From 53f1b77c3ee20eec722f8d4c345afb929eb51cfd Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Mon, 2 Dec 2024 03:31:35 +0900 Subject: [PATCH] Auto Update 2024/12/01 18:31:35 --- 2010/CVE-2010-0738.json | 2 +- 2014/CVE-2014-4210.json | 12 ++++---- 2016/CVE-2016-0638.json | 12 ++++---- 2017/CVE-2017-3248.json | 12 ++++---- 2017/CVE-2017-5645.json | 8 ++--- 2017/CVE-2017-7525.json | 8 ++--- 2017/CVE-2017-7529.json | 8 ++--- 2018/CVE-2018-2628.json | 12 ++++---- 2019/CVE-2019-0708.json | 20 ++++++------ 2019/CVE-2019-1010174.json | 2 +- 2019/CVE-2019-17558.json | 4 +-- 2019/CVE-2019-2215.json | 8 ++--- 2019/CVE-2019-2618.json | 12 ++++---- 2020/CVE-2020-14882.json | 4 +-- 2020/CVE-2020-14883.json | 4 +-- 2020/CVE-2020-2551.json | 12 ++++---- 2020/CVE-2020-9992.json | 8 ++--- 2021/CVE-2021-21972.json | 8 ++--- 2021/CVE-2021-25646.json | 4 +-- 2021/CVE-2021-3156.json | 8 ++--- 2021/CVE-2021-34527.json | 8 ++--- 2021/CVE-2021-4034.json | 8 ++--- 2021/CVE-2021-43798.json | 8 ++--- 2021/CVE-2021-44228.json | 8 ++--- 2022/CVE-2022-20474.json | 4 +-- 2022/CVE-2022-22954.json | 8 ++--- 2022/CVE-2022-25845.json | 10 +++--- 2022/CVE-2022-30190.json | 8 ++--- 2023/CVE-2023-28205.json | 39 ++++++++++++++++++++++++ 2023/CVE-2023-35636.json | 8 ++--- 2023/CVE-2023-41425.json | 8 ++--- 2023/CVE-2023-7028.json | 8 ++--- 2024/CVE-2024-10924.json | 31 +++++++++++++++++++ 2024/CVE-2024-11320.json | 33 ++++++++++++++++++++ 2024/CVE-2024-11477.json | 12 ++++---- 2024/CVE-2024-21534.json | 8 ++--- 2024/CVE-2024-22734.json | 33 ++++++++++++++++++++ 2024/CVE-2024-34716.json | 8 ++--- 2024/CVE-2024-37032.json | 8 ++--- 2024/CVE-2024-4367.json | 8 ++--- 2024/CVE-2024-44083.json | 8 ++--- 2024/CVE-2024-48359.json | 8 ++--- 2024/CVE-2024-48990.json | 62 +++++++++++++++++++------------------- README.md | 24 ++++++++++++++- 44 files changed, 347 insertions(+), 189 deletions(-) create mode 100644 2023/CVE-2023-28205.json create mode 100644 2024/CVE-2024-11320.json create mode 100644 2024/CVE-2024-22734.json diff --git a/2010/CVE-2010-0738.json b/2010/CVE-2010-0738.json index f9cb7e5b0a..0fc4947efa 100644 --- a/2010/CVE-2010-0738.json +++ b/2010/CVE-2010-0738.json @@ -28,7 +28,7 @@ "forks": 9, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 2 }, { "id": 62456741, diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index e9c8722ad4..1291338ae6 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -45,12 +45,12 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-11-28T15:07:29Z", + "updated_at": "2024-12-01T15:55:44Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 2014, - "watchers_count": 2014, + "stargazers_count": 2015, + "watchers_count": 2015, "has_discussions": true, - "forks_count": 339, + "forks_count": 340, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -77,8 +77,8 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 339, - "watchers": 2014, + "forks": 340, + "watchers": 2015, "score": 0, "subscribers_count": 37 }, diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 2c2cfceaeb..28e1760ca8 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -14,12 +14,12 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-11-28T15:07:29Z", + "updated_at": "2024-12-01T15:55:44Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 2014, - "watchers_count": 2014, + "stargazers_count": 2015, + "watchers_count": 2015, "has_discussions": true, - "forks_count": 339, + "forks_count": 340, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -46,8 +46,8 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 339, - "watchers": 2014, + "forks": 340, + "watchers": 2015, "score": 0, "subscribers_count": 37 }, diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 302425ae53..91ca25e197 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -45,12 +45,12 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-11-28T15:07:29Z", + "updated_at": "2024-12-01T15:55:44Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 2014, - "watchers_count": 2014, + "stargazers_count": 2015, + "watchers_count": 2015, "has_discussions": true, - "forks_count": 339, + "forks_count": 340, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -77,8 +77,8 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 339, - "watchers": 2014, + "forks": 340, + "watchers": 