diff --git a/2016/CVE-2016-5636.json b/2016/CVE-2016-5636.json
index fae11ebe7b..9f24f46378 100644
--- a/2016/CVE-2016-5636.json
+++ b/2016/CVE-2016-5636.json
@@ -13,7 +13,7 @@
"description": "CVE-2016-5636",
"fork": false,
"created_at": "2016-03-28T18:47:03Z",
- "updated_at": "2021-02-22T10:07:02Z",
+ "updated_at": "2024-06-11T00:58:25Z",
"pushed_at": "2020-08-10T07:27:53Z",
"stargazers_count": 3,
"watchers_count": 3,
diff --git a/2018/CVE-2018-15133.json b/2018/CVE-2018-15133.json
index dddbef6379..16b18e939d 100644
--- a/2018/CVE-2018-15133.json
+++ b/2018/CVE-2018-15133.json
@@ -13,10 +13,10 @@
"description": "PoC for CVE-2018-15133 (Laravel unserialize vulnerability)",
"fork": false,
"created_at": "2018-08-14T18:51:50Z",
- "updated_at": "2024-04-12T13:19:09Z",
+ "updated_at": "2024-06-11T05:24:45Z",
"pushed_at": "2024-03-10T19:29:16Z",
- "stargazers_count": 248,
- "watchers_count": 248,
+ "stargazers_count": 249,
+ "watchers_count": 249,
"has_discussions": false,
"forks_count": 40,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 40,
- "watchers": 248,
+ "watchers": 249,
"score": 0,
"subscribers_count": 6
},
diff --git a/2019/CVE-2019-15107.json b/2019/CVE-2019-15107.json
index 421c906677..5eed632231 100644
--- a/2019/CVE-2019-15107.json
+++ b/2019/CVE-2019-15107.json
@@ -843,7 +843,7 @@
"description": "school project",
"fork": false,
"created_at": "2023-05-15T08:13:46Z",
- "updated_at": "2023-05-15T08:27:15Z",
+ "updated_at": "2024-06-11T02:40:07Z",
"pushed_at": "2023-10-26T14:04:31Z",
"stargazers_count": 0,
"watchers_count": 0,
diff --git a/2019/CVE-2019-18634.json b/2019/CVE-2019-18634.json
index 46c32db9dd..9277fe018c 100644
--- a/2019/CVE-2019-18634.json
+++ b/2019/CVE-2019-18634.json
@@ -150,34 +150,34 @@
"subscribers_count": 1
},
{
- "id": 362129366,
+ "id": 364464831,
"name": "CVE-2019-18634",
- "full_name": "Y3A\/CVE-2019-18634",
+ "full_name": "paras1te-x\/CVE-2019-18634",
"owner": {
- "login": "Y3A",
- "id": 62646606,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62646606?v=4",
- "html_url": "https:\/\/github.com\/Y3A"
+ "login": "paras1te-x",
+ "id": 78490741,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78490741?v=4",
+ "html_url": "https:\/\/github.com\/paras1te-x"
},
- "html_url": "https:\/\/github.com\/Y3A\/CVE-2019-18634",
+ "html_url": "https:\/\/github.com\/paras1te-x\/CVE-2019-18634",
"description": "exploit",
"fork": false,
- "created_at": "2021-04-27T13:50:24Z",
- "updated_at": "2021-06-11T07:30:23Z",
- "pushed_at": "2021-06-11T07:30:20Z",
+ "created_at": "2021-05-05T04:53:05Z",
+ "updated_at": "2021-05-05T04:53:06Z",
+ "pushed_at": "2021-05-05T04:53:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
- "forks_count": 2,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 2,
+ "forks": 1,
"watchers": 0,
"score": 0,
- "subscribers_count": 2
+ "subscribers_count": 0
},
{
"id": 391601106,
diff --git a/2019/CVE-2019-2215.json b/2019/CVE-2019-2215.json
index a334119755..b1cc49bb2a 100644
--- a/2019/CVE-2019-2215.json
+++ b/2019/CVE-2019-2215.json
@@ -445,10 +445,10 @@
"description": "Android Kernel Vulnerability (CVE-2019-2215) temporary root PoC",
"fork": false,
"created_at": "2023-11-05T14:32:11Z",
- "updated_at": "2024-04-04T12:28:11Z",
+ "updated_at": "2024-06-11T03:46:51Z",
"pushed_at": "2023-12-21T06:18:47Z",
- "stargazers_count": 6,
- "watchers_count": 6,
+ "stargazers_count": 7,
+ "watchers_count": 7,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@@ -457,7 +457,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
- "watchers": 6,
+ "watchers": 7,
"score": 0,
"subscribers_count": 1
},
diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json
index f4e1ffd1da..19e209e4d0 100644
--- a/2020/CVE-2020-1472.json
+++ b/2020/CVE-2020-1472.json
@@ -48,13 +48,13 @@
"stargazers_count": 1699,
"watchers_count": 1699,
"has_discussions": false,
- "forks_count": 360,
+ "forks_count": 359,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 360,
+ "forks": 359,
"watchers": 1699,
"score": 0,
"subscribers_count": 87
diff --git a/2020/CVE-2020-17523.json b/2020/CVE-2020-17523.json
