diff --git a/2020/CVE-2020-0787.json b/2020/CVE-2020-0787.json index e4a84573fe..4110c72542 100644 --- a/2020/CVE-2020-0787.json +++ b/2020/CVE-2020-0787.json @@ -19,13 +19,13 @@ "stargazers_count": 712, "watchers_count": 712, "has_discussions": false, - "forks_count": 172, + "forks_count": 173, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 172, + "forks": 173, "watchers": 712, "score": 0, "subscribers_count": 19 diff --git a/2020/CVE-2020-15368.json b/2020/CVE-2020-15368.json index db693e31b3..a3d908c8fe 100644 --- a/2020/CVE-2020-15368.json +++ b/2020/CVE-2020-15368.json @@ -14,10 +14,10 @@ "description": "CVE-2020-15368, aka \"How to exploit a vulnerable driver\"", "fork": false, "created_at": "2021-06-29T04:38:24Z", - "updated_at": "2024-12-05T22:15:01Z", + "updated_at": "2024-12-08T19:19:58Z", "pushed_at": "2022-04-14T03:17:44Z", - "stargazers_count": 441, - "watchers_count": 441, + "stargazers_count": 442, + "watchers_count": 442, "has_discussions": false, "forks_count": 45, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 45, - "watchers": 441, + "watchers": 442, "score": 0, "subscribers_count": 6 }, diff --git a/2020/CVE-2020-17087.json b/2020/CVE-2020-17087.json index b2f02162e2..1c2c3db056 100644 --- a/2020/CVE-2020-17087.json +++ b/2020/CVE-2020-17087.json @@ -76,10 +76,10 @@ "description": "Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CVE-2020-17087 and an off-by-one overflow", "fork": false, "created_at": "2021-07-02T16:03:16Z", - "updated_at": "2024-12-07T18:58:23Z", + "updated_at": "2024-12-08T21:33:48Z", "pushed_at": "2022-09-01T06:33:36Z", - "stargazers_count": 183, - "watchers_count": 183, + "stargazers_count": 184, + "watchers_count": 184, "has_discussions": false, "forks_count": 49, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 49, - "watchers": 183, + "watchers": 184, "score": 0, "subscribers_count": 7 }, diff --git a/2020/CVE-2020-9484.json b/2020/CVE-2020-9484.json index 1846d97edd..7d83fc36ec 100644 --- a/2020/CVE-2020-9484.json +++ b/2020/CVE-2020-9484.json @@ -461,10 +461,10 @@ "description": "Exploit for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCE", "fork": false, "created_at": "2022-11-14T14:48:30Z", - "updated_at": "2024-11-16T13:03:24Z", + "updated_at": "2024-12-08T22:15:36Z", "pushed_at": "2023-04-17T14:52:50Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 16, + "watchers_count": 16, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -473,7 +473,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 15, + "watchers": 16, "score": 0, "subscribers_count": 1 }, @@ -492,7 +492,7 @@ "description": "Remake of CVE-2020-9484 by Pentestical", "fork": false, "created_at": "2024-09-16T18:17:52Z", - "updated_at": "2024-11-24T09:15:32Z", + "updated_at": "2024-12-08T23:18:03Z", "pushed_at": "2024-09-16T18:22:36Z", "stargazers_count": 18, "watchers_count": 18, diff --git a/2021/CVE-2021-23017.json b/2021/CVE-2021-23017.json index 4c073a862c..6724c157b8 100644 --- a/2021/CVE-2021-23017.json +++ b/2021/CVE-2021-23017.json @@ -155,6 +155,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2021/CVE-2021-29442.json b/2021/CVE-2021-29442.json index 00a88580e5..6bc32497c6 100644 --- a/2021/CVE-2021-29442.json +++ b/2021/CVE-2021-29442.json @@ -45,10 +45,10 @@ "description": "Nacos