diff --git a/2009/CVE-2009-0689.json b/2009/CVE-2009-0689.json index 9fbb09e890..742ce03687 100644 --- a/2009/CVE-2009-0689.json +++ b/2009/CVE-2009-0689.json @@ -14,10 +14,10 @@ "description": "An implementation of CVE-2009-0689 for the Nintendo Wii.", "fork": false, "created_at": "2018-12-18T04:24:43Z", - "updated_at": "2024-12-08T13:18:23Z", + "updated_at": "2024-12-21T04:54:44Z", "pushed_at": "2019-09-30T23:38:11Z", - "stargazers_count": 74, - "watchers_count": 74, + "stargazers_count": 75, + "watchers_count": 75, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 74, + "watchers": 75, "score": 0, "subscribers_count": 7 } diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 658855b257..0b94df7401 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -1652,10 +1652,10 @@ "description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection", "fork": false, "created_at": "2020-06-10T16:44:39Z", - "updated_at": "2024-12-07T16:57:52Z", + "updated_at": "2024-12-21T05:10:57Z", "pushed_at": "2022-03-30T14:02:04Z", - "stargazers_count": 271, - "watchers_count": 271, + "stargazers_count": 272, + "watchers_count": 272, "has_discussions": false, "forks_count": 51, "allow_forking": true, @@ -1664,7 +1664,7 @@ "topics": [], "visibility": "public", "forks": 51, - "watchers": 271, + "watchers": 272, "score": 0, "subscribers_count": 7 }, diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index caa1868df0..b0d2f24e8a 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -2182,7 +2182,7 @@ "forks": 20, "watchers": 77, "score": 0, - "subscribers_count": 0 + "subscribers_count": 3 }, { "id": 452924557, diff --git a/2022/CVE-2022-21894.json b/2022/CVE-2022-21894.json index ec29624b0b..9a83316ebd 100644 --- a/2022/CVE-2022-21894.json +++ b/2022/CVE-2022-21894.json @@ -19,7 +19,7 @@ "stargazers_count": 317, "watchers_count": 317, "has_discussions": false, - "forks_count": 60, + "forks_count": 61, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -33,7 +33,7 @@ "windows-boot" ], "visibility": "public", - "forks": 60, + "forks": 61, "watchers": 317, "score": 0, "subscribers_count": 12 diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index db54a1f325..b4ba108558 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -441,10 +441,10 @@ "description": null, "fork": false, "created_at": "2022-06-05T20:35:38Z", - "updated_at": "2024-12-15T22:44:39Z", + "updated_at": "2024-12-21T04:26:27Z", "pushed_at": "2022-06-08T15:35:44Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -453,7 +453,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 7, + "watchers": 8, "score": 0, "subscribers_count": 1 }, diff --git a/2022/CVE-2022-3602.json b/2022/CVE-2022-3602.json index e8a122513c..1e02a156f7 100644 --- a/2022/CVE-2022-3602.json +++ b/2022/CVE-2022-3602.json @@ -14,10 +14,10 @@ "description": "Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3", "fork": false, "created_at": "2022-10-28T09:51:41Z", - "updated_at": "2024-11-13T18:00:42Z", + "updated_at": "2024-12-21T03:51:05Z", "pushed_at": "2022-11-18T15:47:17Z", - "stargazers_count": 529, - "watchers_count": 529, + "stargazers_count": 530, + "watchers_count": 530, "has_discussions": false, "forks_count": 110, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 110, - "watchers": 529, + "watchers": 530, "score": 0, "subscribers_count": 46 }, @@ -180,10 +180,10 @@ "description": null, "fork": false, "created_at": "2022-11-02T17:33:26Z", - "updated_at": "2023-04-07T08:25:52Z", + "updated_at": "2024-12-21T03:53:31Z", "pushed_at": "2022-11-02T17:33:46Z", - "stargazers_count": 