From 145ce69511719f7dc32d161eac31a0bbe0dfb25e Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Fri, 13 Dec 2024 03:33:03 +0900 Subject: [PATCH] Auto Update 2024/12/12 18:33:03 --- 2009/CVE-2009-1904.json | 4 ++-- 2013/CVE-2013-0156.json | 2 +- 2013/CVE-2013-0269.json | 2 +- 2013/CVE-2013-0333.json | 2 +- 2017/CVE-2017-12615.json | 8 ++++---- 2017/CVE-2017-7269.json | 16 ++++++++-------- 2018/CVE-2018-19320.json | 8 ++++---- 2018/CVE-2018-20555.json | 8 ++++---- 2018/CVE-2018-4124.json | 2 +- 2019/CVE-2019-1003000.json | 4 ++-- 2019/CVE-2019-11932.json | 4 ++-- 2019/CVE-2019-14079.json | 8 ++++---- 2019/CVE-2019-18634.json | 4 ++-- 2020/CVE-2020-1938.json | 8 ++++---- 2021/CVE-2021-4034.json | 2 +- 2021/CVE-2021-40438.json | 8 ++++---- 2021/CVE-2021-42287.json | 4 ++-- 2021/CVE-2021-44228.json | 2 +- 2022/CVE-2022-21894.json | 4 ++-- 2022/CVE-2022-24112.json | 4 ++-- 2022/CVE-2022-2586.json | 8 ++++---- 2022/CVE-2022-26134.json | 8 ++++---- 2022/CVE-2022-30190.json | 2 +- 2022/CVE-2022-42889.json | 8 ++++---- 2023/CVE-2023-20573.json | 8 ++++---- 2023/CVE-2023-23397.json | 8 ++++---- 2023/CVE-2023-38831.json | 8 ++++---- 2023/CVE-2023-45866.json | 4 ++-- 2023/CVE-2023-6241.json | 8 ++++---- 2024/CVE-2024-0012.json | 4 ++-- 2024/CVE-2024-10924.json | 8 ++++---- 2024/CVE-2024-11477.json | 8 ++++---- 2024/CVE-2024-11680.json | 8 ++++---- 2024/CVE-2024-20696.json | 8 ++++---- 2024/CVE-2024-21413.json | 8 ++++---- 2024/CVE-2024-24549.json | 8 ++++---- 2024/CVE-2024-32002.json | 8 ++++---- 2024/CVE-2024-32640.json | 8 ++++---- 2024/CVE-2024-35250.json | 8 ++++---- 2024/CVE-2024-38475.json | 4 ++-- 2024/CVE-2024-42327.json | 39 ++++++++++++++++++++++++++++++++++---- 2024/CVE-2024-45200.json | 8 ++++---- 2024/CVE-2024-48990.json | 8 ++++---- 2024/CVE-2024-4956.json | 4 ++-- 2024/CVE-2024-50623.json | 8 ++++---- 2024/CVE-2024-53677.json | 4 ++-- 2024/CVE-2024-54679.json | 8 ++++---- 2024/CVE-2024-7954.json | 8 ++++---- README.md | 11 ++++++++--- 49 files changed, 190 insertions(+), 154 deletions(-) diff --git a/2009/CVE-2009-1904.json b/2009/CVE-2009-1904.json index beeb84b7ee..a3e92cf38d 100644 --- a/2009/CVE-2009-1904.json +++ b/2009/CVE-2009-1904.json @@ -19,13 +19,13 @@ "stargazers_count": 14, "watchers_count": 14, "has_discussions": false, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 3, + "forks": 4, "watchers": 14, "score": 0, "subscribers_count": 4 diff --git a/2013/CVE-2013-0156.json b/2013/CVE-2013-0156.json index c0788ffa5e..b8cc175cb6 100644 --- a/2013/CVE-2013-0156.json +++ b/2013/CVE-2013-0156.json @@ -59,7 +59,7 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 108 + "subscribers_count": 107 }, { "id": 7564614, diff --git a/2013/CVE-2013-0269.json b/2013/CVE-2013-0269.json index 812d2c3344..35b9ec1c12 100644 --- a/2013/CVE-2013-0269.json +++ b/2013/CVE-2013-0269.json @@ -28,6 +28,6 @@ "forks": 1, "watchers": 2, "score": 0, - "subscribers_count": 110 + "subscribers_count": 109 } ] \ No newline at end of file diff --git a/2013/CVE-2013-0333.json b/2013/CVE-2013-0333.json index 8c37247a29..7e13101288 100644 --- a/2013/CVE-2013-0333.json +++ b/2013/CVE-2013-0333.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 2, "score": 0, - "subscribers_count": 109 + "subscribers_count": 108 } ] \ No newline at end of file diff --git a/2017/CVE-2017-12615.json b/2017/CVE-2017-12615.json index f2253d2692..45975f123b 100644 --- a/2017/CVE-2017-12615.json +++ b/2017/CVE-2017-12615.json @@ -417,10 +417,10 @@ "description": "tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含", "fork": false, "created_at": "2024-08-29T06:38:16Z", - "updated_at": "2024-12-08T08:50:03Z", + "updated_at": "2024-12-12T15:55:33Z", "pushed_at": "2024-11-13T03:12:58Z", - "stargazers_count": 157, - "watchers_count": 157, + "stargazers_count": 158, + "watchers_count": 158, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -437,7 +437,7 @@ ], "visibility": "public", "forks": 14, - "watchers": 157, + "watchers": 158, "score": 0, "subscribers_count": 2 }, diff --git a/2017/CVE-2017-7269.json b/2017/CVE-2017-7269.json index 617c28e9c3..3c7ddeb9c7 100644 --- a/2017/CVE-2017-7269.json +++ b/2017/CVE-2017-7269.json @@ -205,10 +205,10 @@ "description": "iis6 exploit 2017 CVE-2017-7269", "fork": false, "created_at": "2017-04-05T23:21:12Z", - "updated_at": "2024-11-18T05:25:32Z", + "updated_at": "2024-12-12T16:04:23Z", "pushed_at": "2023-02-04T09:09:35Z", - "stargazers_count": 87, - "watchers_count": 87, + "stargazers_count": 88, + "watchers_count": 88, "has_discussions": false, "forks_count": 55, "allow_forking": true, @@ -217,7 +217,7 @@ "topics": [], "visibility": "public", "forks": 55, - "watchers": 87, + "watchers": 88, "score": 0, "subscribers_count": 3 }, @@ -391,10 +391,10 @@ "description": null, "fork": false, "created_at": "2018-04-28T04:11:45Z", - "updated_at": "2024-08-12T19:38:07Z", + "updated_at": "2024-12-12T16:02:23Z", "pushed_at": "2018-04-28T04:47:05Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -403,7 +403,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 10, + "watchers": 11, "score": 0, "subscribers_count": 2 }, diff --git a/2018/CVE-2018-19320.json b/2018/CVE-2018-19320.json index da3bd1a082..af3765d696 100644 --- a/2018/CVE-2018-19320.json +++ b/2018/CVE-2018-19320.json @@ -76,10 +76,10 @@ "description": "Unsigned driver loader using CVE-2018-19320", "fork": false, "created_at": "2022-11-12T05:48:13Z", - "updated_at": "2024-12-07T06:34:43Z", + "updated_at": "2024-12-12T12:16:18Z", "pushed_at": "2023-04-09T13:50:29Z", - "stargazers_count": 212, - "watchers_count": 212, + "stargazers_count": 211, + "watchers_count": 211, "has_discussions": false, "forks_count": 57, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 57, - "watchers": 212, + "watchers": 211, "score": 0, "subscribers_count": 9 } diff --git a/2018/CVE-2018-20555.json b/2018/CVE-2018-20555.json index 1dab520148..4db9822119 100644 --- a/2018/CVE-2018-20555.json +++ b/2018/CVE-2018-20555.json @@ -14,10 +14,10 @@ "description": "Social Network Tabs Wordpress Plugin Vulnerability - CVE-2018-20555", "fork": false, "created_at": "2019-01-16T14:45:44Z", - "updated_at": "2024-08-12T19:44:55Z", + "updated_at": "2024-12-12T12:22:56Z", "pushed_at": "2020-10-20T14:30:01Z", - "stargazers_count": 75, - "watchers_count": 75, + "stargazers_count": 74, + "watchers_count": 74, "has_discussions": false, "forks_count": 21, "allow_forking": true, @@ -33,7 +33,7 @@ ], "visibility": "public", "forks": 21, - "watchers": 75, + "watchers": 74, "score": 0, "subscribers_count": 3 } diff --git a/2018/CVE-2018-4124.json b/2018/CVE-2018-4124.json index 7147c305d9..3cebf08c07 100644 --- a/2018/CVE-2018-4124.json +++ b/2018/CVE-2018-4124.json @@ -28,6 +28,6 @@ "forks": 2, "watchers": 2, "score": 0, - "subscribers_count": 7 + "subscribers_count": 6 } ] \ No newline at end of file diff --git a/2019/CVE-2019-1003000.json b/2019/CVE-2019-1003000.json index 751d02171a..6c479c5716 100644 --- a/2019/CVE-2019-1003000.json +++ b/2019/CVE-2019-1003000.json @@ -50,7 +50,7 @@ "stargazers_count": 311, "watchers_count": 311, "has_discussions": false, - "forks_count": 94, + "forks_count": 88, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -67,7 +67,7 @@ "security-1266" ], "visibility": "public", - "forks": 94, + "forks": 88, "watchers": 311, "score": 0, "subscribers_count": 4 diff --git a/2019/CVE-2019-11932.json b/2019/CVE-2019-11932.json index 9c8a347d3f..74e6f3ac5e 100644 --- a/2019/CVE-2019-11932.json +++ b/2019/CVE-2019-11932.json @@ -180,13 +180,13 @@ "stargazers_count": 36, "watchers_count": 36, "has_discussions": false, - "forks_count": 23, + "forks_count": 22, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 23, + "forks": 22, "watchers": 36, "score": 0, "subscribers_count": 4 diff --git a/2019/CVE-2019-14079.json