diff --git a/2017/CVE-2017-8570.json b/2017/CVE-2017-8570.json
index 2f065852f3..8c60211e99 100644
--- a/2017/CVE-2017-8570.json
+++ b/2017/CVE-2017-8570.json
@@ -43,10 +43,10 @@
"description": "Proof of Concept exploit for CVE-2017-8570",
"fork": false,
"created_at": "2018-01-09T19:09:33Z",
- "updated_at": "2024-03-25T11:06:43Z",
+ "updated_at": "2024-05-04T07:46:15Z",
"pushed_at": "2018-01-09T19:23:43Z",
- "stargazers_count": 184,
- "watchers_count": 184,
+ "stargazers_count": 185,
+ "watchers_count": 185,
"has_discussions": false,
"forks_count": 105,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 105,
- "watchers": 184,
+ "watchers": 185,
"score": 0,
"subscribers_count": 9
},
diff --git a/2020/CVE-2020-14883.json b/2020/CVE-2020-14883.json
index 283ee43807..cddcf9bfef 100644
--- a/2020/CVE-2020-14883.json
+++ b/2020/CVE-2020-14883.json
@@ -133,10 +133,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
- "updated_at": "2024-04-10T06:02:06Z",
+ "updated_at": "2024-05-04T10:01:09Z",
"pushed_at": "2023-05-11T14:36:58Z",
- "stargazers_count": 1081,
- "watchers_count": 1081,
+ "stargazers_count": 1080,
+ "watchers_count": 1080,
"has_discussions": false,
"forks_count": 321,
"allow_forking": true,
@@ -149,7 +149,7 @@
],
"visibility": "public",
"forks": 321,
- "watchers": 1081,
+ "watchers": 1080,
"score": 0,
"subscribers_count": 37
}
diff --git a/2021/CVE-2021-25646.json b/2021/CVE-2021-25646.json
index 2575113456..80639cefbb 100644
--- a/2021/CVE-2021-25646.json
+++ b/2021/CVE-2021-25646.json
@@ -133,10 +133,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
- "updated_at": "2024-04-10T06:02:06Z",
+ "updated_at": "2024-05-04T10:01:09Z",
"pushed_at": "2023-05-11T14:36:58Z",
- "stargazers_count": 1081,
- "watchers_count": 1081,
+ "stargazers_count": 1080,
+ "watchers_count": 1080,
"has_discussions": false,
"forks_count": 321,
"allow_forking": true,
@@ -149,7 +149,7 @@
],
"visibility": "public",
"forks": 321,
- "watchers": 1081,
+ "watchers": 1080,
"score": 0,
"subscribers_count": 37
},
diff --git a/2021/CVE-2021-34527.json b/2021/CVE-2021-34527.json
index 19bd17cbcf..0798878205 100644
--- a/2021/CVE-2021-34527.json
+++ b/2021/CVE-2021-34527.json
@@ -109,10 +109,10 @@
"description": "PrintNightmare - Windows Print Spooler RCE\/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits",
"fork": false,
"created_at": "2021-07-03T15:15:12Z",
- "updated_at": "2024-04-07T06:36:47Z",
+ "updated_at": "2024-05-04T08:06:00Z",
"pushed_at": "2021-09-13T12:12:17Z",
- "stargazers_count": 107,
- "watchers_count": 107,
+ "stargazers_count": 108,
+ "watchers_count": 108,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@@ -128,7 +128,7 @@
],
"visibility": "public",
"forks": 39,
- "watchers": 107,
+ "watchers": 108,
"score": 0,
"subscribers_count": 8
},
diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json
index a105a8deb7..7a6560e052 100644
--- a/2021/CVE-2021-4034.json
+++ b/2021/CVE-2021-4034.json
@@ -79,10 +79,10 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
- "updated_at": "2024-05-01T22:42:50Z",
+ "updated_at": "2024-05-04T07:42:46Z",
"pushed_at": "2022-06-08T04:00:28Z",
- "stargazers_count": 1915,
- "watchers_count": 1915,
+ "stargazers_count": 1916,
+ "watchers_count": 1916,
"has_discussions": false,
"forks_count": 507,
"allow_forking": true,
@@ -91,7 +91,7 @@
"topics": [],
"visibility": "public",
"forks": 507,
- "watchers": 1915,
+ "watchers": 1916,
"score": 0,
"subscribers_count": 21
},
diff --git a/2021/CVE-2021-42287.json b/2021/CVE-2021-42287.json
index aac2d77d34..5f928a1ae7 100644
--- a/2021/CVE-2021-42287.json
+++ b/2021/CVE-2021-42287.json
@@ -13,10 +13,10 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
