From 3b1c0d1b7d03e946fb24e2ad82b811da8acbde5c Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Fri, 8 Mar 2024 09:26:43 +0900 Subject: [PATCH] Auto Update 2024/03/08 00:26:43 --- 2015/CVE-2015-8562.json | 4 ++-- 2016/CVE-2016-5195.json | 8 ++++---- 2017/CVE-2017-7269.json | 8 ++++---- 2018/CVE-2018-7449.json | 2 +- 2019/CVE-2019-1064.json | 4 ++-- 2019/CVE-2019-11043.json | 8 ++++---- 2019/CVE-2019-6329.json | 12 ++++++------ 2020/CVE-2020-0601.json | 2 +- 2020/CVE-2020-0688.json | 4 ++-- 2020/CVE-2020-0796.json | 2 +- 2020/CVE-2020-1472.json | 8 ++++---- 2020/CVE-2020-14882.json | 4 ++-- 2020/CVE-2020-1938.json | 4 ++-- 2021/CVE-2021-44228.json | 36 ++++++++++++++++++------------------ 2022/CVE-2022-1386.json | 8 ++++---- 2022/CVE-2022-23222.json | 8 ++++---- 2022/CVE-2022-30136.json | 12 ++++++------ 2022/CVE-2022-37969.json | 8 ++++---- 2023/CVE-2023-2002.json | 8 ++++---- 2023/CVE-2023-25690.json | 4 ++-- 2023/CVE-2023-2640.json | 8 ++++---- 2023/CVE-2023-28252.json | 8 ++++---- 2023/CVE-2023-6553.json | 8 ++++---- 2024/CVE-2024-1403.json | 8 ++++---- 2024/CVE-2024-1709.json | 8 ++++---- 2024/CVE-2024-21338.json | 32 ++++++++++++++++++++++++++++++++ 2024/CVE-2024-21762.json | 30 ++++++++++++++++++++++++++++++ 2024/CVE-2024-27198.json | 8 ++++---- README.md | 16 ++++++++++++++-- 29 files changed, 177 insertions(+), 103 deletions(-) create mode 100644 2024/CVE-2024-21338.json diff --git a/2015/CVE-2015-8562.json b/2015/CVE-2015-8562.json index fb3e7a0807..925e41ee48 100644 --- a/2015/CVE-2015-8562.json +++ b/2015/CVE-2015-8562.json @@ -168,7 +168,7 @@ "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, - "forks_count": 8, + "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -181,7 +181,7 @@ "vulnerability" ], "visibility": "public", - "forks": 8, + "forks": 7, "watchers": 7, "score": 0, "subscribers_count": 4 diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json index fc659600f2..b2351afa57 100644 --- a/2016/CVE-2016-5195.json +++ b/2016/CVE-2016-5195.json @@ -73,10 +73,10 @@ "description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android", "fork": false, "created_at": "2016-10-21T11:19:21Z", - "updated_at": "2024-02-23T03:46:33Z", + "updated_at": "2024-03-07T22:03:37Z", "pushed_at": "2021-02-03T16:03:40Z", - "stargazers_count": 941, - "watchers_count": 941, + "stargazers_count": 942, + "watchers_count": 942, "has_discussions": false, "forks_count": 392, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 392, - "watchers": 941, + "watchers": 942, "score": 0, "subscribers_count": 65 }, diff --git a/2017/CVE-2017-7269.json b/2017/CVE-2017-7269.json index ca1ec00001..7d1d90fddd 100644 --- a/2017/CVE-2017-7269.json +++ b/2017/CVE-2017-7269.json @@ -198,10 +198,10 @@ "description": "iis6 exploit 2017 CVE-2017-7269", "fork": false, "created_at": "2017-04-05T23:21:12Z", - "updated_at": "2024-02-22T01:55:01Z", + "updated_at": "2024-03-07T19:15:03Z", "pushed_at": "2023-02-04T09:09:35Z", - "stargazers_count": 81, - "watchers_count": 81, + "stargazers_count": 82, + "watchers_count": 82, "has_discussions": false, "forks_count": 58, "allow_forking": true, @@ -210,7 +210,7 @@ "topics": [], "visibility": "public", "forks": 58, - "watchers": 81, + "watchers": 82, "score": 0, "subscribers_count": 3 }, diff --git a/2018/CVE-2018-7449.json b/2018/CVE-2018-7449.json index 34569d54fc..653f9578a8 100644 --- a/2018/CVE-2018-7449.json +++ b/2018/CVE-2018-7449.json @@ -13,7 +13,7 @@ "description": "simple Python exploit using CVE-2018-7449 on embOS\/IP FTP Server v3.22", "fork": false, "created_at": "2023-05-05T10:38:23Z", - "updated_at": "2023-08-17T22:48:25Z", + "updated_at": "2024-03-07T18:37:48Z", "pushed_at": "2023-05-08T08:18:48Z", "stargazers_count": 