From 330e877853d0b6c9a2c7789ac871059e9d2d3742 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Thu, 19 Dec 2024 21:33:24 +0900 Subject: [PATCH] Auto Update 2024/12/19 12:33:24 --- 2014/CVE-2014-0160.json | 8 +++---- 2017/CVE-2017-12615.json | 8 +++---- 2017/CVE-2017-13156.json | 16 ++++++------- 2017/CVE-2017-3881.json | 8 +++---- 2018/CVE-2018-17240.json | 2 +- 2019/CVE-2019-15107.json | 31 ++++++++++++++++++++++++ 2020/CVE-2020-1938.json | 8 +++---- 2021/CVE-2021-21972.json | 8 +++---- 2021/CVE-2021-22015.json | 8 +++---- 2021/CVE-2021-40444.json | 8 +++---- 2021/CVE-2021-44228.json | 8 +++---- 2022/CVE-2022-1329.json | 4 ++-- 2022/CVE-2022-22947.json | 8 +++---- 2022/CVE-2022-22954.json | 8 +++---- 2023/CVE-2023-20198.json | 8 +++---- 2023/CVE-2023-38709.json | 8 +++---- 2023/CVE-2023-41425.json | 8 +++---- 2023/CVE-2023-4357.json | 8 +++---- 2024/CVE-2024-0044.json | 4 ++-- 2024/CVE-2024-1086.json | 8 +++---- 2024/CVE-2024-23897.json | 4 ++-- 2024/CVE-2024-24919.json | 4 ++-- 2024/CVE-2024-35250.json | 4 ++-- 2024/CVE-2024-38472.json | 8 +++---- 2024/CVE-2024-38819.json | 8 +++---- 2024/CVE-2024-4367.json | 2 +- 2024/CVE-2024-44765.json | 4 ++-- 2024/CVE-2024-45337.json | 8 +++---- 2024/CVE-2024-48990.json | 8 +++---- 2024/CVE-2024-49039.json | 12 +++++----- 2024/CVE-2024-50379.json | 12 +++++----- 2024/CVE-2024-53375.json | 10 ++++---- 2024/CVE-2024-53376.json | 4 ++-- 2024/CVE-2024-53677.json | 10 ++++---- 2024/CVE-2024-55875.json | 8 +++---- 2024/CVE-2024-6387.json | 51 ++++++++++++++++++++++++++++++++-------- 2024/CVE-2024-7479.json | 8 +++---- 2024/CVE-2024-9935.json | 38 ++++++++++++++++++++++++++++++ README.md | 3 +++ 39 files changed, 243 insertions(+), 140 deletions(-) diff --git a/2014/CVE-2014-0160.json b/2014/CVE-2014-0160.json index fee2976118..4d179e7e48 100644 --- a/2014/CVE-2014-0160.json +++ b/2014/CVE-2014-0160.json @@ -231,10 +231,10 @@ "description": "Heartbleed (CVE-2014-0160) client exploit", "fork": false, "created_at": "2014-04-08T16:41:51Z", - "updated_at": "2024-09-20T14:27:26Z", + "updated_at": "2024-12-19T10:54:22Z", "pushed_at": "2016-01-22T00:42:35Z", - "stargazers_count": 319, - "watchers_count": 319, + "stargazers_count": 320, + "watchers_count": 320, "has_discussions": false, "forks_count": 80, "allow_forking": true, @@ -243,7 +243,7 @@ "topics": [], "visibility": "public", "forks": 80, - "watchers": 319, + "watchers": 320, "score": 0, "subscribers_count": 32 }, diff --git a/2017/CVE-2017-12615.json b/2017/CVE-2017-12615.json index 666a410b38..9a7aee5895 100644 --- a/2017/CVE-2017-12615.json +++ b/2017/CVE-2017-12615.json @@ -355,10 +355,10 @@ "description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含", "fork": false, "created_at": "2022-11-13T11:01:41Z", - "updated_at": "2024-12-12T04:06:53Z", + "updated_at": "2024-12-19T07:25:22Z", "pushed_at": "2022-11-15T09:05:50Z", - "stargazers_count": 207, - "watchers_count": 207, + "stargazers_count": 208, + "watchers_count": 208, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -367,7 +367,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 207, + "watchers": 208, "score": 0, "subscribers_count": 4 }, diff --git a/2017/CVE-2017-13156.json b/2017/CVE-2017-13156.json index 68d30ea4c6..ba3ca18259 100644 --- a/2017/CVE-2017-13156.json +++ b/2017/CVE-2017-13156.