diff --git a/2010/CVE-2010-1240.json b/2010/CVE-2010-1240.json index dadafc6bb7..56559a4c2a 100644 --- a/2010/CVE-2010-1240.json +++ b/2010/CVE-2010-1240.json @@ -14,19 +14,19 @@ "description": "This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actually consists of embedded payload. The exploit was made public as CVE-2010-1240. ", "fork": false, "created_at": "2021-06-05T18:59:28Z", - "updated_at": "2024-12-08T10:20:00Z", + "updated_at": "2024-12-12T01:33:29Z", "pushed_at": "2021-06-06T09:41:51Z", - "stargazers_count": 57, - "watchers_count": 57, + "stargazers_count": 58, + "watchers_count": 58, "has_discussions": false, - "forks_count": 5, + "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 5, - "watchers": 57, + "forks": 6, + "watchers": 58, "score": 0, "subscribers_count": 4 }, @@ -45,19 +45,19 @@ "description": "This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actually consists of embedded payload. The exploit was made public as CVE-2010-1240.", "fork": false, "created_at": "2022-01-26T05:59:52Z", - "updated_at": "2024-09-18T08:13:57Z", + "updated_at": "2024-12-12T01:34:39Z", "pushed_at": "2022-01-26T06:47:31Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, - "forks_count": 3, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 3, - "watchers": 6, + "forks": 4, + "watchers": 7, "score": 0, "subscribers_count": 1 }, diff --git a/2014/CVE-2014-6271.json b/2014/CVE-2014-6271.json index a7cc8acaa9..4fdbe2c293 100644 --- a/2014/CVE-2014-6271.json +++ b/2014/CVE-2014-6271.json @@ -1197,10 +1197,10 @@ "description": "Shellshock exploit + vulnerable environment", "fork": false, "created_at": "2016-12-07T23:38:50Z", - "updated_at": "2024-11-08T10:07:56Z", + "updated_at": "2024-12-12T05:34:07Z", "pushed_at": "2023-05-11T02:12:25Z", - "stargazers_count": 204, - "watchers_count": 204, + "stargazers_count": 205, + "watchers_count": 205, "has_discussions": false, "forks_count": 56, "allow_forking": true, @@ -1216,7 +1216,7 @@ ], "visibility": "public", "forks": 56, - "watchers": 204, + "watchers": 205, "score": 0, "subscribers_count": 5 }, diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json index 526e8e4500..77fae678c7 100644 --- a/2016/CVE-2016-5195.json +++ b/2016/CVE-2016-5195.json @@ -462,10 +462,10 @@ "description": "Dirty Cow exploit - CVE-2016-5195", "fork": false, "created_at": "2016-11-25T21:08:01Z", - "updated_at": "2024-12-11T20:44:31Z", + "updated_at": "2024-12-12T05:15:53Z", "pushed_at": "2021-04-08T11:35:12Z", - "stargazers_count": 865, - "watchers_count": 865, + "stargazers_count": 866, + "watchers_count": 866, "has_discussions": false, "forks_count": 426, "allow_forking": true, @@ -478,7 +478,7 @@ ], "visibility": "public", "forks": 426, - "watchers": 865, + "watchers": 866, "score": 0, "subscribers_count": 9 }, diff --git a/2017/CVE-2017-12615.json b/2017/CVE-2017-12615.json index f8fe9ecf22..f2253d2692 100644 --- a/2017/CVE-2017-12615.json +++ b/2017/CVE-2017-12615.json @@ -355,10 +355,10 @@ "description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含", "fork": false, "created_at": "2022-11-13T11:01:41Z", - "updated_at": "2024-12-09T08:01:15Z", + "updated_at": "2024-12-12T04:06:53Z", "pushed_at": "2022-11-15T09:05:50Z", - "stargazers_count": 206, - "watchers_count": 206, + "stargazers_count": 207, + "watchers_count": 207, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -367,7 +367,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 206, + "watchers": 207, "score": 0, "subscribers_count": 4 }, diff --git a/2018/CVE-2018-4233.json b/2018/CVE-2018-4233.json index 345f5cb43e..9f76e515af 100644 --- a/2018/CVE-2018-4233.json +++ b/2018/CVE-2018-4233.json @@ -14,10 +14,10 @@ "description": "Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018", "fork": false, "created_at": "2018-08-08T14:41:20Z", - "updated_at": "2024-12-05T01:24:39Z", + "updated_at": "2024-12-12T01:51:35Z", "pushed_at": "2024-02-07T23:51:49Z", - "stargazers_count": 181, - "watchers_count": 181, + "stargazers_count": 180, + "watchers_count": 180, "has_discussions": false, "forks_count": 27, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 27, - "watchers": 181, + "watchers": 180, "score": 0, "subscribers_count": 12 } diff --git a/2019/CVE-2019-16098.json b/2019/CVE-2019-16098.json index 3eabf5ae39..733f35cf1d 100644 --- a/2019/CVE-2019-16098.json +++ b/2019/CVE-2019-16098.json @@ -76,10 +76,10 @@ "description": "This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I\/O ports, and MSRs. Instead of hardcoded base address of Ntoskrnl.exe, I calculated it dynamically and recalulated the fields offsets", "fork": false, "created_at": "2024-08-05T16:55:40Z", - "updated_at": "2024-12-09T06:35:04Z", + "updated_at": "2024-12-12T06:07:39Z", "pushed_at": "2024-08-05T18:31:16Z", - "stargazers_count": 14, - "watchers_count": 14, + "stargazers_count": 15, + "watchers_count": 15, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 14, + "watchers": 15, "score": 0, "subscribers_count": 1 } diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 66ca771e93..33509cc5c9 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -424,10 +424,10 @@ "description": "cve-2020-1472 复现利用及其exp", "fork": false, "created_at": "2020-09-16T03:40:47Z", - "updated_at": "2024-10-13T05:56:43Z", + "updated_at": "2024-12-12T02:02:00Z", "pushed_at": "2020-09-16T15:03:32Z", - "stargazers_count": 106, - "watchers_count": 106, + "stargazers_count": 107, + "watchers_count": 107, "has_discussions": false, "forks_count": 27, "allow_forking": true, @@ -436,7 +436,7 @@ "topics": [], "visibility": "public", "forks": 27, - "watchers": 106, + "watchers": 107, "score": 0, "subscribers_count": 3 }, diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json index 133a8809f1..c23532c287 100644 --- a/2020/CVE-2020-1938.json +++ b/2020/CVE-2020-1938.json @@ -888,10 +888,10 @@ "description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含", "fork": false, "created_at": "2022-11-13T11:01:41Z", - "updated_at": "2024-12-09T08:01:15Z", + "updated_at": "2024-12-12T04:06:53Z", "pushed_at": "2022-11-15T09:05:50Z", - "stargazers_count": 206, - "watchers_count": 206, + "stargazers_count": 207, + "watchers_count": 207, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -900,7 +900,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 206, + "watchers": 207, "score": 0, "subscribers_count": 4 }, diff --git a/2021/CVE-2021-30128.json b/2021/CVE-2021-30128.json index dde9f13ec7..8dc9cf1893 100644 --- a/2021/CVE-2021-30128.json +++ b/2021/CVE-2021-30128.