2, "watchers_count": 2, diff --git a/2019/CVE-2019-1064.json b/2019/CVE-2019-1064.json index c0093c40a3..f189c4168b 100644 --- a/2019/CVE-2019-1064.json +++ b/2019/CVE-2019-1064.json @@ -48,13 +48,13 @@ "stargazers_count": 12, "watchers_count": 12, "has_discussions": false, - "forks_count": 18, + "forks_count": 16, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 18, + "forks": 16, "watchers": 12, "score": 0, "subscribers_count": 1 diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json index 161e38428c..4694a98d2c 100644 --- a/2019/CVE-2019-11043.json +++ b/2019/CVE-2019-11043.json @@ -13,10 +13,10 @@ "description": "Exploit for CVE-2019-11043", "fork": false, "created_at": "2019-09-23T21:37:27Z", - "updated_at": "2024-02-29T05:59:21Z", + "updated_at": "2024-03-07T23:39:40Z", "pushed_at": "2019-11-12T18:53:14Z", - "stargazers_count": 1775, - "watchers_count": 1775, + "stargazers_count": 1777, + "watchers_count": 1777, "has_discussions": false, "forks_count": 259, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 259, - "watchers": 1775, + "watchers": 1777, "score": 0, "subscribers_count": 37 }, diff --git a/2019/CVE-2019-6329.json b/2019/CVE-2019-6329.json index 987b4ecbdc..d36d9bf759 100644 --- a/2019/CVE-2019-6329.json +++ b/2019/CVE-2019-6329.json @@ -13,19 +13,19 @@ "description": "Local Privilege Escalation in HP Support Assistant", "fork": false, "created_at": "2019-10-13T09:20:16Z", - "updated_at": "2022-05-06T17:30:55Z", + "updated_at": "2024-03-07T20:01:21Z", "pushed_at": "2022-05-06T17:33:21Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, - "watchers": 2, + "forks": 1, + "watchers": 3, "score": 0, "subscribers_count": 2 } diff --git a/2020/CVE-2020-0601.json b/2020/CVE-2020-0601.json index f5016b3595..42b11af157 100644 --- a/2020/CVE-2020-0601.json +++ b/2020/CVE-2020-0601.json @@ -184,7 +184,7 @@ "forks": 277, "watchers": 887, "score": 0, - "subscribers_count": 34 + "subscribers_count": 33 }, { "id": 234192123, diff --git a/2020/CVE-2020-0688.json b/2020/CVE-2020-0688.json index 9b3101e366..a6f506c797 100644 --- a/2020/CVE-2020-0688.json +++ b/2020/CVE-2020-0688.json @@ -219,7 +219,7 @@ "forks": 13, "watchers": 38, "score": 0, - "subscribers_count": 4 + "subscribers_count": 3 }, { "id": 243813543, @@ -279,7 +279,7 @@ "forks": 81, "watchers": 343, "score": 0, - "subscribers_count": 10 + "subscribers_count": 9 }, { "id": 245013193, diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index c6260de09b..21aad4f330 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -149,7 +149,7 @@ "forks": 206, "watchers": 649, "score": 0, - "subscribers_count": 27 + "subscribers_count": 26 }, { "id": 246621836, diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 95ee9b430e..9058d0af82 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -399,14 +399,14 @@ { "id": 295903888, "name": "zabbix-template-CVE-2020-1472", - "full_name": "scv-m\/zabbix-template-CVE-2020-1472", + "full_name": "okay-scam\/zabbix-template-CVE-2020-1472", "owner": { - "login": "scv-m", + "login": "okay-scam", "id": 965541, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/965541?v=4", - "html_url": "https:\/\/github.com\/scv-m" + "html_url": "https:\/\/github.com\/okay-scam" }, - "html_url": "https:\/\/github.com\/scv-m\/zabbix-template-CVE-2020-1472", + "html_url": "https:\/\/github.com\/okay-scam\/zabbix-template-CVE-2020-1472", "description": "Zabbix Template to monitor for Windows Event Viewer event's related to Netlogon Elevation of Privilege Vulnerability - CVE-2020-1472. Monitors event ID's 5827, 5828 & 5829. See: https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1472", "fork": false, "created_at": "2020-09-16T02:37:52Z", diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 672377d18d..59201e9855 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -68,13 +68,13 @@ "stargazers_count": 282, "watchers_count": 282, "has_discussions": false, - "forks_count": 63, + "forks_count": 59, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 63, + "forks": 59, "watchers": 282, "score": 0, "subscribers_count": 7 diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index bd59d79e13..dd1611fb02 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -78,13 +78,13 @@ "stargazers_count": 116, "watchers_count": 116, "has_discussions": false, - "forks_count": 71, + "forks_count": 68, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 71, + "forks": 68, "watchers": 116, "score": 0, "subscribers_count": 3 diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 7d9070de42..1afee67eef 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -133,10 +133,10 @@ "description": "Log4j-RCE (CVE-2021-44228) Proof of Concept with additional information", "fork": false, "created_at": "2021-12-10T06:15:38Z", - "updated_at": "2024-02-23T03:22:32Z", + "updated_at": "2024-03-07T18:33:43Z", "pushed_at": "2021-12-16T01:33:48Z", - "stargazers_count": 179, - "watchers_count": 179, + "stargazers_count": 180, + "watchers_count": 180, "has_discussions": false, "forks_count": 31, "allow_forking": true, @@ -153,7 +153,7 @@ ], "visibility": "public", "forks": 31, - "watchers": 179, + "watchers": 180, "score": 0, "subscribers_count": 6 }, @@ -374,7 +374,7 @@ "stargazers_count": 1084, "watchers_count": 1084, "has_discussions": false, - "forks_count": 519, + "forks_count": 520, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -382,7 +382,7 @@ "log4shell" ], "visibility": "public", - "forks": 519, + "forks": 520, "watchers": 1084, "score": 0, "subscribers_count": 23 @@ -857,10 +857,10 @@ "description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks", "fork": false, "created_at": "2021-12-10T22:35:00Z", - "updated_at": "2024-03-06T10:23:03Z", + "updated_at": "2024-03-07T18:33:43Z", "pushed_at": "2022-01-15T16:18:44Z", - "stargazers_count": 917, - "watchers_count": 917, + "stargazers_count": 918, + "watchers_count": 918, "has_discussions": false, "forks_count": 141, "allow_forking": true, @@ -889,7 +889,7 @@ ], "visibility": "public", "forks": 141, - "watchers": 917, + "watchers": 918, "score": 0, "subscribers_count": 25 }, @@ -1423,10 +1423,10 @@ "description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228", "fork": false, "created_at": "2021-12-11T11:18:46Z", - "updated_at": "2024-02-25T00:31:58Z", + "updated_at": "2024-03-07T21:46:24Z", "pushed_at": "2022-04-07T14:47:03Z", - "stargazers_count": 855, - "watchers_count": 855, + "stargazers_count": 854, + "watchers_count": 854, "has_discussions": false, "forks_count": 178, "allow_forking": true, @@ -1448,7 +1448,7 @@ ], "visibility": "public", "forks": 178, - "watchers": 855, + "watchers": 854, "score": 0, "subscribers_count": 33 }, @@ -3666,10 +3666,10 @@ "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ", "fork": false, "created_at": "2021-12-13T03:57:50Z", - "updated_at": "2024-03-07T06:30:29Z", + "updated_at": "2024-03-07T18:33:44Z", "pushed_at": "2022-11-23T18:23:24Z", - "stargazers_count": 3339, - "watchers_count": 3339, + "stargazers_count": 3340, + "watchers_count": 3340, "has_discussions": true, "forks_count": 740, "allow_forking": true, @@ -3678,7 +3678,7 @@ "topics": [], "visibility": "public", "forks": 740, - "watchers": 3339, + "watchers": 3340, "score": 0, "subscribers_count": 57 }, diff --git a/2022/CVE-2022-1386.json b/2022/CVE-2022-1386.json index 94e076e29b..36aa93d8f2 100644 --- a/2022/CVE-2022-1386.json +++ b/2022/CVE-2022-1386.