f7ca65 100644
--- a/2024/CVE-2024-26602.md
+++ b/2024/CVE-2024-26602.md
@@ -13,5 +13,6 @@ In the Linux kernel, the following vulnerability has been resolved:sched/membarr
No PoCs from references.
#### Github
+- https://github.com/codexlynx/hardware-attacks-state-of-the-art
- https://github.com/fkie-cad/nvd-json-data-feeds
diff --git a/2024/CVE-2024-26629.md b/2024/CVE-2024-26629.md
index 8a78326cfa..8fe5d546e9 100644
--- a/2024/CVE-2024-26629.md
+++ b/2024/CVE-2024-26629.md
@@ -1,6 +1,6 @@
### [CVE-2024-26629](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26629)

-
+

### Description
diff --git a/2024/CVE-2024-26639.md b/2024/CVE-2024-26639.md
index aebaab5adf..3cf04be809 100644
--- a/2024/CVE-2024-26639.md
+++ b/2024/CVE-2024-26639.md
@@ -1,11 +1,11 @@
### [CVE-2024-26639](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26639)
-
-
-
+
+
+
### Description
-In the Linux kernel, the following vulnerability has been resolved:mm, kmsan: fix infinite recursion due to RCU critical sectionAlexander Potapenko writes in [1]: "For every memory access in the codeinstrumented by KMSAN we call kmsan_get_metadata() to obtain the metadatafor the memory being accessed. For virtual memory the metadata pointersare stored in the corresponding `struct page`, therefore we need to callvirt_to_page() to get them.According to the comment in arch/x86/include/asm/page.h,virt_to_page(kaddr) returns a valid pointer iff virt_addr_valid(kaddr) istrue, so KMSAN needs to call virt_addr_valid() as well.To avoid recursion, kmsan_get_metadata() must not call instrumented code,therefore ./arch/x86/include/asm/kmsan.h forks parts ofarch/x86/mm/physaddr.c to check whether a virtual address is valid or not.But the introduction of rcu_read_lock() to pfn_valid() added instrumentedRCU API calls to virt_to_page_or_null(), which is called bykmsan_get_metadata(), so there is an infinite recursion now. I do notthink it is correct to stop that recursion by doingkmsan_enter_runtime()/kmsan_exit_runtime() in kmsan_get_metadata(): thatwould prevent instrumented functions called from within the runtime fromtracking the shadow values, which might introduce false positives."Fix the issue by switching pfn_valid() to the _sched() variant ofrcu_read_lock/unlock(), which does not require calling into RCU. Giventhe critical section in pfn_valid() is very small, this is a reasonabletrade-off (with preemptible RCU).KMSAN further needs to be careful to suppress calls into the scheduler,which would be another source of recursion. This can be done by wrappingthe call to pfn_valid() into preempt_disable/enable_no_resched(). Thedownside is that this sacrifices breaking scheduling guarantees; however,a kernel compiled with KMSAN has already given up any performanceguarantees due to being heavily instrumented.Note, KMSAN code already disables tracing via Makefile, and since mmzone.his included, it is not necessary to use the notrace variant, which isgenerally preferred in all other cases.
+** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
### POC
diff --git a/2024/CVE-2024-26643.md b/2024/CVE-2024-26643.md
index a9eedd759a..87ecb5967e 100644
--- a/2024/CVE-2024-26643.md
+++ b/2024/CVE-2024-26643.md
@@ -1,6 +1,6 @@
### [CVE-2024-26643](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26643)

-
+

### Description
diff --git a/2024/CVE-2024-26979.md b/2024/CVE-2024-26979.md
index 27a364e410..bf71212893 100644
--- a/2024/CVE-2024-26979.md
+++ b/2024/CVE-2024-26979.md
@@ -1,11 +1,11 @@
### [CVE-2024-26979](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26979)
-
-
-
+
+
+
### Description
-In the Linux kernel, the following vulnerability has been resolved:drm/vmwgfx: Fix possible null pointer derefence with invalid contextsvmw_context_cotable can return either an error or a null pointer and itsusage sometimes went unchecked. Subsequent code would then try to accesseither a null pointer or an error value.The invalid dereferences were only possible with malformed userspaceapps which never properly initialized the rendering contexts.Check the results of vmw_context_cotable to fix the invalid derefs.Thanks:ziming zhang(@ezrak1e) from Ant Group Light-Year Security Labwho was the first person to discover it.Niels De Graef who reported it and helped to track down the poc.
+** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
### POC
diff --git a/2024/CVE-2024-2700.md b/2024/CVE-2024-2700.md
index d4bd7ad51d..ab23f3e1e1 100644
--- a/2024/CVE-2024-2700.md
+++ b/2024/CVE-2024-2700.md
@@ -1,5 +1,5 @@
### [CVE-2024-2700](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2700)
-
+



diff --git a/2024/CVE-2024-27019.md b/2024/CVE-2024-27019.md
index cf2d59400b..27b2e6b9b2 100644
--- a/2024/CVE-2024-27019.md
+++ b/2024/CVE-2024-27019.md
@@ -1,6 +1,6 @@
### [CVE-2024-27019](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27019)

-
+

### Description
diff --git a/2024/CVE-2024-27173.md b/2024/CVE-2024-27173.md
new file mode 100644
index 0000000000..e68d773e08
--- /dev/null
+++ b/2024/CVE-2024-27173.md
@@ -0,0 +1,17 @@
+### [CVE-2024-27173](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27173)
+&color=blue)
+
+&color=brighgreen)
+
+### Description
+
+Remote Command program allows an attacker to get Remote Code Execution by overwriting existing Python files containing executable code. This vulnerability can be executed in combination with other vulnerabilities and difficult to execute alone. So, the CVSS score for this vulnerability alone is lower than the score listed in the "Base Score" of this vulnerability. For detail on related other vulnerabilities, please ask to the below contact point. https://www.toshibatec.com/contacts/products/ As for the affected products/models/versions, see the reference URL.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/nomi-sec/PoC-in-GitHub
+
diff --git a/2024/CVE-2024-27282.md b/2024/CVE-2024-27282.md
index 301289e3b1..c148cb25ff 100644
--- a/2024/CVE-2024-27282.md
+++ b/2024/CVE-2024-27282.md
@@ -14,4 +14,5 @@ No PoCs from references.
#### Github
- https://github.com/lifeparticle/Ruby-Cheatsheet
+- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-27316.md b/2024/CVE-2024-27316.md
index daca5afc4e..6df5454f75 100644
--- a/2024/CVE-2024-27316.md
+++ b/2024/CVE-2024-27316.md
@@ -15,6 +15,7 @@ No PoCs from references.
#### Github
- https://github.com/Ampferl/poc_http2-continuation-flood
- https://github.com/DrewskyDev/H2Flood
+- https://github.com/EzeTauil/Maquina-Upload
- https://github.com/Vos68/HTTP2-Continuation-Flood-PoC
- https://github.com/aeyesec/CVE-2024-27316_poc
- https://github.com/lockness-Ko/CVE-2024-27316
diff --git a/2024/CVE-2024-27518.md b/2024/CVE-2024-27518.md
index f0f02651b3..83b94aa3a6 100644
--- a/2024/CVE-2024-27518.md
+++ b/2024/CVE-2024-27518.md
@@ -15,4 +15,5 @@ An issue in SUPERAntiSyware Professional X 10.0.1262 and 10.0.1264 allows unpriv
#### Github
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/secunnix/CVE-2024-27518
diff --git a/2024/CVE-2024-27619.md b/2024/CVE-2024-27619.md
index cd7654d3df..7942d2e66a 100644
--- a/2024/CVE-2024-27619.md
+++ b/2024/CVE-2024-27619.md
@@ -14,5 +14,6 @@ Dlink Dir-3040us A1 1.20b03a hotfix is vulnerable to Buffer Overflow. Any user h
- https://www.dlink.com/en/security-bulletin/
#### Github
+- https://github.com/ioprojecton/dir-3040_dos
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-2762.md b/2024/CVE-2024-2762.md
new file mode 100644
index 0000000000..8a20a2c3bf
--- /dev/null
+++ b/2024/CVE-2024-2762.md
@@ -0,0 +1,18 @@
+### [CVE-2024-2762](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2762)
+
+
+
+&color=brighgreen)
+
+### Description
+
+The FooGallery WordPress plugin before 2.4.15, foogallery-premium WordPress plugin before 2.4.15 does not validate and escape some of its Gallery settings before outputting them back in the page, which could allow users with a role as low as Author to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admin
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/92e0f5ca-0184-4e9c-b01a-7656e05dce69/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-27622.md b/2024/CVE-2024-27622.md
index e6b63308fb..814bd515d9 100644
--- a/2024/CVE-2024-27622.md
+++ b/2024/CVE-2024-27622.md
@@ -5,7 +5,7 @@
### Description
-A remote code execution vulnerability has been identified in the User Defined Tags module of CMS Made Simple version 2.2.19. This vulnerability arises from inadequate sanitization of user-supplied input in the 'Code' section of the module. As a result, authenticated users with administrative privileges can inject and execute arbitrary PHP code.
+A remote code execution vulnerability has been identified in the User Defined Tags module of CMS Made Simple version 2.2.19 / 2.2.21. This vulnerability arises from inadequate sanitization of user-supplied input in the 'Code' section of the module. As a result, authenticated users with administrative privileges can inject and execute arbitrary PHP code.
### POC
diff --git a/2024/CVE-2024-27631.md b/2024/CVE-2024-27631.md
index df73451667..8c7339889f 100644
--- a/2024/CVE-2024-27631.md
+++ b/2024/CVE-2024-27631.md
@@ -14,5 +14,6 @@ Cross Site Request Forgery vulnerability in GNU Savane v.3.12 and before allows
- https://medium.com/@allypetitt/how-i-found-3-cves-in-2-days-8a135eb924d3
#### Github
+- https://github.com/ally-petitt/CVE-2024-27631
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-27815.md b/2024/CVE-2024-27815.md
new file mode 100644
index 0000000000..7756fe184d
--- /dev/null
+++ b/2024/CVE-2024-27815.md
@@ -0,0 +1,24 @@
+### [CVE-2024-27815](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27815)
+
+
+
+
+
+
+
+
+
+
+
+### Description
+
+An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in tvOS 17.5, visionOS 1.2, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. An app may be able to execute arbitrary code with kernel privileges.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/nomi-sec/PoC-in-GitHub
+
diff --git a/2024/CVE-2024-27830.md b/2024/CVE-2024-27830.md
new file mode 100644
index 0000000000..13b9755d95
--- /dev/null
+++ b/2024/CVE-2024-27830.md
@@ -0,0 +1,26 @@
+### [CVE-2024-27830](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27830)
+
+
+
+
+
+
+
+
+
+
+
+
+### Description
+
+This issue was addressed through improved state management. This issue is fixed in tvOS 17.5, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. A maliciously crafted webpage may be able to fingerprint the user.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/Joe12387/Joe12387
+- https://github.com/Joe12387/safari-canvas-fingerprinting-exploit
+
diff --git a/2024/CVE-2024-27834.md b/2024/CVE-2024-27834.md
new file mode 100644
index 0000000000..e7ff4e19c5
--- /dev/null
+++ b/2024/CVE-2024-27834.md
@@ -0,0 +1,23 @@
+### [CVE-2024-27834](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834)
+
+
+
+
+
+
+
+
+
+
+### Description
+
+The issue was addressed with improved checks. This issue is fixed in iOS 17.5 and iPadOS 17.5, tvOS 17.5, Safari 17.5, watchOS 10.5, macOS Sonoma 14.5. An attacker with arbitrary read and write capability may be able to bypass Pointer Authentication.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/fkie-cad/nvd-json-data-feeds
+
diff --git a/2024/CVE-2024-27936.md b/2024/CVE-2024-27936.md
index a8483230ea..9ff5f0178b 100644
--- a/2024/CVE-2024-27936.md
+++ b/2024/CVE-2024-27936.md
@@ -1,11 +1,11 @@
### [CVE-2024-27936](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27936)

-
+

### Description
-Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. Starting in version 1.32.1 and prior to version 1.41 of the deno_runtime library, maliciously crafted permission request can show the spoofed permission prompt by inserting a broken ANSI escape sequence into the request contents. Deno is stripping any ANSI escape sequences from the permission prompt, but permissions given to the program are based on the contents that contain the ANSI escape sequences. Any Deno program can spoof the content of the interactive permission prompt by inserting a broken ANSI code, which allows a malicious Deno program to display the wrong file path or program name to the user. Version 1.41 of the deno_runtime library contains a patch for the issue.
+Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. Starting in version 1.32.1 and prior to version 1.41.0 of the deno library, maliciously crafted permission request can show the spoofed permission prompt by inserting a broken ANSI escape sequence into the request contents. Deno is stripping any ANSI escape sequences from the permission prompt, but permissions given to the program are based on the contents that contain the ANSI escape sequences. Any Deno program can spoof the content of the interactive permission prompt by inserting a broken ANSI code, which allows a malicious Deno program to display the wrong file path or program name to the user. Version 1.41.0 of the deno library contains a patch for the issue.
### POC
diff --git a/2024/CVE-2024-28085.md b/2024/CVE-2024-28085.md
index 2f160360b4..344a6b6518 100644
--- a/2024/CVE-2024-28085.md
+++ b/2024/CVE-2024-28085.md
@@ -10,6 +10,7 @@ wall in util-linux through 2.40, often installed with setgid tty permissions, al
### POC
#### Reference
+- http://www.openwall.com/lists/oss-security/2024/03/27/5
- https://people.rit.edu/sjf5462/6831711781/wall_2_27_2024.txt
- https://www.openwall.com/lists/oss-security/2024/03/27/5
diff --git a/2024/CVE-2024-28147.md b/2024/CVE-2024-28147.md
new file mode 100644
index 0000000000..c1ac4d855a
--- /dev/null
+++ b/2024/CVE-2024-28147.md
@@ -0,0 +1,17 @@
+### [CVE-2024-28147](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28147)
+
+
+
+
+### Description
+
+An authenticated user can upload arbitrary files in the upload function for collection preview images. An attacker may upload an HTML file that includes malicious JavaScript code which will be executed if a user visits the direct URL of the collection preview image (Stored Cross Site Scripting). It is also possible to upload SVG files that include nested XML entities. Those are parsed when a user visits the direct URL of the collection preview image, which may be utilized for a Denial of Service attack.This issue affects edu-sharing: <8.0.8-RC2, <8.1.4-RC0, <9.0.0-RC19.
+
+### POC
+
+#### Reference
+- https://r.sec-consult.com/metaventis
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-28397.md b/2024/CVE-2024-28397.md
new file mode 100644
index 0000000000..da386528e6
--- /dev/null
+++ b/2024/CVE-2024-28397.md
@@ -0,0 +1,18 @@
+### [CVE-2024-28397](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28397)
+
+
+
+
+### Description
+
+An issue in the component js2py.disable_pyimport() of js2py up to v0.74 allows attackers to execute arbitrary code via a crafted API call.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/Marven11/CVE-2024-28397
+- https://github.com/nomi-sec/PoC-in-GitHub
+
diff --git a/2024/CVE-2024-28423.md b/2024/CVE-2024-28423.md
new file mode 100644
index 0000000000..e18587da6b
--- /dev/null
+++ b/2024/CVE-2024-28423.md
@@ -0,0 +1,17 @@
+### [CVE-2024-28423](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28423)
+
+
+
+
+### Description
+
+Airflow-Diagrams v2.1.0 was discovered to contain an arbitrary file upload vulnerability in the unsafe_load function at cli.py. This vulnerability allows attackers to execute arbitrary code via uploading a crafted YML file.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/bayuncao/bayuncao
+
diff --git a/2024/CVE-2024-28424.md b/2024/CVE-2024-28424.md
new file mode 100644
index 0000000000..9007fd8c06
--- /dev/null
+++ b/2024/CVE-2024-28424.md
@@ -0,0 +1,17 @@
+### [CVE-2024-28424](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28424)
+
+
+
+
+### Description
+
+zenml v0.55.4 was discovered to contain an arbitrary file upload vulnerability in the load function at /materializers/cloudpickle_materializer.py. This vulnerability allows attackers to execute arbitrary code via uploading a crafted file.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/bayuncao/bayuncao
+
diff --git a/2024/CVE-2024-28425.md b/2024/CVE-2024-28425.md
new file mode 100644
index 0000000000..e47a23d932
--- /dev/null
+++ b/2024/CVE-2024-28425.md
@@ -0,0 +1,17 @@
+### [CVE-2024-28425](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28425)
+
+
+
+
+### Description
+
+greykite v1.0.0 was discovered to contain an arbitrary file upload vulnerability in the load_obj function at /templates/pickle_utils.py. This vulnerability allows attackers to execute arbitrary code via uploading a crafted file.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/bayuncao/bayuncao
+
diff --git a/2024/CVE-2024-28515.md b/2024/CVE-2024-28515.md
index 40d6ea8fc5..d2afb3fb12 100644
--- a/2024/CVE-2024-28515.md
+++ b/2024/CVE-2024-28515.md
@@ -13,5 +13,6 @@ Buffer Overflow vulnerability in CSAPP_Lab CSAPP Lab3 15-213 Fall 20xx allows a
- https://github.com/heshi906/CVE-2024-28515
#### Github
+- https://github.com/heshi906/CVE-2024-28515
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-28623.md b/2024/CVE-2024-28623.md
index 09fee81e1d..9498c1ddae 100644
--- a/2024/CVE-2024-28623.md
+++ b/2024/CVE-2024-28623.md
@@ -13,4 +13,5 @@ RiteCMS v3.0.0 was discovered to contain a cross-site scripting (XSS) vulnerabil
- https://github.com/GURJOTEXPERT/ritecms
#### Github
+- https://github.com/GURJOTEXPERT/ritecms
diff --git a/2024/CVE-2024-28715.md b/2024/CVE-2024-28715.md
index 9a847cf71c..680a4ffc52 100644
--- a/2024/CVE-2024-28715.md
+++ b/2024/CVE-2024-28715.md
@@ -13,6 +13,7 @@ Cross Site Scripting vulnerability in DOraCMS v.2.18 and before allows a remote
- https://github.com/Lq0ne/CVE-2024-28715
#### Github
+- https://github.com/Lq0ne/CVE-2024-28715
- https://github.com/NaInSec/CVE-LIST
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-28833.md b/2024/CVE-2024-28833.md
new file mode 100644
index 0000000000..b498b9fdd6
--- /dev/null
+++ b/2024/CVE-2024-28833.md
@@ -0,0 +1,17 @@
+### [CVE-2024-28833](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28833)
+
+
+
+
+### Description
+
+Improper restriction of excessive authentication attempts with two factor authentication methods in Checkmk 2.3 before 2.3.0p6 facilitates brute-forcing of second factor mechanisms.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/fkie-cad/nvd-json-data-feeds
+
diff --git a/2024/CVE-2024-28834.md b/2024/CVE-2024-28834.md
index 1440d0f742..03a7885eee 100644
--- a/2024/CVE-2024-28834.md
+++ b/2024/CVE-2024-28834.md
@@ -23,4 +23,5 @@ A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability
- https://github.com/GrigGM/05-virt-04-docker-hw
- https://github.com/NaInSec/CVE-LIST
- https://github.com/fkie-cad/nvd-json-data-feeds
+- https://github.com/m-pasima/CI-CD-Security-image-scan
diff --git a/2024/CVE-2024-28995.md b/2024/CVE-2024-28995.md
new file mode 100644
index 0000000000..94e400fad9
--- /dev/null
+++ b/2024/CVE-2024-28995.md
@@ -0,0 +1,20 @@
+### [CVE-2024-28995](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28995)
+
+
+&color=brighgreen)
+
+### Description
+
+SolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/enomothem/PenTestNote
+- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/tanjiti/sec_profile
+- https://github.com/wy876/POC
+
diff --git a/2024/CVE-2024-29057.md b/2024/CVE-2024-29057.md
index e7fd724904..634d425c89 100644
--- a/2024/CVE-2024-29057.md
+++ b/2024/CVE-2024-29057.md
@@ -1,7 +1,7 @@
### [CVE-2024-29057](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29057)
&color=blue)

-
+
### Description
diff --git a/2024/CVE-2024-29201.md b/2024/CVE-2024-29201.md
index bbd2c69a43..80e904fd09 100644
--- a/2024/CVE-2024-29201.md
+++ b/2024/CVE-2024-29201.md
@@ -13,6 +13,7 @@ JumpServer is an open source bastion host and an operation and maintenance secur
No PoCs from references.
#### Github
+- https://github.com/Threekiii/Awesome-POC
- https://github.com/enomothem/PenTestNote
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/tanjiti/sec_profile
diff --git a/2024/CVE-2024-29202.md b/2024/CVE-2024-29202.md
index 6f36b0265a..2c0d97ff95 100644
--- a/2024/CVE-2024-29202.md
+++ b/2024/CVE-2024-29202.md
@@ -13,6 +13,7 @@ JumpServer is an open source bastion host and an operation and maintenance secur
No PoCs from references.
#### Github
+- https://github.com/Threekiii/Awesome-POC
- https://github.com/enomothem/PenTestNote
- https://github.com/tanjiti/sec_profile
- https://github.com/wjlin0/poc-doc
diff --git a/2024/CVE-2024-29275.md b/2024/CVE-2024-29275.md
index 92a993b893..de03bbe97e 100644
--- a/2024/CVE-2024-29275.md
+++ b/2024/CVE-2024-29275.md
@@ -14,4 +14,5 @@ SQL injection vulnerability in SeaCMS version 12.9, allows remote unauthenticate
#### Github
- https://github.com/NaInSec/CVE-LIST
+- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-29296.md b/2024/CVE-2024-29296.md
index 6964b7a78f..784d53b99c 100644
--- a/2024/CVE-2024-29296.md
+++ b/2024/CVE-2024-29296.md
@@ -14,5 +14,6 @@ A user enumeration vulnerability was found in Portainer CE 2.19.4. This issue oc
#### Github
- https://github.com/Lavender-exe/CVE-2024-29296-PoC
+- https://github.com/ThaySolis/CVE-2024-29296
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-29368.md b/2024/CVE-2024-29368.md
index 11845ddce7..999c7e3af1 100644
--- a/2024/CVE-2024-29368.md
+++ b/2024/CVE-2024-29368.md
@@ -13,5 +13,6 @@ An arbitrary file upload vulnerability in the file handling module of moziloCMS
- https://github.com/becpn/mozilocms
#### Github
+- https://github.com/becpn/mozilocms
- https://github.com/fkie-cad/nvd-json-data-feeds
diff --git a/2024/CVE-2024-29375.md b/2024/CVE-2024-29375.md
index ad31f3ba7a..0013885b01 100644
--- a/2024/CVE-2024-29375.md
+++ b/2024/CVE-2024-29375.md
@@ -14,5 +14,6 @@ CSV Injection vulnerability in Addactis IBNRS v.3.10.3.107 allows a remote attac
#### Github
- https://github.com/c0rvane/CVE-2024-29375
+- https://github.com/ismailcemunver/CVE-2024-29375
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-29399.md b/2024/CVE-2024-29399.md
index 77fbe1acee..66e31125fe 100644
--- a/2024/CVE-2024-29399.md
+++ b/2024/CVE-2024-29399.md
@@ -13,5 +13,6 @@ An issue was discovered in GNU Savane v.3.13 and before, allows a remote attacke
- https://github.com/ally-petitt/CVE-2024-29399
#### Github
+- https://github.com/ally-petitt/CVE-2024-29399
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-29513.md b/2024/CVE-2024-29513.md
index 49250a2279..fe2cb2ad11 100644
--- a/2024/CVE-2024-29513.md
+++ b/2024/CVE-2024-29513.md
@@ -13,4 +13,5 @@ An issue in briscKernelDriver.sys in BlueRiSC WindowsSCOPE Cyber Forensics befor
- https://github.com/dru1d-foofus/briscKernelDriver
#### Github
+- https://github.com/dru1d-foofus/briscKernelDriver
diff --git a/2024/CVE-2024-29824.md b/2024/CVE-2024-29824.md
new file mode 100644
index 0000000000..adba7a63b4
--- /dev/null
+++ b/2024/CVE-2024-29824.md
@@ -0,0 +1,19 @@
+### [CVE-2024-29824](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29824)
+
+
+
+
+### Description
+
+An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/enomothem/PenTestNote
+- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/wy876/POC
+
diff --git a/2024/CVE-2024-29855.md b/2024/CVE-2024-29855.md
new file mode 100644
index 0000000000..80f7d1b210
--- /dev/null
+++ b/2024/CVE-2024-29855.md
@@ -0,0 +1,17 @@
+### [CVE-2024-29855](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29855)
+
+
+
+
+### Description
+
+Hard-coded JWT secret allows authentication bypass in Veeam Recovery Orchestrator
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/nomi-sec/PoC-in-GitHub
+
diff --git a/2024/CVE-2024-29972.md b/2024/CVE-2024-29972.md
index 12484517a4..97ff65341f 100644
--- a/2024/CVE-2024-29972.md
+++ b/2024/CVE-2024-29972.md
@@ -15,5 +15,5 @@
- https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/
#### Github
-No PoCs found on GitHub currently.
+- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-29973.md b/2024/CVE-2024-29973.md
index fa272948b8..d6f545139f 100644
--- a/2024/CVE-2024-29973.md
+++ b/2024/CVE-2024-29973.md
@@ -15,5 +15,6 @@
- https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/
#### Github
-No PoCs found on GitHub currently.
+- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/wy876/POC
diff --git a/2024/CVE-2024-3000.md b/2024/CVE-2024-3000.md
index 4e5f896371..f724c46f7e 100644
--- a/2024/CVE-2024-3000.md
+++ b/2024/CVE-2024-3000.md
@@ -11,6 +11,7 @@ A vulnerability classified as critical was found in code-projects Online Book Sy
#### Reference
- https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System%20-%20Authentication%20Bypass.md
+- https://vuldb.com/?id.258202
#### Github
- https://github.com/FoxyProxys/CVE-2024-3000
diff --git a/2024/CVE-2024-3003.md b/2024/CVE-2024-3003.md
index bcb03c96cc..419e0d9b18 100644
--- a/2024/CVE-2024-3003.md
+++ b/2024/CVE-2024-3003.md
@@ -11,6 +11,7 @@ A vulnerability has been found in code-projects Online Book System 1.0 and class
#### Reference
- https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%205.md
+- https://vuldb.com/?id.258205
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
diff --git a/2024/CVE-2024-30050.md b/2024/CVE-2024-30050.md
index 8b1f442342..c411c0af8a 100644
--- a/2024/CVE-2024-30050.md
+++ b/2024/CVE-2024-30050.md
@@ -38,7 +38,7 @@



-
+
### Description
diff --git a/2024/CVE-2024-30078.md b/2024/CVE-2024-30078.md
new file mode 100644
index 0000000000..39ea2e060c
--- /dev/null
+++ b/2024/CVE-2024-30078.md
@@ -0,0 +1,58 @@
+### [CVE-2024-30078](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30078)
+
+
+
+
+
+
+
+
+
+
+&color=blue)
+
+&color=blue)
+
+&color=blue)
+&color=blue)
+
+
+&color=blue)
+
+&color=blue)
+
+&color=blue)
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+### Description
+
+Windows Wi-Fi Driver Remote Code Execution Vulnerability
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/0xMarcio/cve
+- https://github.com/GhostTroops/TOP
+- https://github.com/enomothem/PenTestNote
+- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/stryngs/edgedressing
+
diff --git a/2024/CVE-2024-30080.md b/2024/CVE-2024-30080.md
new file mode 100644
index 0000000000..f53260361f
--- /dev/null
+++ b/2024/CVE-2024-30080.md
@@ -0,0 +1,54 @@
+### [CVE-2024-30080](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30080)
+
+
+
+
+
+
+
+
+
+
+&color=blue)
+
+&color=blue)
+
+&color=blue)
+&color=blue)
+
+
+&color=blue)
+
+&color=blue)
+
+&color=blue)
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+### Description
+
+Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/tanjiti/sec_profile
+
diff --git a/2024/CVE-2024-30212.md b/2024/CVE-2024-30212.md
new file mode 100644
index 0000000000..4bb476295d
--- /dev/null
+++ b/2024/CVE-2024-30212.md
@@ -0,0 +1,17 @@
+### [CVE-2024-30212](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30212)
+
+
+
+
+### Description
+
+If a SCSI READ(10) command is initiated via USB using the largest LBA (0xFFFFFFFF) with it's default block size of 512 and a count of 1,the first 512 byte of the 0x80000000 memory area is returned to the user. If the block count is increased, the full RAM can be exposed.The same method works to write to this memory area. If RAM contains pointers, those can be - depending on the application - overwritten toreturn data from any other offset including Progam and Boot Flash.
+
+### POC
+
+#### Reference
+- https://github.com/Fehr-GmbH/blackleak
+
+#### Github
+- https://github.com/nomi-sec/PoC-in-GitHub
+
diff --git a/2024/CVE-2024-30256.md b/2024/CVE-2024-30256.md
new file mode 100644
index 0000000000..1b4f528197
--- /dev/null
+++ b/2024/CVE-2024-30256.md
@@ -0,0 +1,17 @@
+### [CVE-2024-30256](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30256)
+
+
+&color=brighgreen)
+
+### Description
+
+Open WebUI is a user-friendly WebUI for LLMs. Open-webui is vulnerable to authenticated blind server-side request forgery. This vulnerability is fixed in 0.1.117.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/OrenGitHub/dhscanner
+
diff --git a/2024/CVE-2024-30270.md b/2024/CVE-2024-30270.md
new file mode 100644
index 0000000000..818c1a20ba
--- /dev/null
+++ b/2024/CVE-2024-30270.md
@@ -0,0 +1,17 @@
+### [CVE-2024-30270](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30270)
+
+
+&color=brighgreen)
+
+### Description
+
+mailcow: dockerized is an open source groupware/email suite based on docker. A security vulnerability has been identified in mailcow affecting versions prior to 2024-04. This vulnerability is a combination of path traversal and arbitrary code execution, specifically targeting the `rspamd_maps()` function. It allows authenticated admin users to overwrite any file writable by the www-data user by exploiting improper path validation. The exploit chain can lead to the execution of arbitrary commands on the server. Version 2024-04 contains a patch for the issue.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/nomi-sec/PoC-in-GitHub
+
diff --git a/2024/CVE-2024-30311.md b/2024/CVE-2024-30311.md
new file mode 100644
index 0000000000..ed160cbff3
--- /dev/null
+++ b/2024/CVE-2024-30311.md
@@ -0,0 +1,17 @@
+### [CVE-2024-30311](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30311)
+
+
+&color=brighgreen)
+
+### Description
+
+Acrobat Reader versions 20.005.30574, 24.002.20736 and earlier Answer: are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
+
+### POC
+
+#### Reference
+- https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1946
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-3032.md b/2024/CVE-2024-3032.md
new file mode 100644
index 0000000000..da1ff2c882
--- /dev/null
+++ b/2024/CVE-2024-3032.md
@@ -0,0 +1,17 @@
+### [CVE-2024-3032](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3032)
+
+
+&color=brighgreen)
+
+### Description
+
+Themify Builder WordPress plugin before 7.5.8 does not validate a parameter before redirecting the user to its value, leading to an Open Redirect issue
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/d130a60c-c36b-4994-9b0e-e52cd7f99387/
+
+#### Github
+- https://github.com/Chocapikk/My-CVEs
+
diff --git a/2024/CVE-2024-30848.md b/2024/CVE-2024-30848.md
new file mode 100644
index 0000000000..2c75411d4c
--- /dev/null
+++ b/2024/CVE-2024-30848.md
@@ -0,0 +1,17 @@
+### [CVE-2024-30848](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30848)
+
+
+
+
+### Description
+
+Cross-site scripting (XSS) vulnerability in SilverSky E-mail service version 5.0.3126 allows remote attackers to inject arbitrary web script or HTML via the version parameter.
+
+### POC
+
+#### Reference
+- https://github.com/Excis3/CVE-Disclosure/blob/main/CVE-2024-30848.md
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-30851.md b/2024/CVE-2024-30851.md
index 7dab4f05d7..7c66116c4a 100644
--- a/2024/CVE-2024-30851.md
+++ b/2024/CVE-2024-30851.md
@@ -13,6 +13,7 @@ Directory Traversal vulnerability in codesiddhant Jasmin Ransomware v.1.0.1 allo
- https://github.com/chebuya/CVE-2024-30851-jasmin-ransomware-path-traversal-poc
#### Github
+- https://github.com/chebuya/CVE-2024-30851-jasmin-ransomware-path-traversal-poc
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-3094.md b/2024/CVE-2024-3094.md
index 7350f152bd..7401d61991 100644
--- a/2024/CVE-2024-3094.md
+++ b/2024/CVE-2024-3094.md
@@ -9,8 +9,7 @@
### Description
-Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0.
-Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.
+Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0.
Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.
### POC
@@ -83,6 +82,7 @@ Through a series of complex obfuscations, the liblzma build process extracts a p
- https://github.com/drdry2/CVE-2024-3094-EXPLOIT
- https://github.com/duytruongpham/duytruongpham
- https://github.com/emirkmo/xz-backdoor-github
+- https://github.com/enomothem/PenTestNote
- https://github.com/felipecosta09/cve-2024-3094
- https://github.com/fevar54/Detectar-Backdoor-en-liblzma-de-XZ-utils-CVE-2024-3094-
- https://github.com/fkie-cad/nvd-json-data-feeds
diff --git a/2024/CVE-2024-3116.md b/2024/CVE-2024-3116.md
index 7cb8219531..d08d3bb1c2 100644
--- a/2024/CVE-2024-3116.md
+++ b/2024/CVE-2024-3116.md
@@ -15,6 +15,7 @@ No PoCs from references.
#### Github
- https://github.com/FoxyProxys/CVE-2024-3116
- https://github.com/TechieNeurons/CVE-2024-3116_RCE_in_pgadmin_8.4
+- https://github.com/enomothem/PenTestNote
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/tanjiti/sec_profile
diff --git a/2024/CVE-2024-31210.md b/2024/CVE-2024-31210.md
new file mode 100644
index 0000000000..2dc4116fcb
--- /dev/null
+++ b/2024/CVE-2024-31210.md
@@ -0,0 +1,17 @@
+### [CVE-2024-31210](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31210)
+
+
+
+
+### Description
+
+WordPress is an open publishing platform for the Web. It's possible for a file of a type other than a zip file to be submitted as a new plugin by an administrative user on the Plugins -> Add New -> Upload Plugin screen in WordPress. If FTP credentials are requested for installation (in order to move the file into place outside of the `uploads` directory) then the uploaded file remains temporary available in the Media Library despite it not being allowed. If the `DISALLOW_FILE_EDIT` constant is set to `true` on the site _and_ FTP credentials are required when uploading a new theme or plugin, then this technically allows an RCE when the user would otherwise have no means of executing arbitrary PHP code. This issue _only_ affects Administrator level users on single site installations, and Super Admin level users on Multisite installations where it's otherwise expected that the user does not have permission to upload or execute arbitrary PHP code. Lower level users are not affected. Sites where the `DISALLOW_FILE_MODS` constant is set to `true` are not affected. Sites where an administrative user either does not need to enter FTP credentials or they have access to the valid FTP credentials, are not affected. The issue was fixed in WordPress 6.4.3 on January 30, 2024 and backported to versions 6.3.3, 6.2.4, 6.1.5, 6.0.7, 5.9.9, 5.8.9, 5.7.11, 5.6.13, 5.5.14, 5.4.15, 5.3.17, 5.2.20, 5.1.18, 5.0.21, 4.9.25, 2.8.24, 4.7.28, 4.6.28, 4.5.31, 4.4.32, 4.3.33, 4.2.37, and 4.1.40. A workaround is available. If the `DISALLOW_FILE_MODS` constant is defined as `true` then it will not be possible for any user to upload a plugin and therefore this issue will not be exploitable.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/nomi-sec/PoC-in-GitHub
+
diff --git a/2024/CVE-2024-31217.md b/2024/CVE-2024-31217.md
new file mode 100644
index 0000000000..921bcb3151
--- /dev/null
+++ b/2024/CVE-2024-31217.md
@@ -0,0 +1,17 @@
+### [CVE-2024-31217](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31217)
+
+
+
+
+### Description
+
+Strapi is an open-source content management system. Prior to version 4.22.0, a denial-of-service vulnerability is present in the media upload process causing the server to crash without restarting, affecting either development and production environments. Usually, errors in the application cause it to log the error and keep it running for other clients. This behavior, in contrast, stops the server execution, making it unavailable for any clients until it's manually restarted. Any user with access to the file upload functionality is able to exploit this vulnerability, affecting applications running in both development mode and production mode as well. Users should upgrade @strapi/plugin-upload to version 4.22.0 to receive a patch.
+
+### POC
+
+#### Reference
+- https://github.com/strapi/strapi/security/advisories/GHSA-pm9q-xj9p-96pm
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-3148.md b/2024/CVE-2024-3148.md
index feb3f8b112..230c60764c 100644
--- a/2024/CVE-2024-3148.md
+++ b/2024/CVE-2024-3148.md
@@ -10,7 +10,7 @@ A vulnerability, which was classified as critical, has been found in DedeCMS 5.7
### POC
#### Reference
-No PoCs from references.
+- https://vuldb.com/?id.258923
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
diff --git a/2024/CVE-2024-31497.md b/2024/CVE-2024-31497.md
index fd614a554f..dba8897ec7 100644
--- a/2024/CVE-2024-31497.md
+++ b/2024/CVE-2024-31497.md
@@ -10,6 +10,7 @@ In PuTTY 0.68 through 0.80 before 0.81, biased ECDSA nonce generation allows an
### POC
#### Reference
+- https://github.com/daedalus/BreakingECDSAwithLLL
- https://securityonline.info/cve-2024-31497-critical-putty-vulnerability-exposes-private-keys-immediate-action-required/
- https://www.bleepingcomputer.com/news/security/putty-ssh-client-flaw-allows-recovery-of-cryptographic-private-keys/
@@ -17,6 +18,7 @@ In PuTTY 0.68 through 0.80 before 0.81, biased ECDSA nonce generation allows an
- https://github.com/HugoBond/CVE-2024-31497-POC
- https://github.com/PazDak/LoonSecurity
- https://github.com/ViktorNaum/CVE-2024-31497-POC
+- https://github.com/daedalus/BreakingECDSAwithLLL
- https://github.com/edutko/cve-2024-31497
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-31510.md b/2024/CVE-2024-31510.md
index 42afbc513c..647d65c1c1 100644
--- a/2024/CVE-2024-31510.md
+++ b/2024/CVE-2024-31510.md
@@ -14,4 +14,5 @@ An issue in Open Quantum Safe liboqs v.10.0 allows a remote attacker to escalate
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
+- https://github.com/liang-junkai/Fault-injection-of-ML-DSA
diff --git a/2024/CVE-2024-31586.md b/2024/CVE-2024-31586.md
new file mode 100644
index 0000000000..c8dca6e959
--- /dev/null
+++ b/2024/CVE-2024-31586.md
@@ -0,0 +1,17 @@
+### [CVE-2024-31586](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31586)
+
+
+
+
+### Description
+
+A Cross Site Scripting (XSS) vulnerability exists in Computer Laboratory Management System version 1.0. This vulnerability allows a remote attacker to execute arbitrary code via the Borrower Name, Department, and Remarks parameters.
+
+### POC
+
+#### Reference
+- https://github.com/CyberSentryX/CVE_Hunting/tree/main/CVE-2024-31586
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-31612.md b/2024/CVE-2024-31612.md
new file mode 100644
index 0000000000..ea80bd727b
--- /dev/null
+++ b/2024/CVE-2024-31612.md
@@ -0,0 +1,17 @@
+### [CVE-2024-31612](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31612)
+
+
+
+
+### Description
+
+Emlog pro2.3 is vulnerable to Cross Site Request Forgery (CSRF) via twitter.php which can be used with a XSS vulnerability to access administrator information.
+
+### POC
+
+#### Reference
+- https://github.com/ss122-0ss/cms/blob/main/emlog-csrf.md
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-31613.md b/2024/CVE-2024-31613.md
new file mode 100644
index 0000000000..437ca81078
--- /dev/null
+++ b/2024/CVE-2024-31613.md
@@ -0,0 +1,17 @@
+### [CVE-2024-31613](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31613)
+
+
+
+
+### Description
+
+BOSSCMS v3.10 is vulnerable to Cross Site Request Forgery (CSRF) in name="head_code" or name="foot_code."
+
+### POC
+
+#### Reference
+- https://github.com/ss122-0ss/BOSSCMS/blob/main/bosscms%20csrf.md
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-31777.md b/2024/CVE-2024-31777.md
new file mode 100644
index 0000000000..b6467fef36
--- /dev/null
+++ b/2024/CVE-2024-31777.md
@@ -0,0 +1,18 @@
+### [CVE-2024-31777](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31777)
+
+
+
+
+### Description
+
+File Upload vulnerability in openeclass v.3.15 and before allows an attacker to execute arbitrary code via a crafted file to the certbadge.php endpoint.
+
+### POC
+
+#### Reference
+- https://github.com/FreySolarEye/Exploit-CVE-2024-31777
+
+#### Github
+- https://github.com/FreySolarEye/Exploit-CVE-2024-31777
+- https://github.com/nomi-sec/PoC-in-GitHub
+
diff --git a/2024/CVE-2024-31819.md b/2024/CVE-2024-31819.md
index c6d86c6376..85d046479f 100644
--- a/2024/CVE-2024-31819.md
+++ b/2024/CVE-2024-31819.md
@@ -14,6 +14,7 @@ An issue in WWBN AVideo v.12.4 through v.14.2 allows a remote attacker to execut
- https://github.com/Chocapikk/CVE-2024-31819
#### Github
+- https://github.com/Chocapikk/CVE-2024-31819
- https://github.com/Chocapikk/My-CVEs
- https://github.com/Jhonsonwannaa/CVE-2024-31819
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-31861.md b/2024/CVE-2024-31861.md
index 6d5b6905b4..a442273d3c 100644
--- a/2024/CVE-2024-31861.md
+++ b/2024/CVE-2024-31861.md
@@ -1,11 +1,11 @@
### [CVE-2024-31861](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31861)
-
-
-&color=brighgreen)
+
+
+
### Description
-Improper Control of Generation of Code ('Code Injection') vulnerability in Apache Zeppelin.The attackers can use Shell interpreter as a code generation gateway, and execute the generated code as a normal way.This issue affects Apache Zeppelin: from 0.10.1 before 0.11.1.Users are recommended to upgrade to version 0.11.1, which doesn't have Shell interpreter by default.
+** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
### POC
@@ -13,5 +13,6 @@ Improper Control of Generation of Code ('Code Injection') vulnerability in Apach
No PoCs from references.
#### Github
+- https://github.com/enomothem/PenTestNote
- https://github.com/tanjiti/sec_profile
diff --git a/2024/CVE-2024-31982.md b/2024/CVE-2024-31982.md
new file mode 100644
index 0000000000..b3999cbe30
--- /dev/null
+++ b/2024/CVE-2024-31982.md
@@ -0,0 +1,17 @@
+### [CVE-2024-31982](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31982)
+
+
+&color=brighgreen)
+
+### Description
+
+XWiki Platform is a generic wiki platform. Starting in version 2.4-milestone-1 and prior to versions 4.10.20, 15.5.4, and 15.10-rc-1, XWiki's database search allows remote code execution through the search text. This allows remote code execution for any visitor of a public wiki or user of a closed wiki as the database search is by default accessible for all users. This impacts the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.20, 15.5.4 and 15.10RC1. As a workaround, one may manually apply the patch to the page `Main.DatabaseSearch`. Alternatively, unless database search is explicitly used by users, this page can be deleted as this is not the default search interface of XWiki.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/tanjiti/sec_profile
+
diff --git a/2024/CVE-2024-32002.md b/2024/CVE-2024-32002.md
index 5f3e301fcf..79d53df57a 100644
--- a/2024/CVE-2024-32002.md
+++ b/2024/CVE-2024-32002.md
@@ -14,6 +14,7 @@ Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42
No PoCs from references.
#### Github
+- https://github.com/0xMarcio/cve
- https://github.com/10cks/CVE-2024-32002-EXP
- https://github.com/10cks/CVE-2024-32002-POC
- https://github.com/10cks/CVE-2024-32002-hulk
@@ -73,6 +74,7 @@ No PoCs from references.
- https://github.com/markuta/CVE-2024-32002
- https://github.com/markuta/hooky
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/p1tsi/misc
- https://github.com/pkjmesra/PKScreener
- https://github.com/safebuffer/CVE-2024-32002
- https://github.com/sampsonv/github-trending
diff --git a/2024/CVE-2024-32022.md b/2024/CVE-2024-32022.md
index e9f63d3924..339af3d267 100644
--- a/2024/CVE-2024-32022.md
+++ b/2024/CVE-2024-32022.md
@@ -13,5 +13,5 @@ Kohya_ss is a GUI for Kohya's Stable Diffusion trainers. Kohya_ss is vulnerable
- https://securitylab.github.com/advisories/GHSL-2024-019_GHSL-2024-024_kohya_ss
#### Github
-No PoCs found on GitHub currently.
+- https://github.com/OrenGitHub/dhscanner
diff --git a/2024/CVE-2024-32113.md b/2024/CVE-2024-32113.md
index 2abd76d02b..c104b16970 100644
--- a/2024/CVE-2024-32113.md
+++ b/2024/CVE-2024-32113.md
@@ -17,6 +17,7 @@ No PoCs from references.
- https://github.com/Ostorlab/KEV
- https://github.com/Threekiii/CVE
- https://github.com/absholi7ly/Apache-OFBiz-Directory-Traversal-exploit
+- https://github.com/enomothem/PenTestNote
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/tanjiti/sec_profile
diff --git a/2024/CVE-2024-32114.md b/2024/CVE-2024-32114.md
index 6024bd153c..a2af05da12 100644
--- a/2024/CVE-2024-32114.md
+++ b/2024/CVE-2024-32114.md
@@ -14,5 +14,6 @@ No PoCs from references.
#### Github
- https://github.com/Threekiii/CVE
+- https://github.com/enomothem/PenTestNote
- https://github.com/tanjiti/sec_profile
diff --git a/2024/CVE-2024-32167.md b/2024/CVE-2024-32167.md
new file mode 100644
index 0000000000..d839bc8df3
--- /dev/null
+++ b/2024/CVE-2024-32167.md
@@ -0,0 +1,17 @@
+### [CVE-2024-32167](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32167)
+
+
+
+
+### Description
+
+Sourcecodester Online Medicine Ordering System 1.0 is vulnerable to Arbitrary file deletion vulnerability as the backend settings have the function of deleting pictures to delete any files.
+
+### POC
+
+#### Reference
+- https://github.com/ss122-0ss/cms/blob/main/omos.md
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-3221.md b/2024/CVE-2024-3221.md
new file mode 100644
index 0000000000..1986ed84d1
--- /dev/null
+++ b/2024/CVE-2024-3221.md
@@ -0,0 +1,17 @@
+### [CVE-2024-3221](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3221)
+
+
+
+
+### Description
+
+A vulnerability classified as critical was found in SourceCodester PHP Task Management System 1.0. This vulnerability affects unknown code of the file attendance-info.php. The manipulation of the argument user_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-259066 is the identifier assigned to this vulnerability.
+
+### POC
+
+#### Reference
+- https://vuldb.com/?id.259066
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-32258.md b/2024/CVE-2024-32258.md
index 367dce8316..22b52d51cc 100644
--- a/2024/CVE-2024-32258.md
+++ b/2024/CVE-2024-32258.md
@@ -15,5 +15,6 @@ The network server of fceux 2.7.0 has a path traversal vulnerability, allowing a
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
+- https://github.com/liyansong2018/CVE-2024-32258
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-32337.md b/2024/CVE-2024-32337.md
index 836efe9e85..1b0fa19f71 100644
--- a/2024/CVE-2024-32337.md
+++ b/2024/CVE-2024-32337.md
@@ -13,4 +13,5 @@ A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS
- https://github.com/adiapera/xss_security_wondercms_3.4.3
#### Github
+- https://github.com/adiapera/xss_security_wondercms_3.4.3
diff --git a/2024/CVE-2024-32338.md b/2024/CVE-2024-32338.md
index 3817a9c8b1..215cf522f7 100644
--- a/2024/CVE-2024-32338.md
+++ b/2024/CVE-2024-32338.md
@@ -13,4 +13,5 @@ A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS
- https://github.com/adiapera/xss_current_page_wondercms_3.4.3
#### Github
+- https://github.com/adiapera/xss_current_page_wondercms_3.4.3
diff --git a/2024/CVE-2024-32339.md b/2024/CVE-2024-32339.md
index 2957d6a8ca..a60152db57 100644
--- a/2024/CVE-2024-32339.md
+++ b/2024/CVE-2024-32339.md
@@ -13,4 +13,5 @@ Multiple cross-site scripting (XSS) vulnerabilities in the HOW TO page of Wonder
- https://github.com/adiapera/xss_how_to_page_wondercms_3.4.3
#### Github
+- https://github.com/adiapera/xss_how_to_page_wondercms_3.4.3
diff --git a/2024/CVE-2024-32340.md b/2024/CVE-2024-32340.md
index 6e997b9776..244bd6a9f2 100644
--- a/2024/CVE-2024-32340.md
+++ b/2024/CVE-2024-32340.md
@@ -13,4 +13,5 @@ A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS
- https://github.com/adiapera/xss_menu_page_wondercms_3.4.3
#### Github
+- https://github.com/adiapera/xss_menu_page_wondercms_3.4.3
diff --git a/2024/CVE-2024-32341.md b/2024/CVE-2024-32341.md
index 01f3714ec9..91417b5886 100644
--- a/2024/CVE-2024-32341.md
+++ b/2024/CVE-2024-32341.md
@@ -13,4 +13,5 @@ Multiple cross-site scripting (XSS) vulnerabilities in the Home page of WonderCM
- https://github.com/adiapera/xss_home_page_wondercms_3.4.3
#### Github
+- https://github.com/adiapera/xss_home_page_wondercms_3.4.3
diff --git a/2024/CVE-2024-32342.md b/2024/CVE-2024-32342.md
index f3d8100314..77f3c9492f 100644
--- a/2024/CVE-2024-32342.md
+++ b/2024/CVE-2024-32342.md
@@ -13,4 +13,5 @@ A cross-site scripting (XSS) vulnerability in the Create Page of Boid CMS v2.1.0
- https://github.com/adiapera/xss_create_boidcms_2.1.0
#### Github
+- https://github.com/adiapera/xss_create_boidcms_2.1.0
diff --git a/2024/CVE-2024-32343.md b/2024/CVE-2024-32343.md
index a0f139578f..86df11ea9a 100644
--- a/2024/CVE-2024-32343.md
+++ b/2024/CVE-2024-32343.md
@@ -13,4 +13,5 @@ A cross-site scripting (XSS) vulnerability in the Create Page of Boid CMS v2.1.0
- https://github.com/adiapera/xss_create2_boidcms_2.1.0
#### Github
+- https://github.com/adiapera/xss_create2_boidcms_2.1.0
diff --git a/2024/CVE-2024-32345.md b/2024/CVE-2024-32345.md
index bec70fa7c4..f59311b7de 100644
--- a/2024/CVE-2024-32345.md
+++ b/2024/CVE-2024-32345.md
@@ -13,4 +13,5 @@ A cross-site scripting (XSS) vulnerability in the Settings menu of CMSimple v5.1
- https://github.com/adiapera/xss_language_cmsimple_5.15
#### Github
+- https://github.com/adiapera/xss_language_cmsimple_5.15
diff --git a/2024/CVE-2024-3236.md b/2024/CVE-2024-3236.md
new file mode 100644
index 0000000000..0ffe92f485
--- /dev/null
+++ b/2024/CVE-2024-3236.md
@@ -0,0 +1,17 @@
+### [CVE-2024-3236](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3236)
+
+
+&color=brighgreen)
+
+### Description
+
+The Popup Builder WordPress plugin before 1.1.33 does not sanitise and escape some of its Notification fields, which could allow users such as contributor and above to perform Stored Cross-Site Scripting attacks.
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/a6c2da28-dc03-4bcc-a6c3-ee55a73861db/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-32369.md b/2024/CVE-2024-32369.md
index b794565ee4..b597784578 100644
--- a/2024/CVE-2024-32369.md
+++ b/2024/CVE-2024-32369.md
@@ -13,6 +13,7 @@ SQL Injection vulnerability in HSC Cybersecurity HC Mailinspector 5.2.17-3 throu
- https://github.com/chucrutis/CVE-2024-32369
#### Github
+- https://github.com/chucrutis/CVE-2024-32369
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-3244.md b/2024/CVE-2024-3244.md
index a0e6b8ecfb..4285822553 100644
--- a/2024/CVE-2024-3244.md
+++ b/2024/CVE-2024-3244.md
@@ -5,8 +5,7 @@
### Description
-The EmbedPress – Embed PDF, Google Docs, Vimeo, Wistia, Embed YouTube Videos, Audios, Maps & Embed Any Documents in Gutenberg & Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's
-'embedpress_calendar' shortcode in all versions up to, and including, 3.9.14 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
+The EmbedPress – Embed PDF, Google Docs, Vimeo, Wistia, Embed YouTube Videos, Audios, Maps & Embed Any Documents in Gutenberg & Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's
'embedpress_calendar' shortcode in all versions up to, and including, 3.9.14 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
### POC
diff --git a/2024/CVE-2024-3273.md b/2024/CVE-2024-3273.md
index 943d790a26..398491e337 100644
--- a/2024/CVE-2024-3273.md
+++ b/2024/CVE-2024-3273.md
@@ -16,6 +16,7 @@
No PoCs from references.
#### Github
+- https://github.com/0xMarcio/cve
- https://github.com/Chocapikk/CVE-2024-3273
- https://github.com/GhostTroops/TOP
- https://github.com/K3ysTr0K3R/CVE-2024-3273-EXPLOIT
diff --git a/2024/CVE-2024-32743.md b/2024/CVE-2024-32743.md
index c18f22112b..5254e093d4 100644
--- a/2024/CVE-2024-32743.md
+++ b/2024/CVE-2024-32743.md
@@ -13,4 +13,5 @@ A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS
- https://github.com/adiapera/xss_security_wondercms_3.4.3
#### Github
+- https://github.com/adiapera/xss_security_wondercms_3.4.3
diff --git a/2024/CVE-2024-32744.md b/2024/CVE-2024-32744.md
index c1f3ae47a4..6ec620123a 100644
--- a/2024/CVE-2024-32744.md
+++ b/2024/CVE-2024-32744.md
@@ -13,4 +13,5 @@ A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS
- https://github.com/adiapera/xss_current_page_wondercms_3.4.3
#### Github
+- https://github.com/adiapera/xss_current_page_wondercms_3.4.3
diff --git a/2024/CVE-2024-32745.md b/2024/CVE-2024-32745.md
index 23e9e4b7d1..a39c301976 100644
--- a/2024/CVE-2024-32745.md
+++ b/2024/CVE-2024-32745.md
@@ -13,4 +13,5 @@ A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS
- https://github.com/adiapera/xss_current_page_wondercms_3.4.3
#### Github
+- https://github.com/adiapera/xss_current_page_wondercms_3.4.3
diff --git a/2024/CVE-2024-32746.md b/2024/CVE-2024-32746.md
index ebd7a80613..9eb55c74ad 100644
--- a/2024/CVE-2024-32746.md
+++ b/2024/CVE-2024-32746.md
@@ -13,4 +13,5 @@ A cross-site scripting (XSS) vulnerability in the Settings section of WonderCMS
- https://github.com/adiapera/xss_menu_page_wondercms_3.4.3
#### Github
+- https://github.com/adiapera/xss_menu_page_wondercms_3.4.3
diff --git a/2024/CVE-2024-3276.md b/2024/CVE-2024-3276.md
new file mode 100644
index 0000000000..f8336d1f53
--- /dev/null
+++ b/2024/CVE-2024-3276.md
@@ -0,0 +1,18 @@
+### [CVE-2024-3276](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3276)
+
+
+
+&color=brighgreen)
+
+### Description
+
+The Lightbox & Modal Popup WordPress Plugin WordPress plugin before 2.7.28, foobox-image-lightbox-premium WordPress plugin before 2.7.28 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/996d3247-ebdd-49d1-a1a3-ceedcf9f2f95/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-33253.md b/2024/CVE-2024-33253.md
new file mode 100644
index 0000000000..c31388401d
--- /dev/null
+++ b/2024/CVE-2024-33253.md
@@ -0,0 +1,17 @@
+### [CVE-2024-33253](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33253)
+
+
+
+
+### Description
+
+Cross-site scripting (XSS) vulnerability in GUnet OpenEclass E-learning Platform version 3.15 and before allows a authenticated privileged attacker to execute arbitrary code via the title and description fields of the badge template editing function.
+
+### POC
+
+#### Reference
+- https://github.com/FreySolarEye/CVE/blob/master/GUnet%20OpenEclass%20E-learning%20platform%203.15%20-%20'certbadge.php'%20Stored%20Cross%20Site%20Scripting
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-33373.md b/2024/CVE-2024-33373.md
new file mode 100644
index 0000000000..67b07c5cb6
--- /dev/null
+++ b/2024/CVE-2024-33373.md
@@ -0,0 +1,17 @@
+### [CVE-2024-33373](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33373)
+
+
+
+
+### Description
+
+An issue in the LB-LINK BL-W1210M v2.0 router allows attackers to bypass password complexity requirements and set single digit passwords for authentication. This vulnerability can allow attackers to access the router via a brute-force attack.
+
+### POC
+
+#### Reference
+- https://github.com/ShravanSinghRathore/Security-Advisory-Multiple-Vulnerabilities-in-LB-link-BL-W1210M-Router/wiki/Password-Policy-Bypass--%7C--Inconsistent-Password-Policy-(CVE%E2%80%902024%E2%80%9033373)
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-33374.md b/2024/CVE-2024-33374.md
new file mode 100644
index 0000000000..fbfcd43cbb
--- /dev/null
+++ b/2024/CVE-2024-33374.md
@@ -0,0 +1,17 @@
+### [CVE-2024-33374](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33374)
+
+
+
+
+### Description
+
+Incorrect access control in the UART/Serial interface on the LB-LINK BL-W1210M v2.0 router allows attackers to access the root terminal without authentication.
+
+### POC
+
+#### Reference
+- https://github.com/ShravanSinghRathore/Security-Advisory-Multiple-Vulnerabilities-in-LB-link-BL-W1210M-Router/wiki/Incorrect-Access-Control-(CVE%E2%80%902024%E2%80%9033374)
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-33377.md b/2024/CVE-2024-33377.md
new file mode 100644
index 0000000000..7c0d171ff0
--- /dev/null
+++ b/2024/CVE-2024-33377.md
@@ -0,0 +1,17 @@
+### [CVE-2024-33377](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33377)
+
+
+
+
+### Description
+
+LB-LINK BL-W1210M v2.0 was discovered to contain a clickjacking vulnerability via the Administrator login page. Attackers can cause victim users to perform arbitrary operations via interaction with crafted elements on the web page.
+
+### POC
+
+#### Reference
+- https://github.com/ShravanSinghRathore/Security-Advisory-Multiple-Vulnerabilities-in-LB-link-BL-W1210M-Router/wiki/Clickjacking-(CVE%E2%80%902024%E2%80%9033377)
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-33423.md b/2024/CVE-2024-33423.md
index e9c5dcb97b..0af6b81ad6 100644
--- a/2024/CVE-2024-33423.md
+++ b/2024/CVE-2024-33423.md
@@ -13,4 +13,5 @@ Cross-Site Scripting (XSS) vulnerability in the Settings menu of CMSimple v5.15
- https://github.com/adiapera/xss_language_cmsimple_5.15
#### Github
+- https://github.com/adiapera/xss_language_cmsimple_5.15
diff --git a/2024/CVE-2024-33424.md b/2024/CVE-2024-33424.md
index 2830422e64..8cc2942f8b 100644
--- a/2024/CVE-2024-33424.md
+++ b/2024/CVE-2024-33424.md
@@ -13,4 +13,5 @@ A cross-site scripting (XSS) vulnerability in the Settings menu of CMSimple v5.1
- https://github.com/adiapera/xss_language_cmsimple_5.15
#### Github
+- https://github.com/adiapera/xss_language_cmsimple_5.15
diff --git a/2024/CVE-2024-33438.md b/2024/CVE-2024-33438.md
index b2d194ddc0..bf6e4905e9 100644
--- a/2024/CVE-2024-33438.md
+++ b/2024/CVE-2024-33438.md
@@ -13,5 +13,6 @@ File Upload vulnerability in CubeCart before 6.5.5 allows an authenticated user
- https://github.com/julio-cfa/CVE-2024-33438
#### Github
+- https://github.com/julio-cfa/CVE-2024-33438
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-3400.md b/2024/CVE-2024-3400.md
index db88513dd9..0bdf7f2a60 100644
--- a/2024/CVE-2024-3400.md
+++ b/2024/CVE-2024-3400.md
@@ -18,6 +18,7 @@ A command injection as a result of arbitrary file creation vulnerability in the
#### Github
- https://github.com/0x0d3ad/CVE-2024-3400
+- https://github.com/0xMarcio/cve
- https://github.com/0xr2r/CVE-2024-3400-Palo-Alto-OS-Command-Injection
- https://github.com/AdaniKamal/CVE-2024-3400
- https://github.com/CONDITIONBLACK/CVE-2024-3400-POC
@@ -43,6 +44,7 @@ A command injection as a result of arbitrary file creation vulnerability in the
- https://github.com/andrelia-hacks/CVE-2024-3400
- https://github.com/aneasystone/github-trending
- https://github.com/codeblueprint/CVE-2024-3400
+- https://github.com/enomothem/PenTestNote
- https://github.com/fatguru/dorks
- https://github.com/fireinrain/github-trending
- https://github.com/fkie-cad/nvd-json-data-feeds
diff --git a/2024/CVE-2024-34058.md b/2024/CVE-2024-34058.md
index 8057b5a609..166eb7b594 100644
--- a/2024/CVE-2024-34058.md
+++ b/2024/CVE-2024-34058.md
@@ -10,6 +10,7 @@ The WebTop package for NethServer 7 and 8 allows stored XSS (for example, via th
### POC
#### Reference
+- http://www.openwall.com/lists/oss-security/2024/05/16/3
- https://www.openwall.com/lists/oss-security/2024/05/16/3
#### Github
diff --git a/2024/CVE-2024-34220.md b/2024/CVE-2024-34220.md
index 222a4d66ad..736bb98a77 100644
--- a/2024/CVE-2024-34220.md
+++ b/2024/CVE-2024-34220.md
@@ -13,6 +13,7 @@ Sourcecodester Human Resource Management System 1.0 is vulnerable to SQL Injecti
- https://github.com/dovankha/CVE-2024-34220
#### Github
+- https://github.com/dovankha/CVE-2024-34220
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/tanjiti/sec_profile
diff --git a/2024/CVE-2024-34221.md b/2024/CVE-2024-34221.md
index 7932ad3285..1b5e694728 100644
--- a/2024/CVE-2024-34221.md
+++ b/2024/CVE-2024-34221.md
@@ -13,5 +13,6 @@ Sourcecodester Human Resource Management System 1.0 is vulnerable to Insecure Pe
- https://github.com/dovankha/CVE-2024-34221
#### Github
+- https://github.com/dovankha/CVE-2024-34221
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-34222.md b/2024/CVE-2024-34222.md
index 28f80721e2..a2bc20704a 100644
--- a/2024/CVE-2024-34222.md
+++ b/2024/CVE-2024-34222.md
@@ -13,5 +13,6 @@ Sourcecodester Human Resource Management System 1.0 is vulnerable to SQL Injecti
- https://github.com/dovankha/CVE-2024-34222
#### Github
+- https://github.com/dovankha/CVE-2024-34222
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-34223.md b/2024/CVE-2024-34223.md
index eeee69d81a..916afe6f2a 100644
--- a/2024/CVE-2024-34223.md
+++ b/2024/CVE-2024-34223.md
@@ -13,5 +13,6 @@ Insecure permission vulnerability in /hrm/leaverequest.php in SourceCodester Hum
- https://github.com/dovankha/CVE-2024-34223
#### Github
+- https://github.com/dovankha/CVE-2024-34223
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-34224.md b/2024/CVE-2024-34224.md
index 703d079e47..a22e5799b1 100644
--- a/2024/CVE-2024-34224.md
+++ b/2024/CVE-2024-34224.md
@@ -13,5 +13,6 @@ Cross Site Scripting vulnerability in /php-lms/classes/Users.php?f=save in Compu
- https://github.com/dovankha/CVE-2024-34224
#### Github
+- https://github.com/dovankha/CVE-2024-34224
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-34225.md b/2024/CVE-2024-34225.md
index 44d06bf0d5..cd5ccebfc6 100644
--- a/2024/CVE-2024-34225.md
+++ b/2024/CVE-2024-34225.md
@@ -13,5 +13,6 @@ Cross Site Scripting vulnerability in php-lms/admin/?page=system_info in Compute
- https://github.com/dovankha/CVE-2024-34225
#### Github
+- https://github.com/dovankha/CVE-2024-34225
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-34226.md b/2024/CVE-2024-34226.md
index 1d977926f7..8dcdca229b 100644
--- a/2024/CVE-2024-34226.md
+++ b/2024/CVE-2024-34226.md
@@ -13,5 +13,6 @@ SQL injection vulnerability in /php-sqlite-vms/?page=manage_visitor&id=1 in Sour
- https://github.com/dovankha/CVE-2024-34226
#### Github
+- https://github.com/dovankha/CVE-2024-34226
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-34332.md b/2024/CVE-2024-34332.md
new file mode 100644
index 0000000000..bb8a991164
--- /dev/null
+++ b/2024/CVE-2024-34332.md
@@ -0,0 +1,17 @@
+### [CVE-2024-34332](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34332)
+
+
+
+
+### Description
+
+An issue in SiSoftware SANDRA v31.66 (SANDRA.sys 15.18.1.1) and before allows an attacker to escalate privileges via a crafted buffer sent to the Kernel Driver using the DeviceIoControl Windows API.
+
+### POC
+
+#### Reference
+- https://belong2yourself.github.io/vulnerabilities/docs/SANDRA/Elevation-of-Privileges/readme/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-34452.md b/2024/CVE-2024-34452.md
new file mode 100644
index 0000000000..a20ff1e7f9
--- /dev/null
+++ b/2024/CVE-2024-34452.md
@@ -0,0 +1,18 @@
+### [CVE-2024-34452](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34452)
+
+
+
+
+### Description
+
+CMSimple_XH 1.7.6 allows XSS by uploading a crafted SVG document.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/surajhacx/CVE-2024-34452
+
diff --git a/2024/CVE-2024-34467.md b/2024/CVE-2024-34467.md
index 39d0cd3eca..7c6e797589 100644
--- a/2024/CVE-2024-34467.md
+++ b/2024/CVE-2024-34467.md
@@ -5,7 +5,7 @@
### Description
-ThinkPHP 8.0.3 allows remote attackers to discover the PHPSESSION cookie because think_exception.tpl (aka the debug error output source code) provides this in an error message for a crafted URI in a GET request.
+ThinkPHP 8.0.3 allows remote attackers to exploit XSS due to inadequate filtering of function argument values in think_exception.tpl.
### POC
diff --git a/2024/CVE-2024-34470.md b/2024/CVE-2024-34470.md
index cda6d4a489..6c2b3ce74f 100644
--- a/2024/CVE-2024-34470.md
+++ b/2024/CVE-2024-34470.md
@@ -15,6 +15,7 @@ An issue was discovered in HSC Mailinspector 5.2.17-3 through v.5.2.18. An Unaut
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/osvaldotenorio/CVE-2024-34470
- https://github.com/wy876/POC
- https://github.com/wy876/wiki
diff --git a/2024/CVE-2024-34471.md b/2024/CVE-2024-34471.md
index 675720faff..c5d0c3296e 100644
--- a/2024/CVE-2024-34471.md
+++ b/2024/CVE-2024-34471.md
@@ -15,4 +15,5 @@ An issue was discovered in HSC Mailinspector 5.2.17-3. A Path Traversal vulnerab
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/osvaldotenorio/CVE-2024-34471
diff --git a/2024/CVE-2024-34472.md b/2024/CVE-2024-34472.md
index c43bd56ff0..a48b661d38 100644
--- a/2024/CVE-2024-34472.md
+++ b/2024/CVE-2024-34472.md
@@ -15,4 +15,5 @@ An issue was discovered in HSC Mailinspector 5.2.17-3 through v.5.2.18. An authe
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/osvaldotenorio/CVE-2024-34472
diff --git a/2024/CVE-2024-34582.md b/2024/CVE-2024-34582.md
index dff0b4bc0c..30edffc307 100644
--- a/2024/CVE-2024-34582.md
+++ b/2024/CVE-2024-34582.md
@@ -15,4 +15,5 @@ Sunhillo SureLine through 8.10.0 on RICI 5000 devices allows cgi/usrPasswd.cgi u
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/silent6trinity/CVE-2024-34582
diff --git a/2024/CVE-2024-34694.md b/2024/CVE-2024-34694.md
new file mode 100644
index 0000000000..9bc5f6bdf6
--- /dev/null
+++ b/2024/CVE-2024-34694.md
@@ -0,0 +1,17 @@
+### [CVE-2024-34694](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34694)
+
+
+
+
+### Description
+
+LNbits is a Lightning wallet and accounts system. Paying invoices in Eclair that do not get settled within the internal timeout (about 30s) lead to a payment being considered failed, even though it may still be in flight. This vulnerability can lead to a total loss of funds for the node backend. This vulnerability is fixed in 0.12.6.
+
+### POC
+
+#### Reference
+- https://github.com/lnbits/lnbits/security/advisories/GHSA-3j4h-h3fp-vwww
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-34833.md b/2024/CVE-2024-34833.md
new file mode 100644
index 0000000000..7804a7e185
--- /dev/null
+++ b/2024/CVE-2024-34833.md
@@ -0,0 +1,18 @@
+### [CVE-2024-34833](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34833)
+
+
+
+
+### Description
+
+Sourcecodester Payroll Management System v1.0 is vulnerable to File Upload. Users can upload images via the "save_settings" page. An unauthenticated attacker can leverage this functionality to upload a malicious PHP file instead. Successful exploitation of this vulnerability results in the ability to execute arbitrary code as the user running the web server.
+
+### POC
+
+#### Reference
+- https://github.com/ShellUnease/payroll-management-system-rce
+- https://packetstormsecurity.com/files/179106/Payroll-Management-System-1.0-Remote-Code-Execution.html
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-34987.md b/2024/CVE-2024-34987.md
index 784c5aea73..092edbb938 100644
--- a/2024/CVE-2024-34987.md
+++ b/2024/CVE-2024-34987.md
@@ -11,6 +11,7 @@ A SQL Injection vulnerability exists in the `ofrs/admin/index.php` script of PHP
#### Reference
- https://github.com/MarkLee131/PoCs/blob/main/CVE-2024-34987.md
+- https://www.exploit-db.com/exploits/51989
#### Github
- https://github.com/MarkLee131/PoCs
diff --git a/2024/CVE-2024-34989.md b/2024/CVE-2024-34989.md
new file mode 100644
index 0000000000..f0b61ac268
--- /dev/null
+++ b/2024/CVE-2024-34989.md
@@ -0,0 +1,17 @@
+### [CVE-2024-34989](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34989)
+
+
+
+
+### Description
+
+In the module RSI PDF/HTML catalog evolution (prestapdf) <= 7.0.0 from RSI for PrestaShop, a guest can perform SQL injection via `PrestaPDFProductListModuleFrontController::queryDb().'
+
+### POC
+
+#### Reference
+- https://security.friendsofpresta.org/modules/2024/06/20/prestapdf.html
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-34997.md b/2024/CVE-2024-34997.md
index c93f2e05ab..8dfa8fbcca 100644
--- a/2024/CVE-2024-34997.md
+++ b/2024/CVE-2024-34997.md
@@ -5,7 +5,7 @@
### Description
-joblib v1.4.2 was discovered to contain a deserialization vulnerability via the component joblib.numpy_pickle::NumpyArrayWrapper().read_array().
+** DISPUTED ** joblib v1.4.2 was discovered to contain a deserialization vulnerability via the component joblib.numpy_pickle::NumpyArrayWrapper().read_array(). NOTE: this is disputed by the supplier because NumpyArrayWrapper is only used during caching of trusted content.
### POC
diff --git a/2024/CVE-2024-35235.md b/2024/CVE-2024-35235.md
new file mode 100644
index 0000000000..c479e8ca19
--- /dev/null
+++ b/2024/CVE-2024-35235.md
@@ -0,0 +1,19 @@
+### [CVE-2024-35235](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35235)
+
+
+
+&color=brighgreen)
+
+### Description
+
+OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.8 and earlier, when starting the cupsd server with a Listen configuration item pointing to a symbolic link, the cupsd process can be caused to perform an arbitrary chmod of the provided argument, providing world-writable access to the target. Given that cupsd is often running as root, this can result in the change of permission of any user or system files to be world writable. Given the aforementioned Ubuntu AppArmor context, on such systems this vulnerability is limited to those files modifiable by the cupsd process. In that specific case it was found to be possible to turn the configuration of the Listen argument into full control over the cupsd.conf and cups-files.conf configuration files. By later setting the User and Group arguments in cups-files.conf, and printing with a printer configured by PPD with a `FoomaticRIPCommandLine` argument, arbitrary user and group (not root) command execution could be achieved, which can further be used on Ubuntu systems to achieve full root command execution. Commit ff1f8a623e090dee8a8aadf12a6a4b25efac143d contains a patch for the issue.
+
+### POC
+
+#### Reference
+- http://www.openwall.com/lists/oss-security/2024/06/11/1
+- https://github.com/OpenPrinting/cups/security/advisories/GHSA-vvwp-mv6j-hw6f
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-35326.md b/2024/CVE-2024-35326.md
new file mode 100644
index 0000000000..5df82f6baa
--- /dev/null
+++ b/2024/CVE-2024-35326.md
@@ -0,0 +1,17 @@
+### [CVE-2024-35326](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35326)
+
+
+
+
+### Description
+
+libyaml v0.2.5 is vulnerable to Buffer Overflow. Affected by this issue is the function yaml_emitter_emit of the file /src/libyaml/src/emitter.c. The manipulation leads to a double-free.
+
+### POC
+
+#### Reference
+- https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35326.c
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-35328.md b/2024/CVE-2024-35328.md
new file mode 100644
index 0000000000..5cb78c6710
--- /dev/null
+++ b/2024/CVE-2024-35328.md
@@ -0,0 +1,17 @@
+### [CVE-2024-35328](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35328)
+
+
+
+
+### Description
+
+libyaml v0.2.5 is vulnerable to DDOS. Affected by this issue is the function yaml_parser_parse of the file /src/libyaml/src/parser.c.
+
+### POC
+
+#### Reference
+- https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35328.c
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-35333.md b/2024/CVE-2024-35333.md
index 797f9ca4e1..2dd3921ec3 100644
--- a/2024/CVE-2024-35333.md
+++ b/2024/CVE-2024-35333.md
@@ -13,5 +13,6 @@ A stack-buffer-overflow vulnerability exists in the read_charset_decl function o
- https://github.com/momo1239/CVE-2024-35333
#### Github
+- https://github.com/momo1239/CVE-2024-35333
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-3537.md b/2024/CVE-2024-3537.md
index af5a9a9318..1d931708c2 100644
--- a/2024/CVE-2024-3537.md
+++ b/2024/CVE-2024-3537.md
@@ -10,7 +10,7 @@ A vulnerability was found in Campcodes Church Management System 1.0 and classifi
### POC
#### Reference
-No PoCs from references.
+- https://vuldb.com/?id.259907
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
diff --git a/2024/CVE-2024-35468.md b/2024/CVE-2024-35468.md
index b4ca6455df..1f80ffbf66 100644
--- a/2024/CVE-2024-35468.md
+++ b/2024/CVE-2024-35468.md
@@ -13,5 +13,6 @@ A SQL injection vulnerability in /hrm/index.php in SourceCodester Human Resource
- https://github.com/dovankha/CVE-2024-35468
#### Github
+- https://github.com/dovankha/CVE-2024-35468
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-35469.md b/2024/CVE-2024-35469.md
index 09e5560fdb..3bdde53386 100644
--- a/2024/CVE-2024-35469.md
+++ b/2024/CVE-2024-35469.md
@@ -13,5 +13,6 @@ A SQL injection vulnerability in /hrm/user/ in SourceCodester Human Resource Man
- https://github.com/dovankha/CVE-2024-35469
#### Github
+- https://github.com/dovankha/CVE-2024-35469
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-35475.md b/2024/CVE-2024-35475.md
index b86076e3ae..1407e432e0 100644
--- a/2024/CVE-2024-35475.md
+++ b/2024/CVE-2024-35475.md
@@ -14,5 +14,6 @@ A Cross-Site Request Forgery (CSRF) vulnerability was discovered in OpenKM Commu
- https://github.com/carsonchan12345/OpenKM-CSRF-PoC
#### Github
+- https://github.com/carsonchan12345/CVE-2024-35475
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-3552.md b/2024/CVE-2024-3552.md
new file mode 100644
index 0000000000..6f3b9b2a26
--- /dev/null
+++ b/2024/CVE-2024-3552.md
@@ -0,0 +1,21 @@
+### [CVE-2024-3552](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3552)
+
+
+
+
+### Description
+
+The Web Directory Free WordPress plugin before 1.7.0 does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection with different techniques like UNION, Time-Based and Error-Based.
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/34b03ee4-de81-4fec-9f3d-e1bd5b94d136/
+
+#### Github
+- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/truonghuuphuc/CVE-2024-3552-Poc
+- https://github.com/wjlin0/poc-doc
+- https://github.com/wy876/POC
+- https://github.com/wy876/wiki
+
diff --git a/2024/CVE-2024-35717.md b/2024/CVE-2024-35717.md
new file mode 100644
index 0000000000..50f8407142
--- /dev/null
+++ b/2024/CVE-2024-35717.md
@@ -0,0 +1,17 @@
+### [CVE-2024-35717](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-35717)
+
+
+
+
+### Description
+
+Missing Authorization vulnerability in A WP Life Media Slider – Photo Sleder, Video Slider, Link Slider, Carousal Slideshow.This issue affects Media Slider – Photo Sleder, Video Slider, Link Slider, Carousal Slideshow: from n/a through 1.3.9.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/fkie-cad/nvd-json-data-feeds
+
diff --git a/2024/CVE-2024-36104.md b/2024/CVE-2024-36104.md
index 126bb3d8f5..11fca9c3ba 100644
--- a/2024/CVE-2024-36104.md
+++ b/2024/CVE-2024-36104.md
@@ -15,6 +15,10 @@ No PoCs from references.
#### Github
- https://github.com/Co5mos/nuclei-tps
- https://github.com/Mr-xn/CVE-2024-32113
+- https://github.com/Threekiii/Awesome-POC
+- https://github.com/Threekiii/CVE
+- https://github.com/enomothem/PenTestNote
+- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/tanjiti/sec_profile
- https://github.com/wy876/POC
- https://github.com/wy876/wiki
diff --git a/2024/CVE-2024-36405.md b/2024/CVE-2024-36405.md
new file mode 100644
index 0000000000..14e9e8c291
--- /dev/null
+++ b/2024/CVE-2024-36405.md
@@ -0,0 +1,18 @@
+### [CVE-2024-36405](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36405)
+
+
+
+
+
+### Description
+
+liboqs is a C-language cryptographic library that provides implementations of post-quantum cryptography algorithms. A control-flow timing lean has been identified in the reference implementation of the Kyber key encapsulation mechanism when it is compiled with Clang 15-18 for `-Os`, `-O1`, and other compilation options. A proof-of-concept local attack on the reference implementation leaks the entire ML-KEM 512 secret key in ~10 minutes using end-to-end decapsulation timing measurements. The issue has been fixed in version 0.10.1. As a possible workaround, some compiler options may produce vectorized code that does not leak secret information, however relying on these compiler options as a workaround may not be reliable.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/fkie-cad/nvd-json-data-feeds
+
diff --git a/2024/CVE-2024-36416.md b/2024/CVE-2024-36416.md
new file mode 100644
index 0000000000..316aabdffa
--- /dev/null
+++ b/2024/CVE-2024-36416.md
@@ -0,0 +1,17 @@
+### [CVE-2024-36416](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36416)
+
+
+
+
+### Description
+
+SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, a deprecated v4 API example with no log rotation allows denial of service by logging excessive data. Versions 7.14.4 and 8.6.1 contain a fix for this issue.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/nomi-sec/PoC-in-GitHub
+
diff --git a/2024/CVE-2024-36527.md b/2024/CVE-2024-36527.md
new file mode 100644
index 0000000000..319974c01f
--- /dev/null
+++ b/2024/CVE-2024-36527.md
@@ -0,0 +1,17 @@
+### [CVE-2024-36527](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36527)
+
+
+
+
+### Description
+
+puppeteer-renderer v.3.2.0 and before is vulnerable to Directory Traversal. Attackers can exploit the URL parameter using the file protocol to read sensitive information from the server.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/nomi-sec/PoC-in-GitHub
+
diff --git a/2024/CVE-2024-36586.md b/2024/CVE-2024-36586.md
new file mode 100644
index 0000000000..9b6fdb6023
--- /dev/null
+++ b/2024/CVE-2024-36586.md
@@ -0,0 +1,17 @@
+### [CVE-2024-36586](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36586)
+
+
+
+
+### Description
+
+An issue in AdGuardHome v0.93 to latest allows unprivileged attackers to escalate privileges via overwriting the AdGuardHome binary.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/go-compile/security-advisories
+
diff --git a/2024/CVE-2024-36587.md b/2024/CVE-2024-36587.md
new file mode 100644
index 0000000000..8a77e48049
--- /dev/null
+++ b/2024/CVE-2024-36587.md
@@ -0,0 +1,17 @@
+### [CVE-2024-36587](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36587)
+
+
+
+
+### Description
+
+Insecure permissions in DNSCrypt-proxy v2.0.0alpha9 to v2.1.5 allows non-privileged attackers to escalate privileges to root via overwriting the binary dnscrypt-proxy.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/go-compile/security-advisories
+
diff --git a/2024/CVE-2024-36588.md b/2024/CVE-2024-36588.md
new file mode 100644
index 0000000000..328f96f21d
--- /dev/null
+++ b/2024/CVE-2024-36588.md
@@ -0,0 +1,17 @@
+### [CVE-2024-36588](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36588)
+
+
+
+
+### Description
+
+An issue in Annonshop.app DecentralizeJustice/ anonymousLocker commit 2b2b4 allows attackers to send messages erroneously attributed to arbitrary users via a crafted HTTP request.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/go-compile/security-advisories
+
diff --git a/2024/CVE-2024-36589.md b/2024/CVE-2024-36589.md
new file mode 100644
index 0000000000..d0ad505c76
--- /dev/null
+++ b/2024/CVE-2024-36589.md
@@ -0,0 +1,17 @@
+### [CVE-2024-36589](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36589)
+
+
+
+
+### Description
+
+An issue in Annonshop.app DecentralizeJustice/anonymousLocker commit 2b2b4 to ba9fd and DecentralizeJustice/anonBackend commit 57837 to cd815 was discovered to store credentials in plaintext.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/go-compile/security-advisories
+
diff --git a/2024/CVE-2024-36597.md b/2024/CVE-2024-36597.md
new file mode 100644
index 0000000000..b70cf6c83e
--- /dev/null
+++ b/2024/CVE-2024-36597.md
@@ -0,0 +1,17 @@
+### [CVE-2024-36597](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36597)
+
+
+
+
+### Description
+
+Aegon Life v1.0 was discovered to contain a SQL injection vulnerability via the client_id parameter at clientStatus.php.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/wy876/POC
+
diff --git a/2024/CVE-2024-36598.md b/2024/CVE-2024-36598.md
new file mode 100644
index 0000000000..ac257b1f18
--- /dev/null
+++ b/2024/CVE-2024-36598.md
@@ -0,0 +1,17 @@
+### [CVE-2024-36598](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36598)
+
+
+
+
+### Description
+
+An arbitrary file upload vulnerability in Aegon Life v1.0 allows attackers to execute arbitrary code via uploading a crafted image file.
