diff --git a/2014/CVE-2014-0160.json b/2014/CVE-2014-0160.json index 3ef7a3bb2e..e9e7af4f20 100644 --- a/2014/CVE-2014-0160.json +++ b/2014/CVE-2014-0160.json @@ -14,10 +14,10 @@ "description": "A checker (site and tool) for CVE-2014-0160", "fork": false, "created_at": "2014-04-07T23:03:09Z", - "updated_at": "2024-12-20T15:53:58Z", + "updated_at": "2024-12-30T01:43:06Z", "pushed_at": "2021-02-24T09:17:24Z", - "stargazers_count": 2307, - "watchers_count": 2307, + "stargazers_count": 2306, + "watchers_count": 2306, "has_discussions": false, "forks_count": 461, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 461, - "watchers": 2307, + "watchers": 2306, "score": 0, "subscribers_count": 117 }, diff --git a/2017/CVE-2017-5941.json b/2017/CVE-2017-5941.json index bf8e4c4aa0..665a100e9e 100644 --- a/2017/CVE-2017-5941.json +++ b/2017/CVE-2017-5941.json @@ -46,7 +46,7 @@ "fork": false, "created_at": "2023-03-30T06:39:25Z", "updated_at": "2023-11-15T05:13:25Z", - "pushed_at": "2024-12-23T03:21:47Z", + "pushed_at": "2024-12-30T04:44:50Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2017/CVE-2017-7494.json b/2017/CVE-2017-7494.json index 5dfc862316..a1c9160f77 100644 --- a/2017/CVE-2017-7494.json +++ b/2017/CVE-2017-7494.json @@ -14,10 +14,10 @@ "description": "Proof-of-Concept exploit for CVE-2017-7494(Samba RCE from a writable share)", "fork": false, "created_at": "2017-05-25T13:20:56Z", - "updated_at": "2024-11-14T16:55:11Z", + "updated_at": "2024-12-30T02:15:44Z", "pushed_at": "2017-07-26T13:07:51Z", - "stargazers_count": 178, - "watchers_count": 178, + "stargazers_count": 179, + "watchers_count": 179, "has_discussions": false, "forks_count": 59, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 59, - "watchers": 178, + "watchers": 179, "score": 0, "subscribers_count": 11 }, diff --git a/2019/CVE-2019-12750.json b/2019/CVE-2019-12750.json index 20c1b2ba85..06b2cb9fc8 100644 --- a/2019/CVE-2019-12750.json +++ b/2019/CVE-2019-12750.json @@ -14,10 +14,10 @@ "description": "sploit", "fork": false, "created_at": "2019-12-21T00:44:25Z", - "updated_at": "2024-08-12T19:55:55Z", + "updated_at": "2024-12-30T02:47:25Z", "pushed_at": "2019-12-21T00:56:27Z", - "stargazers_count": 67, - "watchers_count": 67, + "stargazers_count": 68, + "watchers_count": 68, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 67, + "watchers": 68, "score": 0, "subscribers_count": 4 } diff --git a/2020/CVE-2020-1034.json b/2020/CVE-2020-1034.json index dac8903b4c..a1454d33d2 100644 --- a/2020/CVE-2020-1034.json +++ b/2020/CVE-2020-1034.json @@ -14,10 +14,10 @@ "description": "PoC demonstrating the use of cve-2020-1034 for privilege escalation", "fork": false, "created_at": "2020-11-23T10:24:07Z", - "updated_at": "2024-10-29T16:00:28Z", + "updated_at": "2024-12-30T05:44:20Z", "pushed_at": "2021-03-16T13:53:37Z", - "stargazers_count": 119, - "watchers_count": 119, + "stargazers_count": 120, + "watchers_count": 120, "has_discussions": false, "forks_count": 40, "allow_forking": true, @@ -33,7 +33,7 @@ ], "visibility": "public", "forks": 40, - "watchers": 119, + "watchers": 120, "score": 0, "subscribers_count": 6 }, diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 5110e9e02b..6e708a03eb 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -176,10 +176,10 @@ "description": "Exploit for zerologon cve-2020-1472", "fork": false, "created_at": "2020-09-14T19:19:07Z", - "updated_at": "2024-12-28T12:03:52Z", + "updated_at": "2024-12-30T05:52:23Z", "pushed_at": "2020-10-15T18:31:15Z", - "stargazers_count": 640, - "watchers_count": 640, + "stargazers_count": 641, + "watchers_count": 641, "has_discussions": false, "forks_count": 147, "allow_forking": true, @@ -188,7 +188,7 @@ "topics": [], "visibility": "public", "forks": 147, - "watchers": 