Skip to content

Commit d2bba0d

Browse files
committed
Updated by DarkFunct [BOT] šŸ¤–
1 parent 5a729b8 commit d2bba0d

File tree

2 files changed

+12
-1
lines changed

2 files changed

+12
-1
lines changed

ā€Ždb/cve.sqliteā€Ž

4 KB
Binary file not shown.

ā€Ždocs/README.mdā€Ž

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
> Automatic monitor github cve using Github Actions
44

5-
Last generated : 2025-11-08 02:25:01.733892
5+
Last generated : 2025-11-09 02:45:16.257368
66

77
| CVE | Name | Description | Language | Date |
88
|---|---|---|---|---|
@@ -185,6 +185,7 @@
185185
| [CVE-2025-6085](https://www.cve.org/CVERecord?id=CVE-2025-6085) | [d0n601/CVE-2025-6085](https://github.com/d0n601/CVE-2025-6085) | Make Connector <= 1.5.10 - Authenticated (Administrator+) Arbitrary File Upload | none | 2025-06-17T22:17:26Z|
186186
| [CVE-2025-6083](https://www.cve.org/CVERecord?id=CVE-2025-6083) | [Yuri08loveElaina/CVE_2025_6083](https://github.com/Yuri08loveElaina/CVE_2025_6083) | In ExtremeCloud Universal ZTNA, a syntax error in the 'searchKeyword' condition caused queries to bypass the owner_id filter. This issue may allow users to search data across the entire table instead of being restricted to their specific owner_id. | Python | 2025-06-15T09:42:47Z|
187187
| [CVE-2025-6082](https://www.cve.org/CVERecord?id=CVE-2025-6082) | [byteReaper77/CVE-2025-6082](https://github.com/byteReaper77/CVE-2025-6082) | Proof‑of‑Concept exploits the Full Path Disclosure bug in the ā€œBirth Chart Compatibilityā€ WordPress plugin (<=v2.0) | C | 2025-07-22T15:38:22Z|
188+
| [CVE-2025-60791](https://www.cve.org/CVERecord?id=CVE-2025-60791) | [Smarttfoxx/CVE-2025-60791](https://github.com/Smarttfoxx/CVE-2025-60791) | Easywork Enterprise 2.1.3.354 is vulnerable to Cleartext Storage of Sensitive Information in Memory. The application leaves valid device-bound license keys in process memory after a failed activation attempt. | none | 2025-10-22T20:31:23Z|
188189
| [CVE-2025-60787](https://www.cve.org/CVERecord?id=CVE-2025-60787) | [prabhatverma47/CVE-2025-60787](https://github.com/prabhatverma47/CVE-2025-60787) | CVE-2025-60787 Poc - RCE - MotionEye <= 0.43.1b4 | none | 2025-10-03T15:20:43Z|
189190
| [CVE-2025-60752](https://www.cve.org/CVERecord?id=CVE-2025-60752) | [zer0matt/CVE-2025-60752](https://github.com/zer0matt/CVE-2025-60752) | PoC of CVE-2025-60752 | Shell | 2025-10-16T23:53:55Z|
190191
| [CVE-2025-60751](https://www.cve.org/CVERecord?id=CVE-2025-60751) | [zer0matt/CVE-2025-60751](https://github.com/zer0matt/CVE-2025-60751) | PoC of CVE-2025-60751 | Python | 2025-10-16T23:39:06Z|
@@ -342,6 +343,7 @@
342343
