diff --git a/2015/CVE-2015-6639.json b/2015/CVE-2015-6639.json index 182b5b0bdd..e00d680bc5 100644 --- a/2015/CVE-2015-6639.json +++ b/2015/CVE-2015-6639.json @@ -43,10 +43,10 @@ "description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431", "fork": false, "created_at": "2016-06-30T11:56:44Z", - "updated_at": "2024-01-04T16:05:53Z", + "updated_at": "2024-02-12T10:37:28Z", "pushed_at": "2016-06-30T15:32:42Z", - "stargazers_count": 335, - "watchers_count": 335, + "stargazers_count": 336, + "watchers_count": 336, "has_discussions": false, "forks_count": 120, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 120, - "watchers": 335, + "watchers": 336, "score": 0, "subscribers_count": 48 } diff --git a/2016/CVE-2016-0189.json b/2016/CVE-2016-0189.json index 2e50ac12fe..fc3a153c1b 100644 --- a/2016/CVE-2016-0189.json +++ b/2016/CVE-2016-0189.json @@ -13,19 +13,19 @@ "description": "Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)", "fork": false, "created_at": "2016-06-22T23:03:30Z", - "updated_at": "2024-01-10T06:46:34Z", + "updated_at": "2024-02-12T10:51:54Z", "pushed_at": "2016-06-23T00:47:50Z", - "stargazers_count": 113, - "watchers_count": 113, + "stargazers_count": 114, + "watchers_count": 114, "has_discussions": false, - "forks_count": 61, + "forks_count": 62, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 61, - "watchers": 113, + "forks": 62, + "watchers": 114, "score": 0, "subscribers_count": 13 }, diff --git a/2016/CVE-2016-2431.json b/2016/CVE-2016-2431.json index a301f487b6..8fa3218aac 100644 --- a/2016/CVE-2016-2431.json +++ b/2016/CVE-2016-2431.json @@ -43,10 +43,10 @@ "description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431", "fork": false, "created_at": "2016-06-30T11:56:44Z", - "updated_at": "2024-01-04T16:05:53Z", + "updated_at": "2024-02-12T10:37:28Z", "pushed_at": "2016-06-30T15:32:42Z", - "stargazers_count": 335, - "watchers_count": 335, + "stargazers_count": 336, + "watchers_count": 336, "has_discussions": false, "forks_count": 120, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 120, - "watchers": 335, + "watchers": 336, "score": 0, "subscribers_count": 48 } diff --git a/2018/CVE-2018-15133.json b/2018/CVE-2018-15133.json index edd0a9ed29..766cbfdf02 100644 --- a/2018/CVE-2018-15133.json +++ b/2018/CVE-2018-15133.json @@ -163,10 +163,10 @@ "description": "Exploit for Laravel Remote Code Execution with API_KEY (CVE-2018-15133)", "fork": false, "created_at": "2020-11-13T16:33:52Z", - "updated_at": "2024-01-17T04:43:27Z", + "updated_at": "2024-02-12T10:20:51Z", "pushed_at": "2020-12-31T20:34:30Z", - "stargazers_count": 42, - "watchers_count": 42, + "stargazers_count": 43, + "watchers_count": 43, "has_discussions": false, "forks_count": 17, "allow_forking": true, @@ -175,7 +175,7 @@ "topics": [], "visibility": "public", "forks": 17, - "watchers": 42, + "watchers": 43, "score": 0, "subscribers_count": 2 }, diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 17cd428ec8..107efeb74e 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -43,10 +43,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2024-02-11T08:32:50Z", + "updated_at": "2024-02-12T11:32:42Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3987, - "watchers_count": 3987, + "stargazers_count": 3986, + "watchers_count": 3986, "has_discussions": false, "forks_count": 1093, "allow_forking": true, @@ -75,7 +75,7 @@ ], "visibility": "public", "forks": 