diff --git a/2007/CVE-2007-1858.json b/2007/CVE-2007-1858.json index 0806a347f4..2a8a529a12 100644 --- a/2007/CVE-2007-1858.json +++ b/2007/CVE-2007-1858.json @@ -14,7 +14,7 @@ "description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device", "fork": false, "created_at": "2021-01-01T12:26:08Z", - "updated_at": "2024-12-27T05:58:44Z", + "updated_at": "2025-01-04T11:54:28Z", "pushed_at": "2021-01-01T12:26:10Z", "stargazers_count": 4, "watchers_count": 4, diff --git a/2012/CVE-2012-4929.json b/2012/CVE-2012-4929.json index 2b4caed0aa..97f9dae46b 100644 --- a/2012/CVE-2012-4929.json +++ b/2012/CVE-2012-4929.json @@ -49,7 +49,7 @@ "description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device", "fork": false, "created_at": "2021-01-01T12:26:08Z", - "updated_at": "2024-12-27T05:58:44Z", + "updated_at": "2025-01-04T11:54:28Z", "pushed_at": "2021-01-01T12:26:10Z", "stargazers_count": 4, "watchers_count": 4, diff --git a/2014/CVE-2014-0160.json b/2014/CVE-2014-0160.json index 32021b9e32..06ba719464 100644 --- a/2014/CVE-2014-0160.json +++ b/2014/CVE-2014-0160.json @@ -14,10 +14,10 @@ "description": "A checker (site and tool) for CVE-2014-0160", "fork": false, "created_at": "2014-04-07T23:03:09Z", - "updated_at": "2024-12-30T01:43:06Z", + "updated_at": "2025-01-04T08:07:01Z", "pushed_at": "2021-02-24T09:17:24Z", - "stargazers_count": 2306, - "watchers_count": 2306, + "stargazers_count": 2305, + "watchers_count": 2305, "has_discussions": false, "forks_count": 461, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 461, - "watchers": 2306, + "watchers": 2305, "score": 0, "subscribers_count": 117 }, @@ -1666,7 +1666,7 @@ "description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device", "fork": false, "created_at": "2021-01-01T12:26:08Z", - "updated_at": "2024-12-27T05:58:44Z", + "updated_at": "2025-01-04T11:54:28Z", "pushed_at": "2021-01-01T12:26:10Z", "stargazers_count": 4, "watchers_count": 4, diff --git a/2014/CVE-2014-4210.json b/2014/CVE-2014-4210.json index 744760252e..a845a2076b 100644 --- a/2014/CVE-2014-4210.json +++ b/2014/CVE-2014-4210.json @@ -45,10 +45,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2025-01-01T16:33:30Z", + "updated_at": "2025-01-04T06:15:01Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 2013, - "watchers_count": 2013, + "stargazers_count": 2014, + "watchers_count": 2014, "has_discussions": true, "forks_count": 340, "allow_forking": true, @@ -78,7 +78,7 @@ ], "visibility": "public", "forks": 340, - "watchers": 2013, + "watchers": 2014, "score": 0, "subscribers_count": 38 }, diff --git a/2015/CVE-2015-0204.json b/2015/CVE-2015-0204.json index b46a5c2733..f44cc2be34 100644 --- a/2015/CVE-2015-0204.json +++ b/2015/CVE-2015-0204.json @@ -142,7 +142,7 @@ "description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device", "fork": false, "created_at": "2021-01-01T12:26:08Z", - "updated_at": "2024-12-27T05:58:44Z", + "updated_at": "2025-01-04T11:54:28Z", "pushed_at": "2021-01-01T12:26:10Z", "stargazers_count": 4, "watchers_count": 4, diff --git a/2016/CVE-2016-0638.json b/2016/CVE-2016-0638.json index 61aeb9e017..4af4c337db 100644 --- a/2016/CVE-2016-0638.json +++ b/2016/CVE-2016-0638.json @@ -14,10 +14,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2025-01-01T16:33:30Z", + "updated_at": "2025-01-04T06:15:01Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 2013, - "watchers_count": 2013, + "stargazers_count": 2014, + "watchers_count": 2014, "has_discussions": true, "forks_count": 340, "allow_forking": true, @@ -47,7 +47,7 @@ ], "visibility": "public", "forks": 340, - "watchers": 2013, + "watchers": 2014, "score": 0, "subscribers_count": 38 }, diff --git a/2016/CVE-2016-0800.json b/2016/CVE-2016-0800.json index 0806a347f4..2a8a529a12 100644 --- a/2016/CVE-2016-0800.json +++ b/2016/CVE-2016-0800.json @@ -14,7 +14,7 @@ "description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device", "fork": false, "created_at": "2021-01-01T12:26:08Z", - "updated_at": "2024-12-27T05:58:44Z", + "updated_at": "2025-01-04T11:54:28Z", "pushed_at": "2021-01-01T12:26:10Z", "stargazers_count": 