diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 429b82863c..9525012721 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -43,10 +43,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-04-15T16:21:28Z", + "updated_at": "2024-04-15T20:18:30Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1912, - "watchers_count": 1912, + "stargazers_count": 1913, + "watchers_count": 1913, "has_discussions": true, "forks_count": 332, "allow_forking": true, @@ -76,7 +76,7 @@ ], "visibility": "public", "forks": 332, - "watchers": 1912, + "watchers": 1913, "score": 0, "subscribers_count": 35 }, diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 6a31233f57..75a5e410a0 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-04-15T16:21:28Z", + "updated_at": "2024-04-15T20:18:30Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1912, - "watchers_count": 1912, + "stargazers_count": 1913, + "watchers_count": 1913, "has_discussions": true, "forks_count": 332, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 332, - "watchers": 1912, + "watchers": 1913, "score": 0, "subscribers_count": 35 }, diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 76bcb4adcc..3981cd5aa3 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -43,10 +43,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-04-15T16:21:28Z", + "updated_at": "2024-04-15T20:18:30Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1912, - "watchers_count": 1912, + "stargazers_count": 1913, + "watchers_count": 1913, "has_discussions": true, "forks_count": 332, "allow_forking": true, @@ -76,7 +76,7 @@ ], "visibility": "public", "forks": 332, - "watchers": 1912, + "watchers": 1913, "score": 0, "subscribers_count": 35 }, diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index ed5e6854a2..7b0eb572a3 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -557,10 +557,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-04-15T16:21:28Z", + "updated_at": "2024-04-15T20:18:30Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1912, - "watchers_count": 1912, + "stargazers_count": 1913, + "watchers_count": 1913, "has_discussions": true, "forks_count": 332, "allow_forking": true, @@ -590,7 +590,7 @@ ], "visibility": "public", "forks": 332, - "watchers": 1912, + "watchers": 1913, "score": 0, "subscribers_count": 35 }, diff --git a/2019/CVE-2019-12550.json b/2019/CVE-2019-12550.json deleted file mode 100644 index c35f7c3d57..0000000000 --- a/2019/CVE-2019-12550.json +++ /dev/null @@ -1,32 +0,0 @@ -[ - { - "id": 777694657, - "name": "CVE-2019-12550", - "full_name": "itwizardo\/CVE-2019-12550", - "owner": { - "login": "itwizardo", - "id": 32465924, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32465924?v=4", - "html_url": "https:\/\/github.com\/itwizardo" - }, - "html_url": "https:\/\/github.com\/itwizardo\/CVE-2019-12550", - "description": "Proof Of Concept", - "fork": false, - "created_at": "2024-03-26T10:44:03Z", - "updated_at": "2024-03-26T13:13:55Z", - "pushed_at": "2024-03-26T20:14:15Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2019/CVE-2019-2215.json b/2019/CVE-2019-2215.json index b616508615..c1b6685f67 100644 --- a/2019/CVE-2019-2215.json +++ b/2019/CVE-2019-2215.json @@ -511,11 +511,11 @@ "html_url": "https:\/\/github.com\/mutur4" }, "html_url": "https:\/\/github.com\/mutur4\/CVE-2019-2215", - "description": "This is a bad-binder exploit affecting the android binder IPC system that was used in the wild discovered by P0", + "description": "This is a critical UAF vulnerability exploit that affected the android binder IPC system used in the wild and discovered by P0", "fork": false, "created_at": "2024-04-15T06:40:04Z", - "updated_at": "2024-04-15T07:32:16Z", - "pushed_at": "2024-04-15T07:30:45Z", + "updated_at": "2024-04-15T19:23:08Z", + "pushed_at": "2024-04-15T19:17:36Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index 7f44bd69c7..cd8ab8d317 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -193,10 +193,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-04-15T16:21:28Z", + "updated_at": "2024-04-15T20:18:30Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1912, - "watchers_count": 1912, + "stargazers_count": 1913, + "watchers_count": 1913, "has_discussions": true, "forks_count": 332, "allow_forking": true, @@ -226,7 +226,7 @@ ], "visibility": "public", "forks": 332, - "watchers": 1912, + "watchers": 1913, "score": 0, "subscribers_count": 35 } diff --git a/2020/CVE-2020-14974.json b/2020/CVE-2020-14974.json index a2d702fe0c..f9ffbd6a88 100644 --- a/2020/CVE-2020-14974.json +++ b/2020/CVE-2020-14974.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 83d1400c26..d1e54396c0 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-04-15T16:21:28Z", + "updated_at": "2024-04-15T20:18:30Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1912, - "watchers_count": 1912, + "stargazers_count": 1913, + "watchers_count": 1913, "has_discussions": true, "forks_count": 332, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 332, - "watchers": 1912, + "watchers": 1913, "score": 0, "subscribers_count": 35 }, diff --git a/2021/CVE-2021-20323.json b/2021/CVE-2021-20323.json index 58ed76e888..ecc4a4839c 100644 --- a/2021/CVE-2021-20323.json +++ b/2021/CVE-2021-20323.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2022-12-07T21:15:23Z", - "updated_at": "2024-02-01T18:50:54Z", + "updated_at": "2024-04-15T20:49:16Z", "pushed_at": "2022-12-07T21:26:44Z", - "stargazers_count": 5, - "watchers_count": 5, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 5, + "watchers": 6, "score": 0, "subscribers_count": 1 }, diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 5ccac24a31..708a9920d5 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -851,10 +851,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2024-04-15T08:52:30Z", + "updated_at": "2024-04-15T22:14:38Z", "pushed_at": "2024-02-01T06:53:03Z", - "stargazers_count": 1241, - "watchers_count": 1241, + "stargazers_count": 1242, + "watchers_count": 1242, "has_discussions": false, "forks_count": 154, "allow_forking": true, @@ -870,7 +870,7 @@ ], "visibility": "public", "forks": 154, - "watchers": 1241, + "watchers": 1242, "score": 0, "subscribers_count": 12 } diff --git a/2021/CVE-2021-31630.json b/2021/CVE-2021-31630.json index da264467e2..e4013f2cd2 100644 --- a/2021/CVE-2021-31630.json +++ b/2021/CVE-2021-31630.json @@ -122,6 +122,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index 24a13cf249..a69082e871 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -169,10 +169,10 @@ "description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)", "fork": false, "created_at": "2022-01-26T00:56:36Z", - "updated_at": "2024-04-14T19:17:51Z", + "updated_at": "2024-04-15T23:04:09Z", "pushed_at": "2023-05-04T19:24:39Z", - "stargazers_count": 1019, - "watchers_count": 1019, + "stargazers_count": 1020, + "watchers_count": 1020, "has_discussions": false, "forks_count": 310, "allow_forking": true, @@ -185,7 +185,7 @@ ], "visibility": "public", "forks": 310, - "watchers": 1019, + "watchers": 1020, "score": 0, "subscribers_count": 16 }, diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index 31284718e6..60b31e158a 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -766,10 +766,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2024-04-15T08:52:30Z", + "updated_at": "2024-04-15T22:14:38Z", "pushed_at": "2024-02-01T06:53:03Z", - "stargazers_count": 1241, - "watchers_count": 1241, + "stargazers_count": 1242, + "watchers_count": 1242, "has_discussions": false, "forks_count": 154, "allow_forking": true, @@ -785,7 +785,7 @@ ], "visibility": "public", "forks": 154, - "watchers": 1241, + "watchers": 1242, "score": 0, "subscribers_count": 12 }, diff --git a/2023/CVE-2023-23752.json b/2023/CVE-2023-23752.json index 76f10b5e12..cec73c1cae 100644 --- a/2023/CVE-2023-23752.json +++ b/2023/CVE-2023-23752.json @@ -1382,5 +1382,35 @@ "watchers": 2, "score": 0, "subscribers_count": 1 + }, + { + "id": 787014993, + "name": "CVE-2023-23752-Python", + "full_name": "mariovata\/CVE-2023-23752-Python", + "owner": { + "login": "mariovata", + "id": 33606897, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33606897?v=4", + "html_url": "https:\/\/github.com\/mariovata" + }, + "html_url": "https:\/\/github.com\/mariovata\/CVE-2023-23752-Python", + "description": "Joomla! < 4.2.8 - Unauthenticated information disclosure", + "fork": false, + "created_at": "2024-04-15T18:18:02Z", + "updated_at": "2024-04-15T19:36:05Z", + "pushed_at": "2024-04-15T19:34:31Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-25690.json b/2023/CVE-2023-25690.json index 416b55d8c8..d7082f7cb0 100644 --- a/2023/CVE-2023-25690.json +++ b/2023/CVE-2023-25690.json @@ -13,10 +13,10 @@ "description": "Fix URL containing SPACES after Apache upgrade CVE-2023-25690", "fork": false, "created_at": "2023-04-25T17:15:54Z", - "updated_at": "2023-04-25T21:15:49Z", + "updated_at": "2024-04-15T22:08:03Z", "pushed_at": "2023-04-25T21:38:16Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -29,7 +29,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-33264.json b/2023/CVE-2023-33264.json index 98896d8cc8..d4511a537c 100644 --- a/2023/CVE-2023-33264.json +++ b/2023/CVE-2023-33264.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2024-04-14T07:35:13Z", "updated_at": "2024-04-14T17:39:34Z", - "pushed_at": "2024-04-14T17:39:31Z", + "pushed_at": "2024-04-16T00:24:29Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, @@ -44,7 +44,7 @@ "fork": false, "created_at": "2024-04-14T07:35:15Z", "updated_at": "2024-04-14T17:39:29Z", - "pushed_at": "2024-04-14T17:39:26Z", + "pushed_at": "2024-04-16T00:24:08Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, @@ -74,7 +74,7 @@ "fork": false, "created_at": "2024-04-14T07:35:17Z", "updated_at": "2024-04-14T17:39:38Z", - "pushed_at": "2024-04-14T17:39:34Z", + "pushed_at": "2024-04-16T00:24:38Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2023/CVE-2023-34458.json b/2023/CVE-2023-34458.json index 070b16c524..d90925f6f8 100644 --- a/2023/CVE-2023-34458.json +++ b/2023/CVE-2023-34458.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2024-04-14T07:39:23Z", "updated_at": "2024-04-14T17:39:49Z", - "pushed_at": "2024-04-14T17:39:45Z", + "pushed_at": "2024-04-16T00:14:39Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, @@ -44,7 +44,7 @@ "fork": false, "created_at": "2024-04-14T07:39:26Z", "updated_at": "2024-04-14T17:39:41Z", - "pushed_at": "2024-04-14T17:39:38Z", + "pushed_at": "2024-04-16T00:14:46Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, @@ -74,7 +74,7 @@ "fork": false, "created_at": "2024-04-14T07:39:30Z", "updated_at": "2024-04-14T17:39:56Z", - "pushed_at": "2024-04-14T17:39:53Z", + "pushed_at": "2024-04-16T00:14:29Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2023/CVE-2023-43667.json b/2023/CVE-2023-43667.json index 7de8c679b3..b028b79f08 100644 --- a/2023/CVE-2023-43667.json +++ b/2023/CVE-2023-43667.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2024-04-13T18:45:45Z", "updated_at": "2024-04-14T17:40:52Z", - "pushed_at": "2024-04-14T17:40:49Z", + "pushed_at": "2024-04-15T23:51:14Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, @@ -44,7 +44,7 @@ "fork": false, "created_at": "2024-04-13T18:45:51Z", "updated_at": "2024-04-14T17:40:49Z", - "pushed_at": "2024-04-14T17:40:46Z", + "pushed_at": "2024-04-15T23:51:25Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, @@ -74,7 +74,7 @@ "fork": false, "created_at": "2024-04-13T18:45:57Z", "updated_at": "2024-04-14T17:40:59Z", - "pushed_at": "2024-04-14T17:40:56Z", + "pushed_at": "2024-04-15T23:51:35Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2023/CVE-2023-45280.json b/2023/CVE-2023-45280.json index 3c48eeeb53..dcb5f9984d 100644 --- a/2023/CVE-2023-45280.json +++ b/2023/CVE-2023-45280.