Derby命令执行漏洞利用脚本", "fork": false, "created_at": "2024-11-22T01:32:37Z", - "updated_at": "2024-12-07T15:39:04Z", + "updated_at": "2024-12-08T18:37:41Z", "pushed_at": "2024-11-22T01:33:26Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 6, + "watchers": 7, "score": 0, "subscribers_count": 1 } diff --git a/2021/CVE-2021-33044.json b/2021/CVE-2021-33044.json index 0bf15096b4..f9689b74c8 100644 --- a/2021/CVE-2021-33044.json +++ b/2021/CVE-2021-33044.json @@ -14,10 +14,10 @@ "description": "Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication.", "fork": false, "created_at": "2021-10-11T22:08:47Z", - "updated_at": "2024-11-30T01:39:44Z", + "updated_at": "2024-12-08T19:58:51Z", "pushed_at": "2021-10-13T22:32:36Z", - "stargazers_count": 133, - "watchers_count": 133, + "stargazers_count": 134, + "watchers_count": 134, "has_discussions": false, "forks_count": 31, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 31, - "watchers": 133, + "watchers": 134, "score": 0, "subscribers_count": 7 }, diff --git a/2021/CVE-2021-34473.json b/2021/CVE-2021-34473.json index 9a97dc399a..dabcb68690 100644 --- a/2021/CVE-2021-34473.json +++ b/2021/CVE-2021-34473.json @@ -200,10 +200,10 @@ "description": "CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability", "fork": false, "created_at": "2022-06-29T12:37:31Z", - "updated_at": "2024-10-21T03:33:05Z", + "updated_at": "2024-12-08T22:05:37Z", "pushed_at": "2022-06-30T08:36:58Z", - "stargazers_count": 33, - "watchers_count": 33, + "stargazers_count": 34, + "watchers_count": 34, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -212,7 +212,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 33, + "watchers": 34, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-4045.json b/2021/CVE-2021-4045.json index 43751ac00e..635b1b457b 100644 --- a/2021/CVE-2021-4045.json +++ b/2021/CVE-2021-4045.json @@ -14,10 +14,10 @@ "description": "Exploit for command injection vulnerability found in uhttpd binary from TP-Link Tapo c200 IP camera", "fork": false, "created_at": "2021-11-15T14:48:14Z", - "updated_at": "2024-11-24T15:43:36Z", + "updated_at": "2024-12-08T20:40:46Z", "pushed_at": "2024-10-31T18:50:48Z", - "stargazers_count": 71, - "watchers_count": 71, + "stargazers_count": 72, + "watchers_count": 72, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 10, - "watchers": 71, + "watchers": 72, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-42287.json b/2021/CVE-2021-42287.json index d58446a1ae..37043cba77 100644 --- a/2021/CVE-2021-42287.json +++ b/2021/CVE-2021-42287.json @@ -14,10 +14,10 @@ "description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.", "fork": false, "created_at": "2021-12-11T19:27:30Z", - "updated_at": "2024-12-03T06:19:44Z", + "updated_at": "2024-12-08T18:38:22Z", "pushed_at": "2021-12-16T09:50:15Z", - "stargazers_count": 1345, - "watchers_count": 1345, + "stargazers_count": 1346, + "watchers_count": 1346, "has_discussions": false, "forks_count": 323, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 323, - "watchers": 1345, + "watchers": 1346, "score": 0, "subscribers_count": 27 }, diff --git a/2022/CVE-2022-1388.json b/2022/CVE-2022-1388.json index 9e1908e84c..3e963200ca 100644 --- a/2022/CVE-2022-1388.json +++ b/2022/CVE-2022-1388.json @@ -2102,10 +2102,10 @@ "description": "CVE-2022-1388 是一个影响 F5 BIG-IP 应用交付控制器(ADC)的严重漏洞。