diff --git a/2015/CVE-2015-3825.json b/2015/CVE-2015-3825.json index 0bac5fca57..7af1871919 100644 --- a/2015/CVE-2015-3825.json +++ b/2015/CVE-2015-3825.json @@ -14,10 +14,10 @@ "description": "This app verifies if your device is still vulnerable to CVE-2015-3825 \/ CVE-2015-3837, aka \"One Class to Rule Them All\", by checking if it contains the vulnerable conscrypt's OpenSSLX509Certificate class. A patch was released in August 2015 by Google.", "fork": false, "created_at": "2016-02-13T08:57:44Z", - "updated_at": "2021-10-12T02:19:42Z", + "updated_at": "2024-10-20T16:26:49Z", "pushed_at": "2016-02-13T09:16:01Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 2 } diff --git a/2016/CVE-2016-10277.json b/2016/CVE-2016-10277.json index 3b1bd4cbc1..7a0bcf80d1 100644 --- a/2016/CVE-2016-10277.json +++ b/2016/CVE-2016-10277.json @@ -14,10 +14,10 @@ "description": "Motorola Untethered Jailbreak: Exploiting CVE-2016-10277 for Secure Boot and Device Locking bypass ", "fork": false, "created_at": "2017-06-06T12:00:27Z", - "updated_at": "2024-09-22T17:07:19Z", + "updated_at": "2024-10-20T16:21:02Z", "pushed_at": "2017-08-30T15:17:08Z", - "stargazers_count": 67, - "watchers_count": 67, + "stargazers_count": 68, + "watchers_count": 68, "has_discussions": false, "forks_count": 19, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 19, - "watchers": 67, + "watchers": 68, "score": 0, "subscribers_count": 18 }, diff --git a/2016/CVE-2016-8462.json b/2016/CVE-2016-8462.json index 2e26bb2fea..5f39c38e3d 100644 --- a/2016/CVE-2016-8462.json +++ b/2016/CVE-2016-8462.json @@ -14,10 +14,10 @@ "description": "Pixel bootlaoder exploit for reading flash storage", "fork": false, "created_at": "2016-10-28T16:26:18Z", - "updated_at": "2024-03-06T06:35:34Z", + "updated_at": "2024-10-20T16:28:09Z", "pushed_at": "2017-01-05T18:55:56Z", - "stargazers_count": 29, - "watchers_count": 29, + "stargazers_count": 30, + "watchers_count": 30, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 10, - "watchers": 29, + "watchers": 30, "score": 0, "subscribers_count": 6 } diff --git a/2016/CVE-2016-8467.json b/2016/CVE-2016-8467.json index dd25011b56..0d0e38cf91 100644 --- a/2016/CVE-2016-8467.json +++ b/2016/CVE-2016-8467.json @@ -14,10 +14,10 @@ "description": "This app checks if you're vulnerable to CVE-2016-8467 and\/or if your bootmode property has been tampered with.", "fork": false, "created_at": "2017-01-08T12:14:57Z", - "updated_at": "2017-12-22T21:03:43Z", + "updated_at": "2024-10-20T16:26:34Z", "pushed_at": "2017-01-08T13:17:27Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 3 } diff --git a/2017/CVE-2017-0785.json b/2017/CVE-2017-0785.json index 19c678bcf5..c6861c6f97 100644 --- a/2017/CVE-2017-0785.json +++ b/2017/CVE-2017-0785.json @@ -14,10 +14,10 @@ "description": "Blueborne CVE-2017-0785 Android information leak vulnerability", "fork": false, "created_at": "2017-09-20T23:32:29Z", - "updated_at": "2024-10-16T02:21:12Z", + "updated_at": "2024-10-20T16:30:15Z", "pushed_at": "2017-09-23T05:11:45Z", - "stargazers_count": 461, - "watchers_count": 461, + "stargazers_count": 462, + "watchers_count": 462, "has_discussions": false, "forks_count": 186, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 186, - "watchers": 461, + "watchers": 462, "score": 0, "subscribers_count": 45 }, diff --git a/2019/CVE-2019-1388.json b/2019/CVE-2019-1388.json index bb4b4d8cef..5caf0c178c 100644 --- a/2019/CVE-2019-1388.json +++ b/2019/CVE-2019-1388.json @@ -138,10 +138,10 @@ "description": null, "fork": false, "created_at": "2021-06-07T22:29:08Z", - "updated_at": "2024-10-03T05:15:35Z", + "updated_at": "2024-10-20T15:46:59Z", "pushed_at": "2021-06-07T22:31:35Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -150,7 +150,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 } diff --git a/2019/CVE-2019-15107.json b/2019/CVE-2019-15107.json index a5aa6e7707..70f75bb12a 100644 --- a/2019/CVE-2019-15107.json +++ b/2019/CVE-2019-15107.json @@ -575,15 +575,15 @@ { "id": 415535559, "name": "CVE-2019-15107_detection", - "full_name": "Tuz-Wwsd\/CVE-2019-15107_detection", + "full_name": "CyberTuz\/CVE-2019-15107_detection", "owner": { - "login": "Tuz-Wwsd", + "login": "CyberTuz", "id": 50274376, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50274376?v=4", - "html_url": "https:\/\/github.com\/Tuz-Wwsd", + "html_url": "https:\/\/github.com\/CyberTuz", "user_view_type": "public" }, - "html_url": "https:\/\/github.com\/Tuz-Wwsd\/CVE-2019-15107_detection", + "html_url": "https:\/\/github.com\/CyberTuz\/CVE-2019-15107_detection", "description": null, "fork": false, "created_at": "2021-10-10T09:05:55Z", diff --git a/2019/CVE-2019-1652.json b/2019/CVE-2019-1652.json index 144da289ce..f3cf9f88ce 100644 --- a/2019/CVE-2019-1652.json +++ b/2019/CVE-2019-1652.json @@ -14,10 +14,10 @@ "description": "CVE-2019-1652 \/CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!", "fork": false, "created_at": "2019-01-24T10:12:44Z", - "updated_at": "2024-10-15T10:20:42Z", + "updated_at": "2024-10-20T14:11:30Z", "pushed_at": "2019-02-08T12:38:05Z", - "stargazers_count": 225, - "watchers_count": 225, + "stargazers_count": 226, + "watchers_count": 226, "has_discussions": false, "forks_count": 65, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 65, - "watchers": 225, + "watchers": 226, "score": 0, "subscribers_count": 15 } diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index e619a7fb2f..337e1edfa0 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -1652,10 +1652,10 @@ "description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection", "fork": false, "created_at": "2020-06-10T16:44:39Z", - "updated_at": "2024-10-15T10:56:28Z", + "updated_at": "2024-10-20T14:10:38Z", "pushed_at": "2022-03-30T14:02:04Z", - "stargazers_count": 263, - "watchers_count": 263, + "stargazers_count": 264, + "watchers_count": 264, "has_discussions": false, "forks_count": 52, "allow_forking": true, @@ -1664,7 +1664,7 @@ "topics": [], "visibility": "public", "forks": 52, - "watchers": 263, + "watchers": 264, "score": 0, "subscribers_count": 7 }, diff --git a/2020/CVE-2020-35575.json b/2020/CVE-2020-35575.json index 3888d6ce16..da9022ebbc 100644 --- a/2020/CVE-2020-35575.json +++ b/2020/CVE-2020-35575.json @@ -14,10 +14,10 @@ "description": "password-disclosure issue in the web interface on certain TP-Link devices", "fork": false, "created_at": "2024-10-18T17:08:54Z", - "updated_at": "2024-10-18T17:14:22Z", + "updated_at": "2024-10-20T14:09:27Z", "pushed_at": "2024-10-18T17:14:18Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2020/CVE-2020-6287.json b/2020/CVE-2020-6287.json index f4990a7c67..00a5e0c1d1 100644 --- a/2020/CVE-2020-6287.json +++ b/2020/CVE-2020-6287.json @@ -200,10 +200,10 @@ "description": "Automated Exploit for CVE-2020-6287", "fork": false, "created_at": "2024-10-07T14:29:34Z", - "updated_at": "2024-10-07T14:45:03Z", + "updated_at": "2024-10-20T14:11:53Z", "pushed_at": "2024-10-07T14:45:00Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -212,7 +212,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index