diff --git a/2016/CVE-2016-3088.json b/2016/CVE-2016-3088.json index 7d4db2441b..19b3f10a4c 100644 --- a/2016/CVE-2016-3088.json +++ b/2016/CVE-2016-3088.json @@ -173,10 +173,10 @@ "description": "ActiveMQ系列漏洞探测利用工具,包括ActiveMQ 默认口令漏洞及ActiveMQ任意文件写入漏洞(CVE-2016-3088),支持批量探测利用。", "fork": false, "created_at": "2022-04-02T08:40:10Z", - "updated_at": "2024-08-11T01:57:49Z", + "updated_at": "2024-12-26T03:30:18Z", "pushed_at": "2022-04-02T08:55:07Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 17, + "watchers_count": 17, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -185,7 +185,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 16, + "watchers": 17, "score": 0, "subscribers_count": 1 } diff --git a/2017/CVE-2017-12615.json b/2017/CVE-2017-12615.json index bafbefa86e..5932467cb0 100644 --- a/2017/CVE-2017-12615.json +++ b/2017/CVE-2017-12615.json @@ -417,12 +417,12 @@ "description": "tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含", "fork": false, "created_at": "2024-08-29T06:38:16Z", - "updated_at": "2024-12-25T08:49:58Z", + "updated_at": "2024-12-26T03:38:47Z", "pushed_at": "2024-11-13T03:12:58Z", - "stargazers_count": 164, - "watchers_count": 164, + "stargazers_count": 165, + "watchers_count": 165, "has_discussions": false, - "forks_count": 15, + "forks_count": 14, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -436,8 +436,8 @@ "tools" ], "visibility": "public", - "forks": 15, - "watchers": 164, + "forks": 14, + "watchers": 165, "score": 0, "subscribers_count": 2 }, diff --git a/2019/CVE-2019-1040.json b/2019/CVE-2019-1040.json index cc9ce162c4..e7b8e7270d 100644 --- a/2019/CVE-2019-1040.json +++ b/2019/CVE-2019-1040.json @@ -107,19 +107,19 @@ "description": null, "fork": false, "created_at": "2019-06-24T15:33:50Z", - "updated_at": "2024-12-25T14:32:19Z", + "updated_at": "2024-12-26T00:10:58Z", "pushed_at": "2020-11-09T07:33:12Z", - "stargazers_count": 288, - "watchers_count": 288, + "stargazers_count": 289, + "watchers_count": 289, "has_discussions": false, - "forks_count": 55, + "forks_count": 56, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 55, - "watchers": 288, + "forks": 56, + "watchers": 289, "score": 0, "subscribers_count": 8 }, diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index 59fcbcd708..9e7dea5442 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -45,10 +45,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2024-12-18T12:07:09Z", + "updated_at": "2024-12-26T03:18:18Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 4147, - "watchers_count": 4147, + "stargazers_count": 4146, + "watchers_count": 4146, "has_discussions": false, "forks_count": 1099, "allow_forking": true, @@ -77,7 +77,7 @@ ], "visibility": "public", "forks": 1099, - "watchers": 4147, + "watchers": 4146, "score": 0, "subscribers_count": 149 }, diff --git a/2020/CVE-2020-12695.json b/2020/CVE-2020-12695.json index 144c8115a4..4742916b14 100644 --- a/2020/CVE-2020-12695.json +++ b/2020/CVE-2020-12695.json @@ -19,13 +19,13 @@ "stargazers_count": 405, "watchers_count": 405, "has_discussions": false, - "forks_count": 64, + "forks_count": 63, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 64, + "forks": 63, "watchers": 405, "score": 0, "subscribers_count": 10 diff --git a/2020/CVE-2020-13937.json b/2020/CVE-2020-13937.json index 311efb8bcc..d2ed97b38e 100644 --- a/2020/CVE-2020-13937.json +++ b/2020/CVE-2020-13937.json @@ -14,10 +14,10 @@ "description": "Apache Kylin API未授权访问漏洞;CVE-2020-13937;Apache