1093, - "watchers": 3987, + "watchers": 3986, "score": 0, "subscribers_count": 154 }, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index b323fe85d5..c678dfd845 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -13,10 +13,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2024-02-11T08:32:50Z", + "updated_at": "2024-02-12T11:32:42Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 3987, - "watchers_count": 3987, + "stargazers_count": 3986, + "watchers_count": 3986, "has_discussions": false, "forks_count": 1093, "allow_forking": true, @@ -45,7 +45,7 @@ ], "visibility": "public", "forks": 1093, - "watchers": 3987, + "watchers": 3986, "score": 0, "subscribers_count": 154 }, diff --git a/2021/CVE-2021-1961.json b/2021/CVE-2021-1961.json index a734a48a9c..3c25f70f89 100644 --- a/2021/CVE-2021-1961.json +++ b/2021/CVE-2021-1961.json @@ -13,10 +13,10 @@ "description": "Exploit code for CVE-2021-1961", "fork": false, "created_at": "2022-09-03T13:31:13Z", - "updated_at": "2024-01-24T19:14:59Z", + "updated_at": "2024-02-12T10:44:25Z", "pushed_at": "2022-09-07T11:47:56Z", - "stargazers_count": 99, - "watchers_count": 99, + "stargazers_count": 100, + "watchers_count": 100, "has_discussions": false, "forks_count": 17, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 17, - "watchers": 99, + "watchers": 100, "score": 0, "subscribers_count": 8 } diff --git a/2021/CVE-2021-28476.json b/2021/CVE-2021-28476.json index 0dc282421e..81718a25a4 100644 --- a/2021/CVE-2021-28476.json +++ b/2021/CVE-2021-28476.json @@ -13,10 +13,10 @@ "description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.", "fork": false, "created_at": "2021-05-31T18:02:39Z", - "updated_at": "2024-02-09T10:23:57Z", + "updated_at": "2024-02-12T11:50:18Z", "pushed_at": "2021-06-01T15:08:23Z", - "stargazers_count": 210, - "watchers_count": 210, + "stargazers_count": 211, + "watchers_count": 211, "has_discussions": false, "forks_count": 37, "allow_forking": true, @@ -33,7 +33,7 @@ ], "visibility": "public", "forks": 37, - "watchers": 210, + "watchers": 211, "score": 0, "subscribers_count": 4 }, diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json index ea2594172a..2c34a18439 100644 --- a/2021/CVE-2021-3156.json +++ b/2021/CVE-2021-3156.json @@ -2143,5 +2143,35 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 756290635, + "name": "LMU-CVE-2021-3156", + "full_name": "SamTruss\/LMU-CVE-2021-3156", + "owner": { + "login": "SamTruss", + "id": 46684055, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46684055?v=4", + "html_url": "https:\/\/github.com\/SamTruss" + }, + "html_url": "https:\/\/github.com\/SamTruss\/LMU-CVE-2021-3156", + "description": null, + "fork": false, + "created_at": "2024-02-12T11:24:31Z", + "updated_at": "2024-02-12T11:24:32Z", + "pushed_at": "2024-02-12T11:29:44Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-38003.json b/2021/CVE-2021-38003.json index b8b8c6f3d7..c153e259ee 100644 --- a/2021/CVE-2021-38003.json +++ b/2021/CVE-2021-38003.json @@ -13,10 +13,10 @@ "description": "CVE-2021-38003 exploits extracted from https:\/\/twitter.com\/WhichbufferArda\/status\/1609604183535284224", "fork": false, "created_at": "2023-01-07T06:09:14Z", - "updated_at": "2023-10-31T02:59:13Z", + "updated_at": "2024-02-12T10:07:35Z", "pushed_at": "2023-01-07T19:41:36Z", - "stargazers_count": 28, - "watchers_count": 28, + "stargazers_count": 29, + "watchers_count": 