Auto Update 2024/11/27 00:35:32

This commit is contained in:
motikan2010-bot 2024-11-27 09:35:32 +09:00
parent e8e87017b1
commit 3d03809a53
37 changed files with 161 additions and 129 deletions

View file

@ -14,7 +14,7 @@
"description": "Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container",
"fork": false,
"created_at": "2017-12-16T01:16:44Z",
"updated_at": "2024-08-12T19:34:50Z",
"updated_at": "2024-11-26T21:35:03Z",
"pushed_at": "2017-12-16T01:19:11Z",
"stargazers_count": 9,
"watchers_count": 9,

View file

@ -462,10 +462,10 @@
"description": "Dirty Cow exploit - CVE-2016-5195",
"fork": false,
"created_at": "2016-11-25T21:08:01Z",
"updated_at": "2024-11-19T23:44:17Z",
"updated_at": "2024-11-26T21:35:00Z",
"pushed_at": "2021-04-08T11:35:12Z",
"stargazers_count": 861,
"watchers_count": 861,
"stargazers_count": 862,
"watchers_count": 862,
"has_discussions": false,
"forks_count": 429,
"allow_forking": true,
@ -478,7 +478,7 @@
],
"visibility": "public",
"forks": 429,
"watchers": 861,
"watchers": 862,
"score": 0,
"subscribers_count": 9
},

View file

@ -14,10 +14,10 @@
"description": "Full exploit of CVE-2016-6754(BadKernel) and slide of SyScan360 2016",
"fork": false,
"created_at": "2016-11-28T08:44:44Z",
"updated_at": "2024-08-12T19:26:18Z",
"updated_at": "2024-11-26T22:25:47Z",
"pushed_at": "2016-11-28T09:55:46Z",
"stargazers_count": 153,
"watchers_count": 153,
"stargazers_count": 152,
"watchers_count": 152,
"has_discussions": false,
"forks_count": 71,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 71,
"watchers": 153,
"watchers": 152,
"score": 0,
"subscribers_count": 14
}

View file

@ -14,10 +14,10 @@
"description": "Exploit I discovered in October of 2022 with androids Package manager binary (pm) and the way it handled debugging flags, patched out by march 2023. Uses CVE-2019-16253 as a payload to obtain a system shell. ",
"fork": false,
"created_at": "2023-01-19T19:47:13Z",
"updated_at": "2024-10-26T22:39:41Z",
"updated_at": "2024-11-26T18:44:49Z",
"pushed_at": "2024-03-20T19:12:39Z",
"stargazers_count": 79,
"watchers_count": 79,
"stargazers_count": 78,
"watchers_count": 78,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 15,
"watchers": 79,
"watchers": 78,
"score": 0,
"subscribers_count": 12
}

View file

@ -138,10 +138,10 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-03-11T15:21:27Z",
"updated_at": "2024-11-07T17:59:52Z",
"updated_at": "2024-11-26T23:51:11Z",
"pushed_at": "2020-10-01T08:36:29Z",
"stargazers_count": 665,
"watchers_count": 665,
"stargazers_count": 666,
"watchers_count": 666,
"has_discussions": false,
"forks_count": 199,
"allow_forking": true,
@ -152,7 +152,7 @@
],
"visibility": "public",
"forks": 199,
"watchers": 665,
"watchers": 666,
"score": 0,
"subscribers_count": 26
},

View file

@ -28,6 +28,6 @@
"forks": 12,
"watchers": 27,
"score": 0,
"subscribers_count": 10
"subscribers_count": 11
}
]

View file

@ -209,10 +209,10 @@
"description": "Privilege escalation with polkit - CVE-2021-3560",
"fork": false,
"created_at": "2021-06-19T08:15:17Z",
"updated_at": "2024-11-19T19:23:44Z",
"updated_at": "2024-11-26T22:44:38Z",
"pushed_at": "2021-06-20T07:38:13Z",
"stargazers_count": 115,
"watchers_count": 115,
"stargazers_count": 116,
"watchers_count": 116,
"has_discussions": false,
"forks_count": 50,
"allow_forking": true,
@ -221,7 +221,7 @@
"topics": [],
"visibility": "public",
"forks": 50,
"watchers": 115,
"watchers": 116,
"score": 0,
"subscribers_count": 2
},

