From 1dcb9d92a4763b653cc0485e011b4a7378a635a1 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Fri, 13 Dec 2024 21:33:10 +0900 Subject: [PATCH] Auto Update 2024/12/13 12:33:10 --- 2014/CVE-2014-0282.json | 8 ++++---- 2017/CVE-2017-12617.json | 31 +++++++++++++++++++++++++++++++ 2019/CVE-2019-18634.json | 4 ++-- 2019/CVE-2019-5736.json | 8 ++++---- 2021/CVE-2021-1732.json | 8 ++++---- 2021/CVE-2021-22005.json | 8 ++++---- 2021/CVE-2021-3129.json | 8 ++++---- 2021/CVE-2021-3156.json | 8 ++++---- 2021/CVE-2021-4034.json | 8 ++++---- 2021/CVE-2021-44168.json | 8 ++++---- 2021/CVE-2021-44228.json | 8 ++++---- 2022/CVE-2022-26134.json | 8 ++++---- 2022/CVE-2022-27646.json | 4 ++-- 2022/CVE-2022-44268.json | 8 ++++---- 2023/CVE-2023-21839.json | 8 ++++---- 2023/CVE-2023-27997.json | 8 ++++---- 2023/CVE-2023-40028.json | 31 +++++++++++++++++++++++++++++++ 2024/CVE-2024-10124.json | 33 +++++++++++++++++++++++++++++++++ 2024/CVE-2024-10220.json | 31 +++++++++++++++++++++++++++++++ 2024/CVE-2024-11477.json | 8 ++++---- 2024/CVE-2024-24919.json | 2 +- 2024/CVE-2024-28995.json | 8 ++++---- 2024/CVE-2024-3094.json | 8 ++++---- 2024/CVE-2024-32002.json | 8 ++++---- 2024/CVE-2024-36991.json | 4 ++-- 2024/CVE-2024-40711.json | 8 ++++---- 2024/CVE-2024-42327.json | 12 ++++++------ 2024/CVE-2024-43044.json | 8 ++++---- 2024/CVE-2024-44541.json | 4 ++-- 2024/CVE-2024-46538.json | 4 ++-- 2024/CVE-2024-48336.json | 8 ++++---- 2024/CVE-2024-48990.json | 4 ++-- 2024/CVE-2024-50623.json | 8 ++++---- 2024/CVE-2024-51378.json | 4 ++-- 2024/CVE-2024-53677.json | 8 ++++---- 2024/CVE-2024-55875.json | 4 ++-- 2024/CVE-2024-5932.json | 4 ++-- README.md | 10 ++++++++++ 38 files changed, 249 insertions(+), 113 deletions(-) create mode 100644 2024/CVE-2024-10124.json diff --git a/2014/CVE-2014-0282.json b/2014/CVE-2014-0282.json index b21b6fa37e..5d632ab82b 100644 --- a/2014/CVE-2014-0282.json +++ b/2014/CVE-2014-0282.json @@ -14,10 +14,10 @@ "description": "PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282", "fork": false, "created_at": "2021-05-17T04:39:32Z", - "updated_at": "2024-10-07T18:03:33Z", + "updated_at": "2024-12-13T10:41:40Z", "pushed_at": "2024-05-27T02:44:38Z", - "stargazers_count": 45, - "watchers_count": 45, + "stargazers_count": 46, + "watchers_count": 46, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -42,7 +42,7 @@ ], "visibility": "public", "forks": 14, - "watchers": 45, + "watchers": 46, "score": 0, "subscribers_count": 4 } diff --git a/2017/CVE-2017-12617.json b/2017/CVE-2017-12617.json index 9303209ad4..2da5d211b4 100644 --- a/2017/CVE-2017-12617.json +++ b/2017/CVE-2017-12617.json @@ -314,5 +314,36 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 902838403, + "name": "CVE-2017-12617", + "full_name": "DevaDJ\/CVE-2017-12617", + "owner": { + "login": "DevaDJ", + "id": 56772318, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56772318?v=4", + "html_url": "https:\/\/github.com\/DevaDJ", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/DevaDJ\/CVE-2017-12617", + "description": "Improved version of PikaChu CVE", + "fork": false, + "created_at": "2024-12-13T11:22:38Z", + "updated_at": "2024-12-13T11:31:35Z", + "pushed_at": "2024-12-13T11:31:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2019/CVE-2019-18634.json b/2019/CVE-2019-18634.json index 9fa1c668dc..2b3907e719 100644 --- a/2019/CVE-2019-18634.json +++ b/2019/CVE-2019-18634.json @@ -324,8 +324,8 @@ "description": "This