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-02-28T02:08:59Z", - "updated_at": "2023-08-21T09:55:51Z", + "updated_at": "2024-03-07T19:41:19Z", "pushed_at": "2023-03-09T16:25:57Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 7, + "watchers": 8, "score": 0, "subscribers_count": 1 }, diff --git a/2022/CVE-2022-23222.json b/2022/CVE-2022-23222.json index 795c6e7241..b78f8ace9f 100644 --- a/2022/CVE-2022-23222.json +++ b/2022/CVE-2022-23222.json @@ -13,10 +13,10 @@ "description": "CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation", "fork": false, "created_at": "2022-06-07T03:20:23Z", - "updated_at": "2024-02-24T11:42:42Z", + "updated_at": "2024-03-07T20:27:30Z", "pushed_at": "2022-06-07T03:41:13Z", - "stargazers_count": 556, - "watchers_count": 556, + "stargazers_count": 557, + "watchers_count": 557, "has_discussions": false, "forks_count": 95, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 95, - "watchers": 556, + "watchers": 557, "score": 0, "subscribers_count": 7 }, diff --git a/2022/CVE-2022-30136.json b/2022/CVE-2022-30136.json index 14a51612da..8636202de6 100644 --- a/2022/CVE-2022-30136.json +++ b/2022/CVE-2022-30136.json @@ -13,19 +13,19 @@ "description": "Windows Network File System Remote exploit for CVE-2022-30136", "fork": false, "created_at": "2023-03-15T10:59:08Z", - "updated_at": "2023-10-03T20:31:04Z", + "updated_at": "2024-03-07T18:39:43Z", "pushed_at": "2023-07-11T16:57:26Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, - "forks_count": 12, + "forks_count": 13, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 12, - "watchers": 8, + "forks": 13, + "watchers": 9, "score": 0, "subscribers_count": 3 }, diff --git a/2022/CVE-2022-37969.json b/2022/CVE-2022-37969.json index 96c1852505..46118c4868 100644 --- a/2022/CVE-2022-37969.json +++ b/2022/CVE-2022-37969.json @@ -13,10 +13,10 @@ "description": "Windows LPE exploit for CVE-2022-37969", "fork": false, "created_at": "2023-03-09T21:17:44Z", - "updated_at": "2024-01-22T08:01:46Z", + "updated_at": "2024-03-07T18:41:03Z", "pushed_at": "2023-07-11T16:50:28Z", - "stargazers_count": 122, - "watchers_count": 122, + "stargazers_count": 123, + "watchers_count": 123, "has_discussions": false, "forks_count": 39, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 39, - "watchers": 122, + "watchers": 123, "score": 0, "subscribers_count": 5 } diff --git a/2023/CVE-2023-2002.json b/2023/CVE-2023-2002.json index 1e1b1db794..47cae99a73 100644 --- a/2023/CVE-2023-2002.json +++ b/2023/CVE-2023-2002.json @@ -13,10 +13,10 @@ "description": "Linux Bluetooth - Run arbitrary management commands as an unprivileged user", "fork": false, "created_at": "2023-04-16T10:05:13Z", - "updated_at": "2024-02-29T10:33:36Z", + "updated_at": "2024-03-08T00:02:23Z", "pushed_at": "2023-05-31T16:06:34Z", - "stargazers_count": 78, - "watchers_count": 78, + "stargazers_count": 79, + "watchers_count": 79, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 78, + "watchers": 79, "score": 0, "subscribers_count": 4 } diff --git a/2023/CVE-2023-25690.json b/2023/CVE-2023-25690.json index 32d538f899..6e3206ae11 100644 --- a/2023/CVE-2023-25690.json +++ b/2023/CVE-2023-25690.json @@ -52,7 +52,7 @@ "stargazers_count": 245, "watchers_count": 245, "has_discussions": false, - "forks_count": 34, + "forks_count": 35, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -66,7 +66,7 @@ "poc" ], "visibility": "public", - "forks": 34, + "forks": 35, "watchers": 245, "score": 0, "subscribers_count": 4 diff --git a/2023/CVE-2023-2640.json b/2023/CVE-2023-2640.json index 5cf25200c1..e615ee1a34 100644 --- a/2023/CVE-2023-2640.json +++ b/2023/CVE-2023-2640.json @@ -73,10 +73,10 @@ "description": "GameOver(lay) Ubuntu Privilege Escalation", "fork": false, "created_at": "2023-10-09T22:02:42Z", - "updated_at": "2024-03-06T15:15:05Z", + "updated_at": "2024-03-07T21:55:57Z", "pushed_at": "2023-10-09T22:44:21Z", - "stargazers_count": 86, - "watchers_count": 86, + "stargazers_count": 85, + "watchers_count": 85, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 86, + "watchers": 85, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-28252.json b/2023/CVE-2023-28252.json index 60250f038b..974f450aff 100644 --- a/2023/CVE-2023-28252.json +++ b/2023/CVE-2023-28252.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-06-27T12:22:05Z", - "updated_at": "2024-03-05T05:43:18Z", + "updated_at": "2024-03-07T18:41:48Z", "pushed_at": "2023-07-10T16:57:44Z", - "stargazers_count": 160, - "watchers_count": 160, + "stargazers_count": 161, + "watchers_count": 161, "has_discussions": false, "forks_count": 42, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 42, - "watchers": 160, + "watchers": 161, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-6553.json b/2023/CVE-2023-6553.json index 2d26d52bae..4acd248dd9 100644 --- a/2023/CVE-2023-6553.json +++ b/2023/CVE-2023-6553.json @@ -13,10 +13,10 @@ "description": "Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution", "fork": false, "created_at": "2023-12-13T20:26:59Z", - "updated_at": "2024-03-03T20:41:43Z", + "updated_at": "2024-03-07T21:15:12Z", "pushed_at": "2024-02-06T23:22:31Z", - "stargazers_count": 62, - "watchers_count": 62, + "stargazers_count": 63, + "watchers_count": 63, "has_discussions": false, "forks_count": 19, "allow_forking": true, @@ -39,7 +39,7 @@ ], "visibility": "public", "forks": 19, - "watchers": 62, + "watchers": 63, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-1403.json b/2024/CVE-2024-1403.json index 77b0ef5536..33717ba7bf 100644 --- a/2024/CVE-2024-1403.json +++ b/2024/CVE-2024-1403.json @@ -13,10 +13,10 @@ "description": "Progress OpenEdge Authentication Bypass", "fork": false, "created_at": "2024-03-06T15:27:18Z", - "updated_at": "2024-03-07T07:45:51Z", + "updated_at": "2024-03-07T22:00:43Z", "pushed_at": "2024-03-06T15:31:56Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 4 } diff --git a/2024/CVE-2024-1709.json b/2024/CVE-2024-1709.json index 6389bfca41..c36e49e000 100644 --- a/2024/CVE-2024-1709.json +++ b/2024/CVE-2024-1709.json @@ -52,10 +52,10 @@ "description": "A Scanner for CVE-2024-1709 - ConnectWise SecureConnect Authentication Bypass Vulnerability", "fork": false, "created_at": "2024-02-23T17:26:28Z", - "updated_at": "2024-02-29T14:55:27Z", + "updated_at": "2024-03-07T18:43:45Z", "pushed_at": "2024-02-26T12:00:23Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 0, + "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -64,7 +64,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 0, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-21338.json b/2024/CVE-2024-21338.json new file mode 100644 index 0000000000..8b70eb65f7 --- /dev/null +++ b/2024/CVE-2024-21338.json @@ -0,0 +1,32 @@ +[ + { + "id": 768828187, + "name": "CVE-2024-21338-POC", + "full_name": "crackmapEZec\/CVE-2024-21338-POC", + "owner": { + "login": "crackmapEZec", + "id": 162632735, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/162632735?v=4", + "html_url": "https:\/\/github.com\/crackmapEZec" + }, + "html_url": "https:\/\/github.com\/crackmapEZec\/CVE-2024-21338-POC", + "description": "CVE-2024-21338 Windows Kernel Elevation of Privilege Vulnerability Zero-day", + "fork": false, + "created_at": "2024-03-07T20:09:35Z", + "updated_at": "2024-03-07T20:26:05Z", + "pushed_at": "2024-03-07T20:12:55Z", + "stargazers_count": 