diff --git a/2000/CVE-2000-0114.json b/2000/CVE-2000-0114.json
deleted file mode 100644
index 3319ff6273..0000000000
--- a/2000/CVE-2000-0114.json
+++ /dev/null
@@ -1,103 +0,0 @@
-[
- {
- "id": 808060718,
- "name": "CVE-2000-0114",
- "full_name": "Cappricio-Securities\/CVE-2000-0114",
- "owner": {
- "login": "Cappricio-Securities",
- "id": 102907425,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102907425?v=4",
- "html_url": "https:\/\/github.com\/Cappricio-Securities"
- },
- "html_url": "https:\/\/github.com\/Cappricio-Securities\/CVE-2000-0114",
- "description": "Microsoft FrontPage Extensions Check (shtml.dll)",
- "fork": false,
- "created_at": "2024-05-30T09:55:41Z",
- "updated_at": "2024-08-27T03:19:43Z",
- "pushed_at": "2024-06-24T09:48:11Z",
- "stargazers_count": 2,
- "watchers_count": 2,
- "has_discussions": false,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [
- "bugbounty",
- "bugbounty-tool",
- "bugbounty-tools",
- "cve-2000-0114",
- "cve-2000-0114-exploit",
- "cve-2000-0114-poc",
- "cve-2000-0114-scanner",
- "cve-2000-0114-tool",
- "microsoft-frontpage-extensions-check",
- "shtml-dll"
- ],
- "visibility": "public",
- "forks": 0,
- "watchers": 2,
- "score": 0,
- "subscribers_count": 0
- },
- {
- "id": 827058460,
- "name": "frontpage-server-extensions-vulnerability-scanner",
- "full_name": "Josekutty-K\/frontpage-server-extensions-vulnerability-scanner",
- "owner": {
- "login": "Josekutty-K",
- "id": 155238968,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/155238968?v=4",
- "html_url": "https:\/\/github.com\/Josekutty-K"
- },
- "html_url": "https:\/\/github.com\/Josekutty-K\/frontpage-server-extensions-vulnerability-scanner",
- "description": "Python script to scan for CVE-2000-0114 vulnerability in Frontpage Server Extensions. Automates subdomain enumeration and vulnerability scanning using subfinder and nuclei. For educational and professional use in cybersecurity assessments.",
- "fork": false,
- "created_at": "2024-07-11T00:08:44Z",
- "updated_at": "2024-07-14T07:35:58Z",
- "pushed_at": "2024-07-14T07:35:56Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "has_discussions": false,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 0,
- "score": 0,
- "subscribers_count": 2
- },
- {
- "id": 827478405,
- "name": "CVE-2000-0114",
- "full_name": "adhamelhansye\/CVE-2000-0114",
- "owner": {
- "login": "adhamelhansye",
- "id": 145185592,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145185592?v=4",
- "html_url": "https:\/\/github.com\/adhamelhansye"
- },
- "html_url": "https:\/\/github.com\/adhamelhansye\/CVE-2000-0114",
- "description": "This a CVE I found it in VDP at hackerone Platform",
- "fork": false,
- "created_at": "2024-07-11T18:14:05Z",
- "updated_at": "2024-07-11T18:22:14Z",
- "pushed_at": "2024-07-11T18:22:10Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "has_discussions": false,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 0,
- "score": 0,
- "subscribers_count": 1
- }
-]
\ No newline at end of file
diff --git a/2000/CVE-2000-0170.json b/2000/CVE-2000-0170.json
deleted file mode 100644
index 05f3bcfd24..0000000000
--- a/2000/CVE-2000-0170.json
+++ /dev/null
@@ -1,32 +0,0 @@
-[
- {
- "id": 26364485,
- "name": "exploit",
- "full_name": "mike182\/exploit",
- "owner": {
- "login": "mike182",
- "id": 509504,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/509504?v=4",
- "html_url": "https:\/\/github.com\/mike182"
- },
- "html_url": "https:\/\/github.com\/mike182\/exploit",
- "description": "CVE-2000-0170",
- "fork": false,
- "created_at": "2014-11-08T15:21:30Z",
- "updated_at": "2024-08-12T19:15:17Z",
- "pushed_at": "2014-11-08T15:25:37Z",
- "stargazers_count": 1,
- "watchers_count": 1,
- "has_discussions": false,
- "forks_count": 1,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 1,
- "watchers": 1,
- "score": 0,
- "subscribers_count": 3
- }
-]
\ No newline at end of file
diff --git a/2000/CVE-2000-0649.json b/2000/CVE-2000-0649.json
deleted file mode 100644
index 1ec2e77100..0000000000
--- a/2000/CVE-2000-0649.json
+++ /dev/null
@@ -1,97 +0,0 @@
-[
- {
- "id": 337929153,
- "name": "CVE-2000-0649",
- "full_name": "rafaelh\/CVE-2000-0649",
- "owner": {
- "login": "rafaelh",
- "id": 3272113,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3272113?v=4",
- "html_url": "https:\/\/github.com\/rafaelh"
- },
- "html_url": "https:\/\/github.com\/rafaelh\/CVE-2000-0649",
- "description": "Test for CVE-2000-0649, and return an IP address if vulnerable",
- "fork": false,
- "created_at": "2021-02-11T04:29:50Z",
- "updated_at": "2024-04-01T22:42:56Z",
- "pushed_at": "2024-04-01T22:42:52Z",
- "stargazers_count": 6,
- "watchers_count": 6,
- "has_discussions": false,
- "forks_count": 3,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [
- "cve",
- "cve-2000-0649",
- "exploit",
- "poc"
- ],
- "visibility": "public",
- "forks": 3,
- "watchers": 6,
- "score": 0,
- "subscribers_count": 2
- },
- {
- "id": 421212210,
- "name": "cve-2000-0649",
- "full_name": "stevenvegar\/cve-2000-0649",
- "owner": {
- "login": "stevenvegar",
- "id": 70730301,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70730301?v=4",
- "html_url": "https:\/\/github.com\/stevenvegar"
- },
- "html_url": "https:\/\/github.com\/stevenvegar\/cve-2000-0649",
- "description": "Script fo testing CVE-2000-0649 for Apache and MS IIS servers",
- "fork": false,
- "created_at": "2021-10-25T23:14:04Z",
- "updated_at": "2021-12-17T07:02:21Z",
- "pushed_at": "2021-10-25T23:32:57Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "has_discussions": false,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 0,
- "score": 0,
- "subscribers_count": 1
- },
- {
- "id": 816828496,
- "name": "PoC-CVE-2000-0649",
- "full_name": "Downgraderz\/PoC-CVE-2000-0649",
- "owner": {
- "login": "Downgraderz",
- "id": 19348425,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19348425?v=4",
- "html_url": "https:\/\/github.com\/Downgraderz"
- },
- "html_url": "https:\/\/github.com\/Downgraderz\/PoC-CVE-2000-0649",
- "description": "A small tool to create a PoC for CVE-2000-0649.",
- "fork": false,
- "created_at": "2024-06-18T13:31:44Z",
- "updated_at": "2024-06-18T13:48:47Z",
- "pushed_at": "2024-06-18T13:48:44Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "has_discussions": false,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 0,
- "score": 0,
- "subscribers_count": 1
- }
-]
\ No newline at end of file
diff --git a/2000/CVE-2000-0979.json b/2000/CVE-2000-0979.json
deleted file mode 100644
index 14b2496fdb..0000000000
--- a/2000/CVE-2000-0979.json
+++ /dev/null
@@ -1,32 +0,0 @@
-[
- {
- "id": 217722448,
- "name": "CVE-2000-0979",
- "full_name": "Z6543\/CVE-2000-0979",
- "owner": {
- "login": "Z6543",
- "id": 1755029,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1755029?v=4",
- "html_url": "https:\/\/github.com\/Z6543"
- },
- "html_url": "https:\/\/github.com\/Z6543\/CVE-2000-0979",
- "description": "CVE-2000-0979",
- "fork": false,
- "created_at": "2019-10-26T14:40:17Z",
- "updated_at": "2024-08-12T19:54:16Z",
- "pushed_at": "2019-10-27T07:57:38Z",
- "stargazers_count": 2,
- "watchers_count": 2,
- "has_discussions": false,
- "forks_count": 2,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 2,
- "watchers": 2,
- "score": 0,
- "subscribers_count": 2
- }
-]
\ No newline at end of file
diff --git a/2002/CVE-2002-20001.json b/2002/CVE-2002-20001.json
index 8c1d82dc94..5f6eb5852a 100644
--- a/2002/CVE-2002-20001.json
+++ b/2002/CVE-2002-20001.json
@@ -13,12 +13,12 @@
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)",
"fork": false,
"created_at": "2021-08-31T09:51:12Z",
- "updated_at": "2024-09-16T00:06:23Z",
+ "updated_at": "2024-09-20T15:47:37Z",
"pushed_at": "2024-05-03T22:24:07Z",
- "stargazers_count": 180,
- "watchers_count": 180,
+ "stargazers_count": 183,
+ "watchers_count": 183,
"has_discussions": false,
- "forks_count": 26,
+ "forks_count": 27,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -45,8 +45,8 @@
"tls"
],
"visibility": "public",
- "forks": 26,
- "watchers": 180,
+ "forks": 27,
+ "watchers": 183,
"score": 0,
"subscribers_count": 8
}
diff --git a/2006/CVE-2006-0450.json b/2006/CVE-2006-0450.json
deleted file mode 100644
index a975a46f8c..0000000000
--- a/2006/CVE-2006-0450.json
+++ /dev/null
@@ -1,32 +0,0 @@
-[
- {
- "id": 289235311,
- "name": "CVE-2006-0450-phpBB-2.0.15-Multiple-DoS-Vulnerabilities",
- "full_name": "Parcer0\/CVE-2006-0450-phpBB-2.0.15-Multiple-DoS-Vulnerabilities",
- "owner": {
- "login": "Parcer0",
- "id": 70012338,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70012338?v=4",
- "html_url": "https:\/\/github.com\/Parcer0"
- },
- "html_url": "https:\/\/github.com\/Parcer0\/CVE-2006-0450-phpBB-2.0.15-Multiple-DoS-Vulnerabilities",
- "description": "CVE-2006-0450. phpBB 2.0.19 and earlier allows remote attackers to cause a denial of service (application crash) by (1) registering many users through profile.php or (2) using search.php to search in a certain way that confuses the database.",
- "fork": false,
- "created_at": "2020-08-21T09:50:57Z",
- "updated_at": "2020-08-28T14:58:56Z",
- "pushed_at": "2020-08-28T14:58:54Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "has_discussions": false,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 0,
- "score": 0,
- "subscribers_count": 1
- }
-]
\ No newline at end of file
diff --git a/2006/CVE-2006-1236.json b/2006/CVE-2006-1236.json
deleted file mode 100644
index 0a18b3e9b1..0000000000
--- a/2006/CVE-2006-1236.json
+++ /dev/null
@@ -1,32 +0,0 @@
-[
- {
- "id": 168247796,
- "name": "CVE-2006-1236",
- "full_name": "Axua\/CVE-2006-1236",
- "owner": {
- "login": "Axua",
- "id": 28788087,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28788087?v=4",
- "html_url": "https:\/\/github.com\/Axua"
- },
- "html_url": "https:\/\/github.com\/Axua\/CVE-2006-1236",
- "description": "Exploit script for Crossfire 1.9.0",
- "fork": false,
- "created_at": "2019-01-29T23:46:59Z",
- "updated_at": "2019-01-29T23:50:30Z",
- "pushed_at": "2019-01-29T23:50:29Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "has_discussions": false,
- "forks_count": 1,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 1,
- "watchers": 0,
- "score": 0,
- "subscribers_count": 1
- }
-]
\ No newline at end of file
diff --git a/2006/CVE-2006-20001.json b/2006/CVE-2006-20001.json
deleted file mode 100644
index 6d1efc4ba5..0000000000
--- a/2006/CVE-2006-20001.json
+++ /dev/null
@@ -1,32 +0,0 @@
-[
- {
- "id": 598440551,
- "name": "CVE-2006-20001",
- "full_name": "Saksham2002\/CVE-2006-20001",
- "owner": {
- "login": "Saksham2002",
- "id": 31695520,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31695520?v=4",
- "html_url": "https:\/\/github.com\/Saksham2002"
- },
- "html_url": "https:\/\/github.com\/Saksham2002\/CVE-2006-20001",
- "description": "A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash. This issue affects Apache HTTP Server 2.4.54 and earlier. CVE project by @Sn0wAlice",
- "fork": false,
- "created_at": "2023-02-07T05:30:52Z",
- "updated_at": "2023-02-20T15:27:07Z",
- "pushed_at": "2023-01-17T21:26:22Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "has_discussions": false,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 0,
- "score": 0,
- "subscribers_count": 0
- }
-]
\ No newline at end of file
diff --git a/2006/CVE-2006-2842.json b/2006/CVE-2006-2842.json
deleted file mode 100644
index ae43fb796c..0000000000
--- a/2006/CVE-2006-2842.json
+++ /dev/null
@@ -1,32 +0,0 @@
-[
- {
- "id": 736683121,
- "name": "CVE-2006-2842",
- "full_name": "karthi-the-hacker\/CVE-2006-2842",
- "owner": {
- "login": "karthi-the-hacker",
- "id": 33289300,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33289300?v=4",
- "html_url": "https:\/\/github.com\/karthi-the-hacker"
- },
- "html_url": "https:\/\/github.com\/karthi-the-hacker\/CVE-2006-2842",
- "description": "CVE-2006-2842 is a powerful scanner for bug bounty hunters and penetration testers to discover vulnerabilities in their web applications.",
- "fork": false,
- "created_at": "2023-12-28T15:17:56Z",
- "updated_at": "2024-05-15T13:23:39Z",
- "pushed_at": "2023-12-28T15:24:51Z",
- "stargazers_count": 3,
- "watchers_count": 3,
- "has_discussions": false,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 3,
- "score": 0,
- "subscribers_count": 1
- }
-]
\ No newline at end of file
diff --git a/2006/CVE-2006-3392.json b/2006/CVE-2006-3392.json
deleted file mode 100644
index 4a39148dd5..0000000000
--- a/2006/CVE-2006-3392.json
+++ /dev/null
@@ -1,212 +0,0 @@
-[
- {
- "id": 276101400,
- "name": "CVE-2006-3392",
- "full_name": "0xtz\/CVE-2006-3392",
- "owner": {
- "login": "0xtz",
- "id": 53442065,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53442065?v=4",
- "html_url": "https:\/\/github.com\/0xtz"
- },
- "html_url": "https:\/\/github.com\/0xtz\/CVE-2006-3392",
- "description": "Webmin < 1.290 \/ Usermin < 1.220 - Arbitrary File Disclosure (Python3)",
- "fork": false,
- "created_at": "2020-06-30T13:07:31Z",
- "updated_at": "2020-08-05T16:17:06Z",
- "pushed_at": "2020-06-30T22:21:46Z",
- "stargazers_count": 1,
- "watchers_count": 1,
- "has_discussions": false,
- "forks_count": 1,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 1,
- "watchers": 1,
- "score": 0,
- "subscribers_count": 1
- },
- {
- "id": 318499385,
- "name": "CVE-2006-3392",
- "full_name": "IvanGlinkin\/CVE-2006-3392",
- "owner": {
- "login": "IvanGlinkin",
- "id": 64857726,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64857726?v=4",
- "html_url": "https:\/\/github.com\/IvanGlinkin"
- },
- "html_url": "https:\/\/github.com\/IvanGlinkin\/CVE-2006-3392",
- "description": "This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included function will help you to get only the important information.",
- "fork": false,
- "created_at": "2020-12-04T11:44:22Z",
- "updated_at": "2024-04-30T19:19:30Z",
- "pushed_at": "2023-03-09T17:44:39Z",
- "stargazers_count": 13,
- "watchers_count": 13,
- "has_discussions": true,
- "forks_count": 4,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 4,
- "watchers": 13,
- "score": 0,
- "subscribers_count": 2
- },
- {
- "id": 424360665,
- "name": "CVE-2006-3392",
- "full_name": "Adel-kaka-dz\/CVE-2006-3392",
- "owner": {
- "login": "Adel-kaka-dz",
- "id": 65834056,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65834056?v=4",
- "html_url": "https:\/\/github.com\/Adel-kaka-dz"
- },
- "html_url": "https:\/\/github.com\/Adel-kaka-dz\/CVE-2006-3392",
- "description": "It is a simple tool to exploit local file include . vulnerabilities",
- "fork": false,
- "created_at": "2021-11-03T19:51:31Z",
- "updated_at": "2021-11-03T20:25:42Z",
- "pushed_at": "2021-11-03T20:25:39Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "has_discussions": false,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 0,
- "score": 0,
- "subscribers_count": 1
- },
- {
- "id": 427745120,
- "name": "ExploitWebmin",
- "full_name": "gb21oc\/ExploitWebmin",
- "owner": {
- "login": "gb21oc",
- "id": 66036094,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66036094?v=4",
- "html_url": "https:\/\/github.com\/gb21oc"
- },
- "html_url": "https:\/\/github.com\/gb21oc\/ExploitWebmin",
- "description": "Python script to exploit webmin vulnerability cve-2006-3392",
- "fork": false,
- "created_at": "2021-11-13T18:40:15Z",
- "updated_at": "2023-05-01T02:30:08Z",
- "pushed_at": "2023-01-04T00:41:19Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "has_discussions": false,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 0,
- "score": 0,
- "subscribers_count": 1
- },
- {
- "id": 440387641,
- "name": "CVE-2006-3392",
- "full_name": "kernel-cyber\/CVE-2006-3392",
- "owner": {
- "login": "kernel-cyber",
- "id": 21226709,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21226709?v=4",
- "html_url": "https:\/\/github.com\/kernel-cyber"
- },
- "html_url": "https:\/\/github.com\/kernel-cyber\/CVE-2006-3392",
- "description": "Webmin Local File Include (unauthenticated)",
- "fork": false,
- "created_at": "2021-12-21T04:18:21Z",
- "updated_at": "2021-12-21T04:43:07Z",
- "pushed_at": "2022-09-15T15:49:59Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "has_discussions": false,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 0,
- "score": 0,
- "subscribers_count": 1
- },
- {
- "id": 585267139,
- "name": "CVE-2006-3392",
- "full_name": "g1vi\/CVE-2006-3392",
- "owner": {
- "login": "g1vi",
- "id": 120142960,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/120142960?v=4",
- "html_url": "https:\/\/github.com\/g1vi"
- },
- "html_url": "https:\/\/github.com\/g1vi\/CVE-2006-3392",
- "description": "Webmin < 1.290 \/ Usermin < 1.220 - Arbitrary file disclosure",
- "fork": false,
- "created_at": "2023-01-04T18:33:28Z",
- "updated_at": "2023-01-06T06:22:43Z",
- "pushed_at": "2023-10-09T21:46:04Z",
- "stargazers_count": 1,
- "watchers_count": 1,
- "has_discussions": false,
- "forks_count": 2,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 2,
- "watchers": 1,
- "score": 0,
- "subscribers_count": 1
- },
- {
- "id": 623248169,
- "name": "CVE-2006-3392",
- "full_name": "MrEmpy\/CVE-2006-3392",
- "owner": {
- "login": "MrEmpy",
- "id": 71796063,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71796063?v=4",
- "html_url": "https:\/\/github.com\/MrEmpy"
- },
- "html_url": "https:\/\/github.com\/MrEmpy\/CVE-2006-3392",
- "description": null,
- "fork": false,
- "created_at": "2023-04-04T01:54:16Z",
- "updated_at": "2024-07-03T23:33:40Z",
- "pushed_at": "2023-04-04T02:01:19Z",
- "stargazers_count": 3,
- "watchers_count": 3,
- "has_discussions": false,
- "forks_count": 2,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 2,
- "watchers": 3,
- "score": 0,
- "subscribers_count": 2
- }
-]
\ No newline at end of file
diff --git a/2006/CVE-2006-3592.json b/2006/CVE-2006-3592.json
deleted file mode 100644
index b79490375c..0000000000
--- a/2006/CVE-2006-3592.json
+++ /dev/null
@@ -1,32 +0,0 @@
-[
- {
- "id": 186166548,
- "name": "CVE-2006-3592",
- "full_name": "adenkiewicz\/CVE-2006-3592",
- "owner": {
- "login": "adenkiewicz",
- "id": 1060275,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1060275?v=4",
- "html_url": "https:\/\/github.com\/adenkiewicz"
- },
- "html_url": "https:\/\/github.com\/adenkiewicz\/CVE-2006-3592",
- "description": "Exploit for Easy File Sharing FTP Server 3.5 on Win7 32",
- "fork": false,
- "created_at": "2019-05-11T18:11:34Z",
- "updated_at": "2019-05-11T18:12:45Z",
- "pushed_at": "2019-05-11T18:12:44Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "has_discussions": false,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 0,
- "score": 0,
- "subscribers_count": 2
- }
-]
\ No newline at end of file
diff --git a/2006/CVE-2006-3747.json b/2006/CVE-2006-3747.json
deleted file mode 100644
index 888b37e9b0..0000000000
--- a/2006/CVE-2006-3747.json
+++ /dev/null
@@ -1,37 +0,0 @@
-[
- {
- "id": 74795309,
- "name": "CVE-2006-3747",
- "full_name": "defensahacker\/CVE-2006-3747",
- "owner": {
- "login": "defensahacker",
- "id": 23421429,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23421429?v=4",
- "html_url": "https:\/\/github.com\/defensahacker"
- },
- "html_url": "https:\/\/github.com\/defensahacker\/CVE-2006-3747",
- "description": "Information about my advisory on CVE-2006-3747 (Apache mod_rewrite LDAP off-by-one buffer overflow).. At the time, it was the first public working exploit :)",
- "fork": false,
- "created_at": "2016-11-26T00:20:33Z",
- "updated_at": "2021-03-14T09:25:12Z",
- "pushed_at": "2021-03-14T09:25:10Z",
- "stargazers_count": 2,
- "watchers_count": 2,
- "has_discussions": false,
- "forks_count": 2,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [
- "apache",
- "buffer-overflow",
- "buffer-overflow-attack",
- "pentesting"
- ],
- "visibility": "public",
- "forks": 2,
- "watchers": 2,
- "score": 0,
- "subscribers_count": 0
- }
-]
\ No newline at end of file
diff --git a/2006/CVE-2006-4777.json b/2006/CVE-2006-4777.json
deleted file mode 100644
index 44040e42d3..0000000000
--- a/2006/CVE-2006-4777.json
+++ /dev/null
@@ -1,32 +0,0 @@
-[
- {
- "id": 120482931,
- "name": "js-driveby-download-CVE-2006-4777",
- "full_name": "Mario1234\/js-driveby-download-CVE-2006-4777",
- "owner": {
- "login": "Mario1234",
- "id": 30897590,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30897590?v=4",
- "html_url": "https:\/\/github.com\/Mario1234"
- },
- "html_url": "https:\/\/github.com\/Mario1234\/js-driveby-download-CVE-2006-4777",
- "description": "malware del lado del cliente de explotacion de vulnerabilidad de internet explorer 6.0 SP1 en windows xp SP2. No requiere de consentimiento por parte del usuario y no descarga ningun archivo",
- "fork": false,
- "created_at": "2018-02-06T15:55:05Z",
- "updated_at": "2018-02-06T16:05:23Z",
- "pushed_at": "2018-02-06T16:24:10Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "has_discussions": false,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 0,
- "score": 0,
- "subscribers_count": 1
- }
-]
\ No newline at end of file
diff --git a/2006/CVE-2006-4814.json b/2006/CVE-2006-4814.json
deleted file mode 100644
index cfe611a562..0000000000
--- a/2006/CVE-2006-4814.json
+++ /dev/null
@@ -1,32 +0,0 @@
-[
- {
- "id": 24196278,
- "name": "linux-CVE-2006-4814",
- "full_name": "tagatac\/linux-CVE-2006-4814",
- "owner": {
- "login": "tagatac",
- "id": 1304425,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1304425?v=4",
- "html_url": "https:\/\/github.com\/tagatac"
- },
- "html_url": "https:\/\/github.com\/tagatac\/linux-CVE-2006-4814",
- "description": "A deadlock on the mmap semaphore ‘mmap sem’ in the CentOS 3.9 kernel, that is triggered by a specific interleaving of concurrent threads, one calling the mmap system call and the other calling the mincore system call.",
- "fork": false,
- "created_at": "2014-09-18T16:38:24Z",
- "updated_at": "2016-09-04T16:50:17Z",
- "pushed_at": "2015-08-11T00:42:11Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "has_discussions": false,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 0,
- "score": 0,
- "subscribers_count": 3
- }
-]
\ No newline at end of file
diff --git a/2006/CVE-2006-5051.json b/2006/CVE-2006-5051.json
deleted file mode 100644
index e2bea142b6..0000000000
--- a/2006/CVE-2006-5051.json
+++ /dev/null
@@ -1,98 +0,0 @@
-[
- {
- "id": 822792125,
- "name": "CVE-2024-6387",
- "full_name": "bigb0x\/CVE-2024-6387",
- "owner": {
- "login": "bigb0x",
- "id": 13532434,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13532434?v=4",
- "html_url": "https:\/\/github.com\/bigb0x"
- },
- "html_url": "https:\/\/github.com\/bigb0x\/CVE-2024-6387",
- "description": "Bulk Scanning Tool for OpenSSH CVE-2024-6387, CVE-2006-5051 , CVE-2008-4109 and others.",
- "fork": false,
- "created_at": "2024-07-01T20:45:53Z",
- "updated_at": "2024-08-30T12:03:09Z",
- "pushed_at": "2024-07-06T10:47:30Z",
- "stargazers_count": 25,
- "watchers_count": 25,
- "has_discussions": false,
- "forks_count": 6,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [
- "openssh",
- "security-audit",
- "security-tools",
- "ssh",
- "ssh-server"
- ],
- "visibility": "public",
- "forks": 6,
- "watchers": 25,
- "score": 0,
- "subscribers_count": 1
- },
- {
- "id": 824318880,
- "name": "CVE-2024-6387_Check",
- "full_name": "sardine-web\/CVE-2024-6387_Check",
- "owner": {
- "login": "sardine-web",
- "id": 80635620,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80635620?v=4",
- "html_url": "https:\/\/github.com\/sardine-web"
- },
- "html_url": "https:\/\/github.com\/sardine-web\/CVE-2024-6387_Check",
- "description": "A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead to sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.",
- "fork": false,
- "created_at": "2024-07-04T21:20:26Z",
- "updated_at": "2024-07-05T10:10:03Z",
- "pushed_at": "2024-07-04T21:31:17Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "has_discussions": false,
- "forks_count": 1,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 1,
- "watchers": 0,
- "score": 0,
- "subscribers_count": 1
- },
- {
- "id": 827378414,
- "name": "CVE-2024-6387",
- "full_name": "ThemeHackers\/CVE-2024-6387",
- "owner": {
- "login": "ThemeHackers",
- "id": 107047730,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107047730?v=4",
- "html_url": "https:\/\/github.com\/ThemeHackers"
- },
- "html_url": "https:\/\/github.com\/ThemeHackers\/CVE-2024-6387",
- "description": "CVE-2024-6387, also known as RegreSSHion, is a high-severity vulnerability found in OpenSSH servers (sshd) running on glibc-based Linux systems. It is a regression of a previously fixed vulnerability (CVE-2006-5051), which means the issue was reintroduced in newer versions of OpenSSH.",
- "fork": false,
- "created_at": "2024-07-11T14:37:17Z",
- "updated_at": "2024-07-30T14:09:30Z",
- "pushed_at": "2024-07-11T14:59:20Z",
- "stargazers_count": 1,
- "watchers_count": 1,
- "has_discussions": false,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 1,
- "score": 0,
- "subscribers_count": 1
- }
-]
\ No newline at end of file
diff --git a/2006/CVE-2006-6184.json b/2006/CVE-2006-6184.json
deleted file mode 100644
index 3e73cb653b..0000000000
--- a/2006/CVE-2006-6184.json
+++ /dev/null
@@ -1,62 +0,0 @@
-[
- {
- "id": 63907042,
- "name": "cve-2006-6184",
- "full_name": "shauntdergrigorian\/cve-2006-6184",
- "owner": {
- "login": "shauntdergrigorian",
- "id": 7718028,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7718028?v=4",
- "html_url": "https:\/\/github.com\/shauntdergrigorian"
- },
- "html_url": "https:\/\/github.com\/shauntdergrigorian\/cve-2006-6184",
- "description": "This is a python-based standalone exploit for CVE-2006-6184. This exploit triggers a stack-based buffer overflows in Allied Telesyn TFTP Server (AT-TFTP) 1.9, and possibly earlier, allow remote attackers to cause a denial of service or execute arbitrary code.",
- "fork": false,
- "created_at": "2016-07-21T22:43:43Z",
- "updated_at": "2023-04-16T10:27:23Z",
- "pushed_at": "2020-11-03T22:12:03Z",
- "stargazers_count": 11,
- "watchers_count": 11,
- "has_discussions": false,
- "forks_count": 7,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 7,
- "watchers": 11,
- "score": 0,
- "subscribers_count": 1
- },
- {
- "id": 205628184,
- "name": "CVE-2006-6184",
- "full_name": "b03902043\/CVE-2006-6184",
- "owner": {
- "login": "b03902043",
- "id": 9023845,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9023845?v=4",
- "html_url": "https:\/\/github.com\/b03902043"
- },
- "html_url": "https:\/\/github.com\/b03902043\/CVE-2006-6184",
- "description": "simplified version of https:\/\/github.com\/shauntdergrigorian\/cve-2006-6184",
- "fork": false,
- "created_at": "2019-09-01T04:18:53Z",
- "updated_at": "2019-09-01T04:23:25Z",
- "pushed_at": "2019-09-01T04:23:24Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "has_discussions": false,
- "forks_count": 1,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 1,
- "watchers": 0,
- "score": 0,
- "subscribers_count": 2
- }
-]
\ No newline at end of file
diff --git a/2008/CVE-2008-0166.json b/2008/CVE-2008-0166.json
index 868daff619..13210d0336 100644
--- a/2008/CVE-2008-0166.json
+++ b/2008/CVE-2008-0166.json
@@ -13,7 +13,7 @@
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
"fork": false,
"created_at": "2013-09-22T21:20:31Z",
- "updated_at": "2024-08-29T15:27:52Z",
+ "updated_at": "2024-09-19T11:48:22Z",
"pushed_at": "2023-01-22T09:39:45Z",
"stargazers_count": 385,
"watchers_count": 385,
@@ -105,10 +105,10 @@
"description": "Search for BTC coins on earlier versions of Bitcoin Core with critical vulnerability OpenSSL 0.9.8 CVE-2008-0166",
"fork": false,
"created_at": "2022-08-26T12:18:39Z",
- "updated_at": "2024-08-12T20:26:31Z",
+ "updated_at": "2024-09-22T17:28:47Z",
"pushed_at": "2022-12-07T00:53:21Z",
- "stargazers_count": 5,
- "watchers_count": 5,
+ "stargazers_count": 6,
+ "watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@@ -134,7 +134,7 @@
],
"visibility": "public",
"forks": 2,
- "watchers": 5,
+ "watchers": 6,
"score": 0,
"subscribers_count": 2
}
diff --git a/2010/CVE-2010-1240.json b/2010/CVE-2010-1240.json
index a05599f56a..0d2d56e9ee 100644
--- a/2010/CVE-2010-1240.json
+++ b/2010/CVE-2010-1240.json
@@ -18,13 +18,13 @@
"stargazers_count": 49,
"watchers_count": 49,
"has_discussions": false,
- "forks_count": 4,
+ "forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 4,
+ "forks": 5,
"watchers": 49,
"score": 0,
"subscribers_count": 4
@@ -43,10 +43,10 @@
"description": "This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actually consists of embedded payload. The exploit was made public as CVE-2010-1240.",
"fork": false,
"created_at": "2022-01-26T05:59:52Z",
- "updated_at": "2024-07-23T16:36:45Z",
+ "updated_at": "2024-09-18T08:13:57Z",
"pushed_at": "2022-01-26T06:47:31Z",
- "stargazers_count": 5,
- "watchers_count": 5,
+ "stargazers_count": 6,
+ "watchers_count": 6,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
- "watchers": 5,
+ "watchers": 6,
"score": 0,
"subscribers_count": 1
},
diff --git a/2011/CVE-2011-2523.json b/2011/CVE-2011-2523.json
index 18ca7dca98..a85dfabd0f 100644
--- a/2011/CVE-2011-2523.json
+++ b/2011/CVE-2011-2523.json
@@ -475,14 +475,14 @@
{
"id": 806726183,
"name": "CVE-2011-2523-PoC",
- "full_name": "Uno13x\/CVE-2011-2523-PoC",
+ "full_name": "R4idB0Y\/CVE-2011-2523-PoC",
"owner": {
- "login": "Uno13x",
+ "login": "R4idB0Y",
"id": 132174647,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132174647?v=4",
- "html_url": "https:\/\/github.com\/Uno13x"
+ "html_url": "https:\/\/github.com\/R4idB0Y"
},
- "html_url": "https:\/\/github.com\/Uno13x\/CVE-2011-2523-PoC",
+ "html_url": "https:\/\/github.com\/R4idB0Y\/CVE-2011-2523-PoC",
"description": "PoC CVE-2011-2523 ",
"fork": false,
"created_at": "2024-05-27T19:13:59Z",
diff --git a/2014/CVE-2014-0160.json b/2014/CVE-2014-0160.json
index 5148699ff1..fb605c0169 100644
--- a/2014/CVE-2014-0160.json
+++ b/2014/CVE-2014-0160.json
@@ -223,10 +223,10 @@
"description": "Heartbleed (CVE-2014-0160) client exploit",
"fork": false,
"created_at": "2014-04-08T16:41:51Z",
- "updated_at": "2024-06-17T07:48:16Z",
+ "updated_at": "2024-09-20T14:27:26Z",
"pushed_at": "2016-01-22T00:42:35Z",
- "stargazers_count": 320,
- "watchers_count": 320,
+ "stargazers_count": 319,
+ "watchers_count": 319,
"has_discussions": false,
"forks_count": 88,
"allow_forking": true,
@@ -235,7 +235,7 @@
"topics": [],
"visibility": "public",
"forks": 88,
- "watchers": 320,
+ "watchers": 319,
"score": 0,
"subscribers_count": 32
},
@@ -1912,5 +1912,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 860467967,
+ "name": "CVE-2014-0160-HeartBleed",
+ "full_name": "Yash-Thakkar77\/CVE-2014-0160-HeartBleed",
+ "owner": {
+ "login": "Yash-Thakkar77",
+ "id": 117845673,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117845673?v=4",
+ "html_url": "https:\/\/github.com\/Yash-Thakkar77"
+ },
+ "html_url": "https:\/\/github.com\/Yash-Thakkar77\/CVE-2014-0160-HeartBleed",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-09-20T13:44:54Z",
+ "updated_at": "2024-09-20T13:58:28Z",
+ "pushed_at": "2024-09-20T13:58:25Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2014/CVE-2014-3566.json b/2014/CVE-2014-3566.json
index c7a67432a1..a6abac96ac 100644
--- a/2014/CVE-2014-3566.json
+++ b/2014/CVE-2014-3566.json
@@ -107,10 +107,10 @@
"description": ":poodle: Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566 :poodle:",
"fork": false,
"created_at": "2015-02-03T20:28:27Z",
- "updated_at": "2024-09-12T03:11:46Z",
+ "updated_at": "2024-09-20T09:36:18Z",
"pushed_at": "2023-10-06T16:11:26Z",
- "stargazers_count": 248,
- "watchers_count": 248,
+ "stargazers_count": 249,
+ "watchers_count": 249,
"has_discussions": false,
"forks_count": 75,
"allow_forking": true,
@@ -127,7 +127,7 @@
],
"visibility": "public",
"forks": 75,
- "watchers": 248,
+ "watchers": 249,
"score": 0,
"subscribers_count": 17
},
diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json
index 1eee89de4d..b8819f520a 100644
--- a/2014/CVE-2014-4210.json
+++ b/2014/CVE-2014-4210.json
@@ -43,7 +43,7 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2024-09-10T20:12:53Z",
+ "updated_at": "2024-09-24T00:38:41Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1982,
"watchers_count": 1982,
diff --git a/2014/CVE-2014-6271.json b/2014/CVE-2014-6271.json
index 3ebfe72e8d..3e9b1c3d0b 100644
--- a/2014/CVE-2014-6271.json
+++ b/2014/CVE-2014-6271.json
@@ -1158,10 +1158,10 @@
"description": "Shellshock exploit + vulnerable environment",
"fork": false,
"created_at": "2016-12-07T23:38:50Z",
- "updated_at": "2024-09-07T03:16:29Z",
+ "updated_at": "2024-09-23T02:57:34Z",
"pushed_at": "2023-05-11T02:12:25Z",
- "stargazers_count": 198,
- "watchers_count": 198,
+ "stargazers_count": 199,
+ "watchers_count": 199,
"has_discussions": false,
"forks_count": 56,
"allow_forking": true,
@@ -1177,7 +1177,7 @@
],
"visibility": "public",
"forks": 56,
- "watchers": 198,
+ "watchers": 199,
"score": 0,
"subscribers_count": 5
},
@@ -2050,8 +2050,8 @@
"description": "Exploitation of \"Shellshock\" Vulnerability. Remote code execution in Apache with mod_cgi",
"fork": false,
"created_at": "2023-07-01T03:50:02Z",
- "updated_at": "2023-11-07T21:57:34Z",
- "pushed_at": "2024-04-03T15:24:24Z",
+ "updated_at": "2024-09-22T08:52:12Z",
+ "pushed_at": "2024-09-22T08:52:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
diff --git a/2015/CVE-2015-1701.json b/2015/CVE-2015-1701.json
index 753dd82835..e275040ca8 100644
--- a/2015/CVE-2015-1701.json
+++ b/2015/CVE-2015-1701.json
@@ -13,10 +13,10 @@
"description": "Win32k LPE vulnerability used in APT attack",
"fork": false,
"created_at": "2015-05-12T18:04:48Z",
- "updated_at": "2024-09-13T14:05:38Z",
+ "updated_at": "2024-09-21T18:03:04Z",
"pushed_at": "2017-12-18T14:11:29Z",
- "stargazers_count": 284,
- "watchers_count": 284,
+ "stargazers_count": 285,
+ "watchers_count": 285,
"has_discussions": false,
"forks_count": 178,
"allow_forking": true,
@@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 178,
- "watchers": 284,
+ "watchers": 285,
"score": 0,
"subscribers_count": 33
},
diff --git a/2015/CVE-2015-9251.json b/2015/CVE-2015-9251.json
index 371478f124..b572656b00 100644
--- a/2015/CVE-2015-9251.json
+++ b/2015/CVE-2015-9251.json
@@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2018-12-20T12:12:59Z",
- "updated_at": "2024-08-18T20:19:38Z",
+ "updated_at": "2024-09-23T10:41:57Z",
"pushed_at": "2019-01-31T23:27:45Z",
- "stargazers_count": 8,
- "watchers_count": 8,
+ "stargazers_count": 9,
+ "watchers_count": 9,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
- "watchers": 8,
+ "watchers": 9,
"score": 0,
"subscribers_count": 1
}
diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json
index d7dd66a553..e46a43487e 100644
--- a/2016/CVE-2016-0638.json
+++ b/2016/CVE-2016-0638.json
@@ -13,7 +13,7 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2024-09-10T20:12:53Z",
+ "updated_at": "2024-09-24T00:38:41Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1982,
"watchers_count": 1982,
diff --git a/2016/CVE-2016-10277.json b/2016/CVE-2016-10277.json
index c5438d29db..50d1bb0c96 100644
--- a/2016/CVE-2016-10277.json
+++ b/2016/CVE-2016-10277.json
@@ -13,10 +13,10 @@
"description": "Motorola Untethered Jailbreak: Exploiting CVE-2016-10277 for Secure Boot and Device Locking bypass ",
"fork": false,
"created_at": "2017-06-06T12:00:27Z",
- "updated_at": "2024-08-13T22:52:24Z",
+ "updated_at": "2024-09-22T17:07:19Z",
"pushed_at": "2017-08-30T15:17:08Z",
- "stargazers_count": 66,
- "watchers_count": 66,
+ "stargazers_count": 67,
+ "watchers_count": 67,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
- "watchers": 66,
+ "watchers": 67,
"score": 0,
"subscribers_count": 18
},
diff --git a/2016/CVE-2016-1825.json b/2016/CVE-2016-1825.json
index a7d31d2205..e2347ec704 100644
--- a/2016/CVE-2016-1825.json
+++ b/2016/CVE-2016-1825.json
@@ -13,10 +13,10 @@
"description": "Local privilege escalation through macOS 10.12.1 via CVE-2016-1825 or CVE-2016-7617.",
"fork": false,
"created_at": "2016-12-25T05:07:22Z",
- "updated_at": "2024-08-12T19:26:46Z",
+ "updated_at": "2024-09-17T21:37:07Z",
"pushed_at": "2017-01-16T18:13:15Z",
- "stargazers_count": 63,
- "watchers_count": 63,
+ "stargazers_count": 64,
+ "watchers_count": 64,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
- "watchers": 63,
+ "watchers": 64,
"score": 0,
"subscribers_count": 6
}
diff --git a/2016/CVE-2016-1828.json b/2016/CVE-2016-1828.json
index 017c70b889..19b960acba 100644
--- a/2016/CVE-2016-1828.json
+++ b/2016/CVE-2016-1828.json
@@ -13,10 +13,10 @@
"description": "Local privilege escalation for OS X 10.10.5 via CVE-2016-1828.",
"fork": false,
"created_at": "2016-05-18T03:49:02Z",
- "updated_at": "2024-08-12T19:22:53Z",
+ "updated_at": "2024-09-17T21:37:01Z",
"pushed_at": "2016-05-18T03:53:42Z",
- "stargazers_count": 82,
- "watchers_count": 82,
+ "stargazers_count": 83,
+ "watchers_count": 83,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 28,
- "watchers": 82,
+ "watchers": 83,
"score": 0,
"subscribers_count": 11
},
diff --git a/2016/CVE-2016-5195.json b/2016/CVE-2016-5195.json
index 1462df07ba..60239ccadd 100644
--- a/2016/CVE-2016-5195.json
+++ b/2016/CVE-2016-5195.json
@@ -73,19 +73,19 @@
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
"fork": false,
"created_at": "2016-10-21T11:19:21Z",
- "updated_at": "2024-08-26T11:36:50Z",
+ "updated_at": "2024-09-23T03:19:31Z",
"pushed_at": "2021-02-03T16:03:40Z",
- "stargazers_count": 950,
- "watchers_count": 950,
+ "stargazers_count": 953,
+ "watchers_count": 953,
"has_discussions": false,
- "forks_count": 392,
+ "forks_count": 393,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 392,
- "watchers": 950,
+ "forks": 393,
+ "watchers": 953,
"score": 0,
"subscribers_count": 64
},
@@ -263,10 +263,10 @@
"description": "A CVE-2016-5195 exploit example.",
"fork": false,
"created_at": "2016-10-23T00:16:33Z",
- "updated_at": "2024-09-11T16:42:06Z",
+ "updated_at": "2024-09-20T14:04:02Z",
"pushed_at": "2017-03-21T16:46:38Z",
- "stargazers_count": 314,
- "watchers_count": 314,
+ "stargazers_count": 313,
+ "watchers_count": 313,
"has_discussions": false,
"forks_count": 120,
"allow_forking": true,
@@ -279,7 +279,7 @@
],
"visibility": "public",
"forks": 120,
- "watchers": 314,
+ "watchers": 313,
"score": 0,
"subscribers_count": 16
},
@@ -447,12 +447,12 @@
"description": "Dirty Cow exploit - CVE-2016-5195",
"fork": false,
"created_at": "2016-11-25T21:08:01Z",
- "updated_at": "2024-09-17T14:46:23Z",
+ "updated_at": "2024-09-19T11:50:31Z",
"pushed_at": "2021-04-08T11:35:12Z",
"stargazers_count": 845,
"watchers_count": 845,
"has_discussions": false,
- "forks_count": 425,
+ "forks_count": 427,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -462,7 +462,7 @@
"exploit"
],
"visibility": "public",
- "forks": 425,
+ "forks": 427,
"watchers": 845,
"score": 0,
"subscribers_count": 10
@@ -601,10 +601,10 @@
"description": "CVE-2016-5195 (Dirty COW) PoC for Android 6.0.1 Marshmallow",
"fork": false,
"created_at": "2017-01-20T05:28:04Z",
- "updated_at": "2024-08-12T19:27:15Z",
+ "updated_at": "2024-09-20T03:20:06Z",
"pushed_at": "2017-01-27T10:04:07Z",
- "stargazers_count": 263,
- "watchers_count": 263,
+ "stargazers_count": 264,
+ "watchers_count": 264,
"has_discussions": false,
"forks_count": 96,
"allow_forking": true,
@@ -613,7 +613,7 @@
"topics": [],
"visibility": "public",
"forks": 96,
- "watchers": 263,
+ "watchers": 264,
"score": 0,
"subscribers_count": 23
},
diff --git a/2016/CVE-2016-7255.json b/2016/CVE-2016-7255.json
index 086036bdbd..dc1b0e6936 100644
--- a/2016/CVE-2016-7255.json
+++ b/2016/CVE-2016-7255.json
@@ -43,10 +43,10 @@
"description": "An exploit for CVE-2016-7255 on Windows 7\/8\/8.1\/10(pre-anniversary) 64 bit",
"fork": false,
"created_at": "2017-03-02T23:32:08Z",
- "updated_at": "2024-09-07T23:50:51Z",
+ "updated_at": "2024-09-18T15:26:25Z",
"pushed_at": "2017-03-09T23:00:08Z",
- "stargazers_count": 83,
- "watchers_count": 83,
+ "stargazers_count": 82,
+ "watchers_count": 82,
"has_discussions": false,
"forks_count": 62,
"allow_forking": true,
@@ -59,7 +59,7 @@
],
"visibility": "public",
"forks": 62,
- "watchers": 83,
+ "watchers": 82,
"score": 0,
"subscribers_count": 9
},
diff --git a/2017/CVE-2017-0144.json b/2017/CVE-2017-0144.json
index a31dc7dc91..b01a7c2e4d 100644
--- a/2017/CVE-2017-0144.json
+++ b/2017/CVE-2017-0144.json
@@ -13,7 +13,7 @@
"description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)",
"fork": false,
"created_at": "2017-07-16T19:44:04Z",
- "updated_at": "2024-08-12T19:31:19Z",
+ "updated_at": "2024-09-19T11:50:58Z",
"pushed_at": "2024-07-31T13:54:45Z",
"stargazers_count": 318,
"watchers_count": 318,
diff --git a/2017/CVE-2017-0199.json b/2017/CVE-2017-0199.json
index 8552fae81d..afec66e6ea 100644
--- a/2017/CVE-2017-0199.json
+++ b/2017/CVE-2017-0199.json
@@ -78,13 +78,13 @@
"stargazers_count": 721,
"watchers_count": 721,
"has_discussions": false,
- "forks_count": 258,
+ "forks_count": 259,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 258,
+ "forks": 259,
"watchers": 721,
"score": 0,
"subscribers_count": 47
diff --git a/2017/CVE-2017-0505.json b/2017/CVE-2017-0505.json
index a24b93f11c..0f57177045 100644
--- a/2017/CVE-2017-0505.json
+++ b/2017/CVE-2017-0505.json
@@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-02-04T22:43:21Z",
- "updated_at": "2024-09-15T04:09:28Z",
+ "updated_at": "2024-09-23T16:52:21Z",
"pushed_at": "2022-02-04T22:54:33Z",
- "stargazers_count": 5,
- "watchers_count": 5,
+ "stargazers_count": 6,
+ "watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 2,
- "watchers": 5,
+ "watchers": 6,
"score": 0,
"subscribers_count": 1
}
diff --git a/2017/CVE-2017-0785.json b/2017/CVE-2017-0785.json
index 533e69cd6a..b70a953dfb 100644
--- a/2017/CVE-2017-0785.json
+++ b/2017/CVE-2017-0785.json
@@ -18,7 +18,7 @@
"stargazers_count": 461,
"watchers_count": 461,
"has_discussions": false,
- "forks_count": 188,
+ "forks_count": 186,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -29,7 +29,7 @@
"poc"
],
"visibility": "public",
- "forks": 188,
+ "forks": 186,
"watchers": 461,
"score": 0,
"subscribers_count": 45
diff --git a/2017/CVE-2017-1000251.json b/2017/CVE-2017-1000251.json
index d549234c4b..f8196cf2ff 100644
--- a/2017/CVE-2017-1000251.json
+++ b/2017/CVE-2017-1000251.json
@@ -13,10 +13,10 @@
"description": "Blueborne CVE-2017-1000251 PoC for linux machines",
"fork": false,
"created_at": "2017-09-23T06:29:31Z",
- "updated_at": "2024-08-12T19:32:50Z",
+ "updated_at": "2024-09-18T09:52:32Z",
"pushed_at": "2023-03-10T03:04:17Z",
- "stargazers_count": 15,
- "watchers_count": 15,
+ "stargazers_count": 16,
+ "watchers_count": 16,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 14,
- "watchers": 15,
+ "watchers": 16,
"score": 0,
"subscribers_count": 2
},
diff --git a/2017/CVE-2017-10271.json b/2017/CVE-2017-10271.json
index 853718ffbc..8d86c7237e 100644
--- a/2017/CVE-2017-10271.json
+++ b/2017/CVE-2017-10271.json
@@ -288,13 +288,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
- "forks_count": 57,
+ "forks_count": 56,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 57,
+ "forks": 56,
"watchers": 0,
"score": 0,
"subscribers_count": 1
@@ -313,10 +313,10 @@
"description": "WebLogic Honeypot is a low interaction honeypot to detect CVE-2017-10271 in the Oracle WebLogic Server component of Oracle Fusion Middleware. This is a Remote Code Execution vulnerability.",
"fork": false,
"created_at": "2018-02-07T06:11:23Z",
- "updated_at": "2023-06-13T01:31:06Z",
+ "updated_at": "2024-09-21T11:34:13Z",
"pushed_at": "2020-04-25T20:55:29Z",
- "stargazers_count": 31,
- "watchers_count": 31,
+ "stargazers_count": 32,
+ "watchers_count": 32,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@@ -336,7 +336,7 @@
],
"visibility": "public",
"forks": 12,
- "watchers": 31,
+ "watchers": 32,
"score": 0,
"subscribers_count": 5
},
@@ -414,10 +414,10 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
- "updated_at": "2024-09-06T00:14:31Z",
+ "updated_at": "2024-09-18T02:18:13Z",
"pushed_at": "2020-10-01T20:20:41Z",
- "stargazers_count": 452,
- "watchers_count": 452,
+ "stargazers_count": 453,
+ "watchers_count": 453,
"has_discussions": false,
"forks_count": 115,
"allow_forking": true,
@@ -426,7 +426,7 @@
"topics": [],
"visibility": "public",
"forks": 115,
- "watchers": 452,
+ "watchers": 453,
"score": 0,
"subscribers_count": 9
},
diff --git a/2017/CVE-2017-11882.json b/2017/CVE-2017-11882.json
index d3f5cac4c2..7497a7a5a6 100644
--- a/2017/CVE-2017-11882.json
+++ b/2017/CVE-2017-11882.json
@@ -73,10 +73,10 @@
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
"fork": false,
"created_at": "2017-11-21T05:55:53Z",
- "updated_at": "2024-08-28T10:40:16Z",
+ "updated_at": "2024-09-20T02:06:21Z",
"pushed_at": "2017-11-29T03:33:53Z",
- "stargazers_count": 538,
- "watchers_count": 538,
+ "stargazers_count": 539,
+ "watchers_count": 539,
"has_discussions": false,
"forks_count": 253,
"allow_forking": true,
@@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 253,
- "watchers": 538,
+ "watchers": 539,
"score": 0,
"subscribers_count": 28
},
diff --git a/2017/CVE-2017-12615.json b/2017/CVE-2017-12615.json
index f1e3a88434..24162d1c86 100644
--- a/2017/CVE-2017-12615.json
+++ b/2017/CVE-2017-12615.json
@@ -343,10 +343,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false,
"created_at": "2022-11-13T11:01:41Z",
- "updated_at": "2024-09-12T12:16:55Z",
+ "updated_at": "2024-09-20T06:50:46Z",
"pushed_at": "2022-11-15T09:05:50Z",
- "stargazers_count": 187,
- "watchers_count": 187,
+ "stargazers_count": 190,
+ "watchers_count": 190,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@@ -355,7 +355,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
- "watchers": 187,
+ "watchers": 190,
"score": 0,
"subscribers_count": 4
},
@@ -403,12 +403,12 @@
"description": "最新tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
- "updated_at": "2024-09-17T09:49:46Z",
+ "updated_at": "2024-09-23T07:52:04Z",
"pushed_at": "2024-09-09T07:42:24Z",
- "stargazers_count": 51,
- "watchers_count": 51,
+ "stargazers_count": 66,
+ "watchers_count": 66,
"has_discussions": false,
- "forks_count": 1,
+ "forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -422,8 +422,8 @@
"tools"
],
"visibility": "public",
- "forks": 1,
- "watchers": 51,
+ "forks": 4,
+ "watchers": 66,
"score": 0,
"subscribers_count": 1
}
diff --git a/2017/CVE-2017-13089.json b/2017/CVE-2017-13089.json
index 82211dee64..7d1caf5f68 100644
--- a/2017/CVE-2017-13089.json
+++ b/2017/CVE-2017-13089.json
@@ -13,10 +13,10 @@
"description": "PoC for wget v1.19.1",
"fork": false,
"created_at": "2017-10-27T20:06:11Z",
- "updated_at": "2023-09-05T02:19:14Z",
+ "updated_at": "2024-09-21T14:08:17Z",
"pushed_at": "2018-02-02T11:30:04Z",
- "stargazers_count": 53,
- "watchers_count": 53,
+ "stargazers_count": 52,
+ "watchers_count": 52,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 15,
- "watchers": 53,
+ "watchers": 52,
"score": 0,
"subscribers_count": 4
},
diff --git a/2017/CVE-2017-15361.json b/2017/CVE-2017-15361.json
index 422cb56144..5624ea26ea 100644
--- a/2017/CVE-2017-15361.json
+++ b/2017/CVE-2017-15361.json
@@ -43,10 +43,10 @@
"description": "Go package that checks if RSA keys are vulnerable to ROCA \/ CVE-2017-15361",
"fork": false,
"created_at": "2017-10-17T17:08:22Z",
- "updated_at": "2023-12-23T18:59:55Z",
+ "updated_at": "2024-09-19T13:32:40Z",
"pushed_at": "2017-10-23T19:39:21Z",
- "stargazers_count": 14,
- "watchers_count": 14,
+ "stargazers_count": 15,
+ "watchers_count": 15,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
- "watchers": 14,
+ "watchers": 15,
"score": 0,
"subscribers_count": 4
},
diff --git a/2017/CVE-2017-16778.json b/2017/CVE-2017-16778.json
index e636316b19..38981762f4 100644
--- a/2017/CVE-2017-16778.json
+++ b/2017/CVE-2017-16778.json
@@ -13,10 +13,10 @@
"description": "A coordinated disclosure and security advisory on Fermax Intercom DTML Injection vulneraiblity. Special thanks to Fermax International for prompt responses and allowing details to be publicized.",
"fork": false,
"created_at": "2019-12-20T07:20:50Z",
- "updated_at": "2024-09-16T03:39:06Z",
+ "updated_at": "2024-09-19T20:20:47Z",
"pushed_at": "2020-07-30T19:15:08Z",
- "stargazers_count": 18,
- "watchers_count": 18,
+ "stargazers_count": 19,
+ "watchers_count": 19,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 18,
+ "watchers": 19,
"score": 0,
"subscribers_count": 1
}
diff --git a/2017/CVE-2017-16995.json b/2017/CVE-2017-16995.json
index 2638181669..91184fcf57 100644
--- a/2017/CVE-2017-16995.json
+++ b/2017/CVE-2017-16995.json
@@ -18,13 +18,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
- "forks_count": 16,
+ "forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 16,
+ "forks": 15,
"watchers": 0,
"score": 0,
"subscribers_count": 2
diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json
index 48220ae08e..20fd3eb2e7 100644
--- a/2017/CVE-2017-3248.json
+++ b/2017/CVE-2017-3248.json
@@ -43,7 +43,7 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2024-09-10T20:12:53Z",
+ "updated_at": "2024-09-24T00:38:41Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1982,
"watchers_count": 1982,
diff --git a/2017/CVE-2017-5638.json b/2017/CVE-2017-5638.json
index 8352adeda3..85933ff2f7 100644
--- a/2017/CVE-2017-5638.json
+++ b/2017/CVE-2017-5638.json
@@ -415,10 +415,10 @@
"description": "An exploit for Apache Struts CVE-2017-5638",
"fork": false,
"created_at": "2017-03-12T02:02:25Z",
- "updated_at": "2024-08-12T19:28:20Z",
+ "updated_at": "2024-09-20T03:58:21Z",
"pushed_at": "2018-05-21T18:33:26Z",
- "stargazers_count": 423,
- "watchers_count": 423,
+ "stargazers_count": 424,
+ "watchers_count": 424,
"has_discussions": false,
"forks_count": 136,
"allow_forking": true,
@@ -433,7 +433,7 @@
],
"visibility": "public",
"forks": 136,
- "watchers": 423,
+ "watchers": 424,
"score": 0,
"subscribers_count": 22
},
diff --git a/2017/CVE-2017-5689.json b/2017/CVE-2017-5689.json
index 0e23ade989..509813a16f 100644
--- a/2017/CVE-2017-5689.json
+++ b/2017/CVE-2017-5689.json
@@ -43,10 +43,10 @@
"description": "Honeypot for Intel's AMT Firmware Vulnerability CVE-2017-5689",
"fork": false,
"created_at": "2017-05-06T15:35:42Z",
- "updated_at": "2024-02-15T22:50:55Z",
+ "updated_at": "2024-09-21T11:32:28Z",
"pushed_at": "2024-02-15T22:50:51Z",
- "stargazers_count": 16,
- "watchers_count": 16,
+ "stargazers_count": 17,
+ "watchers_count": 17,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
- "watchers": 16,
+ "watchers": 17,
"score": 0,
"subscribers_count": 2
},
diff --git a/2017/CVE-2017-5753.json b/2017/CVE-2017-5753.json
index 58c39ebf3f..fd898ea06b 100644
--- a/2017/CVE-2017-5753.json
+++ b/2017/CVE-2017-5753.json
@@ -18,7 +18,7 @@
"stargazers_count": 755,
"watchers_count": 755,
"has_discussions": false,
- "forks_count": 170,
+ "forks_count": 171,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -30,7 +30,7 @@
"spectre"
],
"visibility": "public",
- "forks": 170,
+ "forks": 171,
"watchers": 755,
"score": 0,
"subscribers_count": 41
diff --git a/2017/CVE-2017-7269.json b/2017/CVE-2017-7269.json
index 1be667122b..1d048ce841 100644
--- a/2017/CVE-2017-7269.json
+++ b/2017/CVE-2017-7269.json
@@ -13,10 +13,10 @@
"description": "An exploit for Microsoft IIS 6.0 CVE-2017-7269",
"fork": false,
"created_at": "2017-03-29T05:59:30Z",
- "updated_at": "2024-08-12T19:28:45Z",
+ "updated_at": "2024-09-22T15:37:09Z",
"pushed_at": "2017-03-29T07:26:41Z",
- "stargazers_count": 18,
- "watchers_count": 18,
+ "stargazers_count": 19,
+ "watchers_count": 19,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 21,
- "watchers": 18,
+ "watchers": 19,
"score": 0,
"subscribers_count": 3
},
@@ -198,19 +198,19 @@
"description": "iis6 exploit 2017 CVE-2017-7269",
"fork": false,
"created_at": "2017-04-05T23:21:12Z",
- "updated_at": "2024-08-20T11:51:12Z",
+ "updated_at": "2024-09-19T20:07:53Z",
"pushed_at": "2023-02-04T09:09:35Z",
- "stargazers_count": 85,
- "watchers_count": 85,
+ "stargazers_count": 86,
+ "watchers_count": 86,
"has_discussions": false,
- "forks_count": 54,
+ "forks_count": 55,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 54,
- "watchers": 85,
+ "forks": 55,
+ "watchers": 86,
"score": 0,
"subscribers_count": 3
},
diff --git a/2017/CVE-2017-7921.json b/2017/CVE-2017-7921.json
index 1024b18147..7e10b95a03 100644
--- a/2017/CVE-2017-7921.json
+++ b/2017/CVE-2017-7921.json
@@ -103,10 +103,10 @@
"description": "This python file will decrypt the configurationFile used by hikvision cameras vulnerable to CVE-2017-7921.",
"fork": false,
"created_at": "2021-01-29T16:08:35Z",
- "updated_at": "2024-09-03T00:53:09Z",
+ "updated_at": "2024-09-23T08:33:32Z",
"pushed_at": "2021-01-29T16:22:39Z",
- "stargazers_count": 94,
- "watchers_count": 94,
+ "stargazers_count": 95,
+ "watchers_count": 95,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
- "watchers": 94,
+ "watchers": 95,
"score": 0,
"subscribers_count": 3
},
diff --git a/2017/CVE-2017-8759.json b/2017/CVE-2017-8759.json
index 4e0c7c8378..54453cd102 100644
--- a/2017/CVE-2017-8759.json
+++ b/2017/CVE-2017-8759.json
@@ -203,13 +203,13 @@
"stargazers_count": 317,
"watchers_count": 317,
"has_discussions": false,
- "forks_count": 127,
+ "forks_count": 109,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 127,
+ "forks": 109,
"watchers": 317,
"score": 0,
"subscribers_count": 24
diff --git a/2017/CVE-2017-8917.json b/2017/CVE-2017-8917.json
index d53131f3cf..3611aa929f 100644
--- a/2017/CVE-2017-8917.json
+++ b/2017/CVE-2017-8917.json
@@ -228,13 +228,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
diff --git a/2018/CVE-2018-0101.json b/2018/CVE-2018-0101.json
index 15cdfc0c60..d52722528c 100644
--- a/2018/CVE-2018-0101.json
+++ b/2018/CVE-2018-0101.json
@@ -43,10 +43,10 @@
"description": "A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.",
"fork": false,
"created_at": "2018-02-08T15:52:50Z",
- "updated_at": "2024-08-12T19:36:07Z",
+ "updated_at": "2024-09-21T11:38:09Z",
"pushed_at": "2018-11-23T11:47:10Z",
- "stargazers_count": 49,
- "watchers_count": 49,
+ "stargazers_count": 50,
+ "watchers_count": 50,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@@ -64,7 +64,7 @@
],
"visibility": "public",
"forks": 22,
- "watchers": 49,
+ "watchers": 50,
"score": 0,
"subscribers_count": 9
}
diff --git a/2018/CVE-2018-0886.json b/2018/CVE-2018-0886.json
index a98ea7d1f5..da1afbd4d0 100644
--- a/2018/CVE-2018-0886.json
+++ b/2018/CVE-2018-0886.json
@@ -13,7 +13,7 @@
"description": "A code demonstrating CVE-2018-0886",
"fork": false,
"created_at": "2018-04-02T12:52:07Z",
- "updated_at": "2024-08-12T19:37:25Z",
+ "updated_at": "2024-09-19T11:51:28Z",
"pushed_at": "2020-08-14T16:33:44Z",
"stargazers_count": 261,
"watchers_count": 261,
diff --git a/2018/CVE-2018-13341.json b/2018/CVE-2018-13341.json
index 280d1d5c3d..138717870f 100644
--- a/2018/CVE-2018-13341.json
+++ b/2018/CVE-2018-13341.json
@@ -13,10 +13,10 @@
"description": "Tool to exploit CVE-2018-13341 and recover hidden account password on Crestron devices",
"fork": false,
"created_at": "2019-12-13T01:27:36Z",
- "updated_at": "2024-06-14T00:37:55Z",
+ "updated_at": "2024-09-19T20:39:06Z",
"pushed_at": "2019-12-13T01:36:08Z",
- "stargazers_count": 22,
- "watchers_count": 22,
+ "stargazers_count": 23,
+ "watchers_count": 23,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
- "watchers": 22,
+ "watchers": 23,
"score": 0,
"subscribers_count": 5
},
diff --git a/2018/CVE-2018-14040.json b/2018/CVE-2018-14040.json
index 36bb8eb875..4d67c8ff90 100644
--- a/2018/CVE-2018-14040.json
+++ b/2018/CVE-2018-14040.json
@@ -13,10 +13,10 @@
"description": "Vulnearability Report of the New Jersey official site",
"fork": false,
"created_at": "2022-05-23T08:11:01Z",
- "updated_at": "2022-05-23T12:11:55Z",
+ "updated_at": "2024-09-19T08:18:48Z",
"pushed_at": "2022-05-23T08:25:02Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 0,
+ "watchers": 1,
"score": 0,
"subscribers_count": 1
}
diff --git a/2018/CVE-2018-14847.json b/2018/CVE-2018-14847.json
index c6f46dc46c..ea8a72241c 100644
--- a/2018/CVE-2018-14847.json
+++ b/2018/CVE-2018-14847.json
@@ -13,7 +13,7 @@
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)",
"fork": false,
"created_at": "2018-06-24T05:34:05Z",
- "updated_at": "2024-09-06T05:11:55Z",
+ "updated_at": "2024-09-19T11:51:39Z",
"pushed_at": "2020-10-16T12:09:45Z",
"stargazers_count": 506,
"watchers_count": 506,
@@ -258,10 +258,10 @@
"description": "This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead.",
"fork": false,
"created_at": "2021-04-21T16:42:31Z",
- "updated_at": "2024-09-17T17:25:31Z",
+ "updated_at": "2024-09-22T07:22:23Z",
"pushed_at": "2021-04-21T16:46:37Z",
- "stargazers_count": 43,
- "watchers_count": 43,
+ "stargazers_count": 45,
+ "watchers_count": 45,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@@ -270,7 +270,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
- "watchers": 43,
+ "watchers": 45,
"score": 0,
"subscribers_count": 3
},
diff --git a/2018/CVE-2018-15473.json b/2018/CVE-2018-15473.json
index 635223b832..f303852363 100644
--- a/2018/CVE-2018-15473.json
+++ b/2018/CVE-2018-15473.json
@@ -89,10 +89,10 @@
"description": "Exploit written in Python for CVE-2018-15473 with threading and export formats",
"fork": false,
"created_at": "2018-08-21T00:09:56Z",
- "updated_at": "2024-08-24T10:47:06Z",
+ "updated_at": "2024-09-23T02:27:33Z",
"pushed_at": "2024-07-12T08:47:49Z",
- "stargazers_count": 518,
- "watchers_count": 518,
+ "stargazers_count": 519,
+ "watchers_count": 519,
"has_discussions": false,
"forks_count": 182,
"allow_forking": true,
@@ -101,7 +101,7 @@
"topics": [],
"visibility": "public",
"forks": 182,
- "watchers": 518,
+ "watchers": 519,
"score": 0,
"subscribers_count": 21
},
diff --git a/2018/CVE-2018-16763.json b/2018/CVE-2018-16763.json
index 910c4619a0..a6998c714c 100644
--- a/2018/CVE-2018-16763.json
+++ b/2018/CVE-2018-16763.json
@@ -316,14 +316,14 @@
{
"id": 453222352,
"name": "CVE-2018-16763",
- "full_name": "NaturalT314\/CVE-2018-16763",
+ "full_name": "Luigi31415\/CVE-2018-16763",
"owner": {
- "login": "NaturalT314",
+ "login": "Luigi31415",
"id": 74961214,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74961214?v=4",
- "html_url": "https:\/\/github.com\/NaturalT314"
+ "html_url": "https:\/\/github.com\/Luigi31415"
},
- "html_url": "https:\/\/github.com\/NaturalT314\/CVE-2018-16763",
+ "html_url": "https:\/\/github.com\/Luigi31415\/CVE-2018-16763",
"description": null,
"fork": false,
"created_at": "2022-01-28T21:30:27Z",
diff --git a/2018/CVE-2018-17240.json b/2018/CVE-2018-17240.json
index 03592c8543..c5bcd5a8bb 100644
--- a/2018/CVE-2018-17240.json
+++ b/2018/CVE-2018-17240.json
@@ -43,8 +43,8 @@
"description": "A tool for retrieving login credentials from Netwave IP cameras using a memory dump vulnerability (CVE-2018-17240)",
"fork": false,
"created_at": "2024-01-04T21:44:21Z",
- "updated_at": "2024-09-16T21:51:36Z",
- "pushed_at": "2024-09-16T21:51:33Z",
+ "updated_at": "2024-09-19T00:29:58Z",
+ "pushed_at": "2024-09-19T00:29:57Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
diff --git a/2018/CVE-2018-19320.json b/2018/CVE-2018-19320.json
index 554249d077..1d18817c4c 100644
--- a/2018/CVE-2018-19320.json
+++ b/2018/CVE-2018-19320.json
@@ -73,19 +73,19 @@
"description": "Unsigned driver loader using CVE-2018-19320",
"fork": false,
"created_at": "2022-11-12T05:48:13Z",
- "updated_at": "2024-08-27T06:16:23Z",
+ "updated_at": "2024-09-24T02:21:12Z",
"pushed_at": "2023-04-09T13:50:29Z",
- "stargazers_count": 185,
- "watchers_count": 185,
+ "stargazers_count": 187,
+ "watchers_count": 187,
"has_discussions": false,
- "forks_count": 46,
+ "forks_count": 48,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 46,
- "watchers": 185,
+ "forks": 48,
+ "watchers": 187,
"score": 0,
"subscribers_count": 7
}
diff --git a/2018/CVE-2018-19422.json b/2018/CVE-2018-19422.json
index db55d045e4..7ead76a250 100644
--- a/2018/CVE-2018-19422.json
+++ b/2018/CVE-2018-19422.json
@@ -43,10 +43,10 @@
"description": "This is an edited version of the CVE-2018-19422 exploit to fix an small but annoying issue I had.",
"fork": false,
"created_at": "2022-04-29T17:23:23Z",
- "updated_at": "2023-12-10T10:52:24Z",
+ "updated_at": "2024-09-20T23:15:33Z",
"pushed_at": "2022-04-29T17:27:22Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 1,
+ "watchers": 2,
"score": 0,
"subscribers_count": 1
}
diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json
index b0779e97bd..d890c52aed 100644
--- a/2018/CVE-2018-2628.json
+++ b/2018/CVE-2018-2628.json
@@ -557,7 +557,7 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2024-09-10T20:12:53Z",
+ "updated_at": "2024-09-24T00:38:41Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1982,
"watchers_count": 1982,
diff --git a/2018/CVE-2018-2636.json b/2018/CVE-2018-2636.json
index 2f3851e6d6..146f1ab532 100644
--- a/2018/CVE-2018-2636.json
+++ b/2018/CVE-2018-2636.json
@@ -43,10 +43,10 @@
"description": "MICROS Honeypot is a low interaction honeypot to detect CVE-2018-2636 in the Oracle Hospitality Simphony component of Oracle Hospitality Applications (MICROS). This is a directory traversal vulnerability.",
"fork": false,
"created_at": "2018-02-07T05:54:46Z",
- "updated_at": "2024-04-09T06:16:28Z",
+ "updated_at": "2024-09-21T11:33:42Z",
"pushed_at": "2018-09-25T22:00:12Z",
- "stargazers_count": 14,
- "watchers_count": 14,
+ "stargazers_count": 15,
+ "watchers_count": 15,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@@ -64,7 +64,7 @@
],
"visibility": "public",
"forks": 4,
- "watchers": 14,
+ "watchers": 15,
"score": 0,
"subscribers_count": 7
}
diff --git a/2018/CVE-2018-2894.json b/2018/CVE-2018-2894.json
index 46c642213a..8430d5d02c 100644
--- a/2018/CVE-2018-2894.json
+++ b/2018/CVE-2018-2894.json
@@ -43,10 +43,10 @@
"description": "CVE-2018-2894 WebLogic Unrestricted File Upload Lead To RCE Check Script",
"fork": false,
"created_at": "2018-07-20T03:59:18Z",
- "updated_at": "2024-09-10T16:41:12Z",
+ "updated_at": "2024-09-18T22:47:02Z",
"pushed_at": "2018-07-20T12:46:50Z",
- "stargazers_count": 136,
- "watchers_count": 136,
+ "stargazers_count": 135,
+ "watchers_count": 135,
"has_discussions": false,
"forks_count": 49,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 49,
- "watchers": 136,
+ "watchers": 135,
"score": 0,
"subscribers_count": 4
},
diff --git a/2018/CVE-2018-3760.json b/2018/CVE-2018-3760.json
index 9e673187b6..3fcfcc0a20 100644
--- a/2018/CVE-2018-3760.json
+++ b/2018/CVE-2018-3760.json
@@ -43,10 +43,10 @@
"description": null,
"fork": false,
"created_at": "2020-06-24T12:15:07Z",
- "updated_at": "2024-08-12T20:03:02Z",
+ "updated_at": "2024-09-17T21:08:41Z",
"pushed_at": "2020-08-10T11:19:45Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 1,
+ "watchers": 2,
"score": 0,
"subscribers_count": 1
}
diff --git a/2018/CVE-2018-4233.json b/2018/CVE-2018-4233.json
index 0639996e90..81302ee04b 100644
--- a/2018/CVE-2018-4233.json
+++ b/2018/CVE-2018-4233.json
@@ -13,7 +13,7 @@
"description": "Exploit for CVE-2018-4233, a WebKit JIT optimization bug used during Pwn2Own 2018",
"fork": false,
"created_at": "2018-08-08T14:41:20Z",
- "updated_at": "2024-09-14T04:00:28Z",
+ "updated_at": "2024-09-22T14:05:44Z",
"pushed_at": "2024-02-07T23:51:49Z",
"stargazers_count": 178,
"watchers_count": 178,
diff --git a/2018/CVE-2018-4280.json b/2018/CVE-2018-4280.json
index 044a742936..3979b0bfa8 100644
--- a/2018/CVE-2018-4280.json
+++ b/2018/CVE-2018-4280.json
@@ -43,10 +43,10 @@
"description": "CVE-2018-4280: Mach port replacement vulnerability in launchd on iOS 11.2.6 leading to sandbox escape, privilege escalation, and codesigning bypass.",
"fork": false,
"created_at": "2018-02-23T00:19:05Z",
- "updated_at": "2024-08-12T19:36:26Z",
