Auto Update 2024/10/27 12:30:50

This commit is contained in:
motikan2010-bot 2024-10-27 21:30:50 +09:00
parent 2a99f6e402
commit f062fc11d5
27 changed files with 312 additions and 72 deletions

View file

@ -462,10 +462,10 @@
"description": "Dirty Cow exploit - CVE-2016-5195",
"fork": false,
"created_at": "2016-11-25T21:08:01Z",
"updated_at": "2024-10-21T07:46:03Z",
"updated_at": "2024-10-27T09:08:04Z",
"pushed_at": "2021-04-08T11:35:12Z",
"stargazers_count": 856,
"watchers_count": 856,
"stargazers_count": 857,
"watchers_count": 857,
"has_discussions": false,
"forks_count": 428,
"allow_forking": true,
@ -478,7 +478,7 @@
],
"visibility": "public",
"forks": 428,
"watchers": 856,
"watchers": 857,
"score": 0,
"subscribers_count": 9
},

View file

@ -14,10 +14,10 @@
"description": "A login bypass(CVE-2019-18371) and a command injection vulnerability(CVE-2019-18370) in Xiaomi Router R3G up to version 2.28.23.",
"fork": false,
"created_at": "2019-08-30T16:32:13Z",
"updated_at": "2024-09-24T20:30:05Z",
"updated_at": "2024-10-27T07:37:04Z",
"pushed_at": "2020-01-12T02:34:45Z",
"stargazers_count": 181,
"watchers_count": 181,
"stargazers_count": 182,
"watchers_count": 182,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 181,
"watchers": 182,
"score": 0,
"subscribers_count": 7
},

View file

@ -107,10 +107,10 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2024-10-25T07:46:33Z",
"updated_at": "2024-10-27T08:24:18Z",
"pushed_at": "2024-06-16T15:35:20Z",
"stargazers_count": 944,
"watchers_count": 944,
"stargazers_count": 945,
"watchers_count": 945,
"has_discussions": false,
"forks_count": 178,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 178,
"watchers": 944,
"watchers": 945,
"score": 0,
"subscribers_count": 18
},

View file

@ -329,10 +329,10 @@
"description": "Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.",
"fork": false,
"created_at": "2020-09-28T05:00:37Z",
"updated_at": "2024-08-12T20:06:13Z",
"updated_at": "2024-10-27T07:00:57Z",
"pushed_at": "2020-10-10T17:19:51Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -350,7 +350,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 23,
"watchers": 24,
"score": 0,
"subscribers_count": 2
},

View file

@ -541,10 +541,10 @@
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
"fork": false,
"created_at": "2021-09-15T22:34:35Z",
"updated_at": "2024-09-25T00:16:44Z",
"updated_at": "2024-10-27T07:27:25Z",
"pushed_at": "2023-10-11T18:44:51Z",
"stargazers_count": 796,
"watchers_count": 796,
"stargazers_count": 797,
"watchers_count": 797,
"has_discussions": false,
"forks_count": 169,
"allow_forking": true,
@ -560,7 +560,7 @@
],
"visibility": "public",
"forks": 169,
"watchers": 796,
"watchers": 797,
"score": 0,
"subscribers_count": 18
},

View file

@ -14,10 +14,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2024-10-25T09:10:36Z",
"updated_at": "2024-10-27T08:01:57Z",
"pushed_at": "2023-02-26T14:06:05Z",
"stargazers_count": 1163,
"watchers_count": 1163,
"stargazers_count": 1162,
"watchers_count": 1162,
"has_discussions": true,
"forks_count": 190,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 190,
"watchers": 1163,
"watchers": 1162,
"score": 0,
"subscribers_count": 19
},

View file

@ -14,10 +14,10 @@
"description": "HTTP3-attacks (CVE-2022-30592)",
"fork": false,
"created_at": "2022-08-06T09:57:43Z",
"updated_at": "2024-10-26T21:39:52Z",
"updated_at": "2024-10-27T07:14:29Z",
"pushed_at": "2022-12-18T03:36:03Z",
"stargazers_count": 74,
"watchers_count": 74,
"stargazers_count": 75,
"watchers_count": 75,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 74,
"watchers": 75,
"score": 0,
"subscribers_count": 4
}

