Auto Update 2025/01/17 06:32:27

This commit is contained in:
motikan2010-bot 2025-01-17 15:32:27 +09:00
parent 0f86629107
commit 4cc2c2e408
55 changed files with 212 additions and 1096 deletions

View file

@ -14,10 +14,10 @@
"description": "CVE-2017-0100、MS17-012、Eop",
"fork": false,
"created_at": "2021-03-24T09:21:09Z",
"updated_at": "2024-11-27T09:16:12Z",
"updated_at": "2025-01-17T05:34:18Z",
"pushed_at": "2021-03-24T09:39:17Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 3
}

View file

@ -417,10 +417,10 @@
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2025-01-16T02:49:52Z",
"updated_at": "2025-01-17T03:21:16Z",
"pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 175,
"watchers_count": 175,
"stargazers_count": 176,
"watchers_count": 176,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -437,7 +437,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 175,
"watchers": 176,
"score": 0,
"subscribers_count": 2
},

View file

@ -262,10 +262,10 @@
"description": "A PoC exploit for CVE-2017-7921 - Hikvision Camera Series Improper Authentication Vulnerability.",
"fork": false,
"created_at": "2023-07-24T14:48:38Z",
"updated_at": "2025-01-11T21:50:02Z",
"updated_at": "2025-01-17T01:49:23Z",
"pushed_at": "2023-08-02T18:58:22Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -284,7 +284,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 1
},

View file

@ -76,10 +76,10 @@
"description": "Unsigned driver loader using CVE-2018-19320",
"fork": false,
"created_at": "2022-11-12T05:48:13Z",
"updated_at": "2025-01-14T04:54:09Z",
"updated_at": "2025-01-17T02:08:32Z",
"pushed_at": "2023-04-09T13:50:29Z",
"stargazers_count": 223,
"watchers_count": 223,
"stargazers_count": 224,
"watchers_count": 224,
"has_discussions": false,
"forks_count": 59,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 59,
"watchers": 223,
"watchers": 224,
"score": 0,
"subscribers_count": 10
}

View file

@ -45,10 +45,10 @@
"description": "cve-2018-8453 exp",
"fork": false,
"created_at": "2019-01-18T10:40:03Z",
"updated_at": "2024-12-30T08:48:20Z",
"updated_at": "2025-01-17T02:29:49Z",
"pushed_at": "2019-12-13T02:24:39Z",
"stargazers_count": 121,
"watchers_count": 121,
"stargazers_count": 122,
"watchers_count": 122,
"has_discussions": false,
"forks_count": 53,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 53,
"watchers": 121,
"watchers": 122,
"score": 0,
"subscribers_count": 8
},

View file

@ -45,10 +45,10 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2025-01-16T04:06:07Z",
"updated_at": "2025-01-17T04:40:16Z",
"pushed_at": "2023-07-20T10:51:42Z",
"stargazers_count": 1749,
"watchers_count": 1749,
"stargazers_count": 1750,
"watchers_count": 1750,
"has_discussions": false,
"forks_count": 358,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 358,
"watchers": 1749,
"watchers": 1750,
"score": 0,
"subscribers_count": 86
},

View file

@ -313,10 +313,10 @@
"description": "CVE-2020-14882_ALL综合利用工具支持命令回显检测、批量命令回显、外置xml无回显命令执行等功能。",
"fork": false,
"created_at": "2020-11-03T10:49:35Z",
"updated_at": "2024-12-28T12:35:31Z",
"updated_at": "2025-01-17T01:04:41Z",
"pushed_at": "2022-03-29T02:08:45Z",
"stargazers_count": 144,
"watchers_count": 144,
"stargazers_count": 145,
"watchers_count": 145,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@ -325,7 +325,7 @@
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 144,
"watchers": 145,
"score": 0,
"subscribers_count": 3
},

View file

@ -981,10 +981,10 @@
"description": "tomcat自动化漏洞扫描利用工具支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
"updated_at": "2025-01-16T02:49:52Z",
"updated_at": "2025-01-17T03:21:16Z",
"pushed_at": "2024-11-13T03:12:58Z",
"stargazers_count": 175,
"watchers_count": 175,
"stargazers_count": 176,
"watchers_count": 176,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -1001,7 +1001,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 175,
"watchers": 176,
"score": 0,
"subscribers_count": 2
},

View file

@ -1017,10 +1017,10 @@
"description": "CVE-2021-3156非交互式执行命令",
"fork": false,
"created_at": "2021-02-09T19:25:18Z",
"updated_at": "2024-12-27T13:25:16Z",
"updated_at": "2025-01-17T02:21:49Z",
"pushed_at": "2021-02-09T19:31:33Z",
"stargazers_count": 200,
"watchers_count": 200,
"stargazers_count": 201,
"watchers_count": 201,
"has_discussions": false,
"forks_count": 42,
"allow_forking": true,
@ -1029,7 +1029,7 @@
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 200,
"watchers": 201,
"score": 0,
"subscribers_count": 6
},

View file

@ -12004,10 +12004,10 @@
"description": "💣💥💀 Proof of Concept: пример запуска fork-бомбы на удаленном сервере благодаря уязвимости CVE-2021-44228",
"fork": false,
"created_at": "2023-04-15T12:47:39Z",
"updated_at": "2023-05-06T18:26:50Z",
"updated_at": "2025-01-17T05:53:28Z",
"pushed_at": "2023-05-02T21:46:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -12016,7 +12016,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -107,10 +107,10 @@
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
"fork": false,
"created_at": "2022-03-07T18:55:20Z",
"updated_at": "2025-01-12T10:36:38Z",
"updated_at": "2025-01-17T04:26:20Z",
"pushed_at": "2022-03-08T06:20:05Z",
"stargazers_count": 1093,
"watchers_count": 1093,
"stargazers_count": 1092,
"watchers_count": 1092,
"has_discussions": false,
"forks_count": 220,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 220,
"watchers": 1093,
"watchers": 1092,
"score": 0,
"subscribers_count": 18
},

View file

@ -291,6 +291,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -45,10 +45,10 @@
"description": "it's a CVE-2022-3368 (Patched), but feel free to use it for check any outdated software or reseach",
"fork": false,
"created_at": "2024-03-05T18:31:29Z",
"updated_at": "2024-11-17T16:50:59Z",
"updated_at": "2025-01-17T00:38:32Z",
"pushed_at": "2024-07-08T16:18:51Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
}