17, - "watchers_count": 17, + "stargazers_count": 18, + "watchers_count": 18, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -192,7 +192,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 17, + "watchers": 18, "score": 0, "subscribers_count": 2 }, diff --git a/2022/CVE-2022-46463.json b/2022/CVE-2022-46463.json index bc4a0b2a90..5eb73a450d 100644 --- a/2022/CVE-2022-46463.json +++ b/2022/CVE-2022-46463.json @@ -45,19 +45,19 @@ "description": "harbor unauthorized detection", "fork": false, "created_at": "2023-03-21T10:40:19Z", - "updated_at": "2024-12-20T12:32:30Z", + "updated_at": "2024-12-21T04:46:10Z", "pushed_at": "2024-12-12T07:37:01Z", - "stargazers_count": 27, - "watchers_count": 27, + "stargazers_count": 28, + "watchers_count": 28, "has_discussions": false, - "forks_count": 5, + "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 5, - "watchers": 27, + "forks": 6, + "watchers": 28, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-24871.json b/2023/CVE-2023-24871.json index e22021bfe2..8593388115 100644 --- a/2023/CVE-2023-24871.json +++ b/2023/CVE-2023-24871.json @@ -14,10 +14,10 @@ "description": "pocs & exploit for CVE-2023-24871 (rce + lpe)", "fork": false, "created_at": "2024-06-21T15:01:15Z", - "updated_at": "2024-08-28T15:24:50Z", + "updated_at": "2024-12-21T05:46:27Z", "pushed_at": "2024-07-17T12:34:16Z", - "stargazers_count": 44, - "watchers_count": 44, + "stargazers_count": 45, + "watchers_count": 45, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 14, - "watchers": 44, + "watchers": 45, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-25690.json b/2023/CVE-2023-25690.json index 98512ea962..48081a5b1a 100644 --- a/2023/CVE-2023-25690.json +++ b/2023/CVE-2023-25690.json @@ -49,10 +49,10 @@ "description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.", "fork": false, "created_at": "2023-05-22T03:06:31Z", - "updated_at": "2024-12-14T21:15:43Z", + "updated_at": "2024-12-21T04:57:34Z", "pushed_at": "2024-08-24T13:38:50Z", - "stargazers_count": 273, - "watchers_count": 273, + "stargazers_count": 274, + "watchers_count": 274, "has_discussions": false, "forks_count": 36, "allow_forking": true, @@ -69,7 +69,7 @@ ], "visibility": "public", "forks": 36, - "watchers": 273, + "watchers": 274, "score": 0, "subscribers_count": 4 }, diff --git a/2023/CVE-2023-34830.json b/2023/CVE-2023-34830.json index c1a7d15fe4..9a4820fea4 100644 --- a/2023/CVE-2023-34830.json +++ b/2023/CVE-2023-34830.json @@ -28,6 +28,6 @@ "forks": 3, "watchers": 4, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-34960.json b/2023/CVE-2023-34960.json index eb196d1230..a528281c84 100644 --- a/2023/CVE-2023-34960.json +++ b/2023/CVE-2023-34960.json @@ -211,10 +211,10 @@ "description": "Automatic vuln scanner and exploiter for l7 ddos attacks using Chamilio CVE-2023-34960", "fork": false, "created_at": "2024-07-13T08:30:18Z", - "updated_at": "2024-11-06T23:17:03Z", + "updated_at": "2024-12-21T02:53:55Z", "pushed_at": "2024-10-21T18:24:28Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -239,7 +239,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-40028.json b/2023/CVE-2023-40028.json index 3e20ace544..212acaa026 100644 --- a/2023/CVE-2023-40028.json +++ b/2023/CVE-2023-40028.json @@ -122,5 +122,45 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 