Auto Update 2024/02/21 12:26:46

This commit is contained in:
motikan2010-bot 2024-02-21 21:26:46 +09:00
parent 2d90201bb4
commit 8a51faf6b8
35 changed files with 169 additions and 165 deletions

View file

@ -73,10 +73,10 @@
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
"fork": false,
"created_at": "2016-10-21T11:19:21Z",
"updated_at": "2024-01-25T17:48:03Z",
"updated_at": "2024-02-21T07:51:33Z",
"pushed_at": "2021-02-03T16:03:40Z",
"stargazers_count": 939,
"watchers_count": 939,
"stargazers_count": 940,
"watchers_count": 940,
"has_discussions": false,
"forks_count": 403,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 403,
"watchers": 939,
"watchers": 940,
"score": 0,
"subscribers_count": 65
},

View file

@ -175,7 +175,7 @@
"fork": false,
"created_at": "2024-02-20T21:56:02Z",
"updated_at": "2024-02-20T21:59:40Z",
"pushed_at": "2024-02-20T21:59:37Z",
"pushed_at": "2024-02-21T10:34:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -18,13 +18,13 @@
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"forks": 8,
"watchers": 10,
"score": 0,
"subscribers_count": 1

File diff suppressed because one or more lines are too long

View file

@ -228,7 +228,7 @@
"stargazers_count": 133,
"watchers_count": 133,
"has_discussions": false,
"forks_count": 62,
"forks_count": 60,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -243,7 +243,7 @@
"security-tools"
],
"visibility": "public",
"forks": 62,
"forks": 60,
"watchers": 133,
"score": 0,
"subscribers_count": 15

View file

@ -78,13 +78,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -170,10 +170,10 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2024-02-18T02:29:36Z",
"updated_at": "2024-02-21T09:07:28Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 570,
"watchers_count": 570,
"stargazers_count": 571,
"watchers_count": 571,
"has_discussions": false,
"forks_count": 147,
"allow_forking": true,
@ -182,7 +182,7 @@
"topics": [],
"visibility": "public",
"forks": 147,
"watchers": 570,
"watchers": 571,
"score": 0,
"subscribers_count": 13
},
@ -1837,10 +1837,10 @@
"description": "Lab introduction to ZeroLogon",
"fork": false,
"created_at": "2023-02-18T14:52:17Z",
"updated_at": "2023-02-18T15:12:45Z",
"updated_at": "2024-02-21T07:28:27Z",
"pushed_at": "2024-02-11T19:40:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -1849,7 +1849,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -103,8 +103,8 @@
"description": null,
"fork": false,
"created_at": "2021-12-15T16:09:54Z",
"updated_at": "2021-12-15T16:09:54Z",
"pushed_at": "2021-12-15T16:09:54Z",
"updated_at": "2024-02-21T07:47:16Z",
"pushed_at": "2024-02-21T07:47:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -1074,10 +1074,10 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
"updated_at": "2024-02-18T06:19:36Z",
"updated_at": "2024-02-21T06:44:31Z",
"pushed_at": "2022-01-13T05:48:01Z",
"stargazers_count": 698,
"watchers_count": 698,
"stargazers_count": 699,
"watchers_count": 699,
"has_discussions": false,
"forks_count": 172,
"allow_forking": true,
@ -1086,7 +1086,7 @@
"topics": [],
"visibility": "public",
"forks": 172,
"watchers": 698,
"watchers": 699,
"score": 0,
"subscribers_count": 11
},

View file

@ -13,10 +13,10 @@
"description": "Sequoia exploit (7\/20\/21)",
"fork": false,
"created_at": "2021-07-21T04:04:49Z",
"updated_at": "2024-01-16T16:27:12Z",
"updated_at": "2024-02-21T10:51:05Z",
"pushed_at": "2021-07-20T23:04:13Z",
"stargazers_count": 77,
"watchers_count": 77,
"stargazers_count": 78,
"watchers_count": 78,
"has_discussions": false,
"forks_count": 67,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 67,
"watchers": 77,
"watchers": 78,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": "check if Azure AD Connect is affected by the vulnerability described in CVE-2021-36949",
"fork": false,
"created_at": "2021-08-14T21:05:30Z",
"updated_at": "2023-05-05T16:11:55Z",
"updated_at": "2024-02-21T11:45:54Z",
"pushed_at": "2021-08-15T18:39:55Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 2
}

