mirror of
https://github.com/0xMarcio/cve.git
synced 2026-02-12 18:42:46 +00:00
Update CVE sources 2024-06-07 17:53
This commit is contained in:
84
github.txt
84
github.txt
@@ -107,6 +107,7 @@ CVE-1999-0898 - https://github.com/clearbluejar/cve-markdown-charts
|
||||
CVE-1999-0899 - https://github.com/clearbluejar/cve-markdown-charts
|
||||
CVE-1999-1010 - https://github.com/phx/cvescan
|
||||
CVE-1999-1057 - https://github.com/joscanoga/Reto-python-CRM
|
||||
CVE-1999-1060 - https://github.com/cmilanf/docker-tetrinetx
|
||||
CVE-1999-1115 - https://github.com/joscanoga/Reto-python-CRM
|
||||
CVE-1999-1122 - https://github.com/joscanoga/Reto-python-CRM
|
||||
CVE-1999-1197 - https://github.com/joscanoga/Reto-python-CRM
|
||||
@@ -6940,6 +6941,7 @@ CVE-2011-2523 - https://github.com/slxwzk/slxwzkBotnet
|
||||
CVE-2011-2523 - https://github.com/sponkmonk/Ladon_english_update
|
||||
CVE-2011-2523 - https://github.com/sunzu94/vsftpd_2.3.4_Exploit
|
||||
CVE-2011-2523 - https://github.com/tarikemal/exploit-ftp-samba
|
||||
CVE-2011-2523 - https://github.com/thanawut2903/Port-21-tcp-vsftpd-2.3.4-exploit
|
||||
CVE-2011-2523 - https://github.com/vaishnavucv/CVE-2011-2523
|
||||
CVE-2011-2523 - https://github.com/vasanth-tamil/ctf-writeups
|
||||
CVE-2011-2523 - https://github.com/vmmaltsev/13.1
|
||||
@@ -8200,6 +8202,7 @@ CVE-2012-1734 - https://github.com/Live-Hack-CVE/CVE-2012-1734
|
||||
CVE-2012-1756 - https://github.com/Live-Hack-CVE/CVE-2012-1756
|
||||
CVE-2012-1757 - https://github.com/Live-Hack-CVE/CVE-2012-1757
|
||||
CVE-2012-1823 - https://github.com/0xl0k1/CVE-2012-1823
|
||||
CVE-2012-1823 - https://github.com/0xsyr0/OSCP
|
||||
CVE-2012-1823 - https://github.com/1060275195/Covid-v2-Botnet
|
||||
CVE-2012-1823 - https://github.com/404tk/lazyscan
|
||||
CVE-2012-1823 - https://github.com/ARPSyndicate/cvemon
|
||||
@@ -8254,6 +8257,7 @@ CVE-2012-1856 - https://github.com/houjingyi233/office-exploit-case-study
|
||||
CVE-2012-1856 - https://github.com/qiantu88/office-cve
|
||||
CVE-2012-1876 - https://github.com/ExploitCN/CVE-2012-1876-win7_x86_and_win7x64
|
||||
CVE-2012-1876 - https://github.com/WizardVan/CVE-2012-1876
|
||||
CVE-2012-1876 - https://github.com/ernestang98/win-exploits
|
||||
CVE-2012-1876 - https://github.com/migraine-sudo/Arsenal
|
||||
CVE-2012-1876 - https://github.com/ricew4ng/BrowserSecurity
|
||||
CVE-2012-1876 - https://github.com/ser4wang/BrowserSecurity
|
||||
@@ -10385,6 +10389,7 @@ CVE-2013-3900 - https://github.com/The-Education-and-Skills-Partnership/WinVerif
|
||||
CVE-2013-3900 - https://github.com/ellikt1/Vulnerability-Assessment
|
||||
CVE-2013-3900 - https://github.com/florylsk/SignatureGate
|
||||
CVE-2013-3900 - https://github.com/hiba-ahmad1/NessusVulnManagement
|
||||
CVE-2013-3900 - https://github.com/hibahmad30/NessusVulnManagement
|
||||
CVE-2013-3900 - https://github.com/izj007/wechat
|
||||
CVE-2013-3900 - https://github.com/jason-klein/signed-nsis-exe-append-payload
|
||||
CVE-2013-3900 - https://github.com/lau1010/Packer_VMware_Win19_UEFI_secure_boot_with_Updates
|
||||
@@ -11144,6 +11149,7 @@ CVE-2014-0118 - https://github.com/smabramov/Vulnerabilities-and-attacks-on-info
|
||||
CVE-2014-0118 - https://github.com/zzzWTF/db-13-01
|
||||
CVE-2014-0130 - https://github.com/Ostorlab/KEV
|
||||
CVE-2014-0130 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
||||
CVE-2014-0130 - https://github.com/bibin-paul-trustme/ruby_repo
|
||||
CVE-2014-0130 - https://github.com/jasnow/585-652-ruby-advisory-db
|
||||
CVE-2014-0130 - https://github.com/omarkurt/cve-2014-0130
|
||||
CVE-2014-0130 - https://github.com/rubysec/ruby-advisory-db
|
||||
@@ -11158,6 +11164,7 @@ CVE-2014-0141 - https://github.com/auditt7708/rhsecapi
|
||||
CVE-2014-0144 - https://github.com/Live-Hack-CVE/CVE-2014-0144
|
||||
CVE-2014-0147 - https://github.com/Live-Hack-CVE/CVE-2014-0147
|
||||
CVE-2014-0148 - https://github.com/Live-Hack-CVE/CVE-2014-0148
|
||||
CVE-2014-0160 - https://github.com/00xNetrunner/Shodan_Cheet-Sheet
|
||||
CVE-2014-0160 - https://github.com/0day404/vulnerability-poc
|
||||
CVE-2014-0160 - https://github.com/0x0d3ad/Kn0ck
|
||||
CVE-2014-0160 - https://github.com/0x90/CVE-2014-0160
|
||||
@@ -11813,6 +11820,7 @@ CVE-2014-0221 - https://github.com/chnzzh/OpenSSL-CVE-lib
|
||||
CVE-2014-0221 - https://github.com/hrbrmstr/internetdb
|
||||
CVE-2014-0221 - https://github.com/jumanjihouse/oval
|
||||
CVE-2014-0221 - https://github.com/jumanjihouse/wormhole
|
||||
CVE-2014-0224 - https://github.com/00xNetrunner/Shodan_Cheet-Sheet
|
||||
CVE-2014-0224 - https://github.com/0nopnop/qualysparser
|
||||
CVE-2014-0224 - https://github.com/1N3/MassBleed
|
||||
CVE-2014-0224 - https://github.com/84KaliPleXon3/a2sv
|
||||
@@ -12070,6 +12078,7 @@ CVE-2014-1203 - https://github.com/ARPSyndicate/kenzer-templates
|
||||
CVE-2014-1234 - https://github.com/Haifisch/dayswithoutansslexploit
|
||||
CVE-2014-1234 - https://github.com/fhightower/ioc-finder
|
||||
CVE-2014-1234 - https://github.com/guilhermeG23/manual_suricata_simples
|
||||
CVE-2014-1234 - https://github.com/xssec/xshodan
|
||||
CVE-2014-12345 - https://github.com/lauravoicu/Vulnerabilities
|
||||