index 659581b887..fd4f713e03 100644
--- a/2020/CVE-2020-17523.json
+++ b/2020/CVE-2020-17523.json
@@ -13,10 +13,10 @@
"description": "shiro-cve-2020-17523 漏洞的两种绕过姿势分析 以及配套的漏洞环境",
"fork": false,
"created_at": "2021-02-03T08:14:03Z",
- "updated_at": "2024-03-31T14:24:41Z",
+ "updated_at": "2024-06-11T02:41:48Z",
"pushed_at": "2021-02-07T09:42:36Z",
- "stargazers_count": 111,
- "watchers_count": 111,
+ "stargazers_count": 112,
+ "watchers_count": 112,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
- "watchers": 111,
+ "watchers": 112,
"score": 0,
"subscribers_count": 3
}
diff --git a/2020/CVE-2020-29134.json b/2020/CVE-2020-29134.json
index 9c69fc60b0..73ed5c08dc 100644
--- a/2020/CVE-2020-29134.json
+++ b/2020/CVE-2020-29134.json
@@ -18,7 +18,7 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -35,7 +35,7 @@
"totvs"
],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json
index fdf4cb6444..c3276ba809 100644
--- a/2021/CVE-2021-3156.json
+++ b/2021/CVE-2021-3156.json
@@ -410,10 +410,10 @@
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
"fork": false,
"created_at": "2021-01-30T03:22:04Z",
- "updated_at": "2024-06-02T17:32:12Z",
+ "updated_at": "2024-06-11T00:50:47Z",
"pushed_at": "2022-04-14T11:51:18Z",
- "stargazers_count": 429,
- "watchers_count": 429,
+ "stargazers_count": 430,
+ "watchers_count": 430,
"has_discussions": false,
"forks_count": 111,
"allow_forking": true,
@@ -422,7 +422,7 @@
"topics": [],
"visibility": "public",
"forks": 111,
- "watchers": 429,
+ "watchers": 430,
"score": 0,
"subscribers_count": 8
},
@@ -1420,36 +1420,6 @@
"score": 0,
"subscribers_count": 1
},
- {
- "id": 403515290,
- "name": "CVE-2021-3156",
- "full_name": "Y3A\/CVE-2021-3156",
- "owner": {
- "login": "Y3A",
- "id": 62646606,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62646606?v=4",
- "html_url": "https:\/\/github.com\/Y3A"
- },
- "html_url": "https:\/\/github.com\/Y3A\/CVE-2021-3156",
- "description": null,
- "fork": false,
- "created_at": "2021-09-06T06:48:08Z",
- "updated_at": "2021-09-07T03:36:33Z",
- "pushed_at": "2021-09-07T03:36:31Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "has_discussions": false,
- "forks_count": 1,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 1,
- "watchers": 0,
- "score": 0,
- "subscribers_count": 2
- },
{
"id": 410319200,
"name": "sudo-exploit",
@@ -2054,6 +2024,36 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 690307610,
+ "name": "Y3A-CVE-2021-3156",
+ "full_name": "EthicalSecurity-Agency\/Y3A-CVE-2021-3156",
+ "owner": {
+ "login": "EthicalSecurity-Agency",
+ "id": 128076110,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128076110?v=4",
+ "html_url": "https:\/\/github.com\/EthicalSecurity-Agency"
+ },
+ "html_url": "https:\/\/github.com\/EthicalSecurity-Agency\/Y3A-CVE-2021-3156",
+ "description": "Y3A \/ CVE-2021-3156",
+ "fork": false,
+ "created_at": "2023-09-12T00:23:42Z",
+ "updated_at": "2023-09-12T00:23:42Z",
+ "pushed_at": "2021-09-07T03:36:31Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
{
"id": 736124550,
"name": "CVE-2021-3156",
diff --git a/2021/CVE-2021-4154.json b/2021/CVE-2021-4154.json
index c7a89520f3..59ad359ad6 100644
--- a/2021/CVE-2021-4154.json
+++ b/2021/CVE-2021-4154.json
@@ -13,10 +13,10 @@
"description": "CVE-2021-4154 exploit",
"fork": false,
"created_at": "2022-08-11T05:46:27Z",
- "updated_at": "2024-01-03T06:23:30Z",
+ "updated_at": "2024-06-11T03:07:02Z",
"pushed_at": "2022-10-07T04:56:36Z",
- "stargazers_count": 65,
- "watchers_count": 65,
+ "stargazers_count": 66,
+ "watchers_count": 66,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
- "watchers": 65,
+ "watchers": 66,
"score": 0,
"subscribers_count": 5
},
diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json
index 448093e9fc..2825ad7de5 100644
--- a/2021/CVE-2021-44228.json
+++ b/2021/CVE-2021-44228.json
@@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
- "updated_at": "2024-06-06T10:42:16Z",
+ "updated_at": "2024-06-11T03:46:08Z",
"pushed_at": "2024-02-12T22:37:25Z",
- "stargazers_count": 1760,
- "watchers_count": 1760,
+ "stargazers_count": 1761,
+ "watchers_count": 1761,