2015, "score": 0, "subscribers_count": 37 }, diff --git a/2017/CVE-2017-5645.json b/2017/CVE-2017-5645.json index b939afeaac..defd22077f 100644 --- a/2017/CVE-2017-5645.json +++ b/2017/CVE-2017-5645.json @@ -14,10 +14,10 @@ "description": "CVE-2017-5645 - Apache Log4j RCE due Insecure Deserialization", "fork": false, "created_at": "2017-08-04T01:12:47Z", - "updated_at": "2024-11-01T02:37:42Z", + "updated_at": "2024-12-01T14:42:55Z", "pushed_at": "2018-11-18T11:14:20Z", - "stargazers_count": 91, - "watchers_count": 91, + "stargazers_count": 92, + "watchers_count": 92, "has_discussions": false, "forks_count": 31, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 31, - "watchers": 91, + "watchers": 92, "score": 0, "subscribers_count": 2 }, diff --git a/2017/CVE-2017-7525.json b/2017/CVE-2017-7525.json index e7458f79e5..419045d7c0 100644 --- a/2017/CVE-2017-7525.json +++ b/2017/CVE-2017-7525.json @@ -173,10 +173,10 @@ "description": "Insecure Java Deserialization Lab", "fork": false, "created_at": "2020-04-22T07:48:19Z", - "updated_at": "2023-06-22T06:33:22Z", + "updated_at": "2024-12-01T14:44:19Z", "pushed_at": "2024-02-05T16:50:30Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -192,7 +192,7 @@ ], "visibility": "public", "forks": 2, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 2 } diff --git a/2017/CVE-2017-7529.json b/2017/CVE-2017-7529.json index 8a1bfeffcc..35c3fc71c4 100644 --- a/2017/CVE-2017-7529.json +++ b/2017/CVE-2017-7529.json @@ -231,10 +231,10 @@ "description": "CVE-2017-7529 | nginx on the range 0.5.6 - 1.13.2", "fork": false, "created_at": "2021-01-19T07:12:10Z", - "updated_at": "2023-12-26T17:34:28Z", + "updated_at": "2024-12-01T16:42:12Z", "pushed_at": "2021-01-19T07:17:52Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -243,7 +243,7 @@ "topics": [], "visibility": "public", "forks": 14, - "watchers": 8, + "watchers": 9, "score": 0, "subscribers_count": 2 }, diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index ea6f1b49e6..acf768ef3c 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -576,12 +576,12 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-11-28T15:07:29Z", + "updated_at": "2024-12-01T15:55:44Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 2014, - "watchers_count": 2014, + "stargazers_count": 2015, + "watchers_count": 2015, "has_discussions": true, - "forks_count": 339, + "forks_count": 340, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -608,8 +608,8 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 339, - "watchers": 2014, + "forks": 340, + "watchers": 2015, "score": 0, "subscribers_count": 37 }, diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 9cb5446155..1fbe456dd6 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -1618,19 +1618,19 @@ "description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.", "fork": false, "created_at": "2019-05-23T22:50:12Z", - "updated_at": "2024-11-15T02:04:17Z", + "updated_at": "2024-12-01T12:18:09Z", "pushed_at": "2019-06-22T21:48:45Z", - "stargazers_count": 895, - "watchers_count": 895, + "stargazers_count": 896, + "watchers_count": 896, "has_discussions": false, - "forks_count": 243, + "forks_count": 242, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 243, - "watchers": 895, + "forks": 242, + "watchers": 896, "score": 0, "subscribers_count": 55 }, @@ -1902,10 +1902,10 @@ "description": "Proof of concept for CVE-2019-0708", "fork": false, "created_at": "2019-05-29T16:53:54Z", - "updated_at": "2024-10-31T00:43:46Z", + "updated_at": "2024-12-01T14:42:56Z", "pushed_at": "2021-12-02T12:00:46Z", - "stargazers_count": 1174, - "watchers_count": 1174, + "stargazers_count": 1175, + "watchers_count": 1175, "has_discussions": false, "forks_count": 345, "allow_forking": true, @@ -1914,7 +1914,7 @@ "topics": [], "visibility": "public", "forks": 345, - "watchers": 1174, + "watchers": 1175, "score": 0, "subscribers_count": 68 }, diff --git a/2019/CVE-2019-1010174.json b/2019/CVE-2019-1010174.json index 3f79a1aedd..f8c5e4d740 100644 --- a/2019/CVE-2019-1010174.json +++ b/2019/CVE-2019-1010174.