CVE-2014-123456 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2014-123456 - https://github.com/openvex/spec
|
||||
@@ -13608,6 +13617,7 @@ CVE-2014-6071 - https://github.com/PentestinGxRoot/pysploit
|
||||
CVE-2014-6195 - https://github.com/Live-Hack-CVE/CVE-2014-6195
|
||||
CVE-2014-6230 - https://github.com/Live-Hack-CVE/CVE-2014-6230
|
||||
CVE-2014-6230 - https://github.com/lesterchan/wp-ban
|
||||
CVE-2014-6271 - https://github.com/00xNetrunner/Shodan_Cheet-Sheet
|
||||
CVE-2014-6271 - https://github.com/0bfxgh0st/cve-2014-6271
|
||||
CVE-2014-6271 - https://github.com/0x00-0x00/CVE-2014-6271
|
||||
CVE-2014-6271 - https://github.com/0x0d3ad/Kn0ck
|
||||
@@ -13947,6 +13957,7 @@ CVE-2014-6271 - https://github.com/foobarto/redteam-notebook
|
||||
CVE-2014-6271 - https://github.com/francisck/shellshock-cgi
|
||||
CVE-2014-6271 - https://github.com/fxschaefer/ejpt
|
||||
CVE-2014-6271 - https://github.com/gabemarshall/shocknaww
|
||||
CVE-2014-6271 - https://github.com/gauss77/LaboratoriosHack
|
||||
CVE-2014-6271 - https://github.com/ghoneycutt/puppet-module-cve
|
||||
CVE-2014-6271 - https://github.com/gipi/cve-cemetery
|
||||
CVE-2014-6271 - https://github.com/giterlizzi/secdb-feeds
|
||||
@@ -14121,6 +14132,7 @@ CVE-2014-6271 - https://github.com/ricedu/bash-4.2-patched
|
||||
CVE-2014-6271 - https://github.com/riikunn1004/oscp-cheatsheet
|
||||
CVE-2014-6271 - https://github.com/rjdj0261/-Awesome-Hacking-
|
||||
CVE-2014-6271 - https://github.com/rmetzler/ansible-shellshock-fix
|
||||
CVE-2014-6271 - https://github.com/rodolfomarianocy/OSCP-Tricks-2023
|
||||
CVE-2014-6271 - https://github.com/roninAPT/pentest-kit
|
||||
CVE-2014-6271 - https://github.com/rrmomaya2900/0dayWriteup-THM
|
||||
CVE-2014-6271 - https://github.com/rrreeeyyy/cve-2014-6271-spec
|
||||
@@ -14624,11 +14636,13 @@ CVE-2014-7809 - https://github.com/tmpgit3000/victims
|
||||
CVE-2014-7809 - https://github.com/victims/maven-security-versions
|
||||
CVE-2014-7816 - https://github.com/ilmila/J2EEScan
|
||||
CVE-2014-7816 - https://github.com/ronoski/j2ee-rscan
|
||||
CVE-2014-7818 - https://github.com/bibin-paul-trustme/ruby_repo
|
||||
CVE-2014-7818 - https://github.com/jasnow/585-652-ruby-advisory-db
|
||||
CVE-2014-7818 - https://github.com/rubysec/ruby-advisory-db
|
||||
CVE-2014-7818 - https://github.com/tdunning/github-advisory-parser
|
||||
CVE-2014-7818 - https://github.com/zhangyongbo100/-Ruby-dl-handle.c-CVE-2009-5147-
|
||||
CVE-2014-7819 - https://github.com/tdunning/github-advisory-parser
|
||||
CVE-2014-7829 - https://github.com/bibin-paul-trustme/ruby_repo
|
||||
CVE-2014-7829 - https://github.com/jasnow/585-652-ruby-advisory-db
|
||||
CVE-2014-7829 - https://github.com/rubysec/ruby-advisory-db
|
||||
CVE-2014-7829 - https://github.com/zhangyongbo100/-Ruby-dl-handle.c-CVE-2009-5147-
|
||||
@@ -15992,6 +16006,7 @@ CVE-2015-1635 - https://github.com/20142995/pocsuite3
|
||||
CVE-2015-1635 - https://github.com/ACIC-Africa/metasploitable3
|
||||
CVE-2015-1635 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2015-1635 - https://github.com/Aquilao/Toy-Box
|
||||
CVE-2015-1635 - https://github.com/Cappricio-Securities/CVE-2015-1635
|
||||
CVE-2015-1635 - https://github.com/H3xL00m/CVE-2015-1635
|
||||
CVE-2015-1635 - https://github.com/H3xL00m/CVE-2015-1635-POC
|
||||
CVE-2015-1635 - https://github.com/Olysyan/MSS
|
||||
@@ -16795,6 +16810,7 @@ CVE-2015-3104 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2015-3104 - https://github.com/BLACKHAT-SSG/EXP-401-OSEE
|
||||
CVE-2015-3104 - https://github.com/HaifeiLi/HardenFlash
|
||||
CVE-2015-3104 - https://github.com/PwnAwan/EXP-401-OSEE
|
||||
CVE-2015-3104 - https://github.com/ernestang98/win-exploits
|
||||
CVE-2015-3104 - https://github.com/gscamelo/OSEE
|
||||
CVE-2015-3105 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2015-3105 - https://github.com/Advisory-Emulations/APT-37
|
||||
@@ -17009,6 +17025,7 @@ CVE-2015-3306 - https://github.com/davidtavarez/CVE-2015-3306
|
||||
CVE-2015-3306 - https://github.com/developer3000S/PoC-in-GitHub
|
||||
CVE-2015-3306 - https://github.com/ebantula/eHacking_LABS
|
||||
CVE-2015-3306 - https://github.com/firatesatoglu/shodanSearch
|
||||
CVE-2015-3306 - https://github.com/gauss77/LaboratoriosHack
|
||||
CVE-2015-3306 - https://github.com/hackarada/cve-2015-3306
|
||||
CVE-2015-3306 - https://github.com/hectorgie/PoC-in-GitHub
|
||||
CVE-2015-3306 - https://github.com/hktalent/TOP
|
||||
@@ -17426,6 +17443,7 @@ CVE-2015-4495 - https://github.com/vincd/CVE-2015-4495
|
||||
CVE-2015-4499 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2015-4519 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2015-4553 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2015-4582 - https://github.com/dinosn/weblogic
|
||||
CVE-2015-4582 - https://github.com/safe6Sec/wlsEnv
|
||||
CVE-2015-4588 - https://github.com/andir/nixos-issue-db-example
|
||||
CVE-2015-4590 - https://github.com/mrash/afl-cve
|
||||
@@ -18419,6 +18437,7 @@ CVE-2015-6673 - https://github.com/andir/nixos-issue-db-example
|
||||
CVE-2015-6748 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2015-6748 - https://github.com/Anonymous-Phunter/PHunter
|
||||
CVE-2015-6748 - https://github.com/CGCL-codes/PHunter
