diff --git a/2016/CVE-2016-5636.json b/2016/CVE-2016-5636.json index fae11ebe7b..9f24f46378 100644 --- a/2016/CVE-2016-5636.json +++ b/2016/CVE-2016-5636.json @@ -13,7 +13,7 @@ "description": "CVE-2016-5636", "fork": false, "created_at": "2016-03-28T18:47:03Z", - "updated_at": "2021-02-22T10:07:02Z", + "updated_at": "2024-06-11T00:58:25Z", "pushed_at": "2020-08-10T07:27:53Z", "stargazers_count": 3, "watchers_count": 3, diff --git a/2018/CVE-2018-15133.json b/2018/CVE-2018-15133.json index dddbef6379..16b18e939d 100644 --- a/2018/CVE-2018-15133.json +++ b/2018/CVE-2018-15133.json @@ -13,10 +13,10 @@ "description": "PoC for CVE-2018-15133 (Laravel unserialize vulnerability)", "fork": false, "created_at": "2018-08-14T18:51:50Z", - "updated_at": "2024-04-12T13:19:09Z", + "updated_at": "2024-06-11T05:24:45Z", "pushed_at": "2024-03-10T19:29:16Z", - "stargazers_count": 248, - "watchers_count": 248, + "stargazers_count": 249, + "watchers_count": 249, "has_discussions": false, "forks_count": 40, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 40, - "watchers": 248, + "watchers": 249, "score": 0, "subscribers_count": 6 }, diff --git a/2019/CVE-2019-15107.json b/2019/CVE-2019-15107.json index 421c906677..5eed632231 100644 --- a/2019/CVE-2019-15107.json +++ b/2019/CVE-2019-15107.json @@ -843,7 +843,7 @@ "description": "school project", "fork": false, "created_at": "2023-05-15T08:13:46Z", - "updated_at": "2023-05-15T08:27:15Z", + "updated_at": "2024-06-11T02:40:07Z", "pushed_at": "2023-10-26T14:04:31Z", "stargazers_count": 0, "watchers_count": 0, diff --git a/2019/CVE-2019-18634.json b/2019/CVE-2019-18634.json index 46c32db9dd..9277fe018c 100644 --- a/2019/CVE-2019-18634.json +++ b/2019/CVE-2019-18634.json @@ -150,34 +150,34 @@ "subscribers_count": 1 }, { - "id": 362129366, + "id": 364464831, "name": "CVE-2019-18634", - "full_name": "Y3A\/CVE-2019-18634", + "full_name": "paras1te-x\/CVE-2019-18634", "owner": { - "login": "Y3A", - "id": 62646606, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62646606?v=4", - "html_url": "https:\/\/github.com\/Y3A" + "login": "paras1te-x", + "id": 78490741, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78490741?v=4", + "html_url": "https:\/\/github.com\/paras1te-x" }, - "html_url": "https:\/\/github.com\/Y3A\/CVE-2019-18634", + "html_url": "https:\/\/github.com\/paras1te-x\/CVE-2019-18634", "description": "exploit", "fork": false, - "created_at": "2021-04-27T13:50:24Z", - "updated_at": "2021-06-11T07:30:23Z", - "pushed_at": "2021-06-11T07:30:20Z", + "created_at": "2021-05-05T04:53:05Z", + "updated_at": "2021-05-05T04:53:06Z", + "pushed_at": "2021-05-05T04:53:29Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 2, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, + "forks": 1, "watchers": 0, "score": 0, - "subscribers_count": 2 + "subscribers_count": 0 }, { "id": 391601106, diff --git a/2019/CVE-2019-2215.json b/2019/CVE-2019-2215.json index a334119755..b1cc49bb2a 100644 --- a/2019/CVE-2019-2215.json +++ b/2019/CVE-2019-2215.json @@ -445,10 +445,10 @@ "description": "Android Kernel Vulnerability (CVE-2019-2215) temporary root PoC", "fork": false, "created_at": "2023-11-05T14:32:11Z", - "updated_at": "2024-04-04T12:28:11Z", + "updated_at": "2024-06-11T03:46:51Z", "pushed_at": "2023-12-21T06:18:47Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -457,7 +457,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 6, + "watchers": 7, "score": 0, "subscribers_count": 1 }, diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index f4e1ffd1da..19e209e4d0 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -48,13 +48,13 @@ "stargazers_count": 1699, "watchers_count": 1699, "has_discussions": false, - "forks_count": 360, + "forks_count": 359, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 360, + "forks": 359, "watchers": 1699, "score": 0, "subscribers_count": 87 diff --git a/2020/CVE-2020-17523.json