diff --git a/2010/CVE-2010-0426.json b/2010/CVE-2010-0426.json index 1f8d880e08..87407716fa 100644 --- a/2010/CVE-2010-0426.json +++ b/2010/CVE-2010-0426.json @@ -14,7 +14,7 @@ "description": "Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container", "fork": false, "created_at": "2017-12-16T01:16:44Z", - "updated_at": "2024-08-12T19:34:50Z", + "updated_at": "2024-11-26T21:35:03Z", "pushed_at": "2017-12-16T01:19:11Z", "stargazers_count": 9, "watchers_count": 9, diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json index 6af6f4c3c9..6cfdefbe51 100644 --- a/2016/CVE-2016-5195.json +++ b/2016/CVE-2016-5195.json @@ -462,10 +462,10 @@ "description": "Dirty Cow exploit - CVE-2016-5195", "fork": false, "created_at": "2016-11-25T21:08:01Z", - "updated_at": "2024-11-19T23:44:17Z", + "updated_at": "2024-11-26T21:35:00Z", "pushed_at": "2021-04-08T11:35:12Z", - "stargazers_count": 861, - "watchers_count": 861, + "stargazers_count": 862, + "watchers_count": 862, "has_discussions": false, "forks_count": 429, "allow_forking": true, @@ -478,7 +478,7 @@ ], "visibility": "public", "forks": 429, - "watchers": 861, + "watchers": 862, "score": 0, "subscribers_count": 9 }, diff --git a/2016/CVE-2016-6754.json b/2016/CVE-2016-6754.json index 100747f839..ef3ff25996 100644 --- a/2016/CVE-2016-6754.json +++ b/2016/CVE-2016-6754.json @@ -14,10 +14,10 @@ "description": "Full exploit of CVE-2016-6754(BadKernel) and slide of SyScan360 2016", "fork": false, "created_at": "2016-11-28T08:44:44Z", - "updated_at": "2024-08-12T19:26:18Z", + "updated_at": "2024-11-26T22:25:47Z", "pushed_at": "2016-11-28T09:55:46Z", - "stargazers_count": 153, - "watchers_count": 153, + "stargazers_count": 152, + "watchers_count": 152, "has_discussions": false, "forks_count": 71, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 71, - "watchers": 153, + "watchers": 152, "score": 0, "subscribers_count": 14 } diff --git a/2019/CVE-2019-16253.json b/2019/CVE-2019-16253.json index 314f60b411..f5ca4dd4a5 100644 --- a/2019/CVE-2019-16253.json +++ b/2019/CVE-2019-16253.json @@ -14,10 +14,10 @@ "description": "Exploit I discovered in October of 2022 with androids Package manager binary (pm) and the way it handled debugging flags, patched out by march 2023. Uses CVE-2019-16253 as a payload to obtain a system shell. ", "fork": false, "created_at": "2023-01-19T19:47:13Z", - "updated_at": "2024-10-26T22:39:41Z", + "updated_at": "2024-11-26T18:44:49Z", "pushed_at": "2024-03-20T19:12:39Z", - "stargazers_count": 79, - "watchers_count": 79, + "stargazers_count": 78, + "watchers_count": 78, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -33,7 +33,7 @@ ], "visibility": "public", "forks": 15, - "watchers": 79, + "watchers": 78, "score": 0, "subscribers_count": 12 } diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 7ef179dbf2..7430e77429 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -138,10 +138,10 @@ "description": "Scanner for CVE-2020-0796 - SMBv3 RCE", "fork": false, "created_at": "2020-03-11T15:21:27Z", - "updated_at": "2024-11-07T17:59:52Z", + "updated_at": "2024-11-26T23:51:11Z", "pushed_at": "2020-10-01T08:36:29Z", - "stargazers_count": 665, - "watchers_count": 665, + "stargazers_count": 666, + "watchers_count": 666, "has_discussions": false, "forks_count": 199, "allow_forking": true, @@ -152,7 +152,7 @@ ], "visibility": "public", "forks": 199, - "watchers": 665, + "watchers": 666, "score": 0, "subscribers_count": 26 }, diff --git a/2021/CVE-2021-21086.json b/2021/CVE-2021-21086.json index 1b8ee33400..777143e9b2 100644 --- a/2021/CVE-2021-21086.json +++ b/2021/CVE-2021-21086.json @@ -28,6 +28,6 @@ "forks": 12, "watchers": 27, "score": 0, - "subscribers_count": 10 + "subscribers_count": 11 } ] \ No newline at end of file diff --git a/2021/CVE-2021-3560.json