repo contains both the exploit and the explaination of how this vulnerability is exploited", "fork": false, "created_at": "2024-12-11T13:33:42Z", - "updated_at": "2024-12-12T20:40:34Z", - "pushed_at": "2024-12-12T20:40:30Z", + "updated_at": "2024-12-13T08:29:49Z", + "pushed_at": "2024-12-13T08:29:46Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2019/CVE-2019-5736.json b/2019/CVE-2019-5736.json index 2b05e60fd1..f79dd5ad32 100644 --- a/2019/CVE-2019-5736.json +++ b/2019/CVE-2019-5736.json @@ -45,10 +45,10 @@ "description": "PoC for CVE-2019-5736", "fork": false, "created_at": "2019-02-13T05:26:32Z", - "updated_at": "2024-12-10T10:06:00Z", + "updated_at": "2024-12-13T08:33:01Z", "pushed_at": "2022-01-05T04:09:42Z", - "stargazers_count": 641, - "watchers_count": 641, + "stargazers_count": 642, + "watchers_count": 642, "has_discussions": false, "forks_count": 163, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 163, - "watchers": 641, + "watchers": 642, "score": 0, "subscribers_count": 13 }, diff --git a/2021/CVE-2021-1732.json b/2021/CVE-2021-1732.json index 967223a627..092e4f217a 100644 --- a/2021/CVE-2021-1732.json +++ b/2021/CVE-2021-1732.json @@ -169,10 +169,10 @@ "description": "Read my blog for more info - ", "fork": false, "created_at": "2021-04-25T12:55:15Z", - "updated_at": "2024-08-21T03:39:34Z", + "updated_at": "2024-12-13T08:08:44Z", "pushed_at": "2021-04-27T21:13:18Z", - "stargazers_count": 32, - "watchers_count": 32, + "stargazers_count": 33, + "watchers_count": 33, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -181,7 +181,7 @@ "topics": [], "visibility": "public", "forks": 16, - "watchers": 32, + "watchers": 33, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-22005.json b/2021/CVE-2021-22005.json index 859722db1d..df486d3eb4 100644 --- a/2021/CVE-2021-22005.json +++ b/2021/CVE-2021-22005.json @@ -262,10 +262,10 @@ "description": "VMware vCenter Server任意文件上传漏洞 \/ Code By:Jun_sheng", "fork": false, "created_at": "2021-10-27T08:36:21Z", - "updated_at": "2024-10-28T02:18:43Z", + "updated_at": "2024-12-13T12:10:18Z", "pushed_at": "2022-07-08T09:17:14Z", - "stargazers_count": 19, - "watchers_count": 19, + "stargazers_count": 20, + "watchers_count": 20, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -274,7 +274,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 19, + "watchers": 20, "score": 0, "subscribers_count": 1 }, diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index ef135e8460..c6c490c459 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -204,10 +204,10 @@ "description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)", "fork": false, "created_at": "2021-02-18T05:42:13Z", - "updated_at": "2024-12-08T07:44:09Z", + "updated_at": "2024-12-13T08:25:21Z", "pushed_at": "2021-12-14T05:12:17Z", - "stargazers_count": 148, - "watchers_count": 148, + "stargazers_count": 149, + "watchers_count": 149, "has_discussions": false, "forks_count": 58, "allow_forking": true, @@ -216,7 +216,7 @@ "topics": [], "visibility": "public", "forks": 58, - "watchers": 148, + "watchers": 149, "score": 0, "subscribers_count": 1 }, diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index 1c45042e43..8d325dca03 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -1265,10 +1265,10 @@ "description": "CVE-2021-3156 - Sudo Baron Samedit", "fork": false, "created_at": "2021-04-29T06:29:26Z", - "updated_at": "2024-12-05T20:01:29Z", + "updated_at": "2024-12-13T08:10:23Z", "pushed_at": "2022-02-12T19:33:07Z", - "stargazers_count": 