Kylin漏洞", "fork": false, "created_at": "2021-01-15T08:57:09Z", - "updated_at": "2021-10-19T07:11:42Z", + "updated_at": "2024-12-26T03:59:50Z", "pushed_at": "2021-01-15T08:59:18Z", - "stargazers_count": 9, - "watchers_count": 9, + "stargazers_count": 10, + "watchers_count": 10, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 9, + "watchers": 10, "score": 0, "subscribers_count": 3 }, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index 538677178d..14598b0f2d 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -14,10 +14,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2024-12-18T12:07:09Z", + "updated_at": "2024-12-26T03:18:18Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 4147, - "watchers_count": 4147, + "stargazers_count": 4146, + "watchers_count": 4146, "has_discussions": false, "forks_count": 1099, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 1099, - "watchers": 4147, + "watchers": 4146, "score": 0, "subscribers_count": 149 }, @@ -985,5 +985,36 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 908439500, + "name": "CVE-2020-14882-HoaxShell", + "full_name": "AleksaZatezalo\/CVE-2020-14882-HoaxShell", + "owner": { + "login": "AleksaZatezalo", + "id": 59803757, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59803757?v=4", + "html_url": "https:\/\/github.com\/AleksaZatezalo", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/AleksaZatezalo\/CVE-2020-14882-HoaxShell", + "description": null, + "fork": false, + "created_at": "2024-12-26T04:45:46Z", + "updated_at": "2024-12-26T04:47:06Z", + "pushed_at": "2024-12-26T04:47:03Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2020/CVE-2020-17530.json b/2020/CVE-2020-17530.json index c3f2a4ddfa..aba528753d 100644 --- a/2020/CVE-2020-17530.json +++ b/2020/CVE-2020-17530.json @@ -81,13 +81,13 @@ "stargazers_count": 48, "watchers_count": 48, "has_discussions": false, - "forks_count": 25, + "forks_count": 23, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 25, + "forks": 23, "watchers": 48, "score": 0, "subscribers_count": 2 diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index afc3a371e4..cb694ebd4e 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -981,12 +981,12 @@ "description": "tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含", "fork": false, "created_at": "2024-08-29T06:38:16Z", - "updated_at": "2024-12-25T08:49:58Z", + "updated_at": "2024-12-26T03:38:47Z", "pushed_at": "2024-11-13T03:12:58Z", - "stargazers_count": 164, - "watchers_count": 164, + "stargazers_count": 165, + "watchers_count": 165, "has_discussions": false, - "forks_count": 15, + "forks_count": 14, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -1000,8 +1000,8 @@ "tools" ], "visibility": "public", - "forks": 15, - "watchers": 164, + "forks": 14, + "watchers": 165, "score": 0, "subscribers_count": 2 } diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json index 54a4a1efde..2d14b9527c 100644 --- a/2021/CVE-2021-21972.json +++ b/2021/CVE-2021-21972.json @@ -848,10 +848,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2024-12-25T09:32:14Z", + "updated_at": "2024-12-26T06:14:49Z", "pushed_at": "2024-04-25T06:09:38Z", - "stargazers_count": 1349, - "watchers_count": 1349, + "stargazers_count": 1351, + "watchers_count": 1351, "has_discussions": false, "forks_count": 166, "allow_forking": true, @@ -867,7 +867,7 @@ ], "visibility": "public", "forks": 166, - "watchers": 1349, + "watchers": 1351, "score": 0, "subscribers_count": 15 } diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json