diff --git a/2007/CVE-2007-2447.json b/2007/CVE-2007-2447.json index a5e67c5784..e47409ee8b 100644 --- a/2007/CVE-2007-2447.json +++ b/2007/CVE-2007-2447.json @@ -868,5 +868,35 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 825943567, + "name": "CVE-2007-2447-Exploit", + "full_name": "IamLucif3r\/CVE-2007-2447-Exploit", + "owner": { + "login": "IamLucif3r", + "id": 53969258, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53969258?v=4", + "html_url": "https:\/\/github.com\/IamLucif3r" + }, + "html_url": "https:\/\/github.com\/IamLucif3r\/CVE-2007-2447-Exploit", + "description": "This is a exploit for CVE-2007-2447; Vulnerable SMB ", + "fork": false, + "created_at": "2024-07-08T20:03:32Z", + "updated_at": "2024-07-08T20:10:28Z", + "pushed_at": "2024-07-08T20:10:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2014/CVE-2014-2630.json b/2014/CVE-2014-2630.json index b0d31f0ba6..87a80304fa 100644 --- a/2014/CVE-2014-2630.json +++ b/2014/CVE-2014-2630.json @@ -13,10 +13,10 @@ "description": "CVE-2014-2630 exploit for xglance-bin ", "fork": false, "created_at": "2020-02-04T16:47:44Z", - "updated_at": "2024-04-02T22:15:37Z", + "updated_at": "2024-07-08T23:56:11Z", "pushed_at": "2020-02-10T21:16:02Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 } diff --git a/2017/CVE-2017-11882.json b/2017/CVE-2017-11882.json index ba130a62b1..1b8849d0aa 100644 --- a/2017/CVE-2017-11882.json +++ b/2017/CVE-2017-11882.json @@ -133,10 +133,10 @@ "description": "CVE-2017-11882 Exploit accepts over 17k bytes long command\/code in maximum.", "fork": false, "created_at": "2017-11-21T15:22:41Z", - "updated_at": "2024-07-03T21:22:12Z", + "updated_at": "2024-07-08T19:43:18Z", "pushed_at": "2017-12-06T12:47:31Z", - "stargazers_count": 325, - "watchers_count": 325, + "stargazers_count": 326, + "watchers_count": 326, "has_discussions": false, "forks_count": 95, "allow_forking": true, @@ -150,7 +150,7 @@ ], "visibility": "public", "forks": 95, - "watchers": 325, + "watchers": 326, "score": 0, "subscribers_count": 18 }, diff --git a/2018/CVE-2018-14847.json b/2018/CVE-2018-14847.json index 0f55313270..ae66a4ea43 100644 --- a/2018/CVE-2018-14847.json +++ b/2018/CVE-2018-14847.json @@ -258,10 +258,10 @@ "description": "This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead.", "fork": false, "created_at": "2021-04-21T16:42:31Z", - "updated_at": "2024-06-13T10:12:40Z", + "updated_at": "2024-07-08T18:22:46Z", "pushed_at": "2021-04-21T16:46:37Z", - "stargazers_count": 38, - "watchers_count": 38, + "stargazers_count": 39, + "watchers_count": 39, "has_discussions": false, "forks_count": 16, "allow_forking": true, @@ -270,7 +270,7 @@ "topics": [], "visibility": "public", "forks": 16, - "watchers": 38, + "watchers": 39, "score": 0, "subscribers_count": 3 }, diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index dc35ce5b8c..ff85ed5873 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -2902,13 +2902,13 @@ "stargazers_count": 234, "watchers_count": 234, "has_discussions": false, - "forks_count": 75, + "forks_count": 76, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 75, + "forks": 76, "watchers": 234, "score": 0, "subscribers_count": 22 diff --git a/2020/CVE-2020-11881.json b/2020/CVE-2020-11881.json index b691b269ee..4bad1bcb1f 100644 --- a/2020/CVE-2020-11881.json +++ b/2020/CVE-2020-11881.json @@ -13,10 +13,10 @@ "description": "CVE-2020-11881: unauthenticated remote DoS for MikroTik SMB service.", "fork": false, "created_at": "2020-06-17T12:15:56Z", - "updated_at": "2022-03-20T03:25:00Z", + "updated_at": "2024-07-08T19:26:59Z", "pushed_at": "2020-09-26T13:33:27Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 8, + "watchers": 9, "score": 0, "subscribers_count": 2 } diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index 