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2017-12-29T07:11:42Z", - "updated_at": "2023-02-19T09:32:09Z", + "updated_at": "2024-12-19T08:01:10Z", "pushed_at": "2017-12-29T08:01:10Z", - "stargazers_count": 14, - "watchers_count": 14, + "stargazers_count": 15, + "watchers_count": 15, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 14, + "watchers": 15, "score": 0, "subscribers_count": 0 }, @@ -118,10 +118,10 @@ "description": "CVE-2017-13156-Janus复现", "fork": false, "created_at": "2020-09-03T09:28:31Z", - "updated_at": "2023-11-01T06:47:19Z", + "updated_at": "2024-12-19T08:02:52Z", "pushed_at": "2020-09-07T07:06:50Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -130,7 +130,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 9, + "watchers": 10, "score": 0, "subscribers_count": 3 }, diff --git a/2017/CVE-2017-3881.json b/2017/CVE-2017-3881.json index e77a7fb533..ec3cf19f6a 100644 --- a/2017/CVE-2017-3881.json +++ b/2017/CVE-2017-3881.json @@ -14,10 +14,10 @@ "description": "CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC", "fork": false, "created_at": "2017-04-10T03:44:04Z", - "updated_at": "2024-12-06T23:48:20Z", + "updated_at": "2024-12-19T06:45:12Z", "pushed_at": "2017-04-12T09:17:27Z", - "stargazers_count": 207, - "watchers_count": 207, + "stargazers_count": 208, + "watchers_count": 208, "has_discussions": false, "forks_count": 80, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 80, - "watchers": 207, + "watchers": 208, "score": 0, "subscribers_count": 14 }, diff --git a/2018/CVE-2018-17240.json b/2018/CVE-2018-17240.json index 751475e5ae..9375b3200f 100644 --- a/2018/CVE-2018-17240.json +++ b/2018/CVE-2018-17240.json @@ -46,7 +46,7 @@ "fork": false, "created_at": "2024-01-04T21:44:21Z", "updated_at": "2024-12-06T19:44:48Z", - "pushed_at": "2024-12-06T19:44:46Z", + "pushed_at": "2024-12-19T09:49:38Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, diff --git a/2019/CVE-2019-15107.json b/2019/CVE-2019-15107.json index 5e68417f68..f724973bc1 100644 --- a/2019/CVE-2019-15107.json +++ b/2019/CVE-2019-15107.json @@ -1047,5 +1047,36 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 905648216, + "name": "CVE-2019-15107", + "full_name": "MasterCode112\/CVE-2019-15107", + "owner": { + "login": "MasterCode112", + "id": 105772414, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105772414?v=4", + "html_url": "https:\/\/github.com\/MasterCode112", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/MasterCode112\/CVE-2019-15107", + "description": "webmin or minisever RCE", + "fork": false, + "created_at": "2024-12-19T08:52:03Z", + "updated_at": "2024-12-19T08:54:10Z", + "pushed_at": "2024-12-19T08:54:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index 1435d02ddb..e5427dc856 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -888,10 +888,10 @@ "description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含", "fork": false, "created_at": "2022-11-13T11:01:41Z", - "updated_at": "2024-12-12T04:06:53Z", + "updated_at": "2024-12-19T07:25:22Z", "pushed_at": "2022-11-15T09:05:50Z", - "stargazers_count": 207, - "watchers_count": 207, + "stargazers_count": 208, + "watchers_count": 208, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -900,7 +900,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 207, + "watchers": 208, "score": 0, "subscribers_count": 4 }, diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 6a055a55f9..b473af7679 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -848,10 +848,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2024-12-19T03:07:49Z", + "updated_at": "2024-12-19T07:38:05Z", "pushed_at": "2024-04-25T06:09:38Z", - "stargazers_count": 