From 1ee5d2aae2c223ac5f5af34a15dd579dc5c44356 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Sun, 12 Jan 2025 21:31:56 +0900 Subject: [PATCH] Auto Update 2025/01/12 12:31:56 --- 2014/CVE-2014-3566.json | 2 +- 2016/CVE-2016-5195.json | 8 ++++---- 2017/CVE-2017-7269.json | 8 ++++---- 2019/CVE-2019-5602.json | 33 +++++++++++++++++++++++++++++++++ 2020/CVE-2020-0796.json | 8 ++++---- 2020/CVE-2020-13519.json | 8 ++++---- 2021/CVE-2021-21551.json | 31 +++++++++++++++++++++++++++++++ 2021/CVE-2021-28663.json | 4 ++-- 2021/CVE-2021-31166.json | 8 ++++---- 2021/CVE-2021-40444.json | 8 ++++---- 2021/CVE-2021-42278.json | 8 ++++---- 2021/CVE-2021-44228.json | 24 ++++++++++++------------ 2021/CVE-2021-46068.json | 31 ------------------------------- 2022/CVE-2022-0847.json | 20 ++++++++++---------- 2022/CVE-2022-26134.json | 8 ++++---- 2022/CVE-2022-38181.json | 4 ++-- 2023/CVE-2023-21537.json | 2 +- 2023/CVE-2023-22960.json | 8 ++++---- 2023/CVE-2023-32784.json | 2 +- 2023/CVE-2023-45866.json | 4 ++-- 2024/CVE-2024-0044.json | 4 ++-- 2024/CVE-2024-1071.json | 8 ++++---- 2024/CVE-2024-10924.json | 8 ++++---- 2024/CVE-2024-12558.json | 2 +- 2024/CVE-2024-12856.json | 2 +- 2024/CVE-2024-21338.json | 8 ++++---- 2024/CVE-2024-23334.json | 8 ++++---- 2024/CVE-2024-30088.json | 8 ++++---- 2024/CVE-2024-32002.json | 4 ++-- 2024/CVE-2024-34102.json | 4 ++-- 2024/CVE-2024-35250.json | 8 ++++---- 2024/CVE-2024-37084.json | 8 ++++---- 2024/CVE-2024-40662.json | 6 +++--- 2024/CVE-2024-41713.json | 2 +- 2024/CVE-2024-45337.json | 8 ++++---- 2024/CVE-2024-46538.json | 4 ++-- 2024/CVE-2024-47176.json | 8 ++++---- 2024/CVE-2024-49328.json | 2 +- 2024/CVE-2024-53677.json | 8 ++++---- 2024/CVE-2024-55503.json | 2 +- 2024/CVE-2024-5932.json | 4 ++-- 2024/CVE-2024-9014.json | 4 ++-- 2024/CVE-2024-9932.json | 2 +- 2025/CVE-2025-0282.json | 39 +++++++++++++++++++++++++++++++++++---- README.md | 10 +++++++++- 45 files changed, 236 insertions(+), 164 deletions(-) create mode 100644 2019/CVE-2019-5602.json diff --git a/2014/CVE-2014-3566.json b/2014/CVE-2014-3566.json index 6220659a46..abd4ddb07b 100644 --- a/2014/CVE-2014-3566.json +++ b/2014/CVE-2014-3566.json @@ -182,7 +182,7 @@ "fork": false, "created_at": "2024-11-14T04:35:59Z", "updated_at": "2025-01-05T15:26:10Z", - "pushed_at": "2025-01-09T02:25:56Z", + "pushed_at": "2025-01-12T11:49:08Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json index aff2676a55..891227490e 100644 --- a/2016/CVE-2016-5195.json +++ b/2016/CVE-2016-5195.json @@ -1183,10 +1183,10 @@ "description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”", "fork": false, "created_at": "2022-03-07T18:36:50Z", - "updated_at": "2024-12-31T15:47:51Z", + "updated_at": "2025-01-12T10:37:41Z", "pushed_at": "2023-02-02T02:17:30Z", - "stargazers_count": 277, - "watchers_count": 277, + "stargazers_count": 278, + "watchers_count": 278, "has_discussions": false, "forks_count": 77, "allow_forking": true, @@ -1195,7 +1195,7 @@ "topics": [], "visibility": "public", "forks": 77, - "watchers": 277, + "watchers": 278, "score": 0, "subscribers_count": 4 }, diff --git a/2017/CVE-2017-7269.json b/2017/CVE-2017-7269.json index cf74fe45ce..3f63a72435 100644 --- a/2017/CVE-2017-7269.json +++ b/2017/CVE-2017-7269.json @@ -615,10 +615,10 @@ "description": "is a PoC tool demonstrating an exploit for a known vulnerability in the WebDAV component of IIS6", "fork": false, "created_at": "2024-10-06T17:33:11Z", - "updated_at": "2024-10-21T08:15:02Z", + "updated_at": "2025-01-12T11:49:52Z", "pushed_at": "2024-10-07T17:34:02Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -627,7 +627,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 }, diff --git a/2019/CVE-2019-5602.json b/2019/CVE-2019-5602.json new file mode 100644 index 