index 72beecf86f..20f37eaaee 100644 --- a/2021/CVE-2021-4034.json +++ b/2021/CVE-2021-4034.json @@ -967,10 +967,10 @@ "description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation", "fork": false, "created_at": "2022-01-26T14:26:10Z", - "updated_at": "2024-12-24T10:18:05Z", + "updated_at": "2024-12-26T05:22:40Z", "pushed_at": "2022-06-21T14:52:05Z", - "stargazers_count": 1098, - "watchers_count": 1098, + "stargazers_count": 1099, + "watchers_count": 1099, "has_discussions": false, "forks_count": 191, "allow_forking": true, @@ -981,7 +981,7 @@ ], "visibility": "public", "forks": 191, - "watchers": 1098, + "watchers": 1099, "score": 0, "subscribers_count": 14 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index b8df8175ee..40b43274fa 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -2027,10 +2027,10 @@ "description": "A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC", "fork": false, "created_at": "2021-12-12T00:29:03Z", - "updated_at": "2024-11-12T20:26:27Z", + "updated_at": "2024-12-26T05:13:44Z", "pushed_at": "2022-03-10T18:44:50Z", - "stargazers_count": 638, - "watchers_count": 638, + "stargazers_count": 637, + "watchers_count": 637, "has_discussions": false, "forks_count": 98, "allow_forking": true, @@ -2051,7 +2051,7 @@ ], "visibility": "public", "forks": 98, - "watchers": 638, + "watchers": 637, "score": 0, "subscribers_count": 28 }, diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index af33e15063..31c6eb1b03 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -792,10 +792,10 @@ "description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接", "fork": false, "created_at": "2022-10-04T03:39:27Z", - "updated_at": "2024-12-25T09:32:14Z", + "updated_at": "2024-12-26T06:14:49Z", "pushed_at": "2024-04-25T06:09:38Z", - "stargazers_count": 1349, - "watchers_count": 1349, + "stargazers_count": 1351, + "watchers_count": 1351, "has_discussions": false, "forks_count": 166, "allow_forking": true, @@ -811,7 +811,7 @@ ], "visibility": "public", "forks": 166, - "watchers": 1349, + "watchers": 1351, "score": 0, "subscribers_count": 15 } diff --git a/2022/CVE-2022-37706.json b/2022/CVE-2022-37706.json index e22484efc4..047b4e1f06 100644 --- a/2022/CVE-2022-37706.json +++ b/2022/CVE-2022-37706.json @@ -14,10 +14,10 @@ "description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)", "fork": false, "created_at": "2022-09-12T19:22:44Z", - "updated_at": "2024-12-24T05:42:08Z", + "updated_at": "2024-12-26T05:57:27Z", "pushed_at": "2022-09-19T19:41:34Z", - "stargazers_count": 301, - "watchers_count": 301, + "stargazers_count": 302, + "watchers_count": 302, "has_discussions": false, "forks_count": 42, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 42, - "watchers": 301, + "watchers": 302, "score": 0, "subscribers_count": 6 }, diff --git a/2023/CVE-2023-21554.json b/2023/CVE-2023-21554.json index dfb267d2dc..73e971a5c8 100644 --- a/2023/CVE-2023-21554.json +++ b/2023/CVE-2023-21554.json @@ -14,10 +14,10 @@ "description": "CVE-2023-21554 Windows MessageQueuing PoC,分析见 https:\/\/www.zoemurmure.top\/posts\/cve_2023_21554\/", "fork": false, "created_at": "2023-05-18T10:30:49Z", - "updated_at": "2024-12-09T09:20:31Z", + "updated_at": "2024-12-26T02:20:05Z", "pushed_at": "2023-05-18T10:38:57Z", - "stargazers_count": 55, - "watchers_count": 55, + "stargazers_count": 56, + "watchers_count": 56, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 55, + "watchers": 56, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-26067.json