diff --git a/2016/CVE-2016-9920.json b/2016/CVE-2016-9920.json index 892d2e47da..3cfb4807fc 100644 --- a/2016/CVE-2016-9920.json +++ b/2016/CVE-2016-9920.json @@ -14,10 +14,10 @@ "description": "Roundcube 1.0.0 <= 1.2.2 Remote Code Execution exploit and vulnerable container", "fork": false, "created_at": "2017-01-06T17:55:44Z", - "updated_at": "2024-12-06T23:57:25Z", + "updated_at": "2024-12-20T18:58:48Z", "pushed_at": "2024-04-20T07:38:14Z", - "stargazers_count": 44, - "watchers_count": 44, + "stargazers_count": 45, + "watchers_count": 45, "has_discussions": false, "forks_count": 21, "allow_forking": true, @@ -33,7 +33,7 @@ ], "visibility": "public", "forks": 21, - "watchers": 44, + "watchers": 45, "score": 0, "subscribers_count": 1 } diff --git a/2017/CVE-2017-11317.json b/2017/CVE-2017-11317.json index be9d160e71..6b87c1bf48 100644 --- a/2017/CVE-2017-11317.json +++ b/2017/CVE-2017-11317.json @@ -14,10 +14,10 @@ "description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)", "fork": false, "created_at": "2018-01-09T13:53:57Z", - "updated_at": "2024-12-02T10:37:56Z", + "updated_at": "2024-12-20T18:58:54Z", "pushed_at": "2020-08-22T06:15:54Z", - "stargazers_count": 170, - "watchers_count": 170, + "stargazers_count": 171, + "watchers_count": 171, "has_discussions": false, "forks_count": 48, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 48, - "watchers": 170, + "watchers": 171, "score": 0, "subscribers_count": 9 }, diff --git a/2018/CVE-2018-7600.json b/2018/CVE-2018-7600.json index ed96abbf9b..2f1a14575d 100644 --- a/2018/CVE-2018-7600.json +++ b/2018/CVE-2018-7600.json @@ -83,10 +83,10 @@ "description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)", "fork": false, "created_at": "2018-04-12T22:53:14Z", - "updated_at": "2024-12-19T05:22:03Z", + "updated_at": "2024-12-20T22:43:48Z", "pushed_at": "2021-01-08T10:31:22Z", - "stargazers_count": 582, - "watchers_count": 582, + "stargazers_count": 583, + "watchers_count": 583, "has_discussions": false, "forks_count": 173, "allow_forking": true, @@ -105,7 +105,7 @@ ], "visibility": "public", "forks": 173, - "watchers": 582, + "watchers": 583, "score": 0, "subscribers_count": 23 }, diff --git a/2019/CVE-2019-18935.json b/2019/CVE-2019-18935.json index 035fbe862e..e30db6cee4 100644 --- a/2019/CVE-2019-18935.json +++ b/2019/CVE-2019-18935.json @@ -14,10 +14,10 @@ "description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)", "fork": false, "created_at": "2018-01-09T13:53:57Z", - "updated_at": "2024-12-02T10:37:56Z", + "updated_at": "2024-12-20T18:58:54Z", "pushed_at": "2020-08-22T06:15:54Z", - "stargazers_count": 170, - "watchers_count": 170, + "stargazers_count": 171, + "watchers_count": 171, "has_discussions": false, "forks_count": 48, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 48, - "watchers": 170, + "watchers": 171, "score": 0, "subscribers_count": 9 }, diff --git a/2019/CVE-2019-9053.json b/2019/CVE-2019-9053.json index 9679bc7c32..0f541beb04 100644 --- a/2019/CVE-2019-9053.json +++ b/2019/CVE-2019-9053.json @@ -231,10 +231,10 @@ "description": "The exploit is edited to work with different text encodings and Python 3 and is compatible with CMSMS version 2.2.9 and below.", "fork": false, "created_at": "2023-05-29T17:59:09Z", - "updated_at": "2024-12-19T23:00:23Z", + "updated_at": "2024-12-20T19:26:42Z", "pushed_at": "2024-06-09T12:39:47Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -243,7 +243,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 }, diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 1b98b275d9..8616b3399c 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -49,7 +49,7 @@ "forks": 340, "watchers": 2013, "score": 0, - "subscribers_count": 