"has_discussions": false,
"forks_count": 519,
"allow_forking": true,
@@ -924,7 +924,7 @@
],
"visibility": "public",
"forks": 519,
- "watchers": 1760,
+ "watchers": 1761,
"score": 0,
"subscribers_count": 28
},
diff --git a/2022/CVE-2022-30075.json b/2022/CVE-2022-30075.json
index 8f0b168fe4..a39168f5c7 100644
--- a/2022/CVE-2022-30075.json
+++ b/2022/CVE-2022-30075.json
@@ -13,10 +13,10 @@
"description": "Tp-Link Archer AX50 Authenticated RCE (CVE-2022-30075)",
"fork": false,
"created_at": "2022-06-07T23:26:47Z",
- "updated_at": "2024-06-04T16:23:30Z",
+ "updated_at": "2024-06-11T01:00:39Z",
"pushed_at": "2022-11-20T03:03:53Z",
- "stargazers_count": 207,
- "watchers_count": 207,
+ "stargazers_count": 208,
+ "watchers_count": 208,
"has_discussions": false,
"forks_count": 45,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 45,
- "watchers": 207,
+ "watchers": 208,
"score": 0,
"subscribers_count": 3
},
diff --git a/2022/CVE-2022-30333.json b/2022/CVE-2022-30333.json
index f1e28ecc9d..c0d012343b 100644
--- a/2022/CVE-2022-30333.json
+++ b/2022/CVE-2022-30333.json
@@ -147,6 +147,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-36446.json b/2022/CVE-2022-36446.json
index 2268481461..0953fd475d 100644
--- a/2022/CVE-2022-36446.json
+++ b/2022/CVE-2022-36446.json
@@ -66,5 +66,35 @@
"watchers": 3,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 813427958,
+ "name": "CVE-2022-36446",
+ "full_name": "Kang3639\/CVE-2022-36446",
+ "owner": {
+ "login": "Kang3639",
+ "id": 118144091,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118144091?v=4",
+ "html_url": "https:\/\/github.com\/Kang3639"
+ },
+ "html_url": "https:\/\/github.com\/Kang3639\/CVE-2022-36446",
+ "description": "CVE-2022-36446 POC 실습",
+ "fork": false,
+ "created_at": "2024-06-11T04:21:28Z",
+ "updated_at": "2024-06-11T05:01:36Z",
+ "pushed_at": "2024-06-11T05:01:32Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-4262.json b/2022/CVE-2022-4262.json
index e39a542e75..4b86ea8587 100644
--- a/2022/CVE-2022-4262.json
+++ b/2022/CVE-2022-4262.json
@@ -13,10 +13,10 @@
"description": "Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.",
"fork": false,
"created_at": "2023-07-13T13:17:20Z",
- "updated_at": "2024-06-04T07:48:58Z",
+ "updated_at": "2024-06-11T01:32:55Z",
"pushed_at": "2024-02-11T03:01:51Z",
- "stargazers_count": 86,
- "watchers_count": 86,
+ "stargazers_count": 85,
+ "watchers_count": 85,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
- "watchers": 86,
+ "watchers": 85,
"score": 0,
"subscribers_count": 4
},
diff --git a/2023/CVE-2023-2033.json b/2023/CVE-2023-2033.json
index 680c05a2c9..861649e225 100644
--- a/2023/CVE-2023-2033.json
+++ b/2023/CVE-2023-2033.json
@@ -43,10 +43,10 @@
"description": "A collection of resources and information about CVE-2023-2033",
"fork": false,
"created_at": "2023-04-26T15:24:02Z",
- "updated_at": "2024-05-10T05:30:03Z",
+ "updated_at": "2024-06-11T01:30:27Z",
"pushed_at": "2023-08-13T21:53:14Z",
- "stargazers_count": 19,
- "watchers_count": 19,
+ "stargazers_count": 18,
+ "watchers_count": 18,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@@ -60,7 +60,7 @@
],
"visibility": "public",
"forks": 2,
- "watchers": 19,
+ "watchers": 18,
"score": 0,
"subscribers_count": 1
},
diff --git a/2023/CVE-2023-22809.json b/2023/CVE-2023-22809.json
index 60892330a8..5b8b34e093 100644
--- a/2023/CVE-2023-22809.json
+++ b/2023/CVE-2023-22809.json
@@ -202,10 +202,10 @@
"description": null,
"fork": false,
"created_at": "2023-07-10T06:38:14Z",
- "updated_at": "2023-07-14T00:58:10Z",
+ "updated_at": "2024-06-11T03:20:39Z",
"pushed_at": "2023-07-13T06:20:19Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -214,7 +214,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 1,
+ "watchers": 2,
"score": 0,
"subscribers_count": 1
},
diff --git a/2023/CVE-2023-33105.json b/2023/CVE-2023-33105.json
index 3701815878..dd81300b47 100644
--- a/2023/CVE-2023-33105.json
+++ b/2023/CVE-2023-33105.json
@@ -27,6 +27,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2023/CVE-2023-4771.json b/2023/CVE-2023-4771.json
index 80bbc061c7..0bfb08e9f2 100644
