Auto Update 2024/03/24 18:26:39

This commit is contained in:
motikan2010-bot 2024-03-25 03:26:39 +09:00
parent 49c0d5439f
commit 70aab45d51
67 changed files with 175 additions and 1608 deletions

View file

@ -13,10 +13,10 @@
"description": "CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC", "description": "CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC",
"fork": false, "fork": false,
"created_at": "2017-04-10T03:44:04Z", "created_at": "2017-04-10T03:44:04Z",
"updated_at": "2024-03-20T03:10:22Z", "updated_at": "2024-03-24T12:11:26Z",
"pushed_at": "2017-04-12T09:17:27Z", "pushed_at": "2017-04-12T09:17:27Z",
"stargazers_count": 199, "stargazers_count": 200,
"watchers_count": 199, "watchers_count": 200,
"has_discussions": false, "has_discussions": false,
"forks_count": 89, "forks_count": 89,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 89, "forks": 89,
"watchers": 199, "watchers": 200,
"score": 0, "score": 0,
"subscribers_count": 14 "subscribers_count": 14
}, },

View file

@ -258,10 +258,10 @@
"description": "This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead.", "description": "This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead.",
"fork": false, "fork": false,
"created_at": "2021-04-21T16:42:31Z", "created_at": "2021-04-21T16:42:31Z",
"updated_at": "2024-03-10T21:33:37Z", "updated_at": "2024-03-24T12:24:59Z",
"pushed_at": "2021-04-21T16:46:37Z", "pushed_at": "2021-04-21T16:46:37Z",
"stargazers_count": 34, "stargazers_count": 35,
"watchers_count": 34, "watchers_count": 35,
"has_discussions": false, "has_discussions": false,
"forks_count": 13, "forks_count": 13,
"allow_forking": true, "allow_forking": true,
@ -270,7 +270,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 13, "forks": 13,
"watchers": 34, "watchers": 35,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },

View file

@ -13,10 +13,10 @@
"description": "Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)", "description": "Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)",
"fork": false, "fork": false,
"created_at": "2020-04-13T11:34:24Z", "created_at": "2020-04-13T11:34:24Z",
"updated_at": "2023-02-27T19:09:29Z", "updated_at": "2024-03-24T14:37:15Z",
"pushed_at": "2020-04-12T21:11:16Z", "pushed_at": "2020-04-12T21:11:16Z",
"stargazers_count": 15, "stargazers_count": 16,
"watchers_count": 15, "watchers_count": 16,
"has_discussions": false, "has_discussions": false,
"forks_count": 26, "forks_count": 26,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 26, "forks": 26,
"watchers": 15, "watchers": 16,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },
@ -73,10 +73,10 @@
"description": "Unsigned driver loader using CVE-2018-19320", "description": "Unsigned driver loader using CVE-2018-19320",
"fork": false, "fork": false,
"created_at": "2022-11-12T05:48:13Z", "created_at": "2022-11-12T05:48:13Z",
"updated_at": "2024-03-23T15:35:47Z", "updated_at": "2024-03-24T18:09:23Z",
"pushed_at": "2023-04-09T13:50:29Z", "pushed_at": "2023-04-09T13:50:29Z",
"stargazers_count": 132, "stargazers_count": 134,
"watchers_count": 132, "watchers_count": 134,
"has_discussions": false, "has_discussions": false,
"forks_count": 35, "forks_count": 35,
"allow_forking": true, "allow_forking": true,
@ -85,7 +85,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 35, "forks": 35,
"watchers": 132, "watchers": 134,
"score": 0, "score": 0,
"subscribers_count": 6 "subscribers_count": 6
}, },

View file

@ -103,10 +103,10 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura", "description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false, "fork": false,
"created_at": "2020-09-14T16:56:51Z", "created_at": "2020-09-14T16:56:51Z",
"updated_at": "2024-03-17T19:38:44Z", "updated_at": "2024-03-24T12:46:14Z",
"pushed_at": "2020-11-03T09:45:24Z", "pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 1127, "stargazers_count": 1128,
"watchers_count": 1127, "watchers_count": 1128,
"has_discussions": false, "has_discussions": false,
"forks_count": 284, "forks_count": 284,
"allow_forking": true, "allow_forking": true,
@ -115,7 +115,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 284, "forks": 284,
"watchers": 1127, "watchers": 1128,
"score": 0, "score": 0,
"subscribers_count": 35 "subscribers_count": 35
}, },
@ -170,10 +170,10 @@
"description": "Exploit for zerologon cve-2020-1472", "description": "Exploit for zerologon cve-2020-1472",
"fork": false, "fork": false,
"created_at": "2020-09-14T19:19:07Z", "created_at": "2020-09-14T19:19:07Z",
"updated_at": "2024-03-21T16:19:30Z", "updated_at": "2024-03-24T12:45:59Z",
"pushed_at": "2020-10-15T18:31:15Z", "pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 588, "stargazers_count": 589,
"watchers_count": 588, "watchers_count": 589,
"has_discussions": false, "has_discussions": false,
"forks_count": 143, "forks_count": 143,
"allow_forking": true, "allow_forking": true,
@ -182,7 +182,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 143, "forks": 143,
"watchers": 588, "watchers": 589,
"score": 0, "score": 0,
"subscribers_count": 13 "subscribers_count": 13
}, },

View file

@ -473,10 +473,10 @@
"description": "GitLab CE\/EE Preauth RCE using ExifTool", "description": "GitLab CE\/EE Preauth RCE using ExifTool",
"fork": false, "fork": false,
"created_at": "2021-11-11T04:34:07Z", "created_at": "2021-11-11T04:34:07Z",
"updated_at": "2024-02-26T06:02:38Z", "updated_at": "2024-03-24T12:48:07Z",
"pushed_at": "2022-01-16T15:54:14Z", "pushed_at": "2022-01-16T15:54:14Z",
"stargazers_count": 204, "stargazers_count": 205,
"watchers_count": 204, "watchers_count": 205,
"has_discussions": false, "has_discussions": false,
"forks_count": 38, "forks_count": 38,
"allow_forking": true, "allow_forking": true,
@ -492,7 +492,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 38, "forks": 38,
"watchers": 204, "watchers": 205,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -1074,10 +1074,10 @@
"description": "Sudo Baron Samedit Exploit", "description": "Sudo Baron Samedit Exploit",
"fork": false, "fork": false,
"created_at": "2021-03-15T17:37:02Z", "created_at": "2021-03-15T17:37:02Z",
"updated_at": "2024-03-24T09:17:44Z", "updated_at": "2024-03-24T14:09:51Z",
"pushed_at": "2022-01-13T05:48:01Z", "pushed_at": "2022-01-13T05:48:01Z",
"stargazers_count": 704, "stargazers_count": 705,
"watchers_count": 704, "watchers_count": 705,
"has_discussions": false, "has_discussions": false,
"forks_count": 165, "forks_count": 165,
"allow_forking": true, "allow_forking": true,
@ -1086,7 +1086,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 165, "forks": 165,
"watchers": 704, "watchers": 705,
"score": 0, "score": 0,
"subscribers_count": 11 "subscribers_count": 11
}, },

