diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json
index dde54fd353..d72d81f46c 100644
--- a/2014/CVE-2014-4210.json
+++ b/2014/CVE-2014-4210.json
@@ -45,10 +45,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2024-12-10T17:34:52Z",
+ "updated_at": "2024-12-14T21:15:37Z",
"pushed_at": "2023-11-24T09:21:56Z",
- "stargazers_count": 2012,
- "watchers_count": 2012,
+ "stargazers_count": 2011,
+ "watchers_count": 2011,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@@ -78,7 +78,7 @@
],
"visibility": "public",
"forks": 340,
- "watchers": 2012,
+ "watchers": 2011,
"score": 0,
"subscribers_count": 37
},
diff --git a/2015/CVE-2015-1328.json b/2015/CVE-2015-1328.json
index 8a0fa4141e..8b88446358 100644
--- a/2015/CVE-2015-1328.json
+++ b/2015/CVE-2015-1328.json
@@ -174,13 +174,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
diff --git a/2015/CVE-2015-1397.json b/2015/CVE-2015-1397.json
index 7b67818f11..b1e1ade701 100644
--- a/2015/CVE-2015-1397.json
+++ b/2015/CVE-2015-1397.json
@@ -112,13 +112,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json
index 748b85e5d1..1a8953fbeb 100644
--- a/2016/CVE-2016-0638.json
+++ b/2016/CVE-2016-0638.json
@@ -14,10 +14,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2024-12-10T17:34:52Z",
+ "updated_at": "2024-12-14T21:15:37Z",
"pushed_at": "2023-11-24T09:21:56Z",
- "stargazers_count": 2012,
- "watchers_count": 2012,
+ "stargazers_count": 2011,
+ "watchers_count": 2011,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@@ -47,7 +47,7 @@
],
"visibility": "public",
"forks": 340,
- "watchers": 2012,
+ "watchers": 2011,
"score": 0,
"subscribers_count": 37
},
diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json
index 05474780e5..c493ea0552 100644
--- a/2017/CVE-2017-3248.json
+++ b/2017/CVE-2017-3248.json
@@ -45,10 +45,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2024-12-10T17:34:52Z",
+ "updated_at": "2024-12-14T21:15:37Z",
"pushed_at": "2023-11-24T09:21:56Z",
- "stargazers_count": 2012,
- "watchers_count": 2012,
+ "stargazers_count": 2011,
+ "watchers_count": 2011,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@@ -78,7 +78,7 @@
],
"visibility": "public",
"forks": 340,
- "watchers": 2012,
+ "watchers": 2011,
"score": 0,
"subscribers_count": 37
},
diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json
index c02fa0a6d3..0b61b59b2e 100644
--- a/2018/CVE-2018-2628.json
+++ b/2018/CVE-2018-2628.json
@@ -576,10 +576,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2024-12-10T17:34:52Z",
+ "updated_at": "2024-12-14T21:15:37Z",
"pushed_at": "2023-11-24T09:21:56Z",
- "stargazers_count": 2012,
- "watchers_count": 2012,
+ "stargazers_count": 2011,
+ "watchers_count": 2011,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@@ -609,7 +609,7 @@
],
"visibility": "public",
"forks": 340,
- "watchers": 2012,
+ "watchers": 2011,
"score": 0,
"subscribers_count": 37
},
diff --git a/2019/CVE-2019-1405.json b/2019/CVE-2019-1405.json
index 0786a3ac8e..aae410828a 100644
--- a/2019/CVE-2019-1405.json
+++ b/2019/CVE-2019-1405.json
@@ -19,13 +19,13 @@
"stargazers_count": 350,
"watchers_count": 350,
"has_discussions": false,
- "forks_count": 77,
+ "forks_count": 76,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 77,
+ "forks": 76,
"watchers": 350,
"score": 0,
"subscribers_count": 12
diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json
index 57eab77083..e4781a683e 100644
--- a/2019/CVE-2019-17558.json
+++ b/2019/CVE-2019-17558.json
@@ -45,10 +45,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
- "updated_at": "2024-12-14T14:01:01Z",
+ "updated_at": "2024-12-14T21:15:38Z",
"pushed_at": "2021-04-04T09:13:57Z",
- "stargazers_count": 4143,
- "watchers_count": 4143,
+ "stargazers_count": 4142,
+ "watchers_count": 4142,
"has_discussions": false,
"forks_count": 1100,
"allow_forking": true,
@@ -77,7 +77,7 @@
],
"visibility": "public",
"forks": 1100,
- "watchers": 4143,
+ "watchers": 4142,
"score": 0,
"subscribers_count": 149
},
diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json
index 19f1045690..1b53614ea6 100644
--- a/2019/CVE-2019-2618.json
+++ b/2019/CVE-2019-2618.json
@@ -200,10 +200,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2024-12-10T17:34:52Z",
+ "updated_at": "2024-12-14T21:15:37Z",
"pushed_at": "2023-11-24T09:21:56Z",
- "stargazers_count": 2012,
- "watchers_count": 2012,
+ "stargazers_count": 2011,
+ "watchers_count": 2011,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@@ -233,7 +233,7 @@
],
"visibility": "public",
"forks": 340,
- "watchers": 2012,
+ "watchers": 2011,
"score": 0,
"subscribers_count": 37
}
diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json
index ea14350bc7..dfa19373bd 100644
--- a/2020/CVE-2020-0796.json
+++ b/2020/CVE-2020-0796.json
@@ -1039,10 +1039,10 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
- "updated_at": "2024-12-04T06:56:00Z",
+ "updated_at": "2024-12-14T21:15:38Z",
"pushed_at": "2020-12-07T20:04:27Z",
- "stargazers_count": 1305,
- "watchers_count": 1305,
+ "stargazers_count": 1303,
+ "watchers_count": 1303,
"has_discussions": false,
"forks_count": 344,
"allow_forking": true,
@@ -1057,7 +1057,7 @@
],
"visibility": "public",
"forks": 344,
- "watchers": 1305,
+ "watchers": 1303,
"score": 0,
"subscribers_count": 34
},
diff --git a/2020/CVE-2020-10148.json b/2020/CVE-2020-10148.json
index a951a033c8..435f76f300 100644
--- a/2020/CVE-2020-10148.json
+++ b/2020/CVE-2020-10148.json
@@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2020-12-29T03:17:56Z",
- "updated_at": "2021-01-16T07:53:53Z",
+ "updated_at": "2024-12-14T21:15:40Z",
"pushed_at": "2020-12-29T03:30:47Z",
- "stargazers_count": 6,
- "watchers_count": 6,
+ "stargazers_count": 5,
+ "watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
- "watchers": 6,
+ "watchers": 5,
"score": 0,
"subscribers_count": 2
},
diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json
index 57297f51b5..32bed8194f 100644
--- a/2020/CVE-2020-14882.json
+++ b/2020/CVE-2020-14882.json
@@ -14,10 +14,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
- "updated_at": "2024-12-14T14:01:01Z",
+ "updated_at": "2024-12-14T21:15:38Z",
"pushed_at": "2021-04-04T09:13:57Z",
- "stargazers_count": 4143,
- "watchers_count": 4143,
+ "stargazers_count": 4142,
+ "watchers_count": 4142,
"has_discussions": false,
"forks_count": 1100,
"allow_forking": true,
@@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 1100,
- "watchers": 4143,
+ "watchers": 4142,
"score": 0,
"subscribers_count": 149
},
diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json
index 4b49f2bb0d..7cb67e1333 100644
--- a/2020/CVE-2020-2551.json
+++ b/2020/CVE-2020-2551.json
@@ -14,10 +14,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2024-12-10T17:34:52Z",
+ "updated_at": "2024-12-14T21:15:37Z",
"pushed_at": "2023-11-24T09:21:56Z",
- "stargazers_count": 2012,
- "watchers_count": 2012,
+ "stargazers_count": 2011,
+ "watchers_count": 2011,
"has_discussions": true,
"forks_count": 340,
"allow_forking": true,
@@ -47,7 +47,7 @@
],
"visibility": "public",
"forks": 340,
- "watchers": 2012,
+ "watchers": 2011,
"score": 0,
"subscribers_count": 37
},
diff --git a/2020/CVE-2020-2883.json b/2020/CVE-2020-2883.json
index a72317f399..f95fba5a6b 100644
--- a/2020/CVE-2020-2883.json
+++ b/2020/CVE-2020-2883.json
@@ -112,10 +112,10 @@
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell",
"fork": false,
"created_at": "2020-08-19T03:34:06Z",
- "updated_at": "2024-12-03T02:31:30Z",
+ "updated_at": "2024-12-14T21:15:39Z",
"pushed_at": "2020-08-25T03:17:32Z",
- "stargazers_count": 532,
- "watchers_count": 532,
+ "stargazers_count": 530,
+ "watchers_count": 530,
"has_discussions": false,
"forks_count": 62,
"allow_forking": true,
@@ -124,7 +124,7 @@
"topics": [],
"visibility": "public",
"forks": 62,
- "watchers": 532,
+ "watchers": 530,
"score": 0,
"subscribers_count": 8
},
diff --git a/2020/CVE-2020-5902.json b/2020/CVE-2020-5902.json
index f709c3ae50..3d15a7b4cd 100644
--- a/2020/CVE-2020-5902.json
+++ b/2020/CVE-2020-5902.json
