diff --git a/2006/CVE-2006-3392.json b/2006/CVE-2006-3392.json index b5d0d0dea8..53f3904395 100644 --- a/2006/CVE-2006-3392.json +++ b/2006/CVE-2006-3392.json @@ -57,7 +57,7 @@ "forks": 4, "watchers": 13, "score": 0, - "subscribers_count": 1 + "subscribers_count": 2 }, { "id": 424360665, diff --git a/2017/CVE-2017-8570.json b/2017/CVE-2017-8570.json index 8c60211e99..e03c9c930f 100644 --- a/2017/CVE-2017-8570.json +++ b/2017/CVE-2017-8570.json @@ -43,10 +43,10 @@ "description": "Proof of Concept exploit for CVE-2017-8570", "fork": false, "created_at": "2018-01-09T19:09:33Z", - "updated_at": "2024-05-04T07:46:15Z", + "updated_at": "2024-05-14T13:20:31Z", "pushed_at": "2018-01-09T19:23:43Z", - "stargazers_count": 185, - "watchers_count": 185, + "stargazers_count": 186, + "watchers_count": 186, "has_discussions": false, "forks_count": 105, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 105, - "watchers": 185, + "watchers": 186, "score": 0, "subscribers_count": 9 }, diff --git a/2018/CVE-2018-10583.json b/2018/CVE-2018-10583.json index 979fdec9f2..d821ea7bce 100644 --- a/2018/CVE-2018-10583.json +++ b/2018/CVE-2018-10583.json @@ -46,10 +46,10 @@ "html_url": "https:\/\/github.com\/octodi" }, "html_url": "https:\/\/github.com\/octodi\/CVE-2018-10583", - "description": "Update python3 exploit for CVE-2018-10583 (LibreOffice\/Open Office - '.odt' Information Disclosure )", + "description": "Updated python3 exploit for CVE-2018-10583 (LibreOffice\/Open Office - '.odt' Information Disclosure )", "fork": false, "created_at": "2024-05-13T17:13:17Z", - "updated_at": "2024-05-13T17:31:12Z", + "updated_at": "2024-05-14T15:03:13Z", "pushed_at": "2024-05-13T17:31:09Z", "stargazers_count": 0, "watchers_count": 0, @@ -63,6 +63,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2018/CVE-2018-12613.json b/2018/CVE-2018-12613.json index 451c79faa7..ff726ac967 100644 --- a/2018/CVE-2018-12613.json +++ b/2018/CVE-2018-12613.json @@ -43,10 +43,10 @@ "description": "Modified standalone exploit ported for Python 3", "fork": false, "created_at": "2019-09-16T12:14:52Z", - "updated_at": "2024-04-30T06:42:13Z", + "updated_at": "2024-05-14T17:21:30Z", "pushed_at": "2019-09-16T14:04:00Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 2 }, diff --git a/2019/CVE-2019-0232.json b/2019/CVE-2019-0232.json index febcc124b9..710dcba47a 100644 --- a/2019/CVE-2019-0232.json +++ b/2019/CVE-2019-0232.json @@ -103,10 +103,10 @@ "description": "CVE-2019-0232-Remote Code Execution on Apache Tomcat 7.0.42", "fork": false, "created_at": "2019-11-21T14:25:39Z", - "updated_at": "2024-02-14T17:25:57Z", + "updated_at": "2024-05-14T18:00:21Z", "pushed_at": "2019-11-21T15:03:15Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 17, + "watchers_count": 17, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 16, + "watchers": 17, "score": 0, "subscribers_count": 1 }, diff --git a/2019/CVE-2019-18935.json b/2019/CVE-2019-18935.json index 594c1138e0..c9f92f6d10 100644 --- a/2019/CVE-2019-18935.json +++ b/2019/CVE-2019-18935.json @@ -43,10 +43,10 @@ "description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.", "fork": false, "created_at": "2019-12-12T07:58:11Z", - "updated_at": "2024-04-17T21:54:17Z", + "updated_at": "2024-05-14T17:56:55Z", "pushed_at": "2022-04-14T18:23:38Z", - "stargazers_count": 335, - "watchers_count": 335, + "stargazers_count": 336, + "watchers_count": 336, "has_discussions": false, "forks_count": 85, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 85, - "watchers": 335, + "watchers": 336, "score": 0, "subscribers_count": 13 }, diff --git a/2019/CVE-2019-7192.json b/2019/CVE-2019-7192.json index 41b6ef7e34..5c4559eed4 100644 --- a/2019/CVE-2019-7192.json +++ b/2019/CVE-2019-7192.json @@ -43,10 +43,10 @@ "description": "QNAP pre-auth root RCE Exploit (CVE-2019-7192 ~ CVE-2019-7195)", "fork": false, "created_at": "2020-05-24T15:44:29Z", - "updated_at": "2024-04-11T10:19:13Z", + "updated_at": "2024-05-14T17:25:36Z", "pushed_at": "2020-05-24T16:28:46Z", - "stargazers_count": 80, - "watchers_count": 80, + "stargazers_count": 81, + "watchers_count": 81, "has_discussions": false, "forks_count": 33, "allow_forking": true, @@ -58,7 +58,7 @@ ], "visibility": "public", "forks": 33, - "watchers": 80, + "watchers": 81, "score": 0, "subscribers_count": 2 } diff --git a/2019/CVE-2019-8852.json b/2019/CVE-2019-8852.json index 5f3d547cd9..ec7ae2f5ba 100644 --- a/2019/CVE-2019-8852.json +++ b/2019/CVE-2019-8852.json @@ -18,13 +18,13 @@ "stargazers_count": 12, "watchers_count": 12, "has_discussions": false, - "forks_count": 7, + "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 7, + "forks": 8, "watchers": 12, "score": 0, "subscribers_count": 2 diff --git a/2020/CVE-2020-0688.json b/2020/CVE-2020-0688.json index 76abc508e1..5cb80ee13b 100644 --- a/2020/CVE-2020-0688.json +++ b/2020/CVE-2020-0688.json @@ -265,10 +265,10 @@ "description": "Exploit and detect tools for CVE-2020-0688", "fork": false, "created_at": "2020-03-01T12:57:32Z", - "updated_at": "2024-05-10T10:41:04Z", + "updated_at": "2024-05-14T14:13:48Z", "pushed_at": "2020-03-21T05:44:48Z", - "stargazers_count": 346, - "watchers_count": 346, + "stargazers_count": 348, + "watchers_count": 348, "has_discussions": false, "forks_count": 81, "allow_forking": true, @@ -277,7 +277,7 @@ "topics": [], "visibility": "public", "forks": 81, - "watchers": 346, + "watchers": 348, "score": 0, "subscribers_count": 9 }, @@ -719,10 +719,10 @@ "description": "GUI Exploit Tool for CVE-2020-0688(Microsoft Exchange default MachineKeySection deserialize vulnerability)", "fork": false, "created_at": "2024-05-09T12:50:48Z", - "updated_at": "2024-05-13T10:20:18Z", + "updated_at": "2024-05-14T14:14:22Z", "pushed_at": "2024-05-09T13:51:27Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -738,7 +738,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 7, + "watchers": 9, "score": 0, "subscribers_count": 1 } diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index 7da4c861b8..24e496b967 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -373,10 +373,10 @@ "description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ", "fork": false, "created_at": "2020-02-22T16:16:20Z", - "updated_at": "2024-05-14T07:14:49Z", + "updated_at": "2024-05-14T12:57:15Z", "pushed_at": "2020-03-09T14:51:43Z", - "stargazers_count": 343, - "watchers_count": 343, + "stargazers_count": 344, + "watchers_count": 344, "has_discussions": false, "forks_count": 111, "allow_forking": true, @@ -391,7 +391,7 @@ ], "visibility": "public", "forks": 111, - "watchers": 343, + "watchers": 344, "score": 0, "subscribers_count": 5 }, diff --git a/2023/CVE-2023-2752.json b/2020/CVE-2020-27838.json similarity index 53% rename from 2023/CVE-2023-2752.json rename to 2020/CVE-2020-27838.json index 6a7e033f72..536e92a445 100644 --- a/2023/CVE-2023-2752.json +++ b/2020/CVE-2020-27838.json @@ -1,20 +1,20 @@ [ { - "id": 799195135, - "name": "CVE-2023-2752", - "full_name": "Cappricio-Securities\/CVE-2023-2752", + "id": 800580605, + "name": "CVE-2020-27838", + "full_name": "Cappricio-Securities\/CVE-2020-27838", "owner": { "login": "Cappricio-Securities", "id": 102907425, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4", "html_url": "https:\/\/github.com\/Cappricio-Securities" }, - "html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2023-2752", - "description": "Tool for finding CVE-2023-27524 (Apache Superset - Authentication Bypass)", + "html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2020-27838", + "description": "CVE-2020-27838 - KeyCloak - Information Exposure ", "fork": false, - "created_at": "2024-05-11T12:29:08Z", - "updated_at": "2024-05-11T12:34:06Z", - "pushed_at": "2024-05-11T12:29:46Z", + "created_at": "2024-05-14T15:50:16Z", + "updated_at": "2024-05-14T15:59:14Z", + "pushed_at": "2024-05-14T15:59:10Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, @@ -22,15 +22,7 @@ "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, - "topics": [ - "apache-superset", - "apache-superset---authentication-bypass", - "authentication-bypass", - "bugbounty", - "cve-2023-2752", - "vapt", - "wapt" - ], + "topics": [], "visibility": "public", "forks": 0, "watchers": 0, diff --git a/2020/CVE-2020-27904.json b/2020/CVE-2020-27904.json index 296d2f2915..0580ba80a6 100644 --- a/2020/CVE-2020-27904.json +++ b/2020/CVE-2020-27904.json @@ -18,13 +18,13 @@ "stargazers_count": 67, "watchers_count": 67, "has_discussions": false, - "forks_count": 11, + "forks_count": 12, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 11, + "forks": 12, "watchers": 67, "score": 0, "subscribers_count": 5 diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index b02a140e32..6ed5a1544e 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -2143,5 +2143,43 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 800600797, + "name": "CVE-2021-3156-checker", + "full_name": "lypd0\/CVE-2021-3156-checker", + "owner": { + "login": "lypd0", + "id": 146327014, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146327014?v=4", + "html_url": "https:\/\/github.com\/lypd0" + }, + "html_url": "https:\/\/github.com\/lypd0\/CVE-2021-3156-checker", + "description": "Checker for CVE-2021-3156 with static version check", + "fork": false, + "created_at": "2024-05-14T16:35:09Z", + "updated_at": "2024-05-14T17:04:55Z", + "pushed_at": "2024-05-14T17:04:52Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "checker", + "cve", + "cve-2021-3156", + "escalation", + "privesc", + "privilege", + "python" + ], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index 6834a6b336..8aa00183dd 