diff --git a/2011/CVE-2011-1473.json b/2011/CVE-2011-1473.json index 78c6f9494b..25cf2f4323 100644 --- a/2011/CVE-2011-1473.json +++ b/2011/CVE-2011-1473.json @@ -48,13 +48,13 @@ "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, - "forks_count": 2, + "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 2, + "forks": 3, "watchers": 4, "score": 0, "subscribers_count": 0 diff --git a/2016/CVE-2016-10277.json b/2016/CVE-2016-10277.json index 39eefb60fb..e14a4a06fd 100644 --- a/2016/CVE-2016-10277.json +++ b/2016/CVE-2016-10277.json @@ -13,10 +13,10 @@ "description": "Motorola Untethered Jailbreak: Exploiting CVE-2016-10277 for Secure Boot and Device Locking bypass ", "fork": false, "created_at": "2017-06-06T12:00:27Z", - "updated_at": "2024-02-06T16:48:26Z", + "updated_at": "2024-02-14T16:52:45Z", "pushed_at": "2017-08-30T15:17:08Z", - "stargazers_count": 65, - "watchers_count": 65, + "stargazers_count": 66, + "watchers_count": 66, "has_discussions": false, "forks_count": 19, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 19, - "watchers": 65, + "watchers": 66, "score": 0, "subscribers_count": 18 }, diff --git a/2017/CVE-2017-1000486.json b/2017/CVE-2017-1000486.json index 352b39e312..57ba3d71e6 100644 --- a/2017/CVE-2017-1000486.json +++ b/2017/CVE-2017-1000486.json @@ -216,6 +216,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2017/CVE-2017-5689.json b/2017/CVE-2017-5689.json index 8eac6e0646..e59d40660f 100644 --- a/2017/CVE-2017-5689.json +++ b/2017/CVE-2017-5689.json @@ -44,17 +44,17 @@ "fork": false, "created_at": "2017-05-06T15:35:42Z", "updated_at": "2024-01-16T16:25:35Z", - "pushed_at": "2020-01-03T21:50:36Z", + "pushed_at": "2024-02-14T16:18:07Z", "stargazers_count": 16, "watchers_count": 16, "has_discussions": false, - "forks_count": 5, + "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 5, + "forks": 6, "watchers": 16, "score": 0, "subscribers_count": 2 diff --git a/2019/CVE-2019-0232.json b/2019/CVE-2019-0232.json index de7965da79..58576c95e0 100644 --- a/2019/CVE-2019-0232.json +++ b/2019/CVE-2019-0232.json @@ -103,10 +103,10 @@ "description": "CVE-2019-0232-Remote Code Execution on Apache Tomcat 7.0.42", "fork": false, "created_at": "2019-11-21T14:25:39Z", - "updated_at": "2024-02-14T08:10:20Z", + "updated_at": "2024-02-14T17:25:57Z", "pushed_at": "2019-11-21T15:03:15Z", - "stargazers_count": 15, - "watchers_count": 15, + "stargazers_count": 16, + "watchers_count": 16, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -115,7 +115,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 15, + "watchers": 16, "score": 0, "subscribers_count": 1 }, diff --git a/2019/CVE-2019-7238.json b/2019/CVE-2019-7238.json index cb20c51eb2..23526f94e1 100644 --- a/2019/CVE-2019-7238.json +++ b/2019/CVE-2019-7238.json @@ -43,10 +43,10 @@ "description": "Nexus Repository Manager 3 Remote Code Execution without authentication < 3.15.0", "fork": false, "created_at": "2019-05-21T13:16:02Z", - "updated_at": "2023-12-15T12:10:29Z", + "updated_at": "2024-02-14T14:05:19Z", "pushed_at": "2019-08-19T17:33:56Z", - "stargazers_count": 78, - "watchers_count": 78, + "stargazers_count": 79, + "watchers_count": 79, "has_discussions": false, "forks_count": 29, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 29, - "watchers": 78, + "watchers": 79, "score": 0, "subscribers_count": 2 }, diff --git a/2019/CVE-2019-9193.json b/2019/CVE-2019-9193.json