b/2020/CVE-2020-17523.json index 659581b887..fd4f713e03 100644 --- a/2020/CVE-2020-17523.json +++ b/2020/CVE-2020-17523.json @@ -13,10 +13,10 @@ "description": "shiro-cve-2020-17523 漏洞的两种绕过姿势分析 以及配套的漏洞环境", "fork": false, "created_at": "2021-02-03T08:14:03Z", - "updated_at": "2024-03-31T14:24:41Z", + "updated_at": "2024-06-11T02:41:48Z", "pushed_at": "2021-02-07T09:42:36Z", - "stargazers_count": 111, - "watchers_count": 111, + "stargazers_count": 112, + "watchers_count": 112, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 14, - "watchers": 111, + "watchers": 112, "score": 0, "subscribers_count": 3 } diff --git a/2020/CVE-2020-29134.json b/2020/CVE-2020-29134.json index 9c69fc60b0..73ed5c08dc 100644 --- a/2020/CVE-2020-29134.json +++ b/2020/CVE-2020-29134.json @@ -18,7 +18,7 @@ "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -35,7 +35,7 @@ "totvs" ], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 4, "score": 0, "subscribers_count": 1 diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index fdf4cb6444..c3276ba809 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -410,10 +410,10 @@ "description": "PoC for CVE-2021-3156 (sudo heap overflow)", "fork": false, "created_at": "2021-01-30T03:22:04Z", - "updated_at": "2024-06-02T17:32:12Z", + "updated_at": "2024-06-11T00:50:47Z", "pushed_at": "2022-04-14T11:51:18Z", - "stargazers_count": 429, - "watchers_count": 429, + "stargazers_count": 430, + "watchers_count": 430, "has_discussions": false, "forks_count": 111, "allow_forking": true, @@ -422,7 +422,7 @@ "topics": [], "visibility": "public", "forks": 111, - "watchers": 429, + "watchers": 430, "score": 0, "subscribers_count": 8 }, @@ -1420,36 +1420,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 403515290, - "name": "CVE-2021-3156", - "full_name": "Y3A\/CVE-2021-3156", - "owner": { - "login": "Y3A", - "id": 62646606, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62646606?v=4", - "html_url": "https:\/\/github.com\/Y3A" - }, - "html_url": "https:\/\/github.com\/Y3A\/CVE-2021-3156", - "description": null, - "fork": false, - "created_at": "2021-09-06T06:48:08Z", - "updated_at": "2021-09-07T03:36:33Z", - "pushed_at": "2021-09-07T03:36:31Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 1, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 1, - "watchers": 0, - "score": 0, - "subscribers_count": 2 - }, { "id": 410319200, "name": "sudo-exploit", @@ -2054,6 +2024,36 @@ "score": 0, "subscribers_count": 1 }, + { + "id": 690307610, + "name": "Y3A-CVE-2021-3156", + "full_name": "EthicalSecurity-Agency\/Y3A-CVE-2021-3156", + "owner": { + "login": "EthicalSecurity-Agency", + "id": 128076110, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128076110?v=4", + "html_url": "https:\/\/github.com\/EthicalSecurity-Agency" + }, + "html_url": "https:\/\/github.com\/EthicalSecurity-Agency\/Y3A-CVE-2021-3156", + "description": "Y3A \/ CVE-2021-3156", + "fork": false, + "created_at": "2023-09-12T00:23:42Z", + "updated_at": "2023-09-12T00:23:42Z", + "pushed_at": "2021-09-07T03:36:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + }, { "id": 736124550, "name": "CVE-2021-3156", diff --git a/2021/CVE-2021-4154.json b/2021/CVE-2021-4154.json index c7a89520f3..59ad359ad6 100644 --- a/2021/CVE-2021-4154.json +++ b/2021/CVE-2021-4154.json @@ -13,10 +13,10 @@ "description": "CVE-2021-4154 exploit", "fork": false, "created_at": "2022-08-11T05:46:27Z", - "updated_at": "2024-01-03T06:23:30Z", + "updated_at": "2024-06-11T03:07:02Z", "pushed_at": "2022-10-07T04:56:36Z", - "stargazers_count": 65, - "watchers_count": 65, + "stargazers_count": 66, + "watchers_count": 66, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 65, + "watchers": 66, "score": 0, "subscribers_count": 5 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 448093e9fc..2825ad7de5 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -907,10 +907,10 @@ "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2021-12-10T23:19:28Z", - "updated_at": "2024-06-06T10:42:16Z", + "updated_at": "2024-06-11T03:46:08Z", "pushed_at": "2024-02-12T22:37:25Z", - "stargazers_count": 1760, - "watchers_count": 1760, + "stargazers_count": 1761, + "watchers_count": 1761, "has_discussions": false, "forks_count": 519, "allow_forking": true, @@ -924,7 +924,7 @@ ], "visibility": "public", "forks": 519, - "watchers": 1760, + "watchers": 1761, "score": 0, "subscribers_count": 28 }, diff --git a/2022/CVE-2022-30075.json b/2022/CVE-2022-30075.json index 8f0b168fe4..a39168f5c7 100644 --- a/2022/CVE-2022-30075.json +++ b/2022/CVE-2022-30075.json @@ -13,10 +13,10 @@ "description": "Tp-Link Archer AX50 Authenticated RCE (CVE-2022-30075)", "fork": false, "created_at": "2022-06-07T23:26:47Z", - "updated_at": "2024-06-04T16:23:30Z", + "updated_at": "2024-06-11T01:00:39Z", "pushed_at": "2022-11-20T03:03:53Z", - "stargazers_count": 207, - "watchers_count": 207, + "stargazers_count": 208, + "watchers_count": 208, "has_discussions": false, "forks_count": 45, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 45, - "watchers": 207, + "watchers": 208, "score": 0, "subscribers_count": 3 }, diff --git a/2022/CVE-2022-30333.json b/2022/CVE-2022-30333.json index f1e28ecc9d..c0d012343b 100644 --- a/2022/CVE-2022-30333.json +++ b/2022/CVE-2022-30333.json @@ -147,6 +147,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2022/CVE-2022-36446.json b/2022/CVE-2022-36446.json index 2268481461..0953fd475d 100644 --- a/2022/CVE-2022-36446.json +++ b/2022/CVE-2022-36446.json @@ -66,5 +66,35 @@ "watchers": 3, "score": 0, "subscribers_count": 1 + }, + { + "id": 813427958, + "name": "CVE-2022-36446", + "full_name": "Kang3639\/CVE-2022-36446", + "owner": { + "login": "Kang3639", + "id": 118144091, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118144091?v=4", + "html_url": "https:\/\/github.com\/Kang3639" + }, + "html_url": "https:\/\/github.com\/Kang3639\/CVE-2022-36446", + "description": "CVE-2022-36446 POC 실습", + "fork": false, + "created_at": "2024-06-11T04:21:28Z", + "updated_at": "2024-06-11T05:01:36Z", + "pushed_at": "2024-06-11T05:01:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2022/CVE-2022-4262.json b/2022/CVE-2022-4262.json index e39a542e75..4b86ea8587 100644 --- a/2022/CVE-2022-4262.json +++ b/2022/CVE-2022-4262.json @@ -13,10 +13,10 @@ "description": "Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.", "fork": false, "created_at": "2023-07-13T13:17:20Z", - "updated_at": "2024-06-04T07:48:58Z", + "updated_at": "2024-06-11T01:32:55Z", "pushed_at": "2024-02-11T03:01:51Z", - "stargazers_count": 86, - "watchers_count": 86, + "stargazers_count": 85, + "watchers_count": 85, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 86, + "watchers": 85, "score": 0, "subscribers_count": 4 }, diff --git a/2023/CVE-2023-2033.json b/2023/CVE-2023-2033.json index 680c05a2c9..861649e225 100644 --- a/2023/CVE-2023-2033.json +++ b/2023/CVE-2023-2033.json @@ -43,10 +43,10 @@ "description": "A collection of resources and information about CVE-2023-2033", "fork": false, "created_at": "2023-04-26T15:24:02Z", - "updated_at": "2024-05-10T05:30:03Z", + "updated_at": "2024-06-11T01:30:27Z", "pushed_at": "2023-08-13T21:53:14Z", - "stargazers_count": 19, - "watchers_count": 19, + "stargazers_count": 18, + "watchers_count": 18, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -60,7 +60,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 19, + "watchers": 18, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-22809.json b/2023/CVE-2023-22809.json index 60892330a8..5b8b34e093 100644 --- a/2023/CVE-2023-22809.json +++ b/2023/CVE-2023-22809.json @@ -202,10 +202,10 @@ "description": null, "fork": false, "created_at": "2023-07-10T06:38:14Z", - "updated_at": "2023-07-14T00:58:10Z", + "updated_at": "2024-06-11T03:20:39Z", "pushed_at": "2023-07-13T06:20:19Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -214,7 +214,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-33105.json b/2023/CVE-2023-33105.json index 3701815878..dd81300b47 100644 --- a/2023/CVE-2023-33105.json +++ b/2023/CVE-2023-33105.