From 53bbabcba75afa5dd6932880108a5fce65c1fa09 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Mon, 2 Dec 2024 21:32:57 +0900 Subject: [PATCH] Auto Update 2024/12/02 12:32:57 --- 2016/CVE-2016-4437.json | 4 +-- 2017/CVE-2017-11317.json | 8 +++--- 2017/CVE-2017-20165.json | 4 +-- 2018/CVE-2018-17240.json | 2 +- 2019/CVE-2019-18935.json | 8 +++--- .../CVE-2019-25162.json | 22 ++++++++-------- 2020/CVE-2020-14882.json | 8 +++--- 2021/CVE-2021-21972.json | 8 +++--- 2021/CVE-2021-26943.json | 8 +++--- 2021/CVE-2021-3129.json | 8 +++--- 2021/CVE-2021-4034.json | 8 +++--- 2021/CVE-2021-42278.json | 8 +++--- 2021/CVE-2021-44228.json | 2 +- 2022/CVE-2022-22954.json | 8 +++--- 2022/CVE-2022-30190.json | 12 ++++----- 2022/CVE-2022-46689.json | 8 +++--- 2023/CVE-2023-1177.json | 8 +++--- 2023/CVE-2023-25157.json | 8 +++--- 2023/CVE-2023-28205.json | 11 +++++--- 2023/CVE-2023-29357.json | 8 +++--- 2023/CVE-2023-34312.json | 8 +++--- 2023/CVE-2023-35671.json | 8 +++--- 2023/CVE-2023-41425.json | 8 +++--- 2023/CVE-2023-44487.json | 8 +++--- 2023/CVE-2023-45866.json | 8 +++--- 2024/CVE-2024-0044.json | 2 +- 2024/CVE-2024-10220.json | 2 +- 2024/CVE-2024-10354.json | 8 +++--- 2024/CVE-2024-10355.json | 8 +++--- 2024/CVE-2024-10410.json | 8 +++--- 2024/CVE-2024-1086.json | 2 +- 2024/CVE-2024-10924.json | 6 ++--- 2024/CVE-2024-11320.json | 6 ++--- 2024/CVE-2024-11477.json | 8 +++--- 2024/CVE-2024-22734.json | 2 +- 2024/CVE-2024-23334.json | 8 +++--- 2024/CVE-2024-23897.json | 8 +++--- 2024/CVE-2024-27198.json | 8 +++--- 2024/CVE-2024-28995.json | 8 +++--- 2024/CVE-2024-29671.json | 4 +-- 2024/CVE-2024-30088.json | 2 +- 2024/CVE-2024-3094.json | 2 +- 2024/CVE-2024-32002.json | 8 +++--- 2024/CVE-2024-38063.json | 8 +++--- 2024/CVE-2024-39205.json | 8 +++--- 2024/CVE-2024-43044.json | 8 +++--- 2024/CVE-2024-47176.json | 8 +++--- 2024/CVE-2024-48336.json | 8 +++--- 2024/CVE-2024-48990.json | 2 +- 2024/CVE-2024-52940.json | 8 +++--- 2024/CVE-2024-6387.json | 8 +++--- 2024/CVE-2024-7479.json | 12 ++++----- 2024/CVE-2024-8069.json | 2 +- README.md | 26 +++++++++---------- 54 files changed, 201 insertions(+), 198 deletions(-) rename 2024/CVE-2024-48307.json => 2019/CVE-2019-25162.json (55%) diff --git a/2016/CVE-2016-4437.json b/2016/CVE-2016-4437.json index 9ea25c7701..925116c538 100644 --- a/2016/CVE-2016-4437.json +++ b/2016/CVE-2016-4437.json @@ -50,13 +50,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 1, + "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 diff --git a/2017/CVE-2017-11317.json b/2017/CVE-2017-11317.json index 424a296b0e..be9d160e71 100644 --- a/2017/CVE-2017-11317.json +++ b/2017/CVE-2017-11317.json @@ -14,10 +14,10 @@ "description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)", "fork": false, "created_at": "2018-01-09T13:53:57Z", - "updated_at": "2024-10-17T10:56:55Z", + "updated_at": "2024-12-02T10:37:56Z", "pushed_at": "2020-08-22T06:15:54Z", - "stargazers_count": 169, - "watchers_count": 169, + "stargazers_count": 170, + "watchers_count": 170, "has_discussions": false, "forks_count": 48, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 48, - "watchers": 169, + "watchers": 170, "score": 0, "subscribers_count": 9 }, diff --git a/2017/CVE-2017-20165.json b/2017/CVE-2017-20165.json index 83f63e8ef5..54687f7e5b 100644 --- a/2017/CVE-2017-20165.json +++ b/2017/CVE-2017-20165.json @@ -14,8 +14,8 @@ "description": "Fork of the send module to deal with CVE-2017-20165", "fork": false, "created_at": "2023-01-11T10:20:27Z", - "updated_at": "2024-11-22T10:38:07Z", - "pushed_at": "2024-11-22T10:38:03Z", + "updated_at": "2024-12-02T08:46:55Z", + "pushed_at": "2024-12-02T08:46:51Z", "stargazers_count": 13, "watchers_count": 13, "has_discussions": false, diff --git a/2018/CVE-2018-17240.json b/2018/CVE-2018-17240.json index 23521b48f8..5e54c1138f 100644 --- a/2018/CVE-2018-17240.json +++ b/2018/CVE-2018-17240.json @@ -46,7 +46,7 @@ "fork": false, "created_at": "2024-01-04T21:44:21Z", "updated_at": "2024-11-28T17:42:57Z", - "pushed_at": "2024-11-28T17:42:55Z", + "pushed_at": "2024-12-02T09:52:23Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, diff --git a/2019/CVE-2019-18935.json b/2019/CVE-2019-18935.json index f3319db41d..40a677d877 100644 --- a/2019/CVE-2019-18935.json +++ b/2019/CVE-2019-18935.json @@ -14,10 +14,10 @@ "description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)", "fork": false, "created_at": "2018-01-09T13:53:57Z", - "updated_at": "2024-10-17T10:56:55Z", + "updated_at": "2024-12-02T10:37:56Z", "pushed_at": "2020-08-22T06:15:54Z", - "stargazers_count": 169, - "watchers_count": 169, + "stargazers_count": 170, + "watchers_count": 170, "has_discussions": false, "forks_count": 48, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 48, - "watchers": 169, + "watchers": 170, "score": 0, "subscribers_count": 