From d1deaa8dca12d49ef807a99f10fe06269cbecba2 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Sun, 27 Oct 2024 09:30:55 +0900 Subject: [PATCH] Auto Update 2024/10/27 00:30:55 --- 2016/CVE-2016-1542.json | 8 ++++---- 2016/CVE-2016-8776.json | 8 ++++---- 2018/CVE-2018-14847.json | 8 ++++---- 2018/CVE-2018-4441.json | 4 ++-- 2019/CVE-2019-16253.json | 8 ++++---- 2019/CVE-2019-9053.json | 4 ++-- 2020/CVE-2020-1362.json | 8 ++++---- 2020/CVE-2020-25223.json | 2 +- 2021/CVE-2021-3493.json | 4 ++-- 2021/CVE-2021-42278.json | 12 ++++++------ 2022/CVE-2022-0944.json | 31 ------------------------------- 2022/CVE-2022-30592.json | 8 ++++---- 2023/CVE-2023-22726.json | 4 ++-- 2023/CVE-2023-38840.json | 8 ++++---- 2023/CVE-2023-46747.json | 8 ++++---- 2024/CVE-2024-1086.json | 8 ++++---- 2024/CVE-2024-21413.json | 8 ++++---- 2024/CVE-2024-23692.json | 8 ++++---- 2024/CVE-2024-25641.json | 8 ++++---- 2024/CVE-2024-28987.json | 31 ------------------------------- 2024/CVE-2024-30088.json | 8 ++++---- 2024/CVE-2024-30090.json | 8 ++++---- 2024/CVE-2024-35250.json | 8 ++++---- 2024/CVE-2024-47176.json | 8 ++++---- 2024/CVE-2024-7479.json | 8 ++++---- README.md | 2 -- 26 files changed, 83 insertions(+), 147 deletions(-) diff --git a/2016/CVE-2016-1542.json b/2016/CVE-2016-1542.json index b472d76b81..8fc911cf7a 100644 --- a/2016/CVE-2016-1542.json +++ b/2016/CVE-2016-1542.json @@ -45,10 +45,10 @@ "description": "BMC Bladelogic RSCD exploits including remote code execution - CVE-2016-1542, CVE-2016-1543, CVE-2016-5063", "fork": false, "created_at": "2018-01-24T16:03:22Z", - "updated_at": "2024-08-12T19:35:45Z", + "updated_at": "2024-10-26T18:51:45Z", "pushed_at": "2020-04-17T14:38:14Z", - "stargazers_count": 19, - "watchers_count": 19, + "stargazers_count": 20, + "watchers_count": 20, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 19, + "watchers": 20, "score": 0, "subscribers_count": 3 } diff --git a/2016/CVE-2016-8776.json b/2016/CVE-2016-8776.json index 6a46d1c29b..c137044ed2 100644 --- a/2016/CVE-2016-8776.json +++ b/2016/CVE-2016-8776.json @@ -14,10 +14,10 @@ "description": "frp bypass without account overwrite", "fork": false, "created_at": "2017-10-08T12:26:23Z", - "updated_at": "2024-01-19T11:41:15Z", + "updated_at": "2024-10-26T18:29:55Z", "pushed_at": "2017-10-08T12:26:24Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 12, + "watchers": 13, "score": 0, "subscribers_count": 5 } diff --git a/2018/CVE-2018-14847.json b/2018/CVE-2018-14847.json index 03d478cb9b..b11567738e 100644 --- a/2018/CVE-2018-14847.json +++ b/2018/CVE-2018-14847.json @@ -14,10 +14,10 @@ "description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)", "fork": false, "created_at": "2018-06-24T05:34:05Z", - "updated_at": "2024-10-22T09:54:11Z", + "updated_at": "2024-10-26T20:58:01Z", "pushed_at": "2020-10-16T12:09:45Z", - "stargazers_count": 506, - "watchers_count": 506, + "stargazers_count": 507, + "watchers_count": 507, "has_discussions": false, "forks_count": 453, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 453, - "watchers": 506, + "watchers": 507, "score": 0, "subscribers_count": 58 }, diff --git a/2018/CVE-2018-4441.json b/2018/CVE-2018-4441.json index e30d13d0ad..2d0909c1d3 100644 --- a/2018/CVE-2018-4441.json +++ b/2018/CVE-2018-4441.json @@ -19,7 +19,7 @@ "stargazers_count": 201, "watchers_count": 201, "has_discussions": false, - "forks_count": 53, + "forks_count": 52, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -29,7 +29,7 @@ "webkit" ], "visibility": "public", - "forks": 53, + "forks": 52, "watchers": 201, "score": 0, "subscribers_count": 32 diff --git a/2019/CVE-2019-16253.json b/2019/CVE-2019-16253.json index c46c9d3dba..314f60b411 100644 --- a/2019/CVE-2019-16253.json +++ b/2019/CVE-2019-16253.json @@ -14,10 +14,10 @@ "description": "Exploit I discovered in October of 2022 with androids Package manager binary (pm) and the way it handled debugging flags, patched out by march 2023. Uses CVE-2019-16253 as a payload to obtain a system shell. ", "fork": false, "created_at": "2023-01-19T19:47:13Z", - "updated_at": "2024-09-30T01:16:37Z", + "updated_at": "2024-10-26T22:39:41Z", "pushed_at": "2024-03-20T19:12:39Z", - "stargazers_count": 78, - "watchers_count": 78, + "stargazers_count": 79, + "watchers_count": 79, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -33,7 +33,7 @@ ], "visibility": "public", "forks": 15, - "watchers": 78, + "watchers": 79, "score": 0, "subscribers_count": 12 } diff --git a/2019/CVE-2019-9053.json b/2019/CVE-2019-9053.json index 27375c1435..b8b49d94d2 100644 --- a/2019/CVE-2019-9053.json +++ b/2019/CVE-2019-9053.json @@ -711,13 +711,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 0 diff --git a/2020/CVE-2020-1362.json b/2020/CVE-2020-1362.json index cf4151194f..ecaf1d3b8a 100644 --- a/2020/CVE-2020-1362.json +++ b/2020/CVE-2020-1362.json @@ -14,10 +14,10 @@ "description": "writeup of CVE-2020-1362", "fork": false, "created_at": "2020-07-17T07:35:05Z", - "updated_at": "2024-08-12T20:03:50Z", + "updated_at": "2024-10-26T21:02:39Z", "pushed_at": "2020-07-17T07:54:26Z", - "stargazers_count": 230, - "watchers_count": 230, + "stargazers_count": 231, + "watchers_count": 231, "has_discussions": false, "forks_count": 42, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 42, - "watchers": 230, + "watchers": 231, "score": 0, "subscribers_count": 12 } diff --git a/2020/CVE-2020-25223.json b/2020/CVE-2020-25223.json index abaa420553..78dd873d4b 100644 --- a/2020/CVE-2020-25223.json +++ b/2020/CVE-2020-25223.json @@ -90,6 +90,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3493.json b/2021/CVE-2021-3493.json index caa1892e94..59b0e1512d 100644 --- a/2021/CVE-2021-3493.json +++ b/2021/CVE-2021-3493.json @@ -19,13 +19,13 @@ "stargazers_count": 406, "watchers_count": 406, "has_discussions": false, - "forks_count": 136, + "forks_count": 137, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 136, + "forks": 137, "watchers": 406, "score": 0, "subscribers_count": 4 diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index 811dd8172d..674d8b0689 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -50,19 +50,19 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-13T10:28:12Z", - "updated_at": "2024-10-24T10:24:15Z", + "updated_at": "2024-10-26T19:36:59Z", "pushed_at": "2023-01-29T03:31:27Z", - "stargazers_count": 790, - "watchers_count": 790, + "stargazers_count": 791, + "watchers_count": 791, "has_discussions": false, - "forks_count": 120, + "forks_count": 121, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 120, - "watchers": 790, + "forks": 121, + "watchers": 791, "score": 0, "subscribers_count": 13 }, diff --git a/2022/CVE-2022-0944.json b/2022/CVE-2022-0944.json index 1a35fda0fb..918c2f8d07 100644 --- a/2022/CVE-2022-0944.json +++ b/2022/CVE-2022-0944.json @@ -186,36 +186,5 @@ "watchers": 0, "score": 0, "subscribers_count": 1 - }, - { - "id": 878669450, - "name": "SQLPad-RCE-Exploit-CVE-2022-0944", - "full_name": "LipeOzyy\/SQLPad-RCE-Exploit-CVE-2022-0944", - "owner": { - "login": "LipeOzyy", - "id": 151560338, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/151560338?v=4", - "html_url": "https:\/\/github.com\/LipeOzyy", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/LipeOzyy\/SQLPad-RCE-Exploit-CVE-2022-0944", - "description": "CVE-2022-0944 Remote Code Execution Exploit", - "fork": false, - "created_at": "2024-10-25T20:31:09Z", - "updated_at": "2024-10-26T14:04:56Z", - "pushed_at": "2024-10-26T14:04:52Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-30592.json b/2022/CVE-2022-30592.json index 8a805be2ff..22cc70527a 100644 --- a/2022/CVE-2022-30592.json +++ b/2022/CVE-2022-30592.json @@ -14,10 +14,10 @@ "description": "HTTP3-attacks (CVE-2022-30592)", "fork": false, "created_at": "2022-08-06T09:57:43Z", - "updated_at": "2024-09-23T14:27:22Z", + "updated_at": "2024-10-26T21:39:52Z", "pushed_at": "2022-12-18T03:36:03Z", - "stargazers_count": 73, - "watchers_count": 73, + "stargazers_count": 74, + "watchers_count": 74, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 16, - "watchers": 73, + "watchers": 74, "score": 0, "subscribers_count": 4 } diff --git a/2023/CVE-2023-22726.json b/2023/CVE-2023-22726.json index 473cc586a7..f0c3ae69d6 100644 --- a/2023/CVE-2023-22726.json +++ b/2023/CVE-2023-22726.json @@ -14,8 +14,8 @@ "description": "CVE-2023-22726", "fork": false, "created_at": "2024-05-29T10:38:30Z", - "updated_at": "2024-10-22T20:33:24Z", - "pushed_at": "2024-10-22T20:33:20Z", + "updated_at": "2024-10-26T19:57:56Z", + "pushed_at": "2024-10-26T19:57:52Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2023/CVE-2023-38840.json b/2023/CVE-2023-38840.json index 2a26889b15..512fdd4a02 100644 --- a/2023/CVE-2023-38840.json +++ b/2023/CVE-2023-38840.json @@ -14,10 +14,10 @@ "description": "A proof-of-concept for (CVE-2023-38840) that extracts plaintext master passwords from a locked Bitwarden vault.", "fork": false, "created_at": "2022-09-18T21:03:07Z", - "updated_at": "2024-01-12T13:10:03Z", + "updated_at": "2024-10-26T20:23:49Z", "pushed_at": "2024-03-01T11:01:42Z", - "stargazers_count": 37, - "watchers_count": 37, + "stargazers_count": 38, + "watchers_count": 38, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -33,7 +33,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 37, + "watchers": 38, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-46747.json b/2023/CVE-2023-46747.json index 9ed4229a83..f10b31ded2 100644 --- a/2023/CVE-2023-46747.json +++ b/2023/CVE-2023-46747.json @@ -299,10 +299,10 @@ "description": "CVE-2023-46747-Mass-RCE", "fork": false, "created_at": "2024-10-24T20:51:31Z", - "updated_at": "2024-10-26T12:00:41Z", + "updated_at": "2024-10-26T19:29:56Z", "pushed_at": "2024-10-24T20:52:43Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -311,7 +311,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 1, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index 9e9b77608b..a5bedb05b9 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -14,10 +14,10 @@ "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "fork": false, "created_at": "2024-03-20T21:16:41Z", - "updated_at": "2024-10-24T13:07:30Z", + "updated_at": "2024-10-26T19:59:59Z", "pushed_at": "2024-04-17T16:09:54Z", - "stargazers_count": 2267, - "watchers_count": 2267, + "stargazers_count": 2266, + "watchers_count": 