diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index bbf02036bc..77787bd87b 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -50,7 +50,7 @@ "stargazers_count": 2012, "watchers_count": 2012, "has_discussions": true, - "forks_count": 341, + "forks_count": 340, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -77,7 +77,7 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 341, + "forks": 340, "watchers": 2012, "score": 0, "subscribers_count": 37 diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 0755ca7abe..4ed2770d99 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -19,7 +19,7 @@ "stargazers_count": 2012, "watchers_count": 2012, "has_discussions": true, - "forks_count": 341, + "forks_count": 340, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -46,7 +46,7 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 341, + "forks": 340, "watchers": 2012, "score": 0, "subscribers_count": 37 diff --git a/2017/CVE-2017-11882.json b/2017/CVE-2017-11882.json index fba8eb5244..b4f0b530b2 100644 --- a/2017/CVE-2017-11882.json +++ b/2017/CVE-2017-11882.json @@ -76,10 +76,10 @@ "description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882", "fork": false, "created_at": "2017-11-21T05:55:53Z", - "updated_at": "2024-11-12T08:13:46Z", + "updated_at": "2024-12-19T05:38:57Z", "pushed_at": "2017-11-29T03:33:53Z", - "stargazers_count": 540, - "watchers_count": 540, + "stargazers_count": 541, + "watchers_count": 541, "has_discussions": false, "forks_count": 252, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 252, - "watchers": 540, + "watchers": 541, "score": 0, "subscribers_count": 28 }, diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 487aa856e9..1962450529 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -50,7 +50,7 @@ "stargazers_count": 2012, "watchers_count": 2012, "has_discussions": true, - "forks_count": 341, + "forks_count": 340, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -77,7 +77,7 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 341, + "forks": 340, "watchers": 2012, "score": 0, "subscribers_count": 37 diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index ac6df93d4a..b3b1194309 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -581,7 +581,7 @@ "stargazers_count": 2012, "watchers_count": 2012, "has_discussions": true, - "forks_count": 341, + "forks_count": 340, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -608,7 +608,7 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 341, + "forks": 340, "watchers": 2012, "score": 0, "subscribers_count": 37 diff --git a/2018/CVE-2018-5158.json b/2018/CVE-2018-5158.json index 60ea897449..f5a0b94180 100644 --- a/2018/CVE-2018-5158.json +++ b/2018/CVE-2018-5158.json @@ -1,35 +1,4 @@ [ - { - "id": 361168922, - "name": "CVE-2018-5158", - "full_name": "ppcrab\/CVE-2018-5158", - "owner": { - "login": "ppcrab", - "id": 39876329, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39876329?v=4", - "html_url": "https:\/\/github.com\/ppcrab", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/ppcrab\/CVE-2018-5158", - "description": null, - "fork": false, - "created_at": "2021-04-24T13:28:14Z", - "updated_at": "2023-12-29T05:42:42Z", - "pushed_at": "2021-04-24T13:41:23Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 2 - }, { "id": 748568686, "name": "-CVE-2018-5158.pdf", diff --git a/2018/CVE-2018-7600.json b/2018/CVE-2018-7600.json index d7946ad5ef..ed96abbf9b 100644 --- a/2018/CVE-2018-7600.json +++ b/2018/CVE-2018-7600.json @@ -83,10 +83,10 @@ "description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)", "fork": false, "created_at": "2018-04-12T22:53:14Z", - "updated_at": "2024-12-04T15:23:57Z", + "updated_at": "2024-12-19T05:22:03Z", "pushed_at": "2021-01-08T10:31:22Z", - "stargazers_count": 