diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 75626b756a..fdc0184b12 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -43,10 +43,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-09-30T00:01:36Z", + "updated_at": "2024-09-30T01:59:09Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1983, - "watchers_count": 1983, + "stargazers_count": 1984, + "watchers_count": 1984, "has_discussions": true, "forks_count": 337, "allow_forking": true, @@ -76,7 +76,7 @@ ], "visibility": "public", "forks": 337, - "watchers": 1983, + "watchers": 1984, "score": 0, "subscribers_count": 36 }, diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 12bf4fa90a..0ca1102b5d 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-09-30T00:01:36Z", + "updated_at": "2024-09-30T01:59:09Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1983, - "watchers_count": 1983, + "stargazers_count": 1984, + "watchers_count": 1984, "has_discussions": true, "forks_count": 337, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 337, - "watchers": 1983, + "watchers": 1984, "score": 0, "subscribers_count": 36 }, diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index 1b0d6be4b9..0bdfc208db 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -43,10 +43,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-09-30T00:01:36Z", + "updated_at": "2024-09-30T01:59:09Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1983, - "watchers_count": 1983, + "stargazers_count": 1984, + "watchers_count": 1984, "has_discussions": true, "forks_count": 337, "allow_forking": true, @@ -76,7 +76,7 @@ ], "visibility": "public", "forks": 337, - "watchers": 1983, + "watchers": 1984, "score": 0, "subscribers_count": 36 }, diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index 79217a96cb..634a39b6e6 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -557,10 +557,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-09-30T00:01:36Z", + "updated_at": "2024-09-30T01:59:09Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1983, - "watchers_count": 1983, + "stargazers_count": 1984, + "watchers_count": 1984, "has_discussions": true, "forks_count": 337, "allow_forking": true, @@ -590,7 +590,7 @@ ], "visibility": "public", "forks": 337, - "watchers": 1983, + "watchers": 1984, "score": 0, "subscribers_count": 36 }, diff --git a/2019/CVE-2019-16253.json b/2019/CVE-2019-16253.json index 00b68ebe8a..96f484cbc1 100644 --- a/2019/CVE-2019-16253.json +++ b/2019/CVE-2019-16253.json @@ -13,12 +13,12 @@ "description": "Exploit I discovered in October of 2022 with androids Package manager binary (pm) and the way it handled debugging flags, patched out by march 2023. Uses CVE-2019-16253 as a payload to obtain a system shell. ", "fork": false, "created_at": "2023-01-19T19:47:13Z", - "updated_at": "2024-09-26T15:42:11Z", + "updated_at": "2024-09-30T01:16:37Z", "pushed_at": "2024-03-20T19:12:39Z", - "stargazers_count": 77, - "watchers_count": 77, + "stargazers_count": 78, + "watchers_count": 78, "has_discussions": false, - "forks_count": 13, + "forks_count": 14, "allow_forking": true, "is_template": false, "web_commit_signoff_required": true, @@ -31,8 +31,8 @@ "system" ], "visibility": "public", - "forks": 13, - "watchers": 77, + "forks": 14, + "watchers": 78, "score": 0, "subscribers_count": 12 } diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index d94f6cd61f..413b276852 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -193,10 +193,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-09-30T00:01:36Z", + "updated_at": "2024-09-30T01:59:09Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1983, - "watchers_count": 1983, + "stargazers_count": 1984, + "watchers_count": 1984, "has_discussions": true, "forks_count": 337, "allow_forking": true, @@ -226,7 +226,7 @@ ], "visibility": "public", "forks": 337, - "watchers": 1983, + "watchers": 1984, "score": 0, "subscribers_count": 36 } diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index ae76ae0670..3a1d238f9b 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -13,10 +13,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2024-09-30T00:01:36Z", + "updated_at": "2024-09-30T01:59:09Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 1983, - "watchers_count": 1983, + "stargazers_count": 1984, + "watchers_count": 1984, "has_discussions": true, "forks_count": 337, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 337, - "watchers": 1983, + "watchers": 1984, "score": 0, "subscribers_count": 36 }, diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index 4382bc8907..62c077e95f 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -862,6 +862,6 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2022/CVE-2022-1802.json b/2022/CVE-2022-1802.json index 5ce16c34fc..8d85cbab7b 100644 --- a/2022/CVE-2022-1802.json +++ b/2022/CVE-2022-1802.