@@ -113,10 +113,10 @@
"description": "POC code for checking for this vulnerability. Since the code has been released, I decided to release this one as well. Patch Immediately!",
"fork": false,
"created_at": "2020-07-05T16:38:36Z",
- "updated_at": "2024-08-12T20:03:24Z",
+ "updated_at": "2024-12-14T21:15:39Z",
"pushed_at": "2020-07-05T16:44:03Z",
- "stargazers_count": 13,
- "watchers_count": 13,
+ "stargazers_count": 12,
+ "watchers_count": 12,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@@ -125,7 +125,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
- "watchers": 13,
+ "watchers": 12,
"score": 0,
"subscribers_count": 1
},
diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json
index 66f144f484..e24fea8f6b 100644
--- a/2021/CVE-2021-1675.json
+++ b/2021/CVE-2021-1675.json
@@ -45,10 +45,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
- "updated_at": "2024-12-12T08:10:38Z",
+ "updated_at": "2024-12-14T21:15:41Z",
"pushed_at": "2021-07-20T15:28:13Z",
- "stargazers_count": 1848,
- "watchers_count": 1848,
+ "stargazers_count": 1847,
+ "watchers_count": 1847,
"has_discussions": false,
"forks_count": 583,
"allow_forking": true,
@@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 583,
- "watchers": 1848,
+ "watchers": 1847,
"score": 0,
"subscribers_count": 43
},
diff --git a/2021/CVE-2021-22205.json b/2021/CVE-2021-22205.json
index b857edb811..aaf076f6bb 100644
--- a/2021/CVE-2021-22205.json
+++ b/2021/CVE-2021-22205.json
@@ -45,10 +45,10 @@
"description": "Pocsuite3 For CVE-2021-22205",
"fork": false,
"created_at": "2021-10-28T06:29:37Z",
- "updated_at": "2024-08-12T20:17:36Z",
+ "updated_at": "2024-12-14T21:15:43Z",
"pushed_at": "2021-10-28T08:54:26Z",
- "stargazers_count": 87,
- "watchers_count": 87,
+ "stargazers_count": 86,
+ "watchers_count": 86,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
- "watchers": 87,
+ "watchers": 86,
"score": 0,
"subscribers_count": 1
},
diff --git a/2021/CVE-2021-26690.json b/2021/CVE-2021-26690.json
index 7efe58c257..ecec6ee926 100644
--- a/2021/CVE-2021-26690.json
+++ b/2021/CVE-2021-26690.json
@@ -81,13 +81,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
diff --git a/2021/CVE-2021-40822.json b/2021/CVE-2021-40822.json
index 767e6433dc..52fff7e4bd 100644
--- a/2021/CVE-2021-40822.json
+++ b/2021/CVE-2021-40822.json
@@ -19,13 +19,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
- "forks_count": 2,
+ "forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 2,
+ "forks": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 1
diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json
index 5a06ffcb24..9877ac1050 100644
--- a/2021/CVE-2021-41773.json
+++ b/2021/CVE-2021-41773.json
@@ -2383,10 +2383,10 @@
"description": "Apache2 2.4.49 - LFI & RCE Exploit - CVE-2021-41773",
"fork": false,
"created_at": "2022-03-12T21:24:55Z",
- "updated_at": "2024-12-13T00:43:37Z",
+ "updated_at": "2024-12-14T22:41:12Z",
"pushed_at": "2022-03-12T21:30:58Z",
- "stargazers_count": 101,
- "watchers_count": 101,
+ "stargazers_count": 102,
+ "watchers_count": 102,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@@ -2404,7 +2404,7 @@
],
"visibility": "public",
"forks": 34,
- "watchers": 101,
+ "watchers": 102,
"score": 0,
"subscribers_count": 2
},
diff --git a/2021/CVE-2021-43798.json b/2021/CVE-2021-43798.json
index 3760b60f80..c5f13ac5ab 100644
--- a/2021/CVE-2021-43798.json
+++ b/2021/CVE-2021-43798.json
@@ -208,10 +208,10 @@
"description": "A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins \/ extract secret_key \/ decrypt data_source info automatic.",
"fork": false,
"created_at": "2021-12-07T15:11:34Z",
- "updated_at": "2024-12-05T06:39:52Z",
+ "updated_at": "2024-12-14T21:15:43Z",
"pushed_at": "2024-07-12T14:17:27Z",
- "stargazers_count": 246,
- "watchers_count": 246,
+ "stargazers_count": 245,
+ "watchers_count": 245,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@@ -224,7 +224,7 @@
],
"visibility": "public",
"forks": 36,
- "watchers": 246,