View file

@ -766,7 +766,7 @@
"fork": false, "fork": false,
"created_at": "2024-03-24T11:37:18Z", "created_at": "2024-03-24T11:37:18Z",
"updated_at": "2024-03-24T11:39:41Z", "updated_at": "2024-03-24T11:39:41Z",
"pushed_at": "2024-03-24T12:05:05Z", "pushed_at": "2024-03-24T12:48:30Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,

View file

@ -857,10 +857,10 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks", "description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"fork": false, "fork": false,
"created_at": "2021-12-10T22:35:00Z", "created_at": "2021-12-10T22:35:00Z",
"updated_at": "2024-03-22T08:53:09Z", "updated_at": "2024-03-24T15:24:28Z",
"pushed_at": "2022-01-15T16:18:44Z", "pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 920, "stargazers_count": 921,
"watchers_count": 920, "watchers_count": 921,
"has_discussions": false, "has_discussions": false,
"forks_count": 140, "forks_count": 140,
"allow_forking": true, "allow_forking": true,
@ -889,7 +889,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 140, "forks": 140,
"watchers": 920, "watchers": 921,
"score": 0, "score": 0,
"subscribers_count": 25 "subscribers_count": 25
}, },
@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false, "fork": false,
"created_at": "2021-12-10T23:19:28Z", "created_at": "2021-12-10T23:19:28Z",
"updated_at": "2024-03-24T07:07:43Z", "updated_at": "2024-03-24T18:04:37Z",
"pushed_at": "2024-02-12T22:37:25Z", "pushed_at": "2024-02-12T22:37:25Z",
"stargazers_count": 1730, "stargazers_count": 1731,
"watchers_count": 1730, "watchers_count": 1731,
"has_discussions": false, "has_discussions": false,
"forks_count": 516, "forks_count": 516,
"allow_forking": true, "allow_forking": true,
@ -924,7 +924,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 516, "forks": 516,
"watchers": 1730, "watchers": 1731,
"score": 0, "score": 0,
"subscribers_count": 28 "subscribers_count": 28
}, },
@ -5523,10 +5523,10 @@
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.", "description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
"fork": false, "fork": false,
"created_at": "2021-12-14T06:37:59Z", "created_at": "2021-12-14T06:37:59Z",
"updated_at": "2024-02-26T23:28:12Z", "updated_at": "2024-03-24T15:54:34Z",
"pushed_at": "2023-12-18T23:02:26Z", "pushed_at": "2023-12-18T23:02:26Z",
"stargazers_count": 373, "stargazers_count": 375,
"watchers_count": 373, "watchers_count": 375,
"has_discussions": false, "has_discussions": false,
"forks_count": 55, "forks_count": 55,
"allow_forking": true, "allow_forking": true,
@ -5541,7 +5541,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 55, "forks": 55,
"watchers": 373, "watchers": 375,
"score": 0, "score": 0,
"subscribers_count": 12 "subscribers_count": 12
}, },

View file

@ -133,10 +133,10 @@
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)", "description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
"fork": false, "fork": false,
"created_at": "2022-03-07T18:55:20Z", "created_at": "2022-03-07T18:55:20Z",
"updated_at": "2024-03-16T11:14:04Z", "updated_at": "2024-03-24T18:06:45Z",
"pushed_at": "2022-03-08T06:20:05Z", "pushed_at": "2022-03-08T06:20:05Z",
"stargazers_count": 1065, "stargazers_count": 1066,
"watchers_count": 1065, "watchers_count": 1066,
"has_discussions": false, "has_discussions": false,
"forks_count": 218, "forks_count": 218,
"allow_forking": true, "allow_forking": true,
@ -145,7 +145,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 218, "forks": 218,
"watchers": 1065, "watchers": 1066,
"score": 0, "score": 0,
"subscribers_count": 17 "subscribers_count": 17
}, },

View file

@ -13,10 +13,10 @@
"description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability", "description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability",
"fork": false, "fork": false,
"created_at": "2022-08-09T15:53:48Z", "created_at": "2022-08-09T15:53:48Z",
"updated_at": "2024-03-23T02:44:54Z", "updated_at": "2024-03-24T13:54:35Z",
"pushed_at": "2023-09-27T06:44:27Z", "pushed_at": "2023-09-27T06:44:27Z",
"stargazers_count": 269, "stargazers_count": 270,
"watchers_count": 269, "watchers_count": 270,
"has_discussions": false, "has_discussions": false,
"forks_count": 59, "forks_count": 59,
"allow_forking": true, "allow_forking": true,
@ -33,7 +33,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 59, "forks": 59,
"watchers": 269, "watchers": 270,
"score": 0, "score": 0,
"subscribers_count": 10 "subscribers_count": 10
}, },

View file

@ -692,36 +692,6 @@
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
}, },
{
"id": 502734227,
"name": "CVE-2022-22954",
"full_name": "1SeaMy\/CVE-2022-22954",
"owner": {
"login": "1SeaMy",
"id": 92841021,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92841021?v=4",
"html_url": "https:\/\/github.com\/1SeaMy"
},
"html_url": "https:\/\/github.com\/1SeaMy\/CVE-2022-22954",
"description": "I'm trying",
"fork": false,
"created_at": "2022-06-12T21:41:38Z",
"updated_at": "2024-02-15T18:03:15Z",
"pushed_at": "2022-06-12T21:49:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{ {
"id": 524471767, "id": 524471767,
"name": "CVE-2022-22954", "name": "CVE-2022-22954",

