diff --git a/2013/CVE-2013-0156.json b/2013/CVE-2013-0156.json index 9d4ec58f5b..79df7a90ce 100644 --- a/2013/CVE-2013-0156.json +++ b/2013/CVE-2013-0156.json @@ -57,7 +57,7 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 105 + "subscribers_count": 108 }, { "id": 7564614, diff --git a/2013/CVE-2013-0269.json b/2013/CVE-2013-0269.json index dedd428b06..4911345100 100644 --- a/2013/CVE-2013-0269.json +++ b/2013/CVE-2013-0269.json @@ -27,6 +27,6 @@ "forks": 2, "watchers": 2, "score": 0, - "subscribers_count": 107 + "subscribers_count": 110 } ] \ No newline at end of file diff --git a/2013/CVE-2013-0333.json b/2013/CVE-2013-0333.json index cbb8292655..30735feb9b 100644 --- a/2013/CVE-2013-0333.json +++ b/2013/CVE-2013-0333.json @@ -27,6 +27,6 @@ "forks": 1, "watchers": 2, "score": 0, - "subscribers_count": 106 + "subscribers_count": 109 } ] \ No newline at end of file diff --git a/2014/CVE-2014-0160.json b/2014/CVE-2014-0160.json index 9ed1e1f9f5..ff14ae0eda 100644 --- a/2014/CVE-2014-0160.json +++ b/2014/CVE-2014-0160.json @@ -417,7 +417,7 @@ "forks": 84, "watchers": 158, "score": 0, - "subscribers_count": 8 + "subscribers_count": 7 }, { "id": 18613807, diff --git a/2017/CVE-2017-0199.json b/2017/CVE-2017-0199.json index a95dda1639..829c3b0098 100644 --- a/2017/CVE-2017-0199.json +++ b/2017/CVE-2017-0199.json @@ -73,10 +73,10 @@ "description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.", "fork": false, "created_at": "2017-04-17T08:10:07Z", - "updated_at": "2024-07-27T20:22:47Z", + "updated_at": "2024-08-02T16:23:04Z", "pushed_at": "2017-11-19T11:01:16Z", - "stargazers_count": 720, - "watchers_count": 720, + "stargazers_count": 722, + "watchers_count": 722, "has_discussions": false, "forks_count": 263, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 263, - "watchers": 720, + "watchers": 722, "score": 0, "subscribers_count": 48 }, diff --git a/2017/CVE-2017-3066.json b/2017/CVE-2017-3066.json index 0671ab772a..cf7ffebe3d 100644 --- a/2017/CVE-2017-3066.json +++ b/2017/CVE-2017-3066.json @@ -13,10 +13,10 @@ "description": "Exploitation Tool for CVE-2017-3066 targeting Adobe Coldfusion 11\/12", "fork": false, "created_at": "2018-03-12T16:44:12Z", - "updated_at": "2024-06-28T07:51:23Z", + "updated_at": "2024-08-02T14:13:18Z", "pushed_at": "2022-10-18T08:53:13Z", - "stargazers_count": 96, - "watchers_count": 96, + "stargazers_count": 97, + "watchers_count": 97, "has_discussions": false, "forks_count": 33, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 33, - "watchers": 96, + "watchers": 97, "score": 0, "subscribers_count": 6 }, diff --git a/2019/CVE-2019-11932.json b/2019/CVE-2019-11932.json index 323f03d884..267c153e36 100644 --- a/2019/CVE-2019-11932.json +++ b/2019/CVE-2019-11932.json @@ -13,10 +13,10 @@ "description": " double-free bug in WhatsApp exploit poc", "fork": false, "created_at": "2019-10-03T09:26:24Z", - "updated_at": "2024-06-07T13:28:46Z", + "updated_at": "2024-08-02T18:08:28Z", "pushed_at": "2021-03-19T17:23:25Z", - "stargazers_count": 268, - "watchers_count": 268, + "stargazers_count": 269, + "watchers_count": 269, "has_discussions": false, "forks_count": 78, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 78, - "watchers": 268, + "watchers": 269, "score": 0, "subscribers_count": 16 }, @@ -43,10 +43,10 @@ "description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif", "fork": false, "created_at": "2019-10-04T14:43:57Z", - "updated_at": "2024-07-03T20:15:08Z", + "updated_at": "2024-08-02T18:08:30Z", "pushed_at": "2019-11-30T10:28:01Z", - "stargazers_count": 