+ "watchers": 245,
"score": 0,
"subscribers_count": 6
},
@@ -1285,6 +1285,6 @@
"forks": 1,
"watchers": 0,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-45232.json b/2021/CVE-2021-45232.json
index 0504b5d5a3..5f49952307 100644
--- a/2021/CVE-2021-45232.json
+++ b/2021/CVE-2021-45232.json
@@ -169,10 +169,10 @@
"description": null,
"fork": false,
"created_at": "2021-12-29T07:32:30Z",
- "updated_at": "2024-10-07T12:01:32Z",
+ "updated_at": "2024-12-14T21:15:43Z",
"pushed_at": "2021-12-31T08:30:33Z",
- "stargazers_count": 78,
- "watchers_count": 78,
+ "stargazers_count": 77,
+ "watchers_count": 77,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@@ -184,7 +184,7 @@
],
"visibility": "public",
"forks": 31,
- "watchers": 78,
+ "watchers": 77,
"score": 0,
"subscribers_count": 3
},
diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json
index 090fba0dec..eac1421d13 100644
--- a/2022/CVE-2022-22965.json
+++ b/2022/CVE-2022-22965.json
@@ -2453,20 +2453,20 @@
{
"id": 882127199,
"name": "Block-Spring4Shell",
- "full_name": "BlackBird63030\/Block-Spring4Shell",
+ "full_name": "SkyM1raj\/Block-Spring4Shell",
"owner": {
- "login": "BlackBird63030",
+ "login": "SkyM1raj",
"id": 141164867,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/141164867?v=4",
- "html_url": "https:\/\/github.com\/BlackBird63030",
+ "html_url": "https:\/\/github.com\/SkyM1raj",
"user_view_type": "public"
},
- "html_url": "https:\/\/github.com\/BlackBird63030\/Block-Spring4Shell",
+ "html_url": "https:\/\/github.com\/SkyM1raj\/Block-Spring4Shell",
"description": "POC firewall with rules designed to detect and block Spring4Shell vulnerability (CVE-2022-22965) exploit",
"fork": false,
"created_at": "2024-11-02T00:26:02Z",
- "updated_at": "2024-12-05T09:18:06Z",
- "pushed_at": "2024-12-05T09:18:02Z",
+ "updated_at": "2024-12-15T00:16:07Z",
+ "pushed_at": "2024-12-15T00:16:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
diff --git a/2022/CVE-2022-29464.json b/2022/CVE-2022-29464.json
index e125b207cf..6b04144339 100644
--- a/2022/CVE-2022-29464.json
+++ b/2022/CVE-2022-29464.json
@@ -14,10 +14,10 @@
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
"fork": false,
"created_at": "2022-04-20T21:23:52Z",
- "updated_at": "2024-11-18T20:38:59Z",
+ "updated_at": "2024-12-14T21:15:44Z",
"pushed_at": "2022-04-27T05:52:43Z",
- "stargazers_count": 370,
- "watchers_count": 370,
+ "stargazers_count": 369,
+ "watchers_count": 369,
"has_discussions": false,
"forks_count": 90,
"allow_forking": true,
@@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 90,
- "watchers": 370,
+ "watchers": 369,
"score": 0,
"subscribers_count": 8
},
diff --git a/2022/CVE-2022-41678.json b/2022/CVE-2022-41678.json
index 99b2cd6e6e..1a002c6236 100644
--- a/2022/CVE-2022-41678.json
+++ b/2022/CVE-2022-41678.json
@@ -19,7 +19,7 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -33,7 +33,7 @@
"remote-code-execution"
],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
diff --git a/2023/CVE-2023-2163.json b/2023/CVE-2023-2163.json
index 911c6dfea2..95eea893b0 100644
--- a/2023/CVE-2023-2163.json
+++ b/2023/CVE-2023-2163.json
@@ -19,13 +19,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
diff --git a/2023/CVE-2023-25690.json b/2023/CVE-2023-25690.json
index a61247e9f6..98512ea962 100644
--- a/2023/CVE-2023-25690.json
+++ b/2023/CVE-2023-25690.json
@@ -49,10 +49,10 @@
"description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.",
"fork": false,
"created_at": "2023-05-22T03:06:31Z",
- "updated_at": "2024-12-13T21:40:02Z",
+ "updated_at": "2024-12-14T21:15:43Z",
"pushed_at": "2024-08-24T13:38:50Z",
- "stargazers_count": 272,
- "watchers_count": 272,
+ "stargazers_count": 273,
+ "watchers_count": 273,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@@ -69,7 +69,7 @@
],
"visibility": "public",
"forks": 36,
- "watchers": 272,
+ "watchers": 273,
"score": 0,
"subscribers_count": 4
},
diff --git a/2023/CVE-2023-38709.json b/2023/CVE-2023-38709.json
index e6a9f4f89a..0c59d0744c 100644
