Skip to content

Commit

Permalink
Updated by KhulnaSoft [BOT] 🤖
Browse files Browse the repository at this point in the history
  • Loading branch information
KhulnaSoft [BOT] authored and KhulnaSoft [BOT] committed Sep 14, 2024
1 parent 621b916 commit 52d491c
Show file tree
Hide file tree
Showing 2 changed files with 12 additions and 1 deletion.
Binary file modified db/cve.sqlite
Binary file not shown.
13 changes: 12 additions & 1 deletion docs/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@

> Automatic monitor github cve using Github Actions

Last generated: 2024-09-13 02:11:25.009965
Last generated: 2024-09-14 02:09:03.354739

| CVE | Name | Description | Date |
|---|---|---|---|
Expand All @@ -14,6 +14,7 @@ Last generated: 2024-09-13 02:11:25.009965
| [CVE-2024-7313](https://www.cve.org/CVERecord?id=CVE-2024-7313) | [Wayne-Ker/CVE-2024-7313](https://github.com/Wayne-Ker/CVE-2024-7313) | Custom Proof-of-Concept on XSS to Unauthorized Admin Account Creation via WordPress Plugin Shield Security < 20.0.6 | 2024-08-16T01:01:57Z |
| [CVE-2024-7188](https://www.cve.org/CVERecord?id=CVE-2024-7188) | [codeb0ss/CVE-2024-7188-PoC](https://github.com/codeb0ss/CVE-2024-7188-PoC) | Mass Exploit < [CVE-2024-7188 - Bylancer Quicklancer] - SQL Injection | 2024-07-30T10:51:24Z |
| [CVE-2024-7120](https://www.cve.org/CVERecord?id=CVE-2024-7120) | [codeb0ss/CVE-2024-7120-PoC](https://github.com/codeb0ss/CVE-2024-7120-PoC) | Mass Exploit < [CVE-2024-7120 - Raisecom] - Command Injection | 2024-08-01T17:39:45Z |
| [CVE-2024-7094](https://www.cve.org/CVERecord?id=CVE-2024-7094) | [nastar-id/CVE-2024-7094](https://github.com/nastar-id/CVE-2024-7094) | CVE-2024-7094 Vulnerability checker | 2024-08-18T09:27:54Z |
| [CVE-2024-6893](https://www.cve.org/CVERecord?id=CVE-2024-6893) | [codeb0ss/CVE-2024-6893-PoC](https://github.com/codeb0ss/CVE-2024-6893-PoC) | Mass Exploit < [CVE-2024-6893/CWE-611 - Journyx] - XML External Entities Injection (XXE) Exploit | 2024-08-17T22:47:45Z |
| [CVE-2024-6782](https://www.cve.org/CVERecord?id=CVE-2024-6782) | [zangjiahe/CVE-2024-6782](https://github.com/zangjiahe/CVE-2024-6782) | Calibre 远程代码执行(CVE-2024-6782)Improper access control in Calibre 6.9.0 ~ 7.14.0 allow unauthenticated attackers to achieve remote code execution. | 2024-08-06T15:31:48Z |
| [CVE-2024-6782](https://www.cve.org/CVERecord?id=CVE-2024-6782) | [jdpsl/CVE-2024-6782](https://github.com/jdpsl/CVE-2024-6782) | Improper access control in Calibre 6.9.0 ~ 7.14.0 allow unauthenticated attackers to achieve remote code execution. | 2024-08-09T06:25:03Z |
Expand Down Expand Up @@ -354,6 +355,7 @@ Last generated: 2024-09-13 02:11:25.009965
| [CVE-2024-38063](https://www.cve.org/CVERecord?id=CVE-2024-38063) | [noradlb1/CVE-2024-38063-VB](https://github.com/noradlb1/CVE-2024-38063-VB) | CVE-2024-38063 VB | 2024-08-17T01:11:12Z |
