diff --git a/2008/CVE-2008-3531.json b/2008/CVE-2008-3531.json index 8cf845519b..051ac838c1 100644 --- a/2008/CVE-2008-3531.json +++ b/2008/CVE-2008-3531.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2018/CVE-2018-19320.json b/2018/CVE-2018-19320.json index d51abbb351..e4c1576124 100644 --- a/2018/CVE-2018-19320.json +++ b/2018/CVE-2018-19320.json @@ -73,10 +73,10 @@ "description": "Unsigned driver loader using CVE-2018-19320", "fork": false, "created_at": "2022-11-12T05:48:13Z", - "updated_at": "2024-07-24T10:03:46Z", + "updated_at": "2024-07-24T16:51:05Z", "pushed_at": "2023-04-09T13:50:29Z", - "stargazers_count": 173, - "watchers_count": 173, + "stargazers_count": 174, + "watchers_count": 174, "has_discussions": false, "forks_count": 45, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 45, - "watchers": 173, + "watchers": 174, "score": 0, "subscribers_count": 6 } diff --git a/2018/CVE-2018-25031.json b/2018/CVE-2018-25031.json index fb658e9d3a..50b70183d0 100644 --- a/2018/CVE-2018-25031.json +++ b/2018/CVE-2018-25031.json @@ -327,6 +327,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2018/CVE-2018-2894.json b/2018/CVE-2018-2894.json index f09af99d54..72696ff7d0 100644 --- a/2018/CVE-2018-2894.json +++ b/2018/CVE-2018-2894.json @@ -103,10 +103,10 @@ "description": "Ladon Scanner For Python, Large Network Penetration Scanner & Cobalt Strike, vulnerability \/ exploit \/ detection \/ MS17010\/SmbGhost\/CVE-2020-0796\/CVE-2018-2894", "fork": false, "created_at": "2019-11-19T16:51:39Z", - "updated_at": "2024-06-24T01:29:24Z", + "updated_at": "2024-07-24T18:05:33Z", "pushed_at": "2020-12-08T15:39:24Z", - "stargazers_count": 50, - "watchers_count": 50, + "stargazers_count": 51, + "watchers_count": 51, "has_discussions": false, "forks_count": 19, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 19, - "watchers": 50, + "watchers": 51, "score": 0, "subscribers_count": 3 } diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 94266bf845..b58b91da0a 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -13,10 +13,10 @@ "description": "Ladon Scanner For Python, Large Network Penetration Scanner & Cobalt Strike, vulnerability \/ exploit \/ detection \/ MS17010\/SmbGhost\/CVE-2020-0796\/CVE-2018-2894", "fork": false, "created_at": "2019-11-19T16:51:39Z", - "updated_at": "2024-06-24T01:29:24Z", + "updated_at": "2024-07-24T18:05:33Z", "pushed_at": "2020-12-08T15:39:24Z", - "stargazers_count": 50, - "watchers_count": 50, + "stargazers_count": 51, + "watchers_count": 51, "has_discussions": false, "forks_count": 19, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 19, - "watchers": 50, + "watchers": 51, "score": 0, "subscribers_count": 3 }, diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index ef194341a2..27391ad66c 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -18,13 +18,13 @@ "stargazers_count": 263, "watchers_count": 263, "has_discussions": false, - "forks_count": 66, + "forks_count": 65, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 66, + "forks": 65, "watchers": 263, "score": 0, "subscribers_count": 14 diff --git a/2021/CVE-2021-31630.json b/2021/CVE-2021-31630.json index f2f99df5e2..e936b8efa7 100644 --- a/2021/CVE-2021-31630.json +++ b/2021/CVE-2021-31630.json @@ -213,5 +213,35 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 833217533, + "name": "CVE-2021-31630", + "full_name": "manuelsantosiglesias\/CVE-2021-31630", + "owner": { + "login": "manuelsantosiglesias", + "id": 