1343, - "watchers_count": 1343, + "stargazers_count": 1344, + "watchers_count": 1344, "has_discussions": false, "forks_count": 166, "allow_forking": true, @@ -867,7 +867,7 @@ ], "visibility": "public", "forks": 166, - "watchers": 1343, + "watchers": 1344, "score": 0, "subscribers_count": 15 } diff --git a/2021/CVE-2021-22015.json b/2021/CVE-2021-22015.json index 35f6d7391e..98efcbcf63 100644 --- a/2021/CVE-2021-22015.json +++ b/2021/CVE-2021-22015.json @@ -14,10 +14,10 @@ "description": "Scanner for vScalation (CVE-2021-22015) a Local Privilege Escalation in VMWare vCenter", "fork": false, "created_at": "2021-09-30T07:16:27Z", - "updated_at": "2024-02-24T11:42:35Z", + "updated_at": "2024-12-19T06:46:49Z", "pushed_at": "2023-05-09T12:43:17Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 2 } diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index e3d7cc275e..b2054a1be5 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -231,10 +231,10 @@ "description": "CVE-2021-40444 PoC", "fork": false, "created_at": "2021-09-10T16:55:53Z", - "updated_at": "2024-12-16T03:38:50Z", + "updated_at": "2024-12-19T09:48:48Z", "pushed_at": "2021-12-25T18:31:02Z", - "stargazers_count": 1604, - "watchers_count": 1604, + "stargazers_count": 1605, + "watchers_count": 1605, "has_discussions": false, "forks_count": 482, "allow_forking": true, @@ -243,7 +243,7 @@ "topics": [], "visibility": "public", "forks": 482, - "watchers": 1604, + "watchers": 1605, "score": 0, "subscribers_count": 28 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 9a676278ba..d438e23a24 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -1307,10 +1307,10 @@ "description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks", "fork": false, "created_at": "2021-12-11T07:19:11Z", - "updated_at": "2024-12-19T04:27:55Z", + "updated_at": "2024-12-19T06:51:26Z", "pushed_at": "2023-06-13T09:17:54Z", - "stargazers_count": 804, - "watchers_count": 804, + "stargazers_count": 805, + "watchers_count": 805, "has_discussions": false, "forks_count": 111, "allow_forking": true, @@ -1324,7 +1324,7 @@ ], "visibility": "public", "forks": 111, - "watchers": 804, + "watchers": 805, "score": 0, "subscribers_count": 11 }, diff --git a/2022/CVE-2022-1329.json b/2022/CVE-2022-1329.json index 7bb1f00597..3cc7a28abc 100644 --- a/2022/CVE-2022-1329.json +++ b/2022/CVE-2022-1329.json @@ -175,8 +175,8 @@ "description": null, "fork": false, "created_at": "2024-10-11T16:57:20Z", - "updated_at": "2024-12-06T18:31:25Z", - "pushed_at": "2024-12-06T18:31:21Z", + "updated_at": "2024-12-19T10:12:45Z", + "pushed_at": "2024-12-19T10:12:40Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-22947.json b/2022/CVE-2022-22947.json index 6ffd51e7a9..65ec04b52c 100644 --- a/2022/CVE-2022-22947.json +++ b/2022/CVE-2022-22947.json @@ -634,10 +634,10 @@ "description": null, "fork": false, "created_at": "2022-03-07T15:12:45Z", - "updated_at": "2022-11-30T04:44:51Z", + "updated_at": "2024-12-19T09:46:33Z", "pushed_at": "2022-03-07T15:28:16Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -646,7 +646,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 1 }, diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index 479f7d981b..37885dc41e 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -792,10 +792,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2024-12-19T03:07:49Z", + "updated_at": "2024-12-19T07:38:05Z", "pushed_at": "2024-04-25T06:09:38Z", - "stargazers_count": 1343, - "watchers_count": 1343, + "stargazers_count": 