9 }, diff --git a/2024/CVE-2024-48307.json b/2019/CVE-2019-25162.json similarity index 55% rename from 2024/CVE-2024-48307.json rename to 2019/CVE-2019-25162.json index 372b4cf2ff..dec18defd6 100644 --- a/2024/CVE-2024-48307.json +++ b/2019/CVE-2019-25162.json @@ -1,21 +1,21 @@ [ { - "id": 897159186, - "name": "CVE-2024-48307-poc", - "full_name": "iSee857\/CVE-2024-48307-poc", + "id": 897174384, + "name": "CVE-2019-25162", + "full_name": "uthrasri\/CVE-2019-25162", "owner": { - "login": "iSee857", - "id": 73977770, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73977770?v=4", - "html_url": "https:\/\/github.com\/iSee857", + "login": "uthrasri", + "id": 145666390, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145666390?v=4", + "html_url": "https:\/\/github.com\/uthrasri", "user_view_type": "public" }, - "html_url": "https:\/\/github.com\/iSee857\/CVE-2024-48307-poc", + "html_url": "https:\/\/github.com\/uthrasri\/CVE-2019-25162", "description": null, "fork": false, - "created_at": "2024-12-02T06:17:24Z", - "updated_at": "2024-12-02T06:25:39Z", - "pushed_at": "2024-12-02T06:25:35Z", + "created_at": "2024-12-02T06:59:45Z", + "updated_at": "2024-12-02T07:03:43Z", + "pushed_at": "2024-12-02T07:03:43Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index e02d602a71..f3264842f4 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -14,10 +14,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2024-11-30T11:46:46Z", + "updated_at": "2024-12-02T12:12:56Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 4135, - "watchers_count": 4135, + "stargazers_count": 4136, + "watchers_count": 4136, "has_discussions": false, "forks_count": 1099, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 1099, - "watchers": 4135, + "watchers": 4136, "score": 0, "subscribers_count": 149 }, diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 8378882100..07123927d7 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -848,10 +848,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2024-12-01T12:38:32Z", + "updated_at": "2024-12-02T10:42:58Z", "pushed_at": "2024-04-25T06:09:38Z", - "stargazers_count": 1338, - "watchers_count": 1338, + "stargazers_count": 1339, + "watchers_count": 1339, "has_discussions": false, "forks_count": 165, "allow_forking": true, @@ -867,7 +867,7 @@ ], "visibility": "public", "forks": 165, - "watchers": 1338, + "watchers": 1339, "score": 0, "subscribers_count": 15 } diff --git a/2021/CVE-2021-26943.json b/2021/CVE-2021-26943.json index 74b883c1d4..0441a65bfe 100644 --- a/2021/CVE-2021-26943.json +++ b/2021/CVE-2021-26943.json @@ -14,10 +14,10 @@ "description": "The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.", "fork": false, "created_at": "2020-12-31T16:30:02Z", - "updated_at": "2024-10-06T05:32:37Z", + "updated_at": "2024-12-02T08:50:11Z", "pushed_at": "2021-03-29T12:33:38Z", - "stargazers_count": 134, - "watchers_count": 134, + "stargazers_count": 135, + "watchers_count": 135, "has_discussions": true, "forks_count": 23, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 23, - "watchers": 134, + "watchers": 135, "score": 0, "subscribers_count": 11 } diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index 6bbebe33a4..4c5120f80f 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -138,10 +138,10 @@ "description": "Exploit for CVE-2021-3129", "fork": false, "created_at": "2021-01-27T10:16:35Z", - "updated_at": "2024-10-29T05:00:59Z", + "updated_at": "2024-12-02T11:24:49Z", "pushed_at": "2021-03-07T04:39:58Z", - "stargazers_count": 65, - "watchers_count": 65, + "stargazers_count": 66, + "watchers_count": 66, "has_discussions": false, "forks_count": 26, "allow_forking": true, @@ -154,7 +154,7 @@ ], "visibility": "public", "forks": 26, - "watchers": 65, + "watchers": 66, "score": 0, "subscribers_count": 3 }, diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index c1568ca94b..07f5ee8b17 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -49,10 +49,10 @@ "description": "CVE-2021-4034 1day", "fork": false, "created_at": "2022-01-25T23:51:37Z", - "updated_at": "2024-12-01T16:43:06Z", + "updated_at": "2024-12-02T11:07:32Z", "pushed_at": "2022-06-08T04:00:28Z", - "stargazers_count": 1969, - "watchers_count": 1969, + "stargazers_count": 1970, + "watchers_count": 1970, "has_discussions": false, "forks_count": 512, "allow_forking": true, @@ -61,7 +61,7 @@ "topics": [], "visibility": "public", "forks": 512, - "watchers": 1969, + "watchers": 1970, "score": 0, "subscribers_count": 20 }, diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index 36ed39d8a4..2c04f3b183 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -50,10 +50,10 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-13T10:28:12Z", - "updated_at": "2024-11-27T16:39:48Z", + "updated_at": "2024-12-02T08:14:24Z", "pushed_at": "2023-01-29T03:31:27Z", - "stargazers_count": 