2024-02-28 08:00:13.191639
Automatic Systems SOC FL9600 FastLine – Backdoor Account Vulnerability exploit
https://sploitus.com/exploit?id=1337DAY-ID-39374
WordPress Canto Plugin < 3.0.5 – Remote File Inclusion and Remote Code Execution Exploit exploit
https://sploitus.com/exploit?id=1337DAY-ID-39376
Ubuntu 22.04 perl2exe < V30.10C – Arbitrary Code Execution Vulnerability exploit
https://sploitus.com/exploit?id=1337DAY-ID-39375
Automatic Systems SOC FL9600 FastLine – Directory Transversal Vulnerability exploit
https://sploitus.com/exploit?id=1337DAY-ID-39373
Zoo Management System 1.0 – Unauthenticated Remote Code Execute Vulnerability exploit
https://sploitus.com/exploit?id=1337DAY-ID-39369
TEM Opera Plus FM Family Transmitter 35.45 – Remote Code Execution Vulnerability exploit
https://sploitus.com/exploit?id=1337DAY-ID-39377
Atlassian Confluence Data Center and Server – Authentication Bypass Exploit exploit
https://sploitus.com/exploit?id=1337DAY-ID-39379
TEM Opera Plus FM Family Transmitter 35.45 – XSRF Vulnerability exploit
https://sploitus.com/exploit?id=1337DAY-ID-39378
#######################################################################
# CVE proof-of-concept codes
# Summary Date: 2024-02-28 00:00:00 (UTC/GMT+9)
#
# This list compiles proof-of-concept codes that allow vulnerability verification for CVE vulnerabilities.
# Proof-of-concept codes are gathered based on publicly available information.
# This is not guarantee 100% functionality.
# The sharing of resources is intended to enable enterprise security engineers and penetration testers
# to utilize them in vulnerability assessment tasks in line with the concept of proof-of-concept.
#
# We hope this is helpful for someone in need.
#
# If you want to receive real time feeds on this list join the channel
# https://t.me/FLfFW5Nq4g80ZmY1
#
# (github) https://github.com/password123456/analyzed-cvelist
#######################################################################
no datetime cve_id link
1 44:49.5 CVE-2024-1346 https://github.com/PeterGabaldon/CVE-2024-1346
2 44:49.5 CVE-2023-38041 https://github.com/ewilded/CVE-2023-38041-POC
3 44:49.5 CVE-2020-3452 https://github.com/imhunterand/CVE-2020-3452
4 44:49.5 CVE-2020-10189 https://github.com/BLACKpwn/Remote_Code_Execution-
5 44:49.5 CVE-2023-22515 https://github.com/rxerium/CVE-2023-22515
6 44:49.5 CVE-2024-1709 https://github.com/HussainFathy/CVE-2024-1709
7 44:49.5 CVE-2020-36730 https://github.com/RandomRobbieBF/CVE-2020-36730
8 44:49.5 CVE-2024-21413 https://github.com/ahmetkarakayaoffical/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability
9 44:49.5 CVE-2024-1651 https://github.com/sharpicx/CVE-2024-1651-PoC
10 44:49.5 CVE-2024-22243 https://github.com/shellfeel/CVE-2024-22243-CVE-2024-22234
11 02:02.3 CVE-2024-23897 https://github.com/Abo5/CVE-2024-23897
12 02:02.3 CVE-2023-22527 https://github.com/M0untainShley/CVE-2023-22527-MEMSHELL
13 02:02.1 CVE-2024-26560 https://github.com/sajaljat/CVE-2024-26560
14 02:02.1 CVE-2024-26535 https://github.com/sajaljat/CVE-2024-26535
15 02:02.1 CVE-2023-52160 https://github.com/Helica-core/eap_pwn
16 01:02.1 CVE-2023-41892 https://github.com/acesoyeo/CVE-2023-41892
17 02:03.0 CVE-2022-30525 https://github.com/arajsingh-infosec/CVE-2022-30525_Exploit
18 02:02.5 CVE-2024-1071 https://github.com/gbrsh/CVE-2024-1071
19 02:02.5 CVE-2023-6654 https://github.com/qfmy1024/CVE-2023-6654
20 02:02.3 CVE-2024-0197 https://github.com/ewilded/CVE-2024-0197-POC
21 02:02.3 CVE-2023-7016 https://github.com/ewilded/CVE-2023-7016-POC
22 02:02.3 CVE-2017-2903 https://github.com/SpiralBL0CK/dpx_work_CVE-2017-2903
