Auto Update 2024/08/13 06:29:43

This commit is contained in:
motikan2010-bot 2024-08-13 15:29:43 +09:00
parent 907e7e4dc8
commit 7d910fd64f
36 changed files with 171 additions and 136 deletions

View file

@ -13,19 +13,19 @@
"description": "Exploit chain for CVE-2019-9791 & CVE-2019-11708 against firefox 65.0 on windows 64bit",
"fork": false,
"created_at": "2021-09-08T14:38:42Z",
"updated_at": "2023-12-01T16:27:55Z",
"updated_at": "2024-08-13T00:54:04Z",
"pushed_at": "2021-09-08T14:58:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -809,10 +809,10 @@
"description": "这资源是作者复现微软签字证书漏洞CVE-2020-0601结合相关资源及文章实现。推荐大家结合作者博客理解ECC算法、Windows验证机制并尝试自己复现可执行文件签名证书和HTTPS劫持的例子。作为网络安全初学者自己确实很菜但希望坚持下去加油",
"fork": false,
"created_at": "2020-02-17T15:01:54Z",
"updated_at": "2024-08-12T19:57:49Z",
"updated_at": "2024-08-13T01:16:17Z",
"pushed_at": "2020-02-17T16:09:40Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -821,7 +821,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 28,
"watchers": 29,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "A script to exploit CVE-2020-14144 - GiTea authenticated Remote Code Execution using git hooks",
"fork": false,
"created_at": "2022-03-08T17:14:27Z",
"updated_at": "2024-08-12T20:21:23Z",
"updated_at": "2024-08-13T04:06:36Z",
"pushed_at": "2022-05-03T10:40:14Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 2
}

View file

@ -851,10 +851,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-08-12T20:27:32Z",
"updated_at": "2024-08-13T02:40:51Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1293,
"watchers_count": 1293,
"stargazers_count": 1292,
"watchers_count": 1292,
"has_discussions": false,
"forks_count": 165,
"allow_forking": true,
@ -870,7 +870,7 @@
],
"visibility": "public",
"forks": 165,
"watchers": 1293,
"watchers": 1292,
"score": 0,
"subscribers_count": 14
}

View file

@ -236,10 +236,10 @@
"description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE",
"fork": false,
"created_at": "2021-07-05T20:13:49Z",
"updated_at": "2024-08-12T20:14:29Z",
"updated_at": "2024-08-13T03:39:02Z",
"pushed_at": "2024-05-19T16:25:52Z",
"stargazers_count": 770,
"watchers_count": 770,
"stargazers_count": 771,
"watchers_count": 771,
"has_discussions": false,
"forks_count": 118,
"allow_forking": true,
@ -248,7 +248,7 @@
"topics": [],
"visibility": "public",
"forks": 118,
"watchers": 770,
"watchers": 771,
"score": 0,
"subscribers_count": 10
},

View file

@ -48,10 +48,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2024-08-12T20:18:51Z",
"updated_at": "2024-08-13T01:12:46Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 765,
"watchers_count": 765,
"stargazers_count": 766,
"watchers_count": 766,
"has_discussions": false,
"forks_count": 118,
"allow_forking": true,
@ -60,7 +60,7 @@
"topics": [],
"visibility": "public",
"forks": 118,
"watchers": 765,
"watchers": 766,
"score": 0,
"subscribers_count": 13
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
"updated_at": "2024-08-12T20:18:48Z",
"updated_at": "2024-08-13T01:08:13Z",
"pushed_at": "2021-12-16T09:50:15Z",
"stargazers_count": 1323,
"watchers_count": 1323,
"stargazers_count": 1324,
"watchers_count": 1324,
"has_discussions": false,
"forks_count": 320,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 320,
"watchers": 1323,
"watchers": 1324,
"score": 0,
"subscribers_count": 28
},