index c57fbe5d64..bd0d2e9454 100644 --- a/2019/CVE-2019-9193.json +++ b/2019/CVE-2019-9193.json @@ -48,7 +48,7 @@ "stargazers_count": 15, "watchers_count": 15, "has_discussions": false, - "forks_count": 4, + "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -62,7 +62,7 @@ "remote-code-execution" ], "visibility": "public", - "forks": 4, + "forks": 5, "watchers": 15, "score": 0, "subscribers_count": 1 diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json index 96f576bb8c..b60cf52b2f 100644 --- a/2020/CVE-2020-1472.json +++ b/2020/CVE-2020-1472.json @@ -43,10 +43,10 @@ "description": "Test tool for CVE-2020-1472", "fork": false, "created_at": "2020-09-08T08:58:37Z", - "updated_at": "2024-02-12T05:45:33Z", + "updated_at": "2024-02-14T12:28:54Z", "pushed_at": "2023-07-20T10:51:42Z", - "stargazers_count": 1671, - "watchers_count": 1671, + "stargazers_count": 1672, + "watchers_count": 1672, "has_discussions": false, "forks_count": 366, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 366, - "watchers": 1671, + "watchers": 1672, "score": 0, "subscribers_count": 87 }, diff --git a/2021/CVE-2021-21551.json b/2021/CVE-2021-21551.json index c70913557b..9abb54f056 100644 --- a/2021/CVE-2021-21551.json +++ b/2021/CVE-2021-21551.json @@ -148,10 +148,10 @@ "description": "An extended proof-of-concept for the CVE-2021-21551 Dell ‘dbutil_2_3.sys’ Kernel Exploit", "fork": false, "created_at": "2021-06-02T05:13:07Z", - "updated_at": "2024-01-12T16:39:42Z", + "updated_at": "2024-02-14T18:13:50Z", "pushed_at": "2021-07-20T03:03:30Z", - "stargazers_count": 17, - "watchers_count": 17, + "stargazers_count": 18, + "watchers_count": 18, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -160,7 +160,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 17, + "watchers": 18, "score": 0, "subscribers_count": 1 }, diff --git a/2021/CVE-2021-22204.json b/2021/CVE-2021-22204.json index dabee17576..67c329696e 100644 --- a/2021/CVE-2021-22204.json +++ b/2021/CVE-2021-22204.json @@ -286,10 +286,10 @@ "description": "exiftool exploit", "fork": false, "created_at": "2022-02-21T11:07:19Z", - "updated_at": "2023-09-24T01:56:21Z", + "updated_at": "2024-02-14T16:29:37Z", "pushed_at": "2022-02-21T12:20:15Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -298,7 +298,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 6, + "watchers": 7, "score": 0, "subscribers_count": 1 }, @@ -316,10 +316,10 @@ "description": "Exploit for CVE-2021-22204 (ExifTool) - Arbitrary Code Execution", "fork": false, "created_at": "2022-04-16T22:49:47Z", - "updated_at": "2024-01-21T04:44:11Z", + "updated_at": "2024-02-14T16:19:17Z", "pushed_at": "2022-06-07T23:09:29Z", - "stargazers_count": 26, - "watchers_count": 26, + "stargazers_count": 27, + "watchers_count": 27, "has_discussions": true, "forks_count": 3, "allow_forking": true, @@ -341,7 +341,7 @@ ], "visibility": "public", "forks": 3, - "watchers": 26, + "watchers": 27, "score": 0, "subscribers_count": 0 }, diff --git a/2021/CVE-2021-40346.json b/2021/CVE-2021-40346.json index 8a93467abe..7246226b19 100644 --- a/2021/CVE-2021-40346.json +++ b/2021/CVE-2021-40346.json @@ -13,10 +13,10 @@ "description": "CVE-2021-40346 PoC (HAProxy HTTP Smuggling)", "fork": false, "created_at": "2021-09-08T22:26:19Z", - "updated_at": "2023-12-05T14:42:05Z", + "updated_at": "2024-02-14T15:04:41Z", "pushed_at": "2021-09-08T22:37:15Z", - "stargazers_count": 36, - "watchers_count": 