5d66e0c6d7..f14b0629a6 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -13,10 +13,10 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-11T15:10:30Z", - "updated_at": "2024-07-04T15:04:40Z", + "updated_at": "2024-07-08T21:32:56Z", "pushed_at": "2022-07-10T22:23:13Z", - "stargazers_count": 966, - "watchers_count": 966, + "stargazers_count": 967, + "watchers_count": 967, "has_discussions": false, "forks_count": 190, "allow_forking": true, @@ -30,7 +30,7 @@ ], "visibility": "public", "forks": 190, - "watchers": 966, + "watchers": 967, "score": 0, "subscribers_count": 26 }, diff --git a/2022/CVE-2022-0185.json b/2022/CVE-2022-0185.json index 6cde3049a8..3c13b054d6 100644 --- a/2022/CVE-2022-0185.json +++ b/2022/CVE-2022-0185.json @@ -13,10 +13,10 @@ "description": "CVE-2022-0185", "fork": false, "created_at": "2022-01-19T06:19:38Z", - "updated_at": "2024-07-07T05:17:58Z", + "updated_at": "2024-07-08T20:49:22Z", "pushed_at": "2022-04-25T04:11:33Z", - "stargazers_count": 365, - "watchers_count": 365, + "stargazers_count": 366, + "watchers_count": 366, "has_discussions": false, "forks_count": 58, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 58, - "watchers": 365, + "watchers": 366, "score": 0, "subscribers_count": 39 }, diff --git a/2022/CVE-2022-20452.json b/2022/CVE-2022-20452.json index 81f67ff04d..797b11e060 100644 --- a/2022/CVE-2022-20452.json +++ b/2022/CVE-2022-20452.json @@ -13,10 +13,10 @@ "description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()", "fork": false, "created_at": "2023-01-10T16:24:51Z", - "updated_at": "2024-07-07T23:51:05Z", + "updated_at": "2024-07-08T20:23:44Z", "pushed_at": "2023-04-12T17:28:49Z", - "stargazers_count": 268, - "watchers_count": 268, + "stargazers_count": 267, + "watchers_count": 267, "has_discussions": false, "forks_count": 50, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 50, - "watchers": 268, + "watchers": 267, "score": 0, "subscribers_count": 9 } diff --git a/2022/CVE-2022-27925.json b/2022/CVE-2022-27925.json index a5550b7791..0f13044a25 100644 --- a/2022/CVE-2022-27925.json +++ b/2022/CVE-2022-27925.json @@ -138,10 +138,10 @@ "description": "Zimbra CVE-2022-27925 PoC", "fork": false, "created_at": "2022-08-20T15:58:29Z", - "updated_at": "2024-06-06T08:46:22Z", + "updated_at": "2024-07-08T20:23:41Z", "pushed_at": "2022-08-27T20:30:21Z", - "stargazers_count": 44, - "watchers_count": 44, + "stargazers_count": 42, + "watchers_count": 42, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -156,7 +156,7 @@ ], "visibility": "public", "forks": 23, - "watchers": 44, + "watchers": 42, "score": 0, "subscribers_count": 2 }, diff --git a/2022/CVE-2022-38694.json b/2022/CVE-2022-38694.json index e229b2d759..00a12143c8 100644 --- a/2022/CVE-2022-38694.json +++ b/2022/CVE-2022-38694.json @@ -13,10 +13,10 @@ "description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692", "fork": false, "created_at": "2023-06-10T08:31:26Z", - "updated_at": "2024-07-01T09:10:08Z", + "updated_at": "2024-07-08T22:13:14Z", "pushed_at": "2024-04-05T06:46:47Z", - "stargazers_count": 235, - "watchers_count": 235, + "stargazers_count": 236, + "watchers_count": 236, "has_discussions": true, "forks_count": 33, "allow_forking": true, @@ -28,7 +28,7 @@ ], "visibility": "public", "forks": 33, - "watchers": 235, + "watchers": 236, "score": 0, "subscribers_count": 6 }, diff --git a/2022/CVE-2022-43959.json b/2022/CVE-2022-43959.json index 6fb8a903b0..a782d669ae 100644 --- a/2022/CVE-2022-43959.json +++ b/2022/CVE-2022-43959.json @@ -13,10 +13,10 @@ "description": "Bitrix Vulnerability CVE-2022-43959", "fork": false, "created_at": "2022-10-28T08:52:17Z", - "updated_at": "2024-02-28T08:22:02Z", + "updated_at": "2024-07-08T21:00:34Z", "pushed_at": "2023-03-18T10:34:26Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 