|
||||
CVE-2015-6748 - https://github.com/epicosy/VUL4J-59
|
||||
CVE-2015-6749 - https://github.com/andir/nixos-issue-db-example
|
||||
CVE-2015-6755 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2015-6755 - https://github.com/lnick2023/nicenice
|
||||
@@ -18898,6 +18917,7 @@ CVE-2015-7575 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2015-7575 - https://github.com/RedHatSatellite/satellite-host-cve
|
||||
CVE-2015-7575 - https://github.com/igurel/cryptography-101
|
||||
CVE-2015-7576 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2015-7576 - https://github.com/bibin-paul-trustme/ruby_repo
|
||||
CVE-2015-7576 - https://github.com/jasnow/585-652-ruby-advisory-db
|
||||
CVE-2015-7576 - https://github.com/rubysec/ruby-advisory-db
|
||||
CVE-2015-7576 - https://github.com/zhangyongbo100/-Ruby-dl-handle.c-CVE-2009-5147-
|
||||
@@ -18906,6 +18926,7 @@ CVE-2015-7578 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2015-7579 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2015-7580 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2015-7581 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2015-7581 - https://github.com/bibin-paul-trustme/ruby_repo
|
||||
CVE-2015-7581 - https://github.com/jasnow/585-652-ruby-advisory-db
|
||||
CVE-2015-7581 - https://github.com/rubysec/ruby-advisory-db
|
||||
CVE-2015-7581 - https://github.com/zhangyongbo100/-Ruby-dl-handle.c-CVE-2009-5147-
|
||||
@@ -19949,6 +19970,7 @@ CVE-2016-0108 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2016-0117 - https://github.com/0xCyberY/CVE-T4PDF
|
||||
CVE-2016-0117 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2016-0117 - https://github.com/datntsec/WINDOWS-10-SEGMENT-HEAP-INTERNALS
|
||||
CVE-2016-0117 - https://github.com/ernestang98/win-exploits
|
||||
CVE-2016-0118 - https://github.com/0xCyberY/CVE-T4PDF
|
||||
CVE-2016-0118 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2016-0122 - https://github.com/ARPSyndicate/cvemon
|
||||
@@ -20333,6 +20355,7 @@ CVE-2016-0749 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2016-0749 - https://github.com/kn0630/vulssimulator_ds
|
||||
CVE-2016-0750 - https://github.com/PalindromeLabs/Java-Deserialization-CVEs
|
||||
CVE-2016-0751 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2016-0751 - https://github.com/bibin-paul-trustme/ruby_repo
|
||||
CVE-2016-0751 - https://github.com/jasnow/585-652-ruby-advisory-db
|
||||
CVE-2016-0751 - https://github.com/rubysec/ruby-advisory-db
|
||||
CVE-2016-0751 - https://github.com/vulsio/go-cve-dictionary
|
||||
@@ -20342,6 +20365,7 @@ CVE-2016-0752 - https://github.com/CoolerVoid/master_librarian
|
||||
CVE-2016-0752 - https://github.com/NzKoff/shift_summer_2019
|
||||
CVE-2016-0752 - https://github.com/Ostorlab/KEV
|
||||
CVE-2016-0752 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
||||
CVE-2016-0752 - https://github.com/bibin-paul-trustme/ruby_repo
|
||||
CVE-2016-0752 - https://github.com/dachidahu/CVE-2016-0752
|
||||
CVE-2016-0752 - https://github.com/forced-request/rails-rce-cve-2016-0752
|
||||
CVE-2016-0752 - https://github.com/jasnow/585-652-ruby-advisory-db
|
||||
@@ -26577,6 +26601,7 @@ CVE-2016-5649 - https://github.com/ARPSyndicate/kenzer-templates
|
||||
CVE-2016-5669 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2016-5669 - https://github.com/chnzzh/OpenSSL-CVE-lib
|
||||
CVE-2016-5673 - https://github.com/0x3a/stargate
|
||||
CVE-2016-5678 - https://github.com/xssec/xshodan
|
||||
CVE-2016-5679 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2016-5680 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2016-5682 - https://github.com/ARPSyndicate/cvemon
|
||||
@@ -31394,7 +31419,10 @@ CVE-2017-1002102 - https://github.com/hacking-kubernetes/hacking-kubernetes.info
|
||||
CVE-2017-1002150 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2017-1002157 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2017-1002999 - https://github.com/CVEProject/cvelist
|
||||
CVE-2017-1002999 - https://github.com/CVEProject/cvelist-dev
|
||||
CVE-2017-1002999 - https://github.com/CVEProject/cvelist-int
|
||||
CVE-2017-1002999 - https://github.com/dims/cvelist-public
|
||||
CVE-2017-1002999 - https://github.com/jpattrendmicro/cvelist
|
||||
CVE-2017-1002999 - https://github.com/mpmiller37/nvdTest
|
||||
CVE-2017-1002999 - https://github.com/nvdgit/nvdTest
|
||||
CVE-2017-10033 - https://github.com/ARPSyndicate/cvemon
|
||||
@@ -32855,6 +32883,7 @@ CVE-2017-12424 - https://github.com/yfoelling/yair
|
||||
CVE-2017-12426 - https://github.com/sm-paul-schuette/CVE-2017-12426
|
||||
CVE-2017-12427 - https://github.com/zhouat/poc_IM
|
||||
CVE-2017-12439 - https://github.com/ret2eax/ret2eax
|
||||
CVE-2017-1244 - https://github.com/markuschaaf/minidjvu
|
||||
CVE-2017-12441 - https://github.com/andir/nixos-issue-db-example
|
||||
CVE-2017-12442 - https://github.com/andir/nixos-issue-db-example
|
||||
CVE-2017-12443 - https://github.com/andir/nixos-issue-db-example
|
||||
@@ -36972,6 +37001,7 @@ CVE-2017-4901 - https://github.com/xbl3/awesome-cve-poc_qazbnm456
|
||||
CVE-2017-4901 - https://github.com/xiaoZ-hc/redtool
|
||||
CVE-2017-4901 - https://github.com/yut0u/RedTeam-BlackBox
|
