Auto Update 2025/01/03 18:32:25

This commit is contained in:
motikan2010-bot 2025-01-04 03:32:25 +09:00
parent 99448ee771
commit 2a366a4f22
29 changed files with 219 additions and 99 deletions

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2015-09-08T14:37:25Z",
"updated_at": "2017-03-17T07:12:48Z",
"updated_at": "2025-01-03T12:20:42Z",
"pushed_at": "2015-09-08T14:40:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},

View file

@ -45,10 +45,10 @@
"description": "OpenSSL CVE-2014-0160 Heartbleed vulnerability test",
"fork": false,
"created_at": "2014-04-08T04:25:23Z",
"updated_at": "2024-12-20T15:54:03Z",
"updated_at": "2025-01-03T16:50:21Z",
"pushed_at": "2014-05-27T22:32:26Z",
"stargazers_count": 450,
"watchers_count": 450,
"stargazers_count": 451,
"watchers_count": 451,
"has_discussions": false,
"forks_count": 86,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 86,
"watchers": 450,
"watchers": 451,
"score": 0,
"subscribers_count": 30
},
@ -169,10 +169,10 @@
"description": "Multi-threaded tool for scanning many hosts for CVE-2014-0160.",
"fork": false,
"created_at": "2014-04-08T10:10:43Z",
"updated_at": "2024-08-12T19:23:38Z",
"updated_at": "2025-01-03T16:50:42Z",
"pushed_at": "2015-07-02T14:47:31Z",
"stargazers_count": 572,
"watchers_count": 572,
"stargazers_count": 573,
"watchers_count": 573,
"has_discussions": false,
"forks_count": 213,
"allow_forking": true,
@ -181,7 +181,7 @@
"topics": [],
"visibility": "public",
"forks": 213,
"watchers": 572,
"watchers": 573,
"score": 0,
"subscribers_count": 57
},

View file

@ -14,8 +14,8 @@
"description": "Fork of the send module to deal with CVE-2017-20165",
"fork": false,
"created_at": "2023-01-11T10:20:27Z",
"updated_at": "2024-12-29T10:28:34Z",
"pushed_at": "2024-12-22T17:22:54Z",
"updated_at": "2025-01-03T17:29:40Z",
"pushed_at": "2025-01-03T17:29:41Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,

View file

@ -107,10 +107,10 @@
"description": "This python file will decrypt the configurationFile used by hikvision cameras vulnerable to CVE-2017-7921.",
"fork": false,
"created_at": "2021-01-29T16:08:35Z",
"updated_at": "2024-12-25T13:08:20Z",
"updated_at": "2025-01-03T14:57:57Z",
"pushed_at": "2021-01-29T16:22:39Z",
"stargazers_count": 100,
"watchers_count": 100,
"stargazers_count": 101,
"watchers_count": 101,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 100,
"watchers": 101,
"score": 0,
"subscribers_count": 3
},

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -138,10 +138,10 @@
"description": "CVE-2019-2890 WebLogic 反序列化RCE漏洞",
"fork": false,
"created_at": "2019-12-08T05:03:32Z",
"updated_at": "2024-11-25T09:55:59Z",
"updated_at": "2025-01-03T14:34:21Z",
"pushed_at": "2019-12-08T05:50:42Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -150,7 +150,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 42,
"watchers": 43,
"score": 0,
"subscribers_count": 2
},

View file

@ -467,7 +467,7 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -476,7 +476,7 @@
"penetration-testing"
],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 5,
"score": 0,
"subscribers_count": 2

View file

@ -14,10 +14,10 @@
"description": "Disclosure report of CVE-2020-9038",
"fork": false,
"created_at": "2020-02-27T11:02:16Z",
"updated_at": "2024-08-12T19:58:10Z",
"updated_at": "2025-01-03T18:12:10Z",
"pushed_at": "2020-02-27T11:38:30Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "CVE-2021-27928 MariaDB\/MySQL-'wsrep provider' 命令注入漏洞",
"fork": false,
"created_at": "2021-04-15T06:40:49Z",
"updated_at": "2024-10-06T15:29:45Z",
"updated_at": "2025-01-03T13:24:24Z",
"pushed_at": "2023-06-29T15:57:12Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 61,
"watchers_count": 61,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 60,
"watchers": 61,
"score": 0,
"subscribers_count": 1
},