View file

@ -279,6 +279,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -967,10 +967,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2024-11-22T23:12:26Z",
"updated_at": "2024-11-26T21:46:55Z",
"pushed_at": "2022-06-21T14:52:05Z",
"stargazers_count": 1088,
"watchers_count": 1088,
"stargazers_count": 1089,
"watchers_count": 1089,
"has_discussions": false,
"forks_count": 189,
"allow_forking": true,
@ -981,7 +981,7 @@
],
"visibility": "public",
"forks": 189,
"watchers": 1088,
"watchers": 1089,
"score": 0,
"subscribers_count": 13
},
@ -2465,7 +2465,7 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 453089649,

View file

@ -231,10 +231,10 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2024-11-24T19:50:02Z",
"updated_at": "2024-11-26T21:50:16Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1597,
"watchers_count": 1597,
"stargazers_count": 1598,
"watchers_count": 1598,
"has_discussions": false,
"forks_count": 483,
"allow_forking": true,
@ -243,7 +243,7 @@
"topics": [],
"visibility": "public",
"forks": 483,
"watchers": 1597,
"watchers": 1598,
"score": 0,
"subscribers_count": 28
},

View file

@ -12048,7 +12048,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 614031542,

View file

@ -14,10 +14,10 @@
"description": "LPE exploit for CVE-2023-21768",
"fork": false,
"created_at": "2023-03-07T23:00:27Z",
"updated_at": "2024-11-19T02:35:14Z",
"updated_at": "2024-11-26T22:22:03Z",
"pushed_at": "2023-07-10T16:35:49Z",
"stargazers_count": 482,
"watchers_count": 482,
"stargazers_count": 483,
"watchers_count": 483,
"has_discussions": false,
"forks_count": 163,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 163,
"watchers": 482,
"watchers": 483,
"score": 0,
"subscribers_count": 10
},

View file

@ -14,10 +14,10 @@
"description": "Ivanti EPM AgentPortal RCE Vulnerability",
"fork": false,
"created_at": "2024-09-13T14:02:04Z",
"updated_at": "2024-10-16T07:49:53Z",
"updated_at": "2024-11-26T23:19:45Z",
"pushed_at": "2024-09-16T14:24:20Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 20,
"watchers": 21,
"score": 0,
"subscribers_count": 4
}

View file

@ -14,10 +14,10 @@
"description": "Exploit code for CVE-2023-42914 \/ pwn2own Vancouver 2023",
"fork": false,
"created_at": "2024-11-22T11:28:35Z",
"updated_at": "2024-11-26T14:20:50Z",
"updated_at": "2024-11-26T21:08:44Z",
"pushed_at": "2024-11-22T12:10:47Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 6,
"score": 0,
"subscribers_count": 0
}

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-11-26T07:52:29Z",
"updated_at": "2024-11-26T08:09:22Z",
"updated_at": "2024-11-26T18:37:26Z",
"pushed_at": "2024-11-26T08:06:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -1160,5 +1160,36 @@
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 894667013,
"name": "CVE-2023-38646-PoC-Metabase",
"full_name": "JayRyz\/CVE-2023-38646-PoC-Metabase",
"owner": {
"login": "JayRyz",
"id": 99511456,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99511456?v=4",
"html_url": "https:\/\/github.com\/JayRyz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/JayRyz\/CVE-2023-38646-PoC-Metabase",
"description": "Proof-of-Concept script for exploiting CVE-2023-38646. Intended for educational and research purposes only.",
"fork": false,
"created_at": "2024-11-26T19:05:35Z",
"updated_at": "2024-11-26T20:00:11Z",
"pushed_at": "2024-11-26T20:00:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "Root takeover via signature spoofing in KernelSU",
"fork": false,
"created_at": "2023-10-11T12:08:31Z",
"updated_at": "2024-09-18T08:09:52Z",
"updated_at": "2024-11-26T18:44:53Z",
"pushed_at": "2023-10-11T12:34:37Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 15,
"watchers": 14,
"score": 0,
"subscribers_count": 2
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 5,
"score": 0,
"subscribers_count": 1

