From 57d5e2d8b32069b86b766b3ced7e25d813403a12 Mon Sep 17 00:00:00 2001 From: motikan2010-bot <k.agena1993@gmail.com> Date: Fri, 13 Sep 2024 15:30:06 +0900 Subject: [PATCH] Auto Update 2024/09/13 06:30:06 --- 2011/CVE-2011-3389.json | 8 ++++---- 2016/CVE-2016-1000027.json | 8 ++++---- 2017/CVE-2017-12615.json | 8 ++++---- 2017/CVE-2017-20165.json | 2 +- 2018/CVE-2018-7600.json | 8 ++++---- 2020/CVE-2020-1938.json | 8 ++++---- 2021/CVE-2021-21972.json | 8 ++++---- 2021/CVE-2021-3156.json | 30 ++++++++++++++++++++++++++++++ 2021/CVE-2021-43858.json | 30 ------------------------------ 2021/CVE-2021-44228.json | 8 ++++---- 2022/CVE-2022-1388.json | 2 +- 2022/CVE-2022-21999.json | 8 ++++---- 2022/CVE-2022-22947.json | 8 ++++---- 2022/CVE-2022-22954.json | 8 ++++---- 2022/CVE-2022-36267.json | 2 +- 2022/CVE-2022-40684.json | 4 ++-- 2022/CVE-2022-41852.json | 2 +- 2023/CVE-2023-22809.json | 4 ++-- 2023/CVE-2023-2598.json | 8 ++++---- 2023/CVE-2023-28753.json | 2 +- 2023/CVE-2023-29357.json | 2 +- 2023/CVE-2023-3710.json | 4 ++-- 2023/CVE-2023-3711.json | 4 ++-- 2023/CVE-2023-3712.json | 4 ++-- 2023/CVE-2023-44487.json | 8 ++++---- 2023/CVE-2023-46604.json | 4 ++-- 2023/CVE-2023-4863.json | 8 ++++---- 2024/CVE-2024-1709.json | 2 +- 2024/CVE-2024-21626.json | 8 ++++---- 2024/CVE-2024-2961.json | 8 ++++---- 2024/CVE-2024-30088.json | 8 ++++---- 2024/CVE-2024-31666.json | 2 +- 2024/CVE-2024-37084.json | 8 ++++---- 2024/CVE-2024-38077.json | 12 ++++++------ 2024/CVE-2024-4577.json | 4 ++-- 2024/CVE-2024-4879.json | 30 ++++++++++++++++++++++++++++++ 2024/CVE-2024-5356.json | 2 +- 2024/CVE-2024-5932.json | 30 ++++++++++++++++++++++++++++++ 2024/CVE-2024-6387.json | 8 ++++---- 2024/CVE-2024-7029.json | 12 ++++++------ 2024/CVE-2024-8522.json | 2 +- README.md | 4 +++- 42 files changed, 201 insertions(+), 139 deletions(-) diff --git a/2011/CVE-2011-3389.json b/2011/CVE-2011-3389.json index 3434a8137b..830b595255 100644 --- a/2011/CVE-2011-3389.json +++ b/2011/CVE-2011-3389.json @@ -13,10 +13,10 @@ "description": ":muscle: Proof Of Concept of the BEAST attack against SSL\/TLS CVE-2011-3389 :muscle:", "fork": false, "created_at": "2015-03-28T10:28:16Z", - "updated_at": "2024-08-12T19:16:51Z", + "updated_at": "2024-09-13T04:32:23Z", "pushed_at": "2019-01-30T21:36:22Z", - "stargazers_count": 67, - "watchers_count": 67, + "stargazers_count": 68, + "watchers_count": 68, "has_discussions": false, "forks_count": 30, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 30, - "watchers": 67, + "watchers": 68, "score": 0, "subscribers_count": 7 } diff --git a/2016/CVE-2016-1000027.json b/2016/CVE-2016-1000027.json index 1085aabe64..ad8471d5c7 100644 --- a/2016/CVE-2016-1000027.json +++ b/2016/CVE-2016-1000027.json @@ -13,10 +13,10 @@ "description": "PoC for CVE-2016-1000027", "fork": false, "created_at": "2021-02-01T19:46:51Z", - "updated_at": "2024-07-30T08:47:51Z", + "updated_at": "2024-09-13T03:50:46Z", "pushed_at": "2021-03-05T21:52:06Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -36,7 +36,7 @@ ], "visibility": "public", "forks": 6, - "watchers": 10, + "watchers": 11, "score": 0, "subscribers_count": 1 }, diff --git a/2017/CVE-2017-12615.json b/2017/CVE-2017-12615.json index 40a18b5a9c..887fa6288c 100644 --- a/2017/CVE-2017-12615.json +++ b/2017/CVE-2017-12615.json @@ -403,10 +403,10 @@ "description": "最新tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含", "fork": false, "created_at": "2024-08-29T06:38:16Z", - "updated_at": "2024-09-12T02:43:30Z", + "updated_at": "2024-09-13T00:36:57Z", "pushed_at": "2024-09-09T07:42:24Z", - "stargazers_count": 45, - "watchers_count": 45, + "stargazers_count": 46, + "watchers_count": 46, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -423,7 +423,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 45, + "watchers": 46, "score": 0, "subscribers_count": 1 } diff --git a/2017/CVE-2017-20165.json b/2017/CVE-2017-20165.json index b52582304c..21c072c115 100644 --- a/2017/CVE-2017-20165.json +++ b/2017/CVE-2017-20165.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2023-01-11T10:20:27Z", "updated_at": "2024-08-01T05:44:39Z", - "pushed_at": "2024-08-01T05:44:43Z", + "pushed_at": "2024-09-13T05:41:46Z", "stargazers_count": 13, "watchers_count": 13, "has_discussions": false, diff --git a/2018/CVE-2018-7600.json b/2018/CVE-2018-7600.json index 967ce79273..201f55e3e7 100644 --- a/2018/CVE-2018-7600.json +++ b/2018/CVE-2018-7600.json @@ -80,10 +80,10 @@ "description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)", "fork": false, "created_at": "2018-04-12T22:53:14Z", - "updated_at": "2024-09-05T05:42:59Z", + "updated_at": "2024-09-13T03:02:00Z", "pushed_at": "2021-01-08T10:31:22Z", - "stargazers_count": 574, - "watchers_count": 574, + "stargazers_count": 575, + "watchers_count": 575, "has_discussions": false, "forks_count": 174, "allow_forking": true, @@ -102,7 +102,7 @@ ], "visibility": "public", "forks": 174, - "watchers": 574, + "watchers": 575, "score": 0, "subscribers_count": 23 }, diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index 048a24d3a7..75c9ff5d4f 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -919,10 +919,10 @@ "description": "最新tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含", "fork": false, "created_at": "2024-08-29T06:38:16Z", - "updated_at": "2024-09-12T02:43:30Z", + "updated_at": "2024-09-13T00:36:57Z", "pushed_at": "2024-09-09T07:42:24Z", - "stargazers_count": 45, - "watchers_count": 45, + "stargazers_count": 46, + "watchers_count": 46, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -939,7 +939,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 45, + "watchers": 46, "score": 0, "subscribers_count": 1 } diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 02b434b226..d3b3dd42d8 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -851,10 +851,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2024-09-12T08:43:29Z", + "updated_at": "2024-09-13T02:34:20Z", "pushed_at": "2024-04-25T06:09:38Z", - "stargazers_count": 1306, - "watchers_count": 1306, + "stargazers_count": 1307, + "watchers_count": 1307, "has_discussions": false, "forks_count": 165, "allow_forking": true, @@ -870,7 +870,7 @@ ], "visibility": "public", "forks": 165, - "watchers": 1306, + "watchers": 1307, "score": 0, "subscribers_count": 15 } diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index cba5c70da1..ac57f6a228 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -2211,5 +2211,35 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 856715099, + "name": "CVE-2021-3156", + "full_name": "acidburn2049\/CVE-2021-3156", + "owner": { + "login": "acidburn2049", + "id": 