29, "has_discussions": false, "forks_count": 13, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 13, - "watchers": 28, + "watchers": 29, "score": 0, "subscribers_count": 4 } diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index 105395d82b..190882ef2f 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -938,10 +938,10 @@ "description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation", "fork": false, "created_at": "2022-01-26T14:26:10Z", - "updated_at": "2024-02-12T02:02:12Z", + "updated_at": "2024-02-12T10:14:39Z", "pushed_at": "2022-06-21T14:52:05Z", - "stargazers_count": 951, - "watchers_count": 951, + "stargazers_count": 952, + "watchers_count": 952, "has_discussions": false, "forks_count": 181, "allow_forking": true, @@ -952,7 +952,7 @@ ], "visibility": "public", "forks": 181, - "watchers": 951, + "watchers": 952, "score": 0, "subscribers_count": 14 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 73b99917cb..17579d0483 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -907,12 +907,12 @@ "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2021-12-10T23:19:28Z", - "updated_at": "2024-02-11T22:37:32Z", + "updated_at": "2024-02-12T08:45:53Z", "pushed_at": "2023-11-08T21:02:16Z", - "stargazers_count": 1694, - "watchers_count": 1694, + "stargazers_count": 1695, + "watchers_count": 1695, "has_discussions": false, - "forks_count": 501, + "forks_count": 502, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -923,8 +923,8 @@ "security" ], "visibility": "public", - "forks": 501, - "watchers": 1694, + "forks": 502, + "watchers": 1695, "score": 0, "subscribers_count": 27 }, @@ -6241,10 +6241,10 @@ "description": "Scanners for Jar files that may be vulnerable to CVE-2021-44228", "fork": false, "created_at": "2021-12-14T23:33:51Z", - "updated_at": "2024-01-26T09:40:55Z", + "updated_at": "2024-02-12T12:00:08Z", "pushed_at": "2022-03-23T18:12:51Z", - "stargazers_count": 345, - "watchers_count": 345, + "stargazers_count": 346, + "watchers_count": 346, "has_discussions": false, "forks_count": 92, "allow_forking": true, @@ -6253,7 +6253,7 @@ "topics": [], "visibility": "public", "forks": 92, - "watchers": 345, + "watchers": 346, "score": 0, "subscribers_count": 35 }, diff --git a/2022/CVE-2022-1364.json b/2022/CVE-2022-1364.json index 5ef22576fa..ff12edab6a 100644 --- a/2022/CVE-2022-1364.json +++ b/2022/CVE-2022-1364.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-11-22T10:55:34Z", - "updated_at": "2024-01-18T12:02:57Z", + "updated_at": "2024-02-12T08:33:55Z", "pushed_at": "2023-11-22T11:09:16Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 0 } diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index fabf73340f..7a59d427e6 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -13,10 +13,10 @@ "description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。", "fork": false, "created_at": "2022-05-31T07:44:01Z", - "updated_at": "2024-02-09T03:46:16Z", + "updated_at": "2024-02-12T07:28:19Z", "pushed_at": "2023-02-26T14:06:05Z", - "stargazers_count": 1095, - "watchers_count": 1095, + "stargazers_count": 1096, + "watchers_count": 1096, "has_discussions": true, "forks_count": 186, "allow_forking": true, @@ -45,7 +45,7 @@ ], "visibility": "public", "forks": 186, - "watchers": 1095, + "watchers": 1096, "score": 0, "subscribers_count": 18 }, diff --git a/2022/CVE-2022-38694.json b/2022/CVE-2022-38694.json index db417a0238..f2b42da62e 