Auto Update 2024/02/25 12:26:13

This commit is contained in:
motikan2010-bot 2024-02-25 21:26:14 +09:00
parent 0fef6100e7
commit bf2a63d901
54 changed files with 952 additions and 108 deletions

View file

@ -13,10 +13,10 @@
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)",
"fork": false,
"created_at": "2021-08-31T09:51:12Z",
"updated_at": "2024-02-22T21:46:05Z",
"updated_at": "2024-02-25T07:49:30Z",
"pushed_at": "2023-12-27T23:45:17Z",
"stargazers_count": 166,
"watchers_count": 166,
"stargazers_count": 167,
"watchers_count": 167,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 22,
"watchers": 166,
"watchers": 167,
"score": 0,
"subscribers_count": 8
}

View file

@ -13,10 +13,10 @@
"description": "Exploit code for CVE-2018-9411 for MediaCasService",
"fork": false,
"created_at": "2018-10-30T18:48:20Z",
"updated_at": "2024-02-18T08:14:49Z",
"updated_at": "2024-02-25T10:49:47Z",
"pushed_at": "2018-10-30T21:51:16Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 52,
"watchers_count": 52,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 51,
"watchers": 52,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": " double-free bug in WhatsApp exploit poc",
"fork": false,
"created_at": "2019-10-03T09:26:24Z",
"updated_at": "2024-01-04T15:51:55Z",
"updated_at": "2024-02-25T10:45:24Z",
"pushed_at": "2021-03-19T17:23:25Z",
"stargazers_count": 263,
"watchers_count": 263,
"stargazers_count": 264,
"watchers_count": 264,
"has_discussions": false,
"forks_count": 82,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 82,
"watchers": 263,
"watchers": 264,
"score": 0,
"subscribers_count": 16
},

View file

@ -48,7 +48,7 @@
"stargazers_count": 3988,
"watchers_count": 3988,
"has_discussions": false,
"forks_count": 1094,
"forks_count": 1079,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -74,7 +74,7 @@
"webshell"
],
"visibility": "public",
"forks": 1094,
"forks": 1079,
"watchers": 3988,
"score": 0,
"subscribers_count": 153

View file

@ -13,10 +13,10 @@
"description": "Root your MediaTek device with CVE-2020-0069",
"fork": false,
"created_at": "2019-09-06T12:12:48Z",
"updated_at": "2024-01-06T11:36:40Z",
"updated_at": "2024-02-25T10:38:44Z",
"pushed_at": "2023-02-06T19:18:56Z",
"stargazers_count": 130,
"watchers_count": 130,
"stargazers_count": 131,
"watchers_count": 131,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 24,
"watchers": 130,
"watchers": 131,
"score": 0,
"subscribers_count": 10
},
@ -108,10 +108,10 @@
"description": null,
"fork": false,
"created_at": "2020-03-24T13:10:39Z",
"updated_at": "2023-10-18T16:06:48Z",
"updated_at": "2024-02-25T10:42:32Z",
"pushed_at": "2020-03-24T13:19:34Z",
"stargazers_count": 98,
"watchers_count": 98,
"stargazers_count": 99,
"watchers_count": 99,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -124,7 +124,7 @@
],
"visibility": "public",
"forks": 28,
"watchers": 98,
"watchers": 99,
"score": 0,
"subscribers_count": 10
},

View file

@ -13,10 +13,10 @@
"description": "Double-Free BUG in WhatsApp exploit poc.",
"fork": false,
"created_at": "2020-05-10T15:25:59Z",
"updated_at": "2023-11-18T09:59:33Z",
"updated_at": "2024-02-25T10:41:01Z",
"pushed_at": "2020-05-10T15:32:54Z",
"stargazers_count": 89,
"watchers_count": 89,
"stargazers_count": 90,
"watchers_count": 90,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 38,
"watchers": 89,
"watchers": 90,
"score": 0,
"subscribers_count": 6
},

