Auto Update 2024/11/27 06:37:48

This commit is contained in:
motikan2010-bot 2024-11-27 15:37:48 +09:00
parent 3d03809a53
commit 7beecbd87d
42 changed files with 123 additions and 163 deletions

View file

@ -3179,10 +3179,10 @@
"description": "CVE-2019-0708 (BlueKeep) proof of concept allowing pre-auth RCE on Windows7",
"fork": false,
"created_at": "2020-03-15T19:33:53Z",
"updated_at": "2024-11-16T19:52:41Z",
"updated_at": "2024-11-27T01:50:25Z",
"pushed_at": "2022-03-28T04:10:20Z",
"stargazers_count": 131,
"watchers_count": 131,
"stargazers_count": 132,
"watchers_count": 132,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -3191,7 +3191,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 131,
"watchers": 132,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,10 +14,10 @@
"description": "Researching CVE published originally by longterm.io",
"fork": false,
"created_at": "2024-03-19T01:47:28Z",
"updated_at": "2024-03-30T13:23:30Z",
"updated_at": "2024-11-27T03:36:00Z",
"pushed_at": "2024-04-11T15:04:05Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -176,10 +176,10 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2024-11-18T10:58:05Z",
"updated_at": "2024-11-27T01:46:25Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 632,
"watchers_count": 632,
"stargazers_count": 633,
"watchers_count": 633,
"has_discussions": false,
"forks_count": 146,
"allow_forking": true,
@ -188,7 +188,7 @@
"topics": [],
"visibility": "public",
"forks": 146,
"watchers": 632,
"watchers": 633,
"score": 0,
"subscribers_count": 12
},

View file

@ -293,10 +293,10 @@
"description": null,
"fork": false,
"created_at": "2021-12-18T08:18:50Z",
"updated_at": "2024-11-19T08:13:46Z",
"updated_at": "2024-11-27T01:07:41Z",
"pushed_at": "2021-12-22T10:32:37Z",
"stargazers_count": 188,
"watchers_count": 188,
"stargazers_count": 189,
"watchers_count": 189,
"has_discussions": false,
"forks_count": 48,
"allow_forking": true,
@ -305,7 +305,7 @@
"topics": [],
"visibility": "public",
"forks": 48,
"watchers": 188,
"watchers": 189,
"score": 0,
"subscribers_count": 5
},

View file

@ -50,7 +50,7 @@
"stargazers_count": 99,
"watchers_count": 99,
"has_discussions": false,
"forks_count": 22,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -59,7 +59,7 @@
"poc"
],
"visibility": "public",
"forks": 22,
"forks": 21,
"watchers": 99,
"score": 0,
"subscribers_count": 3

View file

@ -1135,10 +1135,10 @@
"description": "C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection ",
"fork": false,
"created_at": "2021-03-29T21:10:34Z",
"updated_at": "2024-10-25T11:34:12Z",
"updated_at": "2024-11-27T04:42:18Z",
"pushed_at": "2021-03-31T11:57:38Z",
"stargazers_count": 239,
"watchers_count": 239,
"stargazers_count": 240,
"watchers_count": 240,
"has_discussions": false,
"forks_count": 41,
"allow_forking": true,
@ -1147,7 +1147,7 @@
"topics": [],
"visibility": "public",
"forks": 41,
"watchers": 239,
"watchers": 240,
"score": 0,
"subscribers_count": 6
},

View file

@ -546,7 +546,7 @@
"stargazers_count": 800,
"watchers_count": 800,
"has_discussions": false,
"forks_count": 169,
"forks_count": 170,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -559,7 +559,7 @@
"remote-code-execution"
],
"visibility": "public",
"forks": 169,
"forks": 170,
"watchers": 800,
"score": 0,
"subscribers_count": 18

View file

@ -940,7 +940,7 @@
"stargazers_count": 1810,
"watchers_count": 1810,
"has_discussions": false,
"forks_count": 526,
"forks_count": 527,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -951,7 +951,7 @@
"security"
],
"visibility": "public",
"forks": 526,
"forks": 527,
"watchers": 1810,
"score": 0,
"subscribers_count": 26