201, - "watchers_count": 201, + "stargazers_count": 202, + "watchers_count": 202, "has_discussions": false, "forks_count": 106, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 106, - "watchers": 201, + "watchers": 202, "score": 0, "subscribers_count": 10 }, diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 413e1c52fb..39a0fa616b 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -103,10 +103,10 @@ "description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618,CVE-2019-2729检测,Python3支持", "fork": false, "created_at": "2019-06-21T09:22:43Z", - "updated_at": "2024-08-01T15:44:33Z", + "updated_at": "2024-08-02T14:10:44Z", "pushed_at": "2024-06-16T15:35:20Z", - "stargazers_count": 943, - "watchers_count": 943, + "stargazers_count": 944, + "watchers_count": 944, "has_discussions": false, "forks_count": 179, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 179, - "watchers": 943, + "watchers": 944, "score": 0, "subscribers_count": 18 }, diff --git a/2020/CVE-2020-0787.json b/2020/CVE-2020-0787.json index ad27ae5c41..ea196cfbc7 100644 --- a/2020/CVE-2020-0787.json +++ b/2020/CVE-2020-0787.json @@ -13,10 +13,10 @@ "description": "Support ALL Windows Version", "fork": false, "created_at": "2020-06-16T08:57:51Z", - "updated_at": "2024-06-28T07:58:05Z", + "updated_at": "2024-08-02T17:56:40Z", "pushed_at": "2020-09-11T07:38:22Z", - "stargazers_count": 715, - "watchers_count": 715, + "stargazers_count": 714, + "watchers_count": 714, "has_discussions": false, "forks_count": 175, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 175, - "watchers": 715, + "watchers": 714, "score": 0, "subscribers_count": 19 }, diff --git a/2020/CVE-2020-11932.json b/2020/CVE-2020-11932.json index 1946644fb4..796b29a8f5 100644 --- a/2020/CVE-2020-11932.json +++ b/2020/CVE-2020-11932.json @@ -13,10 +13,10 @@ "description": "Double-Free BUG in WhatsApp exploit poc.", "fork": false, "created_at": "2020-05-10T15:25:59Z", - "updated_at": "2024-07-16T13:09:37Z", + "updated_at": "2024-08-02T18:08:26Z", "pushed_at": "2020-05-10T15:32:54Z", - "stargazers_count": 90, - "watchers_count": 90, + "stargazers_count": 91, + "watchers_count": 91, "has_discussions": false, "forks_count": 38, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 38, - "watchers": 90, + "watchers": 91, "score": 0, "subscribers_count": 6 }, diff --git a/2020/CVE-2020-12928.json b/2020/CVE-2020-12928.json index 56146c837e..5b58896fa0 100644 --- a/2020/CVE-2020-12928.json +++ b/2020/CVE-2020-12928.json @@ -13,10 +13,10 @@ "description": "Early 2019 - late 2020. R.I.P. CVE-2020-12928 https:\/\/h0mbre.github.io\/RyzenMaster_CVE\/#", "fork": false, "created_at": "2020-11-10T13:08:21Z", - "updated_at": "2024-07-08T15:20:06Z", + "updated_at": "2024-08-02T17:56:42Z", "pushed_at": "2021-02-14T15:08:01Z", - "stargazers_count": 47, - "watchers_count": 47, + "stargazers_count": 46, + "watchers_count": 46, "has_discussions": false, "forks_count": 27, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 27, - "watchers": 47, + "watchers": 46, "score": 0, "subscribers_count": 5 } diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 2217502c24..8e736dcbec 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -43,10 +43,10 @@ "description": "Test tool for CVE-2020-1472", "fork": false, "created_at": "2020-09-08T08:58:37Z", - "updated_at": "2024-07-27T01:58:42Z", + "updated_at": "2024-08-02T18:15:07Z", "pushed_at": "2023-07-20T10:51:42Z", - "stargazers_count": 1713, - "watchers_count": 1713, + "stargazers_count": 1712, + "watchers_count": 