581, - "watchers_count": 581, + "stargazers_count": 582, + "watchers_count": 582, "has_discussions": false, "forks_count": 173, "allow_forking": true, @@ -105,7 +105,7 @@ ], "visibility": "public", "forks": 173, - "watchers": 581, + "watchers": 582, "score": 0, "subscribers_count": 23 }, diff --git a/2019/CVE-2019-11932.json b/2019/CVE-2019-11932.json index 74e6f3ac5e..dc1956d3a8 100644 --- a/2019/CVE-2019-11932.json +++ b/2019/CVE-2019-11932.json @@ -206,19 +206,19 @@ "description": "Programa para hackear Whatsapp Mediante Gif ,asiendo un exploit con el puerto.", "fork": false, "created_at": "2019-10-16T20:13:23Z", - "updated_at": "2024-10-15T10:43:22Z", + "updated_at": "2024-12-19T04:52:25Z", "pushed_at": "2021-06-16T16:49:33Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "has_discussions": false, - "forks_count": 8, + "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 8, - "watchers": 11, + "forks": 9, + "watchers": 12, "score": 0, "subscribers_count": 5 }, diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 193e4bb04a..59fcbcd708 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -50,7 +50,7 @@ "stargazers_count": 4147, "watchers_count": 4147, "has_discussions": false, - "forks_count": 1100, + "forks_count": 1099, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -76,7 +76,7 @@ "webshell" ], "visibility": "public", - "forks": 1100, + "forks": 1099, "watchers": 4147, "score": 0, "subscribers_count": 149 diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 72316c437f..959e391c64 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -205,7 +205,7 @@ "stargazers_count": 2012, "watchers_count": 2012, "has_discussions": true, - "forks_count": 341, + "forks_count": 340, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -232,7 +232,7 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 341, + "forks": 340, "watchers": 2012, "score": 0, "subscribers_count": 37 diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 8969a00ad7..e875f17195 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -19,7 +19,7 @@ "stargazers_count": 4147, "watchers_count": 4147, "has_discussions": false, - "forks_count": 1100, + "forks_count": 1099, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -45,7 +45,7 @@ "webshell" ], "visibility": "public", - "forks": 1100, + "forks": 1099, "watchers": 4147, "score": 0, "subscribers_count": 149 diff --git a/2020/CVE-2020-15368.json b/2020/CVE-2020-15368.json index efe5efde5c..cc97cbbdba 100644 --- a/2020/CVE-2020-15368.json +++ b/2020/CVE-2020-15368.json @@ -14,10 +14,10 @@ "description": "CVE-2020-15368, aka \"How to exploit a vulnerable driver\"", "fork": false, "created_at": "2021-06-29T04:38:24Z", - "updated_at": "2024-12-13T15:15:39Z", + "updated_at": "2024-12-19T02:01:10Z", "pushed_at": "2022-04-14T03:17:44Z", - "stargazers_count": 443, - "watchers_count": 443, + "stargazers_count": 444, + "watchers_count": 444, "has_discussions": false, "forks_count": 45, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 45, - "watchers": 443, + "watchers": 444, "score": 0, "subscribers_count": 6 }, diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 75388c8699..0255fd732b 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -19,7 +19,7 @@ "stargazers_count": 2012, "watchers_count": 2012, "has_discussions": true, - "forks_count": 341, + "forks_count": 340, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -46,7 +46,7 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 341, + "forks": 340, "watchers": 2012, "score": 0, "subscribers_count": 37 diff --git a/2020/CVE-2020-35391.json b/2020/CVE-2020-35391.json index 806f0f01ae..41b3907761 100644 --- a/2020/CVE-2020-35391.json +++ b/2020/CVE-2020-35391.json @@ -19,13 +19,13 @@ "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 diff --git a/2020/CVE-2020-8597.json b/2020/CVE-2020-8597.json index 2c4244bbc2..b975b178a2 100644 --- a/2020/CVE-2020-8597.json +++ b/2020/CVE-2020-8597.json @@ -45,10 +45,10 @@ "description": "CVE-2020-8597 pppd buffer overflow poc", "fork": false, "created_at": "2020-03-07T19:00:46Z", - "updated_at": "2024-08-12T19:58:28Z", + "updated_at": "2024-12-19T02:50:00Z", "pushed_at": "2020-03-12T11:10:31Z", - "stargazers_count": 48, - "watchers_count": 48, + "stargazers_count": 49, + "watchers_count": 49, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -61,7 +61,7 @@ ], "visibility": "public", "forks": 6, - "watchers": 48, + "watchers": 49, "score": 0, "subscribers_count": 4 }, diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 212f456ac1..6a055a55f9 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -93,10 +93,10 @@ "description": "CVE-2021-21972 Exploit", "fork": false, "created_at": "2021-02-24T11:14:58Z", - "updated_at": "2024-12-03T03:14:01Z", + "updated_at": "2024-12-19T02:07:29Z", "pushed_at": "2023-06-08T04:01:33Z", - "stargazers_count": 485, - "watchers_count": 485, + "stargazers_count": 486, + "watchers_count": 486, "has_discussions": false, "forks_count": 148, "allow_forking": true, @@ -107,7 +107,7 @@ ], "visibility": "public", "forks": 148, - "watchers": 485, + "watchers": 486, "score": 0, "subscribers_count": 8 }, @@ -848,10 +848,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2024-12-18T03:01:57Z", + "updated_at": "2024-12-19T03:07:49Z", "pushed_at": "2024-04-25T06:09:38Z", - "stargazers_count": 1342, - "watchers_count": 1342, + "stargazers_count": 1343, + "watchers_count": 1343, "has_discussions": false, "forks_count": 166, "allow_forking": true, @@ -867,7 +867,7 @@ ], "visibility": "public", "forks": 166, - "watchers": 1342, + "watchers": 1343, "score": 0, "subscribers_count": 15 } diff --git a/2021/CVE-2021-4045.json b/2021/CVE-2021-4045.json index e944bd7c18..b440152aed 100644 --- a/2021/CVE-2021-4045.json +++ b/2021/CVE-2021-4045.json @@ -14,10 +14,10 @@ "description": "Exploit for command injection vulnerability found in uhttpd binary from TP-Link Tapo c200 IP camera", "fork": false, "created_at": "2021-11-15T14:48:14Z", - "updated_at": "2024-12-08T20:40:46Z", + "updated_at": "2024-12-19T00:35:12Z", "pushed_at": "2024-10-31T18:50:48Z", - "stargazers_count": 72, - "watchers_count": 72, + "stargazers_count": 73, + "watchers_count": 73, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 9, - "watchers": 72, + "watchers": 73, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 71da3dfb5c..9a676278ba 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -1307,10 +1307,10 @@ "description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks", "fork": false, "created_at": "2021-12-11T07:19:11Z", - "updated_at": "2024-12-15T07:54:07Z", + "updated_at": "2024-12-19T04:27:55Z", "pushed_at": "2023-06-13T09:17:54Z", - "stargazers_count": 803, - "watchers_count": 803, + "stargazers_count": 804, + "watchers_count": 804, "has_discussions": false, "forks_count": 111, "allow_forking": true, @@ -1324,7 +1324,7 @@ ], "visibility": "public", "forks": 111, - "watchers": 803, + "watchers": 804, "score": 0, "subscribers_count": 11 }, diff --git a/2022/CVE-2022-20120.json b/2022/CVE-2022-20120.json index 00fa66b94e..b74bfd5e76 100644 --- a/2022/CVE-2022-20120.json +++ b/2022/CVE-2022-20120.json @@ -14,10 +14,10 @@ "description": "Experimenting with CVE-2022-20120 (Pixel Bootloader \/ ABL) using Unicorn, derived from eShard's emulator at https:\/\/github.com\/eshard\/pixel6-boot\/blob\/main\/run_abl_public.ipynb", "fork": false, "created_at": "2024-12-18T10:44:34Z", - "updated_at": "2024-12-18T19:07:29Z", + "updated_at": "2024-12-19T01:13:59Z", "pushed_at": "2024-12-18T11:00:38Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,8 +26,8 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index 51bbdc16f2..479f7d981b 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -642,13 +642,13 @@ "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, - "forks_count": 6, + "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 6, + "forks": 7, "watchers": 7, "score": 0, "subscribers_count": 2 @@ -792,10 +792,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2024-12-18T03:01:57Z", + "updated_at": "2024-12-19T03:07:49Z", "pushed_at": "2024-04-25T06:09:38Z", - "stargazers_count": 1342, - "watchers_count": 1342, + "stargazers_count": 1343, + "watchers_count": 1343, "has_discussions": false, "forks_count": 166, "allow_forking": true, @@ -811,7 +811,7 @@ ], "visibility": "public", "forks": 166, - "watchers": 1342, + "watchers": 1343, "score": 0, "subscribers_count": 15 } diff --git a/2022/CVE-2022-3602.json b/2022/CVE-2022-3602.json index 75e9c4587a..e8a122513c 100644 --- a/2022/CVE-2022-3602.json +++ b/2022/CVE-2022-3602.json @@ -50,10 +50,10 @@ "description": null, "fork": false, "created_at": "2022-10-30T23:32:56Z", - "updated_at": "2024-08-12T20:28:05Z", + "updated_at": "2024-12-19T02:40:39Z", "pushed_at": "2022-11-01T19:56:40Z", - "stargazers_count": 167, - "watchers_count": 167, + "stargazers_count": 168, + "watchers_count": 168, "has_discussions": false, "forks_count": 30, "allow_forking": true, @@ -62,7 +62,7 @@ "topics": [], "visibility": "public", "forks": 30, - "watchers": 167, + "watchers": 168, "score": 0, "subscribers_count": 4 }, diff --git a/2023/CVE-2023-28293.json b/2023/CVE-2023-28293.json index 00efb629db..0d104e1259 100644 --- a/2023/CVE-2023-28293.json +++ b/2023/CVE-2023-28293.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-32315.json b/2023/CVE-2023-32315.json index 519e3f6ad5..e7cb30aa78 100644 --- a/2023/CVE-2023-32315.json +++ b/2023/CVE-2023-32315.json @@ -107,10 +107,10 @@ "description": "Openfire Console Authentication Bypass Vulnerability with RCE plugin", "fork": false, "created_at": "2023-06-18T15:42:00Z", - "updated_at": "2024-12-05T17:12:27Z", + "updated_at": "2024-12-19T02:51:38Z", "pushed_at": "2024-03-07T07:23:41Z", - "stargazers_count": 46, - "watchers_count": 46, + "stargazers_count": 47, + "watchers_count": 47, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 46, + "watchers": 47, "score": 0, "subscribers_count": 2 }, @@ -266,10 +266,10 @@ "description": "A PoC exploit for CVE-2023-32315 - Openfire Authentication Bypass", "fork": false, "created_at": "2023-12-15T16:30:51Z", - "updated_at": "2024-12-02T16:19:44Z", + "updated_at": "2024-12-19T02:44:01Z", "pushed_at": "2024-05-17T23:51:11Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -282,7 +282,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 6, + "watchers": 7, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-3460.json b/2023/CVE-2023-3460.json index 8f9936e116..618a8c4c03 100644 --- a/2023/CVE-2023-3460.json +++ b/2023/CVE-2023-3460.json @@ -265,8 +265,8 @@ "description": "Cái này dựng lên với mục đích cho ae tham khảo, chê thì đừng có xem. :))))", "fork": false, "created_at": "2024-12-11T07:38:22Z", - "updated_at": "2024-12-16T13:51:41Z", - "pushed_at": "2024-12-16T13:51:36Z", + "updated_at": "2024-12-19T01:21:03Z", + "pushed_at": "2024-12-19T01:20:59Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2023/CVE-2023-38709.json b/2023/CVE-2023-38709.json index e6cbf0869c..9784810ce9 100644 --- a/2023/CVE-2023-38709.json +++ b/2023/CVE-2023-38709.json @@ -19,7 +19,7 @@ "stargazers_count": 40, "watchers_count": 40, "has_discussions": false, - "forks_count": 7, + "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -36,7 +36,7 @@ "cve-2024-39573" ], "visibility": "public", - "forks": 7, + "forks": 8, "watchers": 40, "score": 0, "subscribers_count": 1 diff --git a/2023/CVE-2023-4966.json b/2023/CVE-2023-4966.json index f1dff34e6c..11fe73aa33 100644 --- a/2023/CVE-2023-4966.json +++ b/2023/CVE-2023-4966.json @@ -447,6 +447,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-50780.json b/2023/CVE-2023-50780.json index 775f1fb873..bf17506d30 100644 --- a/2023/CVE-2023-50780.json +++ b/2023/CVE-2023-50780.json @@ -35,6 +35,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-7028.json b/2023/CVE-2023-7028.json index eff48219ec..e70f6af3e2 100644 --- a/2023/CVE-2023-7028.json +++ b/2023/CVE-2023-7028.json @@ -141,8 +141,8 @@ "description": "Exploit for CVE-2023-7028 - GitLab CE\/EE", "fork": false, "created_at": "2024-01-18T05:17:00Z", - "updated_at": "2024-08-12T20:33:09Z", - "pushed_at": "2024-03-14T05:30:59Z", + "updated_at": "2024-12-19T04:12:19Z", + "pushed_at": "2024-12-19T04:12:15Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-0044.json b/2024/CVE-2024-0044.json index 5de6a85ace..b505510385 100644 --- a/2024/CVE-2024-0044.json +++ b/2024/CVE-2024-0044.json @@ -297,10 +297,10 @@ "description": "PoC and writeup for bypassing the initial patch of CVE-2024-0044, Android run-as any app vulnerability allowing privilege escalation from adb to installed app", "fork": false, "created_at": "2024-09-27T09:02:08Z", - "updated_at": "2024-12-18T14:01:26Z", + "updated_at": "2024-12-19T02:53:07Z", "pushed_at": "2024-09-30T12:48:08Z", - "stargazers_count": 125, - "watchers_count": 125, + "stargazers_count": 126, + "watchers_count": 126, "has_discussions": false, "forks_count": 17, "allow_forking": true, @@ -309,7 +309,7 @@ "topics": [], "visibility": "public", "forks": 17, - "watchers": 125, + "watchers": 126, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-20767.json b/2024/CVE-2024-20767.json index 64f831d95e..1517f654b5 100644 --- a/2024/CVE-2024-20767.json +++ b/2024/CVE-2024-20767.json @@ -14,8 +14,8 @@ "description": "Exploit for CVE-2024-20767 - Adobe ColdFusion", "fork": false, "created_at": "2024-03-26T06:51:08Z", - "updated_at": "2024-12-17T16:21:55Z", - "pushed_at": "2024-03-26T15:52:49Z", + "updated_at": "2024-12-19T04:04:55Z", + "pushed_at": "2024-12-19T04:04:52Z", "stargazers_count": 32, "watchers_count": 32, "has_discussions": false, diff --git a/2024/CVE-2024-23298.json b/2024/CVE-2024-23298.json index a77ac42837..70a7e71635 100644 --- a/2024/CVE-2024-23298.json +++ b/2024/CVE-2024-23298.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-25641.json b/2024/CVE-2024-25641.json index a8efe555d7..89efba4f4e 100644 --- a/2024/CVE-2024-25641.json +++ b/2024/CVE-2024-25641.json @@ -83,10 +83,10 @@ "description": "PoC for CVE-2024-25641 Authenticated RCE on Cacti v1.2.26", "fork": false, "created_at": "2024-08-27T16:41:39Z", - "updated_at": "2024-09-01T04:05:36Z", + "updated_at": "2024-12-19T04:56:26Z", "pushed_at": "2024-09-01T04:05:33Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -105,7 +105,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-27198.json b/2024/CVE-2024-27198.json index 971c974855..6c0abb94ad 100644 --- a/2024/CVE-2024-27198.json +++ b/2024/CVE-2024-27198.json @@ -45,8 +45,8 @@ "description": "Exploit for CVE-2024-27198 - TeamCity Server", "fork": false, "created_at": "2024-03-05T05:43:06Z", - "updated_at": "2024-12-02T20:15:09Z", - "pushed_at": "2024-03-08T06:13:09Z", + "updated_at": "2024-12-19T04:08:46Z", + "pushed_at": "2024-12-19T04:08:43Z", "stargazers_count": 32, "watchers_count": 32, "has_discussions": false, diff --git a/2024/CVE-2024-30090.json b/2024/CVE-2024-30090.json index 0d95b6a6ee..2eadc8671f 100644 --- a/2024/CVE-2024-30090.json +++ b/2024/CVE-2024-30090.json @@ -14,10 +14,10 @@ "description": "CVE-2024-30090 - LPE PoC", "fork": false, "created_at": "2024-10-17T08:38:47Z", - "updated_at": "2024-12-17T11:43:11Z", + "updated_at": "2024-12-19T03:10:07Z", "pushed_at": "2024-10-17T09:53:33Z", - "stargazers_count": 101, - "watchers_count": 101, + "stargazers_count": 102, + "watchers_count": 102, "has_discussions": false, "forks_count": 22, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 22, - "watchers": 101, + "watchers": 102, "score": 0, "subscribers_count": 3 } diff --git a/2024/CVE-2024-32002.json b/2024/CVE-2024-32002.json index c50b7638b0..9b1148f81e 100644 --- a/2024/CVE-2024-32002.json +++ b/2024/CVE-2024-32002.json @@ -243,10 +243,10 @@ "description": "CVE-2024-32002 RCE PoC", "fork": false, "created_at": "2024-05-18T15:05:28Z", - "updated_at": "2024-11-29T13:18:24Z", + "updated_at": "2024-12-19T04:00:37Z", "pushed_at": "2024-05-18T15:12:59Z", - "stargazers_count": 103, - "watchers_count": 103, + "stargazers_count": 104, + "watchers_count": 104, "has_discussions": false, "forks_count": 25, "allow_forking": true, @@ -259,7 +259,7 @@ ], "visibility": "public", "forks": 25, - "watchers": 103, + "watchers": 104, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-3400.json b/2024/CVE-2024-3400.json index 629b63cab8..2bba845214 100644 --- a/2024/CVE-2024-3400.json +++ b/2024/CVE-2024-3400.json @@ -76,10 +76,10 @@ "description": "CVE-2024-3400", "fork": false, "created_at": "2024-04-13T14:00:31Z", - "updated_at": "2024-11-18T17:41:54Z", + "updated_at": "2024-12-19T00:57:57Z", "pushed_at": "2024-04-18T07:11:17Z", - "stargazers_count": 63, - "watchers_count": 63, + "stargazers_count": 64, + "watchers_count": 64, "has_discussions": false, "forks_count": 24, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 24, - "watchers": 63, + "watchers": 64, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-38472.json b/2024/CVE-2024-38472.json index c86e822282..ddb4c6a6ce 100644 --- a/2024/CVE-2024-38472.json +++ b/2024/CVE-2024-38472.json @@ -50,7 +50,7 @@ "stargazers_count": 40, "watchers_count": 40, "has_discussions": false, - "forks_count": 7, + "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -67,7 +67,7 @@ "cve-2024-39573" ], "visibility": "public", - "forks": 7, + "forks": 8, "watchers": 40, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-40725.json b/2024/CVE-2024-40725.json index e7cf66b998..b1cee84939 100644 --- a/2024/CVE-2024-40725.json +++ b/2024/CVE-2024-40725.json @@ -19,13 +19,13 @@ "stargazers_count": 67, "watchers_count": 67, "has_discussions": false, - "forks_count": 12, + "forks_count": 13, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 12, + "forks": 13, "watchers": 67, "score": 0, "subscribers_count": 1 @@ -76,20 +76,20 @@ "description": "exploit CVE-2024-40725 (Apache httpd) with ", "fork": false, "created_at": "2024-12-18T15:09:38Z", - "updated_at": "2024-12-18T19:06:31Z", + "updated_at": "2024-12-19T01:36:21Z", "pushed_at": "2024-12-18T15:12:31Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, - "watchers": 4, + "forks": 2, + "watchers": 5, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-41570.json b/2024/CVE-2024-41570.json index ab75c36f1d..1d51cb1a9d 100644 --- a/2024/CVE-2024-41570.json +++ b/2024/CVE-2024-41570.json @@ -14,10 +14,10 @@ "description": "CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit", "fork": false, "created_at": "2024-07-13T19:54:27Z", - "updated_at": "2024-11-20T16:30:56Z", + "updated_at": "2024-12-19T02:47:57Z", "pushed_at": "2024-09-11T20:00:46Z", - "stargazers_count": 35, - "watchers_count": 35, + "stargazers_count": 36, + "watchers_count": 36, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 35, + "watchers": 36, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-45337.json b/2024/CVE-2024-45337.json index 9d96ea6aee..8d91056991 100644 --- a/2024/CVE-2024-45337.json +++ b/2024/CVE-2024-45337.json @@ -14,10 +14,10 @@ "description": "Proof of concept (POC) for CVE-2024-45337 ", "fork": false, "created_at": "2024-12-17T22:07:53Z", - "updated_at": "2024-12-17T22:39:12Z", + "updated_at": "2024-12-19T03:53:11Z", "pushed_at": "2024-12-17T22:27:03Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -36,7 +36,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 3, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-46982.json b/2024/CVE-2024-46982.json index 9c78e548f4..58219734e6 100644 --- a/2024/CVE-2024-46982.json +++ b/2024/CVE-2024-46982.json @@ -28,6 +28,6 @@ "forks": 1, "watchers": 0, "score": 0, - "subscribers_count": 1 + "subscribers_count": 2 } ] \ No newline at end of file diff --git a/2024/CVE-2024-48762.json b/2024/CVE-2024-48762.json index 1e0d0712df..9840af04d6 100644 --- a/2024/CVE-2024-48762.json +++ b/2024/CVE-2024-48762.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-4883.json b/2024/CVE-2024-4883.json index 54d67cb398..8746144e97 100644 --- a/2024/CVE-2024-4883.json +++ b/2024/CVE-2024-4883.json @@ -19,13 +19,13 @@ "stargazers_count": 10, "watchers_count": 10, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 10, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-48990.json b/2024/CVE-2024-48990.json index 9baec78a7b..328c000984 100644 --- a/2024/CVE-2024-48990.json +++ b/2024/CVE-2024-48990.json @@ -262,8 +262,8 @@ "description": null, "fork": false, "created_at": "2024-12-18T03:39:57Z", - "updated_at": "2024-12-19T00:10:07Z", - "pushed_at": "2024-12-19T00:10:04Z", + "updated_at": "2024-12-19T00:45:19Z", + "pushed_at": "2024-12-19T00:45:15Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, @@ -276,6 +276,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-49039.json b/2024/CVE-2024-49039.json index 582e6abd0d..8b43175aab 100644 --- a/2024/CVE-2024-49039.json +++ b/2024/CVE-2024-49039.json @@ -14,10 +14,10 @@ "description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler", "fork": false, "created_at": "2024-11-19T08:57:18Z", - "updated_at": "2024-12-18T22:30:25Z", + "updated_at": "2024-12-19T03:04:12Z", "pushed_at": "2024-11-19T09:15:26Z", - "stargazers_count": 89, - "watchers_count": 89, + "stargazers_count": 93, + "watchers_count": 93, "has_discussions": false, "forks_count": 20, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 20, - "watchers": 89, + "watchers": 93, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-49112.json b/2024/CVE-2024-49112.json index a64eb67ae8..23746b0742 100644 --- a/2024/CVE-2024-49112.json +++ b/2024/CVE-2024-49112.json @@ -59,6 +59,6 @@ "forks": 0, "watchers": 3, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-50379.json b/2024/CVE-2024-50379.json index 8336f185e8..4668e53b73 100644 --- a/2024/CVE-2024-50379.json +++ b/2024/CVE-2024-50379.json @@ -14,20 +14,20 @@ "description": null, "fork": false, "created_at": "2024-12-18T19:53:46Z", - "updated_at": "2024-12-18T20:18:43Z", - "pushed_at": "2024-12-18T20:18:39Z", - "stargazers_count": 0, - "watchers_count": 0, + "updated_at": "2024-12-19T06:00:44Z", + "pushed_at": "2024-12-19T06:00:40Z", + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, - "watchers": 0, + "forks": 1, + "watchers": 3, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-53677.json b/2024/CVE-2024-53677.json index 96f8806bb9..bc13247e4b 100644 --- a/2024/CVE-2024-53677.json +++ b/2024/CVE-2024-53677.json @@ -45,19 +45,19 @@ "description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.", "fork": false, "created_at": "2024-12-13T17:42:55Z", - "updated_at": "2024-12-18T21:16:34Z", - "pushed_at": "2024-12-18T03:54:48Z", - "stargazers_count": 