37 + "subscribers_count": 38 }, { "id": 234696172, diff --git a/2022/CVE-2022-32981.json b/2022/CVE-2022-32981.json index be1c352bb0..ee130ffa7a 100644 --- a/2022/CVE-2022-32981.json +++ b/2022/CVE-2022-32981.json @@ -14,8 +14,8 @@ "description": "poc for CVE-2022-32981 under work", "fork": false, "created_at": "2024-12-19T21:15:39Z", - "updated_at": "2024-12-20T00:34:36Z", - "pushed_at": "2024-12-20T00:34:33Z", + "updated_at": "2024-12-20T20:37:02Z", + "pushed_at": "2024-12-20T20:36:58Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-38691.json b/2022/CVE-2022-38691.json index 18b4ae345d..733342300f 100644 --- a/2022/CVE-2022-38691.json +++ b/2022/CVE-2022-38691.json @@ -14,10 +14,10 @@ "description": "Let's control Secure Boot Chain ourselves.", "fork": false, "created_at": "2023-12-01T07:32:18Z", - "updated_at": "2024-12-18T20:35:42Z", + "updated_at": "2024-12-20T22:49:27Z", "pushed_at": "2024-02-20T09:05:59Z", - "stargazers_count": 44, - "watchers_count": 44, + "stargazers_count": 45, + "watchers_count": 45, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 10, - "watchers": 44, + "watchers": 45, "score": 0, "subscribers_count": 5 } diff --git a/2023/CVE-2023-38408.json b/2023/CVE-2023-38408.json index 1349d2689f..b6eadd0f2b 100644 --- a/2023/CVE-2023-38408.json +++ b/2023/CVE-2023-38408.json @@ -113,8 +113,8 @@ "description": null, "fork": false, "created_at": "2024-02-16T18:20:12Z", - "updated_at": "2024-11-01T05:17:51Z", - "pushed_at": "2024-11-01T05:17:47Z", + "updated_at": "2024-12-20T21:09:11Z", + "pushed_at": "2024-12-20T21:09:07Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2023/CVE-2023-38709.json b/2023/CVE-2023-38709.json index 6093a655ed..9455795c46 100644 --- a/2023/CVE-2023-38709.json +++ b/2023/CVE-2023-38709.json @@ -14,10 +14,10 @@ "description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709", "fork": false, "created_at": "2024-10-05T20:32:45Z", - "updated_at": "2024-12-20T11:47:04Z", + "updated_at": "2024-12-20T19:04:31Z", "pushed_at": "2024-10-05T20:37:02Z", - "stargazers_count": 44, - "watchers_count": 44, + "stargazers_count": 45, + "watchers_count": 45, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -37,7 +37,7 @@ ], "visibility": "public", "forks": 8, - "watchers": 44, + "watchers": 45, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-40028.json b/2023/CVE-2023-40028.json index 8854e9462d..3e20ace544 100644 --- a/2023/CVE-2023-40028.json +++ b/2023/CVE-2023-40028.json @@ -19,13 +19,13 @@ "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 3, + "forks": 4, "watchers": 2, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-0044.json b/2024/CVE-2024-0044.json index 3d895cdb9e..423418f91b 100644 --- a/2024/CVE-2024-0044.json +++ b/2024/CVE-2024-0044.json @@ -45,10 +45,10 @@ "description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13", "fork": false, "created_at": "2024-06-18T12:30:53Z", - "updated_at": "2024-12-09T15:35:29Z", + "updated_at": "2024-12-20T20:01:23Z", "pushed_at": "2024-12-02T06:29:52Z", - "stargazers_count": 264, - "watchers_count": 264, + "stargazers_count": 263, + "watchers_count": 263, "has_discussions": false, "forks_count": 61, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 61, - "watchers": 264, + "watchers": 263, "score": 0, "subscribers_count": 7 }, diff --git a/2024/CVE-2024-38472.json b/2024/CVE-2024-38472.json index 5b392f6ef1..723e54843b 100644 --- a/2024/CVE-2024-38472.json +++ b/2024/CVE-2024-38472.json @@ -45,10 +45,10 @@ "description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709", "fork": false, "created_at": "2024-10-05T20:32:45Z", - "updated_at": "2024-12-20T11:47:04Z", + "updated_at": "2024-12-20T19:04:31Z", "pushed_at": "2024-10-05T20:37:02Z", - "stargazers_count": 