b/2021/CVE-2021-3560.json index c99a219fee..ddcb643d26 100644 --- a/2021/CVE-2021-3560.json +++ b/2021/CVE-2021-3560.json @@ -209,10 +209,10 @@ "description": "Privilege escalation with polkit - CVE-2021-3560", "fork": false, "created_at": "2021-06-19T08:15:17Z", - "updated_at": "2024-11-19T19:23:44Z", + "updated_at": "2024-11-26T22:44:38Z", "pushed_at": "2021-06-20T07:38:13Z", - "stargazers_count": 115, - "watchers_count": 115, + "stargazers_count": 116, + "watchers_count": 116, "has_discussions": false, "forks_count": 50, "allow_forking": true, @@ -221,7 +221,7 @@ "topics": [], "visibility": "public", "forks": 50, - "watchers": 115, + "watchers": 116, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-36260.json b/2021/CVE-2021-36260.json index 6beb57c409..f36059dfad 100644 --- a/2021/CVE-2021-36260.json +++ b/2021/CVE-2021-36260.json @@ -279,6 +279,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index 4c351b51dc..59b49c9621 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -967,10 +967,10 @@ "description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation", "fork": false, "created_at": "2022-01-26T14:26:10Z", - "updated_at": "2024-11-22T23:12:26Z", + "updated_at": "2024-11-26T21:46:55Z", "pushed_at": "2022-06-21T14:52:05Z", - "stargazers_count": 1088, - "watchers_count": 1088, + "stargazers_count": 1089, + "watchers_count": 1089, "has_discussions": false, "forks_count": 189, "allow_forking": true, @@ -981,7 +981,7 @@ ], "visibility": "public", "forks": 189, - "watchers": 1088, + "watchers": 1089, "score": 0, "subscribers_count": 13 }, @@ -2465,7 +2465,7 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 }, { "id": 453089649, diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json index 36d02c6e62..699f016c78 100644 --- a/2021/CVE-2021-40444.json +++ b/2021/CVE-2021-40444.json @@ -231,10 +231,10 @@ "description": "CVE-2021-40444 PoC", "fork": false, "created_at": "2021-09-10T16:55:53Z", - "updated_at": "2024-11-24T19:50:02Z", + "updated_at": "2024-11-26T21:50:16Z", "pushed_at": "2021-12-25T18:31:02Z", - "stargazers_count": 1597, - "watchers_count": 1597, + "stargazers_count": 1598, + "watchers_count": 1598, "has_discussions": false, "forks_count": 483, "allow_forking": true, @@ -243,7 +243,7 @@ "topics": [], "visibility": "public", "forks": 483, - "watchers": 1597, + "watchers": 1598, "score": 0, "subscribers_count": 28 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 823b26d6cd..739b066eda 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -12048,7 +12048,7 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 }, { "id": 614031542, diff --git a/2023/CVE-2023-21768.json b/2023/CVE-2023-21768.json index 1a8f878d32..6e1a06eeb1 100644 --- a/2023/CVE-2023-21768.json +++ b/2023/CVE-2023-21768.json @@ -14,10 +14,10 @@ "description": "LPE exploit for CVE-2023-21768", "fork": false, "created_at": "2023-03-07T23:00:27Z", - "updated_at": "2024-11-19T02:35:14Z", + "updated_at": "2024-11-26T22:22:03Z", "pushed_at": "2023-07-10T16:35:49Z", - "stargazers_count": 482, - "watchers_count": 482, + "stargazers_count": 483, + "watchers_count": 483, "has_discussions": false, "forks_count": 163, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 163, - "watchers": 482, + "watchers": 483, "score": 0, "subscribers_count": 10 }, diff --git a/2023/CVE-2023-28324.json b/2023/CVE-2023-28324.json index 8129049dcb..a6cf5e87ce 100644 --- a/2023/CVE-2023-28324.json +++ b/2023/CVE-2023-28324.json @@ -14,10 +14,10 @@ "description": "Ivanti EPM AgentPortal RCE Vulnerability", "fork": false, "created_at": "2024-09-13T14:02:04Z", - "updated_at": "2024-10-16T07:49:53Z", + "updated_at": "2024-11-26T23:19:45Z", "pushed_at": "2024-09-16T14:24:20Z", - "stargazers_count": 20, - "watchers_count": 