Auto Update 2025/01/29 18:33:18

This commit is contained in:
motikan2010-bot 2025-01-30 03:33:18 +09:00
parent 7b6d54869c
commit 55247ad430
32 changed files with 209 additions and 141 deletions

View file

@ -14,10 +14,10 @@
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)",
"fork": false,
"created_at": "2021-08-31T09:51:12Z",
"updated_at": "2025-01-27T07:59:56Z",
"updated_at": "2025-01-29T13:42:42Z",
"pushed_at": "2024-05-03T22:24:07Z",
"stargazers_count": 187,
"watchers_count": 187,
"stargazers_count": 188,
"watchers_count": 188,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -47,7 +47,7 @@
],
"visibility": "public",
"forks": 26,
"watchers": 187,
"watchers": 188,
"score": 0,
"subscribers_count": 8
}

View file

@ -28,7 +28,7 @@
"forks": 14,
"watchers": 84,
"score": 0,
"subscribers_count": 9
"subscribers_count": 8
},
{
"id": 555215011,

View file

@ -88,10 +88,10 @@
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具针对CVE-2015-9235\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ也可使用字典\/字符枚举(包括JJWT)的方式进行爆破",
"fork": false,
"created_at": "2025-01-27T14:23:31Z",
"updated_at": "2025-01-29T10:53:14Z",
"updated_at": "2025-01-29T12:46:32Z",
"pushed_at": "2025-01-28T13:28:46Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -100,7 +100,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 15,
"watchers": 16,
"score": 0,
"subscribers_count": 1
}

View file

@ -76,10 +76,10 @@
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具针对CVE-2015-9235\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ也可使用字典\/字符枚举(包括JJWT)的方式进行爆破",
"fork": false,
"created_at": "2025-01-27T14:23:31Z",
"updated_at": "2025-01-29T10:53:14Z",
"updated_at": "2025-01-29T12:46:32Z",
"pushed_at": "2025-01-28T13:28:46Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 15,
"watchers": 16,
"score": 0,
"subscribers_count": 1
}

View file

@ -324,10 +324,10 @@
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具针对CVE-2015-9235\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ也可使用字典\/字符枚举(包括JJWT)的方式进行爆破",
"fork": false,
"created_at": "2025-01-27T14:23:31Z",
"updated_at": "2025-01-29T10:53:14Z",
"updated_at": "2025-01-29T12:46:32Z",
"pushed_at": "2025-01-28T13:28:46Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -336,7 +336,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 15,
"watchers": 16,
"score": 0,
"subscribers_count": 1
}

View file

@ -111,10 +111,10 @@
"description": "CVE-2018-8120 Exploit for Win2003 Win2008 WinXP Win7 ",
"fork": false,
"created_at": "2018-06-07T08:30:07Z",
"updated_at": "2024-08-12T19:39:09Z",
"updated_at": "2025-01-29T16:50:39Z",
"pushed_at": "2018-08-08T05:48:24Z",
"stargazers_count": 293,
"watchers_count": 293,
"stargazers_count": 294,
"watchers_count": 294,
"has_discussions": false,
"forks_count": 125,
"allow_forking": true,
@ -123,7 +123,7 @@
"topics": [],
"visibility": "public",
"forks": 125,
"watchers": 293,
"watchers": 294,
"score": 0,
"subscribers_count": 3
},

View file

@ -61,8 +61,8 @@
"description": "Scanner and attack suite for hosts that forward unauthenticated packets via IPIP and GRE protocols. (CVE-2020-10136 CVE-2024-7595)",
"fork": false,
"created_at": "2025-01-23T20:21:00Z",
"updated_at": "2025-01-29T11:59:27Z",
"pushed_at": "2025-01-29T11:59:24Z",
"updated_at": "2025-01-29T18:11:51Z",
"pushed_at": "2025-01-29T18:11:48Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具针对CVE-2015-9235\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ也可使用字典\/字符枚举(包括JJWT)的方式进行爆破",
"fork": false,
"created_at": "2025-01-27T14:23:31Z",
"updated_at": "2025-01-29T10:53:14Z",
"updated_at": "2025-01-29T12:46:32Z",
"pushed_at": "2025-01-28T13:28:46Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 15,
"watchers": 16,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2020-07-13T14:40:34Z",
"updated_at": "2023-11-15T21:37:34Z",
"updated_at": "2025-01-29T15:47:25Z",
"pushed_at": "2020-07-13T14:47:02Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 0
}

