diff --git a/2009/CVE-2009-0689.json b/2009/CVE-2009-0689.json index 0bf4d75aad..9fbb09e890 100644 --- a/2009/CVE-2009-0689.json +++ b/2009/CVE-2009-0689.json @@ -19,13 +19,13 @@ "stargazers_count": 74, "watchers_count": 74, "has_discussions": false, - "forks_count": 14, + "forks_count": 15, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 14, + "forks": 15, "watchers": 74, "score": 0, "subscribers_count": 7 diff --git a/2019/CVE-2019-12725.json b/2019/CVE-2019-12725.json index f824205ac1..3a4a9386f6 100644 --- a/2019/CVE-2019-12725.json +++ b/2019/CVE-2019-12725.json @@ -156,7 +156,7 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 }, { "id": 903995896, @@ -187,6 +187,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2020/CVE-2020-14883.json b/2020/CVE-2020-14883.json index c904d41745..d91f6a5095 100644 --- a/2020/CVE-2020-14883.json +++ b/2020/CVE-2020-14883.json @@ -138,10 +138,10 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2024-11-27T17:40:14Z", + "updated_at": "2024-12-16T13:58:02Z", "pushed_at": "2023-05-11T14:36:58Z", - "stargazers_count": 1079, - "watchers_count": 1079, + "stargazers_count": 1080, + "watchers_count": 1080, "has_discussions": false, "forks_count": 318, "allow_forking": true, @@ -154,7 +154,7 @@ ], "visibility": "public", "forks": 318, - "watchers": 1079, + "watchers": 1080, "score": 0, "subscribers_count": 36 }, diff --git a/2020/CVE-2020-5248.json b/2020/CVE-2020-5248.json index 83f8cd0215..988d92e52e 100644 --- a/2020/CVE-2020-5248.json +++ b/2020/CVE-2020-5248.json @@ -14,10 +14,10 @@ "description": "Proof of Concept (PoC) for CVE-2020-5248.", "fork": false, "created_at": "2020-10-09T12:31:19Z", - "updated_at": "2024-02-09T21:18:08Z", + "updated_at": "2024-12-16T16:23:20Z", "pushed_at": "2022-12-14T20:05:35Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 0 }, diff --git a/2021/CVE-2021-25646.json b/2021/CVE-2021-25646.json index 94cab4effc..e8e0031a39 100644 --- a/2021/CVE-2021-25646.json +++ b/2021/CVE-2021-25646.json @@ -138,10 +138,10 @@ "description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE", "fork": false, "created_at": "2021-03-11T22:49:17Z", - "updated_at": "2024-11-27T17:40:14Z", + "updated_at": "2024-12-16T13:58:02Z", "pushed_at": "2023-05-11T14:36:58Z", - "stargazers_count": 1079, - "watchers_count": 1079, + "stargazers_count": 1080, + "watchers_count": 1080, "has_discussions": false, "forks_count": 318, "allow_forking": true, @@ -154,7 +154,7 @@ ], "visibility": "public", "forks": 318, - "watchers": 1079, + "watchers": 1080, "score": 0, "subscribers_count": 36 }, diff --git a/2021/CVE-2021-26855.json b/2021/CVE-2021-26855.json index af3d8883c4..1878363a75 100644 --- a/2021/CVE-2021-26855.json +++ b/2021/CVE-2021-26855.json @@ -744,10 +744,10 @@ "description": "CVE-2021-26855 & CVE-2021-27065", "fork": false, "created_at": "2021-03-15T09:02:40Z", - "updated_at": "2024-08-12T20:11:13Z", + "updated_at": "2024-12-16T17:23:48Z", "pushed_at": "2021-03-15T09:19:45Z", - "stargazers_count": 26, - "watchers_count": 26, + "stargazers_count": 27, + "watchers_count": 27, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -760,7 +760,7 @@ ], "visibility": "public", "forks": 10, - "watchers": 26, + "watchers": 27, "score": 0, "subscribers_count": 2 }, diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index 0b9efa0b8f..44ed6a57df 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -572,10 +572,10 @@ "description": "CVE-2022-0847", "fork": false, "created_at": "2022-03-08T20:18:28Z", - "updated_at": "2024-05-09T02:22:32Z", + "updated_at": "2024-12-16T14:36:05Z", "pushed_at": "2022-03-08T20:41:15Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -584,7 +584,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 }, @@ -1972,10 +1972,10 @@ "description": "An eBPF detection program for CVE-2022-0847", "fork": false, "created_at": "2022-07-05T07:20:59Z", - "updated_at": "2024-08-09T11:36:06Z", + "updated_at": "2024-12-16T13:13:20Z", "pushed_at": "2022-07-05T14:25:46Z", - "stargazers_count": 27, - "watchers_count": 27, + "stargazers_count": 28, + "watchers_count": 28, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -1984,7 +1984,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 27, + "watchers": 28, "score": 0, "subscribers_count": 9 }, diff --git a/2022/CVE-2022-22980.json b/2022/CVE-2022-22980.json index 2193efabc9..d0b14e7f03 100644 --- a/2022/CVE-2022-22980.json +++ b/2022/CVE-2022-22980.json @@ -138,10 +138,10 @@ "description": "[CVE-2022-22980] Spring Data MongoDB SpEL Expression Injection", "fork": false, "created_at": "2022-06-28T21:42:35Z", - "updated_at": "2024-08-12T20:24:35Z", + "updated_at": "2024-12-16T16:42:14Z", "pushed_at": "2022-06-28T22:27:58Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -150,7 +150,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 }, diff --git a/2022/CVE-2022-25636.json b/2022/CVE-2022-25636.json index b8ed771edb..cbbc265c08 100644 --- a/2022/CVE-2022-25636.json +++ b/2022/CVE-2022-25636.json @@ -14,10 +14,10 @@ "description": "CVE-2022-25636", "fork": false, "created_at": "2022-03-07T13:38:41Z", - "updated_at": "2024-09-27T13:47:21Z", + "updated_at": "2024-12-16T14:15:56Z", "pushed_at": "2022-03-07T17:18:19Z", - "stargazers_count": 426, - "watchers_count": 426, + "stargazers_count": 427, + "watchers_count": 427, "has_discussions": false, "forks_count": 83, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 83, - "watchers": 426, + "watchers": 427, "score": 0, "subscribers_count": 6 }, diff --git a/2023/CVE-2023-28218.json b/2023/CVE-2023-28218.json index e89633b781..16e7cc332f 100644 --- a/2023/CVE-2023-28218.json +++ b/2023/CVE-2023-28218.json @@ -19,13 +19,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 2 diff --git a/2023/CVE-2023-3460.json b/2023/CVE-2023-3460.json index d9ab340ce1..8f9936e116 100644 --- a/2023/CVE-2023-3460.json +++ b/2023/CVE-2023-3460.json @@ -265,8 +265,8 @@ "description": "Cái này dựng lên với mục đích cho ae tham khảo, chê thì đừng có xem. :))))", "fork": false, "created_at": "2024-12-11T07:38:22Z", - "updated_at": "2024-12-12T01:40:38Z", - "pushed_at": "2024-12-12T01:40:33Z", + "updated_at": "2024-12-16T13:51:41Z", + "pushed_at": "2024-12-16T13:51:36Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2023/CVE-2023-38709.json b/2023/CVE-2023-38709.json index 2e48254200..00a1e9fc30 100644 --- a/2023/CVE-2023-38709.json +++ b/2023/CVE-2023-38709.json @@ -14,12 +14,12 @@ "description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709", "fork": false, "created_at": "2024-10-05T20:32:45Z", - "updated_at": "2024-12-16T09:57:04Z", + "updated_at": "2024-12-16T15:06:10Z", "pushed_at": "2024-10-05T20:37:02Z", - "stargazers_count": 31, - "watchers_count": 31, + "stargazers_count": 32, + "watchers_count": 32, "has_discussions": false, - "forks_count": 6, + "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -36,8 +36,8 @@ "cve-2024-39573" ], "visibility": "public", - "forks": 6, - "watchers": 31, + "forks": 7, + "watchers": 32, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-38831.json b/2023/CVE-2023-38831.json index de9a252f6d..410fe66fa8 100644 --- a/2023/CVE-2023-38831.json +++ b/2023/CVE-2023-38831.json @@ -45,10 +45,10 @@ "description": "CVE-2023-38831 winrar exploit generator", "fork": false, "created_at": "2023-08-25T09:44:08Z", - "updated_at": "2024-12-09T18:18:45Z", + "updated_at": "2024-12-16T14:43:13Z", "pushed_at": "2023-11-26T06:46:44Z", - "stargazers_count": 783, - "watchers_count": 783, + "stargazers_count": 784, + "watchers_count": 784, "has_discussions": false, "forks_count": 139, "allow_forking": true, @@ -61,7 +61,7 @@ ], "visibility": "public", "forks": 139, - "watchers": 783, + "watchers": 784, "score": 0, "subscribers_count": 9 }, @@ -1620,8 +1620,8 @@ "description": null, "fork": false, "created_at": "2024-12-03T11:13:37Z", - "updated_at": "2024-12-03T11:17:23Z", - "pushed_at": "2024-12-03T11:17:20Z", + "updated_at": "2024-12-16T15:10:50Z", + "pushed_at": "2024-12-16T15:10:46Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index bbfaddd94a..5266b04150 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -14,10 +14,10 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2024-12-16T12:18:00Z", + "updated_at": "2024-12-16T13:26:52Z", "pushed_at": "2024-08-18T08:26:46Z", - "stargazers_count": 1295, - "watchers_count": 1295, + "stargazers_count": 1297, + "watchers_count": 1297, "has_discussions": false, "forks_count": 221, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 221, - "watchers": 1295, + "watchers": 1297, "score": 0, "subscribers_count": 21 }, @@ -200,10 +200,10 @@ "description": "Exploit basado en vulnerabilidades criticas Bluetooth (CVE-2023-45866, CVE-2024-21306)", "fork": false, "created_at": "2024-12-15T03:00:47Z", - "updated_at": "2024-12-15T06:45:36Z", + "updated_at": "2024-12-16T12:33:43Z", "pushed_at": "2024-12-15T06:41:13Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -212,7 +212,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-10793.json b/2024/CVE-2024-10793.json index 2e9fa81a06..4d6674bccb 100644 --- a/2024/CVE-2024-10793.json +++ b/2024/CVE-2024-10793.json @@ -19,13 +19,13 @@ "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 3, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index 5e38208198..93f9f26d14 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -14,12 +14,12 @@ "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "fork": false, "created_at": "2024-03-20T21:16:41Z", - "updated_at": "2024-12-10T09:00:58Z", + "updated_at": "2024-12-16T13:59:35Z", "pushed_at": "2024-04-17T16:09:54Z", - "stargazers_count": 2299, - "watchers_count": 2299, + "stargazers_count": 2300, + "watchers_count": 2300, "has_discussions": false, - "forks_count": 299, + "forks_count": 297, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -31,8 +31,8 @@ "poc" ], "visibility": "public", - "forks": 299, - "watchers": 2299, + "forks": 297, + "watchers": 2300, "score": 0, "subscribers_count": 26 }, @@ -190,5 +190,36 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 904336421, + "name": "CVE-2024-1086", + "full_name": "LLfam\/CVE-2024-1086", + "owner": { + "login": "LLfam", + "id": 43279891, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43279891?v=4", + "html_url": "https:\/\/github.com\/LLfam", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/LLfam\/CVE-2024-1086", + "description": null, + "fork": false, + "created_at": "2024-12-16T17:33:13Z", + "updated_at": "2024-12-16T17:38:28Z", + "pushed_at": "2024-12-16T17:38:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-10914.json