View file

@ -49,10 +49,10 @@
"description": "POC of CVE-2022-36537",
"fork": false,
"created_at": "2022-12-09T14:15:52Z",
"updated_at": "2024-08-12T20:28:47Z",
"updated_at": "2025-01-17T00:56:17Z",
"pushed_at": "2025-01-09T07:54:42Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -69,7 +69,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 35,
"watchers": 36,
"score": 0,
"subscribers_count": 1
}

View file

@ -743,21 +743,21 @@
"description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group",
"fork": false,
"created_at": "2025-01-16T06:54:15Z",
"updated_at": "2025-01-17T00:22:01Z",
"updated_at": "2025-01-17T04:41:20Z",
"pushed_at": "2025-01-16T09:56:36Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 32,
"forks": 11,
"watchers": 33,
"score": 0,
"subscribers_count": 0
"subscribers_count": 5
},
{
"id": 917925392,
@ -788,6 +788,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -593,37 +593,6 @@
"score": 0,
"subscribers_count": 0
},
{
"id": 738213429,
"name": "Exploit-CVE-2023-22515",
"full_name": "CalegariMindSec\/Exploit-CVE-2023-22515",
"owner": {
"login": "CalegariMindSec",
"id": 68512056,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68512056?v=4",
"html_url": "https:\/\/github.com\/CalegariMindSec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/CalegariMindSec\/Exploit-CVE-2023-22515",
"description": "A simple exploit for CVE-2023-22515",
"fork": false,
"created_at": "2024-01-02T17:40:24Z",
"updated_at": "2024-01-02T23:11:04Z",
"pushed_at": "2024-01-02T23:15:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 762759550,
"name": "CVE-2023-22515",

View file

@ -60,36 +60,5 @@
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 795324648,
"name": "CVE-2023-24329-Exploit",
"full_name": "PenTestMano\/CVE-2023-24329-Exploit",
"owner": {
"login": "PenTestMano",
"id": 162714784,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/162714784?v=4",
"html_url": "https:\/\/github.com\/PenTestMano",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/PenTestMano\/CVE-2023-24329-Exploit",
"description": "Example of CVE-2023-24329 ",
"fork": false,
"created_at": "2024-05-03T03:16:02Z",
"updated_at": "2024-05-03T03:16:02Z",
"pushed_at": "2023-10-13T07:42:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -321,6 +321,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -417,68 +417,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 739001610,
"name": "CVE-2023-27163",
"full_name": "Rubioo02\/CVE-2023-27163",
"owner": {
"login": "Rubioo02",
"id": 153825296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153825296?v=4",
"html_url": "https:\/\/github.com\/Rubioo02",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Rubioo02\/CVE-2023-27163",
"description": "A exploit for the CVE-2023-27163 (SSRF) vulnerability in the web application request-baskets (<= v.1.2.1)",
"fork": false,
"created_at": "2024-01-04T14:46:13Z",
"updated_at": "2024-01-04T17:04:49Z",
"pushed_at": "2024-01-04T16:40:47Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 2
},
{
"id": 739760866,
"name": "CVE-2023-27163",
"full_name": "madhavmehndiratta\/CVE-2023-27163",
"owner": {
"login": "madhavmehndiratta",
"id": 43489174,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43489174?v=4",
"html_url": "https:\/\/github.com\/madhavmehndiratta",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/madhavmehndiratta\/CVE-2023-27163",
"description": "PoC for SSRF in request-baskets v1.2.1 (CVE-2023-27163)",
"fork": false,
"created_at": "2024-01-06T13:16:29Z",
"updated_at": "2024-01-06T15:53:16Z",
"pushed_at": "2024-01-06T15:52:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 820848497,
"name": "CVE-2023-27163-ssrf-to-port-scanning",

View file

@ -92,37 +92,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 737810016,
"name": "Compiled-PoC-Binary-For-CVE-2023-28252",
"full_name": "bkstephen\/Compiled-PoC-Binary-For-CVE-2023-28252",
"owner": {
"login": "bkstephen",
"id": 8013595,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8013595?v=4",
"html_url": "https:\/\/github.com\/bkstephen",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/bkstephen\/Compiled-PoC-Binary-For-CVE-2023-28252",
"description": "The repo contains a precompiled binary which can be run on a Windows machine vulnerable to CVE-2023-28252",
"fork": false,
"created_at": "2024-01-01T15:30:33Z",
"updated_at": "2024-06-21T07:22:21Z",
"pushed_at": "2024-01-01T15:39:15Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 746601760,
"name": "CVE-2023-28252-Compiled-exe",

View file

@ -498,37 +498,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 740067240,
"name": "CVE-2023-28432",
"full_name": "netuseradministrator\/CVE-2023-28432",
"owner": {
"login": "netuseradministrator",
"id": 96680088,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96680088?v=4",
"html_url": "https:\/\/github.com\/netuseradministrator",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/netuseradministrator\/CVE-2023-28432",
"description": null,
"fork": false,
"created_at": "2024-01-07T12:34:49Z",
"updated_at": "2024-01-31T02:25:36Z",
"pushed_at": "2024-01-07T15:20:56Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 741968176,
"name": "CVE-2023-28432",

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2023-06-18T11:14:08Z",
"updated_at": "2025-01-05T21:11:25Z",
"updated_at": "2025-01-17T05:28:03Z",
"pushed_at": "2023-06-18T11:51:54Z",
"stargazers_count": 159,
"watchers_count": 159,
"stargazers_count": 160,
"watchers_count": 160,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 159,
"watchers": 160,
"score": 0,
"subscribers_count": 4
}

View file

@ -130,37 +130,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 737886117,
"name": "CVE-2023-29357-Check",
"full_name": "Jev1337\/CVE-2023-29357-Check",
"owner": {
"login": "Jev1337",
"id": 19759761,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19759761?v=4",
"html_url": "https:\/\/github.com\/Jev1337",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Jev1337\/CVE-2023-29357-Check",
"description": "A Python script that verifies whether a target is vulnerable to CVE-2023-29357 or not",
"fork": false,
"created_at": "2024-01-01T21:08:22Z",
"updated_at": "2024-11-06T09:07:45Z",
"pushed_at": "2024-01-01T21:13:58Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
{
"id": 856513093,
"name": "Event-ID-189-Rule-Name-SOC227-CVE-2023-29357",