0000000000..04d8de7179 --- /dev/null +++ b/2019/CVE-2019-5602.json @@ -0,0 +1,33 @@ +[ + { + "id": 915577425, + "name": "CVE-2019-5602-poc", + "full_name": "test-one9\/CVE-2019-5602-poc", + "owner": { + "login": "test-one9", + "id": 175934231, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/175934231?v=4", + "html_url": "https:\/\/github.com\/test-one9", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/test-one9\/CVE-2019-5602-poc", + "description": "https:\/\/www.freebsd.org\/security\/advisories\/FreeBSD-SA-19:11.cd_ioctl.asc", + "fork": false, + "created_at": "2025-01-12T08:24:58Z", + "updated_at": "2025-01-12T08:26:34Z", + "pushed_at": "2025-01-12T08:26:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 7c42ad1fc5..fd294dae32 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -1039,10 +1039,10 @@ "description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost", "fork": false, "created_at": "2020-03-30T11:42:56Z", - "updated_at": "2025-01-10T17:59:26Z", + "updated_at": "2025-01-12T10:14:06Z", "pushed_at": "2020-12-07T20:04:27Z", - "stargazers_count": 1303, - "watchers_count": 1303, + "stargazers_count": 1304, + "watchers_count": 1304, "has_discussions": false, "forks_count": 343, "allow_forking": true, @@ -1057,7 +1057,7 @@ ], "visibility": "public", "forks": 343, - "watchers": 1303, + "watchers": 1304, "score": 0, "subscribers_count": 34 }, diff --git a/2020/CVE-2020-13519.json b/2020/CVE-2020-13519.json index 9951067bf5..eb45ba50f2 100644 --- a/2020/CVE-2020-13519.json +++ b/2020/CVE-2020-13519.json @@ -14,10 +14,10 @@ "description": "poc for CVE-2020-13519(still under construction). needs refining , testing , tunning...", "fork": false, "created_at": "2024-09-30T06:28:49Z", - "updated_at": "2024-10-02T08:18:10Z", + "updated_at": "2025-01-12T11:13:21Z", "pushed_at": "2024-09-30T06:30:50Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 } diff --git a/2021/CVE-2021-21551.json b/2021/CVE-2021-21551.json index 934bc3c1a9..db3b94d504 100644 --- a/2021/CVE-2021-21551.json +++ b/2021/CVE-2021-21551.json @@ -300,5 +300,36 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 915270847, + "name": "CVE-2021-21551", + "full_name": "IlanDudnik\/CVE-2021-21551", + "owner": { + "login": "IlanDudnik", + "id": 16364955, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16364955?v=4", + "html_url": "https:\/\/github.com\/IlanDudnik", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/IlanDudnik\/CVE-2021-21551", + "description": "Exploit implementation for CVE-2021-21551", + "fork": false, + "created_at": "2025-01-11T12:18:40Z", + "updated_at": "2025-01-12T11:49:34Z", + "pushed_at": "2025-01-12T11:47:59Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-28663.json b/2021/CVE-2021-28663.json index 480bb86a21..a7685c7833 100644 --- a/2021/CVE-2021-28663.json +++ b/2021/CVE-2021-28663.json @@ -19,13 +19,13 @@ "stargazers_count": 115, "watchers_count": 115, "has_discussions": false, - "forks_count": 26, + "forks_count": 28, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 26, + "forks": 28, "watchers": 115, "score": 0, "subscribers_count": 3 diff --git a/2021/CVE-2021-31166.json b/2021/CVE-2021-31166.json index cdb57a4b4b..d1002c3749 100644 --- a/2021/CVE-2021-31166.json +++ b/2021/CVE-2021-31166.json @@ -14,10 +14,10 @@ "description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.", "fork": false, "created_at": "2021-05-16T16:15:56Z", - "updated_at": "2024-12-06T23:49:42Z", + "updated_at": "2025-01-12T06:20:40Z", "pushed_at": "2021-06-12T08:27:09Z", - "stargazers_count": 822, - "watchers_count": 822, + "stargazers_count": 823, + "watchers_count": 823, "has_discussions": false, "forks_count": 139, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 139, - "watchers": 