From 07fbf7908cd5ffceb0bea0edcfc527acb21ffdca Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Wed, 25 Dec 2024 21:31:49 +0900 Subject: [PATCH] Auto Update 2024/12/25 12:31:49 --- 2014/CVE-2014-4210.json | 16 ++++++++-------- 2017/CVE-2017-12615.json | 8 ++++---- 2017/CVE-2017-2370.json | 8 ++++---- 2017/CVE-2017-8890.json | 8 ++++---- 2019/CVE-2019-0708.json | 8 ++++---- 2019/CVE-2019-12725.json | 8 ++++---- 2020/CVE-2020-1938.json | 8 ++++---- 2021/CVE-2021-21972.json | 16 ++++++++-------- 2021/CVE-2021-36749.json | 8 ++++---- 2021/CVE-2021-44228.json | 2 +- 2022/CVE-2022-0847.json | 8 ++++---- 2022/CVE-2022-1329.json | 8 ++++---- 2022/CVE-2022-21445.json | 8 ++++---- 2022/CVE-2022-22954.json | 8 ++++---- 2022/CVE-2022-29582.json | 12 ++++++------ 2023/CVE-2023-22527.json | 8 ++++---- 2023/CVE-2023-3460.json | 4 ++-- 2023/CVE-2023-48777.json | 8 ++++---- 2024/CVE-2024-10511.json | 2 +- 2024/CVE-2024-1086.json | 8 ++++---- 2024/CVE-2024-10914.json | 2 +- 2024/CVE-2024-12209.json | 2 +- 2024/CVE-2024-12484.json | 2 +- 2024/CVE-2024-20356.json | 8 ++++---- 2024/CVE-2024-21762.json | 8 ++++---- 2024/CVE-2024-25600.json | 8 ++++---- 2024/CVE-2024-26229.json | 2 +- 2024/CVE-2024-29824.json | 8 ++++---- 2024/CVE-2024-30088.json | 2 +- 2024/CVE-2024-32002.json | 8 ++++---- 2024/CVE-2024-32113.json | 2 +- 2024/CVE-2024-38063.json | 8 ++++---- 2024/CVE-2024-38193.json | 8 ++++---- 2024/CVE-2024-48990.json | 4 ++-- 2024/CVE-2024-49112.json | 2 +- 2024/CVE-2024-50379.json | 12 ++++++------ 2024/CVE-2024-50623.json | 4 ++-- 2024/CVE-2024-53677.json | 12 ++++++------ README.md | 2 +- 39 files changed, 134 insertions(+), 134 deletions(-) diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 167f92c8b1..dffddc1907 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -97,10 +97,10 @@ "description": "CVE-2014-4210 SSRF PORTSCANNER PoC", "fork": false, "created_at": "2020-07-21T03:45:30Z", - "updated_at": "2024-12-20T03:30:57Z", + "updated_at": "2024-12-25T10:17:06Z", "pushed_at": "2020-07-21T03:46:09Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -109,7 +109,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 0 }, @@ -128,10 +128,10 @@ "description": "Weblogic SearchPublicRegistries SSRF(CVE-2014-4210) Exploit Script based on Python3", "fork": false, "created_at": "2020-11-19T16:06:57Z", - "updated_at": "2024-12-20T03:30:45Z", + "updated_at": "2024-12-25T10:17:14Z", "pushed_at": "2020-11-20T05:55:15Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -140,7 +140,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 8, + "watchers": 9, "score": 0, "subscribers_count": 1 } diff --git a/2017/CVE-2017-12615.json b/2017/CVE-2017-12615.json index 0807b7c38a..bafbefa86e 100644 --- a/2017/CVE-2017-12615.json +++ b/2017/CVE-2017-12615.json @@ -417,10 +417,10 @@ "description": "tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含", "fork": false, "created_at": "2024-08-29T06:38:16Z", - "updated_at": "2024-12-20T07:25:44Z", + "updated_at": "2024-12-25T08:49:58Z", "pushed_at": "2024-11-13T03:12:58Z", - "stargazers_count": 163, - "watchers_count": 163, + "stargazers_count": 164, + "watchers_count": 164, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -437,7 +437,7 @@ ], "visibility": "public", "forks": 15, - "watchers": 163, + "watchers": 164, "score": 0, "subscribers_count": 2 }, diff --git a/2017/CVE-2017-2370.json b/2017/CVE-2017-2370.json index d2a9911c95..eb2dd68367 100644 --- a/2017/CVE-2017-2370.json +++ b/2017/CVE-2017-2370.json @@ -33,15 +33,15 @@ { "id": 80717942, "name": "extra_recipe", - "full_name": "JackBro\/extra_recipe", + "full_name": "ldebug\/extra_recipe", "owner": { - "login": "JackBro", + "login": "ldebug", "id": 21210712, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21210712?v=4", - "html_url": "https:\/\/github.com\/JackBro", + "html_url": "https:\/\/github.com\/ldebug", "user_view_type": "public" }, - "html_url": "https:\/\/github.com\/JackBro\/extra_recipe", + "html_url": "https:\/\/github.com\/ldebug\/extra_recipe", "description": "Ian Beer's exploit for CVE-2017-2370 (kernel memory r\/w on iOS 10.2)", "fork": false, "created_at": "2017-02-02T11:16:38Z", diff --git a/2017/CVE-2017-8890.json b/2017/CVE-2017-8890.json index 6671276875..f7af593f17 100644 --- a/2017/CVE-2017-8890.json +++ b/2017/CVE-2017-8890.json @@ -45,10 +45,10 @@ "description": null, "fork": false, "created_at": "2018-07-02T02:21:28Z", - "updated_at": "2024-08-26T18:38:39Z", + "updated_at": "2024-12-25T07:36:03Z", "pushed_at": "2019-05-09T07:07:25Z", - "stargazers_count": 35, - "watchers_count": 35, + "stargazers_count": 36, + "watchers_count": 36, "has_discussions": false, "forks_count": 13, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 13, - "watchers": 35, + "watchers": 36, "score": 0, "subscribers_count": 5 }, diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 5149bf5afd..d3be56555d 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -3024,10 +3024,10 @@ "description": "CVE-2019-0708 (BlueKeep)", "fork": false, "created_at": "2019-12-07T10:13:11Z", - "updated_at": "2024-08-12T19:55:32Z", + "updated_at": "2024-12-25T11:28:16Z", "pushed_at": "2020-07-07T15:28:13Z", - "stargazers_count": 106, - "watchers_count": 106, + "stargazers_count": 105, + "watchers_count": 105, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -3036,7 +3036,7 @@ "topics": [], "visibility": "public", "forks": 23, - "watchers": 106, + "watchers": 105, "score": 0, "subscribers_count": 5 }, diff --git a/2019/CVE-2019-12725.json b/2019/CVE-2019-12725.json index 3a4a9386f6..f604706a05 100644 --- a/2019/CVE-2019-12725.json +++ b/2019/CVE-2019-12725.json @@ -45,10 +45,10 @@ "description": "漏洞POC、EXP合集,持续更新。Apache Druid-任意文件读取(CVE-2021-36749)、ConfluenceRCE(CVE-2021-26084)、ZeroShell防火墙RCE(CVE-2019-12725)、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露", "fork": false, "created_at": "2021-05-22T05:06:33Z", - "updated_at": "2024-11-18T08:00:32Z", + "updated_at": "2024-12-25T09:28:14Z", "pushed_at": "2021-11-21T10:34:06Z", - "stargazers_count": 169, - "watchers_count": 169, + "stargazers_count": 170, + "watchers_count": 170, "has_discussions": false, "forks_count": 38, "allow_forking": true, @@ -61,7 +61,7 @@ ], "visibility": "public", "forks": 38, - "watchers": 169, + "watchers": 170, "score": 0, "subscribers_count": 5 }, diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index 4e24f4476e..afc3a371e4 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -981,10 +981,10 @@ "description": "tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含", "fork": false, "created_at": "2024-08-29T06:38:16Z", - "updated_at": "2024-12-20T07:25:44Z", + "updated_at": "2024-12-25T08:49:58Z", "pushed_at": "2024-11-13T03:12:58Z", - "stargazers_count": 163, - "watchers_count": 163, + "stargazers_count": 164, + "watchers_count": 164, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -1001,7 +1001,7 @@ ], "visibility": "public", "forks": 15, - "watchers": 163, + "watchers": 164, "score": 0, "subscribers_count": 2 } diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 83acbae730..8974ea3a03 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -93,10 +93,10 @@ "description": "CVE-2021-21972 Exploit", "fork": false, "created_at": "2021-02-24T11:14:58Z", - "updated_at": "2024-12-22T13:59:45Z", + "updated_at": "2024-12-25T11:43:15Z", "pushed_at": "2023-06-08T04:01:33Z", - "stargazers_count": 487, - "watchers_count": 487, + "stargazers_count": 488, + "watchers_count": 488, "has_discussions": false, "forks_count": 148, "allow_forking": true, @@ -107,7 +107,7 @@ ], "visibility": "public", "forks": 148, - "watchers": 487, + "watchers": 488, "score": 0, "subscribers_count": 8 }, @@ -848,10 +848,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2024-12-25T02:14:55Z", + "updated_at": "2024-12-25T09:32:14Z", "pushed_at": "2024-04-25T06:09:38Z", - "stargazers_count": 1348, - "watchers_count": 1348, + "stargazers_count": 1349, + "watchers_count": 1349, "has_discussions": false, "forks_count": 166, "allow_forking": true, @@ -867,7 +867,7 @@ ], "visibility": "public", "forks": 166, - "watchers": 1348, + "watchers": 1349, "score": 0, "subscribers_count": 15 } diff --git a/2021/CVE-2021-36749.json b/2021/CVE-2021-36749.json index 9199371878..dc745d39da 100644 --- a/2021/CVE-2021-36749.json +++ b/2021/CVE-2021-36749.json @@ -14,10 +14,10 @@ "description": "漏洞POC、EXP合集,持续更新。Apache Druid-任意文件读取(CVE-2021-36749)、ConfluenceRCE(CVE-2021-26084)、ZeroShell防火墙RCE(CVE-2019-12725)、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露", "fork": false, "created_at": "2021-05-22T05:06:33Z", - "updated_at": "2024-11-18T08:00:32Z", + "updated_at": "2024-12-25T09:28:14Z", "pushed_at": "2021-11-21T10:34:06Z", - "stargazers_count": 169, - "watchers_count": 169, + "stargazers_count": 170, + "watchers_count": 170, "has_discussions": false, "forks_count": 38, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 38, - "watchers": 169, + "watchers": 170, "score": 0, "subscribers_count": 5 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index d657a9d430..b8df8175ee 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -7264,7 +7264,7 @@ "fork": false, "created_at": "2021-12-15T21:09:00Z", "updated_at": "2023-06-22T04:46:02Z", - "pushed_at": "2024-11-25T05:57:14Z", + "pushed_at": "2024-12-25T06:55:32Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index f0a611a85d..aad245c526 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -1871,10 +1871,10 @@ "description": "CVE-2022-0847 used to achieve container escape 利用CVE-2022-0847 (Dirty Pipe) 实现容器逃逸", "fork": false, "created_at": "2022-06-04T08:31:32Z", - "updated_at": "2024-08-17T10:29:15Z", + "updated_at": "2024-12-25T08:00:52Z", "pushed_at": "2022-06-16T17:14:10Z", - "stargazers_count": 30, - "watchers_count": 30, + "stargazers_count": 31, + "watchers_count": 31, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -1891,7 +1891,7 @@ ], "visibility": "public", "forks": 7, - "watchers": 30, + "watchers": 31, "score": 0, "subscribers_count": 1 }, diff --git a/2022/CVE-2022-1329.json b/2022/CVE-2022-1329.json index c81d4692db..63662560b0 100644 --- a/2022/CVE-2022-1329.json +++ b/2022/CVE-2022-1329.