diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index d08a887eea..aa2781d5ef 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -43,7 +43,7 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-08-05T08:32:13Z", + "updated_at": "2024-08-07T14:36:36Z", "pushed_at": "2023-11-24T09:21:56Z", "stargazers_count": 1969, "watchers_count": 1969, diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 1a4f37be61..0b315784f3 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,7 +13,7 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-08-05T08:32:13Z", + "updated_at": "2024-08-07T14:36:36Z", "pushed_at": "2023-11-24T09:21:56Z", "stargazers_count": 1969, "watchers_count": 1969, diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index be906effd0..8c7664aeb0 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -43,7 +43,7 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-08-05T08:32:13Z", + "updated_at": "2024-08-07T14:36:36Z", "pushed_at": "2023-11-24T09:21:56Z", "stargazers_count": 1969, "watchers_count": 1969, diff --git a/2017/CVE-2017-7269.json b/2017/CVE-2017-7269.json index 31b40acd33..034150686f 100644 --- a/2017/CVE-2017-7269.json +++ b/2017/CVE-2017-7269.json @@ -552,23 +552,23 @@ "subscribers_count": 0 }, { - "id": 818312200, + "id": 839459028, "name": "CVE-2017-7269", - "full_name": "OmarSuarezDoro\/CVE-2017-7269", + "full_name": "VanishedPeople\/CVE-2017-7269", "owner": { - "login": "OmarSuarezDoro", - "id": 91568642, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91568642?v=4", - "html_url": "https:\/\/github.com\/OmarSuarezDoro" + "login": "VanishedPeople", + "id": 155242438, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/155242438?v=4", + "html_url": "https:\/\/github.com\/VanishedPeople" }, - "html_url": "https:\/\/github.com\/OmarSuarezDoro\/CVE-2017-7269", - "description": "This repository contain an script to exploit CVE-2017-7269", + "html_url": "https:\/\/github.com\/VanishedPeople\/CVE-2017-7269", + "description": null, "fork": false, - "created_at": "2024-06-21T15:05:15Z", - "updated_at": "2024-06-26T10:39:47Z", - "pushed_at": "2024-06-21T15:07:05Z", - "stargazers_count": 3, - "watchers_count": 3, + "created_at": "2024-08-07T16:45:02Z", + "updated_at": "2024-08-07T17:34:51Z", + "pushed_at": "2024-08-07T17:34:48Z", + "stargazers_count": 0, + "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -577,8 +577,8 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 0, "score": 0, - "subscribers_count": 1 + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 3b00ec8505..6043c48911 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -557,7 +557,7 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-08-05T08:32:13Z", + "updated_at": "2024-08-07T14:36:36Z", "pushed_at": "2023-11-24T09:21:56Z", "stargazers_count": 1969, "watchers_count": 1969, diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 930618cd0c..175179982c 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -43,10 +43,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2024-08-07T08:42:17Z", + "updated_at": "2024-08-07T15:46:13Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 4077, - "watchers_count": 4077, + "stargazers_count": 4079, + "watchers_count": 4079, "has_discussions": false, "forks_count": 1087, "allow_forking": true, @@ -75,7 +75,7 @@ ], "visibility": "public", "forks": 1087, - "watchers": 4077, + "watchers": 4079, "score": 0, "subscribers_count": 151 }, diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index cc26b641bf..bd40a95123 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -103,10 +103,10 @@ "description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持", "fork": false, "created_at": "2019-06-21T09:22:43Z", - "updated_at": "2024-08-04T08:44:11Z", + "updated_at": "2024-08-07T14:37:03Z", "pushed_at": "2024-06-16T15:35:20Z", - "stargazers_count": 945, - "watchers_count": 945, + "stargazers_count": 944, + "watchers_count": 944, "has_discussions": false, "forks_count": 179, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 179, - "watchers": 945, + "watchers": 944, "score": 0, "subscribers_count": 18 }, @@ -193,7 +193,7 