100644 --- a/2022/CVE-2022-38694.json +++ b/2022/CVE-2022-38694.json @@ -13,10 +13,10 @@ "description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692", "fork": false, "created_at": "2023-06-10T08:31:26Z", - "updated_at": "2024-02-11T04:57:28Z", + "updated_at": "2024-02-12T06:44:21Z", "pushed_at": "2024-02-11T02:51:34Z", - "stargazers_count": 161, - "watchers_count": 161, + "stargazers_count": 162, + "watchers_count": 162, "has_discussions": true, "forks_count": 22, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 22, - "watchers": 161, + "watchers": 162, "score": 0, "subscribers_count": 7 } diff --git a/2022/CVE-2022-40494.json b/2022/CVE-2022-40494.json index e2481d1483..6a016e3602 100644 --- a/2022/CVE-2022-40494.json +++ b/2022/CVE-2022-40494.json @@ -13,10 +13,10 @@ "description": "nps认证绕过利用工具,CVE-2022-40494,使用此工具可在浏览器访问web控制端后台页面,或者批量获取socks5和http代理", "fork": false, "created_at": "2022-08-04T08:22:41Z", - "updated_at": "2024-02-08T13:29:39Z", + "updated_at": "2024-02-12T07:29:50Z", "pushed_at": "2022-08-19T09:04:09Z", - "stargazers_count": 265, - "watchers_count": 265, + "stargazers_count": 266, + "watchers_count": 266, "has_discussions": false, "forks_count": 33, "allow_forking": true, @@ -33,7 +33,7 @@ ], "visibility": "public", "forks": 33, - "watchers": 265, + "watchers": 266, "score": 0, "subscribers_count": 6 } diff --git a/2022/CVE-2022-4262.json b/2022/CVE-2022-4262.json index 01c165b694..77a90ffa79 100644 --- a/2022/CVE-2022-4262.json +++ b/2022/CVE-2022-4262.json @@ -13,10 +13,10 @@ "description": "Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.", "fork": false, "created_at": "2023-07-13T13:17:20Z", - "updated_at": "2024-02-12T06:19:07Z", + "updated_at": "2024-02-12T10:19:40Z", "pushed_at": "2024-02-11T03:01:51Z", - "stargazers_count": 48, - "watchers_count": 48, + "stargazers_count": 50, + "watchers_count": 50, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 48, + "watchers": 50, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-3519.json b/2023/CVE-2023-3519.json index 5e3c69cfb8..dbd317ef07 100644 --- a/2023/CVE-2023-3519.json +++ b/2023/CVE-2023-3519.json @@ -172,10 +172,10 @@ "description": "RCE exploit for CVE-2023-3519", "fork": false, "created_at": "2023-07-21T20:17:43Z", - "updated_at": "2024-01-24T11:24:45Z", + "updated_at": "2024-02-12T11:10:32Z", "pushed_at": "2023-08-23T16:27:28Z", - "stargazers_count": 209, - "watchers_count": 209, + "stargazers_count": 208, + "watchers_count": 208, "has_discussions": false, "forks_count": 41, "allow_forking": true, @@ -184,7 +184,7 @@ "topics": [], "visibility": "public", "forks": 41, - "watchers": 209, + "watchers": 208, "score": 0, "subscribers_count": 4 }, diff --git a/2023/CVE-2023-36845.json b/2023/CVE-2023-36845.json index 0107abf3c7..450bbd3d01 100644 --- a/2023/CVE-2023-36845.json +++ b/2023/CVE-2023-36845.json @@ -308,10 +308,10 @@ "description": "Juniper RCE (Remote Code Execution) CVE-2023-36845 is a vulnerability that has been identified within Juniper's software. This particular flaw allows for remote code execution, meaning an attacker could run arbitrary code on a system without needing physical access to the device.", "fork": false, "created_at": "2024-01-30T08:00:23Z", - "updated_at": "2024-01-30T08:12:20Z", + "updated_at": "2024-02-12T07:51:29Z", "pushed_at": "2024-01-30T08:23:13Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -320,7 +320,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-41717.json b/2023/CVE-2023-41717.json index edc13b561c..1a3840da4c 100644 --- a/2023/CVE-2023-41717.json +++ b/2023/CVE-2023-41717.json @@ -13,10 +13,10 @@ "description": "This repository is to provide a write-up and PoC for CVE-2023-41717.", "fork": false, "created_at": "2023-08-31T08:10:22Z", - "updated_at": "2023-09-28T11:46:52Z", + "updated_at": "2024-02-12T10:59:24Z", "pushed_at": "2023-08-31T09:51:35Z", - "stargazers_count": 13, - "watchers_count": 13, + "stargazers_count": 14, + "watchers_count": 14, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 13, + "watchers": 14, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-41892.json b/2023/CVE-2023-41892.json index 0caa0578df..9dca7a7194 100644 --- a/2023/CVE-2023-41892.json +++ b/2023/CVE-2023-41892.json @@ -43,10 +43,10 @@ "description": "Exploit for CVE-2023-41892", "fork": false, "created_at": "2023-12-26T18:31:27Z", - "updated_at": "2024-02-03T17:31:01Z", + "updated_at": "2024-02-12T10:50:08Z", "pushed_at": "2023-12-26T22:39:21Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-4863.json b/2023/CVE-2023-4863.json index a011327ccf..4cf423bac3 100644 --- a/2023/CVE-2023-4863.json +++ b/2023/CVE-2023-4863.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-09-21T05:22:51Z", - "updated_at": "2024-01-30T02:34:04Z", + "updated_at": "2024-02-12T09:34:32Z", "pushed_at": "2023-12-18T04:25:00Z", - "stargazers_count": 273, - "watchers_count": 273, + "stargazers_count": 274, + "watchers_count": 274, "has_discussions": false, "forks_count": 44, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 44, - "watchers": 273, + "watchers": 274, "score": 0, "subscribers_count": 13 }, diff --git a/2023/CVE-2023-51000.json b/2023/CVE-2023-51000.json index f0fac971a8..a55de9095e 100644 --- a/2023/CVE-2023-51000.json +++ b/2023/CVE-2023-51000.json @@ -1,6 +1,6 @@ [ { - "id": 742770050, + "id": 756306550, "name": "CVE-2023-51000", "full_name": "Team-Byerus\/CVE-2023-51000", "owner": { @@ -12,11 +12,11 @@ "html_url": "https:\/\/github.com\/Team-Byerus\/CVE-2023-51000", "description": null, "fork": false, - "created_at": "2024-01-13T10:11:18Z", - "updated_at": "2024-01-16T10:51:59Z", - "pushed_at": "2024-01-18T13:27:36Z", - "stargazers_count": 2, - "watchers_count": 2, + "created_at": "2024-02-12T12:06:07Z", + "updated_at": "2024-02-12T12:06:08Z", + "pushed_at": "2024-02-12T12:06:17Z", + "stargazers_count": 0, + "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 0, "score": 0, "subscribers_count": 0 } diff --git a/2023/CVE-2023-51810.json b/2023/CVE-2023-51810.json index c854d113f8..34125eb39b 100644 --- a/2023/CVE-2023-51810.json +++ b/2023/CVE-2023-51810.json @@ -18,13 +18,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-21626.json b/2024/CVE-2024-21626.json index b7ad294f86..ad7587671d 100644 --- a/2024/CVE-2024-21626.json +++ b/2024/CVE-2024-21626.json @@ -43,10 +43,10 @@ "description": "PoC and Detection for CVE-2024-21626", "fork": false, "created_at": "2024-02-01T15:28:37Z", - "updated_at": "2024-02-10T19:28:47Z", + "updated_at": "2024-02-12T07:30:29Z", "pushed_at": "2024-02-06T16:09:05Z", - "stargazers_count": 43, - "watchers_count": 43, + "stargazers_count": 44, + "watchers_count": 44, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 43, + "watchers": 44, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-22024.json b/2024/CVE-2024-22024.json