View file

@ -1629,35 +1629,5 @@
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 753499093,
"name": "SpringExploitGUI",
"full_name": "charonlight\/SpringExploitGUI",
"owner": {
"login": "charonlight",
"id": 81664593,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81664593?v=4",
"html_url": "https:\/\/github.com\/charonlight"
},
"html_url": "https:\/\/github.com\/charonlight\/SpringExploitGUI",
"description": "一款Spring综合漏洞的利用工具工具目前支持Spring Cloud Gateway RCE(CVE-2022-22947)、Spring Framework RCE (CVE-2022-22965) 的检测以及利用",
"fork": false,
"created_at": "2024-02-06T08:45:19Z",
"updated_at": "2024-02-21T05:44:00Z",
"pushed_at": "2024-02-06T09:14:32Z",
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 15,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -43,10 +43,10 @@
"description": null,
"fork": false,
"created_at": "2022-03-01T15:10:20Z",
"updated_at": "2024-01-12T13:09:56Z",
"updated_at": "2024-02-21T08:16:56Z",
"pushed_at": "2022-03-05T01:02:42Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 20,
"watchers": 21,
"score": 0,
"subscribers_count": 2
}

View file

@ -45,10 +45,10 @@
"description": "POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina",
"fork": false,
"created_at": "2022-05-30T18:17:38Z",
"updated_at": "2024-02-21T02:10:12Z",
"updated_at": "2024-02-21T08:27:30Z",
"pushed_at": "2022-06-05T21:06:13Z",
"stargazers_count": 153,
"watchers_count": 153,
"stargazers_count": 154,
"watchers_count": 154,
"has_discussions": false,
"forks_count": 58,
"allow_forking": true,
@ -65,7 +65,7 @@
],
"visibility": "public",
"forks": 58,
"watchers": 153,
"watchers": 154,
"score": 0,
"subscribers_count": 4
},
@ -1238,10 +1238,10 @@
"description": "Remote Access Shell for Windows (based on cve-2022-30190)",
"fork": false,
"created_at": "2022-06-04T14:18:38Z",
"updated_at": "2024-02-09T17:20:02Z",
"updated_at": "2024-02-21T08:22:53Z",
"pushed_at": "2024-02-09T17:18:42Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -1256,7 +1256,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 6,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-09-30T16:43:28Z",
"updated_at": "2024-02-01T14:59:21Z",
"updated_at": "2024-02-21T10:56:19Z",
"pushed_at": "2024-01-02T11:55:38Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 44,
"watchers": 45,
"score": 0,
"subscribers_count": 2
},

View file

@ -78,13 +78,13 @@
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 14,
"score": 0,
"subscribers_count": 1

View file

@ -73,10 +73,10 @@
"description": "CVE-2023-22515: Confluence Broken Access Control Exploit",
"fork": false,
"created_at": "2023-10-10T21:40:09Z",
"updated_at": "2024-02-04T09:02:24Z",
"updated_at": "2024-02-21T10:52:31Z",
"pushed_at": "2023-10-17T22:04:13Z",
"stargazers_count": 121,
"watchers_count": 121,
"stargazers_count": 122,
"watchers_count": 122,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -94,7 +94,7 @@
],
"visibility": "public",
"forks": 27,
"watchers": 121,
"watchers": 122,
"score": 0,
"subscribers_count": 3
},

View file

@ -556,10 +556,10 @@
"description": "CVE-2023-22527 内存马注入工具",
"fork": false,
"created_at": "2024-02-11T16:46:55Z",
"updated_at": "2024-02-19T16:49:32Z",
"updated_at": "2024-02-21T09:58:01Z",
"pushed_at": "2024-02-21T05:49:59Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -568,7 +568,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 29,
"watchers": 31,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Basic PoC for CVE-2023-27524: Insecure Default Configuration in Apache Superset",
"fork": false,
"created_at": "2023-04-25T04:59:05Z",
"updated_at": "2024-02-04T09:03:08Z",
"updated_at": "2024-02-21T08:47:47Z",
"pushed_at": "2023-09-09T01:20:49Z",
"stargazers_count": 97,
"watchers_count": 97,
"stargazers_count": 98,
"watchers_count": 98,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 97,
"watchers": 98,
"score": 0,
"subscribers_count": 6
},