36, + "stargazers_count": 37, + "watchers_count": 37, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 36, + "watchers": 37, "score": 0, "subscribers_count": 4 }, diff --git a/2021/CVE-2021-44026.json b/2021/CVE-2021-44026.json index ca1f2950a6..b716270dde 100644 --- a/2021/CVE-2021-44026.json +++ b/2021/CVE-2021-44026.json @@ -13,10 +13,10 @@ "description": "A demo exploit for CVE-2021-44026, a SQL injection in Roundcube", "fork": false, "created_at": "2023-11-14T11:32:36Z", - "updated_at": "2024-01-06T15:13:10Z", + "updated_at": "2024-02-14T17:51:21Z", "pushed_at": "2023-12-22T11:29:43Z", - "stargazers_count": 6, - "watchers_count": 6, + "stargazers_count": 7, + "watchers_count": 7, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 6, + "watchers": 7, "score": 0, "subscribers_count": 1 } diff --git a/2021/CVE-2021-44077.json b/2021/CVE-2021-44077.json index d58487748c..fa2e7d6350 100644 --- a/2021/CVE-2021-44077.json +++ b/2021/CVE-2021-44077.json @@ -13,10 +13,10 @@ "description": "Proof of Concept Exploit for ManageEngine ServiceDesk Plus CVE-2021-44077", "fork": false, "created_at": "2021-12-08T20:24:38Z", - "updated_at": "2023-12-21T06:40:08Z", + "updated_at": "2024-02-14T17:51:54Z", "pushed_at": "2021-12-08T21:43:16Z", - "stargazers_count": 28, - "watchers_count": 28, + "stargazers_count": 29, + "watchers_count": 29, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 28, + "watchers": 29, "score": 0, "subscribers_count": 4 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 50230949b4..ae3d57b9f1 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -907,7 +907,7 @@ "description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ", "fork": false, "created_at": "2021-12-10T23:19:28Z", - "updated_at": "2024-02-14T03:43:29Z", + "updated_at": "2024-02-14T15:19:54Z", "pushed_at": "2024-02-12T22:37:25Z", "stargazers_count": 1706, "watchers_count": 1706, diff --git a/2022/CVE-2022-22954.json b/2022/CVE-2022-22954.json index 01b6068b0d..6a6ffb2017 100644 --- a/2022/CVE-2022-22954.json +++ b/2022/CVE-2022-22954.json @@ -692,36 +692,6 @@ "score": 0, "subscribers_count": 1 }, - { - "id": 502734227, - "name": "CVE-2022-22954", - "full_name": "1SeaMy\/CVE-2022-22954", - "owner": { - "login": "1SeaMy", - "id": 92841021, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92841021?v=4", - "html_url": "https:\/\/github.com\/1SeaMy" - }, - "html_url": "https:\/\/github.com\/1SeaMy\/CVE-2022-22954", - "description": "I'm trying", - "fork": false, - "created_at": "2022-06-12T21:41:38Z", - "updated_at": "2024-02-12T20:12:09Z", - "pushed_at": "2022-06-12T21:49:39Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 - }, { "id": 524471767, "name": "CVE-2022-22954", diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index 7a59d427e6..669e32be4b 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -518,10 +518,10 @@ "description": "Confluence Pre-Auth Remote Code Execution via OGNL Injection (CVE-2022-26134)", "fork": false, "created_at": "2022-06-06T02:43:06Z", - "updated_at": "2024-01-11T14:51:06Z", + "updated_at": "2024-02-14T18:21:41Z", "pushed_at": "2022-06-06T03:37:25Z", - "stargazers_count": 35, - "watchers_count": 35, + "stargazers_count": 36, + "watchers_count": 36, "has_discussions": false, "forks_count": 13, "allow_forking": true, @@ -530,7 +530,7 @@ "topics": [], "visibility": "public", "forks": 13, - "watchers": 35, + "watchers": 