||||
CVE-2017-4905 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2017-4905 - https://github.com/ernestang98/win-exploits
|
||||
CVE-2017-4914 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2017-4914 - https://github.com/lnick2023/nicenice
|
||||
CVE-2017-4914 - https://github.com/qazbnm456/awesome-cve-poc
|
||||
@@ -38714,6 +38744,7 @@ CVE-2017-6079 - https://github.com/MostafaSoliman/CVE-2017-6079-Blind-Command-In
|
||||
CVE-2017-6079 - https://github.com/Ondrik8/byPass_AV
|
||||
CVE-2017-6090 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2017-6090 - https://github.com/ARPSyndicate/kenzer-templates
|
||||
CVE-2017-6090 - https://github.com/asaotomo/FofaMap
|
||||
CVE-2017-6090 - https://github.com/jlk/exploit-CVE-2017-6090
|
||||
CVE-2017-6095 - https://github.com/El-Palomo/SYMFONOS
|
||||
CVE-2017-6095 - https://github.com/VTFoundation/vulnerablewp
|
||||
@@ -48811,6 +48842,7 @@ CVE-2018-17463 - https://github.com/Ostorlab/KEV
|
||||
CVE-2018-17463 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
||||
CVE-2018-17463 - https://github.com/Uniguri/CVE-1day
|
||||
CVE-2018-17463 - https://github.com/changelog2020/JSEChalls
|
||||
CVE-2018-17463 - https://github.com/ernestang98/win-exploits
|
||||
CVE-2018-17463 - https://github.com/hwiwonl/dayone
|
||||
CVE-2018-17463 - https://github.com/jhalon/CVE-2018-17463
|
||||
CVE-2018-17463 - https://github.com/kdmarti2/CVE-2018-17463
|
||||
@@ -50013,6 +50045,7 @@ CVE-2018-20250 - https://github.com/eastmountyxz/CVE-2018-20250-WinRAR
|
||||
CVE-2018-20250 - https://github.com/eastmountyxz/NetworkSecuritySelf-study
|
||||
CVE-2018-20250 - https://github.com/eastmountyxz/SystemSecurity-ReverseAnalysis
|
||||
CVE-2018-20250 - https://github.com/githuberxu/Safety-Books
|
||||
CVE-2018-20250 - https://github.com/gnusec/soapffzblogposts_backup
|
||||
CVE-2018-20250 - https://github.com/googleprojectzero/winafl
|
||||
CVE-2018-20250 - https://github.com/gyaansastra/Red-Team-Toolkit
|
||||
CVE-2018-20250 - https://github.com/hardik05/winafl-powermopt
|
||||
@@ -56226,6 +56259,7 @@ CVE-2018-9919 - https://github.com/SexyBeast233/SecBooks
|
||||
CVE-2018-9926 - https://github.com/anquanquantao/iwantacve
|
||||
CVE-2018-9927 - https://github.com/anquanquantao/iwantacve
|
||||
CVE-2018-9948 - https://github.com/0xT11/CVE-POC
|
||||
CVE-2018-9948 - https://github.com/ernestang98/win-exploits
|
||||
CVE-2018-9948 - https://github.com/hectorgie/PoC-in-GitHub
|
||||
CVE-2018-9948 - https://github.com/manojcode/Foxit-Reader-RCE-with-virualalloc-and-shellcode-for-CVE-2018-9948-and-CVE-2018-9958
|
||||
CVE-2018-9948 - https://github.com/orangepirate/cve-2018-9948-9958-exp
|
||||
@@ -56237,6 +56271,7 @@ CVE-2018-9951 - https://github.com/hectorgie/PoC-in-GitHub
|
||||
CVE-2018-9951 - https://github.com/sharmasandeepkr/cve-2018-9951
|
||||
CVE-2018-9958 - https://github.com/0xT11/CVE-POC
|
||||
CVE-2018-9958 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2018-9958 - https://github.com/ernestang98/win-exploits
|
||||
CVE-2018-9958 - https://github.com/hectorgie/PoC-in-GitHub
|
||||
CVE-2018-9958 - https://github.com/manojcode/Foxit-Reader-RCE-with-virualalloc-and-shellcode-for-CVE-2018-9948-and-CVE-2018-9958
|
||||
CVE-2018-9958 - https://github.com/t3rabyt3-zz/CVE-2018-9958--Exploit
|
||||
@@ -56785,6 +56820,7 @@ CVE-2019-0567 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2019-0567 - https://github.com/EanNewton/Awesome-Reading-List
|
||||
CVE-2019-0567 - https://github.com/NatteeSetobol/Chakra-CVE-2019-0567
|
||||
CVE-2019-0567 - https://github.com/developer3000S/PoC-in-GitHub
|
||||
CVE-2019-0567 - https://github.com/ernestang98/win-exploits
|
||||
CVE-2019-0567 - https://github.com/hectorgie/PoC-in-GitHub
|
||||
CVE-2019-0567 - https://github.com/lnick2023/nicenice
|
||||
CVE-2019-0567 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||
@@ -62446,6 +62482,7 @@ CVE-2019-11358 - https://github.com/harshidk/Millenium-Falcons2022-2023NEW
|
||||
CVE-2019-11358 - https://github.com/harshidk/MilleniumFalcons2022-2023OLD
|
||||
CVE-2019-11358 - https://github.com/harshidk/viperftclibrary-cpp
|
||||
CVE-2019-11358 - https://github.com/hashgupta/StaticDischargeCode
|
||||
CVE-2019-11358 - https://github.com/hatchetAx/14887FTC
|
||||
CVE-2019-11358 - https://github.com/hatchetAxing/14887FTC
|
||||
CVE-2019-11358 - https://github.com/heatedmonkeytrousers/powerplay
|
||||
CVE-2019-11358 - https://github.com/heavydriver/ftc_jasper
|
||||
@@ -65621,6 +65658,7 @@ CVE-2019-13764 - https://github.com/Kiprey/Skr_Learning
|
||||
CVE-2019-13764 - https://github.com/KotenAngered/ZTE-Blade-A5-2019-Nae-Nae-List
|
||||
CVE-2019-13764 - https://github.com/OpposedDeception/ZTE-Blade-A5-2019-Nae-Nae-List
|
||||
CVE-2019-13764 - https://github.com/Self-Study-Committee/Skr_Learning
|
||||
CVE-2019-13764 - https://github.com/ernestang98/win-exploits
|
||||
CVE-2019-13764 - https://github.com/jfmcoronel/eevee
|
||||
CVE-2019-13764 - https://github.com/sslab-gatech/DIE
|
||||
CVE-2019-13764 - https://github.com/taielab/awesome-hacking-lists
|
||||
@@ -65632,6 +65670,7 @@ CVE-2019-13767 - https://github.com/allpaca/chrome-sbx-db
|
||||