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2022-04-15T19:37:35Z", - "updated_at": "2024-11-27T09:45:32Z", + "updated_at": "2024-12-25T09:16:05Z", "pushed_at": "2022-04-22T17:55:37Z", - "stargazers_count": 20, - "watchers_count": 20, + "stargazers_count": 21, + "watchers_count": 21, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 20, + "watchers": 21, "score": 0, "subscribers_count": 1 }, diff --git a/2022/CVE-2022-21445.json b/2022/CVE-2022-21445.json index 67ee1c46c8..52033d84f6 100644 --- a/2022/CVE-2022-21445.json +++ b/2022/CVE-2022-21445.json @@ -45,10 +45,10 @@ "description": null, "fork": false, "created_at": "2024-03-12T04:47:02Z", - "updated_at": "2024-12-16T06:53:25Z", + "updated_at": "2024-12-25T09:52:56Z", "pushed_at": "2024-03-18T07:32:24Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index c02954bfb8..af33e15063 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -792,10 +792,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2024-12-25T02:14:55Z", + "updated_at": "2024-12-25T09:32:14Z", "pushed_at": "2024-04-25T06:09:38Z", - "stargazers_count": 1348, - "watchers_count": 1348, + "stargazers_count": 1349, + "watchers_count": 1349, "has_discussions": false, "forks_count": 166, "allow_forking": true, @@ -811,7 +811,7 @@ ], "visibility": "public", "forks": 166, - "watchers": 1348, + "watchers": 1349, "score": 0, "subscribers_count": 15 } diff --git a/2022/CVE-2022-29582.json b/2022/CVE-2022-29582.json index b1802fce08..d809efcc86 100644 --- a/2022/CVE-2022-29582.json +++ b/2022/CVE-2022-29582.json @@ -14,19 +14,19 @@ "description": "Exploit for CVE-2022-29582 targeting Google's Kernel CTF", "fork": false, "created_at": "2022-08-04T15:29:04Z", - "updated_at": "2024-12-02T23:35:27Z", + "updated_at": "2024-12-25T09:00:31Z", "pushed_at": "2022-08-08T04:13:33Z", - "stargazers_count": 71, - "watchers_count": 71, + "stargazers_count": 72, + "watchers_count": 72, "has_discussions": false, - "forks_count": 10, + "forks_count": 11, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 10, - "watchers": 71, + "forks": 11, + "watchers": 72, "score": 0, "subscribers_count": 4 } diff --git a/2023/CVE-2023-22527.json b/2023/CVE-2023-22527.json index 8ddce84856..6241c4bde7 100644 --- a/2023/CVE-2023-22527.json +++ b/2023/CVE-2023-22527.json @@ -14,10 +14,10 @@ "description": "CVE-2023-22527 - RCE (Remote Code Execution) Vulnerability In Confluence Data Center and Confluence Server PoC", "fork": false, "created_at": "2024-01-16T08:46:21Z", - "updated_at": "2024-09-02T04:23:53Z", + "updated_at": "2024-12-25T07:14:03Z", "pushed_at": "2024-01-23T09:57:31Z", - "stargazers_count": 25, - "watchers_count": 25, + "stargazers_count": 26, + "watchers_count": 26, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 25, + "watchers": 26, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-3460.json b/2023/CVE-2023-3460.json index 5e2035a713..4d57ded8e6 100644 --- a/2023/CVE-2023-3460.json +++ b/2023/CVE-2023-3460.json @@ -265,8 +265,8 @@ "description": "Cái này dựng lên với mục đích cho ae tham khảo, chê thì đừng có xem. :))))", "fork": false, "created_at": "2024-12-11T07:38:22Z", - "updated_at": "2024-12-23T10:26:36Z", - "pushed_at": "2024-12-23T10:26:32Z", + "updated_at": "2024-12-25T12:05:52Z", + "pushed_at": "2024-12-25T12:05:48Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2023/CVE-2023-48777.json b/2023/CVE-2023-48777.json index 4931aab62d..a04e8fdc7c 100644 --- a/2023/CVE-2023-48777.json +++ b/2023/CVE-2023-48777.