| [CVE-2025-55315](https://www.cve.org/CVERecord?id=CVE-2025-55315) | [RootAid/CVE-2025-55315](https://github.com/RootAid/CVE-2025-55315) | no description | none | 2025-10-17T13:50:15Z|
343344
| [CVE-2025-55315](https://www.cve.org/CVERecord?id=CVE-2025-55315) | [7huukdlnkjkjba/CVE-2025-55315-](https://github.com/7huukdlnkjkjba/CVE-2025-55315-) | äø“äøšēŗ§HTTPčÆ·ę±‚čµ°ē§ę¼ę“žåˆ©ē”ØäøŽč‡ŖåŠØåŒ–ęø—é€ęµ‹čÆ•å·„å…· | Python | 2025-10-19T02:02:46Z|
344345
| [CVE-2025-55315](https://www.cve.org/CVERecord?id=CVE-2025-55315) | [sirredbeard/CVE-2025-55315-repro](https://github.com/sirredbeard/CVE-2025-55315-repro) | Tool that reproduces CVE-2025-55315 in ASP.NET Core. | C# | 2025-10-16T17:14:56Z|
346+
| [CVE-2025-55315](https://www.cve.org/CVERecord?id=CVE-2025-55315) | [jlinebau/CVE-2025-55315-Scanner-Monitor](https://github.com/jlinebau/CVE-2025-55315-Scanner-Monitor) | Quick and Simple Scripts to Scan for Vulnerable Servers and Packet Level Monitors | Go | 2025-10-24T14:19:43Z|
345347
| [CVE-2025-55287](https://www.cve.org/CVERecord?id=CVE-2025-55287) | [Eternalvalhalla/CVE-2025-55287-POC](https://github.com/Eternalvalhalla/CVE-2025-55287-POC) | Authenticated stored XSS priv esc PoC. Affects Genealogy versions prior to 4.4.0 | JavaScript | 2025-08-21T18:06:09Z|
346348
| [CVE-2025-55287](https://www.cve.org/CVERecord?id=CVE-2025-55287) | [SEORY0/CVE-Analyzer](https://github.com/SEORY0/CVE-Analyzer) | 2025-1 ASC Project : AI 기반 CVE ģžė™ ė¶„ģ„ ė° 실행 ķ™˜ź²½ 구축 ķ”„ė ˆģž„ģ›Œķ¬ | Python | 2025-08-19T09:34:39Z|
347349
| [CVE-2025-55241](https://www.cve.org/CVERecord?id=CVE-2025-55241) | [Spanky-McSpank/CVE-2025-55241-Internal-Audit](https://github.com/Spanky-McSpank/CVE-2025-55241-Internal-Audit) | Audit Tool for CVE-2025-55241 - No Warranty Provided or Assumed. Analyze and Use at Own Risk | Python | 2025-09-19T14:13:44Z|
@@ -488,6 +490,7 @@
488490
| [CVE-2025-52289](https://www.cve.org/CVERecord?id=CVE-2025-52289) | [Whit3-d3viL-hacker/CVE-2025-52289](https://github.com/Whit3-d3viL-hacker/CVE-2025-52289) | f | none | 2025-07-31T15:49:10Z|
489491
| [CVE-2025-52136](https://www.cve.org/CVERecord?id=CVE-2025-52136) | [f1r3K0/CVE-2025-52136](https://github.com/f1r3K0/CVE-2025-52136) | EMQXęŽ§åˆ¶å°äøå‡ŗē½‘åˆ©ē”Ø | Go | 2025-10-17T06:08:53Z|
490492
| [CVE-2025-52100](https://www.cve.org/CVERecord?id=CVE-2025-52100) | [changyaoyou/CVE-2025-52100](https://github.com/changyaoyou/CVE-2025-52100) | CVE-2025-52100 | none | 2025-08-29T04:32:32Z|
493+
| [CVE-2025-52099](https://www.cve.org/CVERecord?id=CVE-2025-52099) | [SCREAMBBY/CVE-2025-52099](https://github.com/SCREAMBBY/CVE-2025-52099) | an integer overflow in SQLite 3.50.0 | C | 2025-10-24T09:55:36Z|
491494
