From 088987f975c5eaf9ce9ae77c187f8142f9a1f277 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Wed, 4 Dec 2024 21:32:39 +0900 Subject: [PATCH] Auto Update 2024/12/04 12:32:39 --- 2014/CVE-2014-4210.json | 8 +++--- 2015/CVE-2015-6639.json | 8 +++--- 2016/CVE-2016-0638.json | 8 +++--- 2016/CVE-2016-2431.json | 8 +++--- 2016/CVE-2016-5195.json | 8 +++--- 2017/CVE-2017-3248.json | 8 +++--- 2018/CVE-2018-17240.json | 2 +- 2018/CVE-2018-2628.json | 8 +++--- 2018/CVE-2018-6242.json | 8 +++--- 2019/CVE-2019-0232.json | 8 +++--- 2019/CVE-2019-0708.json | 8 +++--- 2019/CVE-2019-1040.json | 8 +++--- 2019/CVE-2019-17558.json | 8 +++--- 2019/CVE-2019-2618.json | 16 ++++++------ 2019/CVE-2019-2725.json | 8 +++--- 2020/CVE-2020-0022.json | 8 +++--- 2020/CVE-2020-0796.json | 24 +++++++++--------- 2020/CVE-2020-14144.json | 8 +++--- 2020/CVE-2020-14882.json | 8 +++--- 2020/CVE-2020-17087.json | 8 +++--- 2020/CVE-2020-1938.json | 8 +++--- 2020/CVE-2020-2551.json | 16 ++++++------ 2020/CVE-2020-5902.json | 8 +++--- 2021/CVE-2021-21234.json | 8 +++--- 2021/CVE-2021-2471.json | 8 +++--- 2021/CVE-2021-29441.json | 31 ++++++++++++++++++++++ 2021/CVE-2021-29442.json | 8 +++--- 2021/CVE-2021-3129.json | 8 +++--- 2021/CVE-2021-40444.json | 8 +++--- 2021/CVE-2021-41773.json | 55 +++++++++------------------------------- 2021/CVE-2021-42260.json | 33 ++++++++++++++++++++++++ 2021/CVE-2021-44228.json | 39 +++------------------------- 2022/CVE-2022-26134.json | 8 +++--- 2022/CVE-2022-26809.json | 8 +++--- 2022/CVE-2022-42864.json | 8 +++--- 2022/CVE-2022-46689.json | 8 +++--- 2023/CVE-2023-27997.json | 8 +++--- 2023/CVE-2023-32784.json | 31 ++++++++++++++++++++++ 2023/CVE-2023-34194.json | 33 ++++++++++++++++++++++++ 2023/CVE-2023-36845.json | 35 ------------------------- 2023/CVE-2023-36899.json | 8 +++--- 2023/CVE-2023-46604.json | 4 +-- 2023/CVE-2023-50387.json | 31 ++++++++++++++++++++++ 2024/CVE-2024-0044.json | 8 +++--- 2024/CVE-2024-10220.json | 8 +++--- 2024/CVE-2024-10924.json | 20 ++++++++++++--- 2024/CVE-2024-11320.json | 8 +++--- 2024/CVE-2024-21413.json | 40 +++++++++++++++++++++++++++++ 2024/CVE-2024-21534.json | 8 +++--- 2024/CVE-2024-21762.json | 8 +++--- 2024/CVE-2024-23692.json | 8 +++--- 2024/CVE-2024-26229.json | 8 +++--- 2024/CVE-2024-27130.json | 8 +++--- 2024/CVE-2024-29868.json | 8 +++--- 2024/CVE-2024-3094.json | 8 +++--- 2024/CVE-2024-37084.json | 8 +++--- 2024/CVE-2024-38193.json | 12 ++++----- 2024/CVE-2024-38856.json | 8 +++--- 2024/CVE-2024-40711.json | 8 +++--- 2024/CVE-2024-42327.json | 18 ++++++------- 2024/CVE-2024-42640.json | 4 +-- 2024/CVE-2024-43425.json | 8 +++--- 2024/CVE-2024-45519.json | 8 +++--- 2024/CVE-2024-47575.json | 8 +++--- 2024/CVE-2024-49039.json | 12 ++++----- 2024/CVE-2024-5124.json | 10 ++++---- 2024/CVE-2024-51567.json | 8 +++--- 2024/CVE-2024-52680.json | 2 +- 2024/CVE-2024-53259.json | 33 ++++++++++++++++++++++++ 2024/CVE-2024-5910.json | 31 ++++++++++++++++++++++ 2024/CVE-2024-7965.json | 8 +++--- 2024/CVE-2024-8672.json | 4 +-- 2024/CVE-2024-9465.json | 10 ++++---- README.md | 29 ++++++++++++++++++--- 74 files changed, 580 insertions(+), 379 deletions(-) create mode 100644 2021/CVE-2021-42260.json create mode 100644 2023/CVE-2023-34194.json create mode 100644 2024/CVE-2024-53259.json diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index d0e04e59a4..9e1f959f43 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -45,10 +45,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-12-04T02:32:21Z", + "updated_at": "2024-12-04T10:12:23Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 2013, - "watchers_count": 2013, + "stargazers_count": 2012, + "watchers_count": 2012, "has_discussions": true, "forks_count": 340, "allow_forking": true, @@ -78,7 +78,7 @@ ], "visibility": "public", "forks": 340, - "watchers": 2013, + "watchers": 2012, "score": 0, "subscribers_count": 37 }, diff --git a/2015/CVE-2015-6639.json b/2015/CVE-2015-6639.json index b914d24e9e..9019c4662b 100644 --- a/2015/CVE-2015-6639.json +++ b/2015/CVE-2015-6639.json @@ -45,10 +45,10 @@ "description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431", "fork": false, "created_at": "2016-06-30T11:56:44Z", - "updated_at": "2024-11-16T02:44:07Z", + "updated_at": "2024-12-04T06:45:11Z", "pushed_at": "2016-06-30T15:32:42Z", - "stargazers_count": 340, - "watchers_count": 340, + "stargazers_count": 339, + "watchers_count": 339, "has_discussions": false, "forks_count": 110, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 110, - "watchers": 340, + "watchers": 339, "score": 0, "subscribers_count": 48 } diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index ba821b58ec..38f2bea75a 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -14,10 +14,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-12-04T02:32:21Z", + "updated_at": "2024-12-04T10:12:23Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 2013, - "watchers_count": 2013, + "stargazers_count": 2012, + "watchers_count": 2012, "has_discussions": true, "forks_count": 340, "allow_forking": true, @@ -47,7 +47,7 @@ ], "visibility": "public", "forks": 340, - "watchers": 2013, + "watchers": 2012, "score": 0, "subscribers_count": 37 }, diff --git a/2016/CVE-2016-2431.json b/2016/CVE-2016-2431.json index cac6781f45..c99b4680d4 100644 --- a/2016/CVE-2016-2431.json +++ b/2016/CVE-2016-2431.json @@ -45,10 +45,10 @@ "description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431", "fork": false, "created_at": "2016-06-30T11:56:44Z", - "updated_at": "2024-11-16T02:44:07Z", + "updated_at": "2024-12-04T06:45:11Z", "pushed_at": "2016-06-30T15:32:42Z", - "stargazers_count": 340, - "watchers_count": 340, + "stargazers_count": 339, + "watchers_count": 339, "has_discussions": false, "forks_count": 110, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 110, - "watchers": 340, + "watchers": 339, "score": 0, "subscribers_count": 48 } diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json index c07b19f607..2076626111 100644 --- a/2016/CVE-2016-5195.json +++ b/2016/CVE-2016-5195.json @@ -272,10 +272,10 @@ "description": "A CVE-2016-5195 exploit example.", "fork": false, "created_at": "2016-10-23T00:16:33Z", - "updated_at": "2024-11-27T10:43:05Z", + "updated_at": "2024-12-04T10:09:50Z", "pushed_at": "2017-03-21T16:46:38Z", - "stargazers_count": 316, - "watchers_count": 316, + "stargazers_count": 315, + "watchers_count": 315, "has_discussions": false, "forks_count": 120, "allow_forking": true, @@ -288,7 +288,7 @@ ], "visibility": "public", "forks": 120, - "watchers": 316, + "watchers": 315, "score": 0, "subscribers_count": 16 }, diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index ae7c30c2e9..8432023abc 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -45,10 +45,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-12-04T02:32:21Z", + "updated_at": "2024-12-04T10:12:23Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 2013, - "watchers_count": 2013, + "stargazers_count": 2012, + "watchers_count": 2012, "has_discussions": true, "forks_count": 340, "allow_forking": true, @@ -78,7 +78,7 @@ ], "visibility": "public", "forks": 340, - "watchers": 2013, + "watchers": 2012, "score": 0, "subscribers_count": 37 }, diff --git a/2018/CVE-2018-17240.json b/2018/CVE-2018-17240.json index 88d89350d0..8954b1330e 100644 --- a/2018/CVE-2018-17240.json +++ b/2018/CVE-2018-17240.json @@ -46,7 +46,7 @@ "fork": false, "created_at": "2024-01-04T21:44:21Z", "updated_at": "2024-12-02T17:21:33Z", - "pushed_at": "2024-12-02T17:21:30Z", + "pushed_at": "2024-12-04T09:38:17Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 63f31d07a7..0b171f8daf 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -576,10 +576,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-12-04T02:32:21Z", + "updated_at": "2024-12-04T10:12:23Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 2013, - "watchers_count": 2013, + "stargazers_count": 2012, + "watchers_count": 2012, "has_discussions": true, "forks_count": 340, "allow_forking": true, @@ -609,7 +609,7 @@ ], "visibility": "public", "forks": 340, - "watchers": 2013, + "watchers": 2012, "score": 0, "subscribers_count": 37 }, diff --git a/2018/CVE-2018-6242.json b/2018/CVE-2018-6242.json index fc10460ab1..a8fea6bc4e 100644 --- a/2018/CVE-2018-6242.json +++ b/2018/CVE-2018-6242.json @@ -14,10 +14,10 @@ "description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)", "fork": false, "created_at": "2018-04-28T11:50:00Z", - "updated_at": "2024-11-22T21:23:56Z", + "updated_at": "2024-12-04T08:14:45Z", "pushed_at": "2022-12-11T10:44:39Z", - "stargazers_count": 528, - "watchers_count": 528, + "stargazers_count": 529, + "watchers_count": 529, "has_discussions": false, "forks_count": 55, "allow_forking": true, @@ -33,7 +33,7 @@ ], "visibility": "public", "forks": 55, - "watchers": 528, + "watchers": 529, "score": 0, "subscribers_count": 55 }, diff --git a/2019/CVE-2019-0232.json b/2019/CVE-2019-0232.json index ae843999fd..0af2db2a35 100644 --- a/2019/CVE-2019-0232.json +++ b/2019/CVE-2019-0232.json @@ -14,10 +14,10 @@ "description": "Apache Tomcat Remote Code Execution on Windows", "fork": false, "created_at": "2019-04-15T07:54:25Z", - "updated_at": "2024-08-12T19:47:56Z", + "updated_at": "2024-12-04T10:13:12Z", "pushed_at": "2019-11-27T07:39:40Z", - "stargazers_count": 185, - "watchers_count": 185, + "stargazers_count": 184, + "watchers_count": 184, "has_discussions": false, "forks_count": 55, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 55, - "watchers": 185, + "watchers": 184, "score": 0, "subscribers_count": 3 }, diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 2352509a25..6635892803 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -1618,10 +1618,10 @@ "description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.", "fork": false, "created_at": "2019-05-23T22:50:12Z", - "updated_at": "2024-12-01T12:18:09Z", + "updated_at": "2024-12-04T08:31:06Z", "pushed_at": "2019-06-22T21:48:45Z", - "stargazers_count": 896, - "watchers_count": 896, + "stargazers_count": 897, + "watchers_count": 897, "has_discussions": false, "forks_count": 242, "allow_forking": true, @@ -1630,7 +1630,7 @@ "topics": [], "visibility": "public", "forks": 242, - "watchers": 896, + "watchers": 897, "score": 0, "subscribers_count": 55 }, diff --git a/2019/CVE-2019-1040.json b/2019/CVE-2019-1040.json index 2f2fca5a28..1d472b2631 100644 --- a/2019/CVE-2019-1040.json +++ b/2019/CVE-2019-1040.json @@ -107,10 +107,10 @@ "description": null, "fork": false, "created_at": "2019-06-24T15:33:50Z", - "updated_at": "2024-11-13T12:58:30Z", + "updated_at": "2024-12-04T08:34:29Z", "pushed_at": "2020-11-09T07:33:12Z", - "stargazers_count": 287, - "watchers_count": 287, + "stargazers_count": 286, + "watchers_count": 286, "has_discussions": false, "forks_count": 54, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 54, - "watchers": 287, + "watchers": 286, "score": 0, "subscribers_count": 8 }, diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 834a592981..4622b82f19 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -45,10 +45,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2024-12-02T12:12:56Z", + "updated_at": "2024-12-04T10:18:27Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 4136, - "watchers_count": 4136, + "stargazers_count": 4135, + "watchers_count": 4135, "has_discussions": false, "forks_count": 1099, "allow_forking": true, @@ -77,7 +77,7 @@ ], "visibility": "public", "forks": 1099, - "watchers": 4136, + "watchers": 4135, "score": 0, "subscribers_count": 149 }, diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 241d515777..97bd002450 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -107,10 +107,10 @@ "description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持", "fork": false, "created_at": "2019-06-21T09:22:43Z", - "updated_at": "2024-12-04T02:32:27Z", + "updated_at": "2024-12-04T10:09:56Z", "pushed_at": "2024-06-16T15:35:20Z", - "stargazers_count": 953, - "watchers_count": 953, + "stargazers_count": 952, + "watchers_count": 952, "has_discussions": false, "forks_count": 178, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 178, - "watchers": 953, + "watchers": 952, "score": 0, "subscribers_count": 18 }, @@ -200,10 +200,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-12-04T02:32:21Z", + "updated_at": "2024-12-04T10:12:23Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 2013, - "watchers_count": 2013, + "stargazers_count": 2012, + "watchers_count": 2012, "has_discussions": true, "forks_count": 340, "allow_forking": true, @@ -233,7 +233,7 @@ ], "visibility": "public", "forks": 340, - "watchers": 2013, + "watchers": 2012, "score": 0, "subscribers_count": 37 } diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json index 00359542b6..e6981a0034 100644 --- a/2019/CVE-2019-2725.json +++ b/2019/CVE-2019-2725.json @@ -231,10 +231,10 @@ "description": "CVE-2019-2725 命令回显", "fork": false, "created_at": "2019-05-29T01:57:05Z", - "updated_at": "2024-10-15T07:32:48Z", + "updated_at": "2024-12-04T10:14:02Z", "pushed_at": "2023-05-08T16:23:06Z", - "stargazers_count": 438, - "watchers_count": 438, + "stargazers_count": 437, + "watchers_count": 437, "has_discussions": false, "forks_count": 162, "allow_forking": true, @@ -243,7 +243,7 @@ "topics": [], "visibility": "public", "forks": 162, - "watchers": 438, + "watchers": 437, "score": 0, "subscribers_count": 9 }, diff --git a/2020/CVE-2020-0022.json b/2020/CVE-2020-0022.json index 7a72daf976..39b95049d6 100644 --- a/2020/CVE-2020-0022.json +++ b/2020/CVE-2020-0022.json @@ -200,10 +200,10 @@ "description": "A fully public exploit of the CVE-2020-0022 BlueFrag Android RCE Vulnerability (tested on Pixel 3 XL)", "fork": false, "created_at": "2023-08-28T09:20:38Z", - "updated_at": "2024-11-30T08:28:57Z", + "updated_at": "2024-12-04T12:14:41Z", "pushed_at": "2023-11-21T13:32:01Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -227,7 +227,7 @@ ], "visibility": "public", "forks": 6, - "watchers": 11, + "watchers": 12, "score": 0, "subscribers_count": 1 } diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 7170380e9d..690005a238 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -138,10 +138,10 @@ "description": "Scanner for CVE-2020-0796 - SMBv3 RCE", "fork": false, "created_at": "2020-03-11T15:21:27Z", - "updated_at": "2024-11-26T23:51:11Z", + "updated_at": "2024-12-04T07:18:39Z", "pushed_at": "2020-10-01T08:36:29Z", - "stargazers_count": 666, - "watchers_count": 666, + "stargazers_count": 667, + "watchers_count": 667, "has_discussions": false, "forks_count": 197, "allow_forking": true, @@ -152,7 +152,7 @@ ], "visibility": "public", "forks": 197, - "watchers": 666, + "watchers": 667, "score": 0, "subscribers_count": 26 }, @@ -461,10 +461,10 @@ "description": "PoC for triggering buffer overflow via CVE-2020-0796", "fork": false, "created_at": "2020-03-12T18:34:40Z", - "updated_at": "2024-10-29T21:41:51Z", + "updated_at": "2024-12-04T11:12:46Z", "pushed_at": "2023-02-26T07:01:03Z", - "stargazers_count": 321, - "watchers_count": 321, + "stargazers_count": 322, + "watchers_count": 322, "has_discussions": false, "forks_count": 121, "allow_forking": true, @@ -478,7 +478,7 @@ ], "visibility": "public", "forks": 121, - "watchers": 321, + "watchers": 322, "score": 0, "subscribers_count": 19 }, @@ -1039,10 +1039,10 @@ "description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost", "fork": false, "created_at": "2020-03-30T11:42:56Z", - "updated_at": "2024-11-21T08:35:28Z", + "updated_at": "2024-12-04T06:56:00Z", "pushed_at": "2020-12-07T20:04:27Z", - "stargazers_count": 1304, - "watchers_count": 1304, + "stargazers_count": 1305, + "watchers_count": 1305, "has_discussions": false, "forks_count": 343, "allow_forking": true, @@ -1057,7 +1057,7 @@ ], "visibility": "public", "forks": 343, - "watchers": 1304, + "watchers": 1305, "score": 0, "subscribers_count": 34 }, diff --git a/2020/CVE-2020-14144.json b/2020/CVE-2020-14144.json index c145de3d1e..0e93f6f752 100644 --- a/2020/CVE-2020-14144.json +++ b/2020/CVE-2020-14144.json @@ -14,10 +14,10 @@ "description": "A script to exploit CVE-2020-14144 - GiTea authenticated Remote Code Execution using git hooks", "fork": false, "created_at": "2022-03-08T17:14:27Z", - "updated_at": "2024-12-03T08:48:07Z", + "updated_at": "2024-12-04T08:36:15Z", "pushed_at": "2022-05-03T10:40:14Z", - "stargazers_count": 20, - "watchers_count": 20, + "stargazers_count": 21, + "watchers_count": 21, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 5, - "watchers": 20, + "watchers": 21, "score": 0, "subscribers_count": 2 } diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index c70850e7da..3c62b62791 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -14,10 +14,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2024-12-02T12:12:56Z", + "updated_at": "2024-12-04T10:18:27Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 4136, - "watchers_count": 4136, + "stargazers_count": 4135, + "watchers_count": 4135, "has_discussions": false, "forks_count": 1099, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 1099, - "watchers": 4136, + "watchers": 4135, "score": 0, "subscribers_count": 149 }, diff --git a/2020/CVE-2020-17087.json b/2020/CVE-2020-17087.json index 9f89c73c52..714947ecbb 100644 --- a/2020/CVE-2020-17087.json +++ b/2020/CVE-2020-17087.json @@ -76,10 +76,10 @@ "description": "Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CVE-2020-17087 and an off-by-one overflow", "fork": false, "created_at": "2021-07-02T16:03:16Z", - "updated_at": "2024-12-02T00:41:17Z", + "updated_at": "2024-12-04T08:52:09Z", "pushed_at": "2022-09-01T06:33:36Z", - "stargazers_count": 180, - "watchers_count": 180, + "stargazers_count": 181, + "watchers_count": 181, "has_discussions": false, "forks_count": 49, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 49, - "watchers": 180, + "watchers": 181, "score": 0, "subscribers_count": 7 }, diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index a759baf274..4ac2b608b2 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -107,10 +107,10 @@ "description": "Cnvd-2020-10487 \/ cve-2020-1938, scanner tool", "fork": false, "created_at": "2020-02-20T21:00:15Z", - "updated_at": "2024-11-18T08:48:23Z", + "updated_at": "2024-12-04T10:06:34Z", "pushed_at": "2021-11-26T07:40:35Z", - "stargazers_count": 294, - "watchers_count": 294, + "stargazers_count": 293, + "watchers_count": 293, "has_discussions": false, "forks_count": 96, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 96, - "watchers": 294, + "watchers": 293, "score": 0, "subscribers_count": 8 }, diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 8798bc7b52..a01d073816 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -14,10 +14,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-12-04T02:32:21Z", + "updated_at": "2024-12-04T10:12:23Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 2013, - "watchers_count": 2013, + "stargazers_count": 2012, + "watchers_count": 2012, "has_discussions": true, "forks_count": 340, "allow_forking": true, @@ -47,7 +47,7 @@ ], "visibility": "public", "forks": 340, - "watchers": 2013, + "watchers": 2012, "score": 0, "subscribers_count": 37 }, @@ -128,10 +128,10 @@ "description": "Weblogic IIOP CVE-2020-2551", "fork": false, "created_at": "2020-02-28T08:46:21Z", - "updated_at": "2024-11-01T02:37:51Z", + "updated_at": "2024-12-04T10:13:48Z", "pushed_at": "2020-04-07T03:32:24Z", - "stargazers_count": 333, - "watchers_count": 333, + "stargazers_count": 332, + "watchers_count": 332, "has_discussions": false, "forks_count": 77, "allow_forking": true, @@ -140,7 +140,7 @@ "topics": [], "visibility": "public", "forks": 77, - "watchers": 333, + "watchers": 332, "score": 0, "subscribers_count": 4 }, diff --git a/2020/CVE-2020-5902.json b/2020/CVE-2020-5902.json index bf6f859652..f709c3ae50 100644 --- a/2020/CVE-2020-5902.json +++ b/2020/CVE-2020-5902.json @@ -82,10 +82,10 @@ "description": "CVE-2020-5902 BIG-IP", "fork": false, "created_at": "2020-07-05T16:38:32Z", - "updated_at": "2024-08-12T20:03:24Z", + "updated_at": "2024-12-04T10:10:24Z", "pushed_at": "2021-10-13T07:53:46Z", - "stargazers_count": 372, - "watchers_count": 372, + "stargazers_count": 371, + "watchers_count": 371, "has_discussions": false, "forks_count": 112, "allow_forking": true, @@ -94,7 +94,7 @@ "topics": [], "visibility": "public", "forks": 112, - "watchers": 372, + "watchers": 371, "score": 0, "subscribers_count": 9 }, diff --git a/2021/CVE-2021-21234.json b/2021/CVE-2021-21234.json index f4f949e8cf..dc5b5b8210 100644 --- a/2021/CVE-2021-21234.json +++ b/2021/CVE-2021-21234.json @@ -45,10 +45,10 @@ "description": null, "fork": false, "created_at": "2021-10-19T01:08:48Z", - "updated_at": "2023-08-24T05:14:06Z", + "updated_at": "2024-12-04T10:07:11Z", "pushed_at": "2021-10-19T01:18:49Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 6, + "watchers": 5, "score": 0, "subscribers_count": 2 } diff --git a/2021/CVE-2021-2471.json b/2021/CVE-2021-2471.json index d0a24a0483..8cc6c34866 100644 --- a/2021/CVE-2021-2471.json +++ b/2021/CVE-2021-2471.json @@ -14,10 +14,10 @@ "description": "h2-jdbc(https:\/\/github.com\/h2database\/h2database\/issues\/3195) & mysql-jdbc(CVE-2021-2471) SQLXML XXE vulnerability reproduction.", "fork": false, "created_at": "2021-10-22T07:14:25Z", - "updated_at": "2024-08-12T20:17:27Z", + "updated_at": "2024-12-04T06:53:55Z", "pushed_at": "2021-12-12T06:16:02Z", - "stargazers_count": 52, - "watchers_count": 52, + "stargazers_count": 53, + "watchers_count": 53, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 52, + "watchers": 53, "score": 0, "subscribers_count": 1 }, diff --git a/2021/CVE-2021-29441.json b/2021/CVE-2021-29441.json index de3832d6b4..bffadc41d7 100644 --- a/2021/CVE-2021-29441.json +++ b/2021/CVE-2021-29441.json @@ -60,5 +60,36 @@ "watchers": 2, "score": 0, "subscribers_count": 1 + }, + { + "id": 898307814, + "name": "CVE-2021-29441", + "full_name": "azhao1981\/CVE-2021-29441", + "owner": { + "login": "azhao1981", + "id": 352355, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/352355?v=4", + "html_url": "https:\/\/github.com\/azhao1981", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/azhao1981\/CVE-2021-29441", + "description": null, + "fork": false, + "created_at": "2024-12-04T06:55:24Z", + "updated_at": "2024-12-04T06:56:15Z", + "pushed_at": "2024-12-04T06:56:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-29442.json b/2021/CVE-2021-29442.json index 95f45b0030..c73cbe6460 100644 --- a/2021/CVE-2021-29442.json +++ b/2021/CVE-2021-29442.json @@ -45,10 +45,10 @@ "description": "Nacos Derby命令执行漏洞利用脚本", "fork": false, "created_at": "2024-11-22T01:32:37Z", - "updated_at": "2024-12-02T02:55:21Z", + "updated_at": "2024-12-04T06:57:44Z", "pushed_at": "2024-11-22T01:33:26Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 } diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index 7e306112f6..8eb45ba7dd 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -204,10 +204,10 @@ "description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)", "fork": false, "created_at": "2021-02-18T05:42:13Z", - "updated_at": "2024-11-23T08:57:08Z", + "updated_at": "2024-12-04T09:45:01Z", "pushed_at": "2021-12-14T05:12:17Z", - "stargazers_count": 148, - "watchers_count": 148, + "stargazers_count": 147, + "watchers_count": 147, "has_discussions": false, "forks_count": 58, "allow_forking": true, @@ -216,7 +216,7 @@ "topics": [], "visibility": "public", "forks": 58, - "watchers": 148, + "watchers": 147, "score": 0, "subscribers_count": 1 }, diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index 2d0a922f76..db99304251 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -231,10 +231,10 @@ "description": "CVE-2021-40444 PoC", "fork": false, "created_at": "2021-09-10T16:55:53Z", - "updated_at": "2024-12-02T12:19:35Z", + "updated_at": "2024-12-04T10:06:55Z", "pushed_at": "2021-12-25T18:31:02Z", - "stargazers_count": 1602, - "watchers_count": 1602, + "stargazers_count": 1601, + "watchers_count": 1601, "has_discussions": false, "forks_count": 482, "allow_forking": true, @@ -243,7 +243,7 @@ "topics": [], "visibility": "public", "forks": 482, - "watchers": 1602, + "watchers": 1601, "score": 0, "subscribers_count": 28 }, diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json index 9136f63ced..59e0fbf3c5 100644 --- a/2021/CVE-2021-41773.json +++ b/2021/CVE-2021-41773.json @@ -1195,10 +1195,10 @@ "description": "This is a simple POC for Apache\/2.4.49 Path Traversal Vulnerability", "fork": false, "created_at": "2021-10-08T01:13:33Z", - "updated_at": "2024-08-12T20:17:05Z", + "updated_at": "2024-12-04T10:08:03Z", "pushed_at": "2021-11-12T00:03:34Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -1207,7 +1207,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 2, + "watchers": 1, "score": 0, "subscribers_count": 1 }, @@ -1449,10 +1449,10 @@ "description": "CVE-2021-41773 CVE-2021-42013漏洞批量检测工具", "fork": false, "created_at": "2021-10-09T03:32:18Z", - "updated_at": "2024-11-06T23:16:22Z", + "updated_at": "2024-12-04T10:07:59Z", "pushed_at": "2021-10-09T03:49:21Z", - "stargazers_count": 148, - "watchers_count": 148, + "stargazers_count": 147, + "watchers_count": 147, "has_discussions": false, "forks_count": 51, "allow_forking": true, @@ -1461,7 +1461,7 @@ "topics": [], "visibility": "public", "forks": 51, - "watchers": 148, + "watchers": 147, "score": 0, "subscribers_count": 3 }, @@ -2232,37 +2232,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 447314257, - "name": "CVE-2021-41773-exploiter", - "full_name": "norrig\/CVE-2021-41773-exploiter", - "owner": { - "login": "norrig", - "id": 5526261, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5526261?v=4", - "html_url": "https:\/\/github.com\/norrig", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/norrig\/CVE-2021-41773-exploiter", - "description": "School project - Please use other repos for actual testing", - "fork": false, - "created_at": "2022-01-12T17:42:36Z", - "updated_at": "2022-01-12T18:26:57Z", - "pushed_at": "2022-01-13T16:18:33Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 452242021, "name": "CVE-2021-41773-exercise", @@ -2414,10 +2383,10 @@ "description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773", "fork": false, "created_at": "2022-03-12T21:24:55Z", - "updated_at": "2024-11-26T17:30:46Z", + "updated_at": "2024-12-04T06:22:14Z", "pushed_at": "2022-03-12T21:30:58Z", - "stargazers_count": 98, - "watchers_count": 98, + "stargazers_count": 99, + "watchers_count": 99, "has_discussions": false, "forks_count": 34, "allow_forking": true, @@ -2435,7 +2404,7 @@ ], "visibility": "public", "forks": 34, - "watchers": 98, + "watchers": 99, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-42260.json b/2021/CVE-2021-42260.json new file mode 100644 index 0000000000..763921140e --- /dev/null +++ b/2021/CVE-2021-42260.json @@ -0,0 +1,33 @@ +[ + { + "id": 898319759, + "name": "tinyxml", + "full_name": "vm2mv\/tinyxml", + "owner": { + "login": "vm2mv", + "id": 4291086, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4291086?v=4", + "html_url": "https:\/\/github.com\/vm2mv", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/vm2mv\/tinyxml", + "description": "TinyXML 2.6.2 with fixes for CVE-2021-42260 and CVE-2023-34194", + "fork": false, + "created_at": "2024-12-04T07:24:59Z", + "updated_at": "2024-12-04T09:14:12Z", + "pushed_at": "2024-12-04T09:12:59Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 9c95f0bcf7..4cf5a80f0f 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -3749,10 +3749,10 @@ "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ", "fork": false, "created_at": "2021-12-13T03:57:50Z", - "updated_at": "2024-11-29T08:50:43Z", + "updated_at": "2024-12-04T10:02:36Z", "pushed_at": "2022-11-23T18:23:24Z", - "stargazers_count": 3407, - "watchers_count": 3407, + "stargazers_count": 3405, + "watchers_count": 3405, "has_discussions": true, "forks_count": 740, "allow_forking": true, @@ -3761,7 +3761,7 @@ "topics": [], "visibility": "public", "forks": 740, - "watchers": 3407, + "watchers": 3405, "score": 0, "subscribers_count": 55 }, @@ -10741,37 +10741,6 @@ "score": 0, "subscribers_count": 2 }, - { - "id": 447615580, - "name": "Log4j-CVE-2021-44228", - "full_name": "solitarysp\/Log4j-CVE-2021-44228", - "owner": { - "login": "solitarysp", - "id": 20993683, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20993683?v=4", - "html_url": "https:\/\/github.com\/solitarysp", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/solitarysp\/Log4j-CVE-2021-44228", - "description": null, - "fork": false, - "created_at": "2022-01-13T13:46:12Z", - "updated_at": "2022-01-13T13:46:52Z", - "pushed_at": "2022-01-13T14:43:03Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 2 - }, { "id": 447754863, "name": "log4j_github_repository", diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index b46b502549..32039d3d9b 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -14,10 +14,10 @@ "description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。", "fork": false, "created_at": "2022-05-31T07:44:01Z", - "updated_at": "2024-12-04T02:35:43Z", + "updated_at": "2024-12-04T07:09:20Z", "pushed_at": "2023-02-26T14:06:05Z", - "stargazers_count": 1172, - "watchers_count": 1172, + "stargazers_count": 1173, + "watchers_count": 1173, "has_discussions": true, "forks_count": 190, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 190, - "watchers": 1172, + "watchers": 1173, "score": 0, "subscribers_count": 19 }, diff --git a/2022/CVE-2022-26809.json b/2022/CVE-2022-26809.json index 59a3303208..bc51e3924a 100644 --- a/2022/CVE-2022-26809.json +++ b/2022/CVE-2022-26809.json @@ -266,10 +266,10 @@ "description": "警惕 一种针对红队的新型溯源手段!", "fork": false, "created_at": "2022-07-27T15:48:19Z", - "updated_at": "2024-11-01T07:14:50Z", + "updated_at": "2024-12-04T09:58:47Z", "pushed_at": "2022-07-27T15:55:01Z", - "stargazers_count": 394, - "watchers_count": 394, + "stargazers_count": 393, + "watchers_count": 393, "has_discussions": false, "forks_count": 83, "allow_forking": true, @@ -278,7 +278,7 @@ "topics": [], "visibility": "public", "forks": 83, - "watchers": 394, + "watchers": 393, "score": 0, "subscribers_count": 2 }, diff --git a/2022/CVE-2022-42864.json b/2022/CVE-2022-42864.json index db91473449..2e8e2b4e88 100644 --- a/2022/CVE-2022-42864.json +++ b/2022/CVE-2022-42864.json @@ -14,10 +14,10 @@ "description": "Proof-of-concept for the CVE-2022-42864 IOHIDFamily race condition", "fork": false, "created_at": "2023-01-19T20:36:49Z", - "updated_at": "2024-09-24T19:37:03Z", + "updated_at": "2024-12-04T08:58:01Z", "pushed_at": "2023-01-20T17:58:39Z", - "stargazers_count": 