| [CVE-2024-38063](https://www.cve.org/CVERecord?id=CVE-2024-38063) | [almogopp/Disable-IPv6-CVE-2024-38063-Fix](https://github.com/almogopp/Disable-IPv6-CVE-2024-38063-Fix) | A PowerShell script to temporarily mitigate the CVE-2024-38063 vulnerability by disabling IPv6 on Windows systems. This workaround modifies the registry to reduce the risk of exploitation without needing the immediate installation of the official Microsoft KB update. Intended as a temporary fix | 2024-08-20T08:48:08Z |
| [CVE-2024-38063](https://www.cve.org/CVERecord?id=CVE-2024-38063) | [p33d/cve-2024-38063](https://github.com/p33d/cve-2024-38063) | Poc for cve-2024-38063 | 2024-08-18T22:24:43Z |
| [CVE-2024-38063](https://www.cve.org/CVERecord?id=CVE-2024-38063) | [dweger-scripts/CVE-2024-38063-Remediation](https://github.com/dweger-scripts/CVE-2024-38063-Remediation) | no description | 2024-08-19T19:44:37Z |
| [CVE-2024-3806](https://www.cve.org/CVERecord?id=CVE-2024-3806) | [truonghuuphuc/CVE-2024-3806-AND-CVE-2024-3807-Poc](https://github.com/truonghuuphuc/CVE-2024-3806-AND-CVE-2024-3807-Poc) | CVE-2024-3806: Porto <= 7.1.0 - Unauthenticated Local File Inclusion via porto_ajax_posts CVE-2024-3807: Porto <= 7.1.0 - Authenticated (Contributor+) Local File Inclusion via Post Meta | 2024-05-10T16:13:07Z |
| [CVE-2024-38041](https://www.cve.org/CVERecord?id=CVE-2024-38041) | [varwara/CVE-2024-38041](https://github.com/varwara/CVE-2024-38041) | Kernel pointers copied to output user mode buffer with ioctl 0x22A014 in the appid.sys driver. | 2024-07-21T02:29:18Z |
| [CVE-2024-38036](https://www.cve.org/CVERecord?id=CVE-2024-38036) | [hnytgl/CVE-2024-38036](https://github.com/hnytgl/CVE-2024-38036) | 排查ipv6使用情况 | 2024-08-16T01:38:21Z |
Expand Down Expand Up @@ -940,6 +942,7 @@ Last generated: 2024-09-13 02:11:25.009965
| [CVE-2024-27173](https://www.cve.org/CVERecord?id=CVE-2024-27173) | [Ieakd/0day-POC-for-CVE-2024-27173](https://github.com/Ieakd/0day-POC-for-CVE-2024-27173) | no description | 2024-06-14T07:04:46Z |
| [CVE-2024-27130](https://www.cve.org/CVERecord?id=CVE-2024-27130) | [watchtowrlabs/CVE-2024-27130](https://github.com/watchtowrlabs/CVE-2024-27130) | PoC for CVE-2024-27130 | 2024-05-17T07:58:01Z |
| [CVE-2024-27130](https://www.cve.org/CVERecord?id=CVE-2024-27130) | [d0rb/CVE-2024-27130](https://github.com/d0rb/CVE-2024-27130) | This Python script is designed as a proof-of-concept (PoC) for the CVE-2024-27130 vulnerability in QNAP QTS | 2024-05-21T11:14:22Z |
| [CVE-2024-27088](https://www.cve.org/CVERecord?id=CVE-2024-27088) | [200101WhoAmI/CVE-2024-27088](https://github.com/200101WhoAmI/CVE-2024-27088) | redos | 2024-08-21T05:21:38Z |
| [CVE-2024-26817](https://www.cve.org/CVERecord?id=CVE-2024-26817) | [MaherAzzouzi/CVE-2024-26817-amdkfd](https://github.com/MaherAzzouzi/CVE-2024-26817-amdkfd) | Potential Integer Overflow Leading To Heap Overflow in AMD KFD. | 2024-04-14T12:25:50Z |
| [CVE-2024-2667](https://www.cve.org/CVERecord?id=CVE-2024-2667) | [Puvipavan/CVE-2024-2667](https://github.com/Puvipavan/CVE-2024-2667) | This is POC for CVE-2024-2667 (InstaWP Connect – 1-click WP Staging & Migration <= 0.1.0.22 - Unauthenticated Arbitrary File Upload) | 2024-04-28T17:14:47Z |
