Auto Update 2024/12/22 12:31:24

This commit is contained in:
motikan2010-bot 2024-12-22 21:31:24 +09:00
parent 4be6cb20bc
commit eb0aabc047
30 changed files with 169 additions and 104 deletions

View file

@ -45,10 +45,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-12-21T15:15:33Z",
"updated_at": "2024-12-22T08:19:25Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2012,
"watchers_count": 2012,
"stargazers_count": 2014,
"watchers_count": 2014,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -78,7 +78,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2012,
"watchers": 2014,
"score": 0,
"subscribers_count": 38
},

View file

@ -14,10 +14,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-12-21T15:15:33Z",
"updated_at": "2024-12-22T08:19:25Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2012,
"watchers_count": 2012,
"stargazers_count": 2014,
"watchers_count": 2014,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -47,7 +47,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2012,
"watchers": 2014,
"score": 0,
"subscribers_count": 38
},

View file

@ -422,7 +422,7 @@
"stargazers_count": 163,
"watchers_count": 163,
"has_discussions": false,
"forks_count": 14,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -436,7 +436,7 @@
"tools"
],
"visibility": "public",
"forks": 14,
"forks": 15,
"watchers": 163,
"score": 0,
"subscribers_count": 2

View file

@ -76,10 +76,10 @@
"description": "A collection of tools for the Janus exploit [CVE-2017-13156].",
"fork": false,
"created_at": "2019-08-25T16:31:16Z",
"updated_at": "2024-11-18T22:28:12Z",
"updated_at": "2024-12-22T11:12:10Z",
"pushed_at": "2019-10-22T20:04:08Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -99,7 +99,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
},

View file

@ -45,10 +45,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-12-21T15:15:33Z",
"updated_at": "2024-12-22T08:19:25Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2012,
"watchers_count": 2012,
"stargazers_count": 2014,
"watchers_count": 2014,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -78,7 +78,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2012,
"watchers": 2014,
"score": 0,
"subscribers_count": 38
},

View file

@ -576,10 +576,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-12-21T15:15:33Z",
"updated_at": "2024-12-22T08:19:25Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2012,
"watchers_count": 2012,
"stargazers_count": 2014,
"watchers_count": 2014,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -609,7 +609,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2012,
"watchers": 2014,
"score": 0,
"subscribers_count": 38
},

View file

@ -200,10 +200,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-12-21T15:15:33Z",
"updated_at": "2024-12-22T08:19:25Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2012,
"watchers_count": 2012,
"stargazers_count": 2014,
"watchers_count": 2014,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -233,7 +233,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2012,
"watchers": 2014,
"score": 0,
"subscribers_count": 38
}

View file

@ -262,10 +262,10 @@
"description": "CVE-2019-2725命令回显+webshell上传+最新绕过",
"fork": false,
"created_at": "2019-06-10T05:12:44Z",
"updated_at": "2024-10-29T01:02:33Z",
"updated_at": "2024-12-22T09:35:21Z",
"pushed_at": "2019-06-21T03:33:05Z",
"stargazers_count": 189,
"watchers_count": 189,
"stargazers_count": 190,
"watchers_count": 190,
"has_discussions": false,
"forks_count": 66,
"allow_forking": true,
@ -274,7 +274,7 @@
"topics": [],
"visibility": "public",
"forks": 66,
"watchers": 189,
"watchers": 190,
"score": 0,
"subscribers_count": 8
},
@ -417,10 +417,10 @@
"description": "WebLogic Insecure Deserialization - CVE-2019-2725 payload builder & exploit ",
"fork": false,
"created_at": "2019-08-23T01:42:57Z",
"updated_at": "2024-08-12T19:52:16Z",
"updated_at": "2024-12-22T09:33:12Z",
"pushed_at": "2019-09-26T05:46:14Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -429,7 +429,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 46,
"watchers": 47,
"score": 0,
"subscribers_count": 6
},

View file

@ -45,10 +45,10 @@
"description": "PoC for CVE-2019-5736",
"fork": false,
"created_at": "2019-02-13T05:26:32Z",
"updated_at": "2024-12-13T08:33:01Z",
"updated_at": "2024-12-22T06:58:36Z",
"pushed_at": "2022-01-05T04:09:42Z",
"stargazers_count": 642,
"watchers_count": 642,
"stargazers_count": 643,
"watchers_count": 643,
"has_discussions": false,
"forks_count": 164,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 164,
"watchers": 642,
"watchers": 643,
"score": 0,
"subscribers_count": 13
},

View file

@ -14,19 +14,19 @@
"description": "Researching CVE published originally by longterm.io",
"fork": false,
"created_at": "2024-03-19T01:47:28Z",
"updated_at": "2024-11-29T04:33:09Z",
"updated_at": "2024-12-22T12:11:45Z",
"pushed_at": "2024-04-11T15:04:05Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"forks": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -986,7 +986,7 @@
"stargazers_count": 163,
"watchers_count": 163,
"has_discussions": false,
"forks_count": 14,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -1000,7 +1000,7 @@
"tools"
],
"visibility": "public",
"forks": 14,
"forks": 15,
"watchers": 163,
"score": 0,
"subscribers_count": 2