--- a/2023/CVE-2023-38709.json
+++ b/2023/CVE-2023-38709.json
@@ -14,10 +14,10 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false,
"created_at": "2024-10-05T20:32:45Z",
- "updated_at": "2024-12-14T15:40:05Z",
+ "updated_at": "2024-12-14T21:37:35Z",
"pushed_at": "2024-10-05T20:37:02Z",
- "stargazers_count": 18,
- "watchers_count": 18,
+ "stargazers_count": 20,
+ "watchers_count": 20,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@@ -37,7 +37,7 @@
],
"visibility": "public",
"forks": 6,
- "watchers": 18,
+ "watchers": 20,
"score": 0,
"subscribers_count": 1
}
diff --git a/2023/CVE-2023-43208.json b/2023/CVE-2023-43208.json
index 5f73c63719..03da9b3b84 100644
--- a/2023/CVE-2023-43208.json
+++ b/2023/CVE-2023-43208.json
@@ -126,13 +126,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json
index 860e680b4a..c32087d8d8 100644
--- a/2023/CVE-2023-45866.json
+++ b/2023/CVE-2023-45866.json
@@ -45,10 +45,10 @@
"description": "CVE-2023-45866 - BluetoothDucky implementation (Using DuckyScript)",
"fork": false,
"created_at": "2024-01-16T07:44:35Z",
- "updated_at": "2024-10-03T14:16:35Z",
+ "updated_at": "2024-12-14T19:08:14Z",
"pushed_at": "2024-01-15T15:16:40Z",
- "stargazers_count": 7,
- "watchers_count": 7,
+ "stargazers_count": 8,
+ "watchers_count": 8,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
- "watchers": 7,
+ "watchers": 8,
"score": 0,
"subscribers_count": 0
},
diff --git a/2024/CVE-2024-0044.json b/2024/CVE-2024-0044.json
index 6c90c9ddc5..da0684722f 100644
--- a/2024/CVE-2024-0044.json
+++ b/2024/CVE-2024-0044.json
@@ -200,10 +200,10 @@
"description": "EvilDroid automates the exploitation of CVE-2024-0044, installing malicious payloads on a target device and extracting sensitive data. It features automated ADB connection checks, APK pushing, UID extraction, payload generation, and real-time progress updates, providing a seamless and professional user experience.",
"fork": false,
"created_at": "2024-08-04T13:14:10Z",
- "updated_at": "2024-11-20T16:30:59Z",
+ "updated_at": "2024-12-14T20:46:44Z",
"pushed_at": "2024-08-05T14:13:18Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -212,7 +212,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 0,
+ "watchers": 1,
"score": 0,
"subscribers_count": 1
},
diff --git a/2024/CVE-2024-10542.json b/2024/CVE-2024-10542.json
index 9e5be9f18e..d997fd0d30 100644
--- a/2024/CVE-2024-10542.json
+++ b/2024/CVE-2024-10542.json
@@ -19,13 +19,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
diff --git a/2024/CVE-2024-10914.json b/2024/CVE-2024-10914.json
index d01b303165..c5d3d6a7f2 100644
--- a/2024/CVE-2024-10914.json
+++ b/2024/CVE-2024-10914.json
@@ -182,13 +182,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
@@ -213,7 +213,7 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
- "forks_count": 1,
+ "forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -226,7 +226,7 @@
"proof-of-concept"
],
"visibility": "public",
- "forks": 1,
+ "forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 1
diff --git a/2024/CVE-2024-11003.json b/2024/CVE-2024-11003.json
index 99624ab972..8713c63323 100644
--- a/2024/CVE-2024-11003.json
+++ b/2024/CVE-2024-11003.json
@@ -19,13 +19,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
diff --git a/2024/CVE-2024-11477.json b/2024/CVE-2024-11477.json
index 288ea8bbac..e052be8cdd 100644
--- a/2024/CVE-2024-11477.json
+++ b/2024/CVE-2024-11477.json
@@ -19,13 +19,13 @@
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
- "forks_count": 9,
+ "forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 9,
+ "forks": 10,
"watchers": 44,
"score": 0,
"subscribers_count": 1
diff --git a/2024/CVE-2024-12155.json b/2024/CVE-2024-12155.json
index 8b82232c8e..0aef757853 100644
--- a/2024/CVE-2024-12155.json
+++ b/2024/CVE-2024-12155.json
@@ -14,10 +14,10 @@
"description": "CVE-2024-12155 Missing Authorization (CWE-862)",
"fork": false,
"created_at": "2024-12-06T13:03:09Z",
- "updated_at": "2024-12-09T12:49:04Z",
+ "updated_at": "2024-12-14T20:28:42Z",