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-4771.json b/2023/CVE-2023-4771.json index 80bbc061c7..0bfb08e9f2 100644 --- a/2023/CVE-2023-4771.json +++ b/2023/CVE-2023-4771.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-6702.json b/2023/CVE-2023-6702.json index d5439cb803..86fcb0634a 100644 --- a/2023/CVE-2023-6702.json +++ b/2023/CVE-2023-6702.json @@ -13,10 +13,10 @@ "description": "Chrome Renderer 1day RCE via Type Confusion in Async Stack Trace (v8ctf submission)", "fork": false, "created_at": "2024-06-02T14:15:27Z", - "updated_at": "2024-06-08T22:33:50Z", + "updated_at": "2024-06-11T04:33:15Z", "pushed_at": "2024-06-03T05:03:46Z", - "stargazers_count": 45, - "watchers_count": 45, + "stargazers_count": 48, + "watchers_count": 48, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 45, + "watchers": 48, "score": 0, "subscribers_count": 2 } diff --git a/2024/CVE-2024-0195.json b/2024/CVE-2024-0195.json new file mode 100644 index 0000000000..cc93d1bcc7 --- /dev/null +++ b/2024/CVE-2024-0195.json @@ -0,0 +1,32 @@ +[ + { + "id": 813399149, + "name": "CVE-2024-0195", + "full_name": "Cappricio-Securities\/CVE-2024-0195", + "owner": { + "login": "Cappricio-Securities", + "id": 102907425, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4", + "html_url": "https:\/\/github.com\/Cappricio-Securities" + }, + "html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2024-0195", + "description": "SpiderFlow Crawler Platform - Remote Code Execution", + "fork": false, + "created_at": "2024-06-11T02:34:34Z", + "updated_at": "2024-06-11T02:35:35Z", + "pushed_at": "2024-06-11T02:35:32Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index 6a84b4db70..58b16ebf46 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -13,10 +13,10 @@ "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "fork": false, "created_at": "2024-03-20T21:16:41Z", - "updated_at": "2024-06-10T22:33:04Z", + "updated_at": "2024-06-11T03:12:23Z", "pushed_at": "2024-04-17T16:09:54Z", - "stargazers_count": 2094, - "watchers_count": 2094, + "stargazers_count": 2095, + "watchers_count": 2095, "has_discussions": false, "forks_count": 268, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 268, - "watchers": 2094, + "watchers": 2095, "score": 0, "subscribers_count": 24 }, @@ -153,6 +153,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-20405.json b/2024/CVE-2024-20405.json index 7a2840f63b..fe051cf480 100644 --- a/2024/CVE-2024-20405.json +++ b/2024/CVE-2024-20405.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2024-06-09T18:55:03Z", - "updated_at": "2024-06-09T18:55:47Z", + "updated_at": "2024-06-11T01:50:57Z", "pushed_at": "2024-06-09T18:55:44Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-20931.json b/2024/CVE-2024-20931.json index 8a80480eaa..5ffcf9a820 100644 --- a/2024/CVE-2024-20931.json +++ b/2024/CVE-2024-20931.json @@ -13,10 +13,10 @@ "description": "The Poc for CVE-2024-20931", "fork": false, "created_at": "2024-02-02T01:58:49Z", - "updated_at": "2024-05-10T03:53:53Z", + "updated_at": "2024-06-11T00:36:00Z", "pushed_at": "2024-02-02T02:05:01Z", - "stargazers_count": 70, - "watchers_count": 70, + "stargazers_count": 71, + "watchers_count": 71, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 12, - "watchers": 70, + "watchers": 71, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-21413.json b/2024/CVE-2024-21413.json index 85db885f7d..e35bca28af 100644 --- a/2024/CVE-2024-21413.json +++ b/2024/CVE-2024-21413.json @@ -43,10 +43,10 @@ "description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability", "fork": false, "created_at": "2024-02-16T15:17:59Z", - "updated_at": "2024-06-10T19:08:59Z", + "updated_at": "2024-06-11T02:35:32Z", "pushed_at": "2024-02-19T20:00:35Z", - "stargazers_count": 