diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json index e64ae45c52..60c95097cb 100644 --- a/2016/CVE-2016-5195.json +++ b/2016/CVE-2016-5195.json @@ -76,10 +76,10 @@ "description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android", "fork": false, "created_at": "2016-10-21T11:19:21Z", - "updated_at": "2024-12-23T14:50:29Z", + "updated_at": "2024-12-29T08:51:09Z", "pushed_at": "2021-02-03T16:03:40Z", - "stargazers_count": 962, - "watchers_count": 962, + "stargazers_count": 963, + "watchers_count": 963, "has_discussions": false, "forks_count": 395, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 395, - "watchers": 962, + "watchers": 963, "score": 0, "subscribers_count": 64 }, diff --git a/2017/CVE-2017-20165.json b/2017/CVE-2017-20165.json index 9cb880f47c..e71458310d 100644 --- a/2017/CVE-2017-20165.json +++ b/2017/CVE-2017-20165.json @@ -14,7 +14,7 @@ "description": "Fork of the send module to deal with CVE-2017-20165", "fork": false, "created_at": "2023-01-11T10:20:27Z", - "updated_at": "2024-12-22T17:23:16Z", + "updated_at": "2024-12-29T10:28:34Z", "pushed_at": "2024-12-22T17:22:54Z", "stargazers_count": 13, "watchers_count": 13, diff --git a/2018/CVE-2018-19320.json b/2018/CVE-2018-19320.json index ea8597ee11..e79134f19e 100644 --- a/2018/CVE-2018-19320.json +++ b/2018/CVE-2018-19320.json @@ -76,10 +76,10 @@ "description": "Unsigned driver loader using CVE-2018-19320", "fork": false, "created_at": "2022-11-12T05:48:13Z", - "updated_at": "2024-12-26T13:17:34Z", + "updated_at": "2024-12-29T07:42:19Z", "pushed_at": "2023-04-09T13:50:29Z", - "stargazers_count": 217, - "watchers_count": 217, + "stargazers_count": 216, + "watchers_count": 216, "has_discussions": false, "forks_count": 58, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 58, - "watchers": 217, + "watchers": 216, "score": 0, "subscribers_count": 10 } diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 82ab92e91c..a3ce662083 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -93,10 +93,10 @@ "description": "CVE-2021-21972 Exploit", "fork": false, "created_at": "2021-02-24T11:14:58Z", - "updated_at": "2024-12-25T16:01:08Z", + "updated_at": "2024-12-29T10:36:13Z", "pushed_at": "2023-06-08T04:01:33Z", - "stargazers_count": 490, - "watchers_count": 490, + "stargazers_count": 491, + "watchers_count": 491, "has_discussions": false, "forks_count": 148, "allow_forking": true, @@ -107,7 +107,7 @@ ], "visibility": "public", "forks": 148, - "watchers": 490, + "watchers": 491, "score": 0, "subscribers_count": 8 }, diff --git a/2021/CVE-2021-42321.json b/2021/CVE-2021-42321.json index 9f12a0e9fb..8d0e939e38 100644 --- a/2021/CVE-2021-42321.json +++ b/2021/CVE-2021-42321.json @@ -76,10 +76,10 @@ "description": null, "fork": false, "created_at": "2022-10-08T13:00:23Z", - "updated_at": "2024-06-21T06:14:32Z", + "updated_at": "2024-12-29T10:01:31Z", "pushed_at": "2022-10-08T13:51:48Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 9, + "watchers": 10, "score": 0, "subscribers_count": 1 } diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index d92f04b818..856e9b0a9e 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -10002,10 +10002,10 @@ "description": "Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more.", "fork": false, "created_at": "2021-12-24T13:18:49Z", - "updated_at": "2024-12-20T08:39:55Z", + "updated_at": "2024-12-29T11:42:11Z", "pushed_at": "2024-01-04T17:12:05Z", - "stargazers_count": 144, - "watchers_count": 144, + "stargazers_count": 145, + "watchers_count": 145, "has_discussions": false, "forks_count": 29, "allow_forking": true, @@ -10014,7 +10014,7 @@ "topics": [], "visibility": "public", "forks": 29, - "watchers": 144, + "watchers": 145, "score": 0, "subscribers_count": 6 }, diff --git a/2022/CVE-2022-20452.json b/2022/CVE-2022-20452.json index e31bab4320..b805e4e2a3 100644 --- a/2022/CVE-2022-20452.json +++ b/2022/CVE-2022-20452.json @@ -14,7 +14,7 @@ "description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()", "fork": false, "created_at": "2023-01-10T16:24:51Z", - "updated_at": "2024-12-11T09:17:54Z", + "updated_at": "2024-12-29T09:30:05Z", "pushed_at": "2023-04-12T17:28:49Z", "stargazers_count": 280, "watchers_count": 280, diff --git a/2022/CVE-2022-21999.json b/2022/CVE-2022-21999.json index 2dc8cb80bc..a0f089645f 100644 --- a/2022/CVE-2022-21999.json +++ b/2022/CVE-2022-21999.json @@ -14,10 +14,10 @@ "description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)", "fork": false, "created_at": "2022-02-08T17:25:44Z", - "updated_at": "2024-12-17T20:19:24Z", + "updated_at": "2024-12-29T06:32:48Z", "pushed_at": "2022-02-09T16:54:09Z", - "stargazers_count": 776, - "watchers_count": 776, + "stargazers_count": 777, + "watchers_count": 777, "has_discussions": false, "forks_count": 160, "allow_forking": true, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 160, - "watchers": 776, + "watchers": 777, "score": 0, "subscribers_count": 15 } diff --git a/2023/CVE-2023-22527.json b/2023/CVE-2023-22527.json index aad97c9525..bb89ecd742 100644 --- a/2023/CVE-2023-22527.json +++ b/2023/CVE-2023-22527.json @@ -606,10 +606,10 @@ "description": "confluence CVE-2023-22527 漏洞利用工具,支持冰蝎\/哥斯拉内存马注入,支持设置 http 代理", "fork": false, "created_at": "2024-02-26T02:34:44Z", - "updated_at": "2024-10-16T10:26:24Z", + "updated_at": "2024-12-29T10:33:38Z", "pushed_at": "2024-04-24T02:34:16Z", - "stargazers_count": 37, - "watchers_count": 37, + "stargazers_count": 38, + "watchers_count": 38, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -618,7 +618,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 37, + "watchers": 38, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-25690.json b/2023/CVE-2023-25690.json index 10e4f0b89d..5d92dc61c4 100644 --- a/2023/CVE-2023-25690.json +++ b/2023/CVE-2023-25690.json @@ -49,10 +49,10 @@ "description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.", "fork": false, "created_at": "2023-05-22T03:06:31Z", - "updated_at": "2024-12-21T21:07:42Z", + "updated_at": "2024-12-29T08:05:37Z", "pushed_at": "2024-08-24T13:38:50Z", - "stargazers_count": 275, - "watchers_count": 275, + "stargazers_count": 276, + "watchers_count": 276, "has_discussions": false, "forks_count": 38, "allow_forking": true, @@ -69,7 +69,7 @@ ], "visibility": "public", "forks": 38, - "watchers": 275, + "watchers": 276, "score": 0, "subscribers_count": 4 }, diff --git a/2023/CVE-2023-27163.json b/2023/CVE-2023-27163.json index 2471c337a8..ce74fc96eb 100644 --- a/2023/CVE-2023-27163.json +++ b/2023/CVE-2023-27163.json @@ -14,7 +14,7 @@ "description": "Proof-of-Concept for Server Side Request Forgery (SSRF) in request-baskets (<= v.1.2.1)", "fork": false, "created_at": "2023-07-11T18:08:05Z", - "updated_at": "2024-08-29T18:36:19Z", + "updated_at": "2024-12-29T11:24:36Z", "pushed_at": "2023-08-09T15:11:09Z", "stargazers_count": 28, "watchers_count": 28, diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index 4d88972fba..8c9d4a3b88 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -14,10 +14,10 @@ "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "fork": false, "created_at": "2024-03-20T21:16:41Z", - "updated_at": "2024-12-28T20:12:14Z", + "updated_at": "2024-12-29T09:09:29Z", "pushed_at": "2024-04-17T16:09:54Z", - "stargazers_count": 