View file

@ -1,32 +0,0 @@
[
{
"id": 762995938,
"name": "CVE-2022-46088",
"full_name": "ASR511-OO7\/CVE-2022-46088",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2022-46088",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:24:51Z",
"updated_at": "2024-02-25T09:24:51Z",
"pushed_at": "2024-02-25T09:25:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 762995677,
"name": "CVE-2022-46089",
"full_name": "ASR511-OO7\/CVE-2022-46089",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2022-46089",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:23:52Z",
"updated_at": "2024-02-25T09:23:52Z",
"pushed_at": "2024-03-05T15:42:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 762995473,
"name": "CVE-2022-46091",
"full_name": "ASR511-OO7\/CVE-2022-46091",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2022-46091",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:23:01Z",
"updated_at": "2024-02-25T09:23:02Z",
"pushed_at": "2024-03-05T15:48:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 762995029,
"name": "CVE-2022-46497",
"full_name": "ASR511-OO7\/CVE-2022-46497",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2022-46497",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:21:29Z",
"updated_at": "2024-02-25T09:21:30Z",
"pushed_at": "2024-03-05T15:53:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 762994715,
"name": "CVE-2022-46498",
"full_name": "ASR511-OO7\/CVE-2022-46498",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2022-46498",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:20:32Z",
"updated_at": "2024-02-25T09:20:32Z",
"pushed_at": "2024-03-05T15:55:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 762994439,
"name": "CVE-2022-46499",
"full_name": "ASR511-OO7\/CVE-2022-46499",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2022-46499",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:19:32Z",
"updated_at": "2024-02-25T09:19:33Z",
"pushed_at": "2024-03-05T15:57:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-46718: an app may be able to read sensitive location information.", "description": "CVE-2022-46718: an app may be able to read sensitive location information.",
"fork": false, "fork": false,
"created_at": "2023-05-01T18:34:52Z", "created_at": "2023-05-01T18:34:52Z",
"updated_at": "2024-03-24T09:17:07Z", "updated_at": "2024-03-24T13:55:19Z",
"pushed_at": "2023-05-01T18:48:34Z", "pushed_at": "2023-05-01T18:48:34Z",
"stargazers_count": 15, "stargazers_count": 16,
"watchers_count": 15, "watchers_count": 16,
"has_discussions": false, "has_discussions": false,
"forks_count": 3, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 3,
"watchers": 15, "watchers": 16,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
} }

View file

@ -13,10 +13,10 @@
"description": "CVE-2023-2255 Libre Office ", "description": "CVE-2023-2255 Libre Office ",
"fork": false, "fork": false,
"created_at": "2023-07-10T20:54:56Z", "created_at": "2023-07-10T20:54:56Z",
"updated_at": "2024-03-07T07:10:45Z", "updated_at": "2024-03-24T15:02:54Z",
"pushed_at": "2023-07-10T21:00:09Z", "pushed_at": "2023-07-10T21:00:09Z",
"stargazers_count": 18, "stargazers_count": 19,
"watchers_count": 18, "watchers_count": 19,
"has_discussions": false, "has_discussions": false,
"forks_count": 2, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 2,
"watchers": 18, "watchers": 19,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -470,10 +470,10 @@
"description": "Joomla! < 4.2.8 - Unauthenticated information disclosure", "description": "Joomla! < 4.2.8 - Unauthenticated information disclosure",
"fork": false, "fork": false,
"created_at": "2023-03-24T11:50:16Z", "created_at": "2023-03-24T11:50:16Z",
"updated_at": "2024-02-28T21:34:30Z", "updated_at": "2024-03-24T12:31:18Z",
"pushed_at": "2023-12-27T11:30:46Z", "pushed_at": "2023-12-27T11:30:46Z",
"stargazers_count": 68, "stargazers_count": 69,
"watchers_count": 68, "watchers_count": 69,
"has_discussions": false, "has_discussions": false,
"forks_count": 14, "forks_count": 14,
"allow_forking": true, "allow_forking": true,
@ -489,7 +489,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 14, "forks": 14,
"watchers": 68, "watchers": 69,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -13,10 +13,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2023-06-28T13:51:27Z", "created_at": "2023-06-28T13:51:27Z",
"updated_at": "2023-12-30T09:44:46Z", "updated_at": "2024-03-24T15:21:31Z",
"pushed_at": "2024-03-15T21:31:33Z", "pushed_at": "2024-03-15T21:31:33Z",
"stargazers_count": 19, "stargazers_count": 20,
"watchers_count": 19, "watchers_count": 20,
"has_discussions": false, "has_discussions": false,
"forks_count": 9, "forks_count": 9,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 9, "forks": 9,
"watchers": 19, "watchers": 20,
"score": 0, "score": 0,
"subscribers_count": 4 "subscribers_count": 4
} }

View file

@ -1,32 +0,0 @@
[
{
"id": 762994217,
"name": "CVE-2023-33676",
"full_name": "ASR511-OO7\/CVE-2023-33676",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-33676",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:18:38Z",
"updated_at": "2024-02-25T09:18:38Z",
"pushed_at": "2024-03-05T16:00:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 762994002,
"name": "CVE-2023-33677",
"full_name": "ASR511-OO7\/CVE-2023-33677",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-33677",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:17:48Z",
"updated_at": "2024-02-25T09:17:48Z",
"pushed_at": "2024-03-03T09:17:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation", "description": "Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation",
"fork": false, "fork": false,
"created_at": "2024-03-21T21:39:24Z", "created_at": "2024-03-21T21:39:24Z",
"updated_at": "2024-03-24T11:48:55Z", "updated_at": "2024-03-24T17:44:34Z",
"pushed_at": "2024-03-22T06:45:43Z", "pushed_at": "2024-03-22T06:45:43Z",
"stargazers_count": 60, "stargazers_count": 63,
"watchers_count": 60, "watchers_count": 63,
"has_discussions": false, "has_discussions": false,
"forks_count": 16, "forks_count": 16,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 16, "forks": 16,
"watchers": 60, "watchers": 63,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -14,7 +14,7 @@
"fork": false, "fork": false,
"created_at": "2023-08-14T06:18:48Z", "created_at": "2023-08-14T06:18:48Z",
"updated_at": "2023-08-14T06:18:48Z", "updated_at": "2023-08-14T06:18:48Z",
"pushed_at": "2023-08-14T06:29:51Z", "pushed_at": "2024-03-24T15:40:33Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,