3, "score": 0, "subscribers_count": 1 } diff --git a/2022/CVE-2022-46689.json b/2022/CVE-2022-46689.json index 00e643d8a8..0e88c7ed1c 100644 --- a/2022/CVE-2022-46689.json +++ b/2022/CVE-2022-46689.json @@ -73,10 +73,10 @@ "description": "CVE-2022-46689", "fork": false, "created_at": "2022-12-26T00:08:55Z", - "updated_at": "2024-06-07T00:32:50Z", + "updated_at": "2024-07-08T20:43:26Z", "pushed_at": "2023-10-10T16:53:48Z", - "stargazers_count": 116, - "watchers_count": 116, + "stargazers_count": 117, + "watchers_count": 117, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 116, + "watchers": 117, "score": 0, "subscribers_count": 8 }, diff --git a/2023/CVE-2023-41993.json b/2023/CVE-2023-41993.json index 8a09c74ff2..a948bb477a 100644 --- a/2023/CVE-2023-41993.json +++ b/2023/CVE-2023-41993.json @@ -18,13 +18,13 @@ "stargazers_count": 191, "watchers_count": 191, "has_discussions": false, - "forks_count": 34, + "forks_count": 33, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 34, + "forks": 33, "watchers": 191, "score": 0, "subscribers_count": 10 diff --git a/2023/CVE-2023-4220.json b/2023/CVE-2023-4220.json index adae31f5c4..6a2691f4f2 100644 --- a/2023/CVE-2023-4220.json +++ b/2023/CVE-2023-4220.json @@ -56,7 +56,7 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -68,7 +68,7 @@ "hackthebox" ], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index c85e0e297e..97ea040e3c 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -13,10 +13,10 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2024-07-08T14:15:46Z", + "updated_at": "2024-07-09T00:16:03Z", "pushed_at": "2024-07-05T12:35:27Z", - "stargazers_count": 959, - "watchers_count": 959, + "stargazers_count": 961, + "watchers_count": 961, "has_discussions": false, "forks_count": 162, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 162, - "watchers": 959, + "watchers": 961, "score": 0, "subscribers_count": 16 }, diff --git a/2024/CVE-2024-0044.json b/2024/CVE-2024-0044.json index 70edf6c3ac..fe6e83e247 100644 --- a/2024/CVE-2024-0044.json +++ b/2024/CVE-2024-0044.json @@ -13,10 +13,10 @@ "description": "Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely", "fork": false, "created_at": "2024-06-18T09:22:59Z", - "updated_at": "2024-07-07T04:49:30Z", + "updated_at": "2024-07-08T22:49:10Z", "pushed_at": "2024-06-18T09:35:44Z", - "stargazers_count": 39, - "watchers_count": 39, + "stargazers_count": 41, + "watchers_count": 41, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 39, + "watchers": 41, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json index c7d06c3db0..eab7b5c326 100644 --- a/2024/CVE-2024-1086.json +++ b/2024/CVE-2024-1086.json @@ -13,10 +13,10 @@ "description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.", "fork": false, "created_at": "2024-03-20T21:16:41Z", - "updated_at": "2024-07-08T16:03:47Z", + "updated_at": "2024-07-08T20:23:49Z", "pushed_at": "2024-04-17T16:09:54Z", - "stargazers_count": 2174, - "watchers_count": 2174, + "stargazers_count": 2173, + "watchers_count": 2173, "has_discussions": false, "forks_count": 283, "allow_forking": true, @@ -31,7 +31,7 @@ ], "visibility": "public", "forks": 283, - "watchers": 2174, + "watchers": 2173, "score": 0, "subscribers_count": 23 }, diff --git a/2024/CVE-2024-21338.json b/2024/CVE-2024-21338.json index 50db651d4e..101597311d 100644 --- a/2024/CVE-2024-21338.json +++ b/2024/CVE-2024-21338.json @@ -13,10 +13,10 @@ "description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.", "fork": false, "created_at": "2024-04-13T05:53:02Z", - "updated_at": "2024-07-08T04:00:47Z", + "updated_at": "2024-07-08T20:23:50Z", "pushed_at": "2024-04-16T21:00:14Z", - "stargazers_count": 245, - "watchers_count": 