From ad5769e126e59123b6d9ac828fbff98783257715 Mon Sep 17 00:00:00 2001 From: motikan2010-bot Date: Mon, 2 Dec 2024 09:31:47 +0900 Subject: [PATCH] Auto Update 2024/12/02 00:31:46 --- 2017/CVE-2017-7921.json | 31 ------------------------------- 2018/CVE-2018-0886.json | 31 ------------------------------- 2018/CVE-2018-19320.json | 8 ++++---- 2018/CVE-2018-7249.json | 8 ++++---- 2019/CVE-2019-0708.json | 8 ++++---- 2019/CVE-2019-12489.json | 12 ++++++------ 2021/CVE-2021-34527.json | 8 ++++---- 2022/CVE-2022-26134.json | 8 ++++---- 2022/CVE-2022-37042.json | 31 ------------------------------- 2023/CVE-2023-45866.json | 8 ++++---- 2024/CVE-2024-11320.json | 4 ++-- 2024/CVE-2024-11477.json | 8 ++++---- 2024/CVE-2024-21338.json | 8 ++++---- 2024/CVE-2024-22734.json | 8 ++++---- 2024/CVE-2024-23113.json | 8 ++++---- 2024/CVE-2024-3094.json | 8 ++++---- 2024/CVE-2024-38077.json | 4 ++-- 2024/CVE-2024-52940.json | 8 ++++---- 2024/CVE-2024-6769.json | 8 ++++---- 2024/CVE-2024-8504.json | 8 ++++---- README.md | 5 +---- 21 files changed, 67 insertions(+), 163 deletions(-) diff --git a/2017/CVE-2017-7921.json b/2017/CVE-2017-7921.json index 1f5f873bea..08073e0bd8 100644 --- a/2017/CVE-2017-7921.json +++ b/2017/CVE-2017-7921.json @@ -473,36 +473,5 @@ "watchers": 0, "score": 0, "subscribers_count": 1 - }, - { - "id": 896308520, - "name": "CVE-2017-7921_reproduces_decrypted_file_sharing", - "full_name": "andychao\/CVE-2017-7921_reproduces_decrypted_file_sharing", - "owner": { - "login": "andychao", - "id": 3231537, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3231537?v=4", - "html_url": "https:\/\/github.com\/andychao", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/andychao\/CVE-2017-7921_reproduces_decrypted_file_sharing", - "description": "CVE-2017-7921复现解密文件分享 免费下载", - "fork": false, - "created_at": "2024-11-30T02:47:34Z", - "updated_at": "2024-11-30T02:47:38Z", - "pushed_at": "2024-11-30T02:47:37Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2018/CVE-2018-0886.json b/2018/CVE-2018-0886.json index 81a1fb03ac..1bd2b89007 100644 --- a/2018/CVE-2018-0886.json +++ b/2018/CVE-2018-0886.json @@ -29,36 +29,5 @@ "watchers": 262, "score": 0, "subscribers_count": 18 - }, - { - "id": 895828584, - "name": "Remote_code_execution_vulnerability_CVE-2018-0886_vulnerability_fixing_resources_download", - "full_name": "andychao\/Remote_code_execution_vulnerability_CVE-2018-0886_vulnerability_fixing_resources_download", - "owner": { - "login": "andychao", - "id": 3231537, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3231537?v=4", - "html_url": "https:\/\/github.com\/andychao", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/andychao\/Remote_code_execution_vulnerability_CVE-2018-0886_vulnerability_fixing_resources_download", - "description": "远程执行代码漏洞CVE-2018-0886漏洞修复资源下载 免费下载", - "fork": false, - "created_at": "2024-11-29T01:57:06Z", - "updated_at": "2024-11-29T01:57:12Z", - "pushed_at": "2024-11-29T01:57:09Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2018/CVE-2018-19320.json b/2018/CVE-2018-19320.json index 0d865ce177..ea25a4d50d 100644 --- a/2018/CVE-2018-19320.json +++ b/2018/CVE-2018-19320.json @@ -76,10 +76,10 @@ "description": "Unsigned driver loader using CVE-2018-19320", "fork": false, "created_at": "2022-11-12T05:48:13Z", - "updated_at": "2024-11-29T16:59:54Z", + "updated_at": "2024-12-01T19:27:47Z", "pushed_at": "2023-04-09T13:50:29Z", - "stargazers_count": 207, - "watchers_count": 207, + "stargazers_count": 208, + "watchers_count": 208, "has_discussions": false, "forks_count": 