CVE-2019-13768 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2019-13768 - https://github.com/ZwCreatePhoton/CVE-2019-5782_CVE-2019-13768
|
||||
CVE-2019-13768 - https://github.com/developer3000S/PoC-in-GitHub
|
||||
CVE-2019-13768 - https://github.com/ernestang98/win-exploits
|
||||
CVE-2019-13768 - https://github.com/hectorgie/PoC-in-GitHub
|
||||
CVE-2019-13768 - https://github.com/wh1ant/vulnjs
|
||||
CVE-2019-13768 - https://github.com/yuvaly0/exploits
|
||||
@@ -69065,6 +69104,7 @@ CVE-2019-18683 - https://github.com/De4dCr0w/Linux-kernel-EoP-exp
|
||||
CVE-2019-18683 - https://github.com/IdanBanani/Linux-Kernel-VR-Exploitation
|
||||
CVE-2019-18683 - https://github.com/Limesss/cve-2019-18683
|
||||
CVE-2019-18683 - https://github.com/developer3000S/PoC-in-GitHub
|
||||
CVE-2019-18683 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2019-18683 - https://github.com/hectorgie/PoC-in-GitHub
|
||||
CVE-2019-18683 - https://github.com/kdn111/linux-kernel-exploitation
|
||||
CVE-2019-18683 - https://github.com/khanhdn111/linux-kernel-exploitation
|
||||
@@ -75894,6 +75934,7 @@ CVE-2020-0674 - https://github.com/alphaSeclab/sec-daily-2020
|
||||
CVE-2020-0674 - https://github.com/binaryfigments/CVE-2020-0674
|
||||
CVE-2020-0674 - https://github.com/cyberanand1337x/bug-bounty-2022
|
||||
CVE-2020-0674 - https://github.com/developer3000S/PoC-in-GitHub
|
||||
CVE-2020-0674 - https://github.com/ernestang98/win-exploits
|
||||
CVE-2020-0674 - https://github.com/forrest-orr/DoubleStar
|
||||
CVE-2020-0674 - https://github.com/hasee2018/Penetration_Testing_POC
|
||||
CVE-2020-0674 - https://github.com/hectorgie/PoC-in-GitHub
|
||||
@@ -76575,6 +76616,7 @@ CVE-2020-0796 - https://github.com/firatesatoglu/shodanSearch
|
||||
CVE-2020-0796 - https://github.com/gabimarti/SMBScanner
|
||||
CVE-2020-0796 - https://github.com/giterlizzi/secdb-feeds
|
||||
CVE-2020-0796 - https://github.com/githuberxu/Safety-Books
|
||||
CVE-2020-0796 - https://github.com/gnusec/soapffzblogposts_backup
|
||||
CVE-2020-0796 - https://github.com/h7ml/h7ml
|
||||
CVE-2020-0796 - https://github.com/hack-parthsharma/WinPwn
|
||||
CVE-2020-0796 - https://github.com/halsten/CVE-2020-0796
|
||||
@@ -83628,6 +83670,7 @@ CVE-2020-16040 - https://github.com/Wi1L-Y/News
|
||||
CVE-2020-16040 - https://github.com/anvbis/chrome_v8_ndays
|
||||
CVE-2020-16040 - https://github.com/anvbis/trivialize
|
||||
CVE-2020-16040 - https://github.com/dongAxis/to_be_a_v8_master
|
||||
CVE-2020-16040 - https://github.com/ernestang98/win-exploits
|
||||
CVE-2020-16040 - https://github.com/hktalent/bug-bounty
|
||||
CVE-2020-16040 - https://github.com/joydo/CVE-Writeups
|
||||
CVE-2020-16040 - https://github.com/maldev866/ChExp_CVE_2020_16040
|
||||
@@ -92147,6 +92190,7 @@ CVE-2020-6361 - https://github.com/404notf0und/CVE-Flow
|
||||
CVE-2020-6364 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2020-6364 - https://github.com/Onapsis/vulnerability_advisories
|
||||
CVE-2020-6364 - https://github.com/gquere/CVE-2020-6364
|
||||
CVE-2020-6368 - https://github.com/ernestang98/win-exploits
|
||||
CVE-2020-6369 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2020-6369 - https://github.com/Onapsis/vulnerability_advisories
|
||||
CVE-2020-6371 - https://github.com/Live-Hack-CVE/CVE-2020-6371
|
||||
@@ -101671,6 +101715,7 @@ CVE-2021-26084 - https://github.com/Reclu3a/CVE-2021-26084-Confluence-OGNL
|
||||
CVE-2021-26084 - https://github.com/S3cur3Th1sSh1t/Pentest-Tools
|
||||
CVE-2021-26084 - https://github.com/SYRTI/POC_to_review
|
||||
CVE-2021-26084 - https://github.com/Sma11New/PocList
|
||||
CVE-2021-26084 - https://github.com/SummerSec/SpringExploit
|
||||
CVE-2021-26084 - https://github.com/TesterCC/exp_poc_library
|
||||
CVE-2021-26084 - https://github.com/TheclaMcentire/CVE-2021-26084_Confluence
|
||||
CVE-2021-26084 - https://github.com/Threekiii/Awesome-POC
|
||||
@@ -107294,6 +107339,7 @@ CVE-2021-33564 - https://github.com/harsh-bothra/learn365
|
||||
CVE-2021-33564 - https://github.com/markevans/dragonfly
|
||||
CVE-2021-33564 - https://github.com/mlr0p/CVE-2021-33564
|
||||
CVE-2021-33564 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||
CVE-2021-33564 - https://github.com/rodolfomarianocy/OSCP-Tricks-2023
|
||||
CVE-2021-33564 - https://github.com/soosmile/POC
|
||||
CVE-2021-33564 - https://github.com/trhacknon/Pocingit
|
||||
CVE-2021-33564 - https://github.com/zecool/cve
|
||||
@@ -107780,6 +107826,7 @@ CVE-2021-34473 - https://github.com/Atem1988/Starred
|
||||
CVE-2021-34473 - https://github.com/CVEDB/PoC-List
|
||||
CVE-2021-34473 - https://github.com/CVEDB/awesome-cve-repo
|
||||
CVE-2021-34473 - https://github.com/CVEDB/top
|
||||
CVE-2021-34473 - https://github.com/Dheerajmadhukar/karma_v2
|
||||
CVE-2021-34473 - https://github.com/DiedB/caldera-precomp
|
||||
CVE-2021-34473 - https://github.com/FDlucifer/Proxy-Attackchain
|
||||
CVE-2021-34473 - https://github.com/GhostTroops/TOP
|
||||
@@ -110100,6 +110147,7 @@ CVE-2021-38003 - https://github.com/Ostorlab/KEV
|
||||
CVE-2021-38003 - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
||||
CVE-2021-38003 - https://github.com/SpiralBL0CK/Chrome-V8-RCE-CVE-2021-38003
|
||||
CVE-2021-38003 - https://github.com/anvbis/chrome_v8_ndays
|