221, - "watchers_count": 221, + "stargazers_count": 222, + "watchers_count": 222, "has_discussions": false, "forks_count": 35, "allow_forking": true, @@ -1277,7 +1277,7 @@ "topics": [], "visibility": "public", "forks": 35, - "watchers": 221, + "watchers": 222, "score": 0, "subscribers_count": 8 }, diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index 51214af083..581cf86746 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -967,10 +967,10 @@ "description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation", "fork": false, "created_at": "2022-01-26T14:26:10Z", - "updated_at": "2024-12-09T15:53:46Z", + "updated_at": "2024-12-13T11:37:03Z", "pushed_at": "2022-06-21T14:52:05Z", - "stargazers_count": 1089, - "watchers_count": 1089, + "stargazers_count": 1090, + "watchers_count": 1090, "has_discussions": false, "forks_count": 190, "allow_forking": true, @@ -981,7 +981,7 @@ ], "visibility": "public", "forks": 190, - "watchers": 1089, + "watchers": 1090, "score": 0, "subscribers_count": 13 }, diff --git a/2021/CVE-2021-44168.json b/2021/CVE-2021-44168.json index fab34e54da..5f7738582d 100644 --- a/2021/CVE-2021-44168.json +++ b/2021/CVE-2021-44168.json @@ -14,10 +14,10 @@ "description": "A download of code without integrity check vulnerability in the \"execute restore src-vis\" command of FortiOS before 7.0.3.", "fork": false, "created_at": "2023-02-08T07:30:52Z", - "updated_at": "2024-11-14T23:09:52Z", + "updated_at": "2024-12-13T11:14:49Z", "pushed_at": "2023-10-18T17:15:55Z", - "stargazers_count": 18, - "watchers_count": 18, + "stargazers_count": 19, + "watchers_count": 19, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 18, + "watchers": 19, "score": 0, "subscribers_count": 1 } diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 8ce998af43..d97efdf970 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -7201,10 +7201,10 @@ "description": "Small example repo for looking into log4j CVE-2021-44228", "fork": false, "created_at": "2021-12-15T19:59:38Z", - "updated_at": "2024-09-24T16:59:09Z", + "updated_at": "2024-12-13T08:10:30Z", "pushed_at": "2021-12-24T15:44:53Z", - "stargazers_count": 67, - "watchers_count": 67, + "stargazers_count": 68, + "watchers_count": 68, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -7213,7 +7213,7 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 67, + "watchers": 68, "score": 0, "subscribers_count": 2 }, diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index 94dfd09ffc..3319dc90d2 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -14,10 +14,10 @@ "description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。", "fork": false, "created_at": "2022-05-31T07:44:01Z", - "updated_at": "2024-12-12T17:05:24Z", + "updated_at": "2024-12-13T06:37:28Z", "pushed_at": "2023-02-26T14:06:05Z", - "stargazers_count": 1172, - "watchers_count": 1172, + "stargazers_count": 1171, + "watchers_count": 1171, "has_discussions": true, "forks_count": 190, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 190, - "watchers": 1172, + "watchers": 1171, "score": 0, "subscribers_count": 19 }, diff --git a/2022/CVE-2022-27646.json b/2022/CVE-2022-27646.json index 4268b3f8db..234228f556 100644 --- a/2022/CVE-2022-27646.json +++ b/2022/CVE-2022-27646.json @@ -14,8 +14,8 @@ "description": "Demonstrate some functionalities of Morion by generating an exploit for CVE-2022-27646 (stack buffer