mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2023/09/02 06:27:22
This commit is contained in:
parent
8f9e2713a1
commit
74d7ddb49f
29 changed files with 130 additions and 95 deletions
|
@ -103,10 +103,10 @@
|
|||
"description": "Python exploit for vsftpd 2.3.4 - Backdoor Command Execution",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-07T06:20:27Z",
|
||||
"updated_at": "2023-06-21T10:11:56Z",
|
||||
"updated_at": "2023-09-02T01:40:15Z",
|
||||
"pushed_at": "2023-01-08T17:46:12Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -122,7 +122,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A checker (site and tool) for CVE-2014-0160",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-07T23:03:09Z",
|
||||
"updated_at": "2023-08-14T17:55:32Z",
|
||||
"updated_at": "2023-09-02T03:15:44Z",
|
||||
"pushed_at": "2021-02-24T09:17:24Z",
|
||||
"stargazers_count": 2297,
|
||||
"watchers_count": 2297,
|
||||
"stargazers_count": 2298,
|
||||
"watchers_count": 2298,
|
||||
"has_discussions": false,
|
||||
"forks_count": 489,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 489,
|
||||
"watchers": 2297,
|
||||
"watchers": 2298,
|
||||
"score": 0,
|
||||
"subscribers_count": 118
|
||||
},
|
||||
|
|
|
@ -78,13 +78,13 @@
|
|||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"forks": 9,
|
||||
"watchers": 23,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-31T04:51:43Z",
|
||||
"updated_at": "2023-08-26T08:44:25Z",
|
||||
"updated_at": "2023-09-02T00:40:40Z",
|
||||
"pushed_at": "2019-08-01T16:02:59Z",
|
||||
"stargazers_count": 309,
|
||||
"watchers_count": 309,
|
||||
"stargazers_count": 310,
|
||||
"watchers_count": 310,
|
||||
"has_discussions": false,
|
||||
"forks_count": 117,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 117,
|
||||
"watchers": 309,
|
||||
"watchers": 310,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -13,19 +13,19 @@
|
|||
"description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T06:22:40Z",
|
||||
"updated_at": "2023-08-21T08:38:38Z",
|
||||
"updated_at": "2023-09-02T05:07:15Z",
|
||||
"pushed_at": "2020-02-20T11:03:18Z",
|
||||
"stargazers_count": 196,
|
||||
"watchers_count": 196,
|
||||
"stargazers_count": 197,
|
||||
"watchers_count": 197,
|
||||
"has_discussions": false,
|
||||
"forks_count": 54,
|
||||
"forks_count": 55,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 54,
|
||||
"watchers": 196,
|
||||
"forks": 55,
|
||||
"watchers": 197,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2023-09-01T00:33:23Z",
|
||||
"updated_at": "2023-09-02T00:35:28Z",
|
||||
"pushed_at": "2023-07-20T10:51:42Z",
|
||||
"stargazers_count": 1637,
|
||||
"watchers_count": 1637,
|
||||
"stargazers_count": 1638,
|
||||
"watchers_count": 1638,
|
||||
"has_discussions": false,
|
||||
"forks_count": 361,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 361,
|
||||
"watchers": 1637,
|
||||
"watchers": 1638,
|
||||
"score": 0,
|
||||
"subscribers_count": 90
|
||||
},
|
||||
|
|
|
@ -3643,7 +3643,7 @@
|
|||
"description": "Ingest GreyNoise.io malicious feed for CVE-2021-44228 and apply null routes",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:15:42Z",
|
||||
"updated_at": "2022-09-12T02:34:11Z",
|
||||
"updated_at": "2023-09-02T02:29:03Z",
|
||||
"pushed_at": "2021-12-14T23:03:03Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-23T15:03:09Z",
|
||||
"updated_at": "2023-08-28T01:05:02Z",
|
||||
"updated_at": "2023-09-02T00:57:51Z",
|
||||
"pushed_at": "2022-03-26T05:52:15Z",
|
||||
"stargazers_count": 445,
|
||||
"watchers_count": 445,
|
||||
"stargazers_count": 446,
|
||||
"watchers_count": 446,
|
||||
"has_discussions": false,
|
||||
"forks_count": 62,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 62,
|
||||
"watchers": 445,
|
||||
"watchers": 446,