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2021-04-29T17:59:59Z", - "updated_at": "2023-06-17T08:04:54Z", + "updated_at": "2024-12-12T05:42:53Z", "pushed_at": "2021-04-30T15:01:38Z", - "stargazers_count": 19, - "watchers_count": 19, + "stargazers_count": 20, + "watchers_count": 20, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 12, - "watchers": 19, + "watchers": 20, "score": 0, "subscribers_count": 1 } diff --git a/2021/CVE-2021-36396.json b/2021/CVE-2021-36396.json index 49cdc67cf3..2733b5d2ed 100644 --- a/2021/CVE-2021-36396.json +++ b/2021/CVE-2021-36396.json @@ -14,10 +14,10 @@ "description": "This script demonstrates a time-based blind SQL injection on Moodle platforms, exploiting response delays to extract data.", "fork": false, "created_at": "2023-11-04T11:45:55Z", - "updated_at": "2024-10-25T10:30:06Z", + "updated_at": "2024-12-12T05:48:46Z", "pushed_at": "2024-07-07T18:39:45Z", - "stargazers_count": 17, - "watchers_count": 17, + "stargazers_count": 18, + "watchers_count": 18, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 17, + "watchers": 18, "score": 0, "subscribers_count": 2 } diff --git a/2021/CVE-2021-4154.json b/2021/CVE-2021-4154.json index d4cac57858..e80d861c6c 100644 --- a/2021/CVE-2021-4154.json +++ b/2021/CVE-2021-4154.json @@ -19,13 +19,13 @@ "stargazers_count": 65, "watchers_count": 65, "has_discussions": false, - "forks_count": 16, + "forks_count": 17, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 16, + "forks": 17, "watchers": 65, "score": 0, "subscribers_count": 5 diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index b98b5bac69..b1e6cbc1ca 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -107,10 +107,10 @@ "description": "A root exploit for CVE-2022-0847 (Dirty Pipe)", "fork": false, "created_at": "2022-03-07T18:55:20Z", - "updated_at": "2024-12-11T23:56:20Z", + "updated_at": "2024-12-12T01:49:21Z", "pushed_at": "2022-03-08T06:20:05Z", - "stargazers_count": 1093, - "watchers_count": 1093, + "stargazers_count": 1094, + "watchers_count": 1094, "has_discussions": false, "forks_count": 218, "allow_forking": true, @@ -119,7 +119,7 @@ "topics": [], "visibility": "public", "forks": 218, - "watchers": 1093, + "watchers": 1094, "score": 0, "subscribers_count": 17 }, diff --git a/2023/CVE-2023-20573.json b/2023/CVE-2023-20573.json index b40a065f86..ff3c205f6e 100644 --- a/2023/CVE-2023-20573.json +++ b/2023/CVE-2023-20573.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2023-03-11T15:04:51Z", - "updated_at": "2024-11-27T03:27:39Z", + "updated_at": "2024-12-12T02:23:56Z", "pushed_at": "2024-01-09T21:11:58Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 6, + "watchers": 5, "score": 0, "subscribers_count": 2 } diff --git a/2023/CVE-2023-22894.json b/2023/CVE-2023-22894.json index 5e496ec42f..b5216420a5 100644 --- a/2023/CVE-2023-22894.json +++ b/2023/CVE-2023-22894.json @@ -14,10 +14,10 @@ "description": "CVE-2023-22894", "fork": false, "created_at": "2023-04-24T23:26:13Z", - "updated_at": "2024-11-18T02:00:29Z", + "updated_at": "2024-12-12T01:55:23Z", "pushed_at": "2023-04-24T23:38:15Z", - "stargazers_count": 10, - "watchers_count": 10, + "stargazers_count": 11, + "watchers_count": 11, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 10, + "watchers": 11, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-27350.json b/2023/CVE-2023-27350.json index 90d11aec8d..e3f183d149 100644 --- a/2023/CVE-2023-27350.json +++ b/2023/CVE-2023-27350.json @@ -76,10 +76,10 @@ "description": "Proof of Concept Exploit for PaperCut CVE-2023-27350", "fork": false, "created_at": "2023-04-22T21:34:06Z", - "updated_at": "2024-11-08T23:46:27Z", + "updated_at": "2024-12-12T04:39:28Z", "pushed_at": "2023-05-01T19:31:20Z", - "stargazers_count": 47, - "watchers_count": 47, + "stargazers_count": 48, + "watchers_count": 48, "has_discussions": false, "forks_count": 19, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 19, - "watchers": 47, + "watchers": 48, "score": 