245, + "stargazers_count": 244, + "watchers_count": 244, "has_discussions": false, "forks_count": 56, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 56, - "watchers": 245, + "watchers": 244, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-21762.json b/2024/CVE-2024-21762.json index 20f620c846..1506e22c6d 100644 --- a/2024/CVE-2024-21762.json +++ b/2024/CVE-2024-21762.json @@ -13,10 +13,10 @@ "description": "Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762", "fork": false, "created_at": "2024-02-28T21:16:10Z", - "updated_at": "2024-06-29T01:59:53Z", + "updated_at": "2024-07-08T22:34:58Z", "pushed_at": "2024-07-05T09:37:05Z", - "stargazers_count": 91, - "watchers_count": 91, + "stargazers_count": 92, + "watchers_count": 92, "has_discussions": false, "forks_count": 13, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 13, - "watchers": 91, + "watchers": 92, "score": 0, "subscribers_count": 6 }, diff --git a/2024/CVE-2024-22274.json b/2024/CVE-2024-22274.json index 8b24906acd..dd3b7356d8 100644 --- a/2024/CVE-2024-22274.json +++ b/2024/CVE-2024-22274.json @@ -13,10 +13,10 @@ "description": "CVE-2024-22274: Authenticated Remote Code Execution in VMware vCenter Server", "fork": false, "created_at": "2024-07-06T17:55:25Z", - "updated_at": "2024-07-08T11:26:00Z", + "updated_at": "2024-07-09T00:10:06Z", "pushed_at": "2024-07-06T18:10:20Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 8, + "watchers": 9, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-28995.json b/2024/CVE-2024-28995.json index da80926e52..e0f2b277d8 100644 --- a/2024/CVE-2024-28995.json +++ b/2024/CVE-2024-28995.json @@ -223,10 +223,10 @@ "description": "CVE-2024-28955 Exploitation PoC ", "fork": false, "created_at": "2024-07-01T11:49:51Z", - "updated_at": "2024-07-06T07:24:46Z", + "updated_at": "2024-07-08T19:15:04Z", "pushed_at": "2024-07-01T12:53:21Z", - "stargazers_count": 24, - "watchers_count": 24, + "stargazers_count": 25, + "watchers_count": 25, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -244,7 +244,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 24, + "watchers": 25, "score": 0, "subscribers_count": 2 } diff --git a/2024/CVE-2024-30851.json b/2024/CVE-2024-30851.json index b0e1ccb0b4..7969d9441a 100644 --- a/2024/CVE-2024-30851.json +++ b/2024/CVE-2024-30851.json @@ -13,10 +13,10 @@ "description": "Jasmin ransomware web panel path traversal PoC", "fork": false, "created_at": "2024-04-04T22:59:55Z", - "updated_at": "2024-05-22T21:42:43Z", + "updated_at": "2024-07-08T20:23:49Z", "pushed_at": "2024-04-09T03:40:52Z", - "stargazers_count": 23, - "watchers_count": 23, + "stargazers_count": 22, + "watchers_count": 22, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 23, + "watchers": 22, "score": 0, "subscribers_count": 2 } diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json index ec8b565d55..1f1ef708d8 100644 --- a/2024/CVE-2024-3094.json +++ b/2024/CVE-2024-3094.json @@ -1012,10 +1012,10 @@ "description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)", "fork": false, "created_at": "2024-04-01T14:28:09Z", - "updated_at": "2024-07-08T08:13:44Z", + "updated_at": "2024-07-08T20:23:49Z", "pushed_at": "2024-04-03T04:58:50Z", - "stargazers_count": 3470, - "watchers_count": 3470, + "stargazers_count": 3469, + "watchers_count": 3469, "has_discussions": false, "forks_count": 235, "allow_forking": true, @@ -1024,7 +1024,7 @@ "topics": [], "visibility": "public", "forks": 235, - "watchers": 3470, + "watchers": 3469, "score": 0, "subscribers_count": 39 }, diff --git a/2024/CVE-2024-3400.json b/2024/CVE-2024-3400.json index 2b656812ca..f3e486343d 100644 --- a/2024/CVE-2024-3400.json +++ b/2024/CVE-2024-3400.json @@ -288,13 +288,13 @@ "stargazers_count": 141, "watchers_count": 