diff --git a/2018/CVE-2018-14847.json b/2018/CVE-2018-14847.json index ad61c36308..45bb0bfeb1 100644 --- a/2018/CVE-2018-14847.json +++ b/2018/CVE-2018-14847.json @@ -267,19 +267,19 @@ "description": "This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead.", "fork": false, "created_at": "2021-04-21T16:42:31Z", - "updated_at": "2024-11-15T07:40:23Z", + "updated_at": "2024-12-10T07:33:15Z", "pushed_at": "2021-04-21T16:46:37Z", - "stargazers_count": 47, - "watchers_count": 47, + "stargazers_count": 48, + "watchers_count": 48, "has_discussions": false, - "forks_count": 21, + "forks_count": 22, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 21, - "watchers": 47, + "forks": 22, + "watchers": 48, "score": 0, "subscribers_count": 3 }, diff --git a/2019/CVE-2019-12586.json b/2019/CVE-2019-12586.json index a144668763..fbf31b21d0 100644 --- a/2019/CVE-2019-12586.json +++ b/2019/CVE-2019-12586.json @@ -14,10 +14,10 @@ "description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)", "fork": false, "created_at": "2019-09-03T15:08:49Z", - "updated_at": "2024-12-09T19:22:31Z", + "updated_at": "2024-12-10T06:49:39Z", "pushed_at": "2019-09-08T06:09:11Z", - "stargazers_count": 798, - "watchers_count": 798, + "stargazers_count": 799, + "watchers_count": 799, "has_discussions": false, "forks_count": 69, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 69, - "watchers": 798, + "watchers": 799, "score": 0, "subscribers_count": 34 } diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index d6aae85087..969c0ec9ab 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -45,12 +45,12 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2024-12-09T21:26:15Z", + "updated_at": "2024-12-10T10:44:39Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 4136, - "watchers_count": 4136, + "stargazers_count": 4137, + "watchers_count": 4137, "has_discussions": false, - "forks_count": 1099, + "forks_count": 1100, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -76,8 +76,8 @@ "webshell" ], "visibility": "public", - "forks": 1099, - "watchers": 4136, + "forks": 1100, + "watchers": 4137, "score": 0, "subscribers_count": 149 }, diff --git a/2019/CVE-2019-5736.json b/2019/CVE-2019-5736.json index aa7e003087..2b05e60fd1 100644 --- a/2019/CVE-2019-5736.json +++ b/2019/CVE-2019-5736.json @@ -45,10 +45,10 @@ "description": "PoC for CVE-2019-5736", "fork": false, "created_at": "2019-02-13T05:26:32Z", - "updated_at": "2024-11-19T09:37:59Z", + "updated_at": "2024-12-10T10:06:00Z", "pushed_at": "2022-01-05T04:09:42Z", - "stargazers_count": 640, - "watchers_count": 640, + "stargazers_count": 641, + "watchers_count": 641, "has_discussions": false, "forks_count": 163, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 163, - "watchers": 640, + "watchers": 641, "score": 0, "subscribers_count": 13 }, diff --git a/2020/CVE-2020-0668.json b/2020/CVE-2020-0668.json index 50f80360c6..6219c5c653 100644 --- a/2020/CVE-2020-0668.json +++ b/2020/CVE-2020-0668.json @@ -14,10 +14,10 @@ "description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.", "fork": false, "created_at": "2020-02-20T06:22:40Z", - "updated_at": "2024-11-28T15:21:59Z", + "updated_at": "2024-12-10T09:41:30Z", "pushed_at": "2020-02-20T11:03:18Z", - "stargazers_count": 212, - "watchers_count": 212, + "stargazers_count": 213, + "watchers_count": 213, "has_discussions": false, "forks_count": 53, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 53, - "watchers": 212, + "watchers": 213, "score": 0, "subscribers_count": 