View file

@ -14,10 +14,10 @@
"description": "CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption",
"fork": false,
"created_at": "2023-09-28T08:45:55Z",
"updated_at": "2024-08-12T20:32:49Z",
"updated_at": "2024-10-27T07:45:09Z",
"pushed_at": "2023-10-01T08:36:06Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 55,
"watchers_count": 55,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 54,
"watchers": 55,
"score": 0,
"subscribers_count": 3
}

View file

@ -19,13 +19,13 @@
"stargazers_count": 87,
"watchers_count": 87,
"has_discussions": false,
"forks_count": 16,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 16,
"forks": 17,
"watchers": 87,
"score": 0,
"subscribers_count": 2

View file

@ -297,10 +297,10 @@
"description": "PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from adb to installed app",
"fork": false,
"created_at": "2024-09-27T09:02:08Z",
"updated_at": "2024-10-27T03:42:00Z",
"updated_at": "2024-10-27T12:22:43Z",
"pushed_at": "2024-09-30T12:48:08Z",
"stargazers_count": 108,
"watchers_count": 108,
"stargazers_count": 109,
"watchers_count": 109,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -309,7 +309,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 108,
"watchers": 109,
"score": 0,
"subscribers_count": 3
}

33
2024/CVE-2024-0113.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 879251944,
"name": "CVE-2024-0113",
"full_name": "zetraxz\/CVE-2024-0113",
"owner": {
"login": "zetraxz",
"id": 186395163,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186395163?v=4",
"html_url": "https:\/\/github.com\/zetraxz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zetraxz\/CVE-2024-0113",
"description": null,
"fork": false,
"created_at": "2024-10-27T12:22:08Z",
"updated_at": "2024-10-27T12:22:12Z",
"pushed_at": "2024-10-27T12:22:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -76,10 +76,10 @@
"description": "out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability ",
"fork": false,
"created_at": "2024-03-13T09:17:28Z",
"updated_at": "2024-10-25T05:28:59Z",
"updated_at": "2024-10-27T09:37:22Z",
"pushed_at": "2024-03-16T00:35:12Z",
"stargazers_count": 121,
"watchers_count": 121,
"stargazers_count": 122,
"watchers_count": 122,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 121,
"watchers": 122,
"score": 0,
"subscribers_count": 5
},

View file

@ -184,5 +184,36 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 879202426,
"name": "CVE-2024-23113",
"full_name": "Jaden1419\/CVE-2024-23113",
"owner": {
"login": "Jaden1419",
"id": 186391854,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186391854?v=4",
"html_url": "https:\/\/github.com\/Jaden1419",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Jaden1419\/CVE-2024-23113",
"description": null,
"fork": false,
"created_at": "2024-10-27T09:32:08Z",
"updated_at": "2024-10-27T09:56:21Z",
"pushed_at": "2024-10-27T09:53:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -249,10 +249,10 @@
"description": "0BL1V10N's CVE-2024-25600 for Bricks Builder (TryHackMe) plugin for WordPress exploit",
"fork": false,
"created_at": "2024-06-02T10:49:03Z",
"updated_at": "2024-10-25T12:12:47Z",
"updated_at": "2024-10-27T12:20:13Z",
"pushed_at": "2024-06-02T11:12:04Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": true,
"forks_count": 0,
"allow_forking": true,
@ -261,7 +261,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -122,5 +122,36 @@
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 879205539,
"name": "CVE-2024-28987",
"full_name": "Jaden1419\/CVE-2024-28987",
"owner": {
"login": "Jaden1419",
"id": 186391854,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186391854?v=4",
"html_url": "https:\/\/github.com\/Jaden1419",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Jaden1419\/CVE-2024-28987",
"description": null,
"fork": false,
"created_at": "2024-10-27T09:43:54Z",
"updated_at": "2024-10-27T09:56:35Z",
"pushed_at": "2024-10-27T09:52:25Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -76,10 +76,10 @@
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
"fork": false,
"created_at": "2024-05-27T08:30:06Z",
"updated_at": "2024-10-22T11:12:22Z",
"updated_at": "2024-10-27T10:06:21Z",
"pushed_at": "2024-09-30T08:45:56Z",
"stargazers_count": 404,
"watchers_count": 404,
"stargazers_count": 405,
"watchers_count": 405,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 404,
"watchers": 405,
"score": 0,
"subscribers_count": 8
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-30090 - LPE PoC",
"fork": false,
"created_at": "2024-10-17T08:38:47Z",
"updated_at": "2024-10-26T20:35:55Z",
"updated_at": "2024-10-27T10:58:44Z",
"pushed_at": "2024-10-17T09:53:33Z",
"stargazers_count": 75,
"watchers_count": 75,
"stargazers_count": 76,
"watchers_count": 76,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 75,
"watchers": 76,
"score": 0,
"subscribers_count": 2
}

