Auto Update 2024/12/30 06:31:57

This commit is contained in:
motikan2010-bot 2024-12-30 15:31:57 +09:00
parent 4c07e6b57d
commit 35eb6ad60d
37 changed files with 198 additions and 126 deletions

View file

@ -14,10 +14,10 @@
"description": "A checker (site and tool) for CVE-2014-0160",
"fork": false,
"created_at": "2014-04-07T23:03:09Z",
"updated_at": "2024-12-20T15:53:58Z",
"updated_at": "2024-12-30T01:43:06Z",
"pushed_at": "2021-02-24T09:17:24Z",
"stargazers_count": 2307,
"watchers_count": 2307,
"stargazers_count": 2306,
"watchers_count": 2306,
"has_discussions": false,
"forks_count": 461,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 461,
"watchers": 2307,
"watchers": 2306,
"score": 0,
"subscribers_count": 117
},

View file

@ -46,7 +46,7 @@
"fork": false,
"created_at": "2023-03-30T06:39:25Z",
"updated_at": "2023-11-15T05:13:25Z",
"pushed_at": "2024-12-23T03:21:47Z",
"pushed_at": "2024-12-30T04:44:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "Proof-of-Concept exploit for CVE-2017-7494(Samba RCE from a writable share)",
"fork": false,
"created_at": "2017-05-25T13:20:56Z",
"updated_at": "2024-11-14T16:55:11Z",
"updated_at": "2024-12-30T02:15:44Z",
"pushed_at": "2017-07-26T13:07:51Z",
"stargazers_count": 178,
"watchers_count": 178,
"stargazers_count": 179,
"watchers_count": 179,
"has_discussions": false,
"forks_count": 59,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 59,
"watchers": 178,
"watchers": 179,
"score": 0,
"subscribers_count": 11
},

View file

@ -14,10 +14,10 @@
"description": "sploit",
"fork": false,
"created_at": "2019-12-21T00:44:25Z",
"updated_at": "2024-08-12T19:55:55Z",
"updated_at": "2024-12-30T02:47:25Z",
"pushed_at": "2019-12-21T00:56:27Z",
"stargazers_count": 67,
"watchers_count": 67,
"stargazers_count": 68,
"watchers_count": 68,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 67,
"watchers": 68,
"score": 0,
"subscribers_count": 4
}

View file

@ -14,10 +14,10 @@
"description": "PoC demonstrating the use of cve-2020-1034 for privilege escalation",
"fork": false,
"created_at": "2020-11-23T10:24:07Z",
"updated_at": "2024-10-29T16:00:28Z",
"updated_at": "2024-12-30T05:44:20Z",
"pushed_at": "2021-03-16T13:53:37Z",
"stargazers_count": 119,
"watchers_count": 119,
"stargazers_count": 120,
"watchers_count": 120,
"has_discussions": false,
"forks_count": 40,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 40,
"watchers": 119,
"watchers": 120,
"score": 0,
"subscribers_count": 6
},

View file

@ -176,10 +176,10 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2024-12-28T12:03:52Z",
"updated_at": "2024-12-30T05:52:23Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 640,
"watchers_count": 640,
"stargazers_count": 641,
"watchers_count": 641,
"has_discussions": false,
"forks_count": 147,
"allow_forking": true,
@ -188,7 +188,7 @@
"topics": [],
"visibility": "public",
"forks": 147,
"watchers": 640,
"watchers": 641,
"score": 0,
"subscribers_count": 12
},

View file

@ -50,13 +50,13 @@
"stargazers_count": 1850,
"watchers_count": 1850,
"has_discussions": false,
"forks_count": 583,
"forks_count": 584,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 583,
"forks": 584,
"watchers": 1850,
"score": 0,
"subscribers_count": 43

View file

@ -50,10 +50,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2024-12-25T04:43:07Z",
"updated_at": "2024-12-30T03:18:17Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 818,
"watchers_count": 818,
"stargazers_count": 819,
"watchers_count": 819,
"has_discussions": false,
"forks_count": 124,
"allow_forking": true,
@ -62,7 +62,7 @@
"topics": [],
"visibility": "public",
"forks": 124,
"watchers": 818,
"watchers": 819,
"score": 0,
"subscribers_count": 13
},