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-08-05T08:32:13Z", + "updated_at": "2024-08-07T14:36:36Z", "pushed_at": "2023-11-24T09:21:56Z", "stargazers_count": 1969, "watchers_count": 1969, diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 826d25f48c..7277daea36 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -170,10 +170,10 @@ "description": "Exploit for zerologon cve-2020-1472", "fork": false, "created_at": "2020-09-14T19:19:07Z", - "updated_at": "2024-08-05T08:28:18Z", + "updated_at": "2024-08-07T15:22:31Z", "pushed_at": "2020-10-15T18:31:15Z", - "stargazers_count": 619, - "watchers_count": 619, + "stargazers_count": 620, + "watchers_count": 620, "has_discussions": false, "forks_count": 146, "allow_forking": true, @@ -182,7 +182,7 @@ "topics": [], "visibility": "public", "forks": 146, - "watchers": 619, + "watchers": 620, "score": 0, "subscribers_count": 13 }, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index ca947d7931..655e59e1ed 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,10 +13,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2024-08-07T08:42:17Z", + "updated_at": "2024-08-07T15:46:13Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 4077, - "watchers_count": 4077, + "stargazers_count": 4079, + "watchers_count": 4079, "has_discussions": false, "forks_count": 1087, "allow_forking": true, @@ -45,7 +45,7 @@ ], "visibility": "public", "forks": 1087, - "watchers": 4077, + "watchers": 4079, "score": 0, "subscribers_count": 151 }, diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 7639eee917..564d8fb212 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,7 +13,7 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-08-05T08:32:13Z", + "updated_at": "2024-08-07T14:36:36Z", "pushed_at": "2023-11-24T09:21:56Z", "stargazers_count": 1969, "watchers_count": 1969, diff --git a/2021/CVE-2021-24084.json b/2021/CVE-2021-24084.json index ea9983ed93..73cc7a479f 100644 --- a/2021/CVE-2021-24084.json +++ b/2021/CVE-2021-24084.json @@ -43,10 +43,10 @@ "description": "CVE-2021-24084 Windows Local Privilege Escalation Left officially unpatched since 2020. Hence, its still a zero day", "fork": false, "created_at": "2021-11-28T09:48:36Z", - "updated_at": "2024-06-01T20:27:04Z", + "updated_at": "2024-08-07T12:49:22Z", "pushed_at": "2022-02-21T08:30:22Z", - "stargazers_count": 47, - "watchers_count": 47, + "stargazers_count": 48, + "watchers_count": 48, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 14, - "watchers": 47, + "watchers": 48, "score": 0, "subscribers_count": 2 } diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index f52178edfe..647b01a1b8 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -223,10 +223,10 @@ "description": "CVE-2021-40444 PoC", "fork": false, "created_at": "2021-09-10T16:55:53Z", - "updated_at": "2024-08-06T08:39:31Z", + "updated_at": "2024-08-07T17:10:05Z", "pushed_at": "2021-12-25T18:31:02Z", - "stargazers_count": 1565, - "watchers_count": 1565, + "stargazers_count": 1566, + "watchers_count": 1566, "has_discussions": false, "forks_count": 481, "allow_forking": true, @@ -235,7 +235,7 @@ "topics": [], "visibility": "public", "forks": 481, - "watchers": 1565, + "watchers": 1566, "score": 0, "subscribers_count": 28 }, @@ -493,10 +493,10 @@ "description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit", "fork": false, "created_at": "2021-09-15T22:34:35Z", - "updated_at": "2024-08-04T18:35:52Z", + "updated_at": "2024-08-07T17:10:16Z", "pushed_at": "2023-10-11T18:44:51Z", - "stargazers_count": 794, - "watchers_count": 794, + "stargazers_count": 795, + "watchers_count": 795, "has_discussions": false, "forks_count": 169, "allow_forking": true, @@ -512,7 +512,7 @@ ], "visibility": "public", "forks": 169, - "watchers": 794, + "watchers": 795, "score": 0, "subscribers_count": 19 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 6ed54794c9..fac71912d4 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -907,10 +907,10 @@ "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2021-12-10T23:19:28Z", - "updated_at": "2024-08-05T12:29:19Z", + "updated_at": "2024-08-07T13:07:05Z", "pushed_at": "2024-02-12T22:37:25Z", - "stargazers_count": 1782, - "watchers_count": 