View file

@ -3749,10 +3749,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2025-01-03T06:15:33Z",
"updated_at": "2025-01-03T17:53:38Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3405,
"watchers_count": 3405,
"stargazers_count": 3404,
"watchers_count": 3404,
"has_discussions": true,
"forks_count": 739,
"allow_forking": true,
@ -3761,7 +3761,7 @@
"topics": [],
"visibility": "public",
"forks": 739,
"watchers": 3405,
"watchers": 3404,
"score": 0,
"subscribers_count": 55
},
@ -12768,7 +12768,7 @@
"fork": false,
"created_at": "2025-01-03T10:15:17Z",
"updated_at": "2025-01-03T10:15:21Z",
"pushed_at": "2025-01-03T10:18:47Z",
"pushed_at": "2025-01-03T16:36:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -501,10 +501,10 @@
"description": "CVE-2022-29464 PoC for WSO2 products",
"fork": false,
"created_at": "2022-06-04T16:46:52Z",
"updated_at": "2024-11-25T04:18:25Z",
"updated_at": "2025-01-03T16:28:31Z",
"pushed_at": "2022-06-04T17:55:28Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -513,7 +513,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -51,10 +51,10 @@
"description": "Exploit for PrestaShop bockwishlist module 2.1.0 SQLi (CVE-2022-31101)",
"fork": false,
"created_at": "2022-08-09T10:29:48Z",
"updated_at": "2024-08-12T20:26:01Z",
"updated_at": "2025-01-03T17:27:02Z",
"pushed_at": "2022-08-09T14:55:35Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -68,7 +68,7 @@
],
"visibility": "public",
"forks": 13,
"watchers": 26,
"watchers": 25,
"score": 0,
"subscribers_count": 2
}

View file

@ -146,10 +146,10 @@
"description": "PoC for CVE-2022-46169 - Unauthenticated RCE on Cacti <= 1.2.22",
"fork": false,
"created_at": "2023-01-05T16:56:06Z",
"updated_at": "2024-11-30T08:26:52Z",
"updated_at": "2025-01-03T17:25:08Z",
"pushed_at": "2023-05-05T18:06:58Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -162,7 +162,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 30,
"watchers": 29,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2023-28434 nuclei templates",
"fork": false,
"created_at": "2023-03-23T14:44:24Z",
"updated_at": "2024-06-21T10:46:37Z",
"updated_at": "2025-01-03T14:32:47Z",
"pushed_at": "2023-03-23T15:53:05Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 32,
"watchers": 33,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2025-01-03T06:37:24Z",
"updated_at": "2025-01-03T17:36:59Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1323,
"watchers_count": 1323,
"stargazers_count": 1332,
"watchers_count": 1332,
"has_discussions": false,
"forks_count": 227,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 227,
"watchers": 1323,
"watchers": 1332,
"score": 0,
"subscribers_count": 21
},

View file

@ -699,7 +699,7 @@
"fork": false,
"created_at": "2024-04-17T13:10:34Z",
"updated_at": "2024-10-30T15:47:10Z",
"pushed_at": "2024-12-27T16:46:46Z",
"pushed_at": "2025-01-03T16:59:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-10793 poc exploit",
"fork": false,
"created_at": "2024-11-17T18:44:53Z",
"updated_at": "2024-12-30T01:27:43Z",
"updated_at": "2025-01-03T14:51:08Z",
"pushed_at": "2024-11-17T19:51:53Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2025-01-03T10:51:03Z",
"updated_at": "2025-01-03T15:13:52Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2317,
"watchers_count": 2317,
"stargazers_count": 2318,
"watchers_count": 2318,
"has_discussions": false,
"forks_count": 300,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 300,
"watchers": 2317,
"watchers": 2318,
"score": 0,
"subscribers_count": 26
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-12356: Improper Neutralization of Special Elements used in a Command ('Command Injection') (CWE-77)",
"fork": false,
"created_at": "2024-12-17T15:01:37Z",
"updated_at": "2024-12-27T01:00:33Z",
"updated_at": "2025-01-03T13:01:56Z",
"pushed_at": "2024-12-17T15:31:40Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-12-14T09:22:33Z",
"updated_at": "2025-01-02T23:24:33Z",
"updated_at": "2025-01-03T14:51:17Z",
"pushed_at": "2024-12-14T10:13:45Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 33,
"watchers": 34,
"score": 0,
"subscribers_count": 3
},

View file

@ -200,8 +200,8 @@
"description": "Zabbix CVE-2024-42327 PoC",
"fork": false,
"created_at": "2025-01-01T18:25:44Z",
"updated_at": "2025-01-02T20:40:49Z",
"pushed_at": "2025-01-02T20:40:45Z",
"updated_at": "2025-01-03T13:49:06Z",
"pushed_at": "2025-01-03T13:49:03Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,

View file

@ -14,19 +14,19 @@
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113",
"fork": false,
"created_at": "2025-01-01T15:48:38Z",
"updated_at": "2025-01-03T12:27:54Z",
"updated_at": "2025-01-03T18:07:23Z",
"pushed_at": "2025-01-02T16:07:23Z",
"stargazers_count": 304,
"watchers_count": 304,
"stargazers_count": 319,
"watchers_count": 319,
"has_discussions": false,
"forks_count": 66,
"forks_count": 70,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 66,
"watchers": 304,
"forks": 70,
"watchers": 319,
"score": 0,
"subscribers_count": 2
},
@ -45,10 +45,10 @@
"description": null,
"fork": false,
"created_at": "2025-01-03T07:05:33Z",
"updated_at": "2025-01-03T08:20:06Z",
"updated_at": "2025-01-03T17:00:41Z",
"pushed_at": "2025-01-03T08:20:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -45,10 +45,10 @@
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
"fork": false,
"created_at": "2024-12-13T17:42:55Z",
"updated_at": "2025-01-02T13:20:33Z",
"updated_at": "2025-01-03T14:51:03Z",
"pushed_at": "2024-12-20T10:05:15Z",
"stargazers_count": 79,
"watchers_count": 79,
"stargazers_count": 80,
"watchers_count": 80,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 79,
"watchers": 80,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-12-30T01:07:48Z",
"updated_at": "2025-01-03T11:24:41Z",
"updated_at": "2025-01-03T13:29:47Z",
"pushed_at": "2024-12-30T01:08:00Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 12,
"watchers": 11,
"score": 0,
"subscribers_count": 1
}

