From 09d63871d2839309858eac7285ff396fdb1a6d0b Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Wed, 31 Jul 2024 21:29:49 +0900 Subject: [PATCH] Auto Update 2024/07/31 12:29:49 --- 2017/CVE-2017-1000117.json | 4 +- 2017/CVE-2017-7921.json | 8 ++-- 2018/CVE-2018-17240.json | 2 +- 2018/CVE-2018-5955.json | 8 ++-- 2019/CVE-2019-11510.json | 4 +- 2019/CVE-2019-1698.json | 32 ++++++++++++++++ 2019/CVE-2019-7609.json | 8 ++-- 2020/CVE-2020-14756.json | 8 ++-- 2020/CVE-2020-15368.json | 8 ++-- 2020/CVE-2020-3580.json | 2 +- 2021/CVE-2021-4034.json | 8 ++-- 2021/CVE-2021-40449.json | 8 ++-- 2021/CVE-2021-42013.json | 30 +++++++++++++++ 2021/CVE-2021-42056.json | 32 ++++++++++++++++ 2021/CVE-2021-42278.json | 8 ++-- 2021/CVE-2021-43224.json | 8 ++-- 2021/CVE-2021-44228.json | 8 ++-- 2021/CVE-2021-45232.json | 30 --------------- 2022/CVE-2022-0847.json | 8 ++-- 2022/CVE-2022-21882.json | 8 ++-- 2022/CVE-2022-22978.json | 30 +++++++++++++++ 2022/CVE-2022-2590.json | 8 ++-- 2022/CVE-2022-30203.json | 8 ++-- 2022/CVE-2022-32932.json | 8 ++-- 2022/CVE-2022-42889.json | 8 ++-- 2022/CVE-2022-46689.json | 16 ++++---- 2023/CVE-2023-21560.json | 8 ++-- 2023/CVE-2023-21839.json | 2 +- 2023/CVE-2023-22527.json | 4 +- 2023/CVE-2023-28434.json | 8 ++-- 2023/CVE-2023-30777.json | 8 ++-- 2023/CVE-2023-32243.json | 8 ++-- 2023/CVE-2023-3519.json | 8 ++-- 2023/CVE-2023-38831.json | 8 ++-- 2023/CVE-2023-4220.json | 8 ++-- 2023/CVE-2023-42442.json | 8 ++-- 2023/CVE-2023-42819.json | 8 ++-- 2024/CVE-2024-0044.json | 8 ++-- 2024/CVE-2024-1086.json | 2 +- 2024/CVE-2024-20399.json | 8 ++-- 2024/CVE-2024-21338.json | 8 ++-- 2024/CVE-2024-21762.json | 8 ++-- 2024/CVE-2024-24919.json | 30 +++++++++++++++ 2024/CVE-2024-25600.json | 8 ++-- 2024/CVE-2024-27956.json | 12 +++--- 2024/CVE-2024-30088.json | 16 ++++---- 2024/CVE-2024-32002.json | 76 ++++++++++++++++++++++++++++++++++---- 2024/CVE-2024-32104.json | 32 ++++++++++++++++ 2024/CVE-2024-36401.json | 36 +++++++++--------- 2024/CVE-2024-36842.json | 32 ++++++++++++++++ 2024/CVE-2024-36991.json | 8 ++-- 2024/CVE-2024-39081.json | 4 +- 2024/CVE-2024-4040.json | 16 ++++---- 2024/CVE-2024-41628.json | 8 ++-- 2024/CVE-2024-4320.json | 32 ++++++++++++++++ 2024/CVE-2024-4577.json | 30 +++++++++++++++ 2024/CVE-2024-6387.json | 58 ++++++++++++++--------------- 2024/CVE-2024-81757.json | 8 ++-- README.md | 38 ++++++++++++++++++- 59 files changed, 606 insertions(+), 260 deletions(-) create mode 100644 2019/CVE-2019-1698.json create mode 100644 2021/CVE-2021-42056.json create mode 100644 2024/CVE-2024-32104.json create mode 100644 2024/CVE-2024-36842.json create mode 100644 2024/CVE-2024-4320.json diff --git a/2017/CVE-2017-1000117.json b/2017/CVE-2017-1000117.json index cd847da221..ac2ef642cb 100644 --- a/2017/CVE-2017-1000117.json +++ b/2017/CVE-2017-1000117.json @@ -168,13 +168,13 @@ "stargazers_count": 136, "watchers_count": 136, "has_discussions": false, - "forks_count": 27, + "forks_count": 26, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 27, + "forks": 26, "watchers": 136, "score": 0, "subscribers_count": 4 diff --git a/2017/CVE-2017-7921.json b/2017/CVE-2017-7921.json index ff4da886c7..848f6b7910 100644 --- a/2017/CVE-2017-7921.json +++ b/2017/CVE-2017-7921.json @@ -413,10 +413,10 @@ "description": " Test For CVE-2017–7921; ", "fork": false, "created_at": "2024-07-02T11:47:35Z", - "updated_at": "2024-07-30T23:32:05Z", + "updated_at": "2024-07-31T06:59:29Z", "pushed_at": "2024-07-02T12:00:01Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -425,7 +425,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2018/CVE-2018-17240.json b/2018/CVE-2018-17240.json index d03bba58c1..075514a410 100644 --- a/2018/CVE-2018-17240.json +++ b/2018/CVE-2018-17240.json @@ -44,7 +44,7 @@ "fork": false, "created_at": "2024-01-04T21:44:21Z", "updated_at": "2024-07-30T16:56:59Z", - "pushed_at": "2024-07-30T16:56:58Z", + "pushed_at": "2024-07-31T08:24:50Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, diff --git a/2018/CVE-2018-5955.json b/2018/CVE-2018-5955.json index bf26311370..1ba18fd7ac 100644 --- a/2018/CVE-2018-5955.json +++ b/2018/CVE-2018-5955.json @@ -43,10 +43,10 @@ "description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能", "fork": false, "created_at": "2019-12-21T22:45:55Z", - "updated_at": "2024-07-30T13:01:26Z", + "updated_at": "2024-07-31T07:23:55Z", "pushed_at": "2020-01-05T21:46:25Z", - "stargazers_count": 641, - "watchers_count": 641, + "stargazers_count": 642, + "watchers_count": 642, "has_discussions": false, "forks_count": 129, "allow_forking": true, @@ -68,7 +68,7 @@ ], "visibility": "public", "forks": 129, - "watchers": 641, + "watchers": 642, "score": 0, "subscribers_count": 16 }, diff --git a/2019/CVE-2019-11510.json b/2019/CVE-2019-11510.json index 26c591819d..e9093f8253 100644 --- a/2019/CVE-2019-11510.json +++ b/2019/CVE-2019-11510.json @@ -18,13 +18,13 @@ "stargazers_count": 360, "watchers_count": 360, "has_discussions": false, - "forks_count": 138, + "forks_count": 137, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 138, + "forks": 137, "watchers": 360, "score": 0, "subscribers_count": 14 diff --git a/2019/CVE-2019-1698.json b/2019/CVE-2019-1698.json new file mode 100644 index 0000000000..08f13c9cdf --- /dev/null +++ b/2019/CVE-2019-1698.json @@ -0,0 +1,32 @@ +[ + { + "id": 836111601, + "name": "CVE-2019-1698", + "full_name": "raytran54\/CVE-2019-1698", + "owner": { + "login": "raytran54", + "id": 89938940, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89938940?v=4", + "html_url": "https:\/\/github.com\/raytran54" + }, + "html_url": "https:\/\/github.com\/raytran54\/CVE-2019-1698", + "description": null, + "fork": false, + "created_at": "2024-07-31T07:12:03Z", + "updated_at": "2024-07-31T08:43:56Z", + "pushed_at": "2024-07-31T08:43:53Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2019/CVE-2019-7609.json b/2019/CVE-2019-7609.json index e4772314fd..f5125b38f2 100644 --- a/2019/CVE-2019-7609.json +++ b/2019/CVE-2019-7609.json @@ -76,10 +76,10 @@ "description": "exploit CVE-2019-7609(kibana RCE) on right way by python2 scripts", "fork": false, "created_at": "2019-10-21T15:31:13Z", - "updated_at": "2024-07-12T10:13:14Z", + "updated_at": "2024-07-31T08:03:22Z", "pushed_at": "2023-08-29T17:49:28Z", - "stargazers_count": 161, - "watchers_count": 161, + "stargazers_count": 162, + "watchers_count": 162, "has_discussions": false, "forks_count": 64, "allow_forking": true, @@ -92,7 +92,7 @@ ], "visibility": "public", "forks": 64, - "watchers": 161, + "watchers": 162, "score": 0, "subscribers_count": 7 }, diff --git a/2020/CVE-2020-14756.json b/2020/CVE-2020-14756.json index d54225f64e..6aa3522cfb 100644 --- a/2020/CVE-2020-14756.json +++ b/2020/CVE-2020-14756.json @@ -13,10 +13,10 @@ "description": "WebLogic T3\/IIOP RCE ExternalizableHelper.class of coherence.jar", "fork": false, "created_at": "2021-01-27T01:24:52Z", - "updated_at": "2023-11-03T10:05:50Z", + "updated_at": "2024-07-31T08:50:16Z", "pushed_at": "2021-01-27T01:40:56Z", - "stargazers_count": 78, - "watchers_count": 78, + "stargazers_count": 79, + "watchers_count": 79, "has_discussions": false, "forks_count": 19, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 19, - "watchers": 78, + "watchers": 79, "score": 0, "subscribers_count": 2 }, diff --git a/2020/CVE-2020-15368.json b/2020/CVE-2020-15368.json index 2ce5a17c41..aa2e6fe49d 100644 --- a/2020/CVE-2020-15368.json +++ b/2020/CVE-2020-15368.json @@ -13,10 +13,10 @@ "description": "CVE-2020-15368, aka \"How to exploit a vulnerable driver\"", "fork": false, "created_at": "2021-06-29T04:38:24Z", - "updated_at": "2024-07-30T12:13:01Z", + "updated_at": "2024-07-31T11:40:44Z", "pushed_at": "2022-04-14T03:17:44Z", - "stargazers_count": 419, - "watchers_count": 419, + "stargazers_count": 420, + "watchers_count": 420, "has_discussions": false, "forks_count": 45, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 45, - "watchers": 419, + "watchers": 420, "score": 0, "subscribers_count": 6 } diff --git a/2020/CVE-2020-3580.json b/2020/CVE-2020-3580.json index 634618a7b9..4e86d26705 100644 --- a/2020/CVE-2020-3580.json +++ b/2020/CVE-2020-3580.json @@ -43,7 +43,7 @@ "description": "Automated bulk IP or domain scanner for CVE 2020 3580. Cisco ASA and FTD XSS hunter.", "fork": false, "created_at": "2021-06-28T06:51:26Z", - "updated_at": "2024-07-28T22:29:48Z", + "updated_at": "2024-07-31T11:48:06Z", "pushed_at": "2021-07-10T12:42:24Z", "stargazers_count": 18, "watchers_count": 18, diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index e324b6d768..04586409af 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -938,10 +938,10 @@ "description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation", "fork": false, "created_at": "2022-01-26T14:26:10Z", - "updated_at": "2024-07-26T17:23:00Z", + "updated_at": "2024-07-31T11:09:30Z", "pushed_at": "2022-06-21T14:52:05Z", - "stargazers_count": 1023, - "watchers_count": 1023, + "stargazers_count": 1024, + "watchers_count": 1024, "has_discussions": false, "forks_count": 181, "allow_forking": true, @@ -952,7 +952,7 @@ ], "visibility": "public", "forks": 181, - "watchers": 1023, + "watchers": 1024, "score": 0, "subscribers_count": 14 }, diff --git a/2021/CVE-2021-40449.json b/2021/CVE-2021-40449.json index 7f9277b6d0..0324ae179f 100644 --- a/2021/CVE-2021-40449.json +++ b/2021/CVE-2021-40449.json @@ -45,10 +45,10 @@ "description": "windows 10 14393 LPE", "fork": false, "created_at": "2021-10-20T09:24:36Z", - "updated_at": "2024-07-30T16:14:36Z", + "updated_at": "2024-07-31T12:05:54Z", "pushed_at": "2021-10-28T03:51:09Z", - "stargazers_count": 92, - "watchers_count": 92, + "stargazers_count": 93, + "watchers_count": 93, "has_discussions": false, "forks_count": 46, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 46, - "watchers": 92, + "watchers": 93, "score": 0, "subscribers_count": 6 }, diff --git a/2021/CVE-2021-42013.json b/2021/CVE-2021-42013.json index 3e99fead2b..ba9cc94a13 100644 --- a/2021/CVE-2021-42013.json +++ b/2021/CVE-2021-42013.json @@ -962,5 +962,35 @@ "watchers": 0, "score": 0, "subscribers_count": 2 + }, + { + "id": 836125410, + "name": "cve-2021-42013", + "full_name": "bananoname\/cve-2021-42013", + "owner": { + "login": "bananoname", + "id": 177087379, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/177087379?v=4", + "html_url": "https:\/\/github.com\/bananoname" + }, + "html_url": "https:\/\/github.com\/bananoname\/cve-2021-42013", + "description": null, + "fork": false, + "created_at": "2024-07-31T07:48:39Z", + "updated_at": "2024-07-31T07:52:21Z", + "pushed_at": "2024-07-31T07:50:11Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-42056.json b/2021/CVE-2021-42056.json new file mode 100644 index 0000000000..d0b9e89132 --- /dev/null +++ b/2021/CVE-2021-42056.json @@ -0,0 +1,32 @@ +[ + { + "id": 429460440, + "name": "Safenet_SAC_CVE-2021-42056", + "full_name": "z00z00z00\/Safenet_SAC_CVE-2021-42056", + "owner": { + "login": "z00z00z00", + "id": 94624785, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94624785?v=4", + "html_url": "https:\/\/github.com\/z00z00z00" + }, + "html_url": "https:\/\/github.com\/z00z00z00\/Safenet_SAC_CVE-2021-42056", + "description": "Safenet Authentication Client Privilege Escalation - CVE-2021-42056", + "fork": false, + "created_at": "2021-11-18T14:27:06Z", + "updated_at": "2024-07-31T09:23:42Z", + "pushed_at": "2023-07-28T15:17:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 1 + } +] \ No newline at end of file diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index fe3bcfc77e..d2bc702284 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -48,10 +48,10 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-13T10:28:12Z", - "updated_at": "2024-07-31T02:00:35Z", + "updated_at": "2024-07-31T11:41:08Z", "pushed_at": "2023-01-29T03:31:27Z", - "stargazers_count": 759, - "watchers_count": 759, + "stargazers_count": 761, + "watchers_count": 761, "has_discussions": false, "forks_count": 118, "allow_forking": true, @@ -60,7 +60,7 @@ "topics": [], "visibility": "public", "forks": 118, - "watchers": 759, + "watchers": 761, "score": 0, "subscribers_count": 13 }, diff --git a/2021/CVE-2021-43224.json b/2021/CVE-2021-43224.json index 81633cd8fd..2f476bfd93 100644 --- a/2021/CVE-2021-43224.json +++ b/2021/CVE-2021-43224.json @@ -13,10 +13,10 @@ "description": "Windows Common Log File System Driver POC", "fork": false, "created_at": "2021-12-21T01:51:41Z", - "updated_at": "2024-04-08T16:54:21Z", + "updated_at": "2024-07-31T12:05:52Z", "pushed_at": "2021-12-21T06:57:06Z", - "stargazers_count": 94, - "watchers_count": 94, + "stargazers_count": 95, + "watchers_count": 95, "has_discussions": false, "forks_count": 31, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 31, - "watchers": 94, + "watchers": 95, "score": 0, "subscribers_count": 4 } diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 0c5a4e19ad..b8c5359fb3 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -5423,10 +5423,10 @@ "description": "Log4j2 CVE-2021-44228 revshell, ofc it suck!!", "fork": false, "created_at": "2021-12-14T05:24:52Z", - "updated_at": "2024-04-26T06:52:49Z", + "updated_at": "2024-07-31T09:38:34Z", "pushed_at": "2021-12-21T19:48:57Z", - "stargazers_count": 18, - "watchers_count": 18, + "stargazers_count": 19, + "watchers_count": 19, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -5439,7 +5439,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 18, + "watchers": 19, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-45232.json b/2021/CVE-2021-45232.json index 9ac3f00eea..8df5accf6a 100644 --- a/2021/CVE-2021-45232.json +++ b/2021/CVE-2021-45232.json @@ -212,36 +212,6 @@ "score": 0, "subscribers_count": 0 }, - { - "id": 444081415, - "name": "-cve-2021-45232", - "full_name": "xiju2003\/-cve-2021-45232", - "owner": { - "login": "xiju2003", - "id": 17631407, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17631407?v=4", - "html_url": "https:\/\/github.com\/xiju2003" - }, - "html_url": "https:\/\/github.com\/xiju2003\/-cve-2021-45232", - "description": "The vulnerability affects Apache APISIX Dashboard version 2.10.1", - "fork": false, - "created_at": "2022-01-03T14:01:32Z", - "updated_at": "2022-01-03T14:01:33Z", - "pushed_at": "2022-01-01T20:22:13Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 444659919, "name": "CVE-2021-45232-RCE", diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index cdb90eae5c..92f14468f6 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -673,10 +673,10 @@ "description": "CVE-2022-0847", "fork": false, "created_at": "2022-03-09T02:47:08Z", - "updated_at": "2024-07-16T17:06:54Z", + "updated_at": "2024-07-31T08:33:05Z", "pushed_at": "2022-03-09T02:47:32Z", - "stargazers_count": 69, - "watchers_count": 69, + "stargazers_count": 70, + "watchers_count": 70, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -687,7 +687,7 @@ ], "visibility": "public", "forks": 16, - "watchers": 69, + "watchers": 70, "score": 0, "subscribers_count": 5 }, diff --git a/2022/CVE-2022-21882.json b/2022/CVE-2022-21882.json index a7052a5a21..8eaa46496b 100644 --- a/2022/CVE-2022-21882.json +++ b/2022/CVE-2022-21882.json @@ -13,10 +13,10 @@ "description": "win32k LPE ", "fork": false, "created_at": "2022-01-27T03:44:10Z", - "updated_at": "2024-07-17T14:31:52Z", + "updated_at": "2024-07-31T12:06:00Z", "pushed_at": "2022-01-27T04:18:18Z", - "stargazers_count": 459, - "watchers_count": 459, + "stargazers_count": 460, + "watchers_count": 460, "has_discussions": false, "forks_count": 134, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 134, - "watchers": 459, + "watchers": 460, "score": 0, "subscribers_count": 14 }, diff --git a/2022/CVE-2022-22978.json b/2022/CVE-2022-22978.json index c9965fa27e..25da0b16dd 100644 --- a/2022/CVE-2022-22978.json +++ b/2022/CVE-2022-22978.json @@ -183,5 +183,35 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 836181828, + "name": "CVE-2022-22978", + "full_name": "BoB13-Opensource-Contribution-Team9\/CVE-2022-22978", + "owner": { + "login": "BoB13-Opensource-Contribution-Team9", + "id": 177111000, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/177111000?v=4", + "html_url": "https:\/\/github.com\/BoB13-Opensource-Contribution-Team9" + }, + "html_url": "https:\/\/github.com\/BoB13-Opensource-Contribution-Team9\/CVE-2022-22978", + "description": "CVE-2022-22978's Nuclei-Template", + "fork": false, + "created_at": "2024-07-31T10:12:33Z", + "updated_at": "2024-07-31T10:12:34Z", + "pushed_at": "2024-07-31T10:12:34Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-2590.json b/2022/CVE-2022-2590.json index 65a5ab295e..05d4612801 100644 --- a/2022/CVE-2022-2590.json +++ b/2022/CVE-2022-2590.json @@ -13,10 +13,10 @@ "description": "Dirty COW restricted to shmem in linux kernel", "fork": false, "created_at": "2024-07-30T15:54:07Z", - "updated_at": "2024-07-31T03:50:25Z", + "updated_at": "2024-07-31T07:03:57Z", "pushed_at": "2024-07-30T17:31:48Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -39,7 +39,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2022/CVE-2022-30203.json b/2022/CVE-2022-30203.json index bba4b18a79..f985a731df 100644 --- a/2022/CVE-2022-30203.json +++ b/2022/CVE-2022-30203.json @@ -13,10 +13,10 @@ "description": "The Porygon-Z that's super effective against Secure Boot! (CVE-2022-30203, CVE-2023-21560, CVE-2023-28269, CVE-2023-28249, and more...)", "fork": false, "created_at": "2024-06-07T15:25:33Z", - "updated_at": "2024-07-27T12:53:08Z", + "updated_at": "2024-07-31T06:55:36Z", "pushed_at": "2024-06-07T15:26:02Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -36,7 +36,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 2 } diff --git a/2022/CVE-2022-32932.json b/2022/CVE-2022-32932.json index 9d1e411fec..a1a020df1a 100644 --- a/2022/CVE-2022-32932.json +++ b/2022/CVE-2022-32932.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2024-03-25T23:00:41Z", - "updated_at": "2024-03-25T23:00:41Z", + "updated_at": "2024-07-31T09:46:19Z", "pushed_at": "2024-03-25T23:26:17Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2022/CVE-2022-42889.json b/2022/CVE-2022-42889.json index d1ca9a6210..ac019c5884 100644 --- a/2022/CVE-2022-42889.json +++ b/2022/CVE-2022-42889.json @@ -1333,10 +1333,10 @@ "description": "This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the CVE id: CVE-2022-42889. ", "fork": false, "created_at": "2023-06-27T08:29:24Z", - "updated_at": "2024-05-13T21:14:40Z", + "updated_at": "2024-07-31T08:32:47Z", "pushed_at": "2023-06-27T09:01:14Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -1345,7 +1345,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 7, + "watchers": 8, "score": 0, "subscribers_count": 2 }, diff --git a/2022/CVE-2022-46689.json b/2022/CVE-2022-46689.json index d96e868ccb..93049634b8 100644 --- a/2022/CVE-2022-46689.json +++ b/2022/CVE-2022-46689.json @@ -133,10 +133,10 @@ "description": "File Manager for CVE-2022-46689", "fork": false, "created_at": "2022-12-28T22:13:35Z", - "updated_at": "2024-06-18T14:03:30Z", + "updated_at": "2024-07-31T07:07:35Z", "pushed_at": "2023-01-02T00:36:39Z", - "stargazers_count": 80, - "watchers_count": 80, + "stargazers_count": 79, + "watchers_count": 79, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -145,7 +145,7 @@ "topics": [], "visibility": "public", "forks": 16, - "watchers": 80, + "watchers": 79, "score": 0, "subscribers_count": 7 }, @@ -255,10 +255,10 @@ "description": "iOS customization app powered by CVE-2022-46689", "fork": false, "created_at": "2023-01-12T14:31:30Z", - "updated_at": "2024-05-18T08:16:10Z", + "updated_at": "2024-07-31T07:07:18Z", "pushed_at": "2023-02-12T01:37:16Z", - "stargazers_count": 21, - "watchers_count": 21, + "stargazers_count": 20, + "watchers_count": 20, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -277,7 +277,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 21, + "watchers": 20, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-21560.json b/2023/CVE-2023-21560.json index bba4b18a79..f985a731df 100644 --- a/2023/CVE-2023-21560.json +++ b/2023/CVE-2023-21560.json @@ -13,10 +13,10 @@ "description": "The Porygon-Z that's super effective against Secure Boot! (CVE-2022-30203, CVE-2023-21560, CVE-2023-28269, CVE-2023-28249, and more...)", "fork": false, "created_at": "2024-06-07T15:25:33Z", - "updated_at": "2024-07-27T12:53:08Z", + "updated_at": "2024-07-31T06:55:36Z", "pushed_at": "2024-06-07T15:26:02Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -36,7 +36,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-21839.json b/2023/CVE-2023-21839.json index 1ccb209086..61acdc02e6 100644 --- a/2023/CVE-2023-21839.json +++ b/2023/CVE-2023-21839.json @@ -13,7 +13,7 @@ "description": null, "fork": false, "created_at": "2023-02-21T16:08:56Z", - "updated_at": "2024-07-29T08:07:18Z", + "updated_at": "2024-07-31T09:11:07Z", "pushed_at": "2023-02-26T06:43:18Z", "stargazers_count": 216, "watchers_count": 216, diff --git a/2023/CVE-2023-22527.json b/2023/CVE-2023-22527.json index 7ad62f5856..da8c6f0b0d 100644 --- a/2023/CVE-2023-22527.json +++ b/2023/CVE-2023-22527.json @@ -616,8 +616,8 @@ "description": "Three go-exploits exploiting CVE-2023-22527 to execute arbitrary code in memory", "fork": false, "created_at": "2024-03-04T19:09:57Z", - "updated_at": "2024-07-30T09:39:29Z", - "pushed_at": "2024-07-30T09:39:28Z", + "updated_at": "2024-07-31T10:07:52Z", + "pushed_at": "2024-07-31T10:07:50Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, diff --git a/2023/CVE-2023-28434.json b/2023/CVE-2023-28434.json index 02cc7b23be..3f924e9118 100644 --- a/2023/CVE-2023-28434.json +++ b/2023/CVE-2023-28434.json @@ -13,10 +13,10 @@ "description": "EXP for CVE-2023-28434 MinIO unauthorized to RCE", "fork": false, "created_at": "2023-03-27T08:53:04Z", - "updated_at": "2024-07-08T01:46:30Z", + "updated_at": "2024-07-31T09:58:28Z", "pushed_at": "2023-04-04T05:26:59Z", - "stargazers_count": 294, - "watchers_count": 294, + "stargazers_count": 295, + "watchers_count": 295, "has_discussions": false, "forks_count": 37, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 37, - "watchers": 294, + "watchers": 295, "score": 0, "subscribers_count": 3 } diff --git a/2023/CVE-2023-30777.json b/2023/CVE-2023-30777.json index e7f236ff14..4cfee1e7fb 100644 --- a/2023/CVE-2023-30777.json +++ b/2023/CVE-2023-30777.json @@ -13,10 +13,10 @@ "description": "Proof of Concept (PoC) URL generator for a reflected XSS vulnerability in the Advanced Custom Fields WordPress plugin.", "fork": false, "created_at": "2023-06-17T12:43:51Z", - "updated_at": "2023-09-24T00:46:26Z", + "updated_at": "2024-07-31T11:37:11Z", "pushed_at": "2023-06-17T12:48:18Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 6, + "watchers": 7, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-32243.json b/2023/CVE-2023-32243.json index 721af23dfe..4c86c58a55 100644 --- a/2023/CVE-2023-32243.json +++ b/2023/CVE-2023-32243.json @@ -73,10 +73,10 @@ "description": "CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation", "fork": false, "created_at": "2023-05-15T09:39:45Z", - "updated_at": "2024-07-16T13:10:25Z", + "updated_at": "2024-07-31T07:47:52Z", "pushed_at": "2023-06-05T08:13:19Z", - "stargazers_count": 82, - "watchers_count": 82, + "stargazers_count": 83, + "watchers_count": 83, "has_discussions": false, "forks_count": 24, "allow_forking": true, @@ -89,7 +89,7 @@ ], "visibility": "public", "forks": 24, - "watchers": 82, + "watchers": 83, "score": 0, "subscribers_count": 4 }, diff --git a/2023/CVE-2023-3519.json b/2023/CVE-2023-3519.json index 3af3776b5d..bd5f9c3244 100644 --- a/2023/CVE-2023-3519.json +++ b/2023/CVE-2023-3519.json @@ -172,10 +172,10 @@ "description": "RCE exploit for CVE-2023-3519", "fork": false, "created_at": "2023-07-21T20:17:43Z", - "updated_at": "2024-07-09T02:13:42Z", + "updated_at": "2024-07-31T11:01:08Z", "pushed_at": "2023-08-23T16:27:28Z", - "stargazers_count": 212, - "watchers_count": 212, + "stargazers_count": 213, + "watchers_count": 213, "has_discussions": false, "forks_count": 40, "allow_forking": true, @@ -184,7 +184,7 @@ "topics": [], "visibility": "public", "forks": 40, - "watchers": 212, + "watchers": 213, "score": 0, "subscribers_count": 4 }, diff --git a/2023/CVE-2023-38831.json b/2023/CVE-2023-38831.json index 733688b016..0b57dced7d 100644 --- a/2023/CVE-2023-38831.json +++ b/2023/CVE-2023-38831.json @@ -137,10 +137,10 @@ "description": "An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23", "fork": false, "created_at": "2023-08-27T21:49:37Z", - "updated_at": "2024-06-28T01:11:57Z", + "updated_at": "2024-07-31T07:04:33Z", "pushed_at": "2023-08-27T22:17:56Z", - "stargazers_count": 116, - "watchers_count": 116, + "stargazers_count": 117, + "watchers_count": 117, "has_discussions": false, "forks_count": 19, "allow_forking": true, @@ -156,7 +156,7 @@ ], "visibility": "public", "forks": 19, - "watchers": 116, + "watchers": 117, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-4220.json b/2023/CVE-2023-4220.json index 68801c8b4e..78c758bd62 100644 --- a/2023/CVE-2023-4220.json +++ b/2023/CVE-2023-4220.json @@ -159,10 +159,10 @@ "description": "This is an Exploit for Unrestricted file upload in big file upload functionality in Chamilo-LMS for this location \"\/main\/inc\/lib\/javascript\/bigupload\/inc\/bigUpload.php\" in Chamilo LMS <= v1.11.24, and Attackers can obtain remote code execution via uploading of web shell.", "fork": false, "created_at": "2024-07-08T09:48:38Z", - "updated_at": "2024-07-30T16:00:11Z", + "updated_at": "2024-07-31T07:00:42Z", "pushed_at": "2024-07-08T11:55:53Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -182,7 +182,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 4, + "watchers": 3, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-42442.json b/2023/CVE-2023-42442.json index af072b91d7..b4e4192209 100644 --- a/2023/CVE-2023-42442.json +++ b/2023/CVE-2023-42442.json @@ -43,10 +43,10 @@ "description": "JumpServer 堡垒机未授权综合漏洞利用, Exploit for CVE-2023-42442 \/ CVE-2023-42820 \/ RCE 2021", "fork": false, "created_at": "2023-10-14T09:35:07Z", - "updated_at": "2024-07-31T04:38:50Z", + "updated_at": "2024-07-31T07:27:06Z", "pushed_at": "2024-05-16T07:42:00Z", - "stargazers_count": 194, - "watchers_count": 194, + "stargazers_count": 195, + "watchers_count": 195, "has_discussions": false, "forks_count": 19, "allow_forking": true, @@ -59,7 +59,7 @@ ], "visibility": "public", "forks": 19, - "watchers": 194, + "watchers": 195, "score": 0, "subscribers_count": 3 }, diff --git a/2023/CVE-2023-42819.json b/2023/CVE-2023-42819.json index 617a4332c9..1e751f5eaa 100644 --- a/2023/CVE-2023-42819.json +++ b/2023/CVE-2023-42819.json @@ -13,10 +13,10 @@ "description": "CVE-2023-42819", "fork": false, "created_at": "2023-10-12T08:45:46Z", - "updated_at": "2023-11-16T01:31:26Z", + "updated_at": "2024-07-31T07:23:36Z", "pushed_at": "2023-12-28T07:05:46Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-0044.json b/2024/CVE-2024-0044.json index 1da24c938e..2b38df8216 100644 --- a/2024/CVE-2024-0044.json +++ b/2024/CVE-2024-0044.json @@ -103,10 +103,10 @@ "description": "CVE-2024-0044: uma vulnerabilidade de alta gravidade do tipo \"executar como qualquer aplicativo\" que afeta as versões 12 e 13 do Android", "fork": false, "created_at": "2024-07-11T18:46:45Z", - "updated_at": "2024-07-30T19:49:46Z", + "updated_at": "2024-07-31T07:01:27Z", "pushed_at": "2024-07-11T18:51:19Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 3, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index 9129c1ef4c..5dc6cf4502 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -13,7 +13,7 @@ "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "fork": false, "created_at": "2024-03-20T21:16:41Z", - "updated_at": "2024-07-29T03:26:59Z", + "updated_at": "2024-07-31T12:18:32Z", "pushed_at": "2024-04-17T16:09:54Z", "stargazers_count": 2196, "watchers_count": 2196, diff --git a/2024/CVE-2024-20399.json b/2024/CVE-2024-20399.json index d349510883..d120698063 100644 --- a/2024/CVE-2024-20399.json +++ b/2024/CVE-2024-20399.json @@ -13,10 +13,10 @@ "description": "Private exploit for Cisco Nexus giving RCE", "fork": false, "created_at": "2024-07-02T23:40:49Z", - "updated_at": "2024-07-30T19:46:11Z", + "updated_at": "2024-07-31T06:59:36Z", "pushed_at": "2024-07-02T23:47:53Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-21338.json b/2024/CVE-2024-21338.json index 5a7dec4c15..307d4cc9a5 100644 --- a/2024/CVE-2024-21338.json +++ b/2024/CVE-2024-21338.json @@ -133,10 +133,10 @@ "description": null, "fork": false, "created_at": "2024-06-23T06:03:44Z", - "updated_at": "2024-07-10T02:54:54Z", + "updated_at": "2024-07-31T08:42:23Z", "pushed_at": "2024-06-23T06:09:10Z", - "stargazers_count": 34, - "watchers_count": 34, + "stargazers_count": 35, + "watchers_count": 35, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -145,7 +145,7 @@ "topics": [], "visibility": "public", "forks": 12, - "watchers": 34, + "watchers": 35, "score": 0, "subscribers_count": 2 } diff --git a/2024/CVE-2024-21762.json b/2024/CVE-2024-21762.json index 7a4d337d3e..384d3471d6 100644 --- a/2024/CVE-2024-21762.json +++ b/2024/CVE-2024-21762.json @@ -133,10 +133,10 @@ "description": "The PoC demonstrates the potential for remote code execution by exploiting the identified security flaw.", "fork": false, "created_at": "2024-03-17T09:15:22Z", - "updated_at": "2024-05-28T01:22:54Z", + "updated_at": "2024-07-31T07:59:05Z", "pushed_at": "2024-03-17T09:20:35Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -145,7 +145,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 6, + "watchers": 7, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-24919.json b/2024/CVE-2024-24919.json index 3fbb002949..a2310f3906 100644 --- a/2024/CVE-2024-24919.json +++ b/2024/CVE-2024-24919.json @@ -1480,5 +1480,35 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 836175301, + "name": "CVE-2024-24919", + "full_name": "smkxt1\/CVE-2024-24919", + "owner": { + "login": "smkxt1", + "id": 116267288, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/116267288?v=4", + "html_url": "https:\/\/github.com\/smkxt1" + }, + "html_url": "https:\/\/github.com\/smkxt1\/CVE-2024-24919", + "description": null, + "fork": false, + "created_at": "2024-07-31T09:55:29Z", + "updated_at": "2024-07-31T09:56:19Z", + "pushed_at": "2024-07-31T09:56:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-25600.json b/2024/CVE-2024-25600.json index ac717ab124..3bc3fc1723 100644 --- a/2024/CVE-2024-25600.json +++ b/2024/CVE-2024-25600.json @@ -13,10 +13,10 @@ "description": "Unauthenticated Remote Code Execution – Bricks <= 1.9.6", "fork": false, "created_at": "2024-02-20T20:16:09Z", - "updated_at": "2024-07-27T20:17:16Z", + "updated_at": "2024-07-31T11:17:16Z", "pushed_at": "2024-02-25T21:50:09Z", - "stargazers_count": 136, - "watchers_count": 136, + "stargazers_count": 137, + "watchers_count": 137, "has_discussions": false, "forks_count": 32, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 32, - "watchers": 136, + "watchers": 137, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-27956.json b/2024/CVE-2024-27956.json index bec02469ea..289651509c 100644 --- a/2024/CVE-2024-27956.json +++ b/2024/CVE-2024-27956.json @@ -43,19 +43,19 @@ "description": "PoC for SQL Injection in CVE-2024-27956", "fork": false, "created_at": "2024-05-01T01:58:28Z", - "updated_at": "2024-07-28T17:23:04Z", + "updated_at": "2024-07-31T12:30:47Z", "pushed_at": "2024-05-03T11:28:21Z", - "stargazers_count": 75, - "watchers_count": 75, + "stargazers_count": 76, + "watchers_count": 76, "has_discussions": false, - "forks_count": 23, + "forks_count": 24, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 23, - "watchers": 75, + "forks": 24, + "watchers": 76, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-30088.json b/2024/CVE-2024-30088.json index 7725879578..13343b15c3 100644 --- a/2024/CVE-2024-30088.json +++ b/2024/CVE-2024-30088.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2024-06-24T10:37:26Z", - "updated_at": "2024-07-31T04:06:42Z", + "updated_at": "2024-07-31T08:41:58Z", "pushed_at": "2024-06-24T11:16:26Z", - "stargazers_count": 181, - "watchers_count": 181, + "stargazers_count": 182, + "watchers_count": 182, "has_discussions": false, "forks_count": 43, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 43, - "watchers": 181, + "watchers": 182, "score": 0, "subscribers_count": 3 }, @@ -103,10 +103,10 @@ "description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088", "fork": false, "created_at": "2024-07-15T08:07:05Z", - "updated_at": "2024-07-31T00:47:55Z", + "updated_at": "2024-07-31T09:41:52Z", "pushed_at": "2024-07-18T01:28:46Z", - "stargazers_count": 276, - "watchers_count": 276, + "stargazers_count": 277, + "watchers_count": 277, "has_discussions": false, "forks_count": 25, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 25, - "watchers": 276, + "watchers": 277, "score": 0, "subscribers_count": 13 }, diff --git a/2024/CVE-2024-32002.json b/2024/CVE-2024-32002.json index 0fe84a8b16..ff4d32c3cc 100644 --- a/2024/CVE-2024-32002.json +++ b/2024/CVE-2024-32002.json @@ -73,10 +73,10 @@ "description": "Exploit PoC for CVE-2024-32002", "fork": false, "created_at": "2024-05-17T19:33:08Z", - "updated_at": "2024-07-31T04:47:32Z", + "updated_at": "2024-07-31T08:44:13Z", "pushed_at": "2024-05-19T07:12:00Z", - "stargazers_count": 472, - "watchers_count": 472, + "stargazers_count": 475, + "watchers_count": 475, "has_discussions": false, "forks_count": 