diff --git a/2014/CVE-2014-4322.json b/2014/CVE-2014-4322.json index 0fab472cd7..bc6d73c09e 100644 --- a/2014/CVE-2014-4322.json +++ b/2014/CVE-2014-4322.json @@ -45,10 +45,10 @@ "description": "CVE-2014-4322 Exploit", "fork": false, "created_at": "2015-08-16T00:02:45Z", - "updated_at": "2024-10-01T14:26:56Z", + "updated_at": "2025-01-13T10:27:47Z", "pushed_at": "2016-01-24T16:19:47Z", - "stargazers_count": 22, - "watchers_count": 22, + "stargazers_count": 23, + "watchers_count": 23, "has_discussions": false, "forks_count": 18, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 18, - "watchers": 22, + "watchers": 23, "score": 0, "subscribers_count": 8 }, diff --git a/2014/CVE-2014-7911.json b/2014/CVE-2014-7911.json index d05b36ed1a..38f6a6589d 100644 --- a/2014/CVE-2014-7911.json +++ b/2014/CVE-2014-7911.json @@ -14,10 +14,10 @@ "description": "Local root exploit for Nexus5 Android 4.4.4(KTU84P)", "fork": false, "created_at": "2015-01-26T06:33:52Z", - "updated_at": "2024-07-12T09:42:33Z", + "updated_at": "2025-01-13T07:23:51Z", "pushed_at": "2015-01-27T09:43:42Z", - "stargazers_count": 146, - "watchers_count": 146, + "stargazers_count": 147, + "watchers_count": 147, "has_discussions": false, "forks_count": 79, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 79, - "watchers": 146, + "watchers": 147, "score": 0, "subscribers_count": 15 }, diff --git a/2015/CVE-2015-9251.json b/2015/CVE-2015-9251.json index f95cf00c3f..c82f0279b7 100644 --- a/2015/CVE-2015-9251.json +++ b/2015/CVE-2015-9251.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2018-12-20T12:12:59Z", - "updated_at": "2024-09-27T09:58:16Z", + "updated_at": "2025-01-13T07:10:03Z", "pushed_at": "2019-01-31T23:27:45Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, "forks_count": 7, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 7, - "watchers": 8, + "watchers": 9, "score": 0, "subscribers_count": 1 }, @@ -76,10 +76,10 @@ "description": "This repository contains a Proof of Concept (PoC) for CVE-2015-9251, a vulnerability in jQuery versions prior to 3.0.0 that allows attackers to perform Cross-Site Scripting (XSS) attacks under certain conditions.", "fork": false, "created_at": "2025-01-08T10:03:02Z", - "updated_at": "2025-01-09T08:28:30Z", + "updated_at": "2025-01-13T07:10:15Z", "pushed_at": "2025-01-09T08:28:27Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2017/CVE-2017-5638.json b/2017/CVE-2017-5638.json index c059c831d4..58ff571a15 100644 --- a/2017/CVE-2017-5638.json +++ b/2017/CVE-2017-5638.json @@ -429,10 +429,10 @@ "description": "An exploit for Apache Struts CVE-2017-5638", "fork": false, "created_at": "2017-03-12T02:02:25Z", - "updated_at": "2025-01-07T21:31:09Z", + "updated_at": "2025-01-13T08:45:03Z", "pushed_at": "2018-05-21T18:33:26Z", - "stargazers_count": 429, - "watchers_count": 429, + "stargazers_count": 428, + "watchers_count": 428, "has_discussions": false, "forks_count": 135, "allow_forking": true, @@ -447,7 +447,7 @@ ], "visibility": "public", "forks": 135, - "watchers": 429, + "watchers": 428, "score": 0, "subscribers_count": 22 }, diff --git a/2017/CVE-2017-7921.json b/2017/CVE-2017-7921.json index b4871583ce..a15bd344eb 100644 --- a/2017/CVE-2017-7921.json +++ b/2017/CVE-2017-7921.json @@ -458,10 +458,10 @@ "description": "Identify hikvision ip and probe for cve-s (CVE-2017-7921, CVE-2022-28171, CVE-2021-36260)", "fork": false, "created_at": "2024-11-26T13:02:18Z", - "updated_at": "2024-11-26T13:23:21Z", + "updated_at": "2025-01-13T11:38:52Z", "pushed_at": "2024-11-26T13:21:56Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -470,7 +470,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 5c346292c4..f70380a7cf 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -55,13 +55,13 @@ "stargazers_count": 13, "watchers_count": 13, "has_discussions": false, - "forks_count": 63, + "forks_count": 61, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 63, + "forks": 61, "watchers": 13, "score": 0, "subscribers_count": 2 @@ -112,10 +112,10 @@ "description": "CVE-2019-0708-exploit", "fork": false, "created_at": "2019-05-15T02:24:21Z", - "updated_at": "2024-11-20T06:13:32Z", + "updated_at": "2025-01-13T10:04:30Z", "pushed_at": "2019-05-15T02:26:46Z", - "stargazers_count": 117, - "watchers_count": 117, + "stargazers_count": 118, + "watchers_count": 118, "has_discussions": false, "forks_count": 24, "allow_forking": true, @@ -124,7 +124,7 @@ "topics": [], "visibility": "public", "forks": 24, - "watchers": 117, + "watchers": 118, "score": 0, "subscribers_count": 8 }, @@ -422,10 +422,10 @@ "description": "3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)", "fork": false, "created_at": "2019-05-15T15:01:38Z", - "updated_at": "2024-11-01T02:37:48Z", + "updated_at": "2025-01-13T09:59:12Z", "pushed_at": "2019-06-13T13:07:03Z", - "stargazers_count": 388, - "watchers_count": 388, + "stargazers_count": 389, + "watchers_count": 389, "has_discussions": false, "forks_count": 189, "allow_forking": true, @@ -445,7 +445,7 @@ ], "visibility": "public", "forks": 189, - "watchers": 388, + "watchers": 389, "score": 0, "subscribers_count": 16 }, @@ -1747,10 +1747,10 @@ "description": "Only Hitting PoC [Tested on Windows Server 2008 r2]", "fork": false, "created_at": "2019-05-28T02:25:21Z", - "updated_at": "2024-10-07T22:23:45Z", + "updated_at": "2025-01-13T10:03:50Z", "pushed_at": "2019-05-28T02:46:19Z", - "stargazers_count": 127, - "watchers_count": 127, + "stargazers_count": 128, + "watchers_count": 128, "has_discussions": false, "forks_count": 43, "allow_forking": true, @@ -1759,7 +1759,7 @@ "topics": [], "visibility": "public", "forks": 43, - "watchers": 127, + "watchers": 128, "score": 0, "subscribers_count": 10 }, @@ -1995,10 +1995,10 @@ "description": "An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits", "fork": false, "created_at": "2019-05-31T00:04:12Z", - "updated_at": "2024-10-02T21:50:49Z", + "updated_at": "2025-01-13T10:23:37Z", "pushed_at": "2021-01-10T04:31:22Z", - "stargazers_count": 344, - "watchers_count": 344, + "stargazers_count": 345, + "watchers_count": 345, "has_discussions": false, "forks_count": 125, "allow_forking": true, @@ -2007,7 +2007,7 @@ "topics": [], "visibility": "public", "forks": 125, - "watchers": 344, + "watchers": 345, "score": 0, "subscribers_count": 30 }, @@ -3086,10 +3086,10 @@ "description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell", "fork": false, "created_at": "2020-01-21T02:22:29Z", - "updated_at": "2025-01-08T03:08:59Z", + "updated_at": "2025-01-13T10:01:48Z", "pushed_at": "2020-01-21T03:15:41Z", - "stargazers_count": 323, - "watchers_count": 323, + "stargazers_count": 324, + "watchers_count": 324, "has_discussions": false, "forks_count": 71, "allow_forking": true, @@ -3098,7 +3098,7 @@ "topics": [], "visibility": "public", "forks": 71, - "watchers": 323, + "watchers": 324, "score": 0, "subscribers_count": 6 }, @@ -3148,10 +3148,10 @@ "description": "CVE-2019-0708 (BlueKeep) proof of concept allowing pre-auth RCE on Windows7", "fork": false, "created_at": "2020-03-15T19:33:53Z", - "updated_at": "2024-12-20T16:56:29Z", + "updated_at": "2025-01-13T10:48:31Z", "pushed_at": "2022-03-28T04:10:20Z", - "stargazers_count": 131, - "watchers_count": 131, + "stargazers_count": 132, + "watchers_count": 132, "has_discussions": false, "forks_count": 21, "allow_forking": true, @@ -3160,7 +3160,7 @@ "topics": [], "visibility": "public", "forks": 21, - "watchers": 131, + "watchers": 132, "score": 