From 157d317ae0932514f781ae8815fa1e256fa69faa Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Tue, 27 Aug 2024 15:29:33 +0900 Subject: [PATCH] Auto Update 2024/08/27 06:29:33 --- 2000/CVE-2000-0114.json | 8 ++++---- 2017/CVE-2017-7921.json | 4 ++-- 2017/CVE-2017-8890.json | 8 ++++---- 2018/CVE-2018-19320.json | 4 ++-- 2020/CVE-2020-2551.json | 8 ++++---- 2021/CVE-2021-26943.json | 8 ++++---- 2021/CVE-2021-33739.json | 8 ++++---- 2021/CVE-2021-4034.json | 30 ++++++++++++++++++++++++++++++ 2022/CVE-2022-22947.json | 8 ++++---- 2023/CVE-2023-1829.json | 8 ++++---- 2023/CVE-2023-20198.json | 2 +- 2023/CVE-2023-21674.json | 8 ++++---- 2023/CVE-2023-22809.json | 2 +- 2023/CVE-2023-3079.json | 8 ++++---- 2023/CVE-2023-33246.json | 8 ++++---- 2024/CVE-2024-1086.json | 8 ++++---- 2024/CVE-2024-206565.json | 32 -------------------------------- 2024/CVE-2024-21006.json | 2 +- 2024/CVE-2024-25641.json | 30 ++++++++++++++++++++++++++++++ 2024/CVE-2024-27198.json | 8 ++++---- 2024/CVE-2024-28995.json | 8 ++++---- 2024/CVE-2024-30043.json | 8 ++++---- 2024/CVE-2024-3094.json | 8 ++++---- 2024/CVE-2024-320002.json | 32 -------------------------------- 2024/CVE-2024-32002.json | 30 ------------------------------ 2024/CVE-2024-3400.json | 8 ++++---- 2024/CVE-2024-38063.json | 28 ++++++++++++++-------------- 2024/CVE-2024-38077.json | 8 ++++---- 2024/CVE-2024-41312.json | 2 +- 2024/CVE-2024-42992.json | 30 +++++++++++++++--------------- 2024/CVE-2024-4358.json | 4 ++-- 2024/CVE-2024-44083.json | 8 ++++---- 2024/CVE-2024-45264.json | 2 +- 2024/CVE-2024-45265.json | 2 +- 2024/CVE-2024-4879.json | 30 ++++++++++++++++++++++++++++++ 2024/CVE-2024-5932.json | 10 +++++----- 2024/CVE-2024-6386.json | 39 +++++++++++++++++++++++++++++++++++++++ 2024/CVE-2024-6387.json | 2 +- 2024/CVE-2024-65230.json | 32 -------------------------------- README.md | 22 +++++++++++----------- 40 files changed, 259 insertions(+), 256 deletions(-) delete mode 100644 2024/CVE-2024-206565.json delete mode 100644 2024/CVE-2024-320002.json create mode 100644 2024/CVE-2024-6386.json delete mode 100644 2024/CVE-2024-65230.json diff --git a/2000/CVE-2000-0114.json b/2000/CVE-2000-0114.json index 4d6e1fef34..02415d4bb4 100644 --- a/2000/CVE-2000-0114.json +++ b/2000/CVE-2000-0114.json @@ -13,10 +13,10 @@ "description": "Microsoft FrontPage Extensions Check (shtml.dll)", "fork": false, "created_at": "2024-05-30T09:55:41Z", - "updated_at": "2024-07-22T17:19:29Z", + "updated_at": "2024-08-27T03:19:43Z", "pushed_at": "2024-06-24T09:48:11Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -36,7 +36,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 0 }, diff --git a/2017/CVE-2017-7921.json b/2017/CVE-2017-7921.json index c2b20d5ed5..b259a375fc 100644 --- a/2017/CVE-2017-7921.json +++ b/2017/CVE-2017-7921.json @@ -258,7 +258,7 @@ "stargazers_count": 13, "watchers_count": 13, "has_discussions": false, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -274,7 +274,7 @@ "vulnerability" ], "visibility": "public", - "forks": 3, + "forks": 4, "watchers": 13, "score": 0, "subscribers_count": 1 diff --git a/2017/CVE-2017-8890.json b/2017/CVE-2017-8890.json index 402901141d..9220e6856f 100644 --- a/2017/CVE-2017-8890.json +++ b/2017/CVE-2017-8890.json @@ -13,10 +13,10 @@ "description": "None", "fork": false, "created_at": "2017-07-09T06:03:37Z", - "updated_at": "2022-11-09T17:57:30Z", + "updated_at": "2024-08-27T00:45:28Z", "pushed_at": "2018-08-25T16:09:21Z", - "stargazers_count": 21, - "watchers_count": 21, + "stargazers_count": 22, + "watchers_count": 22, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 21, + "watchers": 22, "score": 0, "subscribers_count": 0 }, diff --git a/2018/CVE-2018-19320.json b/2018/CVE-2018-19320.json index c4b14b9d1f..9aeb900fc3 100644 --- a/2018/CVE-2018-19320.json +++ b/2018/CVE-2018-19320.json @@ -78,13 +78,13 @@ "stargazers_count": 184, "watchers_count": 184, "has_discussions": false, - "forks_count": 45, + "forks_count": 44, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 45, + "forks": 44, "watchers": 184, "score": 0, "subscribers_count": 7 diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 9029d07ae1..abe340b219 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -154,10 +154,10 @@ "description": "Weblogic Vuln POC EXP cve-2020-2551 cve-2020-2555 cve-2020-2883 ,。。。", "fork": false, "created_at": "2020-05-16T03:01:32Z", - "updated_at": "2024-07-27T03:42:54Z", + "updated_at": "2024-08-27T01:36:01Z", "pushed_at": "2022-08-07T06:36:30Z", - "stargazers_count": 89, - "watchers_count": 89, + "stargazers_count": 90, + "watchers_count": 90, "has_discussions": false, "forks_count": 25, "allow_forking": true, @@ -166,7 +166,7 @@ "topics": [], "visibility": "public", "forks": 25, - "watchers": 89, + "watchers": 90, "score": 0, "subscribers_count": 4 }, diff --git a/2021/CVE-2021-26943.json b/2021/CVE-2021-26943.json index d1dca0a835..744e782e2c 100644 --- a/2021/CVE-2021-26943.json +++ b/2021/CVE-2021-26943.json @@ -13,10 +13,10 @@ "description": "The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.", "fork": false, "created_at": "2020-12-31T16:30:02Z", - "updated_at": "2024-08-21T22:09:21Z", + "updated_at": "2024-08-27T05:04:04Z", "pushed_at": "2021-03-29T12:33:38Z", - "stargazers_count": 129, - "watchers_count": 129, + "stargazers_count": 131, + "watchers_count": 131, "has_discussions": true, "forks_count": 23, "allow_forking": true, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 23, - "watchers": 129, + "watchers": 131, "score": 0, "subscribers_count": 11 } diff --git a/2021/CVE-2021-33739.json b/2021/CVE-2021-33739.json index 6ea6ef7c21..a995aa55b6 100644 --- a/2021/CVE-2021-33739.json +++ b/2021/CVE-2021-33739.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2021-06-09T11:40:56Z", - "updated_at": "2024-08-12T20:13:46Z", + "updated_at": "2024-08-27T02:27:45Z", "pushed_at": "2021-06-09T06:58:20Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 56, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 56, - "watchers": 7, + "watchers": 8, "score": 0, "subscribers_count": 1 }, diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index d84d559ee1..0957b0199c 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -4958,5 +4958,35 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 848038594, + "name": "CVE-2021-4034", + "full_name": "lsclsclsc\/CVE-2021-4034", + "owner": { + "login": "lsclsclsc", + "id": 59271192, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59271192?v=4", + "html_url": "https:\/\/github.com\/lsclsclsc" + }, + "html_url": "https:\/\/github.com\/lsclsclsc\/CVE-2021-4034", + "description": null, + "fork": false, + "created_at": "2024-08-27T02:39:10Z", + "updated_at": "2024-08-27T02:40:02Z", + "pushed_at": "2024-08-27T02:40:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-22947.json b/2022/CVE-2022-22947.json index 61efefdc1f..1c60138e50 100644 --- a/2022/CVE-2022-22947.json +++ b/2022/CVE-2022-22947.json @@ -1284,10 +1284,10 @@ "description": "CVE-2022-22947 注入Godzilla内存马", "fork": false, "created_at": "2022-04-26T05:48:27Z", - "updated_at": "2024-08-06T05:38:46Z", + "updated_at": "2024-08-27T04:53:38Z", "pushed_at": "2022-04-26T05:55:58Z", - "stargazers_count": 203, - "watchers_count": 203, + "stargazers_count": 202, + "watchers_count": 202, "has_discussions": false, "forks_count": 28, "allow_forking": true, @@ -1296,7 +1296,7 @@ "topics": [], "visibility": "public", "forks": 28, - "watchers": 203, + "watchers": 202, "score": 0, "subscribers_count": 5 }, diff --git a/2023/CVE-2023-1829.json b/2023/CVE-2023-1829.json index 45da83d036..87a04078e9 100644 --- a/2023/CVE-2023-1829.json +++ b/2023/CVE-2023-1829.