以下是对其原理和危害的详细介绍:", "fork": false, "created_at": "2024-11-23T05:39:26Z", - "updated_at": "2024-12-02T02:55:21Z", + "updated_at": "2024-12-08T18:36:57Z", "pushed_at": "2024-11-23T05:41:08Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -2118,7 +2118,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index d3b6430af3..e74c1946e4 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -2176,10 +2176,10 @@ "description": "CVE-2022-26134 是一个影响 Atlassian Confluence Server 和 Data Center 的 远程代码执行漏洞(RCE),其成因是服务器处理 OGNL 表达式时未能正确过滤输入,从而允许攻击者以特权账户权限执行任意代码。", "fork": false, "created_at": "2024-11-23T05:35:59Z", - "updated_at": "2024-12-02T02:55:22Z", + "updated_at": "2024-12-08T18:36:58Z", "pushed_at": "2024-11-23T05:38:10Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -2192,7 +2192,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2022/CVE-2022-31144.json b/2022/CVE-2022-31144.json index 7889b72001..6f93e22b38 100644 --- a/2022/CVE-2022-31144.json +++ b/2022/CVE-2022-31144.json @@ -14,8 +14,8 @@ "description": "CVE-2022-31144 dos pt redis, not finished yet or too soon, this can be turned into rce but oh well if you smart enough", "fork": false, "created_at": "2023-02-03T08:40:38Z", - "updated_at": "2023-04-02T16:26:54Z", - "pushed_at": "2023-02-03T11:18:00Z", + "updated_at": "2024-12-08T18:47:51Z", + "pushed_at": "2024-12-08T18:47:48Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, diff --git a/2023/CVE-2023-20198.json b/2023/CVE-2023-20198.json index 036a7334ea..0c7bc69820 100644 --- a/2023/CVE-2023-20198.json +++ b/2023/CVE-2023-20198.json @@ -798,10 +798,10 @@ "description": "CVE-2023-20198是思科IOS XE软件Web UI功能中的一个严重漏洞,允许未经身份验证的远程攻击者在受影响的系统上创建具有特权级别15的账户,从而完全控制设备。", "fork": false, "created_at": "2024-11-22T04:10:28Z", - "updated_at": "2024-12-04T05:59:42Z", + "updated_at": "2024-12-08T18:37:34Z", "pushed_at": "2024-11-22T04:12:11Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -810,7 +810,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-38646.json b/2023/CVE-2023-38646.json index 706a065f25..bbd0b2b4da 100644 --- a/2023/CVE-2023-38646.json +++ b/2023/CVE-2023-38646.json @@ -1145,10 +1145,10 @@ "description": "CVE-2023-38646是Metabase中的一个远程代码执行漏洞。该漏洞源于Metabase在处理未经身份验证的API端点\/api\/setup\/validate时,对JDBC连接字符串的处理存在安全缺陷。攻击者可以通过构造特定的JDBC连接字符串,利用该端点在服务器上执行任意命令,而无需进行身份验证。", "fork": false, "created_at": "2024-11-22T04:15:25Z", - "updated_at": "2024-12-02T02:55:22Z", + "updated_at": "2024-12-08T18:37:33Z", "pushed_at": "2024-11-22T04:18:53Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -1157,7 +1157,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-40028.json b/2023/CVE-2023-40028.json index 495fc8f68e..31484cb088 100644 --- a/2023/CVE-2023-40028.json +++ b/2023/CVE-2023-40028.json @@ -19,13 +19,13 @@ "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 diff --git a/2023/CVE-2023-47246.json b/2023/CVE-2023-47246.json index f25d168234..c2b6b3b26a 100644 --- a/2023/CVE-2023-47246.json +++ b/2023/CVE-2023-47246.json @@ -113,10 +113,10 @@ "description": "CVE-2023-47246 是 SysAid On-Premise 软件(版本 23.3.36 之前)中的一个路径遍历漏洞。