- "updated_at": "2024-05-03T16:20:26Z",
+ "updated_at": "2024-05-04T07:46:40Z",
"pushed_at": "2021-12-16T09:50:15Z",
- "stargazers_count": 1301,
- "watchers_count": 1301,
+ "stargazers_count": 1302,
+ "watchers_count": 1302,
"has_discussions": false,
"forks_count": 319,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 319,
- "watchers": 1301,
+ "watchers": 1302,
"score": 0,
"subscribers_count": 27
},
diff --git a/2022/CVE-2022-22947.json b/2022/CVE-2022-22947.json
index 26457011eb..45ad6d09f4 100644
--- a/2022/CVE-2022-22947.json
+++ b/2022/CVE-2022-22947.json
@@ -673,10 +673,10 @@
"description": "CVE-2022-22947_EXP,CVE-2022-22947_RCE,CVE-2022-22947反弹shell,CVE-2022-22947 getshell",
"fork": false,
"created_at": "2022-03-08T09:32:36Z",
- "updated_at": "2024-01-15T13:05:58Z",
+ "updated_at": "2024-05-04T12:04:14Z",
"pushed_at": "2022-03-08T09:36:31Z",
- "stargazers_count": 34,
- "watchers_count": 34,
+ "stargazers_count": 35,
+ "watchers_count": 35,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@@ -685,7 +685,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
- "watchers": 34,
+ "watchers": 35,
"score": 0,
"subscribers_count": 2
},
@@ -913,10 +913,10 @@
"description": "CVE-2022-22947 memshell",
"fork": false,
"created_at": "2022-03-18T07:17:17Z",
- "updated_at": "2023-12-28T07:08:40Z",
+ "updated_at": "2024-05-04T12:03:26Z",
"pushed_at": "2022-03-18T07:17:45Z",
- "stargazers_count": 18,
- "watchers_count": 18,
+ "stargazers_count": 19,
+ "watchers_count": 19,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -929,7 +929,7 @@
],
"visibility": "public",
"forks": 1,
- "watchers": 18,
+ "watchers": 19,
"score": 0,
"subscribers_count": 2
},
diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json
index 5c03ab1048..849935bd2f 100644
--- a/2022/CVE-2022-26134.json
+++ b/2022/CVE-2022-26134.json
@@ -158,10 +158,10 @@
"description": "CVE-2022-26134 Proof of Concept",
"fork": false,
"created_at": "2022-06-03T13:59:19Z",
- "updated_at": "2024-04-02T02:33:38Z",
+ "updated_at": "2024-05-04T08:28:32Z",
"pushed_at": "2022-06-06T16:38:49Z",
- "stargazers_count": 156,
- "watchers_count": 156,
+ "stargazers_count": 157,
+ "watchers_count": 157,
"has_discussions": false,
"forks_count": 48,
"allow_forking": true,
@@ -174,7 +174,7 @@
],
"visibility": "public",
"forks": 48,
- "watchers": 156,
+ "watchers": 157,
"score": 0,
"subscribers_count": 1
},
diff --git a/2023/CVE-2023-2255.json b/2023/CVE-2023-2255.json
index 44abe02d14..9e87edd6db 100644
--- a/2023/CVE-2023-2255.json
+++ b/2023/CVE-2023-2255.json
@@ -43,8 +43,8 @@
"description": null,
"fork": false,
"created_at": "2024-04-27T11:21:11Z",
- "updated_at": "2024-05-02T10:03:20Z",
- "pushed_at": "2024-05-02T10:03:17Z",
+ "updated_at": "2024-05-04T10:24:16Z",
+ "pushed_at": "2024-05-04T10:24:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
diff --git a/2023/CVE-2023-36874.json b/2023/CVE-2023-36874.json
index b04123bc94..a9c1c8ceef 100644
--- a/2023/CVE-2023-36874.json
+++ b/2023/CVE-2023-36874.json
@@ -103,10 +103,10 @@
"description": "Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE",
"fork": false,
"created_at": "2023-08-24T22:24:34Z",
- "updated_at": "2024-04-28T09:36:17Z",
+ "updated_at": "2024-05-04T11:40:24Z",
"pushed_at": "2023-08-25T00:30:01Z",
- "stargazers_count": 181,
- "watchers_count": 181,
+ "stargazers_count": 182,
+ "watchers_count": 182,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 28,
- "watchers": 181,
+ "watchers": 182,
"score": 0,
"subscribers_count": 4
}
diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json
index 2546ffc089..66b41139e7 100644
--- a/2024/CVE-2024-1086.json
+++ b/2024/CVE-2024-1086.json
@@ -13,10 +13,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