| [CVE-2025-52097](https://www.cve.org/CVERecord?id=CVE-2025-52097) | [rwilsonecs/CVE-2025-52097](https://github.com/rwilsonecs/CVE-2025-52097) | Public Disclosure of CVE-2025-52097 | none | 2025-07-11T19:18:29Z|
492495
| [CVE-2025-52078](https://www.cve.org/CVERecord?id=CVE-2025-52078) | [Yucaerin/CVE-2025-52078](https://github.com/Yucaerin/CVE-2025-52078) | CVE-2025-52078 - Unauthenticated Arbitrary File Upload - Writebot SaaS React Template | Python | 2025-05-29T03:06:56Z|
493496
| [CVE-2025-52021](https://www.cve.org/CVERecord?id=CVE-2025-52021) | [hafizgemilang/CVE-2025-52021](https://github.com/hafizgemilang/CVE-2025-52021) | no description | none | 2025-10-07T14:23:32Z|
@@ -695,6 +698,7 @@
695698
| [CVE-2025-48129](https://www.cve.org/CVERecord?id=CVE-2025-48129) | [ahmedseaad1420/cvear2025](https://github.com/ahmedseaad1420/cvear2025) | no description | HTML | 2025-06-09T00:31:57Z|
696699
| [CVE-2025-48129](https://www.cve.org/CVERecord?id=CVE-2025-48129) | [Sh1r0ko11/redmagic-9spro-exploits](https://github.com/Sh1r0ko11/redmagic-9spro-exploits) | discovered zero day/CVEs exploits on the nubia redmagic 9spro models, 9.06.2025 | none | 2025-06-08T17:53:42Z|
697700
| [CVE-2025-47987](https://www.cve.org/CVERecord?id=CVE-2025-47987) | [Kryptoenix/CVE-2025-47987_PoC](https://github.com/Kryptoenix/CVE-2025-47987_PoC) | no description | C | 2025-08-22T09:42:02Z|
701+
| [CVE-2025-4796](https://www.cve.org/CVERecord?id=CVE-2025-4796) | [Nxploited/CVE-2025-4796](https://github.com/Nxploited/CVE-2025-4796) | Eventin <= 4.0.34 - Authenticated (Contributor+) Privilege Escalation via User Email Change/Account Takeover | Python | 2025-10-25T03:35:29Z|
698702
| [CVE-2025-47917](https://www.cve.org/CVERecord?id=CVE-2025-47917) | [byteReaper77/CVE-2025-47917](https://github.com/byteReaper77/CVE-2025-47917) | PoC exploit for CVE-2025-47917: Use-After-Free in mbedTLS leading to remote code execution. | C | 2025-07-22T00:34:25Z|
699703
| [CVE-2025-4784](https://www.cve.org/CVERecord?id=CVE-2025-4784) | [sahici/CVE-2025-4784](https://github.com/sahici/CVE-2025-4784) | USOM Tarafından resmi yayın beklenmektedir. | none | 2025-05-15T16:47:09Z|
700704
| [CVE-2025-47827](https://www.cve.org/CVERecord?id=CVE-2025-47827) | [Zedeldi/CVE-2025-47827](https://github.com/Zedeldi/CVE-2025-47827) | PoC and vulnerability report for CVE-2025-47827. | Shell | 2025-05-20T10:42:11Z|
@@ -981,6 +985,7 @@
981985
| [CVE-2025-3248](https://www.cve.org/CVERecord?id=CVE-2025-3248) | [min8282/CVE-2025-3248](https://github.com/min8282/CVE-2025-3248) | CVE-2025-3248 | Python | 2025-09-03T00:13:48Z|
982986
| [CVE-2025-3248](https://www.cve.org/CVERecord?id=CVE-2025-3248) | [wand3rlust/CVE-2025-3248](https://github.com/wand3rlust/CVE-2025-3248) | PoC for achieving RCE in Langflow versions <1.3.0 | Python | 2025-09-17T10:30:09Z|