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2022-08-20T03:01:30Z", - "updated_at": "2024-09-26T14:02:18Z", + "updated_at": "2024-09-30T03:01:23Z", "pushed_at": "2023-02-20T23:29:21Z", - "stargazers_count": 153, - "watchers_count": 153, + "stargazers_count": 154, + "watchers_count": 154, "has_discussions": false, "forks_count": 32, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 32, - "watchers": 153, + "watchers": 154, "score": 0, "subscribers_count": 12 } diff --git a/2022/CVE-2022-23861.json b/2022/CVE-2022-23861.json index 9c99a8ce92..d3eacd6922 100644 --- a/2022/CVE-2022-23861.json +++ b/2022/CVE-2022-23861.json @@ -34,6 +34,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2022/CVE-2022-23862.json b/2022/CVE-2022-23862.json index 471e943b17..60f4e5a5b8 100644 --- a/2022/CVE-2022-23862.json +++ b/2022/CVE-2022-23862.json @@ -33,6 +33,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index 6a7664936c..a3f5620e42 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -795,7 +795,7 @@ "description": "Atlassian Confluence- Unauthenticated OGNL injection vulnerability (RCE) ", "fork": false, "created_at": "2022-06-07T11:55:37Z", - "updated_at": "2024-09-09T08:31:56Z", + "updated_at": "2024-09-30T00:51:35Z", "pushed_at": "2022-06-07T22:19:34Z", "stargazers_count": 1, "watchers_count": 1, @@ -1185,10 +1185,10 @@ "description": "Atlassian Confluence (CVE-2022-26134) - Unauthenticated Remote code execution (RCE)", "fork": false, "created_at": "2022-07-05T04:30:42Z", - "updated_at": "2024-08-23T18:52:54Z", + "updated_at": "2024-09-30T00:57:45Z", "pushed_at": "2024-08-23T18:52:52Z", - "stargazers_count": 25, - "watchers_count": 25, + "stargazers_count": 26, + "watchers_count": 26, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -1202,7 +1202,7 @@ ], "visibility": "public", "forks": 12, - "watchers": 25, + "watchers": 26, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-38831.json b/2023/CVE-2023-38831.json index d7e4043132..63122412ae 100644 --- a/2023/CVE-2023-38831.json +++ b/2023/CVE-2023-38831.json @@ -1411,7 +1411,7 @@ "fork": false, "created_at": "2024-08-06T13:21:27Z", "updated_at": "2024-08-06T14:44:37Z", - "pushed_at": "2024-09-16T03:13:51Z", + "pushed_at": "2024-09-30T03:23:16Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, @@ -1523,6 +1523,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-4220.json b/2023/CVE-2023-4220.json index 9ca076cde4..c632ab03c3 100644 --- a/2023/CVE-2023-4220.json +++ b/2023/CVE-2023-4220.json @@ -380,10 +380,10 @@ "description": "CVE-2023-4220 PoC Chamilo RCE", "fork": false, "created_at": "2024-08-24T05:32:31Z", - "updated_at": "2024-09-23T18:27:34Z", + "updated_at": "2024-09-30T02:19:22Z", "pushed_at": "2024-09-23T18:27:30Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -392,7 +392,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 0 }, diff --git a/2023/CVE-2023-4911.json b/2023/CVE-2023-4911.json index 2decfe139e..90c801ef0b 100644 --- a/2023/CVE-2023-4911.json +++ b/2023/CVE-2023-4911.json @@ -87,7 +87,7 @@ "forks": 31, "watchers": 164, "score": 0, - "subscribers_count": 4 + "subscribers_count": 5 }, { "id": 701947383, diff --git a/2023/CVE-2023-6350.json b/2023/CVE-2023-6350.json index 686372345b..f0d99e10e5 100644 --- a/2023/CVE-2023-6350.json +++ b/2023/CVE-2023-6350.json @@ -13,8 +13,8 @@ "description": null, "fork": false, "created_at": "2024-09-29T14:29:26Z", - "updated_at": "2024-09-29T14:56:40Z", - "pushed_at": "2024-09-29T14:56:36Z", + "updated_at": "2024-09-30T02:43:48Z", + "pushed_at": "2024-09-30T02:43:45Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, @@ -27,6 +27,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-0044.json b/2024/CVE-2024-0044.json index 6095c9171d..234bdba178 100644 --- a/2024/CVE-2024-0044.json +++ b/2024/CVE-2024-0044.json @@ -43,19 +43,19 @@ "description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13", "fork": false, "created_at": "2024-06-18T12:30:53Z", - "updated_at": "2024-09-29T17:25:09Z", + "updated_at": "2024-09-30T00:35:43Z", "pushed_at": "2024-07-25T18:12:57Z", - "stargazers_count": 229, - "watchers_count": 229, + "stargazers_count": 230, + "watchers_count": 230, "has_discussions": false, - "forks_count": 53, + "forks_count": 54, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 53, - "watchers": 229, + "forks": 54, + "watchers": 230, "score": 0, "subscribers_count": 5 }, diff --git a/2024/CVE-2024-20017.json b/2024/CVE-2024-20017.json index 47289919a0..8a772f452f 100644 --- a/2024/CVE-2024-20017.json +++ b/2024/CVE-2024-20017.json @@ -13,10 +13,10 @@ "description": "exploits for CVE-2024-20017", "fork": false, "created_at": "2024-08-30T05:54:36Z", - "updated_at": "2024-09-29T14:53:49Z", + "updated_at": "2024-09-30T02:52:14Z", "pushed_at": "2024-09-07T10:11:22Z", - "stargazers_count": 111, - "watchers_count": 111, + "stargazers_count": 112, + "watchers_count": 112, "has_discussions": false, "forks_count": 26, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 26, - "watchers": 111, + "watchers": 112, "score": 0, "subscribers_count": 3 } diff --git a/2024/CVE-2024-21683.json b/2024/CVE-2024-21683.json index 2c58f4c74a..0d14309255 100644 --- a/2024/CVE-2024-21683.json +++ b/2024/CVE-2024-21683.json @@ -48,7 +48,7 @@ "stargazers_count": 122, "watchers_count": 122, "has_discussions": false, - "forks_count": 32, + "forks_count": 33, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -58,7 +58,7 @@ "redteam" ], "visibility": "public", - "forks": 32, + "forks": 33, "watchers": 122, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-26229.json b/2024/CVE-2024-26229.json index d256bdf745..cc0c8e49c4 100644 --- a/2024/CVE-2024-26229.json +++ b/2024/CVE-2024-26229.json @@ -43,10 +43,10 @@ "description": "Windows LPE", "fork": false, "created_at": "2024-06-11T08:03:29Z", - "updated_at": "2024-09-24T19:55:58Z", + "updated_at": "2024-09-30T05:14:30Z", "pushed_at": "2024-06-11T20:41:59Z", - "stargazers_count": 92, - "watchers_count": 92, + "stargazers_count": 93, + "watchers_count": 93, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 23, - "watchers": 92, + "watchers": 93, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-29855.json b/2024/CVE-2024-29855.json index 24346ded5b..09f953cd4b 100644 --- a/2024/CVE-2024-29855.json +++ b/2024/CVE-2024-29855.json @@ -13,10 +13,10 @@ "description": "PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855", "fork": false, "created_at": "2024-06-13T08:32:55Z", - "updated_at": "2024-09-18T22:48:02Z", + "updated_at": "2024-09-30T05:15:29Z", "pushed_at": "2024-06-17T10:45:06Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 16, + "watchers_count": 16, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 15, + "watchers": 16, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-30051.json b/2024/CVE-2024-30051.json index 4567c63396..5137b0ada4 100644 --- a/2024/CVE-2024-30051.json +++ b/2024/CVE-2024-30051.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2024-08-14T16:20:38Z", - "updated_at": "2024-09-29T15:31:38Z", + "updated_at": "2024-09-30T01:53:48Z", "pushed_at": "2024-09-05T23:21:00Z", - "stargazers_count": 93, - "watchers_count": 93, + "stargazers_count": 94, + "watchers_count": 94, "has_discussions": false, "forks_count": 28, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 28, - "watchers": 93, + "watchers": 94, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-30088.json b/2024/CVE-2024-30088.json index 3ce2994c4d..295b8a0bcc 100644 --- a/2024/CVE-2024-30088.json +++ b/2024/CVE-2024-30088.