View file

@ -3516,10 +3516,10 @@
"description": "log4J burp被扫插件、CVE-2021-44228、支持dnclog.cn和burp内置DNS、可配合JNDIExploit生成payload",
"fork": false,
"created_at": "2021-12-13T01:55:51Z",
"updated_at": "2024-08-12T14:06:37Z",
"updated_at": "2024-08-13T04:06:32Z",
"pushed_at": "2021-12-13T09:18:19Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 67,
"watchers_count": 67,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -3528,7 +3528,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 66,
"watchers": 67,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "在21年SpringBlade框架曾发现一个JWT认证的漏洞。尽管我们搜索了许多基于原理的扫描工具但没有找到能够支持这个漏洞的工具。可能是因为这个漏洞相对冷门而不被广泛关注。",
"fork": false,
"created_at": "2023-07-22T16:48:24Z",
"updated_at": "2024-07-28T11:54:26Z",
"updated_at": "2024-08-13T02:09:36Z",
"pushed_at": "2024-07-28T11:54:23Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
}

View file

@ -766,10 +766,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-08-12T20:27:32Z",
"updated_at": "2024-08-13T02:40:51Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1293,
"watchers_count": 1293,
"stargazers_count": 1292,
"watchers_count": 1292,
"has_discussions": false,
"forks_count": 165,
"allow_forking": true,
@ -785,7 +785,7 @@
],
"visibility": "public",
"forks": 165,
"watchers": 1293,
"watchers": 1292,
"score": 0,
"subscribers_count": 14
},

View file

@ -2033,7 +2033,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 807402056,

View file

@ -208,10 +208,10 @@
"description": "Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)",
"fork": false,
"created_at": "2024-07-23T09:44:46Z",
"updated_at": "2024-08-12T23:05:10Z",
"updated_at": "2024-08-13T04:03:13Z",
"pushed_at": "2024-07-23T10:03:08Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -220,7 +220,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 0
},
@ -252,6 +252,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -57,6 +57,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-09-04T07:48:13Z",
"updated_at": "2024-08-12T20:32:40Z",
"updated_at": "2024-08-13T05:55:28Z",
"pushed_at": "2024-01-08T03:34:51Z",
"stargazers_count": 125,
"watchers_count": 125,
"stargazers_count": 126,
"watchers_count": 126,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 125,
"watchers": 126,
"score": 0,
"subscribers_count": 2
},

View file

@ -103,10 +103,10 @@
"description": "Openfire Console Authentication Bypass Vulnerability with RCE plugin",
"fork": false,
"created_at": "2023-06-18T15:42:00Z",
"updated_at": "2024-08-03T08:17:15Z",
"updated_at": "2024-08-13T05:22:13Z",
"pushed_at": "2024-03-07T07:23:41Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 39,
"watchers": 40,
"score": 0,
"subscribers_count": 2
},

View file

@ -86,10 +86,10 @@
"description": "WonderCMS RCE CVE-2023-41425",
"fork": false,
"created_at": "2024-08-12T06:16:17Z",
"updated_at": "2024-08-12T23:18:02Z",
"updated_at": "2024-08-13T04:25:47Z",
"pushed_at": "2024-08-12T06:55:30Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -98,8 +98,8 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-08-12T17:21:48Z",
"updated_at": "2024-08-13T03:50:46Z",
"pushed_at": "2024-07-24T13:17:05Z",
"stargazers_count": 1050,
"watchers_count": 1050,
"stargazers_count": 1051,
"watchers_count": 1051,
"has_discussions": false,
"forks_count": 180,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 180,
"watchers": 1050,
"watchers": 1051,
"score": 0,
"subscribers_count": 17
},

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2024-08-12T20:33:14Z",
"updated_at": "2024-08-13T01:01:34Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2206,
"watchers_count": 2206,
"stargazers_count": 2207,
"watchers_count": 2207,
"has_discussions": false,
"forks_count": 288,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 288,
"watchers": 2206,
"watchers": 2207,
"score": 0,
"subscribers_count": 23
},