29311335, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29311335?v=4", + "html_url": "https:\/\/github.com\/manuelsantosiglesias" + }, + "html_url": "https:\/\/github.com\/manuelsantosiglesias\/CVE-2021-31630", + "description": "OpenPLC 3 WebServer Authenticated Remote Code Execution.", + "fork": false, + "created_at": "2024-07-24T15:28:47Z", + "updated_at": "2024-07-24T16:22:41Z", + "pushed_at": "2024-07-24T16:22:38Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-43798.json b/2021/CVE-2021-43798.json index fcc3f67c77..e30e33609b 100644 --- a/2021/CVE-2021-43798.json +++ b/2021/CVE-2021-43798.json @@ -857,36 +857,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 475197658, - "name": "CVE-2021-43798-Grafana-File-Read", - "full_name": "BJLIYANLIANG\/CVE-2021-43798-Grafana-File-Read", - "owner": { - "login": "BJLIYANLIANG", - "id": 34064679, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34064679?v=4", - "html_url": "https:\/\/github.com\/BJLIYANLIANG" - }, - "html_url": "https:\/\/github.com\/BJLIYANLIANG\/CVE-2021-43798-Grafana-File-Read", - "description": null, - "fork": false, - "created_at": "2022-03-28T22:23:34Z", - "updated_at": "2022-03-04T03:10:30Z", - "pushed_at": "2021-12-11T08:35:13Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 547929236, "name": "CVE-2021-43798", diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 289d444461..25d23ba0e2 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -369,10 +369,10 @@ "description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).", "fork": false, "created_at": "2021-12-10T12:38:20Z", - "updated_at": "2024-07-21T18:02:30Z", + "updated_at": "2024-07-24T17:35:00Z", "pushed_at": "2024-04-26T03:16:26Z", - "stargazers_count": 1104, - "watchers_count": 1104, + "stargazers_count": 1103, + "watchers_count": 1103, "has_discussions": false, "forks_count": 530, "allow_forking": true, @@ -383,7 +383,7 @@ ], "visibility": "public", "forks": 530, - "watchers": 1104, + "watchers": 1103, "score": 0, "subscribers_count": 23 }, @@ -3636,10 +3636,10 @@ "description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ", "fork": false, "created_at": "2021-12-13T03:57:50Z", - "updated_at": "2024-07-22T09:11:33Z", + "updated_at": "2024-07-24T17:31:41Z", "pushed_at": "2022-11-23T18:23:24Z", - "stargazers_count": 3389, - "watchers_count": 3389, + "stargazers_count": 3388, + "watchers_count": 3388, "has_discussions": true, "forks_count": 741, "allow_forking": true, @@ -3648,7 +3648,7 @@ "topics": [], "visibility": "public", "forks": 741, - "watchers": 3389, + "watchers": 3388, "score": 0, "subscribers_count": 57 }, diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index 427f5b9c9a..597e918cbd 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -343,10 +343,10 @@ "description": "CVE-2022-0847 DirtyPipe Exploit.", "fork": false, "created_at": "2022-03-08T11:49:40Z", - "updated_at": "2024-07-05T10:35:57Z", + "updated_at": "2024-07-24T14:41:12Z", "pushed_at": "2022-03-08T11:52:22Z", - "stargazers_count": 46, - "watchers_count": 46, + "stargazers_count": 47, + "watchers_count": 47, "has_discussions": false, "forks_count": 24, "allow_forking": true, @@ -355,7 +355,7 @@ "topics": [], "visibility": "public", "forks": 24, - "watchers": 46, + "watchers": 47, "score": 0, "subscribers_count": 3 }, diff --git a/2022/CVE-2022-24125.json b/2022/CVE-2022-24125.json index db51f99a2d..c80726cca9 