View file

@ -1,33 +0,0 @@
[
{
"id": 739746679,
"name": "CVE-2023-31446-Remote-Code-Execution",
"full_name": "Dodge-MPTC\/CVE-2023-31446-Remote-Code-Execution",
"owner": {
"login": "Dodge-MPTC",
"id": 75072113,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75072113?v=4",
"html_url": "https:\/\/github.com\/Dodge-MPTC",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Dodge-MPTC\/CVE-2023-31446-Remote-Code-Execution",
"description": "Repository contains description for CVE-2023-31446",
"fork": false,
"created_at": "2024-01-06T12:23:50Z",
"updated_at": "2024-01-09T09:34:42Z",
"pushed_at": "2024-01-06T12:57:49Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -45,10 +45,10 @@
"description": "rce",
"fork": false,
"created_at": "2023-06-14T09:43:31Z",
"updated_at": "2024-12-05T17:12:57Z",
"updated_at": "2025-01-17T05:54:15Z",
"pushed_at": "2023-06-15T01:35:51Z",
"stargazers_count": 129,
"watchers_count": 129,
"stargazers_count": 132,
"watchers_count": 132,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 129,
"watchers": 132,
"score": 0,
"subscribers_count": 5
},

View file

@ -233,37 +233,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 737660313,
"name": "MOVEit-CVE-2023-34362",
"full_name": "Chinyemba-ck\/MOVEit-CVE-2023-34362",
"owner": {
"login": "Chinyemba-ck",
"id": 85675608,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85675608?v=4",
"html_url": "https:\/\/github.com\/Chinyemba-ck",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Chinyemba-ck\/MOVEit-CVE-2023-34362",
"description": "A video presentation analysing the technical details, scale and lessons to be learned from the MOVEit CVE-2023=3462(CS50 Introduction to Cyber Security Finale Project)",
"fork": false,
"created_at": "2024-01-01T00:55:07Z",
"updated_at": "2024-01-01T00:55:07Z",
"pushed_at": "2024-01-01T00:56:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 821497009,
"name": "MoveIT-CVE-2023-34362-RCE",

View file

@ -107,10 +107,10 @@
"description": "Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE",
"fork": false,
"created_at": "2023-08-24T22:24:34Z",
"updated_at": "2025-01-11T04:48:47Z",
"updated_at": "2025-01-17T05:19:14Z",
"pushed_at": "2023-08-25T00:30:01Z",
"stargazers_count": 206,
"watchers_count": 206,
"stargazers_count": 207,
"watchers_count": 207,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 206,
"watchers": 207,
"score": 0,
"subscribers_count": 5
}

View file

@ -14,10 +14,10 @@
"description": "PoC for the recent critical vuln affecting OpenSSH versions < 9.3p2",
"fork": false,
"created_at": "2023-08-09T19:56:07Z",
"updated_at": "2025-01-05T23:48:35Z",
"updated_at": "2025-01-17T03:40:15Z",
"pushed_at": "2024-11-09T16:38:20Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 35,
"watchers": 36,
"score": 0,
"subscribers_count": 1
},
@ -67,37 +67,6 @@
"score": 0,
"subscribers_count": 3
},
{
"id": 739947067,
"name": "CVE-2023-38408",
"full_name": "classic130\/CVE-2023-38408",
"owner": {
"login": "classic130",
"id": 69665702,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69665702?v=4",
"html_url": "https:\/\/github.com\/classic130",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/classic130\/CVE-2023-38408",
"description": "CVE-2023-38408 Remote Code Execution in OpenSSH's forwarded ssh-agent",
"fork": false,
"created_at": "2024-01-07T03:03:06Z",
"updated_at": "2024-09-08T06:41:32Z",
"pushed_at": "2023-07-25T22:16:44Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
{
"id": 758630242,
"name": "CVE-2023-38408",

View file

@ -1099,37 +1099,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 767222866,
"name": "CVE-2023-38646",
"full_name": "DaniTheHack3r\/CVE-2023-38646",
"owner": {
"login": "DaniTheHack3r",
"id": 51076007,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51076007?v=4",
"html_url": "https:\/\/github.com\/DaniTheHack3r",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/DaniTheHack3r\/CVE-2023-38646",
"description": "CVE-2023-38646 Metabase 0.46.6 exploit",
"fork": false,
"created_at": "2024-03-04T23:01:43Z",
"updated_at": "2024-03-04T23:01:48Z",
"pushed_at": "2023-10-11T15:26:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 892415497,
"name": "cve-2023-38646-poc",

View file

@ -1,33 +0,0 @@
[
{
"id": 739336852,
"name": "platform_system_netd_AOSP10_r33_CVE-2023-40084",
"full_name": "Trinadh465\/platform_system_netd_AOSP10_r33_CVE-2023-40084",
"owner": {
"login": "Trinadh465",
"id": 102574296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102574296?v=4",
"html_url": "https:\/\/github.com\/Trinadh465",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Trinadh465\/platform_system_netd_AOSP10_r33_CVE-2023-40084",
"description": null,
"fork": false,
"created_at": "2024-01-05T10:20:57Z",
"updated_at": "2024-01-05T10:22:41Z",
"pushed_at": "2024-01-05T10:23:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2025-01-15T20:51:33Z",
"updated_at": "2025-01-17T04:44:33Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1387,
"watchers_count": 1387,
"stargazers_count": 1389,
"watchers_count": 1389,
"has_discussions": false,
"forks_count": 238,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 238,
"watchers": 1387,
"watchers": 1389,
"score": 0,
"subscribers_count": 21
},