62, - "watchers_count": 62, + "stargazers_count": 63, + "watchers_count": 63, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 62, + "watchers": 63, "score": 0, "subscribers_count": 5 } diff --git a/2022/CVE-2022-46689.json b/2022/CVE-2022-46689.json index 7217bc6447..ad7700e217 100644 --- a/2022/CVE-2022-46689.json +++ b/2022/CVE-2022-46689.json @@ -107,10 +107,10 @@ "description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.", "fork": false, "created_at": "2022-12-26T06:56:35Z", - "updated_at": "2024-12-02T07:36:51Z", + "updated_at": "2024-12-04T06:54:46Z", "pushed_at": "2023-08-02T09:35:14Z", - "stargazers_count": 885, - "watchers_count": 885, + "stargazers_count": 884, + "watchers_count": 884, "has_discussions": false, "forks_count": 73, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 73, - "watchers": 885, + "watchers": 884, "score": 0, "subscribers_count": 25 }, diff --git a/2023/CVE-2023-27997.json b/2023/CVE-2023-27997.json index a8343e929e..5f1fb278c2 100644 --- a/2023/CVE-2023-27997.json +++ b/2023/CVE-2023-27997.json @@ -45,10 +45,10 @@ "description": "Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing", "fork": false, "created_at": "2023-06-16T20:15:36Z", - "updated_at": "2024-10-10T03:00:26Z", + "updated_at": "2024-12-04T10:43:06Z", "pushed_at": "2024-05-08T16:17:07Z", - "stargazers_count": 130, - "watchers_count": 130, + "stargazers_count": 131, + "watchers_count": 131, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 23, - "watchers": 130, + "watchers": 131, "score": 0, "subscribers_count": 3 }, diff --git a/2023/CVE-2023-32784.json b/2023/CVE-2023-32784.json index 677a1390a6..3e141b71b9 100644 --- a/2023/CVE-2023-32784.json +++ b/2023/CVE-2023-32784.json @@ -342,5 +342,36 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 898440595, + "name": "CVE-2023-32784-EXPLOIT-REPORT", + "full_name": "dev0558\/CVE-2023-32784-EXPLOIT-REPORT", + "owner": { + "login": "dev0558", + "id": 137286912, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137286912?v=4", + "html_url": "https:\/\/github.com\/dev0558", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/dev0558\/CVE-2023-32784-EXPLOIT-REPORT", + "description": null, + "fork": false, + "created_at": "2024-12-04T11:57:35Z", + "updated_at": "2024-12-04T12:25:03Z", + "pushed_at": "2024-12-04T12:24:59Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-34194.json b/2023/CVE-2023-34194.json new file mode 100644 index 0000000000..763921140e --- /dev/null +++ b/2023/CVE-2023-34194.json @@ -0,0 +1,33 @@ +[ + { + "id": 898319759, + "name": "tinyxml", + "full_name": "vm2mv\/tinyxml", + "owner": { + "login": "vm2mv", + "id": 4291086, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4291086?v=4", + "html_url": "https:\/\/github.com\/vm2mv", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/vm2mv\/tinyxml", + "description": "TinyXML 2.6.2 with fixes for CVE-2021-42260 and CVE-2023-34194", + "fork": false, + "created_at": "2024-12-04T07:24:59Z", + "updated_at": "2024-12-04T09:14:12Z", + "pushed_at": "2024-12-04T09:12:59Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-36845.json b/2023/CVE-2023-36845.json index a5f9fbf6dd..1c82c85f4e 100644 --- a/2023/CVE-2023-36845.json +++ b/2023/CVE-2023-36845.json @@ -578,40 +578,5 @@ "watchers": 0, "score": 0, "subscribers_count": 1 - }, - { - "id": 871328160, - "name": "CVE-2023-36845", - "full_name": "functionofpwnosec\/CVE-2023-36845", - "owner": { - "login": "functionofpwnosec", - "id": 38102497, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38102497?v=4", - "html_url": "https:\/\/github.com\/functionofpwnosec", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/functionofpwnosec\/CVE-2023-36845", - "description": "Juniper Networks POC Understanding CVE-2023–36845 Remote Code Execution Exploit and Protection", - "fork": false, - "created_at": "2024-10-11T18:18:37Z", - "updated_at": "2024-10-11T18:30:23Z", - "pushed_at": "2024-10-11T18:30:43Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [ - "bugbountytips", - "cve-2023-36845", - "remote-code-execution" - ], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-36899.json b/2023/CVE-2023-36899.json index b694cd767e..8530757bd1 100644 --- a/2023/CVE-2023-36899.json +++ b/2023/CVE-2023-36899.json @@ -45,10 +45,10 @@ "description": "CVE-2023-36899漏洞的复现环境和工具,针对ASP.NET框架中的无cookie会话身份验证绕过。", "fork": false, "created_at": "2023-08-15T23:36:17Z", - "updated_at": "2024-07-15T07:25:38Z", + "updated_at": "2024-12-04T08:35:49Z", "pushed_at": "2023-08-15T23:37:11Z", - "stargazers_count": 29, - "watchers_count": 29, + "stargazers_count": 30, + "watchers_count": 30, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 29, + "watchers": 30, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-46604.json b/2023/CVE-2023-46604.json index a23e7598e1..d81ee51a2d 100644 --- a/2023/CVE-2023-46604.json +++ b/2023/CVE-2023-46604.json @@ -50,13 +50,13 @@ "stargazers_count": 226, "watchers_count": 226, "has_discussions": false, - "forks_count": 29, + "forks_count": 28, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 29, + "forks": 28, "watchers": 226, "score": 0, "subscribers_count": 4 diff --git a/2023/CVE-2023-50387.json b/2023/CVE-2023-50387.json index c85b1a3838..22654526b5 100644 --- a/2023/CVE-2023-50387.json +++ b/2023/CVE-2023-50387.json @@ -60,5 +60,36 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 898427651, + "name": "CVE-2023-50387", + "full_name": "Pablodiz\/CVE-2023-50387", + "owner": { + "login": "Pablodiz", + "id": 114071507, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114071507?v=4", + "html_url": "https:\/\/github.com\/Pablodiz", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Pablodiz\/CVE-2023-50387", + "description": null, + "fork": false, + "created_at": "2024-12-04T11:27:11Z", + "updated_at": "2024-12-04T11:30:55Z", + "pushed_at": "2024-12-04T11:30:51Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-0044.json b/2024/CVE-2024-0044.json index 621f9eb443..bfe64bbb63 100644 --- a/2024/CVE-2024-0044.json +++ b/2024/CVE-2024-0044.json @@ -45,10 +45,10 @@ "description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13", "fork": false, "created_at": "2024-06-18T12:30:53Z", - "updated_at": "2024-12-03T19:42:43Z", + "updated_at": "2024-12-04T10:06:57Z", "pushed_at": "2024-12-02T06:29:52Z", - "stargazers_count": 261, - "watchers_count": 261, + "stargazers_count": 262, + "watchers_count": 262, "has_discussions": false, "forks_count": 60, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 60, - "watchers": 261, + "watchers": 262, "score": 0, "subscribers_count": 7 }, diff --git a/2024/CVE-2024-10220.json b/2024/CVE-2024-10220.json index 17f2c0e51d..e13d556e2c 100644 --- a/2024/CVE-2024-10220.json +++ b/2024/CVE-2024-10220.json @@ -76,10 +76,10 @@ "description": "CVE-2024-10220 Test repo", "fork": false, "created_at": "2024-12-01T05:15:25Z", - "updated_at": "2024-12-02T02:55:23Z", + "updated_at": "2024-12-04T11:01:09Z", "pushed_at": "2024-12-01T05:18:39Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-10924.json b/2024/CVE-2024-10924.json index fdac716dc1..c4219d6b56 100644 --- a/2024/CVE-2024-10924.json +++ b/2024/CVE-2024-10924.json @@ -251,7 +251,7 @@ "description": null, "fork": false, "created_at": "2024-12-01T14:43:16Z", - "updated_at": "2024-12-02T08:32:51Z", + "updated_at": "2024-12-04T11:29:31Z", "pushed_at": "2024-12-02T08:32:47Z", "stargazers_count": 1, "watchers_count": 1, @@ -260,7 +260,19 @@ "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, - "topics": [], + "topics": [ + "bypass", + "bypass-mfa", + "bypass-wordpress", + "cibersecurity", + "cve", + "cve-2024-10924", + "exploit", + "hacking", + "hacking-etico", + "really-simple-security", + "wordpress" + ], "visibility": "public", "forks": 0, "watchers": 1, @@ -296,7 +308,7 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 }, { "id": 897913649, @@ -327,6 +339,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-11320.json b/2024/CVE-2024-11320.json index e953ed4057..e6167333bf 100644 --- a/2024/CVE-2024-11320.json +++ b/2024/CVE-2024-11320.json @@ -14,10 +14,10 @@ "description": "Exploit for Pandora FMS Remote Code Execution CVE-2024-11320", "fork": false, "created_at": "2024-12-01T12:39:49Z", - "updated_at": "2024-12-03T23:11:26Z", + "updated_at": "2024-12-04T10:11:02Z", "pushed_at": "2024-12-01T12:48:08Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-21413.json b/2024/CVE-2024-21413.json index b0a13b16e6..803284c1a0 100644 --- a/2024/CVE-2024-21413.json +++ b/2024/CVE-2024-21413.json @@ -463,5 +463,45 @@ "watchers": 8, "score": 0, "subscribers_count": 1 + }, + { + "id": 898401287, + "name": "CVE-2024-21413-Vulnerabilidad-Outlook-LAB", + "full_name": "D1se0\/CVE-2024-21413-Vulnerabilidad-Outlook-LAB", + "owner": { + "login": "D1se0", + "id": 164921056, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164921056?v=4", + "html_url": "https:\/\/github.com\/D1se0", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/D1se0\/CVE-2024-21413-Vulnerabilidad-Outlook-LAB", + "description": null, + "fork": false, + "created_at": "2024-12-04T10:26:37Z", + "updated_at": "2024-12-04T11:29:53Z", + "pushed_at": "2024-12-04T11:18:13Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "cibersecurity", + "cve", + "cve-2024-21413", + "exploit", + "hacking", + "hacking-etico", + "lab", + "outlook" + ], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-21534.json b/2024/CVE-2024-21534.json index 2cd2bfad8f..a352124bed 100644 --- a/2024/CVE-2024-21534.json +++ b/2024/CVE-2024-21534.json @@ -45,10 +45,10 @@ "description": "jsonpath-plus 包(版本 <=10.0.7)存在严重的远程代码执行(RCE)漏洞,允许攻击者通过 Node.js 的 VM 模块执行任意代码。该漏洞由于输入验证不严格导致,影响版本为 10.0.7 以下,CVSS 分数为 9.8(极其严重)。漏洞首次公开于 2024 年 10 月 11 日。", "fork": false, "created_at": "2024-11-23T05:54:24Z", - "updated_at": "2024-12-03T14:59:15Z", + "updated_at": "2024-12-04T06:56:31Z", "pushed_at": "2024-11-23T05:57:35Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -61,7 +61,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-21762.json b/2024/CVE-2024-21762.json index 2321cd53fb..72ac05774e 100644 --- a/2024/CVE-2024-21762.json +++ b/2024/CVE-2024-21762.json @@ -200,10 +200,10 @@ "description": "CVE-2024-21762 是 Fortinet 公司的 FortiOS 和 FortiProxy 产品中的一个严重漏洞,存在于其 SSL VPN 组件中。", "fork": false, "created_at": "2024-11-24T07:20:45Z", - "updated_at": "2024-12-02T02:55:23Z", + "updated_at": "2024-12-04T06:56:12Z", "pushed_at": "2024-11-24T08:07:19Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -212,7 +212,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-23692.json b/2024/CVE-2024-23692.json index 24d72ce547..6900f23bf7 100644 --- a/2024/CVE-2024-23692.json +++ b/2024/CVE-2024-23692.json @@ -329,10 +329,10 @@ "description": "CVE-2024-23692 是影响 Rejetto HTTP File Server(HFS)2.3m 及之前版本的模板注入漏洞。该漏洞允许远程未授权的攻击者通过发送特制的 HTTP 请求,在受影响的系统上执行任意命令。", "fork": false, "created_at": "2024-11-23T03:59:13Z", - "updated_at": "2024-12-02T02:55:24Z", + "updated_at": "2024-12-04T06:56:48Z", "pushed_at": "2024-11-23T04:00:55Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -341,7 +341,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-26229.json b/2024/CVE-2024-26229.json index 34c193de29..c19f0c82e6 100644 --- a/2024/CVE-2024-26229.json +++ b/2024/CVE-2024-26229.json @@ -45,10 +45,10 @@ "description": "Windows LPE", "fork": false, "created_at": "2024-06-11T08:03:29Z", - "updated_at": "2024-12-04T05:48:33Z", + "updated_at": "2024-12-04T12:14:02Z", "pushed_at": "2024-06-11T20:41:59Z", - "stargazers_count": 106, - "watchers_count": 106, + "stargazers_count": 108, + "watchers_count": 108, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 23, - "watchers": 106, + "watchers": 108, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-27130.json b/2024/CVE-2024-27130.json index 3a0dbc7378..85de7c6e09 100644 --- a/2024/CVE-2024-27130.json +++ b/2024/CVE-2024-27130.json @@ -76,10 +76,10 @@ "description": "CVE-2024-27130是影响QNAP网络附加存储(NAS)设备的一个严重漏洞。该漏洞源于QTS操作系统中share.cgi脚本的No_Support_ACL函数中不安全地使用strcpy函数,导致堆栈缓冲区溢出。攻击者可以利用此漏洞,通过精心构造的请求在目标系统上执行任意代码,进而完全控制受影响的设备。 ", "fork": false, "created_at": "2024-11-22T14:18:08Z", - "updated_at": "2024-12-02T02:55:25Z", + "updated_at": "2024-12-04T06:57:05Z", "pushed_at": "2024-11-22T14:20:28Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-29868.json b/2024/CVE-2024-29868.json index 9163e17af5..425d97010a 100644 --- a/2024/CVE-2024-29868.json +++ b/2024/CVE-2024-29868.json @@ -14,10 +14,10 @@ "description": "Proof of concept of CVE-2024-29868 affecting Apache StreamPipes from 0.69.0 through 0.93.0", "fork": false, "created_at": "2024-06-24T14:53:05Z", - "updated_at": "2024-06-25T10:22:48Z", + "updated_at": "2024-12-04T07:30:12Z", "pushed_at": "2024-06-24T15:28:15Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json index 63edca6b57..6b8cc7d693 100644 --- a/2024/CVE-2024-3094.json +++ b/2024/CVE-2024-3094.json @@ -1856,10 +1856,10 @@ "description": "CVE-2024-3094 (XZ Backdoor) Tools", "fork": false, "created_at": "2024-12-01T05:22:08Z", - "updated_at": "2024-12-03T19:06:03Z", + "updated_at": "2024-12-04T11:01:08Z", "pushed_at": "2024-12-01T05:30:15Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -1868,7 +1868,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-37084.json b/2024/CVE-2024-37084.json index a7d207dc9f..44e7318023 100644 --- a/2024/CVE-2024-37084.json +++ b/2024/CVE-2024-37084.json @@ -138,10 +138,10 @@ "description": "CVE-2024-37084是Spring Cloud Data Flow中的一个高危漏洞,影响版本为2.11.0至2.11.3。该漏洞允许具有Skipper服务器API访问权限的攻击者通过精心构造的上传请求,将任意文件写入服务器文件系统的任意位置,进而可能导致远程代码执行,严重威胁服务器安全。", "fork": false, "created_at": "2024-11-22T13:53:42Z", - "updated_at": "2024-12-02T02:55:26Z", + "updated_at": "2024-12-04T06:57:15Z", "pushed_at": "2024-11-22T14:02:35Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -155,7 +155,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-38193.json b/2024/CVE-2024-38193.json index 33b28b0e94..045a6ee0ed 100644 --- a/2024/CVE-2024-38193.json +++ b/2024/CVE-2024-38193.json @@ -14,19 +14,19 @@ "description": null, "fork": false, "created_at": "2024-11-18T23:34:34Z", - "updated_at": "2024-12-04T06:08:59Z", + "updated_at": "2024-12-04T12:22:21Z", "pushed_at": "2024-11-18T23:48:31Z", - "stargazers_count": 17, - "watchers_count": 17, + "stargazers_count": 24, + "watchers_count": 24, "has_discussions": false, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 3, - "watchers": 17, + "forks": 4, + "watchers": 24, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-38856.json b/2024/CVE-2024-38856.json index 98cb4bea11..0ef91daf90 100644 --- a/2024/CVE-2024-38856.json +++ b/2024/CVE-2024-38856.json @@ -208,10 +208,10 @@ "description": "CVE-2024-38856 是 Apache OFBiz 中的一个严重漏洞,允许未经身份验证的攻击者在受影响的系统上执行任意代码。 ", "fork": false, "created_at": "2024-11-23T03:54:28Z", - "updated_at": "2024-12-02T02:55:26Z", + "updated_at": "2024-12-04T06:56:49Z", "pushed_at": "2024-11-23T03:57:02Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -220,7 +220,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-40711.json b/2024/CVE-2024-40711.json index 560d34cae8..327bf9fa6e 100644 --- a/2024/CVE-2024-40711.json +++ b/2024/CVE-2024-40711.json @@ -14,10 +14,10 @@ "description": "Pre-Auth Exploit for CVE-2024-40711", "fork": false, "created_at": "2024-09-15T17:25:32Z", - "updated_at": "2024-11-30T00:51:06Z", + "updated_at": "2024-12-04T10:39:47Z", "pushed_at": "2024-09-15T17:28:41Z", - "stargazers_count": 37, - "watchers_count": 37, + "stargazers_count": 38, + "watchers_count": 38, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 10, - "watchers": 37, + "watchers": 38, "score": 0, "subscribers_count": 0 }, diff --git a/2024/CVE-2024-42327.json b/2024/CVE-2024-42327.json index df3b5f6a8a..42c6f695f0 100644 --- a/2024/CVE-2024-42327.json +++ b/2024/CVE-2024-42327.json @@ -14,10 +14,10 @@ "description": "cve-2024-42327 ZBX-25623", "fork": false, "created_at": "2024-12-01T00:15:27Z", - "updated_at": "2024-12-04T06:05:32Z", + "updated_at": "2024-12-04T12:15:06Z", "pushed_at": "2024-12-01T01:18:36Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 12, + "watchers_count": 12, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 9, + "watchers": 12, "score": 0, "subscribers_count": 1 }, @@ -45,10 +45,10 @@ "description": "PoC for CVE-2024-42327 \/ ZBX-25623", "fork": false, "created_at": "2024-12-03T12:44:07Z", - "updated_at": "2024-12-04T00:48:44Z", + "updated_at": "2024-12-04T11:43:42Z", "pushed_at": "2024-12-03T12:56:52Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -57,8 +57,8 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 8, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-42640.json b/2024/CVE-2024-42640.json index c00e916640..0156a62acd 100644 --- a/2024/CVE-2024-42640.json +++ b/2024/CVE-2024-42640.json @@ -19,7 +19,7 @@ "stargazers_count": 26, "watchers_count": 26, "has_discussions": false, - "forks_count": 15, + "forks_count": 16, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -30,7 +30,7 @@ "poc-exploit" ], "visibility": "public", - "forks": 15, + "forks": 16, "watchers": 26, "score": 0, "subscribers_count": 2 diff --git a/2024/CVE-2024-43425.json b/2024/CVE-2024-43425.json index bacd449f25..3d36da9b77 100644 --- a/2024/CVE-2024-43425.json +++ b/2024/CVE-2024-43425.json @@ -14,10 +14,10 @@ "description": "Scripts for Analysis of a RCE in Moodle Calculated Questions (CVE-2024-43425)", "fork": false, "created_at": "2024-08-23T09:13:03Z", - "updated_at": "2024-11-07T20:51:43Z", + "updated_at": "2024-12-04T09:24:45Z", "pushed_at": "2024-08-23T09:36:55Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 17, + "watchers_count": 17, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 16, + "watchers": 17, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-45519.json b/2024/CVE-2024-45519.json index 673da277a0..d1d70dff0b 100644 --- a/2024/CVE-2024-45519.json +++ b/2024/CVE-2024-45519.json @@ -107,10 +107,10 @@ "description": "CVE-2024-45519是Zimbra Collaboration(ZCS)中的一个高危漏洞,存在于其postjournal服务中。当该服务被启用时,未经身份验证的攻击者可以通过构造特定的SMTP请求,远程执行任意命令,从而完全控制受影响的服务器。", "fork": false, "created_at": "2024-11-22T01:56:21Z", - "updated_at": "2024-12-02T02:55:26Z", + "updated_at": "2024-12-04T06:57:41Z", "pushed_at": "2024-11-22T02:00:35Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -124,7 +124,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-47575.json b/2024/CVE-2024-47575.json index 81b9651aaf..11581b866f 100644 --- a/2024/CVE-2024-47575.json +++ b/2024/CVE-2024-47575.json @@ -107,10 +107,10 @@ "description": "CVE-2024-47575是Fortinet的FortiManager和FortiManager Cloud产品中的一个严重漏洞,源于fgfmsd守护进程缺乏对关键功能的身份验证。", "fork": false, "created_at": "2024-11-22T03:13:03Z", - "updated_at": "2024-12-02T02:55:27Z", + "updated_at": "2024-12-04T06:57:26Z", "pushed_at": "2024-11-22T03:17:57Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-49039.json b/2024/CVE-2024-49039.json index 032b32cece..05c7a60ae9 100644 --- a/2024/CVE-2024-49039.json +++ b/2024/CVE-2024-49039.json @@ -14,19 +14,19 @@ "description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler", "fork": false, "created_at": "2024-11-19T08:57:18Z", - "updated_at": "2024-12-04T04:16:24Z", + "updated_at": "2024-12-04T12:19:36Z", "pushed_at": "2024-11-19T09:15:26Z", - "stargazers_count": 41, - "watchers_count": 41, + "stargazers_count": 46, + "watchers_count": 46, "has_discussions": false, - "forks_count": 9, + "forks_count": 12, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 9, - "watchers": 41, + "forks": 12, + "watchers": 46, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-5124.json b/2024/CVE-2024-5124.json index 3b3e31a83c..a57dacf2da 100644 --- a/2024/CVE-2024-5124.json +++ b/2024/CVE-2024-5124.json @@ -45,10 +45,10 @@ "description": "CVE-2024-5124 poc", "fork": false, "created_at": "2024-12-03T03:18:48Z", - "updated_at": "2024-12-03T16:37:43Z", + "updated_at": "2024-12-04T11:00:55Z", "pushed_at": "2024-12-03T04:01:32Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -57,8 +57,8 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 3, + "watchers": 4, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-51567.json b/2024/CVE-2024-51567.json index 27c2c64626..3386bc534e 100644 --- a/2024/CVE-2024-51567.json +++ b/2024/CVE-2024-51567.json @@ -79,10 +79,10 @@ "description": "CVE-2024-51567 is a Python PoC exploit targeting an RCE vulnerability in CyberPanel v2.3.6’s upgrademysqlstatus endpoint, bypassing CSRF protections.", "fork": false, "created_at": "2024-11-26T02:18:24Z", - "updated_at": "2024-12-02T02:55:27Z", + "updated_at": "2024-12-04T06:54:51Z", "pushed_at": "2024-11-26T02:21:21Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -91,7 +91,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-52680.json b/2024/CVE-2024-52680.json index e9299ebe3c..310390ba2a 100644 --- a/2024/CVE-2024-52680.json +++ b/2024/CVE-2024-52680.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-53259.json b/2024/CVE-2024-53259.json new file mode 100644 index 0000000000..ac0c16a41c --- /dev/null +++ b/2024/CVE-2024-53259.json @@ -0,0 +1,33 @@ +[ + { + "id": 898373341, + "name": "cve-2024-53259", + "full_name": "kota-yata\/cve-2024-53259", + "owner": { + "login": "kota-yata", + "id": 51294895, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51294895?v=4", + "html_url": "https:\/\/github.com\/kota-yata", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/kota-yata\/cve-2024-53259", + "description": null, + "fork": false, + "created_at": "2024-12-04T09:27:22Z", + "updated_at": "2024-12-04T09:27:53Z", + "pushed_at": "2024-12-04T09:28:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-5910.json b/2024/CVE-2024-5910.json index 4986751bb4..034193bbc9 100644 --- a/2024/CVE-2024-5910.json +++ b/2024/CVE-2024-5910.json @@ -29,5 +29,36 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 898312169, + "name": "CVE-2024-5910", + "full_name": "Farzan-Kh\/CVE-2024-5910", + "owner": { + "login": "Farzan-Kh", + "id": 65416059, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65416059?v=4", + "html_url": "https:\/\/github.com\/Farzan-Kh", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Farzan-Kh\/CVE-2024-5910", + "description": "CVE-2024-5910 PoC", + "fork": false, + "created_at": "2024-12-04T07:06:44Z", + "updated_at": "2024-12-04T07:17:50Z", + "pushed_at": "2024-12-04T07:17:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-7965.json b/2024/CVE-2024-7965.json index ee573520e5..f0ca5adcab 100644 --- a/2024/CVE-2024-7965.json +++ b/2024/CVE-2024-7965.json @@ -45,10 +45,10 @@ "description": "CVE-2024-7965是Google Chrome浏览器中V8 JavaScript引擎的一个高危漏洞。该漏洞源于V8引擎在处理特定JavaScript代码时实现不当,导致堆内存损坏。