From 5650dcebd4fa759b14fe6b0ffbaa9ee98580a63c Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Sun, 23 Jun 2024 21:29:09 +0900 Subject: [PATCH] Auto Update 2024/06/23 12:29:09 --- 2014/CVE-2014-3566.json | 8 ++++---- 2019/CVE-2019-0708.json | 8 ++++---- 2019/CVE-2019-0841.json | 8 ++++---- 2019/CVE-2019-1253.json | 8 ++++---- 2019/CVE-2019-1388.json | 8 ++++---- 2019/CVE-2019-1405.json | 8 ++++---- 2020/CVE-2020-0683.json | 8 ++++---- 2021/CVE-2021-4045.json | 4 ++-- 2021/CVE-2021-44228.json | 8 ++++---- 2021/CVE-2021-45232.json | 8 ++++---- 2022/CVE-2022-38694.json | 8 ++++---- 2023/CVE-2023-21823.json | 8 ++++---- 2023/CVE-2023-38831.json | 8 ++++---- 2023/CVE-2023-38836.json | 4 ++-- 2024/CVE-2024-0044.json | 20 ++++++++++---------- 2024/CVE-2024-21338.json | 12 ++++++------ 2024/CVE-2024-26229.json | 16 ++++++++-------- 2024/CVE-2024-27956.json | 8 ++++---- 2024/CVE-2024-28397.json | 8 ++++---- 2024/CVE-2024-28999.json | 8 ++++---- 2024/CVE-2024-29973.json | 4 ++-- 2024/CVE-2024-31982.json | 8 ++++---- 2024/CVE-2024-32002.json | 38 ++++---------------------------------- 2024/CVE-2024-3400.json | 30 ++++++++++++++++++++++++++++++ 2024/CVE-2024-34312.json | 35 +++++++++++++++++++++++++++++++++++ 2024/CVE-2024-34313.json | 35 +++++++++++++++++++++++++++++++++++ 2024/CVE-2024-4367.json | 4 ++-- 2024/CVE-2024-4577.json | 16 ++++++++-------- README.md | 8 +++++++- 29 files changed, 215 insertions(+), 139 deletions(-) create mode 100644 2024/CVE-2024-34312.json create mode 100644 2024/CVE-2024-34313.json diff --git a/2014/CVE-2014-3566.json b/2014/CVE-2014-3566.json index d4d0db28b9..a74862d278 100644 --- a/2014/CVE-2014-3566.json +++ b/2014/CVE-2014-3566.json @@ -107,10 +107,10 @@ "description": ":poodle: Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566 :poodle:", "fork": false, "created_at": "2015-02-03T20:28:27Z", - "updated_at": "2024-05-07T08:37:52Z", + "updated_at": "2024-06-23T06:48:47Z", "pushed_at": "2023-10-06T16:11:26Z", - "stargazers_count": 243, - "watchers_count": 243, + "stargazers_count": 244, + "watchers_count": 244, "has_discussions": false, "forks_count": 74, "allow_forking": true, @@ -127,7 +127,7 @@ ], "visibility": "public", "forks": 74, - "watchers": 243, + "watchers": 244, "score": 0, "subscribers_count": 17 }, diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index be3ce14f21..e3772a67d0 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -3017,10 +3017,10 @@ "description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell", "fork": false, "created_at": "2020-01-21T02:22:29Z", - "updated_at": "2024-05-20T02:25:56Z", + "updated_at": "2024-06-23T06:19:10Z", "pushed_at": "2020-01-21T03:15:41Z", - "stargazers_count": 323, - "watchers_count": 323, + "stargazers_count": 322, + "watchers_count": 322, "has_discussions": false, "forks_count": 69, "allow_forking": true, @@ -3029,7 +3029,7 @@ "topics": [], "visibility": "public", "forks": 69, - "watchers": 323, + "watchers": 322, "score": 0, "subscribers_count": 6 }, diff --git a/2019/CVE-2019-0841.json b/2019/CVE-2019-0841.json index 5901e5d7a2..93b7898e17 100644 --- a/2019/CVE-2019-0841.json +++ b/2019/CVE-2019-0841.json @@ -13,10 +13,10 @@ "description": "PoC code for CVE-2019-0841 Privilege Escalation vulnerability", "fork": false, "created_at": "2019-04-05T12:53:52Z", - "updated_at": "2023-12-28T06:38:20Z", + "updated_at": "2024-06-23T09:32:01Z", "pushed_at": "2019-04-09T16:49:19Z", - "stargazers_count": 