b/2019/CVE-2019-14079.json index 3c4fee64cd..dfaaffd291 100644 --- a/2019/CVE-2019-14079.json +++ b/2019/CVE-2019-14079.json @@ -14,10 +14,10 @@ "description": "USB device fuzzing on Android Phone", "fork": false, "created_at": "2020-04-05T05:45:29Z", - "updated_at": "2024-08-12T19:59:44Z", + "updated_at": "2024-12-12T14:13:19Z", "pushed_at": "2021-10-16T15:23:41Z", - "stargazers_count": 29, - "watchers_count": 29, + "stargazers_count": 30, + "watchers_count": 30, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 29, + "watchers": 30, "score": 0, "subscribers_count": 3 } diff --git a/2019/CVE-2019-18634.json b/2019/CVE-2019-18634.json index a2a7c7468e..d703b1a396 100644 --- a/2019/CVE-2019-18634.json +++ b/2019/CVE-2019-18634.json @@ -324,8 +324,8 @@ "description": "This repo contains both the exploit and the explaination of how this vulnerability is exploited", "fork": false, "created_at": "2024-12-11T13:33:42Z", - "updated_at": "2024-12-11T13:33:46Z", - "pushed_at": "2024-12-11T13:33:42Z", + "updated_at": "2024-12-12T16:25:42Z", + "pushed_at": "2024-12-12T16:25:38Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index 4185cb9195..2e8a73cf00 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -981,10 +981,10 @@ "description": "tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含", "fork": false, "created_at": "2024-08-29T06:38:16Z", - "updated_at": "2024-12-08T08:50:03Z", + "updated_at": "2024-12-12T15:55:33Z", "pushed_at": "2024-11-13T03:12:58Z", - "stargazers_count": 157, - "watchers_count": 157, + "stargazers_count": 158, + "watchers_count": 158, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -1001,7 +1001,7 @@ ], "visibility": "public", "forks": 14, - "watchers": 157, + "watchers": 158, "score": 0, "subscribers_count": 2 } diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index fc3932ea22..51214af083 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -49,7 +49,7 @@ "description": "CVE-2021-4034 1day", "fork": false, "created_at": "2022-01-25T23:51:37Z", - "updated_at": "2024-12-05T15:38:57Z", + "updated_at": "2024-12-12T17:05:22Z", "pushed_at": "2022-06-08T04:00:28Z", "stargazers_count": 1973, "watchers_count": 1973, diff --git a/2021/CVE-2021-40438.json b/2021/CVE-2021-40438.json index db1e4d200d..6b726311e6 100644 --- a/2021/CVE-2021-40438.json +++ b/2021/CVE-2021-40438.json @@ -231,10 +231,10 @@ "description": "CVE-2021-40438 Apache <= 2.4.48 SSRF exploit", "fork": false, "created_at": "2023-12-12T11:56:23Z", - "updated_at": "2024-10-25T15:20:44Z", + "updated_at": "2024-12-12T14:13:00Z", "pushed_at": "2023-12-12T12:29:24Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -251,7 +251,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 6, + "watchers": 7, "score": 0, "subscribers_count": 1 }, diff --git a/2021/CVE-2021-42287.json b/2021/CVE-2021-42287.json index 37043cba77..2fddfb3410 100644 --- a/2021/CVE-2021-42287.json +++ b/2021/CVE-2021-42287.json @@ -19,13 +19,13 @@ "stargazers_count": 1346, "watchers_count": 1346, "has_discussions": false, - "forks_count": 323, + "forks_count": 322, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 323, + "forks": 322, "watchers": 1346, "score": 0, "subscribers_count": 27 diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 5feeb932ff..4e91e5f9f8 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -1307,7 +1307,7 @@ "description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks", "fork": false, "created_at": "2021-12-11T07:19:11Z", - "updated_at": "2024-12-11T08:54:15Z", + "updated_at": "2024-12-12T17:05:21Z", "pushed_at": "2023-06-13T09:17:54Z", "stargazers_count": 802, "watchers_count": 802, diff --git a/2022/CVE-2022-21894.json b/2022/CVE-2022-21894.json index def7139209..0c6d8e16ef 100644 --- a/2022/CVE-2022-21894.json +++ b/2022/CVE-2022-21894.json @@ -58,13 +58,13 @@ "stargazers_count": 12, "watchers_count": 