View file

@ -13,10 +13,10 @@
"description": "A proof-of-concept for CVE-2020-12753",
"fork": false,
"created_at": "2020-06-01T21:58:42Z",
"updated_at": "2024-01-12T13:09:32Z",
"updated_at": "2024-02-25T10:41:32Z",
"pushed_at": "2020-06-01T22:55:46Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 38,
"watchers": 39,
"score": 0,
"subscribers_count": 6
}

View file

@ -18,7 +18,7 @@
"stargazers_count": 3988,
"watchers_count": 3988,
"has_discussions": false,
"forks_count": 1094,
"forks_count": 1079,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -44,7 +44,7 @@
"webshell"
],
"visibility": "public",
"forks": 1094,
"forks": 1079,
"watchers": 3988,
"score": 0,
"subscribers_count": 153

View file

@ -78,13 +78,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 8,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"forks": 7,
"watchers": 0,
"score": 0,
"subscribers_count": 0

View file

@ -1966,10 +1966,10 @@
"description": "A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC",
"fork": false,
"created_at": "2021-12-12T00:29:03Z",
"updated_at": "2024-02-23T16:30:48Z",
"updated_at": "2024-02-25T09:46:45Z",
"pushed_at": "2022-03-10T18:44:50Z",
"stargazers_count": 632,
"watchers_count": 632,
"stargazers_count": 631,
"watchers_count": 631,
"has_discussions": false,
"forks_count": 99,
"allow_forking": true,
@ -1990,7 +1990,7 @@
],
"visibility": "public",
"forks": 99,
"watchers": 632,
"watchers": 631,
"score": 0,
"subscribers_count": 28
},

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()",
"fork": false,
"created_at": "2023-01-10T16:24:51Z",
"updated_at": "2024-02-24T11:42:46Z",
"updated_at": "2024-02-25T10:29:35Z",
"pushed_at": "2023-04-12T17:28:49Z",
"stargazers_count": 250,
"watchers_count": 250,
"stargazers_count": 251,
"watchers_count": 251,
"has_discussions": false,
"forks_count": 48,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 48,
"watchers": 250,
"watchers": 251,
"score": 0,
"subscribers_count": 8
}

32
2022/CVE-2022-46088.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 762995938,
"name": "CVE-2022-46088",
"full_name": "ASR511-OO7\/CVE-2022-46088",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2022-46088",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:24:51Z",
"updated_at": "2024-02-25T09:24:51Z",
"pushed_at": "2024-02-25T09:25:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2022/CVE-2022-46089.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 762995677,
"name": "CVE-2022-46089",
"full_name": "ASR511-OO7\/CVE-2022-46089",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2022-46089",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:23:52Z",
"updated_at": "2024-02-25T09:23:52Z",
"pushed_at": "2024-02-25T09:24:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2022/CVE-2022-46091.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 762995473,
"name": "CVE-2022-46091",
"full_name": "ASR511-OO7\/CVE-2022-46091",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2022-46091",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:23:01Z",
"updated_at": "2024-02-25T09:23:02Z",
"pushed_at": "2024-02-25T09:23:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2022/CVE-2022-46497.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 762995029,
"name": "CVE-2022-46497",
"full_name": "ASR511-OO7\/CVE-2022-46497",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2022-46497",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:21:29Z",
"updated_at": "2024-02-25T09:21:30Z",
"pushed_at": "2024-02-25T09:22:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2022/CVE-2022-46498.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 762994715,
"name": "CVE-2022-46498",
"full_name": "ASR511-OO7\/CVE-2022-46498",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2022-46498",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:20:32Z",
"updated_at": "2024-02-25T09:20:32Z",
"pushed_at": "2024-02-25T09:21:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2022/CVE-2022-46499.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 762994439,
"name": "CVE-2022-46499",
"full_name": "ASR511-OO7\/CVE-2022-46499",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2022-46499",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:19:32Z",
"updated_at": "2024-02-25T09:19:33Z",
"pushed_at": "2024-02-25T09:20:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -227,10 +227,10 @@
"description": "CVE-2024-20931, this is the bypass of the patch of CVE-2023-21839",
"fork": false,
"created_at": "2024-02-06T15:09:33Z",
"updated_at": "2024-02-23T09:29:28Z",
"updated_at": "2024-02-25T10:03:34Z",
"pushed_at": "2024-02-06T15:56:12Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -239,7 +239,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 31,
"watchers": 32,
"score": 0,
"subscribers_count": 1
}