||||
CVE-2021-38003 - https://github.com/ernestang98/win-exploits
|
||||
CVE-2021-38003 - https://github.com/kestryix/tisc-2023-writeups
|
||||
CVE-2021-38003 - https://github.com/numencyber/Vulnerability_PoC
|
||||
CVE-2021-38003 - https://github.com/wh1ant/vulnjs
|
||||
@@ -114961,6 +115009,7 @@ CVE-2021-43798 - https://github.com/allblue147/Grafana
|
||||
CVE-2021-43798 - https://github.com/anonymous364872/Rapier_Tool
|
||||
CVE-2021-43798 - https://github.com/apif-review/APIF_tool_2024
|
||||
CVE-2021-43798 - https://github.com/asaotomo/CVE-2021-43798-Grafana-Exp
|
||||
CVE-2021-43798 - https://github.com/asaotomo/FofaMap
|
||||
CVE-2021-43798 - https://github.com/aymenbouferroum/CVE-2021-43798_exploit
|
||||
CVE-2021-43798 - https://github.com/b4zinga/Raphael
|
||||
CVE-2021-43798 - https://github.com/bigblackhat/oFx
|
||||
@@ -118719,6 +118768,7 @@ CVE-2022-0148 - https://github.com/ARPSyndicate/kenzer-templates
|
||||
CVE-2022-0148 - https://github.com/Marcuccio/kevin
|
||||
CVE-2022-0149 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2022-0149 - https://github.com/ARPSyndicate/kenzer-templates
|
||||
CVE-2022-0149 - https://github.com/asaotomo/FofaMap
|
||||
CVE-2022-0150 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2022-0150 - https://github.com/ARPSyndicate/kenzer-templates
|
||||
CVE-2022-0155 - https://github.com/ARPSyndicate/cvemon
|
||||
@@ -120539,6 +120589,7 @@ CVE-2022-1119 - https://github.com/zecool/cve
|
||||
CVE-2022-1122 - https://github.com/mzs555557/SosReverterbench
|
||||
CVE-2022-1128 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2022-1129 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2022-1134 - https://github.com/ernestang98/win-exploits
|
||||
CVE-2022-1137 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2022-1138 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2022-1139 - https://github.com/ARPSyndicate/cvemon
|
||||
@@ -120830,6 +120881,7 @@ CVE-2022-1388 - https://github.com/SkyBelll/CVE-PoC
|
||||
CVE-2022-1388 - https://github.com/Stonzyy/Exploit-F5-CVE-2022-1388
|
||||
CVE-2022-1388 - https://github.com/Str1am/my-nuclei-templates
|
||||
CVE-2022-1388 - https://github.com/SudeepaShiranthaka/F5-BIG-IP-Remote-Code-Execution-Vulnerability-CVE-2022-1388-A-Case-Study
|
||||
CVE-2022-1388 - https://github.com/SummerSec/SpringExploit
|
||||
CVE-2022-1388 - https://github.com/Threekiii/Awesome-POC
|
||||
CVE-2022-1388 - https://github.com/TomArni680/CVE-2022-1388-POC
|
||||
CVE-2022-1388 - https://github.com/TomArni680/CVE-2022-1388-RCE
|
||||
@@ -123902,6 +123954,7 @@ CVE-2022-22947 - https://github.com/SYRTI/POC_to_review
|
||||
CVE-2022-22947 - https://github.com/Sec-Fork/mullet2
|
||||
CVE-2022-22947 - https://github.com/SiJiDo/CVE-2022-22947
|
||||
CVE-2022-22947 - https://github.com/Summer177/Spring-Cloud-Gateway-CVE-2022-22947
|
||||
CVE-2022-22947 - https://github.com/SummerSec/SpringExploit
|
||||
CVE-2022-22947 - https://github.com/SummerSec/learning-codeql
|
||||
CVE-2022-22947 - https://github.com/Tas9er/SpringCloudGatewayRCE
|
||||
CVE-2022-22947 - https://github.com/Threekiii/Awesome-Exploit
|
||||
@@ -124258,6 +124311,7 @@ CVE-2022-22963 - https://github.com/SealPaPaPa/SpringCloudFunction-Research
|
||||
CVE-2022-22963 - https://github.com/SirElmard/ethical_hacking
|
||||
CVE-2022-22963 - https://github.com/SnailDev/github-hot-hub
|
||||
CVE-2022-22963 - https://github.com/SourM1lk/CVE-2022-22963-Exploit
|
||||
CVE-2022-22963 - https://github.com/SummerSec/SpringExploit
|
||||
CVE-2022-22963 - https://github.com/Threekiii/Awesome-Exploit
|
||||
CVE-2022-22963 - https://github.com/Threekiii/Awesome-POC
|
||||
CVE-2022-22963 - https://github.com/Threekiii/Awesome-Redteam
|
||||
@@ -124441,6 +124495,7 @@ CVE-2022-22965 - https://github.com/SnailDev/github-hot-hub
|
||||
CVE-2022-22965 - https://github.com/Snip3R69/spring-shell-vuln
|
||||
CVE-2022-22965 - https://github.com/Sparrow-Co-Ltd/real_cve_examples
|
||||
CVE-2022-22965 - https://github.com/SummerSec/BlogPapers
|
||||
CVE-2022-22965 - https://github.com/SummerSec/SpringExploit
|
||||
CVE-2022-22965 - https://github.com/SummerSec/SummerSec
|
||||
CVE-2022-22965 - https://github.com/TheGejr/SpringShell
|
||||
CVE-2022-22965 - https://github.com/Threekiii/Awesome-Exploit
|
||||
@@ -128152,6 +128207,7 @@ CVE-2022-26134 - https://github.com/CLincat/vulcat
|
||||
CVE-2022-26134 - https://github.com/CatAnnaDev/CVE-2022-26134
|
||||
CVE-2022-26134 - https://github.com/Chocapikk/CVE-2022-26134
|
||||
CVE-2022-26134 - https://github.com/ColdFusionX/CVE-2022-26134
|
||||
CVE-2022-26134 - https://github.com/CuriousLearnerDev/Full-Scanner
|
||||
CVE-2022-26134 - https://github.com/CyberDonkyx0/CVE-2022-26134
|
||||
CVE-2022-26134 - https://github.com/DARKSTUFF-LAB/-CVE-2022-26134
|
||||
CVE-2022-26134 - https://github.com/DallasWmk/censys_takehome
|
||||
@@ -128192,6 +128248,7 @@ CVE-2022-26134 - https://github.com/SYRTI/POC_to_review
|
||||
CVE-2022-26134 - https://github.com/Sakura-nee/CVE-2022-26134
|
||||
CVE-2022-26134 - https://github.com/SirElmard/ethical_hacking
|
||||
CVE-2022-26134 - https://github.com/StarCrossPortal/scalpel
|
||||
CVE-2022-26134 - https://github.com/SummerSec/SpringExploit