+
+### POC
+
+#### Reference
+- https://github.com/kaliankhe/CVE-Aslam-mahi/blob/9ec0572c68bfd3708a7d6e089181024131f4e927/vendors/projectworlds.in/AEGON%20LIFE%20v1.0%20Life%20Insurance%20Management%20System/CVE-2024-36598
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-36678.md b/2024/CVE-2024-36678.md
new file mode 100644
index 0000000000..a10c5d4eb4
--- /dev/null
+++ b/2024/CVE-2024-36678.md
@@ -0,0 +1,17 @@
+### [CVE-2024-36678](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36678)
+
+
+
+
+### Description
+
+In the module "Theme settings" (pk_themesettings) <= 1.8.8 from Promokit.eu for PrestaShop, a guest can perform SQL injection. The script ajax.php have a sensitive SQL call that can be executed with a trivial http call and exploited to forge a SQL injection.
+
+### POC
+
+#### Reference
+- https://security.friendsofpresta.org/modules/2024/06/18/pk_themesettings.html
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-36679.md b/2024/CVE-2024-36679.md
new file mode 100644
index 0000000000..693dac07ec
--- /dev/null
+++ b/2024/CVE-2024-36679.md
@@ -0,0 +1,17 @@
+### [CVE-2024-36679](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36679)
+
+
+
+
+### Description
+
+In the module "Module Live Chat Pro (All in One Messaging)" (livechatpro) <=8.4.0, a guest can perform PHP Code injection. Due to a predictable token, the method `Lcp::saveTranslations()` suffer of a white writer that can inject PHP code into a PHP file.
+
+### POC
+
+#### Reference
+- https://security.friendsofpresta.org/modules/2024/06/18/livechatpro.html
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-36680.md b/2024/CVE-2024-36680.md
new file mode 100644
index 0000000000..718edb8e7f
--- /dev/null
+++ b/2024/CVE-2024-36680.md
@@ -0,0 +1,17 @@
+### [CVE-2024-36680](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36680)
+
+
+
+
+### Description
+
+In the module "Facebook" (pkfacebook) <=1.0.1 from Promokit.eu for PrestaShop, a guest can perform SQL injection. The ajax script facebookConnect.php have a sensitive SQL call that can be executed with a trivial http call and exploited to forge a SQL injection.
+
+### POC
+
+#### Reference
+- https://security.friendsofpresta.org/modules/2024/06/18/pkfacebook.html
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-36821.md b/2024/CVE-2024-36821.md
new file mode 100644
index 0000000000..13c1ce3241
--- /dev/null
+++ b/2024/CVE-2024-36821.md
@@ -0,0 +1,17 @@
+### [CVE-2024-36821](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36821)
+
+
+
+
+### Description
+
+Insecure permissions in Linksys Velop WiFi 5 (WHW01v1) 1.1.13.202617 allows attackers to escalate privileges from Guest to root.
+
+### POC
+
+#### Reference
+- https://github.com/IvanGlinkin/CVE-2024-36821
+
+#### Github
+- https://github.com/nomi-sec/PoC-in-GitHub
+
diff --git a/2024/CVE-2024-36837.md b/2024/CVE-2024-36837.md
new file mode 100644
index 0000000000..c86ec8e35d
--- /dev/null
+++ b/2024/CVE-2024-36837.md
@@ -0,0 +1,18 @@
+### [CVE-2024-36837](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36837)
+
+
+
+
+### Description
+
+SQL Injection vulnerability in CRMEB v.5.2.2 allows a remote attacker to obtain sensitive information via the getProductList function in the ProductController.php file.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/tanjiti/sec_profile
+
diff --git a/2024/CVE-2024-36840.md b/2024/CVE-2024-36840.md
new file mode 100644
index 0000000000..64c118d2af
--- /dev/null
+++ b/2024/CVE-2024-36840.md
@@ -0,0 +1,19 @@
+### [CVE-2024-36840](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36840)
+
+
+
+
+### Description
+
+SQL Injection vulnerability in Boelter Blue System Management v.1.3 allows a remote attacker to execute arbitrary code and obtain sensitive information via the id parameter to news_details.php and location_details.php; and the section parameter to services.php.
+
+### POC
+
+#### Reference
+- https://infosec-db.github.io/CyberDepot/vuln_boelter_blue/
+- https://packetstormsecurity.com/files/178978/Boelter-Blue-System-Management-1.3-SQL-Injection.html
+- https://sploitus.com/exploit?id=PACKETSTORM:178978
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-3690.md b/2024/CVE-2024-3690.md
index 965bb578e4..838dbd2312 100644
--- a/2024/CVE-2024-3690.md
+++ b/2024/CVE-2024-3690.md
@@ -14,4 +14,5 @@ A vulnerability classified as critical was found in PHPGurukul Small CRM 3.0. Af
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
+- https://github.com/psudo-bugboy/CVE-2024
diff --git a/2024/CVE-2024-3691.md b/2024/CVE-2024-3691.md
index 251d4801ad..f5819c1d99 100644
--- a/2024/CVE-2024-3691.md
+++ b/2024/CVE-2024-3691.md
@@ -15,4 +15,5 @@ A vulnerability, which was classified as critical, has been found in PHPGurukul
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
+- https://github.com/nikhil-aniill/Small-CRM-CVE
diff --git a/2024/CVE-2024-36966.md b/2024/CVE-2024-36966.md
index e1baddca9f..28e3f11270 100644
--- a/2024/CVE-2024-36966.md
+++ b/2024/CVE-2024-36966.md
@@ -1,6 +1,6 @@
### [CVE-2024-36966](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36966)

-
+

### Description
diff --git a/2024/CVE-2024-36971.md b/2024/CVE-2024-36971.md
new file mode 100644
index 0000000000..eb497f9022
--- /dev/null
+++ b/2024/CVE-2024-36971.md
@@ -0,0 +1,17 @@
+### [CVE-2024-36971](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-36971)
+
+
+
+
+### Description
+
+In the Linux kernel, the following vulnerability has been resolved:net: fix __dst_negative_advice() race__dst_negative_advice() does not enforce proper RCU rules whensk->dst_cache must be cleared, leading to possible UAF.RCU rules are that we must first clear sk->sk_dst_cache,then call dst_release(old_dst).Note that sk_dst_reset(sk) is implementing this protocol correctly,while __dst_negative_advice() uses the wrong order.Given that ip6_negative_advice() has special logicagainst RTF_CACHE, this means each of the three ->negative_advice()existing methods must perform the sk_dst_reset() themselves.Note the check against NULL dst is centralized in__dst_negative_advice(), there is no need to duplicateit in various callbacks.Many thanks to Clement Lecigne for tracking this issue.This old bug became visible after the blamed commit, using UDP sockets.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/fkie-cad/nvd-json-data-feeds
+
diff --git a/2024/CVE-2024-3699.md b/2024/CVE-2024-3699.md
new file mode 100644
index 0000000000..47a8428d6d
--- /dev/null
+++ b/2024/CVE-2024-3699.md
@@ -0,0 +1,17 @@
+### [CVE-2024-3699](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3699)
+
+
+
+
+### Description
+
+Use of hard-coded password to the patients' database allows an attacker to retrieve sensitive data stored in the database. The password is the same among all drEryk Gabinet installations.This issue affects drEryk Gabinet software versions from 7.0.0.0 through 9.17.0.0.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/fkie-cad/nvd-json-data-feeds
+
diff --git a/2024/CVE-2024-3700.md b/2024/CVE-2024-3700.md
new file mode 100644
index 0000000000..92d84c7f9f
--- /dev/null
+++ b/2024/CVE-2024-3700.md
@@ -0,0 +1,17 @@
+### [CVE-2024-3700](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3700)
+
+
+
+
+### Description
+
+Use of hard-coded password to the patients' database allows an attacker to retrieve sensitive data stored in the database. The password is the same among all Simple Care software installations.This issue affects Estomed Sp. z o.o. Simple Care software in all versions. The software is no longer supported.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/fkie-cad/nvd-json-data-feeds
+
diff --git a/2024/CVE-2024-37051.md b/2024/CVE-2024-37051.md
new file mode 100644
index 0000000000..91829c27be
--- /dev/null
+++ b/2024/CVE-2024-37051.md
@@ -0,0 +1,34 @@
+### [CVE-2024-37051](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37051)
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+### Description
+
+GitHub access token could be exposed to third-party sites in JetBrains IDEs after version 2023.1 and less than: IntelliJ IDEA 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; Aqua 2024.1.2; CLion 2023.1.7, 2023.2.4, 2023.3.5, 2024.1.3, 2024.2 EAP2; DataGrip 2023.1.3, 2023.2.4, 2023.3.5, 2024.1.4; DataSpell 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.2, 2024.2 EAP1; GoLand 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP3; MPS 2023.2.1, 2023.3.1, 2024.1 EAP2; PhpStorm 2023.1.6, 2023.2.6, 2023.3.7, 2024.1.3, 2024.2 EAP3; PyCharm 2023.1.6, 2023.2.7, 2023.3.6, 2024.1.3, 2024.2 EAP2; Rider 2023.1.7, 2023.2.5, 2023.3.6, 2024.1.3; RubyMine 2023.1.7, 2023.2.7, 2023.3.7, 2024.1.3, 2024.2 EAP4; RustRover 2024.1.1; WebStorm 2023.1.6, 2023.2.7, 2023.3.7, 2024.1.4
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/nomi-sec/PoC-in-GitHub
+
diff --git a/2024/CVE-2024-37079.md b/2024/CVE-2024-37079.md
new file mode 100644
index 0000000000..3b3a8875f7
--- /dev/null
+++ b/2024/CVE-2024-37079.md
@@ -0,0 +1,20 @@
+### [CVE-2024-37079](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37079)
+
+
+
+
+
+
+### Description
+
+vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/tanjiti/sec_profile
+
diff --git a/2024/CVE-2024-37080.md b/2024/CVE-2024-37080.md
new file mode 100644
index 0000000000..c00a0f38e7
--- /dev/null
+++ b/2024/CVE-2024-37080.md
@@ -0,0 +1,19 @@
+### [CVE-2024-37080](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37080)
+
+
+
+
+
+
+### Description
+
+vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/tanjiti/sec_profile
+
diff --git a/2024/CVE-2024-37301.md b/2024/CVE-2024-37301.md
new file mode 100644
index 0000000000..8cd6d94da7
--- /dev/null
+++ b/2024/CVE-2024-37301.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37301](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37301)
+
+
+
+
+### Description
+
+Document Merge Service is a document template merge service providing an API to manage templates and merge them with given data. Versions 6.5.1 and prior are vulnerable to remote code execution via server-side template injection which, when executed as root, can result in full takeover of the affected system. As of time of publication, no patched version exists, nor have any known workarounds been disclosed.
+
+### POC
+
+#### Reference
+- https://github.com/adfinis/document-merge-service/security/advisories/GHSA-v5gf-r78h-55q6
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-37305.md b/2024/CVE-2024-37305.md
new file mode 100644
index 0000000000..5d6996eba6
--- /dev/null
+++ b/2024/CVE-2024-37305.md
@@ -0,0 +1,21 @@
+### [CVE-2024-37305](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37305)
+
+
+&color=brighgreen)
+
+
+
+
+
+### Description
+
+oqs-provider is a provider for the OpenSSL 3 cryptography library that adds support for post-quantum cryptography in TLS, X.509, and S/MIME using post-quantum algorithms from liboqs. Flaws have been identified in the way oqs-provider handles lengths decoded with DECODE_UINT32 at the start of serialized hybrid (traditional + post-quantum) keys and signatures. Unchecked length values are later used for memory reads and writes; malformed input can lead to crashes or information leakage. Handling of plain/non-hybrid PQ key operation is not affected. This issue has been patched in in v0.6.1. All users are advised to upgrade. There are no workarounds for this issue.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/chnzzh/OpenSSL-CVE-lib
+
diff --git a/2024/CVE-2024-37308.md b/2024/CVE-2024-37308.md
new file mode 100644
index 0000000000..13c9e877a5
--- /dev/null
+++ b/2024/CVE-2024-37308.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37308](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37308)
+
+
+&color=brighgreen)
+
+### Description
+
+The Cooked Pro recipe plugin for WordPress is vulnerable to Persistent Cross-Site Scripting (XSS) via the `_recipe_settings[post_title]` parameter in versions up to, and including, 1.7.15.4 due to insufficient input sanitization and output escaping. This vulnerability allows authenticated attackers with contributor-level access and above to inject arbitrary web scripts in pages that will execute whenever a user accesses a compromised page. A patch is available at commit 8cf88f334ccbf11134080bbb655c66f1cfe77026 and will be part of version 1.8.0.
+
+### POC
+
+#### Reference
+- https://github.com/XjSv/Cooked/security/advisories/GHSA-9vfv-c966-jwrv
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-37309.md b/2024/CVE-2024-37309.md
new file mode 100644
index 0000000000..ed3f6f0df2
--- /dev/null
+++ b/2024/CVE-2024-37309.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37309](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37309)
+
+
+
+
+### Description
+
+CrateDB is a distributed SQL database. A high-risk vulnerability has been identified in versions prior to 5.7.2 where the TLS endpoint (port 4200) permits client-initiated renegotiation. In this scenario, an attacker can exploit this feature to repeatedly request renegotiation of security parameters during an ongoing TLS session. This flaw could lead to excessive consumption of CPU resources, resulting in potential server overload and service disruption. The vulnerability was confirmed using an openssl client where the command `R` initiates renegotiation, followed by the server confirming with `RENEGOTIATING`. This vulnerability allows an attacker to perform a denial of service attack by exhausting server CPU resources through repeated TLS renegotiations. This impacts the availability of services running on the affected server, posing a significant risk to operational stability and security. TLS 1.3 explicitly forbids renegotiation, since it closes a window of opportunity for an attack. Version 5.7.2 of CrateDB contains the fix for the issue.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/chnzzh/OpenSSL-CVE-lib
+
diff --git a/2024/CVE-2024-37393.md b/2024/CVE-2024-37393.md
new file mode 100644
index 0000000000..f3fcbd630b
--- /dev/null
+++ b/2024/CVE-2024-37393.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37393](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37393)
+
+
+
+
+### Description
+
+Multiple LDAP injections vulnerabilities exist in SecurEnvoy MFA before 9.4.514 due to improper validation of user-supplied input. An unauthenticated remote attacker could exfiltrate data from Active Directory through blind LDAP injection attacks against the DESKTOP service exposed on the /secserver HTTP endpoint. This may include ms-Mcs-AdmPwd, which has a cleartext password for the Local Administrator Password Solution (LAPS) feature.
+
+### POC
+
+#### Reference
+- https://www.optistream.io/blogs/tech/securenvoy-cve-2024-37393
+
+#### Github
+- https://github.com/nomi-sec/PoC-in-GitHub
+
diff --git a/2024/CVE-2024-3754.md b/2024/CVE-2024-3754.md
new file mode 100644
index 0000000000..f8d5e52429
--- /dev/null
+++ b/2024/CVE-2024-3754.md
@@ -0,0 +1,17 @@
+### [CVE-2024-3754](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3754)
+
+
+&color=brighgreen)
+
+### Description
+
+The Alemha watermarker WordPress plugin through 1.3.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/8c6f3e3e-3047-4446-a190-750a60c29fa3/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-37568.md b/2024/CVE-2024-37568.md
index 5457a2cb42..dbbb8064ee 100644
--- a/2024/CVE-2024-37568.md
+++ b/2024/CVE-2024-37568.md
@@ -10,7 +10,7 @@ lepture Authlib before 1.3.1 has algorithm confusion with asymmetric public keys
### POC
#### Reference
-No PoCs from references.
+- https://github.com/lepture/authlib/issues/654
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
diff --git a/2024/CVE-2024-37619.md b/2024/CVE-2024-37619.md
new file mode 100644
index 0000000000..c4fd5279c3
--- /dev/null
+++ b/2024/CVE-2024-37619.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37619](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37619)
+
+
+
+
+### Description
+
+StrongShop v1.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the spec_group_id parameter at /spec/index.blade.php.
+
+### POC
+
+#### Reference
+- https://github.com/Hebing123/cve/issues/45
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-37620.md b/2024/CVE-2024-37620.md
new file mode 100644
index 0000000000..3f8df4feea
--- /dev/null
+++ b/2024/CVE-2024-37620.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37620](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37620)
+
+
+
+
+### Description
+
+PHPVOD v4.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the id parameter at /view/admin/view.php.
+
+### POC
+
+#### Reference
+- https://github.com/Hebing123/cve/issues/46
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-37622.md b/2024/CVE-2024-37622.md
new file mode 100644
index 0000000000..bba05b21c7
--- /dev/null
+++ b/2024/CVE-2024-37622.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37622](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37622)
+
+
+
+
+### Description
+
+Xinhu RockOA v2.6.3 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the num parameter at /flow/flow.php.
+
+### POC
+
+#### Reference
+- https://github.com/rainrocka/xinhu/issues/4
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-37623.md b/2024/CVE-2024-37623.md
new file mode 100644
index 0000000000..5fad94d134
--- /dev/null
+++ b/2024/CVE-2024-37623.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37623](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37623)
+
+
+
+
+### Description
+
+Xinhu RockOA v2.6.3 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the /kaoqin/tpl_kaoqin_locationchange.html component.
+
+### POC
+
+#### Reference
+- https://github.com/rainrocka/xinhu/issues/5
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-37624.md b/2024/CVE-2024-37624.md
new file mode 100644
index 0000000000..f6813752b5
--- /dev/null
+++ b/2024/CVE-2024-37624.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37624](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37624)
+
+
+
+
+### Description
+
+Xinhu RockOA v2.6.3 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the /chajian/inputChajian.php. component.
+
+### POC
+
+#### Reference
+- https://github.com/rainrocka/xinhu/issues/6
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-37625.md b/2024/CVE-2024-37625.md
new file mode 100644
index 0000000000..7ea3913026
--- /dev/null
+++ b/2024/CVE-2024-37625.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37625](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37625)
+
+
+
+
+### Description
+
+zhimengzhe iBarn v1.5 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the $search parameter at /index.php.
+
+### POC
+
+#### Reference
+- https://github.com/zhimengzhe/iBarn/issues/20
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-37629.md b/2024/CVE-2024-37629.md
new file mode 100644
index 0000000000..a541318988
--- /dev/null
+++ b/2024/CVE-2024-37629.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37629](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37629)
+
+
+
+
+### Description
+
+SummerNote 0.8.18 is vulnerable to Cross Site Scripting (XSS) via the Code View Function.
+
+### POC
+
+#### Reference
+- https://github.com/summernote/summernote/issues/4642
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-37632.md b/2024/CVE-2024-37632.md
new file mode 100644
index 0000000000..985cb84157
--- /dev/null
+++ b/2024/CVE-2024-37632.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37632](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37632)
+
+
+
+
+### Description
+
+TOTOLINK A3700R V9.1.2u.6165_20211012 was discovered to contain a stack overflow via the password parameter in function loginAuth .
+
+### POC
+
+#### Reference
+- https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/loginAuth/README.md
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-37633.md b/2024/CVE-2024-37633.md
new file mode 100644
index 0000000000..51356dc7c4
--- /dev/null
+++ b/2024/CVE-2024-37633.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37633](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37633)
+
+
+
+
+### Description
+
+TOTOLINK A3700R V9.1.2u.6165_20211012 was discovered to contain a stack overflow via ssid in the function setWiFiGuestCfg
+
+### POC
+
+#### Reference
+- https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/setWiFiGuestCfg/README.md
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-37634.md b/2024/CVE-2024-37634.md
new file mode 100644
index 0000000000..8824ff6d3d
--- /dev/null
+++ b/2024/CVE-2024-37634.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37634](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37634)
+
+
+
+
+### Description
+
+TOTOLINK A3700R V9.1.2u.6165_20211012 was discovered to contain a stack overflow via ssid in the function setWiFiEasyCfg.
+
+### POC
+
+#### Reference
+- https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/setWiFiEasyCfg/README.md
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-37637.md b/2024/CVE-2024-37637.md
new file mode 100644
index 0000000000..6c0f8c6821
--- /dev/null
+++ b/2024/CVE-2024-37637.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37637](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37637)
+
+
+
+
+### Description
+
+TOTOLINK A3700R V9.1.2u.6165_20211012 was discovered to contain a stack overflow via ssid5g in the function setWizardCfg.
+
+### POC
+
+#### Reference
+- https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/setWizardCfg/README.md
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-37642.md b/2024/CVE-2024-37642.md
new file mode 100644
index 0000000000..884453c138
--- /dev/null
+++ b/2024/CVE-2024-37642.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37642](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37642)
+
+
+
+
+### Description
+
+TRENDnet TEW-814DAP v1_(FW1.01B01) was discovered to contain a command injection vulnerability via the ipv4_ping, ipv6_ping parameter at /formSystemCheck .
+
+### POC
+
+#### Reference
+- https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TRENDnet/TEW-814DAP/formSystemCheck/README.md
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-37643.md b/2024/CVE-2024-37643.md
new file mode 100644
index 0000000000..90862d117b
--- /dev/null
+++ b/2024/CVE-2024-37643.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37643](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37643)
+
+
+
+
+### Description
+
+TRENDnet TEW-814DAP v1_(FW1.01B01) was discovered to contain a stack overflow vulnerability via the submit-url parameter at /formPasswordAuth .
+
+### POC
+
+#### Reference
+- https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TRENDnet/TEW-814DAP/formPasswordAuth/README.md
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-37661.md b/2024/CVE-2024-37661.md
new file mode 100644
index 0000000000..72358a2525
--- /dev/null
+++ b/2024/CVE-2024-37661.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37661](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37661)
+
+
+
+
+### Description
+
+TP-LINK TL-7DR5130 v1.0.23 is vulnerable to forged ICMP redirect message attacks. An attacker in the same WLAN as the victim can hijack the traffic between the victim and any remote server by sending out forged ICMP redirect messages.
+
+### POC
+
+#### Reference
+- https://github.com/ouuan/router-vuln-report/blob/master/icmp-redirect/tl-7dr5130-redirect.md
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-37662.md b/2024/CVE-2024-37662.md
new file mode 100644
index 0000000000..8b9d3deb0e
--- /dev/null
+++ b/2024/CVE-2024-37662.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37662](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37662)
+
+
+
+
+### Description
+
+TP-LINK TL-7DR5130 v1.0.23 is vulnerable to TCP DoS or hijacking attacks. An attacker in the same WLAN as the victim can disconnect or hijack the traffic between the victim and any remote server by sending out forged TCP RST messages to evict NAT mappings in the router.
+
+### POC
+
+#### Reference
+- https://github.com/ouuan/router-vuln-report/blob/master/nat-rst/tl-7dr5130-nat-rst.md
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-37671.md b/2024/CVE-2024-37671.md
new file mode 100644
index 0000000000..b79ebf2d75
--- /dev/null
+++ b/2024/CVE-2024-37671.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37671](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37671)
+
+
+
+
+### Description
+
+Cross Site Scripting vulnerability in Tessi Docubase Document Management product 5.x allows a remote attacker to execute arbitrary code via the page parameter.
+
+### POC
+
+#### Reference
+- https://github.com/MohamedAzizMSALLEMI/Docubase_Security/blob/main/CVE-2024-37671.md
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-37672.md b/2024/CVE-2024-37672.md
new file mode 100644
index 0000000000..af3ba811db
--- /dev/null
+++ b/2024/CVE-2024-37672.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37672](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37672)
+
+
+
+
+### Description
+
+Cross Site Scripting vulnerability in Tessi Docubase Document Management product 5.x allows a remote attacker to execute arbitrary code via the idactivity parameter.
+
+### POC
+
+#### Reference
+- https://github.com/MohamedAzizMSALLEMI/Docubase_Security/blob/main/CVE-2024-37672.md
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-37673.md b/2024/CVE-2024-37673.md
new file mode 100644
index 0000000000..4106103b9e
--- /dev/null
+++ b/2024/CVE-2024-37673.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37673](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37673)
+
+
+
+
+### Description
+
+Cross Site Scripting vulnerability in Tessi Docubase Document Management product 5.x allows a remote attacker to execute arbitrary code via the filename parameter.
+
+### POC
+
+#### Reference
+- https://github.com/MohamedAzizMSALLEMI/Docubase_Security/blob/main/CVE-2024-37673.md
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-37674.md b/2024/CVE-2024-37674.md
new file mode 100644
index 0000000000..a027995050
--- /dev/null
+++ b/2024/CVE-2024-37674.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37674](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37674)
+
+
+
+
+### Description
+
+Cross Site Scripting vulnerability in Moodle CMS v3.10 allows a remote attacker to execute arbitrary code via the Field Name (name parameter) of a new activity.
+
+### POC
+
+#### Reference
+- https://github.com/MohamedAzizMSALLEMI/Moodle_Security/blob/main/CVE-2024-37674.md
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-37675.md b/2024/CVE-2024-37675.md
new file mode 100644
index 0000000000..99000e1a46
--- /dev/null
+++ b/2024/CVE-2024-37675.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37675](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37675)
+
+
+
+
+### Description
+
+Cross Site Scripting vulnerability in Tessi Docubase Document Management product 5.x allows a remote attacker to execute arbitrary code via the parameter "sectionContent" related to the functionality of adding notes to an uploaded file.
+
+### POC
+
+#### Reference
+- https://github.com/MohamedAzizMSALLEMI/Docubase_Security/blob/main/CVE-2024-37675.md
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-3768.md b/2024/CVE-2024-3768.md
index 1d722afc89..72c0f83395 100644
--- a/2024/CVE-2024-3768.md
+++ b/2024/CVE-2024-3768.md
@@ -11,6 +11,7 @@ A vulnerability, which was classified as critical, has been found in PHPGurukul
#### Reference
- https://github.com/BurakSevben/CVEs/blob/main/News%20Portal/News%20Portal%20-%20SQL%20Injection%20-%204.md
+- https://vuldb.com/?id.260615
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
diff --git a/2024/CVE-2024-37791.md b/2024/CVE-2024-37791.md
new file mode 100644
index 0000000000..646b51c7cd
--- /dev/null
+++ b/2024/CVE-2024-37791.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37791](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37791)
+
+
+
+
+### Description
+
+DuxCMS3 v3.1.3 was discovered to contain a SQL injection vulnerability via the keyword parameter at /article/Content/index?class_id.
+
+### POC
+
+#### Reference
+- https://github.com/duxphp/DuxCMS3/issues/5
+
+#### Github
+- https://github.com/nomi-sec/PoC-in-GitHub
+
diff --git a/2024/CVE-2024-37799.md b/2024/CVE-2024-37799.md
new file mode 100644
index 0000000000..9d974a2fdb
--- /dev/null
+++ b/2024/CVE-2024-37799.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37799](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37799)
+
+
+
+
+### Description
+
+CodeProjects Restaurant Reservation System v1.0 was discovered to contain a SQL injection vulnerability via the reserv_id parameter at view_reservations.php.
+
+### POC
+
+#### Reference
+- https://github.com/himanshubindra/CVEs/blob/main/CVE-2024-37799
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-37803.md b/2024/CVE-2024-37803.md
new file mode 100644
index 0000000000..f05add75e8
--- /dev/null
+++ b/2024/CVE-2024-37803.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37803](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37803)
+
+
+
+
+### Description
+
+Multiple stored cross-site scripting (XSS) vulnerabilities in CodeProjects Health Care hospital Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the fname and lname parameters under the Staff Info page.
+
+### POC
+
+#### Reference
+- https://github.com/himanshubindra/CVEs/blob/main/CVE-2024-37803
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-37840.md b/2024/CVE-2024-37840.md
new file mode 100644
index 0000000000..3488e5f43a
--- /dev/null
+++ b/2024/CVE-2024-37840.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37840](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37840)
+
+
+
+
+### Description
+
+SQL injection vulnerability in processscore.php in Itsourcecode Learning Management System Project In PHP With Source Code v1.0 allows remote attackers to execute arbitrary SQL commands via the LessonID parameter.
+
+### POC
+
+#### Reference
+- https://github.com/ganzhi-qcy/cve/issues/4
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-37848.md b/2024/CVE-2024-37848.md
new file mode 100644
index 0000000000..59c6a448fd
--- /dev/null
+++ b/2024/CVE-2024-37848.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37848](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37848)
+
+
+
+
+### Description
+
+SQL Injection vulnerability in Online-Bookstore-Project-In-PHP v1.0 allows a local attacker to execute arbitrary code via the admin_delete.php component.
+
+### POC
+
+#### Reference
+- https://github.com/Lanxiy7th/lx_CVE_report-/issues/13
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-37849.md b/2024/CVE-2024-37849.md
new file mode 100644
index 0000000000..2e93bee59f
--- /dev/null
+++ b/2024/CVE-2024-37849.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37849](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37849)
+
+
+
+
+### Description
+
+A SQL Injection vulnerability in itsourcecode Billing System 1.0 allows a local attacker to execute arbitrary code in process.php via the username parameter.
+
+### POC
+
+#### Reference
+- https://github.com/ganzhi-qcy/cve/issues/3
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-37877.md b/2024/CVE-2024-37877.md
new file mode 100644
index 0000000000..77a798c496
--- /dev/null
+++ b/2024/CVE-2024-37877.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37877](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37877)
+
+
+
+
+### Description
+
+UERANSIM before 3.2.6 allows out-of-bounds read when a RLS packet is sent to gNodeB with malformed PDU length. This occurs in function readOctetString in src/utils/octet_view.cpp and in function DecodeRlsMessage in src/lib/rls/rls_pdu.cpp
+
+### POC
+
+#### Reference
+- https://github.com/f4rs1ght/vuln-research/tree/main/CVE-2024-37877
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-37885.md b/2024/CVE-2024-37885.md
new file mode 100644
index 0000000000..fa7d1ba309
--- /dev/null
+++ b/2024/CVE-2024-37885.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37885](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37885)
+
+
+&color=brighgreen)
+
+### Description
+
+The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with your computer. A code injection in Nextcloud Desktop Client for macOS allowed to load arbitrary code when starting the client with DYLD_INSERT_LIBRARIES set in the enviroment. It is recommended that the Nextcloud Desktop client is upgraded to 3.12.0.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/LOURC0D3/LOURC0D3
+
diff --git a/2024/CVE-2024-37888.md b/2024/CVE-2024-37888.md
new file mode 100644
index 0000000000..8226a78f5e
--- /dev/null
+++ b/2024/CVE-2024-37888.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37888](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37888)
+
+
+&color=brighgreen)
+
+### Description
+
+The Open Link is a CKEditor plugin, extending context menu with a possibility to open link in a new tab. The vulnerability allowed to execute JavaScript code by abusing link href attribute. It affects all users using the Open Link plugin at version < **1.0.5**.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/nomi-sec/PoC-in-GitHub
+
diff --git a/2024/CVE-2024-37889.md b/2024/CVE-2024-37889.md
new file mode 100644
index 0000000000..6aaca38af5
--- /dev/null
+++ b/2024/CVE-2024-37889.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37889](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37889)
+
+
+
+
+### Description
+
+MyFinances is a web application for managing finances. MyFinances has a way to access other customer invoices while signed in as a user. This method allows an actor to access PII and financial information from another account. The vulnerability is fixed in 0.4.6.
+
+### POC
+
+#### Reference
+- https://github.com/TreyWW/MyFinances/security/advisories/GHSA-4884-3gvp-3wj2
+
+#### Github
+- https://github.com/nomi-sec/PoC-in-GitHub
+
diff --git a/2024/CVE-2024-37890.md b/2024/CVE-2024-37890.md
new file mode 100644
index 0000000000..0087c3f961
--- /dev/null
+++ b/2024/CVE-2024-37890.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37890](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37890)
+
+
+
+
+### Description
+
+ws is an open source WebSocket client and server for Node.js. A request with a number of headers exceeding theserver.maxHeadersCount threshold could be used to crash a ws server. The vulnerability was fixed in ws@8.17.1 (e55e510) and backported to ws@7.5.10 (22c2876), ws@6.2.3 (eeb76d3), and ws@5.2.4 (4abd8f6). In vulnerable versions of ws, the issue can be mitigated in the following ways: 1. Reduce the maximum allowed length of the request headers using the --max-http-header-size=size and/or the maxHeaderSize options so that no more headers than the server.maxHeadersCount limit can be sent. 2. Set server.maxHeadersCount to 0 so that no limit is applied.
+
+### POC
+
+#### Reference
+- https://github.com/websockets/ws/security/advisories/GHSA-3h5v-q93c-6h6q
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-37891.md b/2024/CVE-2024-37891.md
new file mode 100644
index 0000000000..c0113f6087
--- /dev/null
+++ b/2024/CVE-2024-37891.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37891](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37891)
+
+
+
+
+### Description
+
+ urllib3 is a user-friendly HTTP client library for Python. When using urllib3's proxy support with `ProxyManager`, the `Proxy-Authorization` header is only sent to the configured proxy, as expected. However, when sending HTTP requests *without* using urllib3's proxy support, it's possible to accidentally configure the `Proxy-Authorization` header even though it won't have any effect as the request is not using a forwarding proxy or a tunneling proxy. In those cases, urllib3 doesn't treat the `Proxy-Authorization` HTTP header as one carrying authentication material and thus doesn't strip the header on cross-origin redirects. Because this is a highly unlikely scenario, we believe the severity of this vulnerability is low for almost all users. Out of an abundance of caution urllib3 will automatically strip the `Proxy-Authorization` header during cross-origin redirects to avoid the small chance that users are doing this on accident. Users should use urllib3's proxy support or disable automatic redirects to achieve safe processing of the `Proxy-Authorization` header, but we still decided to strip the header by default in order to further protect users who aren't using the correct approach. We believe the number of usages affected by this advisory is low. It requires all of the following to be true to be exploited: 1. Setting the `Proxy-Authorization` header without using urllib3's built-in proxy support. 2. Not disabling HTTP redirects. 3. Either not using an HTTPS origin server or for the proxy or target origin to redirect to a malicious origin. Users are advised to update to either version 1.26.19 or version 2.2.2. Users unable to upgrade may use the `Proxy-Authorization` header with urllib3's `ProxyManager`, disable HTTP redirects using `redirects=False` when sending requests, or not user the `Proxy-Authorization` header as mitigations.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/PBorocz/raindrop-io-py
+
diff --git a/2024/CVE-2024-37896.md b/2024/CVE-2024-37896.md
new file mode 100644
index 0000000000..ca642ed372
--- /dev/null
+++ b/2024/CVE-2024-37896.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37896](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37896)
+
+
+&color=brighgreen)
+
+### Description
+
+Gin-vue-admin is a backstage management system based on vue and gin. Gin-vue-admin <= v2.6.5 has SQL injection vulnerability. The SQL injection vulnerabilities occur when a web application allows users to input data into SQL queries without sufficiently validating or sanitizing the input. Failing to properly enforce restrictions on user input could mean that even a basic form input field can be used to inject arbitrary and potentially dangerous SQL commands. This could lead to unauthorized access to the database, data leakage, data manipulation, or even complete compromise of the database server. This vulnerability has been addressed in commit `53d033821` which has been included in release version 2.6.6. Users are advised to upgrade. There are no known workarounds for this vulnerability.
+
+### POC
+
+#### Reference
+- https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-gf3r-h744-mqgp
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-37904.md b/2024/CVE-2024-37904.md
new file mode 100644
index 0000000000..8a81ab0e0b
--- /dev/null
+++ b/2024/CVE-2024-37904.md
@@ -0,0 +1,17 @@
+### [CVE-2024-37904](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37904)
+
+
+
+
+### Description
+
+Minder is an open source Software Supply Chain Security Platform. Minder's Git provider is vulnerable to a denial of service from a maliciously configured GitHub repository. The Git provider clones users repositories using the `github.com/go-git/go-git/v5` library on lines `L55-L89`. The Git provider does the following on the lines `L56-L62`. First, it sets the `CloneOptions`, specifying the url, the depth etc. It then validates the options. It then sets up an in-memory filesystem, to which it clones and Finally, it clones the repository. The `(g *Git) Clone()` method is vulnerable to a DoS attack: A Minder user can instruct Minder to clone a large repository which will exhaust memory and crash the Minder server. The root cause of this vulnerability is a combination of the following conditions: 1. Users can control the Git URL which Minder clones, 2. Minder does not enforce a size limit to the repository, 3. Minder clones the entire repository into memory. This issue has been addressed in commit `7979b43` which has been included in release version v0.0.52. Users are advised to upgrade. There are no known workarounds for this vulnerability.
+
+### POC
+
+#### Reference
+- https://github.com/stacklok/minder/security/advisories/GHSA-hpcg-xjq5-g666
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-38276.md b/2024/CVE-2024-38276.md
new file mode 100644
index 0000000000..cffb3c065c
--- /dev/null
+++ b/2024/CVE-2024-38276.md
@@ -0,0 +1,17 @@
+### [CVE-2024-38276](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38276)
+
+
+
+
+### Description
+
+Incorrect CSRF token checks resulted in multiple CSRF risks.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/cli-ish/cli-ish
+
diff --git a/2024/CVE-2024-38347.md b/2024/CVE-2024-38347.md
new file mode 100644
index 0000000000..d9bfeb5dfd
--- /dev/null
+++ b/2024/CVE-2024-38347.md
@@ -0,0 +1,17 @@
+### [CVE-2024-38347](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38347)
+
+
+
+
+### Description
+
+CodeProjects Health Care hospital Management System v1.0 was discovered to contain a SQL injection vulnerability in the Room Information module via the id parameter.
+
+### POC
+
+#### Reference
+- https://github.com/SandeepRajauriya/CVEs/blob/main/CVE-2024-38347
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-38348.md b/2024/CVE-2024-38348.md
new file mode 100644
index 0000000000..ea6018f7fd
--- /dev/null
+++ b/2024/CVE-2024-38348.md
@@ -0,0 +1,17 @@
+### [CVE-2024-38348](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38348)
+
+
+
+
+### Description
+
+CodeProjects Health Care hospital Management System v1.0 was discovered to contain a SQL injection vulnerability in the Staff Info module via the searvalu parameter.
+
+### POC
+
+#### Reference
+- https://github.com/SandeepRajauriya/CVEs/blob/main/CVE-2024-38348
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-38355.md b/2024/CVE-2024-38355.md
new file mode 100644
index 0000000000..ce79d0aadc
--- /dev/null
+++ b/2024/CVE-2024-38355.md
@@ -0,0 +1,18 @@
+### [CVE-2024-38355](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38355)
+
+
+
+
+
+### Description
+
+Socket.IO is an open source, real-time, bidirectional, event-based, communication framework. A specially crafted Socket.IO packet can trigger an uncaught exception on the Socket.IO server, thus killing the Node.js process. This issue is fixed by commit `15af22fc22` which has been included in `socket.io@4.6.2` (released in May 2023). The fix was backported in the 2.x branch as well with commit `d30630ba10`. Users are advised to upgrade. Users unable to upgrade may attach a listener for the "error" event to catch these errors.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/Y0ursTruly/Y0ursTruly
+
diff --git a/2024/CVE-2024-38358.md b/2024/CVE-2024-38358.md
new file mode 100644
index 0000000000..234e436d12
--- /dev/null
+++ b/2024/CVE-2024-38358.md
@@ -0,0 +1,17 @@
+### [CVE-2024-38358](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38358)
+
+
+&color=brighgreen)
+
+### Description
+
+Wasmer is a web assembly (wasm) Runtime supporting WASIX, WASI and Emscripten. If the preopened directory has a symlink pointing outside, WASI programs can traverse the symlink and access host filesystem if the caller sets both `oflags::creat` and `rights::fd_write`. Programs can also crash the runtime by creating a symlink pointing outside with `path_symlink` and `path_open`ing the link. This issue has been addressed in commit `b9483d022` which has been included in release version 4.3.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
+
+### POC
+
+#### Reference
+- https://github.com/wasmerio/wasmer/security/advisories/GHSA-55f3-3qvg-8pv5
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-38394.md b/2024/CVE-2024-38394.md
new file mode 100644
index 0000000000..328bfeb9f7
--- /dev/null
+++ b/2024/CVE-2024-38394.md
@@ -0,0 +1,19 @@
+### [CVE-2024-38394](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38394)
+
+
+
+
+### Description
+
+** DISPUTED ** Mismatches in interpreting USB authorization policy between GNOME Settings Daemon (GSD) through 46.0 and the Linux kernel's underlying device matching logic allow a physically proximate attacker to access some unintended Linux kernel USB functionality, such as USB device-specific kernel modules and filesystem implementations. NOTE: the GSD supplier indicates that consideration of a mitigation for this within GSD would be in the context of "a new feature, not a CVE."
+
+### POC
+
+#### Reference
+- https://gitlab.gnome.org/GNOME/gnome-settings-daemon/-/issues/780
+- https://gitlab.gnome.org/GNOME/gnome-settings-daemon/-/issues/780#note_2047914
+- https://pulsesecurity.co.nz/advisories/usbguard-bypass
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-38395.md b/2024/CVE-2024-38395.md
new file mode 100644
index 0000000000..b256ea9013
--- /dev/null
+++ b/2024/CVE-2024-38395.md
@@ -0,0 +1,17 @@
+### [CVE-2024-38395](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38395)
+
+
+
+
+### Description
+
+In iTerm2 before 3.5.2, the "Terminal may report window title" setting is not honored, and thus remote code execution might occur but "is not trivially exploitable."
+
+### POC
+
+#### Reference
+- http://www.openwall.com/lists/oss-security/2024/06/17/1
+
+#### Github
+- https://github.com/nomi-sec/PoC-in-GitHub
+
diff --git a/2024/CVE-2024-38396.md b/2024/CVE-2024-38396.md
new file mode 100644
index 0000000000..9d7b859462
--- /dev/null
+++ b/2024/CVE-2024-38396.md
@@ -0,0 +1,18 @@
+### [CVE-2024-38396](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38396)
+
+
+
+
+### Description
+
+An issue was discovered in iTerm2 3.5.x before 3.5.2. Unfiltered use of an escape sequence to report a window title, in combination with the built-in tmux integration feature (enabled by default), allows an attacker to inject arbitrary code into the terminal, a different vulnerability than CVE-2024-38395.
+
+### POC
+
+#### Reference
+- http://www.openwall.com/lists/oss-security/2024/06/17/1
+- https://vin01.github.io/piptagole/escape-sequences/iterm2/rce/2024/06/16/iterm2-rce-window-title-tmux-integration.html
+
+#### Github
+- https://github.com/nomi-sec/PoC-in-GitHub
+
diff --git a/2024/CVE-2024-3840.md b/2024/CVE-2024-3840.md
index f2cb9781f7..49a680dd34 100644
--- a/2024/CVE-2024-3840.md
+++ b/2024/CVE-2024-3840.md
@@ -10,7 +10,7 @@ Insufficient policy enforcement in Site Isolation in Google Chrome prior to 124.
### POC
#### Reference
-No PoCs from references.
+- https://issues.chromium.org/issues/41493458
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
diff --git a/2024/CVE-2024-38427.md b/2024/CVE-2024-38427.md
new file mode 100644
index 0000000000..60dd2b432a
--- /dev/null
+++ b/2024/CVE-2024-38427.md
@@ -0,0 +1,18 @@
+### [CVE-2024-38427](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38427)
+
+
+
+
+### Description
+
+In International Color Consortium DemoIccMAX before 85ce74e, a logic flaw in CIccTagXmlProfileSequenceId::ParseXml in IccXML/IccLibXML/IccTagXml.cpp results in unconditionally returning false.
+
+### POC
+
+#### Reference
+- https://github.com/InternationalColorConsortium/DemoIccMAX/pull/66
+- https://github.com/InternationalColorConsortium/DemoIccMAX/pull/66/commits/85ce74ef19fb0751c7e188b06daed22fe74c332c
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-38449.md b/2024/CVE-2024-38449.md
new file mode 100644
index 0000000000..7c760801e5
--- /dev/null
+++ b/2024/CVE-2024-38449.md
@@ -0,0 +1,17 @@
+### [CVE-2024-38449](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38449)
+
+
+
+
+### Description
+
+A Directory Traversal vulnerability in KasmVNC 1.3.1.230e50f7b89663316c70de7b0e3db6f6b9340489 and possibly earlier versions allows remote authenticated attackers to browse parent directories and read the content of files outside the scope of the application.
+
+### POC
+
+#### Reference
+- https://kasmweb.atlassian.net/servicedesk/customer/portal/3/topic/30ffee7f-4b85-4783-b118-6ae4fd8b0c52
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-38460.md b/2024/CVE-2024-38460.md
new file mode 100644
index 0000000000..f895efc94f
--- /dev/null
+++ b/2024/CVE-2024-38460.md
@@ -0,0 +1,17 @@
+### [CVE-2024-38460](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38460)
+
+
+
+
+### Description
+
+In SonarQube before 10.4 and 9.9.4 LTA, encrypted values generated using the Settings Encryption feature are potentially exposed in cleartext as part of the URL parameters in the logs (such as SonarQube Access Logs, Proxy Logs, etc).
+
+### POC
+
+#### Reference
+- https://sonarsource.atlassian.net/browse/SONAR-21559
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-38469.md b/2024/CVE-2024-38469.md
new file mode 100644
index 0000000000..e28a4a4dc9
--- /dev/null
+++ b/2024/CVE-2024-38469.md
@@ -0,0 +1,17 @@
+### [CVE-2024-38469](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38469)
+
+
+
+
+### Description
+
+zhimengzhe iBarn v1.5 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the $search parameter at /pay.php.
+
+### POC
+
+#### Reference
+- https://github.com/zhimengzhe/iBarn/issues/20
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-38470.md b/2024/CVE-2024-38470.md
new file mode 100644
index 0000000000..409a357886
--- /dev/null
+++ b/2024/CVE-2024-38470.md
@@ -0,0 +1,17 @@
+### [CVE-2024-38470](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38470)
+
+
+
+
+### Description
+
+zhimengzhe iBarn v1.5 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the $search parameter at /own.php.
+
+### POC
+
+#### Reference
+- https://github.com/zhimengzhe/iBarn/issues/20
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-3882.md b/2024/CVE-2024-3882.md
index bc5db5c91f..8c8a74660a 100644
--- a/2024/CVE-2024-3882.md
+++ b/2024/CVE-2024-3882.md
@@ -11,6 +11,7 @@ A vulnerability was found in Tenda W30E 1.0.1.25(633). It has been classified as
#### Reference
- https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromRouteStatic.md
+- https://vuldb.com/?id.260916
#### Github
No PoCs found on GitHub currently.
diff --git a/2024/CVE-2024-3922.md b/2024/CVE-2024-3922.md
new file mode 100644
index 0000000000..c07dfc1e02
--- /dev/null
+++ b/2024/CVE-2024-3922.md
@@ -0,0 +1,17 @@
+### [CVE-2024-3922](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3922)
+
+
+&color=brighgreen)
+
+### Description
+
+The Dokan Pro plugin for WordPress is vulnerable to SQL Injection via the 'code' parameter in all versions up to, and including, 3.10.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/nomi-sec/PoC-in-GitHub
+
diff --git a/2024/CVE-2024-3965.md b/2024/CVE-2024-3965.md
new file mode 100644
index 0000000000..8a86491aaf
--- /dev/null
+++ b/2024/CVE-2024-3965.md
@@ -0,0 +1,17 @@
+### [CVE-2024-3965](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3965)
+
+
+&color=brighgreen)
+
+### Description
+
+The Pray For Me WordPress plugin through 1.0.4 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/0e1ba2b3-5849-42f6-b503-8b3b520e4a79/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-3966.md b/2024/CVE-2024-3966.md
new file mode 100644
index 0000000000..523f32c504
--- /dev/null
+++ b/2024/CVE-2024-3966.md
@@ -0,0 +1,17 @@
+### [CVE-2024-3966](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3966)
+
+
+&color=brighgreen)
+
+### Description
+
+The Pray For Me WordPress plugin through 1.0.4 does not sanitise and escape some parameters, which could unauthenticated visitors to perform Cross-Site Scripting attacks that trigger when an admin visits the Prayer Requests in the WP Admin
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/9f0a575f-862d-4f2e-8d25-82c6f58dd11a/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-3971.md b/2024/CVE-2024-3971.md
new file mode 100644
index 0000000000..96322cd4f3
--- /dev/null
+++ b/2024/CVE-2024-3971.md
@@ -0,0 +1,18 @@
+### [CVE-2024-3971](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3971)
+
+
+&color=brighgreen)
+&color=brighgreen)
+
+### Description
+
+The Similarity WordPress plugin through 3.0 does not have CSRF check in place when resetting its settings, which could allow attackers to make a logged in admin reset them via a CSRF attack
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/5dec5719-105d-4989-a97f-bda04d223322/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-3972.md b/2024/CVE-2024-3972.md
new file mode 100644
index 0000000000..e5e3492499
--- /dev/null
+++ b/2024/CVE-2024-3972.md
@@ -0,0 +1,18 @@
+### [CVE-2024-3972](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3972)
+
+
+&color=brighgreen)
+&color=brighgreen)
+
+### Description
+
+The Similarity WordPress plugin through 3.0 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/55dfb9b5-d590-478b-bd1f-d420b79037fa/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-3977.md b/2024/CVE-2024-3977.md
new file mode 100644
index 0000000000..bed80a8040
--- /dev/null
+++ b/2024/CVE-2024-3977.md
@@ -0,0 +1,17 @@
+### [CVE-2024-3977](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3977)
+
+
+&color=brighgreen)
+
+### Description
+
+The WordPress Jitsi Shortcode WordPress plugin through 0.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/25851386-eccf-49cb-afbf-c25286c9b19e/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-3978.md b/2024/CVE-2024-3978.md
new file mode 100644
index 0000000000..87a2bbca62
--- /dev/null
+++ b/2024/CVE-2024-3978.md
@@ -0,0 +1,17 @@
+### [CVE-2024-3978](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3978)
+
+
+&color=brighgreen)
+
+### Description
+
+The WordPress Jitsi Shortcode WordPress plugin through 0.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/a9f47d11-47ac-4998-a82a-dc2f3b0decdf/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-3992.md b/2024/CVE-2024-3992.md
new file mode 100644
index 0000000000..551277c8e6
--- /dev/null
+++ b/2024/CVE-2024-3992.md
@@ -0,0 +1,17 @@
+### [CVE-2024-3992](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3992)
+
+
+&color=brighgreen)
+
+### Description
+
+The Amen WordPress plugin through 3.3.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/e9fe3101-8033-4eee-8b37-06856872e9ef/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-3993.md b/2024/CVE-2024-3993.md
new file mode 100644
index 0000000000..4cfead9943
--- /dev/null
+++ b/2024/CVE-2024-3993.md
@@ -0,0 +1,18 @@
+### [CVE-2024-3993](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3993)
+
+
+&color=brighgreen)
+&color=brighgreen)
+
+### Description
+
+The AZAN Plugin WordPress plugin through 0.6 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/19cd60dd-8599-4af3-99db-c42de504606c/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-4005.md b/2024/CVE-2024-4005.md
new file mode 100644
index 0000000000..e16c938143
--- /dev/null
+++ b/2024/CVE-2024-4005.md
@@ -0,0 +1,17 @@
+### [CVE-2024-4005](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4005)
+
+
+&color=brighgreen)
+
+### Description
+
+The Social Pixel WordPress plugin through 2.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/02ca09f8-4080-4969-992d-0e6afb29bc62/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-4040.md b/2024/CVE-2024-4040.md
index da624de538..28e550381c 100644
--- a/2024/CVE-2024-4040.md
+++ b/2024/CVE-2024-4040.md
@@ -24,6 +24,7 @@ A server side template injection vulnerability in CrushFTP in all versions befor
- https://github.com/Y4tacker/JavaSec
- https://github.com/absholi7ly/absholi7ly
- https://github.com/airbus-cert/CVE-2024-4040
+- https://github.com/enomothem/PenTestNote
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/getdrive/PoC
- https://github.com/gotr00t0day/CVE-2024-4040
diff --git a/2024/CVE-2024-4068.md b/2024/CVE-2024-4068.md
index 20c4c39c6a..86f3d52f1e 100644
--- a/2024/CVE-2024-4068.md
+++ b/2024/CVE-2024-4068.md
@@ -14,5 +14,5 @@ The NPM package `braces`, versions prior to 3.0.3, fails to limit the number of
- https://github.com/micromatch/braces/pull/37
#### Github
-No PoCs found on GitHub currently.
+- https://github.com/seal-community/patches
diff --git a/2024/CVE-2024-4094.md b/2024/CVE-2024-4094.md
new file mode 100644
index 0000000000..79e5e3838c
--- /dev/null
+++ b/2024/CVE-2024-4094.md
@@ -0,0 +1,17 @@
+### [CVE-2024-4094](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4094)
+
+
+&color=brighgreen)
+
+### Description
+
+The Simple Share Buttons Adder WordPress plugin before 8.5.1 does not sanitise and escape some of its settings, which could allow high privilege users such as editors to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/04b2feba-e009-4fce-8539-5dfdb4300433/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-4145.md b/2024/CVE-2024-4145.md
new file mode 100644
index 0000000000..496b16a68f
--- /dev/null
+++ b/2024/CVE-2024-4145.md
@@ -0,0 +1,17 @@
+### [CVE-2024-4145](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4145)
+
+
+
+
+### Description
+
+The Search & Replace WordPress plugin before 3.2.2 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks (such as within a multi-site network).
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/7d5b8764-c82d-4969-a707-f38b63bcadca/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-4149.md b/2024/CVE-2024-4149.md
new file mode 100644
index 0000000000..a947fa79a8
--- /dev/null
+++ b/2024/CVE-2024-4149.md
@@ -0,0 +1,17 @@
+### [CVE-2024-4149](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4149)
+
+
+&color=brighgreen)
+
+### Description
+
+The Floating Chat Widget: Contact Chat Icons, WhatsApp, Telegram Chat, Line Messenger, WeChat, Email, SMS, Call Button WordPress plugin before 3.2.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/0256ec2a-f1a9-4110-9978-ee88f9e24237/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-4231.md b/2024/CVE-2024-4231.md
new file mode 100644
index 0000000000..241ba219dd
--- /dev/null
+++ b/2024/CVE-2024-4231.md
@@ -0,0 +1,17 @@
+### [CVE-2024-4231](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4231)
+
+
+
+
+### Description
+
+This vulnerability exists in Digisol Router (DG-GR1321: Hardware version 3.7L; Firmware version : v3.2.02) due to presence of root terminal access on a serial interface without proper access control. An attacker with physical access could exploit this by identifying UART pins and accessing the root shell on the vulnerable system.Successful exploitation of this vulnerability could allow the attacker to access the sensitive information on the targeted system.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/nomi-sec/PoC-in-GitHub
+
diff --git a/2024/CVE-2024-4232.md b/2024/CVE-2024-4232.md
new file mode 100644
index 0000000000..3f850a0929
--- /dev/null
+++ b/2024/CVE-2024-4232.md
@@ -0,0 +1,17 @@
+### [CVE-2024-4232](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4232)
+
+
+
+
+### Description
+
+This vulnerability exists in Digisol Router (DG-GR1321: Hardware version 3.7L; Firmware version : v3.2.02) due to lack of encryption or hashing in storing of passwords within the router's firmware/ database. An attacker with physical access could exploit this by extracting the firmware and reverse engineer the binary data to access the plaintext passwords on the vulnerable system.Successful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the targeted system.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/nomi-sec/PoC-in-GitHub
+
diff --git a/2024/CVE-2024-4270.md b/2024/CVE-2024-4270.md
new file mode 100644
index 0000000000..a05bb686b9
--- /dev/null
+++ b/2024/CVE-2024-4270.md
@@ -0,0 +1,17 @@
+### [CVE-2024-4270](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4270)
+
+
+&color=brighgreen)
+
+### Description
+
+The SVGMagic WordPress plugin through 1.1 does not sanitize SVG file contents, which enables users with at least the author role to SVG with malicious JavaScript to conduct Stored XSS attacks.
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/7a3b89cc-7a81-448a-94fc-36a7033609d5/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-4271.md b/2024/CVE-2024-4271.md
new file mode 100644
index 0000000000..a4aaead59f
--- /dev/null
+++ b/2024/CVE-2024-4271.md
@@ -0,0 +1,17 @@
+### [CVE-2024-4271](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4271)
+
+
+&color=brighgreen)
+
+### Description
+
+The SVGator WordPress plugin through 1.2.6 does not sanitize SVG file contents, which enables users with at least the author role to SVG with malicious JavaScript to conduct Stored XSS attacks.
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/c1fe0bc7-a340-428e-a549-1e37291bea1c/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-4305.md b/2024/CVE-2024-4305.md
new file mode 100644
index 0000000000..babcdb1e10
--- /dev/null
+++ b/2024/CVE-2024-4305.md
@@ -0,0 +1,17 @@
+### [CVE-2024-4305](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4305)
+
+
+&color=brighgreen)
+
+### Description
+
+The Post Grid Gutenberg Blocks and WordPress Blog Plugin WordPress plugin before 4.1.0 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/635be98d-4c17-4e75-871f-9794d85a2eb1/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-4358.md b/2024/CVE-2024-4358.md
index 6efcb4826a..07d5af395c 100644
--- a/2024/CVE-2024-4358.md
+++ b/2024/CVE-2024-4358.md
@@ -15,6 +15,7 @@ No PoCs from references.
#### Github
- https://github.com/GhostTroops/TOP
- https://github.com/Harydhk7/CVE-2024-4358
+- https://github.com/Ostorlab/KEV
- https://github.com/RevoltSecurities/CVE-2024-4358
- https://github.com/Sk1dr0wz/CVE-2024-4358_Mass_Exploit
- https://github.com/nomi-sec/PoC-in-GitHub
diff --git a/2024/CVE-2024-4369.md b/2024/CVE-2024-4369.md
index e40ffd015b..6975e52d81 100644
--- a/2024/CVE-2024-4369.md
+++ b/2024/CVE-2024-4369.md
@@ -1,5 +1,6 @@
### [CVE-2024-4369](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4369)
-
+
+


diff --git a/2024/CVE-2024-4377.md b/2024/CVE-2024-4377.md
new file mode 100644
index 0000000000..27bc435fb6
--- /dev/null
+++ b/2024/CVE-2024-4377.md
@@ -0,0 +1,17 @@
+### [CVE-2024-4377](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4377)
+
+
+&color=brighgreen)
+
+### Description
+
+The DOP Shortcodes WordPress plugin through 1.2 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/778cebec-bdbb-4538-9518-c5bd50f76961/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-4381.md b/2024/CVE-2024-4381.md
new file mode 100644
index 0000000000..87714db347
--- /dev/null
+++ b/2024/CVE-2024-4381.md
@@ -0,0 +1,17 @@
+### [CVE-2024-4381](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4381)
+&color=blue)
+
+&color=brighgreen)
+
+### Description
+
+The CB (legacy) WordPress plugin through 0.9.4.18 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/9b3cda9a-17a7-4173-93a2-d552a874fae9/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-4382.md b/2024/CVE-2024-4382.md
new file mode 100644
index 0000000000..ed3edc7c4a
--- /dev/null
+++ b/2024/CVE-2024-4382.md
@@ -0,0 +1,17 @@
+### [CVE-2024-4382](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4382)
+&color=blue)
+
+&color=brighgreen)
+
+### Description
+
+The CB (legacy) WordPress plugin through 0.9.4.18 does not have CSRF checks in some bulk actions, which could allow attackers to make logged in admins perform unwanted actions, such as deleting codes, timeframes, and bookings via CSRF attacks
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/1a67aeab-8145-4c8a-9c18-e6436fa39b63/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-4384.md b/2024/CVE-2024-4384.md
new file mode 100644
index 0000000000..19bb12faed
--- /dev/null
+++ b/2024/CVE-2024-4384.md
@@ -0,0 +1,17 @@
+### [CVE-2024-4384](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4384)
+
+
+&color=brighgreen)
+
+### Description
+
+The CSSable Countdown WordPress plugin through 1.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/ad714196-2590-4dc9-b5b9-50808e9e0d26/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-4474.md b/2024/CVE-2024-4474.md
new file mode 100644
index 0000000000..638b1539ee
--- /dev/null
+++ b/2024/CVE-2024-4474.md
@@ -0,0 +1,17 @@
+### [CVE-2024-4474](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4474)
+
+
+&color=brighgreen)
+
+### Description
+
+The WP Logs Book WordPress plugin through 1.0.1 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/71954c60-6a5b-4cac-9920-6d9b787ead9c/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-4475.md b/2024/CVE-2024-4475.md
new file mode 100644
index 0000000000..cf8d8111a5
--- /dev/null
+++ b/2024/CVE-2024-4475.md
@@ -0,0 +1,17 @@
+### [CVE-2024-4475](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4475)
+
+
+&color=brighgreen)
+
+### Description
+
+The WP Logs Book WordPress plugin through 1.0.1 does not have CSRF check when clearing logs, which could allow attackers to make a logged in admin clear the logs them via a CSRF attack
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/f0c7fa00-da6e-4f07-875f-7b85759a54b3/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-4477.md b/2024/CVE-2024-4477.md
new file mode 100644
index 0000000000..644487245a
--- /dev/null
+++ b/2024/CVE-2024-4477.md
@@ -0,0 +1,17 @@
+### [CVE-2024-4477](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4477)
+
+
+&color=brighgreen)
+
+### Description
+
+The WP Logs Book WordPress plugin through 1.0.1 does not sanitise and escape some of its log data before outputting them back in an admin dashboard, leading to an Unauthenticated Stored Cross-Site Scripting
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/ab551552-944c-4e2a-9355-7011cbe553b0/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-4480.md b/2024/CVE-2024-4480.md
new file mode 100644
index 0000000000..ce37619504
--- /dev/null
+++ b/2024/CVE-2024-4480.md
@@ -0,0 +1,17 @@
+### [CVE-2024-4480](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4480)
+
+
+&color=brighgreen)
+
+### Description
+
+The WP Prayer II WordPress plugin through 2.4.7 does not have CSRF check in place when updating its email settings, which could allow attackers to make a logged in admin change them via a CSRF attack
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/c1e5dee9-c540-4cc1-8b94-c6d1650b52d3/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-4484.md b/2024/CVE-2024-4484.md
new file mode 100644
index 0000000000..fef819e8f3
--- /dev/null
+++ b/2024/CVE-2024-4484.md
@@ -0,0 +1,17 @@
+### [CVE-2024-4484](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4484)
+
+
+&color=brighgreen)
+
+### Description
+
+The The Plus Addons for Elementor – Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘xai_username’ parameter in versions up to, and including, 5.5.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/nomi-sec/PoC-in-GitHub
+
diff --git a/2024/CVE-2024-4565.md b/2024/CVE-2024-4565.md
new file mode 100644
index 0000000000..2ae39ed6db
--- /dev/null
+++ b/2024/CVE-2024-4565.md
@@ -0,0 +1,18 @@
+### [CVE-2024-4565](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4565)
+&color=blue)
+
+
+
+
+### Description
+
+The Advanced Custom Fields (ACF) WordPress plugin before 6.3, Advanced Custom Fields Pro WordPress plugin before 6.3 allows you to display custom field values for any post via shortcode without checking for the correct access
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/430224c4-d6e3-4ca8-b1bc-b2229a9bcf12/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-4577.md b/2024/CVE-2024-4577.md
index a22482274e..8a5e2075ee 100644
--- a/2024/CVE-2024-4577.md
+++ b/2024/CVE-2024-4577.md
@@ -11,6 +11,7 @@ In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, w
#### Reference
- https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/
+- https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately
- https://github.com/11whoami99/CVE-2024-4577
- https://github.com/watchtowrlabs/CVE-2024-4577
- https://github.com/xcanwin/CVE-2024-4577-PHP-RCE
@@ -18,19 +19,27 @@ In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, w
#### Github
- https://github.com/0x20c/CVE-2024-4577-nuclei
+- https://github.com/0xMarcio/cve
- https://github.com/0xsyr0/OSCP
+- https://github.com/11whoami99/CVE-2024-4577
- https://github.com/Chocapikk/CVE-2024-4577
- https://github.com/GhostTroops/TOP
- https://github.com/Junp0/CVE-2024-4577
- https://github.com/K3ysTr0K3R/CVE-2024-4577-EXPLOIT
- https://github.com/K3ysTr0K3R/K3ysTr0K3R
+- https://github.com/Ostorlab/KEV
- https://github.com/Sysc4ll3r/CVE-2024-4577
- https://github.com/TAM-K592/CVE-2024-4577
+- https://github.com/Threekiii/Awesome-POC
+- https://github.com/Threekiii/CVE
- https://github.com/WanLiChangChengWanLiChang/CVE-2024-4577-RCE-EXP
- https://github.com/Wh02m1/CVE-2024-4577
+- https://github.com/XiangDongCJC/CVE-2024-4577-PHP-CGI-RCE
- https://github.com/Yukiioz/CVE-2024-4577
- https://github.com/ZephrFish/CVE-2024-4577-PHP-RCE
+- https://github.com/bl4cksku11/CVE-2024-4577
- https://github.com/dbyMelina/CVE-2024-4577
+- https://github.com/enomothem/PenTestNote
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/huseyinstif/CVE-2024-4577-Nuclei-Template
- https://github.com/it-t4mpan/check_cve_2024_4577.sh
@@ -41,7 +50,9 @@ In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, w
- https://github.com/taida957789/CVE-2024-4577
- https://github.com/tanjiti/sec_profile
- https://github.com/vwilzz/PHP-RCE-4577
+- https://github.com/watchtowrlabs/CVE-2024-4577
- https://github.com/wy876/POC
- https://github.com/wy876/wiki
+- https://github.com/xcanwin/CVE-2024-4577-PHP-RCE
- https://github.com/zomasec/CVE-2024-4577
diff --git a/2024/CVE-2024-4603.md b/2024/CVE-2024-4603.md
index 19c14d27db..309629ce51 100644
--- a/2024/CVE-2024-4603.md
+++ b/2024/CVE-2024-4603.md
@@ -13,6 +13,7 @@ Issue summary: Checking excessively long DSA keys or parameters may be veryslow.
No PoCs from references.
#### Github
+- https://github.com/bcgov/jag-cdds
- https://github.com/chnzzh/OpenSSL-CVE-lib
- https://github.com/fkie-cad/nvd-json-data-feeds
diff --git a/2024/CVE-2024-4616.md b/2024/CVE-2024-4616.md
new file mode 100644
index 0000000000..57c652aa82
--- /dev/null
+++ b/2024/CVE-2024-4616.md
@@ -0,0 +1,17 @@
+### [CVE-2024-4616](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4616)
+
+
+&color=brighgreen)
+
+### Description
+
+The Widget Bundle WordPress plugin through 2.0.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against only unauthenticated users
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/d203bf3b-aee9-4755-b429-d6bbdd940890/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-4744.md b/2024/CVE-2024-4744.md
new file mode 100644
index 0000000000..426a685f60
--- /dev/null
+++ b/2024/CVE-2024-4744.md
@@ -0,0 +1,17 @@
+### [CVE-2024-4744](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4744)
+
+
+
+
+### Description
+
+Missing Authorization vulnerability in Avirtum iPages Flipbook.This issue affects iPages Flipbook: from n/a through 1.5.1.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/fkie-cad/nvd-json-data-feeds
+
diff --git a/2024/CVE-2024-4745.md b/2024/CVE-2024-4745.md
new file mode 100644
index 0000000000..aa532fa9ba
--- /dev/null
+++ b/2024/CVE-2024-4745.md
@@ -0,0 +1,17 @@
+### [CVE-2024-4745](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4745)
+
+
+
+
+### Description
+
+Missing Authorization vulnerability in RafflePress Giveaways and Contests by RafflePress.This issue affects Giveaways and Contests by RafflePress: from n/a through 1.12.4.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/fkie-cad/nvd-json-data-feeds
+
diff --git a/2024/CVE-2024-4746.md b/2024/CVE-2024-4746.md
new file mode 100644
index 0000000000..4d9c455c99
--- /dev/null
+++ b/2024/CVE-2024-4746.md
@@ -0,0 +1,17 @@
+### [CVE-2024-4746](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4746)
+
+
+
+
+### Description
+
+Missing Authorization vulnerability in Netgsm.This issue affects Netgsm: from n/a through 2.9.16.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/fkie-cad/nvd-json-data-feeds
+
diff --git a/2024/CVE-2024-4751.md b/2024/CVE-2024-4751.md
new file mode 100644
index 0000000000..1fcaf87ad8
--- /dev/null
+++ b/2024/CVE-2024-4751.md
@@ -0,0 +1,17 @@
+### [CVE-2024-4751](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4751)
+
+
+&color=brighgreen)
+
+### Description
+
+The WP Prayer II WordPress plugin through 2.4.7 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/94f4cc45-4c55-43d4-8ad2-a20c118b589f/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-4755.md b/2024/CVE-2024-4755.md
new file mode 100644
index 0000000000..b30b99f142
--- /dev/null
+++ b/2024/CVE-2024-4755.md
@@ -0,0 +1,17 @@
+### [CVE-2024-4755](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4755)
+
+
+&color=brighgreen)
+
+### Description
+
+The Google CSE WordPress plugin through 1.0.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/adc6ea6d-29d8-4ad0-b0db-2540e8b3f9a9/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-4859.md b/2024/CVE-2024-4859.md
index 38874d0a71..1647d9606d 100644
--- a/2024/CVE-2024-4859.md
+++ b/2024/CVE-2024-4859.md
@@ -13,5 +13,6 @@ Solidus <= 4.3.4 is affected by a Stored Cross-Site Scripting vulnerability in
No PoCs from references.
#### Github
+- https://github.com/JoshuaMart/JoshuaMart
- https://github.com/fkie-cad/nvd-json-data-feeds
diff --git a/2024/CVE-2024-4860.md b/2024/CVE-2024-4860.md
index 1dabcbe1db..700cf2c676 100644
--- a/2024/CVE-2024-4860.md
+++ b/2024/CVE-2024-4860.md
@@ -13,5 +13,6 @@ The 'WordPress RSS Aggregator' WordPress Plugin, versions < 4.23.9 are affected
- https://www.tenable.com/security/research/tra-2024-16
#### Github
+- https://github.com/JoshuaMart/JoshuaMart
- https://github.com/fkie-cad/nvd-json-data-feeds
diff --git a/2024/CVE-2024-4898.md b/2024/CVE-2024-4898.md
new file mode 100644
index 0000000000..9da9406ed2
--- /dev/null
+++ b/2024/CVE-2024-4898.md
@@ -0,0 +1,17 @@
+### [CVE-2024-4898](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4898)
+
+
+
+
+### Description
+
+The InstaWP Connect – 1-click WP Staging & Migration plugin for WordPress is vulnerable to arbitrary option updates due to a missing authorization checks on the REST API calls in all versions up to, and including, 0.1.0.38. This makes it possible for unauthenticated attackers to connect the site to InstaWP API, edit arbitrary site options and create administrator accounts.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/nomi-sec/PoC-in-GitHub
+
diff --git a/2024/CVE-2024-4924.md b/2024/CVE-2024-4924.md
new file mode 100644
index 0000000000..551090421a
--- /dev/null
+++ b/2024/CVE-2024-4924.md
@@ -0,0 +1,17 @@
+### [CVE-2024-4924](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4924)
+
+
+&color=brighgreen)
+
+### Description
+
+The Social Sharing Plugin WordPress plugin before 3.3.63 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/1867505f-d112-4919-9fd5-01745aa0433e/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-4956.md b/2024/CVE-2024-4956.md
index 79534f46a1..9612903684 100644
--- a/2024/CVE-2024-4956.md
+++ b/2024/CVE-2024-4956.md
@@ -23,6 +23,7 @@ No PoCs from references.
- https://github.com/X1r0z/JettyFuzz
- https://github.com/banditzCyber0x/CVE-2024-4956
- https://github.com/codeb0ss/CVE-2024-4956-PoC
+- https://github.com/enomothem/PenTestNote
- https://github.com/erickfernandox/CVE-2024-4956
- https://github.com/fin3ss3g0d/CVE-2024-4956
- https://github.com/fin3ss3g0d/Shiro1Extractor
diff --git a/2024/CVE-2024-4960.md b/2024/CVE-2024-4960.md
new file mode 100644
index 0000000000..1d647af79a
--- /dev/null
+++ b/2024/CVE-2024-4960.md
@@ -0,0 +1,17 @@
+### [CVE-2024-4960](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4960)
+
+
+
+
+### Description
+
+** UNSUPPPORTED WHEN ASSIGNED ** ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical has been found in D-Link DAR-7000-40 V31R02B1413C. Affected is an unknown function of the file interface/sysmanage/licenseauthorization.php. The manipulation of the argument file_upload leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-264528. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/JoshuaMart/JoshuaMart
+
diff --git a/2024/CVE-2024-4969.md b/2024/CVE-2024-4969.md
new file mode 100644
index 0000000000..9b53e62abd
--- /dev/null
+++ b/2024/CVE-2024-4969.md
@@ -0,0 +1,17 @@
+### [CVE-2024-4969](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4969)
+
+
+&color=brighgreen)
+
+### Description
+
+The Widget Bundle WordPress plugin through 2.0.0 does not have CSRF checks when logging Widgets, which could allow attackers to make logged in admin enable/disable widgets via a CSRF attack
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/1a7ec5dc-eda4-4fed-9df9-f41d2b937fed/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-4970.md b/2024/CVE-2024-4970.md
new file mode 100644
index 0000000000..40c77d663f
--- /dev/null
+++ b/2024/CVE-2024-4970.md
@@ -0,0 +1,17 @@
+### [CVE-2024-4970](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4970)
+
+
+&color=brighgreen)
+
+### Description
+
+The Widget Bundle WordPress plugin through 2.0.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/4a9fc352-7ec2-4992-9cda-7bdca4f42788/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-5102.md b/2024/CVE-2024-5102.md
new file mode 100644
index 0000000000..b999267875
--- /dev/null
+++ b/2024/CVE-2024-5102.md
@@ -0,0 +1,17 @@
+### [CVE-2024-5102](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5102)
+
+
+
+
+### Description
+
+A sym-linked file accessed via the repair function in Avast Antivirus <24.2 on Windows may allow user to elevate privilege to delete arbitrary files or run processes as NT AUTHORITY\SYSTEM. The vulnerability exists within the "Repair" (settings -> troubleshooting -> repair) feature, which attempts to delete a file in the current user's AppData directory as NT AUTHORITY\SYSTEM. A low-privileged user can make a pseudo-symlink and a junction folder and point to a file on the system. This can provide a low-privileged user an Elevation of Privilege to win a race-condition which will re-create the system files and make Windows callback to a specially-crafted file which could be used to launch a privileged shell instance.This issue affects Avast Antivirus prior to 24.2.
+
+### POC
+
+#### Reference
+- https://support.norton.com/sp/static/external/tools/security-advisories.html
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-5155.md b/2024/CVE-2024-5155.md
new file mode 100644
index 0000000000..3d9b069c02
--- /dev/null
+++ b/2024/CVE-2024-5155.md
@@ -0,0 +1,18 @@
+### [CVE-2024-5155](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5155)
+
+
+&color=brighgreen)
+&color=brighgreen)
+
+### Description
+
+The Inquiry cart WordPress plugin through 3.4.2 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/f1e90a8a-d959-4316-a5d4-e183854944bd/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-5172.md b/2024/CVE-2024-5172.md
new file mode 100644
index 0000000000..b2b421fda5
--- /dev/null
+++ b/2024/CVE-2024-5172.md
@@ -0,0 +1,17 @@
+### [CVE-2024-5172](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5172)
+
+
+&color=brighgreen)
+
+### Description
+
+The Expert Invoice WordPress plugin through 1.0.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/65d84e69-0548-4c7d-bcde-5777d72da555/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-5208.md b/2024/CVE-2024-5208.md
new file mode 100644
index 0000000000..013bc865ea
--- /dev/null
+++ b/2024/CVE-2024-5208.md
@@ -0,0 +1,17 @@
+### [CVE-2024-5208](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5208)
+
+
+
+
+### Description
+
+An uncontrolled resource consumption vulnerability exists in the `upload-link` endpoint of mintplex-labs/anything-llm. This vulnerability allows attackers to cause a denial of service (DOS) by shutting down the server through sending invalid upload requests. Specifically, the server can be made to shut down by sending an empty body with a 'Content-Length: 0' header or by sending a body with arbitrary content, such as 'asdasdasd', with a 'Content-Length: 9' header. The vulnerability is reproducible by users with at least a 'Manager' role, sending a crafted request to any workspace. This issue indicates that a previous fix was not effective in mitigating the vulnerability.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/sev-hack/sev-hack
+
diff --git a/2024/CVE-2024-5410.md b/2024/CVE-2024-5410.md
index 660bcd8d7b..95a282da72 100644
--- a/2024/CVE-2024-5410.md
+++ b/2024/CVE-2024-5410.md
@@ -10,6 +10,7 @@ Missing input validation in the ORing IAP-420 web-interface allows stored Cross-
### POC
#### Reference
+- http://seclists.org/fulldisclosure/2024/May/36
- https://cyberdanube.com/en/en-multiple-vulnerabilities-in-oring-iap420/
#### Github
diff --git a/2024/CVE-2024-5411.md b/2024/CVE-2024-5411.md
index e3ad2cda6e..3f1326218e 100644
--- a/2024/CVE-2024-5411.md
+++ b/2024/CVE-2024-5411.md
@@ -10,6 +10,7 @@ Missing input validation and OS command integration of the input in the ORing IA
### POC
#### Reference
+- http://seclists.org/fulldisclosure/2024/May/36
- https://cyberdanube.com/en/en-multiple-vulnerabilities-in-oring-iap420/
#### Github
diff --git a/2024/CVE-2024-5420.md b/2024/CVE-2024-5420.md
index 62e1243a00..0ccceebcb4 100644
--- a/2024/CVE-2024-5420.md
+++ b/2024/CVE-2024-5420.md
@@ -12,6 +12,7 @@ Missing input validation in the SEH Computertechnik utnserver Pro, SEH Computer
### POC
#### Reference
+- http://seclists.org/fulldisclosure/2024/Jun/4
- https://cyberdanube.com/en/en-multiple-vulnerabilities-in-oring-iap420/index.html
#### Github
diff --git a/2024/CVE-2024-5421.md b/2024/CVE-2024-5421.md
index 768a58ff0c..0318228471 100644
--- a/2024/CVE-2024-5421.md
+++ b/2024/CVE-2024-5421.md
@@ -12,6 +12,7 @@ Missing input validation and OS command integration of the input in the utnserve
### POC
#### Reference
+- http://seclists.org/fulldisclosure/2024/Jun/4
- https://cyberdanube.com/en/en-multiple-vulnerabilities-in-seh-untserver-pro/index.html
#### Github
diff --git a/2024/CVE-2024-5422.md b/2024/CVE-2024-5422.md
index c983739f8a..88fa4164c9 100644
--- a/2024/CVE-2024-5422.md
+++ b/2024/CVE-2024-5422.md
@@ -12,6 +12,7 @@ An uncontrolled resource consumption of file descriptors in SEH Computertechnik
### POC
#### Reference
+- http://seclists.org/fulldisclosure/2024/Jun/4
- https://cyberdanube.com/en/en-multiple-vulnerabilities-in-seh-untserver-pro/index.html
#### Github
diff --git a/2024/CVE-2024-5447.md b/2024/CVE-2024-5447.md
new file mode 100644
index 0000000000..eb1507dbfd
--- /dev/null
+++ b/2024/CVE-2024-5447.md
@@ -0,0 +1,17 @@
+### [CVE-2024-5447](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5447)
+
+
+&color=brighgreen)
+
+### Description
+
+The PayPal Pay Now, Buy Now, Donation and Cart Buttons Shortcode WordPress plugin through 1.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/a692b869-1666-42d1-b56d-dfcccd68ab67/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-5448.md b/2024/CVE-2024-5448.md
new file mode 100644
index 0000000000..c352f042e0
--- /dev/null
+++ b/2024/CVE-2024-5448.md
@@ -0,0 +1,17 @@
+### [CVE-2024-5448](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5448)
+
+
+&color=brighgreen)
+
+### Description
+
+The PayPal Pay Now, Buy Now, Donation and Cart Buttons Shortcode WordPress plugin through 1.7 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/c482fe19-b643-41ea-8194-22776b388290/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-5475.md b/2024/CVE-2024-5475.md
new file mode 100644
index 0000000000..e0f2fe41a7
--- /dev/null
+++ b/2024/CVE-2024-5475.md
@@ -0,0 +1,17 @@
+### [CVE-2024-5475](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5475)
+
+
+&color=brighgreen)
+
+### Description
+
+The Responsive video embed WordPress plugin before 0.5.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/cee66543-b5d6-4205-8f9b-0febd7fee445/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-5522.md b/2024/CVE-2024-5522.md
new file mode 100644
index 0000000000..eaa30b33d7
--- /dev/null
+++ b/2024/CVE-2024-5522.md
@@ -0,0 +1,18 @@
+### [CVE-2024-5522](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5522)
+
+
+
+
+### Description
+
+The HTML5 Video Player WordPress plugin before 2.5.27 does not sanitize and escape a parameter from a REST route before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks
+
+### POC
+
+#### Reference
+- https://wpscan.com/vulnerability/bc76ef95-a2a9-4185-8ed9-1059097a506a/
+
+#### Github
+- https://github.com/nomi-sec/PoC-in-GitHub
+- https://github.com/truonghuuphuc/CVE-2024-5522-Poc
+
diff --git a/2024/CVE-2024-5585.md b/2024/CVE-2024-5585.md
index 38f3f3c764..3808121311 100644
--- a/2024/CVE-2024-5585.md
+++ b/2024/CVE-2024-5585.md
@@ -15,4 +15,5 @@ In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, t
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
+- https://github.com/tianstcht/tianstcht
diff --git a/2024/CVE-2024-5656.md b/2024/CVE-2024-5656.md
index 17bdb54823..da58c70045 100644
--- a/2024/CVE-2024-5656.md
+++ b/2024/CVE-2024-5656.md
@@ -1,11 +1,11 @@
### [CVE-2024-5656](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5656)
-
-
-&color=brighgreen)
+
+
+
### Description
-The Google CSE plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.0.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
+** REJECT ** Accidental duplicate assignment of CVE-2024-4755. Please use CVE-2024-4755.
### POC
diff --git a/2024/CVE-2024-5657.md b/2024/CVE-2024-5657.md
index c6c1791da3..da4d02bb46 100644
--- a/2024/CVE-2024-5657.md
+++ b/2024/CVE-2024-5657.md
@@ -10,6 +10,7 @@ The CraftCMS plugin Two-Factor Authentication in versions 3.3.1, 3.3.2 and 3.3.3
### POC
#### Reference
+- http://www.openwall.com/lists/oss-security/2024/06/06/1
- https://github.com/sbaresearch/advisories/tree/public/2024/SBA-ADV-20240202-01_CraftCMS_Plugin_Two-Factor_Authentication_Password_Hash_Disclosure
#### Github
diff --git a/2024/CVE-2024-5658.md b/2024/CVE-2024-5658.md
index 1d2d78b37b..3626e5ccfa 100644
--- a/2024/CVE-2024-5658.md
+++ b/2024/CVE-2024-5658.md
@@ -10,6 +10,7 @@ The CraftCMS plugin Two-Factor Authentication through 3.3.3 allows reuse of TOTP
### POC
#### Reference
+- http://www.openwall.com/lists/oss-security/2024/06/06/2
- https://github.com/sbaresearch/advisories/tree/public/2024/SBA-ADV-20240202-02_CraftCMS_Plugin_Two-Factor_Authentication_TOTP_Valid_After_Use
#### Github
diff --git a/2024/CVE-2024-5676.md b/2024/CVE-2024-5676.md
new file mode 100644
index 0000000000..3ac02ff514
--- /dev/null
+++ b/2024/CVE-2024-5676.md
@@ -0,0 +1,17 @@
+### [CVE-2024-5676](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5676)
+
+
+&color=brighgreen)
+
+### Description
+
+The Paradox IP150 Internet Module in version 1.40.00 is vulnerable to Cross-Site Request Forgery (CSRF) attacks due to a lack of countermeasures and the use of the HTTP method `GET` to introduce changes in the system.