View file

@ -491,13 +491,13 @@
"stargazers_count": 963,
"watchers_count": 963,
"has_discussions": false,
"forks_count": 237,
"forks_count": 236,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 237,
"forks": 236,
"watchers": 963,
"score": 0,
"subscribers_count": 27

View file

@ -50,13 +50,13 @@
"stargazers_count": 105,
"watchers_count": 105,
"has_discussions": false,
"forks_count": 23,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 23,
"forks": 22,
"watchers": 105,
"score": 0,
"subscribers_count": 5

View file

@ -14,10 +14,10 @@
"description": "CVE-2023-33733 reportlab RCE",
"fork": false,
"created_at": "2023-05-30T22:22:50Z",
"updated_at": "2024-11-12T05:29:20Z",
"updated_at": "2025-01-29T14:15:39Z",
"pushed_at": "2023-09-05T15:49:14Z",
"stargazers_count": 113,
"watchers_count": 113,
"stargazers_count": 114,
"watchers_count": 114,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 113,
"watchers": 114,
"score": 0,
"subscribers_count": 2
},

View file

@ -54,7 +54,7 @@
"stargazers_count": 82,
"watchers_count": 82,
"has_discussions": false,
"forks_count": 15,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -65,7 +65,7 @@
"vulnerability-scanners"
],
"visibility": "public",
"forks": 15,
"forks": 14,
"watchers": 82,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-03-23T15:25:49Z",
"updated_at": "2024-12-28T21:20:25Z",
"updated_at": "2025-01-29T17:52:08Z",
"pushed_at": "2024-03-23T18:59:30Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2025-01-29T11:27:26Z",
"updated_at": "2025-01-29T13:46:26Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1399,
"watchers_count": 1399,
"stargazers_count": 1400,
"watchers_count": 1400,
"has_discussions": false,
"forks_count": 244,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 244,
"watchers": 1399,
"watchers": 1400,
"score": 0,
"subscribers_count": 22
},

View file

@ -45,10 +45,10 @@
"description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具",
"fork": false,
"created_at": "2023-10-27T05:57:21Z",
"updated_at": "2025-01-20T11:02:55Z",
"updated_at": "2025-01-29T13:18:10Z",
"pushed_at": "2024-01-29T02:28:11Z",
"stargazers_count": 237,
"watchers_count": 237,
"stargazers_count": 238,
"watchers_count": 238,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 237,
"watchers": 238,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,10 +14,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2025-01-26T19:37:35Z",
"updated_at": "2025-01-29T18:03:43Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2330,
"watchers_count": 2330,
"stargazers_count": 2331,
"watchers_count": 2331,
"has_discussions": false,
"forks_count": 303,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 303,
"watchers": 2330,
"watchers": 2331,
"score": 0,
"subscribers_count": 28
},

View file

@ -256,5 +256,36 @@
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 924126046,
"name": "CVE-2024-2961",
"full_name": "4wayhandshake\/CVE-2024-2961",
"owner": {
"login": "4wayhandshake",
"id": 122475838,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122475838?v=4",
"html_url": "https:\/\/github.com\/4wayhandshake",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/4wayhandshake\/CVE-2024-2961",
"description": "Uses CVE-2024-2961 to perform an arbitrary file read",
"fork": false,
"created_at": "2025-01-29T13:15:11Z",
"updated_at": "2025-01-29T14:13:44Z",
"pushed_at": "2025-01-29T14:13:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -400,10 +400,10 @@
"description": "Shell scripts to identify and fix installations of xz-utils affected by the CVE-2024-3094 vulnerability. Versions 5.6.0 and 5.6.1 of xz-utils are known to be vulnerable, and this script aids in detecting them and optionally downgrading to a stable, un-compromised version (5.4.6) or upgrading to latest version. Added Ansible Playbook",
"fork": false,
"created_at": "2024-03-30T19:23:30Z",
"updated_at": "2025-01-19T05:21:56Z",
"updated_at": "2025-01-29T17:29:59Z",
"pushed_at": "2024-04-07T07:40:48Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -428,7 +428,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 23,
"watchers": 24,
"score": 0,
"subscribers_count": 4
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"forks": 11,
"watchers": 38,
"score": 0,
"subscribers_count": 3