| [CVE-2024-26574](https://www.cve.org/CVERecord?id=CVE-2024-26574) | [Alaatk/CVE-2024-26574](https://github.com/Alaatk/CVE-2024-26574) | Wondershare Filmora v.13.0.51 - Insecure Permissions Privilege Escalation | 2024-04-04T13:44:08Z |
Expand Down Expand Up @@ -1337,6 +1340,7 @@ Last generated: 2024-09-13 02:11:25.009965
| [CVE-2024-20767](https://www.cve.org/CVERecord?id=CVE-2024-20767) | [huyqa/cve-2024-20767](https://github.com/huyqa/cve-2024-20767) | no description | 2024-03-28T07:46:31Z |
| [CVE-2024-20767](https://www.cve.org/CVERecord?id=CVE-2024-20767) | [Chocapikk/CVE-2024-20767](https://github.com/Chocapikk/CVE-2024-20767) | Exploit Toolkit for Adobe ColdFusion CVE-2024-20767 Vulnerability | 2024-03-26T19:17:14Z |
| [CVE-2024-20767](https://www.cve.org/CVERecord?id=CVE-2024-20767) | [Praison001/CVE-2024-20767-Adobe-ColdFusion](https://github.com/Praison001/CVE-2024-20767-Adobe-ColdFusion) | Exploit for CVE-2024-20767 affecting Adobe ColdFusion | 2024-04-01T09:01:30Z |
| [CVE-2024-20746](https://www.cve.org/CVERecord?id=CVE-2024-20746) | [200101WhoAmI/CVE-2024-20746](https://github.com/200101WhoAmI/CVE-2024-20746) | adobe premiere pro | 2024-08-21T05:29:10Z |
| [CVE-2024-2074](https://www.cve.org/CVERecord?id=CVE-2024-2074) | [yuziiiiiiiiii/CVE-2024-2074](https://github.com/yuziiiiiiiiii/CVE-2024-2074) | CVE-2024-2074 | 2024-02-29T12:30:37Z |
| [CVE-2024-20698](https://www.cve.org/CVERecord?id=CVE-2024-20698) | [RomanRybachek/CVE-2024-20698](https://github.com/RomanRybachek/CVE-2024-20698) | Analysis of the vulnerability | 2024-01-17T04:35:42Z |
| [CVE-2024-20696](https://www.cve.org/CVERecord?id=CVE-2024-20696) | [clearbluejar/CVE-2024-20696](https://github.com/clearbluejar/CVE-2024-20696) | no description | 2024-03-08T02:31:41Z |
Expand Down Expand Up @@ -1578,6 +1582,7 @@ Last generated: 2024-09-13 02:11:25.009965
| [CVE-2023-51385](https://www.cve.org/CVERecord?id=CVE-2023-51385) | [thinkliving2020/CVE-2023-51385-](https://github.com/thinkliving2020/CVE-2023-51385-) | CVE-2023-51385 | 2024-04-16T03:01:03Z |
| [CVE-2023-51385](https://www.cve.org/CVERecord?id=CVE-2023-51385) | [c0deur/CVE-2023-51385](https://github.com/c0deur/CVE-2023-51385) | no description | 2024-05-27T19:29:55Z |
| [CVE-2023-51385](https://www.cve.org/CVERecord?id=CVE-2023-51385) | [endasugrue/CVE-2023-51385_poc](https://github.com/endasugrue/CVE-2023-51385_poc) | no description | 2024-06-12T19:38:42Z |
| [CVE-2023-51385](https://www.cve.org/CVERecord?id=CVE-2023-51385) | [MiningBot-eth/CVE-2023-51385-exploit](https://github.com/MiningBot-eth/CVE-2023-51385-exploit) | no description | 2024-06-15T08:27:46Z |