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2024-02-16T19:36:50Z", - "updated_at": "2024-05-17T14:24:09Z", + "updated_at": "2024-12-25T09:16:44Z", "pushed_at": "2024-02-16T19:39:12Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-10511.json b/2024/CVE-2024-10511.json index 79c0d8fb94..b16396cd68 100644 --- a/2024/CVE-2024-10511.json +++ b/2024/CVE-2024-10511.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index 7e40f63ffc..1a938ed7e2 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -14,10 +14,10 @@ "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "fork": false, "created_at": "2024-03-20T21:16:41Z", - "updated_at": "2024-12-24T20:51:19Z", + "updated_at": "2024-12-25T11:49:55Z", "pushed_at": "2024-04-17T16:09:54Z", - "stargazers_count": 2309, - "watchers_count": 2309, + "stargazers_count": 2310, + "watchers_count": 2310, "has_discussions": false, "forks_count": 299, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 299, - "watchers": 2309, + "watchers": 2310, "score": 0, "subscribers_count": 26 }, diff --git a/2024/CVE-2024-10914.json b/2024/CVE-2024-10914.json index e47ffe6402..74e2f9b583 100644 --- a/2024/CVE-2024-10914.json +++ b/2024/CVE-2024-10914.json @@ -326,6 +326,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-12209.json b/2024/CVE-2024-12209.json index c8af278197..268db0ac98 100644 --- a/2024/CVE-2024-12209.json +++ b/2024/CVE-2024-12209.json @@ -59,6 +59,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-12484.json b/2024/CVE-2024-12484.json index 3aacc3f17b..4fa5b19008 100644 --- a/2024/CVE-2024-12484.json +++ b/2024/CVE-2024-12484.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-20356.json b/2024/CVE-2024-20356.json index 17f1279d29..cd7be038f0 100644 --- a/2024/CVE-2024-20356.json +++ b/2024/CVE-2024-20356.json @@ -14,10 +14,10 @@ "description": "This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.", "fork": false, "created_at": "2024-04-12T15:07:42Z", - "updated_at": "2024-12-10T03:08:06Z", + "updated_at": "2024-12-25T07:57:40Z", "pushed_at": "2024-04-18T14:31:34Z", - "stargazers_count": 55, - "watchers_count": 55, + "stargazers_count": 56, + "watchers_count": 56, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 11, - "watchers": 55, + "watchers": 56, "score": 0, "subscribers_count": 8 }, diff --git a/2024/CVE-2024-21762.json b/2024/CVE-2024-21762.json index 2fa1b40957..bc35fcb292 100644 --- a/2024/CVE-2024-21762.json +++ b/2024/CVE-2024-21762.json @@ -138,10 +138,10 @@ "description": "The PoC demonstrates the potential for remote code execution by exploiting the identified security flaw.", "fork": false, "created_at": "2024-03-17T09:15:22Z", - "updated_at": "2024-10-29T16:36:33Z", + "updated_at": "2024-12-25T11:30:36Z", "pushed_at": "2024-03-17T09:20:35Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -150,7 +150,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 9, + "watchers": 10, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-25600.json b/2024/CVE-2024-25600.json index 0aed390962..b6774ae7de 100644 --- a/2024/CVE-2024-25600.json +++ b/2024/CVE-2024-25600.json @@ -14,10 +14,10 @@ "description": "Unauthenticated Remote Code Execution – Bricks <= 1.9.6", "fork": false, "created_at": "2024-02-20T20:16:09Z", - "updated_at": "2024-12-15T22:44:06Z", + "updated_at": "2024-12-25T07:47:07Z", "pushed_at": "2024-02-25T21:50:09Z", - "stargazers_count": 153, - "watchers_count": 153, + "stargazers_count": 154, + "watchers_count": 154, "has_discussions": false, "forks_count": 33, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 