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-06-15T03:27:03Z", - "updated_at": "2024-08-26T12:06:32Z", + "updated_at": "2024-08-27T02:16:02Z", "pushed_at": "2024-02-28T03:23:27Z", - "stargazers_count": 70, - "watchers_count": 70, + "stargazers_count": 71, + "watchers_count": 71, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 70, + "watchers": 71, "score": 0, "subscribers_count": 4 } diff --git a/2023/CVE-2023-20198.json b/2023/CVE-2023-20198.json index bbfe0a07d6..381f3e1ec9 100644 --- a/2023/CVE-2023-20198.json +++ b/2023/CVE-2023-20198.json @@ -726,6 +726,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-21674.json b/2023/CVE-2023-21674.json index c697b43b0c..7c47387769 100644 --- a/2023/CVE-2023-21674.json +++ b/2023/CVE-2023-21674.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2024-03-07T05:43:48Z", - "updated_at": "2024-08-08T03:17:23Z", + "updated_at": "2024-08-27T01:34:03Z", "pushed_at": "2024-04-05T00:05:44Z", - "stargazers_count": 24, - "watchers_count": 24, + "stargazers_count": 25, + "watchers_count": 25, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 24, + "watchers": 25, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-22809.json b/2023/CVE-2023-22809.json index 031a9d741f..c7d5fe6c69 100644 --- a/2023/CVE-2023-22809.json +++ b/2023/CVE-2023-22809.json @@ -311,6 +311,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-3079.json b/2023/CVE-2023-3079.json index 82c1ec37f3..6231b8cd5d 100644 --- a/2023/CVE-2023-3079.json +++ b/2023/CVE-2023-3079.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-08-15T04:16:46Z", - "updated_at": "2024-06-15T15:09:13Z", + "updated_at": "2024-08-27T04:59:16Z", "pushed_at": "2023-08-17T11:43:26Z", - "stargazers_count": 119, - "watchers_count": 119, + "stargazers_count": 120, + "watchers_count": 120, "has_discussions": false, "forks_count": 29, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 29, - "watchers": 119, + "watchers": 120, "score": 0, "subscribers_count": 7 } diff --git a/2023/CVE-2023-33246.json b/2023/CVE-2023-33246.json index c4c03b90b4..3b08d76943 100644 --- a/2023/CVE-2023-33246.json +++ b/2023/CVE-2023-33246.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-05-30T02:18:29Z", - "updated_at": "2024-08-12T20:31:32Z", + "updated_at": "2024-08-27T03:30:09Z", "pushed_at": "2023-05-30T02:43:06Z", - "stargazers_count": 60, - "watchers_count": 60, + "stargazers_count": 61, + "watchers_count": 61, "has_discussions": false, "forks_count": 22, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 22, - "watchers": 60, + "watchers": 61, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index c7e5d283ea..4925535330 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -13,10 +13,10 @@ "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "fork": false, "created_at": "2024-03-20T21:16:41Z", - "updated_at": "2024-08-25T21:02:30Z", + "updated_at": "2024-08-27T01:34:48Z", "pushed_at": "2024-04-17T16:09:54Z", - "stargazers_count": 2223, - "watchers_count": 2223, + "stargazers_count": 2224, + "watchers_count": 2224, "has_discussions": false, "forks_count": 291, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 291, - "watchers": 2223, + "watchers": 2224, "score": 0, "subscribers_count": 23 }, diff --git a/2024/CVE-2024-206565.json b/2024/CVE-2024-206565.json deleted file mode 100644 index a93b96419f..0000000000 --- a/2024/CVE-2024-206565.json +++ /dev/null @@ -1,32 +0,0 @@ -[ - { - "id": 759748409, - "name": "sumkaluissessss", - "full_name": "sanderswannalive\/sumkaluissessss", - "owner": { - "login": "sanderswannalive", - "id": 50711470, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50711470?v=4", - "html_url": "https:\/\/github.com\/sanderswannalive" - }, - "html_url": "https:\/\/github.com\/sanderswannalive\/sumkaluissessss", - "description": "CVE-2024-206565", - "fork": false, - "created_at": "2024-02-19T09:06:06Z", - "updated_at": "2024-02-22T14:52:06Z", - "pushed_at": "2024-02-19T10:02:38Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-21006.json b/2024/CVE-2024-21006.json index 3521ec9d88..eb330c24a0 100644 --- a/2024/CVE-2024-21006.json +++ b/2024/CVE-2024-21006.json @@ -43,7 +43,7 @@ "description": "CVE-2024-21006 exp", "fork": false, "created_at": "2024-07-02T06:25:14Z", - "updated_at": "2024-08-11T07:18:28Z", + "updated_at": "2024-08-27T02:37:27Z", "pushed_at": "2024-07-29T19:39:15Z", "stargazers_count": 13, "watchers_count": 13, diff --git a/2024/CVE-2024-25641.json b/2024/CVE-2024-25641.json index 4d73adff90..bb33e2e9fd 100644 --- a/2024/CVE-2024-25641.json +++ b/2024/CVE-2024-25641.json @@ -27,6 +27,36 @@ "forks": 0, "watchers": 0, "score": 0, + "subscribers_count": 1 + }, + { + "id": 848016259, + "name": "CVE-2024-25641-RCE-Automated-Exploit-Cacti-1.2.26", + "full_name": "thisisveryfunny\/CVE-2024-25641-RCE-Automated-Exploit-Cacti-1.2.26", + "owner": { + "login": "thisisveryfunny", + "id": 179417827, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179417827?v=4", + "html_url": "https:\/\/github.com\/thisisveryfunny" + }, + "html_url": "https:\/\/github.com\/thisisveryfunny\/CVE-2024-25641-RCE-Automated-Exploit-Cacti-1.2.26", + "description": "CVE-2024-25641 - RCE Automated Exploit - Cacti 1.2.26", + "fork": false, + "created_at": "2024-08-27T01:19:25Z", + "updated_at": "2024-08-27T03:16:37Z", + "pushed_at": "2024-08-27T02:06:50Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-27198.json b/2024/CVE-2024-27198.json index 0c7f876ffe..f00333b66c 100644 --- a/2024/CVE-2024-27198.json +++ b/2024/CVE-2024-27198.json @@ -76,10 +76,10 @@ "description": "CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4", "fork": false, "created_at": "2024-03-06T03:15:03Z", - "updated_at": "2024-08-21T01:20:11Z", + "updated_at": "2024-08-27T04:32:02Z", "pushed_at": "2024-03-11T07:57:40Z", - "stargazers_count": 132, - "watchers_count": 132, + "stargazers_count": 133, + "watchers_count": 133, "has_discussions": false, "forks_count": 33, "allow_forking": true, @@ -98,7 +98,7 @@ ], "visibility": "public", "forks": 33, - "watchers": 132, + "watchers": 133, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-28995.json b/2024/CVE-2024-28995.json index 3b6ba6fdc1..8f039772d1 100644 --- a/2024/CVE-2024-28995.json +++ b/2024/CVE-2024-28995.json @@ -223,10 +223,10 @@ "description": "CVE-2024-28955 Exploitation PoC ", "fork": false, "created_at": "2024-07-01T11:49:51Z", - "updated_at": "2024-08-21T05:18:31Z", + "updated_at": "2024-08-27T03:16:55Z", "pushed_at": "2024-07-01T12:53:21Z", - "stargazers_count": 31, - "watchers_count": 31, + "stargazers_count": 32, + "watchers_count": 32, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -244,7 +244,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 31, + "watchers": 32, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-30043.json b/2024/CVE-2024-30043.json index 2648c2177b..1001b90332 100644 --- a/2024/CVE-2024-30043.json +++ b/2024/CVE-2024-30043.json @@ -13,10 +13,10 @@ "description": "Exploiting XXE Vulnerabilities on Microsoft SharePoint Server and Cloud via