36, "score": 0, "subscribers_count": 1 }, diff --git a/2022/CVE-2022-30075.json b/2022/CVE-2022-30075.json index 3528a6093f..dd707f13da 100644 --- a/2022/CVE-2022-30075.json +++ b/2022/CVE-2022-30075.json @@ -13,10 +13,10 @@ "description": "Tp-Link Archer AX50 Authenticated RCE (CVE-2022-30075)", "fork": false, "created_at": "2022-06-07T23:26:47Z", - "updated_at": "2024-02-08T08:12:36Z", + "updated_at": "2024-02-14T13:02:18Z", "pushed_at": "2022-11-20T03:03:53Z", - "stargazers_count": 203, - "watchers_count": 203, + "stargazers_count": 204, + "watchers_count": 204, "has_discussions": false, "forks_count": 49, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 49, - "watchers": 203, + "watchers": 204, "score": 0, "subscribers_count": 3 }, diff --git a/2022/CVE-2022-38694.json b/2022/CVE-2022-38694.json index 199a10cecc..1d554b93c4 100644 --- a/2022/CVE-2022-38694.json +++ b/2022/CVE-2022-38694.json @@ -14,7 +14,7 @@ "fork": false, "created_at": "2023-06-10T08:31:26Z", "updated_at": "2024-02-13T19:40:31Z", - "pushed_at": "2024-02-14T12:09:43Z", + "pushed_at": "2024-02-14T14:46:41Z", "stargazers_count": 166, "watchers_count": 166, "has_discussions": true, diff --git a/2022/CVE-2022-4262.json b/2022/CVE-2022-4262.json index 9588681f1d..64dea7ccda 100644 --- a/2022/CVE-2022-4262.json +++ b/2022/CVE-2022-4262.json @@ -13,10 +13,10 @@ "description": "Full Chain Analysis of CVE-2022-4262, a non-trivial feedback slot type confusion in V8.", "fork": false, "created_at": "2023-07-13T13:17:20Z", - "updated_at": "2024-02-13T16:13:18Z", + "updated_at": "2024-02-14T17:38:27Z", "pushed_at": "2024-02-11T03:01:51Z", - "stargazers_count": 56, - "watchers_count": 56, + "stargazers_count": 57, + "watchers_count": 57, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 10, - "watchers": 56, + "watchers": 57, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-20573.json b/2023/CVE-2023-20573.json index bdb3a289a2..f929427a94 100644 --- a/2023/CVE-2023-20573.json +++ b/2023/CVE-2023-20573.json @@ -13,10 +13,10 @@ "description": null, "fork": false, "created_at": "2023-03-11T15:04:51Z", - "updated_at": "2024-01-14T17:54:12Z", + "updated_at": "2024-02-14T15:13:16Z", "pushed_at": "2024-01-09T21:11:58Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2023/CVE-2023-25690.json b/2023/CVE-2023-25690.json index 7341971ab9..1aefdad826 100644 --- a/2023/CVE-2023-25690.json +++ b/2023/CVE-2023-25690.json @@ -47,10 +47,10 @@ "description": "CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.", "fork": false, "created_at": "2023-05-22T03:06:31Z", - "updated_at": "2024-02-10T23:38:55Z", + "updated_at": "2024-02-14T16:10:31Z", "pushed_at": "2023-09-10T10:44:32Z", - "stargazers_count": 240, - "watchers_count": 240, + "stargazers_count": 241, + "watchers_count": 241, "has_discussions": false, "forks_count": 35, "allow_forking": true, @@ -67,7 +67,7 @@ ], "visibility": "public", "forks": 35, - "watchers": 240, + "watchers": 241, "score": 0, "subscribers_count": 4 }, diff --git a/2023/CVE-2023-30547.json b/2023/CVE-2023-30547.json index 15512a5a21..895fe2b778 100644 --- a/2023/CVE-2023-30547.json +++ b/2023/CVE-2023-30547.json @@ -58,5 +58,35 @@ "watchers": 0, "score": 0, "subscribers_count": 1 + }, + { + "id": 757418361, + "name": "CVE-2023-30547", + "full_name": "Cur1iosity\/CVE-2023-30547", + "owner": { + "login": "Cur1iosity", + "id": 