--- a/2023/CVE-2023-4771.json
+++ b/2023/CVE-2023-4771.json
@@ -27,6 +27,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2023/CVE-2023-6702.json b/2023/CVE-2023-6702.json
index d5439cb803..86fcb0634a 100644
--- a/2023/CVE-2023-6702.json
+++ b/2023/CVE-2023-6702.json
@@ -13,10 +13,10 @@
"description": "Chrome Renderer 1day RCE via Type Confusion in Async Stack Trace (v8ctf submission)",
"fork": false,
"created_at": "2024-06-02T14:15:27Z",
- "updated_at": "2024-06-08T22:33:50Z",
+ "updated_at": "2024-06-11T04:33:15Z",
"pushed_at": "2024-06-03T05:03:46Z",
- "stargazers_count": 45,
- "watchers_count": 45,
+ "stargazers_count": 48,
+ "watchers_count": 48,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
- "watchers": 45,
+ "watchers": 48,
"score": 0,
"subscribers_count": 2
}
diff --git a/2024/CVE-2024-0195.json b/2024/CVE-2024-0195.json
new file mode 100644
index 0000000000..cc93d1bcc7
--- /dev/null
+++ b/2024/CVE-2024-0195.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 813399149,
+ "name": "CVE-2024-0195",
+ "full_name": "Cappricio-Securities\/CVE-2024-0195",
+ "owner": {
+ "login": "Cappricio-Securities",
+ "id": 102907425,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4",
+ "html_url": "https:\/\/github.com\/Cappricio-Securities"
+ },
+ "html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2024-0195",
+ "description": "SpiderFlow Crawler Platform - Remote Code Execution",
+ "fork": false,
+ "created_at": "2024-06-11T02:34:34Z",
+ "updated_at": "2024-06-11T02:35:35Z",
+ "pushed_at": "2024-06-11T02:35:32Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json
index 6a84b4db70..58b16ebf46 100644
--- a/2024/CVE-2024-1086.json
+++ b/2024/CVE-2024-1086.json
@@ -13,10 +13,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
- "updated_at": "2024-06-10T22:33:04Z",
+ "updated_at": "2024-06-11T03:12:23Z",
"pushed_at": "2024-04-17T16:09:54Z",
- "stargazers_count": 2094,
- "watchers_count": 2094,
+ "stargazers_count": 2095,
+ "watchers_count": 2095,
"has_discussions": false,
"forks_count": 268,
"allow_forking": true,
@@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 268,
- "watchers": 2094,
+ "watchers": 2095,
"score": 0,
"subscribers_count": 24
},
@@ -153,6 +153,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-20405.json b/2024/CVE-2024-20405.json
index 7a2840f63b..fe051cf480 100644
--- a/2024/CVE-2024-20405.json
+++ b/2024/CVE-2024-20405.json
@@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-06-09T18:55:03Z",
- "updated_at": "2024-06-09T18:55:47Z",
+ "updated_at": "2024-06-11T01:50:57Z",
"pushed_at": "2024-06-09T18:55:44Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 0,
+ "watchers": 1,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-20931.json b/2024/CVE-2024-20931.json
index 8a80480eaa..5ffcf9a820 100644
--- a/2024/CVE-2024-20931.json
+++ b/2024/CVE-2024-20931.json
@@ -13,10 +13,10 @@
"description": "The Poc for CVE-2024-20931",
"fork": false,
"created_at": "2024-02-02T01:58:49Z",
- "updated_at": "2024-05-10T03:53:53Z",
+ "updated_at": "2024-06-11T00:36:00Z",
"pushed_at": "2024-02-02T02:05:01Z",
- "stargazers_count": 70,
- "watchers_count": 70,
+ "stargazers_count": 71,
+ "watchers_count": 71,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
- "watchers": 70,
+ "watchers": 71,
"score": 0,
"subscribers_count": 3
},
diff --git a/2024/CVE-2024-21413.json b/2024/CVE-2024-21413.json
index 85db885f7d..e35bca28af 100644
--- a/2024/CVE-2024-21413.json
+++ b/2024/CVE-2024-21413.json
@@ -43,10 +43,10 @@
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"fork": false,
"created_at": "2024-02-16T15:17:59Z",
- "updated_at": "2024-06-10T19:08:59Z",
+ "updated_at": "2024-06-11T02:35:32Z",
"pushed_at": "2024-02-19T20:00:35Z",
- "stargazers_count": 629,
- "watchers_count": 629,
+ "stargazers_count": 630,
+ "watchers_count": 630,
"has_discussions": false,
"forks_count": 140,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 140,
- "watchers": 629,
+ "watchers": 630,
"score": 0,
"subscribers_count": 9
},
diff --git a/2024/CVE-2024-24919.json b/2024/CVE-2024-24919.json
index 5138eef1b6..d8a1f20a2e 100644