242, - "watchers_count": 242, + "stargazers_count": 243, + "watchers_count": 243, "has_discussions": false, "forks_count": 99, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 99, - "watchers": 242, + "watchers": 243, "score": 0, "subscribers_count": 4 }, diff --git a/2019/CVE-2019-1253.json b/2019/CVE-2019-1253.json index 95f2238bae..c2714889e1 100644 --- a/2019/CVE-2019-1253.json +++ b/2019/CVE-2019-1253.json @@ -73,10 +73,10 @@ "description": "Poc for CVE-2019-1253", "fork": false, "created_at": "2019-09-11T20:40:15Z", - "updated_at": "2023-09-28T11:06:07Z", + "updated_at": "2024-06-23T10:15:35Z", "pushed_at": "2021-12-23T16:29:43Z", - "stargazers_count": 154, - "watchers_count": 154, + "stargazers_count": 155, + "watchers_count": 155, "has_discussions": false, "forks_count": 41, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 41, - "watchers": 154, + "watchers": 155, "score": 0, "subscribers_count": 6 }, diff --git a/2019/CVE-2019-1388.json b/2019/CVE-2019-1388.json index eb35c89f1f..5357601744 100644 --- a/2019/CVE-2019-1388.json +++ b/2019/CVE-2019-1388.json @@ -13,10 +13,10 @@ "description": "CVE-2019-1388 UAC提权 (nt authority\\system)", "fork": false, "created_at": "2019-11-21T06:26:27Z", - "updated_at": "2024-05-15T17:23:05Z", + "updated_at": "2024-06-23T12:02:31Z", "pushed_at": "2019-11-21T09:27:59Z", - "stargazers_count": 183, - "watchers_count": 183, + "stargazers_count": 184, + "watchers_count": 184, "has_discussions": false, "forks_count": 56, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 56, - "watchers": 183, + "watchers": 184, "score": 0, "subscribers_count": 4 }, diff --git a/2019/CVE-2019-1405.json b/2019/CVE-2019-1405.json index ce8a52cc11..e90f3e74bc 100644 --- a/2019/CVE-2019-1405.json +++ b/2019/CVE-2019-1405.json @@ -13,10 +13,10 @@ "description": "Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322", "fork": false, "created_at": "2019-11-13T16:34:03Z", - "updated_at": "2024-05-20T16:39:56Z", + "updated_at": "2024-06-23T12:05:47Z", "pushed_at": "2019-11-14T14:16:54Z", - "stargazers_count": 348, - "watchers_count": 348, + "stargazers_count": 349, + "watchers_count": 349, "has_discussions": false, "forks_count": 81, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 81, - "watchers": 348, + "watchers": 349, "score": 0, "subscribers_count": 12 } diff --git a/2020/CVE-2020-0683.json b/2020/CVE-2020-0683.json index 63f3d55b0e..9b58b94f0d 100644 --- a/2020/CVE-2020-0683.json +++ b/2020/CVE-2020-0683.json @@ -13,10 +13,10 @@ "description": "CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege", "fork": false, "created_at": "2020-02-11T16:42:34Z", - "updated_at": "2024-05-14T11:49:59Z", + "updated_at": "2024-06-23T09:35:40Z", "pushed_at": "2021-12-23T16:28:28Z", - "stargazers_count": 338, - "watchers_count": 338, + "stargazers_count": 339, + "watchers_count": 339, "has_discussions": false, "forks_count": 58, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 58, - "watchers": 338, + "watchers": 339, "score": 0, "subscribers_count": 9 } diff --git a/2021/CVE-2021-4045.json b/2021/CVE-2021-4045.json index 349ad321ce..e19d6adf5f 100644 --- a/2021/CVE-2021-4045.json +++ b/2021/CVE-2021-4045.json @@ -84,7 +84,7 @@ "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -94,7 +94,7 @@ "iot" ], "visibility": "public", - "forks": 1, + "forks": 2, "watchers": 3, "score": 0, "subscribers_count": 1 diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index fd2f0a3a5c..0d420c347e 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -857,10 +857,10 @@ "description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks", "fork": false, "created_at": "2021-12-10T22:35:00Z", - "updated_at": "2024-06-22T19:33:10Z", + "updated_at": "2024-06-23T06:30:14Z", "pushed_at": "2022-01-15T16:18:44Z", - "stargazers_count": 929, - "watchers_count": 929, + "stargazers_count": 930, + "watchers_count": 930, "has_discussions": false, "forks_count": 143, "allow_forking": true, @@ -889,7 +889,7 @@ ], "visibility": "public", "forks": 143, - "watchers": 929, + "watchers": 930, "score": 0, "subscribers_count": 25 }, diff --git a/2021/CVE-2021-45232.json b/2021/CVE-2021-45232.json index 9ba5017999..9ac3f00eea 100644 --- a/2021/CVE-2021-45232.json +++ b/2021/CVE-2021-45232.json @@ -163,10 +163,10 @@ "description": null, "fork": false, "created_at": "2021-12-29T07:32:30Z", - "updated_at": "2024-05-21T08:49:06Z", + "updated_at": "2024-06-23T08:38:08Z", "pushed_at": "2021-12-31T08:30:33Z", - "stargazers_count": 78, - "watchers_count": 78, + "stargazers_count": 79, + "watchers_count": 79, "has_discussions": false, "forks_count": 31, "allow_forking": true, @@ -178,7 +178,7 @@ ], "visibility": "public", "forks": 31, - "watchers": 78, + "watchers": 79, "score": 0, "subscribers_count": 3 }, diff --git a/2022/CVE-2022-38694.json b/2022/CVE-2022-38694.json index 379b7fa7c2..4f7d4e965d 100644 --- a/2022/CVE-2022-38694.json +++ b/2022/CVE-2022-38694.json @@ -13,10 +13,10 @@ "description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692", "fork": false, "created_at": "2023-06-10T08:31:26Z", - "updated_at": "2024-06-21T23:57:20Z", + "updated_at": "2024-06-23T09:18:40Z", "pushed_at": "2024-04-05T06:46:47Z", - "stargazers_count": 228, - "watchers_count": 228, + "stargazers_count": 229, + "watchers_count": 229, "has_discussions": true, "forks_count": 32, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 32, - "watchers": 228, + "watchers": 229, "score": 0, "subscribers_count": 6 } diff --git a/2023/CVE-2023-21823.json b/2023/CVE-2023-21823.json index 2bce99c4c6..136176ea10 100644 --- a/2023/CVE-2023-21823.json +++ b/2023/CVE-2023-21823.json @@ -13,10 +13,10 @@ "description": " CVE-2023-21823 PoC", "fork": false, "created_at": "2023-04-20T11:26:48Z", - "updated_at": "2024-01-31T06:54:40Z", + "updated_at": "2024-06-23T10:25:02Z", "pushed_at": "2023-04-20T11:36:55Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 12, + "watchers": 13, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-38831.json b/2023/CVE-2023-38831.json index 7ec1b3893b..f6359ed349 100644 --- a/2023/CVE-2023-38831.json +++ b/2023/CVE-2023-38831.json @@ -107,10 +107,10 @@ "description": "一款用于生成winrar程序RCE(即cve-2023-38831)的POC的工具。", "fork": false, "created_at": "2023-08-27T14:08:36Z", - "updated_at": "2024-06-20T08:10:00Z", + "updated_at": "2024-06-23T07:47:12Z", "pushed_at": "2023-08-27T14:35:00Z", - "stargazers_count": 107, - "watchers_count": 107, + "stargazers_count": 108, + "watchers_count": 108, "has_discussions": false, "forks_count": 22, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 22, - "watchers": 