1344, + "watchers_count": 1344, "has_discussions": false, "forks_count": 166, "allow_forking": true, @@ -811,7 +811,7 @@ ], "visibility": "public", "forks": 166, - "watchers": 1343, + "watchers": 1344, "score": 0, "subscribers_count": 15 } diff --git a/2023/CVE-2023-20198.json b/2023/CVE-2023-20198.json index dd806afe93..806ce13226 100644 --- a/2023/CVE-2023-20198.json +++ b/2023/CVE-2023-20198.json @@ -426,10 +426,10 @@ "description": "This is a webshell fingerprinting scanner designed to identify implants on Cisco IOS XE WebUI's affected by CVE-2023-20198 and CVE-2023-20273", "fork": false, "created_at": "2023-10-23T19:25:29Z", - "updated_at": "2024-11-06T11:11:23Z", + "updated_at": "2024-12-19T11:35:17Z", "pushed_at": "2023-10-24T18:17:43Z", - "stargazers_count": 30, - "watchers_count": 30, + "stargazers_count": 31, + "watchers_count": 31, "has_discussions": true, "forks_count": 6, "allow_forking": true, @@ -438,7 +438,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 30, + "watchers": 31, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-38709.json b/2023/CVE-2023-38709.json index 9784810ce9..fea171c05c 100644 --- a/2023/CVE-2023-38709.json +++ b/2023/CVE-2023-38709.json @@ -14,10 +14,10 @@ "description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709", "fork": false, "created_at": "2024-10-05T20:32:45Z", - "updated_at": "2024-12-18T11:54:19Z", + "updated_at": "2024-12-19T12:17:40Z", "pushed_at": "2024-10-05T20:37:02Z", - "stargazers_count": 40, - "watchers_count": 40, + "stargazers_count": 43, + "watchers_count": 43, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -37,7 +37,7 @@ ], "visibility": "public", "forks": 8, - "watchers": 40, + "watchers": 43, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-41425.json b/2023/CVE-2023-41425.json index debfacca9e..b37ea0f62a 100644 --- a/2023/CVE-2023-41425.json +++ b/2023/CVE-2023-41425.json @@ -14,10 +14,10 @@ "description": "WonderCMS Authenticated RCE - CVE-2023-41425", "fork": false, "created_at": "2023-11-05T15:06:43Z", - "updated_at": "2024-11-28T18:38:05Z", + "updated_at": "2024-12-19T10:18:36Z", "pushed_at": "2023-11-06T18:56:53Z", - "stargazers_count": 23, - "watchers_count": 23, + "stargazers_count": 24, + "watchers_count": 24, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 7, - "watchers": 23, + "watchers": 24, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-4357.json b/2023/CVE-2023-4357.json index f1e2d0532c..0d90262780 100644 --- a/2023/CVE-2023-4357.json +++ b/2023/CVE-2023-4357.json @@ -14,10 +14,10 @@ "description": "[漏洞复现] 全球首款单文件利用 CVE-2023-4357 Chrome XXE 漏洞 EXP, 实现对访客者本地文件窃取. Chrome XXE vulnerability EXP, allowing attackers to obtain local files of visitors.", "fork": false, "created_at": "2023-11-17T10:32:31Z", - "updated_at": "2024-12-06T10:52:35Z", + "updated_at": "2024-12-19T09:49:49Z", "pushed_at": "2023-11-21T10:45:58Z", - "stargazers_count": 203, - "watchers_count": 203, + "stargazers_count": 204, + "watchers_count": 204, "has_discussions": false, "forks_count": 34, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 34, - "watchers": 203, + "watchers": 204, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-0044.json b/2024/CVE-2024-0044.json index b505510385..3d895cdb9e 100644 --- a/2024/CVE-2024-0044.json +++ b/2024/CVE-2024-0044.json @@ -267,7 +267,7 @@ "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -277,7 +277,7 @@ "mobile-security" ], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 5, "score": 