View file

@ -619,10 +619,10 @@
"description": "Passive version detection method for CVE-2023-22515 using Nuclei scanner",
"fork": false,
"created_at": "2024-02-24T16:04:35Z",
"updated_at": "2024-02-24T16:04:35Z",
"updated_at": "2024-02-25T08:06:42Z",
"pushed_at": "2024-02-24T16:12:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -631,7 +631,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -103,10 +103,10 @@
"description": "Openfire Console Authentication Bypass Vulnerability with RCE plugin",
"fork": false,
"created_at": "2023-06-18T15:42:00Z",
"updated_at": "2024-02-24T22:05:12Z",
"updated_at": "2024-02-25T09:19:42Z",
"pushed_at": "2023-10-18T00:49:30Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 16,
"watchers": 17,
"score": 0,
"subscribers_count": 2
},

View file

@ -138,7 +138,7 @@
"stargazers_count": 95,
"watchers_count": 95,
"has_discussions": false,
"forks_count": 21,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -148,7 +148,7 @@
"rocketmq"
],
"visibility": "public",
"forks": 21,
"forks": 20,
"watchers": 95,
"score": 0,
"subscribers_count": 3

32
2023/CVE-2023-33676.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 762994217,
"name": "CVE-2023-33676",
"full_name": "ASR511-OO7\/CVE-2023-33676",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-33676",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:18:38Z",
"updated_at": "2024-02-25T09:18:38Z",
"pushed_at": "2024-02-25T09:19:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2023/CVE-2023-33677.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 762994002,
"name": "CVE-2023-33677",
"full_name": "ASR511-OO7\/CVE-2023-33677",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-33677",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:17:48Z",
"updated_at": "2024-02-25T09:17:48Z",
"pushed_at": "2024-02-25T09:18:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -18,13 +18,13 @@
"stargazers_count": 149,
"watchers_count": 149,
"has_discussions": false,
"forks_count": 49,
"forks_count": 48,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 49,
"forks": 48,
"watchers": 149,
"score": 0,
"subscribers_count": 4

View file

@ -1,19 +1,19 @@
[
{
"id": 661203032,
"name": "CVE-2023-37250",
"full_name": "ewilded\/CVE-2023-37250",
"name": "CVE-2023-37250-POC",
"full_name": "ewilded\/CVE-2023-37250-POC",
"owner": {
"login": "ewilded",
"id": 1158719,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1158719?v=4",
"html_url": "https:\/\/github.com\/ewilded"
},
"html_url": "https:\/\/github.com\/ewilded\/CVE-2023-37250",
"html_url": "https:\/\/github.com\/ewilded\/CVE-2023-37250-POC",
"description": "PoC",
"fork": false,
"created_at": "2023-07-02T05:37:51Z",
"updated_at": "2023-07-07T03:46:15Z",
"updated_at": "2024-02-25T08:17:38Z",
"pushed_at": "2023-07-03T10:34:45Z",
"stargazers_count": 1,
"watchers_count": 1,

32
2023/CVE-2023-38041.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 762975952,
"name": "CVE-2023-38041-POC",
"full_name": "ewilded\/CVE-2023-38041-POC",
"owner": {
"login": "ewilded",
"id": 1158719,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1158719?v=4",
"html_url": "https:\/\/github.com\/ewilded"
},
"html_url": "https:\/\/github.com\/ewilded\/CVE-2023-38041-POC",
"description": "Ivanti Pulse Secure Client Connect Local Privilege Escalation CVE-2023-38041 Proof of Concept",
"fork": false,
"created_at": "2024-02-25T08:09:17Z",
"updated_at": "2024-02-25T08:17:58Z",
"pushed_at": "2024-02-25T08:12:52Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -558,10 +558,10 @@
"description": "CVE-2023-38646 Metabase RCE",
"fork": false,
"created_at": "2023-10-11T03:18:09Z",
"updated_at": "2024-02-18T04:50:09Z",
"updated_at": "2024-02-25T11:32:52Z",
"pushed_at": "2023-10-11T04:06:43Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -575,7 +575,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 43,
"watchers": 44,
"score": 0,
"subscribers_count": 2
},