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -169,10 +169,10 @@ "description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)", "fork": false, "created_at": "2022-01-26T00:56:36Z", - "updated_at": "2024-05-14T07:19:06Z", + "updated_at": "2024-05-14T12:34:43Z", "pushed_at": "2023-05-04T19:24:39Z", - "stargazers_count": 1023, - "watchers_count": 1023, + "stargazers_count": 1022, + "watchers_count": 1022, "has_discussions": false, "forks_count": 308, "allow_forking": true, @@ -185,7 +185,7 @@ ], "visibility": "public", "forks": 308, - "watchers": 1023, + "watchers": 1022, "score": 0, "subscribers_count": 16 }, diff --git a/2022/CVE-2022-20421.json b/2022/CVE-2022-20421.json index 92a165db49..f41c750b34 100644 --- a/2022/CVE-2022-20421.json +++ b/2022/CVE-2022-20421.json @@ -13,10 +13,10 @@ "description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)", "fork": false, "created_at": "2023-03-23T10:25:59Z", - "updated_at": "2024-05-13T20:52:04Z", + "updated_at": "2024-05-14T13:41:18Z", "pushed_at": "2023-05-27T15:39:41Z", - "stargazers_count": 215, - "watchers_count": 215, + "stargazers_count": 216, + "watchers_count": 216, "has_discussions": false, "forks_count": 30, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 30, - "watchers": 215, + "watchers": 216, "score": 0, "subscribers_count": 7 } diff --git a/2022/CVE-2022-24125.json b/2022/CVE-2022-24125.json index 3ea45dfc87..bb3c5e29d2 100644 --- a/2022/CVE-2022-24125.json +++ b/2022/CVE-2022-24125.json @@ -13,10 +13,10 @@ "description": "Documentation and proof of concept code for CVE-2022-24125 and CVE-2022-24126.", "fork": false, "created_at": "2022-01-28T20:37:14Z", - "updated_at": "2024-03-06T22:50:10Z", + "updated_at": "2024-05-14T17:56:49Z", "pushed_at": "2022-08-30T02:11:05Z", - "stargazers_count": 144, - "watchers_count": 144, + "stargazers_count": 143, + "watchers_count": 143, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 7, - "watchers": 144, + "watchers": 143, "score": 0, "subscribers_count": 3 } diff --git a/2022/CVE-2022-30190.json b/2022/CVE-2022-30190.json index 24a6704197..0a473bb4cb 100644 --- a/2022/CVE-2022-30190.json +++ b/2022/CVE-2022-30190.json @@ -1561,10 +1561,10 @@ "description": "Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)", "fork": false, "created_at": "2022-06-09T09:32:10Z", - "updated_at": "2024-03-30T12:00:40Z", + "updated_at": "2024-05-14T15:53:57Z", "pushed_at": "2022-06-16T07:28:13Z", - "stargazers_count": 25, - "watchers_count": 25, + "stargazers_count": 26, + "watchers_count": 26, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -1583,7 +1583,7 @@ ], "visibility": "public", "forks": 14, - "watchers": 25, + "watchers": 26, "score": 0, "subscribers_count": 2 }, diff --git a/2022/CVE-2022-36271.json b/2022/CVE-2022-36271.json index 37414d6620..2efc65ee3c 100644 --- a/2022/CVE-2022-36271.json +++ b/2022/CVE-2022-36271.json @@ -13,10 +13,10 @@ "description": "This is working POC of CVE-2022-36271 ", "fork": false, "created_at": "2022-08-16T19:48:36Z", - "updated_at": "2023-09-28T11:41:58Z", + "updated_at": "2024-05-14T17:06:24Z", "pushed_at": "2022-09-01T16:43:49Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 8, + "watchers": 9, "score": 0, "subscribers_count": 2 } diff --git a/2022/CVE-2022-42889.json b/2022/CVE-2022-42889.json index 932ce0eb0e..7280c61095 100644 --- a/2022/CVE-2022-42889.json +++ b/2022/CVE-2022-42889.json @@ -280,10 +280,10 @@ "description": "Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.", "fork": false, "created_at": "2022-10-19T11:49:08Z", - "updated_at": "2024-04-21T17:20:37Z", + "updated_at": "2024-05-14T14:34:50Z", "pushed_at": "2023-12-29T14:57:34Z", - "stargazers_count": 47, - "watchers_count": 47, + "stargazers_count": 48, + "watchers_count": 48, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -304,7 +304,7 @@ ], "visibility": "public", "forks": 8, - "watchers": 47, + "watchers": 48, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-22527.json b/2023/CVE-2023-22527.json index 3df4e27590..04252f8dd6 100644 --- a/2023/CVE-2023-22527.json +++ b/2023/CVE-2023-22527.json @@ -586,10 +586,10 @@ "description": "confluence CVE-2023-22527 漏洞利用工具,支持冰蝎\/哥斯拉内存马注入,支持设置 http 代理", "fork": false, "created_at": "2024-02-26T02:34:44Z", - "updated_at": "2024-05-14T01:51:48Z", + "updated_at": "2024-05-14T15:20:02Z", "pushed_at": "2024-04-24T02:34:16Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 17, + "watchers_count": 17, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -598,7 +598,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 16, + "watchers": 17, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-25157.json b/2023/CVE-2023-25157.json index 17f9d788da..215b3af7fc 100644 --- a/2023/CVE-2023-25157.json +++ b/2023/CVE-2023-25157.json @@ -13,10 +13,10 @@ "description": "CVE-2023-25157 - GeoServer SQL Injection - PoC", "fork": false, "created_at": "2023-06-06T14:05:09Z", - "updated_at": "2024-05-10T10:50:31Z", + "updated_at": "2024-05-14T17:54:06Z", "pushed_at": "2023-07-14T10:40:17Z", - "stargazers_count": 148, - "watchers_count": 148, + "stargazers_count": 149, + "watchers_count": 149, "has_discussions": false, "forks_count": 32, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 32, - "watchers": 148, + "watchers": 149, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-26360.json b/2023/CVE-2023-26360.json index 5d5887de2a..42cd57b282 100644 --- a/2023/CVE-2023-26360.json +++ b/2023/CVE-2023-26360.json @@ -43,8 +43,8 @@ "description": null, "fork": false, "created_at": "2024-05-14T11:22:35Z", - "updated_at": "2024-05-14T11:22:39Z", - "pushed_at": "2024-05-14T11:22:36Z", + "updated_at": "2024-05-14T13:37:04Z", + "pushed_at": "2024-05-14T13:37:00Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2023/CVE-2023-27524.json b/2023/CVE-2023-27524.json index e578d5470b..70a37bedef 100644 --- a/2023/CVE-2023-27524.json +++ b/2023/CVE-2023-27524.json @@ -332,5 +332,43 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 799195135, + "name": "CVE-2023-27524", + "full_name": "Cappricio-Securities\/CVE-2023-27524", + "owner": { + "login": "Cappricio-Securities", + "id": 102907425, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4", + "html_url": "https:\/\/github.com\/Cappricio-Securities" + }, + "html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2023-27524", + "description": "Tool for finding CVE-2023-27524 (Apache Superset - Authentication Bypass)", + "fork": false, + "created_at": "2024-05-11T12:29:08Z", + "updated_at": "2024-05-14T15:26:47Z", + "pushed_at": "2024-05-14T15:26:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "apache-superset", + "apache-superset---authentication-bypass", + "authentication-bypass", + "bugbounty", + "cve-2023-2752", + "vapt", + "wapt" + ], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-32315.json b/2023/CVE-2023-32315.json index 5e517065cb..5480035699 100644 --- a/2023/CVE-2023-32315.json +++ b/2023/CVE-2023-32315.json @@ -103,10 +103,10 @@ "description": "Openfire Console Authentication Bypass Vulnerability with RCE plugin", "fork": false, "created_at": "2023-06-18T15:42:00Z", - "updated_at": "2024-05-12T13:42:09Z", + "updated_at": "2024-05-14T13:21:41Z", "pushed_at": "2024-03-07T07:23:41Z", - "stargazers_count": 29, - "watchers_count": 29, + "stargazers_count": 30, + "watchers_count": 30, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 29, + "watchers": 30, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-33733.json b/2023/CVE-2023-33733.json index 9cb0904484..72edd3b5e4 100644 --- a/2023/CVE-2023-33733.json +++ b/2023/CVE-2023-33733.json @@ -13,10 +13,10 @@ "description": "CVE-2023-33733 reportlab RCE", "fork": false, "created_at": "2023-05-30T22:22:50Z", - "updated_at": "2024-05-13T18:13:45Z", + "updated_at": "2024-05-14T17:49:07Z", "pushed_at": "2023-09-05T15:49:14Z", - "stargazers_count": 94, - "watchers_count": 94, + "stargazers_count": 96, + "watchers_count": 96, "has_discussions": false, "forks_count": 17, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 17, - "watchers": 94, + "watchers": 96, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-36424.json b/2023/CVE-2023-36424.json index 4f74b38492..dcdde1af6a 100644 --- a/2023/CVE-2023-36424.json +++ b/2023/CVE-2023-36424.json @@ -13,10 +13,10 @@ "description": "Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation", "fork": false, "created_at": "2024-03-21T21:39:24Z", - "updated_at": "2024-05-12T16:31:42Z", + "updated_at": "2024-05-14T12:31:53Z", "pushed_at": "2024-03-22T06:45:43Z", - "stargazers_count": 102, - "watchers_count": 102, + "stargazers_count": 103, + "watchers_count": 103, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 23, - "watchers": 102, + "watchers": 103, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index 0ad3662e62..fd058e5287 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -13,19 +13,19 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2024-05-14T12:14:52Z", + "updated_at": "2024-05-14T18:12:14Z", "pushed_at": "2024-05-14T09:04:25Z", - "stargazers_count": 593, - "watchers_count": 593, + "stargazers_count": 606, + "watchers_count": 606, "has_discussions": false, - "forks_count": 98, + "forks_count": 103, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 98, - "watchers": 593, + "forks": 103, + "watchers": 606, "score": 0, "subscribers_count": 9 }, diff --git a/2023/CVE-2023-46012.json b/2023/CVE-2023-46012.json index 24acb6dc0b..e7ca1d1948 100644 --- a/2023/CVE-2023-46012.json +++ b/2023/CVE-2023-46012.json @@ -18,13 +18,13 @@ "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 diff --git a/2023/CVE-2023-46604.json