"pushed_at": "2024-12-06T13:13:21Z",
- "stargazers_count": 2,
- "watchers_count": 2,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 2,
+ "watchers": 1,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-20767.json b/2024/CVE-2024-20767.json
index 0ea3650c67..6923d07004 100644
--- a/2024/CVE-2024-20767.json
+++ b/2024/CVE-2024-20767.json
@@ -14,10 +14,10 @@
"description": "Exploit for CVE-2024-20767 - Adobe ColdFusion",
"fork": false,
"created_at": "2024-03-26T06:51:08Z",
- "updated_at": "2024-12-06T09:40:39Z",
+ "updated_at": "2024-12-14T21:15:49Z",
"pushed_at": "2024-03-26T15:52:49Z",
- "stargazers_count": 32,
- "watchers_count": 32,
+ "stargazers_count": 31,
+ "watchers_count": 31,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 9,
- "watchers": 32,
+ "watchers": 31,
"score": 0,
"subscribers_count": 1
},
diff --git a/2024/CVE-2024-21534.json b/2024/CVE-2024-21534.json
index 21c79d862d..c1ec8a854a 100644
--- a/2024/CVE-2024-21534.json
+++ b/2024/CVE-2024-21534.json
@@ -85,7 +85,7 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -98,7 +98,7 @@
"sanitization"
],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
diff --git a/2024/CVE-2024-23113.json b/2024/CVE-2024-23113.json
index 6369f05e60..4207db902c 100644
--- a/2024/CVE-2024-23113.json
+++ b/2024/CVE-2024-23113.json
@@ -138,10 +138,10 @@
"description": null,
"fork": false,
"created_at": "2024-11-15T13:23:19Z",
- "updated_at": "2024-11-29T16:24:07Z",
+ "updated_at": "2024-12-14T20:30:28Z",
"pushed_at": "2024-11-15T13:25:50Z",
- "stargazers_count": 3,
- "watchers_count": 3,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -150,7 +150,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 3,
+ "watchers": 1,
"score": 0,
"subscribers_count": 1
},
@@ -210,13 +210,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
diff --git a/2024/CVE-2024-23653.json b/2024/CVE-2024-23653.json
new file mode 100644
index 0000000000..69c9932e52
--- /dev/null
+++ b/2024/CVE-2024-23653.json
@@ -0,0 +1,33 @@
+[
+ {
+ "id": 903010615,
+ "name": "CVE-2024-23653",
+ "full_name": "666asd\/CVE-2024-23653",
+ "owner": {
+ "login": "666asd",
+ "id": 16465586,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16465586?v=4",
+ "html_url": "https:\/\/github.com\/666asd",
+ "user_view_type": "public"
+ },
+ "html_url": "https:\/\/github.com\/666asd\/CVE-2024-23653",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-12-13T18:27:39Z",
+ "updated_at": "2024-12-14T20:38:41Z",
+ "pushed_at": "2024-12-13T18:54:57Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-26229.json b/2024/CVE-2024-26229.json
index bc0b3ad9a1..7236aabbc5 100644
--- a/2024/CVE-2024-26229.json
+++ b/2024/CVE-2024-26229.json
@@ -138,10 +138,10 @@
"description": "A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user",
"fork": false,
"created_at": "2024-08-04T17:40:51Z",
- "updated_at": "2024-12-03T09:06:04Z",
+ "updated_at": "2024-12-14T19:10:57Z",
"pushed_at": "2024-08-15T10:48:05Z",
- "stargazers_count": 33,
- "watchers_count": 33,
+ "stargazers_count": 34,
+ "watchers_count": 34,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@@ -150,7 +150,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
- "watchers": 33,
+ "watchers": 34,
"score": 0,
"subscribers_count": 2
},
diff --git a/2024/CVE-2024-27198.json b/2024/CVE-2024-27198.json
index 6261fee362..971c974855 100644
--- a/2024/CVE-2024-27198.json
+++ b/2024/CVE-2024-27198.json
@@ -79,10 +79,10 @@
"description": "CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4",
"fork": false,
"created_at": "2024-03-06T03:15:03Z",
- "updated_at": "2024-12-08T12:52:01Z",
+ "updated_at": "2024-12-15T00:00:49Z",
"pushed_at": "2024-03-11T07:57:40Z",
- "stargazers_count": 145,
- "watchers_count": 145,
+ "stargazers_count": 146,
+ "watchers_count": 146,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@@ -101,7 +101,7 @@
],
"visibility": "public",
"forks": 36,
- "watchers": 145,
+ "watchers": 146,
"score": 0,
"subscribers_count": 3
},
