diff --git a/2010/CVE-2010-2075.json b/2010/CVE-2010-2075.json index 2f4a101829..8ff175909a 100644 --- a/2010/CVE-2010-2075.json +++ b/2010/CVE-2010-2075.json @@ -88,5 +88,35 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 788614854, + "name": "UnrealIRCd-3.2.8.1-Backdoor-Command-Execution", + "full_name": "JoseLRC97\/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution", + "owner": { + "login": "JoseLRC97", + "id": 56311988, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56311988?v=4", + "html_url": "https:\/\/github.com\/JoseLRC97" + }, + "html_url": "https:\/\/github.com\/JoseLRC97\/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution", + "description": "Script that exploits the vulnerability that allows establishing a backdoor in the UnrealIRCd service with CVE-2010-2075", + "fork": false, + "created_at": "2024-04-18T18:55:27Z", + "updated_at": "2024-04-18T18:58:51Z", + "pushed_at": "2024-04-18T18:59:13Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2015/CVE-2015-3306.json b/2015/CVE-2015-3306.json index cfa1c2700f..59b2859d02 100644 --- a/2015/CVE-2015-3306.json +++ b/2015/CVE-2015-3306.json @@ -347,11 +347,11 @@ "html_url": "https:\/\/github.com\/JoseLRC97" }, "html_url": "https:\/\/github.com\/JoseLRC97\/ProFTPd-1.3.5-mod_copy-Remote-Command-Execution", - "description": "Script that exploits the vulnerability of the ProFTP 1.3.5 service with CVE-2015-3306", + "description": "Script that exploits the vulnerability of the ProFTPd 1.3.5 service with CVE-2015-3306", "fork": false, "created_at": "2024-04-18T18:05:06Z", - "updated_at": "2024-04-18T18:05:07Z", - "pushed_at": "2024-04-18T18:08:32Z", + "updated_at": "2024-04-18T18:13:27Z", + "pushed_at": "2024-04-18T18:37:14Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2016/CVE-2016-2098.json b/2016/CVE-2016-2098.json index 34e0cef8d5..83081fc8cb 100644 --- a/2016/CVE-2016-2098.json +++ b/2016/CVE-2016-2098.json @@ -311,5 +311,35 @@ "watchers": 3, "score": 0, "subscribers_count": 1 + }, + { + "id": 788610920, + "name": "Ruby-on-Rails-ActionPack-Inline-ERB-Remote-Code-Execution", + "full_name": "JoseLRC97\/Ruby-on-Rails-ActionPack-Inline-ERB-Remote-Code-Execution", + "owner": { + "login": "JoseLRC97", + "id": 56311988, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56311988?v=4", + "html_url": "https:\/\/github.com\/JoseLRC97" + }, + "html_url": "https:\/\/github.com\/JoseLRC97\/Ruby-on-Rails-ActionPack-Inline-ERB-Remote-Code-Execution", + "description": "Script that exploits the vulnerability that allows remote code execution in Ruby 2.3.8 ​​with CVE-2016-2098", + "fork": false, + "created_at": "2024-04-18T18:45:28Z", + "updated_at": "2024-04-18T18:48:28Z", + "pushed_at": "2024-04-18T18:48:25Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2018/CVE-2018-15473.json b/2018/CVE-2018-15473.json index 8720f31d2c..43e9b9d3b9 100644 --- a/2018/CVE-2018-15473.json +++ b/2018/CVE-2018-15473.json @@ -119,10 +119,10 @@ "description": "Multi-threaded, IPv6 aware, wordlists\/single-user username enumeration via CVE-2018-15473", "fork": false, "created_at": "2018-10-03T10:18:04Z", - "updated_at": "2024-04-04T08:30:54Z", + "updated_at": "2024-04-18T19:17:35Z", "pushed_at": "2019-03-24T11:20:27Z", - "stargazers_count": 91, - "watchers_count": 91, + "stargazers_count": 92, + "watchers_count": 92, "has_discussions": false, "forks_count": 30, "allow_forking": true, @@ -131,7 +131,7 @@ "topics": [], "visibility": "public", "forks": 30, - "watchers": 91, + "watchers": 92, "score": 0, "subscribers_count": 1 }, diff --git a/2021/CVE-2021-23337.json b/2021/CVE-2021-23337.json deleted file mode 100644 index fda109ee4a..0000000000 --- a/2021/CVE-2021-23337.json +++ /dev/null @@ -1,32 +0,0 @@ -[ - { - "id": 787709839, - "name": "CVE-2021-23337-template", - "full_name": "ebickle\/CVE-2021-23337-template", - "owner": { - "login": "ebickle", - "id": 2086875, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2086875?v=4", - "html_url": "https:\/\/github.com\/ebickle" - }, - "html_url": "https:\/\/github.com\/ebickle\/CVE-2021-23337-template", - "description": null, - "fork": false, - "created_at": "2024-04-17T03:09:52Z", - "updated_at": "2024-04-17T03:16:23Z", - "pushed_at": "2024-04-17T03:37:35Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2021/CVE-2021-26084.json b/2021/CVE-2021-26084.json index 418d0d484b..889f9b76d2 100644 --- a/2021/CVE-2021-26084.json +++ b/2021/CVE-2021-26084.json @@ -1115,35 +1115,5 @@ "watchers": 0, "score": 0, "subscribers_count": 1 - }, - { - "id": 788551005, - "name": "CVE-2021-26084_Confluence_RCE", - "full_name": "Marshall-Hallenbeck\/CVE-2021-26084_Confluence_RCE", - "owner": { - "login": "Marshall-Hallenbeck", - "id": 1518719, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1518719?v=4", - "html_url": "https:\/\/github.com\/Marshall-Hallenbeck" - }, - "html_url": "https:\/\/github.com\/Marshall-Hallenbeck\/CVE-2021-26084_Confluence_RCE", - "description": "Python3 RCE PoC for CVE-2021-26084", - "fork": false, - "created_at": "2024-04-18T16:28:15Z", - "updated_at": "2024-04-18T16:28:16Z", - "pushed_at": "2024-04-18T16:28:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2021/CVE-2021-43857.json b/2021/CVE-2021-43857.json index b35571aa10..379aea052f 100644 --- a/2021/CVE-2021-43857.json +++ b/2021/CVE-2021-43857.json @@ -13,10 +13,10 @@ "description": "Gerapy prior to version 0.9.8 is vulnerable to remote code execution. This issue is patched in version 0.9.8.", "fork": false, "created_at": "2022-01-03T16:47:42Z", - "updated_at": "2023-11-08T16:17:57Z", + "updated_at": "2024-04-18T18:30:48Z", "pushed_at": "2022-01-03T16:53:04Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index d3dfdb3888..c4677704cd 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -907,10 +907,10 @@ "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2021-12-10T23:19:28Z", - "updated_at": "2024-04-18T13:45:27Z", + "updated_at": "2024-04-18T23:45:37Z", "pushed_at": "2024-02-12T22:37:25Z", - "stargazers_count": 1748, - "watchers_count": 1748, + "stargazers_count": 1749, + "watchers_count": 1749, "has_discussions": false, "forks_count": 513, "allow_forking": true, @@ -924,7 +924,7 @@ ], "visibility": "public", "forks": 513, - "watchers": 1748, + "watchers": 1749, "score": 0, "subscribers_count": 28 }, diff --git a/2022/CVE-2022-42889.json b/2022/CVE-2022-42889.json index f8e7317d4e..6a9e04ab25 100644 --- a/2022/CVE-2022-42889.json +++ b/2022/CVE-2022-42889.json @@ -1064,7 +1064,7 @@ "fork": false, "created_at": "2023-02-19T19:49:41Z", "updated_at": "2023-03-26T07:35:15Z", - "pushed_at": "2024-04-17T00:18:11Z", + "pushed_at": "2024-04-18T18:27:52Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, @@ -1424,7 +1424,7 @@ "fork": false, "created_at": "2023-09-22T17:17:26Z", "updated_at": "2023-09-22T17:17:44Z", - "pushed_at": "2024-03-22T06:11:09Z", + "pushed_at": "2024-04-18T18:54:01Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/2022/CVE-2022-44877.json b/2022/CVE-2022-44877.json index 88720795b6..21297c423f 100644 --- a/2022/CVE-2022-44877.json +++ b/2022/CVE-2022-44877.