View file

@ -29,5 +29,36 @@
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 879205634,
"name": "CVE-2024-43532",
"full_name": "Jaden1419\/CVE-2024-43532",
"owner": {
"login": "Jaden1419",
"id": 186391854,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186391854?v=4",
"html_url": "https:\/\/github.com\/Jaden1419",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Jaden1419\/CVE-2024-43532",
"description": null,
"fork": false,
"created_at": "2024-10-27T09:44:17Z",
"updated_at": "2024-10-27T09:56:17Z",
"pushed_at": "2024-10-27T09:53:56Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "Files related to the Pwn2Own Toronto 2023 exploit against the Xiaomi 13 Pro.",
"fork": false,
"created_at": "2024-10-14T09:38:04Z",
"updated_at": "2024-10-21T03:17:37Z",
"updated_at": "2024-10-27T10:51:31Z",
"pushed_at": "2024-10-14T09:43:53Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
}

View file

@ -76,10 +76,10 @@
"description": "Zimbra - Remote Command Execution (CVE-2024-45519)",
"fork": false,
"created_at": "2024-10-05T00:15:18Z",
"updated_at": "2024-10-26T05:49:22Z",
"updated_at": "2024-10-27T12:12:42Z",
"pushed_at": "2024-10-05T00:18:49Z",
"stargazers_count": 100,
"watchers_count": 100,
"stargazers_count": 101,
"watchers_count": 101,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 100,
"watchers": 101,
"score": 0,
"subscribers_count": 3
}

View file

@ -515,7 +515,7 @@
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -528,7 +528,7 @@
"redteam"
],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 22,
"score": 0,
"subscribers_count": 1

View file

@ -60,5 +60,36 @@
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 879185083,
"name": "CVE-2024-47575",
"full_name": "Jaden1419\/CVE-2024-47575",
"owner": {
"login": "Jaden1419",
"id": 186391854,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186391854?v=4",
"html_url": "https:\/\/github.com\/Jaden1419",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Jaden1419\/CVE-2024-47575",
"description": null,
"fork": false,
"created_at": "2024-10-27T08:24:35Z",
"updated_at": "2024-10-27T09:56:39Z",
"pushed_at": "2024-10-27T09:30:44Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}
]

33
2024/CVE-2024-48569.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 879186454,
"name": "CVE-2024-48569",
"full_name": "MarioTesoro\/CVE-2024-48569",
"owner": {
"login": "MarioTesoro",
"id": 62204045,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62204045?v=4",
"html_url": "https:\/\/github.com\/MarioTesoro",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MarioTesoro\/CVE-2024-48569",
"description": "Proof of concept of multiple Stored Cross-Site Scripting (XSS) vulnerabilities discovered in ACI Worldwide Proactive Risk Manager v 9.1.1.0",
"fork": false,
"created_at": "2024-10-27T08:29:59Z",
"updated_at": "2024-10-27T09:03:10Z",
"pushed_at": "2024-10-27T09:00:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

33
2024/CVE-2024-48904.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 879184940,
"name": "CVE-2024-48904",
"full_name": "zetraxz\/CVE-2024-48904",
"owner": {
"login": "zetraxz",
"id": 186395163,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186395163?v=4",
"html_url": "https:\/\/github.com\/zetraxz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zetraxz\/CVE-2024-48904",
"description": null,
"fork": false,
"created_at": "2024-10-27T08:24:03Z",
"updated_at": "2024-10-27T10:15:09Z",
"pushed_at": "2024-10-27T10:14:49Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,19 +14,19 @@
"description": "A POC exploit for CVE-2024-5836 and CVE-2024-6778, allowing for a sandbox escape from a Chrome extension. ",
"fork": false,
"created_at": "2024-09-10T06:27:59Z",
"updated_at": "2024-10-27T03:56:31Z",
"updated_at": "2024-10-27T12:17:08Z",
"pushed_at": "2024-10-17T05:12:29Z",
"stargazers_count": 74,
"watchers_count": 74,
"stargazers_count": 76,
"watchers_count": 76,
"has_discussions": false,
"forks_count": 11,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 74,
"forks": 12,
"watchers": 76,
"score": 0,
"subscribers_count": 1
},