7 }, diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index e5d77f9a1e..f97ca8073b 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -45,10 +45,10 @@ "description": "Test tool for CVE-2020-1472", "fork": false, "created_at": "2020-09-08T08:58:37Z", - "updated_at": "2024-12-10T04:10:22Z", + "updated_at": "2024-12-10T11:33:12Z", "pushed_at": "2023-07-20T10:51:42Z", - "stargazers_count": 1739, - "watchers_count": 1739, + "stargazers_count": 1740, + "watchers_count": 1740, "has_discussions": false, "forks_count": 359, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 359, - "watchers": 1739, + "watchers": 1740, "score": 0, "subscribers_count": 86 }, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 75e079a7d5..2f452db61d 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -14,12 +14,12 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2024-12-09T21:26:15Z", + "updated_at": "2024-12-10T10:44:39Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 4136, - "watchers_count": 4136, + "stargazers_count": 4137, + "watchers_count": 4137, "has_discussions": false, - "forks_count": 1099, + "forks_count": 1100, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -45,8 +45,8 @@ "webshell" ], "visibility": "public", - "forks": 1099, - "watchers": 4136, + "forks": 1100, + "watchers": 4137, "score": 0, "subscribers_count": 149 }, diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json index c0b20e9237..f748e3c932 100644 --- a/2021/CVE-2021-1675.json +++ b/2021/CVE-2021-1675.json @@ -311,10 +311,10 @@ "description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)", "fork": false, "created_at": "2021-07-01T23:45:58Z", - "updated_at": "2024-12-09T22:38:01Z", + "updated_at": "2024-12-10T08:10:54Z", "pushed_at": "2021-07-05T08:54:06Z", - "stargazers_count": 1020, - "watchers_count": 1020, + "stargazers_count": 1021, + "watchers_count": 1021, "has_discussions": false, "forks_count": 231, "allow_forking": true, @@ -323,7 +323,7 @@ "topics": [], "visibility": "public", "forks": 231, - "watchers": 1020, + "watchers": 1021, "score": 0, "subscribers_count": 26 }, diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index 7a7833b192..ef135e8460 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -76,10 +76,10 @@ "description": null, "fork": false, "created_at": "2021-01-25T08:42:28Z", - "updated_at": "2024-10-21T16:34:50Z", + "updated_at": "2024-12-10T07:47:47Z", "pushed_at": "2021-01-25T08:49:59Z", - "stargazers_count": 71, - "watchers_count": 71, + "stargazers_count": 72, + "watchers_count": 72, "has_discussions": false, "forks_count": 29, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 29, - "watchers": 71, + "watchers": 72, "score": 0, "subscribers_count": 1 }, diff --git a/2021/CVE-2021-43032.json b/2021/CVE-2021-43032.json index cf5491e43a..9fa3c1b662 100644 --- a/2021/CVE-2021-43032.json +++ b/2021/CVE-2021-43032.json @@ -19,7 +19,7 @@ "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, - "forks_count": 2, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -30,7 +30,7 @@ "xenforo2" ], "visibility": "public", - "forks": 2, + "forks": 3, "watchers": 3, "score": 0, "subscribers_count": 0 diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json index 3659a255e4..f2fe68c19e 100644 --- a/2022/CVE-2022-22965.json +++ b/2022/CVE-2022-22965.json @@ -132,10 +132,10 @@ "description": "Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit", "fork": false, "created_at": "2022-03-31T00:24:28Z", - "updated_at": "2024-12-03T03:14:04Z", + "updated_at": "2024-12-10T08:51:14Z", "pushed_at": "2022-08-04T18:26:18Z", - "stargazers_count": 