107, + "watchers": 108, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-38836.json b/2023/CVE-2023-38836.json index 744f71a53f..a3c9f60ec0 100644 --- a/2023/CVE-2023-38836.json +++ b/2023/CVE-2023-38836.json @@ -13,8 +13,8 @@ "description": "Exploit for file upload vulnerability in BoidCMS version <=2.0.0", "fork": false, "created_at": "2023-08-16T14:30:30Z", - "updated_at": "2024-01-22T17:53:30Z", - "pushed_at": "2023-09-06T05:59:05Z", + "updated_at": "2024-06-23T10:35:19Z", + "pushed_at": "2024-06-23T10:35:16Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, diff --git a/2024/CVE-2024-0044.json b/2024/CVE-2024-0044.json index 52a32e7414..e434365dec 100644 --- a/2024/CVE-2024-0044.json +++ b/2024/CVE-2024-0044.json @@ -13,10 +13,10 @@ "description": "Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely", "fork": false, "created_at": "2024-06-18T09:22:59Z", - "updated_at": "2024-06-21T13:48:41Z", + "updated_at": "2024-06-23T08:21:25Z", "pushed_at": "2024-06-18T09:35:44Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 11, + "watchers": 12, "score": 0, "subscribers_count": 1 }, @@ -43,19 +43,19 @@ "description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13", "fork": false, "created_at": "2024-06-18T12:30:53Z", - "updated_at": "2024-06-23T05:36:00Z", + "updated_at": "2024-06-23T07:39:36Z", "pushed_at": "2024-06-19T12:24:50Z", - "stargazers_count": 48, - "watchers_count": 48, + "stargazers_count": 51, + "watchers_count": 51, "has_discussions": false, - "forks_count": 7, + "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 7, - "watchers": 48, + "forks": 8, + "watchers": 51, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-21338.json b/2024/CVE-2024-21338.json index b534ee755a..d72173f8c9 100644 --- a/2024/CVE-2024-21338.json +++ b/2024/CVE-2024-21338.json @@ -133,19 +133,19 @@ "description": null, "fork": false, "created_at": "2024-06-23T06:03:44Z", - "updated_at": "2024-06-23T06:09:13Z", + "updated_at": "2024-06-23T10:34:14Z", "pushed_at": "2024-06-23T06:09:10Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, - "forks_count": 0, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, - "watchers": 0, + "forks": 3, + "watchers": 9, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-26229.json b/2024/CVE-2024-26229.json index 1c8b7cf86f..9951f758dc 100644 --- a/2024/CVE-2024-26229.json +++ b/2024/CVE-2024-26229.json @@ -13,10 +13,10 @@ "description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code", "fork": false, "created_at": "2024-06-10T17:02:03Z", - "updated_at": "2024-06-22T18:03:47Z", + "updated_at": "2024-06-23T09:05:50Z", "pushed_at": "2024-06-17T19:46:27Z", - "stargazers_count": 240, - "watchers_count": 240, + "stargazers_count": 241, + "watchers_count": 241, "has_discussions": false, "forks_count": 49, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 49, - "watchers": 240, + "watchers": 241, "score": 0, "subscribers_count": 2 }, @@ -73,10 +73,10 @@ "description": "BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel", "fork": false, "created_at": "2024-06-12T11:11:16Z", - "updated_at": "2024-06-22T11:46:19Z", + "updated_at": "2024-06-23T09:11:09Z", "pushed_at": "2024-06-13T07:30:48Z", - "stargazers_count": 198, - "watchers_count": 198, + "stargazers_count": 200, + "watchers_count": 200, "has_discussions": false, "forks_count": 22, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 22, - "watchers": 198, + "watchers": 200, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-27956.json b/2024/CVE-2024-27956.json index 587ec5cbaf..ca4504cb39 100644 --- a/2024/CVE-2024-27956.json +++ b/2024/CVE-2024-27956.json @@ -43,10 +43,10 @@ "description": "PoC for SQL Injection in CVE-2024-27956", "fork": false, "created_at": "2024-05-01T01:58:28Z", - "updated_at": "2024-06-17T17:32:31Z", + "updated_at": "2024-06-23T08:43:17Z", "pushed_at": "2024-05-03T11:28:21Z", - "stargazers_count": 61, - "watchers_count": 61, + "stargazers_count": 62, + "watchers_count": 62, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 14, - "watchers": 61, + "watchers": 62, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-28397.json b/2024/CVE-2024-28397.json index c18449fb4a..c320b2b73e 100644 --- a/2024/CVE-2024-28397.json +++ b/2024/CVE-2024-28397.json @@ -13,10 +13,10 @@ "description": "CVE-2024-28397: js2py sandbox escape, bypass pyimport restriction.", "fork": false, "created_at": "2024-06-19T01:46:33Z", - "updated_at": "2024-06-22T04:20:23Z", + "updated_at": "2024-06-23T10:50:18Z", "pushed_at": "2024-06-19T01:52:05Z", - "stargazers_count": 18, - "watchers_count": 18, + "stargazers_count": 19, + "watchers_count": 19, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 18, + "watchers": 19, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-28999.json b/2024/CVE-2024-28999.json index d74a7e6757..09b42ff544 100644 --- a/2024/CVE-2024-28999.json +++ b/2024/CVE-2024-28999.json @@ -13,10 +13,10 @@ "description": "Exploit for CVE-2024-28999 SolarWinds Platform Race Condition Vulnerability - login page", "fork": false, "created_at": "2024-06-22T13:39:56Z", - "updated_at": "2024-06-23T06:22:26Z", + "updated_at": "2024-06-23T08:03:25Z", "pushed_at": "2024-06-22T17:28:56Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-29973.json b/2024/CVE-2024-29973.json index 459c51a551..71ffa6e465 100644 --- a/2024/CVE-2024-29973.json +++ b/2024/CVE-2024-29973.json @@ -48,13 +48,13 @@ "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, + "forks": 2, "watchers": 1, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-31982.json b/2024/CVE-2024-31982.json index 6ce3547de0..7856a5b228 100644 --- a/2024/CVE-2024-31982.json +++ b/2024/CVE-2024-31982.json @@ -73,10 +73,10 @@ "description": "POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20", "fork": false, "created_at": "2024-06-22T21:20:33Z", - "updated_at": "2024-06-22T22:29:27Z", + "updated_at": "2024-06-23T12:13:13Z", "pushed_at": "2024-06-22T22:29:24Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-32002.json b/2024/CVE-2024-32002.json index 91b83e6b4c..e7f4efcc16 100644 --- a/2024/CVE-2024-32002.json +++ b/2024/CVE-2024-32002.json @@ -73,10 +73,10 @@ "description": "Exploit PoC for CVE-2024-32002", "fork": false, "created_at": "2024-05-17T19:33:08Z", - "updated_at": "2024-06-22T09:52:34Z", + "updated_at": "2024-06-23T08:04:56Z", "pushed_at": "2024-05-19T07:12:00Z", - "stargazers_count": 450, - "watchers_count": 450, + "stargazers_count": 451, + "watchers_count": 451, "has_discussions": false, "forks_count": 125, "allow_forking": true, @@ -90,7 +90,7 @@ ], "visibility": "public", "forks": 125, - "watchers": 450, + "watchers": 451, "score": 0, "subscribers_count": 3 }, @@ -1494,35 +1494,5 @@ "watchers": 0, "score": 0, "subscribers_count": 1 - }, - { - "id": 818878097, - "name": "git_rce", - "full_name": "Yitian26\/git_rce", - "owner": { - "login": "Yitian26", - "id": 98572277, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98572277?v=4", - "html_url": "https:\/\/github.com\/Yitian26" - }, - "html_url": "https:\/\/github.com\/Yitian26\/git_rce", - "description": "poc for CVE-2024-32002", - "fork": false, - "created_at": "2024-06-23T06:10:06Z", - "updated_at": "2024-06-23T06:17:22Z", - "pushed_at": "2024-06-23T06:17:20Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-3400.json b/2024/CVE-2024-3400.json index d6f5d3619e..ed0af7316e 100644 --- a/2024/CVE-2024-3400.json +++ b/2024/CVE-2024-3400.json @@ -59,6 +59,36 @@ "score": 0, "subscribers_count": 0 }, + { + "id": 786123425, + "name": "CVE-2024-3400", + "full_name": "0x0d3ad\/CVE-2024-3400", + "owner": { + "login": "0x0d3ad", + "id": 18898977, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18898977?v=4", + "html_url": "https:\/\/github.com\/0x0d3ad" + }, + "html_url": "https:\/\/github.com\/0x0d3ad\/CVE-2024-3400", + "description": "CVE-2024-3400", + "fork": false, + "created_at": "2024-04-13T14:00:31Z", + "updated_at": "2024-06-15T01:28:40Z", + "pushed_at": "2024-04-18T07:11:17Z", + "stargazers_count": 49, + "watchers_count": 49, + "has_discussions": false, + "forks_count": 21, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 21, + "watchers": 49, + "score": 0, + "subscribers_count": 2 + }, { "id": 786201656, "name": "CVE-2024-3400", diff --git a/2024/CVE-2024-34312.json b/2024/CVE-2024-34312.json new file mode 100644 index 0000000000..e50fdf622b --- /dev/null +++ b/2024/CVE-2024-34312.json @@ -0,0 +1,35 @@ +[ + { + "id": 818913831, + "name": "CVE-2024-34312", + "full_name": "vincentscode\/CVE-2024-34312", + "owner": { + "login": "vincentscode", + "id": 26576880, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26576880?v=4", + "html_url": "https:\/\/github.com\/vincentscode" + }, + "html_url": "https:\/\/github.com\/vincentscode\/CVE-2024-34312", + "description": "☣️ This repository contains the description and a proof of concept for CVE-2024-34312", + "fork": false, + "created_at": "2024-06-23T08:37:44Z", + "updated_at": "2024-06-23T09:28:30Z", + "pushed_at": "2024-06-23T08:59:19Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "cve", + "security-research" + ], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-34313.json b/2024/CVE-2024-34313.json new file mode 100644 index 0000000000..d57e6c12f5 --- /dev/null +++ b/2024/CVE-2024-34313.json @@ -0,0 +1,35 @@ +[ + { + "id": 818920157, + "name": "CVE-2024-34313", + "full_name": "vincentscode\/CVE-2024-34313", + "owner": { + "login": "vincentscode", + "id": 26576880, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26576880?v=4", + "html_url": "https:\/\/github.com\/vincentscode" + }, + "html_url": "https:\/\/github.com\/vincentscode\/CVE-2024-34313", + "description": "☣️ This repository contains the description and a proof of concept for CVE-2024-34313", + "fork": false, + "created_at": "2024-06-23T09:02:07Z", + "updated_at": "2024-06-23T09:28:48Z", + "pushed_at": "2024-06-23T09:20:49Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "cve", + "security-research" + ], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-4367.json b/2024/CVE-2024-4367.json