181438567, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/181438567?v=4", + "html_url": "https:\/\/github.com\/acidburn2049" + }, + "html_url": "https:\/\/github.com\/acidburn2049\/CVE-2021-3156", + "description": null, + "fork": false, + "created_at": "2024-09-13T04:20:36Z", + "updated_at": "2024-09-13T04:20:37Z", + "pushed_at": "2024-09-13T04:20:37Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-43858.json b/2021/CVE-2021-43858.json index b241c62d8b..eb8a762891 100644 --- a/2021/CVE-2021-43858.json +++ b/2021/CVE-2021-43858.json @@ -1,34 +1,4 @@ [ - { - "id": 444140549, - "name": "cve-2021-43858", - "full_name": "0rx1\/cve-2021-43858", - "owner": { - "login": "0rx1", - "id": 12779060, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12779060?v=4", - "html_url": "https:\/\/github.com\/0rx1" - }, - "html_url": "https:\/\/github.com\/0rx1\/cve-2021-43858", - "description": null, - "fork": false, - "created_at": "2022-01-03T17:11:54Z", - "updated_at": "2023-11-18T03:11:06Z", - "pushed_at": "2022-01-03T14:15:40Z", - "stargazers_count": 4, - "watchers_count": 4, - "has_discussions": false, - "forks_count": 9, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 9, - "watchers": 4, - "score": 0, - "subscribers_count": 0 - }, { "id": 626802613, "name": "CVE-2021-43858-MinIO", diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index c96b5ea235..888306eb17 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -13,10 +13,10 @@ "description": "Apache Log4j 远程代码执行", "fork": false, "created_at": "2021-12-09T15:27:38Z", - "updated_at": "2024-08-24T16:05:18Z", + "updated_at": "2024-09-13T03:18:29Z", "pushed_at": "2023-05-14T04:54:32Z", - "stargazers_count": 70, - "watchers_count": 70, + "stargazers_count": 71, + "watchers_count": 71, "has_discussions": false, "forks_count": 25, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 25, - "watchers": 70, + "watchers": 71, "score": 0, "subscribers_count": 2 }, diff --git a/2022/CVE-2022-1388.json b/2022/CVE-2022-1388.json index ea0635bc2c..9d79d6af4c 100644 --- a/2022/CVE-2022-1388.json +++ b/2022/CVE-2022-1388.json @@ -2020,6 +2020,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2022/CVE-2022-21999.json b/2022/CVE-2022-21999.json index bf3c053a5d..2149be98fd 100644 --- a/2022/CVE-2022-21999.json +++ b/2022/CVE-2022-21999.json @@ -13,10 +13,10 @@ "description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)", "fork": false, "created_at": "2022-02-08T17:25:44Z", - "updated_at": "2024-09-10T12:29:40Z", + "updated_at": "2024-09-13T04:28:04Z", "pushed_at": "2022-02-09T16:54:09Z", - "stargazers_count": 756, - "watchers_count": 756, + "stargazers_count": 757, + "watchers_count": 757, "has_discussions": false, "forks_count": 157, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 157, - "watchers": 756, + "watchers": 757, "score": 0, "subscribers_count": 16 } diff --git a/2022/CVE-2022-22947.json b/2022/CVE-2022-22947.json index 7c83e6c80c..35f185b6a1 100644 --- a/2022/CVE-2022-22947.json +++ b/2022/CVE-2022-22947.json @@ -1314,10 +1314,10 @@ "description": "Spring Cloud Gateway Actuator API SpEL表达式注入命令执行(CVE-2022-22947) 注入哥斯拉内存马", "fork": false, "created_at": "2022-05-16T15:27:41Z", - "updated_at": "2024-08-23T00:20:16Z", + "updated_at": "2024-09-13T02:59:32Z", "pushed_at": "2022-05-16T15:33:37Z", - "stargazers_count": 