|
||||
"score": 0,
|
||||
"subscribers_count": 20
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "LPE PoC of a user-after-free vulnerability in the Linux netfilter subsystem.",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-27T14:44:39Z",
|
||||
"updated_at": "2023-06-11T20:23:24Z",
|
||||
"updated_at": "2023-09-02T02:05:37Z",
|
||||
"pushed_at": "2023-02-04T16:27:22Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -55,7 +55,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Juju: GameOver(lay) CVE-2023-2640 and CVE-2023-32629 patcher",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-04T18:28:52Z",
|
||||
"updated_at": "2023-08-24T18:23:13Z",
|
||||
"updated_at": "2023-09-02T02:12:39Z",
|
||||
"pushed_at": "2023-08-24T18:24:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-26818 Exploit MacOS TCC Bypass W\/ Telegram",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-30T12:40:50Z",
|
||||
"updated_at": "2023-09-01T19:19:35Z",
|
||||
"updated_at": "2023-09-02T06:01:23Z",
|
||||
"pushed_at": "2023-08-30T12:50:02Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-30943 RCE PoC",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-31T08:18:17Z",
|
||||
"updated_at": "2023-09-01T13:44:07Z",
|
||||
"updated_at": "2023-09-02T03:12:39Z",
|
||||
"pushed_at": "2023-08-31T09:39:18Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,20 +13,20 @@
|
|||
"description": "VMWare Aria Operations for Networks (vRealize Network Insight) Static SSH key RCE (CVE-2023-34039)",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-01T16:17:10Z",
|
||||
"updated_at": "2023-09-01T18:23:21Z",
|
||||
"updated_at": "2023-09-02T04:28:44Z",
|
||||
"pushed_at": "2023-09-01T16:21:56Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,7 +13,7 @@
|
|||
"description": "POC for Spring Kafka Deserialization Vulnerability CVE-2023-34040",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-30T12:09:15Z",
|
||||
"updated_at": "2023-09-01T19:27:57Z",
|
||||
"updated_at": "2023-09-02T01:30:20Z",
|
||||
"pushed_at": "2023-08-30T12:18:35Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
@ -13,20 +13,20 @@
|
|||
"description": "Pwn2Own Vancouver 2023 Ubuntu LPE exploit",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-01T07:41:23Z",
|
||||
"updated_at": "2023-09-01T20:45:46Z",
|
||||
"updated_at": "2023-09-02T06:17:31Z",
|
||||
"pushed_at": "2023-09-01T07:48:43Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 23,
|
||||
"forks": 3,
|
||||
"watchers": 25,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 2
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -103,10 +103,10 @@
|
|||
"description": "Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-24T22:24:34Z",
|
||||
"updated_at": "2023-09-01T02:38:08Z",
|
||||
"updated_at": "2023-09-02T02:12:45Z",
|
||||
"pushed_at": "2023-08-25T00:30:01Z",
|
||||
"stargazers_count": 136,
|
||||
"watchers_count": 136,
|
||||
"stargazers_count": 137,
|
||||
"watchers_count": 137,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 136,
|
||||
"watchers": 137,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2023-38389 < Wordpress < JupiterX Core < Unauthenticated Account Takeover",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-27T00:30:16Z",
|
||||
"updated_at": "2023-08-31T12:30:45Z",
|
||||
"updated_at": "2023-09-02T01:51:31Z",
|
||||
"pushed_at": "2023-08-27T00:41:40Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -34,7 +34,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "CVE-2023-38831 winrar exploit generator",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-25T09:44:08Z",
|
||||
"updated_at": "2023-09-01T20:54:58Z",
|
||||
"updated_at": "2023-09-02T05:27:06Z",
|
||||
"pushed_at": "2023-08-30T14:20:43Z",
|
||||
"stargazers_count": 527,
|
||||