0, "subscribers_count": 4 }, @@ -3644,10 +3644,10 @@ "description": null, "fork": false, "created_at": "2024-06-02T12:03:12Z", - "updated_at": "2024-06-02T12:08:26Z", + "updated_at": "2025-01-13T10:34:49Z", "pushed_at": "2024-06-02T12:08:23Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -3656,7 +3656,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 }, diff --git a/2019/CVE-2019-11043.json b/2019/CVE-2019-11043.json index 9d7d3e39c2..eb6c029ce5 100644 --- a/2019/CVE-2019-11043.json +++ b/2019/CVE-2019-11043.json @@ -14,10 +14,10 @@ "description": "Exploit for CVE-2019-11043", "fork": false, "created_at": "2019-09-23T21:37:27Z", - "updated_at": "2024-12-22T19:40:46Z", + "updated_at": "2025-01-13T08:49:52Z", "pushed_at": "2019-11-12T18:53:14Z", - "stargazers_count": 1800, - "watchers_count": 1800, + "stargazers_count": 1801, + "watchers_count": 1801, "has_discussions": false, "forks_count": 249, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 249, - "watchers": 1800, + "watchers": 1801, "score": 0, "subscribers_count": 37 }, diff --git a/2019/CVE-2019-11358.json b/2019/CVE-2019-11358.json index 8e1647dfa9..f257db0fc3 100644 --- a/2019/CVE-2019-11358.json +++ b/2019/CVE-2019-11358.json @@ -132,13 +132,13 @@ "stargazers_count": 181, "watchers_count": 181, "has_discussions": false, - "forks_count": 61, + "forks_count": 62, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 61, + "forks": 62, "watchers": 181, "score": 0, "subscribers_count": 13 diff --git a/2021/CVE-2021-36260.json b/2021/CVE-2021-36260.json index 1dd7a04ecd..050c8e53d6 100644 --- a/2021/CVE-2021-36260.json +++ b/2021/CVE-2021-36260.json @@ -265,10 +265,10 @@ "description": "Identify hikvision ip and probe for cve-s (CVE-2017-7921, CVE-2022-28171, CVE-2021-36260)", "fork": false, "created_at": "2024-11-26T13:02:18Z", - "updated_at": "2024-11-26T13:23:21Z", + "updated_at": "2025-01-13T11:38:52Z", "pushed_at": "2024-11-26T13:21:56Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -277,7 +277,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2021/CVE-2021-44228.json b/2021/CVE-2021-44228.json index 97c3c1b24e..05f4399a3d 100644 --- a/2021/CVE-2021-44228.json +++ b/2021/CVE-2021-44228.json @@ -386,7 +386,7 @@ "stargazers_count": 1112, "watchers_count": 1112, "has_discussions": false, - "forks_count": 535, + "forks_count": 536, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -394,7 +394,7 @@ "log4shell" ], "visibility": "public", - "forks": 535, + "forks": 536, "watchers": 1112, "score": 0, "subscribers_count": 23 diff --git a/2022/CVE-2022-0847.json b/2022/CVE-2022-0847.json index 5ae27a3ce7..d71398d742 100644 --- a/2022/CVE-2022-0847.json +++ b/2022/CVE-2022-0847.json @@ -1163,10 +1163,10 @@ "description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.", "fork": false, "created_at": "2022-03-12T20:57:24Z", - "updated_at": "2025-01-11T20:50:39Z", + "updated_at": "2025-01-13T06:46:17Z", "pushed_at": "2023-05-20T05:55:45Z", - "stargazers_count": 565, - "watchers_count": 565, + "stargazers_count": 566, + "watchers_count": 566, "has_discussions": false, "forks_count": 144, "allow_forking": true, @@ -1175,7 +1175,7 @@ "topics": [], "visibility": "public", "forks": 144, - "watchers": 565, + "watchers": 566, "score": 0, "subscribers_count": 15 }, diff --git a/2022/CVE-2022-26809.json b/2022/CVE-2022-26809.json index c296ec75ea..8bf9f2ba59 100644 --- a/2022/CVE-2022-26809.json +++ b/2022/CVE-2022-26809.json @@ -266,10 +266,10 @@ "description": "警惕 一种针对红队的新型溯源手段!", "fork": false, "created_at": "2022-07-27T15:48:19Z", - "updated_at": "2025-01-03T19:17:19Z", + "updated_at": "2025-01-13T10:03:02Z", "pushed_at": "2022-07-27T15:55:01Z", - "stargazers_count": 395, - "watchers_count": 395, + "stargazers_count": 