1712, "has_discussions": false, "forks_count": 359, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 359, - "watchers": 1713, + "watchers": 1712, "score": 0, "subscribers_count": 87 }, diff --git a/2020/CVE-2020-7931.json b/2020/CVE-2020-7931.json index 3b3f703e8a..243dec87b7 100644 --- a/2020/CVE-2020-7931.json +++ b/2020/CVE-2020-7931.json @@ -13,10 +13,10 @@ "description": "Hacking Artifactory with server side template injection", "fork": false, "created_at": "2020-03-11T13:56:43Z", - "updated_at": "2023-11-13T23:45:39Z", + "updated_at": "2024-08-02T13:41:31Z", "pushed_at": "2020-03-12T06:55:39Z", - "stargazers_count": 50, - "watchers_count": 50, + "stargazers_count": 51, + "watchers_count": 51, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 15, - "watchers": 50, + "watchers": 51, "score": 0, "subscribers_count": 4 } diff --git a/2021/CVE-2021-36260.json b/2021/CVE-2021-36260.json index 2d389855b2..f61ce144b8 100644 --- a/2021/CVE-2021-36260.json +++ b/2021/CVE-2021-36260.json @@ -48,13 +48,13 @@ "stargazers_count": 240, "watchers_count": 240, "has_discussions": false, - "forks_count": 74, + "forks_count": 75, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 74, + "forks": 75, "watchers": 240, "score": 0, "subscribers_count": 6 diff --git a/2022/CVE-2022-21449.json b/2022/CVE-2022-21449.json index 24c4554842..2d7271e0be 100644 --- a/2022/CVE-2022-21449.json +++ b/2022/CVE-2022-21449.json @@ -315,8 +315,8 @@ "description": "Reappear-CVE-2022-21449-TLS-PoC", "fork": false, "created_at": "2024-08-01T03:27:17Z", - "updated_at": "2024-08-02T09:06:10Z", - "pushed_at": "2024-08-02T09:06:08Z", + "updated_at": "2024-08-02T16:45:30Z", + "pushed_at": "2024-08-02T16:45:27Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-21894.json b/2022/CVE-2022-21894.json index 7d49c1a110..1979498634 100644 --- a/2022/CVE-2022-21894.json +++ b/2022/CVE-2022-21894.json @@ -13,10 +13,10 @@ "description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability", "fork": false, "created_at": "2022-08-09T15:53:48Z", - "updated_at": "2024-08-01T15:57:23Z", + "updated_at": "2024-08-02T16:54:09Z", "pushed_at": "2023-09-27T06:44:27Z", - "stargazers_count": 285, - "watchers_count": 285, + "stargazers_count": 286, + "watchers_count": 286, "has_discussions": false, "forks_count": 59, "allow_forking": true, @@ -33,7 +33,7 @@ ], "visibility": "public", "forks": 59, - "watchers": 285, + "watchers": 286, "score": 0, "subscribers_count": 11 }, diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index 2e79ca8a87..a842c358a0 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -616,10 +616,10 @@ "description": null, "fork": false, "created_at": "2022-06-03T08:51:44Z", - "updated_at": "2024-06-13T21:25:36Z", + "updated_at": "2024-08-02T13:01:19Z", "pushed_at": "2022-06-03T08:52:06Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -628,7 +628,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 2 }, diff --git a/2022/CVE-2022-42889.json b/2022/CVE-2022-42889.json index 99e87f54e1..8f5388c1c1 100644 --- a/2022/CVE-2022-42889.json +++ b/2022/CVE-2022-42889.json @@ -150,7 +150,7 @@ "stargazers_count": 76, "watchers_count": 76, "has_discussions": false, - "forks_count": 29, + "forks_count": 30, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -164,7 +164,7 @@ "text4shell" ], "visibility": "public", - "forks": 29, + "forks": 30, "watchers": 76, "score": 0, "subscribers_count": 1 diff --git a/2023/CVE-2023-22622.json b/2023/CVE-2023-22622.json new file mode 100644 index 0000000000..45bab66fcf --- /dev/null +++ b/2023/CVE-2023-22622.json @@ -0,0 +1,32 @@ +[ + { + "id": 774948865, + "name": "CVE-2023-22622", + "full_name": "michael-david-fry\/CVE-2023-22622", + "owner": { + "login": "michael-david-fry", + "id": 4213469, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4213469?v=4", + "html_url": "https:\/\/github.com\/michael-david-fry" + }, + "html_url": "https:\/\/github.com\/michael-david-fry\/CVE-2023-22622", + "description": "Python Script that will DoS a WP server that is utilizing WP-CRON", + "fork": false, + "created_at": "2024-03-20T13:48:48Z", + "updated_at": "2024-08-02T13:26:56Z", + "pushed_at": "2024-08-02T13:26:53Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-27372.json b/2023/CVE-2023-27372.json index a669617ac6..741ceb6eaf 100644 --- a/2023/CVE-2023-27372.json +++ b/2023/CVE-2023-27372.json @@ -74,6 +74,36 @@ "score": 0, "subscribers_count": 2 }, + { + "id": 661062372, + "name": "CVE-2023-27372", + "full_name": "Jhonsonwannaa\/CVE-2023-27372", + "owner": { + "login": "Jhonsonwannaa", + "id": 114837630, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114837630?v=4", + "html_url": "https:\/\/github.com\/Jhonsonwannaa" + }, + "html_url": "https:\/\/github.com\/Jhonsonwannaa\/CVE-2023-27372", + "description": "spip", + "fork": false, + "created_at": "2023-07-01T17:08:36Z", + "updated_at": "2024-08-02T12:55:02Z", + "pushed_at": "2024-08-02T12:54:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + }, { "id": 662629965, "name": "CVE-2023-27372-PoC", diff --git a/2023/CVE-2023-29357.json b/2023/CVE-2023-29357.json index 4f0f986ebf..dcef282d15 100644 --- a/2023/CVE-2023-29357.json +++ b/2023/CVE-2023-29357.json @@ -13,10 +13,10 @@ "description": "Microsoft SharePoint Server Elevation of Privilege Vulnerability", "fork": false, "created_at": "2023-09-26T16:18:41Z", - "updated_at": "2024-08-02T07:41:45Z", + "updated_at": "2024-08-02T14:08:27Z", "pushed_at": "2023-09-26T19:04:21Z", - "stargazers_count": 216, - "watchers_count": 216, + "stargazers_count": 217, + "watchers_count": 217, "has_discussions": false, "forks_count": 31, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 31, - "watchers": 216, + "watchers": 217, "score": 0, "subscribers_count": 4 }, @@ -50,10 +50,10 @@ "description": null, "fork": false, "created_at": "2023-09-30T23:17:04Z", - "updated_at": "2024-06-21T00:11:34Z", + "updated_at": "2024-08-02T14:08:31Z", "pushed_at": "2023-10-10T19:00:30Z", - "stargazers_count": 48, - "watchers_count": 48, + "stargazers_count": 49, + "watchers_count": 49, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -62,7 +62,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 48, + "watchers": 49, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-50564.json b/2023/CVE-2023-50564.json index 1b757ac26e..84d52bac8b 100644 --- a/2023/CVE-2023-50564.json +++ b/2023/CVE-2023-50564.json @@ -28,5 +28,35 @@ "watchers": 1, "score": 0, "subscribers_count": 2 + }, + { + "id": 837227856, + "name": "CVE-2023-50564", + "full_name": "ipuig\/CVE-2023-50564", + "owner": { + "login": "ipuig", + "id": 109107529, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109107529?v=4", + "html_url": "https:\/\/github.com\/ipuig" + }, + "html_url": "https:\/\/github.com\/ipuig\/CVE-2023-50564", + "description": "CVE-2023-50564 PoC", + "fork": false, + "created_at": "2024-08-02T13:37:39Z", + "updated_at": "2024-08-02T14:03:32Z", + "pushed_at": "2024-08-02T14:01:59Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index 6500169687..46d2b3b8b6 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -13,10 +13,10 @@ "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "fork": false, "created_at": "2024-03-20T21:16:41Z", - "updated_at": "2024-08-02T08:45:28Z", + "updated_at": "2024-08-02T16:35:12Z", "pushed_at": "2024-04-17T16:09:54Z", - "stargazers_count": 2199, - "watchers_count": 2199, + "stargazers_count": 2200, + "watchers_count": 2200, "has_discussions": false, "forks_count": 288, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 288, - "watchers": 2199, + "watchers": 2200, "score": 0, "subscribers_count": 23 }, diff --git a/2024/CVE-2024-21006.json b/2024/CVE-2024-21006.json index 812cb259e2..164ede2c47 100644 --- a/2024/CVE-2024-21006.json +++ b/2024/CVE-2024-21006.json @@ -43,10 +43,10 @@ "description": "CVE-2024-21006 exp", "fork": false, "created_at": "2024-07-02T06:25:14Z", - "updated_at": "2024-08-02T09:31:21Z", + "updated_at": "2024-08-02T15:58:57Z", "pushed_at": "2024-07-29T19:39:15Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-21338.json b/2024/CVE-2024-21338.json index 6d95c87aa0..e51a27f9af 100644 --- a/2024/CVE-2024-21338.json +++ b/2024/CVE-2024-21338.json @@ -13,10 +13,10 @@ "description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.", "fork": false, "created_at": "2024-04-13T05:53:02Z", - "updated_at": "2024-07-30T23:08:25Z", + "updated_at": "2024-08-02T14:48:29Z", "pushed_at": "2024-04-16T21:00:14Z", - "stargazers_count": 248, - "watchers_count": 248, + "stargazers_count": 249, + "watchers_count": 249, "has_discussions": false, "forks_count": 56, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 56, - "watchers": 248, + "watchers": 249, "score": 0, "subscribers_count": 3 }, @@ -163,12 +163,12 @@ "description": "Windows AppLocker Driver (appid.sys) LPE", "fork": false, "created_at": "2024-07-29T13:18:06Z", - "updated_at": "2024-08-02T11:36:50Z", + "updated_at": "2024-08-02T16:38:22Z", "pushed_at": "2024-07-29T13:29:59Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, - "forks_count": 2, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -179,8 +179,8 @@ "windowd" ], "visibility": "public", - "forks": 2, - "watchers": 5, + "forks": 4, + "watchers": 9, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-21626.json b/2024/CVE-2024-21626.json index 073af38046..7725db2498 100644 --- a/2024/CVE-2024-21626.json +++ b/2024/CVE-2024-21626.json @@ -43,10 +43,10 @@ "description": "PoC and Detection for CVE-2024-21626", "fork": false, "created_at": "2024-02-01T15:28:37Z", - "updated_at": "2024-07-17T13:46:35Z", + "updated_at": "2024-08-02T13:13:35Z", "pushed_at": "2024-02-06T16:09:05Z", - "stargazers_count": 65, - "watchers_count": 65, + "stargazers_count": 66, + "watchers_count": 66, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 10, - "watchers": 65, + "watchers": 66, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-22243.json b/2024/CVE-2024-22243.json index e248410f8b..7f49b6c12d 100644 --- a/2024/CVE-2024-22243.json +++ b/2024/CVE-2024-22243.json @@ -13,10 +13,10 @@ "description": "Example exploitable scenarios for CVE-2024-22243 affecting the Spring framework (open redirect & SSRF).", "fork": false, "created_at": "2024-02-21T12:55:22Z", - "updated_at": "2024-05-21T05:07:10Z", + "updated_at": "2024-08-02T17:18:27Z", "pushed_at": "2024-05-20T13:15:00Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -37,7 +37,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-24919.json b/2024/CVE-2024-24919.json index 05e2887019..7de45ad539 100644 --- a/2024/CVE-2024-24919.json +++ b/2024/CVE-2024-24919.json @@ -108,7 +108,7 @@ "stargazers_count": 11, "watchers_count": 