0, "subscribers_count": 2 diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index cebf9ec559..4865e1d09f 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -14,10 +14,10 @@ "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "fork": false, "created_at": "2024-03-20T21:16:41Z", - "updated_at": "2024-12-17T20:19:30Z", + "updated_at": "2024-12-19T09:58:05Z", "pushed_at": "2024-04-17T16:09:54Z", - "stargazers_count": 2301, - "watchers_count": 2301, + "stargazers_count": 2302, + "watchers_count": 2302, "has_discussions": false, "forks_count": 299, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 299, - "watchers": 2301, + "watchers": 2302, "score": 0, "subscribers_count": 26 }, diff --git a/2024/CVE-2024-23897.json b/2024/CVE-2024-23897.json index 1650620e83..58dc0a83a7 100644 --- a/2024/CVE-2024-23897.json +++ b/2024/CVE-2024-23897.json @@ -615,13 +615,13 @@ "stargazers_count": 19, "watchers_count": 19, "has_discussions": false, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 3, + "forks": 4, "watchers": 19, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-24919.json b/2024/CVE-2024-24919.json index e92d35f0f9..8d15253e9e 100644 --- a/2024/CVE-2024-24919.json +++ b/2024/CVE-2024-24919.json @@ -532,13 +532,13 @@ "stargazers_count": 11, "watchers_count": 11, "has_discussions": false, - "forks_count": 8, + "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 8, + "forks": 9, "watchers": 11, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-35250.json b/2024/CVE-2024-35250.json index 1dcf670233..b0171fc71d 100644 --- a/2024/CVE-2024-35250.json +++ b/2024/CVE-2024-35250.json @@ -19,13 +19,13 @@ "stargazers_count": 239, "watchers_count": 239, "has_discussions": false, - "forks_count": 51, + "forks_count": 53, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 51, + "forks": 53, "watchers": 239, "score": 0, "subscribers_count": 6 diff --git a/2024/CVE-2024-38472.json b/2024/CVE-2024-38472.json index ddb4c6a6ce..420ddd12fb 100644 --- a/2024/CVE-2024-38472.json +++ b/2024/CVE-2024-38472.json @@ -45,10 +45,10 @@ "description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709", "fork": false, "created_at": "2024-10-05T20:32:45Z", - "updated_at": "2024-12-18T11:54:19Z", + "updated_at": "2024-12-19T12:17:40Z", "pushed_at": "2024-10-05T20:37:02Z", - "stargazers_count": 40, - "watchers_count": 40, + "stargazers_count": 43, + "watchers_count": 43, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -68,7 +68,7 @@ ], "visibility": "public", "forks": 8, - "watchers": 40, + "watchers": 43, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-38819.json b/2024/CVE-2024-38819.json index b52486ac11..05ebfdd418 100644 --- a/2024/CVE-2024-38819.json +++ b/2024/CVE-2024-38819.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2024-12-14T09:22:33Z", - "updated_at": "2024-12-18T08:29:08Z", + "updated_at": "2024-12-19T11:17:58Z", "pushed_at": "2024-12-14T10:13:45Z", - "stargazers_count": 27, - "watchers_count": 27, + "stargazers_count": 28, + "watchers_count": 28, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 27, + "watchers": 28, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-4367.json b/2024/CVE-2024-4367.json index 9a431b9c59..9b043a569a 100644 --- a/2024/CVE-2024-4367.json +++ b/2024/CVE-2024-4367.json @@ -278,7 +278,7 @@ "description": null, "fork": false, "created_at": "2024-09-04T14:43:33Z", - "updated_at": "2024-12-10T12:07:46Z", + "updated_at": "2024-12-19T08:12:18Z", "pushed_at": "2024-09-04T15:17:57Z", "stargazers_count": 