Auto Update 2025/01/18 18:32:06

This commit is contained in:
motikan2010-bot 2025-01-19 03:32:06 +09:00
parent b728142901
commit 8e2c60ac9e
27 changed files with 310 additions and 70 deletions

View file

@ -14,7 +14,7 @@
"description": "Python 3 implementation of an existing CVE-2011-3556 proof of concept (PoC).",
"fork": false,
"created_at": "2019-01-29T20:22:09Z",
"updated_at": "2022-07-23T10:25:47Z",
"updated_at": "2025-01-18T17:13:35Z",
"pushed_at": "2019-01-29T20:26:24Z",
"stargazers_count": 1,
"watchers_count": 1,

View file

@ -182,7 +182,7 @@
"fork": false,
"created_at": "2024-11-14T04:35:59Z",
"updated_at": "2025-01-05T15:26:10Z",
"pushed_at": "2025-01-18T07:52:14Z",
"pushed_at": "2025-01-18T15:32:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)",
"fork": false,
"created_at": "2018-01-16T00:23:34Z",
"updated_at": "2024-10-31T14:02:51Z",
"updated_at": "2025-01-18T13:50:18Z",
"pushed_at": "2020-12-22T03:10:47Z",
"stargazers_count": 165,
"watchers_count": 165,
"stargazers_count": 166,
"watchers_count": 166,
"has_discussions": false,
"forks_count": 48,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 48,
"watchers": 165,
"watchers": 166,
"score": 0,
"subscribers_count": 8
},

View file

@ -1243,10 +1243,10 @@
"description": "该资源为CVE-2020-0796漏洞复现包括Python版本和C++版本。主要是集合了github大神们的资源希望您喜欢~",
"fork": false,
"created_at": "2020-04-02T12:12:03Z",
"updated_at": "2024-08-12T19:59:37Z",
"updated_at": "2025-01-18T17:41:59Z",
"pushed_at": "2020-08-28T09:21:00Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -1255,7 +1255,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 32,
"watchers": 33,
"score": 0,
"subscribers_count": 4
},

View file

@ -45,7 +45,7 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2025-01-17T08:04:47Z",
"updated_at": "2025-01-18T16:55:16Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1857,
"watchers_count": 1857,

View file

@ -848,10 +848,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2025-01-17T07:55:13Z",
"updated_at": "2025-01-18T16:01:21Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1368,
"watchers_count": 1368,
"stargazers_count": 1369,
"watchers_count": 1369,
"has_discussions": false,
"forks_count": 167,
"allow_forking": true,
@ -867,7 +867,7 @@
],
"visibility": "public",
"forks": 167,
"watchers": 1368,
"watchers": 1369,
"score": 0,
"subscribers_count": 15
}

View file

@ -50,10 +50,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2025-01-16T19:49:37Z",
"updated_at": "2025-01-18T17:09:19Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 826,
"watchers_count": 826,
"stargazers_count": 827,
"watchers_count": 827,
"has_discussions": false,
"forks_count": 125,
"allow_forking": true,
@ -62,7 +62,7 @@
"topics": [],
"visibility": "public",
"forks": 125,
"watchers": 826,
"watchers": 827,
"score": 0,
"subscribers_count": 13
},

View file

@ -792,10 +792,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2025-01-17T07:55:13Z",
"updated_at": "2025-01-18T16:01:21Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1368,
"watchers_count": 1368,
"stargazers_count": 1369,
"watchers_count": 1369,
"has_discussions": false,
"forks_count": 167,
"allow_forking": true,
@ -811,7 +811,7 @@
],
"visibility": "public",
"forks": 167,
"watchers": 1368,
"watchers": 1369,
"score": 0,
"subscribers_count": 15
}