View file

@ -1,32 +0,0 @@
[
{
"id": 762993729,
"name": "CVE-2023-41014",
"full_name": "ASR511-OO7\/CVE-2023-41014",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-41014",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:16:50Z",
"updated_at": "2024-02-25T09:16:50Z",
"pushed_at": "2024-03-05T16:07:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 762993478,
"name": "CVE-2023-41015",
"full_name": "ASR511-OO7\/CVE-2023-41015",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-41015",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:15:54Z",
"updated_at": "2024-02-25T09:15:55Z",
"pushed_at": "2024-03-05T16:09:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 760331113,
"name": "CVE-2023-41497",
"full_name": "ASR511-OO7\/CVE-2023-41497",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-41497",
"description": null,
"fork": false,
"created_at": "2024-02-20T08:12:08Z",
"updated_at": "2024-02-20T08:12:08Z",
"pushed_at": "2024-02-20T08:28:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 760331540,
"name": "CVE-2023-41498",
"full_name": "ASR511-OO7\/CVE-2023-41498",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-41498",
"description": null,
"fork": false,
"created_at": "2024-02-20T08:13:10Z",
"updated_at": "2024-02-20T08:13:11Z",
"pushed_at": "2024-02-20T08:13:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 760331818,
"name": "CVE-2023-41499",
"full_name": "ASR511-OO7\/CVE-2023-41499",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-41499",
"description": null,
"fork": false,
"created_at": "2024-02-20T08:14:00Z",
"updated_at": "2024-02-20T08:14:01Z",
"pushed_at": "2024-02-20T08:14:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 760332467,
"name": "CVE-2023-41500",
"full_name": "ASR511-OO7\/CVE-2023-41500",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-41500",
"description": null,
"fork": false,
"created_at": "2024-02-20T08:15:32Z",
"updated_at": "2024-02-20T08:15:32Z",
"pushed_at": "2024-02-20T08:15:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 760332815,
"name": "CVE-2023-41501",
"full_name": "ASR511-OO7\/CVE-2023-41501",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-41501",
"description": null,
"fork": false,
"created_at": "2024-02-20T08:16:19Z",
"updated_at": "2024-02-20T08:16:19Z",
"pushed_at": "2024-02-20T08:16:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 762993198,
"name": "CVE-2023-41503",
"full_name": "ASR511-OO7\/CVE-2023-41503",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-41503",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:14:58Z",
"updated_at": "2024-02-25T09:14:58Z",
"pushed_at": "2024-02-25T09:15:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 762992922,
"name": "CVE-2023-41504",
"full_name": "ASR511-OO7\/CVE-2023-41504",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-41504",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:13:57Z",
"updated_at": "2024-02-25T09:13:58Z",
"pushed_at": "2024-03-06T11:35:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 762992550,
"name": "CVE-2023-41505",
"full_name": "ASR511-OO7\/CVE-2023-41505",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-41505",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:12:31Z",
"updated_at": "2024-02-25T09:12:31Z",
"pushed_at": "2024-02-25T09:13:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 762992312,
"name": "CVE-2023-41506",
"full_name": "ASR511-OO7\/CVE-2023-41506",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-41506",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:11:36Z",
"updated_at": "2024-02-25T09:11:36Z",
"pushed_at": "2024-02-25T09:12:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 760333420,
"name": "CVE-2023-42307",
"full_name": "ASR511-OO7\/CVE-2023-42307",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-42307",
"description": null,
"fork": false,
"created_at": "2024-02-20T08:17:57Z",
"updated_at": "2024-02-20T08:17:57Z",
"pushed_at": "2024-02-20T08:18:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 760333834,
"name": "CVE-2023-42308",
"full_name": "ASR511-OO7\/CVE-2023-42308",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-42308",
"description": null,
"fork": false,
"created_at": "2024-02-20T08:18:59Z",
"updated_at": "2024-02-20T08:18:59Z",
"pushed_at": "2024-03-06T10:05:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 760334324,
"name": "CVE-2023-43292",
"full_name": "ASR511-OO7\/CVE-2023-43292",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-43292",
"description": null,
"fork": false,
"created_at": "2024-02-20T08:20:18Z",
"updated_at": "2024-02-20T08:20:18Z",
"pushed_at": "2024-03-06T10:33:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false, "fork": false,
"created_at": "2024-01-16T06:52:02Z", "created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-03-20T18:19:11Z", "updated_at": "2024-03-24T13:17:25Z",
"pushed_at": "2024-02-06T21:45:34Z", "pushed_at": "2024-02-06T21:45:34Z",
"stargazers_count": 38, "stargazers_count": 39,
"watchers_count": 38, "watchers_count": 39,
"has_discussions": false, "has_discussions": false,
"forks_count": 11, "forks_count": 11,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 11, "forks": 11,
"watchers": 38, "watchers": 39,
"score": 0, "score": 0,
"subscribers_count": 3 "subscribers_count": 3
}, },

View file

@ -10,11 +10,11 @@
"html_url": "https:\/\/github.com\/actuator" "html_url": "https:\/\/github.com\/actuator"
}, },
"html_url": "https:\/\/github.com\/actuator\/yi", "html_url": "https:\/\/github.com\/actuator\/yi",
"description": "CVE-2023-47882", "description": "CVE-2023-47882 | CVE-2024-23727",
"fork": false, "fork": false,
"created_at": "2023-11-05T20:37:24Z", "created_at": "2023-11-05T20:37:24Z",
"updated_at": "2024-01-17T19:57:45Z", "updated_at": "2024-03-24T16:26:09Z",
"pushed_at": "2023-12-05T15:29:04Z", "pushed_at": "2024-03-24T16:16:58Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"has_discussions": false, "has_discussions": false,
@ -23,7 +23,8 @@
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [ "topics": [
"cve-2023-47882" "cve-2023-47882",
"cve-2024-23727"
], ],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,

View file

@ -13,10 +13,10 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2023-12-14T09:32:41Z", "created_at": "2023-12-14T09:32:41Z",
"updated_at": "2024-03-13T10:28:42Z", "updated_at": "2024-03-24T15:23:36Z",
"pushed_at": "2023-12-15T06:29:09Z", "pushed_at": "2023-12-15T06:29:09Z",
"stargazers_count": 50, "stargazers_count": 51,
"watchers_count": 50, "watchers_count": 51,
"has_discussions": false, "has_discussions": false,
"forks_count": 13, "forks_count": 13,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 13, "forks": 13,
"watchers": 50, "watchers": 51,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

View file

@ -125,7 +125,7 @@
"fork": false, "fork": false,
"created_at": "2024-01-02T14:20:10Z", "created_at": "2024-01-02T14:20:10Z",
"updated_at": "2024-03-21T14:04:33Z", "updated_at": "2024-03-21T14:04:33Z",
"pushed_at": "2024-03-24T06:38:33Z", "pushed_at": "2024-03-24T18:20:52Z",
"stargazers_count": 56, "stargazers_count": 56,
"watchers_count": 56, "watchers_count": 56,
"has_discussions": false, "has_discussions": false,

View file

@ -13,10 +13,10 @@
"description": "Unauthenticated Command Injection In Progress Kemp LoadMaster", "description": "Unauthenticated Command Injection In Progress Kemp LoadMaster",
"fork": false, "fork": false,
"created_at": "2024-03-19T22:23:18Z", "created_at": "2024-03-19T22:23:18Z",
"updated_at": "2024-03-24T08:01:02Z", "updated_at": "2024-03-24T14:39:49Z",
"pushed_at": "2024-03-19T22:25:21Z", "pushed_at": "2024-03-19T22:25:21Z",
"stargazers_count": 8, "stargazers_count": 9,
"watchers_count": 8, "watchers_count": 9,
"has_discussions": false, "has_discussions": false,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
@ -25,7 +25,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 8, "watchers": 9,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -1,32 +0,0 @@
[
{
"id": 762992059,
"name": "CVE-2024-22917",
"full_name": "ASR511-OO7\/CVE-2024-22917",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2024-22917",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:10:40Z",
"updated_at": "2024-02-25T09:10:40Z",
"pushed_at": "2024-02-25T09:11:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