- "updated_at": "2024-05-03T20:11:30Z",
+ "updated_at": "2024-05-04T08:28:52Z",
"pushed_at": "2024-04-17T16:09:54Z",
- "stargazers_count": 1908,
- "watchers_count": 1908,
+ "stargazers_count": 1907,
+ "watchers_count": 1907,
"has_discussions": false,
"forks_count": 236,
"allow_forking": true,
@@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 236,
- "watchers": 1908,
+ "watchers": 1907,
"score": 0,
"subscribers_count": 20
},
diff --git a/2024/CVE-2024-20359.json b/2024/CVE-2024-20359.json
new file mode 100644
index 0000000000..98c1a4dcc3
--- /dev/null
+++ b/2024/CVE-2024-20359.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 795883499,
+ "name": "CVE-2024-20359-CiscoASA-FTD-exploit",
+ "full_name": "Garvard-Agency\/CVE-2024-20359-CiscoASA-FTD-exploit",
+ "owner": {
+ "login": "Garvard-Agency",
+ "id": 168903663,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168903663?v=4",
+ "html_url": "https:\/\/github.com\/Garvard-Agency"
+ },
+ "html_url": "https:\/\/github.com\/Garvard-Agency\/CVE-2024-20359-CiscoASA-FTD-exploit",
+ "description": "Exploit for Cisco ASA and FTD (may 2024)",
+ "fork": false,
+ "created_at": "2024-05-04T10:40:22Z",
+ "updated_at": "2024-05-04T10:50:52Z",
+ "pushed_at": "2024-05-04T10:50:49Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-23897.json b/2024/CVE-2024-23897.json
index 30877ba384..65a985c822 100644
--- a/2024/CVE-2024-23897.json
+++ b/2024/CVE-2024-23897.json
@@ -256,10 +256,10 @@
"description": "CVE-2024-23897 - Jenkins 任意文件读取 利用工具",
"fork": false,
"created_at": "2024-01-27T19:34:48Z",
- "updated_at": "2024-04-26T06:35:19Z",
+ "updated_at": "2024-05-04T11:55:50Z",
"pushed_at": "2024-03-16T07:55:41Z",
- "stargazers_count": 52,
- "watchers_count": 52,
+ "stargazers_count": 53,
+ "watchers_count": 53,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@@ -272,7 +272,7 @@
],
"visibility": "public",
"forks": 10,
- "watchers": 52,
+ "watchers": 53,
"score": 0,
"subscribers_count": 2
},
diff --git a/2024/CVE-2024-24576.json b/2024/CVE-2024-24576.json
index 90471dee36..1c721e7ac3 100644
--- a/2024/CVE-2024-24576.json
+++ b/2024/CVE-2024-24576.json
@@ -13,10 +13,10 @@
"description": "Example of CVE-2024-24576 use case.",
"fork": false,
"created_at": "2024-04-09T21:17:15Z",
- "updated_at": "2024-05-02T18:17:23Z",
+ "updated_at": "2024-05-04T11:54:23Z",
"pushed_at": "2024-04-10T14:46:42Z",
- "stargazers_count": 45,
- "watchers_count": 45,
+ "stargazers_count": 46,
+ "watchers_count": 46,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
- "watchers": 45,
+ "watchers": 46,
"score": 0,
"subscribers_count": 2
},
diff --git a/2024/CVE-2024-26304.json b/2024/CVE-2024-26304.json
new file mode 100644
index 0000000000..fd6b60901e
--- /dev/null
+++ b/2024/CVE-2024-26304.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 795875540,
+ "name": "CVE-2024-26304-RCE-exploits",
+ "full_name": "Roud-Roud-Agency\/CVE-2024-26304-RCE-exploits",
+ "owner": {
+ "login": "Roud-Roud-Agency",
+ "id": 168901291,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168901291?v=4",
+ "html_url": "https:\/\/github.com\/Roud-Roud-Agency"
+ },
+ "html_url": "https:\/\/github.com\/Roud-Roud-Agency\/CVE-2024-26304-RCE-exploits",
+ "description": "Critical RCE Vulnerabilities in HPE Aruba Devices (may 2024)",
+ "fork": false,
+ "created_at": "2024-05-04T10:09:24Z",
+ "updated_at": "2024-05-04T10:17:56Z",
+ "pushed_at": "2024-05-04T10:17:53Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-27956.json b/2024/CVE-2024-27956.json
index 47470760a4..0202cdb49d 100644
--- a/2024/CVE-2024-27956.json
+++ b/2024/CVE-2024-27956.json
@@ -43,10 +43,10 @@
"description": "PoC for SQL Injection in CVE-2024-27956",
"fork": false,
"created_at": "2024-05-01T01:58:28Z",