overflow on Netgear R6700v3 routers).", "fork": false, "created_at": "2023-06-01T05:10:56Z", - "updated_at": "2024-10-28T07:04:26Z", - "pushed_at": "2024-10-28T07:04:22Z", + "updated_at": "2024-12-13T08:49:45Z", + "pushed_at": "2024-12-13T08:49:41Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, diff --git a/2022/CVE-2022-44268.json b/2022/CVE-2022-44268.json index 5cf0cf19ff..403dc0ecd5 100644 --- a/2022/CVE-2022-44268.json +++ b/2022/CVE-2022-44268.json @@ -203,10 +203,10 @@ "description": "A PoC for the CVE-2022-44268 - ImageMagick arbitrary file read", "fork": false, "created_at": "2023-02-05T18:42:27Z", - "updated_at": "2024-12-08T11:46:06Z", + "updated_at": "2024-12-13T12:14:00Z", "pushed_at": "2023-02-05T19:35:03Z", - "stargazers_count": 215, - "watchers_count": 215, + "stargazers_count": 214, + "watchers_count": 214, "has_discussions": false, "forks_count": 25, "allow_forking": true, @@ -215,7 +215,7 @@ "topics": [], "visibility": "public", "forks": 25, - "watchers": 215, + "watchers": 214, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-21839.json b/2023/CVE-2023-21839.json index 7ec477160c..6d908e67c4 100644 --- a/2023/CVE-2023-21839.json +++ b/2023/CVE-2023-21839.json @@ -45,10 +45,10 @@ "description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)", "fork": false, "created_at": "2023-02-24T13:54:42Z", - "updated_at": "2024-11-28T15:29:10Z", + "updated_at": "2024-12-13T10:50:47Z", "pushed_at": "2023-02-24T13:29:38Z", - "stargazers_count": 57, - "watchers_count": 57, + "stargazers_count": 58, + "watchers_count": 58, "has_discussions": false, "forks_count": 108, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 108, - "watchers": 57, + "watchers": 58, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-27997.json b/2023/CVE-2023-27997.json index 5f1fb278c2..0adda5dd06 100644 --- a/2023/CVE-2023-27997.json +++ b/2023/CVE-2023-27997.json @@ -45,10 +45,10 @@ "description": "Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing", "fork": false, "created_at": "2023-06-16T20:15:36Z", - "updated_at": "2024-12-04T10:43:06Z", + "updated_at": "2024-12-13T06:37:07Z", "pushed_at": "2024-05-08T16:17:07Z", - "stargazers_count": 131, - "watchers_count": 131, + "stargazers_count": 130, + "watchers_count": 130, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 23, - "watchers": 131, + "watchers": 130, "score": 0, "subscribers_count": 3 }, diff --git a/2023/CVE-2023-40028.json b/2023/CVE-2023-40028.json index 551ea94a25..d63fc09531 100644 --- a/2023/CVE-2023-40028.json +++ b/2023/CVE-2023-40028.json @@ -91,5 +91,36 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 902845679, + "name": "CVE-2023-40028", + "full_name": "sudlit\/CVE-2023-40028", + "owner": { + "login": "sudlit", + "id": 18578688, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18578688?v=4", + "html_url": "https:\/\/github.com\/sudlit", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/sudlit\/CVE-2023-40028", + "description": null, + "fork": false, + "created_at": "2024-12-13T11:42:51Z", + "updated_at": "2024-12-13T11:55:14Z", + "pushed_at": "2024-12-13T11:55:10Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-10124.json b/2024/CVE-2024-10124.json new file mode 100644 index 0000000000..a62eae107b --- /dev/null +++ b/2024/CVE-2024-10124.json @@ -0,0 +1,33 @@ +[ + { + "id": 902440180, + "name": "CVE-2024-10124", + "full_name": "RandomRobbieBF\/CVE-2024-10124", + "owner": { + "login": "RandomRobbieBF", + "id": 