35
2024/CVE-2024-23727.json Normal file
View file

@ -0,0 +1,35 @@
[
{
"id": 714795483,
"name": "yi",
"full_name": "actuator\/yi",
"owner": {
"login": "actuator",
"id": 78701239,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78701239?v=4",
"html_url": "https:\/\/github.com\/actuator"
},
"html_url": "https:\/\/github.com\/actuator\/yi",
"description": "CVE-2023-47882 | CVE-2024-23727",
"fork": false,
"created_at": "2023-11-05T20:37:24Z",
"updated_at": "2024-03-24T16:26:09Z",
"pushed_at": "2024-03-24T16:16:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2023-47882",
"cve-2024-23727"
],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 760334675,
"name": "CVE-2024-24092",
"full_name": "ASR511-OO7\/CVE-2024-24092",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2024-24092",
"description": null,
"fork": false,
"created_at": "2024-02-20T08:21:12Z",
"updated_at": "2024-02-20T08:21:12Z",
"pushed_at": "2024-03-06T10:29:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 760338058,
"name": "CVE-2024-24093",
"full_name": "ASR511-OO7\/CVE-2024-24093",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2024-24093",
"description": null,
"fork": false,
"created_at": "2024-02-20T08:29:44Z",
"updated_at": "2024-02-20T08:29:44Z",
"pushed_at": "2024-03-06T10:26:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 760338398,
"name": "CVE-2024-24094",
"full_name": "ASR511-OO7\/CVE-2024-24094",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2024-24094",
"description": null,
"fork": false,
"created_at": "2024-02-20T08:30:36Z",
"updated_at": "2024-02-20T08:30:37Z",
"pushed_at": "2024-03-06T10:23:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 762991500,
"name": "CVE-2024-24095",
"full_name": "ASR511-OO7\/CVE-2024-24095",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2024-24095",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:08:37Z",
"updated_at": "2024-02-25T09:08:37Z",
"pushed_at": "2024-02-25T09:09:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 762991166,
"name": "CVE-2024-24096",
"full_name": "ASR511-OO7\/CVE-2024-24096",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2024-24096",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:07:19Z",
"updated_at": "2024-02-25T09:07:19Z",
"pushed_at": "2024-02-25T09:08:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 760339032,
"name": "CVE-2024-24097",
"full_name": "ASR511-OO7\/CVE-2024-24097",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2024-24097",
"description": null,
"fork": false,
"created_at": "2024-02-20T08:32:13Z",
"updated_at": "2024-02-20T08:32:14Z",
"pushed_at": "2024-03-06T10:17:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 760339360,
"name": "CVE-2024-24098",
"full_name": "ASR511-OO7\/CVE-2024-24098",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2024-24098",
"description": null,
"fork": false,
"created_at": "2024-02-20T08:33:10Z",
"updated_at": "2024-02-20T08:33:11Z",
"pushed_at": "2024-03-02T18:03:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 762990093,
"name": "CVE-2024-24099",
"full_name": "ASR511-OO7\/CVE-2024-24099",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2024-24099",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:03:38Z",
"updated_at": "2024-02-25T09:03:39Z",
"pushed_at": "2024-02-25T09:04:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 762989705,
"name": "CVE-2024-24100",
"full_name": "ASR511-OO7\/CVE-2024-24100",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2024-24100",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:02:08Z",
"updated_at": "2024-02-25T09:02:08Z",
"pushed_at": "2024-02-25T09:03:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 760339695,
"name": "CVE-2024-24101",
"full_name": "ASR511-OO7\/CVE-2024-24101",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2024-24101",
"description": null,
"fork": false,
"created_at": "2024-02-20T08:34:02Z",
"updated_at": "2024-02-20T08:34:02Z",
"pushed_at": "2024-03-06T10:12:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 760340002,
"name": "CVE-2024-24102",
"full_name": "ASR511-OO7\/CVE-2024-24102",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2024-24102",
"description": null,
"fork": false,
"created_at": "2024-02-20T08:34:50Z",
"updated_at": "2024-02-20T08:34:50Z",
"pushed_at": "2024-03-06T09:58:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 760340387,
"name": "CVE-2024-24103",
"full_name": "ASR511-OO7\/CVE-2024-24103",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2024-24103",
"description": null,
"fork": false,
"created_at": "2024-02-20T08:35:46Z",
"updated_at": "2024-02-20T08:35:46Z",
"pushed_at": "2024-03-06T09:50:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 768047371,
"name": "CVE-2024-24104",
"full_name": "ASR511-OO7\/CVE-2024-24104",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2024-24104",
"description": null,
"fork": false,
"created_at": "2024-03-06T11:23:03Z",
"updated_at": "2024-03-06T11:23:03Z",
"pushed_at": "2024-03-06T11:24:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 768044700,
"name": "CVE-2024-24105",
"full_name": "ASR511-OO7\/CVE-2024-24105",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2024-24105",
"description": null,
"fork": false,
"created_at": "2024-03-06T11:17:07Z",
"updated_at": "2024-03-06T11:17:08Z",
"pushed_at": "2024-03-06T11:17:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 768043661,
"name": "CVE-2024-24108",
"full_name": "ASR511-OO7\/CVE-2024-24108",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2024-24108",
"description": null,
"fork": false,
"created_at": "2024-03-06T11:14:39Z",
"updated_at": "2024-03-06T11:14:39Z",
"pushed_at": "2024-03-06T11:21:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -13,19 +13,19 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2024-03-14T17:48:49Z", "created_at": "2024-03-14T17:48:49Z",
"updated_at": "2024-03-23T22:25:15Z", "updated_at": "2024-03-24T13:03:40Z",
"pushed_at": "2024-03-14T17:49:48Z", "pushed_at": "2024-03-14T17:49:48Z",
"stargazers_count": 39, "stargazers_count": 40,
"watchers_count": 39, "watchers_count": 40,
"has_discussions": false, "has_discussions": false,
"forks_count": 8, "forks_count": 9,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 8, "forks": 9,
"watchers": 39, "watchers": 40,
"score": 0, "score": 0,
"subscribers_count": 1 "subscribers_count": 1
} }