51, - "watchers_count": 51, + "stargazers_count": 52, + "watchers_count": 52, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -1326,7 +1326,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 51, + "watchers": 52, "score": 0, "subscribers_count": 1 }, diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index 0d1b437861..10ad69fedc 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -766,10 +766,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2024-09-12T08:43:29Z", + "updated_at": "2024-09-13T02:34:20Z", "pushed_at": "2024-04-25T06:09:38Z", - "stargazers_count": 1306, - "watchers_count": 1306, + "stargazers_count": 1307, + "watchers_count": 1307, "has_discussions": false, "forks_count": 165, "allow_forking": true, @@ -785,7 +785,7 @@ ], "visibility": "public", "forks": 165, - "watchers": 1306, + "watchers": 1307, "score": 0, "subscribers_count": 15 }, diff --git a/2022/CVE-2022-36267.json b/2022/CVE-2022-36267.json index c329cfb91e..4bc087255c 100644 --- a/2022/CVE-2022-36267.json +++ b/2022/CVE-2022-36267.json @@ -13,7 +13,7 @@ "description": "PoC Script for CVE-2022-36267: Exploits an unauthenticated remote command injection vulnerability in Airspan AirSpot 5410 antenna.", "fork": false, "created_at": "2024-01-08T22:23:57Z", - "updated_at": "2024-02-03T23:46:44Z", + "updated_at": "2024-09-13T01:20:33Z", "pushed_at": "2024-01-08T22:37:55Z", "stargazers_count": 8, "watchers_count": 8, diff --git a/2022/CVE-2022-40684.json b/2022/CVE-2022-40684.json index 2519429a10..b92cf8d93b 100644 --- a/2022/CVE-2022-40684.json +++ b/2022/CVE-2022-40684.json @@ -48,13 +48,13 @@ "stargazers_count": 87, "watchers_count": 87, "has_discussions": false, - "forks_count": 35, + "forks_count": 34, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 35, + "forks": 34, "watchers": 87, "score": 0, "subscribers_count": 3 diff --git a/2022/CVE-2022-41852.json b/2022/CVE-2022-41852.json index f01494c4ee..a9b0094087 100644 --- a/2022/CVE-2022-41852.json +++ b/2022/CVE-2022-41852.json @@ -69,6 +69,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-22809.json b/2023/CVE-2023-22809.json index 72d968d206..f5dede6240 100644 --- a/2023/CVE-2023-22809.json +++ b/2023/CVE-2023-22809.json @@ -18,7 +18,7 @@ "stargazers_count": 147, "watchers_count": 147, "has_discussions": false, - "forks_count": 35, + "forks_count": 36, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -33,7 +33,7 @@ "vulnerability" ], "visibility": "public", - "forks": 35, + "forks": 36, "watchers": 147, "score": 0, "subscribers_count": 3 diff --git a/2023/CVE-2023-2598.json b/2023/CVE-2023-2598.json index 3f1c8966d7..4a106411ae 100644 --- a/2023/CVE-2023-2598.json +++ b/2023/CVE-2023-2598.json @@ -13,10 +13,10 @@ "description": "LPE PoC of a vulnerability in the io_uring subsystem of the Linux Kernel.", "fork": false, "created_at": "2023-11-16T23:41:27Z", - "updated_at": "2024-09-02T09:37:59Z", + "updated_at": "2024-09-13T02:33:35Z", "pushed_at": "2023-11-23T18:37:18Z", - "stargazers_count": 86, - "watchers_count": 86, + "stargazers_count": 87, + "watchers_count": 87, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 12, - "watchers": 86, + "watchers": 87, "score": 0, "subscribers_count": 7 }, diff --git a/2023/CVE-2023-28753.json b/2023/CVE-2023-28753.json index 3eca4c3f77..6d42c842e3 100644 --- a/2023/CVE-2023-28753.json +++ b/2023/CVE-2023-28753.