0, "subscribers_count": 4 }, diff --git a/2023/CVE-2023-3460.json b/2023/CVE-2023-3460.json index 367e1cee32..9ba3106e5b 100644 --- a/2023/CVE-2023-3460.json +++ b/2023/CVE-2023-3460.json @@ -249,5 +249,36 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 901723317, + "name": "CVE-2023-3460_FIX", + "full_name": "TranKuBao\/CVE-2023-3460_FIX", + "owner": { + "login": "TranKuBao", + "id": 116043533, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/116043533?v=4", + "html_url": "https:\/\/github.com\/TranKuBao", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/TranKuBao\/CVE-2023-3460_FIX", + "description": "Cái này dựng lên với mục đích cho ae tham khảo, chê thì đừng có xem. :))))", + "fork": false, + "created_at": "2024-12-11T07:38:22Z", + "updated_at": "2024-12-12T01:40:38Z", + "pushed_at": "2024-12-12T01:40:33Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-0012.json b/2024/CVE-2024-0012.json index 6ee7dbd926..99d6814acd 100644 --- a/2024/CVE-2024-0012.json +++ b/2024/CVE-2024-0012.json @@ -281,6 +281,6 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-11477.json b/2024/CVE-2024-11477.json index 53e6b7c4b8..3ab277f7bd 100644 --- a/2024/CVE-2024-11477.json +++ b/2024/CVE-2024-11477.json @@ -14,19 +14,19 @@ "description": "CVE-2024-11477 7Zip Code Execution Writeup and Analysis", "fork": false, "created_at": "2024-11-29T06:13:36Z", - "updated_at": "2024-12-11T22:04:10Z", + "updated_at": "2024-12-12T06:01:40Z", "pushed_at": "2024-12-04T01:01:28Z", - "stargazers_count": 39, - "watchers_count": 39, + "stargazers_count": 41, + "watchers_count": 41, "has_discussions": false, - "forks_count": 7, + "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 7, - "watchers": 39, + "forks": 8, + "watchers": 41, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-11728.json b/2024/CVE-2024-11728.json index 2bf3fc4b1f..cb3b29296b 100644 --- a/2024/CVE-2024-11728.json +++ b/2024/CVE-2024-11728.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-30090.json b/2024/CVE-2024-30090.json index afd995c903..13ec2f3783 100644 --- a/2024/CVE-2024-30090.json +++ b/2024/CVE-2024-30090.json @@ -14,10 +14,10 @@ "description": "CVE-2024-30090 - LPE PoC", "fork": false, "created_at": "2024-10-17T08:38:47Z", - "updated_at": "2024-11-29T15:03:00Z", + "updated_at": "2024-12-12T04:35:49Z", "pushed_at": "2024-10-17T09:53:33Z", - "stargazers_count": 99, - "watchers_count": 99, + "stargazers_count": 100, + "watchers_count": 100, "has_discussions": false, "forks_count": 22, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 22, - "watchers": 99, + "watchers": 100, "score": 0, "subscribers_count": 3 } diff --git a/2024/CVE-2024-32002.json b/2024/CVE-2024-32002.json index 8a65f8bf64..2d38f97224 100644 --- a/2024/CVE-2024-32002.json +++ b/2024/CVE-2024-32002.json @@ -2014,6 +2014,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-36401.json b/2024/CVE-2024-36401.json index 80730cdcb7..fde6630230 100644 --- a/2024/CVE-2024-36401.json +++ b/2024/CVE-2024-36401.json @@ -207,10 +207,10 @@ "description": "GeoServer Remote Code Execution", "fork": false, "created_at": "2024-07-30T18:43:40Z", - "updated_at": "2024-12-06T23:50:17Z", + "updated_at": "2024-12-12T06:28:21Z", "pushed_at": "2024-08-02T14:57:26Z", - "stargazers_count": 74, - "watchers_count": 74, + "stargazers_count": 75, + "watchers_count": 75, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -219,7 +219,7 @@ "topics": [], "visibility": "public", "forks": 12, - "watchers": 74, + "watchers": 75, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-38193.json b/2024/CVE-2024-38193.json index 99ef844cd3..eeec11dbae 100644 --- a/2024/CVE-2024-38193.json +++ b/2024/CVE-2024-38193.json @@ -19,13 +19,13 @@ "stargazers_count": 35, "watchers_count": 35, "has_discussions": false, - "forks_count": 21, + "forks_count": 22, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 21, + "forks": 22, "watchers": 35, "score": 0, "subscribers_count": 0 diff --git a/2024/CVE-2024-40711.json b/2024/CVE-2024-40711.json index b6f51d1950..8e01dd09ab 100644 --- a/2024/CVE-2024-40711.json +++ b/2024/CVE-2024-40711.json @@ -45,10 +45,10 @@ "description": "CVE-2024-40711-exp", "fork": false, "created_at": "2024-10-16T05:02:27Z", - "updated_at": "2024-12-11T22:25:02Z", + "updated_at": "2024-12-12T05:04:10Z", "pushed_at": "2024-10-17T01:06:42Z", - "stargazers_count": 30, - "watchers_count": 30, + "stargazers_count": 33, + "watchers_count": 33, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 30, + "watchers": 33, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-42327.json b/2024/CVE-2024-42327.json index 4dfa9f096e..fa7151c74e 100644 --- a/2024/CVE-2024-42327.json +++ b/2024/CVE-2024-42327.json @@ -122,5 +122,36 @@ "watchers": 1, "score": 0, "subscribers_count": 1 + }, + { + "id": 902138431, + "name": "CVE-2024-42327", + "full_name": "igorbf495\/CVE-2024-42327", + "owner": { + "login": "igorbf495", + "id": 113364443, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113364443?v=4", + "html_url": "https:\/\/github.com\/igorbf495", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/igorbf495\/CVE-2024-42327", + "description": "writeup cve-2024-42327", + "fork": false, + "created_at": "2024-12-12T01:32:26Z", + "updated_at": "2024-12-12T04:09:28Z", + "pushed_at": "2024-12-12T04:09:24Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-4577.json b/2024/CVE-2024-4577.json index 6f9ddfcc5f..1cef7bd3c0 100644 --- a/2024/CVE-2024-4577.json +++ b/2024/CVE-2024-4577.json @@ -169,10 +169,10 @@ "description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC", "fork": false, "created_at": "2024-06-07T09:52:54Z", - "updated_at": "2024-12-06T23:49:58Z", + "updated_at": "2024-12-12T06:28:25Z", "pushed_at": "2024-06-22T15:13:52Z", - "stargazers_count": 240, - "watchers_count": 240, + "stargazers_count": 241, + "watchers_count": 241, "has_discussions": false, "forks_count": 52, "allow_forking": true, @@ -181,7 +181,7 @@ "topics": [], "visibility": "public", "forks": 52, - "watchers": 240, + "watchers": 241, "score": 0, "subscribers_count": 4 }, diff --git a/2024/CVE-2024-48990.json b/2024/CVE-2024-48990.json index 79ff483cb6..d355f965de 100644 --- a/2024/CVE-2024-48990.json +++ b/2024/CVE-2024-48990.json @@ -14,10 +14,10 @@ "description": "PoC for CVE-2024-48990", "fork": false, "created_at": "2024-11-20T18:41:25Z", - "updated_at": "2024-12-09T08:38:49Z", + "updated_at": "2024-12-12T04:14:49Z", "pushed_at": "2024-11-20T18:49:33Z", - "stargazers_count": 87, - "watchers_count": 87, + "stargazers_count": 88, + "watchers_count": 88, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 87, + "watchers": 88, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-4956.json b/2024/CVE-2024-4956.json index b470705f6d..ff9401fb4c 100644 --- a/2024/CVE-2024-4956.json +++ b/2024/CVE-2024-4956.json @@ -522,5 +522,36 @@ "watchers": 2, "score": 0, "subscribers_count": 1 + }, + { + "id": 902177937, + "name": "cve-2024-4956", + "full_name": "XiaomingX\/cve-2024-4956", + "owner": { + "login": "XiaomingX", + "id": 