View file

@ -1194,10 +1194,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2024-11-26T03:34:37Z",
"updated_at": "2024-11-27T02:38:28Z",
"pushed_at": "2023-05-20T05:55:45Z",
"stargazers_count": 557,
"watchers_count": 557,
"stargazers_count": 555,
"watchers_count": 555,
"has_discussions": false,
"forks_count": 140,
"allow_forking": true,
@ -1206,7 +1206,7 @@
"topics": [],
"visibility": "public",
"forks": 140,
"watchers": 557,
"watchers": 555,
"score": 0,
"subscribers_count": 15
},

View file

@ -1713,7 +1713,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 817383255,

View file

@ -262,7 +262,7 @@
"description": "Magento 2 patch for CVE-2022-24086. Fix the RCE vulnerability and related bugs by performing deep template variable escaping. If you cannot upgrade Magento or cannot apply the official patches, try this one.",
"fork": false,
"created_at": "2024-11-25T06:56:05Z",
"updated_at": "2024-11-25T10:10:10Z",
"updated_at": "2024-11-27T04:14:24Z",
"pushed_at": "2024-11-25T09:38:04Z",
"stargazers_count": 0,
"watchers_count": 0,
@ -272,7 +272,7 @@
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"all-magento24-compactable",
"all-magento24-compatible",
"cve-2022-24086",
"deep-escape",
"improper-input-validation",

View file

@ -152,6 +152,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2024-11-25T06:09:21Z",
"updated_at": "2024-11-27T03:17:31Z",
"pushed_at": "2023-02-26T14:06:05Z",
"stargazers_count": 1170,
"watchers_count": 1170,
"stargazers_count": 1171,
"watchers_count": 1171,
"has_discussions": true,
"forks_count": 190,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 190,
"watchers": 1170,
"watchers": 1171,
"score": 0,
"subscribers_count": 19
},

View file

@ -59,6 +59,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -208,13 +208,13 @@
"stargazers_count": 215,
"watchers_count": 215,
"has_discussions": false,
"forks_count": 24,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 24,
"forks": 25,
"watchers": 215,
"score": 0,
"subscribers_count": 2

View file

@ -617,13 +617,13 @@
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"forks": 7,
"watchers": 40,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2023-03-11T15:04:51Z",
"updated_at": "2024-08-13T10:47:32Z",
"updated_at": "2024-11-27T03:27:39Z",
"pushed_at": "2024-01-09T21:11:58Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 2
}

View file

@ -14,10 +14,10 @@
"description": "Exploit code for CVE-2023-42914 \/ pwn2own Vancouver 2023",
"fork": false,
"created_at": "2024-11-22T11:28:35Z",
"updated_at": "2024-11-26T21:08:44Z",
"updated_at": "2024-11-27T05:10:32Z",
"pushed_at": "2024-11-22T12:10:47Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"watchers": 8,
"score": 0,
"subscribers_count": 0
}

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-11-26T07:52:29Z",
"updated_at": "2024-11-26T18:37:26Z",
"updated_at": "2024-11-27T06:18:48Z",
"pushed_at": "2024-11-26T08:06:06Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,8 +26,8 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -407,7 +407,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 821684899,

View file

@ -1190,6 +1190,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -45,10 +45,10 @@
"description": "JumpServer 堡垒机未授权综合漏洞利用, Exploit for CVE-2023-42442 \/ CVE-2023-42820 \/ RCE 2021",
"fork": false,
"created_at": "2023-10-14T09:35:07Z",
"updated_at": "2024-11-20T10:13:54Z",
"updated_at": "2024-11-27T03:12:13Z",
"pushed_at": "2024-05-16T07:42:00Z",
"stargazers_count": 219,
"watchers_count": 219,
"stargazers_count": 221,
"watchers_count": 221,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 23,
"watchers": 219,
"watchers": 221,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-11-26T17:49:22Z",
"updated_at": "2024-11-27T01:55:29Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1275,
"watchers_count": 1275,
"stargazers_count": 1276,
"watchers_count": 1276,
"has_discussions": false,
"forks_count": 218,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 218,
"watchers": 1275,
"watchers": 1276,
"score": 0,
"subscribers_count": 20
},