diff --git a/2024/CVE-2024-28987.json b/2024/CVE-2024-28987.json
index 94b4a66fa9..9f92d1c9dd 100644
--- a/2024/CVE-2024-28987.json
+++ b/2024/CVE-2024-28987.json
@@ -107,10 +107,10 @@
"description": null,
"fork": false,
"created_at": "2024-11-15T13:27:46Z",
- "updated_at": "2024-11-29T16:24:07Z",
+ "updated_at": "2024-12-14T20:30:29Z",
"pushed_at": "2024-11-15T13:31:14Z",
- "stargazers_count": 3,
- "watchers_count": 3,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 3,
+ "watchers": 1,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-29847.json b/2024/CVE-2024-29847.json
index d09acb88f9..8656a7f2b7 100644
--- a/2024/CVE-2024-29847.json
+++ b/2024/CVE-2024-29847.json
@@ -14,10 +14,10 @@
"description": "Exploit for CVE-2024-29847",
"fork": false,
"created_at": "2024-09-14T21:51:41Z",
- "updated_at": "2024-12-04T06:22:57Z",
+ "updated_at": "2024-12-14T20:58:12Z",
"pushed_at": "2024-09-15T08:07:22Z",
- "stargazers_count": 17,
- "watchers_count": 17,
+ "stargazers_count": 18,
+ "watchers_count": 18,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
- "watchers": 17,
+ "watchers": 18,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-36401.json b/2024/CVE-2024-36401.json
index dcf4d192bd..06bbe63cfe 100644
--- a/2024/CVE-2024-36401.json
+++ b/2024/CVE-2024-36401.json
@@ -491,13 +491,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
diff --git a/2024/CVE-2024-37032.json b/2024/CVE-2024-37032.json
index d6b2e57696..26bd53aaa2 100644
--- a/2024/CVE-2024-37032.json
+++ b/2024/CVE-2024-37032.json
@@ -14,10 +14,10 @@
"description": "Path traversal in Ollama with rogue registry server",
"fork": false,
"created_at": "2024-06-26T03:11:29Z",
- "updated_at": "2024-12-01T12:59:57Z",
+ "updated_at": "2024-12-14T21:15:50Z",
"pushed_at": "2024-06-28T03:14:05Z",
- "stargazers_count": 21,
- "watchers_count": 21,
+ "stargazers_count": 20,
+ "watchers_count": 20,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
- "watchers": 21,
+ "watchers": 20,
"score": 0,
"subscribers_count": 1
},
diff --git a/2024/CVE-2024-38472.json b/2024/CVE-2024-38472.json
index 966dc78fa8..42efaebd66 100644
--- a/2024/CVE-2024-38472.json
+++ b/2024/CVE-2024-38472.json
@@ -45,10 +45,10 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false,
"created_at": "2024-10-05T20:32:45Z",
- "updated_at": "2024-12-14T15:40:05Z",
+ "updated_at": "2024-12-14T21:37:35Z",
"pushed_at": "2024-10-05T20:37:02Z",
- "stargazers_count": 18,
- "watchers_count": 18,
+ "stargazers_count": 20,
+ "watchers_count": 20,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@@ -68,7 +68,7 @@
],
"visibility": "public",
"forks": 6,
- "watchers": 18,
+ "watchers": 20,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-38819.json b/2024/CVE-2024-38819.json
index 1dba3bec62..79427a33f3 100644
--- a/2024/CVE-2024-38819.json
+++ b/2024/CVE-2024-38819.json
@@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-12-14T09:22:33Z",
- "updated_at": "2024-12-14T17:39:48Z",
+ "updated_at": "2024-12-14T23:15:11Z",
"pushed_at": "2024-12-14T10:13:45Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 1,
+ "watchers": 2,
"score": 0,
"subscribers_count": 0
}
diff --git a/2024/CVE-2024-39090.json b/2024/CVE-2024-39090.json
index 091aa24c42..4c8ce7e5b5 100644
--- a/2024/CVE-2024-39090.json
+++ b/2024/CVE-2024-39090.json
@@ -19,13 +19,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
diff --git a/2024/CVE-2024-43532.json b/2024/CVE-2024-43532.json
index 0d5932a845..20f97091e3 100644
--- a/2024/CVE-2024-43532.json
+++ b/2024/CVE-2024-43532.json
@@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-11-15T13:15:39Z",
- "updated_at": "2024-11-29T16:24:07Z",
+ "updated_at": "2024-12-14T20:30:28Z",
"pushed_at": "2024-11-15T13:19:13Z",
- "stargazers_count": 3,
- "watchers_count": 3,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 3,
+ "watchers": 1,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-45519.json b/2024/CVE-2024-45519.json
index df6dbe9d7c..9491791800 100644
--- a/2024/CVE-2024-45519.json