View file

@ -19,13 +19,13 @@
"stargazers_count": 70,
"watchers_count": 70,
"has_discussions": false,
"forks_count": 14,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
"forks": 15,
"watchers": 70,
"score": 0,
"subscribers_count": 1

View file

@ -45,8 +45,8 @@
"description": "POC CVE-2024-46982",
"fork": false,
"created_at": "2025-01-23T03:38:22Z",
"updated_at": "2025-01-23T04:06:26Z",
"pushed_at": "2025-01-23T04:06:23Z",
"updated_at": "2025-01-29T15:17:42Z",
"pushed_at": "2025-01-29T15:17:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -237,10 +237,10 @@
"description": "Unauthenticated RCE on cups-browsed (exploit and nuclei template)",
"fork": false,
"created_at": "2024-10-03T15:53:04Z",
"updated_at": "2025-01-22T08:02:25Z",
"updated_at": "2025-01-29T18:18:24Z",
"pushed_at": "2024-10-03T17:11:17Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -257,7 +257,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 2
},

View file

@ -76,10 +76,10 @@
"description": "CVE-2024-49112 LDAP RCE PoC and Metasploit Module",
"fork": false,
"created_at": "2025-01-08T01:56:41Z",
"updated_at": "2025-01-28T17:29:03Z",
"updated_at": "2025-01-29T14:36:52Z",
"pushed_at": "2025-01-14T21:22:05Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "POC exploit for CVE-2024-49138",
"fork": false,
"created_at": "2025-01-15T00:43:37Z",
"updated_at": "2025-01-27T12:30:58Z",
"updated_at": "2025-01-29T17:27:07Z",
"pushed_at": "2025-01-23T14:59:40Z",
"stargazers_count": 218,
"watchers_count": 218,
"stargazers_count": 221,
"watchers_count": 221,
"has_discussions": false,
"forks_count": 44,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 44,
"watchers": 218,
"watchers": 221,
"score": 0,
"subscribers_count": 3
},

33
2024/CVE-2024-53615.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 883310235,
"name": "CVE-2024-53615",
"full_name": "beune\/CVE-2024-53615",
"owner": {
"login": "beune",
"id": 47817451,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47817451?v=4",
"html_url": "https:\/\/github.com\/beune",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/beune\/CVE-2024-53615",
"description": "CVE-2024-53615",
"fork": false,
"created_at": "2024-11-04T18:34:58Z",
"updated_at": "2025-01-29T13:08:30Z",
"pushed_at": "2024-12-18T09:21:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -138,8 +138,8 @@
"description": "An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS and FortiProxy may allow a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.",
"fork": false,
"created_at": "2025-01-24T20:29:56Z",
"updated_at": "2025-01-28T12:51:41Z",
"pushed_at": "2025-01-28T12:21:43Z",
"updated_at": "2025-01-29T14:35:55Z",
"pushed_at": "2025-01-29T14:35:52Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
@ -200,20 +200,59 @@
"description": null,
"fork": false,
"created_at": "2025-01-27T06:25:53Z",
"updated_at": "2025-01-29T09:43:13Z",
"updated_at": "2025-01-29T17:24:27Z",
"pushed_at": "2025-01-27T19:11:46Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 26,
"forks": 7,
"watchers": 27,
"score": 0,
"subscribers_count": 1
},
{
"id": 924176696,
"name": "CVE-2024-55591-POC",
"full_name": "exfil0\/CVE-2024-55591-POC",
"owner": {
"login": "exfil0",
"id": 84948741,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84948741?v=4",
"html_url": "https:\/\/github.com\/exfil0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/exfil0\/CVE-2024-55591-POC",
"description": "A comprehensive all-in-one Python-based Proof of Concept script to discover and exploit a critical authentication bypass vulnerability (CVE-2024-55591) in certain Fortinet devices.",
"fork": false,
"created_at": "2025-01-29T14:54:40Z",
"updated_at": "2025-01-29T16:32:09Z",
"pushed_at": "2025-01-29T16:32:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"attack-surface",
"automated",
"cve-2024-55591",
"firewall",
"fortinet",
"poc",
"wizard"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -61,8 +61,8 @@
"description": "Scanner and attack suite for hosts that forward unauthenticated packets via IPIP and GRE protocols. (CVE-2020-10136 CVE-2024-7595)",
"fork": false,
"created_at": "2025-01-23T20:21:00Z",
"updated_at": "2025-01-29T12:20:28Z",
"pushed_at": "2025-01-29T12:20:25Z",
"updated_at": "2025-01-29T18:11:51Z",
"pushed_at": "2025-01-29T18:11:48Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -14,12 +14,12 @@
"description": "This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.",
"fork": false,
"created_at": "2025-01-22T14:40:34Z",
"updated_at": "2025-01-29T12:19:01Z",
"updated_at": "2025-01-29T16:53:44Z",
"pushed_at": "2025-01-22T15:08:56Z",
"stargazers_count": 78,
"watchers_count": 78,
"stargazers_count": 80,
"watchers_count": 80,
"has_discussions": false,
"forks_count": 18,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -32,8 +32,8 @@
"poc"
],
"visibility": "public",
"forks": 18,
"watchers": 78,
"forks": 19,
"watchers": 80,
"score": 0,
"subscribers_count": 0
},
@ -52,8 +52,8 @@
"description": "This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.",
"fork": false,
"created_at": "2025-01-25T18:07:12Z",
"updated_at": "2025-01-29T12:21:15Z",
"pushed_at": "2025-01-29T12:21:11Z",
"updated_at": "2025-01-29T18:12:37Z",
"pushed_at": "2025-01-29T18:12:34Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "Proof of concept & details for CVE-2025-21298",
"fork": false,
"created_at": "2025-01-20T18:16:51Z",
"updated_at": "2025-01-29T03:30:15Z",
"updated_at": "2025-01-29T17:12:05Z",
"pushed_at": "2025-01-20T18:22:01Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 63,
"watchers_count": 63,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 60,
"watchers": 63,
"score": 0,
"subscribers_count": 0
}