56, "allow_forking": true, @@ -88,7 +88,7 @@ "topics": [], "visibility": "public", "forks": 56, - "watchers": 207, + "watchers": 208, "score": 0, "subscribers_count": 9 } diff --git a/2018/CVE-2018-7249.json b/2018/CVE-2018-7249.json index 57cab9fb2d..4fb034b44f 100644 --- a/2018/CVE-2018-7249.json +++ b/2018/CVE-2018-7249.json @@ -14,10 +14,10 @@ "description": "A PoC for CVE-2018-7249", "fork": false, "created_at": "2018-02-21T20:31:09Z", - "updated_at": "2024-05-15T01:05:05Z", + "updated_at": "2024-12-01T20:02:39Z", "pushed_at": "2018-03-01T19:06:50Z", - "stargazers_count": 16, - "watchers_count": 16, + "stargazers_count": 17, + "watchers_count": 17, "has_discussions": false, "forks_count": 5, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 5, - "watchers": 16, + "watchers": 17, "score": 0, "subscribers_count": 2 } diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json index 1fbe456dd6..2352509a25 100644 --- a/2019/CVE-2019-0708.json +++ b/2019/CVE-2019-0708.json @@ -3117,10 +3117,10 @@ "description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell", "fork": false, "created_at": "2020-01-21T02:22:29Z", - "updated_at": "2024-08-12T19:56:51Z", + "updated_at": "2024-12-01T20:13:31Z", "pushed_at": "2020-01-21T03:15:41Z", - "stargazers_count": 323, - "watchers_count": 323, + "stargazers_count": 324, + "watchers_count": 324, "has_discussions": false, "forks_count": 70, "allow_forking": true, @@ -3129,7 +3129,7 @@ "topics": [], "visibility": "public", "forks": 70, - "watchers": 323, + "watchers": 324, "score": 0, "subscribers_count": 6 }, diff --git a/2019/CVE-2019-12489.json b/2019/CVE-2019-12489.json index 043293aa0c..eeed0cc0b1 100644 --- a/2019/CVE-2019-12489.json +++ b/2019/CVE-2019-12489.json @@ -14,12 +14,12 @@ "description": "CVE-2019-12489", "fork": false, "created_at": "2019-09-24T08:28:34Z", - "updated_at": "2021-08-30T20:01:49Z", + "updated_at": "2024-12-01T19:10:08Z", "pushed_at": "2020-01-19T20:39:51Z", - "stargazers_count": 1, - "watchers_count": 1, + "stargazers_count": 2, + "watchers_count": 2, "has_discussions": false, - "forks_count": 1, + "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, @@ -28,8 +28,8 @@ "firmware" ], "visibility": "public", - "forks": 1, - "watchers": 1, + "forks": 2, + "watchers": 2, "score": 0, "subscribers_count": 2 } diff --git a/2021/CVE-2021-34527.json b/2021/CVE-2021-34527.json index b1682d8973..a5966ac49b 100644 --- a/2021/CVE-2021-34527.json +++ b/2021/CVE-2021-34527.json @@ -82,10 +82,10 @@ "description": null, "fork": false, "created_at": "2021-07-02T12:10:49Z", - "updated_at": "2024-11-21T15:29:00Z", + "updated_at": "2024-12-01T23:55:23Z", "pushed_at": "2021-07-02T12:17:50Z", - "stargazers_count": 259, - "watchers_count": 259, + "stargazers_count": 261, + "watchers_count": 261, "has_discussions": false, "forks_count": 66, "allow_forking": true, @@ -94,7 +94,7 @@ "topics": [], "visibility": "public", "forks": 66, - "watchers": 259, + "watchers": 261, "score": 0, "subscribers_count": 11 }, diff --git a/2022/CVE-2022-26134.json b/2022/CVE-2022-26134.json index b06d78d1b4..8d530f16a4 100644 --- a/2022/CVE-2022-26134.json +++ b/2022/CVE-2022-26134.json @@ -132,10 +132,10 @@ "description": "CVE-2022-26134 Proof of Concept", "fork": false, "created_at": "2022-06-03T13:59:19Z", - "updated_at": "2024-11-18T06:36:21Z", + "updated_at": "2024-12-01T18:36:50Z", "pushed_at": "2022-06-06T16:38:49Z", - "stargazers_count": 159, - "watchers_count": 159, + "stargazers_count": 160, + "watchers_count": 160, "has_discussions": false, "forks_count": 