index b821b78153..0ef677b031 100644 --- a/2024/CVE-2024-22024.json +++ b/2024/CVE-2024-22024.json @@ -13,10 +13,10 @@ "description": "Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure", "fork": false, "created_at": "2024-02-09T14:31:56Z", - "updated_at": "2024-02-11T16:02:01Z", + "updated_at": "2024-02-12T09:53:22Z", "pushed_at": "2024-02-09T15:14:03Z", - "stargazers_count": 17, - "watchers_count": 17, + "stargazers_count": 18, + "watchers_count": 18, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 17, + "watchers": 18, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-22567.json b/2024/CVE-2024-22567.json index 90a8538152..86b03b9a18 100644 --- a/2024/CVE-2024-22567.json +++ b/2024/CVE-2024-22567.json @@ -13,19 +13,19 @@ "description": "File Upload vulnerability in MCMS 5.3.5", "fork": false, "created_at": "2024-02-12T06:19:19Z", - "updated_at": "2024-02-12T06:19:19Z", - "pushed_at": "2024-02-12T06:19:19Z", - "stargazers_count": 0, - "watchers_count": 0, + "updated_at": "2024-02-12T08:22:45Z", + "pushed_at": "2024-02-12T07:04:25Z", + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, - "watchers": 0, + "forks": 1, + "watchers": 1, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-23208.json b/2024/CVE-2024-23208.json index e3acd8d1be..61132bfcc8 100644 --- a/2024/CVE-2024-23208.json +++ b/2024/CVE-2024-23208.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2024-02-04T07:37:21Z", - "updated_at": "2024-02-10T10:04:06Z", + "updated_at": "2024-02-12T09:10:12Z", "pushed_at": "2024-02-05T02:11:42Z", - "stargazers_count": 17, - "watchers_count": 17, + "stargazers_count": 18, + "watchers_count": 18, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 17, + "watchers": 18, "score": 0, "subscribers_count": 2 } diff --git a/2024/CVE-2024-23897.json b/2024/CVE-2024-23897.json index a319a66235..cf6f9f3de8 100644 --- a/2024/CVE-2024-23897.json +++ b/2024/CVE-2024-23897.json @@ -73,10 +73,10 @@ "description": "CVE-2024-23897", "fork": false, "created_at": "2024-01-26T09:44:32Z", - "updated_at": "2024-02-08T06:09:40Z", + "updated_at": "2024-02-12T07:57:06Z", "pushed_at": "2024-01-28T06:47:28Z", - "stargazers_count": 145, - "watchers_count": 145, + "stargazers_count": 146, + "watchers_count": 146, "has_discussions": false, "forks_count": 26, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 26, - "watchers": 145, + "watchers": 146, "score": 0, "subscribers_count": 3 }, diff --git a/README.md b/README.md index 10530fb1d2..6cc54dfd40 100644 --- a/README.md +++ b/README.md @@ -6461,7 +6461,11 @@ - [Mudoleto/Broker_ApacheMQ](https://github.com/Mudoleto/Broker_ApacheMQ) - [hh-hunter/cve-2023-46604](https://github.com/hh-hunter/cve-2023-46604) -### CVE-2023-46615 +### CVE-2023-46615 (-) + +Deserialization of Untrusted Data vulnerability in Kalli Dan. KD Coming Soon.This issue affects KD Coming Soon: from n/a through 1.7.\n\n + + - [RandomRobbieBF/CVE-2023-46615](https://github.com/RandomRobbieBF/CVE-2023-46615) ### CVE-2023-46747 (2023-10-26) @@ -14479,6 +14483,7 @@ - [asepsaepdin/CVE-2021-3156](https://github.com/asepsaepdin/CVE-2021-3156) - [DDayLuong/CVE-2021-3156](https://github.com/DDayLuong/CVE-2021-3156) - [wurwur/CVE-2021-3156](https://github.com/wurwur/CVE-2021-3156) +- [SamTruss/LMU-CVE-2021-3156](https://github.com/SamTruss/LMU-CVE-2021-3156) ### CVE-2021-3157 - [CrackerCat/cve-2021-3157](https://github.com/CrackerCat/cve-2021-3157)