From 4fe083fbab29e44e02d6dd767f791662a0c8e1fa Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Tue, 14 Jan 2025 21:33:20 +0900 Subject: [PATCH] Auto Update 2025/01/14 12:33:20 --- 2014/CVE-2014-0160.json | 16 ++++++++-------- 2014/CVE-2014-6271.json | 8 ++++---- 2016/CVE-2016-5195.json | 8 ++++---- 2018/CVE-2018-18778.json | 4 ++-- 2018/CVE-2018-6389.json | 8 ++++---- 2018/CVE-2018-6574.json | 31 ------------------------------- 2020/CVE-2020-0688.json | 4 ++-- 2021/CVE-2021-21972.json | 8 ++++---- 2022/CVE-2022-22954.json | 8 ++++---- 2023/CVE-2023-21768.json | 8 ++++---- 2023/CVE-2023-4220.json | 8 ++++---- 2024/CVE-2024-0044.json | 8 ++++---- 2024/CVE-2024-1086.json | 8 ++++---- 2024/CVE-2024-1874.json | 8 ++++---- 2024/CVE-2024-26229.json | 20 ++++++++++---------- 2024/CVE-2024-28116.json | 2 +- 2024/CVE-2024-3094.json | 8 ++++---- 2024/CVE-2024-35250.json | 6 +++--- 2024/CVE-2024-36401.json | 8 ++++---- 2024/CVE-2024-49039.json | 8 ++++---- 2024/CVE-2024-49113.json | 12 ++++++------ 2024/CVE-2024-50379.json | 24 ++++++++++++------------ 2024/CVE-2024-50404.json | 2 +- 2024/CVE-2024-53691.json | 2 +- 2024/CVE-2024-54498.json | 8 ++++---- 2024/CVE-2024-56145.json | 8 ++++---- README.md | 1 - 27 files changed, 106 insertions(+), 138 deletions(-) diff --git a/2014/CVE-2014-0160.json b/2014/CVE-2014-0160.json index d8490eb3a6..c3ffa31ae4 100644 --- a/2014/CVE-2014-0160.json +++ b/2014/CVE-2014-0160.json @@ -231,10 +231,10 @@ "description": "Heartbleed (CVE-2014-0160) client exploit", "fork": false, "created_at": "2014-04-08T16:41:51Z", - "updated_at": "2024-12-19T10:54:22Z", + "updated_at": "2025-01-14T11:05:31Z", "pushed_at": "2016-01-22T00:42:35Z", - "stargazers_count": 320, - "watchers_count": 320, + "stargazers_count": 321, + "watchers_count": 321, "has_discussions": false, "forks_count": 78, "allow_forking": true, @@ -243,7 +243,7 @@ "topics": [], "visibility": "public", "forks": 78, - "watchers": 320, + "watchers": 321, "score": 0, "subscribers_count": 32 }, @@ -1108,10 +1108,10 @@ "description": ":broken_heart: Hearbleed exploit to retrieve sensitive information CVE-2014-0160 :broken_heart:", "fork": false, "created_at": "2015-03-08T19:54:33Z", - "updated_at": "2024-12-23T18:21:57Z", + "updated_at": "2025-01-14T11:03:40Z", "pushed_at": "2021-02-20T19:41:03Z", - "stargazers_count": 81, - "watchers_count": 81, + "stargazers_count": 82, + "watchers_count": 82, "has_discussions": false, "forks_count": 42, "allow_forking": true, @@ -1120,7 +1120,7 @@ "topics": [], "visibility": "public", "forks": 42, - "watchers": 81, + "watchers": 82, "score": 0, "subscribers_count": 6 }, diff --git a/2014/CVE-2014-6271.json b/2014/CVE-2014-6271.json index 1c8266a91c..281f9115b5 100644 --- a/2014/CVE-2014-6271.json +++ b/2014/CVE-2014-6271.json @@ -1197,10 +1197,10 @@ "description": "Shellshock exploit + vulnerable environment", "fork": false, "created_at": "2016-12-07T23:38:50Z", - "updated_at": "2024-12-12T05:34:07Z", + "updated_at": "2025-01-14T11:01:08Z", "pushed_at": "2023-05-11T02:12:25Z", - "stargazers_count": 205, - "watchers_count": 205, + "stargazers_count": 206, + "watchers_count": 206, "has_discussions": false, "forks_count": 56, "allow_forking": true, @@ -1216,7 +1216,7 @@ ], "visibility": "public", "forks": 56, - "watchers": 205, + "watchers": 206, "score": 0, "subscribers_count": 5 }, diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json index ae6ab18f8e..7ffd6e4717 100644 --- a/2016/CVE-2016-5195.json +++ b/2016/CVE-2016-5195.json @@ -76,10 +76,10 @@ "description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android", "fork": false, "created_at": "2016-10-21T11:19:21Z", - "updated_at": "2025-01-14T05:37:30Z", + "updated_at": "2025-01-14T12:01:17Z", "pushed_at": "2021-02-03T16:03:40Z", - "stargazers_count": 966, - "watchers_count": 966, + "stargazers_count": 967, + "watchers_count": 967, "has_discussions": false, "forks_count": 395, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 395, - "watchers": 966, + "watchers": 967, "score": 0, "subscribers_count": 64 }, diff --git a/2018/CVE-2018-18778.json b/2018/CVE-2018-18778.json index 44a87f9411..960f120006 100644 --- a/2018/CVE-2018-18778.json +++ b/2018/CVE-2018-18778.json @@ -19,13 +19,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 1, + "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 diff --git a/2018/CVE-2018-6389.json b/2018/CVE-2018-6389.json index 6da5b62f6a..bb2d58ede7 100644 --- a/2018/CVE-2018-6389.json +++ b/2018/CVE-2018-6389.json @@ -487,10 +487,10 @@ "description": "Mitigate CVE-2018-6389 WordPress load-scripts \/ load-styles attacks", "fork": false, "created_at": "2018-08-30T01:25:20Z", - "updated_at": "2024-04-23T16:23:17Z", + "updated_at": "2025-01-14T11:25:49Z", "pushed_at": "2018-08-30T01:47:48Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -505,7 +505,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 12, + "watchers": 13, "score": 0, "subscribers_count": 12 }, diff --git a/2018/CVE-2018-6574.json b/2018/CVE-2018-6574.json index fdd032f73e..5a5343ef82 100644 --- a/2018/CVE-2018-6574.json +++ b/2018/CVE-2018-6574.json @@ -2386,37 +2386,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 651560536, - "name": "CVE-2018-6574", - "full_name": "Zeeshan12340\/CVE-2018-6574", - "owner": { - "login": "Zeeshan12340", - "id": 110278382, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110278382?v=4", - "html_url": "https:\/\/github.com\/Zeeshan12340", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/Zeeshan12340\/CVE-2018-6574", - "description": null, - "fork": false, - "created_at": "2023-06-09T14:08:23Z", - "updated_at": "2023-06-09T14:12:07Z", - "pushed_at": "2023-06-09T14:36:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 698841275, "name": "CVE-2018-6574-POC", diff --git a/2020/CVE-2020-0688.json b/2020/CVE-2020-0688.json index e298333c99..68c76b1334 100644 --- a/2020/CVE-2020-0688.json +++ b/2020/CVE-2020-0688.json @@ -176,8 +176,8 @@ "description": "I made this script for conducting CVE-2020-0688 more rapidly. It helps to improve checking the vuln, reducing hugely steps for that", "fork": false, "created_at": "2020-02-28T03:47:40Z", - "updated_at": "2024-08-12T19:58:11Z", - "pushed_at": "2020-02-28T04:04:54Z", + "updated_at": "2025-01-14T09:31:40Z", + "pushed_at": "2025-01-14T09:31:36Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index da0e281e57..f8d94a1f93 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -848,10 +848,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2025-01-13T20:12:48Z", + "updated_at": "2025-01-14T08:05:36Z", "pushed_at": "2024-04-25T06:09:38Z", - "stargazers_count": 1364, - "watchers_count": 1364, + "stargazers_count": 1366, + "watchers_count": 1366, "has_discussions": false, "forks_count": 167, "allow_forking": true, @@ -867,7 +867,7 @@ ], "visibility": "public", "forks": 167, - "watchers": 1364, + "watchers": 1366, "score": 0, "subscribers_count": 15 } diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index b4df5c13db..3e595ed596 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -792,10 +792,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2025-01-13T20:12:48Z", + "updated_at": "2025-01-14T08:05:36Z", "pushed_at": "2024-04-25T06:09:38Z", - "stargazers_count": 1364, - "watchers_count": 1364, + "stargazers_count": 1366, + "watchers_count": 1366, "has_discussions": false, "forks_count": 167, "allow_forking": true, @@ -811,7 +811,7 @@ ], "visibility": "public", "forks": 167, - "watchers": 1364, + "watchers": 1366, "score": 0, "subscribers_count": 15 } diff --git a/2023/CVE-2023-21768.json b/2023/CVE-2023-21768.json index 72e09f61d1..a4bab04b45 100644 --- a/2023/CVE-2023-21768.json +++ b/2023/CVE-2023-21768.json @@ -14,10 +14,10 @@ "description": "LPE exploit for