396, + "watchers_count": 396, "has_discussions": false, "forks_count": 82, "allow_forking": true, @@ -278,7 +278,7 @@ "topics": [], "visibility": "public", "forks": 82, - "watchers": 395, + "watchers": 396, "score": 0, "subscribers_count": 2 }, diff --git a/2022/CVE-2022-26923.json b/2022/CVE-2022-26923.json index 1d51b257f4..7a53373e82 100644 --- a/2022/CVE-2022-26923.json +++ b/2022/CVE-2022-26923.json @@ -112,13 +112,13 @@ "stargazers_count": 43, "watchers_count": 43, "has_discussions": false, - "forks_count": 11, + "forks_count": 12, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 11, + "forks": 12, "watchers": 43, "score": 0, "subscribers_count": 2 diff --git a/2022/CVE-2022-28171.json b/2022/CVE-2022-28171.json index 4d6d4f2720..5de4d9c4dc 100644 --- a/2022/CVE-2022-28171.json +++ b/2022/CVE-2022-28171.json @@ -45,10 +45,10 @@ "description": "Identify hikvision ip and probe for cve-s (CVE-2017-7921, CVE-2022-28171, CVE-2021-36260)", "fork": false, "created_at": "2024-11-26T13:02:18Z", - "updated_at": "2024-11-26T13:23:21Z", + "updated_at": "2025-01-13T11:38:52Z", "pushed_at": "2024-11-26T13:21:56Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/2022/CVE-2022-30190.json b/2022/CVE-2022-30190.json index e34a261963..913f35dd48 100644 --- a/2022/CVE-2022-30190.json +++ b/2022/CVE-2022-30190.json @@ -1121,10 +1121,10 @@ "description": "All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps such as Word. This is a very simple POC, feel free to check the sources below for more threat intelligence.", "fork": false, "created_at": "2022-06-03T00:25:37Z", - "updated_at": "2024-07-17T14:32:06Z", + "updated_at": "2025-01-13T07:54:46Z", "pushed_at": "2022-08-06T01:04:51Z", - "stargazers_count": 23, - "watchers_count": 23, + "stargazers_count": 24, + "watchers_count": 24, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -1133,7 +1133,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 23, + "watchers": 24, "score": 0, "subscribers_count": 2 }, diff --git a/2023/CVE-2023-22527.json b/2023/CVE-2023-22527.json index 260a8c1a12..72b8b31ca0 100644 --- a/2023/CVE-2023-22527.json +++ b/2023/CVE-2023-22527.json @@ -606,10 +606,10 @@ "description": "confluence CVE-2023-22527 漏洞利用工具,支持冰蝎\/哥斯拉内存马注入,支持设置 http 代理", "fork": false, "created_at": "2024-02-26T02:34:44Z", - "updated_at": "2024-12-29T10:33:38Z", + "updated_at": "2025-01-13T08:27:08Z", "pushed_at": "2024-04-24T02:34:16Z", - "stargazers_count": 38, - "watchers_count": 38, + "stargazers_count": 39, + "watchers_count": 39, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -618,7 +618,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 38, + "watchers": 39, "score": 0, "subscribers_count": 1 }, diff --git a/2023/CVE-2023-45777.json b/2023/CVE-2023-45777.json index 5e15dd5481..aef5718ce5 100644 --- a/2023/CVE-2023-45777.json +++ b/2023/CVE-2023-45777.json @@ -14,10 +14,10 @@ "description": "Writeup and exploit for CVE-2023-45777, bypass for Intent validation inside AccountManagerService on Android 13 despite \"Lazy Bundle\" mitigation", "fork": false, "created_at": "2024-01-20T07:14:06Z", - "updated_at": "2025-01-13T05:51:37Z", + "updated_at": "2025-01-13T09:07:02Z", "pushed_at": "2024-01-21T05:04:01Z", - "stargazers_count": 83, - "watchers_count": 83, + "stargazers_count": 84, + "watchers_count": 84, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 83, + "watchers": 84, "score": 0, "subscribers_count": 4 } diff --git a/2024/CVE-2024-10914.json b/2024/CVE-2024-10914.json index 9fcfe00ba6..5c6dad627d 100644 --- a/2024/CVE-2024-10914.json +++ b/2024/CVE-2024-10914.json @@ -45,10 +45,10 @@ "description": "POC - CVE-2024–10914- Command Injection Vulnerability in `name` parameter for D-Link