--- a/2024/CVE-2024-24919.json
+++ b/2024/CVE-2024-24919.json
@@ -1416,6 +1416,36 @@
"forks": 0,
"watchers": 0,
"score": 0,
+ "subscribers_count": 1
+ },
+ {
+ "id": 813414695,
+ "name": "CVE-2024-24919",
+ "full_name": "SalehLardhi\/CVE-2024-24919",
+ "owner": {
+ "login": "SalehLardhi",
+ "id": 77610128,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77610128?v=4",
+ "html_url": "https:\/\/github.com\/SalehLardhi"
+ },
+ "html_url": "https:\/\/github.com\/SalehLardhi\/CVE-2024-24919",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-06-11T03:33:30Z",
+ "updated_at": "2024-06-11T03:43:24Z",
+ "pushed_at": "2024-06-11T03:37:04Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
"subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-26229.json b/2024/CVE-2024-26229.json
index 42f58807cb..c14a2865c4 100644
--- a/2024/CVE-2024-26229.json
+++ b/2024/CVE-2024-26229.json
@@ -13,20 +13,20 @@
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
"fork": false,
"created_at": "2024-06-10T17:02:03Z",
- "updated_at": "2024-06-11T00:07:25Z",
+ "updated_at": "2024-06-11T06:28:09Z",
"pushed_at": "2024-06-10T17:17:44Z",
- "stargazers_count": 6,
- "watchers_count": 6,
+ "stargazers_count": 18,
+ "watchers_count": 18,
"has_discussions": false,
- "forks_count": 2,
+ "forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 2,
- "watchers": 6,
+ "forks": 7,
+ "watchers": 18,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-28397.json b/2024/CVE-2024-28397.json
deleted file mode 100644
index b061854a2f..0000000000
--- a/2024/CVE-2024-28397.json
+++ /dev/null
@@ -1,32 +0,0 @@
-[
- {
- "id": 775805293,
- "name": "CVE-2024-28397",
- "full_name": "Marven11\/CVE-2024-28397",
- "owner": {
- "login": "Marven11",
- "id": 110723864,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110723864?v=4",
- "html_url": "https:\/\/github.com\/Marven11"
- },
- "html_url": "https:\/\/github.com\/Marven11\/CVE-2024-28397",
- "description": "to be released",
- "fork": false,
- "created_at": "2024-03-22T04:29:34Z",
- "updated_at": "2024-03-22T08:57:56Z",
- "pushed_at": "2024-03-22T04:29:35Z",
- "stargazers_count": 2,
- "watchers_count": 2,
- "has_discussions": false,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 2,
- "score": 0,
- "subscribers_count": 2
- }
-]
\ No newline at end of file
diff --git a/2024/CVE-2024-29849.json b/2024/CVE-2024-29849.json
index bde7a518fa..0a8a93a66e 100644
--- a/2024/CVE-2024-29849.json
+++ b/2024/CVE-2024-29849.json
@@ -13,10 +13,10 @@
"description": "Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)",
"fork": false,
"created_at": "2024-06-10T06:12:20Z",
- "updated_at": "2024-06-11T00:06:34Z",
+ "updated_at": "2024-06-11T02:48:58Z",
"pushed_at": "2024-06-10T07:53:44Z",
- "stargazers_count": 35,
- "watchers_count": 35,
+ "stargazers_count": 41,
+ "watchers_count": 41,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@@ -25,8 +25,8 @@
"topics": [],
"visibility": "public",
"forks": 3,
- "watchers": 35,
+ "watchers": 41,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-30043.json b/2024/CVE-2024-30043.json
index 3c99d2fa02..fa280a8997 100644
--- a/2024/CVE-2024-30043.json
+++ b/2024/CVE-2024-30043.json
@@ -13,10 +13,10 @@
"description": "Exploiting XXE Vulnerabilities on Microsoft SharePoint Server and Cloud via Confused URL Parsing",
"fork": false,
"created_at": "2024-06-06T18:31:57Z",
- "updated_at": "2024-06-10T11:06:40Z",
+ "updated_at": "2024-06-11T02:39:17Z",
"pushed_at": "2024-06-06T18:38:06Z",
- "stargazers_count": 22,
- "watchers_count": 22,
+ "stargazers_count": 24,
+ "watchers_count": 24,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 22,
+ "watchers": 24,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-32002.json b/2024/CVE-2024-32002.json
index f7feed7e33..70c64ac748 100644
--- a/2024/CVE-2024-32002.json
+++ b/2024/CVE-2024-32002.json
@@ -394,13 +394,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
- "forks_count": 1,
+ "forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 1,
+ "forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
@@ -424,13 +424,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