+ "updated_at": "2024-09-21T09:54:12Z",
"pushed_at": "2018-11-13T00:26:18Z",
- "stargazers_count": 244,
- "watchers_count": 244,
+ "stargazers_count": 246,
+ "watchers_count": 246,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
- "watchers": 244,
+ "watchers": 246,
"score": 0,
"subscribers_count": 15
}
diff --git a/2018/CVE-2018-6389.json b/2018/CVE-2018-6389.json
index 07df7c86ad..031242f8c6 100644
--- a/2018/CVE-2018-6389.json
+++ b/2018/CVE-2018-6389.json
@@ -381,10 +381,10 @@
"description": "Improved DOS exploit for wordpress websites (CVE-2018-6389)",
"fork": false,
"created_at": "2018-03-04T14:25:09Z",
- "updated_at": "2024-08-10T18:33:10Z",
+ "updated_at": "2024-09-19T11:51:24Z",
"pushed_at": "2020-10-01T11:51:46Z",
- "stargazers_count": 112,
- "watchers_count": 112,
+ "stargazers_count": 111,
+ "watchers_count": 111,
"has_discussions": false,
"forks_count": 61,
"allow_forking": true,
@@ -393,7 +393,7 @@
"topics": [],
"visibility": "public",
"forks": 61,
- "watchers": 112,
+ "watchers": 111,
"score": 0,
"subscribers_count": 13
},
diff --git a/2018/CVE-2018-6622.json b/2018/CVE-2018-6622.json
index 55a53190d0..0e45bc7a44 100644
--- a/2018/CVE-2018-6622.json
+++ b/2018/CVE-2018-6622.json
@@ -13,10 +13,10 @@
"description": "TPM vulnerability checking tool for CVE-2018-6622. This tool will be published at Black Hat Asia 2019 and Black Hat Europe 2019",
"fork": false,
"created_at": "2019-02-07T06:45:27Z",
- "updated_at": "2024-09-09T19:31:03Z",
+ "updated_at": "2024-09-18T18:22:18Z",
"pushed_at": "2022-06-26T06:08:02Z",
- "stargazers_count": 97,
- "watchers_count": 97,
+ "stargazers_count": 98,
+ "watchers_count": 98,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 20,
- "watchers": 97,
+ "watchers": 98,
"score": 0,
"subscribers_count": 12
}
diff --git a/2018/CVE-2018-7600.json b/2018/CVE-2018-7600.json
index 9e13f61cda..6bed1793a7 100644
--- a/2018/CVE-2018-7600.json
+++ b/2018/CVE-2018-7600.json
@@ -363,10 +363,10 @@
"description": "Exploit for Drupal 7 <= 7.57 CVE-2018-7600",
"fork": false,
"created_at": "2018-04-17T15:38:15Z",
- "updated_at": "2024-09-10T06:28:35Z",
+ "updated_at": "2024-09-18T17:49:01Z",
"pushed_at": "2018-04-26T15:40:28Z",
- "stargazers_count": 124,
- "watchers_count": 124,
+ "stargazers_count": 125,
+ "watchers_count": 125,
"has_discussions": false,
"forks_count": 64,
"allow_forking": true,
@@ -375,7 +375,7 @@
"topics": [],
"visibility": "public",
"forks": 64,
- "watchers": 124,
+ "watchers": 125,
"score": 0,
"subscribers_count": 5
},
diff --git a/2018/CVE-2018-8581.json b/2018/CVE-2018-8581.json
index 4ae08c7e6d..265cf17e49 100644
--- a/2018/CVE-2018-8581.json
+++ b/2018/CVE-2018-8581.json
@@ -13,7 +13,7 @@
"description": "CVE-2018-8581 | Microsoft Exchange Server Elevation of Privilege Vulnerability",
"fork": false,
"created_at": "2018-12-27T06:30:32Z",
- "updated_at": "2024-08-12T19:44:22Z",
+ "updated_at": "2024-09-19T11:51:58Z",
"pushed_at": "2018-12-30T11:53:08Z",
"stargazers_count": 331,
"watchers_count": 331,
diff --git a/2018/CVE-2018-9995.json b/2018/CVE-2018-9995.json
index 827ebb0b33..35f3f28754 100644
--- a/2018/CVE-2018-9995.json
+++ b/2018/CVE-2018-9995.json
@@ -168,13 +168,13 @@
"stargazers_count": 106,
"watchers_count": 106,
"has_discussions": false,
- "forks_count": 42,
+ "forks_count": 37,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 42,
+ "forks": 37,
"watchers": 106,
"score": 0,
"subscribers_count": 15
diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json
index 37a5f1c1a7..ed5651cc6d 100644
--- a/2019/CVE-2019-0708.json
+++ b/2019/CVE-2019-0708.json
@@ -1326,13 +1326,13 @@
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
- "forks_count": 369,
+ "forks_count": 370,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 369,
+ "forks": 370,
"watchers": 3,
"score": 0,
"subscribers_count": 0
@@ -1566,19 +1566,19 @@
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
"fork": false,
"created_at": "2019-05-23T22:50:12Z",
- "updated_at": "2024-09-13T23:00:45Z",
+ "updated_at": "2024-09-22T01:35:04Z",
"pushed_at": "2019-06-22T21:48:45Z",
- "stargazers_count": 891,
- "watchers_count": 891,
+ "stargazers_count": 892,
+ "watchers_count": 892,
"has_discussions": false,
- "forks_count": 241,
+ "forks_count": 242,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 241,
- "watchers": 891,
+ "forks": 242,
+ "watchers": 892,
"score": 0,
"subscribers_count": 55
},
@@ -2902,13 +2902,13 @@
"stargazers_count": 235,
"watchers_count": 235,
"has_discussions": false,
- "forks_count": 76,
+ "forks_count": 74,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 76,
+ "forks": 74,
"watchers": 235,
"score": 0,
"subscribers_count": 22
diff --git a/2019/CVE-2019-10149.json b/2019/CVE-2019-10149.json
index 6bb304acc7..8c3da15e1c 100644
--- a/2019/CVE-2019-10149.json
+++ b/2019/CVE-2019-10149.json
@@ -320,8 +320,8 @@
"description": "Data Collection Related to Exim CVE-2019-10149",
"fork": false,
"created_at": "2020-06-03T02:27:01Z",
- "updated_at": "2022-12-03T16:56:02Z",
- "pushed_at": "2020-10-20T13:48:42Z",
+ "updated_at": "2024-09-20T01:54:32Z",
+ "pushed_at": "2024-09-21T15:47:07Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json
index 183294b591..b04667696e 100644
--- a/2019/CVE-2019-11043.json
+++ b/2019/CVE-2019-11043.json
@@ -13,10 +13,10 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
- "updated_at": "2024-08-12T19:53:16Z",
+ "updated_at": "2024-09-19T11:52:22Z",
"pushed_at": "2019-11-12T18:53:14Z",
- "stargazers_count": 1788,
- "watchers_count": 1788,
+ "stargazers_count": 1787,
+ "watchers_count": 1787,
"has_discussions": false,
"forks_count": 247,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 247,
- "watchers": 1788,
+ "watchers": 1787,
"score": 0,
"subscribers_count": 37
},
diff --git a/2019/CVE-2019-11358.json b/2019/CVE-2019-11358.json
index 9c935ae6b8..6618560d6a 100644
--- a/2019/CVE-2019-11358.json
+++ b/2019/CVE-2019-11358.json
@@ -123,10 +123,10 @@
"description": "NOTICE This repository contains the public FTC SDK for the SKYSTONE (2019-2020) competition season. If you are looking for the current season's FTC SDK software, please visit the new and permanent home of the public FTC SDK: FtcRobotController repository Welcome! This GitHub repository contains the source code that is used to build an Android app to control a FIRST Tech Challenge competition robot. To use this SDK, download\/clone the entire project to your local computer. Getting Started If you are new to robotics or new to the FIRST Tech Challenge, then you should consider reviewing the FTC Blocks Tutorial to get familiar with how to use the control system: FTC Blocks Online Tutorial Even if you are an advanced Java programmer, it is helpful to start with the FTC Blocks tutorial, and then migrate to the OnBot Java Tool or to Android Studio afterwards. Downloading the Project If you are an Android Studio programmer, there are several ways to download this repo. Note that if you use the Blocks or OnBot Java Tool to program your robot, then you do not need to download this repository. If you are a git user, you can clone the most current version of the repository: git clone https:\/\/github.com\/FIRST-Tech-Challenge\/SKYSTONE.git Or, if you prefer, you can use the \"Download Zip\" button available through the main repository page. Downloading the project as a .ZIP file will keep the size of the download manageable. You can also download the project folder (as a .zip or .tar.gz archive file) from the Downloads subsection of the Releases page for this repository. Once you have downloaded and uncompressed (if needed) your folder, you can use Android Studio to import the folder (\"Import project (Eclipse ADT, Gradle, etc.)\"). Getting Help User Documentation and Tutorials FIRST maintains online documentation with information and tutorials on how to use the FIRST Tech Challenge software and robot control system. You can access this documentation using the following link: SKYSTONE Online Documentation Note that the online documentation is an \"evergreen\" document that is constantly being updated and edited. It contains the most current information about the FIRST Tech Challenge software and control system. Javadoc Reference Material The Javadoc reference documentation for the FTC SDK is now available online. Click on the following link to view the FTC SDK Javadoc documentation as a live website: FTC Javadoc Documentation Documentation for the FTC SDK is also included with this repository. There is a subfolder called \"doc\" which contains several subfolders: The folder \"apk\" contains the .apk files for the FTC Driver Station and FTC Robot Controller apps. The folder \"javadoc\" contains the JavaDoc user documentation for the FTC SDK. Online User Forum For technical questions regarding the Control System or the FTC SDK, please visit the FTC Technology forum: FTC Technology Forum Release Information Version 5.5 (20200824-090813) Version 5.5 requires Android Studio 4.0 or later. New features Adds support for calling custom Java classes from Blocks OpModes (fixes SkyStone issue #161). Classes must be in the org.firstinspires.ftc.teamcode package. Methods must be public static and have no more than 21 parameters. Parameters declared as OpMode, LinearOpMode, Telemetry, and HardwareMap are supported and the argument is provided automatically, regardless of the order of the parameters. On the block, the sockets for those parameters are automatically filled in. Parameters declared as char or java.lang.Character will accept any block that returns text and will only use the first character in the text. Parameters declared as boolean or java.lang.Boolean will accept any block that returns boolean. Parameters declared as byte, java.lang.Byte, short, java.lang.Short, int, java.lang.Integer, long, or java.lang.Long, will accept any block that returns a number and will round that value to the nearest whole number. Parameters declared as float, java.lang.Float, double, java.lang.Double will accept any block that returns a number. Adds telemetry API method for setting display format Classic Monospace HTML (certain tags only) Adds blocks support for switching cameras. Adds Blocks support for TensorFlow Object Detection with a custom model. Adds support for uploading a custom TensorFlow Object Detection model in the Manage page, which is especially useful for Blocks and OnBotJava users. Shows new Control Hub blink codes when the WiFi band is switched using the Control Hub's button (only possible on Control Hub OS 1.1.2) Adds new warnings which can be disabled in the Advanced RC Settings Mismatched app versions warning Unnecessary 2.4 GHz WiFi usage warning REV Hub is running outdated firmware (older than version 1.8.2) Adds support for Sony PS4 gamepad, and reworks how gamepads work on the Driver Station Removes preference which sets gamepad type based on driver position. Replaced with menu which allows specifying type for gamepads with unknown VID and PID Attempts to auto-detect gamepad type based on USB VID and PID If gamepad VID and PID is not known, use type specified by user for that VID and PID If gamepad VID and PID is not known AND the user has not specified a type for that VID and PID, an educated guess is made about how to map the gamepad Driver Station will now attempt to automatically recover from a gamepad disconnecting, and re-assign it to the position it was assigned to when it dropped If only one gamepad is assigned and it drops: it can be recovered If two gamepads are assigned, and have different VID\/PID signatures, and only one drops: it will be recovered If two gamepads are assigned, and have different VID\/PID signatures, and BOTH drop: both will be recovered If two gamepads are assigned, and have the same VID\/PID signatures, and only one drops: it will be recovered If two gamepads are assigned, and have the same VID\/PID signatures, and BOTH drop: neither will be recovered, because of the ambiguity of the gamepads when they re-appear on the USB bus. There is currently one known edge case: if there are two gamepads with the same VID\/PID signature plugged in, but only one is assigned, and they BOTH drop, it's a 50-50 chance of which one will be chosen for automatic recovery to the assigned position: it is determined by whichever one is re-enumerated first by the USB bus controller. Adds landscape user interface to Driver Station New feature: practice timer with audio cues New feature (Control Hub only): wireless network connection strength indicator (0-5 bars) New feature (Control Hub only): tapping on the ping\/channel display will switch to an alternate display showing radio RX dBm and link speed (tap again to switch back) The layout will NOT autorotate. You can switch the layout from the Driver Station's settings menu. Breaking changes Removes support for Android versions 4.4 through 5.1 (KitKat and Lollipop). The minSdkVersion is now 23. Removes the deprecated LinearOpMode methods waitOneFullHardwareCycle() and waitForNextHardwareCycle() Enhancements Handles RS485 address of Control Hub automatically The Control Hub is automatically given a reserved address Existing configuration files will continue to work All addresses in the range of 1-10 are still available for Expansion Hubs The Control Hub light will now normally be solid green, without blinking to indicate the address The Control Hub will not be shown on the Expansion Hub Address Change settings page Improves REV Hub firmware updater The user can now choose between all available firmware update files Version 1.8.2 of the REV Hub firmware is bundled into the Robot Controller app. Text was added to clarify that Expansion Hubs can only be updated via USB. Firmware update speed was reduced to improve reliability Allows REV Hub firmware to be updated directly from the Manage webpage Improves log viewer on Robot Controller Horizontal scrolling support (no longer word wrapped) Supports pinch-to-zoom Uses a monospaced font Error messages are highlighted New color scheme Attempts to force-stop a runaway\/stuck OpMode without restarting the entire app Not all types of runaway conditions are stoppable, but if the user code attempts to talk to hardware during the runaway, the system should be able to capture it. Makes various tweaks to the Self Inspect screen Renames \"OS version\" entry to \"Android version\" Renames \"WiFi Direct Name\" to \"WiFi Name\" Adds Control Hub OS version, when viewing the report of a Control Hub Hides the airplane mode entry, when viewing the report of a Control Hub Removes check for ZTE Speed Channel Changer Shows firmware version for all Expansion and Control Hubs Reworks network settings portion of Manage page All network settings are now applied with a single click The WiFi Direct channel of phone-based Robot Controllers can now be changed from the Manage page WiFi channels are filtered by band (2.4 vs 5 GHz) and whether they overlap with other channels The current WiFi channel is pre-selected on phone-based Robot Controllers, and Control Hubs running OS 1.1.2 or later. On Control Hubs running OS 1.1.2 or later, you can choose to have the system automatically select a channel on the 5 GHz band Improves OnBotJava New light and dark themes replace the old themes (chaos, github, chrome,...) the new default theme is light and will be used when you first update to this version OnBotJava now has a tabbed editor Read-only offline mode Improves function of \"exit\" menu item on Robot Controller and Driver Station Now guaranteed to be fully stopped and unloaded from memory Shows a warning message if a LinearOpMode exists prematurely due to failure to monitor for the start condition Improves error message shown when the Driver Station and Robot Controller are incompatible with each other Driver Station OpMode Control Panel now disabled while a Restart Robot is in progress Disables advanced settings related to WiFi direct when the Robot Controller is a Control Hub. Tint phone battery icons on Driver Station when low\/critical. Uses names \"Control Hub Portal\" and \"Control Hub\" (when appropriate) in new configuration files Improve I2C read performance Very large improvement on Control Hub; up to ~2x faster with small (e.g. 6 byte) reads Not as apparent on Expansion Hubs connected to a phone Update\/refresh build infrastructure Update to 'androidx' support library from 'com.android.support:appcompat', which is end-of-life Update targetSdkVersion and compileSdkVersion to 28 Update Android Studio's Android plugin to latest Fix reported build timestamp in 'About' screen Add sample illustrating manual webcam use: ConceptWebcam Bug fixes Fixes SkyStone issue #248 Fixes SkyStone issue #232 and modifies bulk caching semantics to allow for cache-preserving MANUAL\/AUTO transitions. Improves performance when REV 2M distance sensor is unplugged Improves readability of Toast messages on certain devices Allows a Driver Station to connect to a Robot Controller after another has disconnected Improves generation of fake serial numbers for UVC cameras which do not provide a real serial number Previously some devices would assign such cameras a serial of 0:0 and fail to open and start streaming Fixes ftc_app issue #638. Fixes a slew of bugs with the Vuforia camera monitor including: Fixes bug where preview could be displayed with a wonky aspect ratio Fixes bug where preview could be cut off in landscape Fixes bug where preview got totally messed up when rotating phone Fixes bug where crosshair could drift off target when using webcams Fixes issue in UVC driver on some devices (ftc_app 681) if streaming was started\/stopped multiple times in a row Issue manifested as kernel panic on devices which do not have this kernel patch. On affected devices which do have the patch, the issue was manifest as simply a failure to start streaming. The Tech Team believes that the root cause of the issue is a bug in the Linux kernel XHCI driver. A workaround was implemented in the SDK UVC driver. Fixes bug in UVC driver where often half the frames from the camera would be dropped (e.g. only 15FPS delivered during a streaming session configured for 30FPS). Fixes issue where TensorFlow Object Detection would show results whose confidence was lower than the minimum confidence parameter. Fixes a potential exploitation issue of CVE-2019-11358 in OnBotJava Fixes changing the address of an Expansion Hub with additional Expansion Hubs connected to it Preserves the Control Hub's network connection when \"Restart Robot\" is selected Fixes issue where device scans would fail while the Robot was restarting Fix RenderScript usage Use androidx.renderscript variant: increased compatibility Use RenderScript in Java mode, not native: simplifies build Fixes webcam-frame-to-bitmap conversion problem: alpha channel wasn't being initialized, only R, G, & B Fixes possible arithmetic overflow in Deadline Fixes deadlock in Vuforia webcam support which could cause 5-second delays when stopping OpMode Version 5.4 (20200108-101156) Fixes SkyStone issue #88 Adds an inspection item that notes when a robot controller (Control Hub) is using the factory default password. Fixes SkyStone issue #61 Fixes SkyStone issue #142 Fixes ftc_app issue #417 by adding more current and voltage monitoring capabilities for REV Hubs. Fixes a crash sometimes caused by OnBotJava activity Improves OnBotJava autosave functionality ftc_app #738 Fixes system responsiveness issue when an Expansion Hub is disconnected Fixes issue where IMU initialization could prevent Op Modes from stopping Fixes issue where AndroidTextToSpeech.speak() would fail if it was called too early Adds telemetry.speak() methods and blocks, which cause the Driver Station (if also updated) to speak text Adds and improves Expansion Hub-related warnings Improves Expansion Hub low battery warning Displays the warning immediately after the hub reports it Specifies whether the condition is current or occurred temporarily during an OpMode run Displays which hubs reported low battery Displays warning when hub loses and regains power during an OpMode run Fixes the hub's LED pattern after this condition Displays warning when Expansion Hub is not responding to commands Specifies whether the condition is current or occurred temporarily during an OpMode run Clarifies warning when Expansion Hub is not present at startup Specifies that this condition requires a Robot Restart before the hub can be used. The hub light will now accurately reflect this state Improves logging and reduces log spam during these conditions Syncs the Control Hub time and timezone to a connected web browser programming the robot, if a Driver Station is not available. Adds bulk read functionality for REV Hubs A bulk caching mode must be set at the Hub level with LynxModule#setBulkCachingMode(). This applies to all relevant SDK hardware classes that reference that Hub. The following following Hub bulk caching modes are available: BulkCachingMode.OFF (default): All hardware calls operate as usual. Bulk data can read through LynxModule#getBulkData() and processed manually. BulkCachingMode.AUTO: Applicable hardware calls are served from a bulk read cache that is cleared\/refreshed automatically to ensure identical commands don't hit the same cache. The cache can also be cleared manually with LynxModule#clearBulkCache(), although this is not recommended. (advanced users) BulkCachingMode.MANUAL: Same as BulkCachingMode.AUTO except the cache is never cleared automatically. To avoid getting stale data, the cache must be manually cleared at the beginning of each loop body or as the user deems appropriate. Removes PIDF Annotation values added in Rev 5.3 (to AndyMark, goBILDA and TETRIX motor configurations). The new motor types will still be available but their Default control behavior will revert back to Rev 5.2 Adds new ConceptMotorBulkRead sample Opmode to demonstrate and compare Motor Bulk-Read modes for reducing I\/O latencies. Version 5.3 (20191004-112306) Fixes external USB\/UVC webcam support Makes various bugfixes and improvements to Blocks page, including but not limited to: Many visual tweaks Browser zoom and window resize behave better Resizing the Java preview pane works better and more consistently across browsers The Java preview pane consistently gets scrollbars when needed The Java preview pane is hidden by default on phones Internet Explorer 11 should work Large dropdown lists display properly on lower res screens Disabled buttons are now visually identifiable as disabled A warning is shown if a user selects a TFOD sample, but their device is not compatible Warning messages in a Blocks op mode are now visible by default. Adds goBILDA 5201 and 5202 motors to Robot Configurator Adds PIDF Annotation values to AndyMark, goBILDA and TETRIX motor configurations. This has the effect of causing the RUN_USING_ENCODERS and RUN_TO_POSITION modes to use PIDF vs PID closed loop control on these motors. This should provide more responsive, yet stable, speed control. PIDF adds Feedforward control to the basic PID control loop. Feedforward is useful when controlling a motor's speed because it \"anticipates\" how much the control voltage must change to achieve a new speed set-point, rather than requiring the integrated error to change sufficiently. The PIDF values were chosen to provide responsive, yet stable, speed control on a lightly loaded motor. The more heavily a motor is loaded (drag or friction), the more noticable the PIDF improvement will be. Fixes startup crash on Android 10 Fixes ftc_app issue #712 (thanks to FROGbots-4634) Fixes ftc_app issue #542 Allows \"A\" and lowercase letters when naming device through RC and DS apps. Version 5.2 (20190905-083277) Fixes extra-wide margins on settings activities, and placement of the new configuration button Adds Skystone Vuforia image target data. Includes sample Skystone Vuforia Navigation op modes (Java). Includes sample Skystone Vuforia Navigation op modes (Blocks). Adds TensorFlow inference model (.tflite) for Skystone game elements. Includes sample Skystone TensorFlow op modes (Java). Includes sample Skystone TensorFlow op modes (Blocks). Removes older (season-specific) sample op modes. Includes 64-bit support (to comply with Google Play requirements). Protects against Stuck OpModes when a Restart Robot is requested. (Thanks to FROGbots-4634) (ftc_app issue #709) Blocks related changes: Fixes bug with blocks generated code when hardware device name is a java or javascript reserved word. Shows generated java code for blocks, even when hardware items are missing from the active configuration. Displays warning icon when outdated Vuforia and TensorFlow blocks are used (SkyStone issue #27) Version 5.1 (20190820-222104) Defines default PIDF parameters for the following motors: REV Core Hex Motor REV 20:1 HD Hex Motor REV 40:1 HD Hex Motor Adds back button when running on a device without a system back button (such as a Control Hub) Allows a REV Control Hub to update the firmware on a REV Expansion Hub via USB Fixes SkyStone issue #9 Fixes ftc_app issue #715 Prevents extra DS User clicks by filtering based on current state. Prevents incorrect DS UI state changes when receiving new OpMode list from RC Adds support for REV Color Sensor V3 Adds a manual-refresh DS Camera Stream for remotely viewing RC camera frames. To show the stream on the DS, initialize but do not run a stream-enabled opmode, select the Camera Stream option in the DS menu, and tap the image to refresh. This feature is automatically enabled when using Vuforia or TFOD—no additional RC configuration is required for typical use cases. To hide the stream, select the same menu item again. Note that gamepads are disabled and the selected opmode cannot be started while the stream is open as a safety precaution. To use custom streams, consult the API docs for CameraStreamServer#setSource and CameraStreamSource. Adds many Star Wars sounds to RobotController resources. Added SKYSTONE Sounds Chooser Sample Program. Switches out startup, connect chimes, and error\/warning sounds for Star Wars sounds Updates OnBot Java to use a WebSocket for communication with the robot The OnBot Java page no longer has to do a full refresh when a user switches from editing one file to another Known issues: Camera Stream The Vuforia camera stream inherits the issues present in the phone preview (namely ftc_app issue #574). This problem does not affect the TFOD camera stream even though it receives frames from Vuforia. The orientation of the stream frames may not always match the phone preview. For now, these frames may be rotated manually via a custom CameraStreamSource if desired. OnBotJava Browser back button may not always work correctly It's possible for a build to be queued, but not started. The OnBot Java build console will display a warning if this occurs. A user might not realize they are editing a different file if the user inadvertently switches from one file to another since this switch is now seamless. The name of the currently open file is displayed in the browser tab. Version 5.0 (built on 19.06.14) Support for the REV Robotics Control Hub. Adds a Java preview pane to the Blocks editor. Adds a new offline export feature to the Blocks editor. Display wifi channel in Network circle on Driver Station. Adds calibration for Logitech C270 Updates build tooling and target SDK. Compliance with Google's permissions infrastructure (Required after build tooling update). Keep Alives to mitigate the Motorola wifi scanning problem. Telemetry substitute no longer necessary. Improves Vuforia error reporting. Fixes ftctechnh\/ftc_app issues 621, 713. Miscellaneous bug fixes and improvements. Version 4.3 (built on 18.10.31) Includes missing TensorFlow-related libraries and files. Version 4.2 (built on 18.10.30) Includes fix to avoid deadlock situation with WatchdogMonitor which could result in USB communication errors. Comm error appeared to require that user disconnect USB cable and restart the Robot Controller app to recover. robotControllerLog.txt would have error messages that included the words \"E RobotCore: lynx xmit lock: #### abandoning lock:\" Includes fix to correctly list the parent module address for a REV Robotics Expansion Hub in a configuration (.xml) file. Bug in versions 4.0 and 4.1 would incorrect list the address module for a parent REV Robotics device as \"1\". If the parent module had a higher address value than the daisy-chained module, then this bug would prevent the Robot Controller from communicating with the downstream Expansion Hub. Added requirement for ACCESS_COARSE_LOCATION to allow a Driver Station running Android Oreo to scan for Wi-Fi Direct devices. Added google() repo to build.gradle because aapt2 must be downloaded from the google() repository beginning with version 3.2 of the Android Gradle Plugin. Important Note: Android Studio users will need to be connected to the Internet the first time build the ftc_app project. Internet connectivity is required for the first build so the appropriate files can be downloaded from the Google repository. Users should not need to be connected to the Internet for subsequent builds. This should also fix buid issue where Android Studio would complain that it \"Could not find com.android.tools.lint:lint-gradle:26.1.4\" (or similar). Added support for REV Spark Mini motor controller as part of the configuration menu for a servo\/PWM port on the REV Expansion Hub. Provide examples for playing audio files in an Op Mode. Block Development Tool Changes Includes a fix for a problem with the Velocity blocks that were reported in the FTC Technology forum (Blocks Programming subforum). Change the \"Save completed successfully.\" message to a white color so it will contrast with a green background. Fixed the \"Download image\" feature so it will work if there are text blocks in the op mode. Introduce support for Google's TensorFlow Lite technology for object detetion for 2018-2019 game. TensorFlow lite can recognize Gold Mineral and Silver Mineral from 2018-2019 game. Example Java and Block op modes are included to show how to determine the relative position of the gold block (left, center, right). Version 4.1 (released on 18.09.24) Changes include: Fix to prevent crash when deprecated configuration annotations are used. Change to allow FTC Robot Controller APK to be auto-updated using FIRST Global Control Hub update scripts. Removed samples for non supported \/ non legal hardware. Improvements to Telemetry.addData block with \"text\" socket. Updated Blocks sample op mode list to include Rover Ruckus Vuforia example. Update SDK library version number. Version 4.0 (released on 18.09.12) Changes include: Initial support for UVC compatible cameras If UVC camera has a unique serial number, RC will detect and enumerate by serial number. If UVC camera lacks a unique serial number, RC will only support one camera of that type connected. Calibration settings for a few cameras are included (see TeamCode\/src\/main\/res\/xml\/teamwebcamcalibrations.xml for details). User can upload calibration files from Program and Manage web interface. UVC cameras seem to draw a fair amount of electrical current from the USB bus. This does not appear to present any problems for the REV Robotics Control Hub. This does seem to create stability problems when using some cameras with an Android phone-based Robot Controller. FTC Tech Team is investigating options to mitigate this issue with the phone-based Robot Controllers. Updated sample Vuforia Navigation and VuMark Op Modes to demonstrate how to use an internal phone-based camera and an external UVC webcam. Support for improved motor control. REV Robotics Expansion Hub firmware 1.8 and greater will support a feed forward mechanism for closed loop motor control. FTC SDK has been modified to support PIDF coefficients (proportional, integral, derivative, and feed forward). FTC Blocks development tool modified to include PIDF programming blocks. Deprecated older PID-related methods and variables. REV's 1.8.x PIDF-related changes provide a more linear and accurate way to control a motor. Wireless Added 5GHz support for wireless channel changing for those devices that support it. Tested with Moto G5 and E4 phones. Also tested with other (currently non-approved) phones such as Samsung Galaxy S8. Improved Expansion Hub firmware update support in Robot Controller app Changes to make the system more robust during the firmware update process (when performed through Robot Controller app). User no longer has to disconnect a downstream daisy-chained Expansion Hub when updating an Expansion Hub's firmware. If user is updating an Expansion Hub's firmware through a USB connection, he\/she does not have to disconnect RS485 connection to other Expansion Hubs. The user still must use a USB connection to update an Expansion Hub's firmware. The user cannot update the Expansion Hub firmware for a downstream device that is daisy chained through an RS485 connection. If an Expansion Hub accidentally gets \"bricked\" the Robot Controller app is now more likely to recognize the Hub when it scans the USB bus. Robot Controller app should be able to detect an Expansion Hub, even if it accidentally was bricked in a previous update attempt. Robot Controller app should be able to install the firmware onto the Hub, even if if accidentally was bricked in a previous update attempt. Resiliency FTC software can detect and enable an FTDI reset feature that is available with REV Robotics v1.8 Expansion Hub firmware and greater. When enabled, the Expansion Hub can detect if it hasn't communicated with the Robot Controller over the FTDI (USB) connection. If the Hub hasn't heard from the Robot Controller in a while, it will reset the FTDI connection. This action helps system recover from some ESD-induced disruptions. Various fixes to improve reliability of FTC software. Blocks Fixed errors with string and list indices in blocks export to java. Support for USB connected UVC webcams. Refactored optimized Blocks Vuforia code to support Rover Ruckus image targets. Added programming blocks to support PIDF (proportional, integral, derivative and feed forward) motor control. Added formatting options (under Telemetry and Miscellaneous categories) so user can set how many decimal places to display a numerical value. Support to play audio files (which are uploaded through Blocks web interface) on Driver Station in addition to the Robot Controller. Fixed bug with Download Image of Blocks feature. Support for REV Robotics Blinkin LED Controller. Support for REV Robotics 2m Distance Sensor. Added support for a REV Touch Sensor (no longer have to configure as a generic digital device). Added blocks for DcMotorEx methods. These are enhanced methods that you can use when supported by the motor controller hardware. The REV Robotics Expansion Hub supports these enhanced methods. Enhanced methods include methods to get\/set motor velocity (in encoder pulses per second), get\/set PIDF coefficients, etc.. Modest Improvements in Logging Decrease frequency of battery checker voltage statements. Removed non-FTC related log statements (wherever possible). Introduced a \"Match Logging\" feature. Under \"Settings\" a user can enable\/disable this feature (it's disabled by default). If enabled, user provides a \"Match Number\" through the Driver Station user interface (top of the screen). The Match Number is used to create a log file specifically with log statements from that particular Op Mode run. Match log files are stored in \/sdcard\/FIRST\/matlogs on the Robot Controller. Once an op mode run is complete, the Match Number is cleared. This is a convenient way to create a separate match log with statements only related to a specific op mode run. New Devices Support for REV Robotics Blinkin LED Controller. Support for REV Robotics 2m Distance Sensor. Added configuration option for REV 20:1 HD Hex Motor. Added support for a REV Touch Sensor (no longer have to configure as a generic digital device). Miscellaneous Fixed some errors in the definitions for acceleration and velocity in our javadoc documentation. Added ability to play audio files on Driver Station When user is configuring an Expansion Hub, the LED on the Expansion Hub will change blink pattern (purple-cyan) to indicate which Hub is currently being configured. Renamed I2cSensorType to I2cDeviceType. Added an external sample Op Mode that demonstrates localization using 2018-2019 (Rover Ruckus presented by QualComm) Vuforia targets. Added an external sample Op Mode that demonstrates how to use the REV Robotics 2m Laser Distance Sensor. Added an external sample Op Mode that demonstrates how to use the REV Robotics Blinkin LED Controller. Re-categorized external Java sample Op Modes to \"TeleOp\" instead of \"Autonomous\". Known issues: Initial support for UVC compatible cameras UVC cameras seem to draw significant amount of current from the USB bus. This does not appear to present any problems for the REV Robotics Control Hub. This does seem to create stability problems when using some cameras with an Android phone-based Robot Controller. FTC Tech Team is investigating options to mitigate this issue with the phone-based Robot Controllers. There might be a possible deadlock which causes the RC to become unresponsive when using a UVC webcam with a Nougat Android Robot Controller. Wireless When user selects a wireless channel, this channel does not necessarily persist if the phone is power cycled. Tech Team is hoping to eventually address this issue in a future release. Issue has been present since apps were introduced (i.e., it is not new with the v4.0 release). Wireless channel is not currently displayed for WiFi Direct connections. Miscellaneous The blink indication feature that shows which Expansion Hub is currently being configured does not work for a newly created configuration file. User has to first save a newly created configuration file and then close and re-edit the file in order for blink indicator to work. Version 3.6 (built on 17.12.18) Changes include: Blocks Changes Uses updated Google Blockly software to allow users to edit their op modes on Apple iOS devices (including iPad and iPhone). Improvement in Blocks tool to handle corrupt op mode files. Autonomous op modes should no longer get switched back to tele-op after re-opening them to be edited. The system can now detect type mismatches during runtime and alert the user with a message on the Driver Station. Updated javadoc documentation for setPower() method to reflect correct range of values (-1 to +1). Modified VuforiaLocalizerImpl to allow for user rendering of frames Added a user-overrideable onRenderFrame() method which gets called by the class's renderFrame() method. Version 3.5 (built on 17.10.30) Changes with version 3.5 include: Introduced a fix to prevent random op mode stops, which can occur after the Robot Controller app has been paused and then resumed (for example, when a user temporarily turns off the display of the Robot Controller phone, and then turns the screen back on). Introduced a fix to prevent random op mode stops, which were previously caused by random peer disconnect events on the Driver Station. Fixes issue where log files would be closed on pause of the RC or DS, but not re-opened upon resume. Fixes issue with battery handler (voltage) start\/stop race. Fixes issue where Android Studio generated op modes would disappear from available list in certain situations. Fixes problem where OnBot Java would not build on REV Robotics Control Hub. Fixes problem where OnBot Java would not build if the date and time on the Robot Controller device was \"rewound\" (set to an earlier date\/time). Improved error message on OnBot Java that occurs when renaming a file fails. Removed unneeded resources from android.jar binaries used by OnBot Java to reduce final size of Robot Controller app. Added MR_ANALOG_TOUCH_SENSOR block to Blocks Programming Tool. Version 3.4 (built on 17.09.06) Changes with version 3.4 include: Added telemetry.update() statement for BlankLinearOpMode template. Renamed sample Block op modes to be more consistent with Java samples. Added some additional sample Block op modes. Reworded OnBot Java readme slightly. Version 3.3 (built on 17.09.04) This version of the software includes improves for the FTC Blocks Programming Tool and the OnBot Java Programming Tool. Changes with verion 3.3 include: Android Studio ftc_app project has been updated to use Gradle Plugin 2.3.3. Android Studio ftc_app project is already using gradle 3.5 distribution. Robot Controller log has been renamed to \/sdcard\/RobotControllerLog.txt (note that this change was actually introduced w\/ v3.2). Improvements in I2C reliability. Optimized I2C read for REV Expansion Hub, with v1.7 firmware or greater. Updated all external\/samples (available through OnBot and in Android project folder). Vuforia Added support for VuMarks that will be used for the 2017-2018 season game. Blocks Update to latest Google Blockly release. Sample op modes can be selected as a template when creating new op mode. Fixed bug where the blocks would disappear temporarily when mouse button is held down. Added blocks for Range.clip and Range.scale. User can now disable\/enable Block op modes. Fix to prevent occasional Blocks deadlock. OnBot Java Significant improvements with autocomplete function for OnBot Java editor. Sample op modes can be selected as a template when creating new op mode. Fixes and changes to complete hardware setup feature. Updated (and more useful) onBot welcome message. Known issues: Android Studio After updating to the new v3.3 Android Studio project folder, if you get error messages indicating \"InvalidVirtualFileAccessException\" then you might need to do a File->Invalidate Caches \/ Restart to clear the error. OnBot Java Sometimes when you push the build button to build all op modes, the RC returns an error message that the build failed. If you press the build button a second time, the build typically suceeds. Version 3.2 (built on 17.08.02) This version of the software introduces the \"OnBot Java\" Development Tool. Similar to the FTC Blocks Development Tool, the FTC OnBot Java Development Tool allows a user to create, edit and build op modes dynamically using only a Javascript-enabled web browser. The OnBot Java Development Tool is an integrated development environment (IDE) that is served up by the Robot Controller. Op modes are created and edited using a Javascript-enabled browser (Google Chromse is recommended). Op modes are saved on the Robot Controller Android device directly. The OnBot Java Development Tool provides a Java programming environment that does NOT need Android Studio. Changes with version 3.2 include: Enhanced web-based development tools Introduction of OnBot Java Development Tool. Web-based programming and management features are \"always on\" (user no longer needs to put Robot Controller into programming mode). Web-based management interface (where user can change Robot Controller name and also easily download Robot Controller log file). OnBot Java, Blocks and Management features available from web based interface. Blocks Programming Development Tool: Changed \"LynxI2cColorRangeSensor\" block to \"REV Color\/range sensor\" block. Fixed tooltip for ColorSensor.isLightOn block. Added blocks for ColorSensor.getNormalizedColors and LynxI2cColorRangeSensor.getNormalizedColors. Added example op modes for digital touch sensor and REV Robotics Color Distance sensor. User selectable color themes. Includes many minor enhancements and fixes (too numerous to list). Known issues: Auto complete function is incomplete and does not support the following (for now): Access via this keyword Access via super keyword Members of the super cloass, not overridden by the class Any methods provided in the current class Inner classes Can't handle casted objects Any objects coming from an parenthetically enclosed expression Version 3.10 (built on 17.05.09) This version of the software provides support for the REV Robotics Expansion Hub. This version also includes improvements in the USB communication layer in an effort to enhance system resiliency. If you were using a 2.x version of the software previously, updating to version 3.1 requires that you also update your Driver Station software in addition to updating the Robot Controller software. Also note that in version 3.10 software, the setMaxSpeed and getMaxSpeed methods are no longer available (not deprecated, they have been removed from the SDK). Also note that the the new 3.x software incorporates motor profiles that a user can select as he\/she configures the robot. Changes include: Blocks changes Added VuforiaTrackableDefaultListener.getPose and Vuforia.trackPose blocks. Added optimized blocks support for Vuforia extended tracking. Added atan2 block to the math category. Added useCompetitionFieldTargetLocations parameter to Vuforia.initialize block. If set to false, the target locations are placed at (0,0,0) with target orientation as specified in https:\/\/github.com\/gearsincorg\/FTCVuforiaDemo\/blob\/master\/Robot_Navigation.java tutorial op mode. Incorporates additional improvements to USB comm layer to improve system resiliency (to recover from a greater number of communication disruptions). Additional Notes Regarding Version 3.00 (built on 17.04.13) In addition to the release changes listed below (see section labeled \"Version 3.00 (built on 17.04.013)\"), version 3.00 has the following important changes: Version 3.00 software uses a new version of the FTC Robocol (robot protocol). If you upgrade to v3.0 on the Robot Controller and\/or Android Studio side, you must also upgrade the Driver Station software to match the new Robocol. Version 3.00 software removes the setMaxSpeed and getMaxSpeed methods from the DcMotor class. If you have an op mode that formerly used these methods, you will need to remove the references\/calls to these methods. Instead, v3.0 provides the max speed information through the use of motor profiles that are selected by the user during robot configuration. Version 3.00 software currently does not have a mechanism to disable extra i2c sensors. We hope to re-introduce this function with a release in the near future. Version 3.00 (built on 17.04.13) *** Use this version of the software at YOUR OWN RISK!!! *** This software is being released as an \"alpha\" version. Use this version at your own risk! This pre-release software contains SIGNIFICANT changes, including changes to the Wi-Fi Direct pairing mechanism, rewrites of the I2C sensor classes, changes to the USB\/FTDI layer, and the introduction of support for the REV Robotics Expansion Hub and the REV Robotics color-range-light sensor. These changes were implemented to improve the reliability and resiliency of the FTC control system. Please note, however, that version 3.00 is considered \"alpha\" code. This code is being released so that the FIRST community will have an opportunity to test the new REV Expansion Hub electronics module when it becomes available in May. The developers do not recommend using this code for critical applications (i.e., competition use). *** Use this version of the software at YOUR OWN RISK!!! *** Changes include: Major rework of sensor-related infrastructure. Includes rewriting sensor classes to implement synchronous I2C communication. Fix to reset Autonomous timer back to 30 seconds. Implementation of specific motor profiles for approved 12V motors (includes Tetrix, AndyMark, Matrix and REV models). Modest improvements to enhance Wi-Fi P2P pairing. Fixes telemetry log addition race. Publishes all the sources (not just a select few). Includes Block programming improvements Addition of optimized Vuforia blocks. Auto scrollbar to projects and sounds pages. Fixed blocks paste bug. Blocks execute after while-opModeIsActive loop (to allow for cleanup before exiting op mode). Added gyro integratedZValue block. Fixes bug with projects page for Firefox browser. Added IsSpeaking block to AndroidTextToSpeech. Implements support for the REV Robotics Expansion Hub Implements support for integral REV IMU (physically installed on I2C bus 0, uses same Bosch BNO055 9 axis absolute orientation sensor as Adafruit 9DOF abs orientation sensor). - Implements support for REV color\/range\/light sensor. Provides support to update Expansion Hub firmware through FTC SDK. Detects REV firmware version and records in log file. Includes support for REV Control Hub (note that the REV Control Hub is not yet approved for FTC use). Implements FTC Blocks programming support for REV Expansion Hub and sensor hardware. Detects and alerts when I2C device disconnect. Version 2.62 (built on 17.01.07) Added null pointer check before calling modeToByte() in finishModeSwitchIfNecessary method for ModernRoboticsUsbDcMotorController class. Changes to enhance Modern Robotics USB protocol robustness. Version 2.61 (released on 16.12.19) Blocks Programming mode changes: Fix to correct issue when an exception was thrown because an OpticalDistanceSensor object appears twice in the hardware map (the second time as a LightSensor). Version 2.6 (released on 16.12.16) Fixes for Gyro class: Improve (decrease) sensor refresh latency. fix isCalibrating issues. Blocks Programming mode changes: Blocks now ignores a device in the configuration xml if the name is empty. Other devices work in configuration work fine. Version 2.5 (internal release on released on 16.12.13) Blocks Programming mode changes: Added blocks support for AdafruitBNO055IMU. Added Download Op Mode button to FtcBocks.html. Added support for copying blocks in one OpMode and pasting them in an other OpMode. The clipboard content is stored on the phone, so the programming mode server must be running. Modified Utilities section of the toolbox. In Programming Mode, display information about the active connections. Fixed paste location when workspace has been scrolled. Added blocks support for the android Accelerometer. Fixed issue where Blocks Upload Op Mode truncated name at first dot. Added blocks support for Android SoundPool. Added type safety to blocks for Acceleration. Added type safety to blocks for AdafruitBNO055IMU.Parameters. Added type safety to blocks for AnalogInput. Added type safety to blocks for AngularVelocity. Added type safety to blocks for Color. Added type safety to blocks for ColorSensor. Added type safety to blocks for CompassSensor. Added type safety to blocks for CRServo. Added type safety to blocks for DigitalChannel. Added type safety to blocks for ElapsedTime. Added type safety to blocks for Gamepad. Added type safety to blocks for GyroSensor. Added type safety to blocks for IrSeekerSensor. Added type safety to blocks for LED. Added type safety to blocks for LightSensor. Added type safety to blocks for LinearOpMode. Added type safety to blocks for MagneticFlux. Added type safety to blocks for MatrixF. Added type safety to blocks for MrI2cCompassSensor. Added type safety to blocks for MrI2cRangeSensor. Added type safety to blocks for OpticalDistanceSensor. Added type safety to blocks for Orientation. Added type safety to blocks for Position. Added type safety to blocks for Quaternion. Added type safety to blocks for Servo. Added type safety to blocks for ServoController. Added type safety to blocks for Telemetry. Added type safety to blocks for Temperature. Added type safety to blocks for TouchSensor. Added type safety to blocks for UltrasonicSensor. Added type safety to blocks for VectorF. Added type safety to blocks for Velocity. Added type safety to blocks for VoltageSensor. Added type safety to blocks for VuforiaLocalizer.Parameters. Added type safety to blocks for VuforiaTrackable. Added type safety to blocks for VuforiaTrackables. Added type safety to blocks for enums in AdafruitBNO055IMU.Parameters. Added type safety to blocks for AndroidAccelerometer, AndroidGyroscope, AndroidOrientation, and AndroidTextToSpeech. Version 2.4 (released on 16.11.13) Fix to avoid crashing for nonexistent resources. Blocks Programming mode changes: Added blocks to support OpenGLMatrix, MatrixF, and VectorF. Added blocks to support AngleUnit, AxesOrder, AxesReference, CameraDirection, CameraMonitorFeedback, DistanceUnit, and TempUnit. Added blocks to support Acceleration. Added blocks to support LinearOpMode.getRuntime. Added blocks to support MagneticFlux and Position. Fixed typos. Made blocks for ElapsedTime more consistent with other objects. Added blocks to support Quaternion, Velocity, Orientation, AngularVelocity. Added blocks to support VuforiaTrackables, VuforiaTrackable, VuforiaLocalizer, VuforiaTrackableDefaultListener. Fixed a few blocks. Added type checking to new blocks. Updated to latest blockly. Added default variable blocks to navigation and matrix blocks. Fixed toolbox entry for openGLMatrix_rotation_withAxesArgs. When user downloads Blocks-generated op mode, only the .blk file is downloaded. When user uploads Blocks-generated op mode (.blk file), Javascript code is auto generated. Added DbgLog support. Added logging when a blocks file is read\/written. Fixed bug to properly render blocks even if missing devices from configuration file. Added support for additional characters (not just alphanumeric) for the block file names (for download and upload). Added support for OpMode flavor (“Autonomous” or “TeleOp”) and group. Changes to Samples to prevent tutorial issues. Incorporated suggested changes from public pull 216 (“Replace .. paths”). Remove Servo Glitches when robot stopped. if user hits “Cancels” when editing a configuration file, clears the unsaved changes and reverts to original unmodified configuration. Added log info to help diagnose why the Robot Controller app was terminated (for example, by watch dog function). Added ability to transfer log from the controller. Fixed inconsistency for AngularVelocity Limit unbounded growth of data for telemetry. If user does not call telemetry.update() for LinearOpMode in a timely manner, data added for telemetry might get lost if size limit is exceeded. Version 2.35 (released on 16.10.06) Blockly programming mode - Removed unnecesary idle() call from blocks for new project. Version 2.30 (released on 16.10.05) Blockly programming mode: Mechanism added to save Blockly op modes from Programming Mode Server onto local device To avoid clutter, blocks are displayed in categorized folders Added support for DigitalChannel Added support for ModernRoboticsI2cCompassSensor Added support for ModernRoboticsI2cRangeSensor Added support for VoltageSensor Added support for AnalogInput Added support for AnalogOutput Fix for CompassSensor setMode block Vuforia Fix deadlock \/ make camera data available while Vuforia is running. Update to Vuforia 6.0.117 (recommended by Vuforia and Google to close security loophole). Fix for autonomous 30 second timer bug (where timer was in effect, even though it appeared to have timed out). opModeIsActive changes to allow cleanup after op mode is stopped (with enforced 2 second safety timeout). Fix to avoid reading i2c twice. Updated sample Op Modes. Improved logging and fixed intermittent freezing. Added digital I\/O sample. Cleaned up device names in sample op modes to be consistent with Pushbot guide. Fix to allow use of IrSeekerSensorV3. Version 2.20 (released on 16.09.08) Support for Modern Robotics Compass Sensor. Support for Modern Robotics Range Sensor. Revise device names for Pushbot templates to match the names used in Pushbot guide. Fixed bug so that IrSeekerSensorV3 device is accessible as IrSeekerSensor in hardwareMap. Modified computer vision code to require an individual Vuforia license (per legal requirement from PTC). Minor fixes. Blockly enhancements: Support for Voltage Sensor. Support for Analog Input. Support for Analog Output. Support for Light Sensor. Support for Servo Controller. Version 2.10 (released on 16.09.03) Support for Adafruit IMU. Improvements to ModernRoboticsI2cGyro class Block on reset of z axis. isCalibrating() returns true while gyro is calibration. Updated sample gyro program. Blockly enhancements support for android.graphics.Color. added support for ElapsedTime. improved look and legibility of blocks. support for compass sensor. support for ultrasonic sensor. support for IrSeeker. support for LED. support for color sensor. support for CRServo prompt user to configure robot before using programming mode. Provides ability to disable audio cues. various bug fixes and improvements. Version 2.00 (released on 16.08.19) This is the new release for the upcoming 2016-2017 FIRST Tech Challenge Season. Channel change is enabled in the FTC Robot Controller app for Moto G 2nd and 3rd Gen phones. Users can now use annotations to register\/disable their Op Modes. Changes in the Android SDK, JDK and build tool requirements (minsdk=19, java 1.7, build tools 23.0.3). Standardized units in analog input. Cleaned up code for existing analog sensor classes. setChannelMode and getChannelMode were REMOVED from the DcMotorController class. This is important - we no longer set the motor modes through the motor controller. setMode and getMode were added to the DcMotor class. ContinuousRotationServo class has been added to the FTC SDK. Range.clip() method has been overloaded so it can support this operation for int, short and byte integers. Some changes have been made (new methods added) on how a user can access items from the hardware map. Users can now set the zero power behavior for a DC motor so that the motor will brake or float when power is zero. Prototype Blockly Programming Mode has been added to FTC Robot Controller. Users can place the Robot Controller into this mode, and then use a device (such as a laptop) that has a Javascript enabled browser to write Blockly-based Op Modes directly onto the Robot Controller. Users can now configure the robot remotely through the FTC Driver Station app. Android Studio project supports Android Studio 2.1.x and compile SDK Version 23 (Marshmallow). Vuforia Computer Vision SDK integrated into FTC SDK. Users can use sample vision targets to get localization information on a standard FTC field. Project structure has been reorganized so that there is now a TeamCode package that users can use to place their local\/custom Op Modes into this package. Inspection function has been integrated into the FTC Robot Controller and Driver Station Apps (Thanks Team HazMat… 9277 & 10650!). Audio cues have been incorporated into FTC SDK. Swap mechanism added to FTC Robot Controller configuration activity. For example, if you have two motor controllers on a robot, and you misidentified them in your configuration file, you can use the Swap button to swap the devices within the configuration file (so you do not have to manually re-enter in the configuration info for the two devices). Fix mechanism added to all user to replace an electronic module easily. For example, suppose a servo controller dies on your robot. You replace the broken module with a new module, which has a different serial number from the original servo controller. You can use the Fix button to automatically reconfigure your configuration file to use the serial number of the new module. Improvements made to fix resiliency and responsiveness of the system. For LinearOpMode the user now must for a telemetry.update() to update the telemetry data on the driver station. This update() mechanism ensures that the driver station gets the updated data properly and at the same time. The Auto Configure function of the Robot Controller is now template based. If there is a commonly used robot configuration, a template can be created so that the Auto Configure mechanism can be used to quickly configure a robot of this type. The logic to detect a runaway op mode (both in the LinearOpMode and OpMode types) and to abort the run, then auto recover has been improved\/implemented. Fix has been incorporated so that Logitech F310 gamepad mappings will be correct for Marshmallow users. Release 16.07.08 For the ftc_app project, the gradle files have been modified to support Android Studio 2.1.x. Release 16.03.30 For the MIT App Inventor, the design blocks have new icons that better represent the function of each design component. Some changes were made to the shutdown logic to ensure the robust shutdown of some of our USB services. A change was made to LinearOpMode so as to allow a given instance to be executed more than once, which is required for the App Inventor. Javadoc improved\/updated. Release 16.03.09 Changes made to make the FTC SDK synchronous (significant change!) waitOneFullHardwareCycle() and waitForNextHardwareCycle() are no longer needed and have been deprecated. runOpMode() (for a LinearOpMode) is now decoupled from the system's hardware read\/write thread. loop() (for an OpMode) is now decoupled from the system's hardware read\/write thread. Methods are synchronous. For example, if you call setMode(DcMotorController.RunMode.RESET_ENCODERS) for a motor, the encoder is guaranteed to be reset when the method call is complete. For legacy module (NXT compatible), user no longer has to toggle between read and write modes when reading from or writing to a legacy device. Changes made to enhance reliability\/robustness during ESD event. Changes made to make code thread safe. Debug keystore added so that user-generated robot controller APKs will all use the same signed key (to avoid conflicts if a team has multiple developer laptops for example). Firmware version information for Modern Robotics modules are now logged. Changes made to improve USB comm reliability and robustness. Added support for voltage indicator for legacy (NXT-compatible) motor controllers. Changes made to provide auto stop capabilities for op modes. A LinearOpMode class will stop when the statements in runOpMode() are complete. User does not have to push the stop button on the driver station. If an op mode is stopped by the driver station, but there is a run away\/uninterruptible thread persisting, the app will log an error message then force itself to crash to stop the runaway thread. Driver Station UI modified to display lowest measured voltage below current voltage (12V battery). Driver Station UI modified to have color background for current voltage (green=good, yellow=caution, red=danger, extremely low voltage). javadoc improved (edits and additional classes). Added app build time to About activity for driver station and robot controller apps. Display local IP addresses on Driver Station About activity. Added I2cDeviceSynchImpl. Added I2cDeviceSync interface. Added seconds() and milliseconds() to ElapsedTime for clarity. Added getCallbackCount() to I2cDevice. Added missing clearI2cPortActionFlag. Added code to create log messages while waiting for LinearOpMode shutdown. Fix so Wifi Direct Config activity will no longer launch multiple times. Added the ability to specify an alternate i2c address in software for the Modern Robotics gyro. Release 16.02.09 Improved battery checker feature so that voltage values get refreshed regularly (every 250 msec) on Driver Station (DS) user interface. Improved software so that Robot Controller (RC) is much more resilient and “self-healing” to USB disconnects: If user attempts to start\/restart RC with one or more module missing, it will display a warning but still start up. When running an op mode, if one or more modules gets disconnected, the RC & DS will display warnings,and robot will keep on working in spite of the missing module(s). If a disconnected module gets physically reconnected the RC will auto detect the module and the user will regain control of the recently connected module. Warning messages are more helpful (identifies the type of module that’s missing plus its USB serial number). Code changes to fix the null gamepad reference when users try to reference the gamepads in the init() portion of their op mode. NXT light sensor output is now properly scaled. Note that teams might have to readjust their light threshold values in their op modes. On DS user interface, gamepad icon for a driver will disappear if the matching gamepad is disconnected or if that gamepad gets designated as a different driver. Robot Protocol (ROBOCOL) version number info is displayed in About screen on RC and DS apps. Incorporated a display filter on pairing screen to filter out devices that don’t use the “-“ format. This filter can be turned off to show all WiFi Direct devices. Updated text in License file. Fixed formatting error in OpticalDistanceSensor.toString(). Fixed issue on with a blank (“”) device name that would disrupt WiFi Direct Pairing. Made a change so that the WiFi info and battery info can be displayed more quickly on the DS upon connecting to RC. Improved javadoc generation. Modified code to make it easier to support language localization in the future. Release 16.01.04 Updated compileSdkVersion for apps Prevent Wifi from entering power saving mode removed unused import from driver station Corrrected \"Dead zone\" joystick code. LED.getDeviceName and .getConnectionInfo() return null apps check for ROBOCOL_VERSION mismatch Fix for Telemetry also has off-by-one errors in its data string sizing \/ short size limitations error User telemetry output is sorted. added formatting variants to DbgLog and RobotLog APIs code modified to allow for a long list of op mode names. changes to improve thread safety of RobocolDatagramSocket Fix for \"missing hardware leaves robot controller disconnected from driver station\" error fix for \"fast tapping of Init\/Start causes problems\" (toast is now only instantiated on UI thread). added some log statements for thread life cycle. moved gamepad reset logic inside of initActiveOpMode() for robustness changes made to mitigate risk of race conditions on public methods. changes to try and flag when WiFi Direct name contains non-printable characters. fix to correct race condition between .run() and .close() in ReadWriteRunnableStandard. updated FTDI driver made ReadWriteRunnableStanard interface public. fixed off-by-one errors in Command constructor moved specific hardware implmentations into their own package. moved specific gamepad implemnatations to the hardware library. changed LICENSE file to new BSD version. fixed race condition when shutting down Modern Robotics USB devices. methods in the ColorSensor classes have been synchronized. corrected isBusy() status to reflect end of motion. corrected \"back\" button keycode. the notSupported() method of the GyroSensor class was changed to protected (it should not be public). Release 15.11.04.001 Added Support for Modern Robotics Gyro. The GyroSensor class now supports the MR Gyro Sensor. Users can access heading data (about Z axis) Users can also access raw gyro data (X, Y, & Z axes). Example MRGyroTest.java op mode included. Improved error messages More descriptive error messages for exceptions in user code. Updated DcMotor API Enable read mode on new address in setI2cAddress Fix so that driver station app resets the gamepads when switching op modes. USB-related code changes to make USB comm more responsive and to display more explicit error messages. Fix so that USB will recover properly if the USB bus returns garbage data. Fix USB initializtion race condition. Better error reporting during FTDI open. More explicit messages during USB failures. Fixed bug so that USB device is closed if event loop teardown method was not called. Fixed timer UI issue Fixed duplicate name UI bug (Legacy Module configuration). Fixed race condition in EventLoopManager. Fix to keep references stable when updating gamepad. For legacy Matrix motor\/servo controllers removed necessity of appending \"Motor\" and \"Servo\" to controller names. Updated HT color sensor driver to use constants from ModernRoboticsUsbLegacyModule class. Updated MR color sensor driver to use constants from ModernRoboticsUsbDeviceInterfaceModule class. Correctly handle I2C Address change in all color sensors Updated\/cleaned up op modes. Updated comments in LinearI2cAddressChange.java example op mode. Replaced the calls to \"setChannelMode\" with \"setMode\" (to match the new of the DcMotor method). Removed K9AutoTime.java op mode. Added MRGyroTest.java op mode (demonstrates how to use MR Gyro Sensor). Added MRRGBExample.java op mode (demonstrates how to use MR Color Sensor). Added HTRGBExample.java op mode (demonstrates how to use HT legacy color sensor). Added MatrixControllerDemo.java (demonstrates how to use legacy Matrix controller). Updated javadoc documentation. Updated release .apk files for Robot Controller and Driver Station apps. Release 15.10.06.002 Added support for Legacy Matrix 9.6V motor\/servo controller. Cleaned up build.gradle file. Minor UI and bug fixes for driver station and robot controller apps. Throws error if Ultrasonic sensor (NXT) is not configured for legacy module port 4 or 5. Release 15.08.03.001 New user interfaces for FTC Driver Station and FTC Robot Controller apps. An init() method is added to the OpMode class. For this release, init() is triggered right before the start() method. Eventually, the init() method will be triggered when the user presses an \"INIT\" button on driver station. The init() and loop() methods are now required (i.e., need to be overridden in the user's op mode). The start() and stop() methods are optional. A new LinearOpMode class is introduced. Teams can use the LinearOpMode mode to create a linear (not event driven) program model. Teams can use blocking statements like Thread.sleep() within a linear op mode. The API for the Legacy Module and Core Device Interface Module have been updated. Support for encoders with the Legacy Module is now working. The hardware loop has been updated for better performance.",