NAS", "fork": false, "created_at": "2024-11-10T12:01:21Z", - "updated_at": "2024-12-30T21:06:51Z", + "updated_at": "2025-01-13T09:55:07Z", "pushed_at": "2024-11-27T08:26:29Z", - "stargazers_count": 42, - "watchers_count": 42, + "stargazers_count": 43, + "watchers_count": 43, "has_discussions": false, "forks_count": 12, "allow_forking": true, @@ -65,7 +65,7 @@ ], "visibility": "public", "forks": 12, - "watchers": 42, + "watchers": 43, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-30088.json b/2024/CVE-2024-30088.json index 56465194f3..698bed2a2e 100644 --- a/2024/CVE-2024-30088.json +++ b/2024/CVE-2024-30088.json @@ -76,10 +76,10 @@ "description": "该漏洞存在于 NtQueryInformationToken 函数中,特别是在处理AuthzBasepCopyoutInternalSecurityAttributes 函数时,该漏洞源于内核在操作对象时对锁定机制的不当管理,这一失误可能导致恶意实体意外提升权限。", "fork": false, "created_at": "2024-07-05T16:02:56Z", - "updated_at": "2024-11-27T08:32:37Z", + "updated_at": "2025-01-13T09:56:20Z", "pushed_at": "2024-07-05T16:06:16Z", - "stargazers_count": 34, - "watchers_count": 34, + "stargazers_count": 35, + "watchers_count": 35, "has_discussions": false, "forks_count": 15, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 15, - "watchers": 34, + "watchers": 35, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json index 8b0e6d33cc..a98abdce77 100644 --- a/2024/CVE-2024-3094.json +++ b/2024/CVE-2024-3094.json @@ -957,13 +957,13 @@ "stargazers_count": 3506, "watchers_count": 3506, "has_discussions": false, - "forks_count": 240, + "forks_count": 239, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 240, + "forks": 239, "watchers": 3506, "score": 0, "subscribers_count": 38 diff --git a/2024/CVE-2024-38193.json b/2024/CVE-2024-38193.json index 6a19bc447b..4286895aba 100644 --- a/2024/CVE-2024-38193.json +++ b/2024/CVE-2024-38193.json @@ -14,19 +14,19 @@ "description": null, "fork": false, "created_at": "2024-12-03T08:56:59Z", - "updated_at": "2025-01-04T03:15:45Z", + "updated_at": "2025-01-13T10:22:54Z", "pushed_at": "2024-11-18T23:48:31Z", - "stargazers_count": 48, - "watchers_count": 48, + "stargazers_count": 49, + "watchers_count": 49, "has_discussions": false, - "forks_count": 23, + "forks_count": 24, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 23, - "watchers": 48, + "forks": 24, + "watchers": 49, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-41713.json b/2024/CVE-2024-41713.json index b204802597..5c5d606796 100644 --- a/2024/CVE-2024-41713.json +++ b/2024/CVE-2024-41713.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2024-12-05T06:13:57Z", - "updated_at": "2025-01-09T08:12:34Z", + "updated_at": "2025-01-13T07:40:10Z", "pushed_at": "2024-12-05T07:55:04Z", - "stargazers_count": 14, - "watchers_count": 14, + "stargazers_count": 15, + "watchers_count": 15, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 14, + "watchers": 15, "score": 0, "subscribers_count": 1 }, diff --git a/2024/CVE-2024-42327.json b/2024/CVE-2024-42327.json index 48b88c438a..bda4bf6c11 100644 --- a/2024/CVE-2024-42327.json +++ b/2024/CVE-2024-42327.json @@ -50,13 +50,13 @@ "stargazers_count": 17, "watchers_count": 17, "has_discussions": false, - "forks_count": 6, + "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 6, + "forks": 7, "watchers": 17, "score": 0, "subscribers_count": 1 diff --git a/2024/CVE-2024-47575.json b/2024/CVE-2024-47575.json index 98bbf5e0a4..014e7e1e9b 100644 --- a/2024/CVE-2024-47575.json +++ b/2024/CVE-2024-47575.json @@ -14,10 +14,10 @@ "description": "Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575", "fork": false, "created_at": "2024-11-07T21:03:30Z", - "updated_at": "2025-01-12T23:38:11Z", + "updated_at": "2025-01-13T12:27:15Z", "pushed_at": "2024-11-14T16:25:52Z", - "stargazers_count": 80, - "watchers_count": 80, + "stargazers_count": 