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-29357.json b/2023/CVE-2023-29357.json index 6a3f4a50de..6e851b78e0 100644 --- a/2023/CVE-2023-29357.json +++ b/2023/CVE-2023-29357.json @@ -184,6 +184,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-3710.json b/2023/CVE-2023-3710.json index 8657d3cbb9..292cb6eb28 100644 --- a/2023/CVE-2023-3710.json +++ b/2023/CVE-2023-3710.json @@ -10,10 +10,10 @@ "html_url": "https:\/\/github.com\/vpxuser" }, "html_url": "https:\/\/github.com\/vpxuser\/CVE-2023-3710-POC", - "description": null, + "description": "Honeywell PM43工控打印机管理后台username参数RCE漏洞证明POC", "fork": false, "created_at": "2023-07-03T01:14:02Z", - "updated_at": "2024-08-12T09:51:53Z", + "updated_at": "2024-09-13T00:33:35Z", "pushed_at": "2023-09-27T01:11:00Z", "stargazers_count": 5, "watchers_count": 5, diff --git a/2023/CVE-2023-3711.json b/2023/CVE-2023-3711.json index 060a05548c..bb4c5cc9c6 100644 --- a/2023/CVE-2023-3711.json +++ b/2023/CVE-2023-3711.json @@ -10,10 +10,10 @@ "html_url": "https:\/\/github.com\/vpxuser" }, "html_url": "https:\/\/github.com\/vpxuser\/CVE-2023-3711-POC", - "description": null, + "description": "Honeywell PM43工控打印机管理后台XSS漏洞证明POC", "fork": false, "created_at": "2023-07-03T02:10:42Z", - "updated_at": "2023-10-13T05:59:27Z", + "updated_at": "2024-09-13T00:32:54Z", "pushed_at": "2023-09-27T01:09:51Z", "stargazers_count": 0, "watchers_count": 0, diff --git a/2023/CVE-2023-3712.json b/2023/CVE-2023-3712.json index d4f9705351..5062d20737 100644 --- a/2023/CVE-2023-3712.json +++ b/2023/CVE-2023-3712.json @@ -10,10 +10,10 @@ "html_url": "https:\/\/github.com\/vpxuser" }, "html_url": "https:\/\/github.com\/vpxuser\/CVE-2023-3712-POC", - "description": null, + "description": "Honeywell PM43工控打印机管理后台userpassword参数RCE漏洞证明POC", "fork": false, "created_at": "2023-07-03T01:51:11Z", - "updated_at": "2024-01-26T19:00:11Z", + "updated_at": "2024-09-13T00:33:59Z", "pushed_at": "2023-09-27T01:11:18Z", "stargazers_count": 2, "watchers_count": 2, diff --git a/2023/CVE-2023-44487.json b/2023/CVE-2023-44487.json index 2a8cab7896..20eb22c658 100644 --- a/2023/CVE-2023-44487.json +++ b/2023/CVE-2023-44487.json @@ -141,10 +141,10 @@ "description": "Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)", "fork": false, "created_at": "2023-10-13T23:55:32Z", - "updated_at": "2024-09-10T07:45:49Z", + "updated_at": "2024-09-13T01:52:08Z", "pushed_at": "2023-10-30T20:22:37Z", - "stargazers_count": 53, - "watchers_count": 53, + "stargazers_count": 54, + "watchers_count": 54, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -153,7 +153,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 53, + "watchers": 54, "score": 0, "subscribers_count": 4 }, diff --git a/2023/CVE-2023-46604.json b/2023/CVE-2023-46604.json index 03f6c61930..133917b70e 100644 --- a/2023/CVE-2023-46604.json +++ b/2023/CVE-2023-46604.json @@ -645,8 +645,8 @@ "description": "ActiveMQ RCE (CVE-2023-46604) 回显利用工具", "fork": false, "created_at": "2024-03-05T07:09:21Z", - "updated_at": "2024-08-13T15:41:00Z", - "pushed_at": "2024-03-05T09:16:50Z", + "updated_at": "2024-09-13T05:35:28Z", + "pushed_at": "2024-09-13T05:35:25Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, diff --git