51722811, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51722811?v=4", + "html_url": "https:\/\/github.com\/RandomRobbieBF", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/RandomRobbieBF\/CVE-2024-10124", + "description": "Vayu Blocks – Gutenberg Blocks for WordPress & WooCommerce <= 1.1.1 - Missing Authorization to Unauthenticated Arbitrary Plugin Installation\/Activation", + "fork": false, + "created_at": "2024-12-12T15:13:30Z", + "updated_at": "2024-12-13T10:33:26Z", + "pushed_at": "2024-12-12T15:14:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-10220.json b/2024/CVE-2024-10220.json index caa2c51b35..4812792fa4 100644 --- a/2024/CVE-2024-10220.json +++ b/2024/CVE-2024-10220.json @@ -91,5 +91,36 @@ "watchers": 3, "score": 0, "subscribers_count": 1 + }, + { + "id": 902781667, + "name": "CVE-2024-10220", + "full_name": "filipzag\/CVE-2024-10220", + "owner": { + "login": "filipzag", + "id": 35038922, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35038922?v=4", + "html_url": "https:\/\/github.com\/filipzag", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/filipzag\/CVE-2024-10220", + "description": null, + "fork": false, + "created_at": "2024-12-13T08:59:23Z", + "updated_at": "2024-12-13T08:59:53Z", + "pushed_at": "2024-12-13T08:59:48Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-11477.json b/2024/CVE-2024-11477.json index e4b8808699..b1d87cedfd 100644 --- a/2024/CVE-2024-11477.json +++ b/2024/CVE-2024-11477.json @@ -14,10 +14,10 @@ "description": "CVE-2024-11477 7Zip Code Execution Writeup and Analysis", "fork": false, "created_at": "2024-11-29T06:13:36Z", - "updated_at": "2024-12-13T04:19:43Z", + "updated_at": "2024-12-13T08:07:54Z", "pushed_at": "2024-12-04T01:01:28Z", - "stargazers_count": 42, - "watchers_count": 42, + "stargazers_count": 43, + "watchers_count": 43, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 42, + "watchers": 43, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-24919.json b/2024/CVE-2024-24919.json index b86fe3158b..e92d35f0f9 100644 --- a/2024/CVE-2024-24919.json +++ b/2024/CVE-2024-24919.json @@ -1160,7 +1160,7 @@ "description": null, "fork": false, "created_at": "2024-06-03T13:30:31Z", - "updated_at": "2024-10-03T05:17:54Z", + "updated_at": "2024-12-13T07:06:39Z", "pushed_at": "2024-07-27T12:46:44Z", "stargazers_count": 6, "watchers_count": 6, diff --git a/2024/CVE-2024-28995.json b/2024/CVE-2024-28995.json index fa7a3e390f..7995b6f8aa 100644 --- a/2024/CVE-2024-28995.json +++ b/2024/CVE-2024-28995.json @@ -231,10 +231,10 @@ "description": "CVE-2024-28955 Exploitation PoC ", "fork": false, "created_at": "2024-07-01T11:49:51Z", - "updated_at": "2024-09-12T08:51:31Z", + "updated_at": "2024-12-13T10:42:54Z", "pushed_at": "2024-07-01T12:53:21Z", - "stargazers_count": 34, - "watchers_count": 34, + "stargazers_count": 35, + "watchers_count": 35, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -252,7 +252,7 @@ ], "visibility": "public", "forks": 5, - "watchers": 34, + "watchers": 35, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json index 49c403fd3c..113e6d06de 100644 --- a/2024/CVE-2024-3094.json +++ b/2024/CVE-2024-3094.json @@ -952,10 +952,10 @@ "description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)", "fork": false, "created_at": "2024-04-01T14:28:09Z", - "updated_at": "2024-12-11T16:22:09Z", + "updated_at": "2024-12-13T12:09:59Z", "pushed_at": "2024-04-03T04:58:50Z", - "stargazers_count": 