View file

@ -73,10 +73,10 @@
"description": "Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing",
"fork": false,
"created_at": "2023-06-16T20:15:36Z",
"updated_at": "2024-01-26T11:10:56Z",
"updated_at": "2024-02-21T11:42:27Z",
"pushed_at": "2023-06-20T21:32:56Z",
"stargazers_count": 113,
"watchers_count": 113,
"stargazers_count": 115,
"watchers_count": 115,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 113,
"watchers": 115,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "The remediation script should set the reg entries described in https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36884 . The detection script checks if they exist. Provided AS-IS without any warrenty.",
"fork": false,
"created_at": "2023-07-12T14:13:20Z",
"updated_at": "2023-09-14T15:41:07Z",
"updated_at": "2024-02-21T11:46:05Z",
"pushed_at": "2023-07-21T05:59:06Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 21,
"watchers": 22,
"score": 0,
"subscribers_count": 2
},

View file

@ -262,10 +262,10 @@
"description": "Metabase Pre-auth RCE",
"fork": false,
"created_at": "2023-08-02T13:21:58Z",
"updated_at": "2024-02-12T15:44:42Z",
"updated_at": "2024-02-21T08:18:03Z",
"pushed_at": "2023-08-03T10:07:15Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -285,7 +285,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},

View file

@ -43,12 +43,12 @@
"description": "JumpServer 堡垒机未授权综合漏洞利用, Exploit for CVE-2023-42442 \/ CVE-2023-42820 \/ RCE 2021",
"fork": false,
"created_at": "2023-10-14T09:35:07Z",
"updated_at": "2024-02-21T02:42:15Z",
"updated_at": "2024-02-21T10:10:31Z",
"pushed_at": "2024-02-20T09:03:22Z",
"stargazers_count": 116,
"watchers_count": 116,
"stargazers_count": 117,
"watchers_count": 117,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -57,8 +57,8 @@
"cve-2023-42820"
],
"visibility": "public",
"forks": 8,
"watchers": 116,
"forks": 9,
"watchers": 117,
"score": 0,
"subscribers_count": 1
},

View file

@ -43,10 +43,10 @@
"description": "Apt style exploitation of Chrome 0day CVE-2023-4357",
"fork": false,
"created_at": "2023-11-19T22:20:10Z",
"updated_at": "2024-02-13T21:49:56Z",
"updated_at": "2024-02-21T09:23:35Z",
"pushed_at": "2023-11-20T01:02:44Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 41,
"watchers_count": 41,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 40,
"watchers": 41,
"score": 0,
"subscribers_count": 4
},

View file

@ -43,10 +43,10 @@
"description": "Proof of concept for DoS exploit ",
"fork": false,
"created_at": "2023-10-11T01:59:47Z",
"updated_at": "2024-01-11T06:55:22Z",
"updated_at": "2024-02-21T10:02:16Z",
"pushed_at": "2023-10-13T11:19:10Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -63,7 +63,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 42,
"watchers": 43,
"score": 0,
"subscribers_count": 2
},
@ -282,7 +282,7 @@
"description": "Examples for Implementing cve-2023-44487 ( HTTP\/2 Rapid Reset Attack ) Concept",
"fork": false,
"created_at": "2023-11-10T08:38:51Z",
"updated_at": "2024-02-19T12:27:10Z",
"updated_at": "2024-02-21T07:25:42Z",
"pushed_at": "2023-11-10T08:39:14Z",
"stargazers_count": 6,
"watchers_count": 6,

View file

@ -13,10 +13,10 @@
"description": "Proof-of-concept code for the Android APEX key reuse vulnerability described in https:\/\/rtx.meta.security\/exploitation\/2024\/01\/30\/Android-vendors-APEX-test-keys.html",
"fork": false,
"created_at": "2024-01-26T21:17:38Z",
"updated_at": "2024-02-20T12:21:17Z",
"updated_at": "2024-02-21T07:25:01Z",
"pushed_at": "2024-01-31T19:33:59Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 44,
"watchers": 45,
"score": 0,
"subscribers_count": 5
}