12, "has_discussions": false, - "forks_count": 4, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 4, + "forks": 5, "watchers": 12, "score": 0, "subscribers_count": 2 diff --git a/2022/CVE-2022-24112.json b/2022/CVE-2022-24112.json index 53e0bb4269..ebccf9ba0d 100644 --- a/2022/CVE-2022-24112.json +++ b/2022/CVE-2022-24112.json @@ -143,13 +143,13 @@ "stargazers_count": 13, "watchers_count": 13, "has_discussions": false, - "forks_count": 12, + "forks_count": 11, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 12, + "forks": 11, "watchers": 13, "score": 0, "subscribers_count": 1 diff --git a/2022/CVE-2022-2586.json b/2022/CVE-2022-2586.json index 13bf380a81..09fb56b930 100644 --- a/2022/CVE-2022-2586.json +++ b/2022/CVE-2022-2586.json @@ -14,10 +14,10 @@ "description": "CVE-2022-2586: Linux kernel nft_object UAF", "fork": false, "created_at": "2022-09-03T19:04:31Z", - "updated_at": "2024-12-11T15:49:41Z", + "updated_at": "2024-12-12T15:10:18Z", "pushed_at": "2022-09-03T19:06:45Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 17, + "watchers_count": 17, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 16, + "watchers": 17, "score": 0, "subscribers_count": 1 }, diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index 066990db9b..94dfd09ffc 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -14,10 +14,10 @@ "description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。", "fork": false, "created_at": "2022-05-31T07:44:01Z", - "updated_at": "2024-12-11T02:33:29Z", + "updated_at": "2024-12-12T17:05:24Z", "pushed_at": "2023-02-26T14:06:05Z", - "stargazers_count": 1176, - "watchers_count": 1176, + "stargazers_count": 1172, + "watchers_count": 1172, "has_discussions": true, "forks_count": 190, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 190, - "watchers": 1176, + "watchers": 1172, "score": 0, "subscribers_count": 19 }, diff --git a/2022/CVE-2022-30190.json b/2022/CVE-2022-30190.json index 6517e56c4d..dc84113066 100644 --- a/2022/CVE-2022-30190.json +++ b/2022/CVE-2022-30190.json @@ -852,7 +852,7 @@ "description": "CVE-2022-30190-follina.py-修改版,可以自定义word模板,方便实战中钓鱼使用。", "fork": false, "created_at": "2022-06-02T12:33:18Z", - "updated_at": "2024-11-27T14:51:07Z", + "updated_at": "2024-12-12T17:05:24Z", "pushed_at": "2023-04-13T16:46:26Z", "stargazers_count": 396, "watchers_count": 396, diff --git a/2022/CVE-2022-42889.json b/2022/CVE-2022-42889.json index 3d1c1c9f88..210d01756e 100644 --- a/2022/CVE-2022-42889.json +++ b/2022/CVE-2022-42889.json @@ -391,10 +391,10 @@ "description": "通过 jvm 启动参数 以及 jps pid进行拦截非法参数", "fork": false, "created_at": "2022-10-20T13:05:24Z", - "updated_at": "2024-01-12T15:42:59Z", + "updated_at": "2024-12-12T14:31:34Z", "pushed_at": "2022-10-21T03:46:50Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -405,7 +405,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-20573.json b/2023/CVE-2023-20573.json index ff3c205f6e..f6c84a3c58 100644 --- a/2023/CVE-2023-20573.json +++ b/2023/CVE-2023-20573.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2023-03-11T15:04:51Z", - "updated_at": "2024-12-12T02:23:56Z", + "updated_at": "2024-12-12T17:05:08Z", "pushed_at": "2024-01-09T21:11:58Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-23397.json b/2023/CVE-2023-23397.json index c5739658c7..4243d03658 100644 --- a/2023/CVE-2023-23397.json +++ b/2023/CVE-2023-23397.json @@ -541,15 +541,15 @@ { "id": 617968206, "name": "CVE-2023-23397", - "full_name": "shaolinsec\/CVE-2023-23397", + "full_name": "stevesec\/CVE-2023-23397", "owner": { - "login": "shaolinsec", + "login": "stevesec", "id": 80222096, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80222096?v=4", - "html_url": "https:\/\/github.com\/shaolinsec", + "html_url": "https:\/\/github.com\/stevesec", "user_view_type": "public" }, - "html_url": "https:\/\/github.com\/shaolinsec\/CVE-2023-23397", + "html_url": "https:\/\/github.com\/stevesec\/CVE-2023-23397", "description": null, "fork": false, "created_at": "2023-03-23T13:40:18Z", diff --git a/2023/CVE-2023-38831.json b/2023/CVE-2023-38831.json index 9bbd2f7ab0..5c4844fee9 100644 --- a/2023/CVE-2023-38831.json +++ b/2023/CVE-2023-38831.json @@ -663,10 +663,10 @@ "description": "This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script is executed, leading to code execution.", "fork": false, "created_at": "2023-09-03T21:14:05Z", - "updated_at": "2024-12-12T07:41:54Z", + "updated_at": "2024-12-12T17:05:26Z", "pushed_at": "2023-09-08T06:15:42Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -675,7 +675,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 10, + "watchers": 11, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index 0c5fbdb95b..871ff96691 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -19,13 +19,13 @@ "stargazers_count": 1290, "watchers_count": 1290, "has_discussions": false, - "forks_count": 219, + "forks_count": 220, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 219, + "forks": 220, "watchers": 1290, "score": 0, "subscribers_count": 21 diff --git a/2023/CVE-2023-6241.json b/2023/CVE-2023-6241.json index ba7798c1da..1746fb5f04 100644 --- a/2023/CVE-2023-6241.json +++ b/2023/CVE-2023-6241.json @@ -14,10 +14,10 @@ "description": "CVE-2023-6241 for Pixel 8", "fork": false, "created_at": "2024-05-02T02:17:31Z", - "updated_at": "2024-11-19T16:35:45Z", + "updated_at": "2024-12-12T16:41:59Z", "pushed_at": "2024-10-17T19:39:45Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -35,7 +35,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 9, + "watchers": 10, "score": 0, "subscribers_count": 2 } diff --git a/2024/CVE-2024-0012.json b/2024/CVE-2024-0012.json index 99d6814acd..a7f87a97f6 100644 --- a/2024/CVE-2024-0012.json +++ b/2024/CVE-2024-0012.json @@ -267,8 +267,8 @@ "description": "This PoC is targeting vulnerabilities in Palo Alto PAN-OS, specifically CVE-2024-0012 and CVE-2024-9474. This script automates the exploitation process, including payload creation, chunked delivery, and seamless command execution.", "fork": false, "created_at": "2024-12-11T18:13:32Z", - "updated_at": "2024-12-11T19:30:50Z", - "pushed_at": "2024-12-11T19:22:20Z", + "updated_at": "2024-12-12T15:48:13Z", + "pushed_at": "2024-12-12T15:48:10Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, diff --git a/2024/CVE-2024-10924.json b/2024/CVE-2024-10924.json index af42e8f513..0c85f35033 100644 --- a/2024/CVE-2024-10924.json +++ b/2024/CVE-2024-10924.json @@ -14,10 +14,10 @@ "description": " Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 – 9.1.1.1 – Authentication Bypass", "fork": false, "created_at": "2024-11-14T16:59:52Z", - "updated_at": "2024-11-21T00:35:21Z", + "updated_at": "2024-12-12T13:40:41Z", "pushed_at": "2024-11-14T17:00:59Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 5, + "watchers": 4, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-11477.json b/2024/CVE-2024-11477.json index 3ab277f7bd..4bab6a84c1 100644 --- a/2024/CVE-2024-11477.json +++ b/2024/CVE-2024-11477.json @@ -14,10 +14,10 @@ "description": "CVE-2024-11477 7Zip Code Execution Writeup and Analysis", "fork": false, "created_at": "2024-11-29T06:13:36Z", - "updated_at": "2024-12-12T06:01:40Z", + "updated_at": "2024-12-12T14:13:59Z", "pushed_at": "2024-12-04T01:01:28Z", - "stargazers_count": 41, - "watchers_count": 41, + "stargazers_count": 42, + "watchers_count": 42, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 8, - "watchers": 41, + "watchers": 42, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-11680.json b/2024/CVE-2024-11680.json index 5cc8fe5e75..cc58b89171 100644 --- a/2024/CVE-2024-11680.json +++ b/2024/CVE-2024-11680.json @@ -14,10 +14,10 @@ "description": "This repository contains a Proof of Concept (PoC) exploit for CVE-2024-11680, a critical vulnerability in ProjectSend r1605 and older versions. The exploit targets a Cross-Site Request Forgery (CSRF) flaw in combination with Privilege Misconfiguration issues.", "fork": false, "created_at": "2024-12-04T18:42:43Z", - "updated_at": "2024-12-11T23:45:35Z", + "updated_at": "2024-12-12T16:35:40Z", "pushed_at": "2024-12-11T23:45:31Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 10, + "watchers": 11, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-20696.json b/2024/CVE-2024-20696.json index 0deaf1a718..5d81dee4c1 100644 --- a/2024/CVE-2024-20696.json +++ b/2024/CVE-2024-20696.