20, + "stargazers_count": 21, + "watchers_count": 21, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 20, + "watchers": 21, "score": 0, "subscribers_count": 4 } diff --git a/2023/CVE-2023-32413.json b/2023/CVE-2023-32413.json index 811ba69968..e46e347407 100644 --- a/2023/CVE-2023-32413.json +++ b/2023/CVE-2023-32413.json @@ -14,10 +14,10 @@ "description": "Exploit code for CVE-2023-42914 \/ pwn2own Vancouver 2023", "fork": false, "created_at": "2024-11-22T11:28:35Z", - "updated_at": "2024-11-26T14:20:50Z", + "updated_at": "2024-11-26T21:08:44Z", "pushed_at": "2024-11-22T12:10:47Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 6, "score": 0, "subscribers_count": 0 } diff --git a/2023/CVE-2023-32428.json b/2023/CVE-2023-32428.json index 9674d71f0b..c57cfe7ba6 100644 --- a/2023/CVE-2023-32428.json +++ b/2023/CVE-2023-32428.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2024-11-26T07:52:29Z", - "updated_at": "2024-11-26T08:09:22Z", + "updated_at": "2024-11-26T18:37:26Z", "pushed_at": "2024-11-26T08:06:06Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 0 } diff --git a/2023/CVE-2023-38646.json b/2023/CVE-2023-38646.json index 89ced98e1e..0afa4b0d04 100644 --- a/2023/CVE-2023-38646.json +++ b/2023/CVE-2023-38646.json @@ -1160,5 +1160,36 @@ "watchers": 2, "score": 0, "subscribers_count": 1 + }, + { + "id": 894667013, + "name": "CVE-2023-38646-PoC-Metabase", + "full_name": "JayRyz\/CVE-2023-38646-PoC-Metabase", + "owner": { + "login": "JayRyz", + "id": 99511456, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99511456?v=4", + "html_url": "https:\/\/github.com\/JayRyz", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/JayRyz\/CVE-2023-38646-PoC-Metabase", + "description": "Proof-of-Concept script for exploiting CVE-2023-38646. Intended for educational and research purposes only.", + "fork": false, + "created_at": "2024-11-26T19:05:35Z", + "updated_at": "2024-11-26T20:00:11Z", + "pushed_at": "2024-11-26T20:00:07Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-5521.json b/2023/CVE-2023-5521.json index 8799e23dbd..2ab113fe6d 100644 --- a/2023/CVE-2023-5521.json +++ b/2023/CVE-2023-5521.json @@ -14,10 +14,10 @@ "description": "Root takeover via signature spoofing in KernelSU", "fork": false, "created_at": "2023-10-11T12:08:31Z", - "updated_at": "2024-09-18T08:09:52Z", + "updated_at": "2024-11-26T18:44:53Z", "pushed_at": "2023-10-11T12:34:37Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 14, + "watchers_count": 14, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 15, + "watchers": 14, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-6246.json b/2023/CVE-2023-6246.json index 284c859ae4..f6e0a81554 100644 --- a/2023/CVE-2023-6246.json +++ b/2023/CVE-2023-6246.json @@ -19,13 +19,13 @@ "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, - "forks_count": 4, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 4, + "forks": 5, "watchers": 5, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-10542.json b/2024/CVE-2024-10542.json index ec1093df87..d46235c584 100644 --- a/2024/CVE-2024-10542.json +++ b/2024/CVE-2024-10542.json @@ -1,6 +1,6 @@ [ { - "id": 894423766, + "id": 894757253, "name": "CVE-2024-10542", "full_name": "ubaii\/CVE-2024-10542", "owner": { @@ -11,13 +11,13 @@ "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ubaii\/CVE-2024-10542", - "description": null, + "description": "WordPress Spam protection, AntiSpam, FireWall by CleanTalk Plugin <= 6.43.2 is vulnerable to Unauthenticated Arbitrary Plugin Installation Installation", "fork": false, - "created_at": "2024-11-26T10:32:36Z", - "updated_at": "2024-11-26T10:32:52Z", - "pushed_at": "2024-11-26T10:32:48Z", - "stargazers_count": 0, - "watchers_count": 