| [CVE-2023-51281](https://www.cve.org/CVERecord?id=CVE-2023-51281) | [geraldoalcantara/CVE-2023-51281](https://github.com/geraldoalcantara/CVE-2023-51281) | Multiple cross-site scripting (XSS) vulnerabilities in /customer_support/ajax.php?action=save_customer in Customer Support System 1.0 allow authenticated attackers to execute to execute arbitrary web scripts or HTML via a crafted payload injected into the “firstname”, "lastname", "middlename", "contact" or “address” parameters. | 2023-12-22T15:51:43Z |
| [CVE-2023-51214](https://www.cve.org/CVERecord?id=CVE-2023-51214) | [chandraprarikraj/CVE-2023-51214](https://github.com/chandraprarikraj/CVE-2023-51214) | no description | 2023-12-20T21:23:33Z |
| [CVE-2023-51208](https://www.cve.org/CVERecord?id=CVE-2023-51208) | [16yashpatel/CVE-2023-51208](https://github.com/16yashpatel/CVE-2023-51208) | Arbitrary File Upload Vulnerability in ROS2 Foxy Fitzroy | 2024-01-10T18:08:37Z |
Expand Down Expand Up @@ -1785,6 +1790,7 @@ Last generated: 2024-09-13 02:11:25.009965
| [CVE-2023-4696](https://www.cve.org/CVERecord?id=CVE-2023-4696) | [mnqazi/CVE-2023-4696](https://github.com/mnqazi/CVE-2023-4696) | https://medium.com/@mnqazi/cve-2023-4696-account-takeover-due-to-improper-handling-of-jwt-tokens-in-memos-v0-13-2-13104e1412f3 | 2023-09-01T09:02:03Z |
| [CVE-2023-46954](https://www.cve.org/CVERecord?id=CVE-2023-46954) | [jakedmurphy1/CVE-2023-46954](https://github.com/jakedmurphy1/CVE-2023-46954) | no description | 2023-11-02T13:09:52Z |
| [CVE-2023-46948](https://www.cve.org/CVERecord?id=CVE-2023-46948) | [AzraelsBlade/CVE-2023-46948](https://github.com/AzraelsBlade/CVE-2023-46948) | no description | 2023-10-25T13:50:41Z |
| [CVE-2023-46870](https://www.cve.org/CVERecord?id=CVE-2023-46870) | [Chapoly1305/CVE-2023-46870](https://github.com/Chapoly1305/CVE-2023-46870) | no description | 2024-05-10T22:18:53Z |
| [CVE-2023-46865](https://www.cve.org/CVERecord?id=CVE-2023-46865) | [asylumdx/Crater-CVE-2023-46865-RCE](https://github.com/asylumdx/Crater-CVE-2023-46865-RCE) | Crater <=6.0.6, CVE-2023-46865 Post-Auth RCE (Superadmin) | 2023-11-09T21:22:47Z |
| [CVE-2023-4683](https://www.cve.org/CVERecord?id=CVE-2023-4683) | [Songg45/CVE-2023-4683-Test](https://github.com/Songg45/CVE-2023-4683-Test) | CVE-2023-4683 - Test | 2023-09-28T20:49:33Z |
| [CVE-2023-46813](https://www.cve.org/CVERecord?id=CVE-2023-46813) | [Freax13/cve-2023-46813-poc](https://github.com/Freax13/cve-2023-46813-poc) | no description | 2023-05-29T15:10:43Z |
Expand Down Expand Up @@ -2201,6 +2207,7 @@ Last generated: 2024-09-13 02:11:25.009965
| [CVE-2023-38831](https://www.cve.org/CVERecord?id=CVE-2023-38831) | [SpamixOfficial/CVE-2023-38831](https://github.com/SpamixOfficial/CVE-2023-38831) | CVE-2023-38831 Proof-of-concept code | 2023-12-12T14:54:30Z |
| [CVE-2023-38831](https://www.cve.org/CVERecord?id=CVE-2023-38831) | [youmulijiang/evil-winrar](https://github.com/youmulijiang/evil-winrar) | evil-winrar,CVE-2023-38831漏洞利用和社会工程学攻击框架 (evil-winrar, CVE-2023-38831 Vulnerability Exploitation and Social Engineering Attack Framework) | 2024-03-25T14:05:24Z |