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index ebf5d9b67d..7e3690c818 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -50,7 +50,7 @@ "stargazers_count": 4135, "watchers_count": 4135, "has_discussions": false, - "forks_count": 1100, + "forks_count": 1099, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -76,7 +76,7 @@ "webshell" ], "visibility": "public", - "forks": 1100, + "forks": 1099, "watchers": 4135, "score": 0, "subscribers_count": 149 diff --git a/2019/CVE-2019-2215.json b/2019/CVE-2019-2215.json index 045ffbfab8..aa5b6e6aa9 100644 --- a/2019/CVE-2019-2215.json +++ b/2019/CVE-2019-2215.json @@ -233,10 +233,10 @@ "description": "Triggering and Analyzing Android Kernel Vulnerability CVE-2019-2215", "fork": false, "created_at": "2020-06-07T15:03:07Z", - "updated_at": "2024-11-28T09:07:00Z", + "updated_at": "2024-12-01T16:37:55Z", "pushed_at": "2022-09-04T14:16:50Z", - "stargazers_count": 56, - "watchers_count": 56, + "stargazers_count": 57, + "watchers_count": 57, "has_discussions": false, "forks_count": 17, "allow_forking": true, @@ -250,7 +250,7 @@ ], "visibility": "public", "forks": 17, - "watchers": 56, + "watchers": 57, "score": 0, "subscribers_count": 3 }, diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index e02561a45e..d12afcb584 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -200,12 +200,12 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-11-28T15:07:29Z", + "updated_at": "2024-12-01T15:55:44Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 2014, - "watchers_count": 2014, + "stargazers_count": 2015, + "watchers_count": 2015, "has_discussions": true, - "forks_count": 339, + "forks_count": 340, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -232,8 +232,8 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 339, - "watchers": 2014, + "forks": 340, + "watchers": 2015, "score": 0, "subscribers_count": 37 } diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 5b3be27958..e02d602a71 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -19,7 +19,7 @@ "stargazers_count": 4135, "watchers_count": 4135, "has_discussions": false, - "forks_count": 1100, + "forks_count": 1099, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -45,7 +45,7 @@ "webshell" ], "visibility": "public", - "forks": 1100, + "forks": 1099, "watchers": 4135, "score": 0, "subscribers_count": 149 diff --git a/2020/CVE-2020-14883.json b/2020/CVE-2020-14883.json index 5fb97f6a2a..c904d41745 100644 --- a/2020/CVE-2020-14883.json +++ b/2020/CVE-2020-14883.json @@ -143,7 +143,7 @@ "stargazers_count": 1079, "watchers_count": 1079, "has_discussions": false, - "forks_count": 319, + "forks_count": 318, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -153,7 +153,7 @@ "poc" ], "visibility": "public", - "forks": 319, + "forks": 318, "watchers": 1079, "score": 0, "subscribers_count": 36 diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 53633b8902..1e04eff6cd 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -14,12 +14,12 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-11-28T15:07:29Z", + "updated_at": "2024-12-01T15:55:44Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 2014, - "watchers_count": 2014, + "stargazers_count": 2015, + "watchers_count": 2015, "has_discussions": true, - "forks_count": 339, + "forks_count": 340, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -46,8 +46,8 @@ "cve-2020-2883" ], "visibility": "public", - "forks": 339, - "watchers": 2014, + "forks": 340, + "watchers": 2015, "score": 0, "subscribers_count": 37 }, diff --git a/2020/CVE-2020-9992.json b/2020/CVE-2020-9992.json index 002caca1cc..030f56bb05 100644 --- a/2020/CVE-2020-9992.json +++ b/2020/CVE-2020-9992.json @@ -14,10 +14,10 @@ "description": "CVE-2020-9992 - A design flaw in MobileDevice.framework\/Xcode and iOS\/iPadOS\/tvOS Development Tools allows an attacker in the same network to gain remote code execution on a target device", "fork": false, "created_at": "2020-09-16T23:35:22Z", - "updated_at": "2024-01-04T16:50:21Z", + "updated_at": "2024-12-01T14:46:30Z", "pushed_at": "2020-09-23T14:52:06Z", - "stargazers_count": 65, - "watchers_count": 65, + "stargazers_count": 66, + "watchers_count": 66, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 65, + "watchers": 66, "score": 0, "subscribers_count": 7 } diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index a2d210d6cd..8378882100 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -848,10 +848,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2024-11-29T07:54:41Z", + "updated_at": "2024-12-01T12:38:32Z", "pushed_at": "2024-04-25T06:09:38Z", - "stargazers_count": 1337, - "watchers_count": 1337, + "stargazers_count": 1338, + "watchers_count": 1338, "has_discussions": false, "forks_count": 165, "allow_forking": true, @@ -867,7 +867,7 @@ ], "visibility": "public", "forks": 165, - "watchers": 1337, + "watchers": 1338, "score": 0, "subscribers_count": 15 } diff --git a/2021/CVE-2021-25646.json b/2021/CVE-2021-25646.json index f09bb94da4..94cab4effc 100644 --- a/2021/CVE-2021-25646.json +++ b/2021/CVE-2021-25646.json @@ -143,7 +143,7 @@ "stargazers_count": 1079, "watchers_count": 1079, "has_discussions": false, - "forks_count": 319, + "forks_count": 318, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -153,7 +153,7 @@ "poc" ], "visibility": "public", - "forks": 319, + "forks": 318, "watchers": 1079, "score": 0, "subscribers_count": 36 diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index 489160cad3..b49a3cecc4 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -486,10 +486,10 @@ "description": null, "fork": false, "created_at": "2021-01-30T20:39:58Z", - "updated_at": "2024-11-26T09:51:32Z", + "updated_at": "2024-12-01T16:04:35Z", "pushed_at": "2021-02-02T17:07:09Z", - "stargazers_count": 960, - "watchers_count": 960, + "stargazers_count": 961, + "watchers_count": 961, "has_discussions": false, "forks_count": 237, "allow_forking": true, @@ -498,7 +498,7 @@ "topics": [], "visibility": "public", "forks": 237, - "watchers": 960, + "watchers": 961, "score": 0, "subscribers_count": 27 }, diff --git a/2021/CVE-2021-34527.json b/2021/CVE-2021-34527.json index 12f0b2c270..b1682d8973 100644 --- a/2021/CVE-2021-34527.json +++ b/2021/CVE-2021-34527.json @@ -244,10 +244,10 @@ "description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE", "fork": false, "created_at": "2021-07-05T20:13:49Z", - "updated_at": "2024-11-17T00:40:44Z", + "updated_at": "2024-12-01T14:07:15Z", "pushed_at": "2024-05-19T16:25:52Z", - "stargazers_count": 784, - "watchers_count": 784, + "stargazers_count": 785, + "watchers_count": 785, "has_discussions": false, "forks_count": 121, "allow_forking": true, @@ -256,7 +256,7 @@ "topics": [], "visibility": "public", "forks": 121, - "watchers": 784, + "watchers": 785, "score": 0, "subscribers_count": 10 }, diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index 6a76460ee7..c1568ca94b 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -49,10 +49,10 @@ "description": "CVE-2021-4034 1day", "fork": false, "created_at": "2022-01-25T23:51:37Z", - "updated_at": "2024-11-27T09:10:35Z", + "updated_at": "2024-12-01T16:43:06Z", "pushed_at": "2022-06-08T04:00:28Z", - "stargazers_count": 1968, - "watchers_count": 1968, + "stargazers_count": 1969, + "watchers_count": 1969, "has_discussions": false, "forks_count": 512, "allow_forking": true, @@ -61,7 +61,7 @@ "topics": [], "visibility": "public", "forks": 512, - "watchers": 1968, + "watchers": 1969, "score": 0, "subscribers_count": 20 }, diff --git a/2021/CVE-2021-43798.json b/2021/CVE-2021-43798.json index 943852ab8f..62290c8972 100644 --- a/2021/CVE-2021-43798.json +++ b/2021/CVE-2021-43798.json @@ -1202,10 +1202,10 @@ "description": "Grafana Decryptor for CVE-2021-43798", "fork": false, "created_at": "2024-07-02T08:43:45Z", - "updated_at": "2024-07-02T09:00:01Z", + "updated_at": "2024-12-01T14:24:31Z", "pushed_at": "2024-07-02T08:45:45Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -1221,7 +1221,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 3c823da649..a0d28b11a2 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -381,10 +381,10 @@ "description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).", "fork": false, "created_at": "2021-12-10T12:38:20Z", - "updated_at": "2024-11-29T23:17:46Z", + "updated_at": "2024-12-01T17:27:18Z", "pushed_at": "2024-04-26T03:16:26Z", - "stargazers_count": 1106, - "watchers_count": 1106, + "stargazers_count": 1107, + "watchers_count": 1107, "has_discussions": false, "forks_count": 536, "allow_forking": true, @@ -395,7 +395,7 @@ ], "visibility": "public", "forks": 536, - "watchers": 1106, + "watchers": 1107, "score": 0, "subscribers_count": 23 }, diff --git a/2022/CVE-2022-20474.json b/2022/CVE-2022-20474.json index