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2024-06-24T10:37:26Z", - "updated_at": "2024-09-22T16:54:32Z", + "updated_at": "2024-09-30T05:28:57Z", "pushed_at": "2024-07-31T19:11:55Z", - "stargazers_count": 205, - "watchers_count": 205, + "stargazers_count": 206, + "watchers_count": 206, "has_discussions": false, "forks_count": 46, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 46, - "watchers": 205, + "watchers": 206, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-36401.json b/2024/CVE-2024-36401.json index 6ca65b745f..fcff1590a8 100644 --- a/2024/CVE-2024-36401.json +++ b/2024/CVE-2024-36401.json @@ -103,10 +103,10 @@ "description": "Remote Code Execution (RCE) Vulnerability In Evaluating Property Name Expressions with multies ways to exploit", "fork": false, "created_at": "2024-07-06T01:10:28Z", - "updated_at": "2024-09-18T18:25:27Z", + "updated_at": "2024-09-30T02:10:51Z", "pushed_at": "2024-07-06T01:57:58Z", - "stargazers_count": 39, - "watchers_count": 39, + "stargazers_count": 40, + "watchers_count": 40, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -122,7 +122,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 39, + "watchers": 40, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-38080.json b/2024/CVE-2024-38080.json index e4daeb3502..c36c9fd259 100644 --- a/2024/CVE-2024-38080.json +++ b/2024/CVE-2024-38080.json @@ -18,13 +18,13 @@ "stargazers_count": 27, "watchers_count": 27, "has_discussions": false, - "forks_count": 7, + "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 7, + "forks": 8, "watchers": 27, "score": 0, "subscribers_count": 2 diff --git a/2024/CVE-2024-38200.json b/2024/CVE-2024-38200.json index 611a9e769c..b4d5be39d6 100644 --- a/2024/CVE-2024-38200.json +++ b/2024/CVE-2024-38200.json @@ -13,10 +13,10 @@ "description": "CVE-2024-38200 - Microsoft Office NTLMv2 Disclosure Vulnerability ", "fork": false, "created_at": "2024-09-24T19:24:55Z", - "updated_at": "2024-09-29T16:39:44Z", + "updated_at": "2024-09-30T06:20:41Z", "pushed_at": "2024-09-25T21:57:51Z", - "stargazers_count": 52, - "watchers_count": 52, + "stargazers_count": 57, + "watchers_count": 57, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 52, + "watchers": 57, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-4367.json b/2024/CVE-2024-4367.json index 94f964bb16..08c7fda3f9 100644 --- a/2024/CVE-2024-4367.json +++ b/2024/CVE-2024-4367.json @@ -13,10 +13,10 @@ "description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept", "fork": false, "created_at": "2024-05-20T10:02:23Z", - "updated_at": "2024-09-29T02:07:17Z", + "updated_at": "2024-09-30T02:21:53Z", "pushed_at": "2024-06-07T03:28:00Z", - "stargazers_count": 116, - "watchers_count": 116, + "stargazers_count": 117, + "watchers_count": 117, "has_discussions": false, "forks_count": 19, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 19, - "watchers": 116, + "watchers": 117, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-45200.json b/2024/CVE-2024-45200.json new file mode 100644 index 0000000000..0ffd677bb0 --- /dev/null +++ b/2024/CVE-2024-45200.json @@ -0,0 +1,38 @@ +[ + { + "id": 856653771, + "name": "kartlanpwn", + "full_name": "latte-soft\/kartlanpwn", + "owner": { + "login": "latte-soft", + "id": 87558718, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87558718?v=4", + "html_url": "https:\/\/github.com\/latte-soft" + }, + "html_url": "https:\/\/github.com\/latte-soft\/kartlanpwn", + "description": "Information & PoC for CVE-2024-45200, Mario Kart 8 Deluxe's \"KartLANPwn\" buffer overflow vulnerability", + "fork": false, + "created_at": "2024-09-13T00:41:32Z", + "updated_at": "2024-09-30T06:18:58Z", + "pushed_at": "2024-09-30T01:39:22Z", + "stargazers_count": 15, + "watchers_count": 15, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [ + "buffer-overflow", + "cve", + "cve-2024-45200", + "mk8dx", + "nintendo-switch" + ], + "visibility": "public", + "forks": 0, + "watchers": 15, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-45383.json b/2024/CVE-2024-45383.json index 39b68e0e4a..9431d0ed58 100644 --- a/2024/CVE-2024-45383.json +++ b/2024/CVE-2024-45383.json @@ -10,10 +10,10 @@ "html_url": "https:\/\/github.com\/SpiralBL0CK" }, "html_url": "https:\/\/github.com\/SpiralBL0CK\/CVE-2024-45383", - "description": "Theoretically poc for CVE-2024-45383, needs testing and validation. still not done yet.... ", + "description": " poc for CVE-2024-45383", "fork": false, "created_at": "2024-09-18T15:40:19Z", - "updated_at": "2024-09-18T15:40:41Z", + "updated_at": "2024-09-30T06:28:07Z", "pushed_at": "2024-09-18T15:40:37Z", "stargazers_count": 