48, "allow_forking": true, @@ -148,7 +148,7 @@ ], "visibility": "public", "forks": 48, - "watchers": 159, + "watchers": 160, "score": 0, "subscribers_count": 1 }, diff --git a/2022/CVE-2022-37042.json b/2022/CVE-2022-37042.json index 05efca9c4a..5e5ec0957f 100644 --- a/2022/CVE-2022-37042.json +++ b/2022/CVE-2022-37042.json @@ -91,36 +91,5 @@ "watchers": 30, "score": 0, "subscribers_count": 2 - }, - { - "id": 896632413, - "name": "zimbra8_lab", - "full_name": "romero-javi\/zimbra8_lab", - "owner": { - "login": "romero-javi", - "id": 95502860, - "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95502860?v=4", - "html_url": "https:\/\/github.com\/romero-javi", - "user_view_type": "public" - }, - "html_url": "https:\/\/github.com\/romero-javi\/zimbra8_lab", - "description": "Zimbra Lab de CVE-2022-37042 y CVE-2022-37393 ", - "fork": false, - "created_at": "2024-11-30T22:06:12Z", - "updated_at": "2024-11-30T22:26:20Z", - "pushed_at": "2024-11-30T22:26:16Z", - "stargazers_count": 0, - "watchers_count": 0, - "has_discussions": false, - "forks_count": 0, - "allow_forking": true, - "is_template": false, - "web_commit_signoff_required": false, - "topics": [], - "visibility": "public", - "forks": 0, - "watchers": 0, - "score": 0, - "subscribers_count": 1 } ] \ No newline at end of file diff --git a/2023/CVE-2023-45866.json b/2023/CVE-2023-45866.json index 234703abf0..1111936030 100644 --- a/2023/CVE-2023-45866.json +++ b/2023/CVE-2023-45866.json @@ -14,10 +14,10 @@ "description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)", "fork": false, "created_at": "2024-01-16T06:52:02Z", - "updated_at": "2024-11-30T00:38:10Z", + "updated_at": "2024-12-01T23:55:33Z", "pushed_at": "2024-08-18T08:26:46Z", - "stargazers_count": 1280, - "watchers_count": 1280, + "stargazers_count": 1281, + "watchers_count": 1281, "has_discussions": false, "forks_count": 217, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 217, - "watchers": 1280, + "watchers": 1281, "score": 0, "subscribers_count": 20 }, diff --git a/2024/CVE-2024-11320.json b/2024/CVE-2024-11320.json index 854304013d..66e4cd35ae 100644 --- a/2024/CVE-2024-11320.json +++ b/2024/CVE-2024-11320.json @@ -19,13 +19,13 @@ "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, - "forks_count": 0, + "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 0, + "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 0 diff --git a/2024/CVE-2024-11477.json b/2024/CVE-2024-11477.json index 8eb93ced87..8ec32a476d 100644 --- a/2024/CVE-2024-11477.json +++ b/2024/CVE-2024-11477.json @@ -14,10 +14,10 @@ "description": "CVE-2024-11477 7Zip Code Execution Writeup and Analysis", "fork": false, "created_at": "2024-11-29T06:13:36Z", - "updated_at": "2024-12-01T16:44:44Z", + "updated_at": "2024-12-02T00:22:08Z", "pushed_at": "2024-11-29T21:02:56Z", - "stargazers_count": 21, - "watchers_count": 21, + "stargazers_count": 22, + "watchers_count": 22, "has_discussions": false, "forks_count": 6, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 6, - "watchers": 21, + "watchers": 22, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-21338.json b/2024/CVE-2024-21338.json index 4752f87361..92b80842f8 100644 --- a/2024/CVE-2024-21338.json +++ b/2024/CVE-2024-21338.json @@ -14,10 +14,10 @@ "description": "Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.", "fork": false, "created_at": "2024-04-13T05:53:02Z", - "updated_at": "2024-11-26T14:05:19Z", + "updated_at": "2024-12-01T19:10:59Z", "pushed_at": "2024-04-16T21:00:14Z", - "stargazers_count": 287, - "watchers_count": 287, + "stargazers_count": 