822, + "watchers": 823, "score": 0, "subscribers_count": 23 }, diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index 1964acbae2..65386cd2a0 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -541,10 +541,10 @@ "description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit", "fork": false, "created_at": "2021-09-15T22:34:35Z", - "updated_at": "2025-01-08T00:43:39Z", + "updated_at": "2025-01-12T11:03:30Z", "pushed_at": "2023-10-11T18:44:51Z", - "stargazers_count": 805, - "watchers_count": 805, + "stargazers_count": 806, + "watchers_count": 806, "has_discussions": false, "forks_count": 170, "allow_forking": true, @@ -560,7 +560,7 @@ ], "visibility": "public", "forks": 170, - "watchers": 805, + "watchers": 806, "score": 0, "subscribers_count": 18 }, diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index cc2c7b7134..529c7575b6 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -50,10 +50,10 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-13T10:28:12Z", - "updated_at": "2025-01-11T17:36:36Z", + "updated_at": "2025-01-12T07:43:36Z", "pushed_at": "2023-01-29T03:31:27Z", - "stargazers_count": 822, - "watchers_count": 822, + "stargazers_count": 823, + "watchers_count": 823, "has_discussions": false, "forks_count": 125, "allow_forking": true, @@ -62,7 +62,7 @@ "topics": [], "visibility": "public", "forks": 125, - "watchers": 822, + "watchers": 823, "score": 0, "subscribers_count": 13 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index b503b33f8a..a294d37d96 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -381,10 +381,10 @@ "description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).", "fork": false, "created_at": "2021-12-10T12:38:20Z", - "updated_at": "2025-01-11T13:37:38Z", + "updated_at": "2025-01-12T10:32:11Z", "pushed_at": "2024-04-26T03:16:26Z", - "stargazers_count": 1111, - "watchers_count": 1111, + "stargazers_count": 1112, + "watchers_count": 1112, "has_discussions": false, "forks_count": 535, "allow_forking": true, @@ -395,7 +395,7 @@ ], "visibility": "public", "forks": 535, - "watchers": 1111, + "watchers": 1112, "score": 0, "subscribers_count": 23 }, @@ -935,10 +935,10 @@ "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2021-12-10T23:19:28Z", - "updated_at": "2025-01-10T05:22:28Z", + "updated_at": "2025-01-12T10:31:59Z", "pushed_at": "2024-02-12T22:37:25Z", - "stargazers_count": 1813, - "watchers_count": 1813, + "stargazers_count": 1814, + "watchers_count": 1814, "has_discussions": false, "forks_count": 530, "allow_forking": true, @@ -952,7 +952,7 @@ ], "visibility": "public", "forks": 530, - "watchers": 1813, + "watchers": 1814, "score": 0, "subscribers_count": 26 }, @@ -3749,10 +3749,10 @@ "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ", "fork": false, "created_at": "2021-12-13T03:57:50Z", - "updated_at": "2025-01-09T09:57:56Z", + "updated_at": "2025-01-12T10:31:42Z", "pushed_at": "2022-11-23T18:23:24Z", - "stargazers_count": 3406, - "watchers_count": 3406, + "stargazers_count": 3407, + "watchers_count": 3407, "has_discussions": true, "forks_count": 739, "allow_forking": true, @@ -3761,7 +3761,7 @@ "topics": [], "visibility": "public", "forks": 739, - "watchers": 3406, + "watchers": 3407, "score": 0, "subscribers_count": 55 }, diff --git a/2021/CVE-2021-46068.json b/2021/CVE-2021-46068.json index 282c8aa185..ff78e537e8 100644 --- a/2021/CVE-2021-46068.json +++ b/2021/CVE-2021-46068.json @@ -29,36 +29,5 @@ "watchers": 0, "score": 0, "subscribers_count": 1 - }, - { - "id": 448062357, - "name": "CVE-2021-46068", - "full_name": "plsanu\/CVE-2021-46068", - "owner": { - "login": "plsanu", - "id": 61007700, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4", - "html_url": "https:\/\/github.com\/plsanu", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/plsanu\/CVE-2021-46068", - "description": "CVE-2021-46068 - A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the My Account Section in login panel.", - "fork": false, - "created_at": "2022-01-14T18:04:01Z", - "updated_at": "2023-12-30T08:24:13Z", - "pushed_at": "2022-01-14T19:34:08Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index 87094bc9f7..5ae27a3ce7 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -76,10 +76,10 @@ "description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”", "fork": false, "created_at": "2022-03-07T18:36:50Z", - "updated_at": "2024-12-31T15:47:51Z", + "updated_at": "2025-01-12T10:37:41Z", "pushed_at": "2023-02-02T02:17:30Z", - "stargazers_count": 277, - "watchers_count": 277, + "stargazers_count": 278, + "watchers_count": 278, "has_discussions": false, "forks_count": 77, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 77, - "watchers": 277, + "watchers": 278, "score": 0, "subscribers_count": 4 }, @@ -107,10 +107,10 @@ "description": "A root exploit for CVE-2022-0847 (Dirty Pipe)", "fork": false, "created_at": "2022-03-07T18:55:20Z", - "updated_at": "2025-01-06T05:11:29Z", + "updated_at": "2025-01-12T10:36:38Z", "pushed_at": "2022-03-08T06:20:05Z", - "stargazers_count": 1092, - "watchers_count": 1092, + "stargazers_count": 1093, + "watchers_count": 1093, "has_discussions": false, "forks_count": 220, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 220, - "watchers": 1092, + "watchers": 1093, "score": 0, "subscribers_count": 18 }, @@ -1941,8 +1941,8 @@ "description": null, "fork": false, "created_at": "2022-06-30T13:07:55Z", - "updated_at": "2024-07-01T18:57:06Z", - "pushed_at": "2024-07-01T18:57:03Z", + "updated_at": "2025-01-12T11:29:30Z", + "pushed_at": "2025-01-12T11:29:27Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index 00175b4839..17a73ade6b 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -14,10 +14,10 @@ "description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。", "fork": false, "created_at": "2022-05-31T07:44:01Z", - "updated_at": "2025-01-04T09:08:42Z", + "updated_at": "2025-01-12T11:40:21Z", "pushed_at": "2023-02-26T14:06:05Z", - "stargazers_count": 1173, - "watchers_count": 1173, + "stargazers_count": 1176, + "watchers_count": 1176, "has_discussions": true, "forks_count": 188, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 188, - "watchers": 1173, + "watchers": 1176, "score": 0, "subscribers_count": 19 }, diff --git a/2022/CVE-2022-38181.json b/2022/CVE-2022-38181.json index baacd7a470..fc9e39f958 100644 --- a/2022/CVE-2022-38181.json +++ b/2022/CVE-2022-38181.json @@ -50,13 +50,13 @@ "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 2, "watchers": 2, "score": 0, "subscribers_count": 1 diff --git a/2023/CVE-2023-21537.json b/2023/CVE-2023-21537.json index 71fe861ef0..3cd966bba2 100644 --- a/2023/CVE-2023-21537.json +++ b/2023/CVE-2023-21537.json @@ -14,7 +14,7 @@ "description": null, "fork": false, "created_at": "2025-01-01T08:17:26Z", - "updated_at": "2025-01-11T05:45:53Z", + "updated_at": "2025-01-12T08:34:52Z", "pushed_at": "2025-01-01T08:17:29Z", "stargazers_count": 1, "watchers_count": 1, diff --git a/2023/CVE-2023-22960.json b/2023/CVE-2023-22960.json index c894dc2986..e95dc890c0 100644 --- a/2023/CVE-2023-22960.json +++ b/2023/CVE-2023-22960.json @@ -14,10 +14,10 @@ "description": "This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) of more than 60 Lexmark printer models. This issue affects both username-password and PIN authentication.", "fork": false, "created_at": "2023-01-24T08:33:19Z", - "updated_at": "2024-11-25T12:03:38Z", + "updated_at": "2025-01-12T08:08:37Z", "pushed_at": "2024-07-19T06:36:55Z", - "stargazers_count": 85, - "watchers_count": 85, + "stargazers_count": 