3500, - "watchers_count": 3500, + "stargazers_count": 3499, + "watchers_count": 3499, "has_discussions": false, "forks_count": 240, "allow_forking": true, @@ -964,7 +964,7 @@ "topics": [], "visibility": "public", "forks": 240, - "watchers": 3500, + "watchers": 3499, "score": 0, "subscribers_count": 38 }, diff --git a/2024/CVE-2024-32002.json b/2024/CVE-2024-32002.json index 4272c06a7c..7b46ac0e60 100644 --- a/2024/CVE-2024-32002.json +++ b/2024/CVE-2024-32002.json @@ -76,10 +76,10 @@ "description": "Exploit PoC for CVE-2024-32002", "fork": false, "created_at": "2024-05-17T19:33:08Z", - "updated_at": "2024-12-12T16:39:07Z", + "updated_at": "2024-12-13T10:10:23Z", "pushed_at": "2024-05-19T07:12:00Z", - "stargazers_count": 517, - "watchers_count": 517, + "stargazers_count": 518, + "watchers_count": 518, "has_discussions": false, "forks_count": 145, "allow_forking": true, @@ -93,7 +93,7 @@ ], "visibility": "public", "forks": 145, - "watchers": 517, + "watchers": 518, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-36991.json b/2024/CVE-2024-36991.json index 210d9f1288..5a3c272f83 100644 --- a/2024/CVE-2024-36991.json +++ b/2024/CVE-2024-36991.json @@ -19,13 +19,13 @@ "stargazers_count": 113, "watchers_count": 113, "has_discussions": false, - "forks_count": 20, + "forks_count": 21, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 20, + "forks": 21, "watchers": 113, "score": 0, "subscribers_count": 2 diff --git a/2024/CVE-2024-40711.json b/2024/CVE-2024-40711.json index 0c09ee3067..a8d2bd0260 100644 --- a/2024/CVE-2024-40711.json +++ b/2024/CVE-2024-40711.json @@ -45,10 +45,10 @@ "description": "CVE-2024-40711-exp", "fork": false, "created_at": "2024-10-16T05:02:27Z", - "updated_at": "2024-12-13T02:57:02Z", + "updated_at": "2024-12-13T08:34:45Z", "pushed_at": "2024-10-17T01:06:42Z", - "stargazers_count": 34, - "watchers_count": 34, + "stargazers_count": 35, + "watchers_count": 35, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 34, + "watchers": 35, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-42327.json b/2024/CVE-2024-42327.json index ac1bed42c1..336451b779 100644 --- a/2024/CVE-2024-42327.json +++ b/2024/CVE-2024-42327.json @@ -14,10 +14,10 @@ "description": "cve-2024-42327 ZBX-25623", "fork": false, "created_at": "2024-12-01T00:15:27Z", - "updated_at": "2024-12-10T22:15:23Z", + "updated_at": "2024-12-13T06:43:33Z", "pushed_at": "2024-12-01T01:18:36Z", - "stargazers_count": 25, - "watchers_count": 25, + "stargazers_count": 26, + "watchers_count": 26, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 12, - "watchers": 25, + "watchers": 26, "score": 0, "subscribers_count": 1 }, @@ -50,13 +50,13 @@ "stargazers_count": 16, "watchers_count": 16, "has_discussions": false, - "forks_count": 3, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 3, + "forks": 5, "watchers": 16, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-43044.json b/2024/CVE-2024-43044.json index 04ad5cf5b6..717d9262b0 100644 --- a/2024/CVE-2024-43044.json +++ b/2024/CVE-2024-43044.json @@ -14,10 +14,10 @@ "description": "The script checks Jenkins endpoints for CVE-2024-43044 by retrieving the Jenkins version from the innstance and comparing it against known vulnerable version ranges.", "fork": false, "created_at": "2024-08-08T08:28:26Z", - "updated_at": "2024-12-09T08:34:29Z", + "updated_at": "2024-12-13T07:00:44Z", "pushed_at": "2024-08-08T09:32:00Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 