View file

@ -743,10 +743,10 @@
"description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group",
"fork": false,
"created_at": "2025-01-16T06:54:15Z",
"updated_at": "2025-01-18T12:02:37Z",
"updated_at": "2025-01-18T13:33:44Z",
"pushed_at": "2025-01-16T09:56:36Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -755,7 +755,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 46,
"watchers": 47,
"score": 0,
"subscribers_count": 5
},
@ -789,5 +789,40 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 918683582,
"name": "fortigate-belsen-leak",
"full_name": "AKboss1221\/fortigate-belsen-leak",
"owner": {
"login": "AKboss1221",
"id": 58637001,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58637001?v=4",
"html_url": "https:\/\/github.com\/AKboss1221",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/AKboss1221\/fortigate-belsen-leak",
"description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group",
"fork": false,
"created_at": "2025-01-18T15:32:21Z",
"updated_at": "2025-01-18T18:19:26Z",
"pushed_at": "2025-01-18T18:19:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"belsen",
"fortigate",
"leak"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -76,10 +76,10 @@
"description": "GameOver(lay) Ubuntu Privilege Escalation",
"fork": false,
"created_at": "2023-10-09T22:02:42Z",
"updated_at": "2025-01-16T15:20:27Z",
"updated_at": "2025-01-18T15:28:50Z",
"pushed_at": "2023-10-09T22:44:21Z",
"stargazers_count": 121,
"watchers_count": 121,
"stargazers_count": 122,
"watchers_count": 122,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 121,
"watchers": 122,
"score": 0,
"subscribers_count": 1
},

View file

@ -1,4 +1,35 @@
[
{
"id": 721727666,
"name": "ivanti-cve-2023-35080-privilege-escalation-bof",
"full_name": "tijme\/ivanti-cve-2023-35080-privilege-escalation-bof",
"owner": {
"login": "tijme",
"id": 5873573,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5873573?v=4",
"html_url": "https:\/\/github.com\/tijme",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tijme\/ivanti-cve-2023-35080-privilege-escalation-bof",
"description": "Ivanti Secure Access (previously Pulse Secure) privilege escalation Cobalt Strike BOF (CVE-2023-35080).",
"fork": false,
"created_at": "2023-11-21T16:46:35Z",
"updated_at": "2025-01-18T16:37:10Z",
"pushed_at": "2023-12-05T09:17:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 755572375,
"name": "Ivanti-Pulse_VPN-Client_Exploit-CVE-2023-35080_Privilege-escalation",

View file

@ -14,10 +14,10 @@
"description": "Proof-of-Concept for CVE-2023-38146 (\"ThemeBleed\")",
"fork": false,
"created_at": "2023-09-13T04:00:14Z",
"updated_at": "2024-12-30T13:28:54Z",
"updated_at": "2025-01-18T14:23:48Z",
"pushed_at": "2023-09-13T04:50:29Z",
"stargazers_count": 191,
"watchers_count": 191,
"stargazers_count": 192,
"watchers_count": 192,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 37,
"watchers": 191,
"watchers": 192,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,19 +14,19 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2025-01-18T10:47:32Z",
"updated_at": "2025-01-18T14:53:33Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1392,
"watchers_count": 1392,
"stargazers_count": 1393,
"watchers_count": 1393,
"has_discussions": false,
"forks_count": 238,
"forks_count": 239,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 238,
"watchers": 1392,
"forks": 239,
"watchers": 1393,
"score": 0,
"subscribers_count": 21
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-13375 Unverified Password Change",
"fork": false,
"created_at": "2025-01-18T10:35:47Z",
"updated_at": "2025-01-18T10:50:25Z",
"updated_at": "2025-01-18T14:00:19Z",
"pushed_at": "2025-01-18T10:48:52Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 0
}

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-08-14T16:20:38Z",
"updated_at": "2025-01-17T02:40:27Z",
"updated_at": "2025-01-18T14:52:01Z",
"pushed_at": "2024-09-05T23:21:00Z",
"stargazers_count": 115,
"watchers_count": 115,
"stargazers_count": 116,
"watchers_count": 116,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 115,
"watchers": 116,
"score": 0,
"subscribers_count": 3
}

View file

@ -952,10 +952,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2025-01-18T11:28:51Z",
"updated_at": "2025-01-18T17:54:18Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3505,
"watchers_count": 3505,
"stargazers_count": 3506,
"watchers_count": 3506,
"has_discussions": false,
"forks_count": 239,
"allow_forking": true,
@ -964,7 +964,7 @@
"topics": [],
"visibility": "public",
"forks": 239,
"watchers": 3505,
"watchers": 3506,
"score": 0,
"subscribers_count": 38
},