22967390, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22967390?v=4", + "html_url": "https:\/\/github.com\/Cur1iosity" + }, + "html_url": "https:\/\/github.com\/Cur1iosity\/CVE-2023-30547", + "description": "Tool for exploring CVE-2023-30547", + "fork": false, + "created_at": "2024-02-14T13:05:57Z", + "updated_at": "2024-02-14T13:25:25Z", + "pushed_at": "2024-02-14T13:25:21Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-36845.json b/2023/CVE-2023-36845.json index 2e3ab0beda..4a80f71c8f 100644 --- a/2023/CVE-2023-36845.json +++ b/2023/CVE-2023-36845.json @@ -443,5 +443,35 @@ "watchers": 5, "score": 0, "subscribers_count": 1 + }, + { + "id": 757410546, + "name": "CVE-2023-36845-Juniper-Vulnerability", + "full_name": "0xNehru\/CVE-2023-36845-Juniper-Vulnerability", + "owner": { + "login": "0xNehru", + "id": 160024662, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/160024662?v=4", + "html_url": "https:\/\/github.com\/0xNehru" + }, + "html_url": "https:\/\/github.com\/0xNehru\/CVE-2023-36845-Juniper-Vulnerability", + "description": "This Python script automates the Proof of Concept (PoC) for CVE-2023-36845, a vulnerability impacting Juniper Networks Junos OS on EX and SRX Series devices. The vulnerability resides in the J-Web component, allowing remote manipulation of the PHPRC variable, potentially leading to code injection.", + "fork": false, + "created_at": "2024-02-14T12:47:21Z", + "updated_at": "2024-02-14T14:51:34Z", + "pushed_at": "2024-02-14T14:07:11Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 } ] \ No newline at end of file diff --git a/2023/CVE-2023-47464.json b/2023/CVE-2023-47464.json new file mode 100644 index 0000000000..782f984dca --- /dev/null +++ b/2023/CVE-2023-47464.json @@ -0,0 +1,32 @@ +[ + { + "id": 757485554, + "name": "CVE-2023-47464", + "full_name": "HadessCS\/CVE-2023-47464", + "owner": { + "login": "HadessCS", + "id": 102136070, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102136070?v=4", + "html_url": "https:\/\/github.com\/HadessCS" + }, + "html_url": "https:\/\/github.com\/HadessCS\/CVE-2023-47464", + "description": "CVE-2023-47464 POC", + "fork": false, + "created_at": "2024-02-14T15:39:34Z", + "updated_at": "2024-02-14T15:40:38Z", + "pushed_at": "2024-02-14T15:43:30Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2023/CVE-2023-4911.json b/2023/CVE-2023-4911.json index f9ffef3a2c..50bdc611c2 100644 --- a/2023/CVE-2023-4911.json +++ b/2023/CVE-2023-4911.json @@ -43,10 +43,10 @@ "description": "PoC for CVE-2023-4911", "fork": false, "created_at": "2023-10-04T14:12:16Z", - "updated_at": "2024-02-09T14:12:36Z", + "updated_at": "2024-02-14T15:46:11Z", "pushed_at": "2023-10-04T14:16:36Z", - "stargazers_count": 369, - "watchers_count": 369, + "stargazers_count": 370, + "watchers_count": 370, "has_discussions": false, "forks_count": 60, "allow_forking": true, @@ -55,7 +55,7 @@ "topics": [], "visibility": "public", "forks": 60, - "watchers": 369, + "watchers": 370, "score": 0, "subscribers_count": 5 }, @@ -73,10 +73,10 @@ "description": "CVE-2023-4911 proof of concept", "fork": false, "created_at": "2023-10-04T14:32:49Z", - "updated_at": "2024-02-06T10:48:33Z", + "updated_at": "2024-02-14T13:11:24Z", "pushed_at": "2023-10-08T23:24:24Z", - "stargazers_count": 159, - "watchers_count": 159, + "stargazers_count": 160, + "watchers_count": 160, "has_discussions": false, "forks_count": 31, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 31, - "watchers": 