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-01-05T17:29:10Z", - "updated_at": "2024-01-24T11:22:26Z", + "updated_at": "2024-04-18T21:49:00Z", "pushed_at": "2023-01-05T17:40:18Z", - "stargazers_count": 103, - "watchers_count": 103, + "stargazers_count": 102, + "watchers_count": 102, "has_discussions": false, "forks_count": 22, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 22, - "watchers": 103, + "watchers": 102, "score": 0, "subscribers_count": 5 }, diff --git a/2023/CVE-2023-2024.json b/2023/CVE-2023-2024.json index 84c4c98dd7..045d42e87c 100644 --- a/2023/CVE-2023-2024.json +++ b/2023/CVE-2023-2024.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2023-12-04T15:55:22Z", "updated_at": "2024-04-02T23:46:40Z", - "pushed_at": "2024-04-09T09:00:15Z", + "pushed_at": "2024-04-18T22:00:21Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, diff --git a/2023/CVE-2023-27053.json b/2023/CVE-2023-27053.json deleted file mode 100644 index 5f52073417..0000000000 --- a/2023/CVE-2023-27053.json +++ /dev/null @@ -1,32 +0,0 @@ -[ - { - "id": 603535681, - "name": "CVE-2023-27053_XSS", - "full_name": "d3fudd\/CVE-2023-27053_XSS", - "owner": { - "login": "d3fudd", - "id": 76706456, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76706456?v=4", - "html_url": "https:\/\/github.com\/d3fudd" - }, - "html_url": "https:\/\/github.com\/d3fudd\/CVE-2023-27053_XSS", - "description": "CVE-2023-27053 - The cross-site scripting (XSS) vulnerability in the macFiltering and portIpFiltering endpoints allows attackers to insert javascript code through the macAddress and ipAddress parameters. The vulnerability affects the HUMAX DO BRASIL INDÚSTRIA ELETRÔNICA LTDA Model HGJ310 (CLARO) BRGCAI 1.0.69 router", - "fork": false, - "created_at": "2023-02-18T20:05:47Z", - "updated_at": "2024-01-23T23:50:53Z", - "pushed_at": "2023-05-17T00:51:37Z", - "stargazers_count": 2, - "watchers_count": 2, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 2, - "score": 0, - "subscribers_count": 1 - } -] \ No newline at end of file diff --git a/2023/CVE-2023-38831.json b/2023/CVE-2023-38831.json index 0a8d012711..ab21d61751 100644 --- a/2023/CVE-2023-38831.json +++ b/2023/CVE-2023-38831.json @@ -174,10 +174,10 @@ "description": "CVE-2023-38831 PoC (Proof Of Concept)", "fork": false, "created_at": "2023-08-28T04:56:10Z", - "updated_at": "2024-04-11T16:55:02Z", + "updated_at": "2024-04-18T19:36:09Z", "pushed_at": "2023-08-28T20:41:57Z", - "stargazers_count": 54, - "watchers_count": 54, + "stargazers_count": 55, + "watchers_count": 55, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -186,7 +186,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 54, + "watchers": 55, "score": 0, "subscribers_count": 0 }, @@ -264,10 +264,10 @@ "description": "CVE-2023-38831 WinRAR", "fork": false, "created_at": "2023-08-28T14:48:35Z", - "updated_at": "2024-03-09T09:05:49Z", + "updated_at": "2024-04-18T19:39:48Z", "pushed_at": "2023-08-28T15:35:43Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -276,7 +276,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-21338.json b/2024/CVE-2024-21338.json index 3e8c9f7056..bc2c0856b8 