diff --git a/db/cve.sqlite b/db/cve.sqlite index cb48373..1fd4ea9 100644 Binary files a/db/cve.sqlite and b/db/cve.sqlite differ diff --git a/docs/README.md b/docs/README.md index 67f34eb..f609edd 100644 --- a/docs/README.md +++ b/docs/README.md @@ -2,10 +2,12 @@ > Automatic monitor github cve using Github Actions -Last generated: 2024-09-05 02:09:42.445910 +Last generated: 2024-09-06 02:09:47.425055 | CVE | Name | Description | Date | |---|---|---|---| +| [CVE-2024-7954](https://www.cve.org/CVERecord?id=CVE-2024-7954) | [Chocapikk/CVE-2024-7954](https://github.com/Chocapikk/CVE-2024-7954) | Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12 | 2024-08-10T20:15:41Z | +| [CVE-2024-7339](https://www.cve.org/CVERecord?id=CVE-2024-7339) | [RevoltSecurities/CVE-2024-7339](https://github.com/RevoltSecurities/CVE-2024-7339) | An Vulnerability detection and Exploitation tool for CVE-2024-7339 | 2024-08-05T16:26:18Z | | [CVE-2024-7188](https://www.cve.org/CVERecord?id=CVE-2024-7188) | [codeb0ss/CVE-2024-7188-PoC](https://github.com/codeb0ss/CVE-2024-7188-PoC) | Mass Exploit < [CVE-2024-7188 - Bylancer Quicklancer] - SQL Injection | 2024-07-30T10:51:24Z | | [CVE-2024-7120](https://www.cve.org/CVERecord?id=CVE-2024-7120) | [codeb0ss/CVE-2024-7120-PoC](https://github.com/codeb0ss/CVE-2024-7120-PoC) | Mass Exploit < [CVE-2024-7120 - Raisecom] - Command Injection | 2024-08-01T17:39:45Z | | [CVE-2024-6782](https://www.cve.org/CVERecord?id=CVE-2024-6782) | [zangjiahe/CVE-2024-6782](https://github.com/zangjiahe/CVE-2024-6782) | Calibre 远程代码执行(CVE-2024-6782)Improper access control in Calibre 6.9.0 ~ 7.14.0 allow unauthenticated attackers to achieve remote code execution. | 2024-08-06T15:31:48Z | @@ -229,6 +231,7 @@ Last generated: 2024-09-05 02:09:42.445910 | [CVE-2024-4323](https://www.cve.org/CVERecord?id=CVE-2024-4323) | [yuansec/CVE-2024-4323-dos_poc](https://github.com/yuansec/CVE-2024-4323-dos_poc) | no description | 2024-05-22T09:55:30Z | | [CVE-2024-4320](https://www.cve.org/CVERecord?id=CVE-2024-4320) | [bolkv/CVE-2024-4320](https://github.com/bolkv/CVE-2024-4320) | no description | 2024-08-08T03:54:38Z | | [CVE-2024-43044](https://www.cve.org/CVERecord?id=CVE-2024-43044) | [HwMex0/CVE-2024-43044](https://github.com/HwMex0/CVE-2024-43044) | The script checks Jenkins endpoints for CVE-2024-43044 by retrieving the Jenkins version from the innstance and comparing it against known vulnerable version ranges. | 2024-08-08T08:28:26Z | +| [CVE-2024-43044](https://www.cve.org/CVERecord?id=CVE-2024-43044) | [jenkinsci-cert/SECURITY-3430](https://github.com/jenkinsci-cert/SECURITY-3430) | This repository provides a workaround preventing exploitation of SECURITY-3430 / CVE-2024-43044 | 2024-08-08T11:55:32Z | | [CVE-2024-4295](https://www.cve.org/CVERecord?id=CVE-2024-4295) | [truonghuuphuc/CVE-2024-4295-Poc](https://github.com/truonghuuphuc/CVE-2024-4295-Poc) | CVE-2024-4295 Email Subscribers