View file

@ -362,10 +362,10 @@
"description": "geoserver图形化漏洞利用工具",
"fork": false,
"created_at": "2024-10-05T10:08:55Z",
"updated_at": "2025-01-11T10:30:26Z",
"updated_at": "2025-01-18T13:03:26Z",
"pushed_at": "2024-10-08T03:16:26Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -374,7 +374,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 33,
"watchers": 34,
"score": 0,
"subscribers_count": 1
},

View file

@ -29,5 +29,36 @@
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 918629965,
"name": "CVE-2024-38821-POC",
"full_name": "masa42\/CVE-2024-38821-POC",
"owner": {
"login": "masa42",
"id": 46730934,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46730934?v=4",
"html_url": "https:\/\/github.com\/masa42",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/masa42\/CVE-2024-38821-POC",
"description": null,
"fork": false,
"created_at": "2025-01-18T12:52:34Z",
"updated_at": "2025-01-18T13:41:07Z",
"pushed_at": "2025-01-18T13:38:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-11-26T12:39:44Z",
"updated_at": "2025-01-18T11:54:10Z",
"updated_at": "2025-01-18T17:26:14Z",
"pushed_at": "2025-01-16T09:48:07Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 41,
"watchers_count": 41,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 40,
"watchers": 41,
"score": 0,
"subscribers_count": 0
},

View file

@ -11,10 +11,10 @@
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MarioTesoro\/CVE-2024-46542",
"description": null,
"description": "Veritas SQL injection",
"fork": false,
"created_at": "2024-12-30T08:58:05Z",
"updated_at": "2024-12-31T12:17:30Z",
"updated_at": "2025-01-18T13:26:56Z",
"pushed_at": "2024-12-31T12:17:07Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -14,7 +14,7 @@
"description": "Cleo Unrestricted file upload and download PoC (CVE-2024-50623)",
"fork": false,
"created_at": "2024-12-11T14:19:55Z",
"updated_at": "2025-01-08T08:14:00Z",
"updated_at": "2025-01-18T16:57:20Z",
"pushed_at": "2024-12-11T14:23:19Z",
"stargazers_count": 20,
"watchers_count": 20,

33
2024/CVE-2024-54792.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 918644304,
"name": "CVE-2024-54792",
"full_name": "MarioTesoro\/CVE-2024-54792",
"owner": {
"login": "MarioTesoro",
"id": 62204045,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62204045?v=4",
"html_url": "https:\/\/github.com\/MarioTesoro",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MarioTesoro\/CVE-2024-54792",
"description": "SpagoBI csrf",
"fork": false,
"created_at": "2025-01-18T13:37:57Z",
"updated_at": "2025-01-18T14:13:20Z",
"pushed_at": "2025-01-18T14:12:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

33
2024/CVE-2024-54794.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 918594190,
"name": "CVE-2024-54794",
"full_name": "MarioTesoro\/CVE-2024-54794",
"owner": {
"login": "MarioTesoro",
"id": 62204045,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62204045?v=4",
"html_url": "https:\/\/github.com\/MarioTesoro",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MarioTesoro\/CVE-2024-54794",
"description": "SpagoBI command injection",
"fork": false,
"created_at": "2025-01-18T10:50:21Z",
"updated_at": "2025-01-18T14:29:26Z",
"pushed_at": "2025-01-18T14:29:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