攻击者可以利用该漏洞将文件写入 Tomcat 的 webroot 目录,从而在服务器上执行任意代码。", "fork": false, "created_at": "2024-11-23T05:21:22Z", - "updated_at": "2024-12-02T02:55:22Z", + "updated_at": "2024-12-08T18:36:59Z", "pushed_at": "2024-11-23T05:24:07Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -129,7 +129,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-0012.json b/2024/CVE-2024-0012.json index 4ca9321214..d86850ad29 100644 --- a/2024/CVE-2024-0012.json +++ b/2024/CVE-2024-0012.json @@ -169,10 +169,10 @@ "description": "CVE-2024-0012是Palo Alto Networks PAN-OS软件中的一个身份验证绕过漏洞。该漏洞允许未经身份验证的攻击者通过网络访问管理Web界面,获取PAN-OS管理员权限,从而执行管理操作、篡改配置,或利用其他需要身份验证的特权提升漏洞(如CVE-2024-9474) ", "fork": false, "created_at": "2024-11-22T14:11:56Z", - "updated_at": "2024-12-02T02:55:23Z", + "updated_at": "2024-12-08T18:37:20Z", "pushed_at": "2024-11-22T14:37:04Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -181,7 +181,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-10220.json b/2024/CVE-2024-10220.json index e13d556e2c..caa2c51b35 100644 --- a/2024/CVE-2024-10220.json +++ b/2024/CVE-2024-10220.json @@ -76,10 +76,10 @@ "description": "CVE-2024-10220 Test repo", "fork": false, "created_at": "2024-12-01T05:15:25Z", - "updated_at": "2024-12-04T11:01:09Z", + "updated_at": "2024-12-08T18:31:58Z", "pushed_at": "2024-12-01T05:18:39Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-21534.json b/2024/CVE-2024-21534.json index a352124bed..21c79d862d 100644 --- a/2024/CVE-2024-21534.json +++ b/2024/CVE-2024-21534.json @@ -45,10 +45,10 @@ "description": "jsonpath-plus 包(版本 <=10.0.7)存在严重的远程代码执行(RCE)漏洞,允许攻击者通过 Node.js 的 VM 模块执行任意代码。该漏洞由于输入验证不严格导致,影响版本为 10.0.7 以下,CVSS 分数为 9.8(极其严重)。漏洞首次公开于 2024 年 10 月 11 日。", "fork": false, "created_at": "2024-11-23T05:54:24Z", - "updated_at": "2024-12-04T06:56:31Z", + "updated_at": "2024-12-08T18:36:54Z", "pushed_at": "2024-11-23T05:57:35Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -61,7 +61,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-21683.json b/2024/CVE-2024-21683.json index 8a6ca95c5c..02eb421119 100644 --- a/2024/CVE-2024-21683.json +++ b/2024/CVE-2024-21683.json @@ -173,10 +173,10 @@ "description": "CVE-2024-21683 Confluence Post Auth RCE", "fork": false, "created_at": "2024-11-29T13:27:37Z", - "updated_at": "2024-12-02T02:55:23Z", + "updated_at": "2024-12-08T18:32:02Z", "pushed_at": "2024-11-29T13:33:23Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -185,7 +185,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-21762.json b/2024/CVE-2024-21762.json index 66b0fdfb57..d82d4cf0b3 100644 --- a/2024/CVE-2024-21762.json +++ b/2024/CVE-2024-21762.json @@ -200,10 +200,10 @@ "description": "CVE-2024-21762 是 Fortinet 公司的 FortiOS 和 FortiProxy 产品中的一个严重漏洞,存在于其 SSL VPN 组件中。", "fork": false, "created_at": "2024-11-24T07:20:45Z", - "updated_at": "2024-12-04T06:56:12Z", + "updated_at": "2024-12-08T18:36:48Z", "pushed_at": "2024-11-24T08:07:19Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -212,7 +212,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-23113.json b/2024/CVE-2024-23113.json index 124fdd6195..6369f05e60 100644 --- a/2024/CVE-2024-23113.json +++ b/2024/CVE-2024-23113.json @@ -169,10 +169,10 @@ "description": "CVE-2024-23113 是一个严重的安全漏洞,影响 Fortinet 的多款产品,包括 FortiOS、FortiProxy、FortiPAM 和 FortiSwitchManager。