33, - "watchers": 153, + "watchers": 154, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-26229.json b/2024/CVE-2024-26229.json index c17534c0f4..1dd8d00bfc 100644 --- a/2024/CVE-2024-26229.json +++ b/2024/CVE-2024-26229.json @@ -152,7 +152,7 @@ "forks": 7, "watchers": 35, "score": 0, - "subscribers_count": 2 + "subscribers_count": 3 }, { "id": 871953279, diff --git a/2024/CVE-2024-29824.json b/2024/CVE-2024-29824.json index 9716c33a14..8698f47a4a 100644 --- a/2024/CVE-2024-29824.json +++ b/2024/CVE-2024-29824.json @@ -14,10 +14,10 @@ "description": "Ivanti EPM SQL Injection Remote Code Execution Vulnerability", "fork": false, "created_at": "2024-06-12T13:53:32Z", - "updated_at": "2024-12-07T00:01:48Z", + "updated_at": "2024-12-25T11:31:21Z", "pushed_at": "2024-06-12T14:04:39Z", - "stargazers_count": 22, - "watchers_count": 22, + "stargazers_count": 23, + "watchers_count": 23, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 22, + "watchers": 23, "score": 0, "subscribers_count": 5 }, diff --git a/2024/CVE-2024-30088.json b/2024/CVE-2024-30088.json index bf788da00e..f235c4fe79 100644 --- a/2024/CVE-2024-30088.json +++ b/2024/CVE-2024-30088.json @@ -121,7 +121,7 @@ "forks": 31, "watchers": 430, "score": 0, - "subscribers_count": 20 + "subscribers_count": 21 }, { "id": 834461917, diff --git a/2024/CVE-2024-32002.json b/2024/CVE-2024-32002.json index a01556e2b1..0cc36d7984 100644 --- a/2024/CVE-2024-32002.json +++ b/2024/CVE-2024-32002.json @@ -76,10 +76,10 @@ "description": "Exploit PoC for CVE-2024-32002", "fork": false, "created_at": "2024-05-17T19:33:08Z", - "updated_at": "2024-12-22T02:46:53Z", + "updated_at": "2024-12-25T08:56:18Z", "pushed_at": "2024-05-19T07:12:00Z", - "stargazers_count": 519, - "watchers_count": 519, + "stargazers_count": 520, + "watchers_count": 520, "has_discussions": false, "forks_count": 144, "allow_forking": true, @@ -93,7 +93,7 @@ ], "visibility": "public", "forks": 144, - "watchers": 519, + "watchers": 520, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-32113.json b/2024/CVE-2024-32113.json index 0df632ed82..969ba2c9b0 100644 --- a/2024/CVE-2024-32113.json +++ b/2024/CVE-2024-32113.json @@ -131,6 +131,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-38063.json b/2024/CVE-2024-38063.json index 2a263698f4..62b222f97e 100644 --- a/2024/CVE-2024-38063.json +++ b/2024/CVE-2024-38063.json @@ -265,10 +265,10 @@ "description": "poc for CVE-2024-38063 (RCE in tcpip.sys)", "fork": false, "created_at": "2024-08-24T18:25:46Z", - "updated_at": "2024-12-24T15:47:54Z", + "updated_at": "2024-12-25T08:57:08Z", "pushed_at": "2024-08-27T12:22:39Z", - "stargazers_count": 640, - "watchers_count": 640, + "stargazers_count": 641, + "watchers_count": 641, "has_discussions": false, "forks_count": 115, "allow_forking": true, @@ -277,7 +277,7 @@ "topics": [], "visibility": "public", "forks": 115, - "watchers": 640, + "watchers": 641, "score": 0, "subscribers_count": 4 }, diff --git a/2024/CVE-2024-38193.json b/2024/CVE-2024-38193.json index bdc2c8152e..44d352ae3e 100644 --- a/2024/CVE-2024-38193.json +++ b/2024/CVE-2024-38193.