3, + "watchers_count": 3, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 3, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-21762.json b/2024/CVE-2024-21762.json index 4ff8ae21b8..3f444a0c42 100644 --- a/2024/CVE-2024-21762.json +++ b/2024/CVE-2024-21762.json @@ -118,5 +118,35 @@ "watchers": 4, "score": 0, "subscribers_count": 1 + }, + { + "id": 768881270, + "name": "CVE-2024-21762-Exploit-POC", + "full_name": "RequestXss\/CVE-2024-21762-Exploit-POC", + "owner": { + "login": "RequestXss", + "id": 162373520, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/162373520?v=4", + "html_url": "https:\/\/github.com\/RequestXss" + }, + "html_url": "https:\/\/github.com\/RequestXss\/CVE-2024-21762-Exploit-POC", + "description": "Real proof-of-concept out-of-bound write vuln in FortiOS ---> RCE ", + "fork": false, + "created_at": "2024-03-07T22:51:59Z", + "updated_at": "2024-03-07T23:11:18Z", + "pushed_at": "2024-03-07T23:12:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-27198.json b/2024/CVE-2024-27198.json index 937016c498..b7d87ddeb4 100644 --- a/2024/CVE-2024-27198.json +++ b/2024/CVE-2024-27198.json @@ -103,10 +103,10 @@ "description": "CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4", "fork": false, "created_at": "2024-03-06T03:15:03Z", - "updated_at": "2024-03-07T18:05:04Z", + "updated_at": "2024-03-07T19:05:06Z", "pushed_at": "2024-03-06T05:08:41Z", - "stargazers_count": 31, - "watchers_count": 31, + "stargazers_count": 32, + "watchers_count": 32, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -121,7 +121,7 @@ ], "visibility": "public", "forks": 8, - "watchers": 31, + "watchers": 32, "score": 0, "subscribers_count": 1 }, diff --git a/README.md b/README.md index 5021f19a84..9821982584 100644 --- a/README.md +++ b/README.md @@ -194,6 +194,13 @@ - [tandasat/CVE-2024-21305](https://github.com/tandasat/CVE-2024-21305) +### CVE-2024-21338 (2024-02-13) + +Windows Kernel Elevation of Privilege Vulnerability + + +- [crackmapEZec/CVE-2024-21338-POC](https://github.com/crackmapEZec/CVE-2024-21338-POC) + ### CVE-2024-21410 (2024-02-13) Microsoft Exchange Server Elevation of Privilege Vulnerability @@ -247,6 +254,7 @@ - [BishopFox/cve-2024-21762-check](https://github.com/BishopFox/cve-2024-21762-check) - [redCode001/CVE-2024-21762-POC](https://github.com/redCode001/CVE-2024-21762-POC) - [c0d3b3af/CVE-2024-21762-Exploit](https://github.com/c0d3b3af/CVE-2024-21762-Exploit) +- [RequestXss/CVE-2024-21762-Exploit-POC](https://github.com/RequestXss/CVE-2024-21762-Exploit-POC) ### CVE-2024-21887 (2024-01-12) @@ -539,7 +547,11 @@ - [ELIZEUOPAIN/CVE-2024-24034](https://github.com/ELIZEUOPAIN/CVE-2024-24034) -### CVE-2024-24035 +### CVE-2024-24035 (-) + +Cross Site Scripting (XSS) vulnerability in Setor Informatica SIL 3.1 allows attackers to run arbitrary code via the hmessage parameter. + + - [ELIZEUOPAIN/CVE-2024-24035](https://github.com/ELIZEUOPAIN/CVE-2024-24035) ### CVE-2024-24092 @@ -22059,7 +22071,7 @@ - [thatonesecguy/zerologon-CVE-2020-1472](https://github.com/thatonesecguy/zerologon-CVE-2020-1472) - [k8gege/CVE-2020-1472-EXP](https://github.com/k8gege/CVE-2020-1472-EXP) - [jiushill/CVE-2020-1472](https://github.com/jiushill/CVE-2020-1472) -- [scv-m/zabbix-template-CVE-2020-1472](https://github.com/scv-m/zabbix-template-CVE-2020-1472) +- [okay-scam/zabbix-template-CVE-2020-1472](https://github.com/okay-scam/zabbix-template-CVE-2020-1472) - [mstxq17/cve-2020-1472](https://github.com/mstxq17/cve-2020-1472) - [Fa1c0n35/CVE-2020-1472](https://github.com/Fa1c0n35/CVE-2020-1472) - [Fa1c0n35/SecuraBV-CVE-2020-1472](https://github.com/Fa1c0n35/SecuraBV-CVE-2020-1472)