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2024-03-08T02:31:41Z", - "updated_at": "2024-11-29T05:01:59Z", + "updated_at": "2024-12-12T13:01:40Z", "pushed_at": "2024-03-12T13:33:58Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 6, + "watchers": 7, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-21413.json b/2024/CVE-2024-21413.json index 1f0dc2feda..48108cbb07 100644 --- a/2024/CVE-2024-21413.json +++ b/2024/CVE-2024-21413.json @@ -45,10 +45,10 @@ "description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability", "fork": false, "created_at": "2024-02-16T15:17:59Z", - "updated_at": "2024-12-12T07:41:57Z", + "updated_at": "2024-12-12T17:05:29Z", "pushed_at": "2024-02-19T20:00:35Z", - "stargazers_count": 707, - "watchers_count": 707, + "stargazers_count": 708, + "watchers_count": 708, "has_discussions": false, "forks_count": 153, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 153, - "watchers": 707, + "watchers": 708, "score": 0, "subscribers_count": 10 }, diff --git a/2024/CVE-2024-24549.json b/2024/CVE-2024-24549.json index 1c5d5e22e6..762f53aab6 100644 --- a/2024/CVE-2024-24549.json +++ b/2024/CVE-2024-24549.json @@ -45,10 +45,10 @@ "description": "Proof of concept of the CVE-2024-24549, Exploit in Python. ", "fork": false, "created_at": "2024-12-09T04:59:07Z", - "updated_at": "2024-12-12T06:53:35Z", + "updated_at": "2024-12-12T13:53:58Z", "pushed_at": "2024-12-09T05:09:43Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-32002.json b/2024/CVE-2024-32002.json index e1177b8d28..4272c06a7c 100644 --- a/2024/CVE-2024-32002.json +++ b/2024/CVE-2024-32002.json @@ -76,10 +76,10 @@ "description": "Exploit PoC for CVE-2024-32002", "fork": false, "created_at": "2024-05-17T19:33:08Z", - "updated_at": "2024-12-12T07:38:14Z", + "updated_at": "2024-12-12T16:39:07Z", "pushed_at": "2024-05-19T07:12:00Z", - "stargazers_count": 516, - "watchers_count": 516, + "stargazers_count": 517, + "watchers_count": 517, "has_discussions": false, "forks_count": 145, "allow_forking": true, @@ -93,7 +93,7 @@ ], "visibility": "public", "forks": 145, - "watchers": 516, + "watchers": 517, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-32640.json b/2024/CVE-2024-32640.json index a2218e09ae..bd3f2fd7de 100644 --- a/2024/CVE-2024-32640.json +++ b/2024/CVE-2024-32640.json @@ -14,10 +14,10 @@ "description": "CVE-2024-32640 | Automated SQLi Exploitation PoC", "fork": false, "created_at": "2024-05-16T01:02:32Z", - "updated_at": "2024-11-20T16:30:46Z", + "updated_at": "2024-12-12T13:46:58Z", "pushed_at": "2024-05-16T21:07:32Z", - "stargazers_count": 60, - "watchers_count": 60, + "stargazers_count": 61, + "watchers_count": 61, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -38,7 +38,7 @@ ], "visibility": "public", "forks": 11, - "watchers": 60, + "watchers": 61, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-35250.json b/2024/CVE-2024-35250.json index 8ccf6075ea..46d3809073 100644 --- a/2024/CVE-2024-35250.json +++ b/2024/CVE-2024-35250.json @@ -14,10 +14,10 @@ "description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver", "fork": false, "created_at": "2024-10-13T19:30:20Z", - "updated_at": "2024-12-09T21:37:48Z", + "updated_at": "2024-12-12T17:02:29Z", "pushed_at": "2024-11-29T16:56:23Z", - "stargazers_count": 218, - "watchers_count": 218, + "stargazers_count": 