159, + "watchers": 160, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-21626.json b/2024/CVE-2024-21626.json index cf1971be83..58d3de38e6 100644 --- a/2024/CVE-2024-21626.json +++ b/2024/CVE-2024-21626.json @@ -73,10 +73,10 @@ "description": null, "fork": false, "created_at": "2024-02-02T02:51:29Z", - "updated_at": "2024-02-04T09:05:55Z", + "updated_at": "2024-02-14T17:19:25Z", "pushed_at": "2024-02-02T09:49:34Z", - "stargazers_count": 11, - "watchers_count": 11, + "stargazers_count": 12, + "watchers_count": 12, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -85,7 +85,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 11, + "watchers": 12, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-21893.json b/2024/CVE-2024-21893.json index fc1a6d588c..76ceee949a 100644 --- a/2024/CVE-2024-21893.json +++ b/2024/CVE-2024-21893.json @@ -13,10 +13,10 @@ "description": "CVE-2024-21893: SSRF Vulnerability in Ivanti Connect Secure", "fork": false, "created_at": "2024-02-02T22:59:21Z", - "updated_at": "2024-02-14T09:27:57Z", + "updated_at": "2024-02-14T15:23:11Z", "pushed_at": "2024-02-02T23:27:10Z", - "stargazers_count": 61, - "watchers_count": 61, + "stargazers_count": 62, + "watchers_count": 62, "has_discussions": false, "forks_count": 10, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 10, - "watchers": 61, + "watchers": 62, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-22024.json b/2024/CVE-2024-22024.json index ce6c718f37..16f1d16fe6 100644 --- a/2024/CVE-2024-22024.json +++ b/2024/CVE-2024-22024.json @@ -13,10 +13,10 @@ "description": "Check for CVE-2024-22024 vulnerability in Ivanti Connect Secure", "fork": false, "created_at": "2024-02-09T14:31:56Z", - "updated_at": "2024-02-13T09:16:06Z", + "updated_at": "2024-02-14T15:39:08Z", "pushed_at": "2024-02-09T15:14:03Z", - "stargazers_count": 17, - "watchers_count": 17, + "stargazers_count": 18, + "watchers_count": 18, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -25,7 +25,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 17, + "watchers": 18, "score": 0, "subscribers_count": 2 }, diff --git a/2024/CVE-2024-23897.json b/2024/CVE-2024-23897.json index 95b412b4f8..78974dcf9a 100644 --- a/2024/CVE-2024-23897.json +++ b/2024/CVE-2024-23897.json @@ -215,14 +215,14 @@ { "id": 749060845, "name": "PoC-Fix-jenkins-rce_CVE-2024-23897", - "full_name": "iota4\/PoC-Fix-jenkins-rce_CVE-2024-23897", + "full_name": "10T4\/PoC-Fix-jenkins-rce_CVE-2024-23897", "owner": { - "login": "iota4", + "login": "10T4", "id": 148342080, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148342080?v=4", - "html_url": "https:\/\/github.com\/iota4" + "html_url": "https:\/\/github.com\/10T4" }, - "html_url": "https:\/\/github.com\/iota4\/PoC-Fix-jenkins-rce_CVE-2024-23897", + "html_url": "https:\/\/github.com\/10T4\/PoC-Fix-jenkins-rce_CVE-2024-23897", "description": "on this git you can find all information on the CVE-2024-23897", "fork": false, "created_at": "2024-01-27T13:27:57Z", diff --git a/2024/CVE-2024-24386.json b/2024/CVE-2024-24386.json new file mode 100644 index 0000000000..3716a439b4 --- /dev/null +++ b/2024/CVE-2024-24386.json @@ -0,0 +1,32 @@ +[ + { + "id": 755087413, + "name": "CVE-2024-24386", + "full_name": "erick-duarte\/CVE-2024-24386", + "owner": { + "login": "erick-duarte", + "id": 