a/2023/CVE-2023-4863.json b/2023/CVE-2023-4863.json index 28628f2293..d3a7e8c0f5 100644 --- a/2023/CVE-2023-4863.json +++ b/2023/CVE-2023-4863.json @@ -223,10 +223,10 @@ "description": null, "fork": false, "created_at": "2023-12-18T23:12:25Z", - "updated_at": "2024-08-27T22:26:30Z", + "updated_at": "2024-09-13T04:48:20Z", "pushed_at": "2024-05-13T17:40:58Z", - "stargazers_count": 44, - "watchers_count": 44, + "stargazers_count": 45, + "watchers_count": 45, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -235,7 +235,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 44, + "watchers": 45, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-1709.json b/2024/CVE-2024-1709.json index 618e5b22f8..ff8ec25fce 100644 --- a/2024/CVE-2024-1709.json +++ b/2024/CVE-2024-1709.json @@ -156,6 +156,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-21626.json b/2024/CVE-2024-21626.json index f2ab23a395..eff76693a1 100644 --- a/2024/CVE-2024-21626.json +++ b/2024/CVE-2024-21626.json @@ -43,10 +43,10 @@ "description": "PoC and Detection for CVE-2024-21626", "fork": false, "created_at": "2024-02-01T15:28:37Z", - "updated_at": "2024-08-20T08:38:22Z", + "updated_at": "2024-09-13T05:50:44Z", "pushed_at": "2024-02-06T16:09:05Z", - "stargazers_count": 69, - "watchers_count": 69, + "stargazers_count": 70, + "watchers_count": 70, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 69, + "watchers": 70, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-2961.json b/2024/CVE-2024-2961.json index 216fcfe340..84deebdb3f 100644 --- a/2024/CVE-2024-2961.json +++ b/2024/CVE-2024-2961.json @@ -73,10 +73,10 @@ "description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()", "fork": false, "created_at": "2024-05-27T08:30:06Z", - "updated_at": "2024-09-11T15:30:00Z", + "updated_at": "2024-09-13T05:11:52Z", "pushed_at": "2024-09-11T15:29:33Z", - "stargazers_count": 364, - "watchers_count": 364, + "stargazers_count": 365, + "watchers_count": 365, "has_discussions": false, "forks_count": 50, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 50, - "watchers": 364, + "watchers": 365, "score": 0, "subscribers_count": 7 }, diff --git a/2024/CVE-2024-30088.json b/2024/CVE-2024-30088.json index a643736d05..a47e5e71b8 100644 --- a/2024/CVE-2024-30088.json +++ b/2024/CVE-2024-30088.json @@ -103,10 +103,10 @@ "description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088", "fork": false, "created_at": "2024-07-15T08:07:05Z", - "updated_at": "2024-09-12T21:35:31Z", + "updated_at": "2024-09-13T04:19:13Z", "pushed_at": "2024-09-08T21:23:34Z", - "stargazers_count": 352, - "watchers_count": 352, + "stargazers_count": 353, + "watchers_count": 353, "has_discussions": false, "forks_count": 28, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 28, - "watchers": 352, + "watchers": 353, "score": 0, "subscribers_count": 18 }, diff --git a/2024/CVE-2024-31666.json b/2024/CVE-2024-31666.json index 8c46a045ea..4825d6c561 100644 --- a/2024/CVE-2024-31666.json +++ b/2024/CVE-2024-31666.