CVE-2023-21768", "fork": false, "created_at": "2023-03-07T23:00:27Z", - "updated_at": "2024-12-22T23:14:00Z", + "updated_at": "2025-01-14T09:04:57Z", "pushed_at": "2023-07-10T16:35:49Z", - "stargazers_count": 486, - "watchers_count": 486, + "stargazers_count": 487, + "watchers_count": 487, "has_discussions": false, "forks_count": 163, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 163, - "watchers": 486, + "watchers": 487, "score": 0, "subscribers_count": 10 }, diff --git a/2023/CVE-2023-4220.json b/2023/CVE-2023-4220.json index cfb738d19b..0739b320d3 100644 --- a/2023/CVE-2023-4220.json +++ b/2023/CVE-2023-4220.json @@ -164,10 +164,10 @@ "description": "This is an Exploit for Unrestricted file upload in big file upload functionality in Chamilo-LMS for this location \"\/main\/inc\/lib\/javascript\/bigupload\/inc\/bigUpload.php\" in Chamilo LMS <= v1.11.24, and Attackers can obtain remote code execution via uploading of web shell.", "fork": false, "created_at": "2024-07-08T09:48:38Z", - "updated_at": "2024-11-08T19:00:18Z", + "updated_at": "2025-01-14T12:17:26Z", "pushed_at": "2024-07-08T11:55:53Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -187,7 +187,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 7, + "watchers": 6, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-0044.json b/2024/CVE-2024-0044.json index 8107a571b9..a3e502d63f 100644 --- a/2024/CVE-2024-0044.json +++ b/2024/CVE-2024-0044.json @@ -45,10 +45,10 @@ "description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13", "fork": false, "created_at": "2024-06-18T12:30:53Z", - "updated_at": "2025-01-11T20:59:30Z", + "updated_at": "2025-01-14T07:14:22Z", "pushed_at": "2024-12-02T06:29:52Z", - "stargazers_count": 276, - "watchers_count": 276, + "stargazers_count": 277, + "watchers_count": 277, "has_discussions": false, "forks_count": 64, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 64, - "watchers": 276, + "watchers": 277, "score": 0, "subscribers_count": 7 }, diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index 35c0a617fc..88da66167f 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -14,10 +14,10 @@ "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "fork": false, "created_at": "2024-03-20T21:16:41Z", - "updated_at": "2025-01-14T03:51:06Z", + "updated_at": "2025-01-14T11:52:11Z", "pushed_at": "2024-04-17T16:09:54Z", - "stargazers_count": 2325, - "watchers_count": 2325, + "stargazers_count": 2324, + "watchers_count": 2324, "has_discussions": false, "forks_count": 302, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 302, - "watchers": 2325, + "watchers": 2324, "score": 0, "subscribers_count": 27 }, diff --git a/2024/CVE-2024-1874.json b/2024/CVE-2024-1874.json index 1e28fa4342..b4c8e36a95 100644 --- a/2024/CVE-2024-1874.json +++ b/2024/CVE-2024-1874.json @@ -45,10 +45,10 @@ "description": "Proof Of Concept for CVE-2024-1874", "fork": false, "created_at": "2024-07-18T15:25:17Z", - "updated_at": "2024-09-19T18:30:06Z", + "updated_at": "2025-01-14T09:05:58Z", "pushed_at": "2024-09-19T18:30:03Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-26229.json b/2024/CVE-2024-26229.json index 7869a9f0b8..a836096f62 100644 --- a/2024/CVE-2024-26229.json +++ b/2024/CVE-2024-26229.json @@ -14,10 +14,10 @@ "description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code", "fork": false, "created_at": "2024-06-10T17:02:03Z", - "updated_at": "2025-01-03T07:18:37Z", + "updated_at": "2025-01-14T07:58:13Z", "pushed_at": "2024-07-04T10:39:15Z", - "stargazers_count": 330, - "watchers_count": 330, + "stargazers_count": 331, + "watchers_count": 331, "has_discussions": false, "forks_count": 63, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 63, - "watchers": 330, + "watchers": 331, "score": 0, "subscribers_count": 6 }, @@ -45,10 +45,10 @@ "description": "Windows