1782, + "stargazers_count": 1784, + "watchers_count": 1784, "has_discussions": false, "forks_count": 527, "allow_forking": true, @@ -924,7 +924,7 @@ ], "visibility": "public", "forks": 527, - "watchers": 1782, + "watchers": 1784, "score": 0, "subscribers_count": 27 }, diff --git a/2022/CVE-2022-27646.json b/2022/CVE-2022-27646.json index 717466a56c..c918300b18 100644 --- a/2022/CVE-2022-27646.json +++ b/2022/CVE-2022-27646.json @@ -13,8 +13,8 @@ "description": "Demonstrate some functionalities of Morion by generating an exploit for CVE-2022-27646 (stack buffer overflow on Netgear R6700v3 routers).", "fork": false, "created_at": "2023-06-01T05:10:56Z", - "updated_at": "2024-07-15T05:57:52Z", - "pushed_at": "2024-07-15T14:43:27Z", + "updated_at": "2024-08-07T14:38:09Z", + "pushed_at": "2024-08-07T14:43:44Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, diff --git a/2023/CVE-2023-2255.json b/2023/CVE-2023-2255.json index b21516fb67..5fcc8c0b40 100644 --- a/2023/CVE-2023-2255.json +++ b/2023/CVE-2023-2255.json @@ -18,13 +18,13 @@ "stargazers_count": 46, "watchers_count": 46, "has_discussions": false, - "forks_count": 10, + "forks_count": 11, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 10, + "forks": 11, "watchers": 46, "score": 0, "subscribers_count": 1 diff --git a/2023/CVE-2023-24249.json b/2023/CVE-2023-24249.json index 55433261ab..1ccb7b137a 100644 --- a/2023/CVE-2023-24249.json +++ b/2023/CVE-2023-24249.json @@ -13,10 +13,10 @@ "description": "Exploit script for CVE-2023-24249 - a vulnerability allowing remote code execution via file upload and command injection.", "fork": false, "created_at": "2024-08-07T04:36:44Z", - "updated_at": "2024-08-07T04:43:19Z", + "updated_at": "2024-08-07T13:19:36Z", "pushed_at": "2024-08-07T04:41:25Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 0 } diff --git a/2023/CVE-2023-27326.json b/2023/CVE-2023-27326.json index 0771d552c8..b06d1f4b12 100644 --- a/2023/CVE-2023-27326.json +++ b/2023/CVE-2023-27326.json @@ -13,10 +13,10 @@ "description": "VM Escape for Parallels Desktop <18.1.1", "fork": false, "created_at": "2023-03-20T11:47:54Z", - "updated_at": "2024-05-10T10:49:30Z", + "updated_at": "2024-08-07T15:11:24Z", "pushed_at": "2024-03-15T02:02:35Z", - "stargazers_count": 166, - "watchers_count": 166, + "stargazers_count": 167, + "watchers_count": 167, "has_discussions": false, "forks_count": 24, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 24, - "watchers": 166, + "watchers": 167, "score": 0, "subscribers_count": 4 }, diff --git a/2023/CVE-2023-42442.json b/2023/CVE-2023-42442.json index 5d77677b35..0ef464ca05 100644 --- a/2023/CVE-2023-42442.json +++ b/2023/CVE-2023-42442.json @@ -43,10 +43,10 @@ "description": "JumpServer 堡垒机未授权综合漏洞利用, Exploit for CVE-2023-42442 \/ CVE-2023-42820 \/ RCE 2021", "fork": false, "created_at": "2023-10-14T09:35:07Z", - "updated_at": "2024-08-01T07:54:32Z", + "updated_at": "2024-08-07T14:38:53Z", "pushed_at": "2024-05-16T07:42:00Z", - "stargazers_count": 196, - "watchers_count": 196, + "stargazers_count": 197, + "watchers_count": 197, "has_discussions": false, "forks_count": 19, "allow_forking": true, @@ -59,7 +59,7 @@ ], "visibility": "public", "forks": 19, - "watchers": 196, + "watchers": 197, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-0044.json b/2024/CVE-2024-0044.json index 4632a39a4a..59aae4667d 100644 --- a/2024/CVE-2024-0044.json +++ b/2024/CVE-2024-0044.json @@ -43,10 +43,10 @@ "description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13", "fork": false, "created_at": "2024-06-18T12:30:53Z", - "updated_at": "2024-08-07T11:53:10Z", + "updated_at": "2024-08-07T12:40:16Z", "pushed_at": "2024-07-25T18:12:57Z", - "stargazers_count": 185, - "watchers_count": 185, + "stargazers_count": 186, + "watchers_count": 186, "has_discussions": false, "forks_count": 42, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 42, - "watchers": 185, + "watchers": 186, "score": 0, "subscribers_count": 5 }, @@ -73,10 +73,10 @@ "description": "利用 CVE-2024-0044 Android 权限提升下载任意目标App沙箱文件。", "fork": false, "created_at": "2024-07-03T10:29:06Z", - "updated_at": "2024-08-06T05:25:02Z", + "updated_at": "2024-08-07T14:53:41Z", "pushed_at": "2024-07-12T02:59:00Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 