86, + "watchers_count": 86, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -33,7 +33,7 @@ ], "visibility": "public", "forks": 16, - "watchers": 85, + "watchers": 86, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-32784.json b/2023/CVE-2023-32784.json index a9af639686..41a49dc468 100644 --- a/2023/CVE-2023-32784.json +++ b/2023/CVE-2023-32784.json @@ -14,7 +14,7 @@ "description": "Original PoC for CVE-2023-32784", "fork": false, "created_at": "2023-05-01T17:08:55Z", - "updated_at": "2025-01-10T09:06:50Z", + "updated_at": "2025-01-12T11:49:13Z", "pushed_at": "2023-08-17T19:26:55Z", "stargazers_count": 632, "watchers_count": 632, diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index 69cf20d412..83f6732b19 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -19,13 +19,13 @@ "stargazers_count": 1380, "watchers_count": 1380, "has_discussions": false, - "forks_count": 237, + "forks_count": 238, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 237, + "forks": 238, "watchers": 1380, "score": 0, "subscribers_count": 21 diff --git a/2024/CVE-2024-0044.json b/2024/CVE-2024-0044.json index 09858ae40f..8107a571b9 100644 --- a/2024/CVE-2024-0044.json +++ b/2024/CVE-2024-0044.json @@ -50,13 +50,13 @@ "stargazers_count": 276, "watchers_count": 276, "has_discussions": false, - "forks_count": 63, + "forks_count": 64, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 63, + "forks": 64, "watchers": 276, "score": 0, "subscribers_count": 7 diff --git a/2024/CVE-2024-1071.json b/2024/CVE-2024-1071.json index 6d9314753e..41e4c77e19 100644 --- a/2024/CVE-2024-1071.json +++ b/2024/CVE-2024-1071.json @@ -138,10 +138,10 @@ "description": "Proof of concept : CVE-2024-1071: WordPress Vulnerability Exploited", "fork": false, "created_at": "2024-08-30T04:23:04Z", - "updated_at": "2024-12-17T20:19:30Z", + "updated_at": "2025-01-12T06:37:01Z", "pushed_at": "2024-08-30T05:10:51Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -150,7 +150,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 12, + "watchers": 13, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-10924.json b/2024/CVE-2024-10924.json index 05e8fc8464..cc7b1a7dec 100644 --- a/2024/CVE-2024-10924.json +++ b/2024/CVE-2024-10924.json @@ -14,10 +14,10 @@ "description": " Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 – 9.1.1.1 – Authentication Bypass", "fork": false, "created_at": "2024-11-14T16:59:52Z", - "updated_at": "2024-12-12T13:40:41Z", + "updated_at": "2025-01-12T12:27:27Z", "pushed_at": "2024-11-14T17:00:59Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-12558.json b/2024/CVE-2024-12558.json index 5bb25cdd0d..c7d7c9cc57 100644 --- a/2024/CVE-2024-12558.json +++ b/2024/CVE-2024-12558.json @@ -59,6 +59,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-12856.json b/2024/CVE-2024-12856.json index 8fe3be0e85..d00031900d 100644 --- a/2024/CVE-2024-12856.json +++ b/2024/CVE-2024-12856.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-21338.json b/2024/CVE-2024-21338.json index 19f5d0871e..3e1f55a5a3 100644 --- a/2024/CVE-2024-21338.json +++ b/2024/CVE-2024-21338.json @@ -169,10 +169,10 @@ "description": "Windows AppLocker Driver (appid.sys) LPE", "fork": false, "created_at": "2024-07-29T13:18:06Z", - "updated_at": "2025-01-07T15:13:48Z", + "updated_at": "2025-01-12T09:27:29Z", "pushed_at": "2024-07-29T13:29:59Z", - "stargazers_count": 46, - "watchers_count": 46, + "stargazers_count": 47, + "watchers_count": 47, "has_discussions": false, "forks_count": 13, "allow_forking": true, @@ -186,7 +186,7 @@ ], "visibility": "public", "forks": 13, - "watchers": 46, + "watchers": 47, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-23334.json b/2024/CVE-2024-23334.json index c4ac1e3ba6..e227940961 100644 --- a/2024/CVE-2024-23334.json +++ b/2024/CVE-2024-23334.json @@ -234,10 +234,10 @@ "description": "Proof-of-Concept for LFI\/Path Traversal vulnerability in Aiohttp =< 3.9.1", "fork": false, "created_at": "2024-10-20T15:28:58Z", - "updated_at": "2024-12-29T20:57:19Z", + "updated_at": "2025-01-12T10:53:19Z", "pushed_at": "2024-10-20T16:48:53Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -246,7 +246,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-30088.json b/2024/CVE-2024-30088.json index f8f496a9d3..56465194f3 100644 --- a/2024/CVE-2024-30088.json +++ b/2024/CVE-2024-30088.json @@ -107,10 +107,10 @@ "description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088", "fork": false, "created_at": "2024-07-15T08:07:05Z", - "updated_at": "2025-01-09T11:58:18Z", + "updated_at": "2025-01-12T12:25:35Z", "pushed_at": "2024-09-08T21:23:34Z", - "stargazers_count": 434, - "watchers_count": 434, + "stargazers_count": 435, + "watchers_count": 435, "has_discussions": false, "forks_count": 31, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 31, - "watchers": 434, + "watchers": 435, "score": 0, "subscribers_count": 21 }, diff --git a/2024/CVE-2024-32002.json b/2024/CVE-2024-32002.json index 3bd8ab01d7..79de4a3b7c 100644 --- a/2024/CVE-2024-32002.json +++ b/2024/CVE-2024-32002.json @@ -1435,8 +1435,8 @@ "description": "git clone rce CVE-2024-32002", "fork": false, "created_at": "2024-07-03T08:01:39Z", - "updated_at": "2024-10-31T20:50:27Z", - "pushed_at": "2024-07-09T01:52:48Z", + "updated_at": "2025-01-12T11:27:41Z", + "pushed_at": "2025-01-12T11:27:38Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, diff --git a/2024/CVE-2024-34102.json b/2024/CVE-2024-34102.json index 0870278ff1..912098625e 100644 --- a/2024/CVE-2024-34102.json +++ b/2024/CVE-2024-34102.json @@ -565,8 +565,8 @@ "description": "PoC for CVE-2024-34102", "fork": false, "created_at": "2024-08-13T07:33:20Z", - "updated_at": "2024-10-04T10:38:23Z", - "pushed_at": "2024-08-13T08:48:46Z", + "updated_at": "2025-01-12T11:26:57Z", + "pushed_at": "2025-01-12T11:26:54Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, diff --git a/2024/CVE-2024-35250.json b/2024/CVE-2024-35250.json index 08db4666b3..d50ddc8a8c 100644 --- a/2024/CVE-2024-35250.json +++ b/2024/CVE-2024-35250.json @@ -14,10 +14,10 @@ "description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver", "fork": false, "created_at": "2024-10-13T19:30:20Z", - "updated_at": "2025-01-12T01:25:05Z", + "updated_at": "2025-01-12T11:55:04Z", "pushed_at": "2024-11-29T16:56:23Z", - "stargazers_count": 262, - "watchers_count": 262, + "stargazers_count": 263, + "watchers_count": 263, "has_discussions": false, "forks_count": 57, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 57, - "watchers": 262, + "watchers": 263, "score": 0, "subscribers_count": 8 }, diff --git a/2024/CVE-2024-37084.json b/2024/CVE-2024-37084.json index a24539dc4a..3dc0694ea5 100644 --- a/2024/CVE-2024-37084.json +++ b/2024/CVE-2024-37084.json @@ -76,10 +76,10 @@ "description": "Spring Cloud Data Flow CVE-2024-37084 exp", "fork": false, "created_at": "2024-10-15T06:55:05Z", - "updated_at": "2024-10-16T02:27:56Z", + "updated_at": "2025-01-12T11:16:15Z", "pushed_at": "2024-10-16T02:27:53Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-40662.json b/2024/CVE-2024-40662.json index d392ed9f46..278e59c527 100644 --- a/2024/CVE-2024-40662.json +++ b/2024/CVE-2024-40662.json @@ -19,15 +19,15 @@ "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 2, "watchers": 1, "score": 0, - "subscribers_count": 1 + "subscribers_count": 2 } ] \ No newline at end of file diff --git a/2024/CVE-2024-41713.json b/2024/CVE-2024-41713.json index 6d5887b848..b204802597 100644 --- a/2024/CVE-2024-41713.json +++ b/2024/CVE-2024-41713.json @@ -121,6 +121,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-45337.json b/2024/CVE-2024-45337.json index e5f000baa2..cced37177c 100644 --- a/2024/CVE-2024-45337.json +++ b/2024/CVE-2024-45337.json @@ -14,10 +14,10 @@ "description": "Proof of concept (POC) for CVE-2024-45337 ", "fork": false, "created_at": "2024-12-17T22:07:53Z", - "updated_at": "2024-12-19T08:35:28Z", + "updated_at": "2025-01-12T12:23:48Z", "pushed_at": "2024-12-17T22:27:03Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -36,7 +36,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-46538.json b/2024/CVE-2024-46538.json index 29d985098b..40bab650ae 100644 --- a/2024/CVE-2024-46538.json +++ b/2024/CVE-2024-46538.json @@ -14,8 +14,8 @@ "description": "Proof-of-Concept for CVE-2024-46538", "fork": false, "created_at": "2024-10-23T10:50:01Z", - "updated_at": "2025-01-12T02:15:53Z", - "pushed_at": "2025-01-10T02:12:42Z", + "updated_at": "2025-01-12T11:25:17Z", + "pushed_at": "2025-01-12T11:25:15Z", "stargazers_count": 48, "watchers_count": 48, "has_discussions": false, diff --git a/2024/CVE-2024-47176.json b/2024/CVE-2024-47176.json index ce6ce14b71..cda36f132e 100644 --- a/2024/CVE-2024-47176.json +++ b/2024/CVE-2024-47176.json @@ -169,10 +169,10 @@ "description": "Ultrafast CUPS-browsed scanner (CVE-2024-47176)", "fork": false, "created_at": "2024-09-29T09:05:30Z", - "updated_at": "2024-11-20T16:31:06Z", + "updated_at": "2025-01-12T10:59:27Z", "pushed_at": "2024-10-07T19:24:35Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -187,7 +187,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 7, + "watchers": 8, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-49328.json b/2024/CVE-2024-49328.json index efc6f94a55..22fccb6755 100644 --- a/2024/CVE-2024-49328.json +++ b/2024/CVE-2024-49328.json @@ -59,6 +59,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-53677.json b/2024/CVE-2024-53677.json index 05845953cb..65516a7b0f 100644 --- a/2024/CVE-2024-53677.json +++ b/2024/CVE-2024-53677.json @@ -262,10 +262,10 @@ "description": "Proof-of-Concept for CVE-2024-46538", "fork": false, "created_at": "2025-01-03T02:30:53Z", - "updated_at": "2025-01-10T02:20:21Z", + "updated_at": "2025-01-12T07:56:06Z", "pushed_at": "2025-01-03T18:51:20Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -282,7 +282,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-55503.json b/2024/CVE-2024-55503.json index 7fec5a5e5d..e2e0cc75a9 100644 --- a/2024/CVE-2024-55503.json +++ b/2024/CVE-2024-55503.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-5932.json b/2024/CVE-2024-5932.json index b01f448e3f..95ad8dd1c0 100644 --- a/2024/CVE-2024-5932.json +++ b/2024/CVE-2024-5932.json @@ -45,8 +45,8 @@ "description": "Proof-of-Concept for CVE-2024-5932", "fork": false, "created_at": "2024-08-25T11:51:36Z", - "updated_at": "2025-01-05T01:14:48Z", - "pushed_at": "2024-08-29T02:13:12Z", + "updated_at": "2025-01-12T11:24:29Z", + "pushed_at": "2025-01-12T11:24:26Z", "stargazers_count": 53, "watchers_count": 53, "has_discussions": false, diff --git a/2024/CVE-2024-9014.json b/2024/CVE-2024-9014.json index 05e56f5d5f..8001c43d71 100644 --- a/2024/CVE-2024-9014.json +++ b/2024/CVE-2024-9014.json @@ -14,8 +14,8 @@ "description": "Proof-of-Concept for CVE-2024-9014", "fork": false, "created_at": "2024-09-26T10:34:34Z", - "updated_at": "2024-10-15T07:52:36Z", - "pushed_at": "2024-09-26T10:45:34Z", + "updated_at": "2025-01-12T11:26:00Z", + "pushed_at": "2025-01-12T11:25:57Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, diff --git a/2024/CVE-2024-9932.json b/2024/CVE-2024-9932.json index be0f7d3f5a..050211bb58 100644 --- a/2024/CVE-2024-9932.json +++ b/2024/CVE-2024-9932.json @@ -59,6 +59,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2025/CVE-2025-0282.json