LPE", "fork": false, "created_at": "2024-06-11T08:03:29Z", - "updated_at": "2025-01-06T11:32:04Z", + "updated_at": "2025-01-14T07:13:17Z", "pushed_at": "2024-06-11T20:41:59Z", - "stargazers_count": 114, - "watchers_count": 114, + "stargazers_count": 115, + "watchers_count": 115, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 23, - "watchers": 114, + "watchers": 115, "score": 0, "subscribers_count": 2 }, @@ -81,13 +81,13 @@ "stargazers_count": 17, "watchers_count": 17, "has_discussions": false, - "forks_count": 32, + "forks_count": 33, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 32, + "forks": 33, "watchers": 17, "score": 0, "subscribers_count": 0 diff --git a/2024/CVE-2024-28116.json b/2024/CVE-2024-28116.json index 7d6a5f87e0..5657a14dbb 100644 --- a/2024/CVE-2024-28116.json +++ b/2024/CVE-2024-28116.json @@ -100,6 +100,6 @@ "forks": 2, "watchers": 7, "score": 0, - "subscribers_count": 2 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json index 0a249977a8..86827f04f9 100644 --- a/2024/CVE-2024-3094.json +++ b/2024/CVE-2024-3094.json @@ -952,10 +952,10 @@ "description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)", "fork": false, "created_at": "2024-04-01T14:28:09Z", - "updated_at": "2025-01-11T16:47:54Z", + "updated_at": "2025-01-14T07:52:18Z", "pushed_at": "2024-04-03T04:58:50Z", - "stargazers_count": 3506, - "watchers_count": 3506, + "stargazers_count": 3507, + "watchers_count": 3507, "has_discussions": false, "forks_count": 239, "allow_forking": true, @@ -964,7 +964,7 @@ "topics": [], "visibility": "public", "forks": 239, - "watchers": 3506, + "watchers": 3507, "score": 0, "subscribers_count": 38 }, diff --git a/2024/CVE-2024-35250.json b/2024/CVE-2024-35250.json index 5e7d8139ad..c370f1409f 100644 --- a/2024/CVE-2024-35250.json +++ b/2024/CVE-2024-35250.json @@ -19,13 +19,13 @@ "stargazers_count": 261, "watchers_count": 261, "has_discussions": false, - "forks_count": 57, + "forks_count": 58, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 57, + "forks": 58, "watchers": 261, "score": 0, "subscribers_count": 8 @@ -125,6 +125,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-36401.json b/2024/CVE-2024-36401.json index 6ef70219f3..c24cba2211 100644 --- a/2024/CVE-2024-36401.json +++ b/2024/CVE-2024-36401.json @@ -176,10 +176,10 @@ "description": "geoserver CVE-2024-36401漏洞利用工具", "fork": false, "created_at": "2024-07-17T02:25:21Z", - "updated_at": "2024-12-13T01:40:18Z", + "updated_at": "2025-01-14T08:01:08Z", "pushed_at": "2024-07-24T15:33:03Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 17, + "watchers_count": 17, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -188,7 +188,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 16, + "watchers": 17, "score": 0, "subscribers_count": 0 }, diff --git a/2024/CVE-2024-49039.json b/2024/CVE-2024-49039.json index 36a93c3580..684c3316c3 100644 --- a/2024/CVE-2024-49039.json +++ b/2024/CVE-2024-49039.json @@ -14,10 +14,10 @@ "description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler", "fork": false, "created_at": "2024-11-19T08:57:18Z", - "updated_at": "2025-01-14T03:24:56Z", + "updated_at": "2025-01-14T08:09:16Z", "pushed_at": "2024-11-19T09:15:26Z", - "stargazers_count": 118, - "watchers_count": 118, + "stargazers_count": 119, + "watchers_count": 119, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 23, - "watchers": 118, + "watchers": 119, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-49113.json b/2024/CVE-2024-49113.json index dbd23debb5..55f3907446 100644 --- a/2024/CVE-2024-49113.json +++ b/2024/CVE-2024-49113.json @@ -14,19 +14,19 @@ "description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113", "fork": false, "created_at": "2025-01-01T15:48:38Z", - "updated_at": "2025-01-14T06:20:03Z", + "updated_at": "2025-01-14T06:46:21Z", "pushed_at": "2025-01-02T16:07:23Z", - "stargazers_count": 441, - "watchers_count": 441, + "stargazers_count": 442, + "watchers_count": 442, "has_discussions": false, - "forks_count": 