2, "watchers_count": 2, diff --git a/2024/CVE-2024-44765.json b/2024/CVE-2024-44765.json index 6512ef0f9d..0ed60dc694 100644 --- a/2024/CVE-2024-44765.json +++ b/2024/CVE-2024-44765.json @@ -14,8 +14,8 @@ "description": "How to \"recover\" a CloudPanel server affected by the CVE-2024-44765 vulnerability", "fork": false, "created_at": "2024-12-17T13:29:38Z", - "updated_at": "2024-12-18T07:17:58Z", - "pushed_at": "2024-12-18T07:17:55Z", + "updated_at": "2024-12-19T06:50:10Z", + "pushed_at": "2024-12-19T06:50:07Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-45337.json b/2024/CVE-2024-45337.json index 8d91056991..e5f000baa2 100644 --- a/2024/CVE-2024-45337.json +++ b/2024/CVE-2024-45337.json @@ -14,10 +14,10 @@ "description": "Proof of concept (POC) for CVE-2024-45337 ", "fork": false, "created_at": "2024-12-17T22:07:53Z", - "updated_at": "2024-12-19T03:53:11Z", + "updated_at": "2024-12-19T08:35:28Z", "pushed_at": "2024-12-17T22:27:03Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -36,7 +36,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-48990.json b/2024/CVE-2024-48990.json index 328c000984..2e0dcdca8d 100644 --- a/2024/CVE-2024-48990.json +++ b/2024/CVE-2024-48990.json @@ -138,10 +138,10 @@ "description": "Testing POC for use cases", "fork": false, "created_at": "2024-11-24T07:33:06Z", - "updated_at": "2024-12-03T10:12:28Z", + "updated_at": "2024-12-19T12:14:05Z", "pushed_at": "2024-11-24T07:56:49Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -150,7 +150,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 9, + "watchers": 10, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-49039.json b/2024/CVE-2024-49039.json index 8b43175aab..7063149606 100644 --- a/2024/CVE-2024-49039.json +++ b/2024/CVE-2024-49039.json @@ -14,19 +14,19 @@ "description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler", "fork": false, "created_at": "2024-11-19T08:57:18Z", - "updated_at": "2024-12-19T03:04:12Z", + "updated_at": "2024-12-19T08:08:51Z", "pushed_at": "2024-11-19T09:15:26Z", - "stargazers_count": 93, - "watchers_count": 93, + "stargazers_count": 94, + "watchers_count": 94, "has_discussions": false, - "forks_count": 20, + "forks_count": 21, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 20, - "watchers": 93, + "forks": 21, + "watchers": 94, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-50379.json b/2024/CVE-2024-50379.json index 4668e53b73..dfeafc460a 100644 --- a/2024/CVE-2024-50379.json +++ b/2024/CVE-2024-50379.json @@ -14,19 +14,19 @@ "description": null, "fork": false, "created_at": "2024-12-18T19:53:46Z", - "updated_at": "2024-12-19T06:00:44Z", + "updated_at": "2024-12-19T12:04:43Z", "pushed_at": "2024-12-19T06:00:40Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 11, + "watchers_count": 11, "has_discussions": false, - "forks_count": 1, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, - "watchers": 3, + "forks": 3, + "watchers": 11, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-53375.json b/2024/CVE-2024-53375.json index 02ee5375cb..1379eb00a7 100644 --- a/2024/CVE-2024-53375.json +++ b/2024/CVE-2024-53375.json @@ -14,10 +14,10 @@ "description": "TP-Link Archer AXE75 Authenticated Command Injection", "fork": false, "created_at": "2024-10-04T12:49:19Z", - "updated_at": "2024-12-05T06:35:12Z", - "pushed_at": "2024-11-23T00:33:39Z", - "stargazers_count": 3, - "watchers_count": 3, + "updated_at": "2024-12-19T09:34:37Z", + "pushed_at": "2024-12-19T09:34:33Z", + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-53376.json