32
2023/CVE-2023-41014.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 762993729,
"name": "CVE-2023-41014",
"full_name": "ASR511-OO7\/CVE-2023-41014",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-41014",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:16:50Z",
"updated_at": "2024-02-25T09:16:50Z",
"pushed_at": "2024-02-25T09:17:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2023/CVE-2023-41015.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 762993478,
"name": "CVE-2023-41015",
"full_name": "ASR511-OO7\/CVE-2023-41015",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-41015",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:15:54Z",
"updated_at": "2024-02-25T09:15:55Z",
"pushed_at": "2024-02-25T09:16:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2023/CVE-2023-41503.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 762993198,
"name": "CVE-2023-41503",
"full_name": "ASR511-OO7\/CVE-2023-41503",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-41503",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:14:58Z",
"updated_at": "2024-02-25T09:14:58Z",
"pushed_at": "2024-02-25T09:15:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2023/CVE-2023-41504.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 762992922,
"name": "CVE-2023-41504",
"full_name": "ASR511-OO7\/CVE-2023-41504",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-41504",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:13:57Z",
"updated_at": "2024-02-25T09:13:58Z",
"pushed_at": "2024-02-25T09:14:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2023/CVE-2023-41505.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 762992550,
"name": "CVE-2023-41505",
"full_name": "ASR511-OO7\/CVE-2023-41505",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-41505",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:12:31Z",
"updated_at": "2024-02-25T09:12:31Z",
"pushed_at": "2024-02-25T09:13:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2023/CVE-2023-41506.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 762992312,
"name": "CVE-2023-41506",
"full_name": "ASR511-OO7\/CVE-2023-41506",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2023-41506",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:11:36Z",
"updated_at": "2024-02-25T09:11:36Z",
"pushed_at": "2024-02-25T09:12:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-10-15T12:14:18Z",
"updated_at": "2024-01-30T11:43:23Z",
"updated_at": "2024-02-25T10:27:51Z",
"pushed_at": "2023-10-20T23:04:03Z",
"stargazers_count": 179,
"watchers_count": 179,
"stargazers_count": 180,
"watchers_count": 180,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 179,
"watchers": 180,
"score": 0,
"subscribers_count": 9
},

View file

@ -93,5 +93,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 743548847,
"name": "GhostTown",
"full_name": "StanleyJobsonAU\/GhostTown",
"owner": {
"login": "StanleyJobsonAU",
"id": 123927299,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123927299?v=4",
"html_url": "https:\/\/github.com\/StanleyJobsonAU"
},
"html_url": "https:\/\/github.com\/StanleyJobsonAU\/GhostTown",
"description": "Proof of Concept script to exploit CVE-2023-42793 (TeamCity)",
"fork": false,
"created_at": "2024-01-15T13:25:49Z",
"updated_at": "2024-02-25T06:43:21Z",
"pushed_at": "2024-01-15T13:26:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite \"Lazy Bundle\" mitigation",
"fork": false,
"created_at": "2024-01-20T07:14:06Z",
"updated_at": "2024-02-25T03:10:17Z",
"updated_at": "2024-02-25T08:08:34Z",
"pushed_at": "2024-01-21T05:04:01Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 55,
"watchers_count": 55,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 54,
"watchers": 55,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-02-20T06:40:18Z",
"updated_at": "2024-02-25T07:40:53Z",
"pushed_at": "2024-02-06T21:45:34Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 27,
"watchers": 28,
"score": 0,
"subscribers_count": 3
},