+
+### POC
+
+#### Reference
+- https://github.com/sbaresearch/advisories/tree/public/2024/SBA-ADV-20240321-01_Paradox_Cross_Site_Request_Forgery
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-5758.md b/2024/CVE-2024-5758.md
index fb586b47da..5cc0a16ed7 100644
--- a/2024/CVE-2024-5758.md
+++ b/2024/CVE-2024-5758.md
@@ -1,11 +1,11 @@
### [CVE-2024-5758](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5758)
-
-
-&color=brighgreen)
+
+
+
### Description
-The Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the filterMobileText parameter in all versions up to, and including, 4.0.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
+** REJECT ** Duplicate of CVE-2024-4305. Please use CVE-2024-4305 instead.
### POC
diff --git a/2024/CVE-2024-5772.md b/2024/CVE-2024-5772.md
index f48e275f1b..2afcce72e2 100644
--- a/2024/CVE-2024-5772.md
+++ b/2024/CVE-2024-5772.md
@@ -10,7 +10,7 @@ A vulnerability, which was classified as critical, has been found in Netentsec N
### POC
#### Reference
-No PoCs from references.
+- https://github.com/charliecatsec/cve1/blob/main/NS-ASG-sql-deleteiscuser.md
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds
diff --git a/2024/CVE-2024-5785.md b/2024/CVE-2024-5785.md
new file mode 100644
index 0000000000..f4113aef72
--- /dev/null
+++ b/2024/CVE-2024-5785.md
@@ -0,0 +1,17 @@
+### [CVE-2024-5785](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5785)
+
+
+&color=brighgreen)
+
+### Description
+
+Command injection vulnerability in Comtrend router WLD71-T1_v2.0.201820, affecting the GRG-4280us version. This vulnerability could allow an authenticated user to execute commands inside the router by making a POST request to the URL “/boaform/admin/formUserTracert”.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/fkie-cad/nvd-json-data-feeds
+
diff --git a/2024/CVE-2024-5786.md b/2024/CVE-2024-5786.md
new file mode 100644
index 0000000000..266699814c
--- /dev/null
+++ b/2024/CVE-2024-5786.md
@@ -0,0 +1,17 @@
+### [CVE-2024-5786](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5786)
+
+
+&color=brighgreen)
+
+### Description
+
+Cross-Site Request Forgery vulnerability in Comtrend router WLD71-T1_v2.0.201820, affecting the GRG-4280us version. This vulnerability allows an attacker to force an end user to execute unwanted actions in a web application to which he is authenticated.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/fkie-cad/nvd-json-data-feeds
+
diff --git a/2024/CVE-2024-5851.md b/2024/CVE-2024-5851.md
new file mode 100644
index 0000000000..920de9aa08
--- /dev/null
+++ b/2024/CVE-2024-5851.md
@@ -0,0 +1,17 @@
+### [CVE-2024-5851](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5851)
+
+
+
+
+### Description
+
+A vulnerability classified as problematic has been found in playSMS up to 1.4.7. Affected is an unknown function of the file /index.php?app=main&inc=feature_schedule&op=list of the component SMS Schedule Handler. The manipulation of the argument name/message leads to basic cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.4.8 is able to address this issue. The name of the patch is 7a88920f6b536c6a91512e739bcb4e8adefeed2b. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-267912. NOTE: The code maintainer was contacted early about this disclosure and was eager to prepare a fix as quickly as possible.
+
+### POC
+
+#### Reference
+- https://vuldb.com/?submit.347385
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-5894.md b/2024/CVE-2024-5894.md
new file mode 100644
index 0000000000..7928458996
--- /dev/null
+++ b/2024/CVE-2024-5894.md
@@ -0,0 +1,17 @@
+### [CVE-2024-5894](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5894)
+
+
+
+
+### Description
+
+A vulnerability classified as critical was found in SourceCodester Online Eyewear Shop 1.0. This vulnerability affects unknown code of the file manage_product.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-268138 is the identifier assigned to this vulnerability.
+
+### POC
+
+#### Reference
+- https://github.com/Hefei-Coffee/cve/blob/main/sql10.md
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-5895.md b/2024/CVE-2024-5895.md
new file mode 100644
index 0000000000..ccf827fc15
--- /dev/null
+++ b/2024/CVE-2024-5895.md
@@ -0,0 +1,17 @@
+### [CVE-2024-5895](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5895)
+
+
+
+
+### Description
+
+A vulnerability, which was classified as critical, has been found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0. This issue affects the function delete_users of the file /classes/Users.php?f=delete. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268139.
+
+### POC
+
+#### Reference
+- https://github.com/Hefei-Coffee/cve/blob/main/sql11.md
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-5896.md b/2024/CVE-2024-5896.md
new file mode 100644
index 0000000000..33e6d5b025
--- /dev/null
+++ b/2024/CVE-2024-5896.md
@@ -0,0 +1,17 @@
+### [CVE-2024-5896](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5896)
+
+
+
+
+### Description
+
+A vulnerability, which was classified as critical, was found in SourceCodester Employee and Visitor Gate Pass Logging System 1.0. Affected is the function save_users of the file /classes/Users.php?f=save. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-268140.
+
+### POC
+
+#### Reference
+- https://github.com/Hefei-Coffee/cve/blob/main/sql12.md
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-5898.md b/2024/CVE-2024-5898.md
new file mode 100644
index 0000000000..c72a2be2d3
--- /dev/null
+++ b/2024/CVE-2024-5898.md
@@ -0,0 +1,17 @@
+### [CVE-2024-5898](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5898)
+
+
+
+
+### Description
+
+A vulnerability was found in itsourcecode Payroll Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file print_payroll.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-268142 is the identifier assigned to this vulnerability.
+
+### POC
+
+#### Reference
+- https://github.com/guiyxli/cve/issues/1
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-5981.md b/2024/CVE-2024-5981.md
new file mode 100644
index 0000000000..918181f26c
--- /dev/null
+++ b/2024/CVE-2024-5981.md
@@ -0,0 +1,17 @@
+### [CVE-2024-5981](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5981)
+
+
+
+
+### Description
+
+A vulnerability was found in itsourcecode Online House Rental System 1.0. It has been classified as critical. Affected is an unknown function of the file manage_user.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-268458 is the identifier assigned to this vulnerability.
+
+### POC
+
+#### Reference
+- https://github.com/LiuYongXiang-git/cve/issues/1
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-5983.md b/2024/CVE-2024-5983.md
new file mode 100644
index 0000000000..4cacff38bd
--- /dev/null
+++ b/2024/CVE-2024-5983.md
@@ -0,0 +1,17 @@
+### [CVE-2024-5983](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5983)
+
+
+
+
+### Description
+
+A vulnerability was found in itsourcecode Online Bookstore 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file bookPerPub.php. The manipulation of the argument pubid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268459.
+
+### POC
+
+#### Reference
+- https://github.com/LiuYongXiang-git/cve/issues/2
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-5984.md b/2024/CVE-2024-5984.md
new file mode 100644
index 0000000000..1729586a5d
--- /dev/null
+++ b/2024/CVE-2024-5984.md
@@ -0,0 +1,17 @@
+### [CVE-2024-5984](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5984)
+
+
+
+
+### Description
+
+A vulnerability was found in itsourcecode Online Bookstore 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file book.php. The manipulation of the argument bookisbn leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-268460.
+
+### POC
+
+#### Reference
+- https://github.com/LiuYongXiang-git/cve/issues/3
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-5985.md b/2024/CVE-2024-5985.md
new file mode 100644
index 0000000000..0c4fd63652
--- /dev/null
+++ b/2024/CVE-2024-5985.md
@@ -0,0 +1,17 @@
+### [CVE-2024-5985](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5985)
+
+
+
+
+### Description
+
+A vulnerability classified as critical has been found in SourceCodester Best Online News Portal 1.0. This affects an unknown part of the file /admin/index.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268461 was assigned to this vulnerability.
+
+### POC
+
+#### Reference
+- https://github.com/CveSecLook/cve/issues/45
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-6006.md b/2024/CVE-2024-6006.md
new file mode 100644
index 0000000000..611794f638
--- /dev/null
+++ b/2024/CVE-2024-6006.md
@@ -0,0 +1,17 @@
+### [CVE-2024-6006](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6006)
+
+
+
+
+### Description
+
+A vulnerability was found in ZKTeco ZKBio CVSecurity V5000 4.1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Summer Schedule Handler. The manipulation of the argument Schedule Name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-268694 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
+
+### POC
+
+#### Reference
+- https://vuldb.com/?submit.351403
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-6007.md b/2024/CVE-2024-6007.md
new file mode 100644
index 0000000000..7ee3173759
--- /dev/null
+++ b/2024/CVE-2024-6007.md
@@ -0,0 +1,17 @@
+### [CVE-2024-6007](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6007)
+
+
+
+
+### Description
+
+A vulnerability classified as critical has been found in Netentsec NS-ASG Application Security Gateway 6.3. This affects an unknown part of the file /protocol/iscgwtunnel/deleteiscgwrouteconf.php. The manipulation of the argument messagecontent leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268695. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
+
+### POC
+
+#### Reference
+- https://github.com/SecureF1sh/findings/blob/main/ns_sqli.md
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-6009.md b/2024/CVE-2024-6009.md
new file mode 100644
index 0000000000..387923852a
--- /dev/null
+++ b/2024/CVE-2024-6009.md
@@ -0,0 +1,17 @@
+### [CVE-2024-6009](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6009)
+
+
+
+
+### Description
+
+A vulnerability has been found in itsourcecode Event Calendar 1.0 and classified as critical. Affected by this vulnerability is the function regConfirm/regDelete of the file process.php. The manipulation of the argument userId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268699.
+
+### POC
+
+#### Reference
+- https://github.com/AutoZhou1/cve/issues/1
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-6013.md b/2024/CVE-2024-6013.md
new file mode 100644
index 0000000000..d7e08702a1
--- /dev/null
+++ b/2024/CVE-2024-6013.md
@@ -0,0 +1,17 @@
+### [CVE-2024-6013](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6013)
+
+
+
+
+### Description
+
+A vulnerability was found in itsourcecode Online Book Store 1.0. It has been rated as critical. This issue affects some unknown processing of the file admin_delete.php. The manipulation of the argument bookisbn leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268721 was assigned to this vulnerability.
+
+### POC
+
+#### Reference
+- https://github.com/gabriel202212/cve/issues/1
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-6015.md b/2024/CVE-2024-6015.md
new file mode 100644
index 0000000000..3b0dd99dd9
--- /dev/null
+++ b/2024/CVE-2024-6015.md
@@ -0,0 +1,17 @@
+### [CVE-2024-6015](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6015)
+
+
+
+
+### Description
+
+A vulnerability classified as critical was found in itsourcecode Online House Rental System 1.0. Affected by this vulnerability is an unknown functionality of the file manage_user.php. The manipulation of the argument month_of leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268723.
+
+### POC
+
+#### Reference
+- https://github.com/chenwulin-bit/cve/issues/1
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-6016.md b/2024/CVE-2024-6016.md
new file mode 100644
index 0000000000..1551def276
--- /dev/null
+++ b/2024/CVE-2024-6016.md
@@ -0,0 +1,17 @@
+### [CVE-2024-6016](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6016)
+
+
+
+
+### Description
+
+A vulnerability, which was classified as critical, has been found in itsourcecode Online Laundry Management System 1.0. Affected by this issue is some unknown functionality of the file admin_class.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-268724.
+
+### POC
+
+#### Reference
+- https://github.com/chenwulin-bit/cve/issues/2
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-6041.md b/2024/CVE-2024-6041.md
new file mode 100644
index 0000000000..702ab78424
--- /dev/null
+++ b/2024/CVE-2024-6041.md
@@ -0,0 +1,17 @@
+### [CVE-2024-6041](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6041)
+
+
+
+
+### Description
+
+A vulnerability was found in itsourcecode Gym Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file manage_user.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268765 was assigned to this vulnerability.
+
+### POC
+
+#### Reference
+- https://github.com/ssiicckk/cve/issues/1
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-6042.md b/2024/CVE-2024-6042.md
new file mode 100644
index 0000000000..d69f663300
--- /dev/null
+++ b/2024/CVE-2024-6042.md
@@ -0,0 +1,17 @@
+### [CVE-2024-6042](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6042)
+
+
+
+
+### Description
+
+A vulnerability was found in itsourcecode Real Estate Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file property-detail.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-268766 is the identifier assigned to this vulnerability.
+
+### POC
+
+#### Reference
+- https://github.com/Cormac315/cve/issues/1
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-6043.md b/2024/CVE-2024-6043.md
new file mode 100644
index 0000000000..27c758d485
--- /dev/null
+++ b/2024/CVE-2024-6043.md
@@ -0,0 +1,17 @@
+### [CVE-2024-6043](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6043)
+
+
+
+
+### Description
+
+A vulnerability classified as critical has been found in SourceCodester Best House Rental Management System 1.0. This affects the function login of the file admin_class.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268767.
+
+### POC
+
+#### Reference
+- https://github.com/yezzzo/y3/blob/main/SourceCodester%20Best%20house%20rental%20management%20system%20project%20in%20php%201.0%20SQL%20Injection.md
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-6061.md b/2024/CVE-2024-6061.md
new file mode 100644
index 0000000000..fcd120ca84
--- /dev/null
+++ b/2024/CVE-2024-6061.md
@@ -0,0 +1,17 @@
+### [CVE-2024-6061](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6061)
+
+
+
+
+### Description
+
+A vulnerability has been found in GPAC 2.5-DEV-rev228-g11067ea92-master and classified as problematic. Affected by this vulnerability is the function isoffin_process of the file src/filters/isoffin_read.c of the component MP4Box. The manipulation leads to infinite loop. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier of the patch is 20c0f29139a82779b86453ce7f68d0681ec7624c. It is recommended to apply a patch to fix this issue. The identifier VDB-268789 was assigned to this vulnerability.
+
+### POC
+
+#### Reference
+- https://github.com/gpac/gpac/issues/2871
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-6084.md b/2024/CVE-2024-6084.md
new file mode 100644
index 0000000000..39a590d5d2
--- /dev/null
+++ b/2024/CVE-2024-6084.md
@@ -0,0 +1,17 @@
+### [CVE-2024-6084](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6084)
+
+
+
+
+### Description
+
+A vulnerability has been found in itsourcecode Pool of Bethesda Online Reservation System up to 1.0 and classified as critical. Affected by this vulnerability is the function uploadImage of the file /admin/mod_room/controller.php?action=add. The manipulation of the argument image leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268825 was assigned to this vulnerability.
+
+### POC
+
+#### Reference
+- https://github.com/Laster-dev/CVE/issues/2
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-6111.md b/2024/CVE-2024-6111.md
new file mode 100644
index 0000000000..b16ad1f4d8
--- /dev/null
+++ b/2024/CVE-2024-6111.md
@@ -0,0 +1,17 @@
+### [CVE-2024-6111](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6111)
+
+
+
+
+### Description
+
+A vulnerability classified as critical has been found in itsourcecode Pool of Bethesda Online Reservation System 1.0. This affects an unknown part of the file login.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268857 was assigned to this vulnerability.
+
+### POC
+
+#### Reference
+- https://github.com/wangyuan-ui/CVE/issues/1
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-6113.md b/2024/CVE-2024-6113.md
new file mode 100644
index 0000000000..458bb4f41e
--- /dev/null
+++ b/2024/CVE-2024-6113.md
@@ -0,0 +1,17 @@
+### [CVE-2024-6113](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6113)
+
+
+
+
+### Description
+
+A vulnerability was found in itsourcecode Monbela Tourist Inn Online Reservation System 1.0. It has been rated as critical. This issue affects some unknown processing of the file login.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The identifier VDB-268865 was assigned to this vulnerability.
+
+### POC
+
+#### Reference
+- https://github.com/wangyuan-ui/CVE/issues/3
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-6114.md b/2024/CVE-2024-6114.md
new file mode 100644
index 0000000000..79f66a9fd4
--- /dev/null
+++ b/2024/CVE-2024-6114.md
@@ -0,0 +1,17 @@
+### [CVE-2024-6114](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6114)
+
+
+
+
+### Description
+
+A vulnerability classified as critical has been found in itsourcecode Monbela Tourist Inn Online Reservation System up to 1.0. Affected is an unknown function of the file controller.php. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-268866 is the identifier assigned to this vulnerability.
+
+### POC
+
+#### Reference
+- https://github.com/wangyuan-ui/CVE/issues/4
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-6120.md b/2024/CVE-2024-6120.md
new file mode 100644
index 0000000000..4e4f5f92cf
--- /dev/null
+++ b/2024/CVE-2024-6120.md
@@ -0,0 +1,17 @@
+### [CVE-2024-6120](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6120)
+
+
+
+
+### Description
+
+The Sparkle Demo Importer plugin for WordPress is vulnerable to unauthorized database reset and demo data import due to a missing capability check on the multiple functions in all versions up to and including 1.4.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete all posts, pages, and uploaded files, as well as download and install a limited set of demo plugins.
+
+### POC
+
+#### Reference
+No PoCs from references.
+
+#### Github
+- https://github.com/fkie-cad/nvd-json-data-feeds
+
diff --git a/2024/CVE-2024-6184.md b/2024/CVE-2024-6184.md
new file mode 100644
index 0000000000..38febe46bd
--- /dev/null
+++ b/2024/CVE-2024-6184.md
@@ -0,0 +1,17 @@
+### [CVE-2024-6184](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6184)
+
+
+
+
+### Description
+
+A vulnerability classified as critical was found in Ruijie RG-UAC 1.0. Affected by this vulnerability is an unknown functionality of the file /view/systemConfig/reboot/reboot_commit.php. The manipulation of the argument servicename leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-269155. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
+
+### POC
+
+#### Reference
+- https://github.com/L1OudFd8cl09/CVE/blob/main/11_06_2024_a.md
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-6187.md b/2024/CVE-2024-6187.md
new file mode 100644
index 0000000000..244c0adb91
--- /dev/null
+++ b/2024/CVE-2024-6187.md
@@ -0,0 +1,17 @@
+### [CVE-2024-6187](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6187)
+
+
+
+
+### Description
+
+A vulnerability has been found in Ruijie RG-UAC 1.0 and classified as critical. This vulnerability affects unknown code of the file /view/vpn/autovpn/sub_commit.php. The manipulation of the argument key leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-269158 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
+
+### POC
+
+#### Reference
+- https://github.com/L1OudFd8cl09/CVE/blob/main/11_06_2024_d.md
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-6188.md b/2024/CVE-2024-6188.md
new file mode 100644
index 0000000000..9b16386c58
--- /dev/null
+++ b/2024/CVE-2024-6188.md
@@ -0,0 +1,17 @@
+### [CVE-2024-6188](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6188)
+
+
+
+
+### Description
+
+A vulnerability was found in Parsec Automation TrackSYS 11.x.x and classified as problematic. This issue affects some unknown processing of the file /TS/export/pagedefinition. The manipulation of the argument ID leads to direct request. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-269159. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
+
+### POC
+
+#### Reference
+- https://kiwiyumi.com/post/tracksys-export-source-code/
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-6190.md b/2024/CVE-2024-6190.md
new file mode 100644
index 0000000000..b632c7b532
--- /dev/null
+++ b/2024/CVE-2024-6190.md
@@ -0,0 +1,17 @@
+### [CVE-2024-6190](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6190)
+
+
+
+
+### Description
+
+A vulnerability was found in itsourcecode Farm Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file index.php of the component Login. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-269162 is the identifier assigned to this vulnerability.
+
+### POC
+
+#### Reference
+- https://github.com/HryspaHodor/CVE/issues/2
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-6191.md b/2024/CVE-2024-6191.md
new file mode 100644
index 0000000000..a34d2c7e72
--- /dev/null
+++ b/2024/CVE-2024-6191.md
@@ -0,0 +1,17 @@
+### [CVE-2024-6191](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6191)
+
+
+
+
+### Description
+
+A vulnerability classified as critical has been found in itsourcecode Student Management System 1.0. This affects an unknown part of the file login.php of the component Login Page. The manipulation of the argument user leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-269163.
+
+### POC
+
+#### Reference
+- https://github.com/HryspaHodor/CVE/issues/3
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-6192.md b/2024/CVE-2024-6192.md
new file mode 100644
index 0000000000..b937c27c4d
--- /dev/null
+++ b/2024/CVE-2024-6192.md
@@ -0,0 +1,17 @@
+### [CVE-2024-6192](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6192)
+
+
+
+
+### Description
+
+A vulnerability classified as critical was found in itsourcecode Loan Management System 1.0. This vulnerability affects unknown code of the file login.php of the component Login Page. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-269164.
+
+### POC
+
+#### Reference
+- https://github.com/HryspaHodor/CVE/issues/4
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-6194.md b/2024/CVE-2024-6194.md
new file mode 100644
index 0000000000..0b8e581c9b
--- /dev/null
+++ b/2024/CVE-2024-6194.md
@@ -0,0 +1,17 @@
+### [CVE-2024-6194](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6194)
+
+
+
+
+### Description
+
+A vulnerability, which was classified as critical, was found in itsourcecode Tailoring Management System 1.0. Affected is an unknown function of the file editmeasurement.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-269166 is the identifier assigned to this vulnerability.
+
+### POC
+
+#### Reference
+- https://github.com/HryspaHodor/CVE/issues/6
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/2024/CVE-2024-6218.md b/2024/CVE-2024-6218.md
new file mode 100644
index 0000000000..ab51e10805
--- /dev/null
+++ b/2024/CVE-2024-6218.md
@@ -0,0 +1,17 @@
+### [CVE-2024-6218](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6218)
+
+
+
+
+### Description
+
+A vulnerability, which was classified as critical, has been found in itsourcecode Vehicle Management System 1.0. Affected by this issue is some unknown functionality of the file busprofile.php. The manipulation of the argument busid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-269282 is the identifier assigned to this vulnerability.
+
+### POC
+
+#### Reference
+- https://github.com/HryspaHodor/CVE/issues/7
+
+#### Github
+No PoCs found on GitHub currently.
+
diff --git a/github.txt b/github.txt
index 8ffa4bbefa..6ae042fc67 100644
--- a/github.txt
+++ b/github.txt
@@ -102,6 +102,7 @@ CVE-1999-0256 - https://github.com/x00itachi/metasploit-exploit-search-online
CVE-1999-0372 - https://github.com/SamanShafigh/vulBERT
CVE-1999-0428 - https://github.com/chnzzh/OpenSSL-CVE-lib
CVE-1999-0502 - https://github.com/ahm3dhany/IDS-Evasion
+CVE-1999-0511 - https://github.com/anvithalolla/Tesla_PenTest
CVE-1999-0524 - https://github.com/mikemackintosh/ruby-qualys
CVE-1999-0532 - https://github.com/HeiTang/ZYXEl-CTF-WriteUp
CVE-1999-0635 - https://github.com/muchdogesec/cve2stix
@@ -161,6 +162,7 @@ CVE-2000-0109 - https://github.com/Live-Hack-CVE/CVE-2000-0109
CVE-2000-0114 - https://github.com/0xPugal/One-Liners
CVE-2000-0114 - https://github.com/0xPugazh/One-Liners
CVE-2000-0114 - https://github.com/ARPSyndicate/kenzer-templates
+CVE-2000-0114 - https://github.com/CVEDB/awesome-cve-repo
CVE-2000-0114 - https://github.com/Cappricio-Securities/CVE-2000-0114
CVE-2000-0114 - https://github.com/Live-Hack-CVE/CVE-2000-0114
CVE-2000-0114 - https://github.com/POORVAJA-195/Nuclei-Analysis-main
@@ -175,6 +177,7 @@ CVE-2000-0142 - https://github.com/Live-Hack-CVE/CVE-2000-0142
CVE-2000-0143 - https://github.com/Live-Hack-CVE/CVE-2000-0143
CVE-2000-0170 - https://github.com/ARPSyndicate/cvemon
CVE-2000-0170 - https://github.com/CVEDB/PoC-List
+CVE-2000-0170 - https://github.com/CVEDB/awesome-cve-repo
CVE-2000-0170 - https://github.com/mike182/exploit
CVE-2000-0182 - https://github.com/Live-Hack-CVE/CVE-2000-0182
CVE-2000-0388 - https://github.com/ARPSyndicate/cvemon
@@ -189,6 +192,8 @@ CVE-2000-0564 - https://github.com/CamiloEscobar98/DjangoProject
CVE-2000-0649 - https://github.com/0xNVAN/win-iisadmin
CVE-2000-0649 - https://github.com/ARPSyndicate/cvemon
CVE-2000-0649 - https://github.com/CVEDB/PoC-List
+CVE-2000-0649 - https://github.com/CVEDB/awesome-cve-repo
+CVE-2000-0649 - https://github.com/Downgraderz/PoC-CVE-2000-0649
CVE-2000-0649 - https://github.com/JimboJimbabwe/HackGPTV2
CVE-2000-0649 - https://github.com/amtzespinosa/lord-of-the-root-walkthrough
CVE-2000-0649 - https://github.com/hanmin0512/Web-hacking-LAB
@@ -211,6 +216,7 @@ CVE-2000-0936 - https://github.com/Parist0nH1ll/Vulnerabilities-Write-Ups
CVE-2000-0979 - https://github.com/ARPSyndicate/cvemon
CVE-2000-0979 - https://github.com/Ascotbe/Kernelhub
CVE-2000-0979 - https://github.com/CVEDB/PoC-List
+CVE-2000-0979 - https://github.com/CVEDB/awesome-cve-repo
CVE-2000-0979 - https://github.com/Cruxer8Mech/Idk
CVE-2000-0979 - https://github.com/Z6543/CVE-2000-0979
CVE-2000-0979 - https://github.com/ycdxsb/WindowsPrivilegeEscalation
@@ -285,6 +291,7 @@ CVE-2001-0550 - https://github.com/AnyMaster/EQGRP
CVE-2001-0550 - https://github.com/Badbug6/EQGRP
CVE-2001-0550 - https://github.com/CKmaenn/EQGRP
CVE-2001-0550 - https://github.com/CVEDB/PoC-List
+CVE-2001-0550 - https://github.com/CVEDB/awesome-cve-repo
CVE-2001-0550 - https://github.com/CybernetiX-S3C/EQGRP_Linux
CVE-2001-0550 - https://github.com/Drift-Security/Shadow_Brokers-Vs-NSA
CVE-2001-0550 - https://github.com/IHA114/EQGRP
@@ -326,6 +333,7 @@ CVE-2001-0554 - https://github.com/vshaliii/DC-4-Vulnhub-Walkthrough
CVE-2001-0561 - https://github.com/jubram/es_tpf
CVE-2001-0680 - https://github.com/ARPSyndicate/cvemon
CVE-2001-0680 - https://github.com/CVEDB/PoC-List
+CVE-2001-0680 - https://github.com/CVEDB/awesome-cve-repo
CVE-2001-0690 - https://github.com/AnyMaster/EQGRP
CVE-2001-0690 - https://github.com/Badbug6/EQGRP
CVE-2001-0690 - https://github.com/CKmaenn/EQGRP
@@ -361,18 +369,23 @@ CVE-2001-0690 - https://github.com/wuvuw/EQGR
CVE-2001-0690 - https://github.com/x0rz/EQGRP
CVE-2001-0758 - https://github.com/ARPSyndicate/cvemon
CVE-2001-0758 - https://github.com/CVEDB/PoC-List
+CVE-2001-0758 - https://github.com/CVEDB/awesome-cve-repo
CVE-2001-0797 - https://github.com/0xdea/exploits
CVE-2001-0797 - https://github.com/Kicksecure/security-misc
CVE-2001-0797 - https://github.com/Whonix/security-misc
CVE-2001-0845 - https://github.com/jhswartz/cvrfdb
CVE-2001-0931 - https://github.com/ARPSyndicate/cvemon
CVE-2001-0931 - https://github.com/CVEDB/PoC-List
+CVE-2001-0931 - https://github.com/CVEDB/awesome-cve-repo
CVE-2001-0932 - https://github.com/ARPSyndicate/cvemon
CVE-2001-0932 - https://github.com/CVEDB/PoC-List
+CVE-2001-0932 - https://github.com/CVEDB/awesome-cve-repo
CVE-2001-0933 - https://github.com/ARPSyndicate/cvemon
CVE-2001-0933 - https://github.com/CVEDB/PoC-List
+CVE-2001-0933 - https://github.com/CVEDB/awesome-cve-repo
CVE-2001-0934 - https://github.com/ARPSyndicate/cvemon
CVE-2001-0934 - https://github.com/CVEDB/PoC-List
+CVE-2001-0934 - https://github.com/CVEDB/awesome-cve-repo
CVE-2001-1002 - https://github.com/Xiol/CVEChecker
CVE-2001-1092 - https://github.com/truefinder/truefinder
CVE-2001-1093 - https://github.com/truefinder/truefinder
@@ -386,9 +399,11 @@ CVE-2001-1382 - https://github.com/phx/cvescan
CVE-2001-1432 - https://github.com/SamanShafigh/vulBERT
CVE-2001-1442 - https://github.com/ARPSyndicate/cvemon
CVE-2001-1442 - https://github.com/CVEDB/PoC-List
+CVE-2001-1442 - https://github.com/CVEDB/awesome-cve-repo
CVE-2001-1451 - https://github.com/clearbluejar/cve-markdown-charts
CVE-2001-1473 - https://github.com/0xget/cve-2001-1473
CVE-2001-1473 - https://github.com/ARPSyndicate/kenzer-templates
+CVE-2001-1473 - https://github.com/CVEDB/awesome-cve-repo
CVE-2001-1473 - https://github.com/codine7/Hacking_Automated
CVE-2001-1473 - https://github.com/codine7/fox
CVE-2001-1473 - https://github.com/codine7/jungle
@@ -398,6 +413,7 @@ CVE-2001-1494 - https://github.com/jaydenaung/CloudGuard-ShiftLeft-CICD-AWS
CVE-2001-1494 - https://github.com/tp1-SpZIaPvBD/testprojekt
CVE-2001-1583 - https://github.com/Live-Hack-CVE/CVE-2001-1583
CVE-2001-1594 - https://github.com/wsbespalov/vmengine
+CVE-2001-3389 - https://github.com/CVEDB/awesome-cve-repo
CVE-2001-3389 - https://github.com/becrevex/Gaston
CVE-2002-0029 - https://github.com/C4ssif3r/nmap-scripts
CVE-2002-0029 - https://github.com/stran0s/stran0s
@@ -408,18 +424,25 @@ CVE-2002-0082 - https://github.com/piyush-saurabh/exploits
CVE-2002-0082 - https://github.com/rosonsec/Exploits
CVE-2002-0200 - https://github.com/ARPSyndicate/cvemon
CVE-2002-0200 - https://github.com/CVEDB/PoC-List
+CVE-2002-0200 - https://github.com/CVEDB/awesome-cve-repo
CVE-2002-0201 - https://github.com/ARPSyndicate/cvemon
CVE-2002-0201 - https://github.com/CVEDB/PoC-List
+CVE-2002-0201 - https://github.com/CVEDB/awesome-cve-repo
CVE-2002-0288 - https://github.com/ARPSyndicate/cvemon
CVE-2002-0288 - https://github.com/CVEDB/PoC-List
+CVE-2002-0288 - https://github.com/CVEDB/awesome-cve-repo
CVE-2002-0289 - https://github.com/ARPSyndicate/cvemon
CVE-2002-0289 - https://github.com/CVEDB/PoC-List
+CVE-2002-0289 - https://github.com/CVEDB/awesome-cve-repo
CVE-2002-0346 - https://github.com/ARPSyndicate/cvemon
CVE-2002-0346 - https://github.com/CVEDB/PoC-List
+CVE-2002-0346 - https://github.com/CVEDB/awesome-cve-repo
CVE-2002-0347 - https://github.com/ARPSyndicate/cvemon
CVE-2002-0347 - https://github.com/CVEDB/PoC-List
+CVE-2002-0347 - https://github.com/CVEDB/awesome-cve-repo
CVE-2002-0348 - https://github.com/ARPSyndicate/cvemon
CVE-2002-0348 - https://github.com/CVEDB/PoC-List
+CVE-2002-0348 - https://github.com/CVEDB/awesome-cve-repo
CVE-2002-0367 - https://github.com/Ostorlab/KEV
CVE-2002-0367 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
CVE-2002-0367 - https://github.com/todb-cisa/kev-cwes
@@ -431,6 +454,7 @@ CVE-2002-0422 - https://github.com/ARPSyndicate/cvemon
CVE-2002-0422 - https://github.com/k0pak4/k0pak4
CVE-2002-0448 - https://github.com/ARPSyndicate/cvemon
CVE-2002-0448 - https://github.com/CVEDB/PoC-List
+CVE-2002-0448 - https://github.com/CVEDB/awesome-cve-repo
CVE-2002-0526 - https://github.com/bcoles/local-exploits
CVE-2002-0649 - https://github.com/rewardone/MS02-039-Port
CVE-2002-0651 - https://github.com/C4ssif3r/nmap-scripts
@@ -449,12 +473,15 @@ CVE-2002-0680 - https://github.com/alt3kx/alt3kx.github.io
CVE-2002-0685 - https://github.com/hannob/pgpbugs
CVE-2002-0740 - https://github.com/ARPSyndicate/cvemon
CVE-2002-0740 - https://github.com/CVEDB/PoC-List
+CVE-2002-0740 - https://github.com/CVEDB/awesome-cve-repo
+CVE-2002-0748 - https://github.com/CVEDB/awesome-cve-repo
CVE-2002-0748 - https://github.com/fauzanwijaya/CVE-2002-0748
CVE-2002-0839 - https://github.com/Live-Hack-CVE/CVE-2002-0839
CVE-2002-0970 - https://github.com/ARPSyndicate/cvemon
CVE-2002-0970 - https://github.com/chnzzh/OpenSSL-CVE-lib
CVE-2002-0991 - https://github.com/ARPSyndicate/cvemon
CVE-2002-0991 - https://github.com/CVEDB/PoC-List
+CVE-2002-0991 - https://github.com/CVEDB/awesome-cve-repo
CVE-2002-1024 - https://github.com/phx/cvescan
CVE-2002-1120 - https://github.com/ret2eax/exploits
CVE-2002-1131 - https://github.com/0xget/cve-2001-1473
@@ -489,6 +516,7 @@ CVE-2002-1569 - https://github.com/0xCyberY/CVE-T4PDF
CVE-2002-1569 - https://github.com/ARPSyndicate/cvemon
CVE-2002-1614 - https://github.com/ARPSyndicate/cvemon
CVE-2002-1614 - https://github.com/CVEDB/PoC-List
+CVE-2002-1614 - https://github.com/CVEDB/awesome-cve-repo
CVE-2002-1614 - https://github.com/DrewSC13/Linpeas
CVE-2002-1614 - https://github.com/cedelasen/htb-laboratory
CVE-2002-1614 - https://github.com/chorankates/Irked
@@ -507,6 +535,7 @@ CVE-2002-1904 - https://github.com/Hanc1999/System-Security-Exploit-Practice
CVE-2002-20001 - https://github.com/ARPSyndicate/cvemon
CVE-2002-20001 - https://github.com/Balasys/dheater
CVE-2002-20001 - https://github.com/CVEDB/PoC-List
+CVE-2002-20001 - https://github.com/CVEDB/awesome-cve-repo
CVE-2002-20001 - https://github.com/Live-Hack-CVE/CVE-2002-20001
CVE-2002-20001 - https://github.com/Live-Hack-CVE/CVE-2022-40735
CVE-2002-20001 - https://github.com/anquanscan/sec-tools
@@ -518,6 +547,7 @@ CVE-2002-2086 - https://github.com/tawrid/the-game-changer
CVE-2002-2268 - https://github.com/cherry-wb/monalisa
CVE-2002-2420 - https://github.com/ARPSyndicate/cvemon
CVE-2002-2420 - https://github.com/CVEDB/PoC-List
+CVE-2002-2420 - https://github.com/CVEDB/awesome-cve-repo
CVE-2002-2420 - https://github.com/krdsploit/CVE-2002-2420
CVE-2002-2443 - https://github.com/ARPSyndicate/cvemon
CVE-2003-0001 - https://github.com/ARPSyndicate/cvemon
@@ -844,6 +874,7 @@ CVE-2004-0077 - https://github.com/C0dak/linux-kernel-exploits
CVE-2004-0077 - https://github.com/C0dak/local-root-exploit-
CVE-2004-0077 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2004-0077 - https://github.com/Feng4/linux-kernel-exploits
+CVE-2004-0077 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2004-0077 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2004-0077 - https://github.com/Micr067/linux-kernel-exploits
CVE-2004-0077 - https://github.com/QChiLan/linux-exp
@@ -882,6 +913,7 @@ CVE-2004-0077 - https://github.com/qiantu88/Linux--exp
CVE-2004-0077 - https://github.com/rakjong/LinuxElevation
CVE-2004-0077 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2004-0077 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2004-0077 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2004-0077 - https://github.com/xairy/linux-kernel-exploitation
CVE-2004-0077 - https://github.com/xfinest/linux-kernel-exploits
CVE-2004-0077 - https://github.com/xssfile/linux-kernel-exploits
@@ -964,6 +996,7 @@ CVE-2004-1235 - https://github.com/C0dak/linux-kernel-exploits
CVE-2004-1235 - https://github.com/C0dak/local-root-exploit-
CVE-2004-1235 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2004-1235 - https://github.com/Feng4/linux-kernel-exploits
+CVE-2004-1235 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2004-1235 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2004-1235 - https://github.com/Micr067/linux-kernel-exploits
CVE-2004-1235 - https://github.com/QChiLan/linux-exp
@@ -1202,6 +1235,7 @@ CVE-2005-0736 - https://github.com/C0dak/linux-kernel-exploits
CVE-2005-0736 - https://github.com/C0dak/local-root-exploit-
CVE-2005-0736 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2005-0736 - https://github.com/Feng4/linux-kernel-exploits
+CVE-2005-0736 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2005-0736 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2005-0736 - https://github.com/Micr067/linux-kernel-exploits
CVE-2005-0736 - https://github.com/QChiLan/linux-exp
@@ -1250,6 +1284,7 @@ CVE-2005-1263 - https://github.com/C0dak/linux-kernel-exploits
CVE-2005-1263 - https://github.com/C0dak/local-root-exploit-
CVE-2005-1263 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2005-1263 - https://github.com/Feng4/linux-kernel-exploits
+CVE-2005-1263 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2005-1263 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2005-1263 - https://github.com/Micr067/linux-kernel-exploits
CVE-2005-1263 - https://github.com/QChiLan/linux-exp
@@ -1290,6 +1325,7 @@ CVE-2005-1794 - https://github.com/CVEDB/PoC-List
CVE-2005-1794 - https://github.com/CVEDB/awesome-cve-repo
CVE-2005-1794 - https://github.com/InitRoot/CVE-2005-1794Scanner
CVE-2005-1794 - https://github.com/Ressurect0/fluffyLogic
+CVE-2005-1794 - https://github.com/anvithalolla/Tesla_PenTest
CVE-2005-1915 - https://github.com/mirac7/codegraph
CVE-2005-1983 - https://github.com/ARPSyndicate/cvemon
CVE-2005-1983 - https://github.com/Al1ex/WindowsElevation
@@ -1318,6 +1354,7 @@ CVE-2005-2428 - https://github.com/Elsfa7-110/kenzer-templates
CVE-2005-2428 - https://github.com/POORVAJA-195/Nuclei-Analysis-main
CVE-2005-2428 - https://github.com/d4n-sec/d4n-sec.github.io
CVE-2005-2428 - https://github.com/gojhonny/Pentesting-Scripts
+CVE-2005-2428 - https://github.com/jobroche/Pentesting-Scripts
CVE-2005-2428 - https://github.com/merlinepedra/nuclei-templates
CVE-2005-2428 - https://github.com/merlinepedra25/nuclei-templates
CVE-2005-2428 - https://github.com/schwankner/CVE-2005-2428-IBM-Lotus-Domino-R8-Password-Hash-Extraction-Exploit
@@ -1450,6 +1487,7 @@ CVE-2006-20001 - https://github.com/ARPSyndicate/cvemon
CVE-2006-20001 - https://github.com/ByteXenon/IP-Security-Database
CVE-2006-20001 - https://github.com/CVEDB/PoC-List
CVE-2006-20001 - https://github.com/CVEDB/awesome-cve-repo
+CVE-2006-20001 - https://github.com/EzeTauil/Maquina-Upload
CVE-2006-20001 - https://github.com/Live-Hack-CVE/CVE-2006-20001
CVE-2006-20001 - https://github.com/Saksham2002/CVE-2006-20001
CVE-2006-20001 - https://github.com/bioly230/THM_Skynet
@@ -1478,6 +1516,7 @@ CVE-2006-2451 - https://github.com/C0dak/linux-kernel-exploits
CVE-2006-2451 - https://github.com/C0dak/local-root-exploit-
CVE-2006-2451 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2006-2451 - https://github.com/Feng4/linux-kernel-exploits
+CVE-2006-2451 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2006-2451 - https://github.com/Jasut1n/CVE
CVE-2006-2451 - https://github.com/Jasut1n/c-exploits
CVE-2006-2451 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
@@ -1602,6 +1641,7 @@ CVE-2006-3626 - https://github.com/C0dak/linux-kernel-exploits
CVE-2006-3626 - https://github.com/C0dak/local-root-exploit-
CVE-2006-3626 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2006-3626 - https://github.com/Feng4/linux-kernel-exploits
+CVE-2006-3626 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2006-3626 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2006-3626 - https://github.com/Micr067/linux-kernel-exploits
CVE-2006-3626 - https://github.com/QChiLan/linux-exp
@@ -2146,6 +2186,7 @@ CVE-2007-4573 - https://github.com/knd06/linux-kernel-exploitation
CVE-2007-4573 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2007-4573 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2007-4573 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2007-4573 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2007-4573 - https://github.com/xairy/linux-kernel-exploitation
CVE-2007-4607 - https://github.com/ARPSyndicate/cvemon
CVE-2007-4607 - https://github.com/CVEDB/PoC-List
@@ -2398,6 +2439,7 @@ CVE-2008-0009 - https://github.com/knd06/linux-kernel-exploitation
CVE-2008-0009 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2008-0009 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2008-0009 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2008-0009 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2008-0009 - https://github.com/xairy/linux-kernel-exploitation
CVE-2008-0010 - https://github.com/ARPSyndicate/cvemon
CVE-2008-0010 - https://github.com/R0B1NL1N/linux-kernel-exploitation
@@ -2413,6 +2455,7 @@ CVE-2008-0010 - https://github.com/knd06/linux-kernel-exploitation
CVE-2008-0010 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2008-0010 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2008-0010 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2008-0010 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2008-0010 - https://github.com/xairy/linux-kernel-exploitation
CVE-2008-0116 - https://github.com/defensahacker/debian-weak-ssh
CVE-2008-0122 - https://github.com/Heshamshaban001/Kioptix-level-1-walk-through
@@ -2515,6 +2558,7 @@ CVE-2008-0600 - https://github.com/C0dak/linux-kernel-exploits
CVE-2008-0600 - https://github.com/C0dak/local-root-exploit-
CVE-2008-0600 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2008-0600 - https://github.com/Feng4/linux-kernel-exploits
+CVE-2008-0600 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2008-0600 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2008-0600 - https://github.com/Micr067/linux-kernel-exploits
CVE-2008-0600 - https://github.com/QChiLan/linux-exp
@@ -2553,6 +2597,7 @@ CVE-2008-0600 - https://github.com/qiantu88/Linux--exp
CVE-2008-0600 - https://github.com/rakjong/LinuxElevation
CVE-2008-0600 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2008-0600 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2008-0600 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2008-0600 - https://github.com/xairy/linux-kernel-exploitation
CVE-2008-0600 - https://github.com/xfinest/linux-kernel-exploits
CVE-2008-0600 - https://github.com/xssfile/linux-kernel-exploits
@@ -2567,6 +2612,7 @@ CVE-2008-0888 - https://github.com/phonito/phonito-vulnerable-container
CVE-2008-0891 - https://github.com/ARPSyndicate/cvemon
CVE-2008-0891 - https://github.com/chnzzh/OpenSSL-CVE-lib
CVE-2008-0900 - https://github.com/Al1ex/LinuxEelvation
+CVE-2008-0900 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2008-0900 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2008-0900 - https://github.com/Snoopy-Sec/Localroot-ALL-CVE
CVE-2008-0900 - https://github.com/fei9747/LinuxEelvation
@@ -2934,6 +2980,7 @@ CVE-2008-4210 - https://github.com/C0dak/linux-kernel-exploits
CVE-2008-4210 - https://github.com/C0dak/local-root-exploit-
CVE-2008-4210 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2008-4210 - https://github.com/Feng4/linux-kernel-exploits
+CVE-2008-4210 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2008-4210 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2008-4210 - https://github.com/Micr067/linux-kernel-exploits
CVE-2008-4210 - https://github.com/QChiLan/linux-exp
@@ -3272,6 +3319,7 @@ CVE-2009-0065 - https://github.com/knd06/linux-kernel-exploitation
CVE-2009-0065 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2009-0065 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2009-0065 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2009-0065 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2009-0065 - https://github.com/xairy/linux-kernel-exploitation
CVE-2009-0075 - https://github.com/Shenal01/SNP_CVE_RESEARCH
CVE-2009-0079 - https://github.com/Al1ex/WindowsElevation
@@ -3474,6 +3522,7 @@ CVE-2009-1046 - https://github.com/knd06/linux-kernel-exploitation
CVE-2009-1046 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2009-1046 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2009-1046 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2009-1046 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2009-1046 - https://github.com/xairy/linux-kernel-exploitation
CVE-2009-1061 - https://github.com/0xCyberY/CVE-T4PDF
CVE-2009-1061 - https://github.com/ARPSyndicate/cvemon
@@ -3516,6 +3565,7 @@ CVE-2009-1185 - https://github.com/C0dak/linux-kernel-exploits
CVE-2009-1185 - https://github.com/C0dak/local-root-exploit-
CVE-2009-1185 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2009-1185 - https://github.com/Feng4/linux-kernel-exploits
+CVE-2009-1185 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2009-1185 - https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
CVE-2009-1185 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2009-1185 - https://github.com/Micr067/linux-kernel-exploits
@@ -3613,6 +3663,7 @@ CVE-2009-1337 - https://github.com/C0dak/linux-kernel-exploits
CVE-2009-1337 - https://github.com/C0dak/local-root-exploit-
CVE-2009-1337 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2009-1337 - https://github.com/Feng4/linux-kernel-exploits
+CVE-2009-1337 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2009-1337 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2009-1337 - https://github.com/Micr067/linux-kernel-exploits
CVE-2009-1337 - https://github.com/QChiLan/linux-exp
@@ -3838,6 +3889,7 @@ CVE-2009-2692 - https://github.com/CVEDB/PoC-List
CVE-2009-2692 - https://github.com/CVEDB/awesome-cve-repo
CVE-2009-2692 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2009-2692 - https://github.com/Feng4/linux-kernel-exploits
+CVE-2009-2692 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2009-2692 - https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
CVE-2009-2692 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2009-2692 - https://github.com/Micr067/linux-kernel-exploits
@@ -3888,6 +3940,7 @@ CVE-2009-2692 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2009-2692 - https://github.com/talent-x90c/cve_list
CVE-2009-2692 - https://github.com/tangsilian/android-vuln
CVE-2009-2692 - https://github.com/taviso/iknowthis
+CVE-2009-2692 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2009-2692 - https://github.com/x90hack/vulnerabilty_lab
CVE-2009-2692 - https://github.com/xairy/linux-kernel-exploitation
CVE-2009-2692 - https://github.com/xfinest/linux-kernel-exploits
@@ -3903,6 +3956,7 @@ CVE-2009-2698 - https://github.com/CVEDB/PoC-List
CVE-2009-2698 - https://github.com/CVEDB/awesome-cve-repo
CVE-2009-2698 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2009-2698 - https://github.com/Feng4/linux-kernel-exploits
+CVE-2009-2698 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2009-2698 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2009-2698 - https://github.com/Micr067/linux-kernel-exploits
CVE-2009-2698 - https://github.com/QChiLan/linux-exp
@@ -3987,6 +4041,7 @@ CVE-2009-2910 - https://github.com/knd06/linux-kernel-exploitation
CVE-2009-2910 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2009-2910 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2009-2910 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2009-2910 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2009-2910 - https://github.com/xairy/linux-kernel-exploitation
CVE-2009-2942 - https://github.com/scmanjarrez/CVEScannerV2
CVE-2009-2948 - https://github.com/Live-Hack-CVE/CVE-2009-2948
@@ -4008,6 +4063,7 @@ CVE-2009-3001 - https://github.com/knd06/linux-kernel-exploitation
CVE-2009-3001 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2009-3001 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2009-3001 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2009-3001 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2009-3001 - https://github.com/xairy/linux-kernel-exploitation
CVE-2009-3036 - https://github.com/ARPSyndicate/cvemon
CVE-2009-3036 - https://github.com/CVEDB/awesome-cve-repo
@@ -4101,6 +4157,7 @@ CVE-2009-3547 - https://github.com/C0dak/linux-kernel-exploits
CVE-2009-3547 - https://github.com/C0dak/local-root-exploit-
CVE-2009-3547 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2009-3547 - https://github.com/Feng4/linux-kernel-exploits
+CVE-2009-3547 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2009-3547 - https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
CVE-2009-3547 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2009-3547 - https://github.com/Micr067/linux-kernel-exploits
@@ -4215,6 +4272,7 @@ CVE-2009-3843 - https://github.com/oneplus-x/Sn1per
CVE-2009-3843 - https://github.com/samba234/Sniper
CVE-2009-3843 - https://github.com/twekkis/cybersecuritybase-project2
CVE-2009-3843 - https://github.com/unusualwork/Sn1per
+CVE-2009-3895 - https://github.com/ch1hyun/fuzzing-class
CVE-2009-3938 - https://github.com/0xCyberY/CVE-T4PDF
CVE-2009-3938 - https://github.com/ARPSyndicate/cvemon
CVE-2009-3941 - https://github.com/ARPSyndicate/cvemon
@@ -4679,6 +4737,7 @@ CVE-2010-1146 - https://github.com/C0dak/linux-kernel-exploits
CVE-2010-1146 - https://github.com/C0dak/local-root-exploit-
CVE-2010-1146 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2010-1146 - https://github.com/Feng4/linux-kernel-exploits
+CVE-2010-1146 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2010-1146 - https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
CVE-2010-1146 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2010-1146 - https://github.com/Micr067/linux-kernel-exploits
@@ -5099,6 +5158,7 @@ CVE-2010-2240 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2010-2240 - https://github.com/knd06/linux-kernel-exploitation
CVE-2010-2240 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2010-2240 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2010-2240 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2010-2240 - https://github.com/xairy/linux-kernel-exploitation
CVE-2010-2259 - https://github.com/ARPSyndicate/kenzer-templates
CVE-2010-2307 - https://github.com/ARPSyndicate/kenzer-templates
@@ -5368,6 +5428,7 @@ CVE-2010-2554 - https://github.com/fei9747/WindowsElevation
CVE-2010-2554 - https://github.com/ycdxsb/WindowsPrivilegeEscalation
CVE-2010-2568 - https://github.com/ARPSyndicate/cvemon
CVE-2010-2568 - https://github.com/Kuromesi/Py4CSKG
+CVE-2010-2568 - https://github.com/MN439/bingduziyuan
CVE-2010-2568 - https://github.com/Ostorlab/KEV
CVE-2010-2568 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
CVE-2010-2568 - https://github.com/jisosomppi/pentesting
@@ -5485,6 +5546,7 @@ CVE-2010-2883 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detec
CVE-2010-2883 - https://github.com/ThunderJie/CVE
CVE-2010-2883 - https://github.com/Zhouyi827/myblog
CVE-2010-2883 - https://github.com/amliaW4/amliaW4.github.io
+CVE-2010-2883 - https://github.com/fangdada/ctf
CVE-2010-2883 - https://github.com/int0/pdfexplorer
CVE-2010-2883 - https://github.com/season-lab/rop-collection
CVE-2010-2883 - https://github.com/xinali/articles
@@ -5510,6 +5572,7 @@ CVE-2010-2959 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2010-2959 - https://github.com/DhivaKD/OSCP-Notes
CVE-2010-2959 - https://github.com/Elinpf/OSCP-survival-guide
CVE-2010-2959 - https://github.com/Feng4/linux-kernel-exploits
+CVE-2010-2959 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2010-2959 - https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
CVE-2010-2959 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2010-2959 - https://github.com/MLGBSec/os-survival
@@ -5585,6 +5648,7 @@ CVE-2010-2959 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2010-2959 - https://github.com/spencerdodd/kernelpop
CVE-2010-2959 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2010-2959 - https://github.com/whackmanic/OSCP_Found
+CVE-2010-2959 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2010-2959 - https://github.com/xairy/linux-kernel-exploitation
CVE-2010-2959 - https://github.com/xfinest/linux-kernel-exploits
CVE-2010-2959 - https://github.com/xssfile/linux-kernel-exploits
@@ -5606,6 +5670,7 @@ CVE-2010-2963 - https://github.com/knd06/linux-kernel-exploitation
CVE-2010-2963 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2010-2963 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2010-2963 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2010-2963 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2010-2963 - https://github.com/xairy/linux-kernel-exploitation
CVE-2010-3035 - https://github.com/Ostorlab/KEV
CVE-2010-3035 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
@@ -5618,6 +5683,7 @@ CVE-2010-3081 - https://github.com/C0dak/linux-kernel-exploits
CVE-2010-3081 - https://github.com/C0dak/local-root-exploit-
CVE-2010-3081 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2010-3081 - https://github.com/Feng4/linux-kernel-exploits
+CVE-2010-3081 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2010-3081 - https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
CVE-2010-3081 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2010-3081 - https://github.com/Micr067/linux-kernel-exploits
@@ -5661,6 +5727,7 @@ CVE-2010-3081 - https://github.com/rakjong/LinuxElevation
CVE-2010-3081 - https://github.com/ram4u/Linux_Exploit_Suggester
CVE-2010-3081 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2010-3081 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2010-3081 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2010-3081 - https://github.com/xairy/linux-kernel-exploitation
CVE-2010-3081 - https://github.com/xfinest/linux-kernel-exploits
CVE-2010-3081 - https://github.com/xssfile/linux-kernel-exploits
@@ -5687,6 +5754,7 @@ CVE-2010-3301 - https://github.com/C0dak/linux-kernel-exploits
CVE-2010-3301 - https://github.com/C0dak/local-root-exploit-
CVE-2010-3301 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2010-3301 - https://github.com/Feng4/linux-kernel-exploits
+CVE-2010-3301 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2010-3301 - https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
CVE-2010-3301 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2010-3301 - https://github.com/Micr067/linux-kernel-exploits
@@ -5729,6 +5797,7 @@ CVE-2010-3301 - https://github.com/rakjong/LinuxElevation
CVE-2010-3301 - https://github.com/ram4u/Linux_Exploit_Suggester
CVE-2010-3301 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2010-3301 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2010-3301 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2010-3301 - https://github.com/xairy/linux-kernel-exploitation
CVE-2010-3301 - https://github.com/xfinest/linux-kernel-exploits
CVE-2010-3301 - https://github.com/xssfile/linux-kernel-exploits
@@ -5754,6 +5823,7 @@ CVE-2010-3333 - https://github.com/djschleen/ash
CVE-2010-3333 - https://github.com/doshyt/cve-monitor
CVE-2010-3333 - https://github.com/enthought/cve-search
CVE-2010-3333 - https://github.com/extremenetworks/cve-search-src
+CVE-2010-3333 - https://github.com/fangdada/ctf
CVE-2010-3333 - https://github.com/jerfinj/cve-search
CVE-2010-3333 - https://github.com/miradam/cve-search
CVE-2010-3333 - https://github.com/pandazheng/Threat-Intelligence-Analyst
@@ -5832,6 +5902,7 @@ CVE-2010-3437 - https://github.com/rakjong/LinuxElevation
CVE-2010-3437 - https://github.com/ram4u/Linux_Exploit_Suggester
CVE-2010-3437 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2010-3437 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2010-3437 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2010-3437 - https://github.com/xairy/linux-kernel-exploitation
CVE-2010-3437 - https://github.com/xfinest/linux-kernel-exploits
CVE-2010-3437 - https://github.com/xssfile/linux-kernel-exploits
@@ -6007,6 +6078,7 @@ CVE-2010-3904 - https://github.com/DictionaryHouse/The-Security-Handbook-Kali-Li
CVE-2010-3904 - https://github.com/Elinpf/OSCP-survival-guide
CVE-2010-3904 - https://github.com/Feng4/linux-kernel-exploits
CVE-2010-3904 - https://github.com/Gajasurve/The-Security-Handbook
+CVE-2010-3904 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2010-3904 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2010-3904 - https://github.com/MLGBSec/os-survival
CVE-2010-3904 - https://github.com/Micr067/linux-kernel-exploits
@@ -6128,6 +6200,7 @@ CVE-2010-4073 - https://github.com/C0dak/linux-kernel-exploits
CVE-2010-4073 - https://github.com/C0dak/local-root-exploit-
CVE-2010-4073 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2010-4073 - https://github.com/Feng4/linux-kernel-exploits
+CVE-2010-4073 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2010-4073 - https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
CVE-2010-4073 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2010-4073 - https://github.com/Micr067/linux-kernel-exploits
@@ -6199,6 +6272,7 @@ CVE-2010-4258 - https://github.com/C0dak/local-root-exploit-
CVE-2010-4258 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2010-4258 - https://github.com/Feng4/linux-kernel-exploits
CVE-2010-4258 - https://github.com/HUSTSeclab/Kernel-Exploits
+CVE-2010-4258 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2010-4258 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2010-4258 - https://github.com/Micr067/linux-kernel-exploits
CVE-2010-4258 - https://github.com/QChiLan/linux-exp
@@ -6243,6 +6317,7 @@ CVE-2010-4258 - https://github.com/sonu7519/linux-priv-Esc
CVE-2010-4258 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2010-4258 - https://github.com/tranquac/Linux-Privilege-Escalation
CVE-2010-4258 - https://github.com/usamaelshazly/Linux-Privilege-Escalation
+CVE-2010-4258 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2010-4258 - https://github.com/xairy/linux-kernel-exploitation
CVE-2010-4258 - https://github.com/xfinest/linux-kernel-exploits
CVE-2010-4258 - https://github.com/xssfile/linux-kernel-exploits
@@ -6269,6 +6344,7 @@ CVE-2010-4347 - https://github.com/C0dak/linux-kernel-exploits
CVE-2010-4347 - https://github.com/C0dak/local-root-exploit-
CVE-2010-4347 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2010-4347 - https://github.com/Feng4/linux-kernel-exploits
+CVE-2010-4347 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2010-4347 - https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
CVE-2010-4347 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2010-4347 - https://github.com/Micr067/linux-kernel-exploits
@@ -6428,6 +6504,7 @@ CVE-2010-5107 - https://github.com/zzzWTF/db-13-01
CVE-2010-5110 - https://github.com/0xCyberY/CVE-T4PDF
CVE-2010-5110 - https://github.com/ARPSyndicate/cvemon
CVE-2010-5137 - https://github.com/ARPSyndicate/cvemon
+CVE-2010-5137 - https://github.com/cryptoquick/ossification
CVE-2010-5137 - https://github.com/uvhw/conchimgiangnang
CVE-2010-5137 - https://github.com/uvhw/wallet.cpp
CVE-2010-5138 - https://github.com/ARPSyndicate/cvemon
@@ -6625,6 +6702,7 @@ CVE-2011-0762 - https://github.com/Okarn/TP_securite_EDOU_JACQUEMONT
CVE-2011-0762 - https://github.com/hack-parthsharma/Vision
CVE-2011-0807 - https://github.com/ACIC-Africa/metasploitable3
CVE-2011-0865 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs
+CVE-2011-0923 - https://github.com/marcocarolasec/CVE-2016-2004-Exploit
CVE-2011-10001 - https://github.com/Live-Hack-CVE/CVE-2011-10001
CVE-2011-10001 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2011-10002 - https://github.com/Live-Hack-CVE/CVE-2011-10002
@@ -6775,6 +6853,7 @@ CVE-2011-1493 - https://github.com/knd06/linux-kernel-exploitation
CVE-2011-1493 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2011-1493 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2011-1493 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2011-1493 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2011-1493 - https://github.com/xairy/linux-kernel-exploitation
CVE-2011-1502 - https://github.com/starnightcyber/vul-info-collect
CVE-2011-1503 - https://github.com/starnightcyber/vul-info-collect
@@ -6960,6 +7039,7 @@ CVE-2011-2523 - https://github.com/sanskar30/vsftpd_2.3.4_Exploit
CVE-2011-2523 - https://github.com/shamsulchowdhury/Unit-16-Homework-Penetration-Testing1
CVE-2011-2523 - https://github.com/slxwzk/slxwzkBotnet
CVE-2011-2523 - https://github.com/sponkmonk/Ladon_english_update
+CVE-2011-2523 - https://github.com/sug4r-wr41th/CVE-2011-2523
CVE-2011-2523 - https://github.com/sunzu94/vsftpd_2.3.4_Exploit
CVE-2011-2523 - https://github.com/tarikemal/exploit-ftp-samba
CVE-2011-2523 - https://github.com/thanawut2903/Port-21-tcp-vsftpd-2.3.4-exploit
@@ -7153,6 +7233,7 @@ CVE-2011-3374 - https://github.com/garethr/findcve
CVE-2011-3374 - https://github.com/garethr/snykout
CVE-2011-3374 - https://github.com/goharbor/pluggable-scanner-spec
CVE-2011-3374 - https://github.com/jnsgruk/trivy-cvss-tools
+CVE-2011-3374 - https://github.com/m-pasima/CI-CD-Security-image-scan
CVE-2011-3374 - https://github.com/mauraneh/WIK-DPS-TP02
CVE-2011-3374 - https://github.com/sharmapravin1001/Kubernetes-cks
CVE-2011-3374 - https://github.com/siddharthraopotukuchi/trivy
@@ -7182,6 +7263,7 @@ CVE-2011-3389 - https://github.com/WiktorMysz/devops-netology
CVE-2011-3389 - https://github.com/alexandrburyakov/Rep2
CVE-2011-3389 - https://github.com/alexgro1982/devops-netology
CVE-2011-3389 - https://github.com/bysart/devops-netology
+CVE-2011-3389 - https://github.com/catsploit/catsploit
CVE-2011-3389 - https://github.com/cdupuis/image-api
CVE-2011-3389 - https://github.com/daniel1302/litecoin
CVE-2011-3389 - https://github.com/dmitrii1312/03-sysadmin-09
@@ -7213,6 +7295,7 @@ CVE-2011-3544 - https://github.com/yasuobgg/crawl_daily_ioc_using_OTXv2
CVE-2011-3545 - https://github.com/dyjakan/exploit-development-case-studies
CVE-2011-3556 - https://github.com/20142995/Goby
CVE-2011-3556 - https://github.com/ARPSyndicate/cvemon
+CVE-2011-3556 - https://github.com/CVEDB/awesome-cve-repo
CVE-2011-3556 - https://github.com/HimmelAward/Goby_POC
CVE-2011-3556 - https://github.com/MelanyRoob/Goby
CVE-2011-3556 - https://github.com/Z0fhack/Goby_POC
@@ -7262,6 +7345,7 @@ CVE-2011-3654 - https://github.com/sambacha/mirror-radamsa
CVE-2011-3654 - https://github.com/sunzu94/radamsa-Fuzzer
CVE-2011-3659 - https://github.com/nyimol/AttributeChildRemoved_UAF
CVE-2011-3659 - https://github.com/rakwaht/FirefoxExploits
+CVE-2011-3730 - https://github.com/catsploit/catsploit
CVE-2011-3796 - https://github.com/zapalm/prestashop-security-vulnerability-checker
CVE-2011-3872 - https://github.com/ARPSyndicate/cvemon
CVE-2011-3872 - https://github.com/CVEDB/PoC-List
@@ -7491,6 +7575,7 @@ CVE-2011-4447 - https://github.com/ARPSyndicate/cvemon
CVE-2011-4447 - https://github.com/uvhw/conchimgiangnang
CVE-2011-4461 - https://github.com/Anonymous-Phunter/PHunter
CVE-2011-4461 - https://github.com/CGCL-codes/PHunter
+CVE-2011-4461 - https://github.com/LibHunter/LibHunter
CVE-2011-4461 - https://github.com/javirodriguezzz/Shodan-Browser
CVE-2011-4544 - https://github.com/zapalm/prestashop-security-vulnerability-checker
CVE-2011-4545 - https://github.com/zapalm/prestashop-security-vulnerability-checker
@@ -7538,6 +7623,7 @@ CVE-2011-4926 - https://github.com/ARPSyndicate/kenzer-templates
CVE-2011-4926 - https://github.com/d4n-sec/d4n-sec.github.io
CVE-2011-4968 - https://github.com/lukeber4/usn-search
CVE-2011-4969 - https://github.com/FallibleInc/retirejslib
+CVE-2011-4969 - https://github.com/catsploit/catsploit
CVE-2011-4969 - https://github.com/ctcpip/jquery-security
CVE-2011-4969 - https://github.com/eliasgranderubio/4depcheck
CVE-2011-4971 - https://github.com/secure-rewind-and-discard/sdrad_utils
@@ -7686,6 +7772,7 @@ CVE-2012-0056 - https://github.com/DotSight7/Cheatsheet
CVE-2012-0056 - https://github.com/Elinpf/OSCP-survival-guide
CVE-2012-0056 - https://github.com/Feng4/linux-kernel-exploits
CVE-2012-0056 - https://github.com/Gajasurve/The-Security-Handbook
+CVE-2012-0056 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2012-0056 - https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
CVE-2012-0056 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2012-0056 - https://github.com/MLGBSec/os-survival
@@ -7792,6 +7879,7 @@ CVE-2012-0056 - https://github.com/tangsilian/android-vuln
CVE-2012-0056 - https://github.com/tranquac/Linux-Privilege-Escalation
CVE-2012-0056 - https://github.com/usamaelshazly/Linux-Privilege-Escalation
CVE-2012-0056 - https://github.com/whackmanic/OSCP_Found
+CVE-2012-0056 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2012-0056 - https://github.com/xairy/linux-kernel-exploitation
CVE-2012-0056 - https://github.com/xcsrf/OSCP-PWK-Notes-Public
CVE-2012-0056 - https://github.com/xfinest/linux-kernel-exploits
@@ -7877,6 +7965,7 @@ CVE-2012-0158 - https://github.com/Ygodsec/-
CVE-2012-0158 - https://github.com/amliaW4/amliaW4.github.io
CVE-2012-0158 - https://github.com/cnhouzi/APTNotes
CVE-2012-0158 - https://github.com/czq945659538/-study
+CVE-2012-0158 - https://github.com/fangdada/ctf
CVE-2012-0158 - https://github.com/havocykp/Vulnerability-analysis
CVE-2012-0158 - https://github.com/helloandrewpaul/Mandiant---APT
CVE-2012-0158 - https://github.com/houjingyi233/office-exploit-case-study
@@ -8247,9 +8336,11 @@ CVE-2012-1823 - https://github.com/SexyBeast233/SecBooks
CVE-2012-1823 - https://github.com/Soundaryakambhampati/test-6
CVE-2012-1823 - https://github.com/Unix13/metasploitable2
CVE-2012-1823 - https://github.com/Vibragence/Dockersploit
+CVE-2012-1823 - https://github.com/XiangDongCJC/CVE-2024-4577-PHP-CGI-RCE
CVE-2012-1823 - https://github.com/ajread4/cve_pull
CVE-2012-1823 - https://github.com/alex14324/Eagel
CVE-2012-1823 - https://github.com/beched/libpywebhack
+CVE-2012-1823 - https://github.com/bl4cksku11/CVE-2024-4577
CVE-2012-1823 - https://github.com/cyberdeception/deepdig
CVE-2012-1823 - https://github.com/cyberharsh/PHP_CVE-2012-1823
CVE-2012-1823 - https://github.com/daai1/CVE-2012-1823
@@ -8312,6 +8403,7 @@ CVE-2012-2034 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detec
CVE-2012-2098 - https://github.com/Anonymous-Phunter/PHunter
CVE-2012-2098 - https://github.com/BrunoBonacci/lein-binplus
CVE-2012-2098 - https://github.com/CGCL-codes/PHunter
+CVE-2012-2098 - https://github.com/LibHunter/LibHunter
CVE-2012-2098 - https://github.com/markus-wa/clj-bin
CVE-2012-2110 - https://github.com/ARPSyndicate/cvemon
CVE-2012-2110 - https://github.com/chnzzh/OpenSSL-CVE-lib
@@ -8471,6 +8563,7 @@ CVE-2012-2825 - https://github.com/sambacha/mirror-radamsa
CVE-2012-2825 - https://github.com/sunzu94/radamsa-Fuzzer
CVE-2012-2836 - https://github.com/ARPSyndicate/cvemon
CVE-2012-2836 - https://github.com/asur4s/fuzzing
+CVE-2012-2836 - https://github.com/ch1hyun/fuzzing-class
CVE-2012-2836 - https://github.com/chiehw/fuzzing
CVE-2012-2849 - https://github.com/Hwangtaewon/radamsa
CVE-2012-2849 - https://github.com/StephenHaruna/RADAMSA
@@ -8509,6 +8602,7 @@ CVE-2012-2982 - https://github.com/LeDucKhiem/CVE-2012-2982
CVE-2012-2982 - https://github.com/Mithlonde/Mithlonde
CVE-2012-2982 - https://github.com/OstojaOfficial/CVE-2012-2982
CVE-2012-2982 - https://github.com/R00tendo/CVE-2012-2982
+CVE-2012-2982 - https://github.com/Shadow-Spinner/CVE-2012-2982_python
CVE-2012-2982 - https://github.com/SlizBinksman/CVE_2012-2982
CVE-2012-2982 - https://github.com/Will-Banksy/My-Exploits
CVE-2012-2982 - https://github.com/alien-keric/webmin-v1.580-exploit
@@ -8562,6 +8656,7 @@ CVE-2012-3167 - https://github.com/Live-Hack-CVE/CVE-2012-3167
CVE-2012-3173 - https://github.com/Live-Hack-CVE/CVE-2012-3173
CVE-2012-3174 - https://github.com/ARPSyndicate/cvemon
CVE-2012-3174 - https://github.com/ferdinandmudjialim/metasploit-cve-search
+CVE-2012-3174 - https://github.com/tunnelcat/metasploit-cve-search
CVE-2012-3177 - https://github.com/tomwillfixit/alpine-cvecheck
CVE-2012-3180 - https://github.com/Live-Hack-CVE/CVE-2012-3180
CVE-2012-3197 - https://github.com/Live-Hack-CVE/CVE-2012-3197
@@ -8978,6 +9073,7 @@ CVE-2012-5204 - https://github.com/CERTCC/git_vul_driller
CVE-2012-5221 - https://github.com/ARPSyndicate/cvemon
CVE-2012-5221 - https://github.com/aredspy/HPCredDumper
CVE-2012-5306 - https://github.com/anima1111/DLink-DCS-5009L
+CVE-2012-5321 - https://github.com/Cappricio-Securities/CVE-2012-5321
CVE-2012-5475 - https://github.com/Live-Hack-CVE/CVE-2012-5475
CVE-2012-5510 - https://github.com/hinj/hInjector
CVE-2012-5513 - https://github.com/hinj/hInjector
@@ -9131,6 +9227,7 @@ CVE-2012-6706 - https://github.com/ARPSyndicate/cvemon
CVE-2012-6706 - https://github.com/abge0386/Final-Project
CVE-2012-6708 - https://github.com/ARPSyndicate/cvemon
CVE-2012-6708 - https://github.com/catdever/watchdog
+CVE-2012-6708 - https://github.com/catsploit/catsploit
CVE-2012-6708 - https://github.com/ctcpip/jquery-security
CVE-2012-6708 - https://github.com/flipkart-incubator/watchdog
CVE-2012-6708 - https://github.com/rohankumardubey/watchdog
@@ -9277,6 +9374,7 @@ CVE-2013-0268 - https://github.com/C0dak/linux-kernel-exploits
CVE-2013-0268 - https://github.com/C0dak/local-root-exploit-
CVE-2013-0268 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2013-0268 - https://github.com/Feng4/linux-kernel-exploits
+CVE-2013-0268 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2013-0268 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2013-0268 - https://github.com/Micr067/linux-kernel-exploits
CVE-2013-0268 - https://github.com/QChiLan/linux-exp
@@ -9635,6 +9733,7 @@ CVE-2013-1763 - https://github.com/C0dak/linux-kernel-exploits
CVE-2013-1763 - https://github.com/C0dak/local-root-exploit-
CVE-2013-1763 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2013-1763 - https://github.com/Feng4/linux-kernel-exploits
+CVE-2013-1763 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2013-1763 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2013-1763 - https://github.com/Micr067/linux-kernel-exploits
CVE-2013-1763 - https://github.com/QChiLan/linux-exp
@@ -9675,6 +9774,7 @@ CVE-2013-1763 - https://github.com/qkrtjsrbs315/CVE-2013-1763
CVE-2013-1763 - https://github.com/rakjong/LinuxElevation
CVE-2013-1763 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2013-1763 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2013-1763 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2013-1763 - https://github.com/xairy/linux-kernel-exploitation
CVE-2013-1763 - https://github.com/xfinest/linux-kernel-exploits
CVE-2013-1763 - https://github.com/xssfile/linux-kernel-exploits
@@ -9685,6 +9785,7 @@ CVE-2013-1768 - https://github.com/Anonymous-Phunter/PHunter
CVE-2013-1768 - https://github.com/BrittanyKuhn/javascript-tutorial
CVE-2013-1768 - https://github.com/CGCL-codes/PHunter
CVE-2013-1768 - https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet
+CVE-2013-1768 - https://github.com/LibHunter/LibHunter
CVE-2013-1768 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs
CVE-2013-1768 - https://github.com/klausware/Java-Deserialization-Cheat-Sheet
CVE-2013-1768 - https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
@@ -9703,6 +9804,7 @@ CVE-2013-1858 - https://github.com/C0dak/linux-kernel-exploits
CVE-2013-1858 - https://github.com/C0dak/local-root-exploit-
CVE-2013-1858 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2013-1858 - https://github.com/Feng4/linux-kernel-exploits
+CVE-2013-1858 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2013-1858 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2013-1858 - https://github.com/Micr067/linux-kernel-exploits
CVE-2013-1858 - https://github.com/QChiLan/linux-exp
@@ -9813,6 +9915,7 @@ CVE-2013-1933 - https://github.com/ARPSyndicate/cvemon
CVE-2013-1937 - https://github.com/spiegel-im-spiegel/cvss3