Confused URL Parsing", "fork": false, "created_at": "2024-06-06T18:31:57Z", - "updated_at": "2024-08-12T13:30:22Z", + "updated_at": "2024-08-27T04:54:31Z", "pushed_at": "2024-06-06T18:38:06Z", - "stargazers_count": 30, - "watchers_count": 30, + "stargazers_count": 29, + "watchers_count": 29, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 30, + "watchers": 29, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json index 137bb34874..e82b120733 100644 --- a/2024/CVE-2024-3094.json +++ b/2024/CVE-2024-3094.json @@ -1072,10 +1072,10 @@ "description": "XZ Backdoor Extract(Test on Ubuntu 23.10)", "fork": false, "created_at": "2024-04-01T16:08:50Z", - "updated_at": "2024-05-14T11:09:48Z", + "updated_at": "2024-08-27T01:30:39Z", "pushed_at": "2024-04-02T07:12:53Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 17, + "watchers_count": 17, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -1089,7 +1089,7 @@ ], "visibility": "public", "forks": 4, - "watchers": 16, + "watchers": 17, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-320002.json b/2024/CVE-2024-320002.json deleted file mode 100644 index d5cd827ed4..0000000000 --- a/2024/CVE-2024-320002.json +++ /dev/null @@ -1,32 +0,0 @@ -[ - { - "id": 817700177, - "name": "hook", - "full_name": "bonnettheo\/hook", - "owner": { - "login": "bonnettheo", - "id": 33837840, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33837840?v=4", - "html_url": "https:\/\/github.com\/bonnettheo" - }, - "html_url": "https:\/\/github.com\/bonnettheo\/hook", - "description": "submodule for CVE-2024-320002", - "fork": false, - "created_at": "2024-06-20T09:02:23Z", - "updated_at": "2024-06-21T14:23:27Z", - "pushed_at": "2024-06-21T14:23:25Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-32002.json b/2024/CVE-2024-32002.json index a36b37da82..a076bf1786 100644 --- a/2024/CVE-2024-32002.json +++ b/2024/CVE-2024-32002.json @@ -1375,36 +1375,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 817662725, - "name": "CVE-2024-32002", - "full_name": "bonnettheo\/CVE-2024-32002", - "owner": { - "login": "bonnettheo", - "id": 33837840, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33837840?v=4", - "html_url": "https:\/\/github.com\/bonnettheo" - }, - "html_url": "https:\/\/github.com\/bonnettheo\/CVE-2024-32002", - "description": "exploit for CVE-2024-32002", - "fork": false, - "created_at": "2024-06-20T07:37:09Z", - "updated_at": "2024-06-27T09:40:51Z", - "pushed_at": "2024-06-27T09:40:48Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 823532806, "name": "git_rce", diff --git a/2024/CVE-2024-3400.json b/2024/CVE-2024-3400.json index 9f3b801cb4..ded8011f36 100644 --- a/2024/CVE-2024-3400.json +++ b/2024/CVE-2024-3400.json @@ -73,10 +73,10 @@ "description": "CVE-2024-3400", "fork": false, "created_at": "2024-04-13T14:00:31Z", - "updated_at": "2024-08-11T13:05:27Z", + "updated_at": "2024-08-27T04:13:55Z", "pushed_at": "2024-04-18T07:11:17Z", - "stargazers_count": 56, - "watchers_count": 56, + "stargazers_count": 57, + "watchers_count": 57, "has_discussions": false, "forks_count": 22, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 22, - "watchers": 56, + "watchers": 57, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-38063.json b/2024/CVE-2024-38063.json index 3a45f8950e..b76465bc52 100644 --- a/2024/CVE-2024-38063.json +++ b/2024/CVE-2024-38063.json @@ -73,10 +73,10 @@ "description": "Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.", "fork": false, "created_at": "2024-08-17T14:58:36Z", - "updated_at": "2024-08-26T14:02:52Z", + "updated_at": "2024-08-27T01:15:49Z", "pushed_at": "2024-08-21T06:24:27Z", - "stargazers_count": 69, - "watchers_count": 