攻击者可通过诱导用户访问包含特制JavaScript的恶意网页,利用此漏洞在Chrome渲染器中执行任意代码。", "fork": false, "created_at": "2024-11-22T02:55:33Z", - "updated_at": "2024-12-03T14:59:16Z", + "updated_at": "2024-12-04T06:57:34Z", "pushed_at": "2024-11-22T02:58:00Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -62,7 +62,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-8672.json b/2024/CVE-2024-8672.json index 46d56d637e..326f93ebaa 100644 --- a/2024/CVE-2024-8672.json +++ b/2024/CVE-2024-8672.json @@ -19,13 +19,13 @@ "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 3, + "forks": 4, "watchers": 5, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-9465.json b/2024/CVE-2024-9465.json index d1c2d74305..fc46dd390f 100644 --- a/2024/CVE-2024-9465.json +++ b/2024/CVE-2024-9465.json @@ -76,10 +76,10 @@ "description": "Proof of Concept Exploit for CVE-2024-9465", "fork": false, "created_at": "2024-12-03T12:16:44Z", - "updated_at": "2024-12-03T16:38:23Z", + "updated_at": "2024-12-04T11:00:54Z", "pushed_at": "2024-12-03T12:21:35Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -88,8 +88,8 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 3, + "watchers": 4, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/README.md b/README.md index 6eec35293c..844ca91087 100644 --- a/README.md +++ b/README.md @@ -1254,6 +1254,7 @@ - [p33d/Palo-Alto-Expedition-Remote-Code-Execution-Exploit-CVE-2024-5910-CVE-2024-9464](https://github.com/p33d/Palo-Alto-Expedition-Remote-Code-Execution-Exploit-CVE-2024-5910-CVE-2024-9464) +- [Farzan-Kh/CVE-2024-5910](https://github.com/Farzan-Kh/CVE-2024-5910) ### CVE-2024-5932 (2024-08-20) @@ -2469,6 +2470,7 @@ - [DerZiad/CVE-2024-21413](https://github.com/DerZiad/CVE-2024-21413) - [Redfox-Secuirty/Unveiling-Moniker-Link-CVE-2024-21413-Navigating-the-Latest-Cybersecurity-Landscape](https://github.com/Redfox-Secuirty/Unveiling-Moniker-Link-CVE-2024-21413-Navigating-the-Latest-Cybersecurity-Landscape) - [ThemeHackers/CVE-2024-21413](https://github.com/ThemeHackers/CVE-2024-21413) +- [D1se0/CVE-2024-21413-Vulnerabilidad-Outlook-LAB](https://github.com/D1se0/CVE-2024-21413-Vulnerabilidad-Outlook-LAB) ### CVE-2024-21514 (2024-06-22) @@ -7232,6 +7234,13 @@ - [0x4M3R/CVE-2024-53255](https://github.com/0x4M3R/CVE-2024-53255) +### CVE-2024-53259 (2024-12-02) + +quic-go is an implementation of the QUIC protocol in Go. An off-path attacker can inject an ICMP Packet Too Large packet. Since affected quic-go versions used IP_PMTUDISC_DO, the kernel would then return a "message too large" error on sendmsg, i.e. when quic-go attempts to send a packet that exceeds the MTU claimed in that ICMP packet. By setting this value to smaller than 1200 bytes (the minimum MTU for QUIC), the attacker can disrupt a QUIC connection. Crucially, this can be done after completion of the handshake, thereby circumventing any TCP fallback that might be implemented on the application layer (for example, many browsers fall back to HTTP over TCP if they're unable to establish a QUIC connection). The attacker needs to at least know the client's IP and port tuple to mount an attack. This vulnerability is fixed in 0.48.2. + + +- [kota-yata/cve-2024-53259](https://github.com/kota-yata/cve-2024-53259) + ### CVE-2024-53375 (2024-12-02) Authenticated remote code execution (RCE) vulnerabilities affect TP-Link Archer, Deco, and Tapo series routers. A vulnerability exists in the "tmp_get_sites" function of the HomeShield functionality provided by TP-Link. This vulnerability is still exploitable without the installation or activation of the HomeShield functionality. @@ -11463,6 +11472,7 @@ - [mister-turtle/cve-2023-32784](https://github.com/mister-turtle/cve-2023-32784) - [Cmadhushanka/CVE-2023-32784-Exploitation](https://github.com/Cmadhushanka/CVE-2023-32784-Exploitation) - [SarahZimmermann-Schmutzler/exploit_keepass](https://github.com/SarahZimmermann-Schmutzler/exploit_keepass) +- [dev0558/CVE-2023-32784-EXPLOIT-REPORT](https://github.com/dev0558/CVE-2023-32784-EXPLOIT-REPORT) ### CVE-2023-32961 (2023-06-12) @@ -11805,6 +11815,13 @@ - [overgrowncarrot1/ImageTragick_CVE-2023-34152](https://github.com/overgrowncarrot1/ImageTragick_CVE-2023-34152) - [SudoIndividual/CVE-2023-34152](https://github.com/SudoIndividual/CVE-2023-34152) +### CVE-2023-34194 (2023-12-13) + +StringEqual in TiXmlDeclaration::Parse in tinyxmlparser.cpp in TinyXML through 2.6.2 has a reachable assertion (and application exit) via a crafted XML document with a '\0' located after whitespace. + + +- [vm2mv/tinyxml](https://github.com/vm2mv/tinyxml) + ### CVE-2023-34212 (2023-06-12) The JndiJmsConnectionFactoryProvider Controller Service, along with the ConsumeJMS and PublishJMS Processors, in Apache NiFi 1.8.0 through 1.21.0 allow an authenticated and authorized user to configure URL and library properties that enable deserialization of untrusted data from a remote location.\n\nThe resolution validates the JNDI URL and restricts locations to a set of allowed schemes.\n\nYou are recommended to upgrade to version 1.22.0 or later which fixes this issue.\n\n\n @@ -12413,7 +12430,6 @@ - [ifconfig-me/CVE-2023-36845](https://github.com/ifconfig-me/CVE-2023-36845) - [e11i0t4lders0n/CVE-2023-36845](https://github.com/e11i0t4lders0n/CVE-2023-36845) - [Vignesh2712/Automation-for-Juniper-cve-2023-36845](https://github.com/Vignesh2712/Automation-for-Juniper-cve-2023-36845) -- [functionofpwnosec/CVE-2023-36845](https://github.com/functionofpwnosec/CVE-2023-36845) ### CVE-2023-36846 (2023-08-17) @@ -15412,6 +15428,7 @@ - [knqyf263/CVE-2023-50387](https://github.com/knqyf263/CVE-2023-50387) - [Meirelez/SSR-DNSSEC](https://github.com/Meirelez/SSR-DNSSEC) +- [Pablodiz/CVE-2023-50387](https://github.com/Pablodiz/CVE-2023-50387) ### CVE-2023-50465 (2023-12-11) @@ -25407,6 +25424,7 @@ - [hh-hunter/nacos-cve-2021-29441](https://github.com/hh-hunter/nacos-cve-2021-29441) - [bysinks/CVE-2021-29441](https://github.com/bysinks/CVE-2021-29441) +- [azhao1981/CVE-2021-29441](https://github.com/azhao1981/CVE-2021-29441) ### CVE-2021-29442 (2021-04-27) @@ -27450,7 +27468,6 @@ - [kubota/POC-CVE-2021-41773](https://github.com/kubota/POC-CVE-2021-41773) - [xMohamed0/CVE-2021-41773](https://github.com/xMohamed0/CVE-2021-41773) - [i6c/MASS_CVE-2021-41773](https://github.com/i6c/MASS_CVE-2021-41773) -- [norrig/CVE-2021-41773-exploiter](https://github.com/norrig/CVE-2021-41773-exploiter) - [m96dg/CVE-2021-41773-exercise](https://github.com/m96dg/CVE-2021-41773-exercise) - [skentagon/CVE-2021-41773](https://github.com/skentagon/CVE-2021-41773) - [mauricelambert/CVE-2021-41773](https://github.com/mauricelambert/CVE-2021-41773) @@ -27628,6 +27645,13 @@ - [vesperp/CVE-2021-42237-SiteCore-XP](https://github.com/vesperp/CVE-2021-42237-SiteCore-XP) - [crankyyash/SiteCore-RCE-Detection](https://github.com/crankyyash/SiteCore-RCE-Detection) +### CVE-2021-42260 (2021-10-11) + +TinyXML through 2.6.2 has an infinite loop in TiXmlParsingData::Stamp in tinyxmlparser.cpp via the TIXML_UTF_LEAD_0 case. It can be triggered by a crafted XML message and leads to a denial of service. + + +- [vm2mv/tinyxml](https://github.com/vm2mv/tinyxml) + ### CVE-2021-42261 (2021-10-19) Revisor Video Management System (VMS) before 2.0.0 has a directory traversal vulnerability. Successful exploitation could allow an attacker to traverse the file system to access files or directories that are outside of restricted directory on the remote server. This could lead to the disclosure of sensitive data on the vulnerable server. @@ -28584,7 +28608,6 @@ - [mr-vill4in/log4j-fuzzer](https://github.com/mr-vill4in/log4j-fuzzer) - [mebibite/log4jhound](https://github.com/mebibite/log4jhound) - [jxerome/log4shell](https://github.com/jxerome/log4shell) -- [solitarysp/Log4j-CVE-2021-44228](https://github.com/solitarysp/Log4j-CVE-2021-44228) - [sdogancesur/log4j_github_repository](https://github.com/sdogancesur/log4j_github_repository) - [jrocia/Search-log4Jvuln-AppScanSTD](https://github.com/jrocia/Search-log4Jvuln-AppScanSTD) - [aajuvonen/log4stdin](https://github.com/aajuvonen/log4stdin)