100644 --- a/2022/CVE-2022-24125.json +++ b/2022/CVE-2022-24125.json @@ -13,10 +13,10 @@ "description": "Documentation and proof of concept code for CVE-2022-24125 and CVE-2022-24126.", "fork": false, "created_at": "2022-01-28T20:37:14Z", - "updated_at": "2024-07-01T23:52:08Z", + "updated_at": "2024-07-24T14:58:54Z", "pushed_at": "2022-08-30T02:11:05Z", - "stargazers_count": 147, - "watchers_count": 147, + "stargazers_count": 148, + "watchers_count": 148, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 8, - "watchers": 147, + "watchers": 148, "score": 0, "subscribers_count": 3 } diff --git a/2022/CVE-2022-30075.json b/2022/CVE-2022-30075.json index a39168f5c7..89db296b5d 100644 --- a/2022/CVE-2022-30075.json +++ b/2022/CVE-2022-30075.json @@ -13,10 +13,10 @@ "description": "Tp-Link Archer AX50 Authenticated RCE (CVE-2022-30075)", "fork": false, "created_at": "2022-06-07T23:26:47Z", - "updated_at": "2024-06-11T01:00:39Z", + "updated_at": "2024-07-24T15:50:02Z", "pushed_at": "2022-11-20T03:03:53Z", - "stargazers_count": 208, - "watchers_count": 208, + "stargazers_count": 209, + "watchers_count": 209, "has_discussions": false, "forks_count": 45, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 45, - "watchers": 208, + "watchers": 209, "score": 0, "subscribers_count": 3 }, diff --git a/2023/CVE-2023-21768.json b/2023/CVE-2023-21768.json index 725adb2d8c..425fc5b563 100644 --- a/2023/CVE-2023-21768.json +++ b/2023/CVE-2023-21768.json @@ -13,10 +13,10 @@ "description": "LPE exploit for CVE-2023-21768", "fork": false, "created_at": "2023-03-07T23:00:27Z", - "updated_at": "2024-07-17T11:40:15Z", + "updated_at": "2024-07-24T17:47:11Z", "pushed_at": "2023-07-10T16:35:49Z", - "stargazers_count": 469, - "watchers_count": 469, + "stargazers_count": 468, + "watchers_count": 468, "has_discussions": false, "forks_count": 164, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 164, - "watchers": 469, + "watchers": 468, "score": 0, "subscribers_count": 10 }, diff --git a/2023/CVE-2023-22515.json b/2023/CVE-2023-22515.json index 1e20b60400..b2f2ffeb6d 100644 --- a/2023/CVE-2023-22515.json +++ b/2023/CVE-2023-22515.json @@ -774,8 +774,8 @@ "description": "CVE 2023-22515", "fork": false, "created_at": "2024-07-21T17:19:36Z", - "updated_at": "2024-07-21T18:12:46Z", - "pushed_at": "2024-07-21T18:12:43Z", + "updated_at": "2024-07-24T15:04:55Z", + "pushed_at": "2024-07-24T15:04:52Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2023/CVE-2023-22527.json b/2023/CVE-2023-22527.json index f0cbd2a857..ce79ed9d5c 100644 --- a/2023/CVE-2023-22527.json +++ b/2023/CVE-2023-22527.json @@ -223,10 +223,10 @@ "description": "[Confluence] CVE-2023-22527 realworld poc", "fork": false, "created_at": "2024-01-23T07:10:55Z", - "updated_at": "2024-06-26T20:14:57Z", + "updated_at": "2024-07-24T15:35:11Z", "pushed_at": "2024-01-23T07:16:40Z", - "stargazers_count": 18, - "watchers_count": 18, + "stargazers_count": 19, + "watchers_count": 19, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -235,7 +235,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 18, + "watchers": 19, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index d414190f58..2b82d589e0 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -14,17 +14,17 @@ "fork": false, "created_at": "2024-01-16T06:52:02Z", "updated_at": "2024-07-24T09:41:31Z", - "pushed_at": "2024-07-05T12:35:27Z", + "pushed_at": "2024-07-24T13:17:05Z", "stargazers_count": 