- "forks_count": 1,
+ "forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 1,
+ "forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
@@ -1464,35 +1464,5 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
- },
- {
- "id": 811571305,
- "name": "CVE-2024-32002-linux-smash",
- "full_name": "alimuhammedkose\/CVE-2024-32002-linux-smash",
- "owner": {
- "login": "alimuhammedkose",
- "id": 117280381,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117280381?v=4",
- "html_url": "https:\/\/github.com\/alimuhammedkose"
- },
- "html_url": "https:\/\/github.com\/alimuhammedkose\/CVE-2024-32002-linux-smash",
- "description": null,
- "fork": false,
- "created_at": "2024-06-06T21:26:03Z",
- "updated_at": "2024-06-06T21:26:19Z",
- "pushed_at": "2024-06-06T21:26:16Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "has_discussions": false,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 0,
- "score": 0,
- "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-36821.json b/2024/CVE-2024-36821.json
index 7025e2a455..a52c3077fe 100644
--- a/2024/CVE-2024-36821.json
+++ b/2024/CVE-2024-36821.json
@@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-37393.json b/2024/CVE-2024-37393.json
index cb9ad3ebbe..22429ec4b5 100644
--- a/2024/CVE-2024-37393.json
+++ b/2024/CVE-2024-37393.json
@@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-4367.json b/2024/CVE-2024-4367.json
index 1963a766ac..9f96a6d5f8 100644
--- a/2024/CVE-2024-4367.json
+++ b/2024/CVE-2024-4367.json
@@ -13,10 +13,10 @@
"description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept",
"fork": false,
"created_at": "2024-05-20T10:02:23Z",
- "updated_at": "2024-06-08T16:09:28Z",
+ "updated_at": "2024-06-11T06:24:48Z",
"pushed_at": "2024-06-07T03:28:00Z",
- "stargazers_count": 56,
- "watchers_count": 56,
+ "stargazers_count": 57,
+ "watchers_count": 57,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
- "watchers": 56,
+ "watchers": 57,
"score": 0,
"subscribers_count": 2
},
@@ -43,10 +43,10 @@
"description": "CVE-2024-4367 arbitrary js execution in pdf js",
"fork": false,
"created_at": "2024-05-20T22:56:10Z",
- "updated_at": "2024-06-07T14:59:25Z",
+ "updated_at": "2024-06-11T01:33:46Z",
"pushed_at": "2024-05-20T23:09:43Z",
- "stargazers_count": 39,
- "watchers_count": 39,
+ "stargazers_count": 40,
+ "watchers_count": 40,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
- "watchers": 39,
+ "watchers": 40,
"score": 0,
"subscribers_count": 1
},
diff --git a/2024/CVE-2024-4577.json b/2024/CVE-2024-4577.json
index eb581066fc..09404a1bbf 100644
--- a/2024/CVE-2024-4577.json
+++ b/2024/CVE-2024-4577.json
@@ -13,10 +13,10 @@
"description": "CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters.",
"fork": false,
"created_at": "2024-06-07T05:50:23Z",
- "updated_at": "2024-06-11T00:15:09Z",
- "pushed_at": "2024-06-07T11:49:08Z",
- "stargazers_count": 62,
- "watchers_count": 62,
+ "updated_at": "2024-06-11T04:46:45Z",
+ "pushed_at": "2024-06-11T04:46:42Z",
+ "stargazers_count": 63,
+ "watchers_count": 63,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
- "watchers": 62,
+ "watchers": 63,
"score": 0,
"subscribers_count": 4
},
@@ -133,10 +133,10 @@
"description": "POC & $BASH script for CVE-2024-4577",
"fork": false,
"created_at": "2024-06-07T09:51:39Z",
- "updated_at": "2024-06-10T09:24:14Z",
+ "updated_at": "2024-06-11T04:42:50Z",
"pushed_at": "2024-06-09T16:16:30Z",
- "stargazers_count": 27,
- "watchers_count": 27,
+ "stargazers_count": 28,
+ "watchers_count": 28,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
- "watchers": 27,
+ "watchers": 28,
"score": 0,
"subscribers_count": 1
},
@@ -163,21 +163,21 @@
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
"fork": false,
"created_at": "2024-06-07T09:52:54Z",
- "updated_at": "2024-06-10T20:10:39Z",
+ "updated_at": "2024-06-11T04:18:57Z",
"pushed_at": "2024-06-07T09:53:15Z",
- "stargazers_count": 87,
- "watchers_count": 87,
+ "stargazers_count": 92,
+ "watchers_count": 92,
"has_discussions": false,
- "forks_count": 20,
+ "forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 20,