|
||||
CVE-2022-26134 - https://github.com/Sylon001/Common-tool
|
||||
CVE-2022-26134 - https://github.com/Threekiii/Awesome-POC
|
||||
CVE-2022-26134 - https://github.com/Threekiii/Awesome-Redteam
|
||||
@@ -130507,6 +130564,7 @@ CVE-2022-28737 - https://github.com/vathpela/shim-review
|
||||
CVE-2022-28738 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2022-28738 - https://github.com/lifeparticle/Ruby-Cheatsheet
|
||||
CVE-2022-28739 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2022-28739 - https://github.com/bibin-paul-trustme/ruby_repo
|
||||
CVE-2022-28739 - https://github.com/jasnow/585-652-ruby-advisory-db
|
||||
CVE-2022-28739 - https://github.com/lifeparticle/Ruby-Cheatsheet
|
||||
CVE-2022-28739 - https://github.com/rubysec/ruby-advisory-db
|
||||
@@ -141621,6 +141679,7 @@ CVE-2023-20933 - https://github.com/Trinadh465/frameworks_av_CVE-2023-20933
|
||||
CVE-2023-20933 - https://github.com/hshivhare67/platform_frameworks_av_AOSP10_r33_CVE-2023-20933
|
||||
CVE-2023-20933 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||
CVE-2023-20937 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2023-20938 - https://github.com/IamAlch3mist/Awesome-Android-Vulnerability-Research
|
||||
CVE-2023-2094 - https://github.com/1-tong/vehicle_cves
|
||||
CVE-2023-2094 - https://github.com/Vu1nT0tal/Vehicle-Security
|
||||
CVE-2023-2094 - https://github.com/VulnTotal-Team/Vehicle-Security
|
||||
@@ -142464,6 +142523,7 @@ CVE-2023-22743 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2023-22743 - https://github.com/KK-Designs/UpdateHub
|
||||
CVE-2023-22792 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2023-22794 - https://github.com/ARPSyndicate/cvemon
|
||||
CVE-2023-22795 - https://github.com/bibin-paul-trustme/ruby_repo
|
||||
CVE-2023-22795 - https://github.com/jasnow/585-652-ruby-advisory-db
|
||||
CVE-2023-22795 - https://github.com/rubysec/ruby-advisory-db
|
||||
CVE-2023-22796 - https://github.com/ARPSyndicate/cvemon
|
||||
@@ -153376,6 +153436,7 @@ CVE-2023-6465 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2023-6478 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2023-6481 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2023-6484 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2023-6491 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2023-6499 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2023-6501 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2023-6505 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
@@ -164191,6 +164252,7 @@ CVE-2024-2961 - https://github.com/sampsonv/github-trending
|
||||
CVE-2024-2961 - https://github.com/tanjiti/sec_profile
|
||||
CVE-2024-2961 - https://github.com/tarlepp/links-of-the-week
|
||||
CVE-2024-2961 - https://github.com/testing-felickz/docker-scout-demo
|
||||
CVE-2024-2961 - https://github.com/wjlin0/wjlin0
|
||||
CVE-2024-2961 - https://github.com/zhaoxiaoha/github-trending
|
||||
CVE-2024-29637 - https://github.com/SQU4NCH/SQU4NCH
|
||||
CVE-2024-29638 - https://github.com/SQU4NCH/SQU4NCH
|
||||
@@ -165221,6 +165283,7 @@ CVE-2024-32867 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-32872 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-32874 - https://github.com/Sim4n6/Sim4n6
|
||||
CVE-2024-32879 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-3288 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-32880 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-32884 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-32886 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
@@ -165747,6 +165810,7 @@ CVE-2024-35856 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-35857 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-35858 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-35859 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-3592 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-36036 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-36037 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-36049 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
@@ -165788,6 +165852,7 @@ CVE-2024-3661 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-3661 - https://github.com/giterlizzi/secdb-feeds
|
||||
CVE-2024-3661 - https://github.com/leviathansecurity/TunnelVision
|
||||
CVE-2024-3661 - https://github.com/tanjiti/sec_profile
|
||||
CVE-2024-36673 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-36795 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-3686 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-3687 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
@@ -165927,6 +165992,7 @@ CVE-2024-4040 - https://github.com/wjlin0/poc-doc
|
||||
CVE-2024-4040 - https://github.com/wy876/POC
|
||||
CVE-2024-4040 - https://github.com/wy876/wiki
|
||||
CVE-2024-4040 - https://github.com/zgimszhd61/cve-exploit-collection-scanner
|
||||
CVE-2024-4042 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-4058 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-4059 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-4060 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