629, - "watchers_count": 629, + "stargazers_count": 630, + "watchers_count": 630, "has_discussions": false, "forks_count": 140, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 140, - "watchers": 629, + "watchers": 630, "score": 0, "subscribers_count": 9 }, diff --git a/2024/CVE-2024-24919.json b/2024/CVE-2024-24919.json index 5138eef1b6..d8a1f20a2e 100644 --- a/2024/CVE-2024-24919.json +++ b/2024/CVE-2024-24919.json @@ -1416,6 +1416,36 @@ "forks": 0, "watchers": 0, "score": 0, + "subscribers_count": 1 + }, + { + "id": 813414695, + "name": "CVE-2024-24919", + "full_name": "SalehLardhi\/CVE-2024-24919", + "owner": { + "login": "SalehLardhi", + "id": 77610128, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77610128?v=4", + "html_url": "https:\/\/github.com\/SalehLardhi" + }, + "html_url": "https:\/\/github.com\/SalehLardhi\/CVE-2024-24919", + "description": null, + "fork": false, + "created_at": "2024-06-11T03:33:30Z", + "updated_at": "2024-06-11T03:43:24Z", + "pushed_at": "2024-06-11T03:37:04Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-26229.json b/2024/CVE-2024-26229.json index 42f58807cb..c14a2865c4 100644 --- a/2024/CVE-2024-26229.json +++ b/2024/CVE-2024-26229.json @@ -13,20 +13,20 @@ "description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code", "fork": false, "created_at": "2024-06-10T17:02:03Z", - "updated_at": "2024-06-11T00:07:25Z", + "updated_at": "2024-06-11T06:28:09Z", "pushed_at": "2024-06-10T17:17:44Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 18, + "watchers_count": 18, "has_discussions": false, - "forks_count": 2, + "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, - "watchers": 6, + "forks": 7, + "watchers": 18, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-28397.json b/2024/CVE-2024-28397.json deleted file mode 100644 index b061854a2f..0000000000 --- a/2024/CVE-2024-28397.json +++ /dev/null @@ -1,32 +0,0 @@ -[ - { - "id": 775805293, - "name": "CVE-2024-28397", - "full_name": "Marven11\/CVE-2024-28397", - "owner": { - "login": "Marven11", - "id": 110723864, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110723864?v=4", - "html_url": "https:\/\/github.com\/Marven11" - }, - "html_url": "https:\/\/github.com\/Marven11\/CVE-2024-28397", - "description": "to be released", - "fork": false, - "created_at": "2024-03-22T04:29:34Z", - "updated_at": "2024-03-22T08:57:56Z", - "pushed_at": "2024-03-22T04:29:35Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 2 - } -] \ No newline at end of file diff --git a/2024/CVE-2024-29849.json b/2024/CVE-2024-29849.json index bde7a518fa..0a8a93a66e 100644 --- a/2024/CVE-2024-29849.json +++ b/2024/CVE-2024-29849.json @@ -13,10 +13,10 @@ "description": "Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)", "fork": false, "created_at": "2024-06-10T06:12:20Z", - "updated_at": "2024-06-11T00:06:34Z", + "updated_at": "2024-06-11T02:48:58Z", "pushed_at": "2024-06-10T07:53:44Z", - "stargazers_count": 35, - "watchers_count": 35, + "stargazers_count": 41, + "watchers_count": 41, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -25,8 +25,8 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 35, + "watchers": 41, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-30043.json b/2024/CVE-2024-30043.json index 3c99d2fa02..fa280a8997 100644 --- a/2024/CVE-2024-30043.json +++ b/2024/CVE-2024-30043.json @@ -13,10 +13,10 @@ "description": "Exploiting XXE Vulnerabilities on Microsoft SharePoint Server and Cloud via Confused URL Parsing", "fork": false, "created_at": "2024-06-06T18:31:57Z", - "updated_at": "2024-06-10T11:06:40Z", + "updated_at": "2024-06-11T02:39:17Z", "pushed_at": "2024-06-06T18:38:06Z", - "stargazers_count": 22, - "watchers_count": 22, + "stargazers_count": 24, + "watchers_count": 24, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 22, + "watchers": 24, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-32002.json b/2024/CVE-2024-32002.json index f7feed7e33..70c64ac748 100644 --- a/2024/CVE-2024-32002.json +++ b/2024/CVE-2024-32002.json @@ -394,13 +394,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 1, + "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 @@ -424,13 +424,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 1, + "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 @@ -1464,35 +1464,5 @@ "watchers": 1, "score": 0, "subscribers_count": 1 - }, - { - "id": 811571305, - "name": "CVE-2024-32002-linux-smash", - "full_name": "alimuhammedkose\/CVE-2024-32002-linux-smash", - "owner": { - "login": "alimuhammedkose", - "id": 117280381, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117280381?v=4", - "html_url": "https:\/\/github.com\/alimuhammedkose" - }, - "html_url": "https:\/\/github.com\/alimuhammedkose\/CVE-2024-32002-linux-smash", - "description": null, - "fork": false, - "created_at": "2024-06-06T21:26:03Z", - "updated_at": "2024-06-06T21:26:19Z", - "pushed_at": "2024-06-06T21:26:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-36821.json b/2024/CVE-2024-36821.json index 7025e2a455..a52c3077fe 100644 --- a/2024/CVE-2024-36821.json +++ b/2024/CVE-2024-36821.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-37393.json b/2024/CVE-2024-37393.json index cb9ad3ebbe..22429ec4b5 100644 --- a/2024/CVE-2024-37393.json +++ b/2024/CVE-2024-37393.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-4367.json b/2024/CVE-2024-4367.json index 1963a766ac..9f96a6d5f8 100644 --- a/2024/CVE-2024-4367.json +++ b/2024/CVE-2024-4367.json @@ -13,10 +13,10 @@ "description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept", "fork": false, "created_at": "2024-05-20T10:02:23Z", - "updated_at": "2024-06-08T16:09:28Z", + "updated_at": "2024-06-11T06:24:48Z", "pushed_at": "2024-06-07T03:28:00Z", - "stargazers_count": 56, - "watchers_count": 56, + "stargazers_count": 57, + "watchers_count": 57, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 10, - "watchers": 56, + "watchers": 57, "score": 0, "subscribers_count": 2 }, @@ -43,10 +43,10 @@ "description": "CVE-2024-4367 arbitrary js execution in pdf js", "fork": false, "created_at": "2024-05-20T22:56:10Z", - "updated_at": "2024-06-07T14:59:25Z", + "updated_at": "2024-06-11T01:33:46Z", "pushed_at": "2024-05-20T23:09:43Z", - "stargazers_count": 39, - "watchers_count": 39, + "stargazers_count": 40, + "watchers_count": 40, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 39, + "watchers": 40, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-4577.json b/2024/CVE-2024-4577.json index eb581066fc..09404a1bbf 100644 --- a/2024/CVE-2024-4577.json +++ b/2024/CVE-2024-4577.json @@ -13,10 +13,10 @@ "description": "CVE-2024-4577 is a critical vulnerability in PHP affecting CGI configurations, allowing attackers to execute arbitrary commands via crafted URL parameters.", "fork": false, "created_at": "2024-06-07T05:50:23Z", - "updated_at": "2024-06-11T00:15:09Z", - "pushed_at": "2024-06-07T11:49:08Z", - "stargazers_count": 62, - "watchers_count": 62, + "updated_at": "2024-06-11T04:46:45Z", + "pushed_at": "2024-06-11T04:46:42Z", + "stargazers_count": 63, + "watchers_count": 63, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 16, - "watchers": 62, + "watchers": 63, "score": 0, "subscribers_count": 4 }, @@ -133,10 +133,10 @@ "description": "POC & $BASH script for CVE-2024-4577", "fork": false, "created_at": "2024-06-07T09:51:39Z", - "updated_at": "2024-06-10T09:24:14Z", + "updated_at": "2024-06-11T04:42:50Z", "pushed_at": "2024-06-09T16:16:30Z", - "stargazers_count": 27, - "watchers_count": 27, + "stargazers_count": 28, + "watchers_count": 28, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -145,7 +145,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 27, + "watchers": 28, "score": 0, "subscribers_count": 1 }, @@ -163,21 +163,21 @@ "description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC", "fork": false, "created_at": "2024-06-07T09:52:54Z", - "updated_at": "2024-06-10T20:10:39Z", + "updated_at": "2024-06-11T04:18:57Z", "pushed_at": "2024-06-07T09:53:15Z", - "stargazers_count": 87, - "watchers_count": 87, + "stargazers_count": 92, + "watchers_count": 92, "has_discussions": false, - "forks_count": 20, + "forks_count": 21, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 20, - "watchers": 87, + "forks": 21, + "watchers": 92, "score": 0, - "subscribers_count": 2 + "subscribers_count": 3 }, { "id": 811787647, @@ -223,19 +223,19 @@ "description": null, "fork": false, "created_at": "2024-06-07T10:40:37Z", - "updated_at": "2024-06-08T22:33:25Z", + "updated_at": "2024-06-11T03:58:28Z", "pushed_at": "2024-06-07T15:06:52Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "has_discussions": false, - "forks_count": 2, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, - "watchers": 10, + "forks": 3, + "watchers": 11, "score": 0, "subscribers_count": 1 }, @@ -530,12 +530,12 @@ "description": "[漏洞复现] 全球首款利用PHP默认环境的CVE-2024-4577 PHP-CGI RCE 漏洞 EXP,共享原创EXP,支持SSRF,支持绕过WAF。The world's first CVE-2024-4577 PHP-CGI RCE exploit utilizing the default PHP environment. Sharing original exploit, supports SSRF, supports WAF bypass.", "fork": false, "created_at": "2024-06-08T13:04:45Z", - "updated_at": "2024-06-11T00:12:13Z", + "updated_at": "2024-06-11T06:07:30Z", "pushed_at": "2024-06-10T18:46:40Z", - "stargazers_count": 44, - "watchers_count": 44, + "stargazers_count": 75, + "watchers_count": 75, "has_discussions": false, - "forks_count": 9, + "forks_count": 15, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -549,8 +549,8 @@ "xampp" ], "visibility": "public", - "forks": 9, - "watchers": 44, + "forks": 15, + "watchers": 75, "score": 0, "subscribers_count": 1 }, @@ -598,10 +598,10 @@ "description": "PHP CGI Argument Injection vulnerability", "fork": false, "created_at": "2024-06-09T14:18:21Z", - "updated_at": "2024-06-10T09:45:44Z", + "updated_at": "2024-06-11T02:34:39Z", "pushed_at": "2024-06-09T14:20:36Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -610,7 +610,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 1 }, @@ -628,10 +628,10 @@ "description": "A PoC exploit for CVE-2024-4577 - PHP CGI Argument Injection Remote Code Execution (RCE)", "fork": false, "created_at": "2024-06-09T23:32:11Z", - "updated_at": "2024-06-10T14:28:31Z", + "updated_at": "2024-06-11T02:14:06Z", "pushed_at": "2024-06-10T11:12:44Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -654,7 +654,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 }, @@ -686,6 +686,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-4956.json b/2024/CVE-2024-4956.json index c31ccc7bed..36e4e79940 100644 --- a/2024/CVE-2024-4956.json +++ b/2024/CVE-2024-4956.json @@ -367,10 +367,10 @@ "description": "CVE-2024-4956 Python exploitation utility", "fork": false, "created_at": "2024-06-05T15:37:39Z", - "updated_at": "2024-06-08T16:13:06Z", + "updated_at": "2024-06-11T03:34:36Z", "pushed_at": "2024-06-08T16:13:03Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -379,7 +379,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 0, + "watchers": 2, "score": 0, "subscribers_count": 1 }, @@ -397,10 +397,10 @@ "description": "POC - CVE-2024–4956 - Nexus Repository Manager 3 Unauthenticated Path Traversal", "fork": false, "created_at": "2024-06-09T10:57:29Z", - "updated_at": "2024-06-09T15:55:45Z", + "updated_at": "2024-06-11T02:16:32Z", "pushed_at": "2024-06-09T12:53:09Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -409,7 +409,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/README.md b/README.md index 36cfec28fc..557991a781 100644 --- a/README.md +++ b/README.md @@ -15,6 +15,13 @@ - [41yn14/CVE-2024-0039-Exploit](https://github.com/41yn14/CVE-2024-0039-Exploit) +### CVE-2024-0195 (2024-01-02) + +Es