"watchers_count": 527,
|
||||
"stargazers_count": 530,
|
||||
"watchers_count": 530,
|
||||
"has_discussions": false,
|
||||
"forks_count": 80,
|
||||
"allow_forking": true,
|
||||
|
@ -59,7 +59,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 80,
|
||||
"watchers": 527,
|
||||
"watchers": 530,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
@ -137,10 +137,10 @@
|
|||
"description": "An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-27T21:49:37Z",
|
||||
"updated_at": "2023-09-01T17:17:29Z",
|
||||
"updated_at": "2023-09-02T06:09:15Z",
|
||||
"pushed_at": "2023-08-27T22:17:56Z",
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -156,7 +156,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 92,
|
||||
"watchers": 93,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -507,13 +507,13 @@
|
|||
"html_url": "https:\/\/github.com\/MorDavid"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MorDavid\/CVE-2023-38831-Winrar-Exploit-Generator-POC",
|
||||
"description": "This is a basic proof of concept for the CVE-2023-3883 exploit targeting WinRAR up to 6.22. Modified some existing internet-sourced POCs by introducing greater dynamism and incorporated additional try-except blocks within the code.",
|
||||
"description": "This is a POC for the CVE-2023-3883 exploit targeting WinRAR up to 6.22. Modified some existing internet-sourced POCs by introducing greater dynamism and incorporated additional try-except blocks within the code.",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-30T19:55:11Z",
|
||||
"updated_at": "2023-08-31T08:36:33Z",
|
||||
"updated_at": "2023-09-02T02:22:57Z",
|
||||
"pushed_at": "2023-08-31T15:07:51Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -530,7 +530,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
@ -566,6 +566,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -14,7 +14,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-09-02T00:24:22Z",
|
||||
"updated_at": "2023-09-02T00:24:23Z",
|
||||
"pushed_at": "2023-09-02T00:24:23Z",
|
||||
"pushed_at": "2023-09-02T00:39:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
32
2023/CVE-2023-40869.json
Normal file
32
2023/CVE-2023-40869.json
Normal file
|
@ -0,0 +1,32 @@
|
|||
[
|
||||
{
|
||||
"id": 686183183,
|
||||
"name": "CVE-2023-40869",
|
||||
"full_name": "MinoTauro2020\/CVE-2023-40869",
|
||||
"owner": {
|
||||
"login": "MinoTauro2020",
|
||||
"id": 65294596,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65294596?v=4",
|
||||
"html_url": "https:\/\/github.com\/MinoTauro2020"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/MinoTauro2020\/CVE-2023-40869",
|
||||
"description": " Cross Site Scripting vulnerability in mooSocial mooSocial Software v.3.1.6 allows a remote attacker to execute arbitrary code via a crafted script to the edit_menu, copuon, and group_categorias functions",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-02T00:47:37Z",
|
||||
"updated_at": "2023-09-02T00:47:37Z",
|
||||
"pushed_at": "2023-09-02T00:58:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "This repository is to provide a write-up and PoC for CVE-2023-41717.",
|
||||
"fork": false,
|
||||
"created_at": "2023-08-31T08:10:22Z",
|
||||
"updated_at": "2023-09-01T13:04:41Z",
|
||||
"updated_at": "2023-09-02T01:50:14Z",
|
||||
"pushed_at": "2023-08-31T09:51:35Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -3064,6 +3064,9 @@
|
|||
### CVE-2023-40868
|
||||
- [MinoTauro2020/CVE-2023-40868](https://github.com/MinoTauro2020/CVE-2023-40868)
|
||||
|
||||
### CVE-2023-40869
|
||||
- [MinoTauro2020/CVE-2023-40869](https://github.com/MinoTauro2020/CVE-2023-40869)
|
||||
|
||||
### CVE-2023-40924
|
||||
- [Yobing1/CVE-2023-40924](https://github.com/Yobing1/CVE-2023-40924)
|
||||
|
||||
|
|
Loading…
Reference in a new issue