c6793ed6a4..e8e6379352 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -566,10 +566,10 @@ "description": "Laravel Debug mode RCE漏洞(CVE-2021-3129)poc \/ exp", "fork": false, "created_at": "2023-03-04T17:04:38Z", - "updated_at": "2024-04-22T11:52:24Z", + "updated_at": "2024-10-20T13:20:58Z", "pushed_at": "2023-03-04T17:10:43Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -578,7 +578,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 1 }, diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index bc3e978656..52b5b46898 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -2044,10 +2044,10 @@ "description": "Exploit for Ubuntu 20.04 using CVE-2021-3156 enhanced with post-exploitation scripts", "fork": false, "created_at": "2023-05-13T01:02:32Z", - "updated_at": "2024-08-28T22:51:33Z", + "updated_at": "2024-10-20T12:44:50Z", "pushed_at": "2023-05-13T07:48:55Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -2056,7 +2056,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 }, diff --git a/2022/CVE-2022-25479.json b/2022/CVE-2022-25479.json index 45dea12ff9..0ba736ab49 100644 --- a/2022/CVE-2022-25479.json +++ b/2022/CVE-2022-25479.json @@ -14,10 +14,10 @@ "description": "CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK) ", "fork": false, "created_at": "2024-09-17T06:28:17Z", - "updated_at": "2024-10-19T04:08:26Z", + "updated_at": "2024-10-20T14:41:47Z", "pushed_at": "2024-10-16T22:27:13Z", - "stargazers_count": 39, - "watchers_count": 39, + "stargazers_count": 40, + "watchers_count": 40, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 39, + "watchers": 40, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-3269.json b/2023/CVE-2023-3269.json index be3e41e6e9..2d920825d0 100644 --- a/2023/CVE-2023-3269.json +++ b/2023/CVE-2023-3269.json @@ -14,10 +14,10 @@ "description": "CVE-2023-3269: Linux kernel privilege escalation vulnerability", "fork": false, "created_at": "2023-06-28T13:22:26Z", - "updated_at": "2024-10-17T16:25:49Z", + "updated_at": "2024-10-20T15:33:49Z", "pushed_at": "2023-07-28T13:20:45Z", - "stargazers_count": 463, - "watchers_count": 463, + "stargazers_count": 464, + "watchers_count": 464, "has_discussions": false, "forks_count": 39, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 39, - "watchers": 463, + "watchers": 464, "score": 0, "subscribers_count": 15 } diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index 2d192f1141..2b2236b2e0 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -14,7 +14,7 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2024-10-20T11:08:25Z", + "updated_at": "2024-10-20T18:14:18Z", "pushed_at": "2024-08-18T08:26:46Z", "stargazers_count": 1227, "watchers_count": 1227, diff --git a/2024/CVE-2024-10140.json b/2024/CVE-2024-10140.json new file mode 100644 index 0000000000..57b07635c7 --- /dev/null +++ b/2024/CVE-2024-10140.json @@ -0,0 +1,33 @@ +[ + { + "id": 875667904, + "name": "CVE-2024-10140", + "full_name": "holypryx\/CVE-2024-10140", + "owner": { + "login": "holypryx", + "id": 182792867, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/182792867?v=4", + "html_url": "https:\/\/github.com\/holypryx", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/holypryx\/CVE-2024-10140", + "description": null, + "fork": false, + "created_at": "2024-10-20T15:29:14Z", + "updated_at": "2024-10-20T15:31:06Z", + "pushed_at": "2024-10-20T15:31:02Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-23334.json b/2024/CVE-2024-23334.json index 2c051d389c..2075a5f372 100644 --- a/2024/CVE-2024-23334.json +++ b/2024/CVE-2024-23334.json @@ -76,10 +76,10 @@ "description": "A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1", "fork": false, "created_at": "2024-03-18T20:39:27Z", - "updated_at": "2024-10-20T00:25:51Z", + "updated_at": "2024-10-20T15:02:10Z", "pushed_at": "2024-03-19T06:37:30Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 }, @@ -218,5 +218,36 @@ "watchers": 1, "score": 0, "subscribers_count": 1 + }, + { + "id": 875667799, + "name": "CVE-2024-23334", + "full_name": "wizarddos\/CVE-2024-23334", + "owner": { + "login": "wizarddos", + "id": 69435721, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69435721?v=4", + "html_url": "https:\/\/github.com\/wizarddos", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/wizarddos\/CVE-2024-23334", + "description": "Proof-of-Concept for LFI\/Path Traversal vulnerability in Aiohttp =< 3.9.1", + "fork": false, + "created_at": "2024-10-20T15:28:58Z", + "updated_at": "2024-10-20T16:48:57Z", + "pushed_at": "2024-10-20T16:48:53Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-26229.json b/2024/CVE-2024-26229.json index d9350354fd..8e7f104d86 100644 --- a/2024/CVE-2024-26229.json +++ b/2024/CVE-2024-26229.json @@ -76,19 +76,19 @@ "description": "BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel", "fork": false, "created_at": "2024-06-13T11:57:50Z", - "updated_at": "2024-10-19T09:51:41Z", + "updated_at": "2024-10-20T12:51:43Z", "pushed_at": "2024-06-13T07:30:48Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "has_discussions": false, - "forks_count": 29, + "forks_count": 30, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 29, - "watchers": 12, + "forks": 30, + "watchers": 13, "score": 0, "subscribers_count": 0 }, diff --git a/2024/CVE-2024-2961.json b/2024/CVE-2024-2961.json index c69f0780b2..b5fd9cb220 100644 --- a/2024/CVE-2024-2961.json +++ b/2024/CVE-2024-2961.json @@ -76,10 +76,10 @@ "description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()", "fork": false, "created_at": "2024-05-27T08:30:06Z", - "updated_at": "2024-10-18T18:45:42Z", + "updated_at": "2024-10-20T17:01:44Z", "pushed_at": "2024-09-30T08:45:56Z", - "stargazers_count": 400, - "watchers_count": 400, + "stargazers_count": 401, + "watchers_count": 401, "has_discussions": false, "forks_count": 52, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 52, - "watchers": 400, + "watchers": 401, "score": 0, "subscribers_count": 8 }, diff --git a/2024/CVE-2024-30088.json b/2024/CVE-2024-30088.json index e18f5a98a1..99b2ba3836 100644 --- a/2024/CVE-2024-30088.json +++ b/2024/CVE-2024-30088.json @@ -184,36 +184,5 @@ "watchers": 1, "score": 0, "subscribers_count": 1 - }, - { - "id": 875255026, - "name": "CVE-2024-30088", - "full_name": "l0n3m4n\/CVE-2024-30088", - "owner": { - "login": "l0n3m4n", - "id": 143868630, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/143868630?v=4", - "html_url": "https:\/\/github.com\/l0n3m4n", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/l0n3m4n\/CVE-2024-30088", - "description": "Windows Kernel Elevation of Privilege (PoC) ", - "fork": false, - "created_at": "2024-10-19T13:54:33Z", - "updated_at": "2024-10-20T00:35:42Z", - "pushed_at": "2024-10-19T14:41:08Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-30090.json b/2024/CVE-2024-30090.json index a303d1dea0..fe1aec4aef 100644 --- a/2024/CVE-2024-30090.json +++ b/2024/CVE-2024-30090.json @@ -14,10 +14,10 @@ "description": "CVE-2024-30090 - LPE