View file

@ -1,33 +0,0 @@
[
{
"id": 737775658,
"name": "CVE-2023-48981",
"full_name": "tristao-marinho\/CVE-2023-48981",
"owner": {
"login": "tristao-marinho",
"id": 101610912,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101610912?v=4",
"html_url": "https:\/\/github.com\/tristao-marinho",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tristao-marinho\/CVE-2023-48981",
"description": "POC CVE-2023-48981",
"fork": false,
"created_at": "2024-01-01T13:06:39Z",
"updated_at": "2024-01-01T13:06:40Z",
"pushed_at": "2024-01-01T13:18:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 737777512,
"name": "CVE-2023-48982",
"full_name": "tristao-marinho\/CVE-2023-48982",
"owner": {
"login": "tristao-marinho",
"id": 101610912,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101610912?v=4",
"html_url": "https:\/\/github.com\/tristao-marinho",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tristao-marinho\/CVE-2023-48982",
"description": "POC CVE-2023-48982",
"fork": false,
"created_at": "2024-01-01T13:14:49Z",
"updated_at": "2024-01-01T13:14:49Z",
"pushed_at": "2024-01-01T13:17:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 737778720,
"name": "CVE-2023-48983",
"full_name": "tristao-marinho\/CVE-2023-48983",
"owner": {
"login": "tristao-marinho",
"id": 101610912,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101610912?v=4",
"html_url": "https:\/\/github.com\/tristao-marinho",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tristao-marinho\/CVE-2023-48983",
"description": "POC CVE-2023-48983",
"fork": false,
"created_at": "2024-01-01T13:19:54Z",
"updated_at": "2024-01-02T12:18:35Z",
"pushed_at": "2024-01-01T13:23:01Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -103,37 +103,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 740289485,
"name": "Exploit-CVE-2023-49070-and-CVE-2023-51467-Apache-OFBiz",
"full_name": "UserConnecting\/Exploit-CVE-2023-49070-and-CVE-2023-51467-Apache-OFBiz",
"owner": {
"login": "UserConnecting",
"id": 97047842,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97047842?v=4",
"html_url": "https:\/\/github.com\/UserConnecting",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/UserConnecting\/Exploit-CVE-2023-49070-and-CVE-2023-51467-Apache-OFBiz",
"description": "Authentication Bypass Vulnerability Apache OFBiz < 18.12.10.",
"fork": false,
"created_at": "2024-01-08T03:13:43Z",
"updated_at": "2024-04-13T04:19:46Z",
"pushed_at": "2024-01-08T07:03:01Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 742169705,
"name": "CVE-2023-49070_CVE-2023-51467",

View file

@ -1,33 +0,0 @@
[
{
"id": 739242348,
"name": "CVE-2023-51073",
"full_name": "christopher-pace\/CVE-2023-51073",
"owner": {
"login": "christopher-pace",
"id": 22531478,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22531478?v=4",
"html_url": "https:\/\/github.com\/christopher-pace",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/christopher-pace\/CVE-2023-51073",
"description": "Firmware Update Server Verification Vulnerability on Buffalo LS210D Version 1.78-0.03",
"fork": false,
"created_at": "2024-01-05T05:16:18Z",
"updated_at": "2024-01-07T02:12:37Z",
"pushed_at": "2024-01-07T01:40:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 737937769,
"name": "CVE-2023-51126",
"full_name": "risuxx\/CVE-2023-51126",
"owner": {
"login": "risuxx",
"id": 47944560,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47944560?v=4",
"html_url": "https:\/\/github.com\/risuxx",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/risuxx\/CVE-2023-51126",
"description": null,
"fork": false,
"created_at": "2024-01-02T02:31:06Z",
"updated_at": "2024-01-03T14:30:50Z",
"pushed_at": "2024-01-02T02:38:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 737940013,
"name": "CVE-2023-51127",
"full_name": "risuxx\/CVE-2023-51127",
"owner": {
"login": "risuxx",
"id": 47944560,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47944560?v=4",
"html_url": "https:\/\/github.com\/risuxx",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/risuxx\/CVE-2023-51127",
"description": null,
"fork": false,
"created_at": "2024-01-02T02:43:09Z",
"updated_at": "2024-01-03T14:30:37Z",
"pushed_at": "2024-01-02T02:46:58Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -216,130 +216,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 737934166,
"name": "CVE-2023-51385",
"full_name": "WOOOOONG\/CVE-2023-51385",
"owner": {
"login": "WOOOOONG",
"id": 40143329,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40143329?v=4",
"html_url": "https:\/\/github.com\/WOOOOONG",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/WOOOOONG\/CVE-2023-51385",
"description": "CVE-2023-51385 PoC Exploit ",
"fork": false,
"created_at": "2024-01-02T02:12:35Z",
"updated_at": "2024-07-03T04:28:13Z",
"pushed_at": "2024-01-02T06:48:39Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 738402073,
"name": "CVE-2023-51385",
"full_name": "uccu99\/CVE-2023-51385",
"owner": {
"login": "uccu99",
"id": 155516921,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/155516921?v=4",
"html_url": "https:\/\/github.com\/uccu99",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/uccu99\/CVE-2023-51385",
"description": null,
"fork": false,
"created_at": "2024-01-03T06:28:34Z",
"updated_at": "2024-01-03T06:28:35Z",
"pushed_at": "2024-01-03T06:28:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 738661198,
"name": "exploit-CVE-2023-51385",
"full_name": "julienbrs\/exploit-CVE-2023-51385",
"owner": {
"login": "julienbrs",
"id": 106234742,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106234742?v=4",
"html_url": "https:\/\/github.com\/julienbrs",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/julienbrs\/exploit-CVE-2023-51385",
"description": null,
"fork": false,
"created_at": "2024-01-03T18:40:44Z",
"updated_at": "2024-01-03T18:40:44Z",
"pushed_at": "2024-01-03T18:41:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 738669696,
"name": "malicious-exploit-CVE-2023-51385",
"full_name": "julienbrs\/malicious-exploit-CVE-2023-51385",
"owner": {
"login": "julienbrs",
"id": 106234742,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106234742?v=4",
"html_url": "https:\/\/github.com\/julienbrs",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/julienbrs\/malicious-exploit-CVE-2023-51385",
"description": null,
"fork": false,
"created_at": "2024-01-03T19:08:28Z",
"updated_at": "2024-01-03T19:08:28Z",
"pushed_at": "2024-01-03T20:06:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 741050517,
"name": "CVE-2023-51385",