906469704, + "name": "CVE-2023-40028-Ghost-Arbitrary-File-Read", + "full_name": "monke443\/CVE-2023-40028-Ghost-Arbitrary-File-Read", + "owner": { + "login": "monke443", + "id": 131496421, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131496421?v=4", + "html_url": "https:\/\/github.com\/monke443", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/monke443\/CVE-2023-40028-Ghost-Arbitrary-File-Read", + "description": "Arbitrary file read in Ghost-CMS allows an attacker to upload a malicious ZIP file with a symlink.", + "fork": false, + "created_at": "2024-12-21T01:53:47Z", + "updated_at": "2024-12-21T02:51:46Z", + "pushed_at": "2024-12-21T02:51:43Z", + "stargazers_count": 2, + "watchers_count": 2, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "cve", + "cve-2023-40028", + "exploit", + "ghost-cms", + "github", + "pentesting", + "security", + "vulnerability" + ], + "visibility": "public", + "forks": 0, + "watchers": 2, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-41993.json b/2023/CVE-2023-41993.json index 4e796f90a6..a5e93caddc 100644 --- a/2023/CVE-2023-41993.json +++ b/2023/CVE-2023-41993.json @@ -14,7 +14,7 @@ "description": null, "fork": false, "created_at": "2023-10-15T12:14:18Z", - "updated_at": "2024-12-07T10:15:42Z", + "updated_at": "2024-12-21T00:56:57Z", "pushed_at": "2024-03-08T12:57:53Z", "stargazers_count": 196, "watchers_count": 196, diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index 93837ab584..6855a11580 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -245,6 +245,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-4863.json b/2023/CVE-2023-4863.json index 22b7c53ef9..607ef3e286 100644 --- a/2023/CVE-2023-4863.json +++ b/2023/CVE-2023-4863.json @@ -231,10 +231,10 @@ "description": null, "fork": false, "created_at": "2023-12-18T23:12:25Z", - "updated_at": "2024-11-07T20:36:14Z", + "updated_at": "2024-12-21T01:54:59Z", "pushed_at": "2024-05-13T17:40:58Z", - "stargazers_count": 46, - "watchers_count": 46, + "stargazers_count": 47, + "watchers_count": 47, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -243,7 +243,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 46, + "watchers": 47, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index 1ee3e4685f..86c09a939b 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -14,10 +14,10 @@ "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "fork": false, "created_at": "2024-03-20T21:16:41Z", - "updated_at": "2024-12-20T11:54:25Z", + "updated_at": "2024-12-21T00:36:25Z", "pushed_at": "2024-04-17T16:09:54Z", - "stargazers_count": 2306, - "watchers_count": 2306, + "stargazers_count": 2307, + "watchers_count": 2307, "has_discussions": false, "forks_count": 299, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 299, - "watchers": 2306, + "watchers": 2307, "score": 0, "subscribers_count": 26 }, diff --git a/2024/CVE-2024-24919.json b/2024/CVE-2024-24919.json index 195e2b9a80..951cccd474 100644 --- a/2024/CVE-2024-24919.json +++ b/2024/CVE-2024-24919.json @@ -1734,5 +1734,36 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 906477862, + "name": "Check-Point_poc", + "full_name": "NingXin2002\/Check-Point_poc", + "owner": { + "login": "NingXin2002", + "id": 138864342, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/138864342?v=4", + "html_url": "https:\/\/github.com\/NingXin2002", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/NingXin2002\/Check-Point_poc", + "description": "Check-Point安全网关任意文件读取漏洞(CVE-2024-24919)", + "fork": false, + "created_at": "2024-12-21T02:42:10Z", + "updated_at": "2024-12-21T02:43:44Z", + "pushed_at": "2024-12-21T02:43:40Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-27292.json