983987
| [CVE-2025-3248](https://www.cve.org/CVERecord?id=CVE-2025-3248) | [Kiraly07/Demo_CVE-2025-3248](https://github.com/Kiraly07/Demo_CVE-2025-3248) | no description | Python | 2025-10-01T04:53:30Z|
988+
| [CVE-2025-3248](https://www.cve.org/CVERecord?id=CVE-2025-3248) | [bambooqj/cve-2025-3248](https://github.com/bambooqj/cve-2025-3248) | Langflow åœØåÆ¹ē”Øęˆ·ęäŗ¤ēš„ā€œéŖŒčÆä»£ē ā€åš AST č§£ęžå’Œē¼–čÆ‘ę—¶ļ¼ŒåœØęœŖåšé‰“ęƒäøŽę²™ē®±é™åˆ¶ēš„ęƒ…å†µäø‹č°ƒē”Øäŗ† Python ēš„ compile()/exec()ļ¼ˆä»„åŠåœØē¼–čÆ‘é˜¶ę®µä¼ščÆ„ä¼°å‡½ę•°é»˜č®¤å‚ę•°äøŽč£…é„°å™Øļ¼‰ļ¼Œę”»å‡»č€…åÆęŠŠę¶ę„č½½č·ę”¾åœØå‚ę•°é»˜č®¤å€¼ęˆ–č£…é„°å™Øé‡Œļ¼Œå€Ÿę­¤åœØęœåŠ”å™ØäøŠäø‹ę–‡äø­ę‰§č”Œä»»ę„čÆ­å„ļ¼ˆåå¼¹ shellć€äø‹č½½å™Øć€ęØŖå‘ē§»åŠØē­‰ļ¼‰ | Python | 2025-10-24T13:08:17Z|
984989
| [CVE-2025-32463](https://www.cve.org/CVERecord?id=CVE-2025-32463) | [4f-kira/CVE-2025-32463](https://github.com/4f-kira/CVE-2025-32463) | no description | C | 2025-07-01T13:29:02Z|
985990
| [CVE-2025-32463](https://www.cve.org/CVERecord?id=CVE-2025-32463) | [neko205-mx/CVE-2025-32463_Exploit](https://github.com/neko205-mx/CVE-2025-32463_Exploit) | no description | Shell | 2025-07-02T08:53:44Z|
986991
| [CVE-2025-32463](https://www.cve.org/CVERecord?id=CVE-2025-32463) | [kh4sh3i/CVE-2025-32463](https://github.com/kh4sh3i/CVE-2025-32463) | Local Privilege Escalation to Root via Sudo chroot in Linux | Shell | 2025-07-02T07:20:20Z|
@@ -1865,6 +1870,7 @@
18651870
| [CVE-2025-1639](https://www.cve.org/CVERecord?id=CVE-2025-1639) | [Nxploited/CVE-2025-1639](https://github.com/Nxploited/CVE-2025-1639) | Animation Addons for Elementor Pro <= 1.6 - Missing Authorization to Authenticated (Subscriber+) Arbitrary Plugin Installation/Activation | Python | 2025-03-13T10:48:05Z|
18661871
| [CVE-2025-1562](https://www.cve.org/CVERecord?id=CVE-2025-1562) | [gmh5225/CVE-2025-1562](https://github.com/gmh5225/CVE-2025-1562) | no description | none | 2025-06-22T15:33:38Z|
18671872
| [CVE-2025-1562](https://www.cve.org/CVERecord?id=CVE-2025-1562) | [zhuowei/cheese](https://github.com/zhuowei/cheese) | CVE-2025-21479 proof-of-concept, I think | C | 2025-06-19T19:47:52Z|
1873+
| [CVE-2025-1550](https://www.cve.org/CVERecord?id=CVE-2025-1550) | [ChCh0i/cve-2025-1550](https://github.com/ChCh0i/cve-2025-1550) | no description | Python | 2025-10-24T19:02:33Z|
18681874
| [CVE-2025-1461](https://www.cve.org/CVERecord?id=CVE-2025-1461) | [neverendingsupport/nes-vuetify-cve-2025-1461](https://github.com/neverendingsupport/nes-vuetify-cve-2025-1461) | no description | Vue | 2025-05-29T13:27:43Z|
18691875