33
2024/CVE-2024-54795.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 918657905,
"name": "CVE-2024-54795",
"full_name": "MarioTesoro\/CVE-2024-54795",
"owner": {
"login": "MarioTesoro",
"id": 62204045,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62204045?v=4",
"html_url": "https:\/\/github.com\/MarioTesoro",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MarioTesoro\/CVE-2024-54795",
"description": "SpagoBI multiple stored xss",
"fork": false,
"created_at": "2025-01-18T14:17:03Z",
"updated_at": "2025-01-18T14:31:55Z",
"pushed_at": "2025-01-18T14:31:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -29,5 +29,36 @@
"watchers": 40,
"score": 0,
"subscribers_count": 1
},
{
"id": 918678336,
"name": "fortios-auth-bypass-check-CVE-2024-55591",
"full_name": "souzatyler\/fortios-auth-bypass-check-CVE-2024-55591",
"owner": {
"login": "souzatyler",
"id": 171995105,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/171995105?v=4",
"html_url": "https:\/\/github.com\/souzatyler",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/souzatyler\/fortios-auth-bypass-check-CVE-2024-55591",
"description": "Checks for authentication bypass vulnerability inFortinet's FortiOS, potentially exploited by remote attackers.",
"fork": false,
"created_at": "2025-01-18T15:17:07Z",
"updated_at": "2025-01-18T18:19:28Z",
"pushed_at": "2025-01-18T18:19:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.",
"fork": false,
"created_at": "2025-01-11T02:06:51Z",
"updated_at": "2025-01-17T15:52:15Z",
"updated_at": "2025-01-18T16:06:24Z",
"pushed_at": "2025-01-11T23:54:06Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 30,
"watchers": 31,
"score": 0,
"subscribers_count": 0
},
@ -107,8 +107,8 @@
"description": "Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)",
"fork": false,
"created_at": "2025-01-15T18:27:12Z",
"updated_at": "2025-01-17T21:52:43Z",
"pushed_at": "2025-01-16T15:44:15Z",
"updated_at": "2025-01-18T16:59:09Z",
"pushed_at": "2025-01-18T16:59:07Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,

View file

@ -6160,6 +6160,7 @@
</code>
- [mouadk/cve-2024-38821](https://github.com/mouadk/cve-2024-38821)
- [masa42/CVE-2024-38821-POC](https://github.com/masa42/CVE-2024-38821-POC)
### CVE-2024-38856 (2024-08-05)
@ -8293,6 +8294,15 @@
- [nscan9/CVE-2024-54761-BigAnt-Office-Messenger-5.6.06-RCE-via-SQL-Injection](https://github.com/nscan9/CVE-2024-54761-BigAnt-Office-Messenger-5.6.06-RCE-via-SQL-Injection)
### CVE-2024-54792
- [MarioTesoro/CVE-2024-54792](https://github.com/MarioTesoro/CVE-2024-54792)
### CVE-2024-54794
- [MarioTesoro/CVE-2024-54794](https://github.com/MarioTesoro/CVE-2024-54794)
### CVE-2024-54795
- [MarioTesoro/CVE-2024-54795](https://github.com/MarioTesoro/CVE-2024-54795)
### CVE-2024-54819 (2025-01-07)
<code>I, Librarian before and including 5.11.1 is vulnerable to Server-Side Request Forgery (SSRF) due to improper input validation in classes/security/validation.php
@ -8344,6 +8354,7 @@
</code>
- [watchtowrlabs/fortios-auth-bypass-check-CVE-2024-55591](https://github.com/watchtowrlabs/fortios-auth-bypass-check-CVE-2024-55591)
- [souzatyler/fortios-auth-bypass-check-CVE-2024-55591](https://github.com/souzatyler/fortios-auth-bypass-check-CVE-2024-55591)
### CVE-2024-55875 (2024-12-12)
@ -13390,6 +13401,7 @@
<code>A vulnerability has been identified in the Ivanti Secure Access Windows client, which could allow a locally authenticated attacker to exploit a vulnerable configuration, potentially leading to various security risks, including the escalation of privileges, denial of service, or information disclosure.
</code>
- [tijme/ivanti-cve-2023-35080-privilege-escalation-bof](https://github.com/tijme/ivanti-cve-2023-35080-privilege-escalation-bof)
- [HopHouse/Ivanti-Pulse_VPN-Client_Exploit-CVE-2023-35080_Privilege-escalation](https://github.com/HopHouse/Ivanti-Pulse_VPN-Client_Exploit-CVE-2023-35080_Privilege-escalation)
### CVE-2023-35082 (2023-08-15)
@ -22577,6 +22589,7 @@
- [Anthony1500/CVE-2022-40684](https://github.com/Anthony1500/CVE-2022-40684)
- [arsolutioner/fortigate-belsen-leak](https://github.com/arsolutioner/fortigate-belsen-leak)
- [Rofell0s/Fortigate-Leak-CVE-2022-40684](https://github.com/Rofell0s/Fortigate-Leak-CVE-2022-40684)
- [AKboss1221/fortigate-belsen-leak](https://github.com/AKboss1221/fortigate-belsen-leak)
### CVE-2022-40687 (2022-11-18)