100644 --- a/2024/CVE-2024-21338.json +++ b/2024/CVE-2024-21338.json @@ -13,10 +13,10 @@ "description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.", "fork": false, "created_at": "2024-04-13T05:53:02Z", - "updated_at": "2024-04-18T17:12:36Z", + "updated_at": "2024-04-18T20:16:20Z", "pushed_at": "2024-04-16T21:00:14Z", - "stargazers_count": 155, - "watchers_count": 155, + "stargazers_count": 156, + "watchers_count": 156, "has_discussions": false, "forks_count": 35, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 35, - "watchers": 155, + "watchers": 156, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-23334.json b/2024/CVE-2024-23334.json index adfccc85e3..130880dc1d 100644 --- a/2024/CVE-2024-23334.json +++ b/2024/CVE-2024-23334.json @@ -103,10 +103,10 @@ "description": "aiohttp LFI (CVE-2024-23334)", "fork": false, "created_at": "2024-03-19T16:28:56Z", - "updated_at": "2024-04-08T11:56:50Z", + "updated_at": "2024-04-19T00:27:32Z", "pushed_at": "2024-03-19T17:06:26Z", - "stargazers_count": 17, - "watchers_count": 17, + "stargazers_count": 18, + "watchers_count": 18, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 17, + "watchers": 18, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-2432.json b/2024/CVE-2024-2432.json index 712a48eefa..ae3e352f01 100644 --- a/2024/CVE-2024-2432.json +++ b/2024/CVE-2024-2432.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2024-03-14T17:48:49Z", - "updated_at": "2024-04-17T12:54:11Z", + "updated_at": "2024-04-18T21:33:45Z", "pushed_at": "2024-03-14T17:49:48Z", - "stargazers_count": 48, - "watchers_count": 48, + "stargazers_count": 49, + "watchers_count": 49, "has_discussions": false, "forks_count": 14, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 14, - "watchers": 48, + "watchers": 49, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json index ab978a0632..c3bb6a69a7 100644 --- a/2024/CVE-2024-3094.json +++ b/2024/CVE-2024-3094.json @@ -498,7 +498,7 @@ "stargazers_count": 130, "watchers_count": 130, "has_discussions": false, - "forks_count": 21, + "forks_count": 22, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -509,7 +509,7 @@ "xz" ], "visibility": "public", - "forks": 21, + "forks": 22, "watchers": 130, "score": 0, "subscribers_count": 8 @@ -1012,7 +1012,7 @@ "description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)", "fork": false, "created_at": "2024-04-01T14:28:09Z", - "updated_at": "2024-04-18T18:21:33Z", + "updated_at": "2024-04-18T20:26:16Z", "pushed_at": "2024-04-03T04:58:50Z", "stargazers_count": 3386, "watchers_count": 3386, @@ -1102,10 +1102,10 @@ "description": "XZ Backdoor Extract(Test on Ubuntu 23.10)", "fork": false, "created_at": "2024-04-01T16:08:50Z", - "updated_at": "2024-04-15T16:23:36Z", + "updated_at": "2024-04-18T22:54:23Z", "pushed_at": "2024-04-02T07:12:53Z", - "stargazers_count": 14, - "watchers_count": 14, + "stargazers_count": 15, + "watchers_count": 15, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -1119,7 +1119,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 14, + "watchers": 15, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-3400.json b/2024/CVE-2024-3400.json index 5b814c6453..45d3f39de0 100644 --- a/2024/CVE-2024-3400.json +++ b/2024/CVE-2024-3400.json @@ -283,10 +283,10 @@ "description": "CVE-2024-3400 Palo Alto OS Command