by Icegram Express <= 5.7.20 - Unauthenticated SQL Injection via hash | 2024-06-05T09:29:20Z | | [CVE-2024-4295](https://www.cve.org/CVERecord?id=CVE-2024-4295) | [cve-2024/CVE-2024-4295-Poc](https://github.com/cve-2024/CVE-2024-4295-Poc) | no description | 2024-06-14T07:04:36Z | | [CVE-2024-42461](https://www.cve.org/CVERecord?id=CVE-2024-42461) | [fevar54/CVE-2024-42461](https://github.com/fevar54/CVE-2024-42461) | Se han identificado problemas en la verificación de firmas ECDSA y EDDSA en el proyecto Wycheproof. Las comprobaciones ausentes durante la etapa de decodificación de firmas permiten agregar o eliminar bytes cero, lo que afecta la capacidad de envío de correos. | 2024-08-06T21:56:15Z | @@ -314,6 +317,8 @@ Last generated: 2024-09-05 02:09:42.445910 | [CVE-2024-38077](https://www.cve.org/CVERecord?id=CVE-2024-38077) | [Wlibang/CVE-2024-38077](https://github.com/Wlibang/CVE-2024-38077) | CVE-2024-38077,本仓库仅用作备份, | 2024-08-09T07:46:09Z | | [CVE-2024-38077](https://www.cve.org/CVERecord?id=CVE-2024-38077) | [SecStarBot/CVE-2024-38077-POC](https://github.com/SecStarBot/CVE-2024-38077-POC) | no description | 2024-08-09T01:24:59Z | | [CVE-2024-38077](https://www.cve.org/CVERecord?id=CVE-2024-38077) | [zhuxi1965/CVE-2024-38077-RDLCheck](https://github.com/zhuxi1965/CVE-2024-38077-RDLCheck) | 检测RDL服务是否运行,快速排查受影响资产 | 2024-08-10T01:10:06Z | +| [CVE-2024-38077](https://www.cve.org/CVERecord?id=CVE-2024-38077) | [atlassion/CVE-2024-38077-check](https://github.com/atlassion/CVE-2024-38077-check) | 基于135端口检测目标是否存在CVE-2024-38077漏洞 | 2024-08-10T12:49:51Z | +| [CVE-2024-38077](https://www.cve.org/CVERecord?id=CVE-2024-38077) | [lworld0x00/CVE-2024-38077-notes](https://github.com/lworld0x00/CVE-2024-38077-notes) | no description | 2024-08-10T06:31:04Z | | [CVE-2024-3806](https://www.cve.org/CVERecord?id=CVE-2024-3806) | [truonghuuphuc/CVE-2024-3806-AND-CVE-2024-3807-Poc](https://github.com/truonghuuphuc/CVE-2024-3806-AND-CVE-2024-3807-Poc) | CVE-2024-3806: Porto <= 7.1.0 - Unauthenticated Local File Inclusion via porto_ajax_posts CVE-2024-3807: Porto <= 7.1.0 - Authenticated (Contributor+) Local File Inclusion via Post Meta | 2024-05-10T16:13:07Z | | [CVE-2024-38041](https://www.cve.org/CVERecord?id=CVE-2024-38041) | [varwara/CVE-2024-38041](https://github.com/varwara/CVE-2024-38041) | Kernel pointers copied to output user mode buffer with ioctl 0x22A014 in the appid.sys driver. | 2024-07-21T02:29:18Z | | [CVE-2024-37889](https://www.cve.org/CVERecord?id=CVE-2024-37889) | [uname-s/CVE-2024-37889](https://github.com/uname-s/CVE-2024-37889) | no description | 2024-06-17T04:50:00Z | @@ -333,6 +338,7 @@ Last generated: 2024-09-05 02:09:42.445910 | [CVE-2024-37147](https://www.cve.org/CVERecord?id=CVE-2024-37147) | [0xmupa/CVE-2024-37147-PoC](https://github.com/0xmupa/CVE-2024-37147-PoC) | no description | 2024-07-11T10:20:00Z | | [CVE-2024-37085](https://www.cve.org/CVERecord?id=CVE-2024-37085) | [mahmutaymahmutay/CVE-2024-37085](https://github.com/mahmutaymahmutay/CVE-2024-37085) | Vulnerability Scanner for CVE-2024-37085 and Exploits ( For Educational Purpose only) | 2024-08-02T13:31:59Z | | [CVE-2024-37085](https://www.cve.org/CVERecord?id=CVE-2024-37085) | [Florian-Hoth/CVE-2024-37085-RCE-POC](https://github.com/Florian-Hoth/CVE-2024-37085-RCE-POC) | CVE-2024-37085 VMware ESXi RCE Vulnerability | 2024-08-06T18:23:43Z | +| [CVE-2024-37085](https://www.cve.org/CVERecord?id=CVE-2024-37085) | [WTN-arny/Vmware-ESXI](https://github.com/WTN-arny/Vmware-ESXI) | CVE-2024-37085 unauthenticated shell upload to full administrator on domain-joined esxi hypervisors. | 2024-08-12T17:44:17Z | | [CVE-2024-37081](https://www.cve.org/CVERecord?id=CVE-2024-37081) | [mbadanoiu/CVE-2024-37081](https://github.com/mbadanoiu/CVE-2024-37081) | CVE-2024-37081: Multiple Local Privilege Escalation in VMware vCenter Server | 2024-07-06T18:29:13Z | | [CVE-2024-37081](https://www.cve.org/CVERecord?id=CVE-2024-37081) | [Mr-r00t11/CVE-2024-37081](https://github.com/Mr-r00t11/CVE-2024-37081) | no description | 2024-07-09T16:14:41Z | | [CVE-2024-37081](https://www.cve.org/CVERecord?id=CVE-2024-37081) | [CERTologists/Modified-CVE-2024-37081-POC](https://github.com/CERTologists/Modified-CVE-2024-37081-POC) | no description | 2024-07-21T08:42:23Z | @@ -375,6 +381,7 @@ Last generated: 2024-09-05 02:09:42.445910 | [CVE-2024-34958](https://www.cve.org/CVERecord?id=CVE-2024-34958) | [Gr-1m/CVE-2024-34958](https://github.com/Gr-1m/CVE-2024-34958) | idccms CSRF poc | 2024-05-20T08:15:05Z | | [CVE-2024-3495](https://www.cve.org/CVERecord?id=CVE-2024-3495) | [truonghuuphuc/CVE-2024-3495-Poc](https://github.com/truonghuuphuc/CVE-2024-3495-Poc) | CVE-2024-3495 Country State City Dropdown CF7 <= 2.7.2 - Unauthenticated SQL Injection | 2024-05-23T02:41:15Z | | [CVE-2024-3495](https://www.cve.org/CVERecord?id=CVE-2024-3495) | [zomasec/CVE-2024-3495-POC](https://github.com/zomasec/CVE-2024-3495-POC) | The Country State City Dropdown CF7 WordPress plugin (versions up to 2.7.2) is vulnerable to SQL Injection via 'cnt' and 'sid' parameters. Insufficient escaping and lack of preparation in the SQL query allow unauthenticated attackers to append queries, potentially extracting sensitive database information. | 2024-05-28T02:57:12Z | +| [CVE-2024-34833](https://www.cve.org/CVERecord?id=CVE-2024-34833) | [ShellUnease/CVE-2024-34833-payroll-management-system-rce](https://github.com/ShellUnease/CVE-2024-34833-payroll-management-system-rce) | no description | 2024-05-02T10:37:56Z | | [CVE-2024-34832](https://www.cve.org/CVERecord?id=CVE-2024-34832) | [julio-cfa/CVE-2024-34832](https://github.com/julio-cfa/CVE-2024-34832) | CVE-2024-34832 | 2024-05-14T19:15:31Z | | [CVE-2024-34716](https://www.cve.org/CVERecord?id=CVE-2024-34716) | [aelmokhtar/CVE-2024-34716_PoC](https://github.com/aelmokhtar/CVE-2024-34716_PoC) | no