5387930, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5387930?v=4", + "html_url": "https:\/\/github.com\/XiaomingX", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-4956", + "description": "CVE-2024-4956 Python exploitation utility", + "fork": false, + "created_at": "2024-12-12T04:05:10Z", + "updated_at": "2024-12-12T04:15:46Z", + "pushed_at": "2024-12-12T04:07:35Z", + "stargazers_count": 1, + "watchers_count": 1, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 1, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2024/CVE-2024-50623.json b/2024/CVE-2024-50623.json index 5ad1893123..542e6d9999 100644 --- a/2024/CVE-2024-50623.json +++ b/2024/CVE-2024-50623.json @@ -14,19 +14,19 @@ "description": "Cleo Unrestricted file upload and download PoC (CVE-2024-50623)", "fork": false, "created_at": "2024-12-11T14:19:55Z", - "updated_at": "2024-12-11T19:45:47Z", + "updated_at": "2024-12-12T06:19:46Z", "pushed_at": "2024-12-11T14:23:19Z", - "stargazers_count": 2, - "watchers_count": 2, + "stargazers_count": 6, + "watchers_count": 6, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 1, - "watchers": 2, + "forks": 2, + "watchers": 6, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-55587.json b/2024/CVE-2024-55587.json index bd185e4cf9..d93db038b0 100644 --- a/2024/CVE-2024-55587.json +++ b/2024/CVE-2024-55587.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json index cb4a02f98d..e9c6d39dd5 100644 --- a/2024/CVE-2024-6387.json +++ b/2024/CVE-2024-6387.json @@ -2211,10 +2211,10 @@ "description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)", "fork": false, "created_at": "2024-07-08T11:27:49Z", - "updated_at": "2024-12-10T08:51:15Z", + "updated_at": "2024-12-12T00:56:32Z", "pushed_at": "2024-08-22T08:50:25Z", - "stargazers_count": 57, - "watchers_count": 57, + "stargazers_count": 58, + "watchers_count": 58, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -2223,7 +2223,7 @@ "topics": [], "visibility": "public", "forks": 23, - "watchers": 57, + "watchers": 58, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-9474.json b/2024/CVE-2024-9474.json index 7ff6d653d6..54bbcd49b5 100644 --- a/2024/CVE-2024-9474.json +++ b/2024/CVE-2024-9474.json @@ -121,6 +121,6 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/README.md b/README.md index f19ba3d35f..18945739cc 100644 --- a/README.md +++ b/README.md @@ -1111,6 +1111,7 @@ - [JolyIrsb/CVE-2024-4956](https://github.com/JolyIrsb/CVE-2024-4956) - [UMASANKAR-MG/Path-Traversal-CVE-2024-4956](https://github.com/UMASANKAR-MG/Path-Traversal-CVE-2024-4956) - [An00bRektn/shirocrack](https://github.com/An00bRektn/shirocrack) +- [XiaomingX/cve-2024-4956](https://github.com/XiaomingX/cve-2024-4956) ### CVE-2024-5009 (2024-06-25) @@ -6138,6 +6139,7 @@ - [compr00t/CVE-2024-42327](https://github.com/compr00t/CVE-2024-42327) - [depers-rus/CVE-2024-42327](https://github.com/depers-rus/CVE-2024-42327) - [watchdog1337/CVE-2024-42327_Zabbix_SQLI](https://github.com/watchdog1337/CVE-2024-42327_Zabbix_SQLI) +- [igorbf495/CVE-2024-42327](https://github.com/igorbf495/CVE-2024-42327) ### CVE-2024-42346 (2024-09-20) @@ -8126,6 +8128,7 @@ - [Rajneeshkarya/CVE-2023-3460](https://github.com/Rajneeshkarya/CVE-2023-3460) - [DiMarcoSK/CVE-2023-3460_POC](https://github.com/DiMarcoSK/CVE-2023-3460_POC) - [julienbrs/exploit-CVE-2023-3460](https://github.com/julienbrs/exploit-CVE-2023-3460) +- [TranKuBao/CVE-2023-3460_FIX](https://github.com/TranKuBao/CVE-2023-3460_FIX) ### CVE-2023-3519 (2023-07-19)