From 62ccd80ca9e9279b58bd69955ae28099584d0cf4 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Tue, 1 Oct 2024 09:30:39 +0900 Subject: [PATCH] Auto Update 2024/10/01 00:30:39 --- 2014/CVE-2014-0160.json | 8 ++++---- 2019/CVE-2019-18935.json | 16 ++++++++-------- 2020/CVE-2020-13519.json | 2 +- 2021/CVE-2021-39512.json | 8 ++++---- 2021/CVE-2021-44228.json | 8 ++++---- 2022/CVE-2022-22063.json | 8 ++++---- 2022/CVE-2022-25479.json | 4 ++-- 2024/CVE-2024-20017.json | 4 ++-- 2024/CVE-2024-26229.json | 4 ++-- 2024/CVE-2024-2961.json | 12 ++++++------ 2024/CVE-2024-30088.json | 12 ++++++------ 2024/CVE-2024-3094.json | 8 ++++---- 2024/CVE-2024-36877.json | 8 ++++---- 2024/CVE-2024-38200.json | 8 ++++---- 2024/CVE-2024-40431.json | 4 ++-- 2024/CVE-2024-45200.json | 8 ++++---- 2024/CVE-2024-6769.json | 8 ++++---- 2024/CVE-2024-8353.json | 10 +++++----- 18 files changed, 70 insertions(+), 70 deletions(-) diff --git a/2014/CVE-2014-0160.json b/2014/CVE-2014-0160.json index 7779479055..733941766a 100644 --- a/2014/CVE-2014-0160.json +++ b/2014/CVE-2014-0160.json @@ -982,10 +982,10 @@ "description": "Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)", "fork": false, "created_at": "2014-05-01T08:28:45Z", - "updated_at": "2024-08-12T19:13:47Z", + "updated_at": "2024-09-30T21:25:32Z", "pushed_at": "2014-05-01T08:47:16Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 17, + "watchers_count": 17, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -994,7 +994,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 16, + "watchers": 17, "score": 0, "subscribers_count": 6 }, diff --git a/2019/CVE-2019-18935.json b/2019/CVE-2019-18935.json index ff0bcc8b36..a298780867 100644 --- a/2019/CVE-2019-18935.json +++ b/2019/CVE-2019-18935.json @@ -43,10 +43,10 @@ "description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.", "fork": false, "created_at": "2019-12-12T07:58:11Z", - "updated_at": "2024-09-06T00:14:45Z", + "updated_at": "2024-10-01T00:10:29Z", "pushed_at": "2022-04-14T18:23:38Z", - "stargazers_count": 342, - "watchers_count": 342, + "stargazers_count": 343, + "watchers_count": 343, "has_discussions": false, "forks_count": 85, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 85, - "watchers": 342, + "watchers": 343, "score": 0, "subscribers_count": 13 }, @@ -163,10 +163,10 @@ "description": "[CVE-2019-18935] Telerik UI for ASP.NET AJAX (RadAsyncUpload Handler) .NET JSON Deserialization", "fork": false, "created_at": "2020-08-19T17:11:02Z", - "updated_at": "2024-08-12T20:04:53Z", + "updated_at": "2024-10-01T00:08:36Z", "pushed_at": "2020-08-25T07:55:22Z", - "stargazers_count": 14, - "watchers_count": 14, + "stargazers_count": 15, + "watchers_count": 15, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -175,7 +175,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 14, + "watchers": 15, "score": 0, "subscribers_count": 1 }, diff --git a/2020/CVE-2020-13519.json b/2020/CVE-2020-13519.json index 8c6cf48609..c6ba505d8d 100644 --- a/2020/CVE-2020-13519.json +++ b/2020/CVE-2020-13519.json @@ -27,6 +27,6 @@ "forks": 0, "watchers": 3, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2021/CVE-2021-39512.json b/2021/CVE-2021-39512.json index b0b6857a4a..b3d77c680b 100644 --- a/2021/CVE-2021-39512.json +++ b/2021/CVE-2021-39512.json @@ -13,10 +13,10 @@ "description": "Unauthenticated CSRF Account TakeOver in BigTreeCMS v4.4.14", "fork": false, "created_at": "2021-08-21T00:58:38Z", - "updated_at": "2021-08-25T04:26:10Z", + "updated_at": "2024-09-30T20:27:29Z", "pushed_at": "2021-08-21T02:53:39Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 0 } diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index ca41b2ebf2..c8b68d336d 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -907,10 +907,10 @@ "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2021-12-10T23:19:28Z", - "updated_at": "2024-09-30T08:44:02Z", + "updated_at": "2024-09-30T20:07:44Z", "pushed_at": "2024-02-12T22:37:25Z", - "stargazers_count": 1794, - "watchers_count": 1794, + "stargazers_count": 1793, + "watchers_count": 1793, "has_discussions": false, "forks_count": 525, "allow_forking": true, @@ -924,7 +924,7 @@ ], "visibility": "public", "forks": 525, - "watchers": 1794, + "watchers": 1793, "score": 0, "subscribers_count": 27 }, diff --git a/2022/CVE-2022-22063.json b/2022/CVE-2022-22063.json index 2dabac80eb..b793c47e34 100644 --- a/2022/CVE-2022-22063.json +++ b/2022/CVE-2022-22063.json @@ -13,10 +13,10 @@ "description": "Security issue in the hypervisor firmware of some older Qualcomm chipsets", "fork": false, "created_at": "2022-12-27T19:48:30Z", - "updated_at": "2024-09-30T13:19:52Z", + "updated_at": "2024-09-30T20:58:39Z", "pushed_at": "2022-12-27T20:32:37Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 17, + "watchers_count": 17, "has_discussions": true, "forks_count": 0, "allow_forking": true, @@ -34,7 +34,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 16, + "watchers": 17, "score": 0, "subscribers_count": 1 } diff --git a/2022/CVE-2022-25479.json b/2022/CVE-2022-25479.json index 976f690d90..2c906bccc6 100644 --- a/2022/CVE-2022-25479.json +++ b/2022/CVE-2022-25479.json @@ -13,8 +13,8 @@ "description": "CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK) ROUGHT SKELLETON ATM. WILL EVENTUALLY TURN IT INTO FULL EOP", "fork": false, "created_at": "2024-09-17T06:28:17Z", - "updated_at": "2024-09-29T08:26:04Z", - "pushed_at": "2024-09-17T07:05:02Z", + "updated_at": "2024-09-30T22:57:59Z", + "pushed_at": "2024-09-30T22:57:56Z", "stargazers_count": 16, "watchers_count": 16, "has_discussions": false, diff --git a/2024/CVE-2024-20017.json b/2024/CVE-2024-20017.json index 90556427bb..5fdb50a25e 100644 --- a/2024/CVE-2024-20017.json +++ b/2024/CVE-2024-20017.json @@ -18,13 +18,13 @@ "stargazers_count": 114, "watchers_count": 114, "has_discussions": false, - "forks_count": 26, + "forks_count": 27, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 26, + "forks": 27, "watchers": 114, "score": 0, "subscribers_count": 3 diff --git a/2024/CVE-2024-26229.json b/2024/CVE-2024-26229.json index cc0c8e49c4..cb6cb04924 100644 --- a/2024/CVE-2024-26229.json +++ b/2024/CVE-2024-26229.json @@ -48,13 +48,13 @@ "stargazers_count": 93, "watchers_count": 93, "has_discussions": false, - "forks_count": 23, + "forks_count": 22, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 23, + "forks": 22, "watchers": 93, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-2961.json b/2024/CVE-2024-2961.json index 9d1cf75ef1..84b3782b92 100644 --- a/2024/CVE-2024-2961.json +++ b/2024/CVE-2024-2961.json @@ -73,19 +73,19 @@ "description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()", "fork": false, "created_at": "2024-05-27T08:30:06Z", - "updated_at": "2024-09-30T08:46:00Z", + "updated_at": "2024-09-30T20:17:55Z", "pushed_at": "2024-09-30T08:45:56Z", - "stargazers_count": 386, - "watchers_count": 386, + "stargazers_count": 387, + "watchers_count": 387, "has_discussions": false, - "forks_count": 51, + "forks_count": 52, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 51, - "watchers": 386, + "forks": 52, + "watchers": 387, "score": 0, "subscribers_count": 8 }, diff --git a/2024/CVE-2024-30088.json b/2024/CVE-2024-30088.json index 6774de5cc2..93d038ebab 100644 --- a/2024/CVE-2024-30088.json +++ b/2024/CVE-2024-30088.json @@ -103,19 +103,19 @@ "description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088", "fork": false, "created_at": "2024-07-15T08:07:05Z", - "updated_at": "2024-09-30T18:05:09Z", + "updated_at": "2024-09-30T21:52:00Z", "pushed_at": "2024-09-08T21:23:34Z", - "stargazers_count": 370, - "watchers_count": 370, + "stargazers_count": 375, + "watchers_count": 375, "has_discussions": false, - "forks_count": 30, + "forks_count": 31, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 30, - "watchers": 370, + "forks": 31, + "watchers": 375, "score": 0, "subscribers_count": 17 }, diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json index b50da10643..85aa16d7de 100644 --- a/2024/CVE-2024-3094.json +++ b/2024/CVE-2024-3094.json @@ -982,10 +982,10 @@ "description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)", "fork": false, "created_at": "2024-04-01T14:28:09Z", - "updated_at": "2024-09-30T08:50:43Z", + "updated_at": "2024-09-30T22:11:43Z", "pushed_at": "2024-04-03T04:58:50Z", - "stargazers_count": 