该漏洞允许未经身份验证的远程攻击者通过特制的请求,在受影响的设备上执行任意代码或命令,可能导致系统被完全控制。", "fork": false, "created_at": "2024-11-22T01:46:58Z", - "updated_at": "2024-12-02T02:55:24Z", + "updated_at": "2024-12-08T18:37:40Z", "pushed_at": "2024-11-22T01:53:45Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -186,7 +186,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 }, @@ -205,10 +205,10 @@ "description": "CVE-2024-23113 是一个在 Linux Kernel 中被发现的漏洞,它属于 任意代码执行漏洞,影响了 bpf (Berkeley Packet Filter) 子系统。具体来说,这个漏洞影响了 bpf 程序的 bpf_prog 类型的对象,并且可以允许攻击者通过构造恶意的 BPF 程序来在内核空间执行恶意代码。", "fork": false, "created_at": "2024-11-28T06:30:02Z", - "updated_at": "2024-12-02T02:55:24Z", + "updated_at": "2024-12-08T18:32:09Z", "pushed_at": "2024-11-28T06:35:22Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -217,7 +217,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-23692.json b/2024/CVE-2024-23692.json index 891f5892ee..e06fde4be9 100644 --- a/2024/CVE-2024-23692.json +++ b/2024/CVE-2024-23692.json @@ -329,10 +329,10 @@ "description": "CVE-2024-23692 是影响 Rejetto HTTP File Server(HFS)2.3m 及之前版本的模板注入漏洞。该漏洞允许远程未授权的攻击者通过发送特制的 HTTP 请求,在受影响的系统上执行任意命令。", "fork": false, "created_at": "2024-11-23T03:59:13Z", - "updated_at": "2024-12-04T06:56:48Z", + "updated_at": "2024-12-08T18:37:04Z", "pushed_at": "2024-11-23T04:00:55Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -341,7 +341,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-24549.json b/2024/CVE-2024-24549.json index f195b10c0a..1a7f4ccefb 100644 --- a/2024/CVE-2024-24549.json +++ b/2024/CVE-2024-24549.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2024-08-02T21:05:34Z", - "updated_at": "2024-11-06T11:19:50Z", + "updated_at": "2024-12-08T22:24:19Z", "pushed_at": "2024-09-01T14:10:12Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-25641.json b/2024/CVE-2024-25641.json index 008aca46d4..60d92f2766 100644 --- a/2024/CVE-2024-25641.json +++ b/2024/CVE-2024-25641.json @@ -155,10 +155,10 @@ "description": "PoC for CVE-2024-25641 Authenticated RCE on Cacti v1.2.26", "fork": false, "created_at": "2024-11-22T14:05:37Z", - "updated_at": "2024-12-02T02:55:25Z", + "updated_at": "2024-12-08T18:37:24Z", "pushed_at": "2024-11-22T14:09:15Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -167,7 +167,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-27130.json b/2024/CVE-2024-27130.json index 85de7c6e09..8f4534e03b 100644 --- a/2024/CVE-2024-27130.json +++ b/2024/CVE-2024-27130.json @@ -76,10 +76,10 @@ "description": "CVE-2024-27130是影响QNAP网络附加存储(NAS)设备的一个严重漏洞。该漏洞源于QTS操作系统中share.cgi脚本的No_Support_ACL函数中不安全地使用strcpy函数,导致堆栈缓冲区溢出。攻击者可以利用此漏洞,通过精心构造的请求在目标系统上执行任意代码,进而完全控制受影响的设备。 ", "fork": false, "created_at": "2024-11-22T14:18:08Z", - "updated_at": "2024-12-04T06:57:05Z", + "updated_at": "2024-12-08T18:37:22Z", "pushed_at": "2024-11-22T14:20:28Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json index 2ca12e952c..6ac42e9fe6 100644 --- a/2024/CVE-2024-3094.json +++ b/2024/CVE-2024-3094.json @@ -1856,10 +1856,10 @@ "description": "CVE-2024-3094 (XZ Backdoor) Tools", "fork": false, "created_at": "2024-12-01T05:22:08Z", - "updated_at": "2024-12-04T11:01:08Z", + "updated_at": "2024-12-08T18:31:57Z", "pushed_at": "2024-12-01T05:30:15Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -1868,7 +1868,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-32002.json b/2024/CVE-2024-32002.json index 68b6ae2a32..2f4e6c1cce 100644 --- a/2024/CVE-2024-32002.json +++ b/2024/CVE-2024-32002.json @@ -1969,10 +1969,10 @@ "description": "CVE-2024-32002 是 Git 中的一个严重漏洞,允许攻击者在用户执行 