View file

@ -144,68 +144,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 738955975,
"name": "Exploit_CVE-2023-51467",
"full_name": "Subha-BOO7\/Exploit_CVE-2023-51467",
"owner": {
"login": "Subha-BOO7",
"id": 141217634,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/141217634?v=4",
"html_url": "https:\/\/github.com\/Subha-BOO7",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Subha-BOO7\/Exploit_CVE-2023-51467",
"description": null,
"fork": false,
"created_at": "2024-01-04T12:44:43Z",
"updated_at": "2024-01-04T12:51:15Z",
"pushed_at": "2024-01-04T12:45:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 739631896,
"name": "CVE-2023-51467-Exploit",
"full_name": "JaneMandy\/CVE-2023-51467-Exploit",
"owner": {
"login": "JaneMandy",
"id": 36792635,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36792635?v=4",
"html_url": "https:\/\/github.com\/JaneMandy",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/JaneMandy\/CVE-2023-51467-Exploit",
"description": "Apache Ofbiz CVE-2023-51467 图形化漏洞利用工具",
"fork": false,
"created_at": "2024-01-06T04:07:07Z",
"updated_at": "2024-09-05T01:30:59Z",
"pushed_at": "2024-01-06T10:33:34Z",
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 39,
"score": 0,
"subscribers_count": 1
},
{
"id": 741082767,
"name": "cve-2023-51467",

View file

@ -93,36 +93,5 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 739273926,
"name": "CVE-2023-51764",
"full_name": "Double-q1015\/CVE-2023-51764",
"owner": {
"login": "Double-q1015",
"id": 77765134,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77765134?v=4",
"html_url": "https:\/\/github.com\/Double-q1015",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Double-q1015\/CVE-2023-51764",
"description": "CVE-2023-51764 poc",
"fork": false,
"created_at": "2024-01-05T07:07:47Z",
"updated_at": "2024-01-05T07:12:42Z",
"pushed_at": "2024-01-05T07:12:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 738005679,
"name": "CVE-2023-7172",
"full_name": "sharathc213\/CVE-2023-7172",
"owner": {
"login": "sharathc213",
"id": 63504490,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63504490?v=4",
"html_url": "https:\/\/github.com\/sharathc213",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sharathc213\/CVE-2023-7172",
"description": null,
"fork": false,
"created_at": "2024-01-02T07:28:25Z",
"updated_at": "2024-09-07T10:22:34Z",
"pushed_at": "2024-01-02T08:01:27Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 738027789,
"name": "CVE-2023-7173",
"full_name": "sharathc213\/CVE-2023-7173",
"owner": {
"login": "sharathc213",
"id": 63504490,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63504490?v=4",
"html_url": "https:\/\/github.com\/sharathc213",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sharathc213\/CVE-2023-7173",
"description": null,
"fork": false,
"created_at": "2024-01-02T08:41:10Z",
"updated_at": "2024-09-07T10:22:32Z",
"pushed_at": "2024-01-02T08:55:56Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2025-01-16T09:39:37Z",
"updated_at": "2025-01-17T06:00:34Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2326,
"watchers_count": 2326,
"stargazers_count": 2327,
"watchers_count": 2327,
"has_discussions": false,
"forks_count": 302,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 302,
"watchers": 2326,
"watchers": 2327,
"score": 0,
"subscribers_count": 27
},

View file

@ -14,19 +14,19 @@
"description": null,
"fork": false,
"created_at": "2024-01-12T15:08:01Z",
"updated_at": "2024-12-26T18:51:04Z",
"updated_at": "2025-01-17T05:17:42Z",
"pushed_at": "2024-01-14T07:14:33Z",
"stargazers_count": 138,
"watchers_count": 138,
"stargazers_count": 139,
"watchers_count": 139,
"has_discussions": false,
"forks_count": 30,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 138,
"forks": 31,
"watchers": 139,
"score": 0,
"subscribers_count": 4
}

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-08-14T16:20:38Z",
"updated_at": "2025-01-09T11:58:18Z",
"updated_at": "2025-01-17T02:40:27Z",
"pushed_at": "2024-09-05T23:21:00Z",
"stargazers_count": 114,
"watchers_count": 114,
"stargazers_count": 115,
"watchers_count": 115,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 114,
"watchers": 115,
"score": 0,
"subscribers_count": 3
}

View file

@ -14,19 +14,19 @@
"description": null,
"fork": false,
"created_at": "2024-11-26T12:39:44Z",
"updated_at": "2025-01-16T23:53:05Z",
"updated_at": "2025-01-17T05:12:02Z",
"pushed_at": "2025-01-16T09:48:07Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 24,
"forks": 3,
"watchers": 29,
"score": 0,
"subscribers_count": 0
}

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-44258",
"fork": false,
"created_at": "2024-10-29T09:45:03Z",
"updated_at": "2024-12-23T03:15:29Z",
"updated_at": "2025-01-17T01:26:34Z",
"pushed_at": "2024-11-02T19:20:44Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 62,
"watchers_count": 62,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 61,
"watchers": 62,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,12 +14,12 @@
"description": "POC exploit for CVE-2024-49138",
"fork": false,
"created_at": "2025-01-15T00:43:37Z",
"updated_at": "2025-01-16T20:52:56Z",
"updated_at": "2025-01-17T02:59:00Z",
"pushed_at": "2025-01-15T01:01:21Z",
"stargazers_count": 136,
"watchers_count": 136,
"stargazers_count": 142,
"watchers_count": 142,
"has_discussions": false,
"forks_count": 24,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,8 +30,8 @@
"windows"
],
"visibility": "public",
"forks": 24,
"watchers": 136,
"forks": 26,
"watchers": 142,
"score": 0,
"subscribers_count": 2
}

View file

@ -14,19 +14,19 @@
"description": "CVE-2024-53691",
"fork": false,
"created_at": "2025-01-13T10:07:25Z",
"updated_at": "2025-01-15T16:00:00Z",
"updated_at": "2025-01-17T03:02:45Z",
"pushed_at": "2025-01-13T10:16:58Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"forks": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,19 +14,19 @@
"description": null,
"fork": false,
"created_at": "2025-01-16T07:26:15Z",
"updated_at": "2025-01-16T22:27:04Z",
"updated_at": "2025-01-17T02:26:36Z",
"pushed_at": "2025-01-16T08:58:49Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 27,
"forks": 7,
"watchers": 30,
"score": 0,
"subscribers_count": 0
}

33
2024/CVE-2024-57784.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 917637744,
"name": "CVE-2024-57784",
"full_name": "s4fv4n\/CVE-2024-57784",
"owner": {
"login": "s4fv4n",
"id": 42152758,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42152758?v=4",
"html_url": "https:\/\/github.com\/s4fv4n",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/s4fv4n\/CVE-2024-57784",
"description": null,
"fork": false,
"created_at": "2025-01-16T11:17:10Z",
"updated_at": "2025-01-17T04:32:46Z",
"pushed_at": "2025-01-16T11:19:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