b/2023/CVE-2023-46604.json index 66ec6dd0cb..6cb34ec517 100644 --- a/2023/CVE-2023-46604.json +++ b/2023/CVE-2023-46604.json @@ -103,10 +103,10 @@ "description": " Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604) ", "fork": false, "created_at": "2023-11-03T22:06:09Z", - "updated_at": "2024-05-14T10:19:17Z", + "updated_at": "2024-05-14T17:06:38Z", "pushed_at": "2024-01-20T16:59:23Z", - "stargazers_count": 93, - "watchers_count": 93, + "stargazers_count": 94, + "watchers_count": 94, "has_discussions": false, "forks_count": 31, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 31, - "watchers": 93, + "watchers": 94, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-47246.json b/2023/CVE-2023-47246.json index 55cceb22db..8e6a54ea54 100644 --- a/2023/CVE-2023-47246.json +++ b/2023/CVE-2023-47246.json @@ -13,10 +13,10 @@ "description": "exploit for cve-2023-47246 SysAid RCE (shell upload)", "fork": false, "created_at": "2023-11-17T07:03:06Z", - "updated_at": "2024-04-30T00:09:31Z", + "updated_at": "2024-05-14T17:06:56Z", "pushed_at": "2023-12-07T02:55:01Z", - "stargazers_count": 49, - "watchers_count": 49, + "stargazers_count": 50, + "watchers_count": 50, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 12, - "watchers": 49, + "watchers": 50, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-4863.json b/2023/CVE-2023-4863.json index 55d5a0548b..bcba6af847 100644 --- a/2023/CVE-2023-4863.json +++ b/2023/CVE-2023-4863.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-09-21T05:22:51Z", - "updated_at": "2024-05-14T10:37:08Z", + "updated_at": "2024-05-14T17:19:11Z", "pushed_at": "2023-12-18T04:25:00Z", - "stargazers_count": 293, - "watchers_count": 293, + "stargazers_count": 294, + "watchers_count": 294, "has_discussions": false, "forks_count": 46, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 46, - "watchers": 293, + "watchers": 294, "score": 0, "subscribers_count": 15 }, diff --git a/2023/CVE-2023-50164.json b/2023/CVE-2023-50164.json index cff247b4ca..730130a0ef 100644 --- a/2023/CVE-2023-50164.json +++ b/2023/CVE-2023-50164.json @@ -103,19 +103,19 @@ "description": "Proof of Concept for Path Traversal in Apache Struts (\"CVE-2023-50164\")", "fork": false, "created_at": "2023-12-17T14:18:54Z", - "updated_at": "2024-03-14T14:50:28Z", + "updated_at": "2024-05-14T15:21:41Z", "pushed_at": "2023-12-18T02:46:21Z", - "stargazers_count": 55, - "watchers_count": 55, + "stargazers_count": 56, + "watchers_count": 56, "has_discussions": true, - "forks_count": 15, + "forks_count": 16, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 15, - "watchers": 55, + "forks": 16, + "watchers": 56, "score": 0, "subscribers_count": 3 }, diff --git a/2023/CVE-2023-6553.json b/2023/CVE-2023-6553.json index 21aaf99c0b..7be132acdf 100644 --- a/2023/CVE-2023-6553.json +++ b/2023/CVE-2023-6553.json @@ -13,12 +13,12 @@ "description": "Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution", "fork": false, "created_at": "2023-12-13T20:26:59Z", - "updated_at": "2024-05-10T10:52:14Z", + "updated_at": "2024-05-14T15:19:05Z", "pushed_at": "2024-02-06T23:22:31Z", - "stargazers_count": 63, - "watchers_count": 63, + "stargazers_count": 64, + "watchers_count": 64, "has_discussions": false, - "forks_count": 20, + "forks_count": 21, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -38,8 +38,8 @@ "wordpress" ], "visibility": "public", - "forks": 20, - "watchers": 63, + "forks": 21, + "watchers": 64, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index 9befee77fb..ff268a1056 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -13,10 +13,10 @@ "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "fork": false, "created_at": "2024-03-20T21:16:41Z", - "updated_at": "2024-05-14T12:14:53Z", + "updated_at": "2024-05-14T16:45:49Z", "pushed_at": "2024-04-17T16:09:54Z", - "stargazers_count": 1925, - "watchers_count": 1925, + "stargazers_count": 1926, + "watchers_count": 1926, "has_discussions": false, "forks_count": 239, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 239, - "watchers": 1925, + "watchers": 1926, "score": 0, "subscribers_count": 21 }, diff --git a/2024/CVE-2024-20353.json b/2024/CVE-2024-20353.json deleted file mode 100644 index 204f81c964..0000000000 --- a/2024/CVE-2024-20353.json +++ /dev/null @@ -1,32 +0,0 @@ -[ - { - "id": 795510133, - "name": "CVE-2024-20353-CiscoASAandFTD", - "full_name": "Spl0stus\/CVE-2024-20353-CiscoASAandFTD", - "owner": { - "login": "Spl0stus", - "id": 168833593, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168833593?v=4", - "html_url": "https:\/\/github.com\/Spl0stus" - }, - "html_url": "https:\/\/github.com\/Spl0stus\/CVE-2024-20353-CiscoASAandFTD", - "description": "Exploit for Cisco ASA and FTD (may 