PoC", "fork": false, "created_at": "2024-10-17T08:38:47Z", - "updated_at": "2024-10-20T11:11:22Z", + "updated_at": "2024-10-20T17:13:28Z", "pushed_at": "2024-10-17T09:53:33Z", - "stargazers_count": 54, - "watchers_count": 54, + "stargazers_count": 57, + "watchers_count": 57, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 54, + "watchers": 57, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-35205.json b/2024/CVE-2024-35205.json index 0e2fcee9ef..b4fba0cef0 100644 --- a/2024/CVE-2024-35205.json +++ b/2024/CVE-2024-35205.json @@ -14,10 +14,10 @@ "description": "Dirty Stream exploit for MI-File Explorer V1-210567 version. CVE-2024-35205", "fork": false, "created_at": "2024-06-17T08:10:47Z", - "updated_at": "2024-10-08T07:21:08Z", + "updated_at": "2024-10-20T18:12:32Z", "pushed_at": "2024-09-30T09:06:14Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-35250.json b/2024/CVE-2024-35250.json index a47ac27bb9..4879464606 100644 --- a/2024/CVE-2024-35250.json +++ b/2024/CVE-2024-35250.json @@ -14,10 +14,10 @@ "description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver", "fork": false, "created_at": "2024-10-13T19:30:20Z", - "updated_at": "2024-10-20T11:06:17Z", + "updated_at": "2024-10-20T14:07:09Z", "pushed_at": "2024-10-17T18:36:54Z", - "stargazers_count": 168, - "watchers_count": 168, + "stargazers_count": 170, + "watchers_count": 170, "has_discussions": false, "forks_count": 40, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 40, - "watchers": 168, + "watchers": 170, "score": 0, "subscribers_count": 3 } diff --git a/2024/CVE-2024-38063.json b/2024/CVE-2024-38063.json index 997132694d..c5c7011c89 100644 --- a/2024/CVE-2024-38063.json +++ b/2024/CVE-2024-38063.json @@ -76,10 +76,10 @@ "description": "Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.", "fork": false, "created_at": "2024-08-17T14:58:36Z", - "updated_at": "2024-10-16T23:54:39Z", + "updated_at": "2024-10-20T15:54:12Z", "pushed_at": "2024-08-28T20:56:40Z", - "stargazers_count": 82, - "watchers_count": 82, + "stargazers_count": 83, + "watchers_count": 83, "has_discussions": false, "forks_count": 30, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 30, - "watchers": 82, + "watchers": 83, "score": 0, "subscribers_count": 4 }, diff --git a/2024/CVE-2024-40431.json b/2024/CVE-2024-40431.json index 45dea12ff9..0ba736ab49 100644 --- a/2024/CVE-2024-40431.json +++ b/2024/CVE-2024-40431.json @@ -14,10 +14,10 @@ "description": "CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK) ", "fork": false, "created_at": "2024-09-17T06:28:17Z", - "updated_at": "2024-10-19T04:08:26Z", + "updated_at": "2024-10-20T14:41:47Z", "pushed_at": "2024-10-16T22:27:13Z", - "stargazers_count": 39, - "watchers_count": 39, + "stargazers_count": 40, + "watchers_count": 40, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 39, + "watchers": 40, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-42640.json b/2024/CVE-2024-42640.json index 9662cd45d7..e248b176ef 100644 --- a/2024/CVE-2024-42640.json +++ b/2024/CVE-2024-42640.json @@ -14,10 +14,10 @@ "description": "Unauthenticated Remote Code Execution via Angular-Base64-Upload Library ", "fork": false, "created_at": "2024-10-09T14:35:06Z", - "updated_at": "2024-10-20T06:34:36Z", + "updated_at": "2024-10-20T15:09:49Z", "pushed_at": "2024-10-18T15:10:13Z", - "stargazers_count": 20, - "watchers_count": 20, + "stargazers_count": 21, + "watchers_count": 21, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 11, - "watchers": 20, + "watchers": 21, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-44193.json b/2024/CVE-2024-44193.json index 