View file

@ -935,10 +935,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2024-12-29T13:50:48Z",
"updated_at": "2024-12-30T03:30:40Z",
"pushed_at": "2024-02-12T22:37:25Z",
"stargazers_count": 1811,
"watchers_count": 1811,
"stargazers_count": 1812,
"watchers_count": 1812,
"has_discussions": false,
"forks_count": 530,
"allow_forking": true,
@ -952,7 +952,7 @@
],
"visibility": "public",
"forks": 530,
"watchers": 1811,
"watchers": 1812,
"score": 0,
"subscribers_count": 26
},

View file

@ -125,7 +125,7 @@
"forks": 18,
"watchers": 48,
"score": 0,
"subscribers_count": 4
"subscribers_count": 5
},
{
"id": 459331281,

View file

@ -28,6 +28,6 @@
"forks": 7,
"watchers": 15,
"score": 0,
"subscribers_count": 5
"subscribers_count": 6
}
]

View file

@ -96,6 +96,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -90,7 +90,7 @@
"forks": 64,
"watchers": 387,
"score": 0,
"subscribers_count": 4
"subscribers_count": 5
},
{
"id": 636975790,

View file

@ -32,6 +32,6 @@
"forks": 1,
"watchers": 9,
"score": 0,
"subscribers_count": 4
"subscribers_count": 5
}
]

View file

@ -28,6 +28,6 @@
"forks": 1,
"watchers": 11,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -121,6 +121,6 @@
"forks": 27,
"watchers": 205,
"score": 0,
"subscribers_count": 4
"subscribers_count": 5
}
]

View file

@ -107,10 +107,10 @@
"description": "Dockerfile containing all the necessary setup files to demo the exploit ",
"fork": false,
"created_at": "2023-10-12T16:48:26Z",
"updated_at": "2024-04-02T05:39:46Z",
"updated_at": "2024-12-30T06:24:42Z",
"pushed_at": "2023-10-13T10:10:43Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},

View file

@ -45,10 +45,10 @@
"description": "CVE-2023-38831 winrar exploit generator",
"fork": false,
"created_at": "2023-08-25T09:44:08Z",
"updated_at": "2024-12-23T13:48:07Z",
"updated_at": "2024-12-30T03:50:48Z",
"pushed_at": "2023-11-26T06:46:44Z",
"stargazers_count": 784,
"watchers_count": 784,
"stargazers_count": 785,
"watchers_count": 785,
"has_discussions": false,
"forks_count": 140,
"allow_forking": true,
@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 140,
"watchers": 784,
"watchers": 785,
"score": 0,
"subscribers_count": 9
},
@ -1635,5 +1635,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 909912770,
"name": "winrar-cve-2023-38831",
"full_name": "kuyrathdaro\/winrar-cve-2023-38831",
"owner": {
"login": "kuyrathdaro",
"id": 92511754,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92511754?v=4",
"html_url": "https:\/\/github.com\/kuyrathdaro",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/kuyrathdaro\/winrar-cve-2023-38831",
"description": "POC Exploit Script in Python",
"fork": false,
"created_at": "2024-12-30T03:33:23Z",
"updated_at": "2024-12-30T03:33:23Z",
"pushed_at": "2024-12-30T03:33:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-10793 poc exploit",
"fork": false,
"created_at": "2024-11-17T18:44:53Z",
"updated_at": "2024-12-19T13:21:31Z",
"updated_at": "2024-12-30T01:27:43Z",
"pushed_at": "2024-11-17T19:51:53Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},

View file

@ -206,10 +206,10 @@
"description": null,
"fork": false,
"created_at": "2024-12-16T17:33:13Z",
"updated_at": "2024-12-19T12:32:50Z",
"updated_at": "2024-12-30T01:06:13Z",
"pushed_at": "2024-12-16T17:38:23Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -218,7 +218,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "exploits for CVE-2024-20017",
"fork": false,
"created_at": "2024-08-30T05:54:36Z",
"updated_at": "2024-12-24T00:01:39Z",
"updated_at": "2024-12-30T02:37:38Z",
"pushed_at": "2024-09-07T10:11:22Z",
"stargazers_count": 137,
"watchers_count": 137,
"stargazers_count": 138,
"watchers_count": 138,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 137,
"watchers": 138,
"score": 0,
"subscribers_count": 3
}