103, + "forks_count": 104, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 103, - "watchers": 441, + "forks": 104, + "watchers": 442, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-50379.json b/2024/CVE-2024-50379.json index d250a5ab29..d75433daf7 100644 --- a/2024/CVE-2024-50379.json +++ b/2024/CVE-2024-50379.json @@ -200,10 +200,10 @@ "description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp", "fork": false, "created_at": "2024-12-23T07:20:47Z", - "updated_at": "2025-01-11T17:38:38Z", + "updated_at": "2025-01-14T09:52:58Z", "pushed_at": "2024-12-23T07:30:27Z", - "stargazers_count": 66, - "watchers_count": 66, + "stargazers_count": 68, + "watchers_count": 68, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -212,7 +212,7 @@ "topics": [], "visibility": "public", "forks": 16, - "watchers": 66, + "watchers": 68, "score": 0, "subscribers_count": 3 }, @@ -231,10 +231,10 @@ "description": "CVE-2024-50379利用", "fork": false, "created_at": "2024-12-23T14:11:46Z", - "updated_at": "2024-12-23T14:13:15Z", + "updated_at": "2025-01-14T09:50:55Z", "pushed_at": "2024-12-23T14:13:11Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -243,7 +243,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 }, @@ -262,10 +262,10 @@ "description": "CVE-2024-50379-exp", "fork": false, "created_at": "2024-12-25T02:41:31Z", - "updated_at": "2025-01-13T14:24:53Z", + "updated_at": "2025-01-14T11:50:00Z", "pushed_at": "2024-12-31T07:11:13Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -274,7 +274,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 7, + "watchers": 8, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-50404.json b/2024/CVE-2024-50404.json index 0c9b488b13..b1b9798f06 100644 --- a/2024/CVE-2024-50404.json +++ b/2024/CVE-2024-50404.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-53691.json b/2024/CVE-2024-53691.json index 4fa6106af3..420899d3f2 100644 --- a/2024/CVE-2024-53691.json +++ b/2024/CVE-2024-53691.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-54498.json b/2024/CVE-2024-54498.json index b0904a75e7..997658a3e4 100644 --- a/2024/CVE-2024-54498.json +++ b/2024/CVE-2024-54498.json @@ -14,10 +14,10 @@ "description": "Escape macOS Sandbox using sharedfilelistd exploit", "fork": false, "created_at": "2025-01-08T09:55:44Z", - "updated_at": "2025-01-14T06:17:53Z", + "updated_at": "2025-01-14T11:32:32Z", "pushed_at": "2025-01-09T06:34:50Z", - "stargazers_count": 41, - "watchers_count": 41, + "stargazers_count": 43, + "watchers_count": 43, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 41, + "watchers": 43, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-56145.json b/2024/CVE-2024-56145.json index 121a6e80ba..8785843e66 100644 --- a/2024/CVE-2024-56145.json +++ b/2024/CVE-2024-56145.json @@ -19,13 +19,13 @@ "stargazers_count": 37, "watchers_count": 37, "has_discussions": false, - "forks_count": 10, + "forks_count": 11, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 10, + "forks": 11, "watchers": 37, "score": 0, "subscribers_count": 2 @@ -50,13 +50,13 @@ "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, - "forks_count": 2, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, + "forks": 3, "watchers": 2, "score": 0, "subscribers_count": 1 diff --git a/README.md b/README.md index a8b2d0dcc7..8c3adabe5a 100644 --- a/README.md +++ b/README.md @@ -40807,7 +40807,6 @@ - [antunesmpedro/CVE-2018-6574](https://github.com/antunesmpedro/CVE-2018-6574) - [jahwni/CVE-2018-6574](https://github.com/jahwni/CVE-2018-6574) - [NsByte/CVE-2018-6574](https://github.com/NsByte/CVE-2018-6574) -- [Zeeshan12340/CVE-2018-6574](https://github.com/Zeeshan12340/CVE-2018-6574) - [moTorky/CVE-2018-6574-POC](https://github.com/moTorky/CVE-2018-6574-POC) - [Ashved9/Orange](https://github.com/Ashved9/Orange) - [zerbaliy3v/cve-2018-6574-exploit](https://github.com/zerbaliy3v/cve-2018-6574-exploit)