81, + "watchers_count": 81, "has_discussions": false, "forks_count": 23, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 23, - "watchers": 80, + "watchers": 81, "score": 0, "subscribers_count": 0 }, diff --git a/2024/CVE-2024-49113.json b/2024/CVE-2024-49113.json index c1a44a7ae7..038c4a117c 100644 --- a/2024/CVE-2024-49113.json +++ b/2024/CVE-2024-49113.json @@ -14,19 +14,19 @@ "description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113", "fork": false, "created_at": "2025-01-01T15:48:38Z", - "updated_at": "2025-01-13T05:39:08Z", + "updated_at": "2025-01-13T10:22:25Z", "pushed_at": "2025-01-02T16:07:23Z", - "stargazers_count": 431, - "watchers_count": 431, + "stargazers_count": 437, + "watchers_count": 437, "has_discussions": false, - "forks_count": 102, + "forks_count": 103, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 102, - "watchers": 431, + "forks": 103, + "watchers": 437, "score": 0, "subscribers_count": 3 }, @@ -45,10 +45,10 @@ "description": null, "fork": false, "created_at": "2025-01-03T07:05:33Z", - "updated_at": "2025-01-11T11:34:30Z", + "updated_at": "2025-01-13T09:53:17Z", "pushed_at": "2025-01-03T08:20:03Z", - "stargazers_count": 8, - "watchers_count": 8, + "stargazers_count": 9, + "watchers_count": 9, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 8, + "watchers": 9, "score": 0, "subscribers_count": 1 }, @@ -76,10 +76,10 @@ "description": "Hi, This is to check targets vulnerable for CVE-2024-49113 in bulk, faster.", "fork": false, "created_at": "2025-01-06T11:59:02Z", - "updated_at": "2025-01-10T16:41:30Z", + "updated_at": "2025-01-13T09:53:19Z", "pushed_at": "2025-01-06T12:04:02Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 1, + "watchers": 2, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-50404.json b/2024/CVE-2024-50404.json new file mode 100644 index 0000000000..29ad07dbeb --- /dev/null +++ b/2024/CVE-2024-50404.json @@ -0,0 +1,33 @@ +[ + { + "id": 916015819, + "name": "CVE-2024-50404", + "full_name": "C411e\/CVE-2024-50404", + "owner": { + "login": "C411e", + "id": 35147719, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35147719?v=4", + "html_url": "https:\/\/github.com\/C411e", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/C411e\/CVE-2024-50404", + "description": "CVE-2024-50404", + "fork": false, + "created_at": "2025-01-13T09:47:03Z", + "updated_at": "2025-01-13T10:15:15Z", + "pushed_at": "2025-01-13T10:15:12Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-50603.json b/2024/CVE-2024-50603.json index 7131989d9d..ead6e8cadf 100644 --- a/2024/CVE-2024-50603.json +++ b/2024/CVE-2024-50603.json @@ -45,10 +45,10 @@ "description": "CVE-2024-50603: Aviatrix Controller Unauthenticated Command Injection", "fork": false, "created_at": "2025-01-12T11:20:21Z", - "updated_at": "2025-01-12T23:10:49Z", + "updated_at": "2025-01-13T10:07:24Z", "pushed_at": "2025-01-12T16:35:36Z", - "stargazers_count": 4, - "watchers_count": 4, + "stargazers_count": 5, + "watchers_count": 5, "has_discussions": false, "forks_count": 1, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 1, - "watchers": 4, + "watchers": 5, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-53691.json b/2024/CVE-2024-53691.json new file mode 100644 index 0000000000..f5713250cf --- /dev/null +++ b/2024/CVE-2024-53691.json @@ -0,0 +1,33 @@ +[ + { + "id": 916024485, + "name": "CVE-2024-53691", + "full_name": "C411e\/CVE-2024-53691", + "owner": { + "login": "C411e", + "id": 35147719, + "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35147719?v=4", + "html_url": "https:\/\/github.com\/C411e", + "user_view_type": "public" + }, + "html_url": "https:\/\/github.com\/C411e\/CVE-2024-53691", + "description": "CVE-2024-53691", + "fork": false, + "created_at": "2025-01-13T10:07:25Z", + "updated_at": "2025-01-13T10:17:01Z", + "pushed_at": "2025-01-13T10:16:58Z", + "stargazers_count": 