description | 2024-05-14T18:48:41Z | | [CVE-2024-34693](https://www.cve.org/CVERecord?id=CVE-2024-34693) | [mbadanoiu/CVE-2024-34693](https://github.com/mbadanoiu/CVE-2024-34693) | CVE-2024-34693: Server Arbitrary File Read in Apache Superset | 2024-07-27T21:28:11Z | @@ -596,6 +603,7 @@ Last generated: 2024-09-05 02:09:42.445910 | [CVE-2024-31211](https://www.cve.org/CVERecord?id=CVE-2024-31211) | [Abdurahmon3236/-CVE-2024-31211](https://github.com/Abdurahmon3236/-CVE-2024-31211) | no description | 2024-08-03T19:26:55Z | | [CVE-2024-31210](https://www.cve.org/CVERecord?id=CVE-2024-31210) | [Abo5/CVE-2024-31210](https://github.com/Abo5/CVE-2024-31210) | This Ruby script checks if a given WordPress site is vulnerable to CVE-2024-31210, which allows administrator-level users on single-site installations and Super Admin-level users on Multisite installations to execute arbitrary PHP code via the plugin upload mechanism. | 2024-06-13T00:24:56Z | | [CVE-2024-3116](https://www.cve.org/CVERecord?id=CVE-2024-3116) | [TechieNeurons/CVE-2024-3116_RCE_in_pgadmin_8.4](https://github.com/TechieNeurons/CVE-2024-3116_RCE_in_pgadmin_8.4) | Making a lab and testing the CVE-2024-3116, a Remote Code Execution in pgadmin <=8.4 | 2024-04-07T23:03:55Z | +| [CVE-2024-3105](https://www.cve.org/CVERecord?id=CVE-2024-3105) | [hunThubSpace/CVE-2024-3105-PoC](https://github.com/hunThubSpace/CVE-2024-3105-PoC) | A PoC Exploit for CVE-2024-3105 - The Woody code snippets – Insert Header Footer Code, AdSense Ads plugin for WordPress Remote Code Execution (RCE) | 2024-08-10T14:52:44Z | | [CVE-2024-31025](https://www.cve.org/CVERecord?id=CVE-2024-31025) | [mortal-sec/CVE-2024-31025](https://github.com/mortal-sec/CVE-2024-31025) | Vulnerability verification | 2024-03-28T23:50:30Z | | [CVE-2024-30998](https://www.cve.org/CVERecord?id=CVE-2024-30998) | [efekaanakkar/CVE-2024-30998](https://github.com/efekaanakkar/CVE-2024-30998) | no description | 2024-03-30T11:18:21Z | | [CVE-2024-30973](https://www.cve.org/CVERecord?id=CVE-2024-30973) | [Athos-Zago/CVE-2024-30973](https://github.com/Athos-Zago/CVE-2024-30973) | POC VIDEO - https://youtu.be/hNzmkJj-ImM?si=NF0yoSL578rNy7wN | 2024-04-24T16:10:22Z | @@ -894,6 +902,7 @@ Last generated: 2024-09-05 02:09:42.445910 | [CVE-2024-26521](https://www.cve.org/CVERecord?id=CVE-2024-26521) | [hackervegas001/CVE-2024-26521](https://github.com/hackervegas001/CVE-2024-26521) | Html Injection vulnearbility in CE-Phoenix-v1.0.8.20 where malicious HTML code is inserted into a website. This can lead to a variety of issues, from minor website defacement to serious data breaches. | 2024-02-16T05:40:33Z | | [CVE-2024-26503](https://www.cve.org/CVERecord?id=CVE-2024-26503) | [RoboGR00t/Exploit-CVE-2024-26503](https://github.com/RoboGR00t/Exploit-CVE-2024-26503) | Exploit for Open eClass – CVE-2024-26503: Unrestricted File Upload Leads to Remote Code Execution | 2024-03-15T13:01:43Z | | [CVE-2024-26475](https://www.cve.org/CVERecord?id=CVE-2024-26475) | [TronciuVlad/CVE-2024-26475](https://github.com/TronciuVlad/CVE-2024-26475) | An issue in radareorg radare2 v.0.9.7 through v.5.8.6 and fixed in v.5.8.8 allows a local attacker to cause a denial of service via the grub_sfs_read_extent function. | 2024-03-10T22:51:05Z | +| [CVE-2024-26308](https://www.cve.org/CVERecord?id=CVE-2024-26308) | [crazycatMyopic/cve](https://github.com/crazycatMyopic/cve) | Docker Deskop giving issue CVE-2024-26308 for maven [reproduce] | 2024-08-11T14:10:14Z | | [CVE-2024-26304](https://www.cve.org/CVERecord?id=CVE-2024-26304) | [Roud-Roud-Agency/CVE-2024-26304-RCE-exploits](https://github.com/Roud-Roud-Agency/CVE-2024-26304-RCE-exploits) | Critical RCE Vulnerabilities in HPE Aruba Devices (may 2024) | 2024-05-04T10:09:24Z | | [CVE-2024-26230](https://www.cve.org/CVERecord?id=CVE-2024-26230) | [kiwids0220/CVE-2024-26230](https://github.com/kiwids0220/CVE-2024-26230) | no description | 2024-04-11T03:59:28Z | | [CVE-2024-26229](https://www.cve.org/CVERecord?id=CVE-2024-26229) | [RalfHacker/CVE-2024-26229-exploit](https://github.com/RalfHacker/CVE-2024-26229-exploit) | Windows LPE | 2024-06-11T08:03:29Z | @@ -1006,6 +1015,7 @@ Last generated: 2024-09-05 02:09:42.445910 | [CVE-2024-24590](https://www.cve.org/CVERecord?id=CVE-2024-24590) | [DemonPandaz2763/CVE-2024-24590](https://github.com/DemonPandaz2763/CVE-2024-24590) | Another CVE-2024-24590 poc | 2024-06-12T15:07:46Z | | [CVE-2024-24590](https://www.cve.org/CVERecord?id=CVE-2024-24590) | [junnythemarksman/CVE-2024-24590](https://github.com/junnythemarksman/CVE-2024-24590) | Deserialization of untrusted data can occur in versions 0.17.0 to 1.14.2 of the client SDK of Allegro AI’s ClearML platform, enabling a maliciously uploaded artifact to run arbitrary code on an end user’s system when interacted with. | 2024-06-20T11:23:56Z | | [CVE-2024-24590](https://www.cve.org/CVERecord?id=CVE-2024-24590) | [sviim/ClearML-CVE-2024-24590-RCE](https://github.com/sviim/ClearML-CVE-2024-24590-RCE) | With this script you can exploit the CVE-2024-24590 | 2024-07-21T04:16:24Z | +| [CVE-2024-24590](https://www.cve.org/CVERecord?id=CVE-2024-24590) | [Bigb972003/cve-2024-24590](https://github.com/Bigb972003/cve-2024-24590) | no description | 2024-08-11T09:21:08Z | | [CVE-2024-24576](https://www.cve.org/CVERecord?id=CVE-2024-24576) | [frostb1ten/CVE-2024-24576-PoC](https://github.com/frostb1ten/CVE-2024-24576-PoC) | Example of CVE-2024-24576 use case. | 2024-04-09T21:17:15Z | | [CVE-2024-24576](https://www.cve.org/CVERecord?id=CVE-2024-24576) | [aydinnyunus/CVE-2024-24576-Exploit](https://github.com/aydinnyunus/CVE-2024-24576-Exploit) | CVE-2024-24576 Proof of Concept | 2024-04-10T14:06:09Z | | [CVE-2024-24576](https://www.cve.org/CVERecord?id=CVE-2024-24576) | [dead1nfluence/Leantime-POC](https://github.com/dead1nfluence/Leantime-POC) | CVE-2024-27474, CVE-2024-27476, CVE-2024-27477 | 2024-04-04T13:58:33Z | @@ -1337,6 +1347,7 @@ Last generated: 2024-09-05 02:09:42.445910 | [CVE-2024-0967](https://www.cve.org/CVERecord?id=CVE-2024-0967) | [Oxdestiny/CVE-2024-0967-exploit](https://github.com/Oxdestiny/CVE-2024-0967-exploit) | ArcSight ESM up to 24.0 information disclosure proof-of-concept | 2024-03-01T22:31:38Z | | [CVE-2024-0844](https://www.cve.org/CVERecord?id=CVE-2024-0844) | [0x9567b/CVE-2024-0844](https://github.com/0x9567b/CVE-2024-0844) | CVE-2024-0844 - Popup More <= 2.2.4 - Authenticated (Admin+) Directory Traversal to Limited Local File Inclusion | 2023-12-31T15:36:51Z | | [CVE-2024-0757](https://www.cve.org/CVERecord?id=CVE-2024-0757) | [hunThubSpace/CVE-2024-0757-Exploit](https://github.com/hunThubSpace/CVE-2024-0757-Exploit) | A PoC Exploit for CVE-2024-0757 - Insert or Embed Articulate Content into WordPress Remote Code Execution (RCE) | 2024-06-17T07:46:21Z | +| [CVE-2024-0741](https://www.cve.org/CVERecord?id=CVE-2024-0741) | [HyHy100/Firefox-ANGLE-CVE-2024-0741](https://github.com/HyHy100/Firefox-ANGLE-CVE-2024-0741) | PoC for an OOB write vulnerability I reported to Mozilla in ANGLE Translator (aka WebGL Shader Compiler). | 2024-08-12T05:57:34Z | | [CVE-2024-0713](https://www.cve.org/CVERecord?id=CVE-2024-0713) | [kitodd/CVE-2024-0713](https://github.com/kitodd/CVE-2024-0713) | no description | 2024-03-12T08:32:26Z | | [CVE-2024-0710](https://www.cve.org/CVERecord?id=CVE-2024-0710) | [karlemilnikka/CVE-2024-0710](https://github.com/karlemilnikka/CVE-2024-0710) | Unauthenticated Form Submission Unique ID Modification | 2024-04-10T07:23:11Z | | [CVE-2024-0679](https://www.cve.org/CVERecord?id=CVE-2024-0679) | [RandomRobbieBF/CVE-2024-0679](https://github.com/RandomRobbieBF/CVE-2024-0679) | ColorMag <= 3.1.2 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Plugin Installation/Activation | 2024-01-19T22:30:51Z | @@ -1878,6 +1889,7 @@ Last generated: 2024-09-05 02:09:42.445910 | [CVE-2023-43667](https://www.cve.org/CVERecord?id=CVE-2023-43667) | [miguelc49/CVE-2023-43667-1](https://github.com/miguelc49/CVE-2023-43667-1) | no description | 2024-04-13T18:45:51Z | | [CVE-2023-43667](https://www.cve.org/CVERecord?id=CVE-2023-43667) | [miguelc49/CVE-2023-43667-2](https://github.com/miguelc49/CVE-2023-43667-2) | no description | 2024-04-13T18:45:45Z | | [CVE-2023-43654](https://www.cve.org/CVERecord?id=CVE-2023-43654) | [OligoCyberSecurity/ShellTorchChecker](https://github.com/OligoCyberSecurity/ShellTorchChecker) | A tool that checks if a TorchServe instance is vulnerable to CVE-2023-43654 | 2023-10-02T11:33:37Z | +| [CVE-2023-43654](https://www.cve.org/CVERecord?id=CVE-2023-43654) | [OligoCyberSecurity/CVE-2023-43654](https://github.com/OligoCyberSecurity/CVE-2023-43654) | Demo for CVE-2023-43654 - Remote Code Execution in PyTorch TorchServe | 2024-05-28T10:02:13Z | | [CVE-2023-43622](https://www.cve.org/CVERecord?id=CVE-2023-43622) | [visudade/CVE-2023-43622](https://github.com/visudade/CVE-2023-43622) | CVE-2023–43622 | 2024-05-29T13:04:29Z | | [CVE-2023-4357](https://www.cve.org/CVERecord?id=CVE-2023-4357) | [xcanwin/CVE-2023-4357-Chrome-XXE](https://github.com/xcanwin/CVE-2023-4357-Chrome-XXE) | 全球首款单文件利用 CVE-2023-4357 Chrome XXE 漏洞 EXP, 实现对访客者本地文件窃取. Chrome XXE vulnerability EXP, allowing attackers to obtain local files of visitors. | 2023-11-17T10:32:31Z | | [CVE-2023-4357](https://www.cve.org/CVERecord?id=CVE-2023-4357) | [passwa11/CVE-2023-4357-APT-Style-exploitation](https://github.com/passwa11/CVE-2023-4357-APT-Style-exploitation) | no description | 2023-11-21T05:39:15Z | @@ -3678,6 +3690,7 @@ Last generated: 2024-09-05 02:09:42.445910 | [CVE-2021-43798](https://www.cve.org/CVERecord?id=CVE-2021-43798) | [katseyres2/CVE-2021-43798](https://github.com/katseyres2/CVE-2021-43798) | no description | 2023-10-26T14:21:49Z | | [CVE-2021-43657](https://www.cve.org/CVERecord?id=CVE-2021-43657) | [c0n5n3d/CVE-2021-43657](https://github.com/c0n5n3d/CVE-2021-43657) | This is a reference/POC for CVE-2021-43657 | 2022-11-08T02:13:29Z | | [CVE-2021-43617](https://www.cve.org/CVERecord?id=CVE-2021-43617) | [Sybelle03/CVE-2021-43617](https://github.com/Sybelle03/CVE-2021-43617) | This is a reproduction of PHP Laravel 8.70.1 - Cross Site Scripting (XSS) to Cross Site Request Forgery (CSRF) vulnerability | 2023-06-08T08:05:36Z | +| [CVE-2021-43609](https://www.cve.org/CVERecord?id=CVE-2021-43609) | [d5sec/CVE-2021-43609-POC](https://github.com/d5sec/CVE-2021-43609-POC) | Proof of Concept Exploit for CVE-2021-43609 | 2023-11-06T21:13:21Z | | [CVE-2021-43503](https://www.cve.org/CVERecord?id=CVE-2021-43503) | [guoyanan1g/Laravel-vul](https://github.com/guoyanan1g/Laravel-vul) | 个人挖掘出来的漏洞CVE-2021-43503 | 2021-11-05T09:59:34Z | | [CVE-2021-43258](https://www.cve.org/CVERecord?id=CVE-2021-43258) | [MRvirusIR/CVE-2021-43258](https://github.com/MRvirusIR/CVE-2021-43258) | ChurchInfo 1.2.13-1.3.0 Remote Code Execution Exploit | 2022-11-26T09:00:10Z | | [CVE-2021-43226](https://www.cve.org/CVERecord?id=CVE-2021-43226) | [Rosayxy/cve-2021-43226PoC](https://github.com/Rosayxy/cve-2021-43226PoC) | a Proof of Concept of cve-2021-43226,stack overflow in Windows driver clfs.sys | 2023-10-30T06:47:50Z | @@ -6462,3 +6475,4 @@ Last generated: 2024-09-05 02:09:42.445910 | CVE NOT FOUND | [cdiwakar/CVE-2024](https://github.com/cdiwakar/CVE-2024) | no description | 2024-07-30T06:09:12Z | | CVE NOT FOUND | [Abdurahmon3236/CVE-2024-poc-s](https://github.com/Abdurahmon3236/CVE-2024-poc-s) | new poc's | 2024-08-02T11:31:59Z | | CVE NOT FOUND | [Stuub/Helios](https://github.com/Stuub/Helios) | Helios: Automated XSS Testing | 2024-07-20T05:37:32Z | +| CVE NOT FOUND | [ArjunSridharkumar/reproduce_cves_2024](https://github.com/ArjunSridharkumar/reproduce_cves_2024) | reproduce some CVES | 2024-07-18T04:45:39Z |