2313, - "watchers_count": 2313, + "stargazers_count": 2314, + "watchers_count": 2314, "has_discussions": false, "forks_count": 300, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 300, - "watchers": 2313, + "watchers": 2314, "score": 0, "subscribers_count": 26 }, diff --git a/2024/CVE-2024-21413.json b/2024/CVE-2024-21413.json index d717fc4846..8dc1a2162a 100644 --- a/2024/CVE-2024-21413.json +++ b/2024/CVE-2024-21413.json @@ -107,10 +107,10 @@ "description": "CVE-2024-21413 PoC for THM Lab", "fork": false, "created_at": "2024-02-17T14:52:52Z", - "updated_at": "2024-12-21T14:42:19Z", + "updated_at": "2024-12-29T09:38:01Z", "pushed_at": "2024-03-13T02:44:28Z", - "stargazers_count": 55, - "watchers_count": 55, + "stargazers_count": 56, + "watchers_count": 56, "has_discussions": false, "forks_count": 13, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 13, - "watchers": 55, + "watchers": 56, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-30088.json b/2024/CVE-2024-30088.json index 94e98d9498..fb4892ce58 100644 --- a/2024/CVE-2024-30088.json +++ b/2024/CVE-2024-30088.json @@ -107,10 +107,10 @@ "description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088", "fork": false, "created_at": "2024-07-15T08:07:05Z", - "updated_at": "2024-12-28T03:53:59Z", + "updated_at": "2024-12-29T10:34:41Z", "pushed_at": "2024-09-08T21:23:34Z", - "stargazers_count": 432, - "watchers_count": 432, + "stargazers_count": 433, + "watchers_count": 433, "has_discussions": false, "forks_count": 31, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 31, - "watchers": 432, + "watchers": 433, "score": 0, "subscribers_count": 21 }, diff --git a/2024/CVE-2024-38063.json b/2024/CVE-2024-38063.json index e380d872db..a505980de8 100644 --- a/2024/CVE-2024-38063.json +++ b/2024/CVE-2024-38063.json @@ -296,10 +296,10 @@ "description": null, "fork": false, "created_at": "2024-08-27T15:21:25Z", - "updated_at": "2024-11-09T00:58:09Z", + "updated_at": "2024-12-29T06:55:05Z", "pushed_at": "2024-08-27T17:48:16Z", - "stargazers_count": 18, - "watchers_count": 18, + "stargazers_count": 19, + "watchers_count": 19, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -308,7 +308,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 18, + "watchers": 19, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-43044.json b/2024/CVE-2024-43044.json index 59a02149fc..b543a6ca6f 100644 --- a/2024/CVE-2024-43044.json +++ b/2024/CVE-2024-43044.json @@ -14,10 +14,10 @@ "description": "The script checks Jenkins endpoints for CVE-2024-43044 by retrieving the Jenkins version from the innstance and comparing it against known vulnerable version ranges.", "fork": false, "created_at": "2024-08-08T08:28:26Z", - "updated_at": "2024-12-13T07:00:44Z", + "updated_at": "2024-12-29T12:07:29Z", "pushed_at": "2024-08-08T09:32:00Z", - "stargazers_count": 13, - "watchers_count": 13, + "stargazers_count": 14, + "watchers_count": 14, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 6, - "watchers": 13, + "watchers": 14, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-45440.json b/2024/CVE-2024-45440.json index 0f75e224fa..082f54ebd4 100644 --- a/2024/CVE-2024-45440.json +++ b/2024/CVE-2024-45440.json @@ -14,8 +14,8 @@ "description": "Drupal CVE-2024-45440", "fork": false, "created_at": "2024-12-26T13:35:42Z", - "updated_at": "2024-12-29T02:45:08Z", - "pushed_at": "2024-12-29T02:45:05Z", + "updated_at": "2024-12-29T12:02:42Z", + "pushed_at": "2024-12-29T12:02:40Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-4577.json b/2024/CVE-2024-4577.json index add79390a7..d0df893f6b 100644 --- a/2024/CVE-2024-4577.json +++ b/2024/CVE-2024-4577.json @@ -548,10 +548,10 @@ "description": "[漏洞复现] 全球首款利用PHP默认环境(XAMPP)的CVE-2024-4577 PHP-CGI RCE 漏洞 EXP。", "fork": false, "created_at": "2024-06-08T13:04:45Z", - "updated_at": "2024-12-17T00:51:56Z", + "updated_at": "2024-12-29T08:00:56Z", "pushed_at": "2024-07-21T20:27:03Z", - "stargazers_count": 128, - "watchers_count": 128, + "stargazers_count": 127, + "watchers_count": 127, "has_discussions": false, "forks_count": 31, "allow_forking": true, @@ -560,7 +560,7 @@ "topics": [], "visibility": "public", "forks": 31, - "watchers": 128, + "watchers": 127, "score": 0, "subscribers_count": 1 }, @@ -1594,7 +1594,7 @@ "description": "A Bash script designed to scan multiple domains for the CVE-2024-4577 vulnerability in PHP-CGI.", "fork": false, "created_at": "2024-10-04T13:10:19Z", - "updated_at": "2024-11-13T14:37:42Z", + "updated_at": "2024-12-29T12:26:27Z", "pushed_at": "2024-11-13T14:37:33Z", "stargazers_count": 2, "watchers_count": 2, @@ -1603,7 +1603,14 @@ "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, - "topics": [], + "topics": [ + "apache", + "cve", + "cve-scanning", + "php8", + "security-scanner", + "vulnerability" + ], "visibility": "public", "forks": 0, "watchers": 2, diff --git a/2024/CVE-2024-49039.json b/2024/CVE-2024-49039.json index d4e5644f83..d325adecac 100644 --- a/2024/CVE-2024-49039.json +++ b/2024/CVE-2024-49039.json @@ -14,10 +14,10 @@ "description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler", "fork": false, "created_at": "2024-11-19T08:57:18Z", - "updated_at": "2024-12-28T09:46:37Z", + "updated_at": "2024-12-29T11:56:58Z", "pushed_at": "2024-11-19T09:15:26Z", - "stargazers_count": 109, - "watchers_count": 109, + "stargazers_count": 112, + "watchers_count": 112, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 23, - "watchers": 109, + "watchers": 112, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-50379.json b/2024/CVE-2024-50379.json index b3fd8447bb..fd36179389 100644 --- a/2024/CVE-2024-50379.json +++ b/2024/CVE-2024-50379.json @@ -169,10 +169,10 @@ "description": "RCE through a race condition in Apache Tomcat", "fork": false, "created_at": "2024-12-21T05:54:29Z", - "updated_at": "2024-12-24T17:57:35Z", + "updated_at": "2024-12-29T12:00:08Z", "pushed_at": "2024-12-21T08:56:44Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 12, + "watchers_count": 12, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -181,7 +181,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 10, + "watchers": 12, "score": 0, "subscribers_count": 2 }, @@ -200,10 +200,10 @@ "description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp", "fork": false, "created_at": "2024-12-23T07:20:47Z", - "updated_at": "2024-12-29T04:20:19Z", + "updated_at": "2024-12-29T06:40:38Z", "pushed_at": "2024-12-23T07:30:27Z", - "stargazers_count": 52, - "watchers_count": 52, + "stargazers_count": 53, + "watchers_count": 53, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -212,7 +212,7 @@ "topics": [], "visibility": "public", "forks": 14, - "watchers": 52, + "watchers": 53, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-8069.json b/2024/CVE-2024-8069.json index 26a3185eac..e7b8e9eef4 100644 --- a/2024/CVE-2024-8069.json +++ b/2024/CVE-2024-8069.json @@ -14,10 +14,10 @@ "description": "Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE", "fork": false, "created_at": "2024-11-13T02:50:56Z", - "updated_at": "2024-12-28T22:33:38Z", + "updated_at": "2024-12-29T06:33:07Z", "pushed_at": "2024-11-29T03:02:09Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 8, + "watchers": 9, "score": 0, "subscribers_count": 0 }