wurde eine Schwachstelle in spider-flow 0.4.3 gefunden. Sie wurde als kritisch eingestuft. Es betrifft die Funktion FunctionService.saveFunction der Datei src/main/java/org/spiderflow/controller/FunctionController.java. Durch Manipulieren mit unbekannten Daten kann eine code injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung. + + +- [Cappricio-Securities/CVE-2024-0195](https://github.com/Cappricio-Securities/CVE-2024-0195) + ### CVE-2024-0197 (2024-02-27) A flaw in the installer for Thales SafeNet Sentinel HASP LDK prior to 9.16 on Windows allows an attacker to escalate their privilege level via local access.\n\n @@ -1535,6 +1542,7 @@ - [satchhacker/cve-2024-24919](https://github.com/satchhacker/cve-2024-24919) - [verylazytech/CVE-2024-24919](https://github.com/verylazytech/CVE-2024-24919) - [protonnegativo/CVE-2024-24919](https://github.com/protonnegativo/CVE-2024-24919) +- [SalehLardhi/CVE-2024-24919](https://github.com/SalehLardhi/CVE-2024-24919) ### CVE-2024-25092 (2024-06-09) @@ -1940,9 +1948,6 @@ - [YongYe-Security/CVE-2024-28255](https://github.com/YongYe-Security/CVE-2024-28255) -### CVE-2024-28397 -- [Marven11/CVE-2024-28397](https://github.com/Marven11/CVE-2024-28397) - ### CVE-2024-28515 (2024-04-03) Buffer Overflow vulnerability in CSAPP_Lab CSAPP Lab3 15-213 Fall 20xx allows a remote attacker to execute arbitrary code via the lab3 of csapp,lab3/buflab-update.pl component. @@ -2252,7 +2257,6 @@ - [AD-Appledog/wakuwaku](https://github.com/AD-Appledog/wakuwaku) - [tobelight/cve_2024_32002](https://github.com/tobelight/cve_2024_32002) - [Basyaact/CVE-2024-32002-PoC_Chinese](https://github.com/Basyaact/CVE-2024-32002-PoC_Chinese) -- [alimuhammedkose/CVE-2024-32002-linux-smash](https://github.com/alimuhammedkose/CVE-2024-32002-linux-smash) ### CVE-2024-32004 (2024-05-14) @@ -15137,6 +15141,7 @@ - [p0dalirius/CVE-2022-36446-Webmin-Software-Package-Updates-RCE](https://github.com/p0dalirius/CVE-2022-36446-Webmin-Software-Package-Updates-RCE) - [emirpolatt/CVE-2022-36446](https://github.com/emirpolatt/CVE-2022-36446) +- [Kang3639/CVE-2022-36446](https://github.com/Kang3639/CVE-2022-36446) ### CVE-2022-36532 (2022-09-16) @@ -17798,7 +17803,6 @@ - [Exodusro/CVE-2021-3156](https://github.com/Exodusro/CVE-2021-3156) - [CyberCommands/CVE-2021-3156](https://github.com/CyberCommands/CVE-2021-3156) - [0x7183/CVE-2021-3156](https://github.com/0x7183/CVE-2021-3156) -- [Y3A/CVE-2021-3156](https://github.com/Y3A/CVE-2021-3156) - [redhawkeye/sudo-exploit](https://github.com/redhawkeye/sudo-exploit) - [d3c3ptic0n/CVE-2021-3156](https://github.com/d3c3ptic0n/CVE-2021-3156) - [musergi/CVE-2021-3156](https://github.com/musergi/CVE-2021-3156) @@ -17819,6 +17823,7 @@ - [mutur4/CVE-2021-3156](https://github.com/mutur4/CVE-2021-3156) - [PurpleOzone/PE_CVE-CVE-2021-3156](https://github.com/PurpleOzone/PE_CVE-CVE-2021-3156) - [asepsaepdin/CVE-2021-3156](https://github.com/asepsaepdin/CVE-2021-3156) +- [EthicalSecurity-Agency/Y3A-CVE-2021-3156](https://github.com/EthicalSecurity-Agency/Y3A-CVE-2021-3156) - [DDayLuong/CVE-2021-3156](https://github.com/DDayLuong/CVE-2021-3156) - [wurwur/CVE-2021-3156](https://github.com/wurwur/CVE-2021-3156) - [SamTruss/LMU-CVE-2021-3156](https://github.com/SamTruss/LMU-CVE-2021-3156) @@ -32473,7 +32478,7 @@ - [N1et/CVE-2019-18634](https://github.com/N1et/CVE-2019-18634) - [ptef/CVE-2019-18634](https://github.com/ptef/CVE-2019-18634) - [edsonjt81/sudo-cve-2019-18634](https://github.com/edsonjt81/sudo-cve-2019-18634) -- [Y3A/CVE-2019-18634](https://github.com/Y3A/CVE-2019-18634) +- [paras1te-x/CVE-2019-18634](https://github.com/paras1te-x/CVE-2019-18634) - [aesophor/CVE-2019-18634](https://github.com/aesophor/CVE-2019-18634) - [TheJoyOfHacking/saleemrashid-sudo-cve-2019-18634](https://github.com/TheJoyOfHacking/saleemrashid-sudo-cve-2019-18634) - [DDayLuong/CVE-2019-18634](https://github.com/DDayLuong/CVE-2019-18634)