View file

@ -193,10 +193,10 @@
"description": null,
"fork": false,
"created_at": "2023-12-18T23:12:25Z",
"updated_at": "2024-02-10T10:06:56Z",
"updated_at": "2024-02-21T12:01:05Z",
"pushed_at": "2024-01-22T14:29:21Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -205,7 +205,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 34,
"watchers": 35,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,19 +13,19 @@
"description": "KeyTrap (DNSSEC)",
"fork": false,
"created_at": "2024-02-18T21:50:04Z",
"updated_at": "2024-02-21T03:50:22Z",
"updated_at": "2024-02-21T07:32:53Z",
"pushed_at": "2024-02-18T22:15:14Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 17,
"forks": 6,
"watchers": 19,
"score": 0,
"subscribers_count": 1
}

View file

@ -43,19 +43,19 @@
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"fork": false,
"created_at": "2024-02-16T15:17:59Z",
"updated_at": "2024-02-21T06:10:25Z",
"updated_at": "2024-02-21T11:57:23Z",
"pushed_at": "2024-02-19T20:00:35Z",
"stargazers_count": 390,
"watchers_count": 390,
"stargazers_count": 421,
"watchers_count": 421,
"has_discussions": false,
"forks_count": 74,
"forks_count": 84,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 74,
"watchers": 390,
"forks": 84,
"watchers": 421,
"score": 0,
"subscribers_count": 3
},
@ -73,10 +73,10 @@
"description": "Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - CVE-2024-21413 POC",
"fork": false,
"created_at": "2024-02-16T21:10:31Z",
"updated_at": "2024-02-20T02:49:55Z",
"updated_at": "2024-02-21T09:13:54Z",
"pushed_at": "2024-02-16T22:23:37Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -163,10 +163,10 @@
"description": "Container Runtime Meetup #5 のLT用のデモ",
"fork": false,
"created_at": "2024-02-02T11:51:08Z",
"updated_at": "2024-02-02T13:05:24Z",
"updated_at": "2024-02-21T11:29:08Z",
"pushed_at": "2024-02-02T14:33:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-21893: SSRF Vulnerability in Ivanti Connect Secure",
"fork": false,
"created_at": "2024-02-02T22:59:21Z",
"updated_at": "2024-02-19T05:39:48Z",
"updated_at": "2024-02-21T11:48:24Z",
"pushed_at": "2024-02-02T23:27:10Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 70,
"watchers": 71,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-22939",
"fork": false,
"created_at": "2024-01-25T07:00:38Z",
"updated_at": "2024-02-02T21:14:51Z",
"updated_at": "2024-02-21T08:40:49Z",
"pushed_at": "2024-01-25T07:30:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

32
2024/CVE-2024-25249.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 761092536,
"name": "CVE-2024-25249",
"full_name": "intbjw\/CVE-2024-25249",
"owner": {
"login": "intbjw",
"id": 38395031,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38395031?v=4",
"html_url": "https:\/\/github.com\/intbjw"
},
"html_url": "https:\/\/github.com\/intbjw\/CVE-2024-25249",
"description": "An issue in He3 App for macOS version 2.0.17, allows remote attackers to execute arbitrary code via the RunAsNode and enableNodeClilnspectArguments settings.",
"fork": false,
"created_at": "2024-02-21T08:19:00Z",
"updated_at": "2024-02-21T08:19:01Z",
"pushed_at": "2024-02-21T08:50:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -43,10 +43,10 @@
"description": "Nuclei template and information about the POC for CVE-2024-25600",
"fork": false,
"created_at": "2024-02-21T00:27:33Z",
"updated_at": "2024-02-21T00:45:00Z",
"updated_at": "2024-02-21T08:49:30Z",
"pushed_at": "2024-02-21T02:11:08Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}

View file

@ -536,6 +536,9 @@
### CVE-2024-25202
- [Agampreet-Singh/CVE-2024-25202](https://github.com/Agampreet-Singh/CVE-2024-25202)
### CVE-2024-25249
- [intbjw/CVE-2024-25249](https://github.com/intbjw/CVE-2024-25249)
### CVE-2024-25251
- [ASR511-OO7/CVE-2024-25251](https://github.com/ASR511-OO7/CVE-2024-25251)
@ -9180,7 +9183,6 @@
- [qq87234770/CVE-2022-22947](https://github.com/qq87234770/CVE-2022-22947)
- [Zh0um1/CVE-2022-22947](https://github.com/Zh0um1/CVE-2022-22947)
- [Le1a/CVE-2022-22947](https://github.com/Le1a/CVE-2022-22947)
- [charonlight/SpringExploitGUI](https://github.com/charonlight/SpringExploitGUI)
### CVE-2022-22948 (2022-03-29)