"fork": false,
"created_at": "2021-03-08T11:34:11Z",
- "updated_at": "2024-09-14T06:41:55Z",
+ "updated_at": "2024-09-19T11:08:35Z",
"pushed_at": "2024-04-12T05:48:35Z",
- "stargazers_count": 151,
- "watchers_count": 151,
+ "stargazers_count": 153,
+ "watchers_count": 153,
"has_discussions": false,
"forks_count": 57,
"allow_forking": true,
@@ -135,7 +135,7 @@
"topics": [],
"visibility": "public",
"forks": 57,
- "watchers": 151,
+ "watchers": 153,
"score": 0,
"subscribers_count": 12
},
diff --git a/2019/CVE-2019-11932.json b/2019/CVE-2019-11932.json
index e3996a72d1..a22b28f370 100644
--- a/2019/CVE-2019-11932.json
+++ b/2019/CVE-2019-11932.json
@@ -319,10 +319,10 @@
"description": "Whatsapp Automatic Payload Generator [CVE-2019-11932]",
"fork": false,
"created_at": "2020-04-22T21:11:27Z",
- "updated_at": "2024-09-14T09:16:27Z",
+ "updated_at": "2024-09-21T18:21:59Z",
"pushed_at": "2022-01-02T20:40:58Z",
- "stargazers_count": 30,
- "watchers_count": 30,
+ "stargazers_count": 31,
+ "watchers_count": 31,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@@ -341,7 +341,7 @@
],
"visibility": "public",
"forks": 10,
- "watchers": 30,
+ "watchers": 31,
"score": 0,
"subscribers_count": 2
},
diff --git a/2019/CVE-2019-12586.json b/2019/CVE-2019-12586.json
index 5ceb527bcb..3d94bde3f5 100644
--- a/2019/CVE-2019-12586.json
+++ b/2019/CVE-2019-12586.json
@@ -13,10 +13,10 @@
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
"fork": false,
"created_at": "2019-09-03T15:08:49Z",
- "updated_at": "2024-09-10T17:59:23Z",
+ "updated_at": "2024-09-22T19:57:57Z",
"pushed_at": "2019-09-08T06:09:11Z",
- "stargazers_count": 792,
- "watchers_count": 792,
+ "stargazers_count": 793,
+ "watchers_count": 793,
"has_discussions": false,
"forks_count": 69,
"allow_forking": true,
@@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 69,
- "watchers": 792,
+ "watchers": 793,
"score": 0,
"subscribers_count": 34
}
diff --git a/2019/CVE-2019-1405.json b/2019/CVE-2019-1405.json
index 674082f8f7..0e116e9b15 100644
--- a/2019/CVE-2019-1405.json
+++ b/2019/CVE-2019-1405.json
@@ -18,13 +18,13 @@
"stargazers_count": 347,
"watchers_count": 347,
"has_discussions": false,
- "forks_count": 80,
+ "forks_count": 78,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 80,
+ "forks": 78,
"watchers": 347,
"score": 0,
"subscribers_count": 12
diff --git a/2019/CVE-2019-14322.json b/2019/CVE-2019-14322.json
index 6e3e829ddb..8e21d4c45e 100644
--- a/2019/CVE-2019-14322.json
+++ b/2019/CVE-2019-14322.json
@@ -58,5 +58,43 @@
"watchers": 0,
"score": 0,
"subscribers_count": 2
+ },
+ {
+ "id": 859728354,
+ "name": "CVE-2019-14322",
+ "full_name": "sergiovks\/CVE-2019-14322",
+ "owner": {
+ "login": "sergiovks",
+ "id": 118485549,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118485549?v=4",
+ "html_url": "https:\/\/github.com\/sergiovks"
+ },
+ "html_url": "https:\/\/github.com\/sergiovks\/CVE-2019-14322",
+ "description": "Modification of: PoC of CVE-2019-14322: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')",
+ "fork": false,
+ "created_at": "2024-09-19T07:17:01Z",
+ "updated_at": "2024-09-20T07:47:27Z",
+ "pushed_at": "2024-09-20T07:47:23Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve-2019-14322",
+ "exploit",
+ "lfi",
+ "local-file-inclusion",
+ "odoo",
+ "pallets-werkzeug",
+ "werkzeug-exploit"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2019/CVE-2019-15107.json b/2019/CVE-2019-15107.json
index ee2a4ede5e..fd58d978fb 100644
--- a/2019/CVE-2019-15107.json
+++ b/2019/CVE-2019-15107.json
@@ -313,7 +313,7 @@
"description": "Webmin <=1.920 RCE",
"fork": false,
"created_at": "2020-08-08T10:17:03Z",
- "updated_at": "2024-01-09T07:20:42Z",
+ "updated_at": "2024-09-18T05:30:47Z",
"pushed_at": "2020-08-12T08:36:36Z",
"stargazers_count": 5,
"watchers_count": 5,
diff --git a/2019/CVE-2019-16098.json b/2019/CVE-2019-16098.json
index 1f66f84583..c28dcc8e31 100644
--- a/2019/CVE-2019-16098.json
+++ b/2019/CVE-2019-16098.json
@@ -13,10 +13,10 @@
"description": "Local privilege escalation PoC exploit for CVE-2019-16098",
"fork": false,
"created_at": "2019-09-10T15:57:36Z",
- "updated_at": "2024-08-22T16:50:42Z",
+ "updated_at": "2024-09-19T03:32:29Z",
"pushed_at": "2019-09-13T20:05:43Z",
- "stargazers_count": 192,
- "watchers_count": 192,
+ "stargazers_count": 191,
+ "watchers_count": 191,
"has_discussions": false,
"forks_count": 61,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 61,
- "watchers": 192,
+ "watchers": 191,
"score": 0,
"subscribers_count": 4
},
diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json
index e01186f80d..8e84dc79b9 100644
--- a/2019/CVE-2019-17558.json
+++ b/2019/CVE-2019-17558.json
@@ -43,12 +43,12 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
- "updated_at": "2024-09-15T13:52:05Z",
+ "updated_at": "2024-09-24T03:51:54Z",
"pushed_at": "2021-04-04T09:13:57Z",
- "stargazers_count": 4099,
- "watchers_count": 4099,
+ "stargazers_count": 4101,
+ "watchers_count": 4101,
"has_discussions": false,
- "forks_count": 1090,
+ "forks_count": 1091,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -74,8 +74,8 @@
"webshell"
],
"visibility": "public",
- "forks": 1090,
- "watchers": 4099,
+ "forks": 1091,
+ "watchers": 4101,
"score": 0,
"subscribers_count": 148
},
diff --git a/2019/CVE-2019-1821.json b/2019/CVE-2019-1821.json
index 690cd47024..fbd526f3b9 100644
--- a/2019/CVE-2019-1821.json
+++ b/2019/CVE-2019-1821.json
@@ -13,10 +13,10 @@
"description": "Cisco Exploit (CVE-2019-1821 Cisco Prime Infrastructure Remote Code Execution\/CVE-2019-1653\/Cisco SNMP RCE\/Dump Cisco RV320 Password)",
"fork": false,
"created_at": "2019-05-21T12:42:54Z",
- "updated_at": "2024-09-05T17:01:12Z",
+ "updated_at": "2024-09-20T12:45:17Z",
"pushed_at": "2019-05-21T14:52:36Z",
- "stargazers_count": 128,
- "watchers_count": 128,
+ "stargazers_count": 129,
+ "watchers_count": 129,
"has_discussions": false,
"forks_count": 59,
"allow_forking": true,
@@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 59,
- "watchers": 128,
+ "watchers": 129,
"score": 0,
"subscribers_count": 5
}
diff --git a/2019/CVE-2019-19781.json b/2019/CVE-2019-19781.json
index fd8c8a8228..9bd8aa17ae 100644
--- a/2019/CVE-2019-19781.json
+++ b/2019/CVE-2019-19781.json
@@ -43,10 +43,10 @@
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
"fork": false,
"created_at": "2020-01-11T00:08:27Z",
- "updated_at": "2024-08-30T07:45:09Z",
+ "updated_at": "2024-09-19T11:52:29Z",
"pushed_at": "2020-01-22T20:23:51Z",
- "stargazers_count": 571,
- "watchers_count": 571,
+ "stargazers_count": 570,
+ "watchers_count": 570,
"has_discussions": false,
"forks_count": 127,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 127,
- "watchers": 571,
+ "watchers": 570,
"score": 0,
"subscribers_count": 29
},
diff --git a/2019/CVE-2019-2215.json b/2019/CVE-2019-2215.json
index 5d35ec88ff..063511fdd6 100644
--- a/2019/CVE-2019-2215.json
+++ b/2019/CVE-2019-2215.json
@@ -133,10 +133,10 @@
"description": "Temproot for Bravia TV via CVE-2019-2215.",
"fork": false,
"created_at": "2020-01-30T06:06:32Z",
- "updated_at": "2023-10-05T08:39:58Z",
+ "updated_at": "2024-09-18T07:27:12Z",
"pushed_at": "2020-02-20T02:41:44Z",
- "stargazers_count": 22,
- "watchers_count": 22,
+ "stargazers_count": 23,
+ "watchers_count": 23,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
- "watchers": 22,
+ "watchers": 23,
"score": 0,
"subscribers_count": 5
},
diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json
index 24f8119a03..de5105758b 100644
--- a/2019/CVE-2019-2618.json
+++ b/2019/CVE-2019-2618.json
@@ -193,7 +193,7 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2024-09-10T20:12:53Z",
+ "updated_at": "2024-09-24T00:38:41Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1982,
"watchers_count": 1982,
diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json
index d9280937b4..5ab4d34f8e 100644
--- a/2019/CVE-2019-2725.json
+++ b/2019/CVE-2019-2725.json
@@ -13,10 +13,10 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
- "updated_at": "2024-09-06T00:14:31Z",
+ "updated_at": "2024-09-18T02:18:13Z",
"pushed_at": "2020-10-01T20:20:41Z",
- "stargazers_count": 452,
- "watchers_count": 452,
+ "stargazers_count": 453,
+ "watchers_count": 453,
"has_discussions": false,
"forks_count": 115,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 115,
- "watchers": 452,
+ "watchers": 453,
"score": 0,
"subscribers_count": 9
},
diff --git a/2019/CVE-2019-5736.json b/2019/CVE-2019-5736.json
index ef5abd70d2..f635a9b659 100644
--- a/2019/CVE-2019-5736.json
+++ b/2019/CVE-2019-5736.json
@@ -43,10 +43,10 @@
"description": "PoC for CVE-2019-5736",
"fork": false,
"created_at": "2019-02-13T05:26:32Z",
- "updated_at": "2024-09-05T06:37:37Z",
+ "updated_at": "2024-09-23T03:38:01Z",
"pushed_at": "2022-01-05T04:09:42Z",
- "stargazers_count": 635,
- "watchers_count": 635,
+ "stargazers_count": 637,
+ "watchers_count": 637,
"has_discussions": false,
"forks_count": 160,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 160,
- "watchers": 635,
+ "watchers": 637,
"score": 0,
"subscribers_count": 13
},
@@ -223,10 +223,10 @@
"description": "CVE-2019-5736 POCs",
"fork": false,
"created_at": "2019-02-20T12:23:13Z",
- "updated_at": "2024-07-02T11:29:27Z",
+ "updated_at": "2024-09-23T03:41:07Z",
"pushed_at": "2020-06-22T13:04:55Z",
- "stargazers_count": 81,
- "watchers_count": 81,
+ "stargazers_count": 82,
+ "watchers_count": 82,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@@ -235,7 +235,7 @@
"topics": [],
"visibility": "public",
"forks": 34,
- "watchers": 81,
+ "watchers": 82,
"score": 0,
"subscribers_count": 8
},
diff --git a/2019/CVE-2019-6447.json b/2019/CVE-2019-6447.json
index 3cdf0a67ac..19c00def15 100644
--- a/2019/CVE-2019-6447.json
+++ b/2019/CVE-2019-6447.json
@@ -13,7 +13,7 @@
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
"fork": false,
"created_at": "2019-01-09T22:30:42Z",
- "updated_at": "2024-09-16T07:55:29Z",
+ "updated_at": "2024-09-19T11:51:59Z",
"pushed_at": "2023-09-28T18:58:28Z",
"stargazers_count": 669,
"watchers_count": 669,
diff --git a/2019/CVE-2019-7304.json b/2019/CVE-2019-7304.json
index 7751ca595d..e45f23cb0d 100644
--- a/2019/CVE-2019-7304.json
+++ b/2019/CVE-2019-7304.json
@@ -18,7 +18,7 @@
"stargazers_count": 662,
"watchers_count": 662,
"has_discussions": false,
- "forks_count": 150,
+ "forks_count": 149,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -28,7 +28,7 @@
"security"
],
"visibility": "public",
- "forks": 150,
+ "forks": 149,
"watchers": 662,
"score": 0,
"subscribers_count": 19
@@ -77,7 +77,7 @@
"description": "Another implementation for linux privilege escalation exploit via snap(d) (CVE-2019-7304)",
"fork": false,
"created_at": "2021-03-28T23:17:27Z",
- "updated_at": "2023-01-06T04:21:53Z",
+ "updated_at": "2024-09-21T00:56:13Z",
"pushed_at": "2021-03-28T23:31:22Z",
"stargazers_count": 1,
"watchers_count": 1,
diff --git a/2019/CVE-2019-9053.json b/2019/CVE-2019-9053.json
index d72b4c25ce..d542d7dda4 100644
--- a/2019/CVE-2019-9053.json
+++ b/2019/CVE-2019-9053.json
@@ -638,5 +638,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 860886622,
+ "name": "CMS-Made-Simple-2.2.9-CVE-2019-9053",
+ "full_name": "Azrenom\/CMS-Made-Simple-2.2.9-CVE-2019-9053",
+ "owner": {
+ "login": "Azrenom",
+ "id": 120582541,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/120582541?v=4",
+ "html_url": "https:\/\/github.com\/Azrenom"
+ },
+ "html_url": "https:\/\/github.com\/Azrenom\/CMS-Made-Simple-2.2.9-CVE-2019-9053",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-09-21T12:36:45Z",
+ "updated_at": "2024-09-21T13:19:15Z",
+ "pushed_at": "2024-09-21T13:15:50Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2019/CVE-2019-9193.json b/2019/CVE-2019-9193.json
index e4c537b4d7..a9d2ea4946 100644
--- a/2019/CVE-2019-9193.json
+++ b/2019/CVE-2019-9193.json
@@ -43,10 +43,10 @@
"description": "CVE-2019–9193 - PostgreSQL 9.3-12.3 Authenticated Remote Code Execution",
"fork": false,
"created_at": "2022-03-29T21:02:02Z",
- "updated_at": "2024-07-29T06:42:38Z",
+ "updated_at": "2024-09-19T06:13:16Z",
"pushed_at": "2022-05-26T23:00:33Z",
- "stargazers_count": 18,
- "watchers_count": 18,
+ "stargazers_count": 17,
+ "watchers_count": 17,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@@ -63,7 +63,7 @@
],
"visibility": "public",
"forks": 6,
- "watchers": 18,
+ "watchers": 17,
"score": 0,
"subscribers_count": 1
},
diff --git a/2019/CVE-2019-9506.json b/2019/CVE-2019-9506.json
index 219df01f5c..0365e7d612 100644
--- a/2019/CVE-2019-9506.json
+++ b/2019/CVE-2019-9506.json
@@ -13,10 +13,10 @@
"description": "Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR\/EDR and BLE [CVE-2019-9506]",
"fork": false,
"created_at": "2019-08-15T11:54:21Z",
- "updated_at": "2024-08-12T19:52:00Z",
+ "updated_at": "2024-09-18T09:59:33Z",
"pushed_at": "2022-04-04T15:16:08Z",
- "stargazers_count": 178,
- "watchers_count": 178,
+ "stargazers_count": 179,
+ "watchers_count": 179,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@@ -35,7 +35,7 @@
],
"visibility": "public",
"forks": 38,
- "watchers": 178,
+ "watchers": 179,
"score": 0,
"subscribers_count": 13
}
diff --git a/2019/CVE-2019-9730.json b/2019/CVE-2019-9730.json
index 296de166ba..e90403adc9 100644
--- a/2019/CVE-2019-9730.json
+++ b/2019/CVE-2019-9730.json
@@ -13,10 +13,10 @@
"description": "Synaptics Audio Driver LPE",
"fork": false,
"created_at": "2019-04-14T06:16:34Z",
- "updated_at": "2024-09-12T07:32:35Z",
+ "updated_at": "2024-09-18T22:47:07Z",
"pushed_at": "2019-04-15T11:17:39Z",
- "stargazers_count": 37,
- "watchers_count": 37,
+ "stargazers_count": 36,
+ "watchers_count": 36,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
- "watchers": 37,
+ "watchers": 36,
"score": 0,
"subscribers_count": 4
}
diff --git a/2019/CVE-2019-9978.json b/2019/CVE-2019-9978.json
index 3413a27cac..5b60e4db5f 100644
--- a/2019/CVE-2019-9978.json
+++ b/2019/CVE-2019-9978.json
@@ -241,5 +241,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 860404866,
+ "name": "CVE-2019-9978",
+ "full_name": "MAHajian\/CVE-2019-9978",
+ "owner": {
+ "login": "MAHajian",
+ "id": 139576061,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/139576061?v=4",
+ "html_url": "https:\/\/github.com\/MAHajian"
+ },
+ "html_url": "https:\/\/github.com\/MAHajian\/CVE-2019-9978",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-09-20T11:25:45Z",
+ "updated_at": "2024-09-20T13:09:41Z",
+ "pushed_at": "2024-09-20T13:09:38Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-0041.json b/2020/CVE-2020-0041.json
index 14f581c1e2..93689de20a 100644
--- a/2020/CVE-2020-0041.json
+++ b/2020/CVE-2020-0041.json
@@ -13,10 +13,10 @@
"description": "Exploits for Android Binder bug CVE-2020-0041",
"fork": false,
"created_at": "2020-03-31T17:53:57Z",
- "updated_at": "2024-08-12T19:59:32Z",
+ "updated_at": "2024-09-22T14:25:48Z",
"pushed_at": "2020-04-08T08:55:30Z",
- "stargazers_count": 216,
- "watchers_count": 216,
+ "stargazers_count": 217,
+ "watchers_count": 217,
"has_discussions": false,
"forks_count": 68,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 68,
- "watchers": 216,
+ "watchers": 217,
"score": 0,
"subscribers_count": 11
},
diff --git a/2020/CVE-2020-0069.json b/2020/CVE-2020-0069.json
index 0be58c0548..afc8daed4b 100644
--- a/2020/CVE-2020-0069.json
+++ b/2020/CVE-2020-0069.json
@@ -142,10 +142,10 @@
"description": "CVE-2020-0069",
"fork": false,
"created_at": "2023-09-04T17:52:04Z",
- "updated_at": "2024-09-15T04:16:11Z",
+ "updated_at": "2024-09-23T16:46:56Z",
"pushed_at": "2023-09-04T17:53:01Z",
- "stargazers_count": 8,
- "watchers_count": 8,
+ "stargazers_count": 9,
+ "watchers_count": 9,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@@ -154,7 +154,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
- "watchers": 8,
+ "watchers": 9,
"score": 0,
"subscribers_count": 1
}
diff --git a/2020/CVE-2020-0609.json b/2020/CVE-2020-0609.json
index 717044b0e3..9ce6727451 100644
--- a/2020/CVE-2020-0609.json
+++ b/2020/CVE-2020-0609.json
@@ -43,10 +43,10 @@
"description": "PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE",
"fork": false,
"created_at": "2020-01-23T22:29:46Z",
- "updated_at": "2024-08-28T17:33:20Z",
+ "updated_at": "2024-09-18T14:53:23Z",
"pushed_at": "2020-01-24T15:21:06Z",
- "stargazers_count": 251,
- "watchers_count": 251,
+ "stargazers_count": 250,
+ "watchers_count": 250,
"has_discussions": false,
"forks_count": 77,
"allow_forking": true,
@@ -58,7 +58,7 @@
],
"visibility": "public",
"forks": 77,
- "watchers": 251,
+ "watchers": 250,
"score": 0,
"subscribers_count": 13
},
diff --git a/2020/CVE-2020-0618.json b/2020/CVE-2020-0618.json
index 075d9bf113..ec109c4aa1 100644
--- a/2020/CVE-2020-0618.json
+++ b/2020/CVE-2020-0618.json
@@ -43,10 +43,10 @@
"description": "CVE-2020-0618 Honeypot",
"fork": false,
"created_at": "2020-02-18T16:17:19Z",
- "updated_at": "2024-08-12T19:57:52Z",
+ "updated_at": "2024-09-18T16:26:12Z",
"pushed_at": "2020-03-03T17:21:54Z",
- "stargazers_count": 29,
- "watchers_count": 29,
+ "stargazers_count": 30,
+ "watchers_count": 30,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
- "watchers": 29,
+ "watchers": 30,
"score": 0,
"subscribers_count": 4
},
diff --git a/2020/CVE-2020-0668.json b/2020/CVE-2020-0668.json
index 447ad1a610..c3f41a82db 100644
--- a/2020/CVE-2020-0668.json
+++ b/2020/CVE-2020-0668.json
@@ -13,10 +13,10 @@
"description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.",
"fork": false,
"created_at": "2020-02-20T06:22:40Z",
- "updated_at": "2024-09-15T10:16:59Z",
+ "updated_at": "2024-09-18T13:32:12Z",
"pushed_at": "2020-02-20T11:03:18Z",
- "stargazers_count": 207,
- "watchers_count": 207,
+ "stargazers_count": 208,
+ "watchers_count": 208,
"has_discussions": false,
"forks_count": 55,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 55,
- "watchers": 207,
+ "watchers": 208,
"score": 0,
"subscribers_count": 7
},
diff --git a/2020/CVE-2020-0683.json b/2020/CVE-2020-0683.json
index a388dd5fa5..85df4c3d5b 100644
--- a/2020/CVE-2020-0683.json
+++ b/2020/CVE-2020-0683.json
@@ -13,10 +13,10 @@
"description": "CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege",
"fork": false,
"created_at": "2020-02-11T16:42:34Z",
- "updated_at": "2024-09-10T15:03:51Z",
+ "updated_at": "2024-09-21T18:16:49Z",
"pushed_at": "2021-12-23T16:28:28Z",
- "stargazers_count": 336,
- "watchers_count": 336,
+ "stargazers_count": 335,
+ "watchers_count": 335,
"has_discussions": false,
"forks_count": 58,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 58,
- "watchers": 336,
+ "watchers": 335,
"score": 0,
"subscribers_count": 9
}
diff --git a/2020/CVE-2020-0688.json b/2020/CVE-2020-0688.json
index 302733babc..fbf5db05ad 100644
--- a/2020/CVE-2020-0688.json
+++ b/2020/CVE-2020-0688.json
@@ -75,10 +75,10 @@
"description": "cve-2020-0688",
"fork": false,
"created_at": "2020-02-27T02:54:27Z",
- "updated_at": "2024-08-12T19:58:09Z",
+ "updated_at": "2024-09-19T11:52:32Z",
"pushed_at": "2023-07-04T05:16:05Z",
- "stargazers_count": 322,
- "watchers_count": 322,
+ "stargazers_count": 321,
+ "watchers_count": 321,
"has_discussions": false,
"forks_count": 93,
"allow_forking": true,
@@ -87,7 +87,7 @@
"topics": [],
"visibility": "public",
"forks": 93,
- "watchers": 322,
+ "watchers": 321,
"score": 0,
"subscribers_count": 10
},
@@ -200,7 +200,7 @@
"description": "Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.",
"fork": false,
"created_at": "2020-02-28T16:04:30Z",
- "updated_at": "2024-08-12T19:58:12Z",
+ "updated_at": "2024-09-19T11:52:33Z",
"pushed_at": "2021-06-01T07:36:53Z",
"stargazers_count": 37,
"watchers_count": 37,
@@ -265,7 +265,7 @@
"description": "Exploit and detect tools for CVE-2020-0688",
"fork": false,
"created_at": "2020-03-01T12:57:32Z",
- "updated_at": "2024-08-12T19:58:16Z",
+ "updated_at": "2024-09-19T11:52:33Z",
"pushed_at": "2020-03-21T05:44:48Z",
"stargazers_count": 347,
"watchers_count": 347,
diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json
index bea8072d3d..f201d93826 100644
--- a/2020/CVE-2020-0796.json
+++ b/2020/CVE-2020-0796.json
@@ -200,7 +200,7 @@
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
- "forks_count": 14,
+ "forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -211,7 +211,7 @@
"vulnerability-analysis"
],
"visibility": "public",
- "forks": 14,
+ "forks": 15,
"watchers": 14,
"score": 0,
"subscribers_count": 2
@@ -1006,12 +1006,12 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
- "updated_at": "2024-09-11T18:03:04Z",
+ "updated_at": "2024-09-22T02:14:45Z",
"pushed_at": "2020-12-07T20:04:27Z",
- "stargazers_count": 1295,
- "watchers_count": 1295,
+ "stargazers_count": 1296,
+ "watchers_count": 1296,
"has_discussions": false,
- "forks_count": 343,
+ "forks_count": 344,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -1023,8 +1023,8 @@
"smbghost"
],
"visibility": "public",
- "forks": 343,
- "watchers": 1295,
+ "forks": 344,
+ "watchers": 1296,
"score": 0,
"subscribers_count": 34
},
@@ -1354,12 +1354,12 @@
"description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false,
"created_at": "2020-04-20T14:35:48Z",
- "updated_at": "2024-09-13T12:53:38Z",
+ "updated_at": "2024-09-20T13:49:50Z",
"pushed_at": "2020-06-09T20:46:45Z",
- "stargazers_count": 531,
- "watchers_count": 531,
+ "stargazers_count": 532,
+ "watchers_count": 532,
"has_discussions": false,
- "forks_count": 170,
+ "forks_count": 169,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -1371,8 +1371,8 @@
"smbghost"
],
"visibility": "public",
- "forks": 170,
- "watchers": 531,
+ "forks": 169,
+ "watchers": 532,
"score": 0,
"subscribers_count": 26
},
@@ -1600,10 +1600,10 @@
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
"fork": false,
"created_at": "2020-06-10T16:44:39Z",
- "updated_at": "2024-09-11T15:51:07Z",
+ "updated_at": "2024-09-20T20:49:44Z",
"pushed_at": "2022-03-30T14:02:04Z",
- "stargazers_count": 257,
- "watchers_count": 257,
+ "stargazers_count": 259,
+ "watchers_count": 259,
"has_discussions": false,
"forks_count": 51,
"allow_forking": true,
@@ -1612,7 +1612,7 @@
"topics": [],
"visibility": "public",
"forks": 51,
- "watchers": 257,
+ "watchers": 259,
"score": 0,
"subscribers_count": 7
},
diff --git a/2020/CVE-2020-1034.json b/2020/CVE-2020-1034.json
index 34a10c1d65..6a8b01bba5 100644
--- a/2020/CVE-2020-1034.json
+++ b/2020/CVE-2020-1034.json
@@ -13,10 +13,10 @@
"description": "PoC demonstrating the use of cve-2020-1034 for privilege escalation",
"fork": false,
"created_at": "2020-11-23T10:24:07Z",
- "updated_at": "2024-07-18T13:45:51Z",
+ "updated_at": "2024-09-18T15:20:23Z",
"pushed_at": "2021-03-16T13:53:37Z",
- "stargazers_count": 114,
- "watchers_count": 114,
+ "stargazers_count": 115,
+ "watchers_count": 115,
"has_discussions": false,
"forks_count": 40,
"allow_forking": true,
@@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 40,
- "watchers": 114,
+ "watchers": 115,
"score": 0,
"subscribers_count": 6
},
diff --git a/2020/CVE-2020-10977.json b/2020/CVE-2020-10977.json
index 0ef4a00c3a..541b6230da 100644
--- a/2020/CVE-2020-10977.json
+++ b/2020/CVE-2020-10977.json
@@ -94,36 +94,6 @@
"score": 0,
"subscribers_count": 1
},
- {
- "id": 332278953,
- "name": "cve-2020-10977",
- "full_name": "JayHerlth\/cve-2020-10977",
- "owner": {
- "login": "JayHerlth",
- "id": 5582132,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5582132?v=4",
- "html_url": "https:\/\/github.com\/JayHerlth"
- },
- "html_url": "https:\/\/github.com\/JayHerlth\/cve-2020-10977",
- "description": "GitLab 12.9 Arbitrary File Read",
- "fork": false,
- "created_at": "2021-01-23T18:21:27Z",
- "updated_at": "2021-01-23T18:34:06Z",
- "pushed_at": "2021-01-23T18:34:04Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "has_discussions": false,
- "forks_count": 1,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 1,
- "watchers": 0,
- "score": 0,
- "subscribers_count": 2
- },
{
"id": 334197749,
"name": "gitlab-12.9.0-file-read",
@@ -154,6 +124,36 @@
"score": 0,
"subscribers_count": 0
},
+ {
+ "id": 342445393,
+ "name": "cve-2020-10977",
+ "full_name": "possib1e\/cve-2020-10977",
+ "owner": {
+ "login": "possib1e",
+ "id": 30862319,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30862319?v=4",
+ "html_url": "https:\/\/github.com\/possib1e"
+ },
+ "html_url": "https:\/\/github.com\/possib1e\/cve-2020-10977",
+ "description": "GitLab 12.9 Arbitrary File Read",
+ "fork": false,
+ "created_at": "2021-02-26T02:57:05Z",
+ "updated_at": "2021-02-26T02:57:06Z",
+ "pushed_at": "2021-01-23T18:34:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
{
"id": 345284390,
"name": "CVE-2020-10977",
diff --git a/2020/CVE-2020-1206.json b/2020/CVE-2020-1206.json
index 2808e58393..f6455e6fb4 100644
--- a/2020/CVE-2020-1206.json
+++ b/2020/CVE-2020-1206.json
@@ -18,7 +18,7 @@
"stargazers_count": 145,
"watchers_count": 145,
"has_discussions": false,
- "forks_count": 49,
+ "forks_count": 45,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -28,7 +28,7 @@
"smbleed"
],
"visibility": "public",
- "forks": 49,
+ "forks": 45,
"watchers": 145,
"score": 0,
"subscribers_count": 16
diff --git a/2020/CVE-2020-12695.json b/2020/CVE-2020-12695.json
index 187b510a92..a8a101087b 100644
--- a/2020/CVE-2020-12695.json
+++ b/2020/CVE-2020-12695.json
@@ -18,13 +18,13 @@
"stargazers_count": 402,
"watchers_count": 402,
"has_discussions": false,
- "forks_count": 66,
+ "forks_count": 64,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 66,
+ "forks": 64,
"watchers": 402,
"score": 0,
"subscribers_count": 10
diff --git a/2020/CVE-2020-14144.json b/2020/CVE-2020-14144.json
index 25a2cfc0eb..44a0800856 100644
--- a/2020/CVE-2020-14144.json
+++ b/2020/CVE-2020-14144.json
@@ -13,10 +13,10 @@
"description": "A script to exploit CVE-2020-14144 - GiTea authenticated Remote Code Execution using git hooks",
"fork": false,
"created_at": "2022-03-08T17:14:27Z",
- "updated_at": "2024-08-13T04:06:36Z",
+ "updated_at": "2024-09-23T08:20:28Z",
"pushed_at": "2022-05-03T10:40:14Z",
- "stargazers_count": 18,
- "watchers_count": 18,
+ "stargazers_count": 19,
+ "watchers_count": 19,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 5,
- "watchers": 18,
+ "watchers": 19,
"score": 0,
"subscribers_count": 2
}
diff --git a/2020/CVE-2020-14645.json b/2020/CVE-2020-14645.json
index 91332d429d..7bc18ec06e 100644
--- a/2020/CVE-2020-14645.json
+++ b/2020/CVE-2020-14645.json
@@ -18,13 +18,13 @@
"stargazers_count": 79,
"watchers_count": 79,
"has_discussions": false,
- "forks_count": 15,
+ "forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 15,
+ "forks": 13,
"watchers": 79,
"score": 0,
"subscribers_count": 3
diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json
index 700936c4d2..40d50ef7a3 100644
--- a/2020/CVE-2020-1472.json
+++ b/2020/CVE-2020-1472.json
@@ -43,19 +43,19 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
- "updated_at": "2024-09-17T12:29:26Z",
+ "updated_at": "2024-09-20T09:54:20Z",
"pushed_at": "2023-07-20T10:51:42Z",
- "stargazers_count": 1721,
- "watchers_count": 1721,
+ "stargazers_count": 1723,
+ "watchers_count": 1723,
"has_discussions": false,
- "forks_count": 358,
+ "forks_count": 359,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 358,
- "watchers": 1721,
+ "forks": 359,
+ "watchers": 1723,
"score": 0,
"subscribers_count": 87
},
@@ -103,10 +103,10 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
- "updated_at": "2024-09-17T02:39:37Z",
+ "updated_at": "2024-09-24T02:42:23Z",
"pushed_at": "2020-11-03T09:45:24Z",
- "stargazers_count": 1174,
- "watchers_count": 1174,
+ "stargazers_count": 1175,
+ "watchers_count": 1175,
"has_discussions": false,
"forks_count": 288,
"allow_forking": true,
@@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 288,
- "watchers": 1174,
+ "watchers": 1175,
"score": 0,
"subscribers_count": 34
},
@@ -133,10 +133,10 @@
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
"fork": false,
"created_at": "2020-09-14T16:57:49Z",
- "updated_at": "2024-09-10T15:03:58Z",
+ "updated_at": "2024-09-24T02:41:57Z",
"pushed_at": "2020-11-05T16:37:20Z",
- "stargazers_count": 374,
- "watchers_count": 374,
+ "stargazers_count": 375,
+ "watchers_count": 375,
"has_discussions": false,
"forks_count": 67,
"allow_forking": true,
@@ -152,7 +152,7 @@
],
"visibility": "public",
"forks": 67,
- "watchers": 374,
+ "watchers": 375,
"score": 0,
"subscribers_count": 9
},
@@ -170,19 +170,19 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
- "updated_at": "2024-09-11T03:44:37Z",
+ "updated_at": "2024-09-23T08:07:45Z",
"pushed_at": "2020-10-15T18:31:15Z",
- "stargazers_count": 625,
- "watchers_count": 625,
+ "stargazers_count": 629,
+ "watchers_count": 629,
"has_discussions": false,
- "forks_count": 145,
+ "forks_count": 146,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 145,
- "watchers": 625,
+ "forks": 146,
+ "watchers": 629,
"score": 0,
"subscribers_count": 13
},
@@ -1807,10 +1807,10 @@
"description": "Lab introduction to ZeroLogon",
"fork": false,
"created_at": "2023-02-18T14:52:17Z",
- "updated_at": "2024-02-21T07:28:27Z",
+ "updated_at": "2024-09-17T20:27:13Z",
"pushed_at": "2024-02-11T19:40:36Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -1819,7 +1819,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 1,
+ "watchers": 2,
"score": 0,
"subscribers_count": 1
},
diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json
index 51ea6a26b3..20d0a9aa8a 100644
--- a/2020/CVE-2020-14882.json
+++ b/2020/CVE-2020-14882.json
@@ -13,12 +13,12 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
- "updated_at": "2024-09-15T13:52:05Z",
+ "updated_at": "2024-09-24T03:51:54Z",
"pushed_at": "2021-04-04T09:13:57Z",
- "stargazers_count": 4099,
- "watchers_count": 4099,
+ "stargazers_count": 4101,
+ "watchers_count": 4101,
"has_discussions": false,
- "forks_count": 1090,
+ "forks_count": 1091,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -44,8 +44,8 @@
"webshell"
],
"visibility": "public",
- "forks": 1090,
- "watchers": 4099,
+ "forks": 1091,
+ "watchers": 4101,
"score": 0,
"subscribers_count": 148
},
@@ -63,10 +63,10 @@
"description": "CVE-2020–14882、CVE-2020–14883",
"fork": false,
"created_at": "2020-10-28T11:43:37Z",
- "updated_at": "2024-09-03T05:25:21Z",
+ "updated_at": "2024-09-20T12:44:24Z",
"pushed_at": "2020-11-16T04:23:09Z",
- "stargazers_count": 283,
- "watchers_count": 283,
+ "stargazers_count": 284,
+ "watchers_count": 284,
"has_discussions": false,
"forks_count": 63,
"allow_forking": true,
@@ -75,7 +75,7 @@
"topics": [],
"visibility": "public",
"forks": 63,
- "watchers": 283,
+ "watchers": 284,
"score": 0,
"subscribers_count": 7
},
diff --git a/2020/CVE-2020-15257.json b/2020/CVE-2020-15257.json
index afd73bf682..cbbeb15a1c 100644
--- a/2020/CVE-2020-15257.json
+++ b/2020/CVE-2020-15257.json
@@ -13,10 +13,10 @@
"description": "Proof of concept for CVE-2020-15257 in containerd.",
"fork": false,
"created_at": "2020-12-07T08:47:09Z",
- "updated_at": "2023-08-09T21:35:22Z",
+ "updated_at": "2024-09-23T19:19:16Z",
"pushed_at": "2021-01-12T09:46:50Z",
- "stargazers_count": 16,
- "watchers_count": 16,
+ "stargazers_count": 17,
+ "watchers_count": 17,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
- "watchers": 16,
+ "watchers": 17,
"score": 0,
"subscribers_count": 6
}
diff --git a/2020/CVE-2020-15368.json b/2020/CVE-2020-15368.json
index 8e2ac55e84..83c1ce53c8 100644
--- a/2020/CVE-2020-15368.json
+++ b/2020/CVE-2020-15368.json
@@ -48,7 +48,7 @@
"description": "CVE-2020-15368 updated",
"fork": false,
"created_at": "2024-08-10T23:51:38Z",
- "updated_at": "2024-08-21T13:05:22Z",
+ "updated_at": "2024-09-18T22:48:08Z",
"pushed_at": "2024-08-10T23:57:40Z",
"stargazers_count": 6,
"watchers_count": 6,
diff --git a/2020/CVE-2020-17087.json b/2020/CVE-2020-17087.json
index 573bd8e038..e344e313ff 100644
--- a/2020/CVE-2020-17087.json
+++ b/2020/CVE-2020-17087.json
@@ -73,10 +73,10 @@
"description": "Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CVE-2020-17087 and an off-by-one overflow",
"fork": false,
"created_at": "2021-07-02T16:03:16Z",
- "updated_at": "2024-08-12T20:14:25Z",
+ "updated_at": "2024-09-22T08:15:56Z",
"pushed_at": "2022-09-01T06:33:36Z",
- "stargazers_count": 169,
- "watchers_count": 169,
+ "stargazers_count": 170,
+ "watchers_count": 170,
"has_discussions": false,
"forks_count": 49,
"allow_forking": true,
@@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 49,
- "watchers": 169,
+ "watchers": 170,
"score": 0,
"subscribers_count": 8
},
diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json
index aa088d350c..e86c4c0af0 100644
--- a/2020/CVE-2020-1938.json
+++ b/2020/CVE-2020-1938.json
@@ -859,10 +859,10 @@
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
"fork": false,
"created_at": "2022-11-13T11:01:41Z",
- "updated_at": "2024-09-12T12:16:55Z",
+ "updated_at": "2024-09-20T06:50:46Z",
"pushed_at": "2022-11-15T09:05:50Z",
- "stargazers_count": 187,
- "watchers_count": 187,
+ "stargazers_count": 190,
+ "watchers_count": 190,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@@ -871,7 +871,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
- "watchers": 187,
+ "watchers": 190,
"score": 0,
"subscribers_count": 4
},
@@ -919,12 +919,12 @@
"description": "最新tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
"fork": false,
"created_at": "2024-08-29T06:38:16Z",
- "updated_at": "2024-09-17T09:49:46Z",
+ "updated_at": "2024-09-23T07:52:04Z",
"pushed_at": "2024-09-09T07:42:24Z",
- "stargazers_count": 51,
- "watchers_count": 51,
+ "stargazers_count": 66,
+ "watchers_count": 66,
"has_discussions": false,
- "forks_count": 1,
+ "forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -938,8 +938,8 @@
"tools"
],
"visibility": "public",
- "forks": 1,
- "watchers": 51,
+ "forks": 4,
+ "watchers": 66,
"score": 0,
"subscribers_count": 1
}
diff --git a/2020/CVE-2020-2038.json b/2020/CVE-2020-2038.json
index 26206fd604..8a9f2bf2ea 100644
--- a/2020/CVE-2020-2038.json
+++ b/2020/CVE-2020-2038.json
@@ -13,10 +13,10 @@
"description": "Exploit to capitalize on vulnerability CVE-2020-2038.",
"fork": false,
"created_at": "2022-08-03T17:21:51Z",
- "updated_at": "2024-07-25T02:34:37Z",
+ "updated_at": "2024-09-19T02:32:33Z",
"pushed_at": "2022-08-03T17:57:53Z",
- "stargazers_count": 4,
- "watchers_count": 4,
+ "stargazers_count": 5,
+ "watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 4,
+ "watchers": 5,
"score": 0,
"subscribers_count": 2
}
diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json
index c41f65b1ad..7571b96331 100644
--- a/2020/CVE-2020-2551.json
+++ b/2020/CVE-2020-2551.json
@@ -13,7 +13,7 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
- "updated_at": "2024-09-10T20:12:53Z",
+ "updated_at": "2024-09-24T00:38:41Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1982,
"watchers_count": 1982,
@@ -129,13 +129,13 @@
"stargazers_count": 334,
"watchers_count": 334,
"has_discussions": false,
- "forks_count": 80,
+ "forks_count": 78,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 80,
+ "forks": 78,
"watchers": 334,
"score": 0,
"subscribers_count": 4
diff --git a/2020/CVE-2020-25686.json b/2020/CVE-2020-25686.json
index db57f2bcae..93979504f7 100644
--- a/2020/CVE-2020-25686.json
+++ b/2020/CVE-2020-25686.json
@@ -13,10 +13,10 @@
"description": "DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)",
"fork": false,
"created_at": "2021-01-23T19:07:18Z",
- "updated_at": "2024-09-11T23:07:22Z",
+ "updated_at": "2024-09-18T05:22:23Z",
"pushed_at": "2021-01-24T09:05:40Z",
- "stargazers_count": 95,
- "watchers_count": 95,
+ "stargazers_count": 96,
+ "watchers_count": 96,
"has_discussions": false,
"forks_count": 41,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 41,
- "watchers": 95,
+ "watchers": 96,
"score": 0,
"subscribers_count": 7
}
diff --git a/2020/CVE-2020-27252.json b/2020/CVE-2020-27252.json
index 48f07ef715..5997fc2067 100644
--- a/2020/CVE-2020-27252.json
+++ b/2020/CVE-2020-27252.json
@@ -14,7 +14,7 @@
"fork": false,
"created_at": "2024-05-17T20:35:56Z",
"updated_at": "2024-05-17T21:18:30Z",
- "pushed_at": "2024-05-17T21:18:26Z",
+ "pushed_at": "2024-09-24T01:04:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
diff --git a/2020/CVE-2020-29661.json b/2020/CVE-2020-29661.json
index d39ed4d51f..b1f2059644 100644
--- a/2020/CVE-2020-29661.json
+++ b/2020/CVE-2020-29661.json
@@ -28,5 +28,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 860306318,
+ "name": "CVE-2020-29661",
+ "full_name": "TLD1027\/CVE-2020-29661",
+ "owner": {
+ "login": "TLD1027",
+ "id": 103564619,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103564619?v=4",
+ "html_url": "https:\/\/github.com\/TLD1027"
+ },
+ "html_url": "https:\/\/github.com\/TLD1027\/CVE-2020-29661",
+ "description": "Using Dirty Pagetable technology to reproduce CVE-2020-29661",
+ "fork": false,
+ "created_at": "2024-09-20T07:37:31Z",
+ "updated_at": "2024-09-23T06:44:37Z",
+ "pushed_at": "2024-09-23T06:44:34Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-35489.json b/2020/CVE-2020-35489.json
index bfd15fbe72..10d8ba4b0b 100644
--- a/2020/CVE-2020-35489.json
+++ b/2020/CVE-2020-35489.json
@@ -135,5 +135,42 @@
"watchers": 1,
"score": 0,
"subscribers_count": 0
+ },
+ {
+ "id": 860180787,
+ "name": "poc-CVE-2020-35489",
+ "full_name": "aifuzzer\/poc-CVE-2020-35489",
+ "owner": {
+ "login": "aifuzzer",
+ "id": 182179612,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/182179612?v=4",
+ "html_url": "https:\/\/github.com\/aifuzzer"
+ },
+ "html_url": "https:\/\/github.com\/aifuzzer\/poc-CVE-2020-35489",
+ "description": "Harnessing AI to hack the limits of possibility",
+ "fork": false,
+ "created_at": "2024-09-20T01:10:48Z",
+ "updated_at": "2024-09-24T00:56:47Z",
+ "pushed_at": "2024-09-20T23:17:48Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "ai",
+ "kali",
+ "pentest",
+ "poc",
+ "redteam",
+ "reverseengineering"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 4,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2020/CVE-2020-36179.json b/2020/CVE-2020-36179.json
index c7c7aa5c23..545c49a19e 100644
--- a/2020/CVE-2020-36179.json
+++ b/2020/CVE-2020-36179.json
@@ -13,10 +13,10 @@
"description": "CVE-2020-36179~82 Jackson-databind SSRF&RCE",
"fork": false,
"created_at": "2021-01-10T06:47:49Z",
- "updated_at": "2024-09-14T08:55:11Z",
+ "updated_at": "2024-09-19T04:00:04Z",
"pushed_at": "2021-01-10T06:48:53Z",
- "stargazers_count": 79,
- "watchers_count": 79,
+ "stargazers_count": 80,
+ "watchers_count": 80,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 9,
- "watchers": 79,
+ "watchers": 80,
"score": 0,
"subscribers_count": 3
}
diff --git a/2020/CVE-2020-3952.json b/2020/CVE-2020-3952.json
index 7789295835..5aca6f04c3 100644
--- a/2020/CVE-2020-3952.json
+++ b/2020/CVE-2020-3952.json
@@ -73,7 +73,7 @@
"description": "Exploit for CVE-2020-3952 in vCenter 6.7",
"fork": false,
"created_at": "2020-04-16T07:40:51Z",
- "updated_at": "2024-08-20T11:03:19Z",
+ "updated_at": "2024-09-19T11:52:38Z",
"pushed_at": "2020-04-16T08:38:42Z",
"stargazers_count": 271,
"watchers_count": 271,
diff --git a/2020/CVE-2020-3956.json b/2020/CVE-2020-3956.json
index 6b1f61d51e..8506eaa5b8 100644
--- a/2020/CVE-2020-3956.json
+++ b/2020/CVE-2020-3956.json
@@ -13,10 +13,10 @@
"description": "PoC exploit for VMware Cloud Director RCE (CVE-2020-3956)",
"fork": false,
"created_at": "2020-06-01T18:26:32Z",
- "updated_at": "2024-08-12T20:02:09Z",
+ "updated_at": "2024-09-17T19:26:13Z",
"pushed_at": "2020-06-02T08:30:22Z",
- "stargazers_count": 90,
- "watchers_count": 90,
+ "stargazers_count": 89,
+ "watchers_count": 89,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
- "watchers": 90,
+ "watchers": 89,
"score": 0,
"subscribers_count": 4
}
diff --git a/2020/CVE-2020-6418.json b/2020/CVE-2020-6418.json
index 7246b0d1bd..be8d525640 100644
--- a/2020/CVE-2020-6418.json
+++ b/2020/CVE-2020-6418.json
@@ -13,10 +13,10 @@
"description": "PoC of CVE",
"fork": false,
"created_at": "2020-02-27T08:18:56Z",
- "updated_at": "2024-08-12T19:58:10Z",
+ "updated_at": "2024-09-24T03:41:10Z",
"pushed_at": "2020-03-08T05:53:47Z",
- "stargazers_count": 23,
- "watchers_count": 23,
+ "stargazers_count": 24,
+ "watchers_count": 24,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
- "watchers": 23,
+ "watchers": 24,
"score": 0,
"subscribers_count": 3
},
diff --git a/2020/CVE-2020-7931.json b/2020/CVE-2020-7931.json
index 988411502e..684ff5e98d 100644
--- a/2020/CVE-2020-7931.json
+++ b/2020/CVE-2020-7931.json
@@ -13,10 +13,10 @@
"description": "Hacking Artifactory with server side template injection",
"fork": false,
"created_at": "2020-03-11T13:56:43Z",
- "updated_at": "2024-08-12T19:58:37Z",
+ "updated_at": "2024-09-19T20:52:51Z",
"pushed_at": "2020-03-12T06:55:39Z",
- "stargazers_count": 50,
- "watchers_count": 50,
+ "stargazers_count": 51,
+ "watchers_count": 51,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 15,
- "watchers": 50,
+ "watchers": 51,
"score": 0,
"subscribers_count": 4
}
diff --git a/2020/CVE-2020-8558.json b/2020/CVE-2020-8558.json
index 9f78370858..443a324094 100644
--- a/2020/CVE-2020-8558.json
+++ b/2020/CVE-2020-8558.json
@@ -43,7 +43,7 @@
"description": "Crafting raw TCP\/IP packets to send to poorly configured servers - CVE-2020-8558 PoC",
"fork": false,
"created_at": "2020-07-17T14:59:55Z",
- "updated_at": "2021-05-28T10:33:39Z",
+ "updated_at": "2024-09-20T20:00:50Z",
"pushed_at": "2020-07-29T12:55:48Z",
"stargazers_count": 3,
"watchers_count": 3,
diff --git a/2020/CVE-2020-9375.json b/2020/CVE-2020-9375.json
index cd0a8e8bad..0a00ce5322 100644
--- a/2020/CVE-2020-9375.json
+++ b/2020/CVE-2020-9375.json
@@ -13,10 +13,10 @@
"description": "TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Header containing an unexpected Referer field.",
"fork": false,
"created_at": "2020-03-25T18:18:15Z",
- "updated_at": "2024-08-12T19:59:15Z",
+ "updated_at": "2024-09-20T07:02:44Z",
"pushed_at": "2020-03-29T20:32:16Z",
- "stargazers_count": 16,
- "watchers_count": 16,
+ "stargazers_count": 17,
+ "watchers_count": 17,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 7,
- "watchers": 16,
+ "watchers": 17,
"score": 0,
"subscribers_count": 3
}
diff --git a/2020/CVE-2020-9484.json b/2020/CVE-2020-9484.json
index 74e5314514..8b313a5547 100644
--- a/2020/CVE-2020-9484.json
+++ b/2020/CVE-2020-9484.json
@@ -476,10 +476,10 @@
"description": "Remake of CVE-2020-9484 by Pentestical",
"fork": false,
"created_at": "2024-09-16T18:17:52Z",
- "updated_at": "2024-09-17T01:36:03Z",
+ "updated_at": "2024-09-19T12:23:35Z",
"pushed_at": "2024-09-16T18:22:36Z",
- "stargazers_count": 3,
- "watchers_count": 3,
+ "stargazers_count": 8,
+ "watchers_count": 8,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -488,7 +488,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 3,
+ "watchers": 8,
"score": 0,
"subscribers_count": 1
}
diff --git a/2021/CVE-2021-1675.json b/2021/CVE-2021-1675.json
index f3c041a265..adc1af1d38 100644
--- a/2021/CVE-2021-1675.json
+++ b/2021/CVE-2021-1675.json
@@ -43,10 +43,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
- "updated_at": "2024-09-16T06:09:31Z",
+ "updated_at": "2024-09-21T18:16:55Z",
"pushed_at": "2021-07-20T15:28:13Z",
- "stargazers_count": 1830,
- "watchers_count": 1830,
+ "stargazers_count": 1831,
+ "watchers_count": 1831,
"has_discussions": false,
"forks_count": 582,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 582,
- "watchers": 1830,
+ "watchers": 1831,
"score": 0,
"subscribers_count": 44
},
@@ -172,10 +172,10 @@
"description": "Local Privilege Escalation Edition for CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-07-01T09:47:13Z",
- "updated_at": "2024-08-12T20:14:21Z",
+ "updated_at": "2024-09-19T12:06:30Z",
"pushed_at": "2021-07-05T06:46:12Z",
- "stargazers_count": 329,
- "watchers_count": 329,
+ "stargazers_count": 330,
+ "watchers_count": 330,
"has_discussions": false,
"forks_count": 79,
"allow_forking": true,
@@ -193,7 +193,7 @@
],
"visibility": "public",
"forks": 79,
- "watchers": 329,
+ "watchers": 330,
"score": 0,
"subscribers_count": 14
},
@@ -301,10 +301,10 @@
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
"fork": false,
"created_at": "2021-07-01T23:45:58Z",
- "updated_at": "2024-09-16T23:41:24Z",
+ "updated_at": "2024-09-23T12:46:04Z",
"pushed_at": "2021-07-05T08:54:06Z",
- "stargazers_count": 1001,
- "watchers_count": 1001,
+ "stargazers_count": 1002,
+ "watchers_count": 1002,
"has_discussions": false,
"forks_count": 231,
"allow_forking": true,
@@ -313,7 +313,7 @@
"topics": [],
"visibility": "public",
"forks": 231,
- "watchers": 1001,
+ "watchers": 1002,
"score": 0,
"subscribers_count": 27
},
@@ -942,10 +942,10 @@
"description": "PrintNightMare LPE提权漏洞的CS 反射加载插件。开箱即用、通过内存加载、混淆加载的驱动名称来ByPass Defender\/EDR。",
"fork": false,
"created_at": "2021-09-01T11:25:04Z",
- "updated_at": "2024-09-10T03:16:31Z",
+ "updated_at": "2024-09-21T12:07:12Z",
"pushed_at": "2021-09-01T11:25:22Z",
- "stargazers_count": 145,
- "watchers_count": 145,
+ "stargazers_count": 147,
+ "watchers_count": 147,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@@ -954,7 +954,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
- "watchers": 145,
+ "watchers": 147,
"score": 0,
"subscribers_count": 7
},
@@ -977,7 +977,7 @@
"stargazers_count": 178,
"watchers_count": 178,
"has_discussions": false,
- "forks_count": 31,
+ "forks_count": 29,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -986,7 +986,7 @@
"cve-2021-34527"
],
"visibility": "public",
- "forks": 31,
+ "forks": 29,
"watchers": 178,
"score": 0,
"subscribers_count": 6
diff --git a/2021/CVE-2021-1732.json b/2021/CVE-2021-1732.json
index b2ee78be25..66ae66e4cb 100644
--- a/2021/CVE-2021-1732.json
+++ b/2021/CVE-2021-1732.json
@@ -13,10 +13,10 @@
"description": "CVE-2021-1732 Exploit",
"fork": false,
"created_at": "2021-03-05T02:11:10Z",
- "updated_at": "2024-09-09T12:34:13Z",
+ "updated_at": "2024-09-21T18:16:53Z",
"pushed_at": "2021-03-05T03:10:26Z",
- "stargazers_count": 415,
- "watchers_count": 415,
+ "stargazers_count": 414,
+ "watchers_count": 414,
"has_discussions": false,
"forks_count": 130,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 130,
- "watchers": 415,
+ "watchers": 414,
"score": 0,
"subscribers_count": 6
},
diff --git a/2021/CVE-2021-1748.json b/2021/CVE-2021-1748.json
index bd797a5e6e..31ef5cf7d9 100644
--- a/2021/CVE-2021-1748.json
+++ b/2021/CVE-2021-1748.json
@@ -18,13 +18,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
- "forks_count": 3,
+ "forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 3,
+ "forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 0
@@ -43,18 +43,18 @@
"description": "Backporting CVE-2021-1748 patch for iOS <=14.3",
"fork": false,
"created_at": "2021-09-03T22:48:11Z",
- "updated_at": "2024-08-12T20:16:08Z",
+ "updated_at": "2024-09-23T03:16:22Z",
"pushed_at": "2021-09-03T22:50:08Z",
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
- "forks_count": 7,
+ "forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 7,
+ "forks": 6,
"watchers": 21,
"score": 0,
"subscribers_count": 5
diff --git a/2021/CVE-2021-20038.json b/2021/CVE-2021-20038.json
index c505d2063a..2365f679d6 100644
--- a/2021/CVE-2021-20038.json
+++ b/2021/CVE-2021-20038.json
@@ -13,10 +13,10 @@
"description": "SonicWall SMA-100 Unauth RCE Exploit (CVE-2021-20038)",
"fork": false,
"created_at": "2022-01-11T02:25:25Z",
- "updated_at": "2024-08-12T20:19:39Z",
+ "updated_at": "2024-09-19T02:43:52Z",
"pushed_at": "2022-01-11T11:22:06Z",
- "stargazers_count": 91,
- "watchers_count": 91,
+ "stargazers_count": 92,
+ "watchers_count": 92,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 27,
- "watchers": 91,
+ "watchers": 92,
"score": 0,
"subscribers_count": 4
},
diff --git a/2021/CVE-2021-21123.json b/2021/CVE-2021-21123.json
index 6de45d0455..8480242d65 100644
--- a/2021/CVE-2021-21123.json
+++ b/2021/CVE-2021-21123.json
@@ -13,12 +13,12 @@
"description": "🐱💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...",
"fork": false,
"created_at": "2021-03-22T11:53:57Z",
- "updated_at": "2024-08-12T20:11:26Z",
+ "updated_at": "2024-09-22T20:27:40Z",
"pushed_at": "2021-03-22T18:24:20Z",
- "stargazers_count": 164,
- "watchers_count": 164,
+ "stargazers_count": 165,
+ "watchers_count": 165,
"has_discussions": false,
- "forks_count": 29,
+ "forks_count": 27,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -39,8 +39,8 @@
"writeups"
],
"visibility": "public",
- "forks": 29,
- "watchers": 164,
+ "forks": 27,
+ "watchers": 165,
"score": 0,
"subscribers_count": 4
}
diff --git a/2021/CVE-2021-21972.json b/2021/CVE-2021-21972.json
index 6da201a76d..62a57d2145 100644
--- a/2021/CVE-2021-21972.json
+++ b/2021/CVE-2021-21972.json
@@ -696,10 +696,10 @@
"description": "POC exploit for CVE-2021-21972",
"fork": false,
"created_at": "2021-04-22T14:00:38Z",
- "updated_at": "2024-08-26T18:25:34Z",
+ "updated_at": "2024-09-18T22:47:22Z",
"pushed_at": "2022-07-21T20:14:19Z",
- "stargazers_count": 4,
- "watchers_count": 4,
+ "stargazers_count": 3,
+ "watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -708,7 +708,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 4,
+ "watchers": 3,
"score": 0,
"subscribers_count": 1
},
@@ -851,12 +851,12 @@
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
- "updated_at": "2024-09-14T13:21:44Z",
+ "updated_at": "2024-09-24T06:01:16Z",
"pushed_at": "2024-04-25T06:09:38Z",
- "stargazers_count": 1309,
- "watchers_count": 1309,
+ "stargazers_count": 1311,
+ "watchers_count": 1311,
"has_discussions": false,
- "forks_count": 165,
+ "forks_count": 163,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -869,8 +869,8 @@
"vcenter"
],
"visibility": "public",
- "forks": 165,
- "watchers": 1309,
+ "forks": 163,
+ "watchers": 1311,
"score": 0,
"subscribers_count": 15
}
diff --git a/2021/CVE-2021-21985.json b/2021/CVE-2021-21985.json
index a13b62a4f9..fd4e6e917f 100644
--- a/2021/CVE-2021-21985.json
+++ b/2021/CVE-2021-21985.json
@@ -43,7 +43,7 @@
"description": null,
"fork": false,
"created_at": "2021-05-29T13:07:14Z",
- "updated_at": "2024-08-17T01:41:28Z",
+ "updated_at": "2024-09-19T11:52:59Z",
"pushed_at": "2023-01-19T16:24:33Z",
"stargazers_count": 214,
"watchers_count": 214,
diff --git a/2021/CVE-2021-22205.json b/2021/CVE-2021-22205.json
index 11463783d2..d98e8b5957 100644
--- a/2021/CVE-2021-22205.json
+++ b/2021/CVE-2021-22205.json
@@ -92,18 +92,18 @@
{
"id": 422439214,
"name": "CVE-2021-22205",
- "full_name": "antx-code\/CVE-2021-22205",
+ "full_name": "ZZ-SOCMAP\/CVE-2021-22205",
"owner": {
- "login": "antx-code",
- "id": 7877940,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7877940?v=4",
- "html_url": "https:\/\/github.com\/antx-code"
+ "login": "ZZ-SOCMAP",
+ "id": 98105412,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98105412?v=4",
+ "html_url": "https:\/\/github.com\/ZZ-SOCMAP"
},
- "html_url": "https:\/\/github.com\/antx-code\/CVE-2021-22205",
+ "html_url": "https:\/\/github.com\/ZZ-SOCMAP\/CVE-2021-22205",
"description": "Gitlab CE\/EE RCE 未授权远程代码执行漏洞 POC && EXP CVE-2021-22205",
"fork": false,
"created_at": "2021-10-29T04:15:00Z",
- "updated_at": "2024-08-12T20:17:37Z",
+ "updated_at": "2024-09-19T01:57:43Z",
"pushed_at": "2021-11-04T02:17:54Z",
"stargazers_count": 7,
"watchers_count": 7,
@@ -443,10 +443,10 @@
"description": "GitLab CE\/EE Preauth RCE using ExifTool",
"fork": false,
"created_at": "2021-11-11T04:34:07Z",
- "updated_at": "2024-08-12T20:17:59Z",
+ "updated_at": "2024-09-21T10:36:25Z",
"pushed_at": "2022-01-16T15:54:14Z",
- "stargazers_count": 217,
- "watchers_count": 217,
+ "stargazers_count": 218,
+ "watchers_count": 218,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@@ -462,7 +462,7 @@
],
"visibility": "public",
"forks": 39,
- "watchers": 217,
+ "watchers": 218,
"score": 0,
"subscribers_count": 2
},
diff --git a/2021/CVE-2021-22214.json b/2021/CVE-2021-22214.json
index 3e809bb172..41df72a227 100644
--- a/2021/CVE-2021-22214.json
+++ b/2021/CVE-2021-22214.json
@@ -62,18 +62,18 @@
{
"id": 423332466,
"name": "CVE-2021-22214",
- "full_name": "antx-code\/CVE-2021-22214",
+ "full_name": "ZZ-SOCMAP\/CVE-2021-22214",
"owner": {
- "login": "antx-code",
- "id": 7877940,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7877940?v=4",
- "html_url": "https:\/\/github.com\/antx-code"
+ "login": "ZZ-SOCMAP",
+ "id": 98105412,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98105412?v=4",
+ "html_url": "https:\/\/github.com\/ZZ-SOCMAP"
},
- "html_url": "https:\/\/github.com\/antx-code\/CVE-2021-22214",
+ "html_url": "https:\/\/github.com\/ZZ-SOCMAP\/CVE-2021-22214",
"description": "Gitlab CI Lint API未授权 SSRF漏洞 CVE-2021-22214",
"fork": false,
"created_at": "2021-11-01T04:04:42Z",
- "updated_at": "2024-08-12T20:17:42Z",
+ "updated_at": "2024-09-19T01:57:21Z",
"pushed_at": "2021-11-04T02:21:28Z",
"stargazers_count": 10,
"watchers_count": 10,
@@ -88,43 +88,5 @@
"watchers": 10,
"score": 0,
"subscribers_count": 0
- },
- {
- "id": 444302213,
- "name": "GitLab-SSRF-CVE-2021-22214",
- "full_name": "kh4sh3i\/GitLab-SSRF-CVE-2021-22214",
- "owner": {
- "login": "kh4sh3i",
- "id": 64693844,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64693844?v=4",
- "html_url": "https:\/\/github.com\/kh4sh3i"
- },
- "html_url": "https:\/\/github.com\/kh4sh3i\/GitLab-SSRF-CVE-2021-22214",
- "description": "POC for CVE-2021-22214: Gitlab SSRF",
- "fork": false,
- "created_at": "2022-01-04T05:52:57Z",
- "updated_at": "2023-07-24T16:43:55Z",
- "pushed_at": "2022-01-04T12:10:32Z",
- "stargazers_count": 2,
- "watchers_count": 2,
- "has_discussions": false,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [
- "cve",
- "git",
- "gitlab",
- "poc",
- "ssrf",
- "ssrf-payload",
- "ssrf-tool"
- ],
- "visibility": "public",
- "forks": 0,
- "watchers": 2,
- "score": 0,
- "subscribers_count": 2
}
]
\ No newline at end of file
diff --git a/2021/CVE-2021-22986.json b/2021/CVE-2021-22986.json
index b682cc14bc..b85c5158a0 100644
--- a/2021/CVE-2021-22986.json
+++ b/2021/CVE-2021-22986.json
@@ -165,10 +165,10 @@
"description": "CVE-2021-22986 & F5 BIG-IP RCE",
"fork": false,
"created_at": "2021-03-22T07:13:50Z",
- "updated_at": "2024-08-12T20:11:25Z",
+ "updated_at": "2024-09-20T18:32:53Z",
"pushed_at": "2021-04-03T12:56:37Z",
- "stargazers_count": 88,
- "watchers_count": 88,
+ "stargazers_count": 89,
+ "watchers_count": 89,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@@ -180,7 +180,7 @@
],
"visibility": "public",
"forks": 33,
- "watchers": 88,
+ "watchers": 89,
"score": 0,
"subscribers_count": 5
},
diff --git a/2021/CVE-2021-26084.json b/2021/CVE-2021-26084.json
index 240d843413..57953d0b28 100644
--- a/2021/CVE-2021-26084.json
+++ b/2021/CVE-2021-26084.json
@@ -133,10 +133,10 @@
"description": "Confluence Server Webwork OGNL injection",
"fork": false,
"created_at": "2021-09-01T07:15:17Z",
- "updated_at": "2024-08-19T06:04:57Z",
+ "updated_at": "2024-09-23T14:04:41Z",
"pushed_at": "2021-12-03T22:09:31Z",
- "stargazers_count": 305,
- "watchers_count": 305,
+ "stargazers_count": 306,
+ "watchers_count": 306,
"has_discussions": false,
"forks_count": 81,
"allow_forking": true,
@@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 81,
- "watchers": 305,
+ "watchers": 306,
"score": 0,
"subscribers_count": 2
},
@@ -193,10 +193,10 @@
"description": "CVE-2021-26084 Remote Code Execution on Confluence Servers",
"fork": false,
"created_at": "2021-09-01T09:50:26Z",
- "updated_at": "2024-08-12T20:16:04Z",
+ "updated_at": "2024-09-23T14:06:28Z",
"pushed_at": "2022-02-10T11:38:46Z",
- "stargazers_count": 68,
- "watchers_count": 68,
+ "stargazers_count": 69,
+ "watchers_count": 69,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@@ -205,7 +205,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
- "watchers": 68,
+ "watchers": 69,
"score": 0,
"subscribers_count": 3
},
@@ -1056,18 +1056,18 @@
{
"id": 447489190,
"name": "CVE-2021-26084",
- "full_name": "antx-code\/CVE-2021-26084",
+ "full_name": "ZZ-SOCMAP\/CVE-2021-26084",
"owner": {
- "login": "antx-code",
- "id": 7877940,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7877940?v=4",
- "html_url": "https:\/\/github.com\/antx-code"
+ "login": "ZZ-SOCMAP",
+ "id": 98105412,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98105412?v=4",
+ "html_url": "https:\/\/github.com\/ZZ-SOCMAP"
},
- "html_url": "https:\/\/github.com\/antx-code\/CVE-2021-26084",
+ "html_url": "https:\/\/github.com\/ZZ-SOCMAP\/CVE-2021-26084",
"description": "POC of CVE-2021-26084, which is Atlassian Confluence Server OGNL(Object-Graph Navigation Language) Pre-Auth RCE Injection Vulneralibity.",
"fork": false,
"created_at": "2022-01-13T06:29:51Z",
- "updated_at": "2024-08-12T20:19:42Z",
+ "updated_at": "2024-09-19T01:54:41Z",
"pushed_at": "2022-01-14T04:21:27Z",
"stargazers_count": 8,
"watchers_count": 8,
@@ -1160,19 +1160,19 @@
"description": "confluence rce (CVE-2021-26084, CVE-2022-26134, CVE-2023-22527)",
"fork": false,
"created_at": "2024-05-29T03:20:22Z",
- "updated_at": "2024-08-26T09:24:34Z",
+ "updated_at": "2024-09-22T06:25:09Z",
"pushed_at": "2024-08-26T09:24:31Z",
- "stargazers_count": 2,
- "watchers_count": 2,
+ "stargazers_count": 3,
+ "watchers_count": 3,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
- "watchers": 2,
+ "forks": 1,
+ "watchers": 3,
"score": 0,
"subscribers_count": 1
}
diff --git a/2021/CVE-2021-26088.json b/2021/CVE-2021-26088.json
index 587a986308..d2c677af5b 100644
--- a/2021/CVE-2021-26088.json
+++ b/2021/CVE-2021-26088.json
@@ -13,10 +13,10 @@
"description": "PoC for CVE-2021-26088 written in PowerShell",
"fork": false,
"created_at": "2023-05-09T13:13:41Z",
- "updated_at": "2023-06-04T18:20:35Z",
+ "updated_at": "2024-09-17T21:56:55Z",
"pushed_at": "2023-05-09T13:18:45Z",
- "stargazers_count": 2,
- "watchers_count": 2,
+ "stargazers_count": 3,