View file

@ -1,32 +0,0 @@
[
{
"id": 768042286,
"name": "CVE-2024-25250.",
"full_name": "ASR511-OO7\/CVE-2024-25250.",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2024-25250.",
"description": null,
"fork": false,
"created_at": "2024-03-06T11:11:24Z",
"updated_at": "2024-03-06T11:11:24Z",
"pushed_at": "2024-03-06T11:27:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -1,32 +0,0 @@
[
{
"id": 760378853,
"name": "CVE-2024-25251",
"full_name": "ASR511-OO7\/CVE-2024-25251",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2024-25251",
"description": null,
"fork": false,
"created_at": "2024-02-20T10:03:29Z",
"updated_at": "2024-02-20T10:03:29Z",
"pushed_at": "2024-02-20T10:03:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -76,10 +76,10 @@
"description": "CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4", "description": "CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4",
"fork": false, "fork": false,
"created_at": "2024-03-06T03:15:03Z", "created_at": "2024-03-06T03:15:03Z",
"updated_at": "2024-03-23T15:23:57Z", "updated_at": "2024-03-24T13:15:31Z",
"pushed_at": "2024-03-11T07:57:40Z", "pushed_at": "2024-03-11T07:57:40Z",
"stargazers_count": 103, "stargazers_count": 104,
"watchers_count": 103, "watchers_count": 104,
"has_discussions": false, "has_discussions": false,
"forks_count": 27, "forks_count": 27,
"allow_forking": true, "allow_forking": true,
@ -98,7 +98,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 27, "forks": 27,
"watchers": 103, "watchers": 104,
"score": 0, "score": 0,
"subscribers_count": 2 "subscribers_count": 2
}, },

32
2024/CVE-2024-28116.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 776776802,
"name": "Graver",
"full_name": "akabe1\/Graver",
"owner": {
"login": "akabe1",
"id": 46047144,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46047144?v=4",
"html_url": "https:\/\/github.com\/akabe1"
},
"html_url": "https:\/\/github.com\/akabe1\/Graver",
"description": "Proof of Concept script to exploit the authenticated SSTI+RCE in Grav CMS (CVE-2024-28116)",
"fork": false,
"created_at": "2024-03-24T13:14:52Z",
"updated_at": "2024-03-24T13:39:47Z",
"pushed_at": "2024-03-24T14:49:01Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