b/2024/CVE-2024-53376.json index c4be39dd41..acc6e929e0 100644 --- a/2024/CVE-2024-53376.json +++ b/2024/CVE-2024-53376.json @@ -14,8 +14,8 @@ "description": "CyberPanel authenticated RCE < 2.3.8", "fork": false, "created_at": "2024-12-15T22:40:52Z", - "updated_at": "2024-12-18T08:12:19Z", - "pushed_at": "2024-12-15T23:04:43Z", + "updated_at": "2024-12-19T09:37:02Z", + "pushed_at": "2024-12-19T09:36:58Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, diff --git a/2024/CVE-2024-53677.json b/2024/CVE-2024-53677.json index bc13247e4b..8459dc5ef3 100644 --- a/2024/CVE-2024-53677.json +++ b/2024/CVE-2024-53677.json @@ -45,7 +45,7 @@ "description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.", "fork": false, "created_at": "2024-12-13T17:42:55Z", - "updated_at": "2024-12-19T03:41:08Z", + "updated_at": "2024-12-19T08:53:55Z", "pushed_at": "2024-12-19T03:23:02Z", "stargazers_count": 59, "watchers_count": 59, @@ -76,10 +76,10 @@ "description": null, "fork": false, "created_at": "2024-12-17T02:22:38Z", - "updated_at": "2024-12-17T15:20:06Z", + "updated_at": "2024-12-19T11:52:08Z", "pushed_at": "2024-12-17T08:52:36Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-55875.json b/2024/CVE-2024-55875.json index 840c4b78e9..36b7bd4870 100644 --- a/2024/CVE-2024-55875.json +++ b/2024/CVE-2024-55875.json @@ -14,10 +14,10 @@ "description": "CVE-2024-55875 | GHSA-7mj5-hjjj-8rgw | http4k first CVE", "fork": false, "created_at": "2024-12-13T06:21:36Z", - "updated_at": "2024-12-18T02:20:59Z", + "updated_at": "2024-12-19T09:42:49Z", "pushed_at": "2024-12-13T07:28:34Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json index f4a0d8b284..6a28c2b319 100644 --- a/2024/CVE-2024-6387.json +++ b/2024/CVE-2024-6387.json @@ -76,10 +76,10 @@ "description": "MIRROR of the original 32-bit PoC for CVE-2024-6387 \"regreSSHion\" by 7etsuo\/cve-2024-6387-poc", "fork": false, "created_at": "2024-07-01T12:26:40Z", - "updated_at": "2024-12-02T15:22:52Z", + "updated_at": "2024-12-19T06:57:29Z", "pushed_at": "2024-07-25T04:23:11Z", - "stargazers_count": 109, - "watchers_count": 109, + "stargazers_count": 110, + "watchers_count": 110, "has_discussions": false, "forks_count": 42, "allow_forking": true, @@ -95,7 +95,7 @@ ], "visibility": "public", "forks": 42, - "watchers": 109, + "watchers": 110, "score": 0, "subscribers_count": 4 }, @@ -1355,10 +1355,10 @@ "description": "PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (Scanner and Exploit) ", "fork": false, "created_at": "2024-07-02T18:32:46Z", - "updated_at": "2024-12-18T15:57:27Z", + "updated_at": "2024-12-19T06:44:14Z", "pushed_at": "2024-07-05T15:19:28Z", - "stargazers_count": 69, - "watchers_count": 69, + "stargazers_count": 70, + "watchers_count": 70, "has_discussions": false, "forks_count": 28, "allow_forking": true, @@ -1376,7 +1376,7 @@ ], "visibility": "public", "forks": 28, - "watchers": 69, + "watchers": 70, "score": 0, "subscribers_count": 2 }, @@ -2869,8 +2869,8 @@ "description": null, "fork": false, "created_at": "2024-12-19T03:08:19Z", - "updated_at": "2024-12-19T06:22:28Z", - "pushed_at": "2024-12-19T06:22:25Z", + "updated_at": "2024-12-19T06:49:55Z", + "pushed_at": "2024-12-19T06:49:52Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, @@ -2884,5 +2884,36 @@ "watchers": 0, "score": 0, "subscribers_count": 0 + }, + { + "id": 905684125, + "name": "test_for6387", + "full_name": "awusan125\/test_for6387", + "owner": { + "login": "awusan125", + "id": 