View file

@ -13,10 +13,10 @@
"description": "Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability",
"fork": false,
"created_at": "2024-04-22T07:05:04Z",
"updated_at": "2024-08-02T02:20:06Z",
"updated_at": "2024-08-13T02:54:35Z",
"pushed_at": "2024-05-09T16:39:55Z",
"stargazers_count": 211,
"watchers_count": 211,
"stargazers_count": 212,
"watchers_count": 212,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 211,
"watchers": 212,
"score": 0,
"subscribers_count": 4
},

View file

@ -43,10 +43,10 @@
"description": "PoC and Detection for CVE-2024-21626",
"fork": false,
"created_at": "2024-02-01T15:28:37Z",
"updated_at": "2024-08-04T00:49:46Z",
"updated_at": "2024-08-13T01:00:15Z",
"pushed_at": "2024-02-06T16:09:05Z",
"stargazers_count": 67,
"watchers_count": 67,
"stargazers_count": 68,
"watchers_count": 68,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 67,
"watchers": 68,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-01-10T20:35:38Z",
"updated_at": "2024-08-09T07:48:17Z",
"updated_at": "2024-08-13T02:23:59Z",
"pushed_at": "2024-01-10T20:43:07Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Time Based SQL Injection in Zabbix Server Audit Log --> RCE",
"fork": false,
"created_at": "2024-05-20T03:29:09Z",
"updated_at": "2024-07-15T13:33:17Z",
"updated_at": "2024-08-13T04:22:00Z",
"pushed_at": "2024-05-21T10:30:49Z",
"stargazers_count": 100,
"watchers_count": 100,
"stargazers_count": 101,
"watchers_count": 101,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 21,
"watchers": 100,
"watchers": 101,
"score": 0,
"subscribers_count": 1
},

View file

@ -76,10 +76,10 @@
"description": "CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4",
"fork": false,
"created_at": "2024-03-06T03:15:03Z",
"updated_at": "2024-08-12T20:33:13Z",
"updated_at": "2024-08-13T02:04:20Z",
"pushed_at": "2024-03-11T07:57:40Z",
"stargazers_count": 129,
"watchers_count": 129,
"stargazers_count": 130,
"watchers_count": 130,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -98,7 +98,7 @@
],
"visibility": "public",
"forks": 33,
"watchers": 129,
"watchers": 130,
"score": 0,
"subscribers_count": 3
},
@ -350,10 +350,10 @@
"description": "CVE-2024-27198 & CVE-2024-27199 PoC - RCE, Admin Account Creation, Enum Users, Server Information #RCE #python3",
"fork": false,
"created_at": "2024-08-12T04:46:34Z",
"updated_at": "2024-08-12T15:14:37Z",
"updated_at": "2024-08-13T04:31:18Z",
"pushed_at": "2024-08-12T04:47:04Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -362,8 +362,8 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -35,6 +35,6 @@
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -235,10 +235,10 @@
"description": "CVE-2024-32002 RCE PoC",
"fork": false,
"created_at": "2024-05-18T15:05:28Z",
"updated_at": "2024-08-07T07:45:46Z",
"updated_at": "2024-08-13T04:40:43Z",
"pushed_at": "2024-05-18T15:12:59Z",
"stargazers_count": 96,
"watchers_count": 96,
"stargazers_count": 97,
"watchers_count": 97,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -251,7 +251,7 @@
],
"visibility": "public",
"forks": 22,
"watchers": 96,
"watchers": 97,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "Exploit POC for CVE-2024-36877",
"fork": false,
"created_at": "2024-08-09T15:33:04Z",
"updated_at": "2024-08-12T02:29:19Z",
"updated_at": "2024-08-13T05:01:16Z",
"pushed_at": "2024-08-09T15:34:50Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -87,6 +87,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,21 +13,21 @@
"description": "原文已被作者删除备份用非原创EXP & POC",
"fork": false,
"created_at": "2024-08-09T01:18:48Z",
"updated_at": "2024-08-12T20:48:56Z",
"updated_at": "2024-08-13T03:43:52Z",
"pushed_at": "2024-08-09T17:18:10Z",
"stargazers_count": 296,
"watchers_count": 296,
"stargazers_count": 303,
"watchers_count": 303,
"has_discussions": false,
"forks_count": 210,
"forks_count": 212,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 210,
"watchers": 296,
"forks": 212,
"watchers": 303,
"score": 0,
"subscribers_count": 5
"subscribers_count": 7
},
{
"id": 840155778,
@ -43,10 +43,10 @@
"description": "RDL的堆溢出导致的RCE",
"fork": false,
"created_at": "2024-08-09T05:00:44Z",
"updated_at": "2024-08-12T18:42:08Z",
"updated_at": "2024-08-13T03:20:21Z",
"pushed_at": "2024-08-09T10:12:42Z",
"stargazers_count": 144,
"watchers_count": 144,
"stargazers_count": 149,
"watchers_count": 149,
"has_discussions": false,
"forks_count": 58,
"allow_forking": true,
@ -55,9 +55,9 @@
"topics": [],
"visibility": "public",
"forks": 58,
"watchers": 144,
"watchers": 149,
"score": 0,
"subscribers_count": 3
"subscribers_count": 5
},
{
"id": 840205980,
@ -103,19 +103,19 @@
"description": "远程探测 remote desktop licensing 服务开放情况,用于 CVE-2024-38077 漏洞快速排查",
"fork": false,
"created_at": "2024-08-09T07:45:25Z",
"updated_at": "2024-08-12T13:38:48Z",
"updated_at": "2024-08-13T06:32:35Z",
"pushed_at": "2024-08-09T08:06:19Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 6,
"forks": 9,
"watchers": 9,
"score": 0,
"subscribers_count": 3
},