0, + "watchers_count": 0, + "has_discussions": false, + "forks_count": 0, + "allow_forking": true, + "is_template": false, + "web_commit_signoff_required": false, + "topics": [], + "visibility": "public", + "forks": 0, + "watchers": 0, + "score": 0, + "subscribers_count": 0 + } +] \ No newline at end of file diff --git a/2024/CVE-2024-54498.json b/2024/CVE-2024-54498.json index d2f3154670..54c7b8b128 100644 --- a/2024/CVE-2024-54498.json +++ b/2024/CVE-2024-54498.json @@ -14,10 +14,10 @@ "description": "Escape macOS Sandbox using sharedfilelistd exploit", "fork": false, "created_at": "2025-01-08T09:55:44Z", - "updated_at": "2025-01-13T02:16:47Z", + "updated_at": "2025-01-13T08:23:43Z", "pushed_at": "2025-01-09T06:34:50Z", - "stargazers_count": 27, - "watchers_count": 27, + "stargazers_count": 29, + "watchers_count": 29, "has_discussions": false, "forks_count": 4, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 4, - "watchers": 27, + "watchers": 29, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-56331.json b/2024/CVE-2024-56331.json index 7eb5341805..35a5f95a75 100644 --- a/2024/CVE-2024-56331.json +++ b/2024/CVE-2024-56331.json @@ -14,10 +14,10 @@ "description": null, "fork": false, "created_at": "2024-11-25T08:16:38Z", - "updated_at": "2024-12-21T21:10:32Z", + "updated_at": "2025-01-13T10:10:25Z", "pushed_at": "2024-12-21T21:09:33Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 1 } diff --git a/README.md b/README.md index c91a11fbd2..d039ea5e58 100644 --- a/README.md +++ b/README.md @@ -7481,6 +7481,13 @@ - [neko-hat/CVE-2024-50395](https://github.com/neko-hat/CVE-2024-50395) +### CVE-2024-50404 (2024-12-06) + +A link following vulnerability has been reported to affect Qsync Central. If exploited, the vulnerability could allow remote attackers who have gained user access to traverse the file system to unintended locations.\n\nWe have already fixed the vulnerability in the following versions:\nQsync Central 4.4.0.16_20240819 ( 2024/08/19 ) and later + + +- [C411e/CVE-2024-50404](https://github.com/C411e/CVE-2024-50404) + ### CVE-2024-50427 (2024-10-29) Unrestricted Upload of File with Dangerous Type vulnerability in Devsoft Baltic OÜ SurveyJS: Drag & Drop WordPress Form Builder.This issue affects SurveyJS: Drag & Drop WordPress Form Builder: from n/a through 1.9.136. @@ -8016,6 +8023,13 @@ - [punitdarji/Apache-struts-cve-2024-53677](https://github.com/punitdarji/Apache-struts-cve-2024-53677) - [SeanRickerd/CVE-2024-53677](https://github.com/SeanRickerd/CVE-2024-53677) +### CVE-2024-53691 (2024-12-06) + +A link following vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained user access to traverse the file system to unintended locations.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.1.8.2823 build 20240712 and later\nQTS 5.2.0.2802 build 20240620 and later\nQuTS hero h5.1.8.2823 build 20240712 and later\nQuTS hero h5.2.0.2802 build 20240620 and later + + +- [C411e/CVE-2024-53691](https://github.com/C411e/CVE-2024-53691) + ### CVE-2024-54152 (2024-12-10) Angular Expressions provides expressions for the Angular.JS web framework as a standalone module. Prior to version 1.4.3, an attacker can write a malicious expression that escapes the sandbox to execute arbitrary code on the system. With a more complex (undisclosed) payload, one can get full access to Arbitrary code execution on the system. The problem has been patched in version 1.4.3 of Angular Expressions. Two possible workarounds are available. One may either disable access to `__proto__` globally or make sure that one uses the function with just one argument.