1006, "watchers_count": 1006, "has_discussions": false, - "forks_count": 168, + "forks_count": 169, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 168, + "forks": 169, "watchers": 1006, "score": 0, "subscribers_count": 16 diff --git a/2023/CVE-2023-46604.json b/2023/CVE-2023-46604.json index 326e95f53d..a3fedac403 100644 --- a/2023/CVE-2023-46604.json +++ b/2023/CVE-2023-46604.json @@ -103,7 +103,7 @@ "description": " Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604) ", "fork": false, "created_at": "2023-11-03T22:06:09Z", - "updated_at": "2024-07-20T19:08:56Z", + "updated_at": "2024-07-24T15:21:20Z", "pushed_at": "2024-01-20T16:59:23Z", "stargazers_count": 99, "watchers_count": 99, diff --git a/2024/CVE-2024-1874.json b/2024/CVE-2024-1874.json index a5636036f5..e61bacbb77 100644 --- a/2024/CVE-2024-1874.json +++ b/2024/CVE-2024-1874.json @@ -43,8 +43,8 @@ "description": "Proof Of Concept for CVE-2024-1874", "fork": false, "created_at": "2024-07-18T15:25:17Z", - "updated_at": "2024-07-18T15:48:22Z", - "pushed_at": "2024-07-18T15:48:18Z", + "updated_at": "2024-07-24T13:47:35Z", + "pushed_at": "2024-07-24T13:47:32Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-22198.json b/2024/CVE-2024-22198.json new file mode 100644 index 0000000000..28c9ad93ae --- /dev/null +++ b/2024/CVE-2024-22198.json @@ -0,0 +1,32 @@ +[ + { + "id": 833176749, + "name": "CVE-2024-22198_Checker", + "full_name": "xiw1ll\/CVE-2024-22198_Checker", + "owner": { + "login": "xiw1ll", + "id": 69167284, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69167284?v=4", + "html_url": "https:\/\/github.com\/xiw1ll" + }, + "html_url": "https:\/\/github.com\/xiw1ll\/CVE-2024-22198_Checker", + "description": "Identify Nginx-ui version and check if it's vulnerable to CVE-2024-22198", + "fork": false, + "created_at": "2024-07-24T13:59:51Z", + "updated_at": "2024-07-24T14:02:23Z", + "pushed_at": "2024-07-24T14:02:20Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 1, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-2961.json b/2024/CVE-2024-2961.json index 75c69fd352..3ad86cffc6 100644 --- a/2024/CVE-2024-2961.json +++ b/2024/CVE-2024-2961.json @@ -73,10 +73,10 @@ "description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()", "fork": false, "created_at": "2024-05-27T08:30:06Z", - "updated_at": "2024-07-24T09:38:34Z", + "updated_at": "2024-07-24T13:09:51Z", "pushed_at": "2024-07-17T08:03:58Z", - "stargazers_count": 322, - "watchers_count": 322, + "stargazers_count": 323, + "watchers_count": 323, "has_discussions": false, "forks_count": 37, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 37, - "watchers": 322, + "watchers": 323, "score": 0, "subscribers_count": 9 }, diff --git a/2024/CVE-2024-30088.json b/2024/CVE-2024-30088.json index f2012ec3be..a12365a572 100644 --- a/2024/CVE-2024-30088.json +++ b/2024/CVE-2024-30088.json @@ -103,10 +103,10 @@ "description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088", "fork": false, "created_at": "2024-07-15T08:07:05Z", - "updated_at": "2024-07-24T10:20:15Z", + "updated_at": "2024-07-24T17:50:30Z", "pushed_at": "2024-07-18T01:28:46Z", - "stargazers_count": 254, - "watchers_count": 254, + "stargazers_count": 255, + "watchers_count": 255, "has_discussions": false, "forks_count": 24, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 24, - "watchers": 254, + "watchers": 255, "score": 0, "subscribers_count": 12 } diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json index f5d5918b90..6cb901f533 100644 --- a/2024/CVE-2024-3094.json +++ b/2024/CVE-2024-3094.json @@ -1813,10 +1813,10 @@ "description": "GNU IFUNC is the real culprit behind CVE-2024-3094", "fork": false, "created_at": "2024-07-05T18:36:16Z", - "updated_at": "2024-07-23T01:19:02Z", - "pushed_at": "2024-07-23T01:18:59Z", - "stargazers_count": 2, - "watchers_count": 2, + "updated_at": "2024-07-24T18:34:49Z", + "pushed_at": "2024-07-24T18:34:46Z", + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -1840,7 +1840,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 2 } diff --git a/2024/CVE-2024-36401.json b/2024/CVE-2024-36401.json index cc96b94b07..835881aa12 100644 --- a/2024/CVE-2024-36401.json +++ b/2024/CVE-2024-36401.json @@ -187,23 +187,23 @@ "subscribers_count": 1 }, { - "id": 829564699, + "id": 829775784, "name": "geoserver-", - "full_name": "MInggongK\/geoserver-", + "full_name": "ahisec\/geoserver-", "owner": { - "login": "MInggongK", - "id": 49862299, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49862299?v=4", - "html_url": "https:\/\/github.com\/MInggongK" + "login": "ahisec", + "id": 3255339, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3255339?v=4", + "html_url": "https:\/\/github.com\/ahisec" }, - "html_url": "https:\/\/github.com\/MInggongK\/geoserver-", - "description": "geoserver CVE-2024-36401 漏洞利用工具", + "html_url": "https:\/\/github.com\/ahisec\/geoserver-", + "description": "geoserver CVE-2024-36401漏洞利用工具", "fork": false, - "created_at": "2024-07-16T17:29:39Z", - "updated_at": "2024-07-24T04:26:32Z", - "pushed_at": "2024-07-24T04:26:29Z", - "stargazers_count": 21, - "watchers_count": 21, + "created_at": "2024-07-17T02:25:21Z", + "updated_at": "2024-07-24T15:33:07Z", + "pushed_at": "2024-07-24T15:33:03Z", + "stargazers_count": 0, + "watchers_count": 0, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -212,8 +212,8 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 21, + "watchers": 0, "score": 0, - "subscribers_count": 2 + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-36991.json b/2024/CVE-2024-36991.json index d025a0616f..47aabe9cd2 100644 --- a/2024/CVE-2024-36991.json +++ b/2024/CVE-2024-36991.json @@ -13,7 +13,7 @@ "description": "POC for CVE-2024-36991: This exploit will attempt to read Splunk \/etc\/passwd file.", "fork": false, "created_at": "2024-07-06T00:49:40Z", - "updated_at": "2024-07-21T17:24:17Z", + "updated_at": "2024-07-24T17:53:13Z", "pushed_at": "2024-07-12T00:41:36Z", "stargazers_count": 95, "watchers_count": 95, diff --git a/2024/CVE-2024-37032.json b/2024/CVE-2024-37032.json index cae898bfff..75a746badc 100644 --- a/2024/CVE-2024-37032.json +++ b/2024/CVE-2024-37032.json @@ -13,10 +13,10 @@ "description": "Path traversal in Ollama with rogue registry server", "fork": false, "created_at": "2024-06-26T03:11:29Z", - "updated_at": "2024-07-04T15:25:51Z", + "updated_at": "2024-07-24T18:21:11Z", "pushed_at": "2024-06-28T03:14:05Z", - "stargazers_count": 17, - "watchers_count": 17, + "stargazers_count": 18, + "watchers_count": 18, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 17, + "watchers": 18, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-4040.json b/2024/CVE-2024-4040.json index 75c9eb742c..3b30de4104 100644 --- a/2024/CVE-2024-4040.json +++ b/2024/CVE-2024-4040.json @@ -133,10 +133,10 @@ "description": "CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support", "fork": false, "created_at": "2024-04-25T19:51:38Z", - "updated_at": "2024-07-19T08:43:32Z", + "updated_at": "2024-07-24T15:52:14Z", "pushed_at": "2024-07-07T23:47:58Z", - "stargazers_count": 51, - "watchers_count": 51, + "stargazers_count": 52, + "watchers_count": 52, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -160,7 +160,7 @@ ], "visibility": "public", "forks": 8, - "watchers": 51, + "watchers": 52, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-41107.json b/2024/CVE-2024-41107.json index 5fb4196e95..fe10581e36 100644 --- a/2024/CVE-2024-41107.json +++ b/2024/CVE-2024-41107.json @@ -18,13 +18,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 1, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 4, "watchers": 0, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-5522.json b/2024/CVE-2024-5522.json index 87d3a4dd56..9b045544af 100644 --- a/2024/CVE-2024-5522.json +++ b/2024/CVE-2024-5522.json @@ -13,10 +13,10 @@ "description": "CVE-2024-5522 HTML5 Video Player <= 2.5.26 - Unauthenticated SQL Injection", "fork": false, "created_at": "2024-05-31T04:41:46Z", - "updated_at": "2024-06-26T12:02:51Z", + "updated_at": "2024-07-24T14:22:31Z", "pushed_at": "2024-05-31T06:44:16Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json index efbb99e036..60eb377ddd 100644 --- a/2024/CVE-2024-6387.json +++ b/2024/CVE-2024-6387.json @@ -260,10 +260,10 @@ "description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH", "fork": false, "created_at": "2024-07-01T20:33:20Z", - "updated_at": "2024-07-23T05:50:37Z", + "updated_at": "2024-07-24T13:47:03Z", "pushed_at": "2024-07-14T09:58:48Z", - "stargazers_count": 416, - "watchers_count": 416, + "stargazers_count": 417, + "watchers_count": 417, "has_discussions": false, "forks_count": 84, "allow_forking": true, @@ -278,7 +278,7 @@ ], "visibility": "public", "forks": 84, - "watchers": 416, + "watchers": 417, "score": 0, "subscribers_count": 6 }, @@ -1433,10 +1433,10 @@ "description": "PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (Scanner and Exploit) ", "fork": false, "created_at": "2024-07-02T18:32:46Z", - "updated_at": "2024-07-24T07:48:13Z", + "updated_at": "2024-07-24T17:29:43Z", "pushed_at": "2024-07-05T15:19:28Z", - "stargazers_count": 40, - "watchers_count": 40, + "stargazers_count": 41, + "watchers_count": 41, "has_discussions": false, "forks_count": 19, "allow_forking": true, @@ -1454,7 +1454,7 @@ ], "visibility": "public", "forks": 19, - "watchers": 40, + "watchers": 41, "score": 0, "subscribers_count": 1 }, @@ -1665,7 +1665,7 @@ "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -1673,7 +1673,7 @@ "cve-2024-6387" ], "visibility": "public", - "forks": 1, + "forks": 2, "watchers": 1, "score": 0, "subscribers_count": 1 diff --git a/README.md b/README.md index 3317afacfd..74e8c72025 100644 --- a/README.md +++ b/README.md @@ -1386,6 +1386,13 @@ - [RandomRobbieBF/CVE-2024-22145](https://github.com/RandomRobbieBF/CVE-2024-22145) +### CVE-2024-22198 (2024-01-11) + +Nginx-UI is a web interface to manage Nginx configurations. It is vulnerable to arbitrary command execution by abusing the configuration settings. The `Home > Preference` page exposes a list of system settings such as `Run Mode`, `Jwt Secret`, `Node Secret` and `Terminal Start Command`. While the UI doesn't allow users to modify the `Terminal Start Command` setting, it is possible to do so by sending a request to the API. This issue may lead to authenticated remote code execution, privilege escalation, and information disclosure. This vulnerability has been patched in version 2.0.0.beta.9. + + +- [xiw1ll/CVE-2024-22198_Checker](https://github.com/xiw1ll/CVE-2024-22198_Checker) + ### CVE-2024-22243 (2024-02-23) Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html  attack or to a SSRF attack if the URL is used after passing validation checks.