33
2024/CVE-2024-57785.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 917634991,
"name": "CVE-2024-57785",
"full_name": "s4fv4n\/CVE-2024-57785",
"owner": {
"login": "s4fv4n",
"id": 42152758,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42152758?v=4",
"html_url": "https:\/\/github.com\/s4fv4n",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/s4fv4n\/CVE-2024-57785",
"description": null,
"fork": false,
"created_at": "2025-01-16T11:10:34Z",
"updated_at": "2025-01-17T04:32:13Z",
"pushed_at": "2025-01-16T11:19:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -138,10 +138,10 @@
"description": "Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)",
"fork": false,
"created_at": "2025-01-15T18:27:12Z",
"updated_at": "2025-01-17T00:29:43Z",
"updated_at": "2025-01-17T04:05:43Z",
"pushed_at": "2025-01-16T15:44:15Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -150,7 +150,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 5,
"watchers": 11,
"score": 0,
"subscribers_count": 0
},
@ -169,10 +169,10 @@
"description": "PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways",
"fork": false,
"created_at": "2025-01-16T14:45:53Z",
"updated_at": "2025-01-16T20:11:13Z",
"updated_at": "2025-01-17T05:55:41Z",
"pushed_at": "2025-01-16T20:09:52Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -181,7 +181,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 13,
"score": 0,
"subscribers_count": 0
}