CVE-2013-1950 - https://github.com/Live-Hack-CVE/CVE-2013-1950
CVE-2013-1956 - https://github.com/ARPSyndicate/cvemon
+CVE-2013-1959 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2013-1959 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2013-1965 - https://github.com/0day666/Vulnerability-verification
CVE-2013-1965 - https://github.com/20142995/pocsuite3
@@ -9899,6 +10002,7 @@ CVE-2013-2094 - https://github.com/CVEDB/PoC-List
CVE-2013-2094 - https://github.com/CVEDB/awesome-cve-repo
CVE-2013-2094 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2013-2094 - https://github.com/Feng4/linux-kernel-exploits
+CVE-2013-2094 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2013-2094 - https://github.com/I-Prashanth-S/CybersecurityTIFAC
CVE-2013-2094 - https://github.com/IMCG/awesome-c
CVE-2013-2094 - https://github.com/InteliSecureLabs/Linux_Exploit_Suggester
@@ -9970,6 +10074,7 @@ CVE-2013-2094 - https://github.com/tarunyadav/fix-cve-2013-2094
CVE-2013-2094 - https://github.com/timhsutw/cve-2013-2094
CVE-2013-2094 - https://github.com/vnik5287/CVE-2013-2094
CVE-2013-2094 - https://github.com/weeka10/-hktalent-TOP
+CVE-2013-2094 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2013-2094 - https://github.com/xairy/linux-kernel-exploitation
CVE-2013-2094 - https://github.com/xfinest/linux-kernel-exploits
CVE-2013-2094 - https://github.com/xssfile/linux-kernel-exploits
@@ -10873,6 +10978,7 @@ CVE-2013-7240 - https://github.com/JNado/CST312-WordPressExploits
CVE-2013-7285 - https://github.com/ARPSyndicate/cvemon
CVE-2013-7285 - https://github.com/Anonymous-Phunter/PHunter
CVE-2013-7285 - https://github.com/CGCL-codes/PHunter
+CVE-2013-7285 - https://github.com/LibHunter/LibHunter
CVE-2013-7285 - https://github.com/Live-Hack-CVE/CVE-2019-10173
CVE-2013-7285 - https://github.com/OWASP/www-project-ide-vulscanner
CVE-2013-7285 - https://github.com/Whoopsunix/PPPVULNS
@@ -10941,6 +11047,7 @@ CVE-2014-0038 - https://github.com/CVEDB/top
CVE-2014-0038 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2014-0038 - https://github.com/Feng4/linux-kernel-exploits
CVE-2014-0038 - https://github.com/GhostTroops/TOP
+CVE-2014-0038 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2014-0038 - https://github.com/IMCG/awesome-c
CVE-2014-0038 - https://github.com/JERRY123S/all-poc
CVE-2014-0038 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
@@ -10994,6 +11101,7 @@ CVE-2014-0038 - https://github.com/spencerdodd/kernelpop
CVE-2014-0038 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2014-0038 - https://github.com/sujayadkesar/Linux-Privilege-Escalation
CVE-2014-0038 - https://github.com/weeka10/-hktalent-TOP
+CVE-2014-0038 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2014-0038 - https://github.com/xairy/linux-kernel-exploitation
CVE-2014-0038 - https://github.com/xfinest/linux-kernel-exploits
CVE-2014-0038 - https://github.com/xssfile/linux-kernel-exploits
@@ -11761,6 +11869,7 @@ CVE-2014-0181 - https://github.com/ARPSyndicate/cvemon
CVE-2014-0181 - https://github.com/lrh2000/CVE-2023-2002
CVE-2014-0193 - https://github.com/Anonymous-Phunter/PHunter
CVE-2014-0193 - https://github.com/CGCL-codes/PHunter
+CVE-2014-0193 - https://github.com/LibHunter/LibHunter
CVE-2014-0193 - https://github.com/ian4hu/super-pom
CVE-2014-0195 - https://github.com/ARPSyndicate/cvemon
CVE-2014-0195 - https://github.com/PotterXma/linux-deployment-standard
@@ -11777,6 +11886,7 @@ CVE-2014-0196 - https://github.com/C0dak/linux-kernel-exploits
CVE-2014-0196 - https://github.com/C0dak/local-root-exploit-
CVE-2014-0196 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2014-0196 - https://github.com/Feng4/linux-kernel-exploits
+CVE-2014-0196 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2014-0196 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2014-0196 - https://github.com/Micr067/linux-kernel-exploits
CVE-2014-0196 - https://github.com/Ostorlab/KEV
@@ -11825,6 +11935,7 @@ CVE-2014-0196 - https://github.com/spencerdodd/kernelpop
CVE-2014-0196 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2014-0196 - https://github.com/tangsilian/android-vuln
CVE-2014-0196 - https://github.com/tempbottle/CVE-2014-0196
+CVE-2014-0196 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2014-0196 - https://github.com/xairy/linux-kernel-exploitation
CVE-2014-0196 - https://github.com/xfinest/linux-kernel-exploits
CVE-2014-0196 - https://github.com/xssfile/linux-kernel-exploits
@@ -12440,6 +12551,7 @@ CVE-2014-2851 - https://github.com/oneoy/cve-
CVE-2014-2851 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2014-2851 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2014-2851 - https://github.com/thomaxxl/group_info
+CVE-2014-2851 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2014-2851 - https://github.com/xairy/linux-kernel-exploitation
CVE-2014-2886 - https://github.com/andir/nixos-issue-db-example
CVE-2014-2908 - https://github.com/ARPSyndicate/kenzer-templates
@@ -12447,6 +12559,7 @@ CVE-2014-2913 - https://github.com/bootc/nrpe-ng
CVE-2014-2913 - https://github.com/ohsawa0515/ec2-vuls-config
CVE-2014-2917 - https://github.com/Ch4p34uN0iR/mongoaudit
CVE-2014-2917 - https://github.com/gold1029/mongoaudit
+CVE-2014-2917 - https://github.com/stampery/mongoaudit
CVE-2014-2962 - https://github.com/ARPSyndicate/kenzer-templates
CVE-2014-3068 - https://github.com/ARPSyndicate/cvemon
CVE-2014-3068 - https://github.com/r-wisniewski/Vulnerability-Check
@@ -12544,6 +12657,7 @@ CVE-2014-3153 - https://github.com/CVEDB/top
CVE-2014-3153 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2014-3153 - https://github.com/Feng4/linux-kernel-exploits
CVE-2014-3153 - https://github.com/GhostTroops/TOP
+CVE-2014-3153 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2014-3153 - https://github.com/I-Prashanth-S/CybersecurityTIFAC
CVE-2014-3153 - https://github.com/IMCG/awesome-c
CVE-2014-3153 - https://github.com/JERRY123S/all-poc
@@ -12615,6 +12729,7 @@ CVE-2014-3153 - https://github.com/tangsilian/android-vuln
CVE-2014-3153 - https://github.com/timwr/CVE-2014-3153
CVE-2014-3153 - https://github.com/tymat/android_futex_root
CVE-2014-3153 - https://github.com/weeka10/-hktalent-TOP
+CVE-2014-3153 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2014-3153 - https://github.com/xairy/linux-kernel-exploitation
CVE-2014-3153 - https://github.com/xfinest/linux-kernel-exploits
CVE-2014-3153 - https://github.com/xssfile/linux-kernel-exploits
@@ -12659,6 +12774,7 @@ CVE-2014-3480 - https://github.com/Live-Hack-CVE/CVE-2014-3480
CVE-2014-3487 - https://github.com/Live-Hack-CVE/CVE-2014-3487
CVE-2014-3488 - https://github.com/Anonymous-Phunter/PHunter
CVE-2014-3488 - https://github.com/CGCL-codes/PHunter
+CVE-2014-3488 - https://github.com/LibHunter/LibHunter
CVE-2014-3488 - https://github.com/cezapata/appconfiguration-sample
CVE-2014-3488 - https://github.com/ian4hu/super-pom
CVE-2014-3498 - https://github.com/OSAS/ansible-role-ansible_bastion
@@ -12843,6 +12959,7 @@ CVE-2014-3572 - https://github.com/neominds/JPN_RIC13351-2
CVE-2014-3577 - https://github.com/ARPSyndicate/cvemon
CVE-2014-3577 - https://github.com/Anonymous-Phunter/PHunter
CVE-2014-3577 - https://github.com/CGCL-codes/PHunter
+CVE-2014-3577 - https://github.com/LibHunter/LibHunter
CVE-2014-3577 - https://github.com/albfernandez/commons-httpclient-3
CVE-2014-3577 - https://github.com/argon-gh-demo/clojure-sample
CVE-2014-3577 - https://github.com/rm-hull/nvd-clojure
@@ -12944,6 +13061,7 @@ CVE-2014-3704 - https://github.com/Threekiii/Awesome-POC
CVE-2014-3704 - https://github.com/Threekiii/Vulhub-Reproduce
CVE-2014-3704 - https://github.com/Z0fhack/Goby_POC
CVE-2014-3704 - https://github.com/bakery312/Vulhub-Reproduce
+CVE-2014-3704 - https://github.com/catsploit/catsploit
CVE-2014-3704 - https://github.com/enomothem/PenTestNote
CVE-2014-3704 - https://github.com/happynote3966/CVE-2014-3704
CVE-2014-3704 - https://github.com/hxysaury/saury-vulnhub
@@ -12971,6 +13089,7 @@ CVE-2014-3744 - https://github.com/ARPSyndicate/kenzer-templates
CVE-2014-3744 - https://github.com/Elsfa7-110/kenzer-templates
CVE-2014-3791 - https://github.com/0xT11/CVE-POC
CVE-2014-3791 - https://github.com/Parist0nH1ll/Vulnerabilities-Write-Ups
+CVE-2014-3791 - https://github.com/fangdada/ctf
CVE-2014-3791 - https://github.com/hectorgie/PoC-in-GitHub
CVE-2014-3852 - https://github.com/Whamo12/fetch-cwe-list
CVE-2014-3852 - https://github.com/aemon1407/KWSPZapTest
@@ -12987,6 +13106,7 @@ CVE-2014-4014 - https://github.com/C0dak/linux-kernel-exploits
CVE-2014-4014 - https://github.com/C0dak/local-root-exploit-
CVE-2014-4014 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2014-4014 - https://github.com/Feng4/linux-kernel-exploits
+CVE-2014-4014 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2014-4014 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2014-4014 - https://github.com/Micr067/linux-kernel-exploits
CVE-2014-4014 - https://github.com/QChiLan/linux-exp
@@ -13028,6 +13148,7 @@ CVE-2014-4014 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2014-4014 - https://github.com/spencerdodd/kernelpop
CVE-2014-4014 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2014-4014 - https://github.com/vnik5287/cve-2014-4014-privesc
+CVE-2014-4014 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2014-4014 - https://github.com/xairy/linux-kernel-exploitation
CVE-2014-4014 - https://github.com/xfinest/linux-kernel-exploits
CVE-2014-4014 - https://github.com/xssfile/linux-kernel-exploits
@@ -13344,6 +13465,7 @@ CVE-2014-4322 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2014-4322 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2014-4322 - https://github.com/tangsilian/android-vuln
CVE-2014-4322 - https://github.com/weeka10/-hktalent-TOP
+CVE-2014-4322 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2014-4322 - https://github.com/xairy/linux-kernel-exploitation
CVE-2014-4323 - https://github.com/ARPSyndicate/cvemon
CVE-2014-4323 - https://github.com/CVEDB/PoC-List
@@ -13457,6 +13579,7 @@ CVE-2014-4699 - https://github.com/C0dak/linux-kernel-exploits
CVE-2014-4699 - https://github.com/C0dak/local-root-exploit-
CVE-2014-4699 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2014-4699 - https://github.com/Feng4/linux-kernel-exploits
+CVE-2014-4699 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2014-4699 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2014-4699 - https://github.com/Micr067/linux-kernel-exploits
CVE-2014-4699 - https://github.com/QChiLan/linux-exp
@@ -13500,6 +13623,7 @@ CVE-2014-4699 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2014-4699 - https://github.com/spencerdodd/kernelpop
CVE-2014-4699 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2014-4699 - https://github.com/vnik5287/cve-2014-4699-ptrace
+CVE-2014-4699 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2014-4699 - https://github.com/xairy/linux-kernel-exploitation
CVE-2014-4699 - https://github.com/xfinest/linux-kernel-exploits
CVE-2014-4699 - https://github.com/xssfile/linux-kernel-exploits
@@ -13535,6 +13659,7 @@ CVE-2014-4943 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2014-4943 - https://github.com/redes-2015/l2tp-socket-bug
CVE-2014-4943 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2014-4943 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2014-4943 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2014-4943 - https://github.com/xairy/linux-kernel-exploitation
CVE-2014-4966 - https://github.com/clhlc/ansible-2.0
CVE-2014-4967 - https://github.com/clhlc/ansible-2.0
@@ -14928,6 +15053,7 @@ CVE-2014-9295 - https://github.com/sous-chefs/ntp
CVE-2014-9301 - https://github.com/ottimo/burp-alfresco-referer-proxy-cve-2014-9301
CVE-2014-9322 - https://github.com/ARPSyndicate/cvemon
CVE-2014-9322 - https://github.com/Flerov/WindowsExploitDev
+CVE-2014-9322 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2014-9322 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2014-9322 - https://github.com/R0B1NL1N/linux-kernel-exploitation
CVE-2014-9322 - https://github.com/RKX1209/CVE-2014-9322
@@ -14947,6 +15073,7 @@ CVE-2014-9322 - https://github.com/paulveillard/cybersecurity-exploit-developmen
CVE-2014-9322 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2014-9322 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2014-9322 - https://github.com/tangsilian/android-vuln
+CVE-2014-9322 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2014-9322 - https://github.com/xairy/linux-kernel-exploitation
CVE-2014-9328 - https://github.com/ARPSyndicate/cvemon
CVE-2014-9328 - https://github.com/SRVRS094ADM/ClamAV
@@ -14971,6 +15098,7 @@ CVE-2014-9390 - https://github.com/testingfly/xcode
CVE-2014-9390 - https://github.com/timcharper/git_osx_installer
CVE-2014-9402 - https://github.com/ARPSyndicate/cvemon
CVE-2014-9410 - https://github.com/betalphafai/CVE-2015-0568
+CVE-2014-9418 - https://github.com/javierparadadev/python-value-objects
CVE-2014-9418 - https://github.com/jparadadev/python-value-objects
CVE-2014-9428 - https://github.com/Live-Hack-CVE/CVE-2014-9428
CVE-2014-9439 - https://github.com/Parist0nH1ll/Vulnerabilities-Write-Ups
@@ -15192,6 +15320,7 @@ CVE-2015-0204 - https://github.com/alexoslabs/HTTPSScan
CVE-2015-0204 - https://github.com/anthophilee/A2SV--SSL-VUL-Scan
CVE-2015-0204 - https://github.com/bysart/devops-netology
CVE-2015-0204 - https://github.com/camel-clarkson/non-controlflow-hijacking-datasets
+CVE-2015-0204 - https://github.com/catsploit/catsploit
CVE-2015-0204 - https://github.com/chnzzh/OpenSSL-CVE-lib
CVE-2015-0204 - https://github.com/clic-kbait/A2SV--SSL-VUL-Scan
CVE-2015-0204 - https://github.com/clino-mania/A2SV--SSL-VUL-Scan
@@ -15527,6 +15656,7 @@ CVE-2015-0568 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2015-0568 - https://github.com/knd06/linux-kernel-exploitation
CVE-2015-0568 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2015-0568 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2015-0568 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2015-0568 - https://github.com/xairy/linux-kernel-exploitation
CVE-2015-0569 - https://github.com/tangsilian/android-vuln
CVE-2015-0570 - https://github.com/ARPSyndicate/cvemon
@@ -15543,6 +15673,7 @@ CVE-2015-0570 - https://github.com/knd06/linux-kernel-exploitation
CVE-2015-0570 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2015-0570 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2015-0570 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2015-0570 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2015-0570 - https://github.com/xairy/linux-kernel-exploitation
CVE-2015-0571 - https://github.com/thdusdl1219/CVE-Study
CVE-2015-0572 - https://github.com/thdusdl1219/CVE-Study
@@ -15782,6 +15913,7 @@ CVE-2015-1328 - https://github.com/C0dak/local-root-exploit-
CVE-2015-1328 - https://github.com/DarkenCode/PoC
CVE-2015-1328 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2015-1328 - https://github.com/Feng4/linux-kernel-exploits
+CVE-2015-1328 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2015-1328 - https://github.com/Jean-Francois-C/Boot2root-CTFs-Writeups
CVE-2015-1328 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2015-1328 - https://github.com/Micr067/linux-kernel-exploits
@@ -16279,6 +16411,7 @@ CVE-2015-1805 - https://github.com/snorez/exploits
CVE-2015-1805 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2015-1805 - https://github.com/tangsilian/android-vuln
CVE-2015-1805 - https://github.com/weeka10/-hktalent-TOP
+CVE-2015-1805 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2015-1805 - https://github.com/xairy/linux-kernel-exploitation
CVE-2015-1817 - https://github.com/ARPSyndicate/cvemon
CVE-2015-1819 - https://github.com/ARPSyndicate/cvemon
@@ -16300,6 +16433,7 @@ CVE-2015-1833 - https://github.com/0ang3el/aem-hacker
CVE-2015-1833 - https://github.com/ARPSyndicate/cvemon
CVE-2015-1833 - https://github.com/Anonymous-Phunter/PHunter
CVE-2015-1833 - https://github.com/CGCL-codes/PHunter
+CVE-2015-1833 - https://github.com/LibHunter/LibHunter
CVE-2015-1833 - https://github.com/Raz0r/aemscan
CVE-2015-1833 - https://github.com/TheRipperJhon/AEMVS
CVE-2015-1833 - https://github.com/amarnathadapa-sec/aem
@@ -16376,6 +16510,7 @@ CVE-2015-2080 - https://github.com/ARPSyndicate/kenzer-templates
CVE-2015-2080 - https://github.com/Anonymous-Phunter/PHunter
CVE-2015-2080 - https://github.com/CGCL-codes/PHunter
CVE-2015-2080 - https://github.com/Elsfa7-110/kenzer-templates
+CVE-2015-2080 - https://github.com/LibHunter/LibHunter
CVE-2015-2080 - https://github.com/albinowax/ActiveScanPlusPlus
CVE-2015-2080 - https://github.com/cranelab/webapp-tech
CVE-2015-2080 - https://github.com/ilmila/J2EEScan
@@ -16389,6 +16524,7 @@ CVE-2015-2153 - https://github.com/arntsonl/CVE-2015-2153
CVE-2015-2156 - https://github.com/ARPSyndicate/cvemon
CVE-2015-2156 - https://github.com/Anonymous-Phunter/PHunter
CVE-2015-2156 - https://github.com/CGCL-codes/PHunter
+CVE-2015-2156 - https://github.com/LibHunter/LibHunter
CVE-2015-2156 - https://github.com/cezapata/appconfiguration-sample
CVE-2015-2158 - https://github.com/mrash/afl-cve
CVE-2015-2166 - https://github.com/ARPSyndicate/cvemon
@@ -16675,6 +16811,7 @@ CVE-2015-2697 - https://github.com/ARPSyndicate/cvemon
CVE-2015-2704 - https://github.com/ARPSyndicate/cvemon
CVE-2015-2705 - https://github.com/Ch4p34uN0iR/mongoaudit
CVE-2015-2705 - https://github.com/gold1029/mongoaudit
+CVE-2015-2705 - https://github.com/stampery/mongoaudit
CVE-2015-2712 - https://github.com/pyllyukko/user.js
CVE-2015-2716 - https://github.com/ARPSyndicate/cvemon
CVE-2015-2716 - https://github.com/fokypoky/places-list
@@ -16997,6 +17134,7 @@ CVE-2015-3253 - https://github.com/CGCL-codes/PHunter
CVE-2015-3253 - https://github.com/CodeIntelligenceTesting/java-demo
CVE-2015-3253 - https://github.com/CodeIntelligenceTesting/java-demo-old
CVE-2015-3253 - https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet
+CVE-2015-3253 - https://github.com/LibHunter/LibHunter
CVE-2015-3253 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs
CVE-2015-3253 - https://github.com/TheGrinch/elastic
CVE-2015-3253 - https://github.com/angelwhu/XStream_unserialization
@@ -17239,6 +17377,7 @@ CVE-2015-3636 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2015-3636 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2015-3636 - https://github.com/tangsilian/android-vuln
CVE-2015-3636 - https://github.com/weeka10/-hktalent-TOP
+CVE-2015-3636 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2015-3636 - https://github.com/xairy/linux-kernel-exploitation
CVE-2015-3641 - https://github.com/ARPSyndicate/cvemon
CVE-2015-3641 - https://github.com/uvhw/conchimgiangnang
@@ -17809,10 +17948,12 @@ CVE-2015-5254 - https://github.com/t0m4too/t0m4to
CVE-2015-5254 - https://github.com/xbl3/awesome-cve-poc_qazbnm456
CVE-2015-5256 - https://github.com/Anonymous-Phunter/PHunter
CVE-2015-5256 - https://github.com/CGCL-codes/PHunter
+CVE-2015-5256 - https://github.com/LibHunter/LibHunter
CVE-2015-5257 - https://github.com/Live-Hack-CVE/CVE-2015-5275
CVE-2015-5262 - https://github.com/ARPSyndicate/cvemon
CVE-2015-5262 - https://github.com/Anonymous-Phunter/PHunter
CVE-2015-5262 - https://github.com/CGCL-codes/PHunter
+CVE-2015-5262 - https://github.com/LibHunter/LibHunter
CVE-2015-5262 - https://github.com/albfernandez/commons-httpclient-3
CVE-2015-5262 - https://github.com/argon-gh-demo/clojure-sample
CVE-2015-5262 - https://github.com/dotanuki-labs/android-oss-cves-research
@@ -18441,6 +18582,7 @@ CVE-2015-6644 - https://github.com/ARPSyndicate/cvemon
CVE-2015-6644 - https://github.com/Anonymous-Phunter/PHunter
CVE-2015-6644 - https://github.com/CGCL-codes/PHunter
CVE-2015-6644 - https://github.com/IkerSaint/VULNAPP-vulnerable-app
+CVE-2015-6644 - https://github.com/LibHunter/LibHunter
CVE-2015-6644 - https://github.com/brianhigh/us-cert-bulletins
CVE-2015-6644 - https://github.com/pctF/vulnerable-app
CVE-2015-6645 - https://github.com/ARPSyndicate/cvemon
@@ -18463,6 +18605,7 @@ CVE-2015-6673 - https://github.com/andir/nixos-issue-db-example
CVE-2015-6748 - https://github.com/ARPSyndicate/cvemon
CVE-2015-6748 - https://github.com/Anonymous-Phunter/PHunter
CVE-2015-6748 - https://github.com/CGCL-codes/PHunter
+CVE-2015-6748 - https://github.com/LibHunter/LibHunter
CVE-2015-6748 - https://github.com/epicosy/VUL4J-59
CVE-2015-6749 - https://github.com/andir/nixos-issue-db-example
CVE-2015-6755 - https://github.com/ARPSyndicate/cvemon
@@ -19329,6 +19472,7 @@ CVE-2015-8317 - https://github.com/mrash/afl-cve
CVE-2015-8317 - https://github.com/satbekmyrza/repo-afl-a2
CVE-2015-8320 - https://github.com/Anonymous-Phunter/PHunter
CVE-2015-8320 - https://github.com/CGCL-codes/PHunter
+CVE-2015-8320 - https://github.com/LibHunter/LibHunter
CVE-2015-8324 - https://github.com/Live-Hack-CVE/CVE-2015-8324
CVE-2015-8325 - https://github.com/Live-Hack-CVE/CVE-2015-8325
CVE-2015-8325 - https://github.com/bioly230/THM_Skynet
@@ -19408,6 +19552,7 @@ CVE-2015-8399 - https://github.com/CLincat/vulcat
CVE-2015-8399 - https://github.com/Elsfa7-110/kenzer-templates
CVE-2015-8399 - https://github.com/HimmelAward/Goby_POC
CVE-2015-8399 - https://github.com/Z0fhack/Goby_POC
+CVE-2015-8399 - https://github.com/enomothem/PenTestNote
CVE-2015-8399 - https://github.com/jweny/pocassistdb
CVE-2015-8400 - https://github.com/ARPSyndicate/cvemon
CVE-2015-8401 - https://github.com/thdusdl1219/CVE-Study
@@ -19462,6 +19607,7 @@ CVE-2015-8548 - https://github.com/qazbnm456/awesome-cve-poc
CVE-2015-8548 - https://github.com/tunz/js-vuln-db
CVE-2015-8548 - https://github.com/xbl3/awesome-cve-poc_qazbnm456
CVE-2015-8550 - https://github.com/Al1ex/LinuxEelvation
+CVE-2015-8550 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2015-8550 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2015-8550 - https://github.com/bsauce/kernel-exploit-factory
CVE-2015-8550 - https://github.com/jfbastien/no-sane-compiler
@@ -19543,6 +19689,7 @@ CVE-2015-8656 - https://github.com/thdusdl1219/CVE-Study
CVE-2015-8657 - https://github.com/thdusdl1219/CVE-Study
CVE-2015-8658 - https://github.com/thdusdl1219/CVE-Study
CVE-2015-8660 - https://github.com/ARPSyndicate/cvemon
+CVE-2015-8660 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2015-8660 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2015-8660 - https://github.com/Live-Hack-CVE/CVE-2015-8660
CVE-2015-8660 - https://github.com/chorankates/Irked
@@ -20227,6 +20374,7 @@ CVE-2016-0701 - https://github.com/Live-Hack-CVE/CVE-2017-3738
CVE-2016-0701 - https://github.com/RClueX/Hackerone-Reports
CVE-2016-0701 - https://github.com/chnzzh/OpenSSL-CVE-lib
CVE-2016-0701 - https://github.com/erwinchang/utility-library
+CVE-2016-0701 - https://github.com/forget-eve/NSP
CVE-2016-0701 - https://github.com/imhunterand/hackerone-publicy-disclosed
CVE-2016-0701 - https://github.com/luanjampa/cve-2016-0701
CVE-2016-0702 - https://github.com/ARPSyndicate/cvemon
@@ -20291,6 +20439,7 @@ CVE-2016-0728 - https://github.com/C0dak/local-root-exploit-
CVE-2016-0728 - https://github.com/De30/zabbix_community-templates
CVE-2016-0728 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2016-0728 - https://github.com/Feng4/linux-kernel-exploits
+CVE-2016-0728 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2016-0728 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2016-0728 - https://github.com/Michael-Git-Web/templateszbx
CVE-2016-0728 - https://github.com/Micr067/linux-kernel-exploits
@@ -20361,6 +20510,7 @@ CVE-2016-0728 - https://github.com/sunnyjiang/cve_2016_0728
CVE-2016-0728 - https://github.com/th30d00r/Linux-Vulnerability-CVE-2016-0728-and-Exploit
CVE-2016-0728 - https://github.com/tndud042713/cve
CVE-2016-0728 - https://github.com/whiteHat001/Kernel-Security
+CVE-2016-0728 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2016-0728 - https://github.com/xairy/linux-kernel-exploitation
CVE-2016-0728 - https://github.com/xbl3/awesome-cve-poc_qazbnm456
CVE-2016-0728 - https://github.com/xfinest/linux-kernel-exploits
@@ -20638,6 +20788,7 @@ CVE-2016-0819 - https://github.com/knd06/linux-kernel-exploitation
CVE-2016-0819 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2016-0819 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2016-0819 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2016-0819 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2016-0819 - https://github.com/xairy/linux-kernel-exploitation
CVE-2016-0820 - https://github.com/ARPSyndicate/cvemon
CVE-2016-0820 - https://github.com/R0B1NL1N/linux-kernel-exploitation
@@ -20653,6 +20804,7 @@ CVE-2016-0820 - https://github.com/knd06/linux-kernel-exploitation
CVE-2016-0820 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2016-0820 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2016-0820 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2016-0820 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2016-0820 - https://github.com/xairy/linux-kernel-exploitation
CVE-2016-0844 - https://github.com/jiayy/android_vuln_poc-exp
CVE-2016-0846 - https://github.com/ARPSyndicate/cvemon
@@ -21100,6 +21252,7 @@ CVE-2016-1000339 - https://github.com/ARPSyndicate/cvemon
CVE-2016-1000339 - https://github.com/Anonymous-Phunter/PHunter
CVE-2016-1000339 - https://github.com/CGCL-codes/PHunter
CVE-2016-1000339 - https://github.com/IkerSaint/VULNAPP-vulnerable-app
+CVE-2016-1000339 - https://github.com/LibHunter/LibHunter
CVE-2016-1000339 - https://github.com/pctF/vulnerable-app
CVE-2016-1000339 - https://github.com/wolpert/crypto
CVE-2016-1000340 - https://github.com/ARPSyndicate/cvemon
@@ -21108,37 +21261,44 @@ CVE-2016-1000341 - https://github.com/ARPSyndicate/cvemon
CVE-2016-1000341 - https://github.com/Anonymous-Phunter/PHunter
CVE-2016-1000341 - https://github.com/CGCL-codes/PHunter
CVE-2016-1000341 - https://github.com/IkerSaint/VULNAPP-vulnerable-app
+CVE-2016-1000341 - https://github.com/LibHunter/LibHunter
CVE-2016-1000341 - https://github.com/pctF/vulnerable-app
CVE-2016-1000342 - https://github.com/ARPSyndicate/cvemon
CVE-2016-1000342 - https://github.com/Anonymous-Phunter/PHunter
CVE-2016-1000342 - https://github.com/CGCL-codes/PHunter
CVE-2016-1000342 - https://github.com/IkerSaint/VULNAPP-vulnerable-app
+CVE-2016-1000342 - https://github.com/LibHunter/LibHunter
CVE-2016-1000342 - https://github.com/pctF/vulnerable-app
CVE-2016-1000343 - https://github.com/ARPSyndicate/cvemon
CVE-2016-1000343 - https://github.com/Anonymous-Phunter/PHunter
CVE-2016-1000343 - https://github.com/CGCL-codes/PHunter
CVE-2016-1000343 - https://github.com/CyberSource/cybersource-sdk-java
CVE-2016-1000343 - https://github.com/IkerSaint/VULNAPP-vulnerable-app
+CVE-2016-1000343 - https://github.com/LibHunter/LibHunter
CVE-2016-1000343 - https://github.com/pctF/vulnerable-app
CVE-2016-1000344 - https://github.com/ARPSyndicate/cvemon
CVE-2016-1000344 - https://github.com/Anonymous-Phunter/PHunter
CVE-2016-1000344 - https://github.com/CGCL-codes/PHunter
CVE-2016-1000344 - https://github.com/IkerSaint/VULNAPP-vulnerable-app
+CVE-2016-1000344 - https://github.com/LibHunter/LibHunter
CVE-2016-1000344 - https://github.com/pctF/vulnerable-app
CVE-2016-1000345 - https://github.com/ARPSyndicate/cvemon
CVE-2016-1000345 - https://github.com/Anonymous-Phunter/PHunter
CVE-2016-1000345 - https://github.com/CGCL-codes/PHunter
CVE-2016-1000345 - https://github.com/IkerSaint/VULNAPP-vulnerable-app
+CVE-2016-1000345 - https://github.com/LibHunter/LibHunter
CVE-2016-1000345 - https://github.com/pctF/vulnerable-app
CVE-2016-1000346 - https://github.com/ARPSyndicate/cvemon
CVE-2016-1000346 - https://github.com/Anonymous-Phunter/PHunter
CVE-2016-1000346 - https://github.com/CGCL-codes/PHunter
CVE-2016-1000346 - https://github.com/IkerSaint/VULNAPP-vulnerable-app
+CVE-2016-1000346 - https://github.com/LibHunter/LibHunter
CVE-2016-1000346 - https://github.com/pctF/vulnerable-app
CVE-2016-1000352 - https://github.com/ARPSyndicate/cvemon
CVE-2016-1000352 - https://github.com/Anonymous-Phunter/PHunter
CVE-2016-1000352 - https://github.com/CGCL-codes/PHunter
CVE-2016-1000352 - https://github.com/IkerSaint/VULNAPP-vulnerable-app
+CVE-2016-1000352 - https://github.com/LibHunter/LibHunter
CVE-2016-1000352 - https://github.com/pctF/vulnerable-app
CVE-2016-10005 - https://github.com/ARPSyndicate/cvemon
CVE-2016-10006 - https://github.com/ARPSyndicate/cvemon
@@ -21175,6 +21335,7 @@ CVE-2016-1002 - https://github.com/Live-Hack-CVE/CVE-2016-1002
CVE-2016-1002 - https://github.com/Live-Hack-CVE/CVE-2016-1005
CVE-2016-10027 - https://github.com/Anonymous-Phunter/PHunter
CVE-2016-10027 - https://github.com/CGCL-codes/PHunter
+CVE-2016-10027 - https://github.com/LibHunter/LibHunter
CVE-2016-10027 - https://github.com/tintinweb/striptls
CVE-2016-10028 - https://github.com/ARPSyndicate/cvemon
CVE-2016-1003 - https://github.com/ARPSyndicate/cvemon
@@ -21356,6 +21517,7 @@ CVE-2016-10033 - https://github.com/sccontroltotal/phpmailer
CVE-2016-10033 - https://github.com/sliani/PHPMailer-File-Attachments-FTP-to-Mail
CVE-2016-10033 - https://github.com/superfish9/pt
CVE-2016-10033 - https://github.com/supreethsk/rental
+CVE-2016-10033 - https://github.com/sweta-web/Online-Registration-System
CVE-2016-10033 - https://github.com/trganda/dockerv
CVE-2016-10033 - https://github.com/tvirus-01/PHP_mail
CVE-2016-10033 - https://github.com/vaartjesd/test
@@ -21505,6 +21667,7 @@ CVE-2016-10045 - https://github.com/sashasimulik/integration-1
CVE-2016-10045 - https://github.com/sccontroltotal/phpmailer
CVE-2016-10045 - https://github.com/sliani/PHPMailer-File-Attachments-FTP-to-Mail
CVE-2016-10045 - https://github.com/supreethsk/rental
+CVE-2016-10045 - https://github.com/sweta-web/Online-Registration-System
CVE-2016-10045 - https://github.com/tvirus-01/PHP_mail
CVE-2016-10045 - https://github.com/vaartjesd/test
CVE-2016-10045 - https://github.com/vatann07/BloodConnect
@@ -21586,6 +21749,7 @@ CVE-2016-10134 - https://github.com/1N3/Exploits
CVE-2016-10134 - https://github.com/ARPSyndicate/cvemon
CVE-2016-10134 - https://github.com/ARPSyndicate/kenzer-templates
CVE-2016-10134 - https://github.com/Awrrays/FrameVul
+CVE-2016-10134 - https://github.com/CLincat/vulcat
CVE-2016-10134 - https://github.com/HimmelAward/Goby_POC
CVE-2016-10134 - https://github.com/SexyBeast233/SecBooks
CVE-2016-10134 - https://github.com/TesterCC/exp_poc_library
@@ -21779,6 +21943,7 @@ CVE-2016-10277 - https://github.com/lnick2023/nicenice
CVE-2016-10277 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2016-10277 - https://github.com/qazbnm456/awesome-cve-poc
CVE-2016-10277 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2016-10277 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2016-10277 - https://github.com/xairy/linux-kernel-exploitation
CVE-2016-10277 - https://github.com/xbl3/awesome-cve-poc_qazbnm456
CVE-2016-1028 - https://github.com/Live-Hack-CVE/CVE-2016-1025
@@ -22220,6 +22385,7 @@ CVE-2016-1247 - https://github.com/ZeusBanda/Linux_Priv-Esc_Cheatsheet
CVE-2016-1247 - https://github.com/hungslab/awd-tools
CVE-2016-1247 - https://github.com/lukeber4/usn-search
CVE-2016-1247 - https://github.com/notnue/Linux-Privilege-Escalation
+CVE-2016-1247 - https://github.com/redcountryroad/OSCP-shortsheet
CVE-2016-1247 - https://github.com/superfish9/pt
CVE-2016-1247 - https://github.com/txuswashere/Pentesting-Linux
CVE-2016-1247 - https://github.com/woods-sega/woodswiki
@@ -22385,6 +22551,7 @@ CVE-2016-1583 - https://github.com/knd06/linux-kernel-exploitation
CVE-2016-1583 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2016-1583 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2016-1583 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2016-1583 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2016-1583 - https://github.com/xairy/linux-kernel-exploitation
CVE-2016-1585 - https://github.com/adegoodyer/kubernetes-admin-toolkit
CVE-2016-1585 - https://github.com/aws-samples/amazon-ecr-continuous-scan
@@ -22738,6 +22905,8 @@ CVE-2016-2003 - https://github.com/klausware/Java-Deserialization-Cheat-Sheet
CVE-2016-2003 - https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
CVE-2016-2004 - https://github.com/ARPSyndicate/cvemon
CVE-2016-2004 - https://github.com/ARPSyndicate/kenzer-templates
+CVE-2016-2004 - https://github.com/CVEDB/awesome-cve-repo
+CVE-2016-2004 - https://github.com/marcocarolasec/CVE-2016-2004-Exploit
CVE-2016-2009 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs
CVE-2016-2017 - https://github.com/ARPSyndicate/cvemon
CVE-2016-2031 - https://github.com/ARPSyndicate/cvemon
@@ -22757,6 +22926,7 @@ CVE-2016-2059 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2016-2059 - https://github.com/knd06/linux-kernel-exploitation
CVE-2016-2059 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2016-2059 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2016-2059 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2016-2059 - https://github.com/xairy/linux-kernel-exploitation
CVE-2016-2061 - https://github.com/thdusdl1219/CVE-Study
CVE-2016-2062 - https://github.com/thdusdl1219/CVE-Study
@@ -22901,6 +23071,7 @@ CVE-2016-2175 - https://github.com/0xCyberY/CVE-T4PDF
CVE-2016-2175 - https://github.com/ARPSyndicate/cvemon
CVE-2016-2175 - https://github.com/Anonymous-Phunter/PHunter
CVE-2016-2175 - https://github.com/CGCL-codes/PHunter
+CVE-2016-2175 - https://github.com/LibHunter/LibHunter
CVE-2016-2176 - https://github.com/ARPSyndicate/cvemon
CVE-2016-2176 - https://github.com/RClueX/Hackerone-Reports
CVE-2016-2176 - https://github.com/chnzzh/OpenSSL-CVE-lib
@@ -22948,6 +23119,7 @@ CVE-2016-2183 - https://github.com/alexgro1982/devops-netology
CVE-2016-2183 - https://github.com/aous-al-salek/crypto
CVE-2016-2183 - https://github.com/biswajitde/dsm_ips
CVE-2016-2183 - https://github.com/bysart/devops-netology
+CVE-2016-2183 - https://github.com/catsploit/catsploit
CVE-2016-2183 - https://github.com/dmitrii1312/03-sysadmin-09
CVE-2016-2183 - https://github.com/gabrieljcs/ips-assessment-reports
CVE-2016-2183 - https://github.com/geon071/netolofy_12
@@ -23066,6 +23238,7 @@ CVE-2016-2324 - https://github.com/ARPSyndicate/cvemon
CVE-2016-2331 - https://github.com/ivision-research/disclosures
CVE-2016-2332 - https://github.com/ivision-research/disclosures
CVE-2016-2333 - https://github.com/ivision-research/disclosures
+CVE-2016-2334 - https://github.com/ch1hyun/fuzzing-class
CVE-2016-2334 - https://github.com/icewall/CVE-2016-2334
CVE-2016-2334 - https://github.com/integeruser/on-pwning
CVE-2016-2334 - https://github.com/litneet64/containerized-bomb-disposal
@@ -23087,6 +23260,7 @@ CVE-2016-2384 - https://github.com/CKmaenn/kernel-exploits
CVE-2016-2384 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2016-2384 - https://github.com/Feng4/linux-kernel-exploits
CVE-2016-2384 - https://github.com/HackOvert/awesome-bugs
+CVE-2016-2384 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2016-2384 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2016-2384 - https://github.com/Micr067/linux-kernel-exploits
CVE-2016-2384 - https://github.com/QChiLan/linux-exp
@@ -23129,6 +23303,7 @@ CVE-2016-2384 - https://github.com/rakjong/LinuxElevation
CVE-2016-2384 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2016-2384 - https://github.com/spencerdodd/kernelpop
CVE-2016-2384 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2016-2384 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2016-2384 - https://github.com/xairy/kernel-exploits
CVE-2016-2384 - https://github.com/xairy/linux-kernel-exploitation
CVE-2016-2384 - https://github.com/xbl3/awesome-cve-poc_qazbnm456
@@ -23189,6 +23364,7 @@ CVE-2016-2411 - https://github.com/knd06/linux-kernel-exploitation
CVE-2016-2411 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2016-2411 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2016-2411 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2016-2411 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2016-2411 - https://github.com/xairy/linux-kernel-exploitation
CVE-2016-2428 - https://github.com/ARPSyndicate/cvemon
CVE-2016-2431 - https://github.com/ABCIncs/personal-security-checklist
@@ -23255,6 +23431,7 @@ CVE-2016-2434 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2016-2434 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2016-2434 - https://github.com/tangsilian/android-vuln
CVE-2016-2434 - https://github.com/weeka10/-hktalent-TOP
+CVE-2016-2434 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2016-2434 - https://github.com/xairy/linux-kernel-exploitation
CVE-2016-2435 - https://github.com/ARPSyndicate/cvemon
CVE-2016-2435 - https://github.com/R0B1NL1N/linux-kernel-exploitation
@@ -23271,6 +23448,7 @@ CVE-2016-2435 - https://github.com/knd06/linux-kernel-exploitation
CVE-2016-2435 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2016-2435 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2016-2435 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2016-2435 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2016-2435 - https://github.com/xairy/linux-kernel-exploitation
CVE-2016-2443 - https://github.com/tangsilian/android-vuln
CVE-2016-2461 - https://github.com/ARPSyndicate/cvemon
@@ -23292,6 +23470,7 @@ CVE-2016-2475 - https://github.com/knd06/linux-kernel-exploitation
CVE-2016-2475 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2016-2475 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2016-2475 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2016-2475 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2016-2475 - https://github.com/xairy/linux-kernel-exploitation
CVE-2016-2503 - https://github.com/ARPSyndicate/cvemon
CVE-2016-2503 - https://github.com/kdn111/linux-kernel-exploitation
@@ -23304,6 +23483,7 @@ CVE-2016-2503 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2016-2503 - https://github.com/knd06/linux-kernel-exploitation
CVE-2016-2503 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2016-2503 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2016-2503 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2016-2503 - https://github.com/xairy/linux-kernel-exploitation
CVE-2016-2510 - https://github.com/AdeliaNitzsche/Java-Deserialization-Cheat-Sheet
CVE-2016-2510 - https://github.com/BrittanyKuhn/javascript-tutorial
@@ -23413,6 +23593,7 @@ CVE-2016-2781 - https://github.com/gp47/xef-scan-ex02
CVE-2016-2781 - https://github.com/hartwork/antijack
CVE-2016-2781 - https://github.com/khulnasoft-lab/vulnlist
CVE-2016-2781 - https://github.com/khulnasoft-labs/griffon
+CVE-2016-2781 - https://github.com/m-pasima/CI-CD-Security-image-scan
CVE-2016-2781 - https://github.com/metapull/attackfinder
CVE-2016-2781 - https://github.com/nedenwalker/spring-boot-app-using-gradle
CVE-2016-2781 - https://github.com/nedenwalker/spring-boot-app-with-log4j-vuln
@@ -24112,6 +24293,7 @@ CVE-2016-3720 - https://github.com/0ang3el/Unsafe-JAX-RS-Burp
CVE-2016-3720 - https://github.com/ARPSyndicate/cvemon
CVE-2016-3720 - https://github.com/Anonymous-Phunter/PHunter
CVE-2016-3720 - https://github.com/CGCL-codes/PHunter
+CVE-2016-3720 - https://github.com/LibHunter/LibHunter
CVE-2016-3720 - https://github.com/argon-gh-demo/clojure-sample
CVE-2016-3720 - https://github.com/developer3000S/PoC-in-GitHub
CVE-2016-3720 - https://github.com/gitrobtest/Java-Security
@@ -24140,6 +24322,7 @@ CVE-2016-3857 - https://github.com/knd06/linux-kernel-exploitation
CVE-2016-3857 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2016-3857 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2016-3857 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2016-3857 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2016-3857 - https://github.com/xairy/linux-kernel-exploitation
CVE-2016-3861 - https://github.com/ARPSyndicate/cvemon
CVE-2016-3861 - https://github.com/dropk1ck/CVE-2016-3861
@@ -24172,6 +24355,7 @@ CVE-2016-3873 - https://github.com/knd06/linux-kernel-exploitation
CVE-2016-3873 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2016-3873 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2016-3873 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2016-3873 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2016-3873 - https://github.com/xairy/linux-kernel-exploitation
CVE-2016-3901 - https://github.com/jiayy/android_vuln_poc-exp
CVE-2016-3906 - https://github.com/jiayy/android_vuln_poc-exp
@@ -25497,6 +25681,7 @@ CVE-2016-4544 - https://github.com/mrhacker51/FileUploadScanner
CVE-2016-4544 - https://github.com/navervn/modified_uploadscanner
CVE-2016-4544 - https://github.com/tagua-vm/tagua-vm
CVE-2016-4557 - https://github.com/ARPSyndicate/cvemon
+CVE-2016-4557 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2016-4557 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2016-4557 - https://github.com/chreniuc/CTF
CVE-2016-4557 - https://github.com/dylandreimerink/gobpfld
@@ -25700,6 +25885,7 @@ CVE-2016-4780 - https://github.com/sweetchipsw/vulnerability
CVE-2016-4800 - https://github.com/ARPSyndicate/cvemon
CVE-2016-4800 - https://github.com/Anonymous-Phunter/PHunter
CVE-2016-4800 - https://github.com/CGCL-codes/PHunter
+CVE-2016-4800 - https://github.com/LibHunter/LibHunter
CVE-2016-4800 - https://github.com/saidramirezh/Elvis-DAM
CVE-2016-4802 - https://github.com/Ananya-0306/vuln-finder
CVE-2016-4802 - https://github.com/cve-search/git-vuln-finder
@@ -25721,6 +25907,7 @@ CVE-2016-4952 - https://github.com/qianfei11/QEMU-CVES
CVE-2016-4970 - https://github.com/ARPSyndicate/cvemon
CVE-2016-4970 - https://github.com/Anonymous-Phunter/PHunter
CVE-2016-4970 - https://github.com/CGCL-codes/PHunter
+CVE-2016-4970 - https://github.com/LibHunter/LibHunter
CVE-2016-4970 - https://github.com/chnzzh/OpenSSL-CVE-lib
CVE-2016-4970 - https://github.com/eliasgranderubio/4depcheck
CVE-2016-4971 - https://github.com/ARPSyndicate/cvemon
@@ -25796,6 +25983,8 @@ CVE-2016-4979 - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrou
CVE-2016-4979 - https://github.com/vshaliii/DC-3-Vulnhub-Walkthrough
CVE-2016-4984 - https://github.com/ARPSyndicate/cvemon
CVE-2016-4986 - https://github.com/HotDB-Community/HotDB-Engine
+CVE-2016-4994 - https://github.com/ch1hyun/fuzzing-class
+CVE-2016-4997 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2016-4997 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2016-4999 - https://github.com/shanika04/dashbuilder
CVE-2016-5003 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs
@@ -25875,6 +26064,7 @@ CVE-2016-5184 - https://github.com/0xCyberY/CVE-T4PDF
CVE-2016-5184 - https://github.com/ARPSyndicate/cvemon
CVE-2016-5186 - https://github.com/0xCyberY/CVE-T4PDF
CVE-2016-5186 - https://github.com/ARPSyndicate/cvemon
+CVE-2016-5195 - https://github.com/0xMarcio/cve
CVE-2016-5195 - https://github.com/0xS3rgI0/OSCP
CVE-2016-5195 - https://github.com/0xStrygwyr/OSCP-Guide
CVE-2016-5195 - https://github.com/0xZipp0/OSCP
@@ -25935,6 +26125,7 @@ CVE-2016-5195 - https://github.com/GhostScreaming/os-experiment-4
CVE-2016-5195 - https://github.com/GhostTroops/TOP
CVE-2016-5195 - https://github.com/GiorgosXou/Our-Xiaomi-Redmi-5A-riva-debloating-list
CVE-2016-5195 - https://github.com/Greetdawn/CVE-2022-0847-DirtyPipe
+CVE-2016-5195 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2016-5195 - https://github.com/Hellnino18/ansible-dirty-cow
CVE-2016-5195 - https://github.com/Hellnino18/ansible-dirty-cow-2
CVE-2016-5195 - https://github.com/Hetti/PoC-Exploitchain-GS-VBox-DirtyCow-
@@ -26250,6 +26441,7 @@ CVE-2016-5195 - https://github.com/weeka10/-hktalent-TOP
CVE-2016-5195 - https://github.com/whackmanic/OSCP_Found
CVE-2016-5195 - https://github.com/whitephone/farm-root
CVE-2016-5195 - https://github.com/whu-enjoy/CVE-2016-5195
+CVE-2016-5195 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2016-5195 - https://github.com/www-glasswall-nl/UT-DirtyCow
CVE-2016-5195 - https://github.com/x90hack/vulnerabilty_lab
CVE-2016-5195 - https://github.com/xXxhagenxXx/OSCP_Cheat_sheet
@@ -26365,6 +26557,7 @@ CVE-2016-5340 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2016-5340 - https://github.com/knd06/linux-kernel-exploitation
CVE-2016-5340 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2016-5340 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2016-5340 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2016-5340 - https://github.com/xairy/linux-kernel-exploitation
CVE-2016-5342 - https://github.com/SeaJae/exploitPlayground
CVE-2016-5342 - https://github.com/externalist/exploit_playground
@@ -26581,6 +26774,7 @@ CVE-2016-5420 - https://github.com/ARPSyndicate/cvemon
CVE-2016-5423 - https://github.com/digoal/blog
CVE-2016-5425 - https://github.com/ARPSyndicate/cvemon
CVE-2016-5425 - https://github.com/starnightcyber/vul-info-collect
+CVE-2016-5425 - https://github.com/versio-io/product-lifecycle-security-api
CVE-2016-5431 - https://github.com/ARPSyndicate/cvemon
CVE-2016-5431 - https://github.com/Nucleware/powershell-jwt
CVE-2016-5431 - https://github.com/d3ck9/HTB-Under-Construction
@@ -26821,6 +27015,7 @@ CVE-2016-6187 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2016-6187 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2016-6187 - https://github.com/vnik5287/cve-2016-6187-poc
CVE-2016-6187 - https://github.com/whiteHat001/Kernel-Security
+CVE-2016-6187 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2016-6187 - https://github.com/xairy/linux-kernel-exploitation
CVE-2016-6189 - https://github.com/Live-Hack-CVE/CVE-2016-6189
CVE-2016-6195 - https://github.com/ARPSyndicate/cvemon
@@ -26994,6 +27189,7 @@ CVE-2016-6318 - https://github.com/fokypoky/places-list
CVE-2016-6321 - https://github.com/tomwillfixit/alpine-cvecheck
CVE-2016-6323 - https://github.com/ARPSyndicate/cvemon
CVE-2016-6325 - https://github.com/ARPSyndicate/cvemon
+CVE-2016-6325 - https://github.com/versio-io/product-lifecycle-security-api
CVE-2016-6327 - https://github.com/thdusdl1219/CVE-Study
CVE-2016-6328 - https://github.com/TinyNiko/android_bulletin_notes
CVE-2016-6329 - https://github.com/ARPSyndicate/cvemon
@@ -27008,6 +27204,7 @@ CVE-2016-6329 - https://github.com/WiktorMysz/devops-netology
CVE-2016-6329 - https://github.com/alexandrburyakov/Rep2
CVE-2016-6329 - https://github.com/alexgro1982/devops-netology
CVE-2016-6329 - https://github.com/bysart/devops-netology
+CVE-2016-6329 - https://github.com/catsploit/catsploit
CVE-2016-6329 - https://github.com/dmitrii1312/03-sysadmin-09
CVE-2016-6329 - https://github.com/geon071/netolofy_12
CVE-2016-6329 - https://github.com/ilya-starchikov/devops-netology
@@ -27219,6 +27416,7 @@ CVE-2016-6787 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2016-6787 - https://github.com/qazbnm456/awesome-cve-poc
CVE-2016-6787 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2016-6787 - https://github.com/whiteHat001/Kernel-Security
+CVE-2016-6787 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2016-6787 - https://github.com/xairy/linux-kernel-exploitation
CVE-2016-6787 - https://github.com/xbl3/awesome-cve-poc_qazbnm456
CVE-2016-6789 - https://github.com/thdusdl1219/CVE-Study
@@ -27235,6 +27433,7 @@ CVE-2016-6797 - https://github.com/ARPSyndicate/cvemon
CVE-2016-6798 - https://github.com/tafamace/CVE-2016-6798
CVE-2016-6801 - https://github.com/Anonymous-Phunter/PHunter
CVE-2016-6801 - https://github.com/CGCL-codes/PHunter
+CVE-2016-6801 - https://github.com/LibHunter/LibHunter
CVE-2016-6801 - https://github.com/TSNGL21/CVE-2016-6801
CVE-2016-6802 - https://github.com/ARPSyndicate/cvemon
CVE-2016-6802 - https://github.com/HackJava/HackShiro
@@ -27262,6 +27461,7 @@ CVE-2016-6811 - https://github.com/yahoo/cubed
CVE-2016-6814 - https://github.com/ARPSyndicate/cvemon
CVE-2016-6814 - https://github.com/Anonymous-Phunter/PHunter
CVE-2016-6814 - https://github.com/CGCL-codes/PHunter
+CVE-2016-6814 - https://github.com/LibHunter/LibHunter
CVE-2016-6814 - https://github.com/OWASP/www-project-ide-vulscanner
CVE-2016-6814 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs
CVE-2016-6814 - https://github.com/ilmari666/cybsec
@@ -27572,6 +27772,7 @@ CVE-2016-7117 - https://github.com/knd06/linux-kernel-exploitation
CVE-2016-7117 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2016-7117 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2016-7117 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2016-7117 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2016-7117 - https://github.com/xairy/linux-kernel-exploitation
CVE-2016-7119 - https://github.com/ARPSyndicate/cvemon
CVE-2016-7124 - https://github.com/ARPSyndicate/cvemon
@@ -28173,6 +28374,7 @@ CVE-2016-8453 - https://github.com/knd06/linux-kernel-exploitation
CVE-2016-8453 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2016-8453 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2016-8453 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2016-8453 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2016-8453 - https://github.com/xairy/linux-kernel-exploitation
CVE-2016-8454 - https://github.com/thdusdl1219/CVE-Study
CVE-2016-8455 - https://github.com/thdusdl1219/CVE-Study
@@ -28326,6 +28528,7 @@ CVE-2016-8633 - https://github.com/knd06/linux-kernel-exploitation
CVE-2016-8633 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2016-8633 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2016-8633 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2016-8633 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2016-8633 - https://github.com/xairy/linux-kernel-exploitation
CVE-2016-8635 - https://github.com/getupcloud/openshift-clair-controller
CVE-2016-8636 - https://github.com/ARPSyndicate/cvemon
@@ -28341,6 +28544,7 @@ CVE-2016-8655 - https://github.com/84KaliPleXon3/linux-exploit-suggester
CVE-2016-8655 - https://github.com/ARPSyndicate/cvemon
CVE-2016-8655 - https://github.com/AabyssZG/AWD-Guide
CVE-2016-8655 - https://github.com/Aneesh-Satla/Linux-Kernel-Exploitation-Suggester
+CVE-2016-8655 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2016-8655 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2016-8655 - https://github.com/KosukeShimofuji/CVE-2016-8655
CVE-2016-8655 - https://github.com/LakshmiDesai/CVE-2016-8655
@@ -28388,6 +28592,7 @@ CVE-2016-8655 - https://github.com/scarvell/cve-2016-8655
CVE-2016-8655 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2016-8655 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2016-8655 - https://github.com/stefanocutelle/linux-exploit-suggester
+CVE-2016-8655 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2016-8655 - https://github.com/xairy/linux-kernel-exploitation
CVE-2016-8655 - https://github.com/xyongcn/exploit
CVE-2016-8656 - https://github.com/ARPSyndicate/cvemon
@@ -28793,6 +28998,7 @@ CVE-2016-9276 - https://github.com/mrash/afl-cve
CVE-2016-9296 - https://github.com/andir/nixos-issue-db-example
CVE-2016-9296 - https://github.com/yangke/7zip-null-pointer-dereference
CVE-2016-9297 - https://github.com/RClueX/Hackerone-Reports
+CVE-2016-9297 - https://github.com/ch1hyun/fuzzing-class
CVE-2016-9297 - https://github.com/geeknik/cve-fuzzing-poc
CVE-2016-9297 - https://github.com/imhunterand/hackerone-publicy-disclosed
CVE-2016-9299 - https://github.com/ARPSyndicate/cvemon
@@ -28993,6 +29199,7 @@ CVE-2016-9793 - https://github.com/C0dak/local-root-exploit-
CVE-2016-9793 - https://github.com/CKmaenn/kernel-exploits
CVE-2016-9793 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2016-9793 - https://github.com/Feng4/linux-kernel-exploits
+CVE-2016-9793 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2016-9793 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2016-9793 - https://github.com/Micr067/linux-kernel-exploits
CVE-2016-9793 - https://github.com/QChiLan/linux-exp
@@ -29779,6 +29986,7 @@ CVE-2017-0146 - https://github.com/cb4cb4/EternalBlue-EK-Auto-Mode
CVE-2017-0146 - https://github.com/cb4cb4/EternalBlue-EK-Manual-Mode
CVE-2017-0146 - https://github.com/ceskillets/DCV-Predefined-Log-Filter-of-Specific-CVE-of-EternalBlue-and-BlueKeep-with-Auto-Tag-
CVE-2017-0146 - https://github.com/chaao195/EBEKv2.0
+CVE-2017-0146 - https://github.com/enomothem/PenTestNote
CVE-2017-0146 - https://github.com/ericjiang97/SecScripts
CVE-2017-0146 - https://github.com/geeksniper/active-directory-pentest
CVE-2017-0146 - https://github.com/ginapalomo/ScanAll
@@ -30430,6 +30638,7 @@ CVE-2017-0403 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2017-0403 - https://github.com/knd06/linux-kernel-exploitation
CVE-2017-0403 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2017-0403 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2017-0403 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2017-0403 - https://github.com/xairy/linux-kernel-exploitation
CVE-2017-0404 - https://github.com/ThomasKing2014/android-Vulnerability-PoC
CVE-2017-0411 - https://github.com/lulusudoku/PoC
@@ -30454,6 +30663,7 @@ CVE-2017-0437 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2017-0437 - https://github.com/knd06/linux-kernel-exploitation
CVE-2017-0437 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2017-0437 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2017-0437 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2017-0437 - https://github.com/xairy/linux-kernel-exploitation
CVE-2017-0438 - https://github.com/flankersky/android_wifi_pocs
CVE-2017-0439 - https://github.com/flankersky/android_wifi_pocs
@@ -30554,6 +30764,7 @@ CVE-2017-0569 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2017-0569 - https://github.com/knd06/linux-kernel-exploitation
CVE-2017-0569 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2017-0569 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2017-0569 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2017-0569 - https://github.com/xairy/linux-kernel-exploitation
CVE-2017-0570 - https://github.com/thdusdl1219/CVE-Study
CVE-2017-0571 - https://github.com/thdusdl1219/CVE-Study
@@ -30970,6 +31181,7 @@ CVE-2017-1000112 - https://github.com/spencerdodd/kernelpop
CVE-2017-1000112 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2017-1000112 - https://github.com/stefanocutelle/linux-exploit-suggester
CVE-2017-1000112 - https://github.com/teamssix/container-escape-check
+CVE-2017-1000112 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2017-1000112 - https://github.com/xairy/kernel-exploits
CVE-2017-1000112 - https://github.com/xairy/linux-kernel-exploitation
CVE-2017-1000112 - https://github.com/xbl3/awesome-cve-poc_qazbnm456
@@ -31041,6 +31253,7 @@ CVE-2017-1000207 - https://github.com/ARPSyndicate/cvemon
CVE-2017-1000208 - https://github.com/ARPSyndicate/cvemon
CVE-2017-1000209 - https://github.com/Anonymous-Phunter/PHunter
CVE-2017-1000209 - https://github.com/CGCL-codes/PHunter
+CVE-2017-1000209 - https://github.com/LibHunter/LibHunter
CVE-2017-1000219 - https://github.com/ossf-cve-benchmark/CVE-2017-1000219
CVE-2017-1000227 - https://github.com/ARPSyndicate/cvemon
CVE-2017-1000228 - https://github.com/ARPSyndicate/cvemon
@@ -31095,10 +31308,12 @@ CVE-2017-1000251 - https://github.com/qazbnm456/awesome-cve-poc
CVE-2017-1000251 - https://github.com/sgxgsx/BlueToolkit
CVE-2017-1000251 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2017-1000251 - https://github.com/tlatkdgus1/blueborne-CVE-2017-1000251
+CVE-2017-1000251 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2017-1000251 - https://github.com/xairy/linux-kernel-exploitation
CVE-2017-1000251 - https://github.com/xbl3/awesome-cve-poc_qazbnm456
CVE-2017-1000252 - https://github.com/ARPSyndicate/cvemon
CVE-2017-1000253 - https://github.com/ARPSyndicate/cvemon
+CVE-2017-1000253 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2017-1000253 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2017-1000253 - https://github.com/RicterZ/PIE-Stack-Clash-CVE-2017-1000253
CVE-2017-1000253 - https://github.com/kaosagnt/ansible-everyday
@@ -31179,6 +31394,7 @@ CVE-2017-1000363 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2017-1000363 - https://github.com/knd06/linux-kernel-exploitation
CVE-2017-1000363 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2017-1000363 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2017-1000363 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2017-1000363 - https://github.com/xairy/linux-kernel-exploitation
CVE-2017-1000364 - https://github.com/ARPSyndicate/cvemon
CVE-2017-1000364 - https://github.com/lnick2023/nicenice
@@ -31323,6 +31539,7 @@ CVE-2017-1000380 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2017-1000380 - https://github.com/knd06/linux-kernel-exploitation
CVE-2017-1000380 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2017-1000380 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2017-1000380 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2017-1000380 - https://github.com/xairy/linux-kernel-exploitation
CVE-2017-1000382 - https://github.com/ARPSyndicate/cvemon
CVE-2017-1000394 - https://github.com/speedyfriend67/Experiments
@@ -31393,6 +31610,7 @@ CVE-2017-1000493 - https://github.com/ARPSyndicate/cvemon
CVE-2017-1000494 - https://github.com/panctf/Router
CVE-2017-1000498 - https://github.com/Anonymous-Phunter/PHunter
CVE-2017-1000498 - https://github.com/CGCL-codes/PHunter
+CVE-2017-1000498 - https://github.com/LibHunter/LibHunter
CVE-2017-1000499 - https://github.com/ARPSyndicate/cvemon
CVE-2017-1000499 - https://github.com/Villaquiranm/5MMISSI-CVE-2017-1000499
CVE-2017-1000500 - https://github.com/ARPSyndicate/cvemon
@@ -31802,6 +32020,7 @@ CVE-2017-10661 - https://github.com/ostrichxyz7/kexps
CVE-2017-10661 - https://github.com/qazbnm456/awesome-cve-poc
CVE-2017-10661 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2017-10661 - https://github.com/tangsilian/android-vuln
+CVE-2017-10661 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2017-10661 - https://github.com/xairy/linux-kernel-exploitation
CVE-2017-10661 - https://github.com/xbl3/awesome-cve-poc_qazbnm456
CVE-2017-10662 - https://github.com/thdusdl1219/CVE-Study
@@ -31940,6 +32159,7 @@ CVE-2017-11176 - https://github.com/CERTCC/Linux-Kernel-Analysis-Environment
CVE-2017-11176 - https://github.com/DoubleMice/cve-2017-11176
CVE-2017-11176 - https://github.com/Flerov/WindowsExploitDev
CVE-2017-11176 - https://github.com/Gobinath-B/Exploit-Developement
+CVE-2017-11176 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2017-11176 - https://github.com/HckEX/CVE-2017-11176
CVE-2017-11176 - https://github.com/IdanBanani/Linux-Kernel-VR-Exploitation
CVE-2017-11176 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
@@ -31972,6 +32192,7 @@ CVE-2017-11176 - https://github.com/paulveillard/cybersecurity-exploit-developme
CVE-2017-11176 - https://github.com/pjlantz/optee-qemu
CVE-2017-11176 - https://github.com/prince-stark/Exploit-Developement
CVE-2017-11176 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2017-11176 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2017-11176 - https://github.com/xairy/linux-kernel-exploitation
CVE-2017-11178 - https://github.com/ARPSyndicate/cvemon
CVE-2017-11178 - https://github.com/LoRexxar/LoRexxar
@@ -33572,6 +33793,7 @@ CVE-2017-13010 - https://github.com/RClueX/Hackerone-Reports
CVE-2017-13010 - https://github.com/geeknik/cve-fuzzing-poc
CVE-2017-13010 - https://github.com/imhunterand/hackerone-publicy-disclosed
CVE-2017-13019 - https://github.com/ARPSyndicate/cvemon
+CVE-2017-13028 - https://github.com/ch1hyun/fuzzing-class
CVE-2017-13028 - https://github.com/paras98/AFL_Fuzzing
CVE-2017-13038 - https://github.com/ARPSyndicate/cvemon
CVE-2017-13038 - https://github.com/RClueX/Hackerone-Reports
@@ -33663,6 +33885,7 @@ CVE-2017-13098 - https://github.com/ARPSyndicate/cvemon
CVE-2017-13098 - https://github.com/Anonymous-Phunter/PHunter
CVE-2017-13098 - https://github.com/CGCL-codes/PHunter
CVE-2017-13098 - https://github.com/IkerSaint/VULNAPP-vulnerable-app
+CVE-2017-13098 - https://github.com/LibHunter/LibHunter
CVE-2017-13098 - https://github.com/dotanuki-labs/android-oss-cves-research
CVE-2017-13098 - https://github.com/pctF/vulnerable-app
CVE-2017-13130 - https://github.com/itm4n/CVEs
@@ -33744,6 +33967,7 @@ CVE-2017-13306 - https://github.com/ARPSyndicate/cvemon
CVE-2017-13307 - https://github.com/ARPSyndicate/cvemon
CVE-2017-13309 - https://github.com/Anonymous-Phunter/PHunter
CVE-2017-13309 - https://github.com/CGCL-codes/PHunter
+CVE-2017-13309 - https://github.com/LibHunter/LibHunter
CVE-2017-13669 - https://github.com/ARPSyndicate/cvemon
CVE-2017-13669 - https://github.com/burpheart/NexusPHP_safe
CVE-2017-13672 - https://github.com/DavidBuchanan314/CVE-2017-13672
@@ -35075,6 +35299,7 @@ CVE-2017-16695 - https://github.com/chorankates/Help
CVE-2017-16695 - https://github.com/gameFace22/vulnmachine-walkthrough
CVE-2017-16695 - https://github.com/jondonas/linux-exploit-suggester-2
CVE-2017-16695 - https://github.com/ndk191/linux-kernel-exploitation
+CVE-2017-16695 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2017-16695 - https://github.com/xairy/linux-kernel-exploitation
CVE-2017-16709 - https://github.com/ARPSyndicate/cvemon
CVE-2017-16711 - https://github.com/andir/nixos-issue-db-example
@@ -35192,6 +35417,7 @@ CVE-2017-16932 - https://github.com/vincent-deng/veracode-container-security-fin
CVE-2017-16939 - https://github.com/ARPSyndicate/cvemon
CVE-2017-16939 - https://github.com/Al1ex/LinuxEelvation
CVE-2017-16939 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
+CVE-2017-16939 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2017-16939 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2017-16939 - https://github.com/Micr067/linux-kernel-exploits
CVE-2017-16939 - https://github.com/QChiLan/linux-exp
@@ -35244,6 +35470,7 @@ CVE-2017-16995 - https://github.com/DanielShmu/OSCP-Cheat-Sheet
CVE-2017-16995 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2017-16995 - https://github.com/Dk0n9/linux_exploit
CVE-2017-16995 - https://github.com/Getshell/LinuxTQ
+CVE-2017-16995 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2017-16995 - https://github.com/JMontRod/Pruebecita
CVE-2017-16995 - https://github.com/Jean-Francois-C/Boot2root-CTFs-Writeups
CVE-2017-16995 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
@@ -35337,6 +35564,7 @@ CVE-2017-16995 - https://github.com/thelostvoice/global-takeover
CVE-2017-16995 - https://github.com/thelostvoice/inept-us-military
CVE-2017-16995 - https://github.com/tninh27/Lab
CVE-2017-16995 - https://github.com/vnik5287/CVE-2017-16995
+CVE-2017-16995 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2017-16995 - https://github.com/xairy/linux-kernel-exploitation
CVE-2017-16995 - https://github.com/xbl3/awesome-cve-poc_qazbnm456
CVE-2017-16995 - https://github.com/xfinest/linux-kernel-exploits
@@ -35523,6 +35751,7 @@ CVE-2017-17485 - https://github.com/CrackerCat/myhktools
CVE-2017-17485 - https://github.com/Drun1baby/JavaSecurityLearning
CVE-2017-17485 - https://github.com/GhostTroops/myhktools
CVE-2017-17485 - https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet
+CVE-2017-17485 - https://github.com/LibHunter/LibHunter
CVE-2017-17485 - https://github.com/OWASP/www-project-ide-vulscanner
CVE-2017-17485 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs
CVE-2017-17485 - https://github.com/Pear1y/Vuln-Env
@@ -35933,6 +36162,7 @@ CVE-2017-18344 - https://github.com/lnick2023/nicenice
CVE-2017-18344 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2017-18344 - https://github.com/qazbnm456/awesome-cve-poc
CVE-2017-18344 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2017-18344 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2017-18344 - https://github.com/xairy/kernel-exploits
CVE-2017-18344 - https://github.com/xairy/linux-kernel-exploitation
CVE-2017-18344 - https://github.com/xbl3/awesome-cve-poc_qazbnm456
@@ -36390,6 +36620,7 @@ CVE-2017-2636 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2017-2636 - https://github.com/snorez/blog
CVE-2017-2636 - https://github.com/snorez/exploits
CVE-2017-2636 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2017-2636 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2017-2636 - https://github.com/xairy/linux-kernel-exploitation
CVE-2017-2636 - https://github.com/xbl3/awesome-cve-poc_qazbnm456
CVE-2017-2636 - https://github.com/xyongcn/exploit
@@ -36803,6 +37034,7 @@ CVE-2017-3506 - https://github.com/Kamiya767/CVE-2019-2725
CVE-2017-3506 - https://github.com/MacAsure/WL_Scan_GO
CVE-2017-3506 - https://github.com/Maskhe/javasec
CVE-2017-3506 - https://github.com/Micr067/CMS-Hunter
+CVE-2017-3506 - https://github.com/Ostorlab/KEV
CVE-2017-3506 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs
CVE-2017-3506 - https://github.com/ParrotSec-CN/ParrotSecCN_Community_QQbot
CVE-2017-3506 - https://github.com/SecWiki/CMS-Hunter
@@ -37250,6 +37482,7 @@ CVE-2017-5123 - https://github.com/ARPSyndicate/cvemon
CVE-2017-5123 - https://github.com/Al1ex/LinuxEelvation
CVE-2017-5123 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2017-5123 - https://github.com/FloatingGuy/CVE-2017-5123
+CVE-2017-5123 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2017-5123 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2017-5123 - https://github.com/Metarget/awesome-cloud-native-security
CVE-2017-5123 - https://github.com/Micr067/linux-kernel-exploits
@@ -37318,6 +37551,7 @@ CVE-2017-5123 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2017-5123 - https://github.com/teawater/CVE-2017-5123
CVE-2017-5123 - https://github.com/txuswashere/Privilege-Escalation
CVE-2017-5123 - https://github.com/whiteHat001/Kernel-Security
+CVE-2017-5123 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2017-5123 - https://github.com/xairy/linux-kernel-exploitation
CVE-2017-5123 - https://github.com/xbl3/awesome-cve-poc_qazbnm456
CVE-2017-5123 - https://github.com/xfinest/linux-kernel-exploits
@@ -37498,6 +37732,7 @@ CVE-2017-5223 - https://github.com/sashasimulik/integration-1
CVE-2017-5223 - https://github.com/sccontroltotal/phpmailer
CVE-2017-5223 - https://github.com/sliani/PHPMailer-File-Attachments-FTP-to-Mail
CVE-2017-5223 - https://github.com/supreethsk/rental
+CVE-2017-5223 - https://github.com/sweta-web/Online-Registration-System
CVE-2017-5223 - https://github.com/tvirus-01/PHP_mail
CVE-2017-5223 - https://github.com/vaartjesd/test
CVE-2017-5223 - https://github.com/vatann07/BloodConnect
@@ -38076,6 +38311,7 @@ CVE-2017-5645 - https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet
CVE-2017-5645 - https://github.com/HackJava/HackLog4j2
CVE-2017-5645 - https://github.com/HackJava/Log4j2
CVE-2017-5645 - https://github.com/HynekPetrak/log4shell-finder
+CVE-2017-5645 - https://github.com/LibHunter/LibHunter
CVE-2017-5645 - https://github.com/Marcelektro/Log4J-RCE-Implementation
CVE-2017-5645 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs
CVE-2017-5645 - https://github.com/SexyBeast233/SecBooks
@@ -38586,6 +38822,7 @@ CVE-2017-5924 - https://github.com/SZU-SE/UAF-Fuzzer-TestSuite
CVE-2017-5924 - https://github.com/wcventure/UAF-Fuzzer-TestSuite
CVE-2017-5929 - https://github.com/Anonymous-Phunter/PHunter
CVE-2017-5929 - https://github.com/CGCL-codes/PHunter
+CVE-2017-5929 - https://github.com/LibHunter/LibHunter
CVE-2017-5929 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs
CVE-2017-5929 - https://github.com/fergarrui/exploits
CVE-2017-5929 - https://github.com/hinat0y/Dataset1
@@ -38713,6 +38950,7 @@ CVE-2017-6074 - https://github.com/CKmaenn/kernel-exploits
CVE-2017-6074 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2017-6074 - https://github.com/Dk0n9/linux_exploit
CVE-2017-6074 - https://github.com/Feng4/linux-kernel-exploits
+CVE-2017-6074 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2017-6074 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2017-6074 - https://github.com/Metarget/metarget
CVE-2017-6074 - https://github.com/Micr067/linux-kernel-exploits
@@ -38770,6 +39008,7 @@ CVE-2017-6074 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2017-6074 - https://github.com/spencerdodd/kernelpop
CVE-2017-6074 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2017-6074 - https://github.com/toanthang1842002/CVE-2017-6074
+CVE-2017-6074 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2017-6074 - https://github.com/xairy/kernel-exploits
CVE-2017-6074 - https://github.com/xairy/linux-kernel-exploitation
CVE-2017-6074 - https://github.com/xbl3/awesome-cve-poc_qazbnm456
@@ -39251,6 +39490,7 @@ CVE-2017-7184 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2017-7184 - https://github.com/snorez/blog
CVE-2017-7184 - https://github.com/snorez/exploits
CVE-2017-7184 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2017-7184 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2017-7184 - https://github.com/xairy/linux-kernel-exploitation
CVE-2017-7184 - https://github.com/xyongcn/exploit
CVE-2017-7185 - https://github.com/ARPSyndicate/cvemon
@@ -39512,6 +39752,7 @@ CVE-2017-7308 - https://github.com/C0dak/local-root-exploit-
CVE-2017-7308 - https://github.com/CKmaenn/kernel-exploits
CVE-2017-7308 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2017-7308 - https://github.com/Feng4/linux-kernel-exploits
+CVE-2017-7308 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2017-7308 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2017-7308 - https://github.com/Mecyu/googlecontainers
CVE-2017-7308 - https://github.com/Metarget/metarget
@@ -39575,6 +39816,7 @@ CVE-2017-7308 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2017-7308 - https://github.com/spencerdodd/kernelpop
CVE-2017-7308 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2017-7308 - https://github.com/vusec/blindside
+CVE-2017-7308 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2017-7308 - https://github.com/xairy/kernel-exploits
CVE-2017-7308 - https://github.com/xairy/linux-kernel-exploitation
CVE-2017-7308 - https://github.com/xbl3/awesome-cve-poc_qazbnm456
@@ -40240,6 +40482,7 @@ CVE-2017-7616 - https://github.com/knd06/linux-kernel-exploitation
CVE-2017-7616 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2017-7616 - https://github.com/skbasava/Linux-Kernel-exploit
CVE-2017-7616 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2017-7616 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2017-7616 - https://github.com/xairy/linux-kernel-exploitation
CVE-2017-7618 - https://github.com/thdusdl1219/CVE-Study
CVE-2017-7620 - https://github.com/ARPSyndicate/cvemon
@@ -40262,10 +40505,12 @@ CVE-2017-7656 - https://github.com/ARPSyndicate/cvemon
CVE-2017-7656 - https://github.com/Anonymous-Phunter/PHunter
CVE-2017-7656 - https://github.com/CGCL-codes/PHunter
CVE-2017-7656 - https://github.com/DonnumS/inf226Inchat
+CVE-2017-7656 - https://github.com/LibHunter/LibHunter
CVE-2017-7657 - https://github.com/ARPSyndicate/cvemon
CVE-2017-7657 - https://github.com/Anonymous-Phunter/PHunter
CVE-2017-7657 - https://github.com/CGCL-codes/PHunter
CVE-2017-7657 - https://github.com/DonnumS/inf226Inchat
+CVE-2017-7657 - https://github.com/LibHunter/LibHunter
CVE-2017-7657 - https://github.com/yahoo/cubed
CVE-2017-7658 - https://github.com/ARPSyndicate/cvemon
CVE-2017-7658 - https://github.com/DonnumS/inf226Inchat
@@ -40454,6 +40699,7 @@ CVE-2017-7943 - https://github.com/ARPSyndicate/cvemon
CVE-2017-7957 - https://github.com/ARPSyndicate/cvemon
CVE-2017-7957 - https://github.com/Anonymous-Phunter/PHunter
CVE-2017-7957 - https://github.com/CGCL-codes/PHunter
+CVE-2017-7957 - https://github.com/LibHunter/LibHunter
CVE-2017-7957 - https://github.com/Whoopsunix/PPPVULNS
CVE-2017-7957 - https://github.com/dotanuki-labs/android-oss-cves-research
CVE-2017-7957 - https://github.com/lmarso-asapp/kotlin-unsecure
@@ -41136,6 +41382,7 @@ CVE-2017-8625 - https://github.com/Ashadowkhan/PENTESTINGBIBLE
CVE-2017-8625 - https://github.com/Digit4lBytes/RedTeam
CVE-2017-8625 - https://github.com/DigitalQuinn/InfosecCompilation
CVE-2017-8625 - https://github.com/Fa1c0n35/Awesome-Red-Teaming.