View file

@ -1,6 +1,6 @@
[
{
"id": 894423766,
"id": 894757253,
"name": "CVE-2024-10542",
"full_name": "ubaii\/CVE-2024-10542",
"owner": {
@ -11,13 +11,13 @@
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ubaii\/CVE-2024-10542",
"description": null,
"description": "WordPress Spam protection, AntiSpam, FireWall by CleanTalk Plugin <= 6.43.2 is vulnerable to Unauthenticated Arbitrary Plugin Installation Installation",
"fork": false,
"created_at": "2024-11-26T10:32:36Z",
"updated_at": "2024-11-26T10:32:52Z",
"pushed_at": "2024-11-26T10:32:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"created_at": "2024-11-26T23:47:17Z",
"updated_at": "2024-11-26T23:53:51Z",
"pushed_at": "2024-11-26T23:49:15Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}

View file

@ -45,12 +45,12 @@
"description": "POC - CVE-202410914- Command Injection Vulnerability in `name` parameter for D-Link NAS",
"fork": false,
"created_at": "2024-11-10T12:01:21Z",
"updated_at": "2024-11-26T14:45:35Z",
"updated_at": "2024-11-27T00:06:53Z",
"pushed_at": "2024-11-26T14:45:28Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 9,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -64,8 +64,8 @@
"unauthenticated-rce"
],
"visibility": "public",
"forks": 9,
"watchers": 19,
"forks": 11,
"watchers": 26,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.",
"fork": false,
"created_at": "2024-04-12T15:07:42Z",
"updated_at": "2024-11-26T15:12:53Z",
"updated_at": "2024-11-26T21:19:59Z",
"pushed_at": "2024-04-18T14:31:34Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 52,
"watchers_count": 52,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 51,
"watchers": 52,
"score": 0,
"subscribers_count": 7
},

View file

@ -293,10 +293,10 @@
"description": "POC - Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692 ",
"fork": false,
"created_at": "2024-09-15T12:15:35Z",
"updated_at": "2024-11-26T14:45:54Z",
"updated_at": "2024-11-26T21:34:48Z",
"pushed_at": "2024-11-26T14:45:12Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -310,7 +310,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 31,
"watchers": 32,
"score": 0,
"subscribers_count": 1
},

View file

@ -1013,10 +1013,10 @@
"description": "POC - Jenkins File Read Vulnerability - CVE-2024-23897",
"fork": false,
"created_at": "2024-09-30T16:38:28Z",
"updated_at": "2024-11-26T14:47:11Z",
"updated_at": "2024-11-26T21:33:10Z",
"pushed_at": "2024-11-26T14:46:59Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -1032,7 +1032,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -1381,10 +1381,10 @@
"description": "POC - CVE-202424919 - Check Point Security Gateways",
"fork": false,
"created_at": "2024-06-09T06:54:51Z",
"updated_at": "2024-11-26T14:46:28Z",
"updated_at": "2024-11-26T21:34:45Z",
"pushed_at": "2024-11-26T14:45:44Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -1398,7 +1398,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},

View file

@ -79,10 +79,10 @@
"description": "CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4",
"fork": false,
"created_at": "2024-03-06T03:15:03Z",
"updated_at": "2024-11-21T14:02:02Z",
"updated_at": "2024-11-26T22:50:05Z",
"pushed_at": "2024-03-11T07:57:40Z",
"stargazers_count": 143,
"watchers_count": 143,
"stargazers_count": 144,
"watchers_count": 144,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -101,7 +101,7 @@
],
"visibility": "public",
"forks": 36,
"watchers": 143,
"watchers": 144,
"score": 0,
"subscribers_count": 3
},

View file

@ -76,10 +76,10 @@
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
"fork": false,
"created_at": "2024-05-27T08:30:06Z",
"updated_at": "2024-11-25T08:43:52Z",
"updated_at": "2024-11-26T23:16:03Z",
"pushed_at": "2024-09-30T08:45:56Z",
"stargazers_count": 419,
"watchers_count": 419,
"stargazers_count": 420,
"watchers_count": 420,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 419,
"watchers": 420,
"score": 0,
"subscribers_count": 8
},

View file

@ -14,10 +14,10 @@
"description": "Ivanti EPM SQL Injection Remote Code Execution Vulnerability",
"fork": false,
"created_at": "2024-06-12T13:53:32Z",
"updated_at": "2024-11-06T12:03:23Z",
"updated_at": "2024-11-26T23:18:26Z",
"pushed_at": "2024-06-12T14:04:39Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 20,
"watchers": 21,
"score": 0,
"subscribers_count": 5
},