View file

@ -61,6 +61,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept",
"fork": false,
"created_at": "2024-05-20T10:02:23Z",
"updated_at": "2024-08-12T10:12:19Z",
"updated_at": "2024-08-13T03:04:27Z",
"pushed_at": "2024-06-07T03:28:00Z",
"stargazers_count": 91,
"watchers_count": 91,
"stargazers_count": 92,
"watchers_count": 92,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 91,
"watchers": 92,
"score": 0,
"subscribers_count": 2
},

32
2024/CVE-2024-56662.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 841771928,
"name": "cve-2024-56662",
"full_name": "nimosec\/cve-2024-56662",
"owner": {
"login": "nimosec",
"id": 77150860,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77150860?v=4",
"html_url": "https:\/\/github.com\/nimosec"
},
"html_url": "https:\/\/github.com\/nimosec\/cve-2024-56662",
"description": "cve",
"fork": false,
"created_at": "2024-08-13T02:37:41Z",
"updated_at": "2024-08-13T03:18:56Z",
"pushed_at": "2024-08-13T02:37:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": true,
"forks_count": 0,
"allow_forking": true,
"is_template": true,
"web_commit_signoff_required": true,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -2787,6 +2787,6 @@
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-07-18T07:52:46Z",
"updated_at": "2024-08-12T23:36:46Z",
"updated_at": "2024-08-13T02:26:38Z",
"pushed_at": "2024-08-12T20:48:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,8 +25,8 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 2
}
]

View file

@ -4116,6 +4116,9 @@
- [HwMex0/CVE-2024-43044](https://github.com/HwMex0/CVE-2024-43044)
- [jenkinsci-cert/SECURITY-3430](https://github.com/jenkinsci-cert/SECURITY-3430)
### CVE-2024-56662
- [nimosec/cve-2024-56662](https://github.com/nimosec/cve-2024-56662)
### CVE-2024-65230
- [CBaekhyunC/cve-2024-65230](https://github.com/CBaekhyunC/cve-2024-65230)