32
2024/CVE-2024-1346.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 763037615,
"name": "CVE-2024-1346",
"full_name": "PeterGabaldon\/CVE-2024-1346",
"owner": {
"login": "PeterGabaldon",
"id": 34518201,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34518201?v=4",
"html_url": "https:\/\/github.com\/PeterGabaldon"
},
"html_url": "https:\/\/github.com\/PeterGabaldon\/CVE-2024-1346",
"description": "Weak MySQL database root password in LaborOfficeFree affects version 19.10. This vulnerability allows an attacker to calculate the root password of the MySQL database used by LaborOfficeFree using two constants.",
"fork": false,
"created_at": "2024-02-25T11:51:03Z",
"updated_at": "2024-02-25T11:55:24Z",
"pushed_at": "2024-02-25T11:55:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,7 +13,7 @@
"description": "Torrentpier v2.4.1. CVE-2024-1651. Remote Code Execution (RCE).",
"fork": false,
"created_at": "2024-02-23T11:04:24Z",
"updated_at": "2024-02-24T15:16:43Z",
"updated_at": "2024-02-25T07:28:34Z",
"pushed_at": "2024-02-23T18:07:52Z",
"stargazers_count": 3,
"watchers_count": 3,

View file

@ -13,10 +13,10 @@
"description": "ScreenConnect AuthBypass(cve-2024-1709) --> RCE!!!",
"fork": false,
"created_at": "2024-02-21T09:42:04Z",
"updated_at": "2024-02-24T07:13:16Z",
"updated_at": "2024-02-25T09:06:26Z",
"pushed_at": "2024-02-22T05:22:35Z",
"stargazers_count": 61,
"watchers_count": 61,
"stargazers_count": 64,
"watchers_count": 64,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -34,7 +34,7 @@
],
"visibility": "public",
"forks": 13,
"watchers": 61,
"watchers": 64,
"score": 0,
"subscribers_count": 1
},

View file

@ -103,10 +103,10 @@
"description": "CVE-2024-20931, this is the bypass of the patch of CVE-2023-21839",
"fork": false,
"created_at": "2024-02-06T15:09:33Z",
"updated_at": "2024-02-23T09:29:28Z",
"updated_at": "2024-02-25T10:03:34Z",
"pushed_at": "2024-02-06T15:56:12Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 31,
"watchers": 32,
"score": 0,
"subscribers_count": 1
},

View file

@ -43,19 +43,19 @@
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"fork": false,
"created_at": "2024-02-16T15:17:59Z",
"updated_at": "2024-02-24T22:33:24Z",
"updated_at": "2024-02-25T07:55:26Z",
"pushed_at": "2024-02-19T20:00:35Z",
"stargazers_count": 478,
"watchers_count": 478,
"stargazers_count": 480,
"watchers_count": 480,
"has_discussions": false,
"forks_count": 103,
"forks_count": 102,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 103,
"watchers": 478,
"forks": 102,
"watchers": 480,
"score": 0,
"subscribers_count": 6
},

View file

@ -18,13 +18,13 @@
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 8,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"forks": 7,
"watchers": 21,
"score": 0,
"subscribers_count": 2

32
2024/CVE-2024-22917.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 762992059,
"name": "CVE-2024-22917",
"full_name": "ASR511-OO7\/CVE-2024-22917",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2024-22917",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:10:40Z",
"updated_at": "2024-02-25T09:10:40Z",
"pushed_at": "2024-02-25T09:11:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -73,10 +73,10 @@
"description": "CVE-2024-23897",
"fork": false,
"created_at": "2024-01-26T09:44:32Z",
"updated_at": "2024-02-15T17:39:36Z",
"updated_at": "2024-02-25T08:13:30Z",
"pushed_at": "2024-01-28T06:47:28Z",
"stargazers_count": 149,
"watchers_count": 149,
"stargazers_count": 150,
"watchers_count": 150,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 149,
"watchers": 150,
"score": 0,
"subscribers_count": 2
},