eca714b292..cc35dbfcf7 100644 --- a/2022/CVE-2022-20474.json +++ b/2022/CVE-2022-20474.json @@ -14,8 +14,8 @@ "description": "PoC of CVE-2022-20474", "fork": false, "created_at": "2024-11-14T08:48:59Z", - "updated_at": "2024-11-18T08:29:54Z", - "pushed_at": "2024-11-16T08:00:49Z", + "updated_at": "2024-12-01T14:56:17Z", + "pushed_at": "2024-12-01T14:56:14Z", "stargazers_count": 10, "watchers_count": 10, "has_discussions": false, diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index bf14b97ab7..d041450cc4 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -792,10 +792,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2024-11-29T07:54:41Z", + "updated_at": "2024-12-01T12:38:32Z", "pushed_at": "2024-04-25T06:09:38Z", - "stargazers_count": 1337, - "watchers_count": 1337, + "stargazers_count": 1338, + "watchers_count": 1338, "has_discussions": false, "forks_count": 165, "allow_forking": true, @@ -811,7 +811,7 @@ ], "visibility": "public", "forks": 165, - "watchers": 1337, + "watchers": 1338, "score": 0, "subscribers_count": 15 } diff --git a/2022/CVE-2022-25845.json b/2022/CVE-2022-25845.json index 893c7c10cc..a491e543e2 100644 --- a/2022/CVE-2022-25845.json +++ b/2022/CVE-2022-25845.json @@ -138,10 +138,10 @@ "description": "exploit by python", "fork": false, "created_at": "2024-11-26T13:03:38Z", - "updated_at": "2024-11-26T13:03:42Z", - "pushed_at": "2024-11-26T13:03:38Z", - "stargazers_count": 0, - "watchers_count": 0, + "updated_at": "2024-12-01T13:50:51Z", + "pushed_at": "2024-12-01T13:50:47Z", + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -150,7 +150,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2022/CVE-2022-30190.json b/2022/CVE-2022-30190.json index fb61350914..7686fec371 100644 --- a/2022/CVE-2022-30190.json +++ b/2022/CVE-2022-30190.json @@ -14,10 +14,10 @@ "description": "POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina", "fork": false, "created_at": "2022-05-30T18:17:38Z", - "updated_at": "2024-12-01T07:51:20Z", + "updated_at": "2024-12-01T17:54:04Z", "pushed_at": "2022-06-05T21:06:13Z", - "stargazers_count": 155, - "watchers_count": 155, + "stargazers_count": 156, + "watchers_count": 156, "has_discussions": false, "forks_count": 57, "allow_forking": true, @@ -34,7 +34,7 @@ ], "visibility": "public", "forks": 57, - "watchers": 155, + "watchers": 156, "score": 0, "subscribers_count": 4 }, diff --git a/2023/CVE-2023-28205.json b/2023/CVE-2023-28205.json new file mode 100644 index 0000000000..2cb75f7062 --- /dev/null +++ b/2023/CVE-2023-28205.json @@ -0,0 +1,39 @@ +[ + { + "id": 896459919, + "name": "uaf-2023-28205", + "full_name": "ntfargo\/uaf-2023-28205", + "owner": { + "login": "ntfargo", + "id": 32229490, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32229490?v=4", + "html_url": "https:\/\/github.com\/ntfargo", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/ntfargo\/uaf-2023-28205", + "description": "PoC CVE-2023-28205: Apple WebKit Use-After-Free Vulnerability", + "fork": false, + "created_at": "2024-11-30T12:25:47Z", + "updated_at": "2024-12-01T16:18:19Z", + "pushed_at": "2024-12-01T16:08:19Z", + "stargazers_count": 3, + "watchers_count": 3, + "has_discussions": false, + "forks_count": 1, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "apple", + "poc", + "use-after-free", + "vulnerability", + "webkit" + ], + "visibility": "public", + "forks": 1, + "watchers": 3, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-35636.json b/2023/CVE-2023-35636.json index b3c988af4e..c17bafd36f 100644 --- a/2023/CVE-2023-35636.json +++ b/2023/CVE-2023-35636.json @@ -14,10 +14,10 @@ "description": "Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC", "fork": false, "created_at": "2024-01-29T17:08:05Z", - "updated_at": "2024-11-15T17:09:30Z", + "updated_at": "2024-12-01T16:49:21Z", "pushed_at": "2024-01-30T05:58:08Z", - "stargazers_count": 43, - "watchers_count": 43, + "stargazers_count": 44, + "watchers_count": 44, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 43, + "watchers": 44, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-41425.json b/2023/CVE-2023-41425.json index 045dc0ca51..091b7710ea 100644 --- a/2023/CVE-2023-41425.json +++ b/2023/CVE-2023-41425.json @@ -306,10 +306,10 @@ "description": "Xss injection, WonderCMS 3.2.0 -3.4.2 ", "fork": false, "created_at": "2024-11-24T17:39:45Z", - "updated_at": "2024-11-25T17:21:22Z", + "updated_at": "2024-12-01T17:20:02Z", "pushed_at": "2024-11-24T18:08:01Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 0, + "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -318,7 +318,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 0, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-7028.json b/2023/CVE-2023-7028.json index ecbdf73c24..eff48219ec 100644 --- a/2023/CVE-2023-7028.json +++ b/2023/CVE-2023-7028.json @@ -110,10 +110,10 @@ "description": "This repository presents a proof-of-concept of CVE-2023-7028", "fork": false, "created_at": "2024-01-12T18:29:27Z", - "updated_at": "2024-11-13T18:00:51Z", + "updated_at": "2024-12-01T17:17:34Z", "pushed_at": "2024-01-13T13:50:20Z", - "stargazers_count": 236, - "watchers_count": 236, + "stargazers_count": 237, + "watchers_count": 237, "has_discussions": false, "forks_count": 41, "allow_forking": true, @@ -122,7 +122,7 @@ "topics": [], "visibility": "public", "forks": 41, - "watchers": 236, + "watchers": 237, "score": 0, "subscribers_count": 6 }, diff --git a/2024/CVE-2024-10924.json b/2024/CVE-2024-10924.json index 53066fd9a3..a13428e075 100644 --- a/2024/CVE-2024-10924.json +++ b/2024/CVE-2024-10924.json @@ -235,5 +235,36 @@ "watchers": 3, "score": 0, "subscribers_count": 1 + }, + { + "id": 896883913, + "name": "CVE-2024-10924-Bypass-MFA-Wordpress-LAB", + "full_name": "D1se0\/CVE-2024-10924-Bypass-MFA-Wordpress-LAB", + "owner": { + "login": "D1se0", + "id": 164921056, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164921056?v=4", + "html_url": "https:\/\/github.com\/D1se0", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/D1se0\/CVE-2024-10924-Bypass-MFA-Wordpress-LAB", + "description": null, + "fork": false, + "created_at": "2024-12-01T14:43:16Z", + "updated_at": "2024-12-01T17:52:27Z", + "pushed_at": "2024-12-01T17:52:24Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-11320.json b/2024/CVE-2024-11320.json new file mode 100644 index 0000000000..854304013d --- /dev/null +++ b/2024/CVE-2024-11320.json @@ -0,0 +1,33 @@ +[ + { + "id": 896840057, + "name": "CVE-2024-11320", + "full_name": "mhaskar\/CVE-2024-11320", + "owner": { + "login": "mhaskar", + "id": 6861215, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6861215?v=4", + "html_url": "https:\/\/github.com\/mhaskar", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/mhaskar\/CVE-2024-11320", + "description": "Exploit for Pandora FMS Remote Code Execution CVE-2024-11320", + "fork": false, + "created_at": "2024-12-01T12:39:49Z", + "updated_at": "2024-12-01T12:54:15Z", + "pushed_at": "2024-12-01T12:48:08Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-11477.json b/2024/CVE-2024-11477.json index 59bd3a9f5c..8eb93ced87 100644 --- a/2024/CVE-2024-11477.json +++ b/2024/CVE-2024-11477.json @@ -14,19 +14,19 @@ "description": "CVE-2024-11477 7Zip Code Execution Writeup and Analysis", "fork": false, "created_at": "2024-11-29T06:13:36Z", - "updated_at": "2024-12-01T08:35:41Z", + "updated_at": "2024-12-01T16:44:44Z", "pushed_at": "2024-11-29T21:02:56Z", - "stargazers_count": 17, - "watchers_count": 17, + "stargazers_count": 21, + "watchers_count": 21, "has_discussions": false, - "forks_count": 5, + "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 5, - "watchers": 17, + "forks": 6, + "watchers": 21, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-21534.json b/2024/CVE-2024-21534.json index 858fe0304b..b071067714 100644 --- a/2024/CVE-2024-21534.json +++ b/2024/CVE-2024-21534.json @@ -80,10 +80,10 @@ "description": "POC - CVE-2024-21534 Jsonpath-plus vulnerable to Remote Code Execution (RCE) due to improper input sanitization", "fork": false, "created_at": "2024-11-28T17:47:53Z", - "updated_at": "2024-11-29T11:18:46Z", + "updated_at": "2024-12-01T14:49:28Z", "pushed_at": "2024-11-28T18:07:14Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -99,7 +99,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 4, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-22734.json b/2024/CVE-2024-22734.json new file mode 100644 index 0000000000..b38148e21d --- /dev/null +++ b/2024/CVE-2024-22734.json @@ -0,0 +1,33 @@ +[ + { + "id": 