index edd9f40b1b..6b79382010 100644 --- a/2024/CVE-2024-4367.json +++ b/2024/CVE-2024-4367.json @@ -18,13 +18,13 @@ "stargazers_count": 69, "watchers_count": 69, "has_discussions": false, - "forks_count": 11, + "forks_count": 12, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 11, + "forks": 12, "watchers": 69, "score": 0, "subscribers_count": 2 diff --git a/2024/CVE-2024-4577.json b/2024/CVE-2024-4577.json index b0be16e8f3..427f9ae8f4 100644 --- a/2024/CVE-2024-4577.json +++ b/2024/CVE-2024-4577.json @@ -163,10 +163,10 @@ "description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC", "fork": false, "created_at": "2024-06-07T09:52:54Z", - "updated_at": "2024-06-23T03:07:23Z", + "updated_at": "2024-06-23T12:25:08Z", "pushed_at": "2024-06-22T15:13:52Z", - "stargazers_count": 140, - "watchers_count": 140, + "stargazers_count": 141, + "watchers_count": 141, "has_discussions": false, "forks_count": 35, "allow_forking": true, @@ -175,7 +175,7 @@ "topics": [], "visibility": "public", "forks": 35, - "watchers": 140, + "watchers": 141, "score": 0, "subscribers_count": 4 }, @@ -1024,10 +1024,10 @@ "description": "CVE-2024-4577 POC", "fork": false, "created_at": "2024-06-17T17:53:31Z", - "updated_at": "2024-06-18T06:07:43Z", + "updated_at": "2024-06-23T10:59:38Z", "pushed_at": "2024-06-17T17:59:17Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -1036,7 +1036,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 }, diff --git a/README.md b/README.md index 1a27daa345..ee66479983 100644 --- a/README.md +++ b/README.md @@ -515,6 +515,7 @@ - [Yuvvi01/CVE-2024-3400](https://github.com/Yuvvi01/CVE-2024-3400) - [CerTusHack/CVE-2024-3400-PoC](https://github.com/CerTusHack/CVE-2024-3400-PoC) +- [0x0d3ad/CVE-2024-3400](https://github.com/0x0d3ad/CVE-2024-3400) - [FoxyProxys/CVE-2024-3400](https://github.com/FoxyProxys/CVE-2024-3400) - [momika233/CVE-2024-3400](https://github.com/momika233/CVE-2024-3400) - [MrR0b0t19/CVE-2024-3400](https://github.com/MrR0b0t19/CVE-2024-3400) @@ -2522,7 +2523,6 @@ - [tobelight/cve_2024_32002](https://github.com/tobelight/cve_2024_32002) - [Basyaact/CVE-2024-32002-PoC_Chinese](https://github.com/Basyaact/CVE-2024-32002-PoC_Chinese) - [bonnettheo/CVE-2024-32002](https://github.com/bonnettheo/CVE-2024-32002) -- [Yitian26/git_rce](https://github.com/Yitian26/git_rce) ### CVE-2024-32004 (2024-05-14) @@ -2726,6 +2726,12 @@ - [3309899621/CVE-2024-34310](https://github.com/3309899621/CVE-2024-34310) +### CVE-2024-34312 +- [vincentscode/CVE-2024-34312](https://github.com/vincentscode/CVE-2024-34312) + +### CVE-2024-34313 +- [vincentscode/CVE-2024-34313](https://github.com/vincentscode/CVE-2024-34313) + ### CVE-2024-34351 (2024-05-09) Next.js is a React framework that can provide building blocks to create web applications. A Server-Side Request Forgery (SSRF) vulnerability was identified in Next.js Server Actions. If the `Host` header is modified, and the below conditions are also met, an attacker may be able to make requests that appear to be originating from the Next.js application server itself. The required conditions are 1) Next.js is running in a self-hosted manner; 2) the Next.js application makes use of Server Actions; and 3) the Server Action performs a redirect to a relative path which starts with a `/`. This vulnerability was fixed in Next.js `14.1.1`.