+ "watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
- "watchers": 2,
+ "watchers": 3,
"score": 0,
"subscribers_count": 1
}
diff --git a/2021/CVE-2021-26855.json b/2021/CVE-2021-26855.json
index 5bb5d4d7c4..5220546c0e 100644
--- a/2021/CVE-2021-26855.json
+++ b/2021/CVE-2021-26855.json
@@ -483,14 +483,14 @@
{
"id": 346816198,
"name": "CVE-2021-26855",
- "full_name": "raheel0x01\/CVE-2021-26855",
+ "full_name": "r0xdeadbeef\/CVE-2021-26855",
"owner": {
- "login": "raheel0x01",
+ "login": "r0xdeadbeef",
"id": 65211256,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65211256?v=4",
- "html_url": "https:\/\/github.com\/raheel0x01"
+ "html_url": "https:\/\/github.com\/r0xdeadbeef"
},
- "html_url": "https:\/\/github.com\/raheel0x01\/CVE-2021-26855",
+ "html_url": "https:\/\/github.com\/r0xdeadbeef\/CVE-2021-26855",
"description": " CVE-2021-26855, also known as Proxylogon, is a server-side request forgery (SSRF) vulnerability in Exchange that allows an attacker to send arbitrary HTTP requests and authenticate as the Exchange server.",
"fork": false,
"created_at": "2021-03-11T19:35:35Z",
@@ -1100,7 +1100,7 @@
"description": "C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection ",
"fork": false,
"created_at": "2021-03-29T21:10:34Z",
- "updated_at": "2024-08-12T20:11:40Z",
+ "updated_at": "2024-09-19T11:52:57Z",
"pushed_at": "2021-03-31T11:57:38Z",
"stargazers_count": 237,
"watchers_count": 237,
diff --git a/2021/CVE-2021-26943.json b/2021/CVE-2021-26943.json
index 6768fa629f..6594a5bc2f 100644
--- a/2021/CVE-2021-26943.json
+++ b/2021/CVE-2021-26943.json
@@ -13,10 +13,10 @@
"description": "The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.",
"fork": false,
"created_at": "2020-12-31T16:30:02Z",
- "updated_at": "2024-09-15T03:40:09Z",
+ "updated_at": "2024-09-18T22:47:19Z",
"pushed_at": "2021-03-29T12:33:38Z",
- "stargazers_count": 134,
- "watchers_count": 134,
+ "stargazers_count": 133,
+ "watchers_count": 133,
"has_discussions": true,
"forks_count": 23,
"allow_forking": true,
@@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 23,
- "watchers": 134,
+ "watchers": 133,
"score": 0,
"subscribers_count": 11
}
diff --git a/2021/CVE-2021-28164.json b/2021/CVE-2021-28164.json
index 634fa9916a..043358cbf9 100644
--- a/2021/CVE-2021-28164.json
+++ b/2021/CVE-2021-28164.json
@@ -13,8 +13,8 @@
"description": "jetty \/CVE-2021-28164\/분석 및 결과",
"fork": false,
"created_at": "2023-10-31T14:59:29Z",
- "updated_at": "2023-10-31T14:59:30Z",
- "pushed_at": "2023-10-31T16:01:00Z",
+ "updated_at": "2024-09-23T13:59:47Z",
+ "pushed_at": "2024-09-23T13:59:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
diff --git a/2021/CVE-2021-30860.json b/2021/CVE-2021-30860.json
index e190148afc..26c4a01ff5 100644
--- a/2021/CVE-2021-30860.json
+++ b/2021/CVE-2021-30860.json
@@ -43,10 +43,10 @@
"description": "Collection of materials relating to FORCEDENTRY",
"fork": false,
"created_at": "2021-12-25T03:00:01Z",
- "updated_at": "2024-08-30T23:43:53Z",
+ "updated_at": "2024-09-23T15:54:25Z",
"pushed_at": "2024-03-30T22:17:05Z",
- "stargazers_count": 91,
- "watchers_count": 91,
+ "stargazers_count": 92,
+ "watchers_count": 92,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
- "watchers": 91,
+ "watchers": 92,
"score": 0,
"subscribers_count": 5
}
diff --git a/2021/CVE-2021-31166.json b/2021/CVE-2021-31166.json
index d040485a38..7d572f4ed9 100644
--- a/2021/CVE-2021-31166.json
+++ b/2021/CVE-2021-31166.json
@@ -13,10 +13,10 @@
"description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
"fork": false,
"created_at": "2021-05-16T16:15:56Z",
- "updated_at": "2024-09-06T06:55:54Z",
+ "updated_at": "2024-09-20T22:07:55Z",
"pushed_at": "2021-06-12T08:27:09Z",
- "stargazers_count": 825,
- "watchers_count": 825,
+ "stargazers_count": 824,
+ "watchers_count": 824,
"has_discussions": false,
"forks_count": 139,
"allow_forking": true,
@@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 139,
- "watchers": 825,
+ "watchers": 824,
"score": 0,
"subscribers_count": 24
},
@@ -233,18 +233,18 @@
{
"id": 410758909,
"name": "CVE-2021-31166",
- "full_name": "antx-code\/CVE-2021-31166",
+ "full_name": "ZZ-SOCMAP\/CVE-2021-31166",
"owner": {
- "login": "antx-code",
- "id": 7877940,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7877940?v=4",
- "html_url": "https:\/\/github.com\/antx-code"
+ "login": "ZZ-SOCMAP",
+ "id": 98105412,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98105412?v=4",
+ "html_url": "https:\/\/github.com\/ZZ-SOCMAP"
},
- "html_url": "https:\/\/github.com\/antx-code\/CVE-2021-31166",
+ "html_url": "https:\/\/github.com\/ZZ-SOCMAP\/CVE-2021-31166",
"description": "Windows HTTP协议栈远程代码执行漏洞 CVE-2021-31166",
"fork": false,
"created_at": "2021-09-27T05:56:45Z",
- "updated_at": "2024-09-06T12:31:37Z",
+ "updated_at": "2024-09-19T01:56:46Z",
"pushed_at": "2021-11-04T02:23:11Z",
"stargazers_count": 19,
"watchers_count": 19,
diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json
index 74e7ab6392..7f3bb8fd01 100644
--- a/2021/CVE-2021-3129.json
+++ b/2021/CVE-2021-3129.json
@@ -197,10 +197,10 @@
"description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)",
"fork": false,
"created_at": "2021-02-18T05:42:13Z",
- "updated_at": "2024-08-29T09:49:27Z",
+ "updated_at": "2024-09-18T11:44:58Z",
"pushed_at": "2021-12-14T05:12:17Z",
- "stargazers_count": 144,
- "watchers_count": 144,
+ "stargazers_count": 145,
+ "watchers_count": 145,
"has_discussions": false,
"forks_count": 62,
"allow_forking": true,
@@ -209,7 +209,7 @@
"topics": [],
"visibility": "public",
"forks": 62,
- "watchers": 144,
+ "watchers": 145,
"score": 0,
"subscribers_count": 1
},
@@ -347,10 +347,10 @@
"description": "Laravel RCE Exploit Script (CVE-2021-3129) (Python)",
"fork": false,
"created_at": "2022-04-16T17:22:55Z",
- "updated_at": "2024-09-05T08:06:24Z",
- "pushed_at": "2024-09-04T11:53:59Z",
- "stargazers_count": 78,
- "watchers_count": 78,
+ "updated_at": "2024-09-22T13:52:12Z",
+ "pushed_at": "2024-09-22T13:10:27Z",
+ "stargazers_count": 79,
+ "watchers_count": 79,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@@ -374,7 +374,7 @@
],
"visibility": "public",
"forks": 18,
- "watchers": 78,
+ "watchers": 79,
"score": 0,
"subscribers_count": 1
},
diff --git a/2021/CVE-2021-3156.json b/2021/CVE-2021-3156.json
index c225197df1..83d3b1a4db 100644
--- a/2021/CVE-2021-3156.json
+++ b/2021/CVE-2021-3156.json
@@ -18,13 +18,13 @@
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
- "forks_count": 32,
+ "forks_count": 31,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 32,
+ "forks": 31,
"watchers": 34,
"score": 0,
"subscribers_count": 10
@@ -470,10 +470,10 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
- "updated_at": "2024-09-11T12:45:47Z",
+ "updated_at": "2024-09-24T05:32:13Z",
"pushed_at": "2021-02-02T17:07:09Z",
- "stargazers_count": 943,
- "watchers_count": 943,
+ "stargazers_count": 945,
+ "watchers_count": 945,
"has_discussions": false,
"forks_count": 237,
"allow_forking": true,
@@ -482,7 +482,7 @@
"topics": [],
"visibility": "public",
"forks": 237,
- "watchers": 943,
+ "watchers": 945,
"score": 0,
"subscribers_count": 27
},
@@ -804,10 +804,10 @@
"description": "Root shell PoC for CVE-2021-3156",
"fork": false,
"created_at": "2021-02-03T19:57:56Z",
- "updated_at": "2024-09-05T08:30:25Z",
+ "updated_at": "2024-09-17T20:37:59Z",
"pushed_at": "2022-02-13T12:21:53Z",
- "stargazers_count": 142,
- "watchers_count": 142,
+ "stargazers_count": 143,
+ "watchers_count": 143,
"has_discussions": false,
"forks_count": 61,
"allow_forking": true,
@@ -816,7 +816,7 @@
"topics": [],
"visibility": "public",
"forks": 61,
- "watchers": 142,
+ "watchers": 143,
"score": 0,
"subscribers_count": 1
},
@@ -894,10 +894,10 @@
"description": "CVE-2021-3156: Sudo heap overflow exploit for Debian 10",
"fork": false,
"created_at": "2021-02-08T18:21:58Z",
- "updated_at": "2024-08-12T20:10:12Z",
+ "updated_at": "2024-09-18T23:14:12Z",
"pushed_at": "2021-12-03T14:34:18Z",
- "stargazers_count": 50,
- "watchers_count": 50,
+ "stargazers_count": 51,
+ "watchers_count": 51,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@@ -906,7 +906,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
- "watchers": 50,
+ "watchers": 51,
"score": 0,
"subscribers_count": 1
},
@@ -1074,10 +1074,10 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
- "updated_at": "2024-09-09T09:03:33Z",
+ "updated_at": "2024-09-19T01:50:03Z",
"pushed_at": "2022-01-13T05:48:01Z",
- "stargazers_count": 731,
- "watchers_count": 731,
+ "stargazers_count": 733,
+ "watchers_count": 733,
"has_discussions": false,
"forks_count": 167,
"allow_forking": true,
@@ -1086,7 +1086,7 @@
"topics": [],
"visibility": "public",
"forks": 167,
- "watchers": 731,
+ "watchers": 733,
"score": 0,
"subscribers_count": 11
},
@@ -1224,10 +1224,10 @@
"description": "CVE-2021-3156 - Sudo Baron Samedit",
"fork": false,
"created_at": "2021-04-29T06:29:26Z",
- "updated_at": "2024-08-17T00:48:44Z",
+ "updated_at": "2024-09-17T20:23:18Z",
"pushed_at": "2022-02-12T19:33:07Z",
- "stargazers_count": 217,
- "watchers_count": 217,
+ "stargazers_count": 218,
+ "watchers_count": 218,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@@ -1236,7 +1236,7 @@
"topics": [],
"visibility": "public",
"forks": 36,
- "watchers": 217,
+ "watchers": 218,
"score": 0,
"subscribers_count": 8
},
@@ -1888,10 +1888,10 @@
"description": "clif is a command-line interface (CLI) application fuzzer, pretty much what wfuzz or ffuf are for web. It was inspired by sudo vulnerability CVE-2021-3156 and the fact that for some reasons, Google's afl-fuzz doesn't allow for unlimited argument or option specification.",
"fork": false,
"created_at": "2022-11-28T12:52:11Z",
- "updated_at": "2024-05-16T19:50:05Z",
+ "updated_at": "2024-09-22T11:07:43Z",
"pushed_at": "2022-12-22T12:38:31Z",
- "stargazers_count": 98,
- "watchers_count": 98,
+ "stargazers_count": 99,
+ "watchers_count": 99,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@@ -1900,7 +1900,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
- "watchers": 98,
+ "watchers": 99,
"score": 0,
"subscribers_count": 2
},
diff --git a/2021/CVE-2021-31630.json b/2021/CVE-2021-31630.json
index 520ad37ca4..b3e9da83b6 100644
--- a/2021/CVE-2021-31630.json
+++ b/2021/CVE-2021-31630.json
@@ -94,6 +94,36 @@
"score": 0,
"subscribers_count": 2
},
+ {
+ "id": 782064396,
+ "name": "htb-wifinetictwo-exploit",
+ "full_name": "behindsecurity\/htb-wifinetictwo-exploit",
+ "owner": {
+ "login": "behindsecurity",
+ "id": 32421959,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32421959?v=4",
+ "html_url": "https:\/\/github.com\/behindsecurity"
+ },
+ "html_url": "https:\/\/github.com\/behindsecurity\/htb-wifinetictwo-exploit",
+ "description": "A simple python script to exploit CVE-2021-31630 on HTB WifineticTwo CTF",
+ "fork": false,
+ "created_at": "2024-04-04T15:12:57Z",
+ "updated_at": "2024-09-18T21:06:48Z",
+ "pushed_at": "2024-04-04T16:29:35Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
{
"id": 786978803,
"name": "CVE-2021-31630",
diff --git a/2021/CVE-2021-33044.json b/2021/CVE-2021-33044.json
index 38345f7a20..6b76f67965 100644
--- a/2021/CVE-2021-33044.json
+++ b/2021/CVE-2021-33044.json
@@ -13,10 +13,10 @@
"description": "Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication.",
"fork": false,
"created_at": "2021-10-11T22:08:47Z",
- "updated_at": "2024-09-10T15:02:50Z",
+ "updated_at": "2024-09-19T23:14:42Z",
"pushed_at": "2021-10-13T22:32:36Z",
- "stargazers_count": 117,
- "watchers_count": 117,
+ "stargazers_count": 118,
+ "watchers_count": 118,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
- "watchers": 117,
+ "watchers": 118,
"score": 0,
"subscribers_count": 8
},
diff --git a/2021/CVE-2021-34527.json b/2021/CVE-2021-34527.json
index 1db51752fb..e205770e9e 100644
--- a/2021/CVE-2021-34527.json
+++ b/2021/CVE-2021-34527.json
@@ -241,13 +241,13 @@
"stargazers_count": 777,
"watchers_count": 777,
"has_discussions": false,
- "forks_count": 118,
+ "forks_count": 119,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 118,
+ "forks": 119,
"watchers": 777,
"score": 0,
"subscribers_count": 10
@@ -618,10 +618,10 @@
"description": "PrintNightmare (CVE-2021-34527) PoC Exploit",
"fork": false,
"created_at": "2022-08-23T20:20:45Z",
- "updated_at": "2024-09-16T06:09:23Z",
+ "updated_at": "2024-09-20T13:49:57Z",
"pushed_at": "2022-12-17T16:10:46Z",
- "stargazers_count": 102,
- "watchers_count": 102,
+ "stargazers_count": 103,
+ "watchers_count": 103,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@@ -630,7 +630,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
- "watchers": 102,
+ "watchers": 103,
"score": 0,
"subscribers_count": 4
},
diff --git a/2021/CVE-2021-3490.json b/2021/CVE-2021-3490.json
index 6f742c003f..9e7b893d10 100644
--- a/2021/CVE-2021-3490.json
+++ b/2021/CVE-2021-3490.json
@@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2021-06-24T18:50:17Z",
- "updated_at": "2024-09-09T13:25:17Z",
+ "updated_at": "2024-09-20T19:36:44Z",
"pushed_at": "2023-07-10T16:41:49Z",
- "stargazers_count": 294,
- "watchers_count": 294,
+ "stargazers_count": 293,
+ "watchers_count": 293,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
- "watchers": 294,
+ "watchers": 293,
"score": 0,
"subscribers_count": 8
},
@@ -43,10 +43,10 @@
"description": null,
"fork": false,
"created_at": "2023-04-06T03:21:11Z",
- "updated_at": "2024-03-26T11:12:27Z",
+ "updated_at": "2024-09-17T20:37:12Z",
"pushed_at": "2023-04-06T03:49:47Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 1,
+ "watchers": 2,
"score": 0,
"subscribers_count": 1
}
diff --git a/2021/CVE-2021-3493.json b/2021/CVE-2021-3493.json
index 1b7e8cb625..c9d18d982d 100644
--- a/2021/CVE-2021-3493.json
+++ b/2021/CVE-2021-3493.json
@@ -169,10 +169,10 @@
"description": "2021 kernel vulnerability in Ubuntu.",
"fork": false,
"created_at": "2021-09-12T12:25:02Z",
- "updated_at": "2024-01-24T23:44:02Z",
+ "updated_at": "2024-09-19T13:21:31Z",
"pushed_at": "2021-09-12T19:54:47Z",
- "stargazers_count": 3,
- "watchers_count": 3,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -181,7 +181,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 3,
+ "watchers": 2,
"score": 0,
"subscribers_count": 1
},
diff --git a/2021/CVE-2021-35587.json b/2021/CVE-2021-35587.json
index 10cde9f78f..37a1fc2bf1 100644
--- a/2021/CVE-2021-35587.json
+++ b/2021/CVE-2021-35587.json
@@ -2,18 +2,18 @@
{
"id": 469587526,
"name": "CVE-2021-35587",
- "full_name": "antx-code\/CVE-2021-35587",
+ "full_name": "ZZ-SOCMAP\/CVE-2021-35587",
"owner": {
- "login": "antx-code",
- "id": 7877940,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7877940?v=4",
- "html_url": "https:\/\/github.com\/antx-code"
+ "login": "ZZ-SOCMAP",
+ "id": 98105412,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98105412?v=4",
+ "html_url": "https:\/\/github.com\/ZZ-SOCMAP"
},
- "html_url": "https:\/\/github.com\/antx-code\/CVE-2021-35587",
+ "html_url": "https:\/\/github.com\/ZZ-SOCMAP\/CVE-2021-35587",
"description": "Oracle Access Manager Unauthenticated Attacker Vulnerability CVE-2021-35587",
"fork": false,
"created_at": "2022-03-14T05:03:54Z",
- "updated_at": "2024-08-12T16:38:01Z",
+ "updated_at": "2024-09-19T01:50:33Z",
"pushed_at": "2022-03-14T05:07:01Z",
"stargazers_count": 40,
"watchers_count": 40,
diff --git a/2021/CVE-2021-36260.json b/2021/CVE-2021-36260.json
index 92ffb6ab00..f4d9491cbd 100644
--- a/2021/CVE-2021-36260.json
+++ b/2021/CVE-2021-36260.json
@@ -43,10 +43,10 @@
"description": "command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.",
"fork": false,
"created_at": "2021-10-27T15:51:12Z",
- "updated_at": "2024-08-25T05:56:45Z",
+ "updated_at": "2024-09-19T16:30:21Z",
"pushed_at": "2021-10-28T06:37:37Z",
- "stargazers_count": 244,
- "watchers_count": 244,
+ "stargazers_count": 246,
+ "watchers_count": 246,
"has_discussions": false,
"forks_count": 75,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 75,
- "watchers": 244,
+ "watchers": 246,
"score": 0,
"subscribers_count": 6
},
diff --git a/2021/CVE-2021-36394.json b/2021/CVE-2021-36394.json
index 0d80e5f90c..6f460203a1 100644
--- a/2021/CVE-2021-36394.json
+++ b/2021/CVE-2021-36394.json
@@ -43,10 +43,10 @@
"description": null,
"fork": false,
"created_at": "2022-04-26T07:52:24Z",
- "updated_at": "2024-08-30T03:37:11Z",
+ "updated_at": "2024-09-19T15:17:07Z",
"pushed_at": "2022-05-02T17:17:16Z",
- "stargazers_count": 8,
- "watchers_count": 8,
+ "stargazers_count": 9,
+ "watchers_count": 9,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
- "watchers": 8,
+ "watchers": 9,
"score": 0,
"subscribers_count": 1
}
diff --git a/2021/CVE-2021-38304.json b/2021/CVE-2021-38304.json
index a0bffb3b3b..1225f4ed00 100644
--- a/2021/CVE-2021-38304.json
+++ b/2021/CVE-2021-38304.json
@@ -13,7 +13,7 @@
"description": "CVE-2021-38304 Proof of Concept",
"fork": false,
"created_at": "2024-09-15T02:33:25Z",
- "updated_at": "2024-09-16T19:16:26Z",
+ "updated_at": "2024-09-17T19:49:15Z",
"pushed_at": "2024-09-15T02:40:21Z",
"stargazers_count": 1,
"watchers_count": 1,
@@ -22,7 +22,11 @@
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
- "topics": [],
+ "topics": [
+ "arbitrary-code-execution",
+ "cve",
+ "kernel-driver"
+ ],
"visibility": "public",
"forks": 0,
"watchers": 1,
diff --git a/2021/CVE-2021-38647.json b/2021/CVE-2021-38647.json
index feef51c53f..60ff9a8a10 100644
--- a/2021/CVE-2021-38647.json
+++ b/2021/CVE-2021-38647.json
@@ -228,10 +228,10 @@
"description": "CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD",
"fork": false,
"created_at": "2021-09-20T16:29:48Z",
- "updated_at": "2024-09-01T02:09:00Z",
+ "updated_at": "2024-09-18T22:47:25Z",
"pushed_at": "2021-09-26T04:37:04Z",
- "stargazers_count": 69,
- "watchers_count": 69,
+ "stargazers_count": 68,
+ "watchers_count": 68,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@@ -240,7 +240,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
- "watchers": 69,
+ "watchers": 68,
"score": 0,
"subscribers_count": 5
},
diff --git a/2021/CVE-2021-4034.json b/2021/CVE-2021-4034.json
index e9a391736a..8302768d4a 100644
--- a/2021/CVE-2021-4034.json
+++ b/2021/CVE-2021-4034.json
@@ -47,18 +47,18 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
- "updated_at": "2024-09-17T18:16:28Z",
+ "updated_at": "2024-09-19T18:48:58Z",
"pushed_at": "2022-06-08T04:00:28Z",
"stargazers_count": 1951,
"watchers_count": 1951,
"has_discussions": false,
- "forks_count": 509,
+ "forks_count": 510,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 509,
+ "forks": 510,
"watchers": 1951,
"score": 0,
"subscribers_count": 21
@@ -137,10 +137,10 @@
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)",
"fork": false,
"created_at": "2022-01-26T00:56:36Z",
- "updated_at": "2024-09-14T13:36:46Z",
+ "updated_at": "2024-09-21T18:27:16Z",
"pushed_at": "2023-05-04T19:24:39Z",
- "stargazers_count": 1046,
- "watchers_count": 1046,
+ "stargazers_count": 1048,
+ "watchers_count": 1048,
"has_discussions": false,
"forks_count": 307,
"allow_forking": true,
@@ -153,7 +153,7 @@
],
"visibility": "public",
"forks": 307,
- "watchers": 1046,
+ "watchers": 1048,
"score": 0,
"subscribers_count": 16
},
@@ -936,10 +936,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
- "updated_at": "2024-09-10T15:04:10Z",
+ "updated_at": "2024-09-22T10:38:54Z",
"pushed_at": "2022-06-21T14:52:05Z",
- "stargazers_count": 1050,
- "watchers_count": 1050,
+ "stargazers_count": 1051,
+ "watchers_count": 1051,
"has_discussions": false,
"forks_count": 185,
"allow_forking": true,
@@ -950,7 +950,7 @@
],
"visibility": "public",
"forks": 185,
- "watchers": 1050,
+ "watchers": 1051,
"score": 0,
"subscribers_count": 14
},
@@ -1308,13 +1308,13 @@
"stargazers_count": 150,
"watchers_count": 150,
"has_discussions": false,
- "forks_count": 37,
+ "forks_count": 38,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 37,
+ "forks": 38,
"watchers": 150,
"score": 0,
"subscribers_count": 2
@@ -2040,10 +2040,10 @@
"description": "Pre-compiled builds for CVE-2021-4034",
"fork": false,
"created_at": "2022-01-27T17:43:24Z",
- "updated_at": "2024-08-12T20:20:07Z",
+ "updated_at": "2024-09-23T03:15:32Z",
"pushed_at": "2022-03-30T15:38:20Z",
- "stargazers_count": 21,
- "watchers_count": 21,
+ "stargazers_count": 22,
+ "watchers_count": 22,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@@ -2052,7 +2052,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
- "watchers": 21,
+ "watchers": 22,
"score": 0,
"subscribers_count": 1
},
@@ -4763,10 +4763,10 @@
"description": "PoC de Polkit",
"fork": false,
"created_at": "2024-01-17T22:55:46Z",
- "updated_at": "2024-01-24T23:41:28Z",
+ "updated_at": "2024-09-19T13:21:32Z",
"pushed_at": "2024-01-24T18:11:54Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 0,
+ "watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -4775,7 +4775,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 1,
+ "watchers": 0,
"score": 0,
"subscribers_count": 1
},
diff --git a/2021/CVE-2021-40444.json b/2021/CVE-2021-40444.json
index d2a93312d0..320af4b192 100644
--- a/2021/CVE-2021-40444.json
+++ b/2021/CVE-2021-40444.json
@@ -223,19 +223,19 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
- "updated_at": "2024-09-16T10:35:03Z",
+ "updated_at": "2024-09-21T07:33:29Z",
"pushed_at": "2021-12-25T18:31:02Z",
- "stargazers_count": 1574,
- "watchers_count": 1574,
+ "stargazers_count": 1576,
+ "watchers_count": 1576,
"has_discussions": false,
- "forks_count": 481,
+ "forks_count": 483,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 481,
- "watchers": 1574,
+ "forks": 483,
+ "watchers": 1576,
"score": 0,
"subscribers_count": 28
},
diff --git a/2021/CVE-2021-40449.json b/2021/CVE-2021-40449.json
index 4ce8c4202e..491be6e7c1 100644
--- a/2021/CVE-2021-40449.json
+++ b/2021/CVE-2021-40449.json
@@ -13,10 +13,10 @@
"description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2021-10-16T16:17:44Z",
- "updated_at": "2024-08-19T06:03:24Z",
+ "updated_at": "2024-09-19T12:29:33Z",
"pushed_at": "2021-11-11T17:09:56Z",
- "stargazers_count": 457,
- "watchers_count": 457,
+ "stargazers_count": 459,
+ "watchers_count": 459,
"has_discussions": false,
"forks_count": 91,
"allow_forking": true,
@@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 91,
- "watchers": 457,
+ "watchers": 459,
"score": 0,
"subscribers_count": 13
},
diff --git a/2021/CVE-2021-41773.json b/2021/CVE-2021-41773.json
index 41e35ad449..6af2b01205 100644
--- a/2021/CVE-2021-41773.json
+++ b/2021/CVE-2021-41773.json
@@ -3296,10 +3296,10 @@
"description": "Apache HTTP-Server 2.4.49-2.4.50 Path Traversal & Remote Code Execution PoC (CVE-2021-41773 & CVE-2021-42013)",
"fork": false,
"created_at": "2022-11-22T14:09:18Z",
- "updated_at": "2024-09-10T12:54:50Z",
+ "updated_at": "2024-09-22T10:40:33Z",
"pushed_at": "2022-11-22T14:42:10Z",
- "stargazers_count": 6,
- "watchers_count": 6,
+ "stargazers_count": 7,
+ "watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -3308,7 +3308,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 6,
+ "watchers": 7,
"score": 0,
"subscribers_count": 2
},
diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json
index 2815f7a022..83245daed4 100644
--- a/2021/CVE-2021-42278.json
+++ b/2021/CVE-2021-42278.json
@@ -13,10 +13,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-11T15:10:30Z",
- "updated_at": "2024-09-13T12:41:17Z",
+ "updated_at": "2024-09-21T07:42:02Z",
"pushed_at": "2022-07-10T22:23:13Z",
- "stargazers_count": 973,
- "watchers_count": 973,
+ "stargazers_count": 974,
+ "watchers_count": 974,
"has_discussions": false,
"forks_count": 189,
"allow_forking": true,
@@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 189,
- "watchers": 973,
+ "watchers": 974,
"score": 0,
"subscribers_count": 26
},
@@ -48,10 +48,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
- "updated_at": "2024-09-12T09:52:11Z",
+ "updated_at": "2024-09-21T00:09:37Z",
"pushed_at": "2023-01-29T03:31:27Z",
- "stargazers_count": 775,
- "watchers_count": 775,
+ "stargazers_count": 779,
+ "watchers_count": 779,
"has_discussions": false,
"forks_count": 118,
"allow_forking": true,
@@ -60,7 +60,7 @@
"topics": [],
"visibility": "public",
"forks": 118,
- "watchers": 775,
+ "watchers": 779,
"score": 0,
"subscribers_count": 13
},
@@ -108,10 +108,10 @@
"description": "Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)",
"fork": false,
"created_at": "2021-12-13T23:15:05Z",
- "updated_at": "2024-08-12T20:18:52Z",
+ "updated_at": "2024-09-19T02:06:37Z",
"pushed_at": "2022-01-13T12:35:19Z",
- "stargazers_count": 268,
- "watchers_count": 268,
+ "stargazers_count": 269,
+ "watchers_count": 269,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@@ -122,7 +122,7 @@
],
"visibility": "public",
"forks": 37,
- "watchers": 268,
+ "watchers": 269,
"score": 0,
"subscribers_count": 7
},
diff --git a/2021/CVE-2021-42287.json b/2021/CVE-2021-42287.json
index b0e80e4a65..5bd255eb89 100644
--- a/2021/CVE-2021-42287.json
+++ b/2021/CVE-2021-42287.json
@@ -13,10 +13,10 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
- "updated_at": "2024-09-06T23:07:17Z",
+ "updated_at": "2024-09-21T18:16:57Z",
"pushed_at": "2021-12-16T09:50:15Z",
- "stargazers_count": 1325,
- "watchers_count": 1325,
+ "stargazers_count": 1326,
+ "watchers_count": 1326,
"has_discussions": false,
"forks_count": 319,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 319,
- "watchers": 1325,
+ "watchers": 1326,
"score": 0,
"subscribers_count": 28
},
@@ -43,10 +43,10 @@
"description": ".Net Assembly loader for the [CVE-2021-42287 - CVE-2021-42278] Scanner & Exploit noPac",
"fork": false,
"created_at": "2021-12-13T19:01:18Z",
- "updated_at": "2024-03-05T13:05:42Z",
+ "updated_at": "2024-09-19T02:12:47Z",
"pushed_at": "2023-02-16T10:45:19Z",
- "stargazers_count": 59,
- "watchers_count": 59,
+ "stargazers_count": 60,
+ "watchers_count": 60,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
- "watchers": 59,
+ "watchers": 60,
"score": 0,
"subscribers_count": 4
},
@@ -73,10 +73,10 @@
"description": "NoPacScan is a CVE-2021-42287\/CVE-2021-42278 Scanner,it scan for more domain controllers than other script",
"fork": false,
"created_at": "2022-01-07T11:59:55Z",
- "updated_at": "2024-08-12T20:19:33Z",
+ "updated_at": "2024-09-21T07:18:37Z",
"pushed_at": "2022-02-17T04:12:08Z",
- "stargazers_count": 84,
- "watchers_count": 84,
+ "stargazers_count": 85,
+ "watchers_count": 85,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
- "watchers": 84,
+ "watchers": 85,
"score": 0,
"subscribers_count": 2
},
@@ -133,10 +133,10 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Exploiter",
"fork": false,
"created_at": "2022-12-22T06:39:07Z",
- "updated_at": "2024-08-04T10:14:25Z",
+ "updated_at": "2024-09-19T08:28:06Z",
"pushed_at": "2023-01-12T09:05:52Z",
- "stargazers_count": 7,
- "watchers_count": 7,
+ "stargazers_count": 8,
+ "watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 7,
+ "watchers": 8,
"score": 0,
"subscribers_count": 1
}
diff --git a/2021/CVE-2021-43650.json b/2021/CVE-2021-43650.json
new file mode 100644
index 0000000000..841f821fd9
--- /dev/null
+++ b/2021/CVE-2021-43650.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 859923948,
+ "name": "CVE-2021-43650",
+ "full_name": "OpenXP-Research\/CVE-2021-43650",
+ "owner": {
+ "login": "OpenXP-Research",
+ "id": 124332420,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/124332420?v=4",
+ "html_url": "https:\/\/github.com\/OpenXP-Research"
+ },
+ "html_url": "https:\/\/github.com\/OpenXP-Research\/CVE-2021-43650",
+ "description": "Webrun <= 3.6.0.42 SQLi",
+ "fork": false,
+ "created_at": "2024-09-19T14:10:00Z",
+ "updated_at": "2024-09-19T14:10:58Z",
+ "pushed_at": "2024-09-19T14:10:55Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2021/CVE-2021-43798.json b/2021/CVE-2021-43798.json
index c355011568..51b5f6b2ad 100644
--- a/2021/CVE-2021-43798.json
+++ b/2021/CVE-2021-43798.json
@@ -13,10 +13,10 @@
"description": "CVE-2021-43798 - Grafana 8.x Path Traversal (Pre-Auth)",
"fork": false,
"created_at": "2021-12-06T20:10:23Z",
- "updated_at": "2024-09-17T13:35:23Z",
+ "updated_at": "2024-09-23T15:53:21Z",
"pushed_at": "2021-12-07T18:09:20Z",
- "stargazers_count": 29,
- "watchers_count": 29,
+ "stargazers_count": 30,
+ "watchers_count": 30,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
- "watchers": 29,
+ "watchers": 30,
"score": 0,
"subscribers_count": 2
},
@@ -73,10 +73,10 @@
"description": "Grafana Unauthorized arbitrary file reading vulnerability",
"fork": false,
"created_at": "2021-12-07T09:02:16Z",
- "updated_at": "2024-09-05T11:26:38Z",
+ "updated_at": "2024-09-19T01:50:23Z",
"pushed_at": "2023-02-14T07:05:22Z",
- "stargazers_count": 350,
- "watchers_count": 350,
+ "stargazers_count": 351,
+ "watchers_count": 351,
"has_discussions": false,
"forks_count": 90,
"allow_forking": true,
@@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 90,
- "watchers": 350,
+ "watchers": 351,
"score": 0,
"subscribers_count": 7
},
@@ -990,36 +990,6 @@
"score": 0,
"subscribers_count": 1
},
- {
- "id": 668115938,
- "name": "CVE-2021-43798",
- "full_name": "nuker\/CVE-2021-43798",
- "owner": {
- "login": "nuker",
- "id": 104190762,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104190762?v=4",
- "html_url": "https:\/\/github.com\/nuker"
- },
- "html_url": "https:\/\/github.com\/nuker\/CVE-2021-43798",
- "description": "POC for CVE-2021-43798 written in python",
- "fork": false,
- "created_at": "2023-07-19T04:16:39Z",
- "updated_at": "2023-07-19T04:29:26Z",
- "pushed_at": "2023-07-19T04:40:15Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "has_discussions": false,
- "forks_count": 1,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 1,
- "watchers": 0,
- "score": 0,
- "subscribers_count": 1
- },
{
"id": 686520503,
"name": "grafana-exploit-CVE-2021-43798",
diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json
index 053e0ea74c..7c61844033 100644
--- a/2021/CVE-2021-44228.json
+++ b/2021/CVE-2021-44228.json
@@ -369,12 +369,12 @@
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
"fork": false,
"created_at": "2021-12-10T12:38:20Z",
- "updated_at": "2024-09-13T08:57:12Z",
+ "updated_at": "2024-09-18T15:51:49Z",
"pushed_at": "2024-04-26T03:16:26Z",
- "stargazers_count": 1102,
- "watchers_count": 1102,
+ "stargazers_count": 1101,
+ "watchers_count": 1101,
"has_discussions": false,
- "forks_count": 530,
+ "forks_count": 529,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -382,8 +382,8 @@
"log4shell"
],
"visibility": "public",
- "forks": 530,
- "watchers": 1102,
+ "forks": 529,
+ "watchers": 1101,
"score": 0,
"subscribers_count": 23
},
@@ -735,13 +735,13 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
- "forks_count": 6,
+ "forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 6,
+ "forks": 5,
"watchers": 5,
"score": 0,
"subscribers_count": 1
@@ -907,10 +907,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
- "updated_at": "2024-09-10T03:33:04Z",
+ "updated_at": "2024-09-23T04:40:45Z",
"pushed_at": "2024-02-12T22:37:25Z",
- "stargazers_count": 1792,
- "watchers_count": 1792,
+ "stargazers_count": 1793,
+ "watchers_count": 1793,
"has_discussions": false,
"forks_count": 525,
"allow_forking": true,
@@ -924,7 +924,7 @@
],
"visibility": "public",
"forks": 525,
- "watchers": 1792,
+ "watchers": 1793,
"score": 0,
"subscribers_count": 27
},
@@ -3475,14 +3475,14 @@
{
"id": 437688500,
"name": "anti-jndi",
- "full_name": "KainsRache\/anti-jndi",
+ "full_name": "ph0lk3r\/anti-jndi",
"owner": {
- "login": "KainsRache",
+ "login": "ph0lk3r",
"id": 1352675,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1352675?v=4",
- "html_url": "https:\/\/github.com\/KainsRache"
+ "html_url": "https:\/\/github.com\/ph0lk3r"
},
- "html_url": "https:\/\/github.com\/KainsRache\/anti-jndi",
+ "html_url": "https:\/\/github.com\/ph0lk3r\/anti-jndi",
"description": "Fun things against the abuse of the recent CVE-2021-44228 (Log4Shell) vulnerability using common web servers.",
"fork": false,
"created_at": "2021-12-13T00:23:20Z",
@@ -3636,19 +3636,19 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
- "updated_at": "2024-09-16T19:54:18Z",
+ "updated_at": "2024-09-20T08:21:04Z",
"pushed_at": "2022-11-23T18:23:24Z",
- "stargazers_count": 3399,
- "watchers_count": 3399,
+ "stargazers_count": 3397,
+ "watchers_count": 3397,
"has_discussions": true,
- "forks_count": 740,
+ "forks_count": 738,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 740,
- "watchers": 3399,
+ "forks": 738,
+ "watchers": 3397,
"score": 0,
"subscribers_count": 55
},
@@ -5433,10 +5433,10 @@
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
"fork": false,
"created_at": "2021-12-14T06:37:59Z",
- "updated_at": "2024-09-03T07:14:50Z",
+ "updated_at": "2024-09-21T20:58:41Z",
"pushed_at": "2024-04-24T05:35:26Z",
- "stargazers_count": 382,
- "watchers_count": 382,
+ "stargazers_count": 383,
+ "watchers_count": 383,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@@ -5451,7 +5451,7 @@
],
"visibility": "public",
"forks": 52,
- "watchers": 382,
+ "watchers": 383,
"score": 0,
"subscribers_count": 12
},
@@ -6005,7 +6005,7 @@
"stargazers_count": 41,
"watchers_count": 41,
"has_discussions": false,
- "forks_count": 10,
+ "forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -6015,7 +6015,7 @@
"tools"
],
"visibility": "public",
- "forks": 10,
+ "forks": 9,
"watchers": 41,
"score": 0,
"subscribers_count": 9
@@ -7047,10 +7047,10 @@
"description": "A honeypot for the Log4Shell vulnerability (CVE-2021-44228).",
"fork": false,
"created_at": "2021-12-15T22:30:34Z",
- "updated_at": "2024-06-26T13:44:36Z",
+ "updated_at": "2024-09-21T11:37:46Z",
"pushed_at": "2022-04-26T14:30:54Z",
- "stargazers_count": 89,
- "watchers_count": 89,
+ "stargazers_count": 90,
+ "watchers_count": 90,
"has_discussions": true,
"forks_count": 27,
"allow_forking": true,
@@ -7059,7 +7059,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
- "watchers": 89,
+ "watchers": 90,
"score": 0,
"subscribers_count": 7
},
@@ -8983,10 +8983,10 @@
"description": "Script en bash que permite identificar la vulnerabilidad Log4j CVE-2021-44228 de forma remota.",
"fork": false,
"created_at": "2021-12-20T15:22:50Z",
- "updated_at": "2024-09-17T16:20:07Z",
+ "updated_at": "2024-09-19T08:09:04Z",
"pushed_at": "2024-09-03T15:22:31Z",
- "stargazers_count": 28,
- "watchers_count": 28,
+ "stargazers_count": 29,
+ "watchers_count": 29,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@@ -8995,7 +8995,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
- "watchers": 28,
+ "watchers": 29,
"score": 0,
"subscribers_count": 2
},
diff --git a/2021/CVE-2021-45468.json b/2021/CVE-2021-45468.json
index 59be034e19..4c3740ad16 100644
--- a/2021/CVE-2021-45468.json
+++ b/2021/CVE-2021-45468.json
@@ -13,10 +13,10 @@
"description": "Exploit for CVE-2021-45468, an Imperva WAF bypass.",
"fork": false,
"created_at": "2021-12-12T05:36:46Z",
- "updated_at": "2024-04-02T09:29:30Z",
+ "updated_at": "2024-09-19T09:43:34Z",
"pushed_at": "2021-12-21T21:03:08Z",
- "stargazers_count": 2,
- "watchers_count": 2,
+ "stargazers_count": 3,
+ "watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 2,
+ "watchers": 3,
"score": 0,
"subscribers_count": 2
}
diff --git a/2022/CVE-2022-0185.json b/2022/CVE-2022-0185.json
index ffda497cb7..124e4bc759 100644
--- a/2022/CVE-2022-0185.json
+++ b/2022/CVE-2022-0185.json
@@ -13,10 +13,10 @@
"description": "CVE-2022-0185",
"fork": false,
"created_at": "2022-01-19T06:19:38Z",
- "updated_at": "2024-08-14T04:27:06Z",
+ "updated_at": "2024-09-19T03:04:05Z",
"pushed_at": "2022-04-25T04:11:33Z",
- "stargazers_count": 365,
- "watchers_count": 365,
+ "stargazers_count": 366,
+ "watchers_count": 366,
"has_discussions": false,
"forks_count": 57,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 57,
- "watchers": 365,
+ "watchers": 366,
"score": 0,
"subscribers_count": 39
},
diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json
index 5f9433d152..0b1b71b8d9 100644
--- a/2022/CVE-2022-0847.json
+++ b/2022/CVE-2022-0847.json
@@ -272,18 +272,18 @@
{
"id": 467439184,
"name": "CVE-2022-0847",
- "full_name": "antx-code\/CVE-2022-0847",
+ "full_name": "ZZ-SOCMAP\/CVE-2022-0847",
"owner": {
- "login": "antx-code",
- "id": 7877940,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7877940?v=4",
- "html_url": "https:\/\/github.com\/antx-code"
+ "login": "ZZ-SOCMAP",
+ "id": 98105412,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98105412?v=4",
+ "html_url": "https:\/\/github.com\/ZZ-SOCMAP"
},
- "html_url": "https:\/\/github.com\/antx-code\/CVE-2022-0847",
+ "html_url": "https:\/\/github.com\/ZZ-SOCMAP\/CVE-2022-0847",
"description": "Linux Kernel Local Privilege Escalation Vulnerability CVE-2022-0847.",
"fork": false,
"created_at": "2022-03-08T09:10:51Z",
- "updated_at": "2024-08-12T20:21:22Z",
+ "updated_at": "2024-09-19T01:51:18Z",
"pushed_at": "2022-03-08T09:14:25Z",
"stargazers_count": 59,
"watchers_count": 59,
@@ -297,7 +297,7 @@
"forks": 21,
"watchers": 59,
"score": 0,
- "subscribers_count": 4
+ "subscribers_count": 5
},
{
"id": 467468720,
@@ -1155,10 +1155,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
- "updated_at": "2024-09-14T12:39:42Z",
+ "updated_at": "2024-09-20T18:32:55Z",
"pushed_at": "2023-05-20T05:55:45Z",
- "stargazers_count": 534,
- "watchers_count": 534,
+ "stargazers_count": 535,
+ "watchers_count": 535,
"has_discussions": false,
"forks_count": 140,
"allow_forking": true,
@@ -1167,7 +1167,7 @@
"topics": [],
"visibility": "public",
"forks": 140,
- "watchers": 534,
+ "watchers": 535,
"score": 0,
"subscribers_count": 15
},
@@ -2604,10 +2604,10 @@
"description": "Working Dirty Pipe (CVE-2022-0847) exploit tool with root access and file overwrites.",
"fork": false,
"created_at": "2023-10-15T20:13:11Z",
- "updated_at": "2024-07-22T22:22:31Z",
+ "updated_at": "2024-09-17T22:04:05Z",
"pushed_at": "2023-10-15T22:23:44Z",
- "stargazers_count": 7,
- "watchers_count": 7,
+ "stargazers_count": 8,
+ "watchers_count": 8,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -2622,7 +2622,7 @@
],
"visibility": "public",
"forks": 0,
- "watchers": 7,
+ "watchers": 8,
"score": 0,
"subscribers_count": 1
},
diff --git a/2022/CVE-2022-0944.json b/2022/CVE-2022-0944.json
index aaa7a35c4b..2b68c7a630 100644
--- a/2022/CVE-2022-0944.json
+++ b/2022/CVE-2022-0944.json
@@ -13,10 +13,10 @@
"description": "A proof of concept exploit for SQLPad RCE (CVE-2022-0944).",
"fork": false,
"created_at": "2024-09-08T23:39:24Z",
- "updated_at": "2024-09-14T13:16:44Z",
+ "updated_at": "2024-09-21T23:32:34Z",
"pushed_at": "2024-09-08T23:57:27Z",
- "stargazers_count": 3,
- "watchers_count": 3,
+ "stargazers_count": 5,
+ "watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 3,
+ "watchers": 5,
"score": 0,
"subscribers_count": 1
},
@@ -73,10 +73,10 @@
"description": "SQLPad - Template injection (POC exploit for SQLPad RCE [CVE-2022-0944])",
"fork": false,
"created_at": "2024-09-09T19:09:43Z",
- "updated_at": "2024-09-13T16:27:33Z",
+ "updated_at": "2024-09-19T09:06:14Z",
"pushed_at": "2024-09-10T14:23:01Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 1,
+ "watchers": 2,
"score": 0,
"subscribers_count": 1
},
@@ -103,10 +103,10 @@
"description": null,
"fork": false,
"created_at": "2024-09-10T10:26:57Z",
- "updated_at": "2024-09-10T16:18:42Z",
+ "updated_at": "2024-09-19T14:01:03Z",
"pushed_at": "2024-09-10T16:18:40Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 0,
+ "watchers": 2,
"score": 0,
"subscribers_count": 1
},
@@ -133,10 +133,10 @@
"description": null,
"fork": false,
"created_at": "2024-09-13T09:30:08Z",
- "updated_at": "2024-09-13T09:44:59Z",
+ "updated_at": "2024-09-24T03:14:51Z",
"pushed_at": "2024-09-13T09:44:56Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 0,
+ "watchers": 2,
"score": 0,
"subscribers_count": 1
}
diff --git a/2022/CVE-2022-1386.json b/2022/CVE-2022-1386.json
index 1c451b6973..8abddc2e9c 100644
--- a/2022/CVE-2022-1386.json
+++ b/2022/CVE-2022-1386.json
@@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-02-28T02:08:59Z",
- "updated_at": "2024-05-14T07:12:51Z",
+ "updated_at": "2024-09-21T12:00:44Z",
"pushed_at": "2023-03-09T16:25:57Z",
- "stargazers_count": 7,
- "watchers_count": 7,
+ "stargazers_count": 8,
+ "watchers_count": 8,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
- "watchers": 7,
+ "watchers": 8,
"score": 0,
"subscribers_count": 1
},
diff --git a/2022/CVE-2022-1388.json b/2022/CVE-2022-1388.json
index 9d79d6af4c..352af77a6b 100644
--- a/2022/CVE-2022-1388.json
+++ b/2022/CVE-2022-1388.json
@@ -140,10 +140,10 @@
"description": "CVE-2022-1388 F5 BIG-IP RCE 批量检测",
"fork": false,
"created_at": "2022-05-07T17:54:08Z",
- "updated_at": "2024-08-12T20:23:03Z",
+ "updated_at": "2024-09-20T18:32:56Z",
"pushed_at": "2022-05-09T11:15:27Z",
- "stargazers_count": 93,
- "watchers_count": 93,
+ "stargazers_count": 94,
+ "watchers_count": 94,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@@ -152,7 +152,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
- "watchers": 93,
+ "watchers": 94,
"score": 0,
"subscribers_count": 1
},
diff --git a/2022/CVE-2022-20421.json b/2022/CVE-2022-20421.json
index 030bb2c3bd..1fbeff7b7b 100644
--- a/2022/CVE-2022-20421.json
+++ b/2022/CVE-2022-20421.json
@@ -13,10 +13,10 @@
"description": "Bad Spin: Android Binder Privilege Escalation Exploit (CVE-2022-20421)",
"fork": false,
"created_at": "2023-03-23T10:25:59Z",
- "updated_at": "2024-09-15T04:46:46Z",
+ "updated_at": "2024-09-20T20:34:56Z",
"pushed_at": "2023-05-27T15:39:41Z",
- "stargazers_count": 226,
- "watchers_count": 226,
+ "stargazers_count": 228,
+ "watchers_count": 228,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 32,
- "watchers": 226,
+ "watchers": 228,
"score": 0,
"subscribers_count": 7
}
diff --git a/2022/CVE-2022-20452.json b/2022/CVE-2022-20452.json
index 9ee23951bb..b9ec66d7de 100644
--- a/2022/CVE-2022-20452.json
+++ b/2022/CVE-2022-20452.json
@@ -13,10 +13,10 @@
"description": "Exploit for CVE-2022-20452, privilege escalation on Android from installed app to system app (or another app) via LazyValue using Parcel after recycle()",
"fork": false,
"created_at": "2023-01-10T16:24:51Z",
- "updated_at": "2024-08-26T15:42:23Z",
+ "updated_at": "2024-09-20T20:33:06Z",
"pushed_at": "2023-04-12T17:28:49Z",
- "stargazers_count": 272,
- "watchers_count": 272,
+ "stargazers_count": 273,
+ "watchers_count": 273,
"has_discussions": false,
"forks_count": 47,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 47,
- "watchers": 272,
+ "watchers": 273,
"score": 0,
"subscribers_count": 9
}
diff --git a/2022/CVE-2022-21587.json b/2022/CVE-2022-21587.json
index bae87447f4..6089f3b67f 100644
--- a/2022/CVE-2022-21587.json
+++ b/2022/CVE-2022-21587.json
@@ -43,10 +43,10 @@
"description": "Oracle E-BS CVE-2022-21587 Exploit",
"fork": false,
"created_at": "2023-02-22T08:00:38Z",
- "updated_at": "2023-02-14T03:09:51Z",
+ "updated_at": "2024-09-23T09:01:19Z",
"pushed_at": "2023-02-14T03:46:20Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
- "watchers": 0,
+ "watchers": 1,
"score": 0,
"subscribers_count": 1
},
diff --git a/2022/CVE-2022-21894.json b/2022/CVE-2022-21894.json
index dd823fdaeb..b028f4344a 100644
--- a/2022/CVE-2022-21894.json
+++ b/2022/CVE-2022-21894.json
@@ -56,13 +56,13 @@
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
- "forks_count": 3,
+ "forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 3,
+ "forks": 4,
"watchers": 12,
"score": 0,
"subscribers_count": 2
diff --git a/2022/CVE-2022-22536.json b/2022/CVE-2022-22536.json
index f7c854bdf4..53d3d1dec5 100644
--- a/2022/CVE-2022-22536.json
+++ b/2022/CVE-2022-22536.json
@@ -2,18 +2,18 @@
{
"id": 459508869,
"name": "CVE-2022-22536",
- "full_name": "antx-code\/CVE-2022-22536",
+ "full_name": "ZZ-SOCMAP\/CVE-2022-22536",
"owner": {
- "login": "antx-code",
- "id": 7877940,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7877940?v=4",
- "html_url": "https:\/\/github.com\/antx-code"
+ "login": "ZZ-SOCMAP",
+ "id": 98105412,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98105412?v=4",
+ "html_url": "https:\/\/github.com\/ZZ-SOCMAP"
},
- "html_url": "https:\/\/github.com\/antx-code\/CVE-2022-22536",
+ "html_url": "https:\/\/github.com\/ZZ-SOCMAP\/CVE-2022-22536",
"description": "SAP memory pipes(MPI) desynchronization vulnerability CVE-2022-22536.",
"fork": false,
"created_at": "2022-02-15T09:22:19Z",
- "updated_at": "2024-08-12T20:20:38Z",
+ "updated_at": "2024-09-19T01:53:19Z",
"pushed_at": "2022-02-21T08:58:22Z",
"stargazers_count": 50,
"watchers_count": 50,
@@ -27,7 +27,7 @@
"forks": 18,
"watchers": 50,
"score": 0,
- "subscribers_count": 2
+ "subscribers_count": 3
},
{
"id": 477106089,
diff --git a/2022/CVE-2022-22629.json b/2022/CVE-2022-22629.json
index 37a8f4402e..78b6006c76 100644
--- a/2022/CVE-2022-22629.json
+++ b/2022/CVE-2022-22629.json
@@ -13,10 +13,10 @@
"description": "CVE-2022-22629 Proof of Concept",
"fork": false,
"created_at": "2022-09-09T17:21:27Z",
- "updated_at": "2024-09-10T15:04:19Z",
+ "updated_at": "2024-09-18T09:35:07Z",
"pushed_at": "2022-09-09T21:23:08Z",
- "stargazers_count": 49,
- "watchers_count": 49,
+ "stargazers_count": 50,
+ "watchers_count": 50,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
- "watchers": 49,
+ "watchers": 50,
"score": 0,
"subscribers_count": 1
}
diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json
index 3cf73f84e1..e5db0ff671 100644
--- a/2022/CVE-2022-22954.json
+++ b/2022/CVE-2022-22954.json
@@ -766,12 +766,12 @@
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
- "updated_at": "2024-09-14T13:21:44Z",
+ "updated_at": "2024-09-24T06:01:16Z",
"pushed_at": "2024-04-25T06:09:38Z",
- "stargazers_count": 1309,
- "watchers_count": 1309,
+ "stargazers_count": 1311,
+ "watchers_count": 1311,
"has_discussions": false,
- "forks_count": 165,
+ "forks_count": 163,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -784,8 +784,8 @@
"vcenter"
],
"visibility": "public",
- "forks": 165,
- "watchers": 1309,
+ "forks": 163,
+ "watchers": 1311,
"score": 0,
"subscribers_count": 15
},
diff --git a/2022/CVE-2022-22963.json b/2022/CVE-2022-22963.json
index 8dcb255907..d86d9b556c 100644
--- a/2022/CVE-2022-22963.json
+++ b/2022/CVE-2022-22963.json
@@ -545,10 +545,10 @@
"description": "spring cloud function 一键利用工具! by charis 博客https:\/\/charis3306.top\/",
"fork": false,
"created_at": "2023-03-07T15:57:29Z",
- "updated_at": "2024-05-09T03:36:19Z",
+ "updated_at": "2024-09-24T03:12:53Z",
"pushed_at": "2023-06-04T08:02:23Z",
- "stargazers_count": 7,
- "watchers_count": 7,
+ "stargazers_count": 8,
+ "watchers_count": 8,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -557,7 +557,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 7,
+ "watchers": 8,
"score": 0,
"subscribers_count": 1
},
diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json
index 42cfa9546d..2631aaef0b 100644
--- a/2022/CVE-2022-22965.json
+++ b/2022/CVE-2022-22965.json
@@ -133,13 +133,13 @@
"stargazers_count": 312,
"watchers_count": 312,
"has_discussions": false,
- "forks_count": 231,
+ "forks_count": 233,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 231,
+ "forks": 233,
"watchers": 312,
"score": 0,
"subscribers_count": 10
@@ -2157,10 +2157,10 @@
"description": "A simple python script for a firewall rule that blocks incoming requests based on the Spring4Shell (CVE-2022-22965) vulnerability",
"fork": false,
"created_at": "2023-05-31T12:04:25Z",
- "updated_at": "2023-10-28T08:14:29Z",
+ "updated_at": "2024-09-19T04:14:46Z",
"pushed_at": "2024-03-19T13:42:29Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -2183,7 +2183,7 @@
],
"visibility": "public",
"forks": 1,
- "watchers": 1,
+ "watchers": 2,
"score": 0,
"subscribers_count": 1
},
diff --git a/2022/CVE-2022-22972.json b/2022/CVE-2022-22972.json
index 6f1ae0e9b6..ee92c2d7a7 100644
--- a/2022/CVE-2022-22972.json
+++ b/2022/CVE-2022-22972.json
@@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-05-24T20:19:55Z",
- "updated_at": "2024-09-08T19:54:27Z",
+ "updated_at": "2024-09-18T22:47:30Z",
"pushed_at": "2022-05-26T16:07:18Z",
- "stargazers_count": 155,
- "watchers_count": 155,
+ "stargazers_count": 154,
+ "watchers_count": 154,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
- "watchers": 155,
+ "watchers": 154,
"score": 0,
"subscribers_count": 5
},
diff --git a/2022/CVE-2022-23131.json b/2022/CVE-2022-23131.json
index 1ea026190b..c867de9067 100644
--- a/2022/CVE-2022-23131.json
+++ b/2022/CVE-2022-23131.json
@@ -549,5 +549,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 859400181,
+ "name": "CVE-2022-23131",
+ "full_name": "fork-bombed\/CVE-2022-23131",
+ "owner": {
+ "login": "fork-bombed",
+ "id": 57873842,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57873842?v=4",
+ "html_url": "https:\/\/github.com\/fork-bombed"
+ },
+ "html_url": "https:\/\/github.com\/fork-bombed\/CVE-2022-23131",
+ "description": "CVE-2022-23131 Zabbix Server SAML authentication exploit",
+ "fork": false,
+ "created_at": "2024-09-18T15:42:26Z",
+ "updated_at": "2024-09-18T16:20:37Z",
+ "pushed_at": "2024-09-18T15:58:35Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-23808.json b/2022/CVE-2022-23808.json
index 2c6741f7c1..ee33e9bbe9 100644
--- a/2022/CVE-2022-23808.json
+++ b/2022/CVE-2022-23808.json
@@ -13,10 +13,10 @@
"description": "phpMyAdmin XSS ",
"fork": false,
"created_at": "2022-02-01T17:02:03Z",
- "updated_at": "2024-08-12T20:20:14Z",
+ "updated_at": "2024-09-19T22:35:41Z",
"pushed_at": "2022-02-03T16:21:01Z",
- "stargazers_count": 113,
- "watchers_count": 113,
+ "stargazers_count": 114,
+ "watchers_count": 114,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@@ -43,7 +43,7 @@
],
"visibility": "public",
"forks": 24,
- "watchers": 113,
+ "watchers": 114,
"score": 0,
"subscribers_count": 3
}
diff --git a/2022/CVE-2022-24734.json b/2022/CVE-2022-24734.json
index dd6c9cda17..c33da1fb5a 100644
--- a/2022/CVE-2022-24734.json
+++ b/2022/CVE-2022-24734.json
@@ -18,13 +18,13 @@
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
- "forks_count": 10,
+ "forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 10,
+ "forks": 9,
"watchers": 47,
"score": 0,
"subscribers_count": 1
diff --git a/2022/CVE-2022-24990.json b/2022/CVE-2022-24990.json
index 08a21b822f..c051acbdc7 100644
--- a/2022/CVE-2022-24990.json
+++ b/2022/CVE-2022-24990.json
@@ -122,18 +122,18 @@
{
"id": 480629331,
"name": "CVE-2022-24990",
- "full_name": "antx-code\/CVE-2022-24990",
+ "full_name": "ZZ-SOCMAP\/CVE-2022-24990",
"owner": {
- "login": "antx-code",
- "id": 7877940,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7877940?v=4",
- "html_url": "https:\/\/github.com\/antx-code"
+ "login": "ZZ-SOCMAP",
+ "id": 98105412,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98105412?v=4",
+ "html_url": "https:\/\/github.com\/ZZ-SOCMAP"
},
- "html_url": "https:\/\/github.com\/antx-code\/CVE-2022-24990",
+ "html_url": "https:\/\/github.com\/ZZ-SOCMAP\/CVE-2022-24990",
"description": "TerraMaster TOS Unauthenticated Remote Command Execution(RCE) Vulnerability CVE-2022-24990",
"fork": false,
"created_at": "2022-04-12T02:45:56Z",
- "updated_at": "2022-08-31T06:03:26Z",
+ "updated_at": "2024-09-19T01:49:51Z",
"pushed_at": "2022-04-12T03:17:41Z",
"stargazers_count": 3,
"watchers_count": 3,
@@ -147,7 +147,7 @@
"forks": 2,
"watchers": 3,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
},
{
"id": 552773170,
diff --git a/2022/CVE-2022-2546.json b/2022/CVE-2022-2546.json
index 268940a61f..8b4e64aabf 100644
--- a/2022/CVE-2022-2546.json
+++ b/2022/CVE-2022-2546.json
@@ -28,5 +28,35 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 859921517,
+ "name": "CVE-2022-2546",
+ "full_name": "OpenXP-Research\/CVE-2022-2546",
+ "owner": {
+ "login": "OpenXP-Research",
+ "id": 124332420,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/124332420?v=4",
+ "html_url": "https:\/\/github.com\/OpenXP-Research"
+ },
+ "html_url": "https:\/\/github.com\/OpenXP-Research\/CVE-2022-2546",
+ "description": "All-in-One WP Migration < 7.63 - Unauthenticated Reflected XSS + CSRF",
+ "fork": false,
+ "created_at": "2024-09-19T14:05:55Z",
+ "updated_at": "2024-09-19T14:06:07Z",
+ "pushed_at": "2024-09-19T14:06:03Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-25479.json b/2022/CVE-2022-25479.json
index b64411d979..230ce9c752 100644
--- a/2022/CVE-2022-25479.json
+++ b/2022/CVE-2022-25479.json
@@ -13,20 +13,20 @@
"description": "CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK) ROUGHT SKELLETON ATM. WILL EVENTUALLY TURN IT INTO FULL EOP",
"fork": false,
"created_at": "2024-09-17T06:28:17Z",
- "updated_at": "2024-09-17T15:44:29Z",
+ "updated_at": "2024-09-21T10:18:13Z",
"pushed_at": "2024-09-17T07:05:02Z",
- "stargazers_count": 5,
- "watchers_count": 5,
+ "stargazers_count": 15,
+ "watchers_count": 15,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
- "watchers": 5,
+ "forks": 3,
+ "watchers": 15,
"score": 0,
- "subscribers_count": 0
+ "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-25765.json b/2022/CVE-2022-25765.json
index eebefcbb3a..90d41e5007 100644
--- a/2022/CVE-2022-25765.json
+++ b/2022/CVE-2022-25765.json
@@ -173,12 +173,12 @@
"description": "Exploit for CVE-2022–25765 (pdfkit) - Command Injection",
"fork": false,
"created_at": "2023-02-10T00:50:35Z",
- "updated_at": "2024-07-12T04:34:22Z",
+ "updated_at": "2024-09-18T16:40:58Z",
"pushed_at": "2024-05-20T00:34:48Z",
- "stargazers_count": 19,
- "watchers_count": 19,
+ "stargazers_count": 20,
+ "watchers_count": 20,
"has_discussions": false,
- "forks_count": 2,
+ "forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -198,8 +198,8 @@
"vulnerability"
],
"visibility": "public",
- "forks": 2,
- "watchers": 19,
+ "forks": 3,
+ "watchers": 20,
"score": 0,
"subscribers_count": 1
},
diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json
index 5377d06b68..3e457b1cfc 100644
--- a/2022/CVE-2022-26134.json
+++ b/2022/CVE-2022-26134.json
@@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
- "updated_at": "2024-09-11T07:53:22Z",
+ "updated_at": "2024-09-19T08:42:45Z",
"pushed_at": "2023-02-26T14:06:05Z",
- "stargazers_count": 1150,
- "watchers_count": 1150,
+ "stargazers_count": 1151,
+ "watchers_count": 1151,
"has_discussions": true,
"forks_count": 189,
"allow_forking": true,
@@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 189,
- "watchers": 1150,
+ "watchers": 1151,
"score": 0,
"subscribers_count": 19
},
@@ -128,10 +128,10 @@
"description": "CVE-2022-26134 Proof of Concept",
"fork": false,
"created_at": "2022-06-03T13:59:19Z",
- "updated_at": "2024-08-12T20:23:48Z",
+ "updated_at": "2024-09-22T19:59:05Z",
"pushed_at": "2022-06-06T16:38:49Z",
- "stargazers_count": 156,
- "watchers_count": 156,
+ "stargazers_count": 157,
+ "watchers_count": 157,
"has_discussions": false,
"forks_count": 48,
"allow_forking": true,
@@ -144,7 +144,7 @@
],
"visibility": "public",
"forks": 48,
- "watchers": 156,
+ "watchers": 157,
"score": 0,
"subscribers_count": 1
},
@@ -705,19 +705,19 @@
"description": null,
"fork": false,
"created_at": "2022-06-07T09:19:02Z",
- "updated_at": "2024-09-07T10:55:09Z",
+ "updated_at": "2024-09-19T11:49:36Z",
"pushed_at": "2022-06-07T10:35:18Z",
- "stargazers_count": 330,
- "watchers_count": 330,
+ "stargazers_count": 331,
+ "watchers_count": 331,
"has_discussions": false,
- "forks_count": 53,
+ "forks_count": 54,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 53,
- "watchers": 330,
+ "forks": 54,
+ "watchers": 331,
"score": 0,
"subscribers_count": 7
},
@@ -2049,19 +2049,19 @@
"description": "confluence rce (CVE-2021-26084, CVE-2022-26134, CVE-2023-22527)",
"fork": false,
"created_at": "2024-05-29T03:20:22Z",
- "updated_at": "2024-08-26T09:24:34Z",
+ "updated_at": "2024-09-22T06:25:09Z",
"pushed_at": "2024-08-26T09:24:31Z",
- "stargazers_count": 2,
- "watchers_count": 2,
+ "stargazers_count": 3,
+ "watchers_count": 3,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
- "watchers": 2,
+ "forks": 1,
+ "watchers": 3,
"score": 0,
"subscribers_count": 1
},
diff --git a/2022/CVE-2022-26809.json b/2022/CVE-2022-26809.json
index a9fad29c64..c9bc17351a 100644
--- a/2022/CVE-2022-26809.json
+++ b/2022/CVE-2022-26809.json
@@ -257,10 +257,10 @@
"description": "警惕 一种针对红队的新型溯源手段!",
"fork": false,
"created_at": "2022-07-27T15:48:19Z",
- "updated_at": "2024-09-11T16:43:37Z",
+ "updated_at": "2024-09-20T03:53:11Z",
"pushed_at": "2022-07-27T15:55:01Z",
- "stargazers_count": 391,
- "watchers_count": 391,
+ "stargazers_count": 392,
+ "watchers_count": 392,
"has_discussions": false,
"forks_count": 84,
"allow_forking": true,
@@ -269,7 +269,7 @@
"topics": [],
"visibility": "public",
"forks": 84,
- "watchers": 391,
+ "watchers": 392,
"score": 0,
"subscribers_count": 2
},
diff --git a/2022/CVE-2022-29464.json b/2022/CVE-2022-29464.json
index 632d073b63..5d4d15dbe1 100644
--- a/2022/CVE-2022-29464.json
+++ b/2022/CVE-2022-29464.json
@@ -13,10 +13,10 @@
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
"fork": false,
"created_at": "2022-04-20T21:23:52Z",
- "updated_at": "2024-09-06T00:15:37Z",
+ "updated_at": "2024-09-23T13:33:13Z",
"pushed_at": "2022-04-27T05:52:43Z",
- "stargazers_count": 365,
- "watchers_count": 365,
+ "stargazers_count": 366,
+ "watchers_count": 366,
"has_discussions": false,
"forks_count": 93,
"allow_forking": true,
@@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 93,
- "watchers": 365,
+ "watchers": 366,
"score": 0,
"subscribers_count": 8
},
diff --git a/2022/CVE-2022-30075.json b/2022/CVE-2022-30075.json
index d04da482d8..2c92fab327 100644
--- a/2022/CVE-2022-30075.json
+++ b/2022/CVE-2022-30075.json
@@ -13,10 +13,10 @@
"description": "Tp-Link Archer AX50 Authenticated RCE (CVE-2022-30075)",
"fork": false,
"created_at": "2022-06-07T23:26:47Z",
- "updated_at": "2024-09-02T18:20:32Z",
+ "updated_at": "2024-09-23T20:58:37Z",
"pushed_at": "2022-11-20T03:03:53Z",
- "stargazers_count": 210,
- "watchers_count": 210,
+ "stargazers_count": 214,
+ "watchers_count": 214,
"has_discussions": false,
"forks_count": 45,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 45,
- "watchers": 210,
+ "watchers": 214,
"score": 0,
"subscribers_count": 3
},
diff --git a/2022/CVE-2022-30190.json b/2022/CVE-2022-30190.json
index 15490b6590..db159d7364 100644
--- a/2022/CVE-2022-30190.json
+++ b/2022/CVE-2022-30190.json
@@ -387,10 +387,10 @@
"description": "Follina MS-MSDT 0-day MS Office RCE (CVE-2022-30190) PoC in Go",
"fork": false,
"created_at": "2022-06-01T09:02:00Z",
- "updated_at": "2024-08-12T20:23:44Z",
+ "updated_at": "2024-09-20T10:28:38Z",
"pushed_at": "2022-06-01T09:31:58Z",
- "stargazers_count": 15,
- "watchers_count": 15,
+ "stargazers_count": 16,
+ "watchers_count": 16,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@@ -405,7 +405,7 @@
],
"visibility": "public",
"forks": 5,
- "watchers": 15,
+ "watchers": 16,
"score": 0,
"subscribers_count": 3
},
@@ -728,10 +728,10 @@
"description": "A tool written in Go that scans files & directories for the Follina exploit (CVE-2022-30190)",
"fork": false,
"created_at": "2022-06-02T06:45:19Z",
- "updated_at": "2024-07-17T14:32:06Z",
+ "updated_at": "2024-09-18T00:11:46Z",
"pushed_at": "2022-09-13T10:05:02Z",
- "stargazers_count": 24,
- "watchers_count": 24,
+ "stargazers_count": 23,
+ "watchers_count": 23,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@@ -747,7 +747,7 @@
],
"visibility": "public",
"forks": 6,
- "watchers": 24,
+ "watchers": 23,
"score": 0,
"subscribers_count": 2
},
diff --git a/2022/CVE-2022-30525.json b/2022/CVE-2022-30525.json
index 9861229e53..d115833b09 100644
--- a/2022/CVE-2022-30525.json
+++ b/2022/CVE-2022-30525.json
@@ -13,10 +13,10 @@
"description": "Proof of concept exploit for CVE-2022-30525 (Zxyel firewall command injection)",
"fork": false,
"created_at": "2022-05-10T10:31:19Z",
- "updated_at": "2024-03-02T16:57:33Z",
+ "updated_at": "2024-09-21T17:53:07Z",
"pushed_at": "2022-05-12T10:37:44Z",
- "stargazers_count": 30,
- "watchers_count": 30,
+ "stargazers_count": 31,
+ "watchers_count": 31,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 15,
- "watchers": 30,
+ "watchers": 31,
"score": 0,
"subscribers_count": 2
},
diff --git a/2022/CVE-2022-30592.json b/2022/CVE-2022-30592.json
index c19b61455c..a73d676cf2 100644
--- a/2022/CVE-2022-30592.json
+++ b/2022/CVE-2022-30592.json
@@ -13,10 +13,10 @@
"description": "HTTP3-attacks (CVE-2022-30592)",
"fork": false,
"created_at": "2022-08-06T09:57:43Z",
- "updated_at": "2024-08-30T08:30:24Z",
+ "updated_at": "2024-09-23T14:27:22Z",
"pushed_at": "2022-12-18T03:36:03Z",
- "stargazers_count": 71,
- "watchers_count": 71,
+ "stargazers_count": 73,
+ "watchers_count": 73,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 17,
- "watchers": 71,
+ "watchers": 73,
"score": 0,
"subscribers_count": 4
}
diff --git a/2022/CVE-2022-31814.json b/2022/CVE-2022-31814.json
index 371288f0bd..adff821e82 100644
--- a/2022/CVE-2022-31814.json
+++ b/2022/CVE-2022-31814.json
@@ -208,7 +208,7 @@
"description": "Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)",
"fork": false,
"created_at": "2024-07-23T09:44:46Z",
- "updated_at": "2024-09-06T05:00:30Z",
+ "updated_at": "2024-09-18T22:48:05Z",
"pushed_at": "2024-07-23T10:03:08Z",
"stargazers_count": 23,
"watchers_count": 23,
diff --git a/2022/CVE-2022-32250.json b/2022/CVE-2022-32250.json
index 145b9702e9..963eacf78f 100644
--- a/2022/CVE-2022-32250.json
+++ b/2022/CVE-2022-32250.json
@@ -13,19 +13,19 @@
"description": null,
"fork": false,
"created_at": "2022-08-24T06:00:47Z",
- "updated_at": "2024-08-12T20:26:27Z",
+ "updated_at": "2024-09-18T13:54:55Z",
"pushed_at": "2023-06-18T14:43:52Z",
- "stargazers_count": 168,
- "watchers_count": 168,
+ "stargazers_count": 169,
+ "watchers_count": 169,
"has_discussions": false,
- "forks_count": 45,
+ "forks_count": 43,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 45,
- "watchers": 168,
+ "forks": 43,
+ "watchers": 169,
"score": 0,
"subscribers_count": 6
},
diff --git a/2022/CVE-2022-3368.json b/2022/CVE-2022-3368.json
index db796f0f5e..8e104c075c 100644
--- a/2022/CVE-2022-3368.json
+++ b/2022/CVE-2022-3368.json
@@ -43,7 +43,7 @@
"description": "it's a CVE-2022-3368 ( patched ), but feel free to use it for check any outdated software or reseach",
"fork": false,
"created_at": "2024-03-05T18:31:29Z",
- "updated_at": "2024-09-12T04:39:11Z",
+ "updated_at": "2024-09-20T08:39:13Z",
"pushed_at": "2024-07-08T16:18:51Z",
"stargazers_count": 5,
"watchers_count": 5,
diff --git a/2022/CVE-2022-35914.json b/2022/CVE-2022-35914.json
index 484d6ce7bd..ffbe2f422f 100644
--- a/2022/CVE-2022-35914.json
+++ b/2022/CVE-2022-35914.json
@@ -13,18 +13,18 @@
"description": null,
"fork": false,
"created_at": "2022-09-30T16:43:28Z",
- "updated_at": "2024-08-12T20:27:27Z",
+ "updated_at": "2024-09-23T04:00:19Z",
"pushed_at": "2024-01-02T11:55:38Z",
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
- "forks_count": 11,
+ "forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 11,
+ "forks": 12,
"watchers": 45,
"score": 0,
"subscribers_count": 2
@@ -152,14 +152,14 @@
{
"id": 791130439,
"name": "CVE-2022-35914",
- "full_name": "allendemoura\/CVE-2022-35914",
+ "full_name": "senderend\/CVE-2022-35914",
"owner": {
- "login": "allendemoura",
+ "login": "senderend",
"id": 90939597,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90939597?v=4",
- "html_url": "https:\/\/github.com\/allendemoura"
+ "html_url": "https:\/\/github.com\/senderend"
},
- "html_url": "https:\/\/github.com\/allendemoura\/CVE-2022-35914",
+ "html_url": "https:\/\/github.com\/senderend\/CVE-2022-35914",
"description": "PoC exploit for GLPI - Command injection using a third-party library script",
"fork": false,
"created_at": "2024-04-24T06:39:10Z",
@@ -208,5 +208,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 860618453,
+ "name": "exploit_CVE-2022-35914",
+ "full_name": "btar1gan\/exploit_CVE-2022-35914",
+ "owner": {
+ "login": "btar1gan",