b/2024/CVE-2024-27292.json index 30fd916a89..dcfa52879f 100644 --- a/2024/CVE-2024-27292.json +++ b/2024/CVE-2024-27292.json @@ -29,5 +29,36 @@ "watchers": 8, "score": 0, "subscribers_count": 1 + }, + { + "id": 906487773, + "name": "Docassemble_poc", + "full_name": "NingXin2002\/Docassemble_poc", + "owner": { + "login": "NingXin2002", + "id": 138864342, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/138864342?v=4", + "html_url": "https:\/\/github.com\/NingXin2002", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/NingXin2002\/Docassemble_poc", + "description": "Docassemble任意文件读取漏洞(CVE-2024-27292)", + "fork": false, + "created_at": "2024-12-21T03:35:19Z", + "updated_at": "2024-12-21T03:37:01Z", + "pushed_at": "2024-12-21T03:36:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-30052.json b/2024/CVE-2024-30052.json index 270a1b80b8..e525e73612 100644 --- a/2024/CVE-2024-30052.json +++ b/2024/CVE-2024-30052.json @@ -14,10 +14,10 @@ "description": "Materials for CVE-2024-30052.", "fork": false, "created_at": "2024-10-04T19:09:45Z", - "updated_at": "2024-10-28T19:44:45Z", + "updated_at": "2024-12-21T05:56:21Z", "pushed_at": "2024-10-04T20:28:39Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 10, + "watchers": 11, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-38063.json b/2024/CVE-2024-38063.json index 571ee98d13..7c4bc3821c 100644 --- a/2024/CVE-2024-38063.json +++ b/2024/CVE-2024-38063.json @@ -239,13 +239,13 @@ "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, - "forks_count": 1, + "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 0, "watchers": 5, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-41713.json b/2024/CVE-2024-41713.json index b264734dbb..5ae1a7a62d 100644 --- a/2024/CVE-2024-41713.json +++ b/2024/CVE-2024-41713.json @@ -29,5 +29,36 @@ "watchers": 12, "score": 0, "subscribers_count": 1 + }, + { + "id": 906475087, + "name": "CVE-2024-41713POC", + "full_name": "zxj-hub\/CVE-2024-41713POC", + "owner": { + "login": "zxj-hub", + "id": 192207002, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/192207002?v=4", + "html_url": "https:\/\/github.com\/zxj-hub", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/zxj-hub\/CVE-2024-41713POC", + "description": "Mitel MiCollab 企业协作平台 任意文件读取漏洞(CVE-2024-41713)由于Mitel MiCollab软件的 NuPoint 统一消息 (NPM) 组件中存在身份验证绕过漏洞,并且输入验证不足,未经身份验证的远程攻击者可利用该漏洞执行路径遍历攻击,成功利用可能导致未授权访问、破坏或删除用户的数据和系统配置。影响范围:version < MiCollab 9.8 SP2 (9.8.2.12)", + "fork": false, + "created_at": "2024-12-21T02:26:26Z", + "updated_at": "2024-12-21T02:28:26Z", + "pushed_at": "2024-12-21T02:28:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-50379.json b/2024/CVE-2024-50379.json index 219596b48e..c1c511fb82 100644 --- a/2024/CVE-2024-50379.json +++ b/2024/CVE-2024-50379.json @@ -76,10 +76,10 @@ "description": "Apache Tomcat(CVE-2024-50379)条件竞争致远程代码执行漏洞批量检测脚本", "fork": false, "created_at": "2024-12-20T05:24:10Z", - "updated_at": "2024-12-20T16:26:15Z", + "updated_at": "2024-12-21T02:16:44Z", "pushed_at": "2024-12-20T05:41:23Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 0 }, diff --git a/2024/CVE-2024-50945.json b/2024/CVE-2024-50945.json index 495e100b4a..36886d3279 100644 --- a/2024/CVE-2024-50945.json +++ b/2024/CVE-2024-50945.json @@ -11,10 +11,10 @@ "user_view_type": "public" }, "html_url": "https:\/\/github.com\/AbdullahAlmutawa\/CVE-2024-50945", - "description": "SimplCommerce is affected by a broken access control vulnerability in the review system, allowing unauthorized users to post reviews for products they have not purchased.", + "description": "SimplCommerce is affected by a Broken Access Control vulnerability in the review system, allowing unauthorized users to post reviews for products they have not purchased.", "fork": false, "created_at": "2024-12-20T00:43:18Z", - "updated_at": "2024-12-20T21:18:15Z", + "updated_at": "2024-12-21T01:25:07Z", "pushed_at": "2024-12-20T21:18:11Z", "stargazers_count": 0, "watchers_count": 0, diff --git a/2024/CVE-2024-53677.json b/2024/CVE-2024-53677.json index b5b1acf295..8f8da3ee2e 100644 --- a/2024/CVE-2024-53677.json +++ b/2024/CVE-2024-53677.json @@ -45,10 +45,10 @@ "description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.", "fork": false, "created_at": "2024-12-13T17:42:55Z", - "updated_at": "2024-12-21T00:26:13Z", + "updated_at": "2024-12-21T01:51:32Z", "pushed_at": "2024-12-20T10:05:15Z", - "stargazers_count": 64, - "watchers_count": 64, + "stargazers_count": 65, + "watchers_count": 65, "has_discussions": false, "forks_count": 27, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 27, - "watchers": 64, + "watchers": 65, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-56145.json b/2024/CVE-2024-56145.json index b449c26cf9..d57e2bd8d0 100644 --- a/2024/CVE-2024-56145.json +++ b/2024/CVE-2024-56145.json @@ -14,19 +14,19 @@ "description": "Unauthenticated RCE on CraftCMS when PHP `register_argc_argv` config setting is enabled", "fork": false, "created_at": "2024-12-20T03:34:01Z", - "updated_at": "2024-12-20T21:18:42Z", + "updated_at": "2024-12-21T05:14:20Z", "pushed_at": "2024-12-20T04:26:44Z", - "stargazers_count": 13, - "watchers_count": 13, + "stargazers_count": 16, + "watchers_count": 16, "has_discussions": false, - "forks_count": 4, + "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 4, - "watchers": 13, + "forks": 6, + "watchers": 16, "score": 0, "subscribers_count": 0 } diff --git a/README.md b/README.md index 8f84e9a069..58075f1e63 100644 --- a/README.md +++ b/README.md @@ -3560,6 +3560,7 @@ - [geniuszlyy/CVE-2024-24919](https://github.com/geniuszlyy/CVE-2024-24919) - [skyrowalker/CVE-2024-24919](https://github.com/skyrowalker/CVE-2024-24919) - [sar-3mar/CVE-2024-24919_POC](https://github.com/sar-3mar/CVE-2024-24919_POC) +- [NingXin2002/Check-Point_poc](https://github.com/NingXin2002/Check-Point_poc) ### CVE-2024-24926 (2024-02-12) @@ -3930,6 +3931,7 @@ - [th3gokul/CVE-2024-27292](https://github.com/th3gokul/CVE-2024-27292) +- [NingXin2002/Docassemble_poc](https://github.com/NingXin2002/Docassemble_poc) ### CVE-2024-27316 (2024-04-04) @@ -6210,6 +6212,7 @@ - [watchtowrlabs/Mitel-MiCollab-Auth-Bypass_CVE-2024-41713](https://github.com/watchtowrlabs/Mitel-MiCollab-Auth-Bypass_CVE-2024-41713) +- [zxj-hub/CVE-2024-41713POC](https://github.com/zxj-hub/CVE-2024-41713POC) ### CVE-2024-41958 (2024-08-05) @@ -13487,6 +13490,7 @@ - [BBSynapse/CVE-2023-40028](https://github.com/BBSynapse/CVE-2023-40028) - [0xDTC/Ghost-5.58-Arbitrary-File-Read-CVE-2023-40028](https://github.com/0xDTC/Ghost-5.58-Arbitrary-File-Read-CVE-2023-40028) - [sudlit/CVE-2023-40028](https://github.com/sudlit/CVE-2023-40028) +- [monke443/CVE-2023-40028-Ghost-Arbitrary-File-Read](https://github.com/monke443/CVE-2023-40028-Ghost-Arbitrary-File-Read) ### CVE-2023-40031 (2023-08-25)