4, "watchers_count": 4, diff --git a/2017/CVE-2017-0144.json b/2017/CVE-2017-0144.json index 346ca6c281..4e921c596a 100644 --- a/2017/CVE-2017-0144.json +++ b/2017/CVE-2017-0144.json @@ -14,10 +14,10 @@ "description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)", "fork": false, "created_at": "2017-07-16T19:44:04Z", - "updated_at": "2025-01-03T00:53:15Z", + "updated_at": "2025-01-04T08:46:48Z", "pushed_at": "2024-07-31T13:54:45Z", - "stargazers_count": 325, - "watchers_count": 325, + "stargazers_count": 326, + "watchers_count": 326, "has_discussions": false, "forks_count": 104, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 104, - "watchers": 325, + "watchers": 326, "score": 0, "subscribers_count": 22 }, diff --git a/2017/CVE-2017-11882.json b/2017/CVE-2017-11882.json index 4180978505..08b61fa7a3 100644 --- a/2017/CVE-2017-11882.json +++ b/2017/CVE-2017-11882.json @@ -76,10 +76,10 @@ "description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882", "fork": false, "created_at": "2017-11-21T05:55:53Z", - "updated_at": "2024-12-19T05:38:57Z", + "updated_at": "2025-01-04T08:49:03Z", "pushed_at": "2017-11-29T03:33:53Z", - "stargazers_count": 541, - "watchers_count": 541, + "stargazers_count": 540, + "watchers_count": 540, "has_discussions": false, "forks_count": 252, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 252, - "watchers": 541, + "watchers": 540, "score": 0, "subscribers_count": 28 }, diff --git a/2017/CVE-2017-2024.json b/2017/CVE-2017-2024.json index 7a33810824..628b8d9f4c 100644 --- a/2017/CVE-2017-2024.json +++ b/2017/CVE-2017-2024.json @@ -14,8 +14,8 @@ "description": "CVE-2017-9805 is a critical vulnerability in Apache Struts 2's Rest Plugin, allowing attackers to execute remote code via a specially crafted XML payload. If exploited, this vulnerability can lead to unauthorized system access and compromise vulnerable applications.", "fork": false, "created_at": "2025-01-02T11:06:58Z", - "updated_at": "2025-01-04T05:38:07Z", - "pushed_at": "2025-01-02T11:13:27Z", + "updated_at": "2025-01-04T07:47:22Z", + "pushed_at": "2025-01-04T07:47:19Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, diff --git a/2017/CVE-2017-3248.json b/2017/CVE-2017-3248.json index fcf3edc8e1..f4b52232e5 100644 --- a/2017/CVE-2017-3248.json +++ b/2017/CVE-2017-3248.json @@ -45,10 +45,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2025-01-01T16:33:30Z", + "updated_at": "2025-01-04T06:15:01Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 2013, - "watchers_count": 2013, + "stargazers_count": 2014, + "watchers_count": 2014, "has_discussions": true, "forks_count": 340, "allow_forking": true, @@ -78,7 +78,7 @@ ], "visibility": "public", "forks": 340, - "watchers": 2013, + "watchers": 2014, "score": 0, "subscribers_count": 38 }, diff --git a/2018/CVE-2018-14847.json b/2018/CVE-2018-14847.json index 40ea4672d7..236a5b4d3e 100644 --- a/2018/CVE-2018-14847.json +++ b/2018/CVE-2018-14847.json @@ -14,10 +14,10 @@ "description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)", "fork": false, "created_at": "2018-06-24T05:34:05Z", - "updated_at": "2024-11-27T08:06:40Z", + "updated_at": "2025-01-04T08:46:24Z", "pushed_at": "2020-10-16T12:09:45Z", - "stargazers_count": 511, - "watchers_count": 511, + "stargazers_count": 510, + "watchers_count": 510, "has_discussions": false, "forks_count": 454, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 454, - "watchers": 511, + "watchers": 510, "score": 0, "subscribers_count": 57 }, diff --git a/2018/CVE-2018-2628.json b/2018/CVE-2018-2628.json index a24335ae9b..b999a291d6 100644 --- a/2018/CVE-2018-2628.json +++ b/2018/CVE-2018-2628.json @@ -576,10 +576,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2025-01-01T16:33:30Z", + "updated_at": "2025-01-04T06:15:01Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 2013, - "watchers_count": 2013, + "stargazers_count": 2014, + "watchers_count": 2014, "has_discussions": true, "forks_count": 340, "allow_forking": true, @@ -609,7 +609,7 @@ ], "visibility": "public", "forks": 340, - "watchers": 