| [CVE-2025-1338](https://www.cve.org/CVERecord?id=CVE-2025-1338) | [jxcaxtc/CVE-2025-1338](https://github.com/jxcaxtc/CVE-2025-1338) | This repository contains a proof-of-concept exploit script for CVE-2025-1338 | Python | 2025-10-04T23:51:36Z|
18701876
| [CVE-2025-1337](https://www.cve.org/CVERecord?id=CVE-2025-1337) | [ada-z3r0/CVE-2025-1337-PoC](https://github.com/ada-z3r0/CVE-2025-1337-PoC) | no description | Python | 2025-08-22T02:34:37Z|
@@ -5268,6 +5274,7 @@
52685274
| [CVE-2023-46604](https://www.cve.org/CVERecord?id=CVE-2023-46604) | [cuanh2333/CVE-2023-46604](https://github.com/cuanh2333/CVE-2023-46604) | no description | Python | 2024-10-16T03:31:13Z|
52695275
| [CVE-2023-46604](https://www.cve.org/CVERecord?id=CVE-2023-46604) | [tomasmussi/activemq-cve-2023-46604](https://github.com/tomasmussi/activemq-cve-2023-46604) | Repository to exploit CVE-2023-46604 reported for ActiveMQ | Python | 2023-12-30T20:02:19Z|
52705276
| [CVE-2023-46604](https://www.cve.org/CVERecord?id=CVE-2023-46604) | [skrkcb2/CVE-2023-46604](https://github.com/skrkcb2/CVE-2023-46604) | no description | none | 2025-02-27T02:49:18Z|
5277+
| [CVE-2023-46604](https://www.cve.org/CVERecord?id=CVE-2023-46604) | [CCIEVoice2009/CVE-2023-46604](https://github.com/CCIEVoice2009/CVE-2023-46604) | no description | Python | 2025-05-04T14:42:01Z|
52715278
| [CVE-2023-46527](https://www.cve.org/CVERecord?id=CVE-2023-46527) | [Jianchun-Ding/CVE-poc-update](https://github.com/Jianchun-Ding/CVE-poc-update) | CVE-2023-46371 and CVE-2023-46527 update | Python | 2024-09-10T13:18:02Z|
52725279
| [CVE-2023-46474](https://www.cve.org/CVERecord?id=CVE-2023-46474) | [Xn2/CVE-2023-46474](https://github.com/Xn2/CVE-2023-46474) | Technical details for CVE-2023-46474 | none | 2024-01-11T08:35:18Z|
52735280
| [CVE-2023-46442](https://www.cve.org/CVERecord?id=CVE-2023-46442) | [JAckLosingHeart/CVE-2023-46442_POC](https://github.com/JAckLosingHeart/CVE-2023-46442_POC) | POC for CVE-2023-46442 Denial of Service vulnerability found within Soot | Java | 2024-05-24T10:03:38Z|
@@ -6377,6 +6384,7 @@
63776384
| [CVE-2022-24181](https://www.cve.org/CVERecord?id=CVE-2022-24181) | [cyberhawk000/CVE-2022-24181](https://github.com/cyberhawk000/CVE-2022-24181) | XSS via Host Header injection and Steal Password Reset Token of another user | none | 2022-03-22T08:06:53Z|
63786385
| [CVE-2022-2414](https://www.cve.org/CVERecord?id=CVE-2022-2414) | [satyasai1460/CVE-2022-2414](https://github.com/satyasai1460/CVE-2022-2414) | CVE-2022-2414 POC | Python | 2023-10-05T07:55:01Z|
63796386
| [CVE-2022-2414](https://www.cve.org/CVERecord?id=CVE-2022-2414) | [geniuszly/CVE-2022-2414](https://github.com/geniuszly/CVE-2022-2414) | is a PoC script for demonstrating an XML External Entity (XXE) vulnerability exploitation | Python | 2024-10-07T15:36:39Z|