2024)", - "fork": false, - "created_at": "2024-05-03T12:46:09Z", - "updated_at": "2024-05-07T06:33:37Z", - "pushed_at": "2024-05-03T12:52:18Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-20359.json b/2024/CVE-2024-20359.json deleted file mode 100644 index 46e8237316..0000000000 --- a/2024/CVE-2024-20359.json +++ /dev/null @@ -1,32 +0,0 @@ -[ - { - "id": 795883499, - "name": "CVE-2024-20359-CiscoASA-FTD-exploit", - "full_name": "Garvard-Agency\/CVE-2024-20359-CiscoASA-FTD-exploit", - "owner": { - "login": "Garvard-Agency", - "id": 168903663, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168903663?v=4", - "html_url": "https:\/\/github.com\/Garvard-Agency" - }, - "html_url": "https:\/\/github.com\/Garvard-Agency\/CVE-2024-20359-CiscoASA-FTD-exploit", - "description": "Exploit for Cisco ASA and FTD (may 2024)", - "fork": false, - "created_at": "2024-05-04T10:40:22Z", - "updated_at": "2024-05-09T12:13:02Z", - "pushed_at": "2024-05-04T10:50:49Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-21762.json b/2024/CVE-2024-21762.json index 42df774460..41f7acad38 100644 --- a/2024/CVE-2024-21762.json +++ b/2024/CVE-2024-21762.json @@ -103,10 +103,10 @@ "description": "Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)", "fork": false, "created_at": "2024-03-13T22:57:00Z", - "updated_at": "2024-05-07T12:07:45Z", + "updated_at": "2024-05-14T12:40:44Z", "pushed_at": "2024-03-24T22:01:21Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 7, + "watchers": 8, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-21887.json b/2024/CVE-2024-21887.json index 834d53e581..f65be1534e 100644 --- a/2024/CVE-2024-21887.json +++ b/2024/CVE-2024-21887.json @@ -73,10 +73,10 @@ "description": "A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.", "fork": false, "created_at": "2024-01-16T20:59:38Z", - "updated_at": "2024-04-26T05:00:24Z", + "updated_at": "2024-05-14T16:25:10Z", "pushed_at": "2024-01-17T00:38:28Z", - "stargazers_count": 43, - "watchers_count": 43, + "stargazers_count": 44, + "watchers_count": 44, "has_discussions": false, "forks_count": 13, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 13, - "watchers": 43, + "watchers": 44, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-27460.json b/2024/CVE-2024-27460.json index cded1d85f1..27726e617e 100644 --- a/2024/CVE-2024-27460.json +++ b/2024/CVE-2024-27460.json @@ -13,8 +13,8 @@ "description": "HP Plantronics Hub 3.2.1 Updater Privilege Escalation", "fork": false, "created_at": "2024-05-13T11:15:14Z", - "updated_at": "2024-05-14T06:00:17Z", - "pushed_at": "2024-05-13T11:46:39Z", + "updated_at": "2024-05-14T13:55:32Z", + "pushed_at": "2024-05-14T13:55:29Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, diff --git a/2024/CVE-2024-27804.json b/2024/CVE-2024-27804.json new file mode 100644 index 0000000000..05d886a25a --- /dev/null +++ b/2024/CVE-2024-27804.json @@ -0,0 +1,32 @@ +[ + { + "id": 800535361, + "name": "CVE-2024-27804", + "full_name": "R00tkitSMM\/CVE-2024-27804", + "owner": { + "login": "R00tkitSMM", + "id": 78787782, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78787782?v=4", + "html_url": "https:\/\/github.com\/R00tkitSMM" + }, + "html_url": "https:\/\/github.com\/R00tkitSMM\/CVE-2024-27804", + "description": "POC for CVE-2024-27804", + "fork": false, + "created_at": "2024-05-14T14:17:06Z", + "updated_at": "2024-05-14T17:43:08Z", + "pushed_at": "2024-05-14T14:55:23Z", + "stargazers_count": 18, + "watchers_count": 18, + "has_discussions": false, + "forks_count": 3, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 3, + "watchers": 18, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-27956.json b/2024/CVE-2024-27956.json index 7b1caa3bfb..48810d4ed1 100644 --- a/2024/CVE-2024-27956.json +++ b/2024/CVE-2024-27956.json @@ -183,5 +183,55 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 800537570, + "name": "WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956", + "full_name": "AiGptCode\/WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956", + "owner": { + "login": "AiGptCode", + "id": 146197697, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146197697?v=4", + "html_url": "https:\/\/github.com\/AiGptCode" + }, + "html_url": "https:\/\/github.com\/AiGptCode\/WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956", + "description": "WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target server. It utilizes the wp-automatic plugin's CSV injection vulnerability to execute SQL queries", + "fork": false, + "created_at": "2024-05-14T14:21:49Z", + "updated_at": "2024-05-14T15:00:27Z", + "pushed_at": "2024-05-14T15:00:23Z", + "stargazers_count": 2, + "watchers_count": 2, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "android", + "backdoor", + "backdoors", + "cve", + "cve-2024-27956", + "hack", + "hacking", + "html", + "php", + "ransomware", + "rce", + "reverse-shell", + "shell", + "web", + "website", + "windows", + "wordpress", + "wordpress-plugin", + "wordpress-reversshell" + ], + "visibility": "public", + "forks": 