+CVE-2017-8625 - https://github.com/GoVanguard/list-infosec-encyclopedia
CVE-2017-8625 - https://github.com/H4CK3RT3CH/Awesome-Red-Teaming
CVE-2017-8625 - https://github.com/Hemanthraju02/Red-team
CVE-2017-8625 - https://github.com/HildeTeamTNT/Awesome-Red-Teaming
@@ -41654,6 +41901,7 @@ CVE-2017-8878 - https://github.com/xbl3/awesome-cve-poc_qazbnm456
CVE-2017-8890 - https://github.com/7043mcgeep/cve-2017-8890-msf
CVE-2017-8890 - https://github.com/ARPSyndicate/cvemon
CVE-2017-8890 - https://github.com/Al1ex/LinuxEelvation
+CVE-2017-8890 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2017-8890 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2017-8890 - https://github.com/beraphin/CVE-2017-8890
CVE-2017-8890 - https://github.com/bsauce/kernel-exploit-factory
@@ -41688,6 +41936,7 @@ CVE-2017-8917 - https://github.com/AkuCyberSec/CVE-2017-8917-Joomla-370-SQL-Inje
CVE-2017-8917 - https://github.com/Aukaii/notes
CVE-2017-8917 - https://github.com/Awrrays/FrameVul
CVE-2017-8917 - https://github.com/BaptisteContreras/CVE-2017-8917-Joomla
+CVE-2017-8917 - https://github.com/CLincat/vulcat
CVE-2017-8917 - https://github.com/Elsfa7-110/kenzer-templates
CVE-2017-8917 - https://github.com/HattMobb/TryHackMe-Bugle-Machine-Writeup-Walkthrough
CVE-2017-8917 - https://github.com/HimmelAward/Goby_POC
@@ -41768,6 +42017,7 @@ CVE-2017-9044 - https://github.com/fokypoky/places-list
CVE-2017-9047 - https://github.com/introspection-libc/safe-libc
CVE-2017-9047 - https://github.com/pekd/safe-libc
CVE-2017-9048 - https://github.com/ARPSyndicate/cvemon
+CVE-2017-9048 - https://github.com/ch1hyun/fuzzing-class
CVE-2017-9049 - https://github.com/ARPSyndicate/cvemon
CVE-2017-9050 - https://github.com/ARPSyndicate/cvemon
CVE-2017-9050 - https://github.com/jason44406/Depot
@@ -41829,6 +42079,7 @@ CVE-2017-9096 - https://github.com/0xCyberY/CVE-T4PDF
CVE-2017-9096 - https://github.com/ARPSyndicate/cvemon
CVE-2017-9096 - https://github.com/Anonymous-Phunter/PHunter
CVE-2017-9096 - https://github.com/CGCL-codes/PHunter
+CVE-2017-9096 - https://github.com/LibHunter/LibHunter
CVE-2017-9096 - https://github.com/jakabakos/CVE-2017-9096
CVE-2017-9096 - https://github.com/jakabakos/CVE-2017-9096-iText-XXE
CVE-2017-9097 - https://github.com/MDudek-ICS/AntiWeb_testing-Suite
@@ -42100,6 +42351,7 @@ CVE-2017-9732 - https://github.com/irsl/knc-memory-exhaustion
CVE-2017-9735 - https://github.com/ARPSyndicate/cvemon
CVE-2017-9735 - https://github.com/Anonymous-Phunter/PHunter
CVE-2017-9735 - https://github.com/CGCL-codes/PHunter
+CVE-2017-9735 - https://github.com/LibHunter/LibHunter
CVE-2017-9735 - https://github.com/fredfeng/Themis-taint
CVE-2017-9742 - https://github.com/fokypoky/places-list
CVE-2017-9743 - https://github.com/ARPSyndicate/cvemon
@@ -42709,6 +42961,7 @@ CVE-2018-0151 - https://github.com/ARPSyndicate/cvemon
CVE-2018-0151 - https://github.com/Ostorlab/KEV
CVE-2018-0151 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
CVE-2018-0151 - https://github.com/ferdinandmudjialim/metasploit-cve-search
+CVE-2018-0151 - https://github.com/tunnelcat/metasploit-cve-search
CVE-2018-0153 - https://github.com/Ostorlab/KEV
CVE-2018-0153 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
CVE-2018-0154 - https://github.com/Ostorlab/KEV
@@ -42737,6 +42990,7 @@ CVE-2018-0171 - https://github.com/lnick2023/nicenice
CVE-2018-0171 - https://github.com/qazbnm456/awesome-cve-poc
CVE-2018-0171 - https://github.com/rikosintie/SmartInstall
CVE-2018-0171 - https://github.com/tomoyamachi/gocarts
+CVE-2018-0171 - https://github.com/tunnelcat/metasploit-cve-search
CVE-2018-0171 - https://github.com/xbl3/awesome-cve-poc_qazbnm456
CVE-2018-0172 - https://github.com/Ostorlab/KEV
CVE-2018-0172 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
@@ -42829,6 +43083,7 @@ CVE-2018-0296 - https://github.com/yassineaboukir/CVE-2018-0296
CVE-2018-0296 - https://github.com/yut0u/RedTeam-BlackBox
CVE-2018-0304 - https://github.com/ARPSyndicate/cvemon
CVE-2018-0304 - https://github.com/ferdinandmudjialim/metasploit-cve-search
+CVE-2018-0304 - https://github.com/tunnelcat/metasploit-cve-search
CVE-2018-0324 - https://github.com/s-index/dora
CVE-2018-0477 - https://github.com/lucabrasi83/vscan
CVE-2018-0481 - https://github.com/lucabrasi83/vscan
@@ -43657,6 +43912,7 @@ CVE-2018-1000132 - https://github.com/andir/nixos-issue-db-example
CVE-2018-1000134 - https://github.com/0xT11/CVE-POC
CVE-2018-1000134 - https://github.com/Anonymous-Phunter/PHunter
CVE-2018-1000134 - https://github.com/CGCL-codes/PHunter
+CVE-2018-1000134 - https://github.com/LibHunter/LibHunter
CVE-2018-1000136 - https://github.com/ARPSyndicate/cvemon
CVE-2018-1000136 - https://github.com/andir/nixos-issue-db-example
CVE-2018-1000136 - https://github.com/doyensec/awesome-electronjs-hacking
@@ -43697,6 +43953,7 @@ CVE-2018-1000180 - https://github.com/ARPSyndicate/cvemon
CVE-2018-1000180 - https://github.com/Anonymous-Phunter/PHunter
CVE-2018-1000180 - https://github.com/CGCL-codes/PHunter
CVE-2018-1000180 - https://github.com/CyberSource/cybersource-sdk-java
+CVE-2018-1000180 - https://github.com/LibHunter/LibHunter
CVE-2018-1000182 - https://github.com/ARPSyndicate/cvemon
CVE-2018-1000195 - https://github.com/ARPSyndicate/cvemon
CVE-2018-1000199 - https://github.com/0xT11/CVE-POC
@@ -43743,6 +44000,7 @@ CVE-2018-1000613 - https://github.com/ARPSyndicate/cvemon
CVE-2018-1000613 - https://github.com/Anonymous-Phunter/PHunter
CVE-2018-1000613 - https://github.com/CGCL-codes/PHunter
CVE-2018-1000613 - https://github.com/IkerSaint/VULNAPP-vulnerable-app
+CVE-2018-1000613 - https://github.com/LibHunter/LibHunter
CVE-2018-1000613 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs
CVE-2018-1000613 - https://github.com/dotanuki-labs/android-oss-cves-research
CVE-2018-1000613 - https://github.com/pctF/vulnerable-app
@@ -43752,6 +44010,7 @@ CVE-2018-1000622 - https://github.com/Artisan-Lab/Rust-memory-safety-bugs
CVE-2018-1000622 - https://github.com/xxg1413/rust-security
CVE-2018-1000632 - https://github.com/Anonymous-Phunter/PHunter
CVE-2018-1000632 - https://github.com/CGCL-codes/PHunter
+CVE-2018-1000632 - https://github.com/LibHunter/LibHunter
CVE-2018-1000632 - https://github.com/ilmari666/cybsec
CVE-2018-1000654 - https://github.com/PajakAlexandre/wik-dps-tp02
CVE-2018-1000654 - https://github.com/brandoncamenisch/release-the-code-litecoin
@@ -43797,6 +44056,7 @@ CVE-2018-1000810 - https://github.com/saaramar/Publications
CVE-2018-1000810 - https://github.com/xxg1413/rust-security
CVE-2018-1000850 - https://github.com/Anonymous-Phunter/PHunter
CVE-2018-1000850 - https://github.com/CGCL-codes/PHunter
+CVE-2018-1000850 - https://github.com/LibHunter/LibHunter
CVE-2018-1000850 - https://github.com/hinat0y/Dataset1
CVE-2018-1000850 - https://github.com/hinat0y/Dataset10
CVE-2018-1000850 - https://github.com/hinat0y/Dataset11
@@ -43902,6 +44162,7 @@ CVE-2018-1000886 - https://github.com/tzf-omkey/MemLock_Benchmark
CVE-2018-1000886 - https://github.com/wcventure/MemLock_Benchmark
CVE-2018-10016 - https://github.com/junxzm1990/afl-pt
CVE-2018-1002009 - https://github.com/ARPSyndicate/cvemon
+CVE-2018-1002015 - https://github.com/CLincat/vulcat
CVE-2018-10021 - https://github.com/ARPSyndicate/cvemon
CVE-2018-1002100 - https://github.com/43622283/awesome-cloud-native-security
CVE-2018-1002100 - https://github.com/Metarget/awesome-cloud-native-security
@@ -43981,6 +44242,7 @@ CVE-2018-1002200 - https://github.com/mile9299/zip-slip-vulnerability
CVE-2018-1002200 - https://github.com/snyk/zip-slip-vulnerability
CVE-2018-1002201 - https://github.com/Anonymous-Phunter/PHunter
CVE-2018-1002201 - https://github.com/CGCL-codes/PHunter
+CVE-2018-1002201 - https://github.com/LibHunter/LibHunter
CVE-2018-1002201 - https://github.com/jpbprakash/vuln
CVE-2018-1002201 - https://github.com/mile9299/zip-slip-vulnerability
CVE-2018-1002201 - https://github.com/snyk/zip-slip-vulnerability
@@ -44115,6 +44377,7 @@ CVE-2018-10237 - https://github.com/ARPSyndicate/cvemon
CVE-2018-10237 - https://github.com/Anonymous-Phunter/PHunter
CVE-2018-10237 - https://github.com/CGCL-codes/PHunter
CVE-2018-10237 - https://github.com/IkerSaint/VULNAPP-vulnerable-app
+CVE-2018-10237 - https://github.com/LibHunter/LibHunter
CVE-2018-10237 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs
CVE-2018-10237 - https://github.com/diakogiannis/moviebook
CVE-2018-10237 - https://github.com/dotanuki-labs/android-oss-cves-research
@@ -44802,6 +45065,7 @@ CVE-2018-11247 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs
CVE-2018-11247 - https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
CVE-2018-11248 - https://github.com/Anonymous-Phunter/PHunter
CVE-2018-11248 - https://github.com/CGCL-codes/PHunter
+CVE-2018-11248 - https://github.com/LibHunter/LibHunter
CVE-2018-1125 - https://github.com/ARPSyndicate/cvemon
CVE-2018-11254 - https://github.com/0xCyberY/CVE-T4PDF
CVE-2018-11254 - https://github.com/ARPSyndicate/cvemon
@@ -44831,6 +45095,7 @@ CVE-2018-11305 - https://github.com/ARPSyndicate/cvemon
CVE-2018-11307 - https://github.com/ARPSyndicate/cvemon
CVE-2018-11307 - https://github.com/Anonymous-Phunter/PHunter
CVE-2018-11307 - https://github.com/CGCL-codes/PHunter
+CVE-2018-11307 - https://github.com/LibHunter/LibHunter
CVE-2018-11307 - https://github.com/OWASP/www-project-ide-vulscanner
CVE-2018-11307 - https://github.com/ilmari666/cybsec
CVE-2018-11307 - https://github.com/seal-community/patches
@@ -45086,6 +45351,7 @@ CVE-2018-11771 - https://github.com/Anonymous-Phunter/PHunter
CVE-2018-11771 - https://github.com/CGCL-codes/PHunter
CVE-2018-11771 - https://github.com/DennisFeldbusch/Fuzz
CVE-2018-11771 - https://github.com/GCFuzzer/SP2023
+CVE-2018-11771 - https://github.com/LibHunter/LibHunter
CVE-2018-11771 - https://github.com/hwen020/JQF
CVE-2018-11771 - https://github.com/jyi/JQF
CVE-2018-11771 - https://github.com/mfatima1/CS182
@@ -45293,6 +45559,7 @@ CVE-2018-11797 - https://github.com/0xCyberY/CVE-T4PDF
CVE-2018-11797 - https://github.com/ARPSyndicate/cvemon
CVE-2018-11797 - https://github.com/Anonymous-Phunter/PHunter
CVE-2018-11797 - https://github.com/CGCL-codes/PHunter
+CVE-2018-11797 - https://github.com/LibHunter/LibHunter
CVE-2018-11798 - https://github.com/ossf-cve-benchmark/CVE-2018-11798
CVE-2018-11805 - https://github.com/Live-Hack-CVE/CVE-2019-19920
CVE-2018-11808 - https://github.com/kactrosN/publicdisclosures
@@ -45369,6 +45636,7 @@ CVE-2018-12021 - https://github.com/ARPSyndicate/cvemon
CVE-2018-12022 - https://github.com/ARPSyndicate/cvemon
CVE-2018-12022 - https://github.com/Anonymous-Phunter/PHunter
CVE-2018-12022 - https://github.com/CGCL-codes/PHunter
+CVE-2018-12022 - https://github.com/LibHunter/LibHunter
CVE-2018-12022 - https://github.com/ilmari666/cybsec
CVE-2018-12022 - https://github.com/seal-community/patches
CVE-2018-12023 - https://github.com/ilmari666/cybsec
@@ -45595,6 +45863,7 @@ CVE-2018-12418 - https://github.com/Anonymous-Phunter/PHunter
CVE-2018-12418 - https://github.com/CGCL-codes/PHunter
CVE-2018-12418 - https://github.com/DennisFeldbusch/Fuzz
CVE-2018-12418 - https://github.com/GCFuzzer/SP2023
+CVE-2018-12418 - https://github.com/LibHunter/LibHunter
CVE-2018-12418 - https://github.com/hwen020/JQF
CVE-2018-12418 - https://github.com/jyi/JQF
CVE-2018-12418 - https://github.com/mfatima1/CS182
@@ -45652,6 +45921,7 @@ CVE-2018-12537 - https://github.com/0xT11/CVE-POC
CVE-2018-12537 - https://github.com/tafamace/CVE-2018-12537
CVE-2018-12538 - https://github.com/Anonymous-Phunter/PHunter
CVE-2018-12538 - https://github.com/CGCL-codes/PHunter
+CVE-2018-12538 - https://github.com/LibHunter/LibHunter
CVE-2018-12539 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs
CVE-2018-12540 - https://github.com/0xT11/CVE-POC
CVE-2018-12540 - https://github.com/bernard-wagner/vertx-web-xsrf
@@ -45683,6 +45953,7 @@ CVE-2018-1260 - https://github.com/Cryin/Paper
CVE-2018-1260 - https://github.com/Drun1baby/CVE-Reproduction-And-Analysis
CVE-2018-1260 - https://github.com/SexyBeast233/SecBooks
CVE-2018-1260 - https://github.com/ax1sX/SpringSecurity
+CVE-2018-1260 - https://github.com/enomothem/PenTestNote
CVE-2018-1260 - https://github.com/gyyyy/footprint
CVE-2018-1260 - https://github.com/langu-xyz/JavaVulnMap
CVE-2018-12601 - https://github.com/xiaoqx/pocs
@@ -45806,6 +46077,7 @@ CVE-2018-1270 - https://github.com/bkhablenko/CVE-2017-8046
CVE-2018-1270 - https://github.com/cybersecsi/docker-vuln-runner
CVE-2018-1270 - https://github.com/developer3000S/PoC-in-GitHub
CVE-2018-1270 - https://github.com/do0dl3/myhktools
+CVE-2018-1270 - https://github.com/enomothem/PenTestNote
CVE-2018-1270 - https://github.com/genxor/CVE-2018-1270_EXP
CVE-2018-1270 - https://github.com/hectorgie/PoC-in-GitHub
CVE-2018-1270 - https://github.com/hktalent/myhktools
@@ -46636,6 +46908,7 @@ CVE-2018-1323 - https://github.com/xbl3/awesome-cve-poc_qazbnm456
CVE-2018-1324 - https://github.com/0xT11/CVE-POC
CVE-2018-1324 - https://github.com/Anonymous-Phunter/PHunter
CVE-2018-1324 - https://github.com/CGCL-codes/PHunter
+CVE-2018-1324 - https://github.com/LibHunter/LibHunter
CVE-2018-1324 - https://github.com/developer3000S/PoC-in-GitHub
CVE-2018-1324 - https://github.com/dotanuki-labs/android-oss-cves-research
CVE-2018-1324 - https://github.com/hectorgie/PoC-in-GitHub
@@ -46751,6 +47024,7 @@ CVE-2018-13379 - https://github.com/Legadro/Legadro-Forti-Scanner
CVE-2018-13379 - https://github.com/MelanyRoob/Goby
CVE-2018-13379 - https://github.com/Ostorlab/KEV
CVE-2018-13379 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
+CVE-2018-13379 - https://github.com/RedcentricCyber/Fortigate
CVE-2018-13379 - https://github.com/SexyBeast233/SecBooks
CVE-2018-13379 - https://github.com/TebbaaX/Vault6
CVE-2018-13379 - https://github.com/W01fh4cker/Serein
@@ -47171,6 +47445,7 @@ CVE-2018-14634 - https://github.com/luan0ap/cve-2018-14634
CVE-2018-14634 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2018-14634 - https://github.com/qazbnm456/awesome-cve-poc
CVE-2018-14634 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2018-14634 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2018-14634 - https://github.com/xairy/linux-kernel-exploitation
CVE-2018-14634 - https://github.com/xbl3/awesome-cve-poc_qazbnm456
CVE-2018-14647 - https://github.com/revl-ca/scan-docker-image
@@ -48737,6 +49012,7 @@ CVE-2018-17182 - https://github.com/CVEDB/awesome-cve-repo
CVE-2018-17182 - https://github.com/CVEDB/top
CVE-2018-17182 - https://github.com/Echocipher/Resource-list
CVE-2018-17182 - https://github.com/GhostTroops/TOP
+CVE-2018-17182 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2018-17182 - https://github.com/IdanBanani/Linux-Kernel-VR-Exploitation
CVE-2018-17182 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2018-17182 - https://github.com/Ondrik8/RED-Team
@@ -48770,6 +49046,7 @@ CVE-2018-17182 - https://github.com/slimdaddy/RedTeam
CVE-2018-17182 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2018-17182 - https://github.com/svbjdbk123/-
CVE-2018-17182 - https://github.com/twensoo/PersistentThreat
+CVE-2018-17182 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2018-17182 - https://github.com/xairy/linux-kernel-exploitation
CVE-2018-17182 - https://github.com/xbl3/awesome-cve-poc_qazbnm456
CVE-2018-17182 - https://github.com/xiaoZ-hc/redtool
@@ -49079,6 +49356,7 @@ CVE-2018-18281 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2018-18281 - https://github.com/knd06/linux-kernel-exploitation
CVE-2018-18281 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2018-18281 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2018-18281 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2018-18281 - https://github.com/xairy/linux-kernel-exploitation
CVE-2018-18282 - https://github.com/ossf-cve-benchmark/CVE-2018-18282
CVE-2018-18287 - https://github.com/syrex1013/AsusLeak
@@ -49350,6 +49628,7 @@ CVE-2018-18955 - https://github.com/ARPSyndicate/cvemon
CVE-2018-18955 - https://github.com/Al1ex/LinuxEelvation
CVE-2018-18955 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2018-18955 - https://github.com/HaleyWei/POC-available
+CVE-2018-18955 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2018-18955 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2018-18955 - https://github.com/Metarget/metarget
CVE-2018-18955 - https://github.com/Micr067/linux-kernel-exploits
@@ -49485,6 +49764,7 @@ CVE-2018-19320 - https://github.com/Ostorlab/KEV
CVE-2018-19320 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
CVE-2018-19320 - https://github.com/cmd-theo/RobbinHood-attack
CVE-2018-19320 - https://github.com/cygnosic/Gigabyte_Disable_DSE
+CVE-2018-19320 - https://github.com/gmh5225/RobbinHood-attack
CVE-2018-19320 - https://github.com/gmh5225/awesome-game-security
CVE-2018-19320 - https://github.com/h4rmy/KDU
CVE-2018-19320 - https://github.com/hfiref0x/KDU
@@ -49523,6 +49803,7 @@ CVE-2018-19358 - https://github.com/swiesend/secret-service
CVE-2018-19360 - https://github.com/ARPSyndicate/cvemon
CVE-2018-19360 - https://github.com/Anonymous-Phunter/PHunter
CVE-2018-19360 - https://github.com/CGCL-codes/PHunter
+CVE-2018-19360 - https://github.com/LibHunter/LibHunter
CVE-2018-19360 - https://github.com/OWASP/www-project-ide-vulscanner
CVE-2018-19360 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs
CVE-2018-19360 - https://github.com/aaronm-sysdig/risk-accept
@@ -49530,6 +49811,7 @@ CVE-2018-19360 - https://github.com/ilmari666/cybsec
CVE-2018-19361 - https://github.com/ARPSyndicate/cvemon
CVE-2018-19361 - https://github.com/Anonymous-Phunter/PHunter
CVE-2018-19361 - https://github.com/CGCL-codes/PHunter
+CVE-2018-19361 - https://github.com/LibHunter/LibHunter
CVE-2018-19361 - https://github.com/OWASP/www-project-ide-vulscanner
CVE-2018-19361 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs
CVE-2018-19361 - https://github.com/aaronm-sysdig/risk-accept
@@ -49537,6 +49819,7 @@ CVE-2018-19361 - https://github.com/ilmari666/cybsec
CVE-2018-19362 - https://github.com/ARPSyndicate/cvemon
CVE-2018-19362 - https://github.com/Anonymous-Phunter/PHunter
CVE-2018-19362 - https://github.com/CGCL-codes/PHunter
+CVE-2018-19362 - https://github.com/LibHunter/LibHunter
CVE-2018-19362 - https://github.com/OWASP/www-project-ide-vulscanner
CVE-2018-19362 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs
CVE-2018-19362 - https://github.com/aaronm-sysdig/risk-accept
@@ -51559,6 +51842,7 @@ CVE-2018-3639 - https://github.com/v-lavrentikov/meltdown-spectre
CVE-2018-3639 - https://github.com/vintagesucks/awesome-stars
CVE-2018-3639 - https://github.com/vurtne/specter---meltdown--checker
CVE-2018-3639 - https://github.com/willyb321/willyb321-stars
+CVE-2018-3639 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2018-3639 - https://github.com/xairy/linux-kernel-exploitation
CVE-2018-3639 - https://github.com/yardenshafir/MitigationFlagsCliTool
CVE-2018-3640 - https://github.com/ARPSyndicate/cvemon
@@ -52796,6 +53080,7 @@ CVE-2018-5318 - https://github.com/xbl3/awesome-cve-poc_qazbnm456
CVE-2018-5333 - https://github.com/ARPSyndicate/cvemon
CVE-2018-5333 - https://github.com/Al1ex/LinuxEelvation
CVE-2018-5333 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
+CVE-2018-5333 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2018-5333 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2018-5333 - https://github.com/bcoles/kernel-exploits
CVE-2018-5333 - https://github.com/bsauce/kernel-exploit-factory
@@ -53125,6 +53410,7 @@ CVE-2018-5968 - https://github.com/ARPSyndicate/cvemon
CVE-2018-5968 - https://github.com/Anonymous-Phunter/PHunter
CVE-2018-5968 - https://github.com/CGCL-codes/PHunter
CVE-2018-5968 - https://github.com/FHGZS/jackson-rce-via-two-new-gadgets
+CVE-2018-5968 - https://github.com/LibHunter/LibHunter
CVE-2018-5968 - https://github.com/OneSourceCat/jackson-rce-via-two-new-gadgets
CVE-2018-5968 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs
CVE-2018-5968 - https://github.com/ilmari666/cybsec
@@ -53637,6 +53923,7 @@ CVE-2018-6554 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2018-6554 - https://github.com/knd06/linux-kernel-exploitation
CVE-2018-6554 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2018-6554 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2018-6554 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2018-6554 - https://github.com/xairy/linux-kernel-exploitation
CVE-2018-6555 - https://github.com/ARPSyndicate/cvemon
CVE-2018-6555 - https://github.com/kdn111/linux-kernel-exploitation
@@ -53650,6 +53937,7 @@ CVE-2018-6555 - https://github.com/knd06/linux-kernel-exploitation
CVE-2018-6555 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2018-6555 - https://github.com/ostrichxyz7/kexps
CVE-2018-6555 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2018-6555 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2018-6555 - https://github.com/xairy/linux-kernel-exploitation
CVE-2018-6556 - https://github.com/MaherAzzouzi/CVE-2022-47952
CVE-2018-6556 - https://github.com/k0mi-tg/CVE-POC
@@ -54241,6 +54529,7 @@ CVE-2018-7489 - https://github.com/zema1/oracle-vuln-crawler
CVE-2018-7490 - https://github.com/0ps/pocassistdb
CVE-2018-7490 - https://github.com/ARPSyndicate/cvemon
CVE-2018-7490 - https://github.com/ARPSyndicate/kenzer-templates
+CVE-2018-7490 - https://github.com/CLincat/vulcat
CVE-2018-7490 - https://github.com/Elsfa7-110/kenzer-templates
CVE-2018-7490 - https://github.com/H4cking2theGate/TraversalHunter
CVE-2018-7490 - https://github.com/SexyBeast233/SecBooks
@@ -54784,6 +55073,7 @@ CVE-2018-8036 - https://github.com/Anonymous-Phunter/PHunter
CVE-2018-8036 - https://github.com/CGCL-codes/PHunter
CVE-2018-8036 - https://github.com/DennisFeldbusch/Fuzz
CVE-2018-8036 - https://github.com/GCFuzzer/SP2023
+CVE-2018-8036 - https://github.com/LibHunter/LibHunter
CVE-2018-8036 - https://github.com/hwen020/JQF
CVE-2018-8036 - https://github.com/jyi/JQF
CVE-2018-8036 - https://github.com/mfatima1/CS182
@@ -54794,6 +55084,7 @@ CVE-2018-8036 - https://github.com/rohanpadhye/JQF
CVE-2018-8036 - https://github.com/sarahc7/jqf-gson
CVE-2018-8037 - https://github.com/ilmari666/cybsec
CVE-2018-8037 - https://github.com/tomoyamachi/gocarts
+CVE-2018-8037 - https://github.com/versio-io/product-lifecycle-security-api
CVE-2018-8037 - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
CVE-2018-8038 - https://github.com/0xT11/CVE-POC
CVE-2018-8038 - https://github.com/hectorgie/PoC-in-GitHub
@@ -55094,6 +55385,7 @@ CVE-2018-8174 - https://github.com/HacTF/poc--exp
CVE-2018-8174 - https://github.com/InQuest/yara-rules
CVE-2018-8174 - https://github.com/JERRY123S/all-poc
CVE-2018-8174 - https://github.com/KasperskyLab/VBscriptInternals
+CVE-2018-8174 - https://github.com/MN439/bingduziyuan
CVE-2018-8174 - https://github.com/MrTcsy/Exploit
CVE-2018-8174 - https://github.com/Ondrik8/RED-Team
CVE-2018-8174 - https://github.com/Ostorlab/KEV
@@ -55898,6 +56190,7 @@ CVE-2018-8781 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2018-8781 - https://github.com/knd06/linux-kernel-exploitation
CVE-2018-8781 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2018-8781 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2018-8781 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2018-8781 - https://github.com/xairy/linux-kernel-exploitation
CVE-2018-8792 - https://github.com/ARPSyndicate/cvemon
CVE-2018-8796 - https://github.com/ARPSyndicate/cvemon
@@ -56216,6 +56509,7 @@ CVE-2018-9427 - https://github.com/ARPSyndicate/cvemon
CVE-2018-9436 - https://github.com/ARPSyndicate/cvemon
CVE-2018-9437 - https://github.com/ARPSyndicate/cvemon
CVE-2018-9438 - https://github.com/ARPSyndicate/cvemon
+CVE-2018-9442 - https://github.com/codexlynx/hardware-attacks-state-of-the-art
CVE-2018-9444 - https://github.com/ARPSyndicate/cvemon
CVE-2018-9445 - https://github.com/ARPSyndicate/cvemon
CVE-2018-9445 - https://github.com/lnick2023/nicenice
@@ -56304,6 +56598,7 @@ CVE-2018-9568 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2018-9568 - https://github.com/knd06/linux-kernel-exploitation
CVE-2018-9568 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2018-9568 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2018-9568 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2018-9568 - https://github.com/xairy/linux-kernel-exploitation
CVE-2018-9582 - https://github.com/ARPSyndicate/cvemon
CVE-2018-9582 - https://github.com/virtualpatch/virtualpatch_evaluation
@@ -56719,6 +57014,7 @@ CVE-2019-0227 - https://github.com/pen4uin/vulnerability-research-list
CVE-2019-0227 - https://github.com/sunzu94/AWS-CVEs
CVE-2019-0228 - https://github.com/Anonymous-Phunter/PHunter
CVE-2019-0228 - https://github.com/CGCL-codes/PHunter
+CVE-2019-0228 - https://github.com/LibHunter/LibHunter
CVE-2019-0228 - https://github.com/bluesNbrews/SkillSearchEngine
CVE-2019-0228 - https://github.com/swilliams9671/SkillSearchEngine
CVE-2019-0229 - https://github.com/ARPSyndicate/cvemon
@@ -57424,6 +57720,7 @@ CVE-2019-0708 - https://github.com/password520/Penetration_PoC
CVE-2019-0708 - https://github.com/password520/RedTeamer
CVE-2019-0708 - https://github.com/pengusec/awesome-netsec-articles
CVE-2019-0708 - https://github.com/pentest-a2p2v/pentest-a2p2v-core
+CVE-2019-0708 - https://github.com/pg001001/deception-tech
CVE-2019-0708 - https://github.com/phant0n/PENTESTING-BIBLE
CVE-2019-0708 - https://github.com/pikpikcu/Pentest-Tools-Framework
CVE-2019-0708 - https://github.com/pravinsrc/NOTES-windows-kernel-links
@@ -58207,6 +58504,7 @@ CVE-2019-10086 - https://github.com/ARPSyndicate/cvemon
CVE-2019-10086 - https://github.com/Anonymous-Phunter/PHunter
CVE-2019-10086 - https://github.com/CGCL-codes/PHunter
CVE-2019-10086 - https://github.com/IkerSaint/VULNAPP-vulnerable-app
+CVE-2019-10086 - https://github.com/LibHunter/LibHunter
CVE-2019-10086 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs
CVE-2019-10086 - https://github.com/developer3000S/PoC-in-GitHub
CVE-2019-10086 - https://github.com/hectorgie/PoC-in-GitHub
@@ -58505,11 +58803,14 @@ CVE-2019-10232 - https://github.com/youcans896768/APIV_Tool
CVE-2019-10241 - https://github.com/Anonymous-Phunter/PHunter
CVE-2019-10241 - https://github.com/CGCL-codes/PHunter
CVE-2019-10241 - https://github.com/DonnumS/inf226Inchat
+CVE-2019-10241 - https://github.com/LibHunter/LibHunter
CVE-2019-10246 - https://github.com/Anonymous-Phunter/PHunter
CVE-2019-10246 - https://github.com/CGCL-codes/PHunter
+CVE-2019-10246 - https://github.com/LibHunter/LibHunter
CVE-2019-10247 - https://github.com/Anonymous-Phunter/PHunter
CVE-2019-10247 - https://github.com/CGCL-codes/PHunter
CVE-2019-10247 - https://github.com/DonnumS/inf226Inchat
+CVE-2019-10247 - https://github.com/LibHunter/LibHunter
CVE-2019-10255 - https://github.com/ARPSyndicate/cvemon
CVE-2019-10255 - https://github.com/RonenDabach/python-tda-bug-hunt-2
CVE-2019-10261 - https://github.com/ARPSyndicate/cvemon
@@ -58695,6 +58996,7 @@ CVE-2019-10567 - https://github.com/knd06/linux-kernel-exploitation
CVE-2019-10567 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2019-10567 - https://github.com/secmob/TiYunZong-An-Exploit-Chain-to-Remotely-Root-Modern-Android-Devices
CVE-2019-10567 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2019-10567 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2019-10567 - https://github.com/xairy/linux-kernel-exploitation
CVE-2019-10584 - https://github.com/jiayy/android_vuln_poc-exp
CVE-2019-10596 - https://github.com/404notf0und/CVE-Flow
@@ -59237,6 +59539,7 @@ CVE-2019-11190 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2019-11190 - https://github.com/knd06/linux-kernel-exploitation
CVE-2019-11190 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2019-11190 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2019-11190 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2019-11190 - https://github.com/xairy/linux-kernel-exploitation
CVE-2019-11193 - https://github.com/ARPSyndicate/cvemon
CVE-2019-11223 - https://github.com/0xT11/CVE-POC
@@ -59559,6 +59862,7 @@ CVE-2019-11358 - https://github.com/6165-MSET-CuttleFish/FtcRobotController
CVE-2019-11358 - https://github.com/6165-MSET-CuttleFish/PowerPlay
CVE-2019-11358 - https://github.com/6165-MSET-CuttleFish/SHS_Swerve_Offseason
CVE-2019-11358 - https://github.com/6369Designosars/Summer_Software_6.2
+CVE-2019-11358 - https://github.com/6427FTCRobotics/centerstage6427
CVE-2019-11358 - https://github.com/731WannabeeStrange/FTC-731-Powerplay
CVE-2019-11358 - https://github.com/731WannabeeStrange/centerstage-731
CVE-2019-11358 - https://github.com/7390jellyfish/software
@@ -60431,6 +60735,7 @@ CVE-2019-11358 - https://github.com/FTCTeam11531/TechnoTrojanTraining_Drivetrain
CVE-2019-11358 - https://github.com/FTCTeam21217/AutonomousWorkshop
CVE-2019-11358 - https://github.com/FTCTeam7610-Software/7610-Software-Version-7.1
CVE-2019-11358 - https://github.com/FTCTeam7610-Software/7610Software-7.1
+CVE-2019-11358 - https://github.com/FTCclueless/Centerstage
CVE-2019-11358 - https://github.com/FUTURE-FTC10366/FTCFreightFrenzy-2021-22
CVE-2019-11358 - https://github.com/FaltechFTC/FtcRobotController2122
CVE-2019-11358 - https://github.com/Feyorsh/PASC-FTC-robotCode
@@ -60643,6 +60948,7 @@ CVE-2019-11358 - https://github.com/InduGadi/example-repository
CVE-2019-11358 - https://github.com/Indubitably8/Bot24Update
CVE-2019-11358 - https://github.com/Indubitably8/JakeBot
CVE-2019-11358 - https://github.com/Indubitably8/JakeBot24
+CVE-2019-11358 - https://github.com/Infernal-Industries/AprilTagTesting
CVE-2019-11358 - https://github.com/Infidge/LeagueMeetsBot
CVE-2019-11358 - https://github.com/InfinityTechRobotics/IT_2022_Summer_Learning
CVE-2019-11358 - https://github.com/Infinitybeond1/RobotCode
@@ -60838,6 +61144,7 @@ CVE-2019-11358 - https://github.com/LenickTan/FtcRobotController-7.0
CVE-2019-11358 - https://github.com/LenickTan/UltimateGoalCode
CVE-2019-11358 - https://github.com/LenickTan/ultgoal
CVE-2019-11358 - https://github.com/LeoMavri/RO109-Homosapiens
+CVE-2019-11358 - https://github.com/LeozinDaProgramacao/TechZeusCenterstage2023-2024
CVE-2019-11358 - https://github.com/LiBaoJake/ftcrobotcontrol
CVE-2019-11358 - https://github.com/LiamWalker01/CrowForce22-23
CVE-2019-11358 - https://github.com/LiamWalker01/CrowForce22-23-RobotController8.1.1
@@ -61130,6 +61437,7 @@ CVE-2019-11358 - https://github.com/OverlakeRobotics/FtcRobotController2021
CVE-2019-11358 - https://github.com/OverlakeRobotics/Nocturnal-2020-Ultimate-Goal
CVE-2019-11358 - https://github.com/OverlakeRobotics/OverlakeFTC-2023-7330
CVE-2019-11358 - https://github.com/OverripeBanana/9894_Robolions
+CVE-2019-11358 - https://github.com/Overture-7421/Hayabusa-2024
CVE-2019-11358 - https://github.com/Overture-7421/HayabusaRobotCode_23619
CVE-2019-11358 - https://github.com/Owen-Pryga/FtcRobotController_UltamateGoal
CVE-2019-11358 - https://github.com/Owen383/WM20
@@ -61471,6 +61779,7 @@ CVE-2019-11358 - https://github.com/SittingDucks23507/SD
CVE-2019-11358 - https://github.com/Skywalker934/PowerPlay
CVE-2019-11358 - https://github.com/Skywalker934/video-tutorial
CVE-2019-11358 - https://github.com/Slipperee-CODE/4625---FTC---POWERPLAY
+CVE-2019-11358 - https://github.com/Slipperee-CODE/4625-FTC-CenterStage
CVE-2019-11358 - https://github.com/Slipperee-CODE/4625-FTC-CenterStage2023-2024
CVE-2019-11358 - https://github.com/Slipperee-CODE/4625-FTC-Offseason
CVE-2019-11358 - https://github.com/Slipshodleaf74/Freight-Frenzy
@@ -61625,6 +61934,7 @@ CVE-2019-11358 - https://github.com/The-Founders-Academy/2023-Powerplay
CVE-2019-11358 - https://github.com/The-Founders-Academy/2023-Test-Robot
CVE-2019-11358 - https://github.com/The-Founders-Academy/2024-Centerstage
CVE-2019-11358 - https://github.com/The-Founders-Academy/2024-Centerstage-Archived
+CVE-2019-11358 - https://github.com/The-Founders-Academy/shared-code
CVE-2019-11358 - https://github.com/The-Innovation-Story/FreightFrenzy_FTC
CVE-2019-11358 - https://github.com/The-Knights-of-Ni/Skystone2020
CVE-2019-11358 - https://github.com/The-Knights-of-Ni/UltimateGoal2021_6.2
@@ -62371,6 +62681,7 @@ CVE-2019-11358 - https://github.com/frc4039/ftc2023
CVE-2019-11358 - https://github.com/frc4039/ftc2024
CVE-2019-11358 - https://github.com/frc5050/FTC7901-2021
CVE-2019-11358 - https://github.com/frc5050/FTC7902-2021
+CVE-2019-11358 - https://github.com/frc6606/ftc-2024
CVE-2019-11358 - https://github.com/frc7787/FTC-2023-Robot
CVE-2019-11358 - https://github.com/frc7787/FTC-Centerstage
CVE-2019-11358 - https://github.com/frc7787/FTC_AndroidStudio2023
@@ -63643,6 +63954,7 @@ CVE-2019-11510 - https://github.com/developer3000S/PoC-in-GitHub
CVE-2019-11510 - https://github.com/dnif/content
CVE-2019-11510 - https://github.com/es0/CVE-2019-11510_poc
CVE-2019-11510 - https://github.com/fengjixuchui/RedTeamer
+CVE-2019-11510 - https://github.com/fierceoj/ShonyDanza
CVE-2019-11510 - https://github.com/gquere/PulseSecure_session_hijacking
CVE-2019-11510 - https://github.com/hasee2018/Penetration_Testing_POC
CVE-2019-11510 - https://github.com/hectorgie/PoC-in-GitHub
@@ -64066,6 +64378,7 @@ CVE-2019-12086 - https://github.com/ARPSyndicate/cvemon
CVE-2019-12086 - https://github.com/Al1ex/CVE-2019-12086
CVE-2019-12086 - https://github.com/Anonymous-Phunter/PHunter
CVE-2019-12086 - https://github.com/CGCL-codes/PHunter
+CVE-2019-12086 - https://github.com/LibHunter/LibHunter
CVE-2019-12086 - https://github.com/SimoLin/CVE-2019-12086-jackson-databind-file-read
CVE-2019-12086 - https://github.com/SugarP1g/LearningSecurity
CVE-2019-12086 - https://github.com/codeplutos/CVE-2019-12086-jackson-databind-file-read
@@ -64282,6 +64595,7 @@ CVE-2019-12400 - https://github.com/onelogin/java-saml
CVE-2019-12400 - https://github.com/umeshnagori/java-saml-os
CVE-2019-12402 - https://github.com/Anonymous-Phunter/PHunter
CVE-2019-12402 - https://github.com/CGCL-codes/PHunter
+CVE-2019-12402 - https://github.com/LibHunter/LibHunter
CVE-2019-12409 - https://github.com/0day404/vulnerability-poc
CVE-2019-12409 - https://github.com/0xT11/CVE-POC
CVE-2019-12409 - https://github.com/20142995/pocsuite3
@@ -64331,6 +64645,7 @@ CVE-2019-12415 - https://github.com/xbl3/awesome-cve-poc_qazbnm456
CVE-2019-12417 - https://github.com/fruh/security-bulletins
CVE-2019-12418 - https://github.com/ARPSyndicate/cvemon
CVE-2019-12418 - https://github.com/raner/projo
+CVE-2019-12418 - https://github.com/versio-io/product-lifecycle-security-api
CVE-2019-12418 - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
CVE-2019-12422 - https://github.com/ARPSyndicate/cvemon
CVE-2019-12422 - https://github.com/SugarP1g/LearningSecurity
@@ -64697,6 +65012,7 @@ CVE-2019-12814 - https://github.com/Al1ex/CVE-2019-12814
CVE-2019-12814 - https://github.com/Anonymous-Phunter/PHunter
CVE-2019-12814 - https://github.com/BorderTech/java-common
CVE-2019-12814 - https://github.com/CGCL-codes/PHunter
+CVE-2019-12814 - https://github.com/LibHunter/LibHunter
CVE-2019-12814 - https://github.com/SexyBeast233/SecBooks
CVE-2019-12814 - https://github.com/SugarP1g/LearningSecurity
CVE-2019-12814 - https://github.com/developer3000S/PoC-in-GitHub
@@ -65363,6 +65679,7 @@ CVE-2019-13272 - https://github.com/GhostTroops/TOP
CVE-2019-13272 - https://github.com/H0j3n/EzpzCheatSheet
CVE-2019-13272 - https://github.com/H1CH444MREB0RN/PenTest-free-tools
CVE-2019-13272 - https://github.com/HaleyWei/POC-available
+CVE-2019-13272 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2019-13272 - https://github.com/Huandtx/CVE-2019-13272
CVE-2019-13272 - https://github.com/ImranTheThirdEye/AD-Pentesting-Tools
CVE-2019-13272 - https://github.com/JERRY123S/all-poc
@@ -65467,6 +65784,7 @@ CVE-2019-13288 - https://github.com/EsharkyTheGreat/Xpdf-4.04-InfiniteStackRecur
CVE-2019-13288 - https://github.com/Fineas/CVE-2019-13288-POC
CVE-2019-13288 - https://github.com/asur4s/blog
CVE-2019-13288 - https://github.com/asur4s/fuzzing
+CVE-2019-13288 - https://github.com/ch1hyun/fuzzing-class
CVE-2019-13288 - https://github.com/chiehw/fuzzing
CVE-2019-13288 - https://github.com/gleaming0/CVE-2019-13288
CVE-2019-13289 - https://github.com/0xCyberY/CVE-T4PDF
@@ -65950,6 +66268,7 @@ CVE-2019-14040 - https://github.com/knd06/linux-kernel-exploitation
CVE-2019-14040 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2019-14040 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2019-14040 - https://github.com/tamirzb/CVE-2019-14040
+CVE-2019-14040 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2019-14040 - https://github.com/xairy/linux-kernel-exploitation
CVE-2019-14041 - https://github.com/0xT11/CVE-POC
CVE-2019-14041 - https://github.com/ARPSyndicate/cvemon
@@ -65966,6 +66285,7 @@ CVE-2019-14041 - https://github.com/knd06/linux-kernel-exploitation
CVE-2019-14041 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2019-14041 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2019-14041 - https://github.com/tamirzb/CVE-2019-14041
+CVE-2019-14041 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2019-14041 - https://github.com/xairy/linux-kernel-exploitation
CVE-2019-1405 - https://github.com/0xT11/CVE-POC
CVE-2019-1405 - https://github.com/65df4s/Erebusw
@@ -66330,6 +66650,7 @@ CVE-2019-14431 - https://github.com/Samsung/cotopaxi
CVE-2019-14439 - https://github.com/0xT11/CVE-POC
CVE-2019-14439 - https://github.com/Anonymous-Phunter/PHunter
CVE-2019-14439 - https://github.com/CGCL-codes/PHunter
+CVE-2019-14439 - https://github.com/LibHunter/LibHunter
CVE-2019-14439 - https://github.com/developer3000S/PoC-in-GitHub
CVE-2019-14439 - https://github.com/diakogiannis/moviebook
CVE-2019-14439 - https://github.com/galimba/Jackson-deserialization-PoC
@@ -66525,6 +66846,7 @@ CVE-2019-1477 - https://github.com/ycdxsb/WindowsPrivilegeEscalation
CVE-2019-14772 - https://github.com/ossf-cve-benchmark/CVE-2019-14772
CVE-2019-14773 - https://github.com/ARPSyndicate/cvemon
CVE-2019-14775 - https://github.com/lukaspustina/cve-scorer
+CVE-2019-14776 - https://github.com/ch1hyun/fuzzing-class
CVE-2019-14795 - https://github.com/ARPSyndicate/cvemon
CVE-2019-14799 - https://github.com/ARPSyndicate/cvemon
CVE-2019-1481 - https://github.com/barrracud4/image-upload-exploits
@@ -66581,6 +66903,7 @@ CVE-2019-14891 - https://github.com/cibvetr2/crio_research
CVE-2019-14892 - https://github.com/ARPSyndicate/cvemon
CVE-2019-14892 - https://github.com/Anonymous-Phunter/PHunter
CVE-2019-14892 - https://github.com/CGCL-codes/PHunter
+CVE-2019-14892 - https://github.com/LibHunter/LibHunter
CVE-2019-14892 - https://github.com/Live-Hack-CVE/CVE-2019-14892
CVE-2019-14892 - https://github.com/OWASP/www-project-ide-vulscanner
CVE-2019-14892 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs
@@ -66589,6 +66912,7 @@ CVE-2019-14892 - https://github.com/seal-community/patches
CVE-2019-14893 - https://github.com/ARPSyndicate/cvemon
CVE-2019-14893 - https://github.com/Anonymous-Phunter/PHunter
CVE-2019-14893 - https://github.com/CGCL-codes/PHunter
+CVE-2019-14893 - https://github.com/LibHunter/LibHunter
CVE-2019-14893 - https://github.com/OWASP/www-project-ide-vulscanner
CVE-2019-14893 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs
CVE-2019-14893 - https://github.com/seal-community/patches
@@ -67141,6 +67465,7 @@ CVE-2019-15658 - https://github.com/ossf-cve-benchmark/CVE-2019-15658
CVE-2019-15666 - https://github.com/Al1ex/LinuxEelvation
CVE-2019-15666 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
CVE-2019-15666 - https://github.com/DrewSC13/Linpeas
+CVE-2019-15666 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2019-15666 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2019-15666 - https://github.com/bsauce/kernel-exploit-factory
CVE-2019-15666 - https://github.com/bsauce/kernel-security-learning
@@ -67352,7 +67677,10 @@ CVE-2019-16098 - https://github.com/0xT11/CVE-POC
CVE-2019-16098 - https://github.com/474172261/KDU
CVE-2019-16098 - https://github.com/ARPSyndicate/cvemon
CVE-2019-16098 - https://github.com/Barakat/CVE-2019-16098
+CVE-2019-16098 - https://github.com/CVEDB/awesome-cve-repo
+CVE-2019-16098 - https://github.com/CVEDB/top
CVE-2019-16098 - https://github.com/ExpLife0011/awesome-windows-kernel-security-development
+CVE-2019-16098 - https://github.com/GhostTroops/TOP
CVE-2019-16098 - https://github.com/JustaT3ch/Kernel-Snooping
CVE-2019-16098 - https://github.com/Ondrik8/exploit
CVE-2019-16098 - https://github.com/developer3000S/PoC-in-GitHub
@@ -67763,6 +68091,7 @@ CVE-2019-16508 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2019-16508 - https://github.com/knd06/linux-kernel-exploitation
CVE-2019-16508 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2019-16508 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2019-16508 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2019-16508 - https://github.com/xairy/linux-kernel-exploitation
CVE-2019-16511 - https://github.com/GitHubAssessments/CVE_Assessments_09_2019
CVE-2019-16511 - https://github.com/jpbprakash/vuln
@@ -68022,6 +68351,7 @@ CVE-2019-16865 - https://github.com/ARPSyndicate/cvemon
CVE-2019-16869 - https://github.com/ARPSyndicate/cvemon
CVE-2019-16869 - https://github.com/Anonymous-Phunter/PHunter
CVE-2019-16869 - https://github.com/CGCL-codes/PHunter
+CVE-2019-16869 - https://github.com/LibHunter/LibHunter
CVE-2019-16869 - https://github.com/cezapata/appconfiguration-sample
CVE-2019-16880 - https://github.com/Artisan-Lab/Rust-memory-safety-bugs
CVE-2019-16881 - https://github.com/Artisan-Lab/Rust-memory-safety-bugs
@@ -68375,6 +68705,7 @@ CVE-2019-17262 - https://github.com/linhlhq/research
CVE-2019-17267 - https://github.com/ARPSyndicate/cvemon
CVE-2019-17267 - https://github.com/Anonymous-Phunter/PHunter
CVE-2019-17267 - https://github.com/CGCL-codes/PHunter
+CVE-2019-17267 - https://github.com/LibHunter/LibHunter
CVE-2019-17267 - https://github.com/OWASP/www-project-ide-vulscanner
CVE-2019-17267 - https://github.com/ilmari666/cybsec
CVE-2019-17267 - https://github.com/seal-community/patches
@@ -68389,6 +68720,7 @@ CVE-2019-17359 - https://github.com/Anonymous-Phunter/PHunter
CVE-2019-17359 - https://github.com/CGCL-codes/PHunter
CVE-2019-17359 - https://github.com/DennisFeldbusch/Fuzz
CVE-2019-17359 - https://github.com/GCFuzzer/SP2023
+CVE-2019-17359 - https://github.com/LibHunter/LibHunter
CVE-2019-17359 - https://github.com/hwen020/JQF
CVE-2019-17359 - https://github.com/mfatima1/CS182
CVE-2019-17359 - https://github.com/moudemans/GFuzz
@@ -68645,6 +68977,7 @@ CVE-2019-17559 - https://github.com/Live-Hack-CVE/CVE-2019-17559
CVE-2019-17563 - https://github.com/Live-Hack-CVE/CVE-2019-17563
CVE-2019-17563 - https://github.com/raner/projo
CVE-2019-17563 - https://github.com/rootameen/vulpine
+CVE-2019-17563 - https://github.com/versio-io/product-lifecycle-security-api
CVE-2019-17563 - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
CVE-2019-17564 - https://github.com/0xT11/CVE-POC
CVE-2019-17564 - https://github.com/ARPSyndicate/cvemon
@@ -68860,6 +69193,7 @@ CVE-2019-17625 - https://github.com/hectorgie/PoC-in-GitHub
CVE-2019-17626 - https://github.com/asa1997/topgear_test
CVE-2019-17632 - https://github.com/Anonymous-Phunter/PHunter
CVE-2019-17632 - https://github.com/CGCL-codes/PHunter
+CVE-2019-17632 - https://github.com/LibHunter/LibHunter
CVE-2019-17633 - https://github.com/0xT11/CVE-POC
CVE-2019-17633 - https://github.com/developer3000S/PoC-in-GitHub
CVE-2019-17633 - https://github.com/hectorgie/PoC-in-GitHub
@@ -69220,6 +69554,7 @@ CVE-2019-18675 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2019-18675 - https://github.com/knd06/linux-kernel-exploitation
CVE-2019-18675 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2019-18675 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2019-18675 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2019-18675 - https://github.com/xairy/linux-kernel-exploitation
CVE-2019-18679 - https://github.com/SexyBeast233/SecBooks
CVE-2019-18683 - https://github.com/0xT11/CVE-POC
@@ -69243,6 +69578,7 @@ CVE-2019-18683 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2019-18683 - https://github.com/qazbnm456/awesome-cve-poc
CVE-2019-18683 - https://github.com/sanjana123-cloud/CVE-2019-18683
CVE-2019-18683 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2019-18683 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2019-18683 - https://github.com/xairy/linux-kernel-exploitation
CVE-2019-18683 - https://github.com/xbl3/awesome-cve-poc_qazbnm456
CVE-2019-18775 - https://github.com/sjmini/icse2020-Solidity
@@ -69676,6 +70012,7 @@ CVE-2019-19377 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2019-19377 - https://github.com/knd06/linux-kernel-exploitation
CVE-2019-19377 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2019-19377 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2019-19377 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2019-19377 - https://github.com/xairy/linux-kernel-exploitation
CVE-2019-19378 - https://github.com/ARPSyndicate/cvemon
CVE-2019-19383 - https://github.com/0xT11/CVE-POC
@@ -70003,6 +70340,7 @@ CVE-2019-19781 - https://github.com/emtee40/win-pentest-tools
CVE-2019-19781 - https://github.com/faisal6me/DFIR-Note
CVE-2019-19781 - https://github.com/fcp999/centos
CVE-2019-19781 - https://github.com/fengjixuchui/RedTeamer
+CVE-2019-19781 - https://github.com/fierceoj/ShonyDanza
CVE-2019-19781 - https://github.com/gobysec/Goby
CVE-2019-19781 - https://github.com/hack-parthsharma/Pentest-Tools
CVE-2019-19781 - https://github.com/hackingyseguridad/nmap
@@ -70253,6 +70591,7 @@ CVE-2019-2000 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2019-2000 - https://github.com/knd06/linux-kernel-exploitation
CVE-2019-2000 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2019-2000 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2019-2000 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2019-2000 - https://github.com/xairy/linux-kernel-exploitation
CVE-2019-20002 - https://github.com/ARPSyndicate/cvemon
CVE-2019-2003 - https://github.com/ARPSyndicate/cvemon
@@ -70397,6 +70736,7 @@ CVE-2019-2025 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2019-2025 - https://github.com/knd06/linux-kernel-exploitation
CVE-2019-2025 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2019-2025 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2019-2025 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2019-2025 - https://github.com/xairy/linux-kernel-exploitation
CVE-2019-2027 - https://github.com/ARPSyndicate/cvemon
CVE-2019-2027 - https://github.com/hyrathon/trophies
@@ -70443,6 +70783,7 @@ CVE-2019-20414 - https://github.com/ARPSyndicate/cvemon
CVE-2019-20443 - https://github.com/cybersecurityworks553/Security-Advisories
CVE-2019-20444 - https://github.com/Anonymous-Phunter/PHunter
CVE-2019-20444 - https://github.com/CGCL-codes/PHunter
+CVE-2019-20444 - https://github.com/LibHunter/LibHunter
CVE-2019-20444 - https://github.com/cezapata/appconfiguration-sample
CVE-2019-20444 - https://github.com/yahoo/cubed
CVE-2019-20445 - https://github.com/cezapata/appconfiguration-sample
@@ -70570,6 +70911,7 @@ CVE-2019-2107 - https://github.com/CVEDB/PoC-List
CVE-2019-2107 - https://github.com/CVEDB/awesome-cve-repo
CVE-2019-2107 - https://github.com/CVEDB/top
CVE-2019-2107 - https://github.com/CnHack3r/Penetration_PoC
+CVE-2019-2107 - https://github.com/CrackerCat/CVE-2019-2107
CVE-2019-2107 - https://github.com/EchoGin404/-
CVE-2019-2107 - https://github.com/EchoGin404/gongkaishouji
CVE-2019-2107 - https://github.com/GhostTroops/TOP
@@ -70620,6 +70962,7 @@ CVE-2019-2181 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2019-2181 - https://github.com/knd06/linux-kernel-exploitation
CVE-2019-2181 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2019-2181 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2019-2181 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2019-2181 - https://github.com/xairy/linux-kernel-exploitation
CVE-2019-2187 - https://github.com/ARPSyndicate/cvemon
CVE-2019-2187 - https://github.com/hyrathon/trophies
@@ -70653,9 +70996,11 @@ CVE-2019-2214 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2019-2214 - https://github.com/knd06/linux-kernel-exploitation
CVE-2019-2214 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2019-2214 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2019-2214 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2019-2214 - https://github.com/xairy/linux-kernel-exploitation
CVE-2019-2215 - https://github.com/0xT11/CVE-POC
CVE-2019-2215 - https://github.com/ARPSyndicate/cvemon
+CVE-2019-2215 - https://github.com/ATorNinja/CVE-2019-2215
CVE-2019-2215 - https://github.com/Al1ex/LinuxEelvation
CVE-2019-2215 - https://github.com/Byte-Master-101/CVE-2019-2215
CVE-2019-2215 - https://github.com/CrackerCat/Rootsmart-v2.0
@@ -70720,6 +71065,7 @@ CVE-2019-2215 - https://github.com/themmokhtar/CVE-2020-0022
CVE-2019-2215 - https://github.com/timwr/CVE-2019-2215
CVE-2019-2215 - https://github.com/wateroot/poc-exp
CVE-2019-2215 - https://github.com/willboka/CVE-2019-2215-HuaweiP20Lite
+CVE-2019-2215 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2019-2215 - https://github.com/wrlu/Vulnerabilities
CVE-2019-2215 - https://github.com/xairy/linux-kernel-exploitation
CVE-2019-2215 - https://github.com/yud121212/Linux_Privilege_Escalation
@@ -70875,6 +71221,7 @@ CVE-2019-2618 - https://github.com/lp008/Hack-readme
CVE-2019-2618 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2019-2618 - https://github.com/pyn3rd/CVE-2019-2618
CVE-2019-2618 - https://github.com/qazbnm456/awesome-cve-poc
+CVE-2019-2618 - https://github.com/qtgavc/list
CVE-2019-2618 - https://github.com/r0eXpeR/redteam_vul
CVE-2019-2618 - https://github.com/reph0r/poc-exp
CVE-2019-2618 - https://github.com/reph0r/poc-exp-tools
@@ -70904,6 +71251,7 @@ CVE-2019-2684 - https://github.com/Live-Hack-CVE/CVE-2019-2684
CVE-2019-2684 - https://github.com/Live-Hack-CVE/CVE-2020-13946
CVE-2019-2684 - https://github.com/psifertex/ctf-vs-the-real-world
CVE-2019-2684 - https://github.com/qtc-de/remote-method-guesser
+CVE-2019-2684 - https://github.com/versio-io/product-lifecycle-security-api
CVE-2019-2692 - https://github.com/ARPSyndicate/cvemon
CVE-2019-2692 - https://github.com/hinat0y/Dataset1
CVE-2019-2692 - https://github.com/hinat0y/Dataset10
@@ -71158,6 +71506,7 @@ CVE-2019-2729 - https://github.com/pizza-power/weblogic-CVE-2019-2729-POC
CVE-2019-2729 - https://github.com/pwnagelabs/VEF
CVE-2019-2729 - https://github.com/qi4L/WeblogicScan.go
CVE-2019-2729 - https://github.com/qianxiao996/FrameScan
+CVE-2019-2729 - https://github.com/qtgavc/list
CVE-2019-2729 - https://github.com/rabbitmask/WeblogicScan
CVE-2019-2729 - https://github.com/rabbitmask/WeblogicScanLot
CVE-2019-2729 - https://github.com/rockmelodies/rocComExpRce
@@ -72447,6 +72796,7 @@ CVE-2019-5844 - https://github.com/Live-Hack-CVE/CVE-2019-5844
CVE-2019-5845 - https://github.com/Live-Hack-CVE/CVE-2019-5845
CVE-2019-5846 - https://github.com/Live-Hack-CVE/CVE-2019-5846
CVE-2019-5847 - https://github.com/RUB-SysSec/JIT-Picker
+CVE-2019-5847 - https://github.com/ch1hyun/fuzzing-class
CVE-2019-5847 - https://github.com/googleprojectzero/fuzzilli
CVE-2019-5847 - https://github.com/zhangjiahui-buaa/MasterThesis
CVE-2019-5850 - https://github.com/allpaca/chrome-sbx-db
@@ -72736,6 +73086,7 @@ CVE-2019-6340 - https://github.com/nobodyatall648/CVE-2019-6340
CVE-2019-6340 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2019-6340 - https://github.com/opflep/Drupalgeddon-Toolkit
CVE-2019-6340 - https://github.com/oways/CVE-2019-6340
+CVE-2019-6340 - https://github.com/pg001001/deception-tech
CVE-2019-6340 - https://github.com/pinkieli/GitHub-Chinese-Top-Charts
CVE-2019-6340 - https://github.com/qingyuanfeiniao/Chinese-Top-Charts
CVE-2019-6340 - https://github.com/resistezauxhackeurs/outils_audit_cms
@@ -73321,6 +73672,7 @@ CVE-2019-7308 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2019-7308 - https://github.com/knd06/linux-kernel-exploitation
CVE-2019-7308 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2019-7308 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2019-7308 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2019-7308 - https://github.com/xairy/linux-kernel-exploitation
CVE-2019-7309 - https://github.com/flyrev/security-scan-ci-presentation
CVE-2019-7310 - https://github.com/0xCyberY/CVE-T4PDF
@@ -74459,6 +74811,7 @@ CVE-2019-9213 - https://github.com/qazbnm456/awesome-cve-poc
CVE-2019-9213 - https://github.com/shizhongpwn/Skr_StudyEveryday
CVE-2019-9213 - https://github.com/soh0ro0t/HappyHackingOnLinux
CVE-2019-9213 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2019-9213 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2019-9213 - https://github.com/xairy/linux-kernel-exploitation
CVE-2019-9213 - https://github.com/xbl3/awesome-cve-poc_qazbnm456
CVE-2019-9215 - https://github.com/0n3m4ns4rmy/WhatTheBug
@@ -74524,6 +74877,7 @@ CVE-2019-9500 - https://github.com/lnick2023/nicenice
CVE-2019-9500 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2019-9500 - https://github.com/qazbnm456/awesome-cve-poc
CVE-2019-9500 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2019-9500 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2019-9500 - https://github.com/xairy/linux-kernel-exploitation
CVE-2019-9500 - https://github.com/xbl3/awesome-cve-poc_qazbnm456
CVE-2019-9501 - https://github.com/0xT11/CVE-POC
@@ -74556,6 +74910,7 @@ CVE-2019-9503 - https://github.com/lnick2023/nicenice
CVE-2019-9503 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2019-9503 - https://github.com/qazbnm456/awesome-cve-poc
CVE-2019-9503 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2019-9503 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2019-9503 - https://github.com/xairy/linux-kernel-exploitation
CVE-2019-9503 - https://github.com/xbl3/awesome-cve-poc_qazbnm456
CVE-2019-9506 - https://github.com/0xT11/CVE-POC
@@ -75041,6 +75396,7 @@ CVE-2020-0018 - https://github.com/he1m4n6a/cve-db
CVE-2020-0019 - https://github.com/TinyNiko/android_bulletin_notes
CVE-2020-0022 - https://github.com/0xT11/CVE-POC
CVE-2020-0022 - https://github.com/2lambda123/CVE-mitre
+CVE-2020-0022 - https://github.com/362902755/CVE-2020-0023
CVE-2020-0022 - https://github.com/5k1l/cve-2020-0022
CVE-2020-0022 - https://github.com/ARPSyndicate/cvemon
CVE-2020-0022 - https://github.com/JeffroMF/awesome-bluetooth-security321
@@ -75069,6 +75425,7 @@ CVE-2020-0022 - https://github.com/themmokhtar/CVE-2020-0022
CVE-2020-0022 - https://github.com/trhacknon/Pocingit
CVE-2020-0022 - https://github.com/wrlu/Vulnerabilities
CVE-2020-0022 - https://github.com/zecool/cve
+CVE-2020-0023 - https://github.com/362902755/CVE-2020-0023
CVE-2020-0026 - https://github.com/he1m4n6a/cve-db
CVE-2020-0027 - https://github.com/he1m4n6a/cve-db
CVE-2020-0032 - https://github.com/he1m4n6a/cve-db
@@ -75079,6 +75436,7 @@ CVE-2020-0036 - https://github.com/he1m4n6a/cve-db
CVE-2020-0037 - https://github.com/he1m4n6a/cve-db
CVE-2020-0038 - https://github.com/he1m4n6a/cve-db
CVE-2020-0039 - https://github.com/he1m4n6a/cve-db
+CVE-2020-0041 - https://github.com/0xMarcio/cve
CVE-2020-0041 - https://github.com/0xT11/CVE-POC
CVE-2020-0041 - https://github.com/0xZipp0/BIBLE
CVE-2020-0041 - https://github.com/ARPSyndicate/cvemon
@@ -75142,6 +75500,7 @@ CVE-2020-0041 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2020-0041 - https://github.com/trhacknon/Pocingit
CVE-2020-0041 - https://github.com/vaginessa/CVE-2020-0041-Pixel-3a
CVE-2020-0041 - https://github.com/weeka10/-hktalent-TOP
+CVE-2020-0041 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2020-0041 - https://github.com/xairy/linux-kernel-exploitation
CVE-2020-0041 - https://github.com/yeyintminthuhtut/Awesome-Advanced-Windows-Exploitation-References
CVE-2020-0041 - https://github.com/yusufazizmustofa/BIBLE
@@ -75419,6 +75778,7 @@ CVE-2020-0423 - https://github.com/knd06/linux-kernel-exploitation
CVE-2020-0423 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2020-0423 - https://github.com/sparrow-labz/CVE-2020-0423
CVE-2020-0423 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2020-0423 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2020-0423 - https://github.com/xairy/linux-kernel-exploitation
CVE-2020-0424 - https://github.com/TinyNiko/android_bulletin_notes
CVE-2020-0427 - https://github.com/ARPSyndicate/cvemon
@@ -77325,6 +77685,7 @@ CVE-2020-10135 - https://github.com/WinMin/Protocol-Vul
CVE-2020-10135 - https://github.com/developer3000S/PoC-in-GitHub
CVE-2020-10135 - https://github.com/engn33r/awesome-bluetooth-security
CVE-2020-10135 - https://github.com/hectorgie/PoC-in-GitHub
+CVE-2020-10135 - https://github.com/m4rm0k/CVE-2020-10135-BIAS
CVE-2020-10135 - https://github.com/marcinguy/CVE-2020-10135-BIAS
CVE-2020-10135 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2020-10135 - https://github.com/sgxgsx/BlueToolkit
@@ -78288,6 +78649,7 @@ CVE-2020-10682 - https://github.com/JoshuaProvoste/joshuaprovoste
CVE-2020-10683 - https://github.com/ARPSyndicate/cvemon
CVE-2020-10683 - https://github.com/Anonymous-Phunter/PHunter
CVE-2020-10683 - https://github.com/CGCL-codes/PHunter
+CVE-2020-10683 - https://github.com/LibHunter/LibHunter
CVE-2020-10683 - https://github.com/OWASP/www-project-ide-vulscanner
CVE-2020-10684 - https://github.com/ARPSyndicate/cvemon
CVE-2020-10684 - https://github.com/Live-Hack-CVE/CVE-2020-10684
@@ -78921,6 +79283,7 @@ CVE-2020-11179 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2020-11179 - https://github.com/knd06/linux-kernel-exploitation
CVE-2020-11179 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2020-11179 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2020-11179 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2020-11179 - https://github.com/xairy/linux-kernel-exploitation
CVE-2020-11180 - https://github.com/TinyNiko/android_bulletin_notes
CVE-2020-11181 - https://github.com/TinyNiko/android_bulletin_notes
@@ -79772,6 +80135,7 @@ CVE-2020-11996 - https://github.com/hectorgie/PoC-in-GitHub
CVE-2020-11996 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2020-11996 - https://github.com/rusakovichma/tomcat-embed-core-9.0.31-CVE-2020-11996
CVE-2020-11996 - https://github.com/soosmile/POC
+CVE-2020-11996 - https://github.com/versio-io/product-lifecycle-security-api
CVE-2020-11996 - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
CVE-2020-11998 - https://github.com/404notf0und/CVE-Flow
CVE-2020-11998 - https://github.com/zhzhdoai/JAVA_Env-Poc
@@ -79860,6 +80224,7 @@ CVE-2020-12078 - https://github.com/tdtc7/qps
CVE-2020-12079 - https://github.com/Live-Hack-CVE/CVE-2020-12079
CVE-2020-1208 - https://github.com/ARPSyndicate/cvemon
CVE-2020-1208 - https://github.com/ferdinandmudjialim/metasploit-cve-search
+CVE-2020-1208 - https://github.com/tunnelcat/metasploit-cve-search
CVE-2020-1210 - https://github.com/404notf0und/CVE-Flow
CVE-2020-1210 - https://github.com/Cheroxx/Patch-Tuesday-Updates
CVE-2020-12100 - https://github.com/Live-Hack-CVE/CVE-2020-12100
@@ -79967,11 +80332,14 @@ CVE-2020-1234 - https://github.com/influxdata/sedg
CVE-2020-1234 - https://github.com/ivanid22/NVD-scraper
CVE-2020-1234 - https://github.com/strobes-co/ql-documentation
CVE-2020-1234 - https://github.com/tahtaciburak/CyAnnuaire
+CVE-2020-1234 - https://github.com/tunnelcat/metasploit-cve-search
CVE-2020-12340 - https://github.com/ARPSyndicate/cvemon
CVE-2020-12340 - https://github.com/ferdinandmudjialim/metasploit-cve-search
+CVE-2020-12340 - https://github.com/tunnelcat/metasploit-cve-search
CVE-2020-1234567 - https://github.com/DataSurgeon-ds/ds-cve-plugin
CVE-2020-1234567 - https://github.com/seifrajhi/aws-devops-pro-notes
CVE-2020-123477 - https://github.com/ferdinandmudjialim/metasploit-cve-search
+CVE-2020-123477 - https://github.com/tunnelcat/metasploit-cve-search
CVE-2020-12351 - https://github.com/ARPSyndicate/cvemon
CVE-2020-12351 - https://github.com/Charmve/BLE-Security-Attack-Defence
CVE-2020-12351 - https://github.com/Dikens88/hopp
@@ -80001,6 +80369,7 @@ CVE-2020-12351 - https://github.com/sgxgsx/BlueToolkit
CVE-2020-12351 - https://github.com/shannonmullins/hopp
CVE-2020-12351 - https://github.com/soosmile/POC
CVE-2020-12351 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2020-12351 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2020-12351 - https://github.com/xairy/linux-kernel-exploitation
CVE-2020-12352 - https://github.com/ARPSyndicate/cvemon
CVE-2020-12352 - https://github.com/Charmve/BLE-Security-Attack-Defence
@@ -80026,6 +80395,7 @@ CVE-2020-12352 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2020-12352 - https://github.com/sgxgsx/BlueToolkit
CVE-2020-12352 - https://github.com/shannonmullins/hopp
CVE-2020-12352 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2020-12352 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2020-12352 - https://github.com/xairy/linux-kernel-exploitation
CVE-2020-12362 - https://github.com/ARPSyndicate/cvemon
CVE-2020-12363 - https://github.com/ARPSyndicate/cvemon
@@ -80360,6 +80730,7 @@ CVE-2020-12865 - https://github.com/Live-Hack-CVE/CVE-2020-12865
CVE-2020-12866 - https://github.com/Live-Hack-CVE/CVE-2020-12866
CVE-2020-12867 - https://github.com/Live-Hack-CVE/CVE-2020-12867
CVE-2020-12872 - https://github.com/Live-Hack-CVE/CVE-2020-12872
+CVE-2020-12872 - https://github.com/catsploit/catsploit
CVE-2020-12873 - https://github.com/mbadanoiu/CVE-2023-49964
CVE-2020-12873 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2020-12882 - https://github.com/ARPSyndicate/cvemon
@@ -80735,6 +81106,7 @@ CVE-2020-13493 - https://github.com/Live-Hack-CVE/CVE-2020-13493
CVE-2020-13494 - https://github.com/Live-Hack-CVE/CVE-2020-13494
CVE-2020-13497 - https://github.com/Live-Hack-CVE/CVE-2020-13497
CVE-2020-13498 - https://github.com/Live-Hack-CVE/CVE-2020-13498
+CVE-2020-1350 - https://github.com/0xMarcio/cve
CVE-2020-1350 - https://github.com/0xT11/CVE-POC
CVE-2020-1350 - https://github.com/20142995/sectool
CVE-2020-1350 - https://github.com/2lambda123/diaphora
@@ -80794,6 +81166,7 @@ CVE-2020-1350 - https://github.com/maxpl0it/CVE-2020-1350-DoS
CVE-2020-1350 - https://github.com/mr-r3b00t/CVE-2020-1350
CVE-2020-1350 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2020-1350 - https://github.com/password520/Penetration_PoC
+CVE-2020-1350 - https://github.com/pg001001/deception-tech
CVE-2020-1350 - https://github.com/psc4re/NSE-scripts
CVE-2020-1350 - https://github.com/rudraimmunefi/source-code-review
CVE-2020-1350 - https://github.com/rudrapwn/source-code-review
@@ -80983,6 +81356,7 @@ CVE-2020-13753 - https://github.com/ARPSyndicate/cvemon
CVE-2020-13753 - https://github.com/hartwork/antijack
CVE-2020-13757 - https://github.com/ARPSyndicate/cvemon
CVE-2020-13757 - https://github.com/AdiRashkes/python-tda-bug-hunt-0
+CVE-2020-13757 - https://github.com/seal-community/patches
CVE-2020-13759 - https://github.com/Artisan-Lab/Rust-memory-safety-bugs
CVE-2020-1376 - https://github.com/404notf0und/CVE-Flow
CVE-2020-13765 - https://github.com/Live-Hack-CVE/CVE-2020-13765
@@ -81159,8 +81533,10 @@ CVE-2020-13933 - https://github.com/soosmile/POC
CVE-2020-13933 - https://github.com/superlink996/chunqiuyunjingbachang
CVE-2020-13933 - https://github.com/woods-sega/woodswiki
CVE-2020-13933 - https://github.com/xhycccc/Shiro-Vuln-Demo
+CVE-2020-13934 - https://github.com/versio-io/product-lifecycle-security-api
CVE-2020-13934 - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
CVE-2020-13935 - https://github.com/0day404/vulnerability-poc
+CVE-2020-13935 - https://github.com/0xMarcio/cve
CVE-2020-13935 - https://github.com/20142995/sectool
CVE-2020-13935 - https://github.com/2lambda123/CVE-mitre
CVE-2020-13935 - https://github.com/404notf0und/CVE-Flow
@@ -81193,6 +81569,7 @@ CVE-2020-13935 - https://github.com/taielab/awesome-hacking-lists
CVE-2020-13935 - https://github.com/trganda/dockerv
CVE-2020-13935 - https://github.com/trganda/starrlist
CVE-2020-13935 - https://github.com/tzwlhack/Vulnerability
+CVE-2020-13935 - https://github.com/versio-io/product-lifecycle-security-api
CVE-2020-13935 - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
CVE-2020-13935 - https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
CVE-2020-13935 - https://github.com/xuetusummer/Penetration_Testing_POC
@@ -81248,6 +81625,7 @@ CVE-2020-1394 - https://github.com/hyjun0407/COMRaceConditionSeeker
CVE-2020-13942 - https://github.com/1135/unomi_exploit
CVE-2020-13942 - https://github.com/ARPSyndicate/cvemon
CVE-2020-13942 - https://github.com/ARPSyndicate/kenzer-templates
+CVE-2020-13942 - https://github.com/CLincat/vulcat
CVE-2020-13942 - https://github.com/EdgeSecurityTeam/Vulnerability
CVE-2020-13942 - https://github.com/Elsfa7-110/kenzer-templates
CVE-2020-13942 - https://github.com/HimmelAward/Goby_POC
@@ -81284,6 +81662,7 @@ CVE-2020-13942 - https://github.com/yaunsky/Unomi-CVE-2020-13942
CVE-2020-13942 - https://github.com/zhzyker/vulmap
CVE-2020-13943 - https://github.com/ARPSyndicate/cvemon
CVE-2020-13943 - https://github.com/Live-Hack-CVE/CVE-2020-13943
+CVE-2020-13943 - https://github.com/versio-io/product-lifecycle-security-api
CVE-2020-13943 - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
CVE-2020-13945 - https://github.com/ARPSyndicate/cvemon
CVE-2020-13945 - https://github.com/ARPSyndicate/kenzer-templates
@@ -81794,6 +82173,7 @@ CVE-2020-14356 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2020-14356 - https://github.com/knd06/linux-kernel-exploitation
CVE-2020-14356 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2020-14356 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2020-14356 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2020-14356 - https://github.com/xairy/linux-kernel-exploitation
CVE-2020-14361 - https://github.com/Live-Hack-CVE/CVE-2020-14361
CVE-2020-14362 - https://github.com/Live-Hack-CVE/CVE-2020-14362
@@ -81871,6 +82251,7 @@ CVE-2020-14381 - https://github.com/nanopathi/linux-4.19.72_CVE-2020-14381
CVE-2020-14381 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2020-14381 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2020-14381 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2020-14381 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2020-14381 - https://github.com/xairy/linux-kernel-exploitation
CVE-2020-14383 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2020-14384 - https://github.com/404notf0und/CVE-Flow
@@ -81911,6 +82292,7 @@ CVE-2020-14386 - https://github.com/source-xu/docker-vuls
CVE-2020-14386 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2020-14386 - https://github.com/taielab/awesome-hacking-lists
CVE-2020-14386 - https://github.com/teamssix/container-escape-check
+CVE-2020-14386 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2020-14386 - https://github.com/xairy/linux-kernel-exploitation
CVE-2020-14389 - https://github.com/Live-Hack-CVE/CVE-2020-14389
CVE-2020-14390 - https://github.com/ZIllR0/Routers
@@ -82708,6 +83090,7 @@ CVE-2020-14882 - https://github.com/Singhsanjeev617/A-Red-Teamer-diaries
CVE-2020-14882 - https://github.com/SouthWind0/southwind0.github.io
CVE-2020-14882 - https://github.com/Threekiii/Awesome-Exploit
CVE-2020-14882 - https://github.com/Threekiii/Awesome-POC
+CVE-2020-14882 - https://github.com/Threekiii/Awesome-Redteam
CVE-2020-14882 - https://github.com/Threekiii/Vulhub-Reproduce
CVE-2020-14882 - https://github.com/Umarovm/-Patched-McMaster-University-Blind-Command-Injection
CVE-2020-14882 - https://github.com/Weik1/Artillery
@@ -83849,6 +84232,7 @@ CVE-2020-16119 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2020-16119 - https://github.com/knd06/linux-kernel-exploitation
CVE-2020-16119 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2020-16119 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2020-16119 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2020-16119 - https://github.com/xairy/linux-kernel-exploitation
CVE-2020-1612 - https://github.com/zev3n/Ubuntu-Gnome-privilege-escalation
CVE-2020-16122 - https://github.com/Live-Hack-CVE/CVE-2020-16122
@@ -84791,6 +85175,7 @@ CVE-2020-17527 - https://github.com/forse01/CVE-2020-17527-Tomcat
CVE-2020-17527 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2020-17527 - https://github.com/pctF/vulnerable-app
CVE-2020-17527 - https://github.com/scordero1234/java_sec_demo-main
+CVE-2020-17527 - https://github.com/versio-io/product-lifecycle-security-api
CVE-2020-17527 - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
CVE-2020-1753 - https://github.com/20142995/pocsuite3
CVE-2020-1753 - https://github.com/Live-Hack-CVE/CVE-2020-1753
@@ -85019,6 +85404,7 @@ CVE-2020-1934 - https://github.com/vshaliii/Vegeta1-Vulhub-Walkthrough
CVE-2020-1935 - https://github.com/mklmfane/betvictor
CVE-2020-1935 - https://github.com/mo-xiaoxi/HDiff
CVE-2020-1935 - https://github.com/raner/projo
+CVE-2020-1935 - https://github.com/versio-io/product-lifecycle-security-api
CVE-2020-1935 - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
CVE-2020-19360 - https://github.com/0day404/vulnerability-poc
CVE-2020-19360 - https://github.com/20142995/Goby
@@ -85219,6 +85605,7 @@ CVE-2020-1938 - https://github.com/threedr3am/learnjavabug
CVE-2020-1938 - https://github.com/tpt11fb/AttackTomcat
CVE-2020-1938 - https://github.com/uuuuuuuzi/BugRepairsuggestions
CVE-2020-1938 - https://github.com/veo/vscan
+CVE-2020-1938 - https://github.com/versio-io/product-lifecycle-security-api
CVE-2020-1938 - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
CVE-2020-1938 - https://github.com/w4fz5uck5/CVE-2020-1938-Clean-Version
CVE-2020-1938 - https://github.com/weeka10/-hktalent-TOP
@@ -85720,6 +86107,7 @@ CVE-2020-21534 - https://github.com/ARPSyndicate/cvemon
CVE-2020-21535 - https://github.com/Live-Hack-CVE/CVE-2020-21535
CVE-2020-21551 - https://github.com/Creamy-Chicken-Soup/writeups-about-analysis-CVEs-and-Exploits-on-the-Windows
CVE-2020-21551 - https://github.com/SpikySabra/Kernel-Cactus
+CVE-2020-21551 - https://github.com/TheMalwareGuardian/Awesome-Bootkits-Rootkits-Development
CVE-2020-21585 - https://github.com/EdgeSecurityTeam/Vulnerability
CVE-2020-21585 - https://github.com/tzwlhack/Vulnerability
CVE-2020-2159 - https://github.com/Live-Hack-CVE/CVE-2020-2159
@@ -86247,6 +86635,7 @@ CVE-2020-24490 - https://github.com/sereok3/buffer-overflow-writeups
CVE-2020-24490 - https://github.com/sgxgsx/BlueToolkit
CVE-2020-24490 - https://github.com/shannonmullins/hopp
CVE-2020-24490 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2020-24490 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2020-24490 - https://github.com/xairy/linux-kernel-exploitation
CVE-2020-24492 - https://github.com/DNTYO/F5_Vulnerability
CVE-2020-24493 - https://github.com/DNTYO/F5_Vulnerability
@@ -86793,6 +87182,7 @@ CVE-2020-25220 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2020-25220 - https://github.com/knd06/linux-kernel-exploitation
CVE-2020-25220 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2020-25220 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2020-25220 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2020-25220 - https://github.com/xairy/linux-kernel-exploitation
CVE-2020-25221 - https://github.com/404notf0und/CVE-Flow
CVE-2020-25221 - https://github.com/ARPSyndicate/cvemon
@@ -87210,6 +87600,7 @@ CVE-2020-25540 - https://github.com/superlink996/chunqiuyunjingbachang
CVE-2020-25540 - https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
CVE-2020-25540 - https://github.com/xuetusummer/Penetration_Testing_POC
CVE-2020-2555 - https://github.com/0x727/JNDIExploit
+CVE-2020-2555 - https://github.com/0xMarcio/cve
CVE-2020-2555 - https://github.com/0xT11/CVE-POC
CVE-2020-2555 - https://github.com/0xn0ne/weblogicScanner
CVE-2020-2555 - https://github.com/20142995/Goby
@@ -87480,6 +87871,7 @@ CVE-2020-25657 - https://github.com/ARPSyndicate/cvemon
CVE-2020-25657 - https://github.com/alexcowperthwaite/PasskeyScanner
CVE-2020-25658 - https://github.com/ARPSyndicate/cvemon
CVE-2020-25658 - https://github.com/AdiRashkes/python-tda-bug-hunt-0
+CVE-2020-25658 - https://github.com/seal-community/patches
CVE-2020-25659 - https://github.com/ARPSyndicate/cvemon
CVE-2020-25659 - https://github.com/AdiRashkes/python-tda-bug-hunt-2
CVE-2020-25659 - https://github.com/alexcowperthwaite/PasskeyScanner
@@ -88091,6 +88483,7 @@ CVE-2020-26939 - https://github.com/ARPSyndicate/cvemon
CVE-2020-26939 - https://github.com/Anonymous-Phunter/PHunter
CVE-2020-26939 - https://github.com/CGCL-codes/PHunter
CVE-2020-26939 - https://github.com/IkerSaint/VULNAPP-vulnerable-app
+CVE-2020-26939 - https://github.com/LibHunter/LibHunter
CVE-2020-26939 - https://github.com/box/box-java-sdk
CVE-2020-26939 - https://github.com/pctF/vulnerable-app
CVE-2020-2694 - https://github.com/20142995/Goby
@@ -88167,6 +88560,7 @@ CVE-2020-27193 - https://github.com/deepakdba/cve_checklist
CVE-2020-27193 - https://github.com/radtek/cve_checklist
CVE-2020-27194 - https://github.com/ARPSyndicate/cvemon
CVE-2020-27194 - https://github.com/Al1ex/LinuxEelvation
+CVE-2020-27194 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2020-27194 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2020-27194 - https://github.com/OrangeGzY/security-research-learning
CVE-2020-27194 - https://github.com/XiaozaYa/CVE-Recording
@@ -88189,6 +88583,7 @@ CVE-2020-27194 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2020-27194 - https://github.com/scannells/exploits
CVE-2020-27194 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2020-27194 - https://github.com/willinin/CVE-2020-27194-exp
+CVE-2020-27194 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2020-27194 - https://github.com/xairy/linux-kernel-exploitation
CVE-2020-27194 - https://github.com/xmzyshypnc/CVE-2020-27194
CVE-2020-27199 - https://github.com/9lyph/CVE-2020-27199
@@ -88444,6 +88839,7 @@ CVE-2020-27786 - https://github.com/kiks7/CVE-2020-27786-Kernel-Exploit
CVE-2020-27786 - https://github.com/knd06/linux-kernel-exploitation
CVE-2020-27786 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2020-27786 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2020-27786 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2020-27786 - https://github.com/xairy/linux-kernel-exploitation
CVE-2020-27787 - https://github.com/Live-Hack-CVE/CVE-2020-27787
CVE-2020-27788 - https://github.com/Live-Hack-CVE/CVE-2020-27788
@@ -88783,6 +89179,7 @@ CVE-2020-2805 - https://github.com/alphaSeclab/sec-daily-2020
CVE-2020-28052 - https://github.com/ARPSyndicate/cvemon
CVE-2020-28052 - https://github.com/Anonymous-Phunter/PHunter
CVE-2020-28052 - https://github.com/CGCL-codes/PHunter
+CVE-2020-28052 - https://github.com/LibHunter/LibHunter
CVE-2020-28052 - https://github.com/Live-Hack-CVE/CVE-2020-2805
CVE-2020-28052 - https://github.com/Live-Hack-CVE/CVE-2020-28052
CVE-2020-28052 - https://github.com/alphaSeclab/sec-daily-2020
@@ -88910,6 +89307,7 @@ CVE-2020-28343 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2020-28343 - https://github.com/knd06/linux-kernel-exploitation
CVE-2020-28343 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2020-28343 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2020-28343 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2020-28343 - https://github.com/xairy/linux-kernel-exploitation
CVE-2020-28347 - https://github.com/ARPSyndicate/cvemon
CVE-2020-28347 - https://github.com/rdomanski/Exploits_and_Advisories
@@ -89043,6 +89441,7 @@ CVE-2020-28588 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2020-28588 - https://github.com/knd06/linux-kernel-exploitation
CVE-2020-28588 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2020-28588 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2020-28588 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2020-28588 - https://github.com/xairy/linux-kernel-exploitation
CVE-2020-28589 - https://github.com/Live-Hack-CVE/CVE-2020-28589
CVE-2020-28590 - https://github.com/Live-Hack-CVE/CVE-2020-28590
@@ -89171,6 +89570,7 @@ CVE-2020-2880 - https://github.com/MrTuxracer/advisories
CVE-2020-2881 - https://github.com/ARPSyndicate/cvemon
CVE-2020-2881 - https://github.com/MrTuxracer/advisories
CVE-2020-2883 - https://github.com/0x727/JNDIExploit
+CVE-2020-2883 - https://github.com/0xMarcio/cve
CVE-2020-2883 - https://github.com/0xT11/CVE-POC
CVE-2020-2883 - https://github.com/0xdu/WLExploit
CVE-2020-2883 - https://github.com/0xn0ne/weblogicScanner
@@ -89934,6 +90334,7 @@ CVE-2020-3452 - https://github.com/drizzt-do-urden-da-drow/CISCO
CVE-2020-3452 - https://github.com/dwisiswant0/awesome-oneliner-bugbounty
CVE-2020-3452 - https://github.com/faisalfs10x/Cisco-CVE-2020-3452-shodan-scanner
CVE-2020-3452 - https://github.com/faisalfs10x/dirty-scripts
+CVE-2020-3452 - https://github.com/fierceoj/ShonyDanza
CVE-2020-3452 - https://github.com/foulenzer/CVE-2020-3452
CVE-2020-3452 - https://github.com/fuzzlove/Cisco-ASA-FTD-Web-Services-Traversal
CVE-2020-3452 - https://github.com/grim3/CVE-2020-3452
@@ -90576,6 +90977,7 @@ CVE-2020-36180 - https://github.com/ARPSyndicate/cvemon
CVE-2020-36180 - https://github.com/Al1ex/Al1ex
CVE-2020-36180 - https://github.com/Al1ex/CVE-2020-36179
CVE-2020-36180 - https://github.com/Live-Hack-CVE/CVE-2020-36180
+CVE-2020-36180 - https://github.com/enomothem/PenTestNote
CVE-2020-36180 - https://github.com/seal-community/patches
CVE-2020-36181 - https://github.com/Al1ex/Al1ex
CVE-2020-36181 - https://github.com/Al1ex/CVE-2020-36179
@@ -90586,6 +90988,7 @@ CVE-2020-36182 - https://github.com/Al1ex/Al1ex
CVE-2020-36182 - https://github.com/Al1ex/CVE-2020-36179
CVE-2020-36182 - https://github.com/Anonymous-Phunter/PHunter
CVE-2020-36182 - https://github.com/CGCL-codes/PHunter
+CVE-2020-36182 - https://github.com/LibHunter/LibHunter
CVE-2020-36182 - https://github.com/Live-Hack-CVE/CVE-2020-36182
CVE-2020-36182 - https://github.com/seal-community/patches
CVE-2020-36183 - https://github.com/Live-Hack-CVE/CVE-2020-36183
@@ -90917,6 +91320,7 @@ CVE-2020-3680 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2020-3680 - https://github.com/knd06/linux-kernel-exploitation
CVE-2020-3680 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2020-3680 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2020-3680 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2020-3680 - https://github.com/xairy/linux-kernel-exploitation
CVE-2020-36825 - https://github.com/NaInSec/CVE-LIST
CVE-2020-36825 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -91010,6 +91414,7 @@ CVE-2020-3950 - https://github.com/lnick2023/nicenice
CVE-2020-3950 - https://github.com/mirchr/security-research
CVE-2020-3950 - https://github.com/qazbnm456/awesome-cve-poc
CVE-2020-3950 - https://github.com/xbl3/awesome-cve-poc_qazbnm456
+CVE-2020-3952 - https://github.com/0xMarcio/cve
CVE-2020-3952 - https://github.com/0xMrNiko/Awesome-Red-Teaming
CVE-2020-3952 - https://github.com/0xT11/CVE-POC
CVE-2020-3952 - https://github.com/20142995/sectool
@@ -91925,6 +92330,7 @@ CVE-2020-5902 - https://github.com/elinakrmova/RedTeam-Tools
CVE-2020-5902 - https://github.com/emtee40/win-pentest-tools
CVE-2020-5902 - https://github.com/f5devcentral/cve-2020-5902-ioc-bigip-checker
CVE-2020-5902 - https://github.com/faisalfs10x/F5-BIG-IP-CVE-2020-5902-shodan-scanner
+CVE-2020-5902 - https://github.com/fierceoj/ShonyDanza
CVE-2020-5902 - https://github.com/freeFV/CVE-2020-5902-fofa-scan
CVE-2020-5902 - https://github.com/freeFV/CVE-2020-6308-mass-exploiter
CVE-2020-5902 - https://github.com/gaahrdner/starred
@@ -92392,6 +92798,7 @@ CVE-2020-6425 - https://github.com/Live-Hack-CVE/CVE-2020-6425
CVE-2020-6425 - https://github.com/allpaca/chrome-sbx-db
CVE-2020-6427 - https://github.com/ARPSyndicate/cvemon
CVE-2020-6427 - https://github.com/ferdinandmudjialim/metasploit-cve-search
+CVE-2020-6427 - https://github.com/tunnelcat/metasploit-cve-search
CVE-2020-6431 - https://github.com/Live-Hack-CVE/CVE-2020-6431
CVE-2020-6432 - https://github.com/Live-Hack-CVE/CVE-2020-6432
CVE-2020-6433 - https://github.com/Live-Hack-CVE/CVE-2020-6433
@@ -93395,6 +93802,7 @@ CVE-2020-8012 - https://github.com/wetw0rk/Exploit-Development
CVE-2020-8013 - https://github.com/Live-Hack-CVE/CVE-2020-8013
CVE-2020-8016 - https://github.com/Live-Hack-CVE/CVE-2020-8016
CVE-2020-8017 - https://github.com/Live-Hack-CVE/CVE-2020-8017
+CVE-2020-8022 - https://github.com/versio-io/product-lifecycle-security-api
CVE-2020-8022 - https://github.com/vincent-deng/veracode-container-security-finding-parser
CVE-2020-8023 - https://github.com/404notf0und/CVE-Flow
CVE-2020-8023 - https://github.com/ARPSyndicate/cvemon
@@ -93430,6 +93838,7 @@ CVE-2020-8116 - https://github.com/AleBekk/DependencyCheckParser
CVE-2020-8116 - https://github.com/ossf-cve-benchmark/CVE-2020-8116
CVE-2020-8124 - https://github.com/seal-community/patches
CVE-2020-8130 - https://github.com/ARPSyndicate/cvemon
+CVE-2020-8130 - https://github.com/m-mizutani/octovy
CVE-2020-8130 - https://github.com/m-mizutani/triview
CVE-2020-8130 - https://github.com/wxianfeng/hanzi_to_pinyin
CVE-2020-8135 - https://github.com/ossf-cve-benchmark/CVE-2020-8135
@@ -94109,6 +94518,7 @@ CVE-2020-8597 - https://github.com/WinMin/Protocol-Vul
CVE-2020-8597 - https://github.com/YIXINSHUWU/Penetration_Testing_POC
CVE-2020-8597 - https://github.com/ZTK-009/Penetration_PoC
CVE-2020-8597 - https://github.com/developer3000S/PoC-in-GitHub
+CVE-2020-8597 - https://github.com/dointisme/CVE-2020-8597
CVE-2020-8597 - https://github.com/hasee2018/Penetration_Testing_POC
CVE-2020-8597 - https://github.com/hectorgie/PoC-in-GitHub
CVE-2020-8597 - https://github.com/hktalent/bug-bounty
@@ -94426,6 +94836,7 @@ CVE-2020-8835 - https://github.com/0xT11/CVE-POC
CVE-2020-8835 - https://github.com/ARPSyndicate/cvemon
CVE-2020-8835 - https://github.com/Al1ex/LinuxEelvation
CVE-2020-8835 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
+CVE-2020-8835 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2020-8835 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2020-8835 - https://github.com/KatsuragiCSL/Presentations-Blogs-Papers-Tutorials-Books
CVE-2020-8835 - https://github.com/OrangeGzY/security-research-learning
@@ -94455,6 +94866,7 @@ CVE-2020-8835 - https://github.com/snappyJack/Rick_write_exp_CVE-2020-8835
CVE-2020-8835 - https://github.com/snorez/ebpf-fuzzer
CVE-2020-8835 - https://github.com/soosmile/POC
CVE-2020-8835 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2020-8835 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2020-8835 - https://github.com/xairy/linux-kernel-exploitation
CVE-2020-8835 - https://github.com/xmzyshypnc/CVE-2020-27194
CVE-2020-8835 - https://github.com/yoniko/gctf21_ebpf
@@ -94475,6 +94887,7 @@ CVE-2020-8840 - https://github.com/Dzmitry-Basiachenka/dist-foreign-aliakh
CVE-2020-8840 - https://github.com/EchoGin404/-
CVE-2020-8840 - https://github.com/EchoGin404/gongkaishouji
CVE-2020-8840 - https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet
+CVE-2020-8840 - https://github.com/LibHunter/LibHunter
CVE-2020-8840 - https://github.com/Mr-xn/Penetration_Testing_POC
CVE-2020-8840 - https://github.com/NetW0rK1le3r/awesome-hacking-lists
CVE-2020-8840 - https://github.com/OWASP/www-project-ide-vulscanner
@@ -95122,6 +95535,7 @@ CVE-2020-9484 - https://github.com/soosmile/POC
CVE-2020-9484 - https://github.com/taielab/awesome-hacking-lists
CVE-2020-9484 - https://github.com/tdtc7/qps
CVE-2020-9484 - https://github.com/threedr3am/tomcat-cluster-session-sync-exp
+CVE-2020-9484 - https://github.com/versio-io/product-lifecycle-security-api
CVE-2020-9484 - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
CVE-2020-9484 - https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
CVE-2020-9484 - https://github.com/woods-sega/woodswiki
@@ -95238,6 +95652,7 @@ CVE-2020-9546 - https://github.com/ARPSyndicate/cvemon
CVE-2020-9546 - https://github.com/Anonymous-Phunter/PHunter
CVE-2020-9546 - https://github.com/CGCL-codes/PHunter
CVE-2020-9546 - https://github.com/Dzmitry-Basiachenka/dist-foreign-aliakh
+CVE-2020-9546 - https://github.com/LibHunter/LibHunter
CVE-2020-9546 - https://github.com/OWASP/www-project-ide-vulscanner
CVE-2020-9546 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs
CVE-2020-9546 - https://github.com/lnick2023/nicenice
@@ -95908,6 +96323,7 @@ CVE-2021-0340 - https://github.com/zecool/cve
CVE-2021-0341 - https://github.com/ARPSyndicate/cvemon
CVE-2021-0341 - https://github.com/Anonymous-Phunter/PHunter
CVE-2021-0341 - https://github.com/CGCL-codes/PHunter
+CVE-2021-0341 - https://github.com/LibHunter/LibHunter
CVE-2021-0341 - https://github.com/NicheToolkit/rest-toolkit
CVE-2021-0341 - https://github.com/TinyNiko/android_bulletin_notes
CVE-2021-0341 - https://github.com/au-abd/python-stuff
@@ -96017,6 +96433,7 @@ CVE-2021-0399 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2021-0399 - https://github.com/nipund513/Exploiting-UAF-by-Ret2bpf-in-Android-Kernel-CVE-2021-0399-
CVE-2021-0399 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2021-0399 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2021-0399 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-0399 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-0404 - https://github.com/ARPSyndicate/cvemon
CVE-2021-0404 - https://github.com/pokerfacett/MY_CVE_CREDIT
@@ -96441,6 +96858,7 @@ CVE-2021-0920 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2021-0920 - https://github.com/knd06/linux-kernel-exploitation