3, + "watchers": 2, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-21338.json b/2024/CVE-2024-21338.json index b8a415eb0a..0bb462e930 100644 --- a/2024/CVE-2024-21338.json +++ b/2024/CVE-2024-21338.json @@ -13,10 +13,10 @@ "description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.", "fork": false, "created_at": "2024-04-13T05:53:02Z", - "updated_at": "2024-08-06T16:56:21Z", + "updated_at": "2024-08-07T12:55:15Z", "pushed_at": "2024-04-16T21:00:14Z", - "stargazers_count": 252, - "watchers_count": 252, + "stargazers_count": 254, + "watchers_count": 254, "has_discussions": false, "forks_count": 57, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 57, - "watchers": 252, + "watchers": 254, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-21413.json b/2024/CVE-2024-21413.json index 719004ee63..bff13c6df0 100644 --- a/2024/CVE-2024-21413.json +++ b/2024/CVE-2024-21413.json @@ -48,13 +48,13 @@ "stargazers_count": 656, "watchers_count": 656, "has_discussions": false, - "forks_count": 145, + "forks_count": 146, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 145, + "forks": 146, "watchers": 656, "score": 0, "subscribers_count": 10 diff --git a/2024/CVE-2024-27348.json b/2024/CVE-2024-27348.json index c168f035c1..12c49001a6 100644 --- a/2024/CVE-2024-27348.json +++ b/2024/CVE-2024-27348.json @@ -13,12 +13,12 @@ "description": "Apache HugeGraph Server RCE Scanner ( CVE-2024-27348 )", "fork": false, "created_at": "2024-05-31T20:11:37Z", - "updated_at": "2024-07-18T04:27:14Z", + "updated_at": "2024-08-07T12:47:26Z", "pushed_at": "2024-06-08T09:12:43Z", - "stargazers_count": 53, - "watchers_count": 53, + "stargazers_count": 54, + "watchers_count": 54, "has_discussions": false, - "forks_count": 13, + "forks_count": 14, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -31,8 +31,8 @@ "vulnerability-scanners" ], "visibility": "public", - "forks": 13, - "watchers": 53, + "forks": 14, + "watchers": 54, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-2961.json b/2024/CVE-2024-2961.json index 638558c396..989c2ebf3b 100644 --- a/2024/CVE-2024-2961.json +++ b/2024/CVE-2024-2961.json @@ -73,10 +73,10 @@ "description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()", "fork": false, "created_at": "2024-05-27T08:30:06Z", - "updated_at": "2024-08-01T03:25:52Z", + "updated_at": "2024-08-07T12:36:29Z", "pushed_at": "2024-07-29T12:20:50Z", - "stargazers_count": 345, - "watchers_count": 345, + "stargazers_count": 346, + "watchers_count": 346, "has_discussions": false, "forks_count": 47, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 47, - "watchers": 345, + "watchers": 346, "score": 0, "subscribers_count": 7 }, diff --git a/2024/CVE-2024-29849.json b/2024/CVE-2024-29849.json index 8f79140f6c..984da27fde 100644 --- a/2024/CVE-2024-29849.json +++ b/2024/CVE-2024-29849.json @@ -18,13 +18,13 @@ "stargazers_count": 84, "watchers_count": 84, "has_discussions": false, - "forks_count": 13, + "forks_count": 14, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 13, + "forks": 14, "watchers": 84, "score": 0, "subscribers_count": 2 diff --git a/2024/CVE-2024-30088.json b/2024/CVE-2024-30088.json index eed2102a95..7160c9548e 100644 --- a/2024/CVE-2024-30088.json +++ b/2024/CVE-2024-30088.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2024-06-24T10:37:26Z", - "updated_at": "2024-08-07T12:16:21Z", + "updated_at": "2024-08-07T14:41:23Z", "pushed_at": "2024-07-31T19:11:55Z", - "stargazers_count": 187, - "watchers_count": 187, + "stargazers_count": 188, + "watchers_count": 188, "has_discussions": false, "forks_count": 43, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 43, - "watchers": 187, + "watchers": 188, "score": 0, "subscribers_count": 3 }, @@ -103,10 +103,10 @@ "description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088", "fork": false, "created_at": "2024-07-15T08:07:05Z", - "updated_at": "2024-08-06T23:20:11Z", + "updated_at": "2024-08-07T15:08:58Z", "pushed_at": "2024-07-18T01:28:46Z", - "stargazers_count": 285, - "watchers_count": 285, + "stargazers_count": 