| [CVE-2023-38831](https://www.cve.org/CVERecord?id=CVE-2023-38831) | [RomainBayle08/CVE-2023-38831](https://github.com/RomainBayle08/CVE-2023-38831) | no description | 2024-04-06T16:55:29Z |
| [CVE-2023-38831](https://www.cve.org/CVERecord?id=CVE-2023-38831) | [imbyter/imbyter-WinRAR_CVE-2023-38831](https://github.com/imbyter/imbyter-WinRAR_CVE-2023-38831) | WinRAR漏洞测试复现。详参:https://flowus.cn/share/a3b35db0-ab5e-4abc-b8d3-5ff284e82e7b | 2024-06-17T07:30:47Z |
| [CVE-2023-38829](https://www.cve.org/CVERecord?id=CVE-2023-38829) | [adhikara13/CVE-2023-38829-NETIS-WF2409E](https://github.com/adhikara13/CVE-2023-38829-NETIS-WF2409E) | no description | 2023-07-11T21:57:36Z |
| [CVE-2023-38822](https://www.cve.org/CVERecord?id=CVE-2023-38822) | [TraiLeR2/Corsair---DLL-Planting-CVE-2023-38822](https://github.com/TraiLeR2/Corsair---DLL-Planting-CVE-2023-38822) | DLL Planting in the Corsair iCUE v.5.3.102 CVE-2023-38822 | 2023-08-05T13:48:36Z |
| [CVE-2023-38821](https://www.cve.org/CVERecord?id=CVE-2023-38821) | [TraiLeR2/CoD-MW-Warzone-2---CVE-2023-38821](https://github.com/TraiLeR2/CoD-MW-Warzone-2---CVE-2023-38821) | DLL Planting in the CoD MW Warzone 2 - CVE-2023-38821 | 2023-08-05T13:57:42Z |
Expand Down Expand Up @@ -2802,6 +2809,7 @@ Last generated: 2024-09-13 02:11:25.009965
| [CVE-2023-28252](https://www.cve.org/CVERecord?id=CVE-2023-28252) | [Danasuley/CVE-2023-28252-](https://github.com/Danasuley/CVE-2023-28252-) | Обнаружение эксплойта CVE-2023-28252 | 2023-11-13T07:46:38Z |
| [CVE-2023-28252](https://www.cve.org/CVERecord?id=CVE-2023-28252) | [bkstephen/Compiled-PoC-Binary-For-CVE-2023-28252](https://github.com/bkstephen/Compiled-PoC-Binary-For-CVE-2023-28252) | The repo contains a precompiled binary which can be run on a Windows machine vulnerable to CVE-2023-28252 | 2024-01-01T15:30:33Z |
| [CVE-2023-28252](https://www.cve.org/CVERecord?id=CVE-2023-28252) | [duck-sec/CVE-2023-28252-Compiled-exe](https://github.com/duck-sec/CVE-2023-28252-Compiled-exe) | A modification to fortra's CVE-2023-28252 exploit, compiled to exe | 2024-01-22T10:38:02Z |
| [CVE-2023-28252](https://www.cve.org/CVERecord?id=CVE-2023-28252) | [Vulmatch/CVE-2023-28252](https://github.com/Vulmatch/CVE-2023-28252) | The TL;DR for the learnings of Windows Vulnerability CVE-2023-28252 | 2024-06-16T12:35:57Z |
| [CVE-2023-2825](https://www.cve.org/CVERecord?id=CVE-2023-2825) | [EmmanuelCruzL/CVE-2023-2825](https://github.com/EmmanuelCruzL/CVE-2023-2825) | On May 23, 2023 GitLab released version 16.0.1 which fixed a critical vulnerability, CVE-2023-2825, affecting the Community Edition (CE) and Enterprise Edition (EE) version 16.0.0. The vulnerability allows unauthenticated users to read arbitrary files through a path traversal bug. | 2023-06-05T18:16:51Z |