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2024-04-13T18:45:21Z", "updated_at": "2024-04-14T17:41:05Z", - "pushed_at": "2024-04-14T17:41:02Z", + "pushed_at": "2024-04-15T22:56:51Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, @@ -44,7 +44,7 @@ "fork": false, "created_at": "2024-04-13T18:45:27Z", "updated_at": "2024-04-14T17:41:14Z", - "pushed_at": "2024-04-14T17:41:11Z", + "pushed_at": "2024-04-15T22:58:14Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, @@ -74,7 +74,7 @@ "fork": false, "created_at": "2024-04-14T07:22:00Z", "updated_at": "2024-04-14T17:41:11Z", - "pushed_at": "2024-04-14T17:41:07Z", + "pushed_at": "2024-04-15T22:59:03Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2023/CVE-2023-45288.json b/2023/CVE-2023-45288.json index d665448ac8..fe0dcab6fe 100644 --- a/2023/CVE-2023-45288.json +++ b/2023/CVE-2023-45288.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2024-04-12T07:36:39Z", "updated_at": "2024-04-15T02:04:10Z", - "pushed_at": "2024-04-12T19:39:36Z", + "pushed_at": "2024-04-15T23:41:43Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index ea19105416..6eac875180 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -13,10 +13,10 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2024-04-15T16:56:43Z", + "updated_at": "2024-04-15T23:29:56Z", "pushed_at": "2024-04-08T13:43:21Z", - "stargazers_count": 400, - "watchers_count": 400, + "stargazers_count": 401, + "watchers_count": 401, "has_discussions": false, "forks_count": 61, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 61, - "watchers": 400, + "watchers": 401, "score": 0, "subscribers_count": 7 }, diff --git a/2023/CVE-2023-5720.json b/2023/CVE-2023-5720.json index 0683613718..995605bbb0 100644 --- a/2023/CVE-2023-5720.json +++ b/2023/CVE-2023-5720.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2024-04-13T18:45:31Z", "updated_at": "2024-04-14T17:41:22Z", - "pushed_at": "2024-04-14T17:41:19Z", + "pushed_at": "2024-04-15T22:42:51Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, @@ -44,7 +44,7 @@ "fork": false, "created_at": "2024-04-13T18:45:35Z", "updated_at": "2024-04-14T17:41:20Z", - "pushed_at": "2024-04-14T17:41:16Z", + "pushed_at": "2024-04-15T19:58:53Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, @@ -74,7 +74,7 @@ "fork": false, "created_at": "2024-04-13T18:45:39Z", "updated_at": "2024-04-14T17:41:26Z", - "pushed_at": "2024-04-14T17:41:22Z", + "pushed_at": "2024-04-15T20:00:39Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2023/CVE-2023-6319.json b/2023/CVE-2023-6319.json index 0d53dad95c..86c40e4b87 100644 --- a/2023/CVE-2023-6319.json +++ b/2023/CVE-2023-6319.json @@ -13,10 +13,10 @@ "description": "CVE-2023-6319 proof of concept", "fork": false, "created_at": "2024-04-11T18:58:17Z", - "updated_at": "2024-04-15T11:44:04Z", + "updated_at": "2024-04-15T22:08:59Z", "pushed_at": "2024-04-13T10:31:33Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 11, + "watchers_count": 11, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 9, + "watchers": 11, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index c5496a04a1..aacf603405 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -13,10 +13,10 @@ "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "fork": false, "created_at": "2024-03-20T21:16:41Z", - "updated_at": "2024-04-15T15:25:05Z", + "updated_at": "2024-04-15T20:37:48Z", "pushed_at": "2024-04-10T23:22:55Z", - "stargazers_count": 1834, - "watchers_count": 1834, + "stargazers_count": 1836, + "watchers_count": 1836, "has_discussions": false, "forks_count": 226, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 226, - "watchers": 1834, + "watchers": 1836, "score": 0, "subscribers_count": 19 }, diff --git a/2024/CVE-2024-21338.json b/2024/CVE-2024-21338.json index 4dde549d4c..abfd04d7c0 100644 --- a/2024/CVE-2024-21338.json +++ b/2024/CVE-2024-21338.json @@ -13,10 +13,10 @@ "description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.", "fork": false, "created_at": "2024-04-13T05:53:02Z", - "updated_at": "2024-04-15T18:08:58Z", + "updated_at": "2024-04-15T20:58:42Z", "pushed_at": "2024-04-13T06:03:18Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 6, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-21762.json b/2024/CVE-2024-21762.json index 76096d3089..36f89d4dfb 100644 --- a/2024/CVE-2024-21762.json +++ b/2024/CVE-2024-21762.json @@ -208,35 +208,5 @@ "watchers": 5, "score": 0, "subscribers_count": 1 - }, - { - "id": 785956216, - "name": "FortiGate-CVE-2024-21762", - "full_name": "zzcentury\/FortiGate-CVE-2024-21762", - "owner": { - "login": "zzcentury", - "id": 20831588, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20831588?v=4", - "html_url": "https:\/\/github.com\/zzcentury" - }, - "html_url": "https:\/\/github.com\/zzcentury\/FortiGate-CVE-2024-21762", - "description": null, - "fork": false, - "created_at": "2024-04-13T02:17:23Z", - "updated_at": "2024-04-13T02:22:44Z", - "pushed_at": "2024-04-13T02:22:41Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-2432.json b/2024/CVE-2024-2432.json index 74e355a9bb..19885b3f1e 100644 --- a/2024/CVE-2024-2432.json +++ b/2024/CVE-2024-2432.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2024-03-14T17:48:49Z", - "updated_at": "2024-04-09T19:59:39Z", + "updated_at": "2024-04-15T18:47:15Z", "pushed_at": "2024-03-14T17:49:48Z", - "stargazers_count": 45, - "watchers_count": 45, + "stargazers_count": 46, + "watchers_count": 46, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 14, - "watchers": 45, + "watchers": 46, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-24576.json b/2024/CVE-2024-24576.json index b493ff9e34..3f85f822d5 100644 --- a/2024/CVE-2024-24576.json +++ b/2024/CVE-2024-24576.json @@ -13,10 +13,10 @@ "description": "Example of CVE-2024-24576 use case.", "fork": false, "created_at": "2024-04-09T21:17:15Z", - "updated_at": "2024-04-14T17:45:19Z", + "updated_at": "2024-04-15T21:14:40Z", "pushed_at": "2024-04-10T14:46:42Z", - "stargazers_count": 44, - "watchers_count": 44, + "stargazers_count": 45, + "watchers_count": 45, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 8, - "watchers": 44, + "watchers": 45, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-25600.json b/2024/CVE-2024-25600.json index 0c9aa34436..2dc44bfae6 100644 --- a/2024/CVE-2024-25600.json +++ b/2024/CVE-2024-25600.json @@ -133,10 +133,10 @@ "description": "A PoC exploit for CVE-2024-25600 - WordPress Bricks Builder Remote Code Execution (RCE)", "fork": false, "created_at": "2024-03-01T09:28:08Z", - "updated_at": "2024-04-15T14:22:20Z", + "updated_at": "2024-04-15T20:00:28Z", "pushed_at": "2024-03-01T09:46:56Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -163,7 +163,7 @@ ], "visibility": "public", "forks": 1, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json index f7f6f41b58..5c09577ff0 100644 --- a/2024/CVE-2024-3094.json +++ b/2024/CVE-2024-3094.json @@ -1012,10 +1012,10 @@ "description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)", "fork": false, "created_at": "2024-04-01T14:28:09Z", - "updated_at": "2024-04-15T18:05:22Z", + "updated_at": "2024-04-15T19:46:20Z", "pushed_at": "2024-04-03T04:58:50Z", - "stargazers_count": 3364, - "watchers_count": 3364, + "stargazers_count": 3366, + "watchers_count": 3366, "has_discussions": false, "forks_count": 226, "allow_forking": true, @@ -1024,7 +1024,7 @@ "topics": [], "visibility": "public", "forks": 226, - "watchers": 3364, + "watchers": 3366, "score": 0, "subscribers_count": 34 }, @@ -1323,7 +1323,7 @@ "fork": false, "created_at": "2024-04-02T20:17:07Z", "updated_at": "2024-04-03T15:52:48Z", - "pushed_at": "2024-04-13T18:41:11Z", + "pushed_at": "2024-04-15T20:25:58Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-3273.json b/2024/CVE-2024-3273.json index 94ef80b6e6..51bf0455e5 