11, "has_discussions": false, - "forks_count": 4, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -120,7 +120,7 @@ "poc" ], "visibility": "public", - "forks": 4, + "forks": 5, "watchers": 11, "score": 0, "subscribers_count": 1 @@ -605,13 +605,13 @@ "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json index bed1ee2b68..97aa6df7c4 100644 --- a/2024/CVE-2024-3094.json +++ b/2024/CVE-2024-3094.json @@ -1813,10 +1813,10 @@ "description": "GNU IFUNC is the real culprit behind CVE-2024-3094", "fork": false, "created_at": "2024-07-05T18:36:16Z", - "updated_at": "2024-08-01T13:16:39Z", + "updated_at": "2024-08-02T13:18:24Z", "pushed_at": "2024-07-25T19:17:59Z", - "stargazers_count": 7, - "watchers_count": 7, + "stargazers_count": 8, + "watchers_count": 8, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -1840,7 +1840,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 7, + "watchers": 8, "score": 0, "subscribers_count": 2 } diff --git a/2024/CVE-2024-32002.json b/2024/CVE-2024-32002.json index 3dff2726eb..638dd31a12 100644 --- a/2024/CVE-2024-32002.json +++ b/2024/CVE-2024-32002.json @@ -73,10 +73,10 @@ "description": "Exploit PoC for CVE-2024-32002", "fork": false, "created_at": "2024-05-17T19:33:08Z", - "updated_at": "2024-08-01T13:27:05Z", + "updated_at": "2024-08-02T15:55:18Z", "pushed_at": "2024-05-19T07:12:00Z", - "stargazers_count": 477, - "watchers_count": 477, + "stargazers_count": 478, + "watchers_count": 478, "has_discussions": false, "forks_count": 141, "allow_forking": true, @@ -90,7 +90,7 @@ ], "visibility": "public", "forks": 141, - "watchers": 477, + "watchers": 478, "score": 0, "subscribers_count": 3 }, @@ -1741,5 +1741,35 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 837339196, + "name": "CVE-2024-32002", + "full_name": "chrisWalker11\/CVE-2024-32002", + "owner": { + "login": "chrisWalker11", + "id": 51098965, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51098965?v=4", + "html_url": "https:\/\/github.com\/chrisWalker11" + }, + "html_url": "https:\/\/github.com\/chrisWalker11\/CVE-2024-32002", + "description": null, + "fork": false, + "created_at": "2024-08-02T18:30:01Z", + "updated_at": "2024-08-02T18:33:39Z", + "pushed_at": "2024-08-02T18:33:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-3400.json b/2024/CVE-2024-3400.json index 6840048693..7bd8ec13b4 100644 --- a/2024/CVE-2024-3400.json +++ b/2024/CVE-2024-3400.json @@ -673,10 +673,10 @@ "description": "Python script to check Palo Alto firewalls for CVE-2024-3400 exploit attempts", "fork": false, "created_at": "2024-04-18T16:45:51Z", - "updated_at": "2024-04-19T12:23:40Z", + "updated_at": "2024-08-02T15:51:45Z", "pushed_at": "2024-04-18T18:06:13Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -693,7 +693,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-34102.json b/2024/CVE-2024-34102.json index 68350a7710..227e17fa3b 100644 --- a/2024/CVE-2024-34102.json +++ b/2024/CVE-2024-34102.json @@ -43,10 +43,10 @@ "description": "CVE-2024-34102: Unauthenticated Magento XXE", "fork": false, "created_at": "2024-06-27T18:10:13Z", - "updated_at": "2024-07-29T04:29:09Z", + "updated_at": "2024-08-02T15:39:05Z", "pushed_at": "2024-07-29T04:29:07Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 10, + "watchers": 11, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-36401.json b/2024/CVE-2024-36401.json index f779dda90f..b98692deda 100644 --- a/2024/CVE-2024-36401.json +++ b/2024/CVE-2024-36401.json @@ -230,10 +230,10 @@ "description": "GeoServer Remote Code