288, + "watchers_count": 288, "has_discussions": false, "forks_count": 60, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 60, - "watchers": 287, + "watchers": 288, "score": 0, "subscribers_count": 3 }, diff --git a/2024/CVE-2024-22734.json b/2024/CVE-2024-22734.json index b38148e21d..9134f5ea3c 100644 --- a/2024/CVE-2024-22734.json +++ b/2024/CVE-2024-22734.json @@ -14,10 +14,10 @@ "description": "Exploit POC for CVE-2024-22734 affecting AMCS Trux Software", "fork": false, "created_at": "2024-12-01T17:47:16Z", - "updated_at": "2024-12-01T17:49:22Z", + "updated_at": "2024-12-01T22:05:37Z", "pushed_at": "2024-12-01T17:48:24Z", - "stargazers_count": 0, - "watchers_count": 0, + "stargazers_count": 1, + "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 0, + "watchers": 1, "score": 0, "subscribers_count": 0 } diff --git a/2024/CVE-2024-23113.json b/2024/CVE-2024-23113.json index 394606fd72..1c65899c2d 100644 --- a/2024/CVE-2024-23113.json +++ b/2024/CVE-2024-23113.json @@ -192,8 +192,8 @@ }, { "id": 895404057, - "name": "CVE-2024-23113-poc", - "full_name": "XiaomingX\/CVE-2024-23113-poc", + "name": "cve-2024-23113-poc", + "full_name": "XiaomingX\/cve-2024-23113-poc", "owner": { "login": "XiaomingX", "id": 5387930, @@ -201,11 +201,11 @@ "html_url": "https:\/\/github.com\/XiaomingX", "user_view_type": "public" }, - "html_url": "https:\/\/github.com\/XiaomingX\/CVE-2024-23113-poc", + "html_url": "https:\/\/github.com\/XiaomingX\/cve-2024-23113-poc", "description": "CVE-2024-23113 是一个在 Linux Kernel 中被发现的漏洞,它属于 任意代码执行漏洞,影响了 bpf (Berkeley Packet Filter) 子系统。具体来说,这个漏洞影响了 bpf 程序的 bpf_prog 类型的对象,并且可以允许攻击者通过构造恶意的 BPF 程序来在内核空间执行恶意代码。", "fork": false, "created_at": "2024-11-28T06:30:02Z", - "updated_at": "2024-11-28T06:35:26Z", + "updated_at": "2024-12-02T00:20:29Z", "pushed_at": "2024-11-28T06:35:22Z", "stargazers_count": 0, "watchers_count": 0, diff --git a/2024/CVE-2024-3094.json b/2024/CVE-2024-3094.json index 00df8f8200..ae4d03c418 100644 --- a/2024/CVE-2024-3094.json +++ b/2024/CVE-2024-3094.json @@ -952,10 +952,10 @@ "description": "notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)", "fork": false, "created_at": "2024-04-01T14:28:09Z", - "updated_at": "2024-11-26T07:00:07Z", + "updated_at": "2024-12-01T22:10:01Z", "pushed_at": "2024-04-03T04:58:50Z", - "stargazers_count": 3497, - "watchers_count": 3497, + "stargazers_count": 3498, + "watchers_count": 3498, "has_discussions": false, "forks_count": 239, "allow_forking": true, @@ -964,7 +964,7 @@ "topics": [], "visibility": "public", "forks": 239, - "watchers": 3497, + "watchers": 3498, "score": 0, "subscribers_count": 38 }, diff --git a/2024/CVE-2024-38077.json b/2024/CVE-2024-38077.json index 47e4c281b0..36c402d936 100644 --- a/2024/CVE-2024-38077.json +++ b/2024/CVE-2024-38077.json @@ -19,13 +19,13 @@ "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, - "forks_count": 223, + "forks_count": 224, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", - "forks": 223, + "forks": 224, "watchers": 6, "score": 0, "subscribers_count": 0 diff --git a/2024/CVE-2024-52940.json b/2024/CVE-2024-52940.json index 1c11de6257..134d012796 100644 --- a/2024/CVE-2024-52940.json +++ b/2024/CVE-2024-52940.json @@ -14,10 +14,10 @@ "description": "CVE-2024-52940 - A zero-day vulnerability in AnyDesk's \"Allow Direct Connections\" feature, discovered and registered by Ebrahim Shafiei (EbraSha), exposing public and private IP addresses. For details, visit the NVD, Tenable, or MITRE