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-37084.json b/2024/CVE-2024-37084.json index de286381a8..40aa004463 100644 --- a/2024/CVE-2024-37084.json +++ b/2024/CVE-2024-37084.json @@ -43,10 +43,10 @@ "description": "Spring Cloud Remote Code Execution", "fork": false, "created_at": "2024-09-11T14:09:50Z", - "updated_at": "2024-09-11T14:15:01Z", + "updated_at": "2024-09-13T03:21:50Z", "pushed_at": "2024-09-11T14:12:32Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-38077.json b/2024/CVE-2024-38077.json index 96c43da2cc..81bc1f5487 100644 --- a/2024/CVE-2024-38077.json +++ b/2024/CVE-2024-38077.json @@ -43,19 +43,19 @@ "description": "RDL的堆溢出导致的RCE", "fork": false, "created_at": "2024-08-09T05:00:44Z", - "updated_at": "2024-09-12T09:04:33Z", + "updated_at": "2024-09-13T02:06:05Z", "pushed_at": "2024-08-14T04:43:05Z", - "stargazers_count": 194, - "watchers_count": 194, + "stargazers_count": 195, + "watchers_count": 195, "has_discussions": false, - "forks_count": 82, + "forks_count": 83, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 82, - "watchers": 194, + "forks": 83, + "watchers": 195, "score": 0, "subscribers_count": 5 }, diff --git a/2024/CVE-2024-4577.json b/2024/CVE-2024-4577.json index d25074c9f4..cc2c1545d4 100644 --- a/2024/CVE-2024-4577.json +++ b/2024/CVE-2024-4577.json @@ -1527,7 +1527,7 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 }, { "id": 856557928, @@ -1557,6 +1557,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-4879.json b/2024/CVE-2024-4879.json index 6d195e3669..0e74f4eb8d 100644 --- a/2024/CVE-2024-4879.json +++ b/2024/CVE-2024-4879.json @@ -268,5 +268,35 @@ "watchers": 4, "score": 0, "subscribers_count": 1 + }, + { + "id": 856665318, + "name": "CVE-2024-4879", + "full_name": "0xWhoami35\/CVE-2024-4879", + "owner": { + "login": "0xWhoami35", + "id": 107396843, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107396843?v=4", + "html_url": "https:\/\/github.com\/0xWhoami35" + }, + "html_url": "https:\/\/github.com\/0xWhoami35\/CVE-2024-4879", + "description": null, + "fork": false, + "created_at": "2024-09-13T01:20:34Z", + "updated_at": "2024-09-13T01:33:09Z", + "pushed_at": "2024-09-13T01:33:05Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-5356.json b/2024/CVE-2024-5356.json index 91e559aca8..322e187fcb 100644 --- a/2024/CVE-2024-5356.json +++ b/2024/CVE-2024-5356.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-5932.json b/2024/CVE-2024-5932.json index 9f60e2d0dc..373bdc8602 100644 --- a/2024/CVE-2024-5932.json +++ b/2024/CVE-2024-5932.json @@ -1,4 +1,34 @@ [ + { + "id": 845461331, + "name": "CVE-2024-5932-PoC", + "full_name": "0xb0mb3r\/CVE-2024-5932-PoC", + "owner": { + "login": "0xb0mb3r", + "id": 177725137, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/177725137?v=4", + "html_url": "https:\/\/github.com\/0xb0mb3r" + }, + "html_url": "https:\/\/github.com\/0xb0mb3r\/CVE-2024-5932-PoC", + "description": "Proof-of-Concept for CVE-2024-5932 GiveWP PHP Object Injection ", + "fork": false, + "created_at": "2024-08-21T09:51:21Z", + "updated_at": "2024-09-13T01:58:46Z", + "pushed_at": "2024-08-22T15:20:46Z", + "stargazers_count": 2, + "watchers_count": 2, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 2, + "score": 0, + "subscribers_count": 1 + }, { "id": 847287273, "name": "CVE-2024-5932", diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json index 278601c571..95eb2c5931 100644 --- a/2024/CVE-2024-6387.json +++ b/2024/CVE-2024-6387.json @@ -1403,10 +1403,10 @@ "description": "PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (Scanner and