Injection", "fork": false, "created_at": "2024-04-16T14:18:08Z", - "updated_at": "2024-04-18T17:12:56Z", + "updated_at": "2024-04-18T23:26:52Z", "pushed_at": "2024-04-16T22:35:43Z", - "stargazers_count": 74, - "watchers_count": 74, + "stargazers_count": 77, + "watchers_count": 77, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -295,7 +295,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 74, + "watchers": 77, "score": 0, "subscribers_count": 1 }, @@ -313,10 +313,10 @@ "description": "CVE-2024-3400-RCE", "fork": false, "created_at": "2024-04-16T16:18:56Z", - "updated_at": "2024-04-18T15:50:02Z", + "updated_at": "2024-04-18T20:47:11Z", "pushed_at": "2024-04-17T01:11:01Z", - "stargazers_count": 12, - "watchers_count": 12, + "stargazers_count": 13, + "watchers_count": 13, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -325,7 +325,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 12, + "watchers": 13, "score": 0, "subscribers_count": 2 }, @@ -373,10 +373,10 @@ "description": null, "fork": false, "created_at": "2024-04-16T21:21:41Z", - "updated_at": "2024-04-18T10:12:34Z", + "updated_at": "2024-04-18T23:17:15Z", "pushed_at": "2024-04-17T21:04:22Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -385,7 +385,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 }, @@ -558,13 +558,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 @@ -613,10 +613,10 @@ "description": null, "fork": false, "created_at": "2024-04-18T10:16:22Z", - "updated_at": "2024-04-18T10:25:23Z", - "pushed_at": "2024-04-18T14:41:07Z", - "stargazers_count": 0, - "watchers_count": 0, + "updated_at": "2024-04-18T19:39:44Z", + "pushed_at": "2024-04-18T19:23:30Z", + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -625,7 +625,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 0 }, @@ -670,10 +670,10 @@ "html_url": "https:\/\/github.com\/codeblueprint" }, "html_url": "https:\/\/github.com\/codeblueprint\/CVE-2024-3400", - "description": "Simple Python code to check for arbitrary uploading", + "description": "Simple Python code to check for arbitrary uploading for PaloAlto CVE-2024-3400", "fork": false, "created_at": "2024-04-18T16:35:29Z", - "updated_at": "2024-04-18T17:01:39Z", + "updated_at": "2024-04-18T20:15:20Z", "pushed_at": "2024-04-18T17:31:26Z", "stargazers_count": 0, "watchers_count": 0, @@ -718,5 +718,65 @@ "watchers": 1, "score": 0, "subscribers_count": 0 + }, + { + "id": 788665827, + "name": "CVE-2024-3400-Check", + "full_name": "sxyrxyy\/CVE-2024-3400-Check", + "owner": { + "login": "sxyrxyy", + "id": 125439203, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125439203?v=4", + "html_url": "https:\/\/github.com\/sxyrxyy" + }, + "html_url": "https:\/\/github.com\/sxyrxyy\/CVE-2024-3400-Check", + "description": null, + "fork": false, + "created_at": "2024-04-18T21:12:49Z", + "updated_at": "2024-04-18T21:13:17Z", + "pushed_at": "2024-04-18T22:56:48Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + }, + { + "id": 788666276, + "name": "CVE-2024-3400", + "full_name": "Ravaan21\/CVE-2024-3400", + "owner": { + "login": "Ravaan21", + "id": 48627542, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48627542?v=4", + "html_url": "https:\/\/github.com\/Ravaan21" + }, + "html_url": "https:\/\/github.com\/Ravaan21\/CVE-2024-3400", + "description": "CVE-2024-3400 POC written in Rust and Python", + "fork": false, + "created_at": "2024-04-18T21:14:15Z", + "updated_at": "2024-04-18T21:16:31Z", + "pushed_at": "2024-04-18T21:21:15Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/README.md b/README.md index d61524741f..9c3f993d18 100644 --- a/README.md +++ b/README.md @@ -377,7 +377,7 @@ ### CVE-2024-3400 (2024-04-12) -A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.