b/2025/CVE-2025-0282.json index 3e7a8fafcf..08c3482117 100644 --- a/2025/CVE-2025-0282.json +++ b/2025/CVE-2025-0282.json @@ -107,10 +107,10 @@ "description": "CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.", "fork": false, "created_at": "2025-01-11T02:06:51Z", - "updated_at": "2025-01-12T03:33:28Z", + "updated_at": "2025-01-12T12:03:23Z", "pushed_at": "2025-01-11T23:54:06Z", - "stargazers_count": 14, - "watchers_count": 14, + "stargazers_count": 18, + "watchers_count": 18, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -119,7 +119,38 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 14, + "watchers": 18, + "score": 0, + "subscribers_count": 0 + }, + { + "id": 915634472, + "name": "CVE-2025-0282-Full-version", + "full_name": "anonzoli\/CVE-2025-0282-Full-version", + "owner": { + "login": "anonzoli", + "id": 185355974, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/185355974?v=4", + "html_url": "https:\/\/github.com\/anonzoli", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/anonzoli\/CVE-2025-0282-Full-version", + "description": "# CVE-2025-0282: Remote Code Execution Vulnerability in [StorkS]", + "fork": false, + "created_at": "2025-01-12T11:58:40Z", + "updated_at": "2025-01-12T12:16:53Z", + "pushed_at": "2025-01-12T12:15:44Z", + "stargazers_count": 2, + "watchers_count": 2, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 2, "score": 0, "subscribers_count": 0 } diff --git a/README.md b/README.md index b13c2a9a47..09c9f0b086 100644 --- a/README.md +++ b/README.md @@ -10,6 +10,7 @@ - [BishopFox/CVE-2025-0282-check](https://github.com/BishopFox/CVE-2025-0282-check) - [NyxanGoat/CVE-2025-0282-PoC](https://github.com/NyxanGoat/CVE-2025-0282-PoC) - [absholi7ly/CVE-2025-0282-Ivanti-exploit](https://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploit) +- [anonzoli/CVE-2025-0282-Full-version](https://github.com/anonzoli/CVE-2025-0282-Full-version) ### CVE-2025-22352 (2025-01-07) @@ -25220,6 +25221,7 @@ - [tijme/kernel-mii](https://github.com/tijme/kernel-mii) - [nanabingies/CVE-2021-21551](https://github.com/nanabingies/CVE-2021-21551) - [Eap2468/CVE-2021-21551](https://github.com/Eap2468/CVE-2021-21551) +- [IlanDudnik/CVE-2021-21551](https://github.com/IlanDudnik/CVE-2021-21551) ### CVE-2021-21716 - [MojithaR/CVE-2023-21716-EXPLOIT.py](https://github.com/MojithaR/CVE-2023-21716-EXPLOIT.py) @@ -30118,7 +30120,6 @@ - [plsanu/Vehicle-Service-Management-System-MyAccount-Stored-Cross-Site-Scripting-XSS](https://github.com/plsanu/Vehicle-Service-Management-System-MyAccount-Stored-Cross-Site-Scripting-XSS) -- [plsanu/CVE-2021-46068](https://github.com/plsanu/CVE-2021-46068) ### CVE-2021-46069 (2022-01-06) @@ -36624,6 +36625,13 @@ - [raymontag/CVE-2019-5596](https://github.com/raymontag/CVE-2019-5596) +### CVE-2019-5602 (2019-07-03) + +In FreeBSD 12.0-STABLE before r349628, 12.0-RELEASE before 12.0-RELEASE-p7, 11.3-PRERELEASE before r349629, 11.3-RC3 before 11.3-RC3-p1, and 11.2-RELEASE before 11.2-RELEASE-p11, a bug in the cdrom driver allows users with read access to the cdrom device to arbitrarily overwrite kernel memory when media is present thereby allowing a malicious user in the operator group to gain root privileges. + + +- [test-one9/CVE-2019-5602-poc](https://github.com/test-one9/CVE-2019-5602-poc) + ### CVE-2019-5603 (2019-07-26) In FreeBSD 12.0-STABLE before r350261, 12.0-RELEASE before 12.0-RELEASE-p8, 11.3-STABLE before r350263, 11.3-RELEASE before 11.3-RELEASE-p1, and 11.2-RELEASE before 11.2-RELEASE-p12, system calls operating on file descriptors as part of mqueuefs did not properly release the reference allowing a malicious user to overflow the counter allowing access to files, directories, and sockets opened by processes owned by other users.