Auto Update 2024/02/14 18:26:24

This commit is contained in:
motikan2010-bot 2024-02-15 03:26:24 +09:00
parent 45698b083f
commit 951f0fb641
31 changed files with 231 additions and 126 deletions

View file

@ -48,13 +48,13 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 0

View file

@ -13,10 +13,10 @@
"description": "Motorola Untethered Jailbreak: Exploiting CVE-2016-10277 for Secure Boot and Device Locking bypass ",
"fork": false,
"created_at": "2017-06-06T12:00:27Z",
"updated_at": "2024-02-06T16:48:26Z",
"updated_at": "2024-02-14T16:52:45Z",
"pushed_at": "2017-08-30T15:17:08Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 66,
"watchers_count": 66,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 65,
"watchers": 66,
"score": 0,
"subscribers_count": 18
},

View file

@ -216,6 +216,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -44,17 +44,17 @@
"fork": false,
"created_at": "2017-05-06T15:35:42Z",
"updated_at": "2024-01-16T16:25:35Z",
"pushed_at": "2020-01-03T21:50:36Z",
"pushed_at": "2024-02-14T16:18:07Z",
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"forks": 6,
"watchers": 16,
"score": 0,
"subscribers_count": 2

View file

@ -103,10 +103,10 @@
"description": "CVE-2019-0232-Remote Code Execution on Apache Tomcat 7.0.42",
"fork": false,
"created_at": "2019-11-21T14:25:39Z",
"updated_at": "2024-02-14T08:10:20Z",
"updated_at": "2024-02-14T17:25:57Z",
"pushed_at": "2019-11-21T15:03:15Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 15,
"watchers": 16,
"score": 0,
"subscribers_count": 1
},

View file

@ -43,10 +43,10 @@
"description": "Nexus Repository Manager 3 Remote Code Execution without authentication < 3.15.0",
"fork": false,
"created_at": "2019-05-21T13:16:02Z",
"updated_at": "2023-12-15T12:10:29Z",
"updated_at": "2024-02-14T14:05:19Z",
"pushed_at": "2019-08-19T17:33:56Z",
"stargazers_count": 78,
"watchers_count": 78,
"stargazers_count": 79,
"watchers_count": 79,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 78,
"watchers": 79,
"score": 0,
"subscribers_count": 2
},

View file

@ -48,7 +48,7 @@
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -62,7 +62,7 @@
"remote-code-execution"
],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 15,
"score": 0,
"subscribers_count": 1

View file

@ -43,10 +43,10 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2024-02-12T05:45:33Z",
"updated_at": "2024-02-14T12:28:54Z",
"pushed_at": "2023-07-20T10:51:42Z",
"stargazers_count": 1671,
"watchers_count": 1671,
"stargazers_count": 1672,
"watchers_count": 1672,
"has_discussions": false,
"forks_count": 366,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 366,
"watchers": 1671,
"watchers": 1672,
"score": 0,
"subscribers_count": 87
},

View file

@ -148,10 +148,10 @@
"description": "An extended proof-of-concept for the CVE-2021-21551 Dell dbutil_2_3.sys Kernel Exploit",
"fork": false,
"created_at": "2021-06-02T05:13:07Z",
"updated_at": "2024-01-12T16:39:42Z",
"updated_at": "2024-02-14T18:13:50Z",
"pushed_at": "2021-07-20T03:03:30Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -160,7 +160,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 1
},

View file

@ -286,10 +286,10 @@
"description": "exiftool exploit",
"fork": false,
"created_at": "2022-02-21T11:07:19Z",
"updated_at": "2023-09-24T01:56:21Z",
"updated_at": "2024-02-14T16:29:37Z",
"pushed_at": "2022-02-21T12:20:15Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -298,7 +298,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},
@ -316,10 +316,10 @@
"description": "Exploit for CVE-2021-22204 (ExifTool) - Arbitrary Code Execution",
"fork": false,
"created_at": "2022-04-16T22:49:47Z",
"updated_at": "2024-01-21T04:44:11Z",
"updated_at": "2024-02-14T16:19:17Z",
"pushed_at": "2022-06-07T23:09:29Z",
"stargazers_count": 26,
"watchers_count": 26,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": true,
"forks_count": 3,
"allow_forking": true,
@ -341,7 +341,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 26,
"watchers": 27,
"score": 0,
"subscribers_count": 0
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-40346 PoC (HAProxy HTTP Smuggling)",
"fork": false,
"created_at": "2021-09-08T22:26:19Z",
"updated_at": "2023-12-05T14:42:05Z",
"updated_at": "2024-02-14T15:04:41Z",
"pushed_at": "2021-09-08T22:37:15Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 36,
"watchers": 37,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": "A demo exploit for CVE-2021-44026, a SQL injection in Roundcube",
"fork": false,
"created_at": "2023-11-14T11:32:36Z",
"updated_at": "2024-01-06T15:13:10Z",
"updated_at": "2024-02-14T17:51:21Z",
"pushed_at": "2023-12-22T11:29:43Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Proof of Concept Exploit for ManageEngine ServiceDesk Plus CVE-2021-44077",
"fork": false,
"created_at": "2021-12-08T20:24:38Z",
"updated_at": "2023-12-21T06:40:08Z",
"updated_at": "2024-02-14T17:51:54Z",
"pushed_at": "2021-12-08T21:43:16Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 28,
"watchers": 29,
"score": 0,
"subscribers_count": 4
},