6, - "watchers": 12, + "watchers": 13, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-44541.json b/2024/CVE-2024-44541.json index ee60395936..7fbe463e4c 100644 --- a/2024/CVE-2024-44541.json +++ b/2024/CVE-2024-44541.json @@ -14,8 +14,8 @@ "description": "This repository details a SQL Injection vulnerability in Inventio Lite v4's, including exploitation steps and a Python script to automate the attack. It provides information on the vulnerable code, recommended fixes, and how to extract and decrypt administrative credentials.", "fork": false, "created_at": "2024-08-07T08:45:43Z", - "updated_at": "2024-09-12T06:46:16Z", - "pushed_at": "2024-09-12T06:46:12Z", + "updated_at": "2024-12-13T12:02:08Z", + "pushed_at": "2024-12-13T12:02:04Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-46538.json b/2024/CVE-2024-46538.json index 8c9550cc8d..5c9ffa7bfa 100644 --- a/2024/CVE-2024-46538.json +++ b/2024/CVE-2024-46538.json @@ -60,13 +60,13 @@ "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 3, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-48336.json b/2024/CVE-2024-48336.json index d3fbbd8845..66a33b3892 100644 --- a/2024/CVE-2024-48336.json +++ b/2024/CVE-2024-48336.json @@ -14,10 +14,10 @@ "description": "Exploit and writeup for installed app to root privilege escalation through CVE-2024-48336 (Magisk Bug #8279), Privileges Escalation \/ Arbitrary Code Execution Vulnerability", "fork": false, "created_at": "2024-08-24T08:51:08Z", - "updated_at": "2024-12-11T14:35:20Z", + "updated_at": "2024-12-13T09:37:44Z", "pushed_at": "2024-11-05T02:57:25Z", - "stargazers_count": 178, - "watchers_count": 178, + "stargazers_count": 179, + "watchers_count": 179, "has_discussions": false, "forks_count": 30, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 30, - "watchers": 178, + "watchers": 179, "score": 0, "subscribers_count": 8 } diff --git a/2024/CVE-2024-48990.json b/2024/CVE-2024-48990.json index db4858180a..a54a11afec 100644 --- a/2024/CVE-2024-48990.json +++ b/2024/CVE-2024-48990.json @@ -19,13 +19,13 @@ "stargazers_count": 90, "watchers_count": 90, "has_discussions": false, - "forks_count": 16, + "forks_count": 17, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 16, + "forks": 17, "watchers": 90, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-50623.json b/2024/CVE-2024-50623.json index fe1d8529c4..a63c9cd75a 100644 --- a/2024/CVE-2024-50623.json +++ b/2024/CVE-2024-50623.json @@ -14,10 +14,10 @@ "description": "Cleo Unrestricted file upload and download PoC (CVE-2024-50623)", "fork": false, "created_at": "2024-12-11T14:19:55Z", - "updated_at": "2024-12-13T04:51:20Z", + "updated_at": "2024-12-13T08:33:10Z", "pushed_at": "2024-12-11T14:23:19Z", - "stargazers_count": 14, - "watchers_count": 14, + "stargazers_count": 15, + "watchers_count": 15, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 14, + "watchers": 15, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-51378.json b/2024/CVE-2024-51378.json index e65067d9c8..3babcf9942 100644 --- a/2024/CVE-2024-51378.json +++ b/2024/CVE-2024-51378.json @@ -19,13 +19,13 @@ "stargazers_count": 17, "watchers_count": 17, "has_discussions": false, - "forks_count": 4, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 4, + "forks": 5, "watchers": 17, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-53677.json b/2024/CVE-2024-53677.json index a673047f25..33209fb053 100644 --- a/2024/CVE-2024-53677.json +++ b/2024/CVE-2024-53677.json @@ -14,10 +14,10 @@ "description": "s2-067(CVE-2024-53677)", "fork": false, "created_at": "2024-12-12T08:30:14Z", - "updated_at": "2024-12-13T04:39:09Z", + "updated_at": "2024-12-13T09:18:45Z", "pushed_at": "2024-12-12T08:33:19Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 2 } diff --git a/2024/CVE-2024-55875.json b/2024/CVE-2024-55875.json index 8fd76cd755..43d6541853 100644 --- a/2024/CVE-2024-55875.json +++ b/2024/CVE-2024-55875.json @@ -14,8 +14,8 @@ "description": "CVE-2024-55875 | GHSA-7mj5-hjjj-8rgw | http4k first CVE", "fork": false, "created_at": "2024-12-13T06:21:36Z", - "updated_at": "2024-12-13T06:22:39Z", - "pushed_at": "2024-12-13T06:22:08Z", + "updated_at": "2024-12-13T07:28:37Z", + "pushed_at": "2024-12-13T07:28:34Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-5932.json b/2024/CVE-2024-5932.json index 713cd081d1..9650c64e9c 100644 --- a/2024/CVE-2024-5932.json +++ b/2024/CVE-2024-5932.json @@ -14,8 +14,8 @@ "description": "Proof-of-Concept for CVE-2024-5932 GiveWP PHP Object Injection ", "fork": false, "created_at": "2024-08-21T09:51:21Z", - "updated_at": "2024-12-11T23:50:45Z", - "pushed_at": "2024-08-22T15:20:46Z", + "updated_at": "2024-12-13T10:58:23Z", + "pushed_at": "2024-12-13T10:58:19Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, diff --git a/README.md b/README.md index 9ce9b2d7d2..52ea38703c 100644 --- a/README.md +++ b/README.md @@ -1986,6 +1986,13 @@ - [windz3r0day/CVE-2024-10015](https://github.com/windz3r0day/CVE-2024-10015) +### CVE-2024-10124 (2024-12-12) + +The Vayu Blocks – Gutenberg Blocks for WordPress & WooCommerce plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation and activation due to a missing capability check on the tp_install() function in all versions up to, and including, 1.1.1. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated. This vulnerability was partially patched in version 1.1.1. + + +- [RandomRobbieBF/CVE-2024-10124](https://github.com/RandomRobbieBF/CVE-2024-10124) + ### CVE-2024-10140 (2024-10-19) Eine kritische Schwachstelle wurde in code-projects Pharmacy Management System 1.0 entdeckt. Betroffen davon ist ein unbekannter Prozess der Datei /manage_supplier.php. Durch Beeinflussen des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung. @@ -2001,6 +2008,7 @@ - [mochizuki875/CVE-2024-10220-githooks](https://github.com/mochizuki875/CVE-2024-10220-githooks) - [any2sec/cve-2024-10220](https://github.com/any2sec/cve-2024-10220) - [XiaomingX/cve-2024-10220-githooks](https://github.com/XiaomingX/cve-2024-10220-githooks) +- [filipzag/CVE-2024-10220](https://github.com/filipzag/CVE-2024-10220) ### CVE-2024-10245 (2024-11-12) @@ -13263,6 +13271,7 @@ - [0xyassine/CVE-2023-40028](https://github.com/0xyassine/CVE-2023-40028) - [BBSynapse/CVE-2023-40028](https://github.com/BBSynapse/CVE-2023-40028) - [0xDTC/Ghost-5.58-Arbitrary-File-Read-CVE-2023-40028](https://github.com/0xDTC/Ghost-5.58-Arbitrary-File-Read-CVE-2023-40028) +- [sudlit/CVE-2023-40028](https://github.com/sudlit/CVE-2023-40028) ### CVE-2023-40031 (2023-08-25) @@ -43958,6 +43967,7 @@ - [K3ysTr0K3R/CVE-2017-12617-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2017-12617-EXPLOIT) - [scirusvulgaris/CVE-2017-12617](https://github.com/scirusvulgaris/CVE-2017-12617) - [yZ1337/CVE-2017-12617](https://github.com/yZ1337/CVE-2017-12617) +- [DevaDJ/CVE-2017-12617](https://github.com/DevaDJ/CVE-2017-12617) ### CVE-2017-12624 (2017-11-14)