2013, + "watchers": 2014, "score": 0, "subscribers_count": 38 }, diff --git a/2019/CVE-2019-1040.json b/2019/CVE-2019-1040.json index e7b8e7270d..624981e871 100644 --- a/2019/CVE-2019-1040.json +++ b/2019/CVE-2019-1040.json @@ -14,10 +14,10 @@ "description": "CVE-2019-1040 with Exchange", "fork": false, "created_at": "2019-06-14T11:16:03Z", - "updated_at": "2024-11-04T18:58:55Z", + "updated_at": "2025-01-04T08:07:11Z", "pushed_at": "2021-06-18T18:43:46Z", - "stargazers_count": 249, - "watchers_count": 249, + "stargazers_count": 248, + "watchers_count": 248, "has_discussions": false, "forks_count": 62, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 62, - "watchers": 249, + "watchers": 248, "score": 0, "subscribers_count": 4 }, diff --git a/2019/CVE-2019-17558.json b/2019/CVE-2019-17558.json index a97fbfae54..d9ba38d007 100644 --- a/2019/CVE-2019-17558.json +++ b/2019/CVE-2019-17558.json @@ -45,10 +45,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2025-01-03T22:00:40Z", + "updated_at": "2025-01-04T09:02:22Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 4152, - "watchers_count": 4152, + "stargazers_count": 4153, + "watchers_count": 4153, "has_discussions": false, "forks_count": 1099, "allow_forking": true, @@ -77,7 +77,7 @@ ], "visibility": "public", "forks": 1099, - "watchers": 4152, + "watchers": 4153, "score": 0, "subscribers_count": 149 }, diff --git a/2019/CVE-2019-18935.json b/2019/CVE-2019-18935.json index e30db6cee4..c82d1ad81b 100644 --- a/2019/CVE-2019-18935.json +++ b/2019/CVE-2019-18935.json @@ -45,10 +45,10 @@ "description": "RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.", "fork": false, "created_at": "2019-12-12T07:58:11Z", - "updated_at": "2024-12-05T04:57:10Z", + "updated_at": "2025-01-04T08:08:36Z", "pushed_at": "2022-04-14T18:23:38Z", - "stargazers_count": 349, - "watchers_count": 349, + "stargazers_count": 350, + "watchers_count": 350, "has_discussions": false, "forks_count": 85, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 85, - "watchers": 349, + "watchers": 350, "score": 0, "subscribers_count": 13 }, diff --git a/2019/CVE-2019-2618.json b/2019/CVE-2019-2618.json index f4d2d4c14f..b82189d01b 100644 --- a/2019/CVE-2019-2618.json +++ b/2019/CVE-2019-2618.json @@ -200,10 +200,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2025-01-01T16:33:30Z", + "updated_at": "2025-01-04T06:15:01Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 2013, - "watchers_count": 2013, + "stargazers_count": 2014, + "watchers_count": 2014, "has_discussions": true, "forks_count": 340, "allow_forking": true, @@ -233,7 +233,7 @@ ], "visibility": "public", "forks": 340, - "watchers": 2013, + "watchers": 2014, "score": 0, "subscribers_count": 38 } diff --git a/2019/CVE-2019-2725.json b/2019/CVE-2019-2725.json index 474b87fdd8..614ba367e3 100644 --- a/2019/CVE-2019-2725.json +++ b/2019/CVE-2019-2725.json @@ -262,10 +262,10 @@ "description": "CVE-2019-2725命令回显+webshell上传+最新绕过", "fork": false, "created_at": "2019-06-10T05:12:44Z", - "updated_at": "2024-12-22T09:35:21Z", + "updated_at": "2025-01-04T08:07:33Z", "pushed_at": "2019-06-21T03:33:05Z", - "stargazers_count": 190, - "watchers_count": 190, + "stargazers_count": 189, + "watchers_count": 189, "has_discussions": false, "forks_count": 66, "allow_forking": true, @@ -274,7 +274,7 @@ "topics": [], "visibility": "public", "forks": 66, - "watchers": 190, + "watchers": 189, "score": 0, "subscribers_count": 8 }, diff --git a/2019/CVE-2019-7609.json b/2019/CVE-2019-7609.json index fac6b59097..48f45ad785 100644 --- a/2019/CVE-2019-7609.json +++ b/2019/CVE-2019-7609.json @@ -79,10 +79,10 @@ "description": "exploit CVE-2019-7609(kibana RCE) on right way by python2 scripts", "fork": false, "created_at": "2019-10-21T15:31:13Z", - "updated_at": "2024-11-13T06:49:42Z", + "updated_at": "2025-01-04T08:05:49Z", "pushed_at": "2023-08-29T17:49:28Z", - "stargazers_count": 161, - "watchers_count": 161, + "stargazers_count": 160, + "watchers_count": 160, "has_discussions": false, "forks_count": 64, "allow_forking": true, @@ -95,7 +95,7 @@ ], "visibility": "public", "forks": 64, - "watchers": 161, + "watchers": 160, "score": 0, "subscribers_count": 7 }, diff --git a/2019/CVE-2019-9193.json b/2019/CVE-2019-9193.json index 401605bb69..4f75c6d106 100644 --- a/2019/CVE-2019-9193.json +++ b/2019/CVE-2019-9193.json @@ -14,10 +14,10 @@ "description": "PostgreSQL Remote Code Executuon", "fork": false, "created_at": "2020-02-12T00:17:58Z", - "updated_at": "2022-09-20T14:37:22Z", + "updated_at": "2025-01-04T08:07:10Z", "pushed_at": "2021-04-16T05:57:37Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 3, + "watchers_count": 3, "has_discussions": false, "forks_count": 2, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 2, - "watchers": 4, + "watchers": 3, "score": 0, "subscribers_count": 1 }, @@ -45,10 +45,10 @@ "description": "CVE-2019–9193 - PostgreSQL 9.3-12.3 Authenticated Remote Code Execution", "fork": false, "created_at": "2022-03-29T21:02:02Z", - "updated_at": "2024-09-28T21:21:50Z", + "updated_at": "2025-01-04T08:07:10Z", "pushed_at": "2022-05-26T23:00:33Z", - "stargazers_count": 18, - "watchers_count": 18, + "stargazers_count": 17, + "watchers_count": 17, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -65,7 +65,7 @@ ], "visibility": "public", "forks": 6, - "watchers": 18, + "watchers": 17, "score": 0, "subscribers_count": 1 }, diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json index 6693631491..b3452ee34a 100644 --- a/2020/CVE-2020-0796.json +++ b/2020/CVE-2020-0796.json @@ -138,10 +138,10 @@ "description": "Scanner for CVE-2020-0796 - SMBv3 RCE", "fork": false, "created_at": "2020-03-11T15:21:27Z", - "updated_at": "2024-12-26T20:23:23Z", + "updated_at": "2025-01-04T08:48:26Z", "pushed_at": "2020-10-01T08:36:29Z", - "stargazers_count": 669, - "watchers_count": 669, + "stargazers_count": 668, + "watchers_count": 668, "has_discussions": false, "forks_count": 195, "allow_forking": true, @@ -152,7 +152,7 @@ ], "visibility": "public", "forks": 195, - "watchers": 669, + "watchers": 668, "score": 0, "subscribers_count": 26 }, @@ -461,10 +461,10 @@ "description": "PoC for triggering buffer overflow via CVE-2020-0796", "fork": false, "created_at": "2020-03-12T18:34:40Z", - "updated_at": "2024-12-30T16:43:45Z", + "updated_at": "2025-01-04T08:48:27Z", "pushed_at": "2023-02-26T07:01:03Z", - "stargazers_count": 323, - "watchers_count": 323, + "stargazers_count": 322, + "watchers_count": 322, "has_discussions": false, "forks_count": 121, "allow_forking": true, @@ -478,7 +478,7 @@ ], "visibility": "public", "forks": 121, - "watchers": 323, + "watchers": 322, "score": 0, "subscribers_count": 19 }, diff --git a/2020/CVE-2020-14882.json b/2020/CVE-2020-14882.json index c94f0817c2..bee6fa0016 100644 --- a/2020/CVE-2020-14882.json +++ b/2020/CVE-2020-14882.json @@ -14,10 +14,10 @@ "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", - "updated_at": "2025-01-03T22:00:40Z", + "updated_at": "2025-01-04T09:02:22Z", "pushed_at": "2021-04-04T09:13:57Z", - "stargazers_count": 4152, - "watchers_count": 4152, + "stargazers_count": 4153, + "watchers_count": 4153, "has_discussions": false, "forks_count": 1099, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 1099, - "watchers": 4152, + "watchers": 4153, "score": 0, "subscribers_count": 149 }, diff --git a/2020/CVE-2020-24186.json b/2020/CVE-2020-24186.json index b46b8fee56..fd099354ed 100644 --- a/2020/CVE-2020-24186.json +++ b/2020/CVE-2020-24186.json @@ -14,10 +14,10 @@ "description": "wpDiscuz 7.0.4 Remote Code Execution", "fork": false, "created_at": "2021-06-13T23:10:19Z", - "updated_at": "2024-12-07T00:01:09Z", + "updated_at": "2025-01-04T08:47:10Z", "pushed_at": "2021-06-15T17:30:23Z", - "stargazers_count": 18, - "watchers_count": 18, + "stargazers_count": 17, + "watchers_count": 17, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 18, + "watchers": 17, "score": 0, "subscribers_count": 1 }, diff --git a/2020/CVE-2020-2551.json b/2020/CVE-2020-2551.json index 43088881db..7bece2e29e 100644 --- a/2020/CVE-2020-2551.json +++ b/2020/CVE-2020-2551.json @@ -14,10 +14,10 @@ "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "fork": false, "created_at": "2020-01-15T04:26:29Z", - "updated_at": "2025-01-01T16:33:30Z", + "updated_at": "2025-01-04T06:15:01Z", "pushed_at": "2023-11-24T09:21:56Z", - "stargazers_count": 2013, - "watchers_count": 2013, + "stargazers_count": 2014, + "watchers_count": 2014, "has_discussions": true, "forks_count": 340, "allow_forking": true, @@ -47,7 +47,7 @@ ], "visibility": "public", "forks": 340, - "watchers": 2013, + "watchers": 2014, "score": 0, "subscribers_count": 38 }, diff --git a/2021/CVE-2021-21017.json b/2021/CVE-2021-21017.json index 63e2842e50..b3505af79f 100644 --- a/2021/CVE-2021-21017.json +++ b/2021/CVE-2021-21017.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2021-02-26T14:18:13Z", - "updated_at": "2024-08-12T20:10:42Z", + "updated_at": "2025-01-04T08:07:55Z", "pushed_at": "2021-02-27T09:57:00Z", - "stargazers_count": 44, - "watchers_count": 44, + "stargazers_count": 43, + "watchers_count": 43, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 12, - "watchers": 44, + "watchers": 43, "score": 0, "subscribers_count": 1 }, diff --git a/2021/CVE-2021-22205.json b/2021/CVE-2021-22205.json index 0cd641b597..2a8725f967 100644 --- a/2021/CVE-2021-22205.json +++ b/2021/CVE-2021-22205.json @@ -138,10 +138,10 @@ "description": "CVE-2021-22205& GitLab CE\/EE RCE", "fork": false, "created_at": "2021-10-29T04:30:45Z", - "updated_at": "2024-12-07T03:09:54Z", + "updated_at": "2025-01-04T08:07:12Z", "pushed_at": "2022-11-16T08:14:33Z", - "stargazers_count": 267, - "watchers_count": 267, + "stargazers_count": 266, + "watchers_count": 266, "has_discussions": false, "forks_count": 99, "allow_forking": true, @@ -152,7 +152,7 @@ ], "visibility": "public", "forks": 99, - "watchers": 267, + "watchers": 266, "score": 0, "subscribers_count": 2 }, diff --git a/2021/CVE-2021-3129.json b/2021/CVE-2021-3129.json index c1cafe82c1..05f2dbe32c 100644 --- a/2021/CVE-2021-3129.json +++ b/2021/CVE-2021-3129.json @@ -76,10 +76,10 @@ "description": null, "fork": false, "created_at": "2021-01-25T08:42:28Z", - "updated_at": "2024-12-10T07:47:47Z", + "updated_at": "2025-01-04T08:46:41Z", "pushed_at": "2021-01-25T08:49:59Z", - "stargazers_count": 72, - "watchers_count": 72, + "stargazers_count": 71, + "watchers_count": 71, "has_discussions": false, "forks_count": 29, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 29, - "watchers": 72, + "watchers": 71, "score": 0, "subscribers_count": 1 }, diff --git a/2021/CVE-2021-31760.json b/2021/CVE-2021-31760.json index bbd184edf1..b1351db586 100644 --- a/2021/CVE-2021-31760.json +++ b/2021/CVE-2021-31760.json @@ -45,19 +45,19 @@ "description": "Exploiting a Cross-site request forgery (CSRF) attack to get a Remote Command Execution (RCE) through the Webmin's running process feature", "fork": false, "created_at": "2021-04-21T19:43:53Z", - "updated_at": "2022-12-05T03:51:06Z", + "updated_at": "2025-01-04T08:47:02Z", "pushed_at": "2021-04-24T22:06:53Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, - "forks_count": 8, + "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 8, - "watchers": 3, + "forks": 4, + "watchers": 2, "score": 0, "subscribers_count": 2 } diff --git a/2021/CVE-2021-3490.json b/2021/CVE-2021-3490.json index 5a95f23804..205ee52189 100644 --- a/2021/CVE-2021-3490.json +++ b/2021/CVE-2021-3490.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2021-06-24T18:50:17Z", - "updated_at": "2025-01-04T04:00:19Z", + "updated_at": "2025-01-04T09:07:09Z", "pushed_at": "2023-07-10T16:41:49Z", - "stargazers_count": 296, - "watchers_count": 296, + "stargazers_count": 297, + "watchers_count": 297, "has_discussions": false, "forks_count": 52, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 52, - "watchers": 296, + "watchers": 297, "score": 0, "subscribers_count": 8 }, diff --git a/2021/CVE-2021-42278.json b/2021/CVE-2021-42278.json index 7c67cb607b..dc99bcfb63 100644 --- a/2021/CVE-2021-42278.json +++ b/2021/CVE-2021-42278.json @@ -50,10 +50,10 @@ "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-13T10:28:12Z", - "updated_at": "2024-12-30T06:52:08Z", + "updated_at": "2025-01-04T08:46:31Z", "pushed_at": "2023-01-29T03:31:27Z", - "stargazers_count": 820, - "watchers_count": 820, + "stargazers_count": 819, + "watchers_count": 819, "has_discussions": false, "forks_count": 124, "allow_forking": true, @@ -62,7 +62,7 @@ "topics": [], "visibility": "public", "forks": 124, - "watchers": 820, + "watchers": 819, "score": 0, "subscribers_count": 13 }, diff --git a/2021/CVE-2021-42287.json b/2021/CVE-2021-42287.json index ccab2f6ae7..b94fe318ab 100644 --- a/2021/CVE-2021-42287.json +++ b/2021/CVE-2021-42287.json @@ -14,10 +14,10 @@ "description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.", "fork": false, "created_at": "2021-12-11T19:27:30Z", - "updated_at": "2025-01-04T01:27:44Z", + "updated_at": "2025-01-04T08:07:27Z", "pushed_at": "2021-12-16T09:50:15Z", - "stargazers_count": 1349, - "watchers_count": 1349, + "stargazers_count": 1348, + "watchers_count": 1348, "has_discussions": false, "forks_count": 323, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 323, - "watchers": 1349, + "watchers": 1348, "score": 0, "subscribers_count": 27 }, diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 74b7913172..49017c6fa7 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -1307,10 +1307,10 @@ "description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks", "fork": false, "created_at": "2021-12-11T07:19:11Z", - "updated_at": "2024-12-26T10:20:43Z", + "updated_at": "2025-01-04T07:09:29Z", "pushed_at": "2023-06-13T09:17:54Z", - "stargazers_count": 807, - "watchers_count": 807, + "stargazers_count": 808, + "watchers_count": 808, "has_discussions": false, "forks_count": 111, "allow_forking": true, @@ -1324,7 +1324,7 @@ ], "visibility": "public", "forks": 111, - "watchers": 807, + "watchers": 808, "score": 0, "subscribers_count": 11 }, diff --git a/2022/CVE-2022-22965.json b/2022/CVE-2022-22965.json index 6266878456..0b72d5b6b2 100644 --- a/2022/CVE-2022-22965.json +++ b/2022/CVE-2022-22965.json @@ -54,10 +54,10 @@ "description": "CVE-2022-22965 : about spring core rce", "fork": false, "created_at": "2022-03-30T14:35:00Z", - "updated_at": "2024-09-14T07:13:20Z", + "updated_at": "2025-01-04T08:08:06Z", "pushed_at": "2022-04-01T15:34:03Z", - "stargazers_count": 51, - "watchers_count": 51, + "stargazers_count": 50, + "watchers_count": 50, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -71,7 +71,7 @@ ], "visibility": "public", "forks": 18, - "watchers": 51, + "watchers": 50, "score": 0, "subscribers_count": 2 }, @@ -163,10 +163,10 @@ "description": "spring-core单个图形化利用工具,CVE-2022-22965及修复方案已出", "fork": false, "created_at": "2022-03-31T02:00:18Z", - "updated_at": "2024-09-05T01:33:20Z", + "updated_at": "2025-01-04T08:08:06Z", "pushed_at": "2022-04-02T15:29:31Z", - "stargazers_count": 18, - "watchers_count": 18, + "stargazers_count": 17, + "watchers_count": 17, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -175,7 +175,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 18, + "watchers": 17, "score": 0, "subscribers_count": 2 }, @@ -230,10 +230,10 @@ "description": "spring框架RCE漏洞 CVE-2022-22965", "fork": false, "created_at": "2022-03-31T12:41:29Z", - "updated_at": "2024-08-27T06:57:53Z", + "updated_at": "2025-01-04T08:08:24Z", "pushed_at": "2022-04-22T07:37:16Z", - "stargazers_count": 29, - "watchers_count": 29, + "stargazers_count": 28, + "watchers_count": 28, "has_discussions": false, "forks_count": 11, "allow_forking": true, @@ -242,7 +242,7 @@ "topics": [], "visibility": "public", "forks": 11, - "watchers": 29, + "watchers": 28, "score": 0, "subscribers_count": 1 }, diff --git a/2022/CVE-2022-23131.json b/2022/CVE-2022-23131.json index c5178e9f9d..7312c58f25 100644 --- a/2022/CVE-2022-23131.json +++ b/2022/CVE-2022-23131.json @@ -76,10 +76,10 @@ "description": "cve-2022-23131 zabbix-saml-bypass-exp", "fork": false, "created_at": "2022-02-18T11:51:47Z", - "updated_at": "2024-11-30T15:51:22Z", + "updated_at": "2025-01-04T08:11:13Z", "pushed_at": "2024-08-11T18:14:56Z", - "stargazers_count": 151, - "watchers_count": 151, + "stargazers_count": 