View file

@ -129,7 +129,7 @@
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -142,7 +142,7 @@
"shellfs"
],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 8,
"score": 0,
"subscribers_count": 1

View file

@ -62,6 +62,13 @@
- [nidhihcl75/frameworks_av_AOSP10_r33_CVE-2024-0049](https://github.com/nidhihcl75/frameworks_av_AOSP10_r33_CVE-2024-0049)
- [Aakashmom/frameworks_av_android10_r33_CVE-2024-0049](https://github.com/Aakashmom/frameworks_av_android10_r33_CVE-2024-0049)
### CVE-2024-0113 (2024-08-09)
<code>NVIDIA Mellanox OS, ONYX, Skyway, and MetroX-3 XCC contain a vulnerability in the web support, where an attacker can cause a CGI path traversal by a specially crafted URI. A successful exploit of this vulnerability might lead to escalation of privileges and information disclosure.
</code>
- [zetraxz/CVE-2024-0113](https://github.com/zetraxz/CVE-2024-0113)
### CVE-2024-0195 (2024-01-02)
<code>Es wurde eine Schwachstelle in spider-flow 0.4.3 gefunden. Sie wurde als kritisch eingestuft. Es betrifft die Funktion FunctionService.saveFunction der Datei src/main/java/org/spiderflow/controller/FunctionController.java. Durch Manipulieren mit unbekannten Daten kann eine code injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
@ -2271,6 +2278,7 @@
- [maybelookis/CVE-2024-23113](https://github.com/maybelookis/CVE-2024-23113)
- [p33d/CVE-2024-23113](https://github.com/p33d/CVE-2024-23113)
- [groshi/CVE-2024-23113-Private-POC](https://github.com/groshi/CVE-2024-23113-Private-POC)
- [Jaden1419/CVE-2024-23113](https://github.com/Jaden1419/CVE-2024-23113)
### CVE-2024-23208 (2024-01-23)
@ -3425,6 +3433,7 @@
- [horizon3ai/CVE-2024-28987](https://github.com/horizon3ai/CVE-2024-28987)
- [PlayerFridei/CVE-2024-28987](https://github.com/PlayerFridei/CVE-2024-28987)
- [HazeLook/CVE-2024-28987](https://github.com/HazeLook/CVE-2024-28987)
- [Jaden1419/CVE-2024-28987](https://github.com/Jaden1419/CVE-2024-28987)
### CVE-2024-28995 (2024-06-06)
@ -5320,6 +5329,7 @@
### CVE-2024-43532
- [HazeLook/CVE-2024-43532](https://github.com/HazeLook/CVE-2024-43532)
- [Jaden1419/CVE-2024-43532](https://github.com/Jaden1419/CVE-2024-43532)
### CVE-2024-43582
- [jinxongwi/CVE-2024-43582-RCE](https://github.com/jinxongwi/CVE-2024-43582-RCE)
@ -5601,6 +5611,7 @@
### CVE-2024-47575
- [maybelookis/CVE-2024-47575](https://github.com/maybelookis/CVE-2024-47575)
- [HazeLook/CVE-2024-47575](https://github.com/HazeLook/CVE-2024-47575)
- [Jaden1419/CVE-2024-47575](https://github.com/Jaden1419/CVE-2024-47575)
### CVE-2024-47854
- [MarioTesoro/CVE-2024-47854](https://github.com/MarioTesoro/CVE-2024-47854)
@ -5617,6 +5628,9 @@
### CVE-2024-48427
- [vighneshnair7/CVE-2024-48427](https://github.com/vighneshnair7/CVE-2024-48427)
### CVE-2024-48569
- [MarioTesoro/CVE-2024-48569](https://github.com/MarioTesoro/CVE-2024-48569)
### CVE-2024-48605
- [surajhacx/HelakuruV.1.1-DLLHijack](https://github.com/surajhacx/HelakuruV.1.1-DLLHijack)
@ -5626,6 +5640,9 @@
### CVE-2024-48652
- [paragbagul111/CVE-2024-48652](https://github.com/paragbagul111/CVE-2024-48652)
### CVE-2024-48904
- [zetraxz/CVE-2024-48904](https://github.com/zetraxz/CVE-2024-48904)
### CVE-2024-48914
- [EQSTLab/CVE-2024-48914](https://github.com/EQSTLab/CVE-2024-48914)