5e1e3fb90f..00610ed28e 100644 --- a/2024/CVE-2024-44193.json +++ b/2024/CVE-2024-44193.json @@ -19,13 +19,13 @@ "stargazers_count": 73, "watchers_count": 73, "has_discussions": false, - "forks_count": 9, + "forks_count": 10, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 9, + "forks": 10, "watchers": 73, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-45519.json b/2024/CVE-2024-45519.json index b54089a46d..46cfb7004b 100644 --- a/2024/CVE-2024-45519.json +++ b/2024/CVE-2024-45519.json @@ -76,10 +76,10 @@ "description": "Zimbra - Remote Command Execution (CVE-2024-45519)", "fork": false, "created_at": "2024-10-05T00:15:18Z", - "updated_at": "2024-10-19T21:15:51Z", + "updated_at": "2024-10-20T14:38:18Z", "pushed_at": "2024-10-05T00:18:49Z", - "stargazers_count": 96, - "watchers_count": 96, + "stargazers_count": 97, + "watchers_count": 97, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 16, - "watchers": 96, + "watchers": 97, "score": 0, "subscribers_count": 3 } diff --git a/2024/CVE-2024-4577.json b/2024/CVE-2024-4577.json index b568821c62..ff6bfe6513 100644 --- a/2024/CVE-2024-4577.json +++ b/2024/CVE-2024-4577.json @@ -143,13 +143,13 @@ "stargazers_count": 43, "watchers_count": 43, "has_discussions": false, - "forks_count": 8, + "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 8, + "forks": 9, "watchers": 43, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-47854.json b/2024/CVE-2024-47854.json index c649d81f3a..94d34f9107 100644 --- a/2024/CVE-2024-47854.json +++ b/2024/CVE-2024-47854.json @@ -14,8 +14,8 @@ "description": "Proof of concept of multiple Reflected Cross-Site Scripting (XSS) vulnerabilities discovered in Veritas Data Insight before 7.1.", "fork": false, "created_at": "2024-10-19T13:38:23Z", - "updated_at": "2024-10-19T14:45:04Z", - "pushed_at": "2024-10-19T14:45:01Z", + "updated_at": "2024-10-20T18:11:25Z", + "pushed_at": "2024-10-20T18:11:22Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json index 0a7205aeaf..bc48be0227 100644 --- a/2024/CVE-2024-6387.json +++ b/2024/CVE-2024-6387.json @@ -2273,10 +2273,10 @@ "description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)", "fork": false, "created_at": "2024-07-08T11:27:49Z", - "updated_at": "2024-10-18T16:44:55Z", + "updated_at": "2024-10-20T15:22:33Z", "pushed_at": "2024-08-22T08:50:25Z", - "stargazers_count": 35, - "watchers_count": 35, + "stargazers_count": 36, + "watchers_count": 36, "has_discussions": false, "forks_count": 13, "allow_forking": true, @@ -2285,7 +2285,7 @@ "topics": [], "visibility": "public", "forks": 13, - "watchers": 35, + "watchers": 36, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-6778.json b/2024/CVE-2024-6778.json index db4a478490..0939d55136 100644 --- a/2024/CVE-2024-6778.json +++ b/2024/CVE-2024-6778.json @@ -14,10 +14,10 @@ "description": "A POC exploit for CVE-2024-5836 and CVE-2024-6778, allowing for a sandbox escape from a Chrome extension. ", "fork": false, "created_at": "2024-09-10T06:27:59Z", - "updated_at": "2024-10-20T04:34:05Z", + "updated_at": "2024-10-20T17:07:59Z", "pushed_at": "2024-10-17T05:12:29Z", - "stargazers_count": 25, - "watchers_count": 25, + "stargazers_count": 27, + "watchers_count": 27, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -26,8 +26,39 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 25, + "watchers": 27, "score": 0, "subscribers_count": 1 + }, + { + "id": 875609314, + "name": "POC-CVE-2024-6778", + "full_name": "r00tjunip3r1\/POC-CVE-2024-6778", + "owner": { + "login": "r00tjunip3r1", + "id": 