311, - "watchers_count": 311, + "stargazers_count": 310, + "watchers_count": 310, "has_discussions": false, "forks_count": 237, "allow_forking": true, @@ -144,7 +144,7 @@ "topics": [], "visibility": "public", "forks": 237, - "watchers": 311, + "watchers": 310, "score": 0, "subscribers_count": 10 }, diff --git a/2022/CVE-2022-23222.json b/2022/CVE-2022-23222.json index 734d9f75eb..755d3af374 100644 --- a/2022/CVE-2022-23222.json +++ b/2022/CVE-2022-23222.json @@ -19,13 +19,13 @@ "stargazers_count": 560, "watchers_count": 560, "has_discussions": false, - "forks_count": 95, + "forks_count": 97, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 95, + "forks": 97, "watchers": 560, "score": 0, "subscribers_count": 7 diff --git a/2022/CVE-2022-38694.json b/2022/CVE-2022-38694.json index 1901f1a07c..d557b87b5d 100644 --- a/2022/CVE-2022-38694.json +++ b/2022/CVE-2022-38694.json @@ -14,10 +14,10 @@ "description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692", "fork": false, "created_at": "2023-06-10T08:31:26Z", - "updated_at": "2024-12-09T20:56:58Z", + "updated_at": "2024-12-10T09:39:01Z", "pushed_at": "2024-08-01T15:09:15Z", - "stargazers_count": 306, - "watchers_count": 306, + "stargazers_count": 307, + "watchers_count": 307, "has_discussions": true, "forks_count": 44, "allow_forking": true, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 44, - "watchers": 306, + "watchers": 307, "score": 0, "subscribers_count": 8 }, @@ -48,10 +48,10 @@ "description": "Bootloader unlock using CVE-2022-38694 for Anbernic Unisoc T820 devices", "fork": false, "created_at": "2024-06-27T14:28:13Z", - "updated_at": "2024-12-02T01:03:31Z", + "updated_at": "2024-12-10T09:48:51Z", "pushed_at": "2024-10-15T10:16:57Z", - "stargazers_count": 27, - "watchers_count": 27, + "stargazers_count": 28, + "watchers_count": 28, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -60,7 +60,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 27, + "watchers": 28, "score": 0, "subscribers_count": 3 } diff --git a/2023/CVE-2023-0386.json b/2023/CVE-2023-0386.json index 9daf1a5cab..8618423326 100644 --- a/2023/CVE-2023-0386.json +++ b/2023/CVE-2023-0386.json @@ -81,13 +81,13 @@ "stargazers_count": 385, "watchers_count": 385, "has_discussions": false, - "forks_count": 65, + "forks_count": 63, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 65, + "forks": 63, "watchers": 385, "score": 0, "subscribers_count": 4 diff --git a/2023/CVE-2023-21554.json b/2023/CVE-2023-21554.json index 7525aa85d9..a99eb0dc49 100644 --- a/2023/CVE-2023-21554.json +++ b/2023/CVE-2023-21554.json @@ -45,10 +45,10 @@ "description": null, "fork": false, "created_at": "2023-08-17T17:16:46Z", - "updated_at": "2024-10-30T14:41:33Z", + "updated_at": "2024-12-10T07:00:42Z", "pushed_at": "2023-08-21T21:22:40Z", - "stargazers_count": 19, - "watchers_count": 19, + "stargazers_count": 20, + "watchers_count": 20, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 19, + "watchers": 20, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-29357.json b/2023/CVE-2023-29357.json index 9aae7536f4..526a590d78 100644 --- a/2023/CVE-2023-29357.json +++ b/2023/CVE-2023-29357.json @@ -14,7 +14,7 @@ "description": "Microsoft SharePoint Server Elevation of Privilege Vulnerability", "fork": false, "created_at": "2023-09-26T16:18:41Z", - "updated_at": "2024-12-02T08:24:01Z", + "updated_at": "2024-12-10T11:18:40Z", "pushed_at": "2023-09-26T19:04:21Z", "stargazers_count": 