1, + "watchers": 2, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-29059.json b/2024/CVE-2024-29059.json index 0ff8e3f5ec..a1d00f2032 100644 --- a/2024/CVE-2024-29059.json +++ b/2024/CVE-2024-29059.json @@ -13,10 +13,10 @@ "description": "Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)", "fork": false, "created_at": "2024-03-11T10:14:39Z", - "updated_at": "2024-05-02T20:58:32Z", + "updated_at": "2024-05-14T13:43:50Z", "pushed_at": "2024-03-25T12:56:16Z", - "stargazers_count": 68, - "watchers_count": 68, + "stargazers_count": 69, + "watchers_count": 69, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 68, + "watchers": 69, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-29988.json b/2024/CVE-2024-29988.json index fdcea42333..12abc7349b 100644 --- a/2024/CVE-2024-29988.json +++ b/2024/CVE-2024-29988.json @@ -13,7 +13,7 @@ "description": "Exploit for Microsoft SmartScreen malicious execution (april 2024)", "fork": false, "created_at": "2024-05-03T12:17:25Z", - "updated_at": "2024-05-06T13:06:49Z", + "updated_at": "2024-05-14T15:58:14Z", "pushed_at": "2024-05-03T12:57:49Z", "stargazers_count": 2, "watchers_count": 2, diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json index 5ff39208c3..e5a1f6d5fe 100644 --- a/2024/CVE-2024-3094.json +++ b/2024/CVE-2024-3094.json @@ -1012,10 +1012,10 @@ "description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)", "fork": false, "created_at": "2024-04-01T14:28:09Z", - "updated_at": "2024-05-14T08:47:24Z", + "updated_at": "2024-05-14T13:20:47Z", "pushed_at": "2024-04-03T04:58:50Z", - "stargazers_count": 3459, - "watchers_count": 3459, + "stargazers_count": 3460, + "watchers_count": 3460, "has_discussions": false, "forks_count": 233, "allow_forking": true, @@ -1024,7 +1024,7 @@ "topics": [], "visibility": "public", "forks": 233, - "watchers": 3459, + "watchers": 3460, "score": 0, "subscribers_count": 38 }, diff --git a/2024/CVE-2024-4761.json b/2024/CVE-2024-4761.json new file mode 100644 index 0000000000..d47cab5fbd --- /dev/null +++ b/2024/CVE-2024-4761.json @@ -0,0 +1,32 @@ +[ + { + "id": 800632738, + "name": "CVE-2024-4761", + "full_name": "michredteam\/CVE-2024-4761", + "owner": { + "login": "michredteam", + "id": 168865716, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168865716?v=4", + "html_url": "https:\/\/github.com\/michredteam" + }, + "html_url": "https:\/\/github.com\/michredteam\/CVE-2024-4761", + "description": "High CVE-2024-4761 Exploit ", + "fork": false, + "created_at": "2024-05-14T17:45:22Z", + "updated_at": "2024-05-14T18:11:56Z", + "pushed_at": "2024-05-14T18:21:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/README.md b/README.md index 62d62e7b8f..437c6ce21d 100644 --- a/README.md +++ b/README.md @@ -516,6 +516,13 @@ - [JoeBeeton/CVE-2024-4701-POC](https://github.com/JoeBeeton/CVE-2024-4701-POC) +### CVE-2024-4761 (2024-05-14) + +Out of bounds write in V8 in Google Chrome prior to 124.0.6367.207 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High) + + +- [michredteam/CVE-2024-4761](https://github.com/michredteam/CVE-2024-4761) + ### CVE-2024-12883 - [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883) @@ -526,13 +533,6 @@ - [Instructor-Team8/CVE-2024-20291-POC](https://github.com/Instructor-Team8/CVE-2024-20291-POC) -### CVE-2024-20353 (2024-04-24) - -A vulnerability in the management and VPN web servers for Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition.\r\n\r This vulnerability is due to incomplete error checking when parsing an HTTP header. An attacker could exploit this vulnerability by sending a crafted HTTP request to a targeted web server on a device. A successful exploit could allow the attacker to cause a DoS condition when the device reloads. - - -- [Spl0stus/CVE-2024-20353-CiscoASAandFTD](https://github.com/Spl0stus/CVE-2024-20353-CiscoASAandFTD) - ### CVE-2024-20356 (2024-04-24) A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker with Administrator-level privileges to perform command injection attacks on an affected system and elevate their privileges to root. This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to elevate their privileges to root. @@ -540,13 +540,6 @@ - [nettitude/CVE-2024-20356](https://github.com/nettitude/CVE-2024-20356) -### CVE-2024-20359 (2024-04-24) - -A vulnerability in a legacy capability that allowed for the preloading of VPN clients and plug-ins and that has been available in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary code with root-level privileges. Administrator-level privileges are required to exploit this vulnerability.