185687343, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/185687343?v=4", + "html_url": "https:\/\/github.com\/r00tjunip3r1", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/r00tjunip3r1\/POC-CVE-2024-6778", + "description": null, + "fork": false, + "created_at": "2024-10-20T12:47:53Z", + "updated_at": "2024-10-20T12:50:37Z", + "pushed_at": "2024-10-20T12:50:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-9264.json b/2024/CVE-2024-9264.json index 4d0171943a..2f8a2eb456 100644 --- a/2024/CVE-2024-9264.json +++ b/2024/CVE-2024-9264.json @@ -14,10 +14,10 @@ "description": "Exploit for Grafana arbitrary file-read (CVE-2024-9264)", "fork": false, "created_at": "2024-10-19T13:50:52Z", - "updated_at": "2024-10-20T12:15:41Z", + "updated_at": "2024-10-20T17:21:55Z", "pushed_at": "2024-10-19T16:01:12Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 23, + "watchers_count": 23, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -38,7 +38,7 @@ ], "visibility": "public", "forks": 5, - "watchers": 15, + "watchers": 23, "score": 0, "subscribers_count": 1 }, @@ -57,10 +57,10 @@ "description": "File Read Proof of Concept for CVE-2024-9264", "fork": false, "created_at": "2024-10-20T01:13:37Z", - "updated_at": "2024-10-20T11:46:38Z", + "updated_at": "2024-10-20T14:07:36Z", "pushed_at": "2024-10-20T11:46:34Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -74,7 +74,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 0 }, diff --git a/README.md b/README.md index 94866a2fe6..29a9566a72 100644 --- a/README.md +++ b/README.md @@ -1399,6 +1399,7 @@ - [ading2210/CVE-2024-6778-POC](https://github.com/ading2210/CVE-2024-6778-POC) +- [r00tjunip3r1/POC-CVE-2024-6778](https://github.com/r00tjunip3r1/POC-CVE-2024-6778) ### CVE-2024-6782 (2024-08-06) @@ -1648,6 +1649,9 @@ ### CVE-2024-9821 - [RandomRobbieBF/CVE-2024-9821](https://github.com/RandomRobbieBF/CVE-2024-9821) +### CVE-2024-10140 +- [holypryx/CVE-2024-10140](https://github.com/holypryx/CVE-2024-10140) + ### CVE-2024-12883 - [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883) @@ -2257,6 +2261,7 @@ - [brian-edgar-re/poc-cve-2024-23334](https://github.com/brian-edgar-re/poc-cve-2024-23334) - [binaryninja/CVE-2024-23334](https://github.com/binaryninja/CVE-2024-23334) - [s4botai/CVE-2024-23334-PoC](https://github.com/s4botai/CVE-2024-23334-PoC) +- [wizarddos/CVE-2024-23334](https://github.com/wizarddos/CVE-2024-23334) ### CVE-2024-23339 (2024-01-22) @@ -3616,7 +3621,6 @@ - [exploits-forsale/collateral-damage](https://github.com/exploits-forsale/collateral-damage) - [Admin9961/CVE-2024-30088](https://github.com/Admin9961/CVE-2024-30088) - [Justintroup85/exploits-forsale-collateral-damage](https://github.com/Justintroup85/exploits-forsale-collateral-damage) -- [l0n3m4n/CVE-2024-30088](https://github.com/l0n3m4n/CVE-2024-30088) ### CVE-2024-30090 (2024-06-11) @@ -35466,7 +35470,7 @@ - [whokilleddb/CVE-2019-15107](https://github.com/whokilleddb/CVE-2019-15107) - [darrenmartyn/CVE-2019-15107](https://github.com/darrenmartyn/CVE-2019-15107) - [hacknotes/CVE-2019-15107-Exploit](https://github.com/hacknotes/CVE-2019-15107-Exploit) -- [Tuz-Wwsd/CVE-2019-15107_detection](https://github.com/Tuz-Wwsd/CVE-2019-15107_detection) +- [CyberTuz/CVE-2019-15107_detection](https://github.com/CyberTuz/CVE-2019-15107_detection) - [hadrian3689/webmin_1.920](https://github.com/hadrian3689/webmin_1.920) - [f0rkr/CVE-2019-15107](https://github.com/f0rkr/CVE-2019-15107) - [psw01/CVE-2019-15107_webminRCE](https://github.com/psw01/CVE-2019-15107_webminRCE)