git clone 操作时远程执行任意代码(RCE)。", "fork": false, "created_at": "2024-11-23T04:06:33Z", - "updated_at": "2024-11-24T05:53:24Z", + "updated_at": "2024-12-08T18:37:03Z", "pushed_at": "2024-11-23T04:07:03Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -1981,7 +1981,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-36401.json b/2024/CVE-2024-36401.json index 72b7aa12e2..674426b3a0 100644 --- a/2024/CVE-2024-36401.json +++ b/2024/CVE-2024-36401.json @@ -176,10 +176,10 @@ "description": "geoserver CVE-2024-36401漏洞利用工具", "fork": false, "created_at": "2024-07-17T02:25:21Z", - "updated_at": "2024-12-06T02:19:36Z", + "updated_at": "2024-12-08T23:44:23Z", "pushed_at": "2024-07-24T15:33:03Z", - "stargazers_count": 14, - "watchers_count": 14, + "stargazers_count": 15, + "watchers_count": 15, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -188,7 +188,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 14, + "watchers": 15, "score": 0, "subscribers_count": 0 }, @@ -455,10 +455,10 @@ "description": "CVE-2024-36401是GeoServer中的一个高危远程代码执行漏洞。GeoServer是一款开源的地理数据服务器软件,主要用于发布、共享和处理各种地理空间数据。 ALIYUN 漏洞原理: 该漏洞源于GeoServer在处理属性名称时,将其不安全地解析为XPath表达式。具体而言,GeoServer调用的GeoTools库API在评估要素类型的属性名称时,以不安全的方式将其传递给commons-jxpath库。由于commons-jxpath库在解析XPath表达式时允许执行任意代码,攻击者可以通过构造特定的输入,利用多个OGC请求参数(如WFS GetFeature、WFS GetPropertyValue、WMS GetMap等),在未经身份验证的情况下远程执行任意代码。 ", "fork": false, "created_at": "2024-11-22T14:21:53Z", - "updated_at": "2024-12-02T02:55:25Z", + "updated_at": "2024-12-08T18:37:21Z", "pushed_at": "2024-11-22T14:22:57Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -467,7 +467,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-37084.json b/2024/CVE-2024-37084.json index d3fb1170d3..a24539dc4a 100644 --- a/2024/CVE-2024-37084.json +++ b/2024/CVE-2024-37084.json @@ -138,10 +138,10 @@ "description": "CVE-2024-37084是Spring Cloud Data Flow中的一个高危漏洞,影响版本为2.11.0至2.11.3。该漏洞允许具有Skipper服务器API访问权限的攻击者通过精心构造的上传请求,将任意文件写入服务器文件系统的任意位置,进而可能导致远程代码执行,严重威胁服务器安全。", "fork": false, "created_at": "2024-11-22T13:53:42Z", - "updated_at": "2024-12-04T06:57:15Z", + "updated_at": "2024-12-08T18:37:26Z", "pushed_at": "2024-11-22T14:02:35Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -155,7 +155,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-38856.json b/2024/CVE-2024-38856.json index 0ef91daf90..c24dba13b1 100644 --- a/2024/CVE-2024-38856.json +++ b/2024/CVE-2024-38856.json @@ -208,10 +208,10 @@ "description": "CVE-2024-38856 是 Apache OFBiz 中的一个严重漏洞,允许未经身份验证的攻击者在受影响的系统上执行任意代码。 ", "fork": false, "created_at": "2024-11-23T03:54:28Z", - "updated_at": "2024-12-04T06:56:49Z", + "updated_at": "2024-12-08T18:37:06Z", "pushed_at": "2024-11-23T03:57:02Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -220,7 +220,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-40711.json b/2024/CVE-2024-40711.json index 327bf9fa6e..0b12ada7b0 100644 --- a/2024/CVE-2024-40711.json +++ b/2024/CVE-2024-40711.json @@ -76,10 +76,10 @@ "description": "CVE-2024-40711 是 Veeam Backup & Replication 软件中的一个严重漏洞,允许未经身份验证的攻击者远程执行代码。 ", "fork": false, "created_at": "2024-11-23T04:02:34Z", - "updated_at": "2024-11-24T05:52:50Z", + "updated_at": "2024-12-08T18:37:03Z", "pushed_at": "2024-11-23T04:02:59Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-42327.json b/2024/CVE-2024-42327.json index 93b47c7c47..1c3283f23f 100644 --- a/2024/CVE-2024-42327.json +++ b/2024/CVE-2024-42327.json @@ -14,10 +14,10 @@ "description": "cve-2024-42327 ZBX-25623", "fork": false, "created_at": "2024-12-01T00:15:27Z", - "updated_at": "2024-12-08T07:06:40Z", + "updated_at": "2024-12-08T21:29:10Z", "pushed_at": "2024-12-01T01:18:36Z", - "stargazers_count": 23, - "watchers_count": 23, + "stargazers_count": 24, + "watchers_count": 24, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 23, + "watchers": 24, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-45200.json b/2024/CVE-2024-45200.json index a39909abae..9cc1d52556 100644 --- a/2024/CVE-2024-45200.json +++ b/2024/CVE-2024-45200.json @@ -14,10 +14,10 @@ "description": "Information & PoC for CVE-2024-45200, Mario Kart 8 Deluxe's \"KartLANPwn\" buffer overflow vulnerability", "fork": false, "created_at": "2024-09-13T00:41:32Z", - "updated_at": "2024-11-01T20:09:06Z", + "updated_at": "2024-12-08T22:58:04Z", "pushed_at": "2024-10-01T00:57:03Z", - "stargazers_count": 52, - "watchers_count": 52, + "stargazers_count": 53, + "watchers_count": 53, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 52, + "watchers": 53, "score": 0, "subscribers_count": 2 } diff --git a/2024/CVE-2024-45436.json b/2024/CVE-2024-45436.json index 11755496c8..2f58a5620c 100644 --- a/2024/CVE-2024-45436.json +++ b/2024/CVE-2024-45436.json @@ -45,10 +45,10 @@ "description": "This repository contains an exploit demonstration for CVE-2024-45436, a critical vulnerability affecting specific software versions. It highlights the exploitation mechanism and provides insights for security researchers to understand and mitigate the risk. ", "fork": false, "created_at": "2024-11-21T09:03:21Z", - "updated_at": "2024-12-02T02:55:26Z", + "updated_at": "2024-12-08T18:37:47Z", "pushed_at": "2024-11-21T09:08:28Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -62,7 +62,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-45519.json b/2024/CVE-2024-45519.json index 81d9238435..df6dbe9d7c 100644 --- a/2024/CVE-2024-45519.json +++ b/2024/CVE-2024-45519.json @@ -107,10 +107,10 @@ "description": "CVE-2024-45519是Zimbra Collaboration(ZCS)中的一个高危漏洞,存在于其postjournal服务中。当该服务被启用时,未经身份验证的攻击者可以通过构造特定的SMTP请求,远程执行任意命令,从而完全控制受影响的服务器。", "fork": false, "created_at": "2024-11-22T01:56:21Z", - "updated_at": "2024-12-04T06:57:41Z", + "updated_at": "2024-12-08T18:37:39Z", "pushed_at": "2024-11-22T02:00:35Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -124,7 +124,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-47575.json b/2024/CVE-2024-47575.json index b272f0a385..2924406810 100644 --- a/2024/CVE-2024-47575.json +++ b/2024/CVE-2024-47575.json @@ -107,10 +107,10 @@ "description": "CVE-2024-47575是Fortinet的FortiManager和FortiManager Cloud产品中的一个严重漏洞,源于fgfmsd守护进程缺乏对关键功能的身份验证。", "fork": false, "created_at": "2024-11-22T03:13:03Z", - "updated_at": "2024-12-04T06:57:26Z", + "updated_at": "2024-12-08T18:37:35Z", "pushed_at": "2024-11-22T03:17:57Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-5124.json b/2024/CVE-2024-5124.json index a71704a9e4..6ed37305d8 100644 --- a/2024/CVE-2024-5124.json +++ b/2024/CVE-2024-5124.json @@ -45,10 +45,10 @@ "description": "CVE-2024-5124 