+ "id": 92728059,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92728059?v=4",
+ "html_url": "https:\/\/github.com\/btar1gan"
+ },
+ "html_url": "https:\/\/github.com\/btar1gan\/exploit_CVE-2022-35914",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-09-20T19:28:27Z",
+ "updated_at": "2024-09-20T19:43:22Z",
+ "pushed_at": "2024-09-20T19:43:19Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-3699.json b/2022/CVE-2022-3699.json
index 13b1508592..44c6165b9d 100644
--- a/2022/CVE-2022-3699.json
+++ b/2022/CVE-2022-3699.json
@@ -13,10 +13,10 @@
"description": "Lenovo Diagnostics Driver EoP - Arbitrary R\/W",
"fork": false,
"created_at": "2022-11-09T14:15:30Z",
- "updated_at": "2024-08-30T03:51:34Z",
+ "updated_at": "2024-09-18T22:47:36Z",
"pushed_at": "2022-12-05T23:36:42Z",
- "stargazers_count": 168,
- "watchers_count": 168,
+ "stargazers_count": 167,
+ "watchers_count": 167,
"has_discussions": false,
"forks_count": 44,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 44,
- "watchers": 168,
+ "watchers": 167,
"score": 0,
"subscribers_count": 5
},
diff --git a/2022/CVE-2022-37706.json b/2022/CVE-2022-37706.json
index 570589ef49..7ed8488b17 100644
--- a/2022/CVE-2022-37706.json
+++ b/2022/CVE-2022-37706.json
@@ -13,10 +13,10 @@
"description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)",
"fork": false,
"created_at": "2022-09-12T19:22:44Z",
- "updated_at": "2024-09-14T00:41:46Z",
+ "updated_at": "2024-09-23T13:16:58Z",
"pushed_at": "2022-09-19T19:41:34Z",
- "stargazers_count": 289,
- "watchers_count": 289,
+ "stargazers_count": 292,
+ "watchers_count": 292,
"has_discussions": false,
"forks_count": 40,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 40,
- "watchers": 289,
+ "watchers": 292,
"score": 0,
"subscribers_count": 6
},
diff --git a/2022/CVE-2022-37969.json b/2022/CVE-2022-37969.json
index 47726ee02b..843742255e 100644
--- a/2022/CVE-2022-37969.json
+++ b/2022/CVE-2022-37969.json
@@ -13,10 +13,10 @@
"description": "Windows LPE exploit for CVE-2022-37969",
"fork": false,
"created_at": "2023-03-09T21:17:44Z",
- "updated_at": "2024-08-12T20:30:10Z",
+ "updated_at": "2024-09-19T03:32:37Z",
"pushed_at": "2023-07-11T16:50:28Z",
- "stargazers_count": 126,
- "watchers_count": 126,
+ "stargazers_count": 125,
+ "watchers_count": 125,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 38,
- "watchers": 126,
+ "watchers": 125,
"score": 0,
"subscribers_count": 5
}
diff --git a/2022/CVE-2022-38694.json b/2022/CVE-2022-38694.json
index b60d4e29e2..9fc4e302eb 100644
--- a/2022/CVE-2022-38694.json
+++ b/2022/CVE-2022-38694.json
@@ -13,12 +13,12 @@
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
"fork": false,
"created_at": "2023-06-10T08:31:26Z",
- "updated_at": "2024-09-15T11:17:18Z",
+ "updated_at": "2024-09-20T09:50:26Z",
"pushed_at": "2024-08-01T15:09:15Z",
- "stargazers_count": 258,
- "watchers_count": 258,
+ "stargazers_count": 259,
+ "watchers_count": 259,
"has_discussions": true,
- "forks_count": 37,
+ "forks_count": 38,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -27,8 +27,8 @@
"unisoc"
],
"visibility": "public",
- "forks": 37,
- "watchers": 258,
+ "forks": 38,
+ "watchers": 259,
"score": 0,
"subscribers_count": 5
},
@@ -46,10 +46,10 @@
"description": "Bootloader unlock using CVE-2022-38694 for Anbernic Unisoc T820 devices",
"fork": false,
"created_at": "2024-06-27T14:28:13Z",
- "updated_at": "2024-08-27T17:24:16Z",
+ "updated_at": "2024-09-23T02:25:01Z",
"pushed_at": "2024-07-01T22:13:19Z",
- "stargazers_count": 19,
- "watchers_count": 19,
+ "stargazers_count": 20,
+ "watchers_count": 20,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -58,7 +58,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 19,
+ "watchers": 20,
"score": 0,
"subscribers_count": 1
}
diff --git a/2022/CVE-2022-39197.json b/2022/CVE-2022-39197.json
index f082993c1d..ad419ff2ed 100644
--- a/2022/CVE-2022-39197.json
+++ b/2022/CVE-2022-39197.json
@@ -227,10 +227,10 @@
"description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ",
"fork": false,
"created_at": "2022-09-26T08:58:21Z",
- "updated_at": "2024-09-01T20:48:27Z",
+ "updated_at": "2024-09-18T14:32:50Z",
"pushed_at": "2022-09-26T13:20:38Z",
- "stargazers_count": 312,
- "watchers_count": 312,
+ "stargazers_count": 311,
+ "watchers_count": 311,
"has_discussions": false,
"forks_count": 46,
"allow_forking": true,
@@ -243,7 +243,7 @@
],
"visibility": "public",
"forks": 46,
- "watchers": 312,
+ "watchers": 311,
"score": 0,
"subscribers_count": 5
},
diff --git a/2022/CVE-2022-40494.json b/2022/CVE-2022-40494.json
index ab4fe5849e..78dcdca53a 100644
--- a/2022/CVE-2022-40494.json
+++ b/2022/CVE-2022-40494.json
@@ -13,12 +13,12 @@
"description": "nps认证绕过利用工具,CVE-2022-40494,使用此工具可在浏览器访问web控制端后台页面,或者批量获取socks5和http代理",
"fork": false,
"created_at": "2022-08-04T08:22:41Z",
- "updated_at": "2024-09-09T03:08:10Z",
+ "updated_at": "2024-09-20T15:50:17Z",
"pushed_at": "2022-08-19T09:04:09Z",
- "stargazers_count": 288,
- "watchers_count": 288,
+ "stargazers_count": 292,
+ "watchers_count": 292,
"has_discussions": false,
- "forks_count": 38,
+ "forks_count": 39,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -32,8 +32,8 @@
"proxy"
],
"visibility": "public",
- "forks": 38,
- "watchers": 288,
+ "forks": 39,
+ "watchers": 292,
"score": 0,
"subscribers_count": 6
}
diff --git a/2022/CVE-2022-42864.json b/2022/CVE-2022-42864.json
index 76c4651692..4e30fa92d6 100644
--- a/2022/CVE-2022-42864.json
+++ b/2022/CVE-2022-42864.json
@@ -13,10 +13,10 @@
"description": "Proof-of-concept for the CVE-2022-42864 IOHIDFamily race condition",
"fork": false,
"created_at": "2023-01-19T20:36:49Z",
- "updated_at": "2024-08-12T20:29:24Z",
+ "updated_at": "2024-09-20T06:12:29Z",
"pushed_at": "2023-01-20T17:58:39Z",
- "stargazers_count": 60,
- "watchers_count": 60,
+ "stargazers_count": 61,
+ "watchers_count": 61,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
- "watchers": 60,
+ "watchers": 61,
"score": 0,
"subscribers_count": 5
}
diff --git a/2022/CVE-2022-42889.json b/2022/CVE-2022-42889.json
index e84b7ffc29..c28e6bc60d 100644
--- a/2022/CVE-2022-42889.json
+++ b/2022/CVE-2022-42889.json
@@ -50,10 +50,10 @@
"description": "Proof of Concept for the Apache commons-text vulnerability CVE-2022-42889.",
"fork": false,
"created_at": "2022-10-17T18:50:36Z",
- "updated_at": "2024-08-12T20:27:51Z",
+ "updated_at": "2024-09-21T09:42:47Z",
"pushed_at": "2022-10-20T11:56:13Z",
- "stargazers_count": 33,
- "watchers_count": 33,
+ "stargazers_count": 34,
+ "watchers_count": 34,
"has_discussions": true,
"forks_count": 17,
"allow_forking": true,
@@ -67,7 +67,7 @@
],
"visibility": "public",
"forks": 17,
- "watchers": 33,
+ "watchers": 34,
"score": 0,
"subscribers_count": 3
},
@@ -90,13 +90,13 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": true,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 5
@@ -280,10 +280,10 @@
"description": "Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.",
"fork": false,
"created_at": "2022-10-19T11:49:08Z",
- "updated_at": "2024-08-06T15:10:49Z",
+ "updated_at": "2024-09-21T00:49:33Z",
"pushed_at": "2023-12-29T14:57:34Z",
- "stargazers_count": 49,
- "watchers_count": 49,
+ "stargazers_count": 51,
+ "watchers_count": 51,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@@ -304,7 +304,7 @@
],
"visibility": "public",
"forks": 8,
- "watchers": 49,
+ "watchers": 51,
"score": 0,
"subscribers_count": 2
},
@@ -1064,7 +1064,7 @@
"fork": false,
"created_at": "2023-02-19T19:49:41Z",
"updated_at": "2023-03-26T07:35:15Z",
- "pushed_at": "2024-08-23T06:29:34Z",
+ "pushed_at": "2024-09-20T05:18:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@@ -1394,7 +1394,7 @@
"fork": false,
"created_at": "2023-09-22T17:17:26Z",
"updated_at": "2023-09-22T17:17:44Z",
- "pushed_at": "2024-08-23T08:21:22Z",
+ "pushed_at": "2024-09-20T06:34:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
diff --git a/2022/CVE-2022-43684.json b/2022/CVE-2022-43684.json
index 62e1746bec..2040685aef 100644
--- a/2022/CVE-2022-43684.json
+++ b/2022/CVE-2022-43684.json
@@ -13,10 +13,10 @@
"description": "CVE-2022-43684",
"fork": false,
"created_at": "2023-07-05T20:53:42Z",
- "updated_at": "2023-07-18T12:28:52Z",
+ "updated_at": "2024-09-17T20:44:03Z",
"pushed_at": "2023-07-05T21:00:47Z",
- "stargazers_count": 10,
- "watchers_count": 10,
+ "stargazers_count": 11,
+ "watchers_count": 11,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
- "watchers": 10,
+ "watchers": 11,
"score": 0,
"subscribers_count": 1
}
diff --git a/2022/CVE-2022-46169.json b/2022/CVE-2022-46169.json
index 60d4091140..5a6586bb01 100644
--- a/2022/CVE-2022-46169.json
+++ b/2022/CVE-2022-46169.json
@@ -1005,35 +1005,5 @@
"watchers": 0,
"score": 0,
"subscribers_count": 0
- },
- {
- "id": 852501253,
- "name": "CVE-2022-46169",
- "full_name": "rockyroadonline\/CVE-2022-46169",
- "owner": {
- "login": "rockyroadonline",
- "id": 179964021,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179964021?v=4",
- "html_url": "https:\/\/github.com\/rockyroadonline"
- },
- "html_url": "https:\/\/github.com\/rockyroadonline\/CVE-2022-46169",
- "description": "PoC for Cacti 1.2.22 - CVE-2022-46169",
- "fork": false,
- "created_at": "2024-09-04T23:13:41Z",
- "updated_at": "2024-09-04T23:18:04Z",
- "pushed_at": "2024-09-04T23:16:44Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "has_discussions": false,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 0,
- "score": 0,
- "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2022/CVE-2022-46689.json b/2022/CVE-2022-46689.json
index 7c5c766fac..025543ef6d 100644
--- a/2022/CVE-2022-46689.json
+++ b/2022/CVE-2022-46689.json
@@ -18,13 +18,13 @@
"stargazers_count": 388,
"watchers_count": 388,
"has_discussions": false,
- "forks_count": 32,
+ "forks_count": 33,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 32,
+ "forks": 33,
"watchers": 388,
"score": 0,
"subscribers_count": 11
@@ -73,10 +73,10 @@
"description": "CVE-2022-46689",
"fork": false,
"created_at": "2022-12-26T00:08:55Z",
- "updated_at": "2024-09-04T07:56:21Z",
+ "updated_at": "2024-09-21T14:05:29Z",
"pushed_at": "2023-10-10T16:53:48Z",
- "stargazers_count": 117,
- "watchers_count": 117,
+ "stargazers_count": 118,
+ "watchers_count": 118,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
- "watchers": 117,
+ "watchers": 118,
"score": 0,
"subscribers_count": 8
},
@@ -103,10 +103,10 @@
"description": "Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689.",
"fork": false,
"created_at": "2022-12-26T06:56:35Z",
- "updated_at": "2024-09-17T15:20:01Z",
+ "updated_at": "2024-09-23T08:57:54Z",
"pushed_at": "2023-08-02T09:35:14Z",
- "stargazers_count": 881,
- "watchers_count": 881,
+ "stargazers_count": 882,
+ "watchers_count": 882,
"has_discussions": false,
"forks_count": 70,
"allow_forking": true,
@@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 70,
- "watchers": 881,
+ "watchers": 882,
"score": 0,
"subscribers_count": 25
},
@@ -133,10 +133,10 @@
"description": "File Manager for CVE-2022-46689",
"fork": false,
"created_at": "2022-12-28T22:13:35Z",
- "updated_at": "2024-09-12T22:31:09Z",
+ "updated_at": "2024-09-18T06:44:20Z",
"pushed_at": "2023-01-02T00:36:39Z",
- "stargazers_count": 80,
- "watchers_count": 80,
+ "stargazers_count": 81,
+ "watchers_count": 81,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
- "watchers": 80,
+ "watchers": 81,
"score": 0,
"subscribers_count": 7
},
@@ -163,10 +163,10 @@
"description": "CVE-2022-46689",
"fork": false,
"created_at": "2023-01-03T21:46:37Z",
- "updated_at": "2024-09-04T08:10:37Z",
+ "updated_at": "2024-09-23T08:58:26Z",
"pushed_at": "2023-01-19T08:04:02Z",
- "stargazers_count": 66,
- "watchers_count": 66,
+ "stargazers_count": 65,
+ "watchers_count": 65,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 66,
+ "watchers": 65,
"score": 0,
"subscribers_count": 3
},
diff --git a/2022/CVE-2022-47130.json b/2022/CVE-2022-47130.json
new file mode 100644
index 0000000000..7016b0159c
--- /dev/null
+++ b/2022/CVE-2022-47130.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 859926326,
+ "name": "CVE-2022-47130",
+ "full_name": "OpenXP-Research\/CVE-2022-47130",
+ "owner": {
+ "login": "OpenXP-Research",
+ "id": 124332420,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/124332420?v=4",
+ "html_url": "https:\/\/github.com\/OpenXP-Research"
+ },
+ "html_url": "https:\/\/github.com\/OpenXP-Research\/CVE-2022-47130",
+ "description": "Academy LMS <= 5.10 CSRF",
+ "fork": false,
+ "created_at": "2024-09-19T14:14:14Z",
+ "updated_at": "2024-09-19T14:14:40Z",
+ "pushed_at": "2024-09-19T14:14:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-47131.json b/2022/CVE-2022-47131.json
new file mode 100644
index 0000000000..7ac96a6737
--- /dev/null
+++ b/2022/CVE-2022-47131.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 859925470,
+ "name": "CVE-2022-47131",
+ "full_name": "OpenXP-Research\/CVE-2022-47131",
+ "owner": {
+ "login": "OpenXP-Research",
+ "id": 124332420,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/124332420?v=4",
+ "html_url": "https:\/\/github.com\/OpenXP-Research"
+ },
+ "html_url": "https:\/\/github.com\/OpenXP-Research\/CVE-2022-47131",
+ "description": "Academy LMS <= 5.10 CSRF \/ XSS",
+ "fork": false,
+ "created_at": "2024-09-19T14:12:43Z",
+ "updated_at": "2024-09-19T14:13:09Z",
+ "pushed_at": "2024-09-19T14:13:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2022/CVE-2022-47132.json b/2022/CVE-2022-47132.json
new file mode 100644
index 0000000000..967a52c72d
--- /dev/null
+++ b/2022/CVE-2022-47132.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 859924903,
+ "name": "CVE-2022-47132",
+ "full_name": "OpenXP-Research\/CVE-2022-47132",
+ "owner": {
+ "login": "OpenXP-Research",
+ "id": 124332420,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/124332420?v=4",
+ "html_url": "https:\/\/github.com\/OpenXP-Research"
+ },
+ "html_url": "https:\/\/github.com\/OpenXP-Research\/CVE-2022-47132",
+ "description": "Academy LMS <= 5.10 CSRF",
+ "fork": false,
+ "created_at": "2024-09-19T14:11:42Z",
+ "updated_at": "2024-09-19T14:12:11Z",
+ "pushed_at": "2024-09-19T14:12:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-0386.json b/2023/CVE-2023-0386.json
index f33c62238c..29ae0eb3dd 100644
--- a/2023/CVE-2023-0386.json
+++ b/2023/CVE-2023-0386.json
@@ -73,10 +73,10 @@
"description": "CVE-2023-0386在ubuntu22.04上的提权",
"fork": false,
"created_at": "2023-05-05T03:02:13Z",
- "updated_at": "2024-09-15T18:57:08Z",
+ "updated_at": "2024-09-20T15:48:31Z",
"pushed_at": "2023-06-13T08:58:53Z",
- "stargazers_count": 381,
- "watchers_count": 381,
+ "stargazers_count": 382,
+ "watchers_count": 382,
"has_discussions": false,
"forks_count": 62,
"allow_forking": true,
@@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 62,
- "watchers": 381,
+ "watchers": 382,
"score": 0,
"subscribers_count": 4
},
diff --git a/2023/CVE-2023-0861.json b/2023/CVE-2023-0861.json
index 5ed78ee5d5..e5542a3cf1 100644
--- a/2023/CVE-2023-0861.json
+++ b/2023/CVE-2023-0861.json
@@ -13,7 +13,7 @@
"description": "Analyzing and Reproducing the Command Injection Vulnerability (CVE-2023-0861) in NetModule Routers",
"fork": false,
"created_at": "2023-03-12T17:43:00Z",
- "updated_at": "2023-04-29T13:45:06Z",
+ "updated_at": "2024-09-19T13:58:55Z",
"pushed_at": "2023-03-16T19:17:47Z",
"stargazers_count": 7,
"watchers_count": 7,
diff --git a/2023/CVE-2023-1177.json b/2023/CVE-2023-1177.json
index bf7556edd0..9a70b5d203 100644
--- a/2023/CVE-2023-1177.json
+++ b/2023/CVE-2023-1177.json
@@ -118,5 +118,41 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 859830353,
+ "name": "CVE-2023-1177",
+ "full_name": "charlesgargasson\/CVE-2023-1177",
+ "owner": {
+ "login": "charlesgargasson",
+ "id": 26895987,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26895987?v=4",
+ "html_url": "https:\/\/github.com\/charlesgargasson"
+ },
+ "html_url": "https:\/\/github.com\/charlesgargasson\/CVE-2023-1177",
+ "description": "MLFlow Path Traversal",
+ "fork": false,
+ "created_at": "2024-09-19T10:59:31Z",
+ "updated_at": "2024-09-19T11:04:13Z",
+ "pushed_at": "2024-09-19T11:02:21Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "cve",
+ "cve-2023-1177",
+ "exploit",
+ "mlflow",
+ "poc"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2023/CVE-2023-20562.json b/2023/CVE-2023-20562.json
index eb442e3a98..3c5ee03f97 100644
--- a/2023/CVE-2023-20562.json
+++ b/2023/CVE-2023-20562.json
@@ -13,7 +13,7 @@
"description": null,
"fork": false,
"created_at": "2023-08-21T00:31:50Z",
- "updated_at": "2024-09-17T14:53:56Z",
+ "updated_at": "2024-09-23T20:56:43Z",
"pushed_at": "2023-08-21T00:33:08Z",
"stargazers_count": 55,
"watchers_count": 55,
diff --git a/2023/CVE-2023-21716.json b/2023/CVE-2023-21716.json
index 3ec3ea6612..9ee9afd9d8 100644
--- a/2023/CVE-2023-21716.json
+++ b/2023/CVE-2023-21716.json
@@ -193,10 +193,10 @@
"description": "POC : CVE-2023-21716 Microsoft Word RTF Font Table Heap Corruption",
"fork": false,
"created_at": "2023-04-16T21:12:29Z",
- "updated_at": "2024-03-12T16:55:45Z",
+ "updated_at": "2024-09-19T21:32:04Z",
"pushed_at": "2023-04-16T21:16:25Z",
- "stargazers_count": 4,
- "watchers_count": 4,
+ "stargazers_count": 5,
+ "watchers_count": 5,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@@ -205,7 +205,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
- "watchers": 4,
+ "watchers": 5,
"score": 0,
"subscribers_count": 3
},
diff --git a/2023/CVE-2023-21768.json b/2023/CVE-2023-21768.json
index 0957702b3e..28a2df6270 100644
--- a/2023/CVE-2023-21768.json
+++ b/2023/CVE-2023-21768.json
@@ -73,7 +73,7 @@
"description": "Using CVE-2023-21768 to manual map kernel mode driver ",
"fork": false,
"created_at": "2023-03-10T19:08:28Z",
- "updated_at": "2024-09-17T05:08:00Z",
+ "updated_at": "2024-09-24T07:23:29Z",
"pushed_at": "2023-03-10T20:16:53Z",
"stargazers_count": 171,
"watchers_count": 171,
@@ -111,10 +111,10 @@
"description": "Windows_AFD_LPE_CVE-2023-21768",
"fork": false,
"created_at": "2023-03-13T20:32:50Z",
- "updated_at": "2024-09-14T22:05:22Z",
+ "updated_at": "2024-09-19T03:32:38Z",
"pushed_at": "2023-08-27T10:41:40Z",
- "stargazers_count": 41,
- "watchers_count": 41,
+ "stargazers_count": 40,
+ "watchers_count": 40,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@@ -123,7 +123,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
- "watchers": 41,
+ "watchers": 40,
"score": 0,
"subscribers_count": 1
},
diff --git a/2023/CVE-2023-21839.json b/2023/CVE-2023-21839.json
index 16ed2175c4..94db11ec07 100644
--- a/2023/CVE-2023-21839.json
+++ b/2023/CVE-2023-21839.json
@@ -43,7 +43,7 @@
"description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)",
"fork": false,
"created_at": "2023-02-24T13:54:42Z",
- "updated_at": "2024-09-05T02:56:01Z",
+ "updated_at": "2024-09-19T00:38:56Z",
"pushed_at": "2023-02-24T13:29:38Z",
"stargazers_count": 48,
"watchers_count": 48,
@@ -73,10 +73,10 @@
"description": "CVE-2023-21839工具",
"fork": false,
"created_at": "2023-03-11T08:26:30Z",
- "updated_at": "2024-05-30T11:01:54Z",
+ "updated_at": "2024-09-18T08:23:39Z",
"pushed_at": "2023-03-11T08:28:28Z",
- "stargazers_count": 25,
- "watchers_count": 25,
+ "stargazers_count": 26,
+ "watchers_count": 26,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
- "watchers": 25,
+ "watchers": 26,
"score": 0,
"subscribers_count": 3
},
@@ -197,10 +197,10 @@
"description": "CVE-2024-20931, this is the bypass of the patch of CVE-2023-21839",
"fork": false,
"created_at": "2024-02-06T15:09:33Z",
- "updated_at": "2024-09-12T01:38:43Z",
+ "updated_at": "2024-09-18T22:47:55Z",
"pushed_at": "2024-02-06T15:56:12Z",
- "stargazers_count": 61,
- "watchers_count": 61,
+ "stargazers_count": 60,
+ "watchers_count": 60,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@@ -209,7 +209,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
- "watchers": 61,
+ "watchers": 60,
"score": 0,
"subscribers_count": 2
}
diff --git a/2023/CVE-2023-22515.json b/2023/CVE-2023-22515.json
index 78b0067e57..97c27b7b31 100644
--- a/2023/CVE-2023-22515.json
+++ b/2023/CVE-2023-22515.json
@@ -654,10 +654,10 @@
"description": "NSE script for checking the presence of CVE-2023-22515",
"fork": false,
"created_at": "2024-04-26T17:57:33Z",
- "updated_at": "2024-04-26T17:58:13Z",
+ "updated_at": "2024-09-18T19:46:55Z",
"pushed_at": "2024-04-26T17:58:10Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -666,7 +666,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 0,
+ "watchers": 1,
"score": 0,
"subscribers_count": 1
},
@@ -744,10 +744,10 @@
"description": "Vulnerability checking tool via Nmap Scripting Engine",
"fork": false,
"created_at": "2024-07-18T19:55:59Z",
- "updated_at": "2024-08-19T19:11:54Z",
+ "updated_at": "2024-09-22T17:13:24Z",
"pushed_at": "2024-08-19T19:11:51Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 3,
+ "watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -756,7 +756,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 1,
+ "watchers": 3,
"score": 0,
"subscribers_count": 1
},
diff --git a/2023/CVE-2023-22527.json b/2023/CVE-2023-22527.json
index 9461cedcde..f6e1fc9684 100644
--- a/2023/CVE-2023-22527.json
+++ b/2023/CVE-2023-22527.json
@@ -193,10 +193,10 @@
"description": "A critical severity Remote Code Execution (RCE) vulnerability (CVE-2023-22527) was discovered in Confluence Server and Data Center. ",
"fork": false,
"created_at": "2024-01-23T02:17:36Z",
- "updated_at": "2024-09-07T03:38:01Z",
+ "updated_at": "2024-09-24T03:40:22Z",
"pushed_at": "2024-01-23T12:03:00Z",
- "stargazers_count": 18,
- "watchers_count": 18,
+ "stargazers_count": 19,
+ "watchers_count": 19,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@@ -205,7 +205,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
- "watchers": 18,
+ "watchers": 19,
"score": 0,
"subscribers_count": 1
},
@@ -646,19 +646,19 @@
"description": "confluence rce (CVE-2021-26084, CVE-2022-26134, CVE-2023-22527)",
"fork": false,
"created_at": "2024-05-29T03:20:22Z",
- "updated_at": "2024-08-26T09:24:34Z",
+ "updated_at": "2024-09-22T06:25:09Z",
"pushed_at": "2024-08-26T09:24:31Z",
- "stargazers_count": 2,
- "watchers_count": 2,
+ "stargazers_count": 3,
+ "watchers_count": 3,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
- "watchers": 2,
+ "forks": 1,
+ "watchers": 3,
"score": 0,
"subscribers_count": 1
}
diff --git a/2023/CVE-2023-2255.json b/2023/CVE-2023-2255.json
index 00f6191eef..d6fb854a67 100644
--- a/2023/CVE-2023-2255.json
+++ b/2023/CVE-2023-2255.json
@@ -13,10 +13,10 @@
"description": "CVE-2023-2255 Libre Office ",
"fork": false,
"created_at": "2023-07-10T20:54:56Z",
- "updated_at": "2024-09-08T12:34:28Z",
+ "updated_at": "2024-09-21T15:50:13Z",
"pushed_at": "2023-07-10T21:00:09Z",
- "stargazers_count": 52,
- "watchers_count": 52,
+ "stargazers_count": 53,
+ "watchers_count": 53,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
- "watchers": 52,
+ "watchers": 53,
"score": 0,
"subscribers_count": 1
},
diff --git a/2023/CVE-2023-23752.json b/2023/CVE-2023-23752.json
index 10d0cafff0..e1cf79f97a 100644
--- a/2023/CVE-2023-23752.json
+++ b/2023/CVE-2023-23752.json
@@ -1413,14 +1413,14 @@
{
"id": 796329590,
"name": "CVE-2023-23752-Joomla-v4.2.8",
- "full_name": "mil4ne\/CVE-2023-23752-Joomla-v4.2.8",
+ "full_name": "fullaw4ke\/CVE-2023-23752-Joomla-v4.2.8",
"owner": {
- "login": "mil4ne",
+ "login": "fullaw4ke",
"id": 89859279,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89859279?v=4",
- "html_url": "https:\/\/github.com\/mil4ne"
+ "html_url": "https:\/\/github.com\/fullaw4ke"
},
- "html_url": "https:\/\/github.com\/mil4ne\/CVE-2023-23752-Joomla-v4.2.8",
+ "html_url": "https:\/\/github.com\/fullaw4ke\/CVE-2023-23752-Joomla-v4.2.8",
"description": null,
"fork": false,
"created_at": "2024-05-05T16:16:03Z",
diff --git a/2023/CVE-2023-24044.json b/2023/CVE-2023-24044.json
index 4ac2ef220d..5863ba6094 100644
--- a/2023/CVE-2023-24044.json
+++ b/2023/CVE-2023-24044.json
@@ -13,10 +13,10 @@
"description": "Plesk Obsidian <=18.0.49 - Open Redirect",
"fork": false,
"created_at": "2024-05-26T06:56:05Z",
- "updated_at": "2024-06-24T09:05:16Z",
+ "updated_at": "2024-09-18T15:02:55Z",
"pushed_at": "2024-06-24T09:03:56Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 0,
- "watchers": 0,
+ "watchers": 1,
"score": 0,
"subscribers_count": 0
}
diff --git a/2023/CVE-2023-25202.json b/2023/CVE-2023-25202.json
index feb00a86d0..8a5e7fb9f2 100644
--- a/2023/CVE-2023-25202.json
+++ b/2023/CVE-2023-25202.json
@@ -13,10 +13,10 @@
"description": "CVE-2023-25202: Insecure file upload mechanism",
"fork": false,
"created_at": "2024-02-16T08:22:48Z",
- "updated_at": "2024-02-16T08:22:48Z",
+ "updated_at": "2024-09-19T07:09:54Z",
"pushed_at": "2024-02-16T08:51:09Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 0,
+ "watchers": 1,
"score": 0,
"subscribers_count": 1
}
diff --git a/2023/CVE-2023-25355.json b/2023/CVE-2023-25355.json
index 6d97cbeb85..5fad45a3f1 100644
--- a/2023/CVE-2023-25355.json
+++ b/2023/CVE-2023-25355.json
@@ -13,10 +13,10 @@
"description": "CVE-2023-25355 and CVE-2023-25356 with automated service reload",
"fork": false,
"created_at": "2024-09-04T11:00:23Z",
- "updated_at": "2024-09-04T15:06:17Z",
+ "updated_at": "2024-09-23T13:17:53Z",
"pushed_at": "2024-09-04T15:06:13Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 0,
+ "watchers": 1,
"score": 0,
"subscribers_count": 1
}
diff --git a/2023/CVE-2023-25610.json b/2023/CVE-2023-25610.json
index 2d3c82e447..b25a14188c 100644
--- a/2023/CVE-2023-25610.json
+++ b/2023/CVE-2023-25610.json
@@ -13,7 +13,7 @@
"description": "FortiOS 管理界面中的堆内存下溢导致远程代码执行",
"fork": false,
"created_at": "2023-06-17T06:57:28Z",
- "updated_at": "2024-09-03T01:03:35Z",
+ "updated_at": "2024-09-23T07:20:31Z",
"pushed_at": "2023-06-21T13:48:25Z",
"stargazers_count": 23,
"watchers_count": 23,
diff --git a/2023/CVE-2023-26035.json b/2023/CVE-2023-26035.json
index 69f5d2a83d..2a0b0c0a57 100644
--- a/2023/CVE-2023-26035.json
+++ b/2023/CVE-2023-26035.json
@@ -13,10 +13,10 @@
"description": "Unauthenticated RCE in ZoneMinder Snapshots - Poc Exploit",
"fork": false,
"created_at": "2023-12-11T19:23:13Z",
- "updated_at": "2024-07-09T02:43:14Z",
+ "updated_at": "2024-09-21T19:48:17Z",
"pushed_at": "2024-05-07T03:32:04Z",
- "stargazers_count": 17,
- "watchers_count": 17,
+ "stargazers_count": 18,
+ "watchers_count": 18,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 2,
- "watchers": 17,
+ "watchers": 18,
"score": 0,
"subscribers_count": 1
},
diff --git a/2023/CVE-2023-2640.json b/2023/CVE-2023-2640.json
index c4d93f886e..a24995e853 100644
--- a/2023/CVE-2023-2640.json
+++ b/2023/CVE-2023-2640.json
@@ -73,10 +73,10 @@
"description": "GameOver(lay) Ubuntu Privilege Escalation",
"fork": false,
"created_at": "2023-10-09T22:02:42Z",
- "updated_at": "2024-09-04T15:15:41Z",
+ "updated_at": "2024-09-20T20:41:36Z",
"pushed_at": "2023-10-09T22:44:21Z",
- "stargazers_count": 112,
- "watchers_count": 112,
+ "stargazers_count": 113,
+ "watchers_count": 113,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
- "watchers": 112,
+ "watchers": 113,
"score": 0,
"subscribers_count": 1
},
diff --git a/2023/CVE-2023-27163.json b/2023/CVE-2023-27163.json
index 28cd6fb2a9..2e25953109 100644
--- a/2023/CVE-2023-27163.json
+++ b/2023/CVE-2023-27163.json
@@ -113,7 +113,7 @@
"description": "Poc of SSRF for Request-Baskets (CVE-2023-27163)",
"fork": false,
"created_at": "2023-07-26T11:00:59Z",
- "updated_at": "2024-05-06T08:14:42Z",
+ "updated_at": "2024-09-18T18:11:04Z",
"pushed_at": "2023-07-26T13:35:04Z",
"stargazers_count": 2,
"watchers_count": 2,
@@ -493,5 +493,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 861116698,
+ "name": "exploit_CVE-2023-27163",
+ "full_name": "btar1gan\/exploit_CVE-2023-27163",
+ "owner": {
+ "login": "btar1gan",
+ "id": 92728059,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92728059?v=4",
+ "html_url": "https:\/\/github.com\/btar1gan"
+ },
+ "html_url": "https:\/\/github.com\/btar1gan\/exploit_CVE-2023-27163",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-09-22T03:33:18Z",
+ "updated_at": "2024-09-22T03:33:56Z",
+ "pushed_at": "2024-09-22T03:33:54Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2023/CVE-2023-27327.json b/2023/CVE-2023-27327.json
index a38adbfe84..cc6538b43b 100644
--- a/2023/CVE-2023-27327.json
+++ b/2023/CVE-2023-27327.json
@@ -18,13 +18,13 @@
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
- "forks_count": 6,
+ "forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 6,
+ "forks": 5,
"watchers": 16,
"score": 0,
"subscribers_count": 1
diff --git a/2023/CVE-2023-27524.json b/2023/CVE-2023-27524.json
index 4eebdafcb3..e8abf00932 100644
--- a/2023/CVE-2023-27524.json
+++ b/2023/CVE-2023-27524.json
@@ -62,18 +62,18 @@
{
"id": 633292629,
"name": "CVE-2023-27524",
- "full_name": "antx-code\/CVE-2023-27524",
+ "full_name": "ZZ-SOCMAP\/CVE-2023-27524",
"owner": {
- "login": "antx-code",
- "id": 7877940,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7877940?v=4",
- "html_url": "https:\/\/github.com\/antx-code"
+ "login": "ZZ-SOCMAP",
+ "id": 98105412,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98105412?v=4",
+ "html_url": "https:\/\/github.com\/ZZ-SOCMAP"
},
- "html_url": "https:\/\/github.com\/antx-code\/CVE-2023-27524",
+ "html_url": "https:\/\/github.com\/ZZ-SOCMAP\/CVE-2023-27524",
"description": "Apache Superset Auth Bypass Vulnerability CVE-2023-27524.",
"fork": false,
"created_at": "2023-04-27T07:31:40Z",
- "updated_at": "2023-05-02T04:21:43Z",
+ "updated_at": "2024-09-19T01:43:06Z",
"pushed_at": "2023-04-27T07:31:58Z",
"stargazers_count": 3,
"watchers_count": 3,
@@ -87,7 +87,7 @@
"forks": 2,
"watchers": 3,
"score": 0,
- "subscribers_count": 1
+ "subscribers_count": 2
},
{
"id": 636271031,
diff --git a/2023/CVE-2023-28229.json b/2023/CVE-2023-28229.json
index 1ffc9332ef..dcd317ff03 100644
--- a/2023/CVE-2023-28229.json
+++ b/2023/CVE-2023-28229.json
@@ -43,7 +43,7 @@
"description": "it's a CVE-2023-28229 ( patched ), but feel free to use it for check any outdated software or reseach",
"fork": false,
"created_at": "2024-03-27T20:57:46Z",
- "updated_at": "2024-09-12T04:39:13Z",
+ "updated_at": "2024-09-20T08:39:15Z",
"pushed_at": "2024-07-08T16:04:59Z",
"stargazers_count": 6,
"watchers_count": 6,
diff --git a/2023/CVE-2023-28252.json b/2023/CVE-2023-28252.json
index aff0c9d6c6..384ed82cd1 100644
--- a/2023/CVE-2023-28252.json
+++ b/2023/CVE-2023-28252.json
@@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-06-27T12:22:05Z",
- "updated_at": "2024-09-15T15:28:05Z",
+ "updated_at": "2024-09-19T03:32:38Z",
"pushed_at": "2023-07-10T16:57:44Z",
- "stargazers_count": 170,
- "watchers_count": 170,
+ "stargazers_count": 169,
+ "watchers_count": 169,
"has_discussions": false,
"forks_count": 46,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 46,
- "watchers": 170,
+ "watchers": 169,
"score": 0,
"subscribers_count": 2
},
@@ -163,7 +163,7 @@
"description": "it's a CVE-2023-28252 ( patched ), but feel free to use it for check any outdated software or reseach",
"fork": false,
"created_at": "2024-03-21T16:16:52Z",
- "updated_at": "2024-09-12T04:39:07Z",
+ "updated_at": "2024-09-20T08:39:09Z",
"pushed_at": "2024-07-09T03:43:41Z",
"stargazers_count": 7,
"watchers_count": 7,
diff --git a/2023/CVE-2023-28324.json b/2023/CVE-2023-28324.json
index cb7f801f90..e8f1d4a360 100644
--- a/2023/CVE-2023-28324.json
+++ b/2023/CVE-2023-28324.json
@@ -13,19 +13,19 @@
"description": "Ivanti EPM AgentPortal RCE Vulnerability",
"fork": false,
"created_at": "2024-09-13T14:02:04Z",
- "updated_at": "2024-09-17T00:54:04Z",
+ "updated_at": "2024-09-23T02:28:23Z",
"pushed_at": "2024-09-16T14:24:20Z",
- "stargazers_count": 11,
- "watchers_count": 11,
+ "stargazers_count": 19,
+ "watchers_count": 19,
"has_discussions": false,
- "forks_count": 4,
+ "forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 4,
- "watchers": 11,
+ "forks": 6,
+ "watchers": 19,
"score": 0,
"subscribers_count": 4
}
diff --git a/2023/CVE-2023-29360.json b/2023/CVE-2023-29360.json
index 8c07aa549c..45fa89b979 100644
--- a/2023/CVE-2023-29360.json
+++ b/2023/CVE-2023-29360.json
@@ -13,7 +13,7 @@
"description": "Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver",
"fork": false,
"created_at": "2023-09-24T21:59:23Z",
- "updated_at": "2024-09-08T11:44:43Z",
+ "updated_at": "2024-09-21T04:07:24Z",
"pushed_at": "2023-10-12T19:18:32Z",
"stargazers_count": 136,
"watchers_count": 136,
diff --git a/2023/CVE-2023-30253.json b/2023/CVE-2023-30253.json
index f5bd2ffd71..99c60d8534 100644
--- a/2023/CVE-2023-30253.json
+++ b/2023/CVE-2023-30253.json
@@ -73,10 +73,10 @@
"description": "Reverse Shell POC exploit for Dolibarr <= 17.0.0 (CVE-2023-30253), PHP Code Injection",
"fork": false,
"created_at": "2024-05-27T15:10:12Z",
- "updated_at": "2024-09-15T21:52:37Z",
+ "updated_at": "2024-09-19T14:21:58Z",
"pushed_at": "2024-05-28T15:10:20Z",
- "stargazers_count": 31,
- "watchers_count": 31,
+ "stargazers_count": 32,
+ "watchers_count": 32,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
- "watchers": 31,
+ "watchers": 32,
"score": 0,
"subscribers_count": 1
},
@@ -182,5 +182,35 @@
"watchers": 1,
"score": 0,
"subscribers_count": 2
+ },
+ {
+ "id": 860627688,
+ "name": "CVE-2023-30253",
+ "full_name": "bluetoothStrawberry\/CVE-2023-30253",
+ "owner": {
+ "login": "bluetoothStrawberry",
+ "id": 154050956,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/154050956?v=4",
+ "html_url": "https:\/\/github.com\/bluetoothStrawberry"
+ },
+ "html_url": "https:\/\/github.com\/bluetoothStrawberry\/CVE-2023-30253",
+ "description": "Dolibarr 17.0.0 PHP Code Injection Exploit",
+ "fork": false,
+ "created_at": "2024-09-20T19:54:22Z",
+ "updated_at": "2024-09-20T20:05:34Z",
+ "pushed_at": "2024-09-20T20:05:31Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2023/CVE-2023-3076.json b/2023/CVE-2023-3076.json
index 5a5e0a34e2..1923159117 100644
--- a/2023/CVE-2023-3076.json
+++ b/2023/CVE-2023-3076.json
@@ -13,10 +13,10 @@
"description": "Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (Mass Add Admin + PHP File Upload)",
"fork": false,
"created_at": "2023-09-19T04:59:01Z",
- "updated_at": "2024-08-22T20:11:26Z",
+ "updated_at": "2024-09-22T19:38:38Z",
"pushed_at": "2023-09-20T11:41:02Z",
- "stargazers_count": 16,
- "watchers_count": 16,
+ "stargazers_count": 18,
+ "watchers_count": 18,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@@ -36,7 +36,7 @@
],
"visibility": "public",
"forks": 2,
- "watchers": 16,
+ "watchers": 18,
"score": 0,
"subscribers_count": 1
}
diff --git a/2023/CVE-2023-31497.json b/2023/CVE-2023-31497.json
index ff08074fbe..40ce00a9dd 100644
--- a/2023/CVE-2023-31497.json
+++ b/2023/CVE-2023-31497.json
@@ -13,10 +13,10 @@
"description": "Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS (CVE-2023-31497).",
"fork": false,
"created_at": "2023-04-09T05:26:40Z",
- "updated_at": "2024-08-01T01:51:21Z",
+ "updated_at": "2024-09-21T20:58:43Z",
"pushed_at": "2023-10-30T09:03:02Z",
- "stargazers_count": 16,
- "watchers_count": 16,
+ "stargazers_count": 17,
+ "watchers_count": 17,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 2,
- "watchers": 16,
+ "watchers": 17,
"score": 0,
"subscribers_count": 2
}
diff --git a/2023/CVE-2023-32315.json b/2023/CVE-2023-32315.json
index 25fb230066..831f3e3e8b 100644
--- a/2023/CVE-2023-32315.json
+++ b/2023/CVE-2023-32315.json
@@ -43,10 +43,10 @@
"description": "rce",
"fork": false,
"created_at": "2023-06-14T09:43:31Z",
- "updated_at": "2024-08-23T08:38:29Z",
+ "updated_at": "2024-09-19T05:11:00Z",
"pushed_at": "2023-06-15T01:35:51Z",
- "stargazers_count": 128,
- "watchers_count": 128,
+ "stargazers_count": 127,
+ "watchers_count": 127,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
- "watchers": 128,
+ "watchers": 127,
"score": 0,
"subscribers_count": 5
},
@@ -103,10 +103,10 @@
"description": "Openfire Console Authentication Bypass Vulnerability with RCE plugin",
"fork": false,
"created_at": "2023-06-18T15:42:00Z",
- "updated_at": "2024-09-01T20:06:54Z",
+ "updated_at": "2024-09-22T22:17:45Z",
"pushed_at": "2024-03-07T07:23:41Z",
- "stargazers_count": 41,
- "watchers_count": 41,
+ "stargazers_count": 42,
+ "watchers_count": 42,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
- "watchers": 41,
+ "watchers": 42,
"score": 0,
"subscribers_count": 2
},
diff --git a/2023/CVE-2023-32629.json b/2023/CVE-2023-32629.json
index 868b65a285..d37cc7fbd0 100644
--- a/2023/CVE-2023-32629.json
+++ b/2023/CVE-2023-32629.json
@@ -48,13 +48,13 @@
"stargazers_count": 107,
"watchers_count": 107,
"has_discussions": false,
- "forks_count": 18,
+ "forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 18,
+ "forks": 17,
"watchers": 107,
"score": 0,
"subscribers_count": 3
diff --git a/2023/CVE-2023-32784.json b/2023/CVE-2023-32784.json
index 4896289e64..697b5589e9 100644
--- a/2023/CVE-2023-32784.json
+++ b/2023/CVE-2023-32784.json
@@ -13,10 +13,10 @@
"description": "Original PoC for CVE-2023-32784",
"fork": false,
"created_at": "2023-05-01T17:08:55Z",
- "updated_at": "2024-09-17T12:19:54Z",
+ "updated_at": "2024-09-18T22:47:43Z",
"pushed_at": "2023-08-17T19:26:55Z",
- "stargazers_count": 622,
- "watchers_count": 622,
+ "stargazers_count": 620,
+ "watchers_count": 620,
"has_discussions": false,
"forks_count": 54,
"allow_forking": true,
@@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 54,
- "watchers": 622,
+ "watchers": 620,
"score": 0,
"subscribers_count": 11
},
diff --git a/2023/CVE-2023-33243.json b/2023/CVE-2023-33243.json
index 85a2f960fd..1e2088a6b8 100644
--- a/2023/CVE-2023-33243.json
+++ b/2023/CVE-2023-33243.json
@@ -18,13 +18,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
- "forks_count": 1,
+ "forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 1,
+ "forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 2
diff --git a/2023/CVE-2023-33246.json b/2023/CVE-2023-33246.json
index c460ebb776..9f162f755e 100644
--- a/2023/CVE-2023-33246.json
+++ b/2023/CVE-2023-33246.json
@@ -32,14 +32,14 @@
{
"id": 647628006,
"name": "CVE-2023-33246-Copy",
- "full_name": "yizhimanpadewoniu\/CVE-2023-33246-Copy",
+ "full_name": "4mazing\/CVE-2023-33246-Copy",
"owner": {
- "login": "yizhimanpadewoniu",
+ "login": "4mazing",
"id": 22395846,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22395846?v=4",
- "html_url": "https:\/\/github.com\/yizhimanpadewoniu"
+ "html_url": "https:\/\/github.com\/4mazing"
},
- "html_url": "https:\/\/github.com\/yizhimanpadewoniu\/CVE-2023-33246-Copy",
+ "html_url": "https:\/\/github.com\/4mazing\/CVE-2023-33246-Copy",
"description": null,
"fork": false,
"created_at": "2023-05-31T07:28:46Z",
diff --git a/2023/CVE-2023-33733.json b/2023/CVE-2023-33733.json
index e20410863c..27b1596f15 100644
--- a/2023/CVE-2023-33733.json
+++ b/2023/CVE-2023-33733.json
@@ -13,10 +13,10 @@
"description": "CVE-2023-33733 reportlab RCE",
"fork": false,
"created_at": "2023-05-30T22:22:50Z",
- "updated_at": "2024-09-02T09:12:11Z",
+ "updated_at": "2024-09-23T21:40:23Z",
"pushed_at": "2023-09-05T15:49:14Z",
- "stargazers_count": 109,
- "watchers_count": 109,
+ "stargazers_count": 111,
+ "watchers_count": 111,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
- "watchers": 109,
+ "watchers": 111,
"score": 0,
"subscribers_count": 2
},
diff --git a/2023/CVE-2023-34051.json b/2023/CVE-2023-34051.json
index 70a28f7f27..65845c8add 100644
--- a/2023/CVE-2023-34051.json
+++ b/2023/CVE-2023-34051.json
@@ -13,10 +13,10 @@
"description": "VMware Aria Operations for Logs CVE-2023-34051",
"fork": false,
"created_at": "2023-10-20T14:59:45Z",
- "updated_at": "2024-06-05T16:34:18Z",
+ "updated_at": "2024-09-19T16:06:17Z",
"pushed_at": "2023-10-20T15:00:10Z",
- "stargazers_count": 63,
- "watchers_count": 63,
+ "stargazers_count": 62,
+ "watchers_count": 62,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
- "watchers": 63,
+ "watchers": 62,
"score": 0,
"subscribers_count": 4
}
diff --git a/2023/CVE-2023-34362.json b/2023/CVE-2023-34362.json
index fbe55b9ee1..67d607e373 100644
--- a/2023/CVE-2023-34362.json
+++ b/2023/CVE-2023-34362.json
@@ -73,10 +73,10 @@
"description": "CVE-2023-34362: MOVEit Transfer Unauthenticated RCE",
"fork": false,
"created_at": "2023-06-12T12:56:12Z",
- "updated_at": "2024-09-13T21:53:41Z",
+ "updated_at": "2024-09-18T22:47:45Z",
"pushed_at": "2024-03-24T00:46:38Z",
- "stargazers_count": 63,
- "watchers_count": 63,
+ "stargazers_count": 62,
+ "watchers_count": 62,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
- "watchers": 63,
+ "watchers": 62,
"score": 0,
"subscribers_count": 4
},
diff --git a/2023/CVE-2023-3519.json b/2023/CVE-2023-3519.json
index c44b4c8b1c..df5fd5a2d2 100644
--- a/2023/CVE-2023-3519.json
+++ b/2023/CVE-2023-3519.json
@@ -47,10 +47,10 @@
"description": "Accurately fingerprint and detect vulnerable (and patched!) versions of Netscaler \/ Citrix ADC to CVE-2023-3519",
"fork": false,
"created_at": "2023-07-20T16:05:07Z",
- "updated_at": "2024-08-07T09:23:28Z",
+ "updated_at": "2024-09-20T13:39:10Z",
"pushed_at": "2023-07-23T03:54:44Z",
- "stargazers_count": 78,
- "watchers_count": 78,
+ "stargazers_count": 79,
+ "watchers_count": 79,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@@ -64,7 +64,7 @@
],
"visibility": "public",
"forks": 14,
- "watchers": 78,
+ "watchers": 79,
"score": 0,
"subscribers_count": 1
},
@@ -412,10 +412,10 @@
"description": "Stack-Overflow on Citrix",
"fork": false,
"created_at": "2023-10-27T18:39:31Z",
- "updated_at": "2024-01-08T07:58:53Z",
+ "updated_at": "2024-09-18T08:50:08Z",
"pushed_at": "2023-10-27T18:52:52Z",
- "stargazers_count": 3,
- "watchers_count": 3,
+ "stargazers_count": 4,
+ "watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -424,7 +424,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 3,
+ "watchers": 4,
"score": 0,
"subscribers_count": 1
}
diff --git a/2023/CVE-2023-36664.json b/2023/CVE-2023-36664.json
index bf1dce0941..8f4547bc13 100644
--- a/2023/CVE-2023-36664.json
+++ b/2023/CVE-2023-36664.json
@@ -59,6 +59,36 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 726414774,
+ "name": "CVE-2023-36664",
+ "full_name": "jeanchpt\/CVE-2023-36664",
+ "owner": {
+ "login": "jeanchpt",
+ "id": 57096518,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57096518?v=4",
+ "html_url": "https:\/\/github.com\/jeanchpt"
+ },
+ "html_url": "https:\/\/github.com\/jeanchpt\/CVE-2023-36664",
+ "description": "Proof of concept developed for the CVE-2023-36664",
+ "fork": false,
+ "created_at": "2023-12-02T10:28:10Z",
+ "updated_at": "2023-12-02T10:33:28Z",
+ "pushed_at": "2023-12-12T12:21:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 784451802,
"name": "CVE-2023-36664-Ghostscript-command-injection",
diff --git a/2023/CVE-2023-36723.json b/2023/CVE-2023-36723.json
index 156ba0a36a..63664e2220 100644
--- a/2023/CVE-2023-36723.json
+++ b/2023/CVE-2023-36723.json
@@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2023-09-28T21:20:23Z",
- "updated_at": "2024-08-30T03:50:19Z",
+ "updated_at": "2024-09-18T22:47:48Z",
"pushed_at": "2023-10-10T17:29:32Z",
- "stargazers_count": 69,
- "watchers_count": 69,
+ "stargazers_count": 68,
+ "watchers_count": 68,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
- "watchers": 69,
+ "watchers": 68,
"score": 0,
"subscribers_count": 2
}
diff --git a/2023/CVE-2023-36802.json b/2023/CVE-2023-36802.json
index f43b0e0860..bf93ba2b7f 100644
--- a/2023/CVE-2023-36802.json
+++ b/2023/CVE-2023-36802.json
@@ -103,10 +103,10 @@
"description": "Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver",
"fork": false,
"created_at": "2023-10-23T18:33:41Z",
- "updated_at": "2024-09-03T01:43:48Z",
+ "updated_at": "2024-09-19T03:32:38Z",
"pushed_at": "2023-10-26T11:44:46Z",
- "stargazers_count": 108,
- "watchers_count": 108,
+ "stargazers_count": 107,
+ "watchers_count": 107,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
- "watchers": 108,
+ "watchers": 107,
"score": 0,
"subscribers_count": 3
},
diff --git a/2023/CVE-2023-36845.json b/2023/CVE-2023-36845.json
index 9554327019..c0716ab3ca 100644
--- a/2023/CVE-2023-36845.json
+++ b/2023/CVE-2023-36845.json
@@ -471,6 +471,36 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 758837378,
+ "name": "CVE-2023-36845",
+ "full_name": "ifconfig-me\/CVE-2023-36845",
+ "owner": {
+ "login": "ifconfig-me",
+ "id": 25315805,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25315805?v=4",
+ "html_url": "https:\/\/github.com\/ifconfig-me"
+ },
+ "html_url": "https:\/\/github.com\/ifconfig-me\/CVE-2023-36845",
+ "description": "A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series and SRX Series allows an unauthenticated, network-based attacker to remotely execute code. ",
+ "fork": false,
+ "created_at": "2024-02-17T08:15:30Z",
+ "updated_at": "2024-02-17T08:16:33Z",
+ "pushed_at": "2024-04-09T20:44:10Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 759435815,
"name": "CVE-2023-36845",
diff --git a/2023/CVE-2023-36874.json b/2023/CVE-2023-36874.json
index 854c8b824b..33204b46b3 100644
--- a/2023/CVE-2023-36874.json
+++ b/2023/CVE-2023-36874.json
@@ -103,19 +103,19 @@
"description": "Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE",
"fork": false,
"created_at": "2023-08-24T22:24:34Z",
- "updated_at": "2024-09-07T09:11:54Z",
+ "updated_at": "2024-09-20T08:40:23Z",
"pushed_at": "2023-08-25T00:30:01Z",
- "stargazers_count": 196,
- "watchers_count": 196,
+ "stargazers_count": 200,
+ "watchers_count": 200,
"has_discussions": false,
- "forks_count": 29,
+ "forks_count": 27,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 29,
- "watchers": 196,
+ "forks": 27,
+ "watchers": 200,
"score": 0,
"subscribers_count": 4
}
diff --git a/2023/CVE-2023-3824.json b/2023/CVE-2023-3824.json
index d95f47198f..56eaa1963a 100644
--- a/2023/CVE-2023-3824.json
+++ b/2023/CVE-2023-3824.json
@@ -58,35 +58,5 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
- },
- {
- "id": 830793429,
- "name": "CVE-2023-3824",
- "full_name": "m1sn0w\/CVE-2023-3824",
- "owner": {
- "login": "m1sn0w",
- "id": 61324033,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61324033?v=4",
- "html_url": "https:\/\/github.com\/m1sn0w"
- },
- "html_url": "https:\/\/github.com\/m1sn0w\/CVE-2023-3824",
- "description": "CVE-2023-3824",
- "fork": false,
- "created_at": "2024-07-19T02:37:36Z",
- "updated_at": "2024-07-19T02:42:02Z",
- "pushed_at": "2024-07-19T02:41:58Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "has_discussions": false,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 0,
- "score": 0,
- "subscribers_count": 1
}
]
\ No newline at end of file
diff --git a/2023/CVE-2023-38545.json b/2023/CVE-2023-38545.json
index 0370ff2cb6..015644febd 100644
--- a/2023/CVE-2023-38545.json
+++ b/2023/CVE-2023-38545.json
@@ -198,13 +198,13 @@
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
- "forks_count": 4,
+ "forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 4,
+ "forks": 3,
"watchers": 22,
"score": 0,
"subscribers_count": 2
diff --git a/2023/CVE-2023-38646.json b/2023/CVE-2023-38646.json
index 0064a91781..c0e110f0aa 100644
--- a/2023/CVE-2023-38646.json
+++ b/2023/CVE-2023-38646.json
@@ -564,12 +564,12 @@
"description": "CVE-2023-38646 Metabase RCE",
"fork": false,
"created_at": "2023-10-11T03:18:09Z",
- "updated_at": "2024-09-05T01:26:36Z",
+ "updated_at": "2024-09-22T15:31:11Z",
"pushed_at": "2023-10-11T04:06:43Z",
- "stargazers_count": 47,
- "watchers_count": 47,
+ "stargazers_count": 48,
+ "watchers_count": 48,
"has_discussions": false,
- "forks_count": 4,
+ "forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -580,8 +580,8 @@
"rce"
],
"visibility": "public",
- "forks": 4,
- "watchers": 47,
+ "forks": 5,
+ "watchers": 48,
"score": 0,
"subscribers_count": 2
},
diff --git a/2023/CVE-2023-38831.json b/2023/CVE-2023-38831.json
index 11a87be242..d99ecb21e3 100644
--- a/2023/CVE-2023-38831.json
+++ b/2023/CVE-2023-38831.json
@@ -598,40 +598,6 @@
"score": 0,
"subscribers_count": 1
},
- {
- "id": 686652092,
- "name": "WinrarExploit",
- "full_name": "K3rnel-Dev\/WinrarExploit",
- "owner": {
- "login": "K3rnel-Dev",
- "id": 132711888,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132711888?v=4",
- "html_url": "https:\/\/github.com\/K3rnel-Dev"
- },
- "html_url": "https:\/\/github.com\/K3rnel-Dev\/WinrarExploit",
- "description": "CVE-2023-38831-WINRAR-EXPLOIT GENERATOR",
- "fork": false,
- "created_at": "2023-09-03T14:03:45Z",
- "updated_at": "2024-09-02T15:05:32Z",
- "pushed_at": "2024-02-27T14:33:26Z",
- "stargazers_count": 14,
- "watchers_count": 14,
- "has_discussions": false,
- "forks_count": 2,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [
- "0day",
- "exploit",
- "winrar"
- ],
- "visibility": "public",
- "forks": 2,
- "watchers": 14,
- "score": 0,
- "subscribers_count": 1
- },
{
"id": 686665715,
"name": "CVE-2023-38831-winrar-exploit",
@@ -1072,19 +1038,19 @@
"description": "WinRAR-6.22、CVE-2023-38831、CNNVD-202308-1943、DM-202307-003730、QVD-2023-19572漏洞复现",
"fork": false,
"created_at": "2023-11-15T07:01:05Z",
- "updated_at": "2023-12-04T08:24:10Z",
+ "updated_at": "2024-09-23T11:17:20Z",
"pushed_at": "2024-01-15T08:32:01Z",
- "stargazers_count": 3,
- "watchers_count": 3,
+ "stargazers_count": 4,
+ "watchers_count": 4,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
- "watchers": 3,
+ "forks": 1,
+ "watchers": 4,
"score": 0,
"subscribers_count": 1
},
diff --git a/2023/CVE-2023-40109.json b/2023/CVE-2023-40109.json
index c7d1d1aa79..c7216a221a 100644
--- a/2023/CVE-2023-40109.json
+++ b/2023/CVE-2023-40109.json
@@ -13,7 +13,7 @@
"description": null,
"fork": false,
"created_at": "2024-01-23T13:03:31Z",
- "updated_at": "2024-01-23T13:11:54Z",
+ "updated_at": "2024-09-21T14:10:26Z",
"pushed_at": "2024-01-23T14:36:50Z",
"stargazers_count": 0,
"watchers_count": 0,
diff --git a/2023/CVE-2023-40459.json b/2023/CVE-2023-40459.json
index a22d5bb5f5..dd2113ec0a 100644
--- a/2023/CVE-2023-40459.json
+++ b/2023/CVE-2023-40459.json
@@ -28,5 +28,35 @@
"watchers": 4,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 860972880,
+ "name": "CVE-2023-40459",
+ "full_name": "7h3w4lk3r\/CVE-2023-40459",
+ "owner": {
+ "login": "7h3w4lk3r",
+ "id": 61451071,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61451071?v=4",
+ "html_url": "https:\/\/github.com\/7h3w4lk3r"
+ },
+ "html_url": "https:\/\/github.com\/7h3w4lk3r\/CVE-2023-40459",
+ "description": "CVE-2023-40459 Unauthenticated DoS PoC Exploit ",
+ "fork": false,
+ "created_at": "2024-09-21T16:53:59Z",
+ "updated_at": "2024-09-21T17:00:40Z",
+ "pushed_at": "2024-09-21T17:00:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2023/CVE-2023-41425.json b/2023/CVE-2023-41425.json
index 11e9febffa..9ee6ad8b35 100644
--- a/2023/CVE-2023-41425.json
+++ b/2023/CVE-2023-41425.json
@@ -13,10 +13,10 @@
"description": "WonderCMS Authenticated RCE - CVE-2023-41425",
"fork": false,
"created_at": "2023-11-05T15:06:43Z",
- "updated_at": "2024-09-17T13:33:02Z",
+ "updated_at": "2024-09-18T10:10:18Z",
"pushed_at": "2023-11-06T18:56:53Z",
- "stargazers_count": 20,
- "watchers_count": 20,
+ "stargazers_count": 21,
+ "watchers_count": 21,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 5,
- "watchers": 20,
+ "watchers": 21,
"score": 0,
"subscribers_count": 1
},
@@ -91,13 +91,13 @@
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 11,
"score": 0,
"subscribers_count": 1
diff --git a/2023/CVE-2023-41892.json b/2023/CVE-2023-41892.json
index ccc1d6ad0e..c290c51838 100644
--- a/2023/CVE-2023-41892.json
+++ b/2023/CVE-2023-41892.json
@@ -43,10 +43,10 @@
"description": "Exploit for CVE-2023-41892",
"fork": false,
"created_at": "2023-12-26T18:31:27Z",
- "updated_at": "2024-05-29T12:17:49Z",
+ "updated_at": "2024-09-21T19:17:31Z",
"pushed_at": "2023-12-26T22:39:21Z",
- "stargazers_count": 11,
- "watchers_count": 11,
+ "stargazers_count": 12,
+ "watchers_count": 12,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
- "watchers": 11,
+ "watchers": 12,
"score": 0,
"subscribers_count": 1
},
diff --git a/2023/CVE-2023-42115.json b/2023/CVE-2023-42115.json
index 71d1f17e23..d800e626c8 100644
--- a/2023/CVE-2023-42115.json
+++ b/2023/CVE-2023-42115.json
@@ -13,7 +13,7 @@
"description": "This module exploits a vulnerability in the target service identified as CVE-2023-42115.",
"fork": false,
"created_at": "2024-09-02T09:30:55Z",
- "updated_at": "2024-09-10T15:33:14Z",
+ "updated_at": "2024-09-19T10:16:42Z",
"pushed_at": "2024-09-02T13:28:17Z",
"stargazers_count": 2,
"watchers_count": 2,
diff --git a/2023/CVE-2023-4220.json b/2023/CVE-2023-4220.json
index 837d7ff04d..40d68b2f57 100644
--- a/2023/CVE-2023-4220.json
+++ b/2023/CVE-2023-4220.json
@@ -13,10 +13,10 @@
"description": "This is a script written in Python that allows the exploitation of the Chamilo's LMS software security flaw described in CVE-2023-4220",
"fork": false,
"created_at": "2024-07-07T15:08:30Z",
- "updated_at": "2024-09-10T21:17:54Z",
+ "updated_at": "2024-09-21T18:29:54Z",
"pushed_at": "2024-07-27T00:19:17Z",
- "stargazers_count": 14,
- "watchers_count": 14,
+ "stargazers_count": 17,
+ "watchers_count": 17,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 3,
- "watchers": 14,
+ "watchers": 17,
"score": 0,
"subscribers_count": 1
},
@@ -380,8 +380,8 @@
"description": "CVE-2023-4220 PoC Chamilo RCE",
"fork": false,
"created_at": "2024-08-24T05:32:31Z",
- "updated_at": "2024-09-06T06:45:44Z",
- "pushed_at": "2024-09-05T10:33:43Z",
+ "updated_at": "2024-09-23T18:27:34Z",
+ "pushed_at": "2024-09-23T18:27:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
diff --git a/2023/CVE-2023-42442.json b/2023/CVE-2023-42442.json
index f8b17b6ebb..a4735dc0cf 100644
--- a/2023/CVE-2023-42442.json
+++ b/2023/CVE-2023-42442.json
@@ -43,12 +43,12 @@
"description": "JumpServer 堡垒机未授权综合漏洞利用, Exploit for CVE-2023-42442 \/ CVE-2023-42820 \/ RCE 2021",
"fork": false,
"created_at": "2023-10-14T09:35:07Z",
- "updated_at": "2024-09-11T13:30:49Z",
+ "updated_at": "2024-09-24T03:46:13Z",
"pushed_at": "2024-05-16T07:42:00Z",
- "stargazers_count": 209,
- "watchers_count": 209,
+ "stargazers_count": 210,
+ "watchers_count": 210,
"has_discussions": false,
- "forks_count": 21,
+ "forks_count": 22,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -58,8 +58,8 @@
"jumpserver"
],
"visibility": "public",
- "forks": 21,
- "watchers": 209,
+ "forks": 22,
+ "watchers": 210,
"score": 0,
"subscribers_count": 3
},
diff --git a/2023/CVE-2023-42793.json b/2023/CVE-2023-42793.json
index 2cbc232b32..a0416514cf 100644
--- a/2023/CVE-2023-42793.json
+++ b/2023/CVE-2023-42793.json
@@ -13,10 +13,10 @@
"description": "JetBrains TeamCity Authentication Bypass CVE-2023-42793 Exploit",
"fork": false,
"created_at": "2023-09-29T06:43:35Z",
- "updated_at": "2024-09-13T11:43:24Z",
+ "updated_at": "2024-09-20T14:26:06Z",
"pushed_at": "2024-05-22T16:07:18Z",
- "stargazers_count": 45,
- "watchers_count": 45,
+ "stargazers_count": 44,
+ "watchers_count": 44,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@@ -30,10 +30,40 @@
],
"visibility": "public",
"forks": 13,
- "watchers": 45,
+ "watchers": 44,
"score": 0,
"subscribers_count": 2
},
+ {
+ "id": 700903844,
+ "name": "CVE-2023-42793",
+ "full_name": "whoamins\/CVE-2023-42793",
+ "owner": {
+ "login": "whoamins",
+ "id": 66217512,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66217512?v=4",
+ "html_url": "https:\/\/github.com\/whoamins"
+ },
+ "html_url": "https:\/\/github.com\/whoamins\/CVE-2023-42793",
+ "description": null,
+ "fork": false,
+ "created_at": "2023-10-05T14:17:35Z",
+ "updated_at": "2024-09-20T09:34:58Z",
+ "pushed_at": "2023-10-23T20:42:29Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
{
"id": 701008513,
"name": "CVE-2023-42793",
@@ -283,5 +313,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 860426530,
+ "name": "teamcity-exploit-cve-2023-42793",
+ "full_name": "SwiftSecur\/teamcity-exploit-cve-2023-42793",
+ "owner": {
+ "login": "SwiftSecur",
+ "id": 177733389,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/177733389?v=4",
+ "html_url": "https:\/\/github.com\/SwiftSecur"
+ },
+ "html_url": "https:\/\/github.com\/SwiftSecur\/teamcity-exploit-cve-2023-42793",
+ "description": "teamcity-exploit-cve-2023-42793",
+ "fork": false,
+ "created_at": "2024-09-20T12:15:25Z",
+ "updated_at": "2024-09-23T08:47:09Z",
+ "pushed_at": "2024-09-20T12:31:27Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2023/CVE-2023-42931.json b/2023/CVE-2023-42931.json
index 89c9c4bb55..0f924259a5 100644
--- a/2023/CVE-2023-42931.json
+++ b/2023/CVE-2023-42931.json
@@ -13,10 +13,10 @@
"description": "The exploit targets a critical privilege escalation vulnerability in macOS versions Monterey, Ventura, and Sonoma.",
"fork": false,
"created_at": "2024-03-26T11:01:54Z",
- "updated_at": "2024-05-07T07:01:13Z",
+ "updated_at": "2024-09-24T06:02:32Z",
"pushed_at": "2024-03-26T17:16:23Z",
- "stargazers_count": 3,
- "watchers_count": 3,
+ "stargazers_count": 4,
+ "watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 3,
+ "watchers": 4,
"score": 0,
"subscribers_count": 1
}
diff --git a/2023/CVE-2023-43208.json b/2023/CVE-2023-43208.json
index 1551e3920f..e7a94a8c17 100644
--- a/2023/CVE-2023-43208.json
+++ b/2023/CVE-2023-43208.json
@@ -13,10 +13,10 @@
"description": "A PoC exploit for CVE-2023-43208 - Mirth Connect Remote Code Execution (RCE)",
"fork": false,
"created_at": "2024-03-15T12:03:51Z",
- "updated_at": "2024-09-03T23:35:02Z",
+ "updated_at": "2024-09-19T12:05:19Z",
"pushed_at": "2024-03-16T21:22:27Z",
- "stargazers_count": 25,
- "watchers_count": 25,
+ "stargazers_count": 26,
+ "watchers_count": 26,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@@ -39,7 +39,7 @@
],
"visibility": "public",
"forks": 11,
- "watchers": 25,
+ "watchers": 26,
"score": 0,
"subscribers_count": 1
},
diff --git a/2023/CVE-2023-4357.json b/2023/CVE-2023-4357.json
index 50d14b77f1..da3c66f000 100644
--- a/2023/CVE-2023-4357.json
+++ b/2023/CVE-2023-4357.json
@@ -13,10 +13,10 @@
"description": "[漏洞复现] 全球首款单文件利用 CVE-2023-4357 Chrome XXE 漏洞 EXP, 实现对访客者本地文件窃取. Chrome XXE vulnerability EXP, allowing attackers to obtain local files of visitors.",
"fork": false,
"created_at": "2023-11-17T10:32:31Z",
- "updated_at": "2024-08-31T03:17:15Z",
+ "updated_at": "2024-09-19T01:50:25Z",
"pushed_at": "2023-11-21T10:45:58Z",
- "stargazers_count": 195,
- "watchers_count": 195,
+ "stargazers_count": 197,
+ "watchers_count": 197,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
@@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 33,
- "watchers": 195,
+ "watchers": 197,
"score": 0,
"subscribers_count": 3
},
@@ -50,13 +50,13 @@
"stargazers_count": 42,
"watchers_count": 42,
"has_discussions": false,
- "forks_count": 20,
+ "forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 20,
+ "forks": 21,
"watchers": 42,
"score": 0,
"subscribers_count": 4
diff --git a/2023/CVE-2023-44487.json b/2023/CVE-2023-44487.json
index afe848d176..1e91a792fb 100644
--- a/2023/CVE-2023-44487.json
+++ b/2023/CVE-2023-44487.json
@@ -141,10 +141,10 @@
"description": "Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)",
"fork": false,
"created_at": "2023-10-13T23:55:32Z",
- "updated_at": "2024-09-13T01:52:08Z",
+ "updated_at": "2024-09-19T08:45:17Z",
"pushed_at": "2023-10-30T20:22:37Z",
- "stargazers_count": 54,
- "watchers_count": 54,
+ "stargazers_count": 56,
+ "watchers_count": 56,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@@ -153,7 +153,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
- "watchers": 54,
+ "watchers": 56,
"score": 0,
"subscribers_count": 4
},
@@ -282,10 +282,10 @@
"description": "Examples for Implementing cve-2023-44487 ( HTTP\/2 Rapid Reset Attack ) Concept",
"fork": false,
"created_at": "2023-11-10T08:38:51Z",
- "updated_at": "2024-05-25T19:01:37Z",
+ "updated_at": "2024-09-18T13:21:33Z",
"pushed_at": "2023-11-10T08:39:14Z",
- "stargazers_count": 5,
- "watchers_count": 5,
+ "stargazers_count": 6,
+ "watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -301,7 +301,7 @@
],
"visibility": "public",
"forks": 1,
- "watchers": 5,
+ "watchers": 6,
"score": 0,
"subscribers_count": 1
},
diff --git a/2023/CVE-2023-44976.json b/2023/CVE-2023-44976.json
index 4038842ac7..d6039b1c6a 100644
--- a/2023/CVE-2023-44976.json
+++ b/2023/CVE-2023-44976.json
@@ -13,7 +13,7 @@
"description": "A vulnerable driver exploited by me (BYOVD) that is capable of terminating several EDRs and antivirus software in the market, rendering them ineffective, working for both x32 and x64(CVE-2023-44976).",
"fork": false,
"created_at": "2023-10-01T18:24:38Z",
- "updated_at": "2024-09-16T23:12:52Z",
+ "updated_at": "2024-09-23T12:45:03Z",
"pushed_at": "2024-07-06T23:35:51Z",
"stargazers_count": 82,
"watchers_count": 82,
diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json
index 97e90dc142..659ab5c07a 100644
--- a/2023/CVE-2023-45866.json
+++ b/2023/CVE-2023-45866.json
@@ -13,10 +13,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
- "updated_at": "2024-09-17T18:10:25Z",
+ "updated_at": "2024-09-23T21:09:08Z",
"pushed_at": "2024-08-18T08:26:46Z",
- "stargazers_count": 1159,
- "watchers_count": 1159,
+ "stargazers_count": 1176,
+ "watchers_count": 1176,
"has_discussions": false,
"forks_count": 199,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 199,
- "watchers": 1159,
+ "watchers": 1176,
"score": 0,
"subscribers_count": 21
},
diff --git a/2023/CVE-2023-46604.json b/2023/CVE-2023-46604.json
index 133917b70e..f4f01ed4b5 100644
--- a/2023/CVE-2023-46604.json
+++ b/2023/CVE-2023-46604.json
@@ -48,13 +48,13 @@
"stargazers_count": 221,
"watchers_count": 221,
"has_discussions": false,
- "forks_count": 30,
+ "forks_count": 29,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 30,
+ "forks": 29,
"watchers": 221,
"score": 0,
"subscribers_count": 4
@@ -103,7 +103,7 @@
"description": " Achieving a Reverse Shell Exploit for Apache ActiveMQ (CVE_2023-46604) ",
"fork": false,
"created_at": "2023-11-03T22:06:09Z",
- "updated_at": "2024-09-09T17:33:53Z",
+ "updated_at": "2024-09-18T22:47:50Z",
"pushed_at": "2024-01-20T16:59:23Z",
"stargazers_count": 104,
"watchers_count": 104,
diff --git a/2023/CVE-2023-46805.json b/2023/CVE-2023-46805.json
index ebdb985a5e..d6132133df 100644
--- a/2023/CVE-2023-46805.json
+++ b/2023/CVE-2023-46805.json
@@ -247,5 +247,35 @@
"watchers": 2,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 859372433,
+ "name": "CVE-2023-46805",
+ "full_name": "maybeheisenberg\/CVE-2023-46805",
+ "owner": {
+ "login": "maybeheisenberg",
+ "id": 181843766,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/181843766?v=4",
+ "html_url": "https:\/\/github.com\/maybeheisenberg"
+ },
+ "html_url": "https:\/\/github.com\/maybeheisenberg\/CVE-2023-46805",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-09-18T14:51:29Z",
+ "updated_at": "2024-09-22T15:29:30Z",
+ "pushed_at": "2024-09-18T15:02:24Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2023/CVE-2023-47253.json b/2023/CVE-2023-47253.json
new file mode 100644
index 0000000000..eb8fa28b30
--- /dev/null
+++ b/2023/CVE-2023-47253.json
@@ -0,0 +1,62 @@
+[
+ {
+ "id": 859917696,
+ "name": "CVE-2023-47253",
+ "full_name": "vnxdtzip\/CVE-2023-47253",
+ "owner": {
+ "login": "vnxdtzip",
+ "id": 51921808,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51921808?v=4",
+ "html_url": "https:\/\/github.com\/vnxdtzip"
+ },
+ "html_url": "https:\/\/github.com\/vnxdtzip\/CVE-2023-47253",
+ "description": "CVE-2023-47253 | Qualitor <= 8.20 RCE",
+ "fork": false,
+ "created_at": "2024-09-19T13:59:07Z",
+ "updated_at": "2024-09-19T14:01:44Z",
+ "pushed_at": "2024-09-19T14:01:41Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 2,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 2,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 859921995,
+ "name": "CVE-2023-47253",
+ "full_name": "OpenXP-Research\/CVE-2023-47253",
+ "owner": {
+ "login": "OpenXP-Research",