View file

@ -1,33 +0,0 @@
[
{
"id": 923546795,
"name": "CVE-2025-24085",
"full_name": "clidanc\/CVE-2025-24085",
"owner": {
"login": "clidanc",
"id": 196788491,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/196788491?v=4",
"html_url": "https:\/\/github.com\/clidanc",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/clidanc\/CVE-2025-24085",
"description": null,
"fork": false,
"created_at": "2025-01-28T12:53:54Z",
"updated_at": "2025-01-28T14:04:01Z",
"pushed_at": "2025-01-28T14:03:49Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -86,13 +86,6 @@
- [CRUNZEX/CVE-2025-22968](https://github.com/CRUNZEX/CVE-2025-22968)
### CVE-2025-24085 (2025-01-27)
<code>A use after free issue was addressed with improved memory management. This issue is fixed in visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited against versions of iOS before iOS 17.2.
</code>
- [clidanc/CVE-2025-24085](https://github.com/clidanc/CVE-2025-24085)
## 2024
### CVE-2024-0012 (2024-11-18)
@ -723,6 +716,7 @@
- [tnishiox/cve-2024-2961](https://github.com/tnishiox/cve-2024-2961)
- [kjdfklha/CVE-2024-2961_poc](https://github.com/kjdfklha/CVE-2024-2961_poc)
- [kyotozx/CVE-2024-2961-Remote-File-Read](https://github.com/kyotozx/CVE-2024-2961-Remote-File-Read)
- [4wayhandshake/CVE-2024-2961](https://github.com/4wayhandshake/CVE-2024-2961)
### CVE-2024-2997 (2024-03-27)
@ -8296,6 +8290,9 @@
- [Safecloudth/CVE-2024-53522](https://github.com/Safecloudth/CVE-2024-53522)
### CVE-2024-53615
- [beune/CVE-2024-53615](https://github.com/beune/CVE-2024-53615)
### CVE-2024-53617 (2024-12-02)
<code>A Cross Site Scripting vulnerability in LibrePhotos before commit 32237 allows attackers to takeover any account via uploading an HTML file on behalf of the admin user using IDOR in file upload.
@ -8535,6 +8532,7 @@
- [virus-or-not/CVE-2024-55591](https://github.com/virus-or-not/CVE-2024-55591)
- [robomusk52/exp-cmd-add-admin-vpn-CVE-2024-55591](https://github.com/robomusk52/exp-cmd-add-admin-vpn-CVE-2024-55591)
- [watchtowrlabs/fortios-auth-bypass-poc-CVE-2024-55591](https://github.com/watchtowrlabs/fortios-auth-bypass-poc-CVE-2024-55591)
- [exfil0/CVE-2024-55591-POC](https://github.com/exfil0/CVE-2024-55591-POC)
### CVE-2024-55875 (2024-12-12)