CVE-2021-0920 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2021-0920 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2021-0920 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-0920 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-0928 - https://github.com/ARPSyndicate/cvemon
CVE-2021-0928 - https://github.com/NaInSec/CVE-PoC-in-GitHub
@@ -96494,6 +96912,7 @@ CVE-2021-1048 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2021-1048 - https://github.com/knd06/linux-kernel-exploitation
CVE-2021-1048 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2021-1048 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2021-1048 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-1048 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-1049 - https://github.com/ARPSyndicate/cvemon
CVE-2021-1049 - https://github.com/pokerfacett/MY_CVE_CREDIT
@@ -97266,6 +97685,7 @@ CVE-2021-1905 - https://github.com/soosmile/POC
CVE-2021-1905 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2021-1905 - https://github.com/trhacknon/Pocingit
CVE-2021-1905 - https://github.com/whoforget/CVE-POC
+CVE-2021-1905 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-1905 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-1905 - https://github.com/youwizard/CVE-POC
CVE-2021-1905 - https://github.com/zecool/cve
@@ -97297,6 +97717,7 @@ CVE-2021-1940 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2021-1940 - https://github.com/knd06/linux-kernel-exploitation
CVE-2021-1940 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2021-1940 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2021-1940 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-1940 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-1961 - https://github.com/ARPSyndicate/cvemon
CVE-2021-1961 - https://github.com/NaInSec/CVE-PoC-in-GitHub
@@ -97320,6 +97741,7 @@ CVE-2021-1961 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2021-1961 - https://github.com/tamirzb/CVE-2021-1961
CVE-2021-1961 - https://github.com/trhacknon/Pocingit
CVE-2021-1961 - https://github.com/whoforget/CVE-POC
+CVE-2021-1961 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-1961 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-1961 - https://github.com/youwizard/CVE-POC
CVE-2021-1961 - https://github.com/zecool/cve
@@ -97350,6 +97772,7 @@ CVE-2021-1968 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2021-1968 - https://github.com/knd06/linux-kernel-exploitation
CVE-2021-1968 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2021-1968 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2021-1968 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-1968 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-1969 - https://github.com/ARPSyndicate/cvemon
CVE-2021-1969 - https://github.com/kdn111/linux-kernel-exploitation
@@ -97362,6 +97785,7 @@ CVE-2021-1969 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2021-1969 - https://github.com/knd06/linux-kernel-exploitation
CVE-2021-1969 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2021-1969 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2021-1969 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-1969 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-1994 - https://github.com/ARPSyndicate/cvemon
CVE-2021-1994 - https://github.com/CVEDB/PoC-List
@@ -97382,6 +97806,7 @@ CVE-2021-20016 - https://github.com/Ostorlab/KEV
CVE-2021-20016 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
CVE-2021-20016 - https://github.com/r0eXpeR/supplier
CVE-2021-20016 - https://github.com/triw0lf/Security-Matters-22
+CVE-2021-20021 - https://github.com/CVEDB/awesome-cve-repo
CVE-2021-20021 - https://github.com/Ostorlab/KEV
CVE-2021-20021 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
CVE-2021-20021 - https://github.com/SUPRAAA-1337/CVE-2021-20021
@@ -97515,6 +97940,7 @@ CVE-2021-20167 - https://github.com/ARPSyndicate/kenzer-templates
CVE-2021-20173 - https://github.com/ARPSyndicate/cvemon
CVE-2021-20190 - https://github.com/Anonymous-Phunter/PHunter
CVE-2021-20190 - https://github.com/CGCL-codes/PHunter
+CVE-2021-20190 - https://github.com/LibHunter/LibHunter
CVE-2021-20190 - https://github.com/seal-community/patches
CVE-2021-20191 - https://github.com/ARPSyndicate/cvemon
CVE-2021-20193 - https://github.com/ARPSyndicate/cvemon
@@ -97580,6 +98006,7 @@ CVE-2021-20226 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2021-20226 - https://github.com/knd06/linux-kernel-exploitation
CVE-2021-20226 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2021-20226 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2021-20226 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-20226 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-20227 - https://github.com/ARPSyndicate/cvemon
CVE-2021-20228 - https://github.com/equinor/appsec-owasptop10wrkshp
@@ -97882,6 +98309,7 @@ CVE-2021-2109 - https://github.com/Astrogeorgeonethree/Starred
CVE-2021-2109 - https://github.com/Astrogeorgeonethree/Starred2
CVE-2021-2109 - https://github.com/Atem1988/Starred
CVE-2021-2109 - https://github.com/BrittanyKuhn/javascript-tutorial
+CVE-2021-2109 - https://github.com/CLincat/vulcat
CVE-2021-2109 - https://github.com/CVEDB/PoC-List
CVE-2021-2109 - https://github.com/Drun1baby/JavaSecurityLearning
CVE-2021-2109 - https://github.com/EdgeSecurityTeam/Vulnerability
@@ -98293,6 +98721,7 @@ CVE-2021-21315 - https://github.com/20142995/pocsuite3
CVE-2021-21315 - https://github.com/ARPSyndicate/cvemon
CVE-2021-21315 - https://github.com/ARPSyndicate/kenzer-templates
CVE-2021-21315 - https://github.com/CITIZENDOT/CS547-CVEs
+CVE-2021-21315 - https://github.com/CLincat/vulcat
CVE-2021-21315 - https://github.com/Elsfa7-110/kenzer-templates
CVE-2021-21315 - https://github.com/FB-Sec/exploits
CVE-2021-21315 - https://github.com/ForbiddenProgrammer/CVE-2021-21315-PoC
@@ -98611,6 +99040,7 @@ CVE-2021-21551 - https://github.com/PwnAwan/EXP-401-OSEE
CVE-2021-21551 - https://github.com/SYRTI/POC_to_review
CVE-2021-21551 - https://github.com/SpikySabra/Kernel-Cactus
CVE-2021-21551 - https://github.com/SyncroScripting/Artichoke_Consulting
+CVE-2021-21551 - https://github.com/TheMalwareGuardian/Awesome-Bootkits-Rootkits-Development
CVE-2021-21551 - https://github.com/WhooAmii/POC_to_review
CVE-2021-21551 - https://github.com/alfarom256/MCP-PoC
CVE-2021-21551 - https://github.com/anquanscan/sec-tools
@@ -98809,6 +99239,7 @@ CVE-2021-21972 - https://github.com/Awrrays/FrameVul
CVE-2021-21972 - https://github.com/B1anda0/CVE-2021-21972
CVE-2021-21972 - https://github.com/BugBlocker/lotus-scripts
CVE-2021-21972 - https://github.com/ByZain/CVE-2021-21972
+CVE-2021-21972 - https://github.com/CLincat/vulcat
CVE-2021-21972 - https://github.com/CVEDB/PoC-List
CVE-2021-21972 - https://github.com/CVEDB/awesome-cve-repo
CVE-2021-21972 - https://github.com/CVEDB/top
@@ -99591,6 +100022,7 @@ CVE-2021-22204 - https://github.com/xhref/OSCP
CVE-2021-22204 - https://github.com/youwizard/CVE-POC
CVE-2021-22204 - https://github.com/zecool/cve
CVE-2021-22205 - https://github.com/0x0021h/expbox
+CVE-2021-22205 - https://github.com/0xMarcio/cve
CVE-2021-22205 - https://github.com/0xget/cve-2001-1473
CVE-2021-22205 - https://github.com/0xn0ne/simple-scanner
CVE-2021-22205 - https://github.com/20142995/Goby
@@ -99630,6 +100062,7 @@ CVE-2021-22205 - https://github.com/Seals6/CVE-2021-22205
CVE-2021-22205 - https://github.com/SexyBeast233/SecBooks
CVE-2021-22205 - https://github.com/Threekiii/Awesome-Exploit
CVE-2021-22205 - https://github.com/Threekiii/Awesome-POC
+CVE-2021-22205 - https://github.com/Threekiii/Awesome-Redteam
CVE-2021-22205 - https://github.com/Threekiii/Vulhub-Reproduce
CVE-2021-22205 - https://github.com/WhooAmii/POC_to_review
CVE-2021-22205 - https://github.com/X1pe0/Automated-Gitlab-RCE
@@ -99778,6 +100211,7 @@ CVE-2021-22555 - https://github.com/DrewSC13/Linpeas
CVE-2021-22555 - https://github.com/EGI-Federation/SVG-advisories
CVE-2021-22555 - https://github.com/Ha0-Y/LinuxKernelExploits
CVE-2021-22555 - https://github.com/Ha0-Y/kernel-exploit-cve
+CVE-2021-22555 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2021-22555 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2021-22555 - https://github.com/JoneyJunior/cve-2021-22555
CVE-2021-22555 - https://github.com/Metarget/awesome-cloud-native-security
@@ -99842,6 +100276,7 @@ CVE-2021-22555 - https://github.com/veritas501/CVE-2021-22555-PipeVersion
CVE-2021-22555 - https://github.com/veritas501/pipe-primitive
CVE-2021-22555 - https://github.com/whoforget/CVE-POC
CVE-2021-22555 - https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
+CVE-2021-22555 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-22555 - https://github.com/x90hack/vulnerabilty_lab
CVE-2021-22555 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-22555 - https://github.com/xuetusummer/Penetration_Testing_POC
@@ -100269,6 +100704,7 @@ CVE-2021-23134 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2021-23134 - https://github.com/knd06/linux-kernel-exploitation
CVE-2021-23134 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2021-23134 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2021-23134 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-23134 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-23166 - https://github.com/ARPSyndicate/cvemon
CVE-2021-23169 - https://github.com/ARPSyndicate/cvemon
@@ -100712,6 +101148,7 @@ CVE-2021-24122 - https://github.com/SexyBeast233/SecBooks
CVE-2021-24122 - https://github.com/Threekiii/Awesome-POC
CVE-2021-24122 - https://github.com/d4n-sec/d4n-sec.github.io
CVE-2021-24122 - https://github.com/mklmfane/betvictor
+CVE-2021-24122 - https://github.com/versio-io/product-lifecycle-security-api
CVE-2021-24122 - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
CVE-2021-24139 - https://github.com/El-Palomo/EVM1
CVE-2021-2414 - https://github.com/20142995/sectool
@@ -101300,6 +101737,7 @@ CVE-2021-25120 - https://github.com/ARPSyndicate/cvemon
CVE-2021-25120 - https://github.com/ARPSyndicate/kenzer-templates
CVE-2021-25122 - https://github.com/ARPSyndicate/cvemon
CVE-2021-25122 - https://github.com/DNTYO/F5_Vulnerability
+CVE-2021-25122 - https://github.com/versio-io/product-lifecycle-security-api
CVE-2021-25122 - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
CVE-2021-25155 - https://github.com/ARPSyndicate/cvemon
CVE-2021-25162 - https://github.com/k0mi-tg/CVE-POC
@@ -101430,6 +101868,7 @@ CVE-2021-25329 - https://github.com/Dzmitry-Basiachenka/dist-foreign-aliakh
CVE-2021-25329 - https://github.com/Live-Hack-CVE/CVE-2021-25329
CVE-2021-25329 - https://github.com/mklmfane/betvictor
CVE-2021-25329 - https://github.com/raner/projo
+CVE-2021-25329 - https://github.com/versio-io/product-lifecycle-security-api
CVE-2021-25329 - https://github.com/vshaliii/Basic-Pentesting-2-Vulnhub-Walkthrough
CVE-2021-25337 - https://github.com/Ostorlab/KEV
CVE-2021-25337 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
@@ -101446,6 +101885,7 @@ CVE-2021-25369 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2021-25369 - https://github.com/knd06/linux-kernel-exploitation
CVE-2021-25369 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2021-25369 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2021-25369 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-25369 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-25370 - https://github.com/ARPSyndicate/cvemon
CVE-2021-25370 - https://github.com/Ostorlab/KEV
@@ -101460,6 +101900,7 @@ CVE-2021-25370 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2021-25370 - https://github.com/knd06/linux-kernel-exploitation
CVE-2021-25370 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2021-25370 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2021-25370 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-25370 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-25371 - https://github.com/Ostorlab/KEV
CVE-2021-25371 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
@@ -101560,6 +102001,7 @@ CVE-2021-25646 - https://github.com/Astrogeorgeonethree/Starred
CVE-2021-25646 - https://github.com/Astrogeorgeonethree/Starred2
CVE-2021-25646 - https://github.com/Atem1988/Starred
CVE-2021-25646 - https://github.com/Awrrays/FrameVul
+CVE-2021-25646 - https://github.com/CLincat/vulcat
CVE-2021-25646 - https://github.com/EdgeSecurityTeam/Vulnerability
CVE-2021-25646 - https://github.com/Elsfa7-110/kenzer-templates
CVE-2021-25646 - https://github.com/FDlucifer/firece-fish
@@ -101816,6 +102258,7 @@ CVE-2021-2608 - https://github.com/20142995/Goby
CVE-2021-2608 - https://github.com/ExpLangcn/FuYao-Go
CVE-2021-26084 - https://github.com/0day404/vulnerability-poc
CVE-2021-26084 - https://github.com/0x727/ShuiZe_0x727
+CVE-2021-26084 - https://github.com/0xMarcio/cve
CVE-2021-26084 - https://github.com/0xMrNiko/Awesome-Red-Teaming
CVE-2021-26084 - https://github.com/0xf4n9x/CVE-2021-26084
CVE-2021-26084 - https://github.com/0xsyr0/OSCP
@@ -101908,6 +102351,7 @@ CVE-2021-26084 - https://github.com/dock0d1/CVE-2021-26084_Confluence
CVE-2021-26084 - https://github.com/dorkerdevil/CVE-2021-26084
CVE-2021-26084 - https://github.com/elinakrmova/RedTeam-Tools
CVE-2021-26084 - https://github.com/emtee40/win-pentest-tools
+CVE-2021-26084 - https://github.com/enomothem/PenTestNote
CVE-2021-26084 - https://github.com/fardeen-ahmed/Bug-bounty-Writeups
CVE-2021-26084 - https://github.com/h3v0x/CVE-2021-26084_Confluence
CVE-2021-26084 - https://github.com/hack-parthsharma/Pentest-Tools
@@ -102002,6 +102446,7 @@ CVE-2021-26085 - https://github.com/d4n-sec/d4n-sec.github.io
CVE-2021-26085 - https://github.com/e-hakson/OSCP
CVE-2021-26085 - https://github.com/eljosep/OSCP-Guide
CVE-2021-26085 - https://github.com/emadshanab/Some-BugBounty-Tips-from-my-Twitter-feed
+CVE-2021-26085 - https://github.com/enomothem/PenTestNote
CVE-2021-26085 - https://github.com/k0mi-tg/CVE-POC
CVE-2021-26085 - https://github.com/kgwanjala/oscp-cheatsheet
CVE-2021-26085 - https://github.com/manas3c/CVE-POC
@@ -102229,6 +102674,7 @@ CVE-2021-26341 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2021-26341 - https://github.com/knd06/linux-kernel-exploitation
CVE-2021-26341 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2021-26341 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2021-26341 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-26341 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-26401 - https://github.com/ARPSyndicate/cvemon
CVE-2021-26411 - https://github.com/ARPSyndicate/cvemon
@@ -102384,6 +102830,7 @@ CVE-2021-26708 - https://github.com/soosmile/POC
CVE-2021-26708 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2021-26708 - https://github.com/trhacknon/Pocingit
CVE-2021-26708 - https://github.com/whoforget/CVE-POC
+CVE-2021-26708 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-26708 - https://github.com/x90hack/vulnerabilty_lab
CVE-2021-26708 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-26708 - https://github.com/xuetusummer/Penetration_Testing_POC
@@ -103446,6 +103893,7 @@ CVE-2021-27363 - https://github.com/knd06/linux-kernel-exploitation
CVE-2021-27363 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2021-27363 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2021-27363 - https://github.com/teresaweber685/book_list
+CVE-2021-27363 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-27363 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-27364 - https://github.com/ARPSyndicate/cvemon
CVE-2021-27364 - https://github.com/aaronxie55/Presentation2_Markdown
@@ -103463,9 +103911,11 @@ CVE-2021-27364 - https://github.com/knd06/linux-kernel-exploitation
CVE-2021-27364 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2021-27364 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2021-27364 - https://github.com/teresaweber685/book_list
+CVE-2021-27364 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-27364 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-27365 - https://github.com/ARPSyndicate/cvemon
CVE-2021-27365 - https://github.com/EGI-Federation/SVG-advisories
+CVE-2021-27365 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2021-27365 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2021-27365 - https://github.com/aaronxie55/Presentation2_Markdown
CVE-2021-27365 - https://github.com/bollwarm/SecToolSet
@@ -103484,6 +103934,7 @@ CVE-2021-27365 - https://github.com/knd06/linux-kernel-exploitation
CVE-2021-27365 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2021-27365 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2021-27365 - https://github.com/teresaweber685/book_list
+CVE-2021-27365 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-27365 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-27370 - https://github.com/ajmalabubakkr/CVE
CVE-2021-27403 - https://github.com/ARPSyndicate/cvemon
@@ -104239,6 +104690,7 @@ CVE-2021-28663 - https://github.com/soosmile/POC
CVE-2021-28663 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2021-28663 - https://github.com/trhacknon/Pocingit
CVE-2021-28663 - https://github.com/whoforget/CVE-POC
+CVE-2021-28663 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-28663 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-28663 - https://github.com/youwizard/CVE-POC
CVE-2021-28663 - https://github.com/zecool/cve
@@ -104685,6 +105137,7 @@ CVE-2021-29657 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2021-29657 - https://github.com/knd06/linux-kernel-exploitation
CVE-2021-29657 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2021-29657 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2021-29657 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-29657 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-29663 - https://github.com/cptsticky/A-0day-Per-Day-Keeps-The-Cope-Away
CVE-2021-29752 - https://github.com/p1ay8y3ar/cve_monitor
@@ -105198,6 +105651,7 @@ CVE-2021-3064 - https://github.com/Lazykakarot1/Learn-365
CVE-2021-3064 - https://github.com/PwnAwan/MindMaps2
CVE-2021-3064 - https://github.com/fardeen-ahmed/Bug-bounty-Writeups
CVE-2021-3064 - https://github.com/harsh-bothra/learn365
+CVE-2021-30640 - https://github.com/versio-io/product-lifecycle-security-api
CVE-2021-30641 - https://github.com/ARPSyndicate/cvemon
CVE-2021-30641 - https://github.com/PierreChrd/py-projet-tut
CVE-2021-30641 - https://github.com/Totes5706/TotesHTB
@@ -105797,6 +106251,7 @@ CVE-2021-31267 - https://github.com/RNBBarrett/CrewAI-examples
CVE-2021-3129 - https://github.com/0day404/vulnerability-poc
CVE-2021-3129 - https://github.com/0day666/Vulnerability-verification
CVE-2021-3129 - https://github.com/0nion1/CVE-2021-3129
+CVE-2021-3129 - https://github.com/0xMarcio/cve
CVE-2021-3129 - https://github.com/0xStrygwyr/OSCP-Guide
CVE-2021-3129 - https://github.com/0xZipp0/OSCP
CVE-2021-3129 - https://github.com/0xaniketB/HackTheBox-Horizontall
@@ -105966,6 +106421,7 @@ CVE-2021-31439 - https://github.com/WinMin/Protocol-Vul
CVE-2021-31440 - https://github.com/ARPSyndicate/cvemon
CVE-2021-31440 - https://github.com/Al1ex/LinuxEelvation
CVE-2021-31440 - https://github.com/ChoKyuWon/exploit_articles
+CVE-2021-31440 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2021-31440 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2021-31440 - https://github.com/XiaozaYa/CVE-Recording
CVE-2021-31440 - https://github.com/adavarski/HomeLab-Proxmox-k8s-DevSecOps-playground
@@ -106935,6 +107391,7 @@ CVE-2021-32606 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2021-32606 - https://github.com/knd06/linux-kernel-exploitation
CVE-2021-32606 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2021-32606 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2021-32606 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-32606 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-32615 - https://github.com/2lambda123/CVE-mitre
CVE-2021-32615 - https://github.com/2lambda123/Windows10Exploits
@@ -107215,6 +107672,7 @@ CVE-2021-33034 - https://github.com/zecool/cve
CVE-2021-33035 - https://github.com/ARPSyndicate/cvemon
CVE-2021-33036 - https://github.com/ARPSyndicate/cvemon
CVE-2021-33037 - https://github.com/Dzmitry-Basiachenka/dist-foreign-aliakh
+CVE-2021-33037 - https://github.com/versio-io/product-lifecycle-security-api
CVE-2021-3304 - https://github.com/ExpLangcn/FuYao-Go
CVE-2021-33044 - https://github.com/20142995/Goby
CVE-2021-33044 - https://github.com/APPHIK/cam
@@ -107723,6 +108181,7 @@ CVE-2021-33909 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2021-33909 - https://github.com/sfowl/deep-directory
CVE-2021-33909 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2021-33909 - https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
+CVE-2021-33909 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-33909 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-33909 - https://github.com/xuetusummer/Penetration_Testing_POC
CVE-2021-33910 - https://github.com/ARPSyndicate/cvemon
@@ -108199,6 +108658,7 @@ CVE-2021-34523 - https://github.com/triw0lf/Security-Matters-22
CVE-2021-34523 - https://github.com/weeka10/-hktalent-TOP
CVE-2021-34527 - https://github.com/0x6d69636b/windows_hardening
CVE-2021-34527 - https://github.com/0x727/usefull-elevation-of-privilege
+CVE-2021-34527 - https://github.com/0xMarcio/cve
CVE-2021-34527 - https://github.com/0xStrygwyr/OSCP-Guide
CVE-2021-34527 - https://github.com/0xZipp0/OSCP
CVE-2021-34527 - https://github.com/0xaniketB/HackTheBox-Driver
@@ -108517,6 +108977,7 @@ CVE-2021-34866 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2021-34866 - https://github.com/knd06/linux-kernel-exploitation
CVE-2021-34866 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2021-34866 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2021-34866 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-34866 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-3487 - https://github.com/ARPSyndicate/cvemon
CVE-2021-3487 - https://github.com/fluidattacks/makes
@@ -108530,6 +108991,7 @@ CVE-2021-3490 - https://github.com/0xsyr0/OSCP
CVE-2021-3490 - https://github.com/20142995/sectool
CVE-2021-3490 - https://github.com/ARPSyndicate/cvemon
CVE-2021-3490 - https://github.com/Al1ex/LinuxEelvation
+CVE-2021-3490 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2021-3490 - https://github.com/IdanBanani/Linux-Kernel-VR-Exploitation
CVE-2021-3490 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2021-3490 - https://github.com/Mr-xn/Penetration_Testing_POC
@@ -108566,6 +109028,7 @@ CVE-2021-3490 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2021-3490 - https://github.com/trhacknon/Pocingit
CVE-2021-3490 - https://github.com/whoforget/CVE-POC
CVE-2021-3490 - https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
+CVE-2021-3490 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-3490 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-3490 - https://github.com/xuetusummer/Penetration_Testing_POC
CVE-2021-3490 - https://github.com/youwizard/CVE-POC
@@ -108593,10 +109056,12 @@ CVE-2021-3492 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2021-3492 - https://github.com/synacktiv/CVE-2021-3492
CVE-2021-3492 - https://github.com/trhacknon/Pocingit
CVE-2021-3492 - https://github.com/whoforget/CVE-POC
+CVE-2021-3492 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-3492 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-3492 - https://github.com/youwizard/CVE-POC
CVE-2021-3492 - https://github.com/zecool/cve
CVE-2021-3493 - https://github.com/0day404/vulnerability-poc
+CVE-2021-3493 - https://github.com/0xMarcio/cve
CVE-2021-3493 - https://github.com/0xMat10/eJPT_Prep
CVE-2021-3493 - https://github.com/0xWhoami35/root-kernel
CVE-2021-3493 - https://github.com/0xsyr0/OSCP
@@ -108615,6 +109080,7 @@ CVE-2021-3493 - https://github.com/EdgeSecurityTeam/Vulnerability
CVE-2021-3493 - https://github.com/GhostTroops/TOP
CVE-2021-3493 - https://github.com/GibzB/THM-Captured-Rooms
CVE-2021-3493 - https://github.com/H0j3n/EzpzCheatSheet
+CVE-2021-3493 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2021-3493 - https://github.com/Ishan3011/CVE-2021-3493
CVE-2021-3493 - https://github.com/JERRY123S/all-poc
CVE-2021-3493 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
@@ -108689,6 +109155,7 @@ CVE-2021-3493 - https://github.com/txuswashere/OSCP
CVE-2021-3493 - https://github.com/tzwlhack/Vulnerability
CVE-2021-3493 - https://github.com/weeka10/-hktalent-TOP
CVE-2021-3493 - https://github.com/whoforget/CVE-POC
+CVE-2021-3493 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-3493 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-3493 - https://github.com/xhref/OSCP
CVE-2021-3493 - https://github.com/xuetusummer/Penetration_Testing_POC
@@ -109174,6 +109641,7 @@ CVE-2021-3573 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2021-3573 - https://github.com/knd06/linux-kernel-exploitation
CVE-2021-3573 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2021-3573 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2021-3573 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-3573 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-3574 - https://github.com/ARPSyndicate/cvemon
CVE-2021-3574 - https://github.com/ZhanyongTang/NISL-BugDetection
@@ -109278,6 +109746,7 @@ CVE-2021-3609 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2021-3609 - https://github.com/knd06/linux-kernel-exploitation
CVE-2021-3609 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2021-3609 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2021-3609 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-3609 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-36090 - https://github.com/ARPSyndicate/cvemon
CVE-2021-36090 - https://github.com/CodeIntelligenceTesting/jazzer
@@ -109342,6 +109811,7 @@ CVE-2021-3625 - https://github.com/whoforget/CVE-POC
CVE-2021-3625 - https://github.com/youwizard/CVE-POC
CVE-2021-3626 - https://github.com/ExpLangcn/FuYao-Go
CVE-2021-36260 - https://github.com/0day404/vulnerability-poc
+CVE-2021-36260 - https://github.com/0xMarcio/cve
CVE-2021-36260 - https://github.com/1f3lse/taiE
CVE-2021-36260 - https://github.com/20142995/Goby
CVE-2021-36260 - https://github.com/20142995/sectool
@@ -109579,6 +110049,7 @@ CVE-2021-36749 - https://github.com/ARPSyndicate/kenzer-templates
CVE-2021-36749 - https://github.com/ArrestX/--POC
CVE-2021-36749 - https://github.com/Awrrays/FrameVul
CVE-2021-36749 - https://github.com/BrucessKING/CVE-2021-36749
+CVE-2021-36749 - https://github.com/CLincat/vulcat
CVE-2021-36749 - https://github.com/HimmelAward/Goby_POC
CVE-2021-36749 - https://github.com/Ilovewomen/db_script_v2
CVE-2021-36749 - https://github.com/Ilovewomen/db_script_v2_2
@@ -109980,6 +110451,7 @@ CVE-2021-3715 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2021-3715 - https://github.com/knd06/linux-kernel-exploitation
CVE-2021-3715 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2021-3715 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2021-3715 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-3715 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-37152 - https://github.com/ARPSyndicate/cvemon
CVE-2021-37152 - https://github.com/SecurityAnalysts/CVE-2021-37152
@@ -110561,6 +111033,7 @@ CVE-2021-38646 - https://github.com/ARPSyndicate/cvemon
CVE-2021-38646 - https://github.com/Ostorlab/KEV
CVE-2021-38646 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
CVE-2021-38646 - https://github.com/Spacial/awesome-csirt
+CVE-2021-38647 - https://github.com/0xMarcio/cve
CVE-2021-38647 - https://github.com/ARPSyndicate/cvemon
CVE-2021-38647 - https://github.com/ARPSyndicate/kenzer-templates
CVE-2021-38647 - https://github.com/AlteredSecurity/CVE-2021-38647
@@ -111135,6 +111608,7 @@ CVE-2021-39815 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2021-39815 - https://github.com/knd06/linux-kernel-exploitation
CVE-2021-39815 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2021-39815 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2021-39815 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-39815 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-39823 - https://github.com/ARPSyndicate/cvemon
CVE-2021-39829 - https://github.com/0xCyberY/CVE-T4PDF
@@ -111359,6 +111833,7 @@ CVE-2021-4034 - https://github.com/GibzB/THM-Captured-Rooms
CVE-2021-4034 - https://github.com/H3arn/hackergame-2022-writeup
CVE-2021-4034 - https://github.com/HadessCS/Awesome-Privilege-Escalation
CVE-2021-4034 - https://github.com/HattMobb/TryHackMe-Bugle-Machine-Writeup-Walkthrough
+CVE-2021-4034 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2021-4034 - https://github.com/HellGateCorp/pwnkit
CVE-2021-4034 - https://github.com/HrishitJoshi/CVE-2021-4034
CVE-2021-4034 - https://github.com/IBM-Cloud/vpc-ha-iac
@@ -112433,6 +112908,7 @@ CVE-2021-41073 - https://github.com/0ptyx/cve-2024-0582
CVE-2021-41073 - https://github.com/ARPSyndicate/cvemon
CVE-2021-41073 - https://github.com/Ch4nc3n/PublicExploitation
CVE-2021-41073 - https://github.com/DarkFunct/CVE_Exploits
+CVE-2021-41073 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2021-41073 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2021-41073 - https://github.com/NaInSec/CVE-PoC-in-GitHub
CVE-2021-41073 - https://github.com/SYRTI/POC_to_review
@@ -112457,6 +112933,7 @@ CVE-2021-41073 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2021-41073 - https://github.com/star-sg/CVE
CVE-2021-41073 - https://github.com/trhacknon/CVE2
CVE-2021-41073 - https://github.com/trhacknon/Pocingit
+CVE-2021-41073 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-41073 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-41073 - https://github.com/zecool/cve
CVE-2021-41073 - https://github.com/zzcentury/PublicExploitation
@@ -112472,6 +112949,7 @@ CVE-2021-41078 - https://github.com/trhacknon/Pocingit
CVE-2021-41078 - https://github.com/zecool/cve
CVE-2021-41079 - https://github.com/ARPSyndicate/cvemon
CVE-2021-41079 - https://github.com/chnzzh/OpenSSL-CVE-lib
+CVE-2021-41079 - https://github.com/versio-io/product-lifecycle-security-api
CVE-2021-41081 - https://github.com/ARPSyndicate/cvemon
CVE-2021-41081 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2021-41081 - https://github.com/soosmile/POC
@@ -112917,6 +113395,7 @@ CVE-2021-41511 - https://github.com/vidvansh/CVE-2021-41511
CVE-2021-41526 - https://github.com/RonnieSalomonsen/My-CVEs
CVE-2021-41526 - https://github.com/pawlokk/mindmanager-poc
CVE-2021-4154 - https://github.com/ARPSyndicate/cvemon
+CVE-2021-4154 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2021-4154 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2021-4154 - https://github.com/Markakd/CVE-2021-4154
CVE-2021-4154 - https://github.com/Markakd/DirtyCred
@@ -113515,6 +113994,7 @@ CVE-2021-42008 - https://github.com/0xdevil/CVE-2021-42008
CVE-2021-42008 - https://github.com/ARPSyndicate/cvemon
CVE-2021-42008 - https://github.com/Al1ex/LinuxEelvation
CVE-2021-42008 - https://github.com/BachoSeven/stellestelline
+CVE-2021-42008 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2021-42008 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2021-42008 - https://github.com/NaInSec/CVE-PoC-in-GitHub
CVE-2021-42008 - https://github.com/SYRTI/POC_to_review
@@ -113537,6 +114017,7 @@ CVE-2021-42008 - https://github.com/numanturle/CVE-2021-42008
CVE-2021-42008 - https://github.com/soosmile/POC
CVE-2021-42008 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2021-42008 - https://github.com/trhacknon/Pocingit
+CVE-2021-42008 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-42008 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-42008 - https://github.com/zecool/cve
CVE-2021-42013 - https://github.com/0day404/vulnerability-poc
@@ -113721,6 +114202,7 @@ CVE-2021-4204 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2021-4204 - https://github.com/tr3ee/CVE-2021-4204
CVE-2021-4204 - https://github.com/trhacknon/Pocingit
CVE-2021-4204 - https://github.com/whoforget/CVE-POC
+CVE-2021-4204 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-4204 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-4204 - https://github.com/xuetusummer/Penetration_Testing_POC
CVE-2021-4204 - https://github.com/youwizard/CVE-POC
@@ -114269,6 +114751,7 @@ CVE-2021-42327 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2021-42327 - https://github.com/soosmile/POC
CVE-2021-42327 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2021-42327 - https://github.com/trhacknon/Pocingit
+CVE-2021-42327 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-42327 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-42327 - https://github.com/zecool/cve
CVE-2021-42337 - https://github.com/aalexpereira/pipelines-tricks
@@ -114820,6 +115303,7 @@ CVE-2021-43267 - https://github.com/0x0021h/expbox
CVE-2021-43267 - https://github.com/ARPSyndicate/cvemon
CVE-2021-43267 - https://github.com/Al1ex/LinuxEelvation
CVE-2021-43267 - https://github.com/DarkSprings/CVE-2021-43267-POC
+CVE-2021-43267 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2021-43267 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2021-43267 - https://github.com/aixcc-public/challenge-001-exemplar
CVE-2021-43267 - https://github.com/bcoles/kasld
@@ -114840,6 +115324,7 @@ CVE-2021-43267 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2021-43267 - https://github.com/ohnonoyesyes/CVE-2021-43267
CVE-2021-43267 - https://github.com/soosmile/POC
CVE-2021-43267 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2021-43267 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-43267 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-43267 - https://github.com/zzhacked/CVE-2021-43267
CVE-2021-4328 - https://github.com/ExpLangcn/FuYao-Go
@@ -114849,6 +115334,7 @@ CVE-2021-43287 - https://github.com/20142995/pocsuite3
CVE-2021-43287 - https://github.com/ARPSyndicate/cvemon
CVE-2021-43287 - https://github.com/ARPSyndicate/kenzer-templates
CVE-2021-43287 - https://github.com/ArrestX/--POC
+CVE-2021-43287 - https://github.com/CLincat/vulcat
CVE-2021-43287 - https://github.com/HimmelAward/Goby_POC
CVE-2021-43287 - https://github.com/KayCHENvip/vulnerability-poc
CVE-2021-43287 - https://github.com/Miraitowa70/POC-Notes
@@ -115112,6 +115598,7 @@ CVE-2021-43797 - https://github.com/cezapata/appconfiguration-sample
CVE-2021-43798 - https://github.com/0day404/vulnerability-poc
CVE-2021-43798 - https://github.com/0x783kb/Security-operation-book
CVE-2021-43798 - https://github.com/0xAwali/Virtual-Host
+CVE-2021-43798 - https://github.com/0xMarcio/cve
CVE-2021-43798 - https://github.com/20142995/Goby
CVE-2021-43798 - https://github.com/20142995/pocsuite3
CVE-2021-43798 - https://github.com/20142995/sectool
@@ -115428,6 +115915,7 @@ CVE-2021-43975 - https://github.com/ARPSyndicate/cvemon
CVE-2021-43976 - https://github.com/ARPSyndicate/cvemon
CVE-2021-43980 - https://github.com/ARPSyndicate/cvemon
CVE-2021-43980 - https://github.com/sr-monika/sprint-rest
+CVE-2021-43980 - https://github.com/versio-io/product-lifecycle-security-api
CVE-2021-43997 - https://github.com/espressif/esp-idf-sbom
CVE-2021-44001 - https://github.com/0xCyberY/CVE-T4PDF
CVE-2021-44001 - https://github.com/ARPSyndicate/cvemon
@@ -115811,6 +116299,7 @@ CVE-2021-44228 - https://github.com/Lejeremiah/docker_images
CVE-2021-44228 - https://github.com/LemonCraftRu/JndiRemover
CVE-2021-44228 - https://github.com/LeonardoE95/yt-it
CVE-2021-44228 - https://github.com/Lercas/CVE_scoring
+CVE-2021-44228 - https://github.com/LibHunter/LibHunter
CVE-2021-44228 - https://github.com/Liderbord/Log4j-Security
CVE-2021-44228 - https://github.com/LinkMJB/log4shell_scanner
CVE-2021-44228 - https://github.com/Live-Hack-CVE/CVE-2021-4104
@@ -116293,6 +116782,7 @@ CVE-2021-44228 - https://github.com/eljosep/OSCP-Guide
CVE-2021-44228 - https://github.com/emadshanab/Nuclei-Templates-Collection
CVE-2021-44228 - https://github.com/emilywang0/CVE_testing_VULN
CVE-2021-44228 - https://github.com/emilywang0/MergeBase_test_vuln
+CVE-2021-44228 - https://github.com/enomothem/PenTestNote
CVE-2021-44228 - https://github.com/erickrr-bd/TekiumLog4jApp
CVE-2021-44228 - https://github.com/ericmedina024/JndiLookupRemover
CVE-2021-44228 - https://github.com/erikschippers/Log4J-Hyper-V-Script
@@ -117348,6 +117838,7 @@ CVE-2021-44733 - https://github.com/pjlantz/optee-qemu
CVE-2021-44733 - https://github.com/soosmile/POC
CVE-2021-44733 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2021-44733 - https://github.com/trhacknon/Pocingit
+CVE-2021-44733 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-44733 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-44733 - https://github.com/zecool/cve
CVE-2021-44735 - https://github.com/defensor/CVE-2021-44735
@@ -117500,6 +117991,7 @@ CVE-2021-44906 - https://github.com/seal-community/patches
CVE-2021-44906 - https://github.com/trong0dn/eth-todo-list
CVE-2021-44909 - https://github.com/g1thub3r1st4/CVE-2021-44909
CVE-2021-44910 - https://github.com/dockererr/CVE-2021-44910_SpringBlade
+CVE-2021-44910 - https://github.com/enomothem/PenTestNote
CVE-2021-44915 - https://github.com/superlink996/chunqiuyunjingbachang
CVE-2021-44916 - https://github.com/ARPSyndicate/cvemon
CVE-2021-44956 - https://github.com/ARPSyndicate/cvemon
@@ -117633,6 +118125,7 @@ CVE-2021-45046 - https://github.com/HackJava/Log4j2
CVE-2021-45046 - https://github.com/HynekPetrak/log4shell-finder
CVE-2021-45046 - https://github.com/ITninja04/awesome-stars
CVE-2021-45046 - https://github.com/JERRY123S/all-poc
+CVE-2021-45046 - https://github.com/LibHunter/LibHunter
CVE-2021-45046 - https://github.com/LoliKingdom/NukeJndiLookupFromLog4j
CVE-2021-45046 - https://github.com/MLX15/log4j-scan
CVE-2021-45046 - https://github.com/Maelstromage/Log4jSherlock
@@ -118163,6 +118656,7 @@ CVE-2021-45608 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2021-45608 - https://github.com/knd06/linux-kernel-exploitation
CVE-2021-45608 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2021-45608 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2021-45608 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2021-45608 - https://github.com/xairy/linux-kernel-exploitation
CVE-2021-45733 - https://github.com/ARPSyndicate/cvemon
CVE-2021-45733 - https://github.com/pjqwudi/my_vuln
@@ -118974,6 +119468,7 @@ CVE-2022-0185 - https://github.com/EGI-Federation/SVG-advisories
CVE-2022-0185 - https://github.com/GhostTroops/TOP
CVE-2022-0185 - https://github.com/Ha0-Y/LinuxKernelExploits
CVE-2022-0185 - https://github.com/Ha0-Y/kernel-exploit-cve
+CVE-2022-0185 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2022-0185 - https://github.com/JERRY123S/all-poc
CVE-2022-0185 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2022-0185 - https://github.com/Metarget/metarget
@@ -119035,6 +119530,7 @@ CVE-2022-0185 - https://github.com/veritas501/CVE-2022-0185-PipeVersion
CVE-2022-0185 - https://github.com/veritas501/pipe-primitive
CVE-2022-0185 - https://github.com/weeka10/-hktalent-TOP
CVE-2022-0185 - https://github.com/whoforget/CVE-POC
+CVE-2022-0185 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2022-0185 - https://github.com/xairy/linux-kernel-exploitation
CVE-2022-0185 - https://github.com/xuetusummer/Penetration_Testing_POC
CVE-2022-0185 - https://github.com/youwizard/CVE-POC
@@ -119329,6 +119825,7 @@ CVE-2022-0435 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2022-0435 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2022-0435 - https://github.com/teresaweber685/book_list
CVE-2022-0435 - https://github.com/whoforget/CVE-POC
+CVE-2022-0435 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2022-0435 - https://github.com/wlswotmd/CVE-2022-0435
CVE-2022-0435 - https://github.com/xairy/linux-kernel-exploitation
CVE-2022-0435 - https://github.com/youwizard/CVE-POC
@@ -119587,6 +120084,7 @@ CVE-2022-0543 - https://github.com/zyylhn/zscan
CVE-2022-0547 - https://github.com/ARPSyndicate/cvemon
CVE-2022-0554 - https://github.com/ARPSyndicate/cvemon
CVE-2022-0557 - https://github.com/ARPSyndicate/cvemon
+CVE-2022-0557 - https://github.com/AggressiveUser/AggressiveUser
CVE-2022-0557 - https://github.com/Enes4xd/Enes4xd
CVE-2022-0557 - https://github.com/cr0ss2018/cr0ss2018
CVE-2022-0557 - https://github.com/enesamaafkolan/enesamaafkolan
@@ -119604,6 +120102,7 @@ CVE-2022-0563 - https://github.com/amartingarcia/kubernetes-cks-training
CVE-2022-0563 - https://github.com/cdupuis/image-api
CVE-2022-0563 - https://github.com/denoslab/ensf400-lab10-ssc
CVE-2022-0563 - https://github.com/fokypoky/places-list
+CVE-2022-0563 - https://github.com/m-pasima/CI-CD-Security-image-scan
CVE-2022-0563 - https://github.com/mauraneh/WIK-DPS-TP02
CVE-2022-0563 - https://github.com/testing-felickz/docker-scout-demo
CVE-2022-0563 - https://github.com/toyhoshi/helm
@@ -120029,6 +120528,7 @@ CVE-2022-0847 - https://github.com/Gustavo-Nogueira/Dirty-Pipe-Exploits
CVE-2022-0847 - https://github.com/Ha0-Y/LinuxKernelExploits
CVE-2022-0847 - https://github.com/Ha0-Y/kernel-exploit-cve
CVE-2022-0847 - https://github.com/HadessCS/Awesome-Privilege-Escalation
+CVE-2022-0847 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2022-0847 - https://github.com/IHenakaarachchi/debian11-dirty_pipe-patcher
CVE-2022-0847 - https://github.com/ITMarcin2211/CVE-2022-0847-DirtyPipe-Exploit
CVE-2022-0847 - https://github.com/IdanBanani/Linux-Kernel-VR-Exploitation
@@ -120287,6 +120787,7 @@ CVE-2022-0847 - https://github.com/wechicken456/Linux-kernel
CVE-2022-0847 - https://github.com/weeka10/-hktalent-TOP
CVE-2022-0847 - https://github.com/whoami-chmod777/Hacking-Articles-Linux-Privilege-Escalation-
CVE-2022-0847 - https://github.com/whoforget/CVE-POC
+CVE-2022-0847 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2022-0847 - https://github.com/wpressly/exploitations
CVE-2022-0847 - https://github.com/x90hack/vulnerabilty_lab
CVE-2022-0847 - https://github.com/xairy/linux-kernel-exploitation
@@ -120448,6 +120949,7 @@ CVE-2022-0995 - https://github.com/CVEDB/awesome-cve-repo
CVE-2022-0995 - https://github.com/CVEDB/top
CVE-2022-0995 - https://github.com/Ch4nc3n/PublicExploitation
CVE-2022-0995 - https://github.com/GhostTroops/TOP
+CVE-2022-0995 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2022-0995 - https://github.com/JERRY123S/all-poc
CVE-2022-0995 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2022-0995 - https://github.com/Metarget/metarget
@@ -120483,6 +120985,7 @@ CVE-2022-0995 - https://github.com/tanjiti/sec_profile
CVE-2022-0995 - https://github.com/trhacknon/Pocingit
CVE-2022-0995 - https://github.com/weeka10/-hktalent-TOP
CVE-2022-0995 - https://github.com/whoforget/CVE-POC
+CVE-2022-0995 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2022-0995 - https://github.com/xairy/linux-kernel-exploitation
CVE-2022-0995 - https://github.com/xuetusummer/Penetration_Testing_POC
CVE-2022-0995 - https://github.com/youwizard/CVE-POC
@@ -120537,6 +121040,7 @@ CVE-2022-1015 - https://github.com/0range1337/CVE-2022-1015
CVE-2022-1015 - https://github.com/ARPSyndicate/cvemon
CVE-2022-1015 - https://github.com/EGI-Federation/SVG-advisories
CVE-2022-1015 - https://github.com/H4K6/CVE-2023-0179-PoC
+CVE-2022-1015 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2022-1015 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2022-1015 - https://github.com/Mr-xn/Penetration_Testing_POC
CVE-2022-1015 - https://github.com/NaInSec/CVE-PoC-in-GitHub
@@ -120576,6 +121080,7 @@ CVE-2022-1015 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2022-1015 - https://github.com/trhacknon/Pocingit
CVE-2022-1015 - https://github.com/wechicken456/Linux-kernel
CVE-2022-1015 - https://github.com/whoforget/CVE-POC
+CVE-2022-1015 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2022-1015 - https://github.com/wlswotmd/CVE-2022-1015
CVE-2022-1015 - https://github.com/xairy/linux-kernel-exploitation
CVE-2022-1015 - https://github.com/xuetusummer/Penetration_Testing_POC
@@ -120596,6 +121101,7 @@ CVE-2022-1016 - https://github.com/knd06/linux-kernel-exploitation
CVE-2022-1016 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2022-1016 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2022-1016 - https://github.com/wechicken456/Linux-kernel
+CVE-2022-1016 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2022-1016 - https://github.com/xairy/linux-kernel-exploitation
CVE-2022-1016 - https://github.com/yaobinwen/robin_on_rails
CVE-2022-1016 - https://github.com/zanezhub/CVE-2022-1015-1016
@@ -120796,6 +121302,7 @@ CVE-2022-1163 - https://github.com/AggressiveUser/AggressiveUser.github.io
CVE-2022-1166 - https://github.com/ARPSyndicate/cvemon
CVE-2022-1168 - https://github.com/ARPSyndicate/cvemon
CVE-2022-1168 - https://github.com/ARPSyndicate/kenzer-templates
+CVE-2022-1172 - https://github.com/Joe1sn/Joe1sn
CVE-2022-1175 - https://github.com/ARPSyndicate/cvemon
CVE-2022-1175 - https://github.com/Greenwolf/CVE-2022-1175
CVE-2022-1175 - https://github.com/NaInSec/CVE-PoC-in-GitHub
@@ -120995,6 +121502,7 @@ CVE-2022-1388 - https://github.com/0day404/vulnerability-poc
CVE-2022-1388 - https://github.com/0x783kb/Security-operation-book
CVE-2022-1388 - https://github.com/0x7eTeam/CVE-2022-1388-PocExp
CVE-2022-1388 - https://github.com/0xAgun/CVE-2022-1388
+CVE-2022-1388 - https://github.com/0xMarcio/cve
CVE-2022-1388 - https://github.com/0xf4n9x/CVE-2022-1388
CVE-2022-1388 - https://github.com/20142995/Goby
CVE-2022-1388 - https://github.com/20142995/pocsuite3
@@ -121272,6 +121780,7 @@ CVE-2022-1527 - https://github.com/ARPSyndicate/cvemon
CVE-2022-1527 - https://github.com/agrawalsmart7/scodescanner
CVE-2022-1528 - https://github.com/ARPSyndicate/cvemon
CVE-2022-1529 - https://github.com/mistymntncop/CVE-2022-1802
+CVE-2022-1530 - https://github.com/AggressiveUser/AggressiveUser
CVE-2022-1532 - https://github.com/ARPSyndicate/cvemon
CVE-2022-1532 - https://github.com/agrawalsmart7/scodescanner
CVE-2022-1537 - https://github.com/ARPSyndicate/cvemon
@@ -121297,6 +121806,7 @@ CVE-2022-1586 - https://github.com/vulnersCom/vulners-sbom-parser
CVE-2022-1587 - https://github.com/ARPSyndicate/cvemon
CVE-2022-1587 - https://github.com/vulnersCom/vulners-sbom-parser
CVE-2022-1588 - https://github.com/ARPSyndicate/cvemon
+CVE-2022-1588 - https://github.com/AggressiveUser/AggressiveUser
CVE-2022-1590 - https://github.com/karimhabush/cyberowl
CVE-2022-1591 - https://github.com/ARPSyndicate/cvemon
CVE-2022-1592 - https://github.com/ARPSyndicate/cvemon
@@ -121458,6 +121968,7 @@ CVE-2022-1786 - https://github.com/knd06/linux-kernel-exploitation
CVE-2022-1786 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2022-1786 - https://github.com/scratchadams/Heap-Resources
CVE-2022-1786 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2022-1786 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2022-1786 - https://github.com/xairy/linux-kernel-exploitation
CVE-2022-1787 - https://github.com/ARPSyndicate/cvemon
CVE-2022-1793 - https://github.com/ARPSyndicate/cvemon
@@ -121646,6 +122157,7 @@ CVE-2022-1972 - https://github.com/randorisec/CVE-2022-1972-infoleak-PoC
CVE-2022-1972 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2022-1972 - https://github.com/trhacknon/Pocingit
CVE-2022-1972 - https://github.com/whoforget/CVE-POC
+CVE-2022-1972 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2022-1972 - https://github.com/xairy/linux-kernel-exploitation
CVE-2022-1972 - https://github.com/xuetusummer/Penetration_Testing_POC
CVE-2022-1972 - https://github.com/youwizard/CVE-POC
@@ -121664,6 +122176,7 @@ CVE-2022-2000000 - https://github.com/clj-holmes/clj-watson
CVE-2022-20001 - https://github.com/Live-Hack-CVE/CVE-2022-20001
CVE-2022-20004 - https://github.com/ARPSyndicate/cvemon
CVE-2022-20004 - https://github.com/CVEDB/PoC-List
+CVE-2022-20004 - https://github.com/CVEDB/awesome-cve-repo
CVE-2022-20004 - https://github.com/Live-Hack-CVE/CVE-2022-2000
CVE-2022-20004 - https://github.com/NaInSec/CVE-PoC-in-GitHub
CVE-2022-20004 - https://github.com/SYRTI/POC_to_review
@@ -121679,6 +122192,7 @@ CVE-2022-20004 - https://github.com/youwizard/CVE-POC
CVE-2022-20004 - https://github.com/zecool/cve
CVE-2022-20005 - https://github.com/ARPSyndicate/cvemon
CVE-2022-20005 - https://github.com/CVEDB/PoC-List
+CVE-2022-20005 - https://github.com/CVEDB/awesome-cve-repo
CVE-2022-20005 - https://github.com/Live-Hack-CVE/CVE-2022-2000
CVE-2022-20005 - https://github.com/NaInSec/CVE-PoC-in-GitHub
CVE-2022-20005 - https://github.com/SYRTI/POC_to_review
@@ -121701,6 +122215,7 @@ CVE-2022-20006 - https://github.com/rajbhx/Awesome-Android-Security-Clone
CVE-2022-20006 - https://github.com/saeidshirazi/awesome-android-security
CVE-2022-20007 - https://github.com/ARPSyndicate/cvemon
CVE-2022-20007 - https://github.com/CVEDB/PoC-List
+CVE-2022-20007 - https://github.com/CVEDB/awesome-cve-repo
CVE-2022-20007 - https://github.com/Live-Hack-CVE/CVE-2022-2000
CVE-2022-20007 - https://github.com/NaInSec/CVE-PoC-in-GitHub
CVE-2022-20007 - https://github.com/SYRTI/POC_to_review
@@ -121781,6 +122296,7 @@ CVE-2022-20122 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2022-20122 - https://github.com/knd06/linux-kernel-exploitation
CVE-2022-20122 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2022-20122 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2022-20122 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2022-20122 - https://github.com/xairy/linux-kernel-exploitation
CVE-2022-20124 - https://github.com/ARPSyndicate/cvemon
CVE-2022-20124 - https://github.com/Live-Hack-CVE/CVE-2022-20124
@@ -121911,6 +122427,7 @@ CVE-2022-20186 - https://github.com/s1204-inspect/CVE-2022-20186_CTXZ
CVE-2022-20186 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2022-20186 - https://github.com/trhacknon/Pocingit
CVE-2022-20186 - https://github.com/whoforget/CVE-POC
+CVE-2022-20186 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2022-20186 - https://github.com/xairy/linux-kernel-exploitation
CVE-2022-20186 - https://github.com/youwizard/CVE-POC
CVE-2022-20186 - https://github.com/zecool/cve
@@ -122201,6 +122718,7 @@ CVE-2022-2068 - https://github.com/tianocore-docs/ThirdPartySecurityAdvisories
CVE-2022-20685 - https://github.com/T-JN/Research-the-Model-of-Increasing-Reliability-of-the-Intrusion-Detection-System
CVE-2022-20698 - https://github.com/ARPSyndicate/cvemon
CVE-2022-20698 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2022-20699 - https://github.com/0xMarcio/cve
CVE-2022-20699 - https://github.com/ARPSyndicate/cvemon
CVE-2022-20699 - https://github.com/Audiobahn/CVE-2022-20699
CVE-2022-20699 - https://github.com/CVEDB/awesome-cve-repo
@@ -122275,6 +122793,7 @@ CVE-2022-2078 - https://github.com/knd06/linux-kernel-exploitation
CVE-2022-2078 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2022-2078 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2022-2078 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2022-2078 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2022-2078 - https://github.com/xairy/linux-kernel-exploitation
CVE-2022-20784 - https://github.com/karimhabush/cyberowl
CVE-2022-20785 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -123030,6 +123549,7 @@ CVE-2022-21887 - https://github.com/trhacknon/Pocingit
CVE-2022-21887 - https://github.com/whoforget/CVE-POC
CVE-2022-21887 - https://github.com/youwizard/CVE-POC
CVE-2022-21887 - https://github.com/zecool/cve
+CVE-2022-21894 - https://github.com/0xMarcio/cve
CVE-2022-21894 - https://github.com/ARPSyndicate/cvemon
CVE-2022-21894 - https://github.com/ASkyeye/CVE-2022-21894-Payload
CVE-2022-21894 - https://github.com/CVEDB/awesome-cve-repo
@@ -123083,6 +123603,7 @@ CVE-2022-21906 - https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of
CVE-2022-21906 - https://github.com/nu11secur1ty/CVE-mitre
CVE-2022-21906 - https://github.com/nu11secur1ty/CVE-nu11secur1ty
CVE-2022-21906 - https://github.com/nu11secur1ty/Windows10Exploits
+CVE-2022-21907 - https://github.com/0xMarcio/cve
CVE-2022-21907 - https://github.com/0xmaximus/Home-Demolisher
CVE-2022-21907 - https://github.com/20142995/sectool
CVE-2022-21907 - https://github.com/2lambda123/CVE-mitre
@@ -123339,6 +123860,7 @@ CVE-2022-22005 - https://github.com/Creamy-Chicken-Soup/writeups-about-analysis-
CVE-2022-22012 - https://github.com/ARPSyndicate/cvemon
CVE-2022-22017 - https://github.com/ARPSyndicate/cvemon
CVE-2022-2202 - https://github.com/CrossC2/CrossC2Kit
+CVE-2022-2202 - https://github.com/m-mizutani/octovy
CVE-2022-22022 - https://github.com/ARPSyndicate/cvemon
CVE-2022-22022 - https://github.com/Cruxer8Mech/Idk
CVE-2022-22022 - https://github.com/NaInSec/CVE-PoC-in-GitHub
@@ -123412,6 +123934,7 @@ CVE-2022-22057 - https://github.com/knd06/linux-kernel-exploitation
CVE-2022-22057 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2022-22057 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2022-22057 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2022-22057 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2022-22057 - https://github.com/xairy/linux-kernel-exploitation
CVE-2022-2206 - https://github.com/ARPSyndicate/cvemon
CVE-2022-22063 - https://github.com/k0mi-tg/CVE-POC
@@ -123745,6 +124268,7 @@ CVE-2022-22718 - https://github.com/youwizard/CVE-POC
CVE-2022-22718 - https://github.com/zecool/cve
CVE-2022-22719 - https://github.com/8ctorres/SIND-Practicas
CVE-2022-22719 - https://github.com/ARPSyndicate/cvemon
+CVE-2022-22719 - https://github.com/EzeTauil/Maquina-Upload
CVE-2022-22719 - https://github.com/PierreChrd/py-projet-tut
CVE-2022-22719 - https://github.com/Totes5706/TotesHTB
CVE-2022-22719 - https://github.com/bioly230/THM_Skynet
@@ -123753,6 +124277,7 @@ CVE-2022-22719 - https://github.com/kasem545/vulnsearch
CVE-2022-22720 - https://github.com/8ctorres/SIND-Practicas
CVE-2022-22720 - https://github.com/ARPSyndicate/cvemon
CVE-2022-22720 - https://github.com/Benasin/CVE-2022-22720
+CVE-2022-22720 - https://github.com/EzeTauil/Maquina-Upload
CVE-2022-22720 - https://github.com/PierreChrd/py-projet-tut
CVE-2022-22720 - https://github.com/Totes5706/TotesHTB
CVE-2022-22720 - https://github.com/bioly230/THM_Skynet
@@ -123761,6 +124286,7 @@ CVE-2022-22720 - https://github.com/kasem545/vulnsearch
CVE-2022-22720 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2022-22721 - https://github.com/8ctorres/SIND-Practicas
CVE-2022-22721 - https://github.com/ARPSyndicate/cvemon
+CVE-2022-22721 - https://github.com/EzeTauil/Maquina-Upload
CVE-2022-22721 - https://github.com/PierreChrd/py-projet-tut
CVE-2022-22721 - https://github.com/Totes5706/TotesHTB
CVE-2022-22721 - https://github.com/bioly230/THM_Skynet
@@ -124176,6 +124702,7 @@ CVE-2022-22947 - https://github.com/dbgee/CVE-2022-22947
CVE-2022-22947 - https://github.com/debug4you/CVE-2022-22947
CVE-2022-22947 - https://github.com/dingxiao77/-cve-2022-22947-
CVE-2022-22947 - https://github.com/dravenww/curated-article
+CVE-2022-22947 - https://github.com/enomothem/PenTestNote
CVE-2022-22947 - https://github.com/expzhizhuo/Burp_VulPscan
CVE-2022-22947 - https://github.com/fbion/CVE-2022-22947
CVE-2022-22947 - https://github.com/flying0er/CVE-2022-22947-goby
@@ -125399,6 +125926,7 @@ CVE-2022-23222 - https://github.com/CVEDB/top
CVE-2022-23222 - https://github.com/Ch4nc3n/PublicExploitation
CVE-2022-23222 - https://github.com/FridayOrtiz/CVE-2022-23222
CVE-2022-23222 - https://github.com/GhostTroops/TOP
+CVE-2022-23222 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2022-23222 - https://github.com/JERRY123S/all-poc
CVE-2022-23222 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2022-23222 - https://github.com/KayCHENvip/vulnerability-poc
@@ -125443,6 +125971,7 @@ CVE-2022-23222 - https://github.com/tr3ee/CVE-2022-23222
CVE-2022-23222 - https://github.com/trhacknon/Pocingit
CVE-2022-23222 - https://github.com/weeka10/-hktalent-TOP
CVE-2022-23222 - https://github.com/whoforget/CVE-POC
+CVE-2022-23222 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2022-23222 - https://github.com/wxrdnx/bpf_exploit_template
CVE-2022-23222 - https://github.com/xairy/linux-kernel-exploitation
CVE-2022-23222 - https://github.com/xuetusummer/Penetration_Testing_POC
@@ -126044,6 +126573,7 @@ CVE-2022-23940 - https://github.com/youwizard/CVE-POC
CVE-2022-23940 - https://github.com/zecool/cve
CVE-2022-23942 - https://github.com/karimhabush/cyberowl
CVE-2022-23943 - https://github.com/ARPSyndicate/cvemon
+CVE-2022-23943 - https://github.com/EzeTauil/Maquina-Upload
CVE-2022-23943 - https://github.com/PierreChrd/py-projet-tut
CVE-2022-23943 - https://github.com/Totes5706/TotesHTB
CVE-2022-23943 - https://github.com/bioly230/THM_Skynet
@@ -126543,6 +127073,7 @@ CVE-2022-24354 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2022-24354 - https://github.com/knd06/linux-kernel-exploitation
CVE-2022-24354 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2022-24354 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2022-24354 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2022-24354 - https://github.com/xairy/linux-kernel-exploitation
CVE-2022-24355 - https://github.com/ARPSyndicate/cvemon
CVE-2022-24355 - https://github.com/Tig3rHu/Awesome_IOT_Vul_lib
@@ -127132,6 +127663,7 @@ CVE-2022-24891 - https://github.com/razermuse/enum_cvss
CVE-2022-24893 - https://github.com/ARPSyndicate/cvemon
CVE-2022-24893 - https://github.com/pokerfacett/MY_CVE_CREDIT
CVE-2022-24899 - https://github.com/ARPSyndicate/kenzer-templates
+CVE-2022-24899 - https://github.com/AggressiveUser/AggressiveUser
CVE-2022-24900 - https://github.com/ARPSyndicate/kenzer-templates
CVE-2022-24903 - https://github.com/ARPSyndicate/cvemon
CVE-2022-24903 - https://github.com/EGI-Federation/SVG-advisories
@@ -127908,6 +128440,7 @@ CVE-2022-25636 - https://github.com/CVEDB/top
CVE-2022-25636 - https://github.com/Ch4nc3n/PublicExploitation
CVE-2022-25636 - https://github.com/EGI-Federation/SVG-advisories
CVE-2022-25636 - https://github.com/GhostTroops/TOP
+CVE-2022-25636 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2022-25636 - https://github.com/JERRY123S/all-poc
CVE-2022-25636 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2022-25636 - https://github.com/Meowmycks/OSCPprep-Cute
@@ -127955,6 +128488,7 @@ CVE-2022-25636 - https://github.com/veritas501/CVE-2022-25636-PipeVersion
CVE-2022-25636 - https://github.com/veritas501/pipe-primitive
CVE-2022-25636 - https://github.com/weeka10/-hktalent-TOP
CVE-2022-25636 - https://github.com/whoforget/CVE-POC
+CVE-2022-25636 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2022-25636 - https://github.com/xairy/linux-kernel-exploitation
CVE-2022-25636 - https://github.com/xuetusummer/Penetration_Testing_POC
CVE-2022-25636 - https://github.com/yaobinwen/robin_on_rails
@@ -127979,6 +128513,7 @@ CVE-2022-25640 - https://github.com/youwizard/CVE-POC
CVE-2022-25640 - https://github.com/zecool/cve
CVE-2022-25647 - https://github.com/ARPSyndicate/cvemon
CVE-2022-25647 - https://github.com/CGCL-codes/PHunter
+CVE-2022-25647 - https://github.com/LibHunter/LibHunter
CVE-2022-25647 - https://github.com/hinat0y/Dataset1
CVE-2022-25647 - https://github.com/hinat0y/Dataset10
CVE-2022-25647 - https://github.com/hinat0y/Dataset11
@@ -128005,6 +128540,7 @@ CVE-2022-25757 - https://github.com/ARPSyndicate/cvemon
CVE-2022-25757 - https://github.com/leveryd/go-sec-code
CVE-2022-25758 - https://github.com/seal-community/patches
CVE-2022-25761 - https://github.com/claroty/opcua-exploit-framework
+CVE-2022-25762 - https://github.com/versio-io/product-lifecycle-security-api
CVE-2022-25765 - https://github.com/ARPSyndicate/cvemon
CVE-2022-25765 - https://github.com/Anogota/Precious-
CVE-2022-25765 - https://github.com/Atsukoro1/PDFKitExploit
@@ -128086,6 +128622,7 @@ CVE-2022-25845 - https://github.com/trhacknon/Pocingit
CVE-2022-25845 - https://github.com/whoforget/CVE-POC
CVE-2022-25845 - https://github.com/youwizard/CVE-POC
CVE-2022-25845 - https://github.com/zecool/cve
+CVE-2022-2585 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2022-2585 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2022-2585 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2022-2585 - https://github.com/greek0x0/2022-LPE-UAF
@@ -128104,6 +128641,7 @@ CVE-2022-25858 - https://github.com/ARPSyndicate/cvemon
CVE-2022-25858 - https://github.com/Naruse-developer/Miku_Theme
CVE-2022-25858 - https://github.com/Naruse-developer/Warframe_theme
CVE-2022-2586 - https://github.com/ARPSyndicate/cvemon
+CVE-2022-2586 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2022-2586 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2022-2586 - https://github.com/NaInSec/CVE-PoC-in-GitHub
CVE-2022-2586 - https://github.com/Snoopy-Sec/Localroot-ALL-CVE
@@ -128129,6 +128667,7 @@ CVE-2022-2586 - https://github.com/sniper404ghostxploit/CVE-2022-2586
CVE-2022-2586 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2022-2586 - https://github.com/substing/internal_ctf
CVE-2022-2586 - https://github.com/whoforget/CVE-POC
+CVE-2022-2586 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2022-2586 - https://github.com/xairy/linux-kernel-exploitation
CVE-2022-2586 - https://github.com/youwizard/CVE-POC
CVE-2022-2586 - https://github.com/zecool/cve
@@ -128160,6 +128699,7 @@ CVE-2022-2588 - https://github.com/Etoile1024/Pentest-Common-Knowledge
CVE-2022-2588 - https://github.com/GhostTroops/TOP
CVE-2022-2588 - https://github.com/Ha0-Y/LinuxKernelExploits
CVE-2022-2588 - https://github.com/Ha0-Y/kernel-exploit-cve
+CVE-2022-2588 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2022-2588 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2022-2588 - https://github.com/Markakd/CVE-2022-2588
CVE-2022-2588 - https://github.com/Markakd/DirtyCred
@@ -128285,6 +128825,7 @@ CVE-2022-2601 - https://github.com/rhboot/shim-review
CVE-2022-2601 - https://github.com/seal-community/patches
CVE-2022-2601 - https://github.com/vathpela/shim-review
CVE-2022-2602 - https://github.com/ARPSyndicate/cvemon
+CVE-2022-2602 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2022-2602 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2022-2602 - https://github.com/LukeGix/CVE-2022-2602
CVE-2022-2602 - https://github.com/Mr-xn/Penetration_Testing_POC
@@ -128309,6 +128850,7 @@ CVE-2022-2602 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2022-2602 - https://github.com/th3-5had0w/CVE-2022-2602-Study
CVE-2022-2602 - https://github.com/wechicken456/Linux-kernel
CVE-2022-2602 - https://github.com/whoforget/CVE-POC
+CVE-2022-2602 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2022-2602 - https://github.com/xairy/linux-kernel-exploitation
CVE-2022-2602 - https://github.com/youwizard/CVE-POC
CVE-2022-26049 - https://github.com/ARPSyndicate/cvemon
@@ -128470,6 +129012,7 @@ CVE-2022-26134 - https://github.com/dabaibuai/dabai
CVE-2022-26134 - https://github.com/demining/Log4j-Vulnerability
CVE-2022-26134 - https://github.com/e-hakson/OSCP
CVE-2022-26134 - https://github.com/eljosep/OSCP-Guide
+CVE-2022-26134 - https://github.com/enomothem/PenTestNote
CVE-2022-26134 - https://github.com/f4yd4-s3c/cve-2022-26134
CVE-2022-26134 - https://github.com/getastra/hypejab
CVE-2022-26134 - https://github.com/getdrive/PoC
@@ -128702,6 +129245,7 @@ CVE-2022-26171 - https://github.com/nu11secur1ty/CVE-nu11secur1ty
CVE-2022-26171 - https://github.com/nu11secur1ty/Windows10Exploits
CVE-2022-2618 - https://github.com/ARPSyndicate/cvemon
CVE-2022-26180 - https://github.com/ARPSyndicate/cvemon
+CVE-2022-26180 - https://github.com/AggressiveUser/AggressiveUser
CVE-2022-26186 - https://github.com/ARPSyndicate/cvemon
CVE-2022-26186 - https://github.com/ExploitPwner/Totolink-CVE-2022-Exploits
CVE-2022-26201 - https://github.com/ARPSyndicate/cvemon
@@ -128843,6 +129387,7 @@ CVE-2022-26373 - https://github.com/ARPSyndicate/cvemon
CVE-2022-26377 - https://github.com/ARPSyndicate/cvemon
CVE-2022-26377 - https://github.com/Awrrays/FrameVul
CVE-2022-26377 - https://github.com/ByteXenon/IP-Security-Database
+CVE-2022-26377 - https://github.com/EzeTauil/Maquina-Upload
CVE-2022-26377 - https://github.com/Totes5706/TotesHTB
CVE-2022-26377 - https://github.com/bioly230/THM_Skynet
CVE-2022-26377 - https://github.com/firatesatoglu/shodanSearch
@@ -128854,6 +129399,7 @@ CVE-2022-2639 - https://github.com/0day404/vulnerability-poc
CVE-2022-2639 - https://github.com/20142995/sectool
CVE-2022-2639 - https://github.com/ARPSyndicate/cvemon
CVE-2022-2639 - https://github.com/EkamSinghWalia/Detection-and-Mitigation-for-CVE-2022-2639
+CVE-2022-2639 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2022-2639 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2022-2639 - https://github.com/KayCHENvip/vulnerability-poc
CVE-2022-2639 - https://github.com/Miraitowa70/POC-Notes
@@ -129575,6 +130121,7 @@ CVE-2022-27254 - https://github.com/weeka10/-hktalent-TOP
CVE-2022-27254 - https://github.com/whoforget/CVE-POC
CVE-2022-27254 - https://github.com/youwizard/CVE-POC
CVE-2022-27254 - https://github.com/zecool/cve
+CVE-2022-27255 - https://github.com/0xMarcio/cve
CVE-2022-27255 - https://github.com/ARPSyndicate/cvemon
CVE-2022-27255 - https://github.com/CVEDB/PoC-List
CVE-2022-27255 - https://github.com/CVEDB/awesome-cve-repo
@@ -129845,6 +130392,7 @@ CVE-2022-27666 - https://github.com/CVEDB/awesome-cve-repo
CVE-2022-27666 - https://github.com/CVEDB/top
CVE-2022-27666 - https://github.com/Ch4nc3n/PublicExploitation
CVE-2022-27666 - https://github.com/GhostTroops/TOP
+CVE-2022-27666 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2022-27666 - https://github.com/IdanBanani/Linux-Kernel-VR-Exploitation
CVE-2022-27666 - https://github.com/JERRY123S/all-poc
CVE-2022-27666 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
@@ -129878,6 +130426,7 @@ CVE-2022-27666 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2022-27666 - https://github.com/trhacknon/Pocingit
CVE-2022-27666 - https://github.com/weeka10/-hktalent-TOP
CVE-2022-27666 - https://github.com/whoforget/CVE-POC
+CVE-2022-27666 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2022-27666 - https://github.com/xairy/linux-kernel-exploitation
CVE-2022-27666 - https://github.com/xuetusummer/Penetration_Testing_POC
CVE-2022-27666 - https://github.com/youwizard/CVE-POC
@@ -130330,6 +130879,7 @@ CVE-2022-2833 - https://github.com/5angjun/5angjun
CVE-2022-2833 - https://github.com/ARPSyndicate/cvemon
CVE-2022-28330 - https://github.com/8ctorres/SIND-Practicas
CVE-2022-28330 - https://github.com/ARPSyndicate/cvemon
+CVE-2022-28330 - https://github.com/EzeTauil/Maquina-Upload
CVE-2022-28330 - https://github.com/firatesatoglu/shodanSearch
CVE-2022-28330 - https://github.com/kasem545/vulnsearch
CVE-2022-28331 - https://github.com/ARPSyndicate/cvemon
@@ -130636,12 +131186,14 @@ CVE-2022-28607 - https://github.com/k0imet/pyfetch
CVE-2022-2861 - https://github.com/karimhabush/cyberowl
CVE-2022-28614 - https://github.com/8ctorres/SIND-Practicas
CVE-2022-28614 - https://github.com/ARPSyndicate/cvemon
+CVE-2022-28614 - https://github.com/EzeTauil/Maquina-Upload
CVE-2022-28614 - https://github.com/Totes5706/TotesHTB
CVE-2022-28614 - https://github.com/bioly230/THM_Skynet
CVE-2022-28614 - https://github.com/firatesatoglu/shodanSearch
CVE-2022-28614 - https://github.com/kasem545/vulnsearch
CVE-2022-28615 - https://github.com/8ctorres/SIND-Practicas
CVE-2022-28615 - https://github.com/ARPSyndicate/cvemon
+CVE-2022-28615 - https://github.com/EzeTauil/Maquina-Upload
CVE-2022-28615 - https://github.com/Totes5706/TotesHTB
CVE-2022-28615 - https://github.com/bioly230/THM_Skynet
CVE-2022-28615 - https://github.com/firatesatoglu/shodanSearch
@@ -131318,6 +131870,7 @@ CVE-2022-29399 - https://github.com/ARPSyndicate/cvemon
CVE-2022-29399 - https://github.com/d1tto/IoT-vuln
CVE-2022-29404 - https://github.com/8ctorres/SIND-Practicas
CVE-2022-29404 - https://github.com/ARPSyndicate/cvemon
+CVE-2022-29404 - https://github.com/EzeTauil/Maquina-Upload
CVE-2022-29404 - https://github.com/Totes5706/TotesHTB
CVE-2022-29404 - https://github.com/bioly230/THM_Skynet
CVE-2022-29404 - https://github.com/firatesatoglu/shodanSearch
@@ -131367,6 +131920,7 @@ CVE-2022-2946 - https://github.com/ARPSyndicate/cvemon
CVE-2022-2946 - https://github.com/ExpLangcn/FuYao-Go
CVE-2022-29464 - https://github.com/0day404/vulnerability-poc
CVE-2022-29464 - https://github.com/0xAgun/CVE-2022-29464
+CVE-2022-29464 - https://github.com/0xMarcio/cve
CVE-2022-29464 - https://github.com/20142995/Goby
CVE-2022-29464 - https://github.com/20142995/pocsuite3
CVE-2022-29464 - https://github.com/2lambda123/panopticon-unattributed
@@ -131585,6 +132139,7 @@ CVE-2022-29582 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2022-29582 - https://github.com/tr3ss/gofetch
CVE-2022-29582 - https://github.com/trhacknon/Pocingit
CVE-2022-29582 - https://github.com/whoforget/CVE-POC
+CVE-2022-29582 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2022-29582 - https://github.com/xairy/linux-kernel-exploitation
CVE-2022-29582 - https://github.com/youwizard/CVE-POC
CVE-2022-29582 - https://github.com/zecool/cve
@@ -131877,6 +132432,7 @@ CVE-2022-30065 - https://github.com/stkcat/awe-base-images
CVE-2022-30067 - https://github.com/ARPSyndicate/cvemon
CVE-2022-30067 - https://github.com/Tonaram/DSS-BufferOverflow
CVE-2022-30073 - https://github.com/ARPSyndicate/kenzer-templates
+CVE-2022-30075 - https://github.com/0xMarcio/cve
CVE-2022-30075 - https://github.com/ARPSyndicate/cvemon
CVE-2022-30075 - https://github.com/CVEDB/awesome-cve-repo
CVE-2022-30075 - https://github.com/CVEDB/top
@@ -132456,6 +133012,7 @@ CVE-2022-30552 - https://github.com/ARPSyndicate/cvemon
CVE-2022-30552 - https://github.com/H4lo/awesome-IoT-security-article
CVE-2022-30556 - https://github.com/8ctorres/SIND-Practicas
CVE-2022-30556 - https://github.com/ARPSyndicate/cvemon
+CVE-2022-30556 - https://github.com/EzeTauil/Maquina-Upload
CVE-2022-30556 - https://github.com/Totes5706/TotesHTB
CVE-2022-30556 - https://github.com/bioly230/THM_Skynet
CVE-2022-30556 - https://github.com/firatesatoglu/shodanSearch
@@ -133364,6 +133921,7 @@ CVE-2022-31806 - https://github.com/ARPSyndicate/cvemon
CVE-2022-31806 - https://github.com/ic3sw0rd/Codesys_V2_Vulnerability
CVE-2022-31813 - https://github.com/8ctorres/SIND-Practicas
CVE-2022-31813 - https://github.com/ARPSyndicate/cvemon
+CVE-2022-31813 - https://github.com/EzeTauil/Maquina-Upload
CVE-2022-31813 - https://github.com/Totes5706/TotesHTB
CVE-2022-31813 - https://github.com/bioly230/THM_Skynet
CVE-2022-31813 - https://github.com/firatesatoglu/shodanSearch
@@ -133700,6 +134258,7 @@ CVE-2022-32239 - https://github.com/Live-Hack-CVE/CVE-2022-32239
CVE-2022-32250 - https://github.com/ARPSyndicate/cvemon
CVE-2022-32250 - https://github.com/Decstor5/2022-32250LPE
CVE-2022-32250 - https://github.com/EGI-Federation/SVG-advisories
+CVE-2022-32250 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2022-32250 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2022-32250 - https://github.com/Mr-xn/Penetration_Testing_POC
CVE-2022-32250 - https://github.com/NaInSec/CVE-PoC-in-GitHub
@@ -133728,6 +134287,7 @@ CVE-2022-32250 - https://github.com/substing/internal_ctf
CVE-2022-32250 - https://github.com/theori-io/CVE-2022-32250-exploit
CVE-2022-32250 - https://github.com/trhacknon/Pocingit
CVE-2022-32250 - https://github.com/whoforget/CVE-POC
+CVE-2022-32250 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2022-32250 - https://github.com/xairy/linux-kernel-exploitation
CVE-2022-32250 - https://github.com/xuetusummer/Penetration_Testing_POC
CVE-2022-32250 - https://github.com/youwizard/CVE-POC
@@ -134427,6 +134987,7 @@ CVE-2022-34265 - https://github.com/lions2012/Penetration_Testing_POC
CVE-2022-34265 - https://github.com/manas3c/CVE-POC
CVE-2022-34265 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2022-34265 - https://github.com/qwqoro/GPN-Hackathon
+CVE-2022-34265 - https://github.com/seal-community/patches
CVE-2022-34265 - https://github.com/simonepetruzzi/WebSecurityProject
CVE-2022-34265 - https://github.com/t0m4too/t0m4to
CVE-2022-34265 - https://github.com/traumatising/CVE-2022-34265
@@ -134703,11 +135264,13 @@ CVE-2022-34913 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2022-34913 - https://github.com/skinnyrad/Trophies
CVE-2022-34913 - https://github.com/whoforget/CVE-POC
CVE-2022-34913 - https://github.com/youwizard/CVE-POC
+CVE-2022-34918 - https://github.com/0xMarcio/cve
CVE-2022-34918 - https://github.com/0xStrygwyr/OSCP-Guide
CVE-2022-34918 - https://github.com/0xZipp0/OSCP
CVE-2022-34918 - https://github.com/0xsyr0/OSCP
CVE-2022-34918 - https://github.com/20142995/sectool
CVE-2022-34918 - https://github.com/ARPSyndicate/cvemon
+CVE-2022-34918 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2022-34918 - https://github.com/IdanBanani/ELF-Injection-Shellcode-Bridgehead
CVE-2022-34918 - https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits
CVE-2022-34918 - https://github.com/Ly0nt4r/OSCP
@@ -134757,6 +135320,7 @@ CVE-2022-34918 - https://github.com/trhacknon/Pocingit
CVE-2022-34918 - https://github.com/txuswashere/OSCP
CVE-2022-34918 - https://github.com/veritas501/CVE-2022-34918
CVE-2022-34918 - https://github.com/whoforget/CVE-POC
+CVE-2022-34918 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2022-34918 - https://github.com/xairy/linux-kernel-exploitation
CVE-2022-34918 - https://github.com/xhref/OSCP
CVE-2022-34918 - https://github.com/xuetusummer/Penetration_Testing_POC
@@ -135673,6 +136237,7 @@ CVE-2022-36350 - https://github.com/karimhabush/cyberowl
CVE-2022-36358 - https://github.com/karimhabush/cyberowl
CVE-2022-36359 - https://github.com/ARPSyndicate/cvemon
CVE-2022-36359 - https://github.com/motoyasu-saburi/reported_vulnerability
+CVE-2022-36359 - https://github.com/seal-community/patches
CVE-2022-36361 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2022-36362 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2022-36363 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -135822,6 +136387,7 @@ CVE-2022-36752 - https://github.com/skinnyrad/Trophies
CVE-2022-36752 - https://github.com/whoforget/CVE-POC
CVE-2022-36752 - https://github.com/youwizard/CVE-POC
CVE-2022-36760 - https://github.com/ARPSyndicate/cvemon
+CVE-2022-36760 - https://github.com/EzeTauil/Maquina-Upload
CVE-2022-36760 - https://github.com/bioly230/THM_Skynet
CVE-2022-36760 - https://github.com/firatesatoglu/shodanSearch
CVE-2022-36760 - https://github.com/karimhabush/cyberowl
@@ -136269,6 +136835,7 @@ CVE-2022-37434 - https://github.com/youwizard/CVE-POC
CVE-2022-37434 - https://github.com/zecool/cve
CVE-2022-37436 - https://github.com/8ctorres/SIND-Practicas
CVE-2022-37436 - https://github.com/ARPSyndicate/cvemon
+CVE-2022-37436 - https://github.com/EzeTauil/Maquina-Upload
CVE-2022-37436 - https://github.com/bioly230/THM_Skynet
CVE-2022-37436 - https://github.com/firatesatoglu/shodanSearch
CVE-2022-37436 - https://github.com/karimhabush/cyberowl
@@ -137201,6 +137768,7 @@ CVE-2022-39944 - https://github.com/yycunhua/4ra1n
CVE-2022-39947 - https://github.com/Threekiii/CVE
CVE-2022-39950 - https://github.com/Live-Hack-CVE/CVE-2022-39950
CVE-2022-39951 - https://github.com/karimhabush/cyberowl
+CVE-2022-39952 - https://github.com/0xMarcio/cve
CVE-2022-39952 - https://github.com/1f3lse/taiE
CVE-2022-39952 - https://github.com/ARPSyndicate/cvemon
CVE-2022-39952 - https://github.com/ARPSyndicate/kenzer-templates
@@ -137552,6 +138120,7 @@ CVE-2022-40674 - https://github.com/whoforget/CVE-POC
CVE-2022-40674 - https://github.com/youwizard/CVE-POC
CVE-2022-40676 - https://github.com/karimhabush/cyberowl
CVE-2022-40684 - https://github.com/0day404/vulnerability-poc
+CVE-2022-40684 - https://github.com/0xMarcio/cve
CVE-2022-40684 - https://github.com/20142995/sectool
CVE-2022-40684 - https://github.com/ARPSyndicate/cvemon
CVE-2022-40684 - https://github.com/ARPSyndicate/kenzer-templates
@@ -137744,6 +138313,7 @@ CVE-2022-4096 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2022-40975 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2022-40982 - https://github.com/EGI-Federation/SVG-advisories
CVE-2022-40982 - https://github.com/bcoles/kasld
+CVE-2022-40982 - https://github.com/codexlynx/hardware-attacks-state-of-the-art
CVE-2022-40982 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2022-40982 - https://github.com/giterlizzi/secdb-feeds
CVE-2022-40982 - https://github.com/hughsie/python-uswid
@@ -137978,6 +138548,7 @@ CVE-2022-41218 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2022-41218 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2022-41218 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2022-41218 - https://github.com/whoforget/CVE-POC
+CVE-2022-41218 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2022-41218 - https://github.com/xairy/linux-kernel-exploitation
CVE-2022-41218 - https://github.com/youwizard/CVE-POC
CVE-2022-41218 - https://github.com/zecool/cve
@@ -138496,6 +139067,7 @@ CVE-2022-42252 - https://github.com/ARPSyndicate/cvemon
CVE-2022-42252 - https://github.com/fernandoreb/dependency-check-springboot
CVE-2022-42252 - https://github.com/sr-monika/sprint-rest
CVE-2022-42252 - https://github.com/tanjiti/sec_profile
+CVE-2022-42252 - https://github.com/versio-io/product-lifecycle-security-api
CVE-2022-4230 - https://github.com/ARPSyndicate/cvemon
CVE-2022-42330 - https://github.com/karimhabush/cyberowl
CVE-2022-42331 - https://github.com/ARPSyndicate/cvemon
@@ -138579,6 +139151,7 @@ CVE-2022-42703 - https://github.com/pray77/CVE-2023-3640
CVE-2022-42703 - https://github.com/pray77/SCTF2023_kernelpwn
CVE-2022-42703 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2022-42703 - https://github.com/veritas501/hbp_attack_demo
+CVE-2022-42703 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2022-42703 - https://github.com/xairy/linux-kernel-exploitation
CVE-2022-42710 - https://github.com/fardeen-ahmed/Bug-bounty-Writeups
CVE-2022-42710 - https://github.com/rootxyash/learn365days
@@ -138708,6 +139281,7 @@ CVE-2022-42889 - https://github.com/Threekiii/Awesome-POC
CVE-2022-42889 - https://github.com/Vamckis/Container-Security
CVE-2022-42889 - https://github.com/Vulnmachines/text4shell-CVE-2022-42889
CVE-2022-42889 - https://github.com/WFS-Mend/vtrade-common
+CVE-2022-42889 - https://github.com/Whoopsunix/PPPVULNS
CVE-2022-42889 - https://github.com/XRSec/AWVS-Update
CVE-2022-42889 - https://github.com/Y4tacker/JavaSec
CVE-2022-42889 - https://github.com/aaronm-sysdig/text4shell-docker
@@ -138795,6 +139369,7 @@ CVE-2022-42895 - https://github.com/khanhnd123/linux-kernel-exploitation
CVE-2022-42895 - https://github.com/knd06/linux-kernel-exploitation
CVE-2022-42895 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2022-42895 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2022-42895 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2022-42895 - https://github.com/xairy/linux-kernel-exploitation
CVE-2022-42896 - https://github.com/ARPSyndicate/cvemon
CVE-2022-42896 - https://github.com/Satheesh575555/linux-4.19.72_CVE-2022-42896
@@ -138813,6 +139388,7 @@ CVE-2022-42896 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2022-42896 - https://github.com/nidhi7598/linux-4.1.15_CVE-2022-42896
CVE-2022-42896 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2022-42896 - https://github.com/ssr-111/linux-kernel-exploitation
+CVE-2022-42896 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2022-42896 - https://github.com/xairy/linux-kernel-exploitation
CVE-2022-42898 - https://github.com/ARPSyndicate/cvemon
CVE-2022-42898 - https://github.com/VeerMuchandi/s3c-springboot-demo
@@ -139194,6 +139770,7 @@ CVE-2022-44268 - https://github.com/dai5z/LBAS
CVE-2022-44268 - https://github.com/daniellemonika/CSCE-5552-Prying-Eyes
CVE-2022-44268 - https://github.com/doyensec/imagemagick-security-policy-evaluator
CVE-2022-44268 - https://github.com/duc-nt/CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC
+CVE-2022-44268 - https://github.com/enomothem/PenTestNote
CVE-2022-44268 - https://github.com/entr0pie/CVE-2022-44268
CVE-2022-44268 - https://github.com/fanbyprinciple/ImageMagick-lfi-poc
CVE-2022-44268 - https://github.com/jnschaeffer/cve-2022-44268-detector
@@ -139543,6 +140120,7 @@ CVE-2022-4543 - https://github.com/ndk191/linux-kernel-exploitation
CVE-2022-4543 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2022-4543 - https://github.com/ssr-111/linux-kernel-exploitation
CVE-2022-4543 - https://github.com/sunichi/cve-2022-4543-wrapper
+CVE-2022-4543 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2022-4543 - https://github.com/xairy/linux-kernel-exploitation
CVE-2022-45436 - https://github.com/ARPSyndicate/cvemon
CVE-2022-45436 - https://github.com/damodarnaik/CVE-2022-45436
@@ -141475,6 +142053,7 @@ CVE-2023-2002 - https://github.com/hktalent/TOP
CVE-2023-2002 - https://github.com/lrh2000/CVE-2023-2002
CVE-2023-2002 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2023-20020 - https://github.com/Live-Hack-CVE/CVE-2023-20020
+CVE-2023-20025 - https://github.com/CVEDB/awesome-cve-repo
CVE-2023-20025 - https://github.com/lnversed/CVE-2023-20025
CVE-2023-20025 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2023-20028 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -141569,6 +142148,7 @@ CVE-2023-20198 - https://github.com/W01fh4cker/CVE-2023-20198-RCE
CVE-2023-20198 - https://github.com/XRSec/AWVS-Update
CVE-2023-20198 - https://github.com/ZephrFish/CVE-2023-20198-Checker
CVE-2023-20198 - https://github.com/ZephrFish/Cisco-IOS-XE-Scanner
+CVE-2023-20198 - https://github.com/aleff-github/aleff-github
CVE-2023-20198 - https://github.com/aleff-github/my-flipper-shits
CVE-2023-20198 - https://github.com/alekos3/CVE_2023_20198_Detector
CVE-2023-20198 - https://github.com/alekos3/CVE_2023_20198_Remediator
@@ -141636,6 +142216,7 @@ CVE-2023-20273 - https://github.com/H4lo/awesome-IoT-security-article
CVE-2023-20273 - https://github.com/Ostorlab/KEV
CVE-2023-20273 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
CVE-2023-20273 - https://github.com/Shadow0ps/CVE-2023-20198-Scanner
+CVE-2023-20273 - https://github.com/aleff-github/aleff-github
CVE-2023-20273 - https://github.com/aleff-github/my-flipper-shits
CVE-2023-20273 - https://github.com/cadencejames/Check-HttpServerStatus
CVE-2023-20273 - https://github.com/f1tao/awesome-iot-security-resource
@@ -141688,6 +142269,7 @@ CVE-2023-20593 - https://github.com/sbaresearch/stop-zenbleed-win
CVE-2023-20593 - https://github.com/speed47/spectre-meltdown-checker
CVE-2023-20593 - https://github.com/w1redch4d/windowz2-bleed
CVE-2023-20598 - https://github.com/hfiref0x/KDU
+CVE-2023-20598 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2023-20634 - https://github.com/ARPSyndicate/cvemon
CVE-2023-20634 - https://github.com/Resery/Resery
CVE-2023-20635 - https://github.com/ARPSyndicate/cvemon
@@ -142333,6 +142915,7 @@ CVE-2023-21837 - https://github.com/hktalent/CVE-2023-21837
CVE-2023-21837 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2023-21837 - https://github.com/thiscodecc/thiscodecc
CVE-2023-21838 - https://github.com/r00t4dm/r00t4dm
+CVE-2023-21839 - https://github.com/0xMarcio/cve
CVE-2023-21839 - https://github.com/0xn0ne/simple-scanner
CVE-2023-21839 - https://github.com/20142995/pocsuite3
CVE-2023-21839 - https://github.com/20142995/sectool
@@ -142432,7 +143015,9 @@ CVE-2023-21979 - https://github.com/hktalent/TOP
CVE-2023-21979 - https://github.com/trganda/starrlist
CVE-2023-21980 - https://github.com/scmanjarrez/CVEScannerV2
CVE-2023-21987 - https://github.com/AtonceInventions/Hypervisor
+CVE-2023-21987 - https://github.com/husseinmuhaisen/Hypervisor
CVE-2023-21991 - https://github.com/AtonceInventions/Hypervisor
+CVE-2023-21991 - https://github.com/husseinmuhaisen/Hypervisor
CVE-2023-22006 - https://github.com/motoyasu-saburi/reported_vulnerability
CVE-2023-2203 - https://github.com/em1ga3l/cve-publicationdate-extractor
CVE-2023-2203222 - https://github.com/em1ga3l/cve-publicationdate-extractor
@@ -142644,6 +143229,7 @@ CVE-2023-22527 - https://github.com/ReAbout/web-sec
CVE-2023-22527 - https://github.com/RevoltSecurities/CVE-2023-22527
CVE-2023-22527 - https://github.com/Sudistark/patch-diff-CVE-2023-22527
CVE-2023-22527 - https://github.com/Threekiii/Awesome-POC
+CVE-2023-22527 - https://github.com/Threekiii/Awesome-Redteam
CVE-2023-22527 - https://github.com/Threekiii/CVE
CVE-2023-22527 - https://github.com/Threekiii/Vulhub-Reproduce
CVE-2023-22527 - https://github.com/Tropinene/Yscanner
@@ -142968,6 +143554,7 @@ CVE-2023-23397 - https://github.com/abrahim7112/Vulnerability-checking-program-f
CVE-2023-23397 - https://github.com/ahmedkhlief/CVE-2023-23397-POC
CVE-2023-23397 - https://github.com/ahmedkhlief/CVE-2023-23397-POC-Using-Interop-Outlook
CVE-2023-23397 - https://github.com/alecdhuse/Lantern-Shark
+CVE-2023-23397 - https://github.com/aleff-github/aleff-github
CVE-2023-23397 - https://github.com/aleff-github/my-flipper-shits
CVE-2023-23397 - https://github.com/alicangnll/CVE-2023-23397
CVE-2023-23397 - https://github.com/alsaeroth/CVE-2023-23397-POC
@@ -143128,6 +143715,7 @@ CVE-2023-23576 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-23583 - https://github.com/EGI-Federation/SVG-advisories
CVE-2023-23583 - https://github.com/Mav3r1ck0x1/CVE-2023-23583-Reptar-
CVE-2023-23583 - https://github.com/blazcode/INTEL-SA-00950
+CVE-2023-23583 - https://github.com/codexlynx/hardware-attacks-state-of-the-art
CVE-2023-23583 - https://github.com/giterlizzi/secdb-feeds
CVE-2023-23583 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2023-23583 - https://github.com/speed47/spectre-meltdown-checker
@@ -143138,6 +143726,7 @@ CVE-2023-23590 - https://github.com/VulnTotal-Team/Vehicle-Security