View file

@ -8488,6 +8488,20 @@
### CVE-2024-57523
- [HackWidMaddy/CVE-2024-57523.](https://github.com/HackWidMaddy/CVE-2024-57523.)
### CVE-2024-57784 (2025-01-16)
<code>An issue in the component /php/script_uploads.php of Zenitel AlphaWeb XE v11.2.3.10 allows attackers to execute a directory traversal.
</code>
- [s4fv4n/CVE-2024-57784](https://github.com/s4fv4n/CVE-2024-57784)
### CVE-2024-57785 (2025-01-16)
<code>Zenitel AlphaWeb XE v11.2.3.10 was discovered to contain a local file inclusion vulnerability via the component amc_uploads.php.
</code>
- [s4fv4n/CVE-2024-57785](https://github.com/s4fv4n/CVE-2024-57785)
### CVE-2024-1642470
- [Symbolexe/CVE-2024-1642470](https://github.com/Symbolexe/CVE-2024-1642470)
@ -10067,20 +10081,6 @@
- [soltanali0/CVE-2023-7028](https://github.com/soltanali0/CVE-2023-7028)
- [gh-ost00/CVE-2023-7028](https://github.com/gh-ost00/CVE-2023-7028)
### CVE-2023-7172 (2023-12-30)
<code>Eine kritische Schwachstelle wurde in PHPGurukul Hospital Management System 1.0 entdeckt. Es geht hierbei um eine nicht näher spezifizierte Funktion der Komponente Admin Dashboard. Durch Manipulieren mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.
</code>
- [sharathc213/CVE-2023-7172](https://github.com/sharathc213/CVE-2023-7172)
### CVE-2023-7173 (2023-12-30)
<code>Es wurde eine problematische Schwachstelle in PHPGurukul Hospital Management System 1.0 gefunden. Es geht dabei um eine nicht klar definierte Funktion der Datei registration.php. Durch das Beeinflussen des Arguments First Name mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.
</code>
- [sharathc213/CVE-2023-7173](https://github.com/sharathc213/CVE-2023-7173)
### CVE-2023-7261 (2024-06-07)
<code>Inappropriate implementation in Google Updator prior to 1.3.36.351 in Google Chrome allowed a local attacker to perform privilege escalation via a malicious file. (Chromium security severity: High)
@ -10677,7 +10677,6 @@
- [aaaademo/Confluence-EvilJar](https://github.com/aaaademo/Confluence-EvilJar)
- [edsonjt81/CVE-2023-22515-Scan.](https://github.com/edsonjt81/CVE-2023-22515-Scan.)
- [INTfinityConsulting/cve-2023-22515](https://github.com/INTfinityConsulting/cve-2023-22515)
- [CalegariMindSec/Exploit-CVE-2023-22515](https://github.com/CalegariMindSec/Exploit-CVE-2023-22515)
- [rxerium/CVE-2023-22515](https://github.com/rxerium/CVE-2023-22515)
- [fyx1t/NSE--CVE-2023-22515](https://github.com/fyx1t/NSE--CVE-2023-22515)
- [s1d6point7bugcrowd/CVE-2023-22515-check](https://github.com/s1d6point7bugcrowd/CVE-2023-22515-check)
@ -11092,7 +11091,6 @@
- [H4R335HR/CVE-2023-24329-PoC](https://github.com/H4R335HR/CVE-2023-24329-PoC)
- [Pandante-Central/CVE-2023-24329-codeql-test](https://github.com/Pandante-Central/CVE-2023-24329-codeql-test)
- [PenTestMano/CVE-2023-24329-Exploit](https://github.com/PenTestMano/CVE-2023-24329-Exploit)
### CVE-2023-24488 (2023-07-10)
@ -11535,8 +11533,6 @@
- [Hamibubu/CVE-2023-27163](https://github.com/Hamibubu/CVE-2023-27163)
- [KharimMchatta/basketcraft](https://github.com/KharimMchatta/basketcraft)
- [MasterCode112/CVE-2023-27163](https://github.com/MasterCode112/CVE-2023-27163)
- [Rubioo02/CVE-2023-27163](https://github.com/Rubioo02/CVE-2023-27163)
- [madhavmehndiratta/CVE-2023-27163](https://github.com/madhavmehndiratta/CVE-2023-27163)
- [Rishabh-Kumar-Cyber-Sec/CVE-2023-27163-ssrf-to-port-scanning](https://github.com/Rishabh-Kumar-Cyber-Sec/CVE-2023-27163-ssrf-to-port-scanning)
- [btar1gan/exploit_CVE-2023-27163](https://github.com/btar1gan/exploit_CVE-2023-27163)
@ -11776,7 +11772,6 @@
- [fortra/CVE-2023-28252](https://github.com/fortra/CVE-2023-28252)
- [726232111/CVE-2023-28252](https://github.com/726232111/CVE-2023-28252)
- [Danasuley/CVE-2023-28252-](https://github.com/Danasuley/CVE-2023-28252-)
- [bkstephen/Compiled-PoC-Binary-For-CVE-2023-28252](https://github.com/bkstephen/Compiled-PoC-Binary-For-CVE-2023-28252)
- [duck-sec/CVE-2023-28252-Compiled-exe](https://github.com/duck-sec/CVE-2023-28252-Compiled-exe)
- [byt3n33dl3/CLFS](https://github.com/byt3n33dl3/CLFS)
- [Vulmatch/CVE-2023-28252](https://github.com/Vulmatch/CVE-2023-28252)
@ -11846,7 +11841,6 @@
- [yTxZx/CVE-2023-28432](https://github.com/yTxZx/CVE-2023-28432)
- [unam4/CVE-2023-28432-minio_update_rce](https://github.com/unam4/CVE-2023-28432-minio_update_rce)
- [C1ph3rX13/CVE-2023-28432](https://github.com/C1ph3rX13/CVE-2023-28432)
- [netuseradministrator/CVE-2023-28432](https://github.com/netuseradministrator/CVE-2023-28432)
- [xk-mt/CVE-2023-28432](https://github.com/xk-mt/CVE-2023-28432)
- [0xRulez/CVE-2023-28432](https://github.com/0xRulez/CVE-2023-28432)
@ -11967,7 +11961,6 @@
- [LuemmelSec/CVE-2023-29357](https://github.com/LuemmelSec/CVE-2023-29357)
- [KeyStrOke95/CVE-2023-29357-ExE](https://github.com/KeyStrOke95/CVE-2023-29357-ExE)
- [Guillaume-Risch/cve-2023-29357-Sharepoint](https://github.com/Guillaume-Risch/cve-2023-29357-Sharepoint)
- [Jev1337/CVE-2023-29357-Check](https://github.com/Jev1337/CVE-2023-29357-Check)
- [AhmedMansour93/Event-ID-189-Rule-Name-SOC227-CVE-2023-29357](https://github.com/AhmedMansour93/Event-ID-189-Rule-Name-SOC227-CVE-2023-29357)
### CVE-2023-29360 (2023-06-13)
@ -12376,13 +12369,6 @@
- [Dodge-MPTC/CVE-2023-31445-Unprivileged-Information-Disclosure](https://github.com/Dodge-MPTC/CVE-2023-31445-Unprivileged-Information-Disclosure)
### CVE-2023-31446 (2024-01-10)
<code>In Cassia Gateway firmware XC1000_2.1.1.2303082218 and XC2000_2.1.1.2303090947, the queueUrl parameter in /bypass/config is not sanitized. This leads to injecting Bash code and executing it with root privileges on device startup.
</code>
- [Dodge-MPTC/CVE-2023-31446-Remote-Code-Execution](https://github.com/Dodge-MPTC/CVE-2023-31446-Remote-Code-Execution)
### CVE-2023-31497 (2023-05-11)
<code>Incorrect access control in Quick Heal Technologies Limited Seqrite Endpoint Security (EPS) all versions prior to v8.0 allows attackers to escalate privileges to root via supplying a crafted binary to the target system.
@ -13149,7 +13135,6 @@
- [Malwareman007/CVE-2023-34362](https://github.com/Malwareman007/CVE-2023-34362)
- [toorandom/moveit-payload-decrypt-CVE-2023-34362](https://github.com/toorandom/moveit-payload-decrypt-CVE-2023-34362)
- [errorfiathck/MOVEit-Exploit](https://github.com/errorfiathck/MOVEit-Exploit)
- [Chinyemba-ck/MOVEit-CVE-2023-34362](https://github.com/Chinyemba-ck/MOVEit-CVE-2023-34362)
- [glen-pearson/MoveIT-CVE-2023-34362-RCE](https://github.com/glen-pearson/MoveIT-CVE-2023-34362-RCE)