640, + "watchers": 641, "score": 0, "subscribers_count": 12 }, diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index 5392bd5346..45929fb5a2 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -50,13 +50,13 @@ "stargazers_count": 1850, "watchers_count": 1850, "has_discussions": false, - "forks_count": 583, + "forks_count": 584, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 583, + "forks": 584, "watchers": 1850, "score": 0, "subscribers_count": 43 diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index d0c2e56cbe..78e3428930 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -50,10 +50,10 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-13T10:28:12Z", - "updated_at": "2024-12-25T04:43:07Z", + "updated_at": "2024-12-30T03:18:17Z", "pushed_at": "2023-01-29T03:31:27Z", - "stargazers_count": 818, - "watchers_count": 818, + "stargazers_count": 819, + "watchers_count": 819, "has_discussions": false, "forks_count": 124, "allow_forking": true, @@ -62,7 +62,7 @@ "topics": [], "visibility": "public", "forks": 124, - "watchers": 818, + "watchers": 819, "score": 0, "subscribers_count": 13 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index d3e9701911..b9ae244919 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -935,10 +935,10 @@ "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2021-12-10T23:19:28Z", - "updated_at": "2024-12-29T13:50:48Z", + "updated_at": "2024-12-30T03:30:40Z", "pushed_at": "2024-02-12T22:37:25Z", - "stargazers_count": 1811, - "watchers_count": 1811, + "stargazers_count": 1812, + "watchers_count": 1812, "has_discussions": false, "forks_count": 530, "allow_forking": true, @@ -952,7 +952,7 @@ ], "visibility": "public", "forks": 530, - "watchers": 1811, + "watchers": 1812, "score": 0, "subscribers_count": 26 }, diff --git a/2022/CVE-2022-21882.json b/2022/CVE-2022-21882.json index 16805a98b7..18925ffd8c 100644 --- a/2022/CVE-2022-21882.json +++ b/2022/CVE-2022-21882.json @@ -125,7 +125,7 @@ "forks": 18, "watchers": 48, "score": 0, - "subscribers_count": 4 + "subscribers_count": 5 }, { "id": 459331281, diff --git a/2022/CVE-2022-24483.json b/2022/CVE-2022-24483.json index a005820c39..49e72a3990 100644 --- a/2022/CVE-2022-24483.json +++ b/2022/CVE-2022-24483.json @@ -28,6 +28,6 @@ "forks": 7, "watchers": 15, "score": 0, - "subscribers_count": 5 + "subscribers_count": 6 } ] \ No newline at end of file diff --git a/2022/CVE-2022-29078.json b/2022/CVE-2022-29078.json index 8ffd01c85c..7b74e78eb6 100644 --- a/2022/CVE-2022-29078.json +++ b/2022/CVE-2022-29078.json @@ -96,6 +96,6 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 1 + "subscribers_count": 2 } ] \ No newline at end of file diff --git a/2023/CVE-2023-0386.json b/2023/CVE-2023-0386.json index 3cbd4461fa..29d0c7ef03 100644 --- a/2023/CVE-2023-0386.json +++ b/2023/CVE-2023-0386.json @@ -90,7 +90,7 @@ "forks": 64, "watchers": 387, "score": 0, - "subscribers_count": 4 + "subscribers_count": 5 }, { "id": 636975790, diff --git a/2023/CVE-2023-27746.json b/2023/CVE-2023-27746.json index f4389c83e4..d60e0b3f71 100644 --- a/2023/CVE-2023-27746.json +++ b/2023/CVE-2023-27746.json @@ -32,6 +32,6 @@ "forks": 1, "watchers": 9, "score": 0, - "subscribers_count": 4 + "subscribers_count": 5 } ] \ No newline at end of file diff --git a/2023/CVE-2023-32413.json b/2023/CVE-2023-32413.json index 3a9683c9ef..3fe958a67c 100644 --- a/2023/CVE-2023-32413.json +++ b/2023/CVE-2023-32413.json @@ -28,6 +28,6 @@ "forks": 1, "watchers": 11, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-36874.json b/2023/CVE-2023-36874.json index 81deddd905..b51989d6f1 100644 --- a/2023/CVE-2023-36874.json +++ b/2023/CVE-2023-36874.json @@ -121,6 +121,6 @@ "forks": 27, "watchers": 205, "score": 0, - "subscribers_count": 4 + "subscribers_count": 5 } ] \ No newline at end of file diff --git a/2023/CVE-2023-38545.json b/2023/CVE-2023-38545.json index 39698751c4..88db31e11f 100644 --- a/2023/CVE-2023-38545.json +++ b/2023/CVE-2023-38545.json @@ -107,10 +107,10 @@ "description": "Dockerfile containing all the necessary setup files to demo the exploit ", "fork": false, "created_at": "2023-10-12T16:48:26Z", - "updated_at": "2024-04-02T05:39:46Z", + "updated_at": "2024-12-30T06:24:42Z", "pushed_at": "2023-10-13T10:10:43Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-38831.json b/2023/CVE-2023-38831.json index 066e2d6a34..8a787fca5b 100644 --- a/2023/CVE-2023-38831.json +++ b/2023/CVE-2023-38831.json @@ -45,10 +45,10 @@ "description": "CVE-2023-38831 winrar exploit generator", "fork": false, "created_at": "2023-08-25T09:44:08Z", - "updated_at": "2024-12-23T13:48:07Z", + "updated_at": "2024-12-30T03:50:48Z", "pushed_at": "2023-11-26T06:46:44Z", - "stargazers_count": 784, - "watchers_count": 784, + "stargazers_count": 785, + "watchers_count": 785, "has_discussions": false, "forks_count": 140, "allow_forking": true, @@ -61,7 +61,7 @@ ], "visibility": "public", "forks": 140, - "watchers": 784, + "watchers": 785, "score": 0, "subscribers_count": 9 }, @@ -1635,5 +1635,36 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 909912770, + "name": "winrar-cve-2023-38831", + "full_name": "kuyrathdaro\/winrar-cve-2023-38831", + "owner": { + "login": "kuyrathdaro", + "id": 92511754, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92511754?v=4", + "html_url": "https:\/\/github.com\/kuyrathdaro", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/kuyrathdaro\/winrar-cve-2023-38831", + "description": "POC Exploit Script in Python", + "fork": false, + "created_at": "2024-12-30T03:33:23Z", + "updated_at": "2024-12-30T03:33:23Z", + "pushed_at": "2024-12-30T03:33:23Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-10793.json b/2024/CVE-2024-10793.json index bb66b307b6..8ceeef61f7 100644 --- a/2024/CVE-2024-10793.json +++ b/2024/CVE-2024-10793.json @@ -14,10 +14,10 @@ "description": "CVE-2024-10793 poc exploit", "fork": false, "created_at": "2024-11-17T18:44:53Z", - "updated_at": "2024-12-19T13:21:31Z", + "updated_at": "2024-12-30T01:27:43Z", "pushed_at": "2024-11-17T19:51:53Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 6, + "watchers": 7, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index 8c9d4a3b88..bf8812a5a4 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -206,10 +206,10 @@ "description": null, "fork": false, "created_at": "2024-12-16T17:33:13Z", - "updated_at": "2024-12-19T12:32:50Z", + "updated_at": "2024-12-30T01:06:13Z", "pushed_at": "2024-12-16T17:38:23Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -218,7 +218,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 7, + "watchers": 8, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-20017.json b/2024/CVE-2024-20017.json index 4a89552044..82c1ff266b 100644 --- a/2024/CVE-2024-20017.json +++ b/2024/CVE-2024-20017.json @@ -14,10 +14,10 @@ "description": "exploits for CVE-2024-20017", "fork": false, "created_at": "2024-08-30T05:54:36Z", - "updated_at": "2024-12-24T00:01:39Z", + "updated_at": "2024-12-30T02:37:38Z", "pushed_at": "2024-09-07T10:11:22Z", - "stargazers_count": 137, - "watchers_count": 137, + "stargazers_count": 138, + "watchers_count": 138, "has_discussions": false, "forks_count": 32, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 32, - "watchers": 137, + "watchers": 138, "score": 0, "subscribers_count": 3 } diff --git a/2024/CVE-2024-21182.json b/2024/CVE-2024-21182.json index fc50b72f36..b9f568cbf3 100644 --- a/2024/CVE-2024-21182.json +++ b/2024/CVE-2024-21182.json @@ -14,19 +14,19 @@ "description": "PoC for