CVE-2023-23590 - https://github.com/VulnTotal-Team/vehicle_cves
CVE-2023-23595 - https://github.com/ARPSyndicate/cvemon
CVE-2023-23595 - https://github.com/colemanjp/XXE-Vulnerability-in-Bluecat-Device-Registration-Portal-DRP
+CVE-2023-23607 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2023-23614 - https://github.com/4n4nk3/4n4nk3
CVE-2023-23614 - https://github.com/ARPSyndicate/cvemon
CVE-2023-23618 - https://github.com/9069332997/session-1-full-stack
@@ -143203,6 +143792,7 @@ CVE-2023-23752 - https://github.com/Archan6el/Devvortex-Writeup-HackTheBox
CVE-2023-23752 - https://github.com/BearClaw96/Joomla-v4.x-Unauthenticated-information-disclosure
CVE-2023-23752 - https://github.com/BugBlocker/lotus-scripts
CVE-2023-23752 - https://github.com/C1ph3rX13/CVE-2023-23752
+CVE-2023-23752 - https://github.com/CLincat/vulcat
CVE-2023-23752 - https://github.com/CVEDB/PoC-List
CVE-2023-23752 - https://github.com/CVEDB/awesome-cve-repo
CVE-2023-23752 - https://github.com/CVEDB/top
@@ -143554,6 +144144,7 @@ CVE-2023-24573 - https://github.com/ARPSyndicate/cvemon
CVE-2023-24573 - https://github.com/ycdxsb/ycdxsb
CVE-2023-2458 - https://github.com/zhchbin/zhchbin
CVE-2023-24580 - https://github.com/ARPSyndicate/cvemon
+CVE-2023-24580 - https://github.com/seal-community/patches
CVE-2023-24609 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-24610 - https://github.com/abbisQQ/CVE-2023-24610
CVE-2023-24610 - https://github.com/hktalent/TOP
@@ -143710,6 +144301,7 @@ CVE-2023-25143 - https://github.com/dlehgus1023/dlehgus1023
CVE-2023-25152 - https://github.com/ARPSyndicate/cvemon
CVE-2023-25157 - https://github.com/0x2458bughunt/CVE-2023-25157
CVE-2023-25157 - https://github.com/0x783kb/Security-operation-book
+CVE-2023-25157 - https://github.com/0xMarcio/cve
CVE-2023-25157 - https://github.com/20142995/sectool
CVE-2023-25157 - https://github.com/7imbitz/CVE-2023-25157-checker
CVE-2023-25157 - https://github.com/Awrrays/FrameVul
@@ -143872,6 +144464,7 @@ CVE-2023-25690 - https://github.com/ARPSyndicate/cvemon
CVE-2023-25690 - https://github.com/CVEDB/awesome-cve-repo
CVE-2023-25690 - https://github.com/CVEDB/top
CVE-2023-25690 - https://github.com/EGI-Federation/SVG-advisories
+CVE-2023-25690 - https://github.com/EzeTauil/Maquina-Upload
CVE-2023-25690 - https://github.com/GGontijo/CTF-s
CVE-2023-25690 - https://github.com/GhostTroops/TOP
CVE-2023-25690 - https://github.com/H4lo/awesome-IoT-security-article
@@ -144157,6 +144750,7 @@ CVE-2023-26396 - https://github.com/kohnakagawa/kohnakagawa
CVE-2023-2640 - https://github.com/0xWhoami35/root-kernel
CVE-2023-2640 - https://github.com/0xsyr0/OSCP
CVE-2023-2640 - https://github.com/Ev3rPalestine/Analytics-HTB-Walkthrough
+CVE-2023-2640 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2023-2640 - https://github.com/K5LK/CVE-2023-2640-32629
CVE-2023-2640 - https://github.com/Kiosec/Linux-Exploitation
CVE-2023-2640 - https://github.com/Nkipohcs/CVE-2023-2640-CVE-2023-32629
@@ -144553,6 +145147,7 @@ CVE-2023-27502 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-2752 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2023-27520 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-27522 - https://github.com/ARPSyndicate/cvemon
+CVE-2023-27522 - https://github.com/EzeTauil/Maquina-Upload
CVE-2023-27522 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-27522 - https://github.com/xonoxitron/cpe2cve
CVE-2023-27524 - https://github.com/0day404/vulnerability-poc
@@ -144920,6 +145515,7 @@ CVE-2023-2825 - https://github.com/johe123qwe/github-trending
CVE-2023-2825 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2023-28250 - https://github.com/BenjiTrapp/cisa-known-vuln-scraper
CVE-2023-28250 - https://github.com/BenjiTrapp/cve-prio-marble
+CVE-2023-28252 - https://github.com/0xMarcio/cve
CVE-2023-28252 - https://github.com/726232111/CVE-2023-28252
CVE-2023-28252 - https://github.com/ARPSyndicate/cvemon
CVE-2023-28252 - https://github.com/CVEDB/awesome-cve-repo
@@ -145179,6 +145775,7 @@ CVE-2023-28708 - https://github.com/Dzmitry-Basiachenka/dist-foreign-aliakh
CVE-2023-28708 - https://github.com/fernandoreb/dependency-check-springboot
CVE-2023-28708 - https://github.com/scordero1234/java_sec_demo-main
CVE-2023-28708 - https://github.com/trganda/dockerv
+CVE-2023-28708 - https://github.com/versio-io/product-lifecycle-security-api
CVE-2023-28709 - https://github.com/Dzmitry-Basiachenka/dist-foreign-aliakh
CVE-2023-28709 - https://github.com/seal-community/patches
CVE-2023-2871 - https://github.com/zeze-zeze/WindowsKernelVuln
@@ -145388,6 +145985,7 @@ CVE-2023-29343 - https://github.com/johe123qwe/github-trending
CVE-2023-29343 - https://github.com/lions2012/Penetration_Testing_POC
CVE-2023-29343 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2023-29345 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2023-29357 - https://github.com/0xMarcio/cve
CVE-2023-29357 - https://github.com/CVEDB/awesome-cve-repo
CVE-2023-29357 - https://github.com/CVEDB/top
CVE-2023-29357 - https://github.com/Chocapikk/CVE-2023-29357
@@ -145406,6 +146004,9 @@ CVE-2023-29357 - https://github.com/netlas-io/netlas-dorks
CVE-2023-29357 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2023-29357 - https://github.com/tanjiti/sec_profile
CVE-2023-29357 - https://github.com/whitfieldsdad/cisa_kev
+CVE-2023-29360 - https://github.com/CVEDB/awesome-cve-repo
+CVE-2023-29360 - https://github.com/CVEDB/top
+CVE-2023-29360 - https://github.com/GhostTroops/TOP
CVE-2023-29360 - https://github.com/Nero22k/cve-2023-29360
CVE-2023-29360 - https://github.com/Ostorlab/KEV
CVE-2023-29360 - https://github.com/cvefeed/cvefeed.io
@@ -145854,6 +146455,7 @@ CVE-2023-31070 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2023-31071 - https://github.com/hackintoanetwork/hackintoanetwork
CVE-2023-31072 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-31099 - https://github.com/tanjiti/sec_profile
+CVE-2023-31122 - https://github.com/EzeTauil/Maquina-Upload
CVE-2023-31122 - https://github.com/arsenalzp/apch-operator
CVE-2023-31122 - https://github.com/klemakle/audit-pentest-BOX
CVE-2023-31122 - https://github.com/xonoxitron/cpe2cve
@@ -146139,6 +146741,7 @@ CVE-2023-32173 - https://github.com/0vercl0k/pwn2own2023-miami
CVE-2023-32174 - https://github.com/0vercl0k/pwn2own2023-miami
CVE-2023-32175 - https://github.com/dhn/dhn
CVE-2023-32183 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2023-32191 - https://github.com/tanjiti/sec_profile
CVE-2023-3221 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-32219 - https://github.com/1-tong/vehicle_cves
CVE-2023-32219 - https://github.com/Vu1nT0tal/Vehicle-Security
@@ -146378,6 +146981,7 @@ CVE-2023-32623 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-32629 - https://github.com/0xWhoami35/root-kernel
CVE-2023-32629 - https://github.com/0xsyr0/OSCP
CVE-2023-32629 - https://github.com/Ev3rPalestine/Analytics-HTB-Walkthrough
+CVE-2023-32629 - https://github.com/HaxorSecInfec/autoroot.sh
CVE-2023-32629 - https://github.com/K5LK/CVE-2023-2640-32629
CVE-2023-32629 - https://github.com/Kiosec/Linux-Exploitation
CVE-2023-32629 - https://github.com/Nkipohcs/CVE-2023-2640-CVE-2023-32629
@@ -146581,6 +147185,7 @@ CVE-2023-33101 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-33103 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-33104 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-33105 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2023-33105 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2023-33106 - https://github.com/Ostorlab/KEV
CVE-2023-33106 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
CVE-2023-33106 - https://github.com/RENANZG/My-Forensics
@@ -146818,6 +147423,7 @@ CVE-2023-33676 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2023-33677 - https://github.com/ASR511-OO7/CVE-2023-33677
CVE-2023-33677 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-33677 - https://github.com/nomi-sec/PoC-in-GitHub
+CVE-2023-33693 - https://github.com/ernestang98/win-exploits
CVE-2023-33725 - https://github.com/Contrast-Security-OSS/Burptrast
CVE-2023-33725 - https://github.com/demomm/burptrast
CVE-2023-33730 - https://github.com/nomi-sec/PoC-in-GitHub
@@ -147095,6 +147701,7 @@ CVE-2023-34330 - https://github.com/chnzzh/Redfish-CVE-lib
CVE-2023-3434 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-34349 - https://github.com/another1024/another1024
CVE-2023-34355 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2023-34362 - https://github.com/0xMarcio/cve
CVE-2023-34362 - https://github.com/0xdead8ead-randori/cve_search_msf
CVE-2023-34362 - https://github.com/ARPSyndicate/cvemon
CVE-2023-34362 - https://github.com/BenjiTrapp/cisa-known-vuln-scraper
@@ -147387,6 +147994,7 @@ CVE-2023-35132 - https://github.com/kip93/kip93
CVE-2023-35133 - https://github.com/kip93/kip93
CVE-2023-3514 - https://github.com/star-sg/CVE
CVE-2023-3515 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2023-3519 - https://github.com/0xMarcio/cve
CVE-2023-3519 - https://github.com/Aicks/Citrix-CVE-2023-3519
CVE-2023-3519 - https://github.com/BishopFox/CVE-2023-3519
CVE-2023-3519 - https://github.com/CVEDB/awesome-cve-repo
@@ -147849,6 +148457,7 @@ CVE-2023-36728 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-3673 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-36735 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-36741 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2023-36745 - https://github.com/0xMarcio/cve
CVE-2023-36745 - https://github.com/CVEDB/awesome-cve-repo
CVE-2023-36745 - https://github.com/CVEDB/top
CVE-2023-36745 - https://github.com/GhostTroops/TOP
@@ -148000,6 +148609,7 @@ CVE-2023-36884 - https://github.com/Maxwitat/CVE-2023-36884-Scripts-for-Intune-R
CVE-2023-36884 - https://github.com/Ostorlab/KEV
CVE-2023-36884 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
CVE-2023-36884 - https://github.com/ToddMaxey/CVE-2023-36884
+CVE-2023-36884 - https://github.com/aleff-github/aleff-github
CVE-2023-36884 - https://github.com/aleff-github/my-flipper-shits
CVE-2023-36884 - https://github.com/bkzk/cisco-email-filters
CVE-2023-36884 - https://github.com/deepinstinct/Storm0978-RomCom-Campaign
@@ -148562,6 +149172,7 @@ CVE-2023-38545 - https://github.com/dbrugman/CVE-2023-38545-POC
CVE-2023-38545 - https://github.com/fatmo666/CVE-2023-38545-libcurl-SOCKS5-heap-buffer-overflow
CVE-2023-38545 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-38545 - https://github.com/imfht/CVE-2023-38545
+CVE-2023-38545 - https://github.com/industrial-edge/iih-essentials-development-kit
CVE-2023-38545 - https://github.com/izj007/wechat
CVE-2023-38545 - https://github.com/kherrick/lobsters
CVE-2023-38545 - https://github.com/malinkamedok/devops_sandbox
@@ -148573,6 +149184,7 @@ CVE-2023-38545 - https://github.com/vanigori/CVE-2023-38545-sample
CVE-2023-38545 - https://github.com/whoami13apt/files2
CVE-2023-38546 - https://github.com/alex-grandson/docker-python-example
CVE-2023-38546 - https://github.com/fokypoky/places-list
+CVE-2023-38546 - https://github.com/industrial-edge/iih-essentials-development-kit
CVE-2023-38546 - https://github.com/malinkamedok/devops_sandbox
CVE-2023-38546 - https://github.com/testing-felickz/docker-scout-demo
CVE-2023-3855 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -149037,6 +149649,7 @@ CVE-2023-39807 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-39808 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-39809 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-39848 - https://github.com/AS-Mend-RenovateEE/RenovateEEDVWA
+CVE-2023-39848 - https://github.com/Abhitejabodapati/DVWA-SAST
CVE-2023-39848 - https://github.com/Blake384/DVWA
CVE-2023-39848 - https://github.com/BrunoiMesquita/DAMN-VULNERABLE-PHP-WEB-APPLICATION
CVE-2023-39848 - https://github.com/Bulnick/SCode
@@ -149048,6 +149661,7 @@ CVE-2023-39848 - https://github.com/HMPDocker/hmpdockertp
CVE-2023-39848 - https://github.com/HowAreYouChristian/crs
CVE-2023-39848 - https://github.com/HycCodeQL/DVWA
CVE-2023-39848 - https://github.com/Iamishfaq07/DVWA
+CVE-2023-39848 - https://github.com/Jackbling/DVWA
CVE-2023-39848 - https://github.com/Jun1u2/TestGR
CVE-2023-39848 - https://github.com/Kir-Scheluh/SSDLC-lab4-test
CVE-2023-39848 - https://github.com/LenninPeren/PruebaDVWA
@@ -149066,6 +149680,8 @@ CVE-2023-39848 - https://github.com/SCMOnboard100/Synergistic-Steel-Table
CVE-2023-39848 - https://github.com/Security-Test-Account/DVWA
CVE-2023-39848 - https://github.com/ShrutikaNakhale/DVWA2
CVE-2023-39848 - https://github.com/Slon12jr/DVWA
+CVE-2023-39848 - https://github.com/TINNI-Lal/DVWA
+CVE-2023-39848 - https://github.com/Yahyazaizi/application-test-security
CVE-2023-39848 - https://github.com/Zahidkhan1221/DWVA
CVE-2023-39848 - https://github.com/andersongodoy/DVWA-CORRIGIDO
CVE-2023-39848 - https://github.com/asmendio/RenovateEETest
@@ -149293,6 +149909,7 @@ CVE-2023-40370 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-4039 - https://github.com/GrigGM/05-virt-04-docker-hw
CVE-2023-4039 - https://github.com/bollwarm/SecToolSet
CVE-2023-4039 - https://github.com/fokypoky/places-list
+CVE-2023-4039 - https://github.com/m-pasima/CI-CD-Security-image-scan
CVE-2023-40403 - https://github.com/dlehgus1023/dlehgus1023
CVE-2023-4041 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-4042 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -149318,11 +149935,16 @@ CVE-2023-40537 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-40542 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-40544 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-40546 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2023-40546 - https://github.com/seal-community/patches
CVE-2023-40547 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2023-40547 - https://github.com/seal-community/patches
CVE-2023-40548 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-40549 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2023-40549 - https://github.com/seal-community/patches
CVE-2023-40550 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2023-40550 - https://github.com/seal-community/patches
CVE-2023-40551 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2023-40551 - https://github.com/seal-community/patches
CVE-2023-40556 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-40570 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-40571 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -149518,6 +150140,7 @@ CVE-2023-41128 - https://github.com/parkttule/parkttule
CVE-2023-41131 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-41136 - https://github.com/parkttule/parkttule
CVE-2023-41164 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2023-41164 - https://github.com/seal-community/patches
CVE-2023-41174 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-41179 - https://github.com/MiracleAnameke/Cybersecurity-Vulnerability-and-Exposure-Report
CVE-2023-41179 - https://github.com/Ostorlab/KEV
@@ -149904,9 +150527,11 @@ CVE-2023-42308 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2023-42320 - https://github.com/aixiao0621/Tenda
CVE-2023-42362 - https://github.com/Mr-n0b3dy/CVE-2023-42362
CVE-2023-42362 - https://github.com/nomi-sec/PoC-in-GitHub
+CVE-2023-42363 - https://github.com/bcgov/jag-cdds
CVE-2023-42363 - https://github.com/cdupuis/aspnetapp
CVE-2023-42364 - https://github.com/cdupuis/aspnetapp
CVE-2023-42365 - https://github.com/cdupuis/aspnetapp
+CVE-2023-42366 - https://github.com/bcgov/jag-cdds
CVE-2023-42366 - https://github.com/cdupuis/aspnetapp
CVE-2023-4237 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-42374 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -150359,6 +150984,7 @@ CVE-2023-43655 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-43656 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-43659 - https://github.com/kip93/kip93
CVE-2023-43660 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2023-43662 - https://github.com/wy876/POC
CVE-2023-43665 - https://github.com/1wc/1wc
CVE-2023-43666 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-43667 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -150606,6 +151232,7 @@ CVE-2023-44309 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-4431 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-44310 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-44311 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2023-44313 - https://github.com/tanjiti/sec_profile
CVE-2023-44315 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-44324 - https://github.com/NaInSec/CVE-LIST
CVE-2023-44325 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -150659,6 +151286,7 @@ CVE-2023-44483 - https://github.com/phax/ph-xmldsig
CVE-2023-44484 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-44485 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-44486 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2023-44487 - https://github.com/0xMarcio/cve
CVE-2023-44487 - https://github.com/AlexRogalskiy/AlexRogalskiy
CVE-2023-44487 - https://github.com/Austnez/tools
CVE-2023-44487 - https://github.com/ByteHackr/CVE-2023-44487
@@ -150720,6 +151348,7 @@ CVE-2023-44487 - https://github.com/zhaohuabing/cve-agent
CVE-2023-44487 - https://github.com/zhaoolee/garss
CVE-2023-44488 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-4450 - https://github.com/Threekiii/Awesome-POC
+CVE-2023-4450 - https://github.com/bigblackhat/oFx
CVE-2023-4450 - https://github.com/chennbnbnb/JDoop-release
CVE-2023-4450 - https://github.com/hxysaury/saury-vulnhub
CVE-2023-4450 - https://github.com/ilikeoyt/CVE-2023-4450-Attack
@@ -151061,6 +151690,7 @@ CVE-2023-45664 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-45666 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-45667 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-4567 - https://github.com/chinocchio/EthicalHacking
+CVE-2023-45674 - https://github.com/OrenGitHub/dhscanner
CVE-2023-45675 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-45678 - https://github.com/runwuf/clickhouse-test
CVE-2023-4568 - https://github.com/nomi-sec/PoC-in-GitHub
@@ -151100,6 +151730,7 @@ CVE-2023-45797 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-45798 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-45799 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-45801 - https://github.com/karimhabush/cyberowl
+CVE-2023-45802 - https://github.com/EzeTauil/Maquina-Upload
CVE-2023-45802 - https://github.com/arsenalzp/apch-operator
CVE-2023-45802 - https://github.com/karimhabush/cyberowl
CVE-2023-45802 - https://github.com/xonoxitron/cpe2cve
@@ -151466,6 +152097,7 @@ CVE-2023-46728 - https://github.com/MegaManSec/Squid-Security-Audit
CVE-2023-46728 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-46729 - https://github.com/aszx87410/blog
CVE-2023-46729 - https://github.com/tanjiti/sec_profile
+CVE-2023-46747 - https://github.com/0xMarcio/cve
CVE-2023-46747 - https://github.com/AliBrTab/CVE-2023-46747-POC
CVE-2023-46747 - https://github.com/CVEDB/awesome-cve-repo
CVE-2023-46747 - https://github.com/CVEDB/top
@@ -152367,6 +152999,7 @@ CVE-2023-4966 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detec
CVE-2023-4966 - https://github.com/RevoltSecurities/CVE-2023-4966
CVE-2023-4966 - https://github.com/Threekiii/Awesome-POC
CVE-2023-4966 - https://github.com/Threekiii/CVE
+CVE-2023-4966 - https://github.com/aleff-github/aleff-github
CVE-2023-4966 - https://github.com/aleff-github/my-flipper-shits
CVE-2023-4966 - https://github.com/byte4RR4Y/CVE-2023-4966
CVE-2023-4966 - https://github.com/certat/citrix-logchecker
@@ -152532,6 +153165,7 @@ CVE-2023-50131 - https://github.com/sajaljat/CVE-2023-50131
CVE-2023-50132 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2023-50132 - https://github.com/sajaljat/CVE-2023-50132
CVE-2023-5016 - https://github.com/20142995/pocsuite3
+CVE-2023-5016 - https://github.com/bayuncao/bayuncao
CVE-2023-50164 - https://github.com/AsfandAliMemon25/CVE-2023-50164Analysis-
CVE-2023-50164 - https://github.com/Marco-zcl/POC
CVE-2023-50164 - https://github.com/Thirukrishnan/CVE-2023-50164-Apache-Struts-RCE
@@ -152560,6 +153194,7 @@ CVE-2023-50168 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-50175 - https://github.com/a-zara-n/a-zara-n
CVE-2023-50175 - https://github.com/mute1008/mute1008
CVE-2023-50175 - https://github.com/mute1997/mute1997
+CVE-2023-5022 - https://github.com/bayuncao/bayuncao
CVE-2023-50220 - https://github.com/neutrinoguy/awesome-ics-writeups
CVE-2023-50220 - https://github.com/tanjiti/sec_profile
CVE-2023-50226 - https://github.com/jiayy/android_vuln_poc-exp
@@ -153256,6 +153891,7 @@ CVE-2023-52425 - https://github.com/TimoTielens/httpd-security
CVE-2023-52425 - https://github.com/egorvozhzhov/docker-test
CVE-2023-52425 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-52425 - https://github.com/fokypoky/places-list
+CVE-2023-52425 - https://github.com/m-pasima/CI-CD-Security-image-scan
CVE-2023-52426 - https://github.com/GrigGM/05-virt-04-docker-hw
CVE-2023-52426 - https://github.com/Murken-0/docker-vulnerabilities
CVE-2023-52426 - https://github.com/PaulZtx/docker_practice
@@ -153893,6 +154529,7 @@ CVE-2023-6654 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2023-6654 - https://github.com/qfmy1024/CVE-2023-6654
CVE-2023-6654 - https://github.com/tanjiti/sec_profile
CVE-2023-6655 - https://github.com/20142995/sectool
+CVE-2023-6656 - https://github.com/bayuncao/bayuncao
CVE-2023-6656 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2023-6660 - https://github.com/NaInSec/CVE-LIST
CVE-2023-6660 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -158924,6 +159561,8 @@ CVE-2024-0039 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-0040 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-0041 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-0043 - https://github.com/cisagov/vulnrichment
+CVE-2024-0044 - https://github.com/nomi-sec/PoC-in-GitHub
+CVE-2024-0044 - https://github.com/tanjiti/sec_profile
CVE-2024-0054 - https://github.com/NaInSec/CVE-LIST
CVE-2024-0055 - https://github.com/NaInSec/CVE-LIST
CVE-2024-0056 - https://github.com/NaInSec/CVE-LIST
@@ -158960,6 +159599,7 @@ CVE-2024-0194 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-0195 - https://github.com/Marco-zcl/POC
CVE-2024-0195 - https://github.com/Tropinene/Yscanner
CVE-2024-0195 - https://github.com/d4n-sec/d4n-sec.github.io
+CVE-2024-0195 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-0195 - https://github.com/tanjiti/sec_profile
CVE-2024-0195 - https://github.com/wjlin0/poc-doc
CVE-2024-0195 - https://github.com/wy876/POC
@@ -159097,6 +159737,7 @@ CVE-2024-0349 - https://github.com/ahmedvienna/CVEs-and-Vulnerabilities
CVE-2024-0350 - https://github.com/ahmedvienna/CVEs-and-Vulnerabilities
CVE-2024-0351 - https://github.com/ahmedvienna/CVEs-and-Vulnerabilities
CVE-2024-0352 - https://github.com/Tropinene/Yscanner
+CVE-2024-0352 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-0352 - https://github.com/tanjiti/sec_profile
CVE-2024-0365 - https://github.com/NaInSec/CVE-LIST
CVE-2024-0370 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -159220,6 +159861,7 @@ CVE-2024-0652 - https://github.com/Agampreet-Singh/CVE-2024-0652
CVE-2024-0652 - https://github.com/Agampreet-Singh/CVE-2024-25202
CVE-2024-0652 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-0652 - https://github.com/nomi-sec/PoC-in-GitHub
+CVE-2024-0654 - https://github.com/bayuncao/bayuncao
CVE-2024-0654 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-0655 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-0657 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -159280,6 +159922,7 @@ CVE-2024-0750 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-0751 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-0753 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-0755 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-0757 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-0759 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-0765 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-0769 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -159356,6 +159999,8 @@ CVE-2024-0930 - https://github.com/yaoyue123/iot
CVE-2024-0931 - https://github.com/yaoyue123/iot
CVE-2024-0932 - https://github.com/yaoyue123/iot
CVE-2024-0935 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-0936 - https://github.com/bayuncao/bayuncao
+CVE-2024-0937 - https://github.com/bayuncao/bayuncao
CVE-2024-0939 - https://github.com/tanjiti/sec_profile
CVE-2024-0948 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-0951 - https://github.com/NaInSec/CVE-LIST
@@ -159363,7 +160008,9 @@ CVE-2024-0953 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-0953 - https://github.com/securitycipher/daily-bugbounty-writeups
CVE-2024-0957 - https://github.com/NaInSec/CVE-LIST
CVE-2024-0957 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-0959 - https://github.com/bayuncao/bayuncao
CVE-2024-0959 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-0960 - https://github.com/bayuncao/bayuncao
CVE-2024-0960 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-0962 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-0963 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -159653,6 +160300,7 @@ CVE-2024-1417 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-1420 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-1423 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-1431 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-1432 - https://github.com/bayuncao/bayuncao
CVE-2024-1432 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-1433 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-1441 - https://github.com/NaInSec/CVE-LIST
@@ -159839,6 +160487,7 @@ CVE-2024-1733 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-1742 - https://github.com/NaInSec/CVE-LIST
CVE-2024-1743 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-1746 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-1748 - https://github.com/bayuncao/bayuncao
CVE-2024-1748 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-1749 - https://github.com/Srivishnu-p/CVEs-and-Vulnerabilities
CVE-2024-1749 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -159914,6 +160563,7 @@ CVE-2024-1871 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-1874 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-1874 - https://github.com/michalsvoboda76/batbadbut
CVE-2024-1874 - https://github.com/nomi-sec/PoC-in-GitHub
+CVE-2024-1874 - https://github.com/tianstcht/tianstcht
CVE-2024-1875 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-1876 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-1877 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -160002,6 +160652,7 @@ CVE-2024-20029 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-20030 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-20031 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-20032 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-20032 - https://github.com/tf2spi/dumpshell
CVE-2024-20033 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-20034 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-20036 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -160060,6 +160711,7 @@ CVE-2024-20337 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-20337 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-20337 - https://github.com/swagcraftedd/CVE-2024-20337-POC
CVE-2024-20338 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-20338 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-20345 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-20346 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-20353 - https://github.com/Spl0stus/CVE-2024-20353-CiscoASAandFTD
@@ -160098,6 +160750,7 @@ CVE-2024-2052 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-2054 - https://github.com/Madan301/CVE-2024-2054
CVE-2024-2054 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-2054 - https://github.com/tanjiti/sec_profile
+CVE-2024-2057 - https://github.com/bayuncao/bayuncao
CVE-2024-2057 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-2060 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-2061 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -160465,6 +161118,7 @@ CVE-2024-2134 - https://github.com/Srivishnu-p/CVEs-and-Vulnerabilities
CVE-2024-2134 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-21341 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-21342 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-21345 - https://github.com/0xMarcio/cve
CVE-2024-21345 - https://github.com/FoxyProxys/CVE-2024-21345
CVE-2024-21345 - https://github.com/GhostTroops/TOP
CVE-2024-21345 - https://github.com/aneasystone/github-trending
@@ -160733,6 +161387,7 @@ CVE-2024-21672 - https://github.com/swagcrafted/CVE-2024-21672-POC
CVE-2024-21673 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-21674 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-21677 - https://github.com/NaInSec/CVE-LIST
+CVE-2024-21677 - https://github.com/enomothem/PenTestNote
CVE-2024-21677 - https://github.com/netlas-io/netlas-dorks
CVE-2024-21677 - https://github.com/tanjiti/sec_profile
CVE-2024-21683 - https://github.com/0xMarcio/cve
@@ -160743,6 +161398,7 @@ CVE-2024-21683 - https://github.com/W01fh4cker/CVE-2024-21683-RCE
CVE-2024-21683 - https://github.com/ZonghaoLi777/githubTrending
CVE-2024-21683 - https://github.com/absholi7ly/-CVE-2024-21683-RCE-in-Confluence-Data-Center-and-Server
CVE-2024-21683 - https://github.com/aneasystone/github-trending
+CVE-2024-21683 - https://github.com/enomothem/PenTestNote
CVE-2024-21683 - https://github.com/fireinrain/github-trending
CVE-2024-21683 - https://github.com/jafshare/GithubTrending
CVE-2024-21683 - https://github.com/johe123qwe/github-trending
@@ -160767,6 +161423,7 @@ CVE-2024-21733 - https://github.com/1N3/1N3
CVE-2024-21733 - https://github.com/Marco-zcl/POC
CVE-2024-21733 - https://github.com/Ostorlab/KEV
CVE-2024-21733 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-21733 - https://github.com/versio-io/product-lifecycle-security-api
CVE-2024-21733 - https://github.com/wjlin0/poc-doc
CVE-2024-21733 - https://github.com/wy876/POC
CVE-2024-21734 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -160935,6 +161592,7 @@ CVE-2024-21911 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-21919 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-21920 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-2193 - https://github.com/NaInSec/CVE-LIST
+CVE-2024-2193 - https://github.com/codexlynx/hardware-attacks-state-of-the-art
CVE-2024-2193 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-2193 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-2193 - https://github.com/uthrasri/CVE-2024-2193
@@ -161016,6 +161674,7 @@ CVE-2024-22120 - https://github.com/Threekiii/CVE
CVE-2024-22120 - https://github.com/W01fh4cker/CVE-2024-22120-RCE
CVE-2024-22120 - https://github.com/ZonghaoLi777/githubTrending
CVE-2024-22120 - https://github.com/aneasystone/github-trending
+CVE-2024-22120 - https://github.com/enomothem/PenTestNote
CVE-2024-22120 - https://github.com/fireinrain/github-trending
CVE-2024-22120 - https://github.com/johe123qwe/github-trending
CVE-2024-22120 - https://github.com/nomi-sec/PoC-in-GitHub
@@ -161269,6 +161928,7 @@ CVE-2024-22551 - https://github.com/capture0x/My-CVE
CVE-2024-22567 - https://github.com/labesterOct/CVE-2024-22567
CVE-2024-22567 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-22569 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-2257 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-2258 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-22588 - https://github.com/QUICTester/QUICTester
CVE-2024-22588 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -161291,6 +161951,7 @@ CVE-2024-22640 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-22640 - https://github.com/zunak/CVE-2024-22640
CVE-2024-22641 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-22641 - https://github.com/zunak/CVE-2024-22641
+CVE-2024-22663 - https://github.com/Joe1sn/Joe1sn
CVE-2024-22667 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-22675 - https://github.com/l00neyhacker/CVE-2024-22675
CVE-2024-22676 - https://github.com/l00neyhacker/CVE-2024-22676
@@ -161510,6 +162171,7 @@ CVE-2024-23279 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-23280 - https://github.com/NaInSec/CVE-LIST
CVE-2024-23280 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-23281 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-23282 - https://github.com/dlehgus1023/dlehgus1023
CVE-2024-23283 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-23284 - https://github.com/NaInSec/CVE-LIST
CVE-2024-23284 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -161653,6 +162315,12 @@ CVE-2024-23672 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-23673 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-23689 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-2369 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-2369 - https://github.com/tanjiti/sec_profile
+CVE-2024-23692 - https://github.com/Threekiii/CVE
+CVE-2024-23692 - https://github.com/enomothem/PenTestNote
+CVE-2024-23692 - https://github.com/nomi-sec/PoC-in-GitHub
+CVE-2024-23692 - https://github.com/tanjiti/sec_profile
+CVE-2024-23692 - https://github.com/wy876/POC
CVE-2024-2370 - https://github.com/NaInSec/CVE-LIST
CVE-2024-2370 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-23721 - https://github.com/NaInSec/CVE-LIST
@@ -161806,6 +162474,7 @@ CVE-2024-2389 - https://github.com/Ostorlab/KEV
CVE-2024-2389 - https://github.com/RhinoSecurityLabs/CVEs
CVE-2024-2389 - https://github.com/YN1337/exploit
CVE-2024-2389 - https://github.com/adhikara13/CVE-2024-2389
+CVE-2024-2389 - https://github.com/enomothem/PenTestNote
CVE-2024-2389 - https://github.com/getdrive/PoC
CVE-2024-2389 - https://github.com/mayur-esh/vuln-liners
CVE-2024-2389 - https://github.com/nomi-sec/PoC-in-GitHub
@@ -162160,6 +162829,7 @@ CVE-2024-24578 - https://github.com/NaInSec/CVE-LIST
CVE-2024-24579 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-2459 - https://github.com/NaInSec/CVE-LIST
CVE-2024-24590 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-24590 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-24591 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-24592 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-24593 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -162269,6 +162939,7 @@ CVE-2024-24835 - https://github.com/NaInSec/CVE-LIST
CVE-2024-24835 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-24836 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-24838 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-2484 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-24840 - https://github.com/NaInSec/CVE-LIST
CVE-2024-24840 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-24845 - https://github.com/NaInSec/CVE-LIST
@@ -162329,6 +163000,7 @@ CVE-2024-24919 - https://github.com/Ostorlab/KEV
CVE-2024-24919 - https://github.com/Praison001/CVE-2024-24919-Check-Point-Remote-Access-VPN
CVE-2024-24919 - https://github.com/RevoltSecurities/CVE-2024-24919
CVE-2024-24919 - https://github.com/Rug4lo/CVE-2024-24919-Exploit
+CVE-2024-24919 - https://github.com/Threekiii/CVE
CVE-2024-24919 - https://github.com/Tim-Hoekstra/CVE-2024-24919
CVE-2024-24919 - https://github.com/Vulnpire/CVE-2024-24919
CVE-2024-24919 - https://github.com/YN1337/CVE-2024-24919
@@ -162336,7 +163008,9 @@ CVE-2024-24919 - https://github.com/am-eid/CVE-2024-24919
CVE-2024-24919 - https://github.com/bigb0x/CVE-2024-24919-Sniper
CVE-2024-24919 - https://github.com/birdlex/cve-2024-24919-checker
CVE-2024-24919 - https://github.com/c3rrberu5/CVE-2024-24919
+CVE-2024-24919 - https://github.com/defronixpro/Defronix-Cybersecurity-Roadmap
CVE-2024-24919 - https://github.com/emanueldosreis/CVE-2024-24919
+CVE-2024-24919 - https://github.com/enomothem/PenTestNote
CVE-2024-24919 - https://github.com/eoslvs/CVE-2024-24919
CVE-2024-24919 - https://github.com/fernandobortotti/CVE-2024-24919
CVE-2024-24919 - https://github.com/gurudattch/CVE-2024-24919
@@ -162422,9 +163096,11 @@ CVE-2024-25101 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-25102 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-25103 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-2511 - https://github.com/GrigGM/05-virt-04-docker-hw
+CVE-2024-2511 - https://github.com/bcgov/jag-cdds
CVE-2024-2511 - https://github.com/chnzzh/OpenSSL-CVE-lib
CVE-2024-2511 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-25110 - https://github.com/0xdea/advisories
+CVE-2024-25111 - https://github.com/MegaManSec/Squid-Security-Audit
CVE-2024-25118 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-25119 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-25120 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -162594,6 +163270,7 @@ CVE-2024-2535 - https://github.com/NaInSec/CVE-LIST
CVE-2024-2535 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-25350 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-25351 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-25359 - https://github.com/bayuncao/bayuncao
CVE-2024-25360 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-25366 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-25369 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -162753,6 +163430,7 @@ CVE-2024-25603 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-2561 - https://github.com/NaInSec/CVE-LIST
CVE-2024-2561 - https://github.com/tanjiti/sec_profile
CVE-2024-25610 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-25617 - https://github.com/MegaManSec/Squid-Security-Audit
CVE-2024-25617 - https://github.com/NaInSec/CVE-LIST
CVE-2024-2562 - https://github.com/NaInSec/CVE-LIST
CVE-2024-25620 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -162827,6 +163505,7 @@ CVE-2024-25731 - https://github.com/actuator/com.cn.dq.ipc
CVE-2024-25731 - https://github.com/actuator/cve
CVE-2024-25731 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-25733 - https://github.com/hackintoanetwork/ARC-Browser-Address-Bar-Spoofing-PoC
+CVE-2024-25733 - https://github.com/hackintoanetwork/hackintoanetwork
CVE-2024-25733 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-25734 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-25735 - https://github.com/codeb0ss/CVE-2024-25735-PoC
@@ -162991,6 +163670,7 @@ CVE-2024-25993 - https://github.com/NaInSec/CVE-LIST
CVE-2024-26019 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-26026 - https://github.com/GRTMALDET/Big-IP-Next-CVE-2024-26026
CVE-2024-26026 - https://github.com/Threekiii/CVE
+CVE-2024-26026 - https://github.com/enomothem/PenTestNote
CVE-2024-26026 - https://github.com/netlas-io/netlas-dorks
CVE-2024-26026 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-26026 - https://github.com/passwa11/CVE-2024-26026
@@ -163129,6 +163809,11 @@ CVE-2024-26218 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-26218 - https://github.com/tanjiti/sec_profile
CVE-2024-2622 - https://github.com/NaInSec/CVE-LIST
CVE-2024-2622 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-26229 - https://github.com/0xMarcio/cve
+CVE-2024-26229 - https://github.com/GhostTroops/TOP
+CVE-2024-26229 - https://github.com/michredteam/PoC-26229
+CVE-2024-26229 - https://github.com/nomi-sec/PoC-in-GitHub
+CVE-2024-26229 - https://github.com/tanjiti/sec_profile
CVE-2024-26246 - https://github.com/NaInSec/CVE-LIST
CVE-2024-26247 - https://github.com/NaInSec/CVE-LIST
CVE-2024-26247 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -163303,6 +163988,7 @@ CVE-2024-26598 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-26599 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-26600 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-26601 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-26602 - https://github.com/codexlynx/hardware-attacks-state-of-the-art
CVE-2024-26602 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-26603 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-26604 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -163510,6 +164196,7 @@ CVE-2024-27140 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-2715 - https://github.com/NaInSec/CVE-LIST
CVE-2024-2716 - https://github.com/NaInSec/CVE-LIST
CVE-2024-2717 - https://github.com/NaInSec/CVE-LIST
+CVE-2024-27173 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-2718 - https://github.com/NaInSec/CVE-LIST
CVE-2024-27189 - https://github.com/NaInSec/CVE-LIST
CVE-2024-27189 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -163647,6 +164334,7 @@ CVE-2024-2728 - https://github.com/NaInSec/CVE-LIST
CVE-2024-27280 - https://github.com/lifeparticle/Ruby-Cheatsheet
CVE-2024-27281 - https://github.com/lifeparticle/Ruby-Cheatsheet
CVE-2024-27282 - https://github.com/lifeparticle/Ruby-Cheatsheet
+CVE-2024-27282 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-27283 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-27284 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-27285 - https://github.com/NaInSec/CVE-LIST
@@ -163664,6 +164352,7 @@ CVE-2024-27306 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-27310 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-27316 - https://github.com/Ampferl/poc_http2-continuation-flood
CVE-2024-27316 - https://github.com/DrewskyDev/H2Flood
+CVE-2024-27316 - https://github.com/EzeTauil/Maquina-Upload
CVE-2024-27316 - https://github.com/Vos68/HTTP2-Continuation-Flood-PoC
CVE-2024-27316 - https://github.com/aeyesec/CVE-2024-27316_poc
CVE-2024-27316 - https://github.com/lockness-Ko/CVE-2024-27316
@@ -163861,8 +164550,11 @@ CVE-2024-27804 - https://github.com/GhostTroops/TOP
CVE-2024-27804 - https://github.com/R00tkitSMM/CVE-2024-27804
CVE-2024-27804 - https://github.com/SnoopyTools/Rootkit-cve2024
CVE-2024-27804 - https://github.com/nomi-sec/PoC-in-GitHub
+CVE-2024-27815 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-27822 - https://github.com/houjingyi233/macOS-iOS-system-security
CVE-2024-27830 - https://github.com/Joe12387/Joe12387
+CVE-2024-27830 - https://github.com/Joe12387/safari-canvas-fingerprinting-exploit
+CVE-2024-27834 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-27842 - https://github.com/tanjiti/sec_profile
CVE-2024-27900 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-27902 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -164221,6 +164913,9 @@ CVE-2024-28404 - https://github.com/NaInSec/CVE-LIST
CVE-2024-28404 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-28417 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-28418 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-28423 - https://github.com/bayuncao/bayuncao
+CVE-2024-28424 - https://github.com/bayuncao/bayuncao
+CVE-2024-28425 - https://github.com/bayuncao/bayuncao
CVE-2024-28429 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-28430 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-28431 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -164391,6 +165086,7 @@ CVE-2024-28834 - https://github.com/GitHubForSnap/ssmtp-gael
CVE-2024-28834 - https://github.com/GrigGM/05-virt-04-docker-hw
CVE-2024-28834 - https://github.com/NaInSec/CVE-LIST
CVE-2024-28834 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-28834 - https://github.com/m-pasima/CI-CD-Security-image-scan
CVE-2024-28835 - https://github.com/GitHubForSnap/ssmtp-gael
CVE-2024-28835 - https://github.com/GrigGM/05-virt-04-docker-hw
CVE-2024-28835 - https://github.com/NaInSec/CVE-LIST
@@ -164444,6 +165140,10 @@ CVE-2024-2896 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-28971 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-28978 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-28979 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-28995 - https://github.com/enomothem/PenTestNote
+CVE-2024-28995 - https://github.com/nomi-sec/PoC-in-GitHub
+CVE-2024-28995 - https://github.com/tanjiti/sec_profile
+CVE-2024-28995 - https://github.com/wy876/POC
CVE-2024-29003 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-29009 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-29018 - https://github.com/NaInSec/CVE-LIST
@@ -164585,11 +165285,13 @@ CVE-2024-29197 - https://github.com/mansploit/CVE-2024-29197-exploit
CVE-2024-29197 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-29199 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-29200 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-29201 - https://github.com/Threekiii/Awesome-POC
CVE-2024-29201 - https://github.com/enomothem/PenTestNote
CVE-2024-29201 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-29201 - https://github.com/tanjiti/sec_profile
CVE-2024-29201 - https://github.com/wjlin0/poc-doc
CVE-2024-29201 - https://github.com/wy876/POC
+CVE-2024-29202 - https://github.com/Threekiii/Awesome-POC
CVE-2024-29202 - https://github.com/enomothem/PenTestNote
CVE-2024-29202 - https://github.com/tanjiti/sec_profile
CVE-2024-29202 - https://github.com/wjlin0/poc-doc
@@ -164657,6 +165359,7 @@ CVE-2024-29272 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-29273 - https://github.com/NaInSec/CVE-LIST
CVE-2024-29273 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-29275 - https://github.com/NaInSec/CVE-LIST
+CVE-2024-29275 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-29278 - https://github.com/QDming/cve
CVE-2024-29278 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-29278 - https://github.com/nomi-sec/PoC-in-GitHub
@@ -164815,6 +165518,9 @@ CVE-2024-29810 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-29811 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-29812 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-2982 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-29824 - https://github.com/enomothem/PenTestNote
+CVE-2024-29824 - https://github.com/nomi-sec/PoC-in-GitHub
+CVE-2024-29824 - https://github.com/wy876/POC
CVE-2024-2983 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-29832 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-29833 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -164822,6 +165528,7 @@ CVE-2024-2984 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-29844 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-29849 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-29849 - https://github.com/sinsinology/CVE-2024-29849
+CVE-2024-29855 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-29857 - https://github.com/cdupuis/aspnetapp
CVE-2024-29858 - https://github.com/NaInSec/CVE-LIST
CVE-2024-29859 - https://github.com/NaInSec/CVE-LIST
@@ -164900,6 +165607,9 @@ CVE-2024-2996 - https://github.com/Srivishnu-p/CVEs-and-Vulnerabilities
CVE-2024-2996 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-2997 - https://github.com/Srivishnu-p/CVEs-and-Vulnerabilities
CVE-2024-2997 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-29972 - https://github.com/nomi-sec/PoC-in-GitHub
+CVE-2024-29973 - https://github.com/nomi-sec/PoC-in-GitHub
+CVE-2024-29973 - https://github.com/wy876/POC
CVE-2024-2998 - https://github.com/Srivishnu-p/CVEs-and-Vulnerabilities
CVE-2024-2998 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-29981 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -164938,7 +165648,13 @@ CVE-2024-30056 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-30056 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-3006 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3007 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-30078 - https://github.com/0xMarcio/cve
+CVE-2024-30078 - https://github.com/GhostTroops/TOP
+CVE-2024-30078 - https://github.com/enomothem/PenTestNote
+CVE-2024-30078 - https://github.com/nomi-sec/PoC-in-GitHub
+CVE-2024-30078 - https://github.com/stryngs/edgedressing
CVE-2024-3008 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-30080 - https://github.com/tanjiti/sec_profile
CVE-2024-3009 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3010 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3011 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -164961,6 +165677,7 @@ CVE-2024-30203 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-30204 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-30205 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-30210 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-30212 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-3022 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-30221 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-30222 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -164997,6 +165714,7 @@ CVE-2024-30255 - https://github.com/Vos68/HTTP2-Continuation-Flood-PoC
CVE-2024-30255 - https://github.com/blackmagic2023/Envoy-CPU-Exhaustion-Vulnerability-PoC
CVE-2024-30255 - https://github.com/lockness-Ko/CVE-2024-27316
CVE-2024-30255 - https://github.com/nomi-sec/PoC-in-GitHub
+CVE-2024-30256 - https://github.com/OrenGitHub/dhscanner
CVE-2024-30260 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-30261 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-30262 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -165004,6 +165722,7 @@ CVE-2024-30263 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-30266 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-30269 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3027 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-30270 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-3030 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3032 - https://github.com/Chocapikk/My-CVEs
CVE-2024-3034 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -165309,6 +166028,7 @@ CVE-2024-3094 - https://github.com/dparksports/detect_intrusion
CVE-2024-3094 - https://github.com/drdry2/CVE-2024-3094-EXPLOIT
CVE-2024-3094 - https://github.com/duytruongpham/duytruongpham
CVE-2024-3094 - https://github.com/emirkmo/xz-backdoor-github
+CVE-2024-3094 - https://github.com/enomothem/PenTestNote
CVE-2024-3094 - https://github.com/felipecosta09/cve-2024-3094
CVE-2024-3094 - https://github.com/fevar54/Detectar-Backdoor-en-liblzma-de-XZ-utils-CVE-2024-3094-
CVE-2024-3094 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -165419,6 +166139,7 @@ CVE-2024-31142 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-31156 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3116 - https://github.com/FoxyProxys/CVE-2024-3116
CVE-2024-3116 - https://github.com/TechieNeurons/CVE-2024-3116_RCE_in_pgadmin_8.4
+CVE-2024-3116 - https://github.com/enomothem/PenTestNote
CVE-2024-3116 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3116 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-3116 - https://github.com/tanjiti/sec_profile
@@ -165430,6 +166151,7 @@ CVE-2024-31205 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-31207 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-31208 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-31209 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-31210 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-31213 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-31214 - https://github.com/nvn1729/advisories
CVE-2024-31215 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -165496,6 +166218,7 @@ CVE-2024-31492 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-31497 - https://github.com/HugoBond/CVE-2024-31497-POC
CVE-2024-31497 - https://github.com/PazDak/LoonSecurity
CVE-2024-31497 - https://github.com/ViktorNaum/CVE-2024-31497-POC
+CVE-2024-31497 - https://github.com/daedalus/BreakingECDSAwithLLL
CVE-2024-31497 - https://github.com/edutko/cve-2024-31497
CVE-2024-31497 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-31497 - https://github.com/nomi-sec/PoC-in-GitHub
@@ -165558,6 +166281,7 @@ CVE-2024-31851 - https://github.com/Stuub/CVE-2024-31848-PoC
CVE-2024-31851 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-31852 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-31857 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-31861 - https://github.com/enomothem/PenTestNote
CVE-2024-31861 - https://github.com/tanjiti/sec_profile
CVE-2024-31864 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-31865 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -165589,6 +166313,9 @@ CVE-2024-31974 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-31975 - https://github.com/actuator/cve
CVE-2024-31976 - https://github.com/actuator/cve
CVE-2024-31977 - https://github.com/actuator/cve
+CVE-2024-31982 - https://github.com/tanjiti/sec_profile
+CVE-2024-320002 - https://github.com/nomi-sec/PoC-in-GitHub
+CVE-2024-32002 - https://github.com/0xMarcio/cve
CVE-2024-32002 - https://github.com/10cks/CVE-2024-32002-EXP
CVE-2024-32002 - https://github.com/10cks/CVE-2024-32002-POC
CVE-2024-32002 - https://github.com/10cks/CVE-2024-32002-hulk
@@ -165648,6 +166375,7 @@ CVE-2024-32002 - https://github.com/kun-g/Scraping-Github-trending
CVE-2024-32002 - https://github.com/markuta/CVE-2024-32002
CVE-2024-32002 - https://github.com/markuta/hooky
CVE-2024-32002 - https://github.com/nomi-sec/PoC-in-GitHub
+CVE-2024-32002 - https://github.com/p1tsi/misc
CVE-2024-32002 - https://github.com/pkjmesra/PKScreener
CVE-2024-32002 - https://github.com/safebuffer/CVE-2024-32002
CVE-2024-32002 - https://github.com/sampsonv/github-trending
@@ -165677,6 +166405,7 @@ CVE-2024-32018 - https://github.com/0xdea/advisories
CVE-2024-32018 - https://github.com/hnsecurity/vulns
CVE-2024-32020 - https://github.com/testing-felickz/docker-scout-demo
CVE-2024-32021 - https://github.com/testing-felickz/docker-scout-demo
+CVE-2024-32022 - https://github.com/OrenGitHub/dhscanner
CVE-2024-3203 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3204 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-32049 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -165689,10 +166418,12 @@ CVE-2024-32113 - https://github.com/Mr-xn/CVE-2024-32113
CVE-2024-32113 - https://github.com/Ostorlab/KEV
CVE-2024-32113 - https://github.com/Threekiii/CVE
CVE-2024-32113 - https://github.com/absholi7ly/Apache-OFBiz-Directory-Traversal-exploit
+CVE-2024-32113 - https://github.com/enomothem/PenTestNote
CVE-2024-32113 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-32113 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-32113 - https://github.com/tanjiti/sec_profile
CVE-2024-32114 - https://github.com/Threekiii/CVE
+CVE-2024-32114 - https://github.com/enomothem/PenTestNote
CVE-2024-32114 - https://github.com/tanjiti/sec_profile
CVE-2024-3213 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-32136 - https://github.com/nomi-sec/PoC-in-GitHub
@@ -165757,6 +166488,7 @@ CVE-2024-32638 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-32640 - https://github.com/0x3f3c/CVE-2024-32640-SQLI-MuraCMS
CVE-2024-32640 - https://github.com/Stuub/CVE-2024-32640-SQLI-MuraCMS
CVE-2024-32640 - https://github.com/Threekiii/CVE
+CVE-2024-32640 - https://github.com/enomothem/PenTestNote
CVE-2024-32640 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-32640 - https://github.com/sammings/CVE-2024-32640
CVE-2024-32640 - https://github.com/tanjiti/sec_profile
@@ -165789,6 +166521,7 @@ CVE-2024-3272 - https://github.com/wy876/POC
CVE-2024-3272 - https://github.com/wy876/wiki
CVE-2024-32725 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-32728 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-3273 - https://github.com/0xMarcio/cve
CVE-2024-3273 - https://github.com/Chocapikk/CVE-2024-3273
CVE-2024-3273 - https://github.com/GhostTroops/TOP
CVE-2024-3273 - https://github.com/K3ysTr0K3R/CVE-2024-3273-EXPLOIT
@@ -166040,6 +166773,7 @@ CVE-2024-33905 - https://github.com/tanjiti/sec_profile
CVE-2024-33911 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-33911 - https://github.com/xbz0n/CVE-2024-33911
CVE-2024-3400 - https://github.com/0x0d3ad/CVE-2024-3400
+CVE-2024-3400 - https://github.com/0xMarcio/cve
CVE-2024-3400 - https://github.com/0xr2r/CVE-2024-3400-Palo-Alto-OS-Command-Injection
CVE-2024-3400 - https://github.com/AdaniKamal/CVE-2024-3400
CVE-2024-3400 - https://github.com/CONDITIONBLACK/CVE-2024-3400-POC
@@ -166065,6 +166799,7 @@ CVE-2024-3400 - https://github.com/ak1t4/CVE-2024-3400
CVE-2024-3400 - https://github.com/andrelia-hacks/CVE-2024-3400
CVE-2024-3400 - https://github.com/aneasystone/github-trending
CVE-2024-3400 - https://github.com/codeblueprint/CVE-2024-3400
+CVE-2024-3400 - https://github.com/enomothem/PenTestNote
CVE-2024-3400 - https://github.com/fatguru/dorks
CVE-2024-3400 - https://github.com/fireinrain/github-trending
CVE-2024-3400 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -166181,6 +166916,8 @@ CVE-2024-34447 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-34448 - https://github.com/phulelouch/CVEs
CVE-2024-34449 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3445 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-34452 - https://github.com/nomi-sec/PoC-in-GitHub
+CVE-2024-34452 - https://github.com/surajhacx/CVE-2024-34452
CVE-2024-34454 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3446 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-34460 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -166437,6 +167174,10 @@ CVE-2024-36079 - https://github.com/DxRvs/vaultize_CVE-2024-36079
CVE-2024-36079 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-36104 - https://github.com/Co5mos/nuclei-tps
CVE-2024-36104 - https://github.com/Mr-xn/CVE-2024-32113
+CVE-2024-36104 - https://github.com/Threekiii/Awesome-POC
+CVE-2024-36104 - https://github.com/Threekiii/CVE
+CVE-2024-36104 - https://github.com/enomothem/PenTestNote
+CVE-2024-36104 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-36104 - https://github.com/tanjiti/sec_profile
CVE-2024-36104 - https://github.com/wy876/POC
CVE-2024-36104 - https://github.com/wy876/wiki
@@ -166452,6 +167193,7 @@ CVE-2024-3628 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3634 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3640 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-36405 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-36416 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-36426 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-36428 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-36428 - https://github.com/tanjiti/sec_profile
@@ -166460,10 +167202,14 @@ CVE-2024-36428 - https://github.com/wy876/wiki
CVE-2024-36437 - https://github.com/actuator/cve
CVE-2024-3645 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3652 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-36522 - https://github.com/Threekiii/CVE
+CVE-2024-36522 - https://github.com/enomothem/PenTestNote
+CVE-2024-36527 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-36586 - https://github.com/go-compile/security-advisories
CVE-2024-36587 - https://github.com/go-compile/security-advisories
CVE-2024-36588 - https://github.com/go-compile/security-advisories
CVE-2024-36589 - https://github.com/go-compile/security-advisories
+CVE-2024-36597 - https://github.com/wy876/POC
CVE-2024-3661 - https://github.com/a1xbit/DecloakingVPN
CVE-2024-3661 - https://github.com/apiverve/news-API
CVE-2024-3661 - https://github.com/bollwarm/SecToolSet
@@ -166474,7 +167220,15 @@ CVE-2024-3661 - https://github.com/leviathansecurity/TunnelVision
CVE-2024-3661 - https://github.com/tanjiti/sec_profile
CVE-2024-36673 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3668 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-36755 - https://github.com/YjjNJUPT/AsiaCCS2024_vul_report
+CVE-2024-36756 - https://github.com/YjjNJUPT/AsiaCCS2024_vul_report
+CVE-2024-36757 - https://github.com/YjjNJUPT/AsiaCCS2024_vul_report
+CVE-2024-36758 - https://github.com/YjjNJUPT/AsiaCCS2024_vul_report
+CVE-2024-36759 - https://github.com/YjjNJUPT/AsiaCCS2024_vul_report
CVE-2024-36795 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-36821 - https://github.com/nomi-sec/PoC-in-GitHub
+CVE-2024-36837 - https://github.com/nomi-sec/PoC-in-GitHub
+CVE-2024-36837 - https://github.com/tanjiti/sec_profile
CVE-2024-3686 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3687 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3688 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -166498,12 +167252,19 @@ CVE-2024-3699 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3700 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3704 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3705 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-37051 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-3706 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3707 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-37079 - https://github.com/nomi-sec/PoC-in-GitHub
+CVE-2024-37079 - https://github.com/tanjiti/sec_profile
+CVE-2024-37080 - https://github.com/tanjiti/sec_profile
CVE-2024-3714 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3729 - https://github.com/chnzzh/OpenSSL-CVE-lib
+CVE-2024-37305 - https://github.com/chnzzh/OpenSSL-CVE-lib
+CVE-2024-37309 - https://github.com/chnzzh/OpenSSL-CVE-lib
CVE-2024-3735 - https://github.com/ahmedvienna/CVEs-and-Vulnerabilities
CVE-2024-3737 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-37393 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-37407 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3744 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3745 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -166527,17 +167288,26 @@ CVE-2024-3770 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3772 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3772 - https://github.com/seal-community/patches
CVE-2024-3774 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-37742 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-3775 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-37759 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-3776 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3777 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3778 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-37791 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-3781 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3782 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3783 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3784 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-37843 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-3785 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3786 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-37880 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-37885 - https://github.com/LOURC0D3/LOURC0D3
+CVE-2024-37888 - https://github.com/nomi-sec/PoC-in-GitHub
+CVE-2024-37889 - https://github.com/nomi-sec/PoC-in-GitHub
+CVE-2024-37891 - https://github.com/PBorocz/raindrop-io-py
+CVE-2024-37894 - https://github.com/MegaManSec/Squid-Security-Audit
CVE-2024-3797 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3806 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-3806 - https://github.com/tanjiti/sec_profile
@@ -166549,12 +167319,17 @@ CVE-2024-3817 - https://github.com/otms61/vex_dir
CVE-2024-3822 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3823 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3824 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-38276 - https://github.com/cli-ish/cli-ish
CVE-2024-3832 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3833 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3834 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-38355 - https://github.com/Y0ursTruly/Y0ursTruly
CVE-2024-3837 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-38379 - https://github.com/waspthebughunter/waspthebughunter
CVE-2024-3838 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3839 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-38395 - https://github.com/nomi-sec/PoC-in-GitHub
+CVE-2024-38396 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-3840 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3841 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3843 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -166581,6 +167356,7 @@ CVE-2024-3892 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3895 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3897 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3914 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-3922 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-3928 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-3931 - https://github.com/2lambda123/cisagov-vulnrichment
CVE-2024-3931 - https://github.com/cisagov/vulnrichment
@@ -166618,6 +167394,7 @@ CVE-2024-4040 - https://github.com/Stuub/CVE-2024-4040-SSTI-LFI-PoC
CVE-2024-4040 - https://github.com/Y4tacker/JavaSec
CVE-2024-4040 - https://github.com/absholi7ly/absholi7ly
CVE-2024-4040 - https://github.com/airbus-cert/CVE-2024-4040
+CVE-2024-4040 - https://github.com/enomothem/PenTestNote
CVE-2024-4040 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4040 - https://github.com/getdrive/PoC
CVE-2024-4040 - https://github.com/gotr00t0day/CVE-2024-4040
@@ -166638,6 +167415,7 @@ CVE-2024-4058 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4059 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4060 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4064 - https://github.com/helloyhrr/IoT_vulnerability
+CVE-2024-4068 - https://github.com/seal-community/patches
CVE-2024-4083 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4085 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4086 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -166668,6 +167446,8 @@ CVE-2024-4202 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4203 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4208 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4226 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-4231 - https://github.com/nomi-sec/PoC-in-GitHub
+CVE-2024-4232 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-4233 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4234 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4235 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -166692,6 +167472,7 @@ CVE-2024-4298 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4299 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4300 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4301 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-4313 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4317 - https://github.com/wiltondb/wiltondb
CVE-2024-4323 - https://github.com/d0rb/CVE-2024-4323
CVE-2024-4323 - https://github.com/nomi-sec/PoC-in-GitHub
@@ -166714,6 +167495,7 @@ CVE-2024-4354 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4357 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4358 - https://github.com/GhostTroops/TOP
CVE-2024-4358 - https://github.com/Harydhk7/CVE-2024-4358
+CVE-2024-4358 - https://github.com/Ostorlab/KEV
CVE-2024-4358 - https://github.com/RevoltSecurities/CVE-2024-4358
CVE-2024-4358 - https://github.com/Sk1dr0wz/CVE-2024-4358_Mass_Exploit
CVE-2024-4358 - https://github.com/nomi-sec/PoC-in-GitHub
@@ -166764,6 +167546,7 @@ CVE-2024-4445 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4451 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4468 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4473 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-4484 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-4488 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4489 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4493 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -166798,6 +167581,7 @@ CVE-2024-4561 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4562 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4568 - https://github.com/bladchan/bladchan
CVE-2024-4577 - https://github.com/0x20c/CVE-2024-4577-nuclei
+CVE-2024-4577 - https://github.com/0xMarcio/cve
CVE-2024-4577 - https://github.com/0xsyr0/OSCP
CVE-2024-4577 - https://github.com/11whoami99/CVE-2024-4577
CVE-2024-4577 - https://github.com/Chocapikk/CVE-2024-4577
@@ -166805,13 +167589,19 @@ CVE-2024-4577 - https://github.com/GhostTroops/TOP
CVE-2024-4577 - https://github.com/Junp0/CVE-2024-4577
CVE-2024-4577 - https://github.com/K3ysTr0K3R/CVE-2024-4577-EXPLOIT
CVE-2024-4577 - https://github.com/K3ysTr0K3R/K3ysTr0K3R
+CVE-2024-4577 - https://github.com/Ostorlab/KEV
CVE-2024-4577 - https://github.com/Sysc4ll3r/CVE-2024-4577
CVE-2024-4577 - https://github.com/TAM-K592/CVE-2024-4577
+CVE-2024-4577 - https://github.com/Threekiii/Awesome-POC
+CVE-2024-4577 - https://github.com/Threekiii/CVE
CVE-2024-4577 - https://github.com/WanLiChangChengWanLiChang/CVE-2024-4577-RCE-EXP
CVE-2024-4577 - https://github.com/Wh02m1/CVE-2024-4577
+CVE-2024-4577 - https://github.com/XiangDongCJC/CVE-2024-4577-PHP-CGI-RCE
CVE-2024-4577 - https://github.com/Yukiioz/CVE-2024-4577
CVE-2024-4577 - https://github.com/ZephrFish/CVE-2024-4577-PHP-RCE
+CVE-2024-4577 - https://github.com/bl4cksku11/CVE-2024-4577
CVE-2024-4577 - https://github.com/dbyMelina/CVE-2024-4577
+CVE-2024-4577 - https://github.com/enomothem/PenTestNote
CVE-2024-4577 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4577 - https://github.com/huseyinstif/CVE-2024-4577-Nuclei-Template
CVE-2024-4577 - https://github.com/it-t4mpan/check_cve_2024_4577.sh
@@ -166845,6 +167635,7 @@ CVE-2024-4596 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4599 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4600 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4601 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-4603 - https://github.com/bcgov/jag-cdds
CVE-2024-4603 - https://github.com/chnzzh/OpenSSL-CVE-lib
CVE-2024-4603 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4609 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -166923,7 +167714,9 @@ CVE-2024-4853 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4854 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4855 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4858 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-4859 - https://github.com/JoshuaMart/JoshuaMart
CVE-2024-4859 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-4860 - https://github.com/JoshuaMart/JoshuaMart
CVE-2024-4860 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4865 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4871 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -166933,6 +167726,7 @@ CVE-2024-48788 - https://github.com/mrobsidian1/CVE-2023-48788-Proof-of-concept-
CVE-2024-4891 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4893 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4894 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-4898 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-4903 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4923 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4925 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -166957,6 +167751,7 @@ CVE-2024-4956 - https://github.com/TypicalModMaker/CVE-2024-4956
CVE-2024-4956 - https://github.com/X1r0z/JettyFuzz
CVE-2024-4956 - https://github.com/banditzCyber0x/CVE-2024-4956
CVE-2024-4956 - https://github.com/codeb0ss/CVE-2024-4956-PoC
+CVE-2024-4956 - https://github.com/enomothem/PenTestNote
CVE-2024-4956 - https://github.com/erickfernandox/CVE-2024-4956
CVE-2024-4956 - https://github.com/fin3ss3g0d/CVE-2024-4956
CVE-2024-4956 - https://github.com/fin3ss3g0d/Shiro1Extractor
@@ -166974,6 +167769,8 @@ CVE-2024-4956 - https://github.com/wjlin0/poc-doc
CVE-2024-4956 - https://github.com/wy876/POC
CVE-2024-4956 - https://github.com/wy876/wiki
CVE-2024-4956 - https://github.com/xungzzz/CVE-2024-4956
+CVE-2024-4959 - https://github.com/JoshuaMart/JoshuaMart
+CVE-2024-4960 - https://github.com/JoshuaMart/JoshuaMart
CVE-2024-49606 - https://github.com/netlas-io/netlas-dorks
CVE-2024-4966 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-4978 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -167010,6 +167807,7 @@ CVE-2024-5112 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-5113 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-5114 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-5187 - https://github.com/sunriseXu/sunriseXu
+CVE-2024-5208 - https://github.com/sev-hack/sev-hack
CVE-2024-5218 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-5220 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-5229 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -167017,6 +167815,7 @@ CVE-2024-5273 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-5274 - https://github.com/kip93/kip93
CVE-2024-5326 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-5326 - https://github.com/truonghuuphuc/CVE-2024-5326-Poc
+CVE-2024-5346 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-5359 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-5360 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-5361 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -167040,6 +167839,7 @@ CVE-2024-5542 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-5555 - https://github.com/JohnnyBradvo/CVE-2024-5555
CVE-2024-5555 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-5585 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-5585 - https://github.com/tianstcht/tianstcht
CVE-2024-5599 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-5613 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-5637 - https://github.com/fkie-cad/nvd-json-data-feeds
@@ -167061,6 +167861,8 @@ CVE-2024-5774 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-5775 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-5785 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-5786 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-5791 - https://github.com/fkie-cad/nvd-json-data-feeds
+CVE-2024-6120 - https://github.com/fkie-cad/nvd-json-data-feeds
CVE-2024-6271 - https://github.com/Jokergazaa/zero-click-exploits
CVE-2024-65230 - https://github.com/nomi-sec/PoC-in-GitHub
CVE-2024-6666 - https://github.com/JohnnyBradvo/CVE-2024-6666
@@ -167077,6 +167879,7 @@ CVE-2104-4114 - https://github.com/likescam/APT_CyberCriminal_Campagin_Collectio
CVE-2104-4114 - https://github.com/likescam/CyberMonitor-APT_CyberCriminal_Campagin_Collections
CVE-2104-4114 - https://github.com/sumas/APT_CyberCriminal_Campagin_Collections
CVE-2106-2504 - https://github.com/ndk191/linux-kernel-exploitation
+CVE-2106-2504 - https://github.com/wkhnh06/linux-kernel-exploitation
CVE-2106-2504 - https://github.com/xairy/linux-kernel-exploitation
CVE-2121-44228 - https://github.com/NaInSec/CVE-PoC-in-GitHub
CVE-2121-44228 - https://github.com/WhooAmii/POC_to_review
diff --git a/references.txt b/references.txt
index b4b783e261..ac8651d659 100644
--- a/references.txt
+++ b/references.txt
@@ -2546,6 +2546,7 @@ CVE-2005-4874 - https://bugzilla.mozilla.org/show_bug.cgi?id=297078
CVE-2005-4890 - http://www.openwall.com/lists/oss-security/2014/10/20/9
CVE-2005-4890 - http://www.openwall.com/lists/oss-security/2014/10/21/1
CVE-2005-4900 - https://kc.mcafee.com/corporate/index?page=content&id=SB10340
+CVE-2006-0001 - http://www.computerterrorism.com/research/ct12-09-2006-2.htm
CVE-2006-0001 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-054
CVE-2006-0002 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-003
CVE-2006-0003 - https://www.exploit-db.com/exploits/2052
@@ -3801,6 +3802,7 @@ CVE-2006-3300 - https://www.exploit-db.com/exploits/1948
CVE-2006-3304 - https://www.exploit-db.com/exploits/1953
CVE-2006-3309 - https://www.exploit-db.com/exploits/1957
CVE-2006-3311 - http://securityreason.com/securityalert/1546
+CVE-2006-3311 - http://www.computerterrorism.com/research/ct12-09-2006.htm
CVE-2006-3313 - http://securityreason.com/securityalert/1168
CVE-2006-3315 - http://securityreason.com/securityalert/1176
CVE-2006-3317 - http://securityreason.com/securityalert/1173
@@ -5751,6 +5753,7 @@ CVE-2007-0029 - https://docs.microsoft.com/en-us/security-updates/securitybullet
CVE-2007-0030 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-002
CVE-2007-0031 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-002
CVE-2007-0033 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-003
+CVE-2007-0034 - http://www.computerterrorism.com/research/ct09-01-2007.htm
CVE-2007-0034 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-003
CVE-2007-0035 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-024
CVE-2007-0038 - http://securityreason.com/securityalert/2542
@@ -22495,6 +22498,7 @@ CVE-2012-6643 - http://packetstormsecurity.org/files/108489/clipbucket-sqlxss.tx
CVE-2012-6644 - http://packetstormsecurity.org/files/108489/clipbucket-sqlxss.txt
CVE-2012-6645 - http://drupal.org/node/1432318
CVE-2012-6658 - http://www.exploit-db.com/exploits/20063
+CVE-2012-6664 - https://www.exploit-db.com/exploits/41714
CVE-2012-6666 - https://www.exploit-db.com/exploits/37944
CVE-2012-6684 - http://co3k.org/blog/redcloth-unfixed-xss-en
CVE-2012-6684 - http://seclists.org/fulldisclosure/2014/Dec/50
@@ -25239,6 +25243,7 @@ CVE-2014-125035 - https://github.com/mrbobbybryant/Jobs-Plugin/commit/b8a56718b1
CVE-2014-125049 - https://vuldb.com/?id.217560
CVE-2014-125082 - https://github.com/nivit/redports/commit/fc2c1ea1b8d795094abb15ac73cab90830534e04
CVE-2014-125087 - https://github.com/jmurty/java-xmlbuilder/issues/6
+CVE-2014-125093 - https://vuldb.com/?id.222610
CVE-2014-1359 - http://packetstormsecurity.com/files/167630/launchd-Heap-Corruption.html
CVE-2014-1372 - https://code.google.com/p/google-security-research/issues/detail?id=18
CVE-2014-1401 - http://packetstormsecurity.com/files/125079
@@ -27160,6 +27165,7 @@ CVE-2014-5465 - http://packetstormsecurity.com/files/128024/WordPress-ShortCode-
CVE-2014-5465 - http://www.exploit-db.com/exploits/34436
CVE-2014-5468 - http://packetstormsecurity.com/files/128234/Railo-4.2.1-Remote-File-Inclusion.html
CVE-2014-5468 - http://www.exploit-db.com/exploits/34669
+CVE-2014-5470 - https://www.exploit-db.com/exploits/35549
CVE-2014-5471 - http://www.ubuntu.com/usn/USN-2358-1
CVE-2014-5472 - http://www.ubuntu.com/usn/USN-2358-1
CVE-2014-5507 - http://packetstormsecurity.com/files/128806/iBackup-10.0.0.32-Local-Privilege-Escalation.html
@@ -48257,6 +48263,7 @@ CVE-2018-10049 - https://pastebin.com/QbhRJp4q
CVE-2018-10050 - https://pastebin.com/UDEsFq3u
CVE-2018-10051 - https://pastebin.com/aQn3Cr2G
CVE-2018-10052 - https://pastebin.com/aeqYLK9u
+CVE-2018-10054 - https://github.com/h2database/h2database/issues/1225
CVE-2018-10054 - https://mthbernardes.github.io/rce/2018/03/14/abusing-h2-database-alias.html
CVE-2018-10054 - https://www.exploit-db.com/exploits/44422/
CVE-2018-10057 - http://www.openwall.com/lists/oss-security/2018/06/03/1
@@ -60439,6 +60446,7 @@ CVE-2019-25138 - https://blog.nintechnet.com/arbitrary-file-upload-vulnerability
CVE-2019-25139 - https://blog.nintechnet.com/unauthenticated-stored-xss-in-wordpress-coming-soon-page-and-maintenance-mode-plugin/
CVE-2019-25140 - https://blog.nintechnet.com/unauthenticated-stored-xss-in-wordpress-coming-soon-page-and-maintenance-mode-plugin/
CVE-2019-25141 - https://blog.nintechnet.com/critical-0day-vulnerability-fixed-in-wordpress-easy-wp-smtp-plugin/
+CVE-2019-25156 - https://vuldb.com/?id.244495
CVE-2019-2516 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
CVE-2019-2517 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
CVE-2019-2518 - http://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
@@ -62461,16 +62469,19 @@ CVE-2019-9506 - https://usn.ubuntu.com/4115-1/
CVE-2019-9506 - https://usn.ubuntu.com/4118-1/
CVE-2019-9510 - https://www.kb.cert.org/vuls/id/576688/
CVE-2019-9511 - https://kb.cert.org/vuls/id/605641/
+CVE-2019-9511 - https://usn.ubuntu.com/4099-1/
CVE-2019-9511 - https://www.oracle.com/security-alerts/cpujan2021.html
CVE-2019-9511 - https://www.oracle.com/security-alerts/cpuoct2020.html
CVE-2019-9511 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
CVE-2019-9512 - https://kb.cert.org/vuls/id/605641/
CVE-2019-9513 - https://kb.cert.org/vuls/id/605641/
+CVE-2019-9513 - https://usn.ubuntu.com/4099-1/
CVE-2019-9513 - https://www.oracle.com/security-alerts/cpujan2021.html
CVE-2019-9513 - https://www.oracle.com/security-alerts/cpuoct2020.html
CVE-2019-9514 - https://kb.cert.org/vuls/id/605641/
CVE-2019-9515 - https://kb.cert.org/vuls/id/605641/
CVE-2019-9516 - https://kb.cert.org/vuls/id/605641/
+CVE-2019-9516 - https://usn.ubuntu.com/4099-1/
CVE-2019-9517 - https://kb.cert.org/vuls/id/605641/
CVE-2019-9517 - https://www.oracle.com/security-alerts/cpuapr2020.html
CVE-2019-9517 - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
@@ -67583,6 +67594,7 @@ CVE-2020-27349 - https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1899193
CVE-2020-2735 - https://www.oracle.com/security-alerts/cpuapr2020.html
CVE-2020-27350 - https://bugs.launchpad.net/bugs/1899193
CVE-2020-27351 - https://bugs.launchpad.net/bugs/1899193
+CVE-2020-27352 - https://bugs.launchpad.net/snapd/+bug/1910456
CVE-2020-27368 - https://github.com/swzhouu/CVE-2020-27368
CVE-2020-2737 - https://www.oracle.com/security-alerts/cpuapr2020.html
CVE-2020-27373 - https://nvermaa.medium.com/cve-on-radio-technology-d-4b65efa1ba5c
@@ -77037,6 +77049,7 @@ CVE-2021-3931 - https://huntr.dev/bounties/03b21d69-3bf5-4b2f-a2cf-872dd677a68f
CVE-2021-39312 - http://packetstormsecurity.com/files/165434/WordPress-The-True-Ranker-2.2.2-Arbitrary-File-Read.html
CVE-2021-39316 - http://packetstormsecurity.com/files/165146/WordPress-DZS-Zoomsounds-6.45-Arbitrary-File-Read.html
CVE-2021-39320 - https://wpscan.com/vulnerability/49ae1df0-d6d2-4cbb-9a9d-bf3599429875
+CVE-2021-39322 - https://wpvulndb.com/vulnerabilities/5e0bf0b6-9809-426b-b1d4-1fb653083b58
CVE-2021-39327 - http://packetstormsecurity.com/files/164420/WordPress-BulletProof-Security-5.1-Information-Disclosure.html
CVE-2021-39327 - https://www.exploit-db.com/exploits/50382
CVE-2021-39352 - http://packetstormsecurity.com/files/165207/WordPress-Catch-Themes-Demo-Import-1.6.1-Shell-Upload.html
@@ -85442,6 +85455,7 @@ CVE-2022-37771 - https://packetstormsecurity.com/files/167913/IObit-Malware-Figh
CVE-2022-37775 - http://genesys.com
CVE-2022-37775 - http://packetstormsecurity.com/files/168410/Genesys-PureConnect-Cross-Site-Scripting.html
CVE-2022-37781 - https://github.com/nu774/fdkaac/issues/54
+CVE-2022-37783 - http://www.openwall.com/lists/oss-security/2024/06/06/1
CVE-2022-37794 - https://github.com/anx0ing/CVE_demo/blob/main/2022/Library%20Management%20System%20with%20QR%20code%20Attendance%20and%20Auto%20Generate%20Library%20Card%20-%20SQL%20injections.md
CVE-2022-37797 - https://redmine.lighttpd.net/issues/3165
CVE-2022-37798 - https://github.com/Darry-lang1/vuln/tree/main/Tenda/AC1206/5
@@ -87191,6 +87205,7 @@ CVE-2022-45045 - https://vulncheck.com/blog/xiongmai-iot-exploitation
CVE-2022-4505 - https://huntr.dev/bounties/e36ca754-bb9f-4686-ad72-7fb849e97d92
CVE-2022-4506 - https://huntr.dev/bounties/f423d193-4ab0-4f03-ad90-25e4f02e7942
CVE-2022-45062 - https://gitlab.xfce.org/xfce/xfce4-settings/-/issues/390
+CVE-2022-45063 - http://www.openwall.com/lists/oss-security/2024/06/17/1
CVE-2022-4507 - https://wpscan.com/vulnerability/93c61a70-5624-4c4d-ac3a-c598aec4f8b6
CVE-2022-4508 - https://wpscan.com/vulnerability/5101a979-7a53-40bf-8988-6347ef851eab
CVE-2022-4509 - https://wpscan.com/vulnerability/90baba2e-a64f-4725-b76c-3aed94b18910
@@ -87205,6 +87220,7 @@ CVE-2022-45132 - https://podalirius.net/en/articles/python-vulnerabilities-code-
CVE-2022-45144 - https://herolab.usd.de/security-advisories/usd-2022-0048/
CVE-2022-45163 - https://research.nccgroup.com/2022/11/17/cve-2022-45163/
CVE-2022-45163 - https://research.nccgroup.com/category/technical-advisory/
+CVE-2022-45168 - https://www.gruppotim.it/it/footer/red-team.html
CVE-2022-45169 - https://www.gruppotim.it/it/footer/red-team.html
CVE-2022-45170 - https://www.gruppotim.it/it/footer/red-team.html
CVE-2022-45171 - https://www.gruppotim.it/it/footer/red-team.html
@@ -87212,6 +87228,7 @@ CVE-2022-45172 - https://www.gruppotim.it/it/footer/red-team.html
CVE-2022-45173 - https://www.gruppotim.it/it/footer/red-team.html
CVE-2022-45174 - https://www.gruppotim.it/it/footer/red-team.html
CVE-2022-45175 - https://www.gruppotim.it/it/footer/red-team.html
+CVE-2022-45176 - https://www.gruppotim.it/it/footer/red-team.html
CVE-2022-45177 - https://www.gruppotim.it/it/footer/red-team.html
CVE-2022-45178 - https://www.gruppotim.it/it/footer/red-team.html
CVE-2022-45179 - https://www.gruppotim.it/it/footer/red-team.html
@@ -90535,6 +90552,8 @@ CVE-2023-2765 - https://github.com/eckert-lcc/cve/blob/main/Weaver%20oa.md
CVE-2023-2765 - https://vuldb.com/?id.229270
CVE-2023-27651 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27651/CVE%20detail.md
CVE-2023-27652 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27652/CVE%20detail.md
+CVE-2023-27653 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27653/CVE%20detail.md
+CVE-2023-27654 - https://github.com/LianKee/SODA/blob/main/CVEs/CVE-2023-27654/CVE%20detail.md
CVE-2023-27655 - https://forum.xpdfreader.com/viewtopic.php?t=42398
CVE-2023-27655 - https://github.com/keepinggg/poc/blob/main/poc_of_xpdf/id2
CVE-2023-27655 - https://github.com/keepinggg/poc/tree/main/poc_of_xpdf
@@ -91314,6 +91333,7 @@ CVE-2023-3148 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.