View file

@ -14,10 +14,10 @@
"description": "D-Link NAS CVE-2024-3273 Exploit Tool",
"fork": false,
"created_at": "2024-04-07T03:09:13Z",
"updated_at": "2024-10-26T08:30:03Z",
"updated_at": "2024-11-26T21:08:59Z",
"pushed_at": "2024-04-07T04:41:26Z",
"stargazers_count": 90,
"watchers_count": 90,
"stargazers_count": 91,
"watchers_count": 91,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 90,
"watchers": 91,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,8 +14,8 @@
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
"fork": false,
"created_at": "2024-10-13T19:30:20Z",
"updated_at": "2024-11-25T15:53:56Z",
"pushed_at": "2024-11-12T15:28:48Z",
"updated_at": "2024-11-26T20:54:21Z",
"pushed_at": "2024-11-26T20:54:17Z",
"stargazers_count": 210,
"watchers_count": 210,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "Apache OFBiz RCE Scanner & Exploit (CVE-2024-38856)",
"fork": false,
"created_at": "2024-08-08T02:40:56Z",
"updated_at": "2024-11-20T16:31:00Z",
"updated_at": "2024-11-26T22:44:35Z",
"pushed_at": "2024-10-02T15:59:28Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 38,
"watchers": 39,
"score": 0,
"subscribers_count": 1
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 9,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"forks": 10,
"watchers": 36,
"score": 0,
"subscribers_count": 0

View file

@ -138,10 +138,10 @@
"description": "Authentication Bypass Vulnerability — CVE-20244358 — Telerik Report Server 2024",
"fork": false,
"created_at": "2024-06-09T06:30:06Z",
"updated_at": "2024-11-26T14:46:50Z",
"updated_at": "2024-11-26T21:34:46Z",
"pushed_at": "2024-11-26T14:46:07Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -155,7 +155,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
},

View file

@ -45,10 +45,10 @@
"description": null,
"fork": false,
"created_at": "2024-09-19T12:43:48Z",
"updated_at": "2024-11-26T14:48:31Z",
"updated_at": "2024-11-26T21:34:47Z",
"pushed_at": "2024-11-26T14:47:16Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -64,7 +64,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -410,10 +410,10 @@
"description": "POC - CVE-20244956 - Nexus Repository Manager 3 Unauthenticated Path Traversal",
"fork": false,
"created_at": "2024-06-09T10:57:29Z",
"updated_at": "2024-11-26T14:46:59Z",
"updated_at": "2024-11-26T21:34:44Z",
"pushed_at": "2024-11-26T14:46:24Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -426,7 +426,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-8190: Ivanti Cloud Service Appliance Command Injection",
"fork": false,
"created_at": "2024-09-16T15:33:46Z",
"updated_at": "2024-11-20T16:31:04Z",
"updated_at": "2024-11-26T23:19:35Z",
"pushed_at": "2024-09-16T15:43:44Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 5
}

View file

@ -14,10 +14,10 @@
"description": "Proof of Concept Exploit for CVE-2024-9465",
"fork": false,
"created_at": "2024-10-09T16:22:05Z",
"updated_at": "2024-11-25T02:31:41Z",
"updated_at": "2024-11-26T23:20:04Z",
"pushed_at": "2024-10-09T16:34:42Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 26,
"watchers": 27,
"score": 0,
"subscribers_count": 4
},

View file

@ -12650,6 +12650,7 @@
- [acesoyeo/METABASE-RCE-CVE-2023-38646-](https://github.com/acesoyeo/METABASE-RCE-CVE-2023-38646-)
- [UserConnecting/Exploit-CVE-2023-38646-Metabase](https://github.com/UserConnecting/Exploit-CVE-2023-38646-Metabase)
- [XiaomingX/cve-2023-38646-poc](https://github.com/XiaomingX/cve-2023-38646-poc)
- [JayRyz/CVE-2023-38646-PoC-Metabase](https://github.com/JayRyz/CVE-2023-38646-PoC-Metabase)
### CVE-2023-38709 (2024-04-04)