33
2024/CVE-2024-54330.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 911139468,
"name": "CVE-2024-54330",
"full_name": "RandomRobbieBF\/CVE-2024-54330",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-54330",
"description": "Hurrakify <= 2.4 - Unauthenticated Server-Side Request Forgery",
"fork": false,
"created_at": "2025-01-02T10:31:51Z",
"updated_at": "2025-01-03T15:42:04Z",
"pushed_at": "2025-01-02T10:32:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-55875 | GHSA-7mj5-hjjj-8rgw | http4k first CVE",
"fork": false,
"created_at": "2024-12-13T06:21:36Z",
"updated_at": "2024-12-19T13:21:39Z",
"updated_at": "2025-01-03T14:51:11Z",
"pushed_at": "2024-12-13T07:28:34Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}

33
2024/CVE-2024-55988.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 911576506,
"name": "CVE-2024-55988",
"full_name": "RandomRobbieBF\/CVE-2024-55988",
"owner": {
"login": "RandomRobbieBF",
"id": 51722811,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4",
"html_url": "https:\/\/github.com\/RandomRobbieBF",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-55988",
"description": "Navayan CSV Export <= 1.0.9 - Unauthenticated SQL Injection",
"fork": false,
"created_at": "2025-01-03T10:45:42Z",
"updated_at": "2025-01-03T15:33:26Z",
"pushed_at": "2025-01-03T11:02:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

33
2024/CVE-2024-56433.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 911625725,
"name": "CVE-2024-56433",
"full_name": "JonnyWhatshisface\/CVE-2024-56433",
"owner": {
"login": "JonnyWhatshisface",
"id": 6776518,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6776518?v=4",
"html_url": "https:\/\/github.com\/JonnyWhatshisface",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/JonnyWhatshisface\/CVE-2024-56433",
"description": "CVE-2024-56433 - shadow-utils Default subordinate ID for local users creates risk of collision",
"fork": false,
"created_at": "2025-01-03T13:11:25Z",
"updated_at": "2025-01-03T13:44:45Z",
"pushed_at": "2025-01-03T13:44:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -7749,6 +7749,13 @@
- [RandomRobbieBF/CVE-2024-54262](https://github.com/RandomRobbieBF/CVE-2024-54262)
### CVE-2024-54330 (2024-12-13)
<code>Server-Side Request Forgery (SSRF) vulnerability in Hep Hep Hurra (HHH) Hurrakify allows Server Side Request Forgery.This issue affects Hurrakify: from n/a through 2.4.
</code>
- [RandomRobbieBF/CVE-2024-54330](https://github.com/RandomRobbieBF/CVE-2024-54330)
### CVE-2024-54679 (2024-12-05)
<code>CyberPanel (aka Cyber Panel) before 6778ad1 does not require the FilemanagerAdmin capability for restartMySQL actions.
@ -7791,6 +7798,13 @@
- [Wi1DN00B/CVE-2024-55968](https://github.com/Wi1DN00B/CVE-2024-55968)
- [null-event/CVE-2024-55968](https://github.com/null-event/CVE-2024-55968)
### CVE-2024-55988 (2024-12-16)
<code>Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Amol Nirmala Waman Navayan CSV Export allows Blind SQL Injection.This issue affects Navayan CSV Export: from n/a through 1.0.9.
</code>
- [RandomRobbieBF/CVE-2024-55988](https://github.com/RandomRobbieBF/CVE-2024-55988)
### CVE-2024-56115 (2024-12-18)
<code>A vulnerability in Amiro.CMS before 7.8.4 exists due to the failure to take measures to neutralize special elements. It allows remote attackers to conduct a Cross-Site Scripting (XSS) attack.
@ -7827,6 +7841,13 @@
- [UnionTech-Software/libtheora-CVE-2024-56431-PoC](https://github.com/UnionTech-Software/libtheora-CVE-2024-56431-PoC)
### CVE-2024-56433 (2024-12-26)
<code>shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.
</code>
- [JonnyWhatshisface/CVE-2024-56433](https://github.com/JonnyWhatshisface/CVE-2024-56433)
### CVE-2024-1642470
- [Symbolexe/CVE-2024-1642470](https://github.com/Symbolexe/CVE-2024-1642470)