896950815, + "name": "CVE-2024-22734", + "full_name": "securekomodo\/CVE-2024-22734", + "owner": { + "login": "securekomodo", + "id": 4809643, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4809643?v=4", + "html_url": "https:\/\/github.com\/securekomodo", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/securekomodo\/CVE-2024-22734", + "description": "Exploit POC for CVE-2024-22734 affecting AMCS Trux Software", + "fork": false, + "created_at": "2024-12-01T17:47:16Z", + "updated_at": "2024-12-01T17:49:22Z", + "pushed_at": "2024-12-01T17:48:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-34716.json b/2024/CVE-2024-34716.json index ac154fc3a0..46a61f7604 100644 --- a/2024/CVE-2024-34716.json +++ b/2024/CVE-2024-34716.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2024-05-14T18:48:41Z", - "updated_at": "2024-10-19T08:32:52Z", + "updated_at": "2024-12-01T14:52:57Z", "pushed_at": "2024-09-27T10:46:14Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 9, + "watchers": 10, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-37032.json b/2024/CVE-2024-37032.json index 3bb7120ef9..d6b2e57696 100644 --- a/2024/CVE-2024-37032.json +++ b/2024/CVE-2024-37032.json @@ -14,10 +14,10 @@ "description": "Path traversal in Ollama with rogue registry server", "fork": false, "created_at": "2024-06-26T03:11:29Z", - "updated_at": "2024-09-17T07:31:08Z", + "updated_at": "2024-12-01T12:59:57Z", "pushed_at": "2024-06-28T03:14:05Z", - "stargazers_count": 20, - "watchers_count": 20, + "stargazers_count": 21, + "watchers_count": 21, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 20, + "watchers": 21, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-4367.json b/2024/CVE-2024-4367.json index 3bc2a35b54..47953a1d29 100644 --- a/2024/CVE-2024-4367.json +++ b/2024/CVE-2024-4367.json @@ -185,10 +185,10 @@ "description": "PDF.js是由Mozilla维护的基于JavaScript的PDF查看器。此漏洞允许攻击者在打开恶意 PDF 文件后立即执行任意 JavaScript 代码。这会影响所有 Firefox 用户 (<126),因为 Firefox 使用 PDF.js 来显示 PDF 文件,但也严重影响了许多基于 Web 和 Electron 的应用程序,这些应用程序(间接)使用 PDF.js 进行预览功能。", "fork": false, "created_at": "2024-06-13T15:14:47Z", - "updated_at": "2024-11-04T10:45:50Z", + "updated_at": "2024-12-01T16:03:04Z", "pushed_at": "2024-06-13T15:19:57Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -197,7 +197,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 9, + "watchers": 10, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-44083.json b/2024/CVE-2024-44083.json index ee45265b92..581b5cb774 100644 --- a/2024/CVE-2024-44083.json +++ b/2024/CVE-2024-44083.json @@ -14,10 +14,10 @@ "description": "Makes IDA (most versions) to crash upon opening it. ", "fork": false, "created_at": "2024-08-25T12:33:14Z", - "updated_at": "2024-11-30T16:47:45Z", + "updated_at": "2024-12-01T16:41:12Z", "pushed_at": "2024-08-30T09:58:12Z", - "stargazers_count": 68, - "watchers_count": 68, + "stargazers_count": 69, + "watchers_count": 69, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 68, + "watchers": 69, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-48359.json b/2024/CVE-2024-48359.json index 24fcbebba3..e038d54145 100644 --- a/2024/CVE-2024-48359.json +++ b/2024/CVE-2024-48359.json @@ -14,10 +14,10 @@ "description": "CVE-2024-48359 PoC", "fork": false, "created_at": "2024-10-30T14:52:04Z", - "updated_at": "2024-11-12T08:54:14Z", + "updated_at": "2024-12-01T16:09:54Z", "pushed_at": "2024-10-30T15:02:47Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-48990.json b/2024/CVE-2024-48990.json index 166c0184f9..dfa212a1f0 100644 --- a/2024/CVE-2024-48990.json +++ b/2024/CVE-2024-48990.json @@ -154,37 +154,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 893500783, - "name": "CVE-2024-48990-exploit", - "full_name": "r0xdeadbeef\/CVE-2024-48990-exploit", - "owner": { - "login": "r0xdeadbeef", - "id": 65211256, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65211256?v=4", - "html_url": "https:\/\/github.com\/r0xdeadbeef", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/r0xdeadbeef\/CVE-2024-48990-exploit", - "description": "Needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable.", - "fork": false, - "created_at": "2024-11-24T15:57:45Z", - "updated_at": "2024-11-29T05:10:42Z", - "pushed_at": "2024-11-24T17:47:02Z", - "stargazers_count": 1, - "watchers_count": 1, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 