32
2024/CVE-2024-24095.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 762991500,
"name": "CVE-2024-24095",
"full_name": "ASR511-OO7\/CVE-2024-24095",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2024-24095",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:08:37Z",
"updated_at": "2024-02-25T09:08:37Z",
"pushed_at": "2024-02-25T09:09:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2024/CVE-2024-24096.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 762991166,
"name": "CVE-2024-24096",
"full_name": "ASR511-OO7\/CVE-2024-24096",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2024-24096",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:07:19Z",
"updated_at": "2024-02-25T09:07:19Z",
"pushed_at": "2024-02-25T09:08:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2024/CVE-2024-24099.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 762990093,
"name": "CVE-2024-24099",
"full_name": "ASR511-OO7\/CVE-2024-24099",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2024-24099",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:03:38Z",
"updated_at": "2024-02-25T09:03:39Z",
"pushed_at": "2024-02-25T09:04:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2024/CVE-2024-24100.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 762989705,
"name": "CVE-2024-24100",
"full_name": "ASR511-OO7\/CVE-2024-24100",
"owner": {
"login": "ASR511-OO7",
"id": 74178946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74178946?v=4",
"html_url": "https:\/\/github.com\/ASR511-OO7"
},
"html_url": "https:\/\/github.com\/ASR511-OO7\/CVE-2024-24100",
"description": null,
"fork": false,
"created_at": "2024-02-25T09:02:08Z",
"updated_at": "2024-02-25T09:02:08Z",
"pushed_at": "2024-02-25T09:03:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2024/CVE-2024-25169.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 763046588,
"name": "CVE-2024-25169-Mezzanine-v6.0.0",
"full_name": "shenhav12\/CVE-2024-25169-Mezzanine-v6.0.0",
"owner": {
"login": "shenhav12",
"id": 93703363,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93703363?v=4",
"html_url": "https:\/\/github.com\/shenhav12"
},
"html_url": "https:\/\/github.com\/shenhav12\/CVE-2024-25169-Mezzanine-v6.0.0",
"description": null,
"fork": false,
"created_at": "2024-02-25T12:21:40Z",
"updated_at": "2024-02-25T12:27:53Z",
"pushed_at": "2024-02-25T12:27:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

32
2024/CVE-2024-25170.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 763048747,
"name": "CVE-2024-25170-Mezzanine-v6.0.0",
"full_name": "shenhav12\/CVE-2024-25170-Mezzanine-v6.0.0",
"owner": {
"login": "shenhav12",
"id": 93703363,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93703363?v=4",
"html_url": "https:\/\/github.com\/shenhav12"
},
"html_url": "https:\/\/github.com\/shenhav12\/CVE-2024-25170-Mezzanine-v6.0.0",
"description": null,
"fork": false,
"created_at": "2024-02-25T12:28:49Z",
"updated_at": "2024-02-25T12:28:50Z",
"pushed_at": "2024-02-25T12:28:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-02-24T09:30:45Z",
"updated_at": "2024-02-24T09:31:39Z",
"updated_at": "2024-02-25T07:05:18Z",
"pushed_at": "2024-02-24T09:33:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Unauthenticated Remote Code Execution Bricks <= 1.9.6",
"fork": false,
"created_at": "2024-02-20T20:16:09Z",
"updated_at": "2024-02-24T19:28:38Z",
"updated_at": "2024-02-25T10:04:28Z",
"pushed_at": "2024-02-24T23:46:37Z",
"stargazers_count": 70,
"watchers_count": 70,
"stargazers_count": 72,
"watchers_count": 72,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 70,
"watchers": 72,
"score": 0,
"subscribers_count": 1
},