CVE-2024-21182", "fork": false, "created_at": "2024-12-29T15:48:03Z", - "updated_at": "2024-12-29T20:17:47Z", + "updated_at": "2024-12-30T05:47:42Z", "pushed_at": "2024-12-29T15:56:14Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, - "watchers": 2, + "forks": 2, + "watchers": 8, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-23334.json b/2024/CVE-2024-23334.json index a3f4c436c7..f8fd8c9f07 100644 --- a/2024/CVE-2024-23334.json +++ b/2024/CVE-2024-23334.json @@ -76,10 +76,10 @@ "description": "A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1", "fork": false, "created_at": "2024-03-18T20:39:27Z", - "updated_at": "2024-12-29T20:53:12Z", + "updated_at": "2024-12-30T04:28:59Z", "pushed_at": "2024-03-19T06:37:30Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 16, + "watchers_count": 16, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 15, + "watchers": 16, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-23897.json b/2024/CVE-2024-23897.json index 1f2f6c14c3..aab3e6bc8f 100644 --- a/2024/CVE-2024-23897.json +++ b/2024/CVE-2024-23897.json @@ -610,10 +610,10 @@ "description": "POC for CVE-2024-23897 Jenkins File-Read ", "fork": false, "created_at": "2024-02-16T07:16:04Z", - "updated_at": "2024-12-04T18:06:10Z", + "updated_at": "2024-12-30T02:06:36Z", "pushed_at": "2024-02-17T16:39:19Z", - "stargazers_count": 19, - "watchers_count": 19, + "stargazers_count": 20, + "watchers_count": 20, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -622,7 +622,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 19, + "watchers": 20, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-38819.json b/2024/CVE-2024-38819.json index ef552b7bb8..871fc37bc4 100644 --- a/2024/CVE-2024-38819.json +++ b/2024/CVE-2024-38819.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2024-12-14T09:22:33Z", - "updated_at": "2024-12-23T02:20:40Z", + "updated_at": "2024-12-30T01:25:25Z", "pushed_at": "2024-12-14T10:13:45Z", - "stargazers_count": 31, - "watchers_count": 31, + "stargazers_count": 32, + "watchers_count": 32, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 10, - "watchers": 31, + "watchers": 32, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-45440.json b/2024/CVE-2024-45440.json index a7dcc4d86a..18948c6a34 100644 --- a/2024/CVE-2024-45440.json +++ b/2024/CVE-2024-45440.json @@ -14,10 +14,10 @@ "description": "Drupal CVE-2024-45440", "fork": false, "created_at": "2024-12-26T13:35:42Z", - "updated_at": "2024-12-29T13:56:26Z", + "updated_at": "2024-12-30T06:27:01Z", "pushed_at": "2024-12-29T13:56:23Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-45519.json b/2024/CVE-2024-45519.json index 9b18749b5b..b344a45775 100644 --- a/2024/CVE-2024-45519.json +++ b/2024/CVE-2024-45519.json @@ -45,10 +45,10 @@ "description": "Zimbra - Remote Command Execution (CVE-2024-45519)", "fork": false, "created_at": "2024-10-05T00:15:18Z", - "updated_at": "2024-12-21T22:19:18Z", + "updated_at": "2024-12-30T01:00:54Z", "pushed_at": "2024-11-05T10:10:40Z", - "stargazers_count": 116, - "watchers_count": 116, + "stargazers_count": 117, + "watchers_count": 117, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 116, + "watchers": 117, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-4577.json b/2024/CVE-2024-4577.json index 7ea61486d5..0d79cbdee9 100644 --- a/2024/CVE-2024-4577.json +++ b/2024/CVE-2024-4577.json @@ -610,10 +610,10 @@ "description": "PHP CGI Argument Injection vulnerability", "fork": false, "created_at": "2024-06-09T14:18:21Z", - "updated_at": "2024-11-06T06:56:51Z", + "updated_at": "2024-12-30T06:10:32Z", "pushed_at": "2024-06-09T14:20:36Z", - "stargazers_count": 31, - "watchers_count": 31, + "stargazers_count": 30, + "watchers_count": 30, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -622,7 +622,7 