6387+
| [CVE-2022-2414](https://www.cve.org/CVERecord?id=CVE-2022-2414) | [amitlttwo/CVE-2022-2414-Proof-Of-Concept](https://github.com/amitlttwo/CVE-2022-2414-Proof-Of-Concept) | A flaw was found in pki-core. Access to external entities when parsing XML documents can lead to XML external entity (XXE) attacks. This flaw allows a remote attacker to potentially retrieve the content of arbitrary files by sending specially crafted HTTP requests. | Python | 2022-12-06T14:37:08Z|
63806388
| [CVE-2022-24124](https://www.cve.org/CVERecord?id=CVE-2022-24124) | [b1gdog/CVE-2022-24124](https://github.com/b1gdog/CVE-2022-24124) | CVE-2022-24124 exploit | Python | 2022-08-31T16:23:16Z|
63816389
| [CVE-2022-24112](https://www.cve.org/CVERecord?id=CVE-2022-24112) | [btar1gan/exploit_CVE-2022-24112](https://github.com/btar1gan/exploit_CVE-2022-24112) | New exploit for Apache APISIX v2.12.1 - Remote code execution (RCE) | Python | 2024-06-03T17:33:59Z|
63826390
| [CVE-2022-24086](https://www.cve.org/CVERecord?id=CVE-2022-24086) | [BurpRoot/CVE-2022-24086](https://github.com/BurpRoot/CVE-2022-24086) | CVE-2022-24086 POC example | none | 2023-09-03T17:27:58Z|
@@ -7394,6 +7402,7 @@
73947402
| [CVE-2019-6340](https://www.cve.org/CVERecord?id=CVE-2019-6340) | [knqyf263/CVE-2019-6340](https://github.com/knqyf263/CVE-2019-6340) | Environment for CVE-2019-6340 (Drupal) | Dockerfile | 2019-02-23T13:28:58Z|
73957403
| [CVE-2019-6329](https://www.cve.org/CVERecord?id=CVE-2019-6329) | [ManhNDd/CVE-2019-6329](https://github.com/ManhNDd/CVE-2019-6329) | Local Privilege Escalation in HP Support Assistant | C++ | 2019-10-13T09:20:16Z|
73967404
| [CVE-2019-6329](https://www.cve.org/CVERecord?id=CVE-2019-6329) | [xtafnull/CMS-made-simple-sqli-python3](https://github.com/xtafnull/CMS-made-simple-sqli-python3) | CMS Made Simple < 2.2.10 - SQL Injection (rewritten for python3), CVE-2019-905 | Python | 2022-05-04T09:26:45Z|
7405+
| [CVE-2019-6250](https://www.cve.org/CVERecord?id=CVE-2019-6250) | [AkashicYiTai/CVE-2019-6250-libzmq](https://github.com/AkashicYiTai/CVE-2019-6250-libzmq) | no description | C++ | 2024-06-20T10:56:43Z|
73977406
| [CVE-2019-6249](https://www.cve.org/CVERecord?id=CVE-2019-6249) | [AlphabugX/CVE-2019-6249_Hucart-cms](https://github.com/AlphabugX/CVE-2019-6249_Hucart-cms) | CVE-2019-6249 Hucart cms å¤ēŽ°ēŽÆå¢ƒ | PHP | 2019-02-21T08:03:43Z|
73987407
| [CVE-2019-5822](https://www.cve.org/CVERecord?id=CVE-2019-5822) | [Silence-Rain/14-828_Exploitation_of_CVE-2019-5822](https://github.com/Silence-Rain/14-828_Exploitation_of_CVE-2019-5822) | no description | HTML | 2020-05-06T09:05:23Z|
73997408