69, + "stargazers_count": 68, + "watchers_count": 68, "has_discussions": false, "forks_count": 24, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 24, - "watchers": 69, + "watchers": 68, "score": 0, "subscribers_count": 4 }, @@ -226,10 +226,10 @@ "description": "CVE-2024-38063 Research Tool", "fork": false, "created_at": "2024-08-24T15:04:54Z", - "updated_at": "2024-08-26T09:41:30Z", + "updated_at": "2024-08-27T01:18:32Z", "pushed_at": "2024-08-26T06:18:08Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -238,7 +238,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 }, @@ -256,19 +256,19 @@ "description": "poc for CVE-2024-38063 (RCE in tcpip.sys)", "fork": false, "created_at": "2024-08-24T18:25:46Z", - "updated_at": "2024-08-27T00:21:33Z", + "updated_at": "2024-08-27T06:33:24Z", "pushed_at": "2024-08-26T08:14:55Z", - "stargazers_count": 45, - "watchers_count": 45, + "stargazers_count": 94, + "watchers_count": 94, "has_discussions": false, - "forks_count": 7, + "forks_count": 22, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 7, - "watchers": 45, + "forks": 22, + "watchers": 94, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-38077.json b/2024/CVE-2024-38077.json index 273a0921ec..e0c7baa194 100644 --- a/2024/CVE-2024-38077.json +++ b/2024/CVE-2024-38077.json @@ -43,10 +43,10 @@ "description": "RDL的堆溢出导致的RCE", "fork": false, "created_at": "2024-08-09T05:00:44Z", - "updated_at": "2024-08-26T14:53:15Z", + "updated_at": "2024-08-27T04:49:48Z", "pushed_at": "2024-08-14T04:43:05Z", - "stargazers_count": 185, - "watchers_count": 185, + "stargazers_count": 186, + "watchers_count": 186, "has_discussions": false, "forks_count": 80, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 80, - "watchers": 185, + "watchers": 186, "score": 0, "subscribers_count": 5 }, diff --git a/2024/CVE-2024-41312.json b/2024/CVE-2024-41312.json index 7b60df800a..7348cd8721 100644 --- a/2024/CVE-2024-41312.json +++ b/2024/CVE-2024-41312.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-42992.json b/2024/CVE-2024-42992.json index 93b0d62e53..d869e0acf7 100644 --- a/2024/CVE-2024-42992.json +++ b/2024/CVE-2024-42992.json @@ -1,32 +1,32 @@ [ { - "id": 845866253, + "id": 847526830, "name": "CVE-2024-42992", - "full_name": "juwenyi\/CVE-2024-42992", + "full_name": "thanhh23\/CVE-2024-42992", "owner": { - "login": "juwenyi", - "id": 117093096, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117093096?v=4", - "html_url": "https:\/\/github.com\/juwenyi" + "login": "thanhh23", + "id": 82047405, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82047405?v=4", + "html_url": "https:\/\/github.com\/thanhh23" }, - "html_url": "https:\/\/github.com\/juwenyi\/CVE-2024-42992", + "html_url": "https:\/\/github.com\/thanhh23\/CVE-2024-42992", "description": "CVE-2024-42992", "fork": false, - "created_at": "2024-08-22T04:40:34Z", - "updated_at": "2024-08-26T09:34:43Z", + "created_at": "2024-08-26T03:13:45Z", + "updated_at": "2024-08-26T03:13:45Z", "pushed_at": "2024-08-22T04:43:17Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 0, + "watchers_count": 0, "has_discussions": false, - "forks_count": 2, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, - "watchers": 4, + "forks": 1, + "watchers": 0, "score": 0, - "subscribers_count": 1 + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-4358.json b/2024/CVE-2024-4358.json index f9635c1549..393e7ed9ea 100644 --- a/2024/CVE-2024-4358.json +++ b/2024/CVE-2024-4358.json @@ -168,13 +168,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-44083.json b/2024/CVE-2024-44083.json index f9efc0303b..6fed2cfb03 100644 --- a/2024/CVE-2024-44083.json +++ b/2024/CVE-2024-44083.json @@ -13,10 +13,10 @@ "description": "Makes IDA (most versions) to crash upon opening it. ", "fork": false, "created_at": "2024-08-25T12:33:14Z", - "updated_at": "2024-08-26T16:45:03Z", + "updated_at": "2024-08-27T03:49:18Z", "pushed_at": "2024-08-26T00:12:57Z", - "stargazers_count": 29, - "watchers_count": 29, + "stargazers_count": 30, + "watchers_count": 30, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 29, + "watchers": 30, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-45264.json b/2024/CVE-2024-45264.json index 60fd0d816a..c6609bf210 100644 --- a/2024/CVE-2024-45264.json +++ b/2024/CVE-2024-45264.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-45265.json b/2024/CVE-2024-45265.json index 1dae36ef66..4cda6fba88 100644 --- a/2024/CVE-2024-45265.json +++ b/2024/CVE-2024-45265.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-4879.json b/2024/CVE-2024-4879.json index 069d499f6c..653f98ea47 100644 --- a/2024/CVE-2024-4879.json +++ b/2024/CVE-2024-4879.json @@ -238,5 +238,35 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 848057101, + "name": "CVE-2024-4879", + "full_name": "fa-rrel\/CVE-2024-4879", + "owner": { + "login": "fa-rrel", + "id": 153366162, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153366162?v=4", + "html_url": "https:\/\/github.com\/fa-rrel" + }, + "html_url": "https:\/\/github.com\/fa-rrel\/CVE-2024-4879", + "description": "Jelly Template Injection Vulnerability in ServiceNow | POC CVE-2024-4879", + "fork": false, + "created_at": "2024-08-27T03:43:28Z", + "updated_at": "2024-08-27T03:56:55Z", + "pushed_at": "2024-08-27T03:56:52Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-5932.json b/2024/CVE-2024-5932.json index 80418df819..0ba71fcb02 100644 --- a/2024/CVE-2024-5932.json +++ b/2024/CVE-2024-5932.json @@ -13,10 +13,10 @@ "description": "Proof-of-Concept for CVE-2024-5932", "fork": false, "created_at": "2024-08-25T11:51:36Z", - "updated_at": "2024-08-26T23:00:51Z", - "pushed_at": "2024-08-26T13:05:58Z", - "stargazers_count": 2, - "watchers_count": 2, + "updated_at": "2024-08-27T05:45:31Z", + "pushed_at": "2024-08-27T05:45:28Z", + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -36,7 +36,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 4, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-6386.json b/2024/CVE-2024-6386.json new file mode 100644 index 0000000000..c45ec371c0 --- /dev/null +++ b/2024/CVE-2024-6386.json @@ -0,0 +1,39 @@ +[ + { + "id": 848061892, + "name": "CVE-2024-6386", + "full_name": "realbotnet\/CVE-2024-6386", + "owner": { + "login": "realbotnet", + "id": 178095526, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/178095526?v=4", + "html_url": "https:\/\/github.com\/realbotnet" + }, + "html_url": "https:\/\/github.com\/realbotnet\/CVE-2024-6386", + "description": "CVE-2024-6386 - Wordpress WPML (WordPress Multilingual Plugin) ≤ 4.6.12. RCE Exploit 0Day (300K Sites Vulnerability) -- Telegram: @bl4ckhatx", + "fork": false, + "created_at": "2024-08-27T04:01:03Z", + "updated_at": "2024-08-27T04:04:25Z", + "pushed_at": "2024-08-27T04:04:22Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "cve-2024-6386", + "hack", + "poc", + "rce", + "wordpress", + "wpml" + ], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json index 2983b0fa6c..c9c4e24976 100644 --- a/2024/CVE-2024-6387.json +++ b/2024/CVE-2024-6387.json @@ -2847,6 +2847,6 @@ "forks": 1, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-65230.json b/2024/CVE-2024-65230.json deleted file mode 100644 index 4fdbe9ec38..0000000000 --- a/2024/CVE-2024-65230.json +++ /dev/null @@ -1,32 +0,0 @@ -[ - { - "id": 747127213, - "name": "cve-2024-65230", - "full_name": "CBaekhyunC\/cve-2024-65230", - "owner": { - "login": "CBaekhyunC", - "id": 