View file

@ -14,8 +14,8 @@
"description": "A Proof of Concept for CVE-2023-50564 vulnerability in Pluck CMS version 4.7.18",
"fork": false,
"created_at": "2024-07-21T20:15:10Z",
"updated_at": "2024-11-26T13:55:02Z",
"pushed_at": "2024-11-08T22:29:45Z",
"updated_at": "2024-11-27T03:32:05Z",
"pushed_at": "2024-11-27T03:32:02Z",
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "CVE-2023-6875 PoC",
"fork": false,
"created_at": "2024-01-13T15:23:17Z",
"updated_at": "2024-08-30T15:06:36Z",
"updated_at": "2024-11-27T04:39:44Z",
"pushed_at": "2024-01-15T10:58:20Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 24,
"watchers": 25,
"score": 0,
"subscribers_count": 1
},

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -45,10 +45,10 @@
"description": "POC - CVE-202410914- Command Injection Vulnerability in `name` parameter for D-Link NAS",
"fork": false,
"created_at": "2024-11-10T12:01:21Z",
"updated_at": "2024-11-27T00:06:53Z",
"updated_at": "2024-11-27T05:07:29Z",
"pushed_at": "2024-11-26T14:45:28Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -65,7 +65,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 26,
"watchers": 30,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "Proof-of-concept (PoC) exploit for JSONPath-plus vulnerability",
"fork": false,
"created_at": "2024-11-13T07:56:10Z",
"updated_at": "2024-11-26T08:38:33Z",
"updated_at": "2024-11-27T01:32:54Z",
"pushed_at": "2024-11-26T08:38:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -293,10 +293,10 @@
"description": "POC - Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692 ",
"fork": false,
"created_at": "2024-09-15T12:15:35Z",
"updated_at": "2024-11-26T21:34:48Z",
"updated_at": "2024-11-27T05:37:49Z",
"pushed_at": "2024-11-26T14:45:12Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -310,7 +310,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 32,
"watchers": 33,
"score": 0,
"subscribers_count": 1
},

View file

@ -81,13 +81,13 @@
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 31,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 31,
"forks": 32,
"watchers": 14,
"score": 0,
"subscribers_count": 0

View file

@ -76,10 +76,10 @@
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
"fork": false,
"created_at": "2024-05-27T08:30:06Z",
"updated_at": "2024-11-26T23:16:03Z",
"updated_at": "2024-11-27T02:13:25Z",
"pushed_at": "2024-09-30T08:45:56Z",
"stargazers_count": 420,
"watchers_count": 420,
"stargazers_count": 421,
"watchers_count": 421,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 420,
"watchers": 421,
"score": 0,
"subscribers_count": 8
},

View file

@ -176,10 +176,10 @@
"description": "geoserver CVE-2024-36401漏洞利用工具",
"fork": false,
"created_at": "2024-07-17T02:25:21Z",
"updated_at": "2024-11-25T12:44:33Z",
"updated_at": "2024-11-27T06:22:42Z",
"pushed_at": "2024-07-24T15:33:03Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -188,7 +188,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 0
},
@ -362,10 +362,10 @@
"description": "geoserver图形化漏洞利用工具",
"fork": false,
"created_at": "2024-10-05T10:08:55Z",
"updated_at": "2024-11-22T09:18:51Z",
"updated_at": "2024-11-27T06:10:04Z",
"pushed_at": "2024-10-08T03:16:26Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -374,7 +374,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 13,
"watchers": 15,
"score": 0,
"subscribers_count": 1
},