View file

@ -14,19 +14,19 @@
"description": "PoC for CVE-2024-21182",
"fork": false,
"created_at": "2024-12-29T15:48:03Z",
"updated_at": "2024-12-29T20:17:47Z",
"updated_at": "2024-12-30T05:47:42Z",
"pushed_at": "2024-12-29T15:56:14Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"forks": 2,
"watchers": 8,
"score": 0,
"subscribers_count": 0
}

View file

@ -76,10 +76,10 @@
"description": "A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1",
"fork": false,
"created_at": "2024-03-18T20:39:27Z",
"updated_at": "2024-12-29T20:53:12Z",
"updated_at": "2024-12-30T04:28:59Z",
"pushed_at": "2024-03-19T06:37:30Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 15,
"watchers": 16,
"score": 0,
"subscribers_count": 1
},

View file

@ -610,10 +610,10 @@
"description": "POC for CVE-2024-23897 Jenkins File-Read ",
"fork": false,
"created_at": "2024-02-16T07:16:04Z",
"updated_at": "2024-12-04T18:06:10Z",
"updated_at": "2024-12-30T02:06:36Z",
"pushed_at": "2024-02-17T16:39:19Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -622,7 +622,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 19,
"watchers": 20,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-12-14T09:22:33Z",
"updated_at": "2024-12-23T02:20:40Z",
"updated_at": "2024-12-30T01:25:25Z",
"pushed_at": "2024-12-14T10:13:45Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 31,
"watchers": 32,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": "Drupal CVE-2024-45440",
"fork": false,
"created_at": "2024-12-26T13:35:42Z",
"updated_at": "2024-12-29T13:56:26Z",
"updated_at": "2024-12-30T06:27:01Z",
"pushed_at": "2024-12-29T13:56:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": "Zimbra - Remote Command Execution (CVE-2024-45519)",
"fork": false,
"created_at": "2024-10-05T00:15:18Z",
"updated_at": "2024-12-21T22:19:18Z",
"updated_at": "2024-12-30T01:00:54Z",
"pushed_at": "2024-11-05T10:10:40Z",
"stargazers_count": 116,
"watchers_count": 116,
"stargazers_count": 117,
"watchers_count": 117,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 116,
"watchers": 117,
"score": 0,
"subscribers_count": 3
},

View file

@ -610,10 +610,10 @@
"description": "PHP CGI Argument Injection vulnerability",
"fork": false,
"created_at": "2024-06-09T14:18:21Z",
"updated_at": "2024-11-06T06:56:51Z",
"updated_at": "2024-12-30T06:10:32Z",
"pushed_at": "2024-06-09T14:20:36Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -622,7 +622,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 31,
"watchers": 30,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler",
"fork": false,
"created_at": "2024-11-19T08:57:18Z",
"updated_at": "2024-12-29T11:56:58Z",
"updated_at": "2024-12-30T02:49:58Z",
"pushed_at": "2024-11-19T09:15:26Z",
"stargazers_count": 112,
"watchers_count": 112,
"stargazers_count": 114,
"watchers_count": 114,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 112,
"watchers": 114,
"score": 0,
"subscribers_count": 2
},

View file

@ -169,19 +169,19 @@
"description": "RCE through a race condition in Apache Tomcat",
"fork": false,
"created_at": "2024-12-21T05:54:29Z",
"updated_at": "2024-12-29T20:10:41Z",
"updated_at": "2024-12-30T06:12:34Z",
"pushed_at": "2024-12-21T08:56:44Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 29,
"forks": 5,
"watchers": 37,
"score": 0,
"subscribers_count": 2
},
@ -262,10 +262,10 @@
"description": "CVE-2024-50379-exp",
"fork": false,
"created_at": "2024-12-25T02:41:31Z",
"updated_at": "2024-12-28T16:24:51Z",
"updated_at": "2024-12-30T01:38:07Z",
"pushed_at": "2024-12-26T08:52:15Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -274,7 +274,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,19 +14,19 @@
"description": "Exploit for CyberPanel Pre-Auth RCE via Command Injection",
"fork": false,
"created_at": "2024-10-29T23:34:27Z",
"updated_at": "2024-12-24T06:37:27Z",
"updated_at": "2024-12-30T05:43:33Z",
"pushed_at": "2024-11-01T10:12:49Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 18,
"forks": 6,
"watchers": 19,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
"fork": false,
"created_at": "2024-12-13T17:42:55Z",
"updated_at": "2024-12-28T05:47:35Z",
"updated_at": "2024-12-30T01:26:36Z",
"pushed_at": "2024-12-20T10:05:15Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 77,
"watchers_count": 77,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 76,
"watchers": 77,
"score": 0,
"subscribers_count": 3
},