View file

@ -907,7 +907,7 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2024-02-14T03:43:29Z",
"updated_at": "2024-02-14T15:19:54Z",
"pushed_at": "2024-02-12T22:37:25Z",
"stargazers_count": 1706,
"watchers_count": 1706,

View file

@ -692,36 +692,6 @@
"score": 0,
"subscribers_count": 1
},
{
"id": 502734227,
"name": "CVE-2022-22954",
"full_name": "1SeaMy\/CVE-2022-22954",
"owner": {
"login": "1SeaMy",
"id": 92841021,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92841021?v=4",
"html_url": "https:\/\/github.com\/1SeaMy"
},
"html_url": "https:\/\/github.com\/1SeaMy\/CVE-2022-22954",
"description": "I'm trying",
"fork": false,
"created_at": "2022-06-12T21:41:38Z",
"updated_at": "2024-02-12T20:12:09Z",
"pushed_at": "2022-06-12T21:49:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 524471767,
"name": "CVE-2022-22954",

View file

@ -518,10 +518,10 @@
"description": "Confluence Pre-Auth Remote Code Execution via OGNL Injection (CVE-2022-26134)",
"fork": false,
"created_at": "2022-06-06T02:43:06Z",
"updated_at": "2024-01-11T14:51:06Z",
"updated_at": "2024-02-14T18:21:41Z",
"pushed_at": "2022-06-06T03:37:25Z",
"stargazers_count": 35,
"watchers_count": 35,
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -530,7 +530,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 35,
"watchers": 36,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Tp-Link Archer AX50 Authenticated RCE (CVE-2022-30075)",
"fork": false,
"created_at": "2022-06-07T23:26:47Z",
"updated_at": "2024-02-08T08:12:36Z",
"updated_at": "2024-02-14T13:02:18Z",
"pushed_at": "2022-11-20T03:03:53Z",
"stargazers_count": 203,
"watchers_count": 203,
"stargazers_count": 204,
"watchers_count": 204,
"has_discussions": false,
"forks_count": 49,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 49,
"watchers": 203,
"watchers": 204,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
"updated_at": "2024-02-13T19:40:31Z",
"pushed_at": "2024-02-14T12:09:43Z",
"pushed_at": "2024-02-14T14:46:41Z",
"stargazers_count": 166,
"watchers_count": 166,
"has_discussions": true,

View file

@ -13,10 +13,10 @@
"description": "Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.",
"fork": false,
"created_at": "2023-07-13T13:17:20Z",
"updated_at": "2024-02-13T16:13:18Z",
"updated_at": "2024-02-14T17:38:27Z",
"pushed_at": "2024-02-11T03:01:51Z",
"stargazers_count": 56,
"watchers_count": 56,
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 56,
"watchers": 57,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-03-11T15:04:51Z",
"updated_at": "2024-01-14T17:54:12Z",
"updated_at": "2024-02-14T15:13:16Z",
"pushed_at": "2024-01-09T21:11:58Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -47,10 +47,10 @@
"description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.",
"fork": false,
"created_at": "2023-05-22T03:06:31Z",
"updated_at": "2024-02-10T23:38:55Z",
"updated_at": "2024-02-14T16:10:31Z",
"pushed_at": "2023-09-10T10:44:32Z",
"stargazers_count": 240,
"watchers_count": 240,
"stargazers_count": 241,
"watchers_count": 241,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -67,7 +67,7 @@
],
"visibility": "public",
"forks": 35,
"watchers": 240,
"watchers": 241,
"score": 0,
"subscribers_count": 4
},