141, "has_discussions": false, - "forks_count": 23, + "forks_count": 24, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 23, + "forks": 24, "watchers": 141, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-34102.json b/2024/CVE-2024-34102.json index db7370316e..f20893b22f 100644 --- a/2024/CVE-2024-34102.json +++ b/2024/CVE-2024-34102.json @@ -283,10 +283,10 @@ "description": "CosmicSting: critical unauthenticated XXE vulnerability in Adobe Commerce and Magento (CVE-2024-34102)", "fork": false, "created_at": "2024-07-01T08:19:28Z", - "updated_at": "2024-07-05T09:26:05Z", + "updated_at": "2024-07-08T22:50:07Z", "pushed_at": "2024-07-05T09:26:02Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -295,7 +295,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-36401.json b/2024/CVE-2024-36401.json index d1d6821ee0..f3fe0f28ad 100644 --- a/2024/CVE-2024-36401.json +++ b/2024/CVE-2024-36401.json @@ -43,10 +43,10 @@ "description": "POC", "fork": false, "created_at": "2024-07-05T03:02:30Z", - "updated_at": "2024-07-05T10:11:45Z", + "updated_at": "2024-07-08T18:50:33Z", "pushed_at": "2024-07-05T03:05:39Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-36991.json b/2024/CVE-2024-36991.json index 8d8db19b20..dfe41d0044 100644 --- a/2024/CVE-2024-36991.json +++ b/2024/CVE-2024-36991.json @@ -13,19 +13,19 @@ "description": "POC for CVE-2024-36991: This exploit will attempt to read Splunk \/etc\/passwd file.", "fork": false, "created_at": "2024-07-06T00:49:40Z", - "updated_at": "2024-07-08T17:58:24Z", + "updated_at": "2024-07-08T21:10:29Z", "pushed_at": "2024-07-08T12:45:40Z", - "stargazers_count": 69, - "watchers_count": 69, + "stargazers_count": 73, + "watchers_count": 73, "has_discussions": false, - "forks_count": 11, + "forks_count": 12, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 11, - "watchers": 69, + "forks": 12, + "watchers": 73, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-37081.json b/2024/CVE-2024-37081.json index 26e94e77f9..e2e13080f8 100644 --- a/2024/CVE-2024-37081.json +++ b/2024/CVE-2024-37081.json @@ -13,10 +13,10 @@ "description": "CVE-2024-37081: Multiple Local Privilege Escalation in VMware vCenter Server", "fork": false, "created_at": "2024-07-06T18:29:13Z", - "updated_at": "2024-07-08T03:12:39Z", + "updated_at": "2024-07-09T00:11:41Z", "pushed_at": "2024-07-06T18:38:16Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -32,7 +32,7 @@ ], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 4, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-37726.json b/2024/CVE-2024-37726.json index fe436c03d6..aa10fe2393 100644 --- a/2024/CVE-2024-37726.json +++ b/2024/CVE-2024-37726.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2024-07-03T07:26:07Z", - "updated_at": "2024-07-08T09:05:48Z", + "updated_at": "2024-07-08T20:33:52Z", "pushed_at": "2024-07-04T04:23:40Z", - "stargazers_count": 26, - "watchers_count": 26, + "stargazers_count": 27, + "watchers_count": 27, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 26, + "watchers": 27, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-39031.json b/2024/CVE-2024-39031.json new file mode 100644 index 0000000000..4de454e284 --- /dev/null +++ b/2024/CVE-2024-39031.json @@ -0,0 +1,32 @@ +[ + { + "id": 826000412, + "name": "CVE-2024-39031", + "full_name": "toneemarqus\/CVE-2024-39031", + "owner": { + "login": "toneemarqus", + "id": 85018947, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85018947?v=4", + "html_url": "https:\/\/github.com\/toneemarqus" + }, + "html_url": "https:\/\/github.com\/toneemarqus\/CVE-2024-39031", + "description": "Stored Cross-Side Scripting (XSS) leads to privilege escalation in SilverPeas social-networking