806, - "watchers_count": 806, + "stargazers_count": 807, + "watchers_count": 807, "has_discussions": false, "forks_count": 123, "allow_forking": true, @@ -62,7 +62,7 @@ "topics": [], "visibility": "public", "forks": 123, - "watchers": 806, + "watchers": 807, "score": 0, "subscribers_count": 13 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index a0d28b11a2..5008a7f4eb 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -1574,7 +1574,7 @@ "fork": false, "created_at": "2021-12-11T12:16:45Z", "updated_at": "2024-04-29T17:48:37Z", - "pushed_at": "2024-11-21T03:29:01Z", + "pushed_at": "2024-12-02T10:32:48Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index d041450cc4..8b78ca379a 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -792,10 +792,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2024-12-01T12:38:32Z", + "updated_at": "2024-12-02T10:42:58Z", "pushed_at": "2024-04-25T06:09:38Z", - "stargazers_count": 1338, - "watchers_count": 1338, + "stargazers_count": 1339, + "watchers_count": 1339, "has_discussions": false, "forks_count": 165, "allow_forking": true, @@ -811,7 +811,7 @@ ], "visibility": "public", "forks": 165, - "watchers": 1338, + "watchers": 1339, "score": 0, "subscribers_count": 15 } diff --git a/2022/CVE-2022-30190.json b/2022/CVE-2022-30190.json index 7686fec371..6a8de2560d 100644 --- a/2022/CVE-2022-30190.json +++ b/2022/CVE-2022-30190.json @@ -1611,12 +1611,12 @@ "description": "Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)", "fork": false, "created_at": "2022-06-09T09:32:10Z", - "updated_at": "2024-08-27T09:07:07Z", + "updated_at": "2024-12-02T10:17:07Z", "pushed_at": "2022-06-16T07:28:13Z", - "stargazers_count": 27, - "watchers_count": 27, + "stargazers_count": 28, + "watchers_count": 28, "has_discussions": false, - "forks_count": 13, + "forks_count": 12, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -1632,8 +1632,8 @@ "word" ], "visibility": "public", - "forks": 13, - "watchers": 27, + "forks": 12, + "watchers": 28, "score": 0, "subscribers_count": 2 }, diff --git a/2022/CVE-2022-46689.json b/2022/CVE-2022-46689.json index df8c40eb67..b729146ae1 100644 --- a/2022/CVE-2022-46689.json +++ b/2022/CVE-2022-46689.json @@ -107,10 +107,10 @@ "description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.", "fork": false, "created_at": "2022-12-26T06:56:35Z", - "updated_at": "2024-11-14T06:06:01Z", + "updated_at": "2024-12-02T07:36:51Z", "pushed_at": "2023-08-02T09:35:14Z", - "stargazers_count": 886, - "watchers_count": 886, + "stargazers_count": 885, + "watchers_count": 885, "has_discussions": false, "forks_count": 73, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 73, - "watchers": 886, + "watchers": 885, "score": 0, "subscribers_count": 25 }, diff --git a/2023/CVE-2023-1177.json b/2023/CVE-2023-1177.json index 5e2a7d58ad..26742ee828 100644 --- a/2023/CVE-2023-1177.json +++ b/2023/CVE-2023-1177.json @@ -64,15 +64,15 @@ { "id": 721284951, "name": "CVE-2023-1177-rebuild", - "full_name": "tiyeume25112004\/CVE-2023-1177-rebuild", + "full_name": "SpycioKon\/CVE-2023-1177-rebuild", "owner": { - "login": "tiyeume25112004", + "login": "SpycioKon", "id": 77606941, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77606941?v=4", - "html_url": "https:\/\/github.com\/tiyeume25112004", + "html_url": "https:\/\/github.com\/SpycioKon", "user_view_type": "public" }, - "html_url": "https:\/\/github.com\/tiyeume25112004\/CVE-2023-1177-rebuild", + "html_url": "https:\/\/github.com\/SpycioKon\/CVE-2023-1177-rebuild", "description": "Learn more things, not suck all things", "fork": false, "created_at": "2023-11-20T18:32:46Z", diff --git a/2023/CVE-2023-25157.json b/2023/CVE-2023-25157.json index 584437aefd..e9c732f0dc 100644 --- a/2023/CVE-2023-25157.json +++ b/2023/CVE-2023-25157.json @@ -14,10 +14,10 @@ "description": "CVE-2023-25157 - GeoServer SQL Injection - PoC", "fork": false, "created_at": "2023-06-06T14:05:09Z", - "updated_at": "2024-11-24T12:48:18Z", + "updated_at": "2024-12-02T10:44:40Z", "pushed_at": "2023-07-14T10:40:17Z", - "stargazers_count": 165, - "watchers_count": 165, + "stargazers_count": 166, + "watchers_count": 166, "has_discussions": false, "forks_count": 33, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 33, - "watchers": 165, + "watchers": 166, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-28205.json b/2023/CVE-2023-28205.json index 99fd4690e1..45793dee74 100644 --- a/2023/CVE-2023-28205.json +++ b/2023/CVE-2023-28205.json @@ -14,10 +14,10 @@ "description": "PoC CVE-2023-28205: Apple WebKit Use-After-Free Vulnerability", "fork": false, "created_at": "2024-11-30T12:25:47Z", - "updated_at": "2024-12-01T16:18:19Z", + "updated_at": "2024-12-02T11:23:02Z", "pushed_at": "2024-12-01T16:08:19Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,14 +25,17 @@ "web_commit_signoff_required": false, "topics": [ "apple", + "playstation", "poc", + "ps4", + "ps5", "use-after-free", "vulnerability", "webkit" ], "visibility": "public", "forks": 1, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-29357.json b/2023/CVE-2023-29357.json index 0f038909f8..fa19c6bf4f 100644 --- a/2023/CVE-2023-29357.json +++ b/2023/CVE-2023-29357.json @@ -14,10 +14,10 @@ "description": "Microsoft SharePoint Server Elevation of Privilege Vulnerability", "fork": false, "created_at": "2023-09-26T16:18:41Z", - "updated_at": "2024-11-29T22:19:00Z", + "updated_at": "2024-12-02T08:24:01Z", "pushed_at": "2023-09-26T19:04:21Z", - "stargazers_count": 228, - "watchers_count": 228, + "stargazers_count": 229, + "watchers_count": 229, "has_discussions": false, "forks_count": 31, "allow_forking": true, @@ -33,7 +33,7 @@ ], "visibility": "public", "forks": 31, - "watchers": 228, + "watchers": 229, "score": 0, "subscribers_count": 4 }, diff --git a/2023/CVE-2023-34312.json b/2023/CVE-2023-34312.json index e96b051dfc..e39e4e576a 100644 --- a/2023/CVE-2023-34312.json +++ b/2023/CVE-2023-34312.json @@ -14,10 +14,10 @@ "description": "CVE-2023-34312", "fork": false, "created_at": "2023-05-27T12:44:42Z", - "updated_at": "2024-11-17T01:35:15Z", + "updated_at": "2024-12-02T07:01:07Z", "pushed_at": "2023-05-27T12:45:10Z", - "stargazers_count": 419, - "watchers_count": 419, + "stargazers_count": 420, + "watchers_count": 420, "has_discussions": false, "forks_count": 76, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 76, - "watchers": 419, + "watchers": 420, "score": 0, "subscribers_count": 3 }, diff --git a/2023/CVE-2023-35671.json b/2023/CVE-2023-35671.json index 18aa314724..b23e06de34 100644 --- a/2023/CVE-2023-35671.json +++ b/2023/CVE-2023-35671.json @@ -14,10 +14,10 @@ "description": "Android App Pin Security Issue Allowing Unauthorized Payments via Google Wallet", "fork": false, "created_at": "2023-09-01T20:16:28Z", - "updated_at": "2024-08-12T20:32:39Z", + "updated_at": "2024-12-02T07:08:37Z", "pushed_at": "2024-02-12T03:18:54Z", - "stargazers_count": 69, - "watchers_count": 69, + "stargazers_count": 70, + "watchers_count": 70, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 8, - "watchers": 69, + "watchers": 70, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-41425.json b/2023/CVE-2023-41425.json index 091b7710ea..1d6273854e 100644 --- a/2023/CVE-2023-41425.json +++ b/2023/CVE-2023-41425.json @@ -108,15 +108,15 @@ { "id": 846300471, "name": "CVE-2023-41425", - "full_name": "tiyeume25112004\/CVE-2023-41425", + "full_name": "SpycioKon\/CVE-2023-41425", "owner": { - "login": "tiyeume25112004", + "login": "SpycioKon", "id": 77606941, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77606941?v=4", - "html_url": "https:\/\/github.com\/tiyeume25112004", + "html_url": "https:\/\/github.com\/SpycioKon", "user_view_type": "public" }, - "html_url": "https:\/\/github.com\/tiyeume25112004\/CVE-2023-41425", + "html_url": "https:\/\/github.com\/SpycioKon\/CVE-2023-41425", "description": "Research", "fork": false, "created_at": "2024-08-22T23:27:48Z", diff --git a/2023/CVE-2023-44487.json b/2023/CVE-2023-44487.json index f8eff74b55..d780ac78a6 100644 --- a/2023/CVE-2023-44487.json +++ b/2023/CVE-2023-44487.json @@ -291,10 +291,10 @@ "description": "Examples for Implementing cve-2023-44487 ( HTTP\/2 Rapid Reset Attack ) Concept", "fork": false, "created_at": "2023-11-10T08:38:51Z", - "updated_at": "2024-11-09T09:55:37Z", + "updated_at": "2024-12-02T12:21:46Z", "pushed_at": "2023-11-10T08:39:14Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -310,7 +310,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 8, + "watchers": 9, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index 1111936030..5db4c0772d 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -14,10 +14,10 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2024-12-01T23:55:33Z", + "updated_at": "2024-12-02T10:25:56Z", "pushed_at": "2024-08-18T08:26:46Z", - "stargazers_count": 1281, - "watchers_count": 1281, + "stargazers_count": 1282, + "watchers_count": 1282, "has_discussions": false, "forks_count": 217, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 217, - "watchers": 1281, + "watchers": 1282, "score": 0, "subscribers_count": 20 }, diff --git a/2024/CVE-2024-0044.json b/2024/CVE-2024-0044.json index 1278a471ca..636f2b4f09 100644 --- a/2024/CVE-2024-0044.json +++ b/2024/CVE-2024-0044.json @@ -46,7 +46,7 @@ "fork": false, "created_at": "2024-06-18T12:30:53Z", "updated_at": "2024-12-02T05:48:05Z", - "pushed_at": "2024-07-25T18:12:57Z", + "pushed_at": "2024-12-02T06:29:52Z", "stargazers_count": 260, "watchers_count": 260, "has_discussions": false, diff --git a/2024/CVE-2024-10220.json b/2024/CVE-2024-10220.json index c01e533880..2a962d89f0 100644 --- a/2024/CVE-2024-10220.json +++ b/2024/CVE-2024-10220.json @@ -90,6 +90,6 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-10354.json b/2024/CVE-2024-10354.json index ce9faba77c..46cb5d6152 100644 --- a/2024/CVE-2024-10354.json +++ b/2024/CVE-2024-10354.json @@ -2,15 +2,15 @@ { "id": 877188085, "name": "CVE-2024-10354", - "full_name": "K1nako0\/CVE-2024-10354", + "full_name": "K1nakoo\/CVE-2024-10354", "owner": { - "login": "K1nako0", + "login": "K1nakoo", "id": 105909793, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105909793?v=4", - "html_url": "https:\/\/github.com\/K1nako0", + "html_url": "https:\/\/github.com\/K1nakoo", "user_view_type": "public" }, - "html_url": "https:\/\/github.com\/K1nako0\/CVE-2024-10354", + "html_url": "https:\/\/github.com\/K1nakoo\/CVE-2024-10354", "description": null, "fork": false, "created_at": "2024-10-23T08:37:18Z", diff --git a/2024/CVE-2024-10355.json b/2024/CVE-2024-10355.json index e34944f18b..0ca04ad996 100644 --- a/2024/CVE-2024-10355.json +++ b/2024/CVE-2024-10355.json @@ -2,15 +2,15 @@ { "id": 877198778, "name": "CVE-2024-10355", - "full_name": "K1nako0\/CVE-2024-10355", + "full_name": "K1nakoo\/CVE-2024-10355", "owner": { - "login": "K1nako0", + "login": "K1nakoo", "id": 105909793, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105909793?v=4", - "html_url": "https:\/\/github.com\/K1nako0", + "html_url": "https:\/\/github.com\/K1nakoo", "user_view_type": "public" }, - "html_url": "https:\/\/github.com\/K1nako0\/CVE-2024-10355", + "html_url": "https:\/\/github.com\/K1nakoo\/CVE-2024-10355", "description": null, "fork": false, "created_at": "2024-10-23T08:59:51Z", diff --git a/2024/CVE-2024-10410.json b/2024/CVE-2024-10410.json index 720c1e47be..7d224a899f 100644 --- a/2024/CVE-2024-10410.json +++ b/2024/CVE-2024-10410.json @@ -2,15 +2,15 @@ { "id": 878506568, "name": "CVE-2024-10410", - "full_name": "K1nako0\/CVE-2024-10410", + "full_name": "K1nakoo\/CVE-2024-10410", "owner": { - "login": "K1nako0", + "login": "K1nakoo", "id": 105909793, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105909793?v=4", - "html_url": "https:\/\/github.com\/K1nako0", + "html_url": "https:\/\/github.com\/K1nakoo", "user_view_type": "public" }, - "html_url": "https:\/\/github.com\/K1nako0\/CVE-2024-10410", + "html_url": "https:\/\/github.com\/K1nakoo\/CVE-2024-10410", "description": null, "fork": false, "created_at": "2024-10-25T14:15:56Z", diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index 0300ad6eac..534b8bbaea 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -34,7 +34,7 @@ "forks": 299, "watchers": 2292, "score": 0, - "subscribers_count": 25 + "subscribers_count": 26 }, { "id": 781477717, diff --git a/2024/CVE-2024-10924.json b/2024/CVE-2024-10924.json index a13428e075..94be455872 100644 --- a/2024/CVE-2024-10924.json +++ b/2024/CVE-2024-10924.json @@ -251,8 +251,8 @@ "description": null, "fork": false, "created_at": "2024-12-01T14:43:16Z", - "updated_at": "2024-12-01T17:52:27Z", - "pushed_at": "2024-12-01T17:52:24Z", + "updated_at": "2024-12-02T08:32:51Z", + "pushed_at": "2024-12-02T08:32:47Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, @@ -265,6 +265,6 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-11320.json b/2024/CVE-2024-11320.json index 66c7473558..faf95ccf93 100644 --- a/2024/CVE-2024-11320.json +++ b/2024/CVE-2024-11320.json @@ -19,15 +19,15 @@ "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 2, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-11477.json b/2024/CVE-2024-11477.json index aed0bfcb1b..af01d095e6 100644 --- a/2024/CVE-2024-11477.json +++ b/2024/CVE-2024-11477.json @@ -14,10 +14,10 @@ "description": "CVE-2024-11477 7Zip Code Execution Writeup and Analysis", "fork": false, "created_at": "2024-11-29T06:13:36Z", - "updated_at": "2024-12-02T02:58:44Z", + "updated_at": "2024-12-02T11:10:47Z", "pushed_at": "2024-11-29T21:02:56Z", - "stargazers_count": 24, - "watchers_count": 24, + "stargazers_count": 25, + "watchers_count": 25, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 24, + "watchers": 25, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-22734.json b/2024/CVE-2024-22734.json index 9134f5ea3c..ee1ed589c2 100644 --- a/2024/CVE-2024-22734.json +++ b/2024/CVE-2024-22734.