33
2024/CVE-2024-54152.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 909882750,
"name": "CVE-2024-54152-poc",
"full_name": "math-x-io\/CVE-2024-54152-poc",
"owner": {
"login": "math-x-io",
"id": 97481289,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97481289?v=4",
"html_url": "https:\/\/github.com\/math-x-io",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/math-x-io\/CVE-2024-54152-poc",
"description": null,
"fork": false,
"created_at": "2024-12-30T01:07:48Z",
"updated_at": "2024-12-30T01:08:03Z",
"pushed_at": "2024-12-30T01:08:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,19 +14,19 @@
"description": "Unauthenticated RCE on CraftCMS when PHP `register_argc_argv` config setting is enabled",
"fork": false,
"created_at": "2024-12-20T03:34:01Z",
"updated_at": "2024-12-29T05:14:02Z",
"updated_at": "2024-12-30T05:43:26Z",
"pushed_at": "2024-12-23T12:51:54Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 32,
"forks": 9,
"watchers": 33,
"score": 0,
"subscribers_count": 2
},

View file

@ -1355,10 +1355,10 @@
"description": "PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (Scanner and Exploit) ",
"fork": false,
"created_at": "2024-07-02T18:32:46Z",
"updated_at": "2024-12-27T08:50:45Z",
"updated_at": "2024-12-30T01:05:18Z",
"pushed_at": "2024-07-05T15:19:28Z",
"stargazers_count": 71,
"watchers_count": 71,
"stargazers_count": 72,
"watchers_count": 72,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -1376,7 +1376,7 @@
],
"visibility": "public",
"forks": 28,
"watchers": 71,
"watchers": 72,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-08-30T17:13:14Z",
"updated_at": "2024-12-28T12:42:48Z",
"updated_at": "2024-12-30T03:37:03Z",
"pushed_at": "2024-08-30T17:22:31Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 33,
"watchers": 34,
"score": 0,
"subscribers_count": 1
}

View file

@ -7698,6 +7698,13 @@
- [0xdeviner/CVE-2024-53677](https://github.com/0xdeviner/CVE-2024-53677)
- [Q0LT/VM-CVE-2024-53677](https://github.com/Q0LT/VM-CVE-2024-53677)
### CVE-2024-54152 (2024-12-10)
<code>Angular Expressions provides expressions for the Angular.JS web framework as a standalone module. Prior to version 1.4.3, an attacker can write a malicious expression that escapes the sandbox to execute arbitrary code on the system. With a more complex (undisclosed) payload, one can get full access to Arbitrary code execution on the system. The problem has been patched in version 1.4.3 of Angular Expressions. Two possible workarounds are available. One may either disable access to `__proto__` globally or make sure that one uses the function with just one argument.
</code>
- [math-x-io/CVE-2024-54152-poc](https://github.com/math-x-io/CVE-2024-54152-poc)
### CVE-2024-54262 (2024-12-13)
<code>Unrestricted Upload of File with Dangerous Type vulnerability in Siddharth Nagar Import Export For WooCommerce allows Upload a Web Shell to a Web Server.This issue affects Import Export For WooCommerce: from n/a through 1.5.
@ -13462,6 +13469,7 @@
- [idkwastaken/CVE-2023-38831](https://github.com/idkwastaken/CVE-2023-38831)
- [RonF98/CVE-2023-38831-POC](https://github.com/RonF98/CVE-2023-38831-POC)
- [VictoriousKnight/CVE-2023-38831_Exploit](https://github.com/VictoriousKnight/CVE-2023-38831_Exploit)
- [kuyrathdaro/winrar-cve-2023-38831](https://github.com/kuyrathdaro/winrar-cve-2023-38831)
### CVE-2023-38836 (2023-08-21)