\r\n\r This vulnerability is due to improper validation of a file when it is read from system flash memory. An attacker could exploit this vulnerability by copying a crafted file to the disk0: file system of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the affected device after the next reload of the device, which could alter system behavior. Because the injected code could persist across device reboots, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High. - - -- [Garvard-Agency/CVE-2024-20359-CiscoASA-FTD-exploit](https://github.com/Garvard-Agency/CVE-2024-20359-CiscoASA-FTD-exploit) - ### CVE-2024-20656 (2024-01-09) Visual Studio Elevation of Privilege Vulnerability @@ -1546,6 +1539,13 @@ ### CVE-2024-27697 - [SanjinDedic/FuguHub-8.4-Authenticated-RCE-CVE-2024-27697](https://github.com/SanjinDedic/FuguHub-8.4-Authenticated-RCE-CVE-2024-27697) +### CVE-2024-27804 (2024-05-13) + +The issue was addressed with improved memory handling. This issue is fixed in iOS 17.5 and iPadOS 17.5, tvOS 17.5, watchOS 10.5, macOS Sonoma 14.5. An app may be able to execute arbitrary code with kernel privileges. + + +- [R00tkitSMM/CVE-2024-27804](https://github.com/R00tkitSMM/CVE-2024-27804) + ### CVE-2024-27956 (2024-03-21) Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ValvePress Automatic allows SQL Injection.This issue affects Automatic: from n/a through 3.92.0.\n\n @@ -1557,6 +1557,7 @@ - [FoxyProxys/CVE-2024-27956](https://github.com/FoxyProxys/CVE-2024-27956) - [k3ppf0r/CVE-2024-27956](https://github.com/k3ppf0r/CVE-2024-27956) - [nancyariah4/CVE-2024-27956](https://github.com/nancyariah4/CVE-2024-27956) +- [AiGptCode/WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956](https://github.com/AiGptCode/WordPress-Auto-Admin-Account-and-Reverse-Shell-cve-2024-27956) ### CVE-2024-27971 - [truonghuuphuc/CVE-2024-27971-Note](https://github.com/truonghuuphuc/CVE-2024-27971-Note) @@ -2485,13 +2486,6 @@ - [pashayogi/CVE-2023-2744](https://github.com/pashayogi/CVE-2023-2744) -### CVE-2023-2752 (2023-05-17) - -Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.0-beta. - - -- [Cappricio-Securities/CVE-2023-2752](https://github.com/Cappricio-Securities/CVE-2023-2752) - ### CVE-2023-2822 (2023-05-20) Es wurde eine problematische Schwachstelle in Ellucian Ethos Identity bis 5.10.5 ausgemacht. Hiervon betroffen ist ein unbekannter Codeblock der Datei /cas/logout. Durch Manipulation des Arguments url mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung. Ein Aktualisieren auf die Version 5.10.6 vermag dieses Problem zu lösen. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen. @@ -4232,7 +4226,11 @@ ### CVE-2023-24100 - [badboycxcc/CVE-2023-24100](https://github.com/badboycxcc/CVE-2023-24100) -### CVE-2023-24203 +### CVE-2023-24203 (-) + +Cross Site Scripting vulnerability in SourceCodester Simple Customer Relationship Management System v1.0 allows attacker to execute arbitary code via the company or query parameter(s). + + - [momo1239/CVE-2023-24203-and-CVE-2023-24204](https://github.com/momo1239/CVE-2023-24203-and-CVE-2023-24204) ### CVE-2023-24317 (2023-02-23) @@ -4731,6 +4729,7 @@ - [CN016/Apache-Superset-SECRET_KEY-CVE-2023-27524-](https://github.com/CN016/Apache-Superset-SECRET_KEY-CVE-2023-27524-) - [NguyenCongHaiNam/Research-CVE-2023-27524](https://github.com/NguyenCongHaiNam/Research-CVE-2023-27524) - [karthi-the-hacker/CVE-2023-27524](https://github.com/karthi-the-hacker/CVE-2023-27524) +- [Cappricio-Securities/CVE-2023-27524](https://github.com/Cappricio-Securities/CVE-2023-27524) ### CVE-2023-27532 (2023-03-10) @@ -17062,6 +17061,7 @@ - [DDayLuong/CVE-2021-3156](https://github.com/DDayLuong/CVE-2021-3156) - [wurwur/CVE-2021-3156](https://github.com/wurwur/CVE-2021-3156) - [SamTruss/LMU-CVE-2021-3156](https://github.com/SamTruss/LMU-CVE-2021-3156) +- [lypd0/CVE-2021-3156-checker](https://github.com/lypd0/CVE-2021-3156-checker) ### CVE-2021-3157 - [CrackerCat/cve-2021-3157](https://github.com/CrackerCat/cve-2021-3157) @@ -27578,6 +27578,13 @@ - [pazhanivel07/openjpeg-2.3.0_CVE-2020-27824](https://github.com/pazhanivel07/openjpeg-2.3.0_CVE-2020-27824) +### CVE-2020-27838 (2021-03-08) + +A flaw was found in keycloak in versions prior to 13.0.0. The client registration endpoint allows fetching information about PUBLIC clients (like client secret) without authentication which could be an issue if the same PUBLIC client changed to CONFIDENTIAL later. The highest threat from this vulnerability is to data confidentiality. + + +- [Cappricio-Securities/CVE-2020-27838](https://github.com/Cappricio-Securities/CVE-2020-27838) + ### CVE-2020-27904 (2020-12-08) A logic issue existed resulting in memory corruption. This was addressed with improved state management. This issue is fixed in macOS Big Sur 11.0.1. An application may be able to execute arbitrary code with kernel privileges.