150, + "watchers_count": 150, "has_discussions": false, "forks_count": 48, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 48, - "watchers": 151, + "watchers": 150, "score": 0, "subscribers_count": 2 }, diff --git a/2022/CVE-2022-25636.json b/2022/CVE-2022-25636.json index e963963c2a..3b0ca5a69e 100644 --- a/2022/CVE-2022-25636.json +++ b/2022/CVE-2022-25636.json @@ -14,10 +14,10 @@ "description": "CVE-2022-25636", "fork": false, "created_at": "2022-03-07T13:38:41Z", - "updated_at": "2024-12-26T08:40:19Z", + "updated_at": "2025-01-04T08:47:19Z", "pushed_at": "2022-03-07T17:18:19Z", - "stargazers_count": 428, - "watchers_count": 428, + "stargazers_count": 427, + "watchers_count": 427, "has_discussions": false, "forks_count": 83, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 83, - "watchers": 428, + "watchers": 427, "score": 0, "subscribers_count": 6 }, diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index e7c5dd52db..d4cec0f36d 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -14,10 +14,10 @@ "description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。", "fork": false, "created_at": "2022-05-31T07:44:01Z", - "updated_at": "2025-01-01T16:34:14Z", + "updated_at": "2025-01-04T09:08:42Z", "pushed_at": "2023-02-26T14:06:05Z", - "stargazers_count": 1172, - "watchers_count": 1172, + "stargazers_count": 1173, + "watchers_count": 1173, "has_discussions": true, "forks_count": 188, "allow_forking": true, @@ -46,7 +46,7 @@ ], "visibility": "public", "forks": 188, - "watchers": 1172, + "watchers": 1173, "score": 0, "subscribers_count": 19 }, @@ -167,10 +167,10 @@ "description": "CVE-2022-26134 - Confluence Pre-Auth RCE | OGNL injection", "fork": false, "created_at": "2022-06-03T19:24:30Z", - "updated_at": "2024-11-02T04:07:36Z", + "updated_at": "2025-01-04T08:49:03Z", "pushed_at": "2022-06-03T19:59:01Z", - "stargazers_count": 32, - "watchers_count": 32, + "stargazers_count": 31, + "watchers_count": 31, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -179,7 +179,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 32, + "watchers": 31, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-21839.json b/2023/CVE-2023-21839.json index 254e3e58a1..c0124b5503 100644 --- a/2023/CVE-2023-21839.json +++ b/2023/CVE-2023-21839.json @@ -45,10 +45,10 @@ "description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)", "fork": false, "created_at": "2023-02-24T13:54:42Z", - "updated_at": "2025-01-03T10:27:47Z", + "updated_at": "2025-01-04T08:29:43Z", "pushed_at": "2023-02-24T13:29:38Z", - "stargazers_count": 60, - "watchers_count": 60, + "stargazers_count": 62, + "watchers_count": 62, "has_discussions": false, "forks_count": 108, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 108, - "watchers": 60, + "watchers": 62, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index 4aee062869..df036dbf0a 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -14,10 +14,10 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2025-01-04T01:08:52Z", + "updated_at": "2025-01-04T07:29:58Z", "pushed_at": "2024-08-18T08:26:46Z", - "stargazers_count": 1335, - "watchers_count": 1335, + "stargazers_count": 1336, + "watchers_count": 1336, "has_discussions": false, "forks_count": 228, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 228, - "watchers": 1335, + "watchers": 1336, "score": 0, "subscribers_count": 21 }, diff --git a/2024/CVE-2024-12970.json b/2024/CVE-2024-12970.json index e0decb555e..3c6933311a 100644 --- a/2024/CVE-2024-12970.json +++ b/2024/CVE-2024-12970.