View file

@ -14,10 +14,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-12-21T15:15:33Z",
"updated_at": "2024-12-22T08:19:25Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 2012,
"watchers_count": 2012,
"stargazers_count": 2014,
"watchers_count": 2014,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@ -47,7 +47,7 @@
],
"visibility": "public",
"forks": 340,
"watchers": 2012,
"watchers": 2014,
"score": 0,
"subscribers_count": 38
},

View file

@ -111,10 +111,10 @@
"description": "CVE-2020-8597 in RM2100",
"fork": false,
"created_at": "2021-01-24T15:28:00Z",
"updated_at": "2022-07-21T06:11:35Z",
"updated_at": "2024-12-22T08:14:22Z",
"pushed_at": "2021-01-24T15:46:11Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": true,
"forks_count": 2,
"allow_forking": true,
@ -126,7 +126,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 2
}

View file

@ -541,10 +541,10 @@
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
"fork": false,
"created_at": "2021-09-15T22:34:35Z",
"updated_at": "2024-12-18T22:33:06Z",
"updated_at": "2024-12-22T08:51:34Z",
"pushed_at": "2023-10-11T18:44:51Z",
"stargazers_count": 802,
"watchers_count": 802,
"stargazers_count": 804,
"watchers_count": 804,
"has_discussions": false,
"forks_count": 170,
"allow_forking": true,
@ -560,7 +560,7 @@
],
"visibility": "public",
"forks": 170,
"watchers": 802,
"watchers": 804,
"score": 0,
"subscribers_count": 18
},

View file

@ -208,10 +208,10 @@
"description": "A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins \/ extract secret_key \/ decrypt data_source info automatic.",
"fork": false,
"created_at": "2021-12-07T15:11:34Z",
"updated_at": "2024-12-14T21:15:43Z",
"updated_at": "2024-12-22T10:17:58Z",
"pushed_at": "2024-07-12T14:17:27Z",
"stargazers_count": 245,
"watchers_count": 245,
"stargazers_count": 246,
"watchers_count": 246,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -224,7 +224,7 @@
],
"visibility": "public",
"forks": 36,
"watchers": 245,
"watchers": 246,
"score": 0,
"subscribers_count": 6
},

View file

@ -935,10 +935,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2024-12-17T15:04:44Z",
"updated_at": "2024-12-22T11:26:30Z",
"pushed_at": "2024-02-12T22:37:25Z",
"stargazers_count": 1809,
"watchers_count": 1809,
"stargazers_count": 1810,
"watchers_count": 1810,
"has_discussions": false,
"forks_count": 529,
"allow_forking": true,
@ -952,7 +952,7 @@
],
"visibility": "public",
"forks": 529,
"watchers": 1809,
"watchers": 1810,
"score": 0,
"subscribers_count": 26
},

View file

@ -792,10 +792,10 @@
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2024-12-20T16:42:37Z",
"updated_at": "2024-12-22T12:19:10Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1346,
"watchers_count": 1346,
"stargazers_count": 1347,
"watchers_count": 1347,
"has_discussions": false,
"forks_count": 166,
"allow_forking": true,
@ -811,7 +811,7 @@
],
"visibility": "public",
"forks": 166,
"watchers": 1346,
"watchers": 1347,
"score": 0,
"subscribers_count": 15
}

View file

@ -259,11 +259,11 @@
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/wubinworks\/magento2-template-filter-patch",
"description": "Magento 2 patch for CVE-2022-24086. Fix the RCE vulnerability and related bugs by performing deep template variable escaping. If you cannot upgrade Magento or cannot apply the official patches, try this one.",
"description": "Magento 2 patch for CVE-2022-24086, CVE-2022-24087. Fix the RCE vulnerability and related bugs by performing deep template variable escaping. If you cannot upgrade Magento or cannot apply the official patches, try this one.",
"fork": false,
"created_at": "2024-11-25T06:56:05Z",
"updated_at": "2024-11-27T04:14:24Z",
"pushed_at": "2024-11-25T09:38:04Z",
"updated_at": "2024-12-22T06:48:12Z",
"pushed_at": "2024-12-22T06:57:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -274,6 +274,7 @@
"topics": [
"all-magento24-compatible",
"cve-2022-24086",
"cve-2022-24087",
"deep-escape",
"improper-input-validation",
"legacyresolver",

View file

@ -19,7 +19,7 @@
"stargazers_count": 310,
"watchers_count": 310,
"has_discussions": true,
"forks_count": 45,
"forks_count": 46,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -28,7 +28,7 @@
"unisoc"
],
"visibility": "public",
"forks": 45,
"forks": 46,
"watchers": 310,
"score": 0,
"subscribers_count": 8

View file

@ -112,13 +112,13 @@
"stargazers_count": 884,
"watchers_count": 884,
"has_discussions": false,
"forks_count": 73,
"forks_count": 72,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 73,
"forks": 72,
"watchers": 884,
"score": 0,
"subscribers_count": 26