View file

@ -58,5 +58,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 757418361,
"name": "CVE-2023-30547",
"full_name": "Cur1iosity\/CVE-2023-30547",
"owner": {
"login": "Cur1iosity",
"id": 22967390,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22967390?v=4",
"html_url": "https:\/\/github.com\/Cur1iosity"
},
"html_url": "https:\/\/github.com\/Cur1iosity\/CVE-2023-30547",
"description": "Tool for exploring CVE-2023-30547",
"fork": false,
"created_at": "2024-02-14T13:05:57Z",
"updated_at": "2024-02-14T13:25:25Z",
"pushed_at": "2024-02-14T13:25:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -443,5 +443,35 @@
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 757410546,
"name": "CVE-2023-36845-Juniper-Vulnerability",
"full_name": "0xNehru\/CVE-2023-36845-Juniper-Vulnerability",
"owner": {
"login": "0xNehru",
"id": 160024662,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/160024662?v=4",
"html_url": "https:\/\/github.com\/0xNehru"
},
"html_url": "https:\/\/github.com\/0xNehru\/CVE-2023-36845-Juniper-Vulnerability",
"description": "This Python script automates the Proof of Concept (PoC) for CVE-2023-36845, a vulnerability impacting Juniper Networks Junos OS on EX and SRX Series devices. The vulnerability resides in the J-Web component, allowing remote manipulation of the PHPRC variable, potentially leading to code injection.",
"fork": false,
"created_at": "2024-02-14T12:47:21Z",
"updated_at": "2024-02-14T14:51:34Z",
"pushed_at": "2024-02-14T14:07:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2023/CVE-2023-47464.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 757485554,
"name": "CVE-2023-47464",
"full_name": "HadessCS\/CVE-2023-47464",
"owner": {
"login": "HadessCS",
"id": 102136070,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102136070?v=4",
"html_url": "https:\/\/github.com\/HadessCS"
},
"html_url": "https:\/\/github.com\/HadessCS\/CVE-2023-47464",
"description": "CVE-2023-47464 POC",
"fork": false,
"created_at": "2024-02-14T15:39:34Z",
"updated_at": "2024-02-14T15:40:38Z",
"pushed_at": "2024-02-14T15:43:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -43,10 +43,10 @@
"description": "PoC for CVE-2023-4911",
"fork": false,
"created_at": "2023-10-04T14:12:16Z",
"updated_at": "2024-02-09T14:12:36Z",
"updated_at": "2024-02-14T15:46:11Z",
"pushed_at": "2023-10-04T14:16:36Z",
"stargazers_count": 369,
"watchers_count": 369,
"stargazers_count": 370,
"watchers_count": 370,
"has_discussions": false,
"forks_count": 60,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 60,
"watchers": 369,
"watchers": 370,
"score": 0,
"subscribers_count": 5
},
@ -73,10 +73,10 @@
"description": "CVE-2023-4911 proof of concept",
"fork": false,
"created_at": "2023-10-04T14:32:49Z",
"updated_at": "2024-02-06T10:48:33Z",
"updated_at": "2024-02-14T13:11:24Z",
"pushed_at": "2023-10-08T23:24:24Z",
"stargazers_count": 159,
"watchers_count": 159,
"stargazers_count": 160,
"watchers_count": 160,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 159,
"watchers": 160,
"score": 0,
"subscribers_count": 3
},

View file

@ -73,10 +73,10 @@
"description": null,
"fork": false,
"created_at": "2024-02-02T02:51:29Z",
"updated_at": "2024-02-04T09:05:55Z",
"updated_at": "2024-02-14T17:19:25Z",
"pushed_at": "2024-02-02T09:49:34Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 11,
"watchers": 12,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-21893: SSRF Vulnerability in Ivanti Connect Secure",
"fork": false,
"created_at": "2024-02-02T22:59:21Z",
"updated_at": "2024-02-14T09:27:57Z",
"updated_at": "2024-02-14T15:23:11Z",
"pushed_at": "2024-02-02T23:27:10Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 62,
"watchers_count": 62,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 61,
"watchers": 62,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure",
"fork": false,
"created_at": "2024-02-09T14:31:56Z",
"updated_at": "2024-02-13T09:16:06Z",
"updated_at": "2024-02-14T15:39:08Z",
"pushed_at": "2024-02-09T15:14:03Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 17,
"watchers": 18,
"score": 0,
"subscribers_count": 2
},

View file

@ -215,14 +215,14 @@
{
"id": 749060845,
"name": "PoC-Fix-jenkins-rce_CVE-2024-23897",
"full_name": "iota4\/PoC-Fix-jenkins-rce_CVE-2024-23897",
"full_name": "10T4\/PoC-Fix-jenkins-rce_CVE-2024-23897",
"owner": {
"login": "iota4",
"login": "10T4",
"id": 148342080,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148342080?v=4",
"html_url": "https:\/\/github.com\/iota4"
"html_url": "https:\/\/github.com\/10T4"
},
"html_url": "https:\/\/github.com\/iota4\/PoC-Fix-jenkins-rce_CVE-2024-23897",
"html_url": "https:\/\/github.com\/10T4\/PoC-Fix-jenkins-rce_CVE-2024-23897",
"description": "on this git you can find all information on the CVE-2024-23897",
"fork": false,
"created_at": "2024-01-27T13:27:57Z",