55, - "watchers_count": 55, + "updated_at": "2024-12-19T03:41:08Z", + "pushed_at": "2024-12-19T03:23:02Z", + "stargazers_count": 59, + "watchers_count": 59, "has_discussions": false, - "forks_count": 22, + "forks_count": 24, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 22, - "watchers": 55, + "forks": 24, + "watchers": 59, "score": 0, "subscribers_count": 3 }, @@ -107,10 +107,10 @@ "description": "A Docker-based environment to reproduce the CVE-2024-53677 vulnerability in Apache Struts 2. ", "fork": false, "created_at": "2024-12-17T06:42:16Z", - "updated_at": "2024-12-17T10:24:01Z", + "updated_at": "2024-12-19T05:46:48Z", "pushed_at": "2024-12-17T07:01:11Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 }, @@ -152,7 +152,7 @@ "forks": 0, "watchers": 2, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 }, { "id": 905399741, @@ -169,10 +169,10 @@ "description": null, "fork": false, "created_at": "2024-12-18T18:42:34Z", - "updated_at": "2024-12-18T19:10:52Z", + "updated_at": "2024-12-19T03:18:25Z", "pushed_at": "2024-12-18T19:10:48Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -181,8 +181,8 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-55968.json b/2024/CVE-2024-55968.json index e4aade4478..1017f299b2 100644 --- a/2024/CVE-2024-55968.json +++ b/2024/CVE-2024-55968.json @@ -14,8 +14,8 @@ "description": "Exploit POC Code for CVE-2024-55968", "fork": false, "created_at": "2024-12-17T21:07:59Z", - "updated_at": "2024-12-17T21:28:22Z", - "pushed_at": "2024-12-17T21:17:20Z", + "updated_at": "2024-12-19T04:47:33Z", + "pushed_at": "2024-12-19T04:47:30Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json index 0e3d22c075..f4a0d8b284 100644 --- a/2024/CVE-2024-6387.json +++ b/2024/CVE-2024-6387.json @@ -1360,7 +1360,7 @@ "stargazers_count": 69, "watchers_count": 69, "has_discussions": false, - "forks_count": 27, + "forks_count": 28, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -1375,7 +1375,7 @@ "rce" ], "visibility": "public", - "forks": 27, + "forks": 28, "watchers": 69, "score": 0, "subscribers_count": 2 @@ -2853,5 +2853,36 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 905536150, + "name": "CVE-2024-6387", + "full_name": "zql-gif\/CVE-2024-6387", + "owner": { + "login": "zql-gif", + "id": 84617316, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84617316?v=4", + "html_url": "https:\/\/github.com\/zql-gif", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/zql-gif\/CVE-2024-6387", + "description": null, + "fork": false, + "created_at": "2024-12-19T03:08:19Z", + "updated_at": "2024-12-19T06:22:28Z", + "pushed_at": "2024-12-19T06:22:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index 663d4e460a..71b4efe3b9 100644 --- a/README.md +++ b/README.md @@ -1432,6 +1432,7 @@ - [identity-threat-labs/CVE-2024-6387-Vulnerability-Checker](https://github.com/identity-threat-labs/CVE-2024-6387-Vulnerability-Checker) - [identity-threat-labs/Article-RegreSSHion-CVE-2024-6387](https://github.com/identity-threat-labs/Article-RegreSSHion-CVE-2024-6387) - [YassDEV221608/CVE-2024-6387](https://github.com/YassDEV221608/CVE-2024-6387) +- [zql-gif/CVE-2024-6387](https://github.com/zql-gif/CVE-2024-6387) ### CVE-2024-6473 (2024-09-03) @@ -39691,7 +39692,6 @@ The PDF viewer does not sufficiently sanitize PostScript calculator functions, allowing malicious JavaScript to be injected through a crafted PDF file. This JavaScript can then be run with the permissions of the PDF viewer by its worker. This vulnerability affects Firefox ESR < 52.8 and Firefox < 60. -- [ppcrab/CVE-2018-5158](https://github.com/ppcrab/CVE-2018-5158) - [puzzle-tools/-CVE-2018-5158.pdf](https://github.com/puzzle-tools/-CVE-2018-5158.pdf) ### CVE-2018-5234 (2018-04-30)