- [aditibv/MOVEit-CVE-2023-34362](https://github.com/aditibv/MOVEit-CVE-2023-34362)
@ -14006,7 +13991,6 @@
- [kali-mx/CVE-2023-38408](https://github.com/kali-mx/CVE-2023-38408)
- [LucasPDiniz/CVE-2023-38408](https://github.com/LucasPDiniz/CVE-2023-38408)
- [classic130/CVE-2023-38408](https://github.com/classic130/CVE-2023-38408)
- [wxrdnx/CVE-2023-38408](https://github.com/wxrdnx/CVE-2023-38408)
- [mrtacojr/CVE-2023-38408](https://github.com/mrtacojr/CVE-2023-38408)
- [fazilbaig1/cve_2023_38408_scanner](https://github.com/fazilbaig1/cve_2023_38408_scanner)
@ -14117,7 +14101,6 @@
- [Shisones/MetabaseRCE_CVE-2023-38646](https://github.com/Shisones/MetabaseRCE_CVE-2023-38646)
- [acesoyeo/METABASE-RCE-CVE-2023-38646-](https://github.com/acesoyeo/METABASE-RCE-CVE-2023-38646-)
- [UserConnecting/Exploit-CVE-2023-38646-Metabase](https://github.com/UserConnecting/Exploit-CVE-2023-38646-Metabase)
- [DaniTheHack3r/CVE-2023-38646](https://github.com/DaniTheHack3r/CVE-2023-38646)
- [XiaomingX/cve-2023-38646-poc](https://github.com/XiaomingX/cve-2023-38646-poc)
- [JayRyz/CVE-2023-38646-PoC-Metabase](https://github.com/JayRyz/CVE-2023-38646-PoC-Metabase)
@ -14413,13 +14396,6 @@
- [kenbuckler/WS_FTP-CVE-2023-40044](https://github.com/kenbuckler/WS_FTP-CVE-2023-40044)
### CVE-2023-40084 (2023-12-04)
<code>In run of MDnsSdListener.cpp, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
</code>
- [Trinadh465/platform_system_netd_AOSP10_r33_CVE-2023-40084](https://github.com/Trinadh465/platform_system_netd_AOSP10_r33_CVE-2023-40084)
### CVE-2023-40109 (2024-02-15)
<code>In createFromParcel of UsbConfiguration.java, there is a possible background activity launch (BAL) due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
@ -16328,15 +16304,6 @@
- [vinnie1717/CVE-2023-48974](https://github.com/vinnie1717/CVE-2023-48974)
### CVE-2023-48981
- [tristao-marinho/CVE-2023-48981](https://github.com/tristao-marinho/CVE-2023-48981)
### CVE-2023-48982
- [tristao-marinho/CVE-2023-48982](https://github.com/tristao-marinho/CVE-2023-48982)
### CVE-2023-48983
- [tristao-marinho/CVE-2023-48983](https://github.com/tristao-marinho/CVE-2023-48983)
### CVE-2023-49002 (2023-12-27)
<code>An issue in Xenom Technologies (sinous) Phone Dialer-voice Call Dialer v.1.2.5 allows an attacker to bypass intended access restrictions via interaction with com.funprime.calldialer.ui.activities.OutgoingActivity.
@ -16373,7 +16340,6 @@
- [abdoghazy2015/ofbiz-CVE-2023-49070-RCE-POC](https://github.com/abdoghazy2015/ofbiz-CVE-2023-49070-RCE-POC)
- [0xrobiul/CVE-2023-49070](https://github.com/0xrobiul/CVE-2023-49070)
- [D0g3-8Bit/OFBiz-Attack](https://github.com/D0g3-8Bit/OFBiz-Attack)
- [UserConnecting/Exploit-CVE-2023-49070-and-CVE-2023-51467-Apache-OFBiz](https://github.com/UserConnecting/Exploit-CVE-2023-49070-and-CVE-2023-51467-Apache-OFBiz)
- [yukselberkay/CVE-2023-49070_CVE-2023-51467](https://github.com/yukselberkay/CVE-2023-49070_CVE-2023-51467)
- [Praison001/Apache-OFBiz-Auth-Bypass-and-RCE-Exploit-CVE-2023-49070-CVE-2023-51467](https://github.com/Praison001/Apache-OFBiz-Auth-Bypass-and-RCE-Exploit-CVE-2023-49070-CVE-2023-51467)
@ -16828,30 +16794,9 @@
### CVE-2023-51000
- [Team-Byerus/CVE-2023-51000](https://github.com/Team-Byerus/CVE-2023-51000)
### CVE-2023-51073 (2024-01-11)
<code>An issue in Buffalo LS210D v.1.78-0.03 allows a remote attacker to execute arbitrary code via the Firmware Update Script at /etc/init.d/update_notifications.sh.
</code>
- [christopher-pace/CVE-2023-51073](https://github.com/christopher-pace/CVE-2023-51073)
### CVE-2023-51119
- [OscarAkaElvis/CVE-2023-51119](https://github.com/OscarAkaElvis/CVE-2023-51119)
### CVE-2023-51126 (2024-01-10)
<code>Command injection vulnerability in /usr/www/res.php in FLIR AX8 up to 1.46.16 allows attackers to run arbitrary commands via the value parameter.
</code>
- [risuxx/CVE-2023-51126](https://github.com/risuxx/CVE-2023-51126)
### CVE-2023-51127 (2024-01-10)
<code>FLIR AX8 thermal sensor cameras up to and including 1.46.16 are vulnerable to Directory Traversal due to improper access restriction. This vulnerability allows an unauthenticated, remote attacker to obtain arbitrary sensitive file contents by uploading a specially crafted symbolic link file.
</code>
- [risuxx/CVE-2023-51127](https://github.com/risuxx/CVE-2023-51127)
### CVE-2023-51214
- [chandraprarikraj/CVE-2023-51214](https://github.com/chandraprarikraj/CVE-2023-51214)
@ -16874,10 +16819,6 @@
- [LtmThink/CVE-2023-51385_test](https://github.com/LtmThink/CVE-2023-51385_test)
- [WLaoDuo/CVE-2023-51385_poc-test](https://github.com/WLaoDuo/CVE-2023-51385_poc-test)
- [power1314520/CVE-2023-51385_test](https://github.com/power1314520/CVE-2023-51385_test)
- [WOOOOONG/CVE-2023-51385](https://github.com/WOOOOONG/CVE-2023-51385)
- [uccu99/CVE-2023-51385](https://github.com/uccu99/CVE-2023-51385)
- [julienbrs/exploit-CVE-2023-51385](https://github.com/julienbrs/exploit-CVE-2023-51385)
- [julienbrs/malicious-exploit-CVE-2023-51385](https://github.com/julienbrs/malicious-exploit-CVE-2023-51385)
- [Sonicrrrr/CVE-2023-51385](https://github.com/Sonicrrrr/CVE-2023-51385)
- [farliy-hacker/CVE-2023-51385](https://github.com/farliy-hacker/CVE-2023-51385)
- [farliy-hacker/CVE-2023-51385-save](https://github.com/farliy-hacker/CVE-2023-51385-save)
@ -16914,8 +16855,6 @@
- [Chocapikk/CVE-2023-51467](https://github.com/Chocapikk/CVE-2023-51467)
- [K3ysTr0K3R/CVE-2023-51467-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2023-51467-EXPLOIT)
- [jakabakos/Apache-OFBiz-Authentication-Bypass](https://github.com/jakabakos/Apache-OFBiz-Authentication-Bypass)
- [Subha-BOO7/Exploit_CVE-2023-51467](https://github.com/Subha-BOO7/Exploit_CVE-2023-51467)
- [JaneMandy/CVE-2023-51467-Exploit](https://github.com/JaneMandy/CVE-2023-51467-Exploit)
- [vulncheck-oss/cve-2023-51467](https://github.com/vulncheck-oss/cve-2023-51467)
- [2ptr/BadBizness-CVE-2023-51467](https://github.com/2ptr/BadBizness-CVE-2023-51467)
- [AhmedMansour93/Event-ID-217-Rule-Name-SOC254-Apache-OFBiz-Auth-Bypass-and-Code-Injection-0Day-CVE-2023-51467-](https://github.com/AhmedMansour93/Event-ID-217-Rule-Name-SOC254-Apache-OFBiz-Auth-Bypass-and-Code-Injection-0Day-CVE-2023-51467-)
@ -16942,7 +16881,6 @@
- [duy-31/CVE-2023-51764](https://github.com/duy-31/CVE-2023-51764)
- [eeenvik1/CVE-2023-51764](https://github.com/eeenvik1/CVE-2023-51764)
- [d4op/CVE-2023-51764-POC](https://github.com/d4op/CVE-2023-51764-POC)
- [Double-q1015/CVE-2023-51764](https://github.com/Double-q1015/CVE-2023-51764)
### CVE-2023-51800 (2024-02-29)