b/2024/CVE-2024-10914.json index 415e59a4a2..dd6f593522 100644 --- a/2024/CVE-2024-10914.json +++ b/2024/CVE-2024-10914.json @@ -146,8 +146,8 @@ "description": "CVE-2024-10914 is a critical command injection vulnerability affecting several legacy D-Link Network Attached Storage (NAS) devices.", "fork": false, "created_at": "2024-11-16T16:32:05Z", - "updated_at": "2024-12-16T11:58:05Z", - "pushed_at": "2024-12-16T11:58:00Z", + "updated_at": "2024-12-16T14:08:57Z", + "pushed_at": "2024-12-16T14:08:53Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, diff --git a/2024/CVE-2024-21306.json b/2024/CVE-2024-21306.json index 7cec0871a6..b1cc21c6f9 100644 --- a/2024/CVE-2024-21306.json +++ b/2024/CVE-2024-21306.json @@ -76,10 +76,10 @@ "description": "Exploit basado en vulnerabilidades criticas Bluetooth (CVE-2023-45866, CVE-2024-21306)", "fork": false, "created_at": "2024-12-15T03:00:47Z", - "updated_at": "2024-12-15T06:45:36Z", + "updated_at": "2024-12-16T12:33:43Z", "pushed_at": "2024-12-15T06:41:13Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-23692.json b/2024/CVE-2024-23692.json index e06fde4be9..f8e0e706e5 100644 --- a/2024/CVE-2024-23692.json +++ b/2024/CVE-2024-23692.json @@ -45,10 +45,10 @@ "description": "Unauthenticated RCE Flaw in Rejetto HTTP File Server (CVE-2024-23692)", "fork": false, "created_at": "2024-06-13T06:00:24Z", - "updated_at": "2024-11-11T12:02:29Z", + "updated_at": "2024-12-16T15:23:00Z", "pushed_at": "2024-06-13T07:00:23Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 8, + "watchers": 9, "score": 0, "subscribers_count": 1 }, @@ -293,10 +293,10 @@ "description": "POC - Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692 ", "fork": false, "created_at": "2024-09-15T12:15:35Z", - "updated_at": "2024-12-05T09:44:16Z", + "updated_at": "2024-12-16T15:09:24Z", "pushed_at": "2024-11-26T14:45:12Z", - "stargazers_count": 35, - "watchers_count": 35, + "stargazers_count": 36, + "watchers_count": 36, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -310,7 +310,7 @@ ], "visibility": "public", "forks": 15, - "watchers": 35, + "watchers": 36, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-38472.json b/2024/CVE-2024-38472.json index d8780ea1d8..6adc97addc 100644 --- a/2024/CVE-2024-38472.json +++ b/2024/CVE-2024-38472.json @@ -45,12 +45,12 @@ "description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709", "fork": false, "created_at": "2024-10-05T20:32:45Z", - "updated_at": "2024-12-16T09:57:04Z", + "updated_at": "2024-12-16T15:06:10Z", "pushed_at": "2024-10-05T20:37:02Z", - "stargazers_count": 31, - "watchers_count": 31, + "stargazers_count": 32, + "watchers_count": 32, "has_discussions": false, - "forks_count": 6, + "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -67,8 +67,8 @@ "cve-2024-39573" ], "visibility": "public", - "forks": 6, - "watchers": 31, + "forks": 7, + "watchers": 32, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-38819.json b/2024/CVE-2024-38819.json index 72be74c8f5..8c06fd849c 100644 --- a/2024/CVE-2024-38819.json +++ b/2024/CVE-2024-38819.json @@ -19,13 +19,13 @@ "stargazers_count": 16, "watchers_count": 16, "has_discussions": false, - "forks_count": 5, + "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 5, + "forks": 7, "watchers": 16, "score": 0, "subscribers_count": 2 diff --git a/2024/CVE-2024-38998.json b/2024/CVE-2024-38998.json index 94dd4085d6..6798e0932b 100644 --- a/2024/CVE-2024-38998.json +++ b/2024/CVE-2024-38998.json @@ -2,15 +2,15 @@ { "id": 902615056, "name": "PP_CVE-2024-38998", - "full_name": "AlbedoPrime\/PP_CVE-2024-38998", + "full_name": "z3ldr1\/PP_CVE-2024-38998", "owner": { - "login": "AlbedoPrime", + "login": "z3ldr1", "id": 128452420, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128452420?v=4", - "html_url": "https:\/\/github.com\/AlbedoPrime", + "html_url": "https:\/\/github.com\/z3ldr1", "user_view_type": "public" }, - "html_url": "https:\/\/github.com\/AlbedoPrime\/PP_CVE-2024-38998", + "html_url": "https:\/\/github.com\/z3ldr1\/PP_CVE-2024-38998", "description": "Uma vulnerabilidade (CVE-2024-38998) foi identificada na versão 2.3.6 do módulo JavaScript requirejs. Ela explora prototype pollution na função config, permitindo que invasores modifiquem Object.prototype com entradas maliciosas. Isso pode causar DoS, execução remota de código (RCE) ou XSS. A gravidade é crítica (CVSS 9.8). ", "fork": false, "created_at": "2024-12-12T23:19:44Z", diff --git a/2024/CVE-2024-46538.json b/2024/CVE-2024-46538.json index 1eda19c15f..cca5fa8818 100644 --- a/2024/CVE-2024-46538.json +++ b/2024/CVE-2024-46538.json @@ -55,10 +55,10 @@ "description": "based on [EQSTLab](https:\/\/github.com\/EQSTLab)", "fork": false, "created_at": "2024-12-04T15:51:40Z", - "updated_at": "2024-12-12T23:58:51Z", + "updated_at": "2024-12-16T14:03:29Z", "pushed_at": "2024-12-04T16:00:45Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -67,7 +67,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-49039.json b/2024/CVE-2024-49039.json index 44a6b02cb5..0df554c087 100644 --- a/2024/CVE-2024-49039.json +++ b/2024/CVE-2024-49039.json @@ -14,10 +14,10 @@ "description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler", "fork": false, "created_at": "2024-11-19T08:57:18Z", - "updated_at": "2024-12-15T08:29:33Z", + "updated_at": "2024-12-16T13:59:04Z", "pushed_at": "2024-11-19T09:15:26Z", - "stargazers_count": 87, - "watchers_count": 87, + "stargazers_count": 88, + "watchers_count": 88, "has_discussions": false, "forks_count": 19, "allow_forking": true, @@ -26,8 +26,39 @@ "topics": [], "visibility": "public", "forks": 19, - "watchers": 87, + "watchers": 88, "score": 0, "subscribers_count": 1 + }, + { + "id": 904220023, + "name": "CVE-2024-49039", + "full_name": "Alexandr-bit253\/CVE-2024-49039", + "owner": { + "login": "Alexandr-bit253", + "id": 102812557, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102812557?v=4", + "html_url": "https:\/\/github.com\/Alexandr-bit253", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Alexandr-bit253\/CVE-2024-49039", + "description": null, + "fork": false, + "created_at": "2024-12-16T13:25:56Z", + "updated_at": "2024-12-16T16:07:49Z", + "pushed_at": "2024-12-16T13:28:19Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-49112.json b/2024/CVE-2024-49112.json new file mode 100644 index 0000000000..6397e4643a --- /dev/null +++ b/2024/CVE-2024-49112.json @@ -0,0 +1,33 @@ +[ + { + "id": 904227549, + "name": "poc_monitor", + "full_name": "tnkr\/poc_monitor", + "owner": { + "login": "tnkr", + "id": 24298003, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24298003?v=4", + "html_url": "https:\/\/github.com\/tnkr", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/tnkr\/poc_monitor", + "description": "A short scraper looking for a POC of CVE-2024-49112", + "fork": false, + "created_at": "2024-12-16T13:41:40Z", + "updated_at": "2024-12-16T16:12:54Z", + "pushed_at": "2024-12-16T14:12:03Z", + "stargazers_count": 4, + "watchers_count": 4, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 4, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-50623.json b/2024/CVE-2024-50623.json index 190224b7c0..b6ef9b7909 100644 --- a/2024/CVE-2024-50623.json +++ b/2024/CVE-2024-50623.json @@ -14,10 +14,10 @@ "description": "Cleo Unrestricted file upload and download PoC (CVE-2024-50623)", "fork": false, "created_at": "2024-12-11T14:19:55Z", - "updated_at": "2024-12-14T15:47:45Z", + "updated_at": "2024-12-16T16:19:14Z", "pushed_at": "2024-12-11T14:23:19Z", - "stargazers_count": 17, - "watchers_count": 17, + "stargazers_count": 18, + "watchers_count": 18, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 17, + "watchers": 18, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-53677.json b/2024/CVE-2024-53677.json index 274c168141..c6da3c8f66 100644 --- a/2024/CVE-2024-53677.json +++ b/2024/CVE-2024-53677.json @@ -50,13 +50,13 @@ "stargazers_count": 8, "watchers_count": 8, "has_discussions": false, - "forks_count": 4, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 4, + "forks": 5, "watchers": 8, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-9464.json b/2024/CVE-2024-9464.json index 897e52b9cf..e278efad47 100644 --- a/2024/CVE-2024-9464.json +++ b/2024/CVE-2024-9464.json @@ -14,10 +14,10 @@ "description": "Proof of Concept Exploit for CVE-2024-9464", "fork": false, "created_at": "2024-10-09T16:36:25Z", - "updated_at": "2024-11-25T11:50:34Z", + "updated_at": "2024-12-16T15:16:53Z", "pushed_at": "2024-10-09T16:41:41Z", - "stargazers_count": 43, - "watchers_count": 43, + "stargazers_count": 44, + "watchers_count": 44, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 43, + "watchers": 44, "score": 0, "subscribers_count": 4 } diff --git a/2024/CVE-2024-9796.json b/2024/CVE-2024-9796.json index c125bbdfc2..bbf205093d 100644 --- a/2024/CVE-2024-9796.json +++ b/2024/CVE-2024-9796.json @@ -45,7 +45,7 @@ "description": "WordPress WP-Advanced-Search <= 3.3.9 - Unauthenticated SQL Injection", "fork": false, "created_at": "2024-11-15T22:55:18Z", - "updated_at": "2024-11-26T14:47:16Z", + "updated_at": "2024-12-16T14:47:33Z", "pushed_at": "2024-11-15T23:04:07Z", "stargazers_count": 3, "watchers_count": 3, diff --git a/README.md b/README.md index 40c9cdcfe0..c4f9473a2f 100644 --- a/README.md +++ b/README.md @@ -311,6 +311,7 @@ - [kevcooper/CVE-2024-1086-checker](https://github.com/kevcooper/CVE-2024-1086-checker) - [feely666/CVE-2024-1086](https://github.com/feely666/CVE-2024-1086) - [xzx482/CVE-2024-1086](https://github.com/xzx482/CVE-2024-1086) +- [LLfam/CVE-2024-1086](https://github.com/LLfam/CVE-2024-1086) ### CVE-2024-1112 (2024-01-31) @@ -5754,7 +5755,7 @@ <code>jrburke requirejs v2.3.6 was discovered to contain a prototype pollution via the function config. This vulnerability allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via injecting arbitrary properties. </code> -- [AlbedoPrime/PP_CVE-2024-38998](https://github.com/AlbedoPrime/PP_CVE-2024-38998) +- [z3ldr1/PP_CVE-2024-38998](https://github.com/z3ldr1/PP_CVE-2024-38998) ### CVE-2024-39031 (2024-07-09) @@ -6924,6 +6925,14 @@ </code> - [je5442804/WPTaskScheduler_CVE-2024-49039](https://github.com/je5442804/WPTaskScheduler_CVE-2024-49039) +- [Alexandr-bit253/CVE-2024-49039](https://github.com/Alexandr-bit253/CVE-2024-49039) + +### CVE-2024-49112 (2024-12-10) + +<code>Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability +</code> + +- [tnkr/poc_monitor](https://github.com/tnkr/poc_monitor) ### CVE-2024-49203 (2024-11-20)