Execution", "fork": false, "created_at": "2024-07-30T18:43:40Z", - "updated_at": "2024-08-02T10:08:34Z", - "pushed_at": "2024-08-01T14:50:30Z", - "stargazers_count": 50, - "watchers_count": 50, + "updated_at": "2024-08-02T17:05:54Z", + "pushed_at": "2024-08-02T14:57:26Z", + "stargazers_count": 51, + "watchers_count": 51, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -242,7 +242,7 @@ "topics": [], "visibility": "public", "forks": 12, - "watchers": 50, + "watchers": 51, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-37085.json b/2024/CVE-2024-37085.json new file mode 100644 index 0000000000..82e7214913 --- /dev/null +++ b/2024/CVE-2024-37085.json @@ -0,0 +1,32 @@ +[ + { + "id": 837225608, + "name": "CVE-2024-37085", + "full_name": "mahmutaymahmutay\/CVE-2024-37085", + "owner": { + "login": "mahmutaymahmutay", + "id": 171496549, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/171496549?v=4", + "html_url": "https:\/\/github.com\/mahmutaymahmutay" + }, + "html_url": "https:\/\/github.com\/mahmutaymahmutay\/CVE-2024-37085", + "description": "Vulnerability Scanner for CVE-2024-37085 and Exploits ( For Educational Purpose only)", + "fork": false, + "created_at": "2024-08-02T13:31:59Z", + "updated_at": "2024-08-02T13:45:36Z", + "pushed_at": "2024-08-02T13:45:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-4040.json b/2024/CVE-2024-4040.json index 3e62667744..ee9a3665bf 100644 --- a/2024/CVE-2024-4040.json +++ b/2024/CVE-2024-4040.json @@ -138,7 +138,7 @@ "stargazers_count": 52, "watchers_count": 52, "has_discussions": false, - "forks_count": 8, + "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -159,7 +159,7 @@ "sftp" ], "visibility": "public", - "forks": 8, + "forks": 7, "watchers": 52, "score": 0, "subscribers_count": 2 diff --git a/2024/CVE-2024-4879.json b/2024/CVE-2024-4879.json index f0020d2f78..23834aaf9d 100644 --- a/2024/CVE-2024-4879.json +++ b/2024/CVE-2024-4879.json @@ -13,19 +13,19 @@ "description": "CVE-2024-4879 - Jelly Template Injection Vulnerability in ServiceNow", "fork": false, "created_at": "2024-07-12T10:32:37Z", - "updated_at": "2024-08-01T01:52:43Z", + "updated_at": "2024-08-02T15:39:09Z", "pushed_at": "2024-07-13T10:46:32Z", - "stargazers_count": 19, - "watchers_count": 19, + "stargazers_count": 20, + "watchers_count": 20, "has_discussions": false, - "forks_count": 6, + "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 6, - "watchers": 19, + "forks": 7, + "watchers": 20, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-5009.json b/2024/CVE-2024-5009.json index 2360f49dd3..4e4edb0e81 100644 --- a/2024/CVE-2024-5009.json +++ b/2024/CVE-2024-5009.json @@ -43,10 +43,10 @@ "description": "CVE-2024-5009 : WhatsUp Gold SetAdminPassword Privilege Escalation", "fork": false, "created_at": "2024-07-09T16:56:49Z", - "updated_at": "2024-07-12T00:51:11Z", + "updated_at": "2024-08-02T15:38:52Z", "pushed_at": "2024-07-09T17:14:52Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json index 156452baec..a3bfe2043a 100644 --- a/2024/CVE-2024-6387.json +++ b/2024/CVE-2024-6387.json @@ -260,12 +260,12 @@ "description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH", "fork": false, "created_at": "2024-07-01T20:33:20Z", - "updated_at": "2024-07-31T20:01:07Z", + "updated_at": "2024-08-02T17:26:00Z", "pushed_at": "2024-07-14T09:58:48Z", - "stargazers_count": 424, - "watchers_count": 424, + "stargazers_count": 426, + "watchers_count": 426, "has_discussions": false, - "forks_count": 84, + "forks_count": 85, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -277,8 +277,8 @@ "redteam" ], "visibility": "public", - "forks": 