+ "id": 124332420,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/124332420?v=4",
+ "html_url": "https:\/\/github.com\/OpenXP-Research"
+ },
+ "html_url": "https:\/\/github.com\/OpenXP-Research\/CVE-2023-47253",
+ "description": "CVE-2023-47253 | Qualitor <= 8.20 RCE",
+ "fork": false,
+ "created_at": "2024-09-19T14:06:47Z",
+ "updated_at": "2024-09-19T14:15:31Z",
+ "pushed_at": "2024-09-19T14:06:55Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2023/CVE-2023-48777.json b/2023/CVE-2023-48777.json
index 04231bbb72..f286ae8c72 100644
--- a/2023/CVE-2023-48777.json
+++ b/2023/CVE-2023-48777.json
@@ -18,13 +18,13 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 5,
"score": 0,
"subscribers_count": 1
diff --git a/2023/CVE-2023-49105.json b/2023/CVE-2023-49105.json
index dd4d5072c1..bcdf0d0df2 100644
--- a/2023/CVE-2023-49105.json
+++ b/2023/CVE-2023-49105.json
@@ -13,10 +13,10 @@
"description": "ownCloud exploits for CVE-2023-49105",
"fork": false,
"created_at": "2023-12-05T11:35:12Z",
- "updated_at": "2024-09-01T12:14:01Z",
+ "updated_at": "2024-09-23T20:16:00Z",
"pushed_at": "2023-12-05T11:35:19Z",
- "stargazers_count": 32,
- "watchers_count": 32,
+ "stargazers_count": 33,
+ "watchers_count": 33,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
- "watchers": 32,
+ "watchers": 33,
"score": 0,
"subscribers_count": 2
}
diff --git a/2023/CVE-2023-4911.json b/2023/CVE-2023-4911.json
index 769e6e90f6..dd98d8ae9b 100644
--- a/2023/CVE-2023-4911.json
+++ b/2023/CVE-2023-4911.json
@@ -43,10 +43,10 @@
"description": "PoC for CVE-2023-4911",
"fork": false,
"created_at": "2023-10-04T14:12:16Z",
- "updated_at": "2024-08-14T04:31:42Z",
+ "updated_at": "2024-09-21T13:43:50Z",
"pushed_at": "2023-10-04T14:16:36Z",
- "stargazers_count": 377,
- "watchers_count": 377,
+ "stargazers_count": 378,
+ "watchers_count": 378,
"has_discussions": false,
"forks_count": 59,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 59,
- "watchers": 377,
+ "watchers": 378,
"score": 0,
"subscribers_count": 5
},
diff --git a/2023/CVE-2023-5521.json b/2023/CVE-2023-5521.json
index 442c826802..ce7d1d6a04 100644
--- a/2023/CVE-2023-5521.json
+++ b/2023/CVE-2023-5521.json
@@ -13,10 +13,10 @@
"description": "Root takeover via signature spoofing in KernelSU",
"fork": false,
"created_at": "2023-10-11T12:08:31Z",
- "updated_at": "2024-08-14T09:21:39Z",
+ "updated_at": "2024-09-18T08:09:52Z",
"pushed_at": "2023-10-11T12:34:37Z",
- "stargazers_count": 14,
- "watchers_count": 14,
+ "stargazers_count": 15,
+ "watchers_count": 15,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
- "watchers": 14,
+ "watchers": 15,
"score": 0,
"subscribers_count": 2
}
diff --git a/2023/CVE-2023-5966.json b/2023/CVE-2023-5966.json
index 8c79a8dcd7..109e9c7744 100644
--- a/2023/CVE-2023-5966.json
+++ b/2023/CVE-2023-5966.json
@@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-10-20T13:00:10Z",
- "updated_at": "2023-11-13T17:25:12Z",
+ "updated_at": "2024-09-21T12:08:42Z",
"pushed_at": "2023-11-13T17:24:35Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 0,
+ "watchers": 1,
"score": 0,
"subscribers_count": 1
}
diff --git a/2023/CVE-2023-6319.json b/2023/CVE-2023-6319.json
index edde6bfa02..5347cedfa1 100644
--- a/2023/CVE-2023-6319.json
+++ b/2023/CVE-2023-6319.json
@@ -18,7 +18,7 @@
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
- "forks_count": 3,
+ "forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -29,7 +29,7 @@
"webos"
],
"visibility": "public",
- "forks": 3,
+ "forks": 4,
"watchers": 32,
"score": 0,
"subscribers_count": 4
diff --git a/2023/CVE-2023-6702.json b/2023/CVE-2023-6702.json
index 93f76f442d..4aa6ed0993 100644
--- a/2023/CVE-2023-6702.json
+++ b/2023/CVE-2023-6702.json
@@ -13,10 +13,10 @@
"description": "Chrome Renderer 1day RCE via Type Confusion in Async Stack Trace (v8ctf submission)",
"fork": false,
"created_at": "2024-06-02T14:15:27Z",
- "updated_at": "2024-09-12T04:01:51Z",
+ "updated_at": "2024-09-19T04:59:48Z",
"pushed_at": "2024-06-03T05:03:46Z",
- "stargazers_count": 69,
- "watchers_count": 69,
+ "stargazers_count": 71,
+ "watchers_count": 71,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
- "watchers": 69,
+ "watchers": 71,
"score": 0,
"subscribers_count": 2
}
diff --git a/2024/CVE-2024-0044.json b/2024/CVE-2024-0044.json
index 83dd26401d..b80a3f444d 100644
--- a/2024/CVE-2024-0044.json
+++ b/2024/CVE-2024-0044.json
@@ -43,19 +43,19 @@
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
"fork": false,
"created_at": "2024-06-18T12:30:53Z",
- "updated_at": "2024-09-16T06:48:39Z",
+ "updated_at": "2024-09-20T13:23:11Z",
"pushed_at": "2024-07-25T18:12:57Z",
- "stargazers_count": 220,
- "watchers_count": 220,
+ "stargazers_count": 221,
+ "watchers_count": 221,
"has_discussions": false,
- "forks_count": 52,
+ "forks_count": 53,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 52,
- "watchers": 220,
+ "forks": 53,
+ "watchers": 221,
"score": 0,
"subscribers_count": 5
},
diff --git a/2024/CVE-2024-0762.json b/2024/CVE-2024-0762.json
index 683d2407c6..b86dca6fa6 100644
--- a/2024/CVE-2024-0762.json
+++ b/2024/CVE-2024-0762.json
@@ -13,8 +13,8 @@
"description": "Detecting vulnerabilities like CVE-2024-0762, particularly in UEFI firmware, is quite challenging due to the low-level nature ",
"fork": false,
"created_at": "2024-09-05T03:25:58Z",
- "updated_at": "2024-09-10T02:41:29Z",
- "pushed_at": "2024-09-10T02:41:26Z",
+ "updated_at": "2024-09-20T02:36:37Z",
+ "pushed_at": "2024-09-20T02:36:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
diff --git a/2024/CVE-2024-1071.json b/2024/CVE-2024-1071.json
index 412d951d0d..acb9729b3f 100644
--- a/2024/CVE-2024-1071.json
+++ b/2024/CVE-2024-1071.json
@@ -133,19 +133,19 @@
"description": "Proof of concept : CVE-2024-1071: WordPress Vulnerability Exploited",
"fork": false,
"created_at": "2024-08-30T04:23:04Z",
- "updated_at": "2024-09-14T13:51:35Z",
+ "updated_at": "2024-09-23T12:28:56Z",
"pushed_at": "2024-08-30T05:10:51Z",
- "stargazers_count": 7,
- "watchers_count": 7,
+ "stargazers_count": 8,
+ "watchers_count": 8,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
- "watchers": 7,
+ "forks": 1,
+ "watchers": 8,
"score": 0,
"subscribers_count": 1
},
@@ -168,15 +168,15 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 0,
"score": 0,
- "subscribers_count": 1
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-1086.json b/2024/CVE-2024-1086.json
index 106bac1747..89e06062e0 100644
--- a/2024/CVE-2024-1086.json
+++ b/2024/CVE-2024-1086.json
@@ -13,10 +13,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
- "updated_at": "2024-09-16T19:09:32Z",
+ "updated_at": "2024-09-22T13:37:43Z",
"pushed_at": "2024-04-17T16:09:54Z",
- "stargazers_count": 2241,
- "watchers_count": 2241,
+ "stargazers_count": 2242,
+ "watchers_count": 2242,
"has_discussions": false,
"forks_count": 295,
"allow_forking": true,
@@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 295,
- "watchers": 2241,
+ "watchers": 2242,
"score": 0,
"subscribers_count": 23
},
diff --git a/2024/CVE-2024-1212.json b/2024/CVE-2024-1212.json
index c0620a9fb8..db1ce9ef79 100644
--- a/2024/CVE-2024-1212.json
+++ b/2024/CVE-2024-1212.json
@@ -13,10 +13,10 @@
"description": "Unauthenticated Command Injection In Progress Kemp LoadMaster",
"fork": false,
"created_at": "2024-03-19T22:23:18Z",
- "updated_at": "2024-09-10T17:31:23Z",
+ "updated_at": "2024-09-21T13:40:51Z",
"pushed_at": "2024-03-19T22:25:21Z",
- "stargazers_count": 13,
- "watchers_count": 13,
+ "stargazers_count": 14,
+ "watchers_count": 14,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
- "watchers": 13,
+ "watchers": 14,
"score": 0,
"subscribers_count": 2
},
diff --git a/2024/CVE-2024-1709.json b/2024/CVE-2024-1709.json
index ff8ec25fce..618e5b22f8 100644
--- a/2024/CVE-2024-1709.json
+++ b/2024/CVE-2024-1709.json
@@ -156,6 +156,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 1
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-1874.json b/2024/CVE-2024-1874.json
index 7a0c80a915..d29b3a9da9 100644
--- a/2024/CVE-2024-1874.json
+++ b/2024/CVE-2024-1874.json
@@ -43,8 +43,8 @@
"description": "Proof Of Concept for CVE-2024-1874",
"fork": false,
"created_at": "2024-07-18T15:25:17Z",
- "updated_at": "2024-07-24T13:47:35Z",
- "pushed_at": "2024-07-24T13:47:32Z",
+ "updated_at": "2024-09-19T18:30:06Z",
+ "pushed_at": "2024-09-19T18:30:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
diff --git a/2024/CVE-2024-20017.json b/2024/CVE-2024-20017.json
index 1503fe0801..9c26c82b65 100644
--- a/2024/CVE-2024-20017.json
+++ b/2024/CVE-2024-20017.json
@@ -13,19 +13,19 @@
"description": "exploits for CVE-2024-20017",
"fork": false,
"created_at": "2024-08-30T05:54:36Z",
- "updated_at": "2024-09-16T17:22:12Z",
+ "updated_at": "2024-09-24T03:38:59Z",
"pushed_at": "2024-09-07T10:11:22Z",
- "stargazers_count": 22,
- "watchers_count": 22,
+ "stargazers_count": 65,
+ "watchers_count": 65,
"has_discussions": false,
- "forks_count": 12,
+ "forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 12,
- "watchers": 22,
+ "forks": 21,
+ "watchers": 65,
"score": 0,
"subscribers_count": 2
}
diff --git a/2024/CVE-2024-20696.json b/2024/CVE-2024-20696.json
index cea4b3c3a2..819f06bc69 100644
--- a/2024/CVE-2024-20696.json
+++ b/2024/CVE-2024-20696.json
@@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-03-08T02:31:41Z",
- "updated_at": "2024-06-13T12:54:50Z",
+ "updated_at": "2024-09-21T07:59:26Z",
"pushed_at": "2024-03-12T13:33:58Z",
- "stargazers_count": 4,
- "watchers_count": 4,
+ "stargazers_count": 5,
+ "watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
- "watchers": 4,
+ "watchers": 5,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-20931.json b/2024/CVE-2024-20931.json
index 05f36c5295..83e50ffa26 100644
--- a/2024/CVE-2024-20931.json
+++ b/2024/CVE-2024-20931.json
@@ -103,10 +103,10 @@
"description": "CVE-2024-20931, this is the bypass of the patch of CVE-2023-21839",
"fork": false,
"created_at": "2024-02-06T15:09:33Z",
- "updated_at": "2024-09-12T01:38:43Z",
+ "updated_at": "2024-09-18T22:47:55Z",
"pushed_at": "2024-02-06T15:56:12Z",
- "stargazers_count": 61,
- "watchers_count": 61,
+ "stargazers_count": 60,
+ "watchers_count": 60,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
- "watchers": 61,
+ "watchers": 60,
"score": 0,
"subscribers_count": 2
}
diff --git a/2024/CVE-2024-21305.json b/2024/CVE-2024-21305.json
index d0639d498c..07696d290e 100644
--- a/2024/CVE-2024-21305.json
+++ b/2024/CVE-2024-21305.json
@@ -13,10 +13,10 @@
"description": "Report and exploit of CVE-2024-21305. ",
"fork": false,
"created_at": "2023-12-16T23:27:34Z",
- "updated_at": "2024-09-07T17:43:10Z",
+ "updated_at": "2024-09-23T17:03:14Z",
"pushed_at": "2024-01-14T17:21:42Z",
- "stargazers_count": 29,
- "watchers_count": 29,
+ "stargazers_count": 30,
+ "watchers_count": 30,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 3,
- "watchers": 29,
+ "watchers": 30,
"score": 0,
"subscribers_count": 2
}
diff --git a/2024/CVE-2024-21306.json b/2024/CVE-2024-21306.json
index 4e77f87e66..dcb615a9fb 100644
--- a/2024/CVE-2024-21306.json
+++ b/2024/CVE-2024-21306.json
@@ -48,13 +48,13 @@
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
- "forks_count": 1,
+ "forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 1,
+ "forks": 2,
"watchers": 7,
"score": 0,
"subscribers_count": 2
diff --git a/2024/CVE-2024-21338.json b/2024/CVE-2024-21338.json
index ef10642712..d67e9ddf73 100644
--- a/2024/CVE-2024-21338.json
+++ b/2024/CVE-2024-21338.json
@@ -163,7 +163,7 @@
"description": "Windows AppLocker Driver (appid.sys) LPE",
"fork": false,
"created_at": "2024-07-29T13:18:06Z",
- "updated_at": "2024-09-14T22:05:17Z",
+ "updated_at": "2024-09-20T12:53:35Z",
"pushed_at": "2024-07-29T13:29:59Z",
"stargazers_count": 31,
"watchers_count": 31,
diff --git a/2024/CVE-2024-21413.json b/2024/CVE-2024-21413.json
index 77852420cb..d4f24ebebd 100644
--- a/2024/CVE-2024-21413.json
+++ b/2024/CVE-2024-21413.json
@@ -43,10 +43,10 @@
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"fork": false,
"created_at": "2024-02-16T15:17:59Z",
- "updated_at": "2024-09-13T17:48:27Z",
+ "updated_at": "2024-09-23T03:06:24Z",
"pushed_at": "2024-02-19T20:00:35Z",
- "stargazers_count": 672,
- "watchers_count": 672,
+ "stargazers_count": 673,
+ "watchers_count": 673,
"has_discussions": false,
"forks_count": 149,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 149,
- "watchers": 672,
+ "watchers": 673,
"score": 0,
"subscribers_count": 10
},
diff --git a/2024/CVE-2024-21626.json b/2024/CVE-2024-21626.json
index eff76693a1..0c086409e8 100644
--- a/2024/CVE-2024-21626.json
+++ b/2024/CVE-2024-21626.json
@@ -43,7 +43,7 @@
"description": "PoC and Detection for CVE-2024-21626",
"fork": false,
"created_at": "2024-02-01T15:28:37Z",
- "updated_at": "2024-09-13T05:50:44Z",
+ "updated_at": "2024-09-22T00:50:02Z",
"pushed_at": "2024-02-06T16:09:05Z",
"stargazers_count": 70,
"watchers_count": 70,
diff --git a/2024/CVE-2024-21733.json b/2024/CVE-2024-21733.json
index 5cc5e4f14c..864e785e10 100644
--- a/2024/CVE-2024-21733.json
+++ b/2024/CVE-2024-21733.json
@@ -13,10 +13,10 @@
"description": "一个验证对CVE-2024-21733",
"fork": false,
"created_at": "2024-08-15T09:47:32Z",
- "updated_at": "2024-09-09T01:25:47Z",
+ "updated_at": "2024-09-23T19:16:47Z",
"pushed_at": "2024-08-16T05:52:08Z",
- "stargazers_count": 15,
- "watchers_count": 15,
+ "stargazers_count": 17,
+ "watchers_count": 17,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
- "watchers": 15,
+ "watchers": 17,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-21762.json b/2024/CVE-2024-21762.json
index d91f58103a..6a64d6ea57 100644
--- a/2024/CVE-2024-21762.json
+++ b/2024/CVE-2024-21762.json
@@ -13,10 +13,10 @@
"description": "Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762",
"fork": false,
"created_at": "2024-02-28T21:16:10Z",
- "updated_at": "2024-08-16T23:51:19Z",
+ "updated_at": "2024-09-22T00:29:31Z",
"pushed_at": "2024-07-05T09:37:05Z",
- "stargazers_count": 93,
- "watchers_count": 93,
+ "stargazers_count": 94,
+ "watchers_count": 94,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
- "watchers": 93,
+ "watchers": 94,
"score": 0,
"subscribers_count": 6
},
@@ -73,10 +73,10 @@
"description": "out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability ",
"fork": false,
"created_at": "2024-03-13T09:17:28Z",
- "updated_at": "2024-09-16T09:46:39Z",
+ "updated_at": "2024-09-21T21:16:00Z",
"pushed_at": "2024-03-16T00:35:12Z",
- "stargazers_count": 114,
- "watchers_count": 114,
+ "stargazers_count": 115,
+ "watchers_count": 115,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
- "watchers": 114,
+ "watchers": 115,
"score": 0,
"subscribers_count": 5
},
@@ -103,18 +103,18 @@
"description": "Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)",
"fork": false,
"created_at": "2024-03-13T22:57:00Z",
- "updated_at": "2024-05-30T14:29:21Z",
+ "updated_at": "2024-09-18T22:47:57Z",
"pushed_at": "2024-03-24T22:01:21Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
- "forks_count": 2,
+ "forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 2,
+ "forks": 3,
"watchers": 9,
"score": 0,
"subscribers_count": 1
@@ -133,10 +133,10 @@
"description": "The PoC demonstrates the potential for remote code execution by exploiting the identified security flaw.",
"fork": false,
"created_at": "2024-03-17T09:15:22Z",
- "updated_at": "2024-07-31T07:59:05Z",
+ "updated_at": "2024-09-18T22:47:57Z",
"pushed_at": "2024-03-17T09:20:35Z",
- "stargazers_count": 7,
- "watchers_count": 7,
+ "stargazers_count": 8,
+ "watchers_count": 8,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 7,
+ "watchers": 8,
"score": 0,
"subscribers_count": 1
},
diff --git a/2024/CVE-2024-2188.json b/2024/CVE-2024-2188.json
index c756816347..d8ec7c3b32 100644
--- a/2024/CVE-2024-2188.json
+++ b/2024/CVE-2024-2188.json
@@ -13,10 +13,10 @@
"description": "Exploit for stored XSS vulnerability found in the TP-Link Archer AX50 router.",
"fork": false,
"created_at": "2024-09-17T14:33:13Z",
- "updated_at": "2024-09-17T14:33:55Z",
- "pushed_at": "2024-09-17T14:33:51Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "updated_at": "2024-09-20T09:23:17Z",
+ "pushed_at": "2024-09-20T05:59:58Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 0,
+ "watchers": 2,
"score": 0,
"subscribers_count": 0
}
diff --git a/2024/CVE-2024-22120.json b/2024/CVE-2024-22120.json
index 550c95af14..07ac2067f0 100644
--- a/2024/CVE-2024-22120.json
+++ b/2024/CVE-2024-22120.json
@@ -13,12 +13,12 @@
"description": "Time Based SQL Injection in Zabbix Server Audit Log --> RCE",
"fork": false,
"created_at": "2024-05-20T03:29:09Z",
- "updated_at": "2024-09-11T08:16:41Z",
+ "updated_at": "2024-09-19T04:29:57Z",
"pushed_at": "2024-05-21T10:30:49Z",
- "stargazers_count": 105,
- "watchers_count": 105,
+ "stargazers_count": 109,
+ "watchers_count": 109,
"has_discussions": false,
- "forks_count": 21,
+ "forks_count": 22,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -28,8 +28,8 @@
"zabbix"
],
"visibility": "public",
- "forks": 21,
- "watchers": 105,
+ "forks": 22,
+ "watchers": 109,
"score": 0,
"subscribers_count": 1
},
diff --git a/2024/CVE-2024-23108.json b/2024/CVE-2024-23108.json
index 11d0fd683e..a2bc6d061c 100644
--- a/2024/CVE-2024-23108.json
+++ b/2024/CVE-2024-23108.json
@@ -13,7 +13,7 @@
"description": "CVE-2024-23108: Fortinet FortiSIEM Unauthenticated 2nd Order Command Injection",
"fork": false,
"created_at": "2024-05-20T14:34:09Z",
- "updated_at": "2024-08-18T15:55:57Z",
+ "updated_at": "2024-09-18T22:48:00Z",
"pushed_at": "2024-05-21T11:56:19Z",
"stargazers_count": 31,
"watchers_count": 31,
diff --git a/2024/CVE-2024-23208.json b/2024/CVE-2024-23208.json
index 49a438b433..739bc8030c 100644
--- a/2024/CVE-2024-23208.json
+++ b/2024/CVE-2024-23208.json
@@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-02-04T07:37:21Z",
- "updated_at": "2024-07-20T10:48:45Z",
+ "updated_at": "2024-09-23T11:23:29Z",
"pushed_at": "2024-02-05T02:11:42Z",
- "stargazers_count": 21,
- "watchers_count": 21,
+ "stargazers_count": 20,
+ "watchers_count": 20,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
- "watchers": 21,
+ "watchers": 20,
"score": 0,
"subscribers_count": 5
}
diff --git a/2024/CVE-2024-23692.json b/2024/CVE-2024-23692.json
index d7b66010d2..413f9a1a4f 100644
--- a/2024/CVE-2024-23692.json
+++ b/2024/CVE-2024-23692.json
@@ -198,13 +198,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
@@ -283,12 +283,12 @@
"description": "POC - Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692 ",
"fork": false,
"created_at": "2024-09-15T12:15:35Z",
- "updated_at": "2024-09-17T14:53:02Z",
- "pushed_at": "2024-09-15T14:24:22Z",
- "stargazers_count": 3,
- "watchers_count": 3,
+ "updated_at": "2024-09-20T03:31:15Z",
+ "pushed_at": "2024-09-19T09:23:59Z",
+ "stargazers_count": 20,
+ "watchers_count": 20,
"has_discussions": false,
- "forks_count": 3,
+ "forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -299,9 +299,9 @@
"unauthenticated-rce"
],
"visibility": "public",
- "forks": 3,
- "watchers": 3,
+ "forks": 10,
+ "watchers": 20,
"score": 0,
- "subscribers_count": 1
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-23897.json b/2024/CVE-2024-23897.json
index a918c83db6..cbf17cd643 100644
--- a/2024/CVE-2024-23897.json
+++ b/2024/CVE-2024-23897.json
@@ -73,10 +73,10 @@
"description": "CVE-2024-23897",
"fork": false,
"created_at": "2024-01-26T09:44:32Z",
- "updated_at": "2024-09-07T03:15:23Z",
+ "updated_at": "2024-09-23T03:28:47Z",
"pushed_at": "2024-01-28T06:47:28Z",
- "stargazers_count": 189,
- "watchers_count": 189,
+ "stargazers_count": 190,
+ "watchers_count": 190,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 36,
- "watchers": 189,
+ "watchers": 190,
"score": 0,
"subscribers_count": 2
},
@@ -103,10 +103,10 @@
"description": "CVE-2024-23897 | Jenkins <= 2.441 & <= LTS 2.426.2 PoC and scanner. ",
"fork": false,
"created_at": "2024-01-26T19:00:03Z",
- "updated_at": "2024-09-12T16:17:54Z",
+ "updated_at": "2024-09-18T22:47:54Z",
"pushed_at": "2024-02-29T12:13:21Z",
- "stargazers_count": 67,
- "watchers_count": 67,
+ "stargazers_count": 66,
+ "watchers_count": 66,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
- "watchers": 67,
+ "watchers": 66,
"score": 0,
"subscribers_count": 3
},
@@ -256,10 +256,10 @@
"description": "CVE-2024-23897 - Jenkins 任意文件读取 利用工具",
"fork": false,
"created_at": "2024-01-27T19:34:48Z",
- "updated_at": "2024-09-15T08:12:18Z",
+ "updated_at": "2024-09-18T16:25:16Z",
"pushed_at": "2024-03-16T07:55:41Z",
- "stargazers_count": 67,
- "watchers_count": 67,
+ "stargazers_count": 68,
+ "watchers_count": 68,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@@ -272,7 +272,7 @@
],
"visibility": "public",
"forks": 12,
- "watchers": 67,
+ "watchers": 68,
"score": 0,
"subscribers_count": 2
},
@@ -309,14 +309,14 @@
{
"id": 749389006,
"name": "CVE-2024-23897",
- "full_name": "raheel0x01\/CVE-2024-23897",
+ "full_name": "r0xdeadbeef\/CVE-2024-23897",
"owner": {
- "login": "raheel0x01",
+ "login": "r0xdeadbeef",
"id": 65211256,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65211256?v=4",
- "html_url": "https:\/\/github.com\/raheel0x01"
+ "html_url": "https:\/\/github.com\/r0xdeadbeef"
},
- "html_url": "https:\/\/github.com\/raheel0x01\/CVE-2024-23897",
+ "html_url": "https:\/\/github.com\/r0xdeadbeef\/CVE-2024-23897",
"description": "Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.",
"fork": false,
"created_at": "2024-01-28T12:53:23Z",
@@ -606,6 +606,36 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 758722924,
+ "name": "CVE-2024-23897",
+ "full_name": "ifconfig-me\/CVE-2024-23897",
+ "owner": {
+ "login": "ifconfig-me",
+ "id": 25315805,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25315805?v=4",
+ "html_url": "https:\/\/github.com\/ifconfig-me"
+ },
+ "html_url": "https:\/\/github.com\/ifconfig-me\/CVE-2024-23897",
+ "description": "Jenkins Arbitrary File Leak Vulnerability [CVE-2024-23897]",
+ "fork": false,
+ "created_at": "2024-02-16T23:21:40Z",
+ "updated_at": "2024-02-16T23:23:25Z",
+ "pushed_at": "2024-02-17T15:20:01Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 759622445,
"name": "CVE-2024-23897",
@@ -789,14 +819,14 @@
{
"id": 797525465,
"name": "CVE-2024-23897-Jenkins-4.441",
- "full_name": "mil4ne\/CVE-2024-23897-Jenkins-4.441",
+ "full_name": "fullaw4ke\/CVE-2024-23897-Jenkins-4.441",
"owner": {
- "login": "mil4ne",
+ "login": "fullaw4ke",
"id": 89859279,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89859279?v=4",
- "html_url": "https:\/\/github.com\/mil4ne"
+ "html_url": "https:\/\/github.com\/fullaw4ke"
},
- "html_url": "https:\/\/github.com\/mil4ne\/CVE-2024-23897-Jenkins-4.441",
+ "html_url": "https:\/\/github.com\/fullaw4ke\/CVE-2024-23897-Jenkins-4.441",
"description": null,
"fork": false,
"created_at": "2024-05-08T02:28:46Z",
diff --git a/2024/CVE-2024-24409.json b/2024/CVE-2024-24409.json
deleted file mode 100644
index 05a6698c17..0000000000
--- a/2024/CVE-2024-24409.json
+++ /dev/null
@@ -1,32 +0,0 @@
-[
- {
- "id": 777430748,
- "name": "CVE-2024-24409",
- "full_name": "passtheticket\/CVE-2024-24409",
- "owner": {
- "login": "passtheticket",
- "id": 76125965,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76125965?v=4",
- "html_url": "https:\/\/github.com\/passtheticket"
- },
- "html_url": "https:\/\/github.com\/passtheticket\/CVE-2024-24409",
- "description": "ADManager Plus Build < 7210 Elevation of Privilege Vulnerability",
- "fork": false,
- "created_at": "2024-03-25T20:51:56Z",
- "updated_at": "2024-06-07T21:09:48Z",
- "pushed_at": "2024-04-25T18:24:54Z",
- "stargazers_count": 2,
- "watchers_count": 2,
- "has_discussions": false,
- "forks_count": 1,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 1,
- "watchers": 2,
- "score": 0,
- "subscribers_count": 1
- }
-]
\ No newline at end of file
diff --git a/2024/CVE-2024-24919.json b/2024/CVE-2024-24919.json
index b253d22090..55ffa871e6 100644
--- a/2024/CVE-2024-24919.json
+++ b/2024/CVE-2024-24919.json
@@ -600,10 +600,10 @@
"description": "This repository contains a proof-of-concept (PoC) exploit for CVE-2024-24919, a critical vulnerability discovered in Check Point SVN. The vulnerability allows for reading system files. CVE ID: CVE-2024-24919",
"fork": false,
"created_at": "2024-05-31T18:14:19Z",
- "updated_at": "2024-08-18T10:19:29Z",
+ "updated_at": "2024-09-19T06:09:13Z",
"pushed_at": "2024-06-05T16:13:51Z",
- "stargazers_count": 5,
- "watchers_count": 5,
+ "stargazers_count": 6,
+ "watchers_count": 6,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@@ -612,7 +612,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
- "watchers": 5,
+ "watchers": 6,
"score": 0,
"subscribers_count": 1
},
@@ -806,6 +806,36 @@
"score": 0,
"subscribers_count": 1
},
+ {
+ "id": 808982882,
+ "name": "CVE-2024-24919-Bulk-Scanner",
+ "full_name": "ifconfig-me\/CVE-2024-24919-Bulk-Scanner",
+ "owner": {
+ "login": "ifconfig-me",
+ "id": 25315805,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25315805?v=4",
+ "html_url": "https:\/\/github.com\/ifconfig-me"
+ },
+ "html_url": "https:\/\/github.com\/ifconfig-me\/CVE-2024-24919-Bulk-Scanner",
+ "description": "CVE-2024-24919 [Check Point Security Gateway Information Disclosure]",
+ "fork": false,
+ "created_at": "2024-06-01T10:51:14Z",
+ "updated_at": "2024-07-21T07:04:04Z",
+ "pushed_at": "2024-06-02T06:36:57Z",
+ "stargazers_count": 31,
+ "watchers_count": 31,
+ "has_discussions": false,
+ "forks_count": 5,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 5,
+ "watchers": 31,
+ "score": 0,
+ "subscribers_count": 2
+ },
{
"id": 809000136,
"name": "CVE-2024-24919-Checkpoint-Firewall-VPN-Check",
@@ -1307,8 +1337,8 @@
"description": "POC - CVE-2024–24919 - Check Point Security Gateways",
"fork": false,
"created_at": "2024-06-09T06:54:51Z",
- "updated_at": "2024-06-14T14:41:13Z",
- "pushed_at": "2024-06-09T08:03:16Z",
+ "updated_at": "2024-09-19T14:34:59Z",
+ "pushed_at": "2024-09-19T09:24:41Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
@@ -1316,7 +1346,12 @@
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
- "topics": [],
+ "topics": [
+ "check-point",
+ "cve-2024-24919",
+ "information-disclosure",
+ "poc-cve-2024-24919"
+ ],
"visibility": "public",
"forks": 0,
"watchers": 2,
@@ -1481,36 +1516,6 @@
"score": 0,
"subscribers_count": 1
},
- {
- "id": 836175301,
- "name": "CVE-2024-24919",
- "full_name": "smkxt1\/CVE-2024-24919",
- "owner": {
- "login": "smkxt1",
- "id": 116267288,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/116267288?v=4",
- "html_url": "https:\/\/github.com\/smkxt1"
- },
- "html_url": "https:\/\/github.com\/smkxt1\/CVE-2024-24919",
- "description": null,
- "fork": false,
- "created_at": "2024-07-31T09:55:29Z",
- "updated_at": "2024-07-31T09:56:19Z",
- "pushed_at": "2024-07-31T09:56:16Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "has_discussions": false,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 0,
- "score": 0,
- "subscribers_count": 1
- },
{
"id": 849356755,
"name": "Arbitrary-File-Read-CVE-2024-24919",
diff --git a/2024/CVE-2024-26229.json b/2024/CVE-2024-26229.json
index 7806deb590..6ddd210064 100644
--- a/2024/CVE-2024-26229.json
+++ b/2024/CVE-2024-26229.json
@@ -13,10 +13,10 @@
"description": "CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I\/O Control Code",
"fork": false,
"created_at": "2024-06-10T17:02:03Z",
- "updated_at": "2024-09-14T21:39:29Z",
+ "updated_at": "2024-09-18T22:48:02Z",
"pushed_at": "2024-07-04T10:39:15Z",
- "stargazers_count": 310,
- "watchers_count": 310,
+ "stargazers_count": 309,
+ "watchers_count": 309,
"has_discussions": false,
"forks_count": 61,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 61,
- "watchers": 310,
+ "watchers": 309,
"score": 0,
"subscribers_count": 4
},
@@ -43,10 +43,10 @@
"description": "Windows LPE",
"fork": false,
"created_at": "2024-06-11T08:03:29Z",
- "updated_at": "2024-09-14T21:38:57Z",
+ "updated_at": "2024-09-18T22:48:02Z",
"pushed_at": "2024-06-11T20:41:59Z",
- "stargazers_count": 92,
- "watchers_count": 92,
+ "stargazers_count": 91,
+ "watchers_count": 91,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
- "watchers": 92,
+ "watchers": 91,
"score": 0,
"subscribers_count": 1
},
@@ -73,19 +73,19 @@
"description": "BOF implementations of CVE-2024-26229 for Cobalt Strike and BruteRatel",
"fork": false,
"created_at": "2024-06-13T11:57:50Z",
- "updated_at": "2024-08-22T07:25:00Z",
+ "updated_at": "2024-09-20T01:45:35Z",
"pushed_at": "2024-06-13T07:30:48Z",
- "stargazers_count": 5,
- "watchers_count": 5,
+ "stargazers_count": 10,
+ "watchers_count": 10,
"has_discussions": false,
- "forks_count": 27,
+ "forks_count": 28,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 27,
- "watchers": 5,
+ "forks": 28,
+ "watchers": 10,
"score": 0,
"subscribers_count": 0
},
@@ -133,10 +133,10 @@
"description": "A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user",
"fork": false,
"created_at": "2024-08-04T17:40:51Z",
- "updated_at": "2024-09-11T13:09:18Z",
+ "updated_at": "2024-09-22T22:00:24Z",
"pushed_at": "2024-08-15T10:48:05Z",
- "stargazers_count": 29,
- "watchers_count": 29,
+ "stargazers_count": 31,
+ "watchers_count": 31,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
- "watchers": 29,
+ "watchers": 31,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-26230.json b/2024/CVE-2024-26230.json
index 4a4e3d69c1..d5a67cd64e 100644
--- a/2024/CVE-2024-26230.json
+++ b/2024/CVE-2024-26230.json
@@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-04-11T03:59:28Z",
- "updated_at": "2024-09-16T20:05:29Z",
+ "updated_at": "2024-09-18T22:47:58Z",
"pushed_at": "2024-08-09T15:02:24Z",
- "stargazers_count": 3,
- "watchers_count": 3,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 3,
+ "watchers": 2,
"score": 0,
"subscribers_count": 1
},
@@ -43,10 +43,10 @@
"description": "LPE of CVE-2024-26230",
"fork": false,
"created_at": "2024-08-28T16:31:26Z",
- "updated_at": "2024-09-10T22:24:49Z",
+ "updated_at": "2024-09-23T04:03:34Z",
"pushed_at": "2024-09-01T07:03:46Z",
- "stargazers_count": 17,
- "watchers_count": 17,
+ "stargazers_count": 18,
+ "watchers_count": 18,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
- "watchers": 17,
+ "watchers": 18,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-26581.json b/2024/CVE-2024-26581.json
index bce2b03dd8..0a81681505 100644
--- a/2024/CVE-2024-26581.json
+++ b/2024/CVE-2024-26581.json
@@ -13,12 +13,12 @@
"description": "[CVE-2024-26581] Vulnerability Checker for BGN Internal",
"fork": false,
"created_at": "2024-09-10T09:32:25Z",
- "updated_at": "2024-09-13T16:59:43Z",
- "pushed_at": "2024-09-12T10:16:01Z",
+ "updated_at": "2024-09-23T07:56:31Z",
+ "pushed_at": "2024-09-23T07:56:27Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -33,7 +33,7 @@
"shell-scripting"
],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
diff --git a/2024/CVE-2024-27130.json b/2024/CVE-2024-27130.json
index 209cb602c8..ff6fd6b9e5 100644
--- a/2024/CVE-2024-27130.json
+++ b/2024/CVE-2024-27130.json
@@ -13,10 +13,10 @@
"description": "PoC for CVE-2024-27130",
"fork": false,
"created_at": "2024-05-17T07:58:01Z",
- "updated_at": "2024-07-25T08:00:38Z",
+ "updated_at": "2024-09-23T18:45:02Z",
"pushed_at": "2024-05-17T10:27:07Z",
- "stargazers_count": 30,
- "watchers_count": 30,
+ "stargazers_count": 32,
+ "watchers_count": 32,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
- "watchers": 30,
+ "watchers": 32,
"score": 0,
"subscribers_count": 0
},
diff --git a/2024/CVE-2024-27198.json b/2024/CVE-2024-27198.json
index f00333b66c..bd4552906d 100644
--- a/2024/CVE-2024-27198.json
+++ b/2024/CVE-2024-27198.json
@@ -279,7 +279,7 @@
"description": "CVE-2024-27198 & CVE-2024-27199 PoC - RCE, Admin Account Creation, Enum Users, Server Information",
"fork": false,
"created_at": "2024-04-22T22:14:24Z",
- "updated_at": "2024-08-22T03:11:52Z",
+ "updated_at": "2024-09-18T22:47:58Z",
"pushed_at": "2024-07-19T14:42:24Z",
"stargazers_count": 24,
"watchers_count": 24,
diff --git a/2024/CVE-2024-27348.json b/2024/CVE-2024-27348.json
index e737779225..6e669e1ee2 100644
--- a/2024/CVE-2024-27348.json
+++ b/2024/CVE-2024-27348.json
@@ -13,12 +13,12 @@
"description": "Apache HugeGraph Server RCE Scanner ( CVE-2024-27348 )",
"fork": false,
"created_at": "2024-05-31T20:11:37Z",
- "updated_at": "2024-08-30T06:54:18Z",
+ "updated_at": "2024-09-23T07:40:07Z",
"pushed_at": "2024-06-08T09:12:43Z",
- "stargazers_count": 55,
- "watchers_count": 55,
+ "stargazers_count": 59,
+ "watchers_count": 59,
"has_discussions": false,
- "forks_count": 14,
+ "forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -31,8 +31,8 @@
"vulnerability-scanners"
],
"visibility": "public",
- "forks": 14,
- "watchers": 55,
+ "forks": 15,
+ "watchers": 59,
"score": 0,
"subscribers_count": 1
},
diff --git a/2024/CVE-2024-27564.json b/2024/CVE-2024-27564.json
index 665dc97e29..216d0e1046 100644
--- a/2024/CVE-2024-27564.json
+++ b/2024/CVE-2024-27564.json
@@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-09-15T10:25:01Z",
- "updated_at": "2024-09-15T11:55:28Z",
+ "updated_at": "2024-09-19T00:54:29Z",
"pushed_at": "2024-09-15T11:55:25Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 4,
+ "watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -25,9 +25,9 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 0,
+ "watchers": 4,
"score": 0,
- "subscribers_count": 1
+ "subscribers_count": 0
},
{
"id": 857770278,
@@ -43,10 +43,10 @@
"description": null,
"fork": false,
"created_at": "2024-09-15T15:11:54Z",
- "updated_at": "2024-09-15T15:54:24Z",
+ "updated_at": "2024-09-23T18:47:05Z",
"pushed_at": "2024-09-15T15:54:21Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -55,8 +55,8 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 0,
+ "watchers": 2,
"score": 0,
- "subscribers_count": 1
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-27665.json b/2024/CVE-2024-27665.json
index ad43499042..46ed8ef333 100644
--- a/2024/CVE-2024-27665.json
+++ b/2024/CVE-2024-27665.json
@@ -18,13 +18,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
diff --git a/2024/CVE-2024-28000.json b/2024/CVE-2024-28000.json
index daed55f896..39341e0874 100644
--- a/2024/CVE-2024-28000.json
+++ b/2024/CVE-2024-28000.json
@@ -18,13 +18,13 @@
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
- "forks_count": 6,
+ "forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 6,
+ "forks": 7,
"watchers": 16,
"score": 0,
"subscribers_count": 1
@@ -87,13 +87,13 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
- "forks_count": 1,
+ "forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 1,
+ "forks": 2,
"watchers": 5,
"score": 0,
"subscribers_count": 1
diff --git a/2024/CVE-2024-28397.json b/2024/CVE-2024-28397.json
index 5bd24af5d2..96d6184ab2 100644
--- a/2024/CVE-2024-28397.json
+++ b/2024/CVE-2024-28397.json
@@ -13,10 +13,10 @@
"description": "CVE-2024-28397: js2py sandbox escape, bypass pyimport restriction.",
"fork": false,
"created_at": "2024-06-19T01:46:33Z",
- "updated_at": "2024-09-11T14:30:05Z",
+ "updated_at": "2024-09-18T22:48:02Z",
"pushed_at": "2024-07-29T04:42:43Z",
- "stargazers_count": 30,
- "watchers_count": 30,
+ "stargazers_count": 29,
+ "watchers_count": 29,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
- "watchers": 30,
+ "watchers": 29,
"score": 0,
"subscribers_count": 1
},
diff --git a/2024/CVE-2024-2876.json b/2024/CVE-2024-2876.json
index 009497aea6..7dc4d48505 100644
--- a/2024/CVE-2024-2876.json
+++ b/2024/CVE-2024-2876.json
@@ -13,10 +13,10 @@
"description": "POC for SQLi vulnerability in Icegram express ",
"fork": false,
"created_at": "2024-04-25T09:53:22Z",
- "updated_at": "2024-05-20T09:23:53Z",
+ "updated_at": "2024-09-18T11:14:01Z",
"pushed_at": "2024-04-25T09:55:55Z",
- "stargazers_count": 4,
- "watchers_count": 4,
+ "stargazers_count": 5,
+ "watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 4,
+ "watchers": 5,
"score": 0,
"subscribers_count": 1
},
@@ -57,7 +57,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 1
+ "subscribers_count": 0
},
{
"id": 858561765,
@@ -73,10 +73,10 @@
"description": null,
"fork": false,
"created_at": "2024-09-17T05:54:18Z",
- "updated_at": "2024-09-17T05:54:56Z",
+ "updated_at": "2024-09-18T04:17:15Z",
"pushed_at": "2024-09-17T05:54:52Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 0,
+ "watchers": 1,
"score": 0,
"subscribers_count": 0
}
diff --git a/2024/CVE-2024-2879.json b/2024/CVE-2024-2879.json
index 64a474c992..d85175131b 100644
--- a/2024/CVE-2024-2879.json
+++ b/2024/CVE-2024-2879.json
@@ -13,7 +13,7 @@
"description": "CVE-2024-2879 - LayerSlider 7.9.11 - 7.10.0 - Unauthenticated SQL Injection",
"fork": false,
"created_at": "2024-04-08T18:50:02Z",
- "updated_at": "2024-09-14T06:43:27Z",
+ "updated_at": "2024-09-19T09:29:05Z",
"pushed_at": "2024-04-08T19:16:28Z",
"stargazers_count": 20,
"watchers_count": 20,
diff --git a/2024/CVE-2024-2887.json b/2024/CVE-2024-2887.json
index 04dcd2af70..13489bf02e 100644
--- a/2024/CVE-2024-2887.json
+++ b/2024/CVE-2024-2887.json
@@ -13,10 +13,10 @@
"description": "Chrome(CVE-2024-2887)RCE-POC",
"fork": false,
"created_at": "2024-08-25T07:30:25Z",
- "updated_at": "2024-08-29T13:31:16Z",
+ "updated_at": "2024-09-21T17:20:40Z",
"pushed_at": "2024-08-25T07:33:36Z",
- "stargazers_count": 2,
- "watchers_count": 2,
+ "stargazers_count": 3,
+ "watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 2,
+ "watchers": 3,
"score": 0,
"subscribers_count": 1
},
diff --git a/2024/CVE-2024-28987.json b/2024/CVE-2024-28987.json
index 5894a57402..f8d8ed42d1 100644
--- a/2024/CVE-2024-28987.json
+++ b/2024/CVE-2024-28987.json
@@ -13,10 +13,10 @@
"description": "Web Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)",
"fork": false,
"created_at": "2024-09-05T09:01:58Z",
- "updated_at": "2024-09-12T02:36:04Z",
+ "updated_at": "2024-09-23T12:28:39Z",
"pushed_at": "2024-09-05T09:23:59Z",
- "stargazers_count": 6,
- "watchers_count": 6,
+ "stargazers_count": 7,
+ "watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 6,
+ "watchers": 7,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-28991.json b/2024/CVE-2024-28991.json
new file mode 100644
index 0000000000..3ab5bf4ba7
--- /dev/null
+++ b/2024/CVE-2024-28991.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 859383778,
+ "name": "PoC-for-CVE-2024-28991",
+ "full_name": "maybeheisenberg\/PoC-for-CVE-2024-28991",
+ "owner": {
+ "login": "maybeheisenberg",
+ "id": 181843766,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/181843766?v=4",
+ "html_url": "https:\/\/github.com\/maybeheisenberg"
+ },
+ "html_url": "https:\/\/github.com\/maybeheisenberg\/PoC-for-CVE-2024-28991",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-09-18T15:11:50Z",
+ "updated_at": "2024-09-22T15:29:31Z",
+ "pushed_at": "2024-09-18T15:21:26Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-28995.json b/2024/CVE-2024-28995.json
index 2d7326330e..957fcc11cb 100644
--- a/2024/CVE-2024-28995.json
+++ b/2024/CVE-2024-28995.json
@@ -262,10 +262,10 @@
"description": "SolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine. ",
"fork": false,
"created_at": "2024-08-24T17:05:48Z",
- "updated_at": "2024-08-26T11:33:03Z",
+ "updated_at": "2024-09-18T22:48:09Z",
"pushed_at": "2024-08-24T17:22:29Z",
- "stargazers_count": 2,
- "watchers_count": 2,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -274,7 +274,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 2,
+ "watchers": 1,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-29059.json b/2024/CVE-2024-29059.json
index 771be7ce1f..9b274f12b6 100644
--- a/2024/CVE-2024-29059.json
+++ b/2024/CVE-2024-29059.json
@@ -13,10 +13,10 @@
"description": "Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)",
"fork": false,
"created_at": "2024-03-11T10:14:39Z",
- "updated_at": "2024-09-14T03:45:58Z",
+ "updated_at": "2024-09-18T20:09:46Z",
"pushed_at": "2024-03-25T12:56:16Z",
- "stargazers_count": 82,
- "watchers_count": 82,
+ "stargazers_count": 84,
+ "watchers_count": 84,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
- "watchers": 82,
+ "watchers": 84,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-29269.json b/2024/CVE-2024-29269.json
index 7f864a00a4..972ac2873f 100644
--- a/2024/CVE-2024-29269.json
+++ b/2024/CVE-2024-29269.json
@@ -183,10 +183,10 @@
"description": null,
"fork": false,
"created_at": "2024-09-08T08:56:33Z",
- "updated_at": "2024-09-17T01:46:10Z",
+ "updated_at": "2024-09-19T17:56:19Z",
"pushed_at": "2024-09-08T09:24:25Z",
- "stargazers_count": 2,
- "watchers_count": 2,
+ "stargazers_count": 3,
+ "watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -195,7 +195,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 2,
+ "watchers": 3,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-29415.json b/2024/CVE-2024-29415.json
index f4a64007df..dac118b949 100644
--- a/2024/CVE-2024-29415.json
+++ b/2024/CVE-2024-29415.json
@@ -13,10 +13,10 @@
"description": "Sample project that uses VEX to supress CVE-2024-29415.",
"fork": false,
"created_at": "2024-07-05T07:50:29Z",
- "updated_at": "2024-08-21T11:27:14Z",
+ "updated_at": "2024-09-18T22:48:03Z",
"pushed_at": "2024-07-05T09:49:24Z",
- "stargazers_count": 2,
- "watchers_count": 2,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 2,
+ "watchers": 1,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-2961.json b/2024/CVE-2024-2961.json
index 4b12daeed0..434200e9be 100644
--- a/2024/CVE-2024-2961.json
+++ b/2024/CVE-2024-2961.json
@@ -73,19 +73,19 @@
"description": "Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()",
"fork": false,
"created_at": "2024-05-27T08:30:06Z",
- "updated_at": "2024-09-17T14:25:19Z",
+ "updated_at": "2024-09-24T06:07:44Z",
"pushed_at": "2024-09-14T11:33:33Z",
- "stargazers_count": 370,
- "watchers_count": 370,
+ "stargazers_count": 381,
+ "watchers_count": 381,
"has_discussions": false,
- "forks_count": 50,
+ "forks_count": 51,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 50,
- "watchers": 370,
+ "forks": 51,
+ "watchers": 381,
"score": 0,
"subscribers_count": 7
},
@@ -203,10 +203,10 @@
"description": null,
"fork": false,
"created_at": "2024-06-04T09:57:46Z",
- "updated_at": "2024-06-04T10:02:48Z",
+ "updated_at": "2024-09-20T09:16:54Z",
"pushed_at": "2024-06-04T10:02:44Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -215,7 +215,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 0,
+ "watchers": 1,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-29824.json b/2024/CVE-2024-29824.json
index 6cf06aa85f..3fc0b5a9fa 100644
--- a/2024/CVE-2024-29824.json
+++ b/2024/CVE-2024-29824.json
@@ -13,7 +13,7 @@
"description": "Ivanti EPM SQL Injection Remote Code Execution Vulnerability",
"fork": false,
"created_at": "2024-06-12T13:53:32Z",
- "updated_at": "2024-09-07T16:30:53Z",
+ "updated_at": "2024-09-18T22:48:02Z",
"pushed_at": "2024-06-12T14:04:39Z",
"stargazers_count": 15,
"watchers_count": 15,
diff --git a/2024/CVE-2024-29847.json b/2024/CVE-2024-29847.json
index 40127967ce..fc79c7d0ac 100644
--- a/2024/CVE-2024-29847.json
+++ b/2024/CVE-2024-29847.json
@@ -13,20 +13,20 @@
"description": "Exploit for CVE-2024-29847",
"fork": false,
"created_at": "2024-09-14T21:51:41Z",
- "updated_at": "2024-09-17T00:32:01Z",
+ "updated_at": "2024-09-23T08:32:31Z",
"pushed_at": "2024-09-15T08:07:22Z",
- "stargazers_count": 2,
- "watchers_count": 2,
+ "stargazers_count": 8,
+ "watchers_count": 8,
"has_discussions": false,
- "forks_count": 1,
+ "forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 1,
- "watchers": 2,
+ "forks": 2,
+ "watchers": 8,
"score": 0,
- "subscribers_count": 1
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-29849.json b/2024/CVE-2024-29849.json
index 81c0d44af8..d9550c53a9 100644
--- a/2024/CVE-2024-29849.json
+++ b/2024/CVE-2024-29849.json
@@ -13,10 +13,10 @@
"description": "Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)",
"fork": false,
"created_at": "2024-06-10T06:12:20Z",
- "updated_at": "2024-09-10T18:07:29Z",
+ "updated_at": "2024-09-18T22:48:02Z",
"pushed_at": "2024-06-13T08:40:57Z",
- "stargazers_count": 85,
- "watchers_count": 85,
+ "stargazers_count": 84,
+ "watchers_count": 84,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
- "watchers": 85,
+ "watchers": 84,
"score": 0,
"subscribers_count": 2
}
diff --git a/2024/CVE-2024-29855.json b/2024/CVE-2024-29855.json
index bf8b550461..24346ded5b 100644
--- a/2024/CVE-2024-29855.json
+++ b/2024/CVE-2024-29855.json
@@ -13,10 +13,10 @@
"description": "PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855",
"fork": false,
"created_at": "2024-06-13T08:32:55Z",
- "updated_at": "2024-07-31T04:16:31Z",
+ "updated_at": "2024-09-18T22:48:02Z",
"pushed_at": "2024-06-17T10:45:06Z",
- "stargazers_count": 16,
- "watchers_count": 16,
+ "stargazers_count": 15,
+ "watchers_count": 15,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
- "watchers": 16,
+ "watchers": 15,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-29943.json b/2024/CVE-2024-29943.json
index ed2ab31fd4..b39011e4df 100644
--- a/2024/CVE-2024-29943.json
+++ b/2024/CVE-2024-29943.json
@@ -13,10 +13,10 @@
"description": "A Pwn2Own SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination then RCE",
"fork": false,
"created_at": "2024-06-27T13:47:52Z",
- "updated_at": "2024-09-17T14:28:20Z",
+ "updated_at": "2024-09-20T08:16:35Z",
"pushed_at": "2024-07-07T03:36:49Z",
- "stargazers_count": 83,
- "watchers_count": 83,
+ "stargazers_count": 85,
+ "watchers_count": 85,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
- "watchers": 83,
+ "watchers": 85,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-2997.json b/2024/CVE-2024-2997.json
index d8086c2a3a..896cff3bff 100644
--- a/2024/CVE-2024-2997.json
+++ b/2024/CVE-2024-2997.json
@@ -13,8 +13,8 @@
"description": "The tool helps in quickly identifying vulnerabilities by examining a comprehensive list of potential paths on a website, making it useful for security assessments.",
"fork": false,
"created_at": "2024-08-03T14:40:08Z",
- "updated_at": "2024-08-22T02:30:08Z",
- "pushed_at": "2024-08-03T15:00:55Z",
+ "updated_at": "2024-09-24T00:27:12Z",
+ "pushed_at": "2024-09-24T00:27:08Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
diff --git a/2024/CVE-2024-29973.json b/2024/CVE-2024-29973.json
index 513dbbf302..4dd8ad38b8 100644
--- a/2024/CVE-2024-29973.json
+++ b/2024/CVE-2024-29973.json
@@ -43,10 +43,10 @@
"description": "POC for CVE-2024-29973",
"fork": false,
"created_at": "2024-06-19T10:34:56Z",
- "updated_at": "2024-09-09T06:56:29Z",
+ "updated_at": "2024-09-23T06:25:00Z",
"pushed_at": "2024-07-06T00:17:23Z",
- "stargazers_count": 7,
- "watchers_count": 7,
+ "stargazers_count": 8,
+ "watchers_count": 8,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
- "watchers": 7,
+ "watchers": 8,
"score": 0,
"subscribers_count": 1
},
@@ -133,10 +133,10 @@
"description": "Exploiter a Vulnerability detection and Exploitation tool for CVE-2024-29973 with Asychronous Performance.",
"fork": false,
"created_at": "2024-06-21T15:20:52Z",
- "updated_at": "2024-07-28T15:26:57Z",
+ "updated_at": "2024-09-23T06:18:15Z",
"pushed_at": "2024-06-21T15:33:09Z",
- "stargazers_count": 5,
- "watchers_count": 5,
+ "stargazers_count": 6,
+ "watchers_count": 6,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
- "watchers": 5,
+ "watchers": 6,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-30051.json b/2024/CVE-2024-30051.json
index 920ea39795..083d573d19 100644
--- a/2024/CVE-2024-30051.json
+++ b/2024/CVE-2024-30051.json
@@ -13,19 +13,19 @@
"description": null,
"fork": false,
"created_at": "2024-08-14T16:20:38Z",
- "updated_at": "2024-09-16T13:31:29Z",
+ "updated_at": "2024-09-21T11:19:32Z",
"pushed_at": "2024-09-05T23:21:00Z",
- "stargazers_count": 90,
- "watchers_count": 90,
+ "stargazers_count": 91,
+ "watchers_count": 91,
"has_discussions": false,
- "forks_count": 26,
+ "forks_count": 28,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 26,
- "watchers": 90,
+ "forks": 28,
+ "watchers": 91,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-30088.json b/2024/CVE-2024-30088.json
index 68482079a1..8d48f4f4e1 100644
--- a/2024/CVE-2024-30088.json
+++ b/2024/CVE-2024-30088.json
@@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-06-24T10:37:26Z",
- "updated_at": "2024-09-11T16:28:45Z",
+ "updated_at": "2024-09-22T16:54:32Z",
"pushed_at": "2024-07-31T19:11:55Z",
- "stargazers_count": 203,
- "watchers_count": 203,
+ "stargazers_count": 205,
+ "watchers_count": 205,
"has_discussions": false,
"forks_count": 45,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 45,
- "watchers": 203,
+ "watchers": 205,
"score": 0,
"subscribers_count": 3
},
@@ -103,10 +103,10 @@
"description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088",
"fork": false,
"created_at": "2024-07-15T08:07:05Z",
- "updated_at": "2024-09-15T21:51:06Z",
+ "updated_at": "2024-09-22T22:42:38Z",
"pushed_at": "2024-09-08T21:23:34Z",
- "stargazers_count": 355,
- "watchers_count": 355,
+ "stargazers_count": 359,
+ "watchers_count": 359,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
- "watchers": 355,
+ "watchers": 359,
"score": 0,
"subscribers_count": 18
},
diff --git a/2024/CVE-2024-30270.json b/2024/CVE-2024-30270.json
index 470277d527..4376dea741 100644
--- a/2024/CVE-2024-30270.json
+++ b/2024/CVE-2024-30270.json
@@ -13,19 +13,19 @@
"description": "The script exploits Mailcow vulnerabilities via XSS and RCE, emphasizing the need for robust security measures and responsible usage to enhance web application security.",
"fork": false,
"created_at": "2024-06-21T04:47:48Z",
- "updated_at": "2024-08-09T13:33:12Z",
+ "updated_at": "2024-09-18T04:21:32Z",
"pushed_at": "2024-06-21T13:00:06Z",
- "stargazers_count": 3,
- "watchers_count": 3,
+ "stargazers_count": 4,
+ "watchers_count": 4,
"has_discussions": false,
- "forks_count": 2,
+ "forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 2,
- "watchers": 3,
+ "forks": 3,
+ "watchers": 4,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-30850.json b/2024/CVE-2024-30850.json
index 576d9f1f4e..0a62e42ac0 100644
--- a/2024/CVE-2024-30850.json
+++ b/2024/CVE-2024-30850.json
@@ -13,10 +13,10 @@
"description": "CHAOS RAT web panel path RCE PoC",
"fork": false,
"created_at": "2024-04-05T21:35:04Z",
- "updated_at": "2024-07-16T04:23:06Z",
+ "updated_at": "2024-09-18T13:18:17Z",
"pushed_at": "2024-04-15T17:46:32Z",
- "stargazers_count": 27,
- "watchers_count": 27,
+ "stargazers_count": 28,
+ "watchers_count": 28,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
- "watchers": 27,
+ "watchers": 28,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json
index e050ea5745..dab99a9e6a 100644
--- a/2024/CVE-2024-3094.json
+++ b/2024/CVE-2024-3094.json
@@ -982,19 +982,19 @@
"description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)",
"fork": false,
"created_at": "2024-04-01T14:28:09Z",
- "updated_at": "2024-09-17T03:51:45Z",
+ "updated_at": "2024-09-17T19:27:33Z",
"pushed_at": "2024-04-03T04:58:50Z",
- "stargazers_count": 3484,
- "watchers_count": 3484,
+ "stargazers_count": 3485,
+ "watchers_count": 3485,
"has_discussions": false,
- "forks_count": 233,
+ "forks_count": 236,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 233,
- "watchers": 3484,
+ "forks": 236,
+ "watchers": 3485,
"score": 0,
"subscribers_count": 39
},
diff --git a/2024/CVE-2024-31666.json b/2024/CVE-2024-31666.json
index 4825d6c561..8c46a045ea 100644
--- a/2024/CVE-2024-31666.json
+++ b/2024/CVE-2024-31666.json
@@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 1
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-3183.json b/2024/CVE-2024-3183.json
index 591a056f50..54c208e7da 100644
--- a/2024/CVE-2024-3183.json
+++ b/2024/CVE-2024-3183.json
@@ -13,10 +13,10 @@
"description": "POC for CVE-2024-3183 (FreeIPA Rosting)",
"fork": false,
"created_at": "2024-08-14T14:24:58Z",
- "updated_at": "2024-09-14T09:58:46Z",
+ "updated_at": "2024-09-20T07:07:05Z",
"pushed_at": "2024-08-20T14:16:04Z",
- "stargazers_count": 17,
- "watchers_count": 17,
+ "stargazers_count": 18,
+ "watchers_count": 18,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
- "watchers": 17,
+ "watchers": 18,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-32002.json b/2024/CVE-2024-32002.json
index bb7af2339f..fdffc50f41 100644
--- a/2024/CVE-2024-32002.json
+++ b/2024/CVE-2024-32002.json
@@ -78,7 +78,7 @@
"stargazers_count": 487,
"watchers_count": 487,
"has_discussions": false,
- "forks_count": 140,
+ "forks_count": 141,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -89,7 +89,7 @@
"rce"
],
"visibility": "public",
- "forks": 140,
+ "forks": 141,
"watchers": 487,
"score": 0,
"subscribers_count": 3
diff --git a/2024/CVE-2024-32651.json b/2024/CVE-2024-32651.json
index c81a3b7cb9..e3387924bd 100644
--- a/2024/CVE-2024-32651.json
+++ b/2024/CVE-2024-32651.json
@@ -43,8 +43,8 @@
"description": "Server-Side Template Injection Exploit",
"fork": false,
"created_at": "2024-09-16T13:11:38Z",
- "updated_at": "2024-09-17T05:21:41Z",
- "pushed_at": "2024-09-17T05:21:38Z",
+ "updated_at": "2024-09-18T09:16:27Z",
+ "pushed_at": "2024-09-18T09:16:23Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
@@ -57,6 +57,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
- "subscribers_count": 1
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-3273.json b/2024/CVE-2024-3273.json
index 077b3fb153..1b01a86e38 100644
--- a/2024/CVE-2024-3273.json
+++ b/2024/CVE-2024-3273.json
@@ -254,5 +254,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 860862729,
+ "name": "CVE-2024-3273-D-Link-Remote-Code-Execution-RCE",
+ "full_name": "X-Projetion\/CVE-2024-3273-D-Link-Remote-Code-Execution-RCE",
+ "owner": {
+ "login": "X-Projetion",
+ "id": 161194427,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161194427?v=4",
+ "html_url": "https:\/\/github.com\/X-Projetion"
+ },
+ "html_url": "https:\/\/github.com\/X-Projetion\/CVE-2024-3273-D-Link-Remote-Code-Execution-RCE",
+ "description": "CVE-2024-3273 - D-Link Remote Code Execution (RCE)",
+ "fork": false,
+ "created_at": "2024-09-21T11:17:34Z",
+ "updated_at": "2024-09-21T11:24:51Z",
+ "pushed_at": "2024-09-21T11:24:47Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-3400.json b/2024/CVE-2024-3400.json
index a6956e533c..7641b08f16 100644
--- a/2024/CVE-2024-3400.json
+++ b/2024/CVE-2024-3400.json
@@ -73,10 +73,10 @@
"description": "CVE-2024-3400",
"fork": false,
"created_at": "2024-04-13T14:00:31Z",
- "updated_at": "2024-09-11T18:40:41Z",
+ "updated_at": "2024-09-20T14:22:27Z",
"pushed_at": "2024-04-18T07:11:17Z",
- "stargazers_count": 59,
- "watchers_count": 59,
+ "stargazers_count": 60,
+ "watchers_count": 60,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
- "watchers": 59,
+ "watchers": 60,
"score": 0,
"subscribers_count": 2
},
@@ -313,10 +313,10 @@
"description": "CVE-2024-3400-RCE",
"fork": false,
"created_at": "2024-04-16T16:18:56Z",
- "updated_at": "2024-09-14T08:51:39Z",
+ "updated_at": "2024-09-18T18:37:07Z",
"pushed_at": "2024-04-22T08:50:27Z",
- "stargazers_count": 78,
- "watchers_count": 78,
+ "stargazers_count": 79,
+ "watchers_count": 79,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@@ -325,7 +325,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
- "watchers": 78,
+ "watchers": 79,
"score": 0,
"subscribers_count": 3
},
@@ -493,7 +493,7 @@
"description": "Global Protec Palo Alto File Write Exploit",
"fork": false,
"created_at": "2024-04-17T16:01:20Z",
- "updated_at": "2024-05-31T15:01:46Z",
+ "updated_at": "2024-09-18T22:47:58Z",
"pushed_at": "2024-04-17T19:46:15Z",
"stargazers_count": 10,
"watchers_count": 10,
@@ -558,13 +558,13 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
- "forks_count": 1,
+ "forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 1,
+ "forks": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 1
diff --git a/2024/CVE-2024-34144.json b/2024/CVE-2024-34144.json
index cee8d45ee6..0e82506fc2 100644
--- a/2024/CVE-2024-34144.json
+++ b/2024/CVE-2024-34144.json
@@ -13,10 +13,10 @@
"description": "PoC for CVE-2024-34144",
"fork": false,
"created_at": "2024-07-29T03:02:39Z",
- "updated_at": "2024-07-29T11:26:13Z",
+ "updated_at": "2024-09-23T08:58:10Z",
"pushed_at": "2024-07-29T11:23:53Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 1,
+ "watchers": 2,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-34470.json b/2024/CVE-2024-34470.json
index 8ed383fc39..bffeb1a34f 100644
--- a/2024/CVE-2024-34470.json
+++ b/2024/CVE-2024-34470.json
@@ -108,13 +108,13 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
diff --git a/2024/CVE-2024-34693.json b/2024/CVE-2024-34693.json
index 83818821b7..8c6b0fc60a 100644
--- a/2024/CVE-2024-34693.json
+++ b/2024/CVE-2024-34693.json
@@ -13,10 +13,10 @@
"description": "CVE-2024-34693: Server Arbitrary File Read in Apache Superset",
"fork": false,
"created_at": "2024-07-27T21:28:11Z",
- "updated_at": "2024-07-31T01:14:53Z",
+ "updated_at": "2024-09-18T09:35:43Z",
"pushed_at": "2024-07-27T21:58:04Z",
- "stargazers_count": 7,
- "watchers_count": 7,
+ "stargazers_count": 8,
+ "watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 1,
- "watchers": 7,
+ "watchers": 8,
"score": 0,
"subscribers_count": 1
},
@@ -54,13 +54,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
diff --git a/2024/CVE-2024-34716.json b/2024/CVE-2024-34716.json
index bf5bee5a8f..bb8cdf21d7 100644
--- a/2024/CVE-2024-34716.json
+++ b/2024/CVE-2024-34716.json
@@ -13,19 +13,19 @@
"description": null,
"fork": false,
"created_at": "2024-05-14T18:48:41Z",
- "updated_at": "2024-09-15T15:32:19Z",
- "pushed_at": "2024-05-15T18:21:45Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "updated_at": "2024-09-23T03:58:34Z",
+ "pushed_at": "2024-09-22T13:20:37Z",
+ "stargazers_count": 6,
+ "watchers_count": 6,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
- "watchers": 0,
+ "forks": 2,
+ "watchers": 6,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-3495.json b/2024/CVE-2024-3495.json
index 24feb9225c..a9295321a0 100644
--- a/2024/CVE-2024-3495.json
+++ b/2024/CVE-2024-3495.json
@@ -18,13 +18,13 @@
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 8,
"score": 0,
"subscribers_count": 1
diff --git a/2024/CVE-2024-36401.json b/2024/CVE-2024-36401.json
index 6349642283..9fa91e9075 100644
--- a/2024/CVE-2024-36401.json
+++ b/2024/CVE-2024-36401.json
@@ -103,10 +103,10 @@
"description": "Remote Code Execution (RCE) Vulnerability In Evaluating Property Name Expressions with multies ways to exploit",
"fork": false,
"created_at": "2024-07-06T01:10:28Z",
- "updated_at": "2024-09-10T08:35:42Z",
+ "updated_at": "2024-09-18T18:25:27Z",
"pushed_at": "2024-07-06T01:57:58Z",
- "stargazers_count": 38,
- "watchers_count": 38,
+ "stargazers_count": 39,
+ "watchers_count": 39,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@@ -122,7 +122,7 @@
],
"visibility": "public",
"forks": 3,
- "watchers": 38,
+ "watchers": 39,
"score": 0,
"subscribers_count": 1
},
@@ -230,10 +230,10 @@
"description": "GeoServer Remote Code Execution",
"fork": false,
"created_at": "2024-07-30T18:43:40Z",
- "updated_at": "2024-09-10T05:46:18Z",
+ "updated_at": "2024-09-21T16:38:37Z",
"pushed_at": "2024-08-02T14:57:26Z",
- "stargazers_count": 68,
- "watchers_count": 68,
+ "stargazers_count": 69,
+ "watchers_count": 69,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@@ -242,7 +242,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
- "watchers": 68,
+ "watchers": 69,
"score": 0,
"subscribers_count": 1
},
@@ -334,6 +334,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
- "subscribers_count": 1
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-36837.json b/2024/CVE-2024-36837.json
index fc6c0442ae..acabad02ec 100644
--- a/2024/CVE-2024-36837.json
+++ b/2024/CVE-2024-36837.json
@@ -13,10 +13,10 @@
"description": "CVE-2024-36837 POC",
"fork": false,
"created_at": "2024-06-15T16:44:51Z",
- "updated_at": "2024-06-17T09:22:39Z",
+ "updated_at": "2024-09-20T15:24:09Z",
"pushed_at": "2024-06-15T17:34:43Z",
- "stargazers_count": 2,
- "watchers_count": 2,
+ "stargazers_count": 3,
+ "watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 2,
+ "watchers": 3,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-36991.json b/2024/CVE-2024-36991.json
index 115052eee5..56a8dbe9e3 100644
--- a/2024/CVE-2024-36991.json
+++ b/2024/CVE-2024-36991.json
@@ -13,10 +13,10 @@
"description": "POC for CVE-2024-36991: This exploit will attempt to read Splunk \/etc\/passwd file.",
"fork": false,
"created_at": "2024-07-06T00:49:40Z",
- "updated_at": "2024-09-15T14:09:02Z",
+ "updated_at": "2024-09-20T13:23:52Z",
"pushed_at": "2024-07-12T00:41:36Z",
- "stargazers_count": 107,
- "watchers_count": 107,
+ "stargazers_count": 108,
+ "watchers_count": 108,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
- "watchers": 107,
+ "watchers": 108,
"score": 0,
"subscribers_count": 2
},
diff --git a/2024/CVE-2024-37081.json b/2024/CVE-2024-37081.json
index 3697dccf42..b2e1c2df18 100644
--- a/2024/CVE-2024-37081.json
+++ b/2024/CVE-2024-37081.json
@@ -50,10 +50,10 @@
"description": null,
"fork": false,
"created_at": "2024-07-09T16:14:41Z",
- "updated_at": "2024-09-07T15:35:01Z",
+ "updated_at": "2024-09-18T22:48:04Z",
"pushed_at": "2024-07-09T16:22:15Z",
- "stargazers_count": 56,
- "watchers_count": 56,
+ "stargazers_count": 55,
+ "watchers_count": 55,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@@ -62,7 +62,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
- "watchers": 56,
+ "watchers": 55,
"score": 0,
"subscribers_count": 2
},
diff --git a/2024/CVE-2024-37084.json b/2024/CVE-2024-37084.json
index 40aa004463..954d53b1c2 100644
--- a/2024/CVE-2024-37084.json
+++ b/2024/CVE-2024-37084.json
@@ -13,8 +13,8 @@
"description": "Analysis , Demo exploit and poc about CVE-2024-37084",
"fork": false,
"created_at": "2024-09-10T16:58:54Z",
- "updated_at": "2024-09-11T23:11:50Z",
- "pushed_at": "2024-09-10T17:14:44Z",
+ "updated_at": "2024-09-24T02:41:31Z",
+ "pushed_at": "2024-09-24T02:41:27Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
diff --git a/2024/CVE-2024-38041.json b/2024/CVE-2024-38041.json
index 0cbd8462d7..4626085df7 100644
--- a/2024/CVE-2024-38041.json
+++ b/2024/CVE-2024-38041.json
@@ -13,10 +13,10 @@
"description": "Kernel pointers copied to output user mode buffer with ioctl 0x22A014 in the appid.sys driver.",
"fork": false,
"created_at": "2024-07-21T02:29:18Z",
- "updated_at": "2024-07-30T23:03:57Z",
+ "updated_at": "2024-09-18T22:48:05Z",
"pushed_at": "2024-07-21T02:35:59Z",
- "stargazers_count": 4,
- "watchers_count": 4,
+ "stargazers_count": 3,
+ "watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 4,
+ "watchers": 3,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-38063.json b/2024/CVE-2024-38063.json
index c2feeae5d1..7a7d5b3e82 100644
--- a/2024/CVE-2024-38063.json
+++ b/2024/CVE-2024-38063.json
@@ -256,19 +256,19 @@
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
"fork": false,
"created_at": "2024-08-24T18:25:46Z",
- "updated_at": "2024-09-17T10:00:37Z",
+ "updated_at": "2024-09-22T17:22:10Z",
"pushed_at": "2024-08-27T12:22:39Z",
- "stargazers_count": 575,
- "watchers_count": 575,
+ "stargazers_count": 584,
+ "watchers_count": 584,
"has_discussions": false,
- "forks_count": 104,
+ "forks_count": 106,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 104,
- "watchers": 575,
+ "forks": 106,
+ "watchers": 584,
"score": 0,
"subscribers_count": 4
},
@@ -406,10 +406,10 @@
"description": "CVE-2024-38063 is a critical security vulnerability in the Windows TCP\/IP stack that allows for remote code execution (RCE)",
"fork": false,
"created_at": "2024-08-31T13:56:26Z",
- "updated_at": "2024-09-14T14:26:25Z",
+ "updated_at": "2024-09-22T02:29:01Z",
"pushed_at": "2024-09-13T14:30:18Z",
- "stargazers_count": 7,
- "watchers_count": 7,
+ "stargazers_count": 9,