100644 --- a/2024/CVE-2024-3273.json +++ b/2024/CVE-2024-3273.json @@ -74,7 +74,7 @@ "fork": false, "created_at": "2024-04-07T21:15:33Z", "updated_at": "2024-04-07T21:40:55Z", - "pushed_at": "2024-04-08T19:49:14Z", + "pushed_at": "2024-04-16T00:00:15Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2024/CVE-2024-3400.json b/2024/CVE-2024-3400.json index 4b0d79b4b5..7c9da46045 100644 --- a/2024/CVE-2024-3400.json +++ b/2024/CVE-2024-3400.json @@ -108,13 +108,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 @@ -163,10 +163,10 @@ "description": "Vulnerabilidad de palo alto ", "fork": false, "created_at": "2024-04-14T19:11:16Z", - "updated_at": "2024-04-15T11:07:16Z", + "updated_at": "2024-04-15T20:17:12Z", "pushed_at": "2024-04-14T19:23:16Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 0, + "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -175,7 +175,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 0, "score": 0, "subscribers_count": 1 }, diff --git a/README.md b/README.md index e79e4908dc..ef5a23fd0f 100644 --- a/README.md +++ b/README.md @@ -529,7 +529,6 @@ - [d0rb/CVE-2024-21762](https://github.com/d0rb/CVE-2024-21762) - [lolminerxmrig/multicheck_CVE-2024-21762](https://github.com/lolminerxmrig/multicheck_CVE-2024-21762) - [AlexLondan/CVE-2024-21762-Fortinet-RCE-ALLWORK](https://github.com/AlexLondan/CVE-2024-21762-Fortinet-RCE-ALLWORK) -- [zzcentury/FortiGate-CVE-2024-21762](https://github.com/zzcentury/FortiGate-CVE-2024-21762) ### CVE-2024-21887 (2024-01-12) @@ -1426,7 +1425,11 @@ - [Lucky-lm/CVE-2024-30614](https://github.com/Lucky-lm/CVE-2024-30614) -### CVE-2024-30656 +### CVE-2024-30656 (2024-04-15) + +An issue in Fireboltt Dream Wristphone BSW202_FB_AAC_v2.0_20240110-20240110-1956 allows attackers to cause a Denial of Service (DoS) via a crafted deauth frame. + + - [Yashodhanvivek/Firebolt-wristphone-vulnerability](https://github.com/Yashodhanvivek/Firebolt-wristphone-vulnerability) ### CVE-2024-30850 (2024-04-12) @@ -3594,6 +3597,7 @@ - [Rival420/CVE-2023-23752](https://github.com/Rival420/CVE-2023-23752) - [JohnDoeAnonITA/CVE-2023-23752](https://github.com/JohnDoeAnonITA/CVE-2023-23752) - [0xWhoami35/CVE-2023-23752](https://github.com/0xWhoami35/CVE-2023-23752) +- [mariovata/CVE-2023-23752-Python](https://github.com/mariovata/CVE-2023-23752-Python) ### CVE-2023-23924 (2023-01-31) @@ -7679,7 +7683,11 @@ - [itsAptx/CVE-2023-45471](https://github.com/itsAptx/CVE-2023-45471) -### CVE-2023-45503 +### CVE-2023-45503 (2024-04-15) + +SQL Injection vulnerability in Macrob7 Macs CMS 1.1.4f, allows remote attackers to execute arbitrary code, cause a denial of service (DoS), escalate privileges, and obtain sensitive information via crafted payload to resetPassword, forgotPasswordProcess, saveUser, saveRole, deleteUser, deleteRole, deleteComment, deleteUser, allowComment, saveRole, forgotPasswordProcess, resetPassword, saveUser, addComment, saveRole, and saveUser endpoints. + + - [ally-petitt/CVE-2023-45503](https://github.com/ally-petitt/CVE-2023-45503) ### CVE-2023-45540 (2023-10-16) @@ -29589,13 +29597,6 @@ - [tarantula-team/CVE-2019-12543](https://github.com/tarantula-team/CVE-2019-12543) -### CVE-2019-12550 (2019-06-17) - -WAGO 852-303 before FW06, 852-1305 before FW06, and 852-1505 before FW03 devices contain hardcoded users and passwords that can be used to login via SSH and TELNET. - - -- [itwizardo/CVE-2019-12550](https://github.com/itwizardo/CVE-2019-12550) - ### CVE-2019-12562 (2019-09-26) Stored Cross-Site Scripting in DotNetNuke (DNN) Version before 9.4.0 allows remote attackers to store and embed the malicious script into the admin notification page. The exploit could be used to perfom any action with admin privileges such as managing content, adding users, uploading backdoors to the server, etc. Successful exploitation occurs when an admin user visits a notification page with stored cross-site scripting.