View file

@ -67,6 +67,13 @@
- [sajaljat/CVE-2024-1269](https://github.com/sajaljat/CVE-2024-1269)
### CVE-2024-1346 (-)
<code>Weak MySQL database root password in LaborOfficeFree affects version 19.10. This vulnerability allows an attacker to calculate the root password of the MySQL database used by LaborOfficeFree using two constants.
</code>
- [PeterGabaldon/CVE-2024-1346](https://github.com/PeterGabaldon/CVE-2024-1346)
### CVE-2024-1651 (-)
<code>Torrentpier version 2.4.1 allows executing arbitrary commands on the server.\n\nThis is possible because the application is vulnerable to insecure deserialization.\n\n\n\n\n
@ -271,6 +278,9 @@
### CVE-2024-22909
- [BurakSevben/CVE-2024-22909](https://github.com/BurakSevben/CVE-2024-22909)
### CVE-2024-22917
- [ASR511-OO7/CVE-2024-22917](https://github.com/ASR511-OO7/CVE-2024-22917)
### CVE-2024-22922 (2024-01-25)
<code>An issue in Projectworlds Vistor Management Systemin PHP v.1.0 allows a remtoe attacker to escalate privileges via a crafted script to the login page in the POST/index.php
@ -417,12 +427,24 @@
### CVE-2024-24094
- [ASR511-OO7/CVE-2024-24094](https://github.com/ASR511-OO7/CVE-2024-24094)
### CVE-2024-24095
- [ASR511-OO7/CVE-2024-24095](https://github.com/ASR511-OO7/CVE-2024-24095)
### CVE-2024-24096
- [ASR511-OO7/CVE-2024-24096](https://github.com/ASR511-OO7/CVE-2024-24096)
### CVE-2024-24097
- [ASR511-OO7/CVE-2024-24097](https://github.com/ASR511-OO7/CVE-2024-24097)
### CVE-2024-24098
- [ASR511-OO7/CVE-2024-24098](https://github.com/ASR511-OO7/CVE-2024-24098)
### CVE-2024-24099
- [ASR511-OO7/CVE-2024-24099](https://github.com/ASR511-OO7/CVE-2024-24099)
### CVE-2024-24100
- [ASR511-OO7/CVE-2024-24100](https://github.com/ASR511-OO7/CVE-2024-24100)
### CVE-2024-24101
- [ASR511-OO7/CVE-2024-24101](https://github.com/ASR511-OO7/CVE-2024-24101)
@ -545,6 +567,12 @@
### CVE-2024-25092
- [RandomRobbieBF/CVE-2024-25092](https://github.com/RandomRobbieBF/CVE-2024-25092)
### CVE-2024-25169
- [shenhav12/CVE-2024-25169-Mezzanine-v6.0.0](https://github.com/shenhav12/CVE-2024-25169-Mezzanine-v6.0.0)
### CVE-2024-25170
- [shenhav12/CVE-2024-25170-Mezzanine-v6.0.0](https://github.com/shenhav12/CVE-2024-25170-Mezzanine-v6.0.0)
### CVE-2024-25202
- [Agampreet-Singh/CVE-2024-25202](https://github.com/Agampreet-Singh/CVE-2024-25202)
@ -4257,6 +4285,12 @@
- [lodi-g/CVE-2023-33668](https://github.com/lodi-g/CVE-2023-33668)
### CVE-2023-33676
- [ASR511-OO7/CVE-2023-33676](https://github.com/ASR511-OO7/CVE-2023-33676)
### CVE-2023-33677
- [ASR511-OO7/CVE-2023-33677](https://github.com/ASR511-OO7/CVE-2023-33677)
### CVE-2023-33730 (2023-05-31)
<code>Privilege Escalation in the &quot;GetUserCurrentPwd&quot; function in Microworld Technologies eScan Management Console 14.0.1400.2281 allows any remote attacker to retrieve password of any admin or normal user in plain text format.
@ -5031,7 +5065,7 @@
<code>Unity Parsec has a TOCTOU race condition that permits local attackers to escalate privileges to SYSTEM if Parsec was installed in &quot;Per User&quot; mode. The application intentionally launches DLLs from a user-owned directory but intended to always perform integrity verification of those DLLs. This affects Parsec Loader versions through 8. Parsec Loader 9 is a fixed version.
</code>
- [ewilded/CVE-2023-37250](https://github.com/ewilded/CVE-2023-37250)
- [ewilded/CVE-2023-37250-POC](https://github.com/ewilded/CVE-2023-37250-POC)