59427098, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59427098?v=4", + "html_url": "https:\/\/github.com\/erick-duarte" + }, + "html_url": "https:\/\/github.com\/erick-duarte\/CVE-2024-24386", + "description": null, + "fork": false, + "created_at": "2024-02-09T12:22:08Z", + "updated_at": "2024-02-14T13:50:39Z", + "pushed_at": "2024-02-14T13:42:48Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/README.md b/README.md index 78df41b5fa..cc28b6f5ff 100644 --- a/README.md +++ b/README.md @@ -323,7 +323,7 @@ - [vmtyan/poc-cve-2024-23897](https://github.com/vmtyan/poc-cve-2024-23897) - [yoryio/CVE-2024-23897](https://github.com/yoryio/CVE-2024-23897) - [CKevens/CVE-2024-23897](https://github.com/CKevens/CVE-2024-23897) -- [iota4/PoC-Fix-jenkins-rce_CVE-2024-23897](https://github.com/iota4/PoC-Fix-jenkins-rce_CVE-2024-23897) +- [10T4/PoC-Fix-jenkins-rce_CVE-2024-23897](https://github.com/10T4/PoC-Fix-jenkins-rce_CVE-2024-23897) - [wjlin0/CVE-2024-23897](https://github.com/wjlin0/CVE-2024-23897) - [Vozec/CVE-2024-23897](https://github.com/Vozec/CVE-2024-23897) - [raheel0x01/CVE-2024-23897](https://github.com/raheel0x01/CVE-2024-23897) @@ -411,6 +411,9 @@ - [nitipoom-jar/CVE-2024-24337](https://github.com/nitipoom-jar/CVE-2024-24337) +### CVE-2024-24386 +- [erick-duarte/CVE-2024-24386](https://github.com/erick-duarte/CVE-2024-24386) + ### CVE-2024-24396 (2024-02-05) Cross Site Scripting vulnerability in Stimulsoft GmbH Stimulsoft Dashboard.JS before v.2024.1.2 allows a remote attacker to execute arbitrary code via a crafted payload to the search bar component. @@ -3492,6 +3495,7 @@ - [rvizx/CVE-2023-30547](https://github.com/rvizx/CVE-2023-30547) - [user0x1337/CVE-2023-30547](https://github.com/user0x1337/CVE-2023-30547) +- [Cur1iosity/CVE-2023-30547](https://github.com/Cur1iosity/CVE-2023-30547) ### CVE-2023-30765 (2023-07-10) @@ -4770,6 +4774,7 @@ - [CharonDefalt/Juniper-exploit-CVE-2023-36845](https://github.com/CharonDefalt/Juniper-exploit-CVE-2023-36845) - [iveresk/CVE-2023-36845-6-](https://github.com/iveresk/CVE-2023-36845-6-) - [ak1t4/CVE-2023-36845](https://github.com/ak1t4/CVE-2023-36845) +- [0xNehru/CVE-2023-36845-Juniper-Vulnerability](https://github.com/0xNehru/CVE-2023-36845-Juniper-Vulnerability) ### CVE-2023-36846 (2023-08-17) @@ -6659,6 +6664,13 @@ - [aleksey-vi/CVE-2023-47460](https://github.com/aleksey-vi/CVE-2023-47460) +### CVE-2023-47464 (2023-11-29) + +Insecure Permissions vulnerability in GL.iNet AX1800 version 4.0.0 before 4.5.0 allows a remote attacker to execute arbitrary code via the upload API function. + + +- [HadessCS/CVE-2023-47464](https://github.com/HadessCS/CVE-2023-47464) + ### CVE-2023-47488 (2023-11-09) Cross Site Scripting vulnerability in Combodo iTop v.3.1.0-2-11973 allows a local attacker to obtain sensitive information via a crafted script to the attrib_manager_id parameter in the General Information page and the id parameter in the contact page. @@ -9009,7 +9021,6 @@ - [orwagodfather/CVE-2022-22954](https://github.com/orwagodfather/CVE-2022-22954) - [b4dboy17/CVE-2022-22954](https://github.com/b4dboy17/CVE-2022-22954) - [arzuozkan/CVE-2022-22954](https://github.com/arzuozkan/CVE-2022-22954) -- [1SeaMy/CVE-2022-22954](https://github.com/1SeaMy/CVE-2022-22954) - [amit-pathak009/CVE-2022-22954](https://github.com/amit-pathak009/CVE-2022-22954) - [amit-pathak009/CVE-2022-22954-PoC](https://github.com/amit-pathak009/CVE-2022-22954-PoC) - [Schira4396/VcenterKiller](https://github.com/Schira4396/VcenterKiller)