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 2 } ] \ No newline at end of file diff --git a/2024/CVE-2024-31317.json b/2024/CVE-2024-31317.json index 230d943cef..2d0826922a 100644 --- a/2024/CVE-2024-31317.json +++ b/2024/CVE-2024-31317.json @@ -14,10 +14,10 @@ "description": "CVE-2024-31317", "fork": false, "created_at": "2024-12-05T01:36:59Z", - "updated_at": "2024-12-31T03:39:46Z", + "updated_at": "2025-01-04T07:07:09Z", "pushed_at": "2024-12-05T01:52:45Z", - "stargazers_count": 13, - "watchers_count": 13, + "stargazers_count": 14, + "watchers_count": 14, "has_discussions": false, "forks_count": 3, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 3, - "watchers": 13, + "watchers": 14, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-3393.json b/2024/CVE-2024-3393.json new file mode 100644 index 0000000000..daf2be7cef --- /dev/null +++ b/2024/CVE-2024-3393.json @@ -0,0 +1,33 @@ +[ + { + "id": 911931261, + "name": "-CVE-2024-3393", + "full_name": "FelixFoxf\/-CVE-2024-3393", + "owner": { + "login": "FelixFoxf", + "id": 114032917, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114032917?v=4", + "html_url": "https:\/\/github.com\/FelixFoxf", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/FelixFoxf\/-CVE-2024-3393", + "description": " CVE-2024-3393 EXPLOIT", + "fork": false, + "created_at": "2025-01-04T08:18:06Z", + "updated_at": "2025-01-04T08:19:40Z", + "pushed_at": "2025-01-04T08:19:36Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-49113.json b/2024/CVE-2024-49113.json index 2693ad1038..85375814ca 100644 --- a/2024/CVE-2024-49113.json +++ b/2024/CVE-2024-49113.json @@ -14,21 +14,21 @@ "description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113", "fork": false, "created_at": "2025-01-01T15:48:38Z", - "updated_at": "2025-01-04T01:38:15Z", + "updated_at": "2025-01-04T12:29:47Z", "pushed_at": "2025-01-02T16:07:23Z", - "stargazers_count": 326, - "watchers_count": 326, + "stargazers_count": 328, + "watchers_count": 328, "has_discussions": false, - "forks_count": 71, + "forks_count": 72, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 71, - "watchers": 326, + "forks": 72, + "watchers": 328, "score": 0, - "subscribers_count": 2 + "subscribers_count": 3 }, { "id": 911503737, @@ -59,6 +59,6 @@ "forks": 0, "watchers": 2, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-50498.json b/2024/CVE-2024-50498.json index 86a061cb30..7354dc24ea 100644 --- a/2024/CVE-2024-50498.json +++ b/2024/CVE-2024-50498.json @@ -90,6 +90,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-51378.json b/2024/CVE-2024-51378.json index f308085140..22aef9fa5a 100644 --- a/2024/CVE-2024-51378.json +++ b/2024/CVE-2024-51378.json @@ -59,6 +59,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-53677.json b/2024/CVE-2024-53677.json index a70c7d9fab..429537b701 100644 --- a/2024/CVE-2024-53677.json +++ b/2024/CVE-2024-53677.json @@ -276,6 +276,6 @@ "forks": 0, "watchers": 2, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-54330.json b/2024/CVE-2024-54330.json index b8c429b7c0..07a41b33ff 100644 --- a/2024/CVE-2024-54330.json +++ b/2024/CVE-2024-54330.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-55988.json b/2024/CVE-2024-55988.json index 50b6623248..221704d866 100644 --- a/2024/CVE-2024-55988.json +++ b/2024/CVE-2024-55988.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 1, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-56433.json b/2024/CVE-2024-56433.json index 9dc962ec47..c464c97955 100644 --- a/2024/CVE-2024-56433.json +++ b/2024/CVE-2024-56433.json @@ -28,6 +28,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2024/CVE-2024-6387.json b/2024/CVE-2024-6387.json index 4fb92049fe..9372dbcf4d 100644 --- a/2024/CVE-2024-6387.json +++ b/2024/CVE-2024-6387.json @@ -2945,6 +2945,6 @@ "forks": 0, "watchers": 0, "score": 0, - "subscribers_count": 0 + "subscribers_count": 1 } ] \ No newline at end of file diff --git a/README.md b/README.md index 3a7d4c326d..362fefda06 100644 --- a/README.md +++ b/README.md @@ -754,6 +754,13 @@ - [truonghuuphuc/CVE-2024-3293-Poc](https://github.com/truonghuuphuc/CVE-2024-3293-Poc) +### CVE-2024-3393 (2024-12-27) + +A Denial of Service vulnerability in the DNS Security feature of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to send a malicious packet through the data plane of the firewall that reboots the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode. + + +- [FelixFoxf/-CVE-2024-3393](https://github.com/FelixFoxf/-CVE-2024-3393) + ### CVE-2024-3400 (2024-04-12) A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.\n\nCloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.