| [CVE-2023-2825](https://www.cve.org/CVERecord?id=CVE-2023-2825) | [hheeyywweellccoommee/CVE-2023-2825-zaskh](https://github.com/hheeyywweellccoommee/CVE-2023-2825-zaskh) | On May 23, 2023 GitLab released version 16.0.1 which fixed a critical vulnerability, CVE-2023-2825, affecting the Community Edition (CE) and Enterprise Edition (EE) version 16.0.0. The vulnerability allows unauthenticated users to read arbitrary files through a path traversal bug. | 2023-06-06T01:01:08Z |
| [CVE-2023-2825](https://www.cve.org/CVERecord?id=CVE-2023-2825) | [Occamsec/CVE-2023-2825](https://github.com/Occamsec/CVE-2023-2825) | GitLab CVE-2023-2825 PoC. This PoC leverages a path traversal vulnerability to retrieve the /etc/passwd file from a system running GitLab 16.0.0. | 2023-05-25T13:25:10Z |
Expand Down Expand Up @@ -3224,6 +3232,7 @@ Last generated: 2024-09-13 02:11:25.009965
| [CVE-2023-1326](https://www.cve.org/CVERecord?id=CVE-2023-1326) | [diego-tella/CVE-2023-1326-PoC](https://github.com/diego-tella/CVE-2023-1326-PoC) | A proof of concept for CVE-2023–1326 in apport-cli 2.26.0 | 2023-12-06T00:07:40Z |
| [CVE-2023-1326](https://www.cve.org/CVERecord?id=CVE-2023-1326) | [Pol-Ruiz/CVE-2023-1326](https://github.com/Pol-Ruiz/CVE-2023-1326) | Esto es una prueba de concepto propia i basica de la vulneravilidad CVE-2023-1326 | 2024-01-16T10:20:53Z |
| [CVE-2023-1326](https://www.cve.org/CVERecord?id=CVE-2023-1326) | [Sp3c73rSh4d0w/CVE-2023-1326](https://github.com/Sp3c73rSh4d0w/CVE-2023-1326) | no description | 2024-05-04T19:47:58Z |
| [CVE-2023-1326](https://www.cve.org/CVERecord?id=CVE-2023-1326) | [cve-2024/CVE-2023-1326-PoC](https://github.com/cve-2024/CVE-2023-1326-PoC) | no description | 2024-06-14T07:15:50Z |
| [CVE-2023-1273](https://www.cve.org/CVERecord?id=CVE-2023-1273) | [codeb0ss/CVE-2023-1273-PoC](https://github.com/codeb0ss/CVE-2023-1273-PoC) | Mass Exploit - CVE-2023-1273 / ND Shortcodes < LFI | 2023-09-12T00:10:58Z |
| [CVE-2023-1177](https://www.cve.org/CVERecord?id=CVE-2023-1177) | [iumiro/CVE-2023-1177-MLFlow](https://github.com/iumiro/CVE-2023-1177-MLFlow) | CVE for 2023 | 2023-07-23T10:12:27Z |
| [CVE-2023-1177](https://www.cve.org/CVERecord?id=CVE-2023-1177) | [tiyeume25112004/CVE-2023-1177-rebuild](https://github.com/tiyeume25112004/CVE-2023-1177-rebuild) | Learn more things, not suck all things | 2023-11-20T18:32:46Z |
Expand Down Expand Up @@ -3407,6 +3416,7 @@ Last generated: 2024-09-13 02:11:25.009965
| [CVE-2022-4061](https://www.cve.org/CVERecord?id=CVE-2022-4061) | [im-hanzou/UPGer](https://github.com/im-hanzou/UPGer) | Automatic Mass Tool for checking vulnerability in CVE-2022-4060 - WordPress Plugin : User Post Gallery <= 2.19 - Unauthenticated RCE | 2023-09-15T21:38:47Z |
| [CVE-2022-4061](https://www.cve.org/CVERecord?id=CVE-2022-4061) | [im-hanzou/INPGer](https://github.com/im-hanzou/INPGer) | Automatic Mass Tool for checking vulnerability in CVE-2022-4063 - InPost Gallery < 2.1.4.1 - Unauthenticated LFI to RCE | 2023-09-11T20:01:04Z |
| [CVE-2022-4047](https://www.cve.org/CVERecord?id=CVE-2022-4047) | [im-hanzou/WooRefer](https://github.com/im-hanzou/WooRefer) | Automatic Mass Tool for check and exploiting vulnerability in CVE-2022-4047 - Return Refund and Exchange For WooCommerce < 4.0.9 - Unauthenticated Arbitrary File Upload | 2023-09-26T07:23:44Z |