+ "watchers_count": 9,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -418,7 +418,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 7,
+ "watchers": 9,
"score": 0,
"subscribers_count": 1
},
@@ -578,5 +578,65 @@
"watchers": 1,
"score": 0,
"subscribers_count": 2
+ },
+ {
+ "id": 860985934,
+ "name": "CVE-2024-38063-Medium",
+ "full_name": "ArenaldyP\/CVE-2024-38063-Medium",
+ "owner": {
+ "login": "ArenaldyP",
+ "id": 134998695,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/134998695?v=4",
+ "html_url": "https:\/\/github.com\/ArenaldyP"
+ },
+ "html_url": "https:\/\/github.com\/ArenaldyP\/CVE-2024-38063-Medium",
+ "description": "Kode Eksploitasi CVE-2024-38063",
+ "fork": false,
+ "created_at": "2024-09-21T17:33:52Z",
+ "updated_at": "2024-09-22T16:03:48Z",
+ "pushed_at": "2024-09-22T16:03:45Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 861711766,
+ "name": "cve-2024-38063",
+ "full_name": "lnx-dvlpr\/cve-2024-38063",
+ "owner": {
+ "login": "lnx-dvlpr",
+ "id": 169969340,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/169969340?v=4",
+ "html_url": "https:\/\/github.com\/lnx-dvlpr"
+ },
+ "html_url": "https:\/\/github.com\/lnx-dvlpr\/cve-2024-38063",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-09-23T11:45:42Z",
+ "updated_at": "2024-09-23T11:47:02Z",
+ "pushed_at": "2024-09-23T11:46:58Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-38077.json b/2024/CVE-2024-38077.json
index 58b5fc7db2..f84b7f89e6 100644
--- a/2024/CVE-2024-38077.json
+++ b/2024/CVE-2024-38077.json
@@ -13,19 +13,19 @@
"description": null,
"fork": false,
"created_at": "2024-08-09T01:24:59Z",
- "updated_at": "2024-09-08T07:26:13Z",
+ "updated_at": "2024-09-23T07:14:32Z",
"pushed_at": "2024-08-09T01:19:08Z",
- "stargazers_count": 3,
- "watchers_count": 3,
+ "stargazers_count": 5,
+ "watchers_count": 5,
"has_discussions": false,
- "forks_count": 224,
+ "forks_count": 225,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 224,
- "watchers": 3,
+ "forks": 225,
+ "watchers": 5,
"score": 0,
"subscribers_count": 0
},
@@ -43,19 +43,19 @@
"description": "RDL的堆溢出导致的RCE",
"fork": false,
"created_at": "2024-08-09T05:00:44Z",
- "updated_at": "2024-09-13T02:06:05Z",
+ "updated_at": "2024-09-22T16:36:18Z",
"pushed_at": "2024-08-14T04:43:05Z",
- "stargazers_count": 195,
- "watchers_count": 195,
+ "stargazers_count": 196,
+ "watchers_count": 196,
"has_discussions": false,
- "forks_count": 84,
+ "forks_count": 85,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 84,
- "watchers": 195,
+ "forks": 85,
+ "watchers": 196,
"score": 0,
"subscribers_count": 5
},
@@ -198,13 +198,13 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
- "forks_count": 1,
+ "forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 1,
+ "forks": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 1
@@ -283,19 +283,19 @@
"description": "CVE-2024-38077,仅支持扫描测试~",
"fork": false,
"created_at": "2024-08-15T07:14:00Z",
- "updated_at": "2024-08-25T15:45:48Z",
+ "updated_at": "2024-09-22T06:25:35Z",
"pushed_at": "2024-08-15T08:33:08Z",
- "stargazers_count": 3,
- "watchers_count": 3,
+ "stargazers_count": 4,
+ "watchers_count": 4,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
- "watchers": 3,
+ "forks": 1,
+ "watchers": 4,
"score": 0,
"subscribers_count": 1
},
diff --git a/2024/CVE-2024-38080.json b/2024/CVE-2024-38080.json
index f3d8fda855..bccd8f0dca 100644
--- a/2024/CVE-2024-38080.json
+++ b/2024/CVE-2024-38080.json
@@ -13,19 +13,19 @@
"description": "poc code for CVE-2024-38080",
"fork": false,
"created_at": "2024-09-01T11:25:22Z",
- "updated_at": "2024-09-17T15:32:11Z",
+ "updated_at": "2024-09-23T18:53:17Z",
"pushed_at": "2024-09-01T11:35:25Z",
- "stargazers_count": 12,
- "watchers_count": 12,
+ "stargazers_count": 27,
+ "watchers_count": 27,
"has_discussions": false,
- "forks_count": 5,
+ "forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 5,
- "watchers": 12,
+ "forks": 7,
+ "watchers": 27,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-38127.json b/2024/CVE-2024-38127.json
index 05ac24c273..b75b83887d 100644
--- a/2024/CVE-2024-38127.json
+++ b/2024/CVE-2024-38127.json
@@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-09-15T07:38:44Z",
- "updated_at": "2024-09-17T04:33:34Z",
+ "updated_at": "2024-09-17T20:11:52Z",
"pushed_at": "2024-09-15T07:39:43Z",
- "stargazers_count": 3,
- "watchers_count": 3,
+ "stargazers_count": 4,
+ "watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@@ -25,8 +25,8 @@
"topics": [],
"visibility": "public",
"forks": 2,
- "watchers": 3,
+ "watchers": 4,
"score": 0,
- "subscribers_count": 1
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-38473.json b/2024/CVE-2024-38473.json
index 0c77a08cbc..234c5c97ab 100644
--- a/2024/CVE-2024-38473.json
+++ b/2024/CVE-2024-38473.json
@@ -43,10 +43,10 @@
"description": "Nuclei template to detect Apache servers vulnerable to CVE-2024-38473",
"fork": false,
"created_at": "2024-08-23T14:39:31Z",
- "updated_at": "2024-09-13T20:44:36Z",
+ "updated_at": "2024-09-17T22:03:47Z",
"pushed_at": "2024-08-24T22:42:42Z",
- "stargazers_count": 22,
- "watchers_count": 22,
+ "stargazers_count": 23,
+ "watchers_count": 23,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
- "watchers": 22,
+ "watchers": 23,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-38812.json b/2024/CVE-2024-38812.json
new file mode 100644
index 0000000000..646819bc7d
--- /dev/null
+++ b/2024/CVE-2024-38812.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 860055047,
+ "name": "CVE-2024-38812",
+ "full_name": "maybeheisenberg\/CVE-2024-38812",
+ "owner": {
+ "login": "maybeheisenberg",
+ "id": 181843766,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/181843766?v=4",
+ "html_url": "https:\/\/github.com\/maybeheisenberg"
+ },
+ "html_url": "https:\/\/github.com\/maybeheisenberg\/CVE-2024-38812",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-09-19T18:31:04Z",
+ "updated_at": "2024-09-22T15:29:28Z",
+ "pushed_at": "2024-09-19T18:50:03Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-38816.json b/2024/CVE-2024-38816.json
new file mode 100644
index 0000000000..22056dd2f0
--- /dev/null
+++ b/2024/CVE-2024-38816.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 860196818,
+ "name": "cve-2024-38816-demo",
+ "full_name": "weliveby\/cve-2024-38816-demo",
+ "owner": {
+ "login": "weliveby",
+ "id": 112529608,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112529608?v=4",
+ "html_url": "https:\/\/github.com\/weliveby"
+ },
+ "html_url": "https:\/\/github.com\/weliveby\/cve-2024-38816-demo",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-09-20T02:09:23Z",
+ "updated_at": "2024-09-20T02:14:11Z",
+ "pushed_at": "2024-09-20T02:14:08Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-38856.json b/2024/CVE-2024-38856.json
index c0fd907449..d6cfb71932 100644
--- a/2024/CVE-2024-38856.json
+++ b/2024/CVE-2024-38856.json
@@ -51,10 +51,10 @@
"description": "Perform With Massive Apache OFBiz Zero-Day Scanner & RCE",
"fork": false,
"created_at": "2024-08-10T03:05:34Z",
- "updated_at": "2024-08-19T21:20:46Z",
+ "updated_at": "2024-09-19T13:26:12Z",
"pushed_at": "2024-08-10T03:14:42Z",
- "stargazers_count": 2,
- "watchers_count": 2,
+ "stargazers_count": 3,
+ "watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -63,7 +63,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 2,
+ "watchers": 3,
"score": 0,
"subscribers_count": 1
},
diff --git a/2024/CVE-2024-39081.json b/2024/CVE-2024-39081.json
index 31baf8ed9b..452c96867a 100644
--- a/2024/CVE-2024-39081.json
+++ b/2024/CVE-2024-39081.json
@@ -13,8 +13,8 @@
"description": "CVE-2024-39081. BLE TPMS data manipulation over bluetooth communication.",
"fork": false,
"created_at": "2024-04-05T05:13:27Z",
- "updated_at": "2024-09-16T07:06:19Z",
- "pushed_at": "2024-09-16T07:06:16Z",
+ "updated_at": "2024-09-18T11:36:16Z",
+ "pushed_at": "2024-09-18T11:36:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
diff --git a/2024/CVE-2024-39929.json b/2024/CVE-2024-39929.json
index 980a448614..9e1b9bb6af 100644
--- a/2024/CVE-2024-39929.json
+++ b/2024/CVE-2024-39929.json
@@ -13,10 +13,10 @@
"description": "Detection method for Exim vulnerability CVE-2024-39929 ",
"fork": false,
"created_at": "2024-07-12T18:01:30Z",
- "updated_at": "2024-08-28T10:34:23Z",
+ "updated_at": "2024-09-18T15:15:05Z",
"pushed_at": "2024-07-12T18:20:07Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 1,
+ "watchers": 2,
"score": 0,
"subscribers_count": 1
},
@@ -43,10 +43,10 @@
"description": "POC to test CVE-2024-39929 against EXIM mail servers",
"fork": false,
"created_at": "2024-07-29T15:09:53Z",
- "updated_at": "2024-08-29T13:31:15Z",
+ "updated_at": "2024-09-18T12:26:15Z",
"pushed_at": "2024-08-01T16:41:43Z",
- "stargazers_count": 2,
- "watchers_count": 2,
+ "stargazers_count": 3,
+ "watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 2,
+ "watchers": 3,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-4040.json b/2024/CVE-2024-4040.json
index 0285b2f77c..0cae77c15c 100644
--- a/2024/CVE-2024-4040.json
+++ b/2024/CVE-2024-4040.json
@@ -133,10 +133,10 @@
"description": "CVE-2024-4040 CrushFTP SSTI LFI & Auth Bypass | Full Server Takeover | Wordlist Support",
"fork": false,
"created_at": "2024-04-25T19:51:38Z",
- "updated_at": "2024-09-16T11:39:32Z",
+ "updated_at": "2024-09-19T03:19:20Z",
"pushed_at": "2024-07-07T23:47:58Z",
- "stargazers_count": 53,
- "watchers_count": 53,
+ "stargazers_count": 54,
+ "watchers_count": 54,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@@ -160,7 +160,7 @@
],
"visibility": "public",
"forks": 7,
- "watchers": 53,
+ "watchers": 54,
"score": 0,
"subscribers_count": 2
},
@@ -208,10 +208,10 @@
"description": "Exploit CrushFTP CVE-2024-4040",
"fork": false,
"created_at": "2024-04-30T13:27:34Z",
- "updated_at": "2024-05-13T03:54:08Z",
+ "updated_at": "2024-09-18T08:50:19Z",
"pushed_at": "2024-04-30T13:36:33Z",
- "stargazers_count": 2,
- "watchers_count": 2,
+ "stargazers_count": 3,
+ "watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -220,7 +220,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 2,
+ "watchers": 3,
"score": 0,
"subscribers_count": 1
},
@@ -377,5 +377,35 @@
"watchers": 3,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 859098985,
+ "name": "CrushFTP-cve-2024-4040-poc",
+ "full_name": "safeer-accuknox\/CrushFTP-cve-2024-4040-poc",
+ "owner": {
+ "login": "safeer-accuknox",
+ "id": 180378107,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/180378107?v=4",
+ "html_url": "https:\/\/github.com\/safeer-accuknox"
+ },
+ "html_url": "https:\/\/github.com\/safeer-accuknox\/CrushFTP-cve-2024-4040-poc",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-09-18T04:45:54Z",
+ "updated_at": "2024-09-18T05:04:20Z",
+ "pushed_at": "2024-09-18T05:04:17Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-40431.json b/2024/CVE-2024-40431.json
index b64411d979..cf458e917f 100644
--- a/2024/CVE-2024-40431.json
+++ b/2024/CVE-2024-40431.json
@@ -13,19 +13,19 @@
"description": "CVE-2024-40431+CVE-2022-25479 chain for EOP(DATA ONLY ATTACK) ROUGHT SKELLETON ATM. WILL EVENTUALLY TURN IT INTO FULL EOP",
"fork": false,
"created_at": "2024-09-17T06:28:17Z",
- "updated_at": "2024-09-17T15:44:29Z",
+ "updated_at": "2024-09-21T10:18:13Z",
"pushed_at": "2024-09-17T07:05:02Z",
- "stargazers_count": 5,
- "watchers_count": 5,
+ "stargazers_count": 15,
+ "watchers_count": 15,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
- "watchers": 5,
+ "forks": 3,
+ "watchers": 15,
"score": 0,
"subscribers_count": 0
}
diff --git a/2024/CVE-2024-40711.json b/2024/CVE-2024-40711.json
index 9ff3fa8982..a84d7e42ef 100644
--- a/2024/CVE-2024-40711.json
+++ b/2024/CVE-2024-40711.json
@@ -13,19 +13,19 @@
"description": "Pre-Auth Exploit for CVE-2024-40711",
"fork": false,
"created_at": "2024-09-15T17:25:32Z",
- "updated_at": "2024-09-17T12:11:45Z",
+ "updated_at": "2024-09-19T13:06:04Z",
"pushed_at": "2024-09-15T17:28:41Z",
- "stargazers_count": 16,
- "watchers_count": 16,
+ "stargazers_count": 19,
+ "watchers_count": 19,
"has_discussions": false,
- "forks_count": 5,
+ "forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 5,
- "watchers": 16,
+ "forks": 6,
+ "watchers": 19,
"score": 0,
"subscribers_count": 0
}
diff --git a/2024/CVE-2024-41570.json b/2024/CVE-2024-41570.json
index ac61dd9237..64ca78b9c5 100644
--- a/2024/CVE-2024-41570.json
+++ b/2024/CVE-2024-41570.json
@@ -13,7 +13,7 @@
"description": "CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit",
"fork": false,
"created_at": "2024-07-13T19:54:27Z",
- "updated_at": "2024-09-11T20:01:07Z",
+ "updated_at": "2024-09-23T11:00:40Z",
"pushed_at": "2024-09-11T20:00:46Z",
"stargazers_count": 34,
"watchers_count": 34,
diff --git a/2024/CVE-2024-42642.json b/2024/CVE-2024-42642.json
index 042f5a9df5..37bcd2ac37 100644
--- a/2024/CVE-2024-42642.json
+++ b/2024/CVE-2024-42642.json
@@ -13,8 +13,8 @@
"description": null,
"fork": false,
"created_at": "2024-08-30T17:24:58Z",
- "updated_at": "2024-09-15T20:36:41Z",
- "pushed_at": "2024-09-15T20:36:37Z",
+ "updated_at": "2024-09-19T22:32:37Z",
+ "pushed_at": "2024-09-19T22:32:33Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
diff --git a/2024/CVE-2024-42845.json b/2024/CVE-2024-42845.json
index a58caa46fc..a4ea391264 100644
--- a/2024/CVE-2024-42845.json
+++ b/2024/CVE-2024-42845.json
@@ -13,10 +13,10 @@
"description": "InVesalius discovered CVE. CVE-2024-42845",
"fork": false,
"created_at": "2024-08-23T13:43:27Z",
- "updated_at": "2024-08-24T17:42:25Z",
- "pushed_at": "2024-08-24T11:17:39Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "updated_at": "2024-09-23T16:40:58Z",
+ "pushed_at": "2024-09-23T16:40:55Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 1,
- "watchers": 1,
+ "watchers": 2,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-42861.json b/2024/CVE-2024-42861.json
new file mode 100644
index 0000000000..6bca68a478
--- /dev/null
+++ b/2024/CVE-2024-42861.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 860707248,
+ "name": "CVE-2024-42861",
+ "full_name": "qiupy123\/CVE-2024-42861",
+ "owner": {
+ "login": "qiupy123",
+ "id": 71477043,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71477043?v=4",
+ "html_url": "https:\/\/github.com\/qiupy123"
+ },
+ "html_url": "https:\/\/github.com\/qiupy123\/CVE-2024-42861",
+ "description": "the",
+ "fork": false,
+ "created_at": "2024-09-21T01:24:25Z",
+ "updated_at": "2024-09-21T02:21:53Z",
+ "pushed_at": "2024-09-21T02:21:49Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-42992.json b/2024/CVE-2024-42992.json
index ddd11070b7..4dcadd9327 100644
--- a/2024/CVE-2024-42992.json
+++ b/2024/CVE-2024-42992.json
@@ -18,13 +18,13 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
- "forks_count": 1,
+ "forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 1,
+ "forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 0
diff --git a/2024/CVE-2024-43044.json b/2024/CVE-2024-43044.json
index c611c91edb..0b6d35abe5 100644
--- a/2024/CVE-2024-43044.json
+++ b/2024/CVE-2024-43044.json
@@ -47,7 +47,7 @@
"description": "This repository provides a workaround preventing exploitation of SECURITY-3430 \/ CVE-2024-43044",
"fork": false,
"created_at": "2024-08-08T11:55:32Z",
- "updated_at": "2024-09-11T17:11:37Z",
+ "updated_at": "2024-09-23T00:29:13Z",
"pushed_at": "2024-08-12T17:19:25Z",
"stargazers_count": 2,
"watchers_count": 2,
@@ -107,10 +107,10 @@
"description": "Exploit for the vulnerability CVE-2024-43044 in Jenkins",
"fork": false,
"created_at": "2024-08-23T20:26:26Z",
- "updated_at": "2024-09-17T08:36:40Z",
+ "updated_at": "2024-09-23T10:27:22Z",
"pushed_at": "2024-08-29T17:05:04Z",
- "stargazers_count": 148,
- "watchers_count": 148,
+ "stargazers_count": 149,
+ "watchers_count": 149,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
- "watchers": 148,
+ "watchers": 149,
"score": 0,
"subscribers_count": 3
}
diff --git a/2024/CVE-2024-43160.json b/2024/CVE-2024-43160.json
index 06a3b755d8..a1dbfef75d 100644
--- a/2024/CVE-2024-43160.json
+++ b/2024/CVE-2024-43160.json
@@ -13,10 +13,40 @@
"description": "The BerqWP – Automated All-In-One PageSpeed Optimization Plugin for Core Web Vitals, Cache, CDN, Images, CSS, and JavaScript plugin for WordPress is vulnerable to arbitrary file uploads",
"fork": false,
"created_at": "2024-09-17T04:19:54Z",
- "updated_at": "2024-09-17T10:42:43Z",
+ "updated_at": "2024-09-20T15:04:39Z",
"pushed_at": "2024-09-17T04:30:16Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 1,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 1,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 0
+ },
+ {
+ "id": 859370878,
+ "name": "PoC-for-CVE-2024-43160",
+ "full_name": "maybeheisenberg\/PoC-for-CVE-2024-43160",
+ "owner": {
+ "login": "maybeheisenberg",
+ "id": 181843766,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/181843766?v=4",
+ "html_url": "https:\/\/github.com\/maybeheisenberg"
+ },
+ "html_url": "https:\/\/github.com\/maybeheisenberg\/PoC-for-CVE-2024-43160",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-09-18T14:48:38Z",
+ "updated_at": "2024-09-18T14:48:41Z",
+ "pushed_at": "2024-09-18T14:48:38Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -25,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 1,
+ "watchers": 0,
"score": 0,
"subscribers_count": 0
}
diff --git a/2024/CVE-2024-4323.json b/2024/CVE-2024-4323.json
index 92ba807ecd..03329abcdd 100644
--- a/2024/CVE-2024-4323.json
+++ b/2024/CVE-2024-4323.json
@@ -50,10 +50,10 @@
"description": "Critical heap buffer overflow vulnerability in the handle_trace_request and parse_trace_request functions of the Fluent Bit HTTP server.",
"fork": false,
"created_at": "2024-05-21T12:59:16Z",
- "updated_at": "2024-05-21T13:15:40Z",
+ "updated_at": "2024-09-18T15:30:15Z",
"pushed_at": "2024-05-21T13:15:37Z",
- "stargazers_count": 0,
- "watchers_count": 0,
+ "stargazers_count": 1,
+ "watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -62,7 +62,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 0,
+ "watchers": 1,
"score": 0,
"subscribers_count": 1
},
diff --git a/2024/CVE-2024-43425.json b/2024/CVE-2024-43425.json
index b7ac6ccce6..9b7cf3a43f 100644
--- a/2024/CVE-2024-43425.json
+++ b/2024/CVE-2024-43425.json
@@ -13,19 +13,19 @@
"description": "Scripts for Analysis of a RCE in Moodle Calculated Questions (CVE-2024-43425)",
"fork": false,
"created_at": "2024-08-23T09:13:03Z",
- "updated_at": "2024-09-14T02:12:00Z",
+ "updated_at": "2024-09-20T16:07:08Z",
"pushed_at": "2024-08-23T09:36:55Z",
- "stargazers_count": 9,
- "watchers_count": 9,
+ "stargazers_count": 11,
+ "watchers_count": 11,
"has_discussions": false,
- "forks_count": 2,
+ "forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 2,
- "watchers": 9,
+ "forks": 3,
+ "watchers": 11,
"score": 0,
"subscribers_count": 0
}
diff --git a/2024/CVE-2024-4358.json b/2024/CVE-2024-4358.json
index 84877d91bc..849bf831bb 100644
--- a/2024/CVE-2024-4358.json
+++ b/2024/CVE-2024-4358.json
@@ -13,10 +13,10 @@
"description": "Progress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358\/CVE-2024-1800)",
"fork": false,
"created_at": "2024-06-03T08:22:10Z",
- "updated_at": "2024-08-28T18:03:34Z",
+ "updated_at": "2024-09-21T16:39:42Z",
"pushed_at": "2024-06-06T16:18:08Z",
- "stargazers_count": 71,
- "watchers_count": 71,
+ "stargazers_count": 72,
+ "watchers_count": 72,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
- "watchers": 71,
+ "watchers": 72,
"score": 0,
"subscribers_count": 1
},
@@ -133,19 +133,24 @@
"description": "Authentication Bypass Vulnerability — CVE-2024–4358 — Telerik Report Server 2024",
"fork": false,
"created_at": "2024-06-09T06:30:06Z",
- "updated_at": "2024-06-14T14:41:10Z",
- "pushed_at": "2024-06-09T06:51:42Z",
- "stargazers_count": 2,
- "watchers_count": 2,
+ "updated_at": "2024-09-20T09:24:34Z",
+ "pushed_at": "2024-09-19T09:24:57Z",
+ "stargazers_count": 4,
+ "watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
- "topics": [],
+ "topics": [
+ "authentication-bypass",
+ "cve-2024-4358",
+ "poc-cve-2024-4358",
+ "telerik-report-server"
+ ],
"visibility": "public",
"forks": 1,
- "watchers": 2,
+ "watchers": 4,
"score": 0,
"subscribers_count": 1
},
@@ -163,10 +168,10 @@
"description": "Telerik Report Server deserialization and authentication bypass exploit chain for CVE-2024-4358\/CVE-2024-1800",
"fork": false,
"created_at": "2024-08-24T10:09:09Z",
- "updated_at": "2024-09-07T03:29:12Z",
+ "updated_at": "2024-09-18T16:24:18Z",
"pushed_at": "2024-08-24T10:48:43Z",
- "stargazers_count": 2,
- "watchers_count": 2,
+ "stargazers_count": 3,
+ "watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -175,7 +180,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 2,
+ "watchers": 3,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-4367.json b/2024/CVE-2024-4367.json
index 0028e65009..b1b153fdd8 100644
--- a/2024/CVE-2024-4367.json
+++ b/2024/CVE-2024-4367.json
@@ -13,10 +13,10 @@
"description": "CVE-2024-4367 & CVE-2024-34342 Proof of Concept",
"fork": false,
"created_at": "2024-05-20T10:02:23Z",
- "updated_at": "2024-09-09T17:44:38Z",
+ "updated_at": "2024-09-23T08:00:22Z",
"pushed_at": "2024-06-07T03:28:00Z",
- "stargazers_count": 112,
- "watchers_count": 112,
+ "stargazers_count": 113,
+ "watchers_count": 113,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
- "watchers": 112,
+ "watchers": 113,
"score": 0,
"subscribers_count": 2
},
@@ -43,7 +43,7 @@
"description": "CVE-2024-4367 arbitrary js execution in pdf js",
"fork": false,
"created_at": "2024-05-20T22:56:10Z",
- "updated_at": "2024-08-29T00:04:38Z",
+ "updated_at": "2024-09-18T08:04:53Z",
"pushed_at": "2024-05-20T23:09:43Z",
"stargazers_count": 45,
"watchers_count": 45,
diff --git a/2024/CVE-2024-43918.json b/2024/CVE-2024-43918.json
new file mode 100644
index 0000000000..676960f0aa
--- /dev/null
+++ b/2024/CVE-2024-43918.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 862146506,
+ "name": "CVE-2024-43918",
+ "full_name": "KTN1990\/CVE-2024-43918",
+ "owner": {
+ "login": "KTN1990",
+ "id": 33407405,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33407405?v=4",
+ "html_url": "https:\/\/github.com\/KTN1990"
+ },
+ "html_url": "https:\/\/github.com\/KTN1990\/CVE-2024-43918",
+ "description": "WBW Product Table Pro <= 1.9.4 - Unauthenticated Arbitrary SQL Execution to RCE",
+ "fork": false,
+ "created_at": "2024-09-24T05:50:03Z",
+ "updated_at": "2024-09-24T05:52:07Z",
+ "pushed_at": "2024-09-24T05:52:04Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-44000.json b/2024/CVE-2024-44000.json
index 9cddced23c..81655cfe05 100644
--- a/2024/CVE-2024-44000.json
+++ b/2024/CVE-2024-44000.json
@@ -13,19 +13,19 @@
"description": "CVE-2024-44000 is a vulnerability in the LiteSpeed Cache plugin, a popular WordPress plugin. This vulnerability affects session management in LiteSpeed Cache, allowing attackers to gain unauthorized access to sensitive data.",
"fork": false,
"created_at": "2024-09-06T03:38:13Z",
- "updated_at": "2024-09-12T18:08:53Z",
+ "updated_at": "2024-09-18T09:43:36Z",
"pushed_at": "2024-09-06T03:54:52Z",
- "stargazers_count": 7,
- "watchers_count": 7,
+ "stargazers_count": 8,
+ "watchers_count": 8,
"has_discussions": false,
- "forks_count": 6,
+ "forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 6,
- "watchers": 7,
+ "forks": 7,
+ "watchers": 8,
"score": 0,
"subscribers_count": 1
},
@@ -87,6 +87,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 1
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-44083.json b/2024/CVE-2024-44083.json
index 832f891b93..4a7a928035 100644
--- a/2024/CVE-2024-44083.json
+++ b/2024/CVE-2024-44083.json
@@ -13,10 +13,10 @@
"description": "Makes IDA (most versions) to crash upon opening it. ",
"fork": false,
"created_at": "2024-08-25T12:33:14Z",
- "updated_at": "2024-09-16T11:27:10Z",
+ "updated_at": "2024-09-24T02:40:43Z",
"pushed_at": "2024-08-30T09:58:12Z",
- "stargazers_count": 52,
- "watchers_count": 52,
+ "stargazers_count": 54,
+ "watchers_count": 54,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
- "watchers": 52,
+ "watchers": 54,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-44346.json b/2024/CVE-2024-44346.json
index 8b0af77687..dcc6299be0 100644
--- a/2024/CVE-2024-44346.json
+++ b/2024/CVE-2024-44346.json
@@ -27,7 +27,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 1
+ "subscribers_count": 0
},
{
"id": 858902234,
diff --git a/2024/CVE-2024-4439.json b/2024/CVE-2024-4439.json
index 25d3c33ac2..76abc9dcc4 100644
--- a/2024/CVE-2024-4439.json
+++ b/2024/CVE-2024-4439.json
@@ -13,10 +13,10 @@
"description": "CVE-2024-4439 PoC",
"fork": false,
"created_at": "2024-05-06T08:50:23Z",
- "updated_at": "2024-06-05T19:23:22Z",
+ "updated_at": "2024-09-19T11:29:31Z",
"pushed_at": "2024-05-06T08:50:48Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 1,
+ "watchers": 2,
"score": 0,
"subscribers_count": 1
},
diff --git a/2024/CVE-2024-44542.json b/2024/CVE-2024-44542.json
index 7240e0dc80..7304acb74e 100644
--- a/2024/CVE-2024-44542.json
+++ b/2024/CVE-2024-44542.json
@@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 1
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-44623.json b/2024/CVE-2024-44623.json
index 0f454c8149..d2c14b93e5 100644
--- a/2024/CVE-2024-44623.json
+++ b/2024/CVE-2024-44623.json
@@ -29,6 +29,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 1
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-44867.json b/2024/CVE-2024-44867.json
index ebd81cf7f5..3524cfe67b 100644
--- a/2024/CVE-2024-44867.json
+++ b/2024/CVE-2024-44867.json
@@ -13,7 +13,7 @@
"description": null,
"fork": false,
"created_at": "2024-09-10T01:49:36Z",
- "updated_at": "2024-09-14T06:26:25Z",
+ "updated_at": "2024-09-20T07:08:40Z",
"pushed_at": "2024-09-10T03:51:04Z",
"stargazers_count": 2,
"watchers_count": 2,
diff --git a/2024/CVE-2024-45241.json b/2024/CVE-2024-45241.json
index dd893015af..f2fd401297 100644
--- a/2024/CVE-2024-45241.json
+++ b/2024/CVE-2024-45241.json
@@ -13,10 +13,10 @@
"description": "Path Traversal in CentralSquare's CryWolf",
"fork": false,
"created_at": "2024-08-25T15:57:40Z",
- "updated_at": "2024-08-27T19:26:45Z",
+ "updated_at": "2024-09-18T22:48:09Z",
"pushed_at": "2024-08-25T16:09:34Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 0,
+ "watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -25,8 +25,45 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 1,
+ "watchers": 0,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 859878308,
+ "name": "CVE-2024-45241",
+ "full_name": "verylazytech\/CVE-2024-45241",
+ "owner": {
+ "login": "verylazytech",
+ "id": 172168670,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172168670?v=4",
+ "html_url": "https:\/\/github.com\/verylazytech"
+ },
+ "html_url": "https:\/\/github.com\/verylazytech\/CVE-2024-45241",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-09-19T12:43:48Z",
+ "updated_at": "2024-09-19T14:38:08Z",
+ "pushed_at": "2024-09-19T14:38:05Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [
+ "centeralsquare",
+ "crywolf",
+ "cve-2024-45241",
+ "exploit",
+ "path-traversal",
+ "poc"
+ ],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-45383.json b/2024/CVE-2024-45383.json
new file mode 100644
index 0000000000..7afbad6ab9
--- /dev/null
+++ b/2024/CVE-2024-45383.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 859399058,
+ "name": "CVE-2024-45383",
+ "full_name": "SpiralBL0CK\/CVE-2024-45383",
+ "owner": {
+ "login": "SpiralBL0CK",
+ "id": 25670930,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25670930?v=4",
+ "html_url": "https:\/\/github.com\/SpiralBL0CK"
+ },
+ "html_url": "https:\/\/github.com\/SpiralBL0CK\/CVE-2024-45383",
+ "description": "Theoretically poc for CVE-2024-45383, needs testing and validation. still not done yet.... ",
+ "fork": false,
+ "created_at": "2024-09-18T15:40:19Z",
+ "updated_at": "2024-09-18T15:40:41Z",
+ "pushed_at": "2024-09-18T15:40:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-4577.json b/2024/CVE-2024-4577.json
index d00c9c9ce9..1df15ac25f 100644
--- a/2024/CVE-2024-4577.json
+++ b/2024/CVE-2024-4577.json
@@ -163,10 +163,10 @@
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
"fork": false,
"created_at": "2024-06-07T09:52:54Z",
- "updated_at": "2024-09-16T10:17:16Z",
+ "updated_at": "2024-09-23T02:09:40Z",
"pushed_at": "2024-06-22T15:13:52Z",
- "stargazers_count": 205,
- "watchers_count": 205,
+ "stargazers_count": 208,
+ "watchers_count": 208,
"has_discussions": false,
"forks_count": 48,
"allow_forking": true,
@@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 48,
- "watchers": 205,
+ "watchers": 208,
"score": 0,
"subscribers_count": 4
},
@@ -348,13 +348,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
- "forks_count": 4,
+ "forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 4,
+ "forks": 3,
"watchers": 0,
"score": 0,
"subscribers_count": 1
@@ -493,10 +493,10 @@
"description": "PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template",
"fork": false,
"created_at": "2024-06-08T12:23:35Z",
- "updated_at": "2024-09-05T09:06:31Z",
+ "updated_at": "2024-09-18T13:09:22Z",
"pushed_at": "2024-06-19T16:19:57Z",
- "stargazers_count": 17,
- "watchers_count": 17,
+ "stargazers_count": 18,
+ "watchers_count": 18,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@@ -512,7 +512,7 @@
],
"visibility": "public",
"forks": 7,
- "watchers": 17,
+ "watchers": 18,
"score": 0,
"subscribers_count": 1
},
@@ -530,10 +530,10 @@
"description": "[漏洞复现] 全球首款利用PHP默认环境(XAMPP)的CVE-2024-4577 PHP-CGI RCE 漏洞 EXP。",
"fork": false,
"created_at": "2024-06-08T13:04:45Z",
- "updated_at": "2024-09-17T05:32:37Z",
+ "updated_at": "2024-09-20T15:24:01Z",
"pushed_at": "2024-07-21T20:27:03Z",
- "stargazers_count": 112,
- "watchers_count": 112,
+ "stargazers_count": 116,
+ "watchers_count": 116,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@@ -542,7 +542,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
- "watchers": 112,
+ "watchers": 116,
"score": 0,
"subscribers_count": 1
},
@@ -1451,10 +1451,10 @@
"description": "PHP CGI Argument Injection (CVE-2024-4577) RCE",
"fork": false,
"created_at": "2024-08-20T02:56:03Z",
- "updated_at": "2024-09-12T02:37:26Z",
+ "updated_at": "2024-09-23T12:29:13Z",
"pushed_at": "2024-08-20T03:28:28Z",
- "stargazers_count": 10,
- "watchers_count": 10,
+ "stargazers_count": 12,
+ "watchers_count": 12,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@@ -1463,7 +1463,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
- "watchers": 10,
+ "watchers": 12,
"score": 0,
"subscribers_count": 1
},
@@ -1527,7 +1527,7 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 1
+ "subscribers_count": 0
},
{
"id": 856557928,
@@ -1557,6 +1557,6 @@
"forks": 1,
"watchers": 2,
"score": 0,
- "subscribers_count": 1
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-46377.json b/2024/CVE-2024-46377.json
new file mode 100644
index 0000000000..78999666fa
--- /dev/null
+++ b/2024/CVE-2024-46377.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 861516451,
+ "name": "CVE-2024-46377",
+ "full_name": "vidura2\/CVE-2024-46377",
+ "owner": {
+ "login": "vidura2",
+ "id": 71623511,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71623511?v=4",
+ "html_url": "https:\/\/github.com\/vidura2"
+ },
+ "html_url": "https:\/\/github.com\/vidura2\/CVE-2024-46377",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-09-23T03:47:36Z",
+ "updated_at": "2024-09-23T03:51:08Z",
+ "pushed_at": "2024-09-23T03:51:05Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-46451.json b/2024/CVE-2024-46451.json
new file mode 100644
index 0000000000..cbb37220d3
--- /dev/null
+++ b/2024/CVE-2024-46451.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 861304942,
+ "name": "CVE-2024-46451",
+ "full_name": "vidura2\/CVE-2024-46451",
+ "owner": {
+ "login": "vidura2",
+ "id": 71623511,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71623511?v=4",
+ "html_url": "https:\/\/github.com\/vidura2"
+ },
+ "html_url": "https:\/\/github.com\/vidura2\/CVE-2024-46451",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-09-22T14:47:57Z",
+ "updated_at": "2024-09-23T03:46:40Z",
+ "pushed_at": "2024-09-23T03:46:37Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-46986.json b/2024/CVE-2024-46986.json
new file mode 100644
index 0000000000..9147a7a812
--- /dev/null
+++ b/2024/CVE-2024-46986.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 861297912,
+ "name": "CVE-2024-46986",
+ "full_name": "vidura2\/CVE-2024-46986",
+ "owner": {
+ "login": "vidura2",
+ "id": 71623511,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71623511?v=4",
+ "html_url": "https:\/\/github.com\/vidura2"
+ },
+ "html_url": "https:\/\/github.com\/vidura2\/CVE-2024-46986",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-09-22T14:27:35Z",
+ "updated_at": "2024-09-22T14:34:15Z",
+ "pushed_at": "2024-09-22T14:34:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-4879.json b/2024/CVE-2024-4879.json
index 0cbfa181b8..8c1f51f6ea 100644
--- a/2024/CVE-2024-4879.json
+++ b/2024/CVE-2024-4879.json
@@ -78,13 +78,13 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
- "forks_count": 1,
+ "forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 1,
+ "forks": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 1
@@ -297,6 +297,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 1
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-4883.json b/2024/CVE-2024-4883.json
index 6bcbe00775..9e1e590e96 100644
--- a/2024/CVE-2024-4883.json
+++ b/2024/CVE-2024-4883.json
@@ -13,10 +13,10 @@
"description": "Exploit for CVE-2024-4883",
"fork": false,
"created_at": "2024-07-08T12:14:01Z",
- "updated_at": "2024-08-30T19:04:29Z",
+ "updated_at": "2024-09-18T22:48:03Z",
"pushed_at": "2024-07-08T12:14:18Z",
- "stargazers_count": 10,
- "watchers_count": 10,
+ "stargazers_count": 9,
+ "watchers_count": 9,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 10,
+ "watchers": 9,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-4956.json b/2024/CVE-2024-4956.json
index c4d8616365..976442b87a 100644
--- a/2024/CVE-2024-4956.json
+++ b/2024/CVE-2024-4956.json
@@ -119,6 +119,36 @@
"score": 0,
"subscribers_count": 0
},
+ {
+ "id": 806026716,
+ "name": "CVE-2024-4956-Bulk-Scanner",
+ "full_name": "ifconfig-me\/CVE-2024-4956-Bulk-Scanner",
+ "owner": {
+ "login": "ifconfig-me",
+ "id": 25315805,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25315805?v=4",
+ "html_url": "https:\/\/github.com\/ifconfig-me"
+ },
+ "html_url": "https:\/\/github.com\/ifconfig-me\/CVE-2024-4956-Bulk-Scanner",
+ "description": "[CVE-2024-4956] Nexus Repository Manager 3 Unauthenticated Path Traversal Bulk Scanner",
+ "fork": false,
+ "created_at": "2024-05-26T06:50:48Z",
+ "updated_at": "2024-09-21T09:10:12Z",
+ "pushed_at": "2024-09-21T09:10:09Z",
+ "stargazers_count": 12,
+ "watchers_count": 12,
+ "has_discussions": false,
+ "forks_count": 4,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 4,
+ "watchers": 12,
+ "score": 0,
+ "subscribers_count": 1
+ },
{
"id": 806352821,
"name": "CVE-2024-4956-PoC",
@@ -367,19 +397,23 @@
"description": "POC - CVE-2024–4956 - Nexus Repository Manager 3 Unauthenticated Path Traversal",
"fork": false,
"created_at": "2024-06-09T10:57:29Z",
- "updated_at": "2024-07-21T07:27:12Z",
- "pushed_at": "2024-06-09T12:53:09Z",
- "stargazers_count": 4,
- "watchers_count": 4,
+ "updated_at": "2024-09-19T14:34:00Z",
+ "pushed_at": "2024-09-19T09:24:18Z",
+ "stargazers_count": 5,
+ "watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
- "topics": [],
+ "topics": [
+ "cve-2024-4956-poc",
+ "nexus-repository-manager",
+ "unauthenticated-path-traversal"
+ ],
"visibility": "public",
"forks": 1,
- "watchers": 4,
+ "watchers": 5,
"score": 0,
"subscribers_count": 1
},
diff --git a/2024/CVE-2024-5084.json b/2024/CVE-2024-5084.json
index caabf1ece9..d7d66c6641 100644
--- a/2024/CVE-2024-5084.json
+++ b/2024/CVE-2024-5084.json
@@ -52,18 +52,18 @@
"description": "Hash Form – Drag & Drop Form Builder <= 1.1.0 - Unauthenticated Arbitrary File Upload to Remote Code Execution",
"fork": false,
"created_at": "2024-05-27T20:04:10Z",
- "updated_at": "2024-08-03T01:33:38Z",
+ "updated_at": "2024-09-18T22:48:01Z",
"pushed_at": "2024-07-17T23:40:18Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
- "forks_count": 3,
+ "forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 3,
+ "forks": 5,
"watchers": 6,
"score": 0,
"subscribers_count": 2
@@ -87,13 +87,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
diff --git a/2024/CVE-2024-5274.json b/2024/CVE-2024-5274.json
index 450f8bdccc..1a650f070d 100644
--- a/2024/CVE-2024-5274.json
+++ b/2024/CVE-2024-5274.json
@@ -43,10 +43,10 @@
"description": null,
"fork": false,
"created_at": "2024-08-29T11:58:25Z",
- "updated_at": "2024-09-11T11:04:35Z",
+ "updated_at": "2024-09-23T09:42:10Z",
"pushed_at": "2024-08-30T01:15:43Z",
- "stargazers_count": 68,
- "watchers_count": 68,
+ "stargazers_count": 70,
+ "watchers_count": 70,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
- "watchers": 68,
+ "watchers": 70,
"score": 0,
"subscribers_count": 2
}
diff --git a/2024/CVE-2024-5356.json b/2024/CVE-2024-5356.json
index 322e187fcb..55e53d5cac 100644
--- a/2024/CVE-2024-5356.json
+++ b/2024/CVE-2024-5356.json
@@ -13,7 +13,7 @@
"description": null,
"fork": false,
"created_at": "2024-09-12T03:02:20Z",
- "updated_at": "2024-09-12T03:21:11Z",
+ "updated_at": "2024-09-20T02:47:37Z",
"pushed_at": "2024-09-12T03:20:31Z",
"stargazers_count": 1,
"watchers_count": 1,
@@ -27,6 +27,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
- "subscribers_count": 1
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-5420.json b/2024/CVE-2024-5420.json
index 2dd06f282c..df2f3dfebb 100644
--- a/2024/CVE-2024-5420.json
+++ b/2024/CVE-2024-5420.json
@@ -13,10 +13,10 @@
"description": "SEH utnserver Pro\/ProMAX \/ INU-100 20.1.22 - XSS ",
"fork": false,
"created_at": "2024-09-02T15:29:22Z",
- "updated_at": "2024-09-07T03:28:59Z",
+ "updated_at": "2024-09-23T12:29:44Z",
"pushed_at": "2024-09-02T15:38:38Z",
- "stargazers_count": 2,
- "watchers_count": 2,
+ "stargazers_count": 3,
+ "watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 2,
+ "watchers": 3,
"score": 0,
"subscribers_count": 1
},
diff --git a/2024/CVE-2024-5458.json b/2024/CVE-2024-5458.json
deleted file mode 100644
index 741d7c0fbf..0000000000
--- a/2024/CVE-2024-5458.json
+++ /dev/null
@@ -1,32 +0,0 @@
-[
- {
- "id": 858468878,
- "name": "CVE-2024-5458-POC",
- "full_name": "justmexD8\/CVE-2024-5458-POC",
- "owner": {
- "login": "justmexD8",
- "id": 178618875,
- "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/178618875?v=4",
- "html_url": "https:\/\/github.com\/justmexD8"
- },
- "html_url": "https:\/\/github.com\/justmexD8\/CVE-2024-5458-POC",
- "description": "POC : Filter bypass in filter_var (FILTER_VALIDATE_URL)",
- "fork": false,
- "created_at": "2024-09-17T00:22:23Z",
- "updated_at": "2024-09-17T02:03:46Z",
- "pushed_at": "2024-09-17T01:58:59Z",
- "stargazers_count": 0,
- "watchers_count": 0,
- "has_discussions": false,
- "forks_count": 0,
- "allow_forking": true,
- "is_template": false,
- "web_commit_signoff_required": false,
- "topics": [],
- "visibility": "public",
- "forks": 0,
- "watchers": 0,
- "score": 0,
- "subscribers_count": 1
- }
-]
\ No newline at end of file
diff --git a/2024/CVE-2024-5806.json b/2024/CVE-2024-5806.json
index 3429a72cf8..f75d67f386 100644
--- a/2024/CVE-2024-5806.json
+++ b/2024/CVE-2024-5806.json
@@ -13,10 +13,10 @@
"description": "Exploit for the CVE-2024-5806",
"fork": false,
"created_at": "2024-06-24T16:28:35Z",
- "updated_at": "2024-08-20T15:57:22Z",
+ "updated_at": "2024-09-18T22:48:03Z",
"pushed_at": "2024-06-24T16:52:12Z",
- "stargazers_count": 40,
- "watchers_count": 40,
+ "stargazers_count": 39,
+ "watchers_count": 39,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
- "watchers": 40,
+ "watchers": 39,
"score": 0,
"subscribers_count": 0
}
diff --git a/2024/CVE-2024-5932.json b/2024/CVE-2024-5932.json
index 6c63944f12..ba706b6c62 100644
--- a/2024/CVE-2024-5932.json
+++ b/2024/CVE-2024-5932.json
@@ -43,10 +43,10 @@
"description": "Proof-of-Concept for CVE-2024-5932",
"fork": false,
"created_at": "2024-08-25T11:51:36Z",
- "updated_at": "2024-09-17T16:55:23Z",
+ "updated_at": "2024-09-21T19:03:09Z",
"pushed_at": "2024-08-29T02:13:12Z",
- "stargazers_count": 49,
- "watchers_count": 49,
+ "stargazers_count": 50,
+ "watchers_count": 50,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@@ -66,7 +66,7 @@
],
"visibility": "public",
"forks": 10,
- "watchers": 49,
+ "watchers": 50,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json
index f4b4092c41..82acbc8cfd 100644
--- a/2024/CVE-2024-6387.json
+++ b/2024/CVE-2024-6387.json
@@ -13,19 +13,19 @@
"description": "a signal handler race condition in OpenSSH's server (sshd)",
"fork": false,
"created_at": "2024-07-01T10:55:29Z",
- "updated_at": "2024-09-16T15:29:58Z",
+ "updated_at": "2024-09-20T18:03:03Z",
"pushed_at": "2024-07-01T10:54:02Z",
- "stargazers_count": 459,
- "watchers_count": 459,
+ "stargazers_count": 457,
+ "watchers_count": 457,
"has_discussions": false,
- "forks_count": 179,
+ "forks_count": 181,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 179,
- "watchers": 459,
+ "forks": 181,
+ "watchers": 457,
"score": 0,
"subscribers_count": 5
},
@@ -43,10 +43,10 @@
"description": "32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo\/cve-2024-6387-poc",
"fork": false,
"created_at": "2024-07-01T12:16:21Z",
- "updated_at": "2024-09-13T15:33:56Z",
+ "updated_at": "2024-09-24T02:23:30Z",
"pushed_at": "2024-07-01T12:25:01Z",
- "stargazers_count": 382,
- "watchers_count": 382,
+ "stargazers_count": 381,
+ "watchers_count": 381,
"has_discussions": false,
"forks_count": 90,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 90,
- "watchers": 382,
+ "watchers": 381,
"score": 0,
"subscribers_count": 8
},
@@ -73,10 +73,10 @@
"description": "MIRROR of the original 32-bit PoC for CVE-2024-6387 \"regreSSHion\" by 7etsuo\/cve-2024-6387-poc",
"fork": false,
"created_at": "2024-07-01T12:26:40Z",
- "updated_at": "2024-09-11T15:17:12Z",
+ "updated_at": "2024-09-20T11:58:49Z",
"pushed_at": "2024-07-25T04:23:11Z",
- "stargazers_count": 106,
- "watchers_count": 106,
+ "stargazers_count": 107,
+ "watchers_count": 107,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@@ -92,7 +92,7 @@
],
"visibility": "public",
"forks": 39,
- "watchers": 106,
+ "watchers": 107,
"score": 0,
"subscribers_count": 4
},
@@ -260,10 +260,10 @@
"description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH",
"fork": false,
"created_at": "2024-07-01T20:33:20Z",
- "updated_at": "2024-09-09T18:03:54Z",
+ "updated_at": "2024-09-23T03:02:35Z",
"pushed_at": "2024-07-14T09:58:48Z",
- "stargazers_count": 436,
- "watchers_count": 436,
+ "stargazers_count": 440,
+ "watchers_count": 440,
"has_discussions": false,
"forks_count": 85,
"allow_forking": true,
@@ -278,7 +278,7 @@
],
"visibility": "public",
"forks": 85,
- "watchers": 436,
+ "watchers": 440,
"score": 0,
"subscribers_count": 5
},
@@ -632,10 +632,10 @@
"description": "CVE-2024-6387 exploit",
"fork": false,
"created_at": "2024-07-02T04:09:44Z",
- "updated_at": "2024-09-16T00:46:25Z",
+ "updated_at": "2024-09-24T00:12:11Z",
"pushed_at": "2024-07-02T04:45:15Z",
- "stargazers_count": 12,
- "watchers_count": 12,
+ "stargazers_count": 13,
+ "watchers_count": 13,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@@ -644,7 +644,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
- "watchers": 12,
+ "watchers": 13,
"score": 0,
"subscribers_count": 1
},
@@ -692,19 +692,19 @@
"description": "This Python script exploits a remote code execution vulnerability (CVE-2024-6387) in OpenSSH.",
"fork": false,
"created_at": "2024-07-02T06:53:35Z",
- "updated_at": "2024-09-03T10:02:47Z",
+ "updated_at": "2024-09-22T09:01:11Z",
"pushed_at": "2024-07-04T20:04:30Z",
- "stargazers_count": 18,
- "watchers_count": 18,
+ "stargazers_count": 21,
+ "watchers_count": 21,
"has_discussions": false,
- "forks_count": 5,
+ "forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 5,
- "watchers": 18,
+ "forks": 8,
+ "watchers": 21,
"score": 0,
"subscribers_count": 1
},
@@ -1183,10 +1183,10 @@
"description": "CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.",
"fork": false,
"created_at": "2024-07-02T14:41:43Z",
- "updated_at": "2024-09-12T05:23:25Z",
+ "updated_at": "2024-09-19T07:50:40Z",
"pushed_at": "2024-07-02T15:16:04Z",
- "stargazers_count": 20,
- "watchers_count": 20,
+ "stargazers_count": 22,
+ "watchers_count": 22,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@@ -1205,7 +1205,7 @@
],
"visibility": "public",
"forks": 5,
- "watchers": 20,
+ "watchers": 22,
"score": 0,
"subscribers_count": 2
},
@@ -1373,10 +1373,10 @@
"description": "PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (Scanner and Exploit) ",
"fork": false,
"created_at": "2024-07-02T18:32:46Z",
- "updated_at": "2024-09-16T08:09:03Z",
+ "updated_at": "2024-09-18T13:25:45Z",
"pushed_at": "2024-07-05T15:19:28Z",
- "stargazers_count": 58,
- "watchers_count": 58,
+ "stargazers_count": 59,
+ "watchers_count": 59,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@@ -1394,7 +1394,7 @@
],
"visibility": "public",
"forks": 21,
- "watchers": 58,
+ "watchers": 59,
"score": 0,
"subscribers_count": 1
},
@@ -1600,10 +1600,10 @@
"description": "Targeting a signal handler race condition in OpenSSH's server (sshd) on glibc-based Linux systems.",
"fork": false,
"created_at": "2024-07-03T06:08:32Z",
- "updated_at": "2024-09-03T07:52:18Z",
+ "updated_at": "2024-09-23T16:37:15Z",
"pushed_at": "2024-07-03T06:47:46Z",
- "stargazers_count": 4,
- "watchers_count": 4,
+ "stargazers_count": 5,
+ "watchers_count": 5,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@@ -1614,7 +1614,7 @@
],
"visibility": "public",
"forks": 3,
- "watchers": 4,
+ "watchers": 5,
"score": 0,
"subscribers_count": 1
},
@@ -2203,19 +2203,19 @@
"description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)",
"fork": false,
"created_at": "2024-07-08T11:27:49Z",
- "updated_at": "2024-09-14T06:42:11Z",
+ "updated_at": "2024-09-23T11:44:04Z",
"pushed_at": "2024-08-22T08:50:25Z",
- "stargazers_count": 22,
- "watchers_count": 22,
+ "stargazers_count": 25,
+ "watchers_count": 25,
"has_discussions": false,
- "forks_count": 10,
+ "forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 10,
- "watchers": 22,
+ "forks": 11,
+ "watchers": 25,
"score": 0,
"subscribers_count": 2
},
@@ -2623,19 +2623,19 @@
"description": "Proof of concept python script for regreSSHion exploit. ",
"fork": false,
"created_at": "2024-07-30T06:13:11Z",
- "updated_at": "2024-09-10T16:03:17Z",
+ "updated_at": "2024-09-22T09:03:42Z",
"pushed_at": "2024-09-10T16:02:57Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"has_discussions": true,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
- "watchers": 1,
+ "forks": 1,
+ "watchers": 2,
"score": 0,
"subscribers_count": 1
},
diff --git a/2024/CVE-2024-6624.json b/2024/CVE-2024-6624.json
index b264c48dbf..55af47147f 100644
--- a/2024/CVE-2024-6624.json
+++ b/2024/CVE-2024-6624.json
@@ -18,7 +18,7 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@@ -27,7 +27,7 @@
"wordpress"
],
"visibility": "public",
- "forks": 0,
+ "forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
diff --git a/2024/CVE-2024-6646.json b/2024/CVE-2024-6646.json
new file mode 100644
index 0000000000..31c711797a
--- /dev/null
+++ b/2024/CVE-2024-6646.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 861136004,
+ "name": "CVE-2024-6646",
+ "full_name": "inviewp\/CVE-2024-6646",
+ "owner": {
+ "login": "inviewp",
+ "id": 173750065,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/173750065?v=4",
+ "html_url": "https:\/\/github.com\/inviewp"
+ },
+ "html_url": "https:\/\/github.com\/inviewp\/CVE-2024-6646",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-09-22T05:07:44Z",
+ "updated_at": "2024-09-22T05:07:55Z",
+ "pushed_at": "2024-09-22T05:07:53Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-6670.json b/2024/CVE-2024-6670.json
index 2835311a96..3867f4c5b0 100644
--- a/2024/CVE-2024-6670.json
+++ b/2024/CVE-2024-6670.json
@@ -13,7 +13,7 @@
"description": null,
"fork": false,
"created_at": "2024-08-30T17:13:14Z",
- "updated_at": "2024-09-16T10:21:03Z",
+ "updated_at": "2024-09-19T15:34:06Z",
"pushed_at": "2024-08-30T17:22:31Z",
"stargazers_count": 30,
"watchers_count": 30,
diff --git a/2024/CVE-2024-6782.json b/2024/CVE-2024-6782.json
index a146afcb09..6ea0c51dd0 100644
--- a/2024/CVE-2024-6782.json
+++ b/2024/CVE-2024-6782.json
@@ -62,14 +62,14 @@
{
"id": 857843697,
"name": "CVE-2024-6782-PoC",
- "full_name": "Uno13x\/CVE-2024-6782-PoC",
+ "full_name": "R4idB0Y\/CVE-2024-6782-PoC",
"owner": {
- "login": "Uno13x",
+ "login": "R4idB0Y",
"id": 132174647,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132174647?v=4",
- "html_url": "https:\/\/github.com\/Uno13x"
+ "html_url": "https:\/\/github.com\/R4idB0Y"
},
- "html_url": "https:\/\/github.com\/Uno13x\/CVE-2024-6782-PoC",
+ "html_url": "https:\/\/github.com\/R4idB0Y\/CVE-2024-6782-PoC",
"description": "Unauthenticated remote code execution via Calibre’s content server in Calibre <= 7.14.0.",
"fork": false,
"created_at": "2024-09-15T18:45:44Z",
@@ -87,6 +87,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 1
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-7339.json b/2024/CVE-2024-7339.json
index 2061de51e5..42f4c1cd3c 100644
--- a/2024/CVE-2024-7339.json
+++ b/2024/CVE-2024-7339.json
@@ -13,10 +13,10 @@
"description": "An Vulnerability detection and Exploitation tool for CVE-2024-7339",
"fork": false,
"created_at": "2024-08-05T16:26:18Z",
- "updated_at": "2024-08-29T13:31:15Z",
+ "updated_at": "2024-09-21T21:56:08Z",
"pushed_at": "2024-08-10T17:38:53Z",
- "stargazers_count": 12,
- "watchers_count": 12,
+ "stargazers_count": 14,
+ "watchers_count": 14,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
- "watchers": 12,
+ "watchers": 14,
"score": 0,
"subscribers_count": 1
}
diff --git a/2024/CVE-2024-7928.json b/2024/CVE-2024-7928.json
index df06479b02..46fd3680f8 100644
--- a/2024/CVE-2024-7928.json
+++ b/2024/CVE-2024-7928.json
@@ -43,10 +43,10 @@
"description": "CVE-2024-7928 fastadmin vulnerability POC & Scanning",
"fork": false,
"created_at": "2024-08-20T12:15:48Z",
- "updated_at": "2024-09-16T17:12:51Z",
+ "updated_at": "2024-09-23T12:28:22Z",
"pushed_at": "2024-08-20T12:26:19Z",
- "stargazers_count": 5,
- "watchers_count": 5,
+ "stargazers_count": 6,
+ "watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
- "watchers": 5,
+ "watchers": 6,
"score": 0,
"subscribers_count": 1
},
diff --git a/2024/CVE-2024-7954.json b/2024/CVE-2024-7954.json
index 66aed2e202..8ccddcb3c1 100644
--- a/2024/CVE-2024-7954.json
+++ b/2024/CVE-2024-7954.json
@@ -13,10 +13,10 @@
"description": "Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12",
"fork": false,
"created_at": "2024-08-10T20:15:41Z",
- "updated_at": "2024-09-14T12:10:59Z",
+ "updated_at": "2024-09-23T14:56:00Z",
"pushed_at": "2024-08-12T13:46:06Z",
- "stargazers_count": 5,
- "watchers_count": 5,
+ "stargazers_count": 6,
+ "watchers_count": 6,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
- "watchers": 5,
+ "watchers": 6,
"score": 0,
"subscribers_count": 1
},
@@ -43,7 +43,7 @@
"description": "This exploit will attempt to execute system commands on SPIP targets.",
"fork": false,
"created_at": "2024-08-28T14:54:56Z",
- "updated_at": "2024-09-04T22:32:48Z",
+ "updated_at": "2024-09-18T22:48:10Z",
"pushed_at": "2024-08-28T18:26:25Z",
"stargazers_count": 5,
"watchers_count": 5,
@@ -73,10 +73,10 @@
"description": "Unauthenticated Remote Code Execution in SPIP versions up to and including 4.2.12 ",
"fork": false,
"created_at": "2024-09-01T10:59:45Z",
- "updated_at": "2024-09-07T03:29:00Z",
+ "updated_at": "2024-09-17T21:31:06Z",
"pushed_at": "2024-09-01T11:07:15Z",
- "stargazers_count": 2,
- "watchers_count": 2,
+ "stargazers_count": 3,
+ "watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@@ -85,8 +85,38 @@
"topics": [],
"visibility": "public",
"forks": 1,
- "watchers": 2,
+ "watchers": 3,
"score": 0,
"subscribers_count": 1
+ },
+ {
+ "id": 861854729,
+ "name": "RCE_CVE-2024-7954",
+ "full_name": "TheCyberguy-17\/RCE_CVE-2024-7954",
+ "owner": {
+ "login": "TheCyberguy-17",
+ "id": 182538709,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/182538709?v=4",
+ "html_url": "https:\/\/github.com\/TheCyberguy-17"
+ },
+ "html_url": "https:\/\/github.com\/TheCyberguy-17\/RCE_CVE-2024-7954",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-09-23T16:11:20Z",
+ "updated_at": "2024-09-23T16:27:15Z",
+ "pushed_at": "2024-09-23T16:27:12Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-7965.json b/2024/CVE-2024-7965.json
index 0a78d4f915..6bc1f47133 100644
--- a/2024/CVE-2024-7965.json
+++ b/2024/CVE-2024-7965.json
@@ -13,19 +13,19 @@
"description": "This repository contains PoC for CVE-2024-7965. This is the vulnerability in the V8 that occurs only within ARM64.",
"fork": false,
"created_at": "2024-09-16T19:04:57Z",
- "updated_at": "2024-09-17T10:29:43Z",
+ "updated_at": "2024-09-24T03:42:05Z",
"pushed_at": "2024-09-16T19:44:54Z",
- "stargazers_count": 6,
- "watchers_count": 6,
+ "stargazers_count": 26,
+ "watchers_count": 26,
"has_discussions": false,
- "forks_count": 2,
+ "forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 2,
- "watchers": 6,
+ "forks": 5,
+ "watchers": 26,
"score": 0,
"subscribers_count": 0
},
@@ -43,19 +43,19 @@
"description": null,
"fork": false,
"created_at": "2024-09-17T15:17:31Z",
- "updated_at": "2024-09-17T16:44:52Z",
+ "updated_at": "2024-09-22T15:29:30Z",
"pushed_at": "2024-09-17T16:44:49Z",
- "stargazers_count": 1,
- "watchers_count": 1,
+ "stargazers_count": 2,
+ "watchers_count": 2,
"has_discussions": false,
- "forks_count": 0,
+ "forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 0,
- "watchers": 1,
+ "forks": 1,
+ "watchers": 2,
"score": 0,
"subscribers_count": 0
}
diff --git a/2024/CVE-2024-8190.json b/2024/CVE-2024-8190.json
index fcfe68d42a..ce10d6dd07 100644
--- a/2024/CVE-2024-8190.json
+++ b/2024/CVE-2024-8190.json
@@ -13,20 +13,20 @@
"description": "CVE-2024-8190: Ivanti Cloud Service Appliance Command Injection",
"fork": false,
"created_at": "2024-09-16T15:33:46Z",
- "updated_at": "2024-09-17T10:03:14Z",
+ "updated_at": "2024-09-23T08:03:07Z",
"pushed_at": "2024-09-16T15:43:44Z",
- "stargazers_count": 4,
- "watchers_count": 4,
+ "stargazers_count": 9,
+ "watchers_count": 9,
"has_discussions": false,
- "forks_count": 1,
+ "forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 1,
- "watchers": 4,
+ "forks": 3,
+ "watchers": 9,
"score": 0,
- "subscribers_count": 4
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-8277.json b/2024/CVE-2024-8277.json
index a7fdc52f21..92d82c7555 100644
--- a/2024/CVE-2024-8277.json
+++ b/2024/CVE-2024-8277.json
@@ -13,8 +13,8 @@
"description": "CVE-2024-8277 - 0Day Auto Exploit Authentication Bypass in WooCommerce Photo Reviews Plugin",
"fork": false,
"created_at": "2024-09-11T20:09:01Z",
- "updated_at": "2024-09-14T15:13:20Z",
- "pushed_at": "2024-09-14T15:13:17Z",
+ "updated_at": "2024-09-19T02:24:29Z",
+ "pushed_at": "2024-09-19T02:24:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
diff --git a/2024/CVE-2024-8349.json b/2024/CVE-2024-8349.json
index f70485215b..832f44e88f 100644
--- a/2024/CVE-2024-8349.json
+++ b/2024/CVE-2024-8349.json
@@ -13,8 +13,8 @@
"description": "Authenticated Privilege Escalation to Admin exploiting Uncanny Groups for LearnDash.",
"fork": false,
"created_at": "2024-09-17T13:44:04Z",
- "updated_at": "2024-09-17T13:59:27Z",
- "pushed_at": "2024-09-17T13:59:24Z",
+ "updated_at": "2024-09-18T09:35:55Z",
+ "pushed_at": "2024-09-18T09:35:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
diff --git a/2024/CVE-2024-8504.json b/2024/CVE-2024-8504.json
index 802f464454..38ec2b218d 100644
--- a/2024/CVE-2024-8504.json
+++ b/2024/CVE-2024-8504.json
@@ -13,20 +13,50 @@
"description": "VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)",
"fork": false,
"created_at": "2024-09-14T06:27:11Z",
- "updated_at": "2024-09-17T06:08:15Z",
+ "updated_at": "2024-09-23T08:16:57Z",
"pushed_at": "2024-09-15T21:34:35Z",
- "stargazers_count": 24,
- "watchers_count": 24,
+ "stargazers_count": 26,
+ "watchers_count": 26,
"has_discussions": false,
- "forks_count": 2,
+ "forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
- "forks": 2,
- "watchers": 24,
+ "forks": 4,
+ "watchers": 26,
"score": 0,
- "subscribers_count": 3
+ "subscribers_count": 0
+ },
+ {
+ "id": 861411441,
+ "name": "ViciDial",
+ "full_name": "havokzero\/ViciDial",
+ "owner": {
+ "login": "havokzero",
+ "id": 46027877,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46027877?v=4",
+ "html_url": "https:\/\/github.com\/havokzero"
+ },
+ "html_url": "https:\/\/github.com\/havokzero\/ViciDial",
+ "description": "CVE-2024-8504",
+ "fork": false,
+ "created_at": "2024-09-22T20:17:10Z",
+ "updated_at": "2024-09-22T20:27:09Z",
+ "pushed_at": "2024-09-22T20:27:06Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-8522.json b/2024/CVE-2024-8522.json
index abf1c89fac..ce90ab51a2 100644
--- a/2024/CVE-2024-8522.json
+++ b/2024/CVE-2024-8522.json
@@ -13,8 +13,8 @@
"description": "POC Wordpress SQL Injection vulnerability LearnPress REST API endpoint ",
"fork": false,
"created_at": "2024-09-12T13:46:44Z",
- "updated_at": "2024-09-14T15:13:40Z",
- "pushed_at": "2024-09-14T15:13:37Z",
+ "updated_at": "2024-09-19T02:24:36Z",
+ "pushed_at": "2024-09-19T02:24:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@@ -33,6 +33,36 @@
"forks": 0,
"watchers": 0,
"score": 0,
- "subscribers_count": 1
+ "subscribers_count": 0
+ },
+ {
+ "id": 859722645,
+ "name": "CVE-2024-8522",
+ "full_name": "Avento\/CVE-2024-8522",
+ "owner": {
+ "login": "Avento",
+ "id": 13798539,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13798539?v=4",
+ "html_url": "https:\/\/github.com\/Avento"
+ },
+ "html_url": "https:\/\/github.com\/Avento\/CVE-2024-8522",
+ "description": "LearnPress – WordPress LMS Plugin <= 4.2.7 - Unauthenticated SQL Injection via 'c_only_fields'",
+ "fork": false,
+ "created_at": "2024-09-19T07:04:12Z",
+ "updated_at": "2024-09-24T04:09:18Z",
+ "pushed_at": "2024-09-19T07:06:15Z",
+ "stargazers_count": 1,
+ "watchers_count": 1,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 1,
+ "score": 0,
+ "subscribers_count": 0
}
]
\ No newline at end of file
diff --git a/2024/CVE-2024-8752.json b/2024/CVE-2024-8752.json
new file mode 100644
index 0000000000..24cf0b73e6
--- /dev/null
+++ b/2024/CVE-2024-8752.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 859630956,
+ "name": "CVE-2024-8752",
+ "full_name": "D3anSPGDMS\/CVE-2024-8752",
+ "owner": {
+ "login": "D3anSPGDMS",
+ "id": 179800496,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179800496?v=4",
+ "html_url": "https:\/\/github.com\/D3anSPGDMS"
+ },
+ "html_url": "https:\/\/github.com\/D3anSPGDMS\/CVE-2024-8752",
+ "description": "poc of cve-2024-8752(WebIQ 2.15.9)",
+ "fork": false,
+ "created_at": "2024-09-19T02:20:48Z",
+ "updated_at": "2024-09-19T02:28:30Z",
+ "pushed_at": "2024-09-19T02:28:27Z",
+ "stargazers_count": 0,
+ "watchers_count": 0,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 0,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-9043.json b/2024/CVE-2024-9043.json
new file mode 100644
index 0000000000..934c6d85bc
--- /dev/null
+++ b/2024/CVE-2024-9043.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 860552183,
+ "name": "CVE-2024-9043",
+ "full_name": "maybeheisenberg\/CVE-2024-9043",
+ "owner": {
+ "login": "maybeheisenberg",
+ "id": 181843766,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/181843766?v=4",
+ "html_url": "https:\/\/github.com\/maybeheisenberg"
+ },
+ "html_url": "https:\/\/github.com\/maybeheisenberg\/CVE-2024-9043",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-09-20T16:45:20Z",
+ "updated_at": "2024-09-22T15:29:07Z",
+ "pushed_at": "2024-09-20T16:57:51Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-9079.json b/2024/CVE-2024-9079.json
new file mode 100644
index 0000000000..5d15b03f53
--- /dev/null
+++ b/2024/CVE-2024-9079.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 861324645,
+ "name": "CVE-2024-9079",
+ "full_name": "maybeheisenberg\/CVE-2024-9079",
+ "owner": {
+ "login": "maybeheisenberg",
+ "id": 181843766,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/181843766?v=4",
+ "html_url": "https:\/\/github.com\/maybeheisenberg"
+ },
+ "html_url": "https:\/\/github.com\/maybeheisenberg\/CVE-2024-9079",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-09-22T15:43:45Z",
+ "updated_at": "2024-09-22T15:49:00Z",
+ "pushed_at": "2024-09-22T15:48:16Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/2024/CVE-2024-9080.json b/2024/CVE-2024-9080.json
new file mode 100644
index 0000000000..70c14da2b6
--- /dev/null
+++ b/2024/CVE-2024-9080.json
@@ -0,0 +1,32 @@
+[
+ {
+ "id": 861321390,
+ "name": "CVE-2024-9080",
+ "full_name": "nothe1senberg\/CVE-2024-9080",
+ "owner": {
+ "login": "nothe1senberg",
+ "id": 182430066,
+ "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/182430066?v=4",
+ "html_url": "https:\/\/github.com\/nothe1senberg"
+ },
+ "html_url": "https:\/\/github.com\/nothe1senberg\/CVE-2024-9080",
+ "description": null,
+ "fork": false,
+ "created_at": "2024-09-22T15:34:24Z",
+ "updated_at": "2024-09-22T15:46:00Z",
+ "pushed_at": "2024-09-22T15:45:57Z",
+ "stargazers_count": 2,
+ "watchers_count": 2,
+ "has_discussions": false,
+ "forks_count": 0,
+ "allow_forking": true,
+ "is_template": false,
+ "web_commit_signoff_required": false,
+ "topics": [],
+ "visibility": "public",
+ "forks": 0,
+ "watchers": 2,
+ "score": 0,
+ "subscribers_count": 0
+ }
+]
\ No newline at end of file
diff --git a/README.md b/README.md
index ee26398759..3309a0d7c0 100644
--- a/README.md
+++ b/README.md
@@ -678,6 +678,7 @@
- [LeopoldSkell/CVE-2024-3273](https://github.com/LeopoldSkell/CVE-2024-3273)
- [mrrobot0o/CVE-2024-3273-](https://github.com/mrrobot0o/CVE-2024-3273-)
- [OIivr/Turvan6rkus-CVE-2024-3273](https://github.com/OIivr/Turvan6rkus-CVE-2024-3273)
+- [X-Projetion/CVE-2024-3273-D-Link-Remote-Code-Execution-RCE](https://github.com/X-Projetion/CVE-2024-3273-D-Link-Remote-Code-Execution-RCE)
### CVE-2024-3293 (2024-04-23)
@@ -794,6 +795,7 @@
- [1ncendium/CVE-2024-4040](https://github.com/1ncendium/CVE-2024-4040)
- [olebris/CVE-2024-4040](https://github.com/olebris/CVE-2024-4040)
- [entroychang/CVE-2024-4040](https://github.com/entroychang/CVE-2024-4040)
+- [safeer-accuknox/CrushFTP-cve-2024-4040-poc](https://github.com/safeer-accuknox/CrushFTP-cve-2024-4040-poc)
### CVE-2024-4231 (2024-05-10)
@@ -1016,6 +1018,7 @@
- [xungzzz/CVE-2024-4956](https://github.com/xungzzz/CVE-2024-4956)
- [erickfernandox/CVE-2024-4956](https://github.com/erickfernandox/CVE-2024-4956)
- [gmh5225/CVE-2024-4956](https://github.com/gmh5225/CVE-2024-4956)
+- [ifconfig-me/CVE-2024-4956-Bulk-Scanner](https://github.com/ifconfig-me/CVE-2024-4956-Bulk-Scanner)
- [thinhap/CVE-2024-4956-PoC](https://github.com/thinhap/CVE-2024-4956-PoC)
- [yagyuufellinluvv/CVE-2024-4956](https://github.com/yagyuufellinluvv/CVE-2024-4956)
- [GoatSecurity/CVE-2024-4956](https://github.com/GoatSecurity/CVE-2024-4956)
@@ -1082,13 +1085,6 @@
- [fa-rrel/CVE-2024-5420-XSS](https://github.com/fa-rrel/CVE-2024-5420-XSS)
- [K4yd0/CVE-2024-5420_XSS](https://github.com/K4yd0/CVE-2024-5420_XSS)
-### CVE-2024-5458 (2024-06-09)
-
-In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, due to a code logic error, filtering functions such as filter_var when validating URLs (FILTER_VALIDATE_URL) for certain types of URLs the function will result in invalid user information (username + password part of URLs) being treated as valid user information. This may lead to the downstream code accepting invalid URLs as valid and parsing them incorrectly.