b/2023/CVE-2023-26067.json index d30c6ce529..51638a5246 100644 --- a/2023/CVE-2023-26067.json +++ b/2023/CVE-2023-26067.json @@ -14,10 +14,10 @@ "description": "Lexmark CVE-2023-26067", "fork": false, "created_at": "2023-08-07T20:55:15Z", - "updated_at": "2024-07-18T11:40:15Z", + "updated_at": "2024-12-26T01:24:31Z", "pushed_at": "2023-08-08T13:54:06Z", - "stargazers_count": 22, - "watchers_count": 22, + "stargazers_count": 23, + "watchers_count": 23, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 22, + "watchers": 23, "score": 0, "subscribers_count": 4 } diff --git a/2023/CVE-2023-38646.json b/2023/CVE-2023-38646.json index bbd0b2b4da..5bfd70f7dd 100644 --- a/2023/CVE-2023-38646.json +++ b/2023/CVE-2023-38646.json @@ -582,10 +582,10 @@ "description": "CVE-2023-38646 Metabase RCE", "fork": false, "created_at": "2023-10-11T03:18:09Z", - "updated_at": "2024-11-29T23:36:25Z", + "updated_at": "2024-12-26T05:01:51Z", "pushed_at": "2023-10-11T04:06:43Z", - "stargazers_count": 50, - "watchers_count": 50, + "stargazers_count": 51, + "watchers_count": 51, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -599,7 +599,7 @@ ], "visibility": "public", "forks": 5, - "watchers": 50, + "watchers": 51, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-38709.json b/2023/CVE-2023-38709.json index b4ab0f7cd2..a73501421b 100644 --- a/2023/CVE-2023-38709.json +++ b/2023/CVE-2023-38709.json @@ -14,10 +14,10 @@ "description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709", "fork": false, "created_at": "2024-10-05T20:32:45Z", - "updated_at": "2024-12-24T14:37:11Z", + "updated_at": "2024-12-26T06:26:47Z", "pushed_at": "2024-10-05T20:37:02Z", - "stargazers_count": 47, - "watchers_count": 47, + "stargazers_count": 46, + "watchers_count": 46, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -37,7 +37,7 @@ ], "visibility": "public", "forks": 8, - "watchers": 47, + "watchers": 46, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index c2d9d49b89..75234b0430 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -14,10 +14,10 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2024-12-24T13:37:29Z", + "updated_at": "2024-12-26T03:33:10Z", "pushed_at": "2024-08-18T08:26:46Z", - "stargazers_count": 1313, - "watchers_count": 1313, + "stargazers_count": 1312, + "watchers_count": 1312, "has_discussions": false, "forks_count": 221, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 221, - "watchers": 1313, + "watchers": 1312, "score": 0, "subscribers_count": 21 }, diff --git a/2023/CVE-2023-46604.json b/2023/CVE-2023-46604.json index e356a47251..4b3d8d5303 100644 --- a/2023/CVE-2023-46604.json +++ b/2023/CVE-2023-46604.json @@ -45,19 +45,19 @@ "description": "ActiveMQ RCE (CVE-2023-46604) 漏洞利用工具", "fork": false, "created_at": "2023-10-27T05:57:21Z", - "updated_at": "2024-12-18T05:48:13Z", + "updated_at": "2024-12-26T05:27:55Z", "pushed_at": "2024-01-29T02:28:11Z", - "stargazers_count": 228, - "watchers_count": 228, + "stargazers_count": 230, + "watchers_count": 230, "has_discussions": false, - "forks_count": 28, + "forks_count": 29, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 28, - "watchers": 228, + "forks": 29, + "watchers": 230, "score": 0, "subscribers_count": 4 }, @@ -76,10 +76,10 @@ "description": "CVE-2023-46604", "fork": false, "created_at": "2023-10-27T12:22:43Z", - "updated_at": "2024-11-09T17:57:37Z", + "updated_at": "2024-12-26T03:27:25Z", "pushed_at": "2023-11-03T14:14:31Z", - "stargazers_count": 62, - "watchers_count": 62, + "stargazers_count": 63, + "watchers_count": 63, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 62, + "watchers": 63, "score": 0, "subscribers_count": 0 }, diff --git a/2024/CVE-2024-11281.json b/2024/CVE-2024-11281.json index f5c38b5486..a24d0c2ddc 100644 --- a/2024/CVE-2024-11281.json +++ b/2024/CVE-2024-11281.