141, "allow_forking": true, @@ -90,7 +90,7 @@ ], "visibility": "public", "forks": 141, - "watchers": 472, + "watchers": 475, "score": 0, "subscribers_count": 3 }, @@ -1449,10 +1449,10 @@ "description": "git clone rce CVE-2024-32002", "fork": false, "created_at": "2024-07-03T08:01:39Z", - "updated_at": "2024-07-30T19:50:09Z", + "updated_at": "2024-07-31T06:59:40Z", "pushed_at": "2024-07-09T01:52:48Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -1461,7 +1461,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 3, "score": 0, "subscribers_count": 1 }, @@ -1741,5 +1741,65 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 836222018, + "name": "cve-2024-32002-malicious", + "full_name": "mprunet\/cve-2024-32002-malicious", + "owner": { + "login": "mprunet", + "id": 937437, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/937437?v=4", + "html_url": "https:\/\/github.com\/mprunet" + }, + "html_url": "https:\/\/github.com\/mprunet\/cve-2024-32002-malicious", + "description": null, + "fork": false, + "created_at": "2024-07-31T11:58:32Z", + "updated_at": "2024-07-31T12:03:13Z", + "pushed_at": "2024-07-31T12:03:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + }, + { + "id": 836222351, + "name": "cve-2024-32002-pull", + "full_name": "mprunet\/cve-2024-32002-pull", + "owner": { + "login": "mprunet", + "id": 937437, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/937437?v=4", + "html_url": "https:\/\/github.com\/mprunet" + }, + "html_url": "https:\/\/github.com\/mprunet\/cve-2024-32002-pull", + "description": null, + "fork": false, + "created_at": "2024-07-31T11:59:17Z", + "updated_at": "2024-07-31T12:01:52Z", + "pushed_at": "2024-07-31T12:01:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-32104.json b/2024/CVE-2024-32104.json new file mode 100644 index 0000000000..0da2f579b1 --- /dev/null +++ b/2024/CVE-2024-32104.json @@ -0,0 +1,32 @@ +[ + { + "id": 836230704, + "name": "CVE-2024-32104", + "full_name": "Cerberus-HiproPlus\/CVE-2024-32104", + "owner": { + "login": "Cerberus-HiproPlus", + "id": 176384180, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/176384180?v=4", + "html_url": "https:\/\/github.com\/Cerberus-HiproPlus" + }, + "html_url": "https:\/\/github.com\/Cerberus-HiproPlus\/CVE-2024-32104", + "description": null, + "fork": false, + "created_at": "2024-07-31T12:20:07Z", + "updated_at": "2024-07-31T12:20:07Z", + "pushed_at": "2024-07-31T12:20:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-36401.json b/2024/CVE-2024-36401.json index 857092aa59..e7554c2f68 100644 --- a/2024/CVE-2024-36401.json +++ b/2024/CVE-2024-36401.json @@ -43,10 +43,10 @@ "description": "POC", "fork": false, "created_at": "2024-07-05T03:02:30Z", - "updated_at": "2024-07-30T15:59:37Z", + "updated_at": "2024-07-31T07:00:04Z", "pushed_at": "2024-07-05T03:05:39Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 3, "score": 0, "subscribers_count": 1 }, @@ -78,13 +78,13 @@ "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 @@ -103,12 +103,12 @@ "description": "Remote Code Execution (RCE) Vulnerability In Evaluating Property Name Expressions with multies ways to exploit", "fork": false, "created_at": "2024-07-06T01:10:28Z", - "updated_at": "2024-07-31T01:16:29Z", + "updated_at": "2024-07-31T12:33:22Z", "pushed_at": "2024-07-06T01:57:58Z", - "stargazers_count": 25, - "watchers_count": 25, + "stargazers_count": 27, + "watchers_count": 27, "has_discussions": false, - "forks_count": 2, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -121,8 +121,8 @@ "vulnerabilities" ], "visibility": "public", - "forks": 2, - "watchers": 25, + "forks": 3, + "watchers": 27, "score": 0, "subscribers_count": 1 }, @@ -230,19 +230,19 @@ "description": "GeoServer Remote Code Execution", "fork": false, "created_at": "2024-07-30T18:43:40Z", - "updated_at": "2024-07-31T06:00:21Z", + "updated_at": "2024-07-31T12:18:26Z", "pushed_at": "2024-07-30T18:45:58Z", - "stargazers_count": 20, - "watchers_count": 20, + "stargazers_count": 23, + "watchers_count": 23, "has_discussions": false, - "forks_count": 5, + "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 5, - "watchers": 20, + "forks": 6, + "watchers": 23, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-36842.json b/2024/CVE-2024-36842.json new file mode 100644 index 0000000000..edc8bd825d --- /dev/null +++ b/2024/CVE-2024-36842.json @@ -0,0 +1,32 @@ +[ + { + "id": 798261880, + "name": "Backdooring-Oncord-Android-Sterio-", + "full_name": "abbiy\/Backdooring-Oncord-Android-Sterio-", + "owner": { + "login": "abbiy", + "id": 19267773, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19267773?v=4", + "html_url": "https:\/\/github.com\/abbiy" + }, + "html_url": "https:\/\/github.com\/abbiy\/Backdooring-Oncord-Android-Sterio-", + "description": "CVE-2024-36842, Creating Persistent Backdoor on Oncord+ android\/ios car infotaiment using malicious script!", + "fork": false, + "created_at": "2024-05-09T12:28:11Z", + "updated_at": "2024-07-31T10:19:02Z", + "pushed_at": "2024-07-31T10:15:41Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-36991.json b/2024/CVE-2024-36991.json index de484a04fd..6a99bfff89 100644 --- a/2024/CVE-2024-36991.json +++ b/2024/CVE-2024-36991.json @@ -79,10 +79,10 @@ "description": "CVE-2024-36991: Path traversal that affects Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10.", "fork": false, "created_at": "2024-07-06T15:24:24Z", - "updated_at": "2024-07-30T23:32:06Z", + "updated_at": "2024-07-31T07:00:23Z", "pushed_at": "2024-07-06T15:53:55Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -91,7 +91,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 3, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-39081.json b/2024/CVE-2024-39081.json index 6ad01037e1..9923002798 100644 --- a/2024/CVE-2024-39081.json +++ b/2024/CVE-2024-39081.json @@ -13,8 +13,8 @@ "description": "CVE-2024-39081. BLE TPMS data manipulation over bluetooth communication.", "fork": false, "created_at": "2024-04-05T05:13:27Z", - "updated_at": "2024-07-31T06:31:07Z", - "pushed_at": "2024-07-31T06:30:34Z", + "updated_at": "2024-07-31T06:34:52Z", + "pushed_at": "2024-07-31T06:34:49Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-4040.json b/2024/CVE-2024-4040.json index 941e9e98f9..3e62667744 100644 --- a/2024/CVE-2024-4040.json +++ b/2024/CVE-2024-4040.json @@ -13,10 +13,10 @@ "description": "Scanner for CVE-2024-4040", "fork": false, "created_at": "2024-04-23T09:31:29Z", - "updated_at": "2024-07-30T16:14:52Z", + "updated_at": "2024-07-31T12:18:30Z", "pushed_at": "2024-05-17T06:48:43Z", - "stargazers_count": 51, - "watchers_count": 51, + "stargazers_count": 50, + "watchers_count": 50, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 8, - "watchers": 51, + "watchers": 50, "score": 0, "subscribers_count": 8 }, @@ -358,10 +358,10 @@ "description": "CVE-2024-4040 PoC", "fork": false, "created_at": "2024-07-05T05:46:56Z", - "updated_at": "2024-07-30T19:49:57Z", + "updated_at": "2024-07-31T07:00:05Z", "pushed_at": "2024-07-09T09:48:17Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -374,7 +374,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 4, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-41628.json b/2024/CVE-2024-41628.json index 479f875b3a..b1c1682e7e 100644 --- a/2024/CVE-2024-41628.json +++ b/2024/CVE-2024-41628.