- "watchers": 87,
+ "forks": 21,
+ "watchers": 92,
"score": 0,
- "subscribers_count": 2
+ "subscribers_count": 3
},
{
"id": 811787647,
@@ -223,19 +223,19 @@
"description": null,
"fork": false,
"created_at": "2024-06-07T10:40:37Z",
- "updated_at": "2024-06-08T22:33:25Z",
+ "updated_at": "2024-06-11T03:58:28Z",
"pushed_at": "2024-06-07T15:06:52Z",
- "stargazers_count": 10,
- "watchers_count": 10,
+ "stargazers_count": 11,
+ "watchers_count": 11,
"has_discussions": false,
- "forks_count": 2,
+ "forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 2,
- "watchers": 10,
+ "forks": 3,
+ "watchers": 11,
"score": 0,
"subscribers_count": 1
},
@@ -530,12 +530,12 @@
"description": "[漏洞复现] 全球首款利用PHP默认环境的CVE-2024-4577 PHP-CGI RCE 漏洞 EXP,共享原创EXP,支持SSRF,支持绕过WAF。The world's first CVE-2024-4577 PHP-CGI RCE exploit utilizing the default PHP environment. Sharing original exploit, supports SSRF, supports WAF bypass.",
"fork": false,
"created_at": "2024-06-08T13:04:45Z",
- "updated_at": "2024-06-11T00:12:13Z",
+ "updated_at": "2024-06-11T06:07:30Z",
"pushed_at": "2024-06-10T18:46:40Z",
- "stargazers_count": 44,
- "watchers_count": 44,
+ "stargazers_count": 75,
+ "watchers_count": 75,
"has_discussions": false,
- "forks_count": 9,
+ "forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -549,8 +549,8 @@
"xampp"
],
"visibility": "public",
- "forks": 9,
- "watchers": 44,
+ "forks": 15,
+ "watchers": 75,
"score": 0,
"subscribers_count": 1
},
@@ -598,10 +598,10 @@
"description": "PHP CGI Argument Injection vulnerability",
"fork": false,
"created_at": "2024-06-09T14:18:21Z",
- "updated_at": "2024-06-10T09:45:44Z",
+ "updated_at": "2024-06-11T02:34:39Z",
"pushed_at": "2024-06-09T14:20:36Z",
- "stargazers_count": 5,
- "watchers_count": 5,
+ "stargazers_count": 6,
+ "watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@@ -610,7 +610,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
- "watchers": 5,
+ "watchers": 6,
"score": 0,
"subscribers_count": 1
},
@@ -628,10 +628,10 @@
"description": "A PoC exploit for CVE-2024-4577 - PHP CGI Argument Injection Remote Code Execution (RCE)",
"fork": false,
"created_at": "2024-06-09T23:32:11Z",
- "updated_at": "2024-06-10T14:28:31Z",
+ "updated_at": "2024-06-11T02:14:06Z",
"pushed_at": "2024-06-10T11:12:44Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -654,7 +654,7 @@
],
"visibility": "public",
"forks": 0,
- "watchers": 1,
+ "watchers": 2,
"score": 0,
"subscribers_count": 1
},
@@ -686,6 +686,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-4956.json b/2024/CVE-2024-4956.json
index c31ccc7bed..36e4e79940 100644
--- a/2024/CVE-2024-4956.json
+++ b/2024/CVE-2024-4956.json
@@ -367,10 +367,10 @@
"description": "CVE-2024-4956 Python exploitation utility",
"fork": false,
"created_at": "2024-06-05T15:37:39Z",
- "updated_at": "2024-06-08T16:13:06Z",
+ "updated_at": "2024-06-11T03:34:36Z",
"pushed_at": "2024-06-08T16:13:03Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -379,7 +379,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 0,
+ "watchers": 2,
"score": 0,
"subscribers_count": 1
},
@@ -397,10 +397,10 @@
"description": "POC - CVE-2024–4956 - Nexus Repository Manager 3 Unauthenticated Path Traversal",
"fork": false,
"created_at": "2024-06-09T10:57:29Z",
- "updated_at": "2024-06-09T15:55:45Z",
+ "updated_at": "2024-06-11T02:16:32Z",
"pushed_at": "2024-06-09T12:53:09Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -409,7 +409,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 1,
+ "watchers": 2,
"score": 0,
"subscribers_count": 1
}
diff --git a/README.md b/README.md
index 36cfec28fc..557991a781 100644
--- a/README.md
+++ b/README.md
@@ -15,6 +15,13 @@
- [41yn14/CVE-2024-0039-Exploit](https://github.com/41yn14/CVE-2024-0039-Exploit)
+### CVE-2024-0195 (2024-01-02)
+
+Es wurde eine Schwachstelle in spider-flow 0.4.3 gefunden. Sie wurde als kritisch eingestuft. Es betrifft die Funktion FunctionService.saveFunction der Datei src/main/java/org/spiderflow/controller/FunctionController.java. Durch Manipulieren mit unbekannten Daten kann eine code injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.