219, + "watchers_count": 219, "has_discussions": false, "forks_count": 46, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 46, - "watchers": 218, + "watchers": 219, "score": 0, "subscribers_count": 6 }, diff --git a/2024/CVE-2024-38475.json b/2024/CVE-2024-38475.json index 7341c22908..54a5444e9d 100644 --- a/2024/CVE-2024-38475.json +++ b/2024/CVE-2024-38475.json @@ -50,13 +50,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 0 diff --git a/2024/CVE-2024-42327.json b/2024/CVE-2024-42327.json index fa7151c74e..6cd7fd2088 100644 --- a/2024/CVE-2024-42327.json +++ b/2024/CVE-2024-42327.json @@ -123,6 +123,37 @@ "score": 0, "subscribers_count": 1 }, + { + "id": 901596404, + "name": "Zabbix---CVE-2024-42327", + "full_name": "itform-fr\/Zabbix---CVE-2024-42327", + "owner": { + "login": "itform-fr", + "id": 131718750, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/131718750?v=4", + "html_url": "https:\/\/github.com\/itform-fr", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/itform-fr\/Zabbix---CVE-2024-42327", + "description": null, + "fork": false, + "created_at": "2024-12-11T00:39:26Z", + "updated_at": "2024-12-12T16:27:33Z", + "pushed_at": "2024-12-11T00:46:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + }, { "id": 902138431, "name": "CVE-2024-42327", @@ -138,18 +169,18 @@ "description": "writeup cve-2024-42327", "fork": false, "created_at": "2024-12-12T01:32:26Z", - "updated_at": "2024-12-12T04:09:28Z", - "pushed_at": "2024-12-12T04:09:24Z", + "updated_at": "2024-12-12T18:15:09Z", + "pushed_at": "2024-12-12T18:15:05Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 0 diff --git a/2024/CVE-2024-45200.json b/2024/CVE-2024-45200.json index 9cc1d52556..925a99836f 100644 --- a/2024/CVE-2024-45200.json +++ b/2024/CVE-2024-45200.json @@ -14,10 +14,10 @@ "description": "Information & PoC for CVE-2024-45200, Mario Kart 8 Deluxe's \"KartLANPwn\" buffer overflow vulnerability", "fork": false, "created_at": "2024-09-13T00:41:32Z", - "updated_at": "2024-12-08T22:58:04Z", + "updated_at": "2024-12-12T16:00:05Z", "pushed_at": "2024-10-01T00:57:03Z", - "stargazers_count": 53, - "watchers_count": 53, + "stargazers_count": 52, + "watchers_count": 52, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 53, + "watchers": 52, "score": 0, "subscribers_count": 2 } diff --git a/2024/CVE-2024-48990.json b/2024/CVE-2024-48990.json index d355f965de..fb237da507 100644 --- a/2024/CVE-2024-48990.json +++ b/2024/CVE-2024-48990.json @@ -14,10 +14,10 @@ "description": "PoC for CVE-2024-48990", "fork": false, "created_at": "2024-11-20T18:41:25Z", - "updated_at": "2024-12-12T04:14:49Z", + "updated_at": "2024-12-12T13:17:01Z", "pushed_at": "2024-11-20T18:49:33Z", - "stargazers_count": 88, - "watchers_count": 88, + "stargazers_count": 89, + "watchers_count": 89, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 88, + "watchers": 89, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-4956.json b/2024/CVE-2024-4956.json index ff9401fb4c..99d8a28cb4 100644 --- a/2024/CVE-2024-4956.json +++ b/2024/CVE-2024-4956.json @@ -543,13 +543,13 @@ "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 0 diff --git a/2024/CVE-2024-50623.json b/2024/CVE-2024-50623.json index 3d5edc3018..d96f75b5fa 100644 --- a/2024/CVE-2024-50623.json +++ b/2024/CVE-2024-50623.json @@ -14,10 +14,10 @@ "description": "Cleo Unrestricted file upload and download PoC (CVE-2024-50623)", "fork": false, "created_at": "2024-12-11T14:19:55Z", - "updated_at": "2024-12-12T09:59:03Z", + "updated_at": "2024-12-12T15:14:47Z", "pushed_at": "2024-12-11T14:23:19Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 11, + "watchers_count": 11, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 9, + "watchers": 11, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-53677.json b/2024/CVE-2024-53677.json index c02498bc6f..a0ad441091 100644 --- a/2024/CVE-2024-53677.json +++ b/2024/CVE-2024-53677.json @@ -19,13 +19,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 0, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 2, "watchers": 0, "score": 0, "subscribers_count": 0 diff --git a/2024/CVE-2024-54679.json b/2024/CVE-2024-54679.json index 66177cfe8b..0776b4715d 100644 --- a/2024/CVE-2024-54679.json +++ b/2024/CVE-2024-54679.json @@ -14,10 +14,10 @@ "description": "CVE-2024-54679 - CyberPanel (aka Cyber Panel) Denial of Service (https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-54679)", "fork": false, "created_at": "2024-12-06T06:02:34Z", - "updated_at": "2024-12-08T09:23:19Z", + "updated_at": "2024-12-12T13:07:15Z", "pushed_at": "2024-12-06T06:19:42Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-7954.json b/2024/CVE-2024-7954.json index dcb9f86695..b8b02d2e62 100644 --- a/2024/CVE-2024-7954.json +++ b/2024/CVE-2024-7954.json @@ -76,10 +76,10 @@ "description": "Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12 ", "fork": false, "created_at": "2024-09-01T10:59:45Z", - "updated_at": "2024-10-15T14:33:18Z", + "updated_at": "2024-12-12T12:53:59Z", "pushed_at": "2024-09-01T11:07:15Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 }, diff --git a/README.md b/README.md index 991a9e4ff4..43da4989ee 100644 --- a/README.md +++ b/README.md @@ -2408,7 +2408,7 @@ ### CVE-2024-20767 (2024-03-18) -ColdFusion versions 2023.6, 2021.12 and earlier are affected by an Improper Access Control vulnerability that could lead to arbitrary file system read. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access to sensitive files and perform arbitrary file system write. Exploitation of this issue does not require user interaction. +ColdFusion versions 2023.6, 2021.12 and earlier are affected by an Improper Access Control vulnerability that could result in arbitrary file system read. An attacker could leverage this vulnerability to access or modify restricted files. Exploitation of this issue does not require user interaction. Exploitation of this issue requires the admin panel be exposed to the internet. - [yoryio/CVE-2024-20767](https://github.com/yoryio/CVE-2024-20767) @@ -6133,6 +6133,7 @@ - [compr00t/CVE-2024-42327](https://github.com/compr00t/CVE-2024-42327) - [depers-rus/CVE-2024-42327](https://github.com/depers-rus/CVE-2024-42327) - [watchdog1337/CVE-2024-42327_Zabbix_SQLI](https://github.com/watchdog1337/CVE-2024-42327_Zabbix_SQLI) +- [itform-fr/Zabbix---CVE-2024-42327](https://github.com/itform-fr/Zabbix---CVE-2024-42327) - [igorbf495/CVE-2024-42327](https://github.com/igorbf495/CVE-2024-42327) ### CVE-2024-42346 (2024-09-20) @@ -7399,7 +7400,11 @@ - [hotplugin0x01/CVE-2024-54679](https://github.com/hotplugin0x01/CVE-2024-54679) -### CVE-2024-55099 +### CVE-2024-55099 (2024-12-12) + +A SQL Injection vulnerability was found in /admin/index.php in phpgurukul Online Nurse Hiring System v1.0, which allows remote attackers to execute arbitrary SQL commands to get unauthorized database access via the username parameter. + + - [kuzgunaka/CVE-2024-55099-Online-Nurse-Hiring-System-v1.0-SQL-Injection-Vulnerability-](https://github.com/kuzgunaka/CVE-2024-55099-Online-Nurse-Hiring-System-v1.0-SQL-Injection-Vulnerability-) ### CVE-2024-55557 @@ -9789,7 +9794,7 @@ - [SecCTechs/CVE-2023-23397](https://github.com/SecCTechs/CVE-2023-23397) - [tiepologian/CVE-2023-23397](https://github.com/tiepologian/CVE-2023-23397) - [BronzeBee/cve-2023-23397](https://github.com/BronzeBee/cve-2023-23397) -- [shaolinsec/CVE-2023-23397](https://github.com/shaolinsec/CVE-2023-23397) +- [stevesec/CVE-2023-23397](https://github.com/stevesec/CVE-2023-23397) - [Cyb3rMaddy/CVE-2023-23397-Report](https://github.com/Cyb3rMaddy/CVE-2023-23397-Report) - [Zeppperoni/CVE-2023-23397-Patch](https://github.com/Zeppperoni/CVE-2023-23397-Patch) - [jacquesquail/CVE-2023-23397](https://github.com/jacquesquail/CVE-2023-23397)