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-23334.json b/2024/CVE-2024-23334.json index 71408fc275..f4d0249e65 100644 --- a/2024/CVE-2024-23334.json +++ b/2024/CVE-2024-23334.json @@ -76,10 +76,10 @@ "description": "A proof of concept of the path traversal vulnerability in the python AioHTTP library =< 3.9.1", "fork": false, "created_at": "2024-03-18T20:39:27Z", - "updated_at": "2024-11-29T10:33:26Z", + "updated_at": "2024-12-02T12:25:59Z", "pushed_at": "2024-03-19T06:37:30Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 11, + "watchers": 12, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-23897.json b/2024/CVE-2024-23897.json index 1ae7deaae0..8d24bee811 100644 --- a/2024/CVE-2024-23897.json +++ b/2024/CVE-2024-23897.json @@ -265,10 +265,10 @@ "description": "CVE-2024-23897 - Jenkins 任意文件读取 利用工具", "fork": false, "created_at": "2024-01-27T19:34:48Z", - "updated_at": "2024-11-16T19:50:18Z", + "updated_at": "2024-12-02T07:35:19Z", "pushed_at": "2024-03-16T07:55:41Z", - "stargazers_count": 72, - "watchers_count": 72, + "stargazers_count": 73, + "watchers_count": 73, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -281,7 +281,7 @@ ], "visibility": "public", "forks": 12, - "watchers": 72, + "watchers": 73, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-27198.json b/2024/CVE-2024-27198.json index bc1de91807..8a6ef18a41 100644 --- a/2024/CVE-2024-27198.json +++ b/2024/CVE-2024-27198.json @@ -45,10 +45,10 @@ "description": "Exploit for CVE-2024-27198 - TeamCity Server", "fork": false, "created_at": "2024-03-05T05:43:06Z", - "updated_at": "2024-11-21T05:27:06Z", + "updated_at": "2024-12-02T08:28:29Z", "pushed_at": "2024-03-08T06:13:09Z", - "stargazers_count": 30, - "watchers_count": 30, + "stargazers_count": 31, + "watchers_count": 31, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -60,7 +60,7 @@ ], "visibility": "public", "forks": 4, - "watchers": 30, + "watchers": 31, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-28995.json b/2024/CVE-2024-28995.json index cc1c3ac26f..fa7a3e390f 100644 --- a/2024/CVE-2024-28995.json +++ b/2024/CVE-2024-28995.json @@ -138,10 +138,10 @@ "description": "CVE-2024-28995 POC Vulnerability Scanner", "fork": false, "created_at": "2024-06-14T23:05:40Z", - "updated_at": "2024-11-20T16:30:49Z", + "updated_at": "2024-12-02T11:01:03Z", "pushed_at": "2024-06-15T12:21:28Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -150,7 +150,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 9, + "watchers": 10, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-29671.json b/2024/CVE-2024-29671.json index ec15080bfd..dcf5074ba5 100644 --- a/2024/CVE-2024-29671.json +++ b/2024/CVE-2024-29671.json @@ -14,8 +14,8 @@ "description": "This is POC of CVE-2024-29671", "fork": false, "created_at": "2024-11-21T11:51:04Z", - "updated_at": "2024-11-22T18:00:19Z", - "pushed_at": "2024-11-22T18:00:15Z", + "updated_at": "2024-12-02T10:22:17Z", + "pushed_at": "2024-12-02T10:22:13Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, diff --git a/2024/CVE-2024-30088.json b/2024/CVE-2024-30088.json index 1e9ca198f0..adeb211221 100644 --- a/2024/CVE-2024-30088.json +++ b/2024/CVE-2024-30088.json @@ -121,7 +121,7 @@ "forks": 31, "watchers": 419, "score": 0, - "subscribers_count": 18 + "subscribers_count": 19 }, { "id": 834461917, diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json index 4e2f469be0..24e37bf1a0 100644 --- a/2024/CVE-2024-3094.json +++ b/2024/CVE-2024-3094.json @@ -1870,6 +1870,6 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-32002.json b/2024/CVE-2024-32002.json index 233cecc795..82fa8d019c 100644 --- a/2024/CVE-2024-32002.json +++ b/2024/CVE-2024-32002.json @@ -1709,15 +1709,15 @@ { "id": 835980205, "name": "CVE-2024-32002", - "full_name": "tiyeume25112004\/CVE-2024-32002", + "full_name": "SpycioKon\/CVE-2024-32002", "owner": { - "login": "tiyeume25112004", + "login": "SpycioKon", "id": 77606941, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77606941?v=4", - "html_url": "https:\/\/github.com\/tiyeume25112004", + "html_url": "https:\/\/github.com\/SpycioKon", "user_view_type": "public" }, - "html_url": "https:\/\/github.com\/tiyeume25112004\/CVE-2024-32002", + "html_url": "https:\/\/github.com\/SpycioKon\/CVE-2024-32002", "description": "Just small script to exploit CVE-2024-32002", "fork": false, "created_at": "2024-07-30T23:20:51Z", diff --git a/2024/CVE-2024-38063.json b/2024/CVE-2024-38063.json index 22f28ccec7..74335370f2 100644 --- a/2024/CVE-2024-38063.json +++ b/2024/CVE-2024-38063.json @@ -265,10 +265,10 @@ "description": "poc for CVE-2024-38063 (RCE in tcpip.sys)", "fork": false, "created_at": "2024-08-24T18:25:46Z", - "updated_at": "2024-11-28T06:19:48Z", + "updated_at": "2024-12-02T08:18:56Z", "pushed_at": "2024-08-27T12:22:39Z", - "stargazers_count": 630, - "watchers_count": 630, + "stargazers_count": 631, + "watchers_count": 631, "has_discussions": false, "forks_count": 115, "allow_forking": true, @@ -277,7 +277,7 @@ "topics": [], "visibility": "public", "forks": 115, - "watchers": 630, + "watchers": 631, "score": 0, "subscribers_count": 4 }, diff --git a/2024/CVE-2024-39205.json b/2024/CVE-2024-39205.json index 928f0a57ff..2255a89ad6 100644 --- a/2024/CVE-2024-39205.json +++ b/2024/CVE-2024-39205.json @@ -14,10 +14,10 @@ "description": "Pyload RCE with js2py sandbox escape ", "fork": false, "created_at": "2024-10-26T01:01:35Z", - "updated_at": "2024-11-20T16:31:08Z", + "updated_at": "2024-12-02T06:55:31Z", "pushed_at": "2024-10-26T01:11:57Z", - "stargazers_count": 13, - "watchers_count": 13, + "stargazers_count": 14, + "watchers_count": 14, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 4, - "watchers": 13, + "watchers": 14, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-43044.json b/2024/CVE-2024-43044.json index a1752b18bf..992263c943 100644 --- a/2024/CVE-2024-43044.json +++ b/2024/CVE-2024-43044.json @@ -14,10 +14,10 @@ "description": "The script checks Jenkins endpoints for CVE-2024-43044 by retrieving the Jenkins version from the innstance and comparing it against known vulnerable version ranges.", "fork": false, "created_at": "2024-08-08T08:28:26Z", - "updated_at": "2024-11-20T16:31:00Z", + "updated_at": "2024-12-02T12:24:10Z", "pushed_at": "2024-08-08T09:32:00Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 6, - "watchers": 10, + "watchers": 11, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-47176.json b/2024/CVE-2024-47176.json index 939e2265e9..528d9af4f5 100644 --- a/2024/CVE-2024-47176.json +++ b/2024/CVE-2024-47176.json @@ -237,10 +237,10 @@ "description": "Unauthenticated RCE on cups-browsed (exploit and nuclei template)", "fork": false, "created_at": "2024-10-03T15:53:04Z", - "updated_at": "2024-11-19T17:59:37Z", + "updated_at": "2024-12-02T06:38:26Z", "pushed_at": "2024-10-03T17:11:17Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -257,7 +257,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 9, + "watchers": 10, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-48336.json b/2024/CVE-2024-48336.json index 1576513b9a..4b152802bd 100644 --- a/2024/CVE-2024-48336.json +++ b/2024/CVE-2024-48336.json @@ -14,10 +14,10 @@ "description": "Exploit and writeup for installed app to root privilege escalation through CVE-2024-48336 (Magisk Bug #8279), Privileges Escalation \/ Arbitrary Code Execution Vulnerability", "fork": false, "created_at": "2024-08-24T08:51:08Z", - "updated_at": "2024-11-30T12:08:16Z", + "updated_at": "2024-12-02T09:32:30Z", "pushed_at": "2024-11-05T02:57:25Z", - "stargazers_count": 175, - "watchers_count": 175, + "stargazers_count": 176, + "watchers_count": 176, "has_discussions": false, "forks_count": 29, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 29, - "watchers": 175, + "watchers": 176, "score": 0, "subscribers_count": 8 } diff --git a/2024/CVE-2024-48990.json b/2024/CVE-2024-48990.json index dfa212a1f0..337a3190bd 100644 --- a/2024/CVE-2024-48990.json +++ b/2024/CVE-2024-48990.json @@ -251,6 +251,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-52940.json b/2024/CVE-2024-52940.json index 846633ce28..68855a9097 100644 --- a/2024/CVE-2024-52940.json +++ b/2024/CVE-2024-52940.json @@ -14,10 +14,10 @@ "description": "CVE-2024-52940 - A zero-day vulnerability in AnyDesk's \"Allow Direct Connections\" feature, discovered and registered by Ebrahim Shafiei (EbraSha), exposing public and private IP addresses. For details, visit the NVD, Tenable, or MITRE pages.", "fork": false, "created_at": "2024-10-27T15:29:56Z", - "updated_at": "2024-12-01T19:08:01Z", + "updated_at": "2024-12-02T11:19:03Z", "pushed_at": "2024-11-18T15:09:32Z", - "stargazers_count": 27, - "watchers_count": 27, + "stargazers_count": 28, + "watchers_count": 28, "has_discussions": true, "forks_count": 10, "allow_forking": true, @@ -38,7 +38,7 @@ ], "visibility": "public", "forks": 10, - "watchers": 27, + "watchers": 28, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json index 376bad65be..ceb44fbd0d 100644 --- a/2024/CVE-2024-6387.json +++ b/2024/CVE-2024-6387.json @@ -2211,10 +2211,10 @@ "description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)", "fork": false, "created_at": "2024-07-08T11:27:49Z", - "updated_at": "2024-11-28T08:38:30Z", + "updated_at": "2024-12-02T07:30:19Z", "pushed_at": "2024-08-22T08:50:25Z", - "stargazers_count": 49, - "watchers_count": 49, + "stargazers_count": 50, + "watchers_count": 50, "has_discussions": false, "forks_count": 22, "allow_forking": true, @@ -2223,7 +2223,7 @@ "topics": [], "visibility": "public", "forks": 22, - "watchers": 49, + "watchers": 50, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-7479.json b/2024/CVE-2024-7479.json index 7c29819efc..845c475ab0 100644 --- a/2024/CVE-2024-7479.json +++ b/2024/CVE-2024-7479.json @@ -14,19 +14,19 @@ "description": "TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.", "fork": false, "created_at": "2024-09-29T10:58:15Z", - "updated_at": "2024-11-29T08:53:31Z", + "updated_at": "2024-12-02T11:44:34Z", "pushed_at": "2024-10-04T09:39:09Z", - "stargazers_count": 121, - "watchers_count": 121, + "stargazers_count": 125, + "watchers_count": 125, "has_discussions": false, - "forks_count": 19, + "forks_count": 20, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 19, - "watchers": 121, + "forks": 20, + "watchers": 125, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-8069.json b/2024/CVE-2024-8069.json index 9580838ef8..013561196f 100644 --- a/2024/CVE-2024-8069.json +++ b/2024/CVE-2024-8069.json @@ -34,6 +34,6 @@ "forks": 0, "watchers": 2, "score": 0, - "subscribers_count": 1 + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index fee8e49446..ff75f0ccc1 100644 --- a/README.md +++ b/README.md @@ -2007,21 +2007,21 @@ In SourceCodester Petrol Pump Management Software 1.0 wurde eine kritische Schwachstelle entdeckt. Das betrifft eine unbekannte Funktionalität der Datei /admin/print.php. Mit der Manipulation des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung. -- [K1nako0/CVE-2024-10354](https://github.com/K1nako0/CVE-2024-10354) +- [K1nakoo/CVE-2024-10354](https://github.com/K1nakoo/CVE-2024-10354) ### CVE-2024-10355 (2024-10-25) Eine kritische Schwachstelle wurde in SourceCodester Petrol Pump Management Software 1.0 entdeckt. Dies betrifft einen unbekannten Teil der Datei /admin/invoice.php. Durch die Manipulation des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung. -- [K1nako0/CVE-2024-10355](https://github.com/K1nako0/CVE-2024-10355) +- [K1nakoo/CVE-2024-10355](https://github.com/K1nakoo/CVE-2024-10355) ### CVE-2024-10410 (2024-10-27) In SourceCodester Online Hotel Reservation System 1.0 wurde eine kritische Schwachstelle entdeckt. Dabei geht es um die Funktion upload der Datei /admin/mod_room/controller.php?action=add. Dank Manipulation des Arguments image mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung. -- [K1nako0/CVE-2024-10410](https://github.com/K1nako0/CVE-2024-10410) +- [K1nakoo/CVE-2024-10410](https://github.com/K1nakoo/CVE-2024-10410) ### CVE-2024-10448 (2024-10-28) @@ -4558,7 +4558,7 @@ - [charlesgargasson/CVE-2024-32002](https://github.com/charlesgargasson/CVE-2024-32002) - [NishanthAnand21/CVE-2024-32002-PoC](https://github.com/NishanthAnand21/CVE-2024-32002-PoC) - [FlojBoj/CVE-2024-32002](https://github.com/FlojBoj/CVE-2024-32002) -- [tiyeume25112004/CVE-2024-32002](https://github.com/tiyeume25112004/CVE-2024-32002) +- [SpycioKon/CVE-2024-32002](https://github.com/SpycioKon/CVE-2024-32002) - [chrisWalker11/running-CVE-2024-32002-locally-for-tesing](https://github.com/chrisWalker11/running-CVE-2024-32002-locally-for-tesing) - [sanan2004/CVE-2024-32002](https://github.com/sanan2004/CVE-2024-32002) - [Masamuneee/hook](https://github.com/Masamuneee/hook) @@ -6627,13 +6627,6 @@ - [ajrielrm/CVE-2024-48217](https://github.com/ajrielrm/CVE-2024-48217) -### CVE-2024-48307 (2024-10-31) - -JeecgBoot v3.7.1 was discovered to contain a SQL injection vulnerability via the component /onlDragDatasetHead/getTotalData. - - -- [iSee857/CVE-2024-48307-poc](https://github.com/iSee857/CVE-2024-48307-poc) - ### CVE-2024-48322 (2024-11-11) UsersController.php in Run.codes 1.5.2 and older has a reset password race condition vulnerability. @@ -7419,7 +7412,7 @@ - [hh-hunter/ml-CVE-2023-1177](https://github.com/hh-hunter/ml-CVE-2023-1177) - [iumiro/CVE-2023-1177-MLFlow](https://github.com/iumiro/CVE-2023-1177-MLFlow) -- [tiyeume25112004/CVE-2023-1177-rebuild](https://github.com/tiyeume25112004/CVE-2023-1177-rebuild) +- [SpycioKon/CVE-2023-1177-rebuild](https://github.com/SpycioKon/CVE-2023-1177-rebuild) - [saimahmed/MLflow-Vuln](https://github.com/saimahmed/MLflow-Vuln) - [charlesgargasson/CVE-2023-1177](https://github.com/charlesgargasson/CVE-2023-1177) @@ -13318,7 +13311,7 @@ - [prodigiousMind/CVE-2023-41425](https://github.com/prodigiousMind/CVE-2023-41425) - [charlesgargasson/CVE-2023-41425](https://github.com/charlesgargasson/CVE-2023-41425) - [insomnia-jacob/CVE-2023-41425](https://github.com/insomnia-jacob/CVE-2023-41425) -- [tiyeume25112004/CVE-2023-41425](https://github.com/tiyeume25112004/CVE-2023-41425) +- [SpycioKon/CVE-2023-41425](https://github.com/SpycioKon/CVE-2023-41425) - [thefizzyfish/CVE-2023-41425-wonderCMS_RCE](https://github.com/thefizzyfish/CVE-2023-41425-wonderCMS_RCE) - [Raffli-Dev/CVE-2023-41425](https://github.com/Raffli-Dev/CVE-2023-41425) - [duck-sec/CVE-2023-41425](https://github.com/duck-sec/CVE-2023-41425) @@ -38495,6 +38488,13 @@ - [Ickarah/CVE-2019-25137-Version-Research](https://github.com/Ickarah/CVE-2019-25137-Version-Research) +### CVE-2019-25162 (2024-02-26) + +In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: Fix a potential use after free\n\nFree the adap structure only after we are done using it.\nThis patch just moves the put_device() down a bit to avoid the\nuse after free.\n\n[wsa: added comment to the code, added Fixes tag] + + +- [uthrasri/CVE-2019-25162](https://github.com/uthrasri/CVE-2019-25162) + ### CVE-2019-48814 - [wucj001/cve-2019-48814](https://github.com/wucj001/cve-2019-48814)