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2024-07-29T07:12:14Z", - "updated_at": "2024-07-29T13:04:45Z", + "updated_at": "2024-07-31T07:41:30Z", "pushed_at": "2024-07-29T13:04:42Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-4320.json b/2024/CVE-2024-4320.json new file mode 100644 index 0000000000..8a1d78b64a --- /dev/null +++ b/2024/CVE-2024-4320.json @@ -0,0 +1,32 @@ +[ + { + "id": 836220463, + "name": "CVE-2024-4320", + "full_name": "bolkv\/CVE-2024-4320", + "owner": { + "login": "bolkv", + "id": 145219983, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145219983?v=4", + "html_url": "https:\/\/github.com\/bolkv" + }, + "html_url": "https:\/\/github.com\/bolkv\/CVE-2024-4320", + "description": null, + "fork": false, + "created_at": "2024-07-31T11:54:31Z", + "updated_at": "2024-07-31T11:55:39Z", + "pushed_at": "2024-07-31T11:55:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-4577.json b/2024/CVE-2024-4577.json index 085983ec8a..32b13b7f64 100644 --- a/2024/CVE-2024-4577.json +++ b/2024/CVE-2024-4577.json @@ -1406,5 +1406,35 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 836182474, + "name": "CVE-2024-4577", + "full_name": "Jcccccx\/CVE-2024-4577", + "owner": { + "login": "Jcccccx", + "id": 167961583, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/167961583?v=4", + "html_url": "https:\/\/github.com\/Jcccccx" + }, + "html_url": "https:\/\/github.com\/Jcccccx\/CVE-2024-4577", + "description": "批量验证POC和EXP", + "fork": false, + "created_at": "2024-07-31T10:14:14Z", + "updated_at": "2024-07-31T10:37:59Z", + "pushed_at": "2024-07-31T10:37:56Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json index da1e9570f8..63ddfb0ef3 100644 --- a/2024/CVE-2024-6387.json +++ b/2024/CVE-2024-6387.json @@ -13,7 +13,7 @@ "description": "a signal handler race condition in OpenSSH's server (sshd)", "fork": false, "created_at": "2024-07-01T10:55:29Z", - "updated_at": "2024-07-29T03:10:45Z", + "updated_at": "2024-07-31T12:18:13Z", "pushed_at": "2024-07-01T10:54:02Z", "stargazers_count": 440, "watchers_count": 440, @@ -43,10 +43,10 @@ "description": "32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo\/cve-2024-6387-poc", "fork": false, "created_at": "2024-07-01T12:16:21Z", - "updated_at": "2024-07-30T11:08:17Z", + "updated_at": "2024-07-31T10:24:53Z", "pushed_at": "2024-07-01T12:25:01Z", - "stargazers_count": 379, - "watchers_count": 379, + "stargazers_count": 381, + "watchers_count": 381, "has_discussions": false, "forks_count": 90, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 90, - "watchers": 379, + "watchers": 381, "score": 0, "subscribers_count": 8 }, @@ -260,10 +260,10 @@ "description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH", "fork": false, "created_at": "2024-07-01T20:33:20Z", - "updated_at": "2024-07-29T03:53:19Z", + "updated_at": "2024-07-31T12:18:11Z", "pushed_at": "2024-07-14T09:58:48Z", - "stargazers_count": 421, - "watchers_count": 421, + "stargazers_count": 422, + "watchers_count": 422, "has_discussions": false, "forks_count": 84, "allow_forking": true, @@ -278,7 +278,7 @@ ], "visibility": "public", "forks": 84, - "watchers": 421, + "watchers": 422, "score": 0, "subscribers_count": 6 }, @@ -852,10 +852,10 @@ "description": "CVE-2024-6387-nmap", "fork": false, "created_at": "2024-07-02T08:19:55Z", - "updated_at": "2024-07-30T22:00:42Z", + "updated_at": "2024-07-31T06:59:27Z", "pushed_at": "2024-07-02T08:26:46Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -864,7 +864,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 4, + "watchers": 3, "score": 0, "subscribers_count": 1 }, @@ -1540,10 +1540,10 @@ "description": null, "fork": false, "created_at": "2024-07-02T20:19:12Z", - "updated_at": "2024-07-30T23:32:05Z", + "updated_at": "2024-07-31T06:59:36Z", "pushed_at": "2024-07-02T20:28:35Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -1552,7 +1552,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 3, "score": 0, "subscribers_count": 1 }, @@ -1660,10 +1660,10 @@ "description": "Targeting a signal handler race condition in OpenSSH's server (sshd) on glibc-based Linux systems.", "fork": false, "created_at": "2024-07-03T06:08:32Z", - "updated_at": "2024-07-30T23:39:31Z", + "updated_at": "2024-07-31T06:59:39Z", "pushed_at": "2024-07-03T06:47:46Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -1674,7 +1674,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 3, + "watchers": 2, "score": 0, "subscribers_count": 1 }, @@ -1692,10 +1692,10 @@ "description": "SSH Exploit for CVE-2024-6387 : RCE in OpenSSH's server, on glibc-based Linux systems", "fork": false, "created_at": "2024-07-03T08:22:57Z", - "updated_at": "2024-07-30T16:00:05Z", + "updated_at": "2024-07-31T06:59:40Z", "pushed_at": "2024-07-04T15:07:21Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -1711,7 +1711,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 4, + "watchers": 3, "score": 0, "subscribers_count": 1 }, @@ -2233,10 +2233,10 @@ "description": "Vulnerability remediation and mitigationCVE-2024-6387", "fork": false, "created_at": "2024-07-05T21:29:11Z", - "updated_at": "2024-07-30T23:39:23Z", + "updated_at": "2024-07-31T07:00:15Z", "pushed_at": "2024-07-05T21:47:44Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -2245,7 +2245,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 3, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-81757.json b/2024/CVE-2024-81757.json index 93cc28faf3..3b3d2f5be5 100644 --- a/2024/CVE-2024-81757.json +++ b/2024/CVE-2024-81757.