@@ -165996,6 +166062,7 @@ CVE-2024-4346 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-4349 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-4352 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||
CVE-2024-4352 - https://github.com/truonghuuphuc/CVE-2024-4352-Poc
|
||||
CVE-2024-4354 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-4357 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-4358 - https://github.com/GhostTroops/TOP
|
||||
CVE-2024-4358 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||
@@ -166035,7 +166102,10 @@ CVE-2024-4443 - https://github.com/wy876/POC
|
||||
CVE-2024-4444 - https://github.com/JohnnyBradvo/CVE-2024-4444
|
||||
CVE-2024-4444 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||
CVE-2024-4445 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-4451 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-4473 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-4488 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-4489 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-4493 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-4494 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-4501 - https://github.com/tanjiti/sec_profile
|
||||
@@ -166067,6 +166137,8 @@ CVE-2024-4559 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-4561 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-4562 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-4568 - https://github.com/bladchan/bladchan
|
||||
CVE-2024-4577 - https://github.com/0xsyr0/OSCP
|
||||
CVE-2024-4577 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||
CVE-2024-4582 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-4583 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-4584 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
@@ -166088,8 +166160,11 @@ CVE-2024-4601 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-4603 - https://github.com/chnzzh/OpenSSL-CVE-lib
|
||||
CVE-2024-4603 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-4609 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-4610 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-4611 - https://github.com/chnzzh/OpenSSL-CVE-lib
|
||||
CVE-2024-4618 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-4620 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-4621 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-4622 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-4624 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-4636 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
@@ -166115,6 +166190,7 @@ CVE-2024-4701 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||
CVE-2024-4702 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-4718 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-4734 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-4756 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-4760 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-4761 - https://github.com/dan-mba/python-selenium-news
|
||||
CVE-2024-4761 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
@@ -166198,6 +166274,7 @@ CVE-2024-4985 - https://github.com/Ostorlab/KEV
|
||||
CVE-2024-4985 - https://github.com/absholi7ly/Bypass-authentication-GitHub-Enterprise-Server
|
||||
CVE-2024-4998 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-4999 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-5003 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-5023 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-5042 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-5044 - https://github.com/tanjiti/sec_profile
|
||||
@@ -166235,17 +166312,24 @@ CVE-2024-5378 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-5379 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-5380 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-5381 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-5382 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-5383 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-5384 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-5385 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-5390 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-5391 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-54321 - https://github.com/runwuf/clickhouse-test
|
||||
CVE-2024-5438 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-5522 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||
CVE-2024-5542 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-5555 - https://github.com/JohnnyBradvo/CVE-2024-5555
|
||||
CVE-2024-5555 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||
CVE-2024-5599 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-5637 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-5678 - https://github.com/Dashrath158/CVE-Management-App-using-Flask
|
||||
CVE-2024-5678 - https://github.com/bergel07/FinalProject
|
||||
CVE-2024-5733 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-5734 - https://github.com/fkie-cad/nvd-json-data-feeds
|
||||
CVE-2024-6271 - https://github.com/Jokergazaa/zero-click-exploits
|
||||
CVE-2024-65230 - https://github.com/nomi-sec/PoC-in-GitHub
|
||||
CVE-2024-6666 - https://github.com/JohnnyBradvo/CVE-2024-6666
|
||||
|
||||
Reference in New Issue
Block a user