portal", + "fork": false, + "created_at": "2024-07-08T23:21:52Z", + "updated_at": "2024-07-08T23:40:32Z", + "pushed_at": "2024-07-08T23:40:29Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-4883.json b/2024/CVE-2024-4883.json index 0498b50266..252af54cc8 100644 --- a/2024/CVE-2024-4883.json +++ b/2024/CVE-2024-4883.json @@ -13,10 +13,10 @@ "description": "Exploit for CVE-2024-4883", "fork": false, "created_at": "2024-07-08T12:14:01Z", - "updated_at": "2024-07-08T12:54:43Z", + "updated_at": "2024-07-09T00:27:44Z", "pushed_at": "2024-07-08T12:14:18Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 3, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-4885.json b/2024/CVE-2024-4885.json index 44202fb751..a2e7c116db 100644 --- a/2024/CVE-2024-4885.json +++ b/2024/CVE-2024-4885.json @@ -13,10 +13,10 @@ "description": "Exploit for CVE-2024-4885", "fork": false, "created_at": "2024-07-08T12:14:42Z", - "updated_at": "2024-07-08T13:00:38Z", + "updated_at": "2024-07-09T00:31:11Z", "pushed_at": "2024-07-08T12:15:00Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 3, + "watchers": 6, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-5009.json b/2024/CVE-2024-5009.json index d057652edd..e406cf8c0d 100644 --- a/2024/CVE-2024-5009.json +++ b/2024/CVE-2024-5009.json @@ -13,10 +13,10 @@ "description": "Exploit for CVE-2024-5009", "fork": false, "created_at": "2024-07-08T12:15:29Z", - "updated_at": "2024-07-08T13:50:41Z", + "updated_at": "2024-07-09T00:00:02Z", "pushed_at": "2024-07-08T12:15:41Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 2, + "watchers": 4, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json index 6395c653ea..813f29db79 100644 --- a/2024/CVE-2024-6387.json +++ b/2024/CVE-2024-6387.json @@ -56,10 +56,10 @@ "description": "a signal handler race condition in OpenSSH's server (sshd)", "fork": false, "created_at": "2024-07-01T10:55:29Z", - "updated_at": "2024-07-08T11:15:21Z", + "updated_at": "2024-07-08T21:27:30Z", "pushed_at": "2024-07-01T10:54:02Z", - "stargazers_count": 414, - "watchers_count": 414, + "stargazers_count": 415, + "watchers_count": 415, "has_discussions": false, "forks_count": 179, "allow_forking": true, @@ -68,7 +68,7 @@ "topics": [], "visibility": "public", "forks": 179, - "watchers": 414, + "watchers": 415, "score": 0, "subscribers_count": 5 }, @@ -86,10 +86,10 @@ "description": "32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo\/cve-2024-6387-poc", "fork": false, "created_at": "2024-07-01T12:16:21Z", - "updated_at": "2024-07-08T03:28:13Z", + "updated_at": "2024-07-08T21:10:06Z", "pushed_at": "2024-07-01T12:25:01Z", - "stargazers_count": 367, - "watchers_count": 367, + "stargazers_count": 368, + "watchers_count": 368, "has_discussions": false, "forks_count": 82, "allow_forking": true, @@ -98,7 +98,7 @@ "topics": [], "visibility": "public", "forks": 82, - "watchers": 367, + "watchers": 368, "score": 0, "subscribers_count": 7 }, @@ -303,10 +303,10 @@ "description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH", "fork": false, "created_at": "2024-07-01T20:33:20Z", - "updated_at": "2024-07-08T18:11:48Z", + "updated_at": "2024-07-08T18:59:12Z", "pushed_at": "2024-07-08T18:11:44Z", - "stargazers_count": 370, - "watchers_count": 370, + "stargazers_count": 371, + "watchers_count": 371, "has_discussions": false, "forks_count": 76, "allow_forking": true, @@ -321,7 +321,7 @@ ], "visibility": "public", "forks": 76, - "watchers": 370, + "watchers": 371, "score": 0, "subscribers_count": 4 }, @@ -1135,8 +1135,8 @@ "description": "CVE-2024-6387 Checker is a fast, efficient tool for detecting OpenSSH servers vulnerable to the regreSSHion exploit. It quickly scans multiple IPs, domain names, and CIDR ranges to identify risks and help secure your