84, - "watchers": 424, + "forks": 85, + "watchers": 426, "score": 0, "subscribers_count": 6 }, diff --git a/README.md b/README.md index 1772538399..b701483337 100644 --- a/README.md +++ b/README.md @@ -2944,6 +2944,7 @@ - [charlesgargasson/CVE-2024-32002](https://github.com/charlesgargasson/CVE-2024-32002) - [NishanthAnand21/CVE-2024-32002-PoC](https://github.com/NishanthAnand21/CVE-2024-32002-PoC) - [tiyeume25112004/CVE-2024-32002](https://github.com/tiyeume25112004/CVE-2024-32002) +- [chrisWalker11/CVE-2024-32002](https://github.com/chrisWalker11/CVE-2024-32002) ### CVE-2024-32004 (2024-05-14) @@ -3478,6 +3479,13 @@ - [CERTologists/-CVE-2024-37081-POC](https://github.com/CERTologists/-CVE-2024-37081-POC) - [CERTologists/Modified-CVE-2024-37081-POC](https://github.com/CERTologists/Modified-CVE-2024-37081-POC) +### CVE-2024-37085 (2024-06-25) + +VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD. + + +- [mahmutaymahmutay/CVE-2024-37085](https://github.com/mahmutaymahmutay/CVE-2024-37085) + ### CVE-2024-37147 (2024-07-10) GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. An authenticated user can attach a document to any item, even if the user has no write access on it. Upgrade to 10.0.16. @@ -5917,6 +5925,13 @@ - [sofianeelhor/CVE-2023-22621-POC](https://github.com/sofianeelhor/CVE-2023-22621-POC) +### CVE-2023-22622 (2023-01-05) + +WordPress through 6.1.1 depends on unpredictable client visits to cause wp-cron.php execution and the resulting security updates, and the source code describes "the scenario where a site may not receive enough visits to execute scheduled tasks in a timely manner," but neither the installation guide nor the security guide mentions this default behavior, or alerts the user about security risks on installations with very few visits. + + +- [michael-david-fry/CVE-2023-22622](https://github.com/michael-david-fry/CVE-2023-22622) + ### CVE-2023-22726 (2023-01-20) act is a project which allows for local running of github actions. The artifact server that stores artifacts from Github Action runs does not sanitize path inputs. This allows an attacker to download and overwrite arbitrary files on the host from a Github Action. This issue may lead to privilege escalation. The /upload endpoint is vulnerable to path traversal as filepath is user controlled, and ultimately flows into os.Mkdir and os.Open. The /artifact endpoint is vulnerable to path traversal as the path is variable is user controlled, and the specified file is ultimately returned by the server. This has been addressed in version 0.2.40. Users are advised to upgrade. Users unable to upgrade may, during implementation of Open and OpenAtEnd for FS, ensure to use ValidPath() to check against path traversal or clean the user-provided paths manually. @@ -6714,6 +6729,7 @@ - [nuts7/CVE-2023-27372](https://github.com/nuts7/CVE-2023-27372) - [Chocapikk/CVE-2023-27372](https://github.com/Chocapikk/CVE-2023-27372) +- [Jhonsonwannaa/CVE-2023-27372](https://github.com/Jhonsonwannaa/CVE-2023-27372) - [0SPwn/CVE-2023-27372-PoC](https://github.com/0SPwn/CVE-2023-27372-PoC) - [izzz0/CVE-2023-27372-POC](https://github.com/izzz0/CVE-2023-27372-POC) - [ThatNotEasy/CVE-2023-27372](https://github.com/ThatNotEasy/CVE-2023-27372) @@ -11644,6 +11660,7 @@ - [Rai2en/CVE-2023-50564_Pluck-v4.7.18_PoC](https://github.com/Rai2en/CVE-2023-50564_Pluck-v4.7.18_PoC) +- [ipuig/CVE-2023-50564](https://github.com/ipuig/CVE-2023-50564) ### CVE-2023-50596 - [chandraprarikraj/CVE-2023-50596](https://github.com/chandraprarikraj/CVE-2023-50596)