- "updated_at": "2024-05-04T03:08:16Z",
+ "updated_at": "2024-05-04T07:39:20Z",
"pushed_at": "2024-05-03T11:28:21Z",
- "stargazers_count": 23,
- "watchers_count": 23,
+ "stargazers_count": 24,
+ "watchers_count": 24,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
- "watchers": 23,
+ "watchers": 24,
"score": 0,
"subscribers_count": 1
},
diff --git a/2024/CVE-2024-29988.json b/2024/CVE-2024-29988.json
index 21fe519811..327277cd2b 100644
--- a/2024/CVE-2024-29988.json
+++ b/2024/CVE-2024-29988.json
@@ -18,13 +18,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
- "forks_count": 1,
+ "forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 1,
+ "forks": 3,
"watchers": 0,
"score": 0,
"subscribers_count": 1
diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json
index 394112d2d4..c24f6380f6 100644
--- a/2024/CVE-2024-3094.json
+++ b/2024/CVE-2024-3094.json
@@ -493,10 +493,10 @@
"description": "An ssh honeypot with the XZ backdoor. CVE-2024-3094",
"fork": false,
"created_at": "2024-03-30T22:07:24Z",
- "updated_at": "2024-04-30T21:55:36Z",
+ "updated_at": "2024-05-04T08:26:03Z",
"pushed_at": "2024-04-02T03:38:32Z",
- "stargazers_count": 136,
- "watchers_count": 136,
+ "stargazers_count": 137,
+ "watchers_count": 137,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@@ -510,7 +510,7 @@
],
"visibility": "public",
"forks": 23,
- "watchers": 136,
+ "watchers": 137,
"score": 0,
"subscribers_count": 8
},
diff --git a/2024/CVE-2024-4040.json b/2024/CVE-2024-4040.json
index 95891eba61..211b2dcd95 100644
--- a/2024/CVE-2024-4040.json
+++ b/2024/CVE-2024-4040.json
@@ -138,7 +138,7 @@
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
- "forks_count": 4,
+ "forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -159,7 +159,7 @@
"sftp"
],
"visibility": "public",
- "forks": 4,
+ "forks": 5,
"watchers": 14,
"score": 0,
"subscribers_count": 1
diff --git a/README.md b/README.md
index 0dd472a641..56a8a593fe 100644
--- a/README.md
+++ b/README.md
@@ -480,6 +480,13 @@
- [nettitude/CVE-2024-20356](https://github.com/nettitude/CVE-2024-20356)
+### CVE-2024-20359 (2024-04-24)
+
+A vulnerability in a legacy capability that allowed for the preloading of VPN clients and plug-ins and that has been available in Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary code with root-level privileges. Administrator-level privileges are required to exploit this vulnerability.\r\n\r This vulnerability is due to improper validation of a file when it is read from system flash memory. An attacker could exploit this vulnerability by copying a crafted file to the disk0: file system of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the affected device after the next reload of the device, which could alter system behavior. Because the injected code could persist across device reboots, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High.
+
+
+- [Garvard-Agency/CVE-2024-20359-CiscoASA-FTD-exploit](https://github.com/Garvard-Agency/CVE-2024-20359-CiscoASA-FTD-exploit)
+
### CVE-2024-20656 (2024-01-09)
Visual Studio Elevation of Privilege Vulnerability
@@ -1286,6 +1293,13 @@
- [exploits-forsale/CVE-2024-26218](https://github.com/exploits-forsale/CVE-2024-26218)
+### CVE-2024-26304 (2024-05-01)
+
+There is a buffer overflow vulnerability in the underlying L2/L3 Management service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system. \n\n
+
+
+- [Roud-Roud-Agency/CVE-2024-26304-RCE-exploits](https://github.com/Roud-Roud-Agency/CVE-2024-26304-RCE-exploits)
+
### CVE-2024-26475 (2024-03-14)
An issue in radareorg radare2 v.0.9.7 through v.5.8.6 and fixed in v.5.8.8 allows a local attacker to cause a denial of service via the grub_sfs_read_extent function.