0, "watchers_count": 0, diff --git a/2024/CVE-2024-45519.json b/2024/CVE-2024-45519.json index 3d720084c1..c0a3f6eda6 100644 --- a/2024/CVE-2024-45519.json +++ b/2024/CVE-2024-45519.json @@ -43,19 +43,19 @@ "description": null, "fork": false, "created_at": "2024-09-28T08:29:06Z", - "updated_at": "2024-09-29T22:54:05Z", + "updated_at": "2024-09-30T05:14:54Z", "pushed_at": "2024-09-28T08:34:05Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 17, + "watchers_count": 17, "has_discussions": false, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 3, - "watchers": 15, + "forks": 4, + "watchers": 17, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-47176.json b/2024/CVE-2024-47176.json index d9f698e834..4232e9c05a 100644 --- a/2024/CVE-2024-47176.json +++ b/2024/CVE-2024-47176.json @@ -103,10 +103,10 @@ "description": "Scanner", "fork": false, "created_at": "2024-09-28T16:02:41Z", - "updated_at": "2024-09-29T19:44:00Z", - "pushed_at": "2024-09-29T15:08:07Z", - "stargazers_count": 6, - "watchers_count": 6, + "updated_at": "2024-09-30T06:20:02Z", + "pushed_at": "2024-09-30T06:19:59Z", + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 6, + "watchers": 7, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-47177.json b/2024/CVE-2024-47177.json index 2fc6742491..cb6a5c7b39 100644 --- a/2024/CVE-2024-47177.json +++ b/2024/CVE-2024-47177.json @@ -13,18 +13,18 @@ "description": "PoC honeypot for detecting exploit attempts against CVE-2024-47177", "fork": false, "created_at": "2024-09-27T05:18:23Z", - "updated_at": "2024-09-28T17:13:29Z", - "pushed_at": "2024-09-27T05:26:30Z", + "updated_at": "2024-09-30T04:36:34Z", + "pushed_at": "2024-09-30T04:36:30Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 3, "score": 0, "subscribers_count": 2 diff --git a/2024/CVE-2024-5932.json b/2024/CVE-2024-5932.json index ba706b6c62..3f1d547149 100644 --- a/2024/CVE-2024-5932.json +++ b/2024/CVE-2024-5932.json @@ -43,10 +43,10 @@ "description": "Proof-of-Concept for CVE-2024-5932", "fork": false, "created_at": "2024-08-25T11:51:36Z", - "updated_at": "2024-09-21T19:03:09Z", + "updated_at": "2024-09-30T02:41:50Z", "pushed_at": "2024-08-29T02:13:12Z", - "stargazers_count": 50, - "watchers_count": 50, + "stargazers_count": 51, + "watchers_count": 51, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -66,7 +66,7 @@ ], "visibility": "public", "forks": 10, - "watchers": 50, + "watchers": 51, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-6769.json b/2024/CVE-2024-6769.json index bd96c5acaf..c36130ab54 100644 --- a/2024/CVE-2024-6769.json +++ b/2024/CVE-2024-6769.json @@ -13,19 +13,19 @@ "description": "Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)", "fork": false, "created_at": "2024-08-29T16:40:49Z", - "updated_at": "2024-09-29T21:58:22Z", + "updated_at": "2024-09-30T01:58:33Z", "pushed_at": "2024-09-29T21:58:19Z", - "stargazers_count": 22, - "watchers_count": 22, + "stargazers_count": 25, + "watchers_count": 25, "has_discussions": false, - "forks_count": 5, + "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 5, - "watchers": 22, + "forks": 6, + "watchers": 25, "score": 0, "subscribers_count": 2 } diff --git a/2024/CVE-2024-9014.json b/2024/CVE-2024-9014.json index 56d185c3b2..378e9cfa2f 100644 --- a/2024/CVE-2024-9014.json +++ b/2024/CVE-2024-9014.json @@ -13,10 +13,10 @@ "description": "Proof-of-Concept for CVE-2024-9014", "fork": false, "created_at": "2024-09-26T10:34:34Z", - "updated_at": "2024-09-29T00:42:45Z", + "updated_at": "2024-09-30T04:07:42Z", "pushed_at": "2024-09-26T10:45:34Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 } diff --git a/README.md b/README.md index a05c10849e..2c10a0587d 100644 --- a/README.md +++ b/README.md @@ -5126,6 +5126,9 @@ - [0xbhsu/CVE-2024-45058](https://github.com/0xbhsu/CVE-2024-45058) +### CVE-2024-45200 +- [latte-soft/kartlanpwn](https://github.com/latte-soft/kartlanpwn) + ### CVE-2024-45241 (2024-08-26) A traversal vulnerability in GeneralDocs.aspx in CentralSquare CryWolf (False Alarm Management) through 2024-08-09 allows unauthenticated attackers to read files outside of the working web directory via the rpt parameter, leading to the disclosure of sensitive information.