CVE-2023-31483 - https://github.com/CauldronDevelopmentLLC/cbang/issues/115
CVE-2023-31489 - https://github.com/FRRouting/frr/issues/13098
CVE-2023-3149 - https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/Online%20Discussion%20Forum%20Site%20-%20multiple%20vulnerabilities.md#4sql-injection-vulnerability-in-adminusermanage_userphp
+CVE-2023-3149 - https://vuldb.com/?id.231018
CVE-2023-31490 - https://github.com/FRRouting/frr/issues/13099
CVE-2023-31492 - http://packetstormsecurity.com/files/177091/ManageEngine-ADManager-Plus-Recovery-Password-Disclosure.html
CVE-2023-31492 - https://github.com/passtheticket/vulnerability-research/blob/main/manage-engine-apps/admanager-recovery-password-disclosure.md
@@ -91789,6 +91809,7 @@ CVE-2023-33921 - http://seclists.org/fulldisclosure/2023/Jul/14
CVE-2023-3393 - https://huntr.dev/bounties/e4df9280-900a-407a-a07e-e7fef3345914
CVE-2023-3394 - https://huntr.dev/bounties/84bf3e85-cdeb-4b8d-9ea4-74156dbda83f
CVE-2023-33956 - https://github.com/kanboard/kanboard/security/advisories/GHSA-r36m-44gg-wxg2
+CVE-2023-3396 - https://vuldb.com/?id.232351
CVE-2023-33968 - https://github.com/kanboard/kanboard/security/advisories/GHSA-gf8r-4p6m-v8vr
CVE-2023-33969 - https://github.com/kanboard/kanboard/security/advisories/GHSA-8qvf-9847-gpc9
CVE-2023-33970 - https://github.com/kanboard/kanboard/security/advisories/GHSA-wfch-8rhv-v286
@@ -91996,6 +92017,7 @@ CVE-2023-35002 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-
CVE-2023-3501 - https://wpscan.com/vulnerability/d3fb4a2b-ed51-4654-b7c1-4b0f59cd1ecf
CVE-2023-35016 - https://www.ibm.com/support/pages/node/7014397
CVE-2023-35019 - https://www.ibm.com/support/pages/node/7014397
+CVE-2023-3505 - https://vuldb.com/?id.232953
CVE-2023-35055 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1761
CVE-2023-35056 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1761
CVE-2023-35057 - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1821
@@ -92237,6 +92259,7 @@ CVE-2023-36820 - https://github.com/micronaut-projects/micronaut-security/securi
CVE-2023-36821 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-7grx-f945-mj96
CVE-2023-36822 - https://github.com/louislam/uptime-kuma/security/advisories/GHSA-vr8x-74pm-6vj7
CVE-2023-36828 - https://github.com/statamic/cms/security/advisories/GHSA-6r5g-cq4q-327g
+CVE-2023-3684 - https://vuldb.com/?id.234230
CVE-2023-36844 - http://packetstormsecurity.com/files/174397/Juniper-JunOS-SRX-EX-Remote-Code-Execution.html
CVE-2023-36844 - http://packetstormsecurity.com/files/174865/Juniper-SRX-Firewall-EX-Switch-Remote-Code-Execution.html
CVE-2023-36845 - http://packetstormsecurity.com/files/174397/Juniper-JunOS-SRX-EX-Remote-Code-Execution.html
@@ -92347,6 +92370,7 @@ CVE-2023-37475 - https://github.com/hamba/avro/security/advisories/GHSA-9x44-9pg
CVE-2023-37477 - https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-p9xf-74xh-mhw5
CVE-2023-37478 - https://github.com/pnpm/pnpm/security/advisories/GHSA-5r98-f33j-g8h7
CVE-2023-3752 - https://vuldb.com/?id.234422
+CVE-2023-3753 - https://vuldb.com/?id.234423
CVE-2023-37543 - https://medium.com/@hussainfathy99/exciting-news-my-first-cve-discovery-cve-2023-37543-idor-vulnerability-in-cacti-bbb6c386afed
CVE-2023-37569 - http://packetstormsecurity.com/files/174084/Emagic-Data-Center-Management-Suite-6.0-Remote-Command-Execution.html
CVE-2023-37581 - http://seclists.org/fulldisclosure/2023/Jul/43
@@ -92430,6 +92454,7 @@ CVE-2023-37833 - https://github.com/strik3r0x1/Vulns/blob/main/BAC%20leads%20to%
CVE-2023-37836 - https://github.com/thorfdbg/libjpeg/issues/87#BUG1
CVE-2023-37837 - https://github.com/thorfdbg/libjpeg/issues/87#BUG0
CVE-2023-3784 - https://seclists.org/fulldisclosure/2023/Jul/37
+CVE-2023-3784 - https://vuldb.com/?id.235051
CVE-2023-3784 - https://www.vulnerability-lab.com/get_content.php?id=2317
CVE-2023-37849 - https://heegong.github.io/posts/Local-privilege-escalation-in-Panda-Dome-VPN-for-Windows-Installer/
CVE-2023-3785 - https://seclists.org/fulldisclosure/2023/Jul/39
@@ -92499,6 +92524,7 @@ CVE-2023-38253 - https://github.com/tats/w3m/issues/271
CVE-2023-38286 - https://github.com/p1n93r/SpringBootAdmin-thymeleaf-SSTI
CVE-2023-3830 - https://vuldb.com/?id.235151
CVE-2023-38328 - https://www.gruppotim.it/it/footer/red-team.html
+CVE-2023-3833 - https://vuldb.com/?id.235159
CVE-2023-38334 - http://packetstormsecurity.com/files/173696/Omnis-Studio-10.22.00-Library-Unlock.html
CVE-2023-38334 - http://seclists.org/fulldisclosure/2023/Jul/42
CVE-2023-38334 - http://seclists.org/fulldisclosure/2023/Jul/43
@@ -94225,6 +94251,10 @@ CVE-2023-4911 - http://packetstormsecurity.com/files/176288/Glibc-Tunables-Privi
CVE-2023-4911 - http://seclists.org/fulldisclosure/2023/Oct/11
CVE-2023-4911 - http://www.openwall.com/lists/oss-security/2023/10/03/2
CVE-2023-4911 - https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt
+CVE-2023-49110 - https://r.sec-consult.com/kiuwan
+CVE-2023-49111 - https://r.sec-consult.com/kiuwan
+CVE-2023-49112 - https://r.sec-consult.com/kiuwan
+CVE-2023-49113 - https://r.sec-consult.com/kiuwan
CVE-2023-49114 - http://seclists.org/fulldisclosure/2024/Mar/10
CVE-2023-49114 - https://r.sec-consult.com/qognify
CVE-2023-4912 - https://gitlab.com/gitlab-org/gitlab/-/issues/424882
@@ -94440,6 +94470,7 @@ CVE-2023-5030 - https://github.com/husterdjx/cve/blob/main/sql1.md
CVE-2023-5033 - https://vuldb.com/?id.239877
CVE-2023-50358 - https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2024/2024-213941-1032
CVE-2023-5036 - https://huntr.dev/bounties/46881df7-eb41-4ce2-a78f-82de9bc4fc2d
+CVE-2023-50387 - https://www.securityweek.com/keytrap-dns-attack-could-disable-large-parts-of-internet-researchers/
CVE-2023-5041 - https://wpscan.com/vulnerability/45194442-6eea-4e07-85a5-4a1e2fde3523
CVE-2023-50422 - https://blogs.sap.com/2023/12/12/unveiling-critical-security-updates-sap-btp-security-note-3411067/
CVE-2023-50423 - https://blogs.sap.com/2023/12/12/unveiling-critical-security-updates-sap-btp-security-note-3411067/
@@ -95150,6 +95181,7 @@ CVE-2023-6576 - https://github.com/willchen0011/cve/blob/main/upload.md
CVE-2023-6577 - https://github.com/kpz-wm/cve/blob/main/Any_file_read.md
CVE-2023-6579 - http://packetstormsecurity.com/files/176124/osCommerce-4-SQL-Injection.html
CVE-2023-6580 - https://github.com/c2dc/cve-reported/blob/main/CVE-2023-6580/CVE-2023-6580.md
+CVE-2023-6581 - https://github.com/flyyue2001/cve/blob/main/D-LINK%20-DAR-7000_sql_workidajax.md
CVE-2023-6584 - https://wpscan.com/vulnerability/e528e3cd-a45c-4bf7-a37a-101f5c257acd/
CVE-2023-6585 - https://wpscan.com/vulnerability/757412f4-e4f8-4007-8e3b-639a72b33180/
CVE-2023-6591 - https://wpscan.com/vulnerability/f296de1c-b70b-4829-aba7-4afa24f64c51/
@@ -95399,6 +95431,7 @@ CVE-2024-0420 - https://wpscan.com/vulnerability/b6187ef8-70f4-4911-abd7-42bf6b7
CVE-2024-0421 - https://wpscan.com/vulnerability/587acc47-1966-4baf-a380-6aa479a97c82/
CVE-2024-0425 - https://github.com/mi2acle/forucmsvuln/blob/master/passwordreset.md
CVE-2024-0426 - https://github.com/mi2acle/forucmsvuln/blob/master/sqli.md
+CVE-2024-0427 - https://wpscan.com/vulnerability/1806fef3-d774-46e0-aa48-7a101495f4eb/
CVE-2024-0439 - https://huntr.com/bounties/7fc1b78e-7faf-4f40-961d-61e53dac81ce
CVE-2024-0440 - https://huntr.com/bounties/263fd7eb-f9a9-4578-9655-0e28c609272f
CVE-2024-0455 - https://huntr.com/bounties/07d83b49-7ebb-40d2-83fc-78381e3c5c9c
@@ -95592,6 +95625,7 @@ CVE-2024-1274 - https://wpscan.com/vulnerability/91dba45b-9930-4bfb-a7bf-903c468
CVE-2024-1279 - https://wpscan.com/vulnerability/4c537264-0c23-428e-9a11-7a9e74fb6b69/
CVE-2024-1290 - https://wpscan.com/vulnerability/a60187d4-9491-435a-bc36-8dd348a1ffa3/
CVE-2024-1292 - https://wpscan.com/vulnerability/56d4fc48-d0dc-4ac6-93cd-f64d4c3c5c07/
+CVE-2024-1295 - https://wpscan.com/vulnerability/3cffbeb0-545a-4002-b02c-0fa38cada1db/
CVE-2024-1306 - https://wpscan.com/vulnerability/c7ce2649-b2b0-43f4-994d-07b1023405e9/
CVE-2024-1307 - https://wpscan.com/vulnerability/bbc6cebd-e9bf-4b08-a474-f9312b3c0947/
CVE-2024-1309 - https://www.honeywell.com/us/en/product-security
@@ -95686,6 +95720,7 @@ CVE-2024-1928 - https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.c
CVE-2024-1929 - https://www.openwall.com/lists/oss-security/2024/03/04/2
CVE-2024-1930 - https://www.openwall.com/lists/oss-security/2024/03/04/2
CVE-2024-1932 - https://huntr.com/bounties/fefd711e-3bf0-4884-9acc-167649c1f9a2
+CVE-2024-1938 - https://issues.chromium.org/issues/324596281
CVE-2024-1956 - https://wpscan.com/vulnerability/d7034ac2-0098-48d2-9ba9-87e09b178f7d/
CVE-2024-1958 - https://wpscan.com/vulnerability/8be4ebcf-2b42-4b88-89a0-2df6dbf00b55/
CVE-2024-1962 - https://wpscan.com/vulnerability/469486d4-7677-4d66-83c0-a6b9ac7c503b/
@@ -95955,6 +95990,7 @@ CVE-2024-2189 - https://wpscan.com/vulnerability/b8661fbe-78b9-4d29-90bf-5b68af4
CVE-2024-21907 - https://alephsecurity.com/vulns/aleph-2018004
CVE-2024-21907 - https://security.snyk.io/vuln/SNYK-DOTNET-NEWTONSOFTJSON-2774678
CVE-2024-2193 - https://www.vusec.net/projects/ghostrace/
+CVE-2024-22002 - https://github.com/0xkickit/iCUE_DllHijack_LPE-CVE-2024-22002
CVE-2024-22049 - https://github.com/advisories/GHSA-5pq7-52mg-hr42
CVE-2024-22049 - https://github.com/jnunemaker/httparty/security/advisories/GHSA-5pq7-52mg-hr42
CVE-2024-22086 - https://github.com/hayyp/cherry/issues/1
@@ -95966,6 +96002,7 @@ CVE-2024-22108 - https://adepts.of0x.cc/gtbcc-pwned/
CVE-2024-22108 - https://x-c3ll.github.io/cves.html
CVE-2024-22120 - https://support.zabbix.com/browse/ZBX-24505
CVE-2024-22144 - https://patchstack.com/articles/critical-vulnerability-found-in-gotmls-plugin?_s_id=cve
+CVE-2024-2218 - https://wpscan.com/vulnerability/ecd615f7-946e-45af-a610-0654a243b1dc/
CVE-2024-22190 - https://github.com/gitpython-developers/GitPython/pull/1792
CVE-2024-22190 - https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-2mqj-m65w-jghx
CVE-2024-22191 - https://github.com/avo-hq/avo/security/advisories/GHSA-ghjv-mh6x-7q6h
@@ -96076,6 +96113,7 @@ CVE-2024-22852 - https://github.com/Beckaf/vunl/blob/main/D-Link/AC750/1/1.md
CVE-2024-22852 - https://www.dlink.com/en/security-bulletin/
CVE-2024-22853 - https://www.dlink.com/en/security-bulletin/
CVE-2024-22854 - https://tomekwasiak.pl/cve-2024-22854/
+CVE-2024-22855 - https://www.exploit-db.com/exploits/52025
CVE-2024-22856 - https://www.4rth4s.xyz/2024/04/cve-2024-22856-authenticated-blind-sql.html
CVE-2024-22857 - https://www.ebryx.com/blogs/arbitrary-code-execution-in-zlog-cve-2024-22857
CVE-2024-22859 - https://github.com/github/advisory-database/pull/3490
@@ -96162,6 +96200,7 @@ CVE-2024-23648 - https://github.com/pimcore/admin-ui-classic-bundle/security/adv
CVE-2024-23649 - https://github.com/LemmyNet/lemmy/security/advisories/GHSA-r64r-5h43-26qv
CVE-2024-2365 - https://github.com/ctflearner/Android_Findings/blob/main/Musicshelf/Weak_Hashing_Algorithms.md
CVE-2024-23655 - https://github.com/tutao/tutanota/security/advisories/GHSA-5h47-g927-629g
+CVE-2024-23656 - https://github.com/dexidp/dex/pull/2964
CVE-2024-23656 - https://github.com/dexidp/dex/security/advisories/GHSA-gr79-9v6v-gc9r
CVE-2024-23660 - https://secbit.io/blog/en/2024/01/19/trust-wallets-fomo3d-summer-vuln/
CVE-2024-23674 - https://ctrlalt.medium.com/space-attack-spoofing-eids-password-authenticated-connection-establishment-11561e5657b1
@@ -96223,6 +96262,7 @@ CVE-2024-24041 - https://github.com/tubakvgc/CVE/blob/main/Travel_Journal_App.md
CVE-2024-24041 - https://portswigger.net/web-security/cross-site-scripting
CVE-2024-2405 - https://wpscan.com/vulnerability/c42ffa15-6ebe-4c70-9e51-b95bd05ea04d/
CVE-2024-24050 - https://www.muratcagrialis.com/workout-journal-app-stored-xss-cve-2024-24050
+CVE-2024-24051 - https://github.com/tkruppert/Reported_Vulnerabilities/blob/main/CVE-2024-24051.md
CVE-2024-24059 - https://github.com/By-Yexing/Vulnerability_JAVA/blob/main/2024/springboot-manager.md#2-file-upload-vulnerability
CVE-2024-24060 - https://github.com/By-Yexing/Vulnerability_JAVA/blob/main/2024/springboot-manager.md#11-stored-cross-site-scripting-sysuser
CVE-2024-24061 - https://github.com/By-Yexing/Vulnerability_JAVA/blob/main/2024/springboot-manager.md#13-stored-cross-site-scripting-syscontentadd
@@ -96262,6 +96302,7 @@ CVE-2024-24294 - https://gist.github.com/mestrtee/d1eb6e1f7c6dd60d8838c3e56cab63
CVE-2024-24300 - https://github.com/yckuo-sdc/PoC
CVE-2024-24301 - https://github.com/yckuo-sdc/PoC
CVE-2024-2432 - https://security.paloaltonetworks.com/CVE-2024-2432
+CVE-2024-24320 - https://datack.my/cloudpanel-v2-0-0-v2-4-0-authenticated-user-session-hijacking-cve-2024-24320/
CVE-2024-24321 - https://github.com/dkjiayu/Vul/blob/main/DIR816A2-dir_setWanWifi.md
CVE-2024-24321 - https://www.dlink.com/en/security-bulletin/
CVE-2024-24325 - https://github.com/funny-mud-peee/IoT-vuls/blob/main/TOTOLINK%20A3300R/11/TOTOlink%20A3300R%20setParentalRules.md
@@ -96626,8 +96667,11 @@ CVE-2024-25973 - http://seclists.org/fulldisclosure/2024/Feb/23
CVE-2024-25973 - https://r.sec-consult.com/openolat
CVE-2024-25974 - http://seclists.org/fulldisclosure/2024/Feb/23
CVE-2024-25974 - https://r.sec-consult.com/openolat
+CVE-2024-25975 - http://seclists.org/fulldisclosure/2024/May/34
CVE-2024-25975 - https://r.sec-consult.com/hawki
+CVE-2024-25976 - http://seclists.org/fulldisclosure/2024/May/34
CVE-2024-25976 - https://r.sec-consult.com/hawki
+CVE-2024-25977 - http://seclists.org/fulldisclosure/2024/May/34
CVE-2024-25977 - https://r.sec-consult.com/hawki
CVE-2024-2603 - https://wpscan.com/vulnerability/b4186c03-99ee-4297-85c0-83b7053afc1c/
CVE-2024-2604 - https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20File%20Manager%20App/Arbitrary%20File%20Upload%20-%20update-file.php.md
@@ -96660,6 +96704,7 @@ CVE-2024-26492 - https://packetstormsecurity.com/files/165555/Online-Diagnostic-
CVE-2024-26492 - https://www.exploit-db.com/exploits/50660
CVE-2024-26495 - https://github.com/friendica/friendica/issues/13884
CVE-2024-26504 - https://tomiodarim.io/posts/cve-2024-26504/
+CVE-2024-26507 - https://belong2yourself.github.io/vulnerabilities/docs/AIDA/Elevation-of-Privileges/readme/
CVE-2024-26521 - https://github.com/capture0x/Phoenix
CVE-2024-26521 - https://github.com/hackervegas001/CVE-2024-26521
CVE-2024-26529 - https://github.com/mz-automation/libiec61850/issues/492
@@ -96768,6 +96813,7 @@ CVE-2024-2760 - https://fluidattacks.com/advisories/kent/
CVE-2024-2761 - https://wpscan.com/vulnerability/e092ccdc-7ea1-4937-97b7-4cdbff5e74e5/
CVE-2024-27619 - https://github.com/ioprojecton/dir-3040_dos
CVE-2024-27619 - https://www.dlink.com/en/security-bulletin/
+CVE-2024-2762 - https://wpscan.com/vulnerability/92e0f5ca-0184-4e9c-b01a-7656e05dce69/
CVE-2024-27620 - https://packetstormsecurity.com/files/177506/Ladder-0.0.21-Server-Side-Request-Forgery.html
CVE-2024-27622 - https://packetstormsecurity.com/files/177241/CMS-Made-Simple-2.2.19-Remote-Code-Execution.html
CVE-2024-27625 - https://packetstormsecurity.com/files/177243/CMS-Made-Simple-2.2.19-Cross-Site-Scripting.html
@@ -96820,6 +96866,7 @@ CVE-2024-28066 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisorie
CVE-2024-2807 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formExpandDlnaFile.md
CVE-2024-2807 - https://vuldb.com/?id.257662
CVE-2024-2808 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formQuickIndex.md
+CVE-2024-28085 - http://www.openwall.com/lists/oss-security/2024/03/27/5
CVE-2024-28085 - https://people.rit.edu/sjf5462/6831711781/wall_2_27_2024.txt
CVE-2024-28085 - https://www.openwall.com/lists/oss-security/2024/03/27/5
CVE-2024-28088 - https://github.com/PinkDraconian/PoC-Langchain-RCE/blob/main/README.md
@@ -96844,6 +96891,7 @@ CVE-2024-28120 - https://securitylab.github.com/advisories/GHSL-2024-027_GHSL-20
CVE-2024-28122 - https://github.com/lestrrat-go/jwx/security/advisories/GHSA-hj3v-m684-v259
CVE-2024-2813 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/form_fast_setting_wifi_set.md
CVE-2024-2814 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/fromDhcpListClient_page.md
+CVE-2024-28147 - https://r.sec-consult.com/metaventis
CVE-2024-2815 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/R7WebsSecurityHandler.md
CVE-2024-2816 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/fromSysToolReboot.md
CVE-2024-2817 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/fromSysToolRestoreSet.md
@@ -97109,14 +97157,17 @@ CVE-2024-29974 - https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/
CVE-2024-29975 - https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/
CVE-2024-29976 - https://outpost24.com/blog/zyxel-nas-critical-vulnerabilities/
CVE-2024-3000 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System%20-%20Authentication%20Bypass.md
+CVE-2024-3000 - https://vuldb.com/?id.258202
CVE-2024-3001 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%203.md
CVE-2024-3002 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%204.md
CVE-2024-3003 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System-%20SQL%20Injection%20-%205.md
+CVE-2024-3003 - https://vuldb.com/?id.258205
CVE-2024-3004 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Book%20System/Online%20Book%20System%20-%20Cross-Site-Scripting.md
CVE-2024-3011 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/formQuickIndex.md
CVE-2024-3012 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/FH/FH1205/GetParentControlInfo.md
CVE-2024-30162 - http://seclists.org/fulldisclosure/2024/Apr/21
CVE-2024-30163 - http://seclists.org/fulldisclosure/2024/Apr/20
+CVE-2024-30212 - https://github.com/Fehr-GmbH/blackleak
CVE-2024-3024 - https://docs.google.com/document/d/1wCIrViAJwGsO5afPBLLjRhO5RClsoUo3J9q1psLs84s/edit?usp=sharing
CVE-2024-30248 - https://github.com/piccolo-orm/piccolo_admin/security/advisories/GHSA-pmww-v6c9-7p83
CVE-2024-30252 - https://github.com/nt1m/livemarks/security/advisories/GHSA-3gg9-w4fm-jjcg
@@ -97127,6 +97178,8 @@ CVE-2024-30259 - https://drive.google.com/file/d/1Y2bGvP3UIOJCLh_XEURLdhrM2Sznlv
CVE-2024-30259 - https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-qcj9-939p-p662
CVE-2024-30264 - https://github.com/baptisteArno/typebot.io/security/advisories/GHSA-mx2f-9mcr-8j73
CVE-2024-30268 - https://github.com/Cacti/cacti/security/advisories/GHSA-9m3v-whmr-pc2q
+CVE-2024-30311 - https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1946
+CVE-2024-3032 - https://wpscan.com/vulnerability/d130a60c-c36b-4994-9b0e-e52cd7f99387/
CVE-2024-30406 - https://www.juniper.net/documentation/us/en/software/junos/cli-reference/topics/ref/statement/services-paa-test-agent.html
CVE-2024-3048 - https://wpscan.com/vulnerability/e179ff7d-137c-48bf-8b18-e874e3f876f4/
CVE-2024-3050 - https://wpscan.com/vulnerability/04c1581e-fd36-49d4-8463-b49915d4b1ac/
@@ -97192,6 +97245,7 @@ CVE-2024-30809 - https://github.com/axiomatic-systems/Bento4/issues/937
CVE-2024-30840 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V15.03.05.18/fromDhcpListClient_list1.md
CVE-2024-30845 - https://gist.github.com/Zshan7que/c813f2b52daab08c9fb4f6c6b8178b66
CVE-2024-30845 - https://github.com/netcccyun/pan/issues/6
+CVE-2024-30848 - https://github.com/Excis3/CVE-Disclosure/blob/main/CVE-2024-30848.md
CVE-2024-30849 - https://github.com/wkeyi0x1/vul-report/issues/3
CVE-2024-30850 - https://blog.chebuya.com/posts/remote-code-execution-on-chaos-rat-via-spoofed-agents/
CVE-2024-30851 - https://github.com/chebuya/CVE-2024-30851-jasmin-ransomware-path-traversal-poc
@@ -97255,6 +97309,7 @@ CVE-2024-3118 - https://vuldb.com/?id.258779
CVE-2024-31212 - https://github.com/instantsoft/icms2/security/advisories/GHSA-qx95-w566-73fw
CVE-2024-31213 - https://github.com/instantsoft/icms2/security/advisories/GHSA-6v3c-p92q-prfq
CVE-2024-31214 - https://github.com/traccar/traccar/security/advisories/GHSA-3gxq-f2qj-c8v9
+CVE-2024-31217 - https://github.com/strapi/strapi/security/advisories/GHSA-pm9q-xj9p-96pm
CVE-2024-3124 - https://github.com/ctflearner/Android_Findings/blob/main/Smartalarm/Backup.md
CVE-2024-3124 - https://vuldb.com/?submit.307752
CVE-2024-3125 - https://github.com/strik3r0x1/Vulns/blob/main/ZTC_GK420d-SXSS.md
@@ -97288,6 +97343,8 @@ CVE-2024-3146 - https://github.com/Hckwzh/cms/blob/main/14.md
CVE-2024-31460 - https://github.com/Cacti/cacti/security/advisories/GHSA-cx8g-hvq8-p2rv
CVE-2024-31460 - https://github.com/Cacti/cacti/security/advisories/GHSA-gj3f-p326-gh8r
CVE-2024-3147 - https://github.com/Hckwzh/cms/blob/main/15.md
+CVE-2024-3148 - https://vuldb.com/?id.258923
+CVE-2024-31497 - https://github.com/daedalus/BreakingECDSAwithLLL
CVE-2024-31497 - https://securityonline.info/cve-2024-31497-critical-putty-vulnerability-exposes-private-keys-immediate-action-required/
CVE-2024-31497 - https://www.bleepingcomputer.com/news/security/putty-ssh-client-flaw-allows-recovery-of-cryptographic-private-keys/
CVE-2024-31502 - https://github.com/sahildari/cve/blob/master/CVE-2024-31502.md
@@ -97300,7 +97357,10 @@ CVE-2024-31545 - https://github.com/emirhanmtl/vuln-research/blob/main/SQLi-4-Co
CVE-2024-31546 - https://github.com/emirhanmtl/vuln-research/blob/main/SQLi-2-Computer-Laboratory-Management-System-PoC.md
CVE-2024-31547 - https://github.com/emirhanmtl/vuln-research/blob/main/SQLi-3-Computer-Laboratory-Management-System-PoC.md
CVE-2024-31581 - https://github.com/FFmpeg/FFmpeg/blob/n6.1.1/libavcodec/cbs_h266_syntax_template.c#L2048
+CVE-2024-31586 - https://github.com/CyberSentryX/CVE_Hunting/tree/main/CVE-2024-31586
CVE-2024-31610 - https://github.com/ss122-0ss/School/blob/main/readme.md
+CVE-2024-31612 - https://github.com/ss122-0ss/cms/blob/main/emlog-csrf.md
+CVE-2024-31613 - https://github.com/ss122-0ss/BOSSCMS/blob/main/bosscms%20csrf.md
CVE-2024-31616 - https://gist.github.com/Swind1er/0c50e72428059fb72a4fd4d31c43f883
CVE-2024-31621 - https://www.exploit-db.com/exploits/52001
CVE-2024-31636 - https://github.com/lief-project/LIEF/issues/1038
@@ -97320,6 +97380,7 @@ CVE-2024-31759 - https://gist.github.com/menghaining/8d424faebfe869c80eadaea12bb
CVE-2024-31759 - https://github.com/menghaining/PoC/blob/main/PublicCMS/publishCMS--PoC.md
CVE-2024-31760 - https://gist.github.com/menghaining/8d424faebfe869c80eadaea12bbdd158
CVE-2024-31760 - https://github.com/menghaining/PoC/blob/main/gin-vue-admin/gin-vue-admin--PoC.md
+CVE-2024-31777 - https://github.com/FreySolarEye/Exploit-CVE-2024-31777
CVE-2024-31804 - https://www.exploit-db.com/exploits/51977
CVE-2024-31819 - https://chocapikk.com/posts/2024/cve-2024-31819/
CVE-2024-31819 - https://github.com/Chocapikk/CVE-2024-31819
@@ -97354,8 +97415,10 @@ CVE-2024-3207 - https://vuldb.com/?submit.304572
CVE-2024-3209 - https://vuldb.com/?submit.304575
CVE-2024-32163 - https://github.com/XiLitter/CMS_vulnerability-discovery/blob/main/CMSeasy_7.7.7.9_code_execution.md
CVE-2024-32166 - https://github.com/Fewword/Poc/blob/main/webid/webid-poc14.md
+CVE-2024-32167 - https://github.com/ss122-0ss/cms/blob/main/omos.md
CVE-2024-3218 - https://github.com/garboa/cve_3/blob/main/file_put_content.md
CVE-2024-32206 - https://github.com/majic-banana/vulnerability/blob/main/POC/WUZHICMS4.1.0%20Stored%20Xss%20In%20Affiche%20Model.md
+CVE-2024-3221 - https://vuldb.com/?id.259066
CVE-2024-32254 - https://github.com/jinhaochan/CVE-POC/blob/main/tms/POC.md
CVE-2024-32256 - https://github.com/jinhaochan/CVE-POC/blob/main/tms/POC.md
CVE-2024-32258 - https://github.com/TASEmulators/fceux/issues/727
@@ -97399,6 +97462,7 @@ CVE-2024-32343 - https://github.com/adiapera/xss_create2_boidcms_2.1.0
CVE-2024-32344 - https://github.com/adiapera/xss_language_cmsimple_5.15/blob/main/README.md
CVE-2024-32345 - https://github.com/adiapera/xss_language_cmsimple_5.15
CVE-2024-32359 - https://github.com/HouqiyuA/k8s-rbac-poc
+CVE-2024-3236 - https://wpscan.com/vulnerability/a6c2da28-dc03-4bcc-a6c3-ee55a73861db/
CVE-2024-32369 - https://github.com/chucrutis/CVE-2024-32369
CVE-2024-3239 - https://wpscan.com/vulnerability/dfa1421b-41b0-4b25-95ef-0843103e1f5e/
CVE-2024-32391 - https://github.com/magicblack/maccms10/issues/1133
@@ -97442,6 +97506,7 @@ CVE-2024-32743 - https://github.com/adiapera/xss_security_wondercms_3.4.3
CVE-2024-32744 - https://github.com/adiapera/xss_current_page_wondercms_3.4.3
CVE-2024-32745 - https://github.com/adiapera/xss_current_page_wondercms_3.4.3
CVE-2024-32746 - https://github.com/adiapera/xss_menu_page_wondercms_3.4.3
+CVE-2024-3276 - https://wpscan.com/vulnerability/996d3247-ebdd-49d1-a1a3-ceedcf9f2f95/
CVE-2024-3281 - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-003.txt
CVE-2024-32866 - https://github.com/edmundhung/conform/security/advisories/GHSA-624g-8qjg-8qxf
CVE-2024-32869 - https://github.com/honojs/hono/security/advisories/GHSA-3mpf-rcc7-5347
@@ -97475,6 +97540,7 @@ CVE-2024-33113 - https://github.com/yj94/Yj_learning/blob/main/Week16/D-LINK-POC
CVE-2024-3322 - https://github.com/parisneo/lollms-webui/commit/1e17df01e01d4d33599db2afaafe91d90b6f0189
CVE-2024-33247 - https://github.com/CveSecLook/cve/issues/11
CVE-2024-33250 - https://github.com/hacker2004/cccccckkkkkk/blob/main/CVE-2024-33250.md
+CVE-2024-33253 - https://github.com/FreySolarEye/CVE/blob/master/GUnet%20OpenEclass%20E-learning%20platform%203.15%20-%20'certbadge.php'%20Stored%20Cross%20Site%20Scripting
CVE-2024-33255 - https://github.com/jerryscript-project/jerryscript/issues/5135
CVE-2024-33258 - https://github.com/jerryscript-project/jerryscript/issues/5114
CVE-2024-33259 - https://github.com/jerryscript-project/jerryscript/issues/5132
@@ -97494,6 +97560,9 @@ CVE-2024-33332 - https://github.com/wy876/cve/issues/3
CVE-2024-33338 - https://github.com/7akahash1/POC/blob/main/1.md
CVE-2024-33345 - https://github.com/n0wstr/IOTVuln/tree/main/DIR-823g/UploadFirmware
CVE-2024-33350 - https://github.com/majic-banana/vulnerability/blob/main/POC/taocms-3.0.2%20Arbitrary%20File%20Writing%20Vulnerability.md
+CVE-2024-33373 - https://github.com/ShravanSinghRathore/Security-Advisory-Multiple-Vulnerabilities-in-LB-link-BL-W1210M-Router/wiki/Password-Policy-Bypass--%7C--Inconsistent-Password-Policy-(CVE%E2%80%902024%E2%80%9033373)
+CVE-2024-33374 - https://github.com/ShravanSinghRathore/Security-Advisory-Multiple-Vulnerabilities-in-LB-link-BL-W1210M-Router/wiki/Incorrect-Access-Control-(CVE%E2%80%902024%E2%80%9033374)
+CVE-2024-33377 - https://github.com/ShravanSinghRathore/Security-Advisory-Multiple-Vulnerabilities-in-LB-link-BL-W1210M-Router/wiki/Clickjacking-(CVE%E2%80%902024%E2%80%9033377)
CVE-2024-33383 - https://juvl1ne.github.io/2024/04/18/novel-plus-vulnerability/
CVE-2024-33398 - https://github.com/HouqiyuA/k8s-rbac-poc
CVE-2024-33423 - https://github.com/adiapera/xss_language_cmsimple_5.15
@@ -97581,6 +97650,7 @@ CVE-2024-3400 - https://unit42.paloaltonetworks.com/cve-2024-3400/
CVE-2024-34020 - https://bugzilla.suse.com/show_bug.cgi?id=1223534
CVE-2024-3405 - https://wpscan.com/vulnerability/6968d43c-16ff-43a9-8451-71aabbe69014/
CVE-2024-34051 - https://blog.smarttecs.com/posts/2024-004-cve-2024-34051/
+CVE-2024-34058 - http://www.openwall.com/lists/oss-security/2024/05/16/3
CVE-2024-34058 - https://www.openwall.com/lists/oss-security/2024/05/16/3
CVE-2024-3406 - https://wpscan.com/vulnerability/1bfab060-64d2-4c38-8bc8-a8f81c5a6e0d/
CVE-2024-34061 - https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-pwgc-w4x9-gw67
@@ -97624,6 +97694,7 @@ CVE-2024-34252 - https://github.com/wasm3/wasm3/issues/483
CVE-2024-34257 - https://github.com/ZackSecurity/VulnerReport/blob/cve/totolink/EX1800T/1.md
CVE-2024-34273 - https://github.com/chrisandoryan/vuln-advisory/blob/main/nJwt/CVE-2024-34273.md
CVE-2024-34308 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/totolink%20LR350/README.md
+CVE-2024-34332 - https://belong2yourself.github.io/vulnerabilities/docs/SANDRA/Elevation-of-Privileges/readme/
CVE-2024-34340 - https://github.com/Cacti/cacti/security/advisories/GHSA-37x7-mfjv-mm7m
CVE-2024-34345 - https://github.com/CycloneDX/cyclonedx-javascript-library/commit/5e5e1e0b9422f47d2de81c7c4064b803a01e7203
CVE-2024-34345 - https://github.com/CycloneDX/cyclonedx-javascript-library/pull/1063
@@ -97667,6 +97738,7 @@ CVE-2024-34532 - https://github.com/luvsn/OdZoo/tree/main/exploits/query_deluxe
CVE-2024-34533 - https://github.com/luvsn/OdZoo/tree/main/exploits/izi_data
CVE-2024-34534 - https://github.com/luvsn/OdZoo/tree/main/exploits/text_commander
CVE-2024-34582 - https://github.com/silent6trinity/CVE-2024-34582
+CVE-2024-34694 - https://github.com/lnbits/lnbits/security/advisories/GHSA-3j4h-h3fp-vwww
CVE-2024-3471 - https://wpscan.com/vulnerability/a3c282fb-81b8-48bf-8c18-8366ea8ad9af/
CVE-2024-34710 - https://github.com/requarks/wiki/security/advisories/GHSA-xjcj-p2qv-q3rf
CVE-2024-34714 - https://github.com/hoppscotch/hoppscotch-extension/security/advisories/GHSA-jjh5-pvqx-gg5v
@@ -97678,6 +97750,8 @@ CVE-2024-3476 - https://wpscan.com/vulnerability/46f74493-9082-48b2-90bc-2c1d1db
CVE-2024-3477 - https://wpscan.com/vulnerability/ca5e59e6-c500-4129-997b-391cdf9aa9c7/
CVE-2024-3478 - https://wpscan.com/vulnerability/09f1a696-86ee-47cc-99de-57cfd2a3219d/
CVE-2024-3481 - https://wpscan.com/vulnerability/0c441293-e7f9-4634-8f3a-09925cd2b696/
+CVE-2024-34833 - https://github.com/ShellUnease/payroll-management-system-rce
+CVE-2024-34833 - https://packetstormsecurity.com/files/179106/Payroll-Management-System-1.0-Remote-Code-Execution.html
CVE-2024-34852 - https://github.com/Yang-Nankai/Vulnerabilities/blob/main/DataCube3%20Shell%20Code%20Injection.md
CVE-2024-34854 - https://github.com/Yang-Nankai/Vulnerabilities/blob/main/DataCube3%20Shell%20Code%20Injection.md
CVE-2024-34899 - https://hackerdna.com/courses/cve/cve-2024-34899
@@ -97704,6 +97778,8 @@ CVE-2024-34957 - https://github.com/Gr-1m/cms/blob/main/1.md
CVE-2024-34958 - https://github.com/Gr-1m/cms/blob/main/2.md
CVE-2024-34974 - https://github.com/hunzi0/Vullnfo/tree/main/Tenda/AC18/formSetPPTPServer
CVE-2024-34987 - https://github.com/MarkLee131/PoCs/blob/main/CVE-2024-34987.md
+CVE-2024-34987 - https://www.exploit-db.com/exploits/51989
+CVE-2024-34989 - https://security.friendsofpresta.org/modules/2024/06/20/prestapdf.html
CVE-2024-34997 - https://github.com/joblib/joblib/issues/1582
CVE-2024-35009 - https://github.com/Thirtypenny77/cms/blob/main/5.md
CVE-2024-35010 - https://github.com/Thirtypenny77/cms/blob/main/6.md
@@ -97732,12 +97808,17 @@ CVE-2024-3521 - https://github.com/garboa/cve_3/blob/main/Upload2.md
CVE-2024-35222 - https://github.com/tauri-apps/tauri/security/advisories/GHSA-57fm-592m-34r7
CVE-2024-35231 - https://github.com/rack/rack-contrib/security/advisories/GHSA-8c8q-2xw3-j869
CVE-2024-35232 - https://github.com/huandu/facebook/security/advisories/GHSA-3f65-m234-9mxr
+CVE-2024-35235 - http://www.openwall.com/lists/oss-security/2024/06/11/1
+CVE-2024-35235 - https://github.com/OpenPrinting/cups/security/advisories/GHSA-vvwp-mv6j-hw6f
CVE-2024-35236 - https://github.com/advplyr/audiobookshelf/security/advisories/GHSA-7j99-76cj-q9pg
CVE-2024-3529 - https://vuldb.com/?id.259899
CVE-2024-35324 - https://github.com/w0x68y/cve-lists/blob/main/CMS/Douchat/Douchat%204.0.5%20arbitrary%20file%20upload%20vulnerability.md
+CVE-2024-35326 - https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35326.c
+CVE-2024-35328 - https://github.com/idhyt/pocs/blob/main/libyaml/CVE-2024-35328.c
CVE-2024-35333 - https://github.com/momo1239/CVE-2024-35333
CVE-2024-35361 - https://github.com/Hebing123/cve/issues/37
CVE-2024-35362 - https://github.com/shopex/ecshop/issues/6
+CVE-2024-3537 - https://vuldb.com/?id.259907
CVE-2024-35373 - https://chocapikk.com/posts/2024/mocodo-vulnerabilities/
CVE-2024-35374 - https://chocapikk.com/posts/2024/mocodo-vulnerabilities/
CVE-2024-35384 - https://github.com/cesanta/mjs/issues/287
@@ -97763,6 +97844,7 @@ CVE-2024-35475 - https://github.com/carsonchan12345/OpenKM-CSRF-PoC
CVE-2024-3548 - https://wpscan.com/vulnerability/9eef8b29-2c62-4daa-ae90-467ff9be18d8/
CVE-2024-35492 - https://github.com/zzh-newlearner/MQTT_Crash/blob/main/Mongoose_null_pointer.md
CVE-2024-35511 - https://github.com/efekaanakkar/CVE-2024-35511/blob/main/Men%20Salon%20Management%20System%20Using%20PHP%20and%20MySQL.md
+CVE-2024-3552 - https://wpscan.com/vulnerability/34b03ee4-de81-4fec-9f3d-e1bd5b94d136/
CVE-2024-35550 - https://github.com/bearman113/1.md/blob/main/17/csrf.md
CVE-2024-35551 - https://github.com/bearman113/1.md/blob/main/16/csrf.md
CVE-2024-35552 - https://github.com/bearman113/1.md/blob/main/20/csrf.md
@@ -97823,6 +97905,7 @@ CVE-2024-36548 - https://github.com/da271133/cms/blob/main/31/csrf.md
CVE-2024-36549 - https://github.com/da271133/cms/blob/main/30/csrf.md
CVE-2024-36550 - https://github.com/da271133/cms/blob/main/29/csrf.md
CVE-2024-3657 - https://bugzilla.redhat.com/show_bug.cgi?id=2274401
+CVE-2024-36598 - https://github.com/kaliankhe/CVE-Aslam-mahi/blob/9ec0572c68bfd3708a7d6e089181024131f4e927/vendors/projectworlds.in/AEGON%20LIFE%20v1.0%20Life%20Insurance%20Management%20System/CVE-2024-36598
CVE-2024-3660 - https://kb.cert.org/vuls/id/253266
CVE-2024-3660 - https://www.kb.cert.org/vuls/id/253266
CVE-2024-3661 - https://news.ycombinator.com/item?id=40279632
@@ -97835,6 +97918,9 @@ CVE-2024-36670 - https://github.com/sigubbs/cms/blob/main/33/csrf.md
CVE-2024-36673 - https://github.com/CveSecLook/cve/issues/39
CVE-2024-36674 - https://github.com/LyLme/lylme_spage/issues/91
CVE-2024-36675 - https://github.com/LyLme/lylme_spage/issues/92
+CVE-2024-36678 - https://security.friendsofpresta.org/modules/2024/06/18/pk_themesettings.html
+CVE-2024-36679 - https://security.friendsofpresta.org/modules/2024/06/18/livechatpro.html
+CVE-2024-36680 - https://security.friendsofpresta.org/modules/2024/06/18/pkfacebook.html
CVE-2024-36773 - https://github.com/OoLs5/VulDiscovery/blob/main/cve-2024-36773.md
CVE-2024-36774 - https://github.com/OoLs5/VulDiscovery/blob/main/poc.docx
CVE-2024-36775 - https://github.com/OoLs5/VulDiscovery/blob/main/monstra_xss.pdf
@@ -97842,6 +97928,10 @@ CVE-2024-36779 - https://github.com/CveSecLook/cve/issues/42
CVE-2024-36783 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/totolink%20LR350/NTPSyncWithHost/README.md
CVE-2024-36800 - https://github.com/want1997/SEMCMS_VUL/blob/main/Download_sql_vul.md
CVE-2024-36801 - https://github.com/want1997/SEMCMS_VUL/blob/main/Download_sql_vul_2.md
+CVE-2024-36821 - https://github.com/IvanGlinkin/CVE-2024-36821
+CVE-2024-36840 - https://infosec-db.github.io/CyberDepot/vuln_boelter_blue/
+CVE-2024-36840 - https://packetstormsecurity.com/files/178978/Boelter-Blue-System-Management-1.3-SQL-Injection.html
+CVE-2024-36840 - https://sploitus.com/exploit?id=PACKETSTORM:178978
CVE-2024-36843 - https://github.com/stephane/libmodbus/issues/748
CVE-2024-36844 - https://github.com/stephane/libmodbus/issues/749
CVE-2024-36845 - https://github.com/stephane/libmodbus/issues/750
@@ -97860,31 +97950,84 @@ CVE-2024-3720 - https://github.com/scausoft/cve/blob/main/sql.md
CVE-2024-3721 - https://github.com/netsecfish/tbk_dvr_command_injection
CVE-2024-3721 - https://vuldb.com/?id.260573
CVE-2024-37273 - https://github.com/HackAllSec/CVEs/tree/main/Jan%20Arbitrary%20File%20Upload%20vulnerability
+CVE-2024-37301 - https://github.com/adfinis/document-merge-service/security/advisories/GHSA-v5gf-r78h-55q6
+CVE-2024-37308 - https://github.com/XjSv/Cooked/security/advisories/GHSA-9vfv-c966-jwrv
CVE-2024-3735 - https://vuldb.com/?submit.311153
+CVE-2024-37393 - https://www.optistream.io/blogs/tech/securenvoy-cve-2024-37393
CVE-2024-37407 - https://github.com/libarchive/libarchive/pull/2145
CVE-2024-3745 - https://fluidattacks.com/advisories/gershwin/
CVE-2024-3748 - https://wpscan.com/vulnerability/01427cfb-5c51-4524-9b9d-e09a603bc34c/
CVE-2024-3749 - https://wpscan.com/vulnerability/d14bb16e-ce1d-4c31-8791-bc63174897c0/
CVE-2024-3752 - https://wpscan.com/vulnerability/e738540a-2006-4b92-8db1-2476374d35bd/
+CVE-2024-3754 - https://wpscan.com/vulnerability/8c6f3e3e-3047-4446-a190-750a60c29fa3/
CVE-2024-3755 - https://wpscan.com/vulnerability/d34caeaf-2ecf-44a2-b308-e940bafd402c/
CVE-2024-3756 - https://wpscan.com/vulnerability/b28d0dca-2df1-4925-be81-dd9c46859c38/
+CVE-2024-37568 - https://github.com/lepture/authlib/issues/654
CVE-2024-37569 - https://www.youtube.com/watch?v=I9TQqfP5qzM
+CVE-2024-37619 - https://github.com/Hebing123/cve/issues/45
+CVE-2024-37620 - https://github.com/Hebing123/cve/issues/46
+CVE-2024-37622 - https://github.com/rainrocka/xinhu/issues/4
+CVE-2024-37623 - https://github.com/rainrocka/xinhu/issues/5
+CVE-2024-37624 - https://github.com/rainrocka/xinhu/issues/6
+CVE-2024-37625 - https://github.com/zhimengzhe/iBarn/issues/20
+CVE-2024-37629 - https://github.com/summernote/summernote/issues/4642
+CVE-2024-37632 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/loginAuth/README.md
+CVE-2024-37633 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/setWiFiGuestCfg/README.md
+CVE-2024-37634 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/setWiFiEasyCfg/README.md
+CVE-2024-37637 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/setWizardCfg/README.md
+CVE-2024-37642 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TRENDnet/TEW-814DAP/formSystemCheck/README.md
+CVE-2024-37643 - https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TRENDnet/TEW-814DAP/formPasswordAuth/README.md
CVE-2024-3765 - https://github.com/netsecfish/xiongmai_incorrect_access_control
CVE-2024-3765 - https://github.com/netsecfish/xiongmai_incorrect_access_control/blob/main/pocCheck3-en.py
+CVE-2024-37661 - https://github.com/ouuan/router-vuln-report/blob/master/icmp-redirect/tl-7dr5130-redirect.md
+CVE-2024-37662 - https://github.com/ouuan/router-vuln-report/blob/master/nat-rst/tl-7dr5130-nat-rst.md
CVE-2024-3767 - https://github.com/BurakSevben/CVEs/blob/main/News%20Portal/News%20Portal%20-%20SQL%20Injection%20-%203.md
+CVE-2024-37671 - https://github.com/MohamedAzizMSALLEMI/Docubase_Security/blob/main/CVE-2024-37671.md
+CVE-2024-37672 - https://github.com/MohamedAzizMSALLEMI/Docubase_Security/blob/main/CVE-2024-37672.md
+CVE-2024-37673 - https://github.com/MohamedAzizMSALLEMI/Docubase_Security/blob/main/CVE-2024-37673.md
+CVE-2024-37674 - https://github.com/MohamedAzizMSALLEMI/Moodle_Security/blob/main/CVE-2024-37674.md
+CVE-2024-37675 - https://github.com/MohamedAzizMSALLEMI/Docubase_Security/blob/main/CVE-2024-37675.md
CVE-2024-3768 - https://github.com/BurakSevben/CVEs/blob/main/News%20Portal/News%20Portal%20-%20SQL%20Injection%20-%204.md
+CVE-2024-3768 - https://vuldb.com/?id.260615
CVE-2024-3769 - https://github.com/BurakSevben/CVEs/blob/main/Student%20Record%20System%203.20/Student%20Record%20System%20-%20Authentication%20Bypass.md
CVE-2024-3770 - https://github.com/BurakSevben/CVEs/blob/main/Student%20Record%20System%203.20/Student%20Record%20System%20-%20SQL%20Injection%20-%203.md
CVE-2024-3771 - https://github.com/BurakSevben/CVEs/blob/main/Student%20Record%20System%203.20/Student%20Record%20System%20-%20SQL%20Injection%20-%204.md
+CVE-2024-37791 - https://github.com/duxphp/DuxCMS3/issues/5
+CVE-2024-37799 - https://github.com/himanshubindra/CVEs/blob/main/CVE-2024-37799
+CVE-2024-37803 - https://github.com/himanshubindra/CVEs/blob/main/CVE-2024-37803
+CVE-2024-37840 - https://github.com/ganzhi-qcy/cve/issues/4
+CVE-2024-37848 - https://github.com/Lanxiy7th/lx_CVE_report-/issues/13
+CVE-2024-37849 - https://github.com/ganzhi-qcy/cve/issues/3
+CVE-2024-37877 - https://github.com/f4rs1ght/vuln-research/tree/main/CVE-2024-37877
CVE-2024-37880 - https://github.com/antoonpurnal/clangover
CVE-2024-37880 - https://pqshield.com/pqshield-plugs-timing-leaks-in-kyber-ml-kem-to-improve-pqc-implementation-maturity/
+CVE-2024-37889 - https://github.com/TreyWW/MyFinances/security/advisories/GHSA-4884-3gvp-3wj2
+CVE-2024-37890 - https://github.com/websockets/ws/security/advisories/GHSA-3h5v-q93c-6h6q
+CVE-2024-37896 - https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-gf3r-h744-mqgp
+CVE-2024-37904 - https://github.com/stacklok/minder/security/advisories/GHSA-hpcg-xjq5-g666
CVE-2024-3797 - https://github.com/BurakSevben/CVEs/blob/main/QR%20Code%20Bookmark%20System/QR%20Code%20Bookmark%20System%20-%20SQL%20Injection.md
CVE-2024-3822 - https://wpscan.com/vulnerability/ff5411b1-9e04-4e72-a502-e431d774642a/
CVE-2024-3823 - https://wpscan.com/vulnerability/a138215c-4b8c-4182-978f-d21ce25070d3/
CVE-2024-3824 - https://wpscan.com/vulnerability/749ae334-b1d1-421e-a04c-35464c961a4a/
+CVE-2024-38347 - https://github.com/SandeepRajauriya/CVEs/blob/main/CVE-2024-38347
+CVE-2024-38348 - https://github.com/SandeepRajauriya/CVEs/blob/main/CVE-2024-38348
+CVE-2024-38358 - https://github.com/wasmerio/wasmer/security/advisories/GHSA-55f3-3qvg-8pv5
CVE-2024-3837 - https://issues.chromium.org/issues/41491379
+CVE-2024-38394 - https://gitlab.gnome.org/GNOME/gnome-settings-daemon/-/issues/780
+CVE-2024-38394 - https://gitlab.gnome.org/GNOME/gnome-settings-daemon/-/issues/780#note_2047914
+CVE-2024-38394 - https://pulsesecurity.co.nz/advisories/usbguard-bypass
+CVE-2024-38395 - http://www.openwall.com/lists/oss-security/2024/06/17/1
+CVE-2024-38396 - http://www.openwall.com/lists/oss-security/2024/06/17/1
+CVE-2024-38396 - https://vin01.github.io/piptagole/escape-sequences/iterm2/rce/2024/06/16/iterm2-rce-window-title-tmux-integration.html
+CVE-2024-3840 - https://issues.chromium.org/issues/41493458
+CVE-2024-38427 - https://github.com/InternationalColorConsortium/DemoIccMAX/pull/66
+CVE-2024-38427 - https://github.com/InternationalColorConsortium/DemoIccMAX/pull/66/commits/85ce74ef19fb0751c7e188b06daed22fe74c332c
CVE-2024-3844 - https://issues.chromium.org/issues/40058873
+CVE-2024-38449 - https://kasmweb.atlassian.net/servicedesk/customer/portal/3/topic/30ffee7f-4b85-4783-b118-6ae4fd8b0c52
CVE-2024-3846 - https://issues.chromium.org/issues/40064754
+CVE-2024-38460 - https://sonarsource.atlassian.net/browse/SONAR-21559
+CVE-2024-38469 - https://github.com/zhimengzhe/iBarn/issues/20
+CVE-2024-38470 - https://github.com/zhimengzhe/iBarn/issues/20
CVE-2024-3873 - https://vuldb.com/?submit.312623
CVE-2024-3874 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W20E/formSetRemoteWebManage.md
CVE-2024-3875 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/F/F1202/fromNatlimit.md
@@ -97895,6 +98038,7 @@ CVE-2024-3879 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W3
CVE-2024-3880 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/formWriteFacMac.md
CVE-2024-3881 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/frmL7ProtForm.md
CVE-2024-3882 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W30E/fromRouteStatic.md
+CVE-2024-3882 - https://vuldb.com/?id.260916
CVE-2024-3903 - https://wpscan.com/vulnerability/0a0e7bd4-948d-47c9-9219-380bda9f3034/
CVE-2024-3905 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/R7WebsSecurityHandler.md
CVE-2024-3906 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formQuickIndex.md
@@ -97914,8 +98058,17 @@ CVE-2024-3939 - https://wpscan.com/vulnerability/80a9eb3a-2cb1-4844-9004-ba2554b
CVE-2024-3940 - https://wpscan.com/vulnerability/bb0245e5-8e94-4f11-9003-d6208945056c/
CVE-2024-3941 - https://wpscan.com/vulnerability/6e09e922-983c-4406-8053-747d839995d1/
CVE-2024-3948 - https://github.com/xuanluansec/vul/issues/5
+CVE-2024-3965 - https://wpscan.com/vulnerability/0e1ba2b3-5849-42f6-b503-8b3b520e4a79/
+CVE-2024-3966 - https://wpscan.com/vulnerability/9f0a575f-862d-4f2e-8d25-82c6f58dd11a/
+CVE-2024-3971 - https://wpscan.com/vulnerability/5dec5719-105d-4989-a97f-bda04d223322/
+CVE-2024-3972 - https://wpscan.com/vulnerability/55dfb9b5-d590-478b-bd1f-d420b79037fa/
+CVE-2024-3977 - https://wpscan.com/vulnerability/25851386-eccf-49cb-afbf-c25286c9b19e/
+CVE-2024-3978 - https://wpscan.com/vulnerability/a9f47d11-47ac-4998-a82a-dc2f3b0decdf/
CVE-2024-3979 - https://github.com/COVESA/vsomeip/files/14904610/details.zip
CVE-2024-3979 - https://github.com/COVESA/vsomeip/issues/663
+CVE-2024-3992 - https://wpscan.com/vulnerability/e9fe3101-8033-4eee-8b37-06856872e9ef/
+CVE-2024-3993 - https://wpscan.com/vulnerability/19cd60dd-8599-4af3-99db-c42de504606c/
+CVE-2024-4005 - https://wpscan.com/vulnerability/02ca09f8-4080-4969-992d-0e6afb29bc62/
CVE-2024-4019 - https://github.com/scausoft/cve/blob/main/rce.md
CVE-2024-4040 - https://www.bleepingcomputer.com/news/security/crushftp-warns-users-to-patch-exploited-zero-day-immediately/
CVE-2024-4040 - https://www.rapid7.com/blog/post/2024/04/23/etr-unauthenticated-crushftp-zero-day-enables-complete-server-compromise/
@@ -97927,6 +98080,7 @@ CVE-2024-4066 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC
CVE-2024-4067 - https://github.com/micromatch/micromatch/issues/243
CVE-2024-4068 - https://github.com/micromatch/braces/issues/35
CVE-2024-4068 - https://github.com/micromatch/braces/pull/37
+CVE-2024-4094 - https://wpscan.com/vulnerability/04b2feba-e009-4fce-8539-5dfdb4300433/
CVE-2024-4111 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/SetLEDCfg.md
CVE-2024-4112 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/formSetVirtualSer.md
CVE-2024-4113 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/fromSetSysTime.md
@@ -97946,6 +98100,8 @@ CVE-2024-4125 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W1
CVE-2024-4126 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/formSetSysTime.md
CVE-2024-4127 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W15Ev1.0/guestWifiRuleRefresh.md
CVE-2024-4140 - https://github.com/rjbs/Email-MIME/issues/66
+CVE-2024-4145 - https://wpscan.com/vulnerability/7d5b8764-c82d-4969-a707-f38b63bcadca/
+CVE-2024-4149 - https://wpscan.com/vulnerability/0256ec2a-f1a9-4110-9978-ee88f9e24237/
CVE-2024-4164 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/G3V15/formModifyPppAuthWhiteMac.md
CVE-2024-4165 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/G3V15/modifyDhcpRule.md
CVE-2024-4166 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/G3/4G300/sub_41E858_GO.md
@@ -97974,19 +98130,30 @@ CVE-2024-4250 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/
CVE-2024-4251 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/fromDhcpSetSer.md
CVE-2024-4252 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i22/formSetUrlFilterRule.md
CVE-2024-4257 - https://github.com/GAO-UNO/cve/blob/main/sql.md
+CVE-2024-4270 - https://wpscan.com/vulnerability/7a3b89cc-7a81-448a-94fc-36a7033609d5/
+CVE-2024-4271 - https://wpscan.com/vulnerability/c1fe0bc7-a340-428e-a549-1e37291bea1c/
CVE-2024-4289 - https://wpscan.com/vulnerability/072785de-0ce5-42a4-a3fd-4eb1d1a2f1be/
CVE-2024-4290 - https://wpscan.com/vulnerability/a9a10d0f-d8f2-4f3e-92bf-94fc08416d87/
CVE-2024-4291 - https://github.com/L1ziang/Vulnerability/blob/main/formAddMacfilterRule.md
CVE-2024-4293 - https://github.com/Sospiro014/zday1/blob/main/doctor_appointment_management_system_xss.md
CVE-2024-4294 - https://github.com/Sospiro014/zday1/blob/main/doctor_appointment_management_system_idor.md
+CVE-2024-4305 - https://wpscan.com/vulnerability/635be98d-4c17-4e75-871f-9794d85a2eb1/
CVE-2024-4340 - https://github.com/advisories/GHSA-2m57-hf25-phgg
CVE-2024-4340 - https://research.jfrog.com/vulnerabilities/sqlparse-stack-exhaustion-dos-jfsa-2024-001031292/
CVE-2024-4348 - https://vuldb.com/?submit.320855
CVE-2024-4349 - https://github.com/CveSecLook/cve/issues/19
CVE-2024-4372 - https://wpscan.com/vulnerability/13dcfd8a-e378-44b4-af6f-940bc41539a4/
+CVE-2024-4377 - https://wpscan.com/vulnerability/778cebec-bdbb-4538-9518-c5bd50f76961/
+CVE-2024-4381 - https://wpscan.com/vulnerability/9b3cda9a-17a7-4173-93a2-d552a874fae9/
+CVE-2024-4382 - https://wpscan.com/vulnerability/1a67aeab-8145-4c8a-9c18-e6436fa39b63/
+CVE-2024-4384 - https://wpscan.com/vulnerability/ad714196-2590-4dc9-b5b9-50808e9e0d26/
CVE-2024-4388 - https://wpscan.com/vulnerability/5c791747-f60a-40a7-94fd-e4b9bb5ea2b0/
CVE-2024-4399 - https://wpscan.com/vulnerability/0690327e-da60-4d71-8b3c-ac9533d82302/
CVE-2024-4469 - https://wpscan.com/vulnerability/d6b1270b-52c0-471d-a5fb-507e21b46310/
+CVE-2024-4474 - https://wpscan.com/vulnerability/71954c60-6a5b-4cac-9920-6d9b787ead9c/
+CVE-2024-4475 - https://wpscan.com/vulnerability/f0c7fa00-da6e-4f07-875f-7b85759a54b3/
+CVE-2024-4477 - https://wpscan.com/vulnerability/ab551552-944c-4e2a-9355-7011cbe553b0/
+CVE-2024-4480 - https://wpscan.com/vulnerability/c1e5dee9-c540-4cc1-8b94-c6d1650b52d3/
CVE-2024-4491 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formGetDiagnoseInfo.md
CVE-2024-4492 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formOfflineSet.md
CVE-2024-4493 - https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formSetAutoPing.md
@@ -98010,7 +98177,9 @@ CVE-2024-4542 - https://wpscan.com/vulnerability/9eef8b29-2c62-4daa-ae90-467ff9b
CVE-2024-4547 - https://www.tenable.com/security/research/tra-2024-13
CVE-2024-4548 - https://www.tenable.com/security/research/tra-2024-13
CVE-2024-4549 - https://www.tenable.com/security/research/tra-2024-13
+CVE-2024-4565 - https://wpscan.com/vulnerability/430224c4-d6e3-4ca8-b1bc-b2229a9bcf12/
CVE-2024-4577 - https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/
+CVE-2024-4577 - https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately
CVE-2024-4577 - https://github.com/11whoami99/CVE-2024-4577
CVE-2024-4577 - https://github.com/watchtowrlabs/CVE-2024-4577
CVE-2024-4577 - https://github.com/xcanwin/CVE-2024-4577-PHP-RCE
@@ -98025,6 +98194,7 @@ CVE-2024-4591 - https://github.com/Hckwzh/cms/blob/main/22.md
CVE-2024-4592 - https://github.com/Hckwzh/cms/blob/main/23.md
CVE-2024-4593 - https://github.com/Hckwzh/cms/blob/main/24.md
CVE-2024-4594 - https://github.com/Hckwzh/cms/blob/main/25.md
+CVE-2024-4616 - https://wpscan.com/vulnerability/d203bf3b-aee9-4755-b429-d6bbdd940890/
CVE-2024-4620 - https://wpscan.com/vulnerability/dc34dc2d-d5a1-4e28-8507-33f659ead647/
CVE-2024-4621 - https://wpscan.com/vulnerability/33a366d9-6c81-4957-a101-768487aae735/
CVE-2024-4644 - https://github.com/yylmm/CVE/blob/main/Prison%20Management%20System/xss3.md
@@ -98048,6 +98218,8 @@ CVE-2024-4737 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management
CVE-2024-4738 - https://github.com/yylmm/CVE/blob/main/Legal%20Case%20Management%20System/xss_admin_appointment.md
CVE-2024-4749 - https://wpscan.com/vulnerability/6cc05a33-6592-4d35-8e66-9b6a9884df7e/
CVE-2024-4750 - https://wpscan.com/vulnerability/ffbe4034-842b-43b0-97d1-208811376dea/
+CVE-2024-4751 - https://wpscan.com/vulnerability/94f4cc45-4c55-43d4-8ad2-a20c118b589f/
+CVE-2024-4755 - https://wpscan.com/vulnerability/adc6ea6d-29d8-4ad0-b0db-2540e8b3f9a9/
CVE-2024-4756 - https://wpscan.com/vulnerability/ce4688b6-6713-43b5-aa63-8a3b036bd332/
CVE-2024-4792 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_action.md
CVE-2024-4793 - https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_laundry.md
@@ -98085,6 +98257,7 @@ CVE-2024-4919 - https://github.com/yylmm/CVE/blob/main/Online%20Examination%20Sy
CVE-2024-4920 - https://github.com/CveSecLook/cve/issues/27
CVE-2024-4921 - https://github.com/I-Schnee-I/cev/blob/main/upload.md
CVE-2024-4923 - https://github.com/polaris0x1/CVE/issues/1
+CVE-2024-4924 - https://wpscan.com/vulnerability/1867505f-d112-4919-9fd5-01745aa0433e/
CVE-2024-4925 - https://github.com/Hefei-Coffee/cve/blob/main/sql6.md
CVE-2024-4926 - https://github.com/Hefei-Coffee/cve/blob/main/sql7.md
CVE-2024-4927 - https://github.com/Hefei-Coffee/cve/blob/main/upload2.md
@@ -98095,6 +98268,8 @@ CVE-2024-4966 - https://github.com/CveSecLook/cve/issues/30
CVE-2024-4967 - https://github.com/BurakSevben/CVEs/blob/main/Interactive%20Map%20App/Interactive%20Map%20App%20-%20SQL%20Injection.md
CVE-2024-4968 - https://github.com/BurakSevben/CVEs/blob/main/Interactive%20Map%20App/Interactive%20Map%20App%20-%20Cross-Site-Scripting.md
CVE-2024-4968 - https://vuldb.com/?id.264536
+CVE-2024-4969 - https://wpscan.com/vulnerability/1a7ec5dc-eda4-4fed-9df9-f41d2b937fed/
+CVE-2024-4970 - https://wpscan.com/vulnerability/4a9fc352-7ec2-4992-9cda-7bdca4f42788/
CVE-2024-4972 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20SQL%20Injection%20-%201.md
CVE-2024-4973 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20SQL%20Injection%20-%202.md
CVE-2024-4974 - https://github.com/BurakSevben/CVEs/blob/main/Simple%20Chat%20App/Simple%20Chat%20App%20-%20Cross-Site-Scripting-1.md
@@ -98118,6 +98293,7 @@ CVE-2024-5098 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20S
CVE-2024-5099 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20Simple%20Inventory%20System%20Sql%20Inject-2.md
CVE-2024-5100 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20Simple%20Inventory%20System%20Sql%20Inject-3.md
CVE-2024-5101 - https://github.com/rockersiyuan/CVE/blob/main/SourceCodester%20Simple%20Inventory%20System%20Sql%20Inject-4.md
+CVE-2024-5102 - https://support.norton.com/sp/static/external/tools/security-advisories.html
CVE-2024-5116 - https://github.com/polaris0x1/CVE/issues/3
CVE-2024-5117 - https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%201.md
CVE-2024-5118 - https://github.com/BurakSevben/CVEs/blob/main/Event%20Registration%20System/Event%20Registration%20System%20-%20SQL%20Injection%20-%201.md
@@ -98134,6 +98310,8 @@ CVE-2024-5138 - https://bugs.launchpad.net/snapd/+bug/2065077
CVE-2024-5145 - https://github.com/CveSecLook/cve/issues/38
CVE-2024-5145 - https://github.com/CveSecLook/cve/issues/38CVE-2005-1275
CVE-2024-5145 - https://github.com/CveSecLook/cve/issues/38CVE-2020-7009
+CVE-2024-5155 - https://wpscan.com/vulnerability/f1e90a8a-d959-4316-a5d4-e183854944bd/
+CVE-2024-5172 - https://wpscan.com/vulnerability/65d84e69-0548-4c7d-bcde-5777d72da555/
CVE-2024-5310 - https://gitee.com/heyewei/JFinalcms/issues/I8VHM2
CVE-2024-5350 - https://github.com/anji-plus/report/files/15363269/aj-report.pdf
CVE-2024-5351 - https://github.com/anji-plus/report/files/15363269/aj-report.pdf
@@ -98159,19 +98337,28 @@ CVE-2024-5394 - https://github.com/Lanxiy7th/lx_CVE_report-/issues/7
CVE-2024-5395 - https://github.com/Lanxiy7th/lx_CVE_report-/issues/8
CVE-2024-5396 - https://github.com/Lanxiy7th/lx_CVE_report-/issues/9
CVE-2024-5397 - https://github.com/Lanxiy7th/lx_CVE_report-/issues/10
+CVE-2024-5410 - http://seclists.org/fulldisclosure/2024/May/36
CVE-2024-5410 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-oring-iap420/
+CVE-2024-5411 - http://seclists.org/fulldisclosure/2024/May/36
CVE-2024-5411 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-oring-iap420/
+CVE-2024-5420 - http://seclists.org/fulldisclosure/2024/Jun/4
CVE-2024-5420 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-oring-iap420/index.html
+CVE-2024-5421 - http://seclists.org/fulldisclosure/2024/Jun/4
CVE-2024-5421 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-seh-untserver-pro/index.html
+CVE-2024-5422 - http://seclists.org/fulldisclosure/2024/Jun/4
CVE-2024-5422 - https://cyberdanube.com/en/en-multiple-vulnerabilities-in-seh-untserver-pro/index.html
CVE-2024-5428 - https://github.com/kaikai145154/CVE-CSRF/blob/main/SourceCodester%20Simple%20Online%20Bidding%20System%20CSRF.md
CVE-2024-5437 - https://github.com/pijiawei/CVE/blob/pijiawei-photo/SourceCodester%20Simple%20Online%20Bidding%20System%20XSS.md
+CVE-2024-5447 - https://wpscan.com/vulnerability/a692b869-1666-42d1-b56d-dfcccd68ab67/
+CVE-2024-5448 - https://wpscan.com/vulnerability/c482fe19-b643-41ea-8194-22776b388290/
CVE-2024-5458 - https://github.com/php/php-src/security/advisories/GHSA-w8qr-v226-r27w
+CVE-2024-5475 - https://wpscan.com/vulnerability/cee66543-b5d6-4205-8f9b-0febd7fee445/
CVE-2024-5515 - https://github.com/HaojianWang/cve/issues/1
CVE-2024-5516 - https://github.com/ppp-src/ha/issues/3
CVE-2024-5517 - https://github.com/ppp-src/ha/issues/4
CVE-2024-5518 - https://github.com/L1OudFd8cl09/CVE/issues/1
CVE-2024-5519 - https://github.com/L1OudFd8cl09/CVE/issues/2
+CVE-2024-5522 - https://wpscan.com/vulnerability/bc76ef95-a2a9-4185-8ed9-1059097a506a/
CVE-2024-5565 - https://research.jfrog.com/vulnerabilities/vanna-prompt-injection-rce-jfsa-2024-001034449/
CVE-2024-5585 - https://github.com/php/php-src/security/advisories/GHSA-9fcc-425m-g385
CVE-2024-5588 - https://github.com/Lanxiy7th/lx_CVE_report-/issues/12
@@ -98179,13 +98366,48 @@ CVE-2024-5590 - https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-uploadisc
CVE-2024-5635 - https://github.com/L1OudFd8cl09/CVE/blob/main/03_06_2024_a.md
CVE-2024-5636 - https://github.com/L1OudFd8cl09/CVE/blob/main/03_06_2024_b.md
CVE-2024-5656 - https://wpscan.com/vulnerability/adc6ea6d-29d8-4ad0-b0db-2540e8b3f9a9/
+CVE-2024-5657 - http://www.openwall.com/lists/oss-security/2024/06/06/1
CVE-2024-5657 - https://github.com/sbaresearch/advisories/tree/public/2024/SBA-ADV-20240202-01_CraftCMS_Plugin_Two-Factor_Authentication_Password_Hash_Disclosure
+CVE-2024-5658 - http://www.openwall.com/lists/oss-security/2024/06/06/2
CVE-2024-5658 - https://github.com/sbaresearch/advisories/tree/public/2024/SBA-ADV-20240202-02_CraftCMS_Plugin_Two-Factor_Authentication_TOTP_Valid_After_Use
+CVE-2024-5676 - https://github.com/sbaresearch/advisories/tree/public/2024/SBA-ADV-20240321-01_Paradox_Cross_Site_Request_Forgery
CVE-2024-5733 - https://github.com/kingshao0312/cve/issues/1
CVE-2024-5734 - https://github.com/kingshao0312/cve/issues/2
CVE-2024-5745 - https://github.com/L1OudFd8cl09/CVE/blob/main/07_06_2024_a.md
CVE-2024-5758 - https://research.cleantalk.org/cve-2024-4305/
CVE-2024-5758 - https://wpscan.com/vulnerability/635be98d-4c17-4e75-871f-9794d85a2eb1/
+CVE-2024-5772 - https://github.com/charliecatsec/cve1/blob/main/NS-ASG-sql-deleteiscuser.md
CVE-2024-5773 - https://github.com/L1OudFd8cl09/CVE/issues/3
CVE-2024-5774 - https://github.com/CveSecLook/cve/issues/43
CVE-2024-5775 - https://github.com/CveSecLook/cve/issues/44
+CVE-2024-5851 - https://vuldb.com/?submit.347385
+CVE-2024-5894 - https://github.com/Hefei-Coffee/cve/blob/main/sql10.md
+CVE-2024-5895 - https://github.com/Hefei-Coffee/cve/blob/main/sql11.md
+CVE-2024-5896 - https://github.com/Hefei-Coffee/cve/blob/main/sql12.md
+CVE-2024-5898 - https://github.com/guiyxli/cve/issues/1
+CVE-2024-5981 - https://github.com/LiuYongXiang-git/cve/issues/1
+CVE-2024-5983 - https://github.com/LiuYongXiang-git/cve/issues/2
+CVE-2024-5984 - https://github.com/LiuYongXiang-git/cve/issues/3
+CVE-2024-5985 - https://github.com/CveSecLook/cve/issues/45
+CVE-2024-6006 - https://vuldb.com/?submit.351403
+CVE-2024-6007 - https://github.com/SecureF1sh/findings/blob/main/ns_sqli.md
+CVE-2024-6009 - https://github.com/AutoZhou1/cve/issues/1
+CVE-2024-6013 - https://github.com/gabriel202212/cve/issues/1
+CVE-2024-6015 - https://github.com/chenwulin-bit/cve/issues/1
+CVE-2024-6016 - https://github.com/chenwulin-bit/cve/issues/2
+CVE-2024-6041 - https://github.com/ssiicckk/cve/issues/1
+CVE-2024-6042 - https://github.com/Cormac315/cve/issues/1
+CVE-2024-6043 - https://github.com/yezzzo/y3/blob/main/SourceCodester%20Best%20house%20rental%20management%20system%20project%20in%20php%201.0%20SQL%20Injection.md
+CVE-2024-6061 - https://github.com/gpac/gpac/issues/2871
+CVE-2024-6084 - https://github.com/Laster-dev/CVE/issues/2
+CVE-2024-6111 - https://github.com/wangyuan-ui/CVE/issues/1
+CVE-2024-6113 - https://github.com/wangyuan-ui/CVE/issues/3
+CVE-2024-6114 - https://github.com/wangyuan-ui/CVE/issues/4
+CVE-2024-6184 - https://github.com/L1OudFd8cl09/CVE/blob/main/11_06_2024_a.md
+CVE-2024-6187 - https://github.com/L1OudFd8cl09/CVE/blob/main/11_06_2024_d.md
+CVE-2024-6188 - https://kiwiyumi.com/post/tracksys-export-source-code/
+CVE-2024-6190 - https://github.com/HryspaHodor/CVE/issues/2
+CVE-2024-6191 - https://github.com/HryspaHodor/CVE/issues/3
+CVE-2024-6192 - https://github.com/HryspaHodor/CVE/issues/4
+CVE-2024-6194 - https://github.com/HryspaHodor/CVE/issues/6
+CVE-2024-6218 - https://github.com/HryspaHodor/CVE/issues/7