mirror of
https://github.com/fastfire/deepdarkCTI.git
synced 2025-12-05 20:40:22 -08:00
Merge branch 'main' into patch-147
This commit is contained in:
@@ -18,9 +18,15 @@
|
||||
|Fortinet |CVE-2022-42475 |Remote code execution (RCE)||
|
||||
|Fortinet |CVE-2022-39952 | Arbitrary file write | https://github.com/horizon3ai/CVE-2022-39952 |
|
||||
|Fortinet |CVE-2022-42475 |Remote code execution (RCE)|https://github.com/scrt/cve-2022-42475|
|
||||
|Fortinet |CVE-2024-21762 |Remote code execution (RCE)|https://github.com/d0rb/CVE-2024-21762|
|
||||
|Fortra |CVE-2023-0669 |Pre-authentication Command Injection |https://github.com/0xf4n9x/CVE-2023-0669|
|
||||
|F5 Big IP |CVE 2020-5902 |Remote code execution (RCE)|https://pentest-tools.com/blog/big-ip-tmui-rce/|
|
||||
|F5 Big IP |CVE-2022-1388 |Remote code execution (RCE)|https://github.com/alt3kx/CVE-2022-1388_PoC|
|
||||
|Ivanti |CVE-2023-46085 |Authentication Bypass ||
|
||||
|Ivanti |CVE-2024-21887 |Command injection |https://github.com/Chocapikk/CVE-2024-21887|
|
||||
|Ivanti |CVE-2024-21888 |Elevation of privilege (EOP) ||
|
||||
|Ivanti |CVE-2024-21893 |Authentication Bypass |https://github.com/h4x0r-dz/CVE-2024-21893.py|
|
||||
|Ivanti |CVE-2024-22024 |Authentication Bypass |https://github.com/0dteam/CVE-2024-22024|
|
||||
|Joomla |CVE-2023-23752 |Authentication Bypass |https://github.com/WhiteOwl-Pub/CVE-2023-23752|
|
||||
|Log4j |CVE-2021-44228 |Remote code execution (RCE)|https://github.com/kozmer/log4j-shell-poc|
|
||||
|ManageEngine |CVE-2022-35405 |Remote code execution (RCE)|https://github.com/viniciuspereiras/CVE-2022-35405|
|
||||
@@ -54,9 +60,10 @@
|
||||
|Telerik |CVE-2019-18935 |Remote code execution (RCE)|https://github.com/noperator/CVE-2019-18935|
|
||||
|Weblogic |CVE-2020-2555 |Remote code execution (RCE)|https://www.exploit-db.com/exploits/48508|
|
||||
|Vmware |CVE-2021-21972 |Remote code execution (RCE)|https://github.com/horizon3ai/CVE-2021-21972|
|
||||
|Vmware |CVE-2021-21985 |Remote code executon (RCE)|https://github.com/alt3kx/CVE-2021-21985_PoC|
|
||||
|Vmware |CVE-2023-20867 |Remote code executon (RCE)||
|
||||
|Vmware |CVE-2023-34048 |Remote Code ececution (RCE)||
|
||||
|Vmware |CVE-2021-21985 |Remote code execution (RCE)|https://github.com/alt3kx/CVE-2021-21985_PoC|
|
||||
|Vmware |CVE-2023-20867 |Remote code execution (RCE)||
|
||||
|Vmware |CVE-2023-34048 |Remote code execution (RCE)||
|
||||
|WinRar |CVE-2023-38831 |Remote code execution (RCE)|https://github.com/Garck3h/cve-2023-38831|
|
||||
|Zimbra |CVE-2022-41352 |Remote code execution (RCE)|https://github.com/segfault-it/cve-2022-41352|
|
||||
|Zimbra |CVE-2022-27925 |Path Traversal |https://github.com/Josexv1/CVE-2022-27925|
|
||||
|Zoho |CVE-2021-40539 |Remote code execution (RCE)|https://github.com/DarkSprings/CVE-2021-40539|
|
||||
|
||||
Reference in New Issue
Block a user