poc", "fork": false, "created_at": "2024-12-03T03:18:48Z", - "updated_at": "2024-12-05T00:48:34Z", + "updated_at": "2024-12-08T18:31:30Z", "pushed_at": "2024-12-03T04:01:32Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-51567.json b/2024/CVE-2024-51567.json index d6a9de7fdb..8d66f749f2 100644 --- a/2024/CVE-2024-51567.json +++ b/2024/CVE-2024-51567.json @@ -79,10 +79,10 @@ "description": "CVE-2024-51567 is a Python PoC exploit targeting an RCE vulnerability in CyberPanel v2.3.6’s upgrademysqlstatus endpoint, bypassing CSRF protections.", "fork": false, "created_at": "2024-11-26T02:18:24Z", - "updated_at": "2024-12-05T20:50:45Z", + "updated_at": "2024-12-08T18:32:12Z", "pushed_at": "2024-11-26T02:21:21Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -91,7 +91,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-5452.json b/2024/CVE-2024-5452.json index 05b02abf89..42e805ee96 100644 --- a/2024/CVE-2024-5452.json +++ b/2024/CVE-2024-5452.json @@ -14,10 +14,10 @@ "description": "此漏洞的根本原因是**深度差异库(deepdiff)**在反序列化用户输入时,未正确处理双下划线(dunder)属性。 PyTorch Lightning 使用 deepdiff.Delta 对象根据前端操作修改应用状态,设计目标是仅允许特定状态变量的修改。", "fork": false, "created_at": "2024-11-22T06:56:12Z", - "updated_at": "2024-11-22T11:49:41Z", + "updated_at": "2024-12-08T18:37:31Z", "pushed_at": "2024-11-22T06:56:32Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-7965.json b/2024/CVE-2024-7965.json index a848aea548..22b376773d 100644 --- a/2024/CVE-2024-7965.json +++ b/2024/CVE-2024-7965.json @@ -45,10 +45,10 @@ "description": "CVE-2024-7965是Google Chrome浏览器中V8 JavaScript引擎的一个高危漏洞。该漏洞源于V8引擎在处理特定JavaScript代码时实现不当,导致堆内存损坏。攻击者可通过诱导用户访问包含特制JavaScript的恶意网页,利用此漏洞在Chrome渲染器中执行任意代码。", "fork": false, "created_at": "2024-11-22T02:55:33Z", - "updated_at": "2024-12-04T06:57:34Z", + "updated_at": "2024-12-08T18:37:36Z", "pushed_at": "2024-11-22T02:58:00Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -62,7 +62,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-8069.json b/2024/CVE-2024-8069.json index 013561196f..5cb8737f54 100644 --- a/2024/CVE-2024-8069.json +++ b/2024/CVE-2024-8069.json @@ -14,10 +14,10 @@ "description": "Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE", "fork": false, "created_at": "2024-11-13T02:50:56Z", - "updated_at": "2024-12-02T02:55:27Z", + "updated_at": "2024-12-08T18:32:03Z", "pushed_at": "2024-11-29T03:02:09Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-9441.json b/2024/CVE-2024-9441.json index 1cf917021c..293b784e1d 100644 --- a/2024/CVE-2024-9441.json +++ b/2024/CVE-2024-9441.json @@ -76,10 +76,10 @@ "description": "CVE-2024-9441是影响Linear eMerge e3系列(版本1.00-07及之前)的操作系统命令注入漏洞。未经身份验证的远程攻击者可通过HTTP请求中“forgot_password”功能的“login_id”参数,执行任意操作系统命令。", "fork": false, "created_at": "2024-11-22T02:04:21Z", - "updated_at": "2024-12-02T02:55:27Z", + "updated_at": "2024-12-08T18:37:37Z", "pushed_at": "2024-11-22T02:07:52Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -93,7 +93,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-9465.json b/2024/CVE-2024-9465.json index fc46dd390f..e5365e30cb 100644 --- a/2024/CVE-2024-9465.json +++ b/2024/CVE-2024-9465.json @@ -76,10 +76,10 @@ "description": "Proof of Concept Exploit for CVE-2024-9465", "fork": false, "created_at": "2024-12-03T12:16:44Z", - "updated_at": "2024-12-04T11:00:54Z", + "updated_at": "2024-12-08T18:31:39Z", "pushed_at": "2024-12-03T12:21:35Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 }