+++ b/2024/CVE-2024-45519.json
@@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-09-28T08:29:06Z",
- "updated_at": "2024-11-05T02:40:56Z",
+ "updated_at": "2024-12-14T20:49:31Z",
"pushed_at": "2024-09-28T08:34:05Z",
- "stargazers_count": 41,
- "watchers_count": 41,
+ "stargazers_count": 42,
+ "watchers_count": 42,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
- "watchers": 41,
+ "watchers": 42,
"score": 0,
"subscribers_count": 2
},
diff --git a/2024/CVE-2024-47575.json b/2024/CVE-2024-47575.json
index c049ea77ba..6f9d697144 100644
--- a/2024/CVE-2024-47575.json
+++ b/2024/CVE-2024-47575.json
@@ -76,10 +76,10 @@
"description": null,
"fork": false,
"created_at": "2024-11-15T13:19:33Z",
- "updated_at": "2024-11-29T16:24:07Z",
+ "updated_at": "2024-12-14T20:30:28Z",
"pushed_at": "2024-11-15T18:56:01Z",
- "stargazers_count": 3,
- "watchers_count": 3,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 3,
+ "watchers": 1,
"score": 0,
"subscribers_count": 1
},
diff --git a/2024/CVE-2024-49369.json b/2024/CVE-2024-49369.json
index 03ce8439e3..00ffc72b9c 100644
--- a/2024/CVE-2024-49369.json
+++ b/2024/CVE-2024-49369.json
@@ -19,13 +19,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
diff --git a/2024/CVE-2024-7479.json b/2024/CVE-2024-7479.json
index 8d712c4a13..b7761958c8 100644
--- a/2024/CVE-2024-7479.json
+++ b/2024/CVE-2024-7479.json
@@ -14,10 +14,10 @@
"description": "TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.",
"fork": false,
"created_at": "2024-09-29T10:58:15Z",
- "updated_at": "2024-12-11T10:54:19Z",
+ "updated_at": "2024-12-14T21:15:50Z",
"pushed_at": "2024-10-04T09:39:09Z",
- "stargazers_count": 130,
- "watchers_count": 130,
+ "stargazers_count": 129,
+ "watchers_count": 129,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
- "watchers": 130,
+ "watchers": 129,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-9326.json b/2024/CVE-2024-9326.json
index a8be47e1c3..640d256a0c 100644
--- a/2024/CVE-2024-9326.json
+++ b/2024/CVE-2024-9326.json
@@ -19,13 +19,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
diff --git a/README.md b/README.md
index 777f337076..bdea018f45 100644
--- a/README.md
+++ b/README.md
@@ -3016,6 +3016,13 @@
- [abian2/CVE-2024-23652](https://github.com/abian2/CVE-2024-23652)
+### CVE-2024-23653 (2024-01-31)
+
+BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner. In addition to running containers as build steps, BuildKit also provides APIs for running interactive containers based on built images. It was possible to use these APIs to ask BuildKit to run a container with elevated privileges. Normally, running such containers is only allowed if special `security.insecure` entitlement is enabled both by buildkitd configuration and allowed by the user initializing the build request. The issue has been fixed in v0.12.5 . Avoid using BuildKit frontends from untrusted sources. \n
+
+
+- [666asd/CVE-2024-23653](https://github.com/666asd/CVE-2024-23653)
+
### CVE-2024-23692 (2024-05-31)
Rejetto HTTP File Server, up to and including version 2.3m, is vulnerable to a template injection vulnerability. This vulnerability allows a remote, unauthenticated attacker to execute arbitrary commands on the affected system by sending a specially crafted HTTP request. As of the CVE assignment date, Rejetto HFS 2.3m is no longer supported.
@@ -17888,7 +17895,7 @@
- [sohamsharma966/Spring4Shell-CVE-2022-22965](https://github.com/sohamsharma966/Spring4Shell-CVE-2022-22965)
- [LucasPDiniz/CVE-2022-22965](https://github.com/LucasPDiniz/CVE-2022-22965)
- [xsxtw/SpringFramework_CVE-2022-22965_RCE](https://github.com/xsxtw/SpringFramework_CVE-2022-22965_RCE)
-- [BlackBird63030/Block-Spring4Shell](https://github.com/BlackBird63030/Block-Spring4Shell)
+- [SkyM1raj/Block-Spring4Shell](https://github.com/SkyM1raj/Block-Spring4Shell)
- [guigui237/Expoitation-de-la-vuln-rabilit-CVE-2022-22965](https://github.com/guigui237/Expoitation-de-la-vuln-rabilit-CVE-2022-22965)
### CVE-2022-22966 (2022-04-14)