\n @@ -3326,7 +3333,7 @@ - [Mr-xn/CVE-2024-36401](https://github.com/Mr-xn/CVE-2024-36401) - [zgimszhd61/CVE-2024-36401](https://github.com/zgimszhd61/CVE-2024-36401) - [jakabakos/CVE-2024-36401-GeoServer-RCE](https://github.com/jakabakos/CVE-2024-36401-GeoServer-RCE) -- [MInggongK/geoserver-](https://github.com/MInggongK/geoserver-) +- [ahisec/geoserver-](https://github.com/ahisec/geoserver-) ### CVE-2024-36416 (2024-06-10) @@ -3619,7 +3626,11 @@ - [bigb0x/CVE-2024-40348](https://github.com/bigb0x/CVE-2024-40348) -### CVE-2024-40422 +### CVE-2024-40422 (2024-07-24) + +The snapshot_path parameter in the /api/get-browser-snapshot endpoint in stitionai devika v1 is susceptible to a path traversal attack. An attacker can manipulate the snapshot_path parameter to traverse directories and access sensitive files on the server. This can potentially lead to unauthorized access to critical system files and compromise the confidentiality and integrity of the system. + + - [alpernae/CVE-2024-40422](https://github.com/alpernae/CVE-2024-40422) ### CVE-2024-40492 (2024-07-17) @@ -3664,7 +3675,11 @@ - [d0rb/CVE-2024-41107](https://github.com/d0rb/CVE-2024-41107) -### CVE-2024-41662 +### CVE-2024-41662 (2024-07-24) + +VNote is a note-taking platform. A Cross-Site Scripting (XSS) vulnerability has been identified in the Markdown rendering functionality of versions 3.18.1 and prior of the VNote note-taking application. This vulnerability allows the injection and execution of arbitrary JavaScript code through which remote code execution can be achieved. A patch for this issue is available at commit f1af78573a0ef51d6ef6a0bc4080cddc8f30a545. Other mitigation strategies include implementing rigorous input sanitization for all Markdown content and utilizing a secure Markdown parser that appropriately escapes or strips potentially dangerous content. + + - [sh3bu/CVE-2024-41662](https://github.com/sh3bu/CVE-2024-41662) ### CVE-2024-65230 @@ -21561,6 +21576,7 @@ - [sealldeveloper/CVE-2021-31630-PoC](https://github.com/sealldeveloper/CVE-2021-31630-PoC) - [junnythemarksman/CVE-2021-31630](https://github.com/junnythemarksman/CVE-2021-31630) - [adibabdala123/cve-2021-31630](https://github.com/adibabdala123/cve-2021-31630) +- [manuelsantosiglesias/CVE-2021-31630](https://github.com/manuelsantosiglesias/CVE-2021-31630) ### CVE-2021-31728 (2021-05-17) @@ -23976,7 +23992,6 @@ - [aymenbouferroum/CVE-2021-43798_exploit](https://github.com/aymenbouferroum/CVE-2021-43798_exploit) - [Jroo1053/GrafanaDirInclusion](https://github.com/Jroo1053/GrafanaDirInclusion) - [yasindce1998/grafana-cve-2021-43798](https://github.com/yasindce1998/grafana-cve-2021-43798) -- [BJLIYANLIANG/CVE-2021-43798-Grafana-File-Read](https://github.com/BJLIYANLIANG/CVE-2021-43798-Grafana-File-Read) - [hupe1980/CVE-2021-43798](https://github.com/hupe1980/CVE-2021-43798) - [G01d3nW01f/CVE-2021-43798](https://github.com/G01d3nW01f/CVE-2021-43798) - [mauricelambert/LabAutomationCVE-2021-43798](https://github.com/mauricelambert/LabAutomationCVE-2021-43798)