44, - "watchers_count": 44, + "stargazers_count": 45, + "watchers_count": 45, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -68,7 +68,7 @@ ], "visibility": "public", "forks": 8, - "watchers": 44, + "watchers": 45, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-45519.json b/2024/CVE-2024-45519.json index 9491791800..673be1ad92 100644 --- a/2024/CVE-2024-45519.json +++ b/2024/CVE-2024-45519.json @@ -45,10 +45,10 @@ "description": "Zimbra - Remote Command Execution (CVE-2024-45519)", "fork": false, "created_at": "2024-10-05T00:15:18Z", - "updated_at": "2024-12-06T23:50:56Z", + "updated_at": "2024-12-20T20:40:56Z", "pushed_at": "2024-11-05T10:10:40Z", - "stargazers_count": 114, - "watchers_count": 114, + "stargazers_count": 115, + "watchers_count": 115, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 114, + "watchers": 115, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-50379.json b/2024/CVE-2024-50379.json index eacf661355..219596b48e 100644 --- a/2024/CVE-2024-50379.json +++ b/2024/CVE-2024-50379.json @@ -91,5 +91,36 @@ "watchers": 4, "score": 0, "subscribers_count": 0 + }, + { + "id": 906416890, + "name": "CVE-2024-50379", + "full_name": "Alchemist3dot14\/CVE-2024-50379", + "owner": { + "login": "Alchemist3dot14", + "id": 63059909, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63059909?v=4", + "html_url": "https:\/\/github.com\/Alchemist3dot14", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/Alchemist3dot14\/CVE-2024-50379", + "description": "CVE-2024-50379 is a critical vulnerability affecting multiple versions of Apache Tomcat, an open source web server and servlet container widely used for deploying Java-based web applications. The vulnerability arises from a Time-of-Use (TOCTOU) race condition that occurs when compiling JavaServer Pages (JSPs).", + "fork": false, + "created_at": "2024-12-20T21:30:49Z", + "updated_at": "2024-12-20T21:55:35Z", + "pushed_at": "2024-12-20T21:55:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-50944.json b/2024/CVE-2024-50944.json index a9122378a2..7b4db3664e 100644 --- a/2024/CVE-2024-50944.json +++ b/2024/CVE-2024-50944.json @@ -14,8 +14,8 @@ "description": "Integer Overflow in Cart Logic in SimplCommerce allows remote attackers to manipulate product quantities and total prices via crafted inputs that exploit insufficient validation of the quantity parameter.", "fork": false, "created_at": "2024-12-19T23:33:21Z", - "updated_at": "2024-12-20T00:29:43Z", - "pushed_at": "2024-12-20T00:29:22Z", + "updated_at": "2024-12-20T21:17:39Z", + "pushed_at": "2024-12-20T21:17:36Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-50945.json b/2024/CVE-2024-50945.json index 677431e2c1..495e100b4a 100644 --- a/2024/CVE-2024-50945.json +++ b/2024/CVE-2024-50945.json @@ -14,8 +14,8 @@ "description": "SimplCommerce is affected by a broken access control vulnerability in the review system, allowing unauthorized users to post reviews for products they have not purchased.", "fork": false, "created_at": "2024-12-20T00:43:18Z", - "updated_at": "2024-12-20T00:47:15Z", - "pushed_at": "2024-12-20T00:47:12Z", + "updated_at": "2024-12-20T21:18:15Z", + "pushed_at": "2024-12-20T21:18:11Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-53375.json b/2024/CVE-2024-53375.json index 23f4c8dc0f..68702d3169 100644 --- a/2024/CVE-2024-53375.json +++ b/2024/CVE-2024-53375.json @@ -14,10 +14,10 @@ "description": "TP-Link Archer AXE75 Authenticated Command Injection", "fork": false, "created_at": "2024-10-04T12:49:19Z", - "updated_at": "2024-12-20T07:46:46Z", + "updated_at": "2024-12-21T00:23:39Z", "pushed_at": "2024-12-19T09:34:33Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-53476.json