+
+
+- [Cappricio-Securities/CVE-2024-0195](https://github.com/Cappricio-Securities/CVE-2024-0195)
+
### CVE-2024-0197 (2024-02-27)
A flaw in the installer for Thales SafeNet Sentinel HASP LDK prior to 9.16 on Windows allows an attacker to escalate their privilege level via local access.\n\n
@@ -1535,6 +1542,7 @@
- [satchhacker/cve-2024-24919](https://github.com/satchhacker/cve-2024-24919)
- [verylazytech/CVE-2024-24919](https://github.com/verylazytech/CVE-2024-24919)
- [protonnegativo/CVE-2024-24919](https://github.com/protonnegativo/CVE-2024-24919)
+- [SalehLardhi/CVE-2024-24919](https://github.com/SalehLardhi/CVE-2024-24919)
### CVE-2024-25092 (2024-06-09)
@@ -1940,9 +1948,6 @@
- [YongYe-Security/CVE-2024-28255](https://github.com/YongYe-Security/CVE-2024-28255)
-### CVE-2024-28397
-- [Marven11/CVE-2024-28397](https://github.com/Marven11/CVE-2024-28397)
-
### CVE-2024-28515 (2024-04-03)
Buffer Overflow vulnerability in CSAPP_Lab CSAPP Lab3 15-213 Fall 20xx allows a remote attacker to execute arbitrary code via the lab3 of csapp,lab3/buflab-update.pl component.
@@ -2252,7 +2257,6 @@
- [AD-Appledog/wakuwaku](https://github.com/AD-Appledog/wakuwaku)
- [tobelight/cve_2024_32002](https://github.com/tobelight/cve_2024_32002)
- [Basyaact/CVE-2024-32002-PoC_Chinese](https://github.com/Basyaact/CVE-2024-32002-PoC_Chinese)
-- [alimuhammedkose/CVE-2024-32002-linux-smash](https://github.com/alimuhammedkose/CVE-2024-32002-linux-smash)
### CVE-2024-32004 (2024-05-14)
@@ -15137,6 +15141,7 @@
- [p0dalirius/CVE-2022-36446-Webmin-Software-Package-Updates-RCE](https://github.com/p0dalirius/CVE-2022-36446-Webmin-Software-Package-Updates-RCE)
- [emirpolatt/CVE-2022-36446](https://github.com/emirpolatt/CVE-2022-36446)
+- [Kang3639/CVE-2022-36446](https://github.com/Kang3639/CVE-2022-36446)
### CVE-2022-36532 (2022-09-16)
@@ -17798,7 +17803,6 @@
- [Exodusro/CVE-2021-3156](https://github.com/Exodusro/CVE-2021-3156)
- [CyberCommands/CVE-2021-3156](https://github.com/CyberCommands/CVE-2021-3156)
- [0x7183/CVE-2021-3156](https://github.com/0x7183/CVE-2021-3156)
-- [Y3A/CVE-2021-3156](https://github.com/Y3A/CVE-2021-3156)
- [redhawkeye/sudo-exploit](https://github.com/redhawkeye/sudo-exploit)
- [d3c3ptic0n/CVE-2021-3156](https://github.com/d3c3ptic0n/CVE-2021-3156)
- [musergi/CVE-2021-3156](https://github.com/musergi/CVE-2021-3156)
@@ -17819,6 +17823,7 @@
- [mutur4/CVE-2021-3156](https://github.com/mutur4/CVE-2021-3156)
- [PurpleOzone/PE_CVE-CVE-2021-3156](https://github.com/PurpleOzone/PE_CVE-CVE-2021-3156)
- [asepsaepdin/CVE-2021-3156](https://github.com/asepsaepdin/CVE-2021-3156)
+- [EthicalSecurity-Agency/Y3A-CVE-2021-3156](https://github.com/EthicalSecurity-Agency/Y3A-CVE-2021-3156)
- [DDayLuong/CVE-2021-3156](https://github.com/DDayLuong/CVE-2021-3156)
- [wurwur/CVE-2021-3156](https://github.com/wurwur/CVE-2021-3156)
- [SamTruss/LMU-CVE-2021-3156](https://github.com/SamTruss/LMU-CVE-2021-3156)
@@ -32473,7 +32478,7 @@
- [N1et/CVE-2019-18634](https://github.com/N1et/CVE-2019-18634)
- [ptef/CVE-2019-18634](https://github.com/ptef/CVE-2019-18634)
- [edsonjt81/sudo-cve-2019-18634](https://github.com/edsonjt81/sudo-cve-2019-18634)
-- [Y3A/CVE-2019-18634](https://github.com/Y3A/CVE-2019-18634)
+- [paras1te-x/CVE-2019-18634](https://github.com/paras1te-x/CVE-2019-18634)
- [aesophor/CVE-2019-18634](https://github.com/aesophor/CVE-2019-18634)
- [TheJoyOfHacking/saleemrashid-sudo-cve-2019-18634](https://github.com/TheJoyOfHacking/saleemrashid-sudo-cve-2019-18634)
- [DDayLuong/CVE-2019-18634](https://github.com/DDayLuong/CVE-2019-18634)