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 31, + "watchers": 30, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-49039.json b/2024/CVE-2024-49039.json index d325adecac..be97a83ae0 100644 --- a/2024/CVE-2024-49039.json +++ b/2024/CVE-2024-49039.json @@ -14,10 +14,10 @@ "description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler", "fork": false, "created_at": "2024-11-19T08:57:18Z", - "updated_at": "2024-12-29T11:56:58Z", + "updated_at": "2024-12-30T02:49:58Z", "pushed_at": "2024-11-19T09:15:26Z", - "stargazers_count": 112, - "watchers_count": 112, + "stargazers_count": 114, + "watchers_count": 114, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 23, - "watchers": 112, + "watchers": 114, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-50379.json b/2024/CVE-2024-50379.json index b698060874..78219b2a4e 100644 --- a/2024/CVE-2024-50379.json +++ b/2024/CVE-2024-50379.json @@ -169,19 +169,19 @@ "description": "RCE through a race condition in Apache Tomcat", "fork": false, "created_at": "2024-12-21T05:54:29Z", - "updated_at": "2024-12-29T20:10:41Z", + "updated_at": "2024-12-30T06:12:34Z", "pushed_at": "2024-12-21T08:56:44Z", - "stargazers_count": 29, - "watchers_count": 29, + "stargazers_count": 37, + "watchers_count": 37, "has_discussions": false, - "forks_count": 4, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 4, - "watchers": 29, + "forks": 5, + "watchers": 37, "score": 0, "subscribers_count": 2 }, @@ -262,10 +262,10 @@ "description": "CVE-2024-50379-exp", "fork": false, "created_at": "2024-12-25T02:41:31Z", - "updated_at": "2024-12-28T16:24:51Z", + "updated_at": "2024-12-30T01:38:07Z", "pushed_at": "2024-12-26T08:52:15Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -274,7 +274,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-51378.json b/2024/CVE-2024-51378.json index f81d12452f..a9e4f4ace7 100644 --- a/2024/CVE-2024-51378.json +++ b/2024/CVE-2024-51378.json @@ -14,19 +14,19 @@ "description": "Exploit for CyberPanel Pre-Auth RCE via Command Injection", "fork": false, "created_at": "2024-10-29T23:34:27Z", - "updated_at": "2024-12-24T06:37:27Z", + "updated_at": "2024-12-30T05:43:33Z", "pushed_at": "2024-11-01T10:12:49Z", - "stargazers_count": 18, - "watchers_count": 18, + "stargazers_count": 19, + "watchers_count": 19, "has_discussions": false, - "forks_count": 5, + "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 5, - "watchers": 18, + "forks": 6, + "watchers": 19, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-53677.json b/2024/CVE-2024-53677.json index bebfc982c6..c22f19eb5e 100644 --- a/2024/CVE-2024-53677.json +++ b/2024/CVE-2024-53677.json @@ -45,10 +45,10 @@ "description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.", "fork": false, "created_at": "2024-12-13T17:42:55Z", - "updated_at": "2024-12-28T05:47:35Z", + "updated_at": "2024-12-30T01:26:36Z", "pushed_at": "2024-12-20T10:05:15Z", - "stargazers_count": 76, - "watchers_count": 76, + "stargazers_count": 77, + "watchers_count": 77, "has_discussions": false, "forks_count": 29, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 29, - "watchers": 76, + "watchers": 77, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-54152.json b/2024/CVE-2024-54152.json new file mode 100644 index 0000000000..d541d3d2f5 --- /dev/null +++ b/2024/CVE-2024-54152.json @@ -0,0 +1,33 @@ +[ + { + "id": 909882750, + "name": "CVE-2024-54152-poc", + "full_name": "math-x-io\/CVE-2024-54152-poc", + "owner": { + "login": "math-x-io", + "id": 97481289, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97481289?v=4", + "html_url": "https:\/\/github.com\/math-x-io", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/math-x-io\/CVE-2024-54152-poc", + "description": null, + "fork": false, + "created_at": "2024-12-30T01:07:48Z", + "updated_at": "2024-12-30T01:08:03Z", + "pushed_at": "2024-12-30T01:08:00Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-56145.json