203
README.md
View file

@ -404,13 +404,6 @@
### CVE-2024-22909 ### CVE-2024-22909
- [BurakSevben/CVE-2024-22909](https://github.com/BurakSevben/CVE-2024-22909) - [BurakSevben/CVE-2024-22909](https://github.com/BurakSevben/CVE-2024-22909)
### CVE-2024-22917 (2024-02-26)
<code>SQL injection vulnerability in Dynamic Lab Management System Project in PHP v.1.0 allows a remote attacker to execute arbitrary code via a crafted script.
</code>
- [ASR511-OO7/CVE-2024-22917](https://github.com/ASR511-OO7/CVE-2024-22917)
### CVE-2024-22922 (2024-01-25) ### CVE-2024-22922 (2024-01-25)
<code>An issue in Projectworlds Vistor Management Systemin PHP v.1.0 allows a remtoe attacker to escalate privileges via a crafted script to the login page in the POST/index.php <code>An issue in Projectworlds Vistor Management Systemin PHP v.1.0 allows a remtoe attacker to escalate privileges via a crafted script to the login page in the POST/index.php
@ -456,6 +449,9 @@
- [abian2/CVE-2024-23652](https://github.com/abian2/CVE-2024-23652) - [abian2/CVE-2024-23652](https://github.com/abian2/CVE-2024-23652)
### CVE-2024-23727
- [actuator/yi](https://github.com/actuator/yi)
### CVE-2024-23738 (2024-01-27) ### CVE-2024-23738 (2024-01-27)
<code>** DISPUTED ** An issue in Postman version 10.22 and before on macOS allows a remote attacker to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings. NOTE: the vendor states &quot;we dispute the report's accuracy ... the configuration does not enable remote code execution..&quot; <code>** DISPUTED ** An issue in Postman version 10.22 and before on macOS allows a remote attacker to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings. NOTE: the vendor states &quot;we dispute the report's accuracy ... the configuration does not enable remote code execution..&quot;
@ -576,71 +572,6 @@
- [ELIZEUOPAIN/CVE-2024-24035](https://github.com/ELIZEUOPAIN/CVE-2024-24035) - [ELIZEUOPAIN/CVE-2024-24035](https://github.com/ELIZEUOPAIN/CVE-2024-24035)
### CVE-2024-24092
- [ASR511-OO7/CVE-2024-24092](https://github.com/ASR511-OO7/CVE-2024-24092)
### CVE-2024-24093
- [ASR511-OO7/CVE-2024-24093](https://github.com/ASR511-OO7/CVE-2024-24093)
### CVE-2024-24094
- [ASR511-OO7/CVE-2024-24094](https://github.com/ASR511-OO7/CVE-2024-24094)
### CVE-2024-24095 (2024-02-26)
<code>Code-projects Simple Stock System 1.0 is vulnerable to SQL Injection.
</code>
- [ASR511-OO7/CVE-2024-24095](https://github.com/ASR511-OO7/CVE-2024-24095)
### CVE-2024-24096 (2024-02-26)
<code>Code-projects Computer Book Store 1.0 is vulnerable to SQL Injection via BookSBIN.
</code>
- [ASR511-OO7/CVE-2024-24096](https://github.com/ASR511-OO7/CVE-2024-24096)
### CVE-2024-24097
- [ASR511-OO7/CVE-2024-24097](https://github.com/ASR511-OO7/CVE-2024-24097)
### CVE-2024-24098 (-)
<code>Code-projects Scholars Tracking System 1.0 is vulnerable to SQL Injection via the News Feed.
</code>
- [ASR511-OO7/CVE-2024-24098](https://github.com/ASR511-OO7/CVE-2024-24098)
### CVE-2024-24099 (2024-02-26)
<code>Code-projects Scholars Tracking System 1.0 is vulnerable to SQL Injection under Employment Status Information Update.
</code>
- [ASR511-OO7/CVE-2024-24099](https://github.com/ASR511-OO7/CVE-2024-24099)
### CVE-2024-24100 (2024-02-26)
<code>Code-projects Computer Book Store 1.0 is vulnerable to SQL Injection via PublisherID.
</code>
- [ASR511-OO7/CVE-2024-24100](https://github.com/ASR511-OO7/CVE-2024-24100)
### CVE-2024-24101
- [ASR511-OO7/CVE-2024-24101](https://github.com/ASR511-OO7/CVE-2024-24101)
### CVE-2024-24102
- [ASR511-OO7/CVE-2024-24102](https://github.com/ASR511-OO7/CVE-2024-24102)
### CVE-2024-24103
- [ASR511-OO7/CVE-2024-24103](https://github.com/ASR511-OO7/CVE-2024-24103)
### CVE-2024-24104
- [ASR511-OO7/CVE-2024-24104](https://github.com/ASR511-OO7/CVE-2024-24104)
### CVE-2024-24105
- [ASR511-OO7/CVE-2024-24105](https://github.com/ASR511-OO7/CVE-2024-24105)
### CVE-2024-24108
- [ASR511-OO7/CVE-2024-24108](https://github.com/ASR511-OO7/CVE-2024-24108)
### CVE-2024-24134 (2024-01-29) ### CVE-2024-24134 (2024-01-29)
<code>Sourcecodester Online Food Menu 1.0 is vulnerable to Cross Site Scripting (XSS) via the 'Menu Name' and 'Description' fields in the Update Menu section. <code>Sourcecodester Online Food Menu 1.0 is vulnerable to Cross Site Scripting (XSS) via the 'Menu Name' and 'Description' fields in the Update Menu section.
@ -821,16 +752,6 @@
- [intbjw/CVE-2024-25249](https://github.com/intbjw/CVE-2024-25249) - [intbjw/CVE-2024-25249](https://github.com/intbjw/CVE-2024-25249)
### CVE-2024-25250
- [ASR511-OO7/CVE-2024-25250.](https://github.com/ASR511-OO7/CVE-2024-25250.)
### CVE-2024-25251 (2024-02-21)
<code>code-projects Agro-School Management System 1.0 is suffers from Incorrect Access Control.
</code>
- [ASR511-OO7/CVE-2024-25251](https://github.com/ASR511-OO7/CVE-2024-25251)
### CVE-2024-25270 ### CVE-2024-25270
- [fbkcs/CVE-2024-25270](https://github.com/fbkcs/CVE-2024-25270) - [fbkcs/CVE-2024-25270](https://github.com/fbkcs/CVE-2024-25270)
@ -941,6 +862,9 @@
- [levpachmanov/cve-2024-28088-poc](https://github.com/levpachmanov/cve-2024-28088-poc) - [levpachmanov/cve-2024-28088-poc](https://github.com/levpachmanov/cve-2024-28088-poc)
### CVE-2024-28116
- [akabe1/Graver](https://github.com/akabe1/Graver)
### CVE-2024-28397 ### CVE-2024-28397
- [Marven11/CVE-2024-28397](https://github.com/Marven11/CVE-2024-28397) - [Marven11/CVE-2024-28397](https://github.com/Marven11/CVE-2024-28397)
@ -4706,20 +4630,6 @@
- [lodi-g/CVE-2023-33668](https://github.com/lodi-g/CVE-2023-33668) - [lodi-g/CVE-2023-33668](https://github.com/lodi-g/CVE-2023-33668)
### CVE-2023-33676 (-)
<code>Sourcecodester Lost and Found Information System's Version 1.0 is vulnerable to unauthenticated SQL Injection at &quot;?page=items/view&amp;id=*&quot; which can be escalated to the remote command execution.
</code>
- [ASR511-OO7/CVE-2023-33676](https://github.com/ASR511-OO7/CVE-2023-33676)
### CVE-2023-33677 (-)
<code>Sourcecodester Lost and Found Information System's Version 1.0 is vulnerable to unauthenticated SQL Injection at &quot;?page=items/view&amp;id=*&quot;.
</code>
- [ASR511-OO7/CVE-2023-33677](https://github.com/ASR511-OO7/CVE-2023-33677)
### CVE-2023-33730 (2023-05-31) ### CVE-2023-33730 (2023-05-31)
<code>Privilege Escalation in the &quot;GetUserCurrentPwd&quot; function in Microworld Technologies eScan Management Console 14.0.1400.2281 allows any remote attacker to retrieve password of any admin or normal user in plain text format. <code>Privilege Escalation in the &quot;GetUserCurrentPwd&quot; function in Microworld Technologies eScan Management Console 14.0.1400.2281 allows any remote attacker to retrieve password of any admin or normal user in plain text format.
@ -6178,20 +6088,6 @@
- [Zone1-Z/CVE-2023-40989](https://github.com/Zone1-Z/CVE-2023-40989) - [Zone1-Z/CVE-2023-40989](https://github.com/Zone1-Z/CVE-2023-40989)
### CVE-2023-41014 (-)
<code>code-projects.org Online Job Portal 1.0 is vulnerable to SQL Injection via the Username parameter for &quot;Employer.&quot;
</code>
- [ASR511-OO7/CVE-2023-41014](https://github.com/ASR511-OO7/CVE-2023-41014)
### CVE-2023-41015 (-)
<code>code-projects.org Online Job Portal 1.0 is vulnerable to SQL Injection via /Employer/DeleteJob.php?JobId=1.
</code>
- [ASR511-OO7/CVE-2023-41015](https://github.com/ASR511-OO7/CVE-2023-41015)