View file

@ -111,10 +111,10 @@
"description": "Exploit for the vulnerability CVE-2024-43044 in Jenkins",
"fork": false,
"created_at": "2024-08-23T20:26:26Z",
"updated_at": "2024-11-19T11:51:43Z",
"updated_at": "2024-11-27T00:58:35Z",
"pushed_at": "2024-10-02T21:58:12Z",
"stargazers_count": 165,
"watchers_count": 165,
"stargazers_count": 166,
"watchers_count": 166,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -123,7 +123,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 165,
"watchers": 166,
"score": 0,
"subscribers_count": 3
}

View file

@ -278,10 +278,10 @@
"description": null,
"fork": false,
"created_at": "2024-09-04T14:43:33Z",
"updated_at": "2024-09-04T15:18:00Z",
"updated_at": "2024-11-27T00:52:45Z",
"pushed_at": "2024-09-04T15:17:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -290,7 +290,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "PoC for CVE-2024-48990",
"fork": false,
"created_at": "2024-11-20T18:41:25Z",
"updated_at": "2024-11-26T16:53:24Z",
"updated_at": "2024-11-27T06:20:48Z",
"pushed_at": "2024-11-20T18:49:33Z",
"stargazers_count": 78,
"watchers_count": 78,
"stargazers_count": 79,
"watchers_count": 79,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 78,
"watchers": 79,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler",
"fork": false,
"created_at": "2024-11-19T08:57:18Z",
"updated_at": "2024-11-25T21:48:33Z",
"updated_at": "2024-11-27T04:51:52Z",
"pushed_at": "2024-11-19T09:15:26Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
}

View file

@ -93,6 +93,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -1,33 +0,0 @@
[
{
"id": 894652793,
"name": "WP-Event-Tickets-with-Ticket-Scanner-CVE-Report",
"full_name": "DoTTak\/WP-Event-Tickets-with-Ticket-Scanner-CVE-Report",
"owner": {
"login": "DoTTak",
"id": 57674710,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57674710?v=4",
"html_url": "https:\/\/github.com\/DoTTak",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/DoTTak\/WP-Event-Tickets-with-Ticket-Scanner-CVE-Report",
"description": "Event Tickets with Ticket Scanner WordPress 플러그인(CVE-2024-52427)의 불완전 패치 발견 및 권한 격하(Author → Contributor) 취약점 분석",
"fork": false,
"created_at": "2024-11-26T18:29:59Z",
"updated_at": "2024-11-26T18:32:19Z",
"pushed_at": "2024-11-26T18:32:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -269,10 +269,10 @@
"description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH",
"fork": false,
"created_at": "2024-07-01T20:33:20Z",
"updated_at": "2024-11-23T21:43:26Z",
"updated_at": "2024-11-27T04:40:50Z",
"pushed_at": "2024-09-24T19:18:56Z",
"stargazers_count": 459,
"watchers_count": 459,
"stargazers_count": 460,
"watchers_count": 460,
"has_discussions": false,
"forks_count": 88,
"allow_forking": true,
@ -287,7 +287,7 @@
],
"visibility": "public",
"forks": 88,
"watchers": 459,
"watchers": 460,
"score": 0,
"subscribers_count": 7
},

View file

@ -50,13 +50,13 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 1

View file

@ -7058,13 +7058,6 @@
- [RandomRobbieBF/CVE-2024-52382](https://github.com/RandomRobbieBF/CVE-2024-52382)
### CVE-2024-52427 (2024-11-18)
<code>Improper Neutralization of Special Elements Used in a Template Engine vulnerability in Saso Nikolov Event Tickets with Ticket Scanner allows Server Side Include (SSI) Injection.This issue affects Event Tickets with Ticket Scanner: from n/a through 2.3.11.
</code>
- [DoTTak/WP-Event-Tickets-with-Ticket-Scanner-CVE-Report](https://github.com/DoTTak/WP-Event-Tickets-with-Ticket-Scanner-CVE-Report)
### CVE-2024-52429 (2024-11-18)
<code>Unrestricted Upload of File with Dangerous Type vulnerability in Anton Hoelstad WP Quick Setup allows Upload a Web Shell to a Web Server.This issue affects WP Quick Setup: from n/a through 2.0.