74240688, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74240688?v=4", + "html_url": "https:\/\/github.com\/awusan125", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/awusan125\/test_for6387", + "description": "test code for cve-2024-6387", + "fork": false, + "created_at": "2024-12-19T10:16:45Z", + "updated_at": "2024-12-19T11:21:31Z", + "pushed_at": "2024-12-19T11:21:28Z", + "stargazers_count": 3, + "watchers_count": 3, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 3, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-7479.json b/2024/CVE-2024-7479.json index b7761958c8..ed38b3902e 100644 --- a/2024/CVE-2024-7479.json +++ b/2024/CVE-2024-7479.json @@ -14,10 +14,10 @@ "description": "TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.", "fork": false, "created_at": "2024-09-29T10:58:15Z", - "updated_at": "2024-12-14T21:15:50Z", + "updated_at": "2024-12-19T09:47:20Z", "pushed_at": "2024-10-04T09:39:09Z", - "stargazers_count": 129, - "watchers_count": 129, + "stargazers_count": 130, + "watchers_count": 130, "has_discussions": false, "forks_count": 20, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 20, - "watchers": 129, + "watchers": 130, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-9935.json b/2024/CVE-2024-9935.json index 7c2255c90f..8b27f80ef0 100644 --- a/2024/CVE-2024-9935.json +++ b/2024/CVE-2024-9935.json @@ -29,5 +29,43 @@ "watchers": 2, "score": 0, "subscribers_count": 1 + }, + { + "id": 905650504, + "name": "CVE-2024-9935", + "full_name": "verylazytech\/CVE-2024-9935", + "owner": { + "login": "verylazytech", + "id": 172168670, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172168670?v=4", + "html_url": "https:\/\/github.com\/verylazytech", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/verylazytech\/CVE-2024-9935", + "description": "PDF Generator Addon for Elementor Page Builder <= 1.7.5 - Unauthenticated Arbitrary File Download", + "fork": false, + "created_at": "2024-12-19T08:57:30Z", + "updated_at": "2024-12-19T09:56:40Z", + "pushed_at": "2024-12-19T09:43:37Z", + "stargazers_count": 3, + "watchers_count": 3, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "cve-2024-9935", + "elementor-page-builder", + "lfi", + "lfi-exploitation", + "unauthenticated-arbitrary-file-download", + "wordpress-plugin" + ], + "visibility": "public", + "forks": 0, + "watchers": 3, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index 71b4efe3b9..32c585b2b9 100644 --- a/README.md +++ b/README.md @@ -1433,6 +1433,7 @@ - [identity-threat-labs/Article-RegreSSHion-CVE-2024-6387](https://github.com/identity-threat-labs/Article-RegreSSHion-CVE-2024-6387) - [YassDEV221608/CVE-2024-6387](https://github.com/YassDEV221608/CVE-2024-6387) - [zql-gif/CVE-2024-6387](https://github.com/zql-gif/CVE-2024-6387) +- [awusan125/test_for6387](https://github.com/awusan125/test_for6387) ### CVE-2024-6473 (2024-09-03) @@ -1987,6 +1988,7 @@ - [RandomRobbieBF/CVE-2024-9935](https://github.com/RandomRobbieBF/CVE-2024-9935) +- [verylazytech/CVE-2024-9935](https://github.com/verylazytech/CVE-2024-9935) ### CVE-2024-9955 (2024-10-15) @@ -37833,6 +37835,7 @@ - [0x4r2/Webmin-CVE-2019-15107](https://github.com/0x4r2/Webmin-CVE-2019-15107) - [NasrallahBaadi/CVE-2019-15107](https://github.com/NasrallahBaadi/CVE-2019-15107) - [grayorwhite/CVE-2019-15107](https://github.com/grayorwhite/CVE-2019-15107) +- [MasterCode112/CVE-2019-15107](https://github.com/MasterCode112/CVE-2019-15107) ### CVE-2019-15120 (2019-08-16)