| [CVE-2022-4047](https://www.cve.org/CVERecord?id=CVE-2022-4047) | [entroychang/CVE-2022-4047](https://github.com/entroychang/CVE-2022-4047) | CVE-2022-4047 poc | 2023-12-14T07:36:01Z |
| [CVE-2022-40347](https://www.cve.org/CVERecord?id=CVE-2022-40347) | [h4md153v63n/CVE-2022-40347_Intern-Record-System-phone-V1.0-SQL-Injection-Vulnerability-Unauthenticated](https://github.com/h4md153v63n/CVE-2022-40347_Intern-Record-System-phone-V1.0-SQL-Injection-Vulnerability-Unauthenticated) | CVE-2022-40347: Intern Record System - 'phone', 'email', 'deptType' and 'name' SQL Injection (Unauthenticated) | 2023-02-16T02:16:51Z |
| [CVE-2022-40127](https://www.cve.org/CVERecord?id=CVE-2022-40127) | [jakabakos/CVE-2022-40127](https://github.com/jakabakos/CVE-2022-40127) | CVE-2022-40127 PoC and exploit | 2023-07-21T12:55:16Z |
| [CVE-2022-40032](https://www.cve.org/CVERecord?id=CVE-2022-40032) | [h4md153v63n/CVE-2022-40032_Simple-Task-Managing-System-V1.0-SQL-Injection-Vulnerability-Unauthenticated](https://github.com/h4md153v63n/CVE-2022-40032_Simple-Task-Managing-System-V1.0-SQL-Injection-Vulnerability-Unauthenticated) | CVE-2022-40032: Simple Task Managing System - 'login' and 'password' SQL Injection (Unauthenticated) | 2023-02-16T01:42:48Z |
Expand Down Expand Up @@ -3816,6 +3826,7 @@ Last generated: 2024-09-13 02:11:25.009965
| [CVE-2021-41773](https://www.cve.org/CVERecord?id=CVE-2021-41773) | [mightysai1997/CVE-2021-41773-PoC](https://github.com/mightysai1997/CVE-2021-41773-PoC) | no description | 2022-09-15T11:01:45Z |
| [CVE-2021-41773](https://www.cve.org/CVERecord?id=CVE-2021-41773) | [dileepdkumar/LayarKacaSiber-CVE-2021-41773](https://github.com/dileepdkumar/LayarKacaSiber-CVE-2021-41773) | no description | 2022-09-20T03:45:24Z |
| [CVE-2021-41773](https://www.cve.org/CVERecord?id=CVE-2021-41773) | [mightysai1997/CVE-2021-41773S](https://github.com/mightysai1997/CVE-2021-41773S) | no description | 2022-09-15T14:17:45Z |
| [CVE-2021-41773](https://www.cve.org/CVERecord?id=CVE-2021-41773) | [justakazh/mass_cve-2021-41773](https://github.com/justakazh/mass_cve-2021-41773) | MASS CVE-2021-41773 | 2021-10-07T15:13:18Z |
| [CVE-2021-41652](https://www.cve.org/CVERecord?id=CVE-2021-41652) | [deathflash1411/cve-2021-41652](https://github.com/deathflash1411/cve-2021-41652) | Missing Access Control in BatFlat CMS 1.3.6 | 2023-06-11T06:33:01Z |
| [CVE-2021-4154](https://www.cve.org/CVERecord?id=CVE-2021-4154) | [veritas501/CVE-2021-4154](https://github.com/veritas501/CVE-2021-4154) | CVE-2021-4154 | 2023-02-23T08:38:22Z |
| [CVE-2021-41277](https://www.cve.org/CVERecord?id=CVE-2021-41277) | [RubXkuB/PoC-Metabase-CVE-2021-41277](https://github.com/RubXkuB/PoC-Metabase-CVE-2021-41277) | no description | 2023-04-24T16:34:13Z |
Expand Down

0 comments on commit 52d491c

Please sign in to comment.