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 2, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-1212.json b/2024/CVE-2024-1212.json index a0fd6d3683..b2f9d2ca04 100644 --- a/2024/CVE-2024-1212.json +++ b/2024/CVE-2024-1212.json @@ -90,6 +90,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-20137.json b/2024/CVE-2024-20137.json index 2f02eabd97..2ae1333faa 100644 --- a/2024/CVE-2024-20137.json +++ b/2024/CVE-2024-20137.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-21762.json b/2024/CVE-2024-21762.json index bc35fcb292..918981da8a 100644 --- a/2024/CVE-2024-21762.json +++ b/2024/CVE-2024-21762.json @@ -76,10 +76,10 @@ "description": "out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability ", "fork": false, "created_at": "2024-03-13T09:17:28Z", - "updated_at": "2024-12-17T08:07:54Z", + "updated_at": "2024-12-26T06:23:07Z", "pushed_at": "2024-03-16T00:35:12Z", - "stargazers_count": 126, - "watchers_count": 126, + "stargazers_count": 127, + "watchers_count": 127, "has_discussions": false, "forks_count": 20, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 20, - "watchers": 126, + "watchers": 127, "score": 0, "subscribers_count": 5 }, diff --git a/2024/CVE-2024-23334.json b/2024/CVE-2024-23334.json index 0f56fc2282..bf539dee10 100644 --- a/2024/CVE-2024-23334.json +++ b/2024/CVE-2024-23334.json @@ -403,6 +403,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-27348.json b/2024/CVE-2024-27348.json index b9aa68f36c..35e2e2bba6 100644 --- a/2024/CVE-2024-27348.json +++ b/2024/CVE-2024-27348.json @@ -14,10 +14,10 @@ "description": "Apache HugeGraph Server RCE Scanner ( CVE-2024-27348 )", "fork": false, "created_at": "2024-05-31T20:11:37Z", - "updated_at": "2024-11-20T16:30:48Z", + "updated_at": "2024-12-26T06:26:46Z", "pushed_at": "2024-06-08T09:12:43Z", - "stargazers_count": 61, - "watchers_count": 61, + "stargazers_count": 60, + "watchers_count": 60, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -33,7 +33,7 @@ ], "visibility": "public", "forks": 15, - "watchers": 61, + "watchers": 60, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-30085.json b/2024/CVE-2024-30085.json index ee02338545..602ba7e5d9 100644 --- a/2024/CVE-2024-30085.json +++ b/2024/CVE-2024-30085.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json index 535beb04f0..784fc05127 100644 --- a/2024/CVE-2024-3094.json +++ b/2024/CVE-2024-3094.json @@ -952,10 +952,10 @@ "description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)", "fork": false, "created_at": "2024-04-01T14:28:09Z", - "updated_at": "2024-12-22T07:18:57Z", + "updated_at": "2024-12-26T06:26:44Z", "pushed_at": "2024-04-03T04:58:50Z", - "stargazers_count": 3500, - "watchers_count": 3500, + "stargazers_count": 3499, + "watchers_count": 3499, "has_discussions": false, "forks_count": 240, "allow_forking": true, @@ -964,7 +964,7 @@ "topics": [], "visibility": "public", "forks": 240, - "watchers": 3500, + "watchers": 3499, "score": 0, "subscribers_count": 38 }, diff --git a/2024/CVE-2024-32113.json b/2024/CVE-2024-32113.json index 969ba2c9b0..5c737512c8 100644 --- a/2024/CVE-2024-32113.json +++ b/2024/CVE-2024-32113.json @@ -14,10 +14,10 @@ "description": "Apache OfBiz vulns", "fork": false, "created_at": "2024-04-10T13:22:11Z", - "updated_at": "2024-11-30T07:55:30Z", + "updated_at": "2024-12-26T06:26:45Z", "pushed_at": "2024-08-05T06:40:47Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 8, + "watchers": 7, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-36401.json b/2024/CVE-2024-36401.json index a1356a9e6f..b9c149e715 100644 --- a/2024/CVE-2024-36401.json +++ b/2024/CVE-2024-36401.json @@ -207,10 +207,10 @@ "description": "GeoServer Remote Code Execution", "fork": false, "created_at": "2024-07-30T18:43:40Z", - "updated_at": "2024-12-25T19:00:32Z", + "updated_at": "2024-12-26T04:35:42Z", "pushed_at": "2024-08-02T14:57:26Z", - "stargazers_count": 76, - "watchers_count": 76, + "stargazers_count": 77, + "watchers_count": 77, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -219,7 +219,7 @@ "topics": [], "visibility": "public", "forks": 12, - "watchers": 76, + "watchers": 77, "score": 0, "subscribers_count": 1 }, @@ -362,10 +362,10 @@ "description": "geoserver图形化漏洞利用工具", "fork": false, "created_at": "2024-10-05T10:08:55Z", - "updated_at": "2024-12-22T12:02:20Z", + "updated_at": "2024-12-26T04:19:46Z", "pushed_at": "2024-10-08T03:16:26Z", - "stargazers_count": 26, - "watchers_count": 26, + "stargazers_count": 27, + "watchers_count": 27, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -374,7 +374,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 26, + "watchers": 27, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-36991.json b/2024/CVE-2024-36991.json index 3f8de3000d..f365e5f8db 100644 --- a/2024/CVE-2024-36991.json +++ b/2024/CVE-2024-36991.json @@ -14,10 +14,10 @@ "description": "POC for CVE-2024-36991: This exploit will attempt to read Splunk \/etc\/passwd file.", "fork": false, "created_at": "2024-07-06T00:49:40Z", - "updated_at": "2024-12-22T20:26:26Z", + "updated_at": "2024-12-26T06:26:46Z", "pushed_at": "2024-07-12T00:41:36Z", - "stargazers_count": 114, - "watchers_count": 114, + "stargazers_count": 113, + "watchers_count": 113, "has_discussions": false, "forks_count": 21, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 21, - "watchers": 114, + "watchers": 113, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-38063.json b/2024/CVE-2024-38063.json index 62b222f97e..9a6f48c022 100644 --- a/2024/CVE-2024-38063.json +++ b/2024/CVE-2024-38063.json @@ -265,10 +265,10 @@ "description": "poc for CVE-2024-38063 (RCE in tcpip.sys)", "fork": false, "created_at": "2024-08-24T18:25:46Z", - "updated_at": "2024-12-25T08:57:08Z", + "updated_at": "2024-12-26T02:57:45Z", "pushed_at": "2024-08-27T12:22:39Z", - "stargazers_count": 641, - "watchers_count": 641, + "stargazers_count": 642, + "watchers_count": 642, "has_discussions": false, "forks_count": 115, "allow_forking": true, @@ -277,7 +277,7 @@ "topics": [], "visibility": "public", "forks": 115, - "watchers": 641, + "watchers": 642, "score": 0, "subscribers_count": 4 }, diff --git a/2024/CVE-2024-38472.json b/2024/CVE-2024-38472.json index 78a3f2659e..a6314fb0f4 100644 --- a/2024/CVE-2024-38472.json +++ b/2024/CVE-2024-38472.json @@ -45,10 +45,10 @@ "description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709", "fork": false, "created_at": "2024-10-05T20:32:45Z", - "updated_at": "2024-12-24T14:37:11Z", + "updated_at": "2024-12-26T06:26:47Z", "pushed_at": "2024-10-05T20:37:02Z", - "stargazers_count": 47, - "watchers_count": 47, + "stargazers_count": 46, + "watchers_count": 46, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -68,7 +68,7 @@ ], "visibility": "public", "forks": 8, - "watchers": 47, + "watchers": 46, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-42327.json b/2024/CVE-2024-42327.json index 2c61fafff8..7b986f1c9a 100644 --- a/2024/CVE-2024-42327.json +++ b/2024/CVE-2024-42327.json @@ -45,10 +45,10 @@ "description": "PoC for CVE-2024-42327 \/ ZBX-25623", "fork": false, "created_at": "2024-12-03T12:44:07Z", - "updated_at": "2024-12-07T18:03:18Z", + "updated_at": "2024-12-26T01:27:56Z", "pushed_at": "2024-12-03T12:56:52Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 17, + "watchers_count": 17, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 16, + "watchers": 17, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-4577.json b/2024/CVE-2024-4577.json index 6fa25bcfd5..63c6bea437 100644 --- a/2024/CVE-2024-4577.json +++ b/2024/CVE-2024-4577.json @@ -169,10 +169,10 @@ "description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC", "fork": false, "created_at": "2024-06-07T09:52:54Z", - "updated_at": "2024-12-20T09:02:13Z", + "updated_at": "2024-12-26T06:26:46Z", "pushed_at": "2024-06-22T15:13:52Z", - "stargazers_count": 244, - "watchers_count": 244, + "stargazers_count": 243, + "watchers_count": 243, "has_discussions": false, "forks_count": 52, "allow_forking": true, @@ -181,7 +181,7 @@ "topics": [], "visibility": "public", "forks": 52, - "watchers": 244, + "watchers": 243, "score": 0, "subscribers_count": 4 }, diff --git a/2024/CVE-2024-49112.json b/2024/CVE-2024-49112.json index 72d9f6cd2d..2e6e5fc8e4 100644 --- a/2024/CVE-2024-49112.json +++ b/2024/CVE-2024-49112.json @@ -59,6 +59,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-50379.json b/2024/CVE-2024-50379.json index e933c9bd57..b8cc0791a5 100644 --- a/2024/CVE-2024-50379.json +++ b/2024/CVE-2024-50379.json @@ -200,10 +200,10 @@ "description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp", "fork": false, "created_at": "2024-12-23T07:20:47Z", - "updated_at": "2024-12-25T21:53:18Z", + "updated_at": "2024-12-26T03:14:09Z", "pushed_at": "2024-12-23T07:30:27Z", - "stargazers_count": 35, - "watchers_count": 35, + "stargazers_count": 38, + "watchers_count": 38, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -212,9 +212,9 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 35, + "watchers": 38, "score": 0, - "subscribers_count": 2 + "subscribers_count": 3 }, { "id": 907408912, @@ -262,8 +262,8 @@ "description": "CVE-2024-50379-exp", "fork": false, "created_at": "2024-12-25T02:41:31Z", - "updated_at": "2024-12-25T07:54:45Z", - "pushed_at": "2024-12-25T07:54:42Z", + "updated_at": "2024-12-26T06:28:50Z", + "pushed_at": "2024-12-26T06:28:46Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, @@ -276,7 +276,7 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 }, { "id": 908327097, @@ -307,7 +307,7 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 }, { "id": 908364457, @@ -338,6 +338,6 @@ "forks": 1, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-50623.json b/2024/CVE-2024-50623.json index f35739b8ac..39f4e3278a 100644 --- a/2024/CVE-2024-50623.json +++ b/2024/CVE-2024-50623.json @@ -65,6 +65,6 @@ "forks": 4, "watchers": 3, "score": 0, - "subscribers_count": 1 + "subscribers_count": 2 } ] \ No newline at end of file diff --git a/2024/CVE-2024-53677.json b/2024/CVE-2024-53677.json index f6e26b5a1d..9e316f55e3 100644 --- a/2024/CVE-2024-53677.json +++ b/2024/CVE-2024-53677.json @@ -45,10 +45,10 @@ "description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.", "fork": false, "created_at": "2024-12-13T17:42:55Z", - "updated_at": "2024-12-25T09:09:58Z", + "updated_at": "2024-12-26T01:46:25Z", "pushed_at": "2024-12-20T10:05:15Z", - "stargazers_count": 71, - "watchers_count": 71, + "stargazers_count": 72, + "watchers_count": 72, "has_discussions": false, "forks_count": 29, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 29, - "watchers": 71, + "watchers": 72, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-56431.json b/2024/CVE-2024-56431.json index 43f0980cf3..d1d4b40c5d 100644 --- a/2024/CVE-2024-56431.json +++ b/2024/CVE-2024-56431.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json index 272dca2873..72dd9976f2 100644 --- a/2024/CVE-2024-6387.json +++ b/2024/CVE-2024-6387.json @@ -45,10 +45,10 @@ "description": "32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo\/cve-2024-6387-poc", "fork": false, "created_at": "2024-07-01T12:16:21Z", - "updated_at": "2024-11-20T16:30:52Z", + "updated_at": "2024-12-26T06:26:46Z", "pushed_at": "2024-07-01T12:25:01Z", - "stargazers_count": 381, - "watchers_count": 381, + "stargazers_count": 380, + "watchers_count": 380, "has_discussions": false, "forks_count": 90, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 90, - "watchers": 381, + "watchers": 380, "score": 0, "subscribers_count": 8 }, @@ -1159,10 +1159,10 @@ "description": "CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.", "fork": false, "created_at": "2024-07-02T14:41:43Z", - "updated_at": "2024-12-14T03:39:21Z", + "updated_at": "2024-12-26T06:26:46Z", "pushed_at": "2024-07-02T15:16:04Z", - "stargazers_count": 32, - "watchers_count": 32, + "stargazers_count": 31, + "watchers_count": 31, "has_discussions": false, "forks_count": 8, "allow_forking": true, @@ -1181,7 +1181,7 @@ ], "visibility": "public", "forks": 8, - "watchers": 32, + "watchers": 31, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-7479.json b/2024/CVE-2024-7479.json index 49560dd56d..20c48d3c56 100644 --- a/2024/CVE-2024-7479.json +++ b/2024/CVE-2024-7479.json @@ -14,10 +14,10 @@ "description": "TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.", "fork": false, "created_at": "2024-09-29T10:58:15Z", - "updated_at": "2024-12-22T21:34:29Z", + "updated_at": "2024-12-26T02:57:19Z", "pushed_at": "2024-12-22T21:34:26Z", - "stargazers_count": 131, - "watchers_count": 131, + "stargazers_count": 132, + "watchers_count": 132, "has_discussions": false, "forks_count": 20, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 20, - "watchers": 131, + "watchers": 132, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-9047.json b/2024/CVE-2024-9047.json index 9ddcc046bb..1906bba0d7 100644 --- a/2024/CVE-2024-9047.json +++ b/2024/CVE-2024-9047.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-9935.json b/2024/CVE-2024-9935.json index 62b8339536..8794ee8c2e 100644 --- a/2024/CVE-2024-9935.json +++ b/2024/CVE-2024-9935.json @@ -97,6 +97,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/README.md b/README.md index 2df2a0db80..80c988da1f 100644 --- a/README.md +++ b/README.md @@ -33199,6 +33199,7 @@ - [LucasPDiniz/CVE-2020-14882](https://github.com/LucasPDiniz/CVE-2020-14882) - [xMr110/CVE-2020-14882](https://github.com/xMr110/CVE-2020-14882) - [zesnd/CVE-2020-14882-POC](https://github.com/zesnd/CVE-2020-14882-POC) +- [AleksaZatezalo/CVE-2020-14882-HoaxShell](https://github.com/AleksaZatezalo/CVE-2020-14882-HoaxShell) ### CVE-2020-14883 (2020-10-21)