infrastructure.", "fork": false, "created_at": "2024-07-02T11:55:39Z", - "updated_at": "2024-07-08T14:55:03Z", - "pushed_at": "2024-07-02T23:32:12Z", + "updated_at": "2024-07-08T20:39:05Z", + "pushed_at": "2024-07-08T20:39:03Z", "stargazers_count": 8, "watchers_count": 8, "has_discussions": false, @@ -1659,51 +1659,21 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 823339380, - "name": "CVE-2024-6387-regreSSHion-Checker", - "full_name": "EkaterinaMarchetti\/CVE-2024-6387-regreSSHion-Checker", - "owner": { - "login": "EkaterinaMarchetti", - "id": 166263130, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/166263130?v=4", - "html_url": "https:\/\/github.com\/EkaterinaMarchetti" - }, - "html_url": "https:\/\/github.com\/EkaterinaMarchetti\/CVE-2024-6387-regreSSHion-Checker", - "description": null, - "fork": false, - "created_at": "2024-07-02T21:13:45Z", - "updated_at": "2024-07-02T21:13:46Z", - "pushed_at": "2024-07-02T21:13:46Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 823340268, - "name": "CVE-2024-6387-Tester", - "full_name": "grupooruss\/CVE-2024-6387-Tester", + "name": "CVE-2024-6387", + "full_name": "grupooruss\/CVE-2024-6387", "owner": { "login": "grupooruss", "id": 43943489, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43943489?v=4", "html_url": "https:\/\/github.com\/grupooruss" }, - "html_url": "https:\/\/github.com\/grupooruss\/CVE-2024-6387-Tester", + "html_url": "https:\/\/github.com\/grupooruss\/CVE-2024-6387", "description": "regreSSHion vulnerability in OpenSSH CVE-2024-6387 Testing Script", "fork": false, "created_at": "2024-07-02T21:16:45Z", - "updated_at": "2024-07-06T19:00:14Z", + "updated_at": "2024-07-08T23:58:50Z", "pushed_at": "2024-07-02T21:30:12Z", "stargazers_count": 1, "watchers_count": 1, @@ -2366,8 +2336,8 @@ "description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)", "fork": false, "created_at": "2024-07-08T11:27:49Z", - "updated_at": "2024-07-08T18:16:44Z", - "pushed_at": "2024-07-08T18:16:41Z", + "updated_at": "2024-07-08T20:03:38Z", + "pushed_at": "2024-07-08T20:03:35Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, diff --git a/README.md b/README.md index c68a7430a0..4c7bd0b3a4 100644 --- a/README.md +++ b/README.md @@ -956,8 +956,7 @@ - [xonoxitron/regreSSHion-checker](https://github.com/xonoxitron/regreSSHion-checker) - [BrandonLynch2402/cve-2024-6387-nuclei-template](https://github.com/BrandonLynch2402/cve-2024-6387-nuclei-template) - [edsonjt81/CVE-2024-6387_Check](https://github.com/edsonjt81/CVE-2024-6387_Check) -- [EkaterinaMarchetti/CVE-2024-6387-regreSSHion-Checker](https://github.com/EkaterinaMarchetti/CVE-2024-6387-regreSSHion-Checker) -- [grupooruss/CVE-2024-6387-Tester](https://github.com/grupooruss/CVE-2024-6387-Tester) +- [grupooruss/CVE-2024-6387](https://github.com/grupooruss/CVE-2024-6387) - [CognisysGroup/CVE-2024-6387-Checker](https://github.com/CognisysGroup/CVE-2024-6387-Checker) - [sxlmnwb/CVE-2024-6387](https://github.com/sxlmnwb/CVE-2024-6387) - [Symbolexe/CVE-2024-6387](https://github.com/Symbolexe/CVE-2024-6387) @@ -3373,6 +3372,9 @@ - [Havoc10-sw/Detect_polyfill_CVE-2024-38537-](https://github.com/Havoc10-sw/Detect_polyfill_CVE-2024-38537-) +### CVE-2024-39031 +- [toneemarqus/CVE-2024-39031](https://github.com/toneemarqus/CVE-2024-39031) + ### CVE-2024-39203 (2024-07-08) A cross-site scripting (XSS) vulnerability in the Backend Theme Management module of Z-BlogPHP v1.7.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload. @@ -44391,6 +44393,7 @@ - [0xTabun/CVE-2007-2447](https://github.com/0xTabun/CVE-2007-2447) - [ShivamDey/Samba-CVE-2007-2447-Exploit](https://github.com/ShivamDey/Samba-CVE-2007-2447-Exploit) - [Juantos/cve-2007-2447](https://github.com/Juantos/cve-2007-2447) +- [IamLucif3r/CVE-2007-2447-Exploit](https://github.com/IamLucif3r/CVE-2007-2447-Exploit) ### CVE-2007-3830 (2007-07-17)