286, + "watchers_count": 286, "has_discussions": false, "forks_count": 25, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 25, - "watchers": 285, + "watchers": 286, "score": 0, "subscribers_count": 14 }, diff --git a/2024/CVE-2024-32113.json b/2024/CVE-2024-32113.json index 63492b386e..95d52ba2a7 100644 --- a/2024/CVE-2024-32113.json +++ b/2024/CVE-2024-32113.json @@ -13,10 +13,10 @@ "description": "Apache OfBiz vulns", "fork": false, "created_at": "2024-04-10T13:22:11Z", - "updated_at": "2024-08-07T05:22:02Z", + "updated_at": "2024-08-07T13:38:23Z", "pushed_at": "2024-08-05T06:40:47Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-41958.json b/2024/CVE-2024-41958.json index 9b0f092840..d56a740383 100644 --- a/2024/CVE-2024-41958.json +++ b/2024/CVE-2024-41958.json @@ -13,10 +13,10 @@ "description": "This is a small proof of concept for CVE-2024-41958", "fork": false, "created_at": "2024-08-05T19:10:08Z", - "updated_at": "2024-08-06T23:19:33Z", + "updated_at": "2024-08-07T14:00:57Z", "pushed_at": "2024-08-05T20:22:52Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-4577.json b/2024/CVE-2024-4577.json index aa1de569f9..b8e34f422e 100644 --- a/2024/CVE-2024-4577.json +++ b/2024/CVE-2024-4577.json @@ -163,19 +163,19 @@ "description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC", "fork": false, "created_at": "2024-06-07T09:52:54Z", - "updated_at": "2024-08-05T17:01:03Z", + "updated_at": "2024-08-07T12:42:53Z", "pushed_at": "2024-06-22T15:13:52Z", - "stargazers_count": 184, - "watchers_count": 184, + "stargazers_count": 185, + "watchers_count": 185, "has_discussions": false, - "forks_count": 39, + "forks_count": 41, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 39, - "watchers": 184, + "forks": 41, + "watchers": 185, "score": 0, "subscribers_count": 4 }, diff --git a/2024/CVE-2024-4879.json b/2024/CVE-2024-4879.json index be41eae699..2a50e03465 100644 --- a/2024/CVE-2024-4879.json +++ b/2024/CVE-2024-4879.json @@ -193,10 +193,10 @@ "description": "CVE-2024-4879 & CVE-2024-5217 ServiceNow RCE Scanning Using Nuclei & Shodan Dork to find it.", "fork": false, "created_at": "2024-07-28T06:51:33Z", - "updated_at": "2024-08-03T03:09:59Z", + "updated_at": "2024-08-07T14:31:30Z", "pushed_at": "2024-08-03T03:09:56Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -205,7 +205,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-6782.json b/2024/CVE-2024-6782.json index 89b396e444..aec373ce5c 100644 --- a/2024/CVE-2024-6782.json +++ b/2024/CVE-2024-6782.json @@ -13,19 +13,19 @@ "description": "Calibre 远程代码执行(CVE-2024-6782)Improper access control in Calibre 6.9.0 ~ 7.14.0 allow unauthenticated attackers to achieve remote code execution.", "fork": false, "created_at": "2024-08-06T15:31:48Z", - "updated_at": "2024-08-07T08:09:49Z", + "updated_at": "2024-08-07T13:32:43Z", "pushed_at": "2024-08-06T15:35:37Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, - "forks_count": 2, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, - "watchers": 3, + "forks": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-7339.json b/2024/CVE-2024-7339.json index 1839be8f44..060b2825a4 100644 --- a/2024/CVE-2024-7339.json +++ b/2024/CVE-2024-7339.json @@ -13,10 +13,10 @@ "description": "An Vulnerability detection and Exploitation tool for CVE-2024-7339", "fork": false, "created_at": "2024-08-05T16:26:18Z", - "updated_at": "2024-08-07T02:54:22Z", + "updated_at": "2024-08-07T18:33:15Z", "pushed_at": "2024-08-05T16:41:15Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 10, + "watchers": 11, "score": 0, "subscribers_count": 1 } diff --git a/README.md b/README.md index 4d693b8bc4..1e9e656ba5 100644 --- a/README.md +++ b/README.md @@ -39100,7 +39100,7 @@ - [denchief1/CVE-2017-7269_Python3](https://github.com/denchief1/CVE-2017-7269_Python3) - [denchief1/CVE-2017-7269](https://github.com/denchief1/CVE-2017-7269) - [Cappricio-Securities/CVE-2017-7269](https://github.com/Cappricio-Securities/CVE-2017-7269) -- [OmarSuarezDoro/CVE-2017-7269](https://github.com/OmarSuarezDoro/CVE-2017-7269) +- [VanishedPeople/CVE-2017-7269](https://github.com/VanishedPeople/CVE-2017-7269) ### CVE-2017-7308 (2017-03-29)