157479885, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/157479885?v=4", - "html_url": "https:\/\/github.com\/CBaekhyunC" - }, - "html_url": "https:\/\/github.com\/CBaekhyunC\/cve-2024-65230", - "description": null, - "fork": false, - "created_at": "2024-01-23T10:16:43Z", - "updated_at": "2024-01-23T10:16:43Z", - "pushed_at": "2024-01-23T10:16:43Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/README.md b/README.md index e2853e9004..72869fea87 100644 --- a/README.md +++ b/README.md @@ -884,6 +884,7 @@ - [Praison001/CVE-2024-4879-ServiceNow](https://github.com/Praison001/CVE-2024-4879-ServiceNow) - [NoTsPepino/CVE-2024-4879-CVE-2024-5217-ServiceNow-RCE-Scanning](https://github.com/NoTsPepino/CVE-2024-4879-CVE-2024-5217-ServiceNow-RCE-Scanning) - [jdusane/CVE-2024-4879](https://github.com/jdusane/CVE-2024-4879) +- [fa-rrel/CVE-2024-4879](https://github.com/fa-rrel/CVE-2024-4879) ### CVE-2024-4883 (2024-06-25) @@ -1070,6 +1071,13 @@ - [Abdurahmon3236/CVE-2024-6366](https://github.com/Abdurahmon3236/CVE-2024-6366) +### CVE-2024-6386 (2024-08-21) + +The WPML plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.6.12 via the Twig Server-Side Template Injection. This is due to missing input validation and sanitization on the render function. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server. + + +- [realbotnet/CVE-2024-6386](https://github.com/realbotnet/CVE-2024-6386) + ### CVE-2024-6387 (2024-07-01) A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period. @@ -2400,6 +2408,7 @@ - [5ma1l/CVE-2024-25641](https://github.com/5ma1l/CVE-2024-25641) +- [thisisveryfunny/CVE-2024-25641-RCE-Automated-Exploit-Cacti-1.2.26](https://github.com/thisisveryfunny/CVE-2024-25641-RCE-Automated-Exploit-Cacti-1.2.26) ### CVE-2024-25723 (2024-02-27) @@ -3239,7 +3248,6 @@ - [AD-Appledog/wakuwaku](https://github.com/AD-Appledog/wakuwaku) - [tobelight/cve_2024_32002](https://github.com/tobelight/cve_2024_32002) - [Basyaact/CVE-2024-32002-PoC_Chinese](https://github.com/Basyaact/CVE-2024-32002-PoC_Chinese) -- [bonnettheo/CVE-2024-32002](https://github.com/bonnettheo/CVE-2024-32002) - [EQSTSeminar/git_rce](https://github.com/EQSTSeminar/git_rce) - [sysonlai/CVE-2024-32002-hook](https://github.com/sysonlai/CVE-2024-32002-hook) - [TSY244/CVE-2024-32002-git-rce-father-poc](https://github.com/TSY244/CVE-2024-32002-git-rce-father-poc) @@ -4407,7 +4415,7 @@ - [jeyabalaji711/CVE-2024-42919](https://github.com/jeyabalaji711/CVE-2024-42919) ### CVE-2024-42992 -- [juwenyi/CVE-2024-42992](https://github.com/juwenyi/CVE-2024-42992) +- [thanhh23/CVE-2024-42992](https://github.com/thanhh23/CVE-2024-42992) ### CVE-2024-43035 - [ZeroPathAI/Fonoster-LFI-PoC](https://github.com/ZeroPathAI/Fonoster-LFI-PoC) @@ -4448,15 +4456,6 @@ ### CVE-2024-56662 - [nimosec/cve-2024-56662](https://github.com/nimosec/cve-2024-56662) -### CVE-2024-65230 -- [CBaekhyunC/cve-2024-65230](https://github.com/CBaekhyunC/cve-2024-65230) - -### CVE-2024-206565 -- [sanderswannalive/sumkaluissessss](https://github.com/sanderswannalive/sumkaluissessss) - -### CVE-2024-320002 -- [bonnettheo/hook](https://github.com/bonnettheo/hook) - ### CVE-2024-1642470 - [Symbolexe/CVE-2024-1642470](https://github.com/Symbolexe/CVE-2024-1642470) @@ -20476,6 +20475,7 @@ - [X-Projetion/Exploiting-PwnKit-CVE-2021-4034-](https://github.com/X-Projetion/Exploiting-PwnKit-CVE-2021-4034-) - [evkl1d/CVE-2021-4034](https://github.com/evkl1d/CVE-2021-4034) - [Typical0day/CVE-2021-4034](https://github.com/Typical0day/CVE-2021-4034) +- [lsclsclsc/CVE-2021-4034](https://github.com/lsclsclsc/CVE-2021-4034) ### CVE-2021-4043 (2022-02-04)