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2024-07-29T05:54:39Z", - "updated_at": "2024-07-30T23:32:02Z", + "updated_at": "2024-07-31T07:03:50Z", "pushed_at": "2024-07-29T06:05:22Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 3, "score": 0, "subscribers_count": 2 } diff --git a/README.md b/README.md index 287854296e..0d09a70b1c 100644 --- a/README.md +++ b/README.md @@ -667,6 +667,13 @@ - [truonghuuphuc/CVE-2024-4295-Poc](https://github.com/truonghuuphuc/CVE-2024-4295-Poc) - [cve-2024/CVE-2024-4295-Poc](https://github.com/cve-2024/CVE-2024-4295-Poc) +### CVE-2024-4320 (2024-06-06) + +A remote code execution (RCE) vulnerability exists in the '/install_extension' endpoint of the parisneo/lollms-webui application, specifically within the `@router.post("/install_extension")` route handler. The vulnerability arises due to improper handling of the `name` parameter in the `ExtensionBuilder().build_extension()` method, which allows for local file inclusion (LFI) leading to arbitrary code execution. An attacker can exploit this vulnerability by crafting a malicious `name` parameter that causes the server to load and execute a `__init__.py` file from an arbitrary location, such as the upload directory for discussions. This vulnerability affects the latest version of parisneo/lollms-webui and can lead to remote code execution without requiring user interaction, especially when the application is exposed to an external endpoint or operated in headless mode. + + +- [bolkv/CVE-2024-4320](https://github.com/bolkv/CVE-2024-4320) + ### CVE-2024-4323 (2024-05-20) A memory corruption vulnerability in Fluent Bit versions 2.0.7 thru 3.0.3. This issue lies in the embedded http server’s parsing of trace requests and may result in denial of service conditions, information disclosure, or remote code execution. @@ -782,6 +789,7 @@ - [nNoSuger/CVE-2024-4577](https://github.com/nNoSuger/CVE-2024-4577) - [a-roshbaik/CVE-2024-4577](https://github.com/a-roshbaik/CVE-2024-4577) - [a-roshbaik/CVE-2024-4577-PHP-RCE](https://github.com/a-roshbaik/CVE-2024-4577-PHP-RCE) +- [Jcccccx/CVE-2024-4577](https://github.com/Jcccccx/CVE-2024-4577) ### CVE-2024-4701 (2024-05-10) @@ -2010,6 +2018,7 @@ - [ShadowByte1/CVE-2024-24919](https://github.com/ShadowByte1/CVE-2024-24919) - [H3KEY/CVE-2024-24919](https://github.com/H3KEY/CVE-2024-24919) - [Jutrm/cve-2024-24919](https://github.com/Jutrm/cve-2024-24919) +- [smkxt1/CVE-2024-24919](https://github.com/smkxt1/CVE-2024-24919) ### CVE-2024-25092 (2024-06-09) @@ -2924,6 +2933,8 @@ - [charlesgargasson/CVE-2024-32002](https://github.com/charlesgargasson/CVE-2024-32002) - [NishanthAnand21/CVE-2024-32002-PoC](https://github.com/NishanthAnand21/CVE-2024-32002-PoC) - [tiyeume25112004/CVE-2024-32002](https://github.com/tiyeume25112004/CVE-2024-32002) +- [mprunet/cve-2024-32002-malicious](https://github.com/mprunet/cve-2024-32002-malicious) +- [mprunet/cve-2024-32002-pull](https://github.com/mprunet/cve-2024-32002-pull) ### CVE-2024-32004 (2024-05-14) @@ -2940,6 +2951,13 @@ - [huseyinstif/CVE-2024-32030-Nuclei-Template](https://github.com/huseyinstif/CVE-2024-32030-Nuclei-Template) +### CVE-2024-32104 (2024-04-15) + +Cross-Site Request Forgery (CSRF) vulnerability in XLPlugins NextMove Lite.This issue affects NextMove Lite: from n/a through 2.18.1.\n\n + + +- [Cerberus-HiproPlus/CVE-2024-32104](https://github.com/Cerberus-HiproPlus/CVE-2024-32104) + ### CVE-2024-32113 (2024-05-08) Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apache OFBiz.This issue affects Apache OFBiz: before 18.12.13.\n\nUsers are recommended to upgrade to version 18.12.13, which fixes the issue.\n\n @@ -3409,6 +3427,9 @@ - [phtcloud-dev/CVE-2024-36837](https://github.com/phtcloud-dev/CVE-2024-36837) +### CVE-2024-36842 +- [abbiy/Backdooring-Oncord-Android-Sterio-](https://github.com/abbiy/Backdooring-Oncord-Android-Sterio-) + ### CVE-2024-36991 (2024-07-01) In Splunk Enterprise on Windows versions below 9.2.2, 9.1.5, and 9.0.10, an attacker could perform a path traversal on the /modules/messaging/ endpoint in Splunk Enterprise on Windows. This vulnerability should only affect Splunk Enterprise on Windows. @@ -13841,6 +13862,7 @@ - [umakant76705/CVE-2022-22978](https://github.com/umakant76705/CVE-2022-22978) - [Raghvendra1207/CVE-2022-22978](https://github.com/Raghvendra1207/CVE-2022-22978) - [wan9xx/CVE-2022-22978-demo](https://github.com/wan9xx/CVE-2022-22978-demo) +- [BoB13-Opensource-Contribution-Team9/CVE-2022-22978](https://github.com/BoB13-Opensource-Contribution-Team9/CVE-2022-22978) ### CVE-2022-22980 (2022-06-22) @@ -23614,6 +23636,14 @@ - [BassoNicolas/CVE-2021-42013](https://github.com/BassoNicolas/CVE-2021-42013) - [rafifdna/CVE-2021-42013](https://github.com/rafifdna/CVE-2021-42013) - [Jhonsonwannaa/cve-2021-42013-apache](https://github.com/Jhonsonwannaa/cve-2021-42013-apache) +- [bananoname/cve-2021-42013](https://github.com/bananoname/cve-2021-42013) + +### CVE-2021-42056 (2022-06-24) + +Thales Safenet Authentication Client (SAC) for Linux and Windows through 10.7.7 creates insecure temporary hid and lock files allowing a local attacker, through a symlink attack, to overwrite arbitrary files, and potentially achieve arbitrary command execution with high privileges. + + +- [z00z00z00/Safenet_SAC_CVE-2021-42056](https://github.com/z00z00z00/Safenet_SAC_CVE-2021-42056) ### CVE-2021-42063 (2021-12-14) @@ -24887,7 +24917,6 @@ - [jxpsx/CVE-2021-45232-RCE](https://github.com/jxpsx/CVE-2021-45232-RCE) - [wuppp/cve-2021-45232-exp](https://github.com/wuppp/cve-2021-45232-exp) - [dskho/CVE-2021-45232](https://github.com/dskho/CVE-2021-45232) -- [xiju2003/-cve-2021-45232](https://github.com/xiju2003/-cve-2021-45232) - [GYLQ/CVE-2021-45232-RCE](https://github.com/GYLQ/CVE-2021-45232-RCE) - [fany0r/CVE-2021-45232-RCE](https://github.com/fany0r/CVE-2021-45232-RCE) - [yggcwhat/Demo](https://github.com/yggcwhat/Demo) @@ -31102,6 +31131,13 @@ - [StealYourCode/CVE-2019-1663](https://github.com/StealYourCode/CVE-2019-1663) - [abrumsen/CVE-2019-1663](https://github.com/abrumsen/CVE-2019-1663) +### CVE-2019-1698 (2019-02-20) + +A vulnerability in the web-based user interface of Cisco Internet of Things Field Network Director (IoT-FND) Software could allow an authenticated, remote attacker to gain read access to information that is stored on an affected system. The vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing certain XML files. An attacker could exploit this vulnerability by importing a crafted XML file with malicious entries, which could allow the attacker to read files within the affected application. Versions prior to 4.4(0.26) are affected. + + +- [raytran54/CVE-2019-1698](https://github.com/raytran54/CVE-2019-1698) + ### CVE-2019-1759 (2019-03-27) A vulnerability in access control list (ACL) functionality of the Gigabit Ethernet Management interface of Cisco IOS XE Software could allow an unauthenticated, remote attacker to reach the configured IP addresses on the Gigabit Ethernet Management interface. The vulnerability is due to a logic error that was introduced in the Cisco IOS XE Software 16.1.1 Release, which prevents the ACL from working when applied against the management interface. An attacker could exploit this issue by attempting to access the device via the management interface.