View file

@ -14,10 +14,10 @@
"description": "Pwn2Own Vancouver 2023 Ubuntu LPE exploit",
"fork": false,
"created_at": "2023-09-01T07:41:23Z",
"updated_at": "2024-12-09T01:45:15Z",
"updated_at": "2024-12-22T11:13:55Z",
"pushed_at": "2023-11-12T00:42:29Z",
"stargazers_count": 157,
"watchers_count": 157,
"stargazers_count": 158,
"watchers_count": 158,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 157,
"watchers": 158,
"score": 0,
"subscribers_count": 5
},

View file

@ -352,5 +352,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 906949510,
"name": "CVE-2023-41425",
"full_name": "xpltive\/CVE-2023-41425",
"owner": {
"login": "xpltive",
"id": 25474369,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25474369?v=4",
"html_url": "https:\/\/github.com\/xpltive",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/xpltive\/CVE-2023-41425",
"description": "Wonder CMS v3.2.0 - v3.4.2 XSS to RCE exploit",
"fork": false,
"created_at": "2024-12-22T11:53:14Z",
"updated_at": "2024-12-22T12:26:24Z",
"pushed_at": "2024-12-22T12:26:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -952,10 +952,10 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
"updated_at": "2024-12-13T12:09:59Z",
"updated_at": "2024-12-22T07:18:57Z",
"pushed_at": "2024-04-03T04:58:50Z",
"stargazers_count": 3499,
"watchers_count": 3499,
"stargazers_count": 3500,
"watchers_count": 3500,
"has_discussions": false,
"forks_count": 240,
"allow_forking": true,
@ -964,7 +964,7 @@
"topics": [],
"visibility": "public",
"forks": 240,
"watchers": 3499,
"watchers": 3500,
"score": 0,
"subscribers_count": 38
},

View file

@ -1974,13 +1974,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1

View file

@ -362,10 +362,10 @@
"description": "geoserver图形化漏洞利用工具",
"fork": false,
"created_at": "2024-10-05T10:08:55Z",
"updated_at": "2024-12-16T03:22:40Z",
"updated_at": "2024-12-22T12:02:20Z",
"pushed_at": "2024-10-08T03:16:26Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -374,7 +374,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 24,
"watchers": 26,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-12-14T09:22:33Z",
"updated_at": "2024-12-20T01:12:59Z",
"updated_at": "2024-12-22T08:56:45Z",
"pushed_at": "2024-12-14T10:13:45Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 29,
"watchers": 30,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": "Unauthenticated RCE on CraftCMS when PHP `register_argc_argv` config setting is enabled",
"fork": false,
"created_at": "2024-12-20T03:34:01Z",
"updated_at": "2024-12-22T03:13:28Z",
"pushed_at": "2024-12-22T03:13:24Z",
"stargazers_count": 22,
"watchers_count": 22,
"updated_at": "2024-12-22T12:29:00Z",
"pushed_at": "2024-12-22T12:28:56Z",
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -26,8 +26,39 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 22,
"watchers": 24,
"score": 0,
"subscribers_count": 1
},
{
"id": 906949463,
"name": "CVE-2024-56145-craftcms-rce",
"full_name": "Sachinart\/CVE-2024-56145-craftcms-rce",
"owner": {
"login": "Sachinart",
"id": 18497191,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18497191?v=4",
"html_url": "https:\/\/github.com\/Sachinart",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Sachinart\/CVE-2024-56145-craftcms-rce",
"description": "CVE-2024-56145 SSTI to RCE - twig templates ",
"fork": false,
"created_at": "2024-12-22T11:53:04Z",
"updated_at": "2024-12-22T12:18:57Z",
"pushed_at": "2024-12-22T12:18:54Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -2900,8 +2900,8 @@
"description": "test code for cve-2024-6387",
"fork": false,
"created_at": "2024-12-19T10:16:45Z",
"updated_at": "2024-12-21T16:01:39Z",
"pushed_at": "2024-12-19T11:21:28Z",
"updated_at": "2024-12-22T08:24:49Z",
"pushed_at": "2024-12-22T08:24:46Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,

View file

@ -50,13 +50,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -7660,6 +7660,7 @@
</code>
- [Chocapikk/CVE-2024-56145](https://github.com/Chocapikk/CVE-2024-56145)
- [Sachinart/CVE-2024-56145-craftcms-rce](https://github.com/Sachinart/CVE-2024-56145-craftcms-rce)
### CVE-2024-56331 (2024-12-20)
@ -13802,6 +13803,7 @@
- [h3athen/CVE-2023-41425](https://github.com/h3athen/CVE-2023-41425)
- [Diegomjx/CVE-2023-41425-WonderCMS-Authenticated-RCE](https://github.com/Diegomjx/CVE-2023-41425-WonderCMS-Authenticated-RCE)
- [0x0d3ad/CVE-2023-41425](https://github.com/0x0d3ad/CVE-2023-41425)
- [xpltive/CVE-2023-41425](https://github.com/xpltive/CVE-2023-41425)
### CVE-2023-41436 (2023-09-15)