32
2024/CVE-2024-24386.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 755087413,
"name": "CVE-2024-24386",
"full_name": "erick-duarte\/CVE-2024-24386",
"owner": {
"login": "erick-duarte",
"id": 59427098,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59427098?v=4",
"html_url": "https:\/\/github.com\/erick-duarte"
},
"html_url": "https:\/\/github.com\/erick-duarte\/CVE-2024-24386",
"description": null,
"fork": false,
"created_at": "2024-02-09T12:22:08Z",
"updated_at": "2024-02-14T13:50:39Z",
"pushed_at": "2024-02-14T13:42:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -323,7 +323,7 @@
- [vmtyan/poc-cve-2024-23897](https://github.com/vmtyan/poc-cve-2024-23897)
- [yoryio/CVE-2024-23897](https://github.com/yoryio/CVE-2024-23897)
- [CKevens/CVE-2024-23897](https://github.com/CKevens/CVE-2024-23897)
- [iota4/PoC-Fix-jenkins-rce_CVE-2024-23897](https://github.com/iota4/PoC-Fix-jenkins-rce_CVE-2024-23897)
- [10T4/PoC-Fix-jenkins-rce_CVE-2024-23897](https://github.com/10T4/PoC-Fix-jenkins-rce_CVE-2024-23897)
- [wjlin0/CVE-2024-23897](https://github.com/wjlin0/CVE-2024-23897)
- [Vozec/CVE-2024-23897](https://github.com/Vozec/CVE-2024-23897)
- [raheel0x01/CVE-2024-23897](https://github.com/raheel0x01/CVE-2024-23897)
@ -411,6 +411,9 @@
- [nitipoom-jar/CVE-2024-24337](https://github.com/nitipoom-jar/CVE-2024-24337)
### CVE-2024-24386
- [erick-duarte/CVE-2024-24386](https://github.com/erick-duarte/CVE-2024-24386)
### CVE-2024-24396 (2024-02-05)
<code>Cross Site Scripting vulnerability in Stimulsoft GmbH Stimulsoft Dashboard.JS before v.2024.1.2 allows a remote attacker to execute arbitrary code via a crafted payload to the search bar component.
@ -3492,6 +3495,7 @@
- [rvizx/CVE-2023-30547](https://github.com/rvizx/CVE-2023-30547)
- [user0x1337/CVE-2023-30547](https://github.com/user0x1337/CVE-2023-30547)
- [Cur1iosity/CVE-2023-30547](https://github.com/Cur1iosity/CVE-2023-30547)
### CVE-2023-30765 (2023-07-10)
@ -4770,6 +4774,7 @@
- [CharonDefalt/Juniper-exploit-CVE-2023-36845](https://github.com/CharonDefalt/Juniper-exploit-CVE-2023-36845)
- [iveresk/CVE-2023-36845-6-](https://github.com/iveresk/CVE-2023-36845-6-)
- [ak1t4/CVE-2023-36845](https://github.com/ak1t4/CVE-2023-36845)
- [0xNehru/CVE-2023-36845-Juniper-Vulnerability](https://github.com/0xNehru/CVE-2023-36845-Juniper-Vulnerability)
### CVE-2023-36846 (2023-08-17)
@ -6659,6 +6664,13 @@
- [aleksey-vi/CVE-2023-47460](https://github.com/aleksey-vi/CVE-2023-47460)
### CVE-2023-47464 (2023-11-29)
<code>Insecure Permissions vulnerability in GL.iNet AX1800 version 4.0.0 before 4.5.0 allows a remote attacker to execute arbitrary code via the upload API function.
</code>
- [HadessCS/CVE-2023-47464](https://github.com/HadessCS/CVE-2023-47464)
### CVE-2023-47488 (2023-11-09)
<code>Cross Site Scripting vulnerability in Combodo iTop v.3.1.0-2-11973 allows a local attacker to obtain sensitive information via a crafted script to the attrib_manager_id parameter in the General Information page and the id parameter in the contact page.
@ -9009,7 +9021,6 @@
- [orwagodfather/CVE-2022-22954](https://github.com/orwagodfather/CVE-2022-22954)
- [b4dboy17/CVE-2022-22954](https://github.com/b4dboy17/CVE-2022-22954)
- [arzuozkan/CVE-2022-22954](https://github.com/arzuozkan/CVE-2022-22954)
- [1SeaMy/CVE-2022-22954](https://github.com/1SeaMy/CVE-2022-22954)
- [amit-pathak009/CVE-2022-22954](https://github.com/amit-pathak009/CVE-2022-22954)
- [amit-pathak009/CVE-2022-22954-PoC](https://github.com/amit-pathak009/CVE-2022-22954-PoC)
- [Schira4396/VcenterKiller](https://github.com/Schira4396/VcenterKiller)