2266, "has_discussions": false, "forks_count": 297, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 297, - "watchers": 2267, + "watchers": 2266, "score": 0, "subscribers_count": 23 }, diff --git a/2024/CVE-2024-21413.json b/2024/CVE-2024-21413.json index 48d066d54b..a89243b605 100644 --- a/2024/CVE-2024-21413.json +++ b/2024/CVE-2024-21413.json @@ -107,10 +107,10 @@ "description": "CVE-2024-21413 PoC for THM Lab", "fork": false, "created_at": "2024-02-17T14:52:52Z", - "updated_at": "2024-10-26T15:36:22Z", + "updated_at": "2024-10-26T22:06:05Z", "pushed_at": "2024-03-13T02:44:28Z", - "stargazers_count": 33, - "watchers_count": 33, + "stargazers_count": 34, + "watchers_count": 34, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 8, - "watchers": 33, + "watchers": 34, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-23692.json b/2024/CVE-2024-23692.json index 57e63bd432..b20a4008c3 100644 --- a/2024/CVE-2024-23692.json +++ b/2024/CVE-2024-23692.json @@ -231,10 +231,10 @@ "description": "CVE-2024-23692 Exploit", "fork": false, "created_at": "2024-06-18T03:27:47Z", - "updated_at": "2024-09-16T17:52:12Z", + "updated_at": "2024-10-26T18:49:37Z", "pushed_at": "2024-06-18T04:06:25Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -243,7 +243,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 11, + "watchers": 12, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-25641.json b/2024/CVE-2024-25641.json index f9e276bf95..67cd2ab1e0 100644 --- a/2024/CVE-2024-25641.json +++ b/2024/CVE-2024-25641.json @@ -124,10 +124,10 @@ "description": "Fully automated PoC - CVE-2024-25641 - RCE - Cacti < v1.2.26 🌵", "fork": false, "created_at": "2024-08-29T06:27:25Z", - "updated_at": "2024-10-07T18:39:32Z", + "updated_at": "2024-10-26T23:01:48Z", "pushed_at": "2024-09-03T05:21:04Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -136,7 +136,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-28987.json b/2024/CVE-2024-28987.json index b815902c5b..dd1237a0c1 100644 --- a/2024/CVE-2024-28987.json +++ b/2024/CVE-2024-28987.json @@ -122,36 +122,5 @@ "watchers": 4, "score": 0, "subscribers_count": 1 - }, - { - "id": 878948399, - "name": "CVE-2024-28987", - "full_name": "GordonPol1\/CVE-2024-28987", - "owner": { - "login": "GordonPol1", - "id": 186390432, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186390432?v=4", - "html_url": "https:\/\/github.com\/GordonPol1", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/GordonPol1\/CVE-2024-28987", - "description": null, - "fork": false, - "created_at": "2024-10-26T14:52:33Z", - "updated_at": "2024-10-26T14:52:37Z", - "pushed_at": "2024-10-26T14:52:33Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-30088.json b/2024/CVE-2024-30088.json index 889ae78d8b..d4d6a1fa12 100644 --- a/2024/CVE-2024-30088.json +++ b/2024/CVE-2024-30088.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2024-06-24T10:37:26Z", - "updated_at": "2024-10-20T00:38:08Z", + "updated_at": "2024-10-26T23:20:19Z", "pushed_at": "2024-07-31T19:11:55Z", - "stargazers_count": 223, - "watchers_count": 223, + "stargazers_count": 224, + "watchers_count": 224, "has_discussions": false, "forks_count": 50, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 50, - "watchers": 223, + "watchers": 224, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-30090.json b/2024/CVE-2024-30090.json index 8e1f5656e8..2b7deb7859 100644 --- a/2024/CVE-2024-30090.json +++ b/2024/CVE-2024-30090.json @@ -14,10 +14,10 @@ "description": "CVE-2024-30090 - LPE PoC", "fork": false, "created_at": "2024-10-17T08:38:47Z", - "updated_at": "2024-10-24T17:18:48Z", + "updated_at": "2024-10-26T20:35:55Z", "pushed_at": "2024-10-17T09:53:33Z", - "stargazers_count": 74, - "watchers_count": 74, + "stargazers_count": 75, + "watchers_count": 75, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 74, + "watchers": 75, "score": 0, "subscribers_count": 2 } diff --git a/2024/CVE-2024-35250.json b/2024/CVE-2024-35250.json index 9068dc7151..01bc6834a0 100644 --- a/2024/CVE-2024-35250.json +++ b/2024/CVE-2024-35250.json @@ -14,10 +14,10 @@ "description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver", "fork": false, "created_at": "2024-10-13T19:30:20Z", - "updated_at": "2024-10-25T06:40:04Z", + "updated_at": "2024-10-26T23:54:35Z", "pushed_at": "2024-10-17T18:36:54Z", - "stargazers_count": 183, - "watchers_count": 183, + "stargazers_count": 185, + "watchers_count": 185, "has_discussions": false, "forks_count": 42, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 42, - "watchers": 183, + "watchers": 185, "score": 0, "subscribers_count": 4 }, diff --git a/2024/CVE-2024-47176.json b/2024/CVE-2024-47176.json index 87e74d6114..e476f2fbb6 100644 --- a/2024/CVE-2024-47176.json +++ b/2024/CVE-2024-47176.json @@ -307,10 +307,10 @@ "description": "A simple scanner for identifying vulnerable cups-browsed instances on your network", "fork": false, "created_at": "2024-10-07T07:25:18Z", - "updated_at": "2024-10-23T12:09:54Z", + "updated_at": "2024-10-26T20:27:30Z", "pushed_at": "2024-10-07T16:59:47Z", - "stargazers_count": 52, - "watchers_count": 52, + "stargazers_count": 53, + "watchers_count": 53, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -319,7 +319,7 @@ "topics": [], "visibility": "public", "forks": 10, - "watchers": 52, + "watchers": 53, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-7479.json b/2024/CVE-2024-7479.json index 7fc80348c5..46ecf3b723 100644 --- a/2024/CVE-2024-7479.json +++ b/2024/CVE-2024-7479.json @@ -14,10 +14,10 @@ "description": "TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.", "fork": false, "created_at": "2024-09-29T10:58:15Z", - "updated_at": "2024-10-25T07:46:02Z", + "updated_at": "2024-10-27T00:05:30Z", "pushed_at": "2024-10-04T09:39:09Z", - "stargazers_count": 114, - "watchers_count": 114, + "stargazers_count": 115, + "watchers_count": 115, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 114, + "watchers": 115, "score": 0, "subscribers_count": 1 } diff --git a/README.md b/README.md index 848ffd03ec..ba91537331 100644 --- a/README.md +++ b/README.md @@ -3425,7 +3425,6 @@ - [horizon3ai/CVE-2024-28987](https://github.com/horizon3ai/CVE-2024-28987) - [PlayerFridei/CVE-2024-28987](https://github.com/PlayerFridei/CVE-2024-28987) - [HazeLook/CVE-2024-28987](https://github.com/HazeLook/CVE-2024-28987) -- [GordonPol1/CVE-2024-28987](https://github.com/GordonPol1/CVE-2024-28987) ### CVE-2024-28995 (2024-06-06) @@ -14252,7 +14251,6 @@ - [0xRoqeeb/sqlpad-rce-exploit-CVE-2022-0944](https://github.com/0xRoqeeb/sqlpad-rce-exploit-CVE-2022-0944) - [Robocopsita/CVE-2022-0944_RCE_POC](https://github.com/Robocopsita/CVE-2022-0944_RCE_POC) - [toneillcodes/CVE-2022-0944](https://github.com/toneillcodes/CVE-2022-0944) -- [LipeOzyy/SQLPad-RCE-Exploit-CVE-2022-0944](https://github.com/LipeOzyy/SQLPad-RCE-Exploit-CVE-2022-0944) ### CVE-2022-0952 (2022-05-02)