3489, - "watchers_count": 3489, + "stargazers_count": 3490, + "watchers_count": 3490, "has_discussions": false, "forks_count": 239, "allow_forking": true, @@ -994,7 +994,7 @@ "topics": [], "visibility": "public", "forks": 239, - "watchers": 3489, + "watchers": 3490, "score": 0, "subscribers_count": 39 }, diff --git a/2024/CVE-2024-36877.json b/2024/CVE-2024-36877.json index fa539afeda..1eb551d8f1 100644 --- a/2024/CVE-2024-36877.json +++ b/2024/CVE-2024-36877.json @@ -13,10 +13,10 @@ "description": "Exploit POC for CVE-2024-36877", "fork": false, "created_at": "2024-08-09T15:33:04Z", - "updated_at": "2024-09-11T11:51:00Z", + "updated_at": "2024-09-30T20:49:18Z", "pushed_at": "2024-08-14T15:26:18Z", - "stargazers_count": 42, - "watchers_count": 42, + "stargazers_count": 43, + "watchers_count": 43, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 42, + "watchers": 43, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-38200.json b/2024/CVE-2024-38200.json index de31c8b17a..1864deb56b 100644 --- a/2024/CVE-2024-38200.json +++ b/2024/CVE-2024-38200.json @@ -13,10 +13,10 @@ "description": "CVE-2024-38200 - Microsoft Office NTLMv2 Disclosure Vulnerability ", "fork": false, "created_at": "2024-09-24T19:24:55Z", - "updated_at": "2024-09-30T13:50:19Z", + "updated_at": "2024-09-30T18:43:56Z", "pushed_at": "2024-09-25T21:57:51Z", - "stargazers_count": 59, - "watchers_count": 59, + "stargazers_count": 60, + "watchers_count": 60, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 59, + "watchers": 60, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-40431.json b/2024/CVE-2024-40431.json index 976f690d90..2c906bccc6 100644 --- a/2024/CVE-2024-40431.json +++ b/2024/CVE-2024-40431.json @@ -13,8 +13,8 @@ "description": "CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK) ROUGHT SKELLETON ATM. WILL EVENTUALLY TURN IT INTO FULL EOP", "fork": false, "created_at": "2024-09-17T06:28:17Z", - "updated_at": "2024-09-29T08:26:04Z", - "pushed_at": "2024-09-17T07:05:02Z", + "updated_at": "2024-09-30T22:57:59Z", + "pushed_at": "2024-09-30T22:57:56Z", "stargazers_count": 16, "watchers_count": 16, "has_discussions": false, diff --git a/2024/CVE-2024-45200.json b/2024/CVE-2024-45200.json index 6cbf62154e..3cad584078 100644 --- a/2024/CVE-2024-45200.json +++ b/2024/CVE-2024-45200.json @@ -13,10 +13,10 @@ "description": "Information & PoC for CVE-2024-45200, Mario Kart 8 Deluxe's \"KartLANPwn\" buffer overflow vulnerability", "fork": false, "created_at": "2024-09-13T00:41:32Z", - "updated_at": "2024-09-30T16:50:40Z", + "updated_at": "2024-09-30T21:05:39Z", "pushed_at": "2024-09-30T08:30:09Z", - "stargazers_count": 24, - "watchers_count": 24, + "stargazers_count": 25, + "watchers_count": 25, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 24, + "watchers": 25, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-6769.json b/2024/CVE-2024-6769.json index d8dc4f7c8f..32841b5ebc 100644 --- a/2024/CVE-2024-6769.json +++ b/2024/CVE-2024-6769.json @@ -13,10 +13,10 @@ "description": "Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)", "fork": false, "created_at": "2024-08-29T16:40:49Z", - "updated_at": "2024-09-30T15:06:54Z", + "updated_at": "2024-10-01T00:19:40Z", "pushed_at": "2024-09-29T21:58:19Z", - "stargazers_count": 32, - "watchers_count": 32, + "stargazers_count": 34, + "watchers_count": 34, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 32, + "watchers": 34, "score": 0, "subscribers_count": 2 } diff --git a/2024/CVE-2024-8353.json b/2024/CVE-2024-8353.json index e71f7d09b1..4a14d2ca3d 100644 --- a/2024/CVE-2024-8353.json +++ b/2024/CVE-2024-8353.json @@ -13,10 +13,10 @@ "description": "Proof-of-Concept for CVE-2024-8353", "fork": false, "created_at": "2024-09-30T17:33:59Z", - "updated_at": "2024-09-30T18:13:55Z", - "pushed_at": "2024-09-30T18:13:52Z", - "stargazers_count": 1, - "watchers_count": 1, + "updated_at": "2024-10-01T00:04:55Z", + "pushed_at": "2024-10-01T00:04:52Z", + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -33,7 +33,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 0 }