1, - "score": 0, - "subscribers_count": 1 - }, { "id": 893561658, "name": "needrestart-vulnerability-poc", @@ -252,5 +221,36 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 896921908, + "name": "CVE-2024-48990-exploit", + "full_name": "r0xdeadbeef\/CVE-2024-48990-exploit", + "owner": { + "login": "r0xdeadbeef", + "id": 65211256, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65211256?v=4", + "html_url": "https:\/\/github.com\/r0xdeadbeef", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/r0xdeadbeef\/CVE-2024-48990-exploit", + "description": "Needrestart, prior to version 3.8, contains a vulnerability that allows local attackers to execute arbitrary code with root privileges. This is achieved by manipulating the PYTHONPATH environment variable to trick needrestart into running the Python interpreter in an unsafe context.", + "fork": false, + "created_at": "2024-12-01T16:26:44Z", + "updated_at": "2024-12-01T16:27:50Z", + "pushed_at": "2024-12-01T16:27:46Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index f100e59f45..7c0c0085fb 100644 --- a/README.md +++ b/README.md @@ -2141,6 +2141,7 @@ - [julesbsz/CVE-2024-10924](https://github.com/julesbsz/CVE-2024-10924) - [Trackflaw/CVE-2024-10924-Wordpress-Docker](https://github.com/Trackflaw/CVE-2024-10924-Wordpress-Docker) - [Maalfer/CVE-2024-10924-PoC](https://github.com/Maalfer/CVE-2024-10924-PoC) +- [D1se0/CVE-2024-10924-Bypass-MFA-Wordpress-LAB](https://github.com/D1se0/CVE-2024-10924-Bypass-MFA-Wordpress-LAB) ### CVE-2024-10958 (2024-11-10) @@ -2180,6 +2181,13 @@ - [xthalach/CVE-2024-11318](https://github.com/xthalach/CVE-2024-11318) +### CVE-2024-11320 (2024-11-21) + +Arbitrary commands execution on the server by exploiting a command injection vulnerability in the LDAP authentication mechanism. This issue affects Pandora FMS: from 700 through <=777.4 + + +- [mhaskar/CVE-2024-11320](https://github.com/mhaskar/CVE-2024-11320) + ### CVE-2024-11381 (2024-11-22) The Control horas plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ch_registro' shortcode in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. @@ -2752,6 +2760,13 @@ - [zunak/CVE-2024-22641](https://github.com/zunak/CVE-2024-22641) +### CVE-2024-22734 (2024-04-12) + +An issue was discovered in AMCS Group Trux Waste Management Software before version 7.19.0018.26912, allows local attackers to obtain sensitive information via a static, hard-coded AES Key-IV pair in the TxUtilities.dll and TruxUser.cfg components. + + +- [securekomodo/CVE-2024-22734](https://github.com/securekomodo/CVE-2024-22734) + ### CVE-2024-22752 (2024-03-07) Insecure permissions issue in EaseUS MobiMover 6.0.5 Build 21620 allows attackers to gain escalated privileges via use of crafted executable launched from the application installation directory. @@ -6711,9 +6726,9 @@ - [felmoltor/CVE-2024-48990](https://github.com/felmoltor/CVE-2024-48990) - [Cyb3rFr0g/CVE-2024-48990-PoC](https://github.com/Cyb3rFr0g/CVE-2024-48990-PoC) - [pentestfunctions/CVE-2024-48990-PoC-Testing](https://github.com/pentestfunctions/CVE-2024-48990-PoC-Testing) -- [r0xdeadbeef/CVE-2024-48990-exploit](https://github.com/r0xdeadbeef/CVE-2024-48990-exploit) - [njeru-codes/needrestart-vulnerability-poc](https://github.com/njeru-codes/needrestart-vulnerability-poc) - [ally-petitt/CVE-2024-48990-Exploit](https://github.com/ally-petitt/CVE-2024-48990-Exploit) +- [r0xdeadbeef/CVE-2024-48990-exploit](https://github.com/r0xdeadbeef/CVE-2024-48990-exploit) ### CVE-2024-49039 (2024-11-12) @@ -10389,6 +10404,13 @@ - [spotlightishere/inputcontrol](https://github.com/spotlightishere/inputcontrol) +### CVE-2023-28205 (2023-04-10) + +A use after free issue was addressed with improved memory management. This issue is fixed in Safari 16.4.1, iOS 15.7.5 and iPadOS 15.7.5, iOS 16.4.1 and iPadOS 16.4.1, macOS Ventura 13.3.1. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. + + +- [ntfargo/uaf-2023-28205](https://github.com/ntfargo/uaf-2023-28205) + ### CVE-2023-28206 (2023-04-10) An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in macOS Monterey 12.6.5, iOS 16.4.1 and iPadOS 16.4.1, macOS Ventura 13.3.1, iOS 15.7.5 and iPadOS 15.7.5, macOS Big Sur 11.7.6. An app may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.