229, "watchers_count": 229, diff --git a/2023/CVE-2023-32784.json b/2023/CVE-2023-32784.json index 994fd2a0cf..5cba8a302d 100644 --- a/2023/CVE-2023-32784.json +++ b/2023/CVE-2023-32784.json @@ -14,10 +14,10 @@ "description": "Original PoC for CVE-2023-32784", "fork": false, "created_at": "2023-05-01T17:08:55Z", - "updated_at": "2024-12-09T01:45:06Z", + "updated_at": "2024-12-10T12:02:34Z", "pushed_at": "2023-08-17T19:26:55Z", - "stargazers_count": 628, - "watchers_count": 628, + "stargazers_count": 629, + "watchers_count": 629, "has_discussions": false, "forks_count": 57, "allow_forking": true, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 57, - "watchers": 628, + "watchers": 629, "score": 0, "subscribers_count": 11 }, diff --git a/2023/CVE-2023-36802.json b/2023/CVE-2023-36802.json index 94c56d6246..e5255696e3 100644 --- a/2023/CVE-2023-36802.json +++ b/2023/CVE-2023-36802.json @@ -107,7 +107,7 @@ "description": "Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver", "fork": false, "created_at": "2023-10-23T18:33:41Z", - "updated_at": "2024-11-26T14:03:56Z", + "updated_at": "2024-12-10T12:12:57Z", "pushed_at": "2023-10-26T11:44:46Z", "stargazers_count": 112, "watchers_count": 112, diff --git a/2023/CVE-2023-40028.json b/2023/CVE-2023-40028.json index 93fa34a8cb..b842f4a6de 100644 --- a/2023/CVE-2023-40028.json +++ b/2023/CVE-2023-40028.json @@ -29,5 +29,36 @@ "watchers": 2, "score": 0, "subscribers_count": 1 + }, + { + "id": 901224300, + "name": "CVE-2023-40028", + "full_name": "BBSynapse\/CVE-2023-40028", + "owner": { + "login": "BBSynapse", + "id": 147707839, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/147707839?v=4", + "html_url": "https:\/\/github.com\/BBSynapse", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/BBSynapse\/CVE-2023-40028", + "description": "CVE-2023-40028 wirkt sich auf Ghost, ein Open-Source-Content-Management-System (CMS) aus.", + "fork": false, + "created_at": "2024-12-10T09:12:20Z", + "updated_at": "2024-12-10T09:18:19Z", + "pushed_at": "2024-12-10T09:18:16Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-0044.json b/2024/CVE-2024-0044.json index 079fe9d060..cc5ea026b6 100644 --- a/2024/CVE-2024-0044.json +++ b/2024/CVE-2024-0044.json @@ -76,10 +76,10 @@ "description": "利用 CVE-2024-0044 Android 权限提升下载任意目标App沙箱文件。", "fork": false, "created_at": "2024-07-03T10:29:06Z", - "updated_at": "2024-11-13T03:17:51Z", + "updated_at": "2024-12-10T08:42:34Z", "pushed_at": "2024-09-03T09:31:58Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index e79a03f6c4..5e38208198 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -14,10 +14,10 @@ "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "fork": false, "created_at": "2024-03-20T21:16:41Z", - "updated_at": "2024-12-05T15:39:28Z", + "updated_at": "2024-12-10T09:00:58Z", "pushed_at": "2024-04-17T16:09:54Z", - "stargazers_count": 2298, - "watchers_count": 2298, + "stargazers_count": 2299, + "watchers_count": 2299, "has_discussions": false, "forks_count": 299, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 299, - "watchers": 2298, + "watchers": 2299, "score": 0, "subscribers_count": 26 }, diff --git a/2024/CVE-2024-11477.json b/2024/CVE-2024-11477.json index 7ce7967a45..e6791978da 100644 --- a/2024/CVE-2024-11477.json +++ b/2024/CVE-2024-11477.json @@ -14,10 +14,10 @@ "description": "CVE-2024-11477 7Zip Code Execution Writeup and