Exploit) ", "fork": false, "created_at": "2024-07-02T18:32:46Z", - "updated_at": "2024-09-12T16:00:31Z", + "updated_at": "2024-09-13T03:47:57Z", "pushed_at": "2024-07-05T15:19:28Z", - "stargazers_count": 51, - "watchers_count": 51, + "stargazers_count": 54, + "watchers_count": 54, "has_discussions": false, "forks_count": 21, "allow_forking": true, @@ -1424,7 +1424,7 @@ ], "visibility": "public", "forks": 21, - "watchers": 51, + "watchers": 54, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-7029.json b/2024/CVE-2024-7029.json index 20f944b4ef..322e352805 100644 --- a/2024/CVE-2024-7029.json +++ b/2024/CVE-2024-7029.json @@ -13,19 +13,19 @@ "description": null, "fork": false, "created_at": "2024-08-30T07:58:27Z", - "updated_at": "2024-09-12T11:00:00Z", + "updated_at": "2024-09-13T05:13:04Z", "pushed_at": "2024-08-29T17:41:35Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, - "watchers": 5, + "forks": 2, + "watchers": 6, "score": 0, "subscribers_count": 0 }, diff --git a/2024/CVE-2024-8522.json b/2024/CVE-2024-8522.json index 5e27bf7b05..c530a5d486 100644 --- a/2024/CVE-2024-8522.json +++ b/2024/CVE-2024-8522.json @@ -33,6 +33,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/README.md b/README.md index 1814f56b70..513434e79f 100644 --- a/README.md +++ b/README.md @@ -973,6 +973,7 @@ - [NoTsPepino/CVE-2024-4879-CVE-2024-5217-ServiceNow-RCE-Scanning](https://github.com/NoTsPepino/CVE-2024-4879-CVE-2024-5217-ServiceNow-RCE-Scanning) - [jdusane/CVE-2024-4879](https://github.com/jdusane/CVE-2024-4879) - [fa-rrel/CVE-2024-4879](https://github.com/fa-rrel/CVE-2024-4879) +- [0xWhoami35/CVE-2024-4879](https://github.com/0xWhoami35/CVE-2024-4879) ### CVE-2024-4883 (2024-06-25) @@ -1118,6 +1119,7 @@ <code>The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.14.1 via deserialization of untrusted input from the 'give_title' parameter. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to execute code remotely, and to delete arbitrary files. </code> +- [0xb0mb3r/CVE-2024-5932-PoC](https://github.com/0xb0mb3r/CVE-2024-5932-PoC) - [EQSTLab/CVE-2024-5932](https://github.com/EQSTLab/CVE-2024-5932) ### CVE-2024-5947 (2024-06-13) @@ -20567,6 +20569,7 @@ - [SamTruss/LMU-CVE-2021-3156](https://github.com/SamTruss/LMU-CVE-2021-3156) - [lypd0/CVE-2021-3156-checker](https://github.com/lypd0/CVE-2021-3156-checker) - [Typical0day/CVE-2021-3156](https://github.com/Typical0day/CVE-2021-3156) +- [acidburn2049/CVE-2021-3156](https://github.com/acidburn2049/CVE-2021-3156) ### CVE-2021-3157 - [CrackerCat/cve-2021-3157](https://github.com/CrackerCat/cve-2021-3157) @@ -25402,7 +25405,6 @@ <code>MinIO is a Kubernetes native application for cloud storage. Prior to version `RELEASE.2021-12-27T07-23-18Z`, a malicious client can hand-craft an HTTP API call that allows for updating policy for a user and gaining higher privileges. The patch in version `RELEASE.2021-12-27T07-23-18Z` changes the accepted request body type and removes the ability to apply policy changes through this API. There is a workaround for this vulnerability: Changing passwords can be disabled by adding an explicit `Deny` rule to disable the API for users. </code> -- [0rx1/cve-2021-43858](https://github.com/0rx1/cve-2021-43858) - [khuntor/CVE-2021-43858-MinIO](https://github.com/khuntor/CVE-2021-43858-MinIO) ### CVE-2021-43883 (2021-12-15)