### CVE-2023-37474 (2023-07-14)
@ -5186,6 +5220,13 @@
- [LeakIX/sentryexploit](https://github.com/LeakIX/sentryexploit)
- [mind2hex/MICS_Hunter](https://github.com/mind2hex/MICS_Hunter)
### CVE-2023-38041 (2023-10-24)
<code>A logged in user may elevate its permissions by abusing a Time-of-Check to Time-of-Use (TOCTOU) race condition. When a particular process flow is initiated, an attacker can exploit this condition to gain unauthorized elevated privileges on the affected system.
</code>
- [ewilded/CVE-2023-38041-POC](https://github.com/ewilded/CVE-2023-38041-POC)
### CVE-2023-38120
- [warber0x/CVE-2023-38120](https://github.com/warber0x/CVE-2023-38120)
@ -5650,6 +5691,12 @@
- [Zone1-Z/CVE-2023-40989](https://github.com/Zone1-Z/CVE-2023-40989)
### CVE-2023-41014
- [ASR511-OO7/CVE-2023-41014](https://github.com/ASR511-OO7/CVE-2023-41014)
### CVE-2023-41015
- [ASR511-OO7/CVE-2023-41015](https://github.com/ASR511-OO7/CVE-2023-41015)
### CVE-2023-41064 (2023-09-07)
<code>A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 16.6.1 and iPadOS 16.6.1, macOS Monterey 12.6.9, macOS Ventura 13.5.2, iOS 15.7.9 and iPadOS 15.7.9, macOS Big Sur 11.7.10. Processing a maliciously crafted image may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
@ -5722,6 +5769,18 @@
### CVE-2023-41501
- [ASR511-OO7/CVE-2023-41501](https://github.com/ASR511-OO7/CVE-2023-41501)
### CVE-2023-41503
- [ASR511-OO7/CVE-2023-41503](https://github.com/ASR511-OO7/CVE-2023-41503)
### CVE-2023-41504
- [ASR511-OO7/CVE-2023-41504](https://github.com/ASR511-OO7/CVE-2023-41504)
### CVE-2023-41505
- [ASR511-OO7/CVE-2023-41505](https://github.com/ASR511-OO7/CVE-2023-41505)
### CVE-2023-41506
- [ASR511-OO7/CVE-2023-41506](https://github.com/ASR511-OO7/CVE-2023-41506)
### CVE-2023-41507 (2023-09-05)
<code>Super Store Finder v3.6 was discovered to contain multiple SQL injection vulnerabilities in the store locator component via the products, distance, lat, and lng parameters.
@ -5911,6 +5970,7 @@
- [H454NSec/CVE-2023-42793](https://github.com/H454NSec/CVE-2023-42793)
- [Zenmovie/CVE-2023-42793](https://github.com/Zenmovie/CVE-2023-42793)
- [johnossawy/CVE-2023-42793_POC](https://github.com/johnossawy/CVE-2023-42793_POC)
- [StanleyJobsonAU/GhostTown](https://github.com/StanleyJobsonAU/GhostTown)
### CVE-2023-42819 (2023-09-26)
@ -13611,6 +13671,15 @@
- [G37SYS73M/CVE-2022-46087](https://github.com/G37SYS73M/CVE-2022-46087)
### CVE-2022-46088
- [ASR511-OO7/CVE-2022-46088](https://github.com/ASR511-OO7/CVE-2022-46088)
### CVE-2022-46089
- [ASR511-OO7/CVE-2022-46089](https://github.com/ASR511-OO7/CVE-2022-46089)
### CVE-2022-46091
- [ASR511-OO7/CVE-2022-46091](https://github.com/ASR511-OO7/CVE-2022-46091)
### CVE-2022-46104
- [NurSec747/CVE-2022-46104---POC](https://github.com/NurSec747/CVE-2022-46104---POC)
@ -13703,6 +13772,15 @@
- [WodenSec/CVE-2022-46485](https://github.com/WodenSec/CVE-2022-46485)
### CVE-2022-46497
- [ASR511-OO7/CVE-2022-46497](https://github.com/ASR511-OO7/CVE-2022-46497)
### CVE-2022-46498
- [ASR511-OO7/CVE-2022-46498](https://github.com/ASR511-OO7/CVE-2022-46498)
### CVE-2022-46499
- [ASR511-OO7/CVE-2022-46499](https://github.com/ASR511-OO7/CVE-2022-46499)
### CVE-2022-46505 (2023-01-18)
<code>An issue in MatrixSSL 4.5.1-open and earlier leads to failure to securely check the SessionID field, resulting in the misuse of an all-zero MasterSecret that can decrypt secret data.