0, + "created_at": "2024-11-26T23:47:17Z", + "updated_at": "2024-11-26T23:53:51Z", + "pushed_at": "2024-11-26T23:49:15Z", + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-10914.json b/2024/CVE-2024-10914.json index 892ffa92e5..ce50e412bb 100644 --- a/2024/CVE-2024-10914.json +++ b/2024/CVE-2024-10914.json @@ -45,12 +45,12 @@ "description": "POC - CVE-2024–10914- Command Injection Vulnerability in `name` parameter for D-Link NAS", "fork": false, "created_at": "2024-11-10T12:01:21Z", - "updated_at": "2024-11-26T14:45:35Z", + "updated_at": "2024-11-27T00:06:53Z", "pushed_at": "2024-11-26T14:45:28Z", - "stargazers_count": 19, - "watchers_count": 19, + "stargazers_count": 26, + "watchers_count": 26, "has_discussions": false, - "forks_count": 9, + "forks_count": 11, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -64,8 +64,8 @@ "unauthenticated-rce" ], "visibility": "public", - "forks": 9, - "watchers": 19, + "forks": 11, + "watchers": 26, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-20356.json b/2024/CVE-2024-20356.json index c029eb0d72..78693477fa 100644 --- a/2024/CVE-2024-20356.json +++ b/2024/CVE-2024-20356.json @@ -14,10 +14,10 @@ "description": "This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.", "fork": false, "created_at": "2024-04-12T15:07:42Z", - "updated_at": "2024-11-26T15:12:53Z", + "updated_at": "2024-11-26T21:19:59Z", "pushed_at": "2024-04-18T14:31:34Z", - "stargazers_count": 51, - "watchers_count": 51, + "stargazers_count": 52, + "watchers_count": 52, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 11, - "watchers": 51, + "watchers": 52, "score": 0, "subscribers_count": 7 }, diff --git a/2024/CVE-2024-23692.json b/2024/CVE-2024-23692.json index 0d4b3999d5..1a96f62a7b 100644 --- a/2024/CVE-2024-23692.json +++ b/2024/CVE-2024-23692.json @@ -293,10 +293,10 @@ "description": "POC - Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692 ", "fork": false, "created_at": "2024-09-15T12:15:35Z", - "updated_at": "2024-11-26T14:45:54Z", + "updated_at": "2024-11-26T21:34:48Z", "pushed_at": "2024-11-26T14:45:12Z", - "stargazers_count": 31, - "watchers_count": 31, + "stargazers_count": 32, + "watchers_count": 32, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -310,7 +310,7 @@ ], "visibility": "public", "forks": 14, - "watchers": 31, + "watchers": 32, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-23897.json b/2024/CVE-2024-23897.json index 07969691b5..1a80da69d1 100644 --- a/2024/CVE-2024-23897.json +++ b/2024/CVE-2024-23897.json @@ -1013,10 +1013,10 @@ "description": "POC - Jenkins File Read Vulnerability - CVE-2024-23897", "fork": false, "created_at": "2024-09-30T16:38:28Z", - "updated_at": "2024-11-26T14:47:11Z", + "updated_at": "2024-11-26T21:33:10Z", "pushed_at": "2024-11-26T14:46:59Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -1032,7 +1032,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 6, + "watchers": 7, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-24919.json b/2024/CVE-2024-24919.json index 4182760a3d..4d1bea2861 100644 --- a/2024/CVE-2024-24919.json +++ b/2024/CVE-2024-24919.json @@ -1381,10 +1381,10 @@ "description": "POC - CVE-2024–24919 - Check Point Security Gateways", "fork": false, "created_at": "2024-06-09T06:54:51Z", - "updated_at": "2024-11-26T14:46:28Z", + "updated_at": "2024-11-26T21:34:45Z", "pushed_at": "2024-11-26T14:45:44Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -1398,7 +1398,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 7, + "watchers": 8, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-27198.json b/2024/CVE-2024-27198.json index 417b2a78d4..b36c05e3d2 100644 --- a/2024/CVE-2024-27198.json +++ b/2024/CVE-2024-27198.json @@ -79,10 +79,10 @@ "description": "CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4", "fork": false, "created_at": "2024-03-06T03:15:03Z", - "updated_at": "2024-11-21T14:02:02Z", + "updated_at": "2024-11-26T22:50:05Z", "pushed_at": "2024-03-11T07:57:40Z", - "stargazers_count": 143, - "watchers_count": 143, + "stargazers_count": 144, + "watchers_count": 144, "has_discussions": false, "forks_count": 36, "allow_forking": true, @@ -101,7 +101,7 @@ ], "visibility": "public", "forks": 36, - "watchers": 143, + "watchers": 144, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-2961.json b/2024/CVE-2024-2961.json index 75d8db6bfc..b2808f69f0 100644 --- a/2024/CVE-2024-2961.json +++ b/2024/CVE-2024-2961.json @@ -76,10 +76,10 @@ "description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()", "fork": false, "created_at": "2024-05-27T08:30:06Z", - "updated_at": "2024-11-25T08:43:52Z", + "updated_at": "2024-11-26T23:16:03Z", "pushed_at": "2024-09-30T08:45:56Z", - "stargazers_count": 419, - "watchers_count": 419, + "stargazers_count": 420, + "watchers_count": 420, "has_discussions": false, "forks_count": 52, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 52, - "watchers": 419, + "watchers": 420, "score": 0, "subscribers_count": 8 }, diff --git a/2024/CVE-2024-29824.json b/2024/CVE-2024-29824.json index 0907b90abf..72d7c2dd48 100644 --- a/2024/CVE-2024-29824.json +++ b/2024/CVE-2024-29824.json @@ -14,10 +14,10 @@ "description": "Ivanti EPM SQL Injection Remote Code Execution Vulnerability", "fork": false, "created_at": "2024-06-12T13:53:32Z", - "updated_at": "2024-11-06T12:03:23Z", + "updated_at": "2024-11-26T23:18:26Z", "pushed_at": "2024-06-12T14:04:39Z", - "stargazers_count": 20, - "watchers_count": 20, + "stargazers_count": 21, + "watchers_count": 21, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 20, + "watchers": 21, "score": 0, "subscribers_count": 5 }, diff --git a/2024/CVE-2024-3273.json b/2024/CVE-2024-3273.json index 3da015f4fe..a2836bf870 100644 --- a/2024/CVE-2024-3273.json +++ b/2024/CVE-2024-3273.json @@ -14,10 +14,10 @@ "description": "D-Link NAS CVE-2024-3273 Exploit Tool", "fork": false, "created_at": "2024-04-07T03:09:13Z", - "updated_at": "2024-10-26T08:30:03Z", + "updated_at": "2024-11-26T21:08:59Z", "pushed_at": "2024-04-07T04:41:26Z", - "stargazers_count": 90, - "watchers_count": 90, + "stargazers_count": 91, + "watchers_count": 91, "has_discussions": false, "forks_count": 20, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 20, - "watchers": 90, + "watchers": 91, "score": 0, "subscribers_count": 4 }, diff --git a/2024/CVE-2024-35250.json b/2024/CVE-2024-35250.json index 42b8c07143..1cac48e519 100644 --- a/2024/CVE-2024-35250.json +++ b/2024/CVE-2024-35250.json @@ -14,8 +14,8 @@ "description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver", "fork": false, "created_at": "2024-10-13T19:30:20Z", - "updated_at": "2024-11-25T15:53:56Z", - "pushed_at": "2024-11-12T15:28:48Z", + "updated_at": "2024-11-26T20:54:21Z", + "pushed_at": "2024-11-26T20:54:17Z", "stargazers_count": 210, "watchers_count": 210, "has_discussions": false, diff --git a/2024/CVE-2024-38856.json b/2024/CVE-2024-38856.json index a06f86b17c..f8671734c7 100644 --- a/2024/CVE-2024-38856.json +++ b/2024/CVE-2024-38856.json @@ -14,10 +14,10 @@ "description": "Apache OFBiz RCE Scanner & Exploit (CVE-2024-38856)", "fork": false, "created_at": "2024-08-08T02:40:56Z", - "updated_at": "2024-11-20T16:31:00Z", + "updated_at": "2024-11-26T22:44:35Z", "pushed_at": "2024-10-02T15:59:28Z", - "stargazers_count": 38, - "watchers_count": 38, + "stargazers_count": 39, + "watchers_count": 39, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -34,7 +34,7 @@ ], "visibility": "public", "forks": 11, - "watchers": 38, + "watchers": 39, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-40711.json b/2024/CVE-2024-40711.json index f5d8931c6c..fbe45972fe 100644 --- a/2024/CVE-2024-40711.json +++ b/2024/CVE-2024-40711.json @@ -19,13 +19,13 @@ "stargazers_count": 36, "watchers_count": 36, "has_discussions": false, - "forks_count": 9, + "forks_count": 10, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 9, + "forks": 10, "watchers": 36, "score": 0, "subscribers_count": 0 diff --git a/2024/CVE-2024-4358.json b/2024/CVE-2024-4358.json index f13d9d231c..40de046d1f 100644 --- a/2024/CVE-2024-4358.json +++ b/2024/CVE-2024-4358.json @@ -138,10 +138,10 @@ "description": "Authentication Bypass Vulnerability — CVE-2024–4358 — Telerik Report Server 2024", "fork": false, "created_at": "2024-06-09T06:30:06Z", - "updated_at": "2024-11-26T14:46:50Z", + "updated_at": "2024-11-26T21:34:46Z", "pushed_at": "2024-11-26T14:46:07Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -155,7 +155,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 9, + "watchers": 10, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-45241.json b/2024/CVE-2024-45241.json index 39eaf4ea85..c36856d1b1 100644 --- a/2024/CVE-2024-45241.json +++ b/2024/CVE-2024-45241.json @@ -45,10 +45,10 @@ "description": null, "fork": false, "created_at": "2024-09-19T12:43:48Z", - "updated_at": "2024-11-26T14:48:31Z", + "updated_at": "2024-11-26T21:34:47Z", "pushed_at": "2024-11-26T14:47:16Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -64,7 +64,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 6, + "watchers": 7, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-4956.json b/2024/CVE-2024-4956.json index 986621575f..28213aeb0b 100644 --- a/2024/CVE-2024-4956.json +++ b/2024/CVE-2024-4956.json @@ -410,10 +410,10 @@ "description": "POC - CVE-2024–4956 - Nexus Repository Manager 3 Unauthenticated Path Traversal", "fork": false, "created_at": "2024-06-09T10:57:29Z", - "updated_at": "2024-11-26T14:46:59Z", + "updated_at": "2024-11-26T21:34:44Z", "pushed_at": "2024-11-26T14:46:24Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -426,7 +426,7 @@ ], "visibility": "public", "forks": 4, - "watchers": 11, + "watchers": 12, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-8190.json b/2024/CVE-2024-8190.json index 6063633335..de8d79e214 100644 --- a/2024/CVE-2024-8190.json +++ b/2024/CVE-2024-8190.json @@ -14,10 +14,10 @@ "description": "CVE-2024-8190: Ivanti Cloud Service Appliance Command Injection", "fork": false, "created_at": "2024-09-16T15:33:46Z", - "updated_at": "2024-11-20T16:31:04Z", + "updated_at": "2024-11-26T23:19:35Z", "pushed_at": "2024-09-16T15:43:44Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 11, + "watchers": 12, "score": 0, "subscribers_count": 5 } diff --git a/2024/CVE-2024-9465.json b/2024/CVE-2024-9465.json index 8dfe27a001..00f28a7d40 100644 --- a/2024/CVE-2024-9465.json +++ b/2024/CVE-2024-9465.json @@ -14,10 +14,10 @@ "description": "Proof of Concept Exploit for CVE-2024-9465", "fork": false, "created_at": "2024-10-09T16:22:05Z", - "updated_at": "2024-11-25T02:31:41Z", + "updated_at": "2024-11-26T23:20:04Z", "pushed_at": "2024-10-09T16:34:42Z", - "stargazers_count": 26, - "watchers_count": 26, + "stargazers_count": 27, + "watchers_count": 27, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 26, + "watchers": 27, "score": 0, "subscribers_count": 4 }, diff --git a/README.md b/README.md index da0db112fa..eca3f9440b 100644 --- a/README.md +++ b/README.md @@ -12650,6 +12650,7 @@ - [acesoyeo/METABASE-RCE-CVE-2023-38646-](https://github.com/acesoyeo/METABASE-RCE-CVE-2023-38646-) - [UserConnecting/Exploit-CVE-2023-38646-Metabase](https://github.com/UserConnecting/Exploit-CVE-2023-38646-Metabase) - [XiaomingX/cve-2023-38646-poc](https://github.com/XiaomingX/cve-2023-38646-poc) +- [JayRyz/CVE-2023-38646-PoC-Metabase](https://github.com/JayRyz/CVE-2023-38646-PoC-Metabase) ### CVE-2023-38709 (2024-04-04)