-
-
-- [justmexD8/CVE-2024-5458-POC](https://github.com/justmexD8/CVE-2024-5458-POC)
-
### CVE-2024-5522 (2024-06-20)
The HTML5 Video Player WordPress plugin before 2.5.27 does not sanitize and escape a parameter from a REST route before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks
@@ -1328,6 +1324,13 @@
- [RandomRobbieBF/CVE-2024-6624](https://github.com/RandomRobbieBF/CVE-2024-6624)
+### CVE-2024-6646 (2024-07-10)
+
+Eine problematische Schwachstelle wurde in Netgear WN604 bis 20240710 ausgemacht. Dies betrifft einen unbekannten Teil der Datei /downloadFile.php der Komponente Web Interface. Dank Manipulation des Arguments file mit der Eingabe config mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.
+
+
+- [inviewp/CVE-2024-6646](https://github.com/inviewp/CVE-2024-6646)
+
### CVE-2024-6670 (2024-08-29)
In WhatsUp Gold versions released before 2024.0.0, a SQL Injection vulnerability allows an unauthenticated attacker to retrieve the users encrypted password.
@@ -1349,7 +1352,7 @@
- [zangjiahe/CVE-2024-6782](https://github.com/zangjiahe/CVE-2024-6782)
- [jdpsl/CVE-2024-6782](https://github.com/jdpsl/CVE-2024-6782)
-- [Uno13x/CVE-2024-6782-PoC](https://github.com/Uno13x/CVE-2024-6782-PoC)
+- [R4idB0Y/CVE-2024-6782-PoC](https://github.com/R4idB0Y/CVE-2024-6782-PoC)
### CVE-2024-7029 (2024-08-02)
@@ -1433,6 +1436,7 @@
- [Chocapikk/CVE-2024-7954](https://github.com/Chocapikk/CVE-2024-7954)
- [bigb0x/CVE-2024-7954](https://github.com/bigb0x/CVE-2024-7954)
- [fa-rrel/CVE-2024-7954-RCE](https://github.com/fa-rrel/CVE-2024-7954-RCE)
+- [TheCyberguy-17/RCE_CVE-2024-7954](https://github.com/TheCyberguy-17/RCE_CVE-2024-7954)
### CVE-2024-7965 (2024-08-21)
@@ -1465,6 +1469,7 @@
- [Chocapikk/CVE-2024-8504](https://github.com/Chocapikk/CVE-2024-8504)
+- [havokzero/ViciDial](https://github.com/havokzero/ViciDial)
### CVE-2024-8517 (2024-09-06)
@@ -1479,6 +1484,23 @@
- [realbotnet/CVE-2024-8522](https://github.com/realbotnet/CVE-2024-8522)
+- [Avento/CVE-2024-8522](https://github.com/Avento/CVE-2024-8522)
+
+### CVE-2024-8752 (2024-09-16)
+
+The Windows version of WebIQ 2.15.9 is affected by a directory traversal vulnerability that allows remote attackers to read any file on the system.
+
+
+- [D3anSPGDMS/CVE-2024-8752](https://github.com/D3anSPGDMS/CVE-2024-8752)
+
+### CVE-2024-9043
+- [maybeheisenberg/CVE-2024-9043](https://github.com/maybeheisenberg/CVE-2024-9043)
+
+### CVE-2024-9079
+- [maybeheisenberg/CVE-2024-9079](https://github.com/maybeheisenberg/CVE-2024-9079)
+
+### CVE-2024-9080
+- [nothe1senberg/CVE-2024-9080](https://github.com/nothe1senberg/CVE-2024-9080)
### CVE-2024-12883
- [mhtsec/cve-2024-12883](https://github.com/mhtsec/cve-2024-12883)
@@ -2244,7 +2266,7 @@
- [10T4/PoC-Fix-jenkins-rce_CVE-2024-23897](https://github.com/10T4/PoC-Fix-jenkins-rce_CVE-2024-23897)
- [wjlin0/CVE-2024-23897](https://github.com/wjlin0/CVE-2024-23897)
- [Vozec/CVE-2024-23897](https://github.com/Vozec/CVE-2024-23897)
-- [raheel0x01/CVE-2024-23897](https://github.com/raheel0x01/CVE-2024-23897)
+- [r0xdeadbeef/CVE-2024-23897](https://github.com/r0xdeadbeef/CVE-2024-23897)
- [viszsec/CVE-2024-23897](https://github.com/viszsec/CVE-2024-23897)
- [jopraveen/CVE-2024-23897](https://github.com/jopraveen/CVE-2024-23897)
- [AbraXa5/Jenkins-CVE-2024-23897](https://github.com/AbraXa5/Jenkins-CVE-2024-23897)
@@ -2254,13 +2276,14 @@
- [Praison001/CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability](https://github.com/Praison001/CVE-2024-23897-Jenkins-Arbitrary-Read-File-Vulnerability)
- [B4CK4TT4CK/CVE-2024-23897](https://github.com/B4CK4TT4CK/CVE-2024-23897)
- [godylockz/CVE-2024-23897](https://github.com/godylockz/CVE-2024-23897)
+- [ifconfig-me/CVE-2024-23897](https://github.com/ifconfig-me/CVE-2024-23897)
- [ThatNotEasy/CVE-2024-23897](https://github.com/ThatNotEasy/CVE-2024-23897)
- [pulentoski/CVE-2024-23897-Arbitrary-file-read](https://github.com/pulentoski/CVE-2024-23897-Arbitrary-file-read)
- [Nebian/CVE-2024-23897](https://github.com/Nebian/CVE-2024-23897)
- [Abo5/CVE-2024-23897](https://github.com/Abo5/CVE-2024-23897)
- [JAthulya/CVE-2024-23897](https://github.com/JAthulya/CVE-2024-23897)
- [murataydemir/CVE-2024-23897](https://github.com/murataydemir/CVE-2024-23897)
-- [mil4ne/CVE-2024-23897-Jenkins-4.441](https://github.com/mil4ne/CVE-2024-23897-Jenkins-4.441)
+- [fullaw4ke/CVE-2024-23897-Jenkins-4.441](https://github.com/fullaw4ke/CVE-2024-23897-Jenkins-4.441)
- [Maalfer/CVE-2024-23897](https://github.com/Maalfer/CVE-2024-23897)
- [Surko888/Surko-Exploit-Jenkins-CVE-2024-23897](https://github.com/Surko888/Surko-Exploit-Jenkins-CVE-2024-23897)
- [NoSpaceAvailable/CVE-2024-23897](https://github.com/NoSpaceAvailable/CVE-2024-23897)
@@ -2413,9 +2436,6 @@
- [MAWK0235/CVE-2024-24402](https://github.com/MAWK0235/CVE-2024-24402)
-### CVE-2024-24409
-- [passtheticket/CVE-2024-24409](https://github.com/passtheticket/CVE-2024-24409)
-
### CVE-2024-24488 (2024-02-07)
An issue in Shenzen Tenda Technology CP3V2.0 V11.10.00.2311090948 allows a local attacker to obtain sensitive information via the password component.
@@ -2523,6 +2543,7 @@
- [nicolvsrlr27/CVE-2024-24919](https://github.com/nicolvsrlr27/CVE-2024-24919)
- [gurudattch/CVE-2024-24919](https://github.com/gurudattch/CVE-2024-24919)
- [YN1337/CVE-2024-24919](https://github.com/YN1337/CVE-2024-24919)
+- [ifconfig-me/CVE-2024-24919-Bulk-Scanner](https://github.com/ifconfig-me/CVE-2024-24919-Bulk-Scanner)
- [r4p3c4/CVE-2024-24919-Checkpoint-Firewall-VPN-Check](https://github.com/r4p3c4/CVE-2024-24919-Checkpoint-Firewall-VPN-Check)
- [r4p3c4/CVE-2024-24919-Exploit-PoC-Checkpoint-Firewall-VPN](https://github.com/r4p3c4/CVE-2024-24919-Exploit-PoC-Checkpoint-Firewall-VPN)
- [J4F9S5D2Q7/CVE-2024-24919-CHECKPOINT](https://github.com/J4F9S5D2Q7/CVE-2024-24919-CHECKPOINT)
@@ -2545,7 +2566,6 @@
- [ShadowByte1/CVE-2024-24919](https://github.com/ShadowByte1/CVE-2024-24919)
- [H3KEY/CVE-2024-24919](https://github.com/H3KEY/CVE-2024-24919)
- [Jutrm/cve-2024-24919](https://github.com/Jutrm/cve-2024-24919)
-- [smkxt1/CVE-2024-24919](https://github.com/smkxt1/CVE-2024-24919)
- [LuisMateo1/Arbitrary-File-Read-CVE-2024-24919](https://github.com/LuisMateo1/Arbitrary-File-Read-CVE-2024-24919)
- [AhmedMansour93/Event-ID-263-Rule-Name-SOC287---Arbitrary-File-Read-on-Checkpoint-Security-Gateway-CVE-2024-24919-](https://github.com/AhmedMansour93/Event-ID-263-Rule-Name-SOC287---Arbitrary-File-Read-on-Checkpoint-Security-Gateway-CVE-2024-24919-)
@@ -3155,6 +3175,13 @@
- [fa-rrel/CVE-2024-28987-POC](https://github.com/fa-rrel/CVE-2024-28987-POC)
+### CVE-2024-28991 (2024-09-12)
+
+SolarWinds Access Rights Manager (ARM) was found to be susceptible to a remote code execution vulnerability. If exploited, this vulnerability would allow an authenticated user to abuse the service, resulting in remote code execution.
+
+
+- [maybeheisenberg/PoC-for-CVE-2024-28991](https://github.com/maybeheisenberg/PoC-for-CVE-2024-28991)
+
### CVE-2024-28995 (2024-06-06)
\n\n\n\n\n\n\n\n\n\n\n\nSolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine. \n\n\n\n\n\n\n\n
@@ -4379,6 +4406,8 @@
- [Brownpanda29/Cve-2024-38063](https://github.com/Brownpanda29/Cve-2024-38063)
- [FrancescoDiSalesGithub/quick-fix-cve-2024-38063](https://github.com/FrancescoDiSalesGithub/quick-fix-cve-2024-38063)
- [Faizan-Khanx/CVE-2024-38063](https://github.com/Faizan-Khanx/CVE-2024-38063)
+- [ArenaldyP/CVE-2024-38063-Medium](https://github.com/ArenaldyP/CVE-2024-38063-Medium)
+- [lnx-dvlpr/cve-2024-38063](https://github.com/lnx-dvlpr/cve-2024-38063)
### CVE-2024-38077 (2024-07-09)
@@ -4482,6 +4511,16 @@
- [ret2desync/CVE-2024-38793-PoC](https://github.com/ret2desync/CVE-2024-38793-PoC)
+### CVE-2024-38812
+- [maybeheisenberg/CVE-2024-38812](https://github.com/maybeheisenberg/CVE-2024-38812)
+
+### CVE-2024-38816 (2024-09-13)
+
+Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the Spring application is running.\n\nSpecifically, an application is vulnerable when both of the following are true:\n\n * the web application uses RouterFunctions to serve static resources\n * resource handling is explicitly configured with a FileSystemResource location\n\n\nHowever, malicious requests are blocked and rejected when any of the following is true:\n\n * the Spring Security HTTP Firewall https://docs.spring.io/spring-security/reference/servlet/exploits/firewall.html is in use\n * the application runs on Tomcat or Jetty
+
+
+- [weliveby/cve-2024-38816-demo](https://github.com/weliveby/cve-2024-38816-demo)
+
### CVE-2024-38856 (2024-08-05)
Incorrect Authorization vulnerability in Apache OFBiz.\n\nThis issue affects Apache OFBiz: through 18.12.14.\n\nUsers are recommended to upgrade to version 18.12.15, which fixes the issue.\n\nUnauthenticated endpoints could allow execution of screen rendering code of screens if some preconditions are met (such as when the screen definitions don't explicitly check user's permissions because they rely on the configuration of their endpoints).
@@ -4847,6 +4886,9 @@
- [njmbb8/CVE-2024-42850](https://github.com/njmbb8/CVE-2024-42850)
+### CVE-2024-42861
+- [qiupy123/CVE-2024-42861](https://github.com/qiupy123/CVE-2024-42861)
+
### CVE-2024-42919 (2024-08-20)
eScan Management Console 14.0.1400.2281 is vulnerable to Incorrect Access Control via acteScanAVReport.
@@ -4876,10 +4918,18 @@
- [KTN1990/CVE-2024-43160](https://github.com/KTN1990/CVE-2024-43160)
+- [maybeheisenberg/PoC-for-CVE-2024-43160](https://github.com/maybeheisenberg/PoC-for-CVE-2024-43160)
### CVE-2024-43425
- [RedTeamPentesting/moodle-rce-calculatedquestions](https://github.com/RedTeamPentesting/moodle-rce-calculatedquestions)
+### CVE-2024-43918 (2024-08-29)
+
+Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WBW WBW Product Table PRO allows SQL Injection.This issue affects WBW Product Table PRO: from n/a through 1.9.4.
+
+
+- [KTN1990/CVE-2024-43918](https://github.com/KTN1990/CVE-2024-43918)
+
### CVE-2024-44000
- [absholi7ly/CVE-2024-44000-LiteSpeed-Cache](https://github.com/absholi7ly/CVE-2024-44000-LiteSpeed-Cache)
- [gbrsh/CVE-2024-44000](https://github.com/gbrsh/CVE-2024-44000)
@@ -4974,6 +5024,7 @@
- [d4lyw/CVE-2024-45241](https://github.com/d4lyw/CVE-2024-45241)
+- [verylazytech/CVE-2024-45241](https://github.com/verylazytech/CVE-2024-45241)
### CVE-2024-45244 (2024-08-25)
@@ -4997,6 +5048,13 @@
- [TheHermione/CVE-2024-45265](https://github.com/TheHermione/CVE-2024-45265)
+### CVE-2024-45383 (2024-09-12)
+
+A mishandling of IRP requests vulnerability exists in the HDAudBus_DMA interface of Microsoft High Definition Audio Bus Driver 10.0.19041.3636 (WinBuild.160101.0800). A specially crafted application can issue multiple IRP Complete requests which leads to a local denial-of-service. An attacker can execute malicious script/application to trigger this vulnerability.
+
+
+- [SpiralBL0CK/CVE-2024-45383](https://github.com/SpiralBL0CK/CVE-2024-45383)
+
### CVE-2024-45507 (2024-09-04)
Server-Side Request Forgery (SSRF), Improper Control of Generation of Code ('Code Injection') vulnerability in Apache OFBiz.\n\nThis issue affects Apache OFBiz: before 18.12.16.\n\nUsers are recommended to upgrade to version 18.12.16, which fixes the issue.
@@ -5011,6 +5069,19 @@
- [BenRogozinski/CVE-2024-45589](https://github.com/BenRogozinski/CVE-2024-45589)
+### CVE-2024-46377
+- [vidura2/CVE-2024-46377](https://github.com/vidura2/CVE-2024-46377)
+
+### CVE-2024-46451 (2024-09-16)
+
+TOTOLINK AC1200 T8 v4.1.5cu.861_B20230220 has a buffer overflow vulnerability in the setWiFiAclRules function via the desc parameter.
+
+
+- [vidura2/CVE-2024-46451](https://github.com/vidura2/CVE-2024-46451)
+
+### CVE-2024-46986
+- [vidura2/CVE-2024-46986](https://github.com/vidura2/CVE-2024-46986)
+
### CVE-2024-56662
- [nimosec/cve-2024-56662](https://github.com/nimosec/cve-2024-56662)
@@ -5212,6 +5283,7 @@
- [iumiro/CVE-2023-1177-MLFlow](https://github.com/iumiro/CVE-2023-1177-MLFlow)
- [tiyeume25112004/CVE-2023-1177-rebuild](https://github.com/tiyeume25112004/CVE-2023-1177-rebuild)
- [saimahmed/MLflow-Vuln](https://github.com/saimahmed/MLflow-Vuln)
+- [charlesgargasson/CVE-2023-1177](https://github.com/charlesgargasson/CVE-2023-1177)
### CVE-2023-1326 (2023-04-13)
@@ -5753,7 +5825,6 @@
- [Starla2u/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK](https://github.com/Starla2u/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK)
- [jhonnybonny/CVE-2023-3824](https://github.com/jhonnybonny/CVE-2023-3824)
-- [m1sn0w/CVE-2023-3824](https://github.com/m1sn0w/CVE-2023-3824)
### CVE-2023-3836 (2023-07-22)
@@ -7397,7 +7468,7 @@
- [mariovata/CVE-2023-23752-Python](https://github.com/mariovata/CVE-2023-23752-Python)
- [0xx01/CVE-2023-23752](https://github.com/0xx01/CVE-2023-23752)
- [N3rdyN3xus/CVE-2023-23752](https://github.com/N3rdyN3xus/CVE-2023-23752)
-- [mil4ne/CVE-2023-23752-Joomla-v4.2.8](https://github.com/mil4ne/CVE-2023-23752-Joomla-v4.2.8)
+- [fullaw4ke/CVE-2023-23752-Joomla-v4.2.8](https://github.com/fullaw4ke/CVE-2023-23752-Joomla-v4.2.8)
- [Aureum01/CVE-2023-23752](https://github.com/Aureum01/CVE-2023-23752)
### CVE-2023-23924 (2023-01-31)
@@ -7912,6 +7983,7 @@
- [Rubioo02/CVE-2023-27163](https://github.com/Rubioo02/CVE-2023-27163)
- [madhavmehndiratta/CVE-2023-27163](https://github.com/madhavmehndiratta/CVE-2023-27163)
- [Rishabh-Kumar-Cyber-Sec/CVE-2023-27163-ssrf-to-port-scanning](https://github.com/Rishabh-Kumar-Cyber-Sec/CVE-2023-27163-ssrf-to-port-scanning)
+- [btar1gan/exploit_CVE-2023-27163](https://github.com/btar1gan/exploit_CVE-2023-27163)
### CVE-2023-27216 (2023-04-12)
@@ -7988,7 +8060,7 @@
- [horizon3ai/CVE-2023-27524](https://github.com/horizon3ai/CVE-2023-27524)
- [Okaytc/Superset_auth_bypass_check](https://github.com/Okaytc/Superset_auth_bypass_check)
-- [antx-code/CVE-2023-27524](https://github.com/antx-code/CVE-2023-27524)
+- [ZZ-SOCMAP/CVE-2023-27524](https://github.com/ZZ-SOCMAP/CVE-2023-27524)
- [MaanVader/CVE-2023-27524-POC](https://github.com/MaanVader/CVE-2023-27524-POC)
- [ThatNotEasy/CVE-2023-27524](https://github.com/ThatNotEasy/CVE-2023-27524)
- [TardC/CVE-2023-27524](https://github.com/TardC/CVE-2023-27524)
@@ -8529,6 +8601,7 @@
- [g4nkd/CVE-2023-30253-PoC](https://github.com/g4nkd/CVE-2023-30253-PoC)
- [dollarboysushil/Dolibarr-17.0.0-Exploit-CVE-2023-30253](https://github.com/dollarboysushil/Dolibarr-17.0.0-Exploit-CVE-2023-30253)
- [andria-dev/DolibabyPhp](https://github.com/andria-dev/DolibabyPhp)
+- [bluetoothStrawberry/CVE-2023-30253](https://github.com/bluetoothStrawberry/CVE-2023-30253)
### CVE-2023-30256 (2023-05-11)
@@ -9123,7 +9196,7 @@
- [I5N0rth/CVE-2023-33246](https://github.com/I5N0rth/CVE-2023-33246)
-- [yizhimanpadewoniu/CVE-2023-33246-Copy](https://github.com/yizhimanpadewoniu/CVE-2023-33246-Copy)
+- [4mazing/CVE-2023-33246-Copy](https://github.com/4mazing/CVE-2023-33246-Copy)
- [Le1a/CVE-2023-33246](https://github.com/Le1a/CVE-2023-33246)
- [SuperZero/CVE-2023-33246](https://github.com/SuperZero/CVE-2023-33246)
- [Malayke/CVE-2023-33246_RocketMQ_RCE_EXPLOIT](https://github.com/Malayke/CVE-2023-33246_RocketMQ_RCE_EXPLOIT)
@@ -9961,6 +10034,7 @@
- [jakabakos/CVE-2023-36664-Ghostscript-command-injection](https://github.com/jakabakos/CVE-2023-36664-Ghostscript-command-injection)
- [winkler-winsen/Scan_GhostScript](https://github.com/winkler-winsen/Scan_GhostScript)
+- [jeanchpt/CVE-2023-36664](https://github.com/jeanchpt/CVE-2023-36664)
- [churamanib/CVE-2023-36664-Ghostscript-command-injection](https://github.com/churamanib/CVE-2023-36664-Ghostscript-command-injection)
### CVE-2023-36723 (2023-10-10)
@@ -10024,6 +10098,7 @@
- [iveresk/CVE-2023-36845-6-](https://github.com/iveresk/CVE-2023-36845-6-)
- [ak1t4/CVE-2023-36845](https://github.com/ak1t4/CVE-2023-36845)
- [0xNehru/CVE-2023-36845-Juniper-Vulnerability](https://github.com/0xNehru/CVE-2023-36845-Juniper-Vulnerability)
+- [ifconfig-me/CVE-2023-36845](https://github.com/ifconfig-me/CVE-2023-36845)
- [e11i0t4lders0n/CVE-2023-36845](https://github.com/e11i0t4lders0n/CVE-2023-36845)
- [Vignesh2712/Automation-for-Juniper-cve-2023-36845](https://github.com/Vignesh2712/Automation-for-Juniper-cve-2023-36845)
@@ -10463,7 +10538,6 @@
- [MorDavid/CVE-2023-38831-Winrar-Exploit-Generator-POC](https://github.com/MorDavid/CVE-2023-38831-Winrar-Exploit-Generator-POC)
- [Mich-ele/CVE-2023-38831-winrar](https://github.com/Mich-ele/CVE-2023-38831-winrar)
- [asepsaepdin/CVE-2023-38831](https://github.com/asepsaepdin/CVE-2023-38831)
-- [K3rnel-Dev/WinrarExploit](https://github.com/K3rnel-Dev/WinrarExploit)
- [Fa1c0n35/CVE-2023-38831-winrar-exploit](https://github.com/Fa1c0n35/CVE-2023-38831-winrar-exploit)
- [xaitax/WinRAR-CVE-2023-38831](https://github.com/xaitax/WinRAR-CVE-2023-38831)
- [GOTonyGO/CVE-2023-38831-winrar](https://github.com/GOTonyGO/CVE-2023-38831-winrar)
@@ -10818,6 +10892,7 @@
- [majidmc2/CVE-2023-40459](https://github.com/majidmc2/CVE-2023-40459)
+- [7h3w4lk3r/CVE-2023-40459](https://github.com/7h3w4lk3r/CVE-2023-40459)
### CVE-2023-40477 (2024-05-03)
@@ -11150,6 +11225,7 @@
- [H454NSec/CVE-2023-42793](https://github.com/H454NSec/CVE-2023-42793)
+- [whoamins/CVE-2023-42793](https://github.com/whoamins/CVE-2023-42793)
- [Zenmovie/CVE-2023-42793](https://github.com/Zenmovie/CVE-2023-42793)
- [johnossawy/CVE-2023-42793_POC](https://github.com/johnossawy/CVE-2023-42793_POC)
- [StanleyJobsonAU/GhostTown](https://github.com/StanleyJobsonAU/GhostTown)
@@ -11158,6 +11234,7 @@
- [junnythemarksman/CVE-2023-42793](https://github.com/junnythemarksman/CVE-2023-42793)
- [HusenjanDev/CVE-2023-42793](https://github.com/HusenjanDev/CVE-2023-42793)
- [FlojBoj/CVE-2023-42793](https://github.com/FlojBoj/CVE-2023-42793)
+- [SwiftSecur/teamcity-exploit-cve-2023-42793](https://github.com/SwiftSecur/teamcity-exploit-cve-2023-42793)
### CVE-2023-42819 (2023-09-26)
@@ -12155,6 +12232,7 @@
- [Chocapikk/CVE-2023-46805](https://github.com/Chocapikk/CVE-2023-46805)
- [mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped](https://github.com/mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped)
- [w2xim3/CVE-2023-46805](https://github.com/w2xim3/CVE-2023-46805)
+- [maybeheisenberg/CVE-2023-46805](https://github.com/maybeheisenberg/CVE-2023-46805)
### CVE-2023-46813 (2023-10-27)
@@ -12270,6 +12348,14 @@
- [rainbowhatrkn/CVE-2023-47246](https://github.com/rainbowhatrkn/CVE-2023-47246)
- [tucommenceapousser/CVE-2023-47246](https://github.com/tucommenceapousser/CVE-2023-47246)
+### CVE-2023-47253 (2023-11-06)
+
+Qualitor through 8.20 allows remote attackers to execute arbitrary code via PHP code in the html/ad/adpesquisasql/request/processVariavel.php gridValoresPopHidden parameter.
+
+
+- [vnxdtzip/CVE-2023-47253](https://github.com/vnxdtzip/CVE-2023-47253)
+- [OpenXP-Research/CVE-2023-47253](https://github.com/OpenXP-Research/CVE-2023-47253)
+
### CVE-2023-47355 (2024-02-05)
The com.eypcnnapps.quickreboot (aka Eyuep Can Yilmaz {ROOT] Quick Reboot) application 1.0.8 for Android has exposed broadcast receivers for PowerOff, Reboot, and Recovery (e.g., com.eypcnnapps.quickreboot.widget.PowerOff) that are susceptible to unauthorized broadcasts because of missing input validation.
@@ -13403,7 +13489,7 @@
- [lucksec/CVE-2022-0847](https://github.com/lucksec/CVE-2022-0847)
- [si1ent-le/CVE-2022-0847](https://github.com/si1ent-le/CVE-2022-0847)
- [bohr777/cve-2022-0847dirtypipe-exploit](https://github.com/bohr777/cve-2022-0847dirtypipe-exploit)
-- [antx-code/CVE-2022-0847](https://github.com/antx-code/CVE-2022-0847)
+- [ZZ-SOCMAP/CVE-2022-0847](https://github.com/ZZ-SOCMAP/CVE-2022-0847)
- [cspshivam/CVE-2022-0847-dirty-pipe-exploit](https://github.com/cspshivam/CVE-2022-0847-dirty-pipe-exploit)
- [febinrev/dirtypipez-exploit](https://github.com/febinrev/dirtypipez-exploit)
- [ahrixia/CVE_2022_0847](https://github.com/ahrixia/CVE_2022_0847)
@@ -13913,6 +13999,7 @@
- [vnxdtzip/CVE-2022-2546](https://github.com/vnxdtzip/CVE-2022-2546)
+- [OpenXP-Research/CVE-2022-2546](https://github.com/OpenXP-Research/CVE-2022-2546)
### CVE-2022-2586 (2024-01-08)
@@ -14799,7 +14886,7 @@
SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server 7.53 and SAP Web Dispatcher are vulnerable for request smuggling and request concatenation. An unauthenticated attacker can prepend a victim's request with arbitrary data. This way, the attacker can execute functions impersonating the victim or poison intermediary Web caches. A successful attack could result in complete compromise of Confidentiality, Integrity and Availability of the system.\n\n
-- [antx-code/CVE-2022-22536](https://github.com/antx-code/CVE-2022-22536)
+- [ZZ-SOCMAP/CVE-2022-22536](https://github.com/ZZ-SOCMAP/CVE-2022-22536)
- [tess-ss/SAP-memory-pipes-desynchronization-vulnerability-MPI-CVE-2022-22536](https://github.com/tess-ss/SAP-memory-pipes-desynchronization-vulnerability-MPI-CVE-2022-22536)
### CVE-2022-22555 (2022-07-20)
@@ -15266,6 +15353,7 @@
- [Arrnitage/CVE-2022-23131_exp](https://github.com/Arrnitage/CVE-2022-23131_exp)
- [clearcdq/Zabbix-SAML-SSO-_CVE-2022-23131](https://github.com/clearcdq/Zabbix-SAML-SSO-_CVE-2022-23131)
- [r10lab/CVE-2022-23131](https://github.com/r10lab/CVE-2022-23131)
+- [fork-bombed/CVE-2022-23131](https://github.com/fork-bombed/CVE-2022-23131)
### CVE-2022-23222 (2022-01-14)
@@ -15758,7 +15846,7 @@
- [VVeakee/CVE-2022-24990-POC](https://github.com/VVeakee/CVE-2022-24990-POC)
- [0xf4n9x/CVE-2022-24990](https://github.com/0xf4n9x/CVE-2022-24990)
- [lishang520/CVE-2022-24990](https://github.com/lishang520/CVE-2022-24990)
-- [antx-code/CVE-2022-24990](https://github.com/antx-code/CVE-2022-24990)
+- [ZZ-SOCMAP/CVE-2022-24990](https://github.com/ZZ-SOCMAP/CVE-2022-24990)
- [jsongmax/terraMaster-CVE-2022-24990](https://github.com/jsongmax/terraMaster-CVE-2022-24990)
### CVE-2022-24992 (2022-07-25)
@@ -17895,8 +17983,9 @@
- [6E6L6F/CVE-2022-35914](https://github.com/6E6L6F/CVE-2022-35914)
- [0xGabe/CVE-2022-35914](https://github.com/0xGabe/CVE-2022-35914)
- [Johnermac/CVE-2022-35914](https://github.com/Johnermac/CVE-2022-35914)
-- [allendemoura/CVE-2022-35914](https://github.com/allendemoura/CVE-2022-35914)
+- [senderend/CVE-2022-35914](https://github.com/senderend/CVE-2022-35914)
- [noxlumens/CVE-2022-35914_poc](https://github.com/noxlumens/CVE-2022-35914_poc)
+- [btar1gan/exploit_CVE-2022-35914](https://github.com/btar1gan/exploit_CVE-2022-35914)
### CVE-2022-35919 (2022-08-01)
@@ -19539,7 +19628,6 @@
- [0xN7y/CVE-2022-46169](https://github.com/0xN7y/CVE-2022-46169)
- [mind2hex/CVE-2022-46169](https://github.com/mind2hex/CVE-2022-46169)
- [HPT-Intern-Task-Submission/CVE-2022-46169](https://github.com/HPT-Intern-Task-Submission/CVE-2022-46169)
-- [rockyroadonline/CVE-2022-46169](https://github.com/rockyroadonline/CVE-2022-46169)
### CVE-2022-46175 (2022-12-24)
@@ -19661,6 +19749,27 @@
- [sudoninja-noob/CVE-2022-47102](https://github.com/sudoninja-noob/CVE-2022-47102)
+### CVE-2022-47130 (2023-02-03)
+
+A Cross-Site Request Forgery (CSRF) in Academy LMS before v5.10 allows a discount coupon to be arbitrarily created if an attacker with administrative privileges interacts on the CSRF page.
+
+
+- [OpenXP-Research/CVE-2022-47130](https://github.com/OpenXP-Research/CVE-2022-47130)
+
+### CVE-2022-47131 (2023-02-03)
+
+A Cross-Site Request Forgery (CSRF) in Academy LMS before v5.10 allows an attacker to arbitrarily create a page.
+
+
+- [OpenXP-Research/CVE-2022-47131](https://github.com/OpenXP-Research/CVE-2022-47131)
+
+### CVE-2022-47132 (2023-02-03)
+
+A Cross-Site Request Forgery (CSRF) in Academy LMS before v5.10 allows attackers to arbitrarily add Administrator users.
+
+
+- [OpenXP-Research/CVE-2022-47132](https://github.com/OpenXP-Research/CVE-2022-47132)
+
### CVE-2022-47197 (2023-01-19)
An insecure default vulnerability exists in the Post Creation functionality of Ghost Foundation Ghost 5.9.4. Default installations of Ghost allow non-administrator users to inject arbitrary Javascript in posts, which allow privilege escalation to administrator via XSS. To trigger this vulnerability, an attacker can send an HTTP request to inject Javascript in a post to trick an administrator into visiting the post.A stored XSS vulnerability exists in the `codeinjection_foot` for a post.
@@ -21710,7 +21819,7 @@
- [mr-r3bot/Gitlab-CVE-2021-22205](https://github.com/mr-r3bot/Gitlab-CVE-2021-22205)
- [XTeam-Wing/CVE-2021-22205](https://github.com/XTeam-Wing/CVE-2021-22205)
- [r0eXpeR/CVE-2021-22205](https://github.com/r0eXpeR/CVE-2021-22205)
-- [antx-code/CVE-2021-22205](https://github.com/antx-code/CVE-2021-22205)
+- [ZZ-SOCMAP/CVE-2021-22205](https://github.com/ZZ-SOCMAP/CVE-2021-22205)
- [Al1ex/CVE-2021-22205](https://github.com/Al1ex/CVE-2021-22205)
- [whwlsfb/CVE-2021-22205](https://github.com/whwlsfb/CVE-2021-22205)
- [findneo/GitLab-preauth-RCE_CVE-2021-22205](https://github.com/findneo/GitLab-preauth-RCE_CVE-2021-22205)
@@ -21750,8 +21859,7 @@
- [aaminin/CVE-2021-22214](https://github.com/aaminin/CVE-2021-22214)
- [Vulnmachines/gitlab-cve-2021-22214](https://github.com/Vulnmachines/gitlab-cve-2021-22214)
-- [antx-code/CVE-2021-22214](https://github.com/antx-code/CVE-2021-22214)
-- [kh4sh3i/GitLab-SSRF-CVE-2021-22214](https://github.com/kh4sh3i/GitLab-SSRF-CVE-2021-22214)
+- [ZZ-SOCMAP/CVE-2021-22214](https://github.com/ZZ-SOCMAP/CVE-2021-22214)
### CVE-2021-22555 (2021-07-07)
@@ -22241,7 +22349,7 @@
- [lleavesl/CVE-2021-26084](https://github.com/lleavesl/CVE-2021-26084)
- [quesodipesto/conflucheck](https://github.com/quesodipesto/conflucheck)
- [30579096/Confluence-CVE-2021-26084](https://github.com/30579096/Confluence-CVE-2021-26084)
-- [antx-code/CVE-2021-26084](https://github.com/antx-code/CVE-2021-26084)
+- [ZZ-SOCMAP/CVE-2021-26084](https://github.com/ZZ-SOCMAP/CVE-2021-26084)
- [vpxuser/CVE-2021-26084-EXP](https://github.com/vpxuser/CVE-2021-26084-EXP)
- [nahcusira/CVE-2021-26084](https://github.com/nahcusira/CVE-2021-26084)
- [BBD-YZZ/Confluence-RCE](https://github.com/BBD-YZZ/Confluence-RCE)
@@ -22400,7 +22508,7 @@
- [srvaccount/CVE-2021-26855-PoC](https://github.com/srvaccount/CVE-2021-26855-PoC)
- [h4x0r-dz/CVE-2021-26855](https://github.com/h4x0r-dz/CVE-2021-26855)
- [alt3kx/CVE-2021-26855_PoC](https://github.com/alt3kx/CVE-2021-26855_PoC)
-- [raheel0x01/CVE-2021-26855](https://github.com/raheel0x01/CVE-2021-26855)
+- [r0xdeadbeef/CVE-2021-26855](https://github.com/r0xdeadbeef/CVE-2021-26855)
- [hackerschoice/CVE-2021-26855](https://github.com/hackerschoice/CVE-2021-26855)
- [SCS-Labs/HAFNIUM-Microsoft-Exchange-0day](https://github.com/SCS-Labs/HAFNIUM-Microsoft-Exchange-0day)
- [KotSec/CVE-2021-26855-Scanner](https://github.com/KotSec/CVE-2021-26855-Scanner)
@@ -23015,7 +23123,7 @@
- [zecopro/CVE-2021-31166](https://github.com/zecopro/CVE-2021-31166)
- [bgsilvait/WIn-CVE-2021-31166](https://github.com/bgsilvait/WIn-CVE-2021-31166)
- [y0g3sh-99/CVE-2021-31166-Exploit](https://github.com/y0g3sh-99/CVE-2021-31166-Exploit)
-- [antx-code/CVE-2021-31166](https://github.com/antx-code/CVE-2021-31166)
+- [ZZ-SOCMAP/CVE-2021-31166](https://github.com/ZZ-SOCMAP/CVE-2021-31166)
- [imikoYa/CVE-2021-31166-exploit](https://github.com/imikoYa/CVE-2021-31166-exploit)
- [mauricelambert/CVE-2021-31166](https://github.com/mauricelambert/CVE-2021-31166)
- [0xmaximus/Home-Demolisher](https://github.com/0xmaximus/Home-Demolisher)
@@ -23052,6 +23160,7 @@
- [hev0x/CVE-2021-31630-OpenPLC_RCE](https://github.com/hev0x/CVE-2021-31630-OpenPLC_RCE)
- [Hunt3r0x/CVE-2021-31630-HTB](https://github.com/Hunt3r0x/CVE-2021-31630-HTB)
- [thewhiteh4t/cve-2021-31630](https://github.com/thewhiteh4t/cve-2021-31630)
+- [behindsecurity/htb-wifinetictwo-exploit](https://github.com/behindsecurity/htb-wifinetictwo-exploit)
- [mind2hex/CVE-2021-31630](https://github.com/mind2hex/CVE-2021-31630)
- [sealldeveloper/CVE-2021-31630-PoC](https://github.com/sealldeveloper/CVE-2021-31630-PoC)
- [junnythemarksman/CVE-2021-31630](https://github.com/junnythemarksman/CVE-2021-31630)
@@ -23675,7 +23784,7 @@
Vulnerability in the Oracle Access Manager product of Oracle Fusion Middleware (component: OpenSSO Agent). Supported versions that are affected are 11.1.2.3.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Access Manager. Successful attacks of this vulnerability can result in takeover of Oracle Access Manager. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
-- [antx-code/CVE-2021-35587](https://github.com/antx-code/CVE-2021-35587)
+- [ZZ-SOCMAP/CVE-2021-35587](https://github.com/ZZ-SOCMAP/CVE-2021-35587)
### CVE-2021-35616 (2021-10-20)
@@ -25439,6 +25548,13 @@
- [aweiiy/CVE-2021-43617](https://github.com/aweiiy/CVE-2021-43617)
- [Sybelle03/CVE-2021-43617](https://github.com/Sybelle03/CVE-2021-43617)
+### CVE-2021-43650 (2022-03-22)
+
+WebRun 3.6.0.42 is vulnerable to SQL Injection via the P_0 parameter used to set the username during the login process.
+
+
+- [OpenXP-Research/CVE-2021-43650](https://github.com/OpenXP-Research/CVE-2021-43650)
+
### CVE-2021-43657 (2022-12-22)
A Stored Cross-site scripting (XSS) vulnerability via MAster.php in Sourcecodetester Simple Client Management System (SCMS) 1.0 allows remote attackers to inject arbitrary web script or HTML via the vulnerable input fields.
@@ -25497,7 +25613,6 @@
- [G01d3nW01f/CVE-2021-43798](https://github.com/G01d3nW01f/CVE-2021-43798)
- [mauricelambert/LabAutomationCVE-2021-43798](https://github.com/mauricelambert/LabAutomationCVE-2021-43798)
- [FAOG99/GrafanaDirectoryScanner](https://github.com/FAOG99/GrafanaDirectoryScanner)
-- [nuker/CVE-2021-43798](https://github.com/nuker/CVE-2021-43798)
- [victorhorowitz/grafana-exploit-CVE-2021-43798](https://github.com/victorhorowitz/grafana-exploit-CVE-2021-43798)
- [katseyres2/CVE-2021-43798](https://github.com/katseyres2/CVE-2021-43798)
- [Iris288/CVE-2021-43798](https://github.com/Iris288/CVE-2021-43798)
@@ -25752,7 +25867,7 @@
- [maxant/log4j2-CVE-2021-44228](https://github.com/maxant/log4j2-CVE-2021-44228)
- [atnetws/fail2ban-log4j](https://github.com/atnetws/fail2ban-log4j)
- [kimobu/cve-2021-44228](https://github.com/kimobu/cve-2021-44228)
-- [KainsRache/anti-jndi](https://github.com/KainsRache/anti-jndi)
+- [ph0lk3r/anti-jndi](https://github.com/ph0lk3r/anti-jndi)
- [bigsizeme/Log4j-check](https://github.com/bigsizeme/Log4j-check)
- [pedrohavay/exploit-CVE-2021-44228](https://github.com/pedrohavay/exploit-CVE-2021-44228)
- [0xRyan/log4j-nullroute](https://github.com/0xRyan/log4j-nullroute)
@@ -29092,8 +29207,8 @@
- [KooroshRZ/CVE-2020-10977](https://github.com/KooroshRZ/CVE-2020-10977)
- [thewhiteh4t/cve-2020-10977](https://github.com/thewhiteh4t/cve-2020-10977)
- [JustMichi/CVE-2020-10977.py](https://github.com/JustMichi/CVE-2020-10977.py)
-- [JayHerlth/cve-2020-10977](https://github.com/JayHerlth/cve-2020-10977)
- [erk3/gitlab-12.9.0-file-read](https://github.com/erk3/gitlab-12.9.0-file-read)
+- [possib1e/cve-2020-10977](https://github.com/possib1e/cve-2020-10977)
- [liath/CVE-2020-10977](https://github.com/liath/CVE-2020-10977)
- [lisp3r/cve-2020-10977-read-and-execute](https://github.com/lisp3r/cve-2020-10977-read-and-execute)
- [vandycknick/gitlab-cve-2020-10977](https://github.com/vandycknick/gitlab-cve-2020-10977)
@@ -31558,6 +31673,7 @@
- [wojkos9/arm-CVE-2020-29661](https://github.com/wojkos9/arm-CVE-2020-29661)
+- [TLD1027/CVE-2020-29661](https://github.com/TLD1027/CVE-2020-29661)
### CVE-2020-29666 (2020-12-10)
@@ -31634,6 +31750,7 @@
- [X0UCYB3R/Check-WP-CVE-2020-35489](https://github.com/X0UCYB3R/Check-WP-CVE-2020-35489)
- [reneoliveirajr/wp_CVE-2020-35489_checker](https://github.com/reneoliveirajr/wp_CVE-2020-35489_checker)
- [Cappricio-Securities/CVE-2020-35489](https://github.com/Cappricio-Securities/CVE-2020-35489)
+- [aifuzzer/poc-CVE-2020-35489](https://github.com/aifuzzer/poc-CVE-2020-35489)
### CVE-2020-35498 (2021-02-11)
@@ -33380,6 +33497,7 @@
- [Dh4nuJ4/SimpleCTF-UpdatedExploit](https://github.com/Dh4nuJ4/SimpleCTF-UpdatedExploit)
- [TeymurNovruzov/CVE-2019-9053-python3-remastered](https://github.com/TeymurNovruzov/CVE-2019-9053-python3-remastered)
- [jtoalu/CTF-CVE-2019-9053-GTFOBins](https://github.com/jtoalu/CTF-CVE-2019-9053-GTFOBins)
+- [Azrenom/CMS-Made-Simple-2.2.9-CVE-2019-9053](https://github.com/Azrenom/CMS-Made-Simple-2.2.9-CVE-2019-9053)
### CVE-2019-9081
- [nth347/CVE-2019-9081_PoC](https://github.com/nth347/CVE-2019-9081_PoC)
@@ -33586,6 +33704,7 @@
- [grimlockx/CVE-2019-9978](https://github.com/grimlockx/CVE-2019-9978)
- [h8handles/CVE-2019-9978-Python3](https://github.com/h8handles/CVE-2019-9978-Python3)
- [0xMoonrise/cve-2019-9978](https://github.com/0xMoonrise/cve-2019-9978)
+- [MAHajian/CVE-2019-9978](https://github.com/MAHajian/CVE-2019-9978)
### CVE-2019-10008 (2019-04-24)
@@ -34575,6 +34694,7 @@
- [faisalfs10x/CVE-2019-14322-scanner](https://github.com/faisalfs10x/CVE-2019-14322-scanner)
- [faisalfs10x/http-vuln-cve2019-14322.nse](https://github.com/faisalfs10x/http-vuln-cve2019-14322.nse)
+- [sergiovks/CVE-2019-14322](https://github.com/sergiovks/CVE-2019-14322)
### CVE-2019-14326 (2020-04-14)
@@ -38555,7 +38675,7 @@
- [wizardy0ga/THM-Vulnerability_Capstone-CVE-2018-16763](https://github.com/wizardy0ga/THM-Vulnerability_Capstone-CVE-2018-16763)
- [N3rdyN3xus/CVE-2018-16763](https://github.com/N3rdyN3xus/CVE-2018-16763)
- [BrunoPincho/cve-2018-16763-rust](https://github.com/BrunoPincho/cve-2018-16763-rust)
-- [NaturalT314/CVE-2018-16763](https://github.com/NaturalT314/CVE-2018-16763)
+- [Luigi31415/CVE-2018-16763](https://github.com/Luigi31415/CVE-2018-16763)
- [p0dalirius/CVE-2018-16763-FuelCMS-1.4.1-RCE](https://github.com/p0dalirius/CVE-2018-16763-FuelCMS-1.4.1-RCE)
- [not1cyyy/CVE-2018-16763](https://github.com/not1cyyy/CVE-2018-16763)
- [antisecc/CVE-2018-16763](https://github.com/antisecc/CVE-2018-16763)
@@ -43988,6 +44108,7 @@
- [cbk914/heartbleed-checker](https://github.com/cbk914/heartbleed-checker)
- [MrE-Fog/CVE-2014-0160-Chrome-Plugin](https://github.com/MrE-Fog/CVE-2014-0160-Chrome-Plugin)
- [timsonner/cve-2014-0160-heartbleed](https://github.com/timsonner/cve-2014-0160-heartbleed)
+- [Yash-Thakkar77/CVE-2014-0160-HeartBleed](https://github.com/Yash-Thakkar77/CVE-2014-0160-HeartBleed)
### CVE-2014-0166 (2014-04-09)
@@ -45545,7 +45666,7 @@
- [4m3rr0r/CVE-2011-2523-poc](https://github.com/4m3rr0r/CVE-2011-2523-poc)
- [Shubham-2k1/Exploit-CVE-2011-2523](https://github.com/Shubham-2k1/Exploit-CVE-2011-2523)
- [Tenor-Z/SmileySploit](https://github.com/Tenor-Z/SmileySploit)
-- [Uno13x/CVE-2011-2523-PoC](https://github.com/Uno13x/CVE-2011-2523-PoC)
+- [R4idB0Y/CVE-2011-2523-PoC](https://github.com/R4idB0Y/CVE-2011-2523-PoC)
- [AnugiArrawwala/CVE-Research](https://github.com/AnugiArrawwala/CVE-Research)
- [Gill-Singh-A/vsFTP-2.3.4-Remote-Root-Shell-Exploit](https://github.com/Gill-Singh-A/vsFTP-2.3.4-Remote-Root-Shell-Exploit)
- [everythingBlackkk/vsFTPd-Backdoor-Exploit-CVE-2011-2523-](https://github.com/everythingBlackkk/vsFTPd-Backdoor-Exploit-CVE-2011-2523-)
@@ -46301,92 +46422,6 @@
## 2006
-### CVE-2006-0450 (2006-01-27)
-
-phpBB 2.0.19 and earlier allows remote attackers to cause a denial of service (application crash) by (1) registering many users through profile.php or (2) using search.php to search in a certain way that confuses the database.
-
-
-- [Parcer0/CVE-2006-0450-phpBB-2.0.15-Multiple-DoS-Vulnerabilities](https://github.com/Parcer0/CVE-2006-0450-phpBB-2.0.15-Multiple-DoS-Vulnerabilities)
-
-### CVE-2006-1236 (2006-03-15)
-
-Buffer overflow in the SetUp function in socket/request.c in CrossFire 1.9.0 allows remote attackers to execute arbitrary code via a long setup sound command, a different vulnerability than CVE-2006-1010.
-
-
-- [Axua/CVE-2006-1236](https://github.com/Axua/CVE-2006-1236)
-
-### CVE-2006-2842 (2006-06-06)
-
-PHP remote file inclusion vulnerability in functions/plugin.php in SquirrelMail 1.4.6 and earlier, if register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter. NOTE: this issue has been disputed by third parties, who state that Squirrelmail provides prominent warnings to the administrator when register_globals is enabled. Since the varieties of administrator negligence are uncountable, perhaps this type of issue should not be included in CVE. However, the original developer has posted a security advisory, so there might be relevant real-world environments under which this vulnerability is applicable
-
-
-- [karthi-the-hacker/CVE-2006-2842](https://github.com/karthi-the-hacker/CVE-2006-2842)
-
-### CVE-2006-3392 (2006-07-06)
-
-Webmin before 1.290 and Usermin before 1.220 calls the simplify_path function before decoding HTML, which allows remote attackers to read arbitrary files, as demonstrated using "..%01" sequences, which bypass the removal of "../" sequences before bytes such as "%01" are removed from the filename. NOTE: This is a different issue than CVE-2006-3274.
-
-
-- [0xtz/CVE-2006-3392](https://github.com/0xtz/CVE-2006-3392)
-- [IvanGlinkin/CVE-2006-3392](https://github.com/IvanGlinkin/CVE-2006-3392)
-- [Adel-kaka-dz/CVE-2006-3392](https://github.com/Adel-kaka-dz/CVE-2006-3392)
-- [gb21oc/ExploitWebmin](https://github.com/gb21oc/ExploitWebmin)
-- [kernel-cyber/CVE-2006-3392](https://github.com/kernel-cyber/CVE-2006-3392)
-- [g1vi/CVE-2006-3392](https://github.com/g1vi/CVE-2006-3392)
-- [MrEmpy/CVE-2006-3392](https://github.com/MrEmpy/CVE-2006-3392)
-
-### CVE-2006-3592 (2006-07-14)
-
-Unspecified vulnerability in the command line interface (CLI) in Cisco Unified CallManager (CUCM) 5.0(1) through 5.0(3a) allows local users to execute arbitrary commands with elevated privileges via unspecified vectors, involving "certain CLI commands," aka bug CSCse11005.
-
-
-- [adenkiewicz/CVE-2006-3592](https://github.com/adenkiewicz/CVE-2006-3592)
-
-### CVE-2006-3747 (2006-07-28)
-
-Off-by-one error in the ldap scheme handling in the Rewrite module (mod_rewrite) in Apache 1.3 from 1.3.28, 2.0.46 and other versions before 2.0.59, and 2.2, when RewriteEngine is enabled, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted URLs that are not properly handled using certain rewrite rules.
-
-
-- [defensahacker/CVE-2006-3747](https://github.com/defensahacker/CVE-2006-3747)
-
-### CVE-2006-4777 (2006-09-14)
-
-Heap-based buffer overflow in the DirectAnimation Path Control (DirectAnimation.PathControl) COM object (daxctle.ocx) for Internet Explorer 6.0 SP1, on Chinese and possibly other Windows distributions, allows remote attackers to execute arbitrary code via unknown manipulations in arguments to the KeyFrame method, possibly related to an integer overflow, as demonstrated by daxctle2, and a different vulnerability than CVE-2006-4446.
-
-
-- [Mario1234/js-driveby-download-CVE-2006-4777](https://github.com/Mario1234/js-driveby-download-CVE-2006-4777)
-
-### CVE-2006-4814 (2006-12-20)
-
-The mincore function in the Linux kernel before 2.4.33.6 does not properly lock access to user space, which has unspecified impact and attack vectors, possibly related to a deadlock.
-
-
-- [tagatac/linux-CVE-2006-4814](https://github.com/tagatac/linux-CVE-2006-4814)
-
-### CVE-2006-5051 (2006-09-27)
-
-Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free.
-
-
-- [bigb0x/CVE-2024-6387](https://github.com/bigb0x/CVE-2024-6387)
-- [sardine-web/CVE-2024-6387_Check](https://github.com/sardine-web/CVE-2024-6387_Check)
-- [ThemeHackers/CVE-2024-6387](https://github.com/ThemeHackers/CVE-2024-6387)
-
-### CVE-2006-6184 (2006-12-01)
-
-Multiple stack-based buffer overflows in Allied Telesyn TFTP Server (AT-TFTP) 1.9, and possibly earlier, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a long filename in a (1) GET or (2) PUT command.
-
-
-- [shauntdergrigorian/cve-2006-6184](https://github.com/shauntdergrigorian/cve-2006-6184)
-- [b03902043/CVE-2006-6184](https://github.com/b03902043/CVE-2006-6184)
-
-### CVE-2006-20001 (2023-01-17)
-
-A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash.\n\nThis issue affects Apache HTTP Server 2.4.54 and earlier.\n
-
-
-- [Saksham2002/CVE-2006-20001](https://github.com/Saksham2002/CVE-2006-20001)
-
## 2005
### CVE-2005-0575 (2005-02-27)
@@ -46722,38 +46757,6 @@
## 2000
-### CVE-2000-0114 (2000-02-08)
-
-Frontpage Server Extensions allows remote attackers to determine the name of the anonymous account via an RPC POST request to shtml.dll in the /_vti_bin/ virtual directory.
-
-
-- [Cappricio-Securities/CVE-2000-0114](https://github.com/Cappricio-Securities/CVE-2000-0114)
-- [Josekutty-K/frontpage-server-extensions-vulnerability-scanner](https://github.com/Josekutty-K/frontpage-server-extensions-vulnerability-scanner)
-- [adhamelhansye/CVE-2000-0114](https://github.com/adhamelhansye/CVE-2000-0114)
-
-### CVE-2000-0170 (2000-04-10)
-
-Buffer overflow in the man program in Linux allows local users to gain privileges via the MANPAGER environmental variable.
-
-
-- [mike182/exploit](https://github.com/mike182/exploit)
-
-### CVE-2000-0649 (2000-08-03)
-
-IIS 4.0 allows remote attackers to obtain the internal IP address of the server via an HTTP 1.0 request for a web page which is protected by basic authentication and has no realm defined.
-
-
-- [rafaelh/CVE-2000-0649](https://github.com/rafaelh/CVE-2000-0649)
-- [stevenvegar/cve-2000-0649](https://github.com/stevenvegar/cve-2000-0649)
-- [Downgraderz/PoC-CVE-2000-0649](https://github.com/Downgraderz/PoC-CVE-2000-0649)
-
-### CVE-2000-0979 (2001-01-22)
-
-File and Print Sharing service in Windows 95, Windows 98, and Windows Me does not properly check the password for a file share, which allows remote attackers to bypass share access controls by sending a 1-byte password that matches the first character of the real password, aka the "Share Level Password" vulnerability.
-
-
-- [Z6543/CVE-2000-0979](https://github.com/Z6543/CVE-2000-0979)
-
## 1999
### CVE-1999-0016 (1999-09-29)