b/2024/CVE-2024-53476.json index f92787fc29..80ae71ce4c 100644 --- a/2024/CVE-2024-53476.json +++ b/2024/CVE-2024-53476.json @@ -14,8 +14,8 @@ "description": "SimplCommerce is affected by a race condition vulnerability in the checkout logic, allowing multiple users to purchase more products than are in stock via simultaneous checkout requests.", "fork": false, "created_at": "2024-12-20T00:27:22Z", - "updated_at": "2024-12-20T00:42:44Z", - "pushed_at": "2024-12-20T00:42:40Z", + "updated_at": "2024-12-20T21:18:00Z", + "pushed_at": "2024-12-20T21:17:57Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-53677.json b/2024/CVE-2024-53677.json index c3480099e7..b5b1acf295 100644 --- a/2024/CVE-2024-53677.json +++ b/2024/CVE-2024-53677.json @@ -45,10 +45,10 @@ "description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.", "fork": false, "created_at": "2024-12-13T17:42:55Z", - "updated_at": "2024-12-20T10:05:19Z", + "updated_at": "2024-12-21T00:26:13Z", "pushed_at": "2024-12-20T10:05:15Z", - "stargazers_count": 63, - "watchers_count": 63, + "stargazers_count": 64, + "watchers_count": 64, "has_discussions": false, "forks_count": 27, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 27, - "watchers": 63, + "watchers": 64, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-56145.json b/2024/CVE-2024-56145.json index 7b91c9368e..b449c26cf9 100644 --- a/2024/CVE-2024-56145.json +++ b/2024/CVE-2024-56145.json @@ -14,19 +14,19 @@ "description": "Unauthenticated RCE on CraftCMS when PHP `register_argc_argv` config setting is enabled", "fork": false, "created_at": "2024-12-20T03:34:01Z", - "updated_at": "2024-12-20T16:05:03Z", + "updated_at": "2024-12-20T21:18:42Z", "pushed_at": "2024-12-20T04:26:44Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 13, + "watchers_count": 13, "has_discussions": false, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 3, - "watchers": 10, + "forks": 4, + "watchers": 13, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-8672.json b/2024/CVE-2024-8672.json index 9d35034256..2acd7c7b7c 100644 --- a/2024/CVE-2024-8672.json +++ b/2024/CVE-2024-8672.json @@ -14,10 +14,10 @@ "description": "Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution", "fork": false, "created_at": "2024-12-02T19:59:31Z", - "updated_at": "2024-12-09T04:10:06Z", + "updated_at": "2024-12-20T20:39:53Z", "pushed_at": "2024-12-02T20:00:09Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 10, + "watchers": 11, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-9474.json b/2024/CVE-2024-9474.json index 4d62dcf4b4..d83b5748e7 100644 --- a/2024/CVE-2024-9474.json +++ b/2024/CVE-2024-9474.json @@ -14,10 +14,10 @@ "description": "PAN-OS auth bypass + RCE", "fork": false, "created_at": "2024-11-19T17:26:27Z", - "updated_at": "2024-12-06T10:25:57Z", + "updated_at": "2024-12-20T20:40:35Z", "pushed_at": "2024-11-19T17:38:29Z", - "stargazers_count": 38, - "watchers_count": 38, + "stargazers_count": 39, + "watchers_count": 39, "has_discussions": false, "forks_count": 19, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 19, - "watchers": 38, + "watchers": 39, "score": 0, "subscribers_count": 1 }, diff --git a/README.md b/README.md index a30ecc3590..8f84e9a069 100644 --- a/README.md +++ b/README.md @@ -7090,6 +7090,7 @@ - [yiliufeng168/CVE-2024-50379-POC](https://github.com/yiliufeng168/CVE-2024-50379-POC) - [JFOZ1010/Nuclei-Template-CVE-2024-50379](https://github.com/JFOZ1010/Nuclei-Template-CVE-2024-50379) - [iSee857/CVE-2024-50379-PoC](https://github.com/iSee857/CVE-2024-50379-PoC) +- [Alchemist3dot14/CVE-2024-50379](https://github.com/Alchemist3dot14/CVE-2024-50379) ### CVE-2024-50395 (2024-11-22)