pages.", "fork": false, "created_at": "2024-10-27T15:29:56Z", - "updated_at": "2024-11-29T14:10:16Z", + "updated_at": "2024-12-01T19:08:01Z", "pushed_at": "2024-11-18T15:09:32Z", - "stargazers_count": 26, - "watchers_count": 26, + "stargazers_count": 27, + "watchers_count": 27, "has_discussions": true, "forks_count": 10, "allow_forking": true, @@ -38,7 +38,7 @@ ], "visibility": "public", "forks": 10, - "watchers": 26, + "watchers": 27, "score": 0, "subscribers_count": 1 } diff --git a/2024/CVE-2024-6769.json b/2024/CVE-2024-6769.json index af0aa38181..e89212fa91 100644 --- a/2024/CVE-2024-6769.json +++ b/2024/CVE-2024-6769.json @@ -14,10 +14,10 @@ "description": "Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)", "fork": false, "created_at": "2024-08-29T16:40:49Z", - "updated_at": "2024-11-24T14:19:49Z", + "updated_at": "2024-12-01T20:43:43Z", "pushed_at": "2024-09-29T21:58:19Z", - "stargazers_count": 54, - "watchers_count": 54, + "stargazers_count": 55, + "watchers_count": 55, "has_discussions": false, "forks_count": 9, "allow_forking": true, @@ -26,7 +26,7 @@ "topics": [], "visibility": "public", "forks": 9, - "watchers": 54, + "watchers": 55, "score": 0, "subscribers_count": 2 } diff --git a/2024/CVE-2024-8504.json b/2024/CVE-2024-8504.json index 72c70a1be4..4309662bb8 100644 --- a/2024/CVE-2024-8504.json +++ b/2024/CVE-2024-8504.json @@ -45,10 +45,10 @@ "description": "CVE-2024-8504", "fork": false, "created_at": "2024-09-22T20:17:10Z", - "updated_at": "2024-10-02T04:39:27Z", + "updated_at": "2024-12-01T19:54:33Z", "pushed_at": "2024-10-04T00:43:08Z", - "stargazers_count": 3, - "watchers_count": 3, + "stargazers_count": 4, + "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, @@ -57,7 +57,7 @@ "topics": [], "visibility": "public", "forks": 0, - "watchers": 3, + "watchers": 4, "score": 0, "subscribers_count": 1 } diff --git a/README.md b/README.md index 7c0c0085fb..ac33646b86 100644 --- a/README.md +++ b/README.md @@ -2868,7 +2868,7 @@ - [puckiestyle/CVE-2024-23113](https://github.com/puckiestyle/CVE-2024-23113) - [expl0itsecurity/CVE-2024-23113](https://github.com/expl0itsecurity/CVE-2024-23113) - [XiaomingX/cve-2024-23113-exp](https://github.com/XiaomingX/cve-2024-23113-exp) -- [XiaomingX/CVE-2024-23113-poc](https://github.com/XiaomingX/CVE-2024-23113-poc) +- [XiaomingX/cve-2024-23113-poc](https://github.com/XiaomingX/cve-2024-23113-poc) ### CVE-2024-23208 (2024-01-23) @@ -20598,7 +20598,6 @@ - [GreyNoise-Intelligence/Zimbra_CVE-2022-37042-_CVE-2022-27925](https://github.com/GreyNoise-Intelligence/Zimbra_CVE-2022-37042-_CVE-2022-27925) - [aels/CVE-2022-37042](https://github.com/aels/CVE-2022-37042) - [0xf4n9x/CVE-2022-37042](https://github.com/0xf4n9x/CVE-2022-37042) -- [romero-javi/zimbra8_lab](https://github.com/romero-javi/zimbra8_lab) ### CVE-2022-37177 (2022-08-29) @@ -38639,7 +38638,6 @@ - [preempt/credssp](https://github.com/preempt/credssp) -- [andychao/Remote_code_execution_vulnerability_CVE-2018-0886_vulnerability_fixing_resources_download](https://github.com/andychao/Remote_code_execution_vulnerability_CVE-2018-0886_vulnerability_fixing_resources_download) ### CVE-2018-0952 (2018-08-15) @@ -43014,7 +43012,6 @@ - [yousouf-Tasfin/cve-2017-7921-Mass-Exploit](https://github.com/yousouf-Tasfin/cve-2017-7921-Mass-Exploit) - [kooroshsanaei/HikVision-CVE-2017-7921](https://github.com/kooroshsanaei/HikVision-CVE-2017-7921) - [aengussong/hikvision_probe](https://github.com/aengussong/hikvision_probe) -- [andychao/CVE-2017-7921_reproduces_decrypted_file_sharing](https://github.com/andychao/CVE-2017-7921_reproduces_decrypted_file_sharing) ### CVE-2017-7998 (2018-01-08)