Analysis", "fork": false, "created_at": "2024-11-29T06:13:36Z", - "updated_at": "2024-12-10T03:31:43Z", + "updated_at": "2024-12-10T09:52:02Z", "pushed_at": "2024-12-04T01:01:28Z", - "stargazers_count": 32, - "watchers_count": 32, + "stargazers_count": 33, + "watchers_count": 33, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 32, + "watchers": 33, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-21762.json b/2024/CVE-2024-21762.json index d82d4cf0b3..ec75ccb934 100644 --- a/2024/CVE-2024-21762.json +++ b/2024/CVE-2024-21762.json @@ -14,10 +14,10 @@ "description": "Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762", "fork": false, "created_at": "2024-02-28T21:16:10Z", - "updated_at": "2024-11-20T16:30:41Z", + "updated_at": "2024-12-10T10:25:51Z", "pushed_at": "2024-07-05T09:37:05Z", - "stargazers_count": 93, - "watchers_count": 93, + "stargazers_count": 94, + "watchers_count": 94, "has_discussions": false, "forks_count": 13, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 13, - "watchers": 93, + "watchers": 94, "score": 0, "subscribers_count": 6 }, diff --git a/2024/CVE-2024-24549.json b/2024/CVE-2024-24549.json index d62d42c760..e4beacee19 100644 --- a/2024/CVE-2024-24549.json +++ b/2024/CVE-2024-24549.json @@ -50,13 +50,13 @@ "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-37383.json b/2024/CVE-2024-37383.json index 0b9571d7f7..9a5631879f 100644 --- a/2024/CVE-2024-37383.json +++ b/2024/CVE-2024-37383.json @@ -14,10 +14,10 @@ "description": "Proof of concept for CVE-2024-37383", "fork": false, "created_at": "2024-10-24T04:01:03Z", - "updated_at": "2024-11-10T22:07:27Z", + "updated_at": "2024-12-10T07:33:20Z", "pushed_at": "2024-10-24T05:48:34Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-38063.json b/2024/CVE-2024-38063.json index 265fe3109f..52002855c5 100644 --- a/2024/CVE-2024-38063.json +++ b/2024/CVE-2024-38063.json @@ -420,10 +420,10 @@ "description": "CVE-2024-38063 is a critical security vulnerability in the Windows TCP\/IP stack that allows for remote code execution (RCE)", "fork": false, "created_at": "2024-08-31T13:56:26Z", - "updated_at": "2024-12-09T08:30:58Z", + "updated_at": "2024-12-10T07:03:44Z", "pushed_at": "2024-12-09T07:16:33Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 18, + "watchers_count": 18, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -432,7 +432,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 16, + "watchers": 18, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-38193.json b/2024/CVE-2024-38193.json index 99a8418858..b6d53ad21d 100644 --- a/2024/CVE-2024-38193.json +++ b/2024/CVE-2024-38193.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2024-12-03T08:56:59Z", - "updated_at": "2024-12-10T05:43:18Z", + "updated_at": "2024-12-10T09:52:26Z", "pushed_at": "2024-11-18T23:48:31Z", - "stargazers_count": 29, - "watchers_count": 29, + "stargazers_count": 31, + "watchers_count": 31, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 16, - "watchers": 29, + "watchers": 31, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-4367.json b/2024/CVE-2024-4367.json index 41de9fefc7..70a57fa62a 100644 --- a/2024/CVE-2024-4367.json +++ b/2024/CVE-2024-4367.json @@ -45,10 +45,10 @@ "description": "CVE-2024-4367 arbitrary js execution in pdf js", "fork": false, "created_at": "2024-05-20T22:56:10Z", - "updated_at": "2024-11-20T16:30:47Z", + "updated_at": "2024-12-10T07:46:23Z", "pushed_at": "2024-05-20T23:09:43Z", - "stargazers_count": 44, - "watchers_count": 44, + "stargazers_count": 45, + "watchers_count": 45, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 8, - "watchers": 44, + "watchers": 45, "score": 0, "subscribers_count": 1 }, @@ -278,10 +278,10 @@ "description": null, "fork": false, "created_at": "2024-09-04T14:43:33Z", - "updated_at": "2024-11-27T00:52:45Z", + "updated_at": "2024-12-10T12:07:46Z", "pushed_at": "2024-09-04T15:17:57Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -290,7 +290,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-49039.json b/2024/CVE-2024-49039.json index c8213cd982..defbee2931 100644 --- a/2024/CVE-2024-49039.json +++ b/2024/CVE-2024-49039.json @@ -14,7 +14,7 @@ "description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler", "fork": false, "created_at": "2024-11-19T08:57:18Z", - "updated_at": "2024-12-09T08:10:55Z", + "updated_at": "2024-12-10T08:51:16Z", "pushed_at": "2024-11-19T09:15:26Z", "stargazers_count": 83, "watchers_count": 83, diff --git a/2024/CVE-2024-51378.json b/2024/CVE-2024-51378.json index 0907756625..b4ba6fc152 100644 --- a/2024/CVE-2024-51378.json +++ b/2024/CVE-2024-51378.json @@ -14,10 +14,10 @@ "description": "Exploit for CyberPanel Pre-Auth RCE via Command Injection", "fork": false, "created_at": "2024-10-29T23:34:27Z", - "updated_at": "2024-12-09T20:20:18Z", + "updated_at": "2024-12-10T10:14:45Z", "pushed_at": "2024-11-01T10:12:49Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 17, + "watchers_count": 17, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 16, + "watchers": 17, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-55586.json b/2024/CVE-2024-55586.json new file mode 100644 index 0000000000..1468729074 --- /dev/null +++ b/2024/CVE-2024-55586.json @@ -0,0 +1,33 @@ +[ + { + "id": 874221488, + "name": "CVE-2024-55586", + "full_name": "CSIRTTrizna\/CVE-2024-55586", + "owner": { + "login": "CSIRTTrizna", + "id": 170928596, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/170928596?v=4", + "html_url": "https:\/\/github.com\/CSIRTTrizna", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/CSIRTTrizna\/CVE-2024-55586", + "description": null, + "fork": false, + "created_at": "2024-10-17T13:04:26Z", + "updated_at": "2024-12-10T06:57:30Z", + "pushed_at": "2024-10-17T13:13:03Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json index 5cd76fb526..5e4b8611bb 100644 --- a/2024/CVE-2024-6387.json +++ b/2024/CVE-2024-6387.json @@ -2211,10 +2211,10 @@ "description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)", "fork": false, "created_at": "2024-07-08T11:27:49Z", - "updated_at": "2024-12-09T18:18:45Z", + "updated_at": "2024-12-10T08:51:15Z", "pushed_at": "2024-08-22T08:50:25Z", - "stargazers_count": 58, - "watchers_count": 58, + "stargazers_count": 57, + "watchers_count": 57, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -2223,7 +2223,7 @@ "topics": [], "visibility": "public", "forks": 23, - "watchers": 58, + "watchers": 57, "score": 0, "subscribers_count": 2 }, diff --git a/README.md b/README.md index 5c79c1cedf..8c339a3d0d 100644 --- a/README.md +++ b/README.md @@ -7375,6 +7375,9 @@ - [hotplugin0x01/CVE-2024-54679](https://github.com/hotplugin0x01/CVE-2024-54679) +### CVE-2024-55586 +- [CSIRTTrizna/CVE-2024-55586](https://github.com/CSIRTTrizna/CVE-2024-55586) + ### CVE-2024-1642470 - [Symbolexe/CVE-2024-1642470](https://github.com/Symbolexe/CVE-2024-1642470) @@ -13206,6 +13209,7 @@ - [0xyassine/CVE-2023-40028](https://github.com/0xyassine/CVE-2023-40028) +- [BBSynapse/CVE-2023-40028](https://github.com/BBSynapse/CVE-2023-40028) ### CVE-2023-40031 (2023-08-25)