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2024-12-03T08:56:59Z", - "updated_at": "2024-12-21T07:19:27Z", + "updated_at": "2024-12-25T10:13:21Z", "pushed_at": "2024-11-18T23:48:31Z", - "stargazers_count": 45, - "watchers_count": 45, + "stargazers_count": 46, + "watchers_count": 46, "has_discussions": false, "forks_count": 24, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 24, - "watchers": 45, + "watchers": 46, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-48990.json b/2024/CVE-2024-48990.json index 5b81c63914..5647500218 100644 --- a/2024/CVE-2024-48990.json +++ b/2024/CVE-2024-48990.json @@ -19,13 +19,13 @@ "stargazers_count": 91, "watchers_count": 91, "has_discussions": false, - "forks_count": 17, + "forks_count": 18, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 17, + "forks": 18, "watchers": 91, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-49112.json b/2024/CVE-2024-49112.json index 05dfa8f9de..72d9f6cd2d 100644 --- a/2024/CVE-2024-49112.json +++ b/2024/CVE-2024-49112.json @@ -28,7 +28,7 @@ "forks": 2, "watchers": 11, "score": 0, - "subscribers_count": 1 + "subscribers_count": 2 }, { "id": 908053971, diff --git a/2024/CVE-2024-50379.json b/2024/CVE-2024-50379.json index d1a67716af..7c68c0eb9b 100644 --- a/2024/CVE-2024-50379.json +++ b/2024/CVE-2024-50379.json @@ -200,10 +200,10 @@ "description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp", "fork": false, "created_at": "2024-12-23T07:20:47Z", - "updated_at": "2024-12-25T03:57:03Z", + "updated_at": "2024-12-25T10:03:11Z", "pushed_at": "2024-12-23T07:30:27Z", - "stargazers_count": 27, - "watchers_count": 27, + "stargazers_count": 32, + "watchers_count": 32, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -212,7 +212,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 27, + "watchers": 32, "score": 0, "subscribers_count": 2 }, @@ -262,8 +262,8 @@ "description": "CVE-2024-50379-exp", "fork": false, "created_at": "2024-12-25T02:41:31Z", - "updated_at": "2024-12-25T02:43:51Z", - "pushed_at": "2024-12-25T02:43:47Z", + "updated_at": "2024-12-25T07:54:45Z", + "pushed_at": "2024-12-25T07:54:42Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-50623.json b/2024/CVE-2024-50623.json index fa6030f245..f35739b8ac 100644 --- a/2024/CVE-2024-50623.json +++ b/2024/CVE-2024-50623.json @@ -50,7 +50,7 @@ "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -62,7 +62,7 @@ "rce-exploit" ], "visibility": "public", - "forks": 3, + "forks": 4, "watchers": 3, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-53677.json b/2024/CVE-2024-53677.json index 52260d5daf..f6e26b5a1d 100644 --- a/2024/CVE-2024-53677.json +++ b/2024/CVE-2024-53677.json @@ -45,19 +45,19 @@ "description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.", "fork": false, "created_at": "2024-12-13T17:42:55Z", - "updated_at": "2024-12-24T04:05:37Z", + "updated_at": "2024-12-25T09:09:58Z", "pushed_at": "2024-12-20T10:05:15Z", - "stargazers_count": 70, - "watchers_count": 70, + "stargazers_count": 71, + "watchers_count": 71, "has_discussions": false, - "forks_count": 28, + "forks_count": 29, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 28, - "watchers": 70, + "forks": 29, + "watchers": 71, "score": 0, "subscribers_count": 3 }, diff --git a/README.md b/README.md index ac4d8b6f03..a89fb9b107 100644 --- a/README.md +++ b/README.md @@ -42883,7 +42883,7 @@ - [maximehip/extra_recipe](https://github.com/maximehip/extra_recipe) -- [JackBro/extra_recipe](https://github.com/JackBro/extra_recipe) +- [ldebug/extra_recipe](https://github.com/ldebug/extra_recipe) - [Rootkitsmm-zz/extra_recipe-iOS-10.2](https://github.com/Rootkitsmm-zz/extra_recipe-iOS-10.2) - [Peterpan0927/CVE-2017-2370](https://github.com/Peterpan0927/CVE-2017-2370)