### CVE-2023-41064 (2023-09-07) ### CVE-2023-41064 (2023-09-07)
<code>A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 16.6.1 and iPadOS 16.6.1, macOS Monterey 12.6.9, macOS Ventura 13.5.2, iOS 15.7.9 and iPadOS 15.7.9, macOS Big Sur 11.7.10. Processing a maliciously crafted image may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. <code>A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 16.6.1 and iPadOS 16.6.1, macOS Monterey 12.6.9, macOS Ventura 13.5.2, iOS 15.7.9 and iPadOS 15.7.9, macOS Big Sur 11.7.10. Processing a maliciously crafted image may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
@ -6250,41 +6146,6 @@
- [JBalanza/CVE-2023-41474](https://github.com/JBalanza/CVE-2023-41474) - [JBalanza/CVE-2023-41474](https://github.com/JBalanza/CVE-2023-41474)
### CVE-2023-41497
- [ASR511-OO7/CVE-2023-41497](https://github.com/ASR511-OO7/CVE-2023-41497)
### CVE-2023-41498
- [ASR511-OO7/CVE-2023-41498](https://github.com/ASR511-OO7/CVE-2023-41498)
### CVE-2023-41499
- [ASR511-OO7/CVE-2023-41499](https://github.com/ASR511-OO7/CVE-2023-41499)
### CVE-2023-41500
- [ASR511-OO7/CVE-2023-41500](https://github.com/ASR511-OO7/CVE-2023-41500)
### CVE-2023-41501
- [ASR511-OO7/CVE-2023-41501](https://github.com/ASR511-OO7/CVE-2023-41501)
### CVE-2023-41503 (-)
<code>Student Enrollment In PHP v1.0 was discovered to contain a SQL injection vulnerability via the Login function.
</code>
- [ASR511-OO7/CVE-2023-41503](https://github.com/ASR511-OO7/CVE-2023-41503)
### CVE-2023-41504
- [ASR511-OO7/CVE-2023-41504](https://github.com/ASR511-OO7/CVE-2023-41504)
### CVE-2023-41505
- [ASR511-OO7/CVE-2023-41505](https://github.com/ASR511-OO7/CVE-2023-41505)
### CVE-2023-41506 (2024-02-26)
<code>An arbitrary file upload vulnerability in the Update/Edit Student's Profile Picture function of Student Enrollment In PHP v1.0 allows attackers to execute arbitrary code via uploading a crafted PHP file.
</code>
- [ASR511-OO7/CVE-2023-41506](https://github.com/ASR511-OO7/CVE-2023-41506)
### CVE-2023-41507 (2023-09-05) ### CVE-2023-41507 (2023-09-05)
<code>Super Store Finder v3.6 was discovered to contain multiple SQL injection vulnerabilities in the store locator component via the products, distance, lat, and lng parameters. <code>Super Store Finder v3.6 was discovered to contain multiple SQL injection vulnerabilities in the store locator component via the products, distance, lat, and lng parameters.
@ -6408,12 +6269,6 @@
- [andreysanyuk/CVE-2023-42284](https://github.com/andreysanyuk/CVE-2023-42284) - [andreysanyuk/CVE-2023-42284](https://github.com/andreysanyuk/CVE-2023-42284)
### CVE-2023-42307
- [ASR511-OO7/CVE-2023-42307](https://github.com/ASR511-OO7/CVE-2023-42307)
### CVE-2023-42308
- [ASR511-OO7/CVE-2023-42308](https://github.com/ASR511-OO7/CVE-2023-42308)
### CVE-2023-42362 (2023-09-14) ### CVE-2023-42362 (2023-09-14)
<code>An arbitrary file upload vulnerability in Teller Web App v.4.4.0 allows a remote attacker to execute arbitrary commands and obtain sensitive information via uploading a crafted file. <code>An arbitrary file upload vulnerability in Teller Web App v.4.4.0 allows a remote attacker to execute arbitrary commands and obtain sensitive information via uploading a crafted file.
@ -6574,9 +6429,6 @@
- [MateusTesser/CVE-2023-43284](https://github.com/MateusTesser/CVE-2023-43284) - [MateusTesser/CVE-2023-43284](https://github.com/MateusTesser/CVE-2023-43284)
### CVE-2023-43292
- [ASR511-OO7/CVE-2023-43292](https://github.com/ASR511-OO7/CVE-2023-43292)
### CVE-2023-43317 (2024-01-24) ### CVE-2023-43317 (2024-01-24)
<code>An issue in Coign CRM Portal v.06.06 allows a remote attacker to escalate privileges via the userPermissionsList parameter in Session Storage component. <code>An issue in Coign CRM Portal v.06.06 allows a remote attacker to escalate privileges via the userPermissionsList parameter in Session Storage component.
@ -10006,7 +9858,6 @@
- [orwagodfather/CVE-2022-22954](https://github.com/orwagodfather/CVE-2022-22954) - [orwagodfather/CVE-2022-22954](https://github.com/orwagodfather/CVE-2022-22954)
- [b4dboy17/CVE-2022-22954](https://github.com/b4dboy17/CVE-2022-22954) - [b4dboy17/CVE-2022-22954](https://github.com/b4dboy17/CVE-2022-22954)
- [arzuozkan/CVE-2022-22954](https://github.com/arzuozkan/CVE-2022-22954) - [arzuozkan/CVE-2022-22954](https://github.com/arzuozkan/CVE-2022-22954)
- [1SeaMy/CVE-2022-22954](https://github.com/1SeaMy/CVE-2022-22954)
- [amit-pathak009/CVE-2022-22954](https://github.com/amit-pathak009/CVE-2022-22954) - [amit-pathak009/CVE-2022-22954](https://github.com/amit-pathak009/CVE-2022-22954)
- [amit-pathak009/CVE-2022-22954-PoC](https://github.com/amit-pathak009/CVE-2022-22954-PoC) - [amit-pathak009/CVE-2022-22954-PoC](https://github.com/amit-pathak009/CVE-2022-22954-PoC)
- [Schira4396/VcenterKiller](https://github.com/Schira4396/VcenterKiller) - [Schira4396/VcenterKiller](https://github.com/Schira4396/VcenterKiller)
@ -14365,27 +14216,6 @@
- [G37SYS73M/CVE-2022-46087](https://github.com/G37SYS73M/CVE-2022-46087) - [G37SYS73M/CVE-2022-46087](https://github.com/G37SYS73M/CVE-2022-46087)
### CVE-2022-46088 (-)
<code>Online Flight Booking Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the feedback form.
</code>
- [ASR511-OO7/CVE-2022-46088](https://github.com/ASR511-OO7/CVE-2022-46088)
### CVE-2022-46089 (-)
<code>Cross Site Scripting (XSS) vulnerability in the add-airline form of Online Flight Booking Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the airline parameter.
</code>
- [ASR511-OO7/CVE-2022-46089](https://github.com/ASR511-OO7/CVE-2022-46089)
### CVE-2022-46091 (-)
<code>Cross Site Scripting (XSS) vulnerability in the feedback form of Online Flight Booking Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the airline parameter.
</code>
- [ASR511-OO7/CVE-2022-46091](https://github.com/ASR511-OO7/CVE-2022-46091)
### CVE-2022-46104 ### CVE-2022-46104
- [NurSec747/CVE-2022-46104---POC](https://github.com/NurSec747/CVE-2022-46104---POC) - [NurSec747/CVE-2022-46104---POC](https://github.com/NurSec747/CVE-2022-46104---POC)
@ -14486,27 +14316,6 @@
- [WodenSec/CVE-2022-46485](https://github.com/WodenSec/CVE-2022-46485) - [WodenSec/CVE-2022-46485](https://github.com/WodenSec/CVE-2022-46485)
### CVE-2022-46497 (-)
<code>Hospital Management System 1.0 was discovered to contain a SQL injection vulnerability via the pat_number parameter at his_doc_view_single_patien.php.
</code>
- [ASR511-OO7/CVE-2022-46497](https://github.com/ASR511-OO7/CVE-2022-46497)
### CVE-2022-46498 (-)
<code>Hospital Management System 1.0 was discovered to contain a SQL injection vulnerability via the doc_number parameter at his_admin_view_single_employee.php.
</code>
- [ASR511-OO7/CVE-2022-46498](https://github.com/ASR511-OO7/CVE-2022-46498)
### CVE-2022-46499 (-)
<code>Hospital Management System 1.0 was discovered to contain a SQL injection vulnerability via the pat_number parameter at his_admin_view_single_patient.php.
</code>
- [ASR511-OO7/CVE-2022-46499](https://github.com/ASR511-OO7/CVE-2022-46499)
### CVE-2022-46505 (2023-01-18) ### CVE-2022-46505 (2023-01-18)
<code>An issue in MatrixSSL 4.5.1-open and earlier leads to failure to securely check the SessionID field, resulting in the misuse of an all-zero MasterSecret that can decrypt secret data. <code>An issue in MatrixSSL 4.5.1-open and earlier leads to failure to securely check the SessionID field, resulting in the misuse of an all-zero MasterSecret that can decrypt secret data.