b/2024/CVE-2024-56145.json index fff59cf6b1..652114edd0 100644 --- a/2024/CVE-2024-56145.json +++ b/2024/CVE-2024-56145.json @@ -14,19 +14,19 @@ "description": "Unauthenticated RCE on CraftCMS when PHP `register_argc_argv` config setting is enabled", "fork": false, "created_at": "2024-12-20T03:34:01Z", - "updated_at": "2024-12-29T05:14:02Z", + "updated_at": "2024-12-30T05:43:26Z", "pushed_at": "2024-12-23T12:51:54Z", - "stargazers_count": 32, - "watchers_count": 32, + "stargazers_count": 33, + "watchers_count": 33, "has_discussions": false, - "forks_count": 8, + "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 8, - "watchers": 32, + "forks": 9, + "watchers": 33, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json index 75c587d258..f78e690e56 100644 --- a/2024/CVE-2024-6387.json +++ b/2024/CVE-2024-6387.json @@ -1355,10 +1355,10 @@ "description": "PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (Scanner and Exploit) ", "fork": false, "created_at": "2024-07-02T18:32:46Z", - "updated_at": "2024-12-27T08:50:45Z", + "updated_at": "2024-12-30T01:05:18Z", "pushed_at": "2024-07-05T15:19:28Z", - "stargazers_count": 71, - "watchers_count": 71, + "stargazers_count": 72, + "watchers_count": 72, "has_discussions": false, "forks_count": 28, "allow_forking": true, @@ -1376,7 +1376,7 @@ ], "visibility": "public", "forks": 28, - "watchers": 71, + "watchers": 72, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-6670.json b/2024/CVE-2024-6670.json index 98e13f9539..b74c1b0fcb 100644 --- a/2024/CVE-2024-6670.json +++ b/2024/CVE-2024-6670.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2024-08-30T17:13:14Z", - "updated_at": "2024-12-28T12:42:48Z", + "updated_at": "2024-12-30T03:37:03Z", "pushed_at": "2024-08-30T17:22:31Z", - "stargazers_count": 33, - "watchers_count": 33, + "stargazers_count": 34, + "watchers_count": 34, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 33, + "watchers": 34, "score": 0, "subscribers_count": 1 } diff --git a/README.md b/README.md index 5f77c3a192..4e0f22a985 100644 --- a/README.md +++ b/README.md @@ -7698,6 +7698,13 @@ - [0xdeviner/CVE-2024-53677](https://github.com/0xdeviner/CVE-2024-53677) - [Q0LT/VM-CVE-2024-53677](https://github.com/Q0LT/VM-CVE-2024-53677) +### CVE-2024-54152 (2024-12-10) + +Angular Expressions provides expressions for the Angular.JS web framework as a standalone module. Prior to version 1.4.3, an attacker can write a malicious expression that escapes the sandbox to execute arbitrary code on the system. With a more complex (undisclosed) payload, one can get full access to Arbitrary code execution on the system. The problem has been patched in version 1.4.3 of Angular Expressions. Two possible workarounds are available. One may either disable access to `__proto__` globally or make sure that one uses the function with just one argument. + + +- [math-x-io/CVE-2024-54152-poc](https://github.com/math-x-io/CVE-2024-54152-poc) + ### CVE-2024-54262 (2024-12-13) Unrestricted Upload of File with Dangerous Type vulnerability in Siddharth Nagar Import Export For WooCommerce allows Upload a Web Shell to a Web Server.This issue affects Import Export For WooCommerce: from n/a through 1.5. @@ -13462,6 +13469,7 @@ - [idkwastaken/CVE-2023-38831](https://github.com/idkwastaken/CVE-2023-38831) - [RonF98/CVE-2023-38831-POC](https://github.com/RonF98/CVE-2023-38831-POC) - [VictoriousKnight/CVE-2023-38831_Exploit](https://github.com/VictoriousKnight/CVE-2023-38831_Exploit) +- [kuyrathdaro/winrar-cve-2023-38831](https://github.com/kuyrathdaro/winrar-cve-2023-38831) ### CVE-2023-38836 (2023-08-21)