| [CVE-2019-5736](https://www.cve.org/CVERecord?id=CVE-2019-5736) | [H3xL00m/CVE-2019-5736](https://github.com/H3xL00m/CVE-2019-5736) | no description | Go | 2021-07-08T22:46:30Z|
@@ -8406,6 +8415,7 @@
84068415
| [CVE-2014-7911](https://www.cve.org/CVERecord?id=CVE-2014-7911) | [retme7/CVE-2014-7911_poc](https://github.com/retme7/CVE-2014-7911_poc) | Local root exploit for Nexus5 Android 4.4.4(KTU84P) | Java | 2015-01-26T06:33:52Z|
84078416
| [CVE-2014-7911](https://www.cve.org/CVERecord?id=CVE-2014-7911) | [heeeeen/CVE-2014-7911poc](https://github.com/heeeeen/CVE-2014-7911poc) | no description | Java | 2015-11-03T03:42:05Z|
84088417
| [CVE-2014-7911](https://www.cve.org/CVERecord?id=CVE-2014-7911) | [GeneBlue/cve-2014-7911-exp](https://github.com/GeneBlue/cve-2014-7911-exp) | exploit for cve-2014-7911; android; java deserialization ;system privilege;ace; | Java | 2015-12-29T07:28:46Z|
8418+
| [CVE-2014-7911](https://www.cve.org/CVERecord?id=CVE-2014-7911) | [koozxcv/CVE-2014-7911](https://github.com/koozxcv/CVE-2014-7911) | vulnerabilitiesā€˜ Poc and Exploit | Java | 2016-03-22T02:02:11Z|
84098419
| [CVE-2014-7236](https://www.cve.org/CVERecord?id=CVE-2014-7236) | [m0nad/CVE-2014-7236_Exploit](https://github.com/m0nad/CVE-2014-7236_Exploit) | Exploit for CVE-2014-7236 | Perl | 2014-10-12T21:28:24Z|
84108420
| [CVE-2014-7236](https://www.cve.org/CVERecord?id=CVE-2014-7236) | [vortextube/ssl_scanner](https://github.com/vortextube/ssl_scanner) | Heartbleed (CVE-2014-0160) SSLv3 Scanner | Perl | 2014-10-12T05:13:06Z|
84118421
| [CVE-2014-7169](https://www.cve.org/CVERecord?id=CVE-2014-7169) | [gina-alaska/bash-cve-2014-7169-cookbook](https://github.com/gina-alaska/bash-cve-2014-7169-cookbook) | no description | Ruby | 2015-09-30T18:06:13Z|
@@ -8593,3 +8603,4 @@
85938603
| CVE NOT FOUND | [shivammittal2403/CVE_Datebase](https://github.com/shivammittal2403/CVE_Datebase) | All Data of cve till 8 sep 2025 |none | 2025-09-08T05:27:36Z|
85948604
| CVE NOT FOUND | [tomitokics/br0ke](https://github.com/tomitokics/br0ke) | My first iOS 'jailbreak' , using CVE 2016-4655 & CVE 2016-4656 |C | 2019-06-16T18:02:09Z|
85958605
| CVE NOT FOUND | [harshul27/CVE-Vulnerability-Dashboard-app](https://github.com/harshul27/CVE-Vulnerability-Dashboard-app) | A Streamlit dashboard providing a cybersecurity analyst's narrative on messaging app vulnerabilities (CVEs) from 2019-2024, featuring historical trends, forecasts, and secure alternatives. Data-driven insights for informed digital security decisions. |Python | 2025-07-02T10:10:25Z|
8606+
| CVE NOT FOUND | [Smarttfoxx/CVE-2025--](https://github.com/Smarttfoxx/CVE-2025--) | no description |none | 2025-10-25T05:04:42Z|

0 commit comments

Comments
Ā (0)