\n\nCloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability. +A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.\n\nCloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability. - [Yuvvi01/CVE-2024-3400](https://github.com/Yuvvi01/CVE-2024-3400) @@ -404,6 +404,8 @@ - [hahasagined/CVE-2024-3400](https://github.com/hahasagined/CVE-2024-3400) - [codeblueprint/CVE-2024-3400](https://github.com/codeblueprint/CVE-2024-3400) - [swaybs/CVE-2024-3400](https://github.com/swaybs/CVE-2024-3400) +- [sxyrxyy/CVE-2024-3400-Check](https://github.com/sxyrxyy/CVE-2024-3400-Check) +- [Ravaan21/CVE-2024-3400](https://github.com/Ravaan21/CVE-2024-3400) ### CVE-2024-12883 - [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883) @@ -4090,9 +4092,6 @@ - [fivex3/CVE-2023-27035](https://github.com/fivex3/CVE-2023-27035) -### CVE-2023-27053 -- [d3fudd/CVE-2023-27053_XSS](https://github.com/d3fudd/CVE-2023-27053_XSS) - ### CVE-2023-27100 (2023-03-22) Improper restriction of excessive authentication attempts in the SSHGuard component of Netgate pfSense Plus software v22.05.1 and pfSense CE software v2.6.0 allows attackers to bypass brute force protection mechanisms via crafted web requests. @@ -17488,13 +17487,6 @@ - [HoangKien1020/CVE-2021-23132](https://github.com/HoangKien1020/CVE-2021-23132) -### CVE-2021-23337 (2021-02-15) - -Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function. - - -- [ebickle/CVE-2021-23337-template](https://github.com/ebickle/CVE-2021-23337-template) - ### CVE-2021-23358 (2021-03-29) The package underscore from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Injection via the template function, particularly when a variable property is passed as an argument as it is not sanitized. @@ -17887,7 +17879,6 @@ - [30579096/Confluence-CVE-2021-26084](https://github.com/30579096/Confluence-CVE-2021-26084) - [antx-code/CVE-2021-26084](https://github.com/antx-code/CVE-2021-26084) - [vpxuser/CVE-2021-26084-EXP](https://github.com/vpxuser/CVE-2021-26084-EXP) -- [Marshall-Hallenbeck/CVE-2021-26084_Confluence_RCE](https://github.com/Marshall-Hallenbeck/CVE-2021-26084_Confluence_RCE) ### CVE-2021-26085 (2021-07-29) @@ -37377,6 +37368,7 @@ - [Debalinax64/CVE-2016-2098](https://github.com/Debalinax64/CVE-2016-2098) - [j4k0m/CVE-2016-2098](https://github.com/j4k0m/CVE-2016-2098) - [Shakun8/CVE-2016-2098](https://github.com/Shakun8/CVE-2016-2098) +- [JoseLRC97/Ruby-on-Rails-ActionPack-Inline-ERB-Remote-Code-Execution](https://github.com/JoseLRC97/Ruby-on-Rails-ActionPack-Inline-ERB-Remote-Code-Execution) ### CVE-2016-2107 (2016-05-05) @@ -41054,6 +41046,7 @@ - [MFernstrom/OffensivePascal-CVE-2010-